Staging: rt3070: remove dead DOT11N_DRAFT3 code
[linux-2.6] / drivers / staging / rt3070 / sta / connect.c
1 /*
2  *************************************************************************
3  * Ralink Tech Inc.
4  * 5F., No.36, Taiyuan St., Jhubei City,
5  * Hsinchu County 302,
6  * Taiwan, R.O.C.
7  *
8  * (c) Copyright 2002-2007, Ralink Technology, Inc.
9  *
10  * This program is free software; you can redistribute it and/or modify  *
11  * it under the terms of the GNU General Public License as published by  *
12  * the Free Software Foundation; either version 2 of the License, or     *
13  * (at your option) any later version.                                   *
14  *                                                                       *
15  * This program is distributed in the hope that it will be useful,       *
16  * but WITHOUT ANY WARRANTY; without even the implied warranty of        *
17  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         *
18  * GNU General Public License for more details.                          *
19  *                                                                       *
20  * You should have received a copy of the GNU General Public License     *
21  * along with this program; if not, write to the                         *
22  * Free Software Foundation, Inc.,                                       *
23  * 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.             *
24  *                                                                       *
25  *************************************************************************
26
27         Module Name:
28         connect.c
29
30         Abstract:
31
32         Revision History:
33         Who                     When                    What
34         --------        ----------              ----------------------------------------------
35         John                    2004-08-08                      Major modification from RT2560
36 */
37 #include "../rt_config.h"
38
39 UCHAR   CipherSuiteWpaNoneTkip[] = {
40                 0x00, 0x50, 0xf2, 0x01, // oui
41                 0x01, 0x00,                             // Version
42                 0x00, 0x50, 0xf2, 0x02, // Multicast
43                 0x01, 0x00,                             // Number of unicast
44                 0x00, 0x50, 0xf2, 0x02, // unicast
45                 0x01, 0x00,                             // number of authentication method
46                 0x00, 0x50, 0xf2, 0x00  // authentication
47                 };
48 UCHAR   CipherSuiteWpaNoneTkipLen = (sizeof(CipherSuiteWpaNoneTkip) / sizeof(UCHAR));
49
50 UCHAR   CipherSuiteWpaNoneAes[] = {
51                 0x00, 0x50, 0xf2, 0x01, // oui
52                 0x01, 0x00,                             // Version
53                 0x00, 0x50, 0xf2, 0x04, // Multicast
54                 0x01, 0x00,                             // Number of unicast
55                 0x00, 0x50, 0xf2, 0x04, // unicast
56                 0x01, 0x00,                             // number of authentication method
57                 0x00, 0x50, 0xf2, 0x00  // authentication
58                 };
59 UCHAR   CipherSuiteWpaNoneAesLen = (sizeof(CipherSuiteWpaNoneAes) / sizeof(UCHAR));
60
61 // The following MACRO is called after 1. starting an new IBSS, 2. succesfully JOIN an IBSS,
62 // or 3. succesfully ASSOCIATE to a BSS, 4. successfully RE_ASSOCIATE to a BSS
63 // All settings successfuly negotiated furing MLME state machines become final settings
64 // and are copied to pAd->StaActive
65 #define COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(_pAd)                                 \
66 {                                                                                       \
67         (_pAd)->CommonCfg.SsidLen = (_pAd)->MlmeAux.SsidLen;                                \
68         NdisMoveMemory((_pAd)->CommonCfg.Ssid, (_pAd)->MlmeAux.Ssid, (_pAd)->MlmeAux.SsidLen); \
69         COPY_MAC_ADDR((_pAd)->CommonCfg.Bssid, (_pAd)->MlmeAux.Bssid);                      \
70         (_pAd)->CommonCfg.Channel = (_pAd)->MlmeAux.Channel;                                \
71         (_pAd)->CommonCfg.CentralChannel = (_pAd)->MlmeAux.CentralChannel;                  \
72         (_pAd)->StaActive.Aid = (_pAd)->MlmeAux.Aid;                                        \
73         (_pAd)->StaActive.AtimWin = (_pAd)->MlmeAux.AtimWin;                                \
74         (_pAd)->StaActive.CapabilityInfo = (_pAd)->MlmeAux.CapabilityInfo;                  \
75         (_pAd)->CommonCfg.BeaconPeriod = (_pAd)->MlmeAux.BeaconPeriod;                      \
76         (_pAd)->StaActive.CfpMaxDuration = (_pAd)->MlmeAux.CfpMaxDuration;                  \
77         (_pAd)->StaActive.CfpPeriod = (_pAd)->MlmeAux.CfpPeriod;                            \
78         (_pAd)->StaActive.SupRateLen = (_pAd)->MlmeAux.SupRateLen;                          \
79         NdisMoveMemory((_pAd)->StaActive.SupRate, (_pAd)->MlmeAux.SupRate, (_pAd)->MlmeAux.SupRateLen);\
80         (_pAd)->StaActive.ExtRateLen = (_pAd)->MlmeAux.ExtRateLen;                          \
81         NdisMoveMemory((_pAd)->StaActive.ExtRate, (_pAd)->MlmeAux.ExtRate, (_pAd)->MlmeAux.ExtRateLen);\
82         NdisMoveMemory(&(_pAd)->CommonCfg.APEdcaParm, &(_pAd)->MlmeAux.APEdcaParm, sizeof(EDCA_PARM));\
83         NdisMoveMemory(&(_pAd)->CommonCfg.APQosCapability, &(_pAd)->MlmeAux.APQosCapability, sizeof(QOS_CAPABILITY_PARM));\
84         NdisMoveMemory(&(_pAd)->CommonCfg.APQbssLoad, &(_pAd)->MlmeAux.APQbssLoad, sizeof(QBSS_LOAD_PARM));\
85         COPY_MAC_ADDR((_pAd)->MacTab.Content[BSSID_WCID].Addr, (_pAd)->MlmeAux.Bssid);      \
86         (_pAd)->MacTab.Content[BSSID_WCID].Aid = (_pAd)->MlmeAux.Aid;                       \
87         (_pAd)->MacTab.Content[BSSID_WCID].PairwiseKey.CipherAlg = (_pAd)->StaCfg.PairCipher;\
88         COPY_MAC_ADDR((_pAd)->MacTab.Content[BSSID_WCID].PairwiseKey.BssId, (_pAd)->MlmeAux.Bssid);\
89         (_pAd)->MacTab.Content[BSSID_WCID].RateLen = (_pAd)->StaActive.SupRateLen + (_pAd)->StaActive.ExtRateLen;\
90 }
91
92 /*
93         ==========================================================================
94         Description:
95
96         IRQL = PASSIVE_LEVEL
97
98         ==========================================================================
99 */
100 VOID MlmeCntlInit(
101         IN PRTMP_ADAPTER pAd,
102         IN STATE_MACHINE *S,
103         OUT STATE_MACHINE_FUNC Trans[])
104 {
105         // Control state machine differs from other state machines, the interface
106         // follows the standard interface
107         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
108 }
109
110 /*
111         ==========================================================================
112         Description:
113
114         IRQL = DISPATCH_LEVEL
115
116         ==========================================================================
117 */
118 VOID MlmeCntlMachinePerformAction(
119         IN PRTMP_ADAPTER pAd,
120         IN STATE_MACHINE *S,
121         IN MLME_QUEUE_ELEM *Elem)
122 {
123         switch(pAd->Mlme.CntlMachine.CurrState)
124         {
125                 case CNTL_IDLE:
126                         {
127                                 CntlIdleProc(pAd, Elem);
128                         }
129                         break;
130                 case CNTL_WAIT_DISASSOC:
131                         CntlWaitDisassocProc(pAd, Elem);
132                         break;
133                 case CNTL_WAIT_JOIN:
134                         CntlWaitJoinProc(pAd, Elem);
135                         break;
136
137                 // CNTL_WAIT_REASSOC is the only state in CNTL machine that does
138                 // not triggered directly or indirectly by "RTMPSetInformation(OID_xxx)".
139                 // Therefore not protected by NDIS's "only one outstanding OID request"
140                 // rule. Which means NDIS may SET OID in the middle of ROAMing attempts.
141                 // Current approach is to block new SET request at RTMPSetInformation()
142                 // when CntlMachine.CurrState is not CNTL_IDLE
143                 case CNTL_WAIT_REASSOC:
144                         CntlWaitReassocProc(pAd, Elem);
145                         break;
146
147                 case CNTL_WAIT_START:
148                         CntlWaitStartProc(pAd, Elem);
149                         break;
150                 case CNTL_WAIT_AUTH:
151                         CntlWaitAuthProc(pAd, Elem);
152                         break;
153                 case CNTL_WAIT_AUTH2:
154                         CntlWaitAuthProc2(pAd, Elem);
155                         break;
156                 case CNTL_WAIT_ASSOC:
157                         CntlWaitAssocProc(pAd, Elem);
158                         break;
159
160                 case CNTL_WAIT_OID_LIST_SCAN:
161                         if(Elem->MsgType == MT2_SCAN_CONF)
162                         {
163                                 // Resume TxRing after SCANING complete. We hope the out-of-service time
164                                 // won't be too long to let upper layer time-out the waiting frames
165                                 RTMPResumeMsduTransmission(pAd);
166                                 if (pAd->StaCfg.CCXReqType != MSRN_TYPE_UNUSED)
167                                 {
168                                         // Cisco scan request is finished, prepare beacon report
169                                         MlmeEnqueue(pAd, AIRONET_STATE_MACHINE, MT2_AIRONET_SCAN_DONE, 0, NULL);
170                                 }
171                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
172
173                 //
174                                 // Set LED status to previous status.
175                                 //
176                                 if (pAd->bLedOnScanning)
177                                 {
178                                         pAd->bLedOnScanning = FALSE;
179                                         RTMPSetLED(pAd, pAd->LedStatus);
180                                 }
181                         }
182                         break;
183
184                 case CNTL_WAIT_OID_DISASSOC:
185                         if (Elem->MsgType == MT2_DISASSOC_CONF)
186                         {
187                                 LinkDown(pAd, FALSE);
188                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
189                         }
190                         break;
191 #ifdef RT2870
192                 //
193                 // This state is for that we want to connect to an AP but
194                 // it didn't find on BSS List table. So we need to scan the air first,
195                 // after that we can try to connect to the desired AP if available.
196                 //
197                 case CNTL_WAIT_SCAN_FOR_CONNECT:
198                         if(Elem->MsgType == MT2_SCAN_CONF)
199                         {
200                                 // Resume TxRing after SCANING complete. We hope the out-of-service time
201                                 // won't be too long to let upper layer time-out the waiting frames
202                                 RTMPResumeMsduTransmission(pAd);
203 #ifdef CCX_SUPPORT
204                                 if (pAd->StaCfg.CCXReqType != MSRN_TYPE_UNUSED)
205                                 {
206                                         // Cisco scan request is finished, prepare beacon report
207                                         MlmeEnqueue(pAd, AIRONET_STATE_MACHINE, MT2_AIRONET_SCAN_DONE, 0, NULL);
208                                 }
209 #endif // CCX_SUPPORT //
210                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
211
212                                 //
213                                 // Check if we can connect to.
214                                 //
215                                 BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab, pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.AutoReconnectSsidLen);
216                                 if (pAd->MlmeAux.SsidBssTab.BssNr > 0)
217                                 {
218                                         MlmeAutoReconnectLastSSID(pAd);
219                                 }
220                         }
221                         break;
222 #endif // RT2870 //
223                 default:
224                         DBGPRINT_ERR(("!ERROR! CNTL - Illegal message type(=%ld)", Elem->MsgType));
225                         break;
226         }
227 }
228
229
230 /*
231         ==========================================================================
232         Description:
233
234         IRQL = DISPATCH_LEVEL
235
236         ==========================================================================
237 */
238 VOID CntlIdleProc(
239         IN PRTMP_ADAPTER pAd,
240         IN MLME_QUEUE_ELEM *Elem)
241 {
242         MLME_DISASSOC_REQ_STRUCT   DisassocReq;
243
244         if (RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_RADIO_OFF))
245                 return;
246
247         switch(Elem->MsgType)
248         {
249                 case OID_802_11_SSID:
250                         CntlOidSsidProc(pAd, Elem);
251                         break;
252
253                 case OID_802_11_BSSID:
254                         CntlOidRTBssidProc(pAd,Elem);
255                         break;
256
257                 case OID_802_11_BSSID_LIST_SCAN:
258                         CntlOidScanProc(pAd,Elem);
259                         break;
260
261                 case OID_802_11_DISASSOCIATE:
262                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
263                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ, sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
264                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_DISASSOC;
265 #ifdef WPA_SUPPLICANT_SUPPORT
266             if (pAd->StaCfg.WpaSupplicantUP != WPA_SUPPLICANT_ENABLE_WITH_WEB_UI)
267 #endif // WPA_SUPPLICANT_SUPPORT //
268             {
269                         // Set the AutoReconnectSsid to prevent it reconnect to old SSID
270                         // Since calling this indicate user don't want to connect to that SSID anymore.
271                         pAd->MlmeAux.AutoReconnectSsidLen= 32;
272                         NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.AutoReconnectSsidLen);
273             }
274                         break;
275
276                 case MT2_MLME_ROAMING_REQ:
277                         CntlMlmeRoamingProc(pAd, Elem);
278                         break;
279
280         case OID_802_11_MIC_FAILURE_REPORT_FRAME:
281             WpaMicFailureReportFrame(pAd, Elem);
282             break;
283
284                 default:
285                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Illegal message in CntlIdleProc(MsgType=%ld)\n",Elem->MsgType));
286                         break;
287         }
288 }
289
290 VOID CntlOidScanProc(
291         IN PRTMP_ADAPTER pAd,
292         IN MLME_QUEUE_ELEM *Elem)
293 {
294         MLME_SCAN_REQ_STRUCT       ScanReq;
295         ULONG                      BssIdx = BSS_NOT_FOUND;
296         BSS_ENTRY                  CurrBss;
297
298         // record current BSS if network is connected.
299         // 2003-2-13 do not include current IBSS if this is the only STA in this IBSS.
300         if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED))
301         {
302                 BssIdx = BssSsidTableSearch(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Ssid, pAd->CommonCfg.SsidLen, pAd->CommonCfg.Channel);
303                 if (BssIdx != BSS_NOT_FOUND)
304                 {
305                         NdisMoveMemory(&CurrBss, &pAd->ScanTab.BssEntry[BssIdx], sizeof(BSS_ENTRY));
306                 }
307         }
308
309         // clean up previous SCAN result, add current BSS back to table if any
310         BssTableInit(&pAd->ScanTab);
311         if (BssIdx != BSS_NOT_FOUND)
312         {
313                 // DDK Note: If the NIC is associated with a particular BSSID and SSID
314                 //    that are not contained in the list of BSSIDs generated by this scan, the
315                 //    BSSID description of the currently associated BSSID and SSID should be
316                 //    appended to the list of BSSIDs in the NIC's database.
