mirror of
https://github.com/nxp-imx/mwifiex.git
synced 2024-11-15 03:25:35 +00:00
33d9f8e4f3
Add initial MxM (multi-chip-multi-interface) wifi driver. The driver target is to support 88w8987/88w8997/88w9098, currently it only supports 88w8987. The MxM wifi driver is merged from below repo and applied some patches for block and build issues. ssh://git@bitbucket.sw.nxp.com/wcswrel/ rel-nxp-wifi-fp92-bt-fp85-linux-android-mxm4x17169-gpl.git The sdk only includes application, the driver already is merged into linux kernel. Signed-off-by: Fugang Duan <fugang.duan@nxp.com>
14536 lines
391 KiB
C
14536 lines
391 KiB
C
/** @file uaputl.c
|
|
*
|
|
* @brief Program to send AP commands to the driver/firmware of the uAP
|
|
* driver.
|
|
*
|
|
* Usage: uaputl.exe [-option params]
|
|
* or uaputl.exe [command] [params]
|
|
*
|
|
*
|
|
* Copyright 2014-2020 NXP
|
|
*
|
|
* NXP CONFIDENTIAL
|
|
* The source code contained or described herein and all documents related to
|
|
* the source code (Materials) are owned by NXP, its
|
|
* suppliers and/or its licensors. Title to the Materials remains with NXP,
|
|
* its suppliers and/or its licensors. The Materials contain
|
|
* trade secrets and proprietary and confidential information of NXP, its
|
|
* suppliers and/or its licensors. The Materials are protected by worldwide copyright
|
|
* and trade secret laws and treaty provisions. No part of the Materials may be
|
|
* used, copied, reproduced, modified, published, uploaded, posted,
|
|
* transmitted, distributed, or disclosed in any way without NXP's prior
|
|
* express written permission.
|
|
*
|
|
* No license under any patent, copyright, trade secret or other intellectual
|
|
* property right is granted to or conferred upon you by disclosure or delivery
|
|
* of the Materials, either expressly, by implication, inducement, estoppel or
|
|
* otherwise. Any license under such intellectual property rights must be
|
|
* express and approved by NXP in writing.
|
|
*
|
|
*/
|
|
/****************************************************************************
|
|
Change log:
|
|
03/01/08: Initial creation
|
|
****************************************************************************/
|
|
|
|
/****************************************************************************
|
|
Header files
|
|
****************************************************************************/
|
|
#include <stdarg.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/select.h>
|
|
#include <stdio.h>
|
|
#include <getopt.h>
|
|
#include <netinet/in.h>
|
|
#include <errno.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
#include <linux/if.h>
|
|
#include <sys/ioctl.h>
|
|
#include <errno.h>
|
|
#include "uaputl.h"
|
|
#include "uapcmd.h"
|
|
|
|
/****************************************************************************
|
|
Definitions
|
|
****************************************************************************/
|
|
/** Default debug level */
|
|
int debug_level = MSG_NONE;
|
|
|
|
/** Enable or disable debug outputs */
|
|
#define DEBUG 1
|
|
|
|
/** Convert character to integer */
|
|
#define CHAR2INT(x) (((x) >= 'A') ? ((x) - 'A' + 10) : ((x) - '0'))
|
|
|
|
/** Supported stream modes */
|
|
#define HT_STREAM_MODE_1X1 0x11
|
|
#define HT_STREAM_MODE_2X2 0x22
|
|
|
|
static int get_bss_config(t_u8 *buf);
|
|
|
|
/****************************************************************************
|
|
Global variables
|
|
****************************************************************************/
|
|
/** Device name */
|
|
static char dev_name[IFNAMSIZ + 1];
|
|
/** Option for cmd */
|
|
struct option cmd_options[] = {
|
|
{"help", 0, 0, 'h'},
|
|
{0, 0, 0, 0}
|
|
};
|
|
|
|
/** Flag to check if custom IE is present in sys_config response from FW */
|
|
int custom_ie_present = 0;
|
|
|
|
/** Flag to check if max mgmt IE is printed in sys_config response from FW */
|
|
int max_mgmt_ie_print = 0;
|
|
|
|
/** Flag to bypass re-route path */
|
|
int uap_ioctl_no_reroute = 0;
|
|
|
|
/****************************************************************************
|
|
Local functions
|
|
****************************************************************************/
|
|
/**
|
|
* @brief Convert char to hex integer
|
|
*
|
|
* @param chr Char
|
|
* @return Hex integer
|
|
*/
|
|
unsigned char
|
|
hexc2bin(char chr)
|
|
{
|
|
if (chr >= '0' && chr <= '9')
|
|
chr -= '0';
|
|
else if (chr >= 'A' && chr <= 'F')
|
|
chr -= ('A' - 10);
|
|
else if (chr >= 'a' && chr <= 'f')
|
|
chr -= ('a' - 10);
|
|
|
|
return chr;
|
|
}
|
|
|
|
/**
|
|
* @brief Check protocol is valid or not
|
|
*
|
|
* @param protocol Protocol
|
|
*
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
is_protocol_valid(int protocol)
|
|
{
|
|
int ret = UAP_FAILURE;
|
|
switch (protocol) {
|
|
case PROTOCOL_NO_SECURITY:
|
|
case PROTOCOL_STATIC_WEP:
|
|
case PROTOCOL_WPA:
|
|
case PROTOCOL_WPA2:
|
|
case PROTOCOL_WPA2_MIXED:
|
|
case PROTOCOL_WPA3_SAE:
|
|
ret = UAP_SUCCESS;
|
|
break;
|
|
default:
|
|
printf("ERR: Invalid Protocol: %d\n", protocol);
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Function to check valid rate
|
|
*
|
|
*
|
|
* @param rate Rate to verify
|
|
*
|
|
* return UAP_SUCCESS or UAP_FAILURE
|
|
**/
|
|
int
|
|
is_rate_valid(int rate)
|
|
{
|
|
int ret = UAP_SUCCESS;
|
|
switch (rate) {
|
|
case 2:
|
|
case 4:
|
|
case 11:
|
|
case 13:
|
|
case 22:
|
|
case 12:
|
|
case 18:
|
|
case 24:
|
|
case 48:
|
|
case 72:
|
|
case 96:
|
|
case 108:
|
|
case 36:
|
|
break;
|
|
default:
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Check for mandatory rates
|
|
*
|
|
*
|
|
* 2, 4, 11, 22 must be present
|
|
*
|
|
* 6 12 and 24 must be present for ofdm
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_FAILURE or UAP_SUCCESS
|
|
*
|
|
*/
|
|
static int
|
|
check_mandatory_rates(int argc, char **argv)
|
|
{
|
|
int i;
|
|
int tmp;
|
|
t_u32 rate_bitmap = 0;
|
|
int cck_enable = 0;
|
|
int ofdm_enable = 0;
|
|
#define BITMAP_RATE_1M 0x01
|
|
#define BITMAP_RATE_2M 0x02
|
|
#define BITMAP_RATE_5_5M 0x04
|
|
#define BITMAP_RATE_11M 0x8
|
|
#define B_RATE_MANDATORY 0x0f
|
|
#define BITMAP_RATE_6M 0x10
|
|
#define BITMAP_RATE_12M 0x20
|
|
#define BITMAP_RATE_24M 0x40
|
|
#define G_RATE_MANDATORY 0x70
|
|
for (i = 0; i < argc; i++) {
|
|
tmp = (A2HEXDECIMAL(argv[i]) & ~BASIC_RATE_SET_BIT);
|
|
switch (tmp) {
|
|
case 2:
|
|
cck_enable = 1;
|
|
rate_bitmap |= BITMAP_RATE_1M;
|
|
break;
|
|
case 4:
|
|
cck_enable = 1;
|
|
rate_bitmap |= BITMAP_RATE_2M;
|
|
break;
|
|
case 11:
|
|
cck_enable = 1;
|
|
rate_bitmap |= BITMAP_RATE_5_5M;
|
|
break;
|
|
case 22:
|
|
cck_enable = 1;
|
|
rate_bitmap |= BITMAP_RATE_11M;
|
|
break;
|
|
case 12:
|
|
ofdm_enable = 1;
|
|
rate_bitmap |= BITMAP_RATE_6M;
|
|
break;
|
|
case 24:
|
|
ofdm_enable = 1;
|
|
rate_bitmap |= BITMAP_RATE_12M;
|
|
break;
|
|
case 48:
|
|
ofdm_enable = 1;
|
|
rate_bitmap |= BITMAP_RATE_24M;
|
|
break;
|
|
case 18:
|
|
case 36:
|
|
case 72:
|
|
case 96:
|
|
case 108:
|
|
ofdm_enable = 1;
|
|
break;
|
|
}
|
|
}
|
|
#ifdef WIFI_DIRECT_SUPPORT
|
|
if (strncmp(dev_name, "wfd", 3))
|
|
#endif
|
|
if ((rate_bitmap & B_RATE_MANDATORY) != B_RATE_MANDATORY) {
|
|
if (cck_enable) {
|
|
printf("Basic Rates 2, 4, 11 and 22 (500K units) \n" "must be present in basic or non-basic rates\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if (ofdm_enable &&
|
|
((rate_bitmap & G_RATE_MANDATORY) != G_RATE_MANDATORY)) {
|
|
printf("OFDM Rates 12, 24 and 48 ( 500Kb units)\n"
|
|
"must be present in basic or non-basic rates\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Convert string to hex integer
|
|
*
|
|
* @param s A pointer string buffer
|
|
* @return Hex integer
|
|
*/
|
|
unsigned int
|
|
a2hex(char *s)
|
|
{
|
|
unsigned int val = 0;
|
|
if (!strncasecmp("0x", s, 2)) {
|
|
s += 2;
|
|
}
|
|
while (*s && isxdigit(*s)) {
|
|
val = (val << 4) + hexc2bin(*s++);
|
|
}
|
|
return val;
|
|
}
|
|
|
|
/**
|
|
* @brief Dump hex data
|
|
*
|
|
* @param prompt A pointer prompt buffer
|
|
* @param p A pointer to data buffer
|
|
* @param len The len of data buffer
|
|
* @param delim Delim char
|
|
* @return None
|
|
*/
|
|
void
|
|
hexdump_data(char *prompt, void *p, int len, char delim)
|
|
{
|
|
int i;
|
|
unsigned char *s = p;
|
|
|
|
if (prompt) {
|
|
printf("%s: len=%d\n", prompt, (int)len);
|
|
}
|
|
for (i = 0; i < len; i++) {
|
|
if (i != len - 1)
|
|
printf("%02x%c", *s++, delim);
|
|
else
|
|
printf("%02x\n", *s);
|
|
if ((i + 1) % 16 == 0)
|
|
printf("\n");
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
#if DEBUG
|
|
/**
|
|
* @brief Conditional printf
|
|
*
|
|
* @param level Severity level of the message
|
|
* @param fmt Printf format string, followed by optional arguments
|
|
*/
|
|
void
|
|
uap_printf(int level, char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
va_start(ap, fmt);
|
|
if (level <= debug_level) {
|
|
vprintf(fmt, ap);
|
|
}
|
|
va_end(ap);
|
|
}
|
|
|
|
/**
|
|
* @brief Dump hex data
|
|
*
|
|
* @param prompt A pointer prompt buffer
|
|
* @param p A pointer to data buffer
|
|
* @param len The len of data buffer
|
|
* @param delim Delim char
|
|
* @return None
|
|
*/
|
|
void
|
|
hexdump(char *prompt, void *p, int len, char delim)
|
|
{
|
|
if (debug_level < MSG_ALL)
|
|
return;
|
|
hexdump_data(prompt, p, len, delim);
|
|
}
|
|
#endif
|
|
|
|
/**
|
|
* @brief Hex to number
|
|
*
|
|
* @param c Hex value
|
|
* @return Integer value or -1
|
|
*/
|
|
int
|
|
hex2num(char c)
|
|
{
|
|
if (c >= '0' && c <= '9')
|
|
return c - '0';
|
|
if (c >= 'a' && c <= 'f')
|
|
return c - 'a' + 10;
|
|
if (c >= 'A' && c <= 'F')
|
|
return c - 'A' + 10;
|
|
|
|
return -1;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the sys_info command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_sys_info_usage(void)
|
|
{
|
|
printf("\nUsage : sys_info\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Get Max sta num from firmware
|
|
*
|
|
* @return max number of stations
|
|
*/
|
|
int
|
|
get_max_sta_num_supported(t_u16 *max_sta_num_supported)
|
|
{
|
|
apcmdbuf_sys_configure *cmd_buf = NULL;
|
|
tlvbuf_max_sta_num *tlv = NULL;
|
|
t_u8 *buffer = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int ret = UAP_SUCCESS;
|
|
|
|
/* Initialize the command length */
|
|
cmd_len = sizeof(apcmdbuf_sys_configure) + sizeof(tlvbuf_max_sta_num);
|
|
|
|
/* Initialize the command buffer */
|
|
buffer = (t_u8 *)malloc(buf_len);
|
|
if (!buffer) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buffer, 0, buf_len);
|
|
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_max_sta_num *)(buffer + sizeof(apcmdbuf_sys_configure));
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->cmd_code = APCMD_SYS_CONFIGURE;
|
|
cmd_buf->size = cmd_len;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
tlv->tag = MRVL_MAX_STA_CNT_TLV_ID;
|
|
tlv->length = 4;
|
|
cmd_buf->action = ACTION_GET;
|
|
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->max_sta_num_configured =
|
|
uap_cpu_to_le16(tlv->max_sta_num_configured);
|
|
tlv->max_sta_num_supported =
|
|
uap_cpu_to_le16(tlv->max_sta_num_supported);
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
endian_convert_tlv_header_in(tlv);
|
|
tlv->max_sta_num_configured =
|
|
uap_le16_to_cpu(tlv->max_sta_num_configured);
|
|
tlv->max_sta_num_supported =
|
|
uap_le16_to_cpu(tlv->max_sta_num_supported);
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
/* Verify response */
|
|
if ((cmd_buf->cmd_code !=
|
|
(APCMD_SYS_CONFIGURE | APCMD_RESP_CHECK)) ||
|
|
(tlv->tag != MRVL_MAX_STA_CNT_TLV_ID)) {
|
|
printf("ERR:Corrupted response! cmd_code=%x, Tlv->tag=%x\n", cmd_buf->cmd_code, tlv->tag);
|
|
free(buffer);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Print response */
|
|
if (cmd_buf->result != CMD_SUCCESS) {
|
|
printf("ERR:Could not get max station number!\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if (tlv->length == 4) {
|
|
*max_sta_num_supported =
|
|
tlv->max_sta_num_supported;
|
|
} else {
|
|
*max_sta_num_supported = MAX_STA_COUNT;
|
|
}
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
if (buffer)
|
|
free(buffer);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Parse domain name for domain_code
|
|
*
|
|
* @param dom_name Domain name
|
|
* @return domain_code / UAP_FAILURE
|
|
*/
|
|
static t_u8
|
|
parse_domain_name(char *domain_name)
|
|
{
|
|
t_u8 domain_code = UAP_FAILURE;
|
|
|
|
if (strstr(domain_name, "DOMAIN_CODE_")) {
|
|
domain_name += sizeof("DOMAIN_CODE_") - 1;
|
|
|
|
if (!(strncmp(domain_name, "FCC", sizeof("FCC") - 1)))
|
|
domain_code = DOMAIN_CODE_FCC;
|
|
else if (!(strcmp(domain_name, "ETSI")))
|
|
domain_code = DOMAIN_CODE_ETSI;
|
|
else if (!(strcmp(domain_name, "MKK")))
|
|
domain_code = DOMAIN_CODE_MKK;
|
|
else if (!(strcmp(domain_name, "IN")))
|
|
domain_code = DOMAIN_CODE_IN;
|
|
else if (!(strcmp(domain_name, "MY")))
|
|
domain_code = DOMAIN_CODE_MY;
|
|
}
|
|
return domain_code;
|
|
}
|
|
|
|
/**
|
|
* @brief Parse domain file for country information
|
|
*
|
|
* @param country Country name
|
|
* @param band Band Info. 0x01 : B band, 0x02 : G band, 0x04 : A band.
|
|
* @param sub_bands Band information
|
|
* @param pdomain_code Pointer to receive domain_code
|
|
* @return number of band/ UAP_FAILURE
|
|
*/
|
|
t_u8
|
|
parse_domain_file(char *country, int band, ieeetypes_subband_set_t *sub_bands,
|
|
t_u8 *pdomain_code)
|
|
{
|
|
FILE *fp;
|
|
char str[64];
|
|
char domain_name[64];
|
|
int cflag = 0;
|
|
int dflag = 0;
|
|
int found = 0;
|
|
int skip = 0;
|
|
int j = -1, reset_j = 0;
|
|
t_u8 no_of_sub_band = 0;
|
|
char *strp = NULL;
|
|
int ret = 0;
|
|
|
|
fp = fopen("config/80211d_domain.conf", "r");
|
|
if (fp == NULL) {
|
|
printf("File opening Error\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/**
|
|
* Search specific domain name
|
|
*/
|
|
memset(domain_name, 0, sizeof(domain_name));
|
|
memset(str, 0, 64);
|
|
while (!feof(fp)) {
|
|
ret = fscanf(fp, "%63s", str);
|
|
if (ret <= 0)
|
|
break;
|
|
if (cflag) {
|
|
strncpy(domain_name, str, sizeof(domain_name) - 1);
|
|
cflag = 0;
|
|
}
|
|
if (!strcmp(str, "COUNTRY:")) {
|
|
/** Store next string to domain_name */
|
|
cflag = 1;
|
|
}
|
|
|
|
if (!strcmp(str, country)) {
|
|
/** Country is matched ;)*/
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!found) {
|
|
printf("No match found for Country = %s in the 80211d_domain.conf \n", country);
|
|
fclose(fp);
|
|
found = 0;
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/**
|
|
* Search domain specific information
|
|
*/
|
|
while (!feof(fp)) {
|
|
ret = fscanf(fp, "%63s", str);
|
|
if (ret <= 0)
|
|
break;
|
|
|
|
if (feof(fp)
|
|
) {
|
|
break;
|
|
}
|
|
|
|
if (dflag && !strcmp(str, "DOMAIN:")) {
|
|
|
|
if ((band & BAND_A) == 0)
|
|
break;
|
|
|
|
/* parse next domain */
|
|
cflag = 0;
|
|
dflag = 0;
|
|
j = -1;
|
|
reset_j = 0;
|
|
}
|
|
if (dflag) {
|
|
j++;
|
|
if (strchr(str, ','))
|
|
reset_j = 1;
|
|
|
|
strp = strtok(str, ", ");
|
|
|
|
if (strp == NULL) {
|
|
if (reset_j) {
|
|
j = -1;
|
|
reset_j = 0;
|
|
}
|
|
continue;
|
|
} else {
|
|
strncpy(str, strp, (sizeof(str) - 1));
|
|
}
|
|
|
|
if (IS_HEX_OR_DIGIT(str) == UAP_FAILURE) {
|
|
printf("ERR: Only Number values are allowed\n");
|
|
fclose(fp);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
switch (j) {
|
|
case 0:
|
|
sub_bands[no_of_sub_band].first_chan =
|
|
(t_u8)A2HEXDECIMAL(str);
|
|
break;
|
|
case 1:
|
|
sub_bands[no_of_sub_band].no_of_chan =
|
|
(t_u8)A2HEXDECIMAL(str);
|
|
break;
|
|
case 2:
|
|
sub_bands[no_of_sub_band++].max_tx_pwr =
|
|
(t_u8)A2HEXDECIMAL(str);
|
|
break;
|
|
default:
|
|
printf("ERR: Incorrect 80211d_domain.conf file\n");
|
|
fclose(fp);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (reset_j) {
|
|
j = -1;
|
|
reset_j = 0;
|
|
}
|
|
}
|
|
|
|
if (cflag && !strcmp(str, domain_name)) {
|
|
/* Followed will be the band details */
|
|
cflag = 0;
|
|
if (band & (BAND_B | BAND_G) || skip)
|
|
dflag = 1;
|
|
else
|
|
skip = 1;
|
|
}
|
|
if (!dflag && !strcmp(str, "DOMAIN:")) {
|
|
cflag = 1;
|
|
}
|
|
}
|
|
fclose(fp);
|
|
|
|
if (pdomain_code && no_of_sub_band && (band & BAND_A)) {
|
|
*pdomain_code = parse_domain_name(domain_name);
|
|
}
|
|
return (no_of_sub_band);
|
|
}
|
|
|
|
/**
|
|
*
|
|
* @brief Set/Get SNMP MIB
|
|
*
|
|
* @param action 0-GET 1-SET
|
|
* @param oid Oid
|
|
* @param size Size of oid value
|
|
* @param oid_buf Oid value
|
|
* @return UAP_FAILURE or UAP_SUCCESS
|
|
*
|
|
*/
|
|
int
|
|
sg_snmp_mib(t_u16 action, t_u16 oid, t_u16 size, t_u8 *oid_buf)
|
|
{
|
|
apcmdbuf_snmp_mib *cmd_buf = NULL;
|
|
tlvbuf_header *tlv = NULL;
|
|
int ret = UAP_FAILURE;
|
|
t_u8 *buf = NULL;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
t_u16 cmd_len;
|
|
int i;
|
|
|
|
cmd_len = sizeof(apcmdbuf_snmp_mib) + sizeof(tlvbuf_header) + size;
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return ret;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
|
|
/* Locate Headers */
|
|
cmd_buf = (apcmdbuf_snmp_mib *)buf;
|
|
tlv = (tlvbuf_header *)(buf + sizeof(apcmdbuf_snmp_mib));
|
|
cmd_buf->size = buf_len - BUF_HEADER_SIZE;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->cmd_code = HostCmd_SNMP_MIB;
|
|
|
|
tlv->type = uap_cpu_to_le16(oid);
|
|
tlv->len = uap_cpu_to_le16(size);
|
|
for (i = 0; action && (i < size); i++) {
|
|
tlv->data[i] = oid_buf[i];
|
|
}
|
|
|
|
cmd_buf->action = uap_cpu_to_le16(action);
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
if (ret == UAP_SUCCESS) {
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
if (!action) {
|
|
/** Relocate the headers */
|
|
tlv = (tlvbuf_header *)((t_u8 *)cmd_buf +
|
|
sizeof
|
|
(apcmdbuf_snmp_mib));
|
|
for (i = 0;
|
|
i < MIN(uap_le16_to_cpu(tlv->len), size);
|
|
i++) {
|
|
oid_buf[i] = tlv->data[i];
|
|
}
|
|
}
|
|
ret = UAP_SUCCESS;
|
|
} else {
|
|
printf("ERR:Command Response incorrect!\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a sys_info request and sends to the driver
|
|
*
|
|
* Usage: "sys_info"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_sys_info(int argc, char *argv[])
|
|
{
|
|
apcmdbuf_sys_info_request *cmd_buf = NULL;
|
|
apcmdbuf_sys_info_response *response_buf = NULL;
|
|
t_u8 *buf = NULL;
|
|
t_u16 cmd_len;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int ret = UAP_SUCCESS;
|
|
int opt;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_sys_info_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc != 0) {
|
|
printf("ERR:Too many arguments.\n");
|
|
print_sys_info_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Alloc buf for command */
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
|
|
/* Locate headers */
|
|
cmd_len = sizeof(apcmdbuf_sys_info_request);
|
|
cmd_buf = (apcmdbuf_sys_info_request *)buf;
|
|
response_buf = (apcmdbuf_sys_info_response *)buf;
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->cmd_code = APCMD_SYS_INFO;
|
|
cmd_buf->size = cmd_len;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
/* Verify response */
|
|
if (response_buf->cmd_code !=
|
|
(APCMD_SYS_INFO | APCMD_RESP_CHECK)) {
|
|
printf("ERR:Corrupted response!\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Print response */
|
|
if (response_buf->result == CMD_SUCCESS) {
|
|
printf("System information = %s\n",
|
|
response_buf->sys_info);
|
|
} else {
|
|
printf("ERR:Could not retrieve system information!\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for deepsleep command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_deepsleep_usage(void)
|
|
{
|
|
printf("\nUsage : deepsleep [MODE][IDLE_TIME]");
|
|
printf("\nOptions: MODE : 0 - Disable auto deep sleep mode");
|
|
printf("\n 1 - Enable auto deep sleep mode");
|
|
printf("\n IDLE_TIME: Idle time in milliseconds, default value is 100 ms");
|
|
printf("\n empty - get auto deep sleep mode\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates deepsleep request and send to driver
|
|
*
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_deepsleep(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
deep_sleep_para param;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_deepsleep_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(¶m, 0, sizeof(param));
|
|
/* Check arguments */
|
|
if (argc > 2) {
|
|
printf("ERR:wrong arguments. Only support 2 arguments\n");
|
|
print_deepsleep_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.subcmd = UAP_DEEP_SLEEP;
|
|
if (argc) {
|
|
if (argc >= 1) {
|
|
if ((IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE) ||
|
|
((atoi(argv[0]) < 0) || (atoi(argv[0]) > 1))) {
|
|
printf("ERR: Only Number values are allowed\n");
|
|
print_deepsleep_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
param.action = 1;
|
|
param.deep_sleep = (t_u16)A2HEXDECIMAL(argv[0]);
|
|
param.idle_time = 0;
|
|
if (argc == 2) {
|
|
if (IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE) {
|
|
printf("ERR: Only Number values are allowed\n");
|
|
print_deepsleep_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.idle_time = (t_u16)A2HEXDECIMAL(argv[1]);
|
|
}
|
|
} else {
|
|
param.action = 0;
|
|
}
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
if (argc)
|
|
printf("ERR: deep sleep must be disabled before changing idle time\n");
|
|
else {
|
|
perror("");
|
|
printf("ERR:deep sleep failed\n");
|
|
}
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (!argc) {
|
|
if (param.deep_sleep == 1) {
|
|
printf("deep sleep mode: enabled\n");
|
|
printf("idle time = %dms\n", param.idle_time);
|
|
} else {
|
|
printf("deep sleep mode: disabled\n");
|
|
}
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Configure Band Steering
|
|
*
|
|
* Usage: band_steering_cfg state block_2g_prb_req max_btm_req_allowed
|
|
*
|
|
* State 0 or 1
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
|
|
int
|
|
apcmd_band_steering(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
band_steer_para param;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u8 state = 0;
|
|
t_u8 block2gPrbReq = 0;
|
|
t_u8 maxBtmReqAllowed = 0;
|
|
|
|
t_u8 i;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
printf("\nUsage: band_steering_cfg <state 0/1> <block_2g_prb_req> <max_btm_req_allowed>\n");
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
memset(¶m, 0, sizeof(param));
|
|
/* Check arguments */
|
|
if (!(argc == 0 || argc == 2 || argc == 4 || argc == 6)) {
|
|
printf("ERR:wrong arguments.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
param.subcmd = UAP_BAND_STEER;
|
|
|
|
if (argc) {
|
|
if (strcmp(argv[0], "state") &&
|
|
strcmp(argv[0], "block_2g_prb_req") &&
|
|
strcmp(argv[0], "max_btm_req_allowed")) {
|
|
printf("ERR: Incorrect input. Either state, block_2g_prb_req or max_btm_req_allowed is needed.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/** SET */
|
|
for (i = 0; i < argc; i = i + 2) {
|
|
if (strcmp(argv[i], "state") == 0) {
|
|
param.action += ACT_SET_STATE;
|
|
if (strcmp(argv[i + 1], "0") == 0) {
|
|
state = 0;
|
|
} else if (strcmp(argv[i + 1], "1") == 0) {
|
|
state = 1;
|
|
} else {
|
|
printf("ERR: Invalid State value.");
|
|
return UAP_FAILURE;
|
|
}
|
|
} else if (strcmp(argv[i], "block_2g_prb_req") == 0) {
|
|
param.action += ACT_SET_BLOCK_2G_PRB_REQ;
|
|
block2gPrbReq = atoi(argv[i + 1]);
|
|
if (block2gPrbReq < 0 || block2gPrbReq > 15) {
|
|
printf("ERR: Invalid block_2g_prb_req value. Enter value between 0 and 15");
|
|
return UAP_FAILURE;
|
|
}
|
|
} else if (strcmp(argv[i], "max_btm_req_allowed") == 0) {
|
|
param.action += ACT_SET_MAX_BTM_REQ_ALLOWED;
|
|
maxBtmReqAllowed = atoi(argv[i + 1]);
|
|
if (maxBtmReqAllowed <= 0 ||
|
|
maxBtmReqAllowed > 255) {
|
|
printf("ERR: Invalid max_btm_req_allowed value.");
|
|
return UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR: Incorrect input. state, block_2g_prb_req and/or max_btm_req_allowed is needed in decimal format.");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
param.state = state;
|
|
param.block_2g_prb_req = block2gPrbReq;
|
|
param.max_btm_req_allowed = maxBtmReqAllowed;
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
/* Perform ioctl */
|
|
ioctl(sockfd, UAP_IOCTL_CMD, &ifr);
|
|
|
|
if (argc) {
|
|
printf("Set Successfull\n");
|
|
printf("state = %d \n", param.state);
|
|
printf("block_2g_prb_req = %d\n", param.block_2g_prb_req);
|
|
printf("max_btm_req_allowed = %d\n", param.max_btm_req_allowed);
|
|
} else {
|
|
printf("Get Successfull\n");
|
|
if (param.state == 1) {
|
|
printf("band steering mode: enabled\n");
|
|
printf("block_2g_prb_req = %d\n",
|
|
param.block_2g_prb_req);
|
|
printf("max_btm_req_allowed = %d\n",
|
|
param.max_btm_req_allowed);
|
|
} else {
|
|
printf("band steering: disabled\n");
|
|
}
|
|
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for tx_data_pause command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_txdatapause_usage(void)
|
|
{
|
|
printf("\nUsage : tx_data_pause [ENABLE][TX_BUF_CNT]");
|
|
printf("\nOptions: ENABLE : 0 - Disable Tx data pause events");
|
|
printf("\n 1 - Enable Tx data pause events");
|
|
printf("\n TX_BUF_CNT: Max number of TX buffer for PS clients");
|
|
printf("\n empty - get Tx data pause settings\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Set/get txpause setting
|
|
*
|
|
* @param txpause A pointer to the Tx data pause parameters structure
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
send_txpause_ioctl(tx_data_pause_para *txpause)
|
|
{
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)txpause;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR:txpause is not supported by %s\n", dev_name);
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates tx_data_pause request and sends to driver
|
|
*
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_txdatapause(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
tx_data_pause_para param;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_txdatapause_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(¶m, 0, sizeof(param));
|
|
/* Check arguments */
|
|
if (argc > 2) {
|
|
printf("ERR: Wrong number of arguments\n");
|
|
print_txdatapause_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.subcmd = UAP_TX_DATA_PAUSE;
|
|
if (argc) {
|
|
if (argc >= 1) {
|
|
if ((IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE) ||
|
|
((atoi(argv[0]) < TX_DATA_PAUSE_DISABLE) ||
|
|
(atoi(argv[0]) > TX_DATA_PAUSE_ENABLE))) {
|
|
printf("ERR: First argument can either be 0 or 1\n");
|
|
print_txdatapause_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if (argc == 1) {
|
|
param.action = ACTION_GET;
|
|
if (UAP_FAILURE == send_txpause_ioctl(¶m)) {
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
param.action = ACTION_SET;
|
|
param.txpause = (t_u16)A2HEXDECIMAL(argv[0]);
|
|
if (argc == 2) {
|
|
if (IS_HEX_OR_DIGIT(argv[1]) == UAP_FAILURE) {
|
|
printf("ERR: Max buffer length must be numeric\n");
|
|
print_txdatapause_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.txbufcnt = (t_u16)A2HEXDECIMAL(argv[1]);
|
|
}
|
|
} else {
|
|
param.action = ACTION_GET;
|
|
}
|
|
if (UAP_FAILURE == send_txpause_ioctl(¶m))
|
|
return UAP_FAILURE;
|
|
if ((argc == 2) && ((t_u16)A2HEXDECIMAL(argv[1]) != param.txbufcnt)) {
|
|
printf("Max number of TX buffer allowed for all PS client: %d\n", param.txbufcnt);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (!argc) {
|
|
printf("Tx data pause: %s\n",
|
|
(param.txpause == 1) ? "enabled" : "disabled");
|
|
printf("Max number of TX buffer allowed for all PS client: %d\n", param.txbufcnt);
|
|
}
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Process host_cmd
|
|
*
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return N/A
|
|
*/
|
|
int
|
|
apcmd_hostcmd(int argc, char *argv[])
|
|
{
|
|
apcmdbuf *hdr;
|
|
t_u8 *buffer = NULL;
|
|
int ret = UAP_SUCCESS;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
char cmdname[256];
|
|
|
|
if (argc <= 2) {
|
|
printf("Error: invalid no of arguments\n");
|
|
printf("Syntax: ./uaputl hostcmd <hostcmd.conf> <cmdname>\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
buffer = (t_u8 *)malloc(buf_len);
|
|
if (!buffer) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
memset(buffer, 0, buf_len);
|
|
sprintf(cmdname, "%s", argv[2]);
|
|
ret = prepare_host_cmd_buffer(argv[1], cmdname, buffer);
|
|
if (ret == UAP_FAILURE)
|
|
goto _exit_;
|
|
|
|
/* Locate headers */
|
|
hdr = (apcmdbuf *)buffer;
|
|
cmd_len = hdr->size + BUF_HEADER_SIZE;
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)buffer, &cmd_len, buf_len);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
hdr->cmd_code &= HostCmd_CMD_ID_MASK;
|
|
if (!hdr->result) {
|
|
printf("UAPHOSTCMD: CmdCode=%#04x, Size=%#04x, SeqNum=%#04x, Result=%#04x\n", hdr->cmd_code, hdr->size, hdr->seq_num, hdr->result);
|
|
hexdump_data("payload",
|
|
(void *)(buffer + APCMDHEADERLEN),
|
|
hdr->size - (APCMDHEADERLEN -
|
|
BUF_HEADER_SIZE), ' ');
|
|
} else
|
|
printf("UAPHOSTCMD failed: CmdCode=%#04x, Size=%#04x, SeqNum=%#04x, Result=%#04x\n", hdr->cmd_code, hdr->size, hdr->seq_num, hdr->result);
|
|
} else
|
|
printf("ERR:Command sending failed!\n");
|
|
|
|
_exit_:
|
|
if (buffer)
|
|
free(buffer);
|
|
return ret;
|
|
}
|
|
|
|
#ifdef SDIO
|
|
/**
|
|
* @brief Show usage information for cmd52rw command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_cmd52rw_usage(void)
|
|
{
|
|
printf("\nUsage : sdcmd52rw <FN no.> <address> [data]");
|
|
printf("\nOptions: FN no : SDIO function number.");
|
|
printf("\n address: SDIO address");
|
|
printf("\n data: data for SDIO write operation.");
|
|
printf("\n Read is performed if data is not provided.");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Process cmd52 read/write handler
|
|
*
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return N/A
|
|
*/
|
|
int
|
|
apcmd_cmd52_readwrite(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
sdcmd52_para param;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_cmd52rw_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(¶m, 0, sizeof(sdcmd52_para));
|
|
/* Check arguments */
|
|
if (argc < 2 || argc > 3) {
|
|
printf("ERR:wrong arguments.\n");
|
|
print_cmd52rw_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE) ||
|
|
(IS_HEX_OR_DIGIT(argv[1]) == UAP_FAILURE)) {
|
|
printf("ERR: Only Number values are allowed\n");
|
|
print_cmd52rw_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.cmd52_params[0] = (t_u8)A2HEXDECIMAL(argv[0]);
|
|
if (param.cmd52_params[0] > 7) {
|
|
printf("ERR: Invalid function number!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
param.cmd52_params[1] = (t_u8)A2HEXDECIMAL(argv[1]);
|
|
param.action = 0;
|
|
if (argc == 3) {
|
|
if (IS_HEX_OR_DIGIT(argv[2]) == UAP_FAILURE) {
|
|
printf("ERR: Only Number values are allowed\n");
|
|
print_cmd52rw_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.cmd52_params[2] = (t_u8)A2HEXDECIMAL(argv[2]);
|
|
param.action = 1;
|
|
}
|
|
param.subcmd = UAP_SDCMD52_RW;
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR:cmd52rw failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc == 2)
|
|
printf("Cmd52 read done. ");
|
|
else
|
|
printf("Cmd52 write done. ");
|
|
printf("func=%d, reg=%d, data=0x%02X\n",
|
|
param.cmd52_params[0], param.cmd52_params[1],
|
|
param.cmd52_params[2]);
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
#endif
|
|
|
|
/**
|
|
* @brief Show usage information for addbapara command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_addbapara_usage(void)
|
|
{
|
|
printf("\nUsage : addbapara [timeout txwinsize rxwinsize]");
|
|
printf("\nOptions: timeout : 0 - Disable");
|
|
printf("\n 1 - 65535 : Block Ack Timeout in TU");
|
|
printf("\n txwinsize: Buffer size for ADDBA request");
|
|
printf("\n rxwinsize: Buffer size for ADDBA response");
|
|
printf("\n txamsdu: amsdu for ADDBA request");
|
|
printf("\n rxamsdu: amsdu for ADDBA response");
|
|
printf("\n empty - get ADDBA parameters\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates addbaparam request and send to driver
|
|
*
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_addbapara(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
addba_param param;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_addbapara_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(¶m, 0, sizeof(param));
|
|
/* Check arguments */
|
|
if ((argc != 0) && (argc != 5)) {
|
|
printf("ERR:wrong arguments. Only support 0 or 5 arguments\n");
|
|
print_addbapara_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.subcmd = UAP_ADDBA_PARA;
|
|
if (argc) {
|
|
if ((IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE)
|
|
|| (IS_HEX_OR_DIGIT(argv[1]) == UAP_FAILURE)
|
|
|| (IS_HEX_OR_DIGIT(argv[2]) == UAP_FAILURE)
|
|
|| (IS_HEX_OR_DIGIT(argv[3]) == UAP_FAILURE)
|
|
|| (IS_HEX_OR_DIGIT(argv[4]) == UAP_FAILURE)
|
|
) {
|
|
printf("ERR: Only Number values are allowed\n");
|
|
print_addbapara_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.action = 1;
|
|
param.timeout = (t_u32)A2HEXDECIMAL(argv[0]);
|
|
if (param.timeout > DEFAULT_BLOCK_ACK_TIMEOUT) {
|
|
printf("ERR: Block Ack timeout should be in range [1-65535]\n");
|
|
print_addbapara_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.txwinsize = (t_u32)A2HEXDECIMAL(argv[1]);
|
|
param.rxwinsize = (t_u32)A2HEXDECIMAL(argv[2]);
|
|
if (param.txwinsize > MAX_TXRX_WINDOW_SIZE ||
|
|
param.rxwinsize > MAX_TXRX_WINDOW_SIZE) {
|
|
printf("ERR: Tx/Rx window size should not be greater than 1023\n");
|
|
print_addbapara_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.txamsdu = (t_u8)A2HEXDECIMAL(argv[3]);
|
|
param.rxamsdu = (t_u8)A2HEXDECIMAL(argv[4]);
|
|
if (param.txamsdu > 1 || param.rxamsdu > 1) {
|
|
printf("ERR: Tx/Rx amsdu should not be 0 or 1\n");
|
|
print_addbapara_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
} else {
|
|
param.action = 0;
|
|
}
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR:ADDBA PARA failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (!argc) {
|
|
printf("ADDBA parameters:\n");
|
|
printf("\ttimeout=%d\n", (int)param.timeout);
|
|
printf("\ttxwinsize=%d\n", (int)param.txwinsize);
|
|
printf("\trxwinsize=%d\n", (int)param.rxwinsize);
|
|
printf("\ttxamsdu=%d\n", (int)param.txamsdu);
|
|
printf("\trxamsdu=%d\n", (int)param.rxamsdu);
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for aggrpriotbl command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_aggrpriotbl_usage(void)
|
|
{
|
|
printf("\nUsage : aggrpriotbl <m0> <n0> <m1> <n1> ... <m7> <n7>");
|
|
printf("\nOptions: <mx> : 0 - 7, 0xff to disable AMPDU aggregation.");
|
|
printf("\n <nx> : 0 - 7, 0xff to disable AMSDU aggregation.");
|
|
printf("\n empty - get the priority table\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates aggrpriotbl request and send to driver
|
|
*
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_aggrpriotbl(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
aggr_prio_tbl prio_tbl;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u8 value;
|
|
int i;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_aggrpriotbl_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(&prio_tbl, 0, sizeof(prio_tbl));
|
|
/* Check arguments */
|
|
if ((argc != 0) && (argc != 16)) {
|
|
printf("ERR:wrong arguments. Only support 0 or 16 arguments\n");
|
|
print_aggrpriotbl_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
prio_tbl.subcmd = UAP_AGGR_PRIOTBL;
|
|
if (argc) {
|
|
for (i = 0; i < argc; i++) {
|
|
if ((IS_HEX_OR_DIGIT(argv[i]) == UAP_FAILURE)) {
|
|
printf("ERR: Only Number values are allowed\n");
|
|
print_aggrpriotbl_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
value = (t_u8)A2HEXDECIMAL(argv[i]);
|
|
if ((value > 7) && (value != 0xff)) {
|
|
printf("ERR: Invalid priority, Valid value 0-7, 0xff to disable aggregation.\n");
|
|
print_aggrpriotbl_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
prio_tbl.action = 1;
|
|
for (i = 0; i < MAX_NUM_TID; i++) {
|
|
prio_tbl.ampdu[i] = (t_u8)A2HEXDECIMAL(argv[i * 2]);
|
|
prio_tbl.amsdu[i] = (t_u8)A2HEXDECIMAL(argv[i * 2 + 1]);
|
|
}
|
|
} else {
|
|
prio_tbl.action = 0;
|
|
}
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)&prio_tbl;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR: priority table failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (!argc) {
|
|
printf("AMPDU/AMSDU priority table:");
|
|
for (i = 0; i < MAX_NUM_TID; i++) {
|
|
printf(" %d %d", prio_tbl.ampdu[i], prio_tbl.amsdu[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for addbareject command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_addba_reject_usage(void)
|
|
{
|
|
printf("\nUsage : addbareject <m0> <m1> ... <m7>");
|
|
printf("\nOptions: <mx> : 1 enables rejection of ADDBA request for TidX.");
|
|
printf("\n 0 would accept any ADDBAs for TidX.");
|
|
printf("\n empty - get the addbareject table\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates addbareject request and send to driver
|
|
*
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_addbareject(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
addba_reject_para param;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
int i;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_addba_reject_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(¶m, 0, sizeof(param));
|
|
/* Check arguments */
|
|
if ((argc != 0) && (argc != 8)) {
|
|
printf("ERR:wrong arguments. Only support 0 or 8 arguments\n");
|
|
print_addba_reject_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.subcmd = UAP_ADDBA_REJECT;
|
|
if (argc) {
|
|
for (i = 0; i < argc; i++) {
|
|
if ((ISDIGIT(argv[i]) == UAP_FAILURE) ||
|
|
(atoi(argv[i]) < 0) || (atoi(argv[i]) > 1)) {
|
|
printf("ERR: Only allow 0 or 1\n");
|
|
print_addba_reject_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
param.action = 1;
|
|
for (i = 0; i < MAX_NUM_TID; i++) {
|
|
param.addba_reject[i] = (t_u8)atoi(argv[i]);
|
|
}
|
|
} else {
|
|
param.action = 0;
|
|
}
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR: addba reject table failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (!argc) {
|
|
printf("addba reject table: ");
|
|
for (i = 0; i < MAX_NUM_TID; i++) {
|
|
printf("%d ", param.addba_reject[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates get_fw_info request and send to driver
|
|
*
|
|
*
|
|
* @param pfw_info Pointer to FW information structure
|
|
* @return 0--success, otherwise fail
|
|
*/
|
|
int
|
|
get_fw_info(fw_info *pfw_info)
|
|
{
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
memset(pfw_info, 0, sizeof(fw_info));
|
|
pfw_info->subcmd = UAP_FW_INFO;
|
|
pfw_info->action = 0;
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return -1;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)pfw_info;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR: get fw info failed\n");
|
|
close(sockfd);
|
|
return -1;
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for HT Tx command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_ht_tx_usage(void)
|
|
{
|
|
printf("\nUsage : httxcfg [<txcfg>]");
|
|
printf("\nOptions: txcfg : This is a bitmap and should be used as following");
|
|
printf("\n Bit 15-7: Reserved set to 0");
|
|
printf("\n Bit 6: Short GI in 40 Mhz enable/disable");
|
|
printf("\n Bit 5: Short GI in 20 Mhz enable/disable");
|
|
printf("\n Bit 4: Green field enable/disable");
|
|
printf("\n Bit 3-2: Reserved set to 0");
|
|
printf("\n Bit 1: 20/40 Mhz enable disable.");
|
|
printf("\n Bit 0: Reserved set to 0");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Process HT Tx configuration
|
|
* @param argc Number of arguments
|
|
* @param argv A pointer to arguments array
|
|
* @return MLAN_STATUS_SUCCESS--success, otherwise--fail
|
|
*/
|
|
int
|
|
apcmd_sys_cfg_ht_tx(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
ht_tx_cfg_para param;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_ht_tx_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(¶m, 0, sizeof(param));
|
|
/* Check arguments */
|
|
if (argc == 0) {
|
|
param.action = ACTION_GET;
|
|
} else if (argc == 1) {
|
|
param.action = ACTION_SET;
|
|
param.tx_cfg.httxcap = (t_u16)A2HEXDECIMAL(argv[0]);
|
|
} else {
|
|
print_ht_tx_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.subcmd = UAP_HT_TX_CFG;
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR: HT Tx configuration failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Handle response */
|
|
if (param.action == ACTION_GET) {
|
|
printf("HT Tx cfg: 0x%08x\n", param.tx_cfg.httxcap);
|
|
}
|
|
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for vhtcfg command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_vht_usage(void)
|
|
{
|
|
printf("\nUsage : vhtcfg <band> <txrx> <bwcfg> <vhtcap> <tx_mcs_map>"
|
|
"<rx_mcs_map>");
|
|
printf("\nOption: band : This is the band info for vhtcfg settings.");
|
|
printf("\n 0: Settings for both 2.4G and 5G bands");
|
|
printf("\n 1: Settings for 2.4G band");
|
|
printf("\n 2: Settings for 5G band");
|
|
printf("\n txrx : This parameter specifies the configuration of VHT" "operation for TX or/and VHT capabilities.");
|
|
printf("\n 1: configuration of VHT capabilities tx");
|
|
printf("\n 2: configuration of VHT capabilities rx");
|
|
printf("\n bwcfg : This parameter specifies the bandwidth (BW)"
|
|
"configuration applied to the vhtcfg.");
|
|
printf("\n If <txrx> is 1/3 (Tx operations)");
|
|
printf("\n 0: Tx BW follows the BW (20/40 MHz) from" "11N CFG");
|
|
printf("\n 1: Tx BW follows the BW (80/160/80+80 MHz)" "from VHT Capabilities.");
|
|
printf("\n vhtcap : This parameter specifies the VHT capabilities info.");
|
|
printf("\n tx_mcs_map : This parameter specifies the TX MCS map.");
|
|
printf("\n rx_mcs_map : This parameter specifies the RX MCS map.\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Handle response of the vhtcfg command
|
|
*
|
|
* @param vhtcfg Pointer to structure eth_priv_vhtcfg
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_vht_response(struct eth_priv_vhtcfg *vhtcfg)
|
|
{
|
|
/* GET operation */
|
|
/* Band */
|
|
if (vhtcfg->band == BAND_SELECT_BG)
|
|
printf("Band: 2.4G\n");
|
|
else
|
|
printf("Band: 5G\n");
|
|
/* BW confi9 */
|
|
if (vhtcfg->txrx & 0x3) {
|
|
if (vhtcfg->bwcfg == 0)
|
|
printf(" BW config: the 11N config\n");
|
|
else
|
|
printf(" BW config: the VHT Capabilities\n");
|
|
}
|
|
/* Tx/Rx */
|
|
if (vhtcfg->txrx & 0x1)
|
|
printf(" VHT operation for Tx: 0x%08x\n",
|
|
vhtcfg->vht_cap_info);
|
|
if (vhtcfg->txrx & 0x2)
|
|
/* VHT capabilities */
|
|
printf(" VHT Capabilities Info: 0x%08x\n",
|
|
vhtcfg->vht_cap_info);
|
|
/* MCS */
|
|
printf(" Tx MCS set: 0x%04x\n", vhtcfg->vht_tx_mcs);
|
|
printf(" Rx MCS set: 0x%04x\n", vhtcfg->vht_rx_mcs);
|
|
}
|
|
|
|
/**
|
|
* @brief Set/Get 11AC configurations
|
|
* @param argc Number of arguments
|
|
* @param argv A pointer to arguments array
|
|
* @return MLAN_STATUS_SUCCESS--success, otherwise--fail
|
|
*/
|
|
int
|
|
apcmd_sys_cfg_vht(int argc, char *argv[])
|
|
{
|
|
int opt, i = 0;
|
|
vht_cfg_para param;
|
|
struct eth_priv_vhtcfg vhtcfg;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u8 *respbuf = NULL, num = 0;
|
|
fw_info fw;
|
|
if (0 == get_fw_info(&fw)) {
|
|
/*check whether support 802.11AC through BAND_AAC bit */
|
|
if (!(fw.fw_bands & BAND_AAC)) {
|
|
printf("ERR: No support 802 11AC.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR: get_fw_info fail\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
memset(¶m, 0, sizeof(param));
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_vht_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
respbuf = (t_u8 *)malloc(MRVDRV_SIZE_OF_CMD_BUFFER);
|
|
if (!respbuf) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(respbuf, 0, MRVDRV_SIZE_OF_CMD_BUFFER);
|
|
|
|
/* Check arguments */
|
|
if ((argc > 6) || (argc < 2)) {
|
|
printf("ERR: Invalid number of arguments.\n");
|
|
print_vht_usage();
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[0]) < 0) || (atoi(argv[0]) > 2)) {
|
|
printf("ERR: Invalid band selection.\n");
|
|
print_vht_usage();
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
} else {
|
|
param.vht_cfg.band = (t_u32)A2HEXDECIMAL(argv[0]);
|
|
}
|
|
if ((atoi(argv[1]) <= 0) || (atoi(argv[1]) > 3)) {
|
|
printf("ERR: Invalid Tx/Rx selection.\n");
|
|
print_vht_usage();
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
} else {
|
|
param.vht_cfg.txrx = (t_u32)A2HEXDECIMAL(argv[1]);
|
|
}
|
|
if (argc == 2) {
|
|
param.action = ACTION_GET;
|
|
} else if (argc > 2) {
|
|
param.vht_cfg.band = (t_u32)A2HEXDECIMAL(argv[0]);
|
|
param.vht_cfg.txrx = (t_u32)A2HEXDECIMAL(argv[1]);
|
|
if (argc == 3) {
|
|
printf("ERR: Invalid number of arguments.\n");
|
|
print_vht_usage();
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc >= 4) {
|
|
if ((atoi(argv[2]) < 0) || (atoi(argv[2]) > 1) ||
|
|
((atoi(argv[2]) == 1) &&
|
|
(atoi(argv[0]) & BAND_SELECT_BG))) {
|
|
printf("ERR: Invalid BW cfg selection.\n");
|
|
print_vht_usage();
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
} else {
|
|
param.vht_cfg.bwcfg =
|
|
(t_u32)A2HEXDECIMAL(argv[2]);
|
|
}
|
|
param.vht_cfg.vht_cap_info =
|
|
(t_u32)A2HEXDECIMAL(argv[3]);
|
|
if (argc == 4) {
|
|
param.vht_cfg.vht_tx_mcs = 0xffffffff;
|
|
param.vht_cfg.vht_rx_mcs = 0xffffffff;
|
|
} else {
|
|
if (argc == 5) {
|
|
printf("ERR: Invalid number of arguments.\n");
|
|
print_vht_usage();
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
}
|
|
param.vht_cfg.vht_tx_mcs =
|
|
(t_u32)A2HEXDECIMAL(argv[4]);
|
|
param.vht_cfg.vht_rx_mcs =
|
|
(t_u32)A2HEXDECIMAL(argv[5]);
|
|
}
|
|
}
|
|
param.action = ACTION_SET;
|
|
} else {
|
|
print_vht_usage();
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
}
|
|
param.subcmd = UAP_VHT_CFG;
|
|
memcpy(respbuf, ¶m, sizeof(vht_cfg_para));
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)respbuf;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR: 11ac VHT configuration failed\n");
|
|
close(sockfd);
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Handle response */
|
|
if (param.action == ACTION_GET) {
|
|
/* Process result */
|
|
/* the first attribute is the number of vhtcfg entries */
|
|
num = *respbuf;
|
|
printf("11AC VHT Configuration: \n");
|
|
for (i = 0; i < num; i++) {
|
|
memcpy(&vhtcfg, respbuf + 1 + i * sizeof(vhtcfg),
|
|
sizeof(vhtcfg));
|
|
print_vht_response(&vhtcfg);
|
|
}
|
|
} else
|
|
printf("11AC VHT Configuration success!\n");
|
|
|
|
/* Close socket */
|
|
close(sockfd);
|
|
if (respbuf)
|
|
free(respbuf);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for TX BF command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_tx_bf_usage(void)
|
|
{
|
|
printf("\nUsage : httxbfcfg <ACTION> [ACT_DATA]");
|
|
printf("\nOptions: ACTION : 1 - Performs NDP Sounding for PEER");
|
|
printf("\n 2 - TX BF interval in milliseconds");
|
|
printf("\n 3 - Not to perform any sounding");
|
|
printf("\n 4 - TX BF SNR Threshold for peer");
|
|
printf("\n ACT_DATA : Specific data for the above actions");
|
|
printf("\n For 1: PEER MAC and status");
|
|
printf("\n For 2: TX BF interval");
|
|
printf("\n For 3: PEER MAC");
|
|
printf("\n For 4: PEER MAC and SNR");
|
|
printf("\n empty - get action specific settings\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Handle response of the TX BF command
|
|
*
|
|
* @param param Pointer to structure tx_bf_cfg_para
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_tx_bf_response(tx_bf_cfg_para *param)
|
|
{
|
|
int i;
|
|
trigger_sound_args *bf_sound = param->body.bf_sound;
|
|
tx_bf_peer_args *tx_bf_peer = param->body.tx_bf_peer;
|
|
snr_thr_args *bf_snr = param->body.bf_snr;
|
|
bf_periodicity_args *bf_periodicity = param->body.bf_periodicity;
|
|
bf_global_cfg_args *bf_global = ¶m->body.bf_global_cfg;
|
|
|
|
switch (param->bf_action) {
|
|
case BF_GLOBAL_CONFIGURATION:
|
|
printf("Global BF Status :%s\n",
|
|
bf_global->bf_enbl ? "ENABLED" : "DISABLED");
|
|
printf("Global Sounding Status :%s\n",
|
|
bf_global->sounding_enbl ? "ENABLED" : "DISABLED");
|
|
printf("Default FB Type :%d\n", bf_global->fb_type);
|
|
printf("Default SNR Threshold :%d\n", bf_global->snr_threshold);
|
|
printf("Default Sounding Interval :%d\n",
|
|
bf_global->sounding_interval);
|
|
printf("Beamforming Mode :%d\n", bf_global->bf_mode);
|
|
break;
|
|
case TRIGGER_SOUNDING_FOR_PEER:
|
|
printf("PEER MAC = %02X:%02X:%02X:%02X:%02X:%02X, STATUS = %s\n", bf_sound->peer_mac[0], bf_sound->peer_mac[1], bf_sound->peer_mac[2], bf_sound->peer_mac[3], bf_sound->peer_mac[4], bf_sound->peer_mac[5], bf_sound->status ? "Failure" : "Success");
|
|
break;
|
|
case SET_GET_BF_PERIODICITY:
|
|
printf("PEER MAC = %02x:%02x:%02x:%02x:%02x:%02x, Interval (ms) = %d\n", bf_periodicity->peer_mac[0], bf_periodicity->peer_mac[1], bf_periodicity->peer_mac[2], bf_periodicity->peer_mac[3], bf_periodicity->peer_mac[4], bf_periodicity->peer_mac[5], bf_periodicity->interval);
|
|
break;
|
|
case TX_BF_FOR_PEER_ENBL:
|
|
for (i = 0; i < param->no_of_peers; i++) {
|
|
printf("PEER MAC = %02x:%02x:%02x:%02x:%02x:%02x\n",
|
|
tx_bf_peer->peer_mac[0], tx_bf_peer->peer_mac[1],
|
|
tx_bf_peer->peer_mac[2], tx_bf_peer->peer_mac[3],
|
|
tx_bf_peer->peer_mac[4],
|
|
tx_bf_peer->peer_mac[5]);
|
|
printf("BF Status : %s\n",
|
|
tx_bf_peer->bf_enbl ? "ENABLED" : "DISABLED");
|
|
printf("Sounding Status : %s\n",
|
|
tx_bf_peer->
|
|
sounding_enbl ? "ENABLED" : "DISABLED");
|
|
printf("FB Type : %d\n", tx_bf_peer->fb_type);
|
|
tx_bf_peer++;
|
|
}
|
|
break;
|
|
case SET_SNR_THR_PEER:
|
|
for (i = 0; i < param->no_of_peers; i++) {
|
|
printf("PEER MAC = %02x:%02x:%02x:%02x:%02x:%02x, SNR = %d\n", bf_snr->peer_mac[0], bf_snr->peer_mac[1], bf_snr->peer_mac[2], bf_snr->peer_mac[3], bf_snr->peer_mac[4], bf_snr->peer_mac[5], bf_snr->snr);
|
|
bf_snr++;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
/** Tx BF Global conf argument index */
|
|
#define BF_ENABLE_PARAM 1
|
|
#define SOUND_ENABLE_PARAM 2
|
|
#define FB_TYPE_PARAM 3
|
|
#define SNR_THRESHOLD_PARAM 4
|
|
#define SOUND_INTVL_PARAM 5
|
|
#define BF_MODE_PARAM 6
|
|
#define BF_CFG_ACT_GET 0
|
|
#define BF_CFG_ACT_SET 1
|
|
|
|
/**
|
|
* @brief Creates TX BF request and send to driver
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_sys_cfg_tx_bf(int argc, char *argv[])
|
|
{
|
|
int opt, ret = UAP_FAILURE;
|
|
tx_bf_cfg_para param;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u32 bf_action = 0;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_tx_bf_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(¶m, 0, sizeof(param));
|
|
/* Check arguments */
|
|
if (argc < 1) {
|
|
printf("ERR: wrong arguments.\n");
|
|
print_tx_bf_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE) ||
|
|
((atoi(argv[0]) < BF_GLOBAL_CONFIGURATION) ||
|
|
(atoi(argv[0]) > SET_SNR_THR_PEER))) {
|
|
printf("ERR: Only Number values are allowed\n");
|
|
print_tx_bf_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
bf_action = (t_u32)A2HEXDECIMAL(argv[0]);
|
|
param.subcmd = UAP_TX_BF_CFG;
|
|
param.bf_action = bf_action;
|
|
switch (bf_action) {
|
|
case BF_GLOBAL_CONFIGURATION:
|
|
if (argc != 1 && argc != 7) {
|
|
printf("Invalid argument for Global BF Configuration\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc == 1) {
|
|
param.bf_cmd_action = BF_CFG_ACT_GET;
|
|
param.action = ACTION_GET;
|
|
} else {
|
|
param.bf_cmd_action = BF_CFG_ACT_SET;
|
|
param.action = ACTION_SET;
|
|
param.body.bf_global_cfg.bf_enbl =
|
|
atoi(argv[BF_ENABLE_PARAM]);
|
|
param.body.bf_global_cfg.sounding_enbl =
|
|
atoi(argv[SOUND_ENABLE_PARAM]);
|
|
param.body.bf_global_cfg.fb_type =
|
|
atoi(argv[FB_TYPE_PARAM]);
|
|
param.body.bf_global_cfg.snr_threshold =
|
|
atoi(argv[SNR_THRESHOLD_PARAM]);
|
|
param.body.bf_global_cfg.sounding_interval =
|
|
atoi(argv[SOUND_INTVL_PARAM]);
|
|
param.body.bf_global_cfg.bf_mode =
|
|
atoi(argv[BF_MODE_PARAM]);
|
|
}
|
|
break;
|
|
case TRIGGER_SOUNDING_FOR_PEER:
|
|
if (argc != 2) {
|
|
printf("ERR: wrong arguments.\n");
|
|
print_tx_bf_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((ret =
|
|
mac2raw(argv[1],
|
|
param.body.bf_sound[0].peer_mac)) != UAP_SUCCESS) {
|
|
printf("ERR: %s Address\n",
|
|
ret == UAP_FAILURE ? "Invalid MAC" : ret ==
|
|
UAP_RET_MAC_BROADCAST ? "Broadcast" :
|
|
"Multicast");
|
|
return UAP_FAILURE;
|
|
}
|
|
param.bf_cmd_action = BF_CFG_ACT_SET;
|
|
param.action = ACTION_SET;
|
|
break;
|
|
case SET_GET_BF_PERIODICITY:
|
|
if (argc != 2 && argc != 3) {
|
|
printf("ERR: wrong arguments.\n");
|
|
print_tx_bf_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((ret =
|
|
mac2raw(argv[1],
|
|
param.body.bf_periodicity[0].peer_mac)) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR: %s Address\n",
|
|
ret == UAP_FAILURE ? "Invalid MAC" : ret ==
|
|
UAP_RET_MAC_BROADCAST ? "Broadcast" :
|
|
"Multicast");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (argc == 3) {
|
|
if (IS_HEX_OR_DIGIT(argv[2]) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
param.body.bf_periodicity[0].interval =
|
|
(t_u32)A2HEXDECIMAL(argv[2]);
|
|
param.bf_cmd_action = BF_CFG_ACT_SET;
|
|
param.action = ACTION_SET;
|
|
} else {
|
|
param.bf_cmd_action = BF_CFG_ACT_GET;
|
|
param.action = ACTION_GET;
|
|
}
|
|
break;
|
|
case TX_BF_FOR_PEER_ENBL:
|
|
if (argc != 1 && argc != 5) {
|
|
printf("ERR: wrong arguments.\n");
|
|
print_tx_bf_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc == 1) {
|
|
param.bf_cmd_action = BF_CFG_ACT_GET;
|
|
param.action = ACTION_GET;
|
|
} else {
|
|
if ((ret =
|
|
mac2raw(argv[1],
|
|
param.body.tx_bf_peer[0].peer_mac)) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR: %s Address\n",
|
|
ret ==
|
|
UAP_FAILURE ? "Invalid MAC" : ret ==
|
|
UAP_RET_MAC_BROADCAST ? "Broadcast" :
|
|
"Multicast");
|
|
return UAP_FAILURE;
|
|
}
|
|
param.body.tx_bf_peer->bf_enbl = atoi(argv[2]);
|
|
param.body.tx_bf_peer->sounding_enbl = atoi(argv[3]);
|
|
param.body.tx_bf_peer->fb_type = atoi(argv[4]);
|
|
param.bf_cmd_action = BF_CFG_ACT_SET;
|
|
param.action = ACTION_SET;
|
|
}
|
|
break;
|
|
case SET_SNR_THR_PEER:
|
|
if (argc != 1 && argc != 3) {
|
|
printf("ERR: wrong arguments.\n");
|
|
print_tx_bf_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc == 1) {
|
|
param.bf_cmd_action = BF_CFG_ACT_GET;
|
|
param.action = ACTION_GET;
|
|
} else {
|
|
if ((ret =
|
|
mac2raw(argv[1],
|
|
param.body.bf_snr[0].peer_mac)) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR: %s Address\n",
|
|
ret ==
|
|
UAP_FAILURE ? "Invalid MAC" : ret ==
|
|
UAP_RET_MAC_BROADCAST ? "Broadcast" :
|
|
"Multicast");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (IS_HEX_OR_DIGIT(argv[2]) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
