wlan_oid.c 384 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672767376747675767676777678767976807681768276837684768576867687768876897690769176927693769476957696769776987699770077017702770377047705770677077708770977107711771277137714771577167717771877197720772177227723772477257726772777287729773077317732773377347735773677377738773977407741774277437744774577467747774877497750775177527753775477557756775777587759776077617762776377647765776677677768776977707771777277737774777577767777777877797780778177827783778477857786778777887789779077917792779377947795779677977798779978007801780278037804780578067807780878097810781178127813781478157816781778187819782078217822782378247825782678277828782978307831783278337834783578367837783878397840784178427843784478457846784778487849785078517852785378547855785678577858785978607861786278637864786578667867786878697870787178727873787478757876787778787879788078817882788378847885788678877888788978907891789278937894789578967897789878997900790179027903790479057906790779087909791079117912791379147915791679177918791979207921792279237924792579267927792879297930793179327933793479357936793779387939794079417942794379447945794679477948794979507951795279537954795579567957795879597960796179627963796479657966796779687969797079717972797379747975797679777978797979807981798279837984798579867987798879897990799179927993799479957996799779987999800080018002800380048005800680078008800980108011801280138014801580168017801880198020802180228023802480258026802780288029803080318032803380348035803680378038803980408041804280438044804580468047804880498050805180528053805480558056805780588059806080618062806380648065806680678068806980708071807280738074807580768077807880798080808180828083808480858086808780888089809080918092809380948095809680978098809981008101810281038104810581068107810881098110811181128113811481158116811781188119812081218122812381248125812681278128812981308131813281338134813581368137813881398140814181428143814481458146814781488149815081518152815381548155815681578158815981608161816281638164816581668167816881698170817181728173817481758176817781788179818081818182818381848185818681878188818981908191819281938194819581968197819881998200820182028203820482058206820782088209821082118212821382148215821682178218821982208221822282238224822582268227822882298230823182328233823482358236823782388239824082418242824382448245824682478248824982508251825282538254825582568257825882598260826182628263826482658266826782688269827082718272827382748275827682778278827982808281828282838284828582868287828882898290829182928293829482958296829782988299830083018302830383048305830683078308830983108311831283138314831583168317831883198320832183228323832483258326832783288329833083318332833383348335833683378338833983408341834283438344834583468347834883498350835183528353835483558356835783588359836083618362836383648365836683678368836983708371837283738374837583768377837883798380838183828383838483858386838783888389839083918392839383948395839683978398839984008401840284038404840584068407840884098410841184128413841484158416841784188419842084218422842384248425842684278428842984308431843284338434843584368437843884398440844184428443844484458446844784488449845084518452845384548455845684578458845984608461846284638464846584668467846884698470847184728473847484758476847784788479848084818482848384848485848684878488848984908491849284938494849584968497849884998500850185028503850485058506850785088509851085118512851385148515851685178518851985208521852285238524852585268527852885298530853185328533853485358536853785388539854085418542854385448545854685478548854985508551855285538554855585568557855885598560856185628563856485658566856785688569857085718572857385748575857685778578857985808581858285838584858585868587858885898590859185928593859485958596859785988599860086018602860386048605860686078608860986108611861286138614861586168617861886198620862186228623862486258626862786288629863086318632863386348635863686378638863986408641864286438644864586468647864886498650865186528653865486558656865786588659866086618662866386648665866686678668866986708671867286738674867586768677867886798680868186828683868486858686868786888689869086918692869386948695869686978698869987008701870287038704870587068707870887098710871187128713871487158716871787188719872087218722872387248725872687278728872987308731873287338734873587368737873887398740874187428743874487458746874787488749875087518752875387548755875687578758875987608761876287638764876587668767876887698770877187728773877487758776877787788779878087818782878387848785878687878788878987908791879287938794879587968797879887998800880188028803880488058806880788088809881088118812881388148815881688178818881988208821882288238824882588268827882888298830883188328833883488358836883788388839884088418842884388448845884688478848884988508851885288538854885588568857885888598860886188628863886488658866886788688869887088718872887388748875887688778878887988808881888288838884888588868887888888898890889188928893889488958896889788988899890089018902890389048905890689078908890989108911891289138914891589168917891889198920892189228923892489258926892789288929893089318932893389348935893689378938893989408941894289438944894589468947894889498950895189528953895489558956895789588959896089618962896389648965896689678968896989708971897289738974897589768977897889798980898189828983898489858986898789888989899089918992899389948995899689978998899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990309031903290339034903590369037903890399040904190429043904490459046904790489049905090519052905390549055905690579058905990609061906290639064906590669067906890699070907190729073907490759076907790789079908090819082908390849085908690879088908990909091909290939094909590969097909890999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391749175917691779178917991809181918291839184918591869187918891899190919191929193919491959196919791989199920092019202920392049205920692079208920992109211921292139214921592169217921892199220922192229223922492259226922792289229923092319232923392349235923692379238923992409241924292439244924592469247924892499250925192529253925492559256925792589259926092619262926392649265926692679268926992709271927292739274927592769277927892799280928192829283928492859286928792889289929092919292929392949295929692979298929993009301930293039304930593069307930893099310931193129313931493159316931793189319932093219322932393249325932693279328932993309331933293339334933593369337933893399340934193429343934493459346934793489349935093519352935393549355935693579358935993609361936293639364936593669367936893699370937193729373937493759376937793789379938093819382938393849385938693879388938993909391939293939394939593969397939893999400940194029403940494059406940794089409941094119412941394149415941694179418941994209421942294239424942594269427942894299430943194329433943494359436943794389439944094419442944394449445944694479448944994509451945294539454945594569457945894599460946194629463946494659466946794689469947094719472947394749475947694779478947994809481948294839484948594869487948894899490949194929493949494959496949794989499950095019502950395049505950695079508950995109511951295139514951595169517951895199520952195229523952495259526952795289529953095319532953395349535953695379538953995409541954295439544954595469547954895499550955195529553955495559556955795589559956095619562956395649565956695679568956995709571957295739574957595769577957895799580958195829583958495859586958795889589959095919592959395949595959695979598959996009601960296039604960596069607960896099610961196129613961496159616961796189619962096219622962396249625962696279628962996309631963296339634963596369637963896399640964196429643964496459646964796489649965096519652965396549655965696579658965996609661966296639664966596669667966896699670967196729673967496759676967796789679968096819682968396849685968696879688968996909691969296939694969596969697969896999700970197029703970497059706970797089709971097119712971397149715971697179718971997209721972297239724972597269727972897299730973197329733973497359736973797389739974097419742974397449745974697479748974997509751975297539754975597569757975897599760976197629763976497659766976797689769977097719772977397749775977697779778977997809781978297839784978597869787978897899790979197929793979497959796979797989799980098019802980398049805980698079808980998109811981298139814981598169817981898199820982198229823982498259826982798289829983098319832983398349835983698379838983998409841984298439844984598469847984898499850985198529853985498559856985798589859986098619862986398649865986698679868986998709871987298739874987598769877987898799880988198829883988498859886988798889889989098919892989398949895989698979898989999009901990299039904990599069907990899099910991199129913991499159916991799189919992099219922992399249925992699279928992999309931993299339934993599369937993899399940994199429943994499459946994799489949995099519952995399549955995699579958995999609961996299639964996599669967996899699970997199729973997499759976997799789979998099819982998399849985998699879988998999909991999299939994999599969997999899991000010001100021000310004100051000610007100081000910010100111001210013100141001510016100171001810019100201002110022100231002410025100261002710028100291003010031100321003310034100351003610037100381003910040100411004210043100441004510046100471004810049100501005110052100531005410055100561005710058100591006010061100621006310064100651006610067100681006910070100711007210073100741007510076100771007810079100801008110082100831008410085100861008710088100891009010091100921009310094100951009610097100981009910100101011010210103101041010510106101071010810109101101011110112101131011410115101161011710118101191012010121101221012310124101251012610127101281012910130101311013210133101341013510136101371013810139101401014110142101431014410145101461014710148101491015010151101521015310154101551015610157101581015910160101611016210163101641016510166101671016810169101701017110172101731017410175101761017710178101791018010181101821018310184101851018610187101881018910190101911019210193101941019510196101971019810199102001020110202102031020410205102061020710208102091021010211102121021310214102151021610217102181021910220102211022210223102241022510226102271022810229102301023110232102331023410235102361023710238102391024010241102421024310244102451024610247102481024910250102511025210253102541025510256102571025810259102601026110262102631026410265102661026710268102691027010271102721027310274102751027610277102781027910280102811028210283102841028510286102871028810289102901029110292102931029410295102961029710298102991030010301103021030310304103051030610307103081030910310103111031210313103141031510316103171031810319103201032110322103231032410325103261032710328103291033010331103321033310334103351033610337103381033910340103411034210343103441034510346103471034810349103501035110352103531035410355103561035710358103591036010361103621036310364103651036610367103681036910370103711037210373103741037510376103771037810379103801038110382103831038410385103861038710388103891039010391103921039310394103951039610397103981039910400104011040210403104041040510406104071040810409104101041110412104131041410415104161041710418104191042010421104221042310424104251042610427104281042910430104311043210433104341043510436104371043810439104401044110442104431044410445104461044710448104491045010451104521045310454104551045610457104581045910460104611046210463104641046510466104671046810469104701047110472104731047410475104761047710478104791048010481104821048310484104851048610487104881048910490104911049210493104941049510496104971049810499105001050110502105031050410505105061050710508105091051010511105121051310514105151051610517105181051910520105211052210523105241052510526105271052810529105301053110532105331053410535105361053710538105391054010541105421054310544105451054610547105481054910550105511055210553105541055510556105571055810559105601056110562105631056410565105661056710568105691057010571105721057310574105751057610577105781057910580105811058210583105841058510586105871058810589105901059110592105931059410595105961059710598105991060010601106021060310604106051060610607106081060910610106111061210613106141061510616106171061810619106201062110622106231062410625106261062710628106291063010631106321063310634106351063610637106381063910640106411064210643106441064510646106471064810649106501065110652106531065410655106561065710658106591066010661106621066310664106651066610667106681066910670106711067210673106741067510676106771067810679106801068110682106831068410685106861068710688106891069010691106921069310694106951069610697106981069910700107011070210703107041070510706107071070810709107101071110712107131071410715107161071710718107191072010721107221072310724107251072610727107281072910730107311073210733107341073510736107371073810739107401074110742107431074410745107461074710748107491075010751107521075310754107551075610757107581075910760107611076210763107641076510766107671076810769107701077110772107731077410775107761077710778107791078010781107821078310784107851078610787107881078910790107911079210793107941079510796107971079810799108001080110802108031080410805108061080710808108091081010811108121081310814108151081610817108181081910820108211082210823108241082510826108271082810829108301083110832108331083410835108361083710838108391084010841108421084310844108451084610847108481084910850108511085210853108541085510856108571085810859108601086110862108631086410865108661086710868108691087010871108721087310874108751087610877108781087910880108811088210883108841088510886108871088810889108901089110892108931089410895108961089710898108991090010901109021090310904109051090610907109081090910910109111091210913109141091510916109171091810919109201092110922109231092410925109261092710928109291093010931109321093310934109351093610937109381093910940109411094210943109441094510946109471094810949109501095110952109531095410955109561095710958109591096010961109621096310964109651096610967109681096910970109711097210973109741097510976109771097810979109801098110982109831098410985109861098710988109891099010991109921099310994109951099610997109981099911000110011100211003110041100511006110071100811009110101101111012110131101411015110161101711018110191102011021110221102311024110251102611027110281102911030110311103211033110341103511036110371103811039110401104111042110431104411045110461104711048110491105011051110521105311054110551105611057110581105911060110611106211063110641106511066110671106811069110701107111072110731107411075110761107711078110791108011081110821108311084110851108611087110881108911090110911109211093110941109511096110971109811099111001110111102111031110411105111061110711108111091111011111111121111311114111151111611117111181111911120
  1. /*
  2. ** Id: //Department/DaVinci/BRANCHES/MT6620_WIFI_DRIVER_V2_3/common/wlan_oid.c#5
  3. */
  4. /*! \file wlanoid.c
  5. \brief This file contains the WLAN OID processing routines of Windows driver for
  6. MediaTek Inc. 802.11 Wireless LAN Adapters.
  7. */
  8. /*
  9. ** Log: wlan_oid.c
  10. **
  11. ** 09 05 2013 cp.wu
  12. ** isolate logic regarding roaming & reassociation
  13. **
  14. ** 09 03 2013 cp.wu
  15. ** add path for reassociation
  16. **
  17. ** 09 02 2013 cp.wu
  18. ** add path to handle reassociation request
  19. **
  20. ** 07 19 2012 yuche.tsai
  21. ** NULL
  22. ** Code update for JB.
  23. *
  24. * 07 17 2012 yuche.tsai
  25. * NULL
  26. * Let netdev bring up.
  27. *
  28. * 07 17 2012 yuche.tsai
  29. * NULL
  30. * Compile no error before trial run.
  31. *
  32. * 03 02 2012 terry.wu
  33. * NULL
  34. * Sync CFG80211 modification from branch 2,2.
  35. *
  36. * 01 06 2012 wh.su
  37. * [WCXRP00001153] [MT6620 Wi-Fi][Driver] Adding the get_ch_list and set_tx_power proto type function
  38. * using the wlanSendSetQueryCmd to set the tx power control cmd.
  39. *
  40. * 01 06 2012 wh.su
  41. * [WCXRP00001153] [MT6620 Wi-Fi][Driver] Adding the get_ch_list and set_tx_power proto type function
  42. * change the set tx power cmd name.
  43. *
  44. * 01 05 2012 wh.su
  45. * [WCXRP00001153] [MT6620 Wi-Fi][Driver] Adding the get_ch_list and set_tx_power proto type function
  46. * Adding the related ioctl / wlan oid function to set the Tx power cfg.
  47. *
  48. * 12 20 2011 cp.wu
  49. * [WCXRP00001144] [MT6620 Wi-Fi][Driver][Firmware] Add RF_FUNC_ID for exposing device and related version information
  50. * add driver implementations for RF_AT_FUNCID_FW_INFO & RF_AT_FUNCID_DRV_INFO
  51. * to expose version information
  52. *
  53. * 12 05 2011 cp.wu
  54. * [WCXRP00001131] [MT6620 Wi-Fi][Driver][AIS] Implement connect-by-BSSID path
  55. * add CONNECT_BY_BSSID policy
  56. *
  57. * 11 22 2011 cp.wu
  58. * [WCXRP00001120] [MT6620 Wi-Fi][Driver] Modify roaming to AIS state transition from synchronous to
  59. * asynchronous approach to avoid incomplete state termination
  60. * 1. change RDD related compile option brace position.
  61. * 2. when roaming is triggered, ask AIS to transit immediately only when AIS is in Normal TR state
  62. * without join timeout timer ticking
  63. * 3. otherwise, insert AIS_REQUEST into pending request queue
  64. *
  65. * 11 21 2011 cp.wu
  66. * [WCXRP00001118] [MT6620 Wi-Fi][Driver] Corner case protections to pass Monkey testing
  67. * 1. wlanoidQueryBssIdList might be passed with a non-zero length but a NULL pointer of buffer
  68. * add more checking for such cases
  69. *
  70. * 2. kalSendComplete() might be invoked with a packet belongs to P2P network right after P2P is unregistered.
  71. * add some tweaking to protect such cases because that net device has become invalid.
  72. *
  73. * 11 15 2011 cm.chang
  74. * NULL
  75. * Fix compiling warning
  76. *
  77. * 11 11 2011 wh.su
  78. * [WCXRP00001078] [MT6620 Wi-Fi][Driver] Adding the mediatek log improment support : XLOG
  79. * modify the xlog related code.
  80. *
  81. * 11 11 2011 tsaiyuan.hsu
  82. * [WCXRP00001083] [MT6620 Wi-Fi][DRV]] dump debug counter or frames when debugging is triggered
  83. * add debug counters of bb and ar for xlog.
  84. *
  85. * 11 10 2011 wh.su
  86. * [WCXRP00001078] [MT6620 Wi-Fi][Driver] Adding the mediatek log improment support : XLOG
  87. * change the debug module level.
  88. *
  89. * 11 09 2011 george.huang
  90. * [WCXRP00000871] [MT6620 Wi-Fi][FW] Include additional wakeup condition, which is by
  91. * consequent DTIM unicast indication add XLOG for Set PS mode entry
  92. *
  93. * 11 08 2011 tsaiyuan.hsu
  94. * [WCXRP00001083] [MT6620 Wi-Fi][DRV]] dump debug counter or frames when debugging is triggered
  95. * check if CFG_SUPPORT_SWCR is defined to aoid compiler error.
  96. *
  97. * 11 07 2011 tsaiyuan.hsu
  98. * [WCXRP00001083] [MT6620 Wi-Fi][DRV]] dump debug counter or frames when debugging is triggered
  99. * add debug counters and periodically dump counters for debugging.
  100. *
  101. * 11 03 2011 wh.su
  102. * [WCXRP00001078] [MT6620 Wi-Fi][Driver] Adding the mediatek log improment support : XLOG
  103. * change the DBGLOG for "\n" and "\r\n". LABEL to LOUD for XLOG
  104. *
  105. * 11 02 2011 chinghwa.yu
  106. * [WCXRP00000612] [MT6620 Wi-Fi] [FW] CSD update SWRDD algorithm
  107. * Add RDD certification features.
  108. *
  109. * 10 21 2011 eddie.chen
  110. * [WCXRP00001051] [MT6620 Wi-Fi][Driver/Fw] Adjust the STA aging timeout
  111. * Add switch to ignore the STA aging timeout.
  112. *
  113. * 10 12 2011 wh.su
  114. * [WCXRP00001036] [MT6620 Wi-Fi][Driver][FW] Adding the 802.11w code for MFP
  115. * adding the 802.11w related function and define .
  116. *
  117. * 09 15 2011 tsaiyuan.hsu
  118. * [WCXRP00000938] [MT6620 Wi-Fi][FW] add system config for CTIA
  119. * correct fifo full control from query to set operation for CTIA.
  120. *
  121. * 08 31 2011 cm.chang
  122. * [WCXRP00000969] [MT6620 Wi-Fi][Driver][FW] Channel list for 5G band based on country code
  123. * .
  124. *
  125. * 08 17 2011 tsaiyuan.hsu
  126. * [WCXRP00000938] [MT6620 Wi-Fi][FW] add system config for CTIA
  127. * add system config for CTIA.
  128. *
  129. * 08 15 2011 george.huang
  130. * [MT6620 Wi-Fi][FW] handle TSF drift for connection detection
  131. * .
  132. *
  133. * 07 28 2011 chinghwa.yu
  134. * [WCXRP00000063] Update BCM CoEx design and settings
  135. * Add BWCS cmd and event.
  136. *
  137. * 07 18 2011 chinghwa.yu
  138. * [WCXRP00000063] Update BCM CoEx design and settings[WCXRP00000612] [MT6620 Wi-Fi] [FW] CSD update SWRDD algorithm
  139. * Add CMD/Event for RDD and BWCS.
  140. *
  141. * 07 11 2011 wh.su
  142. * [WCXRP00000849] [MT6620 Wi-Fi][Driver] Remove some of the WAPI define for make sure the value is initialize,
  143. * for customer not enable WAPI
  144. * For make sure wapi initial value is set.
  145. *
  146. * 06 23 2011 cp.wu
  147. * [WCXRP00000812] [MT6620 Wi-Fi][Driver] not show NVRAM when there is no valid MAC address in NVRAM content
  148. * check with firmware for valid MAC address.
  149. *
  150. * 05 02 2011 eddie.chen
  151. * [WCXRP00000373] [MT6620 Wi-Fi][FW] SW debug control
  152. * Fix compile warning.
  153. *
  154. * 04 29 2011 george.huang
  155. * [WCXRP00000684] [MT6620 Wi-Fi][Driver] Support P2P setting ARP filter
  156. * .
  157. *
  158. * 04 27 2011 george.huang
  159. * [WCXRP00000684] [MT6620 Wi-Fi][Driver] Support P2P setting ARP filter
  160. * add more debug message
  161. *
  162. * 04 26 2011 eddie.chen
  163. * [WCXRP00000373] [MT6620 Wi-Fi][FW] SW debug control
  164. * Add rx path profiling.
  165. *
  166. * 04 12 2011 eddie.chen
  167. * [WCXRP00000617] [MT6620 Wi-Fi][DRV/FW] Fix for sigma
  168. * Fix the sta index in processing security frame
  169. * Simple flow control for TC4 to avoid mgt frames for PS STA to occupy the TC4
  170. * Add debug message.
  171. *
  172. * 04 08 2011 george.huang
  173. * [WCXRP00000621] [MT6620 Wi-Fi][Driver] Support P2P supplicant to set power mode
  174. * separate settings of P2P and AIS
  175. *
  176. * 03 31 2011 puff.wen
  177. * NULL
  178. * .
  179. *
  180. * 03 29 2011 puff.wen
  181. * NULL
  182. * Add chennel switch for stress test
  183. *
  184. * 03 29 2011 cp.wu
  185. * [WCXRP00000604] [MT6620 Wi-Fi][Driver] Surpress Klockwork Warning
  186. * surpress klock warning with code path rewritten
  187. *
  188. * 03 24 2011 wh.su
  189. * [WCXRP00000595] [MT6620 Wi-Fi][Driver] at CTIA indicate disconnect to make the ps profile can apply
  190. * use disconnect event instead of ais abort for CTIA testing.
  191. *
  192. * 03 23 2011 george.huang
  193. * [WCXRP00000586] [MT6620 Wi-Fi][FW] Modify for blocking absence request right after connected
  194. * revise for CTIA power mode setting
  195. *
  196. * 03 22 2011 george.huang
  197. * [WCXRP00000504] [MT6620 Wi-Fi][FW] Support Sigma CAPI for power saving related command
  198. * link with supplicant commands
  199. *
  200. * 03 17 2011 chinglan.wang
  201. * [WCXRP00000570] [MT6620 Wi-Fi][Driver] Add Wi-Fi Protected Setup v2.0 feature
  202. * .
  203. *
  204. * 03 17 2011 yarco.yang
  205. * [WCXRP00000569] [MT6620 Wi-Fi][F/W][Driver] Set multicast address support current network usage
  206. * .
  207. *
  208. * 03 15 2011 george.huang
  209. * [WCXRP00000557] [MT6620 Wi-Fi] Support current consumption test mode commands
  210. * Support current consumption measurement mode command
  211. *
  212. * 03 15 2011 eddie.chen
  213. * [WCXRP00000554] [MT6620 Wi-Fi][DRV] Add sw control debug counter
  214. * Add sw debug counter for QM.
  215. *
  216. * 03 10 2011 cp.wu
  217. * [WCXRP00000532] [MT6620 Wi-Fi][Driver] Migrate NVRAM configuration procedures from MT6620 E2 to MT6620 E3
  218. * deprecate configuration used by MT6620 E2
  219. *
  220. * 03 07 2011 terry.wu
  221. * [WCXRP00000521] [MT6620 Wi-Fi][Driver] Remove non-standard debug message
  222. * Toggle non-standard debug messages to comments.
  223. *
  224. * 03 04 2011 cp.wu
  225. * [WCXRP00000515] [MT6620 Wi-Fi][Driver] Surpress compiler warning which is identified by GNU compiler collection
  226. * surpress compile warning occurred when compiled by GNU compiler collection.
  227. *
  228. * 03 03 2011 wh.su
  229. * [WCXRP00000510] [MT6620 Wi-Fi] [Driver] Fixed the CTIA enter test mode issue
  230. * fixed the enter ctia test mode issue.
  231. *
  232. * 03 02 2011 george.huang
  233. * [WCXRP00000504] [MT6620 Wi-Fi][FW] Support Sigma CAPI for power saving related command
  234. * Update sigma CAPI for U-APSD setting
  235. *
  236. * 03 02 2011 george.huang
  237. * [WCXRP00000504] [MT6620 Wi-Fi][FW] Support Sigma CAPI for power saving related command
  238. * Support UAPSD/OppPS/NoA parameter setting
  239. *
  240. * 03 02 2011 cp.wu
  241. * [WCXRP00000503] [MT6620 Wi-Fi][Driver] Take RCPI brought by association response as
  242. * initial RSSI right after connection is built.
  243. * use RCPI brought by ASSOC-RESP after connection is built as initial RCPI to avoid using a uninitialized MAC-RX RCPI.
  244. *
  245. * 01 27 2011 george.huang
  246. * [WCXRP00000400] [MT6620 Wi-Fi] support CTIA power mode setting
  247. * Support CTIA power mode setting.
  248. *
  249. * 01 26 2011 wh.su
  250. * [WCXRP00000396] [MT6620 Wi-Fi][Driver] Support Sw Ctrl ioctl at linux
  251. * adding the SW cmd ioctl support, use set/get structure ioctl.
  252. *
  253. * 01 25 2011 cp.wu
  254. * [WCXRP00000394] [MT6620 Wi-Fi][Driver] Count space needed for generating error message in
  255. * scanning list into buffer size checking
  256. * when doing size prechecking, check illegal MAC address as well
  257. *
  258. * 01 20 2011 eddie.chen
  259. * [WCXRP00000374] [MT6620 Wi-Fi][DRV] SW debug control
  260. * Add Oid for sw control debug command
  261. *
  262. * 01 15 2011 puff.wen
  263. * NULL
  264. * Add Stress test
  265. *
  266. * 01 12 2011 cp.wu
  267. * [WCXRP00000358] [MT6620 Wi-Fi][Driver] Provide concurrent information for each module
  268. * check if allow to switch to IBSS mode via concurrent module before setting to IBSS mode
  269. *
  270. * 01 12 2011 cm.chang
  271. * [WCXRP00000354] [MT6620 Wi-Fi][Driver][FW] Follow NVRAM bandwidth setting
  272. * User-defined bandwidth is for 2.4G and 5G individually
  273. *
  274. * 01 04 2011 cp.wu
  275. * [WCXRP00000342] [MT6620 Wi-Fi][Driver] show error code in scanning list when MAC address is not
  276. * correctly configured in NVRAM
  277. * show error code 0x10 when MAC address in NVRAM is not configured correctly.
  278. *
  279. * 01 04 2011 cp.wu
  280. * [WCXRP00000338] [MT6620 Wi-Fi][Driver] Separate kalMemAlloc into kmalloc and vmalloc implementations
  281. * to ease physically continuous memory demands
  282. * separate kalMemAlloc() into virtually-continuous and physically-continuous type to ease slab system pressure
  283. *
  284. * 12 28 2010 george.huang
  285. * [WCXRP00000232] [MT5931 Wi-Fi][FW] Modifications for updated HW power on sequence and related design
  286. * support WMM-PS U-APSD AC assignment.
  287. *
  288. * 12 28 2010 cp.wu
  289. * [WCXRP00000269] [MT6620 Wi-Fi][Driver][Firmware] Prepare for v1.1 branch release
  290. * report EEPROM used flag via NIC_CAPABILITY
  291. *
  292. * 12 28 2010 cp.wu
  293. * [WCXRP00000269] [MT6620 Wi-Fi][Driver][Firmware] Prepare for v1.1 branch release
  294. * integrate with 'EEPROM used' flag for reporting correct capability to Engineer Mode/META and other tools
  295. *
  296. * 12 16 2010 cp.wu
  297. * [WCXRP00000268] [MT6620 Wi-Fi][Driver] correction for WHQL failed items
  298. * correction for OID_802_11_NETWORK_TYPES_SUPPORTED handlers
  299. *
  300. * 12 13 2010 cp.wu
  301. * [WCXRP00000256] [MT6620 Wi-Fi][Driver] Eliminate potential issues which is identified by Klockwork
  302. * suppress warning reported by Klockwork.
  303. *
  304. * 12 07 2010 cm.chang
  305. * [WCXRP00000239] MT6620 Wi-Fi][Driver][FW] Merge concurrent branch back to maintrunk
  306. * 1. BSSINFO include RLM parameter
  307. * 2. free all sta records when network is disconnected
  308. *
  309. * 12 07 2010 cm.chang
  310. * [WCXRP00000238] MT6620 Wi-Fi][Driver][FW] Support regulation domain setting from NVRAM and supplicant
  311. * 1. Country code is from NVRAM or supplicant
  312. * 2. Change band definition in CMD/EVENT.
  313. *
  314. * 11 30 2010 cp.wu
  315. * [WCXRP00000213] [MT6620 Wi-Fi][Driver] Implement scanning with specified SSID for wpa_supplicant with ap_scan=1
  316. * .
  317. *
  318. * 11 26 2010 cp.wu
  319. * [WCXRP00000209] [MT6620 Wi-Fi][Driver] Modify NVRAM checking mechanism to warning only
  320. * with necessary data field checking
  321. * 1. NVRAM error is now treated as warning only, thus normal operation is still available
  322. * but extra scan result used to indicate user is attached
  323. * 2. DPD and TX-PWR are needed fields from now on, if these 2 fields are not available then warning message is shown
  324. *
  325. * 11 25 2010 cp.wu
  326. * [WCXRP00000208] [MT6620 Wi-Fi][Driver] Add scanning with specified SSID to AIS FSM
  327. * add scanning with specified SSID facility to AIS-FSM
  328. *
  329. * 11 21 2010 wh.su
  330. * [WCXRP00000192] [MT6620 Wi-Fi][Driver] Fixed fail trying to build connection with Security
  331. * AP while enable WAPI message check
  332. * Not set the wapi mode while the wapi assoc info set non-wapi ie.
  333. *
  334. * 11 05 2010 wh.su
  335. * [WCXRP00000165] [MT6620 Wi-Fi] [Pre-authentication] Assoc req rsn ie use wrong pmkid value
  336. * fixed the.pmkid value mismatch issue
  337. *
  338. * 11 01 2010 cp.wu
  339. * [WCXRP00000056] [MT6620 Wi-Fi][Driver] NVRAM implementation with Version
  340. * Check[WCXRP00000150] [MT6620 Wi-Fi][Driver] Add implementation for querying
  341. * current TX rate from firmware auto rate module
  342. * 1) Query link speed (TX rate) from firmware directly with buffering mechanism to reduce overhead
  343. * 2) Remove CNM CH-RECOVER event handling
  344. * 3) cfg read/write API renamed with kal prefix for unified naming rules.
  345. *
  346. * 10 26 2010 cp.wu
  347. * [WCXRP00000056] [MT6620 Wi-Fi][Driver] NVRAM implementation with Version
  348. * Check[WCXRP00000137] [MT6620 Wi-Fi] [FW] Support NIC capability query command
  349. * 1) update NVRAM content template to ver 1.02
  350. * 2) add compile option for querying NIC capability (default: off)
  351. * 3) modify AIS 5GHz support to run-time option, which could be turned on by registry or NVRAM setting
  352. * 4) correct auto-rate compiler error under linux (treat warning as error)
  353. * 5) simplify usage of NVRAM and REG_INFO_T
  354. * 6) add version checking between driver and firmware
  355. *
  356. * 10 22 2010 cp.wu
  357. * [WCXRP00000122] [MT6620 Wi-Fi][Driver] Preparation for YuSu source tree integration
  358. * dos2unix conversion.
  359. *
  360. * 10 20 2010 cp.wu
  361. * [WCXRP00000117] [MT6620 Wi-Fi][Driver] Add logic for suspending driver when MT6620 is not responding anymore
  362. * use OID_CUSTOM_TEST_MODE as indication for driver reset
  363. * by dropping pending TX packets
  364. *
  365. * 10 18 2010 cp.wu
  366. * [WCXRP00000056] [MT6620 Wi-Fi][Driver] NVRAM implementation with Version
  367. * Check[WCXRP00000086] [MT6620 Wi-Fi][Driver] The mac address is all zero at android complete
  368. * implementation of Android NVRAM access
  369. *
  370. * 10 06 2010 yuche.tsai
  371. * NULL
  372. * Update SLT 5G Test Channel Set.
  373. *
  374. * 10 06 2010 cp.wu
  375. * [WCXRP00000052] [MT6620 Wi-Fi][Driver] Eliminate Linux Compile Warning
  376. * code reorganization to improve isolation between GLUE and CORE layers.
  377. *
  378. * 10 06 2010 yuche.tsai
  379. * NULL
  380. * Update For SLT 5G Test Channel Selection Rule.
  381. *
  382. * 10 05 2010 cp.wu
  383. * [WCXRP00000075] [MT6620 Wi-Fi][Driver] Fill query buffer for OID_802_11_BSSID_LIST in 4-bytes aligned form
  384. * Query buffer size needs to be enlarged due to result is filled in 4-bytes alignment boundary
  385. *
  386. * 10 05 2010 cp.wu
  387. * [WCXRP00000056] [MT6620 Wi-Fi][Driver] NVRAM implementation with Version Check
  388. * 1) add NVRAM access API
  389. * 2) fake scanning result when NVRAM doesn't exist and/or version mismatch. (off by compiler option)
  390. * 3) add OID implementation for NVRAM read/write service
  391. *
  392. * 10 04 2010 cp.wu
  393. * [WCXRP00000077] [MT6620 Wi-Fi][Driver][FW] Eliminate use of ENUM_NETWORK_TYPE_T and
  394. * replaced by ENUM_NETWORK_TYPE_INDEX_T only remove ENUM_NETWORK_TYPE_T definitions
  395. *
  396. * 10 04 2010 cp.wu
  397. * [WCXRP00000075] [MT6620 Wi-Fi][Driver] Fill query buffer for OID_802_11_BSSID_LIST in 4-bytes aligned form
  398. * Extend result length to multiples of 4-bytes
  399. *
  400. * 09 24 2010 cp.wu
  401. * [WCXRP00000052] [MT6620 Wi-Fi][Driver] Eliminate Linux Compile Warning
  402. * eliminate unused variables which lead gcc to argue
  403. *
  404. * 09 24 2010 cp.wu
  405. * [WCXRP00000057] [MT6620 Wi-Fi][Driver] Modify online scan to a run-time switchable feature
  406. * Modify online scan as a run-time adjustable option (for Windows, in registry)
  407. *
  408. * 09 23 2010 cp.wu
  409. * [WCXRP00000051] [MT6620 Wi-Fi][Driver] WHQL test fail in MAC address changed item
  410. * use firmware reported mac address right after wlanAdapterStart() as permanent address
  411. *
  412. * 09 23 2010 cp.wu
  413. * [WCXRP00000056] [MT6620 Wi-Fi][Driver] NVRAM implementation with Version Check
  414. * add skeleton for NVRAM integration
  415. *
  416. * 09 08 2010 cp.wu
  417. * NULL
  418. * use static memory pool for storing IEs of scanning result.
  419. *
  420. * 09 07 2010 yuche.tsai
  421. * NULL
  422. * Update SLT due to API change of SCAN module.
  423. *
  424. * 09 06 2010 cp.wu
  425. * NULL
  426. * Androi/Linux: return current operating channel information
  427. *
  428. * 09 06 2010 cp.wu
  429. * NULL
  430. * 1) initialize for correct parameter even for disassociation.
  431. * 2) AIS-FSM should have a limit on trials to build connection
  432. *
  433. * 09 03 2010 yuche.tsai
  434. * NULL
  435. * Refine SLT IO control handler.
  436. *
  437. * 09 03 2010 kevin.huang
  438. * NULL
  439. * Refine #include sequence and solve recursive/nested #include issue
  440. *
  441. * 09 01 2010 wh.su
  442. * NULL
  443. * adding the wapi support for integration test.
  444. *
  445. * 08 30 2010 chinglan.wang
  446. * NULL
  447. * Modify the rescan condition.
  448. *
  449. * 08 29 2010 yuche.tsai
  450. * NULL
  451. * Finish SLT TX/RX & Rate Changing Support.
  452. *
  453. * 08 27 2010 chinglan.wang
  454. * NULL
  455. * Update configuration for MT6620_E1_PRE_ALPHA_1832_0827_2010
  456. *
  457. * 08 25 2010 george.huang
  458. * NULL
  459. * update OID/ registry control path for PM related settings
  460. *
  461. * 08 24 2010 cp.wu
  462. * NULL
  463. * 1) initialize variable for enabling short premable/short time slot.
  464. * 2) add compile option for disabling online scan
  465. *
  466. * 08 16 2010 george.huang
  467. * NULL
  468. * .
  469. *
  470. * 08 16 2010 george.huang
  471. * NULL
  472. * update params defined in CMD_SET_NETWORK_ADDRESS_LIST
  473. *
  474. * 08 04 2010 cp.wu
  475. * NULL
  476. * fix for check build WHQL testing:
  477. * 1) do not assert query buffer if indicated buffer length is zero
  478. * 2) sdio.c has bugs which cause freeing same pointer twice
  479. *
  480. * 08 04 2010 cp.wu
  481. * NULL
  482. * revert changelist #15371, efuse read/write access will be done by RF test approach
  483. *
  484. * 08 04 2010 cp.wu
  485. * NULL
  486. * add OID definitions for EFUSE read/write access.
  487. *
  488. * 08 04 2010 george.huang
  489. * NULL
  490. * handle change PS mode OID/ CMD
  491. *
  492. * 08 04 2010 cp.wu
  493. * NULL
  494. * add an extra parameter to rftestQueryATInfo 'cause it's necessary to pass u4FuncData for query request.
  495. *
  496. * 08 04 2010 cp.wu
  497. * NULL
  498. * bypass u4FuncData for RF-Test query request as well.
  499. *
  500. * 08 04 2010 yarco.yang
  501. * NULL
  502. * Add TX_AMPDU and ADDBA_REJECT command
  503. *
  504. * 08 03 2010 cp.wu
  505. * NULL
  506. * surpress compilation warning.
  507. *
  508. * 08 02 2010 george.huang
  509. * NULL
  510. * add WMM-PS test related OID/ CMD handlers
  511. *
  512. * 07 29 2010 cp.wu
  513. * NULL
  514. * eliminate u4FreqInKHz usage, combined into rConnections.ucAdHoc*
  515. *
  516. * 07 28 2010 cp.wu
  517. * NULL
  518. * 1) eliminate redundant variable eOPMode in prAdapter->rWlanInfo
  519. * 2) change nicMediaStateChange() API prototype
  520. *
  521. * 07 26 2010 cp.wu
  522. *
  523. * re-commit code logic being overwriten.
  524. *
  525. * 07 24 2010 wh.su
  526. *
  527. * .support the Wi-Fi RSN
  528. *
  529. * 07 21 2010 cp.wu
  530. *
  531. * 1) change BG_SCAN to ONLINE_SCAN for consistent term
  532. * 2) only clear scanning result when scan is permitted to do
  533. *
  534. * 07 20 2010 cp.wu
  535. *
  536. * 1) [AIS] when new scan is issued, clear currently available scanning result except the connected one
  537. * 2) refine disconnection behaviour when issued during BG-SCAN process
  538. *
  539. * 07 19 2010 wh.su
  540. *
  541. * modify the auth and encry status variable.
  542. *
  543. * 07 16 2010 cp.wu
  544. *
  545. * remove work-around in case SCN is not available.
  546. *
  547. * 07 08 2010 cp.wu
  548. *
  549. * [WPD00003833] [MT6620 and MT5931] Driver migration - move to new repository.
  550. *
  551. * 07 05 2010 cp.wu
  552. * [WPD00003833][MT6620 and MT5931] Driver migration
  553. * 1) change fake BSS_DESC from channel 6 to channel 1 due to channel switching is not done yet.
  554. * 2) after MAC address is queried from firmware, all related variables in driver domain should be updated as well
  555. *
  556. * 07 01 2010 cp.wu
  557. * [WPD00003833][MT6620 and MT5931] Driver migration
  558. * AIS-FSM integration with CNM channel request messages
  559. *
  560. * 07 01 2010 cp.wu
  561. * [WPD00003833][MT6620 and MT5931] Driver migration
  562. * implementation of DRV-SCN and related mailbox message handling.
  563. *
  564. * 06 29 2010 cp.wu
  565. * [WPD00003833][MT6620 and MT5931] Driver migration
  566. * 1) sync to. CMD/EVENT document v0.03
  567. * 2) simplify DTIM period parsing in scan.c only, bss.c no longer parses it again.
  568. * 3) send command packet to indicate FW-PM after
  569. * a) 1st beacon is received after AIS has connected to an AP
  570. * b) IBSS-ALONE has been created
  571. * c) IBSS-MERGE has occurred
  572. *
  573. * 06 25 2010 cp.wu
  574. * [WPD00003833][MT6620 and MT5931] Driver migration
  575. * add API in que_mgt to retrieve sta-rec index for security frames.
  576. *
  577. * 06 24 2010 cp.wu
  578. * [WPD00003833][MT6620 and MT5931] Driver migration
  579. * 802.1x and bluetooth-over-Wi-Fi security frames are now delievered to firmware via command path instead of data path.
  580. *
  581. * 06 23 2010 cp.wu
  582. * [WPD00003833][MT6620 and MT5931] Driver migration
  583. * 1) add SCN compilation option.
  584. * 2) when SCN is not turned on, BSSID_SCAN will generate a fake entry for 1st connection
  585. *
  586. * 06 23 2010 cp.wu
  587. * [WPD00003833][MT6620 and MT5931] Driver migration
  588. * implement SCAN-REQUEST oid as mailbox message dispatching.
  589. *
  590. * 06 23 2010 cp.wu
  591. * [WPD00003833][MT6620 and MT5931] Driver migration
  592. * integrate .
  593. *
  594. * 06 22 2010 cp.wu
  595. * [WPD00003833][MT6620 and MT5931] Driver migration
  596. * 1) add command warpper for STA-REC/BSS-INFO sync.
  597. * 2) enhance command packet sending procedure for non-oid part
  598. * 3) add command packet definitions for STA-REC/BSS-INFO sync.
  599. *
  600. * 06 21 2010 wh.su
  601. * [WPD00003840][MT6620 5931] Security migration
  602. * remove duplicate variable for migration.
  603. *
  604. * 06 21 2010 wh.su
  605. * [WPD00003840][MT6620 5931] Security migration
  606. * adding the compiling flag for oid pmkid.
  607. *
  608. * 06 21 2010 cp.wu
  609. * [WPD00003833][MT6620 and MT5931] Driver migration
  610. * enable RX management frame handling.
  611. *
  612. * 06 18 2010 wh.su
  613. * [WPD00003840][MT6620 5931] Security migration
  614. * migration the security related function from firmware.
  615. *
  616. * 06 11 2010 cp.wu
  617. * [WPD00003833][MT6620 and MT5931] Driver migration
  618. * 1) migrate assoc.c.
  619. * 2) add ucTxSeqNum for tracking frames which needs TX-DONE awareness
  620. * 3) add configuration options for CNM_MEM and RSN modules
  621. * 4) add data path for management frames
  622. * 5) eliminate rPacketInfo of MSDU_INFO_T
  623. *
  624. * 06 10 2010 cp.wu
  625. * [WPD00003833][MT6620 and MT5931] Driver migration
  626. * 1) eliminate CFG_CMD_EVENT_VERSION_0_9
  627. * 2) when disconnected, indicate nic directly (no event is needed)
  628. *
  629. * 06 07 2010 cp.wu
  630. * [WPD00003833][MT6620 and MT5931] Driver migration
  631. * merge wlan_def.h.
  632. *
  633. * 06 07 2010 cp.wu
  634. * [WPD00003833][MT6620 and MT5931] Driver migration
  635. * merge wifi_var.h, precomp.h, cnm_timer.h (data type only)
  636. *
  637. * 06 06 2010 kevin.huang
  638. * [WPD00003832][MT6620 5931] Create driver base
  639. * [MT6620 5931] Create driver base
  640. *
  641. * 06 03 2010 cp.wu
  642. * [WPD00001943]Create WiFi test driver framework on WinXP
  643. * move timer callback to glue layer.
  644. *
  645. * 05 28 2010 cp.wu
  646. * [WPD00001943]Create WiFi test driver framework on WinXP
  647. * simplify cmd packet sending for RF test and MCR access OIDs
  648. *
  649. * 05 27 2010 cp.wu
  650. * [WPD00001943]Create WiFi test driver framework on WinXP
  651. * disable radio even when STA is not associated.
  652. *
  653. * 05 27 2010 cp.wu
  654. * [WPD00001943]Create WiFi test driver framework on WinXP
  655. * correct 2 OID behaviour to meet WHQL requirement.
  656. *
  657. * 05 26 2010 jeffrey.chang
  658. * [WPD00003826]Initial import for Linux port
  659. * 1) Modify set mac address code
  660. * 2) remove power management macro
  661. *
  662. * 05 25 2010 cp.wu
  663. * [WPD00001943]Create WiFi test driver framework on WinXP
  664. * correct BSSID_LIST oid when radio if turned off.
  665. *
  666. * 05 24 2010 cp.wu
  667. * [WPD00001943]Create WiFi test driver framework on WinXP
  668. * 1) when acquiring LP-own, write for clr-own with lower frequency compared to read poll
  669. * 2) correct address list parsing
  670. *
  671. * 05 24 2010 cp.wu
  672. * [WPD00001943]Create WiFi test driver framework on WinXP
  673. * disable wlanoidSetNetworkAddress() temporally.
  674. *
  675. * 05 22 2010 cp.wu
  676. * [WPD00001943]Create WiFi test driver framework on WinXP
  677. * some OIDs should be DRIVER_CORE instead of GLUE_EXTENSION
  678. *
  679. * 05 22 2010 cp.wu
  680. * [WPD00001943]Create WiFi test driver framework on WinXP
  681. * 1) disable NETWORK_LAYER_ADDRESSES handling temporally.
  682. * 2) finish statistics OIDs
  683. *
  684. * 05 22 2010 cp.wu
  685. * [WPD00001943]Create WiFi test driver framework on WinXP
  686. * change OID behavior to meet WHQL requirement.
  687. *
  688. * 05 20 2010 cp.wu
  689. * [WPD00001943]Create WiFi test driver framework on WinXP
  690. * 1) integrate OID_GEN_NETWORK_LAYER_ADDRESSES with CMD_ID_SET_IP_ADDRESS
  691. * 2) buffer statistics data for 2 seconds
  692. * 3) use default value for adhoc parameters instead of 0
  693. *
  694. * 05 19 2010 cp.wu
  695. * [WPD00001943]Create WiFi test driver framework on WinXP
  696. * 1) do not take timeout mechanism for power mode oids
  697. * 2) retrieve network type from connection status
  698. * 3) after disassciation, set radio state to off
  699. * 4) TCP option over IPv6 is supported
  700. *
  701. * 05 18 2010 cp.wu
  702. * [WPD00001943]Create WiFi test driver framework on WinXP
  703. * implement Wakeup-on-LAN except firmware integration part
  704. *
  705. * 05 17 2010 cp.wu
  706. * [WPD00001943]Create WiFi test driver framework on WinXP
  707. * correct wlanoidSet802dot11PowerSaveProfile implementation.
  708. *
  709. * 05 17 2010 cp.wu
  710. * [WPD00001943]Create WiFi test driver framework on WinXP
  711. * 1) enable CMD/EVENT ver 0.9 definition.
  712. * 2) abandon use of ENUM_MEDIA_STATE
  713. *
  714. * 05 17 2010 cp.wu
  715. * [WPD00001943]Create WiFi test driver framework on WinXP
  716. * correct OID_802_11_DISASSOCIATE handling.
  717. *
  718. * 05 17 2010 cp.wu
  719. * [WPD00003831][MT6620 Wi-Fi] Add framework for Wi-Fi Direct support
  720. * 1) add timeout handler mechanism for pending command packets
  721. * 2) add p2p add/removal key
  722. *
  723. * 05 14 2010 jeffrey.chang
  724. * [WPD00003826]Initial import for Linux port
  725. * Add dissassocation support for wpa supplicant
  726. *
  727. * 05 14 2010 cp.wu
  728. * [WPD00001943]Create WiFi test driver framework on WinXP
  729. * correct return value.
  730. *
  731. * 05 13 2010 cp.wu
  732. * [WPD00001943]Create WiFi test driver framework on WinXP
  733. * add NULL OID implementation for WOL-related OIDs.
  734. *
  735. * 05 06 2010 cp.wu
  736. * [WPD00001943]Create WiFi test driver framework on WinXP
  737. * for disassociation, still use parameter with current setting.
  738. *
  739. * 05 06 2010 cp.wu
  740. * [WPD00001943]Create WiFi test driver framework on WinXP
  741. * for disassociation, generate a WZC-compatible invalid SSID.
  742. *
  743. * 05 06 2010 cp.wu
  744. * [WPD00001943]Create WiFi test driver framework on WinXP
  745. * associate to illegal SSID when handling OID_802_11_DISASSOCIATE
  746. *
  747. * 04 27 2010 cp.wu
  748. * [WPD00001943]Create WiFi test driver framework on WinXP
  749. * reserve field of privacy filter and RTS threshold setting.
  750. *
  751. * 04 23 2010 cp.wu
  752. * [WPD00001943]Create WiFi test driver framework on WinXP
  753. * surpress compiler warning
  754. *
  755. * 04 23 2010 cp.wu
  756. * [WPD00001943]Create WiFi test driver framework on WinXP
  757. * .
  758. *
  759. * 04 22 2010 cp.wu
  760. * [WPD00003830]add OID_802_11_PRIVACY_FILTER support
  761. * enable RX filter OID
  762. *
  763. * 04 19 2010 jeffrey.chang
  764. * [WPD00003826]Initial import for Linux port
  765. * Add ioctl of power management
  766. *
  767. * 04 14 2010 cp.wu
  768. * [WPD00001943]Create WiFi test driver framework on WinXP
  769. * information buffer for query oid/ioctl is now buffered in prCmdInfo
  770. * * instead of glue-layer variable to improve multiple oid/ioctl capability
  771. *
  772. * 04 13 2010 cp.wu
  773. * [WPD00003823][MT6620 Wi-Fi] Add Bluetooth-over-Wi-Fi support
  774. * add framework for BT-over-Wi-Fi support.
  775. * * * * 1) prPendingCmdInfo is replaced by queue for multiple handler capability
  776. * * * * 2) command sequence number is now increased atomically
  777. * * * * 3) private data could be hold and taken use for other purpose
  778. *
  779. * 04 12 2010 cp.wu
  780. * [WPD00001943]Create WiFi test driver framework on WinXP
  781. * correct OID_802_11_CONFIGURATION query for infrastructure mode.
  782. *
  783. * 04 09 2010 jeffrey.chang
  784. * [WPD00003826]Initial import for Linux port
  785. * 1) remove unused spin lock declaration
  786. *
  787. * 04 07 2010 cp.wu
  788. * [WPD00001943]Create WiFi test driver framework on WinXP
  789. * finish non-glue layer access to glue variables
  790. *
  791. * 04 07 2010 cp.wu
  792. * [WPD00001943]Create WiFi test driver framework on WinXP
  793. * rWlanInfo should be placed at adapter rather than glue due to most operations
  794. * * are done in adapter layer.
  795. *
  796. * 04 07 2010 jeffrey.chang
  797. * [WPD00003826]Initial import for Linux port
  798. * (1)improve none-glue code portability
  799. * (2) disable set Multicast address during atomic context
  800. *
  801. * 04 07 2010 cp.wu
  802. * [WPD00001943]Create WiFi test driver framework on WinXP
  803. * eliminate direct access to prGlueInfo->eParamMediaStateIndicated from non-glue layer
  804. *
  805. * 04 06 2010 cp.wu
  806. * [WPD00001943]Create WiFi test driver framework on WinXP
  807. * ePowerCtrl is not necessary as a glue variable.
  808. *
  809. * 04 06 2010 cp.wu
  810. * [WPD00001943]Create WiFi test driver framework on WinXP
  811. * eliminate direct access to prGlueInfo->rWlanInfo.eLinkAttr.ucMediaStreamMode from non-glue layer.
  812. *
  813. * 04 06 2010 jeffrey.chang
  814. * [WPD00003826]Initial import for Linux port
  815. * improve none-glue code portability
  816. *
  817. * 04 06 2010 cp.wu
  818. * [WPD00001943]Create WiFi test driver framework on WinXP
  819. * code refine: fgTestMode should be at adapter rather than glue due to the device/fw is also involved
  820. *
  821. * 04 01 2010 cp.wu
  822. * [WPD00001943]Create WiFi test driver framework on WinXP
  823. * .
  824. *
  825. * 03 31 2010 wh.su
  826. * [WPD00003816][MT6620 Wi-Fi] Adding the security support
  827. * modify the wapi related code for new driver's design.
  828. *
  829. * 03 30 2010 cp.wu
  830. * [WPD00001943]Create WiFi test driver framework on WinXP
  831. * statistics information OIDs are now handled by querying from firmware domain
  832. *
  833. * 03 28 2010 jeffrey.chang
  834. * [WPD00003826]Initial import for Linux port
  835. * improve glue code portability
  836. *
  837. * 03 26 2010 cp.wu
  838. * [WPD00001943]Create WiFi test driver framework on WinXP
  839. * indicate media stream mode after set is done
  840. *
  841. * 03 26 2010 cp.wu
  842. * [WPD00001943]Create WiFi test driver framework on WinXP
  843. * add a temporary flag for integration with CMD/EVENT v0.9.
  844. *
  845. * 03 25 2010 cp.wu
  846. * [WPD00001943]Create WiFi test driver framework on WinXP
  847. * 1) correct OID_802_11_CONFIGURATION with frequency setting behavior.
  848. * the frequency is used for adhoc connection only
  849. * 2) update with SD1 v0.9 CMD/EVENT documentation
  850. *
  851. * 03 24 2010 jeffrey.chang
  852. * [WPD00003826]Initial import for Linux port
  853. * [WPD00003826] Initial import for Linux port
  854. * initial import for Linux port
  855. *
  856. * 03 24 2010 jeffrey.chang
  857. * [WPD00003826]Initial import for Linux port
  858. * initial import for Linux port
  859. *
  860. * 03 24 2010 cp.wu
  861. * [WPD00001943]Create WiFi test driver framework on WinXP
  862. * generate information for OID_GEN_RCV_OK & OID_GEN_XMIT_OK
  863. *
  864. *
  865. * 03 22 2010 cp.wu
  866. * [WPD00003824][MT6620 Wi-Fi][New Feature] Add support of large scan list
  867. * Implement feature needed by CR: WPD00003824: refining association command by pasting scanning result
  868. *
  869. * 03 19 2010 wh.su
  870. * [WPD00003820][MT6620 Wi-Fi] Modify the code for meet the WHQL test
  871. * adding the check for pass WHQL test item.
  872. *
  873. * 03 19 2010 cp.wu
  874. * [WPD00001943]Create WiFi test driver framework on WinXP
  875. * 1) add ACPI D0/D3 state switching support
  876. * * 2) use more formal way to handle interrupt when the status is retrieved from enhanced RX response
  877. *
  878. * 03 16 2010 wh.su
  879. * [WPD00003820][MT6620 Wi-Fi] Modify the code for meet the WHQL test
  880. * fixed some whql pre-test fail case.
  881. *
  882. * 03 03 2010 cp.wu
  883. * [WPD00001943]Create WiFi test driver framework on WinXP
  884. * implement custom OID: EEPROM read/write access
  885. *
  886. * 03 03 2010 cp.wu
  887. * [WPD00001943]Create WiFi test driver framework on WinXP
  888. * implement OID_802_3_MULTICAST_LIST oid handling
  889. *
  890. * 03 02 2010 cp.wu
  891. * [WPD00001943]Create WiFi test driver framework on WinXP
  892. * 1) the use of prPendingOid revised, all accessing are now protected by spin lock
  893. * * 2) ensure wlanReleasePendingOid will clear all command queues
  894. *
  895. * 02 25 2010 cp.wu
  896. * [WPD00001943]Create WiFi test driver framework on WinXP
  897. * send CMD_ID_INFRASTRUCTURE when handling OID_802_11_INFRASTRUCTURE_MODE set.
  898. *
  899. * 02 24 2010 wh.su
  900. * [WPD00003820][MT6620 Wi-Fi] Modify the code for meet the WHQL test
  901. * Don't needed to check the auth mode, WHQL testing not specific at auth wpa2.
  902. *
  903. * 02 23 2010 cp.wu
  904. * [WPD00001943]Create WiFi test driver framework on WinXP
  905. * do not check SSID validity anymore.
  906. *
  907. * 02 23 2010 cp.wu
  908. * [WPD00001943]Create WiFi test driver framework on WinXP
  909. * add checksum offloading support.
  910. *
  911. * 02 09 2010 cp.wu
  912. * [WPD00001943]Create WiFi test driver framework on WinXP
  913. * 1. Permanent and current MAC address are now retrieved by CMD/EVENT packets instead of hard-coded address
  914. * * 2. follow MSDN defined behavior when associates to another AP
  915. * * 3. for firmware download, packet size could be up to 2048 bytes
  916. *
  917. * 02 09 2010 cp.wu
  918. * [WPD00001943]Create WiFi test driver framework on WinXP
  919. * move ucCmdSeqNum as instance variable
  920. *
  921. * 02 04 2010 cp.wu
  922. * [WPD00001943]Create WiFi test driver framework on WinXP
  923. * when OID_CUSTOM_OID_INTERFACE_VERSION is queried, do modify connection states
  924. *
  925. * 01 27 2010 cp.wu
  926. * [WPD00001943]Create WiFi test driver framework on WinXP
  927. * 1) implement timeout mechanism when OID is pending for longer than 1 second
  928. * * 2) allow OID_802_11_CONFIGURATION to be executed when RF test mode is turned on
  929. *
  930. * 01 27 2010 wh.su
  931. * [WPD00003816][MT6620 Wi-Fi] Adding the security support
  932. * .
  933. *
  934. * 01 27 2010 cp.wu
  935. * [WPD00001943]Create WiFi test driver framework on WinXP
  936. * 1. eliminate improper variable in rHifInfo
  937. * * 2. block TX/ordinary OID when RF test mode is engaged
  938. * * 3. wait until firmware finish operation when entering into and leaving from RF test mode
  939. * * 4. correct some HAL implementation
  940. *
  941. * 01 22 2010 cp.wu
  942. * [WPD00001943]Create WiFi test driver framework on WinXP
  943. * implement following 802.11 OIDs:
  944. * OID_802_11_RSSI,
  945. * OID_802_11_RSSI_TRIGGER,
  946. * OID_802_11_STATISTICS,
  947. * OID_802_11_DISASSOCIATE,
  948. * OID_802_11_POWER_MODE
  949. *
  950. * 01 21 2010 cp.wu
  951. * [WPD00001943]Create WiFi test driver framework on WinXP
  952. * implement OID_802_11_MEDIA_STREAM_MODE
  953. *
  954. * 01 21 2010 cp.wu
  955. * [WPD00001943]Create WiFi test driver framework on WinXP
  956. * implement OID_802_11_SUPPORTED_RATES / OID_802_11_DESIRED_RATES
  957. *
  958. * 01 21 2010 cp.wu
  959. * [WPD00001943]Create WiFi test driver framework on WinXP
  960. * do not fill ucJoinOnly currently
  961. *
  962. * 01 14 2010 cp.wu
  963. * [WPD00001943]Create WiFi test driver framework on WinXP
  964. * enable to connect to ad-hoc network
  965. *
  966. * 01 07 2010 cp.wu
  967. * [WPD00001943]Create WiFi test driver framework on WinXP
  968. * .implement Set/Query BeaconInterval/AtimWindow
  969. *
  970. * 01 07 2010 cp.wu
  971. * [WPD00001943]Create WiFi test driver framework on WinXP
  972. * .Set/Get AT Info is not blocked even when driver is not in fg test mode
  973. *
  974. * 12 30 2009 cp.wu
  975. * [WPD00001943]Create WiFi test driver framework on WinXP
  976. * 1) According to CMD/EVENT documentation v0.8,
  977. * OID_CUSTOM_TEST_RX_STATUS & OID_CUSTOM_TEST_TX_STATUS is no longer used,
  978. * and result is retrieved by get ATInfo instead
  979. * 2) add 4 counter for recording aggregation statistics
  980. *
  981. * 12 28 2009 cp.wu
  982. * [WPD00001943]Create WiFi test driver framework on WinXP
  983. * eliminate redundant variables for connection_state
  984. ** \main\maintrunk.MT6620WiFiDriver_Prj\32 2009-12-16 22:13:36 GMT mtk02752
  985. ** change hard-coded MAC address to match with FW (temporally)
  986. ** \main\maintrunk.MT6620WiFiDriver_Prj\31 2009-12-10 16:49:50 GMT mtk02752
  987. ** code clean
  988. ** \main\maintrunk.MT6620WiFiDriver_Prj\30 2009-12-08 17:38:49 GMT mtk02752
  989. ** + add OID for RF test
  990. ** * MCR RD/WR are modified to match with cmd/event definition
  991. ** \main\maintrunk.MT6620WiFiDriver_Prj\29 2009-12-08 11:32:20 GMT mtk02752
  992. ** add skeleton for RF test implementation
  993. ** \main\maintrunk.MT6620WiFiDriver_Prj\28 2009-12-03 16:43:24 GMT mtk01461
  994. ** Modify query SCAN list oid by adding prEventScanResult
  995. **
  996. ** \main\maintrunk.MT6620WiFiDriver_Prj\27 2009-12-03 16:39:27 GMT mtk01461
  997. ** Sync CMD data structure in set ssid oid
  998. ** \main\maintrunk.MT6620WiFiDriver_Prj\26 2009-12-03 16:28:22 GMT mtk01461
  999. ** Add invalid check of set SSID oid and fix query scan list oid
  1000. ** \main\maintrunk.MT6620WiFiDriver_Prj\25 2009-11-30 17:33:08 GMT mtk02752
  1001. ** implement wlanoidSetInfrastructureMode/wlanoidQueryInfrastructureMode
  1002. ** \main\maintrunk.MT6620WiFiDriver_Prj\24 2009-11-30 10:53:49 GMT mtk02752
  1003. ** 1st DW of WIFI_CMD_T is shared with HIF_TX_HEADER_T
  1004. ** \main\maintrunk.MT6620WiFiDriver_Prj\23 2009-11-30 09:22:48 GMT mtk02752
  1005. ** correct wifi cmd length mismatch
  1006. ** \main\maintrunk.MT6620WiFiDriver_Prj\22 2009-11-25 21:34:33 GMT mtk02752
  1007. ** sync EVENT_SCAN_RESULT_T with firmware
  1008. ** \main\maintrunk.MT6620WiFiDriver_Prj\21 2009-11-25 21:03:27 GMT mtk02752
  1009. ** implement wlanoidQueryBssidList()
  1010. ** \main\maintrunk.MT6620WiFiDriver_Prj\20 2009-11-25 18:17:17 GMT mtk02752
  1011. ** refine GL_WLAN_INFO_T for buffering scan result
  1012. ** \main\maintrunk.MT6620WiFiDriver_Prj\19 2009-11-23 20:28:51 GMT mtk02752
  1013. ** some OID will be set to WLAN_STATUS_PENDING until it is sent via wlanSendCommand()
  1014. ** \main\maintrunk.MT6620WiFiDriver_Prj\18 2009-11-23 17:56:36 GMT mtk02752
  1015. ** implement wlanoidSetBssidListScan(), wlanoidSetBssid() and wlanoidSetSsid()
  1016. **
  1017. ** \main\maintrunk.MT6620WiFiDriver_Prj\17 2009-11-13 17:20:53 GMT mtk02752
  1018. ** add Set BSSID/SSID path but disabled temporally due to FW is not ready yet
  1019. ** \main\maintrunk.MT6620WiFiDriver_Prj\16 2009-11-13 12:28:58 GMT mtk02752
  1020. ** add wlanoidSetBssidListScan -> cmd_info path
  1021. ** \main\maintrunk.MT6620WiFiDriver_Prj\15 2009-11-09 22:48:07 GMT mtk01084
  1022. ** modify test cases entry
  1023. ** \main\maintrunk.MT6620WiFiDriver_Prj\14 2009-11-04 14:10:58 GMT mtk01084
  1024. ** add new test interfaces
  1025. ** \main\maintrunk.MT6620WiFiDriver_Prj\13 2009-10-30 18:17:10 GMT mtk01084
  1026. ** fix compiler warning
  1027. ** \main\maintrunk.MT6620WiFiDriver_Prj\12 2009-10-29 19:46:26 GMT mtk01084
  1028. ** add test functions
  1029. ** \main\maintrunk.MT6620WiFiDriver_Prj\11 2009-10-23 16:07:56 GMT mtk01084
  1030. ** include new file
  1031. ** \main\maintrunk.MT6620WiFiDriver_Prj\10 2009-10-13 21:58:29 GMT mtk01084
  1032. ** modify for new HW architecture
  1033. ** \main\maintrunk.MT6620WiFiDriver_Prj\9 2009-10-02 13:48:49 GMT mtk01725
  1034. ** \main\maintrunk.MT6620WiFiDriver_Prj\8 2009-09-09 17:26:04 GMT mtk01084
  1035. ** \main\maintrunk.MT6620WiFiDriver_Prj\7 2009-04-21 12:09:50 GMT mtk01461
  1036. ** Update for MCR Write OID
  1037. ** \main\maintrunk.MT6620WiFiDriver_Prj\6 2009-04-21 09:35:18 GMT mtk01461
  1038. ** Update wlanoidQueryMcrRead() for composing CMD_INFO_T
  1039. ** \main\maintrunk.MT6620WiFiDriver_Prj\5 2009-04-17 18:09:51 GMT mtk01426
  1040. ** Remove kalIndicateStatusAndComplete() in wlanoidQueryOidInterfaceVersion()
  1041. ** \main\maintrunk.MT6620WiFiDriver_Prj\4 2009-04-14 15:51:50 GMT mtk01426
  1042. ** Add MCR read/write support
  1043. ** \main\maintrunk.MT6620WiFiDriver_Prj\3 2009-03-19 18:32:40 GMT mtk01084
  1044. ** update for basic power management functions
  1045. ** \main\maintrunk.MT6620WiFiDriver_Prj\2 2009-03-10 20:06:31 GMT mtk01426
  1046. ** Init for develop
  1047. **
  1048. */
  1049. /******************************************************************************
  1050. * C O M P I L E R F L A G S
  1051. *******************************************************************************
  1052. */
  1053. /******************************************************************************
  1054. * E X T E R N A L R E F E R E N C E S
  1055. *******************************************************************************
  1056. */
  1057. #include "precomp.h"
  1058. #include "mgmt/rsn.h"
  1059. #ifdef FW_CFG_SUPPORT
  1060. #include "fwcfg.h"
  1061. #endif
  1062. #include <stddef.h>
  1063. /******************************************************************************
  1064. * C O N S T A N T S
  1065. *******************************************************************************
  1066. */
  1067. /******************************************************************************
  1068. * D A T A T Y P E S
  1069. *******************************************************************************
  1070. */
  1071. /******************************************************************************
  1072. * P U B L I C D A T A
  1073. *******************************************************************************
  1074. */
  1075. /******************************************************************************
  1076. * P R I V A T E D A T A
  1077. *******************************************************************************
  1078. */
  1079. /******************************************************************************
  1080. * M A C R O S
  1081. *******************************************************************************
  1082. */
  1083. /******************************************************************************
  1084. * F U N C T I O N D E C L A R A T I O N S
  1085. *******************************************************************************
  1086. */
  1087. /******************************************************************************
  1088. * F U N C T I O N S
  1089. *******************************************************************************
  1090. */
  1091. #if CFG_ENABLE_STATISTICS_BUFFERING
  1092. static BOOLEAN IsBufferedStatisticsUsable(P_ADAPTER_T prAdapter)
  1093. {
  1094. ASSERT(prAdapter);
  1095. if (prAdapter->fgIsStatValid == TRUE &&
  1096. (kalGetTimeTick() - prAdapter->rStatUpdateTime) <= CFG_STATISTICS_VALID_CYCLE)
  1097. return TRUE;
  1098. else
  1099. return FALSE;
  1100. }
  1101. #endif
  1102. /*----------------------------------------------------------------------------*/
  1103. /*!
