1 /******************************************************************************
3 * Copyright(c) 2007 - 2012 Realtek Corporation. All rights reserved.
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of version 2 of the GNU General Public License as
7 * published by the Free Software Foundation.
9 * This program is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * You should have received a copy of the GNU General Public License along with
15 * this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
19 ******************************************************************************/
20 #define _RTW_IOCTL_SET_C_
23 #include <osdep_service.h>
24 #include <drv_types.h>
25 #include <rtw_ioctl_set.h>
28 #include <usb_osintf.h>
30 #include <linux/ieee80211.h>
32 extern void indicate_wx_scan_complete_event(_adapter *padapter);
34 u8 rtw_validate_ssid(NDIS_802_11_SSID *ssid)
41 if (ssid->SsidLength > 32) {
42 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_err_, ("ssid length >32\n"));
47 for(i = 0; i < ssid->SsidLength; i++)
49 /* wifi, printable ascii code must be supported */
50 if(!( (ssid->Ssid[i] >= 0x20) && (ssid->Ssid[i] <= 0x7e) )){
51 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_err_, ("ssid has nonprintabl ascii\n"));
64 u8 rtw_do_join(_adapter * padapter);
65 u8 rtw_do_join(_adapter * padapter)
67 struct list_head *plist, *phead;
69 struct mlme_priv *pmlmepriv = &(padapter->mlmepriv);
70 _queue *queue = &(pmlmepriv->scanned_queue);
75 spin_lock_bh(&(pmlmepriv->scanned_queue.lock));
76 phead = get_list_head(queue);
79 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("\n rtw_do_join: phead = %p; plist = %p \n\n\n", phead, plist));
81 pmlmepriv->cur_network.join_res = -2;
83 set_fwstate(pmlmepriv, _FW_UNDER_LINKING);
85 pmlmepriv->pscanned = plist;
87 pmlmepriv->to_join = _TRUE;
89 if(_rtw_queue_empty(queue)== _TRUE)
91 spin_unlock_bh(&(pmlmepriv->scanned_queue.lock));
92 _clr_fwstate_(pmlmepriv, _FW_UNDER_LINKING);
94 /* when set_ssid/set_bssid for rtw_do_join(), but scanning queue is empty */
95 /* we try to issue sitesurvey firstly */
97 if (pmlmepriv->LinkDetectInfo.bBusyTraffic ==_FALSE
98 || rtw_to_roaming(padapter) > 0
101 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("rtw_do_join(): site survey if scanned_queue is empty\n."));
102 /* submit site_survey_cmd */
103 if(_SUCCESS!=(ret=rtw_sitesurvey_cmd(padapter, &pmlmepriv->assoc_ssid, 1, NULL, 0)) ) {
104 pmlmepriv->to_join = _FALSE;
105 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("rtw_do_join(): site survey return error\n."));
110 pmlmepriv->to_join = _FALSE;
119 spin_unlock_bh(&(pmlmepriv->scanned_queue.lock));
120 if((select_ret=rtw_select_and_join_from_scanned_queue(pmlmepriv))==_SUCCESS)
122 pmlmepriv->to_join = _FALSE;
123 _set_timer(&pmlmepriv->assoc_timer, MAX_JOIN_TIMEOUT);
127 if(check_fwstate(pmlmepriv, WIFI_ADHOC_STATE)==_TRUE)
129 /* submit createbss_cmd to change to a ADHOC_MASTER */
131 /* pmlmepriv->lock has been acquired by caller... */
132 WLAN_BSSID_EX *pdev_network = &(padapter->registrypriv.dev_network);
134 pmlmepriv->fw_state = WIFI_ADHOC_MASTER_STATE;
136 pibss = padapter->registrypriv.dev_network.MacAddress;
138 memcpy(&pdev_network->Ssid, &pmlmepriv->assoc_ssid, sizeof(NDIS_802_11_SSID));
140 rtw_update_registrypriv_dev_network(padapter);
142 rtw_generate_random_ibss(pibss);
144 if(rtw_createbss_cmd(padapter)!=_SUCCESS)
146 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("***Error=>do_goin: rtw_createbss_cmd status FAIL*** \n "));
151 pmlmepriv->to_join = _FALSE;
153 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("***Error=> rtw_select_and_join_from_scanned_queue FAIL under STA_Mode*** \n "));
158 /* can't associate ; reset under-linking */
159 _clr_fwstate_(pmlmepriv, _FW_UNDER_LINKING);
161 /* when set_ssid/set_bssid for rtw_do_join(), but there are no desired bss in scanning queue */
162 /* we try to issue sitesurvey firstly */
163 if(pmlmepriv->LinkDetectInfo.bBusyTraffic==_FALSE
164 || rtw_to_roaming(padapter) > 0
167 /* DBG_8723A("rtw_do_join() when no desired bss in scanning queue \n"); */
168 if( _SUCCESS!=(ret=rtw_sitesurvey_cmd(padapter, &pmlmepriv->assoc_ssid, 1, NULL, 0)) ){
169 pmlmepriv->to_join = _FALSE;
170 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("do_join(): site survey return error\n."));
176 pmlmepriv->to_join = _FALSE;
191 u8 rtw_set_802_11_bssid(_adapter* padapter, u8 *bssid)
196 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
200 DBG_8723A_LEVEL(_drv_always_, "set bssid:%pM\n", bssid);