317                 // To ensure this, we append this BSS as the first entry in SCAN result
318                 NdisMoveMemory(&pAd->ScanTab.BssEntry[0], &CurrBss, sizeof(BSS_ENTRY));
319                 pAd->ScanTab.BssNr = 1;
320         }
321
322         ScanParmFill(pAd, &ScanReq, "", 0, BSS_ANY, SCAN_ACTIVE);
323         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ,
324                 sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);
325         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
326 }
327
328 /*
329         ==========================================================================
330         Description:
331                 Before calling this routine, user desired SSID should already been
332                 recorded in CommonCfg.Ssid[]
333         IRQL = DISPATCH_LEVEL
334
335         ==========================================================================
336 */
337 VOID CntlOidSsidProc(
338         IN PRTMP_ADAPTER pAd,
339         IN MLME_QUEUE_ELEM * Elem)
340 {
341         PNDIS_802_11_SSID          pOidSsid = (NDIS_802_11_SSID *)Elem->Msg;
342         MLME_DISASSOC_REQ_STRUCT   DisassocReq;
343         ULONG                                      Now;
344
345         // Step 1. record the desired user settings to MlmeAux
346         NdisZeroMemory(pAd->MlmeAux.Ssid, MAX_LEN_OF_SSID);
347         NdisMoveMemory(pAd->MlmeAux.Ssid, pOidSsid->Ssid, pOidSsid->SsidLength);
348         pAd->MlmeAux.SsidLen = (UCHAR)pOidSsid->SsidLength;
349         NdisZeroMemory(pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
350         pAd->MlmeAux.BssType = pAd->StaCfg.BssType;
351
352
353         //
354         // Update Reconnect Ssid, that user desired to connect.
355         //
356         NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, MAX_LEN_OF_SSID);
357         NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
358         pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;
359
360         // step 2. find all matching BSS in the lastest SCAN result (inBssTab)
361         //    & log them into MlmeAux.SsidBssTab for later-on iteration. Sort by RSSI order
362         BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
363
364         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - %d BSS of %d BSS match the desire (%d)SSID - %s\n",
365                         pAd->MlmeAux.SsidBssTab.BssNr, pAd->ScanTab.BssNr, pAd->MlmeAux.SsidLen, pAd->MlmeAux.Ssid));
366         NdisGetSystemUpTime(&Now);
367
368         if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) &&
369                 (pAd->CommonCfg.SsidLen == pAd->MlmeAux.SsidBssTab.BssEntry[0].SsidLen) &&
370                 NdisEqualMemory(pAd->CommonCfg.Ssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Ssid, pAd->CommonCfg.SsidLen) &&
371                 MAC_ADDR_EQUAL(pAd->CommonCfg.Bssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Bssid))
372         {
373                 // Case 1. already connected with an AP who has the desired SSID
374                 //         with highest RSSI
375
376                 // Add checking Mode "LEAP" for CCX 1.0
377                 if (((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) ||
378                          (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK) ||
379                          (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) ||
380                          (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK)
381                          ) &&
382                         (pAd->StaCfg.PortSecured == WPA_802_1X_PORT_NOT_SECURED))
383                 {
384                         // case 1.1 For WPA, WPA-PSK, if the 1x port is not secured, we have to redo
385                         //          connection process
386                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP...\n"));
387                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
388                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
389                                                 sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
390                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
391                 }
392                 else if (pAd->bConfigChanged == TRUE)
393                 {
394                         // case 1.2 Important Config has changed, we have to reconnect to the same AP
395                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP Because config changed...\n"));
396                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
397                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
398                                                 sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
399                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
400                 }
401                 else
402                 {
403                         // case 1.3. already connected to the SSID with highest RSSI.
404                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - already with this BSSID. ignore this SET_SSID request\n"));
405                         //
406                         // (HCT 12.1) 1c_wlan_mediaevents required
407                         // media connect events are indicated when associating with the same AP
408                         //
409                         if (INFRA_ON(pAd))
410                         {
411                                 //
412                                 // Since MediaState already is NdisMediaStateConnected
413                                 // We just indicate the connect event again to meet the WHQL required.
414                                 //
415                                 pAd->IndicateMediaState = NdisMediaStateConnected;
416                                 RTMP_IndicateMediaState(pAd);
417                 pAd->ExtraInfo = GENERAL_LINK_UP;   // Update extra information to link is up
418                         }
419
420                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
421 #ifdef NATIVE_WPA_SUPPLICANT_SUPPORT
422             {
423                 union iwreq_data    wrqu;
424
425                 memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
426                 memcpy(wrqu.ap_addr.sa_data, pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
427                 wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
428
429             }
430 #endif // NATIVE_WPA_SUPPLICANT_SUPPORT //
431                 }
432         }
433         else if (INFRA_ON(pAd))
434         {
435                 //
436                 // For RT61
437                 // [88888] OID_802_11_SSID should have returned NDTEST_WEP_AP2(Returned: )
438                 // RT61 may lost SSID, and not connect to NDTEST_WEP_AP2 and will connect to NDTEST_WEP_AP2 by Autoreconnect
439                 // But media status is connected, so the SSID not report correctly.
440                 //
441                 if (!SSID_EQUAL(pAd->CommonCfg.Ssid, pAd->CommonCfg.SsidLen, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen))
442                 {
443                         //
444                         // Different SSID means not Roaming case, so we let LinkDown() to Indicate a disconnect event.
445                         //
446                         pAd->MlmeAux.CurrReqIsFromNdis = TRUE;
447                 }
448                 // case 2. active INFRA association existent
449                 //    roaming is done within miniport driver, nothing to do with configuration
450                 //    utility. so upon a new SET(OID_802_11_SSID) is received, we just
451                 //    disassociate with the current associated AP,
452                 //    then perform a new association with this new SSID, no matter the
453                 //    new/old SSID are the same or not.
454                 DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP...\n"));
455                 DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
456                 MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
457                                         sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
458                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
459         }
460         else
461         {
462                 if (ADHOC_ON(pAd))
463                 {
464                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - drop current ADHOC\n"));
465                         LinkDown(pAd, FALSE);
466                         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
467                         pAd->IndicateMediaState = NdisMediaStateDisconnected;
468                         RTMP_IndicateMediaState(pAd);
469             pAd->ExtraInfo = GENERAL_LINK_DOWN;
470                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():NDIS_STATUS_MEDIA_DISCONNECT Event C!\n"));
471                 }
472
473                 if ((pAd->MlmeAux.SsidBssTab.BssNr == 0) &&
474                         (pAd->StaCfg.bAutoReconnect == TRUE) &&
475                         (pAd->MlmeAux.BssType == BSS_INFRA) &&
476                         (MlmeValidateSSID(pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen) == TRUE)
477                         )
478                 {
479                         MLME_SCAN_REQ_STRUCT       ScanReq;
480
481                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - No matching BSS, start a new scan\n"));
482                         ScanParmFill(pAd, &ScanReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen, BSS_ANY, SCAN_ACTIVE);
483                         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ, sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);
484                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
485                         // Reset Missed scan number
486                         pAd->StaCfg.LastScanTime = Now;
487                 }
488                 else
489                 {
490                         pAd->MlmeAux.BssIdx = 0;
491                         IterateOnBssTab(pAd);
492                 }
493         }
494 }
495
496
497 /*
498         ==========================================================================
499         Description:
500
501         IRQL = DISPATCH_LEVEL
502
503         ==========================================================================
504 */
505 VOID CntlOidRTBssidProc(
506         IN PRTMP_ADAPTER pAd,
507         IN MLME_QUEUE_ELEM * Elem)
508 {
509         ULONG       BssIdx;
510         PUCHAR      pOidBssid = (PUCHAR)Elem->Msg;
511         MLME_DISASSOC_REQ_STRUCT    DisassocReq;
512         MLME_JOIN_REQ_STRUCT        JoinReq;
513
514         // record user desired settings
515         COPY_MAC_ADDR(pAd->MlmeAux.Bssid, pOidBssid);
516         pAd->MlmeAux.BssType = pAd->StaCfg.BssType;
517
518         //
519         // Update Reconnect Ssid, that user desired to connect.
520         //
521         NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, MAX_LEN_OF_SSID);
522         pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;
523         NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
524
525         // find the desired BSS in the latest SCAN result table
526         BssIdx = BssTableSearch(&pAd->ScanTab, pOidBssid, pAd->MlmeAux.Channel);
527         if (BssIdx == BSS_NOT_FOUND)
528         {
529                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - BSSID not found. reply NDIS_STATUS_NOT_ACCEPTED\n"));
530                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
531                 return;
532         }
533
534         // copy the matched BSS entry from ScanTab to MlmeAux.SsidBssTab. Why?
535         // Because we need this entry to become the JOIN target in later on SYNC state machine
536         pAd->MlmeAux.BssIdx = 0;
537         pAd->MlmeAux.SsidBssTab.BssNr = 1;
538         NdisMoveMemory(&pAd->MlmeAux.SsidBssTab.BssEntry[0], &pAd->ScanTab.BssEntry[BssIdx], sizeof(BSS_ENTRY));
539
540         //pAd->MlmeAux.AutoReconnectSsidLen = pAd->ScanTab.BssEntry[BssIdx].SsidLen;
541         //NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->ScanTab.BssEntry[BssIdx].Ssid, pAd->ScanTab.BssEntry[BssIdx].SsidLen);
542
543         // Add SSID into MlmeAux for site surey joining hidden SSID
544         //pAd->MlmeAux.SsidLen = pAd->ScanTab.BssEntry[BssIdx].SsidLen;
545         //NdisMoveMemory(pAd->MlmeAux.Ssid, pAd->ScanTab.BssEntry[BssIdx].Ssid, pAd->MlmeAux.SsidLen);
546
547         // 2002-11-26 skip the following checking. i.e. if user wants to re-connect to same AP
548         //   we just follow normal procedure. The reason of user doing this may because he/she changed
549         //   AP to another channel, but we still received BEACON from it thus don't claim Link Down.
550         //   Since user knows he's changed AP channel, he'll re-connect again. By skipping the following
551         //   checking, we'll disassociate then re-do normal association with this AP at the new channel.
552         // 2003-1-6 Re-enable this feature based on microsoft requirement which prefer not to re-do
553         //   connection when setting the same BSSID.
554         if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) &&
555                 MAC_ADDR_EQUAL(pAd->CommonCfg.Bssid, pOidBssid))
556         {
557                 // already connected to the same BSSID, go back to idle state directly
558                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - already in this BSSID. ignore this SET_BSSID request\n"));
559                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
560 #ifdef NATIVE_WPA_SUPPLICANT_SUPPORT
561             {
562                 union iwreq_data    wrqu;
563
564                 memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
565                 memcpy(wrqu.ap_addr.sa_data, pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
566                 wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
567
568             }
569 #endif // NATIVE_WPA_SUPPLICANT_SUPPORT //
570         }
571         else
572         {
573                 if (INFRA_ON(pAd))
574                 {
575                         // disassoc from current AP first
576                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - disassociate with current AP ...\n"));
577                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
578                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
579                                                 sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
580
581                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
582                 }
583                 else
584                 {
585                         if (ADHOC_ON(pAd))
586                         {
587                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - drop current ADHOC\n"));
588                                 LinkDown(pAd, FALSE);
589                                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
590                                 pAd->IndicateMediaState = NdisMediaStateDisconnected;
591                                 RTMP_IndicateMediaState(pAd);
592                 pAd->ExtraInfo = GENERAL_LINK_DOWN;
593                                 DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event C!\n"));
594                         }
595
596                         // Change the wepstatus to original wepstatus
597                         pAd->StaCfg.WepStatus   = pAd->StaCfg.OrigWepStatus;
598                         pAd->StaCfg.PairCipher  = pAd->StaCfg.OrigWepStatus;
599                         pAd->StaCfg.GroupCipher = pAd->StaCfg.OrigWepStatus;
600
601                         // Check cipher suite, AP must have more secured cipher than station setting
602                         // Set the Pairwise and Group cipher to match the intended AP setting
603                         // We can only connect to AP with less secured cipher setting
604                         if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK))
605                         {
606                                 pAd->StaCfg.GroupCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.GroupCipher;
607
608                                 if (pAd->StaCfg.WepStatus == pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipher)
609                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipher;
610                                 else if (pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipherAux != Ndis802_11WEPDisabled)
611                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipherAux;
612                                 else    // There is no PairCipher Aux, downgrade our capability to TKIP
613                                         pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
614                         }
615                         else if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK))
616                         {
617                                 pAd->StaCfg.GroupCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.GroupCipher;
618
619                                 if (pAd->StaCfg.WepStatus == pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipher)
620                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipher;
621                                 else if (pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipherAux != Ndis802_11WEPDisabled)
622                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipherAux;
623                                 else    // There is no PairCipher Aux, downgrade our capability to TKIP
624                                         pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
625
626                                 // RSN capability
627                                 pAd->StaCfg.RsnCapability = pAd->ScanTab.BssEntry[BssIdx].WPA2.RsnCapability;
628                         }
629
630                         // Set Mix cipher flag
631                         pAd->StaCfg.bMixCipher = (pAd->StaCfg.PairCipher == pAd->StaCfg.GroupCipher) ? FALSE : TRUE;
632                         if (pAd->StaCfg.bMixCipher == TRUE)
633                         {
634                                 // If mix cipher, re-build RSNIE
635                                 RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, 0);
636                         }
637                         // No active association, join the BSS immediately
638                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - joining %02x:%02x:%02x:%02x:%02x:%02x ...\n",
639                                 pOidBssid[0],pOidBssid[1],pOidBssid[2],pOidBssid[3],pOidBssid[4],pOidBssid[5]));
640
641                         JoinParmFill(pAd, &JoinReq, pAd->MlmeAux.BssIdx);
642                         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_JOIN_REQ, sizeof(MLME_JOIN_REQ_STRUCT), &JoinReq);
643
644                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_JOIN;
645                 }
646         }
647 }
648
649 // Roaming is the only external request triggering CNTL state machine
650 // despite of other "SET OID" operation. All "SET OID" related oerations
651 // happen in sequence, because no other SET OID will be sent to this device
652 // until the the previous SET operation is complete (successful o failed).
653 // So, how do we quarantee this ROAMING request won't corrupt other "SET OID"?
