Staging: rt2870: remove dead EXT_BUILD_CHANNEL_LIST code
[linux-2.6] / drivers / staging / rt2870 / sta / connect.c
1 /*
2  *************************************************************************
3  * Ralink Tech Inc.
4  * 5F., No.36, Taiyuan St., Jhubei City,
5  * Hsinchu County 302,
6  * Taiwan, R.O.C.
7  *
8  * (c) Copyright 2002-2007, Ralink Technology, Inc.
9  *
10  * This program is free software; you can redistribute it and/or modify  *
11  * it under the terms of the GNU General Public License as published by  *
12  * the Free Software Foundation; either version 2 of the License, or     *
13  * (at your option) any later version.                                   *
14  *                                                                       *
15  * This program is distributed in the hope that it will be useful,       *
16  * but WITHOUT ANY WARRANTY; without even the implied warranty of        *
17  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         *
18  * GNU General Public License for more details.                          *
19  *                                                                       *
20  * You should have received a copy of the GNU General Public License     *
21  * along with this program; if not, write to the                         *
22  * Free Software Foundation, Inc.,                                       *
23  * 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.             *
24  *                                                                       *
25  *************************************************************************
26
27         Module Name:
28         connect.c
29
30         Abstract:
31
32         Revision History:
33         Who                     When                    What
34         --------        ----------              ----------------------------------------------
35         John                    2004-08-08                      Major modification from RT2560
36 */
37 #include "../rt_config.h"
38
39 UCHAR   CipherSuiteWpaNoneTkip[] = {
40                 0x00, 0x50, 0xf2, 0x01, // oui
41                 0x01, 0x00,                             // Version
42                 0x00, 0x50, 0xf2, 0x02, // Multicast
43                 0x01, 0x00,                             // Number of unicast
44                 0x00, 0x50, 0xf2, 0x02, // unicast
45                 0x01, 0x00,                             // number of authentication method
46                 0x00, 0x50, 0xf2, 0x00  // authentication
47                 };
48 UCHAR   CipherSuiteWpaNoneTkipLen = (sizeof(CipherSuiteWpaNoneTkip) / sizeof(UCHAR));
49
50 UCHAR   CipherSuiteWpaNoneAes[] = {
51                 0x00, 0x50, 0xf2, 0x01, // oui
52                 0x01, 0x00,                             // Version
53                 0x00, 0x50, 0xf2, 0x04, // Multicast
54                 0x01, 0x00,                             // Number of unicast
55                 0x00, 0x50, 0xf2, 0x04, // unicast
56                 0x01, 0x00,                             // number of authentication method
57                 0x00, 0x50, 0xf2, 0x00  // authentication
58                 };
59 UCHAR   CipherSuiteWpaNoneAesLen = (sizeof(CipherSuiteWpaNoneAes) / sizeof(UCHAR));
60
61 // The following MACRO is called after 1. starting an new IBSS, 2. succesfully JOIN an IBSS,
62 // or 3. succesfully ASSOCIATE to a BSS, 4. successfully RE_ASSOCIATE to a BSS
63 // All settings successfuly negotiated furing MLME state machines become final settings
64 // and are copied to pAd->StaActive
65 #define COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(_pAd)                                 \
66 {                                                                                       \
67         (_pAd)->CommonCfg.SsidLen = (_pAd)->MlmeAux.SsidLen;                                \
68         NdisMoveMemory((_pAd)->CommonCfg.Ssid, (_pAd)->MlmeAux.Ssid, (_pAd)->MlmeAux.SsidLen); \
69         COPY_MAC_ADDR((_pAd)->CommonCfg.Bssid, (_pAd)->MlmeAux.Bssid);                      \
70         (_pAd)->CommonCfg.Channel = (_pAd)->MlmeAux.Channel;                                \
71         (_pAd)->CommonCfg.CentralChannel = (_pAd)->MlmeAux.CentralChannel;                  \
72         (_pAd)->StaActive.Aid = (_pAd)->MlmeAux.Aid;                                        \
73         (_pAd)->StaActive.AtimWin = (_pAd)->MlmeAux.AtimWin;                                \
74         (_pAd)->StaActive.CapabilityInfo = (_pAd)->MlmeAux.CapabilityInfo;                  \
75         (_pAd)->CommonCfg.BeaconPeriod = (_pAd)->MlmeAux.BeaconPeriod;                      \
76         (_pAd)->StaActive.CfpMaxDuration = (_pAd)->MlmeAux.CfpMaxDuration;                  \
77         (_pAd)->StaActive.CfpPeriod = (_pAd)->MlmeAux.CfpPeriod;                            \
78         (_pAd)->StaActive.SupRateLen = (_pAd)->MlmeAux.SupRateLen;                          \
79         NdisMoveMemory((_pAd)->StaActive.SupRate, (_pAd)->MlmeAux.SupRate, (_pAd)->MlmeAux.SupRateLen);\
80         (_pAd)->StaActive.ExtRateLen = (_pAd)->MlmeAux.ExtRateLen;                          \
81         NdisMoveMemory((_pAd)->StaActive.ExtRate, (_pAd)->MlmeAux.ExtRate, (_pAd)->MlmeAux.ExtRateLen);\
82         NdisMoveMemory(&(_pAd)->CommonCfg.APEdcaParm, &(_pAd)->MlmeAux.APEdcaParm, sizeof(EDCA_PARM));\
83         NdisMoveMemory(&(_pAd)->CommonCfg.APQosCapability, &(_pAd)->MlmeAux.APQosCapability, sizeof(QOS_CAPABILITY_PARM));\
84         NdisMoveMemory(&(_pAd)->CommonCfg.APQbssLoad, &(_pAd)->MlmeAux.APQbssLoad, sizeof(QBSS_LOAD_PARM));\
85         COPY_MAC_ADDR((_pAd)->MacTab.Content[BSSID_WCID].Addr, (_pAd)->MlmeAux.Bssid);      \
86         (_pAd)->MacTab.Content[BSSID_WCID].Aid = (_pAd)->MlmeAux.Aid;                       \
87         (_pAd)->MacTab.Content[BSSID_WCID].PairwiseKey.CipherAlg = (_pAd)->StaCfg.PairCipher;\
88         COPY_MAC_ADDR((_pAd)->MacTab.Content[BSSID_WCID].PairwiseKey.BssId, (_pAd)->MlmeAux.Bssid);\
89         (_pAd)->MacTab.Content[BSSID_WCID].RateLen = (_pAd)->StaActive.SupRateLen + (_pAd)->StaActive.ExtRateLen;\
90 }
91
92 /*
93         ==========================================================================
94         Description:
95
96         IRQL = PASSIVE_LEVEL
97
98         ==========================================================================
99 */
100 VOID MlmeCntlInit(
101         IN PRTMP_ADAPTER pAd,
102         IN STATE_MACHINE *S,
103         OUT STATE_MACHINE_FUNC Trans[])
104 {
105         // Control state machine differs from other state machines, the interface
106         // follows the standard interface
107         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
108 }
109
110 /*
111         ==========================================================================
112         Description:
113
114         IRQL = DISPATCH_LEVEL
115
116         ==========================================================================
117 */
118 VOID MlmeCntlMachinePerformAction(
119         IN PRTMP_ADAPTER pAd,
120         IN STATE_MACHINE *S,
121         IN MLME_QUEUE_ELEM *Elem)
122 {
123         switch(pAd->Mlme.CntlMachine.CurrState)
124         {
125                 case CNTL_IDLE:
126                                 CntlIdleProc(pAd, Elem);
127                         break;
128                 case CNTL_WAIT_DISASSOC:
129                         CntlWaitDisassocProc(pAd, Elem);
130                         break;
131                 case CNTL_WAIT_JOIN:
132                         CntlWaitJoinProc(pAd, Elem);
133                         break;
134
135                 // CNTL_WAIT_REASSOC is the only state in CNTL machine that does
136                 // not triggered directly or indirectly by "RTMPSetInformation(OID_xxx)".
137                 // Therefore not protected by NDIS's "only one outstanding OID request"
138                 // rule. Which means NDIS may SET OID in the middle of ROAMing attempts.
139                 // Current approach is to block new SET request at RTMPSetInformation()
140                 // when CntlMachine.CurrState is not CNTL_IDLE
141                 case CNTL_WAIT_REASSOC:
142                         CntlWaitReassocProc(pAd, Elem);
143                         break;
144
145                 case CNTL_WAIT_START:
146                         CntlWaitStartProc(pAd, Elem);
147                         break;
148                 case CNTL_WAIT_AUTH:
149                         CntlWaitAuthProc(pAd, Elem);
150                         break;
151                 case CNTL_WAIT_AUTH2:
152                         CntlWaitAuthProc2(pAd, Elem);
153                         break;
154                 case CNTL_WAIT_ASSOC:
155                         CntlWaitAssocProc(pAd, Elem);
156                         break;
157
158                 case CNTL_WAIT_OID_LIST_SCAN:
159                         if(Elem->MsgType == MT2_SCAN_CONF)
160                         {
161                                 // Resume TxRing after SCANING complete. We hope the out-of-service time
162                                 // won't be too long to let upper layer time-out the waiting frames
163                                 RTMPResumeMsduTransmission(pAd);
164                                 if (pAd->StaCfg.CCXReqType != MSRN_TYPE_UNUSED)
165                                 {
166                                         // Cisco scan request is finished, prepare beacon report
167                                         MlmeEnqueue(pAd, AIRONET_STATE_MACHINE, MT2_AIRONET_SCAN_DONE, 0, NULL);
168                                 }
169                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
170
171                 //
172                                 // Set LED status to previous status.
173                                 //
174                                 if (pAd->bLedOnScanning)
175                                 {
176                                         pAd->bLedOnScanning = FALSE;
177                                         RTMPSetLED(pAd, pAd->LedStatus);
178                                 }
179 #ifdef DOT11N_DRAFT3
180                                 // AP sent a 2040Coexistence mgmt frame, then station perform a scan, and then send back the respone.
181                                 if (pAd->CommonCfg.BSSCoexist2040.field.InfoReq == 1)
182                                 {
183                                         Update2040CoexistFrameAndNotify(pAd, BSSID_WCID, TRUE);
184                                 }
185 #endif // DOT11N_DRAFT3 //
186                         }
187                         break;
188
189                 case CNTL_WAIT_OID_DISASSOC:
190                         if (Elem->MsgType == MT2_DISASSOC_CONF)
191                         {
192                                 LinkDown(pAd, FALSE);
193                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
194                         }
195                         break;
196 #ifdef RT2870
197                 //
198                 // This state is for that we want to connect to an AP but
199                 // it didn't find on BSS List table. So we need to scan the air first,
200                 // after that we can try to connect to the desired AP if available.
201                 //
202                 case CNTL_WAIT_SCAN_FOR_CONNECT:
203                         if(Elem->MsgType == MT2_SCAN_CONF)
204                         {
205                                 // Resume TxRing after SCANING complete. We hope the out-of-service time
206                                 // won't be too long to let upper layer time-out the waiting frames
207                                 RTMPResumeMsduTransmission(pAd);
208 #ifdef CCX_SUPPORT
209                                 if (pAd->StaCfg.CCXReqType != MSRN_TYPE_UNUSED)
210                                 {
211                                         // Cisco scan request is finished, prepare beacon report
212                                         MlmeEnqueue(pAd, AIRONET_STATE_MACHINE, MT2_AIRONET_SCAN_DONE, 0, NULL);
213                                 }
214 #endif // CCX_SUPPORT //
215                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
216
217                                 //
218                                 // Check if we can connect to.
219                                 //
220                                 BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab, pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.AutoReconnectSsidLen);
221                                 if (pAd->MlmeAux.SsidBssTab.BssNr > 0)
222                                 {
223                                         MlmeAutoReconnectLastSSID(pAd);
224                                 }
225                         }
226                         break;
227 #endif // RT2870 //
228                 default:
229                         DBGPRINT_ERR(("!ERROR! CNTL - Illegal message type(=%ld)", Elem->MsgType));
230                         break;
231         }
232 }
233
234
235 /*
236         ==========================================================================
237         Description:
238
239         IRQL = DISPATCH_LEVEL
240
241         ==========================================================================
242 */
243 VOID CntlIdleProc(
244         IN PRTMP_ADAPTER pAd,
245         IN MLME_QUEUE_ELEM *Elem)
246 {
247         MLME_DISASSOC_REQ_STRUCT   DisassocReq;
248
249         if (RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_RADIO_OFF))
250                 return;
251
252         switch(Elem->MsgType)
253         {
254                 case OID_802_11_SSID:
255                         CntlOidSsidProc(pAd, Elem);
256                         break;
257
258                 case OID_802_11_BSSID:
259                         CntlOidRTBssidProc(pAd,Elem);
260                         break;
261
262                 case OID_802_11_BSSID_LIST_SCAN:
263                         CntlOidScanProc(pAd,Elem);
264                         break;
265
266                 case OID_802_11_DISASSOCIATE:
267                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
268                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ, sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
269                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_DISASSOC;
270 #ifdef WPA_SUPPLICANT_SUPPORT
271             if (pAd->StaCfg.WpaSupplicantUP != WPA_SUPPLICANT_ENABLE_WITH_WEB_UI)
272 #endif // WPA_SUPPLICANT_SUPPORT //
273             {
274                         // Set the AutoReconnectSsid to prevent it reconnect to old SSID
275                         // Since calling this indicate user don't want to connect to that SSID anymore.
276                         pAd->MlmeAux.AutoReconnectSsidLen= 32;
277                         NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.AutoReconnectSsidLen);
278             }
279                         break;
280
281                 case MT2_MLME_ROAMING_REQ:
282                         CntlMlmeRoamingProc(pAd, Elem);
283                         break;
284
285         case OID_802_11_MIC_FAILURE_REPORT_FRAME:
286             WpaMicFailureReportFrame(pAd, Elem);
287             break;
288
289                 default:
290                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Illegal message in CntlIdleProc(MsgType=%ld)\n",Elem->MsgType));
291                         break;
292         }
293 }
294
295 VOID CntlOidScanProc(
296         IN PRTMP_ADAPTER pAd,
297         IN MLME_QUEUE_ELEM *Elem)
298 {
299         MLME_SCAN_REQ_STRUCT       ScanReq;
300         ULONG                      BssIdx = BSS_NOT_FOUND;
301         BSS_ENTRY                  CurrBss;
302
303         // record current BSS if network is connected.
304         // 2003-2-13 do not include current IBSS if this is the only STA in this IBSS.
305         if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED))
306         {
307                 BssIdx = BssSsidTableSearch(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Ssid, pAd->CommonCfg.SsidLen, pAd->CommonCfg.Channel);
308                 if (BssIdx != BSS_NOT_FOUND)
309                 {
310                         NdisMoveMemory(&CurrBss, &pAd->ScanTab.BssEntry[BssIdx], sizeof(BSS_ENTRY));
311                 }
312         }
313
314         // clean up previous SCAN result, add current BSS back to table if any
315         BssTableInit(&pAd->ScanTab);
316         if (BssIdx != BSS_NOT_FOUND)
317         {
318                 // DDK Note: If the NIC is associated with a particular BSSID and SSID
319                 //    that are not contained in the list of BSSIDs generated by this scan, the
320                 //    BSSID description of the currently associated BSSID and SSID should be
321                 //    appended to the list of BSSIDs in the NIC's database.
