wlan_oid.c 382 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065606660676068606960706071607260736074607560766077607860796080608160826083608460856086608760886089609060916092609360946095609660976098609961006101610261036104610561066107610861096110611161126113611461156116611761186119612061216122612361246125612661276128612961306131613261336134613561366137613861396140614161426143614461456146614761486149615061516152615361546155615661576158615961606161616261636164616561666167616861696170617161726173617461756176617761786179618061816182618361846185618661876188618961906191619261936194619561966197619861996200620162026203620462056206620762086209621062116212621362146215621662176218621962206221622262236224622562266227622862296230623162326233623462356236623762386239624062416242624362446245624662476248624962506251625262536254625562566257625862596260626162626263626462656266626762686269627062716272627362746275627662776278627962806281628262836284628562866287628862896290629162926293629462956296629762986299630063016302630363046305630663076308630963106311631263136314631563166317631863196320632163226323632463256326632763286329633063316332633363346335633663376338633963406341634263436344634563466347634863496350635163526353635463556356635763586359636063616362636363646365636663676368636963706371637263736374637563766377637863796380638163826383638463856386638763886389639063916392639363946395639663976398639964006401640264036404640564066407640864096410641164126413641464156416641764186419642064216422642364246425642664276428642964306431643264336434643564366437643864396440644164426443644464456446644764486449645064516452645364546455645664576458645964606461646264636464646564666467646864696470647164726473647464756476647764786479648064816482648364846485648664876488648964906491649264936494649564966497649864996500650165026503650465056506650765086509651065116512651365146515651665176518651965206521652265236524652565266527652865296530653165326533653465356536653765386539654065416542654365446545654665476548654965506551655265536554655565566557655865596560656165626563656465656566656765686569657065716572657365746575657665776578657965806581658265836584658565866587658865896590659165926593659465956596659765986599660066016602660366046605660666076608660966106611661266136614661566166617661866196620662166226623662466256626662766286629663066316632663366346635663666376638663966406641664266436644664566466647664866496650665166526653665466556656665766586659666066616662666366646665666666676668666966706671667266736674667566766677667866796680668166826683668466856686668766886689669066916692669366946695669666976698669967006701670267036704670567066707670867096710671167126713671467156716671767186719672067216722672367246725672667276728672967306731673267336734673567366737673867396740674167426743674467456746674767486749675067516752675367546755675667576758675967606761676267636764676567666767676867696770677167726773677467756776677767786779678067816782678367846785678667876788678967906791679267936794679567966797679867996800680168026803680468056806680768086809681068116812681368146815681668176818681968206821682268236824682568266827682868296830683168326833683468356836683768386839684068416842684368446845684668476848684968506851685268536854685568566857685868596860686168626863686468656866686768686869687068716872687368746875687668776878687968806881688268836884688568866887688868896890689168926893689468956896689768986899690069016902690369046905690669076908690969106911691269136914691569166917691869196920692169226923692469256926692769286929693069316932693369346935693669376938693969406941694269436944694569466947694869496950695169526953695469556956695769586959696069616962696369646965696669676968696969706971697269736974697569766977697869796980698169826983698469856986698769886989699069916992699369946995699669976998699970007001700270037004700570067007700870097010701170127013701470157016701770187019702070217022702370247025702670277028702970307031703270337034703570367037703870397040704170427043704470457046704770487049705070517052705370547055705670577058705970607061706270637064706570667067706870697070707170727073707470757076707770787079708070817082708370847085708670877088708970907091709270937094709570967097709870997100710171027103710471057106710771087109711071117112711371147115711671177118711971207121712271237124712571267127712871297130713171327133713471357136713771387139714071417142714371447145714671477148714971507151715271537154715571567157715871597160716171627163716471657166716771687169717071717172717371747175717671777178717971807181718271837184718571867187718871897190719171927193719471957196719771987199720072017202720372047205720672077208720972107211721272137214721572167217721872197220722172227223722472257226722772287229723072317232723372347235723672377238723972407241724272437244724572467247724872497250725172527253725472557256725772587259726072617262726372647265726672677268726972707271727272737274727572767277727872797280728172827283728472857286728772887289729072917292729372947295729672977298729973007301730273037304730573067307730873097310731173127313731473157316731773187319732073217322732373247325732673277328732973307331733273337334733573367337733873397340734173427343734473457346734773487349735073517352735373547355735673577358735973607361736273637364736573667367736873697370737173727373737473757376737773787379738073817382738373847385738673877388738973907391739273937394739573967397739873997400740174027403740474057406740774087409741074117412741374147415741674177418741974207421742274237424742574267427742874297430743174327433743474357436743774387439744074417442744374447445744674477448744974507451745274537454745574567457745874597460746174627463746474657466746774687469747074717472747374747475747674777478747974807481748274837484748574867487748874897490749174927493749474957496749774987499750075017502750375047505750675077508750975107511751275137514751575167517751875197520752175227523752475257526752775287529753075317532753375347535753675377538753975407541754275437544754575467547754875497550755175527553755475557556755775587559756075617562756375647565756675677568756975707571757275737574757575767577757875797580758175827583758475857586758775887589759075917592759375947595759675977598759976007601760276037604760576067607760876097610761176127613761476157616761776187619762076217622762376247625762676277628762976307631763276337634763576367637763876397640764176427643764476457646764776487649765076517652765376547655765676577658765976607661766276637664766576667667766876697670767176727673767476757676767776787679768076817682768376847685768676877688768976907691769276937694769576967697769876997700770177027703770477057706770777087709771077117712771377147715771677177718771977207721772277237724772577267727772877297730773177327733773477357736773777387739774077417742774377447745774677477748774977507751775277537754775577567757775877597760776177627763776477657766776777687769777077717772777377747775777677777778777977807781778277837784778577867787778877897790779177927793779477957796779777987799780078017802780378047805780678077808780978107811781278137814781578167817781878197820782178227823782478257826782778287829783078317832783378347835783678377838783978407841784278437844784578467847784878497850785178527853785478557856785778587859786078617862786378647865786678677868786978707871787278737874787578767877787878797880788178827883788478857886788778887889789078917892789378947895789678977898789979007901790279037904790579067907790879097910791179127913791479157916791779187919792079217922792379247925792679277928792979307931793279337934793579367937793879397940794179427943794479457946794779487949795079517952795379547955795679577958795979607961796279637964796579667967796879697970797179727973797479757976797779787979798079817982798379847985798679877988798979907991799279937994799579967997799879998000800180028003800480058006800780088009801080118012801380148015801680178018801980208021802280238024802580268027802880298030803180328033803480358036803780388039804080418042804380448045804680478048804980508051805280538054805580568057805880598060806180628063806480658066806780688069807080718072807380748075807680778078807980808081808280838084808580868087808880898090809180928093809480958096809780988099810081018102810381048105810681078108810981108111811281138114811581168117811881198120812181228123812481258126812781288129813081318132813381348135813681378138813981408141814281438144814581468147814881498150815181528153815481558156815781588159816081618162816381648165816681678168816981708171817281738174817581768177817881798180818181828183818481858186818781888189819081918192819381948195819681978198819982008201820282038204820582068207820882098210821182128213821482158216821782188219822082218222822382248225822682278228822982308231823282338234823582368237823882398240824182428243824482458246824782488249825082518252825382548255825682578258825982608261826282638264826582668267826882698270827182728273827482758276827782788279828082818282828382848285828682878288828982908291829282938294829582968297829882998300830183028303830483058306830783088309831083118312831383148315831683178318831983208321832283238324832583268327832883298330833183328333833483358336833783388339834083418342834383448345834683478348834983508351835283538354835583568357835883598360836183628363836483658366836783688369837083718372837383748375837683778378837983808381838283838384838583868387838883898390839183928393839483958396839783988399840084018402840384048405840684078408840984108411841284138414841584168417841884198420842184228423842484258426842784288429843084318432843384348435843684378438843984408441844284438444844584468447844884498450845184528453845484558456845784588459846084618462846384648465846684678468846984708471847284738474847584768477847884798480848184828483848484858486848784888489849084918492849384948495849684978498849985008501850285038504850585068507850885098510851185128513851485158516851785188519852085218522852385248525852685278528852985308531853285338534853585368537853885398540854185428543854485458546854785488549855085518552855385548555855685578558855985608561856285638564856585668567856885698570857185728573857485758576857785788579858085818582858385848585858685878588858985908591859285938594859585968597859885998600860186028603860486058606860786088609861086118612861386148615861686178618861986208621862286238624862586268627862886298630863186328633863486358636863786388639864086418642864386448645864686478648864986508651865286538654865586568657865886598660866186628663866486658666866786688669867086718672867386748675867686778678867986808681868286838684868586868687868886898690869186928693869486958696869786988699870087018702870387048705870687078708870987108711871287138714871587168717871887198720872187228723872487258726872787288729873087318732873387348735873687378738873987408741874287438744874587468747874887498750875187528753875487558756875787588759876087618762876387648765876687678768876987708771877287738774877587768777877887798780878187828783878487858786878787888789879087918792879387948795879687978798879988008801880288038804880588068807880888098810881188128813881488158816881788188819882088218822882388248825882688278828882988308831883288338834883588368837883888398840884188428843884488458846884788488849885088518852885388548855885688578858885988608861886288638864886588668867886888698870887188728873887488758876887788788879888088818882888388848885888688878888888988908891889288938894889588968897889888998900890189028903890489058906890789088909891089118912891389148915891689178918891989208921892289238924892589268927892889298930893189328933893489358936893789388939894089418942894389448945894689478948894989508951895289538954895589568957895889598960896189628963896489658966896789688969897089718972897389748975897689778978897989808981898289838984898589868987898889898990899189928993899489958996899789988999900090019002900390049005900690079008900990109011901290139014901590169017901890199020902190229023902490259026902790289029903090319032903390349035903690379038903990409041904290439044904590469047904890499050905190529053905490559056905790589059906090619062906390649065906690679068906990709071907290739074907590769077907890799080908190829083908490859086908790889089909090919092909390949095909690979098909991009101910291039104910591069107910891099110911191129113911491159116911791189119912091219122912391249125912691279128912991309131913291339134913591369137913891399140914191429143914491459146914791489149915091519152915391549155915691579158915991609161916291639164916591669167916891699170917191729173917491759176917791789179918091819182918391849185918691879188918991909191919291939194919591969197919891999200920192029203920492059206920792089209921092119212921392149215921692179218921992209221922292239224922592269227922892299230923192329233923492359236923792389239924092419242924392449245924692479248924992509251925292539254925592569257925892599260926192629263926492659266926792689269927092719272927392749275927692779278927992809281928292839284928592869287928892899290929192929293929492959296929792989299930093019302930393049305930693079308930993109311931293139314931593169317931893199320932193229323932493259326932793289329933093319332933393349335933693379338933993409341934293439344934593469347934893499350935193529353935493559356935793589359936093619362936393649365936693679368936993709371937293739374937593769377937893799380938193829383938493859386938793889389939093919392939393949395939693979398939994009401940294039404940594069407940894099410941194129413941494159416941794189419942094219422942394249425942694279428942994309431943294339434943594369437943894399440944194429443944494459446944794489449945094519452945394549455945694579458945994609461946294639464946594669467946894699470947194729473947494759476947794789479948094819482948394849485948694879488948994909491949294939494949594969497949894999500950195029503950495059506950795089509951095119512951395149515951695179518951995209521952295239524952595269527952895299530953195329533953495359536953795389539954095419542954395449545954695479548954995509551955295539554955595569557955895599560956195629563956495659566956795689569957095719572957395749575957695779578957995809581958295839584958595869587958895899590959195929593959495959596959795989599960096019602960396049605960696079608960996109611961296139614961596169617961896199620962196229623962496259626962796289629963096319632963396349635963696379638963996409641964296439644964596469647964896499650965196529653965496559656965796589659966096619662966396649665966696679668966996709671967296739674967596769677967896799680968196829683968496859686968796889689969096919692969396949695969696979698969997009701970297039704970597069707970897099710971197129713971497159716971797189719972097219722972397249725972697279728972997309731973297339734973597369737973897399740974197429743974497459746974797489749975097519752975397549755975697579758975997609761976297639764976597669767976897699770977197729773977497759776977797789779978097819782978397849785978697879788978997909791979297939794979597969797979897999800980198029803980498059806980798089809981098119812981398149815981698179818981998209821982298239824982598269827982898299830983198329833983498359836983798389839984098419842984398449845984698479848984998509851985298539854985598569857985898599860986198629863986498659866986798689869987098719872987398749875987698779878987998809881988298839884988598869887988898899890989198929893989498959896989798989899990099019902990399049905990699079908990999109911991299139914991599169917991899199920992199229923992499259926992799289929993099319932993399349935993699379938993999409941994299439944994599469947994899499950995199529953995499559956995799589959996099619962996399649965996699679968996999709971997299739974997599769977997899799980998199829983998499859986998799889989999099919992999399949995999699979998999910000100011000210003100041000510006100071000810009100101001110012100131001410015100161001710018100191002010021100221002310024100251002610027100281002910030100311003210033100341003510036100371003810039100401004110042100431004410045100461004710048100491005010051100521005310054100551005610057100581005910060100611006210063100641006510066100671006810069100701007110072100731007410075100761007710078100791008010081100821008310084100851008610087100881008910090100911009210093100941009510096100971009810099101001010110102101031010410105101061010710108101091011010111101121011310114101151011610117101181011910120101211012210123101241012510126101271012810129101301013110132101331013410135101361013710138101391014010141101421014310144101451014610147101481014910150101511015210153101541015510156101571015810159101601016110162101631016410165101661016710168101691017010171101721017310174101751017610177101781017910180101811018210183101841018510186101871018810189101901019110192101931019410195101961019710198101991020010201102021020310204102051020610207102081020910210102111021210213102141021510216102171021810219102201022110222102231022410225102261022710228102291023010231102321023310234102351023610237102381023910240102411024210243102441024510246102471024810249102501025110252102531025410255102561025710258102591026010261102621026310264102651026610267102681026910270102711027210273102741027510276102771027810279102801028110282102831028410285102861028710288102891029010291102921029310294102951029610297102981029910300103011030210303103041030510306103071030810309103101031110312103131031410315103161031710318103191032010321103221032310324103251032610327103281032910330103311033210333103341033510336103371033810339103401034110342103431034410345103461034710348103491035010351103521035310354103551035610357103581035910360103611036210363103641036510366103671036810369103701037110372103731037410375103761037710378103791038010381103821038310384103851038610387103881038910390103911039210393103941039510396103971039810399104001040110402104031040410405104061040710408104091041010411104121041310414104151041610417104181041910420104211042210423104241042510426104271042810429104301043110432104331043410435104361043710438104391044010441104421044310444104451044610447104481044910450104511045210453104541045510456104571045810459104601046110462104631046410465104661046710468104691047010471104721047310474104751047610477104781047910480104811048210483104841048510486104871048810489104901049110492104931049410495104961049710498104991050010501105021050310504105051050610507105081050910510105111051210513105141051510516105171051810519105201052110522105231052410525105261052710528105291053010531105321053310534105351053610537105381053910540105411054210543105441054510546105471054810549105501055110552105531055410555105561055710558105591056010561105621056310564105651056610567105681056910570105711057210573105741057510576105771057810579105801058110582105831058410585105861058710588105891059010591105921059310594105951059610597105981059910600106011060210603106041060510606106071060810609106101061110612106131061410615106161061710618106191062010621106221062310624106251062610627106281062910630106311063210633106341063510636106371063810639106401064110642106431064410645106461064710648106491065010651106521065310654106551065610657106581065910660106611066210663106641066510666106671066810669106701067110672106731067410675106761067710678106791068010681106821068310684106851068610687106881068910690106911069210693106941069510696106971069810699107001070110702107031070410705107061070710708107091071010711107121071310714107151071610717107181071910720107211072210723107241072510726107271072810729107301073110732107331073410735107361073710738107391074010741107421074310744107451074610747107481074910750107511075210753107541075510756107571075810759107601076110762107631076410765107661076710768107691077010771107721077310774107751077610777107781077910780107811078210783107841078510786107871078810789107901079110792107931079410795107961079710798107991080010801108021080310804108051080610807108081080910810108111081210813108141081510816108171081810819108201082110822108231082410825108261082710828108291083010831108321083310834108351083610837108381083910840108411084210843108441084510846108471084810849108501085110852108531085410855108561085710858108591086010861108621086310864108651086610867108681086910870108711087210873108741087510876108771087810879108801088110882108831088410885108861088710888108891089010891108921089310894108951089610897108981089910900109011090210903109041090510906109071090810909109101091110912109131091410915109161091710918109191092010921109221092310924109251092610927109281092910930109311093210933109341093510936109371093810939109401094110942109431094410945109461094710948109491095010951109521095310954109551095610957109581095910960109611096210963109641096510966109671096810969109701097110972109731097410975109761097710978109791098010981109821098310984109851098610987109881098910990109911099210993109941099510996109971099810999110001100111002110031100411005110061100711008110091101011011110121101311014110151101611017110181101911020110211102211023110241102511026110271102811029110301103111032110331103411035110361103711038110391104011041110421104311044110451104611047110481104911050110511105211053110541105511056110571105811059
  1. /*
  2. ** Id: //Department/DaVinci/BRANCHES/MT6620_WIFI_DRIVER_V2_3/common/wlan_oid.c#5
  3. */
  4. /*! \file wlanoid.c
  5. \brief This file contains the WLAN OID processing routines of Windows driver for
  6. MediaTek Inc. 802.11 Wireless LAN Adapters.
  7. */
  8. /*
  9. ** Log: wlan_oid.c
  10. **
  11. ** 09 05 2013 cp.wu
  12. ** isolate logic regarding roaming & reassociation
  13. **
  14. ** 09 03 2013 cp.wu
  15. ** add path for reassociation
  16. **
  17. ** 09 02 2013 cp.wu
  18. ** add path to handle reassociation request
  19. **
  20. ** 07 19 2012 yuche.tsai
  21. ** NULL
  22. ** Code update for JB.
  23. *
  24. * 07 17 2012 yuche.tsai
  25. * NULL
  26. * Let netdev bring up.
  27. *
  28. * 07 17 2012 yuche.tsai
  29. * NULL
  30. * Compile no error before trial run.
  31. *
  32. * 03 02 2012 terry.wu
  33. * NULL
  34. * Sync CFG80211 modification from branch 2,2.
  35. *
  36. * 01 06 2012 wh.su
  37. * [WCXRP00001153] [MT6620 Wi-Fi][Driver] Adding the get_ch_list and set_tx_power proto type function
  38. * using the wlanSendSetQueryCmd to set the tx power control cmd.
  39. *
  40. * 01 06 2012 wh.su
  41. * [WCXRP00001153] [MT6620 Wi-Fi][Driver] Adding the get_ch_list and set_tx_power proto type function
  42. * change the set tx power cmd name.
  43. *
  44. * 01 05 2012 wh.su
  45. * [WCXRP00001153] [MT6620 Wi-Fi][Driver] Adding the get_ch_list and set_tx_power proto type function
  46. * Adding the related ioctl / wlan oid function to set the Tx power cfg.
  47. *
  48. * 12 20 2011 cp.wu
  49. * [WCXRP00001144] [MT6620 Wi-Fi][Driver][Firmware] Add RF_FUNC_ID for exposing device and related version information
  50. * add driver implementations for RF_AT_FUNCID_FW_INFO & RF_AT_FUNCID_DRV_INFO
  51. * to expose version information
  52. *
  53. * 12 05 2011 cp.wu
  54. * [WCXRP00001131] [MT6620 Wi-Fi][Driver][AIS] Implement connect-by-BSSID path
  55. * add CONNECT_BY_BSSID policy
  56. *
  57. * 11 22 2011 cp.wu
  58. * [WCXRP00001120] [MT6620 Wi-Fi][Driver] Modify roaming to AIS state transition from synchronous to
  59. * asynchronous approach to avoid incomplete state termination
  60. * 1. change RDD related compile option brace position.
  61. * 2. when roaming is triggered, ask AIS to transit immediately only when AIS is in Normal TR state
  62. * without join timeout timer ticking
  63. * 3. otherwise, insert AIS_REQUEST into pending request queue
  64. *
  65. * 11 21 2011 cp.wu
  66. * [WCXRP00001118] [MT6620 Wi-Fi][Driver] Corner case protections to pass Monkey testing
  67. * 1. wlanoidQueryBssIdList might be passed with a non-zero length but a NULL pointer of buffer
  68. * add more checking for such cases
  69. *
  70. * 2. kalSendComplete() might be invoked with a packet belongs to P2P network right after P2P is unregistered.
  71. * add some tweaking to protect such cases because that net device has become invalid.
  72. *
  73. * 11 15 2011 cm.chang
  74. * NULL
  75. * Fix compiling warning
  76. *
  77. * 11 11 2011 wh.su
  78. * [WCXRP00001078] [MT6620 Wi-Fi][Driver] Adding the mediatek log improment support : XLOG
  79. * modify the xlog related code.
  80. *
  81. * 11 11 2011 tsaiyuan.hsu
  82. * [WCXRP00001083] [MT6620 Wi-Fi][DRV]] dump debug counter or frames when debugging is triggered
  83. * add debug counters of bb and ar for xlog.
  84. *
  85. * 11 10 2011 wh.su
  86. * [WCXRP00001078] [MT6620 Wi-Fi][Driver] Adding the mediatek log improment support : XLOG
  87. * change the debug module level.
  88. *
  89. * 11 09 2011 george.huang
  90. * [WCXRP00000871] [MT6620 Wi-Fi][FW] Include additional wakeup condition, which is by
  91. * consequent DTIM unicast indication add XLOG for Set PS mode entry
  92. *
  93. * 11 08 2011 tsaiyuan.hsu
  94. * [WCXRP00001083] [MT6620 Wi-Fi][DRV]] dump debug counter or frames when debugging is triggered
  95. * check if CFG_SUPPORT_SWCR is defined to aoid compiler error.
  96. *
  97. * 11 07 2011 tsaiyuan.hsu
  98. * [WCXRP00001083] [MT6620 Wi-Fi][DRV]] dump debug counter or frames when debugging is triggered
  99. * add debug counters and periodically dump counters for debugging.
  100. *
  101. * 11 03 2011 wh.su
  102. * [WCXRP00001078] [MT6620 Wi-Fi][Driver] Adding the mediatek log improment support : XLOG
  103. * change the DBGLOG for "\n" and "\r\n". LABEL to LOUD for XLOG
  104. *
  105. * 11 02 2011 chinghwa.yu
  106. * [WCXRP00000612] [MT6620 Wi-Fi] [FW] CSD update SWRDD algorithm
  107. * Add RDD certification features.
  108. *
  109. * 10 21 2011 eddie.chen
  110. * [WCXRP00001051] [MT6620 Wi-Fi][Driver/Fw] Adjust the STA aging timeout
  111. * Add switch to ignore the STA aging timeout.
  112. *
  113. * 10 12 2011 wh.su
  114. * [WCXRP00001036] [MT6620 Wi-Fi][Driver][FW] Adding the 802.11w code for MFP
  115. * adding the 802.11w related function and define .
  116. *
  117. * 09 15 2011 tsaiyuan.hsu
  118. * [WCXRP00000938] [MT6620 Wi-Fi][FW] add system config for CTIA
  119. * correct fifo full control from query to set operation for CTIA.
  120. *
  121. * 08 31 2011 cm.chang
  122. * [WCXRP00000969] [MT6620 Wi-Fi][Driver][FW] Channel list for 5G band based on country code
  123. * .
  124. *
  125. * 08 17 2011 tsaiyuan.hsu
  126. * [WCXRP00000938] [MT6620 Wi-Fi][FW] add system config for CTIA
  127. * add system config for CTIA.
  128. *
  129. * 08 15 2011 george.huang
  130. * [MT6620 Wi-Fi][FW] handle TSF drift for connection detection
  131. * .
  132. *
  133. * 07 28 2011 chinghwa.yu
  134. * [WCXRP00000063] Update BCM CoEx design and settings
  135. * Add BWCS cmd and event.
  136. *
  137. * 07 18 2011 chinghwa.yu
  138. * [WCXRP00000063] Update BCM CoEx design and settings[WCXRP00000612] [MT6620 Wi-Fi] [FW] CSD update SWRDD algorithm
  139. * Add CMD/Event for RDD and BWCS.
  140. *
  141. * 07 11 2011 wh.su
  142. * [WCXRP00000849] [MT6620 Wi-Fi][Driver] Remove some of the WAPI define for make sure the value is initialize,
  143. * for customer not enable WAPI
  144. * For make sure wapi initial value is set.
  145. *
  146. * 06 23 2011 cp.wu
  147. * [WCXRP00000812] [MT6620 Wi-Fi][Driver] not show NVRAM when there is no valid MAC address in NVRAM content
  148. * check with firmware for valid MAC address.
  149. *
  150. * 05 02 2011 eddie.chen
  151. * [WCXRP00000373] [MT6620 Wi-Fi][FW] SW debug control
  152. * Fix compile warning.
  153. *
  154. * 04 29 2011 george.huang
  155. * [WCXRP00000684] [MT6620 Wi-Fi][Driver] Support P2P setting ARP filter
  156. * .
  157. *
  158. * 04 27 2011 george.huang
  159. * [WCXRP00000684] [MT6620 Wi-Fi][Driver] Support P2P setting ARP filter
  160. * add more debug message
  161. *
  162. * 04 26 2011 eddie.chen
  163. * [WCXRP00000373] [MT6620 Wi-Fi][FW] SW debug control
  164. * Add rx path profiling.
  165. *
  166. * 04 12 2011 eddie.chen
  167. * [WCXRP00000617] [MT6620 Wi-Fi][DRV/FW] Fix for sigma
  168. * Fix the sta index in processing security frame
  169. * Simple flow control for TC4 to avoid mgt frames for PS STA to occupy the TC4
  170. * Add debug message.
  171. *
  172. * 04 08 2011 george.huang
  173. * [WCXRP00000621] [MT6620 Wi-Fi][Driver] Support P2P supplicant to set power mode
  174. * separate settings of P2P and AIS
  175. *
  176. * 03 31 2011 puff.wen
  177. * NULL
  178. * .
  179. *
  180. * 03 29 2011 puff.wen
  181. * NULL
  182. * Add chennel switch for stress test
  183. *
  184. * 03 29 2011 cp.wu
  185. * [WCXRP00000604] [MT6620 Wi-Fi][Driver] Surpress Klockwork Warning
  186. * surpress klock warning with code path rewritten
  187. *
  188. * 03 24 2011 wh.su
  189. * [WCXRP00000595] [MT6620 Wi-Fi][Driver] at CTIA indicate disconnect to make the ps profile can apply
  190. * use disconnect event instead of ais abort for CTIA testing.
  191. *
  192. * 03 23 2011 george.huang
  193. * [WCXRP00000586] [MT6620 Wi-Fi][FW] Modify for blocking absence request right after connected
  194. * revise for CTIA power mode setting
  195. *
  196. * 03 22 2011 george.huang
  197. * [WCXRP00000504] [MT6620 Wi-Fi][FW] Support Sigma CAPI for power saving related command
  198. * link with supplicant commands
  199. *
  200. * 03 17 2011 chinglan.wang
  201. * [WCXRP00000570] [MT6620 Wi-Fi][Driver] Add Wi-Fi Protected Setup v2.0 feature
  202. * .
  203. *
  204. * 03 17 2011 yarco.yang
  205. * [WCXRP00000569] [MT6620 Wi-Fi][F/W][Driver] Set multicast address support current network usage
  206. * .
  207. *
  208. * 03 15 2011 george.huang
  209. * [WCXRP00000557] [MT6620 Wi-Fi] Support current consumption test mode commands
  210. * Support current consumption measurement mode command
  211. *
  212. * 03 15 2011 eddie.chen
  213. * [WCXRP00000554] [MT6620 Wi-Fi][DRV] Add sw control debug counter
  214. * Add sw debug counter for QM.
  215. *
  216. * 03 10 2011 cp.wu
  217. * [WCXRP00000532] [MT6620 Wi-Fi][Driver] Migrate NVRAM configuration procedures from MT6620 E2 to MT6620 E3
  218. * deprecate configuration used by MT6620 E2
  219. *
  220. * 03 07 2011 terry.wu
  221. * [WCXRP00000521] [MT6620 Wi-Fi][Driver] Remove non-standard debug message
  222. * Toggle non-standard debug messages to comments.
  223. *
  224. * 03 04 2011 cp.wu
  225. * [WCXRP00000515] [MT6620 Wi-Fi][Driver] Surpress compiler warning which is identified by GNU compiler collection
  226. * surpress compile warning occurred when compiled by GNU compiler collection.
  227. *
  228. * 03 03 2011 wh.su
  229. * [WCXRP00000510] [MT6620 Wi-Fi] [Driver] Fixed the CTIA enter test mode issue
  230. * fixed the enter ctia test mode issue.
  231. *
  232. * 03 02 2011 george.huang
  233. * [WCXRP00000504] [MT6620 Wi-Fi][FW] Support Sigma CAPI for power saving related command
  234. * Update sigma CAPI for U-APSD setting
  235. *
  236. * 03 02 2011 george.huang
  237. * [WCXRP00000504] [MT6620 Wi-Fi][FW] Support Sigma CAPI for power saving related command
  238. * Support UAPSD/OppPS/NoA parameter setting
  239. *
  240. * 03 02 2011 cp.wu
  241. * [WCXRP00000503] [MT6620 Wi-Fi][Driver] Take RCPI brought by association response as
  242. * initial RSSI right after connection is built.
  243. * use RCPI brought by ASSOC-RESP after connection is built as initial RCPI to avoid using a uninitialized MAC-RX RCPI.
  244. *
  245. * 01 27 2011 george.huang
  246. * [WCXRP00000400] [MT6620 Wi-Fi] support CTIA power mode setting
  247. * Support CTIA power mode setting.
  248. *
  249. * 01 26 2011 wh.su
  250. * [WCXRP00000396] [MT6620 Wi-Fi][Driver] Support Sw Ctrl ioctl at linux
  251. * adding the SW cmd ioctl support, use set/get structure ioctl.
  252. *
  253. * 01 25 2011 cp.wu
  254. * [WCXRP00000394] [MT6620 Wi-Fi][Driver] Count space needed for generating error message in
  255. * scanning list into buffer size checking
  256. * when doing size prechecking, check illegal MAC address as well
  257. *
  258. * 01 20 2011 eddie.chen
  259. * [WCXRP00000374] [MT6620 Wi-Fi][DRV] SW debug control
  260. * Add Oid for sw control debug command
  261. *
  262. * 01 15 2011 puff.wen
  263. * NULL
  264. * Add Stress test
  265. *
  266. * 01 12 2011 cp.wu
  267. * [WCXRP00000358] [MT6620 Wi-Fi][Driver] Provide concurrent information for each module
  268. * check if allow to switch to IBSS mode via concurrent module before setting to IBSS mode
  269. *
  270. * 01 12 2011 cm.chang
  271. * [WCXRP00000354] [MT6620 Wi-Fi][Driver][FW] Follow NVRAM bandwidth setting
  272. * User-defined bandwidth is for 2.4G and 5G individually
  273. *
  274. * 01 04 2011 cp.wu
  275. * [WCXRP00000342] [MT6620 Wi-Fi][Driver] show error code in scanning list when MAC address is not
  276. * correctly configured in NVRAM
  277. * show error code 0x10 when MAC address in NVRAM is not configured correctly.
  278. *
  279. * 01 04 2011 cp.wu
  280. * [WCXRP00000338] [MT6620 Wi-Fi][Driver] Separate kalMemAlloc into kmalloc and vmalloc implementations
  281. * to ease physically continuous memory demands
  282. * separate kalMemAlloc() into virtually-continuous and physically-continuous type to ease slab system pressure
  283. *
  284. * 12 28 2010 george.huang
  285. * [WCXRP00000232] [MT5931 Wi-Fi][FW] Modifications for updated HW power on sequence and related design
  286. * support WMM-PS U-APSD AC assignment.
  287. *
  288. * 12 28 2010 cp.wu
  289. * [WCXRP00000269] [MT6620 Wi-Fi][Driver][Firmware] Prepare for v1.1 branch release
  290. * report EEPROM used flag via NIC_CAPABILITY
  291. *
  292. * 12 28 2010 cp.wu
  293. * [WCXRP00000269] [MT6620 Wi-Fi][Driver][Firmware] Prepare for v1.1 branch release
  294. * integrate with 'EEPROM used' flag for reporting correct capability to Engineer Mode/META and other tools
  295. *
  296. * 12 16 2010 cp.wu
  297. * [WCXRP00000268] [MT6620 Wi-Fi][Driver] correction for WHQL failed items
  298. * correction for OID_802_11_NETWORK_TYPES_SUPPORTED handlers
  299. *
  300. * 12 13 2010 cp.wu
  301. * [WCXRP00000256] [MT6620 Wi-Fi][Driver] Eliminate potential issues which is identified by Klockwork
  302. * suppress warning reported by Klockwork.
  303. *
  304. * 12 07 2010 cm.chang
  305. * [WCXRP00000239] MT6620 Wi-Fi][Driver][FW] Merge concurrent branch back to maintrunk
  306. * 1. BSSINFO include RLM parameter
  307. * 2. free all sta records when network is disconnected
  308. *
  309. * 12 07 2010 cm.chang
  310. * [WCXRP00000238] MT6620 Wi-Fi][Driver][FW] Support regulation domain setting from NVRAM and supplicant
  311. * 1. Country code is from NVRAM or supplicant
  312. * 2. Change band definition in CMD/EVENT.
  313. *
  314. * 11 30 2010 cp.wu
  315. * [WCXRP00000213] [MT6620 Wi-Fi][Driver] Implement scanning with specified SSID for wpa_supplicant with ap_scan=1
  316. * .
  317. *
  318. * 11 26 2010 cp.wu
  319. * [WCXRP00000209] [MT6620 Wi-Fi][Driver] Modify NVRAM checking mechanism to warning only
  320. * with necessary data field checking
  321. * 1. NVRAM error is now treated as warning only, thus normal operation is still available
  322. * but extra scan result used to indicate user is attached
  323. * 2. DPD and TX-PWR are needed fields from now on, if these 2 fields are not available then warning message is shown
  324. *
  325. * 11 25 2010 cp.wu
  326. * [WCXRP00000208] [MT6620 Wi-Fi][Driver] Add scanning with specified SSID to AIS FSM
  327. * add scanning with specified SSID facility to AIS-FSM
  328. *
  329. * 11 21 2010 wh.su
  330. * [WCXRP00000192] [MT6620 Wi-Fi][Driver] Fixed fail trying to build connection with Security
  331. * AP while enable WAPI message check
  332. * Not set the wapi mode while the wapi assoc info set non-wapi ie.
  333. *
  334. * 11 05 2010 wh.su
  335. * [WCXRP00000165] [MT6620 Wi-Fi] [Pre-authentication] Assoc req rsn ie use wrong pmkid value
  336. * fixed the.pmkid value mismatch issue
  337. *
  338. * 11 01 2010 cp.wu
  339. * [WCXRP00000056] [MT6620 Wi-Fi][Driver] NVRAM implementation with Version
  340. * Check[WCXRP00000150] [MT6620 Wi-Fi][Driver] Add implementation for querying
  341. * current TX rate from firmware auto rate module
  342. * 1) Query link speed (TX rate) from firmware directly with buffering mechanism to reduce overhead
  343. * 2) Remove CNM CH-RECOVER event handling
  344. * 3) cfg read/write API renamed with kal prefix for unified naming rules.
  345. *
  346. * 10 26 2010 cp.wu
  347. * [WCXRP00000056] [MT6620 Wi-Fi][Driver] NVRAM implementation with Version
  348. * Check[WCXRP00000137] [MT6620 Wi-Fi] [FW] Support NIC capability query command
  349. * 1) update NVRAM content template to ver 1.02
  350. * 2) add compile option for querying NIC capability (default: off)
  351. * 3) modify AIS 5GHz support to run-time option, which could be turned on by registry or NVRAM setting
  352. * 4) correct auto-rate compiler error under linux (treat warning as error)
  353. * 5) simplify usage of NVRAM and REG_INFO_T
  354. * 6) add version checking between driver and firmware
  355. *
  356. * 10 22 2010 cp.wu
  357. * [WCXRP00000122] [MT6620 Wi-Fi][Driver] Preparation for YuSu source tree integration
  358. * dos2unix conversion.
  359. *
  360. * 10 20 2010 cp.wu
  361. * [WCXRP00000117] [MT6620 Wi-Fi][Driver] Add logic for suspending driver when MT6620 is not responding anymore
  362. * use OID_CUSTOM_TEST_MODE as indication for driver reset
  363. * by dropping pending TX packets
  364. *
  365. * 10 18 2010 cp.wu
  366. * [WCXRP00000056] [MT6620 Wi-Fi][Driver] NVRAM implementation with Version
  367. * Check[WCXRP00000086] [MT6620 Wi-Fi][Driver] The mac address is all zero at android complete
  368. * implementation of Android NVRAM access
  369. *
  370. * 10 06 2010 yuche.tsai
  371. * NULL
  372. * Update SLT 5G Test Channel Set.
  373. *
  374. * 10 06 2010 cp.wu
  375. * [WCXRP00000052] [MT6620 Wi-Fi][Driver] Eliminate Linux Compile Warning
  376. * code reorganization to improve isolation between GLUE and CORE layers.
  377. *
  378. * 10 06 2010 yuche.tsai
  379. * NULL
  380. * Update For SLT 5G Test Channel Selection Rule.
  381. *
  382. * 10 05 2010 cp.wu
  383. * [WCXRP00000075] [MT6620 Wi-Fi][Driver] Fill query buffer for OID_802_11_BSSID_LIST in 4-bytes aligned form
  384. * Query buffer size needs to be enlarged due to result is filled in 4-bytes alignment boundary
  385. *
  386. * 10 05 2010 cp.wu
  387. * [WCXRP00000056] [MT6620 Wi-Fi][Driver] NVRAM implementation with Version Check
  388. * 1) add NVRAM access API
  389. * 2) fake scanning result when NVRAM doesn't exist and/or version mismatch. (off by compiler option)
  390. * 3) add OID implementation for NVRAM read/write service
  391. *
  392. * 10 04 2010 cp.wu
  393. * [WCXRP00000077] [MT6620 Wi-Fi][Driver][FW] Eliminate use of ENUM_NETWORK_TYPE_T and
  394. * replaced by ENUM_NETWORK_TYPE_INDEX_T only remove ENUM_NETWORK_TYPE_T definitions
  395. *
  396. * 10 04 2010 cp.wu
  397. * [WCXRP00000075] [MT6620 Wi-Fi][Driver] Fill query buffer for OID_802_11_BSSID_LIST in 4-bytes aligned form
  398. * Extend result length to multiples of 4-bytes
  399. *
  400. * 09 24 2010 cp.wu
  401. * [WCXRP00000052] [MT6620 Wi-Fi][Driver] Eliminate Linux Compile Warning
  402. * eliminate unused variables which lead gcc to argue
  403. *
  404. * 09 24 2010 cp.wu
  405. * [WCXRP00000057] [MT6620 Wi-Fi][Driver] Modify online scan to a run-time switchable feature
  406. * Modify online scan as a run-time adjustable option (for Windows, in registry)
  407. *
  408. * 09 23 2010 cp.wu
  409. * [WCXRP00000051] [MT6620 Wi-Fi][Driver] WHQL test fail in MAC address changed item
  410. * use firmware reported mac address right after wlanAdapterStart() as permanent address
  411. *
  412. * 09 23 2010 cp.wu
  413. * [WCXRP00000056] [MT6620 Wi-Fi][Driver] NVRAM implementation with Version Check
  414. * add skeleton for NVRAM integration
  415. *
  416. * 09 08 2010 cp.wu
  417. * NULL
  418. * use static memory pool for storing IEs of scanning result.
  419. *
  420. * 09 07 2010 yuche.tsai
  421. * NULL
  422. * Update SLT due to API change of SCAN module.
  423. *
  424. * 09 06 2010 cp.wu
  425. * NULL
  426. * Androi/Linux: return current operating channel information
  427. *
  428. * 09 06 2010 cp.wu
  429. * NULL
  430. * 1) initialize for correct parameter even for disassociation.
  431. * 2) AIS-FSM should have a limit on trials to build connection
  432. *
  433. * 09 03 2010 yuche.tsai
  434. * NULL
  435. * Refine SLT IO control handler.
  436. *
  437. * 09 03 2010 kevin.huang
  438. * NULL
  439. * Refine #include sequence and solve recursive/nested #include issue
  440. *
  441. * 09 01 2010 wh.su
  442. * NULL
  443. * adding the wapi support for integration test.
  444. *
  445. * 08 30 2010 chinglan.wang
  446. * NULL
  447. * Modify the rescan condition.
  448. *
  449. * 08 29 2010 yuche.tsai
  450. * NULL
  451. * Finish SLT TX/RX & Rate Changing Support.
  452. *
  453. * 08 27 2010 chinglan.wang
  454. * NULL
  455. * Update configuration for MT6620_E1_PRE_ALPHA_1832_0827_2010
  456. *
  457. * 08 25 2010 george.huang
  458. * NULL
  459. * update OID/ registry control path for PM related settings
  460. *
  461. * 08 24 2010 cp.wu
  462. * NULL
  463. * 1) initialize variable for enabling short premable/short time slot.
  464. * 2) add compile option for disabling online scan
  465. *
  466. * 08 16 2010 george.huang
  467. * NULL
  468. * .
  469. *
  470. * 08 16 2010 george.huang
  471. * NULL
  472. * update params defined in CMD_SET_NETWORK_ADDRESS_LIST
  473. *
  474. * 08 04 2010 cp.wu
  475. * NULL
  476. * fix for check build WHQL testing:
  477. * 1) do not assert query buffer if indicated buffer length is zero
  478. * 2) sdio.c has bugs which cause freeing same pointer twice
  479. *
  480. * 08 04 2010 cp.wu
  481. * NULL
  482. * revert changelist #15371, efuse read/write access will be done by RF test approach
  483. *
  484. * 08 04 2010 cp.wu
  485. * NULL
  486. * add OID definitions for EFUSE read/write access.
  487. *
  488. * 08 04 2010 george.huang
  489. * NULL
  490. * handle change PS mode OID/ CMD
  491. *
  492. * 08 04 2010 cp.wu
  493. * NULL
  494. * add an extra parameter to rftestQueryATInfo 'cause it's necessary to pass u4FuncData for query request.
  495. *
  496. * 08 04 2010 cp.wu
  497. * NULL
  498. * bypass u4FuncData for RF-Test query request as well.
  499. *
  500. * 08 04 2010 yarco.yang
  501. * NULL
  502. * Add TX_AMPDU and ADDBA_REJECT command
  503. *
  504. * 08 03 2010 cp.wu
  505. * NULL
  506. * surpress compilation warning.
  507. *
  508. * 08 02 2010 george.huang
  509. * NULL
  510. * add WMM-PS test related OID/ CMD handlers
  511. *
  512. * 07 29 2010 cp.wu
  513. * NULL
  514. * eliminate u4FreqInKHz usage, combined into rConnections.ucAdHoc*
  515. *
  516. * 07 28 2010 cp.wu
  517. * NULL
  518. * 1) eliminate redundant variable eOPMode in prAdapter->rWlanInfo
  519. * 2) change nicMediaStateChange() API prototype
  520. *
  521. * 07 26 2010 cp.wu
  522. *
  523. * re-commit code logic being overwriten.
  524. *
  525. * 07 24 2010 wh.su
  526. *
  527. * .support the Wi-Fi RSN
  528. *
  529. * 07 21 2010 cp.wu
  530. *
  531. * 1) change BG_SCAN to ONLINE_SCAN for consistent term
  532. * 2) only clear scanning result when scan is permitted to do
  533. *
  534. * 07 20 2010 cp.wu
  535. *
  536. * 1) [AIS] when new scan is issued, clear currently available scanning result except the connected one
  537. * 2) refine disconnection behaviour when issued during BG-SCAN process
  538. *
  539. * 07 19 2010 wh.su
  540. *
  541. * modify the auth and encry status variable.
  542. *
  543. * 07 16 2010 cp.wu
  544. *
  545. * remove work-around in case SCN is not available.
  546. *
  547. * 07 08 2010 cp.wu
  548. *
  549. * [WPD00003833] [MT6620 and MT5931] Driver migration - move to new repository.
  550. *
  551. * 07 05 2010 cp.wu
  552. * [WPD00003833][MT6620 and MT5931] Driver migration
  553. * 1) change fake BSS_DESC from channel 6 to channel 1 due to channel switching is not done yet.
  554. * 2) after MAC address is queried from firmware, all related variables in driver domain should be updated as well
  555. *
  556. * 07 01 2010 cp.wu
  557. * [WPD00003833][MT6620 and MT5931] Driver migration
  558. * AIS-FSM integration with CNM channel request messages
  559. *
  560. * 07 01 2010 cp.wu
  561. * [WPD00003833][MT6620 and MT5931] Driver migration
  562. * implementation of DRV-SCN and related mailbox message handling.
  563. *
  564. * 06 29 2010 cp.wu
  565. * [WPD00003833][MT6620 and MT5931] Driver migration
  566. * 1) sync to. CMD/EVENT document v0.03
  567. * 2) simplify DTIM period parsing in scan.c only, bss.c no longer parses it again.
  568. * 3) send command packet to indicate FW-PM after
  569. * a) 1st beacon is received after AIS has connected to an AP
  570. * b) IBSS-ALONE has been created
  571. * c) IBSS-MERGE has occurred
  572. *
  573. * 06 25 2010 cp.wu
  574. * [WPD00003833][MT6620 and MT5931] Driver migration
  575. * add API in que_mgt to retrieve sta-rec index for security frames.
  576. *
  577. * 06 24 2010 cp.wu
  578. * [WPD00003833][MT6620 and MT5931] Driver migration
  579. * 802.1x and bluetooth-over-Wi-Fi security frames are now delievered to firmware via command path instead of data path.
  580. *
  581. * 06 23 2010 cp.wu
  582. * [WPD00003833][MT6620 and MT5931] Driver migration
  583. * 1) add SCN compilation option.
  584. * 2) when SCN is not turned on, BSSID_SCAN will generate a fake entry for 1st connection
  585. *
  586. * 06 23 2010 cp.wu
  587. * [WPD00003833][MT6620 and MT5931] Driver migration
  588. * implement SCAN-REQUEST oid as mailbox message dispatching.
  589. *
  590. * 06 23 2010 cp.wu
  591. * [WPD00003833][MT6620 and MT5931] Driver migration
  592. * integrate .
  593. *
  594. * 06 22 2010 cp.wu
  595. * [WPD00003833][MT6620 and MT5931] Driver migration
  596. * 1) add command warpper for STA-REC/BSS-INFO sync.
  597. * 2) enhance command packet sending procedure for non-oid part
  598. * 3) add command packet definitions for STA-REC/BSS-INFO sync.
  599. *
  600. * 06 21 2010 wh.su
  601. * [WPD00003840][MT6620 5931] Security migration
  602. * remove duplicate variable for migration.
  603. *
  604. * 06 21 2010 wh.su
  605. * [WPD00003840][MT6620 5931] Security migration
  606. * adding the compiling flag for oid pmkid.
  607. *
  608. * 06 21 2010 cp.wu
  609. * [WPD00003833][MT6620 and MT5931] Driver migration
  610. * enable RX management frame handling.
  611. *
  612. * 06 18 2010 wh.su
  613. * [WPD00003840][MT6620 5931] Security migration
  614. * migration the security related function from firmware.
  615. *
  616. * 06 11 2010 cp.wu
  617. * [WPD00003833][MT6620 and MT5931] Driver migration
  618. * 1) migrate assoc.c.
  619. * 2) add ucTxSeqNum for tracking frames which needs TX-DONE awareness
  620. * 3) add configuration options for CNM_MEM and RSN modules
  621. * 4) add data path for management frames
  622. * 5) eliminate rPacketInfo of MSDU_INFO_T
  623. *
  624. * 06 10 2010 cp.wu
  625. * [WPD00003833][MT6620 and MT5931] Driver migration
  626. * 1) eliminate CFG_CMD_EVENT_VERSION_0_9
  627. * 2) when disconnected, indicate nic directly (no event is needed)
  628. *
  629. * 06 07 2010 cp.wu
  630. * [WPD00003833][MT6620 and MT5931] Driver migration
  631. * merge wlan_def.h.
  632. *
  633. * 06 07 2010 cp.wu
  634. * [WPD00003833][MT6620 and MT5931] Driver migration
  635. * merge wifi_var.h, precomp.h, cnm_timer.h (data type only)
  636. *
  637. * 06 06 2010 kevin.huang
  638. * [WPD00003832][MT6620 5931] Create driver base
  639. * [MT6620 5931] Create driver base
  640. *
  641. * 06 03 2010 cp.wu
  642. * [WPD00001943]Create WiFi test driver framework on WinXP
  643. * move timer callback to glue layer.
  644. *
  645. * 05 28 2010 cp.wu
  646. * [WPD00001943]Create WiFi test driver framework on WinXP
  647. * simplify cmd packet sending for RF test and MCR access OIDs
  648. *
  649. * 05 27 2010 cp.wu
  650. * [WPD00001943]Create WiFi test driver framework on WinXP
  651. * disable radio even when STA is not associated.
  652. *
  653. * 05 27 2010 cp.wu
  654. * [WPD00001943]Create WiFi test driver framework on WinXP
  655. * correct 2 OID behaviour to meet WHQL requirement.
  656. *
  657. * 05 26 2010 jeffrey.chang
  658. * [WPD00003826]Initial import for Linux port
  659. * 1) Modify set mac address code
  660. * 2) remove power management macro
  661. *
  662. * 05 25 2010 cp.wu
  663. * [WPD00001943]Create WiFi test driver framework on WinXP
  664. * correct BSSID_LIST oid when radio if turned off.
  665. *
  666. * 05 24 2010 cp.wu
  667. * [WPD00001943]Create WiFi test driver framework on WinXP
  668. * 1) when acquiring LP-own, write for clr-own with lower frequency compared to read poll
  669. * 2) correct address list parsing
  670. *
  671. * 05 24 2010 cp.wu
  672. * [WPD00001943]Create WiFi test driver framework on WinXP
  673. * disable wlanoidSetNetworkAddress() temporally.
  674. *
  675. * 05 22 2010 cp.wu
  676. * [WPD00001943]Create WiFi test driver framework on WinXP
  677. * some OIDs should be DRIVER_CORE instead of GLUE_EXTENSION
  678. *
  679. * 05 22 2010 cp.wu
  680. * [WPD00001943]Create WiFi test driver framework on WinXP
  681. * 1) disable NETWORK_LAYER_ADDRESSES handling temporally.
  682. * 2) finish statistics OIDs
  683. *
  684. * 05 22 2010 cp.wu
  685. * [WPD00001943]Create WiFi test driver framework on WinXP
  686. * change OID behavior to meet WHQL requirement.
  687. *
  688. * 05 20 2010 cp.wu
  689. * [WPD00001943]Create WiFi test driver framework on WinXP
  690. * 1) integrate OID_GEN_NETWORK_LAYER_ADDRESSES with CMD_ID_SET_IP_ADDRESS
  691. * 2) buffer statistics data for 2 seconds
  692. * 3) use default value for adhoc parameters instead of 0
  693. *
  694. * 05 19 2010 cp.wu
  695. * [WPD00001943]Create WiFi test driver framework on WinXP
  696. * 1) do not take timeout mechanism for power mode oids
  697. * 2) retrieve network type from connection status
  698. * 3) after disassciation, set radio state to off
  699. * 4) TCP option over IPv6 is supported
  700. *
  701. * 05 18 2010 cp.wu
  702. * [WPD00001943]Create WiFi test driver framework on WinXP
  703. * implement Wakeup-on-LAN except firmware integration part
  704. *
  705. * 05 17 2010 cp.wu
  706. * [WPD00001943]Create WiFi test driver framework on WinXP
  707. * correct wlanoidSet802dot11PowerSaveProfile implementation.
  708. *
  709. * 05 17 2010 cp.wu
  710. * [WPD00001943]Create WiFi test driver framework on WinXP
  711. * 1) enable CMD/EVENT ver 0.9 definition.
  712. * 2) abandon use of ENUM_MEDIA_STATE
  713. *
  714. * 05 17 2010 cp.wu
  715. * [WPD00001943]Create WiFi test driver framework on WinXP
  716. * correct OID_802_11_DISASSOCIATE handling.
  717. *
  718. * 05 17 2010 cp.wu
  719. * [WPD00003831][MT6620 Wi-Fi] Add framework for Wi-Fi Direct support
  720. * 1) add timeout handler mechanism for pending command packets
  721. * 2) add p2p add/removal key
  722. *
  723. * 05 14 2010 jeffrey.chang
  724. * [WPD00003826]Initial import for Linux port
  725. * Add dissassocation support for wpa supplicant
  726. *
  727. * 05 14 2010 cp.wu
  728. * [WPD00001943]Create WiFi test driver framework on WinXP
  729. * correct return value.
  730. *
  731. * 05 13 2010 cp.wu
  732. * [WPD00001943]Create WiFi test driver framework on WinXP
  733. * add NULL OID implementation for WOL-related OIDs.
  734. *
  735. * 05 06 2010 cp.wu
  736. * [WPD00001943]Create WiFi test driver framework on WinXP
  737. * for disassociation, still use parameter with current setting.
  738. *
  739. * 05 06 2010 cp.wu
  740. * [WPD00001943]Create WiFi test driver framework on WinXP
  741. * for disassociation, generate a WZC-compatible invalid SSID.
  742. *
  743. * 05 06 2010 cp.wu
  744. * [WPD00001943]Create WiFi test driver framework on WinXP
  745. * associate to illegal SSID when handling OID_802_11_DISASSOCIATE
  746. *
  747. * 04 27 2010 cp.wu
  748. * [WPD00001943]Create WiFi test driver framework on WinXP
  749. * reserve field of privacy filter and RTS threshold setting.
  750. *
  751. * 04 23 2010 cp.wu
  752. * [WPD00001943]Create WiFi test driver framework on WinXP
  753. * surpress compiler warning
  754. *
  755. * 04 23 2010 cp.wu
  756. * [WPD00001943]Create WiFi test driver framework on WinXP
  757. * .
  758. *
  759. * 04 22 2010 cp.wu
  760. * [WPD00003830]add OID_802_11_PRIVACY_FILTER support
  761. * enable RX filter OID
  762. *
  763. * 04 19 2010 jeffrey.chang
  764. * [WPD00003826]Initial import for Linux port
  765. * Add ioctl of power management
  766. *
  767. * 04 14 2010 cp.wu
  768. * [WPD00001943]Create WiFi test driver framework on WinXP
  769. * information buffer for query oid/ioctl is now buffered in prCmdInfo
  770. * * instead of glue-layer variable to improve multiple oid/ioctl capability
  771. *
  772. * 04 13 2010 cp.wu
  773. * [WPD00003823][MT6620 Wi-Fi] Add Bluetooth-over-Wi-Fi support
  774. * add framework for BT-over-Wi-Fi support.
  775. * * * * 1) prPendingCmdInfo is replaced by queue for multiple handler capability
  776. * * * * 2) command sequence number is now increased atomically
  777. * * * * 3) private data could be hold and taken use for other purpose
  778. *
  779. * 04 12 2010 cp.wu
  780. * [WPD00001943]Create WiFi test driver framework on WinXP
  781. * correct OID_802_11_CONFIGURATION query for infrastructure mode.
  782. *
  783. * 04 09 2010 jeffrey.chang
  784. * [WPD00003826]Initial import for Linux port
  785. * 1) remove unused spin lock declaration
  786. *
  787. * 04 07 2010 cp.wu
  788. * [WPD00001943]Create WiFi test driver framework on WinXP
  789. * finish non-glue layer access to glue variables
  790. *
  791. * 04 07 2010 cp.wu
  792. * [WPD00001943]Create WiFi test driver framework on WinXP
  793. * rWlanInfo should be placed at adapter rather than glue due to most operations
  794. * * are done in adapter layer.
  795. *
  796. * 04 07 2010 jeffrey.chang
  797. * [WPD00003826]Initial import for Linux port
  798. * (1)improve none-glue code portability
  799. * (2) disable set Multicast address during atomic context
  800. *
  801. * 04 07 2010 cp.wu
  802. * [WPD00001943]Create WiFi test driver framework on WinXP
  803. * eliminate direct access to prGlueInfo->eParamMediaStateIndicated from non-glue layer
  804. *
  805. * 04 06 2010 cp.wu
  806. * [WPD00001943]Create WiFi test driver framework on WinXP
  807. * ePowerCtrl is not necessary as a glue variable.
  808. *
  809. * 04 06 2010 cp.wu
  810. * [WPD00001943]Create WiFi test driver framework on WinXP
  811. * eliminate direct access to prGlueInfo->rWlanInfo.eLinkAttr.ucMediaStreamMode from non-glue layer.
  812. *
  813. * 04 06 2010 jeffrey.chang
  814. * [WPD00003826]Initial import for Linux port
  815. * improve none-glue code portability
  816. *
  817. * 04 06 2010 cp.wu
  818. * [WPD00001943]Create WiFi test driver framework on WinXP
  819. * code refine: fgTestMode should be at adapter rather than glue due to the device/fw is also involved
  820. *
  821. * 04 01 2010 cp.wu
  822. * [WPD00001943]Create WiFi test driver framework on WinXP
  823. * .
  824. *
  825. * 03 31 2010 wh.su
  826. * [WPD00003816][MT6620 Wi-Fi] Adding the security support
  827. * modify the wapi related code for new driver's design.
  828. *
  829. * 03 30 2010 cp.wu
  830. * [WPD00001943]Create WiFi test driver framework on WinXP
  831. * statistics information OIDs are now handled by querying from firmware domain
  832. *
  833. * 03 28 2010 jeffrey.chang
  834. * [WPD00003826]Initial import for Linux port
  835. * improve glue code portability
  836. *
  837. * 03 26 2010 cp.wu
  838. * [WPD00001943]Create WiFi test driver framework on WinXP
  839. * indicate media stream mode after set is done
  840. *
  841. * 03 26 2010 cp.wu
  842. * [WPD00001943]Create WiFi test driver framework on WinXP
  843. * add a temporary flag for integration with CMD/EVENT v0.9.
  844. *
  845. * 03 25 2010 cp.wu
  846. * [WPD00001943]Create WiFi test driver framework on WinXP
  847. * 1) correct OID_802_11_CONFIGURATION with frequency setting behavior.
  848. * the frequency is used for adhoc connection only
  849. * 2) update with SD1 v0.9 CMD/EVENT documentation
  850. *
  851. * 03 24 2010 jeffrey.chang
  852. * [WPD00003826]Initial import for Linux port
  853. * [WPD00003826] Initial import for Linux port
  854. * initial import for Linux port
  855. *
  856. * 03 24 2010 jeffrey.chang
  857. * [WPD00003826]Initial import for Linux port
  858. * initial import for Linux port
  859. *
  860. * 03 24 2010 cp.wu
  861. * [WPD00001943]Create WiFi test driver framework on WinXP
  862. * generate information for OID_GEN_RCV_OK & OID_GEN_XMIT_OK
  863. *
  864. *
  865. * 03 22 2010 cp.wu
  866. * [WPD00003824][MT6620 Wi-Fi][New Feature] Add support of large scan list
  867. * Implement feature needed by CR: WPD00003824: refining association command by pasting scanning result
  868. *
  869. * 03 19 2010 wh.su
  870. * [WPD00003820][MT6620 Wi-Fi] Modify the code for meet the WHQL test
  871. * adding the check for pass WHQL test item.
  872. *
  873. * 03 19 2010 cp.wu
  874. * [WPD00001943]Create WiFi test driver framework on WinXP
  875. * 1) add ACPI D0/D3 state switching support
  876. * * 2) use more formal way to handle interrupt when the status is retrieved from enhanced RX response
  877. *
  878. * 03 16 2010 wh.su
  879. * [WPD00003820][MT6620 Wi-Fi] Modify the code for meet the WHQL test
  880. * fixed some whql pre-test fail case.
  881. *
  882. * 03 03 2010 cp.wu
  883. * [WPD00001943]Create WiFi test driver framework on WinXP
  884. * implement custom OID: EEPROM read/write access
  885. *
  886. * 03 03 2010 cp.wu
  887. * [WPD00001943]Create WiFi test driver framework on WinXP
  888. * implement OID_802_3_MULTICAST_LIST oid handling
  889. *
  890. * 03 02 2010 cp.wu
  891. * [WPD00001943]Create WiFi test driver framework on WinXP
  892. * 1) the use of prPendingOid revised, all accessing are now protected by spin lock
  893. * * 2) ensure wlanReleasePendingOid will clear all command queues
  894. *
  895. * 02 25 2010 cp.wu
  896. * [WPD00001943]Create WiFi test driver framework on WinXP
  897. * send CMD_ID_INFRASTRUCTURE when handling OID_802_11_INFRASTRUCTURE_MODE set.
  898. *
  899. * 02 24 2010 wh.su
  900. * [WPD00003820][MT6620 Wi-Fi] Modify the code for meet the WHQL test
  901. * Don't needed to check the auth mode, WHQL testing not specific at auth wpa2.
  902. *
  903. * 02 23 2010 cp.wu
  904. * [WPD00001943]Create WiFi test driver framework on WinXP
  905. * do not check SSID validity anymore.
  906. *
  907. * 02 23 2010 cp.wu
  908. * [WPD00001943]Create WiFi test driver framework on WinXP
  909. * add checksum offloading support.
  910. *
  911. * 02 09 2010 cp.wu
  912. * [WPD00001943]Create WiFi test driver framework on WinXP
  913. * 1. Permanent and current MAC address are now retrieved by CMD/EVENT packets instead of hard-coded address
  914. * * 2. follow MSDN defined behavior when associates to another AP
  915. * * 3. for firmware download, packet size could be up to 2048 bytes
  916. *
  917. * 02 09 2010 cp.wu
  918. * [WPD00001943]Create WiFi test driver framework on WinXP
  919. * move ucCmdSeqNum as instance variable
  920. *
  921. * 02 04 2010 cp.wu
  922. * [WPD00001943]Create WiFi test driver framework on WinXP
  923. * when OID_CUSTOM_OID_INTERFACE_VERSION is queried, do modify connection states
  924. *
  925. * 01 27 2010 cp.wu
  926. * [WPD00001943]Create WiFi test driver framework on WinXP
  927. * 1) implement timeout mechanism when OID is pending for longer than 1 second
  928. * * 2) allow OID_802_11_CONFIGURATION to be executed when RF test mode is turned on
  929. *
  930. * 01 27 2010 wh.su
  931. * [WPD00003816][MT6620 Wi-Fi] Adding the security support
  932. * .