param.body.bf_snr[0].snr = (t_u8)A2HEXDECIMAL(argv[2]);
|
|
param.bf_cmd_action = BF_CFG_ACT_SET;
|
|
param.action = ACTION_SET;
|
|
}
|
|
break;
|
|
default:
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR: TX BF configuration failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
printf("TX BF configuration successful\n");
|
|
/* Handle response */
|
|
if (param.action == ACTION_GET)
|
|
print_tx_bf_response(¶m);
|
|
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for hscfg command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_hscfg_usage(void)
|
|
{
|
|
printf("\nUsage : hscfg [condition [[GPIO# [gap]]]]");
|
|
printf("\nOptions: condition : bit 0 = 1 -- broadcast data");
|
|
printf("\n bit 1 = 1 -- unicast data");
|
|
printf("\n bit 2 = 1 -- mac event");
|
|
printf("\n bit 3 = 1 -- multicast packet");
|
|
printf("\n bit 6 = 1 -- mgmt frame received");
|
|
printf("\n GPIO: the pin number (e.g. 0-7) of GPIO used to wakeup the host");
|
|
printf("\n or 0xff interface (e.g. SDIO) used to wakeup the host");
|
|
printf("\n gap: time between wakeup signal and wakeup event (in milliseconds)");
|
|
printf("\n or 0xff for special setting when GPIO is used to wakeup host");
|
|
printf("\n empty - get current host sleep parameters\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates host sleep parameter request and send to driver
|
|
*
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_hscfg(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
int i = 0;
|
|
ds_hs_cfg hscfg;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
if ((argc == 2) && strstr(argv[1], "-1"))
|
|
strcpy(argv[1], "0xffff");
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_hscfg_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(&hscfg, 0, sizeof(hscfg));
|
|
hscfg.subcmd = UAP_HS_CFG;
|
|
/* Check arguments */
|
|
if (argc > 3) {
|
|
printf("ERR:wrong arguments.\n");
|
|
print_hscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc) {
|
|
for (i = 0; i < argc; i++) {
|
|
if (IS_HEX_OR_DIGIT(argv[i]) == UAP_FAILURE) {
|
|
printf("ERR: Invalid argument %s\n", argv[i]);
|
|
print_hscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (argc) {
|
|
hscfg.flags |= HS_CFG_FLAG_SET | HS_CFG_FLAG_CONDITION;
|
|
hscfg.conditions = (t_u32)A2HEXDECIMAL(argv[0]);
|
|
if (hscfg.conditions >= 0xffff)
|
|
hscfg.conditions = HS_CFG_CANCEL;
|
|
if ((hscfg.conditions != HS_CFG_CANCEL) &&
|
|
(hscfg.conditions & ~HS_CFG_CONDITION_MASK)) {
|
|
printf("ERR:Illegal conditions 0x%x\n",
|
|
hscfg.conditions);
|
|
print_hscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc > 1) {
|
|
hscfg.flags |= HS_CFG_FLAG_GPIO;
|
|
hscfg.gpio = (t_u32)A2HEXDECIMAL(argv[1]);
|
|
if (hscfg.gpio > 255) {
|
|
printf("ERR:Illegal gpio 0x%x\n", hscfg.gpio);
|
|
print_hscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if (argc > 2) {
|
|
hscfg.flags |= HS_CFG_FLAG_GAP;
|
|
hscfg.gap = (t_u32)A2HEXDECIMAL(argv[2]);
|
|
}
|
|
} else {
|
|
hscfg.flags = HS_CFG_FLAG_GET;
|
|
}
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)&hscfg;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR:UAP_HS_CFG failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (!argc) {
|
|
printf("Host sleep parameters:\n");
|
|
printf("\tconditions=%d\n", (int)hscfg.conditions);
|
|
printf("\tGPIO=%d\n", (int)hscfg.gpio);
|
|
printf("\tgap=%d\n", (int)hscfg.gap);
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for hssetpara command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_hssetpara_usage(void)
|
|
{
|
|
printf("\nUsage : hssetpara condition [[GPIO# [gap]]]");
|
|
printf("\nOptions: condition : bit 0 = 1 -- broadcast data");
|
|
printf("\n bit 1 = 1 -- unicast data");
|
|
printf("\n bit 2 = 1 -- mac event");
|
|
printf("\n bit 3 = 1 -- multicast packet");
|
|
printf("\n bit 6 = 1 -- mgmt frame received");
|
|
printf("\n GPIO: the pin number (e.g. 0-7) of GPIO used to wakeup the host");
|
|
printf("\n or 0xff interface (e.g. SDIO) used to wakeup the host");
|
|
printf("\n gap: time between wakeup signal and wakeup event (in milliseconds)");
|
|
printf("\n or 0xff for special setting when GPIO is used to wakeup host\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates host sleep parameter request and send to driver
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_hssetpara(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
int i = 0;
|
|
ds_hs_cfg hscfg;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
if ((argc == 2) && strstr(argv[1], "-1"))
|
|
strcpy(argv[1], "0xffff");
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_hssetpara_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(&hscfg, 0, sizeof(hscfg));
|
|
hscfg.subcmd = UAP_HS_SET_PARA;
|
|
/* Check arguments */
|
|
if ((argc < 1) || (argc > 3)) {
|
|
printf("ERR:wrong arguments.\n");
|
|
print_hssetpara_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
for (i = 0; i < argc; i++) {
|
|
if (IS_HEX_OR_DIGIT(argv[i]) == UAP_FAILURE) {
|
|
printf("ERR: Invalid argument %s\n", argv[i]);
|
|
print_hssetpara_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
hscfg.flags |= HS_CFG_FLAG_SET | HS_CFG_FLAG_CONDITION;
|
|
hscfg.conditions = (t_u32)A2HEXDECIMAL(argv[0]);
|
|
if (hscfg.conditions >= 0xffff)
|
|
hscfg.conditions = HS_CFG_CANCEL;
|
|
if ((hscfg.conditions != HS_CFG_CANCEL) &&
|
|
(hscfg.conditions & ~HS_CFG_CONDITION_MASK)) {
|
|
printf("ERR:Illegal conditions 0x%x\n", hscfg.conditions);
|
|
print_hssetpara_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc > 1) {
|
|
hscfg.flags |= HS_CFG_FLAG_GPIO;
|
|
hscfg.gpio = (t_u32)A2HEXDECIMAL(argv[1]);
|
|
if (hscfg.gpio > 255) {
|
|
printf("ERR:Illegal gpio 0x%x\n", hscfg.gpio);
|
|
print_hssetpara_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if (argc > 2) {
|
|
hscfg.flags |= HS_CFG_FLAG_GAP;
|
|
hscfg.gap = (t_u32)A2HEXDECIMAL(argv[2]);
|
|
}
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, strlen(dev_name));
|
|
ifr.ifr_ifru.ifru_data = (void *)&hscfg;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR:UAP_HS_SET_PARA failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
printf("Host sleep parameters setting successful!\n");
|
|
printf("\tconditions=%d\n", (int)hscfg.conditions);
|
|
printf("\tGPIO=%d\n", (int)hscfg.gpio);
|
|
printf("\tgap=%d\n", (int)hscfg.gap);
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief get dfs repeater mode
|
|
*
|
|
* @param mode status of DFS repeater mode is returned here
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
uap_ioctl_dfs_repeater_mode(int *mode)
|
|
{
|
|
struct ifreq ifr;
|
|
dfs_repeater_mode param;
|
|
t_s32 sockfd;
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
param.action = ACTION_GET;
|
|
param.subcmd = UAP_DFS_REPEATER_MODE;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
printf("ERR:UAP_DFS_REPEATER_MODE is not"
|
|
"supported by %s\n", dev_name);
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
*mode = (int)param.mode;
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Get CAC timer status
|
|
*
|
|
* @param mode status of CAC timer is returned here
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
uap_ioctl_cac_timer_status(unsigned int *mode)
|
|
{
|
|
struct ifreq ifr;
|
|
cac_timer_status param;
|
|
t_s32 sockfd;
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
param.action = ACTION_GET;
|
|
param.subcmd = UAP_CAC_TIMER_STATUS;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
printf("ERR:UAP_CAC_TIMER_STATUS is not"
|
|
"supported by %s\n", dev_name);
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
*mode = (int)param.mode;
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Set/get power mode
|
|
*
|
|
* @param pm A pointer to ps_mgmt structure
|
|
* @param flag flag for query
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
send_power_mode_ioctl(ps_mgmt * pm, int flag)
|
|
{
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u32 result = 0;
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)pm;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_POWER_MODE, &ifr)) {
|
|
memcpy((void *)&result, (void *)pm, sizeof(result));
|
|
if (result == 1) {
|
|
printf("ERR:Power mode needs to be disabled before modifying it\n");
|
|
} else {
|
|
perror("");
|
|
printf("ERR:UAP_POWER_MODE is not supported by %s\n",
|
|
dev_name);
|
|
}
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (flag) {
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
switch (pm->ps_mode) {
|
|
case 0:
|
|
printf("power mode = Disabled\n");
|
|
break;
|
|
case 1:
|
|
printf("power mode = Periodic DTIM PS\n");
|
|
break;
|
|
case 2:
|
|
printf("power mode = Inactivity based PS \n");
|
|
break;
|
|
}
|
|
if (pm->flags & PS_FLAG_SLEEP_PARAM) {
|
|
printf("Sleep param:\n");
|
|
printf("\tctrl_bitmap=%d\n", (int)pm->sleep_param.ctrl_bitmap);
|
|
printf("\tmin_sleep=%d us\n", (int)pm->sleep_param.min_sleep);
|
|
printf("\tmax_sleep=%d us\n", (int)pm->sleep_param.max_sleep);
|
|
}
|
|
if (pm->flags & PS_FLAG_INACT_SLEEP_PARAM) {
|
|
printf("Inactivity sleep param:\n");
|
|
printf("\tinactivity_to=%d us\n",
|
|
(int)pm->inact_param.inactivity_to);
|
|
printf("\tmin_awake=%d us\n", (int)pm->inact_param.min_awake);
|
|
printf("\tmax_awake=%d us\n", (int)pm->inact_param.max_awake);
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the pscfg command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_pscfg_usage(void)
|
|
{
|
|
printf("\nUsage : pscfg [MODE] [CTRL INACTTO MIN_SLEEP MAX_SLEEP MIN_AWAKE MAX_AWAKE]");
|
|
printf("\nOptions: MODE : 0 - disable power mode");
|
|
printf("\n 1 - periodic DTIM power save mode");
|
|
printf("\n 2 - inactivity based power save mode");
|
|
printf("\n PS PARAMS:");
|
|
printf("\n CTRL: 0 - disable protection frame Tx before PS");
|
|
printf("\n 1 - enable protection frame Tx before PS");
|
|
printf("\n INACTTO: Inactivity timeout in miroseconds");
|
|
printf("\n MIN_SLEEP: Minimum sleep duration in microseconds");
|
|
printf("\n MAX_SLEEP: Maximum sleep duration in miroseconds");
|
|
printf("\n MIN_AWAKE: Minimum awake duration in microseconds");
|
|
printf("\n MAX_AWAKE: Maximum awake duration in microseconds");
|
|
printf("\n MIN_AWAKE,MAX_AWAKE only valid for inactivity based power save mode");
|
|
printf("\n empty - get current power mode\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates power mode request and send to driver
|
|
* and sends to the driver
|
|
*
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_pscfg(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
ps_mgmt pm;
|
|
int ret = UAP_SUCCESS;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_pscfg_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(&pm, 0, sizeof(ps_mgmt));
|
|
/* Check arguments */
|
|
if ((argc > 7) ||
|
|
((argc != 0) && (argc != 1) && (argc != 5) && (argc != 7))) {
|
|
printf("ERR:wrong arguments.\n");
|
|
print_pscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (argc) {
|
|
if (send_power_mode_ioctl(&pm, 1) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) > 2)) {
|
|
printf("ERR:Illegal power mode %s. Must be either '0' '1' or '2'.\n", argv[0]);
|
|
print_pscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
pm.flags = PS_FLAG_PS_MODE;
|
|
pm.ps_mode = atoi(argv[0]);
|
|
if ((pm.ps_mode == PS_MODE_DISABLE) && (argc > 1)) {
|
|
printf("ERR: Illegal parameter for disable power mode\n");
|
|
print_pscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((pm.ps_mode != PS_MODE_INACTIVITY) && (argc > 5)) {
|
|
printf("ERR:Min awake period and Max awake period are valid only for inactivity based power save mode\n");
|
|
print_pscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc >= 5) {
|
|
if ((ISDIGIT(argv[1]) == 0) || (atoi(argv[1]) < 0) ||
|
|
(atoi(argv[1]) > 1)) {
|
|
printf("ERR:Illegal ctrl bitmap = %s. Must be either '0' or '1'.\n", argv[1]);
|
|
print_pscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
pm.flags |=
|
|
PS_FLAG_SLEEP_PARAM | PS_FLAG_INACT_SLEEP_PARAM;
|
|
pm.sleep_param.ctrl_bitmap = atoi(argv[1]);
|
|
if ((ISDIGIT(argv[2]) == 0) || (ISDIGIT(argv[3]) == 0)
|
|
|| (ISDIGIT(argv[4]) == 0)) {
|
|
printf("ERR:Illegal parameter\n");
|
|
print_pscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
pm.inact_param.inactivity_to = atoi(argv[2]);
|
|
pm.sleep_param.min_sleep = atoi(argv[3]);
|
|
pm.sleep_param.max_sleep = atoi(argv[4]);
|
|
if (pm.sleep_param.min_sleep > pm.sleep_param.max_sleep) {
|
|
printf("ERR: MIN_SLEEP value should be less than or equal to MAX_SLEEP\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (pm.sleep_param.min_sleep < PS_SLEEP_PARAM_MIN ||
|
|
((pm.sleep_param.max_sleep > PS_SLEEP_PARAM_MAX) &&
|
|
pm.sleep_param.ctrl_bitmap)) {
|
|
printf("ERR: Incorrect value of sleep period. Please check README\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc == 7) {
|
|
if ((ISDIGIT(argv[5]) == 0) ||
|
|
(ISDIGIT(argv[6]) == 0)) {
|
|
printf("ERR:Illegal parameter\n");
|
|
print_pscfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
pm.inact_param.min_awake = atoi(argv[5]);
|
|
pm.inact_param.max_awake = atoi(argv[6]);
|
|
if (pm.inact_param.min_awake >
|
|
pm.inact_param.max_awake) {
|
|
printf("ERR: MIN_AWAKE value should be less than or equal to MAX_AWAKE\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (pm.inact_param.min_awake <
|
|
PS_AWAKE_PERIOD_MIN) {
|
|
printf("ERR: Incorrect value of MIN_AWAKE period.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
ret = send_power_mode_ioctl(&pm, 0);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Get bss status started/stopped
|
|
*
|
|
* @param current bss status
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
static int
|
|
get_bss_status(int *status)
|
|
{
|
|
apcmdbuf_sys_configure *cmd_buf = NULL;
|
|
tlvbuf_bss_status *tlv = NULL;
|
|
t_u8 *buffer = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int ret = UAP_FAILURE;
|
|
|
|
/* Initialize the command length */
|
|
cmd_len = sizeof(apcmdbuf_sys_configure) + sizeof(tlvbuf_bss_status);
|
|
|
|
/* Initialize the command buffer */
|
|
buffer = (t_u8 *)malloc(buf_len);
|
|
|
|
if (!buffer) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buffer, 0, buf_len);
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_bss_status *)(buffer + sizeof(apcmdbuf_sys_configure));
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->cmd_code = APCMD_SYS_CONFIGURE;
|
|
cmd_buf->size = cmd_len;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
tlv->tag = MRVL_BSS_STATUS_TLV_ID;
|
|
tlv->length = 2;
|
|
cmd_buf->action = ACTION_GET;
|
|
|
|
endian_convert_tlv_header_out(tlv);
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
endian_convert_tlv_header_in(tlv);
|
|
tlv->bss_status = uap_le16_to_cpu(tlv->bss_status);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
/* Verify response */
|
|
if ((cmd_buf->cmd_code !=
|
|
(APCMD_SYS_CONFIGURE | APCMD_RESP_CHECK)) ||
|
|
(tlv->tag != MRVL_BSS_STATUS_TLV_ID)) {
|
|
printf("ERR:Corrupted response! cmd_code=%x, Tlv->tag=%x\n", cmd_buf->cmd_code, tlv->tag);
|
|
free(buffer);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Print response */
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
if (tlv->bss_status == 0)
|
|
*status = UAP_BSS_STOP;
|
|
else
|
|
*status = UAP_BSS_START;
|
|
} else {
|
|
printf("ERR:Could not get BSS status!\n");
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
if (buffer)
|
|
free(buffer);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief start/stop/reset bss
|
|
*
|
|
* @param mode bss control mode
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
send_bss_ctl_ioctl(int mode)
|
|
{
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u32 data = (t_u32)mode;
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)&data;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_BSS_CTRL, &ifr)) {
|
|
printf("ERR:UAP_BSS_CTRL fail, result=%d\n", (int)data);
|
|
switch (mode) {
|
|
case UAP_BSS_START:
|
|
if (data == BSS_FAILURE_START_INVAL)
|
|
printf("ERR:Could not start BSS! Invalid BSS parameters.\n");
|
|
else
|
|
printf("ERR:Could not start BSS!\n");
|
|
break;
|
|
case UAP_BSS_STOP:
|
|
printf("ERR:Could not stop BSS!\n");
|
|
break;
|
|
case UAP_BSS_RESET:
|
|
printf("ERR:Could not reset system!\n");
|
|
break;
|
|
}
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
switch (mode) {
|
|
case UAP_BSS_START:
|
|
printf("BSS start successful!\n");
|
|
break;
|
|
case UAP_BSS_STOP:
|
|
printf("BSS stop successful!\n");
|
|
break;
|
|
case UAP_BSS_RESET:
|
|
printf("System reset successful!\n");
|
|
break;
|
|
}
|
|
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the sys_reset command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_sys_reset_usage(void)
|
|
{
|
|
printf("\nUsage : sys_reset\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a sys_reset request and sends to the driver
|
|
*
|
|
* Usage: "sys_reset"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_sys_reset(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
int ret = UAP_SUCCESS;
|
|
ps_mgmt pm;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_sys_reset_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc != 0) {
|
|
printf("ERR:Too many arguments.\n");
|
|
print_sys_reset_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(&pm, 0, sizeof(ps_mgmt));
|
|
pm.flags = PS_FLAG_PS_MODE;
|
|
pm.ps_mode = PS_MODE_DISABLE;
|
|
if (send_power_mode_ioctl(&pm, 0) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
ret = send_bss_ctl_ioctl(UAP_BSS_RESET);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the bss_start command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_bss_start_usage(void)
|
|
{
|
|
printf("\nUsage : bss_start\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a BSS start request and sends to the driver
|
|
*
|
|
* Usage: "bss_start"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_bss_start(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
t_u8 *buf = NULL;
|
|
t_u16 buf_len = 0;
|
|
int status = 0;
|
|
int ret = UAP_SUCCESS;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_bss_start_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc != 0) {
|
|
printf("ERR:Too many arguments.\n");
|
|
print_bss_start_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (get_bss_status(&status) != UAP_SUCCESS) {
|
|
printf("ERR:Cannot get current bss status!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (status == UAP_BSS_START) {
|
|
printf("ERR: Could not start BSS! BSS already started!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Query BSS settings */
|
|
|
|
/* Alloc buf for command */
|
|
buf_len = sizeof(apcmdbuf_bss_configure) + sizeof(bss_config_t);
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset((char *)buf, 0, buf_len);
|
|
|
|
/* Get all parametes first */
|
|
if (get_bss_config(buf) == UAP_FAILURE) {
|
|
printf("ERR:Reading current bss configuration\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
ret = check_bss_config(buf + sizeof(apcmdbuf_bss_configure));
|
|
|
|
if (ret == UAP_FAILURE) {
|
|
printf("ERR: Wrong bss configuration!\n");
|
|
goto done;
|
|
}
|
|
|
|
ret = send_bss_ctl_ioctl(UAP_BSS_START);
|
|
|
|
done:
|
|
if (buf)
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the bss_stop command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_bss_stop_usage(void)
|
|
{
|
|
printf("\nUsage : bss_stop\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a BSS stop request and sends to the driver
|
|
*
|
|
* Usage: "bss_stop"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_bss_stop(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
int status = 0;
|
|
int ret = UAP_SUCCESS;
|
|
unsigned int cac_timer = 0;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_bss_stop_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind; /* Check arguments */
|
|
|
|
if (argc != 0) {
|
|
printf("ERR:Too many arguments.\n");
|
|
print_bss_stop_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (get_bss_status(&status) != UAP_SUCCESS) {
|
|
printf("ERR:Cannot get current bss status!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if ((status != UAP_BSS_STOP)
|
|
|| ((uap_ioctl_cac_timer_status(&cac_timer) == UAP_SUCCESS)
|
|
&& (cac_timer))
|
|
)
|
|
ret = send_bss_ctl_ioctl(UAP_BSS_STOP);
|
|
else {
|
|
printf("ERR: Could not stop BSS! BSS already stopped!\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
void
|
|
print_skip_cac_usage(void)
|
|
{
|
|
printf("\nUsage : skip_cac [MODE]");
|
|
printf("\nOptions: MODE : 0 - Disable skip CAC mode");
|
|
printf("\n 1 - Enable skip CAC mode");
|
|
printf("\n empty - get skip CAC mode\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Skip CAC for next immediate BSS_START
|
|
*
|
|
* Usage: "skip_cac [1/0]"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_skip_cac(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
skip_cac_para param;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_skip_cac_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(¶m, 0, sizeof(param));
|
|
/* Check arguments */
|
|
if (argc > 1) {
|
|
printf("ERR:wrong arguments. Only support 1 argument\n");
|
|
print_skip_cac_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
param.subcmd = UAP_SKIP_CAC;
|
|
if (argc) {
|
|
if (argc == 1) {
|
|
if ((IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE) ||
|
|
((atoi(argv[0]) < 0) || (atoi(argv[0]) > 1))) {
|
|
printf("ERR: Only Number values are allowed\n");
|
|
print_skip_cac_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
param.action = 1;
|
|
param.skip_cac = (t_u16)A2HEXDECIMAL(argv[0]);
|
|
} else {
|
|
param.action = 0;
|
|
}
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
if (argc)
|
|
printf("ERR:skip_cac set failed\n");
|
|
else {
|
|
perror("");
|
|
printf("ERR:skip_cac get failed\n");
|
|
}
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (!argc) {
|
|
if (param.skip_cac == 1) {
|
|
printf("skip CAC mode: enabled\n");
|
|
} else {
|
|
printf("skip CAC mode: disabled\n");
|
|
}
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the sta_list command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_sta_list_usage(void)
|
|
{
|
|
printf("\nUsage : sta_list\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a STA list request and sends to the driver
|
|
*
|
|
* Usage: "sta_list"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_sta_list(int argc, char *argv[])
|
|
{
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
sta_list list;
|
|
int i = 0;
|
|
int opt;
|
|
int rssi = 0;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_sta_list_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc != 0) {
|
|
printf("ERR:Too many arguments.\n");
|
|
print_sta_list_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(&list, 0, sizeof(sta_list));
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)&list;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_GET_STA_LIST, &ifr)) {
|
|
perror("");
|
|
printf("ERR:UAP_GET_STA_LIST is not supported by %s\n",
|
|
dev_name);
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
printf("Number of STA = %d\n\n", list.sta_count);
|
|
|
|
for (i = 0; i < list.sta_count; i++) {
|
|
printf("STA %d information:\n", i + 1);
|
|
printf("=====================\n");
|
|
printf("MAC Address: ");
|
|
print_mac(list.info[i].mac_address);
|
|
printf("\nPower mgmt status: %s\n",
|
|
(list.info[i].power_mgmt_status ==
|
|
0) ? "active" : "power save");
|
|
printf("Mode: %s\n",
|
|
(list.info[i].bandmode ==
|
|
BAND_B) ? "11b," : (list.info[i].bandmode ==
|
|
BAND_G) ? "11g," : (list.info[i].
|
|
bandmode ==
|
|
BAND_A) ? "11a,"
|
|
: (list.info[i].bandmode ==
|
|
BAND_GN) ? "2.4G_11n," : (list.info[i].bandmode ==
|
|
BAND_AN) ? "5G_11n,"
|
|
: (list.info[i].bandmode ==
|
|
BAND_GAC) ? "2.4G_11ac," : (list.info[i].bandmode ==
|
|
BAND_AAC) ? "5G_11ac,"
|
|
: (list.info[i].bandmode ==
|
|
BAND_GAX) ? "2.4G_11ax," : (list.info[i].bandmode ==
|
|
BAND_AAX) ? "5G_11ax," :
|
|
"unknown");
|
|
/** On some platform, s8 is same as unsigned char*/
|
|
rssi = (int)list.info[i].rssi;
|
|
if (rssi > 0x7f)
|
|
rssi = -(256 - rssi);
|
|
printf("Rssi : %d dBm\n\n", rssi);
|
|
if (list.info[i].ie_len)
|
|
hexdump_data("IE", (void *)list.info[i].ie_buf,
|
|
list.info[i].ie_len, ' ');
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the sta_deauth command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_sta_deauth_usage(void)
|
|
{
|
|
printf("\nUsage : sta_deauth <STA_MAC_ADDRESS>\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a STA deauth request and sends to the driver
|
|
*
|
|
* Usage: "sta_deauth <STA_MAC_ADDRESS>"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_sta_deauth(int argc, char *argv[])
|
|
{
|
|
APCMDBUF_STA_DEAUTH *cmd_buf = NULL;
|
|
t_u8 *buffer = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int ret = UAP_FAILURE;
|
|
int opt;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_sta_deauth_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc != 1) {
|
|
printf("ERR:wrong arguments! Must provide STA_MAC_ADDRESS.\n");
|
|
print_sta_deauth_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Initialize the command length */
|
|
cmd_len = sizeof(APCMDBUF_STA_DEAUTH);
|
|
|
|
/* Initialize the command buffer */
|
|
buffer = (t_u8 *)malloc(buf_len);
|
|
if (!buffer) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buffer, 0, buf_len);
|
|
|
|
/* Locate headers */
|
|
cmd_buf = (APCMDBUF_STA_DEAUTH *)buffer;
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->cmd_code = APCMD_STA_DEAUTH;
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
if ((ret = mac2raw(argv[0], cmd_buf->sta_mac_address)) != UAP_SUCCESS) {
|
|
printf("ERR: %s Address\n", ret == UAP_FAILURE ? "Invalid MAC" :
|
|
ret ==
|
|
UAP_RET_MAC_BROADCAST ? "Broadcast" : "Multicast");
|
|
free(buffer);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
/* Verify response */
|
|
if (cmd_buf->cmd_code != (APCMD_STA_DEAUTH | APCMD_RESP_CHECK)) {
|
|
printf("ERR:Corrupted response!\n");
|
|
free(buffer);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Print response */
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
printf("Deauthentication successful!\n");
|
|
} else {
|
|
printf("ERR:Deauthentication unsuccessful!\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
if (buffer)
|
|
free(buffer);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the sta_deauth_ext command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_sta_deauth_ext_usage(void)
|
|
{
|
|
printf("\nUsage : sta_deauth <STA_MAC_ADDRESS> <REASCON_CODE>\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a STA deauth request and sends to the driver
|
|
*
|
|
* Usage: "sta_deauth <STA_MAC_ADDRESS><REASON_CODE>"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_sta_deauth_ext(int argc, char *argv[])
|
|
{
|
|
int ret = UAP_SUCCESS;
|
|
int opt;
|
|
deauth_param param;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u32 result = 0;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_sta_deauth_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc != 2) {
|
|
printf("ERR:wrong arguments! Must provide STA_MAC_ADDRESS, REASON_CODE.\n");
|
|
print_sta_deauth_ext_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(¶m, 0, sizeof(deauth_param));
|
|
|
|
if ((ret = mac2raw(argv[0], param.mac_addr)) != UAP_SUCCESS) {
|
|
printf("ERR: %s Address\n", ret == UAP_FAILURE ? "Invalid MAC" :
|
|
ret ==
|
|
UAP_RET_MAC_BROADCAST ? "Broadcast" : "Multicast");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if ((IS_HEX_OR_DIGIT(argv[1]) == UAP_FAILURE) ||
|
|
(atoi(argv[1]) > MAX_DEAUTH_REASON_CODE)) {
|
|
printf("ERR: Invalid input for reason code\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
param.reason_code = (t_u16)A2HEXDECIMAL(argv[1]);
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_STA_DEAUTH, &ifr)) {
|
|
memcpy((void *)&result, (void *)¶m, sizeof(result));
|
|
if (result == 1)
|
|
printf("ERR:UAP_STA_DEAUTH fail\n");
|
|
else
|
|
perror("");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
printf("Station deauth successful\n");
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the radioctrl command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_radio_ctl_usage(void)
|
|
{
|
|
printf("\nUsage : radioctrl [ 0 | 1 ]\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a Radio control request and sends to the driver
|
|
*
|
|
* Usage: "radioctrl [0 | 1]"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_radio_ctl(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
int param[2] = { 0, 0 }; /* action (Set/Get), Control (ON/OFF) */
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_radio_ctl_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc > 1) {
|
|
printf("ERR:wrong arguments! Only 1 or 0 arguments are supported.\n");
|
|
print_radio_ctl_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc && (is_input_valid(RADIOCONTROL, argc, argv) != UAP_SUCCESS)) {
|
|
print_radio_ctl_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc) {
|
|
param[0] = ACTION_SET;
|
|
param[1] = atoi(argv[0]);
|
|
}
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)param;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_RADIO_CTL, &ifr)) {
|
|
printf("ERR:UAP_RADIO_CTL fail\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc)
|
|
printf("Radio setting successful\n");
|
|
else
|
|
printf("Radio is %s.\n", (param[1]) ? "on" : "off");
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the txratecfg command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_txratecfg_usage(void)
|
|
{
|
|
printf("\nUsage : txratecfg <datarate index> Index should be one of the following.\n");
|
|
printf("\n [l] is <format>");
|
|
printf("\n <format> - This parameter specifies the data rate format used in this command");
|
|
printf("\n 0: LG");
|
|
printf("\n 1: HT");
|
|
printf("\n 2: VHT");
|
|
printf("\n 3: HE");
|
|
printf("\n 0xff: Auto");
|
|
printf("\n");
|
|
printf("\n [m] is <index>");
|
|
printf("\n <index> - This parameter specifies the rate or MCS index");
|
|
printf("\n If <format> is 0 (LG),");
|
|
printf("\n 0 1 Mbps");
|
|
printf("\n 1 2 Mbps");
|
|
printf("\n 2 5.5 Mbps");
|
|
printf("\n 3 11 Mbps");
|
|
printf("\n 4 6 Mbps");
|
|
printf("\n 5 9 Mbps");
|
|
printf("\n 6 12 Mbps");
|
|
printf("\n 7 18 Mbps");
|
|
printf("\n 8 24 Mbps");
|
|
printf("\n 9 36 Mbps");
|
|
printf("\n 10 48 Mbps");
|
|
printf("\n 11 54 Mbps");
|
|
printf("\n If <format> is 1 (HT), ");
|
|
printf("\n 0 MCS0");
|
|
printf("\n 1 MCS1");
|
|
printf("\n 2 MCS2");
|
|
printf("\n 3 MCS3");
|
|
printf("\n 4 MCS4");
|
|
printf("\n 5 MCS5");
|
|
printf("\n 6 MCS6");
|
|
printf("\n 7 MCS7");
|
|
printf("\n 8 MCS8");
|
|
printf("\n 9 MCS9");
|
|
printf("\n 10 MCS10");
|
|
printf("\n 11 MCS11");
|
|
printf("\n 12 MCS12");
|
|
printf("\n 13 MCS13");
|
|
printf("\n 14 MCS14");
|
|
printf("\n 15 MCS15");
|
|
printf("\n 32 MCS32");
|
|
printf("\n If <format> is 2 (VHT), ");
|
|
printf("\n 0 MCS0");
|
|
printf("\n 1 MCS1");
|
|
printf("\n 2 MCS2");
|
|
printf("\n 3 MCS3");
|
|
printf("\n 4 MCS4");
|
|
printf("\n 5 MCS5");
|
|
printf("\n 6 MCS6");
|
|
printf("\n 7 MCS7");
|
|
printf("\n 8 MCS8");
|
|
printf("\n 9 MCS9");
|
|
printf("\n [n] is <nss>");
|
|
printf("\n <nss> - This parameter specifies the NSS. It is valid only for VHT");
|
|
printf("\n If <format> is 2 (VHT), ");
|
|
printf("\n 1 NSS1");
|
|
printf("\n 2 NSS2");
|
|
printf("\n If <format> is 3 (HE), ");
|
|
printf("\n 0 MCS0");
|
|
printf("\n 1 MCS1");
|
|
printf("\n 2 MCS2");
|
|
printf("\n 3 MCS3");
|
|
printf("\n 4 MCS4");
|
|
printf("\n 5 MCS5");
|
|
printf("\n 6 MCS6");
|
|
printf("\n 7 MCS7");
|
|
printf("\n 8 MCS8");
|
|
printf("\n 9 MCS9");
|
|
printf("\n 10 MCS10");
|
|
printf("\n 11 MCS11");
|
|
printf("\n [n] is <nss>");
|
|
printf("\n <nss> - This parameter specifies the NSS. It is valid only for HE");
|
|
printf("\n If <format> is 3 (HE), ");
|
|
printf("\n 1 NSS1");
|
|
printf("\n 2 NSS2");
|
|
printf("\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a Tx Rate Config get request and sends to the driver
|
|
* @param rate_config Tx rate config struct
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
static int
|
|
get_tx_rate_cfg(tx_rate_cfg_t *rate_config)
|
|
{
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
int ret = UAP_SUCCESS;
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(rate_config, 0, sizeof(tx_rate_cfg_t));
|
|
rate_config->subcmd = UAP_TX_RATE_CFG;
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, strlen(dev_name));
|
|
ifr.ifr_ifru.ifru_data = (void *)rate_config;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
printf("ERR:UAP_IOCTL_CMD fail\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return ret;
|
|
}
|
|
|
|
static char *rate_format[4] = { "LG", "HT", "VHT", "HE" };
|
|
|
|
static char *lg_rate[] = { "1 Mbps", "2 Mbps", "5.5 Mbps", "11 Mbps",
|
|
"6 Mbps", "9 Mbps", "12 Mbps", "18 Mbps",
|
|
"24 Mbps", "36 Mbps", "48 Mbps", "54 Mbps"
|
|
};
|
|
|
|
/**
|
|
* @brief Creates a Tx Rate Config request and sends to the driver
|
|
*
|
|
* Usage: "txratecfg <datarate>"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_tx_rate_cfg(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
int status = 0;
|
|
tx_rate_cfg_t tx_rate_config;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
HTCap_t htcap;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_txratecfg_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc > 3) {
|
|
printf("ERR:wrong arguments! Only 0~3 arguments are supported.\n");
|
|
print_txratecfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc && (is_input_valid(TXRATECFG, argc, argv) != UAP_SUCCESS)) {
|
|
print_txratecfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(&tx_rate_config, 0, sizeof(tx_rate_cfg_t));
|
|
tx_rate_config.subcmd = UAP_TX_RATE_CFG;
|
|
if (argc) {
|
|
tx_rate_config.action = ACTION_SET;
|
|
tx_rate_config.rate_format = A2HEXDECIMAL(argv[0]);
|
|
if (argc >= 2)
|
|
tx_rate_config.rate = A2HEXDECIMAL(argv[1]);
|
|
if (argc >= 3)
|
|
tx_rate_config.nss = A2HEXDECIMAL(argv[2]);
|
|
if (argc == 4)
|
|
tx_rate_config.rate_setting = A2HEXDECIMAL(argv[3]);
|
|
tx_rate_config.user_data_cnt = argc;
|
|
/* If bss is already started and uAP is in (short GI in 20 MHz + GF) mode, block MCS0-MCS7 rates */
|
|
if (get_bss_status(&status) != UAP_SUCCESS) {
|
|
printf("ERR:Cannot get current bss status!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (UAP_SUCCESS == get_sys_cfg_11n(&htcap)) {
|
|
if (htcap.supported_mcs_set[0] &&
|
|
(status == UAP_BSS_START)) {
|
|
if (((tx_rate_config.rate >= 0) &&
|
|
(tx_rate_config.rate <= 7))
|
|
&&
|
|
(IS_11N_20MHZ_SHORTGI_ENABLED
|
|
(htcap.ht_cap_info) &&
|
|
IS_11N_GF_ENABLED(htcap.ht_cap_info))) {
|
|
printf("ERR: Invalid rate for bss in (20MHz Short GI + Green Field) mode\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((tx_rate_config.rate == 32) &&
|
|
(!(IS_11N_40MHZ_ENABLED
|
|
(htcap.ht_cap_info)))) {
|
|
printf("ERR:uAP must be configured to operate in 40MHz if tx_rate is MCS32\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, strlen(dev_name));
|
|
ifr.ifr_ifru.ifru_data = (void *)&tx_rate_config;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
printf("ERR:UAP_IOCTL_CMD fail\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc) {
|
|
printf("Transmit Rate setting successful\n");
|
|
} else {
|
|
/* GET operation */
|
|
printf("Tx Rate Configuration: \n");
|
|
/* format */
|
|
if (tx_rate_config.rate_format == 0xFF) {
|
|
printf(" Type: 0xFF (Auto)\n");
|
|
} else if (tx_rate_config.rate_format <= 3) {
|
|
printf(" Type: %d (%s)\n",
|
|
tx_rate_config.rate_format,
|
|
rate_format[tx_rate_config.rate_format]);
|
|
if (tx_rate_config.rate_format == 0)
|
|
printf(" Rate Index: %d (%s)\n",
|
|
tx_rate_config.rate,
|
|
lg_rate[tx_rate_config.rate]);
|
|
else if (tx_rate_config.rate_format >= 1)
|
|
printf(" MCS Index: %d\n",
|
|
(int)tx_rate_config.rate);
|
|
if (tx_rate_config.rate_format == 2 ||
|
|
tx_rate_config.rate_format == 3)
|
|
printf(" NSS: %d\n",
|
|
(int)tx_rate_config.nss);
|
|
if (tx_rate_config.rate_setting == 0xffff)
|
|
printf("Rate setting :Preamble type/BW/GI/STBC/.. : auto \n");
|
|
else {
|
|
printf("Preamble type: %x\n",
|
|
(tx_rate_config.rate_setting & 0x0003));
|
|
printf("BW: %x\n",
|
|
(tx_rate_config.
|
|
rate_setting & 0x001C) >> 2);
|
|
printf("LTF + GI size %x\n",
|
|
(tx_rate_config.
|
|
rate_setting & 0x0060) >> 5);
|
|
printf("STBC %x\n",
|
|
(tx_rate_config.
|
|
rate_setting & 0x0080) >> 7);
|
|
printf("DCM %x\n",
|
|
(tx_rate_config.
|
|
rate_setting & 0x0100) >> 8);
|
|
printf("Coding %x\n",
|
|
(tx_rate_config.
|
|
rate_setting & 0x0200) >> 9);
|
|
printf("maxPE %x\n",
|
|
(tx_rate_config.
|
|
rate_setting & 0x3000) >> 12);
|
|
}
|
|
} else {
|
|
printf(" Unknown rate format.\n");
|
|
}
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the antcfg
|
|
* command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_antcfg_usage(void)
|
|
{
|
|
printf("\nUsage : antcfg [<TX_MODE> <RX_MODE>]\n");
|
|
printf("\n MODE : 1 - Antenna A");
|
|
printf("\n 2 - Antenna B");
|
|
printf("\n 3 - Antenna A+B");
|
|
printf("\n empty - Get current antenna settings\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a RF Antenna Mode Config request and sends to the driver
|
|
*
|
|
* Usage: "antcfg [MODE]"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_antcfg(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
int tx_val = 0;
|
|
int rx_val = 0;
|
|
ant_cfg_t antenna_config;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_antcfg_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc > 2) {
|
|
printf("ERR:wrong arguments!\n");
|
|
print_antcfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc) {
|
|
sscanf(argv[0], "%x", (unsigned int *)&tx_val);
|
|
if (tx_val < 1 || tx_val > 0x303) {
|
|
printf("ERR:Illegal ANTENNA parameter %s. Must be either '1', '2' or '3'.\n", argv[0]);
|
|
print_antcfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc == 2) {
|
|
sscanf(argv[1], "%x", (unsigned int *)&rx_val);
|
|
if (rx_val < 1 || rx_val > 0x303) {
|
|
printf("ERR:Illegal RX ANTENNA parameter %s. Must be either '1', '2' or '3'.\n", argv[1]);
|
|
print_antcfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
memset(&antenna_config, 0, sizeof(ant_cfg_t));
|
|
antenna_config.subcmd = UAP_ANTENNA_CFG;
|
|
if (argc) {
|
|
antenna_config.action = ACTION_SET;
|
|
if (argc == 1) {
|
|
antenna_config.tx_mode = tx_val;
|
|
antenna_config.rx_mode = tx_val;
|
|
} else {
|
|
antenna_config.tx_mode = tx_val;
|
|
antenna_config.rx_mode = rx_val;
|
|
}
|
|
}
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, strlen(dev_name));
|
|
ifr.ifr_ifru.ifru_data = (void *)&antenna_config;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
printf("ERR:UAP_IOCTL_CMD fail\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc) {
|
|
printf("Antenna mode setting successful\n");
|
|
} else {
|
|
printf("TX Antenna mode is 0x%x.\n", antenna_config.tx_mode);
|
|
printf("RX Antenna mode is 0x%x.\n", antenna_config.rx_mode);
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the htstreamcfg
|
|
* command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_htstreamcfg_usage(void)
|
|
{
|
|
printf("\nUsage : htstreamcfg [<n>]\n");
|
|
printf("\n Where <n> ");
|
|
printf("\n 0x11: HT stream 1x1 mode");
|
|
printf("\n 0x22: HT stream 2x2 mode\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Set/get HT stream configurations
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_htstreamcfg(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
htstream_cfg_t htstream_cfg;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_htstreamcfg_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
|
|
memset(&htstream_cfg, 0, sizeof(htstream_cfg));
|
|
if (argc == 0) {
|
|
htstream_cfg.action = ACTION_GET;
|
|
} else if (argc == 1) {
|
|
if ((t_u32)A2HEXDECIMAL(argv[0]) != HT_STREAM_MODE_1X1
|
|
&& (t_u32)A2HEXDECIMAL(argv[0]) != HT_STREAM_MODE_2X2) {
|
|
printf("ERR:Invalid argument\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
htstream_cfg.action = ACTION_SET;
|
|
htstream_cfg.stream_cfg = (t_u32)A2HEXDECIMAL(argv[0]);
|
|
} else {
|
|
print_htstreamcfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
htstream_cfg.subcmd = UAP_HT_STREAM_CFG;
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)&htstream_cfg;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR: HT STREAM configuration failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Handle response */
|
|
if (htstream_cfg.action == ACTION_GET) {
|
|
if (htstream_cfg.stream_cfg == HT_STREAM_MODE_1X1)
|
|
printf("HT stream is in 1x1 mode\n");
|
|
else if (htstream_cfg.stream_cfg == HT_STREAM_MODE_2X2)
|
|
printf("HT stream is in 2x2 mode\n");
|
|
else
|
|
printf("HT stream is unknown mode\n");
|
|
}
|
|
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
static int
|
|
get_802_11ac_cfg(struct eth_priv_vhtcfg *vhtcfg)
|
|
{
|
|
t_u8 *buf = NULL;
|
|
t_u8 *pos = NULL;
|
|
mrvl_priv_cmd *cmd = NULL;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
buf = (t_u8 *)malloc(MRVDRV_SIZE_OF_CMD_BUFFER);
|
|
if (!buf) {
|
|
printf("ERR: cannot allocate buffer for command payload \n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, MRVDRV_SIZE_OF_CMD_BUFFER);
|
|
|
|
cmd = (mrvl_priv_cmd *)malloc(sizeof(mrvl_priv_cmd));
|
|
if (!cmd) {
|
|
printf("ERR: cannot allocate buffer for cmd \n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/*prepare command: mlanutl uap0 vhtcfg 2 3 , GET operation */
|
|
pos = buf;
|
|
strncpy((char *)pos, CMD_NXP, strlen(CMD_NXP));
|
|
pos += strlen(CMD_NXP);
|
|
strncpy((char *)pos, "vhtcfg2 3", strlen("vhtcfg2 3"));
|
|
|
|
/* fill up buffer */
|
|
cmd->buf = buf;
|
|
cmd->used_len = 0;
|
|
cmd->total_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
|
|
/* Perform IOCTL */
|
|
memset(&ifr, 0, sizeof(struct ifreq));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, strlen(dev_name));
|
|
ifr.ifr_ifru.ifru_data = (void *)cmd;
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
if (cmd)
|
|
free(cmd);
|
|
if (buf)
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (ioctl(sockfd, MRVLPRIVCMD, &ifr)) {
|
|
if (cmd)
|
|
free(cmd);
|
|
if (buf)
|
|
free(buf);
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Process result */
|
|
memcpy(vhtcfg, buf + 1, sizeof(struct eth_priv_vhtcfg));
|
|
|
|
close(sockfd);
|
|
free(cmd);
|
|
free(buf);
|
|
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the sys_config command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_sys_config_usage(void)
|
|
{
|
|
printf("\nUsage : sys_config [CONFIG_FILE]\n");
|
|
printf("\nIf CONFIG_FILE is provided, a 'set' is performed, else a 'get' is performed.\n");
|
|
printf("CONFIG_FILE is file contain all the Micro AP settings.\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the rdeeprom command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_apcmd_read_eeprom_usage(void)
|
|
{
|
|
printf("\nUsage: rdeeprom <offset> <bytecount>\n");
|
|
printf(" offset : 0,4,8,..., multiple of 4\n");
|
|
printf(" bytecount : 4-20, multiple of 4\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Show protocol tlv
|
|
*
|
|
* @param protocol Protocol number
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_protocol(t_u16 protocol)
|
|
{
|
|
switch (protocol) {
|
|
case 0:
|
|
case PROTOCOL_NO_SECURITY:
|
|
printf("PROTOCOL = No security\n");
|
|
break;
|
|
case PROTOCOL_STATIC_WEP:
|
|
printf("PROTOCOL = Static WEP\n");
|
|
break;
|
|
case PROTOCOL_WPA:
|
|
printf("PROTOCOL = WPA \n");
|
|
break;
|
|
case PROTOCOL_WPA2:
|
|
printf("PROTOCOL = WPA2 \n");
|
|
break;
|
|
case PROTOCOL_WPA | PROTOCOL_WPA2:
|
|
printf("PROTOCOL = WPA/WPA2 \n");
|
|
break;
|
|
case PROTOCOL_WPA3_SAE:
|
|
printf("PROTOCOL = WPA3 SAE \n");
|
|
break;
|
|
default:
|
|
printf("Unknown PROTOCOL: 0x%x \n", protocol);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Show wep tlv
|
|
*
|
|
* @param tlv Pointer to wep tlv
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_wep_key(tlvbuf_wep_key *tlv)
|
|
{
|
|
int i;
|
|
t_u16 tlv_len;
|
|
|
|
tlv_len = *(t_u8 *)&tlv->length;
|
|
tlv_len |= (*((t_u8 *)&tlv->length + 1) << 8);
|
|
|
|
if (tlv_len <= 2) {
|
|
printf("wrong wep_key tlv: length=%d\n", tlv_len);
|
|
return;
|
|
}
|
|
printf("WEP KEY_%d = ", tlv->key_index);
|
|
for (i = 0; i < tlv_len - 2; i++)
|
|
printf("%02x ", tlv->key[i]);
|
|
if (tlv->is_default)
|
|
printf("\nDefault WEP Key = %d\n", tlv->key_index);
|
|
else
|
|
printf("\n");
|
|
}
|
|
|
|
/**
|
|
* @brief Parses a command line
|
|
*
|
|
* @param line The line to parse
|
|
* @param args Pointer to the argument buffer to be filled in
|
|
* @return Number of arguments in the line or EOF
|
|
*/
|
|
static int
|
|
parse_line(char *line, char *args[])
|
|
{
|
|
int arg_num = 0;
|
|
int is_start = 0;
|
|
int is_quote = 0;
|
|
int is_escape = 0;
|
|
int length = 0;
|
|
int i = 0;
|
|
int j = 0;
|
|
|
|
arg_num = 0;
|
|
length = strlen(line);
|
|
/* Process line */
|
|
|
|
/* Find number of arguments */
|
|
is_start = 0;
|
|
is_quote = 0;
|
|
for (i = 0; i < length; i++) {
|
|
/* Ignore leading spaces */
|
|
if (is_start == 0) {
|
|
if (line[i] == ' ') {
|
|
continue;
|
|
} else if (line[i] == '\t') {
|
|
continue;
|
|
} else if (line[i] == '\n') {
|
|
break;
|
|
} else {
|
|
is_start = 1;
|
|
args[arg_num] = &line[i];
|
|
arg_num++;
|
|
}
|
|
}
|
|
if (is_start == 1) {
|
|
if ((line[i] == '\\') && (i < (length - 1))) {
|
|
if (line[i + 1] == '"') {
|
|
is_escape = 1;
|
|
for (j = i; j < length - 1; j++) {
|
|
line[j] = line[j + 1];
|
|
}
|
|
line[length - 1] = '\0';
|
|
continue;
|
|
}
|
|
}
|
|
/* Ignore comments */
|
|
if (line[i] == '#') {
|
|
if (is_quote == 0) {
|
|
line[i] = '\0';
|
|
arg_num--;
|
|
}
|
|
break;
|
|
}
|
|
/* Separate by '=' */
|
|
if (line[i] == '=') {
|
|
if (is_quote == 0) {
|
|
line[i] = '\0';
|
|
is_start = 0;
|
|
continue;
|
|
}
|
|
}
|
|
/* Separate by ',' */
|
|
if (line[i] == ',') {
|
|
if (is_quote == 0) {
|
|
line[i] = '\0';
|
|
is_start = 0;
|
|
continue;
|
|
}
|
|
}
|
|
/* Change ',' to ' ', but not inside quotes */
|
|
if ((line[i] == ',') && (is_quote == 0)) {
|
|
line[i] = ' ';
|
|
continue;
|
|
}
|
|
}
|
|
/* Remove newlines */
|
|
if (line[i] == '\n') {
|
|
line[i] = '\0';
|
|
}
|
|
/* Check for quotes */
|
|
if (line[i] == '"') {
|
|
if (is_escape) {
|
|
is_escape = 0;
|
|
/* no change in is_quote */
|
|
} else {
|
|
is_quote = (is_quote == 1) ? 0 : 1;
|
|
}
|
|
continue;
|
|
}
|
|
if (((line[i] == ' ') || (line[i] == '\t')) && (is_quote == 0)) {
|
|
line[i] = '\0';
|
|
is_start = 0;
|
|
continue;
|
|
}
|
|
}
|
|
return arg_num;
|
|
}
|
|
|
|
/**
|
|
* @brief Parse function for a configuration line
|
|
*
|
|
* @param s Storage buffer for data
|
|
* @param size Maximum size of data
|
|
* @param stream File stream pointer
|
|
* @param line Pointer to current line within the file
|
|
* @param _pos Output string or NULL
|
|
* @return String or NULL
|
|
*/
|
|
static char *
|
|
config_get_line(char *s, int size, FILE * stream, int *line, char **_pos)
|
|
{
|
|
*_pos = mlan_config_get_line(stream, s, size, line);
|
|
return *_pos;
|
|
}
|
|
|
|
/**
|
|
* @brief Read the profile and sends to the driver
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_sys_config_profile(int argc, char *argv[])
|
|
{
|
|
FILE *config_file = NULL;
|
|
char *line = NULL;
|
|
int li = 0;
|
|
char *pos = NULL;
|
|
int arg_num = 0;
|
|
char *args[30];
|
|
int i;
|
|
int is_ap_config = 0;
|
|
int is_ap_mac_filter = 0;
|
|
apcmdbuf_sys_configure *cmd_buf = NULL;
|
|
HTCap_t htcap;
|
|
int enable_11n = -1;
|
|
t_u16 tlv_offset_11n = 0;
|
|
t_u32 supported_mcs_set = 0;
|
|
t_u8 *buffer = NULL;
|
|
t_u8 *tmp_buffer = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 tlv_len = 0;
|
|
int keyindex = -1;
|
|
int protocol = -1;
|
|
int pwkcipher_wpa = -1;
|
|
int pwkcipher_wpa2 = -1;
|
|
int gwkcipher = -1;
|
|
tlvbuf_sta_mac_addr_filter *filter_tlv = NULL;
|
|
tlvbuf_channel_config *channel_band_tlv = NULL;
|
|
int filter_mac_count = -1;
|
|
int tx_data_rate = -1;
|
|
int tx_beacon_rate = -1;
|
|
int mcbc_data_rate = -1;
|
|
t_u8 rate[MAX_RATES];
|
|
int found = 0;
|
|
char country_80211d[4];
|
|
t_u8 state_80211d = 0;
|
|
int chan_mode = 0;
|
|
int band = 0;
|
|
int band_flag = 0;
|
|
int chan_number = 0;
|
|
t_u16 max_sta_num_supported = 0;
|
|
fw_info fw;
|
|
struct eth_priv_vhtcfg vhtcfg = { 0 };
|
|
int ret = UAP_SUCCESS;
|
|
memset(rate, 0, MAX_RATES);
|
|
/* Check if file exists */
|
|
config_file = fopen(argv[0], "r");
|
|
if (config_file == NULL) {
|
|
printf("\nERR:Config file can not open.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
line = (char *)malloc(MAX_CONFIG_LINE);
|
|
if (!line) {
|
|
printf("ERR:Cannot allocate memory for line\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
memset(line, 0, MAX_CONFIG_LINE);
|
|
|
|
/* Parse file and process */
|
|
while (config_get_line(line, MAX_CONFIG_LINE, config_file, &li, &pos)) {
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG, "DBG:Received config line (%d) = %s\n",
|
|
li, line);
|
|
#endif
|
|
arg_num = parse_line(line, args);
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG, "DBG:Number of arguments = %d\n",
|
|
arg_num);
|
|
for (i = 0; i < arg_num; i++) {
|
|
uap_printf(MSG_DEBUG, "\tDBG:Argument %d. %s\n", i + 1,
|
|
args[i]);
|
|
}
|
|
#endif
|
|
/* Check for end of AP configurations */
|
|
if (is_ap_config == 1) {
|
|
if (strcmp(args[0], "}") == 0) {
|
|
is_ap_config = 0;
|
|
if (tx_data_rate != -1) {
|
|
if ((!rate[0]) && (tx_data_rate) &&
|
|
(is_tx_rate_valid
|
|
((t_u8)tx_data_rate) !=
|
|
UAP_SUCCESS)) {
|
|
printf("ERR: Invalid Tx Data Rate \n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (rate[0] && tx_data_rate) {
|
|
for (i = 0; rate[i] != 0; i++) {
|
|
if ((rate[i] &
|
|
~BASIC_RATE_SET_BIT)
|
|
== tx_data_rate) {
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
if (!found) {
|
|
printf("ERR: Invalid Tx Data Rate \n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
}
|
|
if (tx_beacon_rate != -1) {
|
|
if ((!rate[0]) && (tx_beacon_rate) &&
|
|
(is_tx_rate_valid
|
|
((t_u8)tx_beacon_rate) !=
|
|
UAP_SUCCESS)) {
|
|
printf("ERR: Invalid Tx Beacon Rate \n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (rate[0] && tx_beacon_rate) {
|
|
for (i = 0; rate[i] != 0; i++) {
|
|
if ((rate[i] &
|
|
~BASIC_RATE_SET_BIT)
|
|
== tx_beacon_rate) {
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
if (!found) {
|
|
printf("ERR: Invalid Tx Beacon Rate \n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
/* Append a new TLV */
|
|
tlvbuf_tx_data_rate *tlv = NULL;
|
|
tlv_len = sizeof(tlvbuf_tx_data_rate);
|
|
tmp_buffer =
|
|
realloc(buffer,
|
|
cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append tx beacon rate TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf =
|
|
(apcmdbuf_sys_configure *)
|
|
buffer;
|
|
tlv = (tlvbuf_tx_data_rate *)(buffer +
|
|
cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_TX_BEACON_RATE_TLV_ID;
|
|
tlv->length = 2;
|
|
tlv->tx_data_rate = tx_beacon_rate;
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->tx_data_rate =
|
|
uap_cpu_to_le16(tlv->
|
|
tx_data_rate);
|
|
}
|
|
if (mcbc_data_rate != -1) {
|
|
if ((!rate[0]) && (mcbc_data_rate) &&
|
|
(is_mcbc_rate_valid
|
|
((t_u8)mcbc_data_rate) !=
|
|
UAP_SUCCESS)) {
|
|
printf("ERR: Invalid Tx Data Rate \n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (rate[0] && mcbc_data_rate) {
|
|
for (i = 0; rate[i] != 0; i++) {
|
|
if (rate[i] &
|
|
BASIC_RATE_SET_BIT)
|
|
{
|
|
if ((rate[i] &
|
|
~BASIC_RATE_SET_BIT)
|
|
==
|
|
mcbc_data_rate)
|
|
{
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
if (!found) {
|
|
printf("ERR: Invalid MCBC Data Rate \n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
/* Append a new TLV */
|
|
tlvbuf_mcbc_data_rate *tlv = NULL;
|
|
tlv_len = sizeof(tlvbuf_mcbc_data_rate);
|
|
tmp_buffer =
|
|
realloc(buffer,
|
|
cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append tx data rate TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf =
|
|
(apcmdbuf_sys_configure *)
|
|
buffer;
|
|
tlv = (tlvbuf_mcbc_data_rate *)(buffer +
|
|
cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_MCBC_DATA_RATE_TLV_ID;
|
|
tlv->length = 2;
|
|
tlv->mcbc_datarate = mcbc_data_rate;
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->mcbc_datarate =
|
|
uap_cpu_to_le16(tlv->
|
|
mcbc_datarate);
|
|
}
|
|
if ((protocol == PROTOCOL_STATIC_WEP) &&
|
|
(enable_11n == 1)) {
|
|
printf("ERR:WEP cannot be used when AP operates in 802.11n mode.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if ((protocol == PROTOCOL_WPA2_MIXED) &&
|
|
((pwkcipher_wpa < 0) ||
|
|
(pwkcipher_wpa2 < 0))) {
|
|
printf("ERR:Both PwkCipherWPA and PwkCipherWPA2 should be defined for Mixed mode.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
if (((pwkcipher_wpa >= 0) ||
|
|
(pwkcipher_wpa2 >= 0)) &&
|
|
(gwkcipher >= 0)) {
|
|
if ((protocol == PROTOCOL_WPA) ||
|
|
(protocol == PROTOCOL_WPA2_MIXED)) {
|
|
if (enable_11n != -1) {
|
|
if (is_cipher_valid_with_11n(pwkcipher_wpa, gwkcipher, protocol, enable_11n) != UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA pairwise cipher combination!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else if
|
|
(is_cipher_valid_with_proto
|
|
(pwkcipher_wpa,
|
|
gwkcipher,
|
|
protocol) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA pairwise cipher combination!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
if ((protocol == PROTOCOL_WPA2) ||
|
|
(protocol == PROTOCOL_WPA2_MIXED)
|
|
|| (protocol == PROTOCOL_WPA3_SAE)
|
|
) {
|
|
if (enable_11n != -1) {
|
|
if (is_cipher_valid_with_11n(pwkcipher_wpa2, gwkcipher, protocol, enable_11n) != UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA2 pairwise cipher combination!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else if
|
|
(is_cipher_valid_with_proto
|
|
(pwkcipher_wpa2,
|
|
gwkcipher,
|
|
protocol) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA2 pairwise cipher combination!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (0 == get_fw_info(&fw)) {
|
|
/*check whether support 802.11AC through BAND_AAC bit */
|
|
if (fw.fw_bands & BAND_AAC) {
|
|
ret = get_802_11ac_cfg(&vhtcfg);
|
|
if (ret != UAP_SUCCESS)
|
|
goto done;
|
|
if (enable_11n != -1) {
|
|
/* Note: When 11AC is disabled, FW sets vht_rx_mcs to 0xffff */
|
|
if ((vhtcfg.