654 // or been corrupted by other "SET OID"?
655 //
656 // IRQL = DISPATCH_LEVEL
657 VOID CntlMlmeRoamingProc(
658         IN PRTMP_ADAPTER pAd,
659         IN MLME_QUEUE_ELEM *Elem)
660 {
661         // TODO:
662         // AP in different channel may show lower RSSI than actual value??
663         // should we add a weighting factor to compensate it?
664         DBGPRINT(RT_DEBUG_TRACE,("CNTL - Roaming in MlmeAux.RoamTab...\n"));
665
666         NdisMoveMemory(&pAd->MlmeAux.SsidBssTab, &pAd->MlmeAux.RoamTab, sizeof(pAd->MlmeAux.RoamTab));
667         pAd->MlmeAux.SsidBssTab.BssNr = pAd->MlmeAux.RoamTab.BssNr;
668
669         BssTableSortByRssi(&pAd->MlmeAux.SsidBssTab);
670         pAd->MlmeAux.BssIdx = 0;
671         IterateOnBssTab(pAd);
672 }
673
674 /*
675         ==========================================================================
676         Description:
677
678         IRQL = DISPATCH_LEVEL
679
680         ==========================================================================
681 */
682 VOID CntlWaitDisassocProc(
683         IN PRTMP_ADAPTER pAd,
684         IN MLME_QUEUE_ELEM *Elem)
685 {
686         MLME_START_REQ_STRUCT     StartReq;
687
688         if (Elem->MsgType == MT2_DISASSOC_CONF)
689         {
690                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Dis-associate successful\n"));
691
692             if (pAd->CommonCfg.bWirelessEvent)
693                 {
694                         RTMPSendWirelessEvent(pAd, IW_DISASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
695                 }
696
697                 LinkDown(pAd, FALSE);
698
699                 // case 1. no matching BSS, and user wants ADHOC, so we just start a new one
700                 if ((pAd->MlmeAux.SsidBssTab.BssNr==0) && (pAd->StaCfg.BssType == BSS_ADHOC))
701                 {
702                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - No matching BSS, start a new ADHOC (Ssid=%s)...\n",pAd->MlmeAux.Ssid));
703                         StartParmFill(pAd, &StartReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
704                         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_START_REQ, sizeof(MLME_START_REQ_STRUCT), &StartReq);
705                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_START;
706                 }
707                 // case 2. try each matched BSS
708                 else
709                 {
710                         pAd->MlmeAux.BssIdx = 0;
711
712                         IterateOnBssTab(pAd);
713                 }
714         }
715 }
716
717 /*
718         ==========================================================================
719         Description:
720
721         IRQL = DISPATCH_LEVEL
722
723         ==========================================================================
724 */
725 VOID CntlWaitJoinProc(
726         IN PRTMP_ADAPTER pAd,
727         IN MLME_QUEUE_ELEM *Elem)
728 {
729         USHORT                      Reason;
730         MLME_AUTH_REQ_STRUCT        AuthReq;
731
732         if (Elem->MsgType == MT2_JOIN_CONF)
733         {
734                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
735                 if (Reason == MLME_SUCCESS)
736                 {
737                         // 1. joined an IBSS, we are pretty much done here
738                         if (pAd->MlmeAux.BssType == BSS_ADHOC)
739                         {
740                             //
741                                 // 5G bands rules of Japan:
742                                 // Ad hoc must be disabled in W53(ch52,56,60,64) channels.
743                                 //
744                                 if ( (pAd->CommonCfg.bIEEE80211H == 1) &&
745                       RadarChannelCheck(pAd, pAd->CommonCfg.Channel)
746                                    )
747                                 {
748                                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
749                                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Channel=%d, Join adhoc on W53(52,56,60,64) Channels are not accepted\n", pAd->CommonCfg.Channel));
750                                         return;
751                                 }
752
753                                 LinkUp(pAd, BSS_ADHOC);
754                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
755                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - join the IBSS = %02x:%02x:%02x:%02x:%02x:%02x ...\n",
756                                 pAd->CommonCfg.Bssid[0],pAd->CommonCfg.Bssid[1],pAd->CommonCfg.Bssid[2],
757                                 pAd->CommonCfg.Bssid[3],pAd->CommonCfg.Bssid[4],pAd->CommonCfg.Bssid[5]));
758
759                 pAd->IndicateMediaState = NdisMediaStateConnected;
760                 pAd->ExtraInfo = GENERAL_LINK_UP;
761                         }
762                         // 2. joined a new INFRA network, start from authentication
763                         else
764                         {
765                                 {
766                                         // either Ndis802_11AuthModeShared or Ndis802_11AuthModeAutoSwitch, try shared key first
767                                         if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeShared) ||
768                                                 (pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch))
769                                         {
770                                                 AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeShared);
771                                         }
772                                         else
773                                         {
774                                                 AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
775                                         }
776                                 }
777                                 MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
778                                                         sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
779
780                                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH;
781                         }
782                 }
783                 else
784                 {
785                         // 3. failed, try next BSS
786                         pAd->MlmeAux.BssIdx++;
787                         IterateOnBssTab(pAd);
788                 }
789         }
790 }
791
792
793 /*
794         ==========================================================================
795         Description:
796
797         IRQL = DISPATCH_LEVEL
798
799         ==========================================================================
800 */
801 VOID CntlWaitStartProc(
802         IN PRTMP_ADAPTER pAd,
803         IN MLME_QUEUE_ELEM *Elem)
804 {
805         USHORT      Result;
806
807         if (Elem->MsgType == MT2_START_CONF)
808         {
809                 NdisMoveMemory(&Result, Elem->Msg, sizeof(USHORT));
810                 if (Result == MLME_SUCCESS)
811                 {
812                     //
813                         // 5G bands rules of Japan:
814                         // Ad hoc must be disabled in W53(ch52,56,60,64) channels.
815                         //
816                         if ( (pAd->CommonCfg.bIEEE80211H == 1) &&
817                   RadarChannelCheck(pAd, pAd->CommonCfg.Channel)
818                            )
819                         {
820                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
821                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Channel=%d, Start adhoc on W53(52,56,60,64) Channels are not accepted\n", pAd->CommonCfg.Channel));
822                                 return;
823                         }
824 #ifdef DOT11_N_SUPPORT
825                         if (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED)
826                         {
827                                 N_ChannelCheck(pAd);
828                                 SetCommonHT(pAd);
829                                 NdisMoveMemory(&pAd->MlmeAux.AddHtInfo, &pAd->CommonCfg.AddHTInfo, sizeof(ADD_HT_INFO_IE));
830                                 RTMPCheckHt(pAd, BSSID_WCID, &pAd->CommonCfg.HtCapability, &pAd->CommonCfg.AddHTInfo);
831                                 pAd->StaActive.SupportedPhyInfo.bHtEnable = TRUE;
832                                 NdisZeroMemory(&pAd->StaActive.SupportedPhyInfo.MCSSet[0], 16);
833                                 NdisMoveMemory(&pAd->StaActive.SupportedPhyInfo.MCSSet[0], &pAd->CommonCfg.HtCapability.MCSSet[0], 16);
834                                 COPY_HTSETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
835
836                                 if ((pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth  == BW_40) &&
837                                         (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_ABOVE))
838                                 {
839                                         pAd->MlmeAux.CentralChannel = pAd->CommonCfg.Channel + 2;
840                                 }
841                                 else if ((pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth  == BW_40) &&
842                                                  (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_BELOW))
843                                 {
844                                         pAd->MlmeAux.CentralChannel = pAd->CommonCfg.Channel - 2;
845                                 }
846                         }
847                         else
848 #endif // DOT11_N_SUPPORT //
849                         {
850                                 pAd->StaActive.SupportedPhyInfo.bHtEnable = FALSE;
851                         }
852                         LinkUp(pAd, BSS_ADHOC);
853                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
854                         // Before send beacon, driver need do radar detection
855                         if ((pAd->CommonCfg.Channel > 14 )
856                                 && (pAd->CommonCfg.bIEEE80211H == 1)
857                                 && RadarChannelCheck(pAd, pAd->CommonCfg.Channel))
858                         {
859                                 pAd->CommonCfg.RadarDetect.RDMode = RD_SILENCE_MODE;
860                                 pAd->CommonCfg.RadarDetect.RDCount = 0;
861                         }
862
863                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - start a new IBSS = %02x:%02x:%02x:%02x:%02x:%02x ...\n",
864                                 pAd->CommonCfg.Bssid[0],pAd->CommonCfg.Bssid[1],pAd->CommonCfg.Bssid[2],
865                                 pAd->CommonCfg.Bssid[3],pAd->CommonCfg.Bssid[4],pAd->CommonCfg.Bssid[5]));
866                 }
867                 else
868                 {
869                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Start IBSS fail. BUG!!!!!\n"));
870                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
871                 }
872         }
873 }
874
875 /*
876         ==========================================================================
877         Description:
878
879         IRQL = DISPATCH_LEVEL
880
881         ==========================================================================
882 */
883 VOID CntlWaitAuthProc(
884         IN PRTMP_ADAPTER pAd,
885         IN MLME_QUEUE_ELEM *Elem)
886 {
887         USHORT                       Reason;
888         MLME_ASSOC_REQ_STRUCT        AssocReq;
889         MLME_AUTH_REQ_STRUCT         AuthReq;
890
891         if (Elem->MsgType == MT2_AUTH_CONF)
892         {
893                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
894                 if (Reason == MLME_SUCCESS)
895                 {
896                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH OK\n"));
897                         AssocParmFill(pAd, &AssocReq, pAd->MlmeAux.Bssid, pAd->MlmeAux.CapabilityInfo,
898                                                   ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
899
900                         {
901                                 MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_ASSOC_REQ,
902                                                         sizeof(MLME_ASSOC_REQ_STRUCT), &AssocReq);
903
904                                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_ASSOC;
905                         }
906                 }
907                 else
908                 {
909                         // This fail may because of the AP already keep us in its MAC table without
910                         // ageing-out. The previous authentication attempt must have let it remove us.
911                         // so try Authentication again may help. For D-Link DWL-900AP+ compatibility.
912                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, try again...\n"));
913
914                         {
915                                 if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeShared) ||
916                                         (pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch))
917                                 {
918                                         // either Ndis802_11AuthModeShared or Ndis802_11AuthModeAutoSwitch, try shared key first
919                                         AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeShared);
920                                 }
921                                 else
922                                 {
923                                         AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
924                                 }
925                         }
926                         MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
927                                                 sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
928
929                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH2;
930                 }
931         }
932 }
933
934 /*
935         ==========================================================================
936         Description:
937
938         IRQL = DISPATCH_LEVEL
939
940         ==========================================================================
941 */
942 VOID CntlWaitAuthProc2(
943         IN PRTMP_ADAPTER pAd,
944         IN MLME_QUEUE_ELEM *Elem)
945 {
946         USHORT                       Reason;
947         MLME_ASSOC_REQ_STRUCT        AssocReq;
948         MLME_AUTH_REQ_STRUCT         AuthReq;
949
950         if (Elem->MsgType == MT2_AUTH_CONF)
951         {
952                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
953                 if (Reason == MLME_SUCCESS)
954                 {
955                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH OK\n"));
956                         AssocParmFill(pAd, &AssocReq, pAd->MlmeAux.Bssid, pAd->MlmeAux.CapabilityInfo,
957                                                   ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
958                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_ASSOC_REQ,
959                                                 sizeof(MLME_ASSOC_REQ_STRUCT), &AssocReq);
960
961                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_ASSOC;
962                 }
963                 else
964                 {
965                         if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch) &&
966                                  (pAd->MlmeAux.Alg == Ndis802_11AuthModeShared))
967                         {
968                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, try OPEN system...\n"));
969                                 AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
970                                 MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
971                                                         sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
972
973                                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH2;
974                         }
975                         else
976                         {
977                                 // not success, try next BSS
978                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, give up; try next BSS\n"));
979                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE; //???????
980                                 pAd->MlmeAux.BssIdx++;
981                                 IterateOnBssTab(pAd);
982                         }
983                 }
984         }
985 }
986
987 /*
988         ==========================================================================
989         Description:
990
991         IRQL = DISPATCH_LEVEL
992
993         ==========================================================================
994 */
995 VOID CntlWaitAssocProc(
996         IN PRTMP_ADAPTER pAd,
997         IN MLME_QUEUE_ELEM *Elem)
998 {
999         USHORT      Reason;
1000
1001         if (Elem->MsgType == MT2_ASSOC_CONF)
1002         {
1003                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
1004                 if (Reason == MLME_SUCCESS)
1005                 {
1006                         LinkUp(pAd, BSS_INFRA);
1007                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
1008                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Association successful on BSS #%ld\n",pAd->MlmeAux.BssIdx));
1009
1010                         if (pAd->CommonCfg.bWirelessEvent)
1011                         {
1012                                 RTMPSendWirelessEvent(pAd, IW_ASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
1013                         }
1014                 }
1015                 else
1016                 {
1017                         // not success, try next BSS
1018                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Association fails on BSS #%ld\n",pAd->MlmeAux.BssIdx));
1019                         pAd->MlmeAux.BssIdx++;
1020                         IterateOnBssTab(pAd);
1021                 }
1022         }
1023 }
1024
1025 /*
1026         ==========================================================================
1027         Description:
1028
1029         IRQL = DISPATCH_LEVEL
1030
1031         ==========================================================================
1032 */
1033 VOID CntlWaitReassocProc(
1034         IN PRTMP_ADAPTER pAd,
1035         IN MLME_QUEUE_ELEM *Elem)
1036 {
1037         USHORT      Result;
1038
1039         if (Elem->MsgType == MT2_REASSOC_CONF)
1040         {
1041                 NdisMoveMemory(&Result, Elem->Msg, sizeof(USHORT));
1042                 if (Result == MLME_SUCCESS)
1043                 {
1044                         //
1045                         // NDIS requires a new Link UP indication but no Link Down for RE-ASSOC
1046                         //
1047                         LinkUp(pAd, BSS_INFRA);
1048
1049                         // send wireless event - for association
1050                         if (pAd->CommonCfg.bWirelessEvent)
1051                                 RTMPSendWirelessEvent(pAd, IW_ASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
1052
1053                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
1054                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Re-assocition successful on BSS #%ld\n", pAd->MlmeAux.RoamIdx));
1055                 }
1056                 else
1057                 {
1058                         // reassoc failed, try to pick next BSS in the BSS Table
1059                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Re-assocition fails on BSS #%ld\n", pAd->MlmeAux.RoamIdx));
1060                         pAd->MlmeAux.RoamIdx++;
1061                         IterateOnBssTab2(pAd);
1062                 }
1063         }
1064 }
1065
1066
1067 VOID    AdhocTurnOnQos(
1068         IN  PRTMP_ADAPTER pAd)
1069 {
1070 #define AC0_DEF_TXOP            0
1071 #define AC1_DEF_TXOP            0
1072 #define AC2_DEF_TXOP            94
1073 #define AC3_DEF_TXOP            47
1074
1075         // Turn on QOs if use HT rate.