  933. *
  934. * 01 27 2010 cp.wu
  935. * [WPD00001943]Create WiFi test driver framework on WinXP
  936. * 1. eliminate improper variable in rHifInfo
  937. * * 2. block TX/ordinary OID when RF test mode is engaged
  938. * * 3. wait until firmware finish operation when entering into and leaving from RF test mode
  939. * * 4. correct some HAL implementation
  940. *
  941. * 01 22 2010 cp.wu
  942. * [WPD00001943]Create WiFi test driver framework on WinXP
  943. * implement following 802.11 OIDs:
  944. * OID_802_11_RSSI,
  945. * OID_802_11_RSSI_TRIGGER,
  946. * OID_802_11_STATISTICS,
  947. * OID_802_11_DISASSOCIATE,
  948. * OID_802_11_POWER_MODE
  949. *
  950. * 01 21 2010 cp.wu
  951. * [WPD00001943]Create WiFi test driver framework on WinXP
  952. * implement OID_802_11_MEDIA_STREAM_MODE
  953. *
  954. * 01 21 2010 cp.wu
  955. * [WPD00001943]Create WiFi test driver framework on WinXP
  956. * implement OID_802_11_SUPPORTED_RATES / OID_802_11_DESIRED_RATES
  957. *
  958. * 01 21 2010 cp.wu
  959. * [WPD00001943]Create WiFi test driver framework on WinXP
  960. * do not fill ucJoinOnly currently
  961. *
  962. * 01 14 2010 cp.wu
  963. * [WPD00001943]Create WiFi test driver framework on WinXP
  964. * enable to connect to ad-hoc network
  965. *
  966. * 01 07 2010 cp.wu
  967. * [WPD00001943]Create WiFi test driver framework on WinXP
  968. * .implement Set/Query BeaconInterval/AtimWindow
  969. *
  970. * 01 07 2010 cp.wu
  971. * [WPD00001943]Create WiFi test driver framework on WinXP
  972. * .Set/Get AT Info is not blocked even when driver is not in fg test mode
  973. *
  974. * 12 30 2009 cp.wu
  975. * [WPD00001943]Create WiFi test driver framework on WinXP
  976. * 1) According to CMD/EVENT documentation v0.8,
  977. * OID_CUSTOM_TEST_RX_STATUS & OID_CUSTOM_TEST_TX_STATUS is no longer used,
  978. * and result is retrieved by get ATInfo instead
  979. * 2) add 4 counter for recording aggregation statistics
  980. *
  981. * 12 28 2009 cp.wu
  982. * [WPD00001943]Create WiFi test driver framework on WinXP
  983. * eliminate redundant variables for connection_state
  984. ** \main\maintrunk.MT6620WiFiDriver_Prj\32 2009-12-16 22:13:36 GMT mtk02752
  985. ** change hard-coded MAC address to match with FW (temporally)
  986. ** \main\maintrunk.MT6620WiFiDriver_Prj\31 2009-12-10 16:49:50 GMT mtk02752
  987. ** code clean
  988. ** \main\maintrunk.MT6620WiFiDriver_Prj\30 2009-12-08 17:38:49 GMT mtk02752
  989. ** + add OID for RF test
  990. ** * MCR RD/WR are modified to match with cmd/event definition
  991. ** \main\maintrunk.MT6620WiFiDriver_Prj\29 2009-12-08 11:32:20 GMT mtk02752
  992. ** add skeleton for RF test implementation
  993. ** \main\maintrunk.MT6620WiFiDriver_Prj\28 2009-12-03 16:43:24 GMT mtk01461
  994. ** Modify query SCAN list oid by adding prEventScanResult
  995. **
  996. ** \main\maintrunk.MT6620WiFiDriver_Prj\27 2009-12-03 16:39:27 GMT mtk01461
  997. ** Sync CMD data structure in set ssid oid
  998. ** \main\maintrunk.MT6620WiFiDriver_Prj\26 2009-12-03 16:28:22 GMT mtk01461
  999. ** Add invalid check of set SSID oid and fix query scan list oid
  1000. ** \main\maintrunk.MT6620WiFiDriver_Prj\25 2009-11-30 17:33:08 GMT mtk02752
  1001. ** implement wlanoidSetInfrastructureMode/wlanoidQueryInfrastructureMode
  1002. ** \main\maintrunk.MT6620WiFiDriver_Prj\24 2009-11-30 10:53:49 GMT mtk02752
  1003. ** 1st DW of WIFI_CMD_T is shared with HIF_TX_HEADER_T
  1004. ** \main\maintrunk.MT6620WiFiDriver_Prj\23 2009-11-30 09:22:48 GMT mtk02752
  1005. ** correct wifi cmd length mismatch
  1006. ** \main\maintrunk.MT6620WiFiDriver_Prj\22 2009-11-25 21:34:33 GMT mtk02752
  1007. ** sync EVENT_SCAN_RESULT_T with firmware
  1008. ** \main\maintrunk.MT6620WiFiDriver_Prj\21 2009-11-25 21:03:27 GMT mtk02752
  1009. ** implement wlanoidQueryBssidList()
  1010. ** \main\maintrunk.MT6620WiFiDriver_Prj\20 2009-11-25 18:17:17 GMT mtk02752
  1011. ** refine GL_WLAN_INFO_T for buffering scan result
  1012. ** \main\maintrunk.MT6620WiFiDriver_Prj\19 2009-11-23 20:28:51 GMT mtk02752
  1013. ** some OID will be set to WLAN_STATUS_PENDING until it is sent via wlanSendCommand()
  1014. ** \main\maintrunk.MT6620WiFiDriver_Prj\18 2009-11-23 17:56:36 GMT mtk02752
  1015. ** implement wlanoidSetBssidListScan(), wlanoidSetBssid() and wlanoidSetSsid()
  1016. **
  1017. ** \main\maintrunk.MT6620WiFiDriver_Prj\17 2009-11-13 17:20:53 GMT mtk02752
  1018. ** add Set BSSID/SSID path but disabled temporally due to FW is not ready yet
  1019. ** \main\maintrunk.MT6620WiFiDriver_Prj\16 2009-11-13 12:28:58 GMT mtk02752
  1020. ** add wlanoidSetBssidListScan -> cmd_info path
  1021. ** \main\maintrunk.MT6620WiFiDriver_Prj\15 2009-11-09 22:48:07 GMT mtk01084
  1022. ** modify test cases entry
  1023. ** \main\maintrunk.MT6620WiFiDriver_Prj\14 2009-11-04 14:10:58 GMT mtk01084
  1024. ** add new test interfaces
  1025. ** \main\maintrunk.MT6620WiFiDriver_Prj\13 2009-10-30 18:17:10 GMT mtk01084
  1026. ** fix compiler warning
  1027. ** \main\maintrunk.MT6620WiFiDriver_Prj\12 2009-10-29 19:46:26 GMT mtk01084
  1028. ** add test functions
  1029. ** \main\maintrunk.MT6620WiFiDriver_Prj\11 2009-10-23 16:07:56 GMT mtk01084
  1030. ** include new file
  1031. ** \main\maintrunk.MT6620WiFiDriver_Prj\10 2009-10-13 21:58:29 GMT mtk01084
  1032. ** modify for new HW architecture
  1033. ** \main\maintrunk.MT6620WiFiDriver_Prj\9 2009-10-02 13:48:49 GMT mtk01725
  1034. ** \main\maintrunk.MT6620WiFiDriver_Prj\8 2009-09-09 17:26:04 GMT mtk01084
  1035. ** \main\maintrunk.MT6620WiFiDriver_Prj\7 2009-04-21 12:09:50 GMT mtk01461
  1036. ** Update for MCR Write OID
  1037. ** \main\maintrunk.MT6620WiFiDriver_Prj\6 2009-04-21 09:35:18 GMT mtk01461
  1038. ** Update wlanoidQueryMcrRead() for composing CMD_INFO_T
  1039. ** \main\maintrunk.MT6620WiFiDriver_Prj\5 2009-04-17 18:09:51 GMT mtk01426
  1040. ** Remove kalIndicateStatusAndComplete() in wlanoidQueryOidInterfaceVersion()
  1041. ** \main\maintrunk.MT6620WiFiDriver_Prj\4 2009-04-14 15:51:50 GMT mtk01426
  1042. ** Add MCR read/write support
  1043. ** \main\maintrunk.MT6620WiFiDriver_Prj\3 2009-03-19 18:32:40 GMT mtk01084
  1044. ** update for basic power management functions
  1045. ** \main\maintrunk.MT6620WiFiDriver_Prj\2 2009-03-10 20:06:31 GMT mtk01426
  1046. ** Init for develop
  1047. **
  1048. */
  1049. /******************************************************************************
  1050. * C O M P I L E R F L A G S
  1051. *******************************************************************************
  1052. */
  1053. /******************************************************************************
  1054. * E X T E R N A L R E F E R E N C E S
  1055. *******************************************************************************
  1056. */
  1057. #include "precomp.h"
  1058. #include "mgmt/rsn.h"
  1059. #include <stddef.h>
  1060. /******************************************************************************
  1061. * C O N S T A N T S
  1062. *******************************************************************************
  1063. */
  1064. /******************************************************************************
  1065. * D A T A T Y P E S
  1066. *******************************************************************************
  1067. */
  1068. /******************************************************************************
  1069. * P U B L I C D A T A
  1070. *******************************************************************************
  1071. */
  1072. /******************************************************************************
  1073. * P R I V A T E D A T A
  1074. *******************************************************************************
  1075. */
  1076. /******************************************************************************
  1077. * M A C R O S
  1078. *******************************************************************************
  1079. */
  1080. /******************************************************************************
  1081. * F U N C T I O N D E C L A R A T I O N S
  1082. *******************************************************************************
  1083. */
  1084. /******************************************************************************
  1085. * F U N C T I O N S
  1086. *******************************************************************************
  1087. */
  1088. #if CFG_ENABLE_STATISTICS_BUFFERING
  1089. static BOOLEAN IsBufferedStatisticsUsable(P_ADAPTER_T prAdapter)
  1090. {
  1091. ASSERT(prAdapter);
  1092. if (prAdapter->fgIsStatValid == TRUE &&
  1093. (kalGetTimeTick() - prAdapter->rStatUpdateTime) <= CFG_STATISTICS_VALID_CYCLE)
  1094. return TRUE;
  1095. else
  1096. return FALSE;
  1097. }
  1098. #endif
  1099. /*----------------------------------------------------------------------------*/
  1100. /*!
  1101. * \brief This routine is called to query the supported physical layer network
  1102. * type that can be used by the driver.
  1103. *
  1104. * \param[in] prAdapter Pointer to the Adapter structure.
  1105. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  1106. * the query.
  1107. * \param[in] u4QueryBufferLen The length of the query buffer.
  1108. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1109. * bytes written into the query buffer. If the call
  1110. * failed due to invalid length of the query buffer,
  1111. * returns the amount of storage needed.
  1112. *
  1113. * \retval WLAN_STATUS_SUCCESS
  1114. * \retval WLAN_STATUS_INVALID_LENGTH
  1115. */
  1116. /*----------------------------------------------------------------------------*/
  1117. WLAN_STATUS
  1118. wlanoidQueryNetworkTypesSupported(IN P_ADAPTER_T prAdapter,
  1119. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1120. {
  1121. UINT_32 u4NumItem = 0;
  1122. ENUM_PARAM_NETWORK_TYPE_T eSupportedNetworks[PARAM_NETWORK_TYPE_NUM];
  1123. PPARAM_NETWORK_TYPE_LIST prSupported;
  1124. /* The array of all physical layer network subtypes that the driver supports. */
  1125. DEBUGFUNC("wlanoidQueryNetworkTypesSupported");
  1126. ASSERT(prAdapter);
  1127. ASSERT(pu4QueryInfoLen);
  1128. if (u4QueryBufferLen)
  1129. ASSERT(pvQueryBuffer);
  1130. /* Init. */
  1131. for (u4NumItem = 0; u4NumItem < PARAM_NETWORK_TYPE_NUM; u4NumItem++)
  1132. eSupportedNetworks[u4NumItem] = 0;
  1133. u4NumItem = 0;
  1134. eSupportedNetworks[u4NumItem] = PARAM_NETWORK_TYPE_DS;
  1135. u4NumItem++;
  1136. eSupportedNetworks[u4NumItem] = PARAM_NETWORK_TYPE_OFDM24;
  1137. u4NumItem++;
  1138. *pu4QueryInfoLen =
  1139. (UINT_32) OFFSET_OF(PARAM_NETWORK_TYPE_LIST, eNetworkType) +
  1140. (u4NumItem * sizeof(ENUM_PARAM_NETWORK_TYPE_T));
  1141. if (u4QueryBufferLen < *pu4QueryInfoLen)
  1142. return WLAN_STATUS_INVALID_LENGTH;
  1143. prSupported = (PPARAM_NETWORK_TYPE_LIST) pvQueryBuffer;
  1144. prSupported->NumberOfItems = u4NumItem;
  1145. kalMemCopy(prSupported->eNetworkType, eSupportedNetworks, u4NumItem * sizeof(ENUM_PARAM_NETWORK_TYPE_T));
  1146. DBGLOG(OID, TRACE, "NDIS supported network type list: %u\n", prSupported->NumberOfItems);
  1147. DBGLOG_MEM8(OID, TRACE, prSupported, *pu4QueryInfoLen);
  1148. return WLAN_STATUS_SUCCESS;
  1149. } /* wlanoidQueryNetworkTypesSupported */
  1150. /*----------------------------------------------------------------------------*/
  1151. /*!
  1152. * \brief This routine is called to query the current physical layer network
  1153. * type used by the driver.
  1154. *
  1155. * \param[in] prAdapter Pointer to the Adapter structure.
  1156. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  1157. * the query.
  1158. * \param[in] u4QueryBufferLen The length of the query buffer.
  1159. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1160. * bytes written into the query buffer. If the
  1161. * call failed due to invalid length of the query
  1162. * buffer, returns the amount of storage needed.
  1163. *
  1164. * \retval WLAN_STATUS_SUCCESS
  1165. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  1166. */
  1167. /*----------------------------------------------------------------------------*/
  1168. WLAN_STATUS
  1169. wlanoidQueryNetworkTypeInUse(IN P_ADAPTER_T prAdapter,
  1170. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1171. {
  1172. /* TODO: need to check the OID handler content again!! */
  1173. ENUM_PARAM_NETWORK_TYPE_T rCurrentNetworkTypeInUse = PARAM_NETWORK_TYPE_OFDM24;
  1174. DEBUGFUNC("wlanoidQueryNetworkTypeInUse");
  1175. ASSERT(prAdapter);
  1176. ASSERT(pu4QueryInfoLen);
  1177. if (u4QueryBufferLen)
  1178. ASSERT(pvQueryBuffer);
  1179. if (u4QueryBufferLen < sizeof(ENUM_PARAM_NETWORK_TYPE_T)) {
  1180. *pu4QueryInfoLen = sizeof(ENUM_PARAM_NETWORK_TYPE_T);
  1181. return WLAN_STATUS_BUFFER_TOO_SHORT;
  1182. }
  1183. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED)
  1184. rCurrentNetworkTypeInUse = (ENUM_PARAM_NETWORK_TYPE_T) (prAdapter->rWlanInfo.ucNetworkType);
  1185. else
  1186. rCurrentNetworkTypeInUse = (ENUM_PARAM_NETWORK_TYPE_T) (prAdapter->rWlanInfo.ucNetworkTypeInUse);
  1187. *(P_ENUM_PARAM_NETWORK_TYPE_T) pvQueryBuffer = rCurrentNetworkTypeInUse;
  1188. *pu4QueryInfoLen = sizeof(ENUM_PARAM_NETWORK_TYPE_T);
  1189. DBGLOG(OID, TRACE, "Network type in use: %d\n", rCurrentNetworkTypeInUse);
  1190. return WLAN_STATUS_SUCCESS;
  1191. } /* wlanoidQueryNetworkTypeInUse */
  1192. /*----------------------------------------------------------------------------*/
  1193. /*!
  1194. * \brief This routine is called to set the physical layer network type used
  1195. * by the driver.
  1196. *
  1197. * \param[in] pvAdapter Pointer to the Adapter structure.
  1198. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  1199. * \param[in] u4SetBufferLen The length of the set buffer.
  1200. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  1201. * bytes read from the set buffer. If the call failed
  1202. * due to invalid length of the set buffer, returns the
  1203. * amount of storage needed.
  1204. *
  1205. * \retval WLAN_STATUS_SUCCESS The given network type is supported and accepted.
  1206. * \retval WLAN_STATUS_INVALID_DATA The given network type is not in the
  1207. * supported list.
  1208. */
  1209. /*----------------------------------------------------------------------------*/
  1210. WLAN_STATUS
  1211. wlanoidSetNetworkTypeInUse(IN P_ADAPTER_T prAdapter,
  1212. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1213. {
  1214. /* TODO: need to check the OID handler content again!! */
  1215. ENUM_PARAM_NETWORK_TYPE_T eNewNetworkType;
  1216. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  1217. DEBUGFUNC("wlanoidSetNetworkTypeInUse");
  1218. ASSERT(prAdapter);
  1219. ASSERT(pvSetBuffer);
  1220. ASSERT(pu4SetInfoLen);
  1221. if (u4SetBufferLen < sizeof(ENUM_PARAM_NETWORK_TYPE_T)) {
  1222. *pu4SetInfoLen = sizeof(ENUM_PARAM_NETWORK_TYPE_T);
  1223. return WLAN_STATUS_INVALID_LENGTH;
  1224. }
  1225. eNewNetworkType = *(P_ENUM_PARAM_NETWORK_TYPE_T) pvSetBuffer;
  1226. *pu4SetInfoLen = sizeof(ENUM_PARAM_NETWORK_TYPE_T);
  1227. DBGLOG(OID, INFO, "New network type: %d mode\n", eNewNetworkType);
  1228. switch (eNewNetworkType) {
  1229. case PARAM_NETWORK_TYPE_DS:
  1230. prAdapter->rWlanInfo.ucNetworkTypeInUse = (UINT_8) PARAM_NETWORK_TYPE_DS;
  1231. break;
  1232. case PARAM_NETWORK_TYPE_OFDM5:
  1233. prAdapter->rWlanInfo.ucNetworkTypeInUse = (UINT_8) PARAM_NETWORK_TYPE_OFDM5;
  1234. break;
  1235. case PARAM_NETWORK_TYPE_OFDM24:
  1236. prAdapter->rWlanInfo.ucNetworkTypeInUse = (UINT_8) PARAM_NETWORK_TYPE_OFDM24;
  1237. break;
  1238. case PARAM_NETWORK_TYPE_AUTOMODE:
  1239. prAdapter->rWlanInfo.ucNetworkTypeInUse = (UINT_8) PARAM_NETWORK_TYPE_AUTOMODE;
  1240. break;
  1241. case PARAM_NETWORK_TYPE_FH:
  1242. DBGLOG(OID, INFO, "Not support network type: %d\n", eNewNetworkType);
  1243. rStatus = WLAN_STATUS_NOT_SUPPORTED;
  1244. break;
  1245. default:
  1246. DBGLOG(OID, INFO, "Unknown network type: %d\n", eNewNetworkType);
  1247. rStatus = WLAN_STATUS_INVALID_DATA;
  1248. break;
  1249. }
  1250. /* Verify if we support the new network type. */
  1251. if (rStatus != WLAN_STATUS_SUCCESS)
  1252. DBGLOG(OID, WARN, "Unknown network type: %d\n", eNewNetworkType);
  1253. return rStatus;
  1254. } /* wlanoidSetNetworkTypeInUse */
  1255. /*----------------------------------------------------------------------------*/
  1256. /*!
  1257. * \brief This routine is called to query the current BSSID.
  1258. *
  1259. * \param[in] prAdapter Pointer to the Adapter structure.
  1260. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  1261. * the query.
  1262. * \param[in] u4QueryBufferLen The length of the query buffer.
  1263. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1264. * bytes written into the query buffer. If the call
  1265. * failed due to invalid length of the query buffer,
  1266. * returns the amount of storage needed.
  1267. *
  1268. * \retval WLAN_STATUS_SUCCESS
  1269. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1270. */
  1271. /*----------------------------------------------------------------------------*/
  1272. WLAN_STATUS
  1273. wlanoidQueryBssid(IN P_ADAPTER_T prAdapter,
  1274. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1275. {
  1276. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  1277. DEBUGFUNC("wlanoidQueryBssid");
  1278. ASSERT(prAdapter);
  1279. if (u4QueryBufferLen < MAC_ADDR_LEN) {
  1280. ASSERT(pu4QueryInfoLen);
  1281. *pu4QueryInfoLen = MAC_ADDR_LEN;
  1282. return WLAN_STATUS_BUFFER_TOO_SHORT;
  1283. }
  1284. ASSERT(u4QueryBufferLen >= MAC_ADDR_LEN);
  1285. if (u4QueryBufferLen)
  1286. ASSERT(pvQueryBuffer);
  1287. ASSERT(pu4QueryInfoLen);
  1288. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED)
  1289. kalMemCopy(pvQueryBuffer, prAdapter->rWlanInfo.rCurrBssId.arMacAddress, MAC_ADDR_LEN);
  1290. else if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_IBSS) {
  1291. PARAM_MAC_ADDRESS aucTemp; /*!< BSSID */
  1292. COPY_MAC_ADDR(aucTemp, prAdapter->rWlanInfo.rCurrBssId.arMacAddress);
  1293. aucTemp[0] &= ~BIT(0);
  1294. aucTemp[1] |= BIT(1);
  1295. COPY_MAC_ADDR(pvQueryBuffer, aucTemp);
  1296. } else
  1297. rStatus = WLAN_STATUS_ADAPTER_NOT_READY;
  1298. *pu4QueryInfoLen = MAC_ADDR_LEN;
  1299. return rStatus;
  1300. } /* wlanoidQueryBssid */
  1301. /*----------------------------------------------------------------------------*/
  1302. /*!
  1303. * \brief This routine is called to query the list of all BSSIDs detected by
  1304. * the driver.
  1305. *
  1306. * \param[in] prAdapter Pointer to the Adapter structure.
  1307. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  1308. * the query.
  1309. * \param[in] u4QueryBufferLen The length of the query buffer.
  1310. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1311. * bytes written into the query buffer. If the call
  1312. * failed due to invalid length of the query buffer,
  1313. * returns the amount of storage needed.
  1314. *
  1315. * \retval WLAN_STATUS_SUCCESS
  1316. * \retval WLAN_STATUS_INVALID_LENGTH
  1317. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1318. */
  1319. /*----------------------------------------------------------------------------*/
  1320. WLAN_STATUS
  1321. wlanoidQueryBssidList(IN P_ADAPTER_T prAdapter,
  1322. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1323. {
  1324. P_GLUE_INFO_T prGlueInfo;
  1325. UINT_32 i, u4BssidListExLen;
  1326. P_PARAM_BSSID_LIST_EX_T prList;
  1327. P_PARAM_BSSID_EX_T prBssidEx;
  1328. PUINT_8 cp;
  1329. DEBUGFUNC("wlanoidQueryBssidList");
  1330. ASSERT(prAdapter);
  1331. ASSERT(pu4QueryInfoLen);
  1332. if (u4QueryBufferLen) {
  1333. ASSERT(pvQueryBuffer);
  1334. if (!pvQueryBuffer)
  1335. return WLAN_STATUS_INVALID_DATA;
  1336. }
  1337. prGlueInfo = prAdapter->prGlueInfo;
  1338. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1339. DBGLOG(OID, WARN, "Fail in qeury BSSID list! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1340. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1341. return WLAN_STATUS_ADAPTER_NOT_READY;
  1342. }
  1343. u4BssidListExLen = 0;
  1344. if (prAdapter->fgIsRadioOff == FALSE) {
  1345. for (i = 0; i < prAdapter->rWlanInfo.u4ScanResultNum; i++)
  1346. u4BssidListExLen += ALIGN_4(prAdapter->rWlanInfo.arScanResult[i].u4Length);
  1347. }
  1348. if (u4BssidListExLen)
  1349. u4BssidListExLen += 4; /* u4NumberOfItems. */
  1350. else
  1351. u4BssidListExLen = sizeof(PARAM_BSSID_LIST_EX_T);
  1352. *pu4QueryInfoLen = u4BssidListExLen;
  1353. if (u4QueryBufferLen < *pu4QueryInfoLen)
  1354. return WLAN_STATUS_INVALID_LENGTH;
  1355. /* Clear the buffer */
  1356. kalMemZero(pvQueryBuffer, u4BssidListExLen);
  1357. prList = (P_PARAM_BSSID_LIST_EX_T) pvQueryBuffer;
  1358. cp = (PUINT_8) &prList->arBssid[0];
  1359. if (prAdapter->fgIsRadioOff == FALSE && prAdapter->rWlanInfo.u4ScanResultNum > 0) {
  1360. /* fill up for each entry */
  1361. for (i = 0; i < prAdapter->rWlanInfo.u4ScanResultNum; i++) {
  1362. prBssidEx = (P_PARAM_BSSID_EX_T) cp;
  1363. /* copy structure */
  1364. kalMemCopy(prBssidEx,
  1365. &(prAdapter->rWlanInfo.arScanResult[i]), OFFSET_OF(PARAM_BSSID_EX_T, aucIEs));
  1366. /*For WHQL test, Rssi should be in range -10 ~ -200 dBm */
  1367. if (prBssidEx->rRssi > PARAM_WHQL_RSSI_MAX_DBM)
  1368. prBssidEx->rRssi = PARAM_WHQL_RSSI_MAX_DBM;
  1369. if (prAdapter->rWlanInfo.arScanResult[i].u4IELength > 0) {
  1370. /* copy IEs */
  1371. kalMemCopy(prBssidEx->aucIEs,
  1372. prAdapter->rWlanInfo.apucScanResultIEs[i],
  1373. prAdapter->rWlanInfo.arScanResult[i].u4IELength);
  1374. }
  1375. /* 4-bytes alignement */
  1376. prBssidEx->u4Length = ALIGN_4(prBssidEx->u4Length);
  1377. cp += prBssidEx->u4Length;
  1378. prList->u4NumberOfItems++;
  1379. }
  1380. }
  1381. return WLAN_STATUS_SUCCESS;
  1382. } /* wlanoidQueryBssidList */
  1383. /*----------------------------------------------------------------------------*/
  1384. /*!
  1385. * \brief This routine is called to request the driver to perform
  1386. * scanning.
  1387. *
  1388. * \param[in] prAdapter Pointer to the Adapter structure.
  1389. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  1390. * \param[in] u4SetBufferLen The length of the set buffer.
  1391. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  1392. * bytes read from the set buffer. If the call failed
  1393. * due to invalid length of the set buffer, returns
  1394. * the amount of storage needed.
  1395. *
  1396. * \retval WLAN_STATUS_SUCCESS
  1397. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1398. * \retval WLAN_STATUS_FAILURE
  1399. */
  1400. /*----------------------------------------------------------------------------*/
  1401. WLAN_STATUS
  1402. wlanoidSetBssidListScan(IN P_ADAPTER_T prAdapter,
  1403. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1404. {
  1405. P_PARAM_SSID_T prSsid;
  1406. PARAM_SSID_T rSsid;
  1407. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  1408. DEBUGFUNC("wlanoidSetBssidListScan()");
  1409. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1410. DBGLOG(OID, WARN, "Fail in set BSSID list scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1411. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1412. return WLAN_STATUS_ADAPTER_NOT_READY;
  1413. }
  1414. ASSERT(pu4SetInfoLen);
  1415. *pu4SetInfoLen = 0;
  1416. if (prAdapter->fgIsRadioOff) {
  1417. DBGLOG(OID, WARN, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  1418. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1419. return WLAN_STATUS_SUCCESS;
  1420. }
  1421. DBGLOG(OID, TRACE, "Scan\n");
  1422. if (pvSetBuffer != NULL && u4SetBufferLen != 0) {
  1423. COPY_SSID(rSsid.aucSsid, rSsid.u4SsidLen, pvSetBuffer, u4SetBufferLen);
  1424. prSsid = &rSsid;
  1425. } else {
  1426. prSsid = NULL;
  1427. }
  1428. #if CFG_SUPPORT_RDD_TEST_MODE
  1429. if (prAdapter->prGlueInfo->rRegInfo.u4RddTestMode) {
  1430. if ((prAdapter->fgEnOnlineScan == TRUE) && (prAdapter->ucRddStatus)) {
  1431. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) != PARAM_MEDIA_STATE_CONNECTED) {
  1432. aisFsmScanRequest(prAdapter, prSsid, NULL, 0);
  1433. } else {
  1434. /* reject the scan request */
  1435. rStatus = WLAN_STATUS_FAILURE;
  1436. }
  1437. } else {
  1438. /* reject the scan request */
  1439. rStatus = WLAN_STATUS_FAILURE;
  1440. }
  1441. } else
  1442. #endif
  1443. {
  1444. if (prAdapter->fgEnOnlineScan == TRUE) {
  1445. aisFsmScanRequest(prAdapter, prSsid, NULL, 0);
  1446. } else if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) != PARAM_MEDIA_STATE_CONNECTED) {
  1447. aisFsmScanRequest(prAdapter, prSsid, NULL, 0);
  1448. } else {
  1449. /* reject the scan request */
  1450. rStatus = WLAN_STATUS_FAILURE;
  1451. }
  1452. }
  1453. return rStatus;
  1454. } /* wlanoidSetBssidListScan */
  1455. /*----------------------------------------------------------------------------*/
  1456. /*!
  1457. * \brief This routine is called to request the driver to perform
  1458. * scanning with attaching information elements(IEs) specified from user space
  1459. *
  1460. * \param[in] prAdapter Pointer to the Adapter structure.
  1461. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  1462. * \param[in] u4SetBufferLen The length of the set buffer.
  1463. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  1464. * bytes read from the set buffer. If the call failed
  1465. * due to invalid length of the set buffer, returns
  1466. * the amount of storage needed.
  1467. *
  1468. * \retval WLAN_STATUS_SUCCESS
  1469. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1470. * \retval WLAN_STATUS_FAILURE
  1471. */
  1472. /*----------------------------------------------------------------------------*/
  1473. WLAN_STATUS
  1474. wlanoidSetBssidListScanExt(IN P_ADAPTER_T prAdapter,
  1475. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1476. {
  1477. P_PARAM_SCAN_REQUEST_EXT_T prScanRequest;
  1478. P_AIS_FSM_INFO_T prAisFsmInfo;
  1479. P_PARAM_SSID_T prSsid;
  1480. PUINT_8 pucIe;
  1481. UINT_32 u4IeLength;
  1482. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  1483. UINT_8 ucScanTime = AIS_SCN_DONE_TIMEOUT_SEC;
  1484. DEBUGFUNC("wlanoidSetBssidListScanExt()");
  1485. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1486. DBGLOG(OID, ERROR, "Fail in set BSSID list scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1487. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1488. return WLAN_STATUS_ADAPTER_NOT_READY;
  1489. }
  1490. ASSERT(pu4SetInfoLen);
  1491. *pu4SetInfoLen = 0;
  1492. if (u4SetBufferLen != sizeof(PARAM_SCAN_REQUEST_EXT_T)) {
  1493. DBGLOG(OID, ERROR, "u4SetBufferLen != sizeof(PARAM_SCAN_REQUEST_EXT_T)\n");
  1494. return WLAN_STATUS_INVALID_LENGTH;
  1495. }
  1496. if (prAdapter->fgIsRadioOff) {
  1497. DBGLOG(OID, INFO, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  1498. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1499. return WLAN_STATUS_SUCCESS;
  1500. }
  1501. DBGLOG(OID, TRACE, "ScanEx\n");
  1502. /* clear old scan backup results if exists */
  1503. {
  1504. P_SCAN_INFO_T prScanInfo;
  1505. P_LINK_T prBSSDescList;
  1506. P_BSS_DESC_T prBssDesc;
  1507. prScanInfo = &(prAdapter->rWifiVar.rScanInfo);
  1508. prBSSDescList = &prScanInfo->rBSSDescList;
  1509. LINK_FOR_EACH_ENTRY(prBssDesc, prBSSDescList, rLinkEntry, BSS_DESC_T) {
  1510. if (prBssDesc->eBSSType == BSS_TYPE_INFRASTRUCTURE) {
  1511. kalMemZero(prBssDesc->aucRawBuf, CFG_RAW_BUFFER_SIZE);
  1512. prBssDesc->u2RawLength = 0;
  1513. }
  1514. }
  1515. }
  1516. if (pvSetBuffer != NULL && u4SetBufferLen != 0) {
  1517. prScanRequest = (P_PARAM_SCAN_REQUEST_EXT_T) pvSetBuffer;
  1518. prSsid = &(prScanRequest->rSsid);
  1519. pucIe = prScanRequest->pucIE;
  1520. u4IeLength = prScanRequest->u4IELength;
  1521. } else {
  1522. prScanRequest = NULL;
  1523. prSsid = NULL;
  1524. pucIe = NULL;
  1525. u4IeLength = 0;
  1526. }
  1527. /* P_AIS_FSM_INFO_T prAisFsmInfo; */
  1528. prAisFsmInfo = &(prAdapter->rWifiVar.rAisFsmInfo);
  1529. /* #if CFG_SUPPORT_WFD */
  1530. #if 0
  1531. if ((prAdapter->rWifiVar.prP2pFsmInfo->rWfdConfigureSettings.ucWfdEnable) &&
  1532. ((prAdapter->rWifiVar.prP2pFsmInfo->rWfdConfigureSettings.u4WfdFlag & WFD_FLAGS_DEV_INFO_VALID))) {
  1533. if (prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX].eConnectionState ==
  1534. PARAM_MEDIA_STATE_CONNECTED) {
  1535. DBGLOG(OID, TRACE, "Twice the Scan Time for WFD\n");
  1536. ucScanTime *= 2;
  1537. }
  1538. }
  1539. #endif /* CFG_SUPPORT_WFD */
  1540. cnmTimerStartTimer(prAdapter, &prAisFsmInfo->rScanDoneTimer, SEC_TO_MSEC(ucScanTime));
  1541. #if CFG_SUPPORT_RDD_TEST_MODE
  1542. if (prAdapter->prGlueInfo->rRegInfo.u4RddTestMode) {
  1543. if ((prAdapter->fgEnOnlineScan == TRUE) && (prAdapter->ucRddStatus)) {
  1544. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) != PARAM_MEDIA_STATE_CONNECTED) {
  1545. aisFsmScanRequest(prAdapter, prSsid, pucIe, u4IeLength);
  1546. } else {
  1547. /* reject the scan request */
  1548. cnmTimerStopTimer(prAdapter, &prAisFsmInfo->rScanDoneTimer);
  1549. rStatus = WLAN_STATUS_FAILURE;
  1550. }
  1551. } else {
  1552. /* reject the scan request */
  1553. cnmTimerStopTimer(prAdapter, &prAisFsmInfo->rScanDoneTimer);
  1554. rStatus = WLAN_STATUS_FAILURE;
  1555. }
  1556. } else
  1557. #endif
  1558. {
  1559. if (prAdapter->fgEnOnlineScan == TRUE) {
  1560. aisFsmScanRequest(prAdapter, prSsid, pucIe, u4IeLength);
  1561. } else if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) != PARAM_MEDIA_STATE_CONNECTED) {
  1562. aisFsmScanRequest(prAdapter, prSsid, pucIe, u4IeLength);
  1563. } else {
  1564. /* reject the scan request */
  1565. cnmTimerStopTimer(prAdapter, &prAisFsmInfo->rScanDoneTimer);
  1566. rStatus = WLAN_STATUS_FAILURE;
  1567. DBGLOG(OID, WARN, "ScanEx fail %d!\n", prAdapter->fgEnOnlineScan);
  1568. }
  1569. }
  1570. return rStatus;
  1571. } /* wlanoidSetBssidListScanWithIE */
  1572. /*----------------------------------------------------------------------------*/
  1573. /*!
  1574. * \brief This routine will initiate the join procedure to attempt to associate
  1575. * with the specified BSSID.
  1576. *
  1577. * \param[in] pvAdapter Pointer to the Adapter structure.
  1578. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  1579. * \param[in] u4SetBufferLen The length of the set buffer.
  1580. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  1581. * bytes read from the set buffer. If the call failed
  1582. * due to invalid length of the set buffer, returns
  1583. * the amount of storage needed.
  1584. *
  1585. * \retval WLAN_STATUS_SUCCESS
  1586. * \retval WLAN_STATUS_INVALID_LENGTH
  1587. * \retval WLAN_STATUS_INVALID_DATA
  1588. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1589. */
  1590. /*----------------------------------------------------------------------------*/
  1591. WLAN_STATUS
  1592. wlanoidSetBssid(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1593. {
  1594. P_GLUE_INFO_T prGlueInfo;
  1595. P_UINT_8 pAddr;
  1596. UINT_32 i;
  1597. INT_32 i4Idx = -1;
  1598. P_MSG_AIS_ABORT_T prAisAbortMsg;
  1599. UINT_8 ucReasonOfDisconnect;
  1600. ASSERT(prAdapter);
  1601. ASSERT(pu4SetInfoLen);
  1602. *pu4SetInfoLen = MAC_ADDR_LEN;
  1603. if (u4SetBufferLen != MAC_ADDR_LEN) {
  1604. *pu4SetInfoLen = MAC_ADDR_LEN;
  1605. return WLAN_STATUS_INVALID_LENGTH;
  1606. } else if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1607. DBGLOG(OID, WARN, "Fail in set ssid! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1608. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1609. return WLAN_STATUS_ADAPTER_NOT_READY;
  1610. }
  1611. prGlueInfo = prAdapter->prGlueInfo;
  1612. pAddr = (P_UINT_8) pvSetBuffer;
  1613. /* re-association check */
  1614. if (kalGetMediaStateIndicated(prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  1615. if (EQUAL_MAC_ADDR(prAdapter->rWlanInfo.rCurrBssId.arMacAddress, pAddr)) {
  1616. kalSetMediaStateIndicated(prGlueInfo, PARAM_MEDIA_STATE_TO_BE_INDICATED);
  1617. ucReasonOfDisconnect = DISCONNECT_REASON_CODE_REASSOCIATION;
  1618. } else {
  1619. DBGLOG(OID, TRACE, "DisByBssid\n");
  1620. kalIndicateStatusAndComplete(prGlueInfo, WLAN_STATUS_MEDIA_DISCONNECT, NULL, 0);
  1621. ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  1622. }
  1623. } else {
  1624. ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  1625. }
  1626. /* check if any scanned result matchs with the BSSID */
  1627. for (i = 0; i < prAdapter->rWlanInfo.u4ScanResultNum; i++) {
  1628. if (EQUAL_MAC_ADDR(prAdapter->rWlanInfo.arScanResult[i].arMacAddress, pAddr)) {
  1629. i4Idx = (INT_32) i;
  1630. break;
  1631. }
  1632. }
  1633. /* prepare message to AIS */
  1634. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_IBSS
  1635. || prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_DEDICATED_IBSS) {
  1636. /* IBSS *//* beacon period */
  1637. prAdapter->rWifiVar.rConnSettings.u2BeaconPeriod = prAdapter->rWlanInfo.u2BeaconPeriod;
  1638. prAdapter->rWifiVar.rConnSettings.u2AtimWindow = prAdapter->rWlanInfo.u2AtimWindow;
  1639. }
  1640. /* Set Connection Request Issued Flag */
  1641. prAdapter->rWifiVar.rConnSettings.fgIsConnReqIssued = TRUE;
  1642. prAdapter->rWifiVar.rConnSettings.eConnectionPolicy = CONNECT_BY_BSSID;
  1643. /* Send AIS Abort Message */
  1644. prAisAbortMsg = (P_MSG_AIS_ABORT_T) cnmMemAlloc(prAdapter, RAM_TYPE_MSG, sizeof(MSG_AIS_ABORT_T));
  1645. if (!prAisAbortMsg) {
  1646. ASSERT(0);
  1647. return WLAN_STATUS_FAILURE;
  1648. }
  1649. prAisAbortMsg->rMsgHdr.eMsgId = MID_OID_AIS_FSM_JOIN_REQ;
  1650. prAisAbortMsg->ucReasonOfDisconnect = ucReasonOfDisconnect;
  1651. /* Update the information to CONNECTION_SETTINGS_T */
  1652. prAdapter->rWifiVar.rConnSettings.ucSSIDLen = 0;
  1653. prAdapter->rWifiVar.rConnSettings.aucSSID[0] = '\0';
  1654. COPY_MAC_ADDR(prAdapter->rWifiVar.rConnSettings.aucBSSID, pAddr);
  1655. if (EQUAL_MAC_ADDR(prAdapter->rWlanInfo.rCurrBssId.arMacAddress, pAddr))
  1656. prAisAbortMsg->fgDelayIndication = TRUE;
  1657. else
  1658. prAisAbortMsg->fgDelayIndication = FALSE;
  1659. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prAisAbortMsg, MSG_SEND_METHOD_BUF);
  1660. DBGLOG(OID, INFO, "SetBssid\n");
  1661. return WLAN_STATUS_SUCCESS;
  1662. } /* end of wlanoidSetBssid() */
  1663. WLAN_STATUS
  1664. wlanoidSetConnect(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1665. {
  1666. P_GLUE_INFO_T prGlueInfo;
  1667. P_PARAM_CONNECT_T pParamConn;
  1668. P_CONNECTION_SETTINGS_T prConnSettings;
  1669. UINT_32 i;
  1670. /*INT_32 i4Idx = -1, i4MaxRSSI = INT_MIN;*/
  1671. P_MSG_AIS_ABORT_T prAisAbortMsg;
  1672. BOOLEAN fgIsValidSsid = TRUE;
  1673. BOOLEAN fgEqualSsid = FALSE;
  1674. BOOLEAN fgEqualBssid = FALSE;
  1675. const UINT_8 aucZeroMacAddr[] = NULL_MAC_ADDR;
  1676. ASSERT(prAdapter);
  1677. ASSERT(pu4SetInfoLen);
  1678. /* MSDN:
  1679. * Powering on the radio if the radio is powered off through a setting of OID_802_11_DISASSOCIATE
  1680. */
  1681. if (prAdapter->fgIsRadioOff == TRUE)
  1682. prAdapter->fgIsRadioOff = FALSE;
  1683. if (u4SetBufferLen != sizeof(PARAM_CONNECT_T))
  1684. return WLAN_STATUS_INVALID_LENGTH;
  1685. else if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1686. DBGLOG(OID, WARN, "Fail in set ssid! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1687. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1688. return WLAN_STATUS_ADAPTER_NOT_READY;
  1689. }
  1690. prAisAbortMsg = (P_MSG_AIS_ABORT_T) cnmMemAlloc(prAdapter, RAM_TYPE_MSG, sizeof(MSG_AIS_ABORT_T));
  1691. if (!prAisAbortMsg) {
  1692. ASSERT(0);
  1693. return WLAN_STATUS_FAILURE;
  1694. }
  1695. prAisAbortMsg->rMsgHdr.eMsgId = MID_OID_AIS_FSM_JOIN_REQ;
  1696. pParamConn = (P_PARAM_CONNECT_T) pvSetBuffer;
  1697. prConnSettings = &prAdapter->rWifiVar.rConnSettings;
  1698. if (pParamConn->u4SsidLen > 32) {
  1699. cnmMemFree(prAdapter, prAisAbortMsg);
  1700. return WLAN_STATUS_INVALID_LENGTH;
  1701. } else if (!pParamConn->pucBssid && !pParamConn->pucSsid) {
  1702. cnmMemFree(prAdapter, prAisAbortMsg);
  1703. return WLAN_STATUS_INVALID_LENGTH;
  1704. }
  1705. prGlueInfo = prAdapter->prGlueInfo;
  1706. kalMemZero(prConnSettings->aucSSID, sizeof(prConnSettings->aucSSID));
  1707. kalMemZero(prConnSettings->aucBSSID, sizeof(prConnSettings->aucBSSID));
  1708. prConnSettings->eConnectionPolicy = CONNECT_BY_SSID_ANY;
  1709. prConnSettings->fgIsConnByBssidIssued = FALSE;
  1710. if (pParamConn->pucSsid) {
  1711. prConnSettings->eConnectionPolicy = CONNECT_BY_SSID_BEST_RSSI;
  1712. COPY_SSID(prConnSettings->aucSSID,
  1713. prConnSettings->ucSSIDLen, pParamConn->pucSsid, (UINT_8) pParamConn->u4SsidLen);
  1714. if (EQUAL_SSID(prAdapter->rWlanInfo.rCurrBssId.rSsid.aucSsid,
  1715. prAdapter->rWlanInfo.rCurrBssId.rSsid.u4SsidLen,
  1716. pParamConn->pucSsid, pParamConn->u4SsidLen))
  1717. fgEqualSsid = TRUE;
  1718. }
  1719. if (pParamConn->pucBssid) {
  1720. if (!EQUAL_MAC_ADDR(aucZeroMacAddr, pParamConn->pucBssid) && IS_UCAST_MAC_ADDR(pParamConn->pucBssid)) {
  1721. prConnSettings->eConnectionPolicy = CONNECT_BY_BSSID;
  1722. prConnSettings->fgIsConnByBssidIssued = TRUE;
  1723. COPY_MAC_ADDR(prConnSettings->aucBSSID, pParamConn->pucBssid);
  1724. if (EQUAL_MAC_ADDR(prAdapter->rWlanInfo.rCurrBssId.arMacAddress, pParamConn->pucBssid))
  1725. fgEqualBssid = TRUE;
  1726. } else
  1727. DBGLOG(OID, TRACE, "wrong bssid %pM to connect\n", pParamConn->pucBssid);
  1728. } else
  1729. DBGLOG(OID, TRACE, "No Bssid set\n");
  1730. prConnSettings->u4FreqInKHz = pParamConn->u4CenterFreq;
  1731. /* prepare for CMD_BUILD_CONNECTION & CMD_GET_CONNECTION_STATUS */
  1732. /* re-association check */
  1733. if (kalGetMediaStateIndicated(prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  1734. if (fgEqualSsid) {
  1735. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_ROAMING;
  1736. if (fgEqualBssid) {
  1737. kalSetMediaStateIndicated(prGlueInfo, PARAM_MEDIA_STATE_TO_BE_INDICATED);
  1738. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_REASSOCIATION;
  1739. }
  1740. } else {
  1741. DBGLOG(OID, TRACE, "DisBySsid\n");
  1742. kalIndicateStatusAndComplete(prGlueInfo, WLAN_STATUS_MEDIA_DISCONNECT, NULL, 0);
  1743. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  1744. }
  1745. } else
  1746. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  1747. #if 0
  1748. /* check if any scanned result matchs with the SSID */
  1749. for (i = 0; i < prAdapter->rWlanInfo.u4ScanResultNum; i++) {
  1750. PUINT_8 aucSsid = prAdapter->rWlanInfo.arScanResult[i].rSsid.aucSsid;
  1751. UINT_8 ucSsidLength = (UINT_8) prAdapter->rWlanInfo.arScanResult[i].rSsid.u4SsidLen;
  1752. INT_32 i4RSSI = prAdapter->rWlanInfo.arScanResult[i].rRssi;
  1753. if (EQUAL_SSID(aucSsid, ucSsidLength, pParamConn->pucSsid, pParamConn->u4SsidLen) &&
  1754. i4RSSI >= i4MaxRSSI) {
  1755. i4Idx = (INT_32) i;
  1756. i4MaxRSSI = i4RSSI;
  1757. }
  1758. if (EQUAL_MAC_ADDR(prAdapter->rWlanInfo.arScanResult[i].arMacAddress, pAddr)) {
  1759. i4Idx = (INT_32) i;
  1760. break;
  1761. }
  1762. }
  1763. #endif
  1764. /* prepare message to AIS */
  1765. if (prConnSettings->eOPMode == NET_TYPE_IBSS || prConnSettings->eOPMode == NET_TYPE_DEDICATED_IBSS) {
  1766. /* IBSS *//* beacon period */
  1767. prConnSettings->u2BeaconPeriod = prAdapter->rWlanInfo.u2BeaconPeriod;
  1768. prConnSettings->u2AtimWindow = prAdapter->rWlanInfo.u2AtimWindow;
  1769. }
  1770. if (prAdapter->rWifiVar.fgSupportWZCDisassociation) {
  1771. if (pParamConn->u4SsidLen == ELEM_MAX_LEN_SSID) {
  1772. fgIsValidSsid = FALSE;
  1773. for (i = 0; i < ELEM_MAX_LEN_SSID; i++) {
  1774. if (pParamConn->pucSsid) {
  1775. if (!((0 < pParamConn->pucSsid[i]) && (pParamConn->pucSsid[i] <= 0x1F))) {
  1776. fgIsValidSsid = TRUE;
  1777. break;
  1778. }
  1779. }
  1780. }
  1781. }
  1782. }
  1783. /* Set Connection Request Issued Flag */
  1784. if (fgIsValidSsid)
  1785. prConnSettings->fgIsConnReqIssued = TRUE;
  1786. else {
  1787. prConnSettings->eReConnectLevel = RECONNECT_LEVEL_USER_SET;
  1788. prConnSettings->fgIsConnReqIssued = FALSE;
  1789. }
  1790. if (fgEqualSsid || fgEqualBssid)
  1791. prAisAbortMsg->fgDelayIndication = TRUE;
  1792. else
  1793. /* Update the information to CONNECTION_SETTINGS_T */
  1794. prAisAbortMsg->fgDelayIndication = FALSE;
  1795. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prAisAbortMsg, MSG_SEND_METHOD_BUF);
  1796. DBGLOG(OID, INFO, "ssid %s, bssid %pM, conn policy %d, disc reason %d\n",
  1797. prConnSettings->aucSSID, prConnSettings->aucBSSID,
  1798. prConnSettings->eConnectionPolicy, prAisAbortMsg->ucReasonOfDisconnect);
  1799. return WLAN_STATUS_SUCCESS;
  1800. }
  1801. /*----------------------------------------------------------------------------*/
  1802. /*!
  1803. * \brief This routine will initiate the join procedure to attempt
  1804. * to associate with the new SSID. If the previous scanning
  1805. * result is aged, we will scan the channels at first.
  1806. *
  1807. * \param[in] prAdapter Pointer to the Adapter structure.
  1808. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  1809. * \param[in] u4SetBufferLen The length of the set buffer.
  1810. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  1811. * bytes read from the set buffer. If the call failed
  1812. * due to invalid length of the set buffer, returns
  1813. * the amount of storage needed.
  1814. *
  1815. * \retval WLAN_STATUS_SUCCESS
  1816. * \retval WLAN_STATUS_INVALID_DATA
  1817. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  1818. * \retval WLAN_STATUS_INVALID_LENGTH
  1819. */
  1820. /*----------------------------------------------------------------------------*/
  1821. WLAN_STATUS
  1822. wlanoidSetSsid(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  1823. {
  1824. P_GLUE_INFO_T prGlueInfo;
  1825. P_PARAM_SSID_T pParamSsid;
  1826. UINT_32 i;
  1827. INT_32 i4Idx = -1, i4MaxRSSI = INT_MIN;
  1828. P_MSG_AIS_ABORT_T prAisAbortMsg;
  1829. BOOLEAN fgIsValidSsid = TRUE;
  1830. ASSERT(prAdapter);
  1831. ASSERT(pu4SetInfoLen);
  1832. /* MSDN:
  1833. * Powering on the radio if the radio is powered off through a setting of OID_802_11_DISASSOCIATE
  1834. */
  1835. if (prAdapter->fgIsRadioOff == TRUE)
  1836. prAdapter->fgIsRadioOff = FALSE;
  1837. if (u4SetBufferLen < sizeof(PARAM_SSID_T) || u4SetBufferLen > sizeof(PARAM_SSID_T)) {
  1838. return WLAN_STATUS_INVALID_LENGTH;
  1839. } else if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  1840. DBGLOG(OID, WARN, "Fail in set ssid! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  1841. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  1842. return WLAN_STATUS_ADAPTER_NOT_READY;
  1843. }
  1844. pParamSsid = (P_PARAM_SSID_T) pvSetBuffer;
  1845. if (pParamSsid->u4SsidLen > 32)
  1846. return WLAN_STATUS_INVALID_LENGTH;
  1847. prGlueInfo = prAdapter->prGlueInfo;
  1848. /* prepare for CMD_BUILD_CONNECTION & CMD_GET_CONNECTION_STATUS */
  1849. /* re-association check */
  1850. if (kalGetMediaStateIndicated(prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  1851. if (EQUAL_SSID(prAdapter->rWlanInfo.rCurrBssId.rSsid.aucSsid,
  1852. prAdapter->rWlanInfo.rCurrBssId.rSsid.u4SsidLen,
  1853. pParamSsid->aucSsid, pParamSsid->u4SsidLen)) {
  1854. kalSetMediaStateIndicated(prGlueInfo, PARAM_MEDIA_STATE_TO_BE_INDICATED);
  1855. } else {
  1856. DBGLOG(OID, TRACE, "DisBySsid\n");
  1857. kalIndicateStatusAndComplete(prGlueInfo, WLAN_STATUS_MEDIA_DISCONNECT, NULL, 0);
  1858. }
  1859. }
  1860. /* check if any scanned result matchs with the SSID */
  1861. for (i = 0; i < prAdapter->rWlanInfo.u4ScanResultNum; i++) {
  1862. PUINT_8 aucSsid = prAdapter->rWlanInfo.arScanResult[i].rSsid.aucSsid;
  1863. UINT_8 ucSsidLength = (UINT_8) prAdapter->rWlanInfo.arScanResult[i].rSsid.u4SsidLen;
  1864. INT_32 i4RSSI = prAdapter->rWlanInfo.arScanResult[i].rRssi;
  1865. if (EQUAL_SSID(aucSsid, ucSsidLength, pParamSsid->aucSsid, pParamSsid->u4SsidLen) &&
  1866. i4RSSI >= i4MaxRSSI) {
  1867. i4Idx = (INT_32) i;
  1868. i4MaxRSSI = i4RSSI;
  1869. }
  1870. }
  1871. /* prepare message to AIS */
  1872. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_IBSS
  1873. || prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_DEDICATED_IBSS) {
  1874. /* IBSS *//* beacon period */
  1875. prAdapter->rWifiVar.rConnSettings.u2BeaconPeriod = prAdapter->rWlanInfo.u2BeaconPeriod;
  1876. prAdapter->rWifiVar.rConnSettings.u2AtimWindow = prAdapter->rWlanInfo.u2AtimWindow;
  1877. }
  1878. if (prAdapter->rWifiVar.fgSupportWZCDisassociation) {
  1879. if (pParamSsid->u4SsidLen == ELEM_MAX_LEN_SSID) {
  1880. fgIsValidSsid = FALSE;
  1881. for (i = 0; i < ELEM_MAX_LEN_SSID; i++) {
  1882. if (!((0 < pParamSsid->aucSsid[i]) && (pParamSsid->aucSsid[i] <= 0x1F))) {
  1883. fgIsValidSsid = TRUE;
  1884. break;
  1885. }
  1886. }
  1887. }
  1888. }
  1889. /* Set Connection Request Issued Flag */
  1890. if (fgIsValidSsid) {
  1891. prAdapter->rWifiVar.rConnSettings.fgIsConnReqIssued = TRUE;
  1892. if (pParamSsid->u4SsidLen) {
  1893. prAdapter->rWifiVar.rConnSettings.eConnectionPolicy = CONNECT_BY_SSID_BEST_RSSI;
  1894. } else {
  1895. /* wildcard SSID */
  1896. prAdapter->rWifiVar.rConnSettings.eConnectionPolicy = CONNECT_BY_SSID_ANY;
  1897. }
  1898. } else {
  1899. prAdapter->rWifiVar.rConnSettings.fgIsConnReqIssued = FALSE;
  1900. }
  1901. /* Send AIS Abort Message */
  1902. prAisAbortMsg = (P_MSG_AIS_ABORT_T) cnmMemAlloc(prAdapter, RAM_TYPE_MSG, sizeof(MSG_AIS_ABORT_T));
  1903. if (!prAisAbortMsg) {
  1904. ASSERT(0);
  1905. return WLAN_STATUS_FAILURE;
  1906. }
  1907. prAisAbortMsg->rMsgHdr.eMsgId = MID_OID_AIS_FSM_JOIN_REQ;
  1908. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  1909. COPY_SSID(prAdapter->rWifiVar.rConnSettings.aucSSID,
  1910. prAdapter->rWifiVar.rConnSettings.ucSSIDLen, pParamSsid->aucSsid, (UINT_8) pParamSsid->u4SsidLen);
  1911. prAdapter->rWifiVar.rConnSettings.u4FreqInKHz = pParamSsid->u4CenterFreq;
  1912. if (EQUAL_SSID(prAdapter->rWlanInfo.rCurrBssId.rSsid.aucSsid,
  1913. prAdapter->rWlanInfo.rCurrBssId.rSsid.u4SsidLen, pParamSsid->aucSsid, pParamSsid->u4SsidLen)) {
  1914. prAisAbortMsg->fgDelayIndication = TRUE;
  1915. } else {
  1916. /* Update the information to CONNECTION_SETTINGS_T */
  1917. prAisAbortMsg->fgDelayIndication = FALSE;
  1918. }
  1919. DBGLOG(SCN, INFO, "SSID %s\n", prAdapter->rWifiVar.rConnSettings.aucSSID);
  1920. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prAisAbortMsg, MSG_SEND_METHOD_BUF);
  1921. return WLAN_STATUS_SUCCESS;
  1922. } /* end of wlanoidSetSsid() */
  1923. /*----------------------------------------------------------------------------*/
  1924. /*!
  1925. * \brief This routine is called to query the currently associated SSID.
  1926. *
  1927. * \param[in] prAdapter Pointer to the Adapter structure.
  1928. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  1929. * the query.
  1930. * \param[in] u4QueryBufferLen The length of the query buffer.
  1931. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1932. * bytes written into the query buffer. If the call
  1933. * failed due to invalid length of the query buffer,
  1934. * returns the amount of storage needed.
  1935. *
  1936. * \retval WLAN_STATUS_SUCCESS
  1937. * \retval WLAN_STATUS_INVALID_LENGTH
  1938. */
  1939. /*----------------------------------------------------------------------------*/
  1940. WLAN_STATUS
  1941. wlanoidQuerySsid(IN P_ADAPTER_T prAdapter,
  1942. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1943. {
  1944. P_PARAM_SSID_T prAssociatedSsid;
  1945. DEBUGFUNC("wlanoidQuerySsid");
  1946. ASSERT(prAdapter);
  1947. ASSERT(pu4QueryInfoLen);
  1948. if (u4QueryBufferLen)
  1949. ASSERT(pvQueryBuffer);
  1950. *pu4QueryInfoLen = sizeof(PARAM_SSID_T);
  1951. /* Check for query buffer length */
  1952. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  1953. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  1954. return WLAN_STATUS_INVALID_LENGTH;
  1955. }
  1956. prAssociatedSsid = (P_PARAM_SSID_T) pvQueryBuffer;
  1957. kalMemZero(prAssociatedSsid->aucSsid, sizeof(prAssociatedSsid->aucSsid));
  1958. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  1959. prAssociatedSsid->u4SsidLen = prAdapter->rWlanInfo.rCurrBssId.rSsid.u4SsidLen;
  1960. if (prAssociatedSsid->u4SsidLen) {
  1961. kalMemCopy(prAssociatedSsid->aucSsid,
  1962. prAdapter->rWlanInfo.rCurrBssId.rSsid.aucSsid, prAssociatedSsid->u4SsidLen);
  1963. }
  1964. } else {
  1965. prAssociatedSsid->u4SsidLen = 0;
  1966. DBGLOG(OID, TRACE, "Null SSID\n");
  1967. }
  1968. return WLAN_STATUS_SUCCESS;
  1969. } /* wlanoidQuerySsid */
  1970. /*----------------------------------------------------------------------------*/
  1971. /*!
  1972. * \brief This routine is called to query the current 802.11 network type.
  1973. *
  1974. * \param[in] prAdapter Pointer to the Adapter structure.
  1975. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  1976. * the query.
  1977. * \param[in] u4QueryBufferLen The length of the query buffer.
  1978. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  1979. * bytes written into the query buffer. If the call
  1980. * failed due to invalid length of the query buffer,
  1981. * returns the amount of storage needed.
  1982. *
  1983. * \retval WLAN_STATUS_SUCCESS
  1984. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  1985. */
  1986. /*----------------------------------------------------------------------------*/
  1987. WLAN_STATUS
  1988. wlanoidQueryInfrastructureMode(IN P_ADAPTER_T prAdapter,
  1989. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  1990. {
  1991. DEBUGFUNC("wlanoidQueryInfrastructureMode");
  1992. ASSERT(prAdapter);
  1993. ASSERT(pu4QueryInfoLen);
  1994. *pu4QueryInfoLen = sizeof(ENUM_PARAM_OP_MODE_T);
  1995. if (u4QueryBufferLen < sizeof(ENUM_PARAM_OP_MODE_T))
  1996. return WLAN_STATUS_BUFFER_TOO_SHORT;
  1997. if (u4QueryBufferLen)
  1998. ASSERT(pvQueryBuffer);
  1999. *(P_ENUM_PARAM_OP_MODE_T) pvQueryBuffer = prAdapter->rWifiVar.rConnSettings.eOPMode;
  2000. /*
  2001. ** According to OID_802_11_INFRASTRUCTURE_MODE
  2002. ** If there is no prior OID_802_11_INFRASTRUCTURE_MODE,
  2003. ** NDIS_STATUS_ADAPTER_NOT_READY shall be returned.
  2004. */
  2005. #if DBG
  2006. switch (*(P_ENUM_PARAM_OP_MODE_T) pvQueryBuffer) {
  2007. case NET_TYPE_IBSS:
  2008. DBGLOG(OID, INFO, "IBSS mode\n");
  2009. break;
  2010. case NET_TYPE_INFRA:
  2011. DBGLOG(OID, INFO, "Infrastructure mode\n");
  2012. break;
  2013. default:
  2014. DBGLOG(OID, INFO, "Automatic mode\n");
  2015. }
  2016. #endif
  2017. return WLAN_STATUS_SUCCESS;
  2018. } /* wlanoidQueryInfrastructureMode */
  2019. /*----------------------------------------------------------------------------*/
  2020. /*!
  2021. * \brief This routine is called to set mode to infrastructure or
  2022. * IBSS, or automatic switch between the two.
  2023. *
  2024. * \param[in] prAdapter Pointer to the Adapter structure.
  2025. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  2026. * \param[in] u4SetBufferLen The length of the set buffer.
  2027. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2028. * bytes read from the set buffer. If the call failed due to invalid
  2029. * length of the set buffer, returns the amount of storage needed.
  2030. *
  2031. * \retval WLAN_STATUS_SUCCESS
  2032. * \retval WLAN_STATUS_INVALID_DATA
  2033. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2034. * \retval WLAN_STATUS_INVALID_LENGTH
  2035. */
  2036. /*----------------------------------------------------------------------------*/
  2037. WLAN_STATUS
  2038. wlanoidSetInfrastructureMode(IN P_ADAPTER_T prAdapter,
  2039. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2040. {
  2041. P_GLUE_INFO_T prGlueInfo;
  2042. ENUM_PARAM_OP_MODE_T eOpMode;
  2043. DEBUGFUNC("wlanoidSetInfrastructureMode");
  2044. ASSERT(prAdapter);
  2045. ASSERT(pvSetBuffer);
  2046. ASSERT(pu4SetInfoLen);
  2047. prGlueInfo = prAdapter->prGlueInfo;
  2048. if (u4SetBufferLen < sizeof(ENUM_PARAM_OP_MODE_T))
  2049. return WLAN_STATUS_BUFFER_TOO_SHORT;
  2050. *pu4SetInfoLen = sizeof(ENUM_PARAM_OP_MODE_T);
  2051. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2052. DBGLOG(OID, WARN, "Fail in set infrastructure mode! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2053. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2054. return WLAN_STATUS_ADAPTER_NOT_READY;
  2055. }
  2056. eOpMode = *(P_ENUM_PARAM_OP_MODE_T) pvSetBuffer;
  2057. /* Verify the new infrastructure mode. */
  2058. if (eOpMode >= NET_TYPE_NUM) {
  2059. DBGLOG(OID, TRACE, "Invalid mode value %d\n", eOpMode);
  2060. return WLAN_STATUS_INVALID_DATA;
  2061. }
  2062. /* check if possible to switch to AdHoc mode */
  2063. if (eOpMode == NET_TYPE_IBSS || eOpMode == NET_TYPE_DEDICATED_IBSS) {
  2064. if (cnmAisIbssIsPermitted(prAdapter) == FALSE) {
  2065. DBGLOG(OID, TRACE, "Mode value %d unallowed\n", eOpMode);
  2066. return WLAN_STATUS_FAILURE;
  2067. }
  2068. }
  2069. /* Save the new infrastructure mode setting. */
  2070. prAdapter->rWifiVar.rConnSettings.eOPMode = eOpMode;
  2071. /* Clean up the Tx key flag */
  2072. prAdapter->rWifiVar.rAisSpecificBssInfo.fgTransmitKeyExist = FALSE;
  2073. prAdapter->rWifiVar.rConnSettings.fgWapiMode = FALSE;
  2074. #if CFG_SUPPORT_WAPI
  2075. prAdapter->prGlueInfo->u2WapiAssocInfoIESz = 0;
  2076. kalMemZero(&prAdapter->prGlueInfo->aucWapiAssocInfoIEs, 42);
  2077. #endif
  2078. #if CFG_SUPPORT_802_11W
  2079. prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = FALSE;
  2080. prAdapter->rWifiVar.rAisSpecificBssInfo.fgBipKeyInstalled = FALSE;
  2081. #endif
  2082. #if CFG_SUPPORT_WPS2
  2083. kalMemZero(&prAdapter->prGlueInfo->aucWSCAssocInfoIE, 200);
  2084. prAdapter->prGlueInfo->u2WSCAssocInfoIELen = 0;
  2085. #endif
  2086. return wlanSendSetQueryCmd(prAdapter,
  2087. CMD_ID_INFRASTRUCTURE,
  2088. TRUE,
  2089. FALSE,
  2090. TRUE,
  2091. nicCmdEventSetCommon, nicOidCmdTimeoutCommon, 0, NULL, pvSetBuffer, u4SetBufferLen);
  2092. } /* wlanoidSetInfrastructureMode */
  2093. /*----------------------------------------------------------------------------*/
  2094. /*!
  2095. * \brief This routine is called to query the current 802.11 authentication
  2096. * mode.
  2097. *
  2098. * \param[in] prAdapter Pointer to the Adapter structure.
  2099. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  2100. * the query.
  2101. * \param[in] u4QueryBufferLen The length of the query buffer.
  2102. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  2103. * bytes written into the query buffer. If the call
  2104. * failed due to invalid length of the query buffer,
  2105. * returns the amount of storage needed.
  2106. *
  2107. * \retval WLAN_STATUS_SUCCESS
  2108. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  2109. */
  2110. /*----------------------------------------------------------------------------*/
  2111. WLAN_STATUS
  2112. wlanoidQueryAuthMode(IN P_ADAPTER_T prAdapter,
  2113. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  2114. {
  2115. DEBUGFUNC("wlanoidQueryAuthMode");
  2116. ASSERT(prAdapter);
  2117. if (u4QueryBufferLen)
  2118. ASSERT(pvQueryBuffer);
  2119. ASSERT(pu4QueryInfoLen);
  2120. *pu4QueryInfoLen = sizeof(ENUM_PARAM_AUTH_MODE_T);
  2121. if (u4QueryBufferLen < sizeof(ENUM_PARAM_AUTH_MODE_T))
  2122. return WLAN_STATUS_BUFFER_TOO_SHORT;
  2123. *(P_ENUM_PARAM_AUTH_MODE_T) pvQueryBuffer = prAdapter->rWifiVar.rConnSettings.eAuthMode;
  2124. #if DBG
  2125. switch (*(P_ENUM_PARAM_AUTH_MODE_T) pvQueryBuffer) {
  2126. case AUTH_MODE_OPEN:
  2127. DBGLOG(OID, INFO, "Current auth mode: Open\n");
  2128. break;
  2129. case AUTH_MODE_SHARED:
  2130. DBGLOG(OID, INFO, "Current auth mode: Shared\n");
  2131. break;
  2132. case AUTH_MODE_AUTO_SWITCH:
  2133. DBGLOG(OID, INFO, "Current auth mode: Auto-switch\n");
  2134. break;
  2135. case AUTH_MODE_WPA:
  2136. DBGLOG(OID, INFO, "Current auth mode: WPA\n");
  2137. break;
  2138. case AUTH_MODE_WPA_PSK:
  2139. DBGLOG(OID, INFO, "Current auth mode: WPA PSK\n");
  2140. break;
  2141. case AUTH_MODE_WPA_NONE:
  2142. DBGLOG(OID, INFO, "Current auth mode: WPA None\n");
  2143. break;
  2144. case AUTH_MODE_WPA2:
  2145. DBGLOG(OID, INFO, "Current auth mode: WPA2\n");
  2146. break;
  2147. case AUTH_MODE_WPA2_PSK:
  2148. DBGLOG(OID, INFO, "Current auth mode: WPA2 PSK\n");
  2149. break;
  2150. default:
  2151. DBGLOG(OID, INFO, "Current auth mode: %d\n", *(P_ENUM_PARAM_AUTH_MODE_T) pvQueryBuffer);
  2152. break;
  2153. }
  2154. #endif
  2155. return WLAN_STATUS_SUCCESS;
  2156. } /* wlanoidQueryAuthMode */
  2157. /*----------------------------------------------------------------------------*/
  2158. /*!
  2159. * \brief This routine is called to set the IEEE 802.11 authentication mode
  2160. * to the driver.
  2161. *
  2162. * \param[in] prAdapter Pointer to the Adapter structure.
  2163. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2164. * \param[in] u4SetBufferLen The length of the set buffer.
  2165. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2166. * bytes read from the set buffer. If the call failed
  2167. * due to invalid length of the set buffer, returns
  2168. * the amount of storage needed.