|
|
vht_rx_mcs !=
|
|
0xffff) &&
|
|
(!enable_11n)) {
|
|
printf("ERR: 11n must be enabled when AP operates in 11ac mode. \n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
} else
|
|
printf("No support 802 11AC.\n");
|
|
} else {
|
|
printf("ERR: get_fw_info fail\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
if (protocol != -1) {
|
|
tlvbuf_protocol *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_protocol);
|
|
tmp_buffer =
|
|
realloc(buffer,
|
|
cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append protocol TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf =
|
|
(apcmdbuf_sys_configure *)
|
|
buffer;
|
|
tlv = (tlvbuf_protocol *)(buffer +
|
|
cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_PROTOCOL_TLV_ID;
|
|
tlv->length = 2;
|
|
tlv->protocol = protocol;
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->protocol =
|
|
uap_cpu_to_le16(tlv->protocol);
|
|
if (protocol &
|
|
(PROTOCOL_WPA | PROTOCOL_WPA2 |
|
|
PROTOCOL_WPA3_SAE)) {
|
|
tlvbuf_akmp *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_akmp);
|
|
tmp_buffer =
|
|
realloc(buffer,
|
|
cmd_len +
|
|
tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append AKMP TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf =
|
|
(apcmdbuf_sys_configure
|
|
*)buffer;
|
|
tlv = (tlvbuf_akmp *)(buffer +
|
|
cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_AKMP_TLV_ID;
|
|
tlv->length = 4; /* sizeof(tlvbuf_akmp) - TLVHEADER */
|
|
if (protocol &
|
|
PROTOCOL_WPA3_SAE) {
|
|
tlv->key_mgmt =
|
|
KEY_MGMT_SAE;
|
|
} else {
|
|
tlv->key_mgmt =
|
|
KEY_MGMT_PSK;
|
|
}
|
|
endian_convert_tlv_header_out
|
|
(tlv);
|
|
tlv->key_mgmt =
|
|
uap_cpu_to_le16(tlv->
|
|
key_mgmt);
|
|
tlv->key_mgmt_operation = 0;
|
|
}
|
|
}
|
|
if (pwkcipher_wpa >= 0) {
|
|
tlvbuf_pwk_cipher *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_pwk_cipher);
|
|
tmp_buffer =
|
|
realloc(buffer,
|
|
cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append cipher TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf =
|
|
(apcmdbuf_sys_configure *)
|
|
buffer;
|
|
tlv = (tlvbuf_pwk_cipher *)(buffer +
|
|
cmd_len);
|
|
memset(tlv, 0, tlv_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_CIPHER_PWK_TLV_ID;
|
|
tlv->length =
|
|
sizeof(tlvbuf_pwk_cipher) -
|
|
TLVHEADER_LEN;
|
|
tlv->pairwise_cipher = pwkcipher_wpa;
|
|
tlv->protocol = PROTOCOL_WPA;
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->protocol =
|
|
uap_cpu_to_le16(tlv->protocol);
|
|
}
|
|
|
|
if (pwkcipher_wpa2 >= 0) {
|
|
tlvbuf_pwk_cipher *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_pwk_cipher);
|
|
tmp_buffer =
|
|
realloc(buffer,
|
|
cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append cipher TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf =
|
|
(apcmdbuf_sys_configure *)
|
|
buffer;
|
|
tlv = (tlvbuf_pwk_cipher *)(buffer +
|
|
cmd_len);
|
|
memset(tlv, 0, tlv_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_CIPHER_PWK_TLV_ID;
|
|
tlv->length =
|
|
sizeof(tlvbuf_pwk_cipher) -
|
|
TLVHEADER_LEN;
|
|
tlv->pairwise_cipher = pwkcipher_wpa2;
|
|
tlv->protocol = PROTOCOL_WPA2;
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->protocol =
|
|
uap_cpu_to_le16(tlv->protocol);
|
|
}
|
|
|
|
if (gwkcipher >= 0) {
|
|
tlvbuf_gwk_cipher *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_gwk_cipher);
|
|
tmp_buffer =
|
|
realloc(buffer,
|
|
cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append cipher TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf =
|
|
(apcmdbuf_sys_configure *)
|
|
buffer;
|
|
tlv = (tlvbuf_gwk_cipher *)(buffer +
|
|
cmd_len);
|
|
memset(tlv, 0, tlv_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_CIPHER_GWK_TLV_ID;
|
|
tlv->length =
|
|
sizeof(tlvbuf_gwk_cipher) -
|
|
TLVHEADER_LEN;
|
|
tlv->group_cipher = gwkcipher;
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
|
|
cmd_buf->size = cmd_len;
|
|
/* Send collective command */
|
|
if (uap_ioctl
|
|
((t_u8 *)cmd_buf, &cmd_len,
|
|
cmd_len) == UAP_SUCCESS) {
|
|
if (cmd_buf->result != CMD_SUCCESS) {
|
|
printf("ERR: Failed to set the configuration!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else {
|
|
printf("ERR: Command sending failed!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
cmd_len = 0;
|
|
if (buffer) {
|
|
free(buffer);
|
|
buffer = NULL;
|
|
}
|
|
continue;
|
|
}
|
|
}
|
|
|
|
/* Check for beginning of AP configurations */
|
|
if (strcmp(args[0], "ap_config") == 0) {
|
|
is_ap_config = 1;
|
|
cmd_len = sizeof(apcmdbuf_sys_configure);
|
|
if (buffer) {
|
|
free(buffer);
|
|
buffer = NULL;
|
|
}
|
|
buffer = (t_u8 *)malloc(cmd_len);
|
|
if (!buffer) {
|
|
printf("ERR:Cannot allocate memory!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
cmd_buf->cmd_code = APCMD_SYS_CONFIGURE;
|
|
cmd_buf->size = cmd_len;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->action = ACTION_SET;
|
|
continue;
|
|
}
|
|
|
|
/* Check for end of AP MAC address filter configurations */
|
|
if (is_ap_mac_filter == 1) {
|
|
if (strcmp(args[0], "}") == 0) {
|
|
is_ap_mac_filter = 0;
|
|
if (filter_tlv->count != filter_mac_count) {
|
|
printf("ERR:Number of MAC address provided does not match 'Count'\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (filter_tlv->count) {
|
|
filter_tlv->length =
|
|
(filter_tlv->count * ETH_ALEN) +
|
|
2;
|
|
cmd_len -=
|
|
(MAX_MAC_ONESHOT_FILTER -
|
|
filter_mac_count) * ETH_ALEN;
|
|
} else {
|
|
filter_tlv->length =
|
|
(MAX_MAC_ONESHOT_FILTER *
|
|
ETH_ALEN) + 2;
|
|
memset(filter_tlv->mac_address, 0,
|
|
MAX_MAC_ONESHOT_FILTER *
|
|
ETH_ALEN);
|
|
}
|
|
cmd_buf->size = cmd_len;
|
|
endian_convert_tlv_header_out(filter_tlv);
|
|
if (uap_ioctl
|
|
((t_u8 *)cmd_buf, &cmd_len,
|
|
cmd_len) == UAP_SUCCESS) {
|
|
if (cmd_buf->result != CMD_SUCCESS) {
|
|
printf("ERR: Failed to set the configuration!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else {
|
|
printf("ERR: Command sending failed!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
cmd_len = 0;
|
|
if (buffer) {
|
|
free(buffer);
|
|
buffer = NULL;
|
|
}
|
|
continue;
|
|
}
|
|
}
|
|
|
|
if (strcmp(args[0], "11d_enable") == 0) {
|
|
if (IS_HEX_OR_DIGIT(args[1]) == UAP_FAILURE) {
|
|
printf("ERR: valid input for state are 0 or 1\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
state_80211d = (t_u8)A2HEXDECIMAL(args[1]);
|
|
|
|
if ((state_80211d != 0) && (state_80211d != 1)) {
|
|
printf("ERR: valid input for state are 0 or 1 \n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (sg_snmp_mib
|
|
(ACTION_SET, OID_80211D_ENABLE,
|
|
sizeof(state_80211d), &state_80211d)
|
|
== UAP_FAILURE) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
if (strcmp(args[0], "country") == 0) {
|
|
apcmdbuf_cfg_80211d *cmd_buf = NULL;
|
|
ieeetypes_subband_set_t sub_bands[MAX_SUB_BANDS];
|
|
t_u8 no_of_sub_band = 0;
|
|
t_u16 buf_len;
|
|
t_u16 cmdlen;
|
|
t_u8 *buf = NULL;
|
|
|
|
if ((strlen(args[1]) > 3) || (strlen(args[1]) == 0)) {
|
|
printf("In-correct country input\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
strncpy(country_80211d, args[1],
|
|
sizeof(country_80211d) - 1);
|
|
for (i = 0; (unsigned int)i < strlen(country_80211d);
|
|
i++) {
|
|
if ((country_80211d[i] < 'A') ||
|
|
(country_80211d[i] > 'z')) {
|
|
printf("Invalid Country Code\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (country_80211d[i] > 'Z')
|
|
country_80211d[i] =
|
|
country_80211d[i] - 'a' + 'A';
|
|
}
|
|
no_of_sub_band =
|
|
parse_domain_file(country_80211d, band,
|
|
sub_bands, NULL);
|
|
if (no_of_sub_band == UAP_FAILURE) {
|
|
printf("Parsing Failed\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
buf_len = sizeof(apcmdbuf_cfg_80211d);
|
|
buf_len +=
|
|
no_of_sub_band *
|
|
sizeof(ieeetypes_subband_set_t);
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
cmd_buf = (apcmdbuf_cfg_80211d *)buf;
|
|
cmdlen = buf_len;
|
|
cmd_buf->size = cmdlen - BUF_HEADER_SIZE;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->action = uap_cpu_to_le16(ACTION_SET);
|
|
cmd_buf->cmd_code = HostCmd_CMD_802_11D_DOMAIN_INFO;
|
|
cmd_buf->domain.tag = uap_cpu_to_le16(TLV_TYPE_DOMAIN);
|
|
cmd_buf->domain.length =
|
|
uap_cpu_to_le16(sizeof(domain_param_t)
|
|
- BUF_HEADER_SIZE +
|
|
(no_of_sub_band *
|
|
sizeof
|
|
(ieeetypes_subband_set_t)));
|
|
|
|
memset(cmd_buf->domain.country_code, ' ',
|
|
sizeof(cmd_buf->domain.country_code));
|
|
memcpy(cmd_buf->domain.country_code, country_80211d,
|
|
strlen(country_80211d));
|
|
memcpy(cmd_buf->domain.subband, sub_bands,
|
|
no_of_sub_band *
|
|
sizeof(ieeetypes_subband_set_t));
|
|
|
|
/* Send the command */
|
|
if (uap_ioctl((t_u8 *)cmd_buf, &cmdlen, cmdlen) ==
|
|
UAP_SUCCESS) {
|
|
if (cmd_buf->result != CMD_SUCCESS) {
|
|
printf("ERR: Failed to set the configuration!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else {
|
|
printf("ERR: Command sending failed!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
if (buf)
|
|
free(buf);
|
|
}
|
|
|
|
/* Check for beginning of AP MAC address filter configurations */
|
|
if (strcmp(args[0], "ap_mac_filter") == 0) {
|
|
is_ap_mac_filter = 1;
|
|
cmd_len =
|
|
sizeof(apcmdbuf_sys_configure) +
|
|
sizeof(tlvbuf_sta_mac_addr_filter) +
|
|
(MAX_MAC_ONESHOT_FILTER * ETH_ALEN);
|
|
if (buffer) {
|
|
free(buffer);
|
|
buffer = NULL;
|
|
}
|
|
buffer = (t_u8 *)malloc(cmd_len);
|
|
if (!buffer) {
|
|
printf("ERR:Cannot allocate memory!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
cmd_buf->cmd_code = APCMD_SYS_CONFIGURE;
|
|
cmd_buf->size = cmd_len;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->action = ACTION_SET;
|
|
filter_tlv =
|
|
(tlvbuf_sta_mac_addr_filter *)(buffer +
|
|
sizeof
|
|
(apcmdbuf_sys_configure));
|
|
filter_tlv->tag = MRVL_STA_MAC_ADDR_FILTER_TLV_ID;
|
|
filter_tlv->length = 2;
|
|
filter_tlv->count = 0;
|
|
filter_mac_count = 0;
|
|
continue;
|
|
}
|
|
if ((strcmp(args[0], "FilterMode") == 0) && is_ap_mac_filter) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0) ||
|
|
(atoi(args[1]) > 2)) {
|
|
printf("ERR:Illegal FilterMode paramter %d. Must be either '0', '1', or '2'.\n", atoi(args[1]));
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
filter_tlv->filter_mode = atoi(args[1]);
|
|
continue;
|
|
}
|
|
if ((strcmp(args[0], "Count") == 0) && is_ap_mac_filter) {
|
|
filter_tlv->count = atoi(args[1]);
|
|
if ((ISDIGIT(args[1]) == 0) ||
|
|
(filter_tlv->count > MAX_MAC_ONESHOT_FILTER)) {
|
|
printf("ERR: Illegal Count parameter.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
if ((strncmp(args[0], "mac_", 4) == 0) && is_ap_mac_filter) {
|
|
if (filter_mac_count < MAX_MAC_ONESHOT_FILTER) {
|
|
if (mac2raw
|
|
(args[1],
|
|
&filter_tlv->mac_address[filter_mac_count *
|
|
ETH_ALEN]) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR: Invalid MAC address %s \n",
|
|
args[1]);
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
filter_mac_count++;
|
|
} else {
|
|
printf("ERR: Filter table can not have more than %d MAC addresses\n", MAX_MAC_ONESHOT_FILTER);
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
if (strcmp(args[0], "SSID") == 0) {
|
|
if (arg_num == 1) {
|
|
printf("ERR:SSID field is blank!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
tlvbuf_ssid *tlv = NULL;
|
|
if (args[1][0] == '"') {
|
|
args[1]++;
|
|
}
|
|
if (args[1][strlen(args[1]) - 1] == '"') {
|
|
args[1][strlen(args[1]) - 1] = '\0';
|
|
}
|
|
if ((strlen(args[1]) > MAX_SSID_LENGTH) ||
|
|
(strlen(args[1]) == 0)) {
|
|
printf("ERR:SSID length out of range (%d to %d).\n", MIN_SSID_LENGTH, MAX_SSID_LENGTH);
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_ssid) + strlen(args[1]);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot realloc SSID TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_ssid *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_SSID_TLV_ID;
|
|
tlv->length = strlen(args[1]);
|
|
memcpy(tlv->ssid, args[1], tlv->length);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
}
|
|
if (strcmp(args[0], "BeaconPeriod") == 0) {
|
|
if (is_input_valid(BEACONPERIOD, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_beacon_period *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_beacon_period);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot realloc beacon period TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_beacon_period *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_BEACON_PERIOD_TLV_ID;
|
|
tlv->length = 2;
|
|
tlv->beacon_period_ms = (t_u16)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->beacon_period_ms =
|
|
uap_cpu_to_le16(tlv->beacon_period_ms);
|
|
}
|
|
if (strcmp(args[0], "ChanList") == 0) {
|
|
if (is_input_valid(SCANCHANNELS, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
tlvbuf_channel_list *tlv = NULL;
|
|
channel_list *pchan_list = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len =
|
|
sizeof(tlvbuf_channel_list) +
|
|
((arg_num - 1) * sizeof(channel_list));
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append channel list TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_channel_list *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_CHANNELLIST_TLV_ID;
|
|
tlv->length = sizeof(channel_list) * (arg_num - 1);
|
|
pchan_list = (channel_list *) tlv->chan_list;
|
|
for (i = 0; i < (arg_num - 1); i++) {
|
|
band_flag = -1;
|
|
sscanf(args[i + 1], "%d.%d", &chan_number,
|
|
&band_flag);
|
|
pchan_list->chan_number = chan_number;
|
|
pchan_list->bandcfg.chanBand = BAND_2GHZ;
|
|
if (((band_flag != -1) && (band_flag)) ||
|
|
(chan_number > MAX_CHANNELS_BG)) {
|
|
pchan_list->bandcfg.chanBand =
|
|
BAND_5GHZ;
|
|
}
|
|
pchan_list++;
|
|
}
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "Channel") == 0) {
|
|
if (is_input_valid(CHANNEL, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_channel_config *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_channel_config);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append channel TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_channel_config *)(buffer + cmd_len);
|
|
channel_band_tlv = tlv;
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_CHANNELCONFIG_TLV_ID;
|
|
tlv->length =
|
|
sizeof(tlvbuf_channel_config) - TLVHEADER_LEN;
|
|
tlv->chan_number = (t_u8)atoi(args[1]);
|
|
if (tlv->chan_number > MAX_CHANNELS_BG)
|
|
band = BAND_A;
|
|
else
|
|
band = BAND_B | BAND_G;
|
|
if ((arg_num - 1) == 2) {
|
|
chan_mode = atoi(args[2]);
|
|
memset(&(tlv->bandcfg), 0,
|
|
sizeof(tlv->bandcfg));
|
|
if (chan_mode & BITMAP_ACS_MODE) {
|
|
int mode;
|
|
if (uap_ioctl_dfs_repeater_mode(&mode)
|
|
== UAP_SUCCESS) {
|
|
if (mode) {
|
|
printf("ERR: ACS in DFS Repeater mode" " is not allowed\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
tlv->bandcfg.scanMode = SCAN_MODE_ACS;
|
|
}
|
|
if (chan_mode & BITMAP_CHANNEL_ABOVE)
|
|
tlv->bandcfg.chan2Offset =
|
|
SEC_CHAN_ABOVE;
|
|
if (chan_mode & BITMAP_CHANNEL_BELOW)
|
|
tlv->bandcfg.chan2Offset =
|
|
SEC_CHAN_BELOW;
|
|
} else
|
|
memset(&(tlv->bandcfg), 0,
|
|
sizeof(tlv->bandcfg));
|
|
if (tlv->chan_number > MAX_CHANNELS_BG) {
|
|
tlv->bandcfg.chanBand = BAND_5GHZ;
|
|
}
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "Band") == 0) {
|
|
if (is_input_valid(BAND, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (channel_band_tlv == NULL) {
|
|
printf("ERR: Channel parameter should be specified before Band\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* If band is provided, clear previous value of band */
|
|
channel_band_tlv->bandcfg.chanBand = BAND_2GHZ;
|
|
if (atoi(args[1]) == 0) {
|
|
band = BAND_B | BAND_G;
|
|
} else {
|
|
channel_band_tlv->bandcfg.chanBand = BAND_5GHZ;
|
|
band = BAND_A;
|
|
}
|
|
}
|
|
if (strcmp(args[0], "AP_MAC") == 0) {
|
|
tlvbuf_ap_mac_address *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_ap_mac_address);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append ap_mac TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_ap_mac_address *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
cmd_buf->action = ACTION_SET;
|
|
tlv->tag = MRVL_AP_MAC_ADDRESS_TLV_ID;
|
|
tlv->length = ETH_ALEN;
|
|
if ((ret =
|
|
mac2raw(args[1],
|
|
tlv->ap_mac_addr)) != UAP_SUCCESS) {
|
|
printf("ERR: %s Address \n",
|
|
ret ==
|
|
UAP_FAILURE ? "Invalid MAC" : ret ==
|
|
UAP_RET_MAC_BROADCAST ? "Broadcast" :
|
|
"Multicast");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
|
|
if (strcmp(args[0], "Rate") == 0) {
|
|
if (is_input_valid(RATE, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR: Invalid Rate input\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_rates *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_rates) + arg_num - 1;
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append rates TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_rates *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_RATES_TLV_ID;
|
|
tlv->length = arg_num - 1;
|
|
for (i = 0; i < tlv->length; i++) {
|
|
rate[i] = tlv->operational_rates[i] =
|
|
(t_u8)A2HEXDECIMAL(args[i + 1]);
|
|
}
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "TxPowerLevel") == 0) {
|
|
if (is_input_valid(TXPOWER, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR:Invalid TxPowerLevel \n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
tlvbuf_tx_power *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_tx_power);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append tx power level TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_tx_power *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_TX_POWER_TLV_ID;
|
|
tlv->length = 1;
|
|
tlv->tx_power_dbm = (t_u8)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
}
|
|
if (strcmp(args[0], "BroadcastSSID") == 0) {
|
|
if (is_input_valid(BROADCASTSSID, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_bcast_ssid_ctl *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_bcast_ssid_ctl);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append SSID broadcast control TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_bcast_ssid_ctl *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_BCAST_SSID_CTL_TLV_ID;
|
|
tlv->length = 1;
|
|
tlv->bcast_ssid_ctl = (t_u8)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "RTSThreshold") == 0) {
|
|
if (is_input_valid(RTSTHRESH, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_rts_threshold *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_rts_threshold);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append RTS threshold TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_rts_threshold *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_RTS_THRESHOLD_TLV_ID;
|
|
tlv->length = 2;
|
|
tlv->rts_threshold = (t_u16)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->rts_threshold =
|
|
uap_cpu_to_le16(tlv->rts_threshold);
|
|
}
|
|
if (strcmp(args[0], "FragThreshold") == 0) {
|
|
if (is_input_valid(FRAGTHRESH, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_frag_threshold *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_frag_threshold);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append Fragmentation threshold TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_frag_threshold *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_FRAG_THRESHOLD_TLV_ID;
|
|
tlv->length = 2;
|
|
tlv->frag_threshold = (t_u16)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->frag_threshold =
|
|
uap_cpu_to_le16(tlv->frag_threshold);
|
|
}
|
|
if (strcmp(args[0], "DTIMPeriod") == 0) {
|
|
if (is_input_valid(DTIMPERIOD, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_dtim_period *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_dtim_period);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append DTIM period TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_dtim_period *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_DTIM_PERIOD_TLV_ID;
|
|
tlv->length = 1;
|
|
tlv->dtim_period = (t_u8)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "RSNReplayProtection") == 0) {
|
|
if (is_input_valid(RSNREPLAYPROT, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_rsn_replay_prot *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_rsn_replay_prot);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append RSN replay protection TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_rsn_replay_prot *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_RSN_REPLAY_PROT_TLV_ID;
|
|
tlv->length = 1;
|
|
tlv->rsn_replay_prot = (t_u8)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "TxBeaconRate") == 0) {
|
|
if (is_input_valid(TXBEACONRATE, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tx_beacon_rate = (t_u16)A2HEXDECIMAL(args[1]);
|
|
}
|
|
if (strcmp(args[0], "MCBCdataRate") == 0) {
|
|
if (is_input_valid(MCBCDATARATE, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
mcbc_data_rate = (t_u16)A2HEXDECIMAL(args[1]);
|
|
}
|
|
if (strcmp(args[0], "PktFwdCtl") == 0) {
|
|
if (is_input_valid(PKTFWD, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_pkt_fwd_ctl *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_pkt_fwd_ctl);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append packet forwarding control TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_pkt_fwd_ctl *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_PKT_FWD_CTL_TLV_ID;
|
|
tlv->length = 1;
|
|
tlv->pkt_fwd_ctl = (t_u8)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "StaAgeoutTimer") == 0) {
|
|
if (is_input_valid
|
|
(STAAGEOUTTIMER, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_sta_ageout_timer *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_sta_ageout_timer);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append STA ageout timer TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_sta_ageout_timer *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_STA_AGEOUT_TIMER_TLV_ID;
|
|
tlv->length = 4;
|
|
tlv->sta_ageout_timer_ms = (t_u32)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->sta_ageout_timer_ms =
|
|
uap_cpu_to_le32(tlv->sta_ageout_timer_ms);
|
|
}
|
|
if (strcmp(args[0], "PSStaAgeoutTimer") == 0) {
|
|
if (is_input_valid
|
|
(PSSTAAGEOUTTIMER, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_ps_sta_ageout_timer *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_ps_sta_ageout_timer);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append PS STA ageout timer TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_ps_sta_ageout_timer *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_PS_STA_AGEOUT_TIMER_TLV_ID;
|
|
tlv->length = 4;
|
|
tlv->ps_sta_ageout_timer_ms = (t_u32)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->ps_sta_ageout_timer_ms =
|
|
uap_cpu_to_le32(tlv->ps_sta_ageout_timer_ms);
|
|
}
|
|
if (strcmp(args[0], "AuthMode") == 0) {
|
|
if (is_input_valid(AUTHMODE, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_auth_mode *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_auth_mode);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append auth mode TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_auth_mode *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_AUTH_TLV_ID;
|
|
tlv->length = 1;
|
|
tlv->auth_mode = (t_u8)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "KeyIndex") == 0) {
|
|
if (arg_num == 1) {
|
|
printf("KeyIndex is blank!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
if (ISDIGIT(args[1]) == 0) {
|
|
printf("ERR:Illegal KeyIndex parameter. Must be either '0', '1', '2', or '3'.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
keyindex = atoi(args[1]);
|
|
if ((keyindex < 0) || (keyindex > 3)) {
|
|
printf("ERR:Illegal KeyIndex parameter. Must be either '0', '1', '2', or '3'.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
}
|
|
if (strncmp(args[0], "Key_", 4) == 0) {
|
|
if (arg_num == 1) {
|
|
printf("ERR:%s is blank!\n", args[0]);
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
tlvbuf_wep_key *tlv = NULL;
|
|
int key_len = 0;
|
|
if (args[1][0] == '"') {
|
|
if ((strlen(args[1]) != 2) &&
|
|
(strlen(args[1]) != 7) &&
|
|
(strlen(args[1]) != 15)) {
|
|
printf("ERR:Wrong key length!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
key_len = strlen(args[1]) - 2;
|
|
} else {
|
|
if ((strlen(args[1]) != 0) &&
|
|
(strlen(args[1]) != 10) &&
|
|
(strlen(args[1]) != 26)) {
|
|
printf("ERR:Wrong key length!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (UAP_FAILURE == ishexstring(args[1])) {
|
|
printf("ERR:Only hex digits are allowed when key length is 10 or 26\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
key_len = strlen(args[1]) / 2;
|
|
}
|
|
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_wep_key) + key_len;
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append WEP key configurations TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_wep_key *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_WEP_KEY_TLV_ID;
|
|
tlv->length = key_len + 2;
|
|
if (strcmp(args[0], "Key_0") == 0) {
|
|
tlv->key_index = 0;
|
|
} else if (strcmp(args[0], "Key_1") == 0) {
|
|
tlv->key_index = 1;
|
|
} else if (strcmp(args[0], "Key_2") == 0) {
|
|
tlv->key_index = 2;
|
|
} else if (strcmp(args[0], "Key_3") == 0) {
|
|
tlv->key_index = 3;
|
|
}
|
|
if (keyindex == tlv->key_index) {
|
|
tlv->is_default = 1;
|
|
} else {
|
|
tlv->is_default = 0;
|
|
}
|
|
if (args[1][0] == '"') {
|
|
memcpy(tlv->key, &args[1][1],
|
|
strlen(args[1]) - 2);
|
|
} else {
|
|
string2raw(args[1], tlv->key);
|
|
}
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
}
|
|
if (strcmp(args[0], "PSK") == 0) {
|
|
if (arg_num == 1) {
|
|
printf("ERR:PSK is blank!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
tlvbuf_wpa_passphrase *tlv = NULL;
|
|
if (args[1][0] == '"') {
|
|
args[1]++;
|
|
}
|
|
if (args[1][strlen(args[1]) - 1] == '"') {
|
|
args[1][strlen(args[1]) - 1] = '\0';
|
|
}
|
|
tlv_len =
|
|
sizeof(tlvbuf_wpa_passphrase) +
|
|
strlen(args[1]);
|
|
if (strlen(args[1]) > MAX_WPA_PASSPHRASE_LENGTH) {
|
|
printf("ERR:PSK too long.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (strlen(args[1]) < MIN_WPA_PASSPHRASE_LENGTH) {
|
|
printf("ERR:PSK too short.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (strlen(args[1]) ==
|
|
MAX_WPA_PASSPHRASE_LENGTH) {
|
|
if (UAP_FAILURE == ishexstring(args[1])) {
|
|
printf("ERR:Only hex digits are allowed when passphrase's length is 64\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
/* Append a new TLV */
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append WPA passphrase TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_wpa_passphrase *)(buffer +
|
|
cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_WPA_PASSPHRASE_TLV_ID;
|
|
tlv->length = strlen(args[1]);
|
|
memcpy(tlv->passphrase, args[1], tlv->length);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
}
|
|
if (strcmp(args[0], "Protocol") == 0) {
|
|
if (is_input_valid(PROTOCOL, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
protocol = (t_u16)atoi(args[1]);
|
|
}
|
|
if ((strcmp(args[0], "PairwiseCipher") == 0) ||
|
|
(strcmp(args[0], "GroupCipher") == 0)) {
|
|
printf("ERR:PairwiseCipher and GroupCipher are not supported.\n" " Please configure pairwise cipher using parameters PwkCipherWPA or PwkCipherWPA2\n" " and group cipher using GwkCipher in the config file.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
if ((protocol == PROTOCOL_NO_SECURITY) ||
|
|
(protocol == PROTOCOL_STATIC_WEP)) {
|
|
if ((strcmp(args[0], "PwkCipherWPA") == 0) ||
|
|
(strcmp(args[0], "PwkCipherWPA2") == 0)
|
|
|| (strcmp(args[0], "GwkCipher") == 0)) {
|
|
printf("ERR:Pairwise cipher and group cipher should not be defined for Open and WEP mode.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
if (strcmp(args[0], "PwkCipherWPA") == 0) {
|
|
if (arg_num == 1) {
|
|
printf("ERR:PwkCipherWPA is blank!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
if (ISDIGIT(args[1]) == 0) {
|
|
printf("ERR:Illegal PwkCipherWPA parameter. Must be either bit '2' or '3'.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (atoi(args[1]) & ~CIPHER_BITMAP) {
|
|
printf("ERR:Illegal PwkCipherWPA parameter. Must be either bit '2' or '3'.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
pwkcipher_wpa = atoi(args[1]);
|
|
if (enable_11n &&
|
|
protocol != PROTOCOL_WPA2_MIXED) {
|
|
memset(&htcap, 0, sizeof(htcap));
|
|
if (UAP_SUCCESS ==
|
|
get_sys_cfg_11n(&htcap)) {
|
|
if (htcap.supported_mcs_set[0]
|
|
&& (atoi(args[1]) ==
|
|
CIPHER_TKIP)) {
|
|
printf("ERR: WPA/TKIP cannot be used when AP operates in 802.11n mode.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (strcmp(args[0], "PwkCipherWPA2") == 0) {
|
|
if (arg_num == 1) {
|
|
printf("ERR:PwkCipherWPA2 is blank!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
if (ISDIGIT(args[1]) == 0) {
|
|
printf("ERR:Illegal PwkCipherWPA2 parameter. Must be either bit '2' or '3'.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (atoi(args[1]) & ~CIPHER_BITMAP) {
|
|
printf("ERR:Illegal PwkCipherWPA2 parameter. Must be either bit '2' or '3'.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
pwkcipher_wpa2 = atoi(args[1]);
|
|
if (enable_11n &&
|
|
protocol != PROTOCOL_WPA2_MIXED) {
|
|
memset(&htcap, 0, sizeof(htcap));
|
|
if (UAP_SUCCESS ==
|
|
get_sys_cfg_11n(&htcap)) {
|
|
if (htcap.supported_mcs_set[0]
|
|
&& (atoi(args[1]) ==
|
|
CIPHER_TKIP)) {
|
|
printf("ERR: WPA/TKIP cannot be used when AP operates in 802.11n mode.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (strcmp(args[0], "GwkCipher") == 0) {
|
|
if (is_input_valid(GWK_CIPHER, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
gwkcipher = atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "GroupRekeyTime") == 0) {
|
|
if (is_input_valid
|
|
(GROUPREKEYTIMER, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_group_rekey_timer *tlv = NULL;
|
|
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_group_rekey_timer);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append group rekey timer TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_group_rekey_timer *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_GRP_REKEY_TIME_TLV_ID;
|
|
tlv->length = 4;
|
|
tlv->group_rekey_time_sec = (t_u32)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->group_rekey_time_sec =
|
|
uap_cpu_to_le32(tlv->group_rekey_time_sec);
|
|
}
|
|
if (strcmp(args[0], "MaxStaNum") == 0) {
|
|
if (is_input_valid(MAXSTANUM, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (get_max_sta_num_supported(&max_sta_num_supported) ==
|
|
UAP_FAILURE) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (atoi(args[1]) > max_sta_num_supported) {
|
|
printf("ERR: MAX_STA_NUM must be less than %d\n", max_sta_num_supported);
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_max_sta_num *tlv = NULL;
|
|
|
|
/* Append a new TLV */
|
|
tlv_len =
|
|
sizeof(tlvbuf_max_sta_num) -
|
|
sizeof(tlv->max_sta_num_supported);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot realloc max station number TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_max_sta_num *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_MAX_STA_CNT_TLV_ID;
|
|
tlv->length = 2;
|
|
tlv->max_sta_num_configured = (t_u16)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->max_sta_num_configured =
|
|
uap_cpu_to_le16(tlv->max_sta_num_configured);
|
|
}
|
|
if (strcmp(args[0], "Retrylimit") == 0) {
|
|
if (is_input_valid(RETRYLIMIT, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_retry_limit *tlv = NULL;
|
|
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_retry_limit);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot realloc retry limit TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_retry_limit *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_RETRY_LIMIT_TLV_ID;
|
|
tlv->length = 1;
|
|
tlv->retry_limit = (t_u8)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "PairwiseUpdateTimeout") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0)) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_eapol_pwk_hsk_timeout *tlv = NULL;
|
|
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_eapol_pwk_hsk_timeout);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append pairwise update timeout TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_eapol_pwk_hsk_timeout *)(buffer +
|
|
cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_EAPOL_PWK_HSK_TIMEOUT_TLV_ID;
|
|
tlv->length = 4;
|
|
tlv->pairwise_update_timeout = (t_u32)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->pairwise_update_timeout =
|
|
uap_cpu_to_le32(tlv->pairwise_update_timeout);
|
|
}
|
|
if (strcmp(args[0], "PairwiseHandshakeRetries") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0)) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_eapol_pwk_hsk_retries *tlv = NULL;
|
|
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_eapol_pwk_hsk_retries);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append pairwise handshake retries TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_eapol_pwk_hsk_retries *)(buffer +
|
|
cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_EAPOL_PWK_HSK_RETRIES_TLV_ID;
|
|
tlv->length = 4;
|
|
tlv->pwk_retries = (t_u32)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->pwk_retries = uap_cpu_to_le32(tlv->pwk_retries);
|
|
}
|
|
if (strcmp(args[0], "GroupwiseUpdateTimeout") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0)) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_eapol_gwk_hsk_timeout *tlv = NULL;
|
|
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_eapol_gwk_hsk_timeout);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append groupwise update timeout TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_eapol_gwk_hsk_timeout *)(buffer +
|
|
cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_EAPOL_GWK_HSK_TIMEOUT_TLV_ID;
|
|
tlv->length = 4;
|
|
tlv->groupwise_update_timeout = (t_u32)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->groupwise_update_timeout =
|
|
uap_cpu_to_le32(tlv->groupwise_update_timeout);
|
|
}
|
|
if (strcmp(args[0], "GroupwiseHandshakeRetries") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0)) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_eapol_gwk_hsk_retries *tlv = NULL;
|
|
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_eapol_gwk_hsk_retries);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append groupwise handshake retries TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_eapol_gwk_hsk_retries *)(buffer +
|
|
cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_EAPOL_GWK_HSK_RETRIES_TLV_ID;
|
|
tlv->length = 4;
|
|
tlv->gwk_retries = (t_u32)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
tlv->gwk_retries = uap_cpu_to_le32(tlv->gwk_retries);
|
|
}
|
|
|
|
if (strcmp(args[0], "Enable11n") == 0) {
|
|
if ((ISDIGIT(args[1]) != UAP_SUCCESS) ||
|
|
(atoi(args[1]) < 0) || (atoi(args[1]) > 1)) {
|
|
printf("ERR: Invalid Enable11n value\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_htcap_t *tlv = NULL;
|
|
enable_11n = atoi(args[1]);
|
|
|
|
memset(&htcap, 0, sizeof(htcap));
|
|
if (UAP_SUCCESS != get_sys_cfg_11n(&htcap)) {
|
|
printf("ERR: Reading current 11n configuration.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_htcap_t);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append HT Cap TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_htcap_t *)(buffer + cmd_len);
|
|
tlv_offset_11n = cmd_len;
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = HT_CAPABILITY_TLV_ID;
|
|
tlv->length = sizeof(HTCap_t);
|
|
memcpy(&tlv->ht_cap, &htcap, sizeof(HTCap_t));
|
|
if (enable_11n == 1) {
|
|
/* enable mcs rate */
|
|
tlv->ht_cap.supported_mcs_set[0] =
|
|
DEFAULT_MCS_SET_0;
|
|
tlv->ht_cap.supported_mcs_set[4] =
|
|
DEFAULT_MCS_SET_4;
|
|
if (0 == get_fw_info(&fw)) {
|
|
if ((fw.hw_dev_mcs_support & 0x0f) >= 2)
|
|
tlv->ht_cap.
|
|
supported_mcs_set[1] =
|
|
DEFAULT_MCS_SET_1;
|
|
}
|
|
} else {
|
|
/* disable mcs rate */
|
|
tlv->ht_cap.supported_mcs_set[0] = 0;
|
|
tlv->ht_cap.supported_mcs_set[4] = 0;
|
|
tlv->ht_cap.supported_mcs_set[1] = 0;
|
|
}
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "HTCapInfo") == 0) {
|
|
if (enable_11n <= 0) {
|
|
printf("ERR: Enable11n parameter should be set before HTCapInfo.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if ((IS_HEX_OR_DIGIT(args[1]) == UAP_FAILURE) ||
|
|
((((t_u16)A2HEXDECIMAL(args[1])) &
|
|
(~HT_CAP_CONFIG_MASK)) != HT_CAP_CHECK_MASK)) {
|
|
printf("ERR: Invalid HTCapInfo value\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Find HT tlv pointer in buffer and set HTCapInfo */
|
|
tlvbuf_htcap_t *tlv = NULL;
|
|
tlv = (tlvbuf_htcap_t *)(buffer + tlv_offset_11n);
|
|
tlv->ht_cap.ht_cap_info =
|
|
DEFAULT_HT_CAP_VALUE & ~HT_CAP_CONFIG_MASK;
|
|
tlv->ht_cap.ht_cap_info |=
|
|
(t_u16)A2HEXDECIMAL(args[1]) &
|
|
HT_CAP_CONFIG_MASK;
|
|
tlv->ht_cap.ht_cap_info =
|
|
uap_cpu_to_le16(tlv->ht_cap.ht_cap_info);
|
|
}
|
|
if (strcmp(args[0], "AMPDU") == 0) {
|
|
if (enable_11n <= 0) {
|
|
printf("ERR: Enable11n parameter should be set before AMPDU.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if ((IS_HEX_OR_DIGIT(args[1]) == UAP_FAILURE) ||
|
|
((A2HEXDECIMAL(args[1])) > AMPDU_CONFIG_MASK)) {
|
|
printf("ERR: Invalid AMPDU value\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Find HT tlv pointer in buffer and set AMPDU */
|
|
tlvbuf_htcap_t *tlv = NULL;
|
|
tlv = (tlvbuf_htcap_t *)(buffer + tlv_offset_11n);
|
|
tlv->ht_cap.ampdu_param =
|
|
(t_u8)A2HEXDECIMAL(args[1]) & AMPDU_CONFIG_MASK;
|
|
}
|
|
if (strcmp(args[0], "HT_MCS_MAP") == 0) {
|
|
if (enable_11n <= 0) {
|
|
printf("ERR: Enable11n parameter should be set before HT_MCS_MAP.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (0 == get_fw_info(&fw)) {
|
|
/* Check upper nibble of MCS support value
|
|
* and block MCS_SET_1 when 2X2 is not supported
|
|
* by the underlying hardware */
|
|
if (((fw.hw_dev_mcs_support & 0xf0) <
|
|
STREAM_2X2_MASK) &&
|
|
(A2HEXDECIMAL(args[1]) & MCS_SET_1_MASK)) {
|
|
printf("ERR: Invalid HT_MCS_MAP\n");
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
/* Find HT tlv pointer in buffer and set supported MCS set */
|
|
tlvbuf_htcap_t *tlv = NULL;
|
|
tlv = (tlvbuf_htcap_t *)(buffer + tlv_offset_11n);
|
|
supported_mcs_set = (t_u32)A2HEXDECIMAL(args[1]);
|
|
supported_mcs_set = uap_cpu_to_le32(supported_mcs_set);
|
|
memcpy(tlv->ht_cap.supported_mcs_set,
|
|
&supported_mcs_set, sizeof(t_u32));
|
|
}
|
|
if (strcmp(args[0], "Enable2040Coex") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0) ||
|
|
(atoi(args[1]) > 1)) {
|
|
printf("ERR: Invalid Enable2040Coex value\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tlvbuf_2040_coex *tlv = NULL;
|
|
/* Append a new TLV */
|
|
tlv_len = sizeof(tlvbuf_2040_coex);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append 2040 coex TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_2040_coex *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_2040_BSS_COEX_CONTROL_TLV_ID;
|
|
tlv->length = 1;
|
|
tlv->enable = (t_u8)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
if (strcmp(args[0], "PreambleType") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0) ||
|
|
(atoi(args[1]) > 2)) {
|
|
printf("ERR: Invalid PreambleType value\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Append a new TLV */
|
|
tlvbuf_preamble_ctl *tlv = NULL;
|
|
tlv_len = sizeof(tlvbuf_preamble_ctl);
|
|
tmp_buffer = realloc(buffer, cmd_len + tlv_len);
|
|
if (!tmp_buffer) {
|
|
printf("ERR:Cannot append preamble type TLV!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
buffer = tmp_buffer;
|
|
tmp_buffer = NULL;
|
|
}
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_preamble_ctl *)(buffer + cmd_len);
|
|
cmd_len += tlv_len;
|
|
/* Set TLV fields */
|
|
tlv->tag = MRVL_PREAMBLE_CTL_TLV_ID;
|
|
tlv->length = 1;
|
|
tlv->preamble_type = (t_u8)atoi(args[1]);
|
|
endian_convert_tlv_header_out(tlv);
|
|
}
|
|
#if DEBUG
|
|
if (cmd_len != 0) {
|
|
hexdump("Command Buffer", (void *)cmd_buf, cmd_len,
|
|
' ');
|
|
}
|
|
#endif
|
|
}
|
|
done:
|
|
fclose(config_file);
|
|
if (buffer)
|
|
free(buffer);
|
|
if (line)
|
|
free(line);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Get band from current channel
|
|
* @param band
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
static int
|
|
get_band(int *band)
|
|
{
|
|
apcmdbuf_sys_configure *cmd_buf = NULL;
|
|
tlvbuf_channel_config *tlv = NULL;
|
|
t_u8 *buffer = NULL;
|
|
t_u16 cmd_len;
|
|
int ret = UAP_SUCCESS;
|
|
|
|
/* Initialize the command length */
|
|
cmd_len =
|
|
sizeof(apcmdbuf_sys_configure) + sizeof(tlvbuf_channel_config);
|
|
|
|
/* Initialize the command buffer */
|
|
buffer = (t_u8 *)malloc(cmd_len);
|
|
|
|
if (!buffer) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
memset(buffer, 0, cmd_len);
|
|
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_channel_config *)(buffer +
|
|
sizeof(apcmdbuf_sys_configure));
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->cmd_code = APCMD_SYS_CONFIGURE;
|
|
cmd_buf->size = cmd_len;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
tlv->tag = MRVL_CHANNELCONFIG_TLV_ID;
|
|
tlv->length = sizeof(tlvbuf_channel_config) - TLVHEADER_LEN;
|
|
cmd_buf->action = ACTION_GET;
|
|
|
|
endian_convert_tlv_header_out(tlv);
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, cmd_len);
|
|
endian_convert_tlv_header_in(tlv);
|
|
|
|
if (ret == UAP_SUCCESS) {
|
|
/* Verify response */
|
|
if ((cmd_buf->cmd_code !=
|
|
(APCMD_SYS_CONFIGURE | APCMD_RESP_CHECK)) ||
|
|
(tlv->tag != MRVL_CHANNELCONFIG_TLV_ID)) {
|
|
printf("ERR:Corrupted response! cmd_code=%x, Tlv->tag=%x\n", cmd_buf->cmd_code, tlv->tag);
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
if (tlv->chan_number > MAX_CHANNELS_BG)
|
|
*band = BAND_A;
|
|
else
|
|
*band = BAND_B | BAND_G;
|
|
} else {
|
|
printf("ERR:Could not get band!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
done:
|
|
if (buffer)
|
|
free(buffer);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the cfg_80211d command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_apcmd_cfg_80211d_usage(void)
|
|
{
|
|
printf("\nUsage: cfg_80211d <state 0/1> <country Country_code> \n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the uap_stats command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_apcmd_uap_stats(void)
|
|
{
|
|
printf("Usage: uap_stats \n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* SNMP MIB OIDs Table
|
|
*/
|
|
static oids_table snmp_oids[] = {
|
|
{0x0b, 4, "dot11LocalTKIPMICFailures"},
|
|
{0x0c, 4, "dot11CCMPDecryptErrors"},
|
|
{0x0d, 4, "dot11WEPUndecryptableCount"},
|
|
{0x0e, 4, "dot11WEPICVErrorCount"},
|
|
{0x0f, 4, "dot11DecryptFailureCount"},
|
|
{0x12, 4, "dot11FailedCount"},
|
|
{0x13, 4, "dot11RetryCount"},
|
|
{0x14, 4, "dot11MultipleRetryCount"},
|
|
{0x15, 4, "dot11FrameDuplicateCount"},
|
|
{0x16, 4, "dot11RTSSuccessCount"},
|
|
{0x17, 4, "dot11RTSFailureCount"},
|
|
{0x18, 4, "dot11ACKFailureCount"},
|
|
{0x19, 4, "dot11ReceivedFragmentCount"},
|
|
{0x1a, 4, "dot11MulticastReceivedFrameCount"},
|
|
{0x1b, 4, "dot11FCSErrorCount"},
|
|
{0x1c, 4, "dot11TransmittedFrameCount"},
|
|
{0x1d, 4, "dot11RSNATKIPCounterMeasuresInvoked"},
|
|
{0x1e, 4, "dot11RSNA4WayHandshakeFailures"},
|
|
{0x1f, 4, "dot11MulticastTransmittedFrameCount"}
|
|
};
|
|
|
|
/**
|
|
* @brief Get uAP stats
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
*
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_uap_stats(int argc, char *argv[])
|
|
{
|
|
t_u8 no_of_oids = sizeof(snmp_oids) / sizeof(snmp_oids[0]);
|
|
t_u16 i, j;
|
|
int size;
|
|
apcmdbuf_snmp_mib *cmd_buf = NULL;
|
|
t_u8 *buf = NULL;
|
|
tlvbuf_header *tlv = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int opt;
|
|
t_u16 oid_size, byte2 = 0;
|
|
t_u32 byte4 = 0;
|
|
int ret = UAP_SUCCESS;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_apcmd_uap_stats();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
|
|
argc -= optind;
|
|
argv += optind;
|
|
if (argc) {
|
|
printf("Error: Invalid Input\n");
|
|
print_apcmd_uap_stats();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/** Command Header */
|
|
cmd_len += sizeof(apcmdbuf_snmp_mib);
|
|
|
|
for (i = 0; i < no_of_oids; i++) {
|
|
/**
|
|
* Size of Oid + Oid_value + Oid_size
|
|
*/
|
|
cmd_len += snmp_oids[i].len + sizeof(tlvbuf_header);
|
|
}
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
|
|
/* Locate Headers */
|
|
cmd_buf = (apcmdbuf_snmp_mib *)buf;
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->cmd_code = HostCmd_SNMP_MIB;
|
|
cmd_buf->action = uap_cpu_to_le16(ACTION_GET);
|
|
|
|
tlv = (tlvbuf_header *)((t_u8 *)cmd_buf + sizeof(apcmdbuf_snmp_mib));
|
|
/* Add oid, oid_size and oid_value for each OID */
|
|
for (i = 0; i < no_of_oids; i++) {
|
|
/** Copy Index as Oid */
|
|
tlv->type = uap_cpu_to_le16(snmp_oids[i].type);
|
|
/** Copy its size */
|
|
tlv->len = uap_cpu_to_le16(snmp_oids[i].len);
|
|
/** Next TLV */
|
|
tlv = (tlvbuf_header *)&(tlv->data[snmp_oids[i].len]);
|
|
}
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
if (ret == UAP_SUCCESS) {
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
tlv = (tlvbuf_header *)((t_u8 *)cmd_buf +
|
|
sizeof(apcmdbuf_snmp_mib));
|
|
|
|
size = cmd_buf->size - (sizeof(apcmdbuf_snmp_mib) -
|
|
BUF_HEADER_SIZE);
|
|
|
|
while ((unsigned int)size >= sizeof(tlvbuf_header)) {
|
|
tlv->type = uap_le16_to_cpu(tlv->type);
|
|
for (i = 0; i < no_of_oids; i++) {
|
|
if (snmp_oids[i].type == tlv->type) {
|
|
printf("%s: ",
|
|
snmp_oids[i].name);
|
|
break;
|
|
}
|
|
}
|
|
oid_size = uap_le16_to_cpu(tlv->len);
|
|
switch (oid_size) {
|
|
case 1:
|
|
printf("%d",
|
|
(unsigned int)tlv->data[0]);
|
|
break;
|
|
case 2:
|
|
memcpy(&byte2, &tlv->data[0],
|
|
sizeof(oid_size));
|
|
printf("%d",
|
|
(unsigned int)
|
|
uap_le16_to_cpu(byte2));
|
|
break;
|
|
case 4:
|
|
memcpy(&byte4, &tlv->data[0],
|
|
sizeof(oid_size));
|
|
printf("%d",
|
|
(unsigned int)
|
|
uap_le32_to_cpu(byte4));
|
|
break;
|
|
default:
|
|
for (j = 0; j < oid_size; j++) {
|
|
printf("%d ",
|
|
(t_u8)tlv->data[j]);
|
|
}
|
|
break;
|
|
}
|
|
/** Next TLV */
|
|
tlv = (tlvbuf_header *)&(tlv->data[oid_size]);
|
|
size -= (sizeof(tlvbuf_header) + oid_size);
|
|
size = (size > 0) ? size : 0;
|
|
printf("\n");
|
|
}
|
|
|
|
} else {
|
|
printf("ERR:Command Response incorrect!\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief parser for sys_cfg_80211d input
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @param output Stores indexes for "state, country"
|
|
* arguments
|
|
*
|
|
* @return NA
|
|
*
|
|
*/
|
|
static void
|
|
parse_input_80211d(int argc, char **argv, int output[2][2])
|
|
{
|
|
int i, j, k = 0;
|
|
char *keywords[2] = { "state", "country" };
|
|
|
|
for (i = 0; i < 2; i++)
|
|
output[i][0] = -1;
|
|
|
|
for (i = 0; i < argc; i++) {
|
|
for (j = 0; j < 2; j++) {
|
|
if (strcmp(argv[i], keywords[j]) == 0) {
|
|
output[j][1] = output[j][0] = i;
|
|
k = j;
|
|
break;
|
|
}
|
|
}
|
|
output[k][1] += 1;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Set/Get 802.11D country information
|
|
*
|
|
* Usage: cfg_80211d state country_code
|
|
*
|
|
* State 0 or 1
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_cfg_80211d(int argc, char *argv[])
|
|
{
|
|
apcmdbuf_cfg_80211d *cmd_buf = NULL;
|
|
ieeetypes_subband_set_t *subband = NULL;
|
|
t_u8 *buf = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int output[2][2];
|
|
int ret = UAP_SUCCESS;
|
|
int opt;
|
|
int status = 0;
|
|
int i, j;
|
|
t_u8 state = 0;
|
|
char country[4] = { ' ', ' ', 0, 0 };
|
|
t_u8 sflag = 0, cflag = 0;
|
|
ieeetypes_subband_set_t sub_bands[MAX_SUB_BANDS];
|
|
t_u8 no_of_sub_band = 0;
|
|
int band;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_apcmd_cfg_80211d_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
if (argc) {
|
|
if (strcmp(argv[0], "state") && strcmp(argv[0], "country")) {
|
|
printf("ERR: Incorrect input. Either state or country is needed.");
|
|
print_apcmd_cfg_80211d_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
/** SET */
|
|
parse_input_80211d(argc, argv, output);
|
|
|
|
/** State */
|
|
if ((output[0][0] != -1) && (output[0][1] > output[0][0])) {
|
|
if ((output[0][1] - output[0][0]) != 2) {
|
|
printf("ERR: Invalid state inputs\n");
|
|
print_apcmd_cfg_80211d_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (IS_HEX_OR_DIGIT(argv[output[0][0] + 1]) ==
|
|
UAP_FAILURE) {
|
|
printf("ERR: valid input for state are 0 or 1\n");
|
|
print_apcmd_cfg_80211d_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
state = (t_u8)A2HEXDECIMAL(argv[output[0][0] + 1]);
|
|
|
|
if ((state != 0) && (state != 1)) {
|
|
printf("ERR: valid input for state are 0 or 1 \n");
|
|
print_apcmd_cfg_80211d_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
sflag = 1;
|
|
}
|
|
|
|
/** Country */
|
|
if ((output[1][0] != -1) && (output[1][1] > output[1][0])) {
|
|
if ((output[1][1] - output[1][0]) != 2) {
|
|
printf("ERR: Invalid country inputs\n");
|
|
print_apcmd_cfg_80211d_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((strlen(argv[output[1][0] + 1]) > 3) ||
|
|
(strlen(argv[output[1][0] + 1]) == 0)) {
|
|
print_apcmd_cfg_80211d_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Only 2 characters of country code are copied here as indoor/outdoor
|
|
* conditions are not handled in domain file */
|
|
strncpy(country, argv[output[1][0] + 1], 2);
|
|
|
|
for (i = 0; (unsigned int)i < strlen(country); i++) {
|
|
if ((country[i] < 'A') || (country[i] > 'z')) {
|
|
printf("Invalid Country Code\n");
|
|
print_apcmd_cfg_80211d_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (country[i] > 'Z')
|
|
country[i] = country[i] - 'a' + 'A';
|
|
}
|
|
|
|
cflag = 1;
|
|
if (!get_band(&band)) {
|
|
printf("ERR:couldn't get band from channel!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/** Get domain information from the file */
|
|
no_of_sub_band =
|
|
parse_domain_file(country, band, sub_bands,
|
|
NULL);
|
|
if (no_of_sub_band == UAP_FAILURE) {
|
|
printf("Parsing Failed\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if (get_bss_status(&status) != UAP_SUCCESS) {
|
|
printf("ERR:Cannot get current bss status!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (status == UAP_BSS_START) {
|
|
printf("ERR: 11d status can not be changed after BSS start!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
if (argc && !cflag && !sflag) {
|
|
printf("ERR: Invalid input\n");
|
|
print_apcmd_cfg_80211d_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (sflag && !cflag) {
|
|
/**
|
|
* Update MIB only and return
|
|
*/
|
|
if (sg_snmp_mib
|
|
(ACTION_SET, OID_80211D_ENABLE, sizeof(state),
|
|
&state) == UAP_SUCCESS) {
|
|
printf("802.11d %sd \n", state ? "enable" : "disable");
|
|
return UAP_SUCCESS;
|
|
} else {
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
cmd_len = sizeof(apcmdbuf_cfg_80211d);
|
|
|
|
if (cflag) {
|
|
cmd_len += no_of_sub_band * sizeof(ieeetypes_subband_set_t);
|
|
} else {
|
|
/** Get */
|
|
cmd_len += MAX_SUB_BANDS * sizeof(ieeetypes_subband_set_t);
|
|
}
|
|
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_cfg_80211d *)buf;
|
|
cmd_len = argc ? cmd_len :
|
|
/** Set */
|
|
(sizeof(apcmdbuf_cfg_80211d) - sizeof(domain_param_t));
|
|
/** Get */
|
|
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->action = argc ? ACTION_SET : ACTION_GET;
|
|
cmd_buf->action = uap_cpu_to_le16(cmd_buf->action);
|
|
cmd_buf->cmd_code = HostCmd_CMD_802_11D_DOMAIN_INFO;
|
|
|
|
if (cflag) {
|
|
/* third character of country code is copied here as indoor/outdoor
|
|
* condition is not supported in domain file*/
|
|
strncpy(country, argv[output[1][0] + 1], sizeof(country) - 1);
|
|
for (i = 0; (unsigned int)i < strlen(country); i++) {
|
|
if ((country[i] < 'A') || (country[i] > 'z')) {
|
|
printf("Invalid Country Code\n");
|
|
print_apcmd_cfg_80211d_usage();
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (country[i] > 'Z')
|
|
country[i] = country[i] - 'a' + 'A';
|
|
}
|
|
cmd_buf->domain.tag = uap_cpu_to_le16(TLV_TYPE_DOMAIN);
|
|
cmd_buf->domain.length = uap_cpu_to_le16(sizeof(domain_param_t)
|
|
- BUF_HEADER_SIZE
|
|
+
|
|
(no_of_sub_band *
|
|
sizeof
|
|
(ieeetypes_subband_set_t)));
|
|
|
|
memset(cmd_buf->domain.country_code, ' ',
|
|
sizeof(cmd_buf->domain.country_code));
|
|
memcpy(cmd_buf->domain.country_code, country, strlen(country));
|
|
memcpy(cmd_buf->domain.subband, sub_bands,
|
|
no_of_sub_band * sizeof(ieeetypes_subband_set_t));
|
|
}
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
if (ret == UAP_SUCCESS) {
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
if (argc) {
|
|
printf("Set executed successfully\n");
|
|
if (sflag) {
|
|
if (sg_snmp_mib
|
|
(ACTION_SET, OID_80211D_ENABLE,
|
|
sizeof(state),
|
|
&state) == UAP_SUCCESS) {
|
|
printf("802.11d %sd \n",
|
|
state ? "enable" :
|
|
"disable");
|
|
}
|
|
}
|
|
} else {
|
|
j = uap_le16_to_cpu(cmd_buf->domain.length);
|
|
if (sg_snmp_mib
|
|
(ACTION_GET, OID_80211D_ENABLE,
|
|
sizeof(state), &state)
|
|
== UAP_SUCCESS) {
|
|
printf("State = %sd\n",
|
|
state ? "enable" : "disable");
|
|
}
|
|
|
|
if (cmd_buf->domain.country_code[0] ||
|
|
cmd_buf->domain.country_code[1] ||
|
|
cmd_buf->domain.country_code[2]) {
|
|
printf("Country string = %c%c%c",
|
|
cmd_buf->domain.country_code[0],
|
|
cmd_buf->domain.country_code[1],
|
|
cmd_buf->domain.country_code[2]);
|
|
j -= sizeof(cmd_buf->domain.
