Staging: rt2870: remove WPA_SUPPLICANT_SUPPORT ifdefs
[pandora-kernel.git] / drivers / staging / rt2870 / sta / connect.c
1 /*
2  *************************************************************************
3  * Ralink Tech Inc.
4  * 5F., No.36, Taiyuan St., Jhubei City,
5  * Hsinchu County 302,
6  * Taiwan, R.O.C.
7  *
8  * (c) Copyright 2002-2007, Ralink Technology, Inc.
9  *
10  * This program is free software; you can redistribute it and/or modify  *
11  * it under the terms of the GNU General Public License as published by  *
12  * the Free Software Foundation; either version 2 of the License, or     *
13  * (at your option) any later version.                                   *
14  *                                                                       *
15  * This program is distributed in the hope that it will be useful,       *
16  * but WITHOUT ANY WARRANTY; without even the implied warranty of        *
17  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         *
18  * GNU General Public License for more details.                          *
19  *                                                                       *
20  * You should have received a copy of the GNU General Public License     *
21  * along with this program; if not, write to the                         *
22  * Free Software Foundation, Inc.,                                       *
23  * 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.             *
24  *                                                                       *
25  *************************************************************************
26
27         Module Name:
28         connect.c
29
30         Abstract:
31
32         Revision History:
33         Who                     When                    What
34         --------        ----------              ----------------------------------------------
35         John                    2004-08-08                      Major modification from RT2560
36 */
37 #include "../rt_config.h"
38
39 UCHAR   CipherSuiteWpaNoneTkip[] = {
40                 0x00, 0x50, 0xf2, 0x01, // oui
41                 0x01, 0x00,                             // Version
42                 0x00, 0x50, 0xf2, 0x02, // Multicast
43                 0x01, 0x00,                             // Number of unicast
44                 0x00, 0x50, 0xf2, 0x02, // unicast
45                 0x01, 0x00,                             // number of authentication method
46                 0x00, 0x50, 0xf2, 0x00  // authentication
47                 };
48 UCHAR   CipherSuiteWpaNoneTkipLen = (sizeof(CipherSuiteWpaNoneTkip) / sizeof(UCHAR));
49
50 UCHAR   CipherSuiteWpaNoneAes[] = {
51                 0x00, 0x50, 0xf2, 0x01, // oui
52                 0x01, 0x00,                             // Version
53                 0x00, 0x50, 0xf2, 0x04, // Multicast
54                 0x01, 0x00,                             // Number of unicast
55                 0x00, 0x50, 0xf2, 0x04, // unicast
56                 0x01, 0x00,                             // number of authentication method
57                 0x00, 0x50, 0xf2, 0x00  // authentication
58                 };
59 UCHAR   CipherSuiteWpaNoneAesLen = (sizeof(CipherSuiteWpaNoneAes) / sizeof(UCHAR));
60
61 // The following MACRO is called after 1. starting an new IBSS, 2. succesfully JOIN an IBSS,
62 // or 3. succesfully ASSOCIATE to a BSS, 4. successfully RE_ASSOCIATE to a BSS
63 // All settings successfuly negotiated furing MLME state machines become final settings
64 // and are copied to pAd->StaActive
65 #define COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(_pAd)                                 \
66 {                                                                                       \
67         (_pAd)->CommonCfg.SsidLen = (_pAd)->MlmeAux.SsidLen;                                \
68         NdisMoveMemory((_pAd)->CommonCfg.Ssid, (_pAd)->MlmeAux.Ssid, (_pAd)->MlmeAux.SsidLen); \
69         COPY_MAC_ADDR((_pAd)->CommonCfg.Bssid, (_pAd)->MlmeAux.Bssid);                      \
70         (_pAd)->CommonCfg.Channel = (_pAd)->MlmeAux.Channel;                                \
71         (_pAd)->CommonCfg.CentralChannel = (_pAd)->MlmeAux.CentralChannel;                  \
72         (_pAd)->StaActive.Aid = (_pAd)->MlmeAux.Aid;                                        \
73         (_pAd)->StaActive.AtimWin = (_pAd)->MlmeAux.AtimWin;                                \
74         (_pAd)->StaActive.CapabilityInfo = (_pAd)->MlmeAux.CapabilityInfo;                  \
75         (_pAd)->CommonCfg.BeaconPeriod = (_pAd)->MlmeAux.BeaconPeriod;                      \
76         (_pAd)->StaActive.CfpMaxDuration = (_pAd)->MlmeAux.CfpMaxDuration;                  \
77         (_pAd)->StaActive.CfpPeriod = (_pAd)->MlmeAux.CfpPeriod;                            \
78         (_pAd)->StaActive.SupRateLen = (_pAd)->MlmeAux.SupRateLen;                          \
79         NdisMoveMemory((_pAd)->StaActive.SupRate, (_pAd)->MlmeAux.SupRate, (_pAd)->MlmeAux.SupRateLen);\
80         (_pAd)->StaActive.ExtRateLen = (_pAd)->MlmeAux.ExtRateLen;                          \
81         NdisMoveMemory((_pAd)->StaActive.ExtRate, (_pAd)->MlmeAux.ExtRate, (_pAd)->MlmeAux.ExtRateLen);\
82         NdisMoveMemory(&(_pAd)->CommonCfg.APEdcaParm, &(_pAd)->MlmeAux.APEdcaParm, sizeof(EDCA_PARM));\
83         NdisMoveMemory(&(_pAd)->CommonCfg.APQosCapability, &(_pAd)->MlmeAux.APQosCapability, sizeof(QOS_CAPABILITY_PARM));\
84         NdisMoveMemory(&(_pAd)->CommonCfg.APQbssLoad, &(_pAd)->MlmeAux.APQbssLoad, sizeof(QBSS_LOAD_PARM));\
85         COPY_MAC_ADDR((_pAd)->MacTab.Content[BSSID_WCID].Addr, (_pAd)->MlmeAux.Bssid);      \
86         (_pAd)->MacTab.Content[BSSID_WCID].Aid = (_pAd)->MlmeAux.Aid;                       \
87         (_pAd)->MacTab.Content[BSSID_WCID].PairwiseKey.CipherAlg = (_pAd)->StaCfg.PairCipher;\
88         COPY_MAC_ADDR((_pAd)->MacTab.Content[BSSID_WCID].PairwiseKey.BssId, (_pAd)->MlmeAux.Bssid);\
89         (_pAd)->MacTab.Content[BSSID_WCID].RateLen = (_pAd)->StaActive.SupRateLen + (_pAd)->StaActive.ExtRateLen;\
90 }
91
92 /*
93         ==========================================================================
94         Description:
95
96         IRQL = PASSIVE_LEVEL
97
98         ==========================================================================
99 */
100 VOID MlmeCntlInit(
101         IN PRTMP_ADAPTER pAd,
102         IN STATE_MACHINE *S,
103         OUT STATE_MACHINE_FUNC Trans[])
104 {
105         // Control state machine differs from other state machines, the interface
106         // follows the standard interface
107         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
108 }
109
110 /*
111         ==========================================================================
112         Description:
113
114         IRQL = DISPATCH_LEVEL
115
116         ==========================================================================
117 */
118 VOID MlmeCntlMachinePerformAction(
119         IN PRTMP_ADAPTER pAd,
120         IN STATE_MACHINE *S,
121         IN MLME_QUEUE_ELEM *Elem)
122 {
123         switch(pAd->Mlme.CntlMachine.CurrState)
124         {
125                 case CNTL_IDLE:
126                                 CntlIdleProc(pAd, Elem);
127                         break;
128                 case CNTL_WAIT_DISASSOC:
129                         CntlWaitDisassocProc(pAd, Elem);
130                         break;
131                 case CNTL_WAIT_JOIN:
132                         CntlWaitJoinProc(pAd, Elem);
133                         break;
134
135                 // CNTL_WAIT_REASSOC is the only state in CNTL machine that does
136                 // not triggered directly or indirectly by "RTMPSetInformation(OID_xxx)".
137                 // Therefore not protected by NDIS's "only one outstanding OID request"
138                 // rule. Which means NDIS may SET OID in the middle of ROAMing attempts.
139                 // Current approach is to block new SET request at RTMPSetInformation()
140                 // when CntlMachine.CurrState is not CNTL_IDLE
141                 case CNTL_WAIT_REASSOC:
142                         CntlWaitReassocProc(pAd, Elem);
143                         break;
144
145                 case CNTL_WAIT_START:
146                         CntlWaitStartProc(pAd, Elem);
147                         break;
148                 case CNTL_WAIT_AUTH:
149                         CntlWaitAuthProc(pAd, Elem);
150                         break;
151                 case CNTL_WAIT_AUTH2:
152                         CntlWaitAuthProc2(pAd, Elem);
153                         break;
154                 case CNTL_WAIT_ASSOC:
155                         CntlWaitAssocProc(pAd, Elem);
156                         break;
157
158                 case CNTL_WAIT_OID_LIST_SCAN:
159                         if(Elem->MsgType == MT2_SCAN_CONF)
160                         {
161                                 // Resume TxRing after SCANING complete. We hope the out-of-service time
162                                 // won't be too long to let upper layer time-out the waiting frames
163                                 RTMPResumeMsduTransmission(pAd);
164                                 if (pAd->StaCfg.CCXReqType != MSRN_TYPE_UNUSED)
165                                 {
166                                         // Cisco scan request is finished, prepare beacon report
167                                         MlmeEnqueue(pAd, AIRONET_STATE_MACHINE, MT2_AIRONET_SCAN_DONE, 0, NULL);
168                                 }
169                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
170
171                 //
172                                 // Set LED status to previous status.
173                                 //
174                                 if (pAd->bLedOnScanning)
175                                 {
176                                         pAd->bLedOnScanning = FALSE;
177                                         RTMPSetLED(pAd, pAd->LedStatus);
178                                 }
179                         }
180                         break;
181
182                 case CNTL_WAIT_OID_DISASSOC:
183                         if (Elem->MsgType == MT2_DISASSOC_CONF)
184                         {
185                                 LinkDown(pAd, FALSE);
186                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
187                         }
188                         break;
189 #ifdef RT2870
190                 //
191                 // This state is for that we want to connect to an AP but
192                 // it didn't find on BSS List table. So we need to scan the air first,
193                 // after that we can try to connect to the desired AP if available.
194                 //
195                 case CNTL_WAIT_SCAN_FOR_CONNECT:
196                         if(Elem->MsgType == MT2_SCAN_CONF)
197                         {
198                                 // Resume TxRing after SCANING complete. We hope the out-of-service time
199                                 // won't be too long to let upper layer time-out the waiting frames
200                                 RTMPResumeMsduTransmission(pAd);
201 #ifdef CCX_SUPPORT
202                                 if (pAd->StaCfg.CCXReqType != MSRN_TYPE_UNUSED)
203                                 {
204                                         // Cisco scan request is finished, prepare beacon report
205                                         MlmeEnqueue(pAd, AIRONET_STATE_MACHINE, MT2_AIRONET_SCAN_DONE, 0, NULL);
206                                 }
207 #endif // CCX_SUPPORT //
208                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
209
210                                 //
211                                 // Check if we can connect to.
212                                 //
213                                 BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab, pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.AutoReconnectSsidLen);
214                                 if (pAd->MlmeAux.SsidBssTab.BssNr > 0)
215                                 {
216                                         MlmeAutoReconnectLastSSID(pAd);
217                                 }
218                         }
219                         break;
220 #endif // RT2870 //
221                 default:
222                         DBGPRINT_ERR(("!ERROR! CNTL - Illegal message type(=%ld)", Elem->MsgType));
223                         break;
224         }
225 }
226
227
228 /*
229         ==========================================================================
230         Description:
231
232         IRQL = DISPATCH_LEVEL
233
234         ==========================================================================
235 */
236 VOID CntlIdleProc(
237         IN PRTMP_ADAPTER pAd,
238         IN MLME_QUEUE_ELEM *Elem)
239 {
240         MLME_DISASSOC_REQ_STRUCT   DisassocReq;
241
242         if (RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_RADIO_OFF))
243                 return;
244
245         switch(Elem->MsgType)
246         {
247                 case OID_802_11_SSID:
248                         CntlOidSsidProc(pAd, Elem);
249                         break;
250
251                 case OID_802_11_BSSID:
252                         CntlOidRTBssidProc(pAd,Elem);
253                         break;
254
255                 case OID_802_11_BSSID_LIST_SCAN:
256                         CntlOidScanProc(pAd,Elem);
257                         break;
258
259                 case OID_802_11_DISASSOCIATE:
260                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
261                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ, sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
262                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_DISASSOC;
263
264             if (pAd->StaCfg.WpaSupplicantUP != WPA_SUPPLICANT_ENABLE_WITH_WEB_UI)
265             {
266                         // Set the AutoReconnectSsid to prevent it reconnect to old SSID
267                         // Since calling this indicate user don't want to connect to that SSID anymore.
268                         pAd->MlmeAux.AutoReconnectSsidLen= 32;
269                         NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.AutoReconnectSsidLen);
270             }
271                         break;
272
273                 case MT2_MLME_ROAMING_REQ:
274                         CntlMlmeRoamingProc(pAd, Elem);
275                         break;
276
277         case OID_802_11_MIC_FAILURE_REPORT_FRAME:
278             WpaMicFailureReportFrame(pAd, Elem);
279             break;
280
281                 default:
282                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Illegal message in CntlIdleProc(MsgType=%ld)\n",Elem->MsgType));
283                         break;
284         }
285 }
286
287 VOID CntlOidScanProc(
288         IN PRTMP_ADAPTER pAd,
289         IN MLME_QUEUE_ELEM *Elem)
290 {
291         MLME_SCAN_REQ_STRUCT       ScanReq;
292         ULONG                      BssIdx = BSS_NOT_FOUND;
293         BSS_ENTRY                  CurrBss;
294
295         // record current BSS if network is connected.
296         // 2003-2-13 do not include current IBSS if this is the only STA in this IBSS.
