|
@@ -77,7 +77,6 @@ static inline char *rtl819x_translate_scan(struct ieee80211_device *ieee,
|
|
|
/* Add the ESSID */
|
|
|
iwe.cmd = SIOCGIWESSID;
|
|
|
iwe.u.data.flags = 1;
|
|
|
-// if (network->flags & NETWORK_EMPTY_ESSID) {
|
|
|
if (network->ssid_len == 0) {
|
|
|
iwe.u.data.length = sizeof("<hidden>");
|
|
|
start = iwe_stream_add_point(info, start, stop, &iwe, "<hidden>");
|
|
@@ -240,9 +239,7 @@ int ieee80211_wx_get_scan(struct ieee80211_device *ieee,
|
|
|
unsigned long flags;
|
|
|
|
|
|
char *ev = extra;
|
|
|
-// char *stop = ev + IW_SCAN_MAX_DATA;
|
|
|
char *stop = ev + wrqu->data.length;//IW_SCAN_MAX_DATA;
|
|
|
- //char *stop = ev + IW_SCAN_MAX_DATA;
|
|
|
int i = 0;
|
|
|
int err = 0;
|
|
|
IEEE80211_DEBUG_WX("Getting scan\n");
|
|
@@ -511,7 +508,6 @@ int ieee80211_wx_set_encode_ext(struct ieee80211_device *ieee,
|
|
|
struct ieee80211_security sec = {
|
|
|
.flags = 0,
|
|
|
};
|
|
|
- //printk("======>encoding flag:%x,ext flag:%x, ext alg:%d\n", encoding->flags,ext->ext_flags, ext->alg);
|
|
|
idx = encoding->flags & IW_ENCODE_INDEX;
|
|
|
if (idx) {
|
|
|
if (idx < 1 || idx > WEP_KEYS)
|
|
@@ -562,7 +558,6 @@ int ieee80211_wx_set_encode_ext(struct ieee80211_device *ieee,
|
|
|
}
|
|
|
|
|
|
sec.enabled = 1;
|
|
|
- // sec.encrypt = 1;
|
|
|
|
|
|
switch (ext->alg) {
|
|
|
case IW_ENCODE_ALG_WEP:
|
|
@@ -580,7 +575,7 @@ int ieee80211_wx_set_encode_ext(struct ieee80211_device *ieee,
|
|
|
ret = -EINVAL;
|
|
|
goto done;
|
|
|
}
|
|
|
- printk("alg name:%s\n",alg);
|
|
|
+ IEEE80211_DEBUG_WX("alg name: %s\n", alg);
|
|
|
|
|
|
ops = ieee80211_get_crypto_ops(alg);
|
|
|
if (ops == NULL)
|
|
@@ -624,8 +619,6 @@ int ieee80211_wx_set_encode_ext(struct ieee80211_device *ieee,
|
|
|
goto done;
|
|
|
}
|
|
|
#if 1
|
|
|
- //skip_host_crypt:
|
|
|
- //printk("skip_host_crypt:ext_flags:%x\n", ext->ext_flags);
|
|
|
if (ext->ext_flags & IW_ENCODE_EXT_SET_TX_KEY) {
|
|
|
ieee->tx_keyidx = idx;
|
|
|
sec.active_key = idx;
|
|
@@ -633,7 +626,6 @@ int ieee80211_wx_set_encode_ext(struct ieee80211_device *ieee,
|
|
|
}
|
|
|
|
|
|
if (ext->alg != IW_ENCODE_ALG_NONE) {
|
|
|
- //memcpy(sec.keys[idx], ext->key, ext->key_len);
|
|
|
sec.key_sizes[idx] = ext->key_len;
|
|
|
sec.flags |= (1 << idx);
|
|
|
if (ext->alg == IW_ENCODE_ALG_WEP) {
|
|
@@ -690,7 +682,6 @@ int ieee80211_wx_set_auth(struct ieee80211_device *ieee,
|
|
|
switch (data->flags & IW_AUTH_INDEX) {
|
|
|
case IW_AUTH_WPA_VERSION:
|
|
|
/*need to support wpa2 here*/
|
|
|
- //printk("wpa version:%x\n", data->value);
|
|
|
break;
|
|
|
case IW_AUTH_CIPHER_PAIRWISE:
|
|
|
case IW_AUTH_CIPHER_GROUP:
|
|
@@ -708,8 +699,6 @@ int ieee80211_wx_set_auth(struct ieee80211_device *ieee,
|
|
|
break;
|
|
|
|
|
|
case IW_AUTH_80211_AUTH_ALG:
|
|
|
- //printk("======>%s():data->value is %d\n",__FUNCTION__,data->value);
|
|
|
- // ieee->open_wep = (data->value&IW_AUTH_ALG_OPEN_SYSTEM)?1:0;
|
|
|
if(data->value & IW_AUTH_ALG_SHARED_KEY){
|
|
|
ieee->open_wep = 0;
|
|
|
ieee->auth_mode = 1;
|
|
@@ -721,17 +710,14 @@ int ieee80211_wx_set_auth(struct ieee80211_device *ieee,
|
|
|
else if(data->value & IW_AUTH_ALG_LEAP){
|
|
|
ieee->open_wep = 1;
|
|
|
ieee->auth_mode = 2;
|
|
|
- //printk("hahahaa:LEAP\n");
|
|
|
}
|
|
|
else
|
|
|
return -EINVAL;
|
|
|
- //printk("open_wep:%d\n", ieee->open_wep);
|
|
|
break;
|
|
|
|
|
|
#if 1
|
|
|
case IW_AUTH_WPA_ENABLED:
|
|
|
ieee->wpa_enabled = (data->value)?1:0;
|
|
|
- //printk("enable wpa:%d\n", ieee->wpa_enabled);
|
|
|
break;
|
|
|
|
|
|
#endif
|
|
@@ -755,7 +741,6 @@ int ieee80211_wx_set_gen_ie(struct ieee80211_device *ieee, u8 *ie, size_t len)
|
|
|
|
|
|
if (len>MAX_WPA_IE_LEN || (len && ie == NULL))
|
|
|
{
|
|
|
- // printk("return error out, len:%d\n", len);
|
|
|
return -EINVAL;
|
|
|
}
|
|
|
|