  1104. * \brief This routine is called to query the supported physical layer network
  1105. * type that can be used by the driver.
  1106. *
  1107. * \param[in] prAdapter Pointer to the Adapter structure.
  1108. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  1109. * the query.
  1110. * \param[in] u4QueryBufferLen The length of the query buffer.
  1111. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1112. * bytes written into the query buffer. If the call
  1113. * failed due to invalid length of the query buffer,
  1114. * returns the amount of storage needed.
  1115. *
  1116. * \retval WLAN_STATUS_SUCCESS
  1117. * \retval WLAN_STATUS_INVALID_LENGTH
  1118. */
  1119. /*----------------------------------------------------------------------------*/
  1120. WLAN_STATUS
  1121. wlanoidQueryNetworkTypesSupported(IN P_ADAPTER_T prAdapter,
  1122. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1123. {
  1124. UINT_32 u4NumItem = 0;
  1125. ENUM_PARAM_NETWORK_TYPE_T eSupportedNetworks[PARAM_NETWORK_TYPE_NUM];
  1126. PPARAM_NETWORK_TYPE_LIST prSupported;
  1127. /* The array of all physical layer network subtypes that the driver supports. */
  1128. DEBUGFUNC("wlanoidQueryNetworkTypesSupported");
  1129. ASSERT(prAdapter);
  1130. ASSERT(pu4QueryInfoLen);
  1131. if (u4QueryBufferLen)
  1132. ASSERT(pvQueryBuffer);
  1133. /* Init. */
  1134. for (u4NumItem = 0; u4NumItem < PARAM_NETWORK_TYPE_NUM; u4NumItem++)
  1135. eSupportedNetworks[u4NumItem] = 0;
  1136. u4NumItem = 0;
  1137. eSupportedNetworks[u4NumItem] = PARAM_NETWORK_TYPE_DS;
  1138. u4NumItem++;
  1139. eSupportedNetworks[u4NumItem] = PARAM_NETWORK_TYPE_OFDM24;
  1140. u4NumItem++;
  1141. *pu4QueryInfoLen =
  1142. (UINT_32) OFFSET_OF(PARAM_NETWORK_TYPE_LIST, eNetworkType) +
  1143. (u4NumItem * sizeof(ENUM_PARAM_NETWORK_TYPE_T));
  1144. if (u4QueryBufferLen < *pu4QueryInfoLen)
  1145. return WLAN_STATUS_INVALID_LENGTH;
  1146. prSupported = (PPARAM_NETWORK_TYPE_LIST) pvQueryBuffer;
  1147. prSupported->NumberOfItems = u4NumItem;
  1148. kalMemCopy(prSupported->eNetworkType, eSupportedNetworks, u4NumItem * sizeof(ENUM_PARAM_NETWORK_TYPE_T));
  1149. DBGLOG(OID, TRACE, "NDIS supported network type list: %u\n", prSupported->NumberOfItems);
  1150. DBGLOG_MEM8(OID, TRACE, prSupported, *pu4QueryInfoLen);
  1151. return WLAN_STATUS_SUCCESS;
  1152. } /* wlanoidQueryNetworkTypesSupported */
  1153. /*----------------------------------------------------------------------------*/
  1154. /*!
  1155. * \brief This routine is called to query the current physical layer network
  1156. * type used by the driver.
  1157. *
  1158. * \param[in] prAdapter Pointer to the Adapter structure.
  1159. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  1160. * the query.
  1161. * \param[in] u4QueryBufferLen The length of the query buffer.
  1162. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1163. * bytes written into the query buffer. If the
  1164. * call failed due to invalid length of the query
  1165. * buffer, returns the amount of storage needed.
  1166. *
  1167. * \retval WLAN_STATUS_SUCCESS
  1168. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  1169. */
  1170. /*----------------------------------------------------------------------------*/
  1171. WLAN_STATUS
  1172. wlanoidQueryNetworkTypeInUse(IN P_ADAPTER_T prAdapter,
  1173. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1174. {
  1175. /* TODO: need to check the OID handler content again!! */
  1176. ENUM_PARAM_NETWORK_TYPE_T rCurrentNetworkTypeInUse = PARAM_NETWORK_TYPE_OFDM24;
  1177. DEBUGFUNC("wlanoidQueryNetworkTypeInUse");
  1178. ASSERT(prAdapter);
  1179. ASSERT(pu4QueryInfoLen);
  1180. if (u4QueryBufferLen)
  1181. ASSERT(pvQueryBuffer);
  1182. if (u4QueryBufferLen < sizeof(ENUM_PARAM_NETWORK_TYPE_T)) {
  1183. *pu4QueryInfoLen = sizeof(ENUM_PARAM_NETWORK_TYPE_T);
  1184. return WLAN_STATUS_BUFFER_TOO_SHORT;
  1185. }
  1186. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED)
  1187. rCurrentNetworkTypeInUse = (ENUM_PARAM_NETWORK_TYPE_T) (prAdapter->rWlanInfo.ucNetworkType);
  1188. else
  1189. rCurrentNetworkTypeInUse = (ENUM_PARAM_NETWORK_TYPE_T) (prAdapter->rWlanInfo.ucNetworkTypeInUse);
  1190. *(P_ENUM_PARAM_NETWORK_TYPE_T) pvQueryBuffer = rCurrentNetworkTypeInUse;
  1191. *pu4QueryInfoLen = sizeof(ENUM_PARAM_NETWORK_TYPE_T);
  1192. DBGLOG(OID, TRACE, "Network type in use: %d\n", rCurrentNetworkTypeInUse);
  1193. return WLAN_STATUS_SUCCESS;
  1194. } /* wlanoidQueryNetworkTypeInUse */
  1195. /*----------------------------------------------------------------------------*/
  1196. /*!
  1197. * \brief This routine is called to set the physical layer network type used
  1198. * by the driver.
  1199. *
  1200. * \param[in] pvAdapter Pointer to the Adapter structure.
  1201. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  1202. * \param[in] u4SetBufferLen The length of the set buffer.
  1203. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  1204. * bytes read from the set buffer. If the call failed
  1205. * due to invalid length of the set buffer, returns the
  1206. * amount of storage needed.
  1207. *
  1208. * \retval WLAN_STATUS_SUCCESS The given network type is supported and accepted.
  1209. * \retval WLAN_STATUS_INVALID_DATA The given network type is not in the
  1210. * supported list.
  1211. */
  1212. /*----------------------------------------------------------------------------*/
  1213. WLAN_STATUS
  1214. wlanoidSetNetworkTypeInUse(IN P_ADAPTER_T prAdapter,
  1215. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1216. {
  1217. /* TODO: need to check the OID handler content again!! */
  1218. ENUM_PARAM_NETWORK_TYPE_T eNewNetworkType;
  1219. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  1220. DEBUGFUNC("wlanoidSetNetworkTypeInUse");
  1221. ASSERT(prAdapter);
  1222. ASSERT(pvSetBuffer);
  1223. ASSERT(pu4SetInfoLen);
  1224. if (u4SetBufferLen < sizeof(ENUM_PARAM_NETWORK_TYPE_T)) {
  1225. *pu4SetInfoLen = sizeof(ENUM_PARAM_NETWORK_TYPE_T);
  1226. return WLAN_STATUS_INVALID_LENGTH;
  1227. }
  1228. eNewNetworkType = *(P_ENUM_PARAM_NETWORK_TYPE_T) pvSetBuffer;
  1229. *pu4SetInfoLen = sizeof(ENUM_PARAM_NETWORK_TYPE_T);
  1230. DBGLOG(OID, INFO, "New network type: %d mode\n", eNewNetworkType);
  1231. switch (eNewNetworkType) {
  1232. case PARAM_NETWORK_TYPE_DS:
  1233. prAdapter->rWlanInfo.ucNetworkTypeInUse = (UINT_8) PARAM_NETWORK_TYPE_DS;
  1234. break;
  1235. case PARAM_NETWORK_TYPE_OFDM5:
  1236. prAdapter->rWlanInfo.ucNetworkTypeInUse = (UINT_8) PARAM_NETWORK_TYPE_OFDM5;
  1237. break;
  1238. case PARAM_NETWORK_TYPE_OFDM24:
  1239. prAdapter->rWlanInfo.ucNetworkTypeInUse = (UINT_8) PARAM_NETWORK_TYPE_OFDM24;
  1240. break;
  1241. case PARAM_NETWORK_TYPE_AUTOMODE:
  1242. prAdapter->rWlanInfo.ucNetworkTypeInUse = (UINT_8) PARAM_NETWORK_TYPE_AUTOMODE;
  1243. break;
  1244. case PARAM_NETWORK_TYPE_FH:
  1245. DBGLOG(OID, INFO, "Not support network type: %d\n", eNewNetworkType);
  1246. rStatus = WLAN_STATUS_NOT_SUPPORTED;
  1247. break;
  1248. default:
  1249. DBGLOG(OID, INFO, "Unknown network type: %d\n", eNewNetworkType);
  1250. rStatus = WLAN_STATUS_INVALID_DATA;
  1251. break;
  1252. }
  1253. /* Verify if we support the new network type. */
  1254. if (rStatus != WLAN_STATUS_SUCCESS)
  1255. DBGLOG(OID, WARN, "Unknown network type: %d\n", eNewNetworkType);
  1256. return rStatus;
  1257. } /* wlanoidSetNetworkTypeInUse */
  1258. /*----------------------------------------------------------------------------*/
  1259. /*!
  1260. * \brief This routine is called to query the current BSSID.
  1261. *
  1262. * \param[in] prAdapter Pointer to the Adapter structure.
  1263. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  1264. * the query.
  1265. * \param[in] u4QueryBufferLen The length of the query buffer.
  1266. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1267. * bytes written into the query buffer. If the call
  1268. * failed due to invalid length of the query buffer,
  1269. * returns the amount of storage needed.
  1270. *
  1271. * \retval WLAN_STATUS_SUCCESS
  1272. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1273. */
  1274. /*----------------------------------------------------------------------------*/
  1275. WLAN_STATUS
  1276. wlanoidQueryBssid(IN P_ADAPTER_T prAdapter,
  1277. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1278. {
  1279. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  1280. DEBUGFUNC("wlanoidQueryBssid");
  1281. ASSERT(prAdapter);
  1282. if (u4QueryBufferLen < MAC_ADDR_LEN) {
  1283. ASSERT(pu4QueryInfoLen);
  1284. *pu4QueryInfoLen = MAC_ADDR_LEN;
  1285. return WLAN_STATUS_BUFFER_TOO_SHORT;
  1286. }
  1287. ASSERT(u4QueryBufferLen >= MAC_ADDR_LEN);
  1288. if (u4QueryBufferLen)
  1289. ASSERT(pvQueryBuffer);
  1290. ASSERT(pu4QueryInfoLen);
  1291. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED)
  1292. kalMemCopy(pvQueryBuffer, prAdapter->rWlanInfo.rCurrBssId.arMacAddress, MAC_ADDR_LEN);
  1293. else if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_IBSS) {
  1294. PARAM_MAC_ADDRESS aucTemp; /*!< BSSID */
  1295. COPY_MAC_ADDR(aucTemp, prAdapter->rWlanInfo.rCurrBssId.arMacAddress);
  1296. aucTemp[0] &= ~BIT(0);
  1297. aucTemp[1] |= BIT(1);
  1298. COPY_MAC_ADDR(pvQueryBuffer, aucTemp);
  1299. } else
  1300. rStatus = WLAN_STATUS_ADAPTER_NOT_READY;
  1301. *pu4QueryInfoLen = MAC_ADDR_LEN;
  1302. return rStatus;
  1303. } /* wlanoidQueryBssid */
  1304. /*----------------------------------------------------------------------------*/
  1305. /*!
  1306. * \brief This routine is called to query the list of all BSSIDs detected by
  1307. * the driver.
  1308. *
  1309. * \param[in] prAdapter Pointer to the Adapter structure.
  1310. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  1311. * the query.
  1312. * \param[in] u4QueryBufferLen The length of the query buffer.
  1313. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1314. * bytes written into the query buffer. If the call
  1315. * failed due to invalid length of the query buffer,
  1316. * returns the amount of storage needed.
  1317. *
  1318. * \retval WLAN_STATUS_SUCCESS
  1319. * \retval WLAN_STATUS_INVALID_LENGTH
  1320. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1321. */
  1322. /*----------------------------------------------------------------------------*/
  1323. WLAN_STATUS
  1324. wlanoidQueryBssidList(IN P_ADAPTER_T prAdapter,
  1325. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1326. {
  1327. P_GLUE_INFO_T prGlueInfo;
  1328. UINT_32 i, u4BssidListExLen;
  1329. P_PARAM_BSSID_LIST_EX_T prList;
  1330. P_PARAM_BSSID_EX_T prBssidEx;
  1331. PUINT_8 cp;
  1332. DEBUGFUNC("wlanoidQueryBssidList");
  1333. ASSERT(prAdapter);
  1334. ASSERT(pu4QueryInfoLen);
  1335. if (u4QueryBufferLen) {
  1336. ASSERT(pvQueryBuffer);
  1337. if (!pvQueryBuffer)
  1338. return WLAN_STATUS_INVALID_DATA;
  1339. }
  1340. prGlueInfo = prAdapter->prGlueInfo;
  1341. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1342. DBGLOG(OID, WARN, "Fail in qeury BSSID list! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1343. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1344. return WLAN_STATUS_ADAPTER_NOT_READY;
  1345. }
  1346. u4BssidListExLen = 0;
  1347. if (prAdapter->fgIsRadioOff == FALSE) {
  1348. for (i = 0; i < prAdapter->rWlanInfo.u4ScanResultNum; i++)
  1349. u4BssidListExLen += ALIGN_4(prAdapter->rWlanInfo.arScanResult[i].u4Length);
  1350. }
  1351. if (u4BssidListExLen)
  1352. u4BssidListExLen += 4; /* u4NumberOfItems. */
  1353. else
  1354. u4BssidListExLen = sizeof(PARAM_BSSID_LIST_EX_T);
  1355. *pu4QueryInfoLen = u4BssidListExLen;
  1356. if (u4QueryBufferLen < *pu4QueryInfoLen)
  1357. return WLAN_STATUS_INVALID_LENGTH;
  1358. /* Clear the buffer */
  1359. kalMemZero(pvQueryBuffer, u4BssidListExLen);
  1360. prList = (P_PARAM_BSSID_LIST_EX_T) pvQueryBuffer;
  1361. cp = (PUINT_8) &prList->arBssid[0];
  1362. if (prAdapter->fgIsRadioOff == FALSE && prAdapter->rWlanInfo.u4ScanResultNum > 0) {
  1363. /* fill up for each entry */
  1364. for (i = 0; i < prAdapter->rWlanInfo.u4ScanResultNum; i++) {
  1365. prBssidEx = (P_PARAM_BSSID_EX_T) cp;
  1366. /* copy structure */
  1367. kalMemCopy(prBssidEx,
  1368. &(prAdapter->rWlanInfo.arScanResult[i]), OFFSET_OF(PARAM_BSSID_EX_T, aucIEs));
  1369. /*For WHQL test, Rssi should be in range -10 ~ -200 dBm */
  1370. if (prBssidEx->rRssi > PARAM_WHQL_RSSI_MAX_DBM)
  1371. prBssidEx->rRssi = PARAM_WHQL_RSSI_MAX_DBM;
  1372. if (prAdapter->rWlanInfo.arScanResult[i].u4IELength > 0) {
  1373. /* copy IEs */
  1374. kalMemCopy(prBssidEx->aucIEs,
  1375. prAdapter->rWlanInfo.apucScanResultIEs[i],
  1376. prAdapter->rWlanInfo.arScanResult[i].u4IELength);
  1377. }
  1378. /* 4-bytes alignement */
  1379. prBssidEx->u4Length = ALIGN_4(prBssidEx->u4Length);
  1380. cp += prBssidEx->u4Length;
  1381. prList->u4NumberOfItems++;
  1382. }
  1383. }
  1384. return WLAN_STATUS_SUCCESS;
  1385. } /* wlanoidQueryBssidList */
  1386. /*----------------------------------------------------------------------------*/
  1387. /*!
  1388. * \brief This routine is called to request the driver to perform
  1389. * scanning.
  1390. *
  1391. * \param[in] prAdapter Pointer to the Adapter structure.
  1392. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  1393. * \param[in] u4SetBufferLen The length of the set buffer.
  1394. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  1395. * bytes read from the set buffer. If the call failed
  1396. * due to invalid length of the set buffer, returns
  1397. * the amount of storage needed.
  1398. *
  1399. * \retval WLAN_STATUS_SUCCESS
  1400. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1401. * \retval WLAN_STATUS_FAILURE
  1402. */
  1403. /*----------------------------------------------------------------------------*/
  1404. WLAN_STATUS
  1405. wlanoidSetBssidListScan(IN P_ADAPTER_T prAdapter,
  1406. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1407. {
  1408. P_PARAM_SSID_T prSsid;
  1409. PARAM_SSID_T rSsid;
  1410. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  1411. DEBUGFUNC("wlanoidSetBssidListScan()");
  1412. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1413. DBGLOG(OID, WARN, "Fail in set BSSID list scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1414. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1415. return WLAN_STATUS_ADAPTER_NOT_READY;
  1416. }
  1417. ASSERT(pu4SetInfoLen);
  1418. *pu4SetInfoLen = 0;
  1419. if (prAdapter->fgIsRadioOff) {
  1420. DBGLOG(OID, WARN, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  1421. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1422. return WLAN_STATUS_SUCCESS;
  1423. }
  1424. DBGLOG(OID, TRACE, "Scan\n");
  1425. if (pvSetBuffer != NULL && u4SetBufferLen != 0) {
  1426. COPY_SSID(rSsid.aucSsid, rSsid.u4SsidLen, pvSetBuffer, u4SetBufferLen);
  1427. prSsid = &rSsid;
  1428. } else {
  1429. prSsid = NULL;
  1430. }
  1431. #if CFG_SUPPORT_RDD_TEST_MODE
  1432. if (prAdapter->prGlueInfo->rRegInfo.u4RddTestMode) {
  1433. if ((prAdapter->fgEnOnlineScan == TRUE) && (prAdapter->ucRddStatus)) {
  1434. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) != PARAM_MEDIA_STATE_CONNECTED) {
  1435. aisFsmScanRequest(prAdapter, prSsid, NULL, 0);
  1436. } else {
  1437. /* reject the scan request */
  1438. rStatus = WLAN_STATUS_FAILURE;
  1439. }
  1440. } else {
  1441. /* reject the scan request */
  1442. rStatus = WLAN_STATUS_FAILURE;
  1443. }
  1444. } else
  1445. #endif
  1446. {
  1447. if (prAdapter->fgEnOnlineScan == TRUE) {
  1448. aisFsmScanRequest(prAdapter, prSsid, NULL, 0);
  1449. } else if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) != PARAM_MEDIA_STATE_CONNECTED) {
  1450. aisFsmScanRequest(prAdapter, prSsid, NULL, 0);
  1451. } else {
  1452. /* reject the scan request */
  1453. rStatus = WLAN_STATUS_FAILURE;
  1454. }
  1455. }
  1456. return rStatus;
  1457. } /* wlanoidSetBssidListScan */
  1458. /*----------------------------------------------------------------------------*/
  1459. /*!
  1460. * \brief This routine is called to request the driver to perform
  1461. * scanning with attaching information elements(IEs) specified from user space
  1462. *
  1463. * \param[in] prAdapter Pointer to the Adapter structure.
  1464. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  1465. * \param[in] u4SetBufferLen The length of the set buffer.
  1466. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  1467. * bytes read from the set buffer. If the call failed
  1468. * due to invalid length of the set buffer, returns
  1469. * the amount of storage needed.
  1470. *
  1471. * \retval WLAN_STATUS_SUCCESS
  1472. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1473. * \retval WLAN_STATUS_FAILURE
  1474. */
  1475. /*----------------------------------------------------------------------------*/
  1476. WLAN_STATUS
  1477. wlanoidSetBssidListScanExt(IN P_ADAPTER_T prAdapter,
  1478. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1479. {
  1480. P_PARAM_SCAN_REQUEST_EXT_T prScanRequest;
  1481. P_AIS_FSM_INFO_T prAisFsmInfo;
  1482. P_PARAM_SSID_T prSsid;
  1483. PUINT_8 pucIe;
  1484. UINT_32 u4IeLength;
  1485. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  1486. UINT_8 ucScanTime = AIS_SCN_DONE_TIMEOUT_SEC;
  1487. DEBUGFUNC("wlanoidSetBssidListScanExt()");
  1488. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1489. DBGLOG(OID, ERROR, "Fail in set BSSID list scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1490. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1491. return WLAN_STATUS_ADAPTER_NOT_READY;
  1492. }
  1493. ASSERT(pu4SetInfoLen);
  1494. *pu4SetInfoLen = 0;
  1495. if (u4SetBufferLen != sizeof(PARAM_SCAN_REQUEST_EXT_T)) {
  1496. DBGLOG(OID, ERROR, "u4SetBufferLen != sizeof(PARAM_SCAN_REQUEST_EXT_T)\n");
  1497. return WLAN_STATUS_INVALID_LENGTH;
  1498. }
  1499. if (prAdapter->fgIsRadioOff) {
  1500. DBGLOG(OID, INFO, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  1501. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1502. return WLAN_STATUS_SUCCESS;
  1503. }
  1504. DBGLOG(OID, TRACE, "ScanEx\n");
  1505. /* clear old scan backup results if exists */
  1506. {
  1507. P_SCAN_INFO_T prScanInfo;
  1508. P_LINK_T prBSSDescList;
  1509. P_BSS_DESC_T prBssDesc;
  1510. prScanInfo = &(prAdapter->rWifiVar.rScanInfo);
  1511. prBSSDescList = &prScanInfo->rBSSDescList;
  1512. LINK_FOR_EACH_ENTRY(prBssDesc, prBSSDescList, rLinkEntry, BSS_DESC_T) {
  1513. if (prBssDesc->eBSSType == BSS_TYPE_INFRASTRUCTURE) {
  1514. kalMemZero(prBssDesc->aucRawBuf, CFG_RAW_BUFFER_SIZE);
  1515. prBssDesc->u2RawLength = 0;
  1516. }
  1517. }
  1518. }
  1519. if (pvSetBuffer != NULL && u4SetBufferLen != 0) {
  1520. prScanRequest = (P_PARAM_SCAN_REQUEST_EXT_T) pvSetBuffer;
  1521. prSsid = &(prScanRequest->rSsid);
  1522. pucIe = prScanRequest->pucIE;
  1523. u4IeLength = prScanRequest->u4IELength;
  1524. } else {
  1525. prScanRequest = NULL;
  1526. prSsid = NULL;
  1527. pucIe = NULL;
  1528. u4IeLength = 0;
  1529. }
  1530. /* P_AIS_FSM_INFO_T prAisFsmInfo; */
  1531. prAisFsmInfo = &(prAdapter->rWifiVar.rAisFsmInfo);
  1532. /* #if CFG_SUPPORT_WFD */
  1533. #if 0
  1534. if ((prAdapter->rWifiVar.prP2pFsmInfo->rWfdConfigureSettings.ucWfdEnable) &&
  1535. ((prAdapter->rWifiVar.prP2pFsmInfo->rWfdConfigureSettings.u4WfdFlag & WFD_FLAGS_DEV_INFO_VALID))) {
  1536. if (prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX].eConnectionState ==
  1537. PARAM_MEDIA_STATE_CONNECTED) {
  1538. DBGLOG(OID, TRACE, "Twice the Scan Time for WFD\n");
  1539. ucScanTime *= 2;
  1540. }
  1541. }
  1542. #endif /* CFG_SUPPORT_WFD */
  1543. cnmTimerStartTimer(prAdapter, &prAisFsmInfo->rScanDoneTimer, SEC_TO_MSEC(ucScanTime));
  1544. #if CFG_SUPPORT_RDD_TEST_MODE
  1545. if (prAdapter->prGlueInfo->rRegInfo.u4RddTestMode) {
  1546. if ((prAdapter->fgEnOnlineScan == TRUE) && (prAdapter->ucRddStatus)) {
  1547. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) != PARAM_MEDIA_STATE_CONNECTED) {
  1548. aisFsmScanRequest(prAdapter, prSsid, pucIe, u4IeLength);
  1549. } else {
  1550. /* reject the scan request */
  1551. cnmTimerStopTimer(prAdapter, &prAisFsmInfo->rScanDoneTimer);
  1552. rStatus = WLAN_STATUS_FAILURE;
  1553. }
  1554. } else {
  1555. /* reject the scan request */
  1556. cnmTimerStopTimer(prAdapter, &prAisFsmInfo->rScanDoneTimer);
  1557. rStatus = WLAN_STATUS_FAILURE;
  1558. }
  1559. } else
  1560. #endif
  1561. {
  1562. if (prAdapter->fgEnOnlineScan == TRUE) {
  1563. aisFsmScanRequest(prAdapter, prSsid, pucIe, u4IeLength);
  1564. } else if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) != PARAM_MEDIA_STATE_CONNECTED) {
  1565. aisFsmScanRequest(prAdapter, prSsid, pucIe, u4IeLength);
  1566. } else {
  1567. /* reject the scan request */
  1568. cnmTimerStopTimer(prAdapter, &prAisFsmInfo->rScanDoneTimer);
  1569. rStatus = WLAN_STATUS_FAILURE;
  1570. DBGLOG(OID, WARN, "ScanEx fail %d!\n", prAdapter->fgEnOnlineScan);
  1571. }
  1572. }
  1573. return rStatus;
  1574. } /* wlanoidSetBssidListScanWithIE */
  1575. /*----------------------------------------------------------------------------*/
  1576. /*!
  1577. * \brief This routine will initiate the join procedure to attempt to associate
  1578. * with the specified BSSID.
  1579. *
  1580. * \param[in] pvAdapter Pointer to the Adapter structure.
  1581. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  1582. * \param[in] u4SetBufferLen The length of the set buffer.
  1583. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  1584. * bytes read from the set buffer. If the call failed
  1585. * due to invalid length of the set buffer, returns
  1586. * the amount of storage needed.
  1587. *
  1588. * \retval WLAN_STATUS_SUCCESS
  1589. * \retval WLAN_STATUS_INVALID_LENGTH
  1590. * \retval WLAN_STATUS_INVALID_DATA
  1591. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1592. */
  1593. /*----------------------------------------------------------------------------*/
  1594. WLAN_STATUS
  1595. wlanoidSetBssid(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1596. {
  1597. P_GLUE_INFO_T prGlueInfo;
  1598. P_UINT_8 pAddr;
  1599. UINT_32 i;
  1600. INT_32 i4Idx = -1;
  1601. P_MSG_AIS_ABORT_T prAisAbortMsg;
  1602. UINT_8 ucReasonOfDisconnect;
  1603. ASSERT(prAdapter);
  1604. ASSERT(pu4SetInfoLen);
  1605. *pu4SetInfoLen = MAC_ADDR_LEN;
  1606. if (u4SetBufferLen != MAC_ADDR_LEN) {
  1607. *pu4SetInfoLen = MAC_ADDR_LEN;
  1608. return WLAN_STATUS_INVALID_LENGTH;
  1609. } else if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1610. DBGLOG(OID, WARN, "Fail in set ssid! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1611. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1612. return WLAN_STATUS_ADAPTER_NOT_READY;
  1613. }
  1614. prGlueInfo = prAdapter->prGlueInfo;
  1615. pAddr = (P_UINT_8) pvSetBuffer;
  1616. /* re-association check */
  1617. if (kalGetMediaStateIndicated(prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  1618. if (EQUAL_MAC_ADDR(prAdapter->rWlanInfo.rCurrBssId.arMacAddress, pAddr)) {
  1619. kalSetMediaStateIndicated(prGlueInfo, PARAM_MEDIA_STATE_TO_BE_INDICATED);
  1620. ucReasonOfDisconnect = DISCONNECT_REASON_CODE_REASSOCIATION;
  1621. } else {
  1622. DBGLOG(OID, TRACE, "DisByBssid\n");
  1623. kalIndicateStatusAndComplete(prGlueInfo, WLAN_STATUS_MEDIA_DISCONNECT, NULL, 0);
  1624. ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  1625. }
  1626. } else {
  1627. ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  1628. }
  1629. /* check if any scanned result matchs with the BSSID */
  1630. for (i = 0; i < prAdapter->rWlanInfo.u4ScanResultNum; i++) {
  1631. if (EQUAL_MAC_ADDR(prAdapter->rWlanInfo.arScanResult[i].arMacAddress, pAddr)) {
  1632. i4Idx = (INT_32) i;
  1633. break;
  1634. }
  1635. }
  1636. /* prepare message to AIS */
  1637. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_IBSS
  1638. || prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_DEDICATED_IBSS) {
  1639. /* IBSS *//* beacon period */
  1640. prAdapter->rWifiVar.rConnSettings.u2BeaconPeriod = prAdapter->rWlanInfo.u2BeaconPeriod;
  1641. prAdapter->rWifiVar.rConnSettings.u2AtimWindow = prAdapter->rWlanInfo.u2AtimWindow;
  1642. }
  1643. /* Set Connection Request Issued Flag */
  1644. prAdapter->rWifiVar.rConnSettings.fgIsConnReqIssued = TRUE;
  1645. prAdapter->rWifiVar.rConnSettings.eConnectionPolicy = CONNECT_BY_BSSID;
  1646. /* Send AIS Abort Message */
  1647. prAisAbortMsg = (P_MSG_AIS_ABORT_T) cnmMemAlloc(prAdapter, RAM_TYPE_MSG, sizeof(MSG_AIS_ABORT_T));
  1648. if (!prAisAbortMsg) {
  1649. ASSERT(0);
  1650. return WLAN_STATUS_FAILURE;
  1651. }
  1652. prAisAbortMsg->rMsgHdr.eMsgId = MID_OID_AIS_FSM_JOIN_REQ;
  1653. prAisAbortMsg->ucReasonOfDisconnect = ucReasonOfDisconnect;
  1654. /* Update the information to CONNECTION_SETTINGS_T */
  1655. prAdapter->rWifiVar.rConnSettings.ucSSIDLen = 0;
  1656. prAdapter->rWifiVar.rConnSettings.aucSSID[0] = '\0';
  1657. COPY_MAC_ADDR(prAdapter->rWifiVar.rConnSettings.aucBSSID, pAddr);
  1658. if (EQUAL_MAC_ADDR(prAdapter->rWlanInfo.rCurrBssId.arMacAddress, pAddr))
  1659. prAisAbortMsg->fgDelayIndication = TRUE;
  1660. else
  1661. prAisAbortMsg->fgDelayIndication = FALSE;
  1662. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prAisAbortMsg, MSG_SEND_METHOD_BUF);
  1663. DBGLOG(OID, INFO, "SetBssid\n");
  1664. return WLAN_STATUS_SUCCESS;
  1665. } /* end of wlanoidSetBssid() */
  1666. WLAN_STATUS
  1667. wlanoidSetConnect(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1668. {
  1669. P_GLUE_INFO_T prGlueInfo;
  1670. P_PARAM_CONNECT_T pParamConn;
  1671. P_CONNECTION_SETTINGS_T prConnSettings;
  1672. UINT_32 i;
  1673. /*INT_32 i4Idx = -1, i4MaxRSSI = INT_MIN;*/
  1674. P_MSG_AIS_ABORT_T prAisAbortMsg;
  1675. BOOLEAN fgIsValidSsid = TRUE;
  1676. BOOLEAN fgEqualSsid = FALSE;
  1677. BOOLEAN fgEqualBssid = FALSE;
  1678. const UINT_8 aucZeroMacAddr[] = NULL_MAC_ADDR;
  1679. ASSERT(prAdapter);
  1680. ASSERT(pu4SetInfoLen);
  1681. /* MSDN:
  1682. * Powering on the radio if the radio is powered off through a setting of OID_802_11_DISASSOCIATE
  1683. */
  1684. if (prAdapter->fgIsRadioOff == TRUE)
  1685. prAdapter->fgIsRadioOff = FALSE;
  1686. if (u4SetBufferLen != sizeof(PARAM_CONNECT_T))
  1687. return WLAN_STATUS_INVALID_LENGTH;
  1688. else if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1689. DBGLOG(OID, WARN, "Fail in set ssid! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1690. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1691. return WLAN_STATUS_ADAPTER_NOT_READY;
  1692. }
  1693. prAisAbortMsg = (P_MSG_AIS_ABORT_T) cnmMemAlloc(prAdapter, RAM_TYPE_MSG, sizeof(MSG_AIS_ABORT_T));
  1694. if (!prAisAbortMsg) {
  1695. ASSERT(0);
  1696. return WLAN_STATUS_FAILURE;
  1697. }
  1698. prAisAbortMsg->rMsgHdr.eMsgId = MID_OID_AIS_FSM_JOIN_REQ;
  1699. pParamConn = (P_PARAM_CONNECT_T) pvSetBuffer;
  1700. prConnSettings = &prAdapter->rWifiVar.rConnSettings;
  1701. if (pParamConn->u4SsidLen > 32) {
  1702. cnmMemFree(prAdapter, prAisAbortMsg);
  1703. return WLAN_STATUS_INVALID_LENGTH;
  1704. } else if (!pParamConn->pucBssid && !pParamConn->pucSsid) {
  1705. cnmMemFree(prAdapter, prAisAbortMsg);
  1706. return WLAN_STATUS_INVALID_LENGTH;
  1707. }
  1708. prGlueInfo = prAdapter->prGlueInfo;
  1709. kalMemZero(prConnSettings->aucSSID, sizeof(prConnSettings->aucSSID));
  1710. kalMemZero(prConnSettings->aucBSSID, sizeof(prConnSettings->aucBSSID));
  1711. prConnSettings->eConnectionPolicy = CONNECT_BY_SSID_ANY;
  1712. prConnSettings->fgIsConnByBssidIssued = FALSE;
  1713. if (pParamConn->pucSsid) {
  1714. prConnSettings->eConnectionPolicy = CONNECT_BY_SSID_BEST_RSSI;
  1715. COPY_SSID(prConnSettings->aucSSID,
  1716. prConnSettings->ucSSIDLen, pParamConn->pucSsid, (UINT_8) pParamConn->u4SsidLen);
  1717. if (EQUAL_SSID(prAdapter->rWlanInfo.rCurrBssId.rSsid.aucSsid,
  1718. prAdapter->rWlanInfo.rCurrBssId.rSsid.u4SsidLen,
  1719. pParamConn->pucSsid, pParamConn->u4SsidLen))
  1720. fgEqualSsid = TRUE;
  1721. }
  1722. if (pParamConn->pucBssid) {
  1723. if (!EQUAL_MAC_ADDR(aucZeroMacAddr, pParamConn->pucBssid) && IS_UCAST_MAC_ADDR(pParamConn->pucBssid)) {
  1724. prConnSettings->eConnectionPolicy = CONNECT_BY_BSSID;
  1725. prConnSettings->fgIsConnByBssidIssued = TRUE;
  1726. COPY_MAC_ADDR(prConnSettings->aucBSSID, pParamConn->pucBssid);
  1727. if (EQUAL_MAC_ADDR(prAdapter->rWlanInfo.rCurrBssId.arMacAddress, pParamConn->pucBssid))
  1728. fgEqualBssid = TRUE;
  1729. } else
  1730. DBGLOG(OID, TRACE, "wrong bssid %pM to connect\n", pParamConn->pucBssid);
  1731. } else
  1732. DBGLOG(OID, TRACE, "No Bssid set\n");
  1733. prConnSettings->u4FreqInKHz = pParamConn->u4CenterFreq;
  1734. /* prepare for CMD_BUILD_CONNECTION & CMD_GET_CONNECTION_STATUS */
  1735. /* re-association check */
  1736. if (kalGetMediaStateIndicated(prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  1737. if (fgEqualSsid) {
  1738. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_ROAMING;
  1739. if (fgEqualBssid) {
  1740. kalSetMediaStateIndicated(prGlueInfo, PARAM_MEDIA_STATE_TO_BE_INDICATED);
  1741. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_REASSOCIATION;
  1742. }
  1743. } else {
  1744. DBGLOG(OID, TRACE, "DisBySsid\n");
  1745. kalIndicateStatusAndComplete(prGlueInfo, WLAN_STATUS_MEDIA_DISCONNECT, NULL, 0);
  1746. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  1747. }
  1748. } else
  1749. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  1750. #if 0
  1751. /* check if any scanned result matchs with the SSID */
  1752. for (i = 0; i < prAdapter->rWlanInfo.u4ScanResultNum; i++) {
  1753. PUINT_8 aucSsid = prAdapter->rWlanInfo.arScanResult[i].rSsid.aucSsid;
  1754. UINT_8 ucSsidLength = (UINT_8) prAdapter->rWlanInfo.arScanResult[i].rSsid.u4SsidLen;
  1755. INT_32 i4RSSI = prAdapter->rWlanInfo.arScanResult[i].rRssi;
  1756. if (EQUAL_SSID(aucSsid, ucSsidLength, pParamConn->pucSsid, pParamConn->u4SsidLen) &&
  1757. i4RSSI >= i4MaxRSSI) {
  1758. i4Idx = (INT_32) i;
  1759. i4MaxRSSI = i4RSSI;
  1760. }
  1761. if (EQUAL_MAC_ADDR(prAdapter->rWlanInfo.arScanResult[i].arMacAddress, pAddr)) {
  1762. i4Idx = (INT_32) i;
  1763. break;
  1764. }
  1765. }
  1766. #endif
  1767. /* prepare message to AIS */
  1768. if (prConnSettings->eOPMode == NET_TYPE_IBSS || prConnSettings->eOPMode == NET_TYPE_DEDICATED_IBSS) {
  1769. /* IBSS *//* beacon period */
  1770. prConnSettings->u2BeaconPeriod = prAdapter->rWlanInfo.u2BeaconPeriod;
  1771. prConnSettings->u2AtimWindow = prAdapter->rWlanInfo.u2AtimWindow;
  1772. }
  1773. if (prAdapter->rWifiVar.fgSupportWZCDisassociation) {
  1774. if (pParamConn->u4SsidLen == ELEM_MAX_LEN_SSID) {
  1775. fgIsValidSsid = FALSE;
  1776. for (i = 0; i < ELEM_MAX_LEN_SSID; i++) {
  1777. if (pParamConn->pucSsid) {
  1778. if (!((0 < pParamConn->pucSsid[i]) && (pParamConn->pucSsid[i] <= 0x1F))) {
  1779. fgIsValidSsid = TRUE;
  1780. break;
  1781. }
  1782. }
  1783. }
  1784. }
  1785. }
  1786. /* Set Connection Request Issued Flag */
  1787. if (fgIsValidSsid)
  1788. prConnSettings->fgIsConnReqIssued = TRUE;
  1789. else {
  1790. prConnSettings->eReConnectLevel = RECONNECT_LEVEL_USER_SET;
  1791. prConnSettings->fgIsConnReqIssued = FALSE;
  1792. }
  1793. if (fgEqualSsid || fgEqualBssid)
  1794. prAisAbortMsg->fgDelayIndication = TRUE;
  1795. else
  1796. /* Update the information to CONNECTION_SETTINGS_T */
  1797. prAisAbortMsg->fgDelayIndication = FALSE;
  1798. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prAisAbortMsg, MSG_SEND_METHOD_BUF);
  1799. DBGLOG(OID, INFO, "ssid %s, bssid %pM, conn policy %d, disc reason %d\n",
  1800. prConnSettings->aucSSID, prConnSettings->aucBSSID,
  1801. prConnSettings->eConnectionPolicy, prAisAbortMsg->ucReasonOfDisconnect);
  1802. return WLAN_STATUS_SUCCESS;
  1803. }
  1804. /*----------------------------------------------------------------------------*/
  1805. /*!
  1806. * \brief This routine will initiate the join procedure to attempt
  1807. * to associate with the new SSID. If the previous scanning
  1808. * result is aged, we will scan the channels at first.
  1809. *
  1810. * \param[in] prAdapter Pointer to the Adapter structure.
  1811. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  1812. * \param[in] u4SetBufferLen The length of the set buffer.
  1813. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  1814. * bytes read from the set buffer. If the call failed
  1815. * due to invalid length of the set buffer, returns
  1816. * the amount of storage needed.
  1817. *
  1818. * \retval WLAN_STATUS_SUCCESS
  1819. * \retval WLAN_STATUS_INVALID_DATA
  1820. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1821. * \retval WLAN_STATUS_INVALID_LENGTH
  1822. */
  1823. /*----------------------------------------------------------------------------*/
  1824. WLAN_STATUS
  1825. wlanoidSetSsid(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1826. {
  1827. P_GLUE_INFO_T prGlueInfo;
  1828. P_PARAM_SSID_T pParamSsid;
  1829. UINT_32 i;
  1830. INT_32 i4Idx = -1, i4MaxRSSI = INT_MIN;
  1831. P_MSG_AIS_ABORT_T prAisAbortMsg;
  1832. BOOLEAN fgIsValidSsid = TRUE;
  1833. ASSERT(prAdapter);
  1834. ASSERT(pu4SetInfoLen);
  1835. /* MSDN:
  1836. * Powering on the radio if the radio is powered off through a setting of OID_802_11_DISASSOCIATE
  1837. */
  1838. if (prAdapter->fgIsRadioOff == TRUE)
  1839. prAdapter->fgIsRadioOff = FALSE;
  1840. if (u4SetBufferLen < sizeof(PARAM_SSID_T) || u4SetBufferLen > sizeof(PARAM_SSID_T)) {
  1841. return WLAN_STATUS_INVALID_LENGTH;
  1842. } else if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1843. DBGLOG(OID, WARN, "Fail in set ssid! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1844. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1845. return WLAN_STATUS_ADAPTER_NOT_READY;
  1846. }
  1847. pParamSsid = (P_PARAM_SSID_T) pvSetBuffer;
  1848. if (pParamSsid->u4SsidLen > 32)
  1849. return WLAN_STATUS_INVALID_LENGTH;
  1850. prGlueInfo = prAdapter->prGlueInfo;
  1851. /* prepare for CMD_BUILD_CONNECTION & CMD_GET_CONNECTION_STATUS */
  1852. /* re-association check */
  1853. if (kalGetMediaStateIndicated(prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  1854. if (EQUAL_SSID(prAdapter->rWlanInfo.rCurrBssId.rSsid.aucSsid,
  1855. prAdapter->rWlanInfo.rCurrBssId.rSsid.u4SsidLen,
  1856. pParamSsid->aucSsid, pParamSsid->u4SsidLen)) {
  1857. kalSetMediaStateIndicated(prGlueInfo, PARAM_MEDIA_STATE_TO_BE_INDICATED);
  1858. } else {
  1859. DBGLOG(OID, TRACE, "DisBySsid\n");
  1860. kalIndicateStatusAndComplete(prGlueInfo, WLAN_STATUS_MEDIA_DISCONNECT, NULL, 0);
  1861. }
  1862. }
  1863. /* check if any scanned result matchs with the SSID */
  1864. for (i = 0; i < prAdapter->rWlanInfo.u4ScanResultNum; i++) {
  1865. PUINT_8 aucSsid = prAdapter->rWlanInfo.arScanResult[i].rSsid.aucSsid;
  1866. UINT_8 ucSsidLength = (UINT_8) prAdapter->rWlanInfo.arScanResult[i].rSsid.u4SsidLen;
  1867. INT_32 i4RSSI = prAdapter->rWlanInfo.arScanResult[i].rRssi;
  1868. if (EQUAL_SSID(aucSsid, ucSsidLength, pParamSsid->aucSsid, pParamSsid->u4SsidLen) &&
  1869. i4RSSI >= i4MaxRSSI) {
  1870. i4Idx = (INT_32) i;
  1871. i4MaxRSSI = i4RSSI;
  1872. }
  1873. }
  1874. /* prepare message to AIS */
  1875. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_IBSS
  1876. || prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_DEDICATED_IBSS) {
  1877. /* IBSS *//* beacon period */
  1878. prAdapter->rWifiVar.rConnSettings.u2BeaconPeriod = prAdapter->rWlanInfo.u2BeaconPeriod;
  1879. prAdapter->rWifiVar.rConnSettings.u2AtimWindow = prAdapter->rWlanInfo.u2AtimWindow;
  1880. }
  1881. if (prAdapter->rWifiVar.fgSupportWZCDisassociation) {
  1882. if (pParamSsid->u4SsidLen == ELEM_MAX_LEN_SSID) {
  1883. fgIsValidSsid = FALSE;
  1884. for (i = 0; i < ELEM_MAX_LEN_SSID; i++) {
  1885. if (!((0 < pParamSsid->aucSsid[i]) && (pParamSsid->aucSsid[i] <= 0x1F))) {
  1886. fgIsValidSsid = TRUE;
  1887. break;
  1888. }
  1889. }
  1890. }
  1891. }
  1892. /* Set Connection Request Issued Flag */
  1893. if (fgIsValidSsid) {
  1894. prAdapter->rWifiVar.rConnSettings.fgIsConnReqIssued = TRUE;
  1895. if (pParamSsid->u4SsidLen) {
  1896. prAdapter->rWifiVar.rConnSettings.eConnectionPolicy = CONNECT_BY_SSID_BEST_RSSI;
  1897. } else {
  1898. /* wildcard SSID */
  1899. prAdapter->rWifiVar.rConnSettings.eConnectionPolicy = CONNECT_BY_SSID_ANY;
  1900. }
  1901. } else {
  1902. prAdapter->rWifiVar.rConnSettings.fgIsConnReqIssued = FALSE;
  1903. }
  1904. /* Send AIS Abort Message */
  1905. prAisAbortMsg = (P_MSG_AIS_ABORT_T) cnmMemAlloc(prAdapter, RAM_TYPE_MSG, sizeof(MSG_AIS_ABORT_T));
  1906. if (!prAisAbortMsg) {
  1907. ASSERT(0);
  1908. return WLAN_STATUS_FAILURE;
  1909. }
  1910. prAisAbortMsg->rMsgHdr.eMsgId = MID_OID_AIS_FSM_JOIN_REQ;
  1911. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  1912. COPY_SSID(prAdapter->rWifiVar.rConnSettings.aucSSID,
  1913. prAdapter->rWifiVar.rConnSettings.ucSSIDLen, pParamSsid->aucSsid, (UINT_8) pParamSsid->u4SsidLen);
  1914. prAdapter->rWifiVar.rConnSettings.u4FreqInKHz = pParamSsid->u4CenterFreq;
  1915. if (EQUAL_SSID(prAdapter->rWlanInfo.rCurrBssId.rSsid.aucSsid,
  1916. prAdapter->rWlanInfo.rCurrBssId.rSsid.u4SsidLen, pParamSsid->aucSsid, pParamSsid->u4SsidLen)) {
  1917. prAisAbortMsg->fgDelayIndication = TRUE;
  1918. } else {
  1919. /* Update the information to CONNECTION_SETTINGS_T */
  1920. prAisAbortMsg->fgDelayIndication = FALSE;
  1921. }
  1922. DBGLOG(SCN, INFO, "SSID %s\n", prAdapter->rWifiVar.rConnSettings.aucSSID);
  1923. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prAisAbortMsg, MSG_SEND_METHOD_BUF);
  1924. return WLAN_STATUS_SUCCESS;
  1925. } /* end of wlanoidSetSsid() */
  1926. /*----------------------------------------------------------------------------*/
  1927. /*!
  1928. * \brief This routine is called to query the currently associated SSID.
  1929. *
  1930. * \param[in] prAdapter Pointer to the Adapter structure.
  1931. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  1932. * the query.
  1933. * \param[in] u4QueryBufferLen The length of the query buffer.
  1934. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1935. * bytes written into the query buffer. If the call
  1936. * failed due to invalid length of the query buffer,
  1937. * returns the amount of storage needed.
  1938. *
  1939. * \retval WLAN_STATUS_SUCCESS
  1940. * \retval WLAN_STATUS_INVALID_LENGTH
  1941. */
  1942. /*----------------------------------------------------------------------------*/
  1943. WLAN_STATUS
  1944. wlanoidQuerySsid(IN P_ADAPTER_T prAdapter,
  1945. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1946. {
  1947. P_PARAM_SSID_T prAssociatedSsid;
  1948. DEBUGFUNC("wlanoidQuerySsid");
  1949. ASSERT(prAdapter);
  1950. ASSERT(pu4QueryInfoLen);
  1951. if (u4QueryBufferLen)
  1952. ASSERT(pvQueryBuffer);
  1953. *pu4QueryInfoLen = sizeof(PARAM_SSID_T);
  1954. /* Check for query buffer length */
  1955. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  1956. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  1957. return WLAN_STATUS_INVALID_LENGTH;
  1958. }
  1959. prAssociatedSsid = (P_PARAM_SSID_T) pvQueryBuffer;
  1960. kalMemZero(prAssociatedSsid->aucSsid, sizeof(prAssociatedSsid->aucSsid));
  1961. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  1962. prAssociatedSsid->u4SsidLen = prAdapter->rWlanInfo.rCurrBssId.rSsid.u4SsidLen;
  1963. if (prAssociatedSsid->u4SsidLen) {
  1964. kalMemCopy(prAssociatedSsid->aucSsid,
  1965. prAdapter->rWlanInfo.rCurrBssId.rSsid.aucSsid, prAssociatedSsid->u4SsidLen);
  1966. }
  1967. } else {
  1968. prAssociatedSsid->u4SsidLen = 0;
  1969. DBGLOG(OID, TRACE, "Null SSID\n");
  1970. }
  1971. return WLAN_STATUS_SUCCESS;
  1972. } /* wlanoidQuerySsid */
  1973. /*----------------------------------------------------------------------------*/
  1974. /*!
  1975. * \brief This routine is called to query the current 802.11 network type.
  1976. *
  1977. * \param[in] prAdapter Pointer to the Adapter structure.
  1978. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  1979. * the query.
  1980. * \param[in] u4QueryBufferLen The length of the query buffer.
  1981. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1982. * bytes written into the query buffer. If the call
  1983. * failed due to invalid length of the query buffer,
  1984. * returns the amount of storage needed.
  1985. *
  1986. * \retval WLAN_STATUS_SUCCESS
  1987. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  1988. */
  1989. /*----------------------------------------------------------------------------*/
  1990. WLAN_STATUS
  1991. wlanoidQueryInfrastructureMode(IN P_ADAPTER_T prAdapter,
  1992. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1993. {
  1994. DEBUGFUNC("wlanoidQueryInfrastructureMode");
  1995. ASSERT(prAdapter);
  1996. ASSERT(pu4QueryInfoLen);
  1997. *pu4QueryInfoLen = sizeof(ENUM_PARAM_OP_MODE_T);
  1998. if (u4QueryBufferLen < sizeof(ENUM_PARAM_OP_MODE_T))
  1999. return WLAN_STATUS_BUFFER_TOO_SHORT;
  2000. if (u4QueryBufferLen)
  2001. ASSERT(pvQueryBuffer);
  2002. *(P_ENUM_PARAM_OP_MODE_T) pvQueryBuffer = prAdapter->rWifiVar.rConnSettings.eOPMode;
  2003. /*
  2004. ** According to OID_802_11_INFRASTRUCTURE_MODE
  2005. ** If there is no prior OID_802_11_INFRASTRUCTURE_MODE,
  2006. ** NDIS_STATUS_ADAPTER_NOT_READY shall be returned.
  2007. */
  2008. #if DBG
  2009. switch (*(P_ENUM_PARAM_OP_MODE_T) pvQueryBuffer) {
  2010. case NET_TYPE_IBSS:
  2011. DBGLOG(OID, INFO, "IBSS mode\n");
  2012. break;
  2013. case NET_TYPE_INFRA:
  2014. DBGLOG(OID, INFO, "Infrastructure mode\n");
  2015. break;
  2016. default:
  2017. DBGLOG(OID, INFO, "Automatic mode\n");
  2018. }
  2019. #endif
  2020. return WLAN_STATUS_SUCCESS;
  2021. } /* wlanoidQueryInfrastructureMode */
  2022. /*----------------------------------------------------------------------------*/
  2023. /*!
  2024. * \brief This routine is called to set mode to infrastructure or
  2025. * IBSS, or automatic switch between the two.
  2026. *
  2027. * \param[in] prAdapter Pointer to the Adapter structure.
  2028. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  2029. * \param[in] u4SetBufferLen The length of the set buffer.
  2030. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2031. * bytes read from the set buffer. If the call failed due to invalid
  2032. * length of the set buffer, returns the amount of storage needed.
  2033. *
  2034. * \retval WLAN_STATUS_SUCCESS
  2035. * \retval WLAN_STATUS_INVALID_DATA
  2036. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2037. * \retval WLAN_STATUS_INVALID_LENGTH
  2038. */
  2039. /*----------------------------------------------------------------------------*/
  2040. WLAN_STATUS
  2041. wlanoidSetInfrastructureMode(IN P_ADAPTER_T prAdapter,
  2042. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2043. {
  2044. P_GLUE_INFO_T prGlueInfo;
  2045. ENUM_PARAM_OP_MODE_T eOpMode;
  2046. DEBUGFUNC("wlanoidSetInfrastructureMode");
  2047. ASSERT(prAdapter);
  2048. ASSERT(pvSetBuffer);
  2049. ASSERT(pu4SetInfoLen);
  2050. prGlueInfo = prAdapter->prGlueInfo;
  2051. if (u4SetBufferLen < sizeof(ENUM_PARAM_OP_MODE_T))
  2052. return WLAN_STATUS_BUFFER_TOO_SHORT;
  2053. *pu4SetInfoLen = sizeof(ENUM_PARAM_OP_MODE_T);
  2054. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2055. DBGLOG(OID, WARN, "Fail in set infrastructure mode! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2056. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2057. return WLAN_STATUS_ADAPTER_NOT_READY;
  2058. }
  2059. eOpMode = *(P_ENUM_PARAM_OP_MODE_T) pvSetBuffer;
  2060. /* Verify the new infrastructure mode. */
  2061. if (eOpMode >= NET_TYPE_NUM) {
  2062. DBGLOG(OID, TRACE, "Invalid mode value %d\n", eOpMode);
  2063. return WLAN_STATUS_INVALID_DATA;
  2064. }
  2065. /* check if possible to switch to AdHoc mode */
  2066. if (eOpMode == NET_TYPE_IBSS || eOpMode == NET_TYPE_DEDICATED_IBSS) {
  2067. if (cnmAisIbssIsPermitted(prAdapter) == FALSE) {
  2068. DBGLOG(OID, TRACE, "Mode value %d unallowed\n", eOpMode);
  2069. return WLAN_STATUS_FAILURE;
  2070. }
  2071. }
  2072. /* Save the new infrastructure mode setting. */
  2073. prAdapter->rWifiVar.rConnSettings.eOPMode = eOpMode;
  2074. /* Clean up the Tx key flag */
  2075. prAdapter->rWifiVar.rAisSpecificBssInfo.fgTransmitKeyExist = FALSE;
  2076. prAdapter->rWifiVar.rConnSettings.fgWapiMode = FALSE;
  2077. #if CFG_SUPPORT_WAPI
  2078. prAdapter->prGlueInfo->u2WapiAssocInfoIESz = 0;
  2079. kalMemZero(&prAdapter->prGlueInfo->aucWapiAssocInfoIEs, 42);
  2080. #endif
  2081. #if CFG_SUPPORT_802_11W
  2082. prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = FALSE;
  2083. prAdapter->rWifiVar.rAisSpecificBssInfo.fgBipKeyInstalled = FALSE;
  2084. #endif
  2085. #if CFG_SUPPORT_WPS2
  2086. kalMemZero(&prAdapter->prGlueInfo->aucWSCAssocInfoIE, 200);
  2087. prAdapter->prGlueInfo->u2WSCAssocInfoIELen = 0;
  2088. #endif
  2089. return wlanSendSetQueryCmd(prAdapter,
  2090. CMD_ID_INFRASTRUCTURE,
  2091. TRUE,
  2092. FALSE,
  2093. TRUE,
  2094. nicCmdEventSetCommon, nicOidCmdTimeoutCommon, 0, NULL, pvSetBuffer, u4SetBufferLen);
  2095. } /* wlanoidSetInfrastructureMode */
  2096. /*----------------------------------------------------------------------------*/
  2097. /*!
  2098. * \brief This routine is called to query the current 802.11 authentication
  2099. * mode.
  2100. *
  2101. * \param[in] prAdapter Pointer to the Adapter structure.
  2102. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  2103. * the query.
  2104. * \param[in] u4QueryBufferLen The length of the query buffer.
  2105. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  2106. * bytes written into the query buffer. If the call
  2107. * failed due to invalid length of the query buffer,
  2108. * returns the amount of storage needed.
  2109. *
  2110. * \retval WLAN_STATUS_SUCCESS
  2111. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  2112. */
  2113. /*----------------------------------------------------------------------------*/
  2114. WLAN_STATUS
  2115. wlanoidQueryAuthMode(IN P_ADAPTER_T prAdapter,
  2116. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  2117. {
  2118. DEBUGFUNC("wlanoidQueryAuthMode");
  2119. ASSERT(prAdapter);
  2120. if (u4QueryBufferLen)
  2121. ASSERT(pvQueryBuffer);
  2122. ASSERT(pu4QueryInfoLen);
  2123. *pu4QueryInfoLen = sizeof(ENUM_PARAM_AUTH_MODE_T);
  2124. if (u4QueryBufferLen < sizeof(ENUM_PARAM_AUTH_MODE_T))
  2125. return WLAN_STATUS_BUFFER_TOO_SHORT;
  2126. *(P_ENUM_PARAM_AUTH_MODE_T) pvQueryBuffer = prAdapter->rWifiVar.rConnSettings.eAuthMode;
  2127. #if DBG
  2128. switch (*(P_ENUM_PARAM_AUTH_MODE_T) pvQueryBuffer) {
  2129. case AUTH_MODE_OPEN:
  2130. DBGLOG(OID, INFO, "Current auth mode: Open\n");
  2131. break;
  2132. case AUTH_MODE_SHARED:
  2133. DBGLOG(OID, INFO, "Current auth mode: Shared\n");
  2134. break;
  2135. case AUTH_MODE_AUTO_SWITCH:
  2136. DBGLOG(OID, INFO, "Current auth mode: Auto-switch\n");
  2137. break;
  2138. case AUTH_MODE_WPA:
  2139. DBGLOG(OID, INFO, "Current auth mode: WPA\n");
  2140. break;
  2141. case AUTH_MODE_WPA_PSK:
  2142. DBGLOG(OID, INFO, "Current auth mode: WPA PSK\n");
  2143. break;
  2144. case AUTH_MODE_WPA_NONE:
  2145. DBGLOG(OID, INFO, "Current auth mode: WPA None\n");
  2146. break;
  2147. case AUTH_MODE_WPA2:
  2148. DBGLOG(OID, INFO, "Current auth mode: WPA2\n");
  2149. break;
  2150. case AUTH_MODE_WPA2_PSK:
  2151. DBGLOG(OID, INFO, "Current auth mode: WPA2 PSK\n");
  2152. break;
  2153. default:
  2154. DBGLOG(OID, INFO, "Current auth mode: %d\n", *(P_ENUM_PARAM_AUTH_MODE_T) pvQueryBuffer);
  2155. break;
  2156. }
  2157. #endif
  2158. return WLAN_STATUS_SUCCESS;
  2159. } /* wlanoidQueryAuthMode */
  2160. /*----------------------------------------------------------------------------*/
  2161. /*!
  2162. * \brief This routine is called to set the IEEE 802.11 authentication mode
  2163. * to the driver.
  2164. *
  2165. * \param[in] prAdapter Pointer to the Adapter structure.
  2166. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2167. * \param[in] u4SetBufferLen The length of the set buffer.
  2168. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2169. * bytes read from the set buffer. If the call failed
  2170. * due to invalid length of the set buffer, returns
  2171. * the amount of storage needed.
  2172. *
  2173. * \retval WLAN_STATUS_SUCCESS
  2174. * \retval WLAN_STATUS_INVALID_DATA
  2175. * \retval WLAN_STATUS_INVALID_LENGTH
  2176. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2177. * \retval WLAN_STATUS_NOT_ACCEPTED
  2178. */
  2179. /*----------------------------------------------------------------------------*/
  2180. WLAN_STATUS
  2181. wlanoidSetAuthMode(IN P_ADAPTER_T prAdapter,
  2182. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2183. {
  2184. P_GLUE_INFO_T prGlueInfo;
  2185. UINT_32 i, u4AkmSuite;
  2186. P_DOT11_RSNA_CONFIG_AUTHENTICATION_SUITES_ENTRY prEntry;
  2187. DEBUGFUNC("wlanoidSetAuthMode");
  2188. ASSERT(prAdapter);
  2189. ASSERT(pu4SetInfoLen);
  2190. ASSERT(pvSetBuffer);
  2191. prGlueInfo = prAdapter->prGlueInfo;
  2192. *pu4SetInfoLen = sizeof(ENUM_PARAM_AUTH_MODE_T);
  2193. if (u4SetBufferLen < sizeof(ENUM_PARAM_AUTH_MODE_T))
  2194. return WLAN_STATUS_INVALID_LENGTH;
  2195. /* RF Test */
  2196. /* if (IS_ARB_IN_RFTEST_STATE(prAdapter)) { */
  2197. /* return WLAN_STATUS_SUCCESS; */
  2198. /* } */
  2199. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2200. DBGLOG(OID, WARN, "Fail in set Authentication mode! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2201. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2202. return WLAN_STATUS_ADAPTER_NOT_READY;
  2203. }
  2204. /* Check if the new authentication mode is valid. */
  2205. if (*(P_ENUM_PARAM_AUTH_MODE_T) pvSetBuffer >= AUTH_MODE_NUM) {
  2206. DBGLOG(OID, TRACE, "Invalid auth mode %d\n", *(P_ENUM_PARAM_AUTH_MODE_T) pvSetBuffer);
  2207. return WLAN_STATUS_INVALID_DATA;
  2208. }
  2209. switch (*(P_ENUM_PARAM_AUTH_MODE_T) pvSetBuffer) {
  2210. case AUTH_MODE_WPA:
  2211. case AUTH_MODE_WPA_PSK:
  2212. case AUTH_MODE_WPA2:
  2213. case AUTH_MODE_WPA2_PSK:
  2214. /* infrastructure mode only */
  2215. if (prAdapter->rWifiVar.rConnSettings.eOPMode != NET_TYPE_INFRA)
  2216. return WLAN_STATUS_NOT_ACCEPTED;
  2217. break;
  2218. case AUTH_MODE_WPA_NONE:
  2219. /* ad hoc mode only */
  2220. if (prAdapter->rWifiVar.rConnSettings.eOPMode != NET_TYPE_IBSS)
  2221. return WLAN_STATUS_NOT_ACCEPTED;
  2222. break;
  2223. default:
  2224. break;
  2225. }
  2226. /* Save the new authentication mode. */
  2227. prAdapter->rWifiVar.rConnSettings.eAuthMode = *(P_ENUM_PARAM_AUTH_MODE_T) pvSetBuffer;
  2228. #if DBG
  2229. switch (prAdapter->rWifiVar.rConnSettings.eAuthMode) {
  2230. case AUTH_MODE_OPEN:
  2231. DBGLOG(RSN, TRACE, "New auth mode: open\n");
  2232. break;
  2233. case AUTH_MODE_SHARED:
  2234. DBGLOG(RSN, TRACE, "New auth mode: shared\n");
  2235. break;
  2236. case AUTH_MODE_AUTO_SWITCH:
  2237. DBGLOG(RSN, TRACE, "New auth mode: auto-switch\n");
  2238. break;
  2239. case AUTH_MODE_WPA:
  2240. DBGLOG(RSN, TRACE, "New auth mode: WPA\n");
  2241. break;
  2242. case AUTH_MODE_WPA_PSK:
  2243. DBGLOG(RSN, TRACE, "New auth mode: WPA PSK\n");
  2244. break;
  2245. case AUTH_MODE_WPA_NONE:
  2246. DBGLOG(RSN, TRACE, "New auth mode: WPA None\n");
  2247. break;
  2248. case AUTH_MODE_WPA2:
  2249. DBGLOG(RSN, TRACE, "New auth mode: WPA2\n");
  2250. break;
  2251. case AUTH_MODE_WPA2_PSK:
  2252. DBGLOG(RSN, TRACE, "New auth mode: WPA2 PSK\n");
  2253. break;
  2254. default:
  2255. DBGLOG(RSN, TRACE, "New auth mode: unknown (%d)\n", prAdapter->rWifiVar.rConnSettings.eAuthMode);
  2256. }
  2257. #endif
  2258. if (prAdapter->rWifiVar.rConnSettings.eAuthMode >= AUTH_MODE_WPA) {
  2259. switch (prAdapter->rWifiVar.rConnSettings.eAuthMode) {
  2260. case AUTH_MODE_WPA:
  2261. u4AkmSuite = WPA_AKM_SUITE_802_1X;
  2262. break;
  2263. case AUTH_MODE_WPA_PSK:
  2264. u4AkmSuite = WPA_AKM_SUITE_PSK;
  2265. break;
  2266. case AUTH_MODE_WPA_NONE:
  2267. u4AkmSuite = WPA_AKM_SUITE_NONE;
  2268. break;
  2269. case AUTH_MODE_WPA2:
  2270. u4AkmSuite = RSN_AKM_SUITE_802_1X;
  2271. break;
  2272. case AUTH_MODE_WPA2_PSK:
  2273. u4AkmSuite = RSN_AKM_SUITE_PSK;
  2274. break;
  2275. default:
  2276. u4AkmSuite = 0;
  2277. }
  2278. } else {
  2279. u4AkmSuite = 0;
  2280. }
  2281. /* Enable the specific AKM suite only. */
  2282. for (i = 0; i < MAX_NUM_SUPPORTED_AKM_SUITES; i++) {
  2283. prEntry = &prAdapter->rMib.dot11RSNAConfigAuthenticationSuitesTable[i];
  2284. if (prEntry->dot11RSNAConfigAuthenticationSuite == u4AkmSuite)
  2285. prEntry->dot11RSNAConfigAuthenticationSuiteEnabled = TRUE;
  2286. else
  2287. prEntry->dot11RSNAConfigAuthenticationSuiteEnabled = FALSE;
  2288. #if CFG_SUPPORT_802_11W
  2289. if (kalGetMfpSetting(prAdapter->prGlueInfo) != RSN_AUTH_MFP_DISABLED) {
  2290. if ((u4AkmSuite == RSN_AKM_SUITE_PSK) &&
  2291. prEntry->dot11RSNAConfigAuthenticationSuite == RSN_AKM_SUITE_PSK_SHA256) {
  2292. DBGLOG(RSN, TRACE, "Enable RSN_AKM_SUITE_PSK_SHA256 AKM support\n");
  2293. prEntry->dot11RSNAConfigAuthenticationSuiteEnabled = TRUE;
  2294. }
  2295. if ((u4AkmSuite == RSN_AKM_SUITE_802_1X) &&
  2296. prEntry->dot11RSNAConfigAuthenticationSuite == RSN_AKM_SUITE_802_1X_SHA256) {
  2297. DBGLOG(RSN, TRACE, "Enable RSN_AKM_SUITE_802_1X_SHA256 AKM support\n");
  2298. prEntry->dot11RSNAConfigAuthenticationSuiteEnabled = TRUE;
  2299. }
  2300. }
  2301. #endif
  2302. }
  2303. return WLAN_STATUS_SUCCESS;
  2304. } /* wlanoidSetAuthMode */
  2305. #if 0
  2306. /*----------------------------------------------------------------------------*/
  2307. /*!