297         if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED))
298         {
299                 BssIdx = BssSsidTableSearch(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Ssid, pAd->CommonCfg.SsidLen, pAd->CommonCfg.Channel);
300                 if (BssIdx != BSS_NOT_FOUND)
301                 {
302                         NdisMoveMemory(&CurrBss, &pAd->ScanTab.BssEntry[BssIdx], sizeof(BSS_ENTRY));
303                 }
304         }
305
306         // clean up previous SCAN result, add current BSS back to table if any
307         BssTableInit(&pAd->ScanTab);
308         if (BssIdx != BSS_NOT_FOUND)
309         {
310                 // DDK Note: If the NIC is associated with a particular BSSID and SSID
311                 //    that are not contained in the list of BSSIDs generated by this scan, the
312                 //    BSSID description of the currently associated BSSID and SSID should be
313                 //    appended to the list of BSSIDs in the NIC's database.
314                 // To ensure this, we append this BSS as the first entry in SCAN result
315                 NdisMoveMemory(&pAd->ScanTab.BssEntry[0], &CurrBss, sizeof(BSS_ENTRY));
316                 pAd->ScanTab.BssNr = 1;
317         }
318
319         ScanParmFill(pAd, &ScanReq, "", 0, BSS_ANY, SCAN_ACTIVE);
320         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ,
321                 sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);
322         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
323 }
324
325 /*
326         ==========================================================================
327         Description:
328                 Before calling this routine, user desired SSID should already been
329                 recorded in CommonCfg.Ssid[]
330         IRQL = DISPATCH_LEVEL
331
332         ==========================================================================
333 */
334 VOID CntlOidSsidProc(
335         IN PRTMP_ADAPTER pAd,
336         IN MLME_QUEUE_ELEM * Elem)
337 {
338         PNDIS_802_11_SSID          pOidSsid = (NDIS_802_11_SSID *)Elem->Msg;
339         MLME_DISASSOC_REQ_STRUCT   DisassocReq;
340         ULONG                                      Now;
341
342         // Step 1. record the desired user settings to MlmeAux
343         NdisZeroMemory(pAd->MlmeAux.Ssid, MAX_LEN_OF_SSID);
344         NdisMoveMemory(pAd->MlmeAux.Ssid, pOidSsid->Ssid, pOidSsid->SsidLength);
345         pAd->MlmeAux.SsidLen = (UCHAR)pOidSsid->SsidLength;
346         NdisZeroMemory(pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
347         pAd->MlmeAux.BssType = pAd->StaCfg.BssType;
348
349
350         //
351         // Update Reconnect Ssid, that user desired to connect.
352         //
353         NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, MAX_LEN_OF_SSID);
354         NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
355         pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;
356
357         // step 2. find all matching BSS in the lastest SCAN result (inBssTab)
358         //    & log them into MlmeAux.SsidBssTab for later-on iteration. Sort by RSSI order
359         BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
360
361         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - %d BSS of %d BSS match the desire (%d)SSID - %s\n",
362                         pAd->MlmeAux.SsidBssTab.BssNr, pAd->ScanTab.BssNr, pAd->MlmeAux.SsidLen, pAd->MlmeAux.Ssid));
363         NdisGetSystemUpTime(&Now);
364
365         if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) &&
366                 (pAd->CommonCfg.SsidLen == pAd->MlmeAux.SsidBssTab.BssEntry[0].SsidLen) &&
367                 NdisEqualMemory(pAd->CommonCfg.Ssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Ssid, pAd->CommonCfg.SsidLen) &&
368                 MAC_ADDR_EQUAL(pAd->CommonCfg.Bssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Bssid))
369         {
370                 // Case 1. already connected with an AP who has the desired SSID
371                 //         with highest RSSI
372
373                 // Add checking Mode "LEAP" for CCX 1.0
374                 if (((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) ||
375                          (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK) ||
376                          (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) ||
377                          (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK)
378                          ) &&
379                         (pAd->StaCfg.PortSecured == WPA_802_1X_PORT_NOT_SECURED))
380                 {
381                         // case 1.1 For WPA, WPA-PSK, if the 1x port is not secured, we have to redo
382                         //          connection process
383                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP...\n"));
384                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
385                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
386                                                 sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
387                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
388                 }
389                 else if (pAd->bConfigChanged == TRUE)
390                 {
391                         // case 1.2 Important Config has changed, we have to reconnect to the same AP
392                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP Because config changed...\n"));
393                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
394                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
395                                                 sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
396                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
397                 }
398                 else
399                 {
400                         // case 1.3. already connected to the SSID with highest RSSI.
401                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - already with this BSSID. ignore this SET_SSID request\n"));
402                         //
403                         // (HCT 12.1) 1c_wlan_mediaevents required
404                         // media connect events are indicated when associating with the same AP
405                         //
406                         if (INFRA_ON(pAd))
407                         {
408                                 //
409                                 // Since MediaState already is NdisMediaStateConnected
410                                 // We just indicate the connect event again to meet the WHQL required.
411                                 //
412                                 pAd->IndicateMediaState = NdisMediaStateConnected;
413                                 RTMP_IndicateMediaState(pAd);
414                 pAd->ExtraInfo = GENERAL_LINK_UP;   // Update extra information to link is up
415                         }
416
417                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
418
419             {
420                 union iwreq_data    wrqu;
421
422                 memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
423                 memcpy(wrqu.ap_addr.sa_data, pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
424                 wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
425
426             }
427                 }
428         }
429         else if (INFRA_ON(pAd))
430         {
431                 //
432                 // For RT61
433                 // [88888] OID_802_11_SSID should have returned NDTEST_WEP_AP2(Returned: )
434                 // RT61 may lost SSID, and not connect to NDTEST_WEP_AP2 and will connect to NDTEST_WEP_AP2 by Autoreconnect
435                 // But media status is connected, so the SSID not report correctly.
436                 //
437                 if (!SSID_EQUAL(pAd->CommonCfg.Ssid, pAd->CommonCfg.SsidLen, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen))
438                 {
439                         //
440                         // Different SSID means not Roaming case, so we let LinkDown() to Indicate a disconnect event.
441                         //
442                         pAd->MlmeAux.CurrReqIsFromNdis = TRUE;
443                 }
444                 // case 2. active INFRA association existent
445                 //    roaming is done within miniport driver, nothing to do with configuration
446                 //    utility. so upon a new SET(OID_802_11_SSID) is received, we just
447                 //    disassociate with the current associated AP,
448                 //    then perform a new association with this new SSID, no matter the
449                 //    new/old SSID are the same or not.
450                 DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP...\n"));
451                 DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
452                 MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
453                                         sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
454                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
455         }
456         else
457         {
458                 if (ADHOC_ON(pAd))
459                 {
460                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - drop current ADHOC\n"));
461                         LinkDown(pAd, FALSE);
462                         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
463                         pAd->IndicateMediaState = NdisMediaStateDisconnected;
464                         RTMP_IndicateMediaState(pAd);
465             pAd->ExtraInfo = GENERAL_LINK_DOWN;
466                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():NDIS_STATUS_MEDIA_DISCONNECT Event C!\n"));
467                 }
468
469                 if ((pAd->MlmeAux.SsidBssTab.BssNr == 0) &&
470                         (pAd->StaCfg.bAutoReconnect == TRUE) &&
471                         (pAd->MlmeAux.BssType == BSS_INFRA) &&
472                         (MlmeValidateSSID(pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen) == TRUE)
473                         )
474                 {
475                         MLME_SCAN_REQ_STRUCT       ScanReq;
476
477                         DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - No matching BSS, start a new scan\n"));
478                         ScanParmFill(pAd, &ScanReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen, BSS_ANY, SCAN_ACTIVE);
479                         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ, sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);
480                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
481                         // Reset Missed scan number
482                         pAd->StaCfg.LastScanTime = Now;
483                 }
484                 else
485                 {
486                         pAd->MlmeAux.BssIdx = 0;
487                         IterateOnBssTab(pAd);
488                 }
489         }
490 }
491
492
493 /*
494         ==========================================================================
495         Description:
496
497         IRQL = DISPATCH_LEVEL
498
499         ==========================================================================
500 */
501 VOID CntlOidRTBssidProc(
502         IN PRTMP_ADAPTER pAd,
503         IN MLME_QUEUE_ELEM * Elem)
504 {
505         ULONG       BssIdx;
506         PUCHAR      pOidBssid = (PUCHAR)Elem->Msg;
507         MLME_DISASSOC_REQ_STRUCT    DisassocReq;
508         MLME_JOIN_REQ_STRUCT        JoinReq;
509
510         // record user desired settings
511         COPY_MAC_ADDR(pAd->MlmeAux.Bssid, pOidBssid);
512         pAd->MlmeAux.BssType = pAd->StaCfg.BssType;
513
514         //
515         // Update Reconnect Ssid, that user desired to connect.
516         //
517         NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, MAX_LEN_OF_SSID);
518         pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;
519         NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
520
521         // find the desired BSS in the latest SCAN result table
522         BssIdx = BssTableSearch(&pAd->ScanTab, pOidBssid, pAd->MlmeAux.Channel);
523         if (BssIdx == BSS_NOT_FOUND)
524         {
525                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - BSSID not found. reply NDIS_STATUS_NOT_ACCEPTED\n"));
526                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
527                 return;
528         }
529
530         // copy the matched BSS entry from ScanTab to MlmeAux.SsidBssTab. Why?
531         // Because we need this entry to become the JOIN target in later on SYNC state machine
532         pAd->MlmeAux.BssIdx = 0;
533         pAd->MlmeAux.SsidBssTab.BssNr = 1;
534         NdisMoveMemory(&pAd->MlmeAux.SsidBssTab.BssEntry[0], &pAd->ScanTab.BssEntry[BssIdx], sizeof(BSS_ENTRY));
535
536         //pAd->MlmeAux.AutoReconnectSsidLen = pAd->ScanTab.BssEntry[BssIdx].SsidLen;
537         //NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->ScanTab.BssEntry[BssIdx].Ssid, pAd->ScanTab.BssEntry[BssIdx].SsidLen);
538
539         // Add SSID into MlmeAux for site surey joining hidden SSID
540         //pAd->MlmeAux.SsidLen = pAd->ScanTab.BssEntry[BssIdx].SsidLen;
541         //NdisMoveMemory(pAd->MlmeAux.Ssid, pAd->ScanTab.BssEntry[BssIdx].Ssid, pAd->MlmeAux.SsidLen);
542
543         // 2002-11-26 skip the following checking. i.e. if user wants to re-connect to same AP
544         //   we just follow normal procedure. The reason of user doing this may because he/she changed
545         //   AP to another channel, but we still received BEACON from it thus don't claim Link Down.
546         //   Since user knows he's changed AP channel, he'll re-connect again. By skipping the following
547         //   checking, we'll disassociate then re-do normal association with this AP at the new channel.
548         // 2003-1-6 Re-enable this feature based on microsoft requirement which prefer not to re-do
549         //   connection when setting the same BSSID.
550         if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) &&
551                 MAC_ADDR_EQUAL(pAd->CommonCfg.Bssid, pOidBssid))
552         {
553                 // already connected to the same BSSID, go back to idle state directly
554                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - already in this BSSID. ignore this SET_BSSID request\n"));
555                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
556
557             {
558                 union iwreq_data    wrqu;
559
560                 memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
561                 memcpy(wrqu.ap_addr.sa_data, pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
562                 wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
563
564             }
565         }
566         else
567         {
568                 if (INFRA_ON(pAd))
569                 {
570                         // disassoc from current AP first
571                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - disassociate with current AP ...\n"));
572                         DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
573                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
574                                                 sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
575
576                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
577                 }
578                 else
579                 {
580                         if (ADHOC_ON(pAd))
581                         {
582                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - drop current ADHOC\n"));
583                                 LinkDown(pAd, FALSE);
584                                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
585                                 pAd->IndicateMediaState = NdisMediaStateDisconnected;
586                                 RTMP_IndicateMediaState(pAd);
587                 pAd->ExtraInfo = GENERAL_LINK_DOWN;
588                                 DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event C!\n"));
589                         }
590
591                         // Change the wepstatus to original wepstatus
592                         pAd->StaCfg.WepStatus   = pAd->StaCfg.OrigWepStatus;
593                         pAd->StaCfg.PairCipher  = pAd->StaCfg.OrigWepStatus;
594                         pAd->StaCfg.GroupCipher = pAd->StaCfg.OrigWepStatus;
595
596                         // Check cipher suite, AP must have more secured cipher than station setting
597                         // Set the Pairwise and Group cipher to match the intended AP setting
598                         // We can only connect to AP with less secured cipher setting
599                         if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK))
600                         {
601                                 pAd->StaCfg.GroupCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.GroupCipher;
602
603                                 if (pAd->StaCfg.WepStatus == pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipher)
604                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipher;
605                                 else if (pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipherAux != Ndis802_11WEPDisabled)
606                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipherAux;
607                                 else    // There is no PairCipher Aux, downgrade our capability to TKIP
608                                         pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
609                         }
610                         else if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK))
611                         {
612                                 pAd->StaCfg.GroupCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.GroupCipher;
613
614                                 if (pAd->StaCfg.WepStatus == pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipher)
615                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipher;
616                                 else if (pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipherAux != Ndis802_11WEPDisabled)
617                                         pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipherAux;
618                                 else    // There is no PairCipher Aux, downgrade our capability to TKIP
619                                         pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
620
621                                 // RSN capability
622                                 pAd->StaCfg.RsnCapability = pAd->ScanTab.BssEntry[BssIdx].WPA2.RsnCapability;
623                         }
624
625                         // Set Mix cipher flag
626                         pAd->StaCfg.bMixCipher = (pAd->StaCfg.PairCipher == pAd->StaCfg.GroupCipher) ? FALSE : TRUE;
627                         if (pAd->StaCfg.bMixCipher == TRUE)
628                         {
629                                 // If mix cipher, re-build RSNIE
630                                 RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, 0);
631                         }
632                         // No active association, join the BSS immediately
633                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - joining %02x:%02x:%02x:%02x:%02x:%02x ...\n",
634                                 pOidBssid[0],pOidBssid[1],pOidBssid[2],pOidBssid[3],pOidBssid[4],pOidBssid[5]));
635
636                         JoinParmFill(pAd, &JoinReq, pAd->MlmeAux.BssIdx);
637                         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_JOIN_REQ, sizeof(MLME_JOIN_REQ_STRUCT), &JoinReq);
638
639                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_JOIN;
640                 }
641         }
642 }
643
644 // Roaming is the only external request triggering CNTL state machine
645 // despite of other "SET OID" operation. All "SET OID" related oerations
646 // happen in sequence, because no other SET OID will be sent to this device
647 // until the the previous SET operation is complete (successful o failed).
