Staging: rt2860: remove DOT11_N_SUPPORT ifdefs
[linux-2.6] / drivers / staging / rt2860 / sta / assoc.c
1 /*
2  *************************************************************************
3  * Ralink Tech Inc.
4  * 5F., No.36, Taiyuan St., Jhubei City,
5  * Hsinchu County 302,
6  * Taiwan, R.O.C.
7  *
8  * (c) Copyright 2002-2007, Ralink Technology, Inc.
9  *
10  * This program is free software; you can redistribute it and/or modify  *
11  * it under the terms of the GNU General Public License as published by  *
12  * the Free Software Foundation; either version 2 of the License, or     *
13  * (at your option) any later version.                                   *
14  *                                                                       *
15  * This program is distributed in the hope that it will be useful,       *
16  * but WITHOUT ANY WARRANTY; without even the implied warranty of        *
17  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         *
18  * GNU General Public License for more details.                          *
19  *                                                                       *
20  * You should have received a copy of the GNU General Public License     *
21  * along with this program; if not, write to the                         *
22  * Free Software Foundation, Inc.,                                       *
23  * 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.             *
24  *                                                                       *
25  *************************************************************************
26
27         Module Name:
28         assoc.c
29
30         Abstract:
31
32         Revision History:
33         Who                     When                    What
34         --------        ----------              ----------------------------------------------
35         John            2004-9-3                porting from RT2500
36 */
37 #include "../rt_config.h"
38
39 UCHAR   CipherWpaTemplate[] = {
40                 0xdd,                                   // WPA IE
41                 0x16,                                   // Length
42                 0x00, 0x50, 0xf2, 0x01, // oui
43                 0x01, 0x00,                             // Version
44                 0x00, 0x50, 0xf2, 0x02, // Multicast
45                 0x01, 0x00,                             // Number of unicast
46                 0x00, 0x50, 0xf2, 0x02, // unicast
47                 0x01, 0x00,                             // number of authentication method
48                 0x00, 0x50, 0xf2, 0x01  // authentication
49                 };
50
51 UCHAR   CipherWpa2Template[] = {
52                 0x30,                                   // RSN IE
53                 0x14,                                   // Length
54                 0x01, 0x00,                             // Version
55                 0x00, 0x0f, 0xac, 0x02, // group cipher, TKIP
56                 0x01, 0x00,                             // number of pairwise
57                 0x00, 0x0f, 0xac, 0x02, // unicast
58                 0x01, 0x00,                             // number of authentication method
59                 0x00, 0x0f, 0xac, 0x02, // authentication
60                 0x00, 0x00,                             // RSN capability
61                 };
62
63 UCHAR   Ccx2IeInfo[] = { 0x00, 0x40, 0x96, 0x03, 0x02};
64
65 /*
66         ==========================================================================
67         Description:
68                 association state machine init, including state transition and timer init
69         Parameters:
70                 S - pointer to the association state machine
71
72         IRQL = PASSIVE_LEVEL
73
74         ==========================================================================
75  */
76 VOID AssocStateMachineInit(
77         IN      PRTMP_ADAPTER   pAd,
78         IN  STATE_MACHINE *S,
79         OUT STATE_MACHINE_FUNC Trans[])
80 {
81         StateMachineInit(S, Trans, MAX_ASSOC_STATE, MAX_ASSOC_MSG, (STATE_MACHINE_FUNC)Drop, ASSOC_IDLE, ASSOC_MACHINE_BASE);
82
83         // first column
84         StateMachineSetAction(S, ASSOC_IDLE, MT2_MLME_ASSOC_REQ, (STATE_MACHINE_FUNC)MlmeAssocReqAction);
85         StateMachineSetAction(S, ASSOC_IDLE, MT2_MLME_REASSOC_REQ, (STATE_MACHINE_FUNC)MlmeReassocReqAction);
86         StateMachineSetAction(S, ASSOC_IDLE, MT2_MLME_DISASSOC_REQ, (STATE_MACHINE_FUNC)MlmeDisassocReqAction);
87         StateMachineSetAction(S, ASSOC_IDLE, MT2_PEER_DISASSOC_REQ, (STATE_MACHINE_FUNC)PeerDisassocAction);
88
89         // second column
90         StateMachineSetAction(S, ASSOC_WAIT_RSP, MT2_MLME_ASSOC_REQ, (STATE_MACHINE_FUNC)InvalidStateWhenAssoc);
91         StateMachineSetAction(S, ASSOC_WAIT_RSP, MT2_MLME_REASSOC_REQ, (STATE_MACHINE_FUNC)InvalidStateWhenReassoc);
92         StateMachineSetAction(S, ASSOC_WAIT_RSP, MT2_MLME_DISASSOC_REQ, (STATE_MACHINE_FUNC)InvalidStateWhenDisassociate);
93         StateMachineSetAction(S, ASSOC_WAIT_RSP, MT2_PEER_DISASSOC_REQ, (STATE_MACHINE_FUNC)PeerDisassocAction);
94         StateMachineSetAction(S, ASSOC_WAIT_RSP, MT2_PEER_ASSOC_RSP, (STATE_MACHINE_FUNC)PeerAssocRspAction);
95         //
96         // Patch 3Com AP MOde:3CRWE454G72
97         // We send Assoc request frame to this AP, it always send Reassoc Rsp not Associate Rsp.
98         //
99         StateMachineSetAction(S, ASSOC_WAIT_RSP, MT2_PEER_REASSOC_RSP, (STATE_MACHINE_FUNC)PeerAssocRspAction);
100         StateMachineSetAction(S, ASSOC_WAIT_RSP, MT2_ASSOC_TIMEOUT, (STATE_MACHINE_FUNC)AssocTimeoutAction);
101
102         // third column
103         StateMachineSetAction(S, REASSOC_WAIT_RSP, MT2_MLME_ASSOC_REQ, (STATE_MACHINE_FUNC)InvalidStateWhenAssoc);
104         StateMachineSetAction(S, REASSOC_WAIT_RSP, MT2_MLME_REASSOC_REQ, (STATE_MACHINE_FUNC)InvalidStateWhenReassoc);
105         StateMachineSetAction(S, REASSOC_WAIT_RSP, MT2_MLME_DISASSOC_REQ, (STATE_MACHINE_FUNC)InvalidStateWhenDisassociate);
106         StateMachineSetAction(S, REASSOC_WAIT_RSP, MT2_PEER_DISASSOC_REQ, (STATE_MACHINE_FUNC)PeerDisassocAction);
107         StateMachineSetAction(S, REASSOC_WAIT_RSP, MT2_PEER_REASSOC_RSP, (STATE_MACHINE_FUNC)PeerReassocRspAction);
108         //
109         // Patch, AP doesn't send Reassociate Rsp frame to Station.
110         //
111         StateMachineSetAction(S, REASSOC_WAIT_RSP, MT2_PEER_ASSOC_RSP, (STATE_MACHINE_FUNC)PeerReassocRspAction);
112         StateMachineSetAction(S, REASSOC_WAIT_RSP, MT2_REASSOC_TIMEOUT, (STATE_MACHINE_FUNC)ReassocTimeoutAction);
113
114         // fourth column
115         StateMachineSetAction(S, DISASSOC_WAIT_RSP, MT2_MLME_ASSOC_REQ, (STATE_MACHINE_FUNC)InvalidStateWhenAssoc);
116         StateMachineSetAction(S, DISASSOC_WAIT_RSP, MT2_MLME_REASSOC_REQ, (STATE_MACHINE_FUNC)InvalidStateWhenReassoc);
117         StateMachineSetAction(S, DISASSOC_WAIT_RSP, MT2_MLME_DISASSOC_REQ, (STATE_MACHINE_FUNC)InvalidStateWhenDisassociate);
118         StateMachineSetAction(S, DISASSOC_WAIT_RSP, MT2_PEER_DISASSOC_REQ, (STATE_MACHINE_FUNC)PeerDisassocAction);
119         StateMachineSetAction(S, DISASSOC_WAIT_RSP, MT2_DISASSOC_TIMEOUT, (STATE_MACHINE_FUNC)DisassocTimeoutAction);
120
121         // initialize the timer
122         RTMPInitTimer(pAd, &pAd->MlmeAux.AssocTimer, GET_TIMER_FUNCTION(AssocTimeout), pAd, FALSE);
123         RTMPInitTimer(pAd, &pAd->MlmeAux.ReassocTimer, GET_TIMER_FUNCTION(ReassocTimeout), pAd, FALSE);
124         RTMPInitTimer(pAd, &pAd->MlmeAux.DisassocTimer, GET_TIMER_FUNCTION(DisassocTimeout), pAd, FALSE);
125 }
126
127 /*
128         ==========================================================================
129         Description:
130                 Association timeout procedure. After association timeout, this function
131                 will be called and it will put a message into the MLME queue
132         Parameters:
133                 Standard timer parameters
134
135         IRQL = DISPATCH_LEVEL
136
137         ==========================================================================
138  */
139 VOID AssocTimeout(IN PVOID SystemSpecific1,
140                                  IN PVOID FunctionContext,
141                                  IN PVOID SystemSpecific2,
142                                  IN PVOID SystemSpecific3)
143 {
144         RTMP_ADAPTER *pAd = (RTMP_ADAPTER *)FunctionContext;
145
146         // Do nothing if the driver is starting halt state.