|
|
country_code);
|
|
subband =
|
|
(ieeetypes_subband_set_t *)
|
|
cmd_buf->domain.subband;
|
|
printf("\nSub-band info=");
|
|
printf("\t(1st, #chan, MAX-power) \n");
|
|
for (i = 0; i < (j / 3); i++) {
|
|
printf("\t\t(%d, \t%d, \t%d dbm)\n", subband->first_chan, subband->no_of_chan, subband->max_tx_pwr);
|
|
subband++;
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
printf("ERR:Command Response incorrect!\n");
|
|
if (argc)
|
|
printf("11d info is allowed to set only before bss start.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a sys_config request and sends to the driver
|
|
*
|
|
* Usage: "Usage : sys_config [CONFIG_FILE]"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_sys_config(int argc, char *argv[])
|
|
{
|
|
apcmdbuf_sys_configure *cmd_buf = NULL;
|
|
t_u8 *buf = NULL;
|
|
t_u16 cmd_len;
|
|
t_u16 buf_len;
|
|
int ret = UAP_SUCCESS;
|
|
int opt;
|
|
char **argv_dummy = NULL;
|
|
ps_mgmt pm;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_sys_config_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc > 1) {
|
|
printf("ERR:Too many arguments.\n");
|
|
print_sys_config_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc == 1) {
|
|
/* Read profile and send command to firmware */
|
|
ret = apcmd_sys_config_profile(argc, argv);
|
|
return ret;
|
|
}
|
|
|
|
/** Query AP's setting */
|
|
buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
|
|
/* Alloc buf for command */
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
|
|
/* Reset custom_ie_present flag */
|
|
custom_ie_present = 0;
|
|
|
|
/* Reset max_mgmt_ie_print flag */
|
|
max_mgmt_ie_print = 0;
|
|
|
|
/* Locate headers */
|
|
cmd_len = sizeof(apcmdbuf_sys_configure);
|
|
cmd_buf = (apcmdbuf_sys_configure *)buf;
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->cmd_code = APCMD_SYS_CONFIGURE;
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
/* Verify response */
|
|
if (cmd_buf->cmd_code !=
|
|
(APCMD_SYS_CONFIGURE | APCMD_RESP_CHECK)) {
|
|
printf("ERR:Corrupted response!\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Print response */
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
printf("AP settings:\n");
|
|
print_tlv(buf + sizeof(apcmdbuf_sys_configure),
|
|
cmd_buf->size -
|
|
sizeof(apcmdbuf_sys_configure) +
|
|
BUF_HEADER_SIZE);
|
|
if (apcmd_addbapara(1, argv_dummy) == UAP_FAILURE) {
|
|
printf("Couldn't get ADDBA parameters\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (apcmd_aggrpriotbl(1, argv_dummy) == UAP_FAILURE) {
|
|
printf("Couldn't get AMSDU/AMPDU priority table\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (apcmd_addbareject(1, argv_dummy) == UAP_FAILURE) {
|
|
printf("Couldn't get ADDBA reject table\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
printf("\n802.11D setting:\n");
|
|
if (apcmd_cfg_80211d(1, argv_dummy) == UAP_FAILURE) {
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (!custom_ie_present) {
|
|
printf("\nCustom IE settings:\n");
|
|
if (apcmd_sys_cfg_custom_ie(1, argv_dummy) ==
|
|
UAP_FAILURE) {
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
} else {
|
|
printf("ERR:Could not retrieve system configure\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
free(buf);
|
|
memset(&pm, 0, sizeof(ps_mgmt));
|
|
ret = send_power_mode_ioctl(&pm, 0);
|
|
return ret;
|
|
}
|
|
|
|
/** Update domain info with given country and band
|
|
*
|
|
* @param country_80211d country to be set
|
|
* @param band band of operation
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
static int
|
|
update_domain_info(char *country_80211d, int band)
|
|
{
|
|
apcmdbuf_cfg_80211d *cmd_buf = NULL;
|
|
t_u8 *buf = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
ieeetypes_subband_set_t sub_bands[MAX_SUB_BANDS];
|
|
t_u8 no_of_sub_band = 0;
|
|
char country[4] = { ' ', ' ', 0, 0 };
|
|
int ret = UAP_SUCCESS;
|
|
t_u8 domain_code = 0;
|
|
rgn_dom_code_t *prgn_dom_code = NULL;
|
|
|
|
/* Get currently set country code from FW */
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_cfg_80211d *)buf;
|
|
cmd_len = (sizeof(apcmdbuf_cfg_80211d) - sizeof(domain_param_t));
|
|
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->action = ACTION_GET;
|
|
cmd_buf->action = uap_cpu_to_le16(cmd_buf->action);
|
|
cmd_buf->cmd_code = HostCmd_CMD_802_11D_DOMAIN_INFO;
|
|
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
if ((ret == UAP_SUCCESS) && (cmd_buf->result == CMD_SUCCESS) &&
|
|
(cmd_buf->domain.country_code[0] ||
|
|
cmd_buf->domain.country_code[1] ||
|
|
cmd_buf->domain.country_code[2])) {
|
|
country[0] = cmd_buf->domain.country_code[0];
|
|
country[1] = cmd_buf->domain.country_code[1];
|
|
} else {
|
|
/* country_80211d will only be used if country code is not already set */
|
|
country[0] = country_80211d[0];
|
|
country[1] = country_80211d[1];
|
|
}
|
|
|
|
if (band == BAND_A)
|
|
printf("Enabling 11d for 11h operation and setting country code to %s\n", country);
|
|
cmd_len = sizeof(apcmdbuf_cfg_80211d);
|
|
/** Get domain information from the file */
|
|
no_of_sub_band =
|
|
parse_domain_file(country, band, sub_bands, &domain_code);
|
|
if (no_of_sub_band == UAP_FAILURE) {
|
|
printf("Parsing Failed\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Copy third character of country code here */
|
|
if (cmd_buf->domain.country_code[2]) {
|
|
country[2] = cmd_buf->domain.country_code[2];
|
|
} else {
|
|
country[2] = country_80211d[2];
|
|
}
|
|
|
|
/* Set domain for this country code */
|
|
memset(buf, 0, buf_len);
|
|
cmd_len += no_of_sub_band * sizeof(ieeetypes_subband_set_t);
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_cfg_80211d *)buf;
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->action = ACTION_SET;
|
|
cmd_buf->action = uap_cpu_to_le16(cmd_buf->action);
|
|
cmd_buf->cmd_code = HostCmd_CMD_802_11D_DOMAIN_INFO;
|
|
|
|
cmd_buf->domain.tag = uap_cpu_to_le16(TLV_TYPE_DOMAIN);
|
|
cmd_buf->domain.length = uap_cpu_to_le16(sizeof(domain_param_t)
|
|
- BUF_HEADER_SIZE
|
|
+
|
|
(no_of_sub_band *
|
|
sizeof
|
|
(ieeetypes_subband_set_t)));
|
|
|
|
memset(cmd_buf->domain.country_code, ' ',
|
|
sizeof(cmd_buf->domain.country_code));
|
|
memcpy(cmd_buf->domain.country_code, country, strlen(country));
|
|
memcpy(cmd_buf->domain.subband, sub_bands,
|
|
no_of_sub_band * sizeof(ieeetypes_subband_set_t));
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
if (ret == UAP_SUCCESS) {
|
|
if (cmd_buf->result != CMD_SUCCESS) {
|
|
printf("ERR:Command Response incorrect!\n");
|
|
printf("11d info is allowed to set only before bss start.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
|
|
if ((band == BAND_A) && domain_code) {
|
|
/* Send 11D_CMD a second time, with reg_dom_code TLV appended.
|
|
* Use hostcmd instead of re-route. */
|
|
cmd_len = cmd_buf->size + BUF_HEADER_SIZE;
|
|
prgn_dom_code = (rgn_dom_code_t *)((t_u8 *)cmd_buf + cmd_len);
|
|
cmd_len += sizeof(rgn_dom_code_t);
|
|
cmd_buf->size += sizeof(rgn_dom_code_t);
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG,
|
|
"Adding Region Domain Code TLV. Domain_code=%d\n",
|
|
domain_code);
|
|
#endif
|
|
prgn_dom_code->tag =
|
|
uap_cpu_to_le16(MRVL_REGION_DOMAIN_CODE_TLV_ID);
|
|
prgn_dom_code->length = uap_cpu_to_le16(sizeof(rgn_dom_code_t)
|
|
- BUF_HEADER_SIZE);
|
|
prgn_dom_code->domain_code = domain_code;
|
|
|
|
/* Send the command */
|
|
uap_ioctl_no_reroute = 1;
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
uap_ioctl_no_reroute = 0;
|
|
|
|
if (ret == UAP_SUCCESS) {
|
|
if (cmd_buf->result != CMD_SUCCESS) {
|
|
printf("ERR:Command Response incorrect!\n");
|
|
printf("11d info is allowed to set only before bss start.\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
}
|
|
|
|
done:
|
|
if (buf)
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Covert MCS Rate Bitmap to MCS Rate index
|
|
*
|
|
* @param rate_bitmap Pointer to rate bitmap
|
|
* @param size Size of the bitmap array
|
|
*
|
|
* @return Rate index
|
|
*/
|
|
int
|
|
get_rate_index_from_bitmap(t_u16 *rate_bitmap, int size)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < size * 8; i++) {
|
|
if (rate_bitmap[i / 16] & (1 << (i % 16))) {
|
|
return i;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* @brief Checks current system configuration
|
|
*
|
|
* @param buf pointer to TLV buffer
|
|
* @param len TLV buffer length
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
check_sys_config(t_u8 *buf, t_u16 len)
|
|
{
|
|
tlvbuf_header *pcurrent_tlv = (tlvbuf_header *)buf;
|
|
int tlv_buf_left = len;
|
|
t_u16 tlv_type;
|
|
t_u16 tlv_len;
|
|
tlvbuf_channel_config *channel_tlv = NULL;
|
|
tlvbuf_channel_list *chnlist_tlv = NULL;
|
|
tlvbuf_pwk_cipher *pwk_cipher_tlv = NULL;
|
|
tlvbuf_gwk_cipher *gwk_cipher_tlv = NULL;
|
|
tlvbuf_auth_mode *auth_tlv = NULL;
|
|
tlvbuf_protocol *protocol_tlv = NULL;
|
|
tlvbuf_wep_key *wep_key_tlv = NULL;
|
|
tlvbuf_wpa_passphrase *passphrase_tlv = NULL;
|
|
tlvbuf_rates *rates_tlv = NULL;
|
|
tlvbuf_mcbc_data_rate *mcbc_data_rate_tlv = NULL;
|
|
t_u16 protocol = 0;
|
|
t_u16 mcbc_data_rate = 0;
|
|
t_u16 op_rates_len = 0;
|
|
t_u8 acs_mode_enabled = 0;
|
|
t_u8 *cbuf = NULL;
|
|
apcmdbuf_cfg_80211d *cmd_buf = NULL;
|
|
t_u16 buf_len, cmd_len;
|
|
char country_80211d[4] = { 'U', 'S', ' ', 0 };
|
|
t_u8 state_80211h = 0;
|
|
int channel_tlv_band = BAND_B | BAND_G;
|
|
t_u8 secondary_ch_set = 0;
|
|
int scan_channels_band = BAND_B | BAND_G;
|
|
t_u8 state_80211d = 0;
|
|
t_u8 rate = 0;
|
|
t_u32 rate_bitmap = 0;
|
|
tlvbuf_htcap_t *ht_cap_tlv = NULL;
|
|
t_u16 enable_40Mhz = 0;
|
|
t_u16 enable_20Mhz_sgi = 0;
|
|
t_u16 enable_gf = 0;
|
|
t_u8 enable_11n = 0;
|
|
int flag = 0;
|
|
fw_info fw;
|
|
channel_list *pchan_list;
|
|
tlvbuf_tx_power *txpower_tlv = NULL;
|
|
int i = 0, ret = UAP_SUCCESS;
|
|
int pairwise_cipher_wpa = -1;
|
|
int pairwise_cipher_wpa2 = -1;
|
|
int group_cipher = -1;
|
|
int chan_list_len = 0;
|
|
int key_set = 0;
|
|
t_u8 channel = 0;
|
|
tx_rate_cfg_t tx_rate_config;
|
|
t_u32 mcs_rate_index = 0;
|
|
struct eth_priv_vhtcfg vhtcfg = { 0 };
|
|
|
|
#define BITMAP_RATE_1M 0x01
|
|
#define BITMAP_RATE_2M 0x02
|
|
#define BITMAP_RATE_5_5M 0x04
|
|
#define BITMAP_RATE_11M 0x8
|
|
#define B_RATE_MANDATORY 0x0f
|
|
|
|
if (pcurrent_tlv == NULL) {
|
|
printf("ERR: No TLV buffer available!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
ret = sg_snmp_mib(ACTION_GET, OID_80211D_ENABLE, sizeof(state_80211d),
|
|
&state_80211d);
|
|
|
|
buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
cbuf = (t_u8 *)malloc(buf_len);
|
|
if (!cbuf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(cbuf, 0, buf_len);
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_cfg_80211d *)cbuf;
|
|
cmd_len = (sizeof(apcmdbuf_cfg_80211d) - sizeof(domain_param_t));
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->action = uap_cpu_to_le16(ACTION_GET);
|
|
cmd_buf->cmd_code = HostCmd_CMD_802_11D_DOMAIN_INFO;
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
if (ret == UAP_SUCCESS && cmd_buf->result == CMD_SUCCESS) {
|
|
if (cmd_buf->domain.country_code[0] ||
|
|
cmd_buf->domain.country_code[1] ||
|
|
cmd_buf->domain.country_code[2]) {
|
|
strncpy(country_80211d,
|
|
(char *)cmd_buf->domain.country_code,
|
|
COUNTRY_CODE_LEN);
|
|
}
|
|
}
|
|
free(cbuf);
|
|
|
|
/* get region code to handle special cases */
|
|
memset(&fw, 0, sizeof(fw));
|
|
if (get_fw_info(&fw)) {
|
|
printf("Could not get fw info!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (get_tx_rate_cfg(&tx_rate_config) == UAP_FAILURE) {
|
|
printf("Could not get tx_rate_cfg!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
while (tlv_buf_left >= (int)sizeof(tlvbuf_header) &&
|
|
(ret != UAP_FAILURE)) {
|
|
tlv_type = *(t_u8 *)&pcurrent_tlv->type;
|
|
tlv_type |= (*((t_u8 *)&pcurrent_tlv->type + 1) << 8);
|
|
tlv_len = *(t_u8 *)&pcurrent_tlv->len;
|
|
tlv_len |= (*((t_u8 *)&pcurrent_tlv->len + 1) << 8);
|
|
if ((sizeof(tlvbuf_header) + tlv_len) >
|
|
(unsigned int)tlv_buf_left) {
|
|
printf("wrong tlv: tlv_len=%d, tlv_buf_left=%d\n",
|
|
tlv_len, tlv_buf_left);
|
|
break;
|
|
}
|
|
switch (tlv_type) {
|
|
case MRVL_CHANNELCONFIG_TLV_ID:
|
|
channel_tlv = (tlvbuf_channel_config *)pcurrent_tlv;
|
|
channel = channel_tlv->chan_number;
|
|
|
|
if ((!state_80211d) &&
|
|
(channel_tlv->chan_number == MAX_CHANNELS_BG)
|
|
&&
|
|
(strncmp(country_80211d, "JP", COUNTRY_CODE_LEN - 1)
|
|
== 0)
|
|
) {
|
|
printf("ERR: Invalid channel 14, 802.11d disabled, country code JP!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (channel_tlv->bandcfg.chanBand == BAND_5GHZ)
|
|
channel_tlv_band = BAND_A;
|
|
secondary_ch_set = channel_tlv->bandcfg.chan2Offset;
|
|
if (channel_tlv_band != BAND_A) {
|
|
/* When country code is not Japan, allow channels 5-11 for US and 5-13 for non-US
|
|
* only for secondary channel below */
|
|
if (secondary_ch_set == SEC_CHAN_BELOW) {
|
|
if (!strncmp
|
|
(country_80211d, "US",
|
|
COUNTRY_CODE_LEN - 1)) {
|
|
if (channel_tlv->chan_number >
|
|
DEFAULT_MAX_CHANNEL_BELOW) {
|
|
printf("ERR: Only channels 5-11 are allowed with secondary channel below for the US\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
} else if (strncmp
|
|
(country_80211d, "JP",
|
|
COUNTRY_CODE_LEN - 1)) {
|
|
if (channel_tlv->chan_number >
|
|
DEFAULT_MAX_CHANNEL_BELOW_NON_US)
|
|
{
|
|
printf("ERR: Only channels 5-13 are allowed with secondary channel below for" "non-Japan countries!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* When country code is not Japan, allow channels 1-7 for US and 1-9 for non-US
|
|
* only for secondary channel above */
|
|
if (secondary_ch_set == SEC_CHAN_ABOVE) {
|
|
if (!strncmp
|
|
(country_80211d, "US",
|
|
COUNTRY_CODE_LEN - 1)) {
|
|
if (channel_tlv->chan_number >
|
|
DEFAULT_MAX_CHANNEL_ABOVE) {
|
|
printf("ERR: Only channels 1-7 are allowed with secondary channel above for the US\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
} else if (strncmp
|
|
(country_80211d, "JP",
|
|
COUNTRY_CODE_LEN - 1)) {
|
|
if (channel_tlv->chan_number >
|
|
DEFAULT_MAX_CHANNEL_ABOVE_NON_US)
|
|
{
|
|
printf("ERR: Only channels 1-9 are allowed with secondary channel above for" "non-Japan countries!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (!(channel_tlv->bandcfg.scanMode == SCAN_MODE_ACS)) {
|
|
if (check_channel_validity_11d
|
|
(channel_tlv->chan_number, channel_tlv_band,
|
|
1) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
if (state_80211d) {
|
|
/* Set country code to JP if channel is 8 or 12 and band is 5GHZ */
|
|
if ((channel_tlv->chan_number <
|
|
MAX_CHANNELS_BG) &&
|
|
(channel_tlv_band == BAND_A))
|
|
strncpy(country_80211d, "JP ",
|
|
sizeof(country_80211d) -
|
|
1);
|
|
} else {
|
|
if ((channel_tlv_band == BAND_A) &&
|
|
((channel_tlv->chan_number == 8) ||
|
|
(channel_tlv->chan_number ==
|
|
12))) {
|
|
printf("ERR:Invalid band for given channel\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
} else {
|
|
acs_mode_enabled = 1;
|
|
}
|
|
#define JP_REGION_0xFE 0xFE
|
|
if (fw.region_code == JP_REGION_0xFE &&
|
|
((channel_tlv->chan_number == 12) ||
|
|
(channel_tlv->chan_number == 13))) {
|
|
printf("ERR:Channel 12 or 13 is not allowed for region code 0xFE\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
break;
|
|
case MRVL_CHANNELLIST_TLV_ID:
|
|
chnlist_tlv = (tlvbuf_channel_list *)pcurrent_tlv;
|
|
pchan_list =
|
|
(channel_list *) & (chnlist_tlv->chan_list);
|
|
if (tlv_len % sizeof(channel_list)) {
|
|
printf("ERR:Invalid Scan channel list TLV!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
chan_list_len = tlv_len / sizeof(channel_list);
|
|
|
|
for (i = 0; i < chan_list_len; i++) {
|
|
scan_channels_band = BAND_B | BAND_G;
|
|
if ((scan_channels_band != BAND_A) &&
|
|
(pchan_list->bandcfg.chanBand ==
|
|
BAND_5GHZ)) {
|
|
scan_channels_band = BAND_A;
|
|
}
|
|
if (check_channel_validity_11d
|
|
(pchan_list->chan_number,
|
|
scan_channels_band, 0) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
pchan_list++;
|
|
}
|
|
break;
|
|
case MRVL_TX_POWER_TLV_ID:
|
|
txpower_tlv = (tlvbuf_tx_power *)pcurrent_tlv;
|
|
if (state_80211d) {
|
|
if (check_tx_pwr_validity_11d
|
|
(txpower_tlv->tx_power_dbm) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
}
|
|
break;
|
|
case MRVL_CIPHER_PWK_TLV_ID:
|
|
pwk_cipher_tlv = (tlvbuf_pwk_cipher *)pcurrent_tlv;
|
|
pwk_cipher_tlv->protocol =
|
|
uap_le16_to_cpu(pwk_cipher_tlv->protocol);
|
|
if (pwk_cipher_tlv->protocol == PROTOCOL_WPA)
|
|
pairwise_cipher_wpa =
|
|
pwk_cipher_tlv->pairwise_cipher;
|
|
else if (pwk_cipher_tlv->protocol == PROTOCOL_WPA2)
|
|
pairwise_cipher_wpa2 =
|
|
pwk_cipher_tlv->pairwise_cipher;
|
|
break;
|
|
case MRVL_CIPHER_GWK_TLV_ID:
|
|
gwk_cipher_tlv = (tlvbuf_gwk_cipher *)pcurrent_tlv;
|
|
group_cipher = gwk_cipher_tlv->group_cipher;
|
|
break;
|
|
case MRVL_AUTH_TLV_ID:
|
|
auth_tlv = (tlvbuf_auth_mode *)pcurrent_tlv;
|
|
break;
|
|
case MRVL_PROTOCOL_TLV_ID:
|
|
protocol_tlv = (tlvbuf_protocol *)pcurrent_tlv;
|
|
protocol = uap_le16_to_cpu(protocol_tlv->protocol);
|
|
break;
|
|
case MRVL_WPA_PASSPHRASE_TLV_ID:
|
|
passphrase_tlv = (tlvbuf_wpa_passphrase *)pcurrent_tlv;
|
|
break;
|
|
case MRVL_WEP_KEY_TLV_ID:
|
|
wep_key_tlv = (tlvbuf_wep_key *)pcurrent_tlv;
|
|
if (wep_key_tlv->is_default) {
|
|
key_set = 1;
|
|
}
|
|
break;
|
|
case HT_CAPABILITY_TLV_ID:
|
|
ht_cap_tlv = (tlvbuf_htcap_t *)pcurrent_tlv;
|
|
ht_cap_tlv->ht_cap.ht_cap_info =
|
|
uap_le16_to_cpu(ht_cap_tlv->ht_cap.ht_cap_info);
|
|
if (ht_cap_tlv->ht_cap.supported_mcs_set[0]) {
|
|
enable_11n = 1;
|
|
enable_40Mhz =
|
|
IS_11N_40MHZ_ENABLED(ht_cap_tlv->ht_cap.
|
|
ht_cap_info);
|
|
enable_20Mhz_sgi =
|
|
IS_11N_20MHZ_SHORTGI_ENABLED
|
|
(ht_cap_tlv->ht_cap.ht_cap_info);
|
|
enable_gf =
|
|
IS_11N_GF_ENABLED(ht_cap_tlv->ht_cap.
|
|
ht_cap_info);
|
|
}
|
|
break;
|
|
case MRVL_RATES_TLV_ID:
|
|
rates_tlv = (tlvbuf_rates *)pcurrent_tlv;
|
|
op_rates_len = tlv_len;
|
|
break;
|
|
case MRVL_MCBC_DATA_RATE_TLV_ID:
|
|
mcbc_data_rate_tlv =
|
|
(tlvbuf_mcbc_data_rate *)pcurrent_tlv;
|
|
mcbc_data_rate =
|
|
uap_le16_to_cpu(mcbc_data_rate_tlv->
|
|
mcbc_datarate);
|
|
if (mcbc_data_rate &&
|
|
(is_mcbc_rate_valid((t_u8)mcbc_data_rate) !=
|
|
UAP_SUCCESS)) {
|
|
printf("ERR: Invalid MCBC Data Rate \n");
|
|
return UAP_FAILURE;
|
|
}
|
|
break;
|
|
}
|
|
tlv_buf_left -= (sizeof(tlvbuf_header) + tlv_len);
|
|
pcurrent_tlv = (tlvbuf_header *)(pcurrent_tlv->data + tlv_len);
|
|
}
|
|
|
|
if ((protocol == PROTOCOL_STATIC_WEP) && !key_set) {
|
|
printf("ERR:WEP keys not set!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (auth_tlv == NULL) {
|
|
printf("ERR: No authentication found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((auth_tlv->auth_mode == 1) && (protocol != PROTOCOL_STATIC_WEP)) {
|
|
printf("ERR:Shared key authentication is not allowed for Open/WPA/WPA2/Mixed mode\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (passphrase_tlv == NULL) {
|
|
printf("ERR: No passphrase found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (((protocol == PROTOCOL_WPA) || (protocol == PROTOCOL_WPA2)
|
|
|| (protocol == PROTOCOL_WPA3_SAE)
|
|
|| (protocol == PROTOCOL_WPA2_MIXED))
|
|
&& !(passphrase_tlv->length)) {
|
|
printf("ERR:Passphrase must be set for WPA/WPA2/Mixed/WPA3 SAE mode\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((protocol == PROTOCOL_WPA) || (protocol == PROTOCOL_WPA2_MIXED)) {
|
|
if (is_cipher_valid(pairwise_cipher_wpa, group_cipher) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA pairwise cipher combination!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if ((protocol == PROTOCOL_WPA2) || (protocol == PROTOCOL_WPA2_MIXED)
|
|
|| (protocol == PROTOCOL_WPA3_SAE)
|
|
) {
|
|
if (is_cipher_valid(pairwise_cipher_wpa2, group_cipher) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA2 pairwise cipher combination!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
if (chnlist_tlv == NULL) {
|
|
printf("ERR: No channel list found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (acs_mode_enabled) {
|
|
pchan_list = (channel_list *) & (chnlist_tlv->chan_list);
|
|
for (i = 0; i < chan_list_len; i++) {
|
|
if ((!state_80211d) &&
|
|
(pchan_list->chan_number == MAX_CHANNELS_BG)
|
|
&&
|
|
(strncmp(country_80211d, "JP", COUNTRY_CODE_LEN - 1)
|
|
== 0)
|
|
) {
|
|
printf("ERR: Invalid scan channel 14, 802.11d disabled, country code JP!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (fw.region_code == JP_REGION_0xFE &&
|
|
((pchan_list->chan_number == 12) ||
|
|
(pchan_list->chan_number == 13))) {
|
|
printf("ERR:Scan Channel 12 or 13 is not allowed for region code 0xFE\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
pchan_list++;
|
|
}
|
|
|
|
if (!state_80211d) {
|
|
/* Block scan channels 8 and 12 in 5GHz band if 11d is not enabled and country code not set to JP */
|
|
pchan_list =
|
|
(channel_list *) & (chnlist_tlv->chan_list);
|
|
for (i = 0; i < chan_list_len; i++) {
|
|
if ((pchan_list->bandcfg.chanBand == BAND_5GHZ)
|
|
&& ((pchan_list->chan_number == 8) ||
|
|
(pchan_list->chan_number == 12))) {
|
|
printf("ERR: Invalid band for scan channel %d\n", pchan_list->chan_number);
|
|
return UAP_FAILURE;
|
|
}
|
|
pchan_list++;
|
|
}
|
|
}
|
|
if (state_80211d) {
|
|
/* Set default country code to US */
|
|
strncpy(country_80211d, "US ",
|
|
sizeof(country_80211d) - 1);
|
|
pchan_list =
|
|
(channel_list *) & (chnlist_tlv->chan_list);
|
|
for (i = 0; i < chan_list_len; i++) {
|
|
/* Set country code to JP if channel is 8 or 12 and band is 5GHZ */
|
|
if ((pchan_list->chan_number < MAX_CHANNELS_BG)
|
|
&& (scan_channels_band == BAND_A)) {
|
|
strncpy(country_80211d, "JP ",
|
|
sizeof(country_80211d) - 1);
|
|
}
|
|
if (check_channel_validity_11d
|
|
(pchan_list->chan_number,
|
|
scan_channels_band, 0) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
pchan_list++;
|
|
}
|
|
if (update_domain_info
|
|
(country_80211d,
|
|
scan_channels_band) == UAP_FAILURE) {
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
#ifdef WIFI_DIRECT_SUPPORT
|
|
if (strncmp(dev_name, "wfd", 3))
|
|
#endif
|
|
if ((!acs_mode_enabled &&
|
|
(channel_tlv_band == (BAND_B | BAND_G)))
|
|
|| (acs_mode_enabled &&
|
|
(scan_channels_band == (BAND_B | BAND_G)))) {
|
|
if (rates_tlv == NULL) {
|
|
printf("ERR: No rates found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
for (i = 0; i < op_rates_len; i++) {
|
|
rate = rates_tlv->
|
|
operational_rates[i] &
|
|
~BASIC_RATE_SET_BIT;
|
|
switch (rate) {
|
|
case 2:
|
|
rate_bitmap |= BITMAP_RATE_1M;
|
|
break;
|
|
case 4:
|
|
rate_bitmap |= BITMAP_RATE_2M;
|
|
break;
|
|
case 11:
|
|
rate_bitmap |= BITMAP_RATE_5_5M;
|
|
break;
|
|
case 22:
|
|
rate_bitmap |= BITMAP_RATE_11M;
|
|
break;
|
|
}
|
|
}
|
|
if ((rate_bitmap & B_RATE_MANDATORY) !=
|
|
B_RATE_MANDATORY) {
|
|
if (acs_mode_enabled)
|
|
printf("ERR: Rates/Scan channels do not match!\n");
|
|
else
|
|
printf("ERR: Rates/Channel do not match!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if ((!acs_mode_enabled && (channel_tlv_band == BAND_A))
|
|
|| (acs_mode_enabled && (scan_channels_band == BAND_A))) {
|
|
if (rates_tlv == NULL) {
|
|
printf("ERR: No rates found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
for (i = 0; i < op_rates_len; i++) {
|
|
rate = rates_tlv->
|
|
operational_rates[i] & ~BASIC_RATE_SET_BIT;
|
|
switch (rate) {
|
|
case 2:
|
|
case 4:
|
|
case 11:
|
|
case 22:
|
|
if (acs_mode_enabled)
|
|
printf("ERR: Rates/Scan channels do not match!\n");
|
|
else
|
|
printf("ERR: Rates/Channel do not match!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
state_80211h = 1;
|
|
if (sg_snmp_mib
|
|
(ACTION_SET, OID_80211H_ENABLE, sizeof(state_80211h),
|
|
&state_80211h)
|
|
== UAP_FAILURE) {
|
|
return UAP_FAILURE;
|
|
}
|
|
if (update_domain_info(country_80211d, BAND_A) == UAP_FAILURE) {
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
#define ISSUPP_CHANWIDTH40(Dot11nDevCap) (Dot11nDevCap & MBIT(17))
|
|
#define ISSUPP_SHORTGI40(Dot11nDevCap) (Dot11nDevCap & MBIT(24))
|
|
|
|
if (enable_40Mhz) {
|
|
if (!ISSUPP_CHANWIDTH40(fw.hw_dot_11n_dev_cap)) {
|
|
printf("ERR: It's not support HT40 from Hardware Cap\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
if (enable_11n) {
|
|
/*For protocol = Mixed, 11n enabled, only allow TKIP cipher for WPA protocol, not for WPA2 */
|
|
if ((protocol == PROTOCOL_WPA2_MIXED) &&
|
|
(pairwise_cipher_wpa2 == CIPHER_TKIP)) {
|
|
printf("ERR: WPA2 pairwise cipher cannot be TKIP when AP operates in 802.11n Mixed mode.\n");
|
|
return UAP_FAILURE;
|
|
} else if (protocol == PROTOCOL_STATIC_WEP) {
|
|
printf("ERR: WEP cannot be used when AP operates in 802.11n mode.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if ((tx_rate_config.rate == UAP_RATE_INDEX_MCS32) && !enable_40Mhz) {
|
|
printf("ERR:uAP must be configured to operate in 40MHz if tx_rate is MCS32\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (enable_20Mhz_sgi && enable_gf) {
|
|
if ((tx_rate_config.rate >= UAP_RATE_INDEX_MCS0) &&
|
|
(tx_rate_config.rate <= UAP_RATE_INDEX_MCS7)) {
|
|
printf("ERR: Invalid tx_rate for uAP in (20MHz Short GI + Green Field) mode\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
mcs_rate_index =
|
|
get_rate_index_from_bitmap(tx_rate_config.bitmap_rates,
|
|
sizeof(tx_rate_config.bitmap_rates));
|
|
if ((mcs_rate_index >= UAP_RATE_BITMAP_MCS0) &&
|
|
(mcs_rate_index <= UAP_RATE_BITMAP_MCS127)) {
|
|
mcs_rate_index -= (UAP_RATE_BITMAP_MCS0 - UAP_RATE_INDEX_MCS0);
|
|
if ((mcs_rate_index == UAP_RATE_INDEX_MCS32) & !enable_40Mhz) {
|
|
printf("ERR:uAP must be configured to operate in 40MHz if rate_bitmap contains MCS32\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (enable_20Mhz_sgi && enable_gf) {
|
|
if ((mcs_rate_index >= UAP_RATE_INDEX_MCS0) &&
|
|
(mcs_rate_index <= UAP_RATE_INDEX_MCS7)) {
|
|
printf("ERR: Invalid tx_rate for uAP in (20MHz Short GI + Green Field) mode\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* if 11d enabled, Channel 14, country code "JP", only B rates are allowed */
|
|
if ((channel == 14) && state_80211d &&
|
|
(strncmp(country_80211d, "JP", COUNTRY_CODE_LEN - 1) == 0)) {
|
|
if (rates_tlv == NULL) {
|
|
printf("ERR:No rates found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (enable_11n) {
|
|
printf("ERR:11n must be disabled and the only B rates are allowed if 11d enabled and country code is JP with channel 14.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
for (i = 0; i < op_rates_len; i++) {
|
|
rate = rates_tlv->
|
|
operational_rates[i] & ~BASIC_RATE_SET_BIT;
|
|
switch (rate) {
|
|
case 2:
|
|
case 4:
|
|
case 11:
|
|
case 22:
|
|
break;
|
|
default:
|
|
printf("ERR:If 11d enabled, channel 14 and country code is JP, the only B rates are allowed.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Channels 14, 165 are not allowed to operate in 40MHz mode */
|
|
if (!acs_mode_enabled && enable_40Mhz) {
|
|
if ((channel == 14)
|
|
|| (channel == 165)
|
|
) {
|
|
printf("ERR:Invalid channel %d for 40MHz operation\n",
|
|
channel);
|
|
return UAP_FAILURE;
|
|
} else if (!secondary_ch_set) {
|
|
printf("ERR:Secondary channel should be set when 40Mhz is enabled!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
/* Channels 14, 140, 165 are not allowed to operate in 40MHz mode */
|
|
if (acs_mode_enabled && enable_40Mhz) {
|
|
if (chnlist_tlv == NULL) {
|
|
printf("ERR: No channel list found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
pchan_list = (channel_list *) & (chnlist_tlv->chan_list);
|
|
for (i = 0; i < chan_list_len; i++) {
|
|
if ((pchan_list->chan_number != 14)
|
|
&& (pchan_list->chan_number != 140) &&
|
|
(pchan_list->chan_number != 165)
|
|
) {
|
|
flag = 1;
|
|
break;
|
|
}
|
|
pchan_list++;
|
|
}
|
|
if (!flag) {
|
|
printf("ERR:Invalid channels in scan channel list for 40MHz operation\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
if (0 == get_fw_info(&fw)) {
|
|
/*check whether support 802.11AC through BAND_AAC bit */
|
|
if (fw.fw_bands & BAND_AAC) {
|
|
ret = get_802_11ac_cfg(&vhtcfg);
|
|
if (UAP_SUCCESS == ret) {
|
|
/* Note: When 11AC is disabled, FW sets vht_rx_mcs to 0xffff */
|
|
if ((vhtcfg.vht_rx_mcs != 0xffff) &&
|
|
(!enable_11n)) {
|
|
printf("ERR: 11ac enable while 11n disable, it is forbidden! \n");
|
|
return UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("Don't support 802.11AC \n");
|
|
return UAP_SUCCESS;
|
|
}
|
|
} else
|
|
printf("No support 802 11AC.\n");
|
|
} else {
|
|
printf("ERR: get_fw_info fail\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Checks current bss configuration
|
|
*
|
|
* @param buf pointer to bss_config_t
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
check_bss_config(t_u8 *buf)
|
|
{
|
|
bss_config_t *bss_config = NULL;;
|
|
t_u8 acs_mode_enabled = 0;
|
|
t_u8 *cbuf = NULL;
|
|
apcmdbuf_cfg_80211d *cmd_buf = NULL;
|
|
t_u16 buf_len, cmd_len;
|
|
char country_80211d[4] = { 'U', 'S', ' ', 0 };
|
|
t_u8 state_80211h = 0;
|
|
int channel_tlv_band = BAND_B | BAND_G;
|
|
t_u8 secondary_ch_set = 0;
|
|
int scan_channels_band = BAND_B | BAND_G;
|
|
t_u8 state_80211d = 0;
|
|
t_u8 rate = 0;
|
|
t_u32 rate_bitmap = 0;
|
|
t_u16 enable_40Mhz = 0;
|
|
t_u16 enable_20Mhz_sgi = 0;
|
|
t_u16 enable_gf = 0;
|
|
t_u8 enable_11n = 0;
|
|
int flag = 0;
|
|
fw_info fw;
|
|
int i = 0, ret = UAP_SUCCESS;
|
|
tx_rate_cfg_t tx_rate_config;
|
|
t_u32 mcs_rate_index = 0;
|
|
struct eth_priv_vhtcfg vhtcfg = { 0 };
|
|
|
|
#define BITMAP_RATE_1M 0x01
|
|
#define BITMAP_RATE_2M 0x02
|
|
#define BITMAP_RATE_5_5M 0x04
|
|
#define BITMAP_RATE_11M 0x8
|
|
#define B_RATE_MANDATORY 0x0f
|
|
|
|
if (NULL == buf) {
|
|
printf("ERR: No buffer for bss_configure!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
bss_config = (bss_config_t *)buf;
|
|
|
|
ret = sg_snmp_mib(ACTION_GET, OID_80211D_ENABLE, sizeof(state_80211d),
|
|
&state_80211d);
|
|
|
|
buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
cbuf = (t_u8 *)malloc(buf_len);
|
|
if (!cbuf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(cbuf, 0, buf_len);
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_cfg_80211d *)cbuf;
|
|
cmd_len = (sizeof(apcmdbuf_cfg_80211d) - sizeof(domain_param_t));
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->action = uap_cpu_to_le16(ACTION_GET);
|
|
cmd_buf->cmd_code = HostCmd_CMD_802_11D_DOMAIN_INFO;
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
if (ret == UAP_SUCCESS && cmd_buf->result == CMD_SUCCESS) {
|
|
if (cmd_buf->domain.country_code[0] ||
|
|
cmd_buf->domain.country_code[1] ||
|
|
cmd_buf->domain.country_code[2]) {
|
|
strncpy(country_80211d,
|
|
(char *)cmd_buf->domain.country_code,
|
|
COUNTRY_CODE_LEN);
|
|
}
|
|
}
|
|
free(cbuf);
|
|
|
|
/* get region code to handle special cases */
|
|
memset(&fw, 0, sizeof(fw));
|
|
if (get_fw_info(&fw)) {
|
|
printf("Could not get fw info!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (get_tx_rate_cfg(&tx_rate_config) == UAP_FAILURE) {
|
|
printf("Could not get tx_rate_cfg!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if ((!state_80211d) && (bss_config->channel == MAX_CHANNELS_BG)
|
|
&& (strncmp(country_80211d, "JP", COUNTRY_CODE_LEN - 1) == 0)
|
|
) {
|
|
printf("ERR: Invalid channel 14, 802.11d disabled, country code JP!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if ((fw.fw_bands & (BAND_B | BAND_G | BAND_GN | BAND_GAC))
|
|
&& !(fw.fw_bands & (BAND_A | BAND_AAC))
|
|
) {
|
|
if (bss_config->channel > MAX_CHANNELS_BG) {
|
|
printf("ERR: Invalid channel in 2.4GHz band!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
if (!(fw.fw_bands & (BAND_B | BAND_G | BAND_GN
|
|
| BAND_GAC)) && (fw.fw_bands & (BAND_A
|
|
| BAND_AAC))) {
|
|
if (bss_config->channel < 36 ||
|
|
bss_config->channel > MAX_CHANNELS) {
|
|
printf("ERR: Invalid channel in 5GHz band!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if (bss_config->bandcfg.chanBand == BAND_5GHZ)
|
|
channel_tlv_band = BAND_A;
|
|
secondary_ch_set = bss_config->bandcfg.chan2Offset;
|
|
if (channel_tlv_band != BAND_A) {
|
|
/* When country code is not Japan, allow channels 5-11 for US and 5-13 for non-US
|
|
* only for secondary channel below */
|
|
if (secondary_ch_set == SEC_CHAN_BELOW) {
|
|
if (!strncmp
|
|
(country_80211d, "US", COUNTRY_CODE_LEN - 1)) {
|
|
if (bss_config->channel >
|
|
DEFAULT_MAX_CHANNEL_BELOW) {
|
|
printf("ERR: Only channels 5-11 are allowed with secondary channel below for the US\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
} else if (strncmp
|
|
(country_80211d, "JP",
|
|
COUNTRY_CODE_LEN - 1)) {
|
|
if (bss_config->channel >
|
|
DEFAULT_MAX_CHANNEL_BELOW_NON_US) {
|
|
printf("ERR: Only channels 5-13 are allowed with secondary channel below for" "non-Japan countries!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* When country code is not Japan, allow channels 1-7 for US and 1-9 for non-US
|
|
* only for secondary channel above */
|
|
if (secondary_ch_set == SEC_CHAN_ABOVE) {
|
|
if (!strncmp
|
|
(country_80211d, "US", COUNTRY_CODE_LEN - 1)) {
|
|
if (bss_config->channel >
|
|
DEFAULT_MAX_CHANNEL_ABOVE) {
|
|
printf("ERR: Only channels 1-7 are allowed with secondary channel above for the US\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
} else if (strncmp
|
|
(country_80211d, "JP",
|
|
COUNTRY_CODE_LEN - 1)) {
|
|
if (bss_config->channel >
|
|
DEFAULT_MAX_CHANNEL_ABOVE_NON_US) {
|
|
printf("ERR: Only channels 1-9 are allowed with secondary channel above for" "non-Japan countries!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!(bss_config->bandcfg.scanMode == SCAN_MODE_ACS)) {
|
|
if (check_channel_validity_11d
|
|
(bss_config->channel, channel_tlv_band, 1) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
if (state_80211d) {
|
|
/* Set country code to JP if channel is 8 or 12 and band is 5GHZ */
|
|
if ((bss_config->channel < MAX_CHANNELS_BG) &&
|
|
(channel_tlv_band == BAND_A))
|
|
strncpy(country_80211d, "JP ",
|
|
sizeof(country_80211d) - 1);
|
|
} else {
|
|
if ((channel_tlv_band == BAND_A) &&
|
|
((bss_config->channel == 8) ||
|
|
(bss_config->channel == 12))) {
|
|
printf("ERR:Invalid band for given channel\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
} else {
|
|
acs_mode_enabled = 1;
|
|
}
|
|
|
|
#define JP_REGION_0xFE 0xFE
|
|
if (fw.region_code == JP_REGION_0xFE &&
|
|
((bss_config->channel == 12) || (bss_config->channel == 13))) {
|
|
printf("ERR:Channel 12 or 13 is not allowed for region code 0xFE\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
for (i = 0; i < bss_config->num_of_chan; i++) {
|
|
scan_channels_band = BAND_B | BAND_G;
|
|
if ((scan_channels_band != BAND_A) &&
|
|
(bss_config->chan_list[i].bandcfg.chanBand == BAND_5GHZ)) {
|
|
scan_channels_band = BAND_A;
|
|
}
|
|
if (check_channel_validity_11d
|
|
(bss_config->chan_list[i].chan_number, scan_channels_band,
|
|
0) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (state_80211d) {
|
|
if (check_tx_pwr_validity_11d(bss_config->tx_power_level) ==
|
|
UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (bss_config->supported_mcs_set[0]) {
|
|
enable_11n = 1;
|
|
enable_40Mhz = IS_11N_40MHZ_ENABLED(bss_config->ht_cap_info);
|
|
enable_20Mhz_sgi =
|
|
IS_11N_20MHZ_SHORTGI_ENABLED(bss_config->ht_cap_info);
|
|
enable_gf = IS_11N_GF_ENABLED(bss_config->ht_cap_info);
|
|
}
|
|
|
|
if (bss_config->mcbc_data_rate &&
|
|
(is_mcbc_rate_valid(bss_config->mcbc_data_rate) != UAP_SUCCESS)) {
|
|
printf("ERR: Invalid MCBC Data Rate \n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if ((bss_config->protocol == PROTOCOL_STATIC_WEP)
|
|
&& (0 == bss_config->wep_cfg.key0.is_default)
|
|
&& (0 == bss_config->wep_cfg.key1.is_default)
|
|
&& (0 == bss_config->wep_cfg.key2.is_default)
|
|
&& (0 == bss_config->wep_cfg.key3.is_default)) {
|
|
printf("ERR:WEP keys not set!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if ((bss_config->auth_mode == 1) &&
|
|
(bss_config->protocol != PROTOCOL_STATIC_WEP)) {
|
|
printf("ERR:Shared key authentication is not allowed for Open/WPA/WPA2/Mixed mode\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (((bss_config->protocol == PROTOCOL_WPA) ||
|
|
(bss_config->protocol == PROTOCOL_WPA2)
|
|
|| (bss_config->protocol == PROTOCOL_WPA3_SAE)
|
|
|| (bss_config->protocol == PROTOCOL_WPA2_MIXED)) &&
|
|
!(bss_config->wpa_cfg.length)) {
|
|
printf("ERR:Passphrase must be set for WPA/WPA2/Mixed/WPA3 SAE mode\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if ((bss_config->protocol == PROTOCOL_WPA) ||
|
|
(bss_config->protocol == PROTOCOL_WPA2_MIXED)) {
|
|
if (is_cipher_valid
|
|
(bss_config->wpa_cfg.pairwise_cipher_wpa,
|
|
bss_config->wpa_cfg.group_cipher) != UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA pairwise cipher combination!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if ((bss_config->protocol == PROTOCOL_WPA2) ||
|
|
(bss_config->protocol == PROTOCOL_WPA2_MIXED)
|
|
|| (bss_config->protocol == PROTOCOL_WPA3_SAE)
|
|
) {
|
|
if (is_cipher_valid
|
|
(bss_config->wpa_cfg.pairwise_cipher_wpa2,
|
|
bss_config->wpa_cfg.group_cipher) != UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA2 pairwise cipher combination!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
if (0 == bss_config->num_of_chan) {
|
|
printf("ERR: No channel list found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (acs_mode_enabled) {
|
|
for (i = 0; i < bss_config->num_of_chan; i++) {
|
|
if ((!state_80211d) &&
|
|
(bss_config->chan_list[i].chan_number ==
|
|
MAX_CHANNELS_BG)
|
|
&&
|
|
(strncmp(country_80211d, "JP", COUNTRY_CODE_LEN - 1)
|
|
== 0)
|
|
) {
|
|
printf("ERR: Invalid scan channel 14, 802.11d disabled, country code JP!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (fw.region_code == JP_REGION_0xFE &&
|
|
((bss_config->chan_list[i].chan_number == 12) ||
|
|
(bss_config->chan_list[i].chan_number == 13))) {
|
|
printf("ERR:Scan Channel 12 or 13 is not allowed for region code 0xFE\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
if (!state_80211d) {
|
|
/* Block scan channels 8 and 12 in 5GHz band if 11d is not enabled and country code not set to JP */
|
|
for (i = 0; i < bss_config->num_of_chan; i++) {
|
|
if ((bss_config->chan_list[i].bandcfg.