202 if (is_zero_ether_addr(bssid) ||
203 is_broadcast_ether_addr(bssid)) {
208 spin_lock_bh(&pmlmepriv->lock);
210 DBG_8723A("Set BSSID under fw_state=0x%08x\n", get_fwstate(pmlmepriv));
211 if (check_fwstate(pmlmepriv, _FW_UNDER_SURVEY) == _TRUE) {
212 goto handle_tkip_countermeasure;
213 } else if (check_fwstate(pmlmepriv, _FW_UNDER_LINKING) == _TRUE) {
214 goto release_mlme_lock;
217 if (check_fwstate(pmlmepriv, _FW_LINKED|WIFI_ADHOC_MASTER_STATE) == _TRUE)
219 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_info_, ("set_bssid: _FW_LINKED||WIFI_ADHOC_MASTER_STATE\n"));
221 if (!memcmp(&pmlmepriv->cur_network.network.MacAddress,
224 if (check_fwstate(pmlmepriv, WIFI_STATION_STATE) == _FALSE)
225 goto release_mlme_lock;/* it means driver is in WIFI_ADHOC_MASTER_STATE, we needn't create bss again. */
227 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("Set BSSID not the same bssid\n"));
228 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("set_bssid="MAC_FMT"\n", MAC_ARG(bssid) ));
229 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("cur_bssid="MAC_FMT"\n", MAC_ARG(pmlmepriv->cur_network.network.MacAddress) ));
231 rtw_disassoc_cmd(padapter, 0, _TRUE);
233 if (check_fwstate(pmlmepriv, _FW_LINKED) == _TRUE)
234 rtw_indicate_disconnect(padapter);
236 rtw_free_assoc_resources(padapter, 1);
238 if ((check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) == _TRUE)) {
239 _clr_fwstate_(pmlmepriv, WIFI_ADHOC_MASTER_STATE);
240 set_fwstate(pmlmepriv, WIFI_ADHOC_STATE);
245 handle_tkip_countermeasure:
246 /* should we add something here...? */
248 if (padapter->securitypriv.btkip_countermeasure == _TRUE) {
249 cur_time = rtw_get_current_time();
251 if( (cur_time - padapter->securitypriv.btkip_countermeasure_time) > 60 * HZ )
253 padapter->securitypriv.btkip_countermeasure = _FALSE;
254 padapter->securitypriv.btkip_countermeasure_time = 0;
259 goto release_mlme_lock;
263 memcpy(&pmlmepriv->assoc_bssid, bssid, ETH_ALEN);
264 pmlmepriv->assoc_by_bssid=_TRUE;
266 if (check_fwstate(pmlmepriv, _FW_UNDER_SURVEY) == _TRUE) {
267 pmlmepriv->to_join = _TRUE;
270 status = rtw_do_join(padapter);
274 spin_unlock_bh(&pmlmepriv->lock);
277 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_err_,
278 ("rtw_set_802_11_bssid: status=%d\n", status));
285 u8 rtw_set_802_11_ssid(_adapter* padapter, NDIS_802_11_SSID *ssid)
287 u8 status = _SUCCESS;
290 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
291 struct wlan_network *pnetwork = &pmlmepriv->cur_network;
295 DBG_8723A_LEVEL(_drv_always_, "set ssid [%s] fw_state=0x%08x\n",
296 ssid->Ssid, get_fwstate(pmlmepriv));
298 if(padapter->hw_init_completed==_FALSE){
299 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_err_,
300 ("set_ssid: hw_init_completed==_FALSE=>exit!!!\n"));
305 spin_lock_bh(&pmlmepriv->lock);
307 DBG_8723A("Set SSID under fw_state=0x%08x\n", get_fwstate(pmlmepriv));
308 if (check_fwstate(pmlmepriv, _FW_UNDER_SURVEY) == _TRUE) {
309 goto handle_tkip_countermeasure;
310 } else if (check_fwstate(pmlmepriv, _FW_UNDER_LINKING) == _TRUE) {
311 goto release_mlme_lock;
314 if (check_fwstate(pmlmepriv, _FW_LINKED|WIFI_ADHOC_MASTER_STATE) == _TRUE)
316 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_info_,
317 ("set_ssid: _FW_LINKED||WIFI_ADHOC_MASTER_STATE\n"));
319 if ((pmlmepriv->assoc_ssid.SsidLength == ssid->SsidLength) &&
320 !memcmp(&pmlmepriv->assoc_ssid.Ssid, ssid->Ssid, ssid->SsidLength))
322 if((check_fwstate(pmlmepriv, WIFI_STATION_STATE) == _FALSE))
324 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_err_,
325 ("Set SSID is the same ssid, fw_state=0x%08x\n",
326 get_fwstate(pmlmepriv)));
328 if(rtw_is_same_ibss(padapter, pnetwork) == _FALSE)
330 /* if in WIFI_ADHOC_MASTER_STATE | WIFI_ADHOC_STATE, create bss or rejoin again */
331 rtw_disassoc_cmd(padapter, 0, _TRUE);
333 if (check_fwstate(pmlmepriv, _FW_LINKED) == _TRUE)
334 rtw_indicate_disconnect(padapter);
336 rtw_free_assoc_resources(padapter, 1);
338 if (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) == _TRUE) {
339 _clr_fwstate_(pmlmepriv, WIFI_ADHOC_MASTER_STATE);
340 set_fwstate(pmlmepriv, WIFI_ADHOC_STATE);
345 goto release_mlme_lock;/* it means driver is in WIFI_ADHOC_MASTER_STATE, we needn't create bss again. */
350 rtw_lps_ctrl_wk_cmd(padapter, LPS_CTRL_JOINBSS, 1);
356 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("Set SSID not the same ssid\n"));
357 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("set_ssid=[%s] len=0x%x\n", ssid->Ssid, (unsigned int)ssid->SsidLength));