1076         if (pAd->CommonCfg.APEdcaParm.bValid == FALSE)
1077         {
1078                 pAd->CommonCfg.APEdcaParm.bValid = TRUE;
1079                 pAd->CommonCfg.APEdcaParm.Aifsn[0] = 3;
1080                 pAd->CommonCfg.APEdcaParm.Aifsn[1] = 7;
1081                 pAd->CommonCfg.APEdcaParm.Aifsn[2] = 1;
1082                 pAd->CommonCfg.APEdcaParm.Aifsn[3] = 1;
1083
1084                 pAd->CommonCfg.APEdcaParm.Cwmin[0] = 4;
1085                 pAd->CommonCfg.APEdcaParm.Cwmin[1] = 4;
1086                 pAd->CommonCfg.APEdcaParm.Cwmin[2] = 3;
1087                 pAd->CommonCfg.APEdcaParm.Cwmin[3] = 2;
1088
1089                 pAd->CommonCfg.APEdcaParm.Cwmax[0] = 10;
1090                 pAd->CommonCfg.APEdcaParm.Cwmax[1] = 6;
1091                 pAd->CommonCfg.APEdcaParm.Cwmax[2] = 4;
1092                 pAd->CommonCfg.APEdcaParm.Cwmax[3] = 3;
1093
1094                 pAd->CommonCfg.APEdcaParm.Txop[0]  = 0;
1095                 pAd->CommonCfg.APEdcaParm.Txop[1]  = 0;
1096                 pAd->CommonCfg.APEdcaParm.Txop[2]  = AC2_DEF_TXOP;
1097                 pAd->CommonCfg.APEdcaParm.Txop[3]  = AC3_DEF_TXOP;
1098         }
1099         AsicSetEdcaParm(pAd, &pAd->CommonCfg.APEdcaParm);
1100 }
1101
1102 /*
1103         ==========================================================================
1104         Description:
1105
1106         IRQL = DISPATCH_LEVEL
1107
1108         ==========================================================================
1109 */
1110 VOID LinkUp(
1111         IN PRTMP_ADAPTER pAd,
1112         IN UCHAR BssType)
1113 {
1114         ULONG   Now;
1115         UINT32  Data;
1116         BOOLEAN Cancelled;
1117         UCHAR   Value = 0, idx;
1118         MAC_TABLE_ENTRY *pEntry = NULL, *pCurrEntry;
1119
1120         pEntry = &pAd->MacTab.Content[BSSID_WCID];
1121
1122         //
1123         // ASSOC - DisassocTimeoutAction
1124         // CNTL - Dis-associate successful
1125         // !!! LINK DOWN !!!
1126         // [88888] OID_802_11_SSID should have returned NDTEST_WEP_AP2(Returned: )
1127         //
1128         // To prevent DisassocTimeoutAction to call Link down after we link up,
1129         // cancel the DisassocTimer no matter what it start or not.
1130         //
1131         RTMPCancelTimer(&pAd->MlmeAux.DisassocTimer,  &Cancelled);
1132
1133         COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
1134
1135 #ifdef DOT11_N_SUPPORT
1136         COPY_HTSETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
1137 #endif // DOT11_N_SUPPORT //
1138         // It's quite difficult to tell if a newly added KEY is WEP or CKIP until a new BSS
1139         // is formed (either ASSOC/RE-ASSOC done or IBSS started. LinkUP should be a safe place
1140         // to examine if cipher algorithm switching is required.
1141         //rt2860b. Don't know why need this
1142         SwitchBetweenWepAndCkip(pAd);
1143
1144
1145         if (BssType == BSS_ADHOC)
1146         {
1147                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_ADHOC_ON);
1148                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_INFRA_ON);
1149
1150 #ifdef DOT11_N_SUPPORT
1151                 if ((pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth  == BW_40) &&
1152                         (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_ABOVE))
1153                 {
1154                         pAd->CommonCfg.CentralChannel = pAd->CommonCfg.Channel + 2;
1155                 }
1156                 else if ((pAd->CommonCfg.Channel > 2) &&
1157                                  (pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth  == BW_40) &&
1158                                  (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_BELOW))
1159                 {
1160                         pAd->CommonCfg.CentralChannel = pAd->CommonCfg.Channel - 2;
1161                 }
1162 #endif // DOT11_N_SUPPORT //
1163
1164 #ifdef DOT11_N_SUPPORT
1165                 if (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED)
1166                         AdhocTurnOnQos(pAd);
1167 #endif // DOT11_N_SUPPORT //
1168
1169                 DBGPRINT(RT_DEBUG_TRACE, ("!!!Adhoc LINK UP !!! \n" ));
1170         }
1171         else
1172         {
1173                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_INFRA_ON);
1174                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_ADHOC_ON);
1175
1176                 DBGPRINT(RT_DEBUG_TRACE, ("!!!Infra LINK UP !!! \n" ));
1177         }
1178
1179         // 3*3
1180         // reset Tx beamforming bit
1181         RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1182         Value &= (~0x01);
1183         Value |= pAd->CommonCfg.RegTransmitSetting.field.TxBF;
1184         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1185
1186 #ifdef DOT11_N_SUPPORT
1187         // Change to AP channel
1188     if ((pAd->CommonCfg.CentralChannel > pAd->CommonCfg.Channel) && (pAd->MlmeAux.HtCapability.HtCapInfo.ChannelWidth == BW_40))
1189         {
1190                 // Must using 40MHz.
1191                 pAd->CommonCfg.BBPCurrentBW = BW_40;
1192                 AsicSwitchChannel(pAd, pAd->CommonCfg.CentralChannel, FALSE);
1193                 AsicLockChannel(pAd, pAd->CommonCfg.CentralChannel);
1194
1195                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1196                 Value &= (~0x18);
1197                 Value |= 0x10;
1198                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1199
1200                 //  RX : control channel at lower
1201                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
1202                 Value &= (~0x20);
1203                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
1204
1205                 RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
1206                 Data &= 0xfffffffe;
1207                 RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
1208
1209                 if (pAd->MACVersion == 0x28600100)
1210                 {
1211                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x1A);
1212                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x0A);
1213                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x16);
1214             DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
1215                 }
1216
1217                 DBGPRINT(RT_DEBUG_TRACE, ("!!!40MHz Lower LINK UP !!! Control Channel at Below. Central = %d \n", pAd->CommonCfg.CentralChannel ));
1218         }
1219         else if ((pAd->CommonCfg.CentralChannel < pAd->CommonCfg.Channel) && (pAd->MlmeAux.HtCapability.HtCapInfo.ChannelWidth == BW_40))
1220     {
1221             // Must using 40MHz.
1222                 pAd->CommonCfg.BBPCurrentBW = BW_40;
1223                 AsicSwitchChannel(pAd, pAd->CommonCfg.CentralChannel, FALSE);
1224             AsicLockChannel(pAd, pAd->CommonCfg.CentralChannel);
1225
1226                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1227                 Value &= (~0x18);
1228                 Value |= 0x10;
1229                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1230
1231                 RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
1232                 Data |= 0x1;
1233                 RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
1234
1235                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
1236             Value |= (0x20);
1237                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
1238
1239                 if (pAd->MACVersion == 0x28600100)
1240                 {
1241                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x1A);
1242                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x0A);
1243                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x16);
1244                             DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
1245                 }
1246
1247             DBGPRINT(RT_DEBUG_TRACE, ("!!! 40MHz Upper LINK UP !!! Control Channel at UpperCentral = %d \n", pAd->CommonCfg.CentralChannel ));
1248     }
1249     else
1250 #endif // DOT11_N_SUPPORT //
1251     {
1252             pAd->CommonCfg.BBPCurrentBW = BW_20;
1253                 pAd->CommonCfg.CentralChannel = pAd->CommonCfg.Channel;
1254                 AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
1255                 AsicLockChannel(pAd, pAd->CommonCfg.Channel);
1256
1257                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1258                 Value &= (~0x18);
1259                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1260
1261                 RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
1262                 Data &= 0xfffffffe;
1263                 RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
1264
1265                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
1266                 Value &= (~0x20);
1267                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
1268
1269                 if (pAd->MACVersion == 0x28600100)
1270                 {
1271                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x16);
1272                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x08);
1273                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x11);
1274             DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
1275                 }
1276
1277             DBGPRINT(RT_DEBUG_TRACE, ("!!! 20MHz LINK UP !!! \n" ));
1278     }
1279
1280         RTMPSetAGCInitValue(pAd, pAd->CommonCfg.BBPCurrentBW);
1281         //
1282         // Save BBP_R66 value, it will be used in RTUSBResumeMsduTransmission
1283         //
1284         RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R66, &pAd->BbpTuning.R66CurrentValue);
1285
1286         DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!! (BssType=%d, AID=%d, ssid=%s, Channel=%d, CentralChannel = %d)\n",
1287                 BssType, pAd->StaActive.Aid, pAd->CommonCfg.Ssid, pAd->CommonCfg.Channel, pAd->CommonCfg.CentralChannel));
1288
1289 #ifdef DOT11_N_SUPPORT
1290         DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!! (Density =%d, )\n", pAd->MacTab.Content[BSSID_WCID].MpduDensity));
1291 #endif // DOT11_N_SUPPORT //
1292
1293                 AsicSetBssid(pAd, pAd->CommonCfg.Bssid);
1294
1295         AsicSetSlotTime(pAd, TRUE);
1296         AsicSetEdcaParm(pAd, &pAd->CommonCfg.APEdcaParm);
1297
1298         // Call this for RTS protectionfor legacy rate, we will always enable RTS threshold, but normally it will not hit
1299         AsicUpdateProtect(pAd, 0, (OFDMSETPROTECT | CCKSETPROTECT), TRUE, FALSE);
1300
1301 #ifdef DOT11_N_SUPPORT
1302         if ((pAd->StaActive.SupportedPhyInfo.bHtEnable == TRUE))
1303         {
1304                 // Update HT protectionfor based on AP's operating mode.
1305         if (pAd->MlmeAux.AddHtInfo.AddHtInfo2.NonGfPresent == 1)
1306         {
1307                 AsicUpdateProtect(pAd, pAd->MlmeAux.AddHtInfo.AddHtInfo2.OperaionMode,  ALLN_SETPROTECT, FALSE, TRUE);
1308         }
1309         else
1310                         AsicUpdateProtect(pAd, pAd->MlmeAux.AddHtInfo.AddHtInfo2.OperaionMode,  ALLN_SETPROTECT, FALSE, FALSE);
1311         }
1312 #endif // DOT11_N_SUPPORT //
1313
1314         NdisZeroMemory(&pAd->DrsCounters, sizeof(COUNTER_DRS));
1315
1316         NdisGetSystemUpTime(&Now);
1317         pAd->StaCfg.LastBeaconRxTime = Now;   // last RX timestamp
1318
1319         if ((pAd->CommonCfg.TxPreamble != Rt802_11PreambleLong) &&
1320                 CAP_IS_SHORT_PREAMBLE_ON(pAd->StaActive.CapabilityInfo))
1321         {
1322                 MlmeSetTxPreamble(pAd, Rt802_11PreambleShort);
1323         }
1324
1325         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1326
1327         if (pAd->CommonCfg.RadarDetect.RDMode == RD_SILENCE_MODE)
1328         {
1329         }
1330         pAd->CommonCfg.RadarDetect.RDMode = RD_NORMAL_MODE;
1331
1332         if (BssType == BSS_ADHOC)
1333         {
1334                 MakeIbssBeacon(pAd);
1335                 if ((pAd->CommonCfg.Channel > 14)
1336                         && (pAd->CommonCfg.bIEEE80211H == 1)
1337                         && RadarChannelCheck(pAd, pAd->CommonCfg.Channel))
1338                 {
1339                         ; //Do nothing
1340                 }
1341                 else
1342                 {
1343                         AsicEnableIbssSync(pAd);
1344                 }
1345
1346                 // In ad hoc mode, use MAC table from index 1.
1347                 // p.s ASIC use all 0xff as termination of WCID table search.To prevent it's 0xff-ff-ff-ff-ff-ff, Write 0 here.