322                 // To ensure this, we append this BSS as the first entry in SCAN result
323                 NdisMoveMemory(&pAd->ScanTab.BssEntry[0], &CurrBss, sizeof(BSS_ENTRY));
324                 pAd->ScanTab.BssNr = 1;
325         }
326
327         ScanParmFill(pAd, &ScanReq, "", 0, BSS_ANY, SCAN_ACTIVE);
328         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ,
329                 sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);
330         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
331 }
332
333 /*
334         ==========================================================================
335         Description:
336                 Before calling this routine, user desired SSID should already been
337                 recorded in CommonCfg.Ssid[]
338         IRQL = DISPATCH_LEVEL
339
340         ==========================================================================
341 */
342 VOID CntlOidSsidProc(
343         IN PRTMP_ADAPTER pAd,
344         IN MLME_QUEUE_ELEM * Elem)
345 {
346         PNDIS_802_11_SSID          pOidSsid = (NDIS_802_11_SSID *)Elem->Msg;
347         MLME_DISASSOC_REQ_STRUCT   DisassocReq;
348         ULONG                                      Now;
349
350         // Step 1. record the desired user settings to MlmeAux
351         NdisZeroMemory(pAd->MlmeAux.Ssid, MAX_LEN_OF_SSID);
352         NdisMoveMemory(pAd->MlmeAux.Ssid, pOidSsid->Ssid, pOidSsid->SsidLength);
353         pAd->MlmeAux.SsidLen = (UCHAR)pOidSsid->SsidLength;
354         NdisZeroMemory(pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
355         pAd->MlmeAux.BssType = pAd->StaCfg.BssType;
356
357
358         //
359         // Update Reconnect Ssid, that user desired to connect.
360         //
361         NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, MAX_LEN_OF_SSID);
362         NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
363         pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;
364
365         // step 2. find all matching BSS in the lastest SCAN result (inBssTab)
366         //    & log them into MlmeAux.SsidBssTab for later-on iteration. Sort by RSSI order
367         BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
368
369         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - %d BSS of %d BSS match the desire (%d)SSID - %s\n",
370                         pAd->MlmeAux.SsidBssTab.BssNr, pAd->ScanTab.BssNr, pAd->MlmeAux.SsidLen, pAd->MlmeAux.Ssid));
371         NdisGetSystemUpTime(&Now);
372
373         if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) &&
374                 (pAd->CommonCfg.SsidLen == pAd->MlmeAux.SsidBssTab.BssEntry[0].SsidLen) &&
375                 NdisEqualMemory(pAd->CommonCfg.Ssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Ssid, pAd->CommonCfg.SsidLen) &&
376                 MAC_ADDR_EQUAL(pAd->CommonCfg.Bssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Bssid))
377         {
378                 // Case 1. already connected with an AP who has the desired SSID
379                 //         with highest RSSI
380
381                 // Add checking Mode "LEAP" for CCX 1.0
382                 if (((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) ||
383                          (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK) ||
384                          (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) ||
385                          (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK)
386 #ifdef LEAP_SUPPORT
387                          || (pAd->StaCfg.LeapAuthMode == CISCO_AuthModeLEAP)
388 #endif // LEAP_SUPPORT //
389                          ) &&
390                         (pAd->StaCfg.PortSecured == WPA_802_1X_PORT_NOT_SECURED))
391                 {
392                         // case 1.1 For WPA, WPA-PSK, if the 1x port is not secured, we have to redo
393                         //          connection process
394                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP...\n"));
395                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
396                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
397                                                 sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
398                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
399                 }
400                 else if (pAd->bConfigChanged == TRUE)
401                 {
402                         // case 1.2 Important Config has changed, we have to reconnect to the same AP
403                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP Because config changed...\n"));
404                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
405                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
406                                                 sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
407                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
408                 }
409                 else
410                 {
411                         // case 1.3. already connected to the SSID with highest RSSI.
412                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - already with this BSSID. ignore this SET_SSID request\n"));
413                         //
414                         // (HCT 12.1) 1c_wlan_mediaevents required
415                         // media connect events are indicated when associating with the same AP
416                         //
417                         if (INFRA_ON(pAd))
418                         {
419                                 //
420                                 // Since MediaState already is NdisMediaStateConnected
421                                 // We just indicate the connect event again to meet the WHQL required.
422                                 //
423                                 pAd->IndicateMediaState = NdisMediaStateConnected;
424                                 RTMP_IndicateMediaState(pAd);
425                 pAd->ExtraInfo = GENERAL_LINK_UP;   // Update extra information to link is up
426                         }
427
428                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
429 #ifdef NATIVE_WPA_SUPPLICANT_SUPPORT
430             {
431                 union iwreq_data    wrqu;
432
433                 memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
434                 memcpy(wrqu.ap_addr.sa_data, pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
435                 wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
436
437             }
438 #endif // NATIVE_WPA_SUPPLICANT_SUPPORT //
439                 }
440         }
441         else if (INFRA_ON(pAd))
442         {
443                 //
444                 // For RT61
445                 // [88888] OID_802_11_SSID should have returned NDTEST_WEP_AP2(Returned: )
446                 // RT61 may lost SSID, and not connect to NDTEST_WEP_AP2 and will connect to NDTEST_WEP_AP2 by Autoreconnect
447                 // But media status is connected, so the SSID not report correctly.
448                 //
449                 if (!SSID_EQUAL(pAd->CommonCfg.Ssid, pAd->CommonCfg.SsidLen, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen))
450                 {
451                         //
452                         // Different SSID means not Roaming case, so we let LinkDown() to Indicate a disconnect event.
453                         //
454                         pAd->MlmeAux.CurrReqIsFromNdis = TRUE;
455                 }
456                 // case 2. active INFRA association existent
457                 //    roaming is done within miniport driver, nothing to do with configuration
458                 //    utility. so upon a new SET(OID_802_11_SSID) is received, we just
459                 //    disassociate with the current associated AP,
460                 //    then perform a new association with this new SSID, no matter the
461                 //    new/old SSID are the same or not.
462                 DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP...\n"));
463                 DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
464                 MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
465                                         sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
466                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
467         }
468         else
469         {
470                 if (ADHOC_ON(pAd))
471                 {
472                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - drop current ADHOC\n"));
473                         LinkDown(pAd, FALSE);
474                         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
475                         pAd->IndicateMediaState = NdisMediaStateDisconnected;
476                         RTMP_IndicateMediaState(pAd);
477             pAd->ExtraInfo = GENERAL_LINK_DOWN;
478                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():NDIS_STATUS_MEDIA_DISCONNECT Event C!\n"));
479                 }
480
481                 if ((pAd->MlmeAux.SsidBssTab.BssNr == 0) &&
482                         (pAd->StaCfg.bAutoReconnect == TRUE) &&
483                         (pAd->MlmeAux.BssType == BSS_INFRA) &&
484                         (MlmeValidateSSID(pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen) == TRUE)
485                         )
486                 {
487                         MLME_SCAN_REQ_STRUCT       ScanReq;
488
489                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - No matching BSS, start a new scan\n"));
490                         ScanParmFill(pAd, &ScanReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen, BSS_ANY, SCAN_ACTIVE);
491                         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ, sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);
492                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
493                         // Reset Missed scan number
494                         pAd->StaCfg.LastScanTime = Now;
495                 }
496                 else
497                 {
498                         pAd->MlmeAux.BssIdx = 0;
499                         IterateOnBssTab(pAd);
500                 }
501         }
502 }
503
504
505 /*
506         ==========================================================================
507         Description:
508
509         IRQL = DISPATCH_LEVEL
510
511         ==========================================================================
512 */
513 VOID CntlOidRTBssidProc(
514         IN PRTMP_ADAPTER pAd,
515         IN MLME_QUEUE_ELEM * Elem)
516 {
517         ULONG       BssIdx;
518         PUCHAR      pOidBssid = (PUCHAR)Elem->Msg;
519         MLME_DISASSOC_REQ_STRUCT    DisassocReq;
520         MLME_JOIN_REQ_STRUCT        JoinReq;
521
522         // record user desired settings
523         COPY_MAC_ADDR(pAd->MlmeAux.Bssid, pOidBssid);
524         pAd->MlmeAux.BssType = pAd->StaCfg.BssType;
525
526         //
527         // Update Reconnect Ssid, that user desired to connect.
528         //
529         NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, MAX_LEN_OF_SSID);
530         pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;
531         NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
532
533         // find the desired BSS in the latest SCAN result table
534         BssIdx = BssTableSearch(&pAd->ScanTab, pOidBssid, pAd->MlmeAux.Channel);
535         if (BssIdx == BSS_NOT_FOUND)
536         {
537                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - BSSID not found. reply NDIS_STATUS_NOT_ACCEPTED\n"));
538                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
539                 return;
540         }
541
542         // copy the matched BSS entry from ScanTab to MlmeAux.SsidBssTab. Why?
543         // Because we need this entry to become the JOIN target in later on SYNC state machine
544         pAd->MlmeAux.BssIdx = 0;
545         pAd->MlmeAux.SsidBssTab.BssNr = 1;
546         NdisMoveMemory(&pAd->MlmeAux.SsidBssTab.BssEntry[0], &pAd->ScanTab.BssEntry[BssIdx], sizeof(BSS_ENTRY));
547
548         //pAd->MlmeAux.AutoReconnectSsidLen = pAd->ScanTab.BssEntry[BssIdx].SsidLen;
549         //NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->ScanTab.BssEntry[BssIdx].Ssid, pAd->ScanTab.BssEntry[BssIdx].SsidLen);
550
551         // Add SSID into MlmeAux for site surey joining hidden SSID
552         //pAd->MlmeAux.SsidLen = pAd->ScanTab.BssEntry[BssIdx].SsidLen;
553         //NdisMoveMemory(pAd->MlmeAux.Ssid, pAd->ScanTab.BssEntry[BssIdx].Ssid, pAd->MlmeAux.SsidLen);
554
555         // 2002-11-26 skip the following checking. i.e. if user wants to re-connect to same AP
556         //   we just follow normal procedure. The reason of user doing this may because he/she changed
557         //   AP to another channel, but we still received BEACON from it thus don't claim Link Down.
558         //   Since user knows he's changed AP channel, he'll re-connect again. By skipping the following
559         //   checking, we'll disassociate then re-do normal association with this AP at the new channel.
560         // 2003-1-6 Re-enable this feature based on microsoft requirement which prefer not to re-do
561         //   connection when setting the same BSSID.
562         if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) &&
563                 MAC_ADDR_EQUAL(pAd->CommonCfg.Bssid, pOidBssid))
564         {
565                 // already connected to the same BSSID, go back to idle state directly
566                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - already in this BSSID. ignore this SET_BSSID request\n"));
567                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
568 #ifdef NATIVE_WPA_SUPPLICANT_SUPPORT
569             {
570                 union iwreq_data    wrqu;
571
572                 memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
573                 memcpy(wrqu.ap_addr.sa_data, pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
574                 wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
575
576             }
577 #endif // NATIVE_WPA_SUPPLICANT_SUPPORT //
578         }
579         else
580         {
581                 if (INFRA_ON(pAd))
582                 {
583                         // disassoc from current AP first
584                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - disassociate with current AP ...\n"));
585                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
586                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
587                                                 sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
588
589                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
590                 }
591                 else
592                 {
593                         if (ADHOC_ON(pAd))
594                         {
595                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - drop current ADHOC\n"));
596                                 LinkDown(pAd, FALSE);
597                                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
598                                 pAd->IndicateMediaState = NdisMediaStateDisconnected;
599                                 RTMP_IndicateMediaState(pAd);
600                 pAd->ExtraInfo = GENERAL_LINK_DOWN;
601                                 DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event C!\n"));
602                         }
603
604                         // Change the wepstatus to original wepstatus
605                         pAd->StaCfg.WepStatus   = pAd->StaCfg.OrigWepStatus;
606                         pAd->StaCfg.PairCipher  = pAd->StaCfg.OrigWepStatus;
607                         pAd->StaCfg.GroupCipher = pAd->StaCfg.OrigWepStatus;
608
609                         // Check cipher suite, AP must have more secured cipher than station setting
610                         // Set the Pairwise and Group cipher to match the intended AP setting
611                         // We can only connect to AP with less secured cipher setting
612                         if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK))
613                         {
614                                 pAd->StaCfg.GroupCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.GroupCipher;
615
616                                 if (pAd->StaCfg.WepStatus == pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipher)
617                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipher;
618                                 else if (pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipherAux != Ndis802_11WEPDisabled)
619                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipherAux;
620                                 else    // There is no PairCipher Aux, downgrade our capability to TKIP
621                                         pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
622                         }
623                         else if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK))
624                         {
625                                 pAd->StaCfg.GroupCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.GroupCipher;
626
627                                 if (pAd->StaCfg.WepStatus == pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipher)
628                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipher;
629                                 else if (pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipherAux != Ndis802_11WEPDisabled)
630                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipherAux;
631                                 else    // There is no PairCipher Aux, downgrade our capability to TKIP
632                                         pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
633
634                                 // RSN capability
635                                 pAd->StaCfg.RsnCapability = pAd->ScanTab.BssEntry[BssIdx].WPA2.RsnCapability;
636                         }
637
638                         // Set Mix cipher flag
639                         pAd->StaCfg.bMixCipher = (pAd->StaCfg.PairCipher == pAd->StaCfg.GroupCipher) ? FALSE : TRUE;
640                         if (pAd->StaCfg.bMixCipher == TRUE)
641                         {
642                                 // If mix cipher, re-build RSNIE
643                                 RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, 0);
644                         }
645                         // No active association, join the BSS immediately
646                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - joining %02x:%02x:%02x:%02x:%02x:%02x ...\n",
647                                 pOidBssid[0],pOidBssid[1],pOidBssid[2],pOidBssid[3],pOidBssid[4],pOidBssid[5]));
648
649                         JoinParmFill(pAd, &JoinReq, pAd->MlmeAux.BssIdx);
650                         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_JOIN_REQ, sizeof(MLME_JOIN_REQ_STRUCT), &JoinReq);
651
652                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_JOIN;
653                 }
654         }
655 }
656
657 // Roaming is the only external request triggering CNTL state machine
658 // despite of other "SET OID" operation. All "SET OID" related oerations
659 // happen in sequence, because no other SET OID will be sent to this device
660 // until the the previous SET operation is complete (successful o failed).
661 // So, how do we quarantee this ROAMING request won't corrupt other "SET OID"?
662 // or been corrupted by other "SET OID"?