358 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("assoc_ssid=[%s] len=0x%x\n", pmlmepriv->assoc_ssid.Ssid, (unsigned int)pmlmepriv->assoc_ssid.SsidLength));
360 rtw_disassoc_cmd(padapter, 0, _TRUE);
362 if (check_fwstate(pmlmepriv, _FW_LINKED) == _TRUE)
363 rtw_indicate_disconnect(padapter);
365 rtw_free_assoc_resources(padapter, 1);
367 if (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) == _TRUE) {
368 _clr_fwstate_(pmlmepriv, WIFI_ADHOC_MASTER_STATE);
369 set_fwstate(pmlmepriv, WIFI_ADHOC_STATE);
374 handle_tkip_countermeasure:
376 if (padapter->securitypriv.btkip_countermeasure == _TRUE) {
377 cur_time = rtw_get_current_time();
379 if( (cur_time - padapter->securitypriv.btkip_countermeasure_time) > 60 * HZ )
381 padapter->securitypriv.btkip_countermeasure = _FALSE;
382 padapter->securitypriv.btkip_countermeasure_time = 0;
387 goto release_mlme_lock;
391 #ifdef CONFIG_VALIDATE_SSID
392 if (rtw_validate_ssid(ssid) == _FALSE) {
394 goto release_mlme_lock;
398 memcpy(&pmlmepriv->assoc_ssid, ssid, sizeof(NDIS_802_11_SSID));
399 pmlmepriv->assoc_by_bssid=_FALSE;
401 if (check_fwstate(pmlmepriv, _FW_UNDER_SURVEY) == _TRUE) {
402 pmlmepriv->to_join = _TRUE;
405 status = rtw_do_join(padapter);
409 spin_unlock_bh(&pmlmepriv->lock);
412 RT_TRACE(_module_rtl871x_ioctl_set_c_, _drv_err_,
413 ("-rtw_set_802_11_ssid: status=%d\n", status));
420 u8 rtw_set_802_11_infrastructure_mode(_adapter* padapter,
421 NDIS_802_11_NETWORK_INFRASTRUCTURE networktype)
423 struct mlme_priv *pmlmepriv = &padapter->mlmepriv;
424 struct wlan_network *cur_network = &pmlmepriv->cur_network;
425 NDIS_802_11_NETWORK_INFRASTRUCTURE* pold_state = &(cur_network->network.InfrastructureMode);
429 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_notice_,
430 ("+rtw_set_802_11_infrastructure_mode: old=%d new=%d fw_state=0x%08x\n",
431 *pold_state, networktype, get_fwstate(pmlmepriv)));
433 if(*pold_state != networktype)
435 spin_lock_bh(&pmlmepriv->lock);
437 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,(" change mode!"));
438 /* DBG_8723A("change mode, old_mode=%d, new_mode=%d, fw_state=0x%x\n", *pold_state, networktype, get_fwstate(pmlmepriv)); */
440 if(*pold_state==Ndis802_11APMode)
442 /* change to other mode from Ndis802_11APMode */
443 cur_network->join_res = -1;
445 #ifdef CONFIG_NATIVEAP_MLME
446 stop_ap_mode(padapter);
450 if((check_fwstate(pmlmepriv, _FW_LINKED)== _TRUE) ||(*pold_state==Ndis802_11IBSS))
451 rtw_disassoc_cmd(padapter, 0, _TRUE);
453 if((check_fwstate(pmlmepriv, _FW_LINKED)== _TRUE) ||
454 (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE)== _TRUE) )
455 rtw_free_assoc_resources(padapter, 1);
457 if((*pold_state == Ndis802_11Infrastructure) ||(*pold_state == Ndis802_11IBSS))
459 if(check_fwstate(pmlmepriv, _FW_LINKED) == _TRUE)
461 rtw_indicate_disconnect(padapter); /* will clr Linked_state; before this function, we must have chked whether issue dis-assoc_cmd or not */
465 *pold_state = networktype;
467 _clr_fwstate_(pmlmepriv, ~WIFI_NULL_STATE);
472 set_fwstate(pmlmepriv, WIFI_ADHOC_STATE);
475 case Ndis802_11Infrastructure:
476 set_fwstate(pmlmepriv, WIFI_STATION_STATE);
479 case Ndis802_11APMode:
480 set_fwstate(pmlmepriv, WIFI_AP_STATE);
481 #ifdef CONFIG_NATIVEAP_MLME
482 start_ap_mode(padapter);
483 /* rtw_indicate_connect(padapter); */
488 case Ndis802_11AutoUnknown:
489 case Ndis802_11InfrastructureMax:
493 /* SecClearAllKeys(adapter); */
495 /* RT_TRACE(COMP_OID_SET, DBG_LOUD, ("set_infrastructure: fw_state:%x after changing mode\n", */
496 /* get_fwstate(pmlmepriv) )); */
498 spin_unlock_bh(&pmlmepriv->lock);
506 u8 rtw_set_802_11_disassociate(_adapter *padapter)
508 struct mlme_priv * pmlmepriv = &padapter->mlmepriv;
512 spin_lock_bh(&pmlmepriv->lock);
514 if (check_fwstate(pmlmepriv, _FW_LINKED) == _TRUE)
516 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("MgntActrtw_set_802_11_disassociate: rtw_indicate_disconnect\n"));
518 rtw_disassoc_cmd(padapter, 0, _TRUE);
519 rtw_indicate_disconnect(padapter);
520 rtw_free_assoc_resources(padapter, 1);
521 rtw_pwr_wakeup(padapter);
524 spin_unlock_bh(&pmlmepriv->lock);
531 u8 rtw_set_802_11_bssid_list_scan(_adapter* padapter, NDIS_802_11_SSID *pssid, int ssid_max_num)
533 struct mlme_priv *pmlmepriv= &padapter->mlmepriv;
538 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("+rtw_set_802_11_bssid_list_scan(), fw_state=%x\n", get_fwstate(pmlmepriv)));
540 if (padapter == NULL) {
544 if (padapter->hw_init_completed==_FALSE){
546 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("\n===rtw_set_802_11_bssid_list_scan:hw_init_completed==_FALSE===\n"));