1348                 RTMP_IO_WRITE32(pAd, MAC_WCID_BASE, 0x00);
1349                 RTMP_IO_WRITE32(pAd, 0x1808, 0x00);
1350
1351                 // If WEP is enabled, add key material and cipherAlg into Asic
1352                 // Fill in Shared Key Table(offset: 0x6c00) and Shared Key Mode(offset: 0x7000)
1353
1354                 if (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)
1355                 {
1356                         PUCHAR  Key;
1357                         UCHAR   CipherAlg;
1358
1359                         for (idx=0; idx < SHARE_KEY_NUM; idx++)
1360                 {
1361                                 CipherAlg = pAd->SharedKey[BSS0][idx].CipherAlg;
1362                         Key = pAd->SharedKey[BSS0][idx].Key;
1363
1364                                 if (pAd->SharedKey[BSS0][idx].KeyLen > 0)
1365                                 {
1366                                         // Set key material and cipherAlg to Asic
1367                                 AsicAddSharedKeyEntry(pAd, BSS0, idx, CipherAlg, Key, NULL, NULL);
1368
1369                     if (idx == pAd->StaCfg.DefaultKeyId)
1370                                         {
1371                                                 // Update WCID attribute table and IVEIV table for this group key table
1372                                                 RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, NULL);
1373                                         }
1374                                 }
1375
1376
1377                         }
1378                 }
1379                 // If WPANone is enabled, add key material and cipherAlg into Asic
1380                 // Fill in Shared Key Table(offset: 0x6c00) and Shared Key Mode(offset: 0x7000)
1381                 else if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone)
1382                 {
1383                         pAd->StaCfg.DefaultKeyId = 0;   // always be zero
1384
1385             NdisZeroMemory(&pAd->SharedKey[BSS0][0], sizeof(CIPHER_KEY));
1386                                                         pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK;
1387                         NdisMoveMemory(pAd->SharedKey[BSS0][0].Key, pAd->StaCfg.PMK, LEN_TKIP_EK);
1388
1389             if (pAd->StaCfg.PairCipher == Ndis802_11Encryption2Enabled)
1390             {
1391                         NdisMoveMemory(pAd->SharedKey[BSS0][0].RxMic, &pAd->StaCfg.PMK[16], LEN_TKIP_RXMICK);
1392                         NdisMoveMemory(pAd->SharedKey[BSS0][0].TxMic, &pAd->StaCfg.PMK[16], LEN_TKIP_TXMICK);
1393             }
1394
1395                         // Decide its ChiperAlg
1396                         if (pAd->StaCfg.PairCipher == Ndis802_11Encryption2Enabled)
1397                                 pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_TKIP;
1398                         else if (pAd->StaCfg.PairCipher == Ndis802_11Encryption3Enabled)
1399                                 pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_AES;
1400                         else
1401             {
1402                 DBGPRINT(RT_DEBUG_TRACE, ("Unknow Cipher (=%d), set Cipher to AES\n", pAd->StaCfg.PairCipher));
1403                                 pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_AES;
1404             }
1405
1406                         // Set key material and cipherAlg to Asic
1407                         AsicAddSharedKeyEntry(pAd,
1408                                                                   BSS0,
1409                                                                   0,
1410                                                                   pAd->SharedKey[BSS0][0].CipherAlg,
1411                                                                   pAd->SharedKey[BSS0][0].Key,
1412                                                                   pAd->SharedKey[BSS0][0].TxMic,
1413                                                                   pAd->SharedKey[BSS0][0].RxMic);
1414
1415             // Update WCID attribute table and IVEIV table for this group key table
1416                         RTMPAddWcidAttributeEntry(pAd, BSS0, 0, pAd->SharedKey[BSS0][0].CipherAlg, NULL);
1417
1418                 }
1419
1420         }
1421         else // BSS_INFRA
1422         {
1423                 // Check the new SSID with last SSID
1424                 while (Cancelled == TRUE)
1425                 {
1426                         if (pAd->CommonCfg.LastSsidLen == pAd->CommonCfg.SsidLen)
1427                         {
1428                                 if (RTMPCompareMemory(pAd->CommonCfg.LastSsid, pAd->CommonCfg.Ssid, pAd->CommonCfg.LastSsidLen) == 0)
1429                                 {
1430                                         // Link to the old one no linkdown is required.
1431                                         break;
1432                                 }
1433                         }
1434                         // Send link down event before set to link up
1435                         pAd->IndicateMediaState = NdisMediaStateDisconnected;
1436                         RTMP_IndicateMediaState(pAd);
1437             pAd->ExtraInfo = GENERAL_LINK_DOWN;
1438                         DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event AA!\n"));
1439                         break;
1440                 }
1441
1442                 //
1443                 // On WPA mode, Remove All Keys if not connect to the last BSSID
1444                 // Key will be set after 4-way handshake.
1445                 //
1446                 if ((pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA))
1447                 {
1448                         ULONG           IV;
1449
1450                         // Remove all WPA keys
1451                         RTMPWPARemoveAllKeys(pAd);
1452                         pAd->StaCfg.PortSecured = WPA_802_1X_PORT_NOT_SECURED;
1453                         pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilter8021xWEP;
1454
1455                         // Fixed connection failed with Range Maximizer - 515 AP (Marvell Chip) when security is WPAPSK/TKIP
1456                         // If IV related values are too large in GroupMsg2, AP would ignore this message.
1457                         IV = 0;
1458                         IV |= (pAd->StaCfg.DefaultKeyId << 30);
1459                         AsicUpdateWCIDIVEIV(pAd, BSSID_WCID, IV, 0);
1460                 }
1461                 // NOTE:
1462                 // the decision of using "short slot time" or not may change dynamically due to
1463                 // new STA association to the AP. so we have to decide that upon parsing BEACON, not here
1464
1465                 // NOTE:
1466                 // the decision to use "RTC/CTS" or "CTS-to-self" protection or not may change dynamically
1467                 // due to new STA association to the AP. so we have to decide that upon parsing BEACON, not here
1468
1469                 ComposePsPoll(pAd);
1470                 ComposeNullFrame(pAd);
1471
1472                         AsicEnableBssSync(pAd);
1473
1474                 // Add BSSID to WCID search table
1475                 AsicUpdateRxWCIDTable(pAd, BSSID_WCID, pAd->CommonCfg.Bssid);
1476
1477                 NdisAcquireSpinLock(&pAd->MacTabLock);
1478                 // add this BSSID entry into HASH table
1479                 {
1480                         UCHAR HashIdx;
1481
1482                         //pEntry = &pAd->MacTab.Content[BSSID_WCID];
1483                         HashIdx = MAC_ADDR_HASH_INDEX(pAd->CommonCfg.Bssid);
1484                         if (pAd->MacTab.Hash[HashIdx] == NULL)
1485                         {
1486                                 pAd->MacTab.Hash[HashIdx] = pEntry;
1487                         }
1488                         else
1489                         {
1490                                 pCurrEntry = pAd->MacTab.Hash[HashIdx];
1491                                 while (pCurrEntry->pNext != NULL)
1492                                         pCurrEntry = pCurrEntry->pNext;
1493                                 pCurrEntry->pNext = pEntry;
1494                         }
1495                 }
1496                 NdisReleaseSpinLock(&pAd->MacTabLock);
1497
1498
1499                 // If WEP is enabled, add paiewise and shared key
1500 #ifdef WPA_SUPPLICANT_SUPPORT
1501         if (((pAd->StaCfg.WpaSupplicantUP)&&
1502              (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)&&
1503              (pAd->StaCfg.PortSecured == WPA_802_1X_PORT_SECURED)) ||
1504             ((pAd->StaCfg.WpaSupplicantUP == WPA_SUPPLICANT_DISABLE)&&
1505               (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)))
1506 #else
1507                 if (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)
1508 #endif // WPA_SUPPLICANT_SUPPORT //
1509                 {
1510                         PUCHAR  Key;
1511                         UCHAR   CipherAlg;
1512
1513                         for (idx=0; idx < SHARE_KEY_NUM; idx++)
1514                 {
1515                                 CipherAlg = pAd->SharedKey[BSS0][idx].CipherAlg;
1516                         Key = pAd->SharedKey[BSS0][idx].Key;
1517
1518                                 if (pAd->SharedKey[BSS0][idx].KeyLen > 0)
1519                                 {
1520                                         // Set key material and cipherAlg to Asic
1521                                 AsicAddSharedKeyEntry(pAd, BSS0, idx, CipherAlg, Key, NULL, NULL);
1522
1523                                         if (idx == pAd->StaCfg.DefaultKeyId)
1524                                         {
1525                                                 // Assign group key info
1526                                                 RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, NULL);
1527
1528                                                 // Assign pairwise key info
1529                                                 RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, pEntry);
1530                                         }
1531                                 }
1532                         }
1533                 }
1534
1535                 // only INFRASTRUCTURE mode need to indicate connectivity immediately; ADHOC mode
1536                 // should wait until at least 2 active nodes in this BSSID.
1537                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
1538
1539         // For GUI ++
1540                 if (pAd->StaCfg.AuthMode < Ndis802_11AuthModeWPA)
1541                 {
1542                         pAd->IndicateMediaState = NdisMediaStateConnected;
1543                         pAd->ExtraInfo = GENERAL_LINK_UP;
1544                         RTMP_IndicateMediaState(pAd);
1545                 }
1546         // --
1547
1548                 // Add BSSID in my MAC Table.
1549         NdisAcquireSpinLock(&pAd->MacTabLock);
1550                 RTMPMoveMemory(pAd->MacTab.Content[BSSID_WCID].Addr, pAd->CommonCfg.Bssid, MAC_ADDR_LEN);
1551                 pAd->MacTab.Content[BSSID_WCID].Aid = BSSID_WCID;
1552                 pAd->MacTab.Content[BSSID_WCID].pAd = pAd;
1553                 pAd->MacTab.Content[BSSID_WCID].ValidAsCLI = TRUE;      //Although this is bssid..still set ValidAsCl
1554                 pAd->MacTab.Size = 1;   // infra mode always set MACtab size =1.
1555                 pAd->MacTab.Content[BSSID_WCID].Sst = SST_ASSOC;
1556                 pAd->MacTab.Content[BSSID_WCID].AuthState = SST_ASSOC;
1557                 pAd->MacTab.Content[BSSID_WCID].AuthMode = pAd->StaCfg.AuthMode;
1558                 pAd->MacTab.Content[BSSID_WCID].WepStatus = pAd->StaCfg.WepStatus;
1559         NdisReleaseSpinLock(&pAd->MacTabLock);
1560
1561                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!!  ClientStatusFlags=%lx)\n",
1562                         pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
1563
1564                 MlmeUpdateTxRates(pAd, TRUE, BSS0);
1565 #ifdef DOT11_N_SUPPORT
1566                 MlmeUpdateHtTxRates(pAd, BSS0);
1567                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !! (StaActive.bHtEnable =%d, )\n", pAd->StaActive.SupportedPhyInfo.bHtEnable));
1568 #endif // DOT11_N_SUPPORT //
1569
1570                 if (pAd->CommonCfg.bAggregationCapable)
1571                 {
1572                         if ((pAd->CommonCfg.bPiggyBackCapable) && (pAd->MlmeAux.APRalinkIe & 0x00000003) == 3)
1573                         {
1574
1575                                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_PIGGYBACK_INUSED);
1576                                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1577                 RTMPSetPiggyBack(pAd, TRUE);
1578                                 DBGPRINT(RT_DEBUG_TRACE, ("Turn on Piggy-Back\n"));
1579                         }
1580                         else if (pAd->MlmeAux.APRalinkIe & 0x00000001)
1581                         {
1582                                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1583                         }
1584                 }
1585
1586                 if (pAd->MlmeAux.APRalinkIe != 0x0)
1587                 {
1588 #ifdef DOT11_N_SUPPORT
1589                         if (CLIENT_STATUS_TEST_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RDG_CAPABLE))
1590                         {
1591                                 AsicEnableRDG(pAd);
1592                         }
1593 #endif // DOT11_N_SUPPORT //
1594                         OPSTATUS_SET_FLAG(pAd, fCLIENT_STATUS_RALINK_CHIPSET);
1595                         CLIENT_STATUS_SET_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RALINK_CHIPSET);
1596                 }
1597                 else
1598                 {
1599                         OPSTATUS_CLEAR_FLAG(pAd, fCLIENT_STATUS_RALINK_CHIPSET);
1600                         CLIENT_STATUS_CLEAR_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RALINK_CHIPSET);
1601                 }
1602         }
1603
1604 #ifdef DOT11_N_SUPPORT
1605         DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_CONNECT Event B!.BACapability = %x. ClientStatusFlags = %lx\n", pAd->CommonCfg.BACapability.word, pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
1606 #endif // DOT11_N_SUPPORT //
1607
1608         // Set LED
1609         RTMPSetLED(pAd, LED_LINK_UP);
1610
1611         pAd->Mlme.PeriodicRound = 0;
1612         pAd->Mlme.OneSecPeriodicRound = 0;
1613         pAd->bConfigChanged = FALSE;        // Reset config flag
1614         pAd->ExtraInfo = GENERAL_LINK_UP;   // Update extra information to link is up
1615
1616         // Set asic auto fall back
1617         {
1618                 PUCHAR                                  pTable;
1619                 UCHAR                                   TableSize = 0;
1620
1621                 MlmeSelectTxRateTable(pAd, &pAd->MacTab.Content[BSSID_WCID], &pTable, &TableSize, &pAd->CommonCfg.TxRateIndex);
1622                 AsicUpdateAutoFallBackTable(pAd, pTable);
1623         }
1624
1625         NdisAcquireSpinLock(&pAd->MacTabLock);
1626     pEntry->HTPhyMode.word = pAd->StaCfg.HTPhyMode.word;
1627     pEntry->MaxHTPhyMode.word = pAd->StaCfg.HTPhyMode.word;
1628         if (pAd->StaCfg.bAutoTxRateSwitch == FALSE)
1629         {
1630                 pEntry->bAutoTxRateSwitch = FALSE;
1631 #ifdef DOT11_N_SUPPORT
1632                 if (pEntry->HTPhyMode.field.MCS == 32)
1633                         pEntry->HTPhyMode.field.ShortGI = GI_800;
1634
1635                 if ((pEntry->HTPhyMode.field.MCS > MCS_7) || (pEntry->HTPhyMode.field.MCS == 32))
1636                         pEntry->HTPhyMode.field.STBC = STBC_NONE;
1637 #endif // DOT11_N_SUPPORT //
1638                 // If the legacy mode is set, overwrite the transmit setting of this entry.
1639                 if (pEntry->HTPhyMode.field.MODE <= MODE_OFDM)
1640                         RTMPUpdateLegacyTxSetting((UCHAR)pAd->StaCfg.DesiredTransmitSetting.field.FixedTxMode, pEntry);
1641         }
1642         else
1643                 pEntry->bAutoTxRateSwitch = TRUE;
1644         NdisReleaseSpinLock(&pAd->MacTabLock);
1645
1646         //  Let Link Status Page display first initial rate.
1647         pAd->LastTxRate = (USHORT)(pEntry->HTPhyMode.word);
1648         // Select DAC according to HT or Legacy
1649         if (pAd->StaActive.SupportedPhyInfo.MCSSet[0] != 0x00)
1650         {
1651                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &Value);
1652                 Value &= (~0x18);
1653                 if (pAd->Antenna.field.TxPath == 2)
1654                 {
1655                     Value |= 0x10;
1656                 }
1657                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, Value);
1658         }
1659         else
1660         {
1661                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &Value);
1662                 Value &= (~0x18);
1663                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, Value);
1664         }
1665
1666 #ifdef DOT11_N_SUPPORT
1667         if (pAd->StaActive.SupportedPhyInfo.bHtEnable == FALSE)
1668         {
1669         }
1670         else if (pEntry->MaxRAmpduFactor == 0)
1671         {
1672             // If HT AP doesn't support MaxRAmpduFactor = 1, we need to set max PSDU to 0.
1673             // Because our Init value is 1 at MACRegTable.
1674                 RTMP_IO_WRITE32(pAd, MAX_LEN_CFG, 0x0fff);
1675         }
1676 #endif // DOT11_N_SUPPORT //
1677
1678         // Patch for Marvel AP to gain high throughput
1679         // Need to set as following,
1680         // 1. Set txop in register-EDCA_AC0_CFG as 0x60
1681         // 2. Set EnTXWriteBackDDONE in register-WPDMA_GLO_CFG as zero
1682         // 3. PBF_MAX_PCNT as 0x1F3FBF9F
1683         // 4. kick per two packets when dequeue
1684         //
1685         // Txop can only be modified when RDG is off, WMM is disable and TxBurst is enable
1686         //
1687         // if 1. Legacy AP WMM on,  or 2. 11n AP, AMPDU disable.  Force turn off burst no matter what bEnableTxBurst is.