  2169. *
  2170. * \retval WLAN_STATUS_SUCCESS
  2171. * \retval WLAN_STATUS_INVALID_DATA
  2172. * \retval WLAN_STATUS_INVALID_LENGTH
  2173. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2174. * \retval WLAN_STATUS_NOT_ACCEPTED
  2175. */
  2176. /*----------------------------------------------------------------------------*/
  2177. WLAN_STATUS
  2178. wlanoidSetAuthMode(IN P_ADAPTER_T prAdapter,
  2179. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2180. {
  2181. P_GLUE_INFO_T prGlueInfo;
  2182. UINT_32 i, u4AkmSuite;
  2183. P_DOT11_RSNA_CONFIG_AUTHENTICATION_SUITES_ENTRY prEntry;
  2184. DEBUGFUNC("wlanoidSetAuthMode");
  2185. ASSERT(prAdapter);
  2186. ASSERT(pu4SetInfoLen);
  2187. ASSERT(pvSetBuffer);
  2188. prGlueInfo = prAdapter->prGlueInfo;
  2189. *pu4SetInfoLen = sizeof(ENUM_PARAM_AUTH_MODE_T);
  2190. if (u4SetBufferLen < sizeof(ENUM_PARAM_AUTH_MODE_T))
  2191. return WLAN_STATUS_INVALID_LENGTH;
  2192. /* RF Test */
  2193. /* if (IS_ARB_IN_RFTEST_STATE(prAdapter)) { */
  2194. /* return WLAN_STATUS_SUCCESS; */
  2195. /* } */
  2196. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2197. DBGLOG(OID, WARN, "Fail in set Authentication mode! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2198. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2199. return WLAN_STATUS_ADAPTER_NOT_READY;
  2200. }
  2201. /* Check if the new authentication mode is valid. */
  2202. if (*(P_ENUM_PARAM_AUTH_MODE_T) pvSetBuffer >= AUTH_MODE_NUM) {
  2203. DBGLOG(OID, TRACE, "Invalid auth mode %d\n", *(P_ENUM_PARAM_AUTH_MODE_T) pvSetBuffer);
  2204. return WLAN_STATUS_INVALID_DATA;
  2205. }
  2206. switch (*(P_ENUM_PARAM_AUTH_MODE_T) pvSetBuffer) {
  2207. case AUTH_MODE_WPA:
  2208. case AUTH_MODE_WPA_PSK:
  2209. case AUTH_MODE_WPA2:
  2210. case AUTH_MODE_WPA2_PSK:
  2211. /* infrastructure mode only */
  2212. if (prAdapter->rWifiVar.rConnSettings.eOPMode != NET_TYPE_INFRA)
  2213. return WLAN_STATUS_NOT_ACCEPTED;
  2214. break;
  2215. case AUTH_MODE_WPA_NONE:
  2216. /* ad hoc mode only */
  2217. if (prAdapter->rWifiVar.rConnSettings.eOPMode != NET_TYPE_IBSS)
  2218. return WLAN_STATUS_NOT_ACCEPTED;
  2219. break;
  2220. default:
  2221. break;
  2222. }
  2223. /* Save the new authentication mode. */
  2224. prAdapter->rWifiVar.rConnSettings.eAuthMode = *(P_ENUM_PARAM_AUTH_MODE_T) pvSetBuffer;
  2225. #if DBG
  2226. switch (prAdapter->rWifiVar.rConnSettings.eAuthMode) {
  2227. case AUTH_MODE_OPEN:
  2228. DBGLOG(RSN, TRACE, "New auth mode: open\n");
  2229. break;
  2230. case AUTH_MODE_SHARED:
  2231. DBGLOG(RSN, TRACE, "New auth mode: shared\n");
  2232. break;
  2233. case AUTH_MODE_AUTO_SWITCH:
  2234. DBGLOG(RSN, TRACE, "New auth mode: auto-switch\n");
  2235. break;
  2236. case AUTH_MODE_WPA:
  2237. DBGLOG(RSN, TRACE, "New auth mode: WPA\n");
  2238. break;
  2239. case AUTH_MODE_WPA_PSK:
  2240. DBGLOG(RSN, TRACE, "New auth mode: WPA PSK\n");
  2241. break;
  2242. case AUTH_MODE_WPA_NONE:
  2243. DBGLOG(RSN, TRACE, "New auth mode: WPA None\n");
  2244. break;
  2245. case AUTH_MODE_WPA2:
  2246. DBGLOG(RSN, TRACE, "New auth mode: WPA2\n");
  2247. break;
  2248. case AUTH_MODE_WPA2_PSK:
  2249. DBGLOG(RSN, TRACE, "New auth mode: WPA2 PSK\n");
  2250. break;
  2251. default:
  2252. DBGLOG(RSN, TRACE, "New auth mode: unknown (%d)\n", prAdapter->rWifiVar.rConnSettings.eAuthMode);
  2253. }
  2254. #endif
  2255. if (prAdapter->rWifiVar.rConnSettings.eAuthMode >= AUTH_MODE_WPA) {
  2256. switch (prAdapter->rWifiVar.rConnSettings.eAuthMode) {
  2257. case AUTH_MODE_WPA:
  2258. u4AkmSuite = WPA_AKM_SUITE_802_1X;
  2259. break;
  2260. case AUTH_MODE_WPA_PSK:
  2261. u4AkmSuite = WPA_AKM_SUITE_PSK;
  2262. break;
  2263. case AUTH_MODE_WPA_NONE:
  2264. u4AkmSuite = WPA_AKM_SUITE_NONE;
  2265. break;
  2266. case AUTH_MODE_WPA2:
  2267. u4AkmSuite = RSN_AKM_SUITE_802_1X;
  2268. break;
  2269. case AUTH_MODE_WPA2_PSK:
  2270. u4AkmSuite = RSN_AKM_SUITE_PSK;
  2271. break;
  2272. default:
  2273. u4AkmSuite = 0;
  2274. }
  2275. } else {
  2276. u4AkmSuite = 0;
  2277. }
  2278. /* Enable the specific AKM suite only. */
  2279. for (i = 0; i < MAX_NUM_SUPPORTED_AKM_SUITES; i++) {
  2280. prEntry = &prAdapter->rMib.dot11RSNAConfigAuthenticationSuitesTable[i];
  2281. if (prEntry->dot11RSNAConfigAuthenticationSuite == u4AkmSuite)
  2282. prEntry->dot11RSNAConfigAuthenticationSuiteEnabled = TRUE;
  2283. else
  2284. prEntry->dot11RSNAConfigAuthenticationSuiteEnabled = FALSE;
  2285. #if CFG_SUPPORT_802_11W
  2286. if (kalGetMfpSetting(prAdapter->prGlueInfo) != RSN_AUTH_MFP_DISABLED) {
  2287. if ((u4AkmSuite == RSN_AKM_SUITE_PSK) &&
  2288. prEntry->dot11RSNAConfigAuthenticationSuite == RSN_AKM_SUITE_PSK_SHA256) {
  2289. DBGLOG(RSN, TRACE, "Enable RSN_AKM_SUITE_PSK_SHA256 AKM support\n");
  2290. prEntry->dot11RSNAConfigAuthenticationSuiteEnabled = TRUE;
  2291. }
  2292. if ((u4AkmSuite == RSN_AKM_SUITE_802_1X) &&
  2293. prEntry->dot11RSNAConfigAuthenticationSuite == RSN_AKM_SUITE_802_1X_SHA256) {
  2294. DBGLOG(RSN, TRACE, "Enable RSN_AKM_SUITE_802_1X_SHA256 AKM support\n");
  2295. prEntry->dot11RSNAConfigAuthenticationSuiteEnabled = TRUE;
  2296. }
  2297. }
  2298. #endif
  2299. }
  2300. return WLAN_STATUS_SUCCESS;
  2301. } /* wlanoidSetAuthMode */
  2302. #if 0
  2303. /*----------------------------------------------------------------------------*/
  2304. /*!
  2305. * \brief This routine is called to query the current 802.11 privacy filter
  2306. *
  2307. * \param[in] prAdapter Pointer to the Adapter structure.
  2308. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  2309. * the query.
  2310. * \param[in] u4QueryBufferLen The length of the query buffer.
  2311. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  2312. * bytes written into the query buffer. If the call
  2313. * failed due to invalid length of the query buffer,
  2314. * returns the amount of storage needed.
  2315. *
  2316. * \retval WLAN_STATUS_SUCCESS
  2317. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  2318. */
  2319. /*----------------------------------------------------------------------------*/
  2320. WLAN_STATUS
  2321. wlanoidQueryPrivacyFilter(IN P_ADAPTER_T prAdapter,
  2322. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  2323. {
  2324. DEBUGFUNC("wlanoidQueryPrivacyFilter");
  2325. ASSERT(prAdapter);
  2326. ASSERT(pvQueryBuffer);
  2327. ASSERT(pu4QueryInfoLen);
  2328. *pu4QueryInfoLen = sizeof(ENUM_PARAM_PRIVACY_FILTER_T);
  2329. if (u4QueryBufferLen < sizeof(ENUM_PARAM_PRIVACY_FILTER_T))
  2330. return WLAN_STATUS_BUFFER_TOO_SHORT;
  2331. *(P_ENUM_PARAM_PRIVACY_FILTER_T) pvQueryBuffer = prAdapter->rWlanInfo.ePrivacyFilter;
  2332. #if DBG
  2333. switch (*(P_ENUM_PARAM_PRIVACY_FILTER_T) pvQueryBuffer) {
  2334. case PRIVACY_FILTER_ACCEPT_ALL:
  2335. DBGLOG(OID, INFO, "Current privacy mode: open mode\n");
  2336. break;
  2337. case PRIVACY_FILTER_8021xWEP:
  2338. DBGLOG(OID, INFO, "Current privacy mode: filtering mode\n");
  2339. break;
  2340. default:
  2341. DBGLOG(OID, INFO, "Current auth mode: %d\n", *(P_ENUM_PARAM_AUTH_MODE_T) pvQueryBuffer);
  2342. }
  2343. #endif
  2344. return WLAN_STATUS_SUCCESS;
  2345. } /* wlanoidQueryPrivacyFilter */
  2346. /*----------------------------------------------------------------------------*/
  2347. /*!
  2348. * \brief This routine is called to set the IEEE 802.11 privacy filter
  2349. * to the driver.
  2350. *
  2351. * \param[in] prAdapter Pointer to the Adapter structure.
  2352. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2353. * \param[in] u4SetBufferLen The length of the set buffer.
  2354. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2355. * bytes read from the set buffer. If the call failed
  2356. * due to invalid length of the set buffer, returns
  2357. * the amount of storage needed.
  2358. *
  2359. * \retval WLAN_STATUS_SUCCESS
  2360. * \retval WLAN_STATUS_INVALID_DATA
  2361. * \retval WLAN_STATUS_INVALID_LENGTH
  2362. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2363. * \retval WLAN_STATUS_NOT_ACCEPTED
  2364. */
  2365. /*----------------------------------------------------------------------------*/
  2366. WLAN_STATUS
  2367. wlanoidSetPrivacyFilter(IN P_ADAPTER_T prAdapter,
  2368. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2369. {
  2370. P_GLUE_INFO_T prGlueInfo;
  2371. DEBUGFUNC("wlanoidSetPrivacyFilter");
  2372. ASSERT(prAdapter);
  2373. ASSERT(pu4SetInfoLen);
  2374. ASSERT(pvSetBuffer);
  2375. prGlueInfo = prAdapter->prGlueInfo;
  2376. *pu4SetInfoLen = sizeof(ENUM_PARAM_PRIVACY_FILTER_T);
  2377. if (u4SetBufferLen < sizeof(ENUM_PARAM_PRIVACY_FILTER_T))
  2378. return WLAN_STATUS_INVALID_LENGTH;
  2379. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2380. DBGLOG(OID, WARN, "Fail in set Authentication mode! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2381. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2382. return WLAN_STATUS_ADAPTER_NOT_READY;
  2383. }
  2384. /* Check if the new authentication mode is valid. */
  2385. if (*(P_ENUM_PARAM_PRIVACY_FILTER_T) pvSetBuffer >= PRIVACY_FILTER_NUM) {
  2386. DBGLOG(OID, TRACE, "Invalid privacy filter %d\n", *(P_ENUM_PARAM_PRIVACY_FILTER_T) pvSetBuffer);
  2387. return WLAN_STATUS_INVALID_DATA;
  2388. }
  2389. switch (*(P_ENUM_PARAM_PRIVACY_FILTER_T) pvSetBuffer) {
  2390. default:
  2391. break;
  2392. }
  2393. /* Save the new authentication mode. */
  2394. prAdapter->rWlanInfo.ePrivacyFilter = *(ENUM_PARAM_PRIVACY_FILTER_T) pvSetBuffer;
  2395. return WLAN_STATUS_SUCCESS;
  2396. } /* wlanoidSetPrivacyFilter */
  2397. #endif
  2398. /*----------------------------------------------------------------------------*/
  2399. /*!
  2400. * \brief This routine is called to reload the available default settings for
  2401. * the specified type field.
  2402. *
  2403. * \param[in] prAdapter Pointer to the Adapter structure.
  2404. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2405. * \param[in] u4SetBufferLen The length of the set buffer.
  2406. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2407. * bytes read from the set buffer. If the call failed
  2408. * due to invalid length of the set buffer, returns
  2409. * the amount of storage needed.
  2410. *
  2411. * \retval WLAN_STATUS_SUCCESS
  2412. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2413. * \retval WLAN_STATUS_INVALID_DATA
  2414. */
  2415. /*----------------------------------------------------------------------------*/
  2416. WLAN_STATUS
  2417. wlanoidSetReloadDefaults(IN P_ADAPTER_T prAdapter,
  2418. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2419. {
  2420. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  2421. ENUM_PARAM_NETWORK_TYPE_T eNetworkType;
  2422. UINT_32 u4Len;
  2423. UINT_8 ucCmdSeqNum;
  2424. DEBUGFUNC("wlanoidSetReloadDefaults");
  2425. ASSERT(prAdapter);
  2426. ASSERT(pu4SetInfoLen);
  2427. *pu4SetInfoLen = sizeof(PARAM_RELOAD_DEFAULTS);
  2428. /* if (IS_ARB_IN_RFTEST_STATE(prAdapter)) { */
  2429. /* return WLAN_STATUS_SUCCESS; */
  2430. /* } */
  2431. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2432. DBGLOG(OID, WARN, "Fail in set Reload default! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2433. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2434. return WLAN_STATUS_ADAPTER_NOT_READY;
  2435. }
  2436. ASSERT(pvSetBuffer);
  2437. /* Verify the available reload options and reload the settings. */
  2438. switch (*(P_PARAM_RELOAD_DEFAULTS) pvSetBuffer) {
  2439. case ENUM_RELOAD_WEP_KEYS:
  2440. /* Reload available default WEP keys from the permanent
  2441. storage. */
  2442. prAdapter->rWifiVar.rConnSettings.eAuthMode = AUTH_MODE_OPEN;
  2443. /* ENUM_ENCRYPTION_DISABLED; */
  2444. prAdapter->rWifiVar.rConnSettings.eEncStatus = ENUM_ENCRYPTION1_KEY_ABSENT;
  2445. {
  2446. P_GLUE_INFO_T prGlueInfo;
  2447. P_CMD_INFO_T prCmdInfo;
  2448. P_WIFI_CMD_T prWifiCmd;
  2449. P_CMD_802_11_KEY prCmdKey;
  2450. UINT_8 aucBCAddr[] = BC_MAC_ADDR;
  2451. prGlueInfo = prAdapter->prGlueInfo;
  2452. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + sizeof(CMD_802_11_KEY)));
  2453. if (!prCmdInfo) {
  2454. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  2455. return WLAN_STATUS_FAILURE;
  2456. }
  2457. /* increase command sequence number */
  2458. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  2459. /* compose CMD_802_11_KEY cmd pkt */
  2460. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  2461. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  2462. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_802_11_KEY);
  2463. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  2464. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  2465. prCmdInfo->fgIsOid = TRUE;
  2466. prCmdInfo->ucCID = CMD_ID_ADD_REMOVE_KEY;
  2467. prCmdInfo->fgSetQuery = TRUE;
  2468. prCmdInfo->fgNeedResp = FALSE;
  2469. prCmdInfo->fgDriverDomainMCR = FALSE;
  2470. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  2471. prCmdInfo->u4SetInfoLen = sizeof(PARAM_REMOVE_KEY_T);
  2472. prCmdInfo->pvInformationBuffer = pvSetBuffer;
  2473. prCmdInfo->u4InformationBufferLength = u4SetBufferLen;
  2474. /* Setup WIFI_CMD_T */
  2475. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  2476. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  2477. prWifiCmd->ucCID = prCmdInfo->ucCID;
  2478. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  2479. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  2480. prCmdKey = (P_CMD_802_11_KEY) (prWifiCmd->aucBuffer);
  2481. kalMemZero((PUINT_8) prCmdKey, sizeof(CMD_802_11_KEY));
  2482. prCmdKey->ucAddRemove = 0; /* Remove */
  2483. prCmdKey->ucKeyId = 0; /* (UINT_8)(prRemovedKey->u4KeyIndex & 0x000000ff); */
  2484. kalMemCopy(prCmdKey->aucPeerAddr, aucBCAddr, MAC_ADDR_LEN);
  2485. ASSERT(prCmdKey->ucKeyId < MAX_KEY_NUM);
  2486. prCmdKey->ucKeyType = 0;
  2487. /* insert into prCmdQueue */
  2488. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  2489. /* wakeup txServiceThread later */
  2490. GLUE_SET_EVENT(prGlueInfo);
  2491. return WLAN_STATUS_PENDING;
  2492. }
  2493. break;
  2494. default:
  2495. DBGLOG(OID, TRACE, "Invalid reload option %d\n", *(P_PARAM_RELOAD_DEFAULTS) pvSetBuffer);
  2496. rStatus = WLAN_STATUS_INVALID_DATA;
  2497. }
  2498. /* OID_802_11_RELOAD_DEFAULTS requiest to reset to auto mode */
  2499. eNetworkType = PARAM_NETWORK_TYPE_AUTOMODE;
  2500. wlanoidSetNetworkTypeInUse(prAdapter, &eNetworkType, sizeof(eNetworkType), &u4Len);
  2501. return rStatus;
  2502. } /* wlanoidSetReloadDefaults */
  2503. /*----------------------------------------------------------------------------*/
  2504. /*!
  2505. * \brief This routine is called to set a WEP key to the driver.
  2506. *
  2507. * \param[in] prAdapter Pointer to the Adapter structure.
  2508. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2509. * \param[in] u4SetBufferLen The length of the set buffer.
  2510. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2511. * bytes read from the set buffer. If the call failed
  2512. * due to invalid length of the set buffer, returns
  2513. * the amount of storage needed.
  2514. *
  2515. * \retval WLAN_STATUS_SUCCESS
  2516. * \retval WLAN_STATUS_INVALID_LENGTH
  2517. * \retval WLAN_STATUS_INVALID_DATA
  2518. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2519. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  2520. */
  2521. /*----------------------------------------------------------------------------*/
  2522. #ifdef LINUX
  2523. UINT_8 keyBuffer[sizeof(PARAM_KEY_T) + 16 /* LEGACY_KEY_MAX_LEN */];
  2524. UINT_8 aucBCAddr[] = BC_MAC_ADDR;
  2525. #endif
  2526. WLAN_STATUS
  2527. wlanoidSetAddWep(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2528. {
  2529. #ifndef LINUX
  2530. UINT_8 keyBuffer[sizeof(PARAM_KEY_T) + 16 /* LEGACY_KEY_MAX_LEN */];
  2531. UINT_8 aucBCAddr[] = BC_MAC_ADDR;
  2532. #endif
  2533. P_PARAM_WEP_T prNewWepKey;
  2534. P_PARAM_KEY_T prParamKey = (P_PARAM_KEY_T) keyBuffer;
  2535. UINT_32 u4KeyId, u4SetLen;
  2536. DEBUGFUNC("wlanoidSetAddWep");
  2537. ASSERT(prAdapter);
  2538. *pu4SetInfoLen = OFFSET_OF(PARAM_WEP_T, aucKeyMaterial);
  2539. if (u4SetBufferLen < OFFSET_OF(PARAM_WEP_T, aucKeyMaterial)) {
  2540. ASSERT(pu4SetInfoLen);
  2541. return WLAN_STATUS_BUFFER_TOO_SHORT;
  2542. }
  2543. ASSERT(pvSetBuffer);
  2544. ASSERT(pu4SetInfoLen);
  2545. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2546. DBGLOG(OID, WARN, "Fail in set add WEP! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2547. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2548. return WLAN_STATUS_ADAPTER_NOT_READY;
  2549. }
  2550. prNewWepKey = (P_PARAM_WEP_T) pvSetBuffer;
  2551. /* Verify the total buffer for minimum length. */
  2552. if (u4SetBufferLen < OFFSET_OF(PARAM_WEP_T, aucKeyMaterial) + prNewWepKey->u4KeyLength) {
  2553. DBGLOG(OID, WARN, "Invalid total buffer length (%d) than minimum length (%d)\n",
  2554. (UINT_8) u4SetBufferLen, (UINT_8) OFFSET_OF(PARAM_WEP_T, aucKeyMaterial));
  2555. *pu4SetInfoLen = OFFSET_OF(PARAM_WEP_T, aucKeyMaterial);
  2556. return WLAN_STATUS_INVALID_DATA;
  2557. }
  2558. /* Verify the key structure length. */
  2559. if (prNewWepKey->u4Length > u4SetBufferLen) {
  2560. DBGLOG(OID, WARN, "Invalid key structure length (%d) greater than total buffer length (%d)\n",
  2561. (UINT_8) prNewWepKey->u4Length, (UINT_8) u4SetBufferLen);
  2562. *pu4SetInfoLen = u4SetBufferLen;
  2563. return WLAN_STATUS_INVALID_DATA;
  2564. }
  2565. /* Verify the key material length for maximum key material length:16 */
  2566. if (prNewWepKey->u4KeyLength > 16 /* LEGACY_KEY_MAX_LEN */) {
  2567. DBGLOG(OID, WARN, "Invalid key material length (%d) greater than maximum key material length (16)\n",
  2568. (UINT_8) prNewWepKey->u4KeyLength);
  2569. *pu4SetInfoLen = u4SetBufferLen;
  2570. return WLAN_STATUS_INVALID_DATA;
  2571. }
  2572. *pu4SetInfoLen = u4SetBufferLen;
  2573. u4KeyId = prNewWepKey->u4KeyIndex & BITS(0, 29) /* WEP_KEY_ID_FIELD */;
  2574. /* Verify whether key index is valid or not, current version
  2575. driver support only 4 global WEP keys setting by this OID */
  2576. if (u4KeyId > MAX_KEY_NUM - 1) {
  2577. DBGLOG(OID, ERROR, "Error, invalid WEP key ID: %d\n", (UINT_8) u4KeyId);
  2578. return WLAN_STATUS_INVALID_DATA;
  2579. }
  2580. prParamKey->u4KeyIndex = u4KeyId;
  2581. /* Transmit key */
  2582. if (prNewWepKey->u4KeyIndex & IS_TRANSMIT_KEY)
  2583. prParamKey->u4KeyIndex |= IS_TRANSMIT_KEY;
  2584. /* Per client key */
  2585. if (prNewWepKey->u4KeyIndex & IS_UNICAST_KEY)
  2586. prParamKey->u4KeyIndex |= IS_UNICAST_KEY;
  2587. prParamKey->u4KeyLength = prNewWepKey->u4KeyLength;
  2588. kalMemCopy(prParamKey->arBSSID, aucBCAddr, MAC_ADDR_LEN);
  2589. kalMemCopy(prParamKey->aucKeyMaterial, prNewWepKey->aucKeyMaterial, prNewWepKey->u4KeyLength);
  2590. prParamKey->u4Length = OFFSET_OF(PARAM_KEY_T, aucKeyMaterial) + prNewWepKey->u4KeyLength;
  2591. wlanoidSetAddKey(prAdapter, (PVOID) prParamKey, prParamKey->u4Length, &u4SetLen);
  2592. return WLAN_STATUS_PENDING;
  2593. } /* wlanoidSetAddWep */
  2594. /*----------------------------------------------------------------------------*/
  2595. /*!
  2596. * \brief This routine is called to request the driver to remove the WEP key
  2597. * at the specified key index.
  2598. *
  2599. * \param[in] prAdapter Pointer to the Adapter structure.
  2600. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2601. * \param[in] u4SetBufferLen The length of the set buffer.
  2602. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2603. * bytes read from the set buffer. If the call failed
  2604. * due to invalid length of the set buffer, returns
  2605. * the amount of storage needed.
  2606. *
  2607. * \retval WLAN_STATUS_SUCCESS
  2608. * \retval WLAN_STATUS_INVALID_DATA
  2609. * \retval WLAN_STATUS_INVALID_LENGTH
  2610. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2611. */
  2612. /*----------------------------------------------------------------------------*/
  2613. WLAN_STATUS
  2614. wlanoidSetRemoveWep(IN P_ADAPTER_T prAdapter,
  2615. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2616. {
  2617. UINT_32 u4KeyId, u4SetLen;
  2618. PARAM_REMOVE_KEY_T rRemoveKey;
  2619. UINT_8 aucBCAddr[] = BC_MAC_ADDR;
  2620. DEBUGFUNC("wlanoidSetRemoveWep");
  2621. ASSERT(prAdapter);
  2622. ASSERT(pu4SetInfoLen);
  2623. *pu4SetInfoLen = sizeof(PARAM_KEY_INDEX);
  2624. if (u4SetBufferLen < sizeof(PARAM_KEY_INDEX))
  2625. return WLAN_STATUS_INVALID_LENGTH;
  2626. ASSERT(pvSetBuffer);
  2627. u4KeyId = *(PUINT_32) pvSetBuffer;
  2628. /* Dump PARAM_WEP content. */
  2629. DBGLOG(OID, INFO, "Set: Dump PARAM_KEY_INDEX content\n");
  2630. DBGLOG(OID, INFO, "Index : 0x%08x\n", u4KeyId);
  2631. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2632. DBGLOG(OID, WARN, "Fail in set remove WEP! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2633. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2634. return WLAN_STATUS_ADAPTER_NOT_READY;
  2635. }
  2636. if (u4KeyId & IS_TRANSMIT_KEY) {
  2637. /* Bit 31 should not be set */
  2638. DBGLOG(OID, ERROR, "Invalid WEP key index: 0x%08x\n", u4KeyId);
  2639. return WLAN_STATUS_INVALID_DATA;
  2640. }
  2641. u4KeyId &= BITS(0, 7);
  2642. /* Verify whether key index is valid or not. Current version
  2643. driver support only 4 global WEP keys. */
  2644. if (u4KeyId > MAX_KEY_NUM - 1) {
  2645. DBGLOG(OID, ERROR, "invalid WEP key ID %u\n", u4KeyId);
  2646. return WLAN_STATUS_INVALID_DATA;
  2647. }
  2648. rRemoveKey.u4Length = sizeof(PARAM_REMOVE_KEY_T);
  2649. rRemoveKey.u4KeyIndex = *(PUINT_32) pvSetBuffer;
  2650. kalMemCopy(rRemoveKey.arBSSID, aucBCAddr, MAC_ADDR_LEN);
  2651. wlanoidSetRemoveKey(prAdapter, (PVOID)&rRemoveKey, sizeof(PARAM_REMOVE_KEY_T), &u4SetLen);
  2652. return WLAN_STATUS_PENDING;
  2653. } /* wlanoidSetRemoveWep */
  2654. /*----------------------------------------------------------------------------*/
  2655. /*!
  2656. * \brief This routine is called to set a key to the driver.
  2657. *
  2658. * \param[in] prAdapter Pointer to the Adapter structure.
  2659. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2660. * \param[in] u4SetBufferLen The length of the set buffer.
  2661. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2662. * bytes read from the set buffer. If the call failed
  2663. * due to invalid length of the set buffer, returns
  2664. * the amount of storage needed.
  2665. *
  2666. * \retval WLAN_STATUS_SUCCESS
  2667. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2668. * \retval WLAN_STATUS_INVALID_LENGTH
  2669. * \retval WLAN_STATUS_INVALID_DATA
  2670. *
  2671. * \note The setting buffer PARAM_KEY_T, which is set by NDIS, is unpacked.
  2672. */
  2673. /*----------------------------------------------------------------------------*/
  2674. WLAN_STATUS
  2675. _wlanoidSetAddKey(IN P_ADAPTER_T prAdapter,
  2676. IN PVOID pvSetBuffer,
  2677. IN UINT_32 u4SetBufferLen, IN BOOLEAN fgIsOid, IN UINT_8 ucAlgorithmId, OUT PUINT_32 pu4SetInfoLen)
  2678. {
  2679. P_GLUE_INFO_T prGlueInfo;
  2680. P_CMD_INFO_T prCmdInfo;
  2681. P_WIFI_CMD_T prWifiCmd;
  2682. P_PARAM_KEY_T prNewKey;
  2683. P_CMD_802_11_KEY prCmdKey;
  2684. UINT_8 ucCmdSeqNum;
  2685. #if 0
  2686. DEBUGFUNC("wlanoidSetAddKey");
  2687. DBGLOG(OID, LOUD, "\n");
  2688. ASSERT(prAdapter);
  2689. ASSERT(pvSetBuffer);
  2690. ASSERT(pu4SetInfoLen);
  2691. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2692. DBGLOG(OID, WARN, "Fail in set add key! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2693. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2694. return WLAN_STATUS_ADAPTER_NOT_READY;
  2695. }
  2696. #endif
  2697. prNewKey = (P_PARAM_KEY_T) pvSetBuffer;
  2698. #if 0
  2699. /* Verify the key structure length. */
  2700. if (prNewKey->u4Length > u4SetBufferLen) {
  2701. DBGLOG(OID, WARN, "Invalid key structure length (%d) greater than total buffer length (%d)\n",
  2702. (UINT_8) prNewKey->u4Length, (UINT_8) u4SetBufferLen);
  2703. *pu4SetInfoLen = u4SetBufferLen;
  2704. return WLAN_STATUS_INVALID_LENGTH;
  2705. }
  2706. /* Verify the key material length for key material buffer */
  2707. if (prNewKey->u4KeyLength > prNewKey->u4Length - OFFSET_OF(PARAM_KEY_T, aucKeyMaterial)) {
  2708. DBGLOG(OID, WARN, "Invalid key material length (%d)\n", (UINT_8) prNewKey->u4KeyLength);
  2709. *pu4SetInfoLen = u4SetBufferLen;
  2710. return WLAN_STATUS_INVALID_DATA;
  2711. }
  2712. /* Exception check */
  2713. if (prNewKey->u4KeyIndex & 0x0fffff00)
  2714. return WLAN_STATUS_INVALID_DATA;
  2715. /* Exception check, pairwise key must with transmit bit enabled */
  2716. if ((prNewKey->u4KeyIndex & BITS(30, 31)) == IS_UNICAST_KEY)
  2717. return WLAN_STATUS_INVALID_DATA;
  2718. if (!(prNewKey->u4KeyLength == WEP_40_LEN || prNewKey->u4KeyLength == WEP_104_LEN ||
  2719. prNewKey->u4KeyLength == CCMP_KEY_LEN || prNewKey->u4KeyLength == TKIP_KEY_LEN)) {
  2720. return WLAN_STATUS_INVALID_DATA;
  2721. }
  2722. /* Exception check, pairwise key must with transmit bit enabled */
  2723. if ((prNewKey->u4KeyIndex & BITS(30, 31)) == BITS(30, 31)) {
  2724. if (((prNewKey->u4KeyIndex & 0xff) != 0) ||
  2725. ((prNewKey->arBSSID[0] == 0xff) && (prNewKey->arBSSID[1] == 0xff) && (prNewKey->arBSSID[2] == 0xff)
  2726. && (prNewKey->arBSSID[3] == 0xff) && (prNewKey->arBSSID[4] == 0xff)
  2727. && (prNewKey->arBSSID[5] == 0xff))) {
  2728. return WLAN_STATUS_INVALID_DATA;
  2729. }
  2730. }
  2731. *pu4SetInfoLen = u4SetBufferLen;
  2732. #endif
  2733. /* Dump PARAM_KEY content. */
  2734. DBGLOG(OID, TRACE, "Set: PARAM_KEY Length: 0x%08x, Key Index: 0x%08x, Key Length: 0x%08x\n",
  2735. prNewKey->u4Length, prNewKey->u4KeyIndex, prNewKey->u4KeyLength);
  2736. DBGLOG(OID, TRACE, "BSSID:\n");
  2737. DBGLOG_MEM8(OID, TRACE, prNewKey->arBSSID, sizeof(PARAM_MAC_ADDRESS));
  2738. DBGLOG(OID, TRACE, "Key RSC:\n");
  2739. DBGLOG_MEM8(OID, TRACE, &prNewKey->rKeyRSC, sizeof(PARAM_KEY_RSC));
  2740. DBGLOG(OID, TRACE, "Key Material:\n");
  2741. DBGLOG_MEM8(OID, TRACE, prNewKey->aucKeyMaterial, prNewKey->u4KeyLength);
  2742. if (prAdapter->rWifiVar.rConnSettings.eAuthMode < AUTH_MODE_WPA) {
  2743. /* Todo:: Store the legacy wep key for OID_802_11_RELOAD_DEFAULTS */
  2744. /* Todo:: Nothing */
  2745. }
  2746. if (prNewKey->u4KeyIndex & IS_TRANSMIT_KEY)
  2747. prAdapter->rWifiVar.rAisSpecificBssInfo.fgTransmitKeyExist = TRUE;
  2748. prGlueInfo = prAdapter->prGlueInfo;
  2749. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + sizeof(CMD_802_11_KEY)));
  2750. if (!prCmdInfo) {
  2751. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  2752. return WLAN_STATUS_FAILURE;
  2753. }
  2754. /* increase command sequence number */
  2755. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  2756. DBGLOG(OID, TRACE, "ucCmdSeqNum = %d\n", ucCmdSeqNum);
  2757. /* compose CMD_802_11_KEY cmd pkt */
  2758. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  2759. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  2760. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_802_11_KEY);
  2761. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  2762. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  2763. prCmdInfo->fgIsOid = fgIsOid;
  2764. prCmdInfo->ucCID = CMD_ID_ADD_REMOVE_KEY;
  2765. prCmdInfo->fgSetQuery = TRUE;
  2766. prCmdInfo->fgNeedResp = FALSE;
  2767. prCmdInfo->fgDriverDomainMCR = FALSE;
  2768. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  2769. prCmdInfo->u4SetInfoLen = u4SetBufferLen;
  2770. prCmdInfo->pvInformationBuffer = pvSetBuffer;
  2771. prCmdInfo->u4InformationBufferLength = u4SetBufferLen;
  2772. /* Setup WIFI_CMD_T */
  2773. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  2774. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  2775. prWifiCmd->ucCID = prCmdInfo->ucCID;
  2776. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  2777. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  2778. prCmdKey = (P_CMD_802_11_KEY) (prWifiCmd->aucBuffer);
  2779. kalMemZero(prCmdKey, sizeof(CMD_802_11_KEY));
  2780. prCmdKey->ucAddRemove = 1; /* Add */
  2781. prCmdKey->ucTxKey = ((prNewKey->u4KeyIndex & IS_TRANSMIT_KEY) == IS_TRANSMIT_KEY) ? 1 : 0;
  2782. prCmdKey->ucKeyType = ((prNewKey->u4KeyIndex & IS_UNICAST_KEY) == IS_UNICAST_KEY) ? 1 : 0;
  2783. prCmdKey->ucIsAuthenticator = ((prNewKey->u4KeyIndex & IS_AUTHENTICATOR) == IS_AUTHENTICATOR) ? 1 : 0;
  2784. kalMemCopy(prCmdKey->aucPeerAddr, (PUINT_8) prNewKey->arBSSID, MAC_ADDR_LEN);
  2785. prCmdKey->ucNetType = 0; /* AIS */
  2786. prCmdKey->ucKeyId = (UINT_8) (prNewKey->u4KeyIndex & 0xff);
  2787. /* Note: adjust the key length for WPA-None */
  2788. prCmdKey->ucKeyLen = (UINT_8) prNewKey->u4KeyLength;
  2789. kalMemCopy(prCmdKey->aucKeyMaterial, (PUINT_8) prNewKey->aucKeyMaterial, prCmdKey->ucKeyLen);
  2790. if (prNewKey->u4KeyLength == 5) {
  2791. prCmdKey->ucAlgorithmId = CIPHER_SUITE_WEP40;
  2792. } else if (prNewKey->u4KeyLength == 13) {
  2793. prCmdKey->ucAlgorithmId = CIPHER_SUITE_WEP104;
  2794. } else if (prNewKey->u4KeyLength == 16) {
  2795. if ((ucAlgorithmId != CIPHER_SUITE_CCMP) &&
  2796. (prAdapter->rWifiVar.rConnSettings.eAuthMode < AUTH_MODE_WPA))
  2797. prCmdKey->ucAlgorithmId = CIPHER_SUITE_WEP128;
  2798. else {
  2799. #if CFG_SUPPORT_802_11W
  2800. if (prCmdKey->ucKeyId >= 4) {
  2801. prCmdKey->ucAlgorithmId = CIPHER_SUITE_BIP;
  2802. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  2803. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  2804. prAisSpecBssInfo->fgBipKeyInstalled = TRUE;
  2805. } else
  2806. #endif
  2807. prCmdKey->ucAlgorithmId = CIPHER_SUITE_CCMP;
  2808. if (rsnCheckPmkidCandicate(prAdapter)) {
  2809. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  2810. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  2811. DBGLOG(RSN, TRACE,
  2812. "Add key: Prepare a timer to indicate candidate PMKID Candidate\n");
  2813. cnmTimerStopTimer(prAdapter, &prAisSpecBssInfo->rPreauthenticationTimer);
  2814. cnmTimerStartTimer(prAdapter, &prAisSpecBssInfo->rPreauthenticationTimer,
  2815. SEC_TO_MSEC(WAIT_TIME_IND_PMKID_CANDICATE_SEC));
  2816. }
  2817. }
  2818. } else if (prNewKey->u4KeyLength == 32) {
  2819. if (prAdapter->rWifiVar.rConnSettings.eAuthMode == AUTH_MODE_WPA_NONE) {
  2820. if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION2_ENABLED)
  2821. prCmdKey->ucAlgorithmId = CIPHER_SUITE_TKIP;
  2822. else if (prAdapter->rWifiVar.rConnSettings.eEncStatus == ENUM_ENCRYPTION3_ENABLED) {
  2823. prCmdKey->ucAlgorithmId = CIPHER_SUITE_CCMP;
  2824. prCmdKey->ucKeyLen = CCMP_KEY_LEN;
  2825. }
  2826. } else
  2827. prCmdKey->ucAlgorithmId = CIPHER_SUITE_TKIP;
  2828. }
  2829. DBGLOG(RSN, TRACE, "prCmdKey->ucAlgorithmId=%d, key len=%d\n",
  2830. prCmdKey->ucAlgorithmId, (UINT32) prNewKey->u4KeyLength);
  2831. /* insert into prCmdQueue */
  2832. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  2833. /* wakeup txServiceThread later */
  2834. GLUE_SET_EVENT(prGlueInfo);
  2835. return WLAN_STATUS_PENDING;
  2836. }
  2837. WLAN_STATUS
  2838. wlanoidSetAddKey(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2839. {
  2840. P_PARAM_KEY_T prNewKey;
  2841. DEBUGFUNC("wlanoidSetAddKey");
  2842. DBGLOG(OID, LOUD, "\n");
  2843. ASSERT(prAdapter);
  2844. ASSERT(pvSetBuffer);
  2845. ASSERT(pu4SetInfoLen);
  2846. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2847. DBGLOG(OID, WARN, "Fail in set add key! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2848. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2849. return WLAN_STATUS_ADAPTER_NOT_READY;
  2850. }
  2851. prNewKey = (P_PARAM_KEY_T) pvSetBuffer;
  2852. /* Verify the key structure length. */
  2853. if (prNewKey->u4Length > u4SetBufferLen) {
  2854. DBGLOG(OID, WARN, "Invalid key structure length (%d) greater than total buffer length (%d)\n",
  2855. (UINT_8) prNewKey->u4Length, (UINT_8) u4SetBufferLen);
  2856. *pu4SetInfoLen = u4SetBufferLen;
  2857. return WLAN_STATUS_INVALID_LENGTH;
  2858. }
  2859. /* Verify the key material length for key material buffer */
  2860. if (prNewKey->u4KeyLength > prNewKey->u4Length - OFFSET_OF(PARAM_KEY_T, aucKeyMaterial)) {
  2861. DBGLOG(OID, WARN, "Invalid key material length (%d)\n", (UINT_8) prNewKey->u4KeyLength);
  2862. *pu4SetInfoLen = u4SetBufferLen;
  2863. return WLAN_STATUS_INVALID_DATA;
  2864. }
  2865. /* Exception check */
  2866. if (prNewKey->u4KeyIndex & 0x0fffff00)
  2867. return WLAN_STATUS_INVALID_DATA;
  2868. /* Exception check, pairwise key must with transmit bit enabled */
  2869. if ((prNewKey->u4KeyIndex & BITS(30, 31)) == BITS(30, 31)) {
  2870. if (((prNewKey->u4KeyLength == CCMP_KEY_LEN || prNewKey->u4KeyLength == TKIP_KEY_LEN) &&
  2871. (prNewKey->u4KeyIndex & 0xff) != 0) ||
  2872. EQUAL_MAC_ADDR(prNewKey->arBSSID, "\xff\xff\xff\xff\xff\xff")) {
  2873. return WLAN_STATUS_INVALID_DATA;
  2874. }
  2875. } else if ((prNewKey->u4KeyIndex & BITS(30, 31)) == IS_UNICAST_KEY)
  2876. return WLAN_STATUS_INVALID_DATA;
  2877. if (!(prNewKey->u4KeyLength == WEP_40_LEN || prNewKey->u4KeyLength == WEP_104_LEN ||
  2878. prNewKey->u4KeyLength == CCMP_KEY_LEN || prNewKey->u4KeyLength == TKIP_KEY_LEN)) {
  2879. return WLAN_STATUS_INVALID_DATA;
  2880. }
  2881. *pu4SetInfoLen = u4SetBufferLen;
  2882. #if (CFG_SUPPORT_TDLS == 1)
  2883. /*
  2884. supplicant will set key before updating station & enabling the link so we need to
  2885. backup the key information and set key when link is enabled
  2886. */
  2887. if (TdlsexKeyHandle(prAdapter, prNewKey) == TDLS_STATUS_SUCCESS)
  2888. return WLAN_STATUS_SUCCESS;
  2889. #endif /* CFG_SUPPORT_TDLS */
  2890. return _wlanoidSetAddKey(prAdapter, pvSetBuffer, u4SetBufferLen, TRUE, CIPHER_SUITE_NONE, pu4SetInfoLen);
  2891. } /* wlanoidSetAddKey */
  2892. /*----------------------------------------------------------------------------*/
  2893. /*!
  2894. * \brief This routine is called to request the driver to remove the key at
  2895. * the specified key index.
  2896. *
  2897. * \param[in] prAdapter Pointer to the Adapter structure.
  2898. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  2899. * \param[in] u4SetBufferLen The length of the set buffer.
  2900. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  2901. * bytes read from the set buffer. If the call failed
  2902. * due to invalid length of the set buffer, returns
  2903. * the amount of storage needed.
  2904. *
  2905. * \retval WLAN_STATUS_SUCCESS
  2906. * \retval WLAN_STATUS_INVALID_DATA
  2907. * \retval WLAN_STATUS_INVALID_LENGTH
  2908. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  2909. */
  2910. /*----------------------------------------------------------------------------*/
  2911. WLAN_STATUS
  2912. wlanoidSetRemoveKey(IN P_ADAPTER_T prAdapter,
  2913. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  2914. {
  2915. P_GLUE_INFO_T prGlueInfo;
  2916. P_CMD_INFO_T prCmdInfo;
  2917. P_WIFI_CMD_T prWifiCmd;
  2918. P_PARAM_REMOVE_KEY_T prRemovedKey;
  2919. P_CMD_802_11_KEY prCmdKey;
  2920. UINT_8 ucCmdSeqNum;
  2921. DEBUGFUNC("wlanoidSetRemoveKey");
  2922. ASSERT(prAdapter);
  2923. ASSERT(pu4SetInfoLen);
  2924. *pu4SetInfoLen = sizeof(PARAM_REMOVE_KEY_T);
  2925. if (u4SetBufferLen < sizeof(PARAM_REMOVE_KEY_T))
  2926. return WLAN_STATUS_INVALID_LENGTH;
  2927. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  2928. DBGLOG(OID, WARN, "Fail in set remove key! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  2929. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  2930. return WLAN_STATUS_ADAPTER_NOT_READY;
  2931. }
  2932. ASSERT(pvSetBuffer);
  2933. prRemovedKey = (P_PARAM_REMOVE_KEY_T) pvSetBuffer;
  2934. /* Dump PARAM_REMOVE_KEY content. */
  2935. DBGLOG(OID, TRACE, "Set: Dump PARAM_REMOVE_KEY content\n");
  2936. DBGLOG(OID, TRACE, "Length : 0x%08x\n", prRemovedKey->u4Length);
  2937. DBGLOG(OID, TRACE, "Key Index : 0x%08x\n", prRemovedKey->u4KeyIndex);
  2938. DBGLOG(OID, TRACE, "BSSID:\n");
  2939. DBGLOG_MEM8(OID, TRACE, prRemovedKey->arBSSID, MAC_ADDR_LEN);
  2940. /* Check bit 31: this bit should always 0 */
  2941. if (prRemovedKey->u4KeyIndex & IS_TRANSMIT_KEY) {
  2942. /* Bit 31 should not be set */
  2943. DBGLOG(OID, ERROR, "invalid key index: 0x%08x\n", prRemovedKey->u4KeyIndex);
  2944. return WLAN_STATUS_INVALID_DATA;
  2945. }
  2946. /* Check bits 8 ~ 29 should always be 0 */
  2947. if (prRemovedKey->u4KeyIndex & BITS(8, 29)) {
  2948. /* Bit 31 should not be set */
  2949. DBGLOG(OID, ERROR, "invalid key index: 0x%08x\n", prRemovedKey->u4KeyIndex);
  2950. return WLAN_STATUS_INVALID_DATA;
  2951. }
  2952. /* Clean up the Tx key flag */
  2953. if (prRemovedKey->u4KeyIndex & IS_UNICAST_KEY)
  2954. prAdapter->rWifiVar.rAisSpecificBssInfo.fgTransmitKeyExist = FALSE;
  2955. prGlueInfo = prAdapter->prGlueInfo;
  2956. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + sizeof(CMD_802_11_KEY)));
  2957. if (!prCmdInfo) {
  2958. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  2959. return WLAN_STATUS_FAILURE;
  2960. }
  2961. /* increase command sequence number */
  2962. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  2963. /* compose CMD_802_11_KEY cmd pkt */
  2964. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  2965. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  2966. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_802_11_KEY);
  2967. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  2968. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  2969. prCmdInfo->fgIsOid = TRUE;
  2970. prCmdInfo->ucCID = CMD_ID_ADD_REMOVE_KEY;
  2971. prCmdInfo->fgSetQuery = TRUE;
  2972. prCmdInfo->fgNeedResp = FALSE;
  2973. prCmdInfo->fgDriverDomainMCR = FALSE;
  2974. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  2975. prCmdInfo->u4SetInfoLen = sizeof(PARAM_REMOVE_KEY_T);
  2976. prCmdInfo->pvInformationBuffer = pvSetBuffer;
  2977. prCmdInfo->u4InformationBufferLength = u4SetBufferLen;
  2978. /* Setup WIFI_CMD_T */
  2979. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  2980. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  2981. prWifiCmd->ucCID = prCmdInfo->ucCID;
  2982. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  2983. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  2984. prCmdKey = (P_CMD_802_11_KEY) (prWifiCmd->aucBuffer);
  2985. kalMemZero((PUINT_8) prCmdKey, sizeof(CMD_802_11_KEY));
  2986. prCmdKey->ucAddRemove = 0; /* Remove */
  2987. prCmdKey->ucKeyId = (UINT_8) (prRemovedKey->u4KeyIndex & 0x000000ff);
  2988. kalMemCopy(prCmdKey->aucPeerAddr, (PUINT_8) prRemovedKey->arBSSID, MAC_ADDR_LEN);
  2989. #if CFG_SUPPORT_802_11W
  2990. ASSERT(prCmdKey->ucKeyId < MAX_KEY_NUM + 2);
  2991. #else
  2992. /* ASSERT(prCmdKey->ucKeyId < MAX_KEY_NUM); */
  2993. #endif
  2994. if (prRemovedKey->u4KeyIndex & IS_UNICAST_KEY)
  2995. prCmdKey->ucKeyType = 1;
  2996. /* insert into prCmdQueue */
  2997. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  2998. /* wakeup txServiceThread later */
  2999. GLUE_SET_EVENT(prGlueInfo);
  3000. return WLAN_STATUS_PENDING;
  3001. } /* wlanoidSetRemoveKey */
  3002. /*----------------------------------------------------------------------------*/
  3003. /*!
  3004. * \brief This routine is called to query the current encryption status.
  3005. *
  3006. * \param[in] prAdapter Pointer to the Adapter structure.
  3007. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3008. * the query.
  3009. * \param[in] u4QueryBufferLen The length of the query buffer.
  3010. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3011. * bytes written into the query buffer. If the call
  3012. * failed due to invalid length of the query buffer,
  3013. * returns the amount of storage needed.
  3014. *
  3015. * \retval WLAN_STATUS_SUCCESS
  3016. */
  3017. /*----------------------------------------------------------------------------*/
  3018. WLAN_STATUS
  3019. wlanoidQueryEncryptionStatus(IN P_ADAPTER_T prAdapter,
  3020. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3021. {
  3022. BOOLEAN fgTransmitKeyAvailable = TRUE;
  3023. ENUM_PARAM_ENCRYPTION_STATUS_T eEncStatus = 0;
  3024. DEBUGFUNC("wlanoidQueryEncryptionStatus");
  3025. ASSERT(prAdapter);
  3026. ASSERT(pu4QueryInfoLen);
  3027. if (u4QueryBufferLen)
  3028. ASSERT(pvQueryBuffer);
  3029. *pu4QueryInfoLen = sizeof(ENUM_PARAM_ENCRYPTION_STATUS_T);
  3030. fgTransmitKeyAvailable = prAdapter->rWifiVar.rAisSpecificBssInfo.fgTransmitKeyExist;
  3031. switch (prAdapter->rWifiVar.rConnSettings.eEncStatus) {
  3032. case ENUM_ENCRYPTION3_ENABLED:
  3033. if (fgTransmitKeyAvailable)
  3034. eEncStatus = ENUM_ENCRYPTION3_ENABLED;
  3035. else
  3036. eEncStatus = ENUM_ENCRYPTION3_KEY_ABSENT;
  3037. break;
  3038. case ENUM_ENCRYPTION2_ENABLED:
  3039. if (fgTransmitKeyAvailable) {
  3040. eEncStatus = ENUM_ENCRYPTION2_ENABLED;
  3041. break;
  3042. }
  3043. eEncStatus = ENUM_ENCRYPTION2_KEY_ABSENT;
  3044. break;
  3045. case ENUM_ENCRYPTION1_ENABLED:
  3046. if (fgTransmitKeyAvailable)
  3047. eEncStatus = ENUM_ENCRYPTION1_ENABLED;
  3048. else
  3049. eEncStatus = ENUM_ENCRYPTION1_KEY_ABSENT;
  3050. break;
  3051. case ENUM_ENCRYPTION_DISABLED:
  3052. eEncStatus = ENUM_ENCRYPTION_DISABLED;
  3053. break;
  3054. default:
  3055. DBGLOG(OID, ERROR, "Unknown Encryption Status Setting:%d\n",
  3056. prAdapter->rWifiVar.rConnSettings.eEncStatus);
  3057. }
  3058. #if DBG
  3059. DBGLOG(OID, INFO,
  3060. "Encryption status: %d Return:%d\n", prAdapter->rWifiVar.rConnSettings.eEncStatus, eEncStatus);
  3061. #endif
  3062. *(P_ENUM_PARAM_ENCRYPTION_STATUS_T) pvQueryBuffer = eEncStatus;
  3063. return WLAN_STATUS_SUCCESS;
  3064. } /* wlanoidQueryEncryptionStatus */
  3065. /*----------------------------------------------------------------------------*/
  3066. /*!
  3067. * \brief This routine is called to set the encryption status to the driver.
  3068. *
  3069. * \param[in] prAdapter Pointer to the Adapter structure.
  3070. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  3071. * \param[in] u4SetBufferLen The length of the set buffer.
  3072. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3073. * bytes read from the set buffer. If the call failed
  3074. * due to invalid length of the set buffer, returns
  3075. * the amount of storage needed.
  3076. *
  3077. * \retval WLAN_STATUS_SUCCESS
  3078. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3079. * \retval WLAN_STATUS_NOT_SUPPORTED
  3080. */
  3081. /*----------------------------------------------------------------------------*/
  3082. WLAN_STATUS
  3083. wlanoidSetEncryptionStatus(IN P_ADAPTER_T prAdapter,
  3084. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3085. {
  3086. P_GLUE_INFO_T prGlueInfo;
  3087. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  3088. ENUM_PARAM_ENCRYPTION_STATUS_T eEewEncrypt;
  3089. DEBUGFUNC("wlanoidSetEncryptionStatus");
  3090. ASSERT(prAdapter);
  3091. ASSERT(pvSetBuffer);
  3092. ASSERT(pu4SetInfoLen);
  3093. prGlueInfo = prAdapter->prGlueInfo;
  3094. *pu4SetInfoLen = sizeof(ENUM_PARAM_ENCRYPTION_STATUS_T);
  3095. /* if (IS_ARB_IN_RFTEST_STATE(prAdapter)) { */
  3096. /* return WLAN_STATUS_SUCCESS; */
  3097. /* } */
  3098. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  3099. DBGLOG(OID, WARN, "Fail in set encryption status! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  3100. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  3101. return WLAN_STATUS_ADAPTER_NOT_READY;
  3102. }
  3103. eEewEncrypt = *(P_ENUM_PARAM_ENCRYPTION_STATUS_T) pvSetBuffer;
  3104. DBGLOG(OID, TRACE, "ENCRYPTION_STATUS %d\n", eEewEncrypt);
  3105. switch (eEewEncrypt) {
  3106. case ENUM_ENCRYPTION_DISABLED: /* Disable WEP, TKIP, AES */
  3107. DBGLOG(RSN, TRACE, "Disable Encryption\n");
  3108. secSetCipherSuite(prAdapter, CIPHER_FLAG_WEP40 | CIPHER_FLAG_WEP104 | CIPHER_FLAG_WEP128);
  3109. break;
  3110. case ENUM_ENCRYPTION1_ENABLED: /* Enable WEP. Disable TKIP, AES */
  3111. DBGLOG(RSN, TRACE, "Enable Encryption1\n");
  3112. secSetCipherSuite(prAdapter, CIPHER_FLAG_WEP40 | CIPHER_FLAG_WEP104 | CIPHER_FLAG_WEP128);
  3113. break;
  3114. case ENUM_ENCRYPTION2_ENABLED: /* Enable WEP, TKIP. Disable AES */
  3115. secSetCipherSuite(prAdapter,
  3116. CIPHER_FLAG_WEP40 | CIPHER_FLAG_WEP104 | CIPHER_FLAG_WEP128 | CIPHER_FLAG_TKIP);
  3117. DBGLOG(RSN, TRACE, "Enable Encryption2\n");
  3118. break;
  3119. case ENUM_ENCRYPTION3_ENABLED: /* Enable WEP, TKIP, AES */
  3120. secSetCipherSuite(prAdapter,
  3121. CIPHER_FLAG_WEP40 |
  3122. CIPHER_FLAG_WEP104 | CIPHER_FLAG_WEP128 | CIPHER_FLAG_TKIP | CIPHER_FLAG_CCMP);
  3123. DBGLOG(RSN, TRACE, "Enable Encryption3\n");
  3124. break;
  3125. default:
  3126. DBGLOG(RSN, WARN, "Unacceptible encryption status: %d\n",
  3127. *(P_ENUM_PARAM_ENCRYPTION_STATUS_T) pvSetBuffer);
  3128. rStatus = WLAN_STATUS_NOT_SUPPORTED;
  3129. }
  3130. if (rStatus == WLAN_STATUS_SUCCESS) {
  3131. /* Save the new encryption status. */
  3132. prAdapter->rWifiVar.rConnSettings.eEncStatus = *(P_ENUM_PARAM_ENCRYPTION_STATUS_T) pvSetBuffer;
  3133. DBGLOG(RSN, TRACE, "wlanoidSetEncryptionStatus to %d\n",
  3134. prAdapter->rWifiVar.rConnSettings.eEncStatus);
  3135. }
  3136. return rStatus;
  3137. } /* wlanoidSetEncryptionStatus */
  3138. /*----------------------------------------------------------------------------*/
  3139. /*!
  3140. * \brief This routine is called to test the driver.
  3141. *
  3142. * \param[in] prAdapter Pointer to the Adapter structure.
  3143. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  3144. * \param[in] u4SetBufferLen The length of the set buffer.
  3145. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3146. * bytes read from the set buffer. If the call failed
  3147. * due to invalid length of the set buffer, returns
  3148. * the amount of storage needed.
  3149. *
  3150. * \retval WLAN_STATUS_SUCCESS
  3151. * \retval WLAN_STATUS_INVALID_LENGTH
  3152. * \retval WLAN_STATUS_INVALID_DATA
  3153. */
  3154. /*----------------------------------------------------------------------------*/
  3155. WLAN_STATUS
  3156. wlanoidSetTest(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3157. {
  3158. P_PARAM_802_11_TEST_T prTest;
  3159. PVOID pvTestData;
  3160. PVOID pvStatusBuffer;
  3161. UINT_32 u4StatusBufferSize;
  3162. DEBUGFUNC("wlanoidSetTest");
  3163. ASSERT(prAdapter);
  3164. ASSERT(pu4SetInfoLen);
  3165. ASSERT(pvSetBuffer);
  3166. *pu4SetInfoLen = u4SetBufferLen;
  3167. prTest = (P_PARAM_802_11_TEST_T) pvSetBuffer;
  3168. DBGLOG(OID, TRACE, "Test - Type %u\n", prTest->u4Type);
  3169. switch (prTest->u4Type) {
  3170. case 1: /* Type 1: generate an authentication event */
  3171. pvTestData = (PVOID) &prTest->u.AuthenticationEvent;
  3172. pvStatusBuffer = (PVOID) prAdapter->aucIndicationEventBuffer;
  3173. u4StatusBufferSize = prTest->u4Length - 8;
  3174. if (u4StatusBufferSize > sizeof(PARAM_AUTH_EVENT_T)) {
  3175. DBGLOG(OID, TRACE, "prTest->u4Length error %u\n", u4StatusBufferSize);
  3176. ASSERT(FALSE);
  3177. }
  3178. break;
  3179. case 2: /* Type 2: generate an RSSI status indication */
  3180. pvTestData = (PVOID) &prTest->u.RssiTrigger;
  3181. pvStatusBuffer = (PVOID) &prAdapter->rWlanInfo.rCurrBssId.rRssi;
  3182. u4StatusBufferSize = sizeof(PARAM_RSSI);
  3183. break;
  3184. default:
  3185. return WLAN_STATUS_INVALID_DATA;
  3186. }
  3187. ASSERT(u4StatusBufferSize <= 180);
  3188. if (u4StatusBufferSize > 180)
  3189. return WLAN_STATUS_INVALID_LENGTH;
  3190. /* Get the contents of the StatusBuffer from the test structure. */
  3191. kalMemCopy(pvStatusBuffer, pvTestData, u4StatusBufferSize);
  3192. kalIndicateStatusAndComplete(prAdapter->prGlueInfo,
  3193. WLAN_STATUS_MEDIA_SPECIFIC_INDICATION, pvStatusBuffer, u4StatusBufferSize);
  3194. return WLAN_STATUS_SUCCESS;
  3195. } /* wlanoidSetTest */
  3196. /*----------------------------------------------------------------------------*/
  3197. /*!
  3198. * \brief This routine is called to query the driver's WPA2 status.
  3199. *
  3200. * \param[in] prAdapter Pointer to the Adapter structure.
  3201. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3202. * the query.
  3203. * \param[in] u4QueryBufferLen The length of the query buffer.
  3204. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3205. * bytes written into the query buffer. If the call
  3206. * failed due to invalid length of the query buffer,
  3207. * returns the amount of storage needed.
  3208. *
  3209. * \retval WLAN_STATUS_SUCCESS
  3210. * \retval WLAN_STATUS_INVALID_LENGTH
  3211. */
  3212. /*----------------------------------------------------------------------------*/
  3213. WLAN_STATUS
  3214. wlanoidQueryCapability(IN P_ADAPTER_T prAdapter,
  3215. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3216. {
  3217. P_PARAM_CAPABILITY_T prCap;
  3218. P_PARAM_AUTH_ENCRYPTION_T prAuthenticationEncryptionSupported;
  3219. DEBUGFUNC("wlanoidQueryCapability");
  3220. ASSERT(prAdapter);
  3221. ASSERT(pu4QueryInfoLen);
  3222. if (u4QueryBufferLen)
  3223. ASSERT(pvQueryBuffer);
  3224. *pu4QueryInfoLen = 4 * sizeof(UINT_32) + 14 * sizeof(PARAM_AUTH_ENCRYPTION_T);
  3225. if (u4QueryBufferLen < *pu4QueryInfoLen)
  3226. return WLAN_STATUS_INVALID_LENGTH;
  3227. prCap = (P_PARAM_CAPABILITY_T) pvQueryBuffer;
  3228. prCap->u4Length = *pu4QueryInfoLen;
  3229. prCap->u4Version = 2; /* WPA2 */
  3230. prCap->u4NoOfPMKIDs = CFG_MAX_PMKID_CACHE;
  3231. prCap->u4NoOfAuthEncryptPairsSupported = 14;
  3232. prAuthenticationEncryptionSupported = &prCap->arAuthenticationEncryptionSupported[0];
  3233. /* fill 14 entries of supported settings */
  3234. prAuthenticationEncryptionSupported[0].eAuthModeSupported = AUTH_MODE_OPEN;
  3235. prAuthenticationEncryptionSupported[0].eEncryptStatusSupported = ENUM_ENCRYPTION_DISABLED;
  3236. prAuthenticationEncryptionSupported[1].eAuthModeSupported = AUTH_MODE_OPEN;
  3237. prAuthenticationEncryptionSupported[1].eEncryptStatusSupported = ENUM_ENCRYPTION1_ENABLED;
  3238. prAuthenticationEncryptionSupported[2].eAuthModeSupported = AUTH_MODE_SHARED;
  3239. prAuthenticationEncryptionSupported[2].eEncryptStatusSupported = ENUM_ENCRYPTION_DISABLED;
  3240. prAuthenticationEncryptionSupported[3].eAuthModeSupported = AUTH_MODE_SHARED;
  3241. prAuthenticationEncryptionSupported[3].eEncryptStatusSupported = ENUM_ENCRYPTION1_ENABLED;
  3242. prAuthenticationEncryptionSupported[4].eAuthModeSupported = AUTH_MODE_WPA;
  3243. prAuthenticationEncryptionSupported[4].eEncryptStatusSupported = ENUM_ENCRYPTION2_ENABLED;
  3244. prAuthenticationEncryptionSupported[5].eAuthModeSupported = AUTH_MODE_WPA;
  3245. prAuthenticationEncryptionSupported[5].eEncryptStatusSupported = ENUM_ENCRYPTION3_ENABLED;
  3246. prAuthenticationEncryptionSupported[6].eAuthModeSupported = AUTH_MODE_WPA_PSK;
  3247. prAuthenticationEncryptionSupported[6].eEncryptStatusSupported = ENUM_ENCRYPTION2_ENABLED;
  3248. prAuthenticationEncryptionSupported[7].eAuthModeSupported = AUTH_MODE_WPA_PSK;
  3249. prAuthenticationEncryptionSupported[7].eEncryptStatusSupported = ENUM_ENCRYPTION3_ENABLED;
  3250. prAuthenticationEncryptionSupported[8].eAuthModeSupported = AUTH_MODE_WPA_NONE;
  3251. prAuthenticationEncryptionSupported[8].eEncryptStatusSupported = ENUM_ENCRYPTION2_ENABLED;
  3252. prAuthenticationEncryptionSupported[9].eAuthModeSupported = AUTH_MODE_WPA_NONE;
  3253. prAuthenticationEncryptionSupported[9].eEncryptStatusSupported = ENUM_ENCRYPTION3_ENABLED;
  3254. prAuthenticationEncryptionSupported[10].eAuthModeSupported = AUTH_MODE_WPA2;
  3255. prAuthenticationEncryptionSupported[10].eEncryptStatusSupported = ENUM_ENCRYPTION2_ENABLED;
  3256. prAuthenticationEncryptionSupported[11].eAuthModeSupported = AUTH_MODE_WPA2;
  3257. prAuthenticationEncryptionSupported[11].eEncryptStatusSupported = ENUM_ENCRYPTION3_ENABLED;
  3258. prAuthenticationEncryptionSupported[12].eAuthModeSupported = AUTH_MODE_WPA2_PSK;
  3259. prAuthenticationEncryptionSupported[12].eEncryptStatusSupported = ENUM_ENCRYPTION2_ENABLED;
  3260. prAuthenticationEncryptionSupported[13].eAuthModeSupported = AUTH_MODE_WPA2_PSK;
  3261. prAuthenticationEncryptionSupported[13].eEncryptStatusSupported = ENUM_ENCRYPTION3_ENABLED;
  3262. return WLAN_STATUS_SUCCESS;
  3263. } /* wlanoidQueryCapability */
  3264. /*----------------------------------------------------------------------------*/
  3265. /*!
  3266. * \brief This routine is called to query the PMKID in the PMK cache.
  3267. *
  3268. * \param[in] prAdapter Pointer to the Adapter structure.
  3269. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3270. * the query.
  3271. * \param[in] u4QueryBufferLen The length of the query buffer.
  3272. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3273. * bytes written into the query buffer. If the call
  3274. * failed due to invalid length of the query buffer,
  3275. * returns the amount of storage needed.
  3276. *
  3277. * \retval WLAN_STATUS_SUCCESS
  3278. * \retval WLAN_STATUS_INVALID_LENGTH
  3279. */
  3280. /*----------------------------------------------------------------------------*/
  3281. WLAN_STATUS
  3282. wlanoidQueryPmkid(IN P_ADAPTER_T prAdapter,
  3283. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3284. {
  3285. UINT_32 i;
  3286. P_PARAM_PMKID_T prPmkid;
  3287. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  3288. DEBUGFUNC("wlanoidQueryPmkid");
  3289. ASSERT(prAdapter);
  3290. ASSERT(pu4QueryInfoLen);
  3291. if (u4QueryBufferLen)
  3292. ASSERT(pvQueryBuffer);
  3293. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  3294. *pu4QueryInfoLen = OFFSET_OF(PARAM_PMKID_T, arBSSIDInfo) +
  3295. prAisSpecBssInfo->u4PmkidCacheCount * sizeof(PARAM_BSSID_INFO_T);
  3296. if (u4QueryBufferLen < *pu4QueryInfoLen)
  3297. return WLAN_STATUS_INVALID_LENGTH;
  3298. prPmkid = (P_PARAM_PMKID_T) pvQueryBuffer;
  3299. prPmkid->u4Length = *pu4QueryInfoLen;
  3300. prPmkid->u4BSSIDInfoCount = prAisSpecBssInfo->u4PmkidCacheCount;
  3301. for (i = 0; i < prAisSpecBssInfo->u4PmkidCacheCount; i++) {
  3302. kalMemCopy(prPmkid->arBSSIDInfo[i].arBSSID,
  3303. prAisSpecBssInfo->arPmkidCache[i].rBssidInfo.arBSSID, sizeof(PARAM_MAC_ADDRESS));
  3304. kalMemCopy(prPmkid->arBSSIDInfo[i].arPMKID,
  3305. prAisSpecBssInfo->arPmkidCache[i].rBssidInfo.arPMKID, sizeof(PARAM_PMKID_VALUE));
  3306. }
  3307. return WLAN_STATUS_SUCCESS;
  3308. } /* wlanoidQueryPmkid */
  3309. /*----------------------------------------------------------------------------*/
  3310. /*!
  3311. * \brief This routine is called to set the PMKID to the PMK cache in the driver.
  3312. *
  3313. * \param[in] prAdapter Pointer to the Adapter structure.
  3314. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  3315. * \param[in] u4SetBufferLen The length of the set buffer.
  3316. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3317. * bytes read from the set buffer. If the call failed
  3318. * due to invalid length of the set buffer, returns
  3319. * the amount of storage needed.