648 // So, how do we quarantee this ROAMING request won't corrupt other "SET OID"?
649 // or been corrupted by other "SET OID"?
650 //
651 // IRQL = DISPATCH_LEVEL
652 VOID CntlMlmeRoamingProc(
653         IN PRTMP_ADAPTER pAd,
654         IN MLME_QUEUE_ELEM *Elem)
655 {
656         // TODO:
657         // AP in different channel may show lower RSSI than actual value??
658         // should we add a weighting factor to compensate it?
659         DBGPRINT(RT_DEBUG_TRACE,("CNTL - Roaming in MlmeAux.RoamTab...\n"));
660
661         NdisMoveMemory(&pAd->MlmeAux.SsidBssTab, &pAd->MlmeAux.RoamTab, sizeof(pAd->MlmeAux.RoamTab));
662         pAd->MlmeAux.SsidBssTab.BssNr = pAd->MlmeAux.RoamTab.BssNr;
663
664         BssTableSortByRssi(&pAd->MlmeAux.SsidBssTab);
665         pAd->MlmeAux.BssIdx = 0;
666         IterateOnBssTab(pAd);
667 }
668
669 /*
670         ==========================================================================
671         Description:
672
673         IRQL = DISPATCH_LEVEL
674
675         ==========================================================================
676 */
677 VOID CntlWaitDisassocProc(
678         IN PRTMP_ADAPTER pAd,
679         IN MLME_QUEUE_ELEM *Elem)
680 {
681         MLME_START_REQ_STRUCT     StartReq;
682
683         if (Elem->MsgType == MT2_DISASSOC_CONF)
684         {
685                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Dis-associate successful\n"));
686
687             if (pAd->CommonCfg.bWirelessEvent)
688                 {
689                         RTMPSendWirelessEvent(pAd, IW_DISASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
690                 }
691
692                 LinkDown(pAd, FALSE);
693
694                 // case 1. no matching BSS, and user wants ADHOC, so we just start a new one
695                 if ((pAd->MlmeAux.SsidBssTab.BssNr==0) && (pAd->StaCfg.BssType == BSS_ADHOC))
696                 {
697                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - No matching BSS, start a new ADHOC (Ssid=%s)...\n",pAd->MlmeAux.Ssid));
698                         StartParmFill(pAd, &StartReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
699                         MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_START_REQ, sizeof(MLME_START_REQ_STRUCT), &StartReq);
700                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_START;
701                 }
702                 // case 2. try each matched BSS
703                 else
704                 {
705                         pAd->MlmeAux.BssIdx = 0;
706
707                         IterateOnBssTab(pAd);
708                 }
709         }
710 }
711
712 /*
713         ==========================================================================
714         Description:
715
716         IRQL = DISPATCH_LEVEL
717
718         ==========================================================================
719 */
720 VOID CntlWaitJoinProc(
721         IN PRTMP_ADAPTER pAd,
722         IN MLME_QUEUE_ELEM *Elem)
723 {
724         USHORT                      Reason;
725         MLME_AUTH_REQ_STRUCT        AuthReq;
726
727         if (Elem->MsgType == MT2_JOIN_CONF)
728         {
729                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
730                 if (Reason == MLME_SUCCESS)
731                 {
732                         // 1. joined an IBSS, we are pretty much done here
733                         if (pAd->MlmeAux.BssType == BSS_ADHOC)
734                         {
735                             //
736                                 // 5G bands rules of Japan:
737                                 // Ad hoc must be disabled in W53(ch52,56,60,64) channels.
738                                 //
739                                 if ( (pAd->CommonCfg.bIEEE80211H == 1) &&
740                       RadarChannelCheck(pAd, pAd->CommonCfg.Channel)
741                                    )
742                                 {
743                                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
744                                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Channel=%d, Join adhoc on W53(52,56,60,64) Channels are not accepted\n", pAd->CommonCfg.Channel));
745                                         return;
746                                 }
747
748                                 LinkUp(pAd, BSS_ADHOC);
749                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
750                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - join the IBSS = %02x:%02x:%02x:%02x:%02x:%02x ...\n",
751                                 pAd->CommonCfg.Bssid[0],pAd->CommonCfg.Bssid[1],pAd->CommonCfg.Bssid[2],
752                                 pAd->CommonCfg.Bssid[3],pAd->CommonCfg.Bssid[4],pAd->CommonCfg.Bssid[5]));
753
754                 pAd->IndicateMediaState = NdisMediaStateConnected;
755                 pAd->ExtraInfo = GENERAL_LINK_UP;
756                         }
757                         // 2. joined a new INFRA network, start from authentication
758                         else
759                         {
760                                 {
761                                         // either Ndis802_11AuthModeShared or Ndis802_11AuthModeAutoSwitch, try shared key first
762                                         if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeShared) ||
763                                                 (pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch))
764                                         {
765                                                 AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeShared);
766                                         }
767                                         else
768                                         {
769                                                 AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
770                                         }
771                                 }
772                                 MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
773                                                         sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
774
775                                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH;
776                         }
777                 }
778                 else
779                 {
780                         // 3. failed, try next BSS
781                         pAd->MlmeAux.BssIdx++;
782                         IterateOnBssTab(pAd);
783                 }
784         }
785 }
786
787
788 /*
789         ==========================================================================
790         Description:
791
792         IRQL = DISPATCH_LEVEL
793
794         ==========================================================================
795 */
796 VOID CntlWaitStartProc(
797         IN PRTMP_ADAPTER pAd,
798         IN MLME_QUEUE_ELEM *Elem)
799 {
800         USHORT      Result;
801
802         if (Elem->MsgType == MT2_START_CONF)
803         {
804                 NdisMoveMemory(&Result, Elem->Msg, sizeof(USHORT));
805                 if (Result == MLME_SUCCESS)
806                 {
807                     //
808                         // 5G bands rules of Japan:
809                         // Ad hoc must be disabled in W53(ch52,56,60,64) channels.
810                         //
811                         if ( (pAd->CommonCfg.bIEEE80211H == 1) &&
812                   RadarChannelCheck(pAd, pAd->CommonCfg.Channel)
813                            )
814                         {
815                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
816                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Channel=%d, Start adhoc on W53(52,56,60,64) Channels are not accepted\n", pAd->CommonCfg.Channel));
817                                 return;
818                         }
819 #ifdef DOT11_N_SUPPORT
820                         if (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED)
821                         {
822                                 N_ChannelCheck(pAd);
823                                 SetCommonHT(pAd);
824                                 NdisMoveMemory(&pAd->MlmeAux.AddHtInfo, &pAd->CommonCfg.AddHTInfo, sizeof(ADD_HT_INFO_IE));
825                                 RTMPCheckHt(pAd, BSSID_WCID, &pAd->CommonCfg.HtCapability, &pAd->CommonCfg.AddHTInfo);
826                                 pAd->StaActive.SupportedPhyInfo.bHtEnable = TRUE;
827                                 NdisZeroMemory(&pAd->StaActive.SupportedPhyInfo.MCSSet[0], 16);
828                                 NdisMoveMemory(&pAd->StaActive.SupportedPhyInfo.MCSSet[0], &pAd->CommonCfg.HtCapability.MCSSet[0], 16);
829                                 COPY_HTSETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
830
831                                 if ((pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth  == BW_40) &&
832                                         (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_ABOVE))
833                                 {
834                                         pAd->MlmeAux.CentralChannel = pAd->CommonCfg.Channel + 2;
835                                 }
836                                 else if ((pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth  == BW_40) &&
837                                                  (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_BELOW))
838                                 {
839                                         pAd->MlmeAux.CentralChannel = pAd->CommonCfg.Channel - 2;
840                                 }
841                         }
842                         else
843 #endif // DOT11_N_SUPPORT //
844                         {
845                                 pAd->StaActive.SupportedPhyInfo.bHtEnable = FALSE;
846                         }
847                         LinkUp(pAd, BSS_ADHOC);
848                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
849                         // Before send beacon, driver need do radar detection
850                         if ((pAd->CommonCfg.Channel > 14 )
851                                 && (pAd->CommonCfg.bIEEE80211H == 1)
852                                 && RadarChannelCheck(pAd, pAd->CommonCfg.Channel))
853                         {
854                                 pAd->CommonCfg.RadarDetect.RDMode = RD_SILENCE_MODE;
855                                 pAd->CommonCfg.RadarDetect.RDCount = 0;
856                         }
857
858                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - start a new IBSS = %02x:%02x:%02x:%02x:%02x:%02x ...\n",
859                                 pAd->CommonCfg.Bssid[0],pAd->CommonCfg.Bssid[1],pAd->CommonCfg.Bssid[2],
860                                 pAd->CommonCfg.Bssid[3],pAd->CommonCfg.Bssid[4],pAd->CommonCfg.Bssid[5]));
861                 }
862                 else
863                 {
864                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Start IBSS fail. BUG!!!!!\n"));
865                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
866                 }
867         }
868 }
869
870 /*
871         ==========================================================================
872         Description:
873
874         IRQL = DISPATCH_LEVEL
875
876         ==========================================================================
877 */
878 VOID CntlWaitAuthProc(
879         IN PRTMP_ADAPTER pAd,
880         IN MLME_QUEUE_ELEM *Elem)
881 {
882         USHORT                       Reason;
883         MLME_ASSOC_REQ_STRUCT        AssocReq;
884         MLME_AUTH_REQ_STRUCT         AuthReq;
885
886         if (Elem->MsgType == MT2_AUTH_CONF)
887         {
888                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
889                 if (Reason == MLME_SUCCESS)
890                 {
891                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH OK\n"));
892                         AssocParmFill(pAd, &AssocReq, pAd->MlmeAux.Bssid, pAd->MlmeAux.CapabilityInfo,
893                                                   ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
894
895                         {
896                                 MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_ASSOC_REQ,
897                                                         sizeof(MLME_ASSOC_REQ_STRUCT), &AssocReq);
898
899                                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_ASSOC;
900                         }
901                 }
902                 else
903                 {
904                         // This fail may because of the AP already keep us in its MAC table without
905                         // ageing-out. The previous authentication attempt must have let it remove us.
906                         // so try Authentication again may help. For D-Link DWL-900AP+ compatibility.
907                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, try again...\n"));
908
909                         {
910                                 if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeShared) ||
911                                         (pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch))
912                                 {
913                                         // either Ndis802_11AuthModeShared or Ndis802_11AuthModeAutoSwitch, try shared key first
914                                         AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeShared);
915                                 }
916                                 else
917                                 {
918                                         AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
919                                 }
920                         }
921                         MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
922                                                 sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
923
924                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH2;
925                 }
926         }
927 }
928
929 /*
930         ==========================================================================
931         Description:
932
933         IRQL = DISPATCH_LEVEL
934
935         ==========================================================================
936 */
937 VOID CntlWaitAuthProc2(
938         IN PRTMP_ADAPTER pAd,
939         IN MLME_QUEUE_ELEM *Elem)
940 {
941         USHORT                       Reason;
942         MLME_ASSOC_REQ_STRUCT        AssocReq;
943         MLME_AUTH_REQ_STRUCT         AuthReq;
944
945         if (Elem->MsgType == MT2_AUTH_CONF)
946         {
947                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
948                 if (Reason == MLME_SUCCESS)
949                 {
950                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH OK\n"));
951                         AssocParmFill(pAd, &AssocReq, pAd->MlmeAux.Bssid, pAd->MlmeAux.CapabilityInfo,
952                                                   ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
953                         MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_ASSOC_REQ,
954                                                 sizeof(MLME_ASSOC_REQ_STRUCT), &AssocReq);
955
956                         pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_ASSOC;
957                 }
958                 else
959                 {
960                         if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch) &&
961                                  (pAd->MlmeAux.Alg == Ndis802_11AuthModeShared))
962                         {
963                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, try OPEN system...\n"));
964                                 AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
965                                 MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
966                                                         sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
967
968                                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH2;
969                         }
970                         else
971                         {
972                                 // not success, try next BSS
973                                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, give up; try next BSS\n"));
974                                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE; //???????