663 //
664 // IRQL = DISPATCH_LEVEL
665 VOID CntlMlmeRoamingProc(
666         IN PRTMP_ADAPTER pAd,
667         IN MLME_QUEUE_ELEM *Elem)
668 {
669         // TODO:
670         // AP in different channel may show lower RSSI than actual value??
671         // should we add a weighting factor to compensate it?
672         DBGPRINT(RT_DEBUG_TRACE,("CNTL - Roaming in MlmeAux.RoamTab...\n"));
673
674         NdisMoveMemory(&pAd->MlmeAux.SsidBssTab, &pAd->MlmeAux.RoamTab, sizeof(pAd->MlmeAux.RoamTab));
675         pAd->MlmeAux.SsidBssTab.BssNr = pAd->MlmeAux.RoamTab.BssNr;
676
677         BssTableSortByRssi(&pAd->MlmeAux.SsidBssTab);
678         pAd->MlmeAux.BssIdx = 0;
679         IterateOnBssTab(pAd);
680 }
681
682 /*
683         ==========================================================================
684         Description:
685
686         IRQL = DISPATCH_LEVEL
687
688         ==========================================================================
689 */
690 VOID CntlWaitDisassocProc(
691         IN PRTMP_ADAPTER pAd,
692         IN MLME_QUEUE_ELEM *Elem)
693 {
694         MLME_START_REQ_STRUCT     StartReq;
695
696         if (Elem->MsgType == MT2_DISASSOC_CONF)
697         {
698                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Dis-associate successful\n"));
699
700             if (pAd->CommonCfg.bWirelessEvent)
701                 {
702                         RTMPSendWirelessEvent(pAd, IW_DISASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
703                 }
704
705                 LinkDown(pAd, FALSE);
706
707                 // case 1. no matching BSS, and user wants ADHOC, so we just start a new one
708                 if ((pAd->MlmeAux.SsidBssTab.BssNr==0) && (pAd->StaCfg.BssType == BSS_ADHOC))
709                 {
710                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - No matching BSS, start a new ADHOC (Ssid=%s)...\n",pAd->MlmeAux.Ssid));
711                         StartParmFill(pAd, &StartReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
712                         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_START_REQ, sizeof(MLME_START_REQ_STRUCT), &StartReq);
713                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_START;
714                 }
715                 // case 2. try each matched BSS
716                 else
717                 {
718                         pAd->MlmeAux.BssIdx = 0;
719
720                         IterateOnBssTab(pAd);
721                 }
722         }
723 }
724
725 /*
726         ==========================================================================
727         Description:
728
729         IRQL = DISPATCH_LEVEL
730
731         ==========================================================================
732 */
733 VOID CntlWaitJoinProc(
734         IN PRTMP_ADAPTER pAd,
735         IN MLME_QUEUE_ELEM *Elem)
736 {
737         USHORT                      Reason;
738         MLME_AUTH_REQ_STRUCT        AuthReq;
739
740         if (Elem->MsgType == MT2_JOIN_CONF)
741         {
742                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
743                 if (Reason == MLME_SUCCESS)
744                 {
745                         // 1. joined an IBSS, we are pretty much done here
746                         if (pAd->MlmeAux.BssType == BSS_ADHOC)
747                         {
748                             //
749                                 // 5G bands rules of Japan:
750                                 // Ad hoc must be disabled in W53(ch52,56,60,64) channels.
751                                 //
752                                 if ( (pAd->CommonCfg.bIEEE80211H == 1) &&
753                       RadarChannelCheck(pAd, pAd->CommonCfg.Channel)
754                                    )
755                                 {
756                                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
757                                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Channel=%d, Join adhoc on W53(52,56,60,64) Channels are not accepted\n", pAd->CommonCfg.Channel));
758                                         return;
759                                 }
760
761                                 LinkUp(pAd, BSS_ADHOC);
762                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
763                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - join the IBSS = %02x:%02x:%02x:%02x:%02x:%02x ...\n",
764                                 pAd->CommonCfg.Bssid[0],pAd->CommonCfg.Bssid[1],pAd->CommonCfg.Bssid[2],
765                                 pAd->CommonCfg.Bssid[3],pAd->CommonCfg.Bssid[4],pAd->CommonCfg.Bssid[5]));
766
767                 pAd->IndicateMediaState = NdisMediaStateConnected;
768                 pAd->ExtraInfo = GENERAL_LINK_UP;
769                         }
770                         // 2. joined a new INFRA network, start from authentication
771                         else
772                         {
773 #ifdef LEAP_SUPPORT
774                                 // Add AuthMode "LEAP" for CCX 1.X
775                                 if (pAd->StaCfg.LeapAuthMode == CISCO_AuthModeLEAP)
776                                 {
777                                         AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, CISCO_AuthModeLEAP);
778                                 }
779                                 else
780 #endif // LEAP_SUPPORT //
781                                 {
782                                         // either Ndis802_11AuthModeShared or Ndis802_11AuthModeAutoSwitch, try shared key first
783                                         if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeShared) ||
784                                                 (pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch))
785                                         {
786                                                 AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeShared);
787                                         }
788                                         else
789                                         {
790                                                 AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
791                                         }
792                                 }
793                                 MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
794                                                         sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
795
796                                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH;
797                         }
798                 }
799                 else
800                 {
801                         // 3. failed, try next BSS
802                         pAd->MlmeAux.BssIdx++;
803                         IterateOnBssTab(pAd);
804                 }
805         }
806 }
807
808
809 /*
810         ==========================================================================
811         Description:
812
813         IRQL = DISPATCH_LEVEL
814
815         ==========================================================================
816 */
817 VOID CntlWaitStartProc(
818         IN PRTMP_ADAPTER pAd,
819         IN MLME_QUEUE_ELEM *Elem)
820 {
821         USHORT      Result;
822
823         if (Elem->MsgType == MT2_START_CONF)
824         {
825                 NdisMoveMemory(&Result, Elem->Msg, sizeof(USHORT));
826                 if (Result == MLME_SUCCESS)
827                 {
828                     //
829                         // 5G bands rules of Japan:
830                         // Ad hoc must be disabled in W53(ch52,56,60,64) channels.
831                         //
832                         if ( (pAd->CommonCfg.bIEEE80211H == 1) &&
833                   RadarChannelCheck(pAd, pAd->CommonCfg.Channel)
834                            )
835                         {
836                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
837                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Channel=%d, Start adhoc on W53(52,56,60,64) Channels are not accepted\n", pAd->CommonCfg.Channel));
838                                 return;
839                         }
840 #ifdef DOT11_N_SUPPORT
841                         if (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED)
842                         {
843                                 N_ChannelCheck(pAd);
844                                 SetCommonHT(pAd);
845                                 NdisMoveMemory(&pAd->MlmeAux.AddHtInfo, &pAd->CommonCfg.AddHTInfo, sizeof(ADD_HT_INFO_IE));
846                                 RTMPCheckHt(pAd, BSSID_WCID, &pAd->CommonCfg.HtCapability, &pAd->CommonCfg.AddHTInfo);
847                                 pAd->StaActive.SupportedPhyInfo.bHtEnable = TRUE;
848                                 NdisZeroMemory(&pAd->StaActive.SupportedPhyInfo.MCSSet[0], 16);
849                                 NdisMoveMemory(&pAd->StaActive.SupportedPhyInfo.MCSSet[0], &pAd->CommonCfg.HtCapability.MCSSet[0], 16);
850                                 COPY_HTSETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
851
852                                 if ((pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth  == BW_40) &&
853                                         (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_ABOVE))
854                                 {
855                                         pAd->MlmeAux.CentralChannel = pAd->CommonCfg.Channel + 2;
856                                 }
857                                 else if ((pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth  == BW_40) &&
858                                                  (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_BELOW))
859                                 {
860                                         pAd->MlmeAux.CentralChannel = pAd->CommonCfg.Channel - 2;
861                                 }
862                         }
863                         else
864 #endif // DOT11_N_SUPPORT //
865                         {
866                                 pAd->StaActive.SupportedPhyInfo.bHtEnable = FALSE;
867                         }
868                         LinkUp(pAd, BSS_ADHOC);
869                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
870                         // Before send beacon, driver need do radar detection
871                         if ((pAd->CommonCfg.Channel > 14 )
872                                 && (pAd->CommonCfg.bIEEE80211H == 1)
873                                 && RadarChannelCheck(pAd, pAd->CommonCfg.Channel))
874                         {
875                                 pAd->CommonCfg.RadarDetect.RDMode = RD_SILENCE_MODE;
876                                 pAd->CommonCfg.RadarDetect.RDCount = 0;
877                         }
878
879                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - start a new IBSS = %02x:%02x:%02x:%02x:%02x:%02x ...\n",
880                                 pAd->CommonCfg.Bssid[0],pAd->CommonCfg.Bssid[1],pAd->CommonCfg.Bssid[2],
881                                 pAd->CommonCfg.Bssid[3],pAd->CommonCfg.Bssid[4],pAd->CommonCfg.Bssid[5]));
882                 }
883                 else
884                 {
885                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Start IBSS fail. BUG!!!!!\n"));
886                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
887                 }
888         }
889 }
890
891 /*
892         ==========================================================================
893         Description:
894
895         IRQL = DISPATCH_LEVEL
896
897         ==========================================================================
898 */
899 VOID CntlWaitAuthProc(
900         IN PRTMP_ADAPTER pAd,
901         IN MLME_QUEUE_ELEM *Elem)
902 {
903         USHORT                       Reason;
904         MLME_ASSOC_REQ_STRUCT        AssocReq;
905         MLME_AUTH_REQ_STRUCT         AuthReq;
906
907         if (Elem->MsgType == MT2_AUTH_CONF)
908         {
909                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
910                 if (Reason == MLME_SUCCESS)
911                 {
912                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH OK\n"));
913                         AssocParmFill(pAd, &AssocReq, pAd->MlmeAux.Bssid, pAd->MlmeAux.CapabilityInfo,
914                                                   ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
915
916 #ifdef LEAP_SUPPORT
917                         //
918                         // Cisco Leap CCKM supported Re-association.
919                         //
920                         if (LEAP_CCKM_ON(pAd) && (pAd->StaCfg.CCKMLinkUpFlag == TRUE))
921                         {
922                                 //if CCKM is turn on , that's mean Fast Reauthentication
923                                 //Use CCKM Reassociation instead of normal association for Fast Roaming.
924                                 MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_REASSOC_REQ,
925                                                         sizeof(MLME_ASSOC_REQ_STRUCT), &AssocReq);
926
927                                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_REASSOC;
928                         }
929                         else
930 #endif // LEAP_SUPPORT //
931                         {
932                                 MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_ASSOC_REQ,
933                                                         sizeof(MLME_ASSOC_REQ_STRUCT), &AssocReq);
934
935                                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_ASSOC;
936                         }
937                 }
938                 else
939                 {
940                         // This fail may because of the AP already keep us in its MAC table without
941                         // ageing-out. The previous authentication attempt must have let it remove us.
942                         // so try Authentication again may help. For D-Link DWL-900AP+ compatibility.
943                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, try again...\n"));
944 #ifdef LEAP_SUPPORT
945                         //Add AuthMode "LEAP" for CCX 1.X
946                         if (pAd->StaCfg.LeapAuthMode == CISCO_AuthModeLEAP)
947                         {
948                                 AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, CISCO_AuthModeLEAP);
949                         }
950                         else
951 #endif // LEAP_SUPPORT //
952                         {
953                                 if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeShared) ||
954                                         (pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch))
955                                 {
956                                         // either Ndis802_11AuthModeShared or Ndis802_11AuthModeAutoSwitch, try shared key first
957                                         AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeShared);
958                                 }
959                                 else
960                                 {
961                                         AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
962                                 }
963                         }
964                         MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
965                                                 sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
966
967                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH2;
968                 }
969         }
970 }
971
972 /*
973         ==========================================================================
974         Description:
975
976         IRQL = DISPATCH_LEVEL
977
978         ==========================================================================
979 */
980 VOID CntlWaitAuthProc2(
981         IN PRTMP_ADAPTER pAd,
982         IN MLME_QUEUE_ELEM *Elem)
983 {
984         USHORT                       Reason;
985         MLME_ASSOC_REQ_STRUCT        AssocReq;
986         MLME_AUTH_REQ_STRUCT         AuthReq;
987
988         if (Elem->MsgType == MT2_AUTH_CONF)
989         {
990                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
991                 if (Reason == MLME_SUCCESS)
992                 {
993                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH OK\n"));
994                         AssocParmFill(pAd, &AssocReq, pAd->MlmeAux.Bssid, pAd->MlmeAux.CapabilityInfo,
995                                                   ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
996                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_ASSOC_REQ,
997                                                 sizeof(MLME_ASSOC_REQ_STRUCT), &AssocReq);
998
999                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_ASSOC;
1000                 }
1001                 else
1002                 {
1003 #ifdef LEAP_SUPPORT
1004                         // Process LEAP first, since it use different control variable
1005                         // We don't want to affect other poven operation
1006                         if (pAd->StaCfg.LeapAuthMode == CISCO_AuthModeLEAP)
1007                         {
1008                                 // LEAP Auth not success, try next BSS
1009                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - *LEAP* AUTH FAIL, give up; try next BSS\n"));
1010                                 DBGPRINT(RT_DEBUG_TRACE, ("Total match BSSID [=%d]\n", pAd->MlmeAux.SsidBssTab.BssNr));
1011                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
1012                                 pAd->MlmeAux.BssIdx++;
1013                                 IterateOnBssTab(pAd);
1014                         }
1015                         else
1016 #endif // LEAP_SUPPORT //
1017                         if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch) &&
1018                                  (pAd->MlmeAux.Alg == Ndis802_11AuthModeShared))
1019                         {
1020                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, try OPEN system...\n"));
1021                                 AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
1022                                 MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
1023                                                         sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
1024
1025                                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH2;
1026                         }
1027                         else
1028                         {
1029                                 // not success, try next BSS
1030                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, give up; try next BSS\n"));
1031                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE; //???????