  3320. *
  3321. * \retval WLAN_STATUS_SUCCESS
  3322. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  3323. * \retval WLAN_STATUS_INVALID_DATA
  3324. */
  3325. /*----------------------------------------------------------------------------*/
  3326. WLAN_STATUS
  3327. wlanoidSetPmkid(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3328. {
  3329. UINT_32 i, j;
  3330. P_PARAM_PMKID_T prPmkid;
  3331. P_AIS_SPECIFIC_BSS_INFO_T prAisSpecBssInfo;
  3332. DEBUGFUNC("wlanoidSetPmkid");
  3333. ASSERT(prAdapter);
  3334. ASSERT(pu4SetInfoLen);
  3335. *pu4SetInfoLen = u4SetBufferLen;
  3336. /* It's possibble BSSIDInfoCount is zero, because OS wishes to clean PMKID */
  3337. if (u4SetBufferLen < OFFSET_OF(PARAM_PMKID_T, arBSSIDInfo))
  3338. return WLAN_STATUS_BUFFER_TOO_SHORT;
  3339. ASSERT(pvSetBuffer);
  3340. prPmkid = (P_PARAM_PMKID_T) pvSetBuffer;
  3341. if (u4SetBufferLen <
  3342. ((prPmkid->u4BSSIDInfoCount * sizeof(PARAM_BSSID_INFO_T)) + OFFSET_OF(PARAM_PMKID_T, arBSSIDInfo)))
  3343. return WLAN_STATUS_INVALID_DATA;
  3344. if (prPmkid->u4BSSIDInfoCount > CFG_MAX_PMKID_CACHE)
  3345. return WLAN_STATUS_INVALID_DATA;
  3346. DBGLOG(OID, TRACE, "Count %u\n", prPmkid->u4BSSIDInfoCount);
  3347. prAisSpecBssInfo = &prAdapter->rWifiVar.rAisSpecificBssInfo;
  3348. /* This OID replace everything in the PMKID cache. */
  3349. if (prPmkid->u4BSSIDInfoCount == 0) {
  3350. prAisSpecBssInfo->u4PmkidCacheCount = 0;
  3351. kalMemZero(prAisSpecBssInfo->arPmkidCache, sizeof(PMKID_ENTRY_T) * CFG_MAX_PMKID_CACHE);
  3352. }
  3353. if ((prAisSpecBssInfo->u4PmkidCacheCount + prPmkid->u4BSSIDInfoCount > CFG_MAX_PMKID_CACHE)) {
  3354. prAisSpecBssInfo->u4PmkidCacheCount = 0;
  3355. kalMemZero(prAisSpecBssInfo->arPmkidCache, sizeof(PMKID_ENTRY_T) * CFG_MAX_PMKID_CACHE);
  3356. }
  3357. /*
  3358. The driver can only clear its PMKID cache whenever it make a media disconnect
  3359. indication. Otherwise, it must change the PMKID cache only when set through this OID.
  3360. */
  3361. #if CFG_RSN_MIGRATION
  3362. for (i = 0; i < prPmkid->u4BSSIDInfoCount; i++) {
  3363. /* Search for desired BSSID. If desired BSSID is found,
  3364. then set the PMKID */
  3365. if (!rsnSearchPmkidEntry(prAdapter, (PUINT_8) prPmkid->arBSSIDInfo[i].arBSSID, &j)) {
  3366. /* No entry found for the specified BSSID, so add one entry */
  3367. if (prAisSpecBssInfo->u4PmkidCacheCount < CFG_MAX_PMKID_CACHE - 1) {
  3368. j = prAisSpecBssInfo->u4PmkidCacheCount;
  3369. kalMemCopy(prAisSpecBssInfo->arPmkidCache[j].rBssidInfo.arBSSID,
  3370. prPmkid->arBSSIDInfo[i].arBSSID, sizeof(PARAM_MAC_ADDRESS));
  3371. prAisSpecBssInfo->u4PmkidCacheCount++;
  3372. } else {
  3373. j = CFG_MAX_PMKID_CACHE;
  3374. }
  3375. }
  3376. if (j < CFG_MAX_PMKID_CACHE) {
  3377. kalMemCopy(prAisSpecBssInfo->arPmkidCache[j].rBssidInfo.arPMKID,
  3378. prPmkid->arBSSIDInfo[i].arPMKID, sizeof(PARAM_PMKID_VALUE));
  3379. DBGLOG(RSN, TRACE, "Add BSSID %pM idx=%d PMKID value %pM\n",
  3380. (prAisSpecBssInfo->arPmkidCache[j].rBssidInfo.arBSSID), (UINT_32) j,
  3381. (prAisSpecBssInfo->arPmkidCache[j].rBssidInfo.arPMKID));
  3382. prAisSpecBssInfo->arPmkidCache[j].fgPmkidExist = TRUE;
  3383. }
  3384. }
  3385. #endif
  3386. return WLAN_STATUS_SUCCESS;
  3387. } /* wlanoidSetPmkid */
  3388. /*----------------------------------------------------------------------------*/
  3389. /*!
  3390. * \brief This routine is called to query the set of supported data rates that
  3391. * the radio is capable of running
  3392. *
  3393. * \param[in] prAdapter Pointer to the Adapter structure
  3394. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3395. * the query
  3396. * \param[in] u4QueryBufferLen The length of the query buffer
  3397. * \param[out] pu4QueryInfoLen If the call is successful, returns the number
  3398. * of bytes written into the query buffer. If the
  3399. * call failed due to invalid length of the query
  3400. * buffer, returns the amount of storage needed.
  3401. *
  3402. * \retval WLAN_STATUS_SUCCESS
  3403. * \retval WLAN_STATUS_INVALID_LENGTH
  3404. */
  3405. /*----------------------------------------------------------------------------*/
  3406. WLAN_STATUS
  3407. wlanoidQuerySupportedRates(IN P_ADAPTER_T prAdapter,
  3408. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3409. {
  3410. PARAM_RATES eRate = {
  3411. /* BSSBasicRateSet for 802.11n Non-HT rates */
  3412. 0x8C, /* 6M */
  3413. 0x92, /* 9M */
  3414. 0x98, /* 12M */
  3415. 0xA4, /* 18M */
  3416. 0xB0, /* 24M */
  3417. 0xC8, /* 36M */
  3418. 0xE0, /* 48M */
  3419. 0xEC /* 54M */
  3420. };
  3421. DEBUGFUNC("wlanoidQuerySupportedRates");
  3422. ASSERT(prAdapter);
  3423. ASSERT(pu4QueryInfoLen);
  3424. if (u4QueryBufferLen)
  3425. ASSERT(pvQueryBuffer);
  3426. *pu4QueryInfoLen = sizeof(PARAM_RATES_EX);
  3427. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  3428. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  3429. return WLAN_STATUS_INVALID_LENGTH;
  3430. }
  3431. kalMemCopy(pvQueryBuffer, (PVOID) &eRate, sizeof(PARAM_RATES));
  3432. return WLAN_STATUS_SUCCESS;
  3433. } /* end of wlanoidQuerySupportedRates() */
  3434. /*----------------------------------------------------------------------------*/
  3435. /*!
  3436. * \brief This routine is called to query current desired rates.
  3437. *
  3438. * \param[in] prAdapter Pointer to the Adapter structure.
  3439. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  3440. * the query.
  3441. * \param[in] u4QueryBufferLen The length of the query buffer.
  3442. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3443. * bytes written into the query buffer. If the call
  3444. * failed due to invalid length of the query buffer,
  3445. * returns the amount of storage needed.
  3446. *
  3447. * \retval WLAN_STATUS_SUCCESS
  3448. * \retval WLAN_STATUS_INVALID_LENGTH
  3449. */
  3450. /*----------------------------------------------------------------------------*/
  3451. WLAN_STATUS
  3452. wlanoidQueryDesiredRates(IN P_ADAPTER_T prAdapter,
  3453. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3454. {
  3455. DEBUGFUNC("wlanoidQueryDesiredRates");
  3456. ASSERT(prAdapter);
  3457. ASSERT(pu4QueryInfoLen);
  3458. if (u4QueryBufferLen)
  3459. ASSERT(pvQueryBuffer);
  3460. *pu4QueryInfoLen = sizeof(PARAM_RATES_EX);
  3461. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  3462. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  3463. return WLAN_STATUS_INVALID_LENGTH;
  3464. }
  3465. kalMemCopy(pvQueryBuffer, (PVOID) &(prAdapter->rWlanInfo.eDesiredRates), sizeof(PARAM_RATES));
  3466. return WLAN_STATUS_SUCCESS;
  3467. } /* end of wlanoidQueryDesiredRates() */
  3468. /*----------------------------------------------------------------------------*/
  3469. /*!
  3470. * \brief This routine is called to Set the desired rates.
  3471. *
  3472. * \param[in] prAdapter Pointer to the Adapter structure.
  3473. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  3474. * \param[in] u4SetBufferLen The length of the set buffer.
  3475. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3476. * bytes read from the set buffer. If the call failed
  3477. * due to invalid length of the set buffer, returns
  3478. * the amount of storage needed.
  3479. *
  3480. *
  3481. * \retval WLAN_STATUS_SUCCESS
  3482. * \retval WLAN_STATUS_INVALID_LENGTH
  3483. * \retval WLAN_STATUS_INVALID_DATA
  3484. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3485. */
  3486. /*----------------------------------------------------------------------------*/
  3487. WLAN_STATUS
  3488. wlanoidSetDesiredRates(IN P_ADAPTER_T prAdapter,
  3489. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3490. {
  3491. UINT_32 i;
  3492. DEBUGFUNC("wlanoidSetDesiredRates");
  3493. ASSERT(prAdapter);
  3494. ASSERT(pvSetBuffer);
  3495. ASSERT(pu4SetInfoLen);
  3496. if (u4SetBufferLen < sizeof(PARAM_RATES)) {
  3497. DBGLOG(OID, WARN, "Invalid length %u\n", u4SetBufferLen);
  3498. return WLAN_STATUS_INVALID_LENGTH;
  3499. }
  3500. *pu4SetInfoLen = sizeof(PARAM_RATES);
  3501. if (u4SetBufferLen < sizeof(PARAM_RATES))
  3502. return WLAN_STATUS_INVALID_LENGTH;
  3503. kalMemCopy((PVOID) &(prAdapter->rWlanInfo.eDesiredRates), pvSetBuffer, sizeof(PARAM_RATES));
  3504. prAdapter->rWlanInfo.eLinkAttr.ucDesiredRateLen = PARAM_MAX_LEN_RATES;
  3505. for (i = 0; i < PARAM_MAX_LEN_RATES; i++)
  3506. prAdapter->rWlanInfo.eLinkAttr.u2DesiredRate[i] = (UINT_16) (prAdapter->rWlanInfo.eDesiredRates[i]);
  3507. return wlanSendSetQueryCmd(prAdapter,
  3508. CMD_ID_LINK_ATTRIB,
  3509. TRUE,
  3510. FALSE,
  3511. TRUE,
  3512. nicCmdEventSetCommon,
  3513. nicOidCmdTimeoutCommon,
  3514. sizeof(CMD_LINK_ATTRIB),
  3515. (PUINT_8) &(prAdapter->rWlanInfo.eLinkAttr), pvSetBuffer, u4SetBufferLen);
  3516. } /* end of wlanoidSetDesiredRates() */
  3517. /*----------------------------------------------------------------------------*/
  3518. /*!
  3519. * \brief This routine is called to query the maximum frame size in bytes,
  3520. * not including the header.
  3521. *
  3522. * \param[in] prAdapter Pointer to the Adapter structure.
  3523. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3524. * the query.
  3525. * \param[in] u4QueryBufferLen The length of the query buffer.
  3526. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3527. * bytes written into the query buffer. If the
  3528. * call failed due to invalid length of the query
  3529. * buffer, returns the amount of storage needed.
  3530. *
  3531. * \retval WLAN_STATUS_SUCCESS
  3532. * \retval WLAN_STATUS_INVALID_LENGTH
  3533. */
  3534. /*----------------------------------------------------------------------------*/
  3535. WLAN_STATUS
  3536. wlanoidQueryMaxFrameSize(IN P_ADAPTER_T prAdapter,
  3537. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3538. {
  3539. DEBUGFUNC("wlanoidQueryMaxFrameSize");
  3540. ASSERT(prAdapter);
  3541. ASSERT(pu4QueryInfoLen);
  3542. if (u4QueryBufferLen)
  3543. ASSERT(pvQueryBuffer);
  3544. if (u4QueryBufferLen < sizeof(UINT_32)) {
  3545. *pu4QueryInfoLen = sizeof(UINT_32);
  3546. return WLAN_STATUS_INVALID_LENGTH;
  3547. }
  3548. *(PUINT_32) pvQueryBuffer = ETHERNET_MAX_PKT_SZ - ETHERNET_HEADER_SZ;
  3549. *pu4QueryInfoLen = sizeof(UINT_32);
  3550. return WLAN_STATUS_SUCCESS;
  3551. } /* wlanoidQueryMaxFrameSize */
  3552. /*----------------------------------------------------------------------------*/
  3553. /*!
  3554. * \brief This routine is called to query the maximum total packet length
  3555. * in bytes.
  3556. *
  3557. * \param[in] prAdapter Pointer to the Adapter structure.
  3558. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3559. * the query.
  3560. * \param[in] u4QueryBufferLen The length of the query buffer.
  3561. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3562. * bytes written into the query buffer. If the call
  3563. * failed due to invalid length of the query buffer,
  3564. * returns the amount of storage needed.
  3565. *
  3566. * \retval WLAN_STATUS_SUCCESS
  3567. * \retval WLAN_STATUS_INVALID_LENGTH
  3568. */
  3569. /*----------------------------------------------------------------------------*/
  3570. WLAN_STATUS
  3571. wlanoidQueryMaxTotalSize(IN P_ADAPTER_T prAdapter,
  3572. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3573. {
  3574. DEBUGFUNC("wlanoidQueryMaxTotalSize");
  3575. ASSERT(prAdapter);
  3576. ASSERT(pu4QueryInfoLen);
  3577. if (u4QueryBufferLen)
  3578. ASSERT(pvQueryBuffer);
  3579. if (u4QueryBufferLen < sizeof(UINT_32)) {
  3580. *pu4QueryInfoLen = sizeof(UINT_32);
  3581. return WLAN_STATUS_INVALID_LENGTH;
  3582. }
  3583. *(PUINT_32) pvQueryBuffer = ETHERNET_MAX_PKT_SZ;
  3584. *pu4QueryInfoLen = sizeof(UINT_32);
  3585. return WLAN_STATUS_SUCCESS;
  3586. } /* wlanoidQueryMaxTotalSize */
  3587. /*----------------------------------------------------------------------------*/
  3588. /*!
  3589. * \brief This routine is called to query the vendor ID of the NIC.
  3590. *
  3591. * \param[in] prAdapter Pointer to the Adapter structure.
  3592. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  3593. * the query.
  3594. * \param[in] u4QueryBufferLen The length of the query buffer.
  3595. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3596. * bytes written into the query buffer. If the call
  3597. * failed due to invalid length of the query buffer,
  3598. * returns the amount of storage needed.
  3599. *
  3600. * \retval WLAN_STATUS_SUCCESS
  3601. * \retval WLAN_STATUS_INVALID_LENGTH
  3602. */
  3603. /*----------------------------------------------------------------------------*/
  3604. WLAN_STATUS
  3605. wlanoidQueryVendorId(IN P_ADAPTER_T prAdapter,
  3606. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3607. {
  3608. #if DBG
  3609. PUINT_8 cp;
  3610. #endif
  3611. DEBUGFUNC("wlanoidQueryVendorId");
  3612. ASSERT(prAdapter);
  3613. ASSERT(pu4QueryInfoLen);
  3614. if (u4QueryBufferLen)
  3615. ASSERT(pvQueryBuffer);
  3616. if (u4QueryBufferLen < sizeof(UINT_32)) {
  3617. *pu4QueryInfoLen = sizeof(UINT_32);
  3618. return WLAN_STATUS_INVALID_LENGTH;
  3619. }
  3620. kalMemCopy(pvQueryBuffer, prAdapter->aucMacAddress, 3);
  3621. *((PUINT_8) pvQueryBuffer + 3) = 1;
  3622. *pu4QueryInfoLen = sizeof(UINT_32);
  3623. #if DBG
  3624. cp = (PUINT_8) pvQueryBuffer;
  3625. DBGLOG(OID, LOUD, "Vendor ID=%02x-%02x-%02x-%02x\n", cp[0], cp[1], cp[2], cp[3]);
  3626. #endif
  3627. return WLAN_STATUS_SUCCESS;
  3628. } /* wlanoidQueryVendorId */
  3629. /*----------------------------------------------------------------------------*/
  3630. /*!
  3631. * \brief This routine is called to query the current RSSI value.
  3632. *
  3633. * \param[in] prAdapter Pointer to the Adapter structure.
  3634. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of the query.
  3635. * \param[in] u4QueryBufferLen The length of the query buffer.
  3636. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3637. * bytes written into the query buffer. If the call failed due to invalid length of
  3638. * the query buffer, returns the amount of storage needed.
  3639. *
  3640. * \retval WLAN_STATUS_SUCCESS
  3641. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  3642. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3643. */
  3644. /*----------------------------------------------------------------------------*/
  3645. WLAN_STATUS
  3646. wlanoidQueryRssi(IN P_ADAPTER_T prAdapter,
  3647. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3648. {
  3649. DEBUGFUNC("wlanoidQueryRssi");
  3650. ASSERT(prAdapter);
  3651. ASSERT(pu4QueryInfoLen);
  3652. if (u4QueryBufferLen)
  3653. ASSERT(pvQueryBuffer);
  3654. *pu4QueryInfoLen = sizeof(PARAM_RSSI);
  3655. /* Check for query buffer length */
  3656. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  3657. DBGLOG(OID, WARN, "Too short length %u\n", u4QueryBufferLen);
  3658. return WLAN_STATUS_BUFFER_TOO_SHORT;
  3659. }
  3660. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_DISCONNECTED) {
  3661. return WLAN_STATUS_ADAPTER_NOT_READY;
  3662. } else if (prAdapter->fgIsLinkQualityValid == TRUE &&
  3663. (kalGetTimeTick() - prAdapter->rLinkQualityUpdateTime) <= CFG_LINK_QUALITY_VALID_PERIOD) {
  3664. PARAM_RSSI rRssi;
  3665. rRssi = (PARAM_RSSI) prAdapter->rLinkQuality.cRssi; /* ranged from (-128 ~ 30) in unit of dBm */
  3666. if (rRssi > PARAM_WHQL_RSSI_MAX_DBM)
  3667. rRssi = PARAM_WHQL_RSSI_MAX_DBM;
  3668. else if (rRssi < PARAM_WHQL_RSSI_MIN_DBM)
  3669. rRssi = PARAM_WHQL_RSSI_MIN_DBM;
  3670. kalMemCopy(pvQueryBuffer, &rRssi, sizeof(PARAM_RSSI));
  3671. return WLAN_STATUS_SUCCESS;
  3672. }
  3673. #ifdef LINUX
  3674. return wlanSendSetQueryCmd(prAdapter,
  3675. CMD_ID_GET_LINK_QUALITY,
  3676. FALSE,
  3677. TRUE,
  3678. TRUE,
  3679. nicCmdEventQueryLinkQuality,
  3680. nicOidCmdTimeoutCommon,
  3681. *pu4QueryInfoLen, pvQueryBuffer, pvQueryBuffer, u4QueryBufferLen);
  3682. #else
  3683. return wlanSendSetQueryCmd(prAdapter,
  3684. CMD_ID_GET_LINK_QUALITY,
  3685. FALSE,
  3686. TRUE,
  3687. TRUE,
  3688. nicCmdEventQueryLinkQuality,
  3689. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  3690. #endif
  3691. } /* end of wlanoidQueryRssi() */
  3692. /*----------------------------------------------------------------------------*/
  3693. /*!
  3694. * \brief This routine is called to query the current RSSI trigger value.
  3695. *
  3696. * \param[in] prAdapter Pointer to the Adapter structure.
  3697. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of the query.
  3698. * \param[in] u4QueryBufferLen The length of the query buffer.
  3699. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3700. * bytes written into the query buffer. If the call failed due to invalid length of
  3701. * the query buffer, returns the amount of storage needed.
  3702. *
  3703. * \retval WLAN_STATUS_SUCCESS
  3704. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  3705. */
  3706. /*----------------------------------------------------------------------------*/
  3707. WLAN_STATUS
  3708. wlanoidQueryRssiTrigger(IN P_ADAPTER_T prAdapter,
  3709. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3710. {
  3711. DEBUGFUNC("wlanoidQueryRssiTrigger");
  3712. ASSERT(prAdapter);
  3713. ASSERT(pu4QueryInfoLen);
  3714. if (u4QueryBufferLen)
  3715. ASSERT(pvQueryBuffer);
  3716. if (prAdapter->rWlanInfo.eRssiTriggerType == ENUM_RSSI_TRIGGER_NONE)
  3717. return WLAN_STATUS_ADAPTER_NOT_READY;
  3718. *pu4QueryInfoLen = sizeof(PARAM_RSSI);
  3719. /* Check for query buffer length */
  3720. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  3721. DBGLOG(OID, WARN, "Too short length %u\n", u4QueryBufferLen);
  3722. return WLAN_STATUS_BUFFER_TOO_SHORT;
  3723. }
  3724. *(PARAM_RSSI *) pvQueryBuffer = prAdapter->rWlanInfo.rRssiTriggerValue;
  3725. DBGLOG(OID, INFO, "RSSI trigger: %d dBm\n", *(PARAM_RSSI *) pvQueryBuffer);
  3726. return WLAN_STATUS_SUCCESS;
  3727. } /* wlanoidQueryRssiTrigger */
  3728. /*----------------------------------------------------------------------------*/
  3729. /*!
  3730. * \brief This routine is called to set a trigger value of the RSSI event.
  3731. *
  3732. * \param[in] prAdapter Pointer to the Adapter structure
  3733. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  3734. * \param[in] u4SetBufferLen The length of the set buffer.
  3735. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3736. * bytes read from the set buffer. If the call failed
  3737. * due to invalid length of the set buffer, returns the
  3738. * amount of storage needed.
  3739. *
  3740. * \retval WLAN_STATUS_SUCCESS
  3741. *
  3742. */
  3743. /*----------------------------------------------------------------------------*/
  3744. WLAN_STATUS
  3745. wlanoidSetRssiTrigger(IN P_ADAPTER_T prAdapter,
  3746. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3747. {
  3748. PARAM_RSSI rRssiTriggerValue;
  3749. DEBUGFUNC("wlanoidSetRssiTrigger");
  3750. ASSERT(prAdapter);
  3751. ASSERT(pvSetBuffer);
  3752. ASSERT(pu4SetInfoLen);
  3753. *pu4SetInfoLen = sizeof(PARAM_RSSI);
  3754. rRssiTriggerValue = *(PARAM_RSSI *) pvSetBuffer;
  3755. if (rRssiTriggerValue > PARAM_WHQL_RSSI_MAX_DBM || rRssiTriggerValue < PARAM_WHQL_RSSI_MIN_DBM)
  3756. return
  3757. /* Save the RSSI trigger value to the Adapter structure */
  3758. prAdapter->rWlanInfo.rRssiTriggerValue = rRssiTriggerValue;
  3759. /* If the RSSI trigger value is equal to the current RSSI value, the
  3760. * indication triggers immediately. We need to indicate the protocol
  3761. * that an RSSI status indication event triggers. */
  3762. if (rRssiTriggerValue == (PARAM_RSSI) (prAdapter->rLinkQuality.cRssi)) {
  3763. prAdapter->rWlanInfo.eRssiTriggerType = ENUM_RSSI_TRIGGER_TRIGGERED;
  3764. kalIndicateStatusAndComplete(prAdapter->prGlueInfo,
  3765. WLAN_STATUS_MEDIA_SPECIFIC_INDICATION,
  3766. (PVOID) &prAdapter->rWlanInfo.rRssiTriggerValue, sizeof(PARAM_RSSI));
  3767. } else if (rRssiTriggerValue < (PARAM_RSSI) (prAdapter->rLinkQuality.cRssi))
  3768. prAdapter->rWlanInfo.eRssiTriggerType = ENUM_RSSI_TRIGGER_GREATER;
  3769. else if (rRssiTriggerValue > (PARAM_RSSI) (prAdapter->rLinkQuality.cRssi))
  3770. prAdapter->rWlanInfo.eRssiTriggerType = ENUM_RSSI_TRIGGER_LESS;
  3771. return WLAN_STATUS_SUCCESS;
  3772. } /* wlanoidSetRssiTrigger */
  3773. /*----------------------------------------------------------------------------*/
  3774. /*!
  3775. * \brief This routine is called to set a suggested value for the number of
  3776. * bytes of received packet data that will be indicated to the protocol
  3777. * driver. We just accept the set and ignore this value.
  3778. *
  3779. * \param[in] prAdapter Pointer to the Adapter structure.
  3780. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  3781. * \param[in] u4SetBufferLen The length of the set buffer.
  3782. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  3783. * bytes read from the set buffer. If the call failed
  3784. * due to invalid length of the set buffer, returns
  3785. * the amount of storage needed.
  3786. *
  3787. * \retval WLAN_STATUS_SUCCESS
  3788. * \retval WLAN_STATUS_INVALID_LENGTH
  3789. */
  3790. /*----------------------------------------------------------------------------*/
  3791. WLAN_STATUS
  3792. wlanoidSetCurrentLookahead(IN P_ADAPTER_T prAdapter,
  3793. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  3794. {
  3795. DEBUGFUNC("wlanoidSetCurrentLookahead");
  3796. ASSERT(prAdapter);
  3797. ASSERT(pvSetBuffer);
  3798. ASSERT(pu4SetInfoLen);
  3799. if (u4SetBufferLen < sizeof(UINT_32)) {
  3800. *pu4SetInfoLen = sizeof(UINT_32);
  3801. return WLAN_STATUS_INVALID_LENGTH;
  3802. }
  3803. *pu4SetInfoLen = sizeof(UINT_32);
  3804. return WLAN_STATUS_SUCCESS;
  3805. } /* wlanoidSetCurrentLookahead */
  3806. /*----------------------------------------------------------------------------*/
  3807. /*!
  3808. * \brief This routine is called to query the number of frames that the driver
  3809. * receives but does not indicate to the protocols due to errors.
  3810. *
  3811. * \param[in] pvAdapter Pointer to the Adapter structure.
  3812. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  3813. * the query.
  3814. * \param[in] u4QueryBufLen The length of the query buffer.
  3815. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3816. * bytes written into the query buffer. If the call
  3817. * failed due to invalid length of the query buffer,
  3818. * returns the amount of storage needed.
  3819. *
  3820. * \retval WLAN_STATUS_SUCCESS
  3821. * \retval WLAN_STATUS_INVALID_LENGTH
  3822. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3823. */
  3824. /*----------------------------------------------------------------------------*/
  3825. WLAN_STATUS
  3826. wlanoidQueryRcvError(IN P_ADAPTER_T prAdapter,
  3827. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3828. {
  3829. DEBUGFUNC("wlanoidQueryRcvError");
  3830. DBGLOG(OID, LOUD, "\n");
  3831. ASSERT(prAdapter);
  3832. if (u4QueryBufferLen)
  3833. ASSERT(pvQueryBuffer);
  3834. ASSERT(pu4QueryInfoLen);
  3835. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  3836. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  3837. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  3838. *pu4QueryInfoLen = sizeof(UINT_32);
  3839. return WLAN_STATUS_ADAPTER_NOT_READY;
  3840. } else if (u4QueryBufferLen < sizeof(UINT_32)
  3841. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  3842. *pu4QueryInfoLen = sizeof(UINT_64);
  3843. return WLAN_STATUS_INVALID_LENGTH;
  3844. }
  3845. #if CFG_ENABLE_STATISTICS_BUFFERING
  3846. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  3847. /* @FIXME, RX_ERROR_DROP_COUNT/RX_FIFO_FULL_DROP_COUNT is not calculated */
  3848. if (u4QueryBufferLen == sizeof(UINT_32)) {
  3849. *pu4QueryInfoLen = sizeof(UINT_32);
  3850. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rFCSErrorCount.QuadPart;
  3851. } else {
  3852. *pu4QueryInfoLen = sizeof(UINT_64);
  3853. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rFCSErrorCount.QuadPart;
  3854. }
  3855. return WLAN_STATUS_SUCCESS;
  3856. }
  3857. #endif
  3858. return wlanSendSetQueryCmd(prAdapter,
  3859. CMD_ID_GET_STATISTICS,
  3860. FALSE,
  3861. TRUE,
  3862. TRUE,
  3863. nicCmdEventQueryRecvError,
  3864. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  3865. } /* wlanoidQueryRcvError */
  3866. /*----------------------------------------------------------------------------*/
  3867. /*! \brief This routine is called to query the number of frames that the NIC
  3868. * cannot receive due to lack of NIC receive buffer space.
  3869. *
  3870. * \param[in] pvAdapter Pointer to the Adapter structure
  3871. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  3872. * query buffer
  3873. * \param[in] u4QueryBufLen The length of the query buffer
  3874. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3875. * bytes written into the query buffer. If the call
  3876. * failed due to invalid length of the query buffer,
  3877. * returns the amount of storage needed.
  3878. *
  3879. * \retval WLAN_STATUS_SUCCESS If success;
  3880. * \retval WLAN_STATUS_INVALID_LENGTH
  3881. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3882. */
  3883. /*----------------------------------------------------------------------------*/
  3884. WLAN_STATUS
  3885. wlanoidQueryRcvNoBuffer(IN P_ADAPTER_T prAdapter,
  3886. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3887. {
  3888. DEBUGFUNC("wlanoidQueryRcvNoBuffer");
  3889. DBGLOG(OID, LOUD, "\n");
  3890. ASSERT(prAdapter);
  3891. if (u4QueryBufferLen)
  3892. ASSERT(pvQueryBuffer);
  3893. ASSERT(pu4QueryInfoLen);
  3894. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  3895. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  3896. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  3897. *pu4QueryInfoLen = sizeof(UINT_32);
  3898. return WLAN_STATUS_ADAPTER_NOT_READY;
  3899. } else if (u4QueryBufferLen < sizeof(UINT_32)
  3900. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  3901. *pu4QueryInfoLen = sizeof(UINT_64);
  3902. return WLAN_STATUS_INVALID_LENGTH;
  3903. }
  3904. #if CFG_ENABLE_STATISTICS_BUFFERING
  3905. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  3906. if (u4QueryBufferLen == sizeof(UINT_32)) {
  3907. *pu4QueryInfoLen = sizeof(UINT_32);
  3908. *(PUINT_32) pvQueryBuffer = (UINT_32) 0; /* @FIXME */
  3909. } else {
  3910. *pu4QueryInfoLen = sizeof(UINT_64);
  3911. *(PUINT_64) pvQueryBuffer = (UINT_64) 0; /* @FIXME */
  3912. }
  3913. return WLAN_STATUS_SUCCESS;
  3914. }
  3915. #endif
  3916. return wlanSendSetQueryCmd(prAdapter,
  3917. CMD_ID_GET_STATISTICS,
  3918. FALSE,
  3919. TRUE,
  3920. TRUE,
  3921. nicCmdEventQueryRecvNoBuffer,
  3922. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  3923. } /* wlanoidQueryRcvNoBuffer */
  3924. /*----------------------------------------------------------------------------*/
  3925. /*! \brief This routine is called to query the number of frames that the NIC
  3926. * received and it is CRC error.
  3927. *
  3928. * \param[in] pvAdapter Pointer to the Adapter structure
  3929. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  3930. * query buffer
  3931. * \param[in] u4QueryBufLen The length of the query buffer
  3932. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3933. * bytes written into the query buffer. If the call
  3934. * failed due to invalid length of the query buffer,
  3935. * returns the amount of storage needed.
  3936. *
  3937. * \retval WLAN_STATUS_SUCCESS If success;
  3938. * \retval WLAN_STATUS_INVALID_LENGTH
  3939. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  3940. */
  3941. /*----------------------------------------------------------------------------*/
  3942. WLAN_STATUS
  3943. wlanoidQueryRcvCrcError(IN P_ADAPTER_T prAdapter,
  3944. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  3945. {
  3946. DEBUGFUNC("wlanoidQueryRcvCrcError");
  3947. DBGLOG(OID, LOUD, "\n");
  3948. ASSERT(prAdapter);
  3949. if (u4QueryBufferLen)
  3950. ASSERT(pvQueryBuffer);
  3951. ASSERT(pu4QueryInfoLen);
  3952. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  3953. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  3954. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  3955. *pu4QueryInfoLen = sizeof(UINT_32);
  3956. return WLAN_STATUS_ADAPTER_NOT_READY;
  3957. } else if (u4QueryBufferLen < sizeof(UINT_32)
  3958. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  3959. *pu4QueryInfoLen = sizeof(UINT_64);
  3960. return WLAN_STATUS_INVALID_LENGTH;
  3961. }
  3962. #if CFG_ENABLE_STATISTICS_BUFFERING
  3963. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  3964. if (u4QueryBufferLen == sizeof(UINT_32)) {
  3965. *pu4QueryInfoLen = sizeof(UINT_32);
  3966. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rFCSErrorCount.QuadPart;
  3967. } else {
  3968. *pu4QueryInfoLen = sizeof(UINT_64);
  3969. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rFCSErrorCount.QuadPart;
  3970. }
  3971. return WLAN_STATUS_SUCCESS;
  3972. }
  3973. #endif
  3974. return wlanSendSetQueryCmd(prAdapter,
  3975. CMD_ID_GET_STATISTICS,
  3976. FALSE,
  3977. TRUE,
  3978. TRUE,
  3979. nicCmdEventQueryRecvCrcError,
  3980. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  3981. } /* wlanoidQueryRcvCrcError */
  3982. /*----------------------------------------------------------------------------*/
  3983. /*! \brief This routine is called to query the current 802.11 statistics.
  3984. *
  3985. * \param[in] pvAdapter Pointer to the Adapter structure
  3986. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  3987. * query buffer
  3988. * \param[in] u4QueryBufLen The length of the query buffer
  3989. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  3990. * bytes written into the query buffer. If the call
  3991. * failed due to invalid length of the query buffer,
  3992. * returns the amount of storage needed.
  3993. *
  3994. * \retval WLAN_STATUS_SUCCESS
  3995. * \retval WLAN_STATUS_INVALID_LENGTH
  3996. */
  3997. /*----------------------------------------------------------------------------*/
  3998. WLAN_STATUS
  3999. wlanoidQueryStatisticsPL(IN P_ADAPTER_T prAdapter,
  4000. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4001. {
  4002. DBGLOG(OID, LOUD, "\n");
  4003. ASSERT(prAdapter);
  4004. if (u4QueryBufferLen)
  4005. ASSERT(pvQueryBuffer);
  4006. ASSERT(pu4QueryInfoLen);
  4007. *pu4QueryInfoLen = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4008. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  4009. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  4010. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  4011. *pu4QueryInfoLen = sizeof(UINT_32);
  4012. return WLAN_STATUS_ADAPTER_NOT_READY;
  4013. } else if (u4QueryBufferLen < sizeof(PARAM_802_11_STATISTICS_STRUCT_T)) {
  4014. DBGLOG(OID, WARN, "Too short length %u\n", u4QueryBufferLen);
  4015. return WLAN_STATUS_INVALID_LENGTH;
  4016. }
  4017. #if CFG_ENABLE_STATISTICS_BUFFERING
  4018. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  4019. P_PARAM_802_11_STATISTICS_STRUCT_T prStatistics;
  4020. *pu4QueryInfoLen = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4021. prStatistics = (P_PARAM_802_11_STATISTICS_STRUCT_T) pvQueryBuffer;
  4022. prStatistics->u4Length = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4023. prStatistics->rTransmittedFragmentCount = prAdapter->rStatStruct.rTransmittedFragmentCount;
  4024. prStatistics->rMulticastTransmittedFrameCount = prAdapter->rStatStruct.rMulticastTransmittedFrameCount;
  4025. prStatistics->rFailedCount = prAdapter->rStatStruct.rFailedCount;
  4026. prStatistics->rRetryCount = prAdapter->rStatStruct.rRetryCount;
  4027. prStatistics->rMultipleRetryCount = prAdapter->rStatStruct.rMultipleRetryCount;
  4028. prStatistics->rRTSSuccessCount = prAdapter->rStatStruct.rRTSSuccessCount;
  4029. prStatistics->rRTSFailureCount = prAdapter->rStatStruct.rRTSFailureCount;
  4030. prStatistics->rACKFailureCount = prAdapter->rStatStruct.rACKFailureCount;
  4031. prStatistics->rFrameDuplicateCount = prAdapter->rStatStruct.rFrameDuplicateCount;
  4032. prStatistics->rReceivedFragmentCount = prAdapter->rStatStruct.rReceivedFragmentCount;
  4033. prStatistics->rMulticastReceivedFrameCount = prAdapter->rStatStruct.rMulticastReceivedFrameCount;
  4034. prStatistics->rFCSErrorCount = prAdapter->rStatStruct.rFCSErrorCount;
  4035. prStatistics->rTKIPLocalMICFailures.QuadPart = 0;
  4036. prStatistics->rTKIPICVErrors.QuadPart = 0;
  4037. prStatistics->rTKIPCounterMeasuresInvoked.QuadPart = 0;
  4038. prStatistics->rTKIPReplays.QuadPart = 0;
  4039. prStatistics->rCCMPFormatErrors.QuadPart = 0;
  4040. prStatistics->rCCMPReplays.QuadPart = 0;
  4041. prStatistics->rCCMPDecryptErrors.QuadPart = 0;
  4042. prStatistics->rFourWayHandshakeFailures.QuadPart = 0;
  4043. prStatistics->rWEPUndecryptableCount.QuadPart = 0;
  4044. prStatistics->rWEPICVErrorCount.QuadPart = 0;
  4045. prStatistics->rDecryptSuccessCount.QuadPart = 0;
  4046. prStatistics->rDecryptFailureCount.QuadPart = 0;
  4047. return WLAN_STATUS_SUCCESS;
  4048. }
  4049. #endif
  4050. return wlanSendSetQueryCmd(prAdapter,
  4051. CMD_ID_GET_STATISTICS_PL,
  4052. FALSE,
  4053. TRUE,
  4054. TRUE,
  4055. nicCmdEventQueryStatistics,
  4056. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  4057. } /* wlanoidQueryStatistics */
  4058. /*----------------------------------------------------------------------------*/
  4059. /*! \brief This routine is called to query the current 802.11 statistics.
  4060. *
  4061. * \param[in] pvAdapter Pointer to the Adapter structure
  4062. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4063. * query buffer
  4064. * \param[in] u4QueryBufLen The length of the query buffer
  4065. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4066. * bytes written into the query buffer. If the call
  4067. * failed due to invalid length of the query buffer,
  4068. * returns the amount of storage needed.
  4069. *
  4070. * \retval WLAN_STATUS_SUCCESS
  4071. * \retval WLAN_STATUS_INVALID_LENGTH
  4072. */
  4073. /*----------------------------------------------------------------------------*/
  4074. WLAN_STATUS
  4075. wlanoidQueryStatistics(IN P_ADAPTER_T prAdapter,
  4076. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4077. {
  4078. DEBUGFUNC("wlanoidQueryStatistics");
  4079. DBGLOG(OID, LOUD, "\n");
  4080. ASSERT(prAdapter);
  4081. if (u4QueryBufferLen)
  4082. ASSERT(pvQueryBuffer);
  4083. ASSERT(pu4QueryInfoLen);
  4084. *pu4QueryInfoLen = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4085. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  4086. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  4087. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  4088. *pu4QueryInfoLen = sizeof(UINT_32);
  4089. return WLAN_STATUS_ADAPTER_NOT_READY;
  4090. } else if (u4QueryBufferLen < sizeof(PARAM_802_11_STATISTICS_STRUCT_T)) {
  4091. DBGLOG(OID, WARN, "Too short length %u\n", u4QueryBufferLen);
  4092. return WLAN_STATUS_INVALID_LENGTH;
  4093. }
  4094. #if CFG_ENABLE_STATISTICS_BUFFERING
  4095. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  4096. P_PARAM_802_11_STATISTICS_STRUCT_T prStatistics;
  4097. *pu4QueryInfoLen = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4098. prStatistics = (P_PARAM_802_11_STATISTICS_STRUCT_T) pvQueryBuffer;
  4099. prStatistics->u4Length = sizeof(PARAM_802_11_STATISTICS_STRUCT_T);
  4100. prStatistics->rTransmittedFragmentCount = prAdapter->rStatStruct.rTransmittedFragmentCount;
  4101. prStatistics->rMulticastTransmittedFrameCount = prAdapter->rStatStruct.rMulticastTransmittedFrameCount;
  4102. prStatistics->rFailedCount = prAdapter->rStatStruct.rFailedCount;
  4103. prStatistics->rRetryCount = prAdapter->rStatStruct.rRetryCount;
  4104. prStatistics->rMultipleRetryCount = prAdapter->rStatStruct.rMultipleRetryCount;
  4105. prStatistics->rRTSSuccessCount = prAdapter->rStatStruct.rRTSSuccessCount;
  4106. prStatistics->rRTSFailureCount = prAdapter->rStatStruct.rRTSFailureCount;
  4107. prStatistics->rACKFailureCount = prAdapter->rStatStruct.rACKFailureCount;
  4108. prStatistics->rFrameDuplicateCount = prAdapter->rStatStruct.rFrameDuplicateCount;
  4109. prStatistics->rReceivedFragmentCount = prAdapter->rStatStruct.rReceivedFragmentCount;
  4110. prStatistics->rMulticastReceivedFrameCount = prAdapter->rStatStruct.rMulticastReceivedFrameCount;
  4111. prStatistics->rFCSErrorCount = prAdapter->rStatStruct.rFCSErrorCount;
  4112. prStatistics->rTKIPLocalMICFailures.QuadPart = 0;
  4113. prStatistics->rTKIPICVErrors.QuadPart = 0;
  4114. prStatistics->rTKIPCounterMeasuresInvoked.QuadPart = 0;
  4115. prStatistics->rTKIPReplays.QuadPart = 0;
  4116. prStatistics->rCCMPFormatErrors.QuadPart = 0;
  4117. prStatistics->rCCMPReplays.QuadPart = 0;
  4118. prStatistics->rCCMPDecryptErrors.QuadPart = 0;
  4119. prStatistics->rFourWayHandshakeFailures.QuadPart = 0;
  4120. prStatistics->rWEPUndecryptableCount.QuadPart = 0;
  4121. prStatistics->rWEPICVErrorCount.QuadPart = 0;
  4122. prStatistics->rDecryptSuccessCount.QuadPart = 0;
  4123. prStatistics->rDecryptFailureCount.QuadPart = 0;
  4124. return WLAN_STATUS_SUCCESS;
  4125. }
  4126. #endif
  4127. return wlanSendSetQueryCmd(prAdapter,
  4128. CMD_ID_GET_STATISTICS,
  4129. FALSE,
  4130. TRUE,
  4131. TRUE,
  4132. nicCmdEventQueryStatistics,
  4133. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  4134. } /* wlanoidQueryStatistics */
  4135. /*----------------------------------------------------------------------------*/
  4136. /*! \brief This routine is called to query current media streaming status.
  4137. *
  4138. * \param[in] pvAdapter Pointer to the Adapter structure
  4139. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4140. * query buffer
  4141. * \param[in] u4QueryBufLen The length of the query buffer
  4142. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4143. * bytes written into the query buffer. If the call
  4144. * failed due to invalid length of the query buffer,
  4145. * returns the amount of storage needed.
  4146. *
  4147. * \retval WLAN_STATUS_SUCCESS
  4148. */
  4149. /*----------------------------------------------------------------------------*/
  4150. WLAN_STATUS
  4151. wlanoidQueryMediaStreamMode(IN P_ADAPTER_T prAdapter,
  4152. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4153. {
  4154. DEBUGFUNC("wlanoidQueryMediaStreamMode");
  4155. ASSERT(prAdapter);
  4156. ASSERT(pu4QueryInfoLen);
  4157. if (u4QueryBufferLen)
  4158. ASSERT(pvQueryBuffer);
  4159. *pu4QueryInfoLen = sizeof(ENUM_MEDIA_STREAM_MODE);
  4160. if (u4QueryBufferLen < *pu4QueryInfoLen) {
  4161. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  4162. return WLAN_STATUS_INVALID_LENGTH;
  4163. }
  4164. *(P_ENUM_MEDIA_STREAM_MODE) pvQueryBuffer =
  4165. prAdapter->rWlanInfo.eLinkAttr.ucMediaStreamMode == 0 ? ENUM_MEDIA_STREAM_OFF : ENUM_MEDIA_STREAM_ON;
  4166. return WLAN_STATUS_SUCCESS;
  4167. } /* wlanoidQueryMediaStreamMode */
  4168. /*----------------------------------------------------------------------------*/
  4169. /*! \brief This routine is called to enter media streaming mode or exit media streaming mode
  4170. *
  4171. * \param[in] pvAdapter Pointer to the Adapter structure
  4172. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4173. * query buffer
  4174. * \param[in] u4QueryBufLen The length of the query buffer
  4175. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4176. * bytes written into the query buffer. If the call
  4177. * failed due to invalid length of the query buffer,
  4178. * returns the amount of storage needed.
  4179. *
  4180. * \retval WLAN_STATUS_SUCCESS
  4181. */
  4182. /*----------------------------------------------------------------------------*/
  4183. WLAN_STATUS
  4184. wlanoidSetMediaStreamMode(IN P_ADAPTER_T prAdapter,
  4185. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  4186. {
  4187. ENUM_MEDIA_STREAM_MODE eStreamMode;
  4188. DEBUGFUNC("wlanoidSetMediaStreamMode");
  4189. ASSERT(prAdapter);
  4190. ASSERT(pvSetBuffer);
  4191. ASSERT(pu4SetInfoLen);
  4192. if (u4SetBufferLen < sizeof(ENUM_MEDIA_STREAM_MODE)) {
  4193. DBGLOG(OID, WARN, "Invalid length %u\n", u4SetBufferLen);
  4194. return WLAN_STATUS_INVALID_LENGTH;
  4195. }
  4196. *pu4SetInfoLen = sizeof(ENUM_MEDIA_STREAM_MODE);
  4197. eStreamMode = *(P_ENUM_MEDIA_STREAM_MODE) pvSetBuffer;
  4198. if (eStreamMode == ENUM_MEDIA_STREAM_OFF)
  4199. prAdapter->rWlanInfo.eLinkAttr.ucMediaStreamMode = 0;
  4200. else
  4201. prAdapter->rWlanInfo.eLinkAttr.ucMediaStreamMode = 1;
  4202. return wlanSendSetQueryCmd(prAdapter,
  4203. CMD_ID_LINK_ATTRIB,
  4204. TRUE,
  4205. FALSE,
  4206. TRUE,
  4207. nicCmdEventSetMediaStreamMode,
  4208. nicOidCmdTimeoutCommon,
  4209. sizeof(CMD_LINK_ATTRIB),
  4210. (PUINT_8) &(prAdapter->rWlanInfo.eLinkAttr), pvSetBuffer, u4SetBufferLen);
  4211. } /* wlanoidSetMediaStreamMode */
  4212. /*----------------------------------------------------------------------------*/
  4213. /*! \brief This routine is called to query the permanent MAC address of the NIC.
  4214. *
  4215. * \param[in] pvAdapter Pointer to the Adapter structure
  4216. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4217. * query buffer
  4218. * \param[in] u4QueryBufLen The length of the query buffer
  4219. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4220. * bytes written into the query buffer. If the call
  4221. * failed due to invalid length of the query buffer,
  4222. * returns the amount of storage needed.
  4223. *
  4224. * \retval WLAN_STATUS_SUCCESS
  4225. */
  4226. /*----------------------------------------------------------------------------*/
  4227. WLAN_STATUS
  4228. wlanoidQueryPermanentAddr(IN P_ADAPTER_T prAdapter,
  4229. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4230. {
  4231. DEBUGFUNC("wlanoidQueryPermanentAddr");
  4232. DBGLOG(OID, LOUD, "\n");
  4233. ASSERT(prAdapter);
  4234. ASSERT(pu4QueryInfoLen);
  4235. if (u4QueryBufferLen)
  4236. ASSERT(pvQueryBuffer);
  4237. if (u4QueryBufferLen < MAC_ADDR_LEN)
  4238. return WLAN_STATUS_BUFFER_TOO_SHORT;
  4239. COPY_MAC_ADDR(pvQueryBuffer, prAdapter->rWifiVar.aucPermanentAddress);
  4240. *pu4QueryInfoLen = MAC_ADDR_LEN;
  4241. return WLAN_STATUS_SUCCESS;
  4242. } /* wlanoidQueryPermanentAddr */
  4243. /*----------------------------------------------------------------------------*/
  4244. /*! \brief This routine is called to query the MAC address the NIC is currently using.
  4245. *
  4246. * \param[in] pvAdapter Pointer to the Adapter structure
  4247. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4248. * query buffer
  4249. * \param[in] u4QueryBufLen The length of the query buffer
  4250. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4251. * bytes written into the query buffer. If the call
  4252. * failed due to invalid length of the query buffer,
  4253. * returns the amount of storage needed.
  4254. *
  4255. * \retval WLAN_STATUS_SUCCESS
  4256. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  4257. */
  4258. /*----------------------------------------------------------------------------*/
  4259. WLAN_STATUS
  4260. wlanoidQueryCurrentAddr(IN P_ADAPTER_T prAdapter,
  4261. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4262. {
  4263. CMD_BASIC_CONFIG rCmdBasicConfig;
  4264. DEBUGFUNC("wlanoidQueryCurrentAddr");
  4265. DBGLOG(OID, LOUD, "\n");
  4266. ASSERT(prAdapter);
  4267. ASSERT(pu4QueryInfoLen);
  4268. if (u4QueryBufferLen)
  4269. ASSERT(pvQueryBuffer);
  4270. if (u4QueryBufferLen < MAC_ADDR_LEN)
  4271. return WLAN_STATUS_BUFFER_TOO_SHORT;
  4272. kalMemZero(&rCmdBasicConfig, sizeof(CMD_BASIC_CONFIG));
  4273. return wlanSendSetQueryCmd(prAdapter,
  4274. CMD_ID_BASIC_CONFIG,
  4275. FALSE,
  4276. TRUE,
  4277. TRUE,
  4278. nicCmdEventQueryAddress,
  4279. nicOidCmdTimeoutCommon,
  4280. sizeof(CMD_BASIC_CONFIG),
  4281. (PUINT_8) &rCmdBasicConfig, pvQueryBuffer, u4QueryBufferLen);
  4282. } /* wlanoidQueryCurrentAddr */
  4283. /*----------------------------------------------------------------------------*/
  4284. /*! \brief This routine is called to query NIC link speed.
  4285. *
  4286. * \param[in] pvAdapter Pointer to the Adapter structure
  4287. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  4288. * query buffer
  4289. * \param[in] u4QueryBufLen The length of the query buffer
  4290. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4291. * bytes written into the query buffer. If the call
  4292. * failed due to invalid length of the query buffer,
  4293. * returns the amount of storage needed.
  4294. *
  4295. * \retval WLAN_STATUS_SUCCESS
  4296. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  4297. *
  4298. */
  4299. /*----------------------------------------------------------------------------*/
  4300. WLAN_STATUS
  4301. wlanoidQueryLinkSpeed(IN P_ADAPTER_T prAdapter,
  4302. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4303. {
  4304. DEBUGFUNC("wlanoidQueryLinkSpeed");
  4305. ASSERT(prAdapter);
  4306. ASSERT(pu4QueryInfoLen);
  4307. if (u4QueryBufferLen)
  4308. ASSERT(pvQueryBuffer);
  4309. *pu4QueryInfoLen = sizeof(UINT_32);
  4310. if (u4QueryBufferLen < sizeof(UINT_32))
  4311. return WLAN_STATUS_BUFFER_TOO_SHORT;
  4312. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) != PARAM_MEDIA_STATE_CONNECTED) {
  4313. return WLAN_STATUS_ADAPTER_NOT_READY;
  4314. } else if (prAdapter->fgIsLinkRateValid == TRUE &&
  4315. (kalGetTimeTick() - prAdapter->rLinkRateUpdateTime) <= CFG_LINK_QUALITY_VALID_PERIOD) {
  4316. *(PUINT_32) pvQueryBuffer = prAdapter->rLinkQuality.u2LinkSpeed * 5000; /* change to unit of 100bps */
  4317. return WLAN_STATUS_SUCCESS;
  4318. } else {
  4319. return wlanSendSetQueryCmd(prAdapter,
  4320. CMD_ID_GET_LINK_QUALITY,
  4321. FALSE,
  4322. TRUE,
  4323. TRUE,
  4324. nicCmdEventQueryLinkSpeed,
  4325. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  4326. }
  4327. } /* end of wlanoidQueryLinkSpeed() */
  4328. /*----------------------------------------------------------------------------*/
  4329. /*!
  4330. * \brief This routine is called to query MCR value.
  4331. *
  4332. * \param[in] pvAdapter Pointer to the Adapter structure.
  4333. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  4334. * the query.
  4335. * \param[in] u4QueryBufLen The length of the query buffer.
  4336. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4337. * bytes written into the query buffer. If the call
  4338. * failed due to invalid length of the query buffer,
  4339. * returns the amount of storage needed.
  4340. *
  4341. * \retval WLAN_STATUS_SUCCESS
  4342. * \retval WLAN_STATUS_INVALID_LENGTH
  4343. */
  4344. /*----------------------------------------------------------------------------*/
  4345. WLAN_STATUS
  4346. wlanoidQueryMcrRead(IN P_ADAPTER_T prAdapter,
  4347. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4348. {
  4349. P_PARAM_CUSTOM_MCR_RW_STRUCT_T prMcrRdInfo;
  4350. CMD_ACCESS_REG rCmdAccessReg;
  4351. DEBUGFUNC("wlanoidQueryMcrRead");
  4352. DBGLOG(OID, LOUD, "\n");
  4353. ASSERT(prAdapter);
  4354. ASSERT(pu4QueryInfoLen);
  4355. if (u4QueryBufferLen)
  4356. ASSERT(pvQueryBuffer);
  4357. *pu4QueryInfoLen = sizeof(PARAM_CUSTOM_MCR_RW_STRUCT_T);
  4358. if (u4QueryBufferLen < sizeof(PARAM_CUSTOM_MCR_RW_STRUCT_T))
  4359. return WLAN_STATUS_INVALID_LENGTH;
  4360. prMcrRdInfo = (P_PARAM_CUSTOM_MCR_RW_STRUCT_T) pvQueryBuffer;
  4361. /* 0x9000 - 0x9EFF reserved for FW */
  4362. #if CFG_SUPPORT_SWCR
  4363. if ((prMcrRdInfo->u4McrOffset >> 16) == 0x9F00) {
  4364. swCrReadWriteCmd(prAdapter,
  4365. SWCR_READ,
  4366. (UINT_16) (prMcrRdInfo->u4McrOffset & BITS(0, 15)), &prMcrRdInfo->u4McrData);
  4367. return WLAN_STATUS_SUCCESS;
  4368. }
  4369. #endif /* CFG_SUPPORT_SWCR */
  4370. /* Check if access F/W Domain MCR (due to WiFiSYS is placed from 0x6000-0000 */
  4371. if (prMcrRdInfo->u4McrOffset & 0xFFFF0000) {
  4372. /* fill command */
  4373. rCmdAccessReg.u4Address = prMcrRdInfo->u4McrOffset;
  4374. rCmdAccessReg.u4Data = 0;
  4375. return wlanSendSetQueryCmd(prAdapter,
  4376. CMD_ID_ACCESS_REG,
  4377. FALSE,
  4378. TRUE,
  4379. TRUE,
  4380. nicCmdEventQueryMcrRead,
  4381. nicOidCmdTimeoutCommon,
  4382. sizeof(CMD_ACCESS_REG),
  4383. (PUINT_8) &rCmdAccessReg, pvQueryBuffer, u4QueryBufferLen);
  4384. } else {
  4385. HAL_MCR_RD(prAdapter, prMcrRdInfo->u4McrOffset & BITS(2, 31), /* address is in DWORD unit */
  4386. &prMcrRdInfo->u4McrData);
  4387. DBGLOG(OID, TRACE, "MCR Read: Offset = %#08x, Data = %#08x\n",
  4388. prMcrRdInfo->u4McrOffset, prMcrRdInfo->u4McrData);
  4389. return WLAN_STATUS_SUCCESS;
  4390. }
  4391. } /* end of wlanoidQueryMcrRead() */
  4392. /*----------------------------------------------------------------------------*/
  4393. /*!
  4394. * \brief This routine is called to write MCR and enable specific function.
  4395. *
  4396. * \param[in] prAdapter Pointer to the Adapter structure.
  4397. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  4398. * \param[in] u4SetBufferLen The length of the set buffer.
  4399. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  4400. * bytes read from the set buffer. If the call failed
  4401. * due to invalid length of the set buffer, returns
  4402. * the amount of storage needed.
  4403. *
  4404. * \retval WLAN_STATUS_SUCCESS
  4405. * \retval WLAN_STATUS_INVALID_LENGTH
  4406. */
  4407. /*----------------------------------------------------------------------------*/
  4408. WLAN_STATUS
  4409. wlanoidSetMcrWrite(IN P_ADAPTER_T prAdapter,
  4410. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  4411. {
  4412. P_PARAM_CUSTOM_MCR_RW_STRUCT_T prMcrWrInfo;
  4413. CMD_ACCESS_REG rCmdAccessReg;
  4414. #if CFG_STRESS_TEST_SUPPORT
  4415. P_AIS_FSM_INFO_T prAisFsmInfo;
  4416. P_BSS_INFO_T prBssInfo = &(prAdapter->rWifiVar.arBssInfo[(NETWORK_TYPE_AIS_INDEX)]);
  4417. P_STA_RECORD_T prStaRec = prBssInfo->prStaRecOfAP;
  4418. UINT_32 u4McrOffset, u4McrData;
  4419. #endif
  4420. DEBUGFUNC("wlanoidSetMcrWrite");
  4421. DBGLOG(OID, LOUD, "\n");
  4422. ASSERT(prAdapter);
  4423. ASSERT(pu4SetInfoLen);
  4424. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_MCR_RW_STRUCT_T);
  4425. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_MCR_RW_STRUCT_T))
  4426. return WLAN_STATUS_INVALID_LENGTH;
  4427. ASSERT(pvSetBuffer);
  4428. prMcrWrInfo = (P_PARAM_CUSTOM_MCR_RW_STRUCT_T) pvSetBuffer;
  4429. /* 0x9000 - 0x9EFF reserved for FW */
  4430. /* 0xFFFE reserved for FW */
  4431. /* -- Puff Stress Test Begin */
  4432. #if CFG_STRESS_TEST_SUPPORT
  4433. /* 0xFFFFFFFE for Control Rate */
  4434. if (prMcrWrInfo->u4McrOffset == 0xFFFFFFFE) {
  4435. if (prMcrWrInfo->u4McrData < FIXED_RATE_NUM && prMcrWrInfo->u4McrData > 0)
  4436. prAdapter->rWifiVar.eRateSetting = (ENUM_REGISTRY_FIXED_RATE_T) (prMcrWrInfo->u4McrData);
  4437. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_1);
  4438. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_3);
  4439. DEBUGFUNC("[Stress Test]Complete Rate is Changed...\n");
  4440. DBGLOG(OID, TRACE,
  4441. "[Stress Test] Rate is Changed to index %d...\n", prAdapter->rWifiVar.eRateSetting);
  4442. }
  4443. /* 0xFFFFFFFD for Switch Channel */
  4444. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFFD) {
  4445. if (prMcrWrInfo->u4McrData <= 11 && prMcrWrInfo->u4McrData >= 1)
  4446. prBssInfo->ucPrimaryChannel = prMcrWrInfo->u4McrData;
  4447. nicUpdateBss(prAdapter, prBssInfo->ucNetTypeIndex);
  4448. DBGLOG(OID, TRACE, "[Stress Test] Channel is switched to %d ...\n", prBssInfo->ucPrimaryChannel);
  4449. return WLAN_STATUS_SUCCESS;
  4450. }
  4451. /* 0xFFFFFFFFC for Control RF Band and SCO */
  4452. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFFC) {
  4453. /* Band */
  4454. if (prMcrWrInfo->u4McrData & 0x80000000) {
  4455. /* prBssInfo->eBand = BAND_5G; */
  4456. /* prBssInfo->ucPrimaryChannel = 52; // Bond to Channel 52 */
  4457. } else {
  4458. prBssInfo->eBand = BAND_2G4;
  4459. prBssInfo->ucPrimaryChannel = 8; /* Bond to Channel 6 */
  4460. }
  4461. /* Bandwidth */
  4462. if (prMcrWrInfo->u4McrData & 0x00010000) {
  4463. prStaRec->u2HtCapInfo |= HT_CAP_INFO_SUP_CHNL_WIDTH;
  4464. prStaRec->ucDesiredPhyTypeSet = PHY_TYPE_BIT_HT;
  4465. if (prMcrWrInfo->u4McrData == 0x00010002) {
  4466. prBssInfo->eBssSCO = CHNL_EXT_SCB; /* U20 */
  4467. prBssInfo->ucPrimaryChannel += 2;
  4468. } else if (prMcrWrInfo->u4McrData == 0x00010001) {
  4469. prBssInfo->eBssSCO = CHNL_EXT_SCA; /* L20 */
  4470. prBssInfo->ucPrimaryChannel -= 2;
  4471. } else {
  4472. prBssInfo->eBssSCO = CHNL_EXT_SCA; /* 40 */
  4473. }
  4474. }
  4475. if (prMcrWrInfo->u4McrData & 0x00000000) {
  4476. prStaRec->u2HtCapInfo &= ~HT_CAP_INFO_SUP_CHNL_WIDTH;
  4477. prBssInfo->eBssSCO = CHNL_EXT_SCN;
  4478. }
  4479. rlmBssInitForAPandIbss(prAdapter, prBssInfo);
  4480. }
  4481. /* 0xFFFFFFFB for HT Capability */
  4482. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFFB) {
  4483. /* Enable HT Capability */
  4484. if (prMcrWrInfo->u4McrData & 0x00000001) {
  4485. prStaRec->u2HtCapInfo |= HT_CAP_INFO_HT_GF;
  4486. DEBUGFUNC("[Stress Test]Enable HT capability...\n");
  4487. } else {
  4488. prStaRec->u2HtCapInfo &= (~HT_CAP_INFO_HT_GF);
  4489. DEBUGFUNC("[Stress Test]Disable HT capability...\n");
  4490. }
  4491. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_1);
  4492. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_3);
  4493. }
  4494. /* 0xFFFFFFFA for Enable Random Rx Reset */
  4495. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFFA) {
  4496. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4497. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4498. return wlanSendSetQueryCmd(prAdapter,
  4499. CMD_ID_RANDOM_RX_RESET_EN,
  4500. TRUE,
  4501. FALSE,
  4502. TRUE,
  4503. nicCmdEventSetCommon,
  4504. nicOidCmdTimeoutCommon,
  4505. sizeof(CMD_ACCESS_REG),
  4506. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4507. }
  4508. /* 0xFFFFFFF9 for Disable Random Rx Reset */
  4509. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFF9) {
  4510. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4511. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4512. return wlanSendSetQueryCmd(prAdapter,
  4513. CMD_ID_RANDOM_RX_RESET_DE,
  4514. TRUE,
  4515. FALSE,
  4516. TRUE,
  4517. nicCmdEventSetCommon,
  4518. nicOidCmdTimeoutCommon,
  4519. sizeof(CMD_ACCESS_REG),
  4520. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4521. }
  4522. /* 0xFFFFFFF8 for Enable SAPP */
  4523. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFF8) {
  4524. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4525. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4526. return wlanSendSetQueryCmd(prAdapter,
  4527. CMD_ID_SAPP_EN,
  4528. TRUE,
  4529. FALSE,
  4530. TRUE,
  4531. nicCmdEventSetCommon,
  4532. nicOidCmdTimeoutCommon,
  4533. sizeof(CMD_ACCESS_REG),
  4534. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4535. }
  4536. /* 0xFFFFFFF7 for Disable SAPP */
  4537. else if (prMcrWrInfo->u4McrOffset == 0xFFFFFFF7) {
  4538. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4539. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4540. return wlanSendSetQueryCmd(prAdapter,
  4541. CMD_ID_SAPP_DE,
  4542. TRUE,
  4543. FALSE,
  4544. TRUE,
  4545. nicCmdEventSetCommon,
  4546. nicOidCmdTimeoutCommon,
  4547. sizeof(CMD_ACCESS_REG),
  4548. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4549. }
  4550. else
  4551. #endif
  4552. /* -- Puff Stress Test End */
  4553. /* Check if access F/W Domain MCR */
  4554. if (prMcrWrInfo->u4McrOffset & 0xFFFF0000) {
  4555. /* 0x9000 - 0x9EFF reserved for FW */
  4556. #if CFG_SUPPORT_SWCR
  4557. if ((prMcrWrInfo->u4McrOffset >> 16) == 0x9F00) {
  4558. swCrReadWriteCmd(prAdapter,
  4559. SWCR_WRITE,
  4560. (UINT_16) (prMcrWrInfo->u4McrOffset & BITS(0, 15)), &prMcrWrInfo->u4McrData);
  4561. return WLAN_STATUS_SUCCESS;
  4562. }
  4563. #endif /* CFG_SUPPORT_SWCR */
  4564. #if 1
  4565. /* low power test special command */
  4566. if (prMcrWrInfo->u4McrOffset == 0x11111110) {
  4567. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  4568. /* DbgPrint("Enter test mode\n"); */
  4569. prAdapter->fgTestMode = TRUE;
  4570. return rStatus;
  4571. }
  4572. if (prMcrWrInfo->u4McrOffset == 0x11111111) {
  4573. /* DbgPrint("nicpmSetAcpiPowerD3\n"); */
  4574. nicpmSetAcpiPowerD3(prAdapter);
  4575. kalDevSetPowerState(prAdapter->prGlueInfo, (UINT_32) ParamDeviceStateD3);
  4576. return WLAN_STATUS_SUCCESS;
  4577. }
  4578. if (prMcrWrInfo->u4McrOffset == 0x11111112) {
  4579. /* DbgPrint("LP enter sleep\n"); */
  4580. /* fill command */
  4581. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4582. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4583. return wlanSendSetQueryCmd(prAdapter,
  4584. CMD_ID_ACCESS_REG,
  4585. TRUE,
  4586. FALSE,
  4587. TRUE,
  4588. nicCmdEventSetCommon,
  4589. nicOidCmdTimeoutCommon,
  4590. sizeof(CMD_ACCESS_REG),
  4591. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4592. }
  4593. #endif
  4594. #if 1
  4595. /* low power test special command */
  4596. if (prMcrWrInfo->u4McrOffset == 0x11111110) {
  4597. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  4598. /* DbgPrint("Enter test mode\n"); */
  4599. prAdapter->fgTestMode = TRUE;
  4600. return rStatus;
  4601. }
  4602. if (prMcrWrInfo->u4McrOffset == 0x11111111) {
  4603. /* DbgPrint("nicpmSetAcpiPowerD3\n"); */
  4604. nicpmSetAcpiPowerD3(prAdapter);
  4605. kalDevSetPowerState(prAdapter->prGlueInfo, (UINT_32) ParamDeviceStateD3);
  4606. return WLAN_STATUS_SUCCESS;
  4607. }
  4608. if (prMcrWrInfo->u4McrOffset == 0x11111112) {
  4609. /* DbgPrint("LP enter sleep\n"); */
  4610. /* fill command */
  4611. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4612. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4613. return wlanSendSetQueryCmd(prAdapter,
  4614. CMD_ID_ACCESS_REG,
  4615. TRUE,
  4616. FALSE,
  4617. TRUE,
  4618. nicCmdEventSetCommon,
  4619. nicOidCmdTimeoutCommon,
  4620. sizeof(CMD_ACCESS_REG),
  4621. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4622. }
  4623. #endif
  4624. /* fill command */
  4625. rCmdAccessReg.u4Address = prMcrWrInfo->u4McrOffset;
  4626. rCmdAccessReg.u4Data = prMcrWrInfo->u4McrData;
  4627. return wlanSendSetQueryCmd(prAdapter,
  4628. CMD_ID_ACCESS_REG,
  4629. TRUE,
  4630. FALSE,
  4631. TRUE,
  4632. nicCmdEventSetCommon,
  4633. nicOidCmdTimeoutCommon,
  4634. sizeof(CMD_ACCESS_REG),
  4635. (PUINT_8) &rCmdAccessReg, pvSetBuffer, u4SetBufferLen);
  4636. } else {
  4637. HAL_MCR_WR(prAdapter, (prMcrWrInfo->u4McrOffset & BITS(2, 31)), /* address is in DWORD unit */
  4638. prMcrWrInfo->u4McrData);
  4639. DBGLOG(OID, TRACE, "MCR Write: Offset = %#08x, Data = %#08x\n",
  4640. prMcrWrInfo->u4McrOffset, prMcrWrInfo->u4McrData);
  4641. return WLAN_STATUS_SUCCESS;
  4642. }
  4643. } /* wlanoidSetMcrWrite */
  4644. /*----------------------------------------------------------------------------*/
  4645. /*!