975                                 pAd->MlmeAux.BssIdx++;
976                                 IterateOnBssTab(pAd);
977                         }
978                 }
979         }
980 }
981
982 /*
983         ==========================================================================
984         Description:
985
986         IRQL = DISPATCH_LEVEL
987
988         ==========================================================================
989 */
990 VOID CntlWaitAssocProc(
991         IN PRTMP_ADAPTER pAd,
992         IN MLME_QUEUE_ELEM *Elem)
993 {
994         USHORT      Reason;
995
996         if (Elem->MsgType == MT2_ASSOC_CONF)
997         {
998                 NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
999                 if (Reason == MLME_SUCCESS)
1000                 {
1001                         LinkUp(pAd, BSS_INFRA);
1002                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
1003                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Association successful on BSS #%ld\n",pAd->MlmeAux.BssIdx));
1004
1005                         if (pAd->CommonCfg.bWirelessEvent)
1006                         {
1007                                 RTMPSendWirelessEvent(pAd, IW_ASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
1008                         }
1009                 }
1010                 else
1011                 {
1012                         // not success, try next BSS
1013                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Association fails on BSS #%ld\n",pAd->MlmeAux.BssIdx));
1014                         pAd->MlmeAux.BssIdx++;
1015                         IterateOnBssTab(pAd);
1016                 }
1017         }
1018 }
1019
1020 /*
1021         ==========================================================================
1022         Description:
1023
1024         IRQL = DISPATCH_LEVEL
1025
1026         ==========================================================================
1027 */
1028 VOID CntlWaitReassocProc(
1029         IN PRTMP_ADAPTER pAd,
1030         IN MLME_QUEUE_ELEM *Elem)
1031 {
1032         USHORT      Result;
1033
1034         if (Elem->MsgType == MT2_REASSOC_CONF)
1035         {
1036                 NdisMoveMemory(&Result, Elem->Msg, sizeof(USHORT));
1037                 if (Result == MLME_SUCCESS)
1038                 {
1039                         //
1040                         // NDIS requires a new Link UP indication but no Link Down for RE-ASSOC
1041                         //
1042                         LinkUp(pAd, BSS_INFRA);
1043
1044                         // send wireless event - for association
1045                         if (pAd->CommonCfg.bWirelessEvent)
1046                                 RTMPSendWirelessEvent(pAd, IW_ASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
1047
1048                         pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
1049                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Re-assocition successful on BSS #%ld\n", pAd->MlmeAux.RoamIdx));
1050                 }
1051                 else
1052                 {
1053                         // reassoc failed, try to pick next BSS in the BSS Table
1054                         DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Re-assocition fails on BSS #%ld\n", pAd->MlmeAux.RoamIdx));
1055                         pAd->MlmeAux.RoamIdx++;
1056                         IterateOnBssTab2(pAd);
1057                 }
1058         }
1059 }
1060
1061
1062 VOID    AdhocTurnOnQos(
1063         IN  PRTMP_ADAPTER pAd)
1064 {
1065 #define AC0_DEF_TXOP            0
1066 #define AC1_DEF_TXOP            0
1067 #define AC2_DEF_TXOP            94
1068 #define AC3_DEF_TXOP            47
1069
1070         // Turn on QOs if use HT rate.
1071         if (pAd->CommonCfg.APEdcaParm.bValid == FALSE)
1072         {
1073                 pAd->CommonCfg.APEdcaParm.bValid = TRUE;
1074                 pAd->CommonCfg.APEdcaParm.Aifsn[0] = 3;
1075                 pAd->CommonCfg.APEdcaParm.Aifsn[1] = 7;
1076                 pAd->CommonCfg.APEdcaParm.Aifsn[2] = 1;
1077                 pAd->CommonCfg.APEdcaParm.Aifsn[3] = 1;
1078
1079                 pAd->CommonCfg.APEdcaParm.Cwmin[0] = 4;
1080                 pAd->CommonCfg.APEdcaParm.Cwmin[1] = 4;
1081                 pAd->CommonCfg.APEdcaParm.Cwmin[2] = 3;
1082                 pAd->CommonCfg.APEdcaParm.Cwmin[3] = 2;
1083
1084                 pAd->CommonCfg.APEdcaParm.Cwmax[0] = 10;
1085                 pAd->CommonCfg.APEdcaParm.Cwmax[1] = 6;
1086                 pAd->CommonCfg.APEdcaParm.Cwmax[2] = 4;
1087                 pAd->CommonCfg.APEdcaParm.Cwmax[3] = 3;
1088
1089                 pAd->CommonCfg.APEdcaParm.Txop[0]  = 0;
1090                 pAd->CommonCfg.APEdcaParm.Txop[1]  = 0;
1091                 pAd->CommonCfg.APEdcaParm.Txop[2]  = AC2_DEF_TXOP;
1092                 pAd->CommonCfg.APEdcaParm.Txop[3]  = AC3_DEF_TXOP;
1093         }
1094         AsicSetEdcaParm(pAd, &pAd->CommonCfg.APEdcaParm);
1095 }
1096
1097 /*
1098         ==========================================================================
1099         Description:
1100
1101         IRQL = DISPATCH_LEVEL
1102
1103         ==========================================================================
1104 */
1105 VOID LinkUp(
1106         IN PRTMP_ADAPTER pAd,
1107         IN UCHAR BssType)
1108 {
1109         ULONG   Now;
1110         UINT32  Data;
1111         BOOLEAN Cancelled;
1112         UCHAR   Value = 0, idx;
1113         MAC_TABLE_ENTRY *pEntry = NULL, *pCurrEntry;
1114
1115         pEntry = &pAd->MacTab.Content[BSSID_WCID];
1116
1117         //
1118         // ASSOC - DisassocTimeoutAction
1119         // CNTL - Dis-associate successful
1120         // !!! LINK DOWN !!!
1121         // [88888] OID_802_11_SSID should have returned NDTEST_WEP_AP2(Returned: )
1122         //
1123         // To prevent DisassocTimeoutAction to call Link down after we link up,
1124         // cancel the DisassocTimer no matter what it start or not.
1125         //
1126         RTMPCancelTimer(&pAd->MlmeAux.DisassocTimer,  &Cancelled);
1127
1128         COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
1129
1130 #ifdef DOT11_N_SUPPORT
1131         COPY_HTSETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
1132 #endif // DOT11_N_SUPPORT //
1133         // It's quite difficult to tell if a newly added KEY is WEP or CKIP until a new BSS
1134         // is formed (either ASSOC/RE-ASSOC done or IBSS started. LinkUP should be a safe place
1135         // to examine if cipher algorithm switching is required.
1136         //rt2860b. Don't know why need this
1137         SwitchBetweenWepAndCkip(pAd);
1138
1139
1140         if (BssType == BSS_ADHOC)
1141         {
1142                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_ADHOC_ON);
1143                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_INFRA_ON);
1144
1145 #ifdef DOT11_N_SUPPORT
1146                 if (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED)
1147                         AdhocTurnOnQos(pAd);
1148 #endif // DOT11_N_SUPPORT //
1149
1150                 DBGPRINT(RT_DEBUG_TRACE, ("!!!Adhoc LINK UP !!! \n" ));
1151         }
1152         else
1153         {
1154                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_INFRA_ON);
1155                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_ADHOC_ON);
1156
1157                 DBGPRINT(RT_DEBUG_TRACE, ("!!!Infra LINK UP !!! \n" ));
1158         }
1159
1160         // 3*3
1161         // reset Tx beamforming bit
1162         RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1163         Value &= (~0x01);
1164         Value |= pAd->CommonCfg.RegTransmitSetting.field.TxBF;
1165         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1166
1167 #ifdef DOT11_N_SUPPORT
1168         // Change to AP channel
1169     if ((pAd->CommonCfg.CentralChannel > pAd->CommonCfg.Channel) && (pAd->MlmeAux.HtCapability.HtCapInfo.ChannelWidth == BW_40))
1170         {
1171                 // Must using 40MHz.
1172                 pAd->CommonCfg.BBPCurrentBW = BW_40;
1173                 AsicSwitchChannel(pAd, pAd->CommonCfg.CentralChannel, FALSE);
1174                 AsicLockChannel(pAd, pAd->CommonCfg.CentralChannel);
1175
1176                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1177                 Value &= (~0x18);
1178                 Value |= 0x10;
1179                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1180
1181                 //  RX : control channel at lower
1182                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
1183                 Value &= (~0x20);
1184                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
1185
1186                 RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
1187                 Data &= 0xfffffffe;
1188                 RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
1189
1190                 if (pAd->MACVersion == 0x28600100)
1191                 {
1192                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x1A);
1193                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x0A);
1194                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x16);
1195             DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
1196                 }
1197
1198                 DBGPRINT(RT_DEBUG_TRACE, ("!!!40MHz Lower LINK UP !!! Control Channel at Below. Central = %d \n", pAd->CommonCfg.CentralChannel ));
1199         }
1200         else if ((pAd->CommonCfg.CentralChannel < pAd->CommonCfg.Channel) && (pAd->MlmeAux.HtCapability.HtCapInfo.ChannelWidth == BW_40))
1201     {
1202             // Must using 40MHz.
1203                 pAd->CommonCfg.BBPCurrentBW = BW_40;
1204                 AsicSwitchChannel(pAd, pAd->CommonCfg.CentralChannel, FALSE);
1205             AsicLockChannel(pAd, pAd->CommonCfg.CentralChannel);
1206
1207                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1208                 Value &= (~0x18);
1209                 Value |= 0x10;
1210                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1211
1212                 RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
1213                 Data |= 0x1;
1214                 RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
1215
1216                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
1217             Value |= (0x20);
1218                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
1219
1220                 if (pAd->MACVersion == 0x28600100)
1221                 {
1222                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x1A);
1223                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x0A);
1224                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x16);
1225                             DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
1226                 }
1227
1228             DBGPRINT(RT_DEBUG_TRACE, ("!!! 40MHz Upper LINK UP !!! Control Channel at UpperCentral = %d \n", pAd->CommonCfg.CentralChannel ));
1229     }
1230     else
1231 #endif // DOT11_N_SUPPORT //
1232     {
1233             pAd->CommonCfg.BBPCurrentBW = BW_20;
1234                 pAd->CommonCfg.CentralChannel = pAd->CommonCfg.Channel;
1235                 AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
1236                 AsicLockChannel(pAd, pAd->CommonCfg.Channel);
1237
1238                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
1239                 Value &= (~0x18);
1240                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
1241
1242                 RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
1243                 Data &= 0xfffffffe;
1244                 RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
1245
1246                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
1247                 Value &= (~0x20);
1248                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
1249
1250                 if (pAd->MACVersion == 0x28600100)
1251                 {
1252                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x16);
1253                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x08);
1254                         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x11);
1255             DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
1256                 }
1257
1258             DBGPRINT(RT_DEBUG_TRACE, ("!!! 20MHz LINK UP !!! \n" ));
1259     }
1260
1261         RTMPSetAGCInitValue(pAd, pAd->CommonCfg.BBPCurrentBW);
1262         //
1263         // Save BBP_R66 value, it will be used in RTUSBResumeMsduTransmission
1264         //
1265         RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R66, &pAd->BbpTuning.R66CurrentValue);
1266
1267         DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!! (BssType=%d, AID=%d, ssid=%s, Channel=%d, CentralChannel = %d)\n",
1268                 BssType, pAd->StaActive.Aid, pAd->CommonCfg.Ssid, pAd->CommonCfg.Channel, pAd->CommonCfg.CentralChannel));
1269
1270 #ifdef DOT11_N_SUPPORT
1271         DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!! (Density =%d, )\n", pAd->MacTab.Content[BSSID_WCID].MpduDensity));
1272 #endif // DOT11_N_SUPPORT //
1273
1274                 AsicSetBssid(pAd, pAd->CommonCfg.Bssid);
1275
1276         AsicSetSlotTime(pAd, TRUE);
1277         AsicSetEdcaParm(pAd, &pAd->CommonCfg.APEdcaParm);
1278
1279         // Call this for RTS protectionfor legacy rate, we will always enable RTS threshold, but normally it will not hit
1280         AsicUpdateProtect(pAd, 0, (OFDMSETPROTECT | CCKSETPROTECT), TRUE, FALSE);
1281
1282 #ifdef DOT11_N_SUPPORT
1283         if ((pAd->StaActive.SupportedPhyInfo.bHtEnable == TRUE))
1284         {
1285                 // Update HT protectionfor based on AP's operating mode.
1286         if (pAd->MlmeAux.AddHtInfo.AddHtInfo2.NonGfPresent == 1)
1287         {
1288                 AsicUpdateProtect(pAd, pAd->MlmeAux.AddHtInfo.AddHtInfo2.OperaionMode,  ALLN_SETPROTECT, FALSE, TRUE);
1289         }
1290         else
1291                         AsicUpdateProtect(pAd, pAd->MlmeAux.AddHtInfo.AddHtInfo2.OperaionMode,  ALLN_SETPROTECT, FALSE, FALSE);
1292         }
1293 #endif // DOT11_N_SUPPORT //
1294
1295         NdisZeroMemory(&pAd->DrsCounters, sizeof(COUNTER_DRS));
1296
1297         NdisGetSystemUpTime(&Now);
1298         pAd->StaCfg.LastBeaconRxTime = Now;   // last RX timestamp
1299
1300         if ((pAd->CommonCfg.TxPreamble != Rt802_11PreambleLong) &&
1301                 CAP_IS_SHORT_PREAMBLE_ON(pAd->StaActive.CapabilityInfo))
1302         {
1303                 MlmeSetTxPreamble(pAd, Rt802_11PreambleShort);
1304         }
1305
1306         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1307
1308         if (pAd->CommonCfg.RadarDetect.RDMode == RD_SILENCE_MODE)
1309         {
1310         }
1311         pAd->CommonCfg.RadarDetect.RDMode = RD_NORMAL_MODE;
1312
1313         if (BssType == BSS_ADHOC)
1314         {
1315                 MakeIbssBeacon(pAd);
1316                 if ((pAd->CommonCfg.Channel > 14)
1317                         && (pAd->CommonCfg.bIEEE80211H == 1)
1318                         && RadarChannelCheck(pAd, pAd->CommonCfg.Channel))
1319                 {
1320                         ; //Do nothing
1321                 }
1322                 else
1323                 {
1324                         AsicEnableIbssSync(pAd);
1325                 }
1326
1327                 // In ad hoc mode, use MAC table from index 1.
1328                 // p.s ASIC use all 0xff as termination of WCID table search.To prevent it's 0xff-ff-ff-ff-ff-ff, Write 0 here.
