if(!buff)
return;
- _rtw_memcpy(buff, msg, strlen(msg));
+ memcpy(buff, msg, strlen(msg));
_rtw_memset(&wrqu,0,sizeof(wrqu));
wrqu.data.length = strlen(msg);
wrqu.ap_addr.sa_family = ARPHRD_ETHER;
- _rtw_memcpy(wrqu.ap_addr.sa_data, pmlmepriv->cur_network.network.MacAddress, ETH_ALEN);
+ memcpy(wrqu.ap_addr.sa_data, pmlmepriv->cur_network.network.MacAddress, ETH_ALEN);
DBG_8723A_LEVEL(_drv_always_, "assoc success\n");
#ifndef CONFIG_IOCTL_CFG80211
iwe.cmd = SIOCGIWAP;
iwe.u.ap_addr.sa_family = ARPHRD_ETHER;
- _rtw_memcpy(iwe.u.ap_addr.sa_data, pnetwork->network.MacAddress, ETH_ALEN);
+ memcpy(iwe.u.ap_addr.sa_data, pnetwork->network.MacAddress, ETH_ALEN);
start = iwe_stream_add_event(info, start, stop, &iwe, IW_EV_ADDR_LEN);
/* Add the ESSID */
struct rtw_ieee80211_ht_cap *pht_capie;
ht_cap = _TRUE;
pht_capie = (struct rtw_ieee80211_ht_cap *)(p+2);
- _rtw_memcpy(&mcs_rate , pht_capie->supp_mcs_set, 2);
+ memcpy(&mcs_rate , pht_capie->supp_mcs_set, 2);
bw_40MHz = (pht_capie->cap_info&IEEE80211_HT_CAP_SUP_WIDTH) ? 1:0;
short_GI = (pht_capie->cap_info&(IEEE80211_HT_CAP_SGI_20|IEEE80211_HT_CAP_SGI_40)) ? 1:0;
}
/* Add mode */
iwe.cmd = SIOCGIWMODE;
- _rtw_memcpy((u8 *)&cap, rtw_get_capability_from_ie(pnetwork->network.IEs), 2);
+ memcpy((u8 *)&cap, rtw_get_capability_from_ie(pnetwork->network.IEs), 2);
cap = le16_to_cpu(cap);
pwep->KeyIndex = wep_key_idx;
pwep->KeyIndex |= 0x80000000;
- _rtw_memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength);
+ memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength);
if(param->u.crypt.set_tx)
{
goto exit;
}
- _rtw_memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
+ memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
psecuritypriv->dot11DefKeylen[wep_key_idx]=pwep->KeyLength;
rtw_set_key(padapter, psecuritypriv, wep_key_idx, 0);
}
if(param->u.crypt.set_tx ==1)//pairwise key
{
- _rtw_memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
+ memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
if(strcmp(param->u.crypt.alg, "TKIP") == 0)//set mic key
{
//DEBUG_ERR(("\nset key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len));
- _rtw_memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
- _rtw_memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
+ memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
+ memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
padapter->securitypriv.busetkipkey=_FALSE;
//_set_timer(&padapter->securitypriv.tkip_timer, 50);
}
else//group key
{
- _rtw_memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key,(param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
- _rtw_memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey,&(param->u.crypt.key[16]),8);
- _rtw_memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey,&(param->u.crypt.key[24]),8);
+ memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key,(param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
+ memcpy(padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey,&(param->u.crypt.key[16]),8);
+ memcpy(padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey,&(param->u.crypt.key[24]),8);
padapter->securitypriv.binstallGrpkey = _TRUE;
//DEBUG_ERR((" param->u.crypt.key_len=%d\n", param->u.crypt.key_len));
DBG_8723A(" ~~~~set sta key:groupkey\n");