  2308. * \brief This routine is called to query the current 802.11 privacy filter
  2309. *
  2310. * \param[in] prAdapter Pointer to the Adapter structure.
  2311. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  2312. * the query.
  2313. * \param[in] u4QueryBufferLen The length of the query buffer.
  2314. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  2315. * bytes written into the query buffer. If the call
  2316. * failed due to invalid length of the query buffer,
  2317. * returns the amount of storage needed.
  2318. *
  2319. * \retval WLAN_STATUS_SUCCESS
  2320. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  2321. */
  2322. /*----------------------------------------------------------------------------*/
  2323. WLAN_STATUS
  2324. wlanoidQueryPrivacyFilter(IN P_ADAPTER_T prAdapter,
  2325. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  2326. {
  2327. DEBUGFUNC("wlanoidQueryPrivacyFilter");
  2328. ASSERT(prAdapter);
  2329. ASSERT(pvQueryBuffer);
  2330. ASSERT(pu4QueryInfoLen);
  2331. *pu4QueryInfoLen = sizeof(ENUM_PARAM_PRIVACY_FILTER_T);
  2332. if (u4QueryBufferLen < sizeof(ENUM_PARAM_PRIVACY_FILTER_T))
  2333. return WLAN_STATUS_BUFFER_TOO_SHORT;
  2334. *(P_ENUM_PARAM_PRIVACY_FILTER_T) pvQueryBuffer = prAdapter->rWlanInfo.ePrivacyFilter;
  2335. #if DBG
  2336. switch (*(P_ENUM_PARAM_PRIVACY_FILTER_T) pvQueryBuffer) {
  2337. case PRIVACY_FILTER_ACCEPT_ALL:
  2338. DBGLOG(OID, INFO, "Current privacy mode: open mode\n");
  2339. break;
  2340. case PRIVACY_FILTER_8021xWEP:
  2341. DBGLOG(OID, INFO, "Current privacy mode: filtering mode\n");
  2342. break;
  2343. default:
  2344. DBGLOG(OID, INFO, "Current auth mode: %d\n", *(P_ENUM_PARAM_AUTH_MODE_T) pvQueryBuffer);
  2345. }
  2346. #endif
  2347. return WLAN_STATUS_SUCCESS;
  2348. } /* wlanoidQueryPrivacyFilter */
  2349. /*----------------------------------------------------------------------------*/
  2350. /*!
  2351. * \brief This routine is called to set the IEEE 802.11 privacy filter
  2352. * to the driver.
  2353. *
  2354. * \param[in] prAdapter Pointer to the Adapter structure.
  2355. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2356. * \param[in] u4SetBufferLen The length of the set buffer.
  2357. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2358. * bytes read from the set buffer. If the call failed
  2359. * due to invalid length of the set buffer, returns
  2360. * the amount of storage needed.
  2361. *
  2362. * \retval WLAN_STATUS_SUCCESS
  2363. * \retval WLAN_STATUS_INVALID_DATA
  2364. * \retval WLAN_STATUS_INVALID_LENGTH
  2365. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2366. * \retval WLAN_STATUS_NOT_ACCEPTED
  2367. */
  2368. /*----------------------------------------------------------------------------*/
  2369. WLAN_STATUS
  2370. wlanoidSetPrivacyFilter(IN P_ADAPTER_T prAdapter,
  2371. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2372. {
  2373. P_GLUE_INFO_T prGlueInfo;
  2374. DEBUGFUNC("wlanoidSetPrivacyFilter");
  2375. ASSERT(prAdapter);
  2376. ASSERT(pu4SetInfoLen);
  2377. ASSERT(pvSetBuffer);
  2378. prGlueInfo = prAdapter->prGlueInfo;
  2379. *pu4SetInfoLen = sizeof(ENUM_PARAM_PRIVACY_FILTER_T);
  2380. if (u4SetBufferLen < sizeof(ENUM_PARAM_PRIVACY_FILTER_T))
  2381. return WLAN_STATUS_INVALID_LENGTH;
  2382. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2383. DBGLOG(OID, WARN, "Fail in set Authentication mode! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2384. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2385. return WLAN_STATUS_ADAPTER_NOT_READY;
  2386. }
  2387. /* Check if the new authentication mode is valid. */
  2388. if (*(P_ENUM_PARAM_PRIVACY_FILTER_T) pvSetBuffer >= PRIVACY_FILTER_NUM) {
  2389. DBGLOG(OID, TRACE, "Invalid privacy filter %d\n", *(P_ENUM_PARAM_PRIVACY_FILTER_T) pvSetBuffer);
  2390. return WLAN_STATUS_INVALID_DATA;
  2391. }
  2392. switch (*(P_ENUM_PARAM_PRIVACY_FILTER_T) pvSetBuffer) {
  2393. default:
  2394. break;
  2395. }
  2396. /* Save the new authentication mode. */
  2397. prAdapter->rWlanInfo.ePrivacyFilter = *(ENUM_PARAM_PRIVACY_FILTER_T) pvSetBuffer;
  2398. return WLAN_STATUS_SUCCESS;
  2399. } /* wlanoidSetPrivacyFilter */
  2400. #endif
  2401. /*----------------------------------------------------------------------------*/
  2402. /*!
  2403. * \brief This routine is called to reload the available default settings for
  2404. * the specified type field.
  2405. *
  2406. * \param[in] prAdapter Pointer to the Adapter structure.
  2407. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2408. * \param[in] u4SetBufferLen The length of the set buffer.
  2409. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2410. * bytes read from the set buffer. If the call failed
  2411. * due to invalid length of the set buffer, returns
  2412. * the amount of storage needed.
  2413. *
  2414. * \retval WLAN_STATUS_SUCCESS
  2415. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2416. * \retval WLAN_STATUS_INVALID_DATA
  2417. */
  2418. /*----------------------------------------------------------------------------*/
  2419. WLAN_STATUS
  2420. wlanoidSetReloadDefaults(IN P_ADAPTER_T prAdapter,
  2421. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2422. {
  2423. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  2424. ENUM_PARAM_NETWORK_TYPE_T eNetworkType;
  2425. UINT_32 u4Len;
  2426. UINT_8 ucCmdSeqNum;
  2427. DEBUGFUNC("wlanoidSetReloadDefaults");
  2428. ASSERT(prAdapter);
  2429. ASSERT(pu4SetInfoLen);
  2430. *pu4SetInfoLen = sizeof(PARAM_RELOAD_DEFAULTS);
  2431. /* if (IS_ARB_IN_RFTEST_STATE(prAdapter)) { */
  2432. /* return WLAN_STATUS_SUCCESS; */
  2433. /* } */
  2434. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2435. DBGLOG(OID, WARN, "Fail in set Reload default! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2436. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2437. return WLAN_STATUS_ADAPTER_NOT_READY;
  2438. }
  2439. ASSERT(pvSetBuffer);
  2440. /* Verify the available reload options and reload the settings. */
  2441. switch (*(P_PARAM_RELOAD_DEFAULTS) pvSetBuffer) {
  2442. case ENUM_RELOAD_WEP_KEYS:
  2443. /* Reload available default WEP keys from the permanent
  2444. storage. */
  2445. prAdapter->rWifiVar.rConnSettings.eAuthMode = AUTH_MODE_OPEN;
  2446. /* ENUM_ENCRYPTION_DISABLED; */
  2447. prAdapter->rWifiVar.rConnSettings.eEncStatus = ENUM_ENCRYPTION1_KEY_ABSENT;
  2448. {
  2449. P_GLUE_INFO_T prGlueInfo;
  2450. P_CMD_INFO_T prCmdInfo;
  2451. P_WIFI_CMD_T prWifiCmd;
  2452. P_CMD_802_11_KEY prCmdKey;
  2453. UINT_8 aucBCAddr[] = BC_MAC_ADDR;
  2454. prGlueInfo = prAdapter->prGlueInfo;
  2455. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + sizeof(CMD_802_11_KEY)));
  2456. if (!prCmdInfo) {
  2457. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  2458. return WLAN_STATUS_FAILURE;
  2459. }
  2460. /* increase command sequence number */
  2461. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  2462. /* compose CMD_802_11_KEY cmd pkt */
  2463. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  2464. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  2465. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_802_11_KEY);
  2466. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  2467. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  2468. prCmdInfo->fgIsOid = TRUE;
  2469. prCmdInfo->ucCID = CMD_ID_ADD_REMOVE_KEY;
  2470. prCmdInfo->fgSetQuery = TRUE;
  2471. prCmdInfo->fgNeedResp = FALSE;
  2472. prCmdInfo->fgDriverDomainMCR = FALSE;
  2473. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  2474. prCmdInfo->u4SetInfoLen = sizeof(PARAM_REMOVE_KEY_T);
  2475. prCmdInfo->pvInformationBuffer = pvSetBuffer;
  2476. prCmdInfo->u4InformationBufferLength = u4SetBufferLen;
  2477. /* Setup WIFI_CMD_T */
  2478. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  2479. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  2480. prWifiCmd->ucCID = prCmdInfo->ucCID;
  2481. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  2482. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  2483. prCmdKey = (P_CMD_802_11_KEY) (prWifiCmd->aucBuffer);
  2484. kalMemZero((PUINT_8) prCmdKey, sizeof(CMD_802_11_KEY));
  2485. prCmdKey->ucAddRemove = 0; /* Remove */
  2486. prCmdKey->ucKeyId = 0; /* (UINT_8)(prRemovedKey->u4KeyIndex & 0x000000ff); */
  2487. kalMemCopy(prCmdKey->aucPeerAddr, aucBCAddr, MAC_ADDR_LEN);
  2488. ASSERT(prCmdKey->ucKeyId < MAX_KEY_NUM);
  2489. prCmdKey->ucKeyType = 0;
  2490. /* insert into prCmdQueue */
  2491. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  2492. /* wakeup txServiceThread later */
  2493. GLUE_SET_EVENT(prGlueInfo);
  2494. return WLAN_STATUS_PENDING;
  2495. }
  2496. break;
  2497. default:
  2498. DBGLOG(OID, TRACE, "Invalid reload option %d\n", *(P_PARAM_RELOAD_DEFAULTS) pvSetBuffer);
  2499. rStatus = WLAN_STATUS_INVALID_DATA;
  2500. }
  2501. /* OID_802_11_RELOAD_DEFAULTS requiest to reset to auto mode */
  2502. eNetworkType = PARAM_NETWORK_TYPE_AUTOMODE;
  2503. wlanoidSetNetworkTypeInUse(prAdapter, &eNetworkType, sizeof(eNetworkType), &u4Len);
  2504. return rStatus;
  2505. } /* wlanoidSetReloadDefaults */
  2506. /*----------------------------------------------------------------------------*/
  2507. /*!
  2508. * \brief This routine is called to set a WEP key to the driver.
  2509. *
  2510. * \param[in] prAdapter Pointer to the Adapter structure.
  2511. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2512. * \param[in] u4SetBufferLen The length of the set buffer.
  2513. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2514. * bytes read from the set buffer. If the call failed
  2515. * due to invalid length of the set buffer, returns
  2516. * the amount of storage needed.
  2517. *
  2518. * \retval WLAN_STATUS_SUCCESS
  2519. * \retval WLAN_STATUS_INVALID_LENGTH
  2520. * \retval WLAN_STATUS_INVALID_DATA
  2521. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2522. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  2523. */
  2524. /*----------------------------------------------------------------------------*/
  2525. #ifdef LINUX
  2526. UINT_8 keyBuffer[sizeof(PARAM_KEY_T) + 16 /* LEGACY_KEY_MAX_LEN */];
  2527. UINT_8 aucBCAddr[] = BC_MAC_ADDR;
  2528. #endif
  2529. WLAN_STATUS
  2530. wlanoidSetAddWep(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2531. {
  2532. #ifndef LINUX
  2533. UINT_8 keyBuffer[sizeof(PARAM_KEY_T) + 16 /* LEGACY_KEY_MAX_LEN */];
  2534. UINT_8 aucBCAddr[] = BC_MAC_ADDR;
  2535. #endif
  2536. P_PARAM_WEP_T prNewWepKey;
  2537. P_PARAM_KEY_T prParamKey = (P_PARAM_KEY_T) keyBuffer;
  2538. UINT_32 u4KeyId, u4SetLen;
  2539. DEBUGFUNC("wlanoidSetAddWep");
  2540. ASSERT(prAdapter);
  2541. *pu4SetInfoLen = OFFSET_OF(PARAM_WEP_T, aucKeyMaterial);
  2542. if (u4SetBufferLen < OFFSET_OF(PARAM_WEP_T, aucKeyMaterial)) {
  2543. ASSERT(pu4SetInfoLen);
  2544. return WLAN_STATUS_BUFFER_TOO_SHORT;
  2545. }
  2546. ASSERT(pvSetBuffer);
  2547. ASSERT(pu4SetInfoLen);
  2548. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2549. DBGLOG(OID, WARN, "Fail in set add WEP! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2550. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2551. return WLAN_STATUS_ADAPTER_NOT_READY;
  2552. }
  2553. prNewWepKey = (P_PARAM_WEP_T) pvSetBuffer;
  2554. /* Verify the total buffer for minimum length. */
  2555. if (u4SetBufferLen < OFFSET_OF(PARAM_WEP_T, aucKeyMaterial) + prNewWepKey->u4KeyLength) {
  2556. DBGLOG(OID, WARN, "Invalid total buffer length (%d) than minimum length (%d)\n",
  2557. (UINT_8) u4SetBufferLen, (UINT_8) OFFSET_OF(PARAM_WEP_T, aucKeyMaterial));
  2558. *pu4SetInfoLen = OFFSET_OF(PARAM_WEP_T, aucKeyMaterial);
  2559. return WLAN_STATUS_INVALID_DATA;
  2560. }
  2561. /* Verify the key structure length. */
  2562. if (prNewWepKey->u4Length > u4SetBufferLen) {
  2563. DBGLOG(OID, WARN, "Invalid key structure length (%d) greater than total buffer length (%d)\n",
  2564. (UINT_8) prNewWepKey->u4Length, (UINT_8) u4SetBufferLen);
  2565. *pu4SetInfoLen = u4SetBufferLen;
  2566. return WLAN_STATUS_INVALID_DATA;
  2567. }
  2568. /* Verify the key material length for maximum key material length:16 */
  2569. if (prNewWepKey->u4KeyLength > 16 /* LEGACY_KEY_MAX_LEN */) {
  2570. DBGLOG(OID, WARN, "Invalid key material length (%d) greater than maximum key material length (16)\n",
  2571. (UINT_8) prNewWepKey->u4KeyLength);
  2572. *pu4SetInfoLen = u4SetBufferLen;
  2573. return WLAN_STATUS_INVALID_DATA;
  2574. }
  2575. *pu4SetInfoLen = u4SetBufferLen;
  2576. u4KeyId = prNewWepKey->u4KeyIndex & BITS(0, 29) /* WEP_KEY_ID_FIELD */;
  2577. /* Verify whether key index is valid or not, current version
  2578. driver support only 4 global WEP keys setting by this OID */
  2579. if (u4KeyId > MAX_KEY_NUM - 1) {
  2580. DBGLOG(OID, ERROR, "Error, invalid WEP key ID: %d\n", (UINT_8) u4KeyId);
  2581. return WLAN_STATUS_INVALID_DATA;
  2582. }
  2583. prParamKey->u4KeyIndex = u4KeyId;
  2584. /* Transmit key */
  2585. if (prNewWepKey->u4KeyIndex & IS_TRANSMIT_KEY)
  2586. prParamKey->u4KeyIndex |= IS_TRANSMIT_KEY;
  2587. /* Per client key */
  2588. if (prNewWepKey->u4KeyIndex & IS_UNICAST_KEY)
  2589. prParamKey->u4KeyIndex |= IS_UNICAST_KEY;
  2590. prParamKey->u4KeyLength = prNewWepKey->u4KeyLength;
  2591. kalMemCopy(prParamKey->arBSSID, aucBCAddr, MAC_ADDR_LEN);
  2592. kalMemCopy(prParamKey->aucKeyMaterial, prNewWepKey->aucKeyMaterial, prNewWepKey->u4KeyLength);
  2593. prParamKey->u4Length = OFFSET_OF(PARAM_KEY_T, aucKeyMaterial) + prNewWepKey->u4KeyLength;
  2594. wlanoidSetAddKey(prAdapter, (PVOID) prParamKey, prParamKey->u4Length, &u4SetLen);
  2595. return WLAN_STATUS_PENDING;
  2596. } /* wlanoidSetAddWep */
  2597. /*----------------------------------------------------------------------------*/
  2598. /*!
  2599. * \brief This routine is called to request the driver to remove the WEP key
  2600. * at the specified key index.
  2601. *
  2602. * \param[in] prAdapter Pointer to the Adapter structure.
  2603. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2604. * \param[in] u4SetBufferLen The length of the set buffer.
  2605. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2606. * bytes read from the set buffer. If the call failed
  2607. * due to invalid length of the set buffer, returns
  2608. * the amount of storage needed.
  2609. *
  2610. * \retval WLAN_STATUS_SUCCESS
  2611. * \retval WLAN_STATUS_INVALID_DATA
  2612. * \retval WLAN_STATUS_INVALID_LENGTH
  2613. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2614. */
  2615. /*----------------------------------------------------------------------------*/
  2616. WLAN_STATUS
  2617. wlanoidSetRemoveWep(IN P_ADAPTER_T prAdapter,
  2618. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2619. {
  2620. UINT_32 u4KeyId, u4SetLen;
  2621. PARAM_REMOVE_KEY_T rRemoveKey;
  2622. UINT_8 aucBCAddr[] = BC_MAC_ADDR;
  2623. DEBUGFUNC("wlanoidSetRemoveWep");
  2624. ASSERT(prAdapter);
  2625. ASSERT(pu4SetInfoLen);
  2626. *pu4SetInfoLen = sizeof(PARAM_KEY_INDEX);
  2627. if (u4SetBufferLen < sizeof(PARAM_KEY_INDEX))
  2628. return WLAN_STATUS_INVALID_LENGTH;
  2629. ASSERT(pvSetBuffer);
  2630. u4KeyId = *(PUINT_32) pvSetBuffer;
  2631. /* Dump PARAM_WEP content. */
  2632. DBGLOG(OID, INFO, "Set: Dump PARAM_KEY_INDEX content\n");
  2633. DBGLOG(OID, INFO, "Index : 0x%08x\n", u4KeyId);
  2634. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2635. DBGLOG(OID, WARN, "Fail in set remove WEP! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2636. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2637. return WLAN_STATUS_ADAPTER_NOT_READY;
  2638. }
  2639. if (u4KeyId & IS_TRANSMIT_KEY) {
  2640. /* Bit 31 should not be set */
  2641. DBGLOG(OID, ERROR, "Invalid WEP key index: 0x%08x\n", u4KeyId);
  2642. return WLAN_STATUS_INVALID_DATA;
  2643. }
  2644. u4KeyId &= BITS(0, 7);
  2645. /* Verify whether key index is valid or not. Current version
  2646. driver support only 4 global WEP keys. */
  2647. if (u4KeyId > MAX_KEY_NUM - 1) {
  2648. DBGLOG(OID, ERROR, "invalid WEP key ID %u\n", u4KeyId);
  2649. return WLAN_STATUS_INVALID_DATA;
  2650. }
  2651. rRemoveKey.u4Length = sizeof(PARAM_REMOVE_KEY_T);
  2652. rRemoveKey.u4KeyIndex = *(PUINT_32) pvSetBuffer;
  2653. kalMemCopy(rRemoveKey.arBSSID, aucBCAddr, MAC_ADDR_LEN);
  2654. wlanoidSetRemoveKey(prAdapter, (PVOID)&rRemoveKey, sizeof(PARAM_REMOVE_KEY_T), &u4SetLen);
  2655. return WLAN_STATUS_PENDING;
  2656. } /* wlanoidSetRemoveWep */
  2657. /*----------------------------------------------------------------------------*/
  2658. /*!
  2659. * \brief This routine is called to set a key to the driver.
  2660. *
  2661. * \param[in] prAdapter Pointer to the Adapter structure.
  2662. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2663. * \param[in] u4SetBufferLen The length of the set buffer.
  2664. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2665. * bytes read from the set buffer. If the call failed
  2666. * due to invalid length of the set buffer, returns
  2667. * the amount of storage needed.
  2668. *
  2669. * \retval WLAN_STATUS_SUCCESS
  2670. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2671. * \retval WLAN_STATUS_INVALID_LENGTH
  2672. * \retval WLAN_STATUS_INVALID_DATA
  2673. *
  2674. * \note The setting buffer PARAM_KEY_T, which is set by NDIS, is unpacked.
  2675. */
  2676. /*----------------------------------------------------------------------------*/
  2677. WLAN_STATUS
  2678. _wlanoidSetAddKey(IN P_ADAPTER_T prAdapter,
  2679. IN PVOID pvSetBuffer,
  2680. IN UINT_32 u4SetBufferLen, IN BOOLEAN fgIsOid, IN UINT_8 ucAlgorithmId, OUT PUINT_32 pu4SetInfoLen)
  2681. {
  2682. P_GLUE_INFO_T prGlueInfo;
  2683. P_CMD_INFO_T prCmdInfo;
  2684. P_WIFI_CMD_T prWifiCmd;
  2685. P_PARAM_KEY_T prNewKey;
  2686. P_CMD_802_11_KEY prCmdKey;
  2687. UINT_8 ucCmdSeqNum;
  2688. #if 0
  2689. DEBUGFUNC("wlanoidSetAddKey");
  2690. DBGLOG(OID, LOUD, "\n");
  2691. ASSERT(prAdapter);
  2692. ASSERT(pvSetBuffer);
  2693. ASSERT(pu4SetInfoLen);
  2694. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2695. DBGLOG(OID, WARN, "Fail in set add key! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2696. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2697. return WLAN_STATUS_ADAPTER_NOT_READY;
  2698. }
  2699. #endif
  2700. prNewKey = (P_PARAM_KEY_T) pvSetBuffer;
  2701. #if 0
  2702. /* Verify the key structure length. */
  2703. if (prNewKey->u4Length > u4SetBufferLen) {
  2704. DBGLOG(OID, WARN, "Invalid key structure length (%d) greater than total buffer length (%d)\n",
  2705. (UINT_8) prNewKey->u4Length, (UINT_8) u4SetBufferLen);
  2706. *pu4SetInfoLen = u4SetBufferLen;
  2707. return WLAN_STATUS_INVALID_LENGTH;
  2708. }
  2709. /* Verify the key material length for key material buffer */
  2710. if (prNewKey->u4KeyLength > prNewKey->u4Length - OFFSET_OF(PARAM_KEY_T, aucKeyMaterial)) {
  2711. DBGLOG(OID, WARN, "Invalid key material length (%d)\n", (UINT_8) prNewKey->u4KeyLength);
  2712. *pu4SetInfoLen = u4SetBufferLen;
  2713. return WLAN_STATUS_INVALID_DATA;
  2714. }
  2715. /* Exception check */
  2716. if (prNewKey->u4KeyIndex & 0x0fffff00)
  2717. return WLAN_STATUS_INVALID_DATA;
  2718. /* Exception check, pairwise key must with transmit bit enabled */
  2719. if ((prNewKey->u4KeyIndex & BITS(30, 31)) == IS_UNICAST_KEY)
  2720. return WLAN_STATUS_INVALID_DATA;
  2721. if (!(prNewKey->u4KeyLength == WEP_40_LEN || prNewKey->u4KeyLength == WEP_104_LEN ||
  2722. prNewKey->u4KeyLength == CCMP_KEY_LEN || prNewKey->u4KeyLength == TKIP_KEY_LEN)) {
  2723. return WLAN_STATUS_INVALID_DATA;
  2724. }
  2725. /* Exception check, pairwise key must with transmit bit enabled */
  2726. if ((prNewKey->u4KeyIndex & BITS(30, 31)) == BITS(30, 31)) {
  2727. if (((prNewKey->u4KeyIndex & 0xff) != 0) ||
  2728. ((prNewKey->arBSSID[0] == 0xff) && (prNewKey->arBSSID[1] == 0xff) && (prNewKey->arBSSID[2] == 0xff)
  2729. && (prNewKey->arBSSID[3] == 0xff) && (prNewKey->arBSSID[4] == 0xff)
  2730. && (prNewKey->arBSSID[5] == 0xff))) {
  2731. return WLAN_STATUS_INVALID_DATA;
  2732. }
  2733. }
  2734. *pu4SetInfoLen = u4SetBufferLen;
  2735. #endif
  2736. /* Dump PARAM_KEY content. */
  2737. DBGLOG(OID, TRACE, "Set: PARAM_KEY Length: 0x%08x, Key Index: 0x%08x, Key Length: 0x%08x\n",
  2738. prNewKey->u4Length, prNewKey->u4KeyIndex, prNewKey->u4KeyLength);
  2739. DBGLOG(OID, TRACE, "BSSID:\n");
  2740. DBGLOG_MEM8(OID, TRACE, prNewKey->arBSSID, sizeof(PARAM_MAC_ADDRESS));
  2741. DBGLOG(OID, TRACE, "Key RSC:\n");
  2742. DBGLOG_MEM8(OID, TRACE, &prNewKey->rKeyRSC, sizeof(PARAM_KEY_RSC));
  2743. DBGLOG(OID, TRACE, "Key Material:\n");
  2744. DBGLOG_MEM8(OID, TRACE, prNewKey->aucKeyMaterial, prNewKey->u4KeyLength);
  2745. if (prAdapter->rWifiVar.rConnSettings.eAuthMode < AUTH_MODE_WPA) {
  2746. /* Todo:: Store the legacy wep key for OID_802_11_RELOAD_DEFAULTS */
  2747. /* Todo:: Nothing */
  2748. }
  2749. if (prNewKey->u4KeyIndex & IS_TRANSMIT_KEY)
  2750. prAdapter->rWifiVar.rAisSpecificBssInfo.fgTransmitKeyExist = TRUE;
  2751. prGlueInfo = prAdapter->prGlueInfo;
  2752. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + sizeof(CMD_802_11_KEY)));
  2753. if (!prCmdInfo) {
  2754. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  2755. return WLAN_STATUS_FAILURE;
  2756. }
  2757. /* increase command sequence number */
  2758. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  2759. DBGLOG(OID, TRACE, "ucCmdSeqNum = %d\n", ucCmdSeqNum);
  2760. /* compose CMD_802_11_KEY cmd pkt */
  2761. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  2762. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  2763. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_802_11_KEY);
  2764. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  2765. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  2766. prCmdInfo->fgIsOid = fgIsOid;
  2767. prCmdInfo->ucCID = CMD_ID_ADD_REMOVE_KEY;
  2768. prCmdInfo->fgSetQuery = TRUE;
  2769. prCmdInfo->fgNeedResp = FALSE;
  2770. prCmdInfo->fgDriverDomainMCR = FALSE;
  2771. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  2772. prCmdInfo->u4SetInfoLen = u4SetBufferLen;
  2773. prCmdInfo->pvInformationBuffer = pvSetBuffer;
  2774. prCmdInfo->u4InformationBufferLength = u4SetBufferLen;
  2775. /* Setup WIFI_CMD_T */
  2776. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  2777. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  2778. prWifiCmd->ucCID = prCmdInfo->ucCID;
  2779. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  2780. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  2781. prCmdKey = (P_CMD_802_11_KEY) (prWifiCmd->aucBuffer);
  2782. kalMemZero(prCmdKey, sizeof(CMD_802_11_KEY));
  2783. prCmdKey->ucAddRemove = 1; /* Add */
  2784. prCmdKey->ucTxKey = ((prNewKey->u4KeyIndex & IS_TRANSMIT_KEY) == IS_TRANSMIT_KEY) ? 1 : 0;
  2785. prCmdKey->ucKeyType = ((prNewKey->u4KeyIndex & IS_UNICAST_KEY) == IS_UNICAST_KEY) ? 1 : 0;
  2786. prCmdKey->ucIsAuthenticator = ((prNewKey->u4KeyIndex & IS_AUTHENTICATOR) == IS_AUTHENTICATOR) ? 1 : 0;
  2787. kalMemCopy(prCmdKey->aucPeerAddr, (PUINT_8) prNewKey->arBSSID, MAC_ADDR_LEN);
  2788. prCmdKey->ucNetType = 0; /* AIS */
  2789. prCmdKey->ucKeyId = (UINT_8) (prNewKey->u4KeyIndex & 0xff);
  2790. /* Note: adjust the key length for WPA-None */
  2791. prCmdKey->ucKeyLen = (UINT_8) prNewKey->u4KeyLength;
  2792. kalMemCopy(prCmdKey->aucKeyMaterial, (PUINT_8) prNewKey->aucKeyMaterial, prCmdKey->ucKeyLen);
  2793. if (prNewKey->u4KeyLength == 5) {
  2794. prCmdKey->ucAlgorithmId = CIPHER_SUITE_WEP40;
  2795. } else if (prNewKey->u4KeyLength == 13) {
  2796. prCmdKey->ucAlgorithmId = CIPHER_SUITE_WEP104;
  2797. } else if (prNewKey->u4KeyLength == 16) {
  2798. if ((ucAlgorithmId != CIPHER_SUITE_CCMP) &&
  2799. (prAdapter->rWifiVar.rConnSettings.eAuthMode < AUTH_MODE_WPA))
  2800. prCmdKey->ucAlgorithmId = CIPHER_SUITE_WEP128;
  2801. else {
  2802. #if CFG_SUPPORT_802_11W
  2803. if (prCmdKey->ucKeyId >= 4) {
  2804. prCmdKey->ucAlgorithmId = CIPHER_SUITE_BIP;
  2805. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  2806. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  2807. prAisSpecBssInfo->fgBipKeyInstalled = TRUE;
  2808. } else
  2809. #endif
  2810. prCmdKey->ucAlgorithmId = CIPHER_SUITE_CCMP;
  2811. if (rsnCheckPmkidCandicate(prAdapter)) {
  2812. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  2813. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  2814. DBGLOG(RSN, TRACE,
  2815. "Add key: Prepare a timer to indicate candidate PMKID Candidate\n");
  2816. cnmTimerStopTimer(prAdapter, &prAisSpecBssInfo->rPreauthenticationTimer);
  2817. cnmTimerStartTimer(prAdapter, &prAisSpecBssInfo->rPreauthenticationTimer,
  2818. SEC_TO_MSEC(WAIT_TIME_IND_PMKID_CANDICATE_SEC));
  2819. }
  2820. }
  2821. } else if (prNewKey->u4KeyLength == 32) {
  2822. if (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA_NONE) {
  2823. if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION2_ENABLED)
  2824. prCmdKey->ucAlgorithmId = CIPHER_SUITE_TKIP;
  2825. else if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION3_ENABLED) {
  2826. prCmdKey->ucAlgorithmId = CIPHER_SUITE_CCMP;
  2827. prCmdKey->ucKeyLen = CCMP_KEY_LEN;
  2828. }
  2829. } else
  2830. prCmdKey->ucAlgorithmId = CIPHER_SUITE_TKIP;
  2831. }
  2832. DBGLOG(RSN, TRACE, "prCmdKey->ucAlgorithmId=%d, key len=%d\n",
  2833. prCmdKey->ucAlgorithmId, (UINT32) prNewKey->u4KeyLength);
  2834. /* insert into prCmdQueue */
  2835. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  2836. /* wakeup txServiceThread later */
  2837. GLUE_SET_EVENT(prGlueInfo);
  2838. return WLAN_STATUS_PENDING;
  2839. }
  2840. WLAN_STATUS
  2841. wlanoidSetAddKey(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2842. {
  2843. P_PARAM_KEY_T prNewKey;
  2844. DEBUGFUNC("wlanoidSetAddKey");
  2845. DBGLOG(OID, LOUD, "\n");
  2846. ASSERT(prAdapter);
  2847. ASSERT(pvSetBuffer);
  2848. ASSERT(pu4SetInfoLen);
  2849. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2850. DBGLOG(OID, WARN, "Fail in set add key! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2851. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2852. return WLAN_STATUS_ADAPTER_NOT_READY;
  2853. }
  2854. prNewKey = (P_PARAM_KEY_T) pvSetBuffer;
  2855. /* Verify the key structure length. */
  2856. if (prNewKey->u4Length > u4SetBufferLen) {
  2857. DBGLOG(OID, WARN, "Invalid key structure length (%d) greater than total buffer length (%d)\n",
  2858. (UINT_8) prNewKey->u4Length, (UINT_8) u4SetBufferLen);
  2859. *pu4SetInfoLen = u4SetBufferLen;
  2860. return WLAN_STATUS_INVALID_LENGTH;
  2861. }
  2862. /* Verify the key material length for key material buffer */
  2863. if (prNewKey->u4KeyLength > prNewKey->u4Length - OFFSET_OF(PARAM_KEY_T, aucKeyMaterial)) {
  2864. DBGLOG(OID, WARN, "Invalid key material length (%d)\n", (UINT_8) prNewKey->u4KeyLength);
  2865. *pu4SetInfoLen = u4SetBufferLen;
  2866. return WLAN_STATUS_INVALID_DATA;
  2867. }
  2868. /* Exception check */
  2869. if (prNewKey->u4KeyIndex & 0x0fffff00)
  2870. return WLAN_STATUS_INVALID_DATA;
  2871. /* Exception check, pairwise key must with transmit bit enabled */
  2872. if ((prNewKey->u4KeyIndex & BITS(30, 31)) == BITS(30, 31)) {
  2873. if (((prNewKey->u4KeyLength == CCMP_KEY_LEN || prNewKey->u4KeyLength == TKIP_KEY_LEN) &&
  2874. (prNewKey->u4KeyIndex & 0xff) != 0) ||
  2875. EQUAL_MAC_ADDR(prNewKey->arBSSID, "\xff\xff\xff\xff\xff\xff")) {
  2876. return WLAN_STATUS_INVALID_DATA;
  2877. }
  2878. } else if ((prNewKey->u4KeyIndex & BITS(30, 31)) == IS_UNICAST_KEY)
  2879. return WLAN_STATUS_INVALID_DATA;
  2880. if (!(prNewKey->u4KeyLength == WEP_40_LEN || prNewKey->u4KeyLength == WEP_104_LEN ||
  2881. prNewKey->u4KeyLength == CCMP_KEY_LEN || prNewKey->u4KeyLength == TKIP_KEY_LEN)) {
  2882. return WLAN_STATUS_INVALID_DATA;
  2883. }
  2884. *pu4SetInfoLen = u4SetBufferLen;
  2885. #if (CFG_SUPPORT_TDLS == 1)
  2886. /*
  2887. supplicant will set key before updating station & enabling the link so we need to
  2888. backup the key information and set key when link is enabled
  2889. */
  2890. if (TdlsexKeyHandle(prAdapter, prNewKey) == TDLS_STATUS_SUCCESS)
  2891. return WLAN_STATUS_SUCCESS;
  2892. #endif /* CFG_SUPPORT_TDLS */
  2893. return _wlanoidSetAddKey(prAdapter, pvSetBuffer, u4SetBufferLen, TRUE, CIPHER_SUITE_NONE, pu4SetInfoLen);
  2894. } /* wlanoidSetAddKey */
  2895. /*----------------------------------------------------------------------------*/
  2896. /*!
  2897. * \brief This routine is called to request the driver to remove the key at
  2898. * the specified key index.
  2899. *
  2900. * \param[in] prAdapter Pointer to the Adapter structure.
  2901. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2902. * \param[in] u4SetBufferLen The length of the set buffer.
  2903. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2904. * bytes read from the set buffer. If the call failed
  2905. * due to invalid length of the set buffer, returns
  2906. * the amount of storage needed.
  2907. *
  2908. * \retval WLAN_STATUS_SUCCESS
  2909. * \retval WLAN_STATUS_INVALID_DATA
  2910. * \retval WLAN_STATUS_INVALID_LENGTH
  2911. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2912. */
  2913. /*----------------------------------------------------------------------------*/
  2914. WLAN_STATUS
  2915. wlanoidSetRemoveKey(IN P_ADAPTER_T prAdapter,
  2916. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2917. {
  2918. P_GLUE_INFO_T prGlueInfo;
  2919. P_CMD_INFO_T prCmdInfo;
  2920. P_WIFI_CMD_T prWifiCmd;
  2921. P_PARAM_REMOVE_KEY_T prRemovedKey;
  2922. P_CMD_802_11_KEY prCmdKey;
  2923. UINT_8 ucCmdSeqNum;
  2924. DEBUGFUNC("wlanoidSetRemoveKey");
  2925. ASSERT(prAdapter);
  2926. ASSERT(pu4SetInfoLen);
  2927. *pu4SetInfoLen = sizeof(PARAM_REMOVE_KEY_T);
  2928. if (u4SetBufferLen < sizeof(PARAM_REMOVE_KEY_T))
  2929. return WLAN_STATUS_INVALID_LENGTH;
  2930. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2931. DBGLOG(OID, WARN, "Fail in set remove key! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2932. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2933. return WLAN_STATUS_ADAPTER_NOT_READY;
  2934. }
  2935. ASSERT(pvSetBuffer);
  2936. prRemovedKey = (P_PARAM_REMOVE_KEY_T) pvSetBuffer;
  2937. /* Dump PARAM_REMOVE_KEY content. */
  2938. DBGLOG(OID, TRACE, "Set: Dump PARAM_REMOVE_KEY content\n");
  2939. DBGLOG(OID, TRACE, "Length : 0x%08x\n", prRemovedKey->u4Length);
  2940. DBGLOG(OID, TRACE, "Key Index : 0x%08x\n", prRemovedKey->u4KeyIndex);
  2941. DBGLOG(OID, TRACE, "BSSID:\n");
  2942. DBGLOG_MEM8(OID, TRACE, prRemovedKey->arBSSID, MAC_ADDR_LEN);
  2943. /* Check bit 31: this bit should always 0 */
  2944. if (prRemovedKey->u4KeyIndex & IS_TRANSMIT_KEY) {
  2945. /* Bit 31 should not be set */
  2946. DBGLOG(OID, ERROR, "invalid key index: 0x%08x\n", prRemovedKey->u4KeyIndex);
  2947. return WLAN_STATUS_INVALID_DATA;
  2948. }
  2949. /* Check bits 8 ~ 29 should always be 0 */
  2950. if (prRemovedKey->u4KeyIndex & BITS(8, 29)) {
  2951. /* Bit 31 should not be set */
  2952. DBGLOG(OID, ERROR, "invalid key index: 0x%08x\n", prRemovedKey->u4KeyIndex);
  2953. return WLAN_STATUS_INVALID_DATA;
  2954. }
  2955. /* Clean up the Tx key flag */
  2956. if (prRemovedKey->u4KeyIndex & IS_UNICAST_KEY)
  2957. prAdapter->rWifiVar.rAisSpecificBssInfo.fgTransmitKeyExist = FALSE;
  2958. prGlueInfo = prAdapter->prGlueInfo;
  2959. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + sizeof(CMD_802_11_KEY)));
  2960. if (!prCmdInfo) {
  2961. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  2962. return WLAN_STATUS_FAILURE;
  2963. }
  2964. /* increase command sequence number */
  2965. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  2966. /* compose CMD_802_11_KEY cmd pkt */
  2967. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  2968. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  2969. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_802_11_KEY);
  2970. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  2971. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  2972. prCmdInfo->fgIsOid = TRUE;
  2973. prCmdInfo->ucCID = CMD_ID_ADD_REMOVE_KEY;
  2974. prCmdInfo->fgSetQuery = TRUE;
  2975. prCmdInfo->fgNeedResp = FALSE;
  2976. prCmdInfo->fgDriverDomainMCR = FALSE;
  2977. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  2978. prCmdInfo->u4SetInfoLen = sizeof(PARAM_REMOVE_KEY_T);
  2979. prCmdInfo->pvInformationBuffer = pvSetBuffer;
  2980. prCmdInfo->u4InformationBufferLength = u4SetBufferLen;
  2981. /* Setup WIFI_CMD_T */
  2982. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  2983. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  2984. prWifiCmd->ucCID = prCmdInfo->ucCID;
  2985. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  2986. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  2987. prCmdKey = (P_CMD_802_11_KEY) (prWifiCmd->aucBuffer);
  2988. kalMemZero((PUINT_8) prCmdKey, sizeof(CMD_802_11_KEY));
  2989. prCmdKey->ucAddRemove = 0; /* Remove */
  2990. prCmdKey->ucKeyId = (UINT_8) (prRemovedKey->u4KeyIndex & 0x000000ff);
  2991. kalMemCopy(prCmdKey->aucPeerAddr, (PUINT_8) prRemovedKey->arBSSID, MAC_ADDR_LEN);
  2992. #if CFG_SUPPORT_802_11W
  2993. ASSERT(prCmdKey->ucKeyId < MAX_KEY_NUM + 2);
  2994. #else
  2995. /* ASSERT(prCmdKey->ucKeyId < MAX_KEY_NUM); */
  2996. #endif
  2997. if (prRemovedKey->u4KeyIndex & IS_UNICAST_KEY)
  2998. prCmdKey->ucKeyType = 1;
  2999. /* insert into prCmdQueue */
  3000. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  3001. /* wakeup txServiceThread later */
  3002. GLUE_SET_EVENT(prGlueInfo);
  3003. return WLAN_STATUS_PENDING;
  3004. } /* wlanoidSetRemoveKey */
  3005. /*----------------------------------------------------------------------------*/
  3006. /*!
  3007. * \brief This routine is called to query the current encryption status.
  3008. *
  3009. * \param[in] prAdapter Pointer to the Adapter structure.
  3010. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3011. * the query.
  3012. * \param[in] u4QueryBufferLen The length of the query buffer.
  3013. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3014. * bytes written into the query buffer. If the call
  3015. * failed due to invalid length of the query buffer,
  3016. * returns the amount of storage needed.
  3017. *
  3018. * \retval WLAN_STATUS_SUCCESS
  3019. */
  3020. /*----------------------------------------------------------------------------*/
  3021. WLAN_STATUS
  3022. wlanoidQueryEncryptionStatus(IN P_ADAPTER_T prAdapter,
  3023. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3024. {
  3025. BOOLEAN fgTransmitKeyAvailable = TRUE;
  3026. ENUM_PARAM_ENCRYPTION_STATUS_T eEncStatus = 0;
  3027. DEBUGFUNC("wlanoidQueryEncryptionStatus");
  3028. ASSERT(prAdapter);
  3029. ASSERT(pu4QueryInfoLen);
  3030. if (u4QueryBufferLen)
  3031. ASSERT(pvQueryBuffer);
  3032. *pu4QueryInfoLen = sizeof(ENUM_PARAM_ENCRYPTION_STATUS_T);
  3033. fgTransmitKeyAvailable = prAdapter->rWifiVar.rAisSpecificBssInfo.fgTransmitKeyExist;
  3034. switch (prAdapter->rWifiVar.rConnSettings.eEncStatus) {
  3035. case ENUM_ENCRYPTION3_ENABLED:
  3036. if (fgTransmitKeyAvailable)
  3037. eEncStatus = ENUM_ENCRYPTION3_ENABLED;
  3038. else
  3039. eEncStatus = ENUM_ENCRYPTION3_KEY_ABSENT;
  3040. break;
  3041. case ENUM_ENCRYPTION2_ENABLED:
  3042. if (fgTransmitKeyAvailable) {
  3043. eEncStatus = ENUM_ENCRYPTION2_ENABLED;
  3044. break;
  3045. }
  3046. eEncStatus = ENUM_ENCRYPTION2_KEY_ABSENT;
  3047. break;
  3048. case ENUM_ENCRYPTION1_ENABLED:
  3049. if (fgTransmitKeyAvailable)
  3050. eEncStatus = ENUM_ENCRYPTION1_ENABLED;
  3051. else
  3052. eEncStatus = ENUM_ENCRYPTION1_KEY_ABSENT;
  3053. break;
  3054. case ENUM_ENCRYPTION_DISABLED:
  3055. eEncStatus = ENUM_ENCRYPTION_DISABLED;
  3056. break;
  3057. default:
  3058. DBGLOG(OID, ERROR, "Unknown Encryption Status Setting:%d\n",
  3059. prAdapter->rWifiVar.rConnSettings.eEncStatus);
  3060. }
  3061. #if DBG
  3062. DBGLOG(OID, INFO,
  3063. "Encryption status: %d Return:%d\n", prAdapter->rWifiVar.rConnSettings.eEncStatus, eEncStatus);
  3064. #endif
  3065. *(P_ENUM_PARAM_ENCRYPTION_STATUS_T) pvQueryBuffer = eEncStatus;
  3066. return WLAN_STATUS_SUCCESS;
  3067. } /* wlanoidQueryEncryptionStatus */
  3068. /*----------------------------------------------------------------------------*/
  3069. /*!
  3070. * \brief This routine is called to set the encryption status to the driver.
  3071. *
  3072. * \param[in] prAdapter Pointer to the Adapter structure.
  3073. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  3074. * \param[in] u4SetBufferLen The length of the set buffer.
  3075. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3076. * bytes read from the set buffer. If the call failed
  3077. * due to invalid length of the set buffer, returns
  3078. * the amount of storage needed.
  3079. *
  3080. * \retval WLAN_STATUS_SUCCESS
  3081. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3082. * \retval WLAN_STATUS_NOT_SUPPORTED
  3083. */
  3084. /*----------------------------------------------------------------------------*/
  3085. WLAN_STATUS
  3086. wlanoidSetEncryptionStatus(IN P_ADAPTER_T prAdapter,
  3087. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3088. {
  3089. P_GLUE_INFO_T prGlueInfo;
  3090. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  3091. ENUM_PARAM_ENCRYPTION_STATUS_T eEewEncrypt;
  3092. DEBUGFUNC("wlanoidSetEncryptionStatus");
  3093. ASSERT(prAdapter);
  3094. ASSERT(pvSetBuffer);
  3095. ASSERT(pu4SetInfoLen);
  3096. prGlueInfo = prAdapter->prGlueInfo;
  3097. *pu4SetInfoLen = sizeof(ENUM_PARAM_ENCRYPTION_STATUS_T);
  3098. /* if (IS_ARB_IN_RFTEST_STATE(prAdapter)) { */
  3099. /* return WLAN_STATUS_SUCCESS; */
  3100. /* } */
  3101. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  3102. DBGLOG(OID, WARN, "Fail in set encryption status! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  3103. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  3104. return WLAN_STATUS_ADAPTER_NOT_READY;
  3105. }
  3106. eEewEncrypt = *(P_ENUM_PARAM_ENCRYPTION_STATUS_T) pvSetBuffer;
  3107. DBGLOG(OID, TRACE, "ENCRYPTION_STATUS %d\n", eEewEncrypt);
  3108. switch (eEewEncrypt) {
  3109. case ENUM_ENCRYPTION_DISABLED: /* Disable WEP, TKIP, AES */
  3110. DBGLOG(RSN, TRACE, "Disable Encryption\n");
  3111. secSetCipherSuite(prAdapter, CIPHER_FLAG_WEP40 | CIPHER_FLAG_WEP104 | CIPHER_FLAG_WEP128);
  3112. break;
  3113. case ENUM_ENCRYPTION1_ENABLED: /* Enable WEP. Disable TKIP, AES */
  3114. DBGLOG(RSN, TRACE, "Enable Encryption1\n");
  3115. secSetCipherSuite(prAdapter, CIPHER_FLAG_WEP40 | CIPHER_FLAG_WEP104 | CIPHER_FLAG_WEP128);
  3116. break;
  3117. case ENUM_ENCRYPTION2_ENABLED: /* Enable WEP, TKIP. Disable AES */
  3118. secSetCipherSuite(prAdapter,
  3119. CIPHER_FLAG_WEP40 | CIPHER_FLAG_WEP104 | CIPHER_FLAG_WEP128 | CIPHER_FLAG_TKIP);
  3120. DBGLOG(RSN, TRACE, "Enable Encryption2\n");
  3121. break;
  3122. case ENUM_ENCRYPTION3_ENABLED: /* Enable WEP, TKIP, AES */
  3123. secSetCipherSuite(prAdapter,
  3124. CIPHER_FLAG_WEP40 |
  3125. CIPHER_FLAG_WEP104 | CIPHER_FLAG_WEP128 | CIPHER_FLAG_TKIP | CIPHER_FLAG_CCMP);
  3126. DBGLOG(RSN, TRACE, "Enable Encryption3\n");
  3127. break;
  3128. default:
  3129. DBGLOG(RSN, WARN, "Unacceptible encryption status: %d\n",
  3130. *(P_ENUM_PARAM_ENCRYPTION_STATUS_T) pvSetBuffer);
  3131. rStatus = WLAN_STATUS_NOT_SUPPORTED;
  3132. }
  3133. if (rStatus == WLAN_STATUS_SUCCESS) {
  3134. /* Save the new encryption status. */
  3135. prAdapter->rWifiVar.rConnSettings.eEncStatus = *(P_ENUM_PARAM_ENCRYPTION_STATUS_T) pvSetBuffer;
  3136. DBGLOG(RSN, TRACE, "wlanoidSetEncryptionStatus to %d\n",
  3137. prAdapter->rWifiVar.rConnSettings.eEncStatus);
  3138. }
  3139. return rStatus;
  3140. } /* wlanoidSetEncryptionStatus */
  3141. /*----------------------------------------------------------------------------*/
  3142. /*!
  3143. * \brief This routine is called to test the driver.
  3144. *
  3145. * \param[in] prAdapter Pointer to the Adapter structure.
  3146. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  3147. * \param[in] u4SetBufferLen The length of the set buffer.
  3148. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3149. * bytes read from the set buffer. If the call failed
  3150. * due to invalid length of the set buffer, returns
  3151. * the amount of storage needed.
  3152. *
  3153. * \retval WLAN_STATUS_SUCCESS
  3154. * \retval WLAN_STATUS_INVALID_LENGTH
  3155. * \retval WLAN_STATUS_INVALID_DATA
  3156. */
  3157. /*----------------------------------------------------------------------------*/
  3158. WLAN_STATUS
  3159. wlanoidSetTest(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3160. {
  3161. P_PARAM_802_11_TEST_T prTest;
  3162. PVOID pvTestData;
  3163. PVOID pvStatusBuffer;
  3164. UINT_32 u4StatusBufferSize;
  3165. DEBUGFUNC("wlanoidSetTest");
  3166. ASSERT(prAdapter);
  3167. ASSERT(pu4SetInfoLen);
  3168. ASSERT(pvSetBuffer);
  3169. *pu4SetInfoLen = u4SetBufferLen;
  3170. prTest = (P_PARAM_802_11_TEST_T) pvSetBuffer;
  3171. DBGLOG(OID, TRACE, "Test - Type %u\n", prTest->u4Type);
  3172. switch (prTest->u4Type) {
  3173. case 1: /* Type 1: generate an authentication event */
  3174. pvTestData = (PVOID) &prTest->u.AuthenticationEvent;
  3175. pvStatusBuffer = (PVOID) prAdapter->aucIndicationEventBuffer;
  3176. u4StatusBufferSize = prTest->u4Length - 8;
  3177. if (u4StatusBufferSize > sizeof(PARAM_AUTH_EVENT_T)) {
  3178. DBGLOG(OID, TRACE, "prTest->u4Length error %u\n", u4StatusBufferSize);
  3179. ASSERT(FALSE);
  3180. }
  3181. break;
  3182. case 2: /* Type 2: generate an RSSI status indication */
  3183. pvTestData = (PVOID) &prTest->u.RssiTrigger;
  3184. pvStatusBuffer = (PVOID) &prAdapter->rWlanInfo.rCurrBssId.rRssi;
  3185. u4StatusBufferSize = sizeof(PARAM_RSSI);
  3186. break;
  3187. default:
  3188. return WLAN_STATUS_INVALID_DATA;
  3189. }
  3190. ASSERT(u4StatusBufferSize <= 180);
  3191. if (u4StatusBufferSize > 180)
  3192. return WLAN_STATUS_INVALID_LENGTH;
  3193. /* Get the contents of the StatusBuffer from the test structure. */
  3194. kalMemCopy(pvStatusBuffer, pvTestData, u4StatusBufferSize);
  3195. kalIndicateStatusAndComplete(prAdapter->prGlueInfo,
  3196. WLAN_STATUS_MEDIA_SPECIFIC_INDICATION, pvStatusBuffer, u4StatusBufferSize);
  3197. return WLAN_STATUS_SUCCESS;
  3198. } /* wlanoidSetTest */
  3199. /*----------------------------------------------------------------------------*/
  3200. /*!
  3201. * \brief This routine is called to query the driver's WPA2 status.
  3202. *
  3203. * \param[in] prAdapter Pointer to the Adapter structure.
  3204. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3205. * the query.
  3206. * \param[in] u4QueryBufferLen The length of the query buffer.
  3207. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3208. * bytes written into the query buffer. If the call
  3209. * failed due to invalid length of the query buffer,
  3210. * returns the amount of storage needed.
  3211. *
  3212. * \retval WLAN_STATUS_SUCCESS
  3213. * \retval WLAN_STATUS_INVALID_LENGTH
  3214. */
  3215. /*----------------------------------------------------------------------------*/
  3216. WLAN_STATUS
  3217. wlanoidQueryCapability(IN P_ADAPTER_T prAdapter,
  3218. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3219. {
  3220. P_PARAM_CAPABILITY_T prCap;
  3221. P_PARAM_AUTH_ENCRYPTION_T prAuthenticationEncryptionSupported;
  3222. DEBUGFUNC("wlanoidQueryCapability");
  3223. ASSERT(prAdapter);
  3224. ASSERT(pu4QueryInfoLen);
  3225. if (u4QueryBufferLen)
  3226. ASSERT(pvQueryBuffer);
  3227. *pu4QueryInfoLen = 4 * sizeof(UINT_32) + 14 * sizeof(PARAM_AUTH_ENCRYPTION_T);
  3228. if (u4QueryBufferLen < *pu4QueryInfoLen)
  3229. return WLAN_STATUS_INVALID_LENGTH;
  3230. prCap = (P_PARAM_CAPABILITY_T) pvQueryBuffer;
  3231. prCap->u4Length = *pu4QueryInfoLen;
  3232. prCap->u4Version = 2; /* WPA2 */
  3233. prCap->u4NoOfPMKIDs = CFG_MAX_PMKID_CACHE;
  3234. prCap->u4NoOfAuthEncryptPairsSupported = 14;
  3235. prAuthenticationEncryptionSupported = &prCap->arAuthenticationEncryptionSupported[0];
  3236. /* fill 14 entries of supported settings */
  3237. prAuthenticationEncryptionSupported[0].eAuthModeSupported = AUTH_MODE_OPEN;
  3238. prAuthenticationEncryptionSupported[0].eEncryptStatusSupported = ENUM_ENCRYPTION_DISABLED;
  3239. prAuthenticationEncryptionSupported[1].eAuthModeSupported = AUTH_MODE_OPEN;
  3240. prAuthenticationEncryptionSupported[1].eEncryptStatusSupported = ENUM_ENCRYPTION1_ENABLED;
  3241. prAuthenticationEncryptionSupported[2].eAuthModeSupported = AUTH_MODE_SHARED;
  3242. prAuthenticationEncryptionSupported[2].eEncryptStatusSupported = ENUM_ENCRYPTION_DISABLED;
  3243. prAuthenticationEncryptionSupported[3].eAuthModeSupported = AUTH_MODE_SHARED;
  3244. prAuthenticationEncryptionSupported[3].eEncryptStatusSupported = ENUM_ENCRYPTION1_ENABLED;
  3245. prAuthenticationEncryptionSupported[4].eAuthModeSupported = AUTH_MODE_WPA;
  3246. prAuthenticationEncryptionSupported[4].eEncryptStatusSupported = ENUM_ENCRYPTION2_ENABLED;
  3247. prAuthenticationEncryptionSupported[5].eAuthModeSupported = AUTH_MODE_WPA;
  3248. prAuthenticationEncryptionSupported[5].eEncryptStatusSupported = ENUM_ENCRYPTION3_ENABLED;
  3249. prAuthenticationEncryptionSupported[6].eAuthModeSupported = AUTH_MODE_WPA_PSK;
  3250. prAuthenticationEncryptionSupported[6].eEncryptStatusSupported = ENUM_ENCRYPTION2_ENABLED;
  3251. prAuthenticationEncryptionSupported[7].eAuthModeSupported = AUTH_MODE_WPA_PSK;
  3252. prAuthenticationEncryptionSupported[7].eEncryptStatusSupported = ENUM_ENCRYPTION3_ENABLED;
  3253. prAuthenticationEncryptionSupported[8].eAuthModeSupported = AUTH_MODE_WPA_NONE;
  3254. prAuthenticationEncryptionSupported[8].eEncryptStatusSupported = ENUM_ENCRYPTION2_ENABLED;
  3255. prAuthenticationEncryptionSupported[9].eAuthModeSupported = AUTH_MODE_WPA_NONE;
  3256. prAuthenticationEncryptionSupported[9].eEncryptStatusSupported = ENUM_ENCRYPTION3_ENABLED;
  3257. prAuthenticationEncryptionSupported[10].eAuthModeSupported = AUTH_MODE_WPA2;
  3258. prAuthenticationEncryptionSupported[10].eEncryptStatusSupported = ENUM_ENCRYPTION2_ENABLED;
  3259. prAuthenticationEncryptionSupported[11].eAuthModeSupported = AUTH_MODE_WPA2;
  3260. prAuthenticationEncryptionSupported[11].eEncryptStatusSupported = ENUM_ENCRYPTION3_ENABLED;
  3261. prAuthenticationEncryptionSupported[12].eAuthModeSupported = AUTH_MODE_WPA2_PSK;
  3262. prAuthenticationEncryptionSupported[12].eEncryptStatusSupported = ENUM_ENCRYPTION2_ENABLED;
  3263. prAuthenticationEncryptionSupported[13].eAuthModeSupported = AUTH_MODE_WPA2_PSK;
  3264. prAuthenticationEncryptionSupported[13].eEncryptStatusSupported = ENUM_ENCRYPTION3_ENABLED;
  3265. return WLAN_STATUS_SUCCESS;
  3266. } /* wlanoidQueryCapability */
  3267. /*----------------------------------------------------------------------------*/
  3268. /*!
  3269. * \brief This routine is called to query the PMKID in the PMK cache.
  3270. *
  3271. * \param[in] prAdapter Pointer to the Adapter structure.
  3272. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3273. * the query.
  3274. * \param[in] u4QueryBufferLen The length of the query buffer.
  3275. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3276. * bytes written into the query buffer. If the call
  3277. * failed due to invalid length of the query buffer,
  3278. * returns the amount of storage needed.
  3279. *
  3280. * \retval WLAN_STATUS_SUCCESS
  3281. * \retval WLAN_STATUS_INVALID_LENGTH
  3282. */
  3283. /*----------------------------------------------------------------------------*/
  3284. WLAN_STATUS
  3285. wlanoidQueryPmkid(IN P_ADAPTER_T prAdapter,
  3286. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3287. {
  3288. UINT_32 i;
  3289. P_PARAM_PMKID_T prPmkid;
  3290. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  3291. DEBUGFUNC("wlanoidQueryPmkid");
  3292. ASSERT(prAdapter);
  3293. ASSERT(pu4QueryInfoLen);
  3294. if (u4QueryBufferLen)
  3295. ASSERT(pvQueryBuffer);
  3296. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  3297. *pu4QueryInfoLen = OFFSET_OF(PARAM_PMKID_T, arBSSIDInfo) +
  3298. prAisSpecBssInfo->u4PmkidCacheCount * sizeof(PARAM_BSSID_INFO_T);
  3299. if (u4QueryBufferLen < *pu4QueryInfoLen)
  3300. return WLAN_STATUS_INVALID_LENGTH;
  3301. prPmkid = (P_PARAM_PMKID_T) pvQueryBuffer;
  3302. prPmkid->u4Length = *pu4QueryInfoLen;
  3303. prPmkid->u4BSSIDInfoCount = prAisSpecBssInfo->u4PmkidCacheCount;
  3304. for (i = 0; i < prAisSpecBssInfo->u4PmkidCacheCount; i++) {
  3305. kalMemCopy(prPmkid->arBSSIDInfo[i].arBSSID,
  3306. prAisSpecBssInfo->arPmkidCache[i].rBssidInfo.arBSSID, sizeof(PARAM_MAC_ADDRESS));
  3307. kalMemCopy(prPmkid->arBSSIDInfo[i].arPMKID,
  3308. prAisSpecBssInfo->arPmkidCache[i].rBssidInfo.arPMKID, sizeof(PARAM_PMKID_VALUE));
  3309. }
  3310. return WLAN_STATUS_SUCCESS;
  3311. } /* wlanoidQueryPmkid */
  3312. /*----------------------------------------------------------------------------*/
  3313. /*!
  3314. * \brief This routine is called to set the PMKID to the PMK cache in the driver.
  3315. *
  3316. * \param[in] prAdapter Pointer to the Adapter structure.
  3317. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  3318. * \param[in] u4SetBufferLen The length of the set buffer.
  3319. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3320. * bytes read from the set buffer. If the call failed
  3321. * due to invalid length of the set buffer, returns
  3322. * the amount of storage needed.
  3323. *
  3324. * \retval WLAN_STATUS_SUCCESS
  3325. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  3326. * \retval WLAN_STATUS_INVALID_DATA
  3327. */
  3328. /*----------------------------------------------------------------------------*/
  3329. WLAN_STATUS
  3330. wlanoidSetPmkid(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3331. {
  3332. UINT_32 i, j;
  3333. P_PARAM_PMKID_T prPmkid;
  3334. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  3335. DEBUGFUNC("wlanoidSetPmkid");
  3336. ASSERT(prAdapter);
  3337. ASSERT(pu4SetInfoLen);
  3338. *pu4SetInfoLen = u4SetBufferLen;
  3339. /* It's possibble BSSIDInfoCount is zero, because OS wishes to clean PMKID */
  3340. if (u4SetBufferLen < OFFSET_OF(PARAM_PMKID_T, arBSSIDInfo))
  3341. return WLAN_STATUS_BUFFER_TOO_SHORT;
  3342. ASSERT(pvSetBuffer);
  3343. prPmkid = (P_PARAM_PMKID_T) pvSetBuffer;
  3344. if (u4SetBufferLen <
  3345. ((prPmkid->u4BSSIDInfoCount * sizeof(PARAM_BSSID_INFO_T)) + OFFSET_OF(PARAM_PMKID_T, arBSSIDInfo)))
  3346. return WLAN_STATUS_INVALID_DATA;
  3347. if (prPmkid->u4BSSIDInfoCount > CFG_MAX_PMKID_CACHE)
  3348. return WLAN_STATUS_INVALID_DATA;
  3349. DBGLOG(OID, TRACE, "Count %u\n", prPmkid->u4BSSIDInfoCount);
  3350. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  3351. /* This OID replace everything in the PMKID cache. */
  3352. if (prPmkid->u4BSSIDInfoCount == 0) {
  3353. prAisSpecBssInfo->u4PmkidCacheCount = 0;
  3354. kalMemZero(prAisSpecBssInfo->arPmkidCache, sizeof(PMKID_ENTRY_T) * CFG_MAX_PMKID_CACHE);
  3355. }
  3356. if ((prAisSpecBssInfo->u4PmkidCacheCount + prPmkid->u4BSSIDInfoCount > CFG_MAX_PMKID_CACHE)) {
  3357. prAisSpecBssInfo->u4PmkidCacheCount = 0;
  3358. kalMemZero(prAisSpecBssInfo->arPmkidCache, sizeof(PMKID_ENTRY_T) * CFG_MAX_PMKID_CACHE);
  3359. }
  3360. /*
  3361. The driver can only clear its PMKID cache whenever it make a media disconnect
  3362. indication. Otherwise, it must change the PMKID cache only when set through this OID.