|
|
chanBand == BAND_5GHZ)
|
|
&&
|
|
((bss_config->chan_list[i].chan_number == 8)
|
|
|| (bss_config->chan_list[i].chan_number ==
|
|
12))) {
|
|
printf("ERR: Invalid band for scan channel %d\n", bss_config->chan_list[i].chan_number);
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (state_80211d) {
|
|
/* Set default country code to US */
|
|
strncpy(country_80211d, "US ",
|
|
sizeof(country_80211d) - 1);
|
|
for (i = 0; i < bss_config->num_of_chan; i++) {
|
|
/* Set country code to JP if channel is 8 or 12 and band is 5GHZ */
|
|
if ((bss_config->chan_list[i].chan_number <
|
|
MAX_CHANNELS_BG) &&
|
|
(scan_channels_band == BAND_A)) {
|
|
strncpy(country_80211d, "JP ",
|
|
sizeof(country_80211d) - 1);
|
|
}
|
|
if (check_channel_validity_11d
|
|
(bss_config->chan_list[i].chan_number,
|
|
scan_channels_band, 0) == UAP_FAILURE)
|
|
return UAP_FAILURE;
|
|
}
|
|
if (update_domain_info
|
|
(country_80211d,
|
|
scan_channels_band) == UAP_FAILURE) {
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
#ifdef WIFI_DIRECT_SUPPORT
|
|
if (strncmp(dev_name, "wfd", 3))
|
|
#endif
|
|
if ((!acs_mode_enabled &&
|
|
(channel_tlv_band == (BAND_B | BAND_G)))
|
|
|| (acs_mode_enabled &&
|
|
(scan_channels_band == (BAND_B | BAND_G)))) {
|
|
if (0 == bss_config->rates[0]) {
|
|
printf("ERR: No rates found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
for (i = 0; i < MAX_DATA_RATES && bss_config->rates[i];
|
|
i++) {
|
|
rate = bss_config->
|
|
rates[i] & ~BASIC_RATE_SET_BIT;
|
|
switch (rate) {
|
|
case 2:
|
|
rate_bitmap |= BITMAP_RATE_1M;
|
|
break;
|
|
case 4:
|
|
rate_bitmap |= BITMAP_RATE_2M;
|
|
break;
|
|
case 11:
|
|
rate_bitmap |= BITMAP_RATE_5_5M;
|
|
break;
|
|
case 22:
|
|
rate_bitmap |= BITMAP_RATE_11M;
|
|
break;
|
|
}
|
|
}
|
|
if ((rate_bitmap & B_RATE_MANDATORY) !=
|
|
B_RATE_MANDATORY) {
|
|
if (acs_mode_enabled)
|
|
printf("ERR: Rates/Scan channels do not match!\n");
|
|
else
|
|
printf("ERR: Rates/Channel do not match!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if ((!acs_mode_enabled && (channel_tlv_band == BAND_A))
|
|
|| (acs_mode_enabled && (scan_channels_band == BAND_A))) {
|
|
if (0 == bss_config->rates[0]) {
|
|
printf("ERR: No rates found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
for (i = 0; i < MAX_DATA_RATES && bss_config->rates[i]; i++) {
|
|
rate = bss_config->rates[i] & ~BASIC_RATE_SET_BIT;
|
|
switch (rate) {
|
|
case 2:
|
|
case 4:
|
|
case 11:
|
|
case 22:
|
|
if (acs_mode_enabled)
|
|
printf("ERR: Rates/Scan channels do not match!\n");
|
|
else
|
|
printf("ERR: Rates/Channel do not match!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
state_80211h = 1;
|
|
if (sg_snmp_mib
|
|
(ACTION_SET, OID_80211H_ENABLE, sizeof(state_80211h),
|
|
&state_80211h)
|
|
== UAP_FAILURE) {
|
|
return UAP_FAILURE;
|
|
}
|
|
if (update_domain_info(country_80211d, BAND_A) == UAP_FAILURE) {
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
#define ISSUPP_CHANWIDTH40(Dot11nDevCap) (Dot11nDevCap & MBIT(17))
|
|
#define ISSUPP_SHORTGI40(Dot11nDevCap) (Dot11nDevCap & MBIT(24))
|
|
|
|
if (enable_40Mhz) {
|
|
if (!ISSUPP_CHANWIDTH40(fw.hw_dot_11n_dev_cap)) {
|
|
printf("ERR: It's not support HT40 from Hardware Cap\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
if (enable_11n) {
|
|
/*For protocol = Mixed, 11n enabled, only allow TKIP cipher for WPA protocol, not for WPA2 */
|
|
if ((bss_config->protocol == PROTOCOL_WPA2_MIXED) &&
|
|
(bss_config->wpa_cfg.pairwise_cipher_wpa2 == CIPHER_TKIP)) {
|
|
printf("ERR: WPA2 pairwise cipher cannot be TKIP when AP operates in 802.11n Mixed mode.\n");
|
|
return UAP_FAILURE;
|
|
} else if (bss_config->protocol == PROTOCOL_STATIC_WEP) {
|
|
printf("ERR: WEP cannot be used when AP operates in 802.11n mode.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if ((tx_rate_config.rate == UAP_RATE_INDEX_MCS32) && !enable_40Mhz) {
|
|
printf("ERR:uAP must be configured to operate in 40MHz if tx_rate is MCS32\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (enable_20Mhz_sgi && enable_gf) {
|
|
if ((tx_rate_config.rate >= UAP_RATE_INDEX_MCS0) &&
|
|
(tx_rate_config.rate <= UAP_RATE_INDEX_MCS7)) {
|
|
printf("ERR: Invalid tx_rate for uAP in (20MHz Short GI + Green Field) mode\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
mcs_rate_index =
|
|
get_rate_index_from_bitmap(tx_rate_config.bitmap_rates,
|
|
sizeof(tx_rate_config.bitmap_rates));
|
|
if ((mcs_rate_index >= UAP_RATE_BITMAP_MCS0) &&
|
|
(mcs_rate_index <= UAP_RATE_BITMAP_MCS127)) {
|
|
mcs_rate_index -= (UAP_RATE_BITMAP_MCS0 - UAP_RATE_INDEX_MCS0);
|
|
if ((mcs_rate_index == UAP_RATE_INDEX_MCS32) & !enable_40Mhz) {
|
|
printf("ERR:uAP must be configured to operate in 40MHz if rate_bitmap contains MCS32\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (enable_20Mhz_sgi && enable_gf) {
|
|
if ((mcs_rate_index >= UAP_RATE_INDEX_MCS0) &&
|
|
(mcs_rate_index <= UAP_RATE_INDEX_MCS7)) {
|
|
printf("ERR: Invalid tx_rate for uAP in (20MHz Short GI + Green Field) mode\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* if 11d enabled, Channel 14, country code "JP", only B rates are allowed*/
|
|
if ((bss_config->channel == 14) && state_80211d &&
|
|
(strncmp(country_80211d, "JP", COUNTRY_CODE_LEN - 1) == 0)) {
|
|
if (0 == bss_config->rates[0]) {
|
|
printf("ERR:No rates found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (enable_11n) {
|
|
printf("ERR:11n must be disabled and the only B rates are allowed if 11d enabled and country code is JP with channel 14.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
for (i = 0; i < MAX_DATA_RATES && bss_config->rates[i]; i++) {
|
|
rate = bss_config->rates[i] & ~BASIC_RATE_SET_BIT;
|
|
switch (rate) {
|
|
case 2:
|
|
case 4:
|
|
case 11:
|
|
case 22:
|
|
break;
|
|
default:
|
|
printf("ERR:If 11d enabled, channel 14 and country code is JP, the only B rates are allowed.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Channels 14, 165 are not allowed to operate in 40MHz mode */
|
|
if (!acs_mode_enabled && enable_40Mhz) {
|
|
if ((bss_config->channel == 14)
|
|
|| (bss_config->channel == 165)
|
|
) {
|
|
printf("ERR:Invalid channel %d for 40MHz operation\n",
|
|
bss_config->channel);
|
|
return UAP_FAILURE;
|
|
} else if (!secondary_ch_set) {
|
|
printf("ERR:Secondary channel should be set when 40Mhz is enabled!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
/* Channels 14, 140, 165 are not allowed to operate in 40MHz mode */
|
|
if (acs_mode_enabled && enable_40Mhz) {
|
|
if (bss_config->num_of_chan == 0) {
|
|
printf("ERR: No channel list found\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
for (i = 0; i < bss_config->num_of_chan; i++) {
|
|
if ((bss_config->chan_list[i].chan_number != 14)
|
|
&& (bss_config->chan_list[i].chan_number != 140) &&
|
|
(bss_config->chan_list[i].chan_number != 165)
|
|
) {
|
|
flag = 1;
|
|
break;
|
|
}
|
|
}
|
|
if (!flag) {
|
|
printf("ERR:Invalid channels in scan channel list for 40MHz operation\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
|
|
if (0 == get_fw_info(&fw)) {
|
|
/*check whether support 802.11AC through BAND_AAC bit */
|
|
if (fw.fw_bands & BAND_AAC) {
|
|
ret = get_802_11ac_cfg(&vhtcfg);
|
|
if (UAP_SUCCESS == ret) {
|
|
/* Note: When 11AC is disabled, FW sets vht_rx_mcs to 0xffff */
|
|
if ((vhtcfg.vht_rx_mcs != 0xffff) &&
|
|
(!enable_11n)) {
|
|
printf("ERR: 11ac enable while 11n disable, it is forbidden! \n");
|
|
return UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("Don't support 802.11AC \n");
|
|
return UAP_SUCCESS;
|
|
}
|
|
} else
|
|
printf("No support 802 11AC.\n");
|
|
} else {
|
|
printf("ERR: get_fw_info fail\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Send read/write command along with register details to the driver
|
|
* @param reg Reg type
|
|
* @param offset Pointer to register offset string
|
|
* @param strvalue Pointer to value string
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_regrdwr_process(int reg, char *offset, char *strvalue)
|
|
{
|
|
apcmdbuf_reg_rdwr *cmd_buf = NULL;
|
|
t_u8 *buf = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int ret = UAP_SUCCESS;
|
|
char *whichreg;
|
|
|
|
/* Alloc buf for command */
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
|
|
/* Locate headers */
|
|
cmd_len = sizeof(apcmdbuf_reg_rdwr);
|
|
cmd_buf = (apcmdbuf_reg_rdwr *)buf;
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
|
|
switch (reg) {
|
|
case CMD_MAC:
|
|
whichreg = "MAC";
|
|
cmd_buf->cmd_code = HostCmd_CMD_MAC_REG_ACCESS;
|
|
break;
|
|
case CMD_BBP:
|
|
whichreg = "BBP";
|
|
cmd_buf->cmd_code = HostCmd_CMD_BBP_REG_ACCESS;
|
|
break;
|
|
case CMD_RF:
|
|
cmd_buf->cmd_code = HostCmd_CMD_RF_REG_ACCESS;
|
|
whichreg = "RF";
|
|
break;
|
|
default:
|
|
printf("Invalid register set specified.\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (strvalue) {
|
|
cmd_buf->action = 1; // WRITE
|
|
} else {
|
|
cmd_buf->action = 0; // READ
|
|
}
|
|
cmd_buf->action = uap_cpu_to_le16(cmd_buf->action);
|
|
cmd_buf->offset = A2HEXDECIMAL(offset);
|
|
cmd_buf->offset = uap_cpu_to_le16(cmd_buf->offset);
|
|
if (strvalue) {
|
|
cmd_buf->value = A2HEXDECIMAL(strvalue);
|
|
cmd_buf->value = uap_cpu_to_le32(cmd_buf->value);
|
|
}
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
printf("Successfully executed the command\n");
|
|
printf("%s[0x%04hx] = 0x%08x\n",
|
|
whichreg, uap_le16_to_cpu(cmd_buf->offset),
|
|
uap_le32_to_cpu(cmd_buf->value));
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
free(buf);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Send read command for EEPROM
|
|
*
|
|
* Usage: "Usage : rdeeprom <offset> <byteCount>"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_read_eeprom(int argc, char *argv[])
|
|
{
|
|
apcmdbuf_eeprom_access *cmd_buf = NULL;
|
|
t_u8 *buf = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
t_u16 byte_count, offset;
|
|
int ret = UAP_SUCCESS;
|
|
int opt;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_apcmd_read_eeprom_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (!argc ||
|
|
(argc && is_input_valid(RDEEPROM, argc, argv) != UAP_SUCCESS)) {
|
|
print_apcmd_read_eeprom_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
offset = A2HEXDECIMAL(argv[0]);
|
|
byte_count = A2HEXDECIMAL(argv[1]);
|
|
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_eeprom_access *)buf;
|
|
cmd_len = sizeof(apcmdbuf_eeprom_access);
|
|
|
|
cmd_buf->size = sizeof(apcmdbuf_eeprom_access) - BUF_HEADER_SIZE;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->action = 0;
|
|
|
|
cmd_buf->cmd_code = HostCmd_EEPROM_ACCESS;
|
|
cmd_buf->offset = uap_cpu_to_le16(offset);
|
|
cmd_buf->byte_count = uap_cpu_to_le16(byte_count);
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
printf("Successfully executed the command\n");
|
|
byte_count = uap_le16_to_cpu(cmd_buf->byte_count);
|
|
offset = uap_le16_to_cpu(cmd_buf->offset);
|
|
hexdump_data("EEPROM", (void *)cmd_buf->value,
|
|
byte_count, ' ');
|
|
} else {
|
|
printf("ERR:Command Response incorrect!\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the regrdwr command
|
|
* command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_regrdwr_usage(void)
|
|
{
|
|
printf("\nUsage : uaputl.exe regrdwr <TYPE> <OFFSET> [value]\n");
|
|
printf("\nTYPE Options: 1 - read/write MAC register");
|
|
printf("\n 2 - read/write BBP register");
|
|
printf("\n 3 - read/write RF register");
|
|
printf("\n");
|
|
return;
|
|
|
|
}
|
|
|
|
/**
|
|
* @brief Provides interface to perform read/write operations on regsiters
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_regrdwr(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
t_s32 reg;
|
|
int ret = UAP_SUCCESS;
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_regrdwr_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if ((argc < 2) || (argc > 3)) {
|
|
printf("ERR:wrong arguments.\n");
|
|
print_regrdwr_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[0]) != 1) && (atoi(argv[0]) != 2) &&
|
|
(atoi(argv[0]) != 3)) {
|
|
printf("ERR:Illegal register type %s. Must be either '1','2' or '3'.\n", argv[0]);
|
|
print_regrdwr_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
reg = atoi(argv[0]);
|
|
ret = apcmd_regrdwr_process(reg, argv[1], argc > 2 ? argv[2] : NULL);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the memaccess command
|
|
* command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_memaccess_usage(void)
|
|
{
|
|
printf("\nUsage : uaputl.exe memaccess <ADDRESS> [value]\n");
|
|
printf("\nRead/Write memory location");
|
|
printf("\nADDRESS: Address of the memory location to be read/written");
|
|
printf("\nValue : Value to be written at that address\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Provides interface to perform read/write memory location
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_memaccess(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
apcmdbuf_mem_access *cmd_buf = NULL;
|
|
t_u8 *buf = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int ret = UAP_SUCCESS;
|
|
char *address = NULL;
|
|
char *value = NULL;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_memaccess_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if ((argc < 1) || (argc > 2)) {
|
|
printf("ERR:wrong arguments.\n");
|
|
print_memaccess_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
address = argv[0];
|
|
if (argc == 2)
|
|
value = argv[1];
|
|
|
|
/* Alloc buf for command */
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
/* Locate headers */
|
|
cmd_len = sizeof(apcmdbuf_mem_access);
|
|
cmd_buf = (apcmdbuf_mem_access *)buf;
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->cmd_code = HostCmd_CMD_MEM_ACCESS;
|
|
|
|
if (value)
|
|
cmd_buf->action = 1; // WRITE
|
|
else
|
|
cmd_buf->action = 0; // READ
|
|
|
|
cmd_buf->action = uap_cpu_to_le16(cmd_buf->action);
|
|
cmd_buf->address = A2HEXDECIMAL(address);
|
|
cmd_buf->address = uap_cpu_to_le32(cmd_buf->address);
|
|
|
|
if (value) {
|
|
cmd_buf->value = A2HEXDECIMAL(value);
|
|
cmd_buf->value = uap_cpu_to_le32(cmd_buf->value);
|
|
}
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
printf("Successfully executed the command\n");
|
|
printf("[0x%04x] = 0x%08x\n",
|
|
uap_le32_to_cpu(cmd_buf->address),
|
|
uap_le32_to_cpu(cmd_buf->value));
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
free(buf);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a sys_debug request to send data packet directly to driver
|
|
* @param pkt_type packet type 0 or 5.
|
|
* @param control management packet tx control field.
|
|
* @param file packet data file.
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_debug_data_packet_inject(int pkt_type, int control, char *file)
|
|
{
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u8 *buf = NULL;
|
|
t_u32 data_len;
|
|
FILE *fp = NULL;
|
|
pkt_header *header = NULL;
|
|
|
|
/* Check if file exists */
|
|
fp = fopen(file, "r");
|
|
if (fp == NULL) {
|
|
printf("\nERR:Data file can not be opened %s.\n", file);
|
|
return UAP_FAILURE;
|
|
}
|
|
buf = (t_u8 *)malloc(MRVDRV_SIZE_OF_PKT_BUFFER);
|
|
if (buf == NULL) {
|
|
printf("Error: allocate memory for packet buffer failed\n");
|
|
fclose(fp);
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, MRVDRV_SIZE_OF_PKT_BUFFER);
|
|
header = (pkt_header *)buf;
|
|
data_len = fparse_for_hex(fp, buf + sizeof(pkt_header));
|
|
fclose(fp);
|
|
if (data_len > (MRVDRV_SIZE_OF_PKT_BUFFER - sizeof(pkt_header))) {
|
|
printf("ERR: Config file is too big %d\n", data_len);
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
header->tx_pkt_type = pkt_type;
|
|
header->tx_control = control;
|
|
header->pkt_len = data_len;
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)buf;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAPHOSTPKTINJECT, &ifr)) {
|
|
perror("");
|
|
printf("ERR:ioctl is not supported by %s\n", dev_name);
|
|
close(sockfd);
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
|
|
if (buf)
|
|
free(buf);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the bss_config command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_bss_config_usage(void)
|
|
{
|
|
printf("\nUsage : bss_config [CONFIG_FILE]\n");
|
|
printf("\nIf CONFIG_FILE is provided, a 'set' is performed, else a 'get' is performed.\n");
|
|
printf("CONFIG_FILE is file containing all the BSS settings.\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Read the BSS profile and populate structure
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @param bss Pointer to BSS configuration buffer
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
parse_bss_config(int argc, char *argv[], bss_config_t *bss)
|
|
{
|
|
FILE *config_file = NULL;
|
|
char *line = NULL;
|
|
int li = 0;
|
|
char *pos = NULL;
|
|
int arg_num = 0;
|
|
char *args[30];
|
|
int i;
|
|
int is_ap_config = 0;
|
|
int is_ap_mac_filter = 0;
|
|
int keyindex = -1;
|
|
int pwkcipher_wpa = -1;
|
|
int pwkcipher_wpa2 = -1;
|
|
int gwkcipher = -1;
|
|
int protocol = -1;
|
|
int tx_beacon_rate = -1;
|
|
int tx_data_rate = -1;
|
|
int mcbc_data_rate = -1;
|
|
int num_rates = 0;
|
|
int found = 0;
|
|
int filter_mac_count = -1;
|
|
int retval = UAP_SUCCESS;
|
|
int chan_mode = 0;
|
|
int band_flag = 0;
|
|
int chan_number = 0;
|
|
t_u16 max_sta_num_supported = 0;
|
|
fw_info fw;
|
|
HTCap_t htcap;
|
|
int enable_11n = -1;
|
|
t_u32 supported_mcs_set = 0;
|
|
int ac = 0;
|
|
int is_wmm_parameters = 0;
|
|
char oui_type[4] = { 0x00, 0x50, 0xf2, 0x02 };
|
|
struct eth_priv_vhtcfg vhtcfg = { 0 };
|
|
|
|
/* Check if file exists */
|
|
config_file = fopen(argv[0], "r");
|
|
if (config_file == NULL) {
|
|
printf("\nERR:Config file can not open.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
line = (char *)malloc(MAX_CONFIG_LINE);
|
|
if (!line) {
|
|
printf("ERR:Cannot allocate memory for line\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
memset(line, 0, MAX_CONFIG_LINE);
|
|
|
|
/* Parse file and process */
|
|
while (config_get_line(line, MAX_CONFIG_LINE, config_file, &li, &pos)) {
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG, "DBG:Received config line (%d) = %s\n",
|
|
li, line);
|
|
#endif
|
|
arg_num = parse_line(line, args);
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG, "DBG:Number of arguments = %d\n",
|
|
arg_num);
|
|
for (i = 0; i < arg_num; i++) {
|
|
uap_printf(MSG_DEBUG, "\tDBG:Argument %d. %s\n", i + 1,
|
|
args[i]);
|
|
}
|
|
#endif
|
|
/* Check for end of AP configurations */
|
|
if (is_ap_config == 1) {
|
|
if (strcmp(args[0], "}") == 0) {
|
|
is_ap_config = 0;
|
|
if (tx_data_rate != -1) {
|
|
if ((!bss->rates[0]) && (tx_data_rate)
|
|
&&
|
|
(is_tx_rate_valid
|
|
((t_u8)tx_data_rate) !=
|
|
UAP_SUCCESS)) {
|
|
printf("ERR: Invalid Tx Data Rate \n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (bss->rates[0] && tx_data_rate) {
|
|
for (i = 0; bss->rates[i] != 0;
|
|
i++) {
|
|
if ((bss->
|
|
rates[i] &
|
|
~BASIC_RATE_SET_BIT)
|
|
== tx_data_rate) {
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
if (!found) {
|
|
printf("ERR: Invalid Tx Data Rate \n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
/* Set Tx data rate field */
|
|
bss->tx_data_rate = tx_data_rate;
|
|
}
|
|
if (tx_beacon_rate != -1) {
|
|
if ((!bss->rates[0]) && (tx_beacon_rate)
|
|
&&
|
|
(is_tx_rate_valid
|
|
((t_u8)tx_beacon_rate) !=
|
|
UAP_SUCCESS)) {
|
|
printf("ERR: Invalid Tx Beacon Rate \n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (bss->rates[0] && tx_beacon_rate) {
|
|
for (i = 0; bss->rates[i] != 0;
|
|
i++) {
|
|
if ((bss->
|
|
rates[i] &
|
|
~BASIC_RATE_SET_BIT)
|
|
== tx_beacon_rate) {
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
if (!found) {
|
|
printf("ERR: Invalid Tx Beacon Rate \n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
/* Set Tx beacon rate field */
|
|
bss->tx_beacon_rate = tx_beacon_rate;
|
|
}
|
|
if (mcbc_data_rate != -1) {
|
|
if ((!bss->rates[0]) && (mcbc_data_rate)
|
|
&&
|
|
(is_mcbc_rate_valid
|
|
((t_u8)mcbc_data_rate) !=
|
|
UAP_SUCCESS)) {
|
|
printf("ERR: Invalid Tx Data Rate \n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (bss->rates[0] && mcbc_data_rate) {
|
|
for (i = 0; bss->rates[i] != 0;
|
|
i++) {
|
|
if (bss->
|
|
rates[i] &
|
|
BASIC_RATE_SET_BIT)
|
|
{
|
|
if ((bss->
|
|
rates[i] &
|
|
~BASIC_RATE_SET_BIT)
|
|
==
|
|
mcbc_data_rate)
|
|
{
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
if (!found) {
|
|
printf("ERR: Invalid MCBC Data Rate \n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
/* Set MCBC data rate field */
|
|
bss->mcbc_data_rate = mcbc_data_rate;
|
|
}
|
|
if ((protocol == PROTOCOL_STATIC_WEP) &&
|
|
(enable_11n == 1)) {
|
|
printf("ERR:WEP cannot be used when AP operates in 802.11n mode.\n");
|
|
goto done;
|
|
}
|
|
if (0 == get_fw_info(&fw)) {
|
|
/*check whether support 802.11AC through BAND_AAC bit */
|
|
if (fw.fw_bands & BAND_AAC) {
|
|
retval = get_802_11ac_cfg
|
|
(&vhtcfg);
|
|
if (retval != UAP_SUCCESS)
|
|
goto done;
|
|
if ((enable_11n == 1) &&
|
|
(vhtcfg.vht_rx_mcs !=
|
|
0xffff)) {
|
|
printf("ERR: 11n must be enabled when AP operates in 11ac mode.\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else
|
|
printf("No support 802 11AC.\n");
|
|
} else {
|
|
printf("ERR: get_fw_info fail\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if ((protocol == PROTOCOL_WPA2_MIXED) &&
|
|
((pwkcipher_wpa < 0) ||
|
|
(pwkcipher_wpa2 < 0))) {
|
|
printf("ERR:Both PwkCipherWPA and PwkCipherWPA2 should be defined for Mixed mode.\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (protocol != -1) {
|
|
bss->protocol = protocol;
|
|
if (protocol &
|
|
(PROTOCOL_WPA | PROTOCOL_WPA2)) {
|
|
/* Set key management field */
|
|
bss->key_mgmt = KEY_MGMT_PSK;
|
|
bss->key_mgmt_operation = 0;
|
|
}
|
|
}
|
|
if (((pwkcipher_wpa >= 0) ||
|
|
(pwkcipher_wpa2 >= 0)) &&
|
|
(gwkcipher >= 0)) {
|
|
if ((protocol == PROTOCOL_WPA) ||
|
|
(protocol == PROTOCOL_WPA2_MIXED)) {
|
|
if (enable_11n != -1) {
|
|
if (is_cipher_valid_with_11n(pwkcipher_wpa, gwkcipher, protocol, enable_11n) != UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA pairwise cipher combination!\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else if
|
|
(is_cipher_valid_with_proto
|
|
(pwkcipher_wpa,
|
|
gwkcipher,
|
|
protocol) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA pairwise cipher combination!\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
if ((protocol == PROTOCOL_WPA2) ||
|
|
(protocol == PROTOCOL_WPA2_MIXED)
|
|
|| (protocol == PROTOCOL_WPA3_SAE)
|
|
) {
|
|
if (enable_11n != -1) {
|
|
if (is_cipher_valid_with_11n(pwkcipher_wpa2, gwkcipher, protocol, enable_11n) != UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA2 pairwise cipher combination!\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
} else if
|
|
(is_cipher_valid_with_proto
|
|
(pwkcipher_wpa2,
|
|
gwkcipher,
|
|
protocol) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR:Wrong group cipher and WPA2 pairwise cipher combination!\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
/* Set pairwise and group cipher fields */
|
|
bss->wpa_cfg.pairwise_cipher_wpa =
|
|
pwkcipher_wpa;
|
|
bss->wpa_cfg.pairwise_cipher_wpa2 =
|
|
pwkcipher_wpa2;
|
|
bss->wpa_cfg.group_cipher = gwkcipher;
|
|
}
|
|
continue;
|
|
}
|
|
}
|
|
|
|
/* Check for beginning of AP configurations */
|
|
if (strcmp(args[0], "ap_config") == 0) {
|
|
is_ap_config = 1;
|
|
continue;
|
|
}
|
|
|
|
/* Check for end of AP MAC address filter configurations */
|
|
if (is_ap_mac_filter == 1) {
|
|
if (strcmp(args[0], "}") == 0) {
|
|
is_ap_mac_filter = 0;
|
|
if (bss->filter.mac_count != filter_mac_count) {
|
|
printf("ERR:Number of MAC address provided does not match 'Count'\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (bss->filter.filter_mode &&
|
|
(bss->filter.mac_count == 0)) {
|
|
printf("ERR:Filter list can not be empty for %s Filter mode\n", (bss->filter.filter_mode == 1) ? "'Allow'" : "'Block'");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
continue;
|
|
}
|
|
}
|
|
|
|
/* Check for beginning of AP MAC address filter configurations */
|
|
if (strcmp(args[0], "ap_mac_filter") == 0) {
|
|
is_ap_mac_filter = 1;
|
|
bss->filter.mac_count = 0;
|
|
filter_mac_count = 0;
|
|
continue;
|
|
}
|
|
if ((strcmp(args[0], "FilterMode") == 0) && is_ap_mac_filter) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0) ||
|
|
(atoi(args[1]) > 2)) {
|
|
printf("ERR:Illegal FilterMode paramter %d. Must be either '0', '1', or '2'.\n", atoi(args[1]));
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
bss->filter.filter_mode = atoi(args[1]);
|
|
continue;
|
|
}
|
|
if ((strcmp(args[0], "Count") == 0) && is_ap_mac_filter) {
|
|
bss->filter.mac_count = atoi(args[1]);
|
|
if ((ISDIGIT(args[1]) == 0) ||
|
|
(bss->filter.mac_count > MAX_MAC_ONESHOT_FILTER)) {
|
|
printf("ERR: Illegal Count parameter.\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
if ((strncmp(args[0], "mac_", 4) == 0) && is_ap_mac_filter) {
|
|
if (filter_mac_count < MAX_MAC_ONESHOT_FILTER) {
|
|
if (mac2raw
|
|
(args[1],
|
|
bss->filter.mac_list[filter_mac_count]) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR: Invalid MAC address %s \n",
|
|
args[1]);
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
filter_mac_count++;
|
|
} else {
|
|
printf("ERR: Filter table can not have more than %d MAC addresses\n", MAX_MAC_ONESHOT_FILTER);
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
/* Check for end of Wmm Parameters configurations */
|
|
if (is_wmm_parameters == 1) {
|
|
if (strcmp(args[0], "}") == 0) {
|
|
is_wmm_parameters = 0;
|
|
continue;
|
|
}
|
|
}
|
|
/* Check for beginning of Sticky Tim Sta MAC address Configurations */
|
|
if (strcmp(args[0], "Wmm_parameters") == 0) {
|
|
is_wmm_parameters = 1;
|
|
memset(&(bss->wmm_para), 0, sizeof(bss->wmm_para));
|
|
memcpy(bss->wmm_para.ouitype, oui_type,
|
|
sizeof(oui_type));
|
|
bss->wmm_para.ouisubtype = 1;
|
|
bss->wmm_para.version = 1;
|
|
continue;
|
|
}
|
|
if ((strcmp(args[0], "Qos_info") == 0) && is_wmm_parameters) {
|
|
bss->wmm_para.qos_info = A2HEXDECIMAL(args[1]);
|
|
printf("wmm_para.qos_info = %2x\n",
|
|
bss->wmm_para.qos_info);
|
|
if ((bss->wmm_para.qos_info != ENABLE_WMM_PS) &&
|
|
(bss->wmm_para.qos_info != DISABLE_WMM_PS)) {
|
|
printf("ERR:qos_info must be either 0x80 or 0x00.\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
if ((strcmp(args[0], "AC_BE") == 0) && is_wmm_parameters) {
|
|
ac = 0;
|
|
}
|
|
if ((strcmp(args[0], "AC_BK") == 0) && is_wmm_parameters) {
|
|
ac = 1;
|
|
}
|
|
if ((strcmp(args[0], "AC_VI") == 0) && is_wmm_parameters) {
|
|
ac = 2;
|
|
}
|
|
if ((strcmp(args[0], "AC_VO") == 0) && is_wmm_parameters) {
|
|
ac = 3;
|
|
}
|
|
if ((strcmp(args[0], "Aifsn") == 0) && is_wmm_parameters) {
|
|
bss->wmm_para.ac_params[ac].aci_aifsn.aifsn =
|
|
(t_u8)A2HEXDECIMAL(args[1]);
|
|
printf("wmm_para.ac_params[%d].aci_aifsn.aifsn = %x\n",
|
|
ac, bss->wmm_para.ac_params[ac].aci_aifsn.aifsn);
|
|
bss->wmm_para.ac_params[ac].aci_aifsn.aci = (t_u8)ac;
|
|
printf("wmm_para.ac_params[%d].aci_aifsn.aci = %x\n",
|
|
ac, bss->wmm_para.ac_params[ac].aci_aifsn.aci);
|
|
}
|
|
if ((strcmp(args[0], "Ecw_max") == 0) && is_wmm_parameters) {
|
|
bss->wmm_para.ac_params[ac].ecw.ecw_max =
|
|
(t_u8)A2HEXDECIMAL(args[1]);
|
|
printf("wmm_para.ac_params[%d].ecw.ecw_max = %x\n", ac,
|
|
bss->wmm_para.ac_params[ac].ecw.ecw_max);
|
|
}
|
|
if ((strcmp(args[0], "Ecw_min") == 0) && is_wmm_parameters) {
|
|
bss->wmm_para.ac_params[ac].ecw.ecw_min =
|
|
(t_u8)A2HEXDECIMAL(args[1]);
|
|
printf("wmm_para.ac_params[%d].ecw.ecw_min = %x\n", ac,
|
|
bss->wmm_para.ac_params[ac].ecw.ecw_min);
|
|
}
|
|
if ((strcmp(args[0], "Tx_op") == 0) && is_wmm_parameters) {
|
|
bss->wmm_para.ac_params[ac].tx_op_limit =
|
|
(t_u8)A2HEXDECIMAL(args[1]);
|
|
printf("wmm_para.ac_params[%d].tx_op_limit = %x\n", ac,
|
|
bss->wmm_para.ac_params[ac].tx_op_limit);
|
|
}
|
|
|
|
if (strcmp(args[0], "SSID") == 0) {
|
|
if (arg_num == 1) {
|
|
printf("ERR:SSID field is blank!\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
if (args[1][0] == '"') {
|
|
args[1]++;
|
|
}
|
|
if (args[1][strlen(args[1]) - 1] == '"') {
|
|
args[1][strlen(args[1]) - 1] = '\0';
|
|
}
|
|
if ((strlen(args[1]) > MAX_SSID_LENGTH) ||
|
|
(strlen(args[1]) == 0)) {
|
|
printf("ERR:SSID length out of range (%d to %d).\n", MIN_SSID_LENGTH, MAX_SSID_LENGTH);
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set SSID field */
|
|
bss->ssid.ssid_len = strlen(args[1]);
|
|
memcpy(bss->ssid.ssid, args[1],
|
|
bss->ssid.ssid_len);
|
|
}
|
|
}
|
|
if (strcmp(args[0], "BeaconPeriod") == 0) {
|
|
if (is_input_valid(BEACONPERIOD, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set beacon period field */
|
|
bss->beacon_period = (t_u16)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "ChanList") == 0) {
|
|
if (is_input_valid(SCANCHANNELS, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Set channel list field */
|
|
if ((arg_num - 1) < MAX_CHANNELS) {
|
|
bss->num_of_chan = arg_num - 1;
|
|
} else {
|
|
bss->num_of_chan = MAX_CHANNELS;
|
|
}
|
|
for (i = 0; (unsigned int)i < bss->num_of_chan; i++) {
|
|
sscanf(args[i + 1], "%d.%d", &chan_number,
|
|
&band_flag);
|
|
bss->chan_list[i].chan_number = chan_number;
|
|
bss->chan_list[i].bandcfg.chanBand = BAND_2GHZ;
|
|
if (((band_flag != -1) && (band_flag)) ||
|
|
(chan_number > MAX_CHANNELS_BG)) {
|
|
bss->chan_list[i].bandcfg.chanBand =
|
|
BAND_5GHZ;
|
|
}
|
|
}
|
|
}
|
|
if (strcmp(args[0], "Channel") == 0) {
|
|
if (is_input_valid(CHANNEL, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set channel field */
|
|
bss->channel = (t_u8)atoi(args[1]);
|
|
if ((arg_num - 1) == 2) {
|
|
chan_mode = atoi(args[2]);
|
|
memset(&(bss->bandcfg), 0,
|
|
sizeof(bss->bandcfg));
|
|
if (chan_mode & BITMAP_ACS_MODE) {
|
|
int mode;
|
|
|
|
if (uap_ioctl_dfs_repeater_mode(&mode)
|
|
== UAP_SUCCESS) {
|
|
if (mode) {
|
|
printf("ERR: ACS in DFS Repeater mode" " is not allowed\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
bss->bandcfg.scanMode = SCAN_MODE_ACS;
|
|
}
|
|
if (chan_mode & BITMAP_CHANNEL_ABOVE)
|
|
bss->bandcfg.chan2Offset =
|
|
SEC_CHAN_ABOVE;
|
|
if (chan_mode & BITMAP_CHANNEL_BELOW)
|
|
bss->bandcfg.chan2Offset =
|
|
SEC_CHAN_BELOW;
|
|
} else
|
|
memset(&(bss->bandcfg), 0,
|
|
sizeof(bss->bandcfg));
|
|
if (bss->channel > MAX_CHANNELS_BG)
|
|
bss->bandcfg.chanBand = BAND_5GHZ;
|
|
}
|
|
if (strcmp(args[0], "Band") == 0) {
|
|
if (is_input_valid(BAND, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Clear previously set band */
|
|
bss->bandcfg.chanBand = BAND_2GHZ;
|
|
if (atoi(args[1]) == 1)
|
|
bss->bandcfg.chanBand = BAND_5GHZ;
|
|
}
|
|
if (strcmp(args[0], "AP_MAC") == 0) {
|
|
int ret;
|
|
if ((ret =
|
|
mac2raw(args[1], bss->mac_addr)) != UAP_SUCCESS) {
|
|
printf("ERR: %s Address \n",
|
|
ret ==
|
|
UAP_FAILURE ? "Invalid MAC" : ret ==
|
|
UAP_RET_MAC_BROADCAST ? "Broadcast" :
|
|
"Multicast");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
if (strcmp(args[0], "Rate") == 0) {
|
|
if (is_input_valid(RATE, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR: Invalid Rate input\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set rates field */
|
|
if ((arg_num - 1) < MAX_DATA_RATES) {
|
|
num_rates = arg_num - 1;
|
|
} else {
|
|
num_rates = MAX_DATA_RATES;
|
|
}
|
|
for (i = 0; i < num_rates; i++) {
|
|
bss->rates[i] = (t_u8)A2HEXDECIMAL(args[i + 1]);
|
|
}
|
|
}
|
|
if (strcmp(args[0], "TxPowerLevel") == 0) {
|
|
if (is_input_valid(TXPOWER, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
printf("ERR:Invalid TxPowerLevel \n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set Tx power level field */
|
|
bss->tx_power_level = (t_u8)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "BroadcastSSID") == 0) {
|
|
if (is_input_valid(BROADCASTSSID, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set broadcast SSID control field */
|
|
bss->bcast_ssid_ctl = (t_u8)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "RTSThreshold") == 0) {
|
|
if (is_input_valid(RTSTHRESH, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set RTS threshold field */
|
|
bss->rts_threshold = (t_u16)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "FragThreshold") == 0) {
|
|
if (is_input_valid(FRAGTHRESH, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set Frag threshold field */
|
|
bss->frag_threshold = (t_u16)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "DTIMPeriod") == 0) {
|
|
if (is_input_valid(DTIMPERIOD, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set DTIM period field */
|
|
bss->dtim_period = (t_u8)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "RSNReplayProtection") == 0) {
|
|
if (is_input_valid(RSNREPLAYPROT, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set RSN replay protection field */
|
|
bss->wpa_cfg.rsn_protection = (t_u8)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "PairwiseUpdateTimeout") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0)) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set Pairwise Update Timeout field */
|
|
bss->pairwise_update_timeout = (t_u32)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "PairwiseHandshakeRetries") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0)) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set Pairwise Hanshake Retries */
|
|
bss->pwk_retries = (t_u32)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "GroupwiseUpdateTimeout") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0)) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set Groupwise Update Timeout field */
|
|
bss->groupwise_update_timeout = (t_u32)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "GroupwiseHandshakeRetries") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0)) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set Groupwise Hanshake Retries */
|
|
bss->gwk_retries = (t_u32)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "TxBeaconRate") == 0) {
|
|
if (is_input_valid(TXBEACONRATE, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
tx_beacon_rate = (t_u16)A2HEXDECIMAL(args[1]);
|
|
}
|
|
if (strcmp(args[0], "MCBCdataRate") == 0) {
|
|
if (is_input_valid(MCBCDATARATE, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
mcbc_data_rate = (t_u16)A2HEXDECIMAL(args[1]);
|
|
}
|
|
if (strcmp(args[0], "PktFwdCtl") == 0) {
|
|
if (is_input_valid(PKTFWD, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set packet forward control field */
|
|
bss->pkt_forward_ctl = (t_u8)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "StaAgeoutTimer") == 0) {
|
|
if (is_input_valid
|
|
(STAAGEOUTTIMER, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set STA ageout timer field */
|
|
bss->sta_ageout_timer = (t_u32)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "PSStaAgeoutTimer") == 0) {
|
|
if (is_input_valid
|
|
(PSSTAAGEOUTTIMER, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set PS STA ageout timer field */
|
|
bss->ps_sta_ageout_timer = (t_u32)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "AuthMode") == 0) {
|
|
if (is_input_valid(AUTHMODE, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set auth mode field */
|
|
bss->auth_mode = (t_u16)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "KeyIndex") == 0) {
|
|
if (arg_num == 1) {
|
|
printf("KeyIndex is blank!\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
if (ISDIGIT(args[1]) == 0) {
|
|
printf("ERR:Illegal KeyIndex parameter. Must be either '0', '1', '2', or '3'.\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
keyindex = atoi(args[1]);
|
|
if ((keyindex < 0) || (keyindex > 3)) {
|
|
printf("ERR:Illegal KeyIndex parameter. Must be either '0', '1', '2', or '3'.\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
switch (keyindex) {
|
|
case 0:
|
|
bss->wep_cfg.key0.is_default = 1;
|
|
break;
|
|
case 1:
|
|
bss->wep_cfg.key1.is_default = 1;
|
|
break;
|
|
case 2:
|
|
bss->wep_cfg.key2.is_default = 1;
|
|
break;
|
|
case 3:
|
|
bss->wep_cfg.key3.is_default = 1;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
if (strncmp(args[0], "Key_", 4) == 0) {
|
|
if (arg_num == 1) {
|
|
printf("ERR:%s is blank!\n", args[0]);
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
int key_len = 0;
|
|
if (args[1][0] == '"') {
|
|
if ((strlen(args[1]) != 2) &&
|
|
(strlen(args[1]) != 7) &&
|
|
(strlen(args[1]) != 15)) {
|
|
printf("ERR:Wrong key length!\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
key_len = strlen(args[1]) - 2;
|
|
} else {
|
|
if ((strlen(args[1]) != 0) &&
|
|
(strlen(args[1]) != 10) &&
|
|
(strlen(args[1]) != 26)) {
|
|
printf("ERR:Wrong key length!\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (UAP_FAILURE == ishexstring(args[1])) {
|
|
printf("ERR:Only hex digits are allowed when key length is 10 or 26\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
key_len = strlen(args[1]) / 2;
|
|
}
|
|
/* Set WEP key fields */
|
|
if (strcmp(args[0], "Key_0") == 0) {
|
|
bss->wep_cfg.key0.key_index = 0;
|
|
bss->wep_cfg.key0.length = key_len;
|
|
if (args[1][0] == '"') {
|
|
memcpy(bss->wep_cfg.key0.key,
|
|
&args[1][1],
|
|
strlen(args[1]) - 2);
|
|
} else {
|
|
string2raw(args[1],
|
|
bss->wep_cfg.key0.
|
|
key);
|
|
}
|
|
} else if (strcmp(args[0], "Key_1") == 0) {
|
|
bss->wep_cfg.key1.key_index = 1;
|
|
bss->wep_cfg.key1.length = key_len;
|
|
if (args[1][0] == '"') {
|
|
memcpy(bss->wep_cfg.key1.key,
|
|
&args[1][1],
|
|
strlen(args[1]) - 2);
|
|
} else {
|
|
string2raw(args[1],
|
|
bss->wep_cfg.key1.
|
|
key);
|
|
}
|
|
} else if (strcmp(args[0], "Key_2") == 0) {
|
|
bss->wep_cfg.key2.key_index = 2;
|
|
bss->wep_cfg.key2.length = key_len;
|
|
if (args[1][0] == '"') {
|
|
memcpy(bss->wep_cfg.key2.key,
|
|
&args[1][1],
|
|
strlen(args[1]) - 2);
|
|
} else {
|
|
string2raw(args[1],
|
|
bss->wep_cfg.key2.
|
|
key);
|
|
}
|
|
} else if (strcmp(args[0], "Key_3") == 0) {
|
|
bss->wep_cfg.key3.key_index = 3;
|
|
bss->wep_cfg.key3.length = key_len;
|
|
if (args[1][0] == '"') {
|
|
memcpy(bss->wep_cfg.key3.key,
|
|
&args[1][1],
|
|
strlen(args[1]) - 2);
|
|
} else {
|
|
string2raw(args[1],
|
|
bss->wep_cfg.key3.
|
|
key);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (strcmp(args[0], "PSK") == 0) {
|
|
if (arg_num == 1) {
|
|
printf("ERR:PSK is blank!\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
} else {
|
|
if (args[1][0] == '"') {
|
|
args[1]++;
|
|
}
|
|
if (args[1][strlen(args[1]) - 1] == '"') {
|
|
args[1][strlen(args[1]) - 1] = '\0';
|
|
}
|
|
if (strlen(args[1]) > MAX_WPA_PASSPHRASE_LENGTH) {
|
|
printf("ERR:PSK too long.\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (strlen(args[1]) < MIN_WPA_PASSPHRASE_LENGTH) {
|
|
printf("ERR:PSK too short.\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (strlen(args[1]) ==
|
|
MAX_WPA_PASSPHRASE_LENGTH) {
|
|
if (UAP_FAILURE == ishexstring(args[1])) {
|
|
printf("ERR:Only hex digits are allowed when passphrase's length is 64\n");
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
}
|
|
/* Set WPA passphrase field */
|
|
bss->wpa_cfg.length = strlen(args[1]);
|
|
memcpy(bss->wpa_cfg.passphrase, args[1],
|
|
bss->wpa_cfg.length);
|
|
}
|
|
}
|
|
if (strcmp(args[0], "Protocol") == 0) {
|
|
if (is_input_valid(PROTOCOL, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set protocol field */
|
|
protocol = (t_u16)atoi(args[1]);
|
|
}
|
|
if ((strcmp(args[0], "PairwiseCipher") == 0) ||
|
|
(strcmp(args[0], "GroupCipher") == 0)) {
|
|
printf("ERR:PairwiseCipher and GroupCipher are not supported.\n" " Please configure pairwise cipher using parameters PwkCipherWPA or PwkCipherWPA2\n" " and group cipher using GwkCipher in the config file.\n");
|
|
goto done;
|
|
}
|
|
|
|
if ((protocol == PROTOCOL_NO_SECURITY) ||
|
|
(protocol == PROTOCOL_STATIC_WEP)) {
|
|
if ((strcmp(args[0], "PwkCipherWPA") == 0) ||
|
|
(strcmp(args[0], "PwkCipherWPA2") == 0)
|
|
|| (strcmp(args[0], "GwkCipher") == 0)) {
|
|
printf("ERR:Pairwise cipher and group cipher should not be defined for Open and WEP mode.\n");
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
if (strcmp(args[0], "PwkCipherWPA") == 0) {
|
|
if (arg_num == 1) {
|
|
printf("ERR:PwkCipherWPA is blank!\n");
|
|
goto done;
|
|
} else {
|
|
if (ISDIGIT(args[1]) == 0) {
|
|
printf("ERR:Illegal PwkCipherWPA parameter. Must be either bit '2' or '3'.\n");
|
|
goto done;
|
|
}
|
|
if (atoi(args[1]) & ~CIPHER_BITMAP) {
|
|
printf("ERR:Illegal PwkCipherWPA parameter. Must be either bit '2' or '3'.\n");
|
|
goto done;
|
|
}
|
|
pwkcipher_wpa = atoi(args[1]);
|
|
if (enable_11n &&
|
|
protocol != PROTOCOL_WPA2_MIXED) {
|
|
memset(&htcap, 0, sizeof(htcap));
|
|
if (UAP_SUCCESS ==
|
|
get_sys_cfg_11n(&htcap)) {
|
|
if (htcap.supported_mcs_set[0]
|
|
&& (atoi(args[1]) ==
|
|
CIPHER_TKIP)) {
|
|
printf("ERR: WPA/TKIP cannot be used when AP operates in 802.11n mode.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (strcmp(args[0], "PwkCipherWPA2") == 0) {
|
|
if (arg_num == 1) {
|
|
printf("ERR:PwkCipherWPA2 is blank!\n");
|
|
goto done;
|
|
} else {
|
|
if (ISDIGIT(args[1]) == 0) {
|
|
printf("ERR:Illegal PwkCipherWPA2 parameter. Must be either bit '2' or '3'.\n");
|
|
goto done;
|
|
}
|
|
if (atoi(args[1]) & ~CIPHER_BITMAP) {
|
|
printf("ERR:Illegal PwkCipherWPA2 parameter. Must be either bit '2' or '3'.\n");
|
|
goto done;
|
|
}
|
|
pwkcipher_wpa2 = atoi(args[1]);
|
|
if (enable_11n &&
|
|
protocol != PROTOCOL_WPA2_MIXED) {
|
|
memset(&htcap, 0, sizeof(htcap));
|
|
if (UAP_SUCCESS ==
|
|
get_sys_cfg_11n(&htcap)) {
|
|
if (htcap.supported_mcs_set[0]
|
|
&& (atoi(args[1]) ==
|
|
CIPHER_TKIP)) {
|
|
printf("ERR: WPA/TKIP cannot be used when AP operates in 802.11n mode.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (strcmp(args[0], "GwkCipher") == 0) {
|
|
if (is_input_valid(GWK_CIPHER, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
goto done;
|
|
}
|
|
gwkcipher = atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "GroupRekeyTime") == 0) {
|
|
if (is_input_valid
|
|
(GROUPREKEYTIMER, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Set group rekey time field */
|
|
bss->wpa_cfg.gk_rekey_time = (t_u32)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "MaxStaNum") == 0) {
|
|
if (is_input_valid(MAXSTANUM, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (get_max_sta_num_supported(&max_sta_num_supported) ==
|
|
UAP_FAILURE) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (atoi(args[1]) > max_sta_num_supported) {
|
|
printf("ERR: MAX_STA_NUM must be less than %d\n", max_sta_num_supported);
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Set max STA number field */
|
|
bss->max_sta_count = (t_u16)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "Retrylimit") == 0) {
|
|
if (is_input_valid(RETRYLIMIT, arg_num - 1, args + 1) !=
|
|
UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Set retry limit field */
|
|
bss->retry_limit = (t_u16)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "PreambleType") == 0) {
|
|
if (is_input_valid(PREAMBLETYPE, arg_num - 1, args + 1)
|
|
!= UAP_SUCCESS) {
|
|
retval = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
|
|
/* Set preamble type field */
|
|
bss->preamble_type = (t_u8)atoi(args[1]);
|
|
}
|
|
if (strcmp(args[0], "Enable11n") == 0) {
|
|
if ((ISDIGIT(args[1]) != UAP_SUCCESS) ||
|
|
(atoi(args[1]) < 0) || (atoi(args[1]) > 1)) {
|
|
printf("ERR: Invalid Enable11n value\n");
|
|
goto done;
|
|
}
|
|
enable_11n = atoi(args[1]);
|
|
|
|
memset(&htcap, 0, sizeof(htcap));
|
|
if (UAP_SUCCESS != get_sys_cfg_11n(&htcap)) {
|
|
printf("ERR: Reading current 11n configuration.\n");
|
|
goto done;
|
|
}
|
|
bss->ht_cap_info = htcap.ht_cap_info;
|
|
bss->ampdu_param = htcap.ampdu_param;
|
|
memcpy(bss->supported_mcs_set, htcap.supported_mcs_set,
|
|
16);
|
|
bss->ht_ext_cap = htcap.ht_ext_cap;
|
|
bss->tx_bf_cap = htcap.tx_bf_cap;
|
|
bss->asel = htcap.asel;
|
|
if (enable_11n == 1) {
|
|
/* enable mcs rate */
|
|
bss->supported_mcs_set[0] = DEFAULT_MCS_SET_0;
|
|
bss->supported_mcs_set[4] = DEFAULT_MCS_SET_4;
|
|
if (0 == get_fw_info(&fw)) {
|
|
if ((fw.hw_dev_mcs_support & 0x0f) >= 2)
|
|
bss->supported_mcs_set[1] =
|
|
DEFAULT_MCS_SET_1;
|
|
}
|
|
} else {
|
|
/* disable mcs rate */
|
|
bss->supported_mcs_set[0] = 0;
|
|
bss->supported_mcs_set[4] = 0;
|
|
bss->supported_mcs_set[1] = 0;
|
|
}
|
|
}
|
|
if (strcmp(args[0], "HTCapInfo") == 0) {
|
|
if (enable_11n <= 0) {
|
|
printf("ERR: Enable11n parameter should be set before HTCapInfo.\n");
|
|
goto done;
|
|
}
|
|
if ((IS_HEX_OR_DIGIT(args[1]) == UAP_FAILURE) ||
|
|
((((t_u16)A2HEXDECIMAL(args[1])) &
|
|
(~HT_CAP_CONFIG_MASK)) != HT_CAP_CHECK_MASK)) {
|
|
printf("ERR: Invalid HTCapInfo value\n");
|
|
goto done;
|
|
}
|
|
bss->ht_cap_info =
|
|
DEFAULT_HT_CAP_VALUE & ~HT_CAP_CONFIG_MASK;
|
|
bss->ht_cap_info |=
|
|
(t_u16)A2HEXDECIMAL(args[1]) &
|
|
HT_CAP_CONFIG_MASK;
|
|
bss->ht_cap_info = uap_cpu_to_le16(bss->ht_cap_info);
|
|
}
|
|
if (strcmp(args[0], "AMPDU") == 0) {
|
|
if (enable_11n <= 0) {
|
|
printf("ERR: Enable11n parameter should be set before AMPDU.\n");
|
|
goto done;
|
|
}
|
|
if ((IS_HEX_OR_DIGIT(args[1]) == UAP_FAILURE) ||
|
|
((A2HEXDECIMAL(args[1])) > AMPDU_CONFIG_MASK)) {
|
|
printf("ERR: Invalid AMPDU value\n");
|
|
goto done;
|
|
}
|
|
/* Find HT tlv pointer in buffer and set AMPDU */
|
|
bss->ampdu_param =
|
|
(t_u8)A2HEXDECIMAL(args[1]) & AMPDU_CONFIG_MASK;
|
|
}
|
|
if (strcmp(args[0], "HT_MCS_MAP") == 0) {
|
|
if (enable_11n <= 0) {
|
|
printf("ERR: Enable11n parameter should be set before HT_MCS_MAP.\n");
|
|
goto done;
|
|
}
|
|
if ((IS_HEX_OR_DIGIT(args[1]) == UAP_FAILURE)) {
|
|
printf("ERR: Invalid HT_MCS_MAP value\n");
|
|
goto done;
|
|
}
|
|
if (0 == get_fw_info(&fw)) {
|
|
/* Check upper nibble of MCS support value
|
|
* and block MCS_SET_1 when 2X2 is not supported
|
|
* by the underlying hardware */
|
|
if (((fw.hw_dev_mcs_support & 0xf0) <
|
|
STREAM_2X2_MASK) &&
|
|
(A2HEXDECIMAL(args[1]) & MCS_SET_1_MASK)) {
|
|
printf("ERR: Invalid HT_MCS_MAP\n");
|
|
goto done;
|
|
}
|
|
}
|
|
supported_mcs_set = (t_u32)A2HEXDECIMAL(args[1]);
|
|
supported_mcs_set = uap_cpu_to_le32(supported_mcs_set);
|
|
memcpy(bss->supported_mcs_set, &supported_mcs_set,
|
|
sizeof(t_u32));
|
|
}
|
|
if (strcmp(args[0], "Enable2040Coex") == 0) {
|
|
if ((ISDIGIT(args[1]) == 0) || (atoi(args[1]) < 0) ||
|
|
(atoi(args[1]) > 1)) {
|
|
printf("ERR:Invalid Enable2040Coex value.\n");
|
|
goto done;
|
|
}
|
|
bss->enable_2040coex = (t_u8)atoi(args[1]);
|
|
}
|
|
}
|
|
done:
|
|
fclose(config_file);
|
|
if (line)
|
|
free(line);
|
|
return retval;
|
|
}
|
|
|
|
/**
|
|
* @brief Show all the BSS configuration in the buffer
|
|
*
|
|
* @param buf Pointer to BSS configuration buffer
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_bss_config(bss_config_t *buf)
|
|
{
|
|
int i = 0;
|
|
int flag = 0;
|
|
|
|
if (!buf) {
|
|
printf("ERR:Empty BSS config!\n");
|
|
return;
|
|
}
|
|
|
|
/* Print AP MAC address */
|
|
printf("AP MAC address = ");
|
|
print_mac(buf->mac_addr);
|
|
printf("\n");
|
|
|
|
/* Print SSID */
|
|
if (buf->ssid.ssid_len) {
|
|
printf("SSID = %s\n", buf->ssid.ssid);
|
|
}
|
|
|
|
/* Print broadcast SSID control */
|
|
printf("SSID broadcast = %s\n",
|
|
(buf->bcast_ssid_ctl == 1) ? "enabled" : "disabled");
|
|
|
|
/* Print DTIM period */
|
|
printf("DTIM period = %d\n", buf->dtim_period);
|
|
|
|
/* Print beacon period */
|
|
printf("Beacon period = %d\n", buf->beacon_period);
|
|
|
|
/* Print rates */
|
|
printf("Basic Rates =");
|
|
for (i = 0; i < MAX_DATA_RATES; i++) {
|
|
if (!buf->rates[i])
|
|
break;
|
|
if (buf->rates[i] > (BASIC_RATE_SET_BIT - 1)) {
|
|
flag = flag ? : 1;
|
|
printf(" 0x%x", buf->rates[i]);
|
|
}
|
|
}
|
|
printf("%s\nNon-Basic Rates =", flag ? "" : " ( none ) ");
|
|
for (flag = 0, i = 0; i < MAX_DATA_RATES; i++) {
|
|
if (!buf->rates[i])
|
|
break;
|
|
if (buf->rates[i] < BASIC_RATE_SET_BIT) {
|
|
flag = flag ? : 1;
|
|
printf(" 0x%x", buf->rates[i]);
|
|
}
|
|
}
|
|
printf("%s\n", flag ? "" : " ( none ) ");
|
|
|
|
/* Print Tx data rate */
|
|
printf("Tx data rate = ");
|
|
if (buf->tx_data_rate == 0)
|
|
printf("auto\n");
|
|
else
|
|
printf("0x%x\n", buf->tx_data_rate);
|
|
|
|
/* Print MCBC data rate */
|
|
printf("MCBC data rate = ");
|
|
if (buf->mcbc_data_rate == 0)
|
|
printf("auto\n");
|
|
else
|
|
printf("0x%x\n", buf->mcbc_data_rate);
|
|
|
|
/* Print Tx power level */
|
|
printf("Tx power = %d dBm\n", buf->tx_power_level);
|
|
|
|
/* Print Tx antenna */
|
|
printf("Tx antenna = %s\n", (buf->tx_antenna) ? "B" : "A");
|
|
|
|
/* Print Rx antenna */
|
|
printf("Rx antenna = %s\n", (buf->rx_antenna) ? "B" : "A");
|
|
|
|
/* Print packet forward control */
|
|
printf("%s handles packet forwarding -\n",
|
|
((buf->pkt_forward_ctl & PKT_FWD_FW_BIT) ==
|
|
0) ? "Host" : "Firmware");
|
|
printf("\tIntra-BSS broadcast packets are %s\n",
|
|
((buf->pkt_forward_ctl & PKT_FWD_INTRA_BCAST) ==
|
|
0) ? "allowed" : "denied");
|
|
printf("\tIntra-BSS unicast packets are %s\n",
|
|
((buf->pkt_forward_ctl & PKT_FWD_INTRA_UCAST) ==
|
|
0) ? "allowed" : "denied");
|
|
printf("\tInter-BSS unicast packets are %s\n",
|
|
((buf->pkt_forward_ctl & PKT_FWD_INTER_UCAST) ==
|
|
0) ? "allowed" : "denied");
|
|
|
|
/* Print maximum STA count */
|
|
printf("Max Station Number configured = %d\n", buf->max_sta_count);
|
|
|
|
/* Print mgmt frame FWD control */
|
|
printf("MGMT frame Fwd Control = 0x%x\n", buf->mgmt_ie_passthru_mask);
|
|
|
|
/* Print MAC filter */
|
|
if (buf->filter.filter_mode == 0) {
|
|
printf("Filter Mode = Filter table is disabled\n");
|
|
} else {
|
|
if (buf->filter.filter_mode == 1) {
|
|
printf("Filter Mode = Allow MAC addresses specified in the allowed list\n");
|
|
} else if (buf->filter.filter_mode == 2) {
|
|
printf("Filter Mode = Block MAC addresses specified in the banned list\n");
|
|
} else {
|
|
printf("Filter Mode = Unknown\n");
|
|
}
|
|
for (i = 0; i < buf->filter.mac_count; i++) {
|
|
printf("MAC_%d = ", i);
|
|
print_mac(buf->filter.mac_list[i]);
|
|
printf("\n");
|
|
}
|
|
}
|
|
|
|
/* Print STA ageout timer */
|
|
printf("STA ageout timer = %d\n", buf->sta_ageout_timer);
|
|
|
|
/* Print PS STA ageout timer */
|
|
printf("PS STA ageout timer = %d\n", buf->ps_sta_ageout_timer);
|
|
|
|
/* Print RTS threshold */
|
|
printf("RTS threshold = %d\n", buf->rts_threshold);
|
|
|
|
/* Print Fragmentation threshold */
|
|
printf("Fragmentation threshold = %d\n", buf->frag_threshold);
|
|
|
|
/* Print retry limit */
|
|
printf("Retry Limit = %d\n", buf->retry_limit);
|
|
|
|
/* Print preamble type */
|
|
printf("Preamble type = %s\n", (buf->preamble_type == 0) ?