1329                 RTMP_IO_WRITE32(pAd, MAC_WCID_BASE, 0x00);
1330                 RTMP_IO_WRITE32(pAd, 0x1808, 0x00);
1331
1332                 // If WEP is enabled, add key material and cipherAlg into Asic
1333                 // Fill in Shared Key Table(offset: 0x6c00) and Shared Key Mode(offset: 0x7000)
1334
1335                 if (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)
1336                 {
1337                         PUCHAR  Key;
1338                         UCHAR   CipherAlg;
1339
1340                         for (idx=0; idx < SHARE_KEY_NUM; idx++)
1341                 {
1342                                 CipherAlg = pAd->SharedKey[BSS0][idx].CipherAlg;
1343                         Key = pAd->SharedKey[BSS0][idx].Key;
1344
1345                                 if (pAd->SharedKey[BSS0][idx].KeyLen > 0)
1346                                 {
1347                                         // Set key material and cipherAlg to Asic
1348                                 AsicAddSharedKeyEntry(pAd, BSS0, idx, CipherAlg, Key, NULL, NULL);
1349
1350                     if (idx == pAd->StaCfg.DefaultKeyId)
1351                                         {
1352                                                 // Update WCID attribute table and IVEIV table for this group key table
1353                                                 RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, NULL);
1354                                         }
1355                                 }
1356
1357
1358                         }
1359                 }
1360                 // If WPANone is enabled, add key material and cipherAlg into Asic
1361                 // Fill in Shared Key Table(offset: 0x6c00) and Shared Key Mode(offset: 0x7000)
1362                 else if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone)
1363                 {
1364                         pAd->StaCfg.DefaultKeyId = 0;   // always be zero
1365
1366             NdisZeroMemory(&pAd->SharedKey[BSS0][0], sizeof(CIPHER_KEY));
1367                                                         pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK;
1368                         NdisMoveMemory(pAd->SharedKey[BSS0][0].Key, pAd->StaCfg.PMK, LEN_TKIP_EK);
1369
1370             if (pAd->StaCfg.PairCipher == Ndis802_11Encryption2Enabled)
1371             {
1372                         NdisMoveMemory(pAd->SharedKey[BSS0][0].RxMic, &pAd->StaCfg.PMK[16], LEN_TKIP_RXMICK);
1373                         NdisMoveMemory(pAd->SharedKey[BSS0][0].TxMic, &pAd->StaCfg.PMK[16], LEN_TKIP_TXMICK);
1374             }
1375
1376                         // Decide its ChiperAlg
1377                         if (pAd->StaCfg.PairCipher == Ndis802_11Encryption2Enabled)
1378                                 pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_TKIP;
1379                         else if (pAd->StaCfg.PairCipher == Ndis802_11Encryption3Enabled)
1380                                 pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_AES;
1381                         else
1382             {
1383                 DBGPRINT(RT_DEBUG_TRACE, ("Unknow Cipher (=%d), set Cipher to AES\n", pAd->StaCfg.PairCipher));
1384                                 pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_AES;
1385             }
1386
1387                         // Set key material and cipherAlg to Asic
1388                         AsicAddSharedKeyEntry(pAd,
1389                                                                   BSS0,
1390                                                                   0,
1391                                                                   pAd->SharedKey[BSS0][0].CipherAlg,
1392                                                                   pAd->SharedKey[BSS0][0].Key,
1393                                                                   pAd->SharedKey[BSS0][0].TxMic,
1394                                                                   pAd->SharedKey[BSS0][0].RxMic);
1395
1396             // Update WCID attribute table and IVEIV table for this group key table
1397                         RTMPAddWcidAttributeEntry(pAd, BSS0, 0, pAd->SharedKey[BSS0][0].CipherAlg, NULL);
1398
1399                 }
1400
1401         }
1402         else // BSS_INFRA
1403         {
1404                 // Check the new SSID with last SSID
1405                 while (Cancelled == TRUE)
1406                 {
1407                         if (pAd->CommonCfg.LastSsidLen == pAd->CommonCfg.SsidLen)
1408                         {
1409                                 if (RTMPCompareMemory(pAd->CommonCfg.LastSsid, pAd->CommonCfg.Ssid, pAd->CommonCfg.LastSsidLen) == 0)
1410                                 {
1411                                         // Link to the old one no linkdown is required.
1412                                         break;
1413                                 }
1414                         }
1415                         // Send link down event before set to link up
1416                         pAd->IndicateMediaState = NdisMediaStateDisconnected;
1417                         RTMP_IndicateMediaState(pAd);
1418             pAd->ExtraInfo = GENERAL_LINK_DOWN;
1419                         DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event AA!\n"));
1420                         break;
1421                 }
1422
1423                 //
1424                 // On WPA mode, Remove All Keys if not connect to the last BSSID
1425                 // Key will be set after 4-way handshake.
1426                 //
1427                 if ((pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA))
1428                 {
1429                         ULONG           IV;
1430
1431                         // Remove all WPA keys
1432                         RTMPWPARemoveAllKeys(pAd);
1433                         pAd->StaCfg.PortSecured = WPA_802_1X_PORT_NOT_SECURED;
1434                         pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilter8021xWEP;
1435
1436                         // Fixed connection failed with Range Maximizer - 515 AP (Marvell Chip) when security is WPAPSK/TKIP
1437                         // If IV related values are too large in GroupMsg2, AP would ignore this message.
1438                         IV = 0;
1439                         IV |= (pAd->StaCfg.DefaultKeyId << 30);
1440                         AsicUpdateWCIDIVEIV(pAd, BSSID_WCID, IV, 0);
1441                 }
1442                 // NOTE:
1443                 // the decision of using "short slot time" or not may change dynamically due to
1444                 // new STA association to the AP. so we have to decide that upon parsing BEACON, not here
1445
1446                 // NOTE:
1447                 // the decision to use "RTC/CTS" or "CTS-to-self" protection or not may change dynamically
1448                 // due to new STA association to the AP. so we have to decide that upon parsing BEACON, not here
1449
1450                 ComposePsPoll(pAd);
1451                 ComposeNullFrame(pAd);
1452
1453                         AsicEnableBssSync(pAd);
1454
1455                 // Add BSSID to WCID search table
1456                 AsicUpdateRxWCIDTable(pAd, BSSID_WCID, pAd->CommonCfg.Bssid);
1457
1458                 NdisAcquireSpinLock(&pAd->MacTabLock);
1459                 // add this BSSID entry into HASH table
1460                 {
1461                         UCHAR HashIdx;
1462
1463                         //pEntry = &pAd->MacTab.Content[BSSID_WCID];
1464                         HashIdx = MAC_ADDR_HASH_INDEX(pAd->CommonCfg.Bssid);
1465                         if (pAd->MacTab.Hash[HashIdx] == NULL)
1466                         {
1467                                 pAd->MacTab.Hash[HashIdx] = pEntry;
1468                         }
1469                         else
1470                         {
1471                                 pCurrEntry = pAd->MacTab.Hash[HashIdx];
1472                                 while (pCurrEntry->pNext != NULL)
1473                                         pCurrEntry = pCurrEntry->pNext;
1474                                 pCurrEntry->pNext = pEntry;
1475                         }
1476                 }
1477                 NdisReleaseSpinLock(&pAd->MacTabLock);
1478
1479
1480                 // If WEP is enabled, add paiewise and shared key
1481         if (((pAd->StaCfg.WpaSupplicantUP)&&
1482              (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)&&
1483              (pAd->StaCfg.PortSecured == WPA_802_1X_PORT_SECURED)) ||
1484             ((pAd->StaCfg.WpaSupplicantUP == WPA_SUPPLICANT_DISABLE)&&
1485               (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)))
1486                 {
1487                         PUCHAR  Key;
1488                         UCHAR   CipherAlg;
1489
1490                         for (idx=0; idx < SHARE_KEY_NUM; idx++)
1491                 {
1492                                 CipherAlg = pAd->SharedKey[BSS0][idx].CipherAlg;
1493                         Key = pAd->SharedKey[BSS0][idx].Key;
1494
1495                                 if (pAd->SharedKey[BSS0][idx].KeyLen > 0)
1496                                 {
1497                                         // Set key material and cipherAlg to Asic
1498                                 AsicAddSharedKeyEntry(pAd, BSS0, idx, CipherAlg, Key, NULL, NULL);
1499
1500                                         if (idx == pAd->StaCfg.DefaultKeyId)
1501                                         {
1502                                                 // Assign group key info
1503                                                 RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, NULL);
1504
1505                                                 // Assign pairwise key info
1506                                                 RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, pEntry);
1507                                         }
1508                                 }
1509                         }
1510                 }
1511
1512                 // only INFRASTRUCTURE mode need to indicate connectivity immediately; ADHOC mode
1513                 // should wait until at least 2 active nodes in this BSSID.
1514                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
1515
1516         // For GUI ++
1517                 if (pAd->StaCfg.AuthMode < Ndis802_11AuthModeWPA)
1518                 {
1519                         pAd->IndicateMediaState = NdisMediaStateConnected;
1520                         pAd->ExtraInfo = GENERAL_LINK_UP;
1521                         RTMP_IndicateMediaState(pAd);
1522                 }
1523         // --
1524
1525                 // Add BSSID in my MAC Table.
1526         NdisAcquireSpinLock(&pAd->MacTabLock);
1527                 RTMPMoveMemory(pAd->MacTab.Content[BSSID_WCID].Addr, pAd->CommonCfg.Bssid, MAC_ADDR_LEN);
1528                 pAd->MacTab.Content[BSSID_WCID].Aid = BSSID_WCID;
1529                 pAd->MacTab.Content[BSSID_WCID].pAd = pAd;
1530                 pAd->MacTab.Content[BSSID_WCID].ValidAsCLI = TRUE;      //Although this is bssid..still set ValidAsCl
1531                 pAd->MacTab.Size = 1;   // infra mode always set MACtab size =1.
1532                 pAd->MacTab.Content[BSSID_WCID].Sst = SST_ASSOC;
1533                 pAd->MacTab.Content[BSSID_WCID].AuthState = SST_ASSOC;
1534                 pAd->MacTab.Content[BSSID_WCID].WepStatus = pAd->StaCfg.WepStatus;
1535         NdisReleaseSpinLock(&pAd->MacTabLock);
1536
1537                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!!  ClientStatusFlags=%lx)\n",
1538                         pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
1539
1540                 MlmeUpdateTxRates(pAd, TRUE, BSS0);
1541 #ifdef DOT11_N_SUPPORT
1542                 MlmeUpdateHtTxRates(pAd, BSS0);
1543                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !! (StaActive.bHtEnable =%d, )\n", pAd->StaActive.SupportedPhyInfo.bHtEnable));
1544 #endif // DOT11_N_SUPPORT //
1545
1546                 if (pAd->CommonCfg.bAggregationCapable)
1547                 {
1548                         if ((pAd->CommonCfg.bPiggyBackCapable) && (pAd->MlmeAux.APRalinkIe & 0x00000003) == 3)
1549                         {
1550
1551                                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_PIGGYBACK_INUSED);
1552                                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1553                 RTMPSetPiggyBack(pAd, TRUE);
1554                                 DBGPRINT(RT_DEBUG_TRACE, ("Turn on Piggy-Back\n"));
1555                         }
1556                         else if (pAd->MlmeAux.APRalinkIe & 0x00000001)
1557                         {
1558                                 OPSTATUS_SET_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1559                         }
1560                 }
1561
1562                 if (pAd->MlmeAux.APRalinkIe != 0x0)
1563                 {
1564 #ifdef DOT11_N_SUPPORT
1565                         if (CLIENT_STATUS_TEST_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RDG_CAPABLE))
1566                         {
1567                                 AsicEnableRDG(pAd);
1568                         }
1569 #endif // DOT11_N_SUPPORT //
1570                         OPSTATUS_SET_FLAG(pAd, fCLIENT_STATUS_RALINK_CHIPSET);
1571                         CLIENT_STATUS_SET_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RALINK_CHIPSET);
1572                 }
1573                 else
1574                 {
1575                         OPSTATUS_CLEAR_FLAG(pAd, fCLIENT_STATUS_RALINK_CHIPSET);
1576                         CLIENT_STATUS_CLEAR_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RALINK_CHIPSET);
1577                 }
1578         }
1579
1580 #ifdef DOT11_N_SUPPORT
1581         DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_CONNECT Event B!.BACapability = %x. ClientStatusFlags = %lx\n", pAd->CommonCfg.BACapability.word, pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
1582 #endif // DOT11_N_SUPPORT //
1583
1584         // Set LED
1585         RTMPSetLED(pAd, LED_LINK_UP);
1586
1587         pAd->Mlme.PeriodicRound = 0;
1588         pAd->Mlme.OneSecPeriodicRound = 0;
1589         pAd->bConfigChanged = FALSE;        // Reset config flag
1590         pAd->ExtraInfo = GENERAL_LINK_UP;   // Update extra information to link is up
1591
1592         // Set asic auto fall back
1593         {
1594                 PUCHAR                                  pTable;
1595                 UCHAR                                   TableSize = 0;
1596
1597                 MlmeSelectTxRateTable(pAd, &pAd->MacTab.Content[BSSID_WCID], &pTable, &TableSize, &pAd->CommonCfg.TxRateIndex);
1598                 AsicUpdateAutoFallBackTable(pAd, pTable);
1599         }
1600
1601         NdisAcquireSpinLock(&pAd->MacTabLock);
1602     pEntry->HTPhyMode.word = pAd->StaCfg.HTPhyMode.word;
1603     pEntry->MaxHTPhyMode.word = pAd->StaCfg.HTPhyMode.word;
1604         if (pAd->StaCfg.bAutoTxRateSwitch == FALSE)
1605         {
1606                 pEntry->bAutoTxRateSwitch = FALSE;
1607 #ifdef DOT11_N_SUPPORT
1608                 if (pEntry->HTPhyMode.field.MCS == 32)
1609                         pEntry->HTPhyMode.field.ShortGI = GI_800;
1610
1611                 if ((pEntry->HTPhyMode.field.MCS > MCS_7) || (pEntry->HTPhyMode.field.MCS == 32))
1612                         pEntry->HTPhyMode.field.STBC = STBC_NONE;
1613 #endif // DOT11_N_SUPPORT //
1614                 // If the legacy mode is set, overwrite the transmit setting of this entry.