147         // This might happen when timer already been fired before cancel timer with mlmehalt
148         if (RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_HALT_IN_PROGRESS | fRTMP_ADAPTER_NIC_NOT_EXIST))
149                 return;
150
151         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_ASSOC_TIMEOUT, 0, NULL);
152         RT28XX_MLME_HANDLER(pAd);
153 }
154
155 /*
156         ==========================================================================
157         Description:
158                 Reassociation timeout procedure. After reassociation timeout, this
159                 function will be called and put a message into the MLME queue
160         Parameters:
161                 Standard timer parameters
162
163         IRQL = DISPATCH_LEVEL
164
165         ==========================================================================
166  */
167 VOID ReassocTimeout(IN PVOID SystemSpecific1,
168                                         IN PVOID FunctionContext,
169                                         IN PVOID SystemSpecific2,
170                                         IN PVOID SystemSpecific3)
171 {
172         RTMP_ADAPTER *pAd = (RTMP_ADAPTER *)FunctionContext;
173
174         // Do nothing if the driver is starting halt state.
175         // This might happen when timer already been fired before cancel timer with mlmehalt
176         if (RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_HALT_IN_PROGRESS | fRTMP_ADAPTER_NIC_NOT_EXIST))
177                 return;
178
179         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_REASSOC_TIMEOUT, 0, NULL);
180         RT28XX_MLME_HANDLER(pAd);
181 }
182
183 /*
184         ==========================================================================
185         Description:
186                 Disassociation timeout procedure. After disassociation timeout, this
187                 function will be called and put a message into the MLME queue
188         Parameters:
189                 Standard timer parameters
190
191         IRQL = DISPATCH_LEVEL
192
193         ==========================================================================
194  */
195 VOID DisassocTimeout(IN PVOID SystemSpecific1,
196                                         IN PVOID FunctionContext,
197                                         IN PVOID SystemSpecific2,
198                                         IN PVOID SystemSpecific3)
199 {
200         RTMP_ADAPTER *pAd = (RTMP_ADAPTER *)FunctionContext;
201
202         // Do nothing if the driver is starting halt state.
203         // This might happen when timer already been fired before cancel timer with mlmehalt
204         if (RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_HALT_IN_PROGRESS | fRTMP_ADAPTER_NIC_NOT_EXIST))
205                 return;
206
207         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_DISASSOC_TIMEOUT, 0, NULL);
208         RT28XX_MLME_HANDLER(pAd);
209 }
210
211 /*
212         ==========================================================================
213         Description:
214                 mlme assoc req handling procedure
215         Parameters:
216                 Adapter - Adapter pointer
217                 Elem - MLME Queue Element
218         Pre:
219                 the station has been authenticated and the following information is stored in the config
220                         -# SSID
221                         -# supported rates and their length
222                         -# listen interval (Adapter->StaCfg.default_listen_count)
223                         -# Transmit power  (Adapter->StaCfg.tx_power)
224         Post  :
225                 -# An association request frame is generated and sent to the air
226                 -# Association timer starts
227                 -# Association state -> ASSOC_WAIT_RSP
228
229         IRQL = DISPATCH_LEVEL
230
231         ==========================================================================
232  */
233 VOID MlmeAssocReqAction(
234         IN PRTMP_ADAPTER pAd,
235         IN MLME_QUEUE_ELEM *Elem)
236 {
237         UCHAR                   ApAddr[6];
238         HEADER_802_11   AssocHdr;
239         UCHAR                   Ccx2Len = 5;
240         UCHAR                   WmeIe[9] = {IE_VENDOR_SPECIFIC, 0x07, 0x00, 0x50, 0xf2, 0x02, 0x00, 0x01, 0x00};
241         USHORT                  ListenIntv;
242         ULONG                   Timeout;
243         USHORT                  CapabilityInfo;
244         BOOLEAN                 TimerCancelled;
245         PUCHAR                  pOutBuffer = NULL;
246         NDIS_STATUS             NStatus;
247         ULONG                   FrameLen = 0;
248         ULONG                   tmp;
249         USHORT                  VarIesOffset;
250         UCHAR                   CkipFlag;
251         UCHAR                   CkipNegotiationBuffer[CKIP_NEGOTIATION_LENGTH];
252         UCHAR                   AironetCkipIe = IE_AIRONET_CKIP;
253         UCHAR                   AironetCkipLen = CKIP_NEGOTIATION_LENGTH;
254         UCHAR                   AironetIPAddressIE = IE_AIRONET_IPADDRESS;
255         UCHAR                   AironetIPAddressLen = AIRONET_IPADDRESS_LENGTH;
256         UCHAR                   AironetIPAddressBuffer[AIRONET_IPADDRESS_LENGTH] = {0x00, 0x40, 0x96, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00};
257         USHORT                  Status;
258
259         // Block all authentication request durning WPA block period
260         if (pAd->StaCfg.bBlockAssoc == TRUE)
261         {
262                 DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - Block Assoc request durning WPA block period!\n"));
263                 pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
264                 Status = MLME_STATE_MACHINE_REJECT;
265                 MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_ASSOC_CONF, 2, &Status);
266         }
267         // check sanity first
268         else if (MlmeAssocReqSanity(pAd, Elem->Msg, Elem->MsgLen, ApAddr, &CapabilityInfo, &Timeout, &ListenIntv))
269         {
270                 RTMPCancelTimer(&pAd->MlmeAux.AssocTimer, &TimerCancelled);
271                 COPY_MAC_ADDR(pAd->MlmeAux.Bssid, ApAddr);
272
273                 // Get an unused nonpaged memory
274                 NStatus = MlmeAllocateMemory(pAd, &pOutBuffer);
275                 if (NStatus != NDIS_STATUS_SUCCESS)
276                 {
277                         DBGPRINT(RT_DEBUG_TRACE,("ASSOC - MlmeAssocReqAction() allocate memory failed \n"));
278                         pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
279                         Status = MLME_FAIL_NO_RESOURCE;
280                         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_ASSOC_CONF, 2, &Status);
281                         return;
282                 }
283
284                 // Add by James 03/06/27
285                 pAd->StaCfg.AssocInfo.Length = sizeof(NDIS_802_11_ASSOCIATION_INFORMATION);
286                 // Association don't need to report MAC address
287                 pAd->StaCfg.AssocInfo.AvailableRequestFixedIEs =
288                         NDIS_802_11_AI_REQFI_CAPABILITIES | NDIS_802_11_AI_REQFI_LISTENINTERVAL;
289                 pAd->StaCfg.AssocInfo.RequestFixedIEs.Capabilities = CapabilityInfo;
290                 pAd->StaCfg.AssocInfo.RequestFixedIEs.ListenInterval = ListenIntv;
291                 // Only reassociate need this
292                 //COPY_MAC_ADDR(pAd->StaCfg.AssocInfo.RequestFixedIEs.CurrentAPAddress, ApAddr);
293                 pAd->StaCfg.AssocInfo.OffsetRequestIEs = sizeof(NDIS_802_11_ASSOCIATION_INFORMATION);
294
295         NdisZeroMemory(pAd->StaCfg.ReqVarIEs, MAX_VIE_LEN);
296                 // First add SSID
297                 VarIesOffset = 0;
298                 NdisMoveMemory(pAd->StaCfg.ReqVarIEs + VarIesOffset, &SsidIe, 1);
299                 VarIesOffset += 1;
300                 NdisMoveMemory(pAd->StaCfg.ReqVarIEs + VarIesOffset, &pAd->MlmeAux.SsidLen, 1);
301                 VarIesOffset += 1;
302                 NdisMoveMemory(pAd->StaCfg.ReqVarIEs + VarIesOffset, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
303                 VarIesOffset += pAd->MlmeAux.SsidLen;
304
305                 // Second add Supported rates
306                 NdisMoveMemory(pAd->StaCfg.ReqVarIEs + VarIesOffset, &SupRateIe, 1);
307                 VarIesOffset += 1;
308                 NdisMoveMemory(pAd->StaCfg.ReqVarIEs + VarIesOffset, &pAd->MlmeAux.SupRateLen, 1);
309                 VarIesOffset += 1;
310                 NdisMoveMemory(pAd->StaCfg.ReqVarIEs + VarIesOffset, pAd->MlmeAux.SupRate, pAd->MlmeAux.SupRateLen);
311                 VarIesOffset += pAd->MlmeAux.SupRateLen;
312                 // End Add by James
313
314         if ((pAd->CommonCfg.Channel > 14) &&
315             (pAd->CommonCfg.bIEEE80211H == TRUE))
316             CapabilityInfo |= 0x0100;
317
318                 DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - Send ASSOC request...\n"));
319                 MgtMacHeaderInit(pAd, &AssocHdr, SUBTYPE_ASSOC_REQ, 0, ApAddr, ApAddr);
320
321                 // Build basic frame first
322                 MakeOutgoingFrame(pOutBuffer,                           &FrameLen,
323                                                   sizeof(HEADER_802_11),        &AssocHdr,
324                                                   2,                                            &CapabilityInfo,
325                                                   2,                                            &ListenIntv,
326                                                   1,                                            &SsidIe,
327                                                   1,                                            &pAd->MlmeAux.SsidLen,
328                                                   pAd->MlmeAux.SsidLen,         pAd->MlmeAux.Ssid,
329                                                   1,                                            &SupRateIe,
330                                                   1,                                            &pAd->MlmeAux.SupRateLen,
331                                                   pAd->MlmeAux.SupRateLen,  pAd->MlmeAux.SupRate,
332                                                   END_OF_ARGS);
333