550 if ((check_fwstate(pmlmepriv, _FW_UNDER_SURVEY|_FW_UNDER_LINKING) == _TRUE) ||
551 (pmlmepriv->LinkDetectInfo.bBusyTraffic == _TRUE))
553 /* Scan or linking is in progress, do nothing. */
554 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("rtw_set_802_11_bssid_list_scan fail since fw_state = %x\n", get_fwstate(pmlmepriv)));
557 if(check_fwstate(pmlmepriv, (_FW_UNDER_SURVEY|_FW_UNDER_LINKING))== _TRUE){
558 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("\n###_FW_UNDER_SURVEY|_FW_UNDER_LINKING\n\n"));
560 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("\n###pmlmepriv->sitesurveyctrl.traffic_busy==_TRUE\n\n"));
563 if (rtw_is_scan_deny(padapter)) {
564 DBG_8723A(FUNC_ADPT_FMT": scan deny\n", FUNC_ADPT_ARG(padapter));
565 indicate_wx_scan_complete_event(padapter);
569 spin_lock_bh(&pmlmepriv->lock);
571 res = rtw_sitesurvey_cmd(padapter, pssid, ssid_max_num, NULL, 0);
573 spin_unlock_bh(&pmlmepriv->lock);
582 u8 rtw_set_802_11_authentication_mode(_adapter* padapter, NDIS_802_11_AUTHENTICATION_MODE authmode)
584 struct security_priv *psecuritypriv = &padapter->securitypriv;
590 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("set_802_11_auth.mode(): mode=%x\n", authmode));
592 psecuritypriv->ndisauthtype=authmode;
594 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("rtw_set_802_11_authentication_mode:psecuritypriv->ndisauthtype=%d", psecuritypriv->ndisauthtype));
596 if(psecuritypriv->ndisauthtype>3)
597 psecuritypriv->dot11AuthAlgrthm=dot11AuthAlgrthm_8021X;
599 res=rtw_set_auth(padapter,psecuritypriv);
611 u8 rtw_set_802_11_add_wep(_adapter* padapter, NDIS_802_11_WEP *wep){
616 struct security_priv* psecuritypriv=&(padapter->securitypriv);
621 bdefaultkey=(wep->KeyIndex & 0x40000000) > 0 ? _FALSE : _TRUE; /* for ??? */
622 btransmitkey= (wep->KeyIndex & 0x80000000) > 0 ? _TRUE : _FALSE; /* for ??? */
623 keyid=wep->KeyIndex & 0x3fffffff;
626 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("MgntActrtw_set_802_11_add_wep:keyid>4=>fail\n"));
631 switch(wep->KeyLength)
634 psecuritypriv->dot11PrivacyAlgrthm=_WEP40_;
635 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("MgntActrtw_set_802_11_add_wep:wep->KeyLength=5\n"));
638 psecuritypriv->dot11PrivacyAlgrthm=_WEP104_;
639 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("MgntActrtw_set_802_11_add_wep:wep->KeyLength=13\n"));
642 psecuritypriv->dot11PrivacyAlgrthm=_NO_PRIVACY_;
643 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("MgntActrtw_set_802_11_add_wep:wep->KeyLength!=5 or 13\n"));
647 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("rtw_set_802_11_add_wep:befor memcpy, wep->KeyLength=0x%x wep->KeyIndex=0x%x keyid =%x\n",wep->KeyLength,wep->KeyIndex,keyid));
649 memcpy(&(psecuritypriv->dot11DefKey[keyid].skey[0]),&(wep->KeyMaterial),wep->KeyLength);
651 psecuritypriv->dot11DefKeylen[keyid]=wep->KeyLength;
653 psecuritypriv->dot11PrivacyKeyIndex=keyid;
655 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("rtw_set_802_11_add_wep:security key material : %x %x %x %x %x %x %x %x %x %x %x %x %x \n",
656 psecuritypriv->dot11DefKey[keyid].skey[0],psecuritypriv->dot11DefKey[keyid].skey[1],psecuritypriv->dot11DefKey[keyid].skey[2],
657 psecuritypriv->dot11DefKey[keyid].skey[3],psecuritypriv->dot11DefKey[keyid].skey[4],psecuritypriv->dot11DefKey[keyid].skey[5],
658 psecuritypriv->dot11DefKey[keyid].skey[6],psecuritypriv->dot11DefKey[keyid].skey[7],psecuritypriv->dot11DefKey[keyid].skey[8],
659 psecuritypriv->dot11DefKey[keyid].skey[9],psecuritypriv->dot11DefKey[keyid].skey[10],psecuritypriv->dot11DefKey[keyid].skey[11],
660 psecuritypriv->dot11DefKey[keyid].skey[12]));
662 res=rtw_set_key(padapter,psecuritypriv, keyid, 1);
673 u8 rtw_set_802_11_remove_wep(_adapter* padapter, u32 keyindex){
679 if (keyindex >= 0x80000000 || padapter == NULL){
688 struct security_priv* psecuritypriv=&(padapter->securitypriv);
691 memset(&psecuritypriv->dot11DefKey[keyindex], 0, 16);
693 res=rtw_set_key(padapter,psecuritypriv,keyindex, 0);
695 psecuritypriv->dot11DefKeylen[keyindex]=0;
715 u8 rtw_set_802_11_add_key(_adapter* padapter, NDIS_802_11_KEY *key){
719 struct sta_info *stainfo;
721 u8 bgrouptkey = _FALSE;/* can be remove later */
726 if (((key->KeyIndex & 0x80000000) == 0) && ((key->KeyIndex & 0x40000000) > 0)){
728 /* It is invalid to clear bit 31 and set bit 30. If the miniport driver encounters this combination, */
729 /* it must fail the request and return NDIS_STATUS_INVALID_DATA. */
730 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("rtw_set_802_11_add_key: ((key->KeyIndex & 0x80000000) == 0)[=%d] ",(int)(key->KeyIndex & 0x80000000) == 0));