list_for_each_entry(pWapiSta, &pWapiInfo->wapiSTAUsedList, list) {
if(_rtw_memcmp(pWapiSta->PeerMacAddr,param->sta_addr,6))
{
- _rtw_memcpy(pWapiSta->lastTxUnicastPN,WapiASUEPNInitialValueSrc,16);
+ memcpy(pWapiSta->lastTxUnicastPN,WapiASUEPNInitialValueSrc,16);
pWapiSta->wapiUsk.bSet = true;
- _rtw_memcpy(pWapiSta->wapiUsk.dataKey,param->u.crypt.key,16);
- _rtw_memcpy(pWapiSta->wapiUsk.micKey,param->u.crypt.key+16,16);
+ memcpy(pWapiSta->wapiUsk.dataKey,param->u.crypt.key,16);
+ memcpy(pWapiSta->wapiUsk.micKey,param->u.crypt.key+16,16);
pWapiSta->wapiUsk.keyId = param->u.crypt.idx ;
pWapiSta->wapiUsk.bTxEnable = true;
- _rtw_memcpy(pWapiSta->lastRxUnicastPNBEQueue,WapiAEPNInitialValueSrc,16);
- _rtw_memcpy(pWapiSta->lastRxUnicastPNBKQueue,WapiAEPNInitialValueSrc,16);
- _rtw_memcpy(pWapiSta->lastRxUnicastPNVIQueue,WapiAEPNInitialValueSrc,16);
- _rtw_memcpy(pWapiSta->lastRxUnicastPNVOQueue,WapiAEPNInitialValueSrc,16);
- _rtw_memcpy(pWapiSta->lastRxUnicastPN,WapiAEPNInitialValueSrc,16);
+ memcpy(pWapiSta->lastRxUnicastPNBEQueue,WapiAEPNInitialValueSrc,16);
+ memcpy(pWapiSta->lastRxUnicastPNBKQueue,WapiAEPNInitialValueSrc,16);
+ memcpy(pWapiSta->lastRxUnicastPNVIQueue,WapiAEPNInitialValueSrc,16);
+ memcpy(pWapiSta->lastRxUnicastPNVOQueue,WapiAEPNInitialValueSrc,16);
+ memcpy(pWapiSta->lastRxUnicastPN,WapiAEPNInitialValueSrc,16);
pWapiSta->wapiUskUpdate.bTxEnable = false;
pWapiSta->wapiUskUpdate.bSet = false;
if(_rtw_memcmp(pWapiSta->PeerMacAddr,get_bssid(pmlmepriv),6))
{
pWapiSta->wapiMsk.bSet = true;
- _rtw_memcpy(pWapiSta->wapiMsk.dataKey,param->u.crypt.key,16);
- _rtw_memcpy(pWapiSta->wapiMsk.micKey,param->u.crypt.key+16,16);
+ memcpy(pWapiSta->wapiMsk.dataKey,param->u.crypt.key,16);
+ memcpy(pWapiSta->wapiMsk.micKey,param->u.crypt.key+16,16);
pWapiSta->wapiMsk.keyId = param->u.crypt.idx ;
pWapiSta->wapiMsk.bTxEnable = false;
if(!pWapiSta->bSetkeyOk)
pWapiSta->bSetkeyOk = true;
pWapiSta->bAuthenticateInProgress = false;
- _rtw_memcpy(pWapiSta->lastRxMulticastPN, WapiAEMultiCastPNInitialValueSrc, 16);
+ memcpy(pWapiSta->lastRxMulticastPN, WapiAEMultiCastPNInitialValueSrc, 16);
if (psecuritypriv->sw_decrypt == false)
{
goto exit;
}
- _rtw_memcpy(buf, pie , ielen);
+ memcpy(buf, pie , ielen);
//dump
{
{
padapter->securitypriv.dot11AuthAlgrthm= dot11AuthAlgrthm_8021X;
padapter->securitypriv.ndisauthtype=Ndis802_11AuthModeWPAPSK;
- _rtw_memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
+ memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
}
if(rtw_parse_wpa2_ie(buf, ielen, &group_cipher, &pairwise_cipher, NULL) == _SUCCESS)
{
padapter->securitypriv.dot11AuthAlgrthm= dot11AuthAlgrthm_8021X;
padapter->securitypriv.ndisauthtype=Ndis802_11AuthModeWPA2PSK;
- _rtw_memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
+ memcpy(padapter->securitypriv.supplicant_ie, &buf[0], ielen);
}
if (group_cipher == 0)
padapter->securitypriv.wps_ie_len = ( (buf[cnt+1]+2) < (MAX_WPA_IE_LEN<<2)) ? (buf[cnt+1]+2):(MAX_WPA_IE_LEN<<2);
- _rtw_memcpy(padapter->securitypriv.wps_ie, &buf[cnt], padapter->securitypriv.wps_ie_len);
+ memcpy(padapter->securitypriv.wps_ie, &buf[cnt], padapter->securitypriv.wps_ie_len);
set_fwstate(&padapter->mlmepriv, WIFI_UNDER_WPS);
If cmd is IW_PMKSA_REMOVE, it means the wpa_supplicant wants to remove a PMKID/BSSID from driver.