  3363. */
  3364. #if CFG_RSN_MIGRATION
  3365. for (i = 0; i < prPmkid->u4BSSIDInfoCount; i++) {
  3366. /* Search for desired BSSID. If desired BSSID is found,
  3367. then set the PMKID */
  3368. if (!rsnSearchPmkidEntry(prAdapter, (PUINT_8) prPmkid->arBSSIDInfo[i].arBSSID, &j)) {
  3369. /* No entry found for the specified BSSID, so add one entry */
  3370. if (prAisSpecBssInfo->u4PmkidCacheCount < CFG_MAX_PMKID_CACHE - 1) {
  3371. j = prAisSpecBssInfo->u4PmkidCacheCount;
  3372. kalMemCopy(prAisSpecBssInfo->arPmkidCache[j].rBssidInfo.arBSSID,
  3373. prPmkid->arBSSIDInfo[i].arBSSID, sizeof(PARAM_MAC_ADDRESS));
  3374. prAisSpecBssInfo->u4PmkidCacheCount++;
  3375. } else {
  3376. j = CFG_MAX_PMKID_CACHE;
  3377. }
  3378. }
  3379. if (j < CFG_MAX_PMKID_CACHE) {
  3380. kalMemCopy(prAisSpecBssInfo->arPmkidCache[j].rBssidInfo.arPMKID,
  3381. prPmkid->arBSSIDInfo[i].arPMKID, sizeof(PARAM_PMKID_VALUE));
  3382. DBGLOG(RSN, TRACE, "Add BSSID %pM idx=%d PMKID value %pM\n",
  3383. (prAisSpecBssInfo->arPmkidCache[j].rBssidInfo.arBSSID), (UINT_32) j,
  3384. (prAisSpecBssInfo->arPmkidCache[j].rBssidInfo.arPMKID));
  3385. prAisSpecBssInfo->arPmkidCache[j].fgPmkidExist = TRUE;
  3386. }
  3387. }
  3388. #endif
  3389. return WLAN_STATUS_SUCCESS;
  3390. } /* wlanoidSetPmkid */
  3391. /*----------------------------------------------------------------------------*/
  3392. /*!
  3393. * \brief This routine is called to query the set of supported data rates that
  3394. * the radio is capable of running
  3395. *
  3396. * \param[in] prAdapter Pointer to the Adapter structure
  3397. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3398. * the query
  3399. * \param[in] u4QueryBufferLen The length of the query buffer
  3400. * \param[out] pu4QueryInfoLen If the call is successful, returns the number
  3401. * of bytes written into the query buffer. If the
  3402. * call failed due to invalid length of the query
  3403. * buffer, returns the amount of storage needed.
  3404. *
  3405. * \retval WLAN_STATUS_SUCCESS
  3406. * \retval WLAN_STATUS_INVALID_LENGTH
  3407. */
  3408. /*----------------------------------------------------------------------------*/
  3409. WLAN_STATUS
  3410. wlanoidQuerySupportedRates(IN P_ADAPTER_T prAdapter,
  3411. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3412. {
  3413. PARAM_RATES eRate = {
  3414. /* BSSBasicRateSet for 802.11n Non-HT rates */
  3415. 0x8C, /* 6M */
  3416. 0x92, /* 9M */
  3417. 0x98, /* 12M */
  3418. 0xA4, /* 18M */
  3419. 0xB0, /* 24M */
  3420. 0xC8, /* 36M */
  3421. 0xE0, /* 48M */
  3422. 0xEC /* 54M */
  3423. };
  3424. DEBUGFUNC("wlanoidQuerySupportedRates");
  3425. ASSERT(prAdapter);
  3426. ASSERT(pu4QueryInfoLen);
  3427. if (u4QueryBufferLen)
  3428. ASSERT(pvQueryBuffer);
  3429. *pu4QueryInfoLen = sizeof(PARAM_RATES_EX);
  3430. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  3431. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  3432. return WLAN_STATUS_INVALID_LENGTH;
  3433. }
  3434. kalMemCopy(pvQueryBuffer, (PVOID) &eRate, sizeof(PARAM_RATES));
  3435. return WLAN_STATUS_SUCCESS;
  3436. } /* end of wlanoidQuerySupportedRates() */
  3437. /*----------------------------------------------------------------------------*/
  3438. /*!
  3439. * \brief This routine is called to query current desired rates.
  3440. *
  3441. * \param[in] prAdapter Pointer to the Adapter structure.
  3442. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  3443. * the query.
  3444. * \param[in] u4QueryBufferLen The length of the query buffer.
  3445. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3446. * bytes written into the query buffer. If the call
  3447. * failed due to invalid length of the query buffer,
  3448. * returns the amount of storage needed.
  3449. *
  3450. * \retval WLAN_STATUS_SUCCESS
  3451. * \retval WLAN_STATUS_INVALID_LENGTH
  3452. */
  3453. /*----------------------------------------------------------------------------*/
  3454. WLAN_STATUS
  3455. wlanoidQueryDesiredRates(IN P_ADAPTER_T prAdapter,
  3456. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3457. {
  3458. DEBUGFUNC("wlanoidQueryDesiredRates");
  3459. ASSERT(prAdapter);
  3460. ASSERT(pu4QueryInfoLen);
  3461. if (u4QueryBufferLen)
  3462. ASSERT(pvQueryBuffer);
  3463. *pu4QueryInfoLen = sizeof(PARAM_RATES_EX);
  3464. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  3465. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  3466. return WLAN_STATUS_INVALID_LENGTH;
  3467. }
  3468. kalMemCopy(pvQueryBuffer, (PVOID) &(prAdapter->rWlanInfo.eDesiredRates), sizeof(PARAM_RATES));
  3469. return WLAN_STATUS_SUCCESS;
  3470. } /* end of wlanoidQueryDesiredRates() */
  3471. /*----------------------------------------------------------------------------*/
  3472. /*!
  3473. * \brief This routine is called to Set the desired rates.
  3474. *
  3475. * \param[in] prAdapter Pointer to the Adapter structure.
  3476. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  3477. * \param[in] u4SetBufferLen The length of the set buffer.
  3478. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3479. * bytes read from the set buffer. If the call failed
  3480. * due to invalid length of the set buffer, returns
  3481. * the amount of storage needed.
  3482. *
  3483. *
  3484. * \retval WLAN_STATUS_SUCCESS
  3485. * \retval WLAN_STATUS_INVALID_LENGTH
  3486. * \retval WLAN_STATUS_INVALID_DATA
  3487. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3488. */
  3489. /*----------------------------------------------------------------------------*/
  3490. WLAN_STATUS
  3491. wlanoidSetDesiredRates(IN P_ADAPTER_T prAdapter,
  3492. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3493. {
  3494. UINT_32 i;
  3495. DEBUGFUNC("wlanoidSetDesiredRates");
  3496. ASSERT(prAdapter);
  3497. ASSERT(pvSetBuffer);
  3498. ASSERT(pu4SetInfoLen);
  3499. if (u4SetBufferLen < sizeof(PARAM_RATES)) {
  3500. DBGLOG(OID, WARN, "Invalid length %u\n", u4SetBufferLen);
  3501. return WLAN_STATUS_INVALID_LENGTH;
  3502. }
  3503. *pu4SetInfoLen = sizeof(PARAM_RATES);
  3504. if (u4SetBufferLen < sizeof(PARAM_RATES))
  3505. return WLAN_STATUS_INVALID_LENGTH;
  3506. kalMemCopy((PVOID) &(prAdapter->rWlanInfo.eDesiredRates), pvSetBuffer, sizeof(PARAM_RATES));
  3507. prAdapter->rWlanInfo.eLinkAttr.ucDesiredRateLen = PARAM_MAX_LEN_RATES;
  3508. for (i = 0; i < PARAM_MAX_LEN_RATES; i++)
  3509. prAdapter->rWlanInfo.eLinkAttr.u2DesiredRate[i] = (UINT_16) (prAdapter->rWlanInfo.eDesiredRates[i]);
  3510. return wlanSendSetQueryCmd(prAdapter,
  3511. CMD_ID_LINK_ATTRIB,
  3512. TRUE,
  3513. FALSE,
  3514. TRUE,
  3515. nicCmdEventSetCommon,
  3516. nicOidCmdTimeoutCommon,
  3517. sizeof(CMD_LINK_ATTRIB),
  3518. (PUINT_8) &(prAdapter->rWlanInfo.eLinkAttr), pvSetBuffer, u4SetBufferLen);
  3519. } /* end of wlanoidSetDesiredRates() */
  3520. /*----------------------------------------------------------------------------*/
  3521. /*!
  3522. * \brief This routine is called to query the maximum frame size in bytes,
  3523. * not including the header.
  3524. *
  3525. * \param[in] prAdapter Pointer to the Adapter structure.
  3526. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3527. * the query.
  3528. * \param[in] u4QueryBufferLen The length of the query buffer.
  3529. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3530. * bytes written into the query buffer. If the
  3531. * call failed due to invalid length of the query
  3532. * buffer, returns the amount of storage needed.
  3533. *
  3534. * \retval WLAN_STATUS_SUCCESS
  3535. * \retval WLAN_STATUS_INVALID_LENGTH
  3536. */
  3537. /*----------------------------------------------------------------------------*/
  3538. WLAN_STATUS
  3539. wlanoidQueryMaxFrameSize(IN P_ADAPTER_T prAdapter,
  3540. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3541. {
  3542. DEBUGFUNC("wlanoidQueryMaxFrameSize");
  3543. ASSERT(prAdapter);
  3544. ASSERT(pu4QueryInfoLen);
  3545. if (u4QueryBufferLen)
  3546. ASSERT(pvQueryBuffer);
  3547. if (u4QueryBufferLen < sizeof(UINT_32)) {
  3548. *pu4QueryInfoLen = sizeof(UINT_32);
  3549. return WLAN_STATUS_INVALID_LENGTH;
  3550. }
  3551. *(PUINT_32) pvQueryBuffer = ETHERNET_MAX_PKT_SZ - ETHERNET_HEADER_SZ;
  3552. *pu4QueryInfoLen = sizeof(UINT_32);
  3553. return WLAN_STATUS_SUCCESS;
  3554. } /* wlanoidQueryMaxFrameSize */
  3555. /*----------------------------------------------------------------------------*/
  3556. /*!
  3557. * \brief This routine is called to query the maximum total packet length
  3558. * in bytes.
  3559. *
  3560. * \param[in] prAdapter Pointer to the Adapter structure.
  3561. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3562. * the query.
  3563. * \param[in] u4QueryBufferLen The length of the query buffer.
  3564. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3565. * bytes written into the query buffer. If the call
  3566. * failed due to invalid length of the query buffer,
  3567. * returns the amount of storage needed.
  3568. *
  3569. * \retval WLAN_STATUS_SUCCESS
  3570. * \retval WLAN_STATUS_INVALID_LENGTH
  3571. */
  3572. /*----------------------------------------------------------------------------*/
  3573. WLAN_STATUS
  3574. wlanoidQueryMaxTotalSize(IN P_ADAPTER_T prAdapter,
  3575. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3576. {
  3577. DEBUGFUNC("wlanoidQueryMaxTotalSize");
  3578. ASSERT(prAdapter);
  3579. ASSERT(pu4QueryInfoLen);
  3580. if (u4QueryBufferLen)
  3581. ASSERT(pvQueryBuffer);
  3582. if (u4QueryBufferLen < sizeof(UINT_32)) {
  3583. *pu4QueryInfoLen = sizeof(UINT_32);
  3584. return WLAN_STATUS_INVALID_LENGTH;
  3585. }
  3586. *(PUINT_32) pvQueryBuffer = ETHERNET_MAX_PKT_SZ;
  3587. *pu4QueryInfoLen = sizeof(UINT_32);
  3588. return WLAN_STATUS_SUCCESS;
  3589. } /* wlanoidQueryMaxTotalSize */
  3590. /*----------------------------------------------------------------------------*/
  3591. /*!
  3592. * \brief This routine is called to query the vendor ID of the NIC.
  3593. *
  3594. * \param[in] prAdapter Pointer to the Adapter structure.
  3595. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3596. * the query.
  3597. * \param[in] u4QueryBufferLen The length of the query buffer.
  3598. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3599. * bytes written into the query buffer. If the call
  3600. * failed due to invalid length of the query buffer,
  3601. * returns the amount of storage needed.
  3602. *
  3603. * \retval WLAN_STATUS_SUCCESS
  3604. * \retval WLAN_STATUS_INVALID_LENGTH
  3605. */
  3606. /*----------------------------------------------------------------------------*/
  3607. WLAN_STATUS
  3608. wlanoidQueryVendorId(IN P_ADAPTER_T prAdapter,
  3609. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3610. {
  3611. #if DBG
  3612. PUINT_8 cp;
  3613. #endif
  3614. DEBUGFUNC("wlanoidQueryVendorId");
  3615. ASSERT(prAdapter);
  3616. ASSERT(pu4QueryInfoLen);
  3617. if (u4QueryBufferLen)
  3618. ASSERT(pvQueryBuffer);
  3619. if (u4QueryBufferLen < sizeof(UINT_32)) {
  3620. *pu4QueryInfoLen = sizeof(UINT_32);
  3621. return WLAN_STATUS_INVALID_LENGTH;
  3622. }
  3623. kalMemCopy(pvQueryBuffer, prAdapter->aucMacAddress, 3);
  3624. *((PUINT_8) pvQueryBuffer + 3) = 1;
  3625. *pu4QueryInfoLen = sizeof(UINT_32);
  3626. #if DBG
  3627. cp = (PUINT_8) pvQueryBuffer;
  3628. DBGLOG(OID, LOUD, "Vendor ID=%02x-%02x-%02x-%02x\n", cp[0], cp[1], cp[2], cp[3]);
  3629. #endif
  3630. return WLAN_STATUS_SUCCESS;
  3631. } /* wlanoidQueryVendorId */
  3632. /*----------------------------------------------------------------------------*/
  3633. /*!
  3634. * \brief This routine is called to query the current RSSI value.
  3635. *
  3636. * \param[in] prAdapter Pointer to the Adapter structure.
  3637. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of the query.
  3638. * \param[in] u4QueryBufferLen The length of the query buffer.
  3639. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3640. * bytes written into the query buffer. If the call failed due to invalid length of
  3641. * the query buffer, returns the amount of storage needed.
  3642. *
  3643. * \retval WLAN_STATUS_SUCCESS
  3644. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  3645. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3646. */
  3647. /*----------------------------------------------------------------------------*/
  3648. WLAN_STATUS
  3649. wlanoidQueryRssi(IN P_ADAPTER_T prAdapter,
  3650. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3651. {
  3652. DEBUGFUNC("wlanoidQueryRssi");
  3653. ASSERT(prAdapter);
  3654. ASSERT(pu4QueryInfoLen);
  3655. if (u4QueryBufferLen)
  3656. ASSERT(pvQueryBuffer);
  3657. *pu4QueryInfoLen = sizeof(PARAM_RSSI);
  3658. /* Check for query buffer length */
  3659. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  3660. DBGLOG(OID, WARN, "Too short length %u\n", u4QueryBufferLen);
  3661. return WLAN_STATUS_BUFFER_TOO_SHORT;
  3662. }
  3663. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_DISCONNECTED) {
  3664. return WLAN_STATUS_ADAPTER_NOT_READY;
  3665. } else if (prAdapter->fgIsLinkQualityValid == TRUE &&
  3666. (kalGetTimeTick() - prAdapter->rLinkQualityUpdateTime) <= CFG_LINK_QUALITY_VALID_PERIOD) {
  3667. PARAM_RSSI rRssi;
  3668. rRssi = (PARAM_RSSI) prAdapter->rLinkQuality.cRssi; /* ranged from (-128 ~ 30) in unit of dBm */
  3669. if (rRssi > PARAM_WHQL_RSSI_MAX_DBM)
  3670. rRssi = PARAM_WHQL_RSSI_MAX_DBM;
  3671. else if (rRssi < PARAM_WHQL_RSSI_MIN_DBM)
  3672. rRssi = PARAM_WHQL_RSSI_MIN_DBM;
  3673. kalMemCopy(pvQueryBuffer, &rRssi, sizeof(PARAM_RSSI));
  3674. return WLAN_STATUS_SUCCESS;
  3675. }
  3676. #ifdef LINUX
  3677. return wlanSendSetQueryCmd(prAdapter,
  3678. CMD_ID_GET_LINK_QUALITY,
  3679. FALSE,
  3680. TRUE,
  3681. TRUE,
  3682. nicCmdEventQueryLinkQuality,
  3683. nicOidCmdTimeoutCommon,
  3684. *pu4QueryInfoLen, pvQueryBuffer, pvQueryBuffer, u4QueryBufferLen);
  3685. #else
  3686. return wlanSendSetQueryCmd(prAdapter,
  3687. CMD_ID_GET_LINK_QUALITY,
  3688. FALSE,
  3689. TRUE,
  3690. TRUE,
  3691. nicCmdEventQueryLinkQuality,
  3692. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  3693. #endif
  3694. } /* end of wlanoidQueryRssi() */
  3695. /*----------------------------------------------------------------------------*/
  3696. /*!
  3697. * \brief This routine is called to query the current RSSI trigger value.
  3698. *
  3699. * \param[in] prAdapter Pointer to the Adapter structure.
  3700. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of the query.
  3701. * \param[in] u4QueryBufferLen The length of the query buffer.
  3702. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3703. * bytes written into the query buffer. If the call failed due to invalid length of
  3704. * the query buffer, returns the amount of storage needed.
  3705. *
  3706. * \retval WLAN_STATUS_SUCCESS
  3707. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  3708. */
  3709. /*----------------------------------------------------------------------------*/
  3710. WLAN_STATUS
  3711. wlanoidQueryRssiTrigger(IN P_ADAPTER_T prAdapter,
  3712. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3713. {
  3714. DEBUGFUNC("wlanoidQueryRssiTrigger");
  3715. ASSERT(prAdapter);
  3716. ASSERT(pu4QueryInfoLen);
  3717. if (u4QueryBufferLen)
  3718. ASSERT(pvQueryBuffer);
  3719. if (prAdapter->rWlanInfo.eRssiTriggerType == ENUM_RSSI_TRIGGER_NONE)
  3720. return WLAN_STATUS_ADAPTER_NOT_READY;
  3721. *pu4QueryInfoLen = sizeof(PARAM_RSSI);
  3722. /* Check for query buffer length */
  3723. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  3724. DBGLOG(OID, WARN, "Too short length %u\n", u4QueryBufferLen);
  3725. return WLAN_STATUS_BUFFER_TOO_SHORT;
  3726. }
  3727. *(PARAM_RSSI *) pvQueryBuffer = prAdapter->rWlanInfo.rRssiTriggerValue;
  3728. DBGLOG(OID, INFO, "RSSI trigger: %d dBm\n", *(PARAM_RSSI *) pvQueryBuffer);
  3729. return WLAN_STATUS_SUCCESS;
  3730. } /* wlanoidQueryRssiTrigger */
  3731. /*----------------------------------------------------------------------------*/
  3732. /*!
  3733. * \brief This routine is called to set a trigger value of the RSSI event.
  3734. *
  3735. * \param[in] prAdapter Pointer to the Adapter structure
  3736. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  3737. * \param[in] u4SetBufferLen The length of the set buffer.
  3738. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3739. * bytes read from the set buffer. If the call failed
  3740. * due to invalid length of the set buffer, returns the
  3741. * amount of storage needed.
  3742. *
  3743. * \retval WLAN_STATUS_SUCCESS
  3744. *
  3745. */
  3746. /*----------------------------------------------------------------------------*/
  3747. WLAN_STATUS
  3748. wlanoidSetRssiTrigger(IN P_ADAPTER_T prAdapter,
  3749. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3750. {
  3751. PARAM_RSSI rRssiTriggerValue;
  3752. DEBUGFUNC("wlanoidSetRssiTrigger");
  3753. ASSERT(prAdapter);
  3754. ASSERT(pvSetBuffer);
  3755. ASSERT(pu4SetInfoLen);
  3756. *pu4SetInfoLen = sizeof(PARAM_RSSI);
  3757. rRssiTriggerValue = *(PARAM_RSSI *) pvSetBuffer;
  3758. if (rRssiTriggerValue > PARAM_WHQL_RSSI_MAX_DBM || rRssiTriggerValue < PARAM_WHQL_RSSI_MIN_DBM)
  3759. return
  3760. /* Save the RSSI trigger value to the Adapter structure */
  3761. prAdapter->rWlanInfo.rRssiTriggerValue = rRssiTriggerValue;
  3762. /* If the RSSI trigger value is equal to the current RSSI value, the
  3763. * indication triggers immediately. We need to indicate the protocol
  3764. * that an RSSI status indication event triggers. */
  3765. if (rRssiTriggerValue == (PARAM_RSSI) (prAdapter->rLinkQuality.cRssi)) {
  3766. prAdapter->rWlanInfo.eRssiTriggerType = ENUM_RSSI_TRIGGER_TRIGGERED;
  3767. kalIndicateStatusAndComplete(prAdapter->prGlueInfo,
  3768. WLAN_STATUS_MEDIA_SPECIFIC_INDICATION,
  3769. (PVOID) &prAdapter->rWlanInfo.rRssiTriggerValue, sizeof(PARAM_RSSI));
  3770. } else if (rRssiTriggerValue < (PARAM_RSSI) (prAdapter->rLinkQuality.cRssi))
  3771. prAdapter->rWlanInfo.eRssiTriggerType = ENUM_RSSI_TRIGGER_GREATER;
  3772. else if (rRssiTriggerValue > (PARAM_RSSI) (prAdapter->rLinkQuality.cRssi))
  3773. prAdapter->rWlanInfo.eRssiTriggerType = ENUM_RSSI_TRIGGER_LESS;
  3774. return WLAN_STATUS_SUCCESS;
  3775. } /* wlanoidSetRssiTrigger */
  3776. /*----------------------------------------------------------------------------*/
  3777. /*!
  3778. * \brief This routine is called to set a suggested value for the number of
  3779. * bytes of received packet data that will be indicated to the protocol
  3780. * driver. We just accept the set and ignore this value.
  3781. *
  3782. * \param[in] prAdapter Pointer to the Adapter structure.
  3783. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  3784. * \param[in] u4SetBufferLen The length of the set buffer.
  3785. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3786. * bytes read from the set buffer. If the call failed
  3787. * due to invalid length of the set buffer, returns
  3788. * the amount of storage needed.
  3789. *
  3790. * \retval WLAN_STATUS_SUCCESS
  3791. * \retval WLAN_STATUS_INVALID_LENGTH
  3792. */
  3793. /*----------------------------------------------------------------------------*/
  3794. WLAN_STATUS
  3795. wlanoidSetCurrentLookahead(IN P_ADAPTER_T prAdapter,
  3796. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3797. {
  3798. DEBUGFUNC("wlanoidSetCurrentLookahead");
  3799. ASSERT(prAdapter);
  3800. ASSERT(pvSetBuffer);
  3801. ASSERT(pu4SetInfoLen);
  3802. if (u4SetBufferLen < sizeof(UINT_32)) {
  3803. *pu4SetInfoLen = sizeof(UINT_32);
  3804. return WLAN_STATUS_INVALID_LENGTH;
  3805. }
  3806. *pu4SetInfoLen = sizeof(UINT_32);
  3807. return WLAN_STATUS_SUCCESS;
  3808. } /* wlanoidSetCurrentLookahead */
  3809. /*----------------------------------------------------------------------------*/
  3810. /*!
  3811. * \brief This routine is called to query the number of frames that the driver
  3812. * receives but does not indicate to the protocols due to errors.
  3813. *
  3814. * \param[in] pvAdapter Pointer to the Adapter structure.
  3815. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  3816. * the query.
  3817. * \param[in] u4QueryBufLen The length of the query buffer.
  3818. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3819. * bytes written into the query buffer. If the call
  3820. * failed due to invalid length of the query buffer,
  3821. * returns the amount of storage needed.
  3822. *
  3823. * \retval WLAN_STATUS_SUCCESS
  3824. * \retval WLAN_STATUS_INVALID_LENGTH
  3825. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3826. */
  3827. /*----------------------------------------------------------------------------*/
  3828. WLAN_STATUS
  3829. wlanoidQueryRcvError(IN P_ADAPTER_T prAdapter,
  3830. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3831. {
  3832. DEBUGFUNC("wlanoidQueryRcvError");
  3833. DBGLOG(OID, LOUD, "\n");
  3834. ASSERT(prAdapter);
  3835. if (u4QueryBufferLen)
  3836. ASSERT(pvQueryBuffer);
  3837. ASSERT(pu4QueryInfoLen);
  3838. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  3839. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  3840. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  3841. *pu4QueryInfoLen = sizeof(UINT_32);
  3842. return WLAN_STATUS_ADAPTER_NOT_READY;
  3843. } else if (u4QueryBufferLen < sizeof(UINT_32)
  3844. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  3845. *pu4QueryInfoLen = sizeof(UINT_64);
  3846. return WLAN_STATUS_INVALID_LENGTH;
  3847. }
  3848. #if CFG_ENABLE_STATISTICS_BUFFERING
  3849. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  3850. /* @FIXME, RX_ERROR_DROP_COUNT/RX_FIFO_FULL_DROP_COUNT is not calculated */
  3851. if (u4QueryBufferLen == sizeof(UINT_32)) {
  3852. *pu4QueryInfoLen = sizeof(UINT_32);
  3853. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rFCSErrorCount.QuadPart;
  3854. } else {
  3855. *pu4QueryInfoLen = sizeof(UINT_64);
  3856. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rFCSErrorCount.QuadPart;
  3857. }
  3858. return WLAN_STATUS_SUCCESS;
  3859. }
  3860. #endif
  3861. return wlanSendSetQueryCmd(prAdapter,
  3862. CMD_ID_GET_STATISTICS,
  3863. FALSE,
  3864. TRUE,
  3865. TRUE,
  3866. nicCmdEventQueryRecvError,
  3867. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  3868. } /* wlanoidQueryRcvError */
  3869. /*----------------------------------------------------------------------------*/
  3870. /*! \brief This routine is called to query the number of frames that the NIC
  3871. * cannot receive due to lack of NIC receive buffer space.
  3872. *
  3873. * \param[in] pvAdapter Pointer to the Adapter structure
  3874. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  3875. * query buffer
  3876. * \param[in] u4QueryBufLen The length of the query buffer
  3877. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3878. * bytes written into the query buffer. If the call
  3879. * failed due to invalid length of the query buffer,
  3880. * returns the amount of storage needed.
  3881. *
  3882. * \retval WLAN_STATUS_SUCCESS If success;
  3883. * \retval WLAN_STATUS_INVALID_LENGTH
  3884. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3885. */
  3886. /*----------------------------------------------------------------------------*/
  3887. WLAN_STATUS
  3888. wlanoidQueryRcvNoBuffer(IN P_ADAPTER_T prAdapter,
  3889. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3890. {
  3891. DEBUGFUNC("wlanoidQueryRcvNoBuffer");
  3892. DBGLOG(OID, LOUD, "\n");
  3893. ASSERT(prAdapter);
  3894. if (u4QueryBufferLen)
  3895. ASSERT(pvQueryBuffer);
  3896. ASSERT(pu4QueryInfoLen);
  3897. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  3898. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  3899. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  3900. *pu4QueryInfoLen = sizeof(UINT_32);
  3901. return WLAN_STATUS_ADAPTER_NOT_READY;
  3902. } else if (u4QueryBufferLen < sizeof(UINT_32)
  3903. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  3904. *pu4QueryInfoLen = sizeof(UINT_64);
  3905. return WLAN_STATUS_INVALID_LENGTH;
  3906. }
  3907. #if CFG_ENABLE_STATISTICS_BUFFERING
  3908. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  3909. if (u4QueryBufferLen == sizeof(UINT_32)) {
  3910. *pu4QueryInfoLen = sizeof(UINT_32);
  3911. *(PUINT_32) pvQueryBuffer = (UINT_32) 0; /* @FIXME */
  3912. } else {
  3913. *pu4QueryInfoLen = sizeof(UINT_64);
  3914. *(PUINT_64) pvQueryBuffer = (UINT_64) 0; /* @FIXME */
  3915. }
  3916. return WLAN_STATUS_SUCCESS;
  3917. }
  3918. #endif
  3919. return wlanSendSetQueryCmd(prAdapter,
  3920. CMD_ID_GET_STATISTICS,
  3921. FALSE,
  3922. TRUE,
  3923. TRUE,
  3924. nicCmdEventQueryRecvNoBuffer,
  3925. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  3926. } /* wlanoidQueryRcvNoBuffer */
  3927. /*----------------------------------------------------------------------------*/
  3928. /*! \brief This routine is called to query the number of frames that the NIC
  3929. * received and it is CRC error.
  3930. *
  3931. * \param[in] pvAdapter Pointer to the Adapter structure
  3932. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  3933. * query buffer
  3934. * \param[in] u4QueryBufLen The length of the query buffer
  3935. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3936. * bytes written into the query buffer. If the call
  3937. * failed due to invalid length of the query buffer,
  3938. * returns the amount of storage needed.
  3939. *
  3940. * \retval WLAN_STATUS_SUCCESS If success;
  3941. * \retval WLAN_STATUS_INVALID_LENGTH
  3942. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3943. */
  3944. /*----------------------------------------------------------------------------*/
  3945. WLAN_STATUS
  3946. wlanoidQueryRcvCrcError(IN P_ADAPTER_T prAdapter,
  3947. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3948. {
  3949. DEBUGFUNC("wlanoidQueryRcvCrcError");
  3950. DBGLOG(OID, LOUD, "\n");
  3951. ASSERT(prAdapter);
  3952. if (u4QueryBufferLen)
  3953. ASSERT(pvQueryBuffer);
  3954. ASSERT(pu4QueryInfoLen);
  3955. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  3956. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  3957. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  3958. *pu4QueryInfoLen = sizeof(UINT_32);
  3959. return WLAN_STATUS_ADAPTER_NOT_READY;
  3960. } else if (u4QueryBufferLen < sizeof(UINT_32)
  3961. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  3962. *pu4QueryInfoLen = sizeof(UINT_64);
  3963. return WLAN_STATUS_INVALID_LENGTH;
  3964. }
  3965. #if CFG_ENABLE_STATISTICS_BUFFERING
  3966. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  3967. if (u4QueryBufferLen == sizeof(UINT_32)) {
  3968. *pu4QueryInfoLen = sizeof(UINT_32);
  3969. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rFCSErrorCount.QuadPart;
  3970. } else {
  3971. *pu4QueryInfoLen = sizeof(UINT_64);
  3972. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rFCSErrorCount.QuadPart;
  3973. }
  3974. return WLAN_STATUS_SUCCESS;
  3975. }
  3976. #endif
  3977. return wlanSendSetQueryCmd(prAdapter,
  3978. CMD_ID_GET_STATISTICS,
  3979. FALSE,
  3980. TRUE,
  3981. TRUE,
  3982. nicCmdEventQueryRecvCrcError,
  3983. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  3984. } /* wlanoidQueryRcvCrcError */
  3985. /*----------------------------------------------------------------------------*/
  3986. /*! \brief This routine is called to query the current 802.11 statistics.
  3987. *
  3988. * \param[in] pvAdapter Pointer to the Adapter structure
  3989. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  3990. * query buffer
  3991. * \param[in] u4QueryBufLen The length of the query buffer
  3992. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3993. * bytes written into the query buffer. If the call
  3994. * failed due to invalid length of the query buffer,
  3995. * returns the amount of storage needed.
  3996. *
  3997. * \retval WLAN_STATUS_SUCCESS
  3998. * \retval WLAN_STATUS_INVALID_LENGTH
  3999. */
  4000. /*----------------------------------------------------------------------------*/
  4001. WLAN_STATUS
  4002. wlanoidQueryStatisticsPL(IN P_ADAPTER_T prAdapter,
  4003. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4004. {
  4005. DBGLOG(OID, LOUD, "\n");
  4006. ASSERT(prAdapter);
  4007. if (u4QueryBufferLen)
  4008. ASSERT(pvQueryBuffer);
  4009. ASSERT(pu4QueryInfoLen);
  4010. *pu4QueryInfoLen = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4011. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  4012. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  4013. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  4014. *pu4QueryInfoLen = sizeof(UINT_32);
  4015. return WLAN_STATUS_ADAPTER_NOT_READY;
  4016. } else if (u4QueryBufferLen < sizeof(PARAM_802_11_STATISTICS_STRUCT_T)) {
  4017. DBGLOG(OID, WARN, "Too short length %u\n", u4QueryBufferLen);
  4018. return WLAN_STATUS_INVALID_LENGTH;
  4019. }
  4020. #if CFG_ENABLE_STATISTICS_BUFFERING
  4021. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  4022. P_PARAM_802_11_STATISTICS_STRUCT_T prStatistics;
  4023. *pu4QueryInfoLen = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4024. prStatistics = (P_PARAM_802_11_STATISTICS_STRUCT_T) pvQueryBuffer;
  4025. prStatistics->u4Length = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4026. prStatistics->rTransmittedFragmentCount = prAdapter->rStatStruct.rTransmittedFragmentCount;
  4027. prStatistics->rMulticastTransmittedFrameCount = prAdapter->rStatStruct.rMulticastTransmittedFrameCount;
  4028. prStatistics->rFailedCount = prAdapter->rStatStruct.rFailedCount;
  4029. prStatistics->rRetryCount = prAdapter->rStatStruct.rRetryCount;
  4030. prStatistics->rMultipleRetryCount = prAdapter->rStatStruct.rMultipleRetryCount;
  4031. prStatistics->rRTSSuccessCount = prAdapter->rStatStruct.rRTSSuccessCount;
  4032. prStatistics->rRTSFailureCount = prAdapter->rStatStruct.rRTSFailureCount;
  4033. prStatistics->rACKFailureCount = prAdapter->rStatStruct.rACKFailureCount;
  4034. prStatistics->rFrameDuplicateCount = prAdapter->rStatStruct.rFrameDuplicateCount;
  4035. prStatistics->rReceivedFragmentCount = prAdapter->rStatStruct.rReceivedFragmentCount;
  4036. prStatistics->rMulticastReceivedFrameCount = prAdapter->rStatStruct.rMulticastReceivedFrameCount;
  4037. prStatistics->rFCSErrorCount = prAdapter->rStatStruct.rFCSErrorCount;
  4038. prStatistics->rTKIPLocalMICFailures.QuadPart = 0;
  4039. prStatistics->rTKIPICVErrors.QuadPart = 0;
  4040. prStatistics->rTKIPCounterMeasuresInvoked.QuadPart = 0;
  4041. prStatistics->rTKIPReplays.QuadPart = 0;
  4042. prStatistics->rCCMPFormatErrors.QuadPart = 0;
  4043. prStatistics->rCCMPReplays.QuadPart = 0;
  4044. prStatistics->rCCMPDecryptErrors.QuadPart = 0;
  4045. prStatistics->rFourWayHandshakeFailures.QuadPart = 0;
  4046. prStatistics->rWEPUndecryptableCount.QuadPart = 0;
  4047. prStatistics->rWEPICVErrorCount.QuadPart = 0;
  4048. prStatistics->rDecryptSuccessCount.QuadPart = 0;
  4049. prStatistics->rDecryptFailureCount.QuadPart = 0;
  4050. return WLAN_STATUS_SUCCESS;
  4051. }
  4052. #endif
  4053. return wlanSendSetQueryCmd(prAdapter,
  4054. CMD_ID_GET_STATISTICS_PL,
  4055. FALSE,
  4056. TRUE,
  4057. TRUE,
  4058. nicCmdEventQueryStatistics,
  4059. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  4060. } /* wlanoidQueryStatistics */
  4061. /*----------------------------------------------------------------------------*/
  4062. /*! \brief This routine is called to query the current 802.11 statistics.
  4063. *
  4064. * \param[in] pvAdapter Pointer to the Adapter structure
  4065. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4066. * query buffer
  4067. * \param[in] u4QueryBufLen The length of the query buffer
  4068. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4069. * bytes written into the query buffer. If the call
  4070. * failed due to invalid length of the query buffer,
  4071. * returns the amount of storage needed.
  4072. *
  4073. * \retval WLAN_STATUS_SUCCESS
  4074. * \retval WLAN_STATUS_INVALID_LENGTH
  4075. */
  4076. /*----------------------------------------------------------------------------*/
  4077. WLAN_STATUS
  4078. wlanoidQueryStatistics(IN P_ADAPTER_T prAdapter,
  4079. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4080. {
  4081. DEBUGFUNC("wlanoidQueryStatistics");
  4082. DBGLOG(OID, LOUD, "\n");
  4083. ASSERT(prAdapter);
  4084. if (u4QueryBufferLen)
  4085. ASSERT(pvQueryBuffer);
  4086. ASSERT(pu4QueryInfoLen);
  4087. *pu4QueryInfoLen = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4088. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  4089. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  4090. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  4091. *pu4QueryInfoLen = sizeof(UINT_32);
  4092. return WLAN_STATUS_ADAPTER_NOT_READY;
  4093. } else if (u4QueryBufferLen < sizeof(PARAM_802_11_STATISTICS_STRUCT_T)) {
  4094. DBGLOG(OID, WARN, "Too short length %u\n", u4QueryBufferLen);
  4095. return WLAN_STATUS_INVALID_LENGTH;
  4096. }
  4097. #if CFG_ENABLE_STATISTICS_BUFFERING
  4098. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  4099. P_PARAM_802_11_STATISTICS_STRUCT_T prStatistics;
  4100. *pu4QueryInfoLen = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4101. prStatistics = (P_PARAM_802_11_STATISTICS_STRUCT_T) pvQueryBuffer;
  4102. prStatistics->u4Length = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4103. prStatistics->rTransmittedFragmentCount = prAdapter->rStatStruct.rTransmittedFragmentCount;
  4104. prStatistics->rMulticastTransmittedFrameCount = prAdapter->rStatStruct.rMulticastTransmittedFrameCount;
  4105. prStatistics->rFailedCount = prAdapter->rStatStruct.rFailedCount;
  4106. prStatistics->rRetryCount = prAdapter->rStatStruct.rRetryCount;
  4107. prStatistics->rMultipleRetryCount = prAdapter->rStatStruct.rMultipleRetryCount;
  4108. prStatistics->rRTSSuccessCount = prAdapter->rStatStruct.rRTSSuccessCount;
  4109. prStatistics->rRTSFailureCount = prAdapter->rStatStruct.rRTSFailureCount;
  4110. prStatistics->rACKFailureCount = prAdapter->rStatStruct.rACKFailureCount;
  4111. prStatistics->rFrameDuplicateCount = prAdapter->rStatStruct.rFrameDuplicateCount;
  4112. prStatistics->rReceivedFragmentCount = prAdapter->rStatStruct.rReceivedFragmentCount;
  4113. prStatistics->rMulticastReceivedFrameCount = prAdapter->rStatStruct.rMulticastReceivedFrameCount;
  4114. prStatistics->rFCSErrorCount = prAdapter->rStatStruct.rFCSErrorCount;
  4115. prStatistics->rTKIPLocalMICFailures.QuadPart = 0;
  4116. prStatistics->rTKIPICVErrors.QuadPart = 0;
  4117. prStatistics->rTKIPCounterMeasuresInvoked.QuadPart = 0;
  4118. prStatistics->rTKIPReplays.QuadPart = 0;
  4119. prStatistics->rCCMPFormatErrors.QuadPart = 0;
  4120. prStatistics->rCCMPReplays.QuadPart = 0;
  4121. prStatistics->rCCMPDecryptErrors.QuadPart = 0;
  4122. prStatistics->rFourWayHandshakeFailures.QuadPart = 0;
  4123. prStatistics->rWEPUndecryptableCount.QuadPart = 0;
  4124. prStatistics->rWEPICVErrorCount.QuadPart = 0;
  4125. prStatistics->rDecryptSuccessCount.QuadPart = 0;
  4126. prStatistics->rDecryptFailureCount.QuadPart = 0;
  4127. return WLAN_STATUS_SUCCESS;
  4128. }
  4129. #endif
  4130. return wlanSendSetQueryCmd(prAdapter,
  4131. CMD_ID_GET_STATISTICS,
  4132. FALSE,
  4133. TRUE,
  4134. TRUE,
  4135. nicCmdEventQueryStatistics,
  4136. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  4137. } /* wlanoidQueryStatistics */
  4138. /*----------------------------------------------------------------------------*/
  4139. /*! \brief This routine is called to query current media streaming status.
  4140. *
  4141. * \param[in] pvAdapter Pointer to the Adapter structure
  4142. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4143. * query buffer
  4144. * \param[in] u4QueryBufLen The length of the query buffer
  4145. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4146. * bytes written into the query buffer. If the call
  4147. * failed due to invalid length of the query buffer,
  4148. * returns the amount of storage needed.
  4149. *
  4150. * \retval WLAN_STATUS_SUCCESS
  4151. */
  4152. /*----------------------------------------------------------------------------*/
  4153. WLAN_STATUS
  4154. wlanoidQueryMediaStreamMode(IN P_ADAPTER_T prAdapter,
  4155. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4156. {
  4157. DEBUGFUNC("wlanoidQueryMediaStreamMode");
  4158. ASSERT(prAdapter);
  4159. ASSERT(pu4QueryInfoLen);
  4160. if (u4QueryBufferLen)
  4161. ASSERT(pvQueryBuffer);
  4162. *pu4QueryInfoLen = sizeof(ENUM_MEDIA_STREAM_MODE);
  4163. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  4164. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  4165. return WLAN_STATUS_INVALID_LENGTH;
  4166. }
  4167. *(P_ENUM_MEDIA_STREAM_MODE) pvQueryBuffer =
  4168. prAdapter->rWlanInfo.eLinkAttr.ucMediaStreamMode == 0 ? ENUM_MEDIA_STREAM_OFF : ENUM_MEDIA_STREAM_ON;
  4169. return WLAN_STATUS_SUCCESS;
  4170. } /* wlanoidQueryMediaStreamMode */
  4171. /*----------------------------------------------------------------------------*/
  4172. /*! \brief This routine is called to enter media streaming mode or exit media streaming mode
  4173. *
  4174. * \param[in] pvAdapter Pointer to the Adapter structure
  4175. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4176. * query buffer
  4177. * \param[in] u4QueryBufLen The length of the query buffer
  4178. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4179. * bytes written into the query buffer. If the call
  4180. * failed due to invalid length of the query buffer,
  4181. * returns the amount of storage needed.
  4182. *
  4183. * \retval WLAN_STATUS_SUCCESS
  4184. */
  4185. /*----------------------------------------------------------------------------*/
  4186. WLAN_STATUS
  4187. wlanoidSetMediaStreamMode(IN P_ADAPTER_T prAdapter,
  4188. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  4189. {
  4190. ENUM_MEDIA_STREAM_MODE eStreamMode;
  4191. DEBUGFUNC("wlanoidSetMediaStreamMode");
  4192. ASSERT(prAdapter);
  4193. ASSERT(pvSetBuffer);
  4194. ASSERT(pu4SetInfoLen);
  4195. if (u4SetBufferLen < sizeof(ENUM_MEDIA_STREAM_MODE)) {
  4196. DBGLOG(OID, WARN, "Invalid length %u\n", u4SetBufferLen);
  4197. return WLAN_STATUS_INVALID_LENGTH;
  4198. }
  4199. *pu4SetInfoLen = sizeof(ENUM_MEDIA_STREAM_MODE);
  4200. eStreamMode = *(P_ENUM_MEDIA_STREAM_MODE) pvSetBuffer;
  4201. if (eStreamMode == ENUM_MEDIA_STREAM_OFF)
  4202. prAdapter->rWlanInfo.eLinkAttr.ucMediaStreamMode = 0;
  4203. else
  4204. prAdapter->rWlanInfo.eLinkAttr.ucMediaStreamMode = 1;
  4205. return wlanSendSetQueryCmd(prAdapter,
  4206. CMD_ID_LINK_ATTRIB,
  4207. TRUE,
  4208. FALSE,
  4209. TRUE,
  4210. nicCmdEventSetMediaStreamMode,
  4211. nicOidCmdTimeoutCommon,
  4212. sizeof(CMD_LINK_ATTRIB),
  4213. (PUINT_8) &(prAdapter->rWlanInfo.eLinkAttr), pvSetBuffer, u4SetBufferLen);
  4214. } /* wlanoidSetMediaStreamMode */
  4215. /*----------------------------------------------------------------------------*/
  4216. /*! \brief This routine is called to query the permanent MAC address of the NIC.
  4217. *
  4218. * \param[in] pvAdapter Pointer to the Adapter structure
  4219. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4220. * query buffer
  4221. * \param[in] u4QueryBufLen The length of the query buffer
  4222. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4223. * bytes written into the query buffer. If the call
  4224. * failed due to invalid length of the query buffer,
  4225. * returns the amount of storage needed.
  4226. *
  4227. * \retval WLAN_STATUS_SUCCESS
  4228. */
  4229. /*----------------------------------------------------------------------------*/
  4230. WLAN_STATUS
  4231. wlanoidQueryPermanentAddr(IN P_ADAPTER_T prAdapter,
  4232. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4233. {
  4234. DEBUGFUNC("wlanoidQueryPermanentAddr");
  4235. DBGLOG(OID, LOUD, "\n");
  4236. ASSERT(prAdapter);
  4237. ASSERT(pu4QueryInfoLen);
  4238. if (u4QueryBufferLen)
  4239. ASSERT(pvQueryBuffer);
  4240. if (u4QueryBufferLen < MAC_ADDR_LEN)
  4241. return WLAN_STATUS_BUFFER_TOO_SHORT;
  4242. COPY_MAC_ADDR(pvQueryBuffer, prAdapter->rWifiVar.aucPermanentAddress);
  4243. *pu4QueryInfoLen = MAC_ADDR_LEN;
  4244. return WLAN_STATUS_SUCCESS;
  4245. } /* wlanoidQueryPermanentAddr */
  4246. /*----------------------------------------------------------------------------*/
  4247. /*! \brief This routine is called to query the MAC address the NIC is currently using.
  4248. *
  4249. * \param[in] pvAdapter Pointer to the Adapter structure
  4250. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4251. * query buffer
  4252. * \param[in] u4QueryBufLen The length of the query buffer
  4253. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4254. * bytes written into the query buffer. If the call
  4255. * failed due to invalid length of the query buffer,
  4256. * returns the amount of storage needed.
  4257. *
  4258. * \retval WLAN_STATUS_SUCCESS
  4259. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  4260. */
  4261. /*----------------------------------------------------------------------------*/
  4262. WLAN_STATUS
  4263. wlanoidQueryCurrentAddr(IN P_ADAPTER_T prAdapter,
  4264. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4265. {
  4266. CMD_BASIC_CONFIG rCmdBasicConfig;
  4267. DEBUGFUNC("wlanoidQueryCurrentAddr");
  4268. DBGLOG(OID, LOUD, "\n");
  4269. ASSERT(prAdapter);
  4270. ASSERT(pu4QueryInfoLen);
  4271. if (u4QueryBufferLen)
  4272. ASSERT(pvQueryBuffer);
  4273. if (u4QueryBufferLen < MAC_ADDR_LEN)
  4274. return WLAN_STATUS_BUFFER_TOO_SHORT;
  4275. kalMemZero(&rCmdBasicConfig, sizeof(CMD_BASIC_CONFIG));
  4276. return wlanSendSetQueryCmd(prAdapter,
  4277. CMD_ID_BASIC_CONFIG,
  4278. FALSE,
  4279. TRUE,
  4280. TRUE,
  4281. nicCmdEventQueryAddress,
  4282. nicOidCmdTimeoutCommon,
  4283. sizeof(CMD_BASIC_CONFIG),
  4284. (PUINT_8) &rCmdBasicConfig, pvQueryBuffer, u4QueryBufferLen);
  4285. } /* wlanoidQueryCurrentAddr */
  4286. /*----------------------------------------------------------------------------*/
  4287. /*! \brief This routine is called to query NIC link speed.
  4288. *
  4289. * \param[in] pvAdapter Pointer to the Adapter structure
  4290. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4291. * query buffer
  4292. * \param[in] u4QueryBufLen The length of the query buffer
  4293. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4294. * bytes written into the query buffer. If the call
  4295. * failed due to invalid length of the query buffer,
  4296. * returns the amount of storage needed.
  4297. *
  4298. * \retval WLAN_STATUS_SUCCESS
  4299. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  4300. *
  4301. */
  4302. /*----------------------------------------------------------------------------*/
  4303. WLAN_STATUS
  4304. wlanoidQueryLinkSpeed(IN P_ADAPTER_T prAdapter,
  4305. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4306. {
  4307. DEBUGFUNC("wlanoidQueryLinkSpeed");
  4308. ASSERT(prAdapter);
  4309. ASSERT(pu4QueryInfoLen);
  4310. if (u4QueryBufferLen)
  4311. ASSERT(pvQueryBuffer);
  4312. *pu4QueryInfoLen = sizeof(UINT_32);
  4313. if (u4QueryBufferLen < sizeof(UINT_32))
  4314. return WLAN_STATUS_BUFFER_TOO_SHORT;
  4315. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) != PARAM_MEDIA_STATE_CONNECTED) {
  4316. return WLAN_STATUS_ADAPTER_NOT_READY;
  4317. } else if (prAdapter->fgIsLinkRateValid == TRUE &&
  4318. (kalGetTimeTick() - prAdapter->rLinkRateUpdateTime) <= CFG_LINK_QUALITY_VALID_PERIOD) {
  4319. *(PUINT_32) pvQueryBuffer = prAdapter->rLinkQuality.u2LinkSpeed * 5000; /* change to unit of 100bps */
  4320. return WLAN_STATUS_SUCCESS;
  4321. } else {
  4322. return wlanSendSetQueryCmd(prAdapter,
  4323. CMD_ID_GET_LINK_QUALITY,
  4324. FALSE,
  4325. TRUE,
  4326. TRUE,
  4327. nicCmdEventQueryLinkSpeed,
  4328. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  4329. }
  4330. } /* end of wlanoidQueryLinkSpeed() */
  4331. /*----------------------------------------------------------------------------*/
  4332. /*!
  4333. * \brief This routine is called to query MCR value.
  4334. *
  4335. * \param[in] pvAdapter Pointer to the Adapter structure.
  4336. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  4337. * the query.
  4338. * \param[in] u4QueryBufLen The length of the query buffer.
  4339. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4340. * bytes written into the query buffer. If the call
  4341. * failed due to invalid length of the query buffer,
  4342. * returns the amount of storage needed.
  4343. *
  4344. * \retval WLAN_STATUS_SUCCESS
  4345. * \retval WLAN_STATUS_INVALID_LENGTH
  4346. */
  4347. /*----------------------------------------------------------------------------*/
  4348. WLAN_STATUS
  4349. wlanoidQueryMcrRead(IN P_ADAPTER_T prAdapter,
  4350. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4351. {
  4352. P_PARAM_CUSTOM_MCR_RW_STRUCT_T prMcrRdInfo;
  4353. CMD_ACCESS_REG rCmdAccessReg;
  4354. DEBUGFUNC("wlanoidQueryMcrRead");
  4355. DBGLOG(OID, LOUD, "\n");
  4356. ASSERT(prAdapter);
  4357. ASSERT(pu4QueryInfoLen);
  4358. if (u4QueryBufferLen)
  4359. ASSERT(pvQueryBuffer);
  4360. *pu4QueryInfoLen = sizeof(PARAM_CUSTOM_MCR_RW_STRUCT_T);
  4361. if (u4QueryBufferLen < sizeof(PARAM_CUSTOM_MCR_RW_STRUCT_T))
  4362. return WLAN_STATUS_INVALID_LENGTH;
  4363. prMcrRdInfo = (P_PARAM_CUSTOM_MCR_RW_STRUCT_T) pvQueryBuffer;
  4364. /* 0x9000 - 0x9EFF reserved for FW */
  4365. #if CFG_SUPPORT_SWCR
  4366. if ((prMcrRdInfo->u4McrOffset >> 16) == 0x9F00) {
  4367. swCrReadWriteCmd(prAdapter,
  4368. SWCR_READ,
  4369. (UINT_16) (prMcrRdInfo->u4McrOffset & BITS(0, 15)), &prMcrRdInfo->u4McrData);
  4370. return WLAN_STATUS_SUCCESS;
  4371. }
  4372. #endif /* CFG_SUPPORT_SWCR */
  4373. /* Check if access F/W Domain MCR (due to WiFiSYS is placed from 0x6000-0000 */
  4374. if (prMcrRdInfo->u4McrOffset & 0xFFFF0000) {
  4375. /* fill command */
  4376. rCmdAccessReg.u4Address = prMcrRdInfo->u4McrOffset;
  4377. rCmdAccessReg.u4Data = 0;
  4378. return wlanSendSetQueryCmd(prAdapter,
  4379. CMD_ID_ACCESS_REG,
  4380. FALSE,
  4381. TRUE,
  4382. TRUE,
  4383. nicCmdEventQueryMcrRead,
  4384. nicOidCmdTimeoutCommon,
  4385. sizeof(CMD_ACCESS_REG),
  4386. (PUINT_8) &rCmdAccessReg, pvQueryBuffer, u4QueryBufferLen);
  4387. } else {
  4388. HAL_MCR_RD(prAdapter, prMcrRdInfo->u4McrOffset & BITS(2, 31), /* address is in DWORD unit */
  4389. &prMcrRdInfo->u4McrData);
  4390. DBGLOG(OID, TRACE, "MCR Read: Offset = %#08x, Data = %#08x\n",
  4391. prMcrRdInfo->u4McrOffset, prMcrRdInfo->u4McrData);
  4392. return WLAN_STATUS_SUCCESS;
  4393. }
  4394. } /* end of wlanoidQueryMcrRead() */
  4395. /*----------------------------------------------------------------------------*/
  4396. /*!
  4397. * \brief This routine is called to write MCR and enable specific function.
  4398. *
  4399. * \param[in] prAdapter Pointer to the Adapter structure.
  4400. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  4401. * \param[in] u4SetBufferLen The length of the set buffer.
  4402. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  4403. * bytes read from the set buffer. If the call failed
  4404. * due to invalid length of the set buffer, returns
  4405. * the amount of storage needed.
  4406. *
  4407. * \retval WLAN_STATUS_SUCCESS
  4408. * \retval WLAN_STATUS_INVALID_LENGTH
  4409. */
  4410. /*----------------------------------------------------------------------------*/
  4411. WLAN_STATUS
  4412. wlanoidSetMcrWrite(IN P_ADAPTER_T prAdapter,
  4413. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  4414. {
  4415. P_PARAM_CUSTOM_MCR_RW_STRUCT_T prMcrWrInfo;
  4416. CMD_ACCESS_REG rCmdAccessReg;
  4417. #if CFG_STRESS_TEST_SUPPORT
  4418. P_AIS_FSM_INFO_T prAisFsmInfo;
  4419. P_BSS_INFO_T prBssInfo = &(prAdapter->rWifiVar.arBssInfo[(NETWORK_TYPE_AIS_INDEX)]);
  4420. P_STA_RECORD_T prStaRec = prBssInfo->prStaRecOfAP;
  4421. UINT_32 u4McrOffset, u4McrData;
  4422. #endif
  4423. DEBUGFUNC("wlanoidSetMcrWrite");
  4424. DBGLOG(OID, LOUD, "\n");
  4425. ASSERT(prAdapter);
  4426. ASSERT(pu4SetInfoLen);
  4427. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_MCR_RW_STRUCT_T);
  4428. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_MCR_RW_STRUCT_T))
  4429. return WLAN_STATUS_INVALID_LENGTH;
  4430. ASSERT(pvSetBuffer);
  4431. prMcrWrInfo = (P_PARAM_CUSTOM_MCR_RW_STRUCT_T) pvSetBuffer;
  4432. /* 0x9000 - 0x9EFF reserved for FW */
  4433. /* 0xFFFE reserved for FW */
  4434. /* -- Puff Stress Test Begin */
  4435. #if CFG_STRESS_TEST_SUPPORT
  4436. /* 0xFFFFFFFE for Control Rate */
  4437. if (prMcrWrInfo->u4McrOffset == 0xFFFFFFFE) {
  4438. if (prMcrWrInfo->u4McrData < FIXED_RATE_NUM && prMcrWrInfo->u4McrData > 0)
  4439. prAdapter->rWifiVar.eRateSetting = (ENUM_REGISTRY_FIXED_RATE_T) (prMcrWrInfo->u4McrData);
  4440. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_1);
  4441. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_3);
  4442. DEBUGFUNC("[Stress Test]Complete Rate is Changed...\n");
  4443. DBGLOG(OID, TRACE,
  4444. "[Stress Test] Rate is Changed to index %d...\n", prAdapter->rWifiVar.eRateSetting);
  4445. }
  4446. /* 0xFFFFFFFD for Switch Channel */
  4447. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFFD) {
  4448. if (prMcrWrInfo->u4McrData <= 11 && prMcrWrInfo->u4McrData >= 1)
  4449. prBssInfo->ucPrimaryChannel = prMcrWrInfo->u4McrData;
  4450. nicUpdateBss(prAdapter, prBssInfo->ucNetTypeIndex);
  4451. DBGLOG(OID, TRACE, "[Stress Test] Channel is switched to %d ...\n", prBssInfo->ucPrimaryChannel);
  4452. return WLAN_STATUS_SUCCESS;
  4453. }
  4454. /* 0xFFFFFFFFC for Control RF Band and SCO */
  4455. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFFC) {
  4456. /* Band */
  4457. if (prMcrWrInfo->u4McrData & 0x80000000) {
  4458. /* prBssInfo->eBand = BAND_5G; */
  4459. /* prBssInfo->ucPrimaryChannel = 52; // Bond to Channel 52 */
  4460. } else {
  4461. prBssInfo->eBand = BAND_2G4;
  4462. prBssInfo->ucPrimaryChannel = 8; /* Bond to Channel 6 */
  4463. }
  4464. /* Bandwidth */
  4465. if (prMcrWrInfo->u4McrData & 0x00010000) {
  4466. prStaRec->u2HtCapInfo |= HT_CAP_INFO_SUP_CHNL_WIDTH;
  4467. prStaRec->ucDesiredPhyTypeSet = PHY_TYPE_BIT_HT;
  4468. if (prMcrWrInfo->u4McrData == 0x00010002) {
  4469. prBssInfo->eBssSCO = CHNL_EXT_SCB; /* U20 */
  4470. prBssInfo->ucPrimaryChannel += 2;
  4471. } else if (prMcrWrInfo->u4McrData == 0x00010001) {
  4472. prBssInfo->eBssSCO = CHNL_EXT_SCA; /* L20 */
  4473. prBssInfo->ucPrimaryChannel -= 2;
  4474. } else {
  4475. prBssInfo->eBssSCO = CHNL_EXT_SCA; /* 40 */
  4476. }
  4477. }
  4478. if (prMcrWrInfo->u4McrData & 0x00000000) {
  4479. prStaRec->u2HtCapInfo &= ~HT_CAP_INFO_SUP_CHNL_WIDTH;
  4480. prBssInfo->eBssSCO = CHNL_EXT_SCN;
  4481. }
  4482. rlmBssInitForAPandIbss(prAdapter, prBssInfo);
  4483. }
  4484. /* 0xFFFFFFFB for HT Capability */
  4485. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFFB) {
  4486. /* Enable HT Capability */
  4487. if (prMcrWrInfo->u4McrData & 0x00000001) {
  4488. prStaRec->u2HtCapInfo |= HT_CAP_INFO_HT_GF;
  4489. DEBUGFUNC("[Stress Test]Enable HT capability...\n");
  4490. } else {
  4491. prStaRec->u2HtCapInfo &= (~HT_CAP_INFO_HT_GF);
  4492. DEBUGFUNC("[Stress Test]Disable HT capability...\n");
  4493. }
  4494. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_1);
  4495. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_3);
  4496. }
  4497. /* 0xFFFFFFFA for Enable Random Rx Reset */
  4498. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFFA) {
  4499. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4500. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4501. return wlanSendSetQueryCmd(prAdapter,
  4502. CMD_ID_RANDOM_RX_RESET_EN,
  4503. TRUE,
  4504. FALSE,
  4505. TRUE,
  4506. nicCmdEventSetCommon,
  4507. nicOidCmdTimeoutCommon,
  4508. sizeof(CMD_ACCESS_REG),
  4509. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4510. }
  4511. /* 0xFFFFFFF9 for Disable Random Rx Reset */
  4512. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFF9) {
  4513. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4514. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4515. return wlanSendSetQueryCmd(prAdapter,
  4516. CMD_ID_RANDOM_RX_RESET_DE,
  4517. TRUE,
  4518. FALSE,
  4519. TRUE,
  4520. nicCmdEventSetCommon,
  4521. nicOidCmdTimeoutCommon,
  4522. sizeof(CMD_ACCESS_REG),
  4523. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4524. }
  4525. /* 0xFFFFFFF8 for Enable SAPP */
  4526. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFF8) {
  4527. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4528. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4529. return wlanSendSetQueryCmd(prAdapter,
  4530. CMD_ID_SAPP_EN,
  4531. TRUE,
  4532. FALSE,
  4533. TRUE,
  4534. nicCmdEventSetCommon,
  4535. nicOidCmdTimeoutCommon,
  4536. sizeof(CMD_ACCESS_REG),
  4537. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4538. }
  4539. /* 0xFFFFFFF7 for Disable SAPP */
  4540. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFF7) {
  4541. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4542. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4543. return wlanSendSetQueryCmd(prAdapter,
  4544. CMD_ID_SAPP_DE,
  4545. TRUE,
  4546. FALSE,
  4547. TRUE,
  4548. nicCmdEventSetCommon,
  4549. nicOidCmdTimeoutCommon,
  4550. sizeof(CMD_ACCESS_REG),
  4551. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4552. }
  4553. else
  4554. #endif
  4555. /* -- Puff Stress Test End */
  4556. /* Check if access F/W Domain MCR */
  4557. if (prMcrWrInfo->u4McrOffset & 0xFFFF0000) {
  4558. /* 0x9000 - 0x9EFF reserved for FW */
  4559. #if CFG_SUPPORT_SWCR
  4560. if ((prMcrWrInfo->u4McrOffset >> 16) == 0x9F00) {
  4561. swCrReadWriteCmd(prAdapter,
  4562. SWCR_WRITE,
  4563. (UINT_16) (prMcrWrInfo->u4McrOffset & BITS(0, 15)), &prMcrWrInfo->u4McrData);
  4564. return WLAN_STATUS_SUCCESS;
  4565. }
  4566. #endif /* CFG_SUPPORT_SWCR */
  4567. #if 1
  4568. /* low power test special command */
  4569. if (prMcrWrInfo->u4McrOffset == 0x11111110) {
  4570. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  4571. /* DbgPrint("Enter test mode\n"); */
  4572. prAdapter->fgTestMode = TRUE;
  4573. return rStatus;
  4574. }
  4575. if (prMcrWrInfo->u4McrOffset == 0x11111111) {
  4576. /* DbgPrint("nicpmSetAcpiPowerD3\n"); */
  4577. nicpmSetAcpiPowerD3(prAdapter);
  4578. kalDevSetPowerState(prAdapter->prGlueInfo, (UINT_32) ParamDeviceStateD3);
  4579. return WLAN_STATUS_SUCCESS;
  4580. }
  4581. if (prMcrWrInfo->u4McrOffset == 0x11111112) {
  4582. /* DbgPrint("LP enter sleep\n"); */
  4583. /* fill command */
  4584. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4585. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4586. return wlanSendSetQueryCmd(prAdapter,
  4587. CMD_ID_ACCESS_REG,
  4588. TRUE,
  4589. FALSE,
  4590. TRUE,
  4591. nicCmdEventSetCommon,
  4592. nicOidCmdTimeoutCommon,
  4593. sizeof(CMD_ACCESS_REG),
  4594. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4595. }
  4596. #endif
  4597. #if 1
  4598. /* low power test special command */
  4599. if (prMcrWrInfo->u4McrOffset == 0x11111110) {
  4600. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  4601. /* DbgPrint("Enter test mode\n"); */
  4602. prAdapter->fgTestMode = TRUE;
  4603. return rStatus;
  4604. }
  4605. if (prMcrWrInfo->u4McrOffset == 0x11111111) {
  4606. /* DbgPrint("nicpmSetAcpiPowerD3\n"); */
  4607. nicpmSetAcpiPowerD3(prAdapter);
  4608. kalDevSetPowerState(prAdapter->prGlueInfo, (UINT_32) ParamDeviceStateD3);
  4609. return WLAN_STATUS_SUCCESS;
  4610. }
  4611. if (prMcrWrInfo->u4McrOffset == 0x11111112) {
  4612. /* DbgPrint("LP enter sleep\n"); */
  4613. /* fill command */
  4614. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4615. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4616. return wlanSendSetQueryCmd(prAdapter,
  4617. CMD_ID_ACCESS_REG,
  4618. TRUE,
  4619. FALSE,
  4620. TRUE,
  4621. nicCmdEventSetCommon,
  4622. nicOidCmdTimeoutCommon,
  4623. sizeof(CMD_ACCESS_REG),
  4624. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4625. }
  4626. #endif
  4627. /* fill command */
  4628. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4629. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4630. return wlanSendSetQueryCmd(prAdapter,
  4631. CMD_ID_ACCESS_REG,
  4632. TRUE,
  4633. FALSE,
  4634. TRUE,
  4635. nicCmdEventSetCommon,
  4636. nicOidCmdTimeoutCommon,
  4637. sizeof(CMD_ACCESS_REG),
  4638. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4639. } else {
  4640. HAL_MCR_WR(prAdapter, (prMcrWrInfo->u4McrOffset & BITS(2, 31)), /* address is in DWORD unit */
  4641. prMcrWrInfo->u4McrData);
  4642. DBGLOG(OID, TRACE, "MCR Write: Offset = %#08x, Data = %#08x\n",
  4643. prMcrWrInfo->u4McrOffset, prMcrWrInfo->u4McrData);
  4644. return WLAN_STATUS_SUCCESS;
  4645. }
  4646. } /* wlanoidSetMcrWrite */
  4647. /*----------------------------------------------------------------------------*/
  4648. /*!
  4649. * \brief This routine is called to query SW CTRL
  4650. *
  4651. * \param[in] pvAdapter Pointer to the Adapter structure.
  4652. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  4653. * the query.
  4654. * \param[in] u4QueryBufLen The length of the query buffer.
  4655. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4656. * bytes written into the query buffer. If the call
  4657. * failed due to invalid length of the query buffer,
  4658. * returns the amount of storage needed.