1032                                 pAd->MlmeAux.BssIdx++;
1033                                 IterateOnBssTab(pAd);
1034                         }
1035                 }
1036         }
1037 }
1038
1039 /*
1040         ==========================================================================
1041         Description:
1042
1043         IRQL = DISPATCH_LEVEL
1044
1045         ==========================================================================
1046 */
1047 VOID CntlWaitAssocProc(
1048         IN PRTMP_ADAPTER pAd,
1049         IN MLME_QUEUE_ELEM *Elem)
1050 {
1051         USHORT      Reason;
1052
1053         if (Elem->MsgType == MT2_ASSOC_CONF)
1054         {
1055                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
1056                 if (Reason == MLME_SUCCESS)
1057                 {
1058                         LinkUp(pAd, BSS_INFRA);
1059                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
1060                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Association successful on BSS #%ld\n",pAd->MlmeAux.BssIdx));
1061
1062                         if (pAd->CommonCfg.bWirelessEvent)
1063                         {
1064                                 RTMPSendWirelessEvent(pAd, IW_ASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
1065                         }
1066                 }
1067                 else
1068                 {
1069                         // not success, try next BSS
1070                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Association fails on BSS #%ld\n",pAd->MlmeAux.BssIdx));
1071                         pAd->MlmeAux.BssIdx++;
1072                         IterateOnBssTab(pAd);
1073                 }
1074         }
1075 }
1076
1077 /*
1078         ==========================================================================
1079         Description:
1080
1081         IRQL = DISPATCH_LEVEL
1082
1083         ==========================================================================
1084 */
1085 VOID CntlWaitReassocProc(
1086         IN PRTMP_ADAPTER pAd,
1087         IN MLME_QUEUE_ELEM *Elem)
1088 {
1089         USHORT      Result;
1090
1091         if (Elem->MsgType == MT2_REASSOC_CONF)
1092         {
1093                 NdisMoveMemory(&Result, Elem->Msg, sizeof(USHORT));
1094                 if (Result == MLME_SUCCESS)
1095                 {
1096                         //
1097                         // NDIS requires a new Link UP indication but no Link Down for RE-ASSOC
1098                         //
1099                         LinkUp(pAd, BSS_INFRA);
1100
1101                         // send wireless event - for association
1102                         if (pAd->CommonCfg.bWirelessEvent)
1103                                 RTMPSendWirelessEvent(pAd, IW_ASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
1104
1105
1106 #ifdef LEAP_SUPPORT
1107                         if (LEAP_CCKM_ON(pAd))
1108                         {
1109                                 STA_PORT_SECURED(pAd);
1110                                 pAd->StaCfg.WpaState = SS_FINISH;
1111                         }
1112 #endif // LEAP_SUPPORT //
1113                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
1114                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Re-assocition successful on BSS #%ld\n", pAd->MlmeAux.RoamIdx));
1115                 }
1116                 else
1117                 {
1118                         // reassoc failed, try to pick next BSS in the BSS Table
1119                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Re-assocition fails on BSS #%ld\n", pAd->MlmeAux.RoamIdx));
1120                         pAd->MlmeAux.RoamIdx++;
1121                         IterateOnBssTab2(pAd);
1122                 }
1123         }
1124 }
1125
1126
1127 VOID    AdhocTurnOnQos(
1128         IN  PRTMP_ADAPTER pAd)
1129 {
1130 #define AC0_DEF_TXOP            0
1131 #define AC1_DEF_TXOP            0
1132 #define AC2_DEF_TXOP            94
1133 #define AC3_DEF_TXOP            47
1134
1135         // Turn on QOs if use HT rate.
1136         if (pAd->CommonCfg.APEdcaParm.bValid == FALSE)
1137         {
1138                 pAd->CommonCfg.APEdcaParm.bValid = TRUE;
1139                 pAd->CommonCfg.APEdcaParm.Aifsn[0] = 3;
1140                 pAd->CommonCfg.APEdcaParm.Aifsn[1] = 7;
1141                 pAd->CommonCfg.APEdcaParm.Aifsn[2] = 1;
1142                 pAd->CommonCfg.APEdcaParm.Aifsn[3] = 1;
1143
1144                 pAd->CommonCfg.APEdcaParm.Cwmin[0] = 4;
1145                 pAd->CommonCfg.APEdcaParm.Cwmin[1] = 4;
1146                 pAd->CommonCfg.APEdcaParm.Cwmin[2] = 3;
1147                 pAd->CommonCfg.APEdcaParm.Cwmin[3] = 2;
1148
1149                 pAd->CommonCfg.APEdcaParm.Cwmax[0] = 10;
1150                 pAd->CommonCfg.APEdcaParm.Cwmax[1] = 6;
1151                 pAd->CommonCfg.APEdcaParm.Cwmax[2] = 4;
1152                 pAd->CommonCfg.APEdcaParm.Cwmax[3] = 3;
1153
1154                 pAd->CommonCfg.APEdcaParm.Txop[0]  = 0;
1155                 pAd->CommonCfg.APEdcaParm.Txop[1]  = 0;
1156                 pAd->CommonCfg.APEdcaParm.Txop[2]  = AC2_DEF_TXOP;
1157                 pAd->CommonCfg.APEdcaParm.Txop[3]  = AC3_DEF_TXOP;
1158         }
1159         AsicSetEdcaParm(pAd, &pAd->CommonCfg.APEdcaParm);
1160 }
1161
1162 /*
1163         ==========================================================================
1164         Description:
1165
1166         IRQL = DISPATCH_LEVEL
1167
1168         ==========================================================================
1169 */
1170 VOID LinkUp(
1171         IN PRTMP_ADAPTER pAd,
1172         IN UCHAR BssType)
1173 {
1174         ULONG   Now;
1175         UINT32  Data;
1176         BOOLEAN Cancelled;
1177         UCHAR   Value = 0, idx;
1178         MAC_TABLE_ENTRY *pEntry = NULL, *pCurrEntry;
1179
1180         pEntry = &pAd->MacTab.Content[BSSID_WCID];
1181
1182         //
1183         // ASSOC - DisassocTimeoutAction
1184         // CNTL - Dis-associate successful
1185         // !!! LINK DOWN !!!
1186         // [88888] OID_802_11_SSID should have returned NDTEST_WEP_AP2(Returned: )
1187         //
1188         // To prevent DisassocTimeoutAction to call Link down after we link up,
1189         // cancel the DisassocTimer no matter what it start or not.
1190         //
1191         RTMPCancelTimer(&pAd->MlmeAux.DisassocTimer,  &Cancelled);
1192
1193         COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
1194
1195 #ifdef DOT11_N_SUPPORT
1196         COPY_HTSETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
1197 #endif // DOT11_N_SUPPORT //
1198         // It's quite difficult to tell if a newly added KEY is WEP or CKIP until a new BSS
1199         // is formed (either ASSOC/RE-ASSOC done or IBSS started. LinkUP should be a safe place
1200         // to examine if cipher algorithm switching is required.
1201         //rt2860b. Don't know why need this
1202         SwitchBetweenWepAndCkip(pAd);
1203
1204
1205         if (BssType == BSS_ADHOC)
1206         {
1207                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_ADHOC_ON);
1208                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_INFRA_ON);
1209
1210 #ifdef DOT11_N_SUPPORT
1211                 if (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED)
1212                         AdhocTurnOnQos(pAd);
1213 #endif // DOT11_N_SUPPORT //
1214
1215                 DBGPRINT(RT_DEBUG_TRACE, ("!!!Adhoc LINK UP !!! \n" ));
1216         }
1217         else
1218         {
1219                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_INFRA_ON);
1220                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_ADHOC_ON);
1221
1222                 DBGPRINT(RT_DEBUG_TRACE, ("!!!Infra LINK UP !!! \n" ));
1223         }
1224
1225         // 3*3
1226         // reset Tx beamforming bit
1227         RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1228         Value &= (~0x01);
1229         Value |= pAd->CommonCfg.RegTransmitSetting.field.TxBF;
1230         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1231
1232 #ifdef DOT11_N_SUPPORT
1233         // Change to AP channel
1234     if ((pAd->CommonCfg.CentralChannel > pAd->CommonCfg.Channel) && (pAd->MlmeAux.HtCapability.HtCapInfo.ChannelWidth == BW_40))
1235         {
1236                 // Must using 40MHz.
1237                 pAd->CommonCfg.BBPCurrentBW = BW_40;
1238                 AsicSwitchChannel(pAd, pAd->CommonCfg.CentralChannel, FALSE);
1239                 AsicLockChannel(pAd, pAd->CommonCfg.CentralChannel);
1240
1241                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1242                 Value &= (~0x18);
1243                 Value |= 0x10;
1244                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1245
1246                 //  RX : control channel at lower
1247                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
1248                 Value &= (~0x20);
1249                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
1250
1251                 RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
1252                 Data &= 0xfffffffe;
1253                 RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
1254
1255                 if (pAd->MACVersion == 0x28600100)
1256                 {
1257                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x1A);
1258                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x0A);
1259                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x16);
1260             DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
1261                 }
1262
1263                 DBGPRINT(RT_DEBUG_TRACE, ("!!!40MHz Lower LINK UP !!! Control Channel at Below. Central = %d \n", pAd->CommonCfg.CentralChannel ));
1264         }
1265         else if ((pAd->CommonCfg.CentralChannel < pAd->CommonCfg.Channel) && (pAd->MlmeAux.HtCapability.HtCapInfo.ChannelWidth == BW_40))
1266     {
1267             // Must using 40MHz.
1268                 pAd->CommonCfg.BBPCurrentBW = BW_40;
1269                 AsicSwitchChannel(pAd, pAd->CommonCfg.CentralChannel, FALSE);
1270             AsicLockChannel(pAd, pAd->CommonCfg.CentralChannel);
1271
1272                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1273                 Value &= (~0x18);
1274                 Value |= 0x10;
1275                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1276
1277                 RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
1278                 Data |= 0x1;
1279                 RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
1280
1281                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
1282             Value |= (0x20);
1283                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
1284
1285                 if (pAd->MACVersion == 0x28600100)
1286                 {
1287                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x1A);
1288                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x0A);
1289                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x16);
1290                             DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
1291                 }
1292
1293             DBGPRINT(RT_DEBUG_TRACE, ("!!! 40MHz Upper LINK UP !!! Control Channel at UpperCentral = %d \n", pAd->CommonCfg.CentralChannel ));
1294     }
1295     else
1296 #endif // DOT11_N_SUPPORT //
1297     {
1298             pAd->CommonCfg.BBPCurrentBW = BW_20;
1299                 pAd->CommonCfg.CentralChannel = pAd->CommonCfg.Channel;
1300                 AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
1301                 AsicLockChannel(pAd, pAd->CommonCfg.Channel);
1302
1303                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1304                 Value &= (~0x18);
1305                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1306
1307                 RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
1308                 Data &= 0xfffffffe;
1309                 RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
1310
1311                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
1312                 Value &= (~0x20);
1313                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
1314
1315                 if (pAd->MACVersion == 0x28600100)
1316                 {
1317                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x16);
1318                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x08);
1319                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x11);
1320             DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
1321                 }
1322
1323             DBGPRINT(RT_DEBUG_TRACE, ("!!! 20MHz LINK UP !!! \n" ));
1324     }
1325
1326         RTMPSetAGCInitValue(pAd, pAd->CommonCfg.BBPCurrentBW);
1327         //
1328         // Save BBP_R66 value, it will be used in RTUSBResumeMsduTransmission
1329         //
1330         RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R66, &pAd->BbpTuning.R66CurrentValue);
1331
1332         DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!! (BssType=%d, AID=%d, ssid=%s, Channel=%d, CentralChannel = %d)\n",
1333                 BssType, pAd->StaActive.Aid, pAd->CommonCfg.Ssid, pAd->CommonCfg.Channel, pAd->CommonCfg.CentralChannel));
1334
1335 #ifdef DOT11_N_SUPPORT
1336         DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!! (Density =%d, )\n", pAd->MacTab.Content[BSSID_WCID].MpduDensity));
1337 #endif // DOT11_N_SUPPORT //
1338
1339                 AsicSetBssid(pAd, pAd->CommonCfg.Bssid);
1340
1341         AsicSetSlotTime(pAd, TRUE);
1342         AsicSetEdcaParm(pAd, &pAd->CommonCfg.APEdcaParm);
1343
1344         // Call this for RTS protectionfor legacy rate, we will always enable RTS threshold, but normally it will not hit
1345         AsicUpdateProtect(pAd, 0, (OFDMSETPROTECT | CCKSETPROTECT), TRUE, FALSE);
1346
1347 #ifdef DOT11_N_SUPPORT
1348         if ((pAd->StaActive.SupportedPhyInfo.bHtEnable == TRUE))
1349         {
1350                 // Update HT protectionfor based on AP's operating mode.
1351         if (pAd->MlmeAux.AddHtInfo.AddHtInfo2.NonGfPresent == 1)
1352         {
1353                 AsicUpdateProtect(pAd, pAd->MlmeAux.AddHtInfo.AddHtInfo2.OperaionMode,  ALLN_SETPROTECT, FALSE, TRUE);
1354         }
1355         else
1356                         AsicUpdateProtect(pAd, pAd->MlmeAux.AddHtInfo.AddHtInfo2.OperaionMode,  ALLN_SETPROTECT, FALSE, FALSE);
1357         }
1358 #endif // DOT11_N_SUPPORT //
1359
1360         NdisZeroMemory(&pAd->DrsCounters, sizeof(COUNTER_DRS));
1361
1362         NdisGetSystemUpTime(&Now);
1363         pAd->StaCfg.LastBeaconRxTime = Now;   // last RX timestamp
1364
1365         if ((pAd->CommonCfg.TxPreamble != Rt802_11PreambleLong) &&
1366                 CAP_IS_SHORT_PREAMBLE_ON(pAd->StaActive.CapabilityInfo))
1367         {
1368                 MlmeSetTxPreamble(pAd, Rt802_11PreambleShort);
1369         }
1370
1371         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1372
1373         if (pAd->CommonCfg.RadarDetect.RDMode == RD_SILENCE_MODE)
1374         {
1375         }
1376         pAd->CommonCfg.RadarDetect.RDMode = RD_NORMAL_MODE;
1377
1378         if (BssType == BSS_ADHOC)
1379         {
1380                 MakeIbssBeacon(pAd);
1381                 if ((pAd->CommonCfg.Channel > 14)
1382                         && (pAd->CommonCfg.bIEEE80211H == 1)
1383                         && RadarChannelCheck(pAd, pAd->CommonCfg.Channel))
1384                 {
1385                         ; //Do nothing
1386                 }
1387                 else
1388                 {
1389                         AsicEnableIbssSync(pAd);
1390                 }
1391
1392                 // In ad hoc mode, use MAC table from index 1.
1393                 // p.s ASIC use all 0xff as termination of WCID table search.To prevent it's 0xff-ff-ff-ff-ff-ff, Write 0 here.