  4646. * \brief This routine is called to query SW CTRL
  4647. *
  4648. * \param[in] pvAdapter Pointer to the Adapter structure.
  4649. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  4650. * the query.
  4651. * \param[in] u4QueryBufLen The length of the query buffer.
  4652. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4653. * bytes written into the query buffer. If the call
  4654. * failed due to invalid length of the query buffer,
  4655. * returns the amount of storage needed.
  4656. *
  4657. * \retval WLAN_STATUS_SUCCESS
  4658. * \retval WLAN_STATUS_INVALID_LENGTH
  4659. */
  4660. /*----------------------------------------------------------------------------*/
  4661. WLAN_STATUS
  4662. wlanoidQuerySwCtrlRead(IN P_ADAPTER_T prAdapter,
  4663. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4664. {
  4665. P_PARAM_CUSTOM_SW_CTRL_STRUCT_T prSwCtrlInfo;
  4666. WLAN_STATUS rWlanStatus;
  4667. UINT_16 u2Id, u2SubId;
  4668. UINT_32 u4Data;
  4669. CMD_SW_DBG_CTRL_T rCmdSwCtrl;
  4670. DEBUGFUNC("wlanoidQuerySwCtrlRead");
  4671. DBGLOG(OID, LOUD, "\n");
  4672. ASSERT(prAdapter);
  4673. ASSERT(pu4QueryInfoLen);
  4674. if (u4QueryBufferLen)
  4675. ASSERT(pvQueryBuffer);
  4676. *pu4QueryInfoLen = sizeof(PARAM_CUSTOM_SW_CTRL_STRUCT_T);
  4677. if (u4QueryBufferLen < sizeof(PARAM_CUSTOM_SW_CTRL_STRUCT_T))
  4678. return WLAN_STATUS_INVALID_LENGTH;
  4679. prSwCtrlInfo = (P_PARAM_CUSTOM_SW_CTRL_STRUCT_T) pvQueryBuffer;
  4680. u2Id = (UINT_16) (prSwCtrlInfo->u4Id >> 16);
  4681. u2SubId = (UINT_16) (prSwCtrlInfo->u4Id & BITS(0, 15));
  4682. u4Data = 0;
  4683. rWlanStatus = WLAN_STATUS_SUCCESS;
  4684. switch (u2Id) {
  4685. /* 0x9000 - 0x9EFF reserved for FW */
  4686. /* 0xFFFE reserved for FW */
  4687. #if CFG_SUPPORT_SWCR
  4688. case 0x9F00:
  4689. swCrReadWriteCmd(prAdapter, SWCR_READ /* Read */ ,
  4690. (UINT_16) u2SubId, &u4Data);
  4691. break;
  4692. #endif /* CFG_SUPPORT_SWCR */
  4693. case 0xFFFF:
  4694. {
  4695. u4Data = 0x5AA56620;
  4696. }
  4697. break;
  4698. case 0x9000:
  4699. default:
  4700. {
  4701. rCmdSwCtrl.u4Id = prSwCtrlInfo->u4Id;
  4702. rCmdSwCtrl.u4Data = 0;
  4703. rWlanStatus = wlanSendSetQueryCmd(prAdapter,
  4704. CMD_ID_SW_DBG_CTRL,
  4705. FALSE,
  4706. TRUE,
  4707. TRUE,
  4708. nicCmdEventQuerySwCtrlRead,
  4709. nicOidCmdTimeoutCommon,
  4710. sizeof(CMD_SW_DBG_CTRL_T),
  4711. (PUINT_8) &rCmdSwCtrl, pvQueryBuffer, u4QueryBufferLen);
  4712. }
  4713. } /* switch(u2Id) */
  4714. prSwCtrlInfo->u4Data = u4Data;
  4715. return rWlanStatus;
  4716. }
  4717. /* end of wlanoidQuerySwCtrlRead() */
  4718. /*----------------------------------------------------------------------------*/
  4719. /*!
  4720. * \brief This routine is called to write SW CTRL
  4721. *
  4722. * \param[in] prAdapter Pointer to the Adapter structure.
  4723. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  4724. * \param[in] u4SetBufferLen The length of the set buffer.
  4725. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  4726. * bytes read from the set buffer. If the call failed
  4727. * due to invalid length of the set buffer, returns
  4728. * the amount of storage needed.
  4729. *
  4730. * \retval WLAN_STATUS_SUCCESS
  4731. * \retval WLAN_STATUS_INVALID_LENGTH
  4732. */
  4733. /*----------------------------------------------------------------------------*/
  4734. WLAN_STATUS
  4735. wlanoidSetSwCtrlWrite(IN P_ADAPTER_T prAdapter,
  4736. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  4737. {
  4738. P_PARAM_CUSTOM_SW_CTRL_STRUCT_T prSwCtrlInfo;
  4739. CMD_SW_DBG_CTRL_T rCmdSwCtrl;
  4740. WLAN_STATUS rWlanStatus;
  4741. UINT_16 u2Id, u2SubId;
  4742. UINT_32 u4Data;
  4743. #if CFG_SUPPORT_HOTSPOT_OPTIMIZATION
  4744. P_GLUE_INFO_T prGlueInfo;
  4745. CMD_HOTSPOT_OPTIMIZATION_CONFIG arHotspotOptimizationCfg;
  4746. #endif
  4747. DEBUGFUNC("wlanoidSetSwCtrlWrite");
  4748. DBGLOG(OID, LOUD, "\n");
  4749. ASSERT(prAdapter);
  4750. ASSERT(pu4SetInfoLen);
  4751. #if CFG_SUPPORT_HOTSPOT_OPTIMIZATION
  4752. prGlueInfo = prAdapter->prGlueInfo;
  4753. #endif
  4754. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_SW_CTRL_STRUCT_T);
  4755. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_SW_CTRL_STRUCT_T))
  4756. return WLAN_STATUS_INVALID_LENGTH;
  4757. ASSERT(pvSetBuffer);
  4758. prSwCtrlInfo = (P_PARAM_CUSTOM_SW_CTRL_STRUCT_T) pvSetBuffer;
  4759. u2Id = (UINT_16) (prSwCtrlInfo->u4Id >> 16);
  4760. u2SubId = (UINT_16) (prSwCtrlInfo->u4Id & BITS(0, 15));
  4761. u4Data = prSwCtrlInfo->u4Data;
  4762. rWlanStatus = WLAN_STATUS_SUCCESS;
  4763. switch (u2Id) {
  4764. /* 0x9000 - 0x9EFF reserved for FW */
  4765. /* 0xFFFE reserved for FW */
  4766. #if CFG_SUPPORT_SWCR
  4767. case 0x9F00:
  4768. swCrReadWriteCmd(prAdapter, SWCR_WRITE, (UINT_16) u2SubId, &u4Data);
  4769. break;
  4770. #endif /* CFG_SUPPORT_SWCR */
  4771. case 0x1000:
  4772. if (u2SubId == 0x8000) {
  4773. /* CTIA power save mode setting (code: 0x10008000) */
  4774. prAdapter->u4CtiaPowerMode = u4Data;
  4775. prAdapter->fgEnCtiaPowerMode = TRUE;
  4776. /* */
  4777. {
  4778. PARAM_POWER_MODE ePowerMode;
  4779. if (prAdapter->u4CtiaPowerMode == 0)
  4780. /* force to keep in CAM mode */
  4781. ePowerMode = Param_PowerModeCAM;
  4782. else if (prAdapter->u4CtiaPowerMode == 1)
  4783. ePowerMode = Param_PowerModeMAX_PSP;
  4784. else
  4785. ePowerMode = Param_PowerModeFast_PSP;
  4786. rWlanStatus = nicConfigPowerSaveProfile(prAdapter,
  4787. NETWORK_TYPE_AIS_INDEX, ePowerMode, TRUE);
  4788. }
  4789. }
  4790. break;
  4791. case 0x1001:
  4792. if (u2SubId == 0x0)
  4793. prAdapter->fgEnOnlineScan = (BOOLEAN) u4Data;
  4794. else if (u2SubId == 0x1)
  4795. prAdapter->fgDisBcnLostDetection = (BOOLEAN) u4Data;
  4796. else if (u2SubId == 0x2)
  4797. prAdapter->rWifiVar.fgSupportUAPSD = (BOOLEAN) u4Data;
  4798. else if (u2SubId == 0x3) {
  4799. prAdapter->u4UapsdAcBmp = u4Data & BITS(0, 15);
  4800. prAdapter->rWifiVar.arBssInfo[u4Data >> 16].rPmProfSetupInfo.ucBmpDeliveryAC =
  4801. (UINT_8) prAdapter->u4UapsdAcBmp;
  4802. prAdapter->rWifiVar.arBssInfo[u4Data >> 16].rPmProfSetupInfo.ucBmpTriggerAC =
  4803. (UINT_8) prAdapter->u4UapsdAcBmp;
  4804. } else if (u2SubId == 0x4)
  4805. prAdapter->fgDisStaAgingTimeoutDetection = (BOOLEAN) u4Data;
  4806. else if (u2SubId == 0x5)
  4807. prAdapter->rWifiVar.rConnSettings.uc2G4BandwidthMode = (UINT_8) u4Data;
  4808. else if (u2SubId == 0x0100)
  4809. prAdapter->rWifiVar.u8SupportRxGf = (UINT_8) u4Data;
  4810. else if (u2SubId == 0x0101) {
  4811. prAdapter->rWifiVar.u8SupportRxSgi20 = (UINT_8) u4Data;
  4812. prAdapter->rWifiVar.u8SupportRxSgi40 = (UINT_8) u4Data;
  4813. } else if (u2SubId == 0x0102)
  4814. prAdapter->rWifiVar.u8SupportRxSTBC = (UINT_8) u4Data;
  4815. break;
  4816. #if CFG_SUPPORT_SWCR
  4817. case 0x1002:
  4818. if (u2SubId == 0x0) {
  4819. if (u4Data)
  4820. u4Data = BIT(HIF_RX_PKT_TYPE_MANAGEMENT);
  4821. swCrFrameCheckEnable(prAdapter, u4Data);
  4822. } else if (u2SubId == 0x1) {
  4823. BOOLEAN fgIsEnable;
  4824. UINT_8 ucType;
  4825. UINT_32 u4Timeout;
  4826. fgIsEnable = (BOOLEAN) (u4Data & 0xff);
  4827. ucType = 0; /* ((u4Data>>4) & 0xf); */
  4828. u4Timeout = ((u4Data >> 8) & 0xff);
  4829. swCrDebugCheckEnable(prAdapter, fgIsEnable, ucType, u4Timeout);
  4830. }
  4831. break;
  4832. #endif
  4833. #if CFG_SUPPORT_802_11W
  4834. case 0x2000:
  4835. DBGLOG(RSN, TRACE, "802.11w test 0x%x\n", u2SubId);
  4836. if (u2SubId == 0x0)
  4837. rsnStartSaQuery(prAdapter);
  4838. if (u2SubId == 0x1)
  4839. rsnStopSaQuery(prAdapter);
  4840. if (u2SubId == 0x2)
  4841. rsnSaQueryRequest(prAdapter, NULL);
  4842. if (u2SubId == 0x3) {
  4843. P_BSS_INFO_T prBssInfo = &(prAdapter->rWifiVar.arBssInfo[(NETWORK_TYPE_AIS_INDEX)]);
  4844. authSendDeauthFrame(prAdapter, prBssInfo->prStaRecOfAP, NULL, 7, NULL);
  4845. }
  4846. /* wext_set_mode */
  4847. /*
  4848. if (u2SubId == 0x3) {
  4849. prAdapter->prGlueInfo->rWpaInfo.u4Mfp = RSN_AUTH_MFP_DISABLED;
  4850. }
  4851. if (u2SubId == 0x4) {
  4852. //prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE;
  4853. prAdapter->prGlueInfo->rWpaInfo.u4Mfp = RSN_AUTH_MFP_OPTIONAL;
  4854. }
  4855. if (u2SubId == 0x5) {
  4856. //prAdapter->rWifiVar.rAisSpecificBssInfo.fgMgmtProtection = TRUE;
  4857. prAdapter->prGlueInfo->rWpaInfo.u4Mfp = RSN_AUTH_MFP_REQUIRED;
  4858. }
  4859. */
  4860. break;
  4861. #endif
  4862. case 0xFFFF:
  4863. {
  4864. /* CMD_ACCESS_REG rCmdAccessReg; */
  4865. #if 1 /* CFG_MT6573_SMT_TEST */
  4866. if (u2SubId == 0x0123) {
  4867. DBGLOG(HAL, TRACE, "set smt fixed rate: %u\n", u4Data);
  4868. if ((ENUM_REGISTRY_FIXED_RATE_T) (u4Data) < FIXED_RATE_NUM)
  4869. prAdapter->rWifiVar.eRateSetting = (ENUM_REGISTRY_FIXED_RATE_T) (u4Data);
  4870. else
  4871. prAdapter->rWifiVar.eRateSetting = FIXED_RATE_NONE;
  4872. if (prAdapter->rWifiVar.eRateSetting == FIXED_RATE_NONE)
  4873. /* Enable Auto (Long/Short) Preamble */
  4874. prAdapter->rWifiVar.ePreambleType = PREAMBLE_TYPE_AUTO;
  4875. else if ((prAdapter->rWifiVar.eRateSetting >= FIXED_RATE_MCS0_20M_400NS &&
  4876. prAdapter->rWifiVar.eRateSetting <= FIXED_RATE_MCS7_20M_400NS)
  4877. || (prAdapter->rWifiVar.eRateSetting >= FIXED_RATE_MCS0_40M_400NS &&
  4878. prAdapter->rWifiVar.eRateSetting <= FIXED_RATE_MCS32_400NS))
  4879. /* Force Short Preamble */
  4880. prAdapter->rWifiVar.ePreambleType = PREAMBLE_TYPE_SHORT;
  4881. else
  4882. /* Force Long Preamble */
  4883. prAdapter->rWifiVar.ePreambleType = PREAMBLE_TYPE_LONG;
  4884. /* abort to re-connect */
  4885. #if 1
  4886. DBGLOG(OID, TRACE, "DisBySwC\n");
  4887. kalIndicateStatusAndComplete(prAdapter->prGlueInfo,
  4888. WLAN_STATUS_MEDIA_DISCONNECT, NULL, 0);
  4889. #else
  4890. aisBssBeaconTimeout(prAdapter);
  4891. #endif
  4892. return WLAN_STATUS_SUCCESS;
  4893. } else if (u2SubId == 0x1234) {
  4894. /* 1. Disable On-Lin Scan */
  4895. /* 3. Disable FIFO FULL no ack */
  4896. /* 4. Disable Roaming */
  4897. /* Disalbe auto tx power */
  4898. /* 2. Keep at CAM mode */
  4899. /* 5. Disable Beacon Timeout Detection */
  4900. rWlanStatus = nicEnterCtiaMode(prAdapter, TRUE, TRUE);
  4901. } else if (u2SubId == 0x1235) {
  4902. /* 1. Enaable On-Lin Scan */
  4903. /* 3. Enable FIFO FULL no ack */
  4904. /* 4. Enable Roaming */
  4905. /* Enable auto tx power */
  4906. /* 2. Keep at Fast PS */
  4907. /* 5. Enable Beacon Timeout Detection */
  4908. rWlanStatus = nicEnterCtiaMode(prAdapter, FALSE, TRUE);
  4909. }
  4910. #if CFG_SUPPORT_HOTSPOT_OPTIMIZATION
  4911. else if (u2SubId == 0x1240) {
  4912. DBGLOG(P2P, TRACE, "Disable Hotspot Optimization!\n");
  4913. arHotspotOptimizationCfg.fgHotspotOptimizationEn = FALSE;
  4914. arHotspotOptimizationCfg.u4Level = 0;
  4915. wlanoidSendSetQueryP2PCmd(prAdapter,
  4916. CMD_ID_SET_HOTSPOT_OPTIMIZATION,
  4917. TRUE,
  4918. FALSE,
  4919. TRUE,
  4920. NULL,
  4921. NULL,
  4922. sizeof(CMD_HOTSPOT_OPTIMIZATION_CONFIG),
  4923. (PUINT_8) &arHotspotOptimizationCfg, NULL, 0);
  4924. } else if (u2SubId == 0x1241) {
  4925. DBGLOG(P2P, TRACE, "Enable Hotspot Optimization!\n");
  4926. arHotspotOptimizationCfg.fgHotspotOptimizationEn = TRUE;
  4927. arHotspotOptimizationCfg.u4Level = 5;
  4928. wlanoidSendSetQueryP2PCmd(prAdapter,
  4929. CMD_ID_SET_HOTSPOT_OPTIMIZATION,
  4930. TRUE,
  4931. FALSE,
  4932. TRUE,
  4933. NULL,
  4934. NULL,
  4935. sizeof(CMD_HOTSPOT_OPTIMIZATION_CONFIG),
  4936. (PUINT_8) &arHotspotOptimizationCfg, NULL, 0);
  4937. }
  4938. #endif /* CFG_SUPPORT_HOTSPOT_OPTIMIZATION */
  4939. else if (u2SubId == 0x1250) {
  4940. DBGLOG(OID, TRACE, "LTE_COEX: SW SET DUAL BAND\n");
  4941. prAdapter->aePreferBand[NETWORK_TYPE_AIS_INDEX] = BAND_NULL;
  4942. } else if (u2SubId == 0x1251) {
  4943. DBGLOG(OID, TRACE, "LTE_COEX: SW SET 2.4G BAND\n");
  4944. prAdapter->aePreferBand[NETWORK_TYPE_AIS_INDEX] = BAND_2G4;
  4945. } else if (u2SubId == 0x1252) {
  4946. DBGLOG(OID, TRACE, "LTE_COEX: SW SET 5G BAND\n");
  4947. prAdapter->aePreferBand[NETWORK_TYPE_AIS_INDEX] = BAND_5G;
  4948. }
  4949. #endif
  4950. }
  4951. break;
  4952. case 0x9000:
  4953. default:
  4954. {
  4955. rCmdSwCtrl.u4Id = prSwCtrlInfo->u4Id;
  4956. rCmdSwCtrl.u4Data = prSwCtrlInfo->u4Data;
  4957. rWlanStatus = wlanSendSetQueryCmd(prAdapter,
  4958. CMD_ID_SW_DBG_CTRL,
  4959. TRUE,
  4960. FALSE,
  4961. TRUE,
  4962. nicCmdEventSetCommon,
  4963. nicOidCmdTimeoutCommon,
  4964. sizeof(CMD_SW_DBG_CTRL_T),
  4965. (PUINT_8) &rCmdSwCtrl, pvSetBuffer, u4SetBufferLen);
  4966. }
  4967. } /* switch(u2Id) */
  4968. return rWlanStatus;
  4969. }
  4970. /* wlanoidSetSwCtrlWrite */
  4971. /*----------------------------------------------------------------------------*/
  4972. /*!
  4973. * \brief This routine is called to query EEPROM value.
  4974. *
  4975. * \param[in] pvAdapter Pointer to the Adapter structure.
  4976. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  4977. * the query.
  4978. * \param[in] u4QueryBufLen The length of the query buffer.
  4979. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  4980. * bytes written into the query buffer. If the call
  4981. * failed due to invalid length of the query buffer,
  4982. * returns the amount of storage needed.
  4983. *
  4984. * \retval WLAN_STATUS_SUCCESS
  4985. * \retval WLAN_STATUS_FAILURE
  4986. */
  4987. /*----------------------------------------------------------------------------*/
  4988. WLAN_STATUS
  4989. wlanoidQueryEepromRead(IN P_ADAPTER_T prAdapter,
  4990. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  4991. {
  4992. P_PARAM_CUSTOM_EEPROM_RW_STRUCT_T prEepromRwInfo;
  4993. CMD_ACCESS_EEPROM rCmdAccessEeprom;
  4994. DEBUGFUNC("wlanoidQueryEepromRead");
  4995. ASSERT(prAdapter);
  4996. ASSERT(pu4QueryInfoLen);
  4997. if (u4QueryBufferLen)
  4998. ASSERT(pvQueryBuffer);
  4999. *pu4QueryInfoLen = sizeof(PARAM_CUSTOM_EEPROM_RW_STRUCT_T);
  5000. if (u4QueryBufferLen < sizeof(PARAM_CUSTOM_EEPROM_RW_STRUCT_T))
  5001. return WLAN_STATUS_INVALID_LENGTH;
  5002. prEepromRwInfo = (P_PARAM_CUSTOM_EEPROM_RW_STRUCT_T) pvQueryBuffer;
  5003. kalMemZero(&rCmdAccessEeprom, sizeof(CMD_ACCESS_EEPROM));
  5004. rCmdAccessEeprom.u2Offset = prEepromRwInfo->ucEepromIndex;
  5005. return wlanSendSetQueryCmd(prAdapter,
  5006. CMD_ID_ACCESS_EEPROM,
  5007. FALSE,
  5008. TRUE,
  5009. TRUE,
  5010. nicCmdEventQueryEepromRead,
  5011. nicOidCmdTimeoutCommon,
  5012. sizeof(CMD_ACCESS_EEPROM),
  5013. (PUINT_8) &rCmdAccessEeprom, pvQueryBuffer, u4QueryBufferLen);
  5014. } /* wlanoidQueryEepromRead */
  5015. /*----------------------------------------------------------------------------*/
  5016. /*!
  5017. * \brief This routine is called to write EEPROM value.
  5018. *
  5019. * \param[in] prAdapter Pointer to the Adapter structure.
  5020. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  5021. * \param[in] u4SetBufferLen The length of the set buffer.
  5022. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5023. * bytes read from the set buffer. If the call failed
  5024. * due to invalid length of the set buffer, returns
  5025. * the amount of storage needed.
  5026. *
  5027. * \retval WLAN_STATUS_SUCCESS
  5028. * \retval WLAN_STATUS_FAILURE
  5029. */
  5030. /*----------------------------------------------------------------------------*/
  5031. WLAN_STATUS
  5032. wlanoidSetEepromWrite(IN P_ADAPTER_T prAdapter,
  5033. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5034. {
  5035. P_PARAM_CUSTOM_EEPROM_RW_STRUCT_T prEepromRwInfo;
  5036. CMD_ACCESS_EEPROM rCmdAccessEeprom;
  5037. DEBUGFUNC("wlanoidSetEepromWrite");
  5038. DBGLOG(OID, LOUD, "\n");
  5039. ASSERT(prAdapter);
  5040. ASSERT(pu4SetInfoLen);
  5041. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_EEPROM_RW_STRUCT_T);
  5042. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_EEPROM_RW_STRUCT_T))
  5043. return WLAN_STATUS_INVALID_LENGTH;
  5044. ASSERT(pvSetBuffer);
  5045. prEepromRwInfo = (P_PARAM_CUSTOM_EEPROM_RW_STRUCT_T) pvSetBuffer;
  5046. kalMemZero(&rCmdAccessEeprom, sizeof(CMD_ACCESS_EEPROM));
  5047. rCmdAccessEeprom.u2Offset = prEepromRwInfo->ucEepromIndex;
  5048. rCmdAccessEeprom.u2Data = prEepromRwInfo->u2EepromData;
  5049. return wlanSendSetQueryCmd(prAdapter,
  5050. CMD_ID_ACCESS_EEPROM,
  5051. TRUE,
  5052. FALSE,
  5053. TRUE,
  5054. nicCmdEventSetCommon,
  5055. nicOidCmdTimeoutCommon,
  5056. sizeof(CMD_ACCESS_EEPROM),
  5057. (PUINT_8) &rCmdAccessEeprom, pvSetBuffer, u4SetBufferLen);
  5058. } /* wlanoidSetEepromWrite */
  5059. /*----------------------------------------------------------------------------*/
  5060. /*!
  5061. * \brief This routine is called to query the number of the successfully transmitted
  5062. * packets.
  5063. *
  5064. * \param[in] pvAdapter Pointer to the Adapter structure.
  5065. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5066. * the query.
  5067. * \param[in] u4QueryBufLen The length of the query buffer.
  5068. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5069. * bytes written into the query buffer. If the call
  5070. * failed due to invalid length of the query buffer,
  5071. * returns the amount of storage needed.
  5072. *
  5073. * \retval WLAN_STATUS_SUCCESS
  5074. * \retval WLAN_STATUS_INVALID_LENGTH
  5075. */
  5076. /*----------------------------------------------------------------------------*/
  5077. WLAN_STATUS
  5078. wlanoidQueryXmitOk(IN P_ADAPTER_T prAdapter,
  5079. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5080. {
  5081. DEBUGFUNC("wlanoidQueryXmitOk");
  5082. DBGLOG(OID, LOUD, "\n");
  5083. ASSERT(prAdapter);
  5084. if (u4QueryBufferLen)
  5085. ASSERT(pvQueryBuffer);
  5086. ASSERT(pu4QueryInfoLen);
  5087. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5088. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5089. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5090. *pu4QueryInfoLen = sizeof(UINT_32);
  5091. return WLAN_STATUS_ADAPTER_NOT_READY;
  5092. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5093. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5094. *pu4QueryInfoLen = sizeof(UINT_64);
  5095. return WLAN_STATUS_INVALID_LENGTH;
  5096. }
  5097. #if CFG_ENABLE_STATISTICS_BUFFERING
  5098. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5099. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5100. *pu4QueryInfoLen = sizeof(UINT_32);
  5101. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rTransmittedFragmentCount.QuadPart;
  5102. } else {
  5103. *pu4QueryInfoLen = sizeof(UINT_64);
  5104. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rTransmittedFragmentCount.QuadPart;
  5105. }
  5106. return WLAN_STATUS_SUCCESS;
  5107. }
  5108. #endif
  5109. return wlanSendSetQueryCmd(prAdapter,
  5110. CMD_ID_GET_STATISTICS,
  5111. FALSE,
  5112. TRUE,
  5113. TRUE,
  5114. nicCmdEventQueryXmitOk,
  5115. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5116. } /* wlanoidQueryXmitOk */
  5117. /*----------------------------------------------------------------------------*/
  5118. /*!
  5119. * \brief This routine is called to query the number of the successfully received
  5120. * packets.
  5121. *
  5122. * \param[in] pvAdapter Pointer to the Adapter structure.
  5123. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5124. * the query.
  5125. * \param[in] u4QueryBufLen The length of the query buffer.
  5126. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5127. * bytes written into the query buffer. If the call
  5128. * failed due to invalid length of the query buffer,
  5129. * returns the amount of storage needed.
  5130. *
  5131. * \retval WLAN_STATUS_SUCCESS
  5132. * \retval WLAN_STATUS_INVALID_LENGTH
  5133. */
  5134. /*----------------------------------------------------------------------------*/
  5135. WLAN_STATUS
  5136. wlanoidQueryRcvOk(IN P_ADAPTER_T prAdapter,
  5137. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5138. {
  5139. DEBUGFUNC("wlanoidQueryRcvOk");
  5140. DBGLOG(OID, LOUD, "\n");
  5141. ASSERT(prAdapter);
  5142. if (u4QueryBufferLen)
  5143. ASSERT(pvQueryBuffer);
  5144. ASSERT(pu4QueryInfoLen);
  5145. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5146. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5147. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5148. *pu4QueryInfoLen = sizeof(UINT_32);
  5149. return WLAN_STATUS_ADAPTER_NOT_READY;
  5150. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5151. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5152. *pu4QueryInfoLen = sizeof(UINT_64);
  5153. return WLAN_STATUS_INVALID_LENGTH;
  5154. }
  5155. #if CFG_ENABLE_STATISTICS_BUFFERING
  5156. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5157. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5158. *pu4QueryInfoLen = sizeof(UINT_32);
  5159. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rReceivedFragmentCount.QuadPart;
  5160. } else {
  5161. *pu4QueryInfoLen = sizeof(UINT_64);
  5162. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rReceivedFragmentCount.QuadPart;
  5163. }
  5164. return WLAN_STATUS_SUCCESS;
  5165. }
  5166. #endif
  5167. return wlanSendSetQueryCmd(prAdapter,
  5168. CMD_ID_GET_STATISTICS,
  5169. FALSE,
  5170. TRUE,
  5171. TRUE,
  5172. nicCmdEventQueryRecvOk,
  5173. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5174. } /* wlanoidQueryRcvOk */
  5175. /*----------------------------------------------------------------------------*/
  5176. /*!
  5177. * \brief This routine is called to query the number of frames that the driver
  5178. * fails to transmit.
  5179. *
  5180. * \param[in] pvAdapter Pointer to the Adapter structure.
  5181. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5182. * the query.
  5183. * \param[in] u4QueryBufLen The length of the query buffer.
  5184. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5185. * bytes written into the query buffer. If the call
  5186. * failed due to invalid length of the query buffer,
  5187. * returns the amount of storage needed.
  5188. *
  5189. * \retval WLAN_STATUS_SUCCESS
  5190. * \retval WLAN_STATUS_INVALID_LENGTH
  5191. */
  5192. /*----------------------------------------------------------------------------*/
  5193. WLAN_STATUS
  5194. wlanoidQueryXmitError(IN P_ADAPTER_T prAdapter,
  5195. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5196. {
  5197. DEBUGFUNC("wlanoidQueryXmitError");
  5198. DBGLOG(OID, LOUD, "\n");
  5199. ASSERT(prAdapter);
  5200. if (u4QueryBufferLen)
  5201. ASSERT(pvQueryBuffer);
  5202. ASSERT(pu4QueryInfoLen);
  5203. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5204. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5205. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5206. *pu4QueryInfoLen = sizeof(UINT_32);
  5207. return WLAN_STATUS_ADAPTER_NOT_READY;
  5208. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5209. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5210. *pu4QueryInfoLen = sizeof(UINT_64);
  5211. return WLAN_STATUS_INVALID_LENGTH;
  5212. }
  5213. #if CFG_ENABLE_STATISTICS_BUFFERING
  5214. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5215. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5216. *pu4QueryInfoLen = sizeof(UINT_32);
  5217. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rFailedCount.QuadPart;
  5218. } else {
  5219. *pu4QueryInfoLen = sizeof(UINT_64);
  5220. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rFailedCount.QuadPart;
  5221. }
  5222. return WLAN_STATUS_SUCCESS;
  5223. }
  5224. #endif
  5225. return wlanSendSetQueryCmd(prAdapter,
  5226. CMD_ID_GET_STATISTICS,
  5227. FALSE,
  5228. TRUE,
  5229. TRUE,
  5230. nicCmdEventQueryXmitError,
  5231. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5232. } /* wlanoidQueryXmitError */
  5233. /*----------------------------------------------------------------------------*/
  5234. /*!
  5235. * \brief This routine is called to query the number of frames successfully
  5236. * transmitted after exactly one collision.
  5237. *
  5238. * \param[in] prAdapter Pointer to the Adapter structure.
  5239. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5240. * the query.
  5241. * \param[in] u4QueryBufLen The length of the query buffer.
  5242. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5243. * bytes written into the query buffer. If the call
  5244. * failed due to invalid length of the query buffer,
  5245. * returns the amount of storage needed.
  5246. *
  5247. * \retval WLAN_STATUS_SUCCESS
  5248. * \retval WLAN_STATUS_INVALID_LENGTH
  5249. */
  5250. /*----------------------------------------------------------------------------*/
  5251. WLAN_STATUS
  5252. wlanoidQueryXmitOneCollision(IN P_ADAPTER_T prAdapter,
  5253. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5254. {
  5255. DEBUGFUNC("wlanoidQueryXmitOneCollision");
  5256. DBGLOG(OID, LOUD, "\n");
  5257. ASSERT(prAdapter);
  5258. if (u4QueryBufferLen)
  5259. ASSERT(pvQueryBuffer);
  5260. ASSERT(pu4QueryInfoLen);
  5261. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5262. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5263. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5264. *pu4QueryInfoLen = sizeof(UINT_32);
  5265. return WLAN_STATUS_ADAPTER_NOT_READY;
  5266. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5267. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5268. *pu4QueryInfoLen = sizeof(UINT_64);
  5269. return WLAN_STATUS_INVALID_LENGTH;
  5270. }
  5271. #if CFG_ENABLE_STATISTICS_BUFFERING
  5272. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5273. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5274. *pu4QueryInfoLen = sizeof(UINT_32);
  5275. *(PUINT_32) pvQueryBuffer = (UINT_32)
  5276. (prAdapter->rStatStruct.rMultipleRetryCount.QuadPart -
  5277. prAdapter->rStatStruct.rRetryCount.QuadPart);
  5278. } else {
  5279. *pu4QueryInfoLen = sizeof(UINT_64);
  5280. *(PUINT_64) pvQueryBuffer = (UINT_64)
  5281. (prAdapter->rStatStruct.rMultipleRetryCount.QuadPart -
  5282. prAdapter->rStatStruct.rRetryCount.QuadPart);
  5283. }
  5284. return WLAN_STATUS_SUCCESS;
  5285. }
  5286. #endif
  5287. return wlanSendSetQueryCmd(prAdapter,
  5288. CMD_ID_GET_STATISTICS,
  5289. FALSE,
  5290. TRUE,
  5291. TRUE,
  5292. nicCmdEventQueryXmitOneCollision,
  5293. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5294. } /* wlanoidQueryXmitOneCollision */
  5295. /*----------------------------------------------------------------------------*/
  5296. /*!
  5297. * \brief This routine is called to query the number of frames successfully
  5298. * transmitted after more than one collision.
  5299. *
  5300. * \param[in] prAdapter Pointer to the Adapter structure.
  5301. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5302. * the query.
  5303. * \param[in] u4QueryBufLen The length of the query buffer.
  5304. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5305. * bytes written into the query buffer. If the call
  5306. * failed due to invalid length of the query buffer,
  5307. * returns the amount of storage needed.
  5308. *
  5309. * \retval WLAN_STATUS_SUCCESS
  5310. * \retval WLAN_STATUS_INVALID_LENGTH
  5311. */
  5312. /*----------------------------------------------------------------------------*/
  5313. WLAN_STATUS
  5314. wlanoidQueryXmitMoreCollisions(IN P_ADAPTER_T prAdapter,
  5315. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5316. {
  5317. DEBUGFUNC("wlanoidQueryXmitMoreCollisions");
  5318. DBGLOG(OID, LOUD, "\n");
  5319. ASSERT(prAdapter);
  5320. if (u4QueryBufferLen)
  5321. ASSERT(pvQueryBuffer);
  5322. ASSERT(pu4QueryInfoLen);
  5323. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5324. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5325. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5326. *pu4QueryInfoLen = sizeof(UINT_32);
  5327. return WLAN_STATUS_ADAPTER_NOT_READY;
  5328. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5329. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5330. *pu4QueryInfoLen = sizeof(UINT_64);
  5331. return WLAN_STATUS_INVALID_LENGTH;
  5332. }
  5333. #if CFG_ENABLE_STATISTICS_BUFFERING
  5334. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5335. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5336. *pu4QueryInfoLen = sizeof(UINT_32);
  5337. *(PUINT_32) pvQueryBuffer = (UINT_32) (prAdapter->rStatStruct.rMultipleRetryCount.QuadPart);
  5338. } else {
  5339. *pu4QueryInfoLen = sizeof(UINT_64);
  5340. *(PUINT_64) pvQueryBuffer = (UINT_64) (prAdapter->rStatStruct.rMultipleRetryCount.QuadPart);
  5341. }
  5342. return WLAN_STATUS_SUCCESS;
  5343. }
  5344. #endif
  5345. return wlanSendSetQueryCmd(prAdapter,
  5346. CMD_ID_GET_STATISTICS,
  5347. FALSE,
  5348. TRUE,
  5349. TRUE,
  5350. nicCmdEventQueryXmitMoreCollisions,
  5351. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5352. } /* wlanoidQueryXmitMoreCollisions */
  5353. /*----------------------------------------------------------------------------*/
  5354. /*!
  5355. * \brief This routine is called to query the number of frames
  5356. * not transmitted due to excessive collisions.
  5357. *
  5358. * \param[in] prAdapter Pointer to the Adapter structure.
  5359. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  5360. * the query.
  5361. * \param[in] u4QueryBufferLen The length of the query buffer.
  5362. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5363. * bytes written into the query buffer. If the call
  5364. * failed due to invalid length of the query buffer,
  5365. * returns the amount of storage needed.
  5366. *
  5367. * \retval WLAN_STATUS_SUCCESS
  5368. * \retval WLAN_STATUS_INVALID_LENGTH
  5369. */
  5370. /*----------------------------------------------------------------------------*/
  5371. WLAN_STATUS
  5372. wlanoidQueryXmitMaxCollisions(IN P_ADAPTER_T prAdapter,
  5373. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5374. {
  5375. DEBUGFUNC("wlanoidQueryXmitMaxCollisions");
  5376. DBGLOG(OID, LOUD, "\n");
  5377. ASSERT(prAdapter);
  5378. if (u4QueryBufferLen)
  5379. ASSERT(pvQueryBuffer);
  5380. ASSERT(pu4QueryInfoLen);
  5381. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5382. DBGLOG(OID, WARN, "Fail in query receive error! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5383. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5384. *pu4QueryInfoLen = sizeof(UINT_32);
  5385. return WLAN_STATUS_ADAPTER_NOT_READY;
  5386. } else if (u4QueryBufferLen < sizeof(UINT_32)
  5387. || (u4QueryBufferLen > sizeof(UINT_32) && u4QueryBufferLen < sizeof(UINT_64))) {
  5388. *pu4QueryInfoLen = sizeof(UINT_64);
  5389. return WLAN_STATUS_INVALID_LENGTH;
  5390. }
  5391. #if CFG_ENABLE_STATISTICS_BUFFERING
  5392. if (IsBufferedStatisticsUsable(prAdapter) == TRUE) {
  5393. if (u4QueryBufferLen == sizeof(UINT_32)) {
  5394. *pu4QueryInfoLen = sizeof(UINT_32);
  5395. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rStatStruct.rFailedCount.QuadPart;
  5396. } else {
  5397. *pu4QueryInfoLen = sizeof(UINT_64);
  5398. *(PUINT_64) pvQueryBuffer = (UINT_64) prAdapter->rStatStruct.rFailedCount.QuadPart;
  5399. }
  5400. return WLAN_STATUS_SUCCESS;
  5401. }
  5402. #endif
  5403. return wlanSendSetQueryCmd(prAdapter,
  5404. CMD_ID_GET_STATISTICS,
  5405. FALSE,
  5406. TRUE,
  5407. TRUE,
  5408. nicCmdEventQueryXmitMaxCollisions,
  5409. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5410. } /* wlanoidQueryXmitMaxCollisions */
  5411. #define MTK_CUSTOM_OID_INTERFACE_VERSION 0x00006620 /* for WPDWifi DLL */
  5412. /*----------------------------------------------------------------------------*/
  5413. /*!
  5414. * \brief This routine is called to query current the OID interface version,
  5415. * which is the interface between the application and driver.
  5416. *
  5417. * \param[in] prAdapter Pointer to the Adapter structure.
  5418. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  5419. * the query.
  5420. * \param[in] u4QueryBufferLen The length of the query buffer.
  5421. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5422. * bytes written into the query buffer. If the call
  5423. * failed due to invalid length of the query buffer,
  5424. * returns the amount of storage needed.
  5425. *
  5426. * \retval WLAN_STATUS_SUCCESS
  5427. */
  5428. /*----------------------------------------------------------------------------*/
  5429. WLAN_STATUS
  5430. wlanoidQueryOidInterfaceVersion(IN P_ADAPTER_T prAdapter,
  5431. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5432. {
  5433. DEBUGFUNC("wlanoidQueryOidInterfaceVersion");
  5434. ASSERT(prAdapter);
  5435. if (u4QueryBufferLen)
  5436. ASSERT(pvQueryBuffer);
  5437. ASSERT(pu4QueryInfoLen);
  5438. *(PUINT_32) pvQueryBuffer = MTK_CUSTOM_OID_INTERFACE_VERSION;
  5439. *pu4QueryInfoLen = sizeof(UINT_32);
  5440. DBGLOG(OID, WARN, "Custom OID interface version: %#08X\n", *(PUINT_32) pvQueryBuffer);
  5441. return WLAN_STATUS_SUCCESS;
  5442. } /* wlanoidQueryOidInterfaceVersion */
  5443. /*----------------------------------------------------------------------------*/
  5444. /*!
  5445. * \brief This routine is called to query current Multicast Address List.
  5446. *
  5447. * \param[in] prAdapter Pointer to the Adapter structure.
  5448. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  5449. * the query.
  5450. * \param[in] u4QueryBufferLen The length of the query buffer.
  5451. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5452. * bytes written into the query buffer. If the call
  5453. * failed due to invalid length of the query buffer,
  5454. * returns the amount of storage needed.
  5455. *
  5456. * \retval WLAN_STATUS_SUCCESS
  5457. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  5458. */
  5459. /*----------------------------------------------------------------------------*/
  5460. WLAN_STATUS
  5461. wlanoidQueryMulticastList(IN P_ADAPTER_T prAdapter,
  5462. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5463. {
  5464. #ifndef LINUX
  5465. ASSERT(prAdapter);
  5466. ASSERT(pu4QueryInfoLen);
  5467. if (u4QueryBufferLen)
  5468. ASSERT(pvQueryBuffer);
  5469. return wlanSendSetQueryCmd(prAdapter,
  5470. CMD_ID_MAC_MCAST_ADDR,
  5471. FALSE,
  5472. TRUE,
  5473. TRUE,
  5474. nicCmdEventQueryMcastAddr,
  5475. nicOidCmdTimeoutCommon, 0, NULL, pvQueryBuffer, u4QueryBufferLen);
  5476. #else
  5477. return WLAN_STATUS_SUCCESS;
  5478. #endif
  5479. } /* end of wlanoidQueryMulticastList() */
  5480. /*----------------------------------------------------------------------------*/
  5481. /*!
  5482. * \brief This routine is called to set Multicast Address List.
  5483. *
  5484. * \param[in] prAdapter Pointer to the Adapter structure.
  5485. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  5486. * \param[in] u4SetBufferLen The length of the set buffer.
  5487. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5488. * bytes read from the set buffer. If the call failed
  5489. * due to invalid length of the set buffer, returns
  5490. * the amount of storage needed.
  5491. *
  5492. * \retval WLAN_STATUS_SUCCESS
  5493. * \retval WLAN_STATUS_INVALID_LENGTH
  5494. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  5495. * \retval WLAN_STATUS_MULTICAST_FULL
  5496. */
  5497. /*----------------------------------------------------------------------------*/
  5498. WLAN_STATUS
  5499. wlanoidSetMulticastList(IN P_ADAPTER_T prAdapter,
  5500. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5501. {
  5502. UINT_8 ucNetTypeIndex = NETWORK_TYPE_AIS_INDEX; /* Caller should provide this information */
  5503. CMD_MAC_MCAST_ADDR rCmdMacMcastAddr;
  5504. ASSERT(prAdapter);
  5505. ASSERT(pu4SetInfoLen);
  5506. /* The data must be a multiple of the Ethernet address size. */
  5507. if ((u4SetBufferLen % MAC_ADDR_LEN)) {
  5508. DBGLOG(OID, WARN, "Invalid MC list length %u\n", u4SetBufferLen);
  5509. *pu4SetInfoLen = (((u4SetBufferLen + MAC_ADDR_LEN) - 1) / MAC_ADDR_LEN) * MAC_ADDR_LEN;
  5510. return WLAN_STATUS_INVALID_LENGTH;
  5511. }
  5512. *pu4SetInfoLen = u4SetBufferLen;
  5513. /* Verify if we can support so many multicast addresses. */
  5514. if ((u4SetBufferLen / MAC_ADDR_LEN) > MAX_NUM_GROUP_ADDR) {
  5515. DBGLOG(OID, WARN, "Too many MC addresses\n");
  5516. return WLAN_STATUS_MULTICAST_FULL;
  5517. }
  5518. /* NOTE(Kevin): Windows may set u4SetBufferLen == 0 &&
  5519. * pvSetBuffer == NULL to clear exist Multicast List.
  5520. */
  5521. if (u4SetBufferLen)
  5522. ASSERT(pvSetBuffer);
  5523. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5524. DBGLOG(OID, WARN, "Fail in set multicast list! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5525. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5526. return WLAN_STATUS_ADAPTER_NOT_READY;
  5527. }
  5528. rCmdMacMcastAddr.u4NumOfGroupAddr = u4SetBufferLen / MAC_ADDR_LEN;
  5529. rCmdMacMcastAddr.ucNetTypeIndex = ucNetTypeIndex;
  5530. kalMemCopy(rCmdMacMcastAddr.arAddress, pvSetBuffer, u4SetBufferLen);
  5531. return wlanSendSetQueryCmd(prAdapter,
  5532. CMD_ID_MAC_MCAST_ADDR,
  5533. TRUE,
  5534. FALSE,
  5535. TRUE,
  5536. nicCmdEventSetCommon,
  5537. nicOidCmdTimeoutCommon,
  5538. sizeof(CMD_MAC_MCAST_ADDR),
  5539. (PUINT_8) &rCmdMacMcastAddr, pvSetBuffer, u4SetBufferLen);
  5540. } /* end of wlanoidSetMulticastList() */
  5541. /*----------------------------------------------------------------------------*/
  5542. /*!
  5543. * \brief This routine is called to set Packet Filter.
  5544. *
  5545. * \param[in] prAdapter Pointer to the Adapter structure.
  5546. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  5547. * \param[in] u4SetBufferLen The length of the set buffer.
  5548. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5549. * bytes read from the set buffer. If the call failed
  5550. * due to invalid length of the set buffer, returns
  5551. * the amount of storage needed.
  5552. *
  5553. * \retval WLAN_STATUS_SUCCESS
  5554. * \retval WLAN_STATUS_INVALID_LENGTH
  5555. * \retval WLAN_STATUS_NOT_SUPPORTED
  5556. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  5557. */
  5558. /*----------------------------------------------------------------------------*/
  5559. WLAN_STATUS
  5560. wlanoidSetCurrentPacketFilter(IN P_ADAPTER_T prAdapter,
  5561. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5562. {
  5563. UINT_32 u4NewPacketFilter;
  5564. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  5565. ASSERT(prAdapter);
  5566. ASSERT(pu4SetInfoLen);
  5567. if (u4SetBufferLen < sizeof(UINT_32)) {
  5568. *pu4SetInfoLen = sizeof(UINT_32);
  5569. DBGLOG(OID, INFO, "iput buffer is too small");
  5570. return WLAN_STATUS_INVALID_LENGTH;
  5571. }
  5572. ASSERT(pvSetBuffer);
  5573. /* Set the new packet filter. */
  5574. u4NewPacketFilter = *(PUINT_32) pvSetBuffer;
  5575. DBGLOG(OID, TRACE, "New packet filter: %#08x\n", u4NewPacketFilter);
  5576. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5577. DBGLOG(OID, WARN, "Fail in set current packet filter! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5578. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5579. return WLAN_STATUS_ADAPTER_NOT_READY;
  5580. }
  5581. do {
  5582. /* Verify the bits of the new packet filter. If any bits are set that
  5583. we don't support, leave. */
  5584. if (u4NewPacketFilter & ~(PARAM_PACKET_FILTER_SUPPORTED)) {
  5585. rStatus = WLAN_STATUS_NOT_SUPPORTED;
  5586. break;
  5587. }
  5588. #if DBG
  5589. /* Need to enable or disable promiscuous support depending on the new
  5590. filter. */
  5591. if (u4NewPacketFilter & PARAM_PACKET_FILTER_PROMISCUOUS)
  5592. DBGLOG(OID, TRACE, "Enable promiscuous mode\n");
  5593. else
  5594. DBGLOG(OID, TRACE, "Disable promiscuous mode\n");
  5595. if (u4NewPacketFilter & PARAM_PACKET_FILTER_ALL_MULTICAST)
  5596. DBGLOG(OID, TRACE, "Enable all-multicast mode\n");
  5597. else if (u4NewPacketFilter & PARAM_PACKET_FILTER_MULTICAST)
  5598. DBGLOG(OID, TRACE, "Enable multicast\n");
  5599. else
  5600. DBGLOG(OID, TRACE, "Disable multicast\n");
  5601. if (u4NewPacketFilter & PARAM_PACKET_FILTER_BROADCAST)
  5602. DBGLOG(OID, TRACE, "Enable Broadcast\n");
  5603. else
  5604. DBGLOG(OID, TRACE, "Disable Broadcast\n");
  5605. #endif
  5606. } while (FALSE);
  5607. if (rStatus == WLAN_STATUS_SUCCESS) {
  5608. /* Store the packet filter */
  5609. prAdapter->u4OsPacketFilter &= PARAM_PACKET_FILTER_P2P_MASK;
  5610. prAdapter->u4OsPacketFilter |= u4NewPacketFilter;
  5611. rStatus = wlanoidSetPacketFilter(prAdapter, prAdapter->u4OsPacketFilter,
  5612. TRUE, pvSetBuffer, u4SetBufferLen);
  5613. }
  5614. DBGLOG(REQ, INFO, "[MC debug] u4OsPacketFilter=%x\n", prAdapter->u4OsPacketFilter);
  5615. return rStatus;
  5616. } /* wlanoidSetCurrentPacketFilter */
  5617. WLAN_STATUS wlanoidSetPacketFilter(P_ADAPTER_T prAdapter, UINT_32 u4PacketFilter,
  5618. BOOLEAN fgIsOid, PVOID pvSetBuffer, UINT_32 u4SetBufferLen)
  5619. {
  5620. #if CFG_SUPPORT_DROP_MC_PACKET
  5621. /* Note:
  5622. If PARAM_PACKET_FILTER_ALL_MULTICAST is set in PacketFilter,
  5623. Firmware will pass multicast frame.
  5624. Else if PARAM_PACKET_FILTER_MULTICAST is set in PacketFilter,
  5625. Firmware will pass some multicast frame in multicast table.
  5626. Else firmware will drop all multicast frame.
  5627. */
  5628. if (fgIsUnderSuspend)
  5629. u4PacketFilter &= ~(PARAM_PACKET_FILTER_MULTICAST | PARAM_PACKET_FILTER_ALL_MULTICAST);
  5630. #endif
  5631. DBGLOG(REQ, INFO, "[MC debug] u4PacketFilter=%x, IsSuspend=%d\n", u4PacketFilter, fgIsUnderSuspend);
  5632. return wlanSendSetQueryCmd(prAdapter,
  5633. CMD_ID_SET_RX_FILTER,
  5634. TRUE,
  5635. FALSE,
  5636. fgIsOid,
  5637. nicCmdEventSetCommon,
  5638. nicOidCmdTimeoutCommon,
  5639. sizeof(UINT_32),
  5640. (PUINT_8)&u4PacketFilter,
  5641. pvSetBuffer, u4SetBufferLen);
  5642. }
  5643. /*----------------------------------------------------------------------------*/
  5644. /*!
  5645. * \brief This routine is called to query current packet filter.
  5646. *
  5647. * \param[in] prAdapter Pointer to the Adapter structure.
  5648. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  5649. * the query.
  5650. * \param[in] u4QueryBufferLen The length of the query buffer.
  5651. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5652. * bytes written into the query buffer. If the call
  5653. * failed due to invalid length of the query buffer,
  5654. * returns the amount of storage needed.
  5655. *
  5656. * \retval WLAN_STATUS_SUCCESS
  5657. */
  5658. /*----------------------------------------------------------------------------*/
  5659. WLAN_STATUS
  5660. wlanoidQueryCurrentPacketFilter(IN P_ADAPTER_T prAdapter,
  5661. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5662. {
  5663. DEBUGFUNC("wlanoidQueryCurrentPacketFilter");
  5664. ASSERT(prAdapter);
  5665. ASSERT(pu4QueryInfoLen);
  5666. *pu4QueryInfoLen = sizeof(UINT_32);
  5667. if (u4QueryBufferLen >= sizeof(UINT_32)) {
  5668. ASSERT(pvQueryBuffer);
  5669. *(PUINT_32) pvQueryBuffer = prAdapter->u4OsPacketFilter;
  5670. }
  5671. return WLAN_STATUS_SUCCESS;
  5672. } /* wlanoidQueryCurrentPacketFilter */
  5673. /*----------------------------------------------------------------------------*/
  5674. /*!
  5675. * \brief This routine is called to query ACPI device power state.
  5676. *
  5677. * \param[in] prAdapter Pointer to the Adapter structure.
  5678. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  5679. * the query.
  5680. * \param[in] u4QueryBufferLen The length of the query buffer.
  5681. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5682. * bytes written into the query buffer. If the call
  5683. * failed due to invalid length of the query buffer,
  5684. * returns the amount of storage needed.
  5685. *
  5686. * \retval WLAN_STATUS_SUCCESS
  5687. */
  5688. /*----------------------------------------------------------------------------*/
  5689. WLAN_STATUS
  5690. wlanoidQueryAcpiDevicePowerState(IN P_ADAPTER_T prAdapter,
  5691. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5692. {
  5693. #if DBG
  5694. PPARAM_DEVICE_POWER_STATE prPowerState;
  5695. #endif
  5696. DEBUGFUNC("wlanoidQueryAcpiDevicePowerState");
  5697. ASSERT(prAdapter);
  5698. ASSERT(pu4QueryInfoLen);
  5699. if (u4QueryBufferLen)
  5700. ASSERT(pvQueryBuffer);
  5701. *pu4QueryInfoLen = sizeof(PARAM_DEVICE_POWER_STATE);
  5702. #if DBG
  5703. prPowerState = (PPARAM_DEVICE_POWER_STATE) pvQueryBuffer;
  5704. switch (*prPowerState) {
  5705. case ParamDeviceStateD0:
  5706. DBGLOG(OID, INFO, "Query Power State: D0\n");
  5707. break;
  5708. case ParamDeviceStateD1:
  5709. DBGLOG(OID, INFO, "Query Power State: D1\n");
  5710. break;
  5711. case ParamDeviceStateD2:
  5712. DBGLOG(OID, INFO, "Query Power State: D2\n");
  5713. break;
  5714. case ParamDeviceStateD3:
  5715. DBGLOG(OID, INFO, "Query Power State: D3\n");
  5716. break;
  5717. default:
  5718. break;
  5719. }
  5720. #endif
  5721. /* Since we will disconnect the newwork, therefore we do not
  5722. need to check queue empty */
  5723. *(PPARAM_DEVICE_POWER_STATE) pvQueryBuffer = ParamDeviceStateD3;
  5724. /* WARNLOG(("Ready to transition to D3\n")); */
  5725. return WLAN_STATUS_SUCCESS;
  5726. } /* pwrmgtQueryPower */
  5727. /*----------------------------------------------------------------------------*/
  5728. /*!
  5729. * \brief This routine is called to set ACPI device power state.
  5730. *
  5731. * \param[in] pvAdapter Pointer to the Adapter structure.
  5732. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  5733. * \param[in] u4SetBufferLen The length of the set buffer.
  5734. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5735. * bytes read from the set buffer. If the call failed
  5736. * due to invalid length of the set buffer, returns
  5737. * the amount of storage needed.
  5738. *
  5739. * \retval WLAN_STATUS_SUCCESS
  5740. */
  5741. /*----------------------------------------------------------------------------*/
  5742. WLAN_STATUS
  5743. wlanoidSetAcpiDevicePowerState(IN P_ADAPTER_T prAdapter,
  5744. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5745. {
  5746. PPARAM_DEVICE_POWER_STATE prPowerState;
  5747. BOOLEAN fgRetValue = TRUE;
  5748. DEBUGFUNC("wlanoidSetAcpiDevicePowerState");
  5749. ASSERT(prAdapter);
  5750. ASSERT(pu4SetInfoLen);
  5751. *pu4SetInfoLen = sizeof(PARAM_DEVICE_POWER_STATE);
  5752. ASSERT(pvSetBuffer);
  5753. prPowerState = (PPARAM_DEVICE_POWER_STATE) pvSetBuffer;
  5754. switch (*prPowerState) {
  5755. case ParamDeviceStateD0:
  5756. DBGLOG(OID, INFO, "Set Power State: D0\n");
  5757. kalDevSetPowerState(prAdapter->prGlueInfo, (UINT_32) ParamDeviceStateD0);
  5758. fgRetValue = nicpmSetAcpiPowerD0(prAdapter);
  5759. break;
  5760. case ParamDeviceStateD1:
  5761. DBGLOG(OID, INFO, "Set Power State: D1\n");
  5762. /* no break here */
  5763. case ParamDeviceStateD2:
  5764. DBGLOG(OID, INFO, "Set Power State: D2\n");
  5765. /* no break here */
  5766. case ParamDeviceStateD3:
  5767. DBGLOG(OID, INFO, "Set Power State: D3\n");
  5768. fgRetValue = nicpmSetAcpiPowerD3(prAdapter);
  5769. kalDevSetPowerState(prAdapter->prGlueInfo, (UINT_32) ParamDeviceStateD3);
  5770. break;
  5771. default:
  5772. break;
  5773. }
  5774. if (fgRetValue == TRUE)
  5775. return WLAN_STATUS_SUCCESS;
  5776. else
  5777. return WLAN_STATUS_FAILURE;
  5778. } /* end of wlanoidSetAcpiDevicePowerState() */
  5779. /*----------------------------------------------------------------------------*/
  5780. /*!
  5781. * \brief This routine is called to query the current fragmentation threshold.
  5782. *
  5783. * \param[in] pvAdapter Pointer to the Adapter structure.
  5784. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  5785. * the query.
  5786. * \param[in] u4QueryBufferLen The length of the query buffer.
  5787. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5788. * bytes written into the query buffer. If the call
  5789. * failed due to invalid length of the query buffer,
  5790. * returns the amount of storage needed.
  5791. *
  5792. * \retval WLAN_STATUS_SUCCESS
  5793. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  5794. */
  5795. /*----------------------------------------------------------------------------*/
  5796. WLAN_STATUS
  5797. wlanoidQueryFragThreshold(IN P_ADAPTER_T prAdapter,
  5798. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5799. {
  5800. DEBUGFUNC("wlanoidQueryFragThreshold");
  5801. ASSERT(prAdapter);
  5802. if (u4QueryBufferLen)
  5803. ASSERT(pvQueryBuffer);
  5804. ASSERT(pu4QueryInfoLen);
  5805. DBGLOG(OID, LOUD, "\n");
  5806. #if CFG_TX_FRAGMENT
  5807. return WLAN_STATUS_SUCCESS;
  5808. #else
  5809. return WLAN_STATUS_NOT_SUPPORTED;
  5810. #endif /* CFG_TX_FRAGMENT */
  5811. } /* end of wlanoidQueryFragThreshold() */
  5812. /*----------------------------------------------------------------------------*/
  5813. /*!
  5814. * \brief This routine is called to set a new fragmentation threshold to the
  5815. * driver.
  5816. *
  5817. * \param[in] pvAdapter Pointer to the Adapter structure.
  5818. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  5819. * \param[in] u4SetBufferLen The length of the set buffer.
  5820. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5821. * bytes read from the set buffer. If the call failed
  5822. * due to invalid length of the set buffer, returns
  5823. * the amount of storage needed.
  5824. *
  5825. * \retval WLAN_STATUS_SUCCESS
  5826. * \retval WLAN_STATUS_INVALID_DATA
  5827. * \retval WLAN_STATUS_INVALID_LENGTH
  5828. */
  5829. /*----------------------------------------------------------------------------*/
  5830. WLAN_STATUS
  5831. wlanoidSetFragThreshold(IN P_ADAPTER_T prAdapter,
  5832. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5833. {
  5834. #if CFG_TX_FRAGMENT
  5835. return WLAN_STATUS_SUCCESS;
  5836. #else
  5837. return WLAN_STATUS_NOT_SUPPORTED;
  5838. #endif /* CFG_TX_FRAGMENT */
  5839. } /* end of wlanoidSetFragThreshold() */
  5840. /*----------------------------------------------------------------------------*/
  5841. /*!
  5842. * \brief This routine is called to query the current RTS threshold.
  5843. *
  5844. * \param[in] pvAdapter Pointer to the Adapter structure.
  5845. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  5846. * the query.
  5847. * \param[in] u4QueryBufferLen The length of the query buffer.
  5848. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5849. * bytes written into the query buffer. If the call
  5850. * failed due to invalid length of the query buffer,
  5851. * returns the amount of storage needed.
  5852. *
  5853. * \retval WLAN_STATUS_SUCCESS
  5854. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  5855. */
  5856. /*----------------------------------------------------------------------------*/
  5857. WLAN_STATUS
  5858. wlanoidQueryRtsThreshold(IN P_ADAPTER_T prAdapter,
  5859. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5860. {
  5861. DEBUGFUNC("wlanoidQueryRtsThreshold");
  5862. ASSERT(prAdapter);
  5863. if (u4QueryBufferLen)
  5864. ASSERT(pvQueryBuffer);
  5865. ASSERT(pu4QueryInfoLen);
  5866. DBGLOG(OID, LOUD, "\n");
  5867. if (u4QueryBufferLen < sizeof(PARAM_RTS_THRESHOLD)) {
  5868. *pu4QueryInfoLen = sizeof(PARAM_RTS_THRESHOLD);
  5869. return WLAN_STATUS_BUFFER_TOO_SHORT;
  5870. }
  5871. *((PARAM_RTS_THRESHOLD *) pvQueryBuffer) = prAdapter->rWlanInfo.eRtsThreshold;
  5872. return WLAN_STATUS_SUCCESS;
  5873. } /* wlanoidQueryRtsThreshold */
  5874. /*----------------------------------------------------------------------------*/
  5875. /*!
  5876. * \brief This routine is called to set a new RTS threshold to the driver.
  5877. *
  5878. * \param[in] pvAdapter Pointer to the Adapter structure.
  5879. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  5880. * \param[in] u4SetBufferLen The length of the set buffer.
  5881. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5882. * bytes read from the set buffer. If the call failed
  5883. * due to invalid length of the set buffer, returns
  5884. * the amount of storage needed.
  5885. *
  5886. * \retval WLAN_STATUS_SUCCESS
  5887. * \retval WLAN_STATUS_INVALID_DATA
  5888. * \retval WLAN_STATUS_INVALID_LENGTH
  5889. */
  5890. /*----------------------------------------------------------------------------*/
  5891. WLAN_STATUS
  5892. wlanoidSetRtsThreshold(IN P_ADAPTER_T prAdapter,
  5893. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5894. {
  5895. PARAM_RTS_THRESHOLD *prRtsThreshold;
  5896. ASSERT(prAdapter);
  5897. ASSERT(pu4SetInfoLen);
  5898. *pu4SetInfoLen = sizeof(PARAM_RTS_THRESHOLD);
  5899. if (u4SetBufferLen < sizeof(PARAM_RTS_THRESHOLD)) {
  5900. DBGLOG(OID, WARN, "Invalid length %u\n", u4SetBufferLen);
  5901. return WLAN_STATUS_INVALID_LENGTH;
  5902. }
  5903. prRtsThreshold = (PARAM_RTS_THRESHOLD *) pvSetBuffer;
  5904. *prRtsThreshold = prAdapter->rWlanInfo.eRtsThreshold;
  5905. return WLAN_STATUS_SUCCESS;
  5906. } /* wlanoidSetRtsThreshold */
  5907. /*----------------------------------------------------------------------------*/
  5908. /*!
  5909. * \brief This routine is used to turn radio off.
  5910. *
  5911. * \param[in] pvAdapter Pointer to the Adapter structure.
  5912. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  5913. * \param[in] u4SetBufferLen The length of the set buffer.
  5914. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  5915. * bytes read from the set buffer. If the call failed
  5916. * due to invalid length of the set buffer, returns
  5917. * the amount of storage needed.
  5918. *
  5919. * \retval WLAN_STATUS_SUCCESS
  5920. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  5921. */
  5922. /*----------------------------------------------------------------------------*/
  5923. WLAN_STATUS
  5924. wlanoidSetDisassociate(IN P_ADAPTER_T prAdapter,
  5925. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  5926. {
  5927. P_MSG_AIS_ABORT_T prAisAbortMsg;
  5928. DEBUGFUNC("wlanoidSetDisassociate");
  5929. ASSERT(prAdapter);
  5930. ASSERT(pu4SetInfoLen);
  5931. *pu4SetInfoLen = 0;
  5932. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  5933. DBGLOG(OID, WARN, "Fail in set disassociate! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  5934. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  5935. return WLAN_STATUS_ADAPTER_NOT_READY;
  5936. }
  5937. /* prepare message to AIS */
  5938. prAdapter->rWifiVar.rConnSettings.fgIsConnReqIssued = FALSE;
  5939. prAdapter->rWifiVar.rConnSettings.eReConnectLevel = RECONNECT_LEVEL_USER_SET;
  5940. /* Send AIS Abort Message */
  5941. prAisAbortMsg = (P_MSG_AIS_ABORT_T) cnmMemAlloc(prAdapter, RAM_TYPE_MSG, sizeof(MSG_AIS_ABORT_T));
  5942. if (!prAisAbortMsg) {
  5943. ASSERT(0);
  5944. return WLAN_STATUS_FAILURE;
  5945. }
  5946. prAisAbortMsg->rMsgHdr.eMsgId = MID_OID_AIS_FSM_JOIN_REQ;
  5947. prAisAbortMsg->ucReasonOfDisconnect = DISCONNECT_REASON_CODE_NEW_CONNECTION;
  5948. prAisAbortMsg->fgDelayIndication = FALSE;
  5949. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prAisAbortMsg, MSG_SEND_METHOD_BUF);
  5950. /* indicate for disconnection */
  5951. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  5952. DBGLOG(OID, INFO, "DisconnectByOid\n");
  5953. kalIndicateStatusAndComplete(prAdapter->prGlueInfo, WLAN_STATUS_MEDIA_DISCONNECT_LOCALLY, NULL, 0);
  5954. }
  5955. #if !defined(LINUX)
  5956. prAdapter->fgIsRadioOff = TRUE;
  5957. #endif
  5958. return WLAN_STATUS_SUCCESS;
  5959. } /* wlanoidSetDisassociate */
  5960. /*----------------------------------------------------------------------------*/
  5961. /*!