  4659. *
  4660. * \retval WLAN_STATUS_SUCCESS
  4661. * \retval WLAN_STATUS_INVALID_LENGTH
  4662. */
  4663. /*----------------------------------------------------------------------------*/
  4664. WLAN_STATUS
  4665. wlanoidQuerySwCtrlRead(IN P_ADAPTER_T prAdapter,
  4666. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4667. {
  4668. P_PARAM_CUSTOM_SW_CTRL_STRUCT_T prSwCtrlInfo;
  4669. WLAN_STATUS rWlanStatus;
  4670. UINT_16 u2Id, u2SubId;
  4671. UINT_32 u4Data;
  4672. CMD_SW_DBG_CTRL_T rCmdSwCtrl;
  4673. DEBUGFUNC("wlanoidQuerySwCtrlRead");
  4674. DBGLOG(OID, LOUD, "\n");
  4675. ASSERT(prAdapter);
  4676. ASSERT(pu4QueryInfoLen);
  4677. if (u4QueryBufferLen)
  4678. ASSERT(pvQueryBuffer);
  4679. *pu4QueryInfoLen = sizeof(PARAM_CUSTOM_SW_CTRL_STRUCT_T);
  4680. if (u4QueryBufferLen < sizeof(PARAM_CUSTOM_SW_CTRL_STRUCT_T))
  4681. return WLAN_STATUS_INVALID_LENGTH;
  4682. prSwCtrlInfo = (P_PARAM_CUSTOM_SW_CTRL_STRUCT_T) pvQueryBuffer;
  4683. u2Id = (UINT_16) (prSwCtrlInfo->u4Id >> 16);
  4684. u2SubId = (UINT_16) (prSwCtrlInfo->u4Id & BITS(0, 15));
  4685. u4Data = 0;
  4686. rWlanStatus = WLAN_STATUS_SUCCESS;
  4687. switch (u2Id) {
  4688. /* 0x9000 - 0x9EFF reserved for FW */
  4689. /* 0xFFFE reserved for FW */
  4690. #if CFG_SUPPORT_SWCR
  4691. case 0x9F00:
  4692. swCrReadWriteCmd(prAdapter, SWCR_READ /* Read */ ,
  4693. (UINT_16) u2SubId, &u4Data);
  4694. break;
  4695. #endif /* CFG_SUPPORT_SWCR */
  4696. case 0xFFFF:
  4697. {
  4698. u4Data = 0x5AA56620;
  4699. }
  4700. break;
  4701. case 0x9000:
  4702. default:
  4703. {
  4704. rCmdSwCtrl.u4Id = prSwCtrlInfo->u4Id;
  4705. rCmdSwCtrl.u4Data = 0;
  4706. rWlanStatus = wlanSendSetQueryCmd(prAdapter,
  4707. CMD_ID_SW_DBG_CTRL,
  4708. FALSE,
  4709. TRUE,
  4710. TRUE,
  4711. nicCmdEventQuerySwCtrlRead,
  4712. nicOidCmdTimeoutCommon,
  4713. sizeof(CMD_SW_DBG_CTRL_T),
  4714. (PUINT_8) &rCmdSwCtrl, pvQueryBuffer, u4QueryBufferLen);
  4715. }
  4716. } /* switch(u2Id) */
  4717. prSwCtrlInfo->u4Data = u4Data;
  4718. return rWlanStatus;
  4719. }
  4720. /* end of wlanoidQuerySwCtrlRead() */
  4721. /*----------------------------------------------------------------------------*/
  4722. /*!
  4723. * \brief This routine is called to write SW CTRL
  4724. *
  4725. * \param[in] prAdapter Pointer to the Adapter structure.
  4726. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  4727. * \param[in] u4SetBufferLen The length of the set buffer.
  4728. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  4729. * bytes read from the set buffer. If the call failed
  4730. * due to invalid length of the set buffer, returns
  4731. * the amount of storage needed.
  4732. *
  4733. * \retval WLAN_STATUS_SUCCESS
  4734. * \retval WLAN_STATUS_INVALID_LENGTH
  4735. */
  4736. /*----------------------------------------------------------------------------*/
  4737. WLAN_STATUS
  4738. wlanoidSetSwCtrlWrite(IN P_ADAPTER_T prAdapter,
  4739. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  4740. {
  4741. P_PARAM_CUSTOM_SW_CTRL_STRUCT_T prSwCtrlInfo;
  4742. CMD_SW_DBG_CTRL_T rCmdSwCtrl;
  4743. WLAN_STATUS rWlanStatus;
  4744. UINT_16 u2Id, u2SubId;
  4745. UINT_32 u4Data;
  4746. #if CFG_SUPPORT_HOTSPOT_OPTIMIZATION
  4747. P_GLUE_INFO_T prGlueInfo;
  4748. CMD_HOTSPOT_OPTIMIZATION_CONFIG arHotspotOptimizationCfg;
  4749. #endif
  4750. DEBUGFUNC("wlanoidSetSwCtrlWrite");
  4751. DBGLOG(OID, LOUD, "\n");
  4752. ASSERT(prAdapter);
  4753. ASSERT(pu4SetInfoLen);
  4754. #if CFG_SUPPORT_HOTSPOT_OPTIMIZATION
  4755. prGlueInfo = prAdapter->prGlueInfo;
  4756. #endif
  4757. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_SW_CTRL_STRUCT_T);
  4758. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_SW_CTRL_STRUCT_T))
  4759. return WLAN_STATUS_INVALID_LENGTH;
  4760. ASSERT(pvSetBuffer);
  4761. prSwCtrlInfo = (P_PARAM_CUSTOM_SW_CTRL_STRUCT_T) pvSetBuffer;
  4762. u2Id = (UINT_16) (prSwCtrlInfo->u4Id >> 16);
  4763. u2SubId = (UINT_16) (prSwCtrlInfo->u4Id & BITS(0, 15));
  4764. u4Data = prSwCtrlInfo->u4Data;
  4765. rWlanStatus = WLAN_STATUS_SUCCESS;
  4766. switch (u2Id) {
  4767. /* 0x9000 - 0x9EFF reserved for FW */
  4768. /* 0xFFFE reserved for FW */
  4769. #if CFG_SUPPORT_SWCR
  4770. case 0x9F00:
  4771. swCrReadWriteCmd(prAdapter, SWCR_WRITE, (UINT_16) u2SubId, &u4Data);
  4772. break;
  4773. #endif /* CFG_SUPPORT_SWCR */
  4774. case 0x1000:
  4775. if (u2SubId == 0x8000) {
  4776. /* CTIA power save mode setting (code: 0x10008000) */
  4777. prAdapter->u4CtiaPowerMode = u4Data;
  4778. prAdapter->fgEnCtiaPowerMode = TRUE;
  4779. /* */
  4780. {
  4781. PARAM_POWER_MODE ePowerMode;
  4782. if (prAdapter->u4CtiaPowerMode == 0)
  4783. /* force to keep in CAM mode */
  4784. ePowerMode = Param_PowerModeCAM;
  4785. else if (prAdapter->u4CtiaPowerMode == 1)
  4786. ePowerMode = Param_PowerModeMAX_PSP;
  4787. else
  4788. ePowerMode = Param_PowerModeFast_PSP;
  4789. rWlanStatus = nicConfigPowerSaveProfile(prAdapter,
  4790. NETWORK_TYPE_AIS_INDEX, ePowerMode, TRUE);
  4791. }
  4792. }
  4793. break;
  4794. case 0x1001:
  4795. if (u2SubId == 0x0)
  4796. prAdapter->fgEnOnlineScan = (BOOLEAN) u4Data;
  4797. else if (u2SubId == 0x1)
  4798. prAdapter->fgDisBcnLostDetection = (BOOLEAN) u4Data;
  4799. else if (u2SubId == 0x2)
  4800. prAdapter->rWifiVar.fgSupportUAPSD = (BOOLEAN) u4Data;
  4801. else if (u2SubId == 0x3) {
  4802. prAdapter->u4UapsdAcBmp = u4Data & BITS(0, 15);
  4803. prAdapter->rWifiVar.arBssInfo[u4Data >> 16].rPmProfSetupInfo.ucBmpDeliveryAC =
  4804. (UINT_8) prAdapter->u4UapsdAcBmp;
  4805. prAdapter->rWifiVar.arBssInfo[u4Data >> 16].rPmProfSetupInfo.ucBmpTriggerAC =
  4806. (UINT_8) prAdapter->u4UapsdAcBmp;
  4807. } else if (u2SubId == 0x4)
  4808. prAdapter->fgDisStaAgingTimeoutDetection = (BOOLEAN) u4Data;
  4809. else if (u2SubId == 0x5)
  4810. prAdapter->rWifiVar.rConnSettings.uc2G4BandwidthMode = (UINT_8) u4Data;
  4811. else if (u2SubId == 0x0100)
  4812. prAdapter->rWifiVar.u8SupportRxGf = (UINT_8) u4Data;
  4813. else if (u2SubId == 0x0101) {
  4814. prAdapter->rWifiVar.u8SupportRxSgi20 = (UINT_8) u4Data;
  4815. prAdapter->rWifiVar.u8SupportRxSgi40 = (UINT_8) u4Data;
  4816. } else if (u2SubId == 0x0102)
  4817. prAdapter->rWifiVar.u8SupportRxSTBC = (UINT_8) u4Data;
  4818. break;
  4819. #if CFG_SUPPORT_SWCR
  4820. case 0x1002:
  4821. if (u2SubId == 0x0) {
  4822. if (u4Data)
  4823. u4Data = BIT(HIF_RX_PKT_TYPE_MANAGEMENT);
  4824. swCrFrameCheckEnable(prAdapter, u4Data);
  4825. } else if (u2SubId == 0x1) {
  4826. BOOLEAN fgIsEnable;
  4827. UINT_8 ucType;
  4828. UINT_32 u4Timeout;
  4829. fgIsEnable = (BOOLEAN) (u4Data & 0xff);
  4830. ucType = 0; /* ((u4Data>>4) & 0xf); */
  4831. u4Timeout = ((u4Data >> 8) & 0xff);
  4832. swCrDebugCheckEnable(prAdapter, fgIsEnable, ucType, u4Timeout);
  4833. }
  4834. break;
  4835. #endif
  4836. #if CFG_SUPPORT_802_11W
  4837. case 0x2000:
  4838. DBGLOG(RSN, TRACE, "802.11w test 0x%x\n", u2SubId);
  4839. if (u2SubId == 0x0)
  4840. rsnStartSaQuery(prAdapter);
  4841. if (u2SubId == 0x1)
  4842. rsnStopSaQuery(prAdapter);
  4843. if (u2SubId == 0x2)
  4844. rsnSaQueryRequest(prAdapter, NULL);
  4845. if (u2SubId == 0x3) {
  4846. P_BSS_INFO_T prBssInfo = &(prAdapter->rWifiVar.arBssInfo[(NETWORK_TYPE_AIS_INDEX)]);
  4847. authSendDeauthFrame(prAdapter, prBssInfo->prStaRecOfAP, NULL, 7, NULL);
  4848. }
  4849. if (u2SubId == 0x4) {
  4850. P_BSS_INFO_T prBssInfo = &(prAdapter->rWifiVar.arBssInfo[(NETWORK_TYPE_AIS_INDEX)]);
  4851. DBGLOG(RSN, INFO, "Send deauth\n");
  4852. authSendDeauthFrame(prAdapter, prBssInfo->prStaRecOfAP, NULL, 1, NULL);
  4853. }
  4854. /* wext_set_mode */
  4855. /*
  4856. if (u2SubId == 0x3) {
  4857. prAdapter->prGlueInfo->rWpaInfo.u4Mfp = RSN_AUTH_MFP_DISABLED;
  4858. }
  4859. if (u2SubId == 0x4) {
  4860. //prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE;
  4861. prAdapter->prGlueInfo->rWpaInfo.u4Mfp = RSN_AUTH_MFP_OPTIONAL;
  4862. }
  4863. if (u2SubId == 0x5) {
  4864. //prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE;
  4865. prAdapter->prGlueInfo->rWpaInfo.u4Mfp = RSN_AUTH_MFP_REQUIRED;
  4866. }
  4867. */
  4868. break;
  4869. #endif
  4870. case 0xFFFF:
  4871. {
  4872. /* CMD_ACCESS_REG rCmdAccessReg; */
  4873. #if 1 /* CFG_MT6573_SMT_TEST */
  4874. if (u2SubId == 0x0123) {
  4875. DBGLOG(HAL, TRACE, "set smt fixed rate: %u\n", u4Data);
  4876. if ((ENUM_REGISTRY_FIXED_RATE_T) (u4Data) < FIXED_RATE_NUM)
  4877. prAdapter->rWifiVar.eRateSetting = (ENUM_REGISTRY_FIXED_RATE_T) (u4Data);
  4878. else
  4879. prAdapter->rWifiVar.eRateSetting = FIXED_RATE_NONE;
  4880. if (prAdapter->rWifiVar.eRateSetting == FIXED_RATE_NONE)
  4881. /* Enable Auto (Long/Short) Preamble */
  4882. prAdapter->rWifiVar.ePreambleType = PREAMBLE_TYPE_AUTO;
  4883. else if ((prAdapter->rWifiVar.eRateSetting >= FIXED_RATE_MCS0_20M_400NS &&
  4884. prAdapter->rWifiVar.eRateSetting <= FIXED_RATE_MCS7_20M_400NS)
  4885. || (prAdapter->rWifiVar.eRateSetting >= FIXED_RATE_MCS0_40M_400NS &&
  4886. prAdapter->rWifiVar.eRateSetting <= FIXED_RATE_MCS32_400NS))
  4887. /* Force Short Preamble */
  4888. prAdapter->rWifiVar.ePreambleType = PREAMBLE_TYPE_SHORT;
  4889. else
  4890. /* Force Long Preamble */
  4891. prAdapter->rWifiVar.ePreambleType = PREAMBLE_TYPE_LONG;
  4892. /* abort to re-connect */
  4893. #if 1
  4894. DBGLOG(OID, TRACE, "DisBySwC\n");
  4895. kalIndicateStatusAndComplete(prAdapter->prGlueInfo,
  4896. WLAN_STATUS_MEDIA_DISCONNECT, NULL, 0);
  4897. #else
  4898. aisBssBeaconTimeout(prAdapter);
  4899. #endif
  4900. return WLAN_STATUS_SUCCESS;
  4901. } else if (u2SubId == 0x1234) {
  4902. /* 1. Disable On-Lin Scan */
  4903. /* 3. Disable FIFO FULL no ack */
  4904. /* 4. Disable Roaming */
  4905. /* Disalbe auto tx power */
  4906. /* 2. Keep at CAM mode */
  4907. /* 5. Disable Beacon Timeout Detection */
  4908. rWlanStatus = nicEnterCtiaMode(prAdapter, TRUE, TRUE);
  4909. } else if (u2SubId == 0x1235) {
  4910. /* 1. Enaable On-Lin Scan */
  4911. /* 3. Enable FIFO FULL no ack */
  4912. /* 4. Enable Roaming */
  4913. /* Enable auto tx power */
  4914. /* 2. Keep at Fast PS */
  4915. /* 5. Enable Beacon Timeout Detection */
  4916. rWlanStatus = nicEnterCtiaMode(prAdapter, FALSE, TRUE);
  4917. }
  4918. #if CFG_SUPPORT_HOTSPOT_OPTIMIZATION
  4919. else if (u2SubId == 0x1240) {
  4920. DBGLOG(P2P, TRACE, "Disable Hotspot Optimization!\n");
  4921. arHotspotOptimizationCfg.fgHotspotOptimizationEn = FALSE;
  4922. arHotspotOptimizationCfg.u4Level = 0;
  4923. wlanoidSendSetQueryP2PCmd(prAdapter,
  4924. CMD_ID_SET_HOTSPOT_OPTIMIZATION,
  4925. TRUE,
  4926. FALSE,
  4927. TRUE,
  4928. NULL,
  4929. NULL,
  4930. sizeof(CMD_HOTSPOT_OPTIMIZATION_CONFIG),
  4931. (PUINT_8) &arHotspotOptimizationCfg, NULL, 0);
  4932. } else if (u2SubId == 0x1241) {
  4933. DBGLOG(P2P, TRACE, "Enable Hotspot Optimization!\n");
  4934. arHotspotOptimizationCfg.fgHotspotOptimizationEn = TRUE;
  4935. arHotspotOptimizationCfg.u4Level = 5;
  4936. wlanoidSendSetQueryP2PCmd(prAdapter,
  4937. CMD_ID_SET_HOTSPOT_OPTIMIZATION,
  4938. TRUE,
  4939. FALSE,
  4940. TRUE,
  4941. NULL,
  4942. NULL,
  4943. sizeof(CMD_HOTSPOT_OPTIMIZATION_CONFIG),
  4944. (PUINT_8) &arHotspotOptimizationCfg, NULL, 0);
  4945. }
  4946. #endif /* CFG_SUPPORT_HOTSPOT_OPTIMIZATION */
  4947. else if (u2SubId == 0x1250) {
  4948. DBGLOG(OID, TRACE, "LTE_COEX: SW SET DUAL BAND\n");
  4949. prAdapter->aePreferBand[NETWORK_TYPE_AIS_INDEX] = BAND_NULL;
  4950. } else if (u2SubId == 0x1251) {
  4951. DBGLOG(OID, TRACE, "LTE_COEX: SW SET 2.4G BAND\n");
  4952. prAdapter->aePreferBand[NETWORK_TYPE_AIS_INDEX] = BAND_2G4;
  4953. } else if (u2SubId == 0x1252) {
  4954. DBGLOG(OID, TRACE, "LTE_COEX: SW SET 5G BAND\n");
  4955. prAdapter->aePreferBand[NETWORK_TYPE_AIS_INDEX] = BAND_5G;
  4956. }
  4957. #endif
  4958. }
  4959. break;
  4960. case 0x9000:
  4961. default:
  4962. {
  4963. rCmdSwCtrl.u4Id = prSwCtrlInfo->u4Id;
  4964. rCmdSwCtrl.u4Data = prSwCtrlInfo->u4Data;
  4965. rWlanStatus = wlanSendSetQueryCmd(prAdapter,
  4966. CMD_ID_SW_DBG_CTRL,
  4967. TRUE,
  4968. FALSE,
  4969. TRUE,
  4970. nicCmdEventSetCommon,
  4971. nicOidCmdTimeoutCommon,
  4972. sizeof(CMD_SW_DBG_CTRL_T),
  4973. (PUINT_8) &rCmdSwCtrl, pvSetBuffer, u4SetBufferLen);
  4974. }
  4975. } /* switch(u2Id) */
  4976. return rWlanStatus;
  4977. }
  4978. /* wlanoidSetSwCtrlWrite */
  4979. /*----------------------------------------------------------------------------*/
  4980. /*!
  4981. * \brief This routine is called to query EEPROM value.
  4982. *
  4983. * \param[in] pvAdapter Pointer to the Adapter structure.
  4984. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  4985. * the query.
  4986. * \param[in] u4QueryBufLen The length of the query buffer.
  4987. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4988. * bytes written into the query buffer. If the call
  4989. * failed due to invalid length of the query buffer,
  4990. * returns the amount of storage needed.
  4991. *
  4992. * \retval WLAN_STATUS_SUCCESS
  4993. * \retval WLAN_STATUS_FAILURE
  4994. */
  4995. /*----------------------------------------------------------------------------*/
  4996. WLAN_STATUS
  4997. wlanoidQueryEepromRead(IN P_ADAPTER_T prAdapter,
  4998. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4999. {
  5000. P_PARAM_CUSTOM_EEPROM_RW_STRUCT_T prEepromRwInfo;
  5001. CMD_ACCESS_EEPROM rCmdAccessEeprom;
  5002. DEBUGFUNC("wlanoidQueryEepromRead");
  5003. ASSERT(prAdapter);
  5004. ASSERT(pu4QueryInfoLen);
  5005. if (u4QueryBufferLen)
  5006. ASSERT(pvQueryBuffer);
  5007. *pu4QueryInfoLen = sizeof(PARAM_CUSTOM_EEPROM_RW_STRUCT_T);
  5008. if (u4QueryBufferLen < sizeof(PARAM_CUSTOM_EEPROM_RW_STRUCT_T))
  5009. return WLAN_STATUS_INVALID_LENGTH;
  5010. prEepromRwInfo = (P_PARAM_CUSTOM_EEPROM_RW_STRUCT_T) pvQueryBuffer;
  5011. kalMemZero(&rCmdAccessEeprom, sizeof(CMD_ACCESS_EEPROM));
  5012. rCmdAccessEeprom.u2Offset = prEepromRwInfo->ucEepromIndex;
  5013. return wlanSendSetQueryCmd(prAdapter,
  5014. CMD_ID_ACCESS_EEPROM,
  5015. FALSE,
  5016. TRUE,
  5017. TRUE,
  5018. nicCmdEventQueryEepromRead,
  5019. nicOidCmdTimeoutCommon,
  5020. sizeof(CMD_ACCESS_EEPROM),
  5021. (PUINT_8) &rCmdAccessEeprom, pvQueryBuffer, u4QueryBufferLen);
  5022. } /* wlanoidQueryEepromRead */
  5023. /*----------------------------------------------------------------------------*/
  5024. /*!
  5025. * \brief This routine is called to write EEPROM value.
  5026. *
  5027. * \param[in] prAdapter Pointer to the Adapter structure.
  5028. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  5029. * \param[in] u4SetBufferLen The length of the set buffer.
  5030. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5031. * bytes read from the set buffer. If the call failed
  5032. * due to invalid length of the set buffer, returns
  5033. * the amount of storage needed.
  5034. *
  5035. * \retval WLAN_STATUS_SUCCESS
  5036. * \retval WLAN_STATUS_FAILURE
  5037. */
  5038. /*----------------------------------------------------------------------------*/
  5039. WLAN_STATUS
  5040. wlanoidSetEepromWrite(IN P_ADAPTER_T prAdapter,
  5041. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5042. {
  5043. P_PARAM_CUSTOM_EEPROM_RW_STRUCT_T prEepromRwInfo;
  5044. CMD_ACCESS_EEPROM rCmdAccessEeprom;
  5045. DEBUGFUNC("wlanoidSetEepromWrite");
  5046. DBGLOG(OID, LOUD, "\n");
  5047. ASSERT(prAdapter);
  5048. ASSERT(pu4SetInfoLen);
  5049. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_EEPROM_RW_STRUCT_T);
  5050. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_EEPROM_RW_STRUCT_T))
  5051. return WLAN_STATUS_INVALID_LENGTH;
  5052. ASSERT(pvSetBuffer);
  5053. prEepromRwInfo = (P_PARAM_CUSTOM_EEPROM_RW_STRUCT_T) pvSetBuffer;
  5054. kalMemZero(&rCmdAccessEeprom, sizeof(CMD_ACCESS_EEPROM));
  5055. rCmdAccessEeprom.u2Offset = prEepromRwInfo->ucEepromIndex;
  5056. rCmdAccessEeprom.u2Data = prEepromRwInfo->u2EepromData;
  5057. return wlanSendSetQueryCmd(prAdapter,
  5058. CMD_ID_ACCESS_EEPROM,
  5059. TRUE,
  5060. FALSE,
  5061. TRUE,
  5062. nicCmdEventSetCommon,
  5063. nicOidCmdTimeoutCommon,
  5064. sizeof(CMD_ACCESS_EEPROM),
  5065. (PUINT_8) &rCmdAccessEeprom, pvSetBuffer, u4SetBufferLen);
  5066. } /* wlanoidSetEepromWrite */
  5067. /*----------------------------------------------------------------------------*/
  5068. /*!
  5069. * \brief This routine is called to query the number of the successfully transmitted
  5070. * packets.
  5071. *
  5072. * \param[in] pvAdapter Pointer to the Adapter structure.
  5073. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5074. * the query.
  5075. * \param[in] u4QueryBufLen The length of the query buffer.
  5076. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5077. * bytes written into the query buffer. If the call
  5078. * failed due to invalid length of the query buffer,
  5079. * returns the amount of storage needed.
  5080. *
  5081. * \retval WLAN_STATUS_SUCCESS
  5082. * \retval WLAN_STATUS_INVALID_LENGTH
  5083. */
  5084. /*----------------------------------------------------------------------------*/
  5085. WLAN_STATUS
  5086. wlanoidQueryXmitOk(IN P_ADAPTER_T prAdapter,
  5087. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5088. {
  5089. DEBUGFUNC("wlanoidQueryXmitOk");
  5090. DBGLOG(OID, LOUD, "\n");
  5091. ASSERT(prAdapter);
  5092. if (u4QueryBufferLen)
  5093. ASSERT(pvQueryBuffer);
  5094. ASSERT(pu4QueryInfoLen);
  5095. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5096. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5097. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5098. *pu4QueryInfoLen = sizeof(UINT_32);
  5099. return WLAN_STATUS_ADAPTER_NOT_READY;
  5100. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5101. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5102. *pu4QueryInfoLen = sizeof(UINT_64);
  5103. return WLAN_STATUS_INVALID_LENGTH;
  5104. }
  5105. #if CFG_ENABLE_STATISTICS_BUFFERING
  5106. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5107. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5108. *pu4QueryInfoLen = sizeof(UINT_32);
  5109. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rTransmittedFragmentCount.QuadPart;
  5110. } else {
  5111. *pu4QueryInfoLen = sizeof(UINT_64);
  5112. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rTransmittedFragmentCount.QuadPart;
  5113. }
  5114. return WLAN_STATUS_SUCCESS;
  5115. }
  5116. #endif
  5117. return wlanSendSetQueryCmd(prAdapter,
  5118. CMD_ID_GET_STATISTICS,
  5119. FALSE,
  5120. TRUE,
  5121. TRUE,
  5122. nicCmdEventQueryXmitOk,
  5123. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5124. } /* wlanoidQueryXmitOk */
  5125. /*----------------------------------------------------------------------------*/
  5126. /*!
  5127. * \brief This routine is called to query the number of the successfully received
  5128. * packets.
  5129. *
  5130. * \param[in] pvAdapter Pointer to the Adapter structure.
  5131. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5132. * the query.
  5133. * \param[in] u4QueryBufLen The length of the query buffer.
  5134. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5135. * bytes written into the query buffer. If the call
  5136. * failed due to invalid length of the query buffer,
  5137. * returns the amount of storage needed.
  5138. *
  5139. * \retval WLAN_STATUS_SUCCESS
  5140. * \retval WLAN_STATUS_INVALID_LENGTH
  5141. */
  5142. /*----------------------------------------------------------------------------*/
  5143. WLAN_STATUS
  5144. wlanoidQueryRcvOk(IN P_ADAPTER_T prAdapter,
  5145. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5146. {
  5147. DEBUGFUNC("wlanoidQueryRcvOk");
  5148. DBGLOG(OID, LOUD, "\n");
  5149. ASSERT(prAdapter);
  5150. if (u4QueryBufferLen)
  5151. ASSERT(pvQueryBuffer);
  5152. ASSERT(pu4QueryInfoLen);
  5153. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5154. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5155. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5156. *pu4QueryInfoLen = sizeof(UINT_32);
  5157. return WLAN_STATUS_ADAPTER_NOT_READY;
  5158. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5159. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5160. *pu4QueryInfoLen = sizeof(UINT_64);
  5161. return WLAN_STATUS_INVALID_LENGTH;
  5162. }
  5163. #if CFG_ENABLE_STATISTICS_BUFFERING
  5164. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5165. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5166. *pu4QueryInfoLen = sizeof(UINT_32);
  5167. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rReceivedFragmentCount.QuadPart;
  5168. } else {
  5169. *pu4QueryInfoLen = sizeof(UINT_64);
  5170. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rReceivedFragmentCount.QuadPart;
  5171. }
  5172. return WLAN_STATUS_SUCCESS;
  5173. }
  5174. #endif
  5175. return wlanSendSetQueryCmd(prAdapter,
  5176. CMD_ID_GET_STATISTICS,
  5177. FALSE,
  5178. TRUE,
  5179. TRUE,
  5180. nicCmdEventQueryRecvOk,
  5181. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5182. } /* wlanoidQueryRcvOk */
  5183. /*----------------------------------------------------------------------------*/
  5184. /*!
  5185. * \brief This routine is called to query the number of frames that the driver
  5186. * fails to transmit.
  5187. *
  5188. * \param[in] pvAdapter Pointer to the Adapter structure.
  5189. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5190. * the query.
  5191. * \param[in] u4QueryBufLen The length of the query buffer.
  5192. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5193. * bytes written into the query buffer. If the call
  5194. * failed due to invalid length of the query buffer,
  5195. * returns the amount of storage needed.
  5196. *
  5197. * \retval WLAN_STATUS_SUCCESS
  5198. * \retval WLAN_STATUS_INVALID_LENGTH
  5199. */
  5200. /*----------------------------------------------------------------------------*/
  5201. WLAN_STATUS
  5202. wlanoidQueryXmitError(IN P_ADAPTER_T prAdapter,
  5203. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5204. {
  5205. DEBUGFUNC("wlanoidQueryXmitError");
  5206. DBGLOG(OID, LOUD, "\n");
  5207. ASSERT(prAdapter);
  5208. if (u4QueryBufferLen)
  5209. ASSERT(pvQueryBuffer);
  5210. ASSERT(pu4QueryInfoLen);
  5211. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5212. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5213. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5214. *pu4QueryInfoLen = sizeof(UINT_32);
  5215. return WLAN_STATUS_ADAPTER_NOT_READY;
  5216. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5217. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5218. *pu4QueryInfoLen = sizeof(UINT_64);
  5219. return WLAN_STATUS_INVALID_LENGTH;
  5220. }
  5221. #if CFG_ENABLE_STATISTICS_BUFFERING
  5222. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5223. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5224. *pu4QueryInfoLen = sizeof(UINT_32);
  5225. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rFailedCount.QuadPart;
  5226. } else {
  5227. *pu4QueryInfoLen = sizeof(UINT_64);
  5228. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rFailedCount.QuadPart;
  5229. }
  5230. return WLAN_STATUS_SUCCESS;
  5231. }
  5232. #endif
  5233. return wlanSendSetQueryCmd(prAdapter,
  5234. CMD_ID_GET_STATISTICS,
  5235. FALSE,
  5236. TRUE,
  5237. TRUE,
  5238. nicCmdEventQueryXmitError,
  5239. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5240. } /* wlanoidQueryXmitError */
  5241. /*----------------------------------------------------------------------------*/
  5242. /*!
  5243. * \brief This routine is called to query the number of frames successfully
  5244. * transmitted after exactly one collision.
  5245. *
  5246. * \param[in] prAdapter Pointer to the Adapter structure.
  5247. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5248. * the query.
  5249. * \param[in] u4QueryBufLen The length of the query buffer.
  5250. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5251. * bytes written into the query buffer. If the call
  5252. * failed due to invalid length of the query buffer,
  5253. * returns the amount of storage needed.
  5254. *
  5255. * \retval WLAN_STATUS_SUCCESS
  5256. * \retval WLAN_STATUS_INVALID_LENGTH
  5257. */
  5258. /*----------------------------------------------------------------------------*/
  5259. WLAN_STATUS
  5260. wlanoidQueryXmitOneCollision(IN P_ADAPTER_T prAdapter,
  5261. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5262. {
  5263. DEBUGFUNC("wlanoidQueryXmitOneCollision");
  5264. DBGLOG(OID, LOUD, "\n");
  5265. ASSERT(prAdapter);
  5266. if (u4QueryBufferLen)
  5267. ASSERT(pvQueryBuffer);
  5268. ASSERT(pu4QueryInfoLen);
  5269. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5270. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5271. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5272. *pu4QueryInfoLen = sizeof(UINT_32);
  5273. return WLAN_STATUS_ADAPTER_NOT_READY;
  5274. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5275. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5276. *pu4QueryInfoLen = sizeof(UINT_64);
  5277. return WLAN_STATUS_INVALID_LENGTH;
  5278. }
  5279. #if CFG_ENABLE_STATISTICS_BUFFERING
  5280. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5281. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5282. *pu4QueryInfoLen = sizeof(UINT_32);
  5283. *(PUINT_32) pvQueryBuffer = (UINT_32)
  5284. (prAdapter->rStatStruct.rMultipleRetryCount.QuadPart -
  5285. prAdapter->rStatStruct.rRetryCount.QuadPart);
  5286. } else {
  5287. *pu4QueryInfoLen = sizeof(UINT_64);
  5288. *(PUINT_64) pvQueryBuffer = (UINT_64)
  5289. (prAdapter->rStatStruct.rMultipleRetryCount.QuadPart -
  5290. prAdapter->rStatStruct.rRetryCount.QuadPart);
  5291. }
  5292. return WLAN_STATUS_SUCCESS;
  5293. }
  5294. #endif
  5295. return wlanSendSetQueryCmd(prAdapter,
  5296. CMD_ID_GET_STATISTICS,
  5297. FALSE,
  5298. TRUE,
  5299. TRUE,
  5300. nicCmdEventQueryXmitOneCollision,
  5301. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5302. } /* wlanoidQueryXmitOneCollision */
  5303. /*----------------------------------------------------------------------------*/
  5304. /*!
  5305. * \brief This routine is called to query the number of frames successfully
  5306. * transmitted after more than one collision.
  5307. *
  5308. * \param[in] prAdapter Pointer to the Adapter structure.
  5309. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5310. * the query.
  5311. * \param[in] u4QueryBufLen The length of the query buffer.
  5312. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5313. * bytes written into the query buffer. If the call
  5314. * failed due to invalid length of the query buffer,
  5315. * returns the amount of storage needed.
  5316. *
  5317. * \retval WLAN_STATUS_SUCCESS
  5318. * \retval WLAN_STATUS_INVALID_LENGTH
  5319. */
  5320. /*----------------------------------------------------------------------------*/
  5321. WLAN_STATUS
  5322. wlanoidQueryXmitMoreCollisions(IN P_ADAPTER_T prAdapter,
  5323. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5324. {
  5325. DEBUGFUNC("wlanoidQueryXmitMoreCollisions");
  5326. DBGLOG(OID, LOUD, "\n");
  5327. ASSERT(prAdapter);
  5328. if (u4QueryBufferLen)
  5329. ASSERT(pvQueryBuffer);
  5330. ASSERT(pu4QueryInfoLen);
  5331. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5332. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5333. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5334. *pu4QueryInfoLen = sizeof(UINT_32);
  5335. return WLAN_STATUS_ADAPTER_NOT_READY;
  5336. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5337. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5338. *pu4QueryInfoLen = sizeof(UINT_64);
  5339. return WLAN_STATUS_INVALID_LENGTH;
  5340. }
  5341. #if CFG_ENABLE_STATISTICS_BUFFERING
  5342. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5343. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5344. *pu4QueryInfoLen = sizeof(UINT_32);
  5345. *(PUINT_32) pvQueryBuffer = (UINT_32) (prAdapter->rStatStruct.rMultipleRetryCount.QuadPart);
  5346. } else {
  5347. *pu4QueryInfoLen = sizeof(UINT_64);
  5348. *(PUINT_64) pvQueryBuffer = (UINT_64) (prAdapter->rStatStruct.rMultipleRetryCount.QuadPart);
  5349. }
  5350. return WLAN_STATUS_SUCCESS;
  5351. }
  5352. #endif
  5353. return wlanSendSetQueryCmd(prAdapter,
  5354. CMD_ID_GET_STATISTICS,
  5355. FALSE,
  5356. TRUE,
  5357. TRUE,
  5358. nicCmdEventQueryXmitMoreCollisions,
  5359. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5360. } /* wlanoidQueryXmitMoreCollisions */
  5361. /*----------------------------------------------------------------------------*/
  5362. /*!
  5363. * \brief This routine is called to query the number of frames
  5364. * not transmitted due to excessive collisions.
  5365. *
  5366. * \param[in] prAdapter Pointer to the Adapter structure.
  5367. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  5368. * the query.
  5369. * \param[in] u4QueryBufferLen The length of the query buffer.
  5370. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5371. * bytes written into the query buffer. If the call
  5372. * failed due to invalid length of the query buffer,
  5373. * returns the amount of storage needed.
  5374. *
  5375. * \retval WLAN_STATUS_SUCCESS
  5376. * \retval WLAN_STATUS_INVALID_LENGTH
  5377. */
  5378. /*----------------------------------------------------------------------------*/
  5379. WLAN_STATUS
  5380. wlanoidQueryXmitMaxCollisions(IN P_ADAPTER_T prAdapter,
  5381. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5382. {
  5383. DEBUGFUNC("wlanoidQueryXmitMaxCollisions");
  5384. DBGLOG(OID, LOUD, "\n");
  5385. ASSERT(prAdapter);
  5386. if (u4QueryBufferLen)
  5387. ASSERT(pvQueryBuffer);
  5388. ASSERT(pu4QueryInfoLen);
  5389. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5390. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5391. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5392. *pu4QueryInfoLen = sizeof(UINT_32);
  5393. return WLAN_STATUS_ADAPTER_NOT_READY;
  5394. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5395. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5396. *pu4QueryInfoLen = sizeof(UINT_64);
  5397. return WLAN_STATUS_INVALID_LENGTH;
  5398. }
  5399. #if CFG_ENABLE_STATISTICS_BUFFERING
  5400. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5401. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5402. *pu4QueryInfoLen = sizeof(UINT_32);
  5403. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rFailedCount.QuadPart;
  5404. } else {
  5405. *pu4QueryInfoLen = sizeof(UINT_64);
  5406. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rFailedCount.QuadPart;
  5407. }
  5408. return WLAN_STATUS_SUCCESS;
  5409. }
  5410. #endif
  5411. return wlanSendSetQueryCmd(prAdapter,
  5412. CMD_ID_GET_STATISTICS,
  5413. FALSE,
  5414. TRUE,
  5415. TRUE,
  5416. nicCmdEventQueryXmitMaxCollisions,
  5417. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5418. } /* wlanoidQueryXmitMaxCollisions */
  5419. #define MTK_CUSTOM_OID_INTERFACE_VERSION 0x00006620 /* for WPDWifi DLL */
  5420. /*----------------------------------------------------------------------------*/
  5421. /*!
  5422. * \brief This routine is called to query current the OID interface version,
  5423. * which is the interface between the application and driver.
  5424. *
  5425. * \param[in] prAdapter Pointer to the Adapter structure.
  5426. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  5427. * the query.
  5428. * \param[in] u4QueryBufferLen The length of the query buffer.
  5429. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5430. * bytes written into the query buffer. If the call
  5431. * failed due to invalid length of the query buffer,
  5432. * returns the amount of storage needed.
  5433. *
  5434. * \retval WLAN_STATUS_SUCCESS
  5435. */
  5436. /*----------------------------------------------------------------------------*/
  5437. WLAN_STATUS
  5438. wlanoidQueryOidInterfaceVersion(IN P_ADAPTER_T prAdapter,
  5439. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5440. {
  5441. DEBUGFUNC("wlanoidQueryOidInterfaceVersion");
  5442. ASSERT(prAdapter);
  5443. if (u4QueryBufferLen)
  5444. ASSERT(pvQueryBuffer);
  5445. ASSERT(pu4QueryInfoLen);
  5446. *(PUINT_32) pvQueryBuffer = MTK_CUSTOM_OID_INTERFACE_VERSION;
  5447. *pu4QueryInfoLen = sizeof(UINT_32);
  5448. DBGLOG(OID, WARN, "Custom OID interface version: %#08X\n", *(PUINT_32) pvQueryBuffer);
  5449. return WLAN_STATUS_SUCCESS;
  5450. } /* wlanoidQueryOidInterfaceVersion */
  5451. /*----------------------------------------------------------------------------*/
  5452. /*!
  5453. * \brief This routine is called to query current Multicast Address List.
  5454. *
  5455. * \param[in] prAdapter Pointer to the Adapter structure.
  5456. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  5457. * the query.
  5458. * \param[in] u4QueryBufferLen The length of the query buffer.
  5459. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5460. * bytes written into the query buffer. If the call
  5461. * failed due to invalid length of the query buffer,
  5462. * returns the amount of storage needed.
  5463. *
  5464. * \retval WLAN_STATUS_SUCCESS
  5465. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  5466. */
  5467. /*----------------------------------------------------------------------------*/
  5468. WLAN_STATUS
  5469. wlanoidQueryMulticastList(IN P_ADAPTER_T prAdapter,
  5470. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5471. {
  5472. #ifndef LINUX
  5473. ASSERT(prAdapter);
  5474. ASSERT(pu4QueryInfoLen);
  5475. if (u4QueryBufferLen)
  5476. ASSERT(pvQueryBuffer);
  5477. return wlanSendSetQueryCmd(prAdapter,
  5478. CMD_ID_MAC_MCAST_ADDR,
  5479. FALSE,
  5480. TRUE,
  5481. TRUE,
  5482. nicCmdEventQueryMcastAddr,
  5483. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5484. #else
  5485. return WLAN_STATUS_SUCCESS;
  5486. #endif
  5487. } /* end of wlanoidQueryMulticastList() */
  5488. /*----------------------------------------------------------------------------*/
  5489. /*!
  5490. * \brief This routine is called to set Multicast Address List.
  5491. *
  5492. * \param[in] prAdapter Pointer to the Adapter structure.
  5493. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  5494. * \param[in] u4SetBufferLen The length of the set buffer.
  5495. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5496. * bytes read from the set buffer. If the call failed
  5497. * due to invalid length of the set buffer, returns
  5498. * the amount of storage needed.
  5499. *
  5500. * \retval WLAN_STATUS_SUCCESS
  5501. * \retval WLAN_STATUS_INVALID_LENGTH
  5502. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  5503. * \retval WLAN_STATUS_MULTICAST_FULL
  5504. */
  5505. /*----------------------------------------------------------------------------*/
  5506. WLAN_STATUS
  5507. wlanoidSetMulticastList(IN P_ADAPTER_T prAdapter,
  5508. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5509. {
  5510. UINT_8 ucNetTypeIndex = NETWORK_TYPE_AIS_INDEX; /* Caller should provide this information */
  5511. CMD_MAC_MCAST_ADDR rCmdMacMcastAddr;
  5512. ASSERT(prAdapter);
  5513. ASSERT(pu4SetInfoLen);
  5514. /* The data must be a multiple of the Ethernet address size. */
  5515. if ((u4SetBufferLen % MAC_ADDR_LEN)) {
  5516. DBGLOG(OID, WARN, "Invalid MC list length %u\n", u4SetBufferLen);
  5517. *pu4SetInfoLen = (((u4SetBufferLen + MAC_ADDR_LEN) - 1) / MAC_ADDR_LEN) * MAC_ADDR_LEN;
  5518. return WLAN_STATUS_INVALID_LENGTH;
  5519. }
  5520. *pu4SetInfoLen = u4SetBufferLen;
  5521. /* Verify if we can support so many multicast addresses. */
  5522. if ((u4SetBufferLen / MAC_ADDR_LEN) > MAX_NUM_GROUP_ADDR) {
  5523. DBGLOG(OID, WARN, "Too many MC addresses\n");
  5524. return WLAN_STATUS_MULTICAST_FULL;
  5525. }
  5526. /* NOTE(Kevin): Windows may set u4SetBufferLen == 0 &&
  5527. * pvSetBuffer == NULL to clear exist Multicast List.
  5528. */
  5529. if (u4SetBufferLen)
  5530. ASSERT(pvSetBuffer);
  5531. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5532. DBGLOG(OID, WARN, "Fail in set multicast list! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5533. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5534. return WLAN_STATUS_ADAPTER_NOT_READY;
  5535. }
  5536. rCmdMacMcastAddr.u4NumOfGroupAddr = u4SetBufferLen / MAC_ADDR_LEN;
  5537. rCmdMacMcastAddr.ucNetTypeIndex = ucNetTypeIndex;
  5538. kalMemCopy(rCmdMacMcastAddr.arAddress, pvSetBuffer, u4SetBufferLen);
  5539. return wlanSendSetQueryCmd(prAdapter,
  5540. CMD_ID_MAC_MCAST_ADDR,
  5541. TRUE,
  5542. FALSE,
  5543. TRUE,
  5544. nicCmdEventSetCommon,
  5545. nicOidCmdTimeoutCommon,
  5546. sizeof(CMD_MAC_MCAST_ADDR),
  5547. (PUINT_8) &rCmdMacMcastAddr, pvSetBuffer, u4SetBufferLen);
  5548. } /* end of wlanoidSetMulticastList() */
  5549. /*----------------------------------------------------------------------------*/
  5550. /*!
  5551. * \brief This routine is called to set Packet Filter.
  5552. *
  5553. * \param[in] prAdapter Pointer to the Adapter structure.
  5554. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  5555. * \param[in] u4SetBufferLen The length of the set buffer.
  5556. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5557. * bytes read from the set buffer. If the call failed
  5558. * due to invalid length of the set buffer, returns
  5559. * the amount of storage needed.
  5560. *
  5561. * \retval WLAN_STATUS_SUCCESS
  5562. * \retval WLAN_STATUS_INVALID_LENGTH
  5563. * \retval WLAN_STATUS_NOT_SUPPORTED
  5564. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  5565. */
  5566. /*----------------------------------------------------------------------------*/
  5567. WLAN_STATUS
  5568. wlanoidSetCurrentPacketFilter(IN P_ADAPTER_T prAdapter,
  5569. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5570. {
  5571. UINT_32 u4NewPacketFilter;
  5572. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  5573. ASSERT(prAdapter);
  5574. ASSERT(pu4SetInfoLen);
  5575. if (u4SetBufferLen < sizeof(UINT_32)) {
  5576. *pu4SetInfoLen = sizeof(UINT_32);
  5577. DBGLOG(OID, INFO, "iput buffer is too small");
  5578. return WLAN_STATUS_INVALID_LENGTH;
  5579. }
  5580. ASSERT(pvSetBuffer);
  5581. /* Set the new packet filter. */
  5582. u4NewPacketFilter = *(PUINT_32) pvSetBuffer;
  5583. DBGLOG(OID, TRACE, "New packet filter: %#08x\n", u4NewPacketFilter);
  5584. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5585. DBGLOG(OID, WARN, "Fail in set current packet filter! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5586. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5587. return WLAN_STATUS_ADAPTER_NOT_READY;
  5588. }
  5589. do {
  5590. /* Verify the bits of the new packet filter. If any bits are set that
  5591. we don't support, leave. */
  5592. if (u4NewPacketFilter & ~(PARAM_PACKET_FILTER_SUPPORTED)) {
  5593. rStatus = WLAN_STATUS_NOT_SUPPORTED;
  5594. break;
  5595. }
  5596. #if DBG
  5597. /* Need to enable or disable promiscuous support depending on the new
  5598. filter. */
  5599. if (u4NewPacketFilter & PARAM_PACKET_FILTER_PROMISCUOUS)
  5600. DBGLOG(OID, TRACE, "Enable promiscuous mode\n");
  5601. else
  5602. DBGLOG(OID, TRACE, "Disable promiscuous mode\n");
  5603. if (u4NewPacketFilter & PARAM_PACKET_FILTER_ALL_MULTICAST)
  5604. DBGLOG(OID, TRACE, "Enable all-multicast mode\n");
  5605. else if (u4NewPacketFilter & PARAM_PACKET_FILTER_MULTICAST)
  5606. DBGLOG(OID, TRACE, "Enable multicast\n");
  5607. else
  5608. DBGLOG(OID, TRACE, "Disable multicast\n");
  5609. if (u4NewPacketFilter & PARAM_PACKET_FILTER_BROADCAST)
  5610. DBGLOG(OID, TRACE, "Enable Broadcast\n");
  5611. else
  5612. DBGLOG(OID, TRACE, "Disable Broadcast\n");
  5613. #endif
  5614. } while (FALSE);
  5615. if (rStatus == WLAN_STATUS_SUCCESS) {
  5616. /* Store the packet filter */
  5617. prAdapter->u4OsPacketFilter &= PARAM_PACKET_FILTER_P2P_MASK;
  5618. prAdapter->u4OsPacketFilter |= u4NewPacketFilter;
  5619. rStatus = wlanoidSetPacketFilter(prAdapter, prAdapter->u4OsPacketFilter,
  5620. TRUE, pvSetBuffer, u4SetBufferLen);
  5621. }
  5622. DBGLOG(REQ, INFO, "[MC debug] u4OsPacketFilter=%x\n", prAdapter->u4OsPacketFilter);
  5623. return rStatus;
  5624. } /* wlanoidSetCurrentPacketFilter */
  5625. WLAN_STATUS wlanoidSetPacketFilter(P_ADAPTER_T prAdapter, UINT_32 u4PacketFilter,
  5626. BOOLEAN fgIsOid, PVOID pvSetBuffer, UINT_32 u4SetBufferLen)
  5627. {
  5628. #if CFG_SUPPORT_DROP_MC_PACKET
  5629. /* Note:
  5630. If PARAM_PACKET_FILTER_ALL_MULTICAST is set in PacketFilter,
  5631. Firmware will pass multicast frame.
  5632. Else if PARAM_PACKET_FILTER_MULTICAST is set in PacketFilter,
  5633. Firmware will pass some multicast frame in multicast table.
  5634. Else firmware will drop all multicast frame.
  5635. */
  5636. if (fgIsUnderSuspend)
  5637. u4PacketFilter &= ~(PARAM_PACKET_FILTER_MULTICAST | PARAM_PACKET_FILTER_ALL_MULTICAST);
  5638. #endif
  5639. DBGLOG(REQ, INFO, "[MC debug] u4PacketFilter=%x, IsSuspend=%d\n", u4PacketFilter, fgIsUnderSuspend);
  5640. return wlanSendSetQueryCmd(prAdapter,
  5641. CMD_ID_SET_RX_FILTER,
  5642. TRUE,
  5643. FALSE,
  5644. fgIsOid,
  5645. nicCmdEventSetCommon,
  5646. nicOidCmdTimeoutCommon,
  5647. sizeof(UINT_32),
  5648. (PUINT_8)&u4PacketFilter,
  5649. pvSetBuffer, u4SetBufferLen);
  5650. }
  5651. /*----------------------------------------------------------------------------*/
  5652. /*!
  5653. * \brief This routine is called to query current packet filter.
  5654. *
  5655. * \param[in] prAdapter Pointer to the Adapter structure.
  5656. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  5657. * the query.
  5658. * \param[in] u4QueryBufferLen The length of the query buffer.
  5659. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5660. * bytes written into the query buffer. If the call
  5661. * failed due to invalid length of the query buffer,
  5662. * returns the amount of storage needed.
  5663. *
  5664. * \retval WLAN_STATUS_SUCCESS
  5665. */
  5666. /*----------------------------------------------------------------------------*/
  5667. WLAN_STATUS
  5668. wlanoidQueryCurrentPacketFilter(IN P_ADAPTER_T prAdapter,
  5669. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5670. {
  5671. DEBUGFUNC("wlanoidQueryCurrentPacketFilter");
  5672. ASSERT(prAdapter);
  5673. ASSERT(pu4QueryInfoLen);
  5674. *pu4QueryInfoLen = sizeof(UINT_32);
  5675. if (u4QueryBufferLen >= sizeof(UINT_32)) {
  5676. ASSERT(pvQueryBuffer);
  5677. *(PUINT_32) pvQueryBuffer = prAdapter->u4OsPacketFilter;
  5678. }
  5679. return WLAN_STATUS_SUCCESS;
  5680. } /* wlanoidQueryCurrentPacketFilter */
  5681. /*----------------------------------------------------------------------------*/
  5682. /*!
  5683. * \brief This routine is called to query ACPI device power state.
  5684. *
  5685. * \param[in] prAdapter Pointer to the Adapter structure.
  5686. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  5687. * the query.
  5688. * \param[in] u4QueryBufferLen The length of the query buffer.
  5689. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5690. * bytes written into the query buffer. If the call
  5691. * failed due to invalid length of the query buffer,
  5692. * returns the amount of storage needed.
  5693. *
  5694. * \retval WLAN_STATUS_SUCCESS
  5695. */
  5696. /*----------------------------------------------------------------------------*/
  5697. WLAN_STATUS
  5698. wlanoidQueryAcpiDevicePowerState(IN P_ADAPTER_T prAdapter,
  5699. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5700. {
  5701. #if DBG
  5702. PPARAM_DEVICE_POWER_STATE prPowerState;
  5703. #endif
  5704. DEBUGFUNC("wlanoidQueryAcpiDevicePowerState");
  5705. ASSERT(prAdapter);
  5706. ASSERT(pu4QueryInfoLen);
  5707. if (u4QueryBufferLen)
  5708. ASSERT(pvQueryBuffer);
  5709. *pu4QueryInfoLen = sizeof(PARAM_DEVICE_POWER_STATE);
  5710. #if DBG
  5711. prPowerState = (PPARAM_DEVICE_POWER_STATE) pvQueryBuffer;
  5712. switch (*prPowerState) {
  5713. case ParamDeviceStateD0:
  5714. DBGLOG(OID, INFO, "Query Power State: D0\n");
  5715. break;
  5716. case ParamDeviceStateD1:
  5717. DBGLOG(OID, INFO, "Query Power State: D1\n");
  5718. break;
  5719. case ParamDeviceStateD2:
  5720. DBGLOG(OID, INFO, "Query Power State: D2\n");
  5721. break;
  5722. case ParamDeviceStateD3:
  5723. DBGLOG(OID, INFO, "Query Power State: D3\n");
  5724. break;
  5725. default:
  5726. break;
  5727. }
  5728. #endif
  5729. /* Since we will disconnect the newwork, therefore we do not
  5730. need to check queue empty */
  5731. *(PPARAM_DEVICE_POWER_STATE) pvQueryBuffer = ParamDeviceStateD3;
  5732. /* WARNLOG(("Ready to transition to D3\n")); */
  5733. return WLAN_STATUS_SUCCESS;
  5734. } /* pwrmgtQueryPower */
  5735. /*----------------------------------------------------------------------------*/
  5736. /*!
  5737. * \brief This routine is called to set ACPI device power state.
  5738. *
  5739. * \param[in] pvAdapter Pointer to the Adapter structure.
  5740. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  5741. * \param[in] u4SetBufferLen The length of the set buffer.
  5742. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5743. * bytes read from the set buffer. If the call failed
  5744. * due to invalid length of the set buffer, returns
  5745. * the amount of storage needed.
  5746. *
  5747. * \retval WLAN_STATUS_SUCCESS
  5748. */
  5749. /*----------------------------------------------------------------------------*/
  5750. WLAN_STATUS
  5751. wlanoidSetAcpiDevicePowerState(IN P_ADAPTER_T prAdapter,
  5752. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5753. {
  5754. PPARAM_DEVICE_POWER_STATE prPowerState;
  5755. BOOLEAN fgRetValue = TRUE;
  5756. DEBUGFUNC("wlanoidSetAcpiDevicePowerState");
  5757. ASSERT(prAdapter);
  5758. ASSERT(pu4SetInfoLen);
  5759. *pu4SetInfoLen = sizeof(PARAM_DEVICE_POWER_STATE);
  5760. ASSERT(pvSetBuffer);
  5761. prPowerState = (PPARAM_DEVICE_POWER_STATE) pvSetBuffer;
  5762. switch (*prPowerState) {
  5763. case ParamDeviceStateD0:
  5764. DBGLOG(OID, INFO, "Set Power State: D0\n");
  5765. kalDevSetPowerState(prAdapter->prGlueInfo, (UINT_32) ParamDeviceStateD0);
  5766. fgRetValue = nicpmSetAcpiPowerD0(prAdapter);
  5767. break;
  5768. case ParamDeviceStateD1:
  5769. DBGLOG(OID, INFO, "Set Power State: D1\n");
  5770. /* no break here */
  5771. case ParamDeviceStateD2:
  5772. DBGLOG(OID, INFO, "Set Power State: D2\n");
  5773. /* no break here */
  5774. case ParamDeviceStateD3:
  5775. DBGLOG(OID, INFO, "Set Power State: D3\n");
  5776. fgRetValue = nicpmSetAcpiPowerD3(prAdapter);
  5777. kalDevSetPowerState(prAdapter->prGlueInfo, (UINT_32) ParamDeviceStateD3);
  5778. break;
  5779. default:
  5780. break;
  5781. }
  5782. if (fgRetValue == TRUE)
  5783. return WLAN_STATUS_SUCCESS;
  5784. else
  5785. return WLAN_STATUS_FAILURE;
  5786. } /* end of wlanoidSetAcpiDevicePowerState() */
  5787. /*----------------------------------------------------------------------------*/
  5788. /*!
  5789. * \brief This routine is called to query the current fragmentation threshold.
  5790. *
  5791. * \param[in] pvAdapter Pointer to the Adapter structure.
  5792. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  5793. * the query.
  5794. * \param[in] u4QueryBufferLen The length of the query buffer.
  5795. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5796. * bytes written into the query buffer. If the call
  5797. * failed due to invalid length of the query buffer,
  5798. * returns the amount of storage needed.
  5799. *
  5800. * \retval WLAN_STATUS_SUCCESS
  5801. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  5802. */
  5803. /*----------------------------------------------------------------------------*/
  5804. WLAN_STATUS
  5805. wlanoidQueryFragThreshold(IN P_ADAPTER_T prAdapter,
  5806. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5807. {
  5808. DEBUGFUNC("wlanoidQueryFragThreshold");
  5809. ASSERT(prAdapter);
  5810. if (u4QueryBufferLen)
  5811. ASSERT(pvQueryBuffer);
  5812. ASSERT(pu4QueryInfoLen);
  5813. DBGLOG(OID, LOUD, "\n");
  5814. #if CFG_TX_FRAGMENT
  5815. return WLAN_STATUS_SUCCESS;
  5816. #else
  5817. return WLAN_STATUS_NOT_SUPPORTED;
  5818. #endif /* CFG_TX_FRAGMENT */
  5819. } /* end of wlanoidQueryFragThreshold() */
  5820. /*----------------------------------------------------------------------------*/
  5821. /*!
  5822. * \brief This routine is called to set a new fragmentation threshold to the
  5823. * driver.
  5824. *
  5825. * \param[in] pvAdapter Pointer to the Adapter structure.
  5826. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  5827. * \param[in] u4SetBufferLen The length of the set buffer.
  5828. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5829. * bytes read from the set buffer. If the call failed
  5830. * due to invalid length of the set buffer, returns
  5831. * the amount of storage needed.
  5832. *
  5833. * \retval WLAN_STATUS_SUCCESS
  5834. * \retval WLAN_STATUS_INVALID_DATA
  5835. * \retval WLAN_STATUS_INVALID_LENGTH
  5836. */
  5837. /*----------------------------------------------------------------------------*/
  5838. WLAN_STATUS
  5839. wlanoidSetFragThreshold(IN P_ADAPTER_T prAdapter,
  5840. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5841. {
  5842. #if CFG_TX_FRAGMENT
  5843. return WLAN_STATUS_SUCCESS;
  5844. #else
  5845. return WLAN_STATUS_NOT_SUPPORTED;
  5846. #endif /* CFG_TX_FRAGMENT */
  5847. } /* end of wlanoidSetFragThreshold() */
  5848. /*----------------------------------------------------------------------------*/
  5849. /*!
  5850. * \brief This routine is called to query the current RTS threshold.
  5851. *
  5852. * \param[in] pvAdapter Pointer to the Adapter structure.
  5853. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  5854. * the query.
  5855. * \param[in] u4QueryBufferLen The length of the query buffer.
  5856. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5857. * bytes written into the query buffer. If the call
  5858. * failed due to invalid length of the query buffer,
  5859. * returns the amount of storage needed.
  5860. *
  5861. * \retval WLAN_STATUS_SUCCESS
  5862. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  5863. */
  5864. /*----------------------------------------------------------------------------*/
  5865. WLAN_STATUS
  5866. wlanoidQueryRtsThreshold(IN P_ADAPTER_T prAdapter,
  5867. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5868. {
  5869. DEBUGFUNC("wlanoidQueryRtsThreshold");
  5870. ASSERT(prAdapter);
  5871. if (u4QueryBufferLen)
  5872. ASSERT(pvQueryBuffer);
  5873. ASSERT(pu4QueryInfoLen);
  5874. DBGLOG(OID, LOUD, "\n");
  5875. if (u4QueryBufferLen < sizeof(PARAM_RTS_THRESHOLD)) {
  5876. *pu4QueryInfoLen = sizeof(PARAM_RTS_THRESHOLD);
  5877. return WLAN_STATUS_BUFFER_TOO_SHORT;
  5878. }
  5879. *((PARAM_RTS_THRESHOLD *) pvQueryBuffer) = prAdapter->rWlanInfo.eRtsThreshold;
  5880. return WLAN_STATUS_SUCCESS;
  5881. } /* wlanoidQueryRtsThreshold */
  5882. /*----------------------------------------------------------------------------*/
  5883. /*!
  5884. * \brief This routine is called to set a new RTS threshold to the driver.
  5885. *
  5886. * \param[in] pvAdapter Pointer to the Adapter structure.
  5887. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  5888. * \param[in] u4SetBufferLen The length of the set buffer.
  5889. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5890. * bytes read from the set buffer. If the call failed
  5891. * due to invalid length of the set buffer, returns
  5892. * the amount of storage needed.
  5893. *
  5894. * \retval WLAN_STATUS_SUCCESS
  5895. * \retval WLAN_STATUS_INVALID_DATA
  5896. * \retval WLAN_STATUS_INVALID_LENGTH
  5897. */
  5898. /*----------------------------------------------------------------------------*/
  5899. WLAN_STATUS
  5900. wlanoidSetRtsThreshold(IN P_ADAPTER_T prAdapter,
  5901. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5902. {
  5903. PARAM_RTS_THRESHOLD *prRtsThreshold;
  5904. ASSERT(prAdapter);
  5905. ASSERT(pu4SetInfoLen);
  5906. *pu4SetInfoLen = sizeof(PARAM_RTS_THRESHOLD);
  5907. if (u4SetBufferLen < sizeof(PARAM_RTS_THRESHOLD)) {
  5908. DBGLOG(OID, WARN, "Invalid length %u\n", u4SetBufferLen);
  5909. return WLAN_STATUS_INVALID_LENGTH;
  5910. }
  5911. prRtsThreshold = (PARAM_RTS_THRESHOLD *) pvSetBuffer;
  5912. *prRtsThreshold = prAdapter->rWlanInfo.eRtsThreshold;
  5913. return WLAN_STATUS_SUCCESS;
  5914. } /* wlanoidSetRtsThreshold */
  5915. /*----------------------------------------------------------------------------*/
  5916. /*!
  5917. * \brief This routine is used to turn radio off.
  5918. *
  5919. * \param[in] pvAdapter Pointer to the Adapter structure.
  5920. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  5921. * \param[in] u4SetBufferLen The length of the set buffer.
  5922. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5923. * bytes read from the set buffer. If the call failed
  5924. * due to invalid length of the set buffer, returns
  5925. * the amount of storage needed.
  5926. *
  5927. * \retval WLAN_STATUS_SUCCESS
  5928. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  5929. */
  5930. /*----------------------------------------------------------------------------*/
  5931. WLAN_STATUS
  5932. wlanoidSetDisassociate(IN P_ADAPTER_T prAdapter,
  5933. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5934. {
  5935. P_MSG_AIS_ABORT_T prAisAbortMsg;
  5936. DEBUGFUNC("wlanoidSetDisassociate");
  5937. ASSERT(prAdapter);
  5938. ASSERT(pu4SetInfoLen);
  5939. *pu4SetInfoLen = 0;
  5940. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5941. DBGLOG(OID, WARN, "Fail in set disassociate! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5942. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5943. return WLAN_STATUS_ADAPTER_NOT_READY;
  5944. }
  5945. /* prepare message to AIS */
  5946. prAdapter->rWifiVar.rConnSettings.fgIsConnReqIssued = FALSE;
  5947. prAdapter->rWifiVar.rConnSettings.eReConnectLevel = RECONNECT_LEVEL_USER_SET;
  5948. /* Send AIS Abort Message */
  5949. prAisAbortMsg = (P_MSG_AIS_ABORT_T) cnmMemAlloc(prAdapter, RAM_TYPE_MSG, sizeof(MSG_AIS_ABORT_T));
  5950. if (!prAisAbortMsg) {
  5951. ASSERT(0);
  5952. return WLAN_STATUS_FAILURE;
  5953. }
  5954. prAisAbortMsg->rMsgHdr.eMsgId = MID_OID_AIS_FSM_JOIN_REQ;
  5955. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  5956. prAisAbortMsg->fgDelayIndication = FALSE;
  5957. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prAisAbortMsg, MSG_SEND_METHOD_BUF);
  5958. /* indicate for disconnection */
  5959. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  5960. DBGLOG(OID, INFO, "DisconnectByOid\n");
  5961. kalIndicateStatusAndComplete(prAdapter->prGlueInfo, WLAN_STATUS_MEDIA_DISCONNECT_LOCALLY, NULL, 0);
  5962. }
  5963. #if !defined(LINUX)
  5964. prAdapter->fgIsRadioOff = TRUE;
  5965. #endif
  5966. return WLAN_STATUS_SUCCESS;
  5967. } /* wlanoidSetDisassociate */
  5968. /*----------------------------------------------------------------------------*/
  5969. /*!
  5970. * \brief This routine is used to query the power save profile.
  5971. *
  5972. * \param[in] prAdapter Pointer to the Adapter structure.
  5973. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5974. * the query.
  5975. * \param[in] u4QueryBufLen The length of the query buffer.
  5976. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5977. * bytes written into the query buffer. If the call
  5978. * failed due to invalid length of the query buffer,
  5979. * returns the amount of storage needed.
  5980. *
  5981. * \return WLAN_STATUS_SUCCESS
  5982. */
  5983. /*----------------------------------------------------------------------------*/
  5984. WLAN_STATUS
  5985. wlanoidQuery802dot11PowerSaveProfile(IN P_ADAPTER_T prAdapter,
  5986. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5987. {
  5988. DEBUGFUNC("wlanoidQuery802dot11PowerSaveProfile");
  5989. ASSERT(prAdapter);
  5990. ASSERT(pu4QueryInfoLen);
  5991. if (u4QueryBufferLen != 0) {
  5992. ASSERT(pvQueryBuffer);
  5993. /* *(PPARAM_POWER_MODE) pvQueryBuffer = (PARAM_POWER_MODE)(prAdapter->rWlanInfo.ePowerSaveMode.ucPsProfile); */
  5994. *(PPARAM_POWER_MODE) pvQueryBuffer =
  5995. (PARAM_POWER_MODE) (prAdapter->rWlanInfo.arPowerSaveMode[NETWORK_TYPE_AIS_INDEX].ucPsProfile);
  5996. *pu4QueryInfoLen = sizeof(PARAM_POWER_MODE);
  5997. /* hack for CTIA power mode setting function */
  5998. if (prAdapter->fgEnCtiaPowerMode) {
  5999. /* set to non-zero value (to prevent MMI query 0, before it intends to set 0, */
  6000. /* which will skip its following state machine) */
  6001. *(PPARAM_POWER_MODE) pvQueryBuffer = (PARAM_POWER_MODE) 2;
  6002. }
  6003. }
  6004. return WLAN_STATUS_SUCCESS;
  6005. }
  6006. /*----------------------------------------------------------------------------*/
  6007. /*!