*/
- _rtw_memcpy( strIssueBssid, pPMK->bssid.sa_data, ETH_ALEN);
+ memcpy(strIssueBssid, pPMK->bssid.sa_data, ETH_ALEN);
if ( pPMK->cmd == IW_PMKSA_ADD )
{
DBG_8723A( "[rtw_wx_set_pmkid] IW_PMKSA_ADD!\n" );
DBG_8723A( "[rtw_wx_set_pmkid] BSSID exists in the PMKList.\n" );
- _rtw_memcpy( psecuritypriv->PMKIDList[j].PMKID, pPMK->pmkid, IW_PMKID_LEN);
+ memcpy(psecuritypriv->PMKIDList[j].PMKID, pPMK->pmkid, IW_PMKID_LEN);
psecuritypriv->PMKIDList[ j ].bUsed = _TRUE;
psecuritypriv->PMKIDIndex = j+1;
blInserted = _TRUE;
DBG_8723A( "[rtw_wx_set_pmkid] Use the new entry index = %d for this PMKID.\n",
psecuritypriv->PMKIDIndex );
- _rtw_memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, strIssueBssid, ETH_ALEN);
- _rtw_memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, pPMK->pmkid, IW_PMKID_LEN);
+ memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].Bssid, strIssueBssid, ETH_ALEN);
+ memcpy(psecuritypriv->PMKIDList[psecuritypriv->PMKIDIndex].PMKID, pPMK->pmkid, IW_PMKID_LEN);
psecuritypriv->PMKIDList[ psecuritypriv->PMKIDIndex ].bUsed = _TRUE;
psecuritypriv->PMKIDIndex++ ;
((check_fwstate(pmlmepriv, WIFI_AP_STATE)) == _TRUE) )
{
- _rtw_memcpy(wrqu->ap_addr.sa_data, pcur_bss->MacAddress, ETH_ALEN);
+ memcpy(wrqu->ap_addr.sa_data, pcur_bss->MacAddress, ETH_ALEN);
}
else
{
{
int len = min((int)req->essid_len, IW_ESSID_MAX_SIZE);
- _rtw_memcpy(ssid[0].Ssid, req->essid, len);
+ memcpy(ssid[0].Ssid, req->essid, len);
ssid[0].SsidLength = len;
DBG_8723A("IW_SCAN_THIS_ESSID, ssid=%s, len=%d\n", req->essid, req->essid_len);
if(sec_len>0 && sec_len<=len) {
ssid[ssid_index].SsidLength = sec_len;
- _rtw_memcpy(ssid[ssid_index].Ssid, pos, ssid[ssid_index].SsidLength);
+ memcpy(ssid[ssid_index].Ssid, pos, ssid[ssid_index].SsidLength);
//DBG_8723A("%s COMBO_SCAN with specific ssid:%s, %d\n", __func__
// , ssid[ssid_index].Ssid, ssid[ssid_index].SsidLength);
ssid_index++;
_rtw_memset(&ndis_ssid, 0, sizeof(NDIS_802_11_SSID));
ndis_ssid.SsidLength = len;
- _rtw_memcpy(ndis_ssid.Ssid, extra, len);
+ memcpy(ndis_ssid.Ssid, extra, len);
src_ssid = ndis_ssid.Ssid;
RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_info_, ("rtw_wx_set_essid: ssid=[%s]\n", src_ssid));
wrqu->essid.length = len;
- _rtw_memcpy(extra, pcur_bss->Ssid.Ssid, len);
+ memcpy(extra, pcur_bss->Ssid.Ssid, len);
wrqu->essid.flags = 1;
}
wep.KeyIndex |= 0x80000000;
- _rtw_memcpy(wep.KeyMaterial, keybuf, wep.KeyLength);
+ memcpy(wep.KeyMaterial, keybuf, wep.KeyLength);
if (rtw_set_802_11_add_wep(padapter, &wep) == _FALSE) {
if(rf_on == pwrpriv->rf_pwrstate )
if(erq->length)
{
- _rtw_memcpy(keybuf, padapter->securitypriv.dot11DefKey[key].skey, padapter->securitypriv.dot11DefKeylen[key]);
+ memcpy(keybuf, padapter->securitypriv.dot11DefKey[key].skey, padapter->securitypriv.dot11DefKeylen[key]);
erq->flags |= IW_ENCODE_ENABLED;
#ifndef CONFIG_IOCTL_CFG80211
case IW_ENCODE_ALG_SM4:
alg_name= "SMS4";
- _rtw_memcpy(param->sta_addr, pext->addr.sa_data, ETH_ALEN);
+ memcpy(param->sta_addr, pext->addr.sa_data, ETH_ALEN);
DBG_8723A("rtw_wx_set_enc_ext: SMS4 case \n");
break;
#endif
#ifdef CONFIG_WAPI_SUPPORT
#ifndef CONFIG_IOCTL_CFG80211
if(pext->alg == IW_ENCODE_ALG_SM4)
- _rtw_memcpy(param->u.crypt.seq, pext->rx_seq, 16);