|
|
"auto" : ((buf->preamble_type == 1) ? "short" : "long"));
|
|
|
|
/* Print channel */
|
|
printf("Channel = %d\n", buf->channel);
|
|
printf("Band = %s\n",
|
|
(buf->bandcfg.chanBand == BAND_5GHZ) ? "5GHz" : "2.4GHz");
|
|
printf("Channel Select Mode = %s\n",
|
|
(buf->bandcfg.scanMode == SCAN_MODE_ACS) ? "ACS" : "Manual");
|
|
if (buf->bandcfg.chan2Offset == SEC_CHAN_NONE)
|
|
printf("no secondary channel\n");
|
|
else if (buf->bandcfg.chan2Offset == SEC_CHAN_ABOVE)
|
|
printf("secondary channel is above primary channel\n");
|
|
else if (buf->bandcfg.chan2Offset == SEC_CHAN_BELOW)
|
|
printf("secondary channel is below primary channel\n");
|
|
|
|
/* Print channel list */
|
|
printf("Channels List = ");
|
|
for (i = 0; (unsigned int)i < buf->num_of_chan; i++) {
|
|
printf("\n%d\t%sGHz", buf->chan_list[i].chan_number,
|
|
(buf->chan_list[i].bandcfg.chanBand ==
|
|
BAND_5GHZ) ? "5" : "2.4");
|
|
}
|
|
printf("\n");
|
|
|
|
/* Print auth mode */
|
|
switch (buf->auth_mode) {
|
|
case 0:
|
|
printf("AUTHMODE = Open authentication\n");
|
|
break;
|
|
case 1:
|
|
printf("AUTHMODE = Shared key authentication\n");
|
|
break;
|
|
case 3:
|
|
printf("AUTHMODE = WPA3 SAE\n");
|
|
break;
|
|
case 255:
|
|
printf("AUTHMODE = Auto (open and shared key)\n");
|
|
break;
|
|
default:
|
|
printf("ERR: Invalid authmode=%d\n", buf->auth_mode);
|
|
break;
|
|
}
|
|
|
|
/* Print protocol */
|
|
switch (buf->protocol) {
|
|
case 0:
|
|
case PROTOCOL_NO_SECURITY:
|
|
printf("PROTOCOL = No security\n");
|
|
break;
|
|
case PROTOCOL_STATIC_WEP:
|
|
printf("PROTOCOL = Static WEP\n");
|
|
break;
|
|
case PROTOCOL_WPA:
|
|
printf("PROTOCOL = WPA \n");
|
|
break;
|
|
case PROTOCOL_WPA2:
|
|
printf("PROTOCOL = WPA2 \n");
|
|
break;
|
|
case PROTOCOL_WPA | PROTOCOL_WPA2:
|
|
printf("PROTOCOL = WPA/WPA2 \n");
|
|
break;
|
|
case PROTOCOL_WPA3_SAE:
|
|
printf("PROTOCOL = WPA3 SAE \n");
|
|
break;
|
|
default:
|
|
printf("Unknown PROTOCOL: 0x%x \n", buf->protocol);
|
|
break;
|
|
}
|
|
|
|
/* Print key management */
|
|
if (buf->key_mgmt == KEY_MGMT_PSK)
|
|
printf("KeyMgmt = PSK\n");
|
|
else
|
|
printf("KeyMgmt = NONE\n");
|
|
|
|
/* Print WEP configurations */
|
|
if (buf->wep_cfg.key0.length) {
|
|
printf("WEP KEY_0 = ");
|
|
for (i = 0; i < buf->wep_cfg.key0.length; i++) {
|
|
printf("%02x ", buf->wep_cfg.key0.key[i]);
|
|
}
|
|
(buf->wep_cfg.key0.
|
|
is_default) ? (printf("<Default>\n")) : (printf("\n"));
|
|
} else {
|
|
printf("WEP KEY_0 = NONE\n");
|
|
}
|
|
if (buf->wep_cfg.key1.length) {
|
|
printf("WEP KEY_1 = ");
|
|
for (i = 0; i < buf->wep_cfg.key1.length; i++) {
|
|
printf("%02x ", buf->wep_cfg.key1.key[i]);
|
|
}
|
|
(buf->wep_cfg.key1.
|
|
is_default) ? (printf("<Default>\n")) : (printf("\n"));
|
|
} else {
|
|
printf("WEP KEY_1 = NONE\n");
|
|
}
|
|
if (buf->wep_cfg.key2.length) {
|
|
printf("WEP KEY_2 = ");
|
|
for (i = 0; i < buf->wep_cfg.key2.length; i++) {
|
|
printf("%02x ", buf->wep_cfg.key2.key[i]);
|
|
}
|
|
(buf->wep_cfg.key2.
|
|
is_default) ? (printf("<Default>\n")) : (printf("\n"));
|
|
} else {
|
|
printf("WEP KEY_2 = NONE\n");
|
|
}
|
|
if (buf->wep_cfg.key3.length) {
|
|
printf("WEP KEY_3 = ");
|
|
for (i = 0; i < buf->wep_cfg.key3.length; i++) {
|
|
printf("%02x ", buf->wep_cfg.key3.key[i]);
|
|
}
|
|
(buf->wep_cfg.key3.
|
|
is_default) ? (printf("<Default>\n")) : (printf("\n"));
|
|
} else {
|
|
printf("WEP KEY_3 = NONE\n");
|
|
}
|
|
|
|
/* Print WPA configurations */
|
|
if (buf->protocol & PROTOCOL_WPA) {
|
|
switch (buf->wpa_cfg.pairwise_cipher_wpa) {
|
|
case CIPHER_TKIP:
|
|
printf("PwkCipherWPA = TKIP\n");
|
|
break;
|
|
case CIPHER_AES_CCMP:
|
|
printf("PwkCipherWPA = AES CCMP\n");
|
|
break;
|
|
case CIPHER_TKIP | CIPHER_AES_CCMP:
|
|
printf("PwkCipherWPA = TKIP + AES CCMP\n");
|
|
break;
|
|
case CIPHER_NONE:
|
|
printf("PwkCipherWPA = None\n");
|
|
break;
|
|
default:
|
|
printf("Unknown PwkCipherWPA 0x%x\n",
|
|
buf->wpa_cfg.pairwise_cipher_wpa);
|
|
break;
|
|
}
|
|
}
|
|
if (buf->protocol & (PROTOCOL_WPA2 | PROTOCOL_WPA3_SAE)) {
|
|
switch (buf->wpa_cfg.pairwise_cipher_wpa2) {
|
|
case CIPHER_TKIP:
|
|
printf("PwkCipherWPA2 = TKIP\n");
|
|
break;
|
|
case CIPHER_AES_CCMP:
|
|
printf("PwkCipherWPA2 = AES CCMP\n");
|
|
break;
|
|
case CIPHER_TKIP | CIPHER_AES_CCMP:
|
|
printf("PwkCipherWPA2 = TKIP + AES CCMP\n");
|
|
break;
|
|
case CIPHER_NONE:
|
|
printf("PwkCipherWPA2 = None\n");
|
|
break;
|
|
default:
|
|
printf("Unknown PwkCipherWPA2 0x%x\n",
|
|
buf->wpa_cfg.pairwise_cipher_wpa2);
|
|
break;
|
|
}
|
|
}
|
|
switch (buf->wpa_cfg.group_cipher) {
|
|
case CIPHER_TKIP:
|
|
printf("GroupCipher = TKIP\n");
|
|
break;
|
|
case CIPHER_AES_CCMP:
|
|
printf("GroupCipher = AES CCMP\n");
|
|
break;
|
|
case CIPHER_NONE:
|
|
printf("GroupCipher = None\n");
|
|
break;
|
|
default:
|
|
printf("Unknown Group cipher 0x%x\n",
|
|
buf->wpa_cfg.group_cipher);
|
|
break;
|
|
}
|
|
printf("RSN replay protection = %s\n",
|
|
(buf->wpa_cfg.rsn_protection) ? "enabled" : "disabled");
|
|
printf("Pairwise Handshake timeout = %d\n",
|
|
buf->pairwise_update_timeout);
|
|
printf("Pairwise Handshake Retries = %d\n", buf->pwk_retries);
|
|
printf("Groupwise Handshake timeout = %d\n",
|
|
buf->groupwise_update_timeout);
|
|
printf("Groupwise Handshake Retries = %d\n", buf->gwk_retries);
|
|
if (buf->wpa_cfg.length > 0) {
|
|
printf("WPA passphrase = ");
|
|
for (i = 0; (unsigned int)i < buf->wpa_cfg.length; i++)
|
|
printf("%c", buf->wpa_cfg.passphrase[i]);
|
|
printf("\n");
|
|
} else {
|
|
printf("WPA passphrase = None\n");
|
|
}
|
|
if (buf->wpa_cfg.gk_rekey_time == 0)
|
|
printf("Group re-key time = disabled\n");
|
|
else
|
|
printf("Group re-key time = %d second\n",
|
|
buf->wpa_cfg.gk_rekey_time);
|
|
printf("20/40 coex = %s\n",
|
|
(buf->enable_2040coex) ? "enabled" : "disabled");
|
|
printf("wmm parameters:\n");
|
|
printf("\tqos_info = 0x%x\n", buf->wmm_para.qos_info);
|
|
printf("\tBE: AIFSN=%d, CW_MAX=%d CW_MIN=%d, TXOP=%d\n",
|
|
buf->wmm_para.ac_params[AC_BE].aci_aifsn.aifsn,
|
|
buf->wmm_para.ac_params[AC_BE].ecw.ecw_max,
|
|
buf->wmm_para.ac_params[AC_BE].ecw.ecw_min,
|
|
buf->wmm_para.ac_params[AC_BE].tx_op_limit);
|
|
printf("\tBK: AIFSN=%d, CW_MAX=%d CW_MIN=%d, TXOP=%d\n",
|
|
buf->wmm_para.ac_params[AC_BK].aci_aifsn.aifsn,
|
|
buf->wmm_para.ac_params[AC_BK].ecw.ecw_max,
|
|
buf->wmm_para.ac_params[AC_BK].ecw.ecw_min,
|
|
buf->wmm_para.ac_params[AC_BK].tx_op_limit);
|
|
printf("\tVI: AIFSN=%d, CW_MAX=%d CW_MIN=%d, TXOP=%d\n",
|
|
buf->wmm_para.ac_params[AC_VI].aci_aifsn.aifsn,
|
|
buf->wmm_para.ac_params[AC_VI].ecw.ecw_max,
|
|
buf->wmm_para.ac_params[AC_VI].ecw.ecw_min,
|
|
buf->wmm_para.ac_params[AC_VI].tx_op_limit);
|
|
printf("\tVO: AIFSN=%d, CW_MAX=%d CW_MIN=%d, TXOP=%d\n",
|
|
buf->wmm_para.ac_params[AC_VO].aci_aifsn.aifsn,
|
|
buf->wmm_para.ac_params[AC_VO].ecw.ecw_max,
|
|
buf->wmm_para.ac_params[AC_VO].ecw.ecw_min,
|
|
buf->wmm_para.ac_params[AC_VO].tx_op_limit);
|
|
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Send command to Read the BSS profile
|
|
*
|
|
* @param buf Pointer to bss command buffer for get
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
static int
|
|
get_bss_config(t_u8 *buf)
|
|
{
|
|
apcmdbuf_bss_configure *cmd_buf = NULL;
|
|
t_s32 sockfd;
|
|
struct ifreq ifr;
|
|
|
|
cmd_buf = (apcmdbuf_bss_configure *)buf;
|
|
cmd_buf->action = ACTION_GET;
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
#if DEBUG
|
|
/* Dump request buffer */
|
|
hexdump("Get Request buffer", (void *)buf,
|
|
sizeof(apcmdbuf_bss_configure)
|
|
+ sizeof(bss_config_t), ' ');
|
|
#endif
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)cmd_buf;
|
|
if (ioctl(sockfd, UAP_BSS_CONFIG, &ifr)) {
|
|
printf("ERR:UAP_BSS_CONFIG is not supported by %s\n", dev_name);
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
#if DEBUG
|
|
/* Dump request buffer */
|
|
hexdump("Get Response buffer", (void *)buf,
|
|
sizeof(apcmdbuf_bss_configure)
|
|
+ sizeof(bss_config_t), ' ');
|
|
#endif
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a bss_config request and sends to the driver
|
|
*
|
|
* Usage: "Usage : bss_config [CONFIG_FILE]"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_bss_config(int argc, char *argv[])
|
|
{
|
|
apcmdbuf_bss_configure *cmd_buf = NULL;
|
|
bss_config_t *bss = NULL;
|
|
t_u8 *buf = NULL;
|
|
t_u16 cmd_len;
|
|
t_u16 buf_len;
|
|
int ret = UAP_SUCCESS;
|
|
int opt;
|
|
t_s32 sockfd;
|
|
struct ifreq ifr;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_bss_config_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc > 1) {
|
|
printf("ERR:Too many arguments.\n");
|
|
print_bss_config_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Query BSS settings */
|
|
|
|
/* Alloc buf for command */
|
|
buf_len = sizeof(apcmdbuf_bss_configure) + sizeof(bss_config_t);
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset((char *)buf, 0, buf_len);
|
|
|
|
/* Locate headers */
|
|
cmd_len = sizeof(apcmdbuf_bss_configure);
|
|
cmd_buf = (apcmdbuf_bss_configure *)buf;
|
|
bss = (bss_config_t *)(buf + cmd_len);
|
|
|
|
/* Get all parametes first */
|
|
if (get_bss_config(buf) == UAP_FAILURE) {
|
|
printf("ERR:Reading current parameters\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (argc == 1) {
|
|
/* Parse config file and populate structure */
|
|
ret = parse_bss_config(argc, argv, bss);
|
|
if (ret == UAP_FAILURE) {
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
cmd_len += sizeof(bss_config_t);
|
|
cmd_buf->action = ACTION_SET;
|
|
|
|
/* Send the command */
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)cmd_buf;
|
|
#if DEBUG
|
|
/* Dump request buffer */
|
|
hexdump("Request buffer", (void *)buf, buf_len, ' ');
|
|
#endif
|
|
if (ioctl(sockfd, UAP_BSS_CONFIG, &ifr)) {
|
|
perror("");
|
|
printf("ERR:UAP_BSS_CONFIG is not supported by %s\n",
|
|
dev_name);
|
|
close(sockfd);
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
#if DEBUG
|
|
/* Dump respond buffer */
|
|
hexdump("Respond buffer", (void *)buf, buf_len, ' ');
|
|
#endif
|
|
close(sockfd);
|
|
} else {
|
|
/* Print response */
|
|
printf("BSS settings:\n");
|
|
print_bss_config(bss);
|
|
}
|
|
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Read the profile and sends to the driver
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_coex_config_profile(int argc, char *argv[])
|
|
{
|
|
FILE *config_file = NULL;
|
|
char *line = NULL;
|
|
int i, index, li = 0;
|
|
int ret = UAP_SUCCESS;
|
|
char *pos = NULL;
|
|
int arg_num = 0;
|
|
char *args[30];
|
|
int is_coex_config = 0;
|
|
int is_coex_common_config = 0;
|
|
int is_coex_sco_config = 0;
|
|
int is_coex_acl_config = 0;
|
|
t_u8 *buf = NULL;
|
|
apcmdbuf_coex_config *cmd_buf = NULL;
|
|
tlvbuf_coex_common_cfg *coex_common_tlv;
|
|
tlvbuf_coex_sco_cfg *coex_sco_tlv;
|
|
tlvbuf_coex_acl_cfg *coex_acl_tlv;
|
|
t_u16 acl_enabled = 0;
|
|
t_u32 conf_bitmap = 0;
|
|
t_u32 ap_coex_enable = 0;
|
|
t_u16 cmd_len = 0, tlv_len = 0;
|
|
t_u16 sco_prot_qtime[4] = { 0, 0, 0, 0 }, sco_prot_rate =
|
|
0, sco_acl_freq = 0;
|
|
t_u16 acl_bt_time = 0, acl_wlan_time = 0, acl_prot_rate = 0;
|
|
|
|
/* Check if file exists */
|
|
config_file = fopen(argv[0], "r");
|
|
if (config_file == NULL) {
|
|
printf("\nERR:Config file can not open.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
line = (char *)malloc(MAX_CONFIG_LINE);
|
|
if (!line) {
|
|
printf("ERR:Cannot allocate memory for line\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
bzero(line, MAX_CONFIG_LINE);
|
|
|
|
/* fixed command length */
|
|
cmd_len = sizeof(apcmdbuf_coex_config) + sizeof(tlvbuf_coex_common_cfg)
|
|
+ sizeof(tlvbuf_coex_sco_cfg) + sizeof(tlvbuf_coex_acl_cfg);
|
|
/* alloc buf for command */
|
|
buf = (t_u8 *)malloc(cmd_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
bzero((char *)buf, cmd_len);
|
|
|
|
cmd_buf = (apcmdbuf_coex_config *)buf;
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->cmd_code = HostCmd_ROBUST_COEX;
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->action = uap_cpu_to_le16(ACTION_SET);
|
|
|
|
/* Parse file and process */
|
|
while (config_get_line(line, MAX_CONFIG_LINE, config_file, &li, &pos)) {
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG, "DBG:Received config line (%d) = %s\n",
|
|
li, line);
|
|
#endif
|
|
arg_num = parse_line(line, args);
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG, "DBG:Number of arguments = %d\n",
|
|
arg_num);
|
|
for (i = 0; i < arg_num; i++) {
|
|
uap_printf(MSG_DEBUG, "\tDBG:Argument %d. %s\n", i + 1,
|
|
args[i]);
|
|
}
|
|
#endif
|
|
/* Check for end of Coex configurations */
|
|
if (is_coex_acl_config == 1) {
|
|
if (strcmp(args[0], "}") == 0) {
|
|
coex_acl_tlv =
|
|
(tlvbuf_coex_acl_cfg *)(cmd_buf->
|
|
tlv_buffer +
|
|
tlv_len);
|
|
coex_acl_tlv->tag = MRVL_BT_COEX_ACL_CFG_TLV_ID;
|
|
coex_acl_tlv->length =
|
|
sizeof(tlvbuf_coex_acl_cfg) -
|
|
sizeof(tlvbuf_header);
|
|
endian_convert_tlv_header_out(coex_acl_tlv);
|
|
coex_acl_tlv->enabled =
|
|
uap_cpu_to_le16(acl_enabled);
|
|
coex_acl_tlv->bt_time =
|
|
uap_cpu_to_le16(acl_bt_time);
|
|
coex_acl_tlv->wlan_time =
|
|
uap_cpu_to_le16(acl_wlan_time);
|
|
coex_acl_tlv->protection_rate =
|
|
uap_cpu_to_le16(acl_prot_rate);
|
|
tlv_len += sizeof(tlvbuf_coex_acl_cfg);
|
|
is_coex_acl_config = 0;
|
|
}
|
|
} else if (is_coex_sco_config == 1) {
|
|
if (strcmp(args[0], "}") == 0) {
|
|
coex_sco_tlv =
|
|
(tlvbuf_coex_sco_cfg *)(cmd_buf->
|
|
tlv_buffer +
|
|
tlv_len);
|
|
coex_sco_tlv->tag = MRVL_BT_COEX_SCO_CFG_TLV_ID;
|
|
coex_sco_tlv->length =
|
|
sizeof(tlvbuf_coex_sco_cfg) -
|
|
sizeof(tlvbuf_header);
|
|
endian_convert_tlv_header_out(coex_sco_tlv);
|
|
for (i = 0; i < 4; i++)
|
|
coex_sco_tlv->protection_qtime[i] =
|
|
uap_cpu_to_le16(sco_prot_qtime
|
|
[i]);
|
|
coex_sco_tlv->protection_rate =
|
|
uap_cpu_to_le16(sco_prot_rate);
|
|
coex_sco_tlv->acl_frequency =
|
|
uap_cpu_to_le16(sco_acl_freq);
|
|
tlv_len += sizeof(tlvbuf_coex_sco_cfg);
|
|
is_coex_sco_config = 0;
|
|
}
|
|
} else if (is_coex_common_config == 1) {
|
|
if (strcmp(args[0], "}") == 0) {
|
|
coex_common_tlv =
|
|
(tlvbuf_coex_common_cfg *)(cmd_buf->
|
|
tlv_buffer +
|
|
tlv_len);
|
|
coex_common_tlv->tag =
|
|
MRVL_BT_COEX_COMMON_CFG_TLV_ID;
|
|
coex_common_tlv->length =
|
|
sizeof(tlvbuf_coex_common_cfg) -
|
|
sizeof(tlvbuf_header);
|
|
endian_convert_tlv_header_out(coex_common_tlv);
|
|
coex_common_tlv->config_bitmap =
|
|
uap_cpu_to_le32(conf_bitmap);
|
|
coex_common_tlv->ap_bt_coex =
|
|
uap_cpu_to_le32(ap_coex_enable);
|
|
tlv_len += sizeof(tlvbuf_coex_common_cfg);
|
|
is_coex_common_config = 0;
|
|
}
|
|
} else if (is_coex_config == 1) {
|
|
if (strcmp(args[0], "}") == 0)
|
|
is_coex_config = 0;
|
|
}
|
|
if (strcmp(args[0], "coex_config") == 0) {
|
|
is_coex_config = 1;
|
|
} else if (strcmp(args[0], "common_config") == 0) {
|
|
is_coex_common_config = 1;
|
|
} else if (strcmp(args[0], "sco_config") == 0) {
|
|
is_coex_sco_config = 1;
|
|
} else if (strcmp(args[0], "acl_config") == 0) {
|
|
is_coex_acl_config = 1;
|
|
}
|
|
if ((strcmp(args[0], "bitmap") == 0) && is_coex_common_config) {
|
|
if (is_input_valid
|
|
(COEX_COMM_BITMAP, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
conf_bitmap = (t_u32)A2HEXDECIMAL(args[1]);
|
|
} else if ((strcmp(args[0], "APBTCoex") == 0) &&
|
|
is_coex_common_config) {
|
|
if (is_input_valid
|
|
(COEX_COMM_AP_COEX, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
ap_coex_enable = (t_u32)A2HEXDECIMAL(args[1]);
|
|
} else if ((strncmp(args[0], "protectionFromQTime", 19) == 0) &&
|
|
is_coex_sco_config) {
|
|
index = atoi(args[0] + strlen("protectionFromQTime"));
|
|
if (index < 0 || index > 3) {
|
|
printf("ERR:Incorrect index %d.\n", index);
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
if (is_input_valid(COEX_PROTECTION, arg_num, args) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
sco_prot_qtime[index] = (t_u16)atoi(args[1]);
|
|
} else if ((strcmp(args[0], "scoProtectionFromRate") == 0) &&
|
|
is_coex_sco_config) {
|
|
if (is_input_valid(COEX_PROTECTION, arg_num, args) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
sco_prot_rate = (t_u16)atoi(args[1]);
|
|
} else if ((strcmp(args[0], "aclFrequency") == 0) &&
|
|
is_coex_sco_config) {
|
|
if (is_input_valid
|
|
(COEX_SCO_ACL_FREQ, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
sco_acl_freq = (t_u16)atoi(args[1]);
|
|
} else if ((strcmp(args[0], "enabled") == 0) &&
|
|
is_coex_acl_config) {
|
|
if (is_input_valid
|
|
(COEX_ACL_ENABLED, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
acl_enabled = (t_u16)atoi(args[1]);
|
|
} else if ((strcmp(args[0], "btTime") == 0) &&
|
|
is_coex_acl_config) {
|
|
if (is_input_valid
|
|
(COEX_ACL_BT_TIME, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
acl_bt_time = (t_u16)atoi(args[1]);
|
|
} else if ((strcmp(args[0], "wlanTime") == 0) &&
|
|
is_coex_acl_config) {
|
|
if (is_input_valid
|
|
(COEX_ACL_WLAN_TIME, arg_num - 1,
|
|
args + 1) != UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
acl_wlan_time = (t_u16)atoi(args[1]);
|
|
} else if ((strcmp(args[0], "aclProtectionFromRate") == 0) &&
|
|
is_coex_acl_config) {
|
|
if (is_input_valid(COEX_PROTECTION, arg_num, args) !=
|
|
UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
acl_prot_rate = (t_u16)atoi(args[1]);
|
|
}
|
|
}
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, cmd_len);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
/* Verify response */
|
|
if (cmd_buf->cmd_code !=
|
|
(HostCmd_ROBUST_COEX | APCMD_RESP_CHECK)) {
|
|
printf("ERR:Corrupted response!\n");
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
/* Print response */
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
printf("BT Coex settings sucessfully set.\n");
|
|
} else {
|
|
printf("ERR:Could not set coex configuration.\n");
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
done:
|
|
fclose(config_file);
|
|
if (buf)
|
|
free(buf);
|
|
if (line)
|
|
free(line);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the coex_config command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_coex_config_usage(void)
|
|
{
|
|
printf("\nUsage : coex_config [CONFIG_FILE]\n");
|
|
printf("\nIf CONFIG_FILE is provided, a 'set' is performed, else a 'get' is performed.\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a coex_config request and sends to the driver
|
|
*
|
|
* Usage: "Usage : coex_config [CONFIG_FILE]"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_coex_config(int argc, char *argv[])
|
|
{
|
|
apcmdbuf_coex_config *cmd_buf = NULL;
|
|
tlvbuf_coex_common_cfg *coex_common_tlv;
|
|
tlvbuf_coex_sco_cfg *coex_sco_tlv;
|
|
tlvbuf_coex_acl_cfg *coex_acl_tlv;
|
|
tlvbuf_coex_stats *coex_stats_tlv;
|
|
t_u8 *buf = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int ret = UAP_SUCCESS;
|
|
int opt;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_coex_config_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc > 1) {
|
|
printf("ERR:Too many arguments.\n");
|
|
print_coex_config_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc == 1) {
|
|
/* Read profile and send command to firmware */
|
|
ret = apcmd_coex_config_profile(argc, argv);
|
|
return ret;
|
|
}
|
|
|
|
/* fixed command length */
|
|
cmd_len = sizeof(apcmdbuf_coex_config) + sizeof(tlvbuf_coex_common_cfg)
|
|
+ sizeof(tlvbuf_coex_sco_cfg) + sizeof(tlvbuf_coex_acl_cfg)
|
|
+ sizeof(tlvbuf_coex_stats);
|
|
/* alloc buf for command */
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
bzero((char *)buf, buf_len);
|
|
|
|
cmd_buf = (apcmdbuf_coex_config *)buf;
|
|
|
|
coex_common_tlv = (tlvbuf_coex_common_cfg *)cmd_buf->tlv_buffer;
|
|
coex_common_tlv->tag = MRVL_BT_COEX_COMMON_CFG_TLV_ID;
|
|
coex_common_tlv->length =
|
|
sizeof(tlvbuf_coex_common_cfg) - sizeof(tlvbuf_header);
|
|
endian_convert_tlv_header_out(coex_common_tlv);
|
|
|
|
coex_sco_tlv = (tlvbuf_coex_sco_cfg *)(cmd_buf->tlv_buffer +
|
|
sizeof(tlvbuf_coex_common_cfg));
|
|
coex_sco_tlv->tag = MRVL_BT_COEX_SCO_CFG_TLV_ID;
|
|
coex_sco_tlv->length =
|
|
sizeof(tlvbuf_coex_sco_cfg) - sizeof(tlvbuf_header);
|
|
endian_convert_tlv_header_out(coex_sco_tlv);
|
|
|
|
coex_acl_tlv = (tlvbuf_coex_acl_cfg *)(cmd_buf->tlv_buffer +
|
|
sizeof(tlvbuf_coex_common_cfg) +
|
|
sizeof(tlvbuf_coex_sco_cfg));
|
|
coex_acl_tlv->tag = MRVL_BT_COEX_ACL_CFG_TLV_ID;
|
|
coex_acl_tlv->length =
|
|
sizeof(tlvbuf_coex_acl_cfg) - sizeof(tlvbuf_header);
|
|
endian_convert_tlv_header_out(coex_acl_tlv);
|
|
|
|
coex_stats_tlv = (tlvbuf_coex_stats *)(cmd_buf->tlv_buffer +
|
|
sizeof(tlvbuf_coex_common_cfg) +
|
|
sizeof(tlvbuf_coex_sco_cfg)
|
|
+ sizeof(tlvbuf_coex_acl_cfg));
|
|
coex_stats_tlv->tag = MRVL_BT_COEX_STATS_TLV_ID;
|
|
coex_stats_tlv->length =
|
|
sizeof(tlvbuf_coex_stats) - sizeof(tlvbuf_header);
|
|
endian_convert_tlv_header_out(coex_stats_tlv);
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->cmd_code = HostCmd_ROBUST_COEX;
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->action = uap_cpu_to_le16(ACTION_GET);
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
/* Verify response */
|
|
if (cmd_buf->cmd_code !=
|
|
(HostCmd_ROBUST_COEX | APCMD_RESP_CHECK)) {
|
|
printf("ERR:Corrupted response!\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Print response */
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
printf("BT Coex settings:\n");
|
|
print_tlv(buf + sizeof(apcmdbuf_coex_config),
|
|
cmd_buf->size - sizeof(apcmdbuf_coex_config) +
|
|
BUF_HEADER_SIZE);
|
|
} else {
|
|
printf("ERR:Could not retrieve coex configuration.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the mic_err command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_mic_err_usage(void)
|
|
{
|
|
printf("\nUsage : mic_err <STA_MAC_ADDRESS>\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief report station mic error to the driver
|
|
*
|
|
* Usage: "mic_err <STA_MAC_ADDRESS>"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_mic_err(int argc, char *argv[])
|
|
{
|
|
int ret = UAP_SUCCESS;
|
|
int opt;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u8 mac_addr[ETH_ALEN];
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_mic_err_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc != 1) {
|
|
printf("ERR:wrong arguments! Must provide STA_MAC_ADDRESS.\n");
|
|
print_mic_err_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(mac_addr, 0, ETH_ALEN);
|
|
|
|
if ((ret = mac2raw(argv[0], mac_addr)) != UAP_SUCCESS) {
|
|
printf("ERR: %s Address\n", ret == UAP_FAILURE ? "Invalid MAC" :
|
|
ret ==
|
|
UAP_RET_MAC_BROADCAST ? "Broadcast" : "Multicast");
|
|
return UAP_FAILURE;
|
|
}
|
|
#if DEBUG
|
|
/* Dump mac address */
|
|
hexdump("report mic error", (void *)mac_addr, ETH_ALEN, ' ');
|
|
#endif
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)mac_addr;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_REPORT_MIC_ERR, &ifr)) {
|
|
perror("");
|
|
printf("ERR:UAP_REPORT_MIC_ERR is not supported by %s\n",
|
|
dev_name);
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
printf("MIC error reporting successful!\n");
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the sta_deauth_ext command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_set_key_usage(void)
|
|
{
|
|
printf("\nUsage : key_material <MAC_ADDRESS> <KEY> [KEY_ID]\n");
|
|
printf("\n MAC_ADDRESS: station mac address or ff:ff:ff:ff:ff:ff");
|
|
printf("\n KEY: hex string, valid length 32 or 64\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a set key request and sends to the driver
|
|
*
|
|
* Usage: "set_key <MAC_ADDRESS><KEY>[KEY_ID]"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_set_key(int argc, char *argv[])
|
|
{
|
|
int ret = UAP_SUCCESS;
|
|
int opt;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
encrypt_key key;
|
|
int key_id = 0;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_set_key_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc < 2 || argc > 3) {
|
|
print_set_key_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(&key, 0, sizeof(encrypt_key));
|
|
|
|
ret = mac2raw(argv[0], key.mac_addr);
|
|
|
|
if ((ret != UAP_SUCCESS) && (ret != UAP_RET_MAC_BROADCAST)) {
|
|
printf("ERR: %s Address\n",
|
|
ret == UAP_FAILURE ? "Invalid MAC" : "Multicast");
|
|
return UAP_FAILURE;
|
|
}
|
|
if ((strlen(argv[1]) != 32) && (strlen(argv[1]) != 64)) {
|
|
printf("ERR: key must be hex string with length 32 or 64");
|
|
print_set_key_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (UAP_FAILURE == ishexstring(argv[1])) {
|
|
printf("ERR:Only hex digits are allowed\n");
|
|
print_set_key_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc == 3) {
|
|
if ((ISDIGIT(argv[2]) == 0) || (atoi(argv[2]) < 0) ||
|
|
(atoi(argv[2]) > 3)) {
|
|
printf("ERR:Illegal key id %s. Must be either '0', '1', '2', or '3'.\n", argv[2]);
|
|
print_set_key_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
key_id = atoi(argv[2]);
|
|
}
|
|
|
|
key.key_len = strlen(argv[1]) / 2;
|
|
string2raw(argv[1], key.key_material);
|
|
key.key_index = key_id;
|
|
|
|
#if DEBUG
|
|
/* dump key buffer */
|
|
hexdump("set key", (void *)&key, sizeof(encrypt_key), ' ');
|
|
#endif
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)&key;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_SET_KEY, &ifr)) {
|
|
perror("");
|
|
printf("ERR:UAP_SET_KEY is not supported by %s\n", dev_name);
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
printf("Key setting successful.\n");
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the sys_cfg_custom_ie
|
|
* command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_sys_cfg_custom_ie_usage(void)
|
|
{
|
|
printf("\nUsage : sys_cfg_custom_ie [INDEX] [MASK] [IEBuffer]");
|
|
printf("\n empty - Get all IE settings\n");
|
|
printf("\n INDEX: 0 - Get/Set IE index 0 setting");
|
|
printf("\n 1 - Get/Set IE index 1 setting");
|
|
printf("\n 2 - Get/Set IE index 2 setting");
|
|
printf("\n 3 - Get/Set IE index 3 setting");
|
|
printf("\n . ");
|
|
printf("\n . ");
|
|
printf("\n . ");
|
|
printf("\n -1 - Append/Delete IE automatically");
|
|
printf("\n Delete will delete the IE from the matching IE buffer");
|
|
printf("\n Append will append the IE to the buffer with the same mask");
|
|
printf("\n MASK : Management subtype mask value as per bit defintions");
|
|
printf("\n : Bit 0 - Association request.");
|
|
printf("\n : Bit 1 - Association response.");
|
|
printf("\n : Bit 2 - Reassociation request.");
|
|
printf("\n : Bit 3 - Reassociation response.");
|
|
printf("\n : Bit 4 - Probe request.");
|
|
printf("\n : Bit 5 - Probe response.");
|
|
printf("\n : Bit 8 - Beacon.");
|
|
printf("\n MASK : MASK = 0 to clear the mask and the IE buffer");
|
|
printf("\n IEBuffer : IE Buffer in hex (max 256 bytes)\n\n");
|
|
return;
|
|
}
|
|
|
|
/** custom IE, auto mask value */
|
|
#define UAP_CUSTOM_IE_AUTO_MASK 0xffff
|
|
|
|
/**
|
|
* @brief Get max management IE index
|
|
* @param max_mgmt_ie
|
|
* @param print flag
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
static int
|
|
get_max_mgmt_ie(int *max_mgmt_ie, int flag)
|
|
{
|
|
apcmdbuf_sys_configure *cmd_buf = NULL;
|
|
tlvbuf_max_mgmt_ie *tlv = NULL;
|
|
t_u8 *buffer = NULL;
|
|
t_u16 cmd_len = 0, i = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int ret = UAP_SUCCESS;
|
|
|
|
*max_mgmt_ie = 0;
|
|
/* Initialize the command length */
|
|
cmd_len = sizeof(apcmdbuf_sys_configure) + sizeof(tlvbuf_max_mgmt_ie);
|
|
|
|
/* Initialize the command buffer */
|
|
buffer = (t_u8 *)malloc(buf_len);
|
|
if (!buffer) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buffer, 0, buf_len);
|
|
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_max_mgmt_ie *)(buffer + sizeof(apcmdbuf_sys_configure));
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->cmd_code = APCMD_SYS_CONFIGURE;
|
|
cmd_buf->size = cmd_len;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
tlv->tag = MRVL_MAX_MGMT_IE_TLV_ID;
|
|
tlv->length = 0;
|
|
cmd_buf->action = ACTION_GET;
|
|
endian_convert_tlv_header_out(tlv);
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
endian_convert_tlv_header_in(tlv);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
/* Verify response */
|
|
if ((cmd_buf->cmd_code !=
|
|
(APCMD_SYS_CONFIGURE | APCMD_RESP_CHECK)) ||
|
|
(tlv->tag != MRVL_MAX_MGMT_IE_TLV_ID)) {
|
|
printf("ERR:Corrupted response! cmd_code=%x, Tlv->tag=%x\n", cmd_buf->cmd_code, tlv->tag);
|
|
free(buffer);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Print response */
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
tlv->count = uap_le16_to_cpu(tlv->count);
|
|
for (i = 0; i < tlv->count; i++) {
|
|
tlv->info[i].buf_size =
|
|
uap_le16_to_cpu(tlv->info[i].buf_size);
|
|
tlv->info[i].buf_count =
|
|
uap_le16_to_cpu(tlv->info[i].buf_count);
|
|
*max_mgmt_ie += tlv->info[i].buf_count;
|
|
if (flag) {
|
|
printf("buf%d_size = %d\n", i,
|
|
tlv->info[i].buf_size);
|
|
printf("number of buffers = %d\n",
|
|
tlv->info[i].buf_count);
|
|
printf("\n");
|
|
}
|
|
}
|
|
} else {
|
|
printf("ERR:Could not get max_mgmt_ie_index!\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
}
|
|
if (buffer)
|
|
free(buffer);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Creates a sys_cfg request for custom IE settings
|
|
* and sends to the driver
|
|
*
|
|
* Usage: "sys_cfg_custom_ie [INDEX] [MASK] [IEBuffer]"
|
|
*
|
|
* Options: INDEX : 0 - Get/Set IE index 0 setting
|
|
* 1 - Get/Set IE index 1 setting
|
|
* 2 - Get/Set IE index 2 setting
|
|
* 3 - Get/Set IE index 3 setting
|
|
* .
|
|
* .
|
|
* .
|
|
* MASK : Management subtype mask value
|
|
* IEBuffer: IE Buffer in hex
|
|
* empty - Get all IE settings
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_sys_cfg_custom_ie(int argc, char *argv[])
|
|
{
|
|
tlvbuf_custom_ie *tlv = NULL;
|
|
tlvbuf_max_mgmt_ie *max_mgmt_ie_tlv = NULL;
|
|
custom_ie *ie_ptr = NULL;
|
|
t_u8 *buffer = NULL;
|
|
t_u16 buf_len = 0;
|
|
t_u16 mgmt_subtype_mask = 0;
|
|
int ie_buf_len = 0, ie_len = 0, i = 0, max_mgmt_ie = 0, print_flag = 0;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
if (argc == 1 && max_mgmt_ie_print == 0) {
|
|
/* Print buffer sizes only if (argc == 1) i.e. get all indices one by one
|
|
* && (max_mgmt_ie_print == 0) i.e. max mgmt IE is not printed via sys_config cmd */
|
|
print_flag = 1;
|
|
}
|
|
|
|
/* Reset the max_mgmt_ie_print for successive cmds */
|
|
max_mgmt_ie_print = 0;
|
|
|
|
if (!get_max_mgmt_ie(&max_mgmt_ie, print_flag)) {
|
|
printf("ERR:couldn't get max_mgmt_ie!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
if (max_mgmt_ie == 0) {
|
|
max_mgmt_ie = MAX_MGMT_IE_INDEX;
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG,
|
|
"WARN: max_mgmt_ie=0, defaulting to MAX_MGMT_IE_INDEX\n");
|
|
#endif
|
|
}
|
|
|
|
/* Check arguments */
|
|
if (argc > 4) {
|
|
printf("ERR:Too many arguments.\n");
|
|
print_sys_cfg_custom_ie_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Error checks and initialize the command length */
|
|
if (argc >= 2) {
|
|
if (((IS_HEX_OR_DIGIT(argv[1]) == UAP_FAILURE) &&
|
|
(atoi(argv[1]) != -1)) || (atoi(argv[1]) < -1)) {
|
|
printf("ERR:Illegal index %s\n", argv[1]);
|
|
print_sys_cfg_custom_ie_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
switch (argc) {
|
|
case 1:
|
|
buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
break;
|
|
case 2:
|
|
if ((atoi(argv[1]) < 0) || (atoi(argv[1]) >= max_mgmt_ie)) {
|
|
printf("ERR:Illegal index %s. Must be either greater than or equal to 0 and less than %d for Get Operation \n", argv[1], max_mgmt_ie);
|
|
print_sys_cfg_custom_ie_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
break;
|
|
case 3:
|
|
if (UAP_FAILURE == ishexstring(argv[2]) ||
|
|
A2HEXDECIMAL(argv[2]) != 0) {
|
|
printf("ERR: Mask value should be 0 to clear IEBuffers.\n");
|
|
print_sys_cfg_custom_ie_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (atoi(argv[1]) == -1) {
|
|
printf("ERR: Buffer should be provided for automatic deletion.\n");
|
|
print_sys_cfg_custom_ie_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
buf_len = sizeof(tlvbuf_custom_ie) + sizeof(custom_ie);
|
|
break;
|
|
case 4:
|
|
/* This is to check negative numbers and special symbols */
|
|
if (UAP_FAILURE == IS_HEX_OR_DIGIT(argv[2])) {
|
|
printf("ERR:Mask value must be 0 or hex digits\n");
|
|
print_sys_cfg_custom_ie_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
/* If above check is passed and mask is not hex, then it must be 0 */
|
|
if ((ISDIGIT(argv[2]) == UAP_SUCCESS) && atoi(argv[2])) {
|
|
printf("ERR:Mask value must be 0 or hex digits\n ");
|
|
print_sys_cfg_custom_ie_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
if (UAP_FAILURE == ishexstring(argv[3])) {
|
|
printf("ERR:Only hex digits are allowed\n");
|
|
print_sys_cfg_custom_ie_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
ie_buf_len = strlen(argv[3]);
|
|
if (!strncasecmp("0x", argv[3], 2)) {
|
|
ie_len = (ie_buf_len - 2 + 1) / 2;
|
|
argv[3] += 2;
|
|
} else
|
|
ie_len = (ie_buf_len + 1) / 2;
|
|
if (ie_len > MAX_IE_BUFFER_LEN) {
|
|
printf("ERR:Incorrect IE length %d\n", ie_buf_len);
|
|
print_sys_cfg_custom_ie_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
mgmt_subtype_mask = (t_u16)A2HEXDECIMAL(argv[2]);
|
|
buf_len = sizeof(tlvbuf_custom_ie) + sizeof(custom_ie) + ie_len;
|
|
break;
|
|
}
|
|
|
|
/* Initialize the command buffer */
|
|
buffer = (t_u8 *)malloc(buf_len);
|
|
if (!buffer) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buffer, 0, buf_len);
|
|
tlv = (tlvbuf_custom_ie *)buffer;
|
|
tlv->tag = MRVL_MGMT_IE_LIST_TLV_ID;
|
|
if (argc == 1 || argc == 2) {
|
|
if (argc == 1)
|
|
tlv->length = 0;
|
|
else {
|
|
tlv->length = sizeof(t_u16);
|
|
ie_ptr = (custom_ie *)(tlv->ie_data);
|
|
ie_ptr->ie_index = (t_u16)(atoi(argv[1]));
|
|
}
|
|
} else {
|
|
/* Locate headers */
|
|
ie_ptr = (custom_ie *)(tlv->ie_data);
|
|
/* Set TLV fields */
|
|
tlv->length = sizeof(custom_ie) + ie_len;
|
|
ie_ptr->ie_index = atoi(argv[1]);
|
|
ie_ptr->mgmt_subtype_mask = mgmt_subtype_mask;
|
|
ie_ptr->ie_length = ie_len;
|
|
if (argc == 4)
|
|
string2raw(argv[3], ie_ptr->ie_buffer);
|
|
}
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
if (buffer)
|
|
free(buffer);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (argc != 1) {
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)buffer;
|
|
/* Perform ioctl */
|
|
if (ioctl(sockfd, UAP_CUSTOM_IE, &ifr)) {
|
|
if (errno < 0) {
|
|
perror("ioctl[UAP_CUSTOM_IE]");
|
|
printf("ERR:Command sending failed!\n");
|
|
} else {
|
|
printf("custom IE configuration failed!\n");
|
|
}
|
|
close(sockfd);
|
|
if (buffer)
|
|
free(buffer);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Print response */
|
|
if (argc > 2) {
|
|
printf("custom IE setting successful\n");
|
|
} else {
|
|
printf("Querying custom IE successful\n");
|
|
tlv = (tlvbuf_custom_ie *)buffer;
|
|
ie_len = tlv->length;
|
|
ie_ptr = (custom_ie *)(tlv->ie_data);
|
|
if (tlv->tag == MRVL_MGMT_IE_LIST_TLV_ID) {
|
|
while ((unsigned int)ie_len >=
|
|
sizeof(custom_ie)) {
|
|
printf("Index [%d]\n",
|
|
ie_ptr->ie_index);
|
|
if (ie_ptr->ie_length)
|
|
printf("Management Subtype Mask = 0x%02x\n", ie_ptr->mgmt_subtype_mask == 0 ? UAP_CUSTOM_IE_AUTO_MASK : ie_ptr->mgmt_subtype_mask);
|
|
else
|
|
printf("Management Subtype Mask = 0x%02x\n", ie_ptr->mgmt_subtype_mask);
|
|
hexdump_data("IE Buffer",
|
|
(void *)ie_ptr->ie_buffer,
|
|
(ie_ptr->ie_length), ' ');
|
|
ie_len -=
|
|
sizeof(custom_ie) +
|
|
ie_ptr->ie_length;
|
|
ie_ptr = (custom_ie *)((t_u8 *)ie_ptr +
|
|
sizeof(custom_ie)
|
|
+
|
|
ie_ptr->
|
|
ie_length);
|
|
}
|
|
}
|
|
max_mgmt_ie_tlv =
|
|
(tlvbuf_max_mgmt_ie *)(buffer +
|
|
sizeof(tlvbuf_custom_ie)
|
|
+ tlv->length);
|
|
if (max_mgmt_ie_tlv) {
|
|
if (max_mgmt_ie_tlv->tag ==
|
|
MRVL_MAX_MGMT_IE_TLV_ID) {
|
|
for (i = 0; i < max_mgmt_ie_tlv->count;
|
|
i++) {
|
|
printf("buf%d_size = %d\n", i,
|
|
max_mgmt_ie_tlv->info[i].