  6008. * \brief This routine is used to set the power save profile.
  6009. *
  6010. * \param[in] pvAdapter Pointer to the Adapter structure.
  6011. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  6012. * \param[in] u4SetBufferLen The length of the set buffer.
  6013. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6014. * bytes read from the set buffer. If the call failed
  6015. * due to invalid length of the set buffer, returns
  6016. * the amount of storage needed.
  6017. *
  6018. * \retval WLAN_STATUS_SUCCESS
  6019. * \retval WLAN_STATUS_INVALID_LENGTH
  6020. */
  6021. /*----------------------------------------------------------------------------*/
  6022. WLAN_STATUS
  6023. wlanoidSet802dot11PowerSaveProfile(IN P_ADAPTER_T prAdapter,
  6024. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6025. {
  6026. WLAN_STATUS status;
  6027. PARAM_POWER_MODE ePowerMode;
  6028. DEBUGFUNC("wlanoidSet802dot11PowerSaveProfile");
  6029. ASSERT(prAdapter);
  6030. ASSERT(pu4SetInfoLen);
  6031. *pu4SetInfoLen = sizeof(PARAM_POWER_MODE);
  6032. if (u4SetBufferLen < sizeof(PARAM_POWER_MODE)) {
  6033. DBGLOG(OID, WARN, "Invalid length %u\n", u4SetBufferLen);
  6034. return WLAN_STATUS_INVALID_LENGTH;
  6035. } else if (*(PPARAM_POWER_MODE) pvSetBuffer >= Param_PowerModeMax) {
  6036. /* WARNLOG(("Invalid power mode %d\n", */
  6037. /* *(PPARAM_POWER_MODE) pvSetBuffer)); */
  6038. return WLAN_STATUS_INVALID_DATA;
  6039. }
  6040. ePowerMode = *(PPARAM_POWER_MODE) pvSetBuffer;
  6041. if (prAdapter->fgEnCtiaPowerMode) {
  6042. if (ePowerMode == Param_PowerModeCAM)
  6043. ;
  6044. else {
  6045. /* User setting to PS mode (Param_PowerModeMAX_PSP or Param_PowerModeFast_PSP) */
  6046. if (prAdapter->u4CtiaPowerMode == 0)
  6047. /* force to keep in CAM mode */
  6048. ePowerMode = Param_PowerModeCAM;
  6049. else if (prAdapter->u4CtiaPowerMode == 1)
  6050. ePowerMode = Param_PowerModeMAX_PSP;
  6051. else if (prAdapter->u4CtiaPowerMode == 2)
  6052. ePowerMode = Param_PowerModeFast_PSP;
  6053. }
  6054. }
  6055. status = nicConfigPowerSaveProfile(prAdapter, NETWORK_TYPE_AIS_INDEX, ePowerMode, TRUE);
  6056. switch (ePowerMode) {
  6057. case Param_PowerModeCAM:
  6058. DBGLOG(OID, INFO, "Set Wi-Fi PS mode to CAM (%d)\n", ePowerMode);
  6059. break;
  6060. case Param_PowerModeMAX_PSP:
  6061. DBGLOG(OID, INFO, "Set Wi-Fi PS mode to MAX PS (%d)\n", ePowerMode);
  6062. break;
  6063. case Param_PowerModeFast_PSP:
  6064. DBGLOG(OID, INFO, "Set Wi-Fi PS mode to FAST PS (%d)\n", ePowerMode);
  6065. break;
  6066. default:
  6067. DBGLOG(OID, INFO, "invalid Wi-Fi PS mode setting (%d)\n", ePowerMode);
  6068. break;
  6069. }
  6070. return status;
  6071. } /* end of wlanoidSetAcpiDevicePowerStateMode() */
  6072. /*----------------------------------------------------------------------------*/
  6073. /*!
  6074. * \brief This routine is called to query current status of AdHoc Mode.
  6075. *
  6076. * \param[in] prAdapter Pointer to the Adapter structure.
  6077. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6078. * the query.
  6079. * \param[in] u4QueryBufferLen The length of the query buffer.
  6080. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6081. * bytes written into the query buffer. If the call
  6082. * failed due to invalid length of the query buffer,
  6083. * returns the amount of storage needed.
  6084. *
  6085. * \retval WLAN_STATUS_SUCCESS
  6086. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  6087. */
  6088. /*----------------------------------------------------------------------------*/
  6089. WLAN_STATUS
  6090. wlanoidQueryAdHocMode(IN P_ADAPTER_T prAdapter,
  6091. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  6092. {
  6093. return WLAN_STATUS_SUCCESS;
  6094. } /* end of wlanoidQueryAdHocMode() */
  6095. /*----------------------------------------------------------------------------*/
  6096. /*!
  6097. * \brief This routine is called to set AdHoc Mode.
  6098. *
  6099. * \param[in] prAdapter Pointer to the Adapter structure.
  6100. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  6101. * \param[in] u4SetBufferLen The length of the set buffer.
  6102. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6103. * bytes read from the set buffer. If the call failed
  6104. * due to invalid length of the set buffer, returns
  6105. * the amount of storage needed.
  6106. *
  6107. * \retval WLAN_STATUS_SUCCESS
  6108. * \retval WLAN_STATUS_INVALID_LENGTH
  6109. * \retval WLAN_STATUS_INVALID_DATA
  6110. */
  6111. /*----------------------------------------------------------------------------*/
  6112. WLAN_STATUS
  6113. wlanoidSetAdHocMode(IN P_ADAPTER_T prAdapter,
  6114. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6115. {
  6116. return WLAN_STATUS_SUCCESS;
  6117. } /* end of wlanoidSetAdHocMode() */
  6118. /*----------------------------------------------------------------------------*/
  6119. /*!
  6120. * \brief This routine is called to query RF frequency.
  6121. *
  6122. * \param[in] prAdapter Pointer to the Adapter structure.
  6123. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6124. * the query.
  6125. * \param[in] u4QueryBufferLen The length of the query buffer.
  6126. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6127. * bytes written into the query buffer. If the call
  6128. * failed due to invalid length of the query buffer,
  6129. * returns the amount of storage needed.
  6130. *
  6131. * \retval WLAN_STATUS_SUCCESS
  6132. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  6133. */
  6134. /*----------------------------------------------------------------------------*/
  6135. WLAN_STATUS
  6136. wlanoidQueryFrequency(IN P_ADAPTER_T prAdapter,
  6137. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  6138. {
  6139. DEBUGFUNC("wlanoidQueryFrequency");
  6140. ASSERT(prAdapter);
  6141. ASSERT(pu4QueryInfoLen);
  6142. if (u4QueryBufferLen)
  6143. ASSERT(pvQueryBuffer);
  6144. if (u4QueryBufferLen < sizeof(UINT_32))
  6145. return WLAN_STATUS_BUFFER_TOO_SHORT;
  6146. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_INFRA) {
  6147. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  6148. *(PUINT_32) pvQueryBuffer =
  6149. nicChannelNum2Freq(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_AIS_INDEX].ucPrimaryChannel);
  6150. } else {
  6151. *(PUINT_32) pvQueryBuffer = 0;
  6152. }
  6153. } else {
  6154. *(PUINT_32) pvQueryBuffer = nicChannelNum2Freq(prAdapter->rWifiVar.rConnSettings.ucAdHocChannelNum);
  6155. }
  6156. return WLAN_STATUS_SUCCESS;
  6157. } /* end of wlanoidQueryFrequency() */
  6158. /*----------------------------------------------------------------------------*/
  6159. /*!
  6160. * \brief This routine is called to set RF frequency by User Settings.
  6161. *
  6162. * \param[in] prAdapter Pointer to the Adapter structure.
  6163. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6164. * the query.
  6165. * \param[in] u4QueryBufferLen The length of the query buffer.
  6166. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6167. * bytes written into the query buffer. If the call
  6168. * failed due to invalid length of the query buffer,
  6169. * returns the amount of storage needed.
  6170. *
  6171. * \retval WLAN_STATUS_SUCCESS
  6172. * \retval WLAN_STATUS_INVALID_LENGTH
  6173. * \retval WLAN_STATUS_INVALID_DATA
  6174. */
  6175. /*----------------------------------------------------------------------------*/
  6176. WLAN_STATUS
  6177. wlanoidSetFrequency(IN P_ADAPTER_T prAdapter,
  6178. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6179. {
  6180. PUINT_32 pu4FreqInKHz;
  6181. DEBUGFUNC("wlanoidSetFrequency");
  6182. ASSERT(prAdapter);
  6183. ASSERT(pu4SetInfoLen);
  6184. *pu4SetInfoLen = sizeof(UINT_32);
  6185. if (u4SetBufferLen < sizeof(UINT_32))
  6186. return WLAN_STATUS_INVALID_LENGTH;
  6187. ASSERT(pvSetBuffer);
  6188. pu4FreqInKHz = (PUINT_32) pvSetBuffer;
  6189. prAdapter->rWifiVar.rConnSettings.ucAdHocChannelNum = (UINT_8) nicFreq2ChannelNum(*pu4FreqInKHz);
  6190. prAdapter->rWifiVar.rConnSettings.eAdHocBand = *pu4FreqInKHz < 5000000 ? BAND_2G4 : BAND_5G;
  6191. return WLAN_STATUS_SUCCESS;
  6192. } /* end of wlanoidSetFrequency() */
  6193. /*----------------------------------------------------------------------------*/
  6194. /*!
  6195. * \brief This routine is called to set 802.11 channel of the radio frequency.
  6196. * This is a proprietary function call to Lunux currently.
  6197. *
  6198. * \param[in] prAdapter Pointer to the Adapter structure.
  6199. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  6200. * \param[in] u4SetBufferLen The length of the set buffer.
  6201. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6202. * bytes read from the set buffer. If the call failed
  6203. * due to invalid length of the set buffer, returns
  6204. * the amount of storage needed.
  6205. *
  6206. * \retval WLAN_STATUS_SUCCESS
  6207. * \retval WLAN_STATUS_INVALID_LENGTH
  6208. * \retval WLAN_STATUS_INVALID_DATA
  6209. */
  6210. /*----------------------------------------------------------------------------*/
  6211. WLAN_STATUS
  6212. wlanoidSetChannel(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6213. {
  6214. ASSERT(0); /* // */
  6215. return WLAN_STATUS_SUCCESS;
  6216. }
  6217. /*----------------------------------------------------------------------------*/
  6218. /*!
  6219. * \brief This routine is called to query the Beacon Interval from User Settings.
  6220. *
  6221. * \param[in] prAdapter Pointer to the Adapter structure.
  6222. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6223. * the query.
  6224. * \param[in] u4QueryBufferLen The length of the query buffer.
  6225. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6226. * bytes written into the query buffer. If the call
  6227. * failed due to invalid length of the query buffer,
  6228. * returns the amount of storage needed.
  6229. *
  6230. * \retval WLAN_STATUS_SUCCESS
  6231. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  6232. */
  6233. /*----------------------------------------------------------------------------*/
  6234. WLAN_STATUS
  6235. wlanoidQueryBeaconInterval(IN P_ADAPTER_T prAdapter,
  6236. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  6237. {
  6238. DEBUGFUNC("wlanoidQueryBeaconInterval");
  6239. ASSERT(prAdapter);
  6240. ASSERT(pu4QueryInfoLen);
  6241. if (u4QueryBufferLen)
  6242. ASSERT(pvQueryBuffer);
  6243. *pu4QueryInfoLen = sizeof(UINT_32);
  6244. if (u4QueryBufferLen < sizeof(UINT_32))
  6245. return WLAN_STATUS_BUFFER_TOO_SHORT;
  6246. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  6247. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_INFRA)
  6248. *(PUINT_32) pvQueryBuffer = prAdapter->rWlanInfo.rCurrBssId.rConfiguration.u4BeaconPeriod;
  6249. else
  6250. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rWlanInfo.u2BeaconPeriod;
  6251. } else {
  6252. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_INFRA)
  6253. *(PUINT_32) pvQueryBuffer = 0;
  6254. else
  6255. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rWlanInfo.u2BeaconPeriod;
  6256. }
  6257. return WLAN_STATUS_SUCCESS;
  6258. } /* end of wlanoidQueryBeaconInterval() */
  6259. /*----------------------------------------------------------------------------*/
  6260. /*!
  6261. * \brief This routine is called to set the Beacon Interval to User Settings.
  6262. *
  6263. * \param[in] prAdapter Pointer to the Adapter structure.
  6264. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  6265. * \param[in] u4SetBufferLen The length of the set buffer.
  6266. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6267. * bytes read from the set buffer. If the call failed
  6268. * due to invalid length of the set buffer, returns
  6269. * the amount of storage needed.
  6270. *
  6271. * \retval WLAN_STATUS_SUCCESS
  6272. * \retval WLAN_STATUS_INVALID_LENGTH
  6273. * \retval WLAN_STATUS_INVALID_DATA
  6274. */
  6275. /*----------------------------------------------------------------------------*/
  6276. WLAN_STATUS
  6277. wlanoidSetBeaconInterval(IN P_ADAPTER_T prAdapter,
  6278. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6279. {
  6280. PUINT_32 pu4BeaconInterval;
  6281. DEBUGFUNC("wlanoidSetBeaconInterval");
  6282. ASSERT(prAdapter);
  6283. ASSERT(pu4SetInfoLen);
  6284. *pu4SetInfoLen = sizeof(UINT_32);
  6285. if (u4SetBufferLen < sizeof(UINT_32))
  6286. return WLAN_STATUS_INVALID_LENGTH;
  6287. ASSERT(pvSetBuffer);
  6288. pu4BeaconInterval = (PUINT_32) pvSetBuffer;
  6289. if ((*pu4BeaconInterval < DOT11_BEACON_PERIOD_MIN) || (*pu4BeaconInterval > DOT11_BEACON_PERIOD_MAX)) {
  6290. DBGLOG(OID, TRACE, "Invalid Beacon Interval = %u\n", *pu4BeaconInterval);
  6291. return WLAN_STATUS_INVALID_DATA;
  6292. }
  6293. prAdapter->rWlanInfo.u2BeaconPeriod = (UINT_16) *pu4BeaconInterval;
  6294. DBGLOG(OID, INFO, "Set beacon interval: %d\n", prAdapter->rWlanInfo.u2BeaconPeriod);
  6295. return WLAN_STATUS_SUCCESS;
  6296. } /* end of wlanoidSetBeaconInterval() */
  6297. /*----------------------------------------------------------------------------*/
  6298. /*!
  6299. * \brief This routine is called to query the ATIM window from User Settings.
  6300. *
  6301. * \param[in] prAdapter Pointer to the Adapter structure.
  6302. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6303. * the query.
  6304. * \param[in] u4QueryBufferLen The length of the query buffer.
  6305. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6306. * bytes written into the query buffer. If the call
  6307. * failed due to invalid length of the query buffer,
  6308. * returns the amount of storage needed.
  6309. *
  6310. * \retval WLAN_STATUS_SUCCESS
  6311. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  6312. */
  6313. /*----------------------------------------------------------------------------*/
  6314. WLAN_STATUS
  6315. wlanoidQueryAtimWindow(IN P_ADAPTER_T prAdapter,
  6316. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  6317. {
  6318. DEBUGFUNC("wlanoidQueryAtimWindow");
  6319. ASSERT(prAdapter);
  6320. ASSERT(pu4QueryInfoLen);
  6321. if (u4QueryBufferLen)
  6322. ASSERT(pvQueryBuffer);
  6323. *pu4QueryInfoLen = sizeof(UINT_32);
  6324. if (u4QueryBufferLen < sizeof(UINT_32))
  6325. return WLAN_STATUS_BUFFER_TOO_SHORT;
  6326. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_INFRA)
  6327. *(PUINT_32) pvQueryBuffer = 0;
  6328. else
  6329. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rWlanInfo.u2AtimWindow;
  6330. return WLAN_STATUS_SUCCESS;
  6331. } /* end of wlanoidQueryAtimWindow() */
  6332. /*----------------------------------------------------------------------------*/
  6333. /*!
  6334. * \brief This routine is called to set the ATIM window to User Settings.
  6335. *
  6336. * \param[in] prAdapter Pointer to the Adapter structure.
  6337. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  6338. * \param[in] u4SetBufferLen The length of the set buffer.
  6339. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6340. * bytes read from the set buffer. If the call failed
  6341. * due to invalid length of the set buffer, returns
  6342. * the amount of storage needed.
  6343. *
  6344. * \retval WLAN_STATUS_SUCCESS
  6345. * \retval WLAN_STATUS_INVALID_LENGTH
  6346. * \retval WLAN_STATUS_INVALID_DATA
  6347. */
  6348. /*----------------------------------------------------------------------------*/
  6349. WLAN_STATUS
  6350. wlanoidSetAtimWindow(IN P_ADAPTER_T prAdapter,
  6351. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6352. {
  6353. PUINT_32 pu4AtimWindow;
  6354. DEBUGFUNC("wlanoidSetAtimWindow");
  6355. ASSERT(prAdapter);
  6356. ASSERT(pu4SetInfoLen);
  6357. *pu4SetInfoLen = sizeof(UINT_32);
  6358. if (u4SetBufferLen < sizeof(UINT_32))
  6359. return WLAN_STATUS_INVALID_LENGTH;
  6360. ASSERT(pvSetBuffer);
  6361. pu4AtimWindow = (PUINT_32) pvSetBuffer;
  6362. prAdapter->rWlanInfo.u2AtimWindow = (UINT_16) *pu4AtimWindow;
  6363. return WLAN_STATUS_SUCCESS;
  6364. } /* end of wlanoidSetAtimWindow() */
  6365. /*----------------------------------------------------------------------------*/
  6366. /*!
  6367. * \brief This routine is called to Set the MAC address which is currently used by the NIC.
  6368. *
  6369. * \param[in] prAdapter Pointer to the Adapter structure.
  6370. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  6371. * \param[in] u4SetBufferLen The length of the set buffer.
  6372. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6373. * bytes read from the set buffer. If the call failed
  6374. * due to invalid length of the set buffer, returns
  6375. * the amount of storage needed.
  6376. *
  6377. *
  6378. * \retval WLAN_STATUS_SUCCESS
  6379. * \retval WLAN_STATUS_INVALID_LENGTH
  6380. * \retval WLAN_STATUS_INVALID_DATA
  6381. */
  6382. /*----------------------------------------------------------------------------*/
  6383. WLAN_STATUS
  6384. wlanoidSetCurrentAddr(IN P_ADAPTER_T prAdapter,
  6385. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6386. {
  6387. ASSERT(0); /* // */
  6388. return WLAN_STATUS_SUCCESS;
  6389. } /* end of wlanoidSetCurrentAddr() */
  6390. #if CFG_TCP_IP_CHKSUM_OFFLOAD
  6391. /*----------------------------------------------------------------------------*/
  6392. /*!
  6393. * \brief Setting the checksum offload function.
  6394. *
  6395. * \param[in] prAdapter Pointer to the Adapter structure.
  6396. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  6397. * \param[in] u4SetBufferLen The length of the set buffer.
  6398. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6399. * bytes read from the set buffer. If the call failed
  6400. * due to invalid length of the set buffer, returns
  6401. * the amount of storage needed.
  6402. *
  6403. * \retval WLAN_STATUS_SUCCESS
  6404. * \retval WLAN_STATUS_INVALID_LENGTH
  6405. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  6406. */
  6407. /*----------------------------------------------------------------------------*/
  6408. WLAN_STATUS
  6409. wlanoidSetCSUMOffload(IN P_ADAPTER_T prAdapter,
  6410. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6411. {
  6412. UINT_32 i, u4CSUMFlags;
  6413. CMD_BASIC_CONFIG rCmdBasicConfig;
  6414. DEBUGFUNC("wlanoidSetCSUMOffload");
  6415. DBGLOG(OID, LOUD, "\n");
  6416. ASSERT(prAdapter);
  6417. ASSERT(pu4SetInfoLen);
  6418. *pu4SetInfoLen = sizeof(UINT_32);
  6419. if (u4SetBufferLen < sizeof(UINT_32))
  6420. return WLAN_STATUS_INVALID_LENGTH;
  6421. ASSERT(pvSetBuffer);
  6422. u4CSUMFlags = *(PUINT_32) pvSetBuffer;
  6423. kalMemZero(&rCmdBasicConfig, sizeof(CMD_BASIC_CONFIG));
  6424. for (i = 0; i < 6; i++) { /* set to broadcast address for not-specified */
  6425. rCmdBasicConfig.rMyMacAddr[i] = 0xff;
  6426. }
  6427. rCmdBasicConfig.ucNative80211 = 0; /* @FIXME: for Vista */
  6428. if (u4CSUMFlags & CSUM_OFFLOAD_EN_TX_TCP)
  6429. rCmdBasicConfig.rCsumOffload.u2TxChecksum |= BIT(2);
  6430. if (u4CSUMFlags & CSUM_OFFLOAD_EN_TX_UDP)
  6431. rCmdBasicConfig.rCsumOffload.u2TxChecksum |= BIT(1);
  6432. if (u4CSUMFlags & CSUM_OFFLOAD_EN_TX_IP)
  6433. rCmdBasicConfig.rCsumOffload.u2TxChecksum |= BIT(0);
  6434. if (u4CSUMFlags & CSUM_OFFLOAD_EN_RX_TCP)
  6435. rCmdBasicConfig.rCsumOffload.u2RxChecksum |= BIT(2);
  6436. if (u4CSUMFlags & CSUM_OFFLOAD_EN_RX_UDP)
  6437. rCmdBasicConfig.rCsumOffload.u2RxChecksum |= BIT(1);
  6438. if (u4CSUMFlags & (CSUM_OFFLOAD_EN_RX_IPv4 | CSUM_OFFLOAD_EN_RX_IPv6))
  6439. rCmdBasicConfig.rCsumOffload.u2RxChecksum |= BIT(0);
  6440. prAdapter->u4CSUMFlags = u4CSUMFlags;
  6441. return wlanSendSetQueryCmd(prAdapter,
  6442. CMD_ID_BASIC_CONFIG,
  6443. TRUE,
  6444. FALSE,
  6445. TRUE,
  6446. nicCmdEventSetCommon,
  6447. nicOidCmdTimeoutCommon,
  6448. sizeof(CMD_BASIC_CONFIG), (PUINT_8) &rCmdBasicConfig, pvSetBuffer, u4SetBufferLen);
  6449. }
  6450. #endif /* CFG_TCP_IP_CHKSUM_OFFLOAD */
  6451. /*----------------------------------------------------------------------------*/
  6452. /*!
  6453. * \brief Setting the IP address for pattern search function.
  6454. *
  6455. * \param[in] prAdapter Pointer to the Adapter structure.
  6456. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  6457. * \param[in] u4SetBufferLen The length of the set buffer.
  6458. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6459. * bytes read from the set buffer. If the call failed
  6460. * due to invalid length of the set buffer, returns
  6461. * the amount of storage needed.
  6462. *
  6463. * \return WLAN_STATUS_SUCCESS
  6464. * \return WLAN_STATUS_ADAPTER_NOT_READY
  6465. * \return WLAN_STATUS_INVALID_LENGTH
  6466. */
  6467. /*----------------------------------------------------------------------------*/
  6468. WLAN_STATUS
  6469. wlanoidSetNetworkAddress(IN P_ADAPTER_T prAdapter,
  6470. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6471. {
  6472. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  6473. UINT_32 i, j;
  6474. P_CMD_SET_NETWORK_ADDRESS_LIST prCmdNetworkAddressList;
  6475. P_PARAM_NETWORK_ADDRESS_LIST prNetworkAddressList = (P_PARAM_NETWORK_ADDRESS_LIST) pvSetBuffer;
  6476. P_PARAM_NETWORK_ADDRESS prNetworkAddress;
  6477. P_PARAM_NETWORK_ADDRESS_IP prNetAddrIp;
  6478. UINT_32 u4IpAddressCount, u4CmdSize;
  6479. PUINT_8 pucBuf = (PUINT_8) pvSetBuffer;
  6480. #if CFG_ENABLE_GTK_FRAME_FILTER
  6481. UINT_32 u4IpV4AddrListSize;
  6482. P_BSS_INFO_T prBssInfo = &prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_AIS_INDEX];
  6483. #endif
  6484. DEBUGFUNC("wlanoidSetNetworkAddress");
  6485. DBGLOG(OID, LOUD, "\n");
  6486. ASSERT(prAdapter);
  6487. ASSERT(pu4SetInfoLen);
  6488. *pu4SetInfoLen = 4;
  6489. if (u4SetBufferLen < sizeof(PARAM_NETWORK_ADDRESS_LIST))
  6490. return WLAN_STATUS_INVALID_DATA;
  6491. *pu4SetInfoLen = 0;
  6492. u4IpAddressCount = 0;
  6493. prNetworkAddress = prNetworkAddressList->arAddress;
  6494. for (i = 0; i < prNetworkAddressList->u4AddressCount; i++) {
  6495. if (prNetworkAddress->u2AddressType == PARAM_PROTOCOL_ID_TCP_IP &&
  6496. prNetworkAddress->u2AddressLength == sizeof(PARAM_NETWORK_ADDRESS_IP)) {
  6497. u4IpAddressCount++;
  6498. }
  6499. prNetworkAddress = (P_PARAM_NETWORK_ADDRESS) (prNetworkAddress +
  6500. (ULONG) (prNetworkAddress->u2AddressLength +
  6501. OFFSET_OF(PARAM_NETWORK_ADDRESS, aucAddress)));
  6502. }
  6503. /* construct payload of command packet */
  6504. u4CmdSize = OFFSET_OF(CMD_SET_NETWORK_ADDRESS_LIST, arNetAddress) +
  6505. sizeof(IPV4_NETWORK_ADDRESS) * u4IpAddressCount;
  6506. if (u4IpAddressCount == 0)
  6507. u4CmdSize = sizeof(CMD_SET_NETWORK_ADDRESS_LIST);
  6508. prCmdNetworkAddressList = (P_CMD_SET_NETWORK_ADDRESS_LIST) kalMemAlloc(u4CmdSize, VIR_MEM_TYPE);
  6509. if (prCmdNetworkAddressList == NULL)
  6510. return WLAN_STATUS_FAILURE;
  6511. #if CFG_ENABLE_GTK_FRAME_FILTER
  6512. u4IpV4AddrListSize = OFFSET_OF(IPV4_NETWORK_ADDRESS_LIST, arNetAddr) +
  6513. (u4IpAddressCount * sizeof(IPV4_NETWORK_ADDRESS));
  6514. if (prBssInfo->prIpV4NetAddrList)
  6515. FREE_IPV4_NETWORK_ADDR_LIST(prBssInfo->prIpV4NetAddrList);
  6516. prBssInfo->prIpV4NetAddrList = (P_IPV4_NETWORK_ADDRESS_LIST) kalMemAlloc(u4IpV4AddrListSize, VIR_MEM_TYPE);
  6517. if (prBssInfo->prIpV4NetAddrList == NULL) {
  6518. kalMemFree(prCmdNetworkAddressList, VIR_MEM_TYPE, u4CmdSize);
  6519. return WLAN_STATUS_FAILURE;
  6520. }
  6521. prBssInfo->prIpV4NetAddrList->ucAddrCount = (UINT_8) u4IpAddressCount;
  6522. #endif
  6523. /* fill P_CMD_SET_NETWORK_ADDRESS_LIST */
  6524. prCmdNetworkAddressList->ucNetTypeIndex = NETWORK_TYPE_AIS_INDEX;
  6525. /* only to set IP address to FW once ARP filter is enabled */
  6526. if (prAdapter->fgEnArpFilter) {
  6527. prCmdNetworkAddressList->ucAddressCount = (UINT_8) u4IpAddressCount;
  6528. prNetworkAddress = prNetworkAddressList->arAddress;
  6529. DBGLOG(OID, INFO, "u4IpAddressCount (%u)\n", u4IpAddressCount);
  6530. for (i = 0, j = 0; i < prNetworkAddressList->u4AddressCount; i++) {
  6531. if (prNetworkAddress->u2AddressType == PARAM_PROTOCOL_ID_TCP_IP &&
  6532. prNetworkAddress->u2AddressLength == sizeof(PARAM_NETWORK_ADDRESS_IP)) {
  6533. prNetAddrIp = (P_PARAM_NETWORK_ADDRESS_IP) prNetworkAddress->aucAddress;
  6534. kalMemCopy(prCmdNetworkAddressList->arNetAddress[j].aucIpAddr,
  6535. &(prNetAddrIp->in_addr), sizeof(UINT_32));
  6536. #if CFG_ENABLE_GTK_FRAME_FILTER
  6537. kalMemCopy(prBssInfo->prIpV4NetAddrList->arNetAddr[j].aucIpAddr,
  6538. &(prNetAddrIp->in_addr), sizeof(UINT_32));
  6539. #endif
  6540. j++;
  6541. pucBuf = (PUINT_8) &prNetAddrIp->in_addr;
  6542. DBGLOG(OID, INFO,
  6543. "prNetAddrIp->in_addr:%d:%d:%d:%d\n", pucBuf[0], pucBuf[1], pucBuf[2],
  6544. pucBuf[3]);
  6545. }
  6546. prNetworkAddress = (P_PARAM_NETWORK_ADDRESS) (prNetworkAddress +
  6547. (ULONG) (prNetworkAddress->u2AddressLength +
  6548. OFFSET_OF(PARAM_NETWORK_ADDRESS,
  6549. aucAddress)));
  6550. }
  6551. } else {
  6552. prCmdNetworkAddressList->ucAddressCount = 0;
  6553. }
  6554. rStatus = wlanSendSetQueryCmd(prAdapter,
  6555. CMD_ID_SET_IP_ADDRESS,
  6556. TRUE,
  6557. FALSE,
  6558. TRUE,
  6559. nicCmdEventSetIpAddress,
  6560. nicOidCmdTimeoutCommon,
  6561. u4CmdSize, (PUINT_8) prCmdNetworkAddressList, pvSetBuffer, u4SetBufferLen);
  6562. kalMemFree(prCmdNetworkAddressList, VIR_MEM_TYPE, u4CmdSize);
  6563. return rStatus;
  6564. }
  6565. /*----------------------------------------------------------------------------*/
  6566. /*!
  6567. * \brief Set driver to switch into RF test mode
  6568. *
  6569. * \param[in] prAdapter Pointer to the Adapter structure.
  6570. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set,
  6571. * should be NULL
  6572. * \param[in] u4SetBufferLen The length of the set buffer, should be 0
  6573. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6574. * bytes read from the set buffer. If the call failed
  6575. * due to invalid length of the set buffer, returns
  6576. * the amount of storage needed.
  6577. *
  6578. * \return WLAN_STATUS_SUCCESS
  6579. * \return WLAN_STATUS_ADAPTER_NOT_READY
  6580. * \return WLAN_STATUS_INVALID_DATA
  6581. * \return WLAN_STATUS_INVALID_LENGTH
  6582. */
  6583. /*----------------------------------------------------------------------------*/
  6584. WLAN_STATUS
  6585. wlanoidRftestSetTestMode(IN P_ADAPTER_T prAdapter,
  6586. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6587. {
  6588. WLAN_STATUS rStatus;
  6589. CMD_TEST_CTRL_T rCmdTestCtrl;
  6590. DEBUGFUNC("wlanoidRftestSetTestMode");
  6591. ASSERT(prAdapter);
  6592. ASSERT(pvSetBuffer);
  6593. ASSERT(pu4SetInfoLen);
  6594. *pu4SetInfoLen = 0;
  6595. if (u4SetBufferLen == 0) {
  6596. if (prAdapter->fgTestMode == FALSE) {
  6597. /* switch to RF Test mode */
  6598. rCmdTestCtrl.ucAction = 0; /* Switch mode */
  6599. rCmdTestCtrl.u.u4OpMode = 1; /* RF test mode */
  6600. rStatus = wlanSendSetQueryCmd(prAdapter,
  6601. CMD_ID_TEST_MODE,
  6602. TRUE,
  6603. TRUE,
  6604. TRUE,
  6605. nicCmdEventEnterRfTest,
  6606. nicOidCmdEnterRFTestTimeout,
  6607. sizeof(CMD_TEST_CTRL_T),
  6608. (PUINT_8) &rCmdTestCtrl, pvSetBuffer, u4SetBufferLen);
  6609. } else {
  6610. /* already in test mode .. */
  6611. rStatus = WLAN_STATUS_SUCCESS;
  6612. }
  6613. } else {
  6614. rStatus = WLAN_STATUS_INVALID_DATA;
  6615. }
  6616. DBGLOG(OID, INFO, "Enter TestMode, setBufLen %u, InTestMode %d, rStatus %u\n",
  6617. u4SetBufferLen, prAdapter->fgTestMode, rStatus);
  6618. return rStatus;
  6619. }
  6620. /*----------------------------------------------------------------------------*/
  6621. /*!
  6622. * \brief Set driver to switch into normal operation mode from RF test mode
  6623. *
  6624. * \param[in] prAdapter Pointer to the Adapter structure.
  6625. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  6626. * should be NULL
  6627. * \param[in] u4SetBufferLen The length of the set buffer, should be 0
  6628. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6629. * bytes read from the set buffer. If the call failed
  6630. * due to invalid length of the set buffer, returns
  6631. * the amount of storage needed.
  6632. *
  6633. * \return WLAN_STATUS_SUCCESS
  6634. * \return WLAN_STATUS_ADAPTER_NOT_READY
  6635. * \return WLAN_STATUS_INVALID_DATA
  6636. * \return WLAN_STATUS_INVALID_LENGTH
  6637. */
  6638. /*----------------------------------------------------------------------------*/
  6639. WLAN_STATUS
  6640. wlanoidRftestSetAbortTestMode(IN P_ADAPTER_T prAdapter,
  6641. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6642. {
  6643. WLAN_STATUS rStatus;
  6644. CMD_TEST_CTRL_T rCmdTestCtrl;
  6645. DEBUGFUNC("wlanoidRftestSetTestMode");
  6646. ASSERT(prAdapter);
  6647. ASSERT(pvSetBuffer);
  6648. ASSERT(pu4SetInfoLen);
  6649. *pu4SetInfoLen = 0;
  6650. if (u4SetBufferLen == 0) {
  6651. if (prAdapter->fgTestMode == TRUE) {
  6652. /* switch to normal mode */
  6653. rCmdTestCtrl.ucAction = 0; /* Switch mode */
  6654. rCmdTestCtrl.u.u4OpMode = 0; /* normal mode */
  6655. rStatus = wlanSendSetQueryCmd(prAdapter,
  6656. CMD_ID_TEST_MODE,
  6657. TRUE,
  6658. FALSE,
  6659. TRUE,
  6660. nicCmdEventLeaveRfTest,
  6661. nicOidCmdTimeoutCommon,
  6662. sizeof(CMD_TEST_CTRL_T),
  6663. (PUINT_8) &rCmdTestCtrl, pvSetBuffer, u4SetBufferLen);
  6664. } else {
  6665. /* already in normal mode .. */
  6666. rStatus = WLAN_STATUS_SUCCESS;
  6667. }
  6668. } else {
  6669. rStatus = WLAN_STATUS_INVALID_DATA;
  6670. }
  6671. DBGLOG(OID, INFO, "Abort TestMode, setBufLen %u, InTestMode %d, rStatus %u\n",
  6672. u4SetBufferLen, prAdapter->fgTestMode, rStatus);
  6673. return rStatus;
  6674. }
  6675. /*----------------------------------------------------------------------------*/
  6676. /*!
  6677. * \brief query for RF test parameter
  6678. *
  6679. * \param[in] prAdapter Pointer to the Adapter structure.
  6680. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6681. * the query.
  6682. * \param[in] u4QueryBufferLen The length of the query buffer.
  6683. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6684. * bytes written into the query buffer. If the call
  6685. * failed due to invalid length of the query buffer,
  6686. * returns the amount of storage needed.
  6687. *
  6688. * \retval WLAN_STATUS_SUCCESS
  6689. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  6690. * \retval WLAN_STATUS_NOT_SUPPORTED
  6691. * \retval WLAN_STATUS_NOT_ACCEPTED
  6692. */
  6693. /*----------------------------------------------------------------------------*/
  6694. WLAN_STATUS
  6695. wlanoidRftestQueryAutoTest(IN P_ADAPTER_T prAdapter,
  6696. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  6697. {
  6698. P_PARAM_MTK_WIFI_TEST_STRUCT_T prRfATInfo;
  6699. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  6700. DEBUGFUNC("wlanoidRftestQueryAutoTest");
  6701. ASSERT(prAdapter);
  6702. if (u4QueryBufferLen)
  6703. ASSERT(pvQueryBuffer);
  6704. ASSERT(pu4QueryInfoLen);
  6705. /*pu4QueryInfoLen is depended on upper-layer*/
  6706. *pu4QueryInfoLen = u4QueryBufferLen;
  6707. if (u4QueryBufferLen != sizeof(PARAM_MTK_WIFI_TEST_STRUCT_T))
  6708. DBGLOG(OID, WARN, "Invalid data. QueryBufferLen: %u.\n", u4QueryBufferLen);
  6709. prRfATInfo = (P_PARAM_MTK_WIFI_TEST_STRUCT_T) pvQueryBuffer;
  6710. rStatus = rftestQueryATInfo(prAdapter,
  6711. prRfATInfo->u4FuncIndex, prRfATInfo->u4FuncData, pvQueryBuffer, u4QueryBufferLen);
  6712. return rStatus;
  6713. }
  6714. /*----------------------------------------------------------------------------*/
  6715. /*!
  6716. * \brief Set RF test parameter
  6717. *
  6718. * \param[in] prAdapter Pointer to the Adapter structure.
  6719. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  6720. * \param[in] u4SetBufferLen The length of the set buffer.
  6721. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6722. * bytes read from the set buffer. If the call failed
  6723. * due to invalid length of the set buffer, returns
  6724. * the amount of storage needed.
  6725. *
  6726. * \return WLAN_STATUS_SUCCESS
  6727. * \return WLAN_STATUS_ADAPTER_NOT_READY
  6728. * \return WLAN_STATUS_INVALID_LENGTH
  6729. */
  6730. /*----------------------------------------------------------------------------*/
  6731. WLAN_STATUS
  6732. wlanoidRftestSetAutoTest(IN P_ADAPTER_T prAdapter,
  6733. OUT PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6734. {
  6735. P_PARAM_MTK_WIFI_TEST_STRUCT_T prRfATInfo;
  6736. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  6737. DEBUGFUNC("wlanoidRftestSetAutoTest");
  6738. ASSERT(prAdapter);
  6739. ASSERT(pvSetBuffer);
  6740. ASSERT(pu4SetInfoLen);
  6741. *pu4SetInfoLen = sizeof(PARAM_MTK_WIFI_TEST_STRUCT_T);
  6742. if (u4SetBufferLen != sizeof(PARAM_MTK_WIFI_TEST_STRUCT_T))
  6743. DBGLOG(OID, WARN, "Invalid data. SetBufferLen: %u.\n", u4SetBufferLen);
  6744. prRfATInfo = (P_PARAM_MTK_WIFI_TEST_STRUCT_T) pvSetBuffer;
  6745. rStatus = rftestSetATInfo(prAdapter, prRfATInfo->u4FuncIndex, prRfATInfo->u4FuncData);
  6746. return rStatus;
  6747. }
  6748. /* RF test OID set handler */
  6749. WLAN_STATUS rftestSetATInfo(IN P_ADAPTER_T prAdapter, UINT_32 u4FuncIndex, UINT_32 u4FuncData)
  6750. {
  6751. P_GLUE_INFO_T prGlueInfo;
  6752. P_CMD_INFO_T prCmdInfo;
  6753. P_WIFI_CMD_T prWifiCmd;
  6754. P_CMD_TEST_CTRL_T pCmdTestCtrl;
  6755. UINT_8 ucCmdSeqNum;
  6756. ASSERT(prAdapter);
  6757. prGlueInfo = prAdapter->prGlueInfo;
  6758. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + sizeof(CMD_TEST_CTRL_T)));
  6759. if (!prCmdInfo) {
  6760. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  6761. return WLAN_STATUS_FAILURE;
  6762. }
  6763. /* increase command sequence number */
  6764. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  6765. /* Setup common CMD Info Packet */
  6766. prCmdInfo->eCmdType = COMMAND_TYPE_GENERAL_IOCTL;
  6767. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_TEST_CTRL_T);
  6768. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  6769. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  6770. prCmdInfo->fgIsOid = TRUE;
  6771. prCmdInfo->ucCID = CMD_ID_TEST_MODE;
  6772. prCmdInfo->fgSetQuery = TRUE;
  6773. prCmdInfo->fgNeedResp = FALSE;
  6774. prCmdInfo->fgDriverDomainMCR = FALSE;
  6775. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  6776. prCmdInfo->u4SetInfoLen = sizeof(CMD_TEST_CTRL_T);
  6777. prCmdInfo->pvInformationBuffer = NULL;
  6778. prCmdInfo->u4InformationBufferLength = 0;
  6779. /* Setup WIFI_CMD_T (payload = CMD_TEST_CTRL_T) */
  6780. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  6781. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  6782. prWifiCmd->ucCID = prCmdInfo->ucCID;
  6783. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  6784. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  6785. pCmdTestCtrl = (P_CMD_TEST_CTRL_T) (prWifiCmd->aucBuffer);
  6786. pCmdTestCtrl->ucAction = 1; /* Set ATInfo */
  6787. pCmdTestCtrl->u.rRfATInfo.u4FuncIndex = u4FuncIndex;
  6788. pCmdTestCtrl->u.rRfATInfo.u4FuncData = u4FuncData;
  6789. /* insert into prCmdQueue */
  6790. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  6791. /* wakeup txServiceThread later */
  6792. GLUE_SET_EVENT(prAdapter->prGlueInfo);
  6793. return WLAN_STATUS_PENDING;
  6794. }
  6795. WLAN_STATUS
  6796. rftestQueryATInfo(IN P_ADAPTER_T prAdapter,
  6797. UINT_32 u4FuncIndex, UINT_32 u4FuncData, OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen)
  6798. {
  6799. P_GLUE_INFO_T prGlueInfo;
  6800. P_CMD_INFO_T prCmdInfo;
  6801. P_WIFI_CMD_T prWifiCmd;
  6802. P_CMD_TEST_CTRL_T pCmdTestCtrl;
  6803. UINT_8 ucCmdSeqNum;
  6804. P_EVENT_TEST_STATUS prTestStatus;
  6805. ASSERT(prAdapter);
  6806. prGlueInfo = prAdapter->prGlueInfo;
  6807. if (u4FuncIndex == RF_AT_FUNCID_FW_INFO) {
  6808. /* driver implementation */
  6809. prTestStatus = (P_EVENT_TEST_STATUS) pvQueryBuffer;
  6810. prTestStatus->rATInfo.u4FuncData =
  6811. (prAdapter->rVerInfo.u2FwProductID << 16) | (prAdapter->rVerInfo.u2FwOwnVersion);
  6812. if (u4QueryBufferLen > 8) {
  6813. /*support FW version extended*/
  6814. prTestStatus->rATInfo.u4FuncData2 = prAdapter->rVerInfo.u2FwOwnVersionExtend;
  6815. DBGLOG(OID, INFO, "<wifi> version: 0x%x ,extended : 0x%x\n"
  6816. , prTestStatus->rATInfo.u4FuncData
  6817. , prTestStatus->rATInfo.u4FuncData2);
  6818. } else
  6819. DBGLOG(OID, INFO, "<wifi> version: 0x%x\n"
  6820. , prTestStatus->rATInfo.u4FuncData);
  6821. return WLAN_STATUS_SUCCESS;
  6822. } else if (u4FuncIndex == RF_AT_FUNCID_DRV_INFO) {
  6823. /* driver implementation */
  6824. prTestStatus = (P_EVENT_TEST_STATUS) pvQueryBuffer;
  6825. prTestStatus->rATInfo.u4FuncData = CFG_DRV_OWN_VERSION;
  6826. return WLAN_STATUS_SUCCESS;
  6827. }
  6828. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + sizeof(CMD_TEST_CTRL_T)));
  6829. if (!prCmdInfo) {
  6830. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  6831. return WLAN_STATUS_FAILURE;
  6832. }
  6833. /* increase command sequence number */
  6834. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  6835. /* Setup common CMD Info Packet */
  6836. prCmdInfo->eCmdType = COMMAND_TYPE_GENERAL_IOCTL;
  6837. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_TEST_CTRL_T);
  6838. prCmdInfo->pfCmdDoneHandler = nicCmdEventQueryRfTestATInfo;
  6839. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  6840. prCmdInfo->fgIsOid = TRUE;
  6841. prCmdInfo->ucCID = CMD_ID_TEST_MODE;
  6842. prCmdInfo->fgSetQuery = FALSE;
  6843. prCmdInfo->fgNeedResp = TRUE;
  6844. prCmdInfo->fgDriverDomainMCR = FALSE;
  6845. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  6846. prCmdInfo->u4SetInfoLen = sizeof(CMD_TEST_CTRL_T);
  6847. prCmdInfo->pvInformationBuffer = pvQueryBuffer;
  6848. prCmdInfo->u4InformationBufferLength = u4QueryBufferLen;
  6849. /* Setup WIFI_CMD_T (payload = CMD_TEST_CTRL_T) */
  6850. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  6851. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  6852. prWifiCmd->ucCID = prCmdInfo->ucCID;
  6853. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  6854. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  6855. pCmdTestCtrl = (P_CMD_TEST_CTRL_T) (prWifiCmd->aucBuffer);
  6856. pCmdTestCtrl->ucAction = 2; /* Get ATInfo */
  6857. pCmdTestCtrl->u.rRfATInfo.u4FuncIndex = u4FuncIndex;
  6858. pCmdTestCtrl->u.rRfATInfo.u4FuncData = u4FuncData;
  6859. /* insert into prCmdQueue */
  6860. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  6861. /* wakeup txServiceThread later */
  6862. GLUE_SET_EVENT(prAdapter->prGlueInfo);
  6863. return WLAN_STATUS_PENDING;
  6864. }
  6865. WLAN_STATUS rftestSetFrequency(IN P_ADAPTER_T prAdapter, IN UINT_32 u4FreqInKHz, IN PUINT_32 pu4SetInfoLen)
  6866. {
  6867. CMD_TEST_CTRL_T rCmdTestCtrl;
  6868. ASSERT(prAdapter);
  6869. rCmdTestCtrl.ucAction = 5; /* Set Channel Frequency */
  6870. rCmdTestCtrl.u.u4ChannelFreq = u4FreqInKHz;
  6871. return wlanSendSetQueryCmd(prAdapter,
  6872. CMD_ID_TEST_MODE,
  6873. TRUE,
  6874. FALSE,
  6875. TRUE,
  6876. nicCmdEventSetCommon,
  6877. nicOidCmdTimeoutCommon, sizeof(CMD_TEST_CTRL_T), (PUINT_8) &rCmdTestCtrl, NULL, 0);
  6878. }
  6879. /*----------------------------------------------------------------------------*/
  6880. /*!
  6881. * \brief command packet generation utility
  6882. *
  6883. * \param[in] prAdapter Pointer to the Adapter structure.
  6884. * \param[in] ucCID Command ID
  6885. * \param[in] fgSetQuery Set or Query
  6886. * \param[in] fgNeedResp Need for response
  6887. * \param[in] pfCmdDoneHandler Function pointer when command is done
  6888. * \param[in] u4SetQueryInfoLen The length of the set/query buffer
  6889. * \param[in] pucInfoBuffer Pointer to set/query buffer
  6890. *
  6891. *
  6892. * \retval WLAN_STATUS_PENDING
  6893. * \retval WLAN_STATUS_FAILURE
  6894. */
  6895. /*----------------------------------------------------------------------------*/
  6896. WLAN_STATUS
  6897. wlanSendSetQueryCmd(IN P_ADAPTER_T prAdapter,
  6898. UINT_8 ucCID,
  6899. BOOLEAN fgSetQuery,
  6900. BOOLEAN fgNeedResp,
  6901. BOOLEAN fgIsOid,
  6902. PFN_CMD_DONE_HANDLER pfCmdDoneHandler,
  6903. PFN_CMD_TIMEOUT_HANDLER pfCmdTimeoutHandler,
  6904. UINT_32 u4SetQueryInfoLen,
  6905. PUINT_8 pucInfoBuffer, OUT PVOID pvSetQueryBuffer, IN UINT_32 u4SetQueryBufferLen)
  6906. {
  6907. P_GLUE_INFO_T prGlueInfo;
  6908. P_CMD_INFO_T prCmdInfo;
  6909. P_WIFI_CMD_T prWifiCmd;
  6910. UINT_8 ucCmdSeqNum;
  6911. prGlueInfo = prAdapter->prGlueInfo;
  6912. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + u4SetQueryInfoLen));
  6913. DEBUGFUNC("wlanSendSetQueryCmd");
  6914. if (!prCmdInfo) {
  6915. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  6916. return WLAN_STATUS_FAILURE;
  6917. }
  6918. /* increase command sequence number */
  6919. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  6920. DBGLOG(OID, TRACE, "ucCmdSeqNum =%d, ucCID =%d\n", ucCmdSeqNum, ucCID);
  6921. /* Setup common CMD Info Packet */
  6922. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  6923. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  6924. prCmdInfo->u2InfoBufLen = (UINT_16) (CMD_HDR_SIZE + u4SetQueryInfoLen);
  6925. prCmdInfo->pfCmdDoneHandler = pfCmdDoneHandler;
  6926. prCmdInfo->pfCmdTimeoutHandler = pfCmdTimeoutHandler;
  6927. prCmdInfo->fgIsOid = fgIsOid;
  6928. prCmdInfo->ucCID = ucCID;
  6929. prCmdInfo->fgSetQuery = fgSetQuery;
  6930. prCmdInfo->fgNeedResp = fgNeedResp;
  6931. prCmdInfo->fgDriverDomainMCR = FALSE;
  6932. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  6933. prCmdInfo->u4SetInfoLen = u4SetQueryInfoLen;
  6934. prCmdInfo->pvInformationBuffer = pvSetQueryBuffer;
  6935. prCmdInfo->u4InformationBufferLength = u4SetQueryBufferLen;
  6936. /* Setup WIFI_CMD_T (no payload) */
  6937. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  6938. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  6939. prWifiCmd->ucCID = prCmdInfo->ucCID;
  6940. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  6941. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  6942. if (u4SetQueryInfoLen > 0 && pucInfoBuffer != NULL)
  6943. kalMemCopy(prWifiCmd->aucBuffer, pucInfoBuffer, u4SetQueryInfoLen);
  6944. /* insert into prCmdQueue */
  6945. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  6946. /* wakeup txServiceThread later */
  6947. GLUE_SET_EVENT(prGlueInfo);
  6948. return WLAN_STATUS_PENDING;
  6949. }
  6950. #if CFG_SUPPORT_WAPI
  6951. /*----------------------------------------------------------------------------*/
  6952. /*!
  6953. * \brief This routine is called by WAPI ui to set wapi mode, which is needed to info the the driver
  6954. * to operation at WAPI mode while driver initialize.
  6955. *
  6956. * \param[in] prAdapter Pointer to the Adapter structure
  6957. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  6958. * \param[in] u4SetBufferLen The length of the set buffer
  6959. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6960. * bytes read from the set buffer. If the call failed due to invalid length of
  6961. * the set buffer, returns the amount of storage needed.
  6962. *
  6963. * \retval WLAN_STATUS_SUCCESS
  6964. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  6965. * \retval WLAN_STATUS_INVALID_LENGTH
  6966. *
  6967. */
  6968. /*----------------------------------------------------------------------------*/
  6969. WLAN_STATUS
  6970. wlanoidSetWapiMode(IN P_ADAPTER_T prAdapter,
  6971. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6972. {
  6973. DEBUGFUNC("wlanoidSetWapiMode");
  6974. DBGLOG(OID, LOUD, "\r\n");
  6975. ASSERT(prAdapter);
  6976. ASSERT(pu4SetInfoLen);
  6977. ASSERT(pvSetBuffer);
  6978. /* Todo:: For support WAPI and Wi-Fi at same driver, use the set wapi assoc ie at the check point */
  6979. /* The Adapter Connection setting fgUseWapi will cleat whil oid set mode (infra), */
  6980. /* And set fgUseWapi True while set wapi assoc ie */
  6981. /* policay selection, add key all depend on this flag, */
  6982. /* The fgUseWapi may remove later */
  6983. if (*(PUINT_32) pvSetBuffer)
  6984. prAdapter->fgUseWapi = TRUE;
  6985. else
  6986. prAdapter->fgUseWapi = FALSE;
  6987. #if 0
  6988. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + 4));
  6989. if (!prCmdInfo) {
  6990. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  6991. return WLAN_STATUS_FAILURE;
  6992. }
  6993. /* increase command sequence number */
  6994. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  6995. /* compose CMD_BUILD_CONNECTION cmd pkt */
  6996. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  6997. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  6998. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + 4;
  6999. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  7000. prCmdInfo->pfCmdTimeoutHandler = NULL;
  7001. prCmdInfo->fgIsOid = TRUE;
  7002. prCmdInfo->ucCID = CMD_ID_WAPI_MODE;
  7003. prCmdInfo->fgSetQuery = TRUE;
  7004. prCmdInfo->fgNeedResp = FALSE;
  7005. prCmdInfo->fgDriverDomainMCR = FALSE;
  7006. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  7007. prCmdInfo->u4SetInfoLen = u4SetBufferLen;
  7008. prCmdInfo->pvInformationBuffer = pvSetBuffer;
  7009. prCmdInfo->u4InformationBufferLength = u4SetBufferLen;
  7010. /* Setup WIFI_CMD_T */
  7011. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  7012. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  7013. prWifiCmd->ucCID = prCmdInfo->ucCID;
  7014. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  7015. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  7016. cp = (PUINT_8) (prWifiCmd->aucBuffer);
  7017. kalMemCopy(cp, (PUINT_8) pvSetBuffer, 4);
  7018. /* insert into prCmdQueue */
  7019. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  7020. /* wakeup txServiceThread later */
  7021. GLUE_SET_EVENT(prGlueInfo);
  7022. return WLAN_STATUS_PENDING;
  7023. #else
  7024. return WLAN_STATUS_SUCCESS;
  7025. #endif
  7026. }
  7027. /*----------------------------------------------------------------------------*/
  7028. /*!
  7029. * \brief This routine is called by WAPI to set the assoc info, which is needed to add to
  7030. * Association request frame while join WAPI AP.
  7031. *
  7032. * \param[in] prAdapter Pointer to the Adapter structure
  7033. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  7034. * \param[in] u4SetBufferLen The length of the set buffer
  7035. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7036. * bytes read from the set buffer. If the call failed due to invalid length of
  7037. * the set buffer, returns the amount of storage needed.
  7038. *
  7039. * \retval WLAN_STATUS_SUCCESS
  7040. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  7041. * \retval WLAN_STATUS_INVALID_LENGTH
  7042. *
  7043. */
  7044. /*----------------------------------------------------------------------------*/
  7045. WLAN_STATUS
  7046. wlanoidSetWapiAssocInfo(IN P_ADAPTER_T prAdapter,
  7047. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7048. {
  7049. P_WAPI_INFO_ELEM_T prWapiInfo;
  7050. PUINT_8 cp;
  7051. UINT_16 u2AuthSuiteCount = 0;
  7052. UINT_16 u2PairSuiteCount = 0;
  7053. UINT_32 u4AuthKeyMgtSuite = 0;
  7054. UINT_32 u4PairSuite = 0;
  7055. UINT_32 u4GroupSuite = 0;
  7056. ASSERT(prAdapter);
  7057. ASSERT(pvSetBuffer);
  7058. ASSERT(pu4SetInfoLen);
  7059. DEBUGFUNC("wlanoidSetWapiAssocInfo");
  7060. DBGLOG(OID, LOUD, "\r\n");
  7061. if (u4SetBufferLen < 20 /* From EID to Group cipher */) {
  7062. prAdapter->rWifiVar.rConnSettings.fgWapiMode = FALSE;
  7063. DBGLOG(SEC, INFO, "fgWapiMode = FALSE due to u4SetBufferLen %u < 20!\n", u4SetBufferLen);
  7064. return WLAN_STATUS_INVALID_LENGTH;
  7065. }
  7066. prAdapter->rWifiVar.rConnSettings.fgWapiMode = TRUE;
  7067. /* if (prWapiInfo->ucElemId != ELEM_ID_WAPI) */
  7068. /* DBGLOG(SEC, TRACE, ("Not WAPI IE ?!\n")); */
  7069. /* if (prWapiInfo->ucLength < 18) */
  7070. /* return WLAN_STATUS_INVALID_LENGTH; */
  7071. *pu4SetInfoLen = u4SetBufferLen;
  7072. prWapiInfo = (P_WAPI_INFO_ELEM_T) pvSetBuffer;
  7073. if (prWapiInfo->ucElemId != ELEM_ID_WAPI) {
  7074. DBGLOG(SEC, INFO, "Not WAPI IE ?! u4SetBufferLen = %u\n", u4SetBufferLen);
  7075. prAdapter->rWifiVar.rConnSettings.fgWapiMode = FALSE;
  7076. return WLAN_STATUS_INVALID_LENGTH;
  7077. }
  7078. if (prWapiInfo->ucLength < 18)
  7079. return WLAN_STATUS_INVALID_LENGTH;
  7080. /* Skip Version check */
  7081. cp = (PUINT_8) &prWapiInfo->u2AuthKeyMgtSuiteCount;
  7082. WLAN_GET_FIELD_16(cp, &u2AuthSuiteCount);
  7083. if (u2AuthSuiteCount > 1)
  7084. return WLAN_STATUS_INVALID_LENGTH;
  7085. cp = (PUINT_8) &prWapiInfo->aucAuthKeyMgtSuite1[0];
  7086. WLAN_GET_FIELD_32(cp, &u4AuthKeyMgtSuite);
  7087. DBGLOG(SEC, TRACE, "WAPI: Assoc Info auth mgt suite [%d]: %02x-%02x-%02x-%02x\n",
  7088. u2AuthSuiteCount,
  7089. (UCHAR) (u4AuthKeyMgtSuite & 0x000000FF),
  7090. (UCHAR) ((u4AuthKeyMgtSuite >> 8) & 0x000000FF),
  7091. (UCHAR) ((u4AuthKeyMgtSuite >> 16) & 0x000000FF),
  7092. (UCHAR) ((u4AuthKeyMgtSuite >> 24) & 0x000000FF));
  7093. if (u4AuthKeyMgtSuite != WAPI_AKM_SUITE_802_1X && u4AuthKeyMgtSuite != WAPI_AKM_SUITE_PSK)
  7094. ASSERT(FALSE);
  7095. cp += 4;
  7096. WLAN_GET_FIELD_16(cp, &u2PairSuiteCount);
  7097. if (u2PairSuiteCount > 1)
  7098. return WLAN_STATUS_INVALID_LENGTH;
  7099. cp += 2;
  7100. WLAN_GET_FIELD_32(cp, &u4PairSuite);
  7101. DBGLOG(SEC, TRACE, "WAPI: Assoc Info pairwise cipher suite [%d]: %02x-%02x-%02x-%02x\n",
  7102. u2PairSuiteCount,
  7103. (UCHAR) (u4PairSuite & 0x000000FF),
  7104. (UCHAR) ((u4PairSuite >> 8) & 0x000000FF),
  7105. (UCHAR) ((u4PairSuite >> 16) & 0x000000FF), (UCHAR) ((u4PairSuite >> 24) & 0x000000FF));
  7106. if (u4PairSuite != WAPI_CIPHER_SUITE_WPI)
  7107. ASSERT(FALSE);
  7108. cp += 4;
  7109. WLAN_GET_FIELD_32(cp, &u4GroupSuite);
  7110. DBGLOG(SEC, TRACE, "WAPI: Assoc Info group cipher suite : %02x-%02x-%02x-%02x\n",
  7111. (UCHAR) (u4GroupSuite & 0x000000FF),
  7112. (UCHAR) ((u4GroupSuite >> 8) & 0x000000FF),
  7113. (UCHAR) ((u4GroupSuite >> 16) & 0x000000FF), (UCHAR) ((u4GroupSuite >> 24) & 0x000000FF));
  7114. if (u4GroupSuite != WAPI_CIPHER_SUITE_WPI)
  7115. ASSERT(FALSE);
  7116. prAdapter->rWifiVar.rConnSettings.u4WapiSelectedAKMSuite = u4AuthKeyMgtSuite;
  7117. prAdapter->rWifiVar.rConnSettings.u4WapiSelectedPairwiseCipher = u4PairSuite;
  7118. prAdapter->rWifiVar.rConnSettings.u4WapiSelectedGroupCipher = u4GroupSuite;
  7119. kalMemCopy(prAdapter->prGlueInfo->aucWapiAssocInfoIEs, pvSetBuffer, u4SetBufferLen);
  7120. prAdapter->prGlueInfo->u2WapiAssocInfoIESz = (UINT_16) u4SetBufferLen;
  7121. DBGLOG(SEC, TRACE, "Assoc Info IE sz %u\n", u4SetBufferLen);
  7122. return WLAN_STATUS_SUCCESS;
  7123. }
  7124. /*----------------------------------------------------------------------------*/
  7125. /*!
  7126. * \brief This routine is called to set the wpi key to the driver.
  7127. *
  7128. * \param[in] prAdapter Pointer to the Adapter structure.
  7129. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7130. * \param[in] u4SetBufferLen The length of the set buffer.
  7131. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7132. * bytes read from the set buffer. If the call failed
  7133. * due to invalid length of the set buffer, returns
  7134. * the amount of storage needed.
  7135. *
  7136. * \retval WLAN_STATUS_SUCCESS
  7137. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  7138. * \retval WLAN_STATUS_INVALID_LENGTH
  7139. * \retval WLAN_STATUS_INVALID_DATA
  7140. *
  7141. * \note The setting buffer P_PARAM_WPI_KEY, which is set by NDIS, is unpacked.
  7142. */
  7143. /*----------------------------------------------------------------------------*/
  7144. WLAN_STATUS
  7145. wlanoidSetWapiKey(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7146. {
  7147. P_GLUE_INFO_T prGlueInfo;
  7148. P_CMD_INFO_T prCmdInfo;
  7149. P_WIFI_CMD_T prWifiCmd;
  7150. P_PARAM_WPI_KEY_T prNewKey;
  7151. P_CMD_802_11_KEY prCmdKey;
  7152. PUINT_8 pc;
  7153. UINT_8 ucCmdSeqNum;
  7154. DEBUGFUNC("wlanoidSetWapiKey");
  7155. DBGLOG(OID, LOUD, "\r\n");
  7156. ASSERT(prAdapter);
  7157. ASSERT(pvSetBuffer);
  7158. ASSERT(pu4SetInfoLen);
  7159. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  7160. DBGLOG(OID, WARN, "Fail in set add key! (Adapter not ready). ACPI=D%d, Radio=%d\r\n",
  7161. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  7162. return WLAN_STATUS_ADAPTER_NOT_READY;
  7163. }
  7164. prNewKey = (P_PARAM_WPI_KEY_T) pvSetBuffer;
  7165. DBGLOG_MEM8(OID, TRACE, (PUINT_8) pvSetBuffer, 560);
  7166. pc = (PUINT_8) pvSetBuffer;
  7167. *pu4SetInfoLen = u4SetBufferLen;
  7168. /* Exception check */
  7169. if (prNewKey->ucKeyID != 0x1 || prNewKey->ucKeyID != 0x0) {
  7170. prNewKey->ucKeyID = prNewKey->ucKeyID & BIT(0);
  7171. /* DBGLOG(SEC, INFO, ("Invalid WAPI key ID (%d)\r\n", prNewKey->ucKeyID)); */
  7172. }
  7173. /* Dump P_PARAM_WPI_KEY_T content. */
  7174. DBGLOG(OID, TRACE, "Set: Dump P_PARAM_WPI_KEY_T content\r\n");
  7175. DBGLOG(OID, TRACE, "TYPE : %d\r\n", prNewKey->eKeyType);
  7176. DBGLOG(OID, TRACE, "Direction : %d\r\n", prNewKey->eDirection);
  7177. DBGLOG(OID, TRACE, "KeyID : %d\r\n", prNewKey->ucKeyID);
  7178. DBGLOG(OID, TRACE, "AddressIndex:\r\n");
  7179. DBGLOG_MEM8(OID, TRACE, prNewKey->aucAddrIndex, 12);
  7180. prNewKey->u4LenWPIEK = 16;
  7181. DBGLOG_MEM8(OID, TRACE, (PUINT_8) prNewKey->aucWPIEK, (UINT_8) prNewKey->u4LenWPIEK);
  7182. prNewKey->u4LenWPICK = 16;
  7183. DBGLOG(OID, TRACE, "CK Key(%d):\r\n", (UINT_8) prNewKey->u4LenWPICK);
  7184. DBGLOG_MEM8(OID, TRACE, (PUINT_8) prNewKey->aucWPICK, (UINT_8) prNewKey->u4LenWPICK);
  7185. DBGLOG(OID, TRACE, "PN:\r\n");
  7186. if (prNewKey->eKeyType == 0) {
  7187. prNewKey->aucPN[0] = 0x5c;
  7188. prNewKey->aucPN[1] = 0x36;
  7189. prNewKey->aucPN[2] = 0x5c;
  7190. prNewKey->aucPN[3] = 0x36;
  7191. prNewKey->aucPN[4] = 0x5c;
  7192. prNewKey->aucPN[5] = 0x36;
  7193. prNewKey->aucPN[6] = 0x5c;
  7194. prNewKey->aucPN[7] = 0x36;
  7195. prNewKey->aucPN[8] = 0x5c;
  7196. prNewKey->aucPN[9] = 0x36;
  7197. prNewKey->aucPN[10] = 0x5c;
  7198. prNewKey->aucPN[11] = 0x36;
  7199. prNewKey->aucPN[12] = 0x5c;
  7200. prNewKey->aucPN[13] = 0x36;
  7201. prNewKey->aucPN[14] = 0x5c;
  7202. prNewKey->aucPN[15] = 0x36;
  7203. }
  7204. DBGLOG_MEM8(OID, TRACE, (PUINT_8) prNewKey->aucPN, 16);
  7205. prGlueInfo = prAdapter->prGlueInfo;
  7206. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + u4SetBufferLen));
  7207. if (!prCmdInfo) {
  7208. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  7209. return WLAN_STATUS_FAILURE;
  7210. }
  7211. /* increase command sequence number */
  7212. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  7213. /* compose CMD_ID_ADD_REMOVE_KEY cmd pkt */
  7214. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  7215. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  7216. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_802_11_KEY);
  7217. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  7218. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  7219. prCmdInfo->fgIsOid = TRUE;
  7220. prCmdInfo->ucCID = CMD_ID_ADD_REMOVE_KEY;
  7221. prCmdInfo->fgSetQuery = TRUE;
  7222. prCmdInfo->fgNeedResp = FALSE;
  7223. prCmdInfo->fgDriverDomainMCR = FALSE;
  7224. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  7225. prCmdInfo->u4SetInfoLen = u4SetBufferLen;
  7226. prCmdInfo->pvInformationBuffer = pvSetBuffer;
  7227. prCmdInfo->u4InformationBufferLength = u4SetBufferLen;
  7228. /* Setup WIFI_CMD_T */
  7229. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  7230. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  7231. prWifiCmd->ucCID = prCmdInfo->ucCID;
  7232. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  7233. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  7234. prCmdKey = (P_CMD_802_11_KEY) (prWifiCmd->aucBuffer);
  7235. kalMemZero(prCmdKey, sizeof(CMD_802_11_KEY));
  7236. prCmdKey->ucAddRemove = 1; /* Add */
  7237. if (prNewKey->eKeyType == ENUM_WPI_PAIRWISE_KEY) {
  7238. prCmdKey->ucTxKey = 1;
  7239. prCmdKey->ucKeyType = 1;
  7240. }
  7241. kalMemCopy(prCmdKey->aucPeerAddr, (PUINT_8) prNewKey->aucAddrIndex, MAC_ADDR_LEN);
  7242. prCmdKey->ucNetType = 0; /* AIS */
  7243. prCmdKey->ucKeyId = prNewKey->ucKeyID;
  7244. prCmdKey->ucKeyLen = 32;
  7245. prCmdKey->ucAlgorithmId = CIPHER_SUITE_WPI;
  7246. kalMemCopy(prCmdKey->aucKeyMaterial, (PUINT_8) prNewKey->aucWPIEK, 16);
  7247. kalMemCopy(prCmdKey->aucKeyMaterial + 16, (PUINT_8) prNewKey->aucWPICK, 16);
  7248. kalMemCopy(prCmdKey->aucKeyRsc, (PUINT_8) prNewKey->aucPN, 16);
  7249. /* insert into prCmdQueue */
  7250. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  7251. /* wakeup txServiceThread later */
  7252. GLUE_SET_EVENT(prGlueInfo);
  7253. return WLAN_STATUS_PENDING;
  7254. } /* wlanoidSetAddKey */
  7255. #endif
  7256. #if CFG_SUPPORT_WPS2
  7257. /*----------------------------------------------------------------------------*/
  7258. /*!