1394                 RTMP_IO_WRITE32(pAd, MAC_WCID_BASE, 0x00);
1395                 RTMP_IO_WRITE32(pAd, 0x1808, 0x00);
1396
1397                 // If WEP is enabled, add key material and cipherAlg into Asic
1398                 // Fill in Shared Key Table(offset: 0x6c00) and Shared Key Mode(offset: 0x7000)
1399
1400                 if (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)
1401                 {
1402                         PUCHAR  Key;
1403                         UCHAR   CipherAlg;
1404
1405                         for (idx=0; idx < SHARE_KEY_NUM; idx++)
1406                 {
1407                                 CipherAlg = pAd->SharedKey[BSS0][idx].CipherAlg;
1408                         Key = pAd->SharedKey[BSS0][idx].Key;
1409
1410                                 if (pAd->SharedKey[BSS0][idx].KeyLen > 0)
1411                                 {
1412                                         // Set key material and cipherAlg to Asic
1413                                 AsicAddSharedKeyEntry(pAd, BSS0, idx, CipherAlg, Key, NULL, NULL);
1414
1415                     if (idx == pAd->StaCfg.DefaultKeyId)
1416                                         {
1417                                                 // Update WCID attribute table and IVEIV table for this group key table
1418                                                 RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, NULL);
1419                                         }
1420                                 }
1421
1422
1423                         }
1424                 }
1425                 // If WPANone is enabled, add key material and cipherAlg into Asic
1426                 // Fill in Shared Key Table(offset: 0x6c00) and Shared Key Mode(offset: 0x7000)
1427                 else if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone)
1428                 {
1429                         pAd->StaCfg.DefaultKeyId = 0;   // always be zero
1430
1431             NdisZeroMemory(&pAd->SharedKey[BSS0][0], sizeof(CIPHER_KEY));
1432                                                         pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK;
1433                         NdisMoveMemory(pAd->SharedKey[BSS0][0].Key, pAd->StaCfg.PMK, LEN_TKIP_EK);
1434
1435             if (pAd->StaCfg.PairCipher == Ndis802_11Encryption2Enabled)
1436             {
1437                         NdisMoveMemory(pAd->SharedKey[BSS0][0].RxMic, &pAd->StaCfg.PMK[16], LEN_TKIP_RXMICK);
1438                         NdisMoveMemory(pAd->SharedKey[BSS0][0].TxMic, &pAd->StaCfg.PMK[16], LEN_TKIP_TXMICK);
1439             }
1440
1441                         // Decide its ChiperAlg
1442                         if (pAd->StaCfg.PairCipher == Ndis802_11Encryption2Enabled)
1443                                 pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_TKIP;
1444                         else if (pAd->StaCfg.PairCipher == Ndis802_11Encryption3Enabled)
1445                                 pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_AES;
1446                         else
1447             {
1448                 DBGPRINT(RT_DEBUG_TRACE, ("Unknow Cipher (=%d), set Cipher to AES\n", pAd->StaCfg.PairCipher));
1449                                 pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_AES;
1450             }
1451
1452                         // Set key material and cipherAlg to Asic
1453                         AsicAddSharedKeyEntry(pAd,
1454                                                                   BSS0,
1455                                                                   0,
1456                                                                   pAd->SharedKey[BSS0][0].CipherAlg,
1457                                                                   pAd->SharedKey[BSS0][0].Key,
1458                                                                   pAd->SharedKey[BSS0][0].TxMic,
1459                                                                   pAd->SharedKey[BSS0][0].RxMic);
1460
1461             // Update WCID attribute table and IVEIV table for this group key table
1462                         RTMPAddWcidAttributeEntry(pAd, BSS0, 0, pAd->SharedKey[BSS0][0].CipherAlg, NULL);
1463
1464                 }
1465
1466         }
1467         else // BSS_INFRA
1468         {
1469                 // Check the new SSID with last SSID
1470                 while (Cancelled == TRUE)
1471                 {
1472                         if (pAd->CommonCfg.LastSsidLen == pAd->CommonCfg.SsidLen)
1473                         {
1474                                 if (RTMPCompareMemory(pAd->CommonCfg.LastSsid, pAd->CommonCfg.Ssid, pAd->CommonCfg.LastSsidLen) == 0)
1475                                 {
1476                                         // Link to the old one no linkdown is required.
1477                                         break;
1478                                 }
1479                         }
1480                         // Send link down event before set to link up
1481                         pAd->IndicateMediaState = NdisMediaStateDisconnected;
1482                         RTMP_IndicateMediaState(pAd);
1483             pAd->ExtraInfo = GENERAL_LINK_DOWN;
1484                         DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event AA!\n"));
1485                         break;
1486                 }
1487
1488                 //
1489                 // On WPA mode, Remove All Keys if not connect to the last BSSID
1490                 // Key will be set after 4-way handshake.
1491                 //
1492                 if ((pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA))
1493                 {
1494                         ULONG           IV;
1495
1496                         // Remove all WPA keys
1497                         RTMPWPARemoveAllKeys(pAd);
1498                         pAd->StaCfg.PortSecured = WPA_802_1X_PORT_NOT_SECURED;
1499                         pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilter8021xWEP;
1500
1501                         // Fixed connection failed with Range Maximizer - 515 AP (Marvell Chip) when security is WPAPSK/TKIP
1502                         // If IV related values are too large in GroupMsg2, AP would ignore this message.
1503                         IV = 0;
1504                         IV |= (pAd->StaCfg.DefaultKeyId << 30);
1505                         AsicUpdateWCIDIVEIV(pAd, BSSID_WCID, IV, 0);
1506                 }
1507                 // NOTE:
1508                 // the decision of using "short slot time" or not may change dynamically due to
1509                 // new STA association to the AP. so we have to decide that upon parsing BEACON, not here
1510
1511                 // NOTE:
1512                 // the decision to use "RTC/CTS" or "CTS-to-self" protection or not may change dynamically
1513                 // due to new STA association to the AP. so we have to decide that upon parsing BEACON, not here
1514
1515                 ComposePsPoll(pAd);
1516                 ComposeNullFrame(pAd);
1517
1518                         AsicEnableBssSync(pAd);
1519
1520                 // Add BSSID to WCID search table
1521                 AsicUpdateRxWCIDTable(pAd, BSSID_WCID, pAd->CommonCfg.Bssid);
1522
1523                 NdisAcquireSpinLock(&pAd->MacTabLock);
1524                 // add this BSSID entry into HASH table
1525                 {
1526                         UCHAR HashIdx;
1527
1528                         //pEntry = &pAd->MacTab.Content[BSSID_WCID];
1529                         HashIdx = MAC_ADDR_HASH_INDEX(pAd->CommonCfg.Bssid);
1530                         if (pAd->MacTab.Hash[HashIdx] == NULL)
1531                         {
1532                                 pAd->MacTab.Hash[HashIdx] = pEntry;
1533                         }
1534                         else
1535                         {
1536                                 pCurrEntry = pAd->MacTab.Hash[HashIdx];
1537                                 while (pCurrEntry->pNext != NULL)
1538                                         pCurrEntry = pCurrEntry->pNext;
1539                                 pCurrEntry->pNext = pEntry;
1540                         }
1541                 }
1542                 NdisReleaseSpinLock(&pAd->MacTabLock);
1543
1544
1545                 // If WEP is enabled, add paiewise and shared key
1546 #ifdef WPA_SUPPLICANT_SUPPORT
1547         if (((pAd->StaCfg.WpaSupplicantUP)&&
1548              (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)&&
1549              (pAd->StaCfg.PortSecured == WPA_802_1X_PORT_SECURED)) ||
1550             ((pAd->StaCfg.WpaSupplicantUP == WPA_SUPPLICANT_DISABLE)&&
1551               (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)))
1552 #else
1553                 if (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)
1554 #endif // WPA_SUPPLICANT_SUPPORT //
1555                 {
1556                         PUCHAR  Key;
1557                         UCHAR   CipherAlg;
1558
1559                         for (idx=0; idx < SHARE_KEY_NUM; idx++)
1560                 {
1561                                 CipherAlg = pAd->SharedKey[BSS0][idx].CipherAlg;
1562                         Key = pAd->SharedKey[BSS0][idx].Key;
1563
1564                                 if (pAd->SharedKey[BSS0][idx].KeyLen > 0)
1565                                 {
1566                                         // Set key material and cipherAlg to Asic
1567                                 AsicAddSharedKeyEntry(pAd, BSS0, idx, CipherAlg, Key, NULL, NULL);
1568
1569                                         if (idx == pAd->StaCfg.DefaultKeyId)
1570                                         {
1571                                                 // Assign group key info
1572                                                 RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, NULL);
1573
1574                                                 // Assign pairwise key info
1575                                                 RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, pEntry);
1576                                         }
1577                                 }
1578                         }
1579                 }
1580
1581                 // only INFRASTRUCTURE mode need to indicate connectivity immediately; ADHOC mode
1582                 // should wait until at least 2 active nodes in this BSSID.
1583                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
1584
1585         // For GUI ++
1586                 if (pAd->StaCfg.AuthMode < Ndis802_11AuthModeWPA)
1587                 {
1588                         pAd->IndicateMediaState = NdisMediaStateConnected;
1589                         pAd->ExtraInfo = GENERAL_LINK_UP;
1590                         RTMP_IndicateMediaState(pAd);
1591                 }
1592         // --
1593
1594                 // Add BSSID in my MAC Table.
1595         NdisAcquireSpinLock(&pAd->MacTabLock);
1596                 RTMPMoveMemory(pAd->MacTab.Content[BSSID_WCID].Addr, pAd->CommonCfg.Bssid, MAC_ADDR_LEN);
1597                 pAd->MacTab.Content[BSSID_WCID].Aid = BSSID_WCID;
1598                 pAd->MacTab.Content[BSSID_WCID].pAd = pAd;
1599                 pAd->MacTab.Content[BSSID_WCID].ValidAsCLI = TRUE;      //Although this is bssid..still set ValidAsCl
1600                 pAd->MacTab.Size = 1;   // infra mode always set MACtab size =1.
1601                 pAd->MacTab.Content[BSSID_WCID].Sst = SST_ASSOC;
1602                 pAd->MacTab.Content[BSSID_WCID].AuthState = SST_ASSOC;
1603                 pAd->MacTab.Content[BSSID_WCID].WepStatus = pAd->StaCfg.WepStatus;
1604         NdisReleaseSpinLock(&pAd->MacTabLock);
1605
1606                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!!  ClientStatusFlags=%lx)\n",
1607                         pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
1608
1609                 MlmeUpdateTxRates(pAd, TRUE, BSS0);
1610 #ifdef DOT11_N_SUPPORT
1611                 MlmeUpdateHtTxRates(pAd, BSS0);
1612                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !! (StaActive.bHtEnable =%d, )\n", pAd->StaActive.SupportedPhyInfo.bHtEnable));
1613 #endif // DOT11_N_SUPPORT //
1614
1615                 //
1616                 // Report Adjacent AP report.
1617                 //
1618 #ifdef LEAP_SUPPORT
1619                 CCXAdjacentAPReport(pAd);
1620 #endif // LEAP_SUPPORT //
1621
1622                 if (pAd->CommonCfg.bAggregationCapable)
1623                 {
1624                         if ((pAd->CommonCfg.bPiggyBackCapable) && (pAd->MlmeAux.APRalinkIe & 0x00000003) == 3)
1625                         {
1626
1627                                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_PIGGYBACK_INUSED);
1628                                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1629                 RTMPSetPiggyBack(pAd, TRUE);
1630                                 DBGPRINT(RT_DEBUG_TRACE, ("Turn on Piggy-Back\n"));
1631                         }
1632                         else if (pAd->MlmeAux.APRalinkIe & 0x00000001)
1633                         {
1634                                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1635                         }
1636                 }
1637
1638                 if (pAd->MlmeAux.APRalinkIe != 0x0)
1639                 {
1640 #ifdef DOT11_N_SUPPORT
1641                         if (CLIENT_STATUS_TEST_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RDG_CAPABLE))
1642                         {
1643                                 AsicEnableRDG(pAd);
1644                         }
1645 #endif // DOT11_N_SUPPORT //
1646                         OPSTATUS_SET_FLAG(pAd, fCLIENT_STATUS_RALINK_CHIPSET);
1647                         CLIENT_STATUS_SET_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RALINK_CHIPSET);
1648                 }
1649                 else
1650                 {
1651                         OPSTATUS_CLEAR_FLAG(pAd, fCLIENT_STATUS_RALINK_CHIPSET);
1652                         CLIENT_STATUS_CLEAR_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RALINK_CHIPSET);
1653                 }
1654         }
1655
1656 #ifdef DOT11_N_SUPPORT
1657         DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_CONNECT Event B!.BACapability = %x. ClientStatusFlags = %lx\n", pAd->CommonCfg.BACapability.word, pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
1658 #endif // DOT11_N_SUPPORT //
1659
1660         // Set LED
1661         RTMPSetLED(pAd, LED_LINK_UP);
1662
1663         pAd->Mlme.PeriodicRound = 0;
1664         pAd->Mlme.OneSecPeriodicRound = 0;
1665         pAd->bConfigChanged = FALSE;        // Reset config flag
1666         pAd->ExtraInfo = GENERAL_LINK_UP;   // Update extra information to link is up
1667
1668         // Set asic auto fall back
1669         {
1670                 PUCHAR                                  pTable;
1671                 UCHAR                                   TableSize = 0;
1672
1673                 MlmeSelectTxRateTable(pAd, &pAd->MacTab.Content[BSSID_WCID], &pTable, &TableSize, &pAd->CommonCfg.TxRateIndex);
1674                 AsicUpdateAutoFallBackTable(pAd, pTable);
1675         }
1676
1677         NdisAcquireSpinLock(&pAd->MacTabLock);
1678     pEntry->HTPhyMode.word = pAd->StaCfg.HTPhyMode.word;
1679     pEntry->MaxHTPhyMode.word = pAd->StaCfg.HTPhyMode.word;
1680         if (pAd->StaCfg.bAutoTxRateSwitch == FALSE)
1681         {
1682                 pEntry->bAutoTxRateSwitch = FALSE;
1683 #ifdef DOT11_N_SUPPORT
1684                 if (pEntry->HTPhyMode.field.MCS == 32)
1685                         pEntry->HTPhyMode.field.ShortGI = GI_800;
1686
1687                 if ((pEntry->HTPhyMode.field.MCS > MCS_7) || (pEntry->HTPhyMode.field.MCS == 32))
1688                         pEntry->HTPhyMode.field.STBC = STBC_NONE;
1689 #endif // DOT11_N_SUPPORT //
1690                 // If the legacy mode is set, overwrite the transmit setting of this entry.
1691                 if (pEntry->HTPhyMode.field.MODE <= MODE_OFDM)
1692                         RTMPUpdateLegacyTxSetting((UCHAR)pAd->StaCfg.DesiredTransmitSetting.field.FixedTxMode, pEntry);
1693         }
1694         else
1695                 pEntry->bAutoTxRateSwitch = TRUE;
1696         NdisReleaseSpinLock(&pAd->MacTabLock);
1697
1698         //  Let Link Status Page display first initial rate.
1699         pAd->LastTxRate = (USHORT)(pEntry->HTPhyMode.word);
1700         // Select DAC according to HT or Legacy
1701         if (pAd->StaActive.SupportedPhyInfo.MCSSet[0] != 0x00)
1702         {
1703                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &Value);
1704                 Value &= (~0x18);
1705                 if (pAd->Antenna.field.TxPath == 2)
1706                 {
1707                     Value |= 0x10;
1708                 }
1709                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, Value);
1710         }
1711         else
1712         {
1713                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &Value);
1714                 Value &= (~0x18);
1715                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, Value);
1716         }
1717
1718 #ifdef DOT11_N_SUPPORT
1719         if (pAd->StaActive.SupportedPhyInfo.bHtEnable == FALSE)
1720         {
1721         }
1722         else if (pEntry->MaxRAmpduFactor == 0)
1723         {
1724             // If HT AP doesn't support MaxRAmpduFactor = 1, we need to set max PSDU to 0.