1615                 if (pEntry->HTPhyMode.field.MODE <= MODE_OFDM)
1616                         RTMPUpdateLegacyTxSetting((UCHAR)pAd->StaCfg.DesiredTransmitSetting.field.FixedTxMode, pEntry);
1617         }
1618         else
1619                 pEntry->bAutoTxRateSwitch = TRUE;
1620         NdisReleaseSpinLock(&pAd->MacTabLock);
1621
1622         //  Let Link Status Page display first initial rate.
1623         pAd->LastTxRate = (USHORT)(pEntry->HTPhyMode.word);
1624         // Select DAC according to HT or Legacy
1625         if (pAd->StaActive.SupportedPhyInfo.MCSSet[0] != 0x00)
1626         {
1627                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &Value);
1628                 Value &= (~0x18);
1629                 if (pAd->Antenna.field.TxPath == 2)
1630                 {
1631                     Value |= 0x10;
1632                 }
1633                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, Value);
1634         }
1635         else
1636         {
1637                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &Value);
1638                 Value &= (~0x18);
1639                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, Value);
1640         }
1641
1642 #ifdef DOT11_N_SUPPORT
1643         if (pAd->StaActive.SupportedPhyInfo.bHtEnable == FALSE)
1644         {
1645         }
1646         else if (pEntry->MaxRAmpduFactor == 0)
1647         {
1648             // If HT AP doesn't support MaxRAmpduFactor = 1, we need to set max PSDU to 0.
1649             // Because our Init value is 1 at MACRegTable.
1650                 RTMP_IO_WRITE32(pAd, MAX_LEN_CFG, 0x0fff);
1651         }
1652 #endif // DOT11_N_SUPPORT //
1653
1654         // Patch for Marvel AP to gain high throughput
1655         // Need to set as following,
1656         // 1. Set txop in register-EDCA_AC0_CFG as 0x60
1657         // 2. Set EnTXWriteBackDDONE in register-WPDMA_GLO_CFG as zero
1658         // 3. PBF_MAX_PCNT as 0x1F3FBF9F
1659         // 4. kick per two packets when dequeue
1660         //
1661         // Txop can only be modified when RDG is off, WMM is disable and TxBurst is enable
1662         //
1663         // if 1. Legacy AP WMM on,  or 2. 11n AP, AMPDU disable.  Force turn off burst no matter what bEnableTxBurst is.
1664 #ifdef DOT11_N_SUPPORT
1665         if (((pAd->StaActive.SupportedPhyInfo.bHtEnable == FALSE) && (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_WMM_INUSED)))
1666                 || ((pAd->StaActive.SupportedPhyInfo.bHtEnable == TRUE) && (pAd->CommonCfg.BACapability.field.Policy == BA_NOTUSE)))
1667         {
1668                 RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
1669                 Data  &= 0xFFFFFF00;
1670                 RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
1671
1672                 RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3F7F9F);
1673                 DBGPRINT(RT_DEBUG_TRACE, ("Txburst 1\n"));
1674         }
1675         else
1676 #endif // DOT11_N_SUPPORT //
1677         if (pAd->CommonCfg.bEnableTxBurst)
1678         {
1679                 RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
1680                 Data  &= 0xFFFFFF00;
1681                 Data  |= 0x60;
1682                 RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
1683                 pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = TRUE;
1684
1685                 RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3FBF9F);
1686                 DBGPRINT(RT_DEBUG_TRACE, ("Txburst 2\n"));
1687         }
1688         else
1689         {
1690                 RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
1691                 Data  &= 0xFFFFFF00;
1692                 RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
1693
1694                 RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3F7F9F);
1695                 DBGPRINT(RT_DEBUG_TRACE, ("Txburst 3\n"));
1696         }
1697
1698 #ifdef DOT11_N_SUPPORT
1699         // Re-check to turn on TX burst or not.
1700         if ((pAd->CommonCfg.IOTestParm.bLastAtheros == TRUE) && ((STA_WEP_ON(pAd))||(STA_TKIP_ON(pAd))))
1701         {
1702                 pAd->CommonCfg.IOTestParm.bNextDisableRxBA = TRUE;
1703                 if (pAd->CommonCfg.bEnableTxBurst)
1704                 {
1705                     UINT32 MACValue = 0;
1706                         // Force disable  TXOP value in this case. The same action in MLMEUpdateProtect too.
1707                         // I didn't change PBF_MAX_PCNT setting.
1708                         RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &MACValue);
1709                         MACValue  &= 0xFFFFFF00;
1710                         RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, MACValue);
1711                         pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = FALSE;
1712                 }
1713         }
1714         else
1715         {
1716                 pAd->CommonCfg.IOTestParm.bNextDisableRxBA = FALSE;
1717         }
1718 #endif // DOT11_N_SUPPORT //
1719
1720         pAd->CommonCfg.IOTestParm.bLastAtheros = FALSE;
1721         COPY_MAC_ADDR(pAd->CommonCfg.LastBssid, pAd->CommonCfg.Bssid);
1722         DBGPRINT(RT_DEBUG_TRACE, ("!!!pAd->bNextDisableRxBA= %d \n", pAd->CommonCfg.IOTestParm.bNextDisableRxBA));
1723         // BSSID add in one MAC entry too.  Because in Tx, ASIC need to check Cipher and IV/EIV, BAbitmap
1724         // Pther information in MACTab.Content[BSSID_WCID] is not necessary for driver.
1725         // Note: As STA, The MACTab.Content[BSSID_WCID]. PairwiseKey and Shared Key for BSS0 are the same.
1726
1727     if (pAd->StaCfg.WepStatus <= Ndis802_11WEPDisabled)
1728     {
1729         pAd->StaCfg.PortSecured = WPA_802_1X_PORT_SECURED;
1730                 pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilterAcceptAll;
1731         }
1732
1733         NdisAcquireSpinLock(&pAd->MacTabLock);
1734         pEntry->PortSecured = pAd->StaCfg.PortSecured;
1735         NdisReleaseSpinLock(&pAd->MacTabLock);
1736
1737     //
1738         // Patch Atheros AP TX will breakdown issue.
1739         // AP Model: DLink DWL-8200AP
1740         //
1741         if (INFRA_ON(pAd) && OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_WMM_INUSED) && STA_TKIP_ON(pAd))
1742         {
1743                 RTMP_IO_WRITE32(pAd, RX_PARSER_CFG, 0x01);
1744         }
1745         else
1746         {
1747                 RTMP_IO_WRITE32(pAd, RX_PARSER_CFG, 0x00);
1748         }
1749
1750         RTMP_CLEAR_FLAG(pAd, fRTMP_ADAPTER_BSS_SCAN_IN_PROGRESS);
1751 }
1752
1753 /*
1754         ==========================================================================
1755
1756         Routine Description:
1757                 Disconnect current BSSID
1758
1759         Arguments:
1760                 pAd                             - Pointer to our adapter
1761                 IsReqFromAP             - Request from AP
1762
1763         Return Value:
1764                 None
1765
1766         IRQL = DISPATCH_LEVEL
1767
1768         Note:
1769                 We need more information to know it's this requst from AP.
1770                 If yes! we need to do extra handling, for example, remove the WPA key.
1771                 Otherwise on 4-way handshaking will faied, since the WPA key didn't be
1772                 remove while auto reconnect.
1773                 Disconnect request from AP, it means we will start afresh 4-way handshaking
1774                 on WPA mode.
1775
1776         ==========================================================================
1777 */
1778 VOID LinkDown(
1779         IN PRTMP_ADAPTER pAd,
1780         IN  BOOLEAN      IsReqFromAP)
1781 {
1782         UCHAR                       i, ByteValue = 0;
1783
1784         // Do nothing if monitor mode is on
1785         if (MONITOR_ON(pAd))
1786                 return;
1787
1788     if (pAd->CommonCfg.bWirelessEvent)
1789         {
1790                 RTMPSendWirelessEvent(pAd, IW_STA_LINKDOWN_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
1791         }
1792
1793         DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN !!!\n"));
1794         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
1795
1796         if (ADHOC_ON(pAd))              // Adhoc mode link down
1797         {
1798                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN 1!!!\n"));
1799
1800                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_ADHOC_ON);
1801                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
1802                 pAd->IndicateMediaState = NdisMediaStateDisconnected;
1803                 RTMP_IndicateMediaState(pAd);
1804         pAd->ExtraInfo = GENERAL_LINK_DOWN;
1805                 BssTableDeleteEntry(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Channel);
1806                 DBGPRINT(RT_DEBUG_TRACE, ("!!! MacTab.Size=%d !!!\n", pAd->MacTab.Size));
1807         }
1808         else                                    // Infra structure mode
1809         {
1810                 DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN 2!!!\n"));
1811
1812                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_INFRA_ON);
1813                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
1814
1815                 // Saved last SSID for linkup comparison
1816                 pAd->CommonCfg.LastSsidLen = pAd->CommonCfg.SsidLen;
1817                 NdisMoveMemory(pAd->CommonCfg.LastSsid, pAd->CommonCfg.Ssid, pAd->CommonCfg.LastSsidLen);
1818                 COPY_MAC_ADDR(pAd->CommonCfg.LastBssid, pAd->CommonCfg.Bssid);
1819                 if (pAd->MlmeAux.CurrReqIsFromNdis == TRUE)
1820                 {
1821                         pAd->IndicateMediaState = NdisMediaStateDisconnected;
1822                         RTMP_IndicateMediaState(pAd);
1823             pAd->ExtraInfo = GENERAL_LINK_DOWN;
1824                         DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event A!\n"));
1825                         pAd->MlmeAux.CurrReqIsFromNdis = FALSE;
1826                 }
1827                 else
1828                 {
1829             //
1830                         // If disassociation request is from NDIS, then we don't need to delete BSSID from entry.
1831                         // Otherwise lost beacon or receive De-Authentication from AP,
1832                         // then we should delete BSSID from BssTable.
1833                         // If we don't delete from entry, roaming will fail.
1834                         //
1835                         BssTableDeleteEntry(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Channel);
1836                 }
1837
1838                 // restore back to -
1839                 //      1. long slot (20 us) or short slot (9 us) time
1840                 //      2. turn on/off RTS/CTS and/or CTS-to-self protection
1841                 //      3. short preamble
1842                 OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_BG_PROTECTION_INUSED);
1843
1844                 if (pAd->StaCfg.CCXAdjacentAPReportFlag == TRUE)
1845                 {
1846                         //
1847                         // Record current AP's information.
1848                         // for later used reporting Adjacent AP report.
1849                         //
1850                         pAd->StaCfg.CCXAdjacentAPChannel = pAd->CommonCfg.Channel;
1851                         pAd->StaCfg.CCXAdjacentAPSsidLen = pAd->CommonCfg.SsidLen;
1852                         NdisMoveMemory(pAd->StaCfg.CCXAdjacentAPSsid, pAd->CommonCfg.Ssid, pAd->StaCfg.CCXAdjacentAPSsidLen);
1853                         COPY_MAC_ADDR(pAd->StaCfg.CCXAdjacentAPBssid, pAd->CommonCfg.Bssid);
1854                 }
1855         }
1856
1857         for (i=1; i<MAX_LEN_OF_MAC_TABLE; i++)
1858         {
1859                 if (pAd->MacTab.Content[i].ValidAsCLI == TRUE)
1860                         MacTableDeleteEntry(pAd, pAd->MacTab.Content[i].Aid, pAd->MacTab.Content[i].Addr);
1861         }
1862
1863         pAd->StaCfg.CCXQosECWMin        = 4;
1864         pAd->StaCfg.CCXQosECWMax        = 10;
1865
1866         AsicSetSlotTime(pAd, TRUE); //FALSE);
1867         AsicSetEdcaParm(pAd, NULL);
1868
1869         // Set LED
1870         RTMPSetLED(pAd, LED_LINK_DOWN);
1871     pAd->LedIndicatorStregth = 0xF0;
1872     RTMPSetSignalLED(pAd, -100);        // Force signal strength Led to be turned off, firmware is not done it.
1873
1874                 AsicDisableSync(pAd);
1875
1876         pAd->Mlme.PeriodicRound = 0;
1877         pAd->Mlme.OneSecPeriodicRound = 0;
1878
1879         if (pAd->StaCfg.BssType == BSS_INFRA)
1880         {
1881                 // Remove StaCfg Information after link down
1882                 NdisZeroMemory(pAd->CommonCfg.Bssid, MAC_ADDR_LEN);
1883                 NdisZeroMemory(pAd->CommonCfg.Ssid, MAX_LEN_OF_SSID);
1884                 pAd->CommonCfg.SsidLen = 0;
1885         }
1886 #ifdef DOT11_N_SUPPORT
1887         NdisZeroMemory(&pAd->MlmeAux.HtCapability, sizeof(HT_CAPABILITY_IE));
1888         NdisZeroMemory(&pAd->MlmeAux.AddHtInfo, sizeof(ADD_HT_INFO_IE));
1889         pAd->MlmeAux.HtCapabilityLen = 0;
1890         pAd->MlmeAux.NewExtChannelOffset = 0xff;
1891 #endif // DOT11_N_SUPPORT //
1892
1893         // Reset WPA-PSK state. Only reset when supplicant enabled
1894         if (pAd->StaCfg.WpaState != SS_NOTUSE)
1895         {
1896                 pAd->StaCfg.WpaState = SS_START;
1897                 // Clear Replay counter
1898                 NdisZeroMemory(pAd->StaCfg.ReplayCounter, 8);
1899         }
1900
1901
1902         //
1903         // if link down come from AP, we need to remove all WPA keys on WPA mode.
1904         // otherwise will cause 4-way handshaking failed, since the WPA key not empty.
1905         //
1906         if ((IsReqFromAP) && (pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA))
1907         {
1908                 // Remove all WPA keys
1909                 RTMPWPARemoveAllKeys(pAd);
1910         }
1911
1912         // 802.1x port control
1913
1914         // Prevent clear PortSecured here with static WEP
1915         // NetworkManger set security policy first then set SSID to connect AP.