334                 if (pAd->MlmeAux.ExtRateLen != 0)
335                 {
336                         MakeOutgoingFrame(pOutBuffer + FrameLen,    &tmp,
337                                                           1,                        &ExtRateIe,
338                                                           1,                        &pAd->MlmeAux.ExtRateLen,
339                                                           pAd->MlmeAux.ExtRateLen,  pAd->MlmeAux.ExtRate,
340                                                           END_OF_ARGS);
341                         FrameLen += tmp;
342                 }
343
344                 // HT
345                 if ((pAd->MlmeAux.HtCapabilityLen > 0) && (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED))
346                 {
347                         ULONG TmpLen;
348                         UCHAR HtLen;
349                         UCHAR BROADCOM[4] = {0x0, 0x90, 0x4c, 0x33};
350                         if (pAd->StaActive.SupportedPhyInfo.bPreNHt == TRUE)
351                         {
352                                 HtLen = SIZE_HT_CAP_IE + 4;
353                                 MakeOutgoingFrame(pOutBuffer + FrameLen,            &TmpLen,
354                                                           1,                                &WpaIe,
355                                                           1,                                &HtLen,
356                                                           4,                                &BROADCOM[0],
357                                                          pAd->MlmeAux.HtCapabilityLen,          &pAd->MlmeAux.HtCapability,
358                                                           END_OF_ARGS);
359                         }
360                         else
361                         {
362                                 MakeOutgoingFrame(pOutBuffer + FrameLen,            &TmpLen,
363                                                           1,                                &HtCapIe,
364                                                           1,                                &pAd->MlmeAux.HtCapabilityLen,
365                                                          pAd->MlmeAux.HtCapabilityLen,          &pAd->MlmeAux.HtCapability,
366                                                           END_OF_ARGS);
367                         }
368                         FrameLen += TmpLen;
369                 }
370
371                 // add Ralink proprietary IE to inform AP this STA is going to use AGGREGATION or PIGGY-BACK+AGGREGATION
372                 // Case I: (Aggregation + Piggy-Back)
373                 // 1. user enable aggregation, AND
374                 // 2. Mac support piggy-back
375                 // 3. AP annouces it's PIGGY-BACK+AGGREGATION-capable in BEACON
376                 // Case II: (Aggregation)
377                 // 1. user enable aggregation, AND
378                 // 2. AP annouces it's AGGREGATION-capable in BEACON
379                 if (pAd->CommonCfg.bAggregationCapable)
380                 {
381                         if ((pAd->CommonCfg.bPiggyBackCapable) && ((pAd->MlmeAux.APRalinkIe & 0x00000003) == 3))
382                         {
383                                 ULONG TmpLen;
384                                 UCHAR RalinkIe[9] = {IE_VENDOR_SPECIFIC, 7, 0x00, 0x0c, 0x43, 0x03, 0x00, 0x00, 0x00};
385                                 MakeOutgoingFrame(pOutBuffer+FrameLen,           &TmpLen,
386                                                                   9,                             RalinkIe,
387                                                                   END_OF_ARGS);
388                                 FrameLen += TmpLen;
389                         }
390                         else if (pAd->MlmeAux.APRalinkIe & 0x00000001)
391                         {
392                                 ULONG TmpLen;
393                                 UCHAR RalinkIe[9] = {IE_VENDOR_SPECIFIC, 7, 0x00, 0x0c, 0x43, 0x01, 0x00, 0x00, 0x00};
394                                 MakeOutgoingFrame(pOutBuffer+FrameLen,           &TmpLen,
395                                                                   9,                             RalinkIe,
396                                                                   END_OF_ARGS);
397                                 FrameLen += TmpLen;
398                         }
399                 }
400                 else
401                 {
402                         ULONG TmpLen;
403                         UCHAR RalinkIe[9] = {IE_VENDOR_SPECIFIC, 7, 0x00, 0x0c, 0x43, 0x06, 0x00, 0x00, 0x00};
404                         MakeOutgoingFrame(pOutBuffer+FrameLen,           &TmpLen,
405                                                           9,                                             RalinkIe,
406                                                           END_OF_ARGS);
407                         FrameLen += TmpLen;
408                 }
409
410                 if (pAd->MlmeAux.APEdcaParm.bValid)
411                 {
412                         if (pAd->CommonCfg.bAPSDCapable && pAd->MlmeAux.APEdcaParm.bAPSDCapable)
413                         {
414                                 QBSS_STA_INFO_PARM QosInfo;
415
416                                 NdisZeroMemory(&QosInfo, sizeof(QBSS_STA_INFO_PARM));
417                                 QosInfo.UAPSD_AC_BE = pAd->CommonCfg.bAPSDAC_BE;
418                                 QosInfo.UAPSD_AC_BK = pAd->CommonCfg.bAPSDAC_BK;
419                                 QosInfo.UAPSD_AC_VI = pAd->CommonCfg.bAPSDAC_VI;
420                                 QosInfo.UAPSD_AC_VO = pAd->CommonCfg.bAPSDAC_VO;
421                                 QosInfo.MaxSPLength = pAd->CommonCfg.MaxSPLength;
422                                 WmeIe[8] |= *(PUCHAR)&QosInfo;
423                         }
424                         else
425                         {
426                 // The Parameter Set Count is set to Â¡Â§0¡¨ in the association request frames
427                 // WmeIe[8] |= (pAd->MlmeAux.APEdcaParm.EdcaUpdateCount & 0x0f);
428                         }
429
430                         MakeOutgoingFrame(pOutBuffer + FrameLen,    &tmp,
431                                                           9,                        &WmeIe[0],
432                                                           END_OF_ARGS);
433                         FrameLen += tmp;
434                 }
435
436                 //
437                 // Let WPA(#221) Element ID on the end of this association frame.
438                 // Otherwise some AP will fail on parsing Element ID and set status fail on Assoc Rsp.
439                 // For example: Put Vendor Specific IE on the front of WPA IE.
440                 // This happens on AP (Model No:Linksys WRK54G)
441                 //
442                 if (((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK) ||
443             (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK) ||
444             (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) ||
445             (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2)
446                         )
447             )
448                 {
449                         UCHAR RSNIe = IE_WPA;
450
451                         if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK) ||
452                 (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2))
453                         {
454                                 RSNIe = IE_WPA2;
455                         }
456
457             RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, BSS0);
458
459             // Check for WPA PMK cache list
460                         if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2)
461                         {
462                             INT     idx;
463                 BOOLEAN FoundPMK = FALSE;
464                                 // Search chched PMKID, append it if existed
465                                 for (idx = 0; idx < PMKID_NO; idx++)
466                                 {
467                                         if (NdisEqualMemory(ApAddr, &pAd->StaCfg.SavedPMK[idx].BSSID, 6))
468                                         {
469                                                 FoundPMK = TRUE;
470                                                 break;
471                                         }
472                                 }
473
474                                 if (FoundPMK)
475                                 {
476                                         // Set PMK number
477                                         *(PUSHORT) &pAd->StaCfg.RSN_IE[pAd->StaCfg.RSNIE_Len] = 1;
478                                         NdisMoveMemory(&pAd->StaCfg.RSN_IE[pAd->StaCfg.RSNIE_Len + 2], &pAd->StaCfg.SavedPMK[idx].PMKID, 16);
479                     pAd->StaCfg.RSNIE_Len += 18;
480                                 }
481                         }
482
483                         {
484                                 MakeOutgoingFrame(pOutBuffer + FrameLen,                &tmp,
485                                                         1,                              &RSNIe,
486                                                 1,                              &pAd->StaCfg.RSNIE_Len,
487                                                 pAd->StaCfg.RSNIE_Len,                  pAd->StaCfg.RSN_IE,
488                                                 END_OF_ARGS);
489                         }
490
491                         FrameLen += tmp;
492
493                         {
494                     // Append Variable IE
495                     NdisMoveMemory(pAd->StaCfg.ReqVarIEs + VarIesOffset, &RSNIe, 1);
496                     VarIesOffset += 1;
497                     NdisMoveMemory(pAd->StaCfg.ReqVarIEs + VarIesOffset, &pAd->StaCfg.RSNIE_Len, 1);
498                     VarIesOffset += 1;
499                         }
500                         NdisMoveMemory(pAd->StaCfg.ReqVarIEs + VarIesOffset, pAd->StaCfg.RSN_IE, pAd->StaCfg.RSNIE_Len);
501                         VarIesOffset += pAd->StaCfg.RSNIE_Len;
502
503                         // Set Variable IEs Length
504                         pAd->StaCfg.ReqVarIELen = VarIesOffset;
505                 }
506
507                 // We have update that at PeerBeaconAtJoinRequest()