  5962. * \brief This routine is used to query the power save profile.
  5963. *
  5964. * \param[in] prAdapter Pointer to the Adapter structure.
  5965. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  5966. * the query.
  5967. * \param[in] u4QueryBufLen The length of the query buffer.
  5968. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  5969. * bytes written into the query buffer. If the call
  5970. * failed due to invalid length of the query buffer,
  5971. * returns the amount of storage needed.
  5972. *
  5973. * \return WLAN_STATUS_SUCCESS
  5974. */
  5975. /*----------------------------------------------------------------------------*/
  5976. WLAN_STATUS
  5977. wlanoidQuery802dot11PowerSaveProfile(IN P_ADAPTER_T prAdapter,
  5978. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  5979. {
  5980. DEBUGFUNC("wlanoidQuery802dot11PowerSaveProfile");
  5981. ASSERT(prAdapter);
  5982. ASSERT(pu4QueryInfoLen);
  5983. if (u4QueryBufferLen != 0) {
  5984. ASSERT(pvQueryBuffer);
  5985. /* *(PPARAM_POWER_MODE) pvQueryBuffer = (PARAM_POWER_MODE)(prAdapter->rWlanInfo.ePowerSaveMode.ucPsProfile); */
  5986. *(PPARAM_POWER_MODE) pvQueryBuffer =
  5987. (PARAM_POWER_MODE) (prAdapter->rWlanInfo.arPowerSaveMode[NETWORK_TYPE_AIS_INDEX].ucPsProfile);
  5988. *pu4QueryInfoLen = sizeof(PARAM_POWER_MODE);
  5989. /* hack for CTIA power mode setting function */
  5990. if (prAdapter->fgEnCtiaPowerMode) {
  5991. /* set to non-zero value (to prevent MMI query 0, before it intends to set 0, */
  5992. /* which will skip its following state machine) */
  5993. *(PPARAM_POWER_MODE) pvQueryBuffer = (PARAM_POWER_MODE) 2;
  5994. }
  5995. }
  5996. return WLAN_STATUS_SUCCESS;
  5997. }
  5998. /*----------------------------------------------------------------------------*/
  5999. /*!
  6000. * \brief This routine is used to set the power save profile.
  6001. *
  6002. * \param[in] pvAdapter Pointer to the Adapter structure.
  6003. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  6004. * \param[in] u4SetBufferLen The length of the set buffer.
  6005. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6006. * bytes read from the set buffer. If the call failed
  6007. * due to invalid length of the set buffer, returns
  6008. * the amount of storage needed.
  6009. *
  6010. * \retval WLAN_STATUS_SUCCESS
  6011. * \retval WLAN_STATUS_INVALID_LENGTH
  6012. */
  6013. /*----------------------------------------------------------------------------*/
  6014. WLAN_STATUS
  6015. wlanoidSet802dot11PowerSaveProfile(IN P_ADAPTER_T prAdapter,
  6016. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6017. {
  6018. WLAN_STATUS status;
  6019. PARAM_POWER_MODE ePowerMode;
  6020. DEBUGFUNC("wlanoidSet802dot11PowerSaveProfile");
  6021. ASSERT(prAdapter);
  6022. ASSERT(pu4SetInfoLen);
  6023. *pu4SetInfoLen = sizeof(PARAM_POWER_MODE);
  6024. if (u4SetBufferLen < sizeof(PARAM_POWER_MODE)) {
  6025. DBGLOG(OID, WARN, "Invalid length %u\n", u4SetBufferLen);
  6026. return WLAN_STATUS_INVALID_LENGTH;
  6027. } else if (*(PPARAM_POWER_MODE) pvSetBuffer >= Param_PowerModeMax) {
  6028. /* WARNLOG(("Invalid power mode %d\n", */
  6029. /* *(PPARAM_POWER_MODE) pvSetBuffer)); */
  6030. return WLAN_STATUS_INVALID_DATA;
  6031. }
  6032. ePowerMode = *(PPARAM_POWER_MODE) pvSetBuffer;
  6033. if (prAdapter->fgEnCtiaPowerMode) {
  6034. if (ePowerMode == Param_PowerModeCAM)
  6035. ;
  6036. else {
  6037. /* User setting to PS mode (Param_PowerModeMAX_PSP or Param_PowerModeFast_PSP) */
  6038. if (prAdapter->u4CtiaPowerMode == 0)
  6039. /* force to keep in CAM mode */
  6040. ePowerMode = Param_PowerModeCAM;
  6041. else if (prAdapter->u4CtiaPowerMode == 1)
  6042. ePowerMode = Param_PowerModeMAX_PSP;
  6043. else if (prAdapter->u4CtiaPowerMode == 2)
  6044. ePowerMode = Param_PowerModeFast_PSP;
  6045. }
  6046. }
  6047. status = nicConfigPowerSaveProfile(prAdapter, NETWORK_TYPE_AIS_INDEX, ePowerMode, TRUE);
  6048. switch (ePowerMode) {
  6049. case Param_PowerModeCAM:
  6050. DBGLOG(OID, INFO, "Set Wi-Fi PS mode to CAM (%d)\n", ePowerMode);
  6051. break;
  6052. case Param_PowerModeMAX_PSP:
  6053. DBGLOG(OID, INFO, "Set Wi-Fi PS mode to MAX PS (%d)\n", ePowerMode);
  6054. break;
  6055. case Param_PowerModeFast_PSP:
  6056. DBGLOG(OID, INFO, "Set Wi-Fi PS mode to FAST PS (%d)\n", ePowerMode);
  6057. break;
  6058. default:
  6059. DBGLOG(OID, INFO, "invalid Wi-Fi PS mode setting (%d)\n", ePowerMode);
  6060. break;
  6061. }
  6062. return status;
  6063. } /* end of wlanoidSetAcpiDevicePowerStateMode() */
  6064. /*----------------------------------------------------------------------------*/
  6065. /*!
  6066. * \brief This routine is called to query current status of AdHoc Mode.
  6067. *
  6068. * \param[in] prAdapter Pointer to the Adapter structure.
  6069. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6070. * the query.
  6071. * \param[in] u4QueryBufferLen The length of the query buffer.
  6072. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6073. * bytes written into the query buffer. If the call
  6074. * failed due to invalid length of the query buffer,
  6075. * returns the amount of storage needed.
  6076. *
  6077. * \retval WLAN_STATUS_SUCCESS
  6078. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  6079. */
  6080. /*----------------------------------------------------------------------------*/
  6081. WLAN_STATUS
  6082. wlanoidQueryAdHocMode(IN P_ADAPTER_T prAdapter,
  6083. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  6084. {
  6085. return WLAN_STATUS_SUCCESS;
  6086. } /* end of wlanoidQueryAdHocMode() */
  6087. /*----------------------------------------------------------------------------*/
  6088. /*!
  6089. * \brief This routine is called to set AdHoc Mode.
  6090. *
  6091. * \param[in] prAdapter Pointer to the Adapter structure.
  6092. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  6093. * \param[in] u4SetBufferLen The length of the set buffer.
  6094. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6095. * bytes read from the set buffer. If the call failed
  6096. * due to invalid length of the set buffer, returns
  6097. * the amount of storage needed.
  6098. *
  6099. * \retval WLAN_STATUS_SUCCESS
  6100. * \retval WLAN_STATUS_INVALID_LENGTH
  6101. * \retval WLAN_STATUS_INVALID_DATA
  6102. */
  6103. /*----------------------------------------------------------------------------*/
  6104. WLAN_STATUS
  6105. wlanoidSetAdHocMode(IN P_ADAPTER_T prAdapter,
  6106. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6107. {
  6108. return WLAN_STATUS_SUCCESS;
  6109. } /* end of wlanoidSetAdHocMode() */
  6110. /*----------------------------------------------------------------------------*/
  6111. /*!
  6112. * \brief This routine is called to query RF frequency.
  6113. *
  6114. * \param[in] prAdapter Pointer to the Adapter structure.
  6115. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6116. * the query.
  6117. * \param[in] u4QueryBufferLen The length of the query buffer.
  6118. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6119. * bytes written into the query buffer. If the call
  6120. * failed due to invalid length of the query buffer,
  6121. * returns the amount of storage needed.
  6122. *
  6123. * \retval WLAN_STATUS_SUCCESS
  6124. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  6125. */
  6126. /*----------------------------------------------------------------------------*/
  6127. WLAN_STATUS
  6128. wlanoidQueryFrequency(IN P_ADAPTER_T prAdapter,
  6129. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  6130. {
  6131. DEBUGFUNC("wlanoidQueryFrequency");
  6132. ASSERT(prAdapter);
  6133. ASSERT(pu4QueryInfoLen);
  6134. if (u4QueryBufferLen)
  6135. ASSERT(pvQueryBuffer);
  6136. if (u4QueryBufferLen < sizeof(UINT_32))
  6137. return WLAN_STATUS_BUFFER_TOO_SHORT;
  6138. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_INFRA) {
  6139. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  6140. *(PUINT_32) pvQueryBuffer =
  6141. nicChannelNum2Freq(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_AIS_INDEX].ucPrimaryChannel);
  6142. } else {
  6143. *(PUINT_32) pvQueryBuffer = 0;
  6144. }
  6145. } else {
  6146. *(PUINT_32) pvQueryBuffer = nicChannelNum2Freq(prAdapter->rWifiVar.rConnSettings.ucAdHocChannelNum);
  6147. }
  6148. return WLAN_STATUS_SUCCESS;
  6149. } /* end of wlanoidQueryFrequency() */
  6150. /*----------------------------------------------------------------------------*/
  6151. /*!
  6152. * \brief This routine is called to set RF frequency by User Settings.
  6153. *
  6154. * \param[in] prAdapter Pointer to the Adapter structure.
  6155. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6156. * the query.
  6157. * \param[in] u4QueryBufferLen The length of the query buffer.
  6158. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6159. * bytes written into the query buffer. If the call
  6160. * failed due to invalid length of the query buffer,
  6161. * returns the amount of storage needed.
  6162. *
  6163. * \retval WLAN_STATUS_SUCCESS
  6164. * \retval WLAN_STATUS_INVALID_LENGTH
  6165. * \retval WLAN_STATUS_INVALID_DATA
  6166. */
  6167. /*----------------------------------------------------------------------------*/
  6168. WLAN_STATUS
  6169. wlanoidSetFrequency(IN P_ADAPTER_T prAdapter,
  6170. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6171. {
  6172. PUINT_32 pu4FreqInKHz;
  6173. DEBUGFUNC("wlanoidSetFrequency");
  6174. ASSERT(prAdapter);
  6175. ASSERT(pu4SetInfoLen);
  6176. *pu4SetInfoLen = sizeof(UINT_32);
  6177. if (u4SetBufferLen < sizeof(UINT_32))
  6178. return WLAN_STATUS_INVALID_LENGTH;
  6179. ASSERT(pvSetBuffer);
  6180. pu4FreqInKHz = (PUINT_32) pvSetBuffer;
  6181. prAdapter->rWifiVar.rConnSettings.ucAdHocChannelNum = (UINT_8) nicFreq2ChannelNum(*pu4FreqInKHz);
  6182. prAdapter->rWifiVar.rConnSettings.eAdHocBand = *pu4FreqInKHz < 5000000 ? BAND_2G4 : BAND_5G;
  6183. return WLAN_STATUS_SUCCESS;
  6184. } /* end of wlanoidSetFrequency() */
  6185. /*----------------------------------------------------------------------------*/
  6186. /*!
  6187. * \brief This routine is called to set 802.11 channel of the radio frequency.
  6188. * This is a proprietary function call to Lunux currently.
  6189. *
  6190. * \param[in] prAdapter Pointer to the Adapter structure.
  6191. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  6192. * \param[in] u4SetBufferLen The length of the set buffer.
  6193. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6194. * bytes read from the set buffer. If the call failed
  6195. * due to invalid length of the set buffer, returns
  6196. * the amount of storage needed.
  6197. *
  6198. * \retval WLAN_STATUS_SUCCESS
  6199. * \retval WLAN_STATUS_INVALID_LENGTH
  6200. * \retval WLAN_STATUS_INVALID_DATA
  6201. */
  6202. /*----------------------------------------------------------------------------*/
  6203. WLAN_STATUS
  6204. wlanoidSetChannel(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6205. {
  6206. ASSERT(0); /* // */
  6207. return WLAN_STATUS_SUCCESS;
  6208. }
  6209. /*----------------------------------------------------------------------------*/
  6210. /*!
  6211. * \brief This routine is called to query the Beacon Interval from User Settings.
  6212. *
  6213. * \param[in] prAdapter Pointer to the Adapter structure.
  6214. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6215. * the query.
  6216. * \param[in] u4QueryBufferLen The length of the query buffer.
  6217. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6218. * bytes written into the query buffer. If the call
  6219. * failed due to invalid length of the query buffer,
  6220. * returns the amount of storage needed.
  6221. *
  6222. * \retval WLAN_STATUS_SUCCESS
  6223. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  6224. */
  6225. /*----------------------------------------------------------------------------*/
  6226. WLAN_STATUS
  6227. wlanoidQueryBeaconInterval(IN P_ADAPTER_T prAdapter,
  6228. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  6229. {
  6230. DEBUGFUNC("wlanoidQueryBeaconInterval");
  6231. ASSERT(prAdapter);
  6232. ASSERT(pu4QueryInfoLen);
  6233. if (u4QueryBufferLen)
  6234. ASSERT(pvQueryBuffer);
  6235. *pu4QueryInfoLen = sizeof(UINT_32);
  6236. if (u4QueryBufferLen < sizeof(UINT_32))
  6237. return WLAN_STATUS_BUFFER_TOO_SHORT;
  6238. if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED) {
  6239. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_INFRA)
  6240. *(PUINT_32) pvQueryBuffer = prAdapter->rWlanInfo.rCurrBssId.rConfiguration.u4BeaconPeriod;
  6241. else
  6242. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rWlanInfo.u2BeaconPeriod;
  6243. } else {
  6244. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_INFRA)
  6245. *(PUINT_32) pvQueryBuffer = 0;
  6246. else
  6247. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rWlanInfo.u2BeaconPeriod;
  6248. }
  6249. return WLAN_STATUS_SUCCESS;
  6250. } /* end of wlanoidQueryBeaconInterval() */
  6251. /*----------------------------------------------------------------------------*/
  6252. /*!
  6253. * \brief This routine is called to set the Beacon Interval to User Settings.
  6254. *
  6255. * \param[in] prAdapter Pointer to the Adapter structure.
  6256. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  6257. * \param[in] u4SetBufferLen The length of the set buffer.
  6258. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6259. * bytes read from the set buffer. If the call failed
  6260. * due to invalid length of the set buffer, returns
  6261. * the amount of storage needed.
  6262. *
  6263. * \retval WLAN_STATUS_SUCCESS
  6264. * \retval WLAN_STATUS_INVALID_LENGTH
  6265. * \retval WLAN_STATUS_INVALID_DATA
  6266. */
  6267. /*----------------------------------------------------------------------------*/
  6268. WLAN_STATUS
  6269. wlanoidSetBeaconInterval(IN P_ADAPTER_T prAdapter,
  6270. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6271. {
  6272. PUINT_32 pu4BeaconInterval;
  6273. DEBUGFUNC("wlanoidSetBeaconInterval");
  6274. ASSERT(prAdapter);
  6275. ASSERT(pu4SetInfoLen);
  6276. *pu4SetInfoLen = sizeof(UINT_32);
  6277. if (u4SetBufferLen < sizeof(UINT_32))
  6278. return WLAN_STATUS_INVALID_LENGTH;
  6279. ASSERT(pvSetBuffer);
  6280. pu4BeaconInterval = (PUINT_32) pvSetBuffer;
  6281. if ((*pu4BeaconInterval < DOT11_BEACON_PERIOD_MIN) || (*pu4BeaconInterval > DOT11_BEACON_PERIOD_MAX)) {
  6282. DBGLOG(OID, TRACE, "Invalid Beacon Interval = %u\n", *pu4BeaconInterval);
  6283. return WLAN_STATUS_INVALID_DATA;
  6284. }
  6285. prAdapter->rWlanInfo.u2BeaconPeriod = (UINT_16) *pu4BeaconInterval;
  6286. DBGLOG(OID, INFO, "Set beacon interval: %d\n", prAdapter->rWlanInfo.u2BeaconPeriod);
  6287. return WLAN_STATUS_SUCCESS;
  6288. } /* end of wlanoidSetBeaconInterval() */
  6289. /*----------------------------------------------------------------------------*/
  6290. /*!
  6291. * \brief This routine is called to query the ATIM window from User Settings.
  6292. *
  6293. * \param[in] prAdapter Pointer to the Adapter structure.
  6294. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6295. * the query.
  6296. * \param[in] u4QueryBufferLen The length of the query buffer.
  6297. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6298. * bytes written into the query buffer. If the call
  6299. * failed due to invalid length of the query buffer,
  6300. * returns the amount of storage needed.
  6301. *
  6302. * \retval WLAN_STATUS_SUCCESS
  6303. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  6304. */
  6305. /*----------------------------------------------------------------------------*/
  6306. WLAN_STATUS
  6307. wlanoidQueryAtimWindow(IN P_ADAPTER_T prAdapter,
  6308. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  6309. {
  6310. DEBUGFUNC("wlanoidQueryAtimWindow");
  6311. ASSERT(prAdapter);
  6312. ASSERT(pu4QueryInfoLen);
  6313. if (u4QueryBufferLen)
  6314. ASSERT(pvQueryBuffer);
  6315. *pu4QueryInfoLen = sizeof(UINT_32);
  6316. if (u4QueryBufferLen < sizeof(UINT_32))
  6317. return WLAN_STATUS_BUFFER_TOO_SHORT;
  6318. if (prAdapter->rWifiVar.rConnSettings.eOPMode == NET_TYPE_INFRA)
  6319. *(PUINT_32) pvQueryBuffer = 0;
  6320. else
  6321. *(PUINT_32) pvQueryBuffer = (UINT_32) prAdapter->rWlanInfo.u2AtimWindow;
  6322. return WLAN_STATUS_SUCCESS;
  6323. } /* end of wlanoidQueryAtimWindow() */
  6324. /*----------------------------------------------------------------------------*/
  6325. /*!
  6326. * \brief This routine is called to set the ATIM window to User Settings.
  6327. *
  6328. * \param[in] prAdapter Pointer to the Adapter structure.
  6329. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  6330. * \param[in] u4SetBufferLen The length of the set buffer.
  6331. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6332. * bytes read from the set buffer. If the call failed
  6333. * due to invalid length of the set buffer, returns
  6334. * the amount of storage needed.
  6335. *
  6336. * \retval WLAN_STATUS_SUCCESS
  6337. * \retval WLAN_STATUS_INVALID_LENGTH
  6338. * \retval WLAN_STATUS_INVALID_DATA
  6339. */
  6340. /*----------------------------------------------------------------------------*/
  6341. WLAN_STATUS
  6342. wlanoidSetAtimWindow(IN P_ADAPTER_T prAdapter,
  6343. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6344. {
  6345. PUINT_32 pu4AtimWindow;
  6346. DEBUGFUNC("wlanoidSetAtimWindow");
  6347. ASSERT(prAdapter);
  6348. ASSERT(pu4SetInfoLen);
  6349. *pu4SetInfoLen = sizeof(UINT_32);
  6350. if (u4SetBufferLen < sizeof(UINT_32))
  6351. return WLAN_STATUS_INVALID_LENGTH;
  6352. ASSERT(pvSetBuffer);
  6353. pu4AtimWindow = (PUINT_32) pvSetBuffer;
  6354. prAdapter->rWlanInfo.u2AtimWindow = (UINT_16) *pu4AtimWindow;
  6355. return WLAN_STATUS_SUCCESS;
  6356. } /* end of wlanoidSetAtimWindow() */
  6357. /*----------------------------------------------------------------------------*/
  6358. /*!
  6359. * \brief This routine is called to Set the MAC address which is currently used by the NIC.
  6360. *
  6361. * \param[in] prAdapter Pointer to the Adapter structure.
  6362. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  6363. * \param[in] u4SetBufferLen The length of the set buffer.
  6364. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6365. * bytes read from the set buffer. If the call failed
  6366. * due to invalid length of the set buffer, returns
  6367. * the amount of storage needed.
  6368. *
  6369. *
  6370. * \retval WLAN_STATUS_SUCCESS
  6371. * \retval WLAN_STATUS_INVALID_LENGTH
  6372. * \retval WLAN_STATUS_INVALID_DATA
  6373. */
  6374. /*----------------------------------------------------------------------------*/
  6375. WLAN_STATUS
  6376. wlanoidSetCurrentAddr(IN P_ADAPTER_T prAdapter,
  6377. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6378. {
  6379. ASSERT(0); /* // */
  6380. return WLAN_STATUS_SUCCESS;
  6381. } /* end of wlanoidSetCurrentAddr() */
  6382. #if CFG_TCP_IP_CHKSUM_OFFLOAD
  6383. /*----------------------------------------------------------------------------*/
  6384. /*!
  6385. * \brief Setting the checksum offload function.
  6386. *
  6387. * \param[in] prAdapter Pointer to the Adapter structure.
  6388. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  6389. * \param[in] u4SetBufferLen The length of the set buffer.
  6390. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6391. * bytes read from the set buffer. If the call failed
  6392. * due to invalid length of the set buffer, returns
  6393. * the amount of storage needed.
  6394. *
  6395. * \retval WLAN_STATUS_SUCCESS
  6396. * \retval WLAN_STATUS_INVALID_LENGTH
  6397. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  6398. */
  6399. /*----------------------------------------------------------------------------*/
  6400. WLAN_STATUS
  6401. wlanoidSetCSUMOffload(IN P_ADAPTER_T prAdapter,
  6402. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6403. {
  6404. UINT_32 i, u4CSUMFlags;
  6405. CMD_BASIC_CONFIG rCmdBasicConfig;
  6406. DEBUGFUNC("wlanoidSetCSUMOffload");
  6407. DBGLOG(OID, LOUD, "\n");
  6408. ASSERT(prAdapter);
  6409. ASSERT(pu4SetInfoLen);
  6410. *pu4SetInfoLen = sizeof(UINT_32);
  6411. if (u4SetBufferLen < sizeof(UINT_32))
  6412. return WLAN_STATUS_INVALID_LENGTH;
  6413. ASSERT(pvSetBuffer);
  6414. u4CSUMFlags = *(PUINT_32) pvSetBuffer;
  6415. kalMemZero(&rCmdBasicConfig, sizeof(CMD_BASIC_CONFIG));
  6416. for (i = 0; i < 6; i++) { /* set to broadcast address for not-specified */
  6417. rCmdBasicConfig.rMyMacAddr[i] = 0xff;
  6418. }
  6419. rCmdBasicConfig.ucNative80211 = 0; /* @FIXME: for Vista */
  6420. if (u4CSUMFlags & CSUM_OFFLOAD_EN_TX_TCP)
  6421. rCmdBasicConfig.rCsumOffload.u2TxChecksum |= BIT(2);
  6422. if (u4CSUMFlags & CSUM_OFFLOAD_EN_TX_UDP)
  6423. rCmdBasicConfig.rCsumOffload.u2TxChecksum |= BIT(1);
  6424. if (u4CSUMFlags & CSUM_OFFLOAD_EN_TX_IP)
  6425. rCmdBasicConfig.rCsumOffload.u2TxChecksum |= BIT(0);
  6426. if (u4CSUMFlags & CSUM_OFFLOAD_EN_RX_TCP)
  6427. rCmdBasicConfig.rCsumOffload.u2RxChecksum |= BIT(2);
  6428. if (u4CSUMFlags & CSUM_OFFLOAD_EN_RX_UDP)
  6429. rCmdBasicConfig.rCsumOffload.u2RxChecksum |= BIT(1);
  6430. if (u4CSUMFlags & (CSUM_OFFLOAD_EN_RX_IPv4 | CSUM_OFFLOAD_EN_RX_IPv6))
  6431. rCmdBasicConfig.rCsumOffload.u2RxChecksum |= BIT(0);
  6432. prAdapter->u4CSUMFlags = u4CSUMFlags;
  6433. return wlanSendSetQueryCmd(prAdapter,
  6434. CMD_ID_BASIC_CONFIG,
  6435. TRUE,
  6436. FALSE,
  6437. TRUE,
  6438. nicCmdEventSetCommon,
  6439. nicOidCmdTimeoutCommon,
  6440. sizeof(CMD_BASIC_CONFIG), (PUINT_8) &rCmdBasicConfig, pvSetBuffer, u4SetBufferLen);
  6441. }
  6442. #endif /* CFG_TCP_IP_CHKSUM_OFFLOAD */
  6443. /*----------------------------------------------------------------------------*/
  6444. /*!
  6445. * \brief Setting the IP address for pattern search function.
  6446. *
  6447. * \param[in] prAdapter Pointer to the Adapter structure.
  6448. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  6449. * \param[in] u4SetBufferLen The length of the set buffer.
  6450. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6451. * bytes read from the set buffer. If the call failed
  6452. * due to invalid length of the set buffer, returns
  6453. * the amount of storage needed.
  6454. *
  6455. * \return WLAN_STATUS_SUCCESS
  6456. * \return WLAN_STATUS_ADAPTER_NOT_READY
  6457. * \return WLAN_STATUS_INVALID_LENGTH
  6458. */
  6459. /*----------------------------------------------------------------------------*/
  6460. WLAN_STATUS
  6461. wlanoidSetNetworkAddress(IN P_ADAPTER_T prAdapter,
  6462. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6463. {
  6464. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  6465. UINT_32 i, j;
  6466. P_CMD_SET_NETWORK_ADDRESS_LIST prCmdNetworkAddressList;
  6467. P_PARAM_NETWORK_ADDRESS_LIST prNetworkAddressList = (P_PARAM_NETWORK_ADDRESS_LIST) pvSetBuffer;
  6468. P_PARAM_NETWORK_ADDRESS prNetworkAddress;
  6469. P_PARAM_NETWORK_ADDRESS_IP prNetAddrIp;
  6470. UINT_32 u4IpAddressCount, u4CmdSize;
  6471. PUINT_8 pucBuf = (PUINT_8) pvSetBuffer;
  6472. #if CFG_ENABLE_GTK_FRAME_FILTER
  6473. UINT_32 u4IpV4AddrListSize;
  6474. P_BSS_INFO_T prBssInfo = &prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_AIS_INDEX];
  6475. #endif
  6476. DEBUGFUNC("wlanoidSetNetworkAddress");
  6477. DBGLOG(OID, LOUD, "\n");
  6478. ASSERT(prAdapter);
  6479. ASSERT(pu4SetInfoLen);
  6480. *pu4SetInfoLen = 4;
  6481. if (u4SetBufferLen < sizeof(PARAM_NETWORK_ADDRESS_LIST))
  6482. return WLAN_STATUS_INVALID_DATA;
  6483. *pu4SetInfoLen = 0;
  6484. u4IpAddressCount = 0;
  6485. prNetworkAddress = prNetworkAddressList->arAddress;
  6486. for (i = 0; i < prNetworkAddressList->u4AddressCount; i++) {
  6487. if (prNetworkAddress->u2AddressType == PARAM_PROTOCOL_ID_TCP_IP &&
  6488. prNetworkAddress->u2AddressLength == sizeof(PARAM_NETWORK_ADDRESS_IP)) {
  6489. u4IpAddressCount++;
  6490. }
  6491. prNetworkAddress = (P_PARAM_NETWORK_ADDRESS) (prNetworkAddress +
  6492. (ULONG) (prNetworkAddress->u2AddressLength +
  6493. OFFSET_OF(PARAM_NETWORK_ADDRESS, aucAddress)));
  6494. }
  6495. /* construct payload of command packet */
  6496. u4CmdSize = OFFSET_OF(CMD_SET_NETWORK_ADDRESS_LIST, arNetAddress) +
  6497. sizeof(IPV4_NETWORK_ADDRESS) * u4IpAddressCount;
  6498. if (u4IpAddressCount == 0)
  6499. u4CmdSize = sizeof(CMD_SET_NETWORK_ADDRESS_LIST);
  6500. prCmdNetworkAddressList = (P_CMD_SET_NETWORK_ADDRESS_LIST) kalMemAlloc(u4CmdSize, VIR_MEM_TYPE);
  6501. if (prCmdNetworkAddressList == NULL)
  6502. return WLAN_STATUS_FAILURE;
  6503. #if CFG_ENABLE_GTK_FRAME_FILTER
  6504. u4IpV4AddrListSize = OFFSET_OF(IPV4_NETWORK_ADDRESS_LIST, arNetAddr) +
  6505. (u4IpAddressCount * sizeof(IPV4_NETWORK_ADDRESS));
  6506. if (prBssInfo->prIpV4NetAddrList)
  6507. FREE_IPV4_NETWORK_ADDR_LIST(prBssInfo->prIpV4NetAddrList);
  6508. prBssInfo->prIpV4NetAddrList = (P_IPV4_NETWORK_ADDRESS_LIST) kalMemAlloc(u4IpV4AddrListSize, VIR_MEM_TYPE);
  6509. if (prBssInfo->prIpV4NetAddrList == NULL) {
  6510. kalMemFree(prCmdNetworkAddressList, VIR_MEM_TYPE, u4CmdSize);
  6511. return WLAN_STATUS_FAILURE;
  6512. }
  6513. prBssInfo->prIpV4NetAddrList->ucAddrCount = (UINT_8) u4IpAddressCount;
  6514. #endif
  6515. /* fill P_CMD_SET_NETWORK_ADDRESS_LIST */
  6516. prCmdNetworkAddressList->ucNetTypeIndex = NETWORK_TYPE_AIS_INDEX;
  6517. /* only to set IP address to FW once ARP filter is enabled */
  6518. if (prAdapter->fgEnArpFilter) {
  6519. prCmdNetworkAddressList->ucAddressCount = (UINT_8) u4IpAddressCount;
  6520. prNetworkAddress = prNetworkAddressList->arAddress;
  6521. DBGLOG(OID, INFO, "u4IpAddressCount (%u)\n", u4IpAddressCount);
  6522. for (i = 0, j = 0; i < prNetworkAddressList->u4AddressCount; i++) {
  6523. if (prNetworkAddress->u2AddressType == PARAM_PROTOCOL_ID_TCP_IP &&
  6524. prNetworkAddress->u2AddressLength == sizeof(PARAM_NETWORK_ADDRESS_IP)) {
  6525. prNetAddrIp = (P_PARAM_NETWORK_ADDRESS_IP) prNetworkAddress->aucAddress;
  6526. kalMemCopy(prCmdNetworkAddressList->arNetAddress[j].aucIpAddr,
  6527. &(prNetAddrIp->in_addr), sizeof(UINT_32));
  6528. #if CFG_ENABLE_GTK_FRAME_FILTER
  6529. kalMemCopy(prBssInfo->prIpV4NetAddrList->arNetAddr[j].aucIpAddr,
  6530. &(prNetAddrIp->in_addr), sizeof(UINT_32));
  6531. #endif
  6532. j++;
  6533. pucBuf = (PUINT_8) &prNetAddrIp->in_addr;
  6534. DBGLOG(OID, INFO,
  6535. "prNetAddrIp->in_addr:%d:%d:%d:%d\n", pucBuf[0], pucBuf[1], pucBuf[2],
  6536. pucBuf[3]);
  6537. }
  6538. prNetworkAddress = (P_PARAM_NETWORK_ADDRESS) (prNetworkAddress +
  6539. (ULONG) (prNetworkAddress->u2AddressLength +
  6540. OFFSET_OF(PARAM_NETWORK_ADDRESS,
  6541. aucAddress)));
  6542. }
  6543. } else {
  6544. prCmdNetworkAddressList->ucAddressCount = 0;
  6545. }
  6546. rStatus = wlanSendSetQueryCmd(prAdapter,
  6547. CMD_ID_SET_IP_ADDRESS,
  6548. TRUE,
  6549. FALSE,
  6550. TRUE,
  6551. nicCmdEventSetIpAddress,
  6552. nicOidCmdTimeoutCommon,
  6553. u4CmdSize, (PUINT_8) prCmdNetworkAddressList, pvSetBuffer, u4SetBufferLen);
  6554. kalMemFree(prCmdNetworkAddressList, VIR_MEM_TYPE, u4CmdSize);
  6555. return rStatus;
  6556. }
  6557. /*----------------------------------------------------------------------------*/
  6558. /*!
  6559. * \brief Set driver to switch into RF test mode
  6560. *
  6561. * \param[in] prAdapter Pointer to the Adapter structure.
  6562. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set,
  6563. * should be NULL
  6564. * \param[in] u4SetBufferLen The length of the set buffer, should be 0
  6565. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6566. * bytes read from the set buffer. If the call failed
  6567. * due to invalid length of the set buffer, returns
  6568. * the amount of storage needed.
  6569. *
  6570. * \return WLAN_STATUS_SUCCESS
  6571. * \return WLAN_STATUS_ADAPTER_NOT_READY
  6572. * \return WLAN_STATUS_INVALID_DATA
  6573. * \return WLAN_STATUS_INVALID_LENGTH
  6574. */
  6575. /*----------------------------------------------------------------------------*/
  6576. WLAN_STATUS
  6577. wlanoidRftestSetTestMode(IN P_ADAPTER_T prAdapter,
  6578. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6579. {
  6580. WLAN_STATUS rStatus;
  6581. CMD_TEST_CTRL_T rCmdTestCtrl;
  6582. DEBUGFUNC("wlanoidRftestSetTestMode");
  6583. ASSERT(prAdapter);
  6584. ASSERT(pvSetBuffer);
  6585. ASSERT(pu4SetInfoLen);
  6586. *pu4SetInfoLen = 0;
  6587. if (u4SetBufferLen == 0) {
  6588. if (prAdapter->fgTestMode == FALSE) {
  6589. /* switch to RF Test mode */
  6590. rCmdTestCtrl.ucAction = 0; /* Switch mode */
  6591. rCmdTestCtrl.u.u4OpMode = 1; /* RF test mode */
  6592. rStatus = wlanSendSetQueryCmd(prAdapter,
  6593. CMD_ID_TEST_MODE,
  6594. TRUE,
  6595. TRUE,
  6596. TRUE,
  6597. nicCmdEventEnterRfTest,
  6598. nicOidCmdEnterRFTestTimeout,
  6599. sizeof(CMD_TEST_CTRL_T),
  6600. (PUINT_8) &rCmdTestCtrl, pvSetBuffer, u4SetBufferLen);
  6601. } else {
  6602. /* already in test mode .. */
  6603. rStatus = WLAN_STATUS_SUCCESS;
  6604. }
  6605. } else {
  6606. rStatus = WLAN_STATUS_INVALID_DATA;
  6607. }
  6608. DBGLOG(OID, INFO, "Enter TestMode, setBufLen %u, InTestMode %d, rStatus %u\n",
  6609. u4SetBufferLen, prAdapter->fgTestMode, rStatus);
  6610. return rStatus;
  6611. }
  6612. /*----------------------------------------------------------------------------*/
  6613. /*!
  6614. * \brief Set driver to switch into normal operation mode from RF test mode
  6615. *
  6616. * \param[in] prAdapter Pointer to the Adapter structure.
  6617. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  6618. * should be NULL
  6619. * \param[in] u4SetBufferLen The length of the set buffer, should be 0
  6620. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6621. * bytes read from the set buffer. If the call failed
  6622. * due to invalid length of the set buffer, returns
  6623. * the amount of storage needed.
  6624. *
  6625. * \return WLAN_STATUS_SUCCESS
  6626. * \return WLAN_STATUS_ADAPTER_NOT_READY
  6627. * \return WLAN_STATUS_INVALID_DATA
  6628. * \return WLAN_STATUS_INVALID_LENGTH
  6629. */
  6630. /*----------------------------------------------------------------------------*/
  6631. WLAN_STATUS
  6632. wlanoidRftestSetAbortTestMode(IN P_ADAPTER_T prAdapter,
  6633. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6634. {
  6635. WLAN_STATUS rStatus;
  6636. CMD_TEST_CTRL_T rCmdTestCtrl;
  6637. DEBUGFUNC("wlanoidRftestSetTestMode");
  6638. ASSERT(prAdapter);
  6639. ASSERT(pvSetBuffer);
  6640. ASSERT(pu4SetInfoLen);
  6641. *pu4SetInfoLen = 0;
  6642. if (u4SetBufferLen == 0) {
  6643. if (prAdapter->fgTestMode == TRUE) {
  6644. /* switch to normal mode */
  6645. rCmdTestCtrl.ucAction = 0; /* Switch mode */
  6646. rCmdTestCtrl.u.u4OpMode = 0; /* normal mode */
  6647. rStatus = wlanSendSetQueryCmd(prAdapter,
  6648. CMD_ID_TEST_MODE,
  6649. TRUE,
  6650. FALSE,
  6651. TRUE,
  6652. nicCmdEventLeaveRfTest,
  6653. nicOidCmdTimeoutCommon,
  6654. sizeof(CMD_TEST_CTRL_T),
  6655. (PUINT_8) &rCmdTestCtrl, pvSetBuffer, u4SetBufferLen);
  6656. } else {
  6657. /* already in normal mode .. */
  6658. rStatus = WLAN_STATUS_SUCCESS;
  6659. }
  6660. } else {
  6661. rStatus = WLAN_STATUS_INVALID_DATA;
  6662. }
  6663. DBGLOG(OID, INFO, "Abort TestMode, setBufLen %u, InTestMode %d, rStatus %u\n",
  6664. u4SetBufferLen, prAdapter->fgTestMode, rStatus);
  6665. return rStatus;
  6666. }
  6667. /*----------------------------------------------------------------------------*/
  6668. /*!
  6669. * \brief query for RF test parameter
  6670. *
  6671. * \param[in] prAdapter Pointer to the Adapter structure.
  6672. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  6673. * the query.
  6674. * \param[in] u4QueryBufferLen The length of the query buffer.
  6675. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  6676. * bytes written into the query buffer. If the call
  6677. * failed due to invalid length of the query buffer,
  6678. * returns the amount of storage needed.
  6679. *
  6680. * \retval WLAN_STATUS_SUCCESS
  6681. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  6682. * \retval WLAN_STATUS_NOT_SUPPORTED
  6683. * \retval WLAN_STATUS_NOT_ACCEPTED
  6684. */
  6685. /*----------------------------------------------------------------------------*/
  6686. WLAN_STATUS
  6687. wlanoidRftestQueryAutoTest(IN P_ADAPTER_T prAdapter,
  6688. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  6689. {
  6690. P_PARAM_MTK_WIFI_TEST_STRUCT_T prRfATInfo;
  6691. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  6692. DEBUGFUNC("wlanoidRftestQueryAutoTest");
  6693. ASSERT(prAdapter);
  6694. if (u4QueryBufferLen)
  6695. ASSERT(pvQueryBuffer);
  6696. ASSERT(pu4QueryInfoLen);
  6697. /*pu4QueryInfoLen is depended on upper-layer*/
  6698. *pu4QueryInfoLen = u4QueryBufferLen;
  6699. if (u4QueryBufferLen != sizeof(PARAM_MTK_WIFI_TEST_STRUCT_T))
  6700. DBGLOG(OID, WARN, "Invalid data. QueryBufferLen: %u.\n", u4QueryBufferLen);
  6701. prRfATInfo = (P_PARAM_MTK_WIFI_TEST_STRUCT_T) pvQueryBuffer;
  6702. rStatus = rftestQueryATInfo(prAdapter,
  6703. prRfATInfo->u4FuncIndex, prRfATInfo->u4FuncData, pvQueryBuffer, u4QueryBufferLen);
  6704. return rStatus;
  6705. }
  6706. /*----------------------------------------------------------------------------*/
  6707. /*!
  6708. * \brief Set RF test parameter
  6709. *
  6710. * \param[in] prAdapter Pointer to the Adapter structure.
  6711. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  6712. * \param[in] u4SetBufferLen The length of the set buffer.
  6713. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6714. * bytes read from the set buffer. If the call failed
  6715. * due to invalid length of the set buffer, returns
  6716. * the amount of storage needed.
  6717. *
  6718. * \return WLAN_STATUS_SUCCESS
  6719. * \return WLAN_STATUS_ADAPTER_NOT_READY
  6720. * \return WLAN_STATUS_INVALID_LENGTH
  6721. */
  6722. /*----------------------------------------------------------------------------*/
  6723. WLAN_STATUS
  6724. wlanoidRftestSetAutoTest(IN P_ADAPTER_T prAdapter,
  6725. OUT PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6726. {
  6727. P_PARAM_MTK_WIFI_TEST_STRUCT_T prRfATInfo;
  6728. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  6729. DEBUGFUNC("wlanoidRftestSetAutoTest");
  6730. ASSERT(prAdapter);
  6731. ASSERT(pvSetBuffer);
  6732. ASSERT(pu4SetInfoLen);
  6733. *pu4SetInfoLen = sizeof(PARAM_MTK_WIFI_TEST_STRUCT_T);
  6734. if (u4SetBufferLen != sizeof(PARAM_MTK_WIFI_TEST_STRUCT_T))
  6735. DBGLOG(OID, WARN, "Invalid data. SetBufferLen: %u.\n", u4SetBufferLen);
  6736. prRfATInfo = (P_PARAM_MTK_WIFI_TEST_STRUCT_T) pvSetBuffer;
  6737. rStatus = rftestSetATInfo(prAdapter, prRfATInfo->u4FuncIndex, prRfATInfo->u4FuncData);
  6738. return rStatus;
  6739. }
  6740. /* RF test OID set handler */
  6741. WLAN_STATUS rftestSetATInfo(IN P_ADAPTER_T prAdapter, UINT_32 u4FuncIndex, UINT_32 u4FuncData)
  6742. {
  6743. P_GLUE_INFO_T prGlueInfo;
  6744. P_CMD_INFO_T prCmdInfo;
  6745. P_WIFI_CMD_T prWifiCmd;
  6746. P_CMD_TEST_CTRL_T pCmdTestCtrl;
  6747. UINT_8 ucCmdSeqNum;
  6748. ASSERT(prAdapter);
  6749. prGlueInfo = prAdapter->prGlueInfo;
  6750. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + sizeof(CMD_TEST_CTRL_T)));
  6751. if (!prCmdInfo) {
  6752. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  6753. return WLAN_STATUS_FAILURE;
  6754. }
  6755. /* increase command sequence number */
  6756. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  6757. /* Setup common CMD Info Packet */
  6758. prCmdInfo->eCmdType = COMMAND_TYPE_GENERAL_IOCTL;
  6759. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_TEST_CTRL_T);
  6760. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  6761. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  6762. prCmdInfo->fgIsOid = TRUE;
  6763. prCmdInfo->ucCID = CMD_ID_TEST_MODE;
  6764. prCmdInfo->fgSetQuery = TRUE;
  6765. prCmdInfo->fgNeedResp = FALSE;
  6766. prCmdInfo->fgDriverDomainMCR = FALSE;
  6767. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  6768. prCmdInfo->u4SetInfoLen = sizeof(CMD_TEST_CTRL_T);
  6769. prCmdInfo->pvInformationBuffer = NULL;
  6770. prCmdInfo->u4InformationBufferLength = 0;
  6771. /* Setup WIFI_CMD_T (payload = CMD_TEST_CTRL_T) */
  6772. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  6773. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  6774. prWifiCmd->ucCID = prCmdInfo->ucCID;
  6775. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  6776. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  6777. pCmdTestCtrl = (P_CMD_TEST_CTRL_T) (prWifiCmd->aucBuffer);
  6778. pCmdTestCtrl->ucAction = 1; /* Set ATInfo */
  6779. pCmdTestCtrl->u.rRfATInfo.u4FuncIndex = u4FuncIndex;
  6780. pCmdTestCtrl->u.rRfATInfo.u4FuncData = u4FuncData;
  6781. /* insert into prCmdQueue */
  6782. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  6783. /* wakeup txServiceThread later */
  6784. GLUE_SET_EVENT(prAdapter->prGlueInfo);
  6785. return WLAN_STATUS_PENDING;
  6786. }
  6787. WLAN_STATUS
  6788. rftestQueryATInfo(IN P_ADAPTER_T prAdapter,
  6789. UINT_32 u4FuncIndex, UINT_32 u4FuncData, OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen)
  6790. {
  6791. P_GLUE_INFO_T prGlueInfo;
  6792. P_CMD_INFO_T prCmdInfo;
  6793. P_WIFI_CMD_T prWifiCmd;
  6794. P_CMD_TEST_CTRL_T pCmdTestCtrl;
  6795. UINT_8 ucCmdSeqNum;
  6796. P_EVENT_TEST_STATUS prTestStatus;
  6797. ASSERT(prAdapter);
  6798. prGlueInfo = prAdapter->prGlueInfo;
  6799. if (u4FuncIndex == RF_AT_FUNCID_FW_INFO) {
  6800. /* driver implementation */
  6801. prTestStatus = (P_EVENT_TEST_STATUS) pvQueryBuffer;
  6802. prTestStatus->rATInfo.u4FuncData =
  6803. (prAdapter->rVerInfo.u2FwProductID << 16) | (prAdapter->rVerInfo.u2FwOwnVersion);
  6804. if (u4QueryBufferLen > 8) {
  6805. /*support FW version extended*/
  6806. prTestStatus->rATInfo.u4FuncData2 = prAdapter->rVerInfo.u2FwOwnVersionExtend;
  6807. DBGLOG(OID, INFO, "<wifi> version: 0x%x ,extended : 0x%x\n"
  6808. , prTestStatus->rATInfo.u4FuncData
  6809. , prTestStatus->rATInfo.u4FuncData2);
  6810. } else
  6811. DBGLOG(OID, INFO, "<wifi> version: 0x%x\n"
  6812. , prTestStatus->rATInfo.u4FuncData);
  6813. return WLAN_STATUS_SUCCESS;
  6814. } else if (u4FuncIndex == RF_AT_FUNCID_DRV_INFO) {
  6815. /* driver implementation */
  6816. prTestStatus = (P_EVENT_TEST_STATUS) pvQueryBuffer;
  6817. prTestStatus->rATInfo.u4FuncData = CFG_DRV_OWN_VERSION;
  6818. return WLAN_STATUS_SUCCESS;
  6819. }
  6820. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + sizeof(CMD_TEST_CTRL_T)));
  6821. if (!prCmdInfo) {
  6822. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  6823. return WLAN_STATUS_FAILURE;
  6824. }
  6825. /* increase command sequence number */
  6826. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  6827. /* Setup common CMD Info Packet */
  6828. prCmdInfo->eCmdType = COMMAND_TYPE_GENERAL_IOCTL;
  6829. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_TEST_CTRL_T);
  6830. prCmdInfo->pfCmdDoneHandler = nicCmdEventQueryRfTestATInfo;
  6831. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  6832. prCmdInfo->fgIsOid = TRUE;
  6833. prCmdInfo->ucCID = CMD_ID_TEST_MODE;
  6834. prCmdInfo->fgSetQuery = FALSE;
  6835. prCmdInfo->fgNeedResp = TRUE;
  6836. prCmdInfo->fgDriverDomainMCR = FALSE;
  6837. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  6838. prCmdInfo->u4SetInfoLen = sizeof(CMD_TEST_CTRL_T);
  6839. prCmdInfo->pvInformationBuffer = pvQueryBuffer;
  6840. prCmdInfo->u4InformationBufferLength = u4QueryBufferLen;
  6841. /* Setup WIFI_CMD_T (payload = CMD_TEST_CTRL_T) */
  6842. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  6843. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  6844. prWifiCmd->ucCID = prCmdInfo->ucCID;
  6845. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  6846. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  6847. pCmdTestCtrl = (P_CMD_TEST_CTRL_T) (prWifiCmd->aucBuffer);
  6848. pCmdTestCtrl->ucAction = 2; /* Get ATInfo */
  6849. pCmdTestCtrl->u.rRfATInfo.u4FuncIndex = u4FuncIndex;
  6850. pCmdTestCtrl->u.rRfATInfo.u4FuncData = u4FuncData;
  6851. /* insert into prCmdQueue */
  6852. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  6853. /* wakeup txServiceThread later */
  6854. GLUE_SET_EVENT(prAdapter->prGlueInfo);
  6855. return WLAN_STATUS_PENDING;
  6856. }
  6857. WLAN_STATUS rftestSetFrequency(IN P_ADAPTER_T prAdapter, IN UINT_32 u4FreqInKHz, IN PUINT_32 pu4SetInfoLen)
  6858. {
  6859. CMD_TEST_CTRL_T rCmdTestCtrl;
  6860. ASSERT(prAdapter);
  6861. rCmdTestCtrl.ucAction = 5; /* Set Channel Frequency */
  6862. rCmdTestCtrl.u.u4ChannelFreq = u4FreqInKHz;
  6863. return wlanSendSetQueryCmd(prAdapter,
  6864. CMD_ID_TEST_MODE,
  6865. TRUE,
  6866. FALSE,
  6867. TRUE,
  6868. nicCmdEventSetCommon,
  6869. nicOidCmdTimeoutCommon, sizeof(CMD_TEST_CTRL_T), (PUINT_8) &rCmdTestCtrl, NULL, 0);
  6870. }
  6871. /*----------------------------------------------------------------------------*/
  6872. /*!
  6873. * \brief command packet generation utility
  6874. *
  6875. * \param[in] prAdapter Pointer to the Adapter structure.
  6876. * \param[in] ucCID Command ID
  6877. * \param[in] fgSetQuery Set or Query
  6878. * \param[in] fgNeedResp Need for response
  6879. * \param[in] pfCmdDoneHandler Function pointer when command is done
  6880. * \param[in] u4SetQueryInfoLen The length of the set/query buffer
  6881. * \param[in] pucInfoBuffer Pointer to set/query buffer
  6882. *
  6883. *
  6884. * \retval WLAN_STATUS_PENDING
  6885. * \retval WLAN_STATUS_FAILURE
  6886. */
  6887. /*----------------------------------------------------------------------------*/
  6888. WLAN_STATUS
  6889. wlanSendSetQueryCmd(IN P_ADAPTER_T prAdapter,
  6890. UINT_8 ucCID,
  6891. BOOLEAN fgSetQuery,
  6892. BOOLEAN fgNeedResp,
  6893. BOOLEAN fgIsOid,
  6894. PFN_CMD_DONE_HANDLER pfCmdDoneHandler,
  6895. PFN_CMD_TIMEOUT_HANDLER pfCmdTimeoutHandler,
  6896. UINT_32 u4SetQueryInfoLen,
  6897. PUINT_8 pucInfoBuffer, OUT PVOID pvSetQueryBuffer, IN UINT_32 u4SetQueryBufferLen)
  6898. {
  6899. P_GLUE_INFO_T prGlueInfo;
  6900. P_CMD_INFO_T prCmdInfo;
  6901. P_WIFI_CMD_T prWifiCmd;
  6902. UINT_8 ucCmdSeqNum;
  6903. prGlueInfo = prAdapter->prGlueInfo;
  6904. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + u4SetQueryInfoLen));
  6905. DEBUGFUNC("wlanSendSetQueryCmd");
  6906. if (!prCmdInfo) {
  6907. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  6908. return WLAN_STATUS_FAILURE;
  6909. }
  6910. /* increase command sequence number */
  6911. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  6912. DBGLOG(OID, TRACE, "ucCmdSeqNum =%d, ucCID =%d\n", ucCmdSeqNum, ucCID);
  6913. /* Setup common CMD Info Packet */
  6914. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  6915. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  6916. prCmdInfo->u2InfoBufLen = (UINT_16) (CMD_HDR_SIZE + u4SetQueryInfoLen);
  6917. prCmdInfo->pfCmdDoneHandler = pfCmdDoneHandler;
  6918. prCmdInfo->pfCmdTimeoutHandler = pfCmdTimeoutHandler;
  6919. prCmdInfo->fgIsOid = fgIsOid;
  6920. prCmdInfo->ucCID = ucCID;
  6921. prCmdInfo->fgSetQuery = fgSetQuery;
  6922. prCmdInfo->fgNeedResp = fgNeedResp;
  6923. prCmdInfo->fgDriverDomainMCR = FALSE;
  6924. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  6925. prCmdInfo->u4SetInfoLen = u4SetQueryInfoLen;
  6926. prCmdInfo->pvInformationBuffer = pvSetQueryBuffer;
  6927. prCmdInfo->u4InformationBufferLength = u4SetQueryBufferLen;
  6928. /* Setup WIFI_CMD_T (no payload) */
  6929. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  6930. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  6931. prWifiCmd->ucCID = prCmdInfo->ucCID;
  6932. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  6933. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  6934. if (u4SetQueryInfoLen > 0 && pucInfoBuffer != NULL)
  6935. kalMemCopy(prWifiCmd->aucBuffer, pucInfoBuffer, u4SetQueryInfoLen);
  6936. /* insert into prCmdQueue */
  6937. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  6938. /* wakeup txServiceThread later */
  6939. GLUE_SET_EVENT(prGlueInfo);
  6940. return WLAN_STATUS_PENDING;
  6941. }
  6942. #if CFG_SUPPORT_WAPI
  6943. /*----------------------------------------------------------------------------*/
  6944. /*!
  6945. * \brief This routine is called by WAPI ui to set wapi mode, which is needed to info the the driver
  6946. * to operation at WAPI mode while driver initialize.
  6947. *
  6948. * \param[in] prAdapter Pointer to the Adapter structure
  6949. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  6950. * \param[in] u4SetBufferLen The length of the set buffer
  6951. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  6952. * bytes read from the set buffer. If the call failed due to invalid length of
  6953. * the set buffer, returns the amount of storage needed.
  6954. *
  6955. * \retval WLAN_STATUS_SUCCESS
  6956. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  6957. * \retval WLAN_STATUS_INVALID_LENGTH
  6958. *
  6959. */
  6960. /*----------------------------------------------------------------------------*/
  6961. WLAN_STATUS
  6962. wlanoidSetWapiMode(IN P_ADAPTER_T prAdapter,
  6963. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  6964. {
  6965. DEBUGFUNC("wlanoidSetWapiMode");
  6966. DBGLOG(OID, LOUD, "\r\n");
  6967. ASSERT(prAdapter);
  6968. ASSERT(pu4SetInfoLen);
  6969. ASSERT(pvSetBuffer);
  6970. /* Todo:: For support WAPI and Wi-Fi at same driver, use the set wapi assoc ie at the check point */
  6971. /* The Adapter Connection setting fgUseWapi will cleat whil oid set mode (infra), */
  6972. /* And set fgUseWapi True while set wapi assoc ie */
  6973. /* policay selection, add key all depend on this flag, */
  6974. /* The fgUseWapi may remove later */
  6975. if (*(PUINT_32) pvSetBuffer)
  6976. prAdapter->fgUseWapi = TRUE;
  6977. else
  6978. prAdapter->fgUseWapi = FALSE;
  6979. #if 0
  6980. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + 4));
  6981. if (!prCmdInfo) {
  6982. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  6983. return WLAN_STATUS_FAILURE;
  6984. }
  6985. /* increase command sequence number */
  6986. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  6987. /* compose CMD_BUILD_CONNECTION cmd pkt */
  6988. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  6989. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  6990. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + 4;
  6991. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  6992. prCmdInfo->pfCmdTimeoutHandler = NULL;
  6993. prCmdInfo->fgIsOid = TRUE;
  6994. prCmdInfo->ucCID = CMD_ID_WAPI_MODE;
  6995. prCmdInfo->fgSetQuery = TRUE;
  6996. prCmdInfo->fgNeedResp = FALSE;
  6997. prCmdInfo->fgDriverDomainMCR = FALSE;
  6998. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  6999. prCmdInfo->u4SetInfoLen = u4SetBufferLen;
  7000. prCmdInfo->pvInformationBuffer = pvSetBuffer;
  7001. prCmdInfo->u4InformationBufferLength = u4SetBufferLen;
  7002. /* Setup WIFI_CMD_T */
  7003. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  7004. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  7005. prWifiCmd->ucCID = prCmdInfo->ucCID;
  7006. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  7007. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  7008. cp = (PUINT_8) (prWifiCmd->aucBuffer);
  7009. kalMemCopy(cp, (PUINT_8) pvSetBuffer, 4);
  7010. /* insert into prCmdQueue */
  7011. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  7012. /* wakeup txServiceThread later */
  7013. GLUE_SET_EVENT(prGlueInfo);
  7014. return WLAN_STATUS_PENDING;
  7015. #else
  7016. return WLAN_STATUS_SUCCESS;
  7017. #endif
  7018. }
  7019. /*----------------------------------------------------------------------------*/
  7020. /*!
  7021. * \brief This routine is called by WAPI to set the assoc info, which is needed to add to
  7022. * Association request frame while join WAPI AP.
  7023. *
  7024. * \param[in] prAdapter Pointer to the Adapter structure
  7025. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  7026. * \param[in] u4SetBufferLen The length of the set buffer
  7027. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7028. * bytes read from the set buffer. If the call failed due to invalid length of
  7029. * the set buffer, returns the amount of storage needed.
  7030. *
  7031. * \retval WLAN_STATUS_SUCCESS
  7032. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  7033. * \retval WLAN_STATUS_INVALID_LENGTH
  7034. *
  7035. */
  7036. /*----------------------------------------------------------------------------*/
  7037. WLAN_STATUS
  7038. wlanoidSetWapiAssocInfo(IN P_ADAPTER_T prAdapter,
  7039. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7040. {
  7041. P_WAPI_INFO_ELEM_T prWapiInfo;
  7042. PUINT_8 cp;
  7043. UINT_16 u2AuthSuiteCount = 0;
  7044. UINT_16 u2PairSuiteCount = 0;
  7045. UINT_32 u4AuthKeyMgtSuite = 0;
  7046. UINT_32 u4PairSuite = 0;
  7047. UINT_32 u4GroupSuite = 0;
  7048. ASSERT(prAdapter);
  7049. ASSERT(pvSetBuffer);
  7050. ASSERT(pu4SetInfoLen);
  7051. DEBUGFUNC("wlanoidSetWapiAssocInfo");
  7052. DBGLOG(OID, LOUD, "\r\n");
  7053. if (u4SetBufferLen < 20 /* From EID to Group cipher */) {
  7054. prAdapter->rWifiVar.rConnSettings.fgWapiMode = FALSE;
  7055. DBGLOG(SEC, INFO, "fgWapiMode = FALSE due to u4SetBufferLen %u < 20!\n", u4SetBufferLen);
  7056. return WLAN_STATUS_INVALID_LENGTH;
  7057. }
  7058. prAdapter->rWifiVar.rConnSettings.fgWapiMode = TRUE;
  7059. /* if (prWapiInfo->ucElemId != ELEM_ID_WAPI) */
  7060. /* DBGLOG(SEC, TRACE, ("Not WAPI IE ?!\n")); */
  7061. /* if (prWapiInfo->ucLength < 18) */
  7062. /* return WLAN_STATUS_INVALID_LENGTH; */
  7063. *pu4SetInfoLen = u4SetBufferLen;
  7064. prWapiInfo = (P_WAPI_INFO_ELEM_T) pvSetBuffer;
  7065. if (prWapiInfo->ucElemId != ELEM_ID_WAPI) {
  7066. DBGLOG(SEC, INFO, "Not WAPI IE ?! u4SetBufferLen = %u\n", u4SetBufferLen);
  7067. prAdapter->rWifiVar.rConnSettings.fgWapiMode = FALSE;
  7068. return WLAN_STATUS_INVALID_LENGTH;
  7069. }
  7070. if (prWapiInfo->ucLength < 18)
  7071. return WLAN_STATUS_INVALID_LENGTH;
  7072. /* Skip Version check */
  7073. cp = (PUINT_8) &prWapiInfo->u2AuthKeyMgtSuiteCount;
  7074. WLAN_GET_FIELD_16(cp, &u2AuthSuiteCount);
  7075. if (u2AuthSuiteCount > 1)
  7076. return WLAN_STATUS_INVALID_LENGTH;
  7077. cp = (PUINT_8) &prWapiInfo->aucAuthKeyMgtSuite1[0];
  7078. WLAN_GET_FIELD_32(cp, &u4AuthKeyMgtSuite);
  7079. DBGLOG(SEC, TRACE, "WAPI: Assoc Info auth mgt suite [%d]: %02x-%02x-%02x-%02x\n",
  7080. u2AuthSuiteCount,
  7081. (UCHAR) (u4AuthKeyMgtSuite & 0x000000FF),
  7082. (UCHAR) ((u4AuthKeyMgtSuite >> 8) & 0x000000FF),
  7083. (UCHAR) ((u4AuthKeyMgtSuite >> 16) & 0x000000FF),
  7084. (UCHAR) ((u4AuthKeyMgtSuite >> 24) & 0x000000FF));
  7085. if (u4AuthKeyMgtSuite != WAPI_AKM_SUITE_802_1X && u4AuthKeyMgtSuite != WAPI_AKM_SUITE_PSK)
  7086. ASSERT(FALSE);
  7087. cp += 4;
  7088. WLAN_GET_FIELD_16(cp, &u2PairSuiteCount);
  7089. if (u2PairSuiteCount > 1)
  7090. return WLAN_STATUS_INVALID_LENGTH;
  7091. cp += 2;
  7092. WLAN_GET_FIELD_32(cp, &u4PairSuite);
  7093. DBGLOG(SEC, TRACE, "WAPI: Assoc Info pairwise cipher suite [%d]: %02x-%02x-%02x-%02x\n",
  7094. u2PairSuiteCount,
  7095. (UCHAR) (u4PairSuite & 0x000000FF),
  7096. (UCHAR) ((u4PairSuite >> 8) & 0x000000FF),
  7097. (UCHAR) ((u4PairSuite >> 16) & 0x000000FF), (UCHAR) ((u4PairSuite >> 24) & 0x000000FF));
  7098. if (u4PairSuite != WAPI_CIPHER_SUITE_WPI)
  7099. ASSERT(FALSE);
  7100. cp += 4;
  7101. WLAN_GET_FIELD_32(cp, &u4GroupSuite);
  7102. DBGLOG(SEC, TRACE, "WAPI: Assoc Info group cipher suite : %02x-%02x-%02x-%02x\n",
  7103. (UCHAR) (u4GroupSuite & 0x000000FF),
  7104. (UCHAR) ((u4GroupSuite >> 8) & 0x000000FF),
  7105. (UCHAR) ((u4GroupSuite >> 16) & 0x000000FF), (UCHAR) ((u4GroupSuite >> 24) & 0x000000FF));
  7106. if (u4GroupSuite != WAPI_CIPHER_SUITE_WPI)
  7107. ASSERT(FALSE);
  7108. prAdapter->rWifiVar.rConnSettings.u4WapiSelectedAKMSuite = u4AuthKeyMgtSuite;
  7109. prAdapter->rWifiVar.rConnSettings.u4WapiSelectedPairwiseCipher = u4PairSuite;
  7110. prAdapter->rWifiVar.rConnSettings.u4WapiSelectedGroupCipher = u4GroupSuite;
  7111. kalMemCopy(prAdapter->prGlueInfo->aucWapiAssocInfoIEs, pvSetBuffer, u4SetBufferLen);
  7112. prAdapter->prGlueInfo->u2WapiAssocInfoIESz = (UINT_16) u4SetBufferLen;
  7113. DBGLOG(SEC, TRACE, "Assoc Info IE sz %u\n", u4SetBufferLen);
  7114. return WLAN_STATUS_SUCCESS;
  7115. }
  7116. /*----------------------------------------------------------------------------*/
  7117. /*!
  7118. * \brief This routine is called to set the wpi key to the driver.
  7119. *
  7120. * \param[in] prAdapter Pointer to the Adapter structure.
  7121. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7122. * \param[in] u4SetBufferLen The length of the set buffer.
  7123. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7124. * bytes read from the set buffer. If the call failed
  7125. * due to invalid length of the set buffer, returns
  7126. * the amount of storage needed.
  7127. *
  7128. * \retval WLAN_STATUS_SUCCESS
  7129. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  7130. * \retval WLAN_STATUS_INVALID_LENGTH
  7131. * \retval WLAN_STATUS_INVALID_DATA
  7132. *
  7133. * \note The setting buffer P_PARAM_WPI_KEY, which is set by NDIS, is unpacked.