|
|
buf_size);
|
|
printf("number of buffers = %d\n", max_mgmt_ie_tlv->info[i].buf_count);
|
|
printf("\n");
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Special handling for all indices: Get all IEs one-by-one */
|
|
if (argc == 1) {
|
|
for (i = 0; i < max_mgmt_ie; i++) {
|
|
|
|
tlv->length = sizeof(t_u16);
|
|
ie_ptr = (custom_ie *)(tlv->ie_data);
|
|
ie_ptr->ie_index = (t_u16)(i);
|
|
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)buffer;
|
|
/* Perform ioctl */
|
|
if (ioctl(sockfd, UAP_CUSTOM_IE, &ifr)) {
|
|
if (errno < 0) {
|
|
perror("ioctl[UAP_CUSTOM_IE]");
|
|
printf("ERR:Command sending failed!\n");
|
|
} else {
|
|
printf("custom IE configuration failed!\n");
|
|
}
|
|
close(sockfd);
|
|
if (buffer)
|
|
free(buffer);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Print response */
|
|
tlv = (tlvbuf_custom_ie *)buffer;
|
|
ie_len = tlv->length;
|
|
ie_ptr = (custom_ie *)(tlv->ie_data);
|
|
if (tlv->tag == MRVL_MGMT_IE_LIST_TLV_ID) {
|
|
while ((unsigned int)ie_len >=
|
|
sizeof(custom_ie)) {
|
|
printf("Index [%d]\n",
|
|
ie_ptr->ie_index);
|
|
if (ie_ptr->ie_length)
|
|
printf("Management Subtype Mask = 0x%02x\n", ie_ptr->mgmt_subtype_mask == 0 ? UAP_CUSTOM_IE_AUTO_MASK : ie_ptr->mgmt_subtype_mask);
|
|
else
|
|
printf("Management Subtype Mask = 0x%02x\n", ie_ptr->mgmt_subtype_mask);
|
|
hexdump_data("IE Buffer",
|
|
(void *)ie_ptr->ie_buffer,
|
|
(ie_ptr->ie_length), ' ');
|
|
ie_len -=
|
|
sizeof(custom_ie) +
|
|
ie_ptr->ie_length;
|
|
ie_ptr = (custom_ie *)((t_u8 *)ie_ptr +
|
|
sizeof(custom_ie)
|
|
+
|
|
ie_ptr->
|
|
ie_length);
|
|
}
|
|
}
|
|
}
|
|
printf("Querying custom IE successful\n");
|
|
}
|
|
|
|
if (buffer)
|
|
free(buffer);
|
|
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the dfstesting command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_dfstesting_usage(void)
|
|
{
|
|
printf("\nUsage : dfstesting [USER_CAC_PD USER_NOP_PD NO_CHAN_CHANGE FIXED_CHAN_NUM]\n");
|
|
printf("\n empty - Get all dfstesting settings\n");
|
|
printf("\n USER_CAC_PD: user configured Channel Availability Check period");
|
|
printf("\n 0 - disable, use default (60000)");
|
|
printf("\n 1-65535 - CAC period in msec");
|
|
printf("\n USER_NOP_PD: user configured Non-Occupancy Period");
|
|
printf("\n 0 - disable, use default (1800)");
|
|
printf("\n 1-65535 - NOP period in sec");
|
|
printf("\n NO_CHAN_CHANGE: user setting, don't change channel on radar");
|
|
printf("\n 0 - disable, default behavior");
|
|
printf("\n non-zero - enable, overrides below setting");
|
|
printf("\n FIXED_CHAN_NUM: user fixed channel to change to on radar");
|
|
printf("\n 0 - disable, use random channel [default]");
|
|
printf("\n 1-255 - set fixed channel (not checked for validity)\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief user configuration of dfs testing settings
|
|
*
|
|
* Usage: "dfstesting [USER_CAC_PD USER_NOP_PD NO_CHAN_CHANGE FIXED_CHAN_NUM]"
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_dfstesting(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u32 val;
|
|
dfs_testing_para dfs_test;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_dfstesting_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
memset(&dfs_test, 0x00, sizeof(dfs_test));
|
|
|
|
/* Check arguments */
|
|
if (argc == 0) {
|
|
dfs_test.action = ACTION_GET;
|
|
} else if (argc == 4) {
|
|
if ((IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE) ||
|
|
(IS_HEX_OR_DIGIT(argv[1]) == UAP_FAILURE) ||
|
|
(IS_HEX_OR_DIGIT(argv[2]) == UAP_FAILURE) ||
|
|
(IS_HEX_OR_DIGIT(argv[3]) == UAP_FAILURE)) {
|
|
printf("ERR: Only Number values are allowed\n");
|
|
print_dfstesting_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
val = A2HEXDECIMAL(argv[0]);
|
|
if (val > 0xfffff) {
|
|
printf("ERR: invalid user_cac_pd value!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
dfs_test.usr_cac_period = (t_u32)val;
|
|
|
|
val = A2HEXDECIMAL(argv[1]);
|
|
if (val > 0xffff) {
|
|
printf("ERR: invalid user_nop_pd value!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
dfs_test.usr_nop_period = (t_u16)val;
|
|
|
|
val = A2HEXDECIMAL(argv[2]);
|
|
dfs_test.no_chan_change = (t_u8)(val ? 1 : 0);
|
|
|
|
val = A2HEXDECIMAL(argv[3]);
|
|
if (val > 0xff) {
|
|
printf("ERR: invalid fixed_chan_num value!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
dfs_test.fixed_new_chan = (t_u8)val;
|
|
dfs_test.action = ACTION_SET;
|
|
} else {
|
|
printf("ERR: invalid number of arguments! Must be 0 or 4.\n");
|
|
print_dfstesting_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
dfs_test.subcmd = UAP_DFS_TESTING;
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)&dfs_test;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR: UAP_DFS_TESTING is not supported by %s\n",
|
|
dev_name);
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (argc)
|
|
printf("DFS testing setting successful!\n");
|
|
else
|
|
printf("DFS testing settings:\n"
|
|
" user_cac_period = %d msec\n"
|
|
" user_nop_period = %d sec\n"
|
|
" no_channel_change = %d\n"
|
|
" fixed_channel_num = %d\n",
|
|
dfs_test.usr_cac_period, dfs_test.usr_nop_period,
|
|
dfs_test.no_chan_change, dfs_test.fixed_new_chan);
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the cscount_cfg
|
|
* command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_cscount_cfg_usage(void)
|
|
{
|
|
printf("\nUsage : cscount [<n>]");
|
|
printf("\n Where <n> ");
|
|
printf("\n 5-20: No of beacons with Channel Switch Count IE\n");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Set/get cs_count configuration
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_cscount_cfg(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
cscount_cfg_t cscount_cfg;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_cscount_cfg_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
|
|
memset(&cscount_cfg, 0, sizeof(cscount_cfg));
|
|
if (argc == 0) {
|
|
cscount_cfg.action = ACTION_GET;
|
|
} else if (argc == 1) {
|
|
if ((t_u32)A2HEXDECIMAL(argv[0]) < 5
|
|
&& (t_u32)A2HEXDECIMAL(argv[0]) > 20) {
|
|
printf("ERR:Invalid Channel switch count value\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
cscount_cfg.action = ACTION_SET;
|
|
cscount_cfg.cs_count = (t_u32)A2HEXDECIMAL(argv[0]);
|
|
} else {
|
|
print_cscount_cfg_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
cscount_cfg.subcmd = UAP_CHAN_SWITCH_COUNT_CFG;
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)&cscount_cfg;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR: Channel switch count configuration failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Handle response */
|
|
if (cscount_cfg.action == ACTION_GET) {
|
|
printf("Channel Switch count = %d\n", cscount_cfg.cs_count);
|
|
}
|
|
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the mgmtframectrl command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_mgmtframectrl_usage(void)
|
|
{
|
|
printf("\nUsage : mgmtframectrl [MASK]\n");
|
|
printf(" empty - Get management frame control mask\n");
|
|
printf(" MASK - Set management frame control mask\n");
|
|
}
|
|
|
|
/**
|
|
* @brief Creates management frame control request and send to driver
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
apcmd_mgmt_frame_control(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
mgmt_frame_ctrl param; /* Action =0, Mask =0 */
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_mgmtframectrl_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if (argc > 1) {
|
|
printf("ERR:wrong arguments.\n");
|
|
print_mgmtframectrl_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if ((argc) && (IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE)) {
|
|
printf("ERR: Invalid argument %s\n", argv[0]);
|
|
print_mgmtframectrl_usage();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
memset(¶m, 0, sizeof(mgmt_frame_ctrl));
|
|
param.subcmd = UAP_MGMT_FRAME_CONTROL;
|
|
if (argc) {
|
|
param.action = ACTION_SET;
|
|
param.mask = (t_u16)A2HEXDECIMAL(argv[0]);
|
|
} else {
|
|
param.action = ACTION_GET;
|
|
}
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, strlen(dev_name));
|
|
ifr.ifr_ifru.ifru_data = (void *)¶m;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR:UAP_IOCTL_CMD failed\n");
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
if (!argc) {
|
|
printf("Management Frame control mask = 0x%02x\n",
|
|
(int)param.mask);
|
|
}
|
|
/* Close socket */
|
|
close(sockfd);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for the sys_cfg_pmf command
|
|
* command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_sys_cfg_pmf(void)
|
|
{
|
|
printf("\nUsage : uaputl.exe sys_cfg_pmf [MFPC] [MFPR]\n");
|
|
printf("\nSet/Get PMF capabilities");
|
|
printf("\n empty - Get PMF capabilites\n");
|
|
printf("\n MFPC: Management frames protection capable");
|
|
printf("\n 0 - Not capable");
|
|
printf("\n 1 - capable");
|
|
printf("\n MFPR: Management frames protection required");
|
|
printf("\n don't care if MFPC is set to 0");
|
|
printf("\n 0 - Not required");
|
|
printf("\n 1 - required\n");
|
|
return;
|
|
}
|
|
|
|
int
|
|
apcmd_sys_cfg_pmf(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
apcmdbuf_pmf_params *cmd_buf = NULL;
|
|
t_u8 *buf = NULL;
|
|
t_u16 cmd_len = 0;
|
|
t_u16 buf_len = MRVDRV_SIZE_OF_CMD_BUFFER;
|
|
int ret = UAP_SUCCESS;
|
|
t_u8 mfpc = 0;
|
|
t_u8 mfpr = 0;
|
|
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_sys_cfg_pmf();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
/* Check arguments */
|
|
if ((argc > 2)) {
|
|
printf("ERR:wrong arguments.\n");
|
|
print_sys_cfg_pmf();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (argc > 0)
|
|
mfpc = atoi(argv[0]);
|
|
|
|
if (mfpc && (argc == 1)) {
|
|
printf("ERR:wrong arguments.\n");
|
|
print_sys_cfg_pmf();
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (mfpc && (argc == 2))
|
|
mfpr = atoi(argv[1]);
|
|
|
|
/* Alloc buf for command */
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer from command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
|
|
/* Locate headers */
|
|
cmd_len = sizeof(apcmdbuf_pmf_params);
|
|
cmd_buf = (apcmdbuf_pmf_params *) buf;
|
|
|
|
/* Fill the command buffer */
|
|
cmd_buf->size = cmd_len - BUF_HEADER_SIZE;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->cmd_code = HostCmd_CMD_PMF_PARAMS;
|
|
if (argc == 0)
|
|
cmd_buf->action = ACTION_GET;
|
|
else
|
|
cmd_buf->action = ACTION_SET;
|
|
cmd_buf->action = uap_cpu_to_le16(cmd_buf->action);
|
|
cmd_buf->params.mfpc = mfpc;
|
|
cmd_buf->params.mfpr = mfpr;
|
|
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, buf_len);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
printf("Successfully executed the command\n");
|
|
printf("mfpc: %d, mfpr: %d\n",
|
|
cmd_buf->params.mfpc, cmd_buf->params.mfpr);
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
} else {
|
|
printf("ERR:Command sending failed!\n");
|
|
free(buf);
|
|
return UAP_FAILURE;
|
|
}
|
|
free(buf);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show usage information for uap operation control command
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_uap_oper_ctrl_usage(void)
|
|
{
|
|
printf("\nUsage : uap_oper_ctrl <control> <chanopt> <bandcfg> <channel> ");
|
|
printf("\n set/get uap operation when in-STA disconnected from ext-AP if multi channel is disabled");
|
|
printf("\n control: 0: default, do nothing");
|
|
printf("\n 2: uap stops and restart automatically");
|
|
printf("\n chanopt : specify which channel should be used when uap restarts automatically");
|
|
printf("\n 1: uap restarts on default 2.4G/channel 6");
|
|
printf("\n 2: uap restart on band/channel configured by driver previously");
|
|
printf("\n 3: uap restart on band/channel configured by parameter bandcfg/channel");
|
|
printf("\n bandcfg : This parameter specifies the bandwidth (BW)");
|
|
printf("\n 0: 20Mhz");
|
|
printf("\n 2: 40Mhz");
|
|
printf("\n 3: 80Mhz");
|
|
printf("\n channel : This parameter specifies the channel will be used when chanopt is 3.");
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Set/Get uap operation when in-STA disconnected from ext-AP
|
|
* @param argc Number of arguments
|
|
* @param argv A pointer to arguments array
|
|
* @return MLAN_STATUS_SUCCESS--success, otherwise--fail
|
|
*/
|
|
int
|
|
apcmd_uap_oper_ctrl(int argc, char *argv[])
|
|
{
|
|
int opt;
|
|
uap_operation_ctrl param;
|
|
struct eth_priv_uap_oper_ctrl *uap_oper = NULL;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u8 *respbuf = NULL;
|
|
|
|
memset(¶m, 0, sizeof(param));
|
|
while ((opt = getopt_long(argc, argv, "+", cmd_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
default:
|
|
print_uap_oper_ctrl_usage();
|
|
return UAP_SUCCESS;
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
respbuf = (t_u8 *)malloc(MRVDRV_SIZE_OF_CMD_BUFFER);
|
|
if (!respbuf) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
memset(respbuf, 0, MRVDRV_SIZE_OF_CMD_BUFFER);
|
|
|
|
/* Check arguments */
|
|
if (argc > 4) {
|
|
printf("ERR: Invalid number of arguments.\n");
|
|
print_uap_oper_ctrl_usage();
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (argc > 0) {
|
|
param.uap_oper.ctrl = (t_u16)A2HEXDECIMAL(argv[0]);
|
|
if (param.uap_oper.ctrl == 2)
|
|
param.uap_oper.chan_opt = (t_u16)A2HEXDECIMAL(argv[1]);
|
|
|
|
if (argc == 4 && param.uap_oper.chan_opt == 3) {
|
|
param.uap_oper.bandcfg = (t_u8)A2HEXDECIMAL(argv[2]);
|
|
param.uap_oper.channel = (t_u8)A2HEXDECIMAL(argv[3]);
|
|
}
|
|
param.action = ACTION_SET;
|
|
} else {
|
|
param.action = ACTION_GET;
|
|
}
|
|
param.subcmd = UAP_OPERATION_CTRL;
|
|
|
|
memcpy(respbuf, ¶m, sizeof(uap_operation_ctrl));
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)respbuf;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR: uap operation control set/get failed\n");
|
|
close(sockfd);
|
|
free(respbuf);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Handle response */
|
|
if (param.action == ACTION_GET) {
|
|
/* Process result */
|
|
uap_oper =
|
|
(struct eth_priv_uap_oper_ctrl *)(respbuf +
|
|
2 * sizeof(t_u32));
|
|
printf(" uap operation control %x\n", uap_oper->ctrl);
|
|
printf(" uap channel operation %x\n", uap_oper->chan_opt);
|
|
if (uap_oper->chan_opt == 3) {
|
|
printf(" uap bandwidth %s\n",
|
|
uap_oper->
|
|
bandcfg ? ((uap_oper->bandcfg == 2) ? "40Mhz" :
|
|
"80Mhz") : "20Mhz");
|
|
printf(" uap channel %d\n", uap_oper->channel);
|
|
}
|
|
} else
|
|
printf("uap operation control set success!\n");
|
|
/* Close socket */
|
|
close(sockfd);
|
|
if (respbuf)
|
|
free(respbuf);
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/** Structure of command table*/
|
|
typedef struct {
|
|
/** Command name */
|
|
char *cmd;
|
|
/** Command function pointer */
|
|
int (*func) (int argc, char *argv[]);
|
|
/** Command usuage */
|
|
char *help;
|
|
} command_table;
|
|
|
|
/** AP command table */
|
|
static command_table ap_command[] = {
|
|
{"sys_config", apcmd_sys_config, "\tSet/get uAP's profile"},
|
|
{"sys_info", apcmd_sys_info, "\tDisplay system info"},
|
|
{"sys_reset", apcmd_sys_reset, "\tReset uAP"},
|
|
{"bss_start", apcmd_bss_start, "\tStart the BSS"},
|
|
{"bss_stop", apcmd_bss_stop, "\tStop the BSS"},
|
|
{"skip_cac", apcmd_skip_cac, "\tSkip the CAC"},
|
|
{"sta_deauth", apcmd_sta_deauth, "\tDeauth client"},
|
|
{"sta_list", apcmd_sta_list, "\tDisplay list of clients"},
|
|
{"sys_cfg_ap_mac_address", apcmd_sys_cfg_ap_mac_address,
|
|
"Set/get uAP mac address"},
|
|
{"sys_cfg_ssid", apcmd_sys_cfg_ssid, "\tSet/get uAP ssid"},
|
|
{"sys_cfg_beacon_period", apcmd_sys_cfg_beacon_period,
|
|
"Set/get uAP beacon period"},
|
|
{"sys_cfg_dtim_period", apcmd_sys_cfg_dtim_period,
|
|
"Set/get uAP dtim period"},
|
|
{"sys_cfg_bss_status", apcmd_sys_cfg_bss_status, "Get BSS status"},
|
|
{"sys_cfg_channel", apcmd_sys_cfg_channel,
|
|
"\tSet/get uAP radio channel"},
|
|
{"sys_cfg_channel_ext", apcmd_sys_cfg_channel_ext,
|
|
"\tSet/get uAP radio channel, band and mode"},
|
|
{"sys_cfg_scan_channels", apcmd_sys_cfg_scan_channels,
|
|
"Set/get uAP radio channel list"},
|
|
{"sys_cfg_rates", apcmd_sys_cfg_rates, "\tSet/get uAP rates"},
|
|
{"sys_cfg_rates_ext", apcmd_sys_cfg_rates_ext, "\tSet/get uAP rates"},
|
|
{"sys_cfg_tx_power", apcmd_sys_cfg_tx_power, "Set/get uAP tx power"},
|
|
{"sys_cfg_bcast_ssid_ctl", apcmd_sys_cfg_bcast_ssid_ctl,
|
|
"Set/get uAP broadcast ssid"},
|
|
{"sys_cfg_preamble_ctl", apcmd_sys_cfg_preamble_ctl,
|
|
"Get uAP preamble"},
|
|
{"antcfg", apcmd_antcfg, "Set/get uAP tx/rx antenna"},
|
|
{"htstreamcfg", apcmd_htstreamcfg,
|
|
"Set/get uAP HT stream configurations"},
|
|
{"sys_cfg_rts_threshold", apcmd_sys_cfg_rts_threshold,
|
|
"Set/get uAP rts threshold"},
|
|
{"sys_cfg_frag_threshold", apcmd_sys_cfg_frag_threshold,
|
|
"Set/get uAP frag threshold"},
|
|
{"radioctrl", apcmd_radio_ctl, "Set/get uAP radio on/off"},
|
|
{"sys_cfg_tx_beacon_rate", apcmd_sys_cfg_tx_beacon_rate,
|
|
"Set/get uAP tx beacon rate"},
|
|
{"txratecfg", apcmd_tx_rate_cfg, "Set/get trasnmit data rate"},
|
|
{"sys_cfg_mcbc_data_rate", apcmd_sys_cfg_mcbc_data_rate,
|
|
"Set/get uAP MCBC rate"},
|
|
{"sys_cfg_rsn_replay_prot", apcmd_sys_cfg_rsn_replay_prot,
|
|
"Set/get RSN replay protection"},
|
|
{"sys_cfg_pkt_fwd_ctl", apcmd_sys_cfg_pkt_fwd_ctl,
|
|
"Set/get uAP packet forwarding"},
|
|
{"sys_cfg_sta_ageout_timer", apcmd_sys_cfg_sta_ageout_timer,
|
|
"Set/get station ageout timer"},
|
|
{"sys_cfg_ps_sta_ageout_timer", apcmd_sys_cfg_ps_sta_ageout_timer,
|
|
"Set/get PS station ageout timer"},
|
|
{"sys_cfg_auth", apcmd_sys_cfg_auth,
|
|
"\tSet/get uAP authentication mode"},
|
|
{"sys_cfg_protocol", apcmd_sys_cfg_protocol,
|
|
"Set/get uAP security protocol"},
|
|
{"sys_cfg_wep_key", apcmd_sys_cfg_wep_key, "\tSet/get uAP wep key"},
|
|
{"sys_cfg_cipher", apcmd_sys_cfg_cipher,
|
|
"\tSet/get uAP WPA/WPA2 cipher"},
|
|
{"sys_cfg_pwk_cipher", apcmd_sys_cfg_pwk_cipher,
|
|
"\tSet/get uAP WPA/WPA2 pairwise cipher"},
|
|
{"sys_cfg_gwk_cipher", apcmd_sys_cfg_gwk_cipher,
|
|
"\tSet/get uAP WPA/WPA2 group cipher"},
|
|
{"sys_cfg_wpa_passphrase", apcmd_sys_cfg_wpa_passphrase,
|
|
"Set/get uAP WPA or WPA2 passphrase"},
|
|
{"sys_cfg_wpa3_sae_password", apcmd_sys_cfg_wpa3_sae_password,
|
|
"Set/get uAP WPA3 SAE password"},
|
|
{"sys_cfg_group_rekey_timer", apcmd_sys_cfg_group_rekey_timer,
|
|
"Set/get uAP group re-key time"},
|
|
{"sys_cfg_max_sta_num", apcmd_sys_cfg_max_sta_num,
|
|
"Set/get uAP max station number"},
|
|
{"sys_cfg_retry_limit", apcmd_sys_cfg_retry_limit,
|
|
"Set/get uAP retry limit number"},
|
|
{"sys_cfg_sticky_tim_config", apcmd_sys_cfg_sticky_tim_config,
|
|
"Set/get uAP sticky TIM configuration"},
|
|
{"sys_cfg_sticky_tim_sta_mac_addr",
|
|
apcmd_sys_cfg_sticky_tim_sta_mac_addr,
|
|
"Set/get uAP sticky TIM sta MAC address"},
|
|
{"sys_cfg_eapol_pwk_hsk", apcmd_sys_cfg_eapol_pwk_hsk,
|
|
"Set/getuAP pairwise Handshake timeout value and retries"},
|
|
{"sys_cfg_eapol_gwk_hsk", apcmd_sys_cfg_eapol_gwk_hsk,
|
|
"Set/getuAP groupwise Handshake timeout value and retries"},
|
|
{"sys_cfg_custom_ie", apcmd_sys_cfg_custom_ie,
|
|
"\tSet/get custom IE configuration"},
|
|
{"sta_filter_table", apcmd_sta_filter_table, "Set/get uAP mac filter"},
|
|
{"regrdwr", apcmd_regrdwr, "\t\tRead/Write register command"},
|
|
{"memaccess", apcmd_memaccess,
|
|
"\tRead/Write to a memory address command"},
|
|
{"rdeeprom", apcmd_read_eeprom, "\tRead EEPROM "},
|
|
{"cfg_data", apcmd_cfg_data,
|
|
"\tGet/Set configuration file from/to firmware"},
|
|
{"sys_cfg_80211d", apcmd_cfg_80211d, "\tSet/Get 802.11D info"},
|
|
{"uap_stats", apcmd_uap_stats, "\tGet uAP stats"},
|
|
{"pscfg", apcmd_pscfg, "\t\tSet/get uAP power mode"},
|
|
{"bss_config", apcmd_bss_config, "\tSet/get BSS configuration"},
|
|
{"sta_deauth_ext", apcmd_sta_deauth_ext, "\tDeauth client"},
|
|
{"mic_err", apcmd_mic_err, "\t\tReport station mic error"},
|
|
{"key_material", apcmd_set_key, "\tSet key"},
|
|
{"coex_config", apcmd_coex_config,
|
|
"\tSet/get uAP BT coex configuration"},
|
|
{"hscfg", apcmd_hscfg, "\t\tSet/get uAP host sleep parameters."},
|
|
{"hssetpara", apcmd_hssetpara,
|
|
"\t\tSet/get uAP host sleep parameters."},
|
|
{"addbapara", apcmd_addbapara, "\tSet/get uAP ADDBA parameters."},
|
|
{"aggrpriotbl", apcmd_aggrpriotbl,
|
|
"\tSet/get uAP priority table for AMPDU/AMSDU."},
|
|
{"addbareject", apcmd_addbareject, "\tSet/get uAP addbareject table."},
|
|
{"sys_cfg_11n", apcmd_sys_cfg_11n, "\tSet/get uAP 802.11n parameters."},
|
|
#ifdef RX_PACKET_COALESCE
|
|
{"rxpktcoal_cfg", apcmd_rx_pkt_coalesce,
|
|
"\tSet/get RX Packet coalesing paramterts."},
|
|
#endif
|
|
{"httxbfcfg", apcmd_sys_cfg_tx_bf, "\tSet/get uAP TX BF parameters."},
|
|
{"httxcfg", apcmd_sys_cfg_ht_tx, "\t\tSet/get uAP HT Tx parameters."},
|
|
{"vhtcfg", apcmd_sys_cfg_vht, "\t\tSet/get uAP VHT parameters."},
|
|
{"sys_cfg_wmm", apcmd_sys_cfg_wmm,
|
|
"\tSet/get uAP beacon wmm parameters."},
|
|
{"sys_cfg_ap_wmm", apcmd_sys_cfg_ap_wmm,
|
|
"\tSet/get uAP hardware wmm parameters."},
|
|
{"deepsleep", apcmd_deepsleep, "\tSet/get deepsleep mode."},
|
|
{"hostcmd", apcmd_hostcmd, "\t\tSet/get hostcmd"},
|
|
{"tx_data_pause", apcmd_txdatapause,
|
|
"\tSet/get Tx data pause settings."},
|
|
#ifdef SDIO
|
|
{"sdcmd52rw", apcmd_cmd52_readwrite,
|
|
"\tRead or write using sdio command 52."},
|
|
#endif
|
|
{"sys_cfg_2040_coex", apcmd_sys_cfg_2040_coex,
|
|
"\tSet/get 20/40 coex settings."},
|
|
{"dfstesting", apcmd_dfstesting, "\tConfigure DFS Testing settings."},
|
|
{"cscount", apcmd_cscount_cfg, "\tConfigure DFS Channel Switch Count."},
|
|
{"mgmtframectrl", apcmd_mgmt_frame_control,
|
|
"\tSpecifies mask indicating management frames to be sent from host."},
|
|
{"sys_cfg_restrict_client_mode", apcmd_sys_cfg_restrict_client_mode,
|
|
"\tSet/get the mode in which client stations can connect to the uAP."},
|
|
{"sys_cfg_pmf", apcmd_sys_cfg_pmf, "\tSet/get PMF capabilities."},
|
|
{"uap_oper_ctrl", apcmd_uap_oper_ctrl,
|
|
"\tSet/get uap operation control value."},
|
|
{"band_steering_cfg", apcmd_band_steering,
|
|
"\tConfigure Band Steering."},
|
|
{NULL, NULL, 0}
|
|
};
|
|
|
|
/**
|
|
* @brief Prints usage information of uaputl
|
|
*
|
|
* @return N/A
|
|
*/
|
|
static void
|
|
print_tool_usage(void)
|
|
{
|
|
int i;
|
|
printf("uaputl.exe - uAP utility ver %s\n", UAP_VERSION);
|
|
printf("Usage:\n"
|
|
"\tuaputl.exe [options] <command> [command parameters]\n");
|
|
printf("Options:\n"
|
|
"\t--help\tDisplay help\n"
|
|
"\t-v\tDisplay version\n"
|
|
"\t-i <interface>\n" "\t-d <debug_level=0|1|2>\n");
|
|
printf("Commands:\n");
|
|
for (i = 0; ap_command[i].cmd; i++)
|
|
printf("\t%-4s\t\t%s\n", ap_command[i].cmd, ap_command[i].help);
|
|
printf("\n"
|
|
"For more information on the usage of each command use:\n"
|
|
"\tuaputl.exe <command> --help\n");
|
|
}
|
|
|
|
/****************************************************************************
|
|
Global functions
|
|
****************************************************************************/
|
|
/** Option parameter*/
|
|
static struct option ap_options[] = {
|
|
{"help", 0, NULL, 'h'},
|
|
{"interface", 1, NULL, 'i'},
|
|
{"debug", 1, NULL, 'd'},
|
|
{"version", 0, NULL, 'v'},
|
|
{NULL, 0, NULL, '\0'}
|
|
};
|
|
|
|
/**
|
|
* @brief Checks if given channel in 'a' band is valid or not.
|
|
*
|
|
* @param channel Channel number
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
is_valid_a_band_channel(int channel)
|
|
{
|
|
int ret = UAP_SUCCESS;
|
|
switch (channel) {
|
|
case 16:
|
|
case 34:
|
|
case 36:
|
|
case 38:
|
|
case 40:
|
|
case 42:
|
|
case 44:
|
|
case 46:
|
|
case 48:
|
|
case 52:
|
|
case 56:
|
|
case 60:
|
|
case 64:
|
|
case 100:
|
|
case 104:
|
|
case 108:
|
|
case 112:
|
|
case 116:
|
|
case 120:
|
|
case 124:
|
|
case 128:
|
|
case 132:
|
|
case 136:
|
|
case 140:
|
|
case 144:
|
|
case 149:
|
|
case 153:
|
|
case 157:
|
|
case 161:
|
|
case 165:
|
|
break;
|
|
default:
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Checks if secondary channel can be set above given primary channel in 'a' band or not.
|
|
*
|
|
* @param channel Channel number
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
is_valid_a_band_channel_above(int channel)
|
|
{
|
|
int ret = UAP_SUCCESS;
|
|
switch (channel) {
|
|
case 36:
|
|
case 44:
|
|
case 52:
|
|
case 60:
|
|
case 100:
|
|
case 108:
|
|
case 116:
|
|
case 124:
|
|
case 132:
|
|
case 140:
|
|
case 149:
|
|
case 157:
|
|
break;
|
|
default:
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Checks if secondary channel can be set below given primary channel in 'a' band or not.
|
|
*
|
|
* @param channel Channel number
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
is_valid_a_band_channel_below(int channel)
|
|
{
|
|
int ret = UAP_SUCCESS;
|
|
switch (channel) {
|
|
case 40:
|
|
case 48:
|
|
case 56:
|
|
case 64:
|
|
case 104:
|
|
case 112:
|
|
case 120:
|
|
case 128:
|
|
case 136:
|
|
case 153:
|
|
case 161:
|
|
break;
|
|
default:
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Checkes a particular input for validatation.
|
|
*
|
|
* @param cmd Type of input
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
is_input_valid(valid_inputs cmd, int argc, char *argv[])
|
|
{
|
|
int i;
|
|
int chan_number = 0;
|
|
int band = 0;
|
|
int ch;
|
|
int ret = UAP_SUCCESS;
|
|
if (argc == 0)
|
|
return UAP_FAILURE;
|
|
switch (cmd) {
|
|
case RDEEPROM:
|
|
if (argc != 2) {
|
|
printf(" ERR: Argument count mismatch\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (ISDIGIT(argv[1]) == 0)
|
|
|| (A2HEXDECIMAL(argv[0]) & 0x03) ||
|
|
((int)(A2HEXDECIMAL(argv[0])) < 0) ||
|
|
(A2HEXDECIMAL(argv[1]) & 0x03) ||
|
|
(A2HEXDECIMAL(argv[1]) < 4) ||
|
|
(A2HEXDECIMAL(argv[1]) > 20)) {
|
|
printf(" ERR: Invalid inputs for Read EEPROM\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case SCANCHANNELS:
|
|
if (argc > MAX_CHANNELS) {
|
|
printf("ERR: Invalid List of Channels\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
for (i = 0; i < argc; i++) {
|
|
chan_number = -1;
|
|
band = -1;
|
|
sscanf(argv[i], "%d.%d", &chan_number, &band);
|
|
if ((chan_number == -1) || (chan_number < 1) ||
|
|
(chan_number > MAX_CHANNELS)) {
|
|
printf("ERR: Channel must be in the range of 1 to %d\n", MAX_CHANNELS);
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
if ((chan_number > MAX_CHANNELS_BG) &&
|
|
!(is_valid_a_band_channel(chan_number))) {
|
|
printf("ERR: Invalid Channel in 'a' band!\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
if ((band < -1) || (band > 1)) {
|
|
printf("ERR:Band must be either 0 or 1\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
} else {
|
|
if (((chan_number < MAX_CHANNELS_BG) &&
|
|
(chan_number != 8) &&
|
|
(chan_number != 12) && (band == 1))
|
|
|| ((chan_number > MAX_CHANNELS_BG)
|
|
&& (band == 0))) {
|
|
printf("ERR:Invalid band for given channel\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
if ((ret != UAP_FAILURE) &&
|
|
(has_dup_channel(argc, argv) != UAP_SUCCESS)) {
|
|
printf("ERR: Duplicate channel values entered\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((ret != UAP_FAILURE) &&
|
|
(has_diff_band(argc, argv) != UAP_SUCCESS)) {
|
|
printf("ERR: Scan channel list should contain channels from only one band\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case TXPOWER:
|
|
if ((argc > 1) || (ISDIGIT(argv[0]) == 0)) {
|
|
printf("ERR:Invalid Transmit power\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((atoi(argv[0]) < MIN_TX_POWER) ||
|
|
(atoi(argv[0]) > MAX_TX_POWER)) {
|
|
printf("ERR: TX Powar must be in the rage of %d to %d. \n", MIN_TX_POWER, MAX_TX_POWER);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case PROTOCOL:
|
|
if ((argc > 2) || (ISDIGIT(argv[0]) == 0)) {
|
|
printf("ERR:Invalid Protocol\n");
|
|
ret = UAP_FAILURE;
|
|
} else
|
|
ret = is_protocol_valid(atoi(argv[0]));
|
|
break;
|
|
case AKM_SUITE:
|
|
if (argc == 2) {
|
|
if (A2HEXDECIMAL(argv[1]) &
|
|
~(KEY_MGMT_PSK | KEY_MGMT_PSK_SHA256 | KEY_MGMT_EAP
|
|
| KEY_MGMT_NONE | KEY_MGMT_SAE)) {
|
|
printf("ERR: Invalid AKM suite\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case CHANNEL:
|
|
if ((argc != 1) && (argc != 2)) {
|
|
printf("ERR: Incorrect arguments for channel.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if (argc == 2) {
|
|
if ((ISDIGIT(argv[1]) == 0) ||
|
|
(atoi(argv[1]) & ~CHANNEL_MODE_MASK)) {
|
|
printf("ERR: Invalid Mode\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[1]) & BITMAP_ACS_MODE) &&
|
|
(atoi(argv[0]) != 0)) {
|
|
printf("ERR: Channel must be 0 for ACS; MODE = 1.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[1]) & BITMAP_CHANNEL_ABOVE) &&
|
|
(atoi(argv[1]) & BITMAP_CHANNEL_BELOW)) {
|
|
printf("ERR: secondary channel above and below both are enabled\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
if ((argc == 1) || (!(atoi(argv[1]) & BITMAP_ACS_MODE))) {
|
|
if ((ISDIGIT(argv[0]) == 0) ||
|
|
(atoi(argv[0]) < 1) ||
|
|
(atoi(argv[0]) > MAX_CHANNELS)) {
|
|
printf("ERR: Channel must be in the range of 1 to %d\n", MAX_CHANNELS);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[0]) > MAX_CHANNELS_BG) &&
|
|
!(is_valid_a_band_channel(atoi(argv[0])))) {
|
|
printf("ERR: Invalid Channel in 'a' band!\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
ch = atoi(argv[0]);
|
|
if (ch <= MAX_CHANNELS_BG) {
|
|
if ((argc == 2) &&
|
|
(atoi(argv[1]) &
|
|
BITMAP_CHANNEL_ABOVE) &&
|
|
(atoi(argv[0]) >
|
|
MAX_CHANNEL_ABOVE)) {
|
|
printf("ERR: only allow channel 1-9 for secondary channel above\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((argc == 2) &&
|
|
(atoi(argv[1]) &
|
|
BITMAP_CHANNEL_BELOW) &&
|
|
((atoi(argv[0]) < MIN_CHANNEL_BELOW)
|
|
|| (atoi(argv[0]) == 14))) {
|
|
printf("ERR: only allow channel 5-13 for secondary channel below\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
if (argc == 2) {
|
|
if ((atoi(argv[1]) &
|
|
BITMAP_CHANNEL_BELOW) &&
|
|
!is_valid_a_band_channel_below
|
|
(atoi(argv[0]))) {
|
|
printf("ERR: For given primary channel secondary channel can not be set below\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[1]) &
|
|
BITMAP_CHANNEL_ABOVE) &&
|
|
!is_valid_a_band_channel_above
|
|
(atoi(argv[0]))) {
|
|
printf("ERR: For given primary channel secondary channel can not be set above\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
case CHANNEL_EXT:
|
|
if (argc > 3) {
|
|
printf("ERR: Incorrect arguments for channel_ext.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if (argc == 3) {
|
|
if ((ISDIGIT(argv[2]) == 0) ||
|
|
(atoi(argv[2]) & ~CHANNEL_MODE_MASK)) {
|
|
printf("ERR: Invalid Mode\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[2]) & BITMAP_ACS_MODE) &&
|
|
(atoi(argv[0]) != 0)) {
|
|
printf("ERR: Channel must be 0 for ACS; MODE = 1.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[2]) & BITMAP_CHANNEL_ABOVE) &&
|
|
(atoi(argv[2]) & BITMAP_CHANNEL_BELOW)) {
|
|
printf("ERR: secondary channel above and below both are enabled\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
if ((argc == 2) &&
|
|
((ISDIGIT(argv[1]) == 0) || (atoi(argv[1]) < 0) ||
|
|
atoi(argv[1]) > 1)) {
|
|
printf("ERR:Invalid band\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((argc == 1) ||
|
|
((argc == 3) &&
|
|
!(atoi(argv[2]) & BITMAP_ACS_MODE))) {
|
|
if ((ISDIGIT(argv[0]) == 0) ||
|
|
(atoi(argv[0]) < 1) ||
|
|
(atoi(argv[0]) > MAX_CHANNELS)) {
|
|
printf("ERR: Channel must be in the range of 1 to %d\n", MAX_CHANNELS);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[0]) > MAX_CHANNELS_BG) &&
|
|
!(is_valid_a_band_channel(atoi(argv[0])))) {
|
|
printf("ERR: Invalid Channel in 'a' band!\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
ch = atoi(argv[0]);
|
|
if (ch <= MAX_CHANNELS_BG) {
|
|
if ((argc == 3) &&
|
|
(atoi(argv[2]) &
|
|
BITMAP_CHANNEL_ABOVE) &&
|
|
(atoi(argv[0]) >
|
|
MAX_CHANNEL_ABOVE)) {
|
|
printf("ERR: only allow channel 1-9 for secondary channel above\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((argc == 3) &&
|
|
(atoi(argv[2]) &
|
|
BITMAP_CHANNEL_BELOW) &&
|
|
((atoi(argv[0]) < MIN_CHANNEL_BELOW)
|
|
|| (atoi(argv[0]) == 14))) {
|
|
printf("ERR: only allow channel 5-13 for secondary channel below\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
if (argc == 3) {
|
|
if ((atoi(argv[2]) &
|
|
BITMAP_CHANNEL_BELOW) &&
|
|
!is_valid_a_band_channel_below
|
|
(atoi(argv[0]))) {
|
|
printf("ERR: For given primary channel secondary channel can not be set below\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[2]) &
|
|
BITMAP_CHANNEL_ABOVE) &&
|
|
!is_valid_a_band_channel_above
|
|
(atoi(argv[0]))) {
|
|
printf("ERR: For given primary channel secondary channel can not be set above\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
case BAND:
|
|
if (argc > 1) {
|
|
printf("ERR: Incorrect number of BAND arguments.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) > 1)) {
|
|
printf("ERR: Invalid band.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case RATE:
|
|
if (argc > MAX_RATES) {
|
|
printf("ERR: Incorrect number of RATES arguments.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
for (i = 0; i < argc; i++) {
|
|
if ((IS_HEX_OR_DIGIT(argv[i]) == UAP_FAILURE) ||
|
|
(is_rate_valid
|
|
(A2HEXDECIMAL(argv[i]) &
|
|
~BASIC_RATE_SET_BIT)
|
|
!= UAP_SUCCESS)) {
|
|
printf("ERR:Unsupported rate.\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
}
|
|
if ((ret != UAP_FAILURE) &&
|
|
(has_dup_rate(argc, argv) != UAP_SUCCESS)) {
|
|
printf("ERR: Duplicate rate values entered\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if (check_mandatory_rates(argc, argv) != UAP_SUCCESS) {
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case BROADCASTSSID:
|
|
if (argc != 1) {
|
|
printf("ERR:wrong BROADCASTSSID arguments.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) ||
|
|
((atoi(argv[0]) != 0) && (atoi(argv[0]) != 1) &&
|
|
(atoi(argv[0]) != 2))) {
|
|
printf("ERR:Illegal parameter %s for BROADCASTSSID. Must be either '0', '1' or '2'.\n", argv[0]);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case RTSTHRESH:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for RTSTHRESHOLD\n");
|
|
ret = UAP_FAILURE;
|
|
} else if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) > MAX_RTS_THRESHOLD)) {
|
|
printf("ERR:Illegal RTSTHRESHOLD %s. The value must between 0 and %d\n", argv[0], MAX_RTS_THRESHOLD);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
break;
|
|
case FRAGTHRESH:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for FRAGTHRESH\n");
|
|
ret = UAP_FAILURE;
|
|
} else if ((ISDIGIT(argv[0]) == 0) ||
|
|
(atoi(argv[0]) < MIN_FRAG_THRESHOLD) ||
|
|
(atoi(argv[0]) > MAX_FRAG_THRESHOLD)) {
|
|
printf("ERR:Illegal FRAGTHRESH %s. The value must between %d and %d\n", argv[0], MIN_FRAG_THRESHOLD, MAX_FRAG_THRESHOLD);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
break;
|
|
case DTIMPERIOD:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for DTIMPERIOD\n");
|
|
ret = UAP_FAILURE;
|
|
} else if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 1) ||
|
|
(atoi(argv[0]) > MAX_DTIM_PERIOD)) {
|
|
printf("ERR: DTIMPERIOD Value must be in range of 1 to %d\n", MAX_DTIM_PERIOD);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
break;
|
|
case RSNREPLAYPROT:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for RSNREPLAYPROT\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) > 1)) {
|
|
printf("ERR:Illegal RSNREPLAYPROT parameter %s. Must be either '0' or '1'.\n", argv[0]);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case RADIOCONTROL:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for RADIOCONTROL\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) > 1)) {
|
|
printf("ERR:Illegal RADIOCONTROL parameter %s. Must be either '0' or '1'.\n", argv[0]);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case TXRATECFG:
|
|
if (argc > 3) {
|
|
printf("ERR:Incorrect number of arguments for DATARATE\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if (((argc >= 1) &&
|
|
(IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE)) ||
|
|
((argc >= 2) &&
|
|
(IS_HEX_OR_DIGIT(argv[1]) == UAP_FAILURE))
|
|
|| ((argc >= 3) &&
|
|
(IS_HEX_OR_DIGIT(argv[2]) == UAP_FAILURE))
|
|
) {
|
|
printf("ERR: invalid Tx data rate\n");
|
|
ret = UAP_FAILURE;
|
|
} else if (argc >= 1) {
|
|
if (A2HEXDECIMAL(argv[0]) == 0xFF) {
|
|
if (argc != 1) {
|
|
printf("ERR: invalid auto rate input\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
} else {
|
|
if ((A2HEXDECIMAL(argv[0]) > 3)
|
|
) {
|
|
printf("ERR: invalid format\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if (argc >= 2) {
|
|
if (((A2HEXDECIMAL(argv[0]) ==
|
|
0) &&
|
|
(A2HEXDECIMAL(argv[1]) >
|
|
11)) ||
|
|
((A2HEXDECIMAL(argv[0]) ==
|
|
1) &&
|
|
(A2HEXDECIMAL(argv[1]) !=
|
|
32) &&
|
|
(A2HEXDECIMAL(argv[1]) >
|
|
15)
|
|
)) {
|
|
printf("ERR:Incorrect TxRate %s.\n", argv[1]);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
if (argc == 3) {
|
|
if (((A2HEXDECIMAL(argv[0]) !=
|
|
2) &&
|
|
(A2HEXDECIMAL(argv[0]) !=
|
|
3)) ||
|
|
((A2HEXDECIMAL(argv[2]) < 1)
|
|
|| (A2HEXDECIMAL(argv[2]) >
|
|
2))) {
|
|
printf("ERR:Incorrect nss.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
case MCBCDATARATE:
|
|
case TXBEACONRATE:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for DATARATE\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if (IS_HEX_OR_DIGIT(argv[0]) == UAP_FAILURE) {
|
|
printf("ERR: invalid data rate\n");
|
|
ret = UAP_FAILURE;
|
|
} else if ((A2HEXDECIMAL(argv[0]) != 0) &&
|
|
(is_rate_valid
|
|
(A2HEXDECIMAL(argv[0]) &
|
|
~BASIC_RATE_SET_BIT) != UAP_SUCCESS)) {
|
|
printf("ERR: invalid data rate\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case PKTFWD:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for PKTFWD.\n");
|
|
ret = UAP_FAILURE;
|
|
} else if ((ISDIGIT(argv[0]) == 0) ||
|
|
((atoi(argv[0]) < 0) || (atoi(argv[0]) > 15))) {
|
|
printf("ERR:Illegal PKTFWD parameter %s. Must be within '0' and '15'.\n", argv[0]);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
break;
|
|
case STAAGEOUTTIMER:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for STAAGEOUTTIMER.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || ((atoi(argv[0]) != 0) &&
|
|
((atoi(argv[0]) <
|
|
MIN_STAGE_OUT_TIME) ||
|
|
(atoi(argv[0]) >
|
|
MAX_STAGE_OUT_TIME))))
|
|
{
|
|
printf("ERR:Illegal STAAGEOUTTIMER %s. Must be between %d and %d.\n", argv[0], MIN_STAGE_OUT_TIME, MAX_STAGE_OUT_TIME);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case PSSTAAGEOUTTIMER:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for PSSTAAGEOUTTIMER.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || ((atoi(argv[0]) != 0) &&
|
|
((atoi(argv[0]) <
|
|
MIN_STAGE_OUT_TIME) ||
|
|
(atoi(argv[0]) >
|
|
MAX_STAGE_OUT_TIME))))
|
|
{
|
|
printf("ERR:Illegal PSSTAAGEOUTTIMER %s. Must be between %d and %d.\n", argv[0], MIN_STAGE_OUT_TIME, MAX_STAGE_OUT_TIME);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case AUTHMODE:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for AUTHMODE\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || ((atoi(argv[0]) != 0) &&
|
|
(atoi(argv[0]) != 1)
|
|
&& (atoi(argv[0]) != 3)
|
|
&& (atoi(argv[0]) !=
|
|
255))) {
|
|
printf("ERR:Illegal AUTHMODE parameter %s. Must be either '0','1','3' or 255''.\n", argv[0]);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case GROUPREKEYTIMER:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for GROUPREKEYTIMER.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) > MAX_GRP_TIMER)) {
|
|
printf("ERR: GROUPREKEYTIMER range is [0:%d] (0 for disable)\n", MAX_GRP_TIMER);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case MAXSTANUM:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for MAXSTANUM\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) <= 0)) {
|
|
printf("ERR:Invalid STA_NUM argument %s.\n",
|
|
argv[0]);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case BEACONPERIOD:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of argument for BEACONPERIOD.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) ||
|
|
(atoi(argv[0]) < MIN_BEACON_PERIOD)
|
|
|| (atoi(argv[0]) > MAX_BEACON_PERIOD)) {
|
|
printf("ERR: BEACONPERIOD must be in range of %d to %d.\n", MIN_BEACON_PERIOD, MAX_BEACON_PERIOD);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case RETRYLIMIT:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for RETRY LIMIT\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) ||
|
|
(atoi(argv[0]) > MAX_RETRY_LIMIT) ||
|
|
(atoi(argv[0]) < 0)) {
|
|
printf("ERR:RETRY_LIMIT must be in the range of [0:%d]. The input was %s.\n", MAX_RETRY_LIMIT, argv[0]);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case STICKYTIMCONFIG:
|
|
if ((argc != 1) && (argc != 3)) {
|
|
printf("ERR:Incorrect number of arguments for STICKY_TIM_CONFIG\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) > 2)) {
|
|
printf("ERR:Enable parameter must be 0, 1 or 2\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
if (((atoi(argv[0]) != 1) && (argc > 1))) {
|
|
printf("ERR: Invalid arguments\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
if ((atoi(argv[0]) == 1) && (argc != 3)) {
|
|
printf("ERR: Both duration and sticky bit mask must be provided for ENABLE = 1\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
if (argc > 1) {
|
|
if ((ISDIGIT(argv[1]) == 0)) {
|
|
printf("ERR: Invalid duration\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
if ((ISDIGIT(argv[2]) == 0) ||
|
|
(atoi(argv[2]) < 1) ||
|
|
(atoi(argv[2]) > 3)) {
|
|
printf("ERR:Invalid sticky bit mask\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
case STICKYTIMSTAMACADDR:
|
|
if ((argc != 1) && (argc != 2)) {
|
|
printf("ERR:Incorrect number of STICKY_TIM_STA_MAC_ADDR arguments\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((argc == 2) &&
|
|
((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) > 1))) {
|
|
printf("ERR:Invalid control parameter\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
case COEX2040CONFIG:
|
|
if (argc != 1) {
|
|
printf("ERR: Incorrect number of 2040 COEX CONFIG arguments\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) > 1)) {
|
|
printf("ERR:Invalid enable parameter\n");
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
case EAPOL_PWK_HSK:
|
|
if (argc != 2) {
|
|
printf("ERR:Incorrect number of EAPOL_PWK_HSK arguments.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (ISDIGIT(argv[1]) == 0)
|
|
|| (atoi(argv[0]) < 0) || (atoi(argv[1]) < 0)) {
|
|
printf("ERR:Illegal parameters for EAPOL_PWK_HSK. Must be digits greater than equal to zero.\n");
|
|
}
|
|
}
|
|
break;
|
|
case EAPOL_GWK_HSK:
|
|
if (argc != 2) {
|
|
printf("ERR:Incorrect number of EAPOL_GWK_HSK arguments.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (ISDIGIT(argv[1]) == 0)
|
|
|| (atoi(argv[0]) < 0) || (atoi(argv[1]) < 0)) {
|
|
printf("ERR:Illegal parameters for EAPOL_GWK_HSK. Must be digits greater than equal to zero.\n");
|
|
}
|
|
}
|
|
break;
|
|
case PREAMBLETYPE:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for PREAMBLE TYPE\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) ||
|
|
(atoi(argv[0]) > MAX_PREAMBLE_TYPE) ||
|
|
(atoi(argv[0]) < 0)) {
|
|
printf("ERR:PREAMBLE TYPE must be in the range of [0:%d]. The input was %s.\n", MAX_PREAMBLE_TYPE, argv[0]);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case COEX_COMM_BITMAP:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of argument for Bitmap.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
/* Only bit 0 is supported now, hence check for 1 or 0 */
|
|
if ((IS_HEX_OR_DIGIT(argv[0]) == 0) ||
|
|
(atoi(argv[0]) < 0) || (atoi(argv[0]) > 1)) {
|
|
printf("ERR: Bitmap must have value of 1 or 0.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case COEX_COMM_AP_COEX:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of argument for APBTCoex.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((IS_HEX_OR_DIGIT(argv[0]) == 0) ||
|
|
(atoi(argv[0]) < 0) || (atoi(argv[0]) > 1)) {
|
|
printf("ERR: APBTCoex must have value of 1 or 0.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case COEX_SCO_ACL_FREQ:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for aclFrequency.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if (ISDIGIT(argv[0]) == 0) {
|
|
printf("ERR: Incorrect value for aclFrequency.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case COEX_ACL_ENABLED:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for (acl) enabled.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || (atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) > 1)) {
|
|
printf("ERR: (acl) enabled must have value of 1 or 0.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case COEX_ACL_BT_TIME:
|
|
case COEX_ACL_WLAN_TIME:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for bt/wlan time.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if (ISDIGIT(argv[0]) == 0) {
|
|
printf("ERR: Incorrect value for bt/wlan time.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case COEX_PROTECTION:
|
|
if (argc != 2) {
|
|
printf("ERR:Incorrect number of arguments for %s.\n",
|
|
argv[0]);
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if (ISDIGIT(argv[1]) == 0) {
|
|
printf("ERR: Incorrect value for %s.\n",
|
|
argv[0]);
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case PWK_CIPHER:
|
|
if ((argc != 1) && (argc != 2)) {
|
|
printf("ERR:Incorrect number of arguments for pwk_cipher.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) ||
|
|
(atoi(argv[0]) & ~PROTOCOL_BITMAP)) {
|
|
printf("Invalid Protocol paramter.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if (argc == 2) {