731 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("rtw_set_802_11_add_key:((key->KeyIndex & 0x40000000) > 0)[=%d]" , (int)(key->KeyIndex & 0x40000000) > 0));
732 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_info_,("rtw_set_802_11_add_key: key->KeyIndex=%d \n" ,(int)key->KeyIndex));
737 if(key->KeyIndex & 0x40000000)
741 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("OID_802_11_ADD_KEY: +++++ Pairwise key +++++\n"));
743 pbssid=get_bssid(&padapter->mlmepriv);
744 stainfo=rtw_get_stainfo(&padapter->stapriv, pbssid);
746 if((stainfo!=NULL)&&(padapter->securitypriv.dot11AuthAlgrthm==dot11AuthAlgrthm_8021X)){
747 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("OID_802_11_ADD_KEY:( stainfo!=NULL)&&(Adapter->securitypriv.dot11AuthAlgrthm==dot11AuthAlgrthm_8021X)\n"));
748 encryptionalgo=stainfo->dot118021XPrivacy;
751 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("OID_802_11_ADD_KEY: stainfo==NULL)||(Adapter->securitypriv.dot11AuthAlgrthm!=dot11AuthAlgrthm_8021X)\n"));
752 encryptionalgo=padapter->securitypriv.dot11PrivacyAlgrthm;
755 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("rtw_set_802_11_add_key: (encryptionalgo ==%d)!\n",encryptionalgo ));
756 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("rtw_set_802_11_add_key: (Adapter->securitypriv.dot11PrivacyAlgrthm ==%d)!\n",padapter->securitypriv.dot11PrivacyAlgrthm));
757 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("rtw_set_802_11_add_key: (Adapter->securitypriv.dot11AuthAlgrthm ==%d)!\n",padapter->securitypriv.dot11AuthAlgrthm));
760 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("rtw_set_802_11_add_key: (stainfo->dot118021XPrivacy ==%d)!\n", stainfo->dot118021XPrivacy));
763 if(key->KeyIndex & 0x000000FF){
764 /* The key index is specified in the lower 8 bits by values of zero to 255. */
765 /* The key index should be set to zero for a Pairwise key, and the driver should fail with */
766 /* NDIS_STATUS_INVALID_DATA if the lower 8 bits is not zero */
767 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,(" key->KeyIndex & 0x000000FF.\n"));
773 if (is_broadcast_ether_addr(key->BSSID)) {
775 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("is_broadcast_ether_addr(key->BSSID)\n"));
780 /* Check key length for TKIP. */
781 /* if(encryptionAlgorithm == RT_ENC_TKIP_ENCRYPTION && key->KeyLength != 32) */
782 if((encryptionalgo== _TKIP_)&& (key->KeyLength != 32)){
783 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("TKIP KeyLength:0x%x != 32\n", key->KeyLength));
789 /* Check key length for AES. */
790 if((encryptionalgo== _AES_)&& (key->KeyLength != 16)) {
791 /* For our supplicant, EAPPkt9x.vxd, cannot differentiate TKIP and AES case. */
792 if(key->KeyLength == 32) {
800 /* Check key length for WEP. For NDTEST, 2005.01.27, by rcnjko. */
801 if( (encryptionalgo== _WEP40_|| encryptionalgo== _WEP104_) && (key->KeyLength != 5 && key->KeyLength != 13)) {
802 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("WEP KeyLength:0x%x != 5 or 13\n", key->KeyLength));
809 /* Check the pairwise key. Added by Annie, 2005-07-06. */
810 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("------------------------------------------\n"));
811 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("[Pairwise Key set]\n"));
812 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("------------------------------------------\n"));
813 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("key index: 0x%8x(0x%8x)\n", key->KeyIndex,(key->KeyIndex&0x3)));
814 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("key Length: %d\n", key->KeyLength));
815 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("------------------------------------------\n"));
820 /* Group key - KeyIndex(BIT30==0) */
821 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("OID_802_11_ADD_KEY: +++++ Group key +++++\n"));
823 /* when add wep key through add key and didn't assigned encryption type before */
824 if((padapter->securitypriv.ndisauthtype<=3)&&(padapter->securitypriv.dot118021XGrpPrivacy==0))
826 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("keylen=%d( Adapter->securitypriv.dot11PrivacyAlgrthm=%x )padapter->securitypriv.dot118021XGrpPrivacy(%x)\n", key->KeyLength,padapter->securitypriv.dot11PrivacyAlgrthm,padapter->securitypriv.dot118021XGrpPrivacy));
828 switch(key->KeyLength)
831 padapter->securitypriv.dot11PrivacyAlgrthm=_WEP40_;