  7134. */
  7135. /*----------------------------------------------------------------------------*/
  7136. WLAN_STATUS
  7137. wlanoidSetWapiKey(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7138. {
  7139. P_GLUE_INFO_T prGlueInfo;
  7140. P_CMD_INFO_T prCmdInfo;
  7141. P_WIFI_CMD_T prWifiCmd;
  7142. P_PARAM_WPI_KEY_T prNewKey;
  7143. P_CMD_802_11_KEY prCmdKey;
  7144. PUINT_8 pc;
  7145. UINT_8 ucCmdSeqNum;
  7146. DEBUGFUNC("wlanoidSetWapiKey");
  7147. DBGLOG(OID, LOUD, "\r\n");
  7148. ASSERT(prAdapter);
  7149. ASSERT(pvSetBuffer);
  7150. ASSERT(pu4SetInfoLen);
  7151. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  7152. DBGLOG(OID, WARN, "Fail in set add key! (Adapter not ready). ACPI=D%d, Radio=%d\r\n",
  7153. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  7154. return WLAN_STATUS_ADAPTER_NOT_READY;
  7155. }
  7156. prNewKey = (P_PARAM_WPI_KEY_T) pvSetBuffer;
  7157. DBGLOG_MEM8(OID, TRACE, (PUINT_8) pvSetBuffer, 560);
  7158. pc = (PUINT_8) pvSetBuffer;
  7159. *pu4SetInfoLen = u4SetBufferLen;
  7160. /* Exception check */
  7161. if (prNewKey->ucKeyID != 0x1 || prNewKey->ucKeyID != 0x0) {
  7162. prNewKey->ucKeyID = prNewKey->ucKeyID & BIT(0);
  7163. /* DBGLOG(SEC, INFO, ("Invalid WAPI key ID (%d)\r\n", prNewKey->ucKeyID)); */
  7164. }
  7165. /* Dump P_PARAM_WPI_KEY_T content. */
  7166. DBGLOG(OID, TRACE, "Set: Dump P_PARAM_WPI_KEY_T content\r\n");
  7167. DBGLOG(OID, TRACE, "TYPE : %d\r\n", prNewKey->eKeyType);
  7168. DBGLOG(OID, TRACE, "Direction : %d\r\n", prNewKey->eDirection);
  7169. DBGLOG(OID, TRACE, "KeyID : %d\r\n", prNewKey->ucKeyID);
  7170. DBGLOG(OID, TRACE, "AddressIndex:\r\n");
  7171. DBGLOG_MEM8(OID, TRACE, prNewKey->aucAddrIndex, 12);
  7172. prNewKey->u4LenWPIEK = 16;
  7173. DBGLOG_MEM8(OID, TRACE, (PUINT_8) prNewKey->aucWPIEK, (UINT_8) prNewKey->u4LenWPIEK);
  7174. prNewKey->u4LenWPICK = 16;
  7175. DBGLOG(OID, TRACE, "CK Key(%d):\r\n", (UINT_8) prNewKey->u4LenWPICK);
  7176. DBGLOG_MEM8(OID, TRACE, (PUINT_8) prNewKey->aucWPICK, (UINT_8) prNewKey->u4LenWPICK);
  7177. DBGLOG(OID, TRACE, "PN:\r\n");
  7178. if (prNewKey->eKeyType == 0) {
  7179. prNewKey->aucPN[0] = 0x5c;
  7180. prNewKey->aucPN[1] = 0x36;
  7181. prNewKey->aucPN[2] = 0x5c;
  7182. prNewKey->aucPN[3] = 0x36;
  7183. prNewKey->aucPN[4] = 0x5c;
  7184. prNewKey->aucPN[5] = 0x36;
  7185. prNewKey->aucPN[6] = 0x5c;
  7186. prNewKey->aucPN[7] = 0x36;
  7187. prNewKey->aucPN[8] = 0x5c;
  7188. prNewKey->aucPN[9] = 0x36;
  7189. prNewKey->aucPN[10] = 0x5c;
  7190. prNewKey->aucPN[11] = 0x36;
  7191. prNewKey->aucPN[12] = 0x5c;
  7192. prNewKey->aucPN[13] = 0x36;
  7193. prNewKey->aucPN[14] = 0x5c;
  7194. prNewKey->aucPN[15] = 0x36;
  7195. }
  7196. DBGLOG_MEM8(OID, TRACE, (PUINT_8) prNewKey->aucPN, 16);
  7197. prGlueInfo = prAdapter->prGlueInfo;
  7198. prCmdInfo = cmdBufAllocateCmdInfo(prAdapter, (CMD_HDR_SIZE + u4SetBufferLen));
  7199. if (!prCmdInfo) {
  7200. DBGLOG(OID, ERROR, "Allocate CMD_INFO_T ==> FAILED.\n");
  7201. return WLAN_STATUS_FAILURE;
  7202. }
  7203. /* increase command sequence number */
  7204. ucCmdSeqNum = nicIncreaseCmdSeqNum(prAdapter);
  7205. /* compose CMD_ID_ADD_REMOVE_KEY cmd pkt */
  7206. prCmdInfo->eCmdType = COMMAND_TYPE_NETWORK_IOCTL;
  7207. prCmdInfo->eNetworkType = NETWORK_TYPE_AIS_INDEX;
  7208. prCmdInfo->u2InfoBufLen = CMD_HDR_SIZE + sizeof(CMD_802_11_KEY);
  7209. prCmdInfo->pfCmdDoneHandler = nicCmdEventSetCommon;
  7210. prCmdInfo->pfCmdTimeoutHandler = nicOidCmdTimeoutCommon;
  7211. prCmdInfo->fgIsOid = TRUE;
  7212. prCmdInfo->ucCID = CMD_ID_ADD_REMOVE_KEY;
  7213. prCmdInfo->fgSetQuery = TRUE;
  7214. prCmdInfo->fgNeedResp = FALSE;
  7215. prCmdInfo->fgDriverDomainMCR = FALSE;
  7216. prCmdInfo->ucCmdSeqNum = ucCmdSeqNum;
  7217. prCmdInfo->u4SetInfoLen = u4SetBufferLen;
  7218. prCmdInfo->pvInformationBuffer = pvSetBuffer;
  7219. prCmdInfo->u4InformationBufferLength = u4SetBufferLen;
  7220. /* Setup WIFI_CMD_T */
  7221. prWifiCmd = (P_WIFI_CMD_T) (prCmdInfo->pucInfoBuffer);
  7222. prWifiCmd->u2TxByteCount_UserPriority = prCmdInfo->u2InfoBufLen;
  7223. prWifiCmd->ucCID = prCmdInfo->ucCID;
  7224. prWifiCmd->ucSetQuery = prCmdInfo->fgSetQuery;
  7225. prWifiCmd->ucSeqNum = prCmdInfo->ucCmdSeqNum;
  7226. prCmdKey = (P_CMD_802_11_KEY) (prWifiCmd->aucBuffer);
  7227. kalMemZero(prCmdKey, sizeof(CMD_802_11_KEY));
  7228. prCmdKey->ucAddRemove = 1; /* Add */
  7229. if (prNewKey->eKeyType == ENUM_WPI_PAIRWISE_KEY) {
  7230. prCmdKey->ucTxKey = 1;
  7231. prCmdKey->ucKeyType = 1;
  7232. }
  7233. kalMemCopy(prCmdKey->aucPeerAddr, (PUINT_8) prNewKey->aucAddrIndex, MAC_ADDR_LEN);
  7234. prCmdKey->ucNetType = 0; /* AIS */
  7235. prCmdKey->ucKeyId = prNewKey->ucKeyID;
  7236. prCmdKey->ucKeyLen = 32;
  7237. prCmdKey->ucAlgorithmId = CIPHER_SUITE_WPI;
  7238. kalMemCopy(prCmdKey->aucKeyMaterial, (PUINT_8) prNewKey->aucWPIEK, 16);
  7239. kalMemCopy(prCmdKey->aucKeyMaterial + 16, (PUINT_8) prNewKey->aucWPICK, 16);
  7240. kalMemCopy(prCmdKey->aucKeyRsc, (PUINT_8) prNewKey->aucPN, 16);
  7241. /* insert into prCmdQueue */
  7242. kalEnqueueCommand(prGlueInfo, (P_QUE_ENTRY_T) prCmdInfo);
  7243. /* wakeup txServiceThread later */
  7244. GLUE_SET_EVENT(prGlueInfo);
  7245. return WLAN_STATUS_PENDING;
  7246. } /* wlanoidSetAddKey */
  7247. #endif
  7248. #if CFG_SUPPORT_WPS2
  7249. /*----------------------------------------------------------------------------*/
  7250. /*!
  7251. * \brief This routine is called by WSC to set the assoc info, which is needed to add to
  7252. * Association request frame while join WPS AP.
  7253. *
  7254. * \param[in] prAdapter Pointer to the Adapter structure
  7255. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  7256. * \param[in] u4SetBufferLen The length of the set buffer
  7257. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7258. * bytes read from the set buffer. If the call failed due to invalid length of
  7259. * the set buffer, returns the amount of storage needed.
  7260. *
  7261. * \retval WLAN_STATUS_SUCCESS
  7262. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  7263. * \retval WLAN_STATUS_INVALID_LENGTH
  7264. *
  7265. */
  7266. /*----------------------------------------------------------------------------*/
  7267. WLAN_STATUS
  7268. wlanoidSetWSCAssocInfo(IN P_ADAPTER_T prAdapter,
  7269. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7270. {
  7271. ASSERT(prAdapter);
  7272. ASSERT(pvSetBuffer);
  7273. ASSERT(pu4SetInfoLen);
  7274. DEBUGFUNC("wlanoidSetWSCAssocInfo");
  7275. DBGLOG(OID, LOUD, "\r\n");
  7276. if (u4SetBufferLen == 0)
  7277. return WLAN_STATUS_INVALID_LENGTH;
  7278. *pu4SetInfoLen = u4SetBufferLen;
  7279. kalMemCopy(prAdapter->prGlueInfo->aucWSCAssocInfoIE, pvSetBuffer, u4SetBufferLen);
  7280. prAdapter->prGlueInfo->u2WSCAssocInfoIELen = (UINT_16) u4SetBufferLen;
  7281. DBGLOG(SEC, TRACE, "Assoc Info IE sz %u\n", u4SetBufferLen);
  7282. return WLAN_STATUS_SUCCESS;
  7283. }
  7284. #endif
  7285. #if CFG_ENABLE_WAKEUP_ON_LAN
  7286. WLAN_STATUS
  7287. wlanoidSetAddWakeupPattern(IN P_ADAPTER_T prAdapter,
  7288. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7289. {
  7290. P_PARAM_PM_PACKET_PATTERN prPacketPattern;
  7291. DEBUGFUNC("wlanoidSetAddWakeupPattern");
  7292. DBGLOG(OID, LOUD, "\r\n");
  7293. ASSERT(prAdapter);
  7294. ASSERT(pu4SetInfoLen);
  7295. *pu4SetInfoLen = sizeof(PARAM_PM_PACKET_PATTERN);
  7296. if (u4SetBufferLen < sizeof(PARAM_PM_PACKET_PATTERN))
  7297. return WLAN_STATUS_INVALID_LENGTH;
  7298. ASSERT(pvSetBuffer);
  7299. prPacketPattern = (P_PARAM_PM_PACKET_PATTERN) pvSetBuffer;
  7300. /* FIXME:
  7301. * Send the struct to firmware */
  7302. return WLAN_STATUS_FAILURE;
  7303. }
  7304. WLAN_STATUS
  7305. wlanoidSetRemoveWakeupPattern(IN P_ADAPTER_T prAdapter,
  7306. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7307. {
  7308. P_PARAM_PM_PACKET_PATTERN prPacketPattern;
  7309. DEBUGFUNC("wlanoidSetAddWakeupPattern");
  7310. DBGLOG(OID, LOUD, "\r\n");
  7311. ASSERT(prAdapter);
  7312. ASSERT(pu4SetInfoLen);
  7313. *pu4SetInfoLen = sizeof(PARAM_PM_PACKET_PATTERN);
  7314. if (u4SetBufferLen < sizeof(PARAM_PM_PACKET_PATTERN))
  7315. return WLAN_STATUS_INVALID_LENGTH;
  7316. ASSERT(pvSetBuffer);
  7317. prPacketPattern = (P_PARAM_PM_PACKET_PATTERN) pvSetBuffer;
  7318. /* FIXME:
  7319. * Send the struct to firmware */
  7320. return WLAN_STATUS_FAILURE;
  7321. }
  7322. WLAN_STATUS
  7323. wlanoidQueryEnableWakeup(IN P_ADAPTER_T prAdapter,
  7324. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  7325. {
  7326. PUINT_32 pu4WakeupEventEnable;
  7327. DEBUGFUNC("wlanoidQueryEnableWakeup");
  7328. DBGLOG(OID, LOUD, "\r\n");
  7329. ASSERT(prAdapter);
  7330. ASSERT(pu4QueryInfoLen);
  7331. if (u4QueryBufferLen)
  7332. ASSERT(pvQueryBuffer);
  7333. *pu4QueryInfoLen = sizeof(UINT_32);
  7334. if (u4QueryBufferLen < sizeof(UINT_32))
  7335. return WLAN_STATUS_BUFFER_TOO_SHORT;
  7336. pu4WakeupEventEnable = (PUINT_32) pvQueryBuffer;
  7337. *pu4WakeupEventEnable = prAdapter->u4WakeupEventEnable;
  7338. return WLAN_STATUS_SUCCESS;
  7339. }
  7340. WLAN_STATUS
  7341. wlanoidSetEnableWakeup(IN P_ADAPTER_T prAdapter,
  7342. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7343. {
  7344. PUINT_32 pu4WakeupEventEnable;
  7345. DEBUGFUNC("wlanoidSetEnableWakup");
  7346. DBGLOG(OID, LOUD, "\r\n");
  7347. ASSERT(prAdapter);
  7348. ASSERT(pu4SetInfoLen);
  7349. *pu4SetInfoLen = sizeof(UINT_32);
  7350. if (u4SetBufferLen < sizeof(UINT_32))
  7351. return WLAN_STATUS_INVALID_LENGTH;
  7352. ASSERT(pvSetBuffer);
  7353. pu4WakeupEventEnable = (PUINT_32) pvSetBuffer;
  7354. prAdapter->u4WakeupEventEnable = *pu4WakeupEventEnable;
  7355. /* FIXME:
  7356. * Send Command Event for setting wakeup-pattern / Magic Packet to firmware
  7357. * */
  7358. return WLAN_STATUS_FAILURE;
  7359. }
  7360. #endif
  7361. /*----------------------------------------------------------------------------*/
  7362. /*!
  7363. * \brief This routine is called to configure PS related settings for WMM-PS test.
  7364. *
  7365. * \param[in] prAdapter Pointer to the Adapter structure.
  7366. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7367. * \param[in] u4SetBufferLen The length of the set buffer.
  7368. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7369. * bytes read from the set buffer. If the call failed
  7370. * due to invalid length of the set buffer, returns
  7371. * the amount of storage needed.
  7372. *
  7373. * \retval WLAN_STATUS_SUCCESS
  7374. */
  7375. /*----------------------------------------------------------------------------*/
  7376. WLAN_STATUS
  7377. wlanoidSetWiFiWmmPsTest(IN P_ADAPTER_T prAdapter,
  7378. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7379. {
  7380. P_PARAM_CUSTOM_WMM_PS_TEST_STRUCT_T prWmmPsTestInfo;
  7381. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  7382. CMD_SET_WMM_PS_TEST_STRUCT_T rSetWmmPsTestParam;
  7383. UINT_16 u2CmdBufLen;
  7384. P_PM_PROFILE_SETUP_INFO_T prPmProfSetupInfo;
  7385. P_BSS_INFO_T prBssInfo;
  7386. DEBUGFUNC("wlanoidSetWiFiWmmPsTest");
  7387. ASSERT(prAdapter);
  7388. ASSERT(pvSetBuffer);
  7389. ASSERT(pu4SetInfoLen);
  7390. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_WMM_PS_TEST_STRUCT_T);
  7391. prWmmPsTestInfo = (P_PARAM_CUSTOM_WMM_PS_TEST_STRUCT_T) pvSetBuffer;
  7392. rSetWmmPsTestParam.ucNetTypeIndex = NETWORK_TYPE_AIS_INDEX;
  7393. rSetWmmPsTestParam.bmfgApsdEnAc = prWmmPsTestInfo->bmfgApsdEnAc;
  7394. rSetWmmPsTestParam.ucIsEnterPsAtOnce = prWmmPsTestInfo->ucIsEnterPsAtOnce;
  7395. rSetWmmPsTestParam.ucIsDisableUcTrigger = prWmmPsTestInfo->ucIsDisableUcTrigger;
  7396. prBssInfo = &(prAdapter->rWifiVar.arBssInfo[rSetWmmPsTestParam.ucNetTypeIndex]);
  7397. prPmProfSetupInfo = &prBssInfo->rPmProfSetupInfo;
  7398. prPmProfSetupInfo->ucBmpDeliveryAC = (rSetWmmPsTestParam.bmfgApsdEnAc >> 4) & BITS(0, 3);
  7399. prPmProfSetupInfo->ucBmpTriggerAC = rSetWmmPsTestParam.bmfgApsdEnAc & BITS(0, 3);
  7400. u2CmdBufLen = sizeof(CMD_SET_WMM_PS_TEST_STRUCT_T);
  7401. #if 0
  7402. /* it will apply the disable trig or not immediately */
  7403. if (prPmInfo->ucWmmPsDisableUcPoll && prPmInfo->ucWmmPsConnWithTrig)
  7404. ; /* NIC_PM_WMM_PS_DISABLE_UC_TRIG(prAdapter, TRUE); */
  7405. else
  7406. ; /* NIC_PM_WMM_PS_DISABLE_UC_TRIG(prAdapter, FALSE); */
  7407. #endif
  7408. rStatus = wlanSendSetQueryCmd(prAdapter, CMD_ID_SET_WMM_PS_TEST_PARMS, TRUE, FALSE, TRUE, NULL, /* TODO? */
  7409. NULL, u2CmdBufLen, (PUINT_8) &rSetWmmPsTestParam, NULL, 0);
  7410. return rStatus;
  7411. } /* wlanoidSetWiFiWmmPsTest */
  7412. /*----------------------------------------------------------------------------*/
  7413. /*!
  7414. * \brief This routine is called to configure enable/disable TX A-MPDU feature.
  7415. *
  7416. * \param[in] prAdapter Pointer to the Adapter structure.
  7417. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7418. * \param[in] u4SetBufferLen The length of the set buffer.
  7419. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7420. * bytes read from the set buffer. If the call failed
  7421. * due to invalid length of the set buffer, returns
  7422. * the amount of storage needed.
  7423. *
  7424. * \retval WLAN_STATUS_SUCCESS
  7425. */
  7426. /*----------------------------------------------------------------------------*/
  7427. WLAN_STATUS
  7428. wlanoidSetTxAmpdu(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7429. {
  7430. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  7431. CMD_TX_AMPDU_T rTxAmpdu;
  7432. UINT_16 u2CmdBufLen;
  7433. PBOOLEAN pfgEnable;
  7434. DEBUGFUNC("wlanoidSetTxAmpdu");
  7435. ASSERT(prAdapter);
  7436. ASSERT(pvSetBuffer);
  7437. ASSERT(pu4SetInfoLen);
  7438. *pu4SetInfoLen = sizeof(BOOLEAN);
  7439. pfgEnable = (PBOOLEAN) pvSetBuffer;
  7440. rTxAmpdu.fgEnable = *pfgEnable;
  7441. u2CmdBufLen = sizeof(CMD_TX_AMPDU_T);
  7442. rStatus = wlanSendSetQueryCmd(prAdapter,
  7443. CMD_ID_TX_AMPDU,
  7444. TRUE, FALSE, TRUE, NULL, NULL, u2CmdBufLen, (PUINT_8) &rTxAmpdu, NULL, 0);
  7445. return rStatus;
  7446. } /* wlanoidSetTxAmpdu */
  7447. /*----------------------------------------------------------------------------*/
  7448. /*!
  7449. * \brief This routine is called to configure reject/accept ADDBA Request.
  7450. *
  7451. * \param[in] prAdapter Pointer to the Adapter structure.
  7452. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7453. * \param[in] u4SetBufferLen The length of the set buffer.
  7454. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7455. * bytes read from the set buffer. If the call failed
  7456. * due to invalid length of the set buffer, returns
  7457. * the amount of storage needed.
  7458. *
  7459. * \retval WLAN_STATUS_SUCCESS
  7460. */
  7461. /*----------------------------------------------------------------------------*/
  7462. WLAN_STATUS
  7463. wlanoidSetAddbaReject(IN P_ADAPTER_T prAdapter,
  7464. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7465. {
  7466. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  7467. CMD_ADDBA_REJECT_T rAddbaReject;
  7468. UINT_16 u2CmdBufLen;
  7469. PBOOLEAN pfgEnable;
  7470. DEBUGFUNC("wlanoidSetAddbaReject");
  7471. ASSERT(prAdapter);
  7472. ASSERT(pvSetBuffer);
  7473. ASSERT(pu4SetInfoLen);
  7474. *pu4SetInfoLen = sizeof(BOOLEAN);
  7475. pfgEnable = (PBOOLEAN) pvSetBuffer;
  7476. rAddbaReject.fgEnable = *pfgEnable;
  7477. u2CmdBufLen = sizeof(CMD_ADDBA_REJECT_T);
  7478. rStatus = wlanSendSetQueryCmd(prAdapter,
  7479. CMD_ID_ADDBA_REJECT,
  7480. TRUE, FALSE, TRUE, NULL, NULL, u2CmdBufLen, (PUINT_8) &rAddbaReject, NULL, 0);
  7481. return rStatus;
  7482. } /* wlanoidSetAddbaReject */
  7483. #if CFG_SLT_SUPPORT
  7484. WLAN_STATUS
  7485. wlanoidQuerySLTStatus(IN P_ADAPTER_T prAdapter,
  7486. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  7487. {
  7488. WLAN_STATUS rWlanStatus = WLAN_STATUS_SUCCESS;
  7489. P_PARAM_MTK_SLT_TEST_STRUCT_T prMtkSltInfo = (P_PARAM_MTK_SLT_TEST_STRUCT_T) NULL;
  7490. P_SLT_INFO_T prSltInfo = (P_SLT_INFO_T) NULL;
  7491. DEBUGFUNC("wlanoidQuerySLTStatus");
  7492. DBGLOG(OID, LOUD, "\r\n");
  7493. ASSERT(prAdapter);
  7494. ASSERT(pu4QueryInfoLen);
  7495. *pu4QueryInfoLen = sizeof(PARAM_MTK_SLT_TEST_STRUCT_T);
  7496. if (u4QueryBufferLen < sizeof(PARAM_MTK_SLT_TEST_STRUCT_T))
  7497. return WLAN_STATUS_INVALID_LENGTH;
  7498. ASSERT(pvQueryBuffer);
  7499. prMtkSltInfo = (P_PARAM_MTK_SLT_TEST_STRUCT_T) pvQueryBuffer;
  7500. prSltInfo = &(prAdapter->rWifiVar.rSltInfo);
  7501. switch (prMtkSltInfo->rSltFuncIdx) {
  7502. case ENUM_MTK_SLT_FUNC_LP_SET:
  7503. {
  7504. P_PARAM_MTK_SLT_LP_TEST_STRUCT_T prLpSetting = (P_PARAM_MTK_SLT_LP_TEST_STRUCT_T) NULL;
  7505. ASSERT(prMtkSltInfo->u4FuncInfoLen == sizeof(PARAM_MTK_SLT_LP_TEST_STRUCT_T));
  7506. prLpSetting = (P_PARAM_MTK_SLT_LP_TEST_STRUCT_T) &prMtkSltInfo->unFuncInfoContent;
  7507. prLpSetting->u4BcnRcvNum = prSltInfo->u4BeaconReceiveCnt;
  7508. }
  7509. break;
  7510. default:
  7511. /* TBD... */
  7512. break;
  7513. }
  7514. return rWlanStatus;
  7515. } /* wlanoidQuerySLTStatus */
  7516. WLAN_STATUS
  7517. wlanoidUpdateSLTMode(IN P_ADAPTER_T prAdapter,
  7518. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7519. {
  7520. WLAN_STATUS rWlanStatus = WLAN_STATUS_SUCCESS;
  7521. P_PARAM_MTK_SLT_TEST_STRUCT_T prMtkSltInfo = (P_PARAM_MTK_SLT_TEST_STRUCT_T) NULL;
  7522. P_SLT_INFO_T prSltInfo = (P_SLT_INFO_T) NULL;
  7523. P_BSS_DESC_T prBssDesc = (P_BSS_DESC_T) NULL;
  7524. P_STA_RECORD_T prStaRec = (P_STA_RECORD_T) NULL;
  7525. P_BSS_INFO_T prBssInfo = (P_BSS_INFO_T) NULL;
  7526. /* 1. Action: Update or Initial Set
  7527. * 2. Role.
  7528. * 3. Target MAC address.
  7529. * 4. RF BW & Rate Settings
  7530. */
  7531. DEBUGFUNC("wlanoidUpdateSLTMode");
  7532. DBGLOG(OID, LOUD, "\r\n");
  7533. ASSERT(prAdapter);
  7534. ASSERT(pu4SetInfoLen);
  7535. *pu4SetInfoLen = sizeof(PARAM_MTK_SLT_TEST_STRUCT_T);
  7536. if (u4SetBufferLen < sizeof(PARAM_MTK_SLT_TEST_STRUCT_T))
  7537. return WLAN_STATUS_INVALID_LENGTH;
  7538. ASSERT(pvSetBuffer);
  7539. prMtkSltInfo = (P_PARAM_MTK_SLT_TEST_STRUCT_T) pvSetBuffer;
  7540. prSltInfo = &(prAdapter->rWifiVar.rSltInfo);
  7541. prBssInfo = &prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_AIS_INDEX];
  7542. switch (prMtkSltInfo->rSltFuncIdx) {
  7543. case ENUM_MTK_SLT_FUNC_INITIAL: /* Initialize */
  7544. {
  7545. P_PARAM_MTK_SLT_INITIAL_STRUCT_T prMtkSltInit = (P_PARAM_MTK_SLT_INITIAL_STRUCT_T) NULL;
  7546. ASSERT(prMtkSltInfo->u4FuncInfoLen == sizeof(PARAM_MTK_SLT_INITIAL_STRUCT_T));
  7547. prMtkSltInit = (P_PARAM_MTK_SLT_INITIAL_STRUCT_T) &prMtkSltInfo->unFuncInfoContent;
  7548. if (prSltInfo->prPseudoStaRec != NULL) {
  7549. /* The driver has been initialized. */
  7550. prSltInfo->prPseudoStaRec = NULL;
  7551. }
  7552. prSltInfo->prPseudoBssDesc = scanSearchExistingBssDesc(prAdapter,
  7553. BSS_TYPE_IBSS,
  7554. prMtkSltInit->aucTargetMacAddr,
  7555. prMtkSltInit->aucTargetMacAddr);
  7556. prSltInfo->u2SiteID = prMtkSltInit->u2SiteID;
  7557. /* Bandwidth 2.4G: Channel 1~14
  7558. * Bandwidth 5G: *36, 40, 44, 48, 52, 56, 60, 64,
  7559. * *100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140,
  7560. * 149, 153, *157, 161,
  7561. * 184, 188, 192, 196, 200, 204, 208, 212, *216
  7562. */
  7563. prSltInfo->ucChannel2G4 = 1 + (prSltInfo->u2SiteID % 4) * 5;
  7564. switch (prSltInfo->ucChannel2G4) {
  7565. case 1:
  7566. prSltInfo->ucChannel5G = 36;
  7567. break;
  7568. case 6:
  7569. prSltInfo->ucChannel5G = 52;
  7570. break;
  7571. case 11:
  7572. prSltInfo->ucChannel5G = 104;
  7573. break;
  7574. case 16:
  7575. prSltInfo->ucChannel2G4 = 14;
  7576. prSltInfo->ucChannel5G = 161;
  7577. break;
  7578. default:
  7579. ASSERT(FALSE);
  7580. }
  7581. if (prSltInfo->prPseudoBssDesc == NULL) {
  7582. do {
  7583. prSltInfo->prPseudoBssDesc = scanAllocateBssDesc(prAdapter);
  7584. if (prSltInfo->prPseudoBssDesc == NULL) {
  7585. rWlanStatus = WLAN_STATUS_FAILURE;
  7586. break;
  7587. }
  7588. prBssDesc = prSltInfo->prPseudoBssDesc;
  7589. } while (FALSE);
  7590. } else {
  7591. prBssDesc = prSltInfo->prPseudoBssDesc;
  7592. }
  7593. if (prBssDesc) {
  7594. prBssDesc->eBSSType = BSS_TYPE_IBSS;
  7595. COPY_MAC_ADDR(prBssDesc->aucSrcAddr, prMtkSltInit->aucTargetMacAddr);
  7596. COPY_MAC_ADDR(prBssDesc->aucBSSID, prBssInfo->aucOwnMacAddr);
  7597. prBssDesc->u2BeaconInterval = 100;
  7598. prBssDesc->u2ATIMWindow = 0;
  7599. prBssDesc->ucDTIMPeriod = 1;
  7600. prBssDesc->u2IELength = 0;
  7601. prBssDesc->fgIsERPPresent = TRUE;
  7602. prBssDesc->fgIsHTPresent = TRUE;
  7603. prBssDesc->u2OperationalRateSet = BIT(RATE_36M_INDEX);
  7604. prBssDesc->u2BSSBasicRateSet = BIT(RATE_36M_INDEX);
  7605. prBssDesc->fgIsUnknownBssBasicRate = FALSE;
  7606. prBssDesc->fgIsLargerTSF = TRUE;
  7607. prBssDesc->eBand = BAND_2G4;
  7608. prBssDesc->ucChannelNum = prSltInfo->ucChannel2G4;
  7609. prBssDesc->ucPhyTypeSet = PHY_TYPE_SET_802_11ABGN;
  7610. GET_CURRENT_SYSTIME(&prBssDesc->rUpdateTime);
  7611. }
  7612. }
  7613. break;
  7614. case ENUM_MTK_SLT_FUNC_RATE_SET: /* Update RF Settings. */
  7615. if (prSltInfo->prPseudoStaRec == NULL) {
  7616. rWlanStatus = WLAN_STATUS_FAILURE;
  7617. break;
  7618. }
  7619. P_PARAM_MTK_SLT_TR_TEST_STRUCT_T prTRSetting = (P_PARAM_MTK_SLT_TR_TEST_STRUCT_T) NULL;
  7620. ASSERT(prMtkSltInfo->u4FuncInfoLen == sizeof(PARAM_MTK_SLT_TR_TEST_STRUCT_T));
  7621. prStaRec = prSltInfo->prPseudoStaRec;
  7622. prTRSetting = (P_PARAM_MTK_SLT_TR_TEST_STRUCT_T) &prMtkSltInfo->unFuncInfoContent;
  7623. if (prTRSetting->rNetworkType == PARAM_NETWORK_TYPE_OFDM5) {
  7624. prBssInfo->eBand = BAND_5G;
  7625. prBssInfo->ucPrimaryChannel = prSltInfo->ucChannel5G;
  7626. }
  7627. if (prTRSetting->rNetworkType == PARAM_NETWORK_TYPE_OFDM24) {
  7628. prBssInfo->eBand = BAND_2G4;
  7629. prBssInfo->ucPrimaryChannel = prSltInfo->ucChannel2G4;
  7630. }
  7631. if ((prTRSetting->u4FixedRate & FIXED_BW_DL40) != 0) {
  7632. /* RF 40 */
  7633. /* It would controls RFBW capability in WTBL. */
  7634. prStaRec->u2HtCapInfo |= HT_CAP_INFO_SUP_CHNL_WIDTH;
  7635. /* This controls RF BW, RF BW would be 40 only if */
  7636. /* 1. PHY_TYPE_BIT_HT is TRUE. */
  7637. /* 2. SCO is SCA/SCB. */
  7638. prStaRec->ucDesiredPhyTypeSet = PHY_TYPE_BIT_HT;
  7639. /* U20/L20 Control. */
  7640. switch (prTRSetting->u4FixedRate & 0xC000) {
  7641. case FIXED_EXT_CHNL_U20:
  7642. prBssInfo->eBssSCO = CHNL_EXT_SCB; /* +2 */
  7643. if (prTRSetting->rNetworkType == PARAM_NETWORK_TYPE_OFDM5)
  7644. prBssInfo->ucPrimaryChannel += 2;
  7645. else {
  7646. /* For channel 1, testing L20 at channel 8. */
  7647. if (prBssInfo->ucPrimaryChannel < 5)
  7648. prBssInfo->ucPrimaryChannel = 8;
  7649. }
  7650. break;
  7651. case FIXED_EXT_CHNL_L20:
  7652. default: /* 40M */
  7653. prBssInfo->eBssSCO = CHNL_EXT_SCA; /* -2 */
  7654. if (prTRSetting->rNetworkType == PARAM_NETWORK_TYPE_OFDM5) {
  7655. prBssInfo->ucPrimaryChannel -= 2;
  7656. } else {
  7657. /* For channel 11 / 14. testing U20 at channel 3. */
  7658. if (prBssInfo->ucPrimaryChannel > 10)
  7659. prBssInfo->ucPrimaryChannel = 3;
  7660. }
  7661. break;
  7662. }
  7663. } else {
  7664. /* RF 20 */
  7665. prStaRec->u2HtCapInfo &= ~HT_CAP_INFO_SUP_CHNL_WIDTH;
  7666. prBssInfo->eBssSCO = CHNL_EXT_SCN;
  7667. }
  7668. prBssInfo->fgErpProtectMode = FALSE;
  7669. prBssInfo->eHtProtectMode = HT_PROTECT_MODE_NONE;
  7670. prBssInfo->eGfOperationMode = GF_MODE_NORMAL;
  7671. nicUpdateBss(prAdapter, prBssInfo->ucNetTypeIndex);
  7672. prStaRec->u2HtCapInfo &= ~(HT_CAP_INFO_SHORT_GI_20M | HT_CAP_INFO_SHORT_GI_40M);
  7673. switch (prTRSetting->u4FixedRate & 0xFF) {
  7674. case RATE_OFDM_54M:
  7675. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_54M_INDEX);
  7676. break;
  7677. case RATE_OFDM_48M:
  7678. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_48M_INDEX);
  7679. break;
  7680. case RATE_OFDM_36M:
  7681. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_36M_INDEX);
  7682. break;
  7683. case RATE_OFDM_24M:
  7684. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_24M_INDEX);
  7685. break;
  7686. case RATE_OFDM_6M:
  7687. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_6M_INDEX);
  7688. break;
  7689. case RATE_CCK_11M_LONG:
  7690. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_11M_INDEX);
  7691. break;
  7692. case RATE_CCK_1M_LONG:
  7693. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_1M_INDEX);
  7694. break;
  7695. case RATE_GF_MCS_0:
  7696. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_HT_PHY_INDEX);
  7697. prStaRec->u2HtCapInfo |= HT_CAP_INFO_HT_GF;
  7698. break;
  7699. case RATE_MM_MCS_7:
  7700. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_HT_PHY_INDEX);
  7701. prStaRec->u2HtCapInfo &= ~HT_CAP_INFO_HT_GF;
  7702. #if 0 /* Only for Current Measurement Mode. */
  7703. prStaRec->u2HtCapInfo |= (HT_CAP_INFO_SHORT_GI_20M | HT_CAP_INFO_SHORT_GI_40M);
  7704. #endif
  7705. break;
  7706. case RATE_GF_MCS_7:
  7707. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_HT_PHY_INDEX);
  7708. prStaRec->u2HtCapInfo |= HT_CAP_INFO_HT_GF;
  7709. break;
  7710. default:
  7711. prStaRec->u2DesiredNonHTRateSet = BIT(RATE_36M_INDEX);
  7712. break;
  7713. }
  7714. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_1);
  7715. cnmStaRecChangeState(prAdapter, prStaRec, STA_STATE_3);
  7716. break;
  7717. case ENUM_MTK_SLT_FUNC_LP_SET: /* Reset LP Test Result. */
  7718. {
  7719. P_PARAM_MTK_SLT_LP_TEST_STRUCT_T prLpSetting = (P_PARAM_MTK_SLT_LP_TEST_STRUCT_T) NULL;
  7720. ASSERT(prMtkSltInfo->u4FuncInfoLen == sizeof(PARAM_MTK_SLT_LP_TEST_STRUCT_T));
  7721. prLpSetting = (P_PARAM_MTK_SLT_LP_TEST_STRUCT_T) &prMtkSltInfo->unFuncInfoContent;
  7722. if (prSltInfo->prPseudoBssDesc == NULL) {
  7723. /* Please initial SLT Mode first. */
  7724. break;
  7725. }
  7726. prBssDesc = prSltInfo->prPseudoBssDesc;
  7727. switch (prLpSetting->rLpTestMode) {
  7728. case ENUM_MTK_LP_TEST_NORMAL:
  7729. /* In normal mode, we would use target MAC address to be the BSSID. */
  7730. COPY_MAC_ADDR(prBssDesc->aucBSSID, prBssInfo->aucOwnMacAddr);
  7731. prSltInfo->fgIsDUT = FALSE;
  7732. break;
  7733. case ENUM_MTK_LP_TEST_GOLDEN_SAMPLE:
  7734. /* 1. Lower AIFS of BCN queue.
  7735. * 2. Fixed Random Number tobe 0.
  7736. */
  7737. prSltInfo->fgIsDUT = FALSE;
  7738. /* In LP test mode, we would use MAC address of Golden Sample to be the BSSID. */
  7739. COPY_MAC_ADDR(prBssDesc->aucBSSID, prBssInfo->aucOwnMacAddr);
  7740. break;
  7741. case ENUM_MTK_LP_TEST_DUT:
  7742. /* 1. Enter Sleep Mode.
  7743. * 2. Fix random number a large value & enlarge AIFN of BCN queue.
  7744. */
  7745. COPY_MAC_ADDR(prBssDesc->aucBSSID, prBssDesc->aucSrcAddr);
  7746. prSltInfo->u4BeaconReceiveCnt = 0;
  7747. prSltInfo->fgIsDUT = TRUE;
  7748. break;
  7749. }
  7750. }
  7751. break;
  7752. default:
  7753. break;
  7754. }
  7755. return WLAN_STATUS_FAILURE;
  7756. return rWlanStatus;
  7757. } /* wlanoidUpdateSLTMode */
  7758. #endif
  7759. /*----------------------------------------------------------------------------*/
  7760. /*!
  7761. * \brief This routine is called to query NVRAM value.
  7762. *
  7763. * \param[in] pvAdapter Pointer to the Adapter structure.
  7764. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  7765. * the query.
  7766. * \param[in] u4QueryBufLen The length of the query buffer.
  7767. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  7768. * bytes written into the query buffer. If the call
  7769. * failed due to invalid length of the query buffer,
  7770. * returns the amount of storage needed.
  7771. *
  7772. * \retval WLAN_STATUS_SUCCESS
  7773. * \retval WLAN_STATUS_FAILURE
  7774. */
  7775. /*----------------------------------------------------------------------------*/
  7776. WLAN_STATUS
  7777. wlanoidQueryNvramRead(IN P_ADAPTER_T prAdapter,
  7778. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  7779. {
  7780. P_PARAM_CUSTOM_NVRAM_RW_STRUCT_T prNvramRwInfo;
  7781. UINT_16 u2Data;
  7782. BOOLEAN fgStatus;
  7783. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  7784. DEBUGFUNC("wlanoidQueryNvramRead");
  7785. ASSERT(prAdapter);
  7786. ASSERT(pu4QueryInfoLen);
  7787. if (u4QueryBufferLen)
  7788. ASSERT(pvQueryBuffer);
  7789. *pu4QueryInfoLen = sizeof(PARAM_CUSTOM_NVRAM_RW_STRUCT_T);
  7790. if (u4QueryBufferLen < sizeof(PARAM_CUSTOM_NVRAM_RW_STRUCT_T))
  7791. return WLAN_STATUS_INVALID_LENGTH;
  7792. prNvramRwInfo = (P_PARAM_CUSTOM_NVRAM_RW_STRUCT_T) pvQueryBuffer;
  7793. if (prNvramRwInfo->ucEepromMethod == PARAM_EEPROM_READ_METHOD_READ) {
  7794. /* change to byte offset */
  7795. fgStatus = kalCfgDataRead16(prAdapter->prGlueInfo,
  7796. prNvramRwInfo->ucEepromIndex << 1,
  7797. &u2Data);
  7798. if (fgStatus) {
  7799. prNvramRwInfo->u2EepromData = u2Data;
  7800. DBGLOG(OID, INFO, "NVRAM Read: index=%#X, data=%#02X\r\n",
  7801. prNvramRwInfo->ucEepromIndex, u2Data);
  7802. } else {
  7803. DBGLOG(OID, ERROR, "NVRAM Read Failed: index=%#x.\r\n", prNvramRwInfo->ucEepromIndex);
  7804. rStatus = WLAN_STATUS_FAILURE;
  7805. }
  7806. } else if (prNvramRwInfo->ucEepromMethod == PARAM_EEPROM_READ_METHOD_GETSIZE) {
  7807. prNvramRwInfo->u2EepromData = CFG_FILE_WIFI_REC_SIZE;
  7808. DBGLOG(OID, INFO, "EEPROM size =%d\r\n", prNvramRwInfo->u2EepromData);
  7809. }
  7810. *pu4QueryInfoLen = sizeof(PARAM_CUSTOM_EEPROM_RW_STRUCT_T);
  7811. return rStatus;
  7812. } /* wlanoidQueryNvramRead */
  7813. /*----------------------------------------------------------------------------*/
  7814. /*!
  7815. * \brief This routine is called to write NVRAM value.
  7816. *
  7817. * \param[in] prAdapter Pointer to the Adapter structure.
  7818. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7819. * \param[in] u4SetBufferLen The length of the set buffer.
  7820. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7821. * bytes read from the set buffer. If the call failed
  7822. * due to invalid length of the set buffer, returns
  7823. * the amount of storage needed.
  7824. *
  7825. * \retval WLAN_STATUS_SUCCESS
  7826. * \retval WLAN_STATUS_FAILURE
  7827. */
  7828. /*----------------------------------------------------------------------------*/
  7829. WLAN_STATUS
  7830. wlanoidSetNvramWrite(IN P_ADAPTER_T prAdapter,
  7831. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7832. {
  7833. P_PARAM_CUSTOM_NVRAM_RW_STRUCT_T prNvramRwInfo;
  7834. BOOLEAN fgStatus;
  7835. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  7836. DEBUGFUNC("wlanoidSetNvramWrite");
  7837. DBGLOG(OID, LOUD, "\n");
  7838. ASSERT(prAdapter);
  7839. ASSERT(pu4SetInfoLen);
  7840. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_NVRAM_RW_STRUCT_T);
  7841. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_NVRAM_RW_STRUCT_T))
  7842. return WLAN_STATUS_INVALID_LENGTH;
  7843. ASSERT(pvSetBuffer);
  7844. prNvramRwInfo = (P_PARAM_CUSTOM_NVRAM_RW_STRUCT_T) pvSetBuffer;
  7845. /* change to byte offset */
  7846. fgStatus = kalCfgDataWrite16(prAdapter->prGlueInfo,
  7847. prNvramRwInfo->ucEepromIndex << 1,
  7848. prNvramRwInfo->u2EepromData);
  7849. if (fgStatus == FALSE) {
  7850. DBGLOG(OID, ERROR, "NVRAM Write Failed.\r\n");
  7851. rStatus = WLAN_STATUS_FAILURE;
  7852. }
  7853. return rStatus;
  7854. } /* wlanoidSetNvramWrite */
  7855. /*----------------------------------------------------------------------------*/
  7856. /*!
  7857. * \brief This routine is called to get the config data source type.
  7858. *
  7859. * \param[in] prAdapter Pointer to the Adapter structure.
  7860. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7861. * \param[in] u4SetBufferLen The length of the set buffer.
  7862. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7863. * bytes read from the set buffer. If the call failed
  7864. * due to invalid length of the set buffer, returns
  7865. * the amount of storage needed.
  7866. *
  7867. * \retval WLAN_STATUS_SUCCESS
  7868. * \retval WLAN_STATUS_FAILURE
  7869. */
  7870. /*----------------------------------------------------------------------------*/
  7871. WLAN_STATUS
  7872. wlanoidQueryCfgSrcType(IN P_ADAPTER_T prAdapter,
  7873. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  7874. {
  7875. ASSERT(prAdapter);
  7876. *pu4QueryInfoLen = sizeof(ENUM_CFG_SRC_TYPE_T);
  7877. if (kalIsConfigurationExist(prAdapter->prGlueInfo) == TRUE)
  7878. *(P_ENUM_CFG_SRC_TYPE_T) pvQueryBuffer = CFG_SRC_TYPE_NVRAM;
  7879. else
  7880. *(P_ENUM_CFG_SRC_TYPE_T) pvQueryBuffer = CFG_SRC_TYPE_EEPROM;
  7881. return WLAN_STATUS_SUCCESS;
  7882. }
  7883. /*----------------------------------------------------------------------------*/
  7884. /*!
  7885. * \brief This routine is called to get the config data source type.
  7886. *
  7887. * \param[in] prAdapter Pointer to the Adapter structure.
  7888. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7889. * \param[in] u4SetBufferLen The length of the set buffer.
  7890. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7891. * bytes read from the set buffer. If the call failed
  7892. * due to invalid length of the set buffer, returns
  7893. * the amount of storage needed.
  7894. *
  7895. * \retval WLAN_STATUS_SUCCESS
  7896. * \retval WLAN_STATUS_FAILURE
  7897. */
  7898. /*----------------------------------------------------------------------------*/
  7899. WLAN_STATUS
  7900. wlanoidQueryEepromType(IN P_ADAPTER_T prAdapter,
  7901. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  7902. {
  7903. ASSERT(prAdapter);
  7904. *pu4QueryInfoLen = sizeof(P_ENUM_EEPROM_TYPE_T);
  7905. #if CFG_SUPPORT_NIC_CAPABILITY
  7906. if (prAdapter->fgIsEepromUsed == TRUE)
  7907. *(P_ENUM_EEPROM_TYPE_T) pvQueryBuffer = EEPROM_TYPE_PRESENT;
  7908. else
  7909. *(P_ENUM_EEPROM_TYPE_T) pvQueryBuffer = EEPROM_TYPE_NO;
  7910. #else
  7911. *(P_ENUM_EEPROM_TYPE_T) pvQueryBuffer = EEPROM_TYPE_NO;
  7912. #endif
  7913. return WLAN_STATUS_SUCCESS;
  7914. }
  7915. /*----------------------------------------------------------------------------*/
  7916. /*!
  7917. * \brief This routine is called to get the config data source type.
  7918. *
  7919. * \param[in] prAdapter Pointer to the Adapter structure.
  7920. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  7921. * \param[in] u4SetBufferLen The length of the set buffer.
  7922. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  7923. * bytes read from the set buffer. If the call failed
  7924. * due to invalid length of the set buffer, returns
  7925. * the amount of storage needed.
  7926. *
  7927. * \retval WLAN_STATUS_SUCCESS
  7928. * \retval WLAN_STATUS_FAILURE
  7929. */
  7930. /*----------------------------------------------------------------------------*/
  7931. WLAN_STATUS
  7932. wlanoidSetCountryCode(IN P_ADAPTER_T prAdapter,
  7933. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7934. {
  7935. PUINT_8 pucCountry;
  7936. ASSERT(prAdapter);
  7937. ASSERT(pvSetBuffer);
  7938. ASSERT(u4SetBufferLen == 2);
  7939. *pu4SetInfoLen = 2;
  7940. pucCountry = pvSetBuffer;
  7941. prAdapter->rWifiVar.rConnSettings.u2CountryCode = (((UINT_16) pucCountry[0]) << 8) | ((UINT_16) pucCountry[1]);
  7942. rlmDomainSendCmd(prAdapter, TRUE);
  7943. return WLAN_STATUS_SUCCESS;
  7944. }
  7945. #if 0
  7946. WLAN_STATUS
  7947. wlanoidSetNoaParam(IN P_ADAPTER_T prAdapter,
  7948. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7949. {
  7950. P_PARAM_CUSTOM_NOA_PARAM_STRUCT_T prNoaParam;
  7951. CMD_CUSTOM_NOA_PARAM_STRUCT_T rCmdNoaParam;
  7952. DEBUGFUNC("wlanoidSetNoaParam");
  7953. DBGLOG(OID, LOUD, "\n");
  7954. ASSERT(prAdapter);
  7955. ASSERT(pu4SetInfoLen);
  7956. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_NOA_PARAM_STRUCT_T);
  7957. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_NOA_PARAM_STRUCT_T))
  7958. return WLAN_STATUS_INVALID_LENGTH;
  7959. ASSERT(pvSetBuffer);
  7960. prNoaParam = (P_PARAM_CUSTOM_NOA_PARAM_STRUCT_T) pvSetBuffer;
  7961. kalMemZero(&rCmdNoaParam, sizeof(CMD_CUSTOM_NOA_PARAM_STRUCT_T));
  7962. rCmdNoaParam.u4NoaDurationMs = prNoaParam->u4NoaDurationMs;
  7963. rCmdNoaParam.u4NoaIntervalMs = prNoaParam->u4NoaIntervalMs;
  7964. rCmdNoaParam.u4NoaCount = prNoaParam->u4NoaCount;
  7965. return wlanSendSetQueryCmd(prAdapter,
  7966. CMD_ID_SET_NOA_PARAM,
  7967. TRUE,
  7968. FALSE,
  7969. TRUE,
  7970. nicCmdEventSetCommon,
  7971. nicOidCmdTimeoutCommon,
  7972. sizeof(CMD_CUSTOM_NOA_PARAM_STRUCT_T),
  7973. (PUINT_8) &rCmdNoaParam, pvSetBuffer, u4SetBufferLen);
  7974. }
  7975. WLAN_STATUS
  7976. wlanoidSetOppPsParam(IN P_ADAPTER_T prAdapter,
  7977. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  7978. {
  7979. P_PARAM_CUSTOM_OPPPS_PARAM_STRUCT_T prOppPsParam;
  7980. CMD_CUSTOM_OPPPS_PARAM_STRUCT_T rCmdOppPsParam;
  7981. DEBUGFUNC("wlanoidSetOppPsParam");
  7982. DBGLOG(OID, LOUD, "\n");
  7983. ASSERT(prAdapter);
  7984. ASSERT(pu4SetInfoLen);
  7985. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_OPPPS_PARAM_STRUCT_T);
  7986. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_OPPPS_PARAM_STRUCT_T))
  7987. return WLAN_STATUS_INVALID_LENGTH;
  7988. ASSERT(pvSetBuffer);
  7989. prOppPsParam = (P_PARAM_CUSTOM_OPPPS_PARAM_STRUCT_T) pvSetBuffer;
  7990. kalMemZero(&rCmdOppPsParam, sizeof(CMD_CUSTOM_OPPPS_PARAM_STRUCT_T));
  7991. rCmdOppPsParam.u4CTwindowMs = prOppPsParam->u4CTwindowMs;
  7992. return wlanSendSetQueryCmd(prAdapter,
  7993. CMD_ID_SET_OPPPS_PARAM,
  7994. TRUE,
  7995. FALSE,
  7996. TRUE,
  7997. nicCmdEventSetCommon,
  7998. nicOidCmdTimeoutCommon,
  7999. sizeof(CMD_CUSTOM_OPPPS_PARAM_STRUCT_T),
  8000. (PUINT_8) &rCmdOppPsParam, pvSetBuffer, u4SetBufferLen);
  8001. }
  8002. WLAN_STATUS
  8003. wlanoidSetUApsdParam(IN P_ADAPTER_T prAdapter,
  8004. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8005. {
  8006. P_PARAM_CUSTOM_UAPSD_PARAM_STRUCT_T prUapsdParam;
  8007. CMD_CUSTOM_UAPSD_PARAM_STRUCT_T rCmdUapsdParam;
  8008. P_PM_PROFILE_SETUP_INFO_T prPmProfSetupInfo;
  8009. P_BSS_INFO_T prBssInfo;
  8010. DEBUGFUNC("wlanoidSetUApsdParam");
  8011. DBGLOG(OID, LOUD, "\n");
  8012. ASSERT(prAdapter);
  8013. ASSERT(pu4SetInfoLen);
  8014. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_UAPSD_PARAM_STRUCT_T);
  8015. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_UAPSD_PARAM_STRUCT_T))
  8016. return WLAN_STATUS_INVALID_LENGTH;
  8017. ASSERT(pvSetBuffer);
  8018. prBssInfo = &(prAdapter->rWifiVar.arBssInfo[NETWORK_TYPE_P2P_INDEX]);
  8019. prPmProfSetupInfo = &prBssInfo->rPmProfSetupInfo;
  8020. prUapsdParam = (P_PARAM_CUSTOM_UAPSD_PARAM_STRUCT_T) pvSetBuffer;
  8021. kalMemZero(&rCmdUapsdParam, sizeof(CMD_CUSTOM_OPPPS_PARAM_STRUCT_T));
  8022. rCmdUapsdParam.fgEnAPSD = prUapsdParam->fgEnAPSD;
  8023. prAdapter->rWifiVar.fgSupportUAPSD = prUapsdParam->fgEnAPSD;
  8024. rCmdUapsdParam.fgEnAPSD_AcBe = prUapsdParam->fgEnAPSD_AcBe;
  8025. rCmdUapsdParam.fgEnAPSD_AcBk = prUapsdParam->fgEnAPSD_AcBk;
  8026. rCmdUapsdParam.fgEnAPSD_AcVo = prUapsdParam->fgEnAPSD_AcVo;
  8027. rCmdUapsdParam.fgEnAPSD_AcVi = prUapsdParam->fgEnAPSD_AcVi;
  8028. prPmProfSetupInfo->ucBmpDeliveryAC =
  8029. ((prUapsdParam->fgEnAPSD_AcBe << 0) |
  8030. (prUapsdParam->fgEnAPSD_AcBk << 1) |
  8031. (prUapsdParam->fgEnAPSD_AcVi << 2) | (prUapsdParam->fgEnAPSD_AcVo << 3));
  8032. prPmProfSetupInfo->ucBmpTriggerAC =
  8033. ((prUapsdParam->fgEnAPSD_AcBe << 0) |
  8034. (prUapsdParam->fgEnAPSD_AcBk << 1) |
  8035. (prUapsdParam->fgEnAPSD_AcVi << 2) | (prUapsdParam->fgEnAPSD_AcVo << 3));
  8036. rCmdUapsdParam.ucMaxSpLen = prUapsdParam->ucMaxSpLen;
  8037. prPmProfSetupInfo->ucUapsdSp = prUapsdParam->ucMaxSpLen;
  8038. return wlanSendSetQueryCmd(prAdapter,
  8039. CMD_ID_SET_UAPSD_PARAM,
  8040. TRUE,
  8041. FALSE,
  8042. TRUE,
  8043. nicCmdEventSetCommon,
  8044. nicOidCmdTimeoutCommon,
  8045. sizeof(CMD_CUSTOM_OPPPS_PARAM_STRUCT_T),
  8046. (PUINT_8) &rCmdUapsdParam, pvSetBuffer, u4SetBufferLen);
  8047. }
  8048. #endif
  8049. /*----------------------------------------------------------------------------*/
  8050. /*!
  8051. * \brief This routine is called to set BT profile or BT information and the
  8052. * driver will set the built-in PTA configuration into chip.
  8053. *
  8054. *
  8055. * \param[in] prAdapter Pointer to the Adapter structure.
  8056. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8057. * \param[in] u4SetBufferLen The length of the set buffer.
  8058. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8059. * bytes read from the set buffer. If the call failed
  8060. * due to invalid length of the set buffer, returns
  8061. * the amount of storage needed.
  8062. *
  8063. * \retval WLAN_STATUS_SUCCESS
  8064. * \retval WLAN_STATUS_INVALID_LENGTH
  8065. */
  8066. /*----------------------------------------------------------------------------*/
  8067. WLAN_STATUS
  8068. wlanoidSetBT(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8069. {
  8070. P_PTA_IPC_T prPtaIpc;
  8071. DEBUGFUNC("wlanoidSetBT.\n");
  8072. ASSERT(prAdapter);
  8073. ASSERT(pu4SetInfoLen);
  8074. *pu4SetInfoLen = sizeof(PTA_IPC_T);
  8075. if (u4SetBufferLen != sizeof(PTA_IPC_T)) {
  8076. WARNLOG(("Invalid length %u\n", u4SetBufferLen));
  8077. return WLAN_STATUS_INVALID_LENGTH;
  8078. }
  8079. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8080. DBGLOG(OID, WARN, "Fail to set BT profile because of ACPI_D3\n");
  8081. return WLAN_STATUS_ADAPTER_NOT_READY;
  8082. }
  8083. ASSERT(pvSetBuffer);
  8084. prPtaIpc = (P_PTA_IPC_T) pvSetBuffer;
  8085. #if CFG_SUPPORT_BCM && CFG_SUPPORT_BCM_BWCS && CFG_SUPPORT_BCM_BWCS_DEBUG
  8086. DBGLOG(OID, INFO,
  8087. "BCM BWCS CMD: BTPParams[0]=%02x, BTPParams[1]=%02x, BTPParams[2]=%02x, BTPParams[3]=%02x.\n",
  8088. prPtaIpc->u.aucBTPParams[0], prPtaIpc->u.aucBTPParams[1], prPtaIpc->u.aucBTPParams[2],
  8089. prPtaIpc->u.aucBTPParams[3];
  8090. #endif
  8091. wlanSendSetQueryCmd(prAdapter,
  8092. CMD_ID_SET_BWCS,
  8093. TRUE, FALSE, FALSE, NULL, NULL, sizeof(PTA_IPC_T), (PUINT_8) prPtaIpc, NULL, 0);
  8094. return WLAN_STATUS_SUCCESS;
  8095. }
  8096. /*----------------------------------------------------------------------------*/
  8097. /*!
  8098. * \brief This routine is called to query current BT profile and BTCR values
  8099. *
  8100. * \param[in] prAdapter Pointer to the Adapter structure.
  8101. * \param[in] pvQueryBuffer Pointer to the buffer that holds the result of
  8102. * the query.
  8103. * \param[in] u4QueryBufferLen The length of the query buffer.
  8104. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  8105. * bytes written into the query buffer. If the call
  8106. * failed due to invalid length of the query buffer,
  8107. * returns the amount of storage needed.
  8108. *
  8109. * \retval WLAN_STATUS_SUCCESS
  8110. * \retval WLAN_STATUS_INVALID_LENGTH
  8111. */
  8112. /*----------------------------------------------------------------------------*/
  8113. WLAN_STATUS
  8114. wlanoidQueryBT(IN P_ADAPTER_T prAdapter,
  8115. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8116. {
  8117. /* P_PARAM_PTA_IPC_T prPtaIpc; */
  8118. /* UINT_32 u4QueryBuffLen; */
  8119. ASSERT(prAdapter);
  8120. ASSERT(pu4QueryInfoLen);
  8121. if (u4QueryBufferLen)
  8122. ASSERT(pvQueryBuffer);
  8123. *pu4QueryInfoLen = sizeof(PTA_IPC_T);
  8124. /* Check for query buffer length */
  8125. if (u4QueryBufferLen != sizeof(PTA_IPC_T)) {
  8126. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  8127. return WLAN_STATUS_INVALID_LENGTH;
  8128. }
  8129. ASSERT(pvQueryBuffer);
  8130. /* prPtaIpc = (P_PTA_IPC_T)pvQueryBuffer; */
  8131. /* prPtaIpc->ucCmd = BT_CMD_PROFILE; */
  8132. /* prPtaIpc->ucLen = sizeof(prPtaIpc->u); */
  8133. /* nicPtaGetProfile(prAdapter, (PUINT_8)&prPtaIpc->u, &u4QueryBuffLen); */
  8134. return WLAN_STATUS_SUCCESS;
  8135. }
  8136. #if 0
  8137. WLAN_STATUS
  8138. wlanoidQueryBtSingleAntenna(IN P_ADAPTER_T prAdapter,
  8139. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8140. {
  8141. P_PTA_INFO_T prPtaInfo;
  8142. PUINT_32 pu4SingleAntenna;
  8143. ASSERT(prAdapter);
  8144. ASSERT(pu4QueryInfoLen);
  8145. if (u4QueryBufferLen)
  8146. ASSERT(pvQueryBuffer);
  8147. *pu4QueryInfoLen = sizeof(UINT_32);
  8148. /* Check for query buffer length */
  8149. if (u4QueryBufferLen != sizeof(UINT_32)) {
  8150. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  8151. return WLAN_STATUS_INVALID_LENGTH;
  8152. }
  8153. ASSERT(pvQueryBuffer);
  8154. prPtaInfo = &prAdapter->rPtaInfo;
  8155. pu4SingleAntenna = (PUINT_32) pvQueryBuffer;
  8156. if (prPtaInfo->fgSingleAntenna) {
  8157. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Q Single Ant = 1\r\n")); */
  8158. *pu4SingleAntenna = 1;
  8159. } else {
  8160. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Q Single Ant = 0\r\n")); */
  8161. *pu4SingleAntenna = 0;
  8162. }
  8163. return WLAN_STATUS_SUCCESS;
  8164. }
  8165. WLAN_STATUS
  8166. wlanoidSetBtSingleAntenna(IN P_ADAPTER_T prAdapter,
  8167. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8168. {
  8169. PUINT_32 pu4SingleAntenna;
  8170. UINT_32 u4SingleAntenna;
  8171. P_PTA_INFO_T prPtaInfo;
  8172. ASSERT(prAdapter);
  8173. ASSERT(pu4SetInfoLen);
  8174. prPtaInfo = &prAdapter->rPtaInfo;
  8175. *pu4SetInfoLen = sizeof(UINT_32);
  8176. if (u4SetBufferLen != sizeof(UINT_32))
  8177. return WLAN_STATUS_INVALID_LENGTH;
  8178. if (IS_ARB_IN_RFTEST_STATE(prAdapter))
  8179. return WLAN_STATUS_SUCCESS;
  8180. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8181. DBGLOG(OID, WARN, "Fail to set antenna because of ACPI_D3\n");
  8182. return WLAN_STATUS_ADAPTER_NOT_READY;
  8183. }
  8184. ASSERT(pvSetBuffer);
  8185. pu4SingleAntenna = (PUINT_32) pvSetBuffer;
  8186. u4SingleAntenna = *pu4SingleAntenna;
  8187. if (u4SingleAntenna == 0) {
  8188. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Set Single Ant = 0\r\n")); */
  8189. prPtaInfo->fgSingleAntenna = FALSE;
  8190. } else {
  8191. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Set Single Ant = 1\r\n")); */
  8192. prPtaInfo->fgSingleAntenna = TRUE;
  8193. }
  8194. ptaFsmRunEventSetConfig(prAdapter, &prPtaInfo->rPtaParam);
  8195. return WLAN_STATUS_SUCCESS;
  8196. }
  8197. #if CFG_SUPPORT_BCM && CFG_SUPPORT_BCM_BWCS
  8198. WLAN_STATUS
  8199. wlanoidQueryPta(IN P_ADAPTER_T prAdapter,
  8200. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8201. {
  8202. P_PTA_INFO_T prPtaInfo;
  8203. PUINT_32 pu4Pta;
  8204. ASSERT(prAdapter);
  8205. ASSERT(pu4QueryInfoLen);
  8206. if (u4QueryBufferLen)
  8207. ASSERT(pvQueryBuffer);
  8208. *pu4QueryInfoLen = sizeof(UINT_32);
  8209. /* Check for query buffer length */
  8210. if (u4QueryBufferLen != sizeof(UINT_32)) {
  8211. DBGLOG(OID, WARN, "Invalid length %u\n", u4QueryBufferLen);
  8212. return WLAN_STATUS_INVALID_LENGTH;
  8213. }
  8214. ASSERT(pvQueryBuffer);
  8215. prPtaInfo = &prAdapter->rPtaInfo;
  8216. pu4Pta = (PUINT_32) pvQueryBuffer;
  8217. if (prPtaInfo->fgEnabled) {
  8218. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"PTA = 1\r\n")); */
  8219. *pu4Pta = 1;
  8220. } else {
  8221. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"PTA = 0\r\n")); */
  8222. *pu4Pta = 0;
  8223. }
  8224. return WLAN_STATUS_SUCCESS;
  8225. }
  8226. WLAN_STATUS
  8227. wlanoidSetPta(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8228. {
  8229. PUINT_32 pu4PtaCtrl;
  8230. UINT_32 u4PtaCtrl;
  8231. ASSERT(prAdapter);
  8232. ASSERT(pu4SetInfoLen);
  8233. *pu4SetInfoLen = sizeof(UINT_32);
  8234. if (u4SetBufferLen != sizeof(UINT_32))
  8235. return WLAN_STATUS_INVALID_LENGTH;
  8236. if (IS_ARB_IN_RFTEST_STATE(prAdapter))
  8237. return WLAN_STATUS_SUCCESS;
  8238. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8239. DBGLOG(OID, WARN, "Fail to set BT setting because of ACPI_D3\n");
  8240. return WLAN_STATUS_ADAPTER_NOT_READY;
  8241. }
  8242. ASSERT(pvSetBuffer);
  8243. pu4PtaCtrl = (PUINT_32) pvSetBuffer;
  8244. u4PtaCtrl = *pu4PtaCtrl;
  8245. if (u4PtaCtrl == 0) {
  8246. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Set Pta= 0\r\n")); */
  8247. nicPtaSetFunc(prAdapter, FALSE);
  8248. } else {
  8249. /* DBGLOG(OID, INFO, (KERN_WARNING DRV_NAME"Set Pta= 1\r\n")); */
  8250. nicPtaSetFunc(prAdapter, TRUE);
  8251. }
  8252. return WLAN_STATUS_SUCCESS;
  8253. }
  8254. #endif
  8255. #endif
  8256. /*----------------------------------------------------------------------------*/
  8257. /*!
  8258. * \brief This routine is called to set Tx power profile.
  8259. *
  8260. *
  8261. * \param[in] prAdapter Pointer to the Adapter structure.
  8262. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8263. * \param[in] u4SetBufferLen The length of the set buffer.
  8264. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8265. * bytes read from the set buffer. If the call failed
  8266. * due to invalid length of the set buffer, returns
  8267. * the amount of storage needed.
  8268. *
  8269. * \retval WLAN_STATUS_SUCCESS
  8270. * \retval WLAN_STATUS_INVALID_LENGTH
  8271. */
  8272. /*----------------------------------------------------------------------------*/
  8273. WLAN_STATUS
  8274. wlanoidSetTxPower(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8275. {
  8276. /* P_SET_TXPWR_CTRL_T pTxPwr = (P_SET_TXPWR_CTRL_T)pvSetBuffer; */
  8277. /* UINT_32 i; */
  8278. WLAN_STATUS rStatus;
  8279. DEBUGFUNC("wlanoidSetTxPower");
  8280. DBGLOG(OID, LOUD, "\r\n");
  8281. ASSERT(prAdapter);
  8282. ASSERT(pvSetBuffer);
  8283. #if 0
  8284. DBGLOG(OID, INFO, "c2GLegacyStaPwrOffset=%d\n", pTxPwr->c2GLegacyStaPwrOffset);
  8285. DBGLOG(OID, INFO, "c2GHotspotPwrOffset=%d\n", pTxPwr->c2GHotspotPwrOffset);
  8286. DBGLOG(OID, INFO, "c2GP2pPwrOffset=%d\n", pTxPwr->c2GP2pPwrOffset);
  8287. DBGLOG(OID, INFO, "c2GBowPwrOffset=%d\n", pTxPwr->c2GBowPwrOffset);
  8288. DBGLOG(OID, INFO, "c5GLegacyStaPwrOffset=%d\n", pTxPwr->c5GLegacyStaPwrOffset);
  8289. DBGLOG(OID, INFO, "c5GHotspotPwrOffset=%d\n", pTxPwr->c5GHotspotPwrOffset);
  8290. DBGLOG(OID, INFO, "c5GP2pPwrOffset=%d\n", pTxPwr->c5GP2pPwrOffset);
  8291. DBGLOG(OID, INFO, "c5GBowPwrOffset=%d\n", pTxPwr->c5GBowPwrOffset);
  8292. DBGLOG(OID, INFO, "ucConcurrencePolicy=%d\n", pTxPwr->ucConcurrencePolicy);
  8293. for (i = 0; i < 14; i++)
  8294. DBGLOG(OID, INFO, "acTxPwrLimit2G[%d]=%d\n", i, pTxPwr->acTxPwrLimit2G[i]);
  8295. for (i = 0; i < 4; i++)
  8296. DBGLOG(OID, INFO, "acTxPwrLimit5G[%d]=%d\n", i, pTxPwr->acTxPwrLimit5G[i]);
  8297. #endif
  8298. rStatus = wlanSendSetQueryCmd(prAdapter, /* prAdapter */
  8299. CMD_ID_SET_TXPWR_CTRL, /* ucCID */
  8300. TRUE, /* fgSetQuery */
  8301. FALSE, /* fgNeedResp */
  8302. TRUE, /* fgIsOid */
  8303. NULL, /* pfCmdDoneHandler */
  8304. NULL, /* pfCmdTimeoutHandler */
  8305. u4SetBufferLen, /* u4SetQueryInfoLen */
  8306. (PUINT_8) pvSetBuffer, /* pucInfoBuffer */
  8307. NULL, /* pvSetQueryBuffer */
  8308. 0 /* u4SetQueryBufferLen */
  8309. );
  8310. ASSERT(rStatus == WLAN_STATUS_PENDING);
  8311. return rStatus;
  8312. }
  8313. WLAN_STATUS wlanSendMemDumpCmd(IN P_ADAPTER_T prAdapter, IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen)
  8314. {
  8315. P_PARAM_CUSTOM_MEM_DUMP_STRUCT_T prMemDumpInfo;
  8316. P_CMD_DUMP_MEM prCmdDumpMem;
  8317. CMD_DUMP_MEM rCmdDumpMem;
  8318. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  8319. UINT_32 u4MemSize = PARAM_MEM_DUMP_MAX_SIZE;
  8320. UINT_32 u4RemainLeng = 0;
  8321. UINT_32 u4CurAddr = 0;
  8322. UINT_8 ucFragNum = 0;
  8323. prCmdDumpMem = &rCmdDumpMem;
  8324. prMemDumpInfo = (P_PARAM_CUSTOM_MEM_DUMP_STRUCT_T) pvQueryBuffer;
  8325. u4RemainLeng = prMemDumpInfo->u4RemainLength;
  8326. u4CurAddr = prMemDumpInfo->u4Address + prMemDumpInfo->u4Length;
  8327. ucFragNum = prMemDumpInfo->ucFragNum + 1;
  8328. /* Query. If request length is larger than max length, do it as ping pong.