  7259. * \brief This routine is called by WSC to set the assoc info, which is needed to add to
  7260. * Association request frame while join WPS AP.
  7261. *
  7262. * \param[in] prAdapter Pointer to the Adapter structure
  7263. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  7264. * \param[in] u4SetBufferLen The length of the set buffer
  7265. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7266. * bytes read from the set buffer. If the call failed due to invalid length of
  7267. * the set buffer, returns the amount of storage needed.
  7268. *
  7269. * \retval WLAN_STATUS_SUCCESS
  7270. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  7271. * \retval WLAN_STATUS_INVALID_LENGTH
  7272. *
  7273. */
  7274. /*----------------------------------------------------------------------------*/
  7275. WLAN_STATUS
  7276. wlanoidSetWSCAssocInfo(IN P_ADAPTER_T prAdapter,
  7277. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7278. {
  7279. ASSERT(prAdapter);
  7280. ASSERT(pvSetBuffer);
  7281. ASSERT(pu4SetInfoLen);
  7282. DEBUGFUNC("wlanoidSetWSCAssocInfo");
  7283. DBGLOG(OID, LOUD, "\r\n");
  7284. if (u4SetBufferLen == 0)
  7285. return WLAN_STATUS_INVALID_LENGTH;
  7286. *pu4SetInfoLen = u4SetBufferLen;
  7287. kalMemCopy(prAdapter->prGlueInfo->aucWSCAssocInfoIE, pvSetBuffer, u4SetBufferLen);
  7288. prAdapter->prGlueInfo->u2WSCAssocInfoIELen = (UINT_16) u4SetBufferLen;
  7289. DBGLOG(SEC, TRACE, "Assoc Info IE sz %u\n", u4SetBufferLen);
  7290. return WLAN_STATUS_SUCCESS;
  7291. }
  7292. #endif
  7293. #if CFG_ENABLE_WAKEUP_ON_LAN
  7294. WLAN_STATUS
  7295. wlanoidSetAddWakeupPattern(IN P_ADAPTER_T prAdapter,
  7296. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7297. {
  7298. P_PARAM_PM_PACKET_PATTERN prPacketPattern;
  7299. DEBUGFUNC("wlanoidSetAddWakeupPattern");
  7300. DBGLOG(OID, LOUD, "\r\n");
  7301. ASSERT(prAdapter);
  7302. ASSERT(pu4SetInfoLen);
  7303. *pu4SetInfoLen = sizeof(PARAM_PM_PACKET_PATTERN);
  7304. if (u4SetBufferLen < sizeof(PARAM_PM_PACKET_PATTERN))
  7305. return WLAN_STATUS_INVALID_LENGTH;
  7306. ASSERT(pvSetBuffer);
  7307. prPacketPattern = (P_PARAM_PM_PACKET_PATTERN) pvSetBuffer;
  7308. /* FIXME:
  7309. * Send the struct to firmware */
  7310. return WLAN_STATUS_FAILURE;
  7311. }
  7312. WLAN_STATUS
  7313. wlanoidSetRemoveWakeupPattern(IN P_ADAPTER_T prAdapter,
  7314. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7315. {
  7316. P_PARAM_PM_PACKET_PATTERN prPacketPattern;
  7317. DEBUGFUNC("wlanoidSetAddWakeupPattern");
  7318. DBGLOG(OID, LOUD, "\r\n");
  7319. ASSERT(prAdapter);
  7320. ASSERT(pu4SetInfoLen);
  7321. *pu4SetInfoLen = sizeof(PARAM_PM_PACKET_PATTERN);
  7322. if (u4SetBufferLen < sizeof(PARAM_PM_PACKET_PATTERN))
  7323. return WLAN_STATUS_INVALID_LENGTH;
  7324. ASSERT(pvSetBuffer);
  7325. prPacketPattern = (P_PARAM_PM_PACKET_PATTERN) pvSetBuffer;
  7326. /* FIXME:
  7327. * Send the struct to firmware */
  7328. return WLAN_STATUS_FAILURE;
  7329. }
  7330. WLAN_STATUS
  7331. wlanoidQueryEnableWakeup(IN P_ADAPTER_T prAdapter,
  7332. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  7333. {
  7334. PUINT_32 pu4WakeupEventEnable;
  7335. DEBUGFUNC("wlanoidQueryEnableWakeup");
  7336. DBGLOG(OID, LOUD, "\r\n");
  7337. ASSERT(prAdapter);
  7338. ASSERT(pu4QueryInfoLen);
  7339. if (u4QueryBufferLen)
  7340. ASSERT(pvQueryBuffer);
  7341. *pu4QueryInfoLen = sizeof(UINT_32);
  7342. if (u4QueryBufferLen < sizeof(UINT_32))
  7343. return WLAN_STATUS_BUFFER_TOO_SHORT;
  7344. pu4WakeupEventEnable = (PUINT_32) pvQueryBuffer;
  7345. *pu4WakeupEventEnable = prAdapter->u4WakeupEventEnable;
  7346. return WLAN_STATUS_SUCCESS;
  7347. }
  7348. WLAN_STATUS
  7349. wlanoidSetEnableWakeup(IN P_ADAPTER_T prAdapter,
  7350. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7351. {
  7352. PUINT_32 pu4WakeupEventEnable;
  7353. DEBUGFUNC("wlanoidSetEnableWakup");
  7354. DBGLOG(OID, LOUD, "\r\n");
  7355. ASSERT(prAdapter);
  7356. ASSERT(pu4SetInfoLen);
  7357. *pu4SetInfoLen = sizeof(UINT_32);
  7358. if (u4SetBufferLen < sizeof(UINT_32))
  7359. return WLAN_STATUS_INVALID_LENGTH;
  7360. ASSERT(pvSetBuffer);
  7361. pu4WakeupEventEnable = (PUINT_32) pvSetBuffer;
  7362. prAdapter->u4WakeupEventEnable = *pu4WakeupEventEnable;
  7363. /* FIXME:
  7364. * Send Command Event for setting wakeup-pattern / Magic Packet to firmware
  7365. * */
  7366. return WLAN_STATUS_FAILURE;
  7367. }
  7368. #endif
  7369. /*----------------------------------------------------------------------------*/
  7370. /*!
  7371. * \brief This routine is called to configure PS related settings for WMM-PS test.
  7372. *
  7373. * \param[in] prAdapter Pointer to the Adapter structure.
  7374. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7375. * \param[in] u4SetBufferLen The length of the set buffer.
  7376. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7377. * bytes read from the set buffer. If the call failed
  7378. * due to invalid length of the set buffer, returns
  7379. * the amount of storage needed.
  7380. *
  7381. * \retval WLAN_STATUS_SUCCESS
  7382. */
  7383. /*----------------------------------------------------------------------------*/
  7384. WLAN_STATUS
  7385. wlanoidSetWiFiWmmPsTest(IN P_ADAPTER_T prAdapter,
  7386. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7387. {
  7388. P_PARAM_CUSTOM_WMM_PS_TEST_STRUCT_T prWmmPsTestInfo;
  7389. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  7390. CMD_SET_WMM_PS_TEST_STRUCT_T rSetWmmPsTestParam;
  7391. UINT_16 u2CmdBufLen;
  7392. P_PM_PROFILE_SETUP_INFO_T prPmProfSetupInfo;
  7393. P_BSS_INFO_T prBssInfo;
  7394. DEBUGFUNC("wlanoidSetWiFiWmmPsTest");
  7395. ASSERT(prAdapter);
  7396. ASSERT(pvSetBuffer);
  7397. ASSERT(pu4SetInfoLen);
  7398. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_WMM_PS_TEST_STRUCT_T);
  7399. prWmmPsTestInfo = (P_PARAM_CUSTOM_WMM_PS_TEST_STRUCT_T) pvSetBuffer;
  7400. rSetWmmPsTestParam.ucNetTypeIndex = NETWORK_TYPE_AIS_INDEX;
  7401. rSetWmmPsTestParam.bmfgApsdEnAc = prWmmPsTestInfo->bmfgApsdEnAc;
  7402. rSetWmmPsTestParam.ucIsEnterPsAtOnce = prWmmPsTestInfo->ucIsEnterPsAtOnce;
  7403. rSetWmmPsTestParam.ucIsDisableUcTrigger = prWmmPsTestInfo->ucIsDisableUcTrigger;
  7404. prBssInfo = &(prAdapter->rWifiVar.arBssInfo[rSetWmmPsTestParam.ucNetTypeIndex]);
  7405. prPmProfSetupInfo = &prBssInfo->rPmProfSetupInfo;
  7406. prPmProfSetupInfo->ucBmpDeliveryAC = (rSetWmmPsTestParam.bmfgApsdEnAc >> 4) & BITS(0, 3);
  7407. prPmProfSetupInfo->ucBmpTriggerAC = rSetWmmPsTestParam.bmfgApsdEnAc & BITS(0, 3);
  7408. u2CmdBufLen = sizeof(CMD_SET_WMM_PS_TEST_STRUCT_T);
  7409. #if 0
  7410. /* it will apply the disable trig or not immediately */
  7411. if (prPmInfo->ucWmmPsDisableUcPoll && prPmInfo->ucWmmPsConnWithTrig)
  7412. ; /* NIC_PM_WMM_PS_DISABLE_UC_TRIG(prAdapter, TRUE); */
  7413. else
  7414. ; /* NIC_PM_WMM_PS_DISABLE_UC_TRIG(prAdapter, FALSE); */
  7415. #endif
  7416. rStatus = wlanSendSetQueryCmd(prAdapter, CMD_ID_SET_WMM_PS_TEST_PARMS, TRUE, FALSE, TRUE, NULL, /* TODO? */
  7417. NULL, u2CmdBufLen, (PUINT_8) &rSetWmmPsTestParam, NULL, 0);
  7418. return rStatus;
  7419. } /* wlanoidSetWiFiWmmPsTest */
  7420. /*----------------------------------------------------------------------------*/
  7421. /*!
  7422. * \brief This routine is called to configure enable/disable TX A-MPDU feature.
  7423. *
  7424. * \param[in] prAdapter Pointer to the Adapter structure.
  7425. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7426. * \param[in] u4SetBufferLen The length of the set buffer.
  7427. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7428. * bytes read from the set buffer. If the call failed
  7429. * due to invalid length of the set buffer, returns
  7430. * the amount of storage needed.
  7431. *
  7432. * \retval WLAN_STATUS_SUCCESS
  7433. */
  7434. /*----------------------------------------------------------------------------*/
  7435. WLAN_STATUS
  7436. wlanoidSetTxAmpdu(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7437. {
  7438. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  7439. CMD_TX_AMPDU_T rTxAmpdu;
  7440. UINT_16 u2CmdBufLen;
  7441. PBOOLEAN pfgEnable;
  7442. DEBUGFUNC("wlanoidSetTxAmpdu");
  7443. ASSERT(prAdapter);
  7444. ASSERT(pvSetBuffer);
  7445. ASSERT(pu4SetInfoLen);
  7446. *pu4SetInfoLen = sizeof(BOOLEAN);
  7447. pfgEnable = (PBOOLEAN) pvSetBuffer;
  7448. rTxAmpdu.fgEnable = *pfgEnable;
  7449. u2CmdBufLen = sizeof(CMD_TX_AMPDU_T);
  7450. rStatus = wlanSendSetQueryCmd(prAdapter,
  7451. CMD_ID_TX_AMPDU,
  7452. TRUE, FALSE, TRUE, NULL, NULL, u2CmdBufLen, (PUINT_8) &rTxAmpdu, NULL, 0);
  7453. return rStatus;
  7454. } /* wlanoidSetTxAmpdu */
  7455. /*----------------------------------------------------------------------------*/
  7456. /*!
  7457. * \brief This routine is called to configure reject/accept ADDBA Request.
  7458. *
  7459. * \param[in] prAdapter Pointer to the Adapter structure.
  7460. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7461. * \param[in] u4SetBufferLen The length of the set buffer.
  7462. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7463. * bytes read from the set buffer. If the call failed
  7464. * due to invalid length of the set buffer, returns
  7465. * the amount of storage needed.
  7466. *
  7467. * \retval WLAN_STATUS_SUCCESS
  7468. */
  7469. /*----------------------------------------------------------------------------*/
  7470. WLAN_STATUS
  7471. wlanoidSetAddbaReject(IN P_ADAPTER_T prAdapter,
  7472. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7473. {
  7474. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  7475. CMD_ADDBA_REJECT_T rAddbaReject;
  7476. UINT_16 u2CmdBufLen;
  7477. PBOOLEAN pfgEnable;
  7478. DEBUGFUNC("wlanoidSetAddbaReject");
  7479. ASSERT(prAdapter);
  7480. ASSERT(pvSetBuffer);
  7481. ASSERT(pu4SetInfoLen);
  7482. *pu4SetInfoLen = sizeof(BOOLEAN);
  7483. pfgEnable = (PBOOLEAN) pvSetBuffer;
  7484. rAddbaReject.fgEnable = *pfgEnable;
  7485. u2CmdBufLen = sizeof(CMD_ADDBA_REJECT_T);
  7486. rStatus = wlanSendSetQueryCmd(prAdapter,
  7487. CMD_ID_ADDBA_REJECT,
  7488. TRUE, FALSE, TRUE, NULL, NULL, u2CmdBufLen, (PUINT_8) &rAddbaReject, NULL, 0);
  7489. return rStatus;
  7490. } /* wlanoidSetAddbaReject */
  7491. #if CFG_SLT_SUPPORT
  7492. WLAN_STATUS
  7493. wlanoidQuerySLTStatus(IN P_ADAPTER_T prAdapter,
  7494. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  7495. {
  7496. WLAN_STATUS rWlanStatus = WLAN_STATUS_SUCCESS;
  7497. P_PARAM_MTK_SLT_TEST_STRUCT_T prMtkSltInfo = (P_PARAM_MTK_SLT_TEST_STRUCT_T) NULL;
  7498. P_SLT_INFO_T prSltInfo = (P_SLT_INFO_T) NULL;
  7499. DEBUGFUNC("wlanoidQuerySLTStatus");
  7500. DBGLOG(OID, LOUD, "\r\n");
  7501. ASSERT(prAdapter);
  7502. ASSERT(pu4QueryInfoLen);
  7503. *pu4QueryInfoLen = sizeof(PARAM_MTK_SLT_TEST_STRUCT_T);
  7504. if (u4QueryBufferLen < sizeof(PARAM_MTK_SLT_TEST_STRUCT_T))
  7505. return WLAN_STATUS_INVALID_LENGTH;
  7506. ASSERT(pvQueryBuffer);
  7507. prMtkSltInfo = (P_PARAM_MTK_SLT_TEST_STRUCT_T) pvQueryBuffer;
  7508. prSltInfo = &(prAdapter->rWifiVar.rSltInfo);
  7509. switch (prMtkSltInfo->rSltFuncIdx) {
  7510. case ENUM_MTK_SLT_FUNC_LP_SET:
  7511. {
  7512. P_PARAM_MTK_SLT_LP_TEST_STRUCT_T prLpSetting = (P_PARAM_MTK_SLT_LP_TEST_STRUCT_T) NULL;
  7513. ASSERT(prMtkSltInfo->u4FuncInfoLen == sizeof(PARAM_MTK_SLT_LP_TEST_STRUCT_T));
  7514. prLpSetting = (P_PARAM_MTK_SLT_LP_TEST_STRUCT_T) &prMtkSltInfo->unFuncInfoContent;
  7515. prLpSetting->u4BcnRcvNum = prSltInfo->u4BeaconReceiveCnt;
  7516. }
  7517. break;
  7518. default:
  7519. /* TBD... */
  7520. break;
  7521. }
  7522. return rWlanStatus;
  7523. } /* wlanoidQuerySLTStatus */
  7524. WLAN_STATUS
  7525. wlanoidUpdateSLTMode(IN P_ADAPTER_T prAdapter,
  7526. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7527. {
  7528. WLAN_STATUS rWlanStatus = WLAN_STATUS_SUCCESS;
  7529. P_PARAM_MTK_SLT_TEST_STRUCT_T prMtkSltInfo = (P_PARAM_MTK_SLT_TEST_STRUCT_T) NULL;
  7530. P_SLT_INFO_T prSltInfo = (P_SLT_INFO_T) NULL;
  7531. P_BSS_DESC_T prBssDesc = (P_BSS_DESC_T) NULL;
  7532. P_STA_RECORD_T prStaRec = (P_STA_RECORD_T) NULL;
  7533. P_BSS_INFO_T prBssInfo = (P_BSS_INFO_T) NULL;
  7534. /* 1. Action: Update or Initial Set
  7535. * 2. Role.
  7536. * 3. Target MAC address.
  7537. * 4. RF BW & Rate Settings
  7538. */
  7539. DEBUGFUNC("wlanoidUpdateSLTMode");
  7540. DBGLOG(OID, LOUD, "\r\n");
  7541. ASSERT(prAdapter);
  7542. ASSERT(pu4SetInfoLen);
  7543. *pu4SetInfoLen = sizeof(PARAM_MTK_SLT_TEST_STRUCT_T);
  7544. if (u4SetBufferLen < sizeof(PARAM_MTK_SLT_TEST_STRUCT_T))
  7545. return WLAN_STATUS_INVALID_LENGTH;
  7546. ASSERT(pvSetBuffer);
  7547. prMtkSltInfo = (P_PARAM_MTK_SLT_TEST_STRUCT_T) pvSetBuffer;
  7548. prSltInfo = &(prAdapter->rWifiVar.rSltInfo);
  7549. prBssInfo = &prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_AIS_INDEX];
  7550. switch (prMtkSltInfo->rSltFuncIdx) {
  7551. case ENUM_MTK_SLT_FUNC_INITIAL: /* Initialize */
  7552. {
  7553. P_PARAM_MTK_SLT_INITIAL_STRUCT_T prMtkSltInit = (P_PARAM_MTK_SLT_INITIAL_STRUCT_T) NULL;
  7554. ASSERT(prMtkSltInfo->u4FuncInfoLen == sizeof(PARAM_MTK_SLT_INITIAL_STRUCT_T));
  7555. prMtkSltInit = (P_PARAM_MTK_SLT_INITIAL_STRUCT_T) &prMtkSltInfo->unFuncInfoContent;
  7556. if (prSltInfo->prPseudoStaRec != NULL) {
  7557. /* The driver has been initialized. */
  7558. prSltInfo->prPseudoStaRec = NULL;
  7559. }
  7560. prSltInfo->prPseudoBssDesc = scanSearchExistingBssDesc(prAdapter,
  7561. BSS_TYPE_IBSS,
  7562. prMtkSltInit->aucTargetMacAddr,
  7563. prMtkSltInit->aucTargetMacAddr);
  7564. prSltInfo->u2SiteID = prMtkSltInit->u2SiteID;
  7565. /* Bandwidth 2.4G: Channel 1~14
  7566. * Bandwidth 5G: *36, 40, 44, 48, 52, 56, 60, 64,
  7567. * *100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140,
  7568. * 149, 153, *157, 161,
  7569. * 184, 188, 192, 196, 200, 204, 208, 212, *216
  7570. */
  7571. prSltInfo->ucChannel2G4 = 1 + (prSltInfo->u2SiteID % 4) * 5;
  7572. switch (prSltInfo->ucChannel2G4) {
  7573. case 1:
  7574. prSltInfo->ucChannel5G = 36;
  7575. break;
  7576. case 6:
  7577. prSltInfo->ucChannel5G = 52;
  7578. break;
  7579. case 11:
  7580. prSltInfo->ucChannel5G = 104;
  7581. break;
  7582. case 16:
  7583. prSltInfo->ucChannel2G4 = 14;
  7584. prSltInfo->ucChannel5G = 161;
  7585. break;
  7586. default:
  7587. ASSERT(FALSE);
  7588. }
  7589. if (prSltInfo->prPseudoBssDesc == NULL) {
  7590. do {
  7591. prSltInfo->prPseudoBssDesc = scanAllocateBssDesc(prAdapter);
  7592. if (prSltInfo->prPseudoBssDesc == NULL) {
  7593. rWlanStatus = WLAN_STATUS_FAILURE;
  7594. break;
  7595. }
  7596. prBssDesc = prSltInfo->prPseudoBssDesc;
  7597. } while (FALSE);
  7598. } else {
  7599. prBssDesc = prSltInfo->prPseudoBssDesc;
  7600. }
  7601. if (prBssDesc) {
  7602. prBssDesc->eBSSType = BSS_TYPE_IBSS;
  7603. COPY_MAC_ADDR(prBssDesc->aucSrcAddr, prMtkSltInit->aucTargetMacAddr);
  7604. COPY_MAC_ADDR(prBssDesc->aucBSSID, prBssInfo->aucOwnMacAddr);
  7605. prBssDesc->u2BeaconInterval = 100;
  7606. prBssDesc->u2ATIMWindow = 0;
  7607. prBssDesc->ucDTIMPeriod = 1;
  7608. prBssDesc->u2IELength = 0;
  7609. prBssDesc->fgIsERPPresent = TRUE;
  7610. prBssDesc->fgIsHTPresent = TRUE;
  7611. prBssDesc->u2OperationalRateSet = BIT(RATE_36M_INDEX);
  7612. prBssDesc->u2BSSBasicRateSet = BIT(RATE_36M_INDEX);
  7613. prBssDesc->fgIsUnknownBssBasicRate = FALSE;
  7614. prBssDesc->fgIsLargerTSF = TRUE;
  7615. prBssDesc->eBand = BAND_2G4;
  7616. prBssDesc->ucChannelNum = prSltInfo->ucChannel2G4;
  7617. prBssDesc->ucPhyTypeSet = PHY_TYPE_SET_802_11ABGN;
  7618. GET_CURRENT_SYSTIME(&prBssDesc->rUpdateTime);
  7619. }
  7620. }
  7621. break;
  7622. case ENUM_MTK_SLT_FUNC_RATE_SET: /* Update RF Settings. */
  7623. if (prSltInfo->prPseudoStaRec == NULL) {
  7624. rWlanStatus = WLAN_STATUS_FAILURE;
  7625. break;
  7626. }
  7627. P_PARAM_MTK_SLT_TR_TEST_STRUCT_T prTRSetting = (P_PARAM_MTK_SLT_TR_TEST_STRUCT_T) NULL;
  7628. ASSERT(prMtkSltInfo->u4FuncInfoLen == sizeof(PARAM_MTK_SLT_TR_TEST_STRUCT_T));
  7629. prStaRec = prSltInfo->prPseudoStaRec;
  7630. prTRSetting = (P_PARAM_MTK_SLT_TR_TEST_STRUCT_T) &prMtkSltInfo->unFuncInfoContent;
  7631. if (prTRSetting->rNetworkType == PARAM_NETWORK_TYPE_OFDM5) {
  7632. prBssInfo->eBand = BAND_5G;
  7633. prBssInfo->ucPrimaryChannel = prSltInfo->ucChannel5G;
  7634. }
  7635. if (prTRSetting->rNetworkType == PARAM_NETWORK_TYPE_OFDM24) {
  7636. prBssInfo->eBand = BAND_2G4;
  7637. prBssInfo->ucPrimaryChannel = prSltInfo->ucChannel2G4;
  7638. }
  7639. if ((prTRSetting->u4FixedRate & FIXED_BW_DL40) != 0) {
  7640. /* RF 40 */
  7641. /* It would controls RFBW capability in WTBL. */
  7642. prStaRec->u2HtCapInfo |= HT_CAP_INFO_SUP_CHNL_WIDTH;
  7643. /* This controls RF BW, RF BW would be 40 only if */
  7644. /* 1. PHY_TYPE_BIT_HT is TRUE. */
  7645. /* 2. SCO is SCA/SCB. */
  7646. prStaRec->ucDesiredPhyTypeSet = PHY_TYPE_BIT_HT;
  7647. /* U20/L20 Control. */
  7648. switch (prTRSetting->u4FixedRate & 0xC000) {
  7649. case FIXED_EXT_CHNL_U20:
  7650. prBssInfo->eBssSCO = CHNL_EXT_SCB; /* +2 */
  7651. if (prTRSetting->rNetworkType == PARAM_NETWORK_TYPE_OFDM5)
  7652. prBssInfo->ucPrimaryChannel += 2;
  7653. else {
  7654. /* For channel 1, testing L20 at channel 8. */
  7655. if (prBssInfo->ucPrimaryChannel < 5)
  7656. prBssInfo->ucPrimaryChannel = 8;
  7657. }
  7658. break;
  7659. case FIXED_EXT_CHNL_L20:
  7660. default: /* 40M */
  7661. prBssInfo->eBssSCO = CHNL_EXT_SCA; /* -2 */
  7662. if (prTRSetting->rNetworkType == PARAM_NETWORK_TYPE_OFDM5) {
  7663. prBssInfo->ucPrimaryChannel -= 2;
  7664. } else {
  7665. /* For channel 11 / 14. testing U20 at channel 3. */
  7666. if (prBssInfo->ucPrimaryChannel > 10)
  7667. prBssInfo->ucPrimaryChannel = 3;
  7668. }
  7669. break;
  7670. }
  7671. } else {
  7672. /* RF 20 */
  7673. prStaRec->u2HtCapInfo &= ~HT_CAP_INFO_SUP_CHNL_WIDTH;
  7674. prBssInfo->eBssSCO = CHNL_EXT_SCN;
  7675. }
  7676. prBssInfo->fgErpProtectMode = FALSE;
  7677. prBssInfo->eHtProtectMode = HT_PROTECT_MODE_NONE;
  7678. prBssInfo->eGfOperationMode = GF_MODE_NORMAL;
  7679. nicUpdateBss(prAdapter, prBssInfo->ucNetTypeIndex);
  7680. prStaRec->u2HtCapInfo &= ~(HT_CAP_INFO_SHORT_GI_20M | HT_CAP_INFO_SHORT_GI_40M);
  7681. switch (prTRSetting->u4FixedRate & 0xFF) {
  7682. case RATE_OFDM_54M:
  7683. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_54M_INDEX);
  7684. break;
  7685. case RATE_OFDM_48M:
  7686. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_48M_INDEX);
  7687. break;
  7688. case RATE_OFDM_36M:
  7689. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_36M_INDEX);
  7690. break;
  7691. case RATE_OFDM_24M:
  7692. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_24M_INDEX);
  7693. break;
  7694. case RATE_OFDM_6M:
  7695. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_6M_INDEX);
  7696. break;
  7697. case RATE_CCK_11M_LONG:
  7698. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_11M_INDEX);
  7699. break;
  7700. case RATE_CCK_1M_LONG:
  7701. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_1M_INDEX);
  7702. break;
  7703. case RATE_GF_MCS_0:
  7704. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_HT_PHY_INDEX);
  7705. prStaRec->u2HtCapInfo |= HT_CAP_INFO_HT_GF;
  7706. break;
  7707. case RATE_MM_MCS_7:
  7708. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_HT_PHY_INDEX);
  7709. prStaRec->u2HtCapInfo &= ~HT_CAP_INFO_HT_GF;
  7710. #if 0 /* Only for Current Measurement Mode. */
  7711. prStaRec->u2HtCapInfo |= (HT_CAP_INFO_SHORT_GI_20M | HT_CAP_INFO_SHORT_GI_40M);
  7712. #endif
  7713. break;
  7714. case RATE_GF_MCS_7:
  7715. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_HT_PHY_INDEX);
  7716. prStaRec->u2HtCapInfo |= HT_CAP_INFO_HT_GF;
  7717. break;
  7718. default:
  7719. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_36M_INDEX);
  7720. break;
  7721. }
  7722. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_1);
  7723. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_3);
  7724. break;
  7725. case ENUM_MTK_SLT_FUNC_LP_SET: /* Reset LP Test Result. */
  7726. {
  7727. P_PARAM_MTK_SLT_LP_TEST_STRUCT_T prLpSetting = (P_PARAM_MTK_SLT_LP_TEST_STRUCT_T) NULL;
  7728. ASSERT(prMtkSltInfo->u4FuncInfoLen == sizeof(PARAM_MTK_SLT_LP_TEST_STRUCT_T));
  7729. prLpSetting = (P_PARAM_MTK_SLT_LP_TEST_STRUCT_T) &prMtkSltInfo->unFuncInfoContent;
  7730. if (prSltInfo->prPseudoBssDesc == NULL) {
  7731. /* Please initial SLT Mode first. */
  7732. break;
  7733. }
  7734. prBssDesc = prSltInfo->prPseudoBssDesc;
  7735. switch (prLpSetting->rLpTestMode) {
  7736. case ENUM_MTK_LP_TEST_NORMAL:
  7737. /* In normal mode, we would use target MAC address to be the BSSID. */
  7738. COPY_MAC_ADDR(prBssDesc->aucBSSID, prBssInfo->aucOwnMacAddr);
  7739. prSltInfo->fgIsDUT = FALSE;
  7740. break;
  7741. case ENUM_MTK_LP_TEST_GOLDEN_SAMPLE:
  7742. /* 1. Lower AIFS of BCN queue.
  7743. * 2. Fixed Random Number tobe 0.
  7744. */
  7745. prSltInfo->fgIsDUT = FALSE;
  7746. /* In LP test mode, we would use MAC address of Golden Sample to be the BSSID. */
  7747. COPY_MAC_ADDR(prBssDesc->aucBSSID, prBssInfo->aucOwnMacAddr);
  7748. break;
  7749. case ENUM_MTK_LP_TEST_DUT:
  7750. /* 1. Enter Sleep Mode.
  7751. * 2. Fix random number a large value & enlarge AIFN of BCN queue.
  7752. */
  7753. COPY_MAC_ADDR(prBssDesc->aucBSSID, prBssDesc->aucSrcAddr);
  7754. prSltInfo->u4BeaconReceiveCnt = 0;
  7755. prSltInfo->fgIsDUT = TRUE;
  7756. break;
  7757. }
  7758. }
  7759. break;
  7760. default:
  7761. break;
  7762. }
  7763. return WLAN_STATUS_FAILURE;
  7764. return rWlanStatus;
  7765. } /* wlanoidUpdateSLTMode */
  7766. #endif
  7767. /*----------------------------------------------------------------------------*/
  7768. /*!
  7769. * \brief This routine is called to query NVRAM value.
  7770. *
  7771. * \param[in] pvAdapter Pointer to the Adapter structure.
  7772. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  7773. * the query.
  7774. * \param[in] u4QueryBufLen The length of the query buffer.
  7775. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  7776. * bytes written into the query buffer. If the call
  7777. * failed due to invalid length of the query buffer,
  7778. * returns the amount of storage needed.
  7779. *
  7780. * \retval WLAN_STATUS_SUCCESS
  7781. * \retval WLAN_STATUS_FAILURE
  7782. */
  7783. /*----------------------------------------------------------------------------*/
  7784. WLAN_STATUS
  7785. wlanoidQueryNvramRead(IN P_ADAPTER_T prAdapter,
  7786. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  7787. {
  7788. P_PARAM_CUSTOM_NVRAM_RW_STRUCT_T prNvramRwInfo;
  7789. UINT_16 u2Data;
  7790. BOOLEAN fgStatus;
  7791. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  7792. DEBUGFUNC("wlanoidQueryNvramRead");
  7793. ASSERT(prAdapter);
  7794. ASSERT(pu4QueryInfoLen);
  7795. if (u4QueryBufferLen)
  7796. ASSERT(pvQueryBuffer);
  7797. *pu4QueryInfoLen = sizeof(PARAM_CUSTOM_NVRAM_RW_STRUCT_T);
  7798. if (u4QueryBufferLen < sizeof(PARAM_CUSTOM_NVRAM_RW_STRUCT_T))
  7799. return WLAN_STATUS_INVALID_LENGTH;
  7800. prNvramRwInfo = (P_PARAM_CUSTOM_NVRAM_RW_STRUCT_T) pvQueryBuffer;
  7801. if (prNvramRwInfo->ucEepromMethod == PARAM_EEPROM_READ_METHOD_READ) {
  7802. /* change to byte offset */
  7803. fgStatus = kalCfgDataRead16(prAdapter->prGlueInfo,
  7804. prNvramRwInfo->ucEepromIndex << 1,
  7805. &u2Data);
  7806. if (fgStatus) {
  7807. prNvramRwInfo->u2EepromData = u2Data;
  7808. DBGLOG(OID, INFO, "NVRAM Read: index=%#X, data=%#02X\r\n",
  7809. prNvramRwInfo->ucEepromIndex, u2Data);
  7810. } else {
  7811. DBGLOG(OID, ERROR, "NVRAM Read Failed: index=%#x.\r\n", prNvramRwInfo->ucEepromIndex);
  7812. rStatus = WLAN_STATUS_FAILURE;
  7813. }
  7814. } else if (prNvramRwInfo->ucEepromMethod == PARAM_EEPROM_READ_METHOD_GETSIZE) {
  7815. prNvramRwInfo->u2EepromData = CFG_FILE_WIFI_REC_SIZE;
  7816. DBGLOG(OID, INFO, "EEPROM size =%d\r\n", prNvramRwInfo->u2EepromData);
  7817. }
  7818. *pu4QueryInfoLen = sizeof(PARAM_CUSTOM_EEPROM_RW_STRUCT_T);
  7819. return rStatus;
  7820. } /* wlanoidQueryNvramRead */
  7821. /*----------------------------------------------------------------------------*/
  7822. /*!
  7823. * \brief This routine is called to write NVRAM value.
  7824. *
  7825. * \param[in] prAdapter Pointer to the Adapter structure.
  7826. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7827. * \param[in] u4SetBufferLen The length of the set buffer.
  7828. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7829. * bytes read from the set buffer. If the call failed
  7830. * due to invalid length of the set buffer, returns
  7831. * the amount of storage needed.
  7832. *
  7833. * \retval WLAN_STATUS_SUCCESS
  7834. * \retval WLAN_STATUS_FAILURE
  7835. */
  7836. /*----------------------------------------------------------------------------*/
  7837. WLAN_STATUS
  7838. wlanoidSetNvramWrite(IN P_ADAPTER_T prAdapter,
  7839. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7840. {
  7841. P_PARAM_CUSTOM_NVRAM_RW_STRUCT_T prNvramRwInfo;
  7842. BOOLEAN fgStatus;
  7843. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  7844. DEBUGFUNC("wlanoidSetNvramWrite");
  7845. DBGLOG(OID, LOUD, "\n");
  7846. ASSERT(prAdapter);
  7847. ASSERT(pu4SetInfoLen);
  7848. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_NVRAM_RW_STRUCT_T);
  7849. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_NVRAM_RW_STRUCT_T))
  7850. return WLAN_STATUS_INVALID_LENGTH;
  7851. ASSERT(pvSetBuffer);
  7852. prNvramRwInfo = (P_PARAM_CUSTOM_NVRAM_RW_STRUCT_T) pvSetBuffer;
  7853. /* change to byte offset */
  7854. fgStatus = kalCfgDataWrite16(prAdapter->prGlueInfo,
  7855. prNvramRwInfo->ucEepromIndex << 1,
  7856. prNvramRwInfo->u2EepromData);
  7857. if (fgStatus == FALSE) {
  7858. DBGLOG(OID, ERROR, "NVRAM Write Failed.\r\n");
  7859. rStatus = WLAN_STATUS_FAILURE;
  7860. }
  7861. return rStatus;
  7862. } /* wlanoidSetNvramWrite */
  7863. /*----------------------------------------------------------------------------*/
  7864. /*!
  7865. * \brief This routine is called to get the config data source type.
  7866. *
  7867. * \param[in] prAdapter Pointer to the Adapter structure.
  7868. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7869. * \param[in] u4SetBufferLen The length of the set buffer.
  7870. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7871. * bytes read from the set buffer. If the call failed
  7872. * due to invalid length of the set buffer, returns
  7873. * the amount of storage needed.
  7874. *
  7875. * \retval WLAN_STATUS_SUCCESS
  7876. * \retval WLAN_STATUS_FAILURE
  7877. */
  7878. /*----------------------------------------------------------------------------*/
  7879. WLAN_STATUS
  7880. wlanoidQueryCfgSrcType(IN P_ADAPTER_T prAdapter,
  7881. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  7882. {
  7883. ASSERT(prAdapter);
  7884. *pu4QueryInfoLen = sizeof(ENUM_CFG_SRC_TYPE_T);
  7885. if (kalIsConfigurationExist(prAdapter->prGlueInfo) == TRUE)
  7886. *(P_ENUM_CFG_SRC_TYPE_T) pvQueryBuffer = CFG_SRC_TYPE_NVRAM;
  7887. else
  7888. *(P_ENUM_CFG_SRC_TYPE_T) pvQueryBuffer = CFG_SRC_TYPE_EEPROM;
  7889. return WLAN_STATUS_SUCCESS;
  7890. }
  7891. /*----------------------------------------------------------------------------*/
  7892. /*!
  7893. * \brief This routine is called to get the config data source type.
  7894. *
  7895. * \param[in] prAdapter Pointer to the Adapter structure.
  7896. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7897. * \param[in] u4SetBufferLen The length of the set buffer.
  7898. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7899. * bytes read from the set buffer. If the call failed
  7900. * due to invalid length of the set buffer, returns
  7901. * the amount of storage needed.
  7902. *
  7903. * \retval WLAN_STATUS_SUCCESS
  7904. * \retval WLAN_STATUS_FAILURE
  7905. */
  7906. /*----------------------------------------------------------------------------*/
  7907. WLAN_STATUS
  7908. wlanoidQueryEepromType(IN P_ADAPTER_T prAdapter,
  7909. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  7910. {
  7911. ASSERT(prAdapter);
  7912. *pu4QueryInfoLen = sizeof(P_ENUM_EEPROM_TYPE_T);
  7913. #if CFG_SUPPORT_NIC_CAPABILITY
  7914. if (prAdapter->fgIsEepromUsed == TRUE)
  7915. *(P_ENUM_EEPROM_TYPE_T) pvQueryBuffer = EEPROM_TYPE_PRESENT;
  7916. else
  7917. *(P_ENUM_EEPROM_TYPE_T) pvQueryBuffer = EEPROM_TYPE_NO;
  7918. #else
  7919. *(P_ENUM_EEPROM_TYPE_T) pvQueryBuffer = EEPROM_TYPE_NO;
  7920. #endif
  7921. return WLAN_STATUS_SUCCESS;
  7922. }
  7923. /*----------------------------------------------------------------------------*/
  7924. /*!
  7925. * \brief This routine is called to get the config data source type.
  7926. *
  7927. * \param[in] prAdapter Pointer to the Adapter structure.
  7928. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7929. * \param[in] u4SetBufferLen The length of the set buffer.
  7930. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7931. * bytes read from the set buffer. If the call failed
  7932. * due to invalid length of the set buffer, returns
  7933. * the amount of storage needed.
  7934. *
  7935. * \retval WLAN_STATUS_SUCCESS
  7936. * \retval WLAN_STATUS_FAILURE
  7937. */
  7938. /*----------------------------------------------------------------------------*/
  7939. WLAN_STATUS
  7940. wlanoidSetCountryCode(IN P_ADAPTER_T prAdapter,
  7941. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7942. {
  7943. PUINT_8 pucCountry;
  7944. ASSERT(prAdapter);
  7945. ASSERT(pvSetBuffer);
  7946. ASSERT(u4SetBufferLen == 2);
  7947. *pu4SetInfoLen = 2;
  7948. pucCountry = pvSetBuffer;
  7949. prAdapter->rWifiVar.rConnSettings.u2CountryCode = (((UINT_16) pucCountry[0]) << 8) | ((UINT_16) pucCountry[1]);
  7950. rlmDomainSendCmd(prAdapter, TRUE);
  7951. return WLAN_STATUS_SUCCESS;
  7952. }
  7953. #if 0
  7954. WLAN_STATUS
  7955. wlanoidSetNoaParam(IN P_ADAPTER_T prAdapter,
  7956. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7957. {
  7958. P_PARAM_CUSTOM_NOA_PARAM_STRUCT_T prNoaParam;
  7959. CMD_CUSTOM_NOA_PARAM_STRUCT_T rCmdNoaParam;
  7960. DEBUGFUNC("wlanoidSetNoaParam");
  7961. DBGLOG(OID, LOUD, "\n");
  7962. ASSERT(prAdapter);
  7963. ASSERT(pu4SetInfoLen);
  7964. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_NOA_PARAM_STRUCT_T);
  7965. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_NOA_PARAM_STRUCT_T))
  7966. return WLAN_STATUS_INVALID_LENGTH;
  7967. ASSERT(pvSetBuffer);
  7968. prNoaParam = (P_PARAM_CUSTOM_NOA_PARAM_STRUCT_T) pvSetBuffer;
  7969. kalMemZero(&rCmdNoaParam, sizeof(CMD_CUSTOM_NOA_PARAM_STRUCT_T));
  7970. rCmdNoaParam.u4NoaDurationMs = prNoaParam->u4NoaDurationMs;
  7971. rCmdNoaParam.u4NoaIntervalMs = prNoaParam->u4NoaIntervalMs;
  7972. rCmdNoaParam.u4NoaCount = prNoaParam->u4NoaCount;
  7973. return wlanSendSetQueryCmd(prAdapter,
  7974. CMD_ID_SET_NOA_PARAM,
  7975. TRUE,
  7976. FALSE,
  7977. TRUE,
  7978. nicCmdEventSetCommon,
  7979. nicOidCmdTimeoutCommon,
  7980. sizeof(CMD_CUSTOM_NOA_PARAM_STRUCT_T),
  7981. (PUINT_8) &rCmdNoaParam, pvSetBuffer, u4SetBufferLen);
  7982. }
  7983. WLAN_STATUS
  7984. wlanoidSetOppPsParam(IN P_ADAPTER_T prAdapter,
  7985. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7986. {
  7987. P_PARAM_CUSTOM_OPPPS_PARAM_STRUCT_T prOppPsParam;
  7988. CMD_CUSTOM_OPPPS_PARAM_STRUCT_T rCmdOppPsParam;
  7989. DEBUGFUNC("wlanoidSetOppPsParam");
  7990. DBGLOG(OID, LOUD, "\n");
  7991. ASSERT(prAdapter);
  7992. ASSERT(pu4SetInfoLen);
  7993. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_OPPPS_PARAM_STRUCT_T);
  7994. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_OPPPS_PARAM_STRUCT_T))
  7995. return WLAN_STATUS_INVALID_LENGTH;
  7996. ASSERT(pvSetBuffer);
  7997. prOppPsParam = (P_PARAM_CUSTOM_OPPPS_PARAM_STRUCT_T) pvSetBuffer;
  7998. kalMemZero(&rCmdOppPsParam, sizeof(CMD_CUSTOM_OPPPS_PARAM_STRUCT_T));
  7999. rCmdOppPsParam.u4CTwindowMs = prOppPsParam->u4CTwindowMs;
  8000. return wlanSendSetQueryCmd(prAdapter,
  8001. CMD_ID_SET_OPPPS_PARAM,
  8002. TRUE,
  8003. FALSE,
  8004. TRUE,
  8005. nicCmdEventSetCommon,
  8006. nicOidCmdTimeoutCommon,
  8007. sizeof(CMD_CUSTOM_OPPPS_PARAM_STRUCT_T),
  8008. (PUINT_8) &rCmdOppPsParam, pvSetBuffer, u4SetBufferLen);
  8009. }
  8010. WLAN_STATUS
  8011. wlanoidSetUApsdParam(IN P_ADAPTER_T prAdapter,
  8012. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8013. {
  8014. P_PARAM_CUSTOM_UAPSD_PARAM_STRUCT_T prUapsdParam;
  8015. CMD_CUSTOM_UAPSD_PARAM_STRUCT_T rCmdUapsdParam;
  8016. P_PM_PROFILE_SETUP_INFO_T prPmProfSetupInfo;
  8017. P_BSS_INFO_T prBssInfo;
  8018. DEBUGFUNC("wlanoidSetUApsdParam");
  8019. DBGLOG(OID, LOUD, "\n");
  8020. ASSERT(prAdapter);
  8021. ASSERT(pu4SetInfoLen);
  8022. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_UAPSD_PARAM_STRUCT_T);
  8023. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_UAPSD_PARAM_STRUCT_T))
  8024. return WLAN_STATUS_INVALID_LENGTH;
  8025. ASSERT(pvSetBuffer);
  8026. prBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  8027. prPmProfSetupInfo = &prBssInfo->rPmProfSetupInfo;
  8028. prUapsdParam = (P_PARAM_CUSTOM_UAPSD_PARAM_STRUCT_T) pvSetBuffer;
  8029. kalMemZero(&rCmdUapsdParam, sizeof(CMD_CUSTOM_OPPPS_PARAM_STRUCT_T));
  8030. rCmdUapsdParam.fgEnAPSD = prUapsdParam->fgEnAPSD;
  8031. prAdapter->rWifiVar.fgSupportUAPSD = prUapsdParam->fgEnAPSD;
  8032. rCmdUapsdParam.fgEnAPSD_AcBe = prUapsdParam->fgEnAPSD_AcBe;
  8033. rCmdUapsdParam.fgEnAPSD_AcBk = prUapsdParam->fgEnAPSD_AcBk;
  8034. rCmdUapsdParam.fgEnAPSD_AcVo = prUapsdParam->fgEnAPSD_AcVo;
  8035. rCmdUapsdParam.fgEnAPSD_AcVi = prUapsdParam->fgEnAPSD_AcVi;
  8036. prPmProfSetupInfo->ucBmpDeliveryAC =
  8037. ((prUapsdParam->fgEnAPSD_AcBe << 0) |
  8038. (prUapsdParam->fgEnAPSD_AcBk << 1) |
  8039. (prUapsdParam->fgEnAPSD_AcVi << 2) | (prUapsdParam->fgEnAPSD_AcVo << 3));
  8040. prPmProfSetupInfo->ucBmpTriggerAC =
  8041. ((prUapsdParam->fgEnAPSD_AcBe << 0) |
  8042. (prUapsdParam->fgEnAPSD_AcBk << 1) |
  8043. (prUapsdParam->fgEnAPSD_AcVi << 2) | (prUapsdParam->fgEnAPSD_AcVo << 3));
  8044. rCmdUapsdParam.ucMaxSpLen = prUapsdParam->ucMaxSpLen;
  8045. prPmProfSetupInfo->ucUapsdSp = prUapsdParam->ucMaxSpLen;
  8046. return wlanSendSetQueryCmd(prAdapter,
  8047. CMD_ID_SET_UAPSD_PARAM,
  8048. TRUE,
  8049. FALSE,
  8050. TRUE,
  8051. nicCmdEventSetCommon,
  8052. nicOidCmdTimeoutCommon,
  8053. sizeof(CMD_CUSTOM_OPPPS_PARAM_STRUCT_T),
  8054. (PUINT_8) &rCmdUapsdParam, pvSetBuffer, u4SetBufferLen);
  8055. }
  8056. #endif
  8057. /*----------------------------------------------------------------------------*/
  8058. /*!
  8059. * \brief This routine is called to set BT profile or BT information and the
  8060. * driver will set the built-in PTA configuration into chip.
  8061. *
  8062. *
  8063. * \param[in] prAdapter Pointer to the Adapter structure.
  8064. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8065. * \param[in] u4SetBufferLen The length of the set buffer.
  8066. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8067. * bytes read from the set buffer. If the call failed
  8068. * due to invalid length of the set buffer, returns
  8069. * the amount of storage needed.
  8070. *
  8071. * \retval WLAN_STATUS_SUCCESS
  8072. * \retval WLAN_STATUS_INVALID_LENGTH
  8073. */
  8074. /*----------------------------------------------------------------------------*/
  8075. WLAN_STATUS
  8076. wlanoidSetBT(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8077. {
  8078. P_PTA_IPC_T prPtaIpc;
  8079. DEBUGFUNC("wlanoidSetBT.\n");
  8080. ASSERT(prAdapter);
  8081. ASSERT(pu4SetInfoLen);
  8082. *pu4SetInfoLen = sizeof(PTA_IPC_T);
  8083. if (u4SetBufferLen != sizeof(PTA_IPC_T)) {
  8084. WARNLOG(("Invalid length %u\n", u4SetBufferLen));
  8085. return WLAN_STATUS_INVALID_LENGTH;
  8086. }
  8087. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8088. DBGLOG(OID, WARN, "Fail to set BT profile because of ACPI_D3\n");
  8089. return WLAN_STATUS_ADAPTER_NOT_READY;
  8090. }
  8091. ASSERT(pvSetBuffer);
  8092. prPtaIpc = (P_PTA_IPC_T) pvSetBuffer;
  8093. #if CFG_SUPPORT_BCM && CFG_SUPPORT_BCM_BWCS && CFG_SUPPORT_BCM_BWCS_DEBUG
  8094. DBGLOG(OID, INFO,
  8095. "BCM BWCS CMD: BTPParams[0]=%02x, BTPParams[1]=%02x, BTPParams[2]=%02x, BTPParams[3]=%02x.\n",
  8096. prPtaIpc->u.aucBTPParams[0], prPtaIpc->u.aucBTPParams[1], prPtaIpc->u.aucBTPParams[2],
  8097. prPtaIpc->u.aucBTPParams[3];
  8098. #endif
  8099. wlanSendSetQueryCmd(prAdapter,
  8100. CMD_ID_SET_BWCS,
  8101. TRUE, FALSE, FALSE, NULL, NULL, sizeof(PTA_IPC_T), (PUINT_8) prPtaIpc, NULL, 0);
  8102. return WLAN_STATUS_SUCCESS;
  8103. }
  8104. /*----------------------------------------------------------------------------*/
  8105. /*!
  8106. * \brief This routine is called to query current BT profile and BTCR values
  8107. *
  8108. * \param[in] prAdapter Pointer to the Adapter structure.
  8109. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  8110. * the query.
  8111. * \param[in] u4QueryBufferLen The length of the query buffer.
  8112. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  8113. * bytes written into the query buffer. If the call
  8114. * failed due to invalid length of the query buffer,
  8115. * returns the amount of storage needed.
  8116. *
  8117. * \retval WLAN_STATUS_SUCCESS
  8118. * \retval WLAN_STATUS_INVALID_LENGTH
  8119. */
  8120. /*----------------------------------------------------------------------------*/
  8121. WLAN_STATUS
  8122. wlanoidQueryBT(IN P_ADAPTER_T prAdapter,
  8123. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8124. {
  8125. /* P_PARAM_PTA_IPC_T prPtaIpc; */
  8126. /* UINT_32 u4QueryBuffLen; */
  8127. ASSERT(prAdapter);
  8128. ASSERT(pu4QueryInfoLen);
  8129. if (u4QueryBufferLen)
  8130. ASSERT(pvQueryBuffer);
  8131. *pu4QueryInfoLen = sizeof(PTA_IPC_T);
  8132. /* Check for query buffer length */
  8133. if (u4QueryBufferLen != sizeof(PTA_IPC_T)) {
  8134. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  8135. return WLAN_STATUS_INVALID_LENGTH;
  8136. }
  8137. ASSERT(pvQueryBuffer);
  8138. /* prPtaIpc = (P_PTA_IPC_T)pvQueryBuffer; */
  8139. /* prPtaIpc->ucCmd = BT_CMD_PROFILE; */
  8140. /* prPtaIpc->ucLen = sizeof(prPtaIpc->u); */
  8141. /* nicPtaGetProfile(prAdapter, (PUINT_8)&prPtaIpc->u, &u4QueryBuffLen); */
  8142. return WLAN_STATUS_SUCCESS;
  8143. }
  8144. #if 0
  8145. WLAN_STATUS
  8146. wlanoidQueryBtSingleAntenna(IN P_ADAPTER_T prAdapter,
  8147. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8148. {
  8149. P_PTA_INFO_T prPtaInfo;
  8150. PUINT_32 pu4SingleAntenna;
  8151. ASSERT(prAdapter);
  8152. ASSERT(pu4QueryInfoLen);
  8153. if (u4QueryBufferLen)
  8154. ASSERT(pvQueryBuffer);
  8155. *pu4QueryInfoLen = sizeof(UINT_32);
  8156. /* Check for query buffer length */
  8157. if (u4QueryBufferLen != sizeof(UINT_32)) {
  8158. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  8159. return WLAN_STATUS_INVALID_LENGTH;
  8160. }
  8161. ASSERT(pvQueryBuffer);
  8162. prPtaInfo = &prAdapter->rPtaInfo;
  8163. pu4SingleAntenna = (PUINT_32) pvQueryBuffer;
  8164. if (prPtaInfo->fgSingleAntenna) {
  8165. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Q Single Ant = 1\r\n")); */
  8166. *pu4SingleAntenna = 1;
  8167. } else {
  8168. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Q Single Ant = 0\r\n")); */
  8169. *pu4SingleAntenna = 0;
  8170. }
  8171. return WLAN_STATUS_SUCCESS;
  8172. }
  8173. WLAN_STATUS
  8174. wlanoidSetBtSingleAntenna(IN P_ADAPTER_T prAdapter,
  8175. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8176. {
  8177. PUINT_32 pu4SingleAntenna;
  8178. UINT_32 u4SingleAntenna;
  8179. P_PTA_INFO_T prPtaInfo;
  8180. ASSERT(prAdapter);
  8181. ASSERT(pu4SetInfoLen);
  8182. prPtaInfo = &prAdapter->rPtaInfo;
  8183. *pu4SetInfoLen = sizeof(UINT_32);
  8184. if (u4SetBufferLen != sizeof(UINT_32))
  8185. return WLAN_STATUS_INVALID_LENGTH;
  8186. if (IS_ARB_IN_RFTEST_STATE(prAdapter))
  8187. return WLAN_STATUS_SUCCESS;
  8188. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8189. DBGLOG(OID, WARN, "Fail to set antenna because of ACPI_D3\n");
  8190. return WLAN_STATUS_ADAPTER_NOT_READY;
  8191. }
  8192. ASSERT(pvSetBuffer);
  8193. pu4SingleAntenna = (PUINT_32) pvSetBuffer;
  8194. u4SingleAntenna = *pu4SingleAntenna;
  8195. if (u4SingleAntenna == 0) {
  8196. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Set Single Ant = 0\r\n")); */
  8197. prPtaInfo->fgSingleAntenna = FALSE;
  8198. } else {
  8199. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Set Single Ant = 1\r\n")); */
  8200. prPtaInfo->fgSingleAntenna = TRUE;
  8201. }
  8202. ptaFsmRunEventSetConfig(prAdapter, &prPtaInfo->rPtaParam);
  8203. return WLAN_STATUS_SUCCESS;
  8204. }
  8205. #if CFG_SUPPORT_BCM && CFG_SUPPORT_BCM_BWCS
  8206. WLAN_STATUS
  8207. wlanoidQueryPta(IN P_ADAPTER_T prAdapter,
  8208. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8209. {
  8210. P_PTA_INFO_T prPtaInfo;
  8211. PUINT_32 pu4Pta;
  8212. ASSERT(prAdapter);
  8213. ASSERT(pu4QueryInfoLen);
  8214. if (u4QueryBufferLen)
  8215. ASSERT(pvQueryBuffer);
  8216. *pu4QueryInfoLen = sizeof(UINT_32);
  8217. /* Check for query buffer length */
  8218. if (u4QueryBufferLen != sizeof(UINT_32)) {
  8219. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  8220. return WLAN_STATUS_INVALID_LENGTH;
  8221. }
  8222. ASSERT(pvQueryBuffer);
  8223. prPtaInfo = &prAdapter->rPtaInfo;
  8224. pu4Pta = (PUINT_32) pvQueryBuffer;
  8225. if (prPtaInfo->fgEnabled) {
  8226. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"PTA = 1\r\n")); */
  8227. *pu4Pta = 1;
  8228. } else {
  8229. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"PTA = 0\r\n")); */
  8230. *pu4Pta = 0;
  8231. }
  8232. return WLAN_STATUS_SUCCESS;
  8233. }
  8234. WLAN_STATUS
  8235. wlanoidSetPta(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8236. {
  8237. PUINT_32 pu4PtaCtrl;
  8238. UINT_32 u4PtaCtrl;
  8239. ASSERT(prAdapter);
  8240. ASSERT(pu4SetInfoLen);
  8241. *pu4SetInfoLen = sizeof(UINT_32);
  8242. if (u4SetBufferLen != sizeof(UINT_32))
  8243. return WLAN_STATUS_INVALID_LENGTH;
  8244. if (IS_ARB_IN_RFTEST_STATE(prAdapter))
  8245. return WLAN_STATUS_SUCCESS;
  8246. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8247. DBGLOG(OID, WARN, "Fail to set BT setting because of ACPI_D3\n");
  8248. return WLAN_STATUS_ADAPTER_NOT_READY;
  8249. }
  8250. ASSERT(pvSetBuffer);
  8251. pu4PtaCtrl = (PUINT_32) pvSetBuffer;
  8252. u4PtaCtrl = *pu4PtaCtrl;
  8253. if (u4PtaCtrl == 0) {
  8254. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Set Pta= 0\r\n")); */
  8255. nicPtaSetFunc(prAdapter, FALSE);
  8256. } else {
  8257. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Set Pta= 1\r\n")); */
  8258. nicPtaSetFunc(prAdapter, TRUE);
  8259. }
  8260. return WLAN_STATUS_SUCCESS;
  8261. }
  8262. #endif
  8263. #endif
  8264. /*----------------------------------------------------------------------------*/
  8265. /*!
  8266. * \brief This routine is called to set Tx power profile.
  8267. *
  8268. *
  8269. * \param[in] prAdapter Pointer to the Adapter structure.
  8270. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8271. * \param[in] u4SetBufferLen The length of the set buffer.
  8272. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8273. * bytes read from the set buffer. If the call failed
  8274. * due to invalid length of the set buffer, returns
  8275. * the amount of storage needed.
  8276. *
  8277. * \retval WLAN_STATUS_SUCCESS
  8278. * \retval WLAN_STATUS_INVALID_LENGTH
  8279. */
  8280. /*----------------------------------------------------------------------------*/
  8281. WLAN_STATUS
  8282. wlanoidSetTxPower(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8283. {
  8284. /* P_SET_TXPWR_CTRL_T pTxPwr = (P_SET_TXPWR_CTRL_T)pvSetBuffer; */
  8285. /* UINT_32 i; */
  8286. WLAN_STATUS rStatus;
  8287. DEBUGFUNC("wlanoidSetTxPower");
  8288. DBGLOG(OID, LOUD, "\r\n");
  8289. ASSERT(prAdapter);
  8290. ASSERT(pvSetBuffer);
  8291. #if 0
  8292. DBGLOG(OID, INFO, "c2GLegacyStaPwrOffset=%d\n", pTxPwr->c2GLegacyStaPwrOffset);
  8293. DBGLOG(OID, INFO, "c2GHotspotPwrOffset=%d\n", pTxPwr->c2GHotspotPwrOffset);
  8294. DBGLOG(OID, INFO, "c2GP2pPwrOffset=%d\n", pTxPwr->c2GP2pPwrOffset);
  8295. DBGLOG(OID, INFO, "c2GBowPwrOffset=%d\n", pTxPwr->c2GBowPwrOffset);
  8296. DBGLOG(OID, INFO, "c5GLegacyStaPwrOffset=%d\n", pTxPwr->c5GLegacyStaPwrOffset);
  8297. DBGLOG(OID, INFO, "c5GHotspotPwrOffset=%d\n", pTxPwr->c5GHotspotPwrOffset);
  8298. DBGLOG(OID, INFO, "c5GP2pPwrOffset=%d\n", pTxPwr->c5GP2pPwrOffset);
  8299. DBGLOG(OID, INFO, "c5GBowPwrOffset=%d\n", pTxPwr->c5GBowPwrOffset);
  8300. DBGLOG(OID, INFO, "ucConcurrencePolicy=%d\n", pTxPwr->ucConcurrencePolicy);
  8301. for (i = 0; i < 14; i++)
  8302. DBGLOG(OID, INFO, "acTxPwrLimit2G[%d]=%d\n", i, pTxPwr->acTxPwrLimit2G[i]);
  8303. for (i = 0; i < 4; i++)
  8304. DBGLOG(OID, INFO, "acTxPwrLimit5G[%d]=%d\n", i, pTxPwr->acTxPwrLimit5G[i]);
  8305. #endif
  8306. rStatus = wlanSendSetQueryCmd(prAdapter, /* prAdapter */
  8307. CMD_ID_SET_TXPWR_CTRL, /* ucCID */
  8308. TRUE, /* fgSetQuery */
  8309. FALSE, /* fgNeedResp */
  8310. TRUE, /* fgIsOid */
  8311. NULL, /* pfCmdDoneHandler */
  8312. NULL, /* pfCmdTimeoutHandler */
  8313. u4SetBufferLen, /* u4SetQueryInfoLen */
  8314. (PUINT_8) pvSetBuffer, /* pucInfoBuffer */
  8315. NULL, /* pvSetQueryBuffer */
  8316. 0 /* u4SetQueryBufferLen */
  8317. );
  8318. ASSERT(rStatus == WLAN_STATUS_PENDING);
  8319. return rStatus;
  8320. }
  8321. WLAN_STATUS wlanSendMemDumpCmd(IN P_ADAPTER_T prAdapter, IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen)
  8322. {
  8323. P_PARAM_CUSTOM_MEM_DUMP_STRUCT_T prMemDumpInfo;
  8324. P_CMD_DUMP_MEM prCmdDumpMem;
  8325. CMD_DUMP_MEM rCmdDumpMem;
  8326. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  8327. UINT_32 u4MemSize = PARAM_MEM_DUMP_MAX_SIZE;
  8328. UINT_32 u4RemainLeng = 0;
  8329. UINT_32 u4CurAddr = 0;
  8330. UINT_8 ucFragNum = 0;
  8331. prCmdDumpMem = &rCmdDumpMem;
  8332. prMemDumpInfo = (P_PARAM_CUSTOM_MEM_DUMP_STRUCT_T) pvQueryBuffer;
  8333. u4RemainLeng = prMemDumpInfo->u4RemainLength;
  8334. u4CurAddr = prMemDumpInfo->u4Address + prMemDumpInfo->u4Length;
  8335. ucFragNum = prMemDumpInfo->ucFragNum + 1;
  8336. /* Query. If request length is larger than max length, do it as ping pong.
  8337. * Send a command and wait for a event. Send next command while the event is received.
  8338. *
  8339. */
  8340. do {
  8341. UINT_32 u4CurLeng = 0;
  8342. if (u4RemainLeng > u4MemSize) {
  8343. u4CurLeng = u4MemSize;
  8344. u4RemainLeng -= u4MemSize;
  8345. } else {
  8346. u4CurLeng = u4RemainLeng;
  8347. u4RemainLeng = 0;
  8348. }
  8349. prCmdDumpMem->u4Address = u4CurAddr;
  8350. prCmdDumpMem->u4Length = u4CurLeng;
  8351. prCmdDumpMem->u4RemainLength = u4RemainLeng;
  8352. prCmdDumpMem->ucFragNum = ucFragNum;
  8353. DBGLOG(OID, TRACE, "[%d] 0x%X, len %u, remain len %u\n",
  8354. ucFragNum,
  8355. prCmdDumpMem->u4Address, prCmdDumpMem->u4Length, prCmdDumpMem->u4RemainLength);
  8356. rStatus = wlanSendSetQueryCmd(prAdapter,
  8357. CMD_ID_DUMP_MEM,
  8358. FALSE,
  8359. TRUE,
  8360. TRUE,
  8361. nicCmdEventQueryMemDump,
  8362. nicOidCmdTimeoutCommon,
  8363. sizeof(CMD_DUMP_MEM),
  8364. (PUINT_8) prCmdDumpMem, pvQueryBuffer, u4QueryBufferLen);
  8365. } while (FALSE);
  8366. return rStatus;
  8367. }
  8368. /*----------------------------------------------------------------------------*/
  8369. /*!