508                 CkipFlag = pAd->StaCfg.CkipFlag;
509                 if (CkipFlag != 0)
510                 {
511                         NdisZeroMemory(CkipNegotiationBuffer, CKIP_NEGOTIATION_LENGTH);
512                         CkipNegotiationBuffer[2] = 0x66;
513                         // Make it try KP & MIC, since we have to follow the result from AssocRsp
514                         CkipNegotiationBuffer[8] = 0x18;
515                         CkipNegotiationBuffer[CKIP_NEGOTIATION_LENGTH - 1] = 0x22;
516                         CkipFlag = 0x18;
517
518                         MakeOutgoingFrame(pOutBuffer + FrameLen,        &tmp,
519                                                 1,                                                              &AironetCkipIe,
520                                                 1,                                                              &AironetCkipLen,
521                                                 AironetCkipLen,                                 CkipNegotiationBuffer,
522                                                 END_OF_ARGS);
523                         FrameLen += tmp;
524                 }
525
526                 // Add CCX v2 request if CCX2 admin state is on
527                 if (pAd->StaCfg.CCXControl.field.Enable == 1)
528                 {
529
530                         //
531                         // Add AironetIPAddressIE for Cisco CCX 2.X
532                         // Add CCX Version
533                         //
534                         MakeOutgoingFrame(pOutBuffer + FrameLen, &tmp,
535                                                 1,                                                      &AironetIPAddressIE,
536                                                 1,                                                      &AironetIPAddressLen,
537                                                 AironetIPAddressLen,            AironetIPAddressBuffer,
538                                                 1,                                                      &Ccx2Ie,
539                                                 1,                                                      &Ccx2Len,
540                                                 Ccx2Len,                                    Ccx2IeInfo,
541                                                 END_OF_ARGS);
542                         FrameLen += tmp;
543
544                         // Add by James 03/06/27
545                         // Set Variable IEs Length
546                         pAd->StaCfg.ReqVarIELen = VarIesOffset;
547                         pAd->StaCfg.AssocInfo.RequestIELength = VarIesOffset;
548
549                         // OffsetResponseIEs follow ReqVarIE
550                         pAd->StaCfg.AssocInfo.OffsetResponseIEs = sizeof(NDIS_802_11_ASSOCIATION_INFORMATION) + pAd->StaCfg.ReqVarIELen;
551                         // End Add by James
552                 }
553
554
555                 MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
556                 MlmeFreeMemory(pAd, pOutBuffer);
557
558                 RTMPSetTimer(&pAd->MlmeAux.AssocTimer, Timeout);
559                 pAd->Mlme.AssocMachine.CurrState = ASSOC_WAIT_RSP;
560         }
561         else
562         {
563                 DBGPRINT(RT_DEBUG_TRACE,("ASSOC - MlmeAssocReqAction() sanity check failed. BUG!!!!!! \n"));
564                 pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
565                 Status = MLME_INVALID_FORMAT;
566                 MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_ASSOC_CONF, 2, &Status);
567         }
568
569 }
570
571 /*
572         ==========================================================================
573         Description:
574                 mlme reassoc req handling procedure
575         Parameters:
576                 Elem -
577         Pre:
578                 -# SSID  (Adapter->StaCfg.ssid[])
579                 -# BSSID (AP address, Adapter->StaCfg.bssid)
580                 -# Supported rates (Adapter->StaCfg.supported_rates[])
581                 -# Supported rates length (Adapter->StaCfg.supported_rates_len)
582                 -# Tx power (Adapter->StaCfg.tx_power)
583
584         IRQL = DISPATCH_LEVEL
585
586         ==========================================================================
587  */
588 VOID MlmeReassocReqAction(
589         IN PRTMP_ADAPTER pAd,
590         IN MLME_QUEUE_ELEM *Elem)
591 {
592         UCHAR                   ApAddr[6];
593         HEADER_802_11   ReassocHdr;
594         UCHAR                   Ccx2Len = 5;
595         UCHAR                   WmeIe[9] = {IE_VENDOR_SPECIFIC, 0x07, 0x00, 0x50, 0xf2, 0x02, 0x00, 0x01, 0x00};
596         USHORT                  CapabilityInfo, ListenIntv;
597         ULONG                   Timeout;
598         ULONG                   FrameLen = 0;
599         BOOLEAN                 TimerCancelled;
600         NDIS_STATUS             NStatus;
601         ULONG                   tmp;
602         PUCHAR                  pOutBuffer = NULL;
603         USHORT                  Status;
604
605         // Block all authentication request durning WPA block period
606         if (pAd->StaCfg.bBlockAssoc == TRUE)
607         {
608                 DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - Block ReAssoc request durning WPA block period!\n"));
609                 pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
610                 Status = MLME_STATE_MACHINE_REJECT;
611                 MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_REASSOC_CONF, 2, &Status);
612         }
613         // the parameters are the same as the association
614         else if(MlmeAssocReqSanity(pAd, Elem->Msg, Elem->MsgLen, ApAddr, &CapabilityInfo, &Timeout, &ListenIntv))
615         {
616                 RTMPCancelTimer(&pAd->MlmeAux.ReassocTimer, &TimerCancelled);
617
618                 NStatus = MlmeAllocateMemory(pAd, &pOutBuffer);  //Get an unused nonpaged memory
619                 if(NStatus != NDIS_STATUS_SUCCESS)
620                 {
621                         DBGPRINT(RT_DEBUG_TRACE,("ASSOC - MlmeReassocReqAction() allocate memory failed \n"));
622                         pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
623                         Status = MLME_FAIL_NO_RESOURCE;
624                         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_REASSOC_CONF, 2, &Status);
625                         return;
626                 }
627
628                 COPY_MAC_ADDR(pAd->MlmeAux.Bssid, ApAddr);
629
630                 // make frame, use bssid as the AP address??
631                 DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - Send RE-ASSOC request...\n"));
632                 MgtMacHeaderInit(pAd, &ReassocHdr, SUBTYPE_REASSOC_REQ, 0, ApAddr, ApAddr);
633                 MakeOutgoingFrame(pOutBuffer,               &FrameLen,
634                                                   sizeof(HEADER_802_11),    &ReassocHdr,
635                                                   2,                        &CapabilityInfo,
636                                                   2,                        &ListenIntv,
637                                                   MAC_ADDR_LEN,             ApAddr,
638                                                   1,                        &SsidIe,
639                                                   1,                        &pAd->MlmeAux.SsidLen,
640                                                   pAd->MlmeAux.SsidLen,     pAd->MlmeAux.Ssid,
641                                                   1,                        &SupRateIe,
642                                                   1,                                            &pAd->MlmeAux.SupRateLen,
643                                                   pAd->MlmeAux.SupRateLen,  pAd->MlmeAux.SupRate,
644                                                   END_OF_ARGS);
645
646                 if (pAd->MlmeAux.ExtRateLen != 0)
647                 {
648                         MakeOutgoingFrame(pOutBuffer + FrameLen,        &tmp,
649                                                           1,                            &ExtRateIe,
650                                                           1,                            &pAd->MlmeAux.ExtRateLen,
651                                                           pAd->MlmeAux.ExtRateLen,          pAd->MlmeAux.ExtRate,
652                                                           END_OF_ARGS);
653                         FrameLen += tmp;
654                 }
655
656                 if (pAd->MlmeAux.APEdcaParm.bValid)
657                 {
658                         if (pAd->CommonCfg.bAPSDCapable && pAd->MlmeAux.APEdcaParm.bAPSDCapable)
659                         {
660                                 QBSS_STA_INFO_PARM QosInfo;
661
662                                 NdisZeroMemory(&QosInfo, sizeof(QBSS_STA_INFO_PARM));
663                                 QosInfo.UAPSD_AC_BE = pAd->CommonCfg.bAPSDAC_BE;
664                                 QosInfo.UAPSD_AC_BK = pAd->CommonCfg.bAPSDAC_BK;
665                                 QosInfo.UAPSD_AC_VI = pAd->CommonCfg.bAPSDAC_VI;
666                                 QosInfo.UAPSD_AC_VO = pAd->CommonCfg.bAPSDAC_VO;
667                                 QosInfo.MaxSPLength = pAd->CommonCfg.MaxSPLength;
668                                 WmeIe[8] |= *(PUCHAR)&QosInfo;
669                         }
670
671                         MakeOutgoingFrame(pOutBuffer + FrameLen,    &tmp,
672                                                           9,                        &WmeIe[0],
673                                                           END_OF_ARGS);
674                         FrameLen += tmp;
675                 }
676
677                 // HT
678                 if ((pAd->MlmeAux.HtCapabilityLen > 0) && (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED))
679                 {
680                         ULONG TmpLen;
681                         UCHAR HtLen;
682                         UCHAR BROADCOM[4] = {0x0, 0x90, 0x4c, 0x33};
683                         if (pAd->StaActive.SupportedPhyInfo.bPreNHt == TRUE)
684                         {
685                                 HtLen = SIZE_HT_CAP_IE + 4;