832 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("Adapter->securitypriv.dot11PrivacyAlgrthm= %x key->KeyLength=%u\n", padapter->securitypriv.dot11PrivacyAlgrthm,key->KeyLength));
835 padapter->securitypriv.dot11PrivacyAlgrthm=_WEP104_;
836 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("Adapter->securitypriv.dot11PrivacyAlgrthm= %x key->KeyLength=%u\n", padapter->securitypriv.dot11PrivacyAlgrthm,key->KeyLength));
839 padapter->securitypriv.dot11PrivacyAlgrthm=_NO_PRIVACY_;
840 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("Adapter->securitypriv.dot11PrivacyAlgrthm= %x key->KeyLength=%u \n", padapter->securitypriv.dot11PrivacyAlgrthm,key->KeyLength));
844 encryptionalgo=padapter->securitypriv.dot11PrivacyAlgrthm;
846 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,(" Adapter->securitypriv.dot11PrivacyAlgrthm=%x\n", padapter->securitypriv.dot11PrivacyAlgrthm));
851 encryptionalgo=padapter->securitypriv.dot118021XGrpPrivacy;
852 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("( Adapter->securitypriv.dot11PrivacyAlgrthm=%x )encryptionalgo(%x)=padapter->securitypriv.dot118021XGrpPrivacy(%x)keylen=%d\n", padapter->securitypriv.dot11PrivacyAlgrthm,encryptionalgo,padapter->securitypriv.dot118021XGrpPrivacy,key->KeyLength));
856 if((check_fwstate(&padapter->mlmepriv, WIFI_ADHOC_STATE)==_TRUE) && (!is_broadcast_ether_addr(key->BSSID))) {
857 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,(" IBSS but BSSID is not Broadcast Address.\n"));
862 /* Check key length for TKIP */
863 if((encryptionalgo== _TKIP_) && (key->KeyLength != 32)) {
865 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,(" TKIP GTK KeyLength:%u != 32\n", key->KeyLength));
869 } else if(encryptionalgo== _AES_ && (key->KeyLength != 16 && key->KeyLength != 32) ) {
871 /* Check key length for AES */
872 /* For NDTEST, we allow keylen=32 in this case. 2005.01.27, by rcnjko. */
873 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("<=== SetInfo, OID_802_11_ADD_KEY: AES GTK KeyLength:%u != 16 or 32\n", key->KeyLength));
878 /* Change the key length for EAPPkt9x.vxd. Added by Annie, 2005-11-03. */
879 if((encryptionalgo== _AES_) && (key->KeyLength == 32) ) {
881 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("AES key length changed: %u\n", key->KeyLength) );
884 if(key->KeyIndex & 0x8000000) {/* error ??? 0x8000_0000 */
888 if((check_fwstate(&padapter->mlmepriv, WIFI_ADHOC_STATE)==_TRUE)&&(check_fwstate(&padapter->mlmepriv, _FW_LINKED)==_TRUE))
895 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("------------------------------------------\n") );
896 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("[Group Key set]\n") );
897 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("------------------------------------------\n")) ;
898 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("key index: 0x%8x(0x%8x)\n", key->KeyIndex,(key->KeyIndex&0x3)));
899 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("key Length: %d\n", key->KeyLength)) ;
900 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("------------------------------------------\n"));
904 /* If WEP encryption algorithm, just call rtw_set_802_11_add_wep(). */
905 if((padapter->securitypriv.dot11AuthAlgrthm !=dot11AuthAlgrthm_8021X)&&(encryptionalgo== _WEP40_ || encryptionalgo== _WEP104_))
909 u32 len = FIELD_OFFSET(NDIS_802_11_KEY, KeyMaterial) + key->KeyLength;
910 NDIS_802_11_WEP *wep = &padapter->securitypriv.ndiswep;
912 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("OID_802_11_ADD_KEY: +++++ WEP key +++++\n"));
915 keyindex = key->KeyIndex&0x7fffffff;
916 wep->KeyIndex = keyindex ;
917 wep->KeyLength = key->KeyLength;
919 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("OID_802_11_ADD_KEY:Before memcpy \n"));
921 memcpy(wep->KeyMaterial, key->KeyMaterial, key->KeyLength);
922 memcpy(&(padapter->securitypriv.dot11DefKey[keyindex].skey[0]), key->KeyMaterial, key->KeyLength);
924 padapter->securitypriv.dot11DefKeylen[keyindex]=key->KeyLength;
925 padapter->securitypriv.dot11PrivacyKeyIndex=keyindex;
927 ret = rtw_set_802_11_add_wep(padapter, wep);
933 if(key->KeyIndex & 0x20000000){
935 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("OID_802_11_ADD_KEY: +++++ SetRSC+++++\n"));
938 NDIS_802_11_KEY_RSC keysrc=key->KeyRSC & 0x00FFFFFFFFFFFFULL;
939 memcpy(&padapter->securitypriv.dot11Grprxpn, &keysrc, 8);
943 NDIS_802_11_KEY_RSC keysrc=key->KeyRSC & 0x00FFFFFFFFFFFFULL;
944 memcpy(&padapter->securitypriv.dot11Grptxpn, &keysrc, 8);
949 /* Indicate this key idx is used for TX */
950 /* Save the key in KeyMaterial */
951 if(bgroup == _TRUE) /* Group transmit key */