  8370. * \brief This routine is called to dump memory.
  8371. *
  8372. * \param[in] pvAdapter Pointer to the Adapter structure.
  8373. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  8374. * the query.
  8375. * \param[in] u4QueryBufLen The length of the query buffer.
  8376. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  8377. * bytes written into the query buffer. If the call
  8378. * failed due to invalid length of the query buffer,
  8379. * returns the amount of storage needed.
  8380. *
  8381. * \retval WLAN_STATUS_SUCCESS
  8382. * \retval WLAN_STATUS_INVALID_LENGTH
  8383. */
  8384. /*----------------------------------------------------------------------------*/
  8385. WLAN_STATUS
  8386. wlanoidQueryMemDump(IN P_ADAPTER_T prAdapter,
  8387. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8388. {
  8389. P_PARAM_CUSTOM_MEM_DUMP_STRUCT_T prMemDumpInfo;
  8390. DEBUGFUNC("wlanoidQueryMemDump");
  8391. DBGLOG(OID, LOUD, "\n");
  8392. ASSERT(prAdapter);
  8393. ASSERT(pu4QueryInfoLen);
  8394. if (u4QueryBufferLen)
  8395. ASSERT(pvQueryBuffer);
  8396. *pu4QueryInfoLen = sizeof(UINT_32);
  8397. prMemDumpInfo = (P_PARAM_CUSTOM_MEM_DUMP_STRUCT_T) pvQueryBuffer;
  8398. DBGLOG(OID, TRACE, "Dump 0x%X, len %u\n", prMemDumpInfo->u4Address, prMemDumpInfo->u4Length);
  8399. prMemDumpInfo->u4RemainLength = prMemDumpInfo->u4Length;
  8400. prMemDumpInfo->u4Length = 0;
  8401. prMemDumpInfo->ucFragNum = 0;
  8402. return wlanSendMemDumpCmd(prAdapter, pvQueryBuffer, u4QueryBufferLen);
  8403. } /* end of wlanoidQueryMcrRead() */
  8404. #if CFG_ENABLE_WIFI_DIRECT
  8405. /*----------------------------------------------------------------------------*/
  8406. /*!
  8407. * \brief This routine is used to set the p2p mode.
  8408. *
  8409. * \param[in] pvAdapter Pointer to the Adapter structure.
  8410. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8411. * \param[in] u4SetBufferLen The length of the set buffer.
  8412. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8413. * bytes read from the set buffer. If the call failed
  8414. * due to invalid length of the set buffer, returns
  8415. * the amount of storage needed.
  8416. *
  8417. * \retval WLAN_STATUS_SUCCESS
  8418. * \retval WLAN_STATUS_INVALID_LENGTH
  8419. */
  8420. /*----------------------------------------------------------------------------*/
  8421. WLAN_STATUS
  8422. wlanoidSetP2pMode(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8423. {
  8424. WLAN_STATUS status = WLAN_STATUS_SUCCESS;
  8425. P_PARAM_CUSTOM_P2P_SET_STRUCT_T prSetP2P = (P_PARAM_CUSTOM_P2P_SET_STRUCT_T) NULL;
  8426. /* P_MSG_P2P_NETDEV_REGISTER_T prP2pNetdevRegMsg = (P_MSG_P2P_NETDEV_REGISTER_T)NULL; */
  8427. DEBUGFUNC("wlanoidSetP2pMode");
  8428. ASSERT(prAdapter);
  8429. ASSERT(pu4SetInfoLen);
  8430. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_P2P_SET_STRUCT_T);
  8431. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_P2P_SET_STRUCT_T)) {
  8432. DBGLOG(OID, WARN, "Invalid length %u\n", u4SetBufferLen);
  8433. return WLAN_STATUS_INVALID_LENGTH;
  8434. }
  8435. prSetP2P = (P_PARAM_CUSTOM_P2P_SET_STRUCT_T) pvSetBuffer;
  8436. DBGLOG(P2P, INFO, "Set P2P enable %p [%u] mode[%u]\n", prSetP2P, prSetP2P->u4Enable, prSetP2P->u4Mode);
  8437. /*
  8438. * enable = 1, mode = 0 => init P2P network
  8439. * enable = 1, mode = 1 => init Soft AP network
  8440. * enable = 0 => uninit P2P/AP network
  8441. */
  8442. if (prSetP2P->u4Enable) {
  8443. p2pSetMode((prSetP2P->u4Mode == 1) ? TRUE : FALSE);
  8444. if (p2pLaunch(prAdapter->prGlueInfo))
  8445. ASSERT(prAdapter->fgIsP2PRegistered);
  8446. } else {
  8447. DBGLOG(P2P, TRACE, "prAdapter->fgIsP2PRegistered = %d\n", prAdapter->fgIsP2PRegistered);
  8448. if (prAdapter->fgIsP2PRegistered) {
  8449. DBGLOG(P2P, INFO, "p2pRemove\n");
  8450. p2pRemove(prAdapter->prGlueInfo);
  8451. }
  8452. }
  8453. #if 0
  8454. prP2pNetdevRegMsg = (P_MSG_P2P_NETDEV_REGISTER_T) cnmMemAlloc(prAdapter,
  8455. RAM_TYPE_MSG,
  8456. (sizeof(MSG_P2P_NETDEV_REGISTER_T)));
  8457. if (prP2pNetdevRegMsg == NULL) {
  8458. ASSERT(FALSE);
  8459. status = WLAN_STATUS_RESOURCES;
  8460. return status;
  8461. }
  8462. prP2pNetdevRegMsg->rMsgHdr.eMsgId = MID_MNY_P2P_NET_DEV_REGISTER;
  8463. prP2pNetdevRegMsg->fgIsEnable = (prSetP2P->u4Enable == 1) ? TRUE : FALSE;
  8464. prP2pNetdevRegMsg->ucMode = (UINT_8) prSetP2P->u4Mode;
  8465. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prP2pNetdevRegMsg, MSG_SEND_METHOD_BUF);
  8466. #endif
  8467. return status;
  8468. }
  8469. #endif
  8470. #if CFG_SUPPORT_BUILD_DATE_CODE
  8471. /*----------------------------------------------------------------------------*/
  8472. /*!
  8473. * \brief This routine is used to query build date code information from firmware
  8474. *
  8475. * \param[in] pvAdapter Pointer to the Adapter structure.
  8476. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  8477. * the query.
  8478. * \param[in] u4QueryBufferLen The length of the query buffer.
  8479. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  8480. * bytes written into the query buffer. If the call
  8481. * failed due to invalid length of the query buffer,
  8482. * returns the amount of storage needed.
  8483. *
  8484. * \retval WLAN_STATUS_SUCCESS
  8485. * \retval WLAN_STATUS_INVALID_LENGTH
  8486. */
  8487. /*----------------------------------------------------------------------------*/
  8488. WLAN_STATUS
  8489. wlanoidQueryBuildDateCode(IN P_ADAPTER_T prAdapter,
  8490. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8491. {
  8492. CMD_GET_BUILD_DATE_CODE rCmdGetBuildDateCode;
  8493. DEBUGFUNC("wlanoidQueryBuildDateCode");
  8494. DBGLOG(OID, LOUD, "\n");
  8495. ASSERT(prAdapter);
  8496. ASSERT(pu4QueryInfoLen);
  8497. if (u4QueryBufferLen)
  8498. ASSERT(pvQueryBuffer);
  8499. *pu4QueryInfoLen = sizeof(UINT_8) * 16;
  8500. if (u4QueryBufferLen < sizeof(UINT_8) * 16)
  8501. return WLAN_STATUS_INVALID_LENGTH;
  8502. return wlanSendSetQueryCmd(prAdapter,
  8503. CMD_ID_GET_BUILD_DATE_CODE,
  8504. FALSE,
  8505. TRUE,
  8506. TRUE,
  8507. nicCmdEventBuildDateCode,
  8508. nicOidCmdTimeoutCommon,
  8509. sizeof(CMD_GET_BUILD_DATE_CODE),
  8510. (PUINT_8) &rCmdGetBuildDateCode, pvQueryBuffer, u4QueryBufferLen);
  8511. } /* end of wlanoidQueryBuildDateCode() */
  8512. #endif
  8513. /*----------------------------------------------------------------------------*/
  8514. /*!
  8515. * \brief This routine is used to query BSS info from firmware
  8516. *
  8517. * \param[in] pvAdapter Pointer to the Adapter structure.
  8518. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  8519. * the query.
  8520. * \param[in] u4QueryBufferLen The length of the query buffer.
  8521. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  8522. * bytes written into the query buffer. If the call
  8523. * failed due to invalid length of the query buffer,
  8524. * returns the amount of storage needed.
  8525. *
  8526. * \retval WLAN_STATUS_SUCCESS
  8527. * \retval WLAN_STATUS_INVALID_LENGTH
  8528. */
  8529. /*----------------------------------------------------------------------------*/
  8530. WLAN_STATUS
  8531. wlanoidQueryBSSInfo(IN P_ADAPTER_T prAdapter,
  8532. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8533. {
  8534. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  8535. EVENT_AIS_BSS_INFO_T rCmdBSSInfo;
  8536. ASSERT(prAdapter);
  8537. ASSERT(pu4QueryInfoLen);
  8538. if (u4QueryBufferLen)
  8539. ASSERT(pvQueryBuffer);
  8540. *pu4QueryInfoLen = sizeof(EVENT_AIS_BSS_INFO_T);
  8541. if (u4QueryBufferLen < sizeof(EVENT_AIS_BSS_INFO_T))
  8542. return WLAN_STATUS_INVALID_LENGTH;
  8543. kalMemZero(&rCmdBSSInfo, sizeof(EVENT_AIS_BSS_INFO_T));
  8544. /*
  8545. rStatus = wlanSendSetQueryCmd(prAdapter,
  8546. CMD_ID_GET_BSS_INFO,
  8547. FALSE,
  8548. TRUE,
  8549. TRUE,
  8550. nicCmdEventGetBSSInfo,
  8551. nicOidCmdTimeoutCommon,
  8552. sizeof(P_EVENT_AIS_BSS_INFO_T),
  8553. (PUINT_8) &rCmdBSSInfo, pvQueryBuffer, u4QueryBufferLen);
  8554. */
  8555. rStatus = wlanSendSetQueryCmd(prAdapter,
  8556. CMD_ID_GET_BSS_INFO,
  8557. FALSE,
  8558. TRUE,
  8559. TRUE,
  8560. nicCmdEventGetBSSInfo,
  8561. nicOidCmdTimeoutCommon,
  8562. sizeof(EVENT_AIS_BSS_INFO_T),
  8563. (PUINT_8) & rCmdBSSInfo, pvQueryBuffer, u4QueryBufferLen);
  8564. return rStatus;
  8565. } /* wlanoidSetWiFiWmmPsTest */
  8566. #if CFG_SUPPORT_BATCH_SCAN
  8567. #define CMD_WLS_BATCHING "WLS_BATCHING"
  8568. #define BATCHING_SET "SET"
  8569. #define BATCHING_GET "GET"
  8570. #define BATCHING_STOP "STOP"
  8571. #define PARAM_SCANFREQ "SCANFREQ"
  8572. #define PARAM_MSCAN "MSCAN"
  8573. #define PARAM_BESTN "BESTN"
  8574. #define PARAM_CHANNEL "CHANNEL"
  8575. #define PARAM_RTT "RTT"
  8576. WLAN_STATUS
  8577. batchSetCmd(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4WritenLen)
  8578. {
  8579. P_CHANNEL_INFO_T prRfChannelInfo;
  8580. CMD_BATCH_REQ_T rCmdBatchReq;
  8581. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  8582. PCHAR head, p, p2;
  8583. UINT_32 tokens;
  8584. INT_32 scanfreq, mscan, bestn, rtt;
  8585. DBGLOG(SCN, TRACE, "[BATCH] command=%s, len=%u\n", (PCHAR) pvSetBuffer, (UINT_32) u4SetBufferLen);
  8586. if (!pu4WritenLen)
  8587. return -EINVAL;
  8588. *pu4WritenLen = 0;
  8589. if (u4SetBufferLen < kalStrLen(CMD_WLS_BATCHING)) {
  8590. DBGLOG(SCN, TRACE, "[BATCH] invalid len %u\n", (UINT_32) u4SetBufferLen);
  8591. return -EINVAL;
  8592. }
  8593. head = pvSetBuffer + kalStrLen(CMD_WLS_BATCHING) + 1;
  8594. kalMemSet(&rCmdBatchReq, 0, sizeof(CMD_BATCH_REQ_T));
  8595. if (!kalStrnCmp(head, BATCHING_SET, kalStrLen(BATCHING_SET))) {
  8596. DBGLOG(SCN, TRACE, "XXX Start Batch Scan XXX\n");
  8597. head += kalStrLen(BATCHING_SET) + 1;
  8598. /* SCANFREQ, MSCAN, BESTN */
  8599. tokens = kalSScanf(head, "SCANFREQ=%d MSCAN=%d BESTN=%d", &scanfreq, &mscan, &bestn);
  8600. if (tokens != 3) {
  8601. DBGLOG(SCN, TRACE, "[BATCH] Parse fail: tokens=%u, SCANFREQ=%d MSCAN=%d BESTN=%d\n",
  8602. (UINT_32) tokens, scanfreq, mscan, bestn);
  8603. return -EINVAL;
  8604. }
  8605. /* RTT */
  8606. p = kalStrStr(head, PARAM_RTT);
  8607. if (!p) {
  8608. DBGLOG(SCN, TRACE, "[BATCH] Parse RTT fail. head=%s\n", head);
  8609. return -EINVAL;
  8610. }
  8611. tokens = kalSScanf(p, "RTT=%d", &rtt);
  8612. if (tokens != 1) {
  8613. DBGLOG(SCN, TRACE, "[BATCH] Parse fail: tokens=%u, rtt=%d\n", (UINT_32) tokens, rtt);
  8614. return -EINVAL;
  8615. }
  8616. /* CHANNEL */
  8617. p = kalStrStr(head, PARAM_CHANNEL);
  8618. if (!p) {
  8619. DBGLOG(SCN, TRACE, "[BATCH] Parse CHANNEL fail(1)\n");
  8620. return -EINVAL;
  8621. }
  8622. head = p;
  8623. p = kalStrChr(head, '>');
  8624. if (!p) {
  8625. DBGLOG(SCN, TRACE, "[BATCH] Parse CHANNEL fail(2)\n");
  8626. return -EINVAL;
  8627. }
  8628. /* else {
  8629. *p = '.'; // remove '>' because sscanf can not parse <%s>
  8630. }*/
  8631. /*tokens = kalSScanf(head, "CHANNEL=<%s", c_channel);
  8632. if (tokens != 1) {
  8633. DBGLOG(SCN, TRACE, ("[BATCH] Parse fail: tokens=%d, CHANNEL=<%s>\n",
  8634. tokens, c_channel));
  8635. return -EINVAL;
  8636. } */
  8637. rCmdBatchReq.ucChannelType = SCAN_CHANNEL_SPECIFIED;
  8638. rCmdBatchReq.ucChannelListNum = 0;
  8639. prRfChannelInfo = &rCmdBatchReq.arChannelList[0];
  8640. p = head + kalStrLen(PARAM_CHANNEL) + 2; /* c_channel; */
  8641. while ((p2 = kalStrSep((char **)&p, ",")) != NULL) {
  8642. if (p2 == NULL || *p2 == 0)
  8643. break;
  8644. if (*p2 == '\0')
  8645. continue;
  8646. if (*p2 == 'A') {
  8647. rCmdBatchReq.ucChannelType =
  8648. rCmdBatchReq.ucChannelType ==
  8649. SCAN_CHANNEL_2G4 ? SCAN_CHANNEL_FULL : SCAN_CHANNEL_5G;
  8650. } else if (*p2 == 'B') {
  8651. rCmdBatchReq.ucChannelType =
  8652. rCmdBatchReq.ucChannelType ==
  8653. SCAN_CHANNEL_5G ? SCAN_CHANNEL_FULL : SCAN_CHANNEL_2G4;
  8654. } else {
  8655. /* Translate Freq from MHz to channel number. */
  8656. prRfChannelInfo->ucChannelNum = kalStrtol(p2, NULL, 0);
  8657. DBGLOG(SCN, TRACE, "Scanning Channel:%u, freq: %d\n",
  8658. (UINT_32) prRfChannelInfo->ucChannelNum,
  8659. (UINT_32) nicChannelNum2Freq(prRfChannelInfo->ucChannelNum));
  8660. prRfChannelInfo->ucBand = prRfChannelInfo->ucChannelNum < 15 ? BAND_2G4 : BAND_5G;
  8661. rCmdBatchReq.ucChannelListNum++;
  8662. if (rCmdBatchReq.ucChannelListNum >= 32)
  8663. break;
  8664. prRfChannelInfo++;
  8665. }
  8666. }
  8667. /* set channel for test */
  8668. #if 0
  8669. rCmdBatchReq.ucChannelType = 4; /* SCAN_CHANNEL_SPECIFIED; */
  8670. rCmdBatchReq.ucChannelListNum = 0;
  8671. prRfChannelInfo = &rCmdBatchReq.arChannelList[0];
  8672. for (i = 1; i <= 14; i++) {
  8673. /* filter out some */
  8674. if (i == 1 || i == 5 || i == 11)
  8675. continue;
  8676. /* Translate Freq from MHz to channel number. */
  8677. prRfChannelInfo->ucChannelNum = i;
  8678. DBGLOG(SCN, TRACE, "Scanning Channel:%d, freq: %d\n",
  8679. prRfChannelInfo->ucChannelNum,
  8680. nicChannelNum2Freq(prRfChannelInfo->ucChannelNum));
  8681. prRfChannelInfo->ucBand = BAND_2G4;
  8682. rCmdBatchReq.ucChannelListNum++;
  8683. prRfChannelInfo++;
  8684. }
  8685. #endif
  8686. #if 0
  8687. rCmdBatchReq.ucChannelType = 0; /* SCAN_CHANNEL_FULL; */
  8688. #endif
  8689. rCmdBatchReq.u4Scanfreq = scanfreq;
  8690. rCmdBatchReq.ucMScan = mscan > CFG_BATCH_MAX_MSCAN ? CFG_BATCH_MAX_MSCAN : mscan;
  8691. rCmdBatchReq.ucBestn = bestn;
  8692. rCmdBatchReq.ucRtt = rtt;
  8693. DBGLOG(SCN, TRACE, "[BATCH] SCANFREQ=%u MSCAN=%u BESTN=%u RTT=%u\n",
  8694. (UINT_32) rCmdBatchReq.u4Scanfreq,
  8695. (UINT_32) rCmdBatchReq.ucMScan,
  8696. (UINT_32) rCmdBatchReq.ucBestn, (UINT_32) rCmdBatchReq.ucRtt;
  8697. if (rCmdBatchReq.ucChannelType != SCAN_CHANNEL_SPECIFIED) {
  8698. DBGLOG(SCN, TRACE, "[BATCH] CHANNELS = %s\n",
  8699. rCmdBatchReq.ucChannelType == SCAN_CHANNEL_FULL ? "FULL" :
  8700. rCmdBatchReq.ucChannelType == SCAN_CHANNEL_2G4 ? "2.4G all" : "5G all");
  8701. } else {
  8702. DBGLOG(SCN, TRACE, "[BATCH] CHANNEL list\n");
  8703. prRfChannelInfo = &rCmdBatchReq.arChannelList[0];
  8704. for (tokens = 0; tokens < rCmdBatchReq.ucChannelListNum; tokens++) {
  8705. DBGLOG(SCN, TRACE, "[BATCH] %s, %d\n",
  8706. prRfChannelInfo->ucBand == BAND_2G4 ? "2.4G" : "5G",
  8707. prRfChannelInfo->ucChannelNum);
  8708. prRfChannelInfo++;
  8709. }
  8710. }
  8711. rCmdBatchReq.ucSeqNum = 1;
  8712. rCmdBatchReq.ucNetTypeIndex = NETWORK_TYPE_AIS_INDEX;
  8713. rCmdBatchReq.ucCmd = SCAN_BATCH_REQ_START;
  8714. *pu4WritenLen = kalSnprintf(pvSetBuffer, 3, "%d", rCmdBatchReq.ucMScan);
  8715. } else if (!kalStrnCmp(head, BATCHING_STOP, kalStrLen(BATCHING_STOP))) {
  8716. DBGLOG(SCN, TRACE, "XXX Stop Batch Scan XXX\n");
  8717. rCmdBatchReq.ucSeqNum = 1;
  8718. rCmdBatchReq.ucNetTypeIndex = NETWORK_TYPE_AIS_INDEX;
  8719. rCmdBatchReq.ucCmd = SCAN_BATCH_REQ_STOP;
  8720. } else {
  8721. return -EINVAL;
  8722. }
  8723. wlanSendSetQueryCmd(prAdapter,
  8724. CMD_ID_SET_BATCH_REQ,
  8725. TRUE, FALSE, TRUE, NULL, NULL, sizeof(CMD_BATCH_REQ_T), (PUINT_8) &rCmdBatchReq, NULL, 0);
  8726. /* kalMemSet(pvSetBuffer, 0, u4SetBufferLen); */
  8727. /* rStatus = kalSnprintf(pvSetBuffer, 2, "%s", "OK"); */
  8728. return rStatus;
  8729. }
  8730. WLAN_STATUS
  8731. batchGetCmd(IN P_ADAPTER_T prAdapter,
  8732. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8733. {
  8734. CMD_BATCH_REQ_T rCmdBatchReq;
  8735. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  8736. P_EVENT_BATCH_RESULT_T prEventBatchResult;
  8737. ASSERT(prAdapter);
  8738. ASSERT(pu4QueryInfoLen);
  8739. if (u4QueryBufferLen)
  8740. ASSERT(pvQueryBuffer);
  8741. prEventBatchResult = (P_EVENT_BATCH_RESULT_T) pvQueryBuffer;
  8742. DBGLOG(SCN, TRACE, "XXX Get Batch Scan Result (%u) XXX\n", (UINT_32) prEventBatchResult->ucScanCount);
  8743. *pu4QueryInfoLen = sizeof(EVENT_BATCH_RESULT_T);
  8744. rCmdBatchReq.ucSeqNum = 2;
  8745. rCmdBatchReq.ucCmd = SCAN_BATCH_REQ_RESULT;
  8746. rCmdBatchReq.ucMScan = prEventBatchResult->ucScanCount; /* Get which round result */
  8747. rStatus = wlanSendSetQueryCmd(prAdapter,
  8748. CMD_ID_SET_BATCH_REQ,
  8749. FALSE,
  8750. TRUE,
  8751. TRUE,
  8752. nicCmdEventBatchScanResult,
  8753. nicOidCmdTimeoutCommon,
  8754. sizeof(CMD_BATCH_REQ_T),
  8755. (PUINT_8) &rCmdBatchReq, (PVOID) pvQueryBuffer, u4QueryBufferLen);
  8756. return rStatus;
  8757. }
  8758. /*----------------------------------------------------------------------------*/
  8759. /*!
  8760. * \brief
  8761. *
  8762. * \param[in] prAdapter Pointer to the Adapter structure
  8763. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  8764. * \param[in] u4SetBufferLen The length of the set buffer
  8765. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8766. * bytes read from the set buffer. If the call failed due to invalid length of
  8767. * the set buffer, returns the amount of storage needed.
  8768. *
  8769. * \retval WLAN_STATUS_SUCCESS
  8770. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  8771. * \retval WLAN_STATUS_INVALID_LENGTH
  8772. *
  8773. */
  8774. /*----------------------------------------------------------------------------*/
  8775. WLAN_STATUS
  8776. wlanoidSetBatchScanReq(IN P_ADAPTER_T prAdapter,
  8777. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8778. {
  8779. return batchSetCmd(prAdapter, pvSetBuffer, u4SetBufferLen, pu4SetInfoLen);
  8780. }
  8781. /*----------------------------------------------------------------------------*/
  8782. /*!
  8783. * \brief
  8784. *
  8785. * \param[in] pvAdapter Pointer to the Adapter structure.
  8786. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  8787. * the query.
  8788. * \param[in] u4QueryBufferLen The length of the query buffer.
  8789. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  8790. * bytes written into the query buffer. If the call
  8791. * failed due to invalid length of the query buffer,
  8792. * returns the amount of storage needed.
  8793. *
  8794. * \retval WLAN_STATUS_SUCCESS
  8795. * \retval WLAN_STATUS_INVALID_LENGTH
  8796. */
  8797. /*----------------------------------------------------------------------------*/
  8798. WLAN_STATUS
  8799. wlanoidQueryBatchScanResult(IN P_ADAPTER_T prAdapter,
  8800. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8801. {
  8802. return batchGetCmd(prAdapter, pvQueryBuffer, u4QueryBufferLen, pu4QueryInfoLen);
  8803. } /* end of wlanoidQueryBatchScanResult() */
  8804. #endif /* CFG_SUPPORT_BATCH_SCAN */
  8805. /*----------------------------------------------------------------------------*/
  8806. /*!
  8807. * \brief This routine is called to request starting of schedule scan
  8808. *
  8809. * \param[in] prAdapter Pointer to the Adapter structure.
  8810. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8811. * \param[in] u4SetBufferLen The length of the set buffer.
  8812. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8813. * bytes read from the set buffer. If the call failed
  8814. * due to invalid length of the set buffer, returns
  8815. * the amount of storage needed.
  8816. *
  8817. * \retval WLAN_STATUS_SUCCESS
  8818. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  8819. * \retval WLAN_STATUS_INVALID_LENGTH
  8820. * \retval WLAN_STATUS_INVALID_DATA
  8821. *
  8822. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  8823. */
  8824. /*----------------------------------------------------------------------------*/
  8825. WLAN_STATUS
  8826. wlanoidSetStartSchedScan(IN P_ADAPTER_T prAdapter,
  8827. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8828. {
  8829. P_PARAM_SCHED_SCAN_REQUEST prSchedScanRequest;
  8830. DEBUGFUNC("wlanoidSetStartSchedScan()");
  8831. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8832. DBGLOG(SCN, WARN, "Fail in set scheduled scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  8833. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8834. return WLAN_STATUS_ADAPTER_NOT_READY;
  8835. }
  8836. ASSERT(pu4SetInfoLen);
  8837. *pu4SetInfoLen = 0;
  8838. if (u4SetBufferLen != sizeof(PARAM_SCHED_SCAN_REQUEST)) {
  8839. return WLAN_STATUS_INVALID_LENGTH;
  8840. } else if (pvSetBuffer == NULL) {
  8841. return WLAN_STATUS_INVALID_DATA;
  8842. } else if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED &&
  8843. prAdapter->fgEnOnlineScan == FALSE) {
  8844. return WLAN_STATUS_FAILURE;
  8845. }
  8846. if (prAdapter->fgIsRadioOff) {
  8847. DBGLOG(SCN, WARN, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  8848. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8849. return WLAN_STATUS_SUCCESS;
  8850. }
  8851. prSchedScanRequest = (P_PARAM_SCHED_SCAN_REQUEST) pvSetBuffer;
  8852. if (scnFsmSchedScanRequest(prAdapter,
  8853. (UINT_8) (prSchedScanRequest->u4SsidNum),
  8854. prSchedScanRequest->arSsid,
  8855. prSchedScanRequest->u4IELength,
  8856. prSchedScanRequest->pucIE, prSchedScanRequest->u2ScanInterval) == TRUE) {
  8857. return WLAN_STATUS_SUCCESS;
  8858. } else {
  8859. return WLAN_STATUS_FAILURE;
  8860. }
  8861. }
  8862. /*----------------------------------------------------------------------------*/
  8863. /*!
  8864. * \brief This routine is called to request termination of schedule scan
  8865. *
  8866. * \param[in] prAdapter Pointer to the Adapter structure.
  8867. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8868. * \param[in] u4SetBufferLen The length of the set buffer.
  8869. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8870. * bytes read from the set buffer. If the call failed
  8871. * due to invalid length of the set buffer, returns
  8872. * the amount of storage needed.
  8873. *
  8874. * \retval WLAN_STATUS_SUCCESS
  8875. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  8876. * \retval WLAN_STATUS_INVALID_LENGTH
  8877. * \retval WLAN_STATUS_INVALID_DATA
  8878. *
  8879. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  8880. */
  8881. /*----------------------------------------------------------------------------*/
  8882. WLAN_STATUS
  8883. wlanoidSetStopSchedScan(IN P_ADAPTER_T prAdapter,
  8884. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8885. {
  8886. ASSERT(prAdapter);
  8887. /* ask SCN module to stop scan request */
  8888. if (scnFsmSchedScanStopRequest(prAdapter) == TRUE)
  8889. return WLAN_STATUS_SUCCESS;
  8890. else
  8891. return WLAN_STATUS_FAILURE;
  8892. }
  8893. /*----------------------------------------------------------------------------*/
  8894. /*!
  8895. * \brief This routine is called to set a periodically scan action
  8896. *
  8897. * \param[in] prAdapter Pointer to the Adapter structure.
  8898. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8899. * \param[in] u4SetBufferLen The length of the set buffer.
  8900. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8901. * bytes read from the set buffer. If the call failed
  8902. * due to invalid length of the set buffer, returns
  8903. * the amount of storage needed.
  8904. *
  8905. * \retval WLAN_STATUS_SUCCESS
  8906. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  8907. * \retval WLAN_STATUS_INVALID_LENGTH
  8908. * \retval WLAN_STATUS_INVALID_DATA
  8909. *
  8910. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  8911. */
  8912. /*----------------------------------------------------------------------------*/
  8913. WLAN_STATUS
  8914. wlanoidSetGSCNAction(IN P_ADAPTER_T prAdapter,
  8915. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8916. {
  8917. P_CMD_SET_PSCAN_ENABLE prCmdPscnAction;
  8918. P_SCAN_INFO_T prScanInfo;
  8919. prScanInfo = &(prAdapter->rWifiVar.rScanInfo);
  8920. DBGLOG(SCN, TRACE, "wlanoidSetGSCNAction\n");
  8921. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8922. DBGLOG(SCN, WARN, "Fail in set Periodically Scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  8923. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8924. return WLAN_STATUS_ADAPTER_NOT_READY;
  8925. }
  8926. if (u4SetBufferLen != sizeof(CMD_SET_PSCAN_ENABLE))
  8927. return WLAN_STATUS_INVALID_LENGTH;
  8928. else if (pvSetBuffer == NULL)
  8929. return WLAN_STATUS_INVALID_DATA;
  8930. if (prAdapter->fgIsRadioOff) {
  8931. DBGLOG(SCN, WARN, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  8932. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8933. return WLAN_STATUS_SUCCESS;
  8934. }
  8935. prCmdPscnAction = (P_CMD_SET_PSCAN_ENABLE) pvSetBuffer;
  8936. if (prCmdPscnAction->ucPscanAct == ENABLE) {
  8937. #if 0
  8938. DBGLOG(OID, INFO, "set PCSN ENABLE\n");
  8939. if (scnFsmPSCNAction(prAdapter, (UINT_8) (prCmdPscnAction->ucPscanAct)) == TRUE) {
  8940. DBGLOG(OID, INFO, "wlanoidSetGSCNAction < ---\n");
  8941. return WLAN_STATUS_PENDING;
  8942. }
  8943. DBGLOG(OID, INFO, "wlanoidSetGSCNAction < ---\n");
  8944. return WLAN_STATUS_FAILURE;
  8945. #endif
  8946. scnPSCNFsm(prAdapter, PSCN_SCANNING, NULL, NULL, NULL, NULL, FALSE, FALSE, FALSE, TRUE);
  8947. } else if (prCmdPscnAction->ucPscanAct == DISABLE) {
  8948. #if 0
  8949. DBGLOG(OID, INFO, "disable PCSN\n");
  8950. scnFsmPSCNAction(prAdapter, (UINT_8) DISABLE);
  8951. DBGLOG(OID, TRACE, "set new PCSN\n");
  8952. scnCombineParamsIntoPSCN(prAdapter, NULL, NULL, NULL, NULL, FALSE, FALSE, TRUE);
  8953. DBGLOG(OID, INFO, "ENABLE or disable PCSN\n");
  8954. if (!prScanInfo->fgPscnOnnning) {
  8955. DBGLOG(OID, INFO, "ENABLE PCSN\n");
  8956. scnFsmPSCNAction(prAdapter, ENABLE);
  8957. } else {
  8958. DBGLOG(OID, INFO, "All PCSN is disabled...\n");
  8959. }
  8960. #endif
  8961. scnPSCNFsm(prAdapter, PSCN_RESET, NULL, NULL, NULL, NULL, FALSE, FALSE, TRUE, FALSE);
  8962. }
  8963. return WLAN_STATUS_SUCCESS;
  8964. }
  8965. /*----------------------------------------------------------------------------*/
  8966. /*!
  8967. * \brief This routine is called to set a periodically scan action
  8968. *
  8969. * \param[in] prAdapter Pointer to the Adapter structure.
  8970. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8971. * \param[in] u4SetBufferLen The length of the set buffer.
  8972. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8973. * bytes read from the set buffer. If the call failed
  8974. * due to invalid length of the set buffer, returns
  8975. * the amount of storage needed.
  8976. *
  8977. * \retval WLAN_STATUS_SUCCESS
  8978. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  8979. * \retval WLAN_STATUS_INVALID_LENGTH
  8980. * \retval WLAN_STATUS_INVALID_DATA
  8981. *
  8982. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  8983. */
  8984. /*----------------------------------------------------------------------------*/
  8985. WLAN_STATUS
  8986. wlanoidSetGSCNAParam(IN P_ADAPTER_T prAdapter,
  8987. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8988. {
  8989. P_PARAM_WIFI_GSCAN_CMD_PARAMS prCmdGscnParam;
  8990. /*UINT_8 i, j = 0;*/
  8991. DBGLOG(SCN, INFO, "wlanoidSetGSCNAParam v1\n");
  8992. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8993. DBGLOG(SCN, WARN, "Fail in set Periodically Scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  8994. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8995. return WLAN_STATUS_ADAPTER_NOT_READY;
  8996. }
  8997. if (u4SetBufferLen != sizeof(PARAM_WIFI_GSCAN_CMD_PARAMS)) {
  8998. DBGLOG(SCN, WARN, "(u4SetBufferLen != sizeof(P_PARAM_WIFI_GSCAN_CMD_PARAMS))\n");
  8999. return WLAN_STATUS_INVALID_LENGTH;
  9000. } else if (pvSetBuffer == NULL) {
  9001. DBGLOG(SCN, WARN, "(pvSetBuffer == NULL)\n");
  9002. return WLAN_STATUS_INVALID_DATA;
  9003. }
  9004. if (prAdapter->fgIsRadioOff) {
  9005. DBGLOG(SCN, INFO, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  9006. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  9007. return WLAN_STATUS_SUCCESS;
  9008. }
  9009. prCmdGscnParam = (P_PARAM_WIFI_GSCAN_CMD_PARAMS) pvSetBuffer;
  9010. /* KC-XXX memcpy(prCmdGscnParam, */
  9011. /* (P_PARAM_WIFI_GSCAN_CMD_PARAMS)pvSetBuffer, */
  9012. /* sizeof(PARAM_WIFI_GSCAN_CMD_PARAMS) ); */
  9013. DBGLOG(SCN, INFO,
  9014. "prCmdGscnParam : base_period[%u], max_ap_per_scan[%u] num_buckets[%u], report_threshold[%u]\n",
  9015. prCmdGscnParam->base_period, prCmdGscnParam->max_ap_per_scan, prCmdGscnParam->num_buckets,
  9016. prCmdGscnParam->report_threshold);
  9017. #if 0
  9018. for (i = 0; i < prCmdGscnParam->num_buckets; i++) {
  9019. DBGLOG(OID, INFO,
  9020. "prCmdGscnParam->buckets : band[%u], bucket[%u] num_buckets[%u], period[%u] report_events[%u]\n",
  9021. prCmdGscnParam->buckets[i].band, prCmdGscnParam->buckets[i].bucket,
  9022. prCmdGscnParam->buckets[i].num_channels, prCmdGscnParam->buckets[i].period,
  9023. prCmdGscnParam->buckets[i].report_events));
  9024. DBGLOG(OID, INFO, "prCmdGscnParam->buckets[%d] has channel: ", i);
  9025. for (j = 0; j < prCmdGscnParam->buckets[i].num_channels; j++)
  9026. DBGLOG(OID, INFO, " %d, ", prCmdGscnParam->buckets[i].channels[j].channel);
  9027. DBGLOG(OID, INFO, "\n");
  9028. }
  9029. #endif
  9030. if (scnSetGSCNParam(prAdapter, prCmdGscnParam) == TRUE) {
  9031. DBGLOG(SCN, INFO, "wlanoidSetGSCNAParam --->scnSetGSCNParam\n");
  9032. return WLAN_STATUS_PENDING;
  9033. } else {
  9034. return WLAN_STATUS_FAILURE;
  9035. }
  9036. }
  9037. /*----------------------------------------------------------------------------*/
  9038. /*!
  9039. * \brief This routine is called to set configure gscan PARAMs
  9040. *
  9041. * \param[in] prAdapter Pointer to the Adapter structure.
  9042. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  9043. * \param[in] u4SetBufferLen The length of the set buffer.
  9044. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9045. * bytes read from the set buffer. If the call failed
  9046. * due to invalid length of the set buffer, returns
  9047. * the amount of storage needed.
  9048. *
  9049. * \retval WLAN_STATUS_SUCCESS
  9050. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  9051. * \retval WLAN_STATUS_INVALID_LENGTH
  9052. * \retval WLAN_STATUS_INVALID_DATA
  9053. *
  9054. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  9055. */
  9056. /*----------------------------------------------------------------------------*/
  9057. WLAN_STATUS
  9058. wlanoidSetGSCNAConfig(IN P_ADAPTER_T prAdapter,
  9059. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9060. {
  9061. P_PARAM_WIFI_GSCAN_CMD_PARAMS prCmdGscnScnConfigParam;
  9062. CMD_GSCN_SCN_COFIG_T rCmdGscnScnConfig;
  9063. DBGLOG(SCN, INFO, "wlanoidSetGSCNAConfig v1\n");
  9064. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  9065. DBGLOG(SCN, WARN, "Fail in set Periodically Scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  9066. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  9067. return WLAN_STATUS_ADAPTER_NOT_READY;
  9068. }
  9069. if (u4SetBufferLen != sizeof(PARAM_WIFI_GSCAN_CMD_PARAMS)) {
  9070. DBGLOG(SCN, WARN, "(u4SetBufferLen != sizeof(CMD_GSCN_SCN_COFIG_T))\n");
  9071. return WLAN_STATUS_INVALID_LENGTH;
  9072. } else if (pvSetBuffer == NULL) {
  9073. DBGLOG(SCN, WARN, "(pvSetBuffer == NULL)\n");
  9074. return WLAN_STATUS_INVALID_DATA;
  9075. }
  9076. if (prAdapter->fgIsRadioOff) {
  9077. DBGLOG(SCN, INFO, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  9078. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  9079. return WLAN_STATUS_SUCCESS;
  9080. }
  9081. DBGLOG(SCN, INFO, "prCmdGscnScnConfigParam = (P_PARAM_WIFI_GSCAN_CMD_PARAMS)pvSetBuffer\n");
  9082. prCmdGscnScnConfigParam = (P_PARAM_WIFI_GSCAN_CMD_PARAMS) pvSetBuffer;
  9083. memcpy(prCmdGscnScnConfigParam, (P_PARAM_WIFI_GSCAN_CMD_PARAMS) pvSetBuffer,
  9084. sizeof(PARAM_WIFI_GSCAN_CMD_PARAMS));
  9085. DBGLOG(SCN, INFO, "prCmdGscnScnConfigParam assign prCmdGscnScnConfig\n");
  9086. rCmdGscnScnConfig.u4BufferThreshold = prCmdGscnScnConfigParam->report_threshold;
  9087. rCmdGscnScnConfig.ucNumApPerScn = prCmdGscnScnConfigParam->max_ap_per_scan;
  9088. rCmdGscnScnConfig.u4NumScnToCache = prCmdGscnScnConfigParam->num_scans;
  9089. DBGLOG(SCN, INFO, " report_threshold %d report_threshold %d num_scans %d\n",
  9090. rCmdGscnScnConfig.u4BufferThreshold,
  9091. rCmdGscnScnConfig.ucNumApPerScn, rCmdGscnScnConfig.u4NumScnToCache);
  9092. if (scnFsmSetGSCNConfig(prAdapter, &rCmdGscnScnConfig) == TRUE) {
  9093. DBGLOG(SCN, INFO, "wlanoidSetGSCNAParam --->scnSetGSCNParam\n");
  9094. return WLAN_STATUS_PENDING;
  9095. } else {
  9096. return WLAN_STATUS_FAILURE;
  9097. }
  9098. }
  9099. /*----------------------------------------------------------------------------*/
  9100. /*!
  9101. * \brief This routine is called to get a gscan result
  9102. *
  9103. * \param[in] prAdapter Pointer to the Adapter structure.
  9104. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  9105. * \param[in] u4SetBufferLen The length of the set buffer.
  9106. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9107. * bytes read from the set buffer. If the call failed
  9108. * due to invalid length of the set buffer, returns
  9109. * the amount of storage needed.
  9110. *
  9111. * \retval WLAN_STATUS_SUCCESS
  9112. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  9113. * \retval WLAN_STATUS_INVALID_LENGTH
  9114. * \retval WLAN_STATUS_INVALID_DATA
  9115. *
  9116. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  9117. */
  9118. /*----------------------------------------------------------------------------*/
  9119. WLAN_STATUS
  9120. wlanoidGetGSCNResult(IN P_ADAPTER_T prAdapter,
  9121. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9122. {
  9123. P_PARAM_WIFI_GSCAN_GET_RESULT_PARAMS prGetGscnScnResultParm;
  9124. CMD_GET_GSCAN_RESULT_T rGetGscnScnResultCmd;
  9125. DEBUGFUNC("wlanoidGetGSCNResult()");
  9126. DBGLOG(SCN, INFO, "wlanoidGetGSCNResult v1\n");
  9127. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  9128. DBGLOG(SCN, WARN, "Fail in set Periodically Scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  9129. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  9130. return WLAN_STATUS_ADAPTER_NOT_READY;
  9131. }
  9132. if (u4SetBufferLen != sizeof(PARAM_WIFI_GSCAN_GET_RESULT_PARAMS)) {
  9133. DBGLOG(SCN, WARN, "(u4SetBufferLen != sizeof(CMD_GSCN_SCN_COFIG_T))\n");
  9134. return WLAN_STATUS_INVALID_LENGTH;
  9135. } else if (pvSetBuffer == NULL) {
  9136. DBGLOG(SCN, WARN, "(pvSetBuffer == NULL)\n");
  9137. return WLAN_STATUS_INVALID_DATA;
  9138. }
  9139. if (prAdapter->fgIsRadioOff) {
  9140. DBGLOG(SCN, INFO, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  9141. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  9142. return WLAN_STATUS_SUCCESS;
  9143. }
  9144. prGetGscnScnResultParm = (P_PARAM_WIFI_GSCAN_GET_RESULT_PARAMS) pvSetBuffer;
  9145. /* memcpy(&rGetGscnScnResultCmd, prGetGscnScnResultParm, sizeof(PARAM_WIFI_GSCAN_GET_RESULT_PARAMS) ); */
  9146. rGetGscnScnResultCmd.u4Num = prGetGscnScnResultParm->get_num;
  9147. rGetGscnScnResultCmd.ucFlush = prGetGscnScnResultParm->flush;
  9148. rGetGscnScnResultCmd.ucVersion = PSCAN_VERSION;
  9149. kalMemZero(rGetGscnScnResultCmd.aucReserved, sizeof(rGetGscnScnResultCmd.aucReserved));
  9150. if (scnFsmGetGSCNResult(prAdapter, &rGetGscnScnResultCmd) == TRUE) {
  9151. DBGLOG(SCN, INFO, "wlanoidGetGSCNResult --->scnFsmGetGSCNResult\n");
  9152. return WLAN_STATUS_PENDING;
  9153. } else {
  9154. return WLAN_STATUS_FAILURE;
  9155. }
  9156. }
  9157. #if CFG_SUPPORT_HOTSPOT_2_0
  9158. /*----------------------------------------------------------------------------*/
  9159. /*!
  9160. * \brief This routine is called by HS2.0 to set the assoc info, which is needed to add to
  9161. * Association request frame while join HS2.0 AP.
  9162. *
  9163. * \param[in] prAdapter Pointer to the Adapter structure
  9164. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  9165. * \param[in] u4SetBufferLen The length of the set buffer
  9166. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9167. * bytes read from the set buffer. If the call failed due to invalid length of
  9168. * the set buffer, returns the amount of storage needed.
  9169. *
  9170. * \retval WLAN_STATUS_SUCCESS
  9171. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  9172. * \retval WLAN_STATUS_INVALID_LENGTH
  9173. *
  9174. */
  9175. /*----------------------------------------------------------------------------*/
  9176. WLAN_STATUS
  9177. wlanoidSetHS20Info(IN P_ADAPTER_T prAdapter,
  9178. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9179. {
  9180. P_IE_HS20_INDICATION_T prHS20IndicationIe;
  9181. ASSERT(prAdapter);
  9182. ASSERT(pvSetBuffer);
  9183. ASSERT(pu4SetInfoLen);
  9184. DEBUGFUNC("wlanoidSetHS20AssocInfo");
  9185. DBGLOG(OID, LOUD, "\r\n");
  9186. if (u4SetBufferLen == 0)
  9187. return WLAN_STATUS_INVALID_LENGTH;
  9188. *pu4SetInfoLen = u4SetBufferLen;
  9189. prHS20IndicationIe = (P_IE_HS20_INDICATION_T) pvSetBuffer;
  9190. prAdapter->prGlueInfo->ucHotspotConfig = prHS20IndicationIe->ucHotspotConfig;
  9191. prAdapter->prGlueInfo->fgConnectHS20AP = TRUE;
  9192. DBGLOG(SEC, TRACE, "HS20 IE sz %u\n", u4SetBufferLen);
  9193. kalMemCopy(prAdapter->prGlueInfo->aucHS20AssocInfoIE, pvSetBuffer, u4SetBufferLen);
  9194. prAdapter->prGlueInfo->u2HS20AssocInfoIELen = (UINT_16) u4SetBufferLen;
  9195. DBGLOG(SEC, TRACE, "HS20 Assoc Info IE sz %u\n", u4SetBufferLen);
  9196. return WLAN_STATUS_SUCCESS;
  9197. }
  9198. /*----------------------------------------------------------------------------*/
  9199. /*!
  9200. * \brief This routine is called by WSC to set the assoc info, which is needed to add to
  9201. * Association request frame while join WPS AP.
  9202. *
  9203. * \param[in] prAdapter Pointer to the Adapter structure
  9204. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  9205. * \param[in] u4SetBufferLen The length of the set buffer
  9206. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9207. * bytes read from the set buffer. If the call failed due to invalid length of
  9208. * the set buffer, returns the amount of storage needed.
  9209. *
  9210. * \retval WLAN_STATUS_SUCCESS
  9211. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  9212. * \retval WLAN_STATUS_INVALID_LENGTH
  9213. *
  9214. */
  9215. /*----------------------------------------------------------------------------*/
  9216. WLAN_STATUS
  9217. wlanoidSetInterworkingInfo(IN P_ADAPTER_T prAdapter,
  9218. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9219. {
  9220. #if 0
  9221. P_HS20_INFO_T prHS20Info = NULL;
  9222. P_IE_INTERWORKING_T prInterWorkingIe;
  9223. ASSERT(prAdapter);
  9224. ASSERT(pvSetBuffer);
  9225. ASSERT(pu4SetInfoLen);
  9226. prHS20Info = &(prAdapter->rWifiVar.rHS20Info);
  9227. DEBUGFUNC("wlanoidSetInterworkingInfo");
  9228. DBGLOG(OID, TRACE, "\r\n");
  9229. if (u4SetBufferLen == 0)
  9230. return WLAN_STATUS_INVALID_LENGTH;
  9231. *pu4SetInfoLen = u4SetBufferLen;
  9232. prInterWorkingIe = (P_IE_INTERWORKING_T) pvSetBuffer;
  9233. prHS20Info->ucAccessNetworkOptions = prInterWorkingIe->ucAccNetOpt;
  9234. prHS20Info->ucVenueGroup = prInterWorkingIe->ucVenueGroup;
  9235. prHS20Info->ucVenueType = prInterWorkingIe->ucVenueType;
  9236. COPY_MAC_ADDR(prHS20Info->aucHESSID, prInterWorkingIe->aucHESSID);
  9237. DBGLOG(SEC, TRACE, "IW IE sz %ld\n", u4SetBufferLen);
  9238. #endif
  9239. return WLAN_STATUS_SUCCESS;
  9240. }
  9241. /*----------------------------------------------------------------------------*/
  9242. /*!
  9243. * \brief This routine is called by WSC to set the Roaming Consortium IE info, which is needed to
  9244. * add to Association request frame while join WPS AP.
  9245. *
  9246. * \param[in] prAdapter Pointer to the Adapter structure
  9247. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  9248. * \param[in] u4SetBufferLen The length of the set buffer
  9249. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9250. * bytes read from the set buffer. If the call failed due to invalid length of
  9251. * the set buffer, returns the amount of storage needed.
  9252. *
  9253. * \retval WLAN_STATUS_SUCCESS
  9254. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  9255. * \retval WLAN_STATUS_INVALID_LENGTH
  9256. *
  9257. */
  9258. /*----------------------------------------------------------------------------*/
  9259. WLAN_STATUS
  9260. wlanoidSetRoamingConsortiumIEInfo(IN P_ADAPTER_T prAdapter,
  9261. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9262. {
  9263. #if 0
  9264. P_HS20_INFO_T prHS20Info = NULL;
  9265. P_PARAM_HS20_ROAMING_CONSORTIUM_INFO prRCInfo;
  9266. ASSERT(prAdapter);
  9267. ASSERT(pvSetBuffer);
  9268. ASSERT(pu4SetInfoLen);
  9269. prHS20Info = &(prAdapter->rWifiVar.rHS20Info);
  9270. /* DEBUGFUNC("wlanoidSetRoamingConsortiumInfo"); */
  9271. /* DBGLOG(HS2, TRACE, ("\r\n")); */
  9272. if (u4SetBufferLen == 0)
  9273. return WLAN_STATUS_INVALID_LENGTH;
  9274. *pu4SetInfoLen = u4SetBufferLen;
  9275. prRCInfo = (P_PARAM_HS20_ROAMING_CONSORTIUM_INFO) pvSetBuffer;
  9276. kalMemCopy(&(prHS20Info->rRCInfo), prRCInfo, sizeof(PARAM_HS20_ROAMING_CONSORTIUM_INFO));
  9277. /* DBGLOG(HS2, TRACE, ("RoamingConsortium IE sz %ld\n", u4SetBufferLen)); */
  9278. #endif
  9279. return WLAN_STATUS_SUCCESS;
  9280. }
  9281. /*----------------------------------------------------------------------------*/
  9282. /*!
  9283. * \brief This routine is called to set_bssid_pool
  9284. *
  9285. * \param[in] prAdapter Pointer to the Adapter structure.
  9286. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  9287. * \param[in] u4SetBufferLen The length of the set buffer.
  9288. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9289. * bytes read from the set buffer. If the call failed
  9290. * due to invalid length of the set buffer, returns
  9291. * the amount of storage needed.
  9292. *
  9293. * \retval WLAN_STATUS_SUCCESS
  9294. * \retval WLAN_STATUS_INVALID_LENGTH
  9295. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  9296. * \retval WLAN_STATUS_MULTICAST_FULL
  9297. */
  9298. /*----------------------------------------------------------------------------*/
  9299. WLAN_STATUS
  9300. wlanoidSetHS20BssidPool(IN P_ADAPTER_T prAdapter,
  9301. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9302. {
  9303. WLAN_STATUS rWlanStatus = WLAN_STATUS_SUCCESS;
  9304. ASSERT(prAdapter);
  9305. ASSERT(pu4SetInfoLen);
  9306. if (u4SetBufferLen)
  9307. ASSERT(pvSetBuffer);
  9308. if (u4SetBufferLen < sizeof(PARAM_HS20_SET_BSSID_POOL)) {
  9309. *pu4SetInfoLen = sizeof(PARAM_HS20_SET_BSSID_POOL);
  9310. return WLAN_STATUS_BUFFER_TOO_SHORT;
  9311. }
  9312. rWlanStatus = hs20SetBssidPool(prAdapter, pvSetBuffer, NETWORK_TYPE_AIS_INDEX);
  9313. return rWlanStatus;
  9314. } /* end of wlanoidSendHS20GASRequest() */
  9315. #endif
  9316. #if CFG_SUPPORT_ROAMING_ENC
  9317. /*----------------------------------------------------------------------------*/
  9318. /*! \brief This routine is called to query the MAC address the NIC is currently using.
  9319. *
  9320. * \param[in] pvAdapter Pointer to the Adapter structure
  9321. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  9322. * query buffer
  9323. * \param[in] u4QueryBufLen The length of the query buffer
  9324. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  9325. * bytes written into the query buffer. If the call
  9326. * failed due to invalid length of the query buffer,
  9327. * returns the amount of storage needed.
  9328. *
  9329. * \retval WLAN_STATUS_SUCCESS
  9330. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  9331. */
  9332. /*----------------------------------------------------------------------------*/
  9333. WLAN_STATUS
  9334. wlanoidSetRoamingInfo(IN P_ADAPTER_T prAdapter,
  9335. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9336. {
  9337. CMD_ROAMING_INFO_T *prCmdRoamingInfo;
  9338. DEBUGFUNC("wlanoidSetRoamingInfo");
  9339. DBGLOG(OID, LOUD, "\n");
  9340. ASSERT(prAdapter);
  9341. ASSERT(pu4SetInfoLen);
  9342. *pu4SetInfoLen = sizeof(CMD_ROAMING_INFO_T);
  9343. if (u4SetBufferLen < sizeof(CMD_ROAMING_INFO_T))
  9344. return WLAN_STATUS_INVALID_LENGTH;
  9345. ASSERT(pvSetBuffer);
  9346. prCmdRoamingInfo = (CMD_ROAMING_INFO_T *) pvSetBuffer;
  9347. return wlanSendSetQueryCmd(prAdapter,
  9348. CMD_ID_SET_ROAMING_INFO,
  9349. TRUE,
  9350. FALSE,
  9351. TRUE,
  9352. nicCmdEventSetCommon,
  9353. nicOidCmdTimeoutCommon,
  9354. sizeof(CMD_ROAMING_INFO_T), (PUINT_8) prCmdRoamingInfo, NULL, 0);
  9355. }
  9356. #endif /* CFG_SUPPORT_ROAMING_ENC */
  9357. /*----------------------------------------------------------------------------*/
  9358. /*!
  9359. * \brief This routine is called to set chip
  9360. *
  9361. * \param[in] prAdapter Pointer to the Adapter structure.
  9362. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  9363. * \param[in] u4SetBufferLen The length of the set buffer.
  9364. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9365. * bytes read from the set buffer. If the call failed
  9366. * due to invalid length of the set buffer, returns
  9367. * the amount of storage needed.
  9368. *
  9369. * \retval WLAN_STATUS_SUCCESS
  9370. * \retval WLAN_STATUS_INVALID_LENGTH
  9371. */
  9372. /*----------------------------------------------------------------------------*/
  9373. WLAN_STATUS
  9374. wlanoidSetChipConfig(IN P_ADAPTER_T prAdapter,
  9375. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9376. {
  9377. P_PARAM_CUSTOM_CHIP_CONFIG_STRUCT_T prChipConfigInfo;
  9378. CMD_CHIP_CONFIG_T rCmdChipConfig;
  9379. WLAN_STATUS rWlanStatus = WLAN_STATUS_SUCCESS;
  9380. DATA_STRUCT_INSPECTING_ASSERT(sizeof(prChipConfigInfo->aucCmd) == CHIP_CONFIG_RESP_SIZE);
  9381. DEBUGFUNC("wlanoidSetChipConfig");
  9382. DBGLOG(OID, LOUD, "\n");
  9383. ASSERT(prAdapter);
  9384. ASSERT(pu4SetInfoLen);
  9385. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_CHIP_CONFIG_STRUCT_T);
  9386. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_CHIP_CONFIG_STRUCT_T))
  9387. return WLAN_STATUS_INVALID_LENGTH;
  9388. ASSERT(pvSetBuffer);
  9389. prChipConfigInfo = (P_PARAM_CUSTOM_CHIP_CONFIG_STRUCT_T) pvSetBuffer;
  9390. kalMemZero(&rCmdChipConfig, sizeof(rCmdChipConfig));
  9391. rCmdChipConfig.u2Id = prChipConfigInfo->u2Id;
  9392. rCmdChipConfig.ucType = prChipConfigInfo->ucType;
  9393. rCmdChipConfig.ucRespType = prChipConfigInfo->ucRespType;
  9394. rCmdChipConfig.u2MsgSize = prChipConfigInfo->u2MsgSize;
  9395. if (rCmdChipConfig.u2MsgSize > CHIP_CONFIG_RESP_SIZE) {
  9396. DBGLOG(OID, INFO, "Chip config Msg Size %u is not valid (set)\n", rCmdChipConfig.u2MsgSize);
  9397. rCmdChipConfig.u2MsgSize = CHIP_CONFIG_RESP_SIZE;
  9398. }
  9399. kalMemCopy(rCmdChipConfig.aucCmd, prChipConfigInfo->aucCmd, rCmdChipConfig.u2MsgSize);
  9400. DBGLOG(OID, TRACE, "rCmdChipConfig.aucCmd=%s\n", rCmdChipConfig.aucCmd);
  9401. #if 1
  9402. rWlanStatus = wlanSendSetQueryCmd(prAdapter,
  9403. CMD_ID_CHIP_CONFIG,
  9404. TRUE,
  9405. FALSE,
  9406. TRUE,
  9407. nicCmdEventSetCommon,
  9408. nicOidCmdTimeoutCommon,
  9409. sizeof(CMD_CHIP_CONFIG_T),
  9410. (PUINT_8) &rCmdChipConfig, pvSetBuffer, u4SetBufferLen);
  9411. #endif
  9412. return rWlanStatus;
  9413. } /* wlanoidSetChipConfig */
  9414. WLAN_STATUS
  9415. wlanoidSetWfdDebugMode(IN P_ADAPTER_T prAdapter,
  9416. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9417. {
  9418. P_CMD_WFD_DEBUG_MODE_INFO_T prCmdWfdDebugModeInfo;
  9419. DEBUGFUNC("wlanoidSetWFDDebugMode");
  9420. DBGLOG(OID, LOUD, "\n");
  9421. ASSERT(prAdapter);
  9422. ASSERT(pu4SetInfoLen);
  9423. *pu4SetInfoLen = sizeof(CMD_WFD_DEBUG_MODE_INFO_T);
  9424. if (u4SetBufferLen < sizeof(CMD_WFD_DEBUG_MODE_INFO_T))
  9425. return WLAN_STATUS_INVALID_LENGTH;
  9426. ASSERT(pvSetBuffer);
  9427. prCmdWfdDebugModeInfo = (CMD_WFD_DEBUG_MODE_INFO_T *) pvSetBuffer;
  9428. DBGLOG(OID, INFO, "New WFD Debug: %d mode and period=0x%x\n", prCmdWfdDebugModeInfo->ucDebugMode,
  9429. prCmdWfdDebugModeInfo->u2PeriodInteval);
  9430. prAdapter->rWifiVar.prP2pFsmInfo->rWfdDebugSetting.ucWfdDebugMode = (UINT_8) prCmdWfdDebugModeInfo->ucDebugMode;
  9431. prAdapter->rWifiVar.prP2pFsmInfo->rWfdDebugSetting.u2WfdSNShowPeiroid =
  9432. (UINT_16) prCmdWfdDebugModeInfo->u2PeriodInteval;
  9433. return WLAN_STATUS_SUCCESS;
  9434. } /*wlanoidSetWfdDebugMode */
  9435. #if (CFG_SUPPORT_TXR_ENC == 1)
  9436. /*----------------------------------------------------------------------------*/
  9437. /*! \brief This routine is called to query the MAC address the NIC is currently using.
  9438. *
  9439. * \param[in] pvAdapter Pointer to the Adapter structure
  9440. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  9441. * query buffer
  9442. * \param[in] u4QueryBufLen The length of the query buffer
  9443. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  9444. * bytes written into the query buffer. If the call
  9445. * failed due to invalid length of the query buffer,
  9446. * returns the amount of storage needed.
  9447. *
  9448. * \retval WLAN_STATUS_SUCCESS
  9449. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  9450. */
  9451. /*----------------------------------------------------------------------------*/
  9452. WLAN_STATUS
  9453. wlanoidSetTxRateInfo(
  9454. IN P_ADAPTER_T prAdapter,
  9455. IN PVOID pvSetBuffer,
  9456. IN UINT_32 u4SetBufferLen,
  9457. OUT PUINT_32 pu4SetInfoLen)
  9458. {
  9459. CMD_RLM_INFO_T *prCmdTxRInfo;
  9460. DEBUGFUNC("wlanoidSetTxRateInfo");
  9461. DBGLOG(OID, LOUD, "\n");
  9462. ASSERT(prAdapter);
  9463. ASSERT(pu4SetInfoLen);
  9464. *pu4SetInfoLen = sizeof(CMD_RLM_INFO_T);
  9465. if (u4SetBufferLen < sizeof(CMD_RLM_INFO_T))
  9466. return WLAN_STATUS_INVALID_LENGTH;
  9467. ASSERT(pvSetBuffer);
  9468. prCmdTxRInfo = (CMD_RLM_INFO_T *)pvSetBuffer;
  9469. DBGLOG(OID, INFO, "<tar_cmd> command = %u %u %u %u %d %u %u\n",
  9470. prCmdTxRInfo->u4Version,
  9471. prCmdTxRInfo->fgIsErrRatioEnhanceApplied,
  9472. prCmdTxRInfo->ucErrRatio2LimitMinRate,
  9473. prCmdTxRInfo->ucMinLegacyRateIdx,
  9474. prCmdTxRInfo->cMinRssiThreshold,
  9475. prCmdTxRInfo->fgIsRtsApplied,
  9476. prCmdTxRInfo->ucRecoverTime));
  9477. return wlanSendSetQueryCmd(prAdapter,
  9478. CMD_ID_TX_AR_ERR_CONFIG,
  9479. TRUE,
  9480. FALSE,
  9481. TRUE,
  9482. nicCmdEventSetCommon,
  9483. nicOidCmdTimeoutCommon,
  9484. sizeof(CMD_RLM_INFO_T),
  9485. (PUINT_8)prCmdTxRInfo,
  9486. NULL,
  9487. 0
  9488. );
  9489. }
  9490. #endif /* CFG_SUPPORT_TXR_ENC */
  9491. WLAN_STATUS
  9492. wlanoidNotifyFwSuspend(IN P_ADAPTER_T prAdapter,
  9493. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9494. {
  9495. WIFI_SYSTEM_SUSPEND_CMD_T rSuspendCmd;
  9496. if (!prAdapter || !pvSetBuffer)
  9497. return WLAN_STATUS_INVALID_DATA;
  9498. rSuspendCmd.fgIsSystemSuspend = *(PBOOLEAN)pvSetBuffer;
  9499. return wlanSendSetQueryCmd(prAdapter,
  9500. CMD_ID_SET_SYSTEM_SUSPEND,
  9501. TRUE,
  9502. FALSE,
  9503. TRUE,
  9504. nicCmdEventSetCommon,
  9505. nicOidCmdTimeoutCommon,
  9506. sizeof(BOOLEAN),
  9507. (PUINT_8)&rSuspendCmd,
  9508. NULL,
  9509. 0);
  9510. }
  9511. #ifdef FW_CFG_SUPPORT
  9512. /*----------------------------------------------------------------------------*/
  9513. /*!
  9514. * \brief This routine is called to query fw cfg info
  9515. *
  9516. * \param[in] pvAdapter Pointer to the Adapter structure.
  9517. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  9518. * the query.
  9519. * \param[in] u4QueryBufferLen The length of the query buffer.
  9520. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  9521. * bytes written into the query buffer. If the call
  9522. * failed due to invalid length of the query buffer,
  9523. * returns the amount of storage needed.
  9524. *
  9525. * \retval WLAN_STATUS_PENDING
  9526. * \retval WLAN_STATUS_FAILURE
  9527. */
  9528. /*----------------------------------------------------------------------------*/
  9529. WLAN_STATUS wlanoidQueryCfgRead(IN P_ADAPTER_T prAdapter,
  9530. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  9531. {
  9532. struct _CMD_HEADER_T *prCmdV1Header = (struct _CMD_HEADER_T *)pvQueryBuffer;
  9533. struct _CMD_HEADER_T cmdV1Header;
  9534. WLAN_STATUS rStatus = WLAN_STATUS_FAILURE;
  9535. ASSERT(prAdapter);
  9536. ASSERT(pu4QueryInfoLen);
  9537. if (u4QueryBufferLen)
  9538. ASSERT(pvQueryBuffer);
  9539. *pu4QueryInfoLen = sizeof(struct _CMD_HEADER_T);
  9540. if (u4QueryBufferLen < sizeof(struct _CMD_HEADER_T))
  9541. return WLAN_STATUS_INVALID_LENGTH;
  9542. kalMemCopy(&cmdV1Header, prCmdV1Header, sizeof(struct _CMD_HEADER_T));
  9543. rStatus = wlanSendSetQueryCmd(
  9544. prAdapter,
  9545. CMD_ID_GET_SET_CUSTOMER_CFG,
  9546. FALSE,
  9547. TRUE,
  9548. TRUE,
  9549. nicCmdEventQueryCfgRead,
  9550. nicCmdTimeoutCommon,
  9551. sizeof(struct _CMD_HEADER_T),
  9552. (PUINT_8) &cmdV1Header,
  9553. pvQueryBuffer,
  9554. u4QueryBufferLen);
  9555. return rStatus;
  9556. }
  9557. #endif