686                                 MakeOutgoingFrame(pOutBuffer + FrameLen,            &TmpLen,
687                                                           1,                                &WpaIe,
688                                                           1,                                &HtLen,
689                                                           4,                                &BROADCOM[0],
690                                                          pAd->MlmeAux.HtCapabilityLen,          &pAd->MlmeAux.HtCapability,
691                                                           END_OF_ARGS);
692                         }
693                         else
694                         {
695                                 MakeOutgoingFrame(pOutBuffer + FrameLen,            &TmpLen,
696                                                           1,                                &HtCapIe,
697                                                           1,                                &pAd->MlmeAux.HtCapabilityLen,
698                                                          pAd->MlmeAux.HtCapabilityLen,          &pAd->MlmeAux.HtCapability,
699                                                           END_OF_ARGS);
700                         }
701                         FrameLen += TmpLen;
702                 }
703
704                 // add Ralink proprietary IE to inform AP this STA is going to use AGGREGATION or PIGGY-BACK+AGGREGATION
705                 // Case I: (Aggregation + Piggy-Back)
706                 // 1. user enable aggregation, AND
707                 // 2. Mac support piggy-back
708                 // 3. AP annouces it's PIGGY-BACK+AGGREGATION-capable in BEACON
709                 // Case II: (Aggregation)
710                 // 1. user enable aggregation, AND
711                 // 2. AP annouces it's AGGREGATION-capable in BEACON
712                 if (pAd->CommonCfg.bAggregationCapable)
713                 {
714                         if ((pAd->CommonCfg.bPiggyBackCapable) && ((pAd->MlmeAux.APRalinkIe & 0x00000003) == 3))
715                         {
716                                 ULONG TmpLen;
717                                 UCHAR RalinkIe[9] = {IE_VENDOR_SPECIFIC, 7, 0x00, 0x0c, 0x43, 0x03, 0x00, 0x00, 0x00};
718                                 MakeOutgoingFrame(pOutBuffer+FrameLen,           &TmpLen,
719                                                                   9,                             RalinkIe,
720                                                                   END_OF_ARGS);
721                                 FrameLen += TmpLen;
722                         }
723                         else if (pAd->MlmeAux.APRalinkIe & 0x00000001)
724                         {
725                                 ULONG TmpLen;
726                                 UCHAR RalinkIe[9] = {IE_VENDOR_SPECIFIC, 7, 0x00, 0x0c, 0x43, 0x01, 0x00, 0x00, 0x00};
727                                 MakeOutgoingFrame(pOutBuffer+FrameLen,           &TmpLen,
728                                                                   9,                             RalinkIe,
729                                                                   END_OF_ARGS);
730                                 FrameLen += TmpLen;
731                         }
732                 }
733                 else
734                 {
735                         ULONG TmpLen;
736                         UCHAR RalinkIe[9] = {IE_VENDOR_SPECIFIC, 7, 0x00, 0x0c, 0x43, 0x04, 0x00, 0x00, 0x00};
737                         MakeOutgoingFrame(pOutBuffer+FrameLen,           &TmpLen,
738                                                           9,                                             RalinkIe,
739                                                           END_OF_ARGS);
740                         FrameLen += TmpLen;
741                 }
742
743                 // Add CCX v2 request if CCX2 admin state is on
744                 if (pAd->StaCfg.CCXControl.field.Enable == 1)
745                 {
746                         //
747                         // Add CCX Version
748                         //
749                         MakeOutgoingFrame(pOutBuffer + FrameLen, &tmp,
750                                                 1,                                                      &Ccx2Ie,
751                                                 1,                                                      &Ccx2Len,
752                                                 Ccx2Len,                                    Ccx2IeInfo,
753                                                 END_OF_ARGS);
754                         FrameLen += tmp;
755                 }
756
757                 MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
758                 MlmeFreeMemory(pAd, pOutBuffer);
759
760                 RTMPSetTimer(&pAd->MlmeAux.ReassocTimer, Timeout); /* in mSec */
761                 pAd->Mlme.AssocMachine.CurrState = REASSOC_WAIT_RSP;
762         }
763         else
764         {
765                 DBGPRINT(RT_DEBUG_TRACE,("ASSOC - MlmeReassocReqAction() sanity check failed. BUG!!!! \n"));
766                 pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
767                 Status = MLME_INVALID_FORMAT;
768                 MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_REASSOC_CONF, 2, &Status);
769         }
770 }
771
772 /*
773         ==========================================================================
774         Description:
775                 Upper layer issues disassoc request
776         Parameters:
777                 Elem -
778
779         IRQL = PASSIVE_LEVEL
780
781         ==========================================================================
782  */
783 VOID MlmeDisassocReqAction(
784         IN PRTMP_ADAPTER pAd,
785         IN MLME_QUEUE_ELEM *Elem)
786 {
787         PMLME_DISASSOC_REQ_STRUCT pDisassocReq;
788         HEADER_802_11         DisassocHdr;
789         PHEADER_802_11        pDisassocHdr;
790         PUCHAR                pOutBuffer = NULL;
791         ULONG                 FrameLen = 0;
792         NDIS_STATUS           NStatus;
793         BOOLEAN               TimerCancelled;
794         ULONG                 Timeout = 0;
795         USHORT                Status;
796
797         // skip sanity check
798         pDisassocReq = (PMLME_DISASSOC_REQ_STRUCT)(Elem->Msg);
799
800         NStatus = MlmeAllocateMemory(pAd, &pOutBuffer);  //Get an unused nonpaged memory
801         if (NStatus != NDIS_STATUS_SUCCESS)
802         {
803                 DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - MlmeDisassocReqAction() allocate memory failed\n"));
804                 pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
805                 Status = MLME_FAIL_NO_RESOURCE;
806                 MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_DISASSOC_CONF, 2, &Status);
807                 return;
808         }
809
810
811
812         RTMPCancelTimer(&pAd->MlmeAux.DisassocTimer, &TimerCancelled);
813
814         DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - Send DISASSOC request[BSSID::%02x:%02x:%02x:%02x:%02x:%02x (Reason=%d)\n",
815                                 pDisassocReq->Addr[0], pDisassocReq->Addr[1], pDisassocReq->Addr[2],
816                                 pDisassocReq->Addr[3], pDisassocReq->Addr[4], pDisassocReq->Addr[5], pDisassocReq->Reason));
817         MgtMacHeaderInit(pAd, &DisassocHdr, SUBTYPE_DISASSOC, 0, pDisassocReq->Addr, pDisassocReq->Addr);       // patch peap ttls switching issue
818         MakeOutgoingFrame(pOutBuffer,           &FrameLen,
819                                           sizeof(HEADER_802_11),&DisassocHdr,
820                                           2,                    &pDisassocReq->Reason,
821                                           END_OF_ARGS);
822         MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
823
824         // To patch Instance and Buffalo(N) AP
825         // Driver has to send deauth to Instance AP, but Buffalo(N) needs to send disassoc to reset Authenticator's state machine
826         // Therefore, we send both of them.
827         pDisassocHdr = (PHEADER_802_11)pOutBuffer;
828         pDisassocHdr->FC.SubType = SUBTYPE_DEAUTH;
829         MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
830
831         MlmeFreeMemory(pAd, pOutBuffer);
832
833         pAd->StaCfg.DisassocReason = REASON_DISASSOC_STA_LEAVING;
834         COPY_MAC_ADDR(pAd->StaCfg.DisassocSta, pDisassocReq->Addr);
835
836         RTMPSetTimer(&pAd->MlmeAux.DisassocTimer, Timeout); /* in mSec */
837         pAd->Mlme.AssocMachine.CurrState = DISASSOC_WAIT_RSP;
838
839     {
840         union iwreq_data    wrqu;
841         memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
842         wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
843     }
844 }
845
846 /*
847         ==========================================================================
848         Description:
849                 peer sends assoc rsp back
850         Parameters:
851                 Elme - MLME message containing the received frame
852
853         IRQL = DISPATCH_LEVEL
854
855         ==========================================================================
856  */
857 VOID PeerAssocRspAction(
858         IN PRTMP_ADAPTER pAd,
859         IN MLME_QUEUE_ELEM *Elem)
860 {
861         USHORT        CapabilityInfo, Status, Aid;
862         UCHAR         SupRate[MAX_LEN_OF_SUPPORTED_RATES], SupRateLen;
863         UCHAR         ExtRate[MAX_LEN_OF_SUPPORTED_RATES], ExtRateLen;
864         UCHAR         Addr2[MAC_ADDR_LEN];
865         BOOLEAN       TimerCancelled;
866         UCHAR         CkipFlag;
867         EDCA_PARM     EdcaParm;
868         HT_CAPABILITY_IE                HtCapability;
869         ADD_HT_INFO_IE          AddHtInfo;      // AP might use this additional ht info IE
870         UCHAR                   HtCapabilityLen;
871         UCHAR                   AddHtInfoLen;
872         UCHAR                   NewExtChannelOffset = 0xff;
873
874         if (PeerAssocRspSanity(pAd, Elem->Msg, Elem->MsgLen, Addr2, &CapabilityInfo, &Status, &Aid, SupRate, &SupRateLen, ExtRate, &ExtRateLen,
875                 &HtCapability,&AddHtInfo, &HtCapabilityLen,&AddHtInfoLen,&NewExtChannelOffset, &EdcaParm, &CkipFlag))
876         {
877                 // The frame is for me ?