1916         if (pAd->StaCfg.WpaSupplicantUP &&
1917                 (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled) &&
1918                 (pAd->StaCfg.IEEE8021X == FALSE))
1919         {
1920                 pAd->StaCfg.PortSecured = WPA_802_1X_PORT_SECURED;
1921         }
1922         else
1923         {
1924                 pAd->StaCfg.PortSecured = WPA_802_1X_PORT_NOT_SECURED;
1925                 pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilter8021xWEP;
1926         }
1927
1928         NdisAcquireSpinLock(&pAd->MacTabLock);
1929         pAd->MacTab.Content[BSSID_WCID].PortSecured = pAd->StaCfg.PortSecured;
1930         NdisReleaseSpinLock(&pAd->MacTabLock);
1931
1932         pAd->StaCfg.MicErrCnt = 0;
1933
1934         // Turn off Ckip control flag
1935         pAd->StaCfg.bCkipOn = FALSE;
1936         pAd->StaCfg.CCXEnable = FALSE;
1937
1938     pAd->IndicateMediaState = NdisMediaStateDisconnected;
1939         // Update extra information to link is up
1940         pAd->ExtraInfo = GENERAL_LINK_DOWN;
1941
1942     //pAd->StaCfg.AdhocBOnlyJoined = FALSE;
1943         //pAd->StaCfg.AdhocBGJoined = FALSE;
1944         //pAd->StaCfg.Adhoc20NJoined = FALSE;
1945     pAd->StaActive.SupportedPhyInfo.bHtEnable = FALSE;
1946
1947         // Reset the Current AP's IP address
1948         NdisZeroMemory(pAd->StaCfg.AironetIPAddress, 4);
1949 #ifdef RT2870
1950         pAd->bUsbTxBulkAggre = FALSE;
1951 #endif // RT2870 //
1952
1953         // Clean association information
1954         NdisZeroMemory(&pAd->StaCfg.AssocInfo, sizeof(NDIS_802_11_ASSOCIATION_INFORMATION));
1955         pAd->StaCfg.AssocInfo.Length = sizeof(NDIS_802_11_ASSOCIATION_INFORMATION);
1956         pAd->StaCfg.ReqVarIELen = 0;
1957         pAd->StaCfg.ResVarIELen = 0;
1958
1959         //
1960         // Reset RSSI value after link down
1961         //
1962         pAd->StaCfg.RssiSample.AvgRssi0 = 0;
1963         pAd->StaCfg.RssiSample.AvgRssi0X8 = 0;
1964         pAd->StaCfg.RssiSample.AvgRssi1 = 0;
1965         pAd->StaCfg.RssiSample.AvgRssi1X8 = 0;
1966         pAd->StaCfg.RssiSample.AvgRssi2 = 0;
1967         pAd->StaCfg.RssiSample.AvgRssi2X8 = 0;
1968
1969         // Restore MlmeRate
1970         pAd->CommonCfg.MlmeRate = pAd->CommonCfg.BasicMlmeRate;
1971         pAd->CommonCfg.RtsRate = pAd->CommonCfg.BasicMlmeRate;
1972
1973 #ifdef DOT11_N_SUPPORT
1974         //
1975         // After Link down, reset piggy-back setting in ASIC. Disable RDG.
1976         //
1977         if (pAd->CommonCfg.BBPCurrentBW == BW_40)
1978         {
1979                 pAd->CommonCfg.BBPCurrentBW = BW_20;
1980                 RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &ByteValue);
1981                 ByteValue &= (~0x18);
1982                 RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, ByteValue);
1983         }
1984 #endif // DOT11_N_SUPPORT //
1985         // Reset DAC
1986         RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &ByteValue);
1987         ByteValue &= (~0x18);
1988         if (pAd->Antenna.field.TxPath == 2)
1989         {
1990                 ByteValue |= 0x10;
1991         }
1992         RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, ByteValue);
1993
1994         RTMPSetPiggyBack(pAd,FALSE);
1995         OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_PIGGYBACK_INUSED);
1996
1997 #ifdef DOT11_N_SUPPORT
1998         pAd->CommonCfg.BACapability.word = pAd->CommonCfg.REGBACapability.word;
1999 #endif // DOT11_N_SUPPORT //
2000
2001         // Restore all settings in the following.
2002         AsicUpdateProtect(pAd, 0, (ALLN_SETPROTECT|CCKSETPROTECT|OFDMSETPROTECT), TRUE, FALSE);
2003         AsicDisableRDG(pAd);
2004         pAd->CommonCfg.IOTestParm.bCurrentAtheros = FALSE;
2005         pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = FALSE;
2006
2007         RTMP_IO_WRITE32(pAd, MAX_LEN_CFG, 0x1fff);
2008         RTMP_CLEAR_FLAG(pAd, fRTMP_ADAPTER_BSS_SCAN_IN_PROGRESS);
2009
2010         {
2011                 union iwreq_data    wrqu;
2012                 memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
2013                 wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
2014         }
2015 }
2016
2017 /*
2018         ==========================================================================
2019         Description:
2020
2021         IRQL = DISPATCH_LEVEL
2022
2023         ==========================================================================
2024 */
2025 VOID IterateOnBssTab(
2026         IN PRTMP_ADAPTER pAd)
2027 {
2028         MLME_START_REQ_STRUCT   StartReq;
2029         MLME_JOIN_REQ_STRUCT    JoinReq;
2030         ULONG                   BssIdx;
2031
2032         // Change the wepstatus to original wepstatus
2033         pAd->StaCfg.WepStatus   = pAd->StaCfg.OrigWepStatus;
2034         pAd->StaCfg.PairCipher  = pAd->StaCfg.OrigWepStatus;
2035         pAd->StaCfg.GroupCipher = pAd->StaCfg.OrigWepStatus;
2036
2037         BssIdx = pAd->MlmeAux.BssIdx;
2038         if (BssIdx < pAd->MlmeAux.SsidBssTab.BssNr)
2039         {
2040                 // Check cipher suite, AP must have more secured cipher than station setting
2041                 // Set the Pairwise and Group cipher to match the intended AP setting
2042                 // We can only connect to AP with less secured cipher setting
2043                 if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK))
2044                 {
2045                         pAd->StaCfg.GroupCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.GroupCipher;
2046
2047                         if (pAd->StaCfg.WepStatus == pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipher)
2048                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipher;
2049                         else if (pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipherAux != Ndis802_11WEPDisabled)
2050                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipherAux;
2051                         else    // There is no PairCipher Aux, downgrade our capability to TKIP
2052                                 pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
2053                 }
2054                 else if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK))
2055                 {
2056                         pAd->StaCfg.GroupCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.GroupCipher;
2057
2058                         if (pAd->StaCfg.WepStatus == pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipher)
2059                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipher;
2060                         else if (pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipherAux != Ndis802_11WEPDisabled)
2061                                 pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipherAux;
2062                         else    // There is no PairCipher Aux, downgrade our capability to TKIP
2063                                 pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
2064
2065                         // RSN capability
2066                         pAd->StaCfg.RsnCapability = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.RsnCapability;
2067                 }
2068
2069                 // Set Mix cipher flag
2070                 pAd->StaCfg.bMixCipher = (pAd->StaCfg.PairCipher == pAd->StaCfg.GroupCipher) ? FALSE : TRUE;
2071                 if (pAd->StaCfg.bMixCipher == TRUE)
2072                 {
2073                         // If mix cipher, re-build RSNIE
2074                         RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, 0);
2075                 }
2076
2077                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - iterate BSS %ld of %d\n", BssIdx, pAd->MlmeAux.SsidBssTab.BssNr));
2078                 JoinParmFill(pAd, &JoinReq, BssIdx);
2079                 MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_JOIN_REQ, sizeof(MLME_JOIN_REQ_STRUCT),
2080                                         &JoinReq);
2081                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_JOIN;
2082         }
2083         else if (pAd->StaCfg.BssType == BSS_ADHOC)
2084         {
2085                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All BSS fail; start a new ADHOC (Ssid=%s)...\n",pAd->MlmeAux.Ssid));
2086                 StartParmFill(pAd, &StartReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
2087                 MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_START_REQ, sizeof(MLME_START_REQ_STRUCT), &StartReq);
2088                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_START;
2089         }
2090         else // no more BSS
2091         {
2092                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All roaming failed, stay @ ch #%d\n", pAd->CommonCfg.Channel));
2093                 AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
2094                 AsicLockChannel(pAd, pAd->CommonCfg.Channel);
2095                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
2096         }
2097 }
2098
2099 // for re-association only
2100 // IRQL = DISPATCH_LEVEL
2101 VOID IterateOnBssTab2(
2102         IN PRTMP_ADAPTER pAd)
2103 {
2104         MLME_REASSOC_REQ_STRUCT ReassocReq;
2105         ULONG                   BssIdx;
2106         BSS_ENTRY               *pBss;
2107
2108         BssIdx = pAd->MlmeAux.RoamIdx;
2109         pBss = &pAd->MlmeAux.RoamTab.BssEntry[BssIdx];
2110
2111         if (BssIdx < pAd->MlmeAux.RoamTab.BssNr)
2112         {
2113                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - iterate BSS %ld of %d\n", BssIdx, pAd->MlmeAux.RoamTab.BssNr));
2114
2115                 AsicSwitchChannel(pAd, pBss->Channel, FALSE);
2116                 AsicLockChannel(pAd, pBss->Channel);
2117
2118                 // reassociate message has the same structure as associate message
2119                 AssocParmFill(pAd, &ReassocReq, pBss->Bssid, pBss->CapabilityInfo,
2120                                           ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
2121                 MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_REASSOC_REQ,
2122                                         sizeof(MLME_REASSOC_REQ_STRUCT), &ReassocReq);
2123
2124                 pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_REASSOC;
2125         }
2126         else // no more BSS
2127         {
2128                 DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All fast roaming failed, back to ch #%d\n",pAd->CommonCfg.Channel));
2129                 AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
2130                 AsicLockChannel(pAd, pAd->CommonCfg.Channel);
2131                 pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
2132         }
2133 }
2134
2135 /*
2136         ==========================================================================
2137         Description:
2138
2139         IRQL = DISPATCH_LEVEL
2140
2141         ==========================================================================
2142 */
2143 VOID JoinParmFill(
2144         IN PRTMP_ADAPTER pAd,
2145         IN OUT MLME_JOIN_REQ_STRUCT *JoinReq,
2146         IN ULONG BssIdx)
2147 {
2148         JoinReq->BssIdx = BssIdx;
2149 }
2150
2151 /*
2152         ==========================================================================
2153         Description:
2154
2155         IRQL = DISPATCH_LEVEL
2156
2157         ==========================================================================
2158 */
2159 VOID ScanParmFill(
2160         IN PRTMP_ADAPTER pAd,
2161         IN OUT MLME_SCAN_REQ_STRUCT *ScanReq,
2162         IN CHAR Ssid[],
2163         IN UCHAR SsidLen,
2164         IN UCHAR BssType,
2165         IN UCHAR ScanType)
2166 {
2167     NdisZeroMemory(ScanReq->Ssid, MAX_LEN_OF_SSID);
2168         ScanReq->SsidLen = SsidLen;
2169         NdisMoveMemory(ScanReq->Ssid, Ssid, SsidLen);
2170         ScanReq->BssType = BssType;
2171         ScanReq->ScanType = ScanType;
2172 }
2173
2174 /*
2175         ==========================================================================
2176         Description:
2177
2178         IRQL = DISPATCH_LEVEL
2179
2180         ==========================================================================
2181 */
2182 VOID StartParmFill(
2183         IN PRTMP_ADAPTER pAd,
2184         IN OUT MLME_START_REQ_STRUCT *StartReq,
2185         IN CHAR Ssid[],
2186         IN UCHAR SsidLen)
2187 {
2188         ASSERT(SsidLen <= MAX_LEN_OF_SSID);
2189         NdisMoveMemory(StartReq->Ssid, Ssid, SsidLen);
2190         StartReq->SsidLen = SsidLen;
2191 }
2192
2193 /*
2194         ==========================================================================
2195         Description:
2196
2197         IRQL = DISPATCH_LEVEL
2198
2199         ==========================================================================
2200 */
2201 VOID AuthParmFill(
2202         IN PRTMP_ADAPTER pAd,
2203         IN OUT MLME_AUTH_REQ_STRUCT *AuthReq,
2204         IN PUCHAR pAddr,
2205         IN USHORT Alg)
2206 {
2207         COPY_MAC_ADDR(AuthReq->Addr, pAddr);
2208         AuthReq->Alg = Alg;
2209         AuthReq->Timeout = AUTH_TIMEOUT;
2210 }
2211
2212 /*
2213         ==========================================================================
2214         Description:
2215
2216         IRQL = DISPATCH_LEVEL
2217
2218         ==========================================================================
2219  */
2220
2221
2222 #ifdef RT2870
2223
2224 VOID MlmeCntlConfirm(
2225         IN PRTMP_ADAPTER pAd,
2226         IN ULONG MsgType,
2227         IN USHORT Msg)
2228 {
2229         MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MsgType, sizeof(USHORT), &Msg);
2230 }
2231
2232 VOID ComposePsPoll(
2233         IN PRTMP_ADAPTER pAd)
2234 {
2235         PTXINFO_STRUC           pTxInfo;
2236         PTXWI_STRUC             pTxWI;
2237
2238         DBGPRINT(RT_DEBUG_TRACE, ("ComposePsPoll\n"));
2239         NdisZeroMemory(&pAd->PsPollFrame, sizeof(PSPOLL_FRAME));
2240
2241         pAd->PsPollFrame.FC.PwrMgmt = 0;
2242         pAd->PsPollFrame.FC.Type = BTYPE_CNTL;
2243         pAd->PsPollFrame.FC.SubType = SUBTYPE_PS_POLL;
2244         pAd->PsPollFrame.Aid = pAd->StaActive.Aid | 0xC000;
2245         COPY_MAC_ADDR(pAd->PsPollFrame.Bssid, pAd->CommonCfg.Bssid);
2246         COPY_MAC_ADDR(pAd->PsPollFrame.Ta, pAd->CurrentAddress);
2247
2248         RTMPZeroMemory(&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[0], 100);
2249         pTxInfo = (PTXINFO_STRUC)&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[0];
2250         RTMPWriteTxInfo(pAd, pTxInfo, (USHORT)(sizeof(PSPOLL_FRAME)+TXWI_SIZE), TRUE, EpToQueue[MGMTPIPEIDX], FALSE,  FALSE);
2251         pTxWI = (PTXWI_STRUC)&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[TXINFO_SIZE];
2252         RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, FALSE, FALSE, TRUE, FALSE, 0, BSSID_WCID, (sizeof(PSPOLL_FRAME)),
2253                 0,  0, (UCHAR)pAd->CommonCfg.MlmeTransmit.field.MCS, IFS_BACKOFF, FALSE, &pAd->CommonCfg.MlmeTransmit);
2254         RTMPMoveMemory(&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[TXWI_SIZE+TXINFO_SIZE], &pAd->PsPollFrame, sizeof(PSPOLL_FRAME));
2255         // Append 4 extra zero bytes.