1688 #ifdef DOT11_N_SUPPORT
1689 //      if ((!IS_RT30xx(pAd)) &&
1690         if (!((pAd->CommonCfg.RxStream == 1)&&(pAd->CommonCfg.TxStream == 1)) &&
1691                 (((pAd->StaActive.SupportedPhyInfo.bHtEnable == FALSE) && OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_WMM_INUSED))
1692                 || ((pAd->StaActive.SupportedPhyInfo.bHtEnable == TRUE) && (pAd->CommonCfg.BACapability.field.Policy == BA_NOTUSE))))
1693         {
1694                 RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
1695                 Data  &= 0xFFFFFF00;
1696                 RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
1697
1698                 RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3F7F9F);
1699                 DBGPRINT(RT_DEBUG_TRACE, ("Txburst 1\n"));
1700         }
1701         else
1702 #endif // DOT11_N_SUPPORT //
1703         if (pAd->CommonCfg.bEnableTxBurst)
1704         {
1705                 RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
1706                 Data  &= 0xFFFFFF00;
1707                 Data  |= 0x60;
1708                 RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
1709                 pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = TRUE;
1710
1711                 RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3FBF9F);
1712                 DBGPRINT(RT_DEBUG_TRACE, ("Txburst 2\n"));
1713         }
1714         else
1715         {
1716                 RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
1717                 Data  &= 0xFFFFFF00;
1718                 RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
1719
1720                 RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3F7F9F);
1721                 DBGPRINT(RT_DEBUG_TRACE, ("Txburst 3\n"));
1722         }
1723
1724 #ifdef DOT11_N_SUPPORT
1725         // Re-check to turn on TX burst or not.
1726         if ((pAd->CommonCfg.IOTestParm.bLastAtheros == TRUE) && ((STA_WEP_ON(pAd))||(STA_TKIP_ON(pAd))))
1727         {
1728                 pAd->CommonCfg.IOTestParm.bNextDisableRxBA = TRUE;
1729                 if (pAd->CommonCfg.bEnableTxBurst)
1730                 {
1731                     UINT32 MACValue = 0;
1732                         // Force disable  TXOP value in this case. The same action in MLMEUpdateProtect too.
1733                         // I didn't change PBF_MAX_PCNT setting.
1734                         RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &MACValue);
1735                         MACValue  &= 0xFFFFFF00;
1736                         RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, MACValue);
1737                         pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = FALSE;
1738                 }
1739         }
1740         else
1741         {
1742                 pAd->CommonCfg.IOTestParm.bNextDisableRxBA = FALSE;
1743         }
1744 #endif // DOT11_N_SUPPORT //
1745
1746         pAd->CommonCfg.IOTestParm.bLastAtheros = FALSE;
1747         COPY_MAC_ADDR(pAd->CommonCfg.LastBssid, pAd->CommonCfg.Bssid);
1748         DBGPRINT(RT_DEBUG_TRACE, ("!!!pAd->bNextDisableRxBA= %d \n", pAd->CommonCfg.IOTestParm.bNextDisableRxBA));
1749         // BSSID add in one MAC entry too.  Because in Tx, ASIC need to check Cipher and IV/EIV, BAbitmap
1750         // Pther information in MACTab.Content[BSSID_WCID] is not necessary for driver.
1751         // Note: As STA, The MACTab.Content[BSSID_WCID]. PairwiseKey and Shared Key for BSS0 are the same.
1752
1753     if (pAd->StaCfg.WepStatus <= Ndis802_11WEPDisabled)
1754     {
1755         pAd->StaCfg.PortSecured = WPA_802_1X_PORT_SECURED;
1756                 pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilterAcceptAll;
1757         }
1758
1759         NdisAcquireSpinLock(&pAd->MacTabLock);
1760         pEntry->PortSecured = pAd->StaCfg.PortSecured;
1761         NdisReleaseSpinLock(&pAd->MacTabLock);
1762
1763     //
1764         // Patch Atheros AP TX will breakdown issue.
1765         // AP Model: DLink DWL-8200AP
1766         //
1767         if (INFRA_ON(pAd) && OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_WMM_INUSED) && STA_TKIP_ON(pAd))
1768         {
1769                 RTMP_IO_WRITE32(pAd, RX_PARSER_CFG, 0x01);
1770         }
1771         else
1772         {
1773                 RTMP_IO_WRITE32(pAd, RX_PARSER_CFG, 0x00);
1774         }
1775
1776         RTMP_CLEAR_FLAG(pAd, fRTMP_ADAPTER_BSS_SCAN_IN_PROGRESS);
1777 }
1778
1779 /*
1780         ==========================================================================
1781
1782         Routine Description:
1783                 Disconnect current BSSID
1784
1785         Arguments:
1786                 pAd                             - Pointer to our adapter
1787                 IsReqFromAP             - Request from AP
1788
1789         Return Value:
1790                 None
1791
1792         IRQL = DISPATCH_LEVEL
1793
1794         Note:
1795                 We need more information to know it's this requst from AP.
1796                 If yes! we need to do extra handling, for example, remove the WPA key.
1797                 Otherwise on 4-way handshaking will faied, since the WPA key didn't be
1798                 remove while auto reconnect.
1799                 Disconnect request from AP, it means we will start afresh 4-way handshaking
1800                 on WPA mode.
1801
1802         ==========================================================================
1803 */
1804 VOID LinkDown(
1805         IN PRTMP_ADAPTER pAd,
1806         IN  BOOLEAN      IsReqFromAP)
1807 {
1808         UCHAR                       i, ByteValue = 0;
1809
1810         // Do nothing if monitor mode is on
1811         if (MONITOR_ON(pAd))
1812                 return;
1813
1814     if (pAd->CommonCfg.bWirelessEvent)
1815         {
1816                 RTMPSendWirelessEvent(pAd, IW_STA_LINKDOWN_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
1817         }
1818
1819         DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN !!!\n"));
1820         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1821
1822         if (ADHOC_ON(pAd))              // Adhoc mode link down
1823         {
1824                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN 1!!!\n"));
1825
1826                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_ADHOC_ON);
1827                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
1828                 pAd->IndicateMediaState = NdisMediaStateDisconnected;
1829                 RTMP_IndicateMediaState(pAd);
1830         pAd->ExtraInfo = GENERAL_LINK_DOWN;
1831                 BssTableDeleteEntry(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Channel);
1832                 DBGPRINT(RT_DEBUG_TRACE, ("!!! MacTab.Size=%d !!!\n", pAd->MacTab.Size));
1833         }
1834         else                                    // Infra structure mode
1835         {
1836                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN 2!!!\n"));
1837
1838                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_INFRA_ON);
1839                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
1840
1841                 // Saved last SSID for linkup comparison
1842                 pAd->CommonCfg.LastSsidLen = pAd->CommonCfg.SsidLen;
1843                 NdisMoveMemory(pAd->CommonCfg.LastSsid, pAd->CommonCfg.Ssid, pAd->CommonCfg.LastSsidLen);
1844                 COPY_MAC_ADDR(pAd->CommonCfg.LastBssid, pAd->CommonCfg.Bssid);
1845                 if (pAd->MlmeAux.CurrReqIsFromNdis == TRUE)
1846                 {
1847                         pAd->IndicateMediaState = NdisMediaStateDisconnected;
1848                         RTMP_IndicateMediaState(pAd);
1849             pAd->ExtraInfo = GENERAL_LINK_DOWN;
1850                         DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event A!\n"));
1851                         pAd->MlmeAux.CurrReqIsFromNdis = FALSE;
1852                 }
1853                 else
1854                 {
1855             //
1856                         // If disassociation request is from NDIS, then we don't need to delete BSSID from entry.
1857                         // Otherwise lost beacon or receive De-Authentication from AP,
1858                         // then we should delete BSSID from BssTable.
1859                         // If we don't delete from entry, roaming will fail.
1860                         //
1861                         BssTableDeleteEntry(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Channel);
1862                 }
1863
1864                 // restore back to -
1865                 //      1. long slot (20 us) or short slot (9 us) time
1866                 //      2. turn on/off RTS/CTS and/or CTS-to-self protection
1867                 //      3. short preamble
1868                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_BG_PROTECTION_INUSED);
1869
1870                 if (pAd->StaCfg.CCXAdjacentAPReportFlag == TRUE)
1871                 {
1872                         //
1873                         // Record current AP's information.
1874                         // for later used reporting Adjacent AP report.
1875                         //
1876                         pAd->StaCfg.CCXAdjacentAPChannel = pAd->CommonCfg.Channel;
1877                         pAd->StaCfg.CCXAdjacentAPSsidLen = pAd->CommonCfg.SsidLen;
1878                         NdisMoveMemory(pAd->StaCfg.CCXAdjacentAPSsid, pAd->CommonCfg.Ssid, pAd->StaCfg.CCXAdjacentAPSsidLen);
1879                         COPY_MAC_ADDR(pAd->StaCfg.CCXAdjacentAPBssid, pAd->CommonCfg.Bssid);
1880                 }
1881         }
1882
1883         for (i=1; i<MAX_LEN_OF_MAC_TABLE; i++)
1884         {
1885                 if (pAd->MacTab.Content[i].ValidAsCLI == TRUE)
1886                         MacTableDeleteEntry(pAd, pAd->MacTab.Content[i].Aid, pAd->MacTab.Content[i].Addr);
1887         }
1888
1889         pAd->StaCfg.CCXQosECWMin        = 4;
1890         pAd->StaCfg.CCXQosECWMax        = 10;
1891
1892         AsicSetSlotTime(pAd, TRUE); //FALSE);
1893         AsicSetEdcaParm(pAd, NULL);
1894
1895         // Set LED
1896         RTMPSetLED(pAd, LED_LINK_DOWN);
1897     pAd->LedIndicatorStregth = 0xF0;
1898     RTMPSetSignalLED(pAd, -100);        // Force signal strength Led to be turned off, firmware is not done it.
1899
1900                 AsicDisableSync(pAd);
1901
1902         pAd->Mlme.PeriodicRound = 0;
1903         pAd->Mlme.OneSecPeriodicRound = 0;
1904
1905         if (pAd->StaCfg.BssType == BSS_INFRA)
1906         {
1907         // Remove StaCfg Information after link down
1908         NdisZeroMemory(pAd->CommonCfg.Bssid, MAC_ADDR_LEN);
1909         NdisZeroMemory(pAd->CommonCfg.Ssid, MAX_LEN_OF_SSID);
1910                 pAd->CommonCfg.SsidLen = 0;
1911         }
1912 #ifdef DOT11_N_SUPPORT
1913         NdisZeroMemory(&pAd->MlmeAux.HtCapability, sizeof(HT_CAPABILITY_IE));
1914         NdisZeroMemory(&pAd->MlmeAux.AddHtInfo, sizeof(ADD_HT_INFO_IE));
1915         pAd->MlmeAux.HtCapabilityLen = 0;
1916         pAd->MlmeAux.NewExtChannelOffset = 0xff;
1917 #endif // DOT11_N_SUPPORT //
1918
1919         // Reset WPA-PSK state. Only reset when supplicant enabled
1920         if (pAd->StaCfg.WpaState != SS_NOTUSE)
1921         {
1922                 pAd->StaCfg.WpaState = SS_START;
1923                 // Clear Replay counter
1924                 NdisZeroMemory(pAd->StaCfg.ReplayCounter, 8);
1925         }
1926
1927
1928         //
1929         // if link down come from AP, we need to remove all WPA keys on WPA mode.
1930         // otherwise will cause 4-way handshaking failed, since the WPA key not empty.
1931         //
1932         if ((IsReqFromAP) && (pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA))
1933         {
1934                 // Remove all WPA keys
1935                 RTMPWPARemoveAllKeys(pAd);
1936         }
1937
1938         // 802.1x port control
1939 #ifdef WPA_SUPPLICANT_SUPPORT
1940         // Prevent clear PortSecured here with static WEP
1941         // NetworkManger set security policy first then set SSID to connect AP.
1942         if (pAd->StaCfg.WpaSupplicantUP &&
1943                 (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled) &&
1944                 (pAd->StaCfg.IEEE8021X == FALSE))
1945         {
1946                 pAd->StaCfg.PortSecured = WPA_802_1X_PORT_SECURED;
1947         }
1948         else
1949 #endif // WPA_SUPPLICANT_SUPPORT //
1950         {
1951                 pAd->StaCfg.PortSecured = WPA_802_1X_PORT_NOT_SECURED;
1952                 pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilter8021xWEP;
1953         }
1954
1955         NdisAcquireSpinLock(&pAd->MacTabLock);
1956         pAd->MacTab.Content[BSSID_WCID].PortSecured = pAd->StaCfg.PortSecured;
1957         NdisReleaseSpinLock(&pAd->MacTabLock);
1958
1959         pAd->StaCfg.MicErrCnt = 0;
1960
1961         // Turn off Ckip control flag
1962         pAd->StaCfg.bCkipOn = FALSE;
1963         pAd->StaCfg.CCXEnable = FALSE;
1964
1965     pAd->IndicateMediaState = NdisMediaStateDisconnected;
1966         // Update extra information to link is up
1967         pAd->ExtraInfo = GENERAL_LINK_DOWN;
1968
1969     //pAd->StaCfg.AdhocBOnlyJoined = FALSE;
1970         //pAd->StaCfg.AdhocBGJoined = FALSE;
1971         //pAd->StaCfg.Adhoc20NJoined = FALSE;
1972     pAd->StaActive.SupportedPhyInfo.bHtEnable = FALSE;
1973
1974         // Reset the Current AP's IP address
1975         NdisZeroMemory(pAd->StaCfg.AironetIPAddress, 4);
1976 #ifdef RT2870
1977         pAd->bUsbTxBulkAggre = FALSE;
1978 #endif // RT2870 //
1979
1980         // Clean association information
1981         NdisZeroMemory(&pAd->StaCfg.AssocInfo, sizeof(NDIS_802_11_ASSOCIATION_INFORMATION));
1982         pAd->StaCfg.AssocInfo.Length = sizeof(NDIS_802_11_ASSOCIATION_INFORMATION);
1983         pAd->StaCfg.ReqVarIELen = 0;
1984         pAd->StaCfg.ResVarIELen = 0;
1985
1986         //
1987         // Reset RSSI value after link down
1988         //
1989         pAd->StaCfg.RssiSample.AvgRssi0 = 0;
1990         pAd->StaCfg.RssiSample.AvgRssi0X8 = 0;
1991         pAd->StaCfg.RssiSample.AvgRssi1 = 0;
1992         pAd->StaCfg.RssiSample.AvgRssi1X8 = 0;
1993         pAd->StaCfg.RssiSample.AvgRssi2 = 0;
1994         pAd->StaCfg.RssiSample.AvgRssi2X8 = 0;
1995
1996         // Restore MlmeRate
1997         pAd->CommonCfg.MlmeRate = pAd->CommonCfg.BasicMlmeRate;
1998         pAd->CommonCfg.RtsRate = pAd->CommonCfg.BasicMlmeRate;
1999
2000 #ifdef DOT11_N_SUPPORT
2001         //
2002         // After Link down, reset piggy-back setting in ASIC. Disable RDG.