878                 if(MAC_ADDR_EQUAL(Addr2, pAd->MlmeAux.Bssid))
879                 {
880                         DBGPRINT(RT_DEBUG_TRACE, ("PeerAssocRspAction():ASSOC - receive ASSOC_RSP to me (status=%d)\n", Status));
881                         DBGPRINT(RT_DEBUG_TRACE, ("PeerAssocRspAction():MacTable [%d].AMsduSize = %d. ClientStatusFlags = 0x%lx \n",Elem->Wcid, pAd->MacTab.Content[BSSID_WCID].AMsduSize, pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
882                         RTMPCancelTimer(&pAd->MlmeAux.AssocTimer, &TimerCancelled);
883                         if(Status == MLME_SUCCESS)
884                         {
885                                 // go to procedure listed on page 376
886                                 AssocPostProc(pAd, Addr2, CapabilityInfo, Aid, SupRate, SupRateLen, ExtRate, ExtRateLen,
887                                         &EdcaParm, &HtCapability, HtCapabilityLen, &AddHtInfo);
888
889                 {
890                     union iwreq_data    wrqu;
891                     wext_notify_event_assoc(pAd);
892
893                     memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
894                     memcpy(wrqu.ap_addr.sa_data, pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
895                     wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
896
897                 }
898
899                                 pAd->StaCfg.CkipFlag = CkipFlag;
900                                 if (CkipFlag & 0x18)
901                                 {
902                                         NdisZeroMemory(pAd->StaCfg.TxSEQ, 4);
903                                         NdisZeroMemory(pAd->StaCfg.RxSEQ, 4);
904                                         NdisZeroMemory(pAd->StaCfg.CKIPMIC, 4);
905                                         pAd->StaCfg.GIV[0] = RandomByte(pAd);
906                                         pAd->StaCfg.GIV[1] = RandomByte(pAd);
907                                         pAd->StaCfg.GIV[2] = RandomByte(pAd);
908                                         pAd->StaCfg.bCkipOn = TRUE;
909                                         DBGPRINT(RT_DEBUG_TRACE, ("<CCX> pAd->StaCfg.CkipFlag = 0x%02x\n", pAd->StaCfg.CkipFlag));
910                                 }
911                         }
912                         else
913                         {
914                         }
915                         pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
916                         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_ASSOC_CONF, 2, &Status);
917                 }
918         }
919         else
920         {
921                 DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - PeerAssocRspAction() sanity check fail\n"));
922         }
923 }
924
925 /*
926         ==========================================================================
927         Description:
928                 peer sends reassoc rsp
929         Parametrs:
930                 Elem - MLME message cntaining the received frame
931
932         IRQL = DISPATCH_LEVEL
933
934         ==========================================================================
935  */
936 VOID PeerReassocRspAction(
937         IN PRTMP_ADAPTER pAd,
938         IN MLME_QUEUE_ELEM *Elem)
939 {
940         USHORT      CapabilityInfo;
941         USHORT      Status;
942         USHORT      Aid;
943         UCHAR       SupRate[MAX_LEN_OF_SUPPORTED_RATES], SupRateLen;
944         UCHAR       ExtRate[MAX_LEN_OF_SUPPORTED_RATES], ExtRateLen;
945         UCHAR       Addr2[MAC_ADDR_LEN];
946         UCHAR       CkipFlag;
947         BOOLEAN     TimerCancelled;
948         EDCA_PARM   EdcaParm;
949         HT_CAPABILITY_IE                HtCapability;
950         ADD_HT_INFO_IE          AddHtInfo;      // AP might use this additional ht info IE
951         UCHAR                   HtCapabilityLen;
952         UCHAR                   AddHtInfoLen;
953         UCHAR                   NewExtChannelOffset = 0xff;
954
955         if(PeerAssocRspSanity(pAd, Elem->Msg, Elem->MsgLen, Addr2, &CapabilityInfo, &Status, &Aid, SupRate, &SupRateLen, ExtRate, &ExtRateLen,
956                                                                 &HtCapability,  &AddHtInfo, &HtCapabilityLen, &AddHtInfoLen,&NewExtChannelOffset, &EdcaParm, &CkipFlag))
957         {
958                 if(MAC_ADDR_EQUAL(Addr2, pAd->MlmeAux.Bssid)) // The frame is for me ?
959                 {
960                         DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - receive REASSOC_RSP to me (status=%d)\n", Status));
961                         RTMPCancelTimer(&pAd->MlmeAux.ReassocTimer, &TimerCancelled);
962
963                         if(Status == MLME_SUCCESS)
964                         {
965                                 // go to procedure listed on page 376
966                                 AssocPostProc(pAd, Addr2, CapabilityInfo, Aid, SupRate, SupRateLen, ExtRate, ExtRateLen,
967                                          &EdcaParm, &HtCapability, HtCapabilityLen, &AddHtInfo);
968
969                 {
970                     union iwreq_data    wrqu;
971                     wext_notify_event_assoc(pAd);
972
973                     memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
974                     memcpy(wrqu.ap_addr.sa_data, pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
975                     wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
976
977                 }
978
979                         }
980
981                         {
982                                 // CkipFlag is no use for reassociate
983                                 pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
984                                 MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_REASSOC_CONF, 2, &Status);
985                         }
986                 }
987         }
988         else
989         {
990                 DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - PeerReassocRspAction() sanity check fail\n"));
991         }
992
993 }
994
995 /*
996         ==========================================================================
997         Description:
998                 procedures on IEEE 802.11/1999 p.376
999         Parametrs:
1000
1001         IRQL = DISPATCH_LEVEL
1002
1003         ==========================================================================
1004  */
1005 VOID AssocPostProc(
1006         IN PRTMP_ADAPTER pAd,
1007         IN PUCHAR pAddr2,
1008         IN USHORT CapabilityInfo,
1009         IN USHORT Aid,
1010         IN UCHAR SupRate[],
1011         IN UCHAR SupRateLen,
1012         IN UCHAR ExtRate[],
1013         IN UCHAR ExtRateLen,
1014         IN PEDCA_PARM pEdcaParm,
1015         IN HT_CAPABILITY_IE             *pHtCapability,
1016         IN UCHAR HtCapabilityLen,
1017         IN ADD_HT_INFO_IE               *pAddHtInfo)    // AP might use this additional ht info IE
1018 {
1019         ULONG Idx;
1020
1021         pAd->MlmeAux.BssType = BSS_INFRA;
1022         COPY_MAC_ADDR(pAd->MlmeAux.Bssid, pAddr2);
1023         pAd->MlmeAux.Aid = Aid;
1024         pAd->MlmeAux.CapabilityInfo = CapabilityInfo & SUPPORTED_CAPABILITY_INFO;
1025
1026         // Some HT AP might lost WMM IE. We add WMM ourselves. beacuase HT requires QoS on.
1027         if ((HtCapabilityLen > 0) && (pEdcaParm->bValid == FALSE))
1028         {
1029                 pEdcaParm->bValid = TRUE;
1030                 pEdcaParm->Aifsn[0] = 3;
1031                 pEdcaParm->Aifsn[1] = 7;
1032                 pEdcaParm->Aifsn[2] = 2;
1033                 pEdcaParm->Aifsn[3] = 2;
1034
1035                 pEdcaParm->Cwmin[0] = 4;
1036                 pEdcaParm->Cwmin[1] = 4;
1037                 pEdcaParm->Cwmin[2] = 3;
1038                 pEdcaParm->Cwmin[3] = 2;
1039
1040                 pEdcaParm->Cwmax[0] = 10;
1041                 pEdcaParm->Cwmax[1] = 10;
1042                 pEdcaParm->Cwmax[2] = 4;
1043                 pEdcaParm->Cwmax[3] = 3;
1044
1045                 pEdcaParm->Txop[0]  = 0;
1046                 pEdcaParm->Txop[1]  = 0;
1047                 pEdcaParm->Txop[2]  = 96;
1048                 pEdcaParm->Txop[3]  = 48;
1049
1050         }
1051
1052         NdisMoveMemory(&pAd->MlmeAux.APEdcaParm, pEdcaParm, sizeof(EDCA_PARM));
1053
1054         // filter out un-supported rates
1055         pAd->MlmeAux.SupRateLen = SupRateLen;
1056         NdisMoveMemory(pAd->MlmeAux.SupRate, SupRate, SupRateLen);
1057         RTMPCheckRates(pAd, pAd->MlmeAux.SupRate, &pAd->MlmeAux.SupRateLen);
1058
1059         // filter out un-supported rates
1060         pAd->MlmeAux.ExtRateLen = ExtRateLen;
1061         NdisMoveMemory(pAd->MlmeAux.ExtRate, ExtRate, ExtRateLen);
1062         RTMPCheckRates(pAd, pAd->MlmeAux.ExtRate, &pAd->MlmeAux.ExtRateLen);
1063
1064         if (HtCapabilityLen > 0)
1065         {
1066                 RTMPCheckHt(pAd, BSSID_WCID, pHtCapability, pAddHtInfo);
1067         }
1068         DBGPRINT(RT_DEBUG_TRACE, ("AssocPostProc===>  AP.AMsduSize = %d. ClientStatusFlags = 0x%lx \n", pAd->MacTab.Content[BSSID_WCID].AMsduSize, pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
1069
1070         DBGPRINT(RT_DEBUG_TRACE, ("AssocPostProc===>    (Mmps=%d, AmsduSize=%d, )\n",
1071                 pAd->MacTab.Content[BSSID_WCID].MmpsMode, pAd->MacTab.Content[BSSID_WCID].AMsduSize));
1072
1073         // Set New WPA information
1074         Idx = BssTableSearch(&pAd->ScanTab, pAddr2, pAd->MlmeAux.Channel);
1075         if (Idx == BSS_NOT_FOUND)
1076         {
1077                 DBGPRINT_ERR(("ASSOC - Can't find BSS after receiving Assoc response\n"));
1078         }
1079         else
1080         {
1081                 // Init variable
1082                 pAd->MacTab.Content[BSSID_WCID].RSNIE_Len = 0;
1083                 NdisZeroMemory(pAd->MacTab.Content[BSSID_WCID].RSN_IE, MAX_LEN_OF_RSNIE);
1084
1085                 // Store appropriate RSN_IE for WPA SM negotiation later
1086                 if ((pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA) && (pAd->ScanTab.BssEntry[Idx].VarIELen != 0))
1087                 {
1088                         PUCHAR              pVIE;
1089                         USHORT              len;
1090                         PEID_STRUCT         pEid;
1091
1092                         pVIE = pAd->ScanTab.BssEntry[Idx].VarIEs;
1093                         len      = pAd->ScanTab.BssEntry[Idx].VarIELen;
1094
1095                         while (len > 0)
1096                         {