955 if(bgrouptkey == _TRUE)
957 padapter->securitypriv.dot118021XGrpKeyid=(u8)key->KeyIndex;
960 if((key->KeyIndex&0x3) == 0){
965 memset(&padapter->securitypriv.dot118021XGrpKey[(u8)((key->KeyIndex) & 0x03)], 0, 16);
966 memset(&padapter->securitypriv.dot118021XGrptxmickey[(u8)((key->KeyIndex) & 0x03)], 0, 16);
967 memset(&padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)], 0, 16);
969 if((key->KeyIndex & 0x10000000))
971 memcpy(&padapter->securitypriv.dot118021XGrptxmickey[(u8)((key->KeyIndex) & 0x03)], key->KeyMaterial + 16, 8);
972 memcpy(&padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)], key->KeyMaterial + 24, 8);
974 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("\n rtw_set_802_11_add_key:rx mic :0x%02x:0x%02x:0x%02x:0x%02x:0x%02x:0x%02x:0x%02x:0x%02x\n",
975 padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)].skey[0],padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex-1) & 0x03)].skey[1],
976 padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)].skey[2],padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex-1) & 0x03)].skey[3],
977 padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)].skey[4],padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex-1) & 0x03)].skey[5],
978 padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)].skey[6],padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex-1) & 0x03)].skey[7]));
979 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("\n rtw_set_802_11_add_key:set Group mic key!!!!!!!!\n"));
984 memcpy(&padapter->securitypriv.dot118021XGrptxmickey[(u8)((key->KeyIndex) & 0x03)], key->KeyMaterial + 24, 8);
985 memcpy(&padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)], key->KeyMaterial + 16, 8);
987 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("\n rtw_set_802_11_add_key:rx mic :0x%02x:0x%02x:0x%02x:0x%02x:0x%02x:0x%02x:0x%02x:0x%02x\n",
988 padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)].skey[0],padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex-1) & 0x03)].skey[1],
989 padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)].skey[2],padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex-1) & 0x03)].skey[3],
990 padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)].skey[4],padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex-1) & 0x03)].skey[5],
991 padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex) & 0x03)].skey[6],padapter->securitypriv.dot118021XGrprxmickey[(u8)((key->KeyIndex-1) & 0x03)].skey[7]));
992 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("\n rtw_set_802_11_add_key:set Group mic key!!!!!!!!\n"));
996 /* set group key by index */
997 memcpy(&padapter->securitypriv.dot118021XGrpKey[(u8)((key->KeyIndex) & 0x03)], key->KeyMaterial, key->KeyLength);
999 key->KeyIndex=key->KeyIndex & 0x03;
1001 padapter->securitypriv.binstallGrpkey=_TRUE;
1003 padapter->securitypriv.bcheck_grpkey=_FALSE;
1005 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("reset group key"));
1007 res=rtw_set_key(padapter,&padapter->securitypriv, key->KeyIndex, 1);
1015 else /* Pairwise Key */
1019 pbssid=get_bssid(&padapter->mlmepriv);
1020 stainfo=rtw_get_stainfo(&padapter->stapriv , pbssid );
1024 memcpy(&stainfo->dot118021x_UncstKey, key->KeyMaterial, 16);
1026 if(encryptionalgo== _TKIP_)
1028 padapter->securitypriv.busetkipkey=_FALSE;
1030 /* _set_timer(&padapter->securitypriv.tkip_timer, 50); */
1032 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("\n ==========_set_timer\n"));
1034 /* if TKIP, save the Receive/Transmit MIC key in KeyMaterial[128-255] */
1035 if((key->KeyIndex & 0x10000000)){
1036 memcpy(&stainfo->dot11tkiptxmickey, key->KeyMaterial + 16, 8);
1037 memcpy(&stainfo->dot11tkiprxmickey, key->KeyMaterial + 24, 8);
1040 memcpy(&stainfo->dot11tkiptxmickey, key->KeyMaterial + 24, 8);
1041 memcpy(&stainfo->dot11tkiprxmickey, key->KeyMaterial + 16, 8);
1046 else if(encryptionalgo == _AES_)
1051 /* Set key to CAM through H2C command */
1052 if(bgrouptkey)/* never go to here */
1054 res=rtw_setstakey_cmd(padapter, (unsigned char *)stainfo, _FALSE);
1055 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("\n rtw_set_802_11_add_key:rtw_setstakey_cmd(group)\n"));
1058 res=rtw_setstakey_cmd(padapter, (unsigned char *)stainfo, _TRUE);
1059 RT_TRACE(_module_rtl871x_ioctl_set_c_,_drv_err_,("\n rtw_set_802_11_add_key:rtw_setstakey_cmd(unicast)\n"));
1076 u8 rtw_set_802_11_remove_key(_adapter* padapter, NDIS_802_11_REMOVE_KEY *key){
1078 uint encryptionalgo;
1080 struct sta_info *stainfo;