1725             // Because our Init value is 1 at MACRegTable.
1726                 RTMP_IO_WRITE32(pAd, MAX_LEN_CFG, 0x0fff);
1727         }
1728 #endif // DOT11_N_SUPPORT //
1729
1730         // Patch for Marvel AP to gain high throughput
1731         // Need to set as following,
1732         // 1. Set txop in register-EDCA_AC0_CFG as 0x60
1733         // 2. Set EnTXWriteBackDDONE in register-WPDMA_GLO_CFG as zero
1734         // 3. PBF_MAX_PCNT as 0x1F3FBF9F
1735         // 4. kick per two packets when dequeue
1736         //
1737         // Txop can only be modified when RDG is off, WMM is disable and TxBurst is enable
1738         //
1739         // if 1. Legacy AP WMM on,  or 2. 11n AP, AMPDU disable.  Force turn off burst no matter what bEnableTxBurst is.
1740 #ifdef DOT11_N_SUPPORT
1741         if (((pAd->StaActive.SupportedPhyInfo.bHtEnable == FALSE) && (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_WMM_INUSED)))
1742                 || ((pAd->StaActive.SupportedPhyInfo.bHtEnable == TRUE) && (pAd->CommonCfg.BACapability.field.Policy == BA_NOTUSE)))
1743         {
1744                 RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
1745                 Data  &= 0xFFFFFF00;
1746                 RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
1747
1748                 RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3F7F9F);
1749                 DBGPRINT(RT_DEBUG_TRACE, ("Txburst 1\n"));
1750         }
1751         else
1752 #endif // DOT11_N_SUPPORT //
1753         if (pAd->CommonCfg.bEnableTxBurst)
1754         {
1755                 RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
1756                 Data  &= 0xFFFFFF00;
1757                 Data  |= 0x60;
1758                 RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
1759                 pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = TRUE;
1760
1761                 RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3FBF9F);
1762                 DBGPRINT(RT_DEBUG_TRACE, ("Txburst 2\n"));
1763         }
1764         else
1765         {
1766                 RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
1767                 Data  &= 0xFFFFFF00;
1768                 RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
1769
1770                 RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3F7F9F);
1771                 DBGPRINT(RT_DEBUG_TRACE, ("Txburst 3\n"));
1772         }
1773
1774 #ifdef DOT11_N_SUPPORT
1775         // Re-check to turn on TX burst or not.
1776         if ((pAd->CommonCfg.IOTestParm.bLastAtheros == TRUE) && ((STA_WEP_ON(pAd))||(STA_TKIP_ON(pAd))))
1777         {
1778                 pAd->CommonCfg.IOTestParm.bNextDisableRxBA = TRUE;
1779                 if (pAd->CommonCfg.bEnableTxBurst)
1780                 {
1781                     UINT32 MACValue = 0;
1782                         // Force disable  TXOP value in this case. The same action in MLMEUpdateProtect too.
1783                         // I didn't change PBF_MAX_PCNT setting.
1784                         RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &MACValue);
1785                         MACValue  &= 0xFFFFFF00;
1786                         RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, MACValue);
1787                         pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = FALSE;
1788                 }
1789         }
1790         else
1791         {
1792                 pAd->CommonCfg.IOTestParm.bNextDisableRxBA = FALSE;
1793         }
1794 #endif // DOT11_N_SUPPORT //
1795
1796         pAd->CommonCfg.IOTestParm.bLastAtheros = FALSE;
1797         COPY_MAC_ADDR(pAd->CommonCfg.LastBssid, pAd->CommonCfg.Bssid);
1798         DBGPRINT(RT_DEBUG_TRACE, ("!!!pAd->bNextDisableRxBA= %d \n", pAd->CommonCfg.IOTestParm.bNextDisableRxBA));
1799         // BSSID add in one MAC entry too.  Because in Tx, ASIC need to check Cipher and IV/EIV, BAbitmap
1800         // Pther information in MACTab.Content[BSSID_WCID] is not necessary for driver.
1801         // Note: As STA, The MACTab.Content[BSSID_WCID]. PairwiseKey and Shared Key for BSS0 are the same.
1802
1803     if (pAd->StaCfg.WepStatus <= Ndis802_11WEPDisabled)
1804     {
1805         pAd->StaCfg.PortSecured = WPA_802_1X_PORT_SECURED;
1806                 pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilterAcceptAll;
1807         }
1808
1809         NdisAcquireSpinLock(&pAd->MacTabLock);
1810         pEntry->PortSecured = pAd->StaCfg.PortSecured;
1811         NdisReleaseSpinLock(&pAd->MacTabLock);
1812
1813     //
1814         // Patch Atheros AP TX will breakdown issue.
1815         // AP Model: DLink DWL-8200AP
1816         //
1817         if (INFRA_ON(pAd) && OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_WMM_INUSED) && STA_TKIP_ON(pAd))
1818         {
1819                 RTMP_IO_WRITE32(pAd, RX_PARSER_CFG, 0x01);
1820         }
1821         else
1822         {
1823                 RTMP_IO_WRITE32(pAd, RX_PARSER_CFG, 0x00);
1824         }
1825
1826         RTMP_CLEAR_FLAG(pAd, fRTMP_ADAPTER_BSS_SCAN_IN_PROGRESS);
1827
1828
1829 #ifdef DOT11_N_SUPPORT
1830 #ifdef DOT11N_DRAFT3
1831         if ((pAd->CommonCfg.BACapability.field.b2040CoexistScanSup) && (pAd->CommonCfg.Channel <= 11))
1832         {
1833                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_SCAN_2040);
1834                 BuildEffectedChannelList(pAd);
1835         }
1836 #endif // DOT11N_DRAFT3 //
1837 #endif // DOT11_N_SUPPORT //
1838 }
1839
1840 /*
1841         ==========================================================================
1842
1843         Routine Description:
1844                 Disconnect current BSSID
1845
1846         Arguments:
1847                 pAd                             - Pointer to our adapter
1848                 IsReqFromAP             - Request from AP
1849
1850         Return Value:
1851                 None
1852
1853         IRQL = DISPATCH_LEVEL
1854
1855         Note:
1856                 We need more information to know it's this requst from AP.
1857                 If yes! we need to do extra handling, for example, remove the WPA key.
1858                 Otherwise on 4-way handshaking will faied, since the WPA key didn't be
1859                 remove while auto reconnect.
1860                 Disconnect request from AP, it means we will start afresh 4-way handshaking
1861                 on WPA mode.
1862
1863         ==========================================================================
1864 */
1865 VOID LinkDown(
1866         IN PRTMP_ADAPTER pAd,
1867         IN  BOOLEAN      IsReqFromAP)
1868 {
1869         UCHAR                       i, ByteValue = 0;
1870
1871         // Do nothing if monitor mode is on
1872         if (MONITOR_ON(pAd))
1873                 return;
1874
1875     if (pAd->CommonCfg.bWirelessEvent)
1876         {
1877                 RTMPSendWirelessEvent(pAd, IW_STA_LINKDOWN_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
1878         }
1879
1880         DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN !!!\n"));
1881         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1882
1883         if (ADHOC_ON(pAd))              // Adhoc mode link down
1884         {
1885                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN 1!!!\n"));
1886
1887                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_ADHOC_ON);
1888                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
1889                 pAd->IndicateMediaState = NdisMediaStateDisconnected;
1890                 RTMP_IndicateMediaState(pAd);
1891         pAd->ExtraInfo = GENERAL_LINK_DOWN;
1892                 BssTableDeleteEntry(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Channel);
1893                 DBGPRINT(RT_DEBUG_TRACE, ("!!! MacTab.Size=%d !!!\n", pAd->MacTab.Size));
1894         }
1895         else                                    // Infra structure mode
1896         {
1897                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN 2!!!\n"));
1898
1899                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_INFRA_ON);
1900                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
1901
1902                 // Saved last SSID for linkup comparison
1903                 pAd->CommonCfg.LastSsidLen = pAd->CommonCfg.SsidLen;
1904                 NdisMoveMemory(pAd->CommonCfg.LastSsid, pAd->CommonCfg.Ssid, pAd->CommonCfg.LastSsidLen);
1905                 COPY_MAC_ADDR(pAd->CommonCfg.LastBssid, pAd->CommonCfg.Bssid);
1906                 if (pAd->MlmeAux.CurrReqIsFromNdis == TRUE)
1907                 {
1908                         pAd->IndicateMediaState = NdisMediaStateDisconnected;
1909                         RTMP_IndicateMediaState(pAd);
1910             pAd->ExtraInfo = GENERAL_LINK_DOWN;
1911                         DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event A!\n"));
1912                         pAd->MlmeAux.CurrReqIsFromNdis = FALSE;
1913                 }
1914                 else
1915                 {
1916             //
1917                         // If disassociation request is from NDIS, then we don't need to delete BSSID from entry.
1918                         // Otherwise lost beacon or receive De-Authentication from AP,
1919                         // then we should delete BSSID from BssTable.
1920                         // If we don't delete from entry, roaming will fail.
1921                         //
1922                         BssTableDeleteEntry(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Channel);
1923                 }
1924
1925                 // restore back to -
1926                 //      1. long slot (20 us) or short slot (9 us) time
1927                 //      2. turn on/off RTS/CTS and/or CTS-to-self protection
1928                 //      3. short preamble
1929                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_BG_PROTECTION_INUSED);
1930
1931                 if (pAd->StaCfg.CCXAdjacentAPReportFlag == TRUE)
1932                 {
1933                         //
1934                         // Record current AP's information.
1935                         // for later used reporting Adjacent AP report.
1936                         //
1937                         pAd->StaCfg.CCXAdjacentAPChannel = pAd->CommonCfg.Channel;
1938                         pAd->StaCfg.CCXAdjacentAPSsidLen = pAd->CommonCfg.SsidLen;
1939                         NdisMoveMemory(pAd->StaCfg.CCXAdjacentAPSsid, pAd->CommonCfg.Ssid, pAd->StaCfg.CCXAdjacentAPSsidLen);
1940                         COPY_MAC_ADDR(pAd->StaCfg.CCXAdjacentAPBssid, pAd->CommonCfg.Bssid);
1941                 }
1942         }
1943
1944         for (i=1; i<MAX_LEN_OF_MAC_TABLE; i++)
1945         {
1946                 if (pAd->MacTab.Content[i].ValidAsCLI == TRUE)
1947                         MacTableDeleteEntry(pAd, pAd->MacTab.Content[i].Aid, pAd->MacTab.Content[i].Addr);
1948         }
1949
1950         pAd->StaCfg.CCXQosECWMin        = 4;
1951         pAd->StaCfg.CCXQosECWMax        = 10;
1952
1953         AsicSetSlotTime(pAd, TRUE); //FALSE);
1954         AsicSetEdcaParm(pAd, NULL);
1955
1956         // Set LED
1957         RTMPSetLED(pAd, LED_LINK_DOWN);
1958     pAd->LedIndicatorStregth = 0xF0;
1959     RTMPSetSignalLED(pAd, -100);        // Force signal strength Led to be turned off, firmware is not done it.
1960
1961                 AsicDisableSync(pAd);
1962
1963         pAd->Mlme.PeriodicRound = 0;
1964         pAd->Mlme.OneSecPeriodicRound = 0;
1965
1966         if (pAd->StaCfg.BssType == BSS_INFRA)
1967         {
1968                 // Remove StaCfg Information after link down
1969                 NdisZeroMemory(pAd->CommonCfg.Bssid, MAC_ADDR_LEN);
1970                 NdisZeroMemory(pAd->CommonCfg.Ssid, MAX_LEN_OF_SSID);
1971                 pAd->CommonCfg.SsidLen = 0;
1972         }
1973 #ifdef DOT11_N_SUPPORT
1974         NdisZeroMemory(&pAd->MlmeAux.HtCapability, sizeof(HT_CAPABILITY_IE));
1975         NdisZeroMemory(&pAd->MlmeAux.AddHtInfo, sizeof(ADD_HT_INFO_IE));
1976         pAd->MlmeAux.HtCapabilityLen = 0;
1977         pAd->MlmeAux.NewExtChannelOffset = 0xff;
1978 #endif // DOT11_N_SUPPORT //
1979
1980         // Reset WPA-PSK state. Only reset when supplicant enabled
1981         if (pAd->StaCfg.WpaState != SS_NOTUSE)
1982         {
1983                 pAd->StaCfg.WpaState = SS_START;
1984                 // Clear Replay counter
1985                 NdisZeroMemory(pAd->StaCfg.ReplayCounter, 8);
1986         }
1987
1988
1989         //
1990         // if link down come from AP, we need to remove all WPA keys on WPA mode.
1991         // otherwise will cause 4-way handshaking failed, since the WPA key not empty.
1992         //
1993         if ((IsReqFromAP) && (pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA))
1994         {
1995                 // Remove all WPA keys
1996                 RTMPWPARemoveAllKeys(pAd);
1997         }
1998
1999         // 802.1x port control
2000 #ifdef WPA_SUPPLICANT_SUPPORT
2001         // Prevent clear PortSecured here with static WEP
2002         // NetworkManger set security policy first then set SSID to connect AP.