1097                                 pEid = (PEID_STRUCT) pVIE;
1098                                 // For WPA/WPAPSK
1099                                 if ((pEid->Eid == IE_WPA) && (NdisEqualMemory(pEid->Octet, WPA_OUI, 4))
1100                                         && (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA || pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK))
1101                                 {
1102                                         NdisMoveMemory(pAd->MacTab.Content[BSSID_WCID].RSN_IE, pVIE, (pEid->Len + 2));
1103                                         pAd->MacTab.Content[BSSID_WCID].RSNIE_Len = (pEid->Len + 2);
1104                                         DBGPRINT(RT_DEBUG_TRACE, ("AssocPostProc===> Store RSN_IE for WPA SM negotiation \n"));
1105                                 }
1106                                 // For WPA2/WPA2PSK
1107                                 else if ((pEid->Eid == IE_RSN) && (NdisEqualMemory(pEid->Octet + 2, RSN_OUI, 3))
1108                                         && (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2 || pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK))
1109                                 {
1110                                         NdisMoveMemory(pAd->MacTab.Content[BSSID_WCID].RSN_IE, pVIE, (pEid->Len + 2));
1111                                         pAd->MacTab.Content[BSSID_WCID].RSNIE_Len = (pEid->Len + 2);
1112                                         DBGPRINT(RT_DEBUG_TRACE, ("AssocPostProc===> Store RSN_IE for WPA2 SM negotiation \n"));
1113                                 }
1114
1115                                 pVIE += (pEid->Len + 2);
1116                                 len  -= (pEid->Len + 2);
1117                         }
1118                 }
1119
1120                 if (pAd->MacTab.Content[BSSID_WCID].RSNIE_Len == 0)
1121                 {
1122                         DBGPRINT(RT_DEBUG_TRACE, ("AssocPostProc===> no RSN_IE \n"));
1123                 }
1124                 else
1125                 {
1126                         hex_dump("RSN_IE", pAd->MacTab.Content[BSSID_WCID].RSN_IE, pAd->MacTab.Content[BSSID_WCID].RSNIE_Len);
1127                 }
1128         }
1129 }
1130
1131 /*
1132         ==========================================================================
1133         Description:
1134                 left part of IEEE 802.11/1999 p.374
1135         Parameters:
1136                 Elem - MLME message containing the received frame
1137
1138         IRQL = DISPATCH_LEVEL
1139
1140         ==========================================================================
1141  */
1142 VOID PeerDisassocAction(
1143         IN PRTMP_ADAPTER pAd,
1144         IN MLME_QUEUE_ELEM *Elem)
1145 {
1146         UCHAR         Addr2[MAC_ADDR_LEN];
1147         USHORT        Reason;
1148
1149         DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - PeerDisassocAction()\n"));
1150         if(PeerDisassocSanity(pAd, Elem->Msg, Elem->MsgLen, Addr2, &Reason))
1151         {
1152                 DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - PeerDisassocAction() Reason = %d\n", Reason));
1153                 if (INFRA_ON(pAd) && MAC_ADDR_EQUAL(pAd->CommonCfg.Bssid, Addr2))
1154                 {
1155
1156                         if (pAd->CommonCfg.bWirelessEvent)
1157                         {
1158                                 RTMPSendWirelessEvent(pAd, IW_DISASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
1159                         }
1160
1161                         //
1162                         // Get Current System time and Turn on AdjacentAPReport
1163                         //
1164                         NdisGetSystemUpTime(&pAd->StaCfg.CCXAdjacentAPLinkDownTime);
1165                         pAd->StaCfg.CCXAdjacentAPReportFlag = TRUE;
1166                         LinkDown(pAd, TRUE);
1167                         pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
1168
1169             {
1170                 union iwreq_data    wrqu;
1171                 memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
1172                 wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
1173             }
1174                 }
1175         }
1176         else
1177         {
1178                 DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - PeerDisassocAction() sanity check fail\n"));
1179         }
1180
1181 }
1182
1183 /*
1184         ==========================================================================
1185         Description:
1186                 what the state machine will do after assoc timeout
1187         Parameters:
1188                 Elme -
1189
1190         IRQL = DISPATCH_LEVEL
1191
1192         ==========================================================================
1193  */
1194 VOID AssocTimeoutAction(
1195         IN PRTMP_ADAPTER pAd,
1196         IN MLME_QUEUE_ELEM *Elem)
1197 {
1198         USHORT  Status;
1199         DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - AssocTimeoutAction\n"));
1200         pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
1201         Status = MLME_REJ_TIMEOUT;
1202         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_ASSOC_CONF, 2, &Status);
1203 }
1204
1205 /*
1206         ==========================================================================
1207         Description:
1208                 what the state machine will do after reassoc timeout
1209
1210         IRQL = DISPATCH_LEVEL
1211
1212         ==========================================================================
1213  */
1214 VOID ReassocTimeoutAction(
1215         IN PRTMP_ADAPTER pAd,
1216         IN MLME_QUEUE_ELEM *Elem)
1217 {
1218         USHORT  Status;
1219         DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - ReassocTimeoutAction\n"));
1220         pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
1221         Status = MLME_REJ_TIMEOUT;
1222         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_REASSOC_CONF, 2, &Status);
1223 }
1224
1225 /*
1226         ==========================================================================
1227         Description:
1228                 what the state machine will do after disassoc timeout
1229
1230         IRQL = DISPATCH_LEVEL
1231
1232         ==========================================================================
1233  */
1234 VOID DisassocTimeoutAction(
1235         IN PRTMP_ADAPTER pAd,
1236         IN MLME_QUEUE_ELEM *Elem)
1237 {
1238         USHORT  Status;
1239         DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - DisassocTimeoutAction\n"));
1240         pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
1241         Status = MLME_SUCCESS;
1242         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_DISASSOC_CONF, 2, &Status);
1243 }
1244
1245 VOID InvalidStateWhenAssoc(
1246         IN PRTMP_ADAPTER pAd,
1247         IN MLME_QUEUE_ELEM *Elem)
1248 {
1249         USHORT  Status;
1250         DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - InvalidStateWhenAssoc(state=%ld), reset ASSOC state machine\n",
1251                 pAd->Mlme.AssocMachine.CurrState));
1252         pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
1253         Status = MLME_STATE_MACHINE_REJECT;
1254         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_ASSOC_CONF, 2, &Status);
1255 }
1256
1257 VOID InvalidStateWhenReassoc(
1258         IN PRTMP_ADAPTER pAd,
1259         IN MLME_QUEUE_ELEM *Elem)
1260 {
1261         USHORT Status;
1262         DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - InvalidStateWhenReassoc(state=%ld), reset ASSOC state machine\n",
1263                 pAd->Mlme.AssocMachine.CurrState));
1264         pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
1265         Status = MLME_STATE_MACHINE_REJECT;
1266         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_REASSOC_CONF, 2, &Status);
1267 }
1268
1269 VOID InvalidStateWhenDisassociate(
1270         IN PRTMP_ADAPTER pAd,
1271         IN MLME_QUEUE_ELEM *Elem)
1272 {
1273         USHORT Status;
1274         DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - InvalidStateWhenDisassoc(state=%ld), reset ASSOC state machine\n",
1275                 pAd->Mlme.AssocMachine.CurrState));
1276         pAd->Mlme.AssocMachine.CurrState = ASSOC_IDLE;
1277         Status = MLME_STATE_MACHINE_REJECT;
1278         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MT2_DISASSOC_CONF, 2, &Status);
1279 }
1280
1281 /*
1282         ==========================================================================
1283         Description:
1284                 right part of IEEE 802.11/1999 page 374
1285         Note:
1286                 This event should never cause ASSOC state machine perform state
1287                 transition, and has no relationship with CNTL machine. So we separate
1288                 this routine as a service outside of ASSOC state transition table.
1289
1290         IRQL = DISPATCH_LEVEL
1291
1292         ==========================================================================
1293  */
1294 VOID Cls3errAction(
1295         IN PRTMP_ADAPTER pAd,
1296         IN PUCHAR        pAddr)
1297 {
1298         HEADER_802_11         DisassocHdr;
1299         PHEADER_802_11        pDisassocHdr;
1300         PUCHAR                pOutBuffer = NULL;
1301         ULONG                 FrameLen = 0;
1302         NDIS_STATUS           NStatus;
1303         USHORT                Reason = REASON_CLS3ERR;
1304
1305         NStatus = MlmeAllocateMemory(pAd, &pOutBuffer);  //Get an unused nonpaged memory
1306         if (NStatus != NDIS_STATUS_SUCCESS)
1307                 return;
1308
1309         DBGPRINT(RT_DEBUG_TRACE, ("ASSOC - Class 3 Error, Send DISASSOC frame\n"));
1310         MgtMacHeaderInit(pAd, &DisassocHdr, SUBTYPE_DISASSOC, 0, pAddr, pAd->CommonCfg.Bssid);  // patch peap ttls switching issue
1311         MakeOutgoingFrame(pOutBuffer,           &FrameLen,
1312                                           sizeof(HEADER_802_11),&DisassocHdr,
1313                                           2,                    &Reason,
1314                                           END_OF_ARGS);
1315         MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
1316
1317         // To patch Instance and Buffalo(N) AP
1318         // Driver has to send deauth to Instance AP, but Buffalo(N) needs to send disassoc to reset Authenticator's state machine
1319         // Therefore, we send both of them.