2256         pAd->PsPollContext.BulkOutSize =  TXINFO_SIZE + TXWI_SIZE + sizeof(PSPOLL_FRAME) + 4;
2257 }
2258
2259 // IRQL = DISPATCH_LEVEL
2260 VOID ComposeNullFrame(
2261         IN PRTMP_ADAPTER pAd)
2262 {
2263         PTXINFO_STRUC           pTxInfo;
2264         PTXWI_STRUC             pTxWI;
2265
2266         NdisZeroMemory(&pAd->NullFrame, sizeof(HEADER_802_11));
2267         pAd->NullFrame.FC.Type = BTYPE_DATA;
2268         pAd->NullFrame.FC.SubType = SUBTYPE_NULL_FUNC;
2269         pAd->NullFrame.FC.ToDs = 1;
2270         COPY_MAC_ADDR(pAd->NullFrame.Addr1, pAd->CommonCfg.Bssid);
2271         COPY_MAC_ADDR(pAd->NullFrame.Addr2, pAd->CurrentAddress);
2272         COPY_MAC_ADDR(pAd->NullFrame.Addr3, pAd->CommonCfg.Bssid);
2273         RTMPZeroMemory(&pAd->NullContext.TransferBuffer->field.WirelessPacket[0], 100);
2274         pTxInfo = (PTXINFO_STRUC)&pAd->NullContext.TransferBuffer->field.WirelessPacket[0];
2275         RTMPWriteTxInfo(pAd, pTxInfo, (USHORT)(sizeof(HEADER_802_11)+TXWI_SIZE), TRUE, EpToQueue[MGMTPIPEIDX], FALSE,  FALSE);
2276         pTxWI = (PTXWI_STRUC)&pAd->NullContext.TransferBuffer->field.WirelessPacket[TXINFO_SIZE];
2277         RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, FALSE, FALSE, TRUE, FALSE, 0, BSSID_WCID, (sizeof(HEADER_802_11)),
2278                 0, 0, (UCHAR)pAd->CommonCfg.MlmeTransmit.field.MCS, IFS_BACKOFF, FALSE, &pAd->CommonCfg.MlmeTransmit);
2279         RTMPMoveMemory(&pAd->NullContext.TransferBuffer->field.WirelessPacket[TXWI_SIZE+TXINFO_SIZE], &pAd->NullFrame, sizeof(HEADER_802_11));
2280         pAd->NullContext.BulkOutSize =  TXINFO_SIZE + TXWI_SIZE + sizeof(pAd->NullFrame) + 4;
2281 }
2282 #endif // RT2870 //
2283
2284
2285 /*
2286         ==========================================================================
2287         Description:
2288                 Pre-build a BEACON frame in the shared memory
2289
2290         IRQL = PASSIVE_LEVEL
2291         IRQL = DISPATCH_LEVEL
2292
2293         ==========================================================================
2294 */
2295 ULONG MakeIbssBeacon(
2296         IN PRTMP_ADAPTER pAd)
2297 {
2298         UCHAR         DsLen = 1, IbssLen = 2;
2299         UCHAR         LocalErpIe[3] = {IE_ERP, 1, 0x04};
2300         HEADER_802_11 BcnHdr;
2301         USHORT        CapabilityInfo;
2302         LARGE_INTEGER FakeTimestamp;
2303         ULONG         FrameLen = 0;
2304         PTXWI_STRUC       pTxWI = &pAd->BeaconTxWI;
2305         CHAR         *pBeaconFrame = pAd->BeaconBuf;
2306         BOOLEAN       Privacy;
2307         UCHAR         SupRate[MAX_LEN_OF_SUPPORTED_RATES];
2308         UCHAR         SupRateLen = 0;
2309         UCHAR         ExtRate[MAX_LEN_OF_SUPPORTED_RATES];
2310         UCHAR         ExtRateLen = 0;
2311         UCHAR         RSNIe = IE_WPA;
2312
2313         if ((pAd->CommonCfg.PhyMode == PHY_11B) && (pAd->CommonCfg.Channel <= 14))
2314         {
2315                 SupRate[0] = 0x82; // 1 mbps
2316                 SupRate[1] = 0x84; // 2 mbps
2317                 SupRate[2] = 0x8b; // 5.5 mbps
2318                 SupRate[3] = 0x96; // 11 mbps
2319                 SupRateLen = 4;
2320                 ExtRateLen = 0;
2321         }
2322         else if (pAd->CommonCfg.Channel > 14)
2323         {
2324                 SupRate[0]  = 0x8C;    // 6 mbps, in units of 0.5 Mbps, basic rate
2325                 SupRate[1]  = 0x12;    // 9 mbps, in units of 0.5 Mbps
2326                 SupRate[2]  = 0x98;    // 12 mbps, in units of 0.5 Mbps, basic rate
2327                 SupRate[3]  = 0x24;    // 18 mbps, in units of 0.5 Mbps
2328                 SupRate[4]  = 0xb0;    // 24 mbps, in units of 0.5 Mbps, basic rate
2329                 SupRate[5]  = 0x48;    // 36 mbps, in units of 0.5 Mbps
2330                 SupRate[6]  = 0x60;    // 48 mbps, in units of 0.5 Mbps
2331                 SupRate[7]  = 0x6c;    // 54 mbps, in units of 0.5 Mbps
2332                 SupRateLen  = 8;
2333                 ExtRateLen  = 0;
2334
2335                 //
2336                 // Also Update MlmeRate & RtsRate for G only & A only
2337                 //
2338                 pAd->CommonCfg.MlmeRate = RATE_6;
2339                 pAd->CommonCfg.RtsRate = RATE_6;
2340                 pAd->CommonCfg.MlmeTransmit.field.MODE = MODE_OFDM;
2341                 pAd->CommonCfg.MlmeTransmit.field.MCS = OfdmRateToRxwiMCS[pAd->CommonCfg.MlmeRate];
2342                 pAd->MacTab.Content[BSS0Mcast_WCID].HTPhyMode.field.MODE = MODE_OFDM;
2343                 pAd->MacTab.Content[BSS0Mcast_WCID].HTPhyMode.field.MCS = OfdmRateToRxwiMCS[pAd->CommonCfg.MlmeRate];
2344         }
2345         else
2346         {
2347                 SupRate[0] = 0x82; // 1 mbps
2348                 SupRate[1] = 0x84; // 2 mbps
2349                 SupRate[2] = 0x8b; // 5.5 mbps
2350                 SupRate[3] = 0x96; // 11 mbps
2351                 SupRateLen = 4;
2352
2353                 ExtRate[0]  = 0x0C;    // 6 mbps, in units of 0.5 Mbps,
2354                 ExtRate[1]  = 0x12;    // 9 mbps, in units of 0.5 Mbps
2355                 ExtRate[2]  = 0x18;    // 12 mbps, in units of 0.5 Mbps,
2356                 ExtRate[3]  = 0x24;    // 18 mbps, in units of 0.5 Mbps
2357                 ExtRate[4]  = 0x30;    // 24 mbps, in units of 0.5 Mbps,
2358                 ExtRate[5]  = 0x48;    // 36 mbps, in units of 0.5 Mbps
2359                 ExtRate[6]  = 0x60;    // 48 mbps, in units of 0.5 Mbps
2360                 ExtRate[7]  = 0x6c;    // 54 mbps, in units of 0.5 Mbps
2361                 ExtRateLen  = 8;
2362         }
2363
2364         pAd->StaActive.SupRateLen = SupRateLen;
2365         NdisMoveMemory(pAd->StaActive.SupRate, SupRate, SupRateLen);
2366         pAd->StaActive.ExtRateLen = ExtRateLen;
2367         NdisMoveMemory(pAd->StaActive.ExtRate, ExtRate, ExtRateLen);
2368
2369         // compose IBSS beacon frame
2370         MgtMacHeaderInit(pAd, &BcnHdr, SUBTYPE_BEACON, 0, BROADCAST_ADDR, pAd->CommonCfg.Bssid);
2371         Privacy = (pAd->StaCfg.WepStatus == Ndis802_11Encryption1Enabled) ||
2372                           (pAd->StaCfg.WepStatus == Ndis802_11Encryption2Enabled) ||
2373                           (pAd->StaCfg.WepStatus == Ndis802_11Encryption3Enabled);
2374         CapabilityInfo = CAP_GENERATE(0, 1, Privacy, (pAd->CommonCfg.TxPreamble == Rt802_11PreambleShort), 0, 0);
2375
2376         MakeOutgoingFrame(pBeaconFrame,                &FrameLen,
2377                                           sizeof(HEADER_802_11),           &BcnHdr,
2378                                           TIMESTAMP_LEN,                   &FakeTimestamp,
2379                                           2,                               &pAd->CommonCfg.BeaconPeriod,
2380                                           2,                               &CapabilityInfo,
2381                                           1,                               &SsidIe,
2382                                           1,                               &pAd->CommonCfg.SsidLen,
2383                                           pAd->CommonCfg.SsidLen,          pAd->CommonCfg.Ssid,
2384                                           1,                               &SupRateIe,
2385                                           1,                               &SupRateLen,
2386                                           SupRateLen,                      SupRate,
2387                                           1,                               &DsIe,
2388                                           1,                               &DsLen,
2389                                           1,                               &pAd->CommonCfg.Channel,
2390                                           1,                               &IbssIe,
2391                                           1,                               &IbssLen,
2392                                           2,                               &pAd->StaActive.AtimWin,
2393                                           END_OF_ARGS);
2394
2395         // add ERP_IE and EXT_RAE IE of in 802.11g
2396         if (ExtRateLen)
2397         {
2398                 ULONG   tmp;
2399
2400                 MakeOutgoingFrame(pBeaconFrame + FrameLen,         &tmp,
2401                                                   3,                               LocalErpIe,
2402                                                   1,                               &ExtRateIe,
2403                                                   1,                               &ExtRateLen,
2404                                                   ExtRateLen,                      ExtRate,
2405                                                   END_OF_ARGS);
2406                 FrameLen += tmp;
2407         }
2408
2409         // If adhoc secruity is set for WPA-None, append the cipher suite IE
2410         if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone)
2411         {
2412                 ULONG tmp;
2413         RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, BSS0);
2414
2415                 MakeOutgoingFrame(pBeaconFrame + FrameLen,              &tmp,
2416                                                   1,                                    &RSNIe,
2417                                                   1,                                    &pAd->StaCfg.RSNIE_Len,
2418                                                   pAd->StaCfg.RSNIE_Len,                pAd->StaCfg.RSN_IE,
2419                                                   END_OF_ARGS);
2420                 FrameLen += tmp;
2421         }
2422
2423 #ifdef DOT11_N_SUPPORT
2424         if ((pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED))
2425         {
2426                 ULONG TmpLen;
2427                 UCHAR HtLen, HtLen1;
2428
2429                 // add HT Capability IE
2430                 HtLen = sizeof(pAd->CommonCfg.HtCapability);
2431                 HtLen1 = sizeof(pAd->CommonCfg.AddHTInfo);
2432
2433                 MakeOutgoingFrame(pBeaconFrame+FrameLen,        &TmpLen,
2434                                                   1,                                            &HtCapIe,
2435                                                   1,                                            &HtLen,
2436                                                   HtLen,                                        &pAd->CommonCfg.HtCapability,
2437                                                   1,                                            &AddHtInfoIe,
2438                                                   1,                                            &HtLen1,
2439                                                   HtLen1,                                       &pAd->CommonCfg.AddHTInfo,
2440                                                   END_OF_ARGS);
2441
2442                 FrameLen += TmpLen;
2443         }
2444 #endif // DOT11_N_SUPPORT //
2445
2446         //beacon use reserved WCID 0xff
2447     if (pAd->CommonCfg.Channel > 14)
2448     {
2449                 RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE,  TRUE, FALSE, FALSE, TRUE, 0, 0xff, FrameLen,
2450                         PID_MGMT, PID_BEACON, RATE_1, IFS_HTTXOP, FALSE, &pAd->CommonCfg.MlmeTransmit);
2451     }
2452     else
2453     {
2454         // Set to use 1Mbps for Adhoc beacon.
2455                 HTTRANSMIT_SETTING Transmit;
2456         Transmit.word = 0;
2457         RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE,  TRUE, FALSE, FALSE, TRUE, 0, 0xff, FrameLen,
2458                 PID_MGMT, PID_BEACON, RATE_1, IFS_HTTXOP, FALSE, &Transmit);
2459     }
2460
2461     DBGPRINT(RT_DEBUG_TRACE, ("MakeIbssBeacon (len=%ld), SupRateLen=%d, ExtRateLen=%d, Channel=%d, PhyMode=%d\n",
2462                                         FrameLen, SupRateLen, ExtRateLen, pAd->CommonCfg.Channel, pAd->CommonCfg.PhyMode));
2463         return FrameLen;
2464 }
2465
2466