2003         //
2004         if (pAd->CommonCfg.BBPCurrentBW == BW_40)
2005         {
2006                 pAd->CommonCfg.BBPCurrentBW = BW_20;
2007                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &ByteValue);
2008                 ByteValue &= (~0x18);
2009                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, ByteValue);
2010         }
2011 #endif // DOT11_N_SUPPORT //
2012         // Reset DAC
2013         RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &ByteValue);
2014         ByteValue &= (~0x18);
2015         if (pAd->Antenna.field.TxPath == 2)
2016         {
2017                 ByteValue |= 0x10;
2018         }
2019         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, ByteValue);
2020
2021         RTMPSetPiggyBack(pAd,FALSE);
2022         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_PIGGYBACK_INUSED);
2023
2024 #ifdef DOT11_N_SUPPORT
2025         pAd->CommonCfg.BACapability.word = pAd->CommonCfg.REGBACapability.word;
2026 #endif // DOT11_N_SUPPORT //
2027
2028         // Restore all settings in the following.
2029         AsicUpdateProtect(pAd, 0, (ALLN_SETPROTECT|CCKSETPROTECT|OFDMSETPROTECT), TRUE, FALSE);
2030         AsicDisableRDG(pAd);
2031         pAd->CommonCfg.IOTestParm.bCurrentAtheros = FALSE;
2032         pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = FALSE;
2033
2034         RTMP_IO_WRITE32(pAd, MAX_LEN_CFG, 0x1fff);
2035         RTMP_CLEAR_FLAG(pAd, fRTMP_ADAPTER_BSS_SCAN_IN_PROGRESS);
2036
2037 #ifdef WPA_SUPPLICANT_SUPPORT
2038 #ifndef NATIVE_WPA_SUPPLICANT_SUPPORT
2039         if (pAd->StaCfg.WpaSupplicantUP) {
2040                 union iwreq_data    wrqu;
2041                 //send disassociate event to wpa_supplicant
2042                 memset(&wrqu, 0, sizeof(wrqu));
2043                 wrqu.data.flags = RT_DISASSOC_EVENT_FLAG;
2044                 wireless_send_event(pAd->net_dev, IWEVCUSTOM, &wrqu, NULL);
2045         }
2046 #endif // NATIVE_WPA_SUPPLICANT_SUPPORT //
2047 #endif // WPA_SUPPLICANT_SUPPORT //
2048
2049 #ifdef NATIVE_WPA_SUPPLICANT_SUPPORT
2050         {
2051                 union iwreq_data    wrqu;
2052                 memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
2053                 wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
2054         }
2055 #endif // NATIVE_WPA_SUPPLICANT_SUPPORT //
2056
2057 #ifdef RT30xx
2058         if (IS_RT3090(pAd))
2059         {
2060                 UINT32                          macdata;
2061                 // disable MMPS BBP control register
2062                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &ByteValue);
2063                 ByteValue &= ~(0x04);   //bit 2
2064                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, ByteValue);
2065
2066                 // disable MMPS MAC control register
2067                 RTMP_IO_READ32(pAd, 0x1210, &macdata);
2068                 macdata &= ~(0x09);     //bit 0, 3
2069                 RTMP_IO_WRITE32(pAd, 0x1210, macdata);
2070         }
2071 #endif // RT30xx //
2072
2073 }
2074
2075 /*
2076         ==========================================================================
2077         Description:
2078
2079         IRQL = DISPATCH_LEVEL
2080
2081         ==========================================================================
2082 */
2083 VOID IterateOnBssTab(
2084         IN PRTMP_ADAPTER pAd)
2085 {
2086         MLME_START_REQ_STRUCT   StartReq;
2087         MLME_JOIN_REQ_STRUCT    JoinReq;
2088         ULONG                   BssIdx;
2089
2090         // Change the wepstatus to original wepstatus
2091         pAd->StaCfg.WepStatus   = pAd->StaCfg.OrigWepStatus;
2092         pAd->StaCfg.PairCipher  = pAd->StaCfg.OrigWepStatus;
2093         pAd->StaCfg.GroupCipher = pAd->StaCfg.OrigWepStatus;
2094
2095         BssIdx = pAd->MlmeAux.BssIdx;
2096         if (BssIdx < pAd->MlmeAux.SsidBssTab.BssNr)
2097         {
2098                 // Check cipher suite, AP must have more secured cipher than station setting
2099                 // Set the Pairwise and Group cipher to match the intended AP setting
2100                 // We can only connect to AP with less secured cipher setting
2101                 if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK))
2102                 {
2103                         pAd->StaCfg.GroupCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.GroupCipher;
2104
2105                         if (pAd->StaCfg.WepStatus == pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipher)
2106                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipher;
2107                         else if (pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipherAux != Ndis802_11WEPDisabled)
2108                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipherAux;
2109                         else    // There is no PairCipher Aux, downgrade our capability to TKIP
2110                                 pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
2111                 }
2112                 else if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK))
2113                 {
2114                         pAd->StaCfg.GroupCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.GroupCipher;
2115
2116                         if (pAd->StaCfg.WepStatus == pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipher)
2117                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipher;
2118                         else if (pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipherAux != Ndis802_11WEPDisabled)
2119                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipherAux;
2120                         else    // There is no PairCipher Aux, downgrade our capability to TKIP
2121                                 pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
2122
2123                         // RSN capability
2124                         pAd->StaCfg.RsnCapability = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.RsnCapability;
2125                 }
2126
2127                 // Set Mix cipher flag
2128                 pAd->StaCfg.bMixCipher = (pAd->StaCfg.PairCipher == pAd->StaCfg.GroupCipher) ? FALSE : TRUE;
2129                 if (pAd->StaCfg.bMixCipher == TRUE)
2130                 {
2131                         // If mix cipher, re-build RSNIE
2132                         RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, 0);
2133                 }
2134
2135                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - iterate BSS %ld of %d\n", BssIdx, pAd->MlmeAux.SsidBssTab.BssNr));
2136                 JoinParmFill(pAd, &JoinReq, BssIdx);
2137                 MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_JOIN_REQ, sizeof(MLME_JOIN_REQ_STRUCT),
2138                                         &JoinReq);
2139                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_JOIN;
2140         }
2141         else if (pAd->StaCfg.BssType == BSS_ADHOC)
2142         {
2143                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All BSS fail; start a new ADHOC (Ssid=%s)...\n",pAd->MlmeAux.Ssid));
2144                 StartParmFill(pAd, &StartReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
2145                 MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_START_REQ, sizeof(MLME_START_REQ_STRUCT), &StartReq);
2146                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_START;
2147         }
2148         else // no more BSS
2149         {
2150                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All roaming failed, stay @ ch #%d\n", pAd->CommonCfg.Channel));
2151                 AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
2152                 AsicLockChannel(pAd, pAd->CommonCfg.Channel);
2153                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
2154         }
2155 }
2156
2157 // for re-association only
2158 // IRQL = DISPATCH_LEVEL
2159 VOID IterateOnBssTab2(
2160         IN PRTMP_ADAPTER pAd)
2161 {
2162         MLME_REASSOC_REQ_STRUCT ReassocReq;
2163         ULONG                   BssIdx;
2164         BSS_ENTRY               *pBss;
2165
2166         BssIdx = pAd->MlmeAux.RoamIdx;
2167         pBss = &pAd->MlmeAux.RoamTab.BssEntry[BssIdx];
2168
2169         if (BssIdx < pAd->MlmeAux.RoamTab.BssNr)
2170         {
2171                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - iterate BSS %ld of %d\n", BssIdx, pAd->MlmeAux.RoamTab.BssNr));
2172
2173                 AsicSwitchChannel(pAd, pBss->Channel, FALSE);
2174                 AsicLockChannel(pAd, pBss->Channel);
2175
2176                 // reassociate message has the same structure as associate message
2177                 AssocParmFill(pAd, &ReassocReq, pBss->Bssid, pBss->CapabilityInfo,
2178                                           ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
2179                 MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_REASSOC_REQ,
2180                                         sizeof(MLME_REASSOC_REQ_STRUCT), &ReassocReq);
2181
2182                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_REASSOC;
2183         }
2184         else // no more BSS
2185         {
2186                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All fast roaming failed, back to ch #%d\n",pAd->CommonCfg.Channel));
2187                 AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
2188                 AsicLockChannel(pAd, pAd->CommonCfg.Channel);
2189                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
2190         }
2191 }
2192
2193 /*
2194         ==========================================================================
2195         Description:
2196
2197         IRQL = DISPATCH_LEVEL
2198
2199         ==========================================================================
2200 */
2201 VOID JoinParmFill(
2202         IN PRTMP_ADAPTER pAd,
2203         IN OUT MLME_JOIN_REQ_STRUCT *JoinReq,
2204         IN ULONG BssIdx)
2205 {
2206         JoinReq->BssIdx = BssIdx;
2207 }
2208
2209 /*
2210         ==========================================================================
2211         Description:
2212
2213         IRQL = DISPATCH_LEVEL
2214
2215         ==========================================================================
2216 */
2217 VOID ScanParmFill(
2218         IN PRTMP_ADAPTER pAd,
2219         IN OUT MLME_SCAN_REQ_STRUCT *ScanReq,
2220         IN CHAR Ssid[],
2221         IN UCHAR SsidLen,
2222         IN UCHAR BssType,
2223         IN UCHAR ScanType)
2224 {
2225     NdisZeroMemory(ScanReq->Ssid, MAX_LEN_OF_SSID);
2226         ScanReq->SsidLen = SsidLen;
2227         NdisMoveMemory(ScanReq->Ssid, Ssid, SsidLen);
2228         ScanReq->BssType = BssType;
2229         ScanReq->ScanType = ScanType;
2230 }
2231
2232 /*
2233         ==========================================================================
2234         Description:
2235
2236         IRQL = DISPATCH_LEVEL
2237
2238         ==========================================================================
2239 */
2240 VOID StartParmFill(
2241         IN PRTMP_ADAPTER pAd,
2242         IN OUT MLME_START_REQ_STRUCT *StartReq,
2243         IN CHAR Ssid[],
2244         IN UCHAR SsidLen)
2245 {
2246         ASSERT(SsidLen <= MAX_LEN_OF_SSID);
2247         NdisMoveMemory(StartReq->Ssid, Ssid, SsidLen);
2248         StartReq->SsidLen = SsidLen;
2249 }
2250
2251 /*
2252         ==========================================================================
2253         Description:
2254
2255         IRQL = DISPATCH_LEVEL
2256
2257         ==========================================================================
2258 */
2259 VOID AuthParmFill(
2260         IN PRTMP_ADAPTER pAd,
2261         IN OUT MLME_AUTH_REQ_STRUCT *AuthReq,
2262         IN PUCHAR pAddr,
2263         IN USHORT Alg)
2264 {
2265         COPY_MAC_ADDR(AuthReq->Addr, pAddr);
2266         AuthReq->Alg = Alg;
2267         AuthReq->Timeout = AUTH_TIMEOUT;
2268 }
2269
2270 /*
2271         ==========================================================================
2272         Description:
2273
2274         IRQL = DISPATCH_LEVEL
2275
2276         ==========================================================================
2277  */
2278
2279
2280 #ifdef RT2870
2281
2282 VOID MlmeCntlConfirm(
2283         IN PRTMP_ADAPTER pAd,
2284         IN ULONG MsgType,
2285         IN USHORT Msg)
2286 {
2287         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MsgType, sizeof(USHORT), &Msg);
2288 }
2289
2290 VOID ComposePsPoll(
2291         IN PRTMP_ADAPTER pAd)
2292 {
2293         PTXINFO_STRUC           pTxInfo;
2294         PTXWI_STRUC             pTxWI;
2295
2296         DBGPRINT(RT_DEBUG_TRACE, ("ComposePsPoll\n"));
2297         NdisZeroMemory(&pAd->PsPollFrame, sizeof(PSPOLL_FRAME));
2298
2299         pAd->PsPollFrame.FC.PwrMgmt = 0;
2300         pAd->PsPollFrame.FC.Type = BTYPE_CNTL;
2301         pAd->PsPollFrame.FC.SubType = SUBTYPE_PS_POLL;
2302         pAd->PsPollFrame.Aid = pAd->StaActive.Aid | 0xC000;
2303         COPY_MAC_ADDR(pAd->PsPollFrame.Bssid, pAd->CommonCfg.Bssid);
2304         COPY_MAC_ADDR(pAd->PsPollFrame.Ta, pAd->CurrentAddress);
2305
2306         RTMPZeroMemory(&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[0], 100);
2307         pTxInfo = (PTXINFO_STRUC)&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[0];
2308         RTMPWriteTxInfo(pAd, pTxInfo, (USHORT)(sizeof(PSPOLL_FRAME)+TXWI_SIZE), TRUE, EpToQueue[MGMTPIPEIDX], FALSE,  FALSE);
2309         pTxWI = (PTXWI_STRUC)&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[TXINFO_SIZE];
2310         RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, FALSE, FALSE, TRUE, FALSE, 0, BSSID_WCID, (sizeof(PSPOLL_FRAME)),
2311                 0,  0, (UCHAR)pAd->CommonCfg.MlmeTransmit.field.MCS, IFS_BACKOFF, FALSE, &pAd->CommonCfg.MlmeTransmit);
2312         RTMPMoveMemory(&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[TXWI_SIZE+TXINFO_SIZE], &pAd->PsPollFrame, sizeof(PSPOLL_FRAME));
2313         // Append 4 extra zero bytes.