1320         pDisassocHdr = (PHEADER_802_11)pOutBuffer;
1321         pDisassocHdr->FC.SubType = SUBTYPE_DEAUTH;
1322         MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
1323
1324         MlmeFreeMemory(pAd, pOutBuffer);
1325
1326         pAd->StaCfg.DisassocReason = REASON_CLS3ERR;
1327         COPY_MAC_ADDR(pAd->StaCfg.DisassocSta, pAddr);
1328 }
1329
1330  /*
1331          ==========================================================================
1332          Description:
1333                  Switch between WEP and CKIP upon new association up.
1334          Parameters:
1335
1336          IRQL = DISPATCH_LEVEL
1337
1338          ==========================================================================
1339   */
1340 VOID SwitchBetweenWepAndCkip(
1341         IN PRTMP_ADAPTER pAd)
1342 {
1343         int            i;
1344         SHAREDKEY_MODE_STRUC  csr1;
1345
1346         // if KP is required. change the CipherAlg in hardware shard key table from WEP
1347         // to CKIP. else remain as WEP
1348         if (pAd->StaCfg.bCkipOn && (pAd->StaCfg.CkipFlag & 0x10))
1349         {
1350                 // modify hardware key table so that MAC use correct algorithm to decrypt RX
1351                 RTMP_IO_READ32(pAd, SHARED_KEY_MODE_BASE, &csr1.word);
1352                 if (csr1.field.Bss0Key0CipherAlg == CIPHER_WEP64)
1353                         csr1.field.Bss0Key0CipherAlg = CIPHER_CKIP64;
1354                 else if (csr1.field.Bss0Key0CipherAlg == CIPHER_WEP128)
1355                         csr1.field.Bss0Key0CipherAlg = CIPHER_CKIP128;
1356
1357                 if (csr1.field.Bss0Key1CipherAlg == CIPHER_WEP64)
1358                         csr1.field.Bss0Key1CipherAlg = CIPHER_CKIP64;
1359                 else if (csr1.field.Bss0Key1CipherAlg == CIPHER_WEP128)
1360                         csr1.field.Bss0Key1CipherAlg = CIPHER_CKIP128;
1361
1362                 if (csr1.field.Bss0Key2CipherAlg == CIPHER_WEP64)
1363                         csr1.field.Bss0Key2CipherAlg = CIPHER_CKIP64;
1364                 else if (csr1.field.Bss0Key2CipherAlg == CIPHER_WEP128)
1365                         csr1.field.Bss0Key2CipherAlg = CIPHER_CKIP128;
1366
1367                 if (csr1.field.Bss0Key3CipherAlg == CIPHER_WEP64)
1368                         csr1.field.Bss0Key3CipherAlg = CIPHER_CKIP64;
1369                 else if (csr1.field.Bss0Key3CipherAlg == CIPHER_WEP128)
1370                         csr1.field.Bss0Key3CipherAlg = CIPHER_CKIP128;
1371                 RTMP_IO_WRITE32(pAd, SHARED_KEY_MODE_BASE, csr1.word);
1372                 DBGPRINT(RT_DEBUG_TRACE, ("SwitchBetweenWepAndCkip: modify BSS0 cipher to %s\n", CipherName[csr1.field.Bss0Key0CipherAlg]));
1373
1374                 // modify software key table so that driver can specify correct algorithm in TXD upon TX
1375                 for (i=0; i<SHARE_KEY_NUM; i++)
1376                 {
1377                         if (pAd->SharedKey[BSS0][i].CipherAlg == CIPHER_WEP64)
1378                                 pAd->SharedKey[BSS0][i].CipherAlg = CIPHER_CKIP64;
1379                         else if (pAd->SharedKey[BSS0][i].CipherAlg == CIPHER_WEP128)
1380                                 pAd->SharedKey[BSS0][i].CipherAlg = CIPHER_CKIP128;
1381                 }
1382         }
1383
1384         // else if KP NOT inused. change the CipherAlg in hardware shard key table from CKIP
1385         // to WEP.
1386         else
1387         {
1388                 // modify hardware key table so that MAC use correct algorithm to decrypt RX
1389                 RTMP_IO_READ32(pAd, SHARED_KEY_MODE_BASE, &csr1.word);
1390                 if (csr1.field.Bss0Key0CipherAlg == CIPHER_CKIP64)
1391                         csr1.field.Bss0Key0CipherAlg = CIPHER_WEP64;
1392                 else if (csr1.field.Bss0Key0CipherAlg == CIPHER_CKIP128)
1393                         csr1.field.Bss0Key0CipherAlg = CIPHER_WEP128;
1394
1395                 if (csr1.field.Bss0Key1CipherAlg == CIPHER_CKIP64)
1396                         csr1.field.Bss0Key1CipherAlg = CIPHER_WEP64;
1397                 else if (csr1.field.Bss0Key1CipherAlg == CIPHER_CKIP128)
1398                         csr1.field.Bss0Key1CipherAlg = CIPHER_WEP128;
1399
1400                 if (csr1.field.Bss0Key2CipherAlg == CIPHER_CKIP64)
1401                         csr1.field.Bss0Key2CipherAlg = CIPHER_WEP64;
1402                 else if (csr1.field.Bss0Key2CipherAlg == CIPHER_CKIP128)
1403                         csr1.field.Bss0Key2CipherAlg = CIPHER_WEP128;
1404
1405                 if (csr1.field.Bss0Key3CipherAlg == CIPHER_CKIP64)
1406                         csr1.field.Bss0Key3CipherAlg = CIPHER_WEP64;
1407                 else if (csr1.field.Bss0Key3CipherAlg == CIPHER_CKIP128)
1408                         csr1.field.Bss0Key3CipherAlg = CIPHER_WEP128;
1409
1410                 // modify software key table so that driver can specify correct algorithm in TXD upon TX
1411                 for (i=0; i<SHARE_KEY_NUM; i++)
1412                 {
1413                         if (pAd->SharedKey[BSS0][i].CipherAlg == CIPHER_CKIP64)
1414                                 pAd->SharedKey[BSS0][i].CipherAlg = CIPHER_WEP64;
1415                         else if (pAd->SharedKey[BSS0][i].CipherAlg == CIPHER_CKIP128)
1416                                 pAd->SharedKey[BSS0][i].CipherAlg = CIPHER_WEP128;
1417                 }
1418
1419                 //
1420                 // On WPA-NONE, must update CipherAlg.
1421                 // Because the OID_802_11_WEP_STATUS was been set after OID_802_11_ADD_KEY
1422                 // and CipherAlg will be CIPHER_NONE by Windows ZeroConfig.
1423                 // So we need to update CipherAlg after connect.
1424                 //
1425                 if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone)
1426                 {
1427                         for (i = 0; i < SHARE_KEY_NUM; i++)
1428                         {
1429                                 if (pAd->SharedKey[BSS0][i].KeyLen != 0)
1430                                 {
1431                                         if (pAd->StaCfg.WepStatus == Ndis802_11Encryption2Enabled)
1432                                         {
1433                                                 pAd->SharedKey[BSS0][i].CipherAlg = CIPHER_TKIP;
1434                                         }
1435                                         else if (pAd->StaCfg.WepStatus == Ndis802_11Encryption3Enabled)
1436                                         {
1437                                                 pAd->SharedKey[BSS0][i].CipherAlg = CIPHER_AES;
1438                                         }
1439                                 }
1440                                 else
1441                                 {
1442                                         pAd->SharedKey[BSS0][i].CipherAlg = CIPHER_NONE;
1443                                 }
1444                         }
1445
1446                         csr1.field.Bss0Key0CipherAlg = pAd->SharedKey[BSS0][0].CipherAlg;
1447                         csr1.field.Bss0Key1CipherAlg = pAd->SharedKey[BSS0][1].CipherAlg;
1448                         csr1.field.Bss0Key2CipherAlg = pAd->SharedKey[BSS0][2].CipherAlg;
1449                         csr1.field.Bss0Key3CipherAlg = pAd->SharedKey[BSS0][3].CipherAlg;
1450                 }
1451                 RTMP_IO_WRITE32(pAd, SHARED_KEY_MODE_BASE, csr1.word);
1452                 DBGPRINT(RT_DEBUG_TRACE, ("SwitchBetweenWepAndCkip: modify BSS0 cipher to %s\n", CipherName[csr1.field.Bss0Key0CipherAlg]));
1453         }
1454 }
1455
1456 int wext_notify_event_assoc(
1457         IN  RTMP_ADAPTER *pAd)
1458 {
1459     union iwreq_data    wrqu;
1460     char custom[IW_CUSTOM_MAX] = {0};
1461
1462 #if WIRELESS_EXT > 17
1463     if (pAd->StaCfg.ReqVarIELen <= IW_CUSTOM_MAX)
1464     {
1465         wrqu.data.length = pAd->StaCfg.ReqVarIELen;
1466         memcpy(custom, pAd->StaCfg.ReqVarIEs, pAd->StaCfg.ReqVarIELen);
1467         wireless_send_event(pAd->net_dev, IWEVASSOCREQIE, &wrqu, custom);
1468     }
1469     else
1470         DBGPRINT(RT_DEBUG_TRACE, ("pAd->StaCfg.ReqVarIELen > MAX_CUSTOM_LEN\n"));
1471 #else
1472     if (((pAd->StaCfg.ReqVarIELen*2) + 17) <= IW_CUSTOM_MAX)
1473     {
1474         UCHAR   idx;
1475         wrqu.data.length = (pAd->StaCfg.ReqVarIELen*2) + 17;
1476         sprintf(custom, "ASSOCINFO(ReqIEs=");
1477         for (idx=0; idx<pAd->StaCfg.ReqVarIELen; idx++)
1478                 sprintf(custom + strlen(custom), "%02x", pAd->StaCfg.ReqVarIEs[idx]);
1479         wireless_send_event(pAd->net_dev, IWEVCUSTOM, &wrqu, custom);
1480     }
1481     else
1482         DBGPRINT(RT_DEBUG_TRACE, ("(pAd->StaCfg.ReqVarIELen*2) + 17 > MAX_CUSTOM_LEN\n"));
1483 #endif
1484
1485         return 0;
1486
1487 }