  8329. * Send a command and wait for a event. Send next command while the event is received.
  8330. *
  8331. */
  8332. do {
  8333. UINT_32 u4CurLeng = 0;
  8334. if (u4RemainLeng > u4MemSize) {
  8335. u4CurLeng = u4MemSize;
  8336. u4RemainLeng -= u4MemSize;
  8337. } else {
  8338. u4CurLeng = u4RemainLeng;
  8339. u4RemainLeng = 0;
  8340. }
  8341. prCmdDumpMem->u4Address = u4CurAddr;
  8342. prCmdDumpMem->u4Length = u4CurLeng;
  8343. prCmdDumpMem->u4RemainLength = u4RemainLeng;
  8344. prCmdDumpMem->ucFragNum = ucFragNum;
  8345. DBGLOG(OID, TRACE, "[%d] 0x%X, len %u, remain len %u\n",
  8346. ucFragNum,
  8347. prCmdDumpMem->u4Address, prCmdDumpMem->u4Length, prCmdDumpMem->u4RemainLength);
  8348. rStatus = wlanSendSetQueryCmd(prAdapter,
  8349. CMD_ID_DUMP_MEM,
  8350. FALSE,
  8351. TRUE,
  8352. TRUE,
  8353. nicCmdEventQueryMemDump,
  8354. nicOidCmdTimeoutCommon,
  8355. sizeof(CMD_DUMP_MEM),
  8356. (PUINT_8) prCmdDumpMem, pvQueryBuffer, u4QueryBufferLen);
  8357. } while (FALSE);
  8358. return rStatus;
  8359. }
  8360. /*----------------------------------------------------------------------------*/
  8361. /*!
  8362. * \brief This routine is called to dump memory.
  8363. *
  8364. * \param[in] pvAdapter Pointer to the Adapter structure.
  8365. * \param[out] pvQueryBuf A pointer to the buffer that holds the result of
  8366. * the query.
  8367. * \param[in] u4QueryBufLen The length of the query buffer.
  8368. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  8369. * bytes written into the query buffer. If the call
  8370. * failed due to invalid length of the query buffer,
  8371. * returns the amount of storage needed.
  8372. *
  8373. * \retval WLAN_STATUS_SUCCESS
  8374. * \retval WLAN_STATUS_INVALID_LENGTH
  8375. */
  8376. /*----------------------------------------------------------------------------*/
  8377. WLAN_STATUS
  8378. wlanoidQueryMemDump(IN P_ADAPTER_T prAdapter,
  8379. IN PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8380. {
  8381. P_PARAM_CUSTOM_MEM_DUMP_STRUCT_T prMemDumpInfo;
  8382. DEBUGFUNC("wlanoidQueryMemDump");
  8383. DBGLOG(OID, LOUD, "\n");
  8384. ASSERT(prAdapter);
  8385. ASSERT(pu4QueryInfoLen);
  8386. if (u4QueryBufferLen)
  8387. ASSERT(pvQueryBuffer);
  8388. *pu4QueryInfoLen = sizeof(UINT_32);
  8389. prMemDumpInfo = (P_PARAM_CUSTOM_MEM_DUMP_STRUCT_T) pvQueryBuffer;
  8390. DBGLOG(OID, TRACE, "Dump 0x%X, len %u\n", prMemDumpInfo->u4Address, prMemDumpInfo->u4Length);
  8391. prMemDumpInfo->u4RemainLength = prMemDumpInfo->u4Length;
  8392. prMemDumpInfo->u4Length = 0;
  8393. prMemDumpInfo->ucFragNum = 0;
  8394. return wlanSendMemDumpCmd(prAdapter, pvQueryBuffer, u4QueryBufferLen);
  8395. } /* end of wlanoidQueryMcrRead() */
  8396. #if CFG_ENABLE_WIFI_DIRECT
  8397. /*----------------------------------------------------------------------------*/
  8398. /*!
  8399. * \brief This routine is used to set the p2p mode.
  8400. *
  8401. * \param[in] pvAdapter Pointer to the Adapter structure.
  8402. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8403. * \param[in] u4SetBufferLen The length of the set buffer.
  8404. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8405. * bytes read from the set buffer. If the call failed
  8406. * due to invalid length of the set buffer, returns
  8407. * the amount of storage needed.
  8408. *
  8409. * \retval WLAN_STATUS_SUCCESS
  8410. * \retval WLAN_STATUS_INVALID_LENGTH
  8411. */
  8412. /*----------------------------------------------------------------------------*/
  8413. WLAN_STATUS
  8414. wlanoidSetP2pMode(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8415. {
  8416. WLAN_STATUS status = WLAN_STATUS_SUCCESS;
  8417. P_PARAM_CUSTOM_P2P_SET_STRUCT_T prSetP2P = (P_PARAM_CUSTOM_P2P_SET_STRUCT_T) NULL;
  8418. /* P_MSG_P2P_NETDEV_REGISTER_T prP2pNetdevRegMsg = (P_MSG_P2P_NETDEV_REGISTER_T)NULL; */
  8419. DEBUGFUNC("wlanoidSetP2pMode");
  8420. ASSERT(prAdapter);
  8421. ASSERT(pu4SetInfoLen);
  8422. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_P2P_SET_STRUCT_T);
  8423. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_P2P_SET_STRUCT_T)) {
  8424. DBGLOG(OID, WARN, "Invalid length %u\n", u4SetBufferLen);
  8425. return WLAN_STATUS_INVALID_LENGTH;
  8426. }
  8427. prSetP2P = (P_PARAM_CUSTOM_P2P_SET_STRUCT_T) pvSetBuffer;
  8428. DBGLOG(P2P, INFO, "Set P2P enable %p [%u] mode[%u]\n", prSetP2P, prSetP2P->u4Enable, prSetP2P->u4Mode);
  8429. /*
  8430. * enable = 1, mode = 0 => init P2P network
  8431. * enable = 1, mode = 1 => init Soft AP network
  8432. * enable = 0 => uninit P2P/AP network
  8433. */
  8434. if (prSetP2P->u4Enable) {
  8435. p2pSetMode((prSetP2P->u4Mode == 1) ? TRUE : FALSE);
  8436. if (p2pLaunch(prAdapter->prGlueInfo))
  8437. ASSERT(prAdapter->fgIsP2PRegistered);
  8438. } else {
  8439. DBGLOG(P2P, TRACE, "prAdapter->fgIsP2PRegistered = %d\n", prAdapter->fgIsP2PRegistered);
  8440. if (prAdapter->fgIsP2PRegistered) {
  8441. DBGLOG(P2P, INFO, "p2pRemove\n");
  8442. p2pRemove(prAdapter->prGlueInfo);
  8443. }
  8444. }
  8445. #if 0
  8446. prP2pNetdevRegMsg = (P_MSG_P2P_NETDEV_REGISTER_T) cnmMemAlloc(prAdapter,
  8447. RAM_TYPE_MSG,
  8448. (sizeof(MSG_P2P_NETDEV_REGISTER_T)));
  8449. if (prP2pNetdevRegMsg == NULL) {
  8450. ASSERT(FALSE);
  8451. status = WLAN_STATUS_RESOURCES;
  8452. return status;
  8453. }
  8454. prP2pNetdevRegMsg->rMsgHdr.eMsgId = MID_MNY_P2P_NET_DEV_REGISTER;
  8455. prP2pNetdevRegMsg->fgIsEnable = (prSetP2P->u4Enable == 1) ? TRUE : FALSE;
  8456. prP2pNetdevRegMsg->ucMode = (UINT_8) prSetP2P->u4Mode;
  8457. mboxSendMsg(prAdapter, MBOX_ID_0, (P_MSG_HDR_T) prP2pNetdevRegMsg, MSG_SEND_METHOD_BUF);
  8458. #endif
  8459. return status;
  8460. }
  8461. #endif
  8462. #if CFG_SUPPORT_BUILD_DATE_CODE
  8463. /*----------------------------------------------------------------------------*/
  8464. /*!
  8465. * \brief This routine is used to query build date code information from firmware
  8466. *
  8467. * \param[in] pvAdapter Pointer to the Adapter structure.
  8468. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  8469. * the query.
  8470. * \param[in] u4QueryBufferLen The length of the query buffer.
  8471. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  8472. * bytes written into the query buffer. If the call
  8473. * failed due to invalid length of the query buffer,
  8474. * returns the amount of storage needed.
  8475. *
  8476. * \retval WLAN_STATUS_SUCCESS
  8477. * \retval WLAN_STATUS_INVALID_LENGTH
  8478. */
  8479. /*----------------------------------------------------------------------------*/
  8480. WLAN_STATUS
  8481. wlanoidQueryBuildDateCode(IN P_ADAPTER_T prAdapter,
  8482. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8483. {
  8484. CMD_GET_BUILD_DATE_CODE rCmdGetBuildDateCode;
  8485. DEBUGFUNC("wlanoidQueryBuildDateCode");
  8486. DBGLOG(OID, LOUD, "\n");
  8487. ASSERT(prAdapter);
  8488. ASSERT(pu4QueryInfoLen);
  8489. if (u4QueryBufferLen)
  8490. ASSERT(pvQueryBuffer);
  8491. *pu4QueryInfoLen = sizeof(UINT_8) * 16;
  8492. if (u4QueryBufferLen < sizeof(UINT_8) * 16)
  8493. return WLAN_STATUS_INVALID_LENGTH;
  8494. return wlanSendSetQueryCmd(prAdapter,
  8495. CMD_ID_GET_BUILD_DATE_CODE,
  8496. FALSE,
  8497. TRUE,
  8498. TRUE,
  8499. nicCmdEventBuildDateCode,
  8500. nicOidCmdTimeoutCommon,
  8501. sizeof(CMD_GET_BUILD_DATE_CODE),
  8502. (PUINT_8) &rCmdGetBuildDateCode, pvQueryBuffer, u4QueryBufferLen);
  8503. } /* end of wlanoidQueryBuildDateCode() */
  8504. #endif
  8505. /*----------------------------------------------------------------------------*/
  8506. /*!
  8507. * \brief This routine is used to query BSS info from firmware
  8508. *
  8509. * \param[in] pvAdapter Pointer to the Adapter structure.
  8510. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  8511. * the query.
  8512. * \param[in] u4QueryBufferLen The length of the query buffer.
  8513. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  8514. * bytes written into the query buffer. If the call
  8515. * failed due to invalid length of the query buffer,
  8516. * returns the amount of storage needed.
  8517. *
  8518. * \retval WLAN_STATUS_SUCCESS
  8519. * \retval WLAN_STATUS_INVALID_LENGTH
  8520. */
  8521. /*----------------------------------------------------------------------------*/
  8522. WLAN_STATUS
  8523. wlanoidQueryBSSInfo(IN P_ADAPTER_T prAdapter,
  8524. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8525. {
  8526. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  8527. EVENT_AIS_BSS_INFO_T rCmdBSSInfo;
  8528. ASSERT(prAdapter);
  8529. ASSERT(pu4QueryInfoLen);
  8530. if (u4QueryBufferLen)
  8531. ASSERT(pvQueryBuffer);
  8532. *pu4QueryInfoLen = sizeof(EVENT_AIS_BSS_INFO_T);
  8533. if (u4QueryBufferLen < sizeof(EVENT_AIS_BSS_INFO_T))
  8534. return WLAN_STATUS_INVALID_LENGTH;
  8535. kalMemZero(&rCmdBSSInfo, sizeof(EVENT_AIS_BSS_INFO_T));
  8536. /*
  8537. rStatus = wlanSendSetQueryCmd(prAdapter,
  8538. CMD_ID_GET_BSS_INFO,
  8539. FALSE,
  8540. TRUE,
  8541. TRUE,
  8542. nicCmdEventGetBSSInfo,
  8543. nicOidCmdTimeoutCommon,
  8544. sizeof(P_EVENT_AIS_BSS_INFO_T),
  8545. (PUINT_8) &rCmdBSSInfo, pvQueryBuffer, u4QueryBufferLen);
  8546. */
  8547. rStatus = wlanSendSetQueryCmd(prAdapter,
  8548. CMD_ID_GET_BSS_INFO,
  8549. FALSE,
  8550. TRUE,
  8551. TRUE,
  8552. nicCmdEventGetBSSInfo,
  8553. nicOidCmdTimeoutCommon,
  8554. sizeof(EVENT_AIS_BSS_INFO_T),
  8555. (PUINT_8) & rCmdBSSInfo, pvQueryBuffer, u4QueryBufferLen);
  8556. return rStatus;
  8557. } /* wlanoidSetWiFiWmmPsTest */
  8558. #if CFG_SUPPORT_BATCH_SCAN
  8559. #define CMD_WLS_BATCHING "WLS_BATCHING"
  8560. #define BATCHING_SET "SET"
  8561. #define BATCHING_GET "GET"
  8562. #define BATCHING_STOP "STOP"
  8563. #define PARAM_SCANFREQ "SCANFREQ"
  8564. #define PARAM_MSCAN "MSCAN"
  8565. #define PARAM_BESTN "BESTN"
  8566. #define PARAM_CHANNEL "CHANNEL"
  8567. #define PARAM_RTT "RTT"
  8568. WLAN_STATUS
  8569. batchSetCmd(IN P_ADAPTER_T prAdapter, IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4WritenLen)
  8570. {
  8571. P_CHANNEL_INFO_T prRfChannelInfo;
  8572. CMD_BATCH_REQ_T rCmdBatchReq;
  8573. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  8574. PCHAR head, p, p2;
  8575. UINT_32 tokens;
  8576. INT_32 scanfreq, mscan, bestn, rtt;
  8577. DBGLOG(SCN, TRACE, "[BATCH] command=%s, len=%u\n", (PCHAR) pvSetBuffer, (UINT_32) u4SetBufferLen);
  8578. if (!pu4WritenLen)
  8579. return -EINVAL;
  8580. *pu4WritenLen = 0;
  8581. if (u4SetBufferLen < kalStrLen(CMD_WLS_BATCHING)) {
  8582. DBGLOG(SCN, TRACE, "[BATCH] invalid len %u\n", (UINT_32) u4SetBufferLen);
  8583. return -EINVAL;
  8584. }
  8585. head = pvSetBuffer + kalStrLen(CMD_WLS_BATCHING) + 1;
  8586. kalMemSet(&rCmdBatchReq, 0, sizeof(CMD_BATCH_REQ_T));
  8587. if (!kalStrnCmp(head, BATCHING_SET, kalStrLen(BATCHING_SET))) {
  8588. DBGLOG(SCN, TRACE, "XXX Start Batch Scan XXX\n");
  8589. head += kalStrLen(BATCHING_SET) + 1;
  8590. /* SCANFREQ, MSCAN, BESTN */
  8591. tokens = kalSScanf(head, "SCANFREQ=%d MSCAN=%d BESTN=%d", &scanfreq, &mscan, &bestn);
  8592. if (tokens != 3) {
  8593. DBGLOG(SCN, TRACE, "[BATCH] Parse fail: tokens=%u, SCANFREQ=%d MSCAN=%d BESTN=%d\n",
  8594. (UINT_32) tokens, scanfreq, mscan, bestn);
  8595. return -EINVAL;
  8596. }
  8597. /* RTT */
  8598. p = kalStrStr(head, PARAM_RTT);
  8599. if (!p) {
  8600. DBGLOG(SCN, TRACE, "[BATCH] Parse RTT fail. head=%s\n", head);
  8601. return -EINVAL;
  8602. }
  8603. tokens = kalSScanf(p, "RTT=%d", &rtt);
  8604. if (tokens != 1) {
  8605. DBGLOG(SCN, TRACE, "[BATCH] Parse fail: tokens=%u, rtt=%d\n", (UINT_32) tokens, rtt);
  8606. return -EINVAL;
  8607. }
  8608. /* CHANNEL */
  8609. p = kalStrStr(head, PARAM_CHANNEL);
  8610. if (!p) {
  8611. DBGLOG(SCN, TRACE, "[BATCH] Parse CHANNEL fail(1)\n");
  8612. return -EINVAL;
  8613. }
  8614. head = p;
  8615. p = kalStrChr(head, '>');
  8616. if (!p) {
  8617. DBGLOG(SCN, TRACE, "[BATCH] Parse CHANNEL fail(2)\n");
  8618. return -EINVAL;
  8619. }
  8620. /* else {
  8621. *p = '.'; // remove '>' because sscanf can not parse <%s>
  8622. }*/
  8623. /*tokens = kalSScanf(head, "CHANNEL=<%s", c_channel);
  8624. if (tokens != 1) {
  8625. DBGLOG(SCN, TRACE, ("[BATCH] Parse fail: tokens=%d, CHANNEL=<%s>\n",
  8626. tokens, c_channel));
  8627. return -EINVAL;
  8628. } */
  8629. rCmdBatchReq.ucChannelType = SCAN_CHANNEL_SPECIFIED;
  8630. rCmdBatchReq.ucChannelListNum = 0;
  8631. prRfChannelInfo = &rCmdBatchReq.arChannelList[0];
  8632. p = head + kalStrLen(PARAM_CHANNEL) + 2; /* c_channel; */
  8633. while ((p2 = kalStrSep((char **)&p, ",")) != NULL) {
  8634. if (p2 == NULL || *p2 == 0)
  8635. break;
  8636. if (*p2 == '\0')
  8637. continue;
  8638. if (*p2 == 'A') {
  8639. rCmdBatchReq.ucChannelType =
  8640. rCmdBatchReq.ucChannelType ==
  8641. SCAN_CHANNEL_2G4 ? SCAN_CHANNEL_FULL : SCAN_CHANNEL_5G;
  8642. } else if (*p2 == 'B') {
  8643. rCmdBatchReq.ucChannelType =
  8644. rCmdBatchReq.ucChannelType ==
  8645. SCAN_CHANNEL_5G ? SCAN_CHANNEL_FULL : SCAN_CHANNEL_2G4;
  8646. } else {
  8647. /* Translate Freq from MHz to channel number. */
  8648. prRfChannelInfo->ucChannelNum = kalStrtol(p2, NULL, 0);
  8649. DBGLOG(SCN, TRACE, "Scanning Channel:%u, freq: %d\n",
  8650. (UINT_32) prRfChannelInfo->ucChannelNum,
  8651. (UINT_32) nicChannelNum2Freq(prRfChannelInfo->ucChannelNum));
  8652. prRfChannelInfo->ucBand = prRfChannelInfo->ucChannelNum < 15 ? BAND_2G4 : BAND_5G;
  8653. rCmdBatchReq.ucChannelListNum++;
  8654. if (rCmdBatchReq.ucChannelListNum >= 32)
  8655. break;
  8656. prRfChannelInfo++;
  8657. }
  8658. }
  8659. /* set channel for test */
  8660. #if 0
  8661. rCmdBatchReq.ucChannelType = 4; /* SCAN_CHANNEL_SPECIFIED; */
  8662. rCmdBatchReq.ucChannelListNum = 0;
  8663. prRfChannelInfo = &rCmdBatchReq.arChannelList[0];
  8664. for (i = 1; i <= 14; i++) {
  8665. /* filter out some */
  8666. if (i == 1 || i == 5 || i == 11)
  8667. continue;
  8668. /* Translate Freq from MHz to channel number. */
  8669. prRfChannelInfo->ucChannelNum = i;
  8670. DBGLOG(SCN, TRACE, "Scanning Channel:%d, freq: %d\n",
  8671. prRfChannelInfo->ucChannelNum,
  8672. nicChannelNum2Freq(prRfChannelInfo->ucChannelNum));
  8673. prRfChannelInfo->ucBand = BAND_2G4;
  8674. rCmdBatchReq.ucChannelListNum++;
  8675. prRfChannelInfo++;
  8676. }
  8677. #endif
  8678. #if 0
  8679. rCmdBatchReq.ucChannelType = 0; /* SCAN_CHANNEL_FULL; */
  8680. #endif
  8681. rCmdBatchReq.u4Scanfreq = scanfreq;
  8682. rCmdBatchReq.ucMScan = mscan > CFG_BATCH_MAX_MSCAN ? CFG_BATCH_MAX_MSCAN : mscan;
  8683. rCmdBatchReq.ucBestn = bestn;
  8684. rCmdBatchReq.ucRtt = rtt;
  8685. DBGLOG(SCN, TRACE, "[BATCH] SCANFREQ=%u MSCAN=%u BESTN=%u RTT=%u\n",
  8686. (UINT_32) rCmdBatchReq.u4Scanfreq,
  8687. (UINT_32) rCmdBatchReq.ucMScan,
  8688. (UINT_32) rCmdBatchReq.ucBestn, (UINT_32) rCmdBatchReq.ucRtt;
  8689. if (rCmdBatchReq.ucChannelType != SCAN_CHANNEL_SPECIFIED) {
  8690. DBGLOG(SCN, TRACE, "[BATCH] CHANNELS = %s\n",
  8691. rCmdBatchReq.ucChannelType == SCAN_CHANNEL_FULL ? "FULL" :
  8692. rCmdBatchReq.ucChannelType == SCAN_CHANNEL_2G4 ? "2.4G all" : "5G all");
  8693. } else {
  8694. DBGLOG(SCN, TRACE, "[BATCH] CHANNEL list\n");
  8695. prRfChannelInfo = &rCmdBatchReq.arChannelList[0];
  8696. for (tokens = 0; tokens < rCmdBatchReq.ucChannelListNum; tokens++) {
  8697. DBGLOG(SCN, TRACE, "[BATCH] %s, %d\n",
  8698. prRfChannelInfo->ucBand == BAND_2G4 ? "2.4G" : "5G",
  8699. prRfChannelInfo->ucChannelNum);
  8700. prRfChannelInfo++;
  8701. }
  8702. }
  8703. rCmdBatchReq.ucSeqNum = 1;
  8704. rCmdBatchReq.ucNetTypeIndex = NETWORK_TYPE_AIS_INDEX;
  8705. rCmdBatchReq.ucCmd = SCAN_BATCH_REQ_START;
  8706. *pu4WritenLen = kalSnprintf(pvSetBuffer, 3, "%d", rCmdBatchReq.ucMScan);
  8707. } else if (!kalStrnCmp(head, BATCHING_STOP, kalStrLen(BATCHING_STOP))) {
  8708. DBGLOG(SCN, TRACE, "XXX Stop Batch Scan XXX\n");
  8709. rCmdBatchReq.ucSeqNum = 1;
  8710. rCmdBatchReq.ucNetTypeIndex = NETWORK_TYPE_AIS_INDEX;
  8711. rCmdBatchReq.ucCmd = SCAN_BATCH_REQ_STOP;
  8712. } else {
  8713. return -EINVAL;
  8714. }
  8715. wlanSendSetQueryCmd(prAdapter,
  8716. CMD_ID_SET_BATCH_REQ,
  8717. TRUE, FALSE, TRUE, NULL, NULL, sizeof(CMD_BATCH_REQ_T), (PUINT_8) &rCmdBatchReq, NULL, 0);
  8718. /* kalMemSet(pvSetBuffer, 0, u4SetBufferLen); */
  8719. /* rStatus = kalSnprintf(pvSetBuffer, 2, "%s", "OK"); */
  8720. return rStatus;
  8721. }
  8722. WLAN_STATUS
  8723. batchGetCmd(IN P_ADAPTER_T prAdapter,
  8724. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8725. {
  8726. CMD_BATCH_REQ_T rCmdBatchReq;
  8727. WLAN_STATUS rStatus = WLAN_STATUS_SUCCESS;
  8728. P_EVENT_BATCH_RESULT_T prEventBatchResult;
  8729. ASSERT(prAdapter);
  8730. ASSERT(pu4QueryInfoLen);
  8731. if (u4QueryBufferLen)
  8732. ASSERT(pvQueryBuffer);
  8733. prEventBatchResult = (P_EVENT_BATCH_RESULT_T) pvQueryBuffer;
  8734. DBGLOG(SCN, TRACE, "XXX Get Batch Scan Result (%u) XXX\n", (UINT_32) prEventBatchResult->ucScanCount);
  8735. *pu4QueryInfoLen = sizeof(EVENT_BATCH_RESULT_T);
  8736. rCmdBatchReq.ucSeqNum = 2;
  8737. rCmdBatchReq.ucCmd = SCAN_BATCH_REQ_RESULT;
  8738. rCmdBatchReq.ucMScan = prEventBatchResult->ucScanCount; /* Get which round result */
  8739. rStatus = wlanSendSetQueryCmd(prAdapter,
  8740. CMD_ID_SET_BATCH_REQ,
  8741. FALSE,
  8742. TRUE,
  8743. TRUE,
  8744. nicCmdEventBatchScanResult,
  8745. nicOidCmdTimeoutCommon,
  8746. sizeof(CMD_BATCH_REQ_T),
  8747. (PUINT_8) &rCmdBatchReq, (PVOID) pvQueryBuffer, u4QueryBufferLen);
  8748. return rStatus;
  8749. }
  8750. /*----------------------------------------------------------------------------*/
  8751. /*!
  8752. * \brief
  8753. *
  8754. * \param[in] prAdapter Pointer to the Adapter structure
  8755. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  8756. * \param[in] u4SetBufferLen The length of the set buffer
  8757. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8758. * bytes read from the set buffer. If the call failed due to invalid length of
  8759. * the set buffer, returns the amount of storage needed.
  8760. *
  8761. * \retval WLAN_STATUS_SUCCESS
  8762. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  8763. * \retval WLAN_STATUS_INVALID_LENGTH
  8764. *
  8765. */
  8766. /*----------------------------------------------------------------------------*/
  8767. WLAN_STATUS
  8768. wlanoidSetBatchScanReq(IN P_ADAPTER_T prAdapter,
  8769. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8770. {
  8771. return batchSetCmd(prAdapter, pvSetBuffer, u4SetBufferLen, pu4SetInfoLen);
  8772. }
  8773. /*----------------------------------------------------------------------------*/
  8774. /*!
  8775. * \brief
  8776. *
  8777. * \param[in] pvAdapter Pointer to the Adapter structure.
  8778. * \param[out] pvQueryBuffer A pointer to the buffer that holds the result of
  8779. * the query.
  8780. * \param[in] u4QueryBufferLen The length of the query buffer.
  8781. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  8782. * bytes written into the query buffer. If the call
  8783. * failed due to invalid length of the query buffer,
  8784. * returns the amount of storage needed.
  8785. *
  8786. * \retval WLAN_STATUS_SUCCESS
  8787. * \retval WLAN_STATUS_INVALID_LENGTH
  8788. */
  8789. /*----------------------------------------------------------------------------*/
  8790. WLAN_STATUS
  8791. wlanoidQueryBatchScanResult(IN P_ADAPTER_T prAdapter,
  8792. OUT PVOID pvQueryBuffer, IN UINT_32 u4QueryBufferLen, OUT PUINT_32 pu4QueryInfoLen)
  8793. {
  8794. return batchGetCmd(prAdapter, pvQueryBuffer, u4QueryBufferLen, pu4QueryInfoLen);
  8795. } /* end of wlanoidQueryBatchScanResult() */
  8796. #endif /* CFG_SUPPORT_BATCH_SCAN */
  8797. /*----------------------------------------------------------------------------*/
  8798. /*!
  8799. * \brief This routine is called to request starting of schedule scan
  8800. *
  8801. * \param[in] prAdapter Pointer to the Adapter structure.
  8802. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8803. * \param[in] u4SetBufferLen The length of the set buffer.
  8804. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8805. * bytes read from the set buffer. If the call failed
  8806. * due to invalid length of the set buffer, returns
  8807. * the amount of storage needed.
  8808. *
  8809. * \retval WLAN_STATUS_SUCCESS
  8810. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  8811. * \retval WLAN_STATUS_INVALID_LENGTH
  8812. * \retval WLAN_STATUS_INVALID_DATA
  8813. *
  8814. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  8815. */
  8816. /*----------------------------------------------------------------------------*/
  8817. WLAN_STATUS
  8818. wlanoidSetStartSchedScan(IN P_ADAPTER_T prAdapter,
  8819. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8820. {
  8821. P_PARAM_SCHED_SCAN_REQUEST prSchedScanRequest;
  8822. DEBUGFUNC("wlanoidSetStartSchedScan()");
  8823. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8824. DBGLOG(SCN, WARN, "Fail in set scheduled scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  8825. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8826. return WLAN_STATUS_ADAPTER_NOT_READY;
  8827. }
  8828. ASSERT(pu4SetInfoLen);
  8829. *pu4SetInfoLen = 0;
  8830. if (u4SetBufferLen != sizeof(PARAM_SCHED_SCAN_REQUEST)) {
  8831. return WLAN_STATUS_INVALID_LENGTH;
  8832. } else if (pvSetBuffer == NULL) {
  8833. return WLAN_STATUS_INVALID_DATA;
  8834. } else if (kalGetMediaStateIndicated(prAdapter->prGlueInfo) == PARAM_MEDIA_STATE_CONNECTED &&
  8835. prAdapter->fgEnOnlineScan == FALSE) {
  8836. return WLAN_STATUS_FAILURE;
  8837. }
  8838. if (prAdapter->fgIsRadioOff) {
  8839. DBGLOG(SCN, WARN, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  8840. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8841. return WLAN_STATUS_SUCCESS;
  8842. }
  8843. prSchedScanRequest = (P_PARAM_SCHED_SCAN_REQUEST) pvSetBuffer;
  8844. if (scnFsmSchedScanRequest(prAdapter,
  8845. (UINT_8) (prSchedScanRequest->u4SsidNum),
  8846. prSchedScanRequest->arSsid,
  8847. prSchedScanRequest->u4IELength,
  8848. prSchedScanRequest->pucIE, prSchedScanRequest->u2ScanInterval) == TRUE) {
  8849. return WLAN_STATUS_SUCCESS;
  8850. } else {
  8851. return WLAN_STATUS_FAILURE;
  8852. }
  8853. }
  8854. /*----------------------------------------------------------------------------*/
  8855. /*!
  8856. * \brief This routine is called to request termination of schedule scan
  8857. *
  8858. * \param[in] prAdapter Pointer to the Adapter structure.
  8859. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8860. * \param[in] u4SetBufferLen The length of the set buffer.
  8861. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8862. * bytes read from the set buffer. If the call failed
  8863. * due to invalid length of the set buffer, returns
  8864. * the amount of storage needed.
  8865. *
  8866. * \retval WLAN_STATUS_SUCCESS
  8867. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  8868. * \retval WLAN_STATUS_INVALID_LENGTH
  8869. * \retval WLAN_STATUS_INVALID_DATA
  8870. *
  8871. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  8872. */
  8873. /*----------------------------------------------------------------------------*/
  8874. WLAN_STATUS
  8875. wlanoidSetStopSchedScan(IN P_ADAPTER_T prAdapter,
  8876. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8877. {
  8878. ASSERT(prAdapter);
  8879. /* ask SCN module to stop scan request */
  8880. if (scnFsmSchedScanStopRequest(prAdapter) == TRUE)
  8881. return WLAN_STATUS_SUCCESS;
  8882. else
  8883. return WLAN_STATUS_FAILURE;
  8884. }
  8885. /*----------------------------------------------------------------------------*/
  8886. /*!
  8887. * \brief This routine is called to set a periodically scan action
  8888. *
  8889. * \param[in] prAdapter Pointer to the Adapter structure.
  8890. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8891. * \param[in] u4SetBufferLen The length of the set buffer.
  8892. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8893. * bytes read from the set buffer. If the call failed
  8894. * due to invalid length of the set buffer, returns
  8895. * the amount of storage needed.
  8896. *
  8897. * \retval WLAN_STATUS_SUCCESS
  8898. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  8899. * \retval WLAN_STATUS_INVALID_LENGTH
  8900. * \retval WLAN_STATUS_INVALID_DATA
  8901. *
  8902. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  8903. */
  8904. /*----------------------------------------------------------------------------*/
  8905. WLAN_STATUS
  8906. wlanoidSetGSCNAction(IN P_ADAPTER_T prAdapter,
  8907. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8908. {
  8909. P_CMD_SET_PSCAN_ENABLE prCmdPscnAction;
  8910. P_SCAN_INFO_T prScanInfo;
  8911. prScanInfo = &(prAdapter->rWifiVar.rScanInfo);
  8912. DBGLOG(SCN, TRACE, "wlanoidSetGSCNAction\n");
  8913. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8914. DBGLOG(SCN, WARN, "Fail in set Periodically Scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  8915. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8916. return WLAN_STATUS_ADAPTER_NOT_READY;
  8917. }
  8918. if (u4SetBufferLen != sizeof(CMD_SET_PSCAN_ENABLE))
  8919. return WLAN_STATUS_INVALID_LENGTH;
  8920. else if (pvSetBuffer == NULL)
  8921. return WLAN_STATUS_INVALID_DATA;
  8922. if (prAdapter->fgIsRadioOff) {
  8923. DBGLOG(SCN, WARN, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  8924. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8925. return WLAN_STATUS_SUCCESS;
  8926. }
  8927. prCmdPscnAction = (P_CMD_SET_PSCAN_ENABLE) pvSetBuffer;
  8928. if (prCmdPscnAction->ucPscanAct == ENABLE) {
  8929. #if 0
  8930. DBGLOG(OID, INFO, "set PCSN ENABLE\n");
  8931. if (scnFsmPSCNAction(prAdapter, (UINT_8) (prCmdPscnAction->ucPscanAct)) == TRUE) {
  8932. DBGLOG(OID, INFO, "wlanoidSetGSCNAction < ---\n");
  8933. return WLAN_STATUS_PENDING;
  8934. }
  8935. DBGLOG(OID, INFO, "wlanoidSetGSCNAction < ---\n");
  8936. return WLAN_STATUS_FAILURE;
  8937. #endif
  8938. scnPSCNFsm(prAdapter, PSCN_SCANNING, NULL, NULL, NULL, NULL, FALSE, FALSE, FALSE, TRUE);
  8939. } else if (prCmdPscnAction->ucPscanAct == DISABLE) {
  8940. #if 0
  8941. DBGLOG(OID, INFO, "disable PCSN\n");
  8942. scnFsmPSCNAction(prAdapter, (UINT_8) DISABLE);
  8943. DBGLOG(OID, TRACE, "set new PCSN\n");
  8944. scnCombineParamsIntoPSCN(prAdapter, NULL, NULL, NULL, NULL, FALSE, FALSE, TRUE);
  8945. DBGLOG(OID, INFO, "ENABLE or disable PCSN\n");
  8946. if (!prScanInfo->fgPscnOnnning) {
  8947. DBGLOG(OID, INFO, "ENABLE PCSN\n");
  8948. scnFsmPSCNAction(prAdapter, ENABLE);
  8949. } else {
  8950. DBGLOG(OID, INFO, "All PCSN is disabled...\n");
  8951. }
  8952. #endif
  8953. scnPSCNFsm(prAdapter, PSCN_RESET, NULL, NULL, NULL, NULL, FALSE, FALSE, TRUE, FALSE);
  8954. }
  8955. return WLAN_STATUS_SUCCESS;
  8956. }
  8957. /*----------------------------------------------------------------------------*/
  8958. /*!
  8959. * \brief This routine is called to set a periodically scan action
  8960. *
  8961. * \param[in] prAdapter Pointer to the Adapter structure.
  8962. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  8963. * \param[in] u4SetBufferLen The length of the set buffer.
  8964. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  8965. * bytes read from the set buffer. If the call failed
  8966. * due to invalid length of the set buffer, returns
  8967. * the amount of storage needed.
  8968. *
  8969. * \retval WLAN_STATUS_SUCCESS
  8970. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  8971. * \retval WLAN_STATUS_INVALID_LENGTH
  8972. * \retval WLAN_STATUS_INVALID_DATA
  8973. *
  8974. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  8975. */
  8976. /*----------------------------------------------------------------------------*/
  8977. WLAN_STATUS
  8978. wlanoidSetGSCNAParam(IN P_ADAPTER_T prAdapter,
  8979. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  8980. {
  8981. P_PARAM_WIFI_GSCAN_CMD_PARAMS prCmdGscnParam;
  8982. /*UINT_8 i, j = 0;*/
  8983. DBGLOG(SCN, INFO, "wlanoidSetGSCNAParam v1\n");
  8984. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  8985. DBGLOG(SCN, WARN, "Fail in set Periodically Scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  8986. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8987. return WLAN_STATUS_ADAPTER_NOT_READY;
  8988. }
  8989. if (u4SetBufferLen != sizeof(PARAM_WIFI_GSCAN_CMD_PARAMS)) {
  8990. DBGLOG(SCN, WARN, "(u4SetBufferLen != sizeof(P_PARAM_WIFI_GSCAN_CMD_PARAMS))\n");
  8991. return WLAN_STATUS_INVALID_LENGTH;
  8992. } else if (pvSetBuffer == NULL) {
  8993. DBGLOG(SCN, WARN, "(pvSetBuffer == NULL)\n");
  8994. return WLAN_STATUS_INVALID_DATA;
  8995. }
  8996. if (prAdapter->fgIsRadioOff) {
  8997. DBGLOG(SCN, INFO, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  8998. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  8999. return WLAN_STATUS_SUCCESS;
  9000. }
  9001. prCmdGscnParam = (P_PARAM_WIFI_GSCAN_CMD_PARAMS) pvSetBuffer;
  9002. /* KC-XXX memcpy(prCmdGscnParam, */
  9003. /* (P_PARAM_WIFI_GSCAN_CMD_PARAMS)pvSetBuffer, */
  9004. /* sizeof(PARAM_WIFI_GSCAN_CMD_PARAMS) ); */
  9005. DBGLOG(SCN, INFO,
  9006. "prCmdGscnParam : base_period[%u], max_ap_per_scan[%u] num_buckets[%u], report_threshold[%u]\n",
  9007. prCmdGscnParam->base_period, prCmdGscnParam->max_ap_per_scan, prCmdGscnParam->num_buckets,
  9008. prCmdGscnParam->report_threshold);
  9009. #if 0
  9010. for (i = 0; i < prCmdGscnParam->num_buckets; i++) {
  9011. DBGLOG(OID, INFO,
  9012. "prCmdGscnParam->buckets : band[%u], bucket[%u] num_buckets[%u], period[%u] report_events[%u]\n",
  9013. prCmdGscnParam->buckets[i].band, prCmdGscnParam->buckets[i].bucket,
  9014. prCmdGscnParam->buckets[i].num_channels, prCmdGscnParam->buckets[i].period,
  9015. prCmdGscnParam->buckets[i].report_events));
  9016. DBGLOG(OID, INFO, "prCmdGscnParam->buckets[%d] has channel: ", i);
  9017. for (j = 0; j < prCmdGscnParam->buckets[i].num_channels; j++)
  9018. DBGLOG(OID, INFO, " %d, ", prCmdGscnParam->buckets[i].channels[j].channel);
  9019. DBGLOG(OID, INFO, "\n");
  9020. }
  9021. #endif
  9022. if (scnSetGSCNParam(prAdapter, prCmdGscnParam) == TRUE) {
  9023. DBGLOG(SCN, INFO, "wlanoidSetGSCNAParam --->scnSetGSCNParam\n");
  9024. return WLAN_STATUS_PENDING;
  9025. } else {
  9026. return WLAN_STATUS_FAILURE;
  9027. }
  9028. }
  9029. /*----------------------------------------------------------------------------*/
  9030. /*!
  9031. * \brief This routine is called to set configure gscan PARAMs
  9032. *
  9033. * \param[in] prAdapter Pointer to the Adapter structure.
  9034. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  9035. * \param[in] u4SetBufferLen The length of the set buffer.
  9036. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9037. * bytes read from the set buffer. If the call failed
  9038. * due to invalid length of the set buffer, returns
  9039. * the amount of storage needed.
  9040. *
  9041. * \retval WLAN_STATUS_SUCCESS
  9042. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  9043. * \retval WLAN_STATUS_INVALID_LENGTH
  9044. * \retval WLAN_STATUS_INVALID_DATA
  9045. *
  9046. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  9047. */
  9048. /*----------------------------------------------------------------------------*/
  9049. WLAN_STATUS
  9050. wlanoidSetGSCNAConfig(IN P_ADAPTER_T prAdapter,
  9051. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9052. {
  9053. P_PARAM_WIFI_GSCAN_CMD_PARAMS prCmdGscnScnConfigParam;
  9054. CMD_GSCN_SCN_COFIG_T rCmdGscnScnConfig;
  9055. DBGLOG(SCN, INFO, "wlanoidSetGSCNAConfig v1\n");
  9056. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  9057. DBGLOG(SCN, WARN, "Fail in set Periodically Scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  9058. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  9059. return WLAN_STATUS_ADAPTER_NOT_READY;
  9060. }
  9061. if (u4SetBufferLen != sizeof(PARAM_WIFI_GSCAN_CMD_PARAMS)) {
  9062. DBGLOG(SCN, WARN, "(u4SetBufferLen != sizeof(CMD_GSCN_SCN_COFIG_T))\n");
  9063. return WLAN_STATUS_INVALID_LENGTH;
  9064. } else if (pvSetBuffer == NULL) {
  9065. DBGLOG(SCN, WARN, "(pvSetBuffer == NULL)\n");
  9066. return WLAN_STATUS_INVALID_DATA;
  9067. }
  9068. if (prAdapter->fgIsRadioOff) {
  9069. DBGLOG(SCN, INFO, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  9070. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  9071. return WLAN_STATUS_SUCCESS;
  9072. }
  9073. DBGLOG(SCN, INFO, "prCmdGscnScnConfigParam = (P_PARAM_WIFI_GSCAN_CMD_PARAMS)pvSetBuffer\n");
  9074. prCmdGscnScnConfigParam = (P_PARAM_WIFI_GSCAN_CMD_PARAMS) pvSetBuffer;
  9075. memcpy(prCmdGscnScnConfigParam, (P_PARAM_WIFI_GSCAN_CMD_PARAMS) pvSetBuffer,
  9076. sizeof(PARAM_WIFI_GSCAN_CMD_PARAMS));
  9077. DBGLOG(SCN, INFO, "prCmdGscnScnConfigParam assign prCmdGscnScnConfig\n");
  9078. rCmdGscnScnConfig.u4BufferThreshold = prCmdGscnScnConfigParam->report_threshold;
  9079. rCmdGscnScnConfig.ucNumApPerScn = prCmdGscnScnConfigParam->max_ap_per_scan;
  9080. rCmdGscnScnConfig.u4NumScnToCache = prCmdGscnScnConfigParam->num_scans;
  9081. DBGLOG(SCN, INFO, " report_threshold %d report_threshold %d num_scans %d\n",
  9082. rCmdGscnScnConfig.u4BufferThreshold,
  9083. rCmdGscnScnConfig.ucNumApPerScn, rCmdGscnScnConfig.u4NumScnToCache);
  9084. if (scnFsmSetGSCNConfig(prAdapter, &rCmdGscnScnConfig) == TRUE) {
  9085. DBGLOG(SCN, INFO, "wlanoidSetGSCNAParam --->scnSetGSCNParam\n");
  9086. return WLAN_STATUS_PENDING;
  9087. } else {
  9088. return WLAN_STATUS_FAILURE;
  9089. }
  9090. }
  9091. /*----------------------------------------------------------------------------*/
  9092. /*!
  9093. * \brief This routine is called to get a gscan result
  9094. *
  9095. * \param[in] prAdapter Pointer to the Adapter structure.
  9096. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  9097. * \param[in] u4SetBufferLen The length of the set buffer.
  9098. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9099. * bytes read from the set buffer. If the call failed
  9100. * due to invalid length of the set buffer, returns
  9101. * the amount of storage needed.
  9102. *
  9103. * \retval WLAN_STATUS_SUCCESS
  9104. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  9105. * \retval WLAN_STATUS_INVALID_LENGTH
  9106. * \retval WLAN_STATUS_INVALID_DATA
  9107. *
  9108. * \note The setting buffer PARAM_SCHED_SCAN_REQUEST_EXT_T
  9109. */
  9110. /*----------------------------------------------------------------------------*/
  9111. WLAN_STATUS
  9112. wlanoidGetGSCNResult(IN P_ADAPTER_T prAdapter,
  9113. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9114. {
  9115. P_PARAM_WIFI_GSCAN_GET_RESULT_PARAMS prGetGscnScnResultParm;
  9116. CMD_GET_GSCAN_RESULT_T rGetGscnScnResultCmd;
  9117. DEBUGFUNC("wlanoidGetGSCNResult()");
  9118. DBGLOG(SCN, INFO, "wlanoidGetGSCNResult v1\n");
  9119. if (prAdapter->rAcpiState == ACPI_STATE_D3) {
  9120. DBGLOG(SCN, WARN, "Fail in set Periodically Scan! (Adapter not ready). ACPI=D%d, Radio=%d\n",
  9121. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  9122. return WLAN_STATUS_ADAPTER_NOT_READY;
  9123. }
  9124. if (u4SetBufferLen != sizeof(PARAM_WIFI_GSCAN_GET_RESULT_PARAMS)) {
  9125. DBGLOG(SCN, WARN, "(u4SetBufferLen != sizeof(CMD_GSCN_SCN_COFIG_T))\n");
  9126. return WLAN_STATUS_INVALID_LENGTH;
  9127. } else if (pvSetBuffer == NULL) {
  9128. DBGLOG(SCN, WARN, "(pvSetBuffer == NULL)\n");
  9129. return WLAN_STATUS_INVALID_DATA;
  9130. }
  9131. if (prAdapter->fgIsRadioOff) {
  9132. DBGLOG(SCN, INFO, "Return from BSSID list scan! (radio off). ACPI=D%d, Radio=%d\n",
  9133. prAdapter->rAcpiState, prAdapter->fgIsRadioOff);
  9134. return WLAN_STATUS_SUCCESS;
  9135. }
  9136. prGetGscnScnResultParm = (P_PARAM_WIFI_GSCAN_GET_RESULT_PARAMS) pvSetBuffer;
  9137. /* memcpy(&rGetGscnScnResultCmd, prGetGscnScnResultParm, sizeof(PARAM_WIFI_GSCAN_GET_RESULT_PARAMS) ); */
  9138. rGetGscnScnResultCmd.u4Num = prGetGscnScnResultParm->get_num;
  9139. rGetGscnScnResultCmd.ucFlush = prGetGscnScnResultParm->flush;
  9140. rGetGscnScnResultCmd.ucVersion = PSCAN_VERSION;
  9141. kalMemZero(rGetGscnScnResultCmd.aucReserved, sizeof(rGetGscnScnResultCmd.aucReserved));
  9142. if (scnFsmGetGSCNResult(prAdapter, &rGetGscnScnResultCmd) == TRUE) {
  9143. DBGLOG(SCN, INFO, "wlanoidGetGSCNResult --->scnFsmGetGSCNResult\n");
  9144. return WLAN_STATUS_PENDING;
  9145. } else {
  9146. return WLAN_STATUS_FAILURE;
  9147. }
  9148. }
  9149. #if CFG_SUPPORT_HOTSPOT_2_0
  9150. /*----------------------------------------------------------------------------*/
  9151. /*!
  9152. * \brief This routine is called by HS2.0 to set the assoc info, which is needed to add to
  9153. * Association request frame while join HS2.0 AP.
  9154. *
  9155. * \param[in] prAdapter Pointer to the Adapter structure
  9156. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  9157. * \param[in] u4SetBufferLen The length of the set buffer
  9158. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9159. * bytes read from the set buffer. If the call failed due to invalid length of
  9160. * the set buffer, returns the amount of storage needed.
  9161. *
  9162. * \retval WLAN_STATUS_SUCCESS
  9163. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  9164. * \retval WLAN_STATUS_INVALID_LENGTH
  9165. *
  9166. */
  9167. /*----------------------------------------------------------------------------*/
  9168. WLAN_STATUS
  9169. wlanoidSetHS20Info(IN P_ADAPTER_T prAdapter,
  9170. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9171. {
  9172. P_IE_HS20_INDICATION_T prHS20IndicationIe;
  9173. ASSERT(prAdapter);
  9174. ASSERT(pvSetBuffer);
  9175. ASSERT(pu4SetInfoLen);
  9176. DEBUGFUNC("wlanoidSetHS20AssocInfo");
  9177. DBGLOG(OID, LOUD, "\r\n");
  9178. if (u4SetBufferLen == 0)
  9179. return WLAN_STATUS_INVALID_LENGTH;
  9180. *pu4SetInfoLen = u4SetBufferLen;
  9181. prHS20IndicationIe = (P_IE_HS20_INDICATION_T) pvSetBuffer;
  9182. prAdapter->prGlueInfo->ucHotspotConfig = prHS20IndicationIe->ucHotspotConfig;
  9183. prAdapter->prGlueInfo->fgConnectHS20AP = TRUE;
  9184. DBGLOG(SEC, TRACE, "HS20 IE sz %u\n", u4SetBufferLen);
  9185. kalMemCopy(prAdapter->prGlueInfo->aucHS20AssocInfoIE, pvSetBuffer, u4SetBufferLen);
  9186. prAdapter->prGlueInfo->u2HS20AssocInfoIELen = (UINT_16) u4SetBufferLen;
  9187. DBGLOG(SEC, TRACE, "HS20 Assoc Info IE sz %u\n", u4SetBufferLen);
  9188. return WLAN_STATUS_SUCCESS;
  9189. }
  9190. /*----------------------------------------------------------------------------*/
  9191. /*!
  9192. * \brief This routine is called by WSC to set the assoc info, which is needed to add to
  9193. * Association request frame while join WPS AP.
  9194. *
  9195. * \param[in] prAdapter Pointer to the Adapter structure
  9196. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  9197. * \param[in] u4SetBufferLen The length of the set buffer
  9198. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9199. * bytes read from the set buffer. If the call failed due to invalid length of
  9200. * the set buffer, returns the amount of storage needed.
  9201. *
  9202. * \retval WLAN_STATUS_SUCCESS
  9203. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  9204. * \retval WLAN_STATUS_INVALID_LENGTH
  9205. *
  9206. */
  9207. /*----------------------------------------------------------------------------*/
  9208. WLAN_STATUS
  9209. wlanoidSetInterworkingInfo(IN P_ADAPTER_T prAdapter,
  9210. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9211. {
  9212. #if 0
  9213. P_HS20_INFO_T prHS20Info = NULL;
  9214. P_IE_INTERWORKING_T prInterWorkingIe;
  9215. ASSERT(prAdapter);
  9216. ASSERT(pvSetBuffer);
  9217. ASSERT(pu4SetInfoLen);
  9218. prHS20Info = &(prAdapter->rWifiVar.rHS20Info);
  9219. DEBUGFUNC("wlanoidSetInterworkingInfo");
  9220. DBGLOG(OID, TRACE, "\r\n");
  9221. if (u4SetBufferLen == 0)
  9222. return WLAN_STATUS_INVALID_LENGTH;
  9223. *pu4SetInfoLen = u4SetBufferLen;
  9224. prInterWorkingIe = (P_IE_INTERWORKING_T) pvSetBuffer;
  9225. prHS20Info->ucAccessNetworkOptions = prInterWorkingIe->ucAccNetOpt;
  9226. prHS20Info->ucVenueGroup = prInterWorkingIe->ucVenueGroup;
  9227. prHS20Info->ucVenueType = prInterWorkingIe->ucVenueType;
  9228. COPY_MAC_ADDR(prHS20Info->aucHESSID, prInterWorkingIe->aucHESSID);
  9229. DBGLOG(SEC, TRACE, "IW IE sz %ld\n", u4SetBufferLen);
  9230. #endif
  9231. return WLAN_STATUS_SUCCESS;
  9232. }
  9233. /*----------------------------------------------------------------------------*/
  9234. /*!
  9235. * \brief This routine is called by WSC to set the Roaming Consortium IE info, which is needed to
  9236. * add to Association request frame while join WPS AP.
  9237. *
  9238. * \param[in] prAdapter Pointer to the Adapter structure
  9239. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set
  9240. * \param[in] u4SetBufferLen The length of the set buffer
  9241. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9242. * bytes read from the set buffer. If the call failed due to invalid length of
  9243. * the set buffer, returns the amount of storage needed.
  9244. *
  9245. * \retval WLAN_STATUS_SUCCESS
  9246. * \retval WLAN_STATUS_INVALID_DATA If new setting value is wrong.
  9247. * \retval WLAN_STATUS_INVALID_LENGTH
  9248. *
  9249. */
  9250. /*----------------------------------------------------------------------------*/
  9251. WLAN_STATUS
  9252. wlanoidSetRoamingConsortiumIEInfo(IN P_ADAPTER_T prAdapter,
  9253. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9254. {
  9255. #if 0
  9256. P_HS20_INFO_T prHS20Info = NULL;
  9257. P_PARAM_HS20_ROAMING_CONSORTIUM_INFO prRCInfo;
  9258. ASSERT(prAdapter);
  9259. ASSERT(pvSetBuffer);
  9260. ASSERT(pu4SetInfoLen);
  9261. prHS20Info = &(prAdapter->rWifiVar.rHS20Info);
  9262. /* DEBUGFUNC("wlanoidSetRoamingConsortiumInfo"); */
  9263. /* DBGLOG(HS2, TRACE, ("\r\n")); */
  9264. if (u4SetBufferLen == 0)
  9265. return WLAN_STATUS_INVALID_LENGTH;
  9266. *pu4SetInfoLen = u4SetBufferLen;
  9267. prRCInfo = (P_PARAM_HS20_ROAMING_CONSORTIUM_INFO) pvSetBuffer;
  9268. kalMemCopy(&(prHS20Info->rRCInfo), prRCInfo, sizeof(PARAM_HS20_ROAMING_CONSORTIUM_INFO));
  9269. /* DBGLOG(HS2, TRACE, ("RoamingConsortium IE sz %ld\n", u4SetBufferLen)); */
  9270. #endif
  9271. return WLAN_STATUS_SUCCESS;
  9272. }
  9273. /*----------------------------------------------------------------------------*/
  9274. /*!
  9275. * \brief This routine is called to set_bssid_pool
  9276. *
  9277. * \param[in] prAdapter Pointer to the Adapter structure.
  9278. * \param[in] pvSetBuffer Pointer to the buffer that holds the data to be set.
  9279. * \param[in] u4SetBufferLen The length of the set buffer.
  9280. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9281. * bytes read from the set buffer. If the call failed
  9282. * due to invalid length of the set buffer, returns
  9283. * the amount of storage needed.
  9284. *
  9285. * \retval WLAN_STATUS_SUCCESS
  9286. * \retval WLAN_STATUS_INVALID_LENGTH
  9287. * \retval WLAN_STATUS_ADAPTER_NOT_READY
  9288. * \retval WLAN_STATUS_MULTICAST_FULL
  9289. */
  9290. /*----------------------------------------------------------------------------*/
  9291. WLAN_STATUS
  9292. wlanoidSetHS20BssidPool(IN P_ADAPTER_T prAdapter,
  9293. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9294. {
  9295. WLAN_STATUS rWlanStatus = WLAN_STATUS_SUCCESS;
  9296. ASSERT(prAdapter);
  9297. ASSERT(pu4SetInfoLen);
  9298. if (u4SetBufferLen)
  9299. ASSERT(pvSetBuffer);
  9300. if (u4SetBufferLen < sizeof(PARAM_HS20_SET_BSSID_POOL)) {
  9301. *pu4SetInfoLen = sizeof(PARAM_HS20_SET_BSSID_POOL);
  9302. return WLAN_STATUS_BUFFER_TOO_SHORT;
  9303. }
  9304. rWlanStatus = hs20SetBssidPool(prAdapter, pvSetBuffer, NETWORK_TYPE_AIS_INDEX);
  9305. return rWlanStatus;
  9306. } /* end of wlanoidSendHS20GASRequest() */
  9307. #endif
  9308. #if CFG_SUPPORT_ROAMING_ENC
  9309. /*----------------------------------------------------------------------------*/
  9310. /*! \brief This routine is called to query the MAC address the NIC is currently using.
  9311. *
  9312. * \param[in] pvAdapter Pointer to the Adapter structure
  9313. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  9314. * query buffer
  9315. * \param[in] u4QueryBufLen The length of the query buffer
  9316. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  9317. * bytes written into the query buffer. If the call
  9318. * failed due to invalid length of the query buffer,
  9319. * returns the amount of storage needed.
  9320. *
  9321. * \retval WLAN_STATUS_SUCCESS
  9322. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  9323. */
  9324. /*----------------------------------------------------------------------------*/
  9325. WLAN_STATUS
  9326. wlanoidSetRoamingInfo(IN P_ADAPTER_T prAdapter,
  9327. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9328. {
  9329. CMD_ROAMING_INFO_T *prCmdRoamingInfo;
  9330. DEBUGFUNC("wlanoidSetRoamingInfo");
  9331. DBGLOG(OID, LOUD, "\n");
  9332. ASSERT(prAdapter);
  9333. ASSERT(pu4SetInfoLen);
  9334. *pu4SetInfoLen = sizeof(CMD_ROAMING_INFO_T);
  9335. if (u4SetBufferLen < sizeof(CMD_ROAMING_INFO_T))
  9336. return WLAN_STATUS_INVALID_LENGTH;
  9337. ASSERT(pvSetBuffer);
  9338. prCmdRoamingInfo = (CMD_ROAMING_INFO_T *) pvSetBuffer;
  9339. return wlanSendSetQueryCmd(prAdapter,
  9340. CMD_ID_SET_ROAMING_INFO,
  9341. TRUE,
  9342. FALSE,
  9343. TRUE,
  9344. nicCmdEventSetCommon,
  9345. nicOidCmdTimeoutCommon,
  9346. sizeof(CMD_ROAMING_INFO_T), (PUINT_8) prCmdRoamingInfo, NULL, 0);
  9347. }
  9348. #endif /* CFG_SUPPORT_ROAMING_ENC */
  9349. /*----------------------------------------------------------------------------*/
  9350. /*!
  9351. * \brief This routine is called to set chip
  9352. *
  9353. * \param[in] prAdapter Pointer to the Adapter structure.
  9354. * \param[in] pvSetBuffer A pointer to the buffer that holds the data to be set.
  9355. * \param[in] u4SetBufferLen The length of the set buffer.
  9356. * \param[out] pu4SetInfoLen If the call is successful, returns the number of
  9357. * bytes read from the set buffer. If the call failed
  9358. * due to invalid length of the set buffer, returns
  9359. * the amount of storage needed.
  9360. *
  9361. * \retval WLAN_STATUS_SUCCESS
  9362. * \retval WLAN_STATUS_INVALID_LENGTH
  9363. */
  9364. /*----------------------------------------------------------------------------*/
  9365. WLAN_STATUS
  9366. wlanoidSetChipConfig(IN P_ADAPTER_T prAdapter,
  9367. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9368. {
  9369. P_PARAM_CUSTOM_CHIP_CONFIG_STRUCT_T prChipConfigInfo;
  9370. CMD_CHIP_CONFIG_T rCmdChipConfig;
  9371. WLAN_STATUS rWlanStatus = WLAN_STATUS_SUCCESS;
  9372. DATA_STRUCT_INSPECTING_ASSERT(sizeof(prChipConfigInfo->aucCmd) == CHIP_CONFIG_RESP_SIZE);
  9373. DEBUGFUNC("wlanoidSetChipConfig");
  9374. DBGLOG(OID, LOUD, "\n");
  9375. ASSERT(prAdapter);
  9376. ASSERT(pu4SetInfoLen);
  9377. *pu4SetInfoLen = sizeof(PARAM_CUSTOM_CHIP_CONFIG_STRUCT_T);
  9378. if (u4SetBufferLen < sizeof(PARAM_CUSTOM_CHIP_CONFIG_STRUCT_T))
  9379. return WLAN_STATUS_INVALID_LENGTH;
  9380. ASSERT(pvSetBuffer);
  9381. prChipConfigInfo = (P_PARAM_CUSTOM_CHIP_CONFIG_STRUCT_T) pvSetBuffer;
  9382. kalMemZero(&rCmdChipConfig, sizeof(rCmdChipConfig));
  9383. rCmdChipConfig.u2Id = prChipConfigInfo->u2Id;
  9384. rCmdChipConfig.ucType = prChipConfigInfo->ucType;
  9385. rCmdChipConfig.ucRespType = prChipConfigInfo->ucRespType;
  9386. rCmdChipConfig.u2MsgSize = prChipConfigInfo->u2MsgSize;
  9387. if (rCmdChipConfig.u2MsgSize > CHIP_CONFIG_RESP_SIZE) {
  9388. DBGLOG(OID, INFO, "Chip config Msg Size %u is not valid (set)\n", rCmdChipConfig.u2MsgSize);
  9389. rCmdChipConfig.u2MsgSize = CHIP_CONFIG_RESP_SIZE;
  9390. }
  9391. kalMemCopy(rCmdChipConfig.aucCmd, prChipConfigInfo->aucCmd, rCmdChipConfig.u2MsgSize);
  9392. DBGLOG(OID, TRACE, "rCmdChipConfig.aucCmd=%s\n", rCmdChipConfig.aucCmd);
  9393. #if 1
  9394. rWlanStatus = wlanSendSetQueryCmd(prAdapter,
  9395. CMD_ID_CHIP_CONFIG,
  9396. TRUE,
  9397. FALSE,
  9398. TRUE,
  9399. nicCmdEventSetCommon,
  9400. nicOidCmdTimeoutCommon,
  9401. sizeof(CMD_CHIP_CONFIG_T),
  9402. (PUINT_8) &rCmdChipConfig, pvSetBuffer, u4SetBufferLen);
  9403. #endif
  9404. return rWlanStatus;
  9405. } /* wlanoidSetChipConfig */
  9406. WLAN_STATUS
  9407. wlanoidSetWfdDebugMode(IN P_ADAPTER_T prAdapter,
  9408. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9409. {
  9410. P_CMD_WFD_DEBUG_MODE_INFO_T prCmdWfdDebugModeInfo;
  9411. DEBUGFUNC("wlanoidSetWFDDebugMode");
  9412. DBGLOG(OID, LOUD, "\n");
  9413. ASSERT(prAdapter);
  9414. ASSERT(pu4SetInfoLen);
  9415. *pu4SetInfoLen = sizeof(CMD_WFD_DEBUG_MODE_INFO_T);
  9416. if (u4SetBufferLen < sizeof(CMD_WFD_DEBUG_MODE_INFO_T))
  9417. return WLAN_STATUS_INVALID_LENGTH;
  9418. ASSERT(pvSetBuffer);
  9419. prCmdWfdDebugModeInfo = (CMD_WFD_DEBUG_MODE_INFO_T *) pvSetBuffer;
  9420. DBGLOG(OID, INFO, "New WFD Debug: %d mode and period=0x%x\n", prCmdWfdDebugModeInfo->ucDebugMode,
  9421. prCmdWfdDebugModeInfo->u2PeriodInteval);
  9422. prAdapter->rWifiVar.prP2pFsmInfo->rWfdDebugSetting.ucWfdDebugMode = (UINT_8) prCmdWfdDebugModeInfo->ucDebugMode;
  9423. prAdapter->rWifiVar.prP2pFsmInfo->rWfdDebugSetting.u2WfdSNShowPeiroid =
  9424. (UINT_16) prCmdWfdDebugModeInfo->u2PeriodInteval;
  9425. return WLAN_STATUS_SUCCESS;
  9426. } /*wlanoidSetWfdDebugMode */
  9427. #if (CFG_SUPPORT_TXR_ENC == 1)
  9428. /*----------------------------------------------------------------------------*/
  9429. /*! \brief This routine is called to query the MAC address the NIC is currently using.
  9430. *
  9431. * \param[in] pvAdapter Pointer to the Adapter structure
  9432. * \param[in] pvQueryBuf A pointer to the buffer that holds the result of the
  9433. * query buffer
  9434. * \param[in] u4QueryBufLen The length of the query buffer
  9435. * \param[out] pu4QueryInfoLen If the call is successful, returns the number of
  9436. * bytes written into the query buffer. If the call
  9437. * failed due to invalid length of the query buffer,
  9438. * returns the amount of storage needed.
  9439. *
  9440. * \retval WLAN_STATUS_SUCCESS
  9441. * \retval WLAN_STATUS_BUFFER_TOO_SHORT
  9442. */
  9443. /*----------------------------------------------------------------------------*/
  9444. WLAN_STATUS
  9445. wlanoidSetTxRateInfo(
  9446. IN P_ADAPTER_T prAdapter,
  9447. IN PVOID pvSetBuffer,
  9448. IN UINT_32 u4SetBufferLen,
  9449. OUT PUINT_32 pu4SetInfoLen)
  9450. {
  9451. CMD_RLM_INFO_T *prCmdTxRInfo;
  9452. DEBUGFUNC("wlanoidSetTxRateInfo");
  9453. DBGLOG(OID, LOUD, "\n");
  9454. ASSERT(prAdapter);
  9455. ASSERT(pu4SetInfoLen);
  9456. *pu4SetInfoLen = sizeof(CMD_RLM_INFO_T);
  9457. if (u4SetBufferLen < sizeof(CMD_RLM_INFO_T))
  9458. return WLAN_STATUS_INVALID_LENGTH;
  9459. ASSERT(pvSetBuffer);
  9460. prCmdTxRInfo = (CMD_RLM_INFO_T *)pvSetBuffer;
  9461. DBGLOG(OID, INFO, "<tar_cmd> command = %u %u %u %u %d %u %u\n",
  9462. prCmdTxRInfo->u4Version,
  9463. prCmdTxRInfo->fgIsErrRatioEnhanceApplied,
  9464. prCmdTxRInfo->ucErrRatio2LimitMinRate,
  9465. prCmdTxRInfo->ucMinLegacyRateIdx,
  9466. prCmdTxRInfo->cMinRssiThreshold,
  9467. prCmdTxRInfo->fgIsRtsApplied,
  9468. prCmdTxRInfo->ucRecoverTime));
  9469. return wlanSendSetQueryCmd(prAdapter,
  9470. CMD_ID_TX_AR_ERR_CONFIG,
  9471. TRUE,
  9472. FALSE,
  9473. TRUE,
  9474. nicCmdEventSetCommon,
  9475. nicOidCmdTimeoutCommon,
  9476. sizeof(CMD_RLM_INFO_T),
  9477. (PUINT_8)prCmdTxRInfo,
  9478. NULL,
  9479. 0
  9480. );
  9481. }
  9482. #endif /* CFG_SUPPORT_TXR_ENC */
  9483. WLAN_STATUS
  9484. wlanoidNotifyFwSuspend(IN P_ADAPTER_T prAdapter,
  9485. IN PVOID pvSetBuffer, IN UINT_32 u4SetBufferLen, OUT PUINT_32 pu4SetInfoLen)
  9486. {
  9487. WIFI_SYSTEM_SUSPEND_CMD_T rSuspendCmd;
  9488. if (!prAdapter || !pvSetBuffer)
  9489. return WLAN_STATUS_INVALID_DATA;
  9490. rSuspendCmd.fgIsSystemSuspend = *(PBOOLEAN)pvSetBuffer;
  9491. return wlanSendSetQueryCmd(prAdapter,
  9492. CMD_ID_SET_SYSTEM_SUSPEND,
  9493. TRUE,
  9494. FALSE,
  9495. TRUE,
  9496. nicCmdEventSetCommon,
  9497. nicOidCmdTimeoutCommon,
  9498. sizeof(BOOLEAN),
  9499. (PUINT_8)&rSuspendCmd,
  9500. NULL,
  9501. 0);
  9502. }