1081 u8 bgroup = (key->KeyIndex & 0x4000000) > 0 ? _FALSE: _TRUE;
1082 u8 keyIndex = (u8)key->KeyIndex & 0x03;
1087 if ((key->KeyIndex & 0xbffffffc) > 0) {
1092 if (bgroup == _TRUE) {
1093 encryptionalgo= padapter->securitypriv.dot118021XGrpPrivacy;
1094 /* clear group key by index */
1095 /* NdisZeroMemory(Adapter->MgntInfo.SecurityInfo.KeyBuf[keyIndex], MAX_WEP_KEY_LEN); */
1096 /* Adapter->MgntInfo.SecurityInfo.KeyLen[keyIndex] = 0; */
1098 memset(&padapter->securitypriv.dot118021XGrpKey[keyIndex], 0, 16);
1100 /* \todo Send a H2C Command to Firmware for removing this Key in CAM Entry. */
1104 pbssid=get_bssid(&padapter->mlmepriv);
1105 stainfo=rtw_get_stainfo(&padapter->stapriv , pbssid );
1107 encryptionalgo=stainfo->dot118021XPrivacy;
1109 /* clear key by BSSID */
1110 memset(&stainfo->dot118021x_UncstKey, 0, 16);
1112 /* \todo Send a H2C Command to Firmware for disable this Key in CAM Entry. */
1129 * rtw_get_cur_max_rate -
1130 * @adapter: pointer to _adapter structure
1132 * Return 0 or 100Kbps
1134 u16 rtw_get_cur_max_rate(_adapter *adapter)
1138 u16 rate = 0, max_rate = 0;
1139 struct mlme_ext_priv *pmlmeext = &adapter->mlmeextpriv;
1140 struct mlme_ext_info *pmlmeinfo = &(pmlmeext->mlmext_info);
1141 struct registry_priv *pregistrypriv = &adapter->registrypriv;
1142 struct mlme_priv *pmlmepriv = &adapter->mlmepriv;
1143 WLAN_BSSID_EX *pcur_bss = &pmlmepriv->cur_network.network;
1144 #ifdef CONFIG_80211N_HT
1145 struct ieee80211_ht_cap *pht_capie;
1147 u8 bw_40MHz=0, short_GI_20=0, short_GI_40=0;
1152 if((check_fwstate(pmlmepriv, _FW_LINKED) != _TRUE)
1153 && (check_fwstate(pmlmepriv, WIFI_ADHOC_MASTER_STATE) != _TRUE))
1156 #ifdef CONFIG_80211N_HT
1157 if (pmlmeext->cur_wireless_mode & (WIRELESS_11_24N|WIRELESS_11_5N)) {
1158 p = rtw_get_ie(&pcur_bss->IEs[12], _HT_CAPABILITY_IE_, &ht_ielen, pcur_bss->IELength-12);
1161 pht_capie = (struct ieee80211_ht_cap *)(p+2);
1163 memcpy(&mcs_rate , &pht_capie->mcs, 2);
1165 /* bw_40MHz = (pht_capie->cap_info&IEEE80211_HT_CAP_SUP_WIDTH_20_40) ? 1:0; */
1166 /* cur_bwmod is updated by beacon, pmlmeinfo is updated by association response */
1167 bw_40MHz = (pmlmeext->cur_bwmode && (HT_INFO_HT_PARAM_REC_TRANS_CHNL_WIDTH & pmlmeinfo->HT_info.infos[0])) ? 1:0;
1169 /* short_GI = (pht_capie->cap_info&(IEEE80211_HT_CAP_SGI_20|IEEE80211_HT_CAP_SGI_40)) ? 1:0; */
1170 short_GI_20 = (pmlmeinfo->HT_caps.u.HT_cap_element.HT_caps_info&IEEE80211_HT_CAP_SGI_20) ? 1:0;
1171 short_GI_40 = (pmlmeinfo->HT_caps.u.HT_cap_element.HT_caps_info&IEEE80211_HT_CAP_SGI_40) ? 1:0;
1173 rtw_hal_get_hwreg(adapter, HW_VAR_RF_TYPE, (u8 *)(&rf_type));
1174 max_rate = rtw_mcs_rate(
1176 bw_40MHz & (pregistrypriv->cbw40_enable),
1179 pmlmeinfo->HT_caps.u.HT_cap_element.MCS_rate
1184 #endif /* CONFIG_80211N_HT */
1186 while( (pcur_bss->SupportedRates[i]!=0) && (pcur_bss->SupportedRates[i]!=0xFF))
1188 rate = pcur_bss->SupportedRates[i]&0x7F;
1194 max_rate = max_rate*10/2;
1201 * rtw_set_scan_mode -
1202 * @adapter: pointer to _adapter structure
1205 * Return _SUCCESS or _FAIL
1207 int rtw_set_scan_mode(_adapter *adapter, RT_SCAN_TYPE scan_mode)
1209 if(scan_mode != SCAN_ACTIVE && scan_mode != SCAN_PASSIVE)
1212 adapter->mlmepriv.scan_mode = scan_mode;
1218 * rtw_set_channel_plan -
1219 * @adapter: pointer to _adapter structure
1222 * Return _SUCCESS or _FAIL
1224 int rtw_set_channel_plan(_adapter *adapter, u8 channel_plan)
1226 struct registry_priv *pregistrypriv = &adapter->registrypriv;
1227 struct mlme_priv *pmlmepriv = &adapter->mlmepriv;
1229 /* handle by cmd_thread to sync with scan operation */
1230 return rtw_set_chplan_cmd(adapter, channel_plan, 1);
1235 * @adapter: pointer to _adapter structure
1236 * @country_code: string of country code
1238 * Return _SUCCESS or _FAIL
1240 int rtw_set_country(_adapter *adapter, const char *country_code)
1242 int channel_plan = RT_CHANNEL_DOMAIN_WORLD_WIDE_5G;
1244 DBG_8723A("%s country_code:%s\n", __func__, country_code);
1246 /* TODO: should have a table to match country code and RT_CHANNEL_DOMAIN */
1247 /* TODO: should consider 2-character and 3-character country code */
1248 if(0 == strcmp(country_code, "US"))
1249 channel_plan = RT_CHANNEL_DOMAIN_FCC;
1250 else if(0 == strcmp(country_code, "EU"))
1251 channel_plan = RT_CHANNEL_DOMAIN_ETSI;
1252 else if(0 == strcmp(country_code, "JP"))
1253 channel_plan = RT_CHANNEL_DOMAIN_MKK;
1254 else if(0 == strcmp(country_code, "CN"))
1255 channel_plan = RT_CHANNEL_DOMAIN_CHINA;
1257 DBG_8723A("%s unknown country_code:%s\n", __FUNCTION__, country_code);
1259 return rtw_set_channel_plan(adapter, channel_plan);