2003         if (pAd->StaCfg.WpaSupplicantUP &&
2004                 (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled) &&
2005                 (pAd->StaCfg.IEEE8021X == FALSE))
2006         {
2007                 pAd->StaCfg.PortSecured = WPA_802_1X_PORT_SECURED;
2008         }
2009         else
2010 #endif // WPA_SUPPLICANT_SUPPORT //
2011         {
2012                 pAd->StaCfg.PortSecured = WPA_802_1X_PORT_NOT_SECURED;
2013                 pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilter8021xWEP;
2014         }
2015
2016         NdisAcquireSpinLock(&pAd->MacTabLock);
2017         pAd->MacTab.Content[BSSID_WCID].PortSecured = pAd->StaCfg.PortSecured;
2018         NdisReleaseSpinLock(&pAd->MacTabLock);
2019
2020         pAd->StaCfg.MicErrCnt = 0;
2021
2022         // Turn off Ckip control flag
2023         pAd->StaCfg.bCkipOn = FALSE;
2024         pAd->StaCfg.CCXEnable = FALSE;
2025
2026     pAd->IndicateMediaState = NdisMediaStateDisconnected;
2027         // Update extra information to link is up
2028         pAd->ExtraInfo = GENERAL_LINK_DOWN;
2029
2030     //pAd->StaCfg.AdhocBOnlyJoined = FALSE;
2031         //pAd->StaCfg.AdhocBGJoined = FALSE;
2032         //pAd->StaCfg.Adhoc20NJoined = FALSE;
2033     pAd->StaActive.SupportedPhyInfo.bHtEnable = FALSE;
2034
2035         // Reset the Current AP's IP address
2036         NdisZeroMemory(pAd->StaCfg.AironetIPAddress, 4);
2037 #ifdef RT2870
2038         pAd->bUsbTxBulkAggre = FALSE;
2039 #endif // RT2870 //
2040
2041         // Clean association information
2042         NdisZeroMemory(&pAd->StaCfg.AssocInfo, sizeof(NDIS_802_11_ASSOCIATION_INFORMATION));
2043         pAd->StaCfg.AssocInfo.Length = sizeof(NDIS_802_11_ASSOCIATION_INFORMATION);
2044         pAd->StaCfg.ReqVarIELen = 0;
2045         pAd->StaCfg.ResVarIELen = 0;
2046
2047         //
2048         // Reset RSSI value after link down
2049         //
2050         pAd->StaCfg.RssiSample.AvgRssi0 = 0;
2051         pAd->StaCfg.RssiSample.AvgRssi0X8 = 0;
2052         pAd->StaCfg.RssiSample.AvgRssi1 = 0;
2053         pAd->StaCfg.RssiSample.AvgRssi1X8 = 0;
2054         pAd->StaCfg.RssiSample.AvgRssi2 = 0;
2055         pAd->StaCfg.RssiSample.AvgRssi2X8 = 0;
2056
2057         // Restore MlmeRate
2058         pAd->CommonCfg.MlmeRate = pAd->CommonCfg.BasicMlmeRate;
2059         pAd->CommonCfg.RtsRate = pAd->CommonCfg.BasicMlmeRate;
2060
2061 #ifdef DOT11_N_SUPPORT
2062         //
2063         // After Link down, reset piggy-back setting in ASIC. Disable RDG.
2064         //
2065         if (pAd->CommonCfg.BBPCurrentBW == BW_40)
2066         {
2067                 pAd->CommonCfg.BBPCurrentBW = BW_20;
2068                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &ByteValue);
2069                 ByteValue &= (~0x18);
2070                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, ByteValue);
2071         }
2072 #endif // DOT11_N_SUPPORT //
2073         // Reset DAC
2074         RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &ByteValue);
2075         ByteValue &= (~0x18);
2076         if (pAd->Antenna.field.TxPath == 2)
2077         {
2078                 ByteValue |= 0x10;
2079         }
2080         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, ByteValue);
2081
2082         RTMPSetPiggyBack(pAd,FALSE);
2083         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_PIGGYBACK_INUSED);
2084
2085 #ifdef DOT11_N_SUPPORT
2086         pAd->CommonCfg.BACapability.word = pAd->CommonCfg.REGBACapability.word;
2087 #endif // DOT11_N_SUPPORT //
2088
2089         // Restore all settings in the following.
2090         AsicUpdateProtect(pAd, 0, (ALLN_SETPROTECT|CCKSETPROTECT|OFDMSETPROTECT), TRUE, FALSE);
2091         AsicDisableRDG(pAd);
2092         pAd->CommonCfg.IOTestParm.bCurrentAtheros = FALSE;
2093         pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = FALSE;
2094
2095 #ifdef DOT11_N_SUPPORT
2096 #ifdef DOT11N_DRAFT3
2097         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_SCAN_2040);
2098         pAd->CommonCfg.BSSCoexist2040.word = 0;
2099         TriEventInit(pAd);
2100         for (i = 0; i < (pAd->ChannelListNum - 1); i++)
2101         {
2102                 pAd->ChannelList[i].bEffectedChannel = FALSE;
2103         }
2104 #endif // DOT11N_DRAFT3 //
2105 #endif // DOT11_N_SUPPORT //
2106
2107         RTMP_IO_WRITE32(pAd, MAX_LEN_CFG, 0x1fff);
2108         RTMP_CLEAR_FLAG(pAd, fRTMP_ADAPTER_BSS_SCAN_IN_PROGRESS);
2109
2110 #ifdef WPA_SUPPLICANT_SUPPORT
2111 #ifndef NATIVE_WPA_SUPPLICANT_SUPPORT
2112         if (pAd->StaCfg.WpaSupplicantUP) {
2113                 union iwreq_data    wrqu;
2114                 //send disassociate event to wpa_supplicant
2115                 memset(&wrqu, 0, sizeof(wrqu));
2116                 wrqu.data.flags = RT_DISASSOC_EVENT_FLAG;
2117                 wireless_send_event(pAd->net_dev, IWEVCUSTOM, &wrqu, NULL);
2118         }
2119 #endif // NATIVE_WPA_SUPPLICANT_SUPPORT //
2120 #endif // WPA_SUPPLICANT_SUPPORT //
2121
2122 #ifdef NATIVE_WPA_SUPPLICANT_SUPPORT
2123         {
2124                 union iwreq_data    wrqu;
2125                 memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
2126                 wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
2127         }
2128 #endif // NATIVE_WPA_SUPPLICANT_SUPPORT //
2129 }
2130
2131 /*
2132         ==========================================================================
2133         Description:
2134
2135         IRQL = DISPATCH_LEVEL
2136
2137         ==========================================================================
2138 */
2139 VOID IterateOnBssTab(
2140         IN PRTMP_ADAPTER pAd)
2141 {
2142         MLME_START_REQ_STRUCT   StartReq;
2143         MLME_JOIN_REQ_STRUCT    JoinReq;
2144         ULONG                   BssIdx;
2145
2146         // Change the wepstatus to original wepstatus
2147         pAd->StaCfg.WepStatus   = pAd->StaCfg.OrigWepStatus;
2148         pAd->StaCfg.PairCipher  = pAd->StaCfg.OrigWepStatus;
2149         pAd->StaCfg.GroupCipher = pAd->StaCfg.OrigWepStatus;
2150
2151         BssIdx = pAd->MlmeAux.BssIdx;
2152         if (BssIdx < pAd->MlmeAux.SsidBssTab.BssNr)
2153         {
2154                 // Check cipher suite, AP must have more secured cipher than station setting
2155                 // Set the Pairwise and Group cipher to match the intended AP setting
2156                 // We can only connect to AP with less secured cipher setting
2157                 if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK))
2158                 {
2159                         pAd->StaCfg.GroupCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.GroupCipher;
2160
2161                         if (pAd->StaCfg.WepStatus == pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipher)
2162                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipher;
2163                         else if (pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipherAux != Ndis802_11WEPDisabled)
2164                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipherAux;
2165                         else    // There is no PairCipher Aux, downgrade our capability to TKIP
2166                                 pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
2167                 }
2168                 else if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK))
2169                 {
2170                         pAd->StaCfg.GroupCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.GroupCipher;
2171
2172                         if (pAd->StaCfg.WepStatus == pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipher)
2173                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipher;
2174                         else if (pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipherAux != Ndis802_11WEPDisabled)
2175                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipherAux;
2176                         else    // There is no PairCipher Aux, downgrade our capability to TKIP
2177                                 pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
2178
2179                         // RSN capability
2180                         pAd->StaCfg.RsnCapability = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.RsnCapability;
2181                 }
2182
2183                 // Set Mix cipher flag
2184                 pAd->StaCfg.bMixCipher = (pAd->StaCfg.PairCipher == pAd->StaCfg.GroupCipher) ? FALSE : TRUE;
2185                 if (pAd->StaCfg.bMixCipher == TRUE)
2186                 {
2187                         // If mix cipher, re-build RSNIE
2188                         RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, 0);
2189                 }
2190
2191                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - iterate BSS %ld of %d\n", BssIdx, pAd->MlmeAux.SsidBssTab.BssNr));
2192                 JoinParmFill(pAd, &JoinReq, BssIdx);
2193                 MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_JOIN_REQ, sizeof(MLME_JOIN_REQ_STRUCT),
2194                                         &JoinReq);
2195                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_JOIN;
2196         }
2197         else if (pAd->StaCfg.BssType == BSS_ADHOC)
2198         {
2199                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All BSS fail; start a new ADHOC (Ssid=%s)...\n",pAd->MlmeAux.Ssid));
2200                 StartParmFill(pAd, &StartReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
2201                 MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_START_REQ, sizeof(MLME_START_REQ_STRUCT), &StartReq);
2202                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_START;
2203         }
2204         else // no more BSS
2205         {
2206                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All roaming failed, stay @ ch #%d\n", pAd->CommonCfg.Channel));
2207                 AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
2208                 AsicLockChannel(pAd, pAd->CommonCfg.Channel);
2209                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
2210         }
2211 }
2212
2213 // for re-association only
2214 // IRQL = DISPATCH_LEVEL
2215 VOID IterateOnBssTab2(
2216         IN PRTMP_ADAPTER pAd)
2217 {
2218         MLME_REASSOC_REQ_STRUCT ReassocReq;
2219         ULONG                   BssIdx;
2220         BSS_ENTRY               *pBss;
2221
2222         BssIdx = pAd->MlmeAux.RoamIdx;
2223         pBss = &pAd->MlmeAux.RoamTab.BssEntry[BssIdx];
2224
2225         if (BssIdx < pAd->MlmeAux.RoamTab.BssNr)
2226         {
2227                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - iterate BSS %ld of %d\n", BssIdx, pAd->MlmeAux.RoamTab.BssNr));
2228
2229                 AsicSwitchChannel(pAd, pBss->Channel, FALSE);
2230                 AsicLockChannel(pAd, pBss->Channel);
2231
2232                 // reassociate message has the same structure as associate message
2233                 AssocParmFill(pAd, &ReassocReq, pBss->Bssid, pBss->CapabilityInfo,
2234                                           ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
2235                 MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_REASSOC_REQ,
2236                                         sizeof(MLME_REASSOC_REQ_STRUCT), &ReassocReq);
2237
2238                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_REASSOC;
2239         }
2240         else // no more BSS
2241         {
2242                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All fast roaming failed, back to ch #%d\n",pAd->CommonCfg.Channel));
2243                 AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
2244                 AsicLockChannel(pAd, pAd->CommonCfg.Channel);
2245                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
2246         }
2247 }
2248
2249 /*
2250         ==========================================================================
2251         Description:
2252
2253         IRQL = DISPATCH_LEVEL
2254
2255         ==========================================================================
2256 */
2257 VOID JoinParmFill(
2258         IN PRTMP_ADAPTER pAd,
2259         IN OUT MLME_JOIN_REQ_STRUCT *JoinReq,
2260         IN ULONG BssIdx)
2261 {
2262         JoinReq->BssIdx = BssIdx;
2263 }
2264
2265 /*
2266         ==========================================================================
2267         Description:
2268
2269         IRQL = DISPATCH_LEVEL
2270
2271         ==========================================================================
2272 */
2273 VOID ScanParmFill(
2274         IN PRTMP_ADAPTER pAd,
2275         IN OUT MLME_SCAN_REQ_STRUCT *ScanReq,
2276         IN CHAR Ssid[],
2277         IN UCHAR SsidLen,
2278         IN UCHAR BssType,
2279         IN UCHAR ScanType)
2280 {
2281     NdisZeroMemory(ScanReq->Ssid, MAX_LEN_OF_SSID);
2282         ScanReq->SsidLen = SsidLen;
2283         NdisMoveMemory(ScanReq->Ssid, Ssid, SsidLen);
2284         ScanReq->BssType = BssType;
2285         ScanReq->ScanType = ScanType;
2286 }
2287
2288 /*
2289         ==========================================================================
2290         Description:
2291
2292         IRQL = DISPATCH_LEVEL
2293
2294         ==========================================================================
2295 */
2296 VOID StartParmFill(
2297         IN PRTMP_ADAPTER pAd,
2298         IN OUT MLME_START_REQ_STRUCT *StartReq,
2299         IN CHAR Ssid[],
2300         IN UCHAR SsidLen)
2301 {
2302         ASSERT(SsidLen <= MAX_LEN_OF_SSID);
2303         NdisMoveMemory(StartReq->Ssid, Ssid, SsidLen);
2304         StartReq->SsidLen = SsidLen;
2305 }
2306
2307 /*
2308         ==========================================================================
2309         Description:
2310
2311         IRQL = DISPATCH_LEVEL
2312
2313         ==========================================================================
2314 */
2315 VOID AuthParmFill(
2316         IN PRTMP_ADAPTER pAd,
2317         IN OUT MLME_AUTH_REQ_STRUCT *AuthReq,
2318         IN PUCHAR pAddr,
2319         IN USHORT Alg)
2320 {
2321         COPY_MAC_ADDR(AuthReq->Addr, pAddr);
2322         AuthReq->Alg = Alg;
2323         AuthReq->Timeout = AUTH_TIMEOUT;
2324 }
2325
2326 /*
2327         ==========================================================================
2328         Description:
2329
2330         IRQL = DISPATCH_LEVEL
2331
2332         ==========================================================================
2333  */
2334
2335
2336 #ifdef RT2870
2337
2338 VOID MlmeCntlConfirm(
2339         IN PRTMP_ADAPTER pAd,
2340         IN ULONG MsgType,
2341         IN USHORT Msg)
2342 {
2343         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MsgType, sizeof(USHORT), &Msg);
2344 }
2345
2346 VOID ComposePsPoll(
2347         IN PRTMP_ADAPTER pAd)
2348 {
2349         PTXINFO_STRUC           pTxInfo;
2350         PTXWI_STRUC             pTxWI;
2351
2352         DBGPRINT(RT_DEBUG_TRACE, ("ComposePsPoll\n"));
2353         NdisZeroMemory(&pAd->PsPollFrame, sizeof(PSPOLL_FRAME));
2354
2355         pAd->PsPollFrame.FC.PwrMgmt = 0;
2356         pAd->PsPollFrame.FC.Type = BTYPE_CNTL;
2357         pAd->PsPollFrame.FC.SubType = SUBTYPE_PS_POLL;
2358         pAd->PsPollFrame.Aid = pAd->StaActive.Aid | 0xC000;
2359         COPY_MAC_ADDR(pAd->PsPollFrame.Bssid, pAd->CommonCfg.Bssid);
2360         COPY_MAC_ADDR(pAd->PsPollFrame.Ta, pAd->CurrentAddress);
2361
2362         RTMPZeroMemory(&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[0], 100);
2363         pTxInfo = (PTXINFO_STRUC)&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[0];
2364         RTMPWriteTxInfo(pAd, pTxInfo, (USHORT)(sizeof(PSPOLL_FRAME)+TXWI_SIZE), TRUE, EpToQueue[MGMTPIPEIDX], FALSE,  FALSE);
2365         pTxWI = (PTXWI_STRUC)&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[TXINFO_SIZE];
2366         RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, FALSE, FALSE, TRUE, FALSE, 0, BSSID_WCID, (sizeof(PSPOLL_FRAME)),
2367                 0,  0, (UCHAR)pAd->CommonCfg.MlmeTransmit.field.MCS, IFS_BACKOFF, FALSE, &pAd->CommonCfg.MlmeTransmit);
2368         RTMPMoveMemory(&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[TXWI_SIZE+TXINFO_SIZE], &pAd->PsPollFrame, sizeof(PSPOLL_FRAME));
2369         // Append 4 extra zero bytes.