+ memcpy(param->u.crypt.seq, pext->rx_seq, 16);
else
#endif
#endif
- _rtw_memcpy(param->u.crypt.seq, pext->rx_seq, 8);
+ memcpy(param->u.crypt.seq, pext->rx_seq, 8);
}
if(pext->key_len)
{
param->u.crypt.key_len = pext->key_len;
- //_rtw_memcpy(param + 1, pext + 1, pext->key_len);
- _rtw_memcpy(param->u.crypt.key, pext + 1, pext->key_len);
+ //memcpy(param + 1, pext + 1, pext->key_len);
+ memcpy(param->u.crypt.key, pext + 1, pext->key_len);
}
if (pencoding->flags & IW_ENCODE_DISABLED)
{
wrqu->data.length = 14;
wrqu->data.flags = 1;
- _rtw_memcpy(extra, "<WIFI@REALTEK>", 14);
+ memcpy(extra, "<WIFI@REALTEK>", 14);
}
//rtw_signal_process(pid, SIGUSR1); //for test
ret = 0;
if (bset == 0x00) {//query info
- //_rtw_memcpy(p->pointer, pparmbuf, len);
+ //memcpy(p->pointer, pparmbuf, len);
if (copy_to_user(p->pointer, pparmbuf, len))
ret = -EFAULT;
}
struct wifidirect_info *pwdinfo= &(padapter->wdinfo);
DBG_8723A( "[%s] ssid = %s, len = %zu\n", __func__, extra, strlen( extra ) );
- _rtw_memcpy( pwdinfo->nego_ssid, extra, strlen( extra ) );
+ memcpy(pwdinfo->nego_ssid, extra, strlen( extra ) );
pwdinfo->nego_ssidlen = strlen( extra );
return ret;
}
pwdinfo->profileinfo[ pwdinfo->profileindex ].ssidlen = ( extra[18] - '0' ) * 10 + ( extra[ 19 ] - '0' );
- _rtw_memcpy( pwdinfo->profileinfo[ pwdinfo->profileindex ].ssid, &extra[ 20 ], pwdinfo->profileinfo[ pwdinfo->profileindex ].ssidlen );
+ memcpy(pwdinfo->profileinfo[ pwdinfo->profileindex ].ssid, &extra[ 20 ], pwdinfo->profileinfo[ pwdinfo->profileindex ].ssidlen );
pwdinfo->profileindex++;
}
}
DBG_8723A( "[%s] %s %d\n", __func__, extra, wrqu->data.length -1 );
_rtw_memset( pwdinfo->device_name, 0x00, WPS_MAX_DEVICE_NAME_LEN );
- _rtw_memcpy( pwdinfo->device_name, extra, wrqu->data.length - 1 );
+ memcpy(pwdinfo->device_name, extra, wrqu->data.length - 1 );
pwdinfo->device_name_len = wrqu->data.length - 1;
return ret;
}
wrqu->data.length = strlen(attr_content_str);
- _rtw_memcpy(extra, attr_content_str, wrqu->data.length);
+ memcpy(extra, attr_content_str, wrqu->data.length);
return ret;
}
wrqu->data.length = strlen(go_devadd_str);
- _rtw_memcpy(extra, go_devadd_str, wrqu->data.length);
+ memcpy(extra, go_devadd_str, wrqu->data.length);
return ret;
{
u16 type = 0;
- _rtw_memcpy(&type, dev_type, 2);
+ memcpy(&type, dev_type, 2);
type = be16_to_cpu(type);
sprintf(dev_type_str, "\n\nN=%.2d", type);
blnMatch = 1;
}
wrqu->data.length = strlen(dev_type_str);
- _rtw_memcpy(extra, dev_type_str, wrqu->data.length);
+ memcpy(extra, dev_type_str, wrqu->data.length);
return ret;
}
wrqu->data.length = strlen(dev_name_str);
- _rtw_memcpy(extra, dev_name_str, wrqu->data.length);
+ memcpy(extra, dev_name_str, wrqu->data.length);
return ret;
}
wrqu->data.length = strlen(inv_proc_str);
- _rtw_memcpy(extra, inv_proc_str, wrqu->data.length);
+ memcpy(extra, inv_proc_str, wrqu->data.length);
return ret;
}
_rtw_memset( &pwdinfo->groupid_info, 0x00, sizeof( struct group_id_info ) );
pwdinfo->nego_req_info.peer_channel_num[ 0 ] = uintPeerChannel;
- _rtw_memcpy( pwdinfo->nego_req_info.peerDevAddr, pnetwork->network.MacAddress, ETH_ALEN );
+ memcpy(pwdinfo->nego_req_info.peerDevAddr, pnetwork->network.MacAddress, ETH_ALEN );
pwdinfo->nego_req_info.benable = _TRUE;