|
|
if ((ISDIGIT(argv[1]) == 0) ||
|
|
(atoi(argv[1]) & ~CIPHER_BITMAP)) {
|
|
printf("Invalid pairwise cipher.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
case GWK_CIPHER:
|
|
if (argc != 1) {
|
|
printf("ERR:Incorrect number of arguments for gwk_cipher.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) ||
|
|
(atoi(argv[0]) & ~CIPHER_BITMAP) ||
|
|
(atoi(argv[0]) == AES_CCMP_TKIP)) {
|
|
printf("Invalid group cipher.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
case RESTRICT_CLIENT_MODE:
|
|
if ((argc != 1) && (argc != 2)) {
|
|
printf("ERR: Incorrect number of arguments.\n");
|
|
ret = UAP_FAILURE;
|
|
} else {
|
|
if ((ISDIGIT(argv[0]) == 0) || ((argc == 2) &&
|
|
((IS_HEX_OR_DIGIT
|
|
(argv[1]) == 0) ||
|
|
((atoi(argv[0]) < 0) ||
|
|
(atoi(argv[0]) >
|
|
1))))) {
|
|
printf("ERR: Invalid arguments\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((atoi(argv[0]) == 1) && (argc == 1)) {
|
|
printf("ERR: Mode_config parameter must be provided to enable this feature.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
if ((argc == 2) &&
|
|
(((A2HEXDECIMAL(argv[1]) << 8) != B_ONLY_MASK) &&
|
|
((A2HEXDECIMAL(argv[1]) << 8) != G_ONLY_MASK) &&
|
|
((A2HEXDECIMAL(argv[1]) << 8) != A_ONLY_MASK) &&
|
|
((A2HEXDECIMAL(argv[1]) << 8) != N_ONLY_MASK) &&
|
|
((A2HEXDECIMAL(argv[1]) << 8) != AC_ONLY_MASK))) {
|
|
printf("ERR: Exactly one mode can be enabled at a time.\n");
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
ret = UAP_FAILURE;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Converts colon separated MAC address to hex value
|
|
*
|
|
* @param mac A pointer to the colon separated MAC string
|
|
* @param raw A pointer to the hex data buffer
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
* UAP_RET_MAC_BROADCAST - if broadcast mac
|
|
* UAP_RET_MAC_MULTICAST - if multicast mac
|
|
*/
|
|
int
|
|
mac2raw(char *mac, t_u8 *raw)
|
|
{
|
|
unsigned int temp_raw[ETH_ALEN];
|
|
int num_tokens = 0;
|
|
int i;
|
|
if (strlen(mac) != ((2 * ETH_ALEN) + (ETH_ALEN - 1))) {
|
|
return UAP_FAILURE;
|
|
}
|
|
num_tokens = sscanf(mac, "%2x:%2x:%2x:%2x:%2x:%2x",
|
|
temp_raw + 0, temp_raw + 1, temp_raw + 2,
|
|
temp_raw + 3, temp_raw + 4, temp_raw + 5);
|
|
if (num_tokens != ETH_ALEN) {
|
|
return UAP_FAILURE;
|
|
}
|
|
for (i = 0; i < num_tokens; i++)
|
|
raw[i] = (t_u8)temp_raw[i];
|
|
|
|
if (memcmp(raw, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0) {
|
|
return UAP_RET_MAC_BROADCAST;
|
|
} else if (raw[0] & 0x01) {
|
|
return UAP_RET_MAC_MULTICAST;
|
|
}
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Converts a string to hex value
|
|
*
|
|
* @param str A pointer to the string
|
|
* @param raw A pointer to the raw data buffer
|
|
* @return Number of bytes read
|
|
*/
|
|
int
|
|
string2raw(char *str, unsigned char *raw)
|
|
{
|
|
int len = (strlen(str) + 1) / 2;
|
|
|
|
do {
|
|
if (!isxdigit(*str)) {
|
|
return -1;
|
|
}
|
|
*str = toupper(*str);
|
|
*raw = CHAR2INT(*str) << 4;
|
|
++str;
|
|
*str = toupper(*str);
|
|
if (*str == '\0')
|
|
break;
|
|
*raw |= CHAR2INT(*str);
|
|
++raw;
|
|
} while (*++str != '\0');
|
|
return len;
|
|
}
|
|
|
|
/**
|
|
* @brief Prints a MAC address in colon separated form from hex data
|
|
*
|
|
* @param raw A pointer to the hex data buffer
|
|
* @return N/A
|
|
*/
|
|
void
|
|
print_mac(t_u8 *raw)
|
|
{
|
|
printf("%02x:%02x:%02x:%02x:%02x:%02x", (unsigned int)raw[0],
|
|
(unsigned int)raw[1], (unsigned int)raw[2], (unsigned int)raw[3],
|
|
(unsigned int)raw[4], (unsigned int)raw[5]);
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Check hex string
|
|
*
|
|
* @param hex A pointer to hex string
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
ishexstring(void *hex)
|
|
{
|
|
int i, a;
|
|
char *p = hex;
|
|
int len = strlen(p);
|
|
if (!strncasecmp("0x", p, 2)) {
|
|
p += 2;
|
|
len -= 2;
|
|
}
|
|
for (i = 0; i < len; i++) {
|
|
a = hex2num(*p);
|
|
if (a < 0)
|
|
return UAP_FAILURE;
|
|
p++;
|
|
}
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Show auth tlv
|
|
*
|
|
* @param tlv Pointer to auth tlv
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_auth(tlvbuf_auth_mode *tlv)
|
|
{
|
|
switch (tlv->auth_mode) {
|
|
case 0:
|
|
printf("AUTHMODE = Open authentication\n");
|
|
break;
|
|
case 1:
|
|
printf("AUTHMODE = Shared key authentication\n");
|
|
break;
|
|
case 3:
|
|
printf("AUTHMODE = WPA3 SAE\n");
|
|
break;
|
|
case 255:
|
|
printf("AUTHMODE = Auto (open and shared key)\n");
|
|
break;
|
|
default:
|
|
printf("ERR: Invalid authmode=%d\n", tlv->auth_mode);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/**
|
|
*
|
|
* @brief Show cipher tlv
|
|
*
|
|
* @param tlv Pointer to cipher tlv
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_cipher(tlvbuf_cipher *tlv)
|
|
{
|
|
switch (tlv->pairwise_cipher) {
|
|
case CIPHER_TKIP:
|
|
printf("PairwiseCipher = TKIP\n");
|
|
break;
|
|
case CIPHER_AES_CCMP:
|
|
printf("PairwiseCipher = AES CCMP\n");
|
|
break;
|
|
case CIPHER_TKIP | CIPHER_AES_CCMP:
|
|
printf("PairwiseCipher = TKIP + AES CCMP\n");
|
|
break;
|
|
case CIPHER_NONE:
|
|
printf("PairwiseCipher = None\n");
|
|
break;
|
|
default:
|
|
printf("Unknown Pairwise cipher 0x%x\n", tlv->pairwise_cipher);
|
|
break;
|
|
}
|
|
switch (tlv->group_cipher) {
|
|
case CIPHER_TKIP:
|
|
printf("GroupCipher = TKIP\n");
|
|
break;
|
|
case CIPHER_AES_CCMP:
|
|
printf("GroupCipher = AES CCMP\n");
|
|
break;
|
|
case CIPHER_NONE:
|
|
printf("GroupCipher = None\n");
|
|
break;
|
|
default:
|
|
printf("Unknown Group cipher 0x%x\n", tlv->group_cipher);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Show pairwise cipher tlv
|
|
*
|
|
* @param tlv Pointer to pairwise cipher tlv
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_pwk_cipher(tlvbuf_pwk_cipher *tlv)
|
|
{
|
|
switch (tlv->protocol) {
|
|
case PROTOCOL_WPA:
|
|
printf("Protocol WPA : ");
|
|
break;
|
|
case PROTOCOL_WPA2:
|
|
printf("Protocol WPA2 : ");
|
|
break;
|
|
case PROTOCOL_WPA3_SAE:
|
|
printf("Protocol WPA3_SAE : ");
|
|
break;
|
|
default:
|
|
printf("Unknown Protocol 0x%x\n", tlv->protocol);
|
|
break;
|
|
}
|
|
|
|
switch (tlv->pairwise_cipher) {
|
|
case CIPHER_TKIP:
|
|
printf("PairwiseCipher = TKIP\n");
|
|
break;
|
|
case CIPHER_AES_CCMP:
|
|
printf("PairwiseCipher = AES CCMP\n");
|
|
break;
|
|
case CIPHER_TKIP | CIPHER_AES_CCMP:
|
|
printf("PairwiseCipher = TKIP + AES CCMP\n");
|
|
break;
|
|
case CIPHER_NONE:
|
|
printf("PairwiseCipher = None\n");
|
|
break;
|
|
default:
|
|
printf("Unknown Pairwise cipher 0x%x\n", tlv->pairwise_cipher);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Show group cipher tlv
|
|
*
|
|
* @param tlv Pointer to group cipher tlv
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_gwk_cipher(tlvbuf_gwk_cipher *tlv)
|
|
{
|
|
switch (tlv->group_cipher) {
|
|
case CIPHER_TKIP:
|
|
printf("GroupCipher = TKIP\n");
|
|
break;
|
|
case CIPHER_AES_CCMP:
|
|
printf("GroupCipher = AES CCMP\n");
|
|
break;
|
|
case CIPHER_NONE:
|
|
printf("GroupCipher = None\n");
|
|
break;
|
|
default:
|
|
printf("Unknown Group cipher 0x%x\n", tlv->group_cipher);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Show mac filter tlv
|
|
*
|
|
* @param tlv Pointer to filter tlv
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_mac_filter(tlvbuf_sta_mac_addr_filter *tlv)
|
|
{
|
|
int i;
|
|
switch (tlv->filter_mode) {
|
|
case 0:
|
|
printf("Filter Mode = Filter table is disabled\n");
|
|
return;
|
|
case 1:
|
|
if (!tlv->count) {
|
|
printf("No mac address is allowed to connect\n");
|
|
} else {
|
|
printf("Filter Mode = Allow mac address specified in the allowed list\n");
|
|
}
|
|
break;
|
|
case 2:
|
|
if (!tlv->count) {
|
|
printf("No mac address is blocked\n");
|
|
} else {
|
|
printf("Filter Mode = Block MAC addresses specified in the banned list\n");
|
|
}
|
|
break;
|
|
}
|
|
for (i = 0; i < tlv->count; i++) {
|
|
printf("MAC_%d = ", i);
|
|
print_mac(&tlv->mac_address[i * ETH_ALEN]);
|
|
printf("\n");
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @brief Show rate tlv
|
|
*
|
|
* @param tlv Pointer to rate tlv
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_rate(tlvbuf_rates *tlv)
|
|
{
|
|
int flag = 0;
|
|
int i;
|
|
t_u16 tlv_len;
|
|
|
|
tlv_len = *(t_u8 *)&tlv->length;
|
|
tlv_len |= (*((t_u8 *)&tlv->length + 1) << 8);
|
|
|
|
printf("Basic Rates =");
|
|
for (i = 0; i < tlv_len; i++) {
|
|
if (tlv->operational_rates[i] > (BASIC_RATE_SET_BIT - 1)) {
|
|
flag = flag ? : 1;
|
|
printf(" 0x%x", tlv->operational_rates[i]);
|
|
}
|
|
}
|
|
printf("%s\nNon-Basic Rates =", flag ? "" : " ( none ) ");
|
|
for (flag = 0, i = 0; i < tlv_len; i++) {
|
|
if (tlv->operational_rates[i] < BASIC_RATE_SET_BIT) {
|
|
flag = flag ? : 1;
|
|
printf(" 0x%x", tlv->operational_rates[i]);
|
|
}
|
|
}
|
|
printf("%s\n", flag ? "" : " ( none ) ");
|
|
}
|
|
|
|
/**
|
|
* @brief Show all the tlv in the buf
|
|
*
|
|
* @param buf Pointer to tlv buffer
|
|
* @param len Tlv buffer len
|
|
*
|
|
* $return N/A
|
|
*/
|
|
void
|
|
print_tlv(t_u8 *buf, t_u16 len)
|
|
{
|
|
tlvbuf_header *pcurrent_tlv = (tlvbuf_header *)buf;
|
|
int tlv_buf_left = len;
|
|
t_u16 tlv_type;
|
|
t_u16 tlv_len;
|
|
t_u16 tlv_val_16;
|
|
t_u32 tlv_val_32;
|
|
t_u8 ssid[33];
|
|
int i = 0;
|
|
tlvbuf_ap_mac_address *mac_tlv;
|
|
tlvbuf_ssid *ssid_tlv;
|
|
tlvbuf_beacon_period *beacon_tlv;
|
|
tlvbuf_dtim_period *dtim_tlv;
|
|
tlvbuf_rates *rates_tlv;
|
|
tlvbuf_tx_power *txpower_tlv;
|
|
tlvbuf_bcast_ssid_ctl *bcast_tlv;
|
|
tlvbuf_preamble_ctl *preamble_tlv;
|
|
tlvbuf_bss_status *bss_status_tlv;
|
|
tlvbuf_rts_threshold *rts_tlv;
|
|
tlvbuf_mcbc_data_rate *mcbcrate_tlv;
|
|
tlvbuf_pkt_fwd_ctl *pkt_fwd_tlv;
|
|
tlvbuf_sta_ageout_timer *ageout_tlv;
|
|
tlvbuf_ps_sta_ageout_timer *ps_ageout_tlv;
|
|
tlvbuf_auth_mode *auth_tlv;
|
|
tlvbuf_protocol *proto_tlv;
|
|
tlvbuf_akmp *akmp_tlv;
|
|
tlvbuf_cipher *cipher_tlv;
|
|
tlvbuf_pwk_cipher *pwk_cipher_tlv;
|
|
tlvbuf_gwk_cipher *gwk_cipher_tlv;
|
|
tlvbuf_group_rekey_timer *rekey_tlv;
|
|
tlvbuf_wpa_passphrase *psk_tlv;
|
|
tlvbuf_coex_common_cfg *coex_common_tlv;
|
|
tlvbuf_coex_sco_cfg *coex_sco_tlv;
|
|
tlvbuf_coex_acl_cfg *coex_acl_tlv;
|
|
tlvbuf_coex_stats *coex_stats_tlv;
|
|
tlvbuf_wep_key *wep_tlv;
|
|
tlvbuf_frag_threshold *frag_tlv;
|
|
tlvbuf_sta_mac_addr_filter *filter_tlv;
|
|
tlvbuf_max_sta_num *max_sta_tlv;
|
|
tlvbuf_retry_limit *retry_limit_tlv;
|
|
tlvbuf_eapol_pwk_hsk_timeout *pwk_timeout_tlv;
|
|
tlvbuf_eapol_pwk_hsk_retries *pwk_retries_tlv;
|
|
tlvbuf_eapol_gwk_hsk_timeout *gwk_timeout_tlv;
|
|
tlvbuf_eapol_gwk_hsk_retries *gwk_retries_tlv;
|
|
tlvbuf_channel_config *channel_tlv;
|
|
tlvbuf_channel_list *chnlist_tlv;
|
|
channel_list *pchan_list;
|
|
t_u16 custom_ie_len;
|
|
tlvbuf_rsn_replay_prot *replay_prot_tlv;
|
|
tlvbuf_custom_ie *custom_ie_tlv;
|
|
custom_ie *custom_ie_ptr;
|
|
tlvbuf_max_mgmt_ie *max_mgmt_ie_tlv;
|
|
tlvbuf_wmm_para_t *wmm_para_tlv;
|
|
int flag = 0;
|
|
tlvbuf_htcap_t *ht_cap_tlv;
|
|
tlvbuf_htinfo_t *ht_info_tlv;
|
|
tlvbuf_2040_coex *coex_2040_tlv;
|
|
|
|
#ifdef RX_PACKET_COALESCE
|
|
tlvbuf_rx_pkt_coal_t *rx_pkt_coal_tlv;
|
|
#endif
|
|
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG, "tlv total len=%d\n", len);
|
|
#endif
|
|
while (tlv_buf_left >= (int)sizeof(tlvbuf_header)) {
|
|
tlv_type = *(t_u8 *)&pcurrent_tlv->type;
|
|
tlv_type |= (*((t_u8 *)&pcurrent_tlv->type + 1) << 8);
|
|
tlv_len = *(t_u8 *)&pcurrent_tlv->len;
|
|
tlv_len |= (*((t_u8 *)&pcurrent_tlv->len + 1) << 8);
|
|
if ((sizeof(tlvbuf_header) + tlv_len) >
|
|
(unsigned int)tlv_buf_left) {
|
|
printf("wrong tlv: tlv_len=%d, tlv_buf_left=%d\n",
|
|
tlv_len, tlv_buf_left);
|
|
break;
|
|
}
|
|
switch (tlv_type) {
|
|
case MRVL_AP_MAC_ADDRESS_TLV_ID:
|
|
mac_tlv = (tlvbuf_ap_mac_address *)pcurrent_tlv;
|
|
printf("AP MAC address = ");
|
|
print_mac(mac_tlv->ap_mac_addr);
|
|
printf("\n");
|
|
break;
|
|
case MRVL_SSID_TLV_ID:
|
|
memset(ssid, 0, sizeof(ssid));
|
|
ssid_tlv = (tlvbuf_ssid *)pcurrent_tlv;
|
|
|
|
strncpy((char *)ssid, (char *)ssid_tlv->ssid,
|
|
sizeof(ssid) - 1);
|
|
|
|
printf("SSID = %s\n", ssid);
|
|
break;
|
|
case MRVL_BEACON_PERIOD_TLV_ID:
|
|
beacon_tlv = (tlvbuf_beacon_period *)pcurrent_tlv;
|
|
tlv_val_16 = *(t_u8 *)&beacon_tlv->beacon_period_ms;
|
|
tlv_val_16 |=
|
|
(*((t_u8 *)&beacon_tlv->beacon_period_ms + 1) <<
|
|
8);
|
|
printf("Beacon period = %d\n", tlv_val_16);
|
|
break;
|
|
case MRVL_DTIM_PERIOD_TLV_ID:
|
|
dtim_tlv = (tlvbuf_dtim_period *)pcurrent_tlv;
|
|
printf("DTIM period = %d\n", dtim_tlv->dtim_period);
|
|
break;
|
|
case MRVL_CHANNELCONFIG_TLV_ID:
|
|
channel_tlv = (tlvbuf_channel_config *)pcurrent_tlv;
|
|
printf("Channel = %d\n", channel_tlv->chan_number);
|
|
printf("Band = %s\n",
|
|
(channel_tlv->bandcfg.chanBand ==
|
|
BAND_5GHZ) ? "5GHz" : "2.4GHz");
|
|
printf("Channel Select Mode = %s\n",
|
|
(channel_tlv->bandcfg.scanMode ==
|
|
SCAN_MODE_ACS) ? "ACS" : "Manual");
|
|
if (channel_tlv->bandcfg.chan2Offset == SEC_CHAN_NONE)
|
|
printf("no secondary channel\n");
|
|
else if (channel_tlv->bandcfg.chan2Offset ==
|
|
SEC_CHAN_ABOVE)
|
|
printf("secondary channel is above primary channel\n");
|
|
else if (channel_tlv->bandcfg.chan2Offset ==
|
|
SEC_CHAN_BELOW)
|
|
printf("secondary channel is below primary channel\n");
|
|
break;
|
|
case MRVL_CHANNELLIST_TLV_ID:
|
|
chnlist_tlv = (tlvbuf_channel_list *)pcurrent_tlv;
|
|
printf("Channels List = ");
|
|
pchan_list =
|
|
(channel_list *) & (chnlist_tlv->chan_list);
|
|
if (tlv_len % sizeof(channel_list)) {
|
|
break;
|
|
}
|
|
for (i = 0;
|
|
(unsigned int)i < (tlv_len / sizeof(channel_list));
|
|
i++) {
|
|
printf("\n%d\t%sGHz", pchan_list->chan_number,
|
|
(pchan_list->bandcfg.chanBand ==
|
|
BAND_5GHZ) ? "5" : "2.4");
|
|
pchan_list++;
|
|
}
|
|
printf("\n");
|
|
break;
|
|
case MRVL_RSN_REPLAY_PROT_TLV_ID:
|
|
replay_prot_tlv =
|
|
(tlvbuf_rsn_replay_prot *)pcurrent_tlv;
|
|
printf("RSN replay protection = %s\n",
|
|
replay_prot_tlv->
|
|
rsn_replay_prot ? "enabled" : "disabled");
|
|
break;
|
|
case MRVL_RATES_TLV_ID:
|
|
rates_tlv = (tlvbuf_rates *)pcurrent_tlv;
|
|
print_rate(rates_tlv);
|
|
break;
|
|
case MRVL_TX_POWER_TLV_ID:
|
|
txpower_tlv = (tlvbuf_tx_power *)pcurrent_tlv;
|
|
printf("Tx power = %d dBm\n",
|
|
txpower_tlv->tx_power_dbm);
|
|
break;
|
|
case MRVL_BCAST_SSID_CTL_TLV_ID:
|
|
bcast_tlv = (tlvbuf_bcast_ssid_ctl *)pcurrent_tlv;
|
|
printf("SSID broadcast = %s\n",
|
|
(bcast_tlv->bcast_ssid_ctl ==
|
|
1) ? "enabled" : "disabled");
|
|
break;
|
|
case MRVL_PREAMBLE_CTL_TLV_ID:
|
|
preamble_tlv = (tlvbuf_preamble_ctl *)pcurrent_tlv;
|
|
printf("Preamble type = %s\n",
|
|
(preamble_tlv->preamble_type ==
|
|
0) ? "auto" : ((preamble_tlv->preamble_type ==
|
|
1) ? "short" : "long"));
|
|
break;
|
|
case MRVL_BSS_STATUS_TLV_ID:
|
|
bss_status_tlv = (tlvbuf_bss_status *)pcurrent_tlv;
|
|
printf("BSS status = %s\n",
|
|
(bss_status_tlv->bss_status ==
|
|
0) ? "stopped" : "started");
|
|
break;
|
|
case MRVL_RTS_THRESHOLD_TLV_ID:
|
|
rts_tlv = (tlvbuf_rts_threshold *)pcurrent_tlv;
|
|
tlv_val_16 = *(t_u8 *)&rts_tlv->rts_threshold;
|
|
tlv_val_16 |=
|
|
(*((t_u8 *)&rts_tlv->rts_threshold + 1) << 8);
|
|
printf("RTS threshold = %d\n", tlv_val_16);
|
|
break;
|
|
case MRVL_FRAG_THRESHOLD_TLV_ID:
|
|
frag_tlv = (tlvbuf_frag_threshold *)pcurrent_tlv;
|
|
tlv_val_16 = *(t_u8 *)&frag_tlv->frag_threshold;
|
|
tlv_val_16 |=
|
|
(*((t_u8 *)&frag_tlv->frag_threshold + 1) << 8);
|
|
printf("Fragmentation threshold = %d\n", tlv_val_16);
|
|
break;
|
|
case MRVL_MCBC_DATA_RATE_TLV_ID:
|
|
mcbcrate_tlv = (tlvbuf_mcbc_data_rate *)pcurrent_tlv;
|
|
tlv_val_16 = *(t_u8 *)&mcbcrate_tlv->mcbc_datarate;
|
|
tlv_val_16 |=
|
|
(*((t_u8 *)&mcbcrate_tlv->mcbc_datarate + 1) <<
|
|
8);
|
|
if (mcbcrate_tlv->mcbc_datarate == 0)
|
|
printf("MCBC data rate = auto\n");
|
|
else
|
|
printf("MCBC data rate = 0x%x\n", tlv_val_16);
|
|
break;
|
|
case MRVL_PKT_FWD_CTL_TLV_ID:
|
|
pkt_fwd_tlv = (tlvbuf_pkt_fwd_ctl *)pcurrent_tlv;
|
|
printf("%s handles packet forwarding -\n",
|
|
((pkt_fwd_tlv->pkt_fwd_ctl & PKT_FWD_FW_BIT) ==
|
|
0) ? "Host" : "Firmware");
|
|
printf("\tIntra-BSS broadcast packets are %s\n",
|
|
((pkt_fwd_tlv->
|
|
pkt_fwd_ctl & PKT_FWD_INTRA_BCAST) ==
|
|
0) ? "allowed" : "denied");
|
|
printf("\tIntra-BSS unicast packets are %s\n",
|
|
((pkt_fwd_tlv->
|
|
pkt_fwd_ctl & PKT_FWD_INTRA_UCAST) ==
|
|
0) ? "allowed" : "denied");
|
|
printf("\tInter-BSS unicast packets are %s\n",
|
|
((pkt_fwd_tlv->
|
|
pkt_fwd_ctl & PKT_FWD_INTER_UCAST) ==
|
|
0) ? "allowed" : "denied");
|
|
break;
|
|
case MRVL_STA_AGEOUT_TIMER_TLV_ID:
|
|
ageout_tlv = (tlvbuf_sta_ageout_timer *)pcurrent_tlv;
|
|
tlv_val_32 = *(t_u8 *)&ageout_tlv->sta_ageout_timer_ms;
|
|
tlv_val_32 |=
|
|
(*((t_u8 *)&ageout_tlv->sta_ageout_timer_ms + 1)
|
|
<< 8);
|
|
tlv_val_32 |=
|
|
(*((t_u8 *)&ageout_tlv->sta_ageout_timer_ms + 2)
|
|
<< 16);
|
|
tlv_val_32 |=
|
|
(*((t_u8 *)&ageout_tlv->sta_ageout_timer_ms + 3)
|
|
<< 24);
|
|
printf("STA ageout timer = %d\n", (int)tlv_val_32);
|
|
break;
|
|
case MRVL_PS_STA_AGEOUT_TIMER_TLV_ID:
|
|
ps_ageout_tlv =
|
|
(tlvbuf_ps_sta_ageout_timer *)pcurrent_tlv;
|
|
tlv_val_32 =
|
|
*(t_u8 *)&ps_ageout_tlv->ps_sta_ageout_timer_ms;
|
|
tlv_val_32 |=
|
|
(*
|
|
((t_u8 *)&ps_ageout_tlv->
|
|
ps_sta_ageout_timer_ms + 1) << 8);
|
|
tlv_val_32 |=
|
|
(*
|
|
((t_u8 *)&ps_ageout_tlv->
|
|
ps_sta_ageout_timer_ms + 2) << 16);
|
|
tlv_val_32 |=
|
|
(*
|
|
((t_u8 *)&ps_ageout_tlv->
|
|
ps_sta_ageout_timer_ms + 3) << 24);
|
|
printf("PS STA ageout timer = %d\n", (int)tlv_val_32);
|
|
break;
|
|
case MRVL_AUTH_TLV_ID:
|
|
auth_tlv = (tlvbuf_auth_mode *)pcurrent_tlv;
|
|
print_auth(auth_tlv);
|
|
break;
|
|
case MRVL_PROTOCOL_TLV_ID:
|
|
proto_tlv = (tlvbuf_protocol *)pcurrent_tlv;
|
|
tlv_val_16 = *(t_u8 *)&proto_tlv->protocol;
|
|
tlv_val_16 |=
|
|
(*((t_u8 *)&proto_tlv->protocol + 1) << 8);
|
|
print_protocol(tlv_val_16);
|
|
break;
|
|
case MRVL_AKMP_TLV_ID:
|
|
akmp_tlv = (tlvbuf_akmp *)pcurrent_tlv;
|
|
tlv_val_16 = *(t_u8 *)&akmp_tlv->key_mgmt;
|
|
tlv_val_16 |= (*((t_u8 *)&akmp_tlv->key_mgmt + 1) << 8);
|
|
if (tlv_val_16 & (KEY_MGMT_PSK | KEY_MGMT_PSK_SHA256)) {
|
|
if (tlv_val_16 & KEY_MGMT_PSK)
|
|
printf("KeyMgmt = PSK\n");
|
|
if (tlv_val_16 & KEY_MGMT_PSK_SHA256)
|
|
printf("KeyMgmt = PSK_SHA256\n");
|
|
tlv_val_16 =
|
|
*(t_u8 *)&akmp_tlv->key_mgmt_operation;
|
|
if (tlv_len > sizeof(t_u16)) {
|
|
tlv_val_16 |=
|
|
(*
|
|
((t_u8 *)&akmp_tlv->
|
|
key_mgmt_operation + 1) << 8);
|
|
printf("Key Exchange on : %s.\n",
|
|
(tlv_val_16 & 0x01) ? "Host" :
|
|
"Device");
|
|
printf("1x Authentication on : %s.\n",
|
|
(tlv_val_16 & 0x10) ? "Host" :
|
|
"Device");
|
|
}
|
|
}
|
|
if (tlv_val_16 & KEY_MGMT_EAP)
|
|
printf("KeyMgmt = EAP");
|
|
if (tlv_val_16 & KEY_MGMT_NONE)
|
|
printf("KeyMgmt = NONE");
|
|
break;
|
|
case MRVL_CIPHER_TLV_ID:
|
|
cipher_tlv = (tlvbuf_cipher *)pcurrent_tlv;
|
|
print_cipher(cipher_tlv);
|
|
break;
|
|
case MRVL_CIPHER_PWK_TLV_ID:
|
|
pwk_cipher_tlv = (tlvbuf_pwk_cipher *)pcurrent_tlv;
|
|
pwk_cipher_tlv->protocol =
|
|
uap_le16_to_cpu(pwk_cipher_tlv->protocol);
|
|
print_pwk_cipher(pwk_cipher_tlv);
|
|
break;
|
|
case MRVL_CIPHER_GWK_TLV_ID:
|
|
gwk_cipher_tlv = (tlvbuf_gwk_cipher *)pcurrent_tlv;
|
|
print_gwk_cipher(gwk_cipher_tlv);
|
|
break;
|
|
case MRVL_GRP_REKEY_TIME_TLV_ID:
|
|
rekey_tlv = (tlvbuf_group_rekey_timer *)pcurrent_tlv;
|
|
tlv_val_32 = *(t_u8 *)&rekey_tlv->group_rekey_time_sec;
|
|
tlv_val_32 |=
|
|
(*((t_u8 *)&rekey_tlv->group_rekey_time_sec + 1)
|
|
<< 8);
|
|
tlv_val_32 |=
|
|
(*((t_u8 *)&rekey_tlv->group_rekey_time_sec + 2)
|
|
<< 16);
|
|
tlv_val_32 |=
|
|
(*((t_u8 *)&rekey_tlv->group_rekey_time_sec + 3)
|
|
<< 24);
|
|
if (tlv_val_32 == 0)
|
|
printf("Group re-key time = disabled\n");
|
|
else
|
|
printf("Group re-key time = %d second\n",
|
|
tlv_val_32);
|
|
break;
|
|
case MRVL_WPA_PASSPHRASE_TLV_ID:
|
|
psk_tlv = (tlvbuf_wpa_passphrase *)pcurrent_tlv;
|
|
if (tlv_len > 0) {
|
|
printf("WPA passphrase = ");
|
|
for (i = 0; i < tlv_len; i++)
|
|
printf("%c", psk_tlv->passphrase[i]);
|
|
printf("\n");
|
|
} else
|
|
printf("WPA passphrase = None\n");
|
|
break;
|
|
case MRVL_WEP_KEY_TLV_ID:
|
|
wep_tlv = (tlvbuf_wep_key *)pcurrent_tlv;
|
|
print_wep_key(wep_tlv);
|
|
break;
|
|
case MRVL_STA_MAC_ADDR_FILTER_TLV_ID:
|
|
filter_tlv = (tlvbuf_sta_mac_addr_filter *)pcurrent_tlv;
|
|
print_mac_filter(filter_tlv);
|
|
break;
|
|
case MRVL_MAX_STA_CNT_TLV_ID:
|
|
max_sta_tlv = (tlvbuf_max_sta_num *)pcurrent_tlv;
|
|
tlv_val_16 =
|
|
*(t_u8 *)&max_sta_tlv->max_sta_num_configured;
|
|
tlv_val_16 |=
|
|
(*
|
|
((t_u8 *)&max_sta_tlv->max_sta_num_configured +
|
|
1) << 8);
|
|
printf("Max Station Number configured = %d\n",
|
|
tlv_val_16);
|
|
if (max_sta_tlv->length == 4) {
|
|
tlv_val_16 =
|
|
*(t_u8 *)&max_sta_tlv->
|
|
max_sta_num_supported;
|
|
tlv_val_16 |=
|
|
(*
|
|
((t_u8 *)&max_sta_tlv->
|
|
max_sta_num_supported + 1) << 8);
|
|
printf("Max Station Number supported = %d\n",
|
|
tlv_val_16);
|
|
}
|
|
break;
|
|
case MRVL_RETRY_LIMIT_TLV_ID:
|
|
retry_limit_tlv = (tlvbuf_retry_limit *)pcurrent_tlv;
|
|
printf("Retry Limit = %d\n",
|
|
retry_limit_tlv->retry_limit);
|
|
break;
|
|
case MRVL_EAPOL_PWK_HSK_TIMEOUT_TLV_ID:
|
|
pwk_timeout_tlv =
|
|
(tlvbuf_eapol_pwk_hsk_timeout *)pcurrent_tlv;
|
|
pwk_timeout_tlv->pairwise_update_timeout =
|
|
uap_le32_to_cpu(pwk_timeout_tlv->
|
|
pairwise_update_timeout);
|
|
printf("Pairwise handshake timeout = %d\n",
|
|
pwk_timeout_tlv->pairwise_update_timeout);
|
|
break;
|
|
case MRVL_EAPOL_PWK_HSK_RETRIES_TLV_ID:
|
|
pwk_retries_tlv =
|
|
(tlvbuf_eapol_pwk_hsk_retries *)pcurrent_tlv;
|
|
pwk_retries_tlv->pwk_retries =
|
|
uap_le32_to_cpu(pwk_retries_tlv->pwk_retries);
|
|
printf("Pairwise handshake retries = %d\n",
|
|
pwk_retries_tlv->pwk_retries);
|
|
break;
|
|
case MRVL_EAPOL_GWK_HSK_TIMEOUT_TLV_ID:
|
|
gwk_timeout_tlv =
|
|
(tlvbuf_eapol_gwk_hsk_timeout *)pcurrent_tlv;
|
|
gwk_timeout_tlv->groupwise_update_timeout =
|
|
uap_le32_to_cpu(gwk_timeout_tlv->
|
|
groupwise_update_timeout);
|
|
printf("Groupwise handshake timeout = %d\n",
|
|
gwk_timeout_tlv->groupwise_update_timeout);
|
|
break;
|
|
case MRVL_EAPOL_GWK_HSK_RETRIES_TLV_ID:
|
|
gwk_retries_tlv =
|
|
(tlvbuf_eapol_gwk_hsk_retries *)pcurrent_tlv;
|
|
gwk_retries_tlv->gwk_retries =
|
|
uap_le32_to_cpu(gwk_retries_tlv->gwk_retries);
|
|
printf("Groupwise handshake retries = %d\n",
|
|
gwk_retries_tlv->gwk_retries);
|
|
break;
|
|
case MRVL_MGMT_IE_LIST_TLV_ID:
|
|
custom_ie_tlv = (tlvbuf_custom_ie *)pcurrent_tlv;
|
|
custom_ie_len = tlv_len;
|
|
custom_ie_ptr = (custom_ie *)(custom_ie_tlv->ie_data);
|
|
while (custom_ie_len >= sizeof(custom_ie)) {
|
|
custom_ie_ptr->ie_index =
|
|
uap_le16_to_cpu(custom_ie_ptr->
|
|
ie_index);
|
|
custom_ie_ptr->ie_length =
|
|
uap_le16_to_cpu(custom_ie_ptr->
|
|
ie_length);
|
|
custom_ie_ptr->mgmt_subtype_mask =
|
|
uap_le16_to_cpu(custom_ie_ptr->
|
|
mgmt_subtype_mask);
|
|
printf("Index [%d]\n", custom_ie_ptr->ie_index);
|
|
if (custom_ie_ptr->ie_length)
|
|
printf("Management Subtype Mask = 0x%02x\n", custom_ie_ptr->mgmt_subtype_mask == 0 ? UAP_CUSTOM_IE_AUTO_MASK : custom_ie_ptr->mgmt_subtype_mask);
|
|
else
|
|
printf("Management Subtype Mask = 0x%02x\n", custom_ie_ptr->mgmt_subtype_mask);
|
|
hexdump_data("IE Buffer",
|
|
(void *)custom_ie_ptr->ie_buffer,
|
|
(custom_ie_ptr->ie_length), ' ');
|
|
custom_ie_len -=
|
|
sizeof(custom_ie) +
|
|
custom_ie_ptr->ie_length;
|
|
custom_ie_ptr =
|
|
(custom_ie *)((t_u8 *)custom_ie_ptr +
|
|
sizeof(custom_ie) +
|
|
custom_ie_ptr->ie_length);
|
|
}
|
|
custom_ie_present = 1;
|
|
break;
|
|
case MRVL_MAX_MGMT_IE_TLV_ID:
|
|
max_mgmt_ie_tlv = (tlvbuf_max_mgmt_ie *)pcurrent_tlv;
|
|
max_mgmt_ie_tlv->count =
|
|
uap_le16_to_cpu(max_mgmt_ie_tlv->count);
|
|
for (i = 0; i < max_mgmt_ie_tlv->count; i++) {
|
|
max_mgmt_ie_tlv->info[i].buf_size =
|
|
uap_le16_to_cpu(max_mgmt_ie_tlv->
|
|
info[i].buf_size);
|
|
max_mgmt_ie_tlv->info[i].buf_count =
|
|
uap_le16_to_cpu(max_mgmt_ie_tlv->
|
|
info[i].buf_count);
|
|
printf("buf%d_size = %d\n", i,
|
|
max_mgmt_ie_tlv->info[i].buf_size);
|
|
printf("number of buffers = %d\n",
|
|
max_mgmt_ie_tlv->info[i].buf_count);
|
|
printf("\n");
|
|
}
|
|
max_mgmt_ie_print = 1;
|
|
break;
|
|
case MRVL_BT_COEX_COMMON_CFG_TLV_ID:
|
|
printf("Coex common configuration:\n");
|
|
coex_common_tlv =
|
|
(tlvbuf_coex_common_cfg *)pcurrent_tlv;
|
|
printf("\tConfig Bitmap = 0x%02x\n",
|
|
uap_le32_to_cpu(coex_common_tlv->config_bitmap));
|
|
printf("\tAP Coex Enabled = %d\n",
|
|
uap_le32_to_cpu(coex_common_tlv->ap_bt_coex));
|
|
break;
|
|
|
|
case MRVL_BT_COEX_SCO_CFG_TLV_ID:
|
|
printf("Coex sco configuration:\n");
|
|
coex_sco_tlv = (tlvbuf_coex_sco_cfg *)pcurrent_tlv;
|
|
for (i = 0; i < 4; i++)
|
|
printf("\tQtime protection [%d] = %d usecs\n",
|
|
i,
|
|
uap_le16_to_cpu(coex_sco_tlv->
|
|
protection_qtime[i]));
|
|
printf("\tProtection frame rate = %d\n",
|
|
uap_le16_to_cpu(coex_sco_tlv->protection_rate));
|
|
printf("\tACL frequency = %d\n",
|
|
uap_le16_to_cpu(coex_sco_tlv->acl_frequency));
|
|
break;
|
|
|
|
case MRVL_BT_COEX_ACL_CFG_TLV_ID:
|
|
printf("Coex acl configuration: ");
|
|
coex_acl_tlv = (tlvbuf_coex_acl_cfg *)pcurrent_tlv;
|
|
coex_acl_tlv->enabled =
|
|
uap_le16_to_cpu(coex_acl_tlv->enabled);
|
|
printf("%s\n",
|
|
(coex_acl_tlv->
|
|
enabled) ? "enabled" : "disabled");
|
|
if (coex_acl_tlv->enabled) {
|
|
printf("\tBT time = %d usecs\n",
|
|
uap_le16_to_cpu(coex_acl_tlv->bt_time));
|
|
printf("\tWLan time = %d usecs\n",
|
|
uap_le16_to_cpu(coex_acl_tlv->
|
|
wlan_time));
|
|
printf("\tProtection frame rate = %d\n",
|
|
uap_le16_to_cpu(coex_acl_tlv->
|
|
protection_rate));
|
|
}
|
|
break;
|
|
|
|
case MRVL_BT_COEX_STATS_TLV_ID:
|
|
printf("Coex statistics: \n");
|
|
coex_stats_tlv = (tlvbuf_coex_stats *)pcurrent_tlv;
|
|
printf("\tNull not sent = %d\n",
|
|
uap_le32_to_cpu(coex_stats_tlv->null_not_sent));
|
|
printf("\tNull queued = %d\n",
|
|
uap_le32_to_cpu(coex_stats_tlv->null_queued));
|
|
printf("\tNull not queued = %d\n",
|
|
uap_le32_to_cpu(coex_stats_tlv->
|
|
null_not_queued));
|
|
printf("\tCF End queued = %d\n",
|
|
uap_le32_to_cpu(coex_stats_tlv->cf_end_queued));
|
|
printf("\tCF End not queued = %d\n",
|
|
uap_le32_to_cpu(coex_stats_tlv->
|
|
cf_end_not_queued));
|
|
printf("\tNull allocation failures = %d\n",
|
|
uap_le32_to_cpu(coex_stats_tlv->
|
|
null_alloc_fail));
|
|
printf("\tCF End allocation failures = %d\n",
|
|
uap_le32_to_cpu(coex_stats_tlv->
|
|
cf_end_alloc_fail));
|
|
break;
|
|
case HT_CAPABILITY_TLV_ID:
|
|
printf("\nHT Capability Info: \n");
|
|
ht_cap_tlv = (tlvbuf_htcap_t *)pcurrent_tlv;
|
|
if (!ht_cap_tlv->ht_cap.supported_mcs_set[0]) {
|
|
printf("802.11n is disabled\n");
|
|
} else {
|
|
printf("802.11n is enabled\n");
|
|
printf("ht_cap_info=0x%x, ampdu_param=0x%x tx_bf_cap=%#x\n", uap_le16_to_cpu(ht_cap_tlv->ht_cap.ht_cap_info), ht_cap_tlv->ht_cap.ampdu_param, uap_le32_to_cpu(ht_cap_tlv->ht_cap.tx_bf_cap));
|
|
printf("supported MCS set:\n");
|
|
for (i = 0; i < MCS_SET_LEN; i++) {
|
|
printf("0x%x ",
|
|
ht_cap_tlv->ht_cap.
|
|
supported_mcs_set[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
break;
|
|
case HT_INFO_TLV_ID:
|
|
ht_info_tlv = (tlvbuf_htinfo_t *)pcurrent_tlv;
|
|
if (ht_info_tlv->length) {
|
|
printf("\nHT Information Element: \n");
|
|
printf("Primary channel = %d\n",
|
|
ht_info_tlv->ht_info.pri_chan);
|
|
printf("Secondary channel offset = %d\n",
|
|
(int)GET_SECONDARY_CHAN(ht_info_tlv->
|
|
ht_info.field2));
|
|
printf("STA channel width = %dMHz\n",
|
|
IS_CHANNEL_WIDTH_40(ht_info_tlv->ht_info.
|
|
field2) ? 40 : 20);
|
|
printf("RIFS %s\n",
|
|
IS_RIFS_ALLOWED(ht_info_tlv->ht_info.
|
|
field2) ? "Allowed" :
|
|
"Prohibited");
|
|
ht_info_tlv->ht_info.field3 =
|
|
uap_le16_to_cpu(ht_info_tlv->ht_info.
|
|
field3);
|
|
ht_info_tlv->ht_info.field4 =
|
|
uap_le16_to_cpu(ht_info_tlv->ht_info.
|
|
field4);
|
|
printf("HT Protection = %d\n",
|
|
(int)GET_HT_PROTECTION(ht_info_tlv->
|
|
ht_info.field3));
|
|
printf("Non-Greenfield HT STAs present: %s\n",
|
|
NONGF_STA_PRESENT(ht_info_tlv->ht_info.
|
|
field3) ? "Yes" :
|
|
"No");
|
|
printf("OBSS Non-HT STAs present: %s\n",
|
|
OBSS_NONHT_STA_PRESENT(ht_info_tlv->
|
|
ht_info.
|
|
field3) ? "Yes" :
|
|
"No");
|
|
for (i = 0; i < MCS_SET_LEN; i++) {
|
|
if (ht_info_tlv->ht_info.
|
|
basic_mcs_set[i]) {
|
|
printf("Basic_mcs_set: \n");
|
|
flag = 1;
|
|
break;
|
|
}
|
|
}
|
|
if (flag) {
|
|
for (i = 0; i < MCS_SET_LEN; i++)
|
|
printf("%x ",
|
|
ht_info_tlv->ht_info.
|
|
basic_mcs_set[i]);
|
|
printf("\n");
|
|
}
|
|
}
|
|
break;
|
|
case MRVL_2040_BSS_COEX_CONTROL_TLV_ID:
|
|
coex_2040_tlv = (tlvbuf_2040_coex *)pcurrent_tlv;
|
|
printf("20/40 coex = %s\n",
|
|
(coex_2040_tlv->
|
|
enable) ? "enabled" : "disabled");
|
|
break;
|
|
case VENDOR_SPECIFIC_IE_TLV_ID:
|
|
wmm_para_tlv = (tlvbuf_wmm_para_t *)pcurrent_tlv;
|
|
printf("wmm parameters:\n");
|
|
printf("\tqos_info = 0x%x\n",
|
|
wmm_para_tlv->wmm_para.qos_info);
|
|
printf("\tBE: AIFSN=%d, CW_MAX=%d CW_MIN=%d, TXOP=%d\n",
|
|
wmm_para_tlv->wmm_para.ac_params[AC_BE].
|
|
aci_aifsn.aifsn,
|
|
wmm_para_tlv->wmm_para.ac_params[AC_BE].ecw.
|
|
ecw_max,
|
|
wmm_para_tlv->wmm_para.ac_params[AC_BE].ecw.
|
|
ecw_min,
|
|
uap_le16_to_cpu(wmm_para_tlv->wmm_para.
|
|
ac_params[AC_BE].tx_op_limit));
|
|
printf("\tBK: AIFSN=%d, CW_MAX=%d CW_MIN=%d, TXOP=%d\n",
|
|
wmm_para_tlv->wmm_para.ac_params[AC_BK].
|
|
aci_aifsn.aifsn,
|
|
wmm_para_tlv->wmm_para.ac_params[AC_BK].ecw.
|
|
ecw_max,
|
|
wmm_para_tlv->wmm_para.ac_params[AC_BK].ecw.
|
|
ecw_min,
|
|
uap_le16_to_cpu(wmm_para_tlv->wmm_para.
|
|
ac_params[AC_BK].tx_op_limit));
|
|
printf("\tVI: AIFSN=%d, CW_MAX=%d CW_MIN=%d, TXOP=%d\n",
|
|
wmm_para_tlv->wmm_para.ac_params[AC_VI].
|
|
aci_aifsn.aifsn,
|
|
wmm_para_tlv->wmm_para.ac_params[AC_VI].ecw.
|
|
ecw_max,
|
|
wmm_para_tlv->wmm_para.ac_params[AC_VI].ecw.
|
|
ecw_min,
|
|
uap_le16_to_cpu(wmm_para_tlv->wmm_para.
|
|
ac_params[AC_VI].tx_op_limit));
|
|
printf("\tVO: AIFSN=%d, CW_MAX=%d CW_MIN=%d, TXOP=%d\n",
|
|
wmm_para_tlv->wmm_para.ac_params[AC_VO].
|
|
aci_aifsn.aifsn,
|
|
wmm_para_tlv->wmm_para.ac_params[AC_VO].ecw.
|
|
ecw_max,
|
|
wmm_para_tlv->wmm_para.ac_params[AC_VO].ecw.
|
|
ecw_min,
|
|
uap_le16_to_cpu(wmm_para_tlv->wmm_para.
|
|
ac_params[AC_VO].tx_op_limit));
|
|
break;
|
|
#ifdef RX_PACKET_COALESCE
|
|
case MRVL_RX_PKT_COAL_TLV_ID:
|
|
rx_pkt_coal_tlv = (tlvbuf_rx_pkt_coal_t *)pcurrent_tlv;
|
|
printf("RX packet coalesce threshold=%d\n",
|
|
uap_le32_to_cpu(rx_pkt_coal_tlv->rx_pkt_count));
|
|
printf("RX packet coalesce timeout in msec=%d\n",
|
|
uap_le16_to_cpu(rx_pkt_coal_tlv->delay));
|
|
break;
|
|
#endif
|
|
default:
|
|
break;
|
|
}
|
|
tlv_buf_left -= (sizeof(tlvbuf_header) + tlv_len);
|
|
pcurrent_tlv = (tlvbuf_header *)(pcurrent_tlv->data + tlv_len);
|
|
}
|
|
return;
|
|
}
|
|
|
|
/**
|
|
* @brief Checks if command requires driver handling, and if so,
|
|
* repackage and send as regular command, instead of hostcmd.
|
|
*
|
|
* @param cmd Pointer to the command buffer
|
|
* @param size Pointer to the command size. This value is
|
|
* overwritten by the function with the size of the
|
|
* received response.
|
|
* @param buf_size Size of the allocated command buffer
|
|
* @param reroute_ret Pointer to return value of rerouted command
|
|
* @return UAP_SUCCESS (handled here, further processing not needed)
|
|
* or UAP_FAILURE (not handled here, proceed as usual)
|
|
*/
|
|
static int
|
|
uap_ioctl_reroute(t_u8 *cmd, t_u16 *size, t_u16 buf_size, int *reroute_ret)
|
|
{
|
|
t_u8 reroute = 0;
|
|
t_u16 cmd_code = 0;
|
|
t_u16 cmd_action = 0;
|
|
apcmdbuf_cfg_80211d *hcmd_domain = NULL;
|
|
apcmdbuf_snmp_mib *hcmd_snmp = NULL;
|
|
tlvbuf_header *tlv = NULL;
|
|
struct ifreq ifr;
|
|
t_s32 sockfd;
|
|
t_u8 *buf = NULL;
|
|
t_u16 buf_len = 0;
|
|
snmp_mib_param *snmp_param = NULL;
|
|
domain_info_param *domain_param = NULL;
|
|
|
|
/* assume input is a hostcmd */
|
|
cmd_code = ((apcmdbuf *)(cmd))->cmd_code;
|
|
|
|
/* just check if we need to re-route right now */
|
|
switch (cmd_code) {
|
|
case HostCmd_SNMP_MIB:
|
|
hcmd_snmp = (apcmdbuf_snmp_mib *)cmd;
|
|
tlv = (tlvbuf_header *)(cmd + sizeof(apcmdbuf_snmp_mib));
|
|
cmd_action = uap_le16_to_cpu(hcmd_snmp->action);
|
|
/* reroute CMD_SNMP_MIB: SET */
|
|
if (cmd_action == ACTION_SET) {
|
|
reroute = 1;
|
|
buf_len =
|
|
sizeof(snmp_mib_param) +
|
|
uap_le16_to_cpu(tlv->len);
|
|
}
|
|
break;
|
|
case HostCmd_CMD_802_11D_DOMAIN_INFO:
|
|
hcmd_domain = (apcmdbuf_cfg_80211d *)cmd;
|
|
cmd_action = uap_le16_to_cpu(hcmd_domain->action);
|
|
/* reroute CMD_DOMAIN_INFO: SET */
|
|
if (cmd_action == ACTION_SET) {
|
|
reroute = 1;
|
|
buf_len = sizeof(domain_info_param) + (*size
|
|
-
|
|
sizeof
|
|
(apcmdbuf_cfg_80211d)
|
|
+
|
|
sizeof
|
|
(domain_param_t));
|
|
}
|
|
break;
|
|
}
|
|
|
|
/* Exit early if not re-routing */
|
|
if (!reroute || uap_ioctl_no_reroute)
|
|
return UAP_FAILURE;
|
|
|
|
/* Prepare buffer */
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG, "DBG: rerouting CMD 0x%04x\n", cmd_code);
|
|
#endif
|
|
buf = (t_u8 *)malloc(buf_len);
|
|
if (!buf) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
goto done_no_socket;
|
|
}
|
|
memset(buf, 0, buf_len);
|
|
|
|
/* Prepare param */
|
|
switch (cmd_code) {
|
|
case HostCmd_SNMP_MIB:
|
|
snmp_param = (snmp_mib_param *)buf;
|
|
snmp_param->subcmd = UAP_SNMP_MIB;
|
|
snmp_param->action = cmd_action;
|
|
snmp_param->oid = uap_le16_to_cpu(tlv->type);
|
|
snmp_param->oid_val_len = uap_le16_to_cpu(tlv->len);
|
|
memcpy(snmp_param->oid_value, tlv->data,
|
|
MIN(sizeof(t_u32), snmp_param->oid_val_len));
|
|
break;
|
|
case HostCmd_CMD_802_11D_DOMAIN_INFO:
|
|
domain_param = (domain_info_param *)buf;
|
|
domain_param->subcmd = UAP_DOMAIN_INFO;
|
|
domain_param->action = cmd_action;
|
|
memcpy(domain_param->tlv, &hcmd_domain->domain,
|
|
buf_len - sizeof(domain_info_param));
|
|
tlv = (tlvbuf_header *)domain_param->tlv;
|
|
tlv->type = uap_le16_to_cpu(tlv->type);
|
|
tlv->len = uap_le16_to_cpu(tlv->len);
|
|
|
|
break;
|
|
}
|
|
#if DEBUG
|
|
/* Dump request buffer */
|
|
hexdump("Reroute Request buffer", buf, buf_len, ' ');
|
|
#endif
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
goto done_no_socket;
|
|
}
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)buf;
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, UAP_IOCTL_CMD, &ifr)) {
|
|
*reroute_ret = UAP_FAILURE;
|
|
perror("");
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG, "ERR: reroute of CMD 0x%04x failed\n",
|
|
cmd_code);
|
|
#endif
|
|
goto done;
|
|
}
|
|
*reroute_ret = UAP_SUCCESS;
|
|
|
|
done:
|
|
/* Close socket */
|
|
close(sockfd);
|
|
done_no_socket:
|
|
if (buf)
|
|
free(buf);
|
|
|
|
return UAP_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* @brief Performs the ioctl operation to send the command to
|
|
* the driver.
|
|
*
|
|
* @param cmd Pointer to the command buffer
|
|
* @param size Pointer to the command size. This value is
|
|
* overwritten by the function with the size of the
|
|
* received response.
|
|
* @param buf_size Size of the allocated command buffer
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
uap_ioctl(t_u8 *cmd, t_u16 *size, t_u16 buf_size)
|
|
{
|
|
struct ifreq ifr;
|
|
apcmdbuf *header = NULL;
|
|
t_s32 sockfd;
|
|
int reroute_ret = 0;
|
|
mrvl_priv_cmd *mrvl_cmd = NULL;
|
|
t_u8 *buf = NULL, *temp = NULL;
|
|
t_u16 mrvl_header_len = 0;
|
|
int ret = UAP_SUCCESS;
|
|
|
|
#ifdef WIFI_DIRECT_SUPPORT
|
|
if (strncmp(dev_name, "wfd", 3))
|
|
#endif
|
|
if (uap_ioctl_reroute(cmd, size, buf_size, &reroute_ret) ==
|
|
UAP_SUCCESS) {
|
|
return reroute_ret;
|
|
}
|
|
|
|
if (buf_size < *size) {
|
|
printf("buf_size should not less than cmd buffer size\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/* Open socket */
|
|
if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
|
printf("ERR:Cannot open socket\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
*(t_u32 *)cmd = buf_size - BUF_HEADER_SIZE;
|
|
|
|
mrvl_header_len = strlen(CMD_NXP) + strlen(PRIV_CMD_HOSTCMD);
|
|
buf = (unsigned char *)malloc(buf_size + sizeof(mrvl_priv_cmd) +
|
|
mrvl_header_len);
|
|
if (buf == NULL) {
|
|
close(sockfd);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
memset(buf, 0, buf_size + sizeof(mrvl_priv_cmd) + mrvl_header_len);
|
|
/* Fill up buffer */
|
|
mrvl_cmd = (mrvl_priv_cmd *)buf;
|
|
mrvl_cmd->buf = buf + sizeof(mrvl_priv_cmd);
|
|
mrvl_cmd->used_len = 0;
|
|
mrvl_cmd->total_len = buf_size + mrvl_header_len;
|
|
/* Copy NXP command string */
|
|
temp = mrvl_cmd->buf;
|
|
strncpy((char *)temp, CMD_NXP, strlen(CMD_NXP));
|
|
temp += (strlen(CMD_NXP));
|
|
/* Insert command string */
|
|
strncpy((char *)temp, PRIV_CMD_HOSTCMD, strlen(PRIV_CMD_HOSTCMD));
|
|
temp += (strlen(PRIV_CMD_HOSTCMD));
|
|
|
|
memcpy(temp, (t_u8 *)cmd, *size);
|
|
|
|
/* Initialize the ifr structure */
|
|
memset(&ifr, 0, sizeof(ifr));
|
|
strncpy(ifr.ifr_ifrn.ifrn_name, dev_name, IFNAMSIZ - 1);
|
|
ifr.ifr_ifru.ifru_data = (void *)mrvl_cmd;
|
|
header = (apcmdbuf *)(buf + sizeof(mrvl_priv_cmd) + mrvl_header_len);
|
|
header->size = *size - BUF_HEADER_SIZE;
|
|
if (header->cmd_code == APCMD_SYS_CONFIGURE) {
|
|
apcmdbuf_sys_configure *sys_cfg;
|
|
sys_cfg = (apcmdbuf_sys_configure *)header;
|
|
sys_cfg->action = uap_cpu_to_le16(sys_cfg->action);
|
|
}
|
|
endian_convert_request_header(header);
|
|
#if DEBUG
|
|
/* Dump request buffer */
|
|
hexdump("Request buffer", mrvl_cmd,
|
|
*size + sizeof(mrvl_priv_cmd) + mrvl_header_len, ' ');
|
|
#endif
|
|
/* Perform ioctl */
|
|
errno = 0;
|
|
if (ioctl(sockfd, MRVLPRIVCMD, &ifr)) {
|
|
perror("");
|
|
printf("ERR:MRVLPRIVCMD is not supported by %s\n", dev_name);
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
endian_convert_response_header(header);
|
|
header->cmd_code &= HostCmd_CMD_ID_MASK;
|
|
header->cmd_code |= APCMD_RESP_CHECK;
|
|
*size = header->size;
|
|
|
|
/* Validate response size */
|
|
if (*size > (buf_size - BUF_HEADER_SIZE)) {
|
|
printf("ERR:Response size (%d) greater than buffer size (%d)! Aborting!\n", *size, buf_size);
|
|
ret = UAP_FAILURE;
|
|
goto done;
|
|
}
|
|
memcpy(cmd, (t_u8 *)header, *size + BUF_HEADER_SIZE);
|
|
#if DEBUG
|
|
/* Dump respond buffer */
|
|
hexdump("Respond buffer", mrvl_cmd,
|
|
*size + BUF_HEADER_SIZE + sizeof(mrvl_priv_cmd) +
|
|
mrvl_header_len, ' ');
|
|
#endif
|
|
|
|
done:
|
|
/* Close socket */
|
|
close(sockfd);
|
|
if (buf)
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Get protocol from the firmware
|
|
*
|
|
* @param proto A pointer to protocol var
|
|
* @return UAP_SUCCESS/UAP_FAILURE
|
|
*/
|
|
int
|
|
get_sys_cfg_protocol(t_u16 *proto)
|
|
{
|
|
apcmdbuf_sys_configure *cmd_buf = NULL;
|
|
tlvbuf_protocol *tlv = NULL;
|
|
t_u8 *buffer = NULL;
|
|
t_u16 cmd_len;
|
|
int ret = UAP_FAILURE;
|
|
|
|
cmd_len = sizeof(apcmdbuf_sys_configure) + sizeof(tlvbuf_protocol);
|
|
/* Initialize the command buffer */
|
|
buffer = (t_u8 *)malloc(cmd_len);
|
|
if (!buffer) {
|
|
printf("ERR:Cannot allocate buffer for command!\n");
|
|
return ret;
|
|
}
|
|
memset(buffer, 0, cmd_len);
|
|
/* Locate headers */
|
|
cmd_buf = (apcmdbuf_sys_configure *)buffer;
|
|
tlv = (tlvbuf_protocol *)(buffer + sizeof(apcmdbuf_sys_configure));
|
|
/* Fill the command buffer */
|
|
cmd_buf->cmd_code = APCMD_SYS_CONFIGURE;
|
|
cmd_buf->size = cmd_len;
|
|
cmd_buf->seq_num = 0;
|
|
cmd_buf->result = 0;
|
|
cmd_buf->action = ACTION_GET;
|
|
tlv->tag = MRVL_PROTOCOL_TLV_ID;
|
|
tlv->length = 2;
|
|
endian_convert_tlv_header_out(tlv);
|
|
/* Send the command */
|
|
ret = uap_ioctl((t_u8 *)cmd_buf, &cmd_len, cmd_len);
|
|
endian_convert_tlv_header_in(tlv);
|
|
|
|
/* Process response */
|
|
if (ret == UAP_SUCCESS) {
|
|
/* Verify response */
|
|
if (cmd_buf->cmd_code !=
|
|
(APCMD_SYS_CONFIGURE | APCMD_RESP_CHECK)) {
|
|
printf("ERR:Corrupted response! cmd_code=%x, Tlv->tag=%x\n", cmd_buf->cmd_code, tlv->tag);
|
|
free(buffer);
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
if (cmd_buf->result == CMD_SUCCESS) {
|
|
tlv->protocol = uap_le16_to_cpu(tlv->protocol);
|
|
memcpy(proto, &tlv->protocol, sizeof(tlv->protocol));
|
|
} else {
|
|
ret = UAP_FAILURE;
|
|
}
|
|
}
|
|
if (buffer)
|
|
free(buffer);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* @brief Check cipher is valid or not
|
|
*
|
|
* @param pairwisecipher Pairwise cipher
|
|
* @param groupcipher Group cipher
|
|
* @param protocol Protocol
|
|
* @param enable_11n 11n enabled or not.
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
is_cipher_valid_with_11n(int pairwisecipher, int groupcipher,
|
|
int protocol, int enable_11n)
|
|
{
|
|
if ((pairwisecipher == CIPHER_NONE) && (groupcipher == CIPHER_NONE))
|
|
return UAP_SUCCESS;
|
|
if (pairwisecipher == CIPHER_TKIP) {
|
|
/* Ok to have TKIP in mixed mode */
|
|
if (enable_11n && protocol != PROTOCOL_WPA2_MIXED) {
|
|
printf("ERR: WPA/TKIP cannot be used when AP operates in 802.11n mode.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
if ((pairwisecipher == CIPHER_TKIP) && (groupcipher == CIPHER_TKIP))
|
|
return UAP_SUCCESS;
|
|
if ((pairwisecipher == CIPHER_AES_CCMP) &&
|
|
(groupcipher == CIPHER_AES_CCMP))
|
|
return UAP_SUCCESS;
|
|
if ((pairwisecipher == CIPHER_AES_CCMP) && (groupcipher == CIPHER_TKIP))
|
|
return UAP_SUCCESS;
|
|
if ((pairwisecipher == CIPHER_BITMAP) && (groupcipher == CIPHER_TKIP))
|
|
return UAP_SUCCESS;
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/**
|
|
* @brief Check cipher is valid or not based on proto
|
|
*
|
|
* @param pairwisecipher Pairwise cipher
|
|
* @param groupcipher Group cipher
|
|
* @param protocol Protocol
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
is_cipher_valid_with_proto(int pairwisecipher, int groupcipher, int protocol)
|
|
{
|
|
HTCap_t htcap;
|
|
|
|
if ((pairwisecipher == CIPHER_NONE) && (groupcipher == CIPHER_NONE))
|
|
return UAP_SUCCESS;
|
|
if (pairwisecipher == CIPHER_TKIP) {
|
|
/* Ok to have TKIP in mixed mode */
|
|
if (protocol != PROTOCOL_WPA2_MIXED) {
|
|
memset(&htcap, 0, sizeof(htcap));
|
|
if (UAP_SUCCESS == get_sys_cfg_11n(&htcap)) {
|
|
if (htcap.supported_mcs_set[0]) {
|
|
printf("ERR: WPA/TKIP cannot be used when AP operates in 802.11n mode.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if ((pairwisecipher == CIPHER_TKIP) && (groupcipher == CIPHER_TKIP))
|
|
return UAP_SUCCESS;
|
|
if ((pairwisecipher == CIPHER_AES_CCMP) &&
|
|
(groupcipher == CIPHER_AES_CCMP))
|
|
return UAP_SUCCESS;
|
|
if ((pairwisecipher == CIPHER_AES_CCMP) && (groupcipher == CIPHER_TKIP))
|
|
return UAP_SUCCESS;
|
|
if ((pairwisecipher == CIPHER_BITMAP) && (groupcipher == CIPHER_TKIP))
|
|
return UAP_SUCCESS;
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/**
|
|
* @brief Check cipher is valid or not
|
|
*
|
|
* @param pairwisecipher Pairwise cipher
|
|
* @param groupcipher Group cipher
|
|
* @return UAP_SUCCESS or UAP_FAILURE
|
|
*/
|
|
int
|
|
is_cipher_valid(int pairwisecipher, int groupcipher)
|
|
{
|
|
HTCap_t htcap;
|
|
t_u16 proto = 0;
|
|
|
|
if ((pairwisecipher == CIPHER_NONE) && (groupcipher == CIPHER_NONE))
|
|
return UAP_SUCCESS;
|
|
if (pairwisecipher == CIPHER_TKIP) {
|
|
if (UAP_SUCCESS == get_sys_cfg_protocol(&proto)) {
|
|
/* Ok to have TKIP in mixed mode */
|
|
if (proto != PROTOCOL_WPA2_MIXED) {
|
|
memset(&htcap, 0, sizeof(htcap));
|
|
if (UAP_SUCCESS == get_sys_cfg_11n(&htcap)) {
|
|
if (htcap.supported_mcs_set[0]) {
|
|
printf("ERR: WPA/TKIP cannot be used when AP operates in 802.11n mode.\n");
|
|
return UAP_FAILURE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if ((pairwisecipher == CIPHER_TKIP) && (groupcipher == CIPHER_TKIP))
|
|
return UAP_SUCCESS;
|
|
if ((pairwisecipher == CIPHER_AES_CCMP) &&
|
|
(groupcipher == CIPHER_AES_CCMP))
|
|
return UAP_SUCCESS;
|
|
if ((pairwisecipher == CIPHER_AES_CCMP) && (groupcipher == CIPHER_TKIP))
|
|
return UAP_SUCCESS;
|
|
if ((pairwisecipher == CIPHER_BITMAP) && (groupcipher == CIPHER_TKIP))
|
|
return UAP_SUCCESS;
|
|
return UAP_FAILURE;
|
|
}
|
|
|
|
/**
|
|
* @brief The main function
|
|
*
|
|
* @param argc Number of arguments
|
|
* @param argv Pointer to the arguments
|
|
* @return 0 or 1
|
|
*/
|
|
int
|
|
main(int argc, char *argv[])
|
|
{
|
|
int opt, i;
|
|
int ret = 0;
|
|
memset(dev_name, 0, sizeof(dev_name));
|
|
strcpy(dev_name, DEFAULT_DEV_NAME);
|
|
|
|
/* Parse arguments */
|
|
while ((opt =
|
|
getopt_long(argc, argv, "+hi:d:v", ap_options, NULL)) != -1) {
|
|
switch (opt) {
|
|
case 'i':
|
|
if (strlen(optarg) < IFNAMSIZ) {
|
|
memset(dev_name, 0, sizeof(dev_name));
|
|
strncpy(dev_name, optarg, strlen(optarg));
|
|
}
|
|
printf("dev_name:%s\n", dev_name);
|
|
break;
|
|
case 'v':
|
|
printf("uaputl.exe - uAP utility ver %s\n",
|
|
UAP_VERSION);
|
|
exit(0);
|
|
case 'd':
|
|
debug_level = strtoul(optarg, NULL, 10);
|
|
#if DEBUG
|
|
uap_printf(MSG_DEBUG, "debug_level=%x\n", debug_level);
|
|
#endif
|
|
break;
|
|
case 'h':
|
|
default:
|
|
print_tool_usage();
|
|
exit(0);
|
|
}
|
|
}
|
|
|
|
argc -= optind;
|
|
argv += optind;
|
|
optind = 0;
|
|
|
|
if (argc < 1) {
|
|
print_tool_usage();
|
|
exit(1);
|
|
}
|
|
|
|
/* Process command */
|
|
for (i = 0; ap_command[i].cmd; i++) {
|
|
if (strncmp
|
|
(ap_command[i].cmd, argv[0], strlen(ap_command[i].cmd)))
|
|
continue;
|
|
if (strlen(ap_command[i].cmd) != strlen(argv[0]))
|
|
continue;
|
|
ret = ap_command[i].func(argc, argv);
|
|
break;
|
|
}
|
|
if (!ap_command[i].cmd) {
|
|
printf("ERR: %s is not supported\n", argv[0]);
|
|
exit(1);
|
|
}
|
|
if (ret == UAP_FAILURE)
|
|
return -1;
|
|
else
|
|
return 0;
|
|
}
|