2370         pAd->PsPollContext.BulkOutSize =  TXINFO_SIZE + TXWI_SIZE + sizeof(PSPOLL_FRAME) + 4;
2371 }
2372
2373 // IRQL = DISPATCH_LEVEL
2374 VOID ComposeNullFrame(
2375         IN PRTMP_ADAPTER pAd)
2376 {
2377         PTXINFO_STRUC           pTxInfo;
2378         PTXWI_STRUC             pTxWI;
2379
2380         NdisZeroMemory(&pAd->NullFrame, sizeof(HEADER_802_11));
2381         pAd->NullFrame.FC.Type = BTYPE_DATA;
2382         pAd->NullFrame.FC.SubType = SUBTYPE_NULL_FUNC;
2383         pAd->NullFrame.FC.ToDs = 1;
2384         COPY_MAC_ADDR(pAd->NullFrame.Addr1, pAd->CommonCfg.Bssid);
2385         COPY_MAC_ADDR(pAd->NullFrame.Addr2, pAd->CurrentAddress);
2386         COPY_MAC_ADDR(pAd->NullFrame.Addr3, pAd->CommonCfg.Bssid);
2387         RTMPZeroMemory(&pAd->NullContext.TransferBuffer->field.WirelessPacket[0], 100);
2388         pTxInfo = (PTXINFO_STRUC)&pAd->NullContext.TransferBuffer->field.WirelessPacket[0];
2389         RTMPWriteTxInfo(pAd, pTxInfo, (USHORT)(sizeof(HEADER_802_11)+TXWI_SIZE), TRUE, EpToQueue[MGMTPIPEIDX], FALSE,  FALSE);
2390         pTxWI = (PTXWI_STRUC)&pAd->NullContext.TransferBuffer->field.WirelessPacket[TXINFO_SIZE];
2391         RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, FALSE, FALSE, TRUE, FALSE, 0, BSSID_WCID, (sizeof(HEADER_802_11)),
2392                 0, 0, (UCHAR)pAd->CommonCfg.MlmeTransmit.field.MCS, IFS_BACKOFF, FALSE, &pAd->CommonCfg.MlmeTransmit);
2393         RTMPMoveMemory(&pAd->NullContext.TransferBuffer->field.WirelessPacket[TXWI_SIZE+TXINFO_SIZE], &pAd->NullFrame, sizeof(HEADER_802_11));
2394         pAd->NullContext.BulkOutSize =  TXINFO_SIZE + TXWI_SIZE + sizeof(pAd->NullFrame) + 4;
2395 }
2396 #endif // RT2870 //
2397
2398
2399 /*
2400         ==========================================================================
2401         Description:
2402                 Pre-build a BEACON frame in the shared memory
2403
2404         IRQL = PASSIVE_LEVEL
2405         IRQL = DISPATCH_LEVEL
2406
2407         ==========================================================================
2408 */
2409 ULONG MakeIbssBeacon(
2410         IN PRTMP_ADAPTER pAd)
2411 {
2412         UCHAR         DsLen = 1, IbssLen = 2;
2413         UCHAR         LocalErpIe[3] = {IE_ERP, 1, 0x04};
2414         HEADER_802_11 BcnHdr;
2415         USHORT        CapabilityInfo;
2416         LARGE_INTEGER FakeTimestamp;
2417         ULONG         FrameLen = 0;
2418         PTXWI_STRUC       pTxWI = &pAd->BeaconTxWI;
2419         CHAR         *pBeaconFrame = pAd->BeaconBuf;
2420         BOOLEAN       Privacy;
2421         UCHAR         SupRate[MAX_LEN_OF_SUPPORTED_RATES];
2422         UCHAR         SupRateLen = 0;
2423         UCHAR         ExtRate[MAX_LEN_OF_SUPPORTED_RATES];
2424         UCHAR         ExtRateLen = 0;
2425         UCHAR         RSNIe = IE_WPA;
2426
2427         if ((pAd->CommonCfg.PhyMode == PHY_11B) && (pAd->CommonCfg.Channel <= 14))
2428         {
2429                 SupRate[0] = 0x82; // 1 mbps
2430                 SupRate[1] = 0x84; // 2 mbps
2431                 SupRate[2] = 0x8b; // 5.5 mbps
2432                 SupRate[3] = 0x96; // 11 mbps
2433                 SupRateLen = 4;
2434                 ExtRateLen = 0;
2435         }
2436         else if (pAd->CommonCfg.Channel > 14)
2437         {
2438                 SupRate[0]  = 0x8C;    // 6 mbps, in units of 0.5 Mbps, basic rate
2439                 SupRate[1]  = 0x12;    // 9 mbps, in units of 0.5 Mbps
2440                 SupRate[2]  = 0x98;    // 12 mbps, in units of 0.5 Mbps, basic rate
2441                 SupRate[3]  = 0x24;    // 18 mbps, in units of 0.5 Mbps
2442                 SupRate[4]  = 0xb0;    // 24 mbps, in units of 0.5 Mbps, basic rate
2443                 SupRate[5]  = 0x48;    // 36 mbps, in units of 0.5 Mbps
2444                 SupRate[6]  = 0x60;    // 48 mbps, in units of 0.5 Mbps
2445                 SupRate[7]  = 0x6c;    // 54 mbps, in units of 0.5 Mbps
2446                 SupRateLen  = 8;
2447                 ExtRateLen  = 0;
2448
2449                 //
2450                 // Also Update MlmeRate & RtsRate for G only & A only
2451                 //
2452                 pAd->CommonCfg.MlmeRate = RATE_6;
2453                 pAd->CommonCfg.RtsRate = RATE_6;
2454                 pAd->CommonCfg.MlmeTransmit.field.MODE = MODE_OFDM;
2455                 pAd->CommonCfg.MlmeTransmit.field.MCS = OfdmRateToRxwiMCS[pAd->CommonCfg.MlmeRate];
2456                 pAd->MacTab.Content[BSS0Mcast_WCID].HTPhyMode.field.MODE = MODE_OFDM;
2457                 pAd->MacTab.Content[BSS0Mcast_WCID].HTPhyMode.field.MCS = OfdmRateToRxwiMCS[pAd->CommonCfg.MlmeRate];
2458         }
2459         else
2460         {
2461                 SupRate[0] = 0x82; // 1 mbps
2462                 SupRate[1] = 0x84; // 2 mbps
2463                 SupRate[2] = 0x8b; // 5.5 mbps
2464                 SupRate[3] = 0x96; // 11 mbps
2465                 SupRateLen = 4;
2466
2467                 ExtRate[0]  = 0x0C;    // 6 mbps, in units of 0.5 Mbps,
2468                 ExtRate[1]  = 0x12;    // 9 mbps, in units of 0.5 Mbps
2469                 ExtRate[2]  = 0x18;    // 12 mbps, in units of 0.5 Mbps,
2470                 ExtRate[3]  = 0x24;    // 18 mbps, in units of 0.5 Mbps
2471                 ExtRate[4]  = 0x30;    // 24 mbps, in units of 0.5 Mbps,
2472                 ExtRate[5]  = 0x48;    // 36 mbps, in units of 0.5 Mbps
2473                 ExtRate[6]  = 0x60;    // 48 mbps, in units of 0.5 Mbps
2474                 ExtRate[7]  = 0x6c;    // 54 mbps, in units of 0.5 Mbps
2475                 ExtRateLen  = 8;
2476         }
2477
2478         pAd->StaActive.SupRateLen = SupRateLen;
2479         NdisMoveMemory(pAd->StaActive.SupRate, SupRate, SupRateLen);
2480         pAd->StaActive.ExtRateLen = ExtRateLen;
2481         NdisMoveMemory(pAd->StaActive.ExtRate, ExtRate, ExtRateLen);
2482
2483         // compose IBSS beacon frame
2484         MgtMacHeaderInit(pAd, &BcnHdr, SUBTYPE_BEACON, 0, BROADCAST_ADDR, pAd->CommonCfg.Bssid);
2485         Privacy = (pAd->StaCfg.WepStatus == Ndis802_11Encryption1Enabled) ||
2486                           (pAd->StaCfg.WepStatus == Ndis802_11Encryption2Enabled) ||
2487                           (pAd->StaCfg.WepStatus == Ndis802_11Encryption3Enabled);
2488         CapabilityInfo = CAP_GENERATE(0, 1, Privacy, (pAd->CommonCfg.TxPreamble == Rt802_11PreambleShort), 0, 0);
2489
2490         MakeOutgoingFrame(pBeaconFrame,                &FrameLen,
2491                                           sizeof(HEADER_802_11),           &BcnHdr,
2492                                           TIMESTAMP_LEN,                   &FakeTimestamp,
2493                                           2,                               &pAd->CommonCfg.BeaconPeriod,
2494                                           2,                               &CapabilityInfo,
2495                                           1,                               &SsidIe,
2496                                           1,                               &pAd->CommonCfg.SsidLen,
2497                                           pAd->CommonCfg.SsidLen,          pAd->CommonCfg.Ssid,
2498                                           1,                               &SupRateIe,
2499                                           1,                               &SupRateLen,
2500                                           SupRateLen,                      SupRate,
2501                                           1,                               &DsIe,
2502                                           1,                               &DsLen,
2503                                           1,                               &pAd->CommonCfg.Channel,
2504                                           1,                               &IbssIe,
2505                                           1,                               &IbssLen,
2506                                           2,                               &pAd->StaActive.AtimWin,
2507                                           END_OF_ARGS);
2508
2509         // add ERP_IE and EXT_RAE IE of in 802.11g
2510         if (ExtRateLen)
2511         {
2512                 ULONG   tmp;
2513
2514                 MakeOutgoingFrame(pBeaconFrame + FrameLen,         &tmp,
2515                                                   3,                               LocalErpIe,
2516                                                   1,                               &ExtRateIe,
2517                                                   1,                               &ExtRateLen,
2518                                                   ExtRateLen,                      ExtRate,
2519                                                   END_OF_ARGS);
2520                 FrameLen += tmp;
2521         }
2522
2523         // If adhoc secruity is set for WPA-None, append the cipher suite IE
2524         if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone)
2525         {
2526                 ULONG tmp;
2527         RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, BSS0);
2528
2529                 MakeOutgoingFrame(pBeaconFrame + FrameLen,              &tmp,
2530                                                   1,                                    &RSNIe,
2531                                                   1,                                    &pAd->StaCfg.RSNIE_Len,
2532                                                   pAd->StaCfg.RSNIE_Len,                pAd->StaCfg.RSN_IE,
2533                                                   END_OF_ARGS);
2534                 FrameLen += tmp;
2535         }
2536
2537 #ifdef DOT11_N_SUPPORT
2538         if ((pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED))
2539         {
2540                 ULONG TmpLen;
2541                 UCHAR HtLen, HtLen1;
2542
2543 #ifdef RT_BIG_ENDIAN
2544                 HT_CAPABILITY_IE HtCapabilityTmp;
2545                 ADD_HT_INFO_IE  addHTInfoTmp;
2546                 USHORT  b2lTmp, b2lTmp2;
2547 #endif
2548
2549                 // add HT Capability IE
2550                 HtLen = sizeof(pAd->CommonCfg.HtCapability);
2551                 HtLen1 = sizeof(pAd->CommonCfg.AddHTInfo);
2552 #ifndef RT_BIG_ENDIAN
2553                 MakeOutgoingFrame(pBeaconFrame+FrameLen,        &TmpLen,
2554                                                   1,                                            &HtCapIe,
2555                                                   1,                                            &HtLen,
2556                                                   HtLen,                                        &pAd->CommonCfg.HtCapability,
2557                                                   1,                                            &AddHtInfoIe,
2558                                                   1,                                            &HtLen1,
2559                                                   HtLen1,                                       &pAd->CommonCfg.AddHTInfo,
2560                                                   END_OF_ARGS);
2561 #else
2562                 NdisMoveMemory(&HtCapabilityTmp, &pAd->CommonCfg.HtCapability, HtLen);
2563                 *(USHORT *)(&HtCapabilityTmp.HtCapInfo) = SWAP16(*(USHORT *)(&HtCapabilityTmp.HtCapInfo));
2564                 *(USHORT *)(&HtCapabilityTmp.ExtHtCapInfo) = SWAP16(*(USHORT *)(&HtCapabilityTmp.ExtHtCapInfo));
2565
2566                 NdisMoveMemory(&addHTInfoTmp, &pAd->CommonCfg.AddHTInfo, HtLen1);
2567                 *(USHORT *)(&addHTInfoTmp.AddHtInfo2) = SWAP16(*(USHORT *)(&addHTInfoTmp.AddHtInfo2));
2568                 *(USHORT *)(&addHTInfoTmp.AddHtInfo3) = SWAP16(*(USHORT *)(&addHTInfoTmp.AddHtInfo3));
2569
2570                 MakeOutgoingFrame(pBeaconFrame+FrameLen,        &TmpLen,
2571                                                   1,                                            &HtCapIe,
2572                                                   1,                                            &HtLen,
2573                                                   HtLen,                                        &HtCapabilityTmp,
2574                                                   1,                                            &AddHtInfoIe,
2575                                                   1,                                            &HtLen1,
2576                                                   HtLen1,                                       &addHTInfoTmp,
2577                                                   END_OF_ARGS);
2578 #endif
2579                 FrameLen += TmpLen;
2580         }
2581 #endif // DOT11_N_SUPPORT //
2582
2583         //beacon use reserved WCID 0xff
2584     if (pAd->CommonCfg.Channel > 14)
2585     {
2586                 RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE,  TRUE, FALSE, FALSE, TRUE, 0, 0xff, FrameLen,
2587                         PID_MGMT, PID_BEACON, RATE_1, IFS_HTTXOP, FALSE, &pAd->CommonCfg.MlmeTransmit);
2588     }
2589     else
2590     {
2591         // Set to use 1Mbps for Adhoc beacon.
2592                 HTTRANSMIT_SETTING Transmit;
2593         Transmit.word = 0;
2594         RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE,  TRUE, FALSE, FALSE, TRUE, 0, 0xff, FrameLen,
2595                 PID_MGMT, PID_BEACON, RATE_1, IFS_HTTXOP, FALSE, &Transmit);
2596     }
2597
2598 #ifdef RT_BIG_ENDIAN
2599         RTMPFrameEndianChange(pAd, pBeaconFrame, DIR_WRITE, FALSE);
2600         RTMPWIEndianChange((PUCHAR)pTxWI, TYPE_TXWI);
2601 #endif
2602
2603     DBGPRINT(RT_DEBUG_TRACE, ("MakeIbssBeacon (len=%ld), SupRateLen=%d, ExtRateLen=%d, Channel=%d, PhyMode=%d\n",
2604                                         FrameLen, SupRateLen, ExtRateLen, pAd->CommonCfg.Channel, pAd->CommonCfg.PhyMode));
2605         return FrameLen;
2606 }
2607
2608