_cancel_timer_ex( &pwdinfo->restore_p2p_state_timer );
// Store the GO's ssid
pinvite_req_info->ssidlen = wrqu->data.length - 36;
- _rtw_memcpy( pinvite_req_info->go_ssid, &extra[ 36 ], (u32) pinvite_req_info->ssidlen );
+ memcpy(pinvite_req_info->go_ssid, &extra[ 36 ], (u32) pinvite_req_info->ssidlen );
pinvite_req_info->benable = _TRUE;
pinvite_req_info->peer_ch = uintPeerChannel;
_cancel_timer_ex( &pwdinfo->ap_p2p_switch_timer );
}
#endif // CONFIG_CONCURRENT_MODE
- _rtw_memcpy( pwdinfo->tx_prov_disc_info.peerIFAddr, pnetwork->network.MacAddress, ETH_ALEN );
- _rtw_memcpy( pwdinfo->tx_prov_disc_info.peerDevAddr, peerMAC, ETH_ALEN );
+ memcpy(pwdinfo->tx_prov_disc_info.peerIFAddr, pnetwork->network.MacAddress, ETH_ALEN );
+ memcpy(pwdinfo->tx_prov_disc_info.peerDevAddr, peerMAC, ETH_ALEN );
pwdinfo->tx_prov_disc_info.peer_channel_num[0] = ( u16 ) uintPeerChannel;
pwdinfo->tx_prov_disc_info.benable = _TRUE;
rtw_p2p_set_pre_state(pwdinfo, rtw_p2p_state(pwdinfo));
if(rtw_p2p_chk_role(pwdinfo, P2P_ROLE_CLIENT))
{
- _rtw_memcpy( &pwdinfo->tx_prov_disc_info.ssid, &pnetwork->network.Ssid, sizeof( NDIS_802_11_SSID ) );
+ memcpy(&pwdinfo->tx_prov_disc_info.ssid, &pnetwork->network.Ssid, sizeof( NDIS_802_11_SSID ) );
}
else if(rtw_p2p_chk_role(pwdinfo, P2P_ROLE_DEVICE) || rtw_p2p_chk_role(pwdinfo, P2P_ROLE_GO))
{
- _rtw_memcpy( pwdinfo->tx_prov_disc_info.ssid.Ssid, pwdinfo->p2p_wildcard_ssid, P2P_WILDCARD_SSID_LEN );
+ memcpy(pwdinfo->tx_prov_disc_info.ssid.Ssid, pwdinfo->p2p_wildcard_ssid, P2P_WILDCARD_SSID_LEN );
pwdinfo->tx_prov_disc_info.ssid.SsidLength= P2P_WILDCARD_SSID_LEN;
}
psetstakey_para->algorithm = (u8)psta->dot118021XPrivacy;
- _rtw_memcpy(psetstakey_para->addr, psta->hwaddr, ETH_ALEN);
+ memcpy(psetstakey_para->addr, psta->hwaddr, ETH_ALEN);
- _rtw_memcpy(psetstakey_para->key, &psta->dot118021x_UncstKey, 16);
+ memcpy(psetstakey_para->key, &psta->dot118021x_UncstKey, 16);
res = rtw_enqueue_cmd(pcmdpriv, ph2c);
default:
keylen = 16;
}
- _rtw_memcpy(&(psetkeyparm->key[0]), key, keylen);
+ memcpy(&(psetkeyparm->key[0]), key, keylen);
pcmd->cmdcode = _SetKey_CMD_;
pcmd->parmbuf = (u8 *)psetkeyparm;
pcmd->cmdsz = (sizeof(struct setkey_parm));
pwep->KeyIndex = wep_key_idx;
- _rtw_memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength);
+ memcpy(pwep->KeyMaterial, param->u.crypt.key, pwep->KeyLength);
if(param->u.crypt.set_tx)
{
psecuritypriv->dot11PrivacyKeyIndex = wep_key_idx;
- _rtw_memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
+ memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
psecuritypriv->dot11DefKeylen[wep_key_idx]=pwep->KeyLength;
//don't update "psecuritypriv->dot11PrivacyAlgrthm" and
//"psecuritypriv->dot11PrivacyKeyIndex=keyid", but can rtw_set_key to cam
- _rtw_memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
+ memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), pwep->KeyMaterial, pwep->KeyLength);
psecuritypriv->dot11DefKeylen[wep_key_idx] = pwep->KeyLength;
{
DBG_8723A("%s, set group_key, WEP\n", __func__);
- _rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
+ memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
if(param->u.crypt.key_len==13)
psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
- _rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
+ memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
//DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len);
//set mic key
- _rtw_memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
- _rtw_memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
+ memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
+ memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
psecuritypriv->busetkipkey = _TRUE;
psecuritypriv->dot118021XGrpPrivacy = _AES_;
- _rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
+ memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
}
else
{
{
if(param->u.crypt.set_tx ==1)
{
- _rtw_memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
+ memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
if(strcmp(param->u.crypt.alg, "WEP") == 0)
{
//DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len);
//set mic key
- _rtw_memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
- _rtw_memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
+ memcpy(psta->dot11tkiptxmickey.skey, &(param->u.crypt.key[16]), 8);
+ memcpy(psta->dot11tkiprxmickey.skey, &(param->u.crypt.key[24]), 8);
psecuritypriv->busetkipkey = _TRUE;
{
if(strcmp(param->u.crypt.alg, "WEP") == 0)
{
- _rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
+ memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
psecuritypriv->dot118021XGrpPrivacy = _WEP40_;
if(param->u.crypt.key_len==13)
{
psecuritypriv->dot118021XGrpPrivacy = _TKIP_;
- _rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
+ memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
//DEBUG_ERR("set key length :param->u.crypt.key_len=%d\n", param->u.crypt.key_len);
//set mic key
- _rtw_memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
- _rtw_memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
+ memcpy(psecuritypriv->dot118021XGrptxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[16]), 8);
+ memcpy(psecuritypriv->dot118021XGrprxmickey[param->u.crypt.idx].skey, &(param->u.crypt.key[24]), 8);
psecuritypriv->busetkipkey = _TRUE;
{
psecuritypriv->dot118021XGrpPrivacy = _AES_;
- _rtw_memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
+ memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len>16 ?16:param->u.crypt.key_len));
}
else
{
if(check_fwstate(pmlmepriv, WIFI_AP_STATE) != _TRUE)
return -EINVAL;
- _rtw_memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2);
+ memcpy(&pstapriv->max_num_sta, param->u.bcn_ie.reserved, 2);
if((pstapriv->max_num_sta>NUM_STA) || (pstapriv->max_num_sta<=0))
pstapriv->max_num_sta = NUM_STA;
psta->aid = param->u.add_sta.aid;//aid=1~2007
- _rtw_memcpy(psta->bssrateset, param->u.add_sta.tx_supp_rates, 16);
+ memcpy(psta->bssrateset, param->u.add_sta.tx_supp_rates, 16);
//check wmm cap.
{
psta->htpriv.ht_option = _TRUE;
psta->qos_option = 1;
- _rtw_memcpy((void*)&psta->htpriv.ht_cap, (void*)¶m->u.add_sta.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
+ memcpy((void*)&psta->htpriv.ht_cap, (void*)¶m->u.add_sta.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
}
else
{
(psta->ht_20mhz_set <<5));
psta_data->tx_supp_rates_len = psta->bssratelen;
- _rtw_memcpy(psta_data->tx_supp_rates, psta->bssrateset, psta->bssratelen);