2314         pAd->PsPollContext.BulkOutSize =  TXINFO_SIZE + TXWI_SIZE + sizeof(PSPOLL_FRAME) + 4;
2315 }
2316
2317 // IRQL = DISPATCH_LEVEL
2318 VOID ComposeNullFrame(
2319         IN PRTMP_ADAPTER pAd)
2320 {
2321         PTXINFO_STRUC           pTxInfo;
2322         PTXWI_STRUC             pTxWI;
2323
2324         NdisZeroMemory(&pAd->NullFrame, sizeof(HEADER_802_11));
2325         pAd->NullFrame.FC.Type = BTYPE_DATA;
2326         pAd->NullFrame.FC.SubType = SUBTYPE_NULL_FUNC;
2327         pAd->NullFrame.FC.ToDs = 1;
2328         COPY_MAC_ADDR(pAd->NullFrame.Addr1, pAd->CommonCfg.Bssid);
2329         COPY_MAC_ADDR(pAd->NullFrame.Addr2, pAd->CurrentAddress);
2330         COPY_MAC_ADDR(pAd->NullFrame.Addr3, pAd->CommonCfg.Bssid);
2331         RTMPZeroMemory(&pAd->NullContext.TransferBuffer->field.WirelessPacket[0], 100);
2332         pTxInfo = (PTXINFO_STRUC)&pAd->NullContext.TransferBuffer->field.WirelessPacket[0];
2333         RTMPWriteTxInfo(pAd, pTxInfo, (USHORT)(sizeof(HEADER_802_11)+TXWI_SIZE), TRUE, EpToQueue[MGMTPIPEIDX], FALSE,  FALSE);
2334         pTxWI = (PTXWI_STRUC)&pAd->NullContext.TransferBuffer->field.WirelessPacket[TXINFO_SIZE];
2335         RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, FALSE, FALSE, TRUE, FALSE, 0, BSSID_WCID, (sizeof(HEADER_802_11)),
2336                 0, 0, (UCHAR)pAd->CommonCfg.MlmeTransmit.field.MCS, IFS_BACKOFF, FALSE, &pAd->CommonCfg.MlmeTransmit);
2337         RTMPMoveMemory(&pAd->NullContext.TransferBuffer->field.WirelessPacket[TXWI_SIZE+TXINFO_SIZE], &pAd->NullFrame, sizeof(HEADER_802_11));
2338         pAd->NullContext.BulkOutSize =  TXINFO_SIZE + TXWI_SIZE + sizeof(pAd->NullFrame) + 4;
2339 }
2340 #endif // RT2870 //
2341
2342
2343 /*
2344         ==========================================================================
2345         Description:
2346                 Pre-build a BEACON frame in the shared memory
2347
2348         IRQL = PASSIVE_LEVEL
2349         IRQL = DISPATCH_LEVEL
2350
2351         ==========================================================================
2352 */
2353 ULONG MakeIbssBeacon(
2354         IN PRTMP_ADAPTER pAd)
2355 {
2356         UCHAR         DsLen = 1, IbssLen = 2;
2357         UCHAR         LocalErpIe[3] = {IE_ERP, 1, 0x04};
2358         HEADER_802_11 BcnHdr;
2359         USHORT        CapabilityInfo;
2360         LARGE_INTEGER FakeTimestamp;
2361         ULONG         FrameLen = 0;
2362         PTXWI_STRUC       pTxWI = &pAd->BeaconTxWI;
2363         CHAR         *pBeaconFrame = pAd->BeaconBuf;
2364         BOOLEAN       Privacy;
2365         UCHAR         SupRate[MAX_LEN_OF_SUPPORTED_RATES];
2366         UCHAR         SupRateLen = 0;
2367         UCHAR         ExtRate[MAX_LEN_OF_SUPPORTED_RATES];
2368         UCHAR         ExtRateLen = 0;
2369         UCHAR         RSNIe = IE_WPA;
2370
2371         if ((pAd->CommonCfg.PhyMode == PHY_11B) && (pAd->CommonCfg.Channel <= 14))
2372         {
2373                 SupRate[0] = 0x82; // 1 mbps
2374                 SupRate[1] = 0x84; // 2 mbps
2375                 SupRate[2] = 0x8b; // 5.5 mbps
2376                 SupRate[3] = 0x96; // 11 mbps
2377                 SupRateLen = 4;
2378                 ExtRateLen = 0;
2379         }
2380         else if (pAd->CommonCfg.Channel > 14)
2381         {
2382                 SupRate[0]  = 0x8C;    // 6 mbps, in units of 0.5 Mbps, basic rate
2383                 SupRate[1]  = 0x12;    // 9 mbps, in units of 0.5 Mbps
2384                 SupRate[2]  = 0x98;    // 12 mbps, in units of 0.5 Mbps, basic rate
2385                 SupRate[3]  = 0x24;    // 18 mbps, in units of 0.5 Mbps
2386                 SupRate[4]  = 0xb0;    // 24 mbps, in units of 0.5 Mbps, basic rate
2387                 SupRate[5]  = 0x48;    // 36 mbps, in units of 0.5 Mbps
2388                 SupRate[6]  = 0x60;    // 48 mbps, in units of 0.5 Mbps
2389                 SupRate[7]  = 0x6c;    // 54 mbps, in units of 0.5 Mbps
2390                 SupRateLen  = 8;
2391                 ExtRateLen  = 0;
2392
2393                 //
2394                 // Also Update MlmeRate & RtsRate for G only & A only
2395                 //
2396                 pAd->CommonCfg.MlmeRate = RATE_6;
2397                 pAd->CommonCfg.RtsRate = RATE_6;
2398                 pAd->CommonCfg.MlmeTransmit.field.MODE = MODE_OFDM;
2399                 pAd->CommonCfg.MlmeTransmit.field.MCS = OfdmRateToRxwiMCS[pAd->CommonCfg.MlmeRate];
2400                 pAd->MacTab.Content[BSS0Mcast_WCID].HTPhyMode.field.MODE = MODE_OFDM;
2401                 pAd->MacTab.Content[BSS0Mcast_WCID].HTPhyMode.field.MCS = OfdmRateToRxwiMCS[pAd->CommonCfg.MlmeRate];
2402         }
2403         else
2404         {
2405                 SupRate[0] = 0x82; // 1 mbps
2406                 SupRate[1] = 0x84; // 2 mbps
2407                 SupRate[2] = 0x8b; // 5.5 mbps
2408                 SupRate[3] = 0x96; // 11 mbps
2409                 SupRateLen = 4;
2410
2411                 ExtRate[0]  = 0x0C;    // 6 mbps, in units of 0.5 Mbps,
2412                 ExtRate[1]  = 0x12;    // 9 mbps, in units of 0.5 Mbps
2413                 ExtRate[2]  = 0x18;    // 12 mbps, in units of 0.5 Mbps,
2414                 ExtRate[3]  = 0x24;    // 18 mbps, in units of 0.5 Mbps
2415                 ExtRate[4]  = 0x30;    // 24 mbps, in units of 0.5 Mbps,
2416                 ExtRate[5]  = 0x48;    // 36 mbps, in units of 0.5 Mbps
2417                 ExtRate[6]  = 0x60;    // 48 mbps, in units of 0.5 Mbps
2418                 ExtRate[7]  = 0x6c;    // 54 mbps, in units of 0.5 Mbps
2419                 ExtRateLen  = 8;
2420         }
2421
2422         pAd->StaActive.SupRateLen = SupRateLen;
2423         NdisMoveMemory(pAd->StaActive.SupRate, SupRate, SupRateLen);
2424         pAd->StaActive.ExtRateLen = ExtRateLen;
2425         NdisMoveMemory(pAd->StaActive.ExtRate, ExtRate, ExtRateLen);
2426
2427         // compose IBSS beacon frame
2428         MgtMacHeaderInit(pAd, &BcnHdr, SUBTYPE_BEACON, 0, BROADCAST_ADDR, pAd->CommonCfg.Bssid);
2429         Privacy = (pAd->StaCfg.WepStatus == Ndis802_11Encryption1Enabled) ||
2430                           (pAd->StaCfg.WepStatus == Ndis802_11Encryption2Enabled) ||
2431                           (pAd->StaCfg.WepStatus == Ndis802_11Encryption3Enabled);
2432         CapabilityInfo = CAP_GENERATE(0, 1, Privacy, (pAd->CommonCfg.TxPreamble == Rt802_11PreambleShort), 0, 0);
2433
2434         MakeOutgoingFrame(pBeaconFrame,                &FrameLen,
2435                                           sizeof(HEADER_802_11),           &BcnHdr,
2436                                           TIMESTAMP_LEN,                   &FakeTimestamp,
2437                                           2,                               &pAd->CommonCfg.BeaconPeriod,
2438                                           2,                               &CapabilityInfo,
2439                                           1,                               &SsidIe,
2440                                           1,                               &pAd->CommonCfg.SsidLen,
2441                                           pAd->CommonCfg.SsidLen,          pAd->CommonCfg.Ssid,
2442                                           1,                               &SupRateIe,
2443                                           1,                               &SupRateLen,
2444                                           SupRateLen,                      SupRate,
2445                                           1,                               &DsIe,
2446                                           1,                               &DsLen,
2447                                           1,                               &pAd->CommonCfg.Channel,
2448                                           1,                               &IbssIe,
2449                                           1,                               &IbssLen,
2450                                           2,                               &pAd->StaActive.AtimWin,
2451                                           END_OF_ARGS);
2452
2453         // add ERP_IE and EXT_RAE IE of in 802.11g
2454         if (ExtRateLen)
2455         {
2456                 ULONG   tmp;
2457
2458                 MakeOutgoingFrame(pBeaconFrame + FrameLen,         &tmp,
2459                                                   3,                               LocalErpIe,
2460                                                   1,                               &ExtRateIe,
2461                                                   1,                               &ExtRateLen,
2462                                                   ExtRateLen,                      ExtRate,
2463                                                   END_OF_ARGS);
2464                 FrameLen += tmp;
2465         }
2466
2467         // If adhoc secruity is set for WPA-None, append the cipher suite IE
2468         if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone)
2469         {
2470                 ULONG tmp;
2471         RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, BSS0);
2472
2473                 MakeOutgoingFrame(pBeaconFrame + FrameLen,              &tmp,
2474                                                   1,                                    &RSNIe,
2475                                                   1,                                    &pAd->StaCfg.RSNIE_Len,
2476                                                   pAd->StaCfg.RSNIE_Len,                pAd->StaCfg.RSN_IE,
2477                                                   END_OF_ARGS);
2478                 FrameLen += tmp;
2479         }
2480
2481 #ifdef DOT11_N_SUPPORT
2482         if ((pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED))
2483         {
2484                 ULONG TmpLen;
2485                 UCHAR HtLen, HtLen1;
2486
2487 #ifdef RT_BIG_ENDIAN
2488                 HT_CAPABILITY_IE HtCapabilityTmp;
2489                 ADD_HT_INFO_IE  addHTInfoTmp;
2490                 USHORT  b2lTmp, b2lTmp2;
2491 #endif
2492
2493                 // add HT Capability IE
2494                 HtLen = sizeof(pAd->CommonCfg.HtCapability);
2495                 HtLen1 = sizeof(pAd->CommonCfg.AddHTInfo);
2496 #ifndef RT_BIG_ENDIAN
2497                 MakeOutgoingFrame(pBeaconFrame+FrameLen,        &TmpLen,
2498                                                   1,                                            &HtCapIe,
2499                                                   1,                                            &HtLen,
2500                                                   HtLen,                                        &pAd->CommonCfg.HtCapability,
2501                                                   1,                                            &AddHtInfoIe,
2502                                                   1,                                            &HtLen1,
2503                                                   HtLen1,                                       &pAd->CommonCfg.AddHTInfo,
2504                                                   END_OF_ARGS);
2505 #else
2506                 NdisMoveMemory(&HtCapabilityTmp, &pAd->CommonCfg.HtCapability, HtLen);
2507                 *(USHORT *)(&HtCapabilityTmp.HtCapInfo) = SWAP16(*(USHORT *)(&HtCapabilityTmp.HtCapInfo));
2508                 *(USHORT *)(&HtCapabilityTmp.ExtHtCapInfo) = SWAP16(*(USHORT *)(&HtCapabilityTmp.ExtHtCapInfo));
2509
2510                 NdisMoveMemory(&addHTInfoTmp, &pAd->CommonCfg.AddHTInfo, HtLen1);
2511                 *(USHORT *)(&addHTInfoTmp.AddHtInfo2) = SWAP16(*(USHORT *)(&addHTInfoTmp.AddHtInfo2));
2512                 *(USHORT *)(&addHTInfoTmp.AddHtInfo3) = SWAP16(*(USHORT *)(&addHTInfoTmp.AddHtInfo3));
2513
2514                 MakeOutgoingFrame(pBeaconFrame+FrameLen,        &TmpLen,
2515                                                   1,                                            &HtCapIe,
2516                                                   1,                                            &HtLen,
2517                                                   HtLen,                                        &HtCapabilityTmp,
2518                                                   1,                                            &AddHtInfoIe,
2519                                                   1,                                            &HtLen1,
2520                                                   HtLen1,                                       &addHTInfoTmp,
2521                                                   END_OF_ARGS);
2522 #endif
2523                 FrameLen += TmpLen;
2524         }
2525 #endif // DOT11_N_SUPPORT //
2526
2527         //beacon use reserved WCID 0xff
2528     if (pAd->CommonCfg.Channel > 14)
2529     {
2530         RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE,  TRUE, FALSE, FALSE, TRUE, 0, 0xff, FrameLen,
2531                 PID_MGMT, PID_BEACON, RATE_1, IFS_HTTXOP, FALSE, &pAd->CommonCfg.MlmeTransmit);
2532     }
2533     else
2534     {
2535         // Set to use 1Mbps for Adhoc beacon.
2536                 HTTRANSMIT_SETTING Transmit;
2537         Transmit.word = 0;
2538         RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE,  TRUE, FALSE, FALSE, TRUE, 0, 0xff, FrameLen,
2539                 PID_MGMT, PID_BEACON, RATE_1, IFS_HTTXOP, FALSE, &Transmit);
2540     }
2541
2542 #ifdef RT_BIG_ENDIAN
2543         RTMPFrameEndianChange(pAd, pBeaconFrame, DIR_WRITE, FALSE);
2544         RTMPWIEndianChange((PUCHAR)pTxWI, TYPE_TXWI);
2545 #endif
2546
2547     DBGPRINT(RT_DEBUG_TRACE, ("MakeIbssBeacon (len=%ld), SupRateLen=%d, ExtRateLen=%d, Channel=%d, PhyMode=%d\n",
2548                                         FrameLen, SupRateLen, ExtRateLen, pAd->CommonCfg.Channel, pAd->CommonCfg.PhyMode));
2549         return FrameLen;
2550 }
2551
2552