+ memcpy(psta_data->tx_supp_rates, psta->bssrateset, psta->bssratelen);
#ifdef CONFIG_80211N_HT
- _rtw_memcpy(&psta_data->ht_cap, &psta->htpriv.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
+ memcpy(&psta_data->ht_cap, &psta->htpriv.ht_cap, sizeof(struct rtw_ieee80211_ht_cap));
#endif //CONFIG_80211N_HT
psta_data->rx_pkts = psta->sta_stats.rx_data_pkts;
psta_data->rx_bytes = psta->sta_stats.rx_bytes;
param->u.wpa_ie.len = copy_len;
- _rtw_memcpy(param->u.wpa_ie.reserved, psta->wpa_ie, copy_len);
+ memcpy(param->u.wpa_ie.reserved, psta->wpa_ie, copy_len);
}
else
{
return -EINVAL;
}
- _rtw_memcpy(pmlmepriv->wps_beacon_ie, param->u.bcn_ie.buf, ie_len);
+ memcpy(pmlmepriv->wps_beacon_ie, param->u.bcn_ie.buf, ie_len);
update_beacon(padapter, _VENDOR_SPECIFIC_IE_, wps_oui, _TRUE);
DBG_8723A("%s()-%d: rtw_malloc() ERROR!\n", __func__, __LINE__);
return -EINVAL;
}
- _rtw_memcpy(pmlmepriv->wps_probe_resp_ie, param->u.bcn_ie.buf, ie_len);
+ memcpy(pmlmepriv->wps_probe_resp_ie, param->u.bcn_ie.buf, ie_len);
}
return -EINVAL;
}
- _rtw_memcpy(pmlmepriv->wps_assoc_resp_ie, param->u.bcn_ie.buf, ie_len);
+ memcpy(pmlmepriv->wps_assoc_resp_ie, param->u.bcn_ie.buf, ie_len);
}
WLAN_BSSID_EX *pbss_network = &mlmepriv->cur_network.network;
WLAN_BSSID_EX *pbss_network_ext = &mlmeinfo->network;
- _rtw_memcpy(ssid, ssid_ie+2, ssid_len);
+ memcpy(ssid, ssid_ie+2, ssid_len);
ssid[ssid_len>NDIS_802_11_LENGTH_SSID?NDIS_802_11_LENGTH_SSID:ssid_len] = 0x0;
if(0)
pbss_network->Ssid.Ssid, pbss_network->Ssid.SsidLength,
pbss_network_ext->Ssid.Ssid, pbss_network_ext->Ssid.SsidLength);
- _rtw_memcpy(pbss_network->Ssid.Ssid, (void *)ssid, ssid_len);
+ memcpy(pbss_network->Ssid.Ssid, (void *)ssid, ssid_len);
pbss_network->Ssid.SsidLength = ssid_len;
- _rtw_memcpy(pbss_network_ext->Ssid.Ssid, (void *)ssid, ssid_len);
+ memcpy(pbss_network_ext->Ssid.Ssid, (void *)ssid, ssid_len);
pbss_network_ext->Ssid.SsidLength = ssid_len;
if(0)
return -ENOMEM;
}
- _rtw_memcpy(ext_dbg, ext, len);
+ memcpy(ext_dbg, ext, len);
#endif
//added for wps2.0 @20110524
{
cp_sz = probereq_wpsie_len>MAX_WPS_IE_LEN ? MAX_WPS_IE_LEN:probereq_wpsie_len;
- //_rtw_memcpy(pmlmepriv->probereq_wpsie, probereq_wpsie, cp_sz);
+ //memcpy(pmlmepriv->probereq_wpsie, probereq_wpsie, cp_sz);
//pmlmepriv->probereq_wpsie_len = cp_sz;
if(pmlmepriv->wps_probe_req_ie)
{
}
- _rtw_memcpy(pmlmepriv->wps_probe_req_ie, probereq_wpsie, cp_sz);
+ memcpy(pmlmepriv->wps_probe_req_ie, probereq_wpsie, cp_sz);
pmlmepriv->wps_probe_req_ie_len = cp_sz;
}
if(psta->tdls_sta_state != TDLS_STATE_NONE)
{
- _rtw_memcpy(tdls_sta[index], psta->hwaddr, ETH_ALEN);
+ memcpy(tdls_sta[index], psta->hwaddr, ETH_ALEN);
}
}
}
pbuf = kmalloc(sizeof(l2_msg_t), GFP_KERNEL);
if(pbuf) {
- _rtw_memcpy(pbuf, wrqu->data.pointer, wrqu->data.length);
+ memcpy(pbuf, wrqu->data.pointer, wrqu->data.length);
intel_widi_wk_cmd(padapter, INTEL_WIDI_ISSUE_PROB_WK, pbuf);
}
return ret;
passoc_ssid = &pmlmepriv->assoc_ssid;
_rtw_memset(passoc_ssid, 0, sizeof(NDIS_802_11_SSID));
passoc_ssid->SsidLength = sizeof(ssid) - 1;
- _rtw_memcpy(passoc_ssid->Ssid, ssid, passoc_ssid->SsidLength);
+ memcpy(passoc_ssid->Ssid, ssid, passoc_ssid->SsidLength);
pdev_network = &padapter->registrypriv.dev_network;
pibss = padapter->registrypriv.dev_network.MacAddress;
- _rtw_memcpy(&pdev_network->Ssid, passoc_ssid, sizeof(NDIS_802_11_SSID));
+ memcpy(&pdev_network->Ssid, passoc_ssid, sizeof(NDIS_802_11_SSID));
rtw_update_registrypriv_dev_network(padapter);
rtw_generate_random_ibss(pibss);
//3 join psudo AdHoc
pcur_network->join_res = 1;
pcur_network->aid = psta->aid = 1;
- _rtw_memcpy(&pcur_network->network, pdev_network, get_WLAN_BSSID_EX_sz(pdev_network));
+ memcpy(&pcur_network->network, pdev_network, get_WLAN_BSSID_EX_sz(pdev_network));
// set msr to WIFI_FW_ADHOC_STATE
#if 0
_rtw_memset(pattrib, 0, sizeof(struct pkt_attrib));
pattrib->ether_type = 0x8723;
- _rtw_memcpy(pattrib->src, padapter->eeprompriv.mac_addr, ETH_ALEN);
- _rtw_memcpy(pattrib->ta, pattrib->src, ETH_ALEN);
+ memcpy(pattrib->src, padapter->eeprompriv.mac_addr, ETH_ALEN);
+ memcpy(pattrib->ta, pattrib->src, ETH_ALEN);
_rtw_memset(pattrib->dst, 0xFF, ETH_ALEN);
- _rtw_memcpy(pattrib->ra, pattrib->dst, ETH_ALEN);
+ memcpy(pattrib->ra, pattrib->dst, ETH_ALEN);
// pattrib->pctrl = 0;
// pattrib->dhcp_pkt = 0;
// pattrib->pktlen = 0;
//3 5.1. make wlan header, make_wlanhdr()
hdr = (struct rtw_ieee80211_hdr *)pkt_start;
SetFrameSubType(&hdr->frame_ctl, pattrib->subtype);
- _rtw_memcpy(hdr->addr1, pattrib->dst, ETH_ALEN); // DA
- _rtw_memcpy(hdr->addr2, pattrib->src, ETH_ALEN); // SA
- _rtw_memcpy(hdr->addr3, get_bssid(&padapter->mlmepriv), ETH_ALEN); // RA, BSSID
+ memcpy(hdr->addr1, pattrib->dst, ETH_ALEN); // DA
+ memcpy(hdr->addr2, pattrib->src, ETH_ALEN); // SA
+ memcpy(hdr->addr3, get_bssid(&padapter->mlmepriv), ETH_ALEN); // RA, BSSID
//3 5.2. make payload
ptr = pkt_start + pattrib->hdrlen;
u8 n;
val = 0;
n = len - i;
- _rtw_memcpy(&val, pbuf+i, n);
+ memcpy(&val, pbuf+i, n);
sprintf(str, "%08X", val);
n = (4 - n) * 2;
printk("%8s", str+n);
}
ploopback->txsize = TXDESC_SIZE + pxmitframe->attrib.last_txcmdsz;
- _rtw_memcpy(ploopback->txbuf, pxmitframe->buf_addr, ploopback->txsize);
+ memcpy(ploopback->txbuf, pxmitframe->buf_addr, ploopback->txsize);
ff_hwaddr = rtw_get_ff_hwaddr(pxmitframe);
cnt++;
DBG_8723A("%s: write port cnt=%d size=%d\n", __func__, cnt, ploopback->txsize);
if (len) break;
rtw_msleep_os(1);
} while (1);
- _rtw_memcpy(pmsg, ploopback->msg, len+1);
+ memcpy(pmsg, ploopback->msg, len+1);
freeLoopback(padapter);
return;
union iwreq_data wdata;
- _rtw_memcpy(&wdata, wrq_data, sizeof(wdata));
+ memcpy(&wdata, wrq_data, sizeof(wdata));
input_len = wdata.data.length;
input = kzalloc(input_len, GFP_KERNEL);
wdata.data.length = priv_args[k].set_args & IW_PRIV_SIZE_MASK;
/* Fetch string */
- _rtw_memcpy(buffer, ptr, wdata.data.length);
+ memcpy(buffer, ptr, wdata.data.length);
}
else
{
/* First case : all SET args fit within wrq */
if (offset)
wdata.mode = subcmd;
- _rtw_memcpy(wdata.name + offset, buffer, IFNAMSIZ - offset);
+ memcpy(wdata.name + offset, buffer, IFNAMSIZ - offset);
}
else
{
err = -E2BIG;
goto exit;
}
- _rtw_memcpy(output+output_len, str, len);
+ memcpy(output+output_len, str, len);
}
break;
err = -E2BIG;
goto exit;
}
- _rtw_memcpy(output+output_len, str, len);
+ memcpy(output+output_len, str, len);
}
break;
case IW_PRIV_TYPE_CHAR:
/* Display args */
- _rtw_memcpy(output, extra, n);
+ memcpy(output, extra, n);
break;
default: