summaryrefslogtreecommitdiff
path: root/drivers/staging/rt2860/sta/connect.c
diff options
context:
space:
mode:
Diffstat (limited to 'drivers/staging/rt2860/sta/connect.c')
-rw-r--r--drivers/staging/rt2860/sta/connect.c2613
1 files changed, 0 insertions, 2613 deletions
diff --git a/drivers/staging/rt2860/sta/connect.c b/drivers/staging/rt2860/sta/connect.c
deleted file mode 100644
index 4996258f6ecd..000000000000
--- a/drivers/staging/rt2860/sta/connect.c
+++ /dev/null
@@ -1,2613 +0,0 @@
-/*
- *************************************************************************
- * Ralink Tech Inc.
- * 5F., No.36, Taiyuan St., Jhubei City,
- * Hsinchu County 302,
- * Taiwan, R.O.C.
- *
- * (c) Copyright 2002-2007, Ralink Technology, Inc.
- *
- * This program is free software; you can redistribute it and/or modify *
- * it under the terms of the GNU General Public License as published by *
- * the Free Software Foundation; either version 2 of the License, or *
- * (at your option) any later version. *
- * *
- * This program is distributed in the hope that it will be useful, *
- * but WITHOUT ANY WARRANTY; without even the implied warranty of *
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
- * GNU General Public License for more details. *
- * *
- * You should have received a copy of the GNU General Public License *
- * along with this program; if not, write to the *
- * Free Software Foundation, Inc., *
- * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
- * *
- *************************************************************************
-
- Module Name:
- connect.c
-
- Abstract:
-
- Revision History:
- Who When What
- -------- ---------- ----------------------------------------------
- John 2004-08-08 Major modification from RT2560
- Justin P. Mattock 11/07/2010 Fix typos
-*/
-#include "../rt_config.h"
-
-u8 CipherSuiteWpaNoneTkip[] = {
- 0x00, 0x50, 0xf2, 0x01, /* oui */
- 0x01, 0x00, /* Version */
- 0x00, 0x50, 0xf2, 0x02, /* Multicast */
- 0x01, 0x00, /* Number of unicast */
- 0x00, 0x50, 0xf2, 0x02, /* unicast */
- 0x01, 0x00, /* number of authentication method */
- 0x00, 0x50, 0xf2, 0x00 /* authentication */
-};
-
-u8 CipherSuiteWpaNoneTkipLen =
- (sizeof(CipherSuiteWpaNoneTkip) / sizeof(u8));
-
-u8 CipherSuiteWpaNoneAes[] = {
- 0x00, 0x50, 0xf2, 0x01, /* oui */
- 0x01, 0x00, /* Version */
- 0x00, 0x50, 0xf2, 0x04, /* Multicast */
- 0x01, 0x00, /* Number of unicast */
- 0x00, 0x50, 0xf2, 0x04, /* unicast */
- 0x01, 0x00, /* number of authentication method */
- 0x00, 0x50, 0xf2, 0x00 /* authentication */
-};
-
-u8 CipherSuiteWpaNoneAesLen =
- (sizeof(CipherSuiteWpaNoneAes) / sizeof(u8));
-
-/* The following MACRO is called after 1. starting an new IBSS, 2. successfully JOIN an IBSS, */
-/* or 3. successfully ASSOCIATE to a BSS, 4. successfully RE_ASSOCIATE to a BSS */
-/* All settings successfuly negotiated firing MLME state machines become final settings */
-/* and are copied to pAd->StaActive */
-#define COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(_pAd) \
-{ \
- NdisZeroMemory((_pAd)->CommonCfg.Ssid, MAX_LEN_OF_SSID); \
- (_pAd)->CommonCfg.SsidLen = (_pAd)->MlmeAux.SsidLen; \
- NdisMoveMemory((_pAd)->CommonCfg.Ssid, (_pAd)->MlmeAux.Ssid, (_pAd)->MlmeAux.SsidLen); \
- COPY_MAC_ADDR((_pAd)->CommonCfg.Bssid, (_pAd)->MlmeAux.Bssid); \
- (_pAd)->CommonCfg.Channel = (_pAd)->MlmeAux.Channel; \
- (_pAd)->CommonCfg.CentralChannel = (_pAd)->MlmeAux.CentralChannel; \
- (_pAd)->StaActive.Aid = (_pAd)->MlmeAux.Aid; \
- (_pAd)->StaActive.AtimWin = (_pAd)->MlmeAux.AtimWin; \
- (_pAd)->StaActive.CapabilityInfo = (_pAd)->MlmeAux.CapabilityInfo; \
- (_pAd)->CommonCfg.BeaconPeriod = (_pAd)->MlmeAux.BeaconPeriod; \
- (_pAd)->StaActive.CfpMaxDuration = (_pAd)->MlmeAux.CfpMaxDuration; \
- (_pAd)->StaActive.CfpPeriod = (_pAd)->MlmeAux.CfpPeriod; \
- (_pAd)->StaActive.SupRateLen = (_pAd)->MlmeAux.SupRateLen; \
- NdisMoveMemory((_pAd)->StaActive.SupRate, (_pAd)->MlmeAux.SupRate, (_pAd)->MlmeAux.SupRateLen);\
- (_pAd)->StaActive.ExtRateLen = (_pAd)->MlmeAux.ExtRateLen; \
- NdisMoveMemory((_pAd)->StaActive.ExtRate, (_pAd)->MlmeAux.ExtRate, (_pAd)->MlmeAux.ExtRateLen);\
- NdisMoveMemory(&(_pAd)->CommonCfg.APEdcaParm, &(_pAd)->MlmeAux.APEdcaParm, sizeof(struct rt_edca_parm));\
- NdisMoveMemory(&(_pAd)->CommonCfg.APQosCapability, &(_pAd)->MlmeAux.APQosCapability, sizeof(struct rt_qos_capability_parm));\
- NdisMoveMemory(&(_pAd)->CommonCfg.APQbssLoad, &(_pAd)->MlmeAux.APQbssLoad, sizeof(struct rt_qbss_load_parm));\
- COPY_MAC_ADDR((_pAd)->MacTab.Content[BSSID_WCID].Addr, (_pAd)->MlmeAux.Bssid); \
- (_pAd)->MacTab.Content[BSSID_WCID].Aid = (_pAd)->MlmeAux.Aid; \
- (_pAd)->MacTab.Content[BSSID_WCID].PairwiseKey.CipherAlg = (_pAd)->StaCfg.PairCipher;\
- COPY_MAC_ADDR((_pAd)->MacTab.Content[BSSID_WCID].PairwiseKey.BssId, (_pAd)->MlmeAux.Bssid);\
- (_pAd)->MacTab.Content[BSSID_WCID].RateLen = (_pAd)->StaActive.SupRateLen + (_pAd)->StaActive.ExtRateLen;\
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = PASSIVE_LEVEL
-
- ==========================================================================
-*/
-void MlmeCntlInit(struct rt_rtmp_adapter *pAd,
- struct rt_state_machine *S, OUT STATE_MACHINE_FUNC Trans[])
-{
- /* Control state machine differs from other state machines, the interface */
- /* follows the standard interface */
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void MlmeCntlMachinePerformAction(struct rt_rtmp_adapter *pAd,
- struct rt_state_machine *S,
- struct rt_mlme_queue_elem *Elem)
-{
- switch (pAd->Mlme.CntlMachine.CurrState) {
- case CNTL_IDLE:
- CntlIdleProc(pAd, Elem);
- break;
- case CNTL_WAIT_DISASSOC:
- CntlWaitDisassocProc(pAd, Elem);
- break;
- case CNTL_WAIT_JOIN:
- CntlWaitJoinProc(pAd, Elem);
- break;
-
- /* CNTL_WAIT_REASSOC is the only state in CNTL machine that does */
- /* not triggered directly or indirectly by "RTMPSetInformation(OID_xxx)". */
- /* Therefore not protected by NDIS's "only one outstanding OID request" */
- /* rule. Which means NDIS may SET OID in the middle of ROAMing attempts. */
- /* Current approach is to block new SET request at RTMPSetInformation() */
- /* when CntlMachine.CurrState is not CNTL_IDLE */
- case CNTL_WAIT_REASSOC:
- CntlWaitReassocProc(pAd, Elem);
- break;
-
- case CNTL_WAIT_START:
- CntlWaitStartProc(pAd, Elem);
- break;
- case CNTL_WAIT_AUTH:
- CntlWaitAuthProc(pAd, Elem);
- break;
- case CNTL_WAIT_AUTH2:
- CntlWaitAuthProc2(pAd, Elem);
- break;
- case CNTL_WAIT_ASSOC:
- CntlWaitAssocProc(pAd, Elem);
- break;
-
- case CNTL_WAIT_OID_LIST_SCAN:
- if (Elem->MsgType == MT2_SCAN_CONF) {
- /* Resume TxRing after SCANING complete. We hope the out-of-service time */
- /* won't be too long to let upper layer time-out the waiting frames */
- RTMPResumeMsduTransmission(pAd);
-
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
-
- /* */
- /* Set LED status to previous status. */
- /* */
- if (pAd->bLedOnScanning) {
- pAd->bLedOnScanning = FALSE;
- RTMPSetLED(pAd, pAd->LedStatus);
- }
- }
- break;
-
- case CNTL_WAIT_OID_DISASSOC:
- if (Elem->MsgType == MT2_DISASSOC_CONF) {
- LinkDown(pAd, FALSE);
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
- }
- break;
-#ifdef RTMP_MAC_USB
- /* */
- /* This state is for that we want to connect to an AP but */
- /* it didn't find on BSS List table. So we need to scan the air first, */
- /* after that we can try to connect to the desired AP if available. */
- /* */
- case CNTL_WAIT_SCAN_FOR_CONNECT:
- if (Elem->MsgType == MT2_SCAN_CONF) {
- /* Resume TxRing after SCANING complete. We hope the out-of-service time */
- /* won't be too long to let upper layer time-out the waiting frames */
- RTMPResumeMsduTransmission(pAd);
-#ifdef CCX_SUPPORT
- if (pAd->StaCfg.CCXReqType != MSRN_TYPE_UNUSED) {
- /* Cisco scan request is finished, prepare beacon report */
- MlmeEnqueue(pAd, AIRONET_STATE_MACHINE,
- MT2_AIRONET_SCAN_DONE, 0, NULL);
- }
-#endif /* CCX_SUPPORT // */
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
-
- /* */
- /* Check if we can connect to. */
- /* */
- BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab,
- (char *) pAd->MlmeAux.
- AutoReconnectSsid,
- pAd->MlmeAux.AutoReconnectSsidLen);
- if (pAd->MlmeAux.SsidBssTab.BssNr > 0) {
- MlmeAutoReconnectLastSSID(pAd);
- }
- }
- break;
-#endif /* RTMP_MAC_USB // */
- default:
- DBGPRINT_ERR("ERROR! CNTL - Illegal message type(=%ld)", Elem->MsgType);
- break;
- }
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void CntlIdleProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- struct rt_mlme_disassoc_req DisassocReq;
-
- if (RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_RADIO_OFF))
- return;
-
- switch (Elem->MsgType) {
- case OID_802_11_SSID:
- CntlOidSsidProc(pAd, Elem);
- break;
-
- case OID_802_11_BSSID:
- CntlOidRTBssidProc(pAd, Elem);
- break;
-
- case OID_802_11_BSSID_LIST_SCAN:
- CntlOidScanProc(pAd, Elem);
- break;
-
- case OID_802_11_DISASSOCIATE:
- DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid,
- REASON_DISASSOC_STA_LEAVING);
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
- sizeof(struct rt_mlme_disassoc_req), &DisassocReq);
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_DISASSOC;
-
- if (pAd->StaCfg.WpaSupplicantUP !=
- WPA_SUPPLICANT_ENABLE_WITH_WEB_UI) {
- /* Set the AutoReconnectSsid to prevent it reconnect to old SSID */
- /* Since calling this indicate user don't want to connect to that SSID anymore. */
- pAd->MlmeAux.AutoReconnectSsidLen = 32;
- NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid,
- pAd->MlmeAux.AutoReconnectSsidLen);
- }
- break;
-
- case MT2_MLME_ROAMING_REQ:
- CntlMlmeRoamingProc(pAd, Elem);
- break;
-
- case OID_802_11_MIC_FAILURE_REPORT_FRAME:
- WpaMicFailureReportFrame(pAd, Elem);
- break;
-
- default:
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - Illegal message in CntlIdleProc(MsgType=%ld)\n",
- Elem->MsgType));
- break;
- }
-}
-
-void CntlOidScanProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- struct rt_mlme_scan_req ScanReq;
- unsigned long BssIdx = BSS_NOT_FOUND;
- struct rt_bss_entry CurrBss;
-
- /* record current BSS if network is connected. */
- /* 2003-2-13 do not include current IBSS if this is the only STA in this IBSS. */
- if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED)) {
- BssIdx =
- BssSsidTableSearch(&pAd->ScanTab, pAd->CommonCfg.Bssid,
- (u8 *)pAd->CommonCfg.Ssid,
- pAd->CommonCfg.SsidLen,
- pAd->CommonCfg.Channel);
- if (BssIdx != BSS_NOT_FOUND) {
- NdisMoveMemory(&CurrBss, &pAd->ScanTab.BssEntry[BssIdx],
- sizeof(struct rt_bss_entry));
- }
- }
- /* clean up previous SCAN result, add current BSS back to table if any */
- BssTableInit(&pAd->ScanTab);
- if (BssIdx != BSS_NOT_FOUND) {
- /* DDK Note: If the NIC is associated with a particular BSSID and SSID */
- /* that are not contained in the list of BSSIDs generated by this scan, the */
- /* BSSID description of the currently associated BSSID and SSID should be */
- /* appended to the list of BSSIDs in the NIC's database. */
- /* To ensure this, we append this BSS as the first entry in SCAN result */
- NdisMoveMemory(&pAd->ScanTab.BssEntry[0], &CurrBss,
- sizeof(struct rt_bss_entry));
- pAd->ScanTab.BssNr = 1;
- }
-
- ScanParmFill(pAd, &ScanReq, (char *)Elem->Msg, Elem->MsgLen, BSS_ANY,
- SCAN_ACTIVE);
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ,
- sizeof(struct rt_mlme_scan_req), &ScanReq);
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
-}
-
-/*
- ==========================================================================
- Description:
- Before calling this routine, user desired SSID should already been
- recorded in CommonCfg.Ssid[]
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void CntlOidSsidProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- struct rt_ndis_802_11_ssid * pOidSsid = (struct rt_ndis_802_11_ssid *) Elem->Msg;
- struct rt_mlme_disassoc_req DisassocReq;
- unsigned long Now;
-
- /* Step 1. record the desired user settings to MlmeAux */
- NdisZeroMemory(pAd->MlmeAux.Ssid, MAX_LEN_OF_SSID);
- NdisMoveMemory(pAd->MlmeAux.Ssid, pOidSsid->Ssid, pOidSsid->SsidLength);
- pAd->MlmeAux.SsidLen = (u8)pOidSsid->SsidLength;
- NdisZeroMemory(pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
- pAd->MlmeAux.BssType = pAd->StaCfg.BssType;
-
- pAd->StaCfg.bAutoConnectByBssid = FALSE;
-
- /* */
- /* Update Reconnect Ssid, that user desired to connect. */
- /* */
- NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, MAX_LEN_OF_SSID);
- NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid,
- pAd->MlmeAux.SsidLen);
- pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;
-
- /* step 2. find all matching BSS in the lastest SCAN result (inBssTab) */
- /* & log them into MlmeAux.SsidBssTab for later-on iteration. Sort by RSSI order */
- BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab,
- (char *)pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("CntlOidSsidProc():CNTL - %d BSS of %d BSS match the desire (%d)SSID - %s\n",
- pAd->MlmeAux.SsidBssTab.BssNr, pAd->ScanTab.BssNr,
- pAd->MlmeAux.SsidLen, pAd->MlmeAux.Ssid));
- NdisGetSystemUpTime(&Now);
-
- if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) &&
- (pAd->CommonCfg.SsidLen ==
- pAd->MlmeAux.SsidBssTab.BssEntry[0].SsidLen)
- && NdisEqualMemory(pAd->CommonCfg.Ssid,
- pAd->MlmeAux.SsidBssTab.BssEntry[0].Ssid,
- pAd->CommonCfg.SsidLen)
- && MAC_ADDR_EQUAL(pAd->CommonCfg.Bssid,
- pAd->MlmeAux.SsidBssTab.BssEntry[0].Bssid)) {
- /* Case 1. already connected with an AP who has the desired SSID */
- /* with highest RSSI */
-
- /* Add checking Mode "LEAP" for CCX 1.0 */
- if (((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) ||
- (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK) ||
- (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) ||
- (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK)
- ) &&
- (pAd->StaCfg.PortSecured == WPA_802_1X_PORT_NOT_SECURED)) {
- /* case 1.1 For WPA, WPA-PSK, if the 1x port is not secured, we have to redo */
- /* connection process */
- DBGPRINT(RT_DEBUG_TRACE,
- ("CntlOidSsidProc():CNTL - disassociate with current AP...\n"));
- DisassocParmFill(pAd, &DisassocReq,
- pAd->CommonCfg.Bssid,
- REASON_DISASSOC_STA_LEAVING);
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE,
- MT2_MLME_DISASSOC_REQ,
- sizeof(struct rt_mlme_disassoc_req),
- &DisassocReq);
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
- } else if (pAd->bConfigChanged == TRUE) {
- /* case 1.2 Important Config has changed, we have to reconnect to the same AP */
- DBGPRINT(RT_DEBUG_TRACE,
- ("CntlOidSsidProc():CNTL - disassociate with current AP Because config changed...\n"));
- DisassocParmFill(pAd, &DisassocReq,
- pAd->CommonCfg.Bssid,
- REASON_DISASSOC_STA_LEAVING);
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE,
- MT2_MLME_DISASSOC_REQ,
- sizeof(struct rt_mlme_disassoc_req),
- &DisassocReq);
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
- } else {
- /* case 1.3. already connected to the SSID with highest RSSI. */
- DBGPRINT(RT_DEBUG_TRACE,
- ("CntlOidSsidProc():CNTL - already with this BSSID. ignore this SET_SSID request\n"));
- /* */
- /* (HCT 12.1) 1c_wlan_mediaevents required */
- /* media connect events are indicated when associating with the same AP */
- /* */
- if (INFRA_ON(pAd)) {
- /* */
- /* Since MediaState already is NdisMediaStateConnected */
- /* We just indicate the connect event again to meet the WHQL required. */
- /* */
- pAd->IndicateMediaState =
- NdisMediaStateConnected;
- RTMP_IndicateMediaState(pAd);
- pAd->ExtraInfo = GENERAL_LINK_UP; /* Update extra information to link is up */
- }
-
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
- RtmpOSWrielessEventSend(pAd, SIOCGIWAP, -1,
- &pAd->MlmeAux.Bssid[0], NULL,
- 0);
- }
- } else if (INFRA_ON(pAd)) {
- /* */
- /* For RT61 */
- /* [88888] OID_802_11_SSID should have returned NDTEST_WEP_AP2(Returned: ) */
- /* RT61 may lost SSID, and not connect to NDTEST_WEP_AP2 and will connect to NDTEST_WEP_AP2 by Autoreconnect */
- /* But media status is connected, so the SSID not report correctly. */
- /* */
- if (!SSID_EQUAL
- (pAd->CommonCfg.Ssid, pAd->CommonCfg.SsidLen,
- pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen)) {
- /* */
- /* Different SSID means not Roaming case, so we let LinkDown() to Indicate a disconnect event. */
- /* */
- pAd->MlmeAux.CurrReqIsFromNdis = TRUE;
- }
- /* case 2. active INFRA association existent */
- /* roaming is done within miniport driver, nothing to do with configuration */
- /* utility. so upon a new SET(OID_802_11_SSID) is received, we just */
- /* disassociate with the current associated AP, */
- /* then perform a new association with this new SSID, no matter the */
- /* new/old SSID are the same or not. */
- DBGPRINT(RT_DEBUG_TRACE,
- ("CntlOidSsidProc():CNTL - disassociate with current AP...\n"));
- DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid,
- REASON_DISASSOC_STA_LEAVING);
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
- sizeof(struct rt_mlme_disassoc_req), &DisassocReq);
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
- } else {
- if (ADHOC_ON(pAd)) {
- DBGPRINT(RT_DEBUG_TRACE,
- ("CntlOidSsidProc():CNTL - drop current ADHOC\n"));
- LinkDown(pAd, FALSE);
- OPSTATUS_CLEAR_FLAG(pAd,
- fOP_STATUS_MEDIA_STATE_CONNECTED);
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
- RTMP_IndicateMediaState(pAd);
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
- DBGPRINT(RT_DEBUG_TRACE,
- ("CntlOidSsidProc():NDIS_STATUS_MEDIA_DISCONNECT Event C!\n"));
- }
-
- if ((pAd->MlmeAux.SsidBssTab.BssNr == 0) &&
- (pAd->StaCfg.bAutoReconnect == TRUE) &&
- (pAd->MlmeAux.BssType == BSS_INFRA) &&
- (MlmeValidateSSID(pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen)
- == TRUE)
- ) {
- struct rt_mlme_scan_req ScanReq;
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("CntlOidSsidProc():CNTL - No matching BSS, start a new scan\n"));
- ScanParmFill(pAd, &ScanReq, (char *)pAd->MlmeAux.Ssid,
- pAd->MlmeAux.SsidLen, BSS_ANY,
- SCAN_ACTIVE);
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ,
- sizeof(struct rt_mlme_scan_req), &ScanReq);
- pAd->Mlme.CntlMachine.CurrState =
- CNTL_WAIT_OID_LIST_SCAN;
- /* Reset Missed scan number */
- pAd->StaCfg.LastScanTime = Now;
- } else {
- pAd->MlmeAux.BssIdx = 0;
- IterateOnBssTab(pAd);
- }
- }
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void CntlOidRTBssidProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- unsigned long BssIdx;
- u8 *pOidBssid = (u8 *)Elem->Msg;
- struct rt_mlme_disassoc_req DisassocReq;
- struct rt_mlme_join_req JoinReq;
-
- /* record user desired settings */
- COPY_MAC_ADDR(pAd->MlmeAux.Bssid, pOidBssid);
- pAd->MlmeAux.BssType = pAd->StaCfg.BssType;
-
- /* find the desired BSS in the latest SCAN result table */
- BssIdx = BssTableSearch(&pAd->ScanTab, pOidBssid, pAd->MlmeAux.Channel);
- if (BssIdx == BSS_NOT_FOUND) {
- struct rt_mlme_scan_req ScanReq;
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - BSSID not found. reply NDIS_STATUS_NOT_ACCEPTED\n"));
- /*pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE; */
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - BSSID not found. start a new scan\n"));
- ScanParmFill(pAd, &ScanReq, (char *)pAd->MlmeAux.Ssid,
- pAd->MlmeAux.SsidLen, BSS_ANY, SCAN_ACTIVE);
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ,
- sizeof(struct rt_mlme_scan_req), &ScanReq);
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
- /* Reset Missed scan number */
- NdisGetSystemUpTime(&pAd->StaCfg.LastScanTime);
- return;
- }
- /* */
- /* Update Reconnect Ssid, that user desired to connect. */
- /* */
- NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, MAX_LEN_OF_SSID);
- pAd->MlmeAux.AutoReconnectSsidLen =
- pAd->ScanTab.BssEntry[BssIdx].SsidLen;
- NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid,
- pAd->ScanTab.BssEntry[BssIdx].Ssid,
- pAd->ScanTab.BssEntry[BssIdx].SsidLen);
-
- /* copy the matched BSS entry from ScanTab to MlmeAux.SsidBssTab. Why? */
- /* Because we need this entry to become the JOIN target in later on SYNC state machine */
- pAd->MlmeAux.BssIdx = 0;
- pAd->MlmeAux.SsidBssTab.BssNr = 1;
- NdisMoveMemory(&pAd->MlmeAux.SsidBssTab.BssEntry[0],
- &pAd->ScanTab.BssEntry[BssIdx], sizeof(struct rt_bss_entry));
-
- /* Add SSID into MlmeAux for site survey joining hidden SSID */
- pAd->MlmeAux.SsidLen = pAd->ScanTab.BssEntry[BssIdx].SsidLen;
- NdisMoveMemory(pAd->MlmeAux.Ssid, pAd->ScanTab.BssEntry[BssIdx].Ssid,
- pAd->MlmeAux.SsidLen);
-
- {
- if (INFRA_ON(pAd)) {
- /* disassoc from current AP first */
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - disassociate with current AP ...\n"));
- DisassocParmFill(pAd, &DisassocReq,
- pAd->CommonCfg.Bssid,
- REASON_DISASSOC_STA_LEAVING);
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE,
- MT2_MLME_DISASSOC_REQ,
- sizeof(struct rt_mlme_disassoc_req),
- &DisassocReq);
-
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
- } else {
- if (ADHOC_ON(pAd)) {
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - drop current ADHOC\n"));
- LinkDown(pAd, FALSE);
- OPSTATUS_CLEAR_FLAG(pAd,
- fOP_STATUS_MEDIA_STATE_CONNECTED);
- pAd->IndicateMediaState =
- NdisMediaStateDisconnected;
- RTMP_IndicateMediaState(pAd);
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
- DBGPRINT(RT_DEBUG_TRACE,
- ("NDIS_STATUS_MEDIA_DISCONNECT Event C!\n"));
- }
- /* Change the wepstatus to original wepstatus */
- pAd->StaCfg.WepStatus = pAd->StaCfg.OrigWepStatus;
- pAd->StaCfg.PairCipher = pAd->StaCfg.OrigWepStatus;
- pAd->StaCfg.GroupCipher = pAd->StaCfg.OrigWepStatus;
-
- /* Check cipher suite, AP must have more secured cipher than station setting */
- /* Set the Pairwise and Group cipher to match the intended AP setting */
- /* We can only connect to AP with less secured cipher setting */
- if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA)
- || (pAd->StaCfg.AuthMode ==
- Ndis802_11AuthModeWPAPSK)) {
- pAd->StaCfg.GroupCipher =
- pAd->ScanTab.BssEntry[BssIdx].WPA.
- GroupCipher;
-
- if (pAd->StaCfg.WepStatus ==
- pAd->ScanTab.BssEntry[BssIdx].WPA.
- PairCipher)
- pAd->StaCfg.PairCipher =
- pAd->ScanTab.BssEntry[BssIdx].WPA.
- PairCipher;
- else if (pAd->ScanTab.BssEntry[BssIdx].WPA.
- PairCipherAux != Ndis802_11WEPDisabled)
- pAd->StaCfg.PairCipher =
- pAd->ScanTab.BssEntry[BssIdx].WPA.
- PairCipherAux;
- else /* There is no PairCipher Aux, downgrade our capability to TKIP */
- pAd->StaCfg.PairCipher =
- Ndis802_11Encryption2Enabled;
- } else
- if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2)
- || (pAd->StaCfg.AuthMode ==
- Ndis802_11AuthModeWPA2PSK)) {
- pAd->StaCfg.GroupCipher =
- pAd->ScanTab.BssEntry[BssIdx].WPA2.
- GroupCipher;
-
- if (pAd->StaCfg.WepStatus ==
- pAd->ScanTab.BssEntry[BssIdx].WPA2.
- PairCipher)
- pAd->StaCfg.PairCipher =
- pAd->ScanTab.BssEntry[BssIdx].WPA2.
- PairCipher;
- else if (pAd->ScanTab.BssEntry[BssIdx].WPA2.
- PairCipherAux != Ndis802_11WEPDisabled)
- pAd->StaCfg.PairCipher =
- pAd->ScanTab.BssEntry[BssIdx].WPA2.
- PairCipherAux;
- else /* There is no PairCipher Aux, downgrade our capability to TKIP */
- pAd->StaCfg.PairCipher =
- Ndis802_11Encryption2Enabled;
-
- /* RSN capability */
- pAd->StaCfg.RsnCapability =
- pAd->ScanTab.BssEntry[BssIdx].WPA2.
- RsnCapability;
- }
- /* Set Mix cipher flag */
- pAd->StaCfg.bMixCipher =
- (pAd->StaCfg.PairCipher ==
- pAd->StaCfg.GroupCipher) ? FALSE : TRUE;
- /*if (pAd->StaCfg.bMixCipher == TRUE)
- {
- // If mix cipher, re-build RSNIE
- RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, 0);
- } */
- /* No active association, join the BSS immediately */
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - joining %pM ...\n",
- pOidBssid));
-
- JoinParmFill(pAd, &JoinReq, pAd->MlmeAux.BssIdx);
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_JOIN_REQ,
- sizeof(struct rt_mlme_join_req), &JoinReq);
-
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_JOIN;
- }
- }
-}
-
-/* Roaming is the only external request triggering CNTL state machine */
-/* despite of other "SET OID" operation. All "SET OID" related operations */
-/* happen in sequence, because no other SET OID will be sent to this device */
-/* until the the previous SET operation is complete (successful o failed). */
-/* So, how do we quarantee this ROAMING request won't corrupt other "SET OID"? */
-/* or been corrupted by other "SET OID"? */
-/* */
-/* IRQL = DISPATCH_LEVEL */
-void CntlMlmeRoamingProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- u8 BBPValue = 0;
-
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Roaming in MlmeAux.RoamTab...\n"));
-
- {
- /*Let BBP register at 20MHz to do (fast) roaming. */
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &BBPValue);
- BBPValue &= (~0x18);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, BBPValue);
-
- NdisMoveMemory(&pAd->MlmeAux.SsidBssTab, &pAd->MlmeAux.RoamTab,
- sizeof(pAd->MlmeAux.RoamTab));
- pAd->MlmeAux.SsidBssTab.BssNr = pAd->MlmeAux.RoamTab.BssNr;
-
- BssTableSortByRssi(&pAd->MlmeAux.SsidBssTab);
- pAd->MlmeAux.BssIdx = 0;
- IterateOnBssTab(pAd);
- }
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void CntlWaitDisassocProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- struct rt_mlme_start_req StartReq;
-
- if (Elem->MsgType == MT2_DISASSOC_CONF) {
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Dis-associate successful\n"));
-
- if (pAd->CommonCfg.bWirelessEvent) {
- RTMPSendWirelessEvent(pAd, IW_DISASSOC_EVENT_FLAG,
- pAd->MacTab.Content[BSSID_WCID].
- Addr, BSS0, 0);
- }
-
- LinkDown(pAd, FALSE);
-
- /* case 1. no matching BSS, and user wants ADHOC, so we just start a new one */
- if ((pAd->MlmeAux.SsidBssTab.BssNr == 0)
- && (pAd->StaCfg.BssType == BSS_ADHOC)) {
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - No matching BSS, start a new ADHOC (Ssid=%s)...\n",
- pAd->MlmeAux.Ssid));
- StartParmFill(pAd, &StartReq, (char *)pAd->MlmeAux.Ssid,
- pAd->MlmeAux.SsidLen);
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_START_REQ,
- sizeof(struct rt_mlme_start_req), &StartReq);
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_START;
- }
- /* case 2. try each matched BSS */
- else {
- pAd->MlmeAux.BssIdx = 0;
-
- IterateOnBssTab(pAd);
- }
- }
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void CntlWaitJoinProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- u16 Reason;
- struct rt_mlme_auth_req AuthReq;
-
- if (Elem->MsgType == MT2_JOIN_CONF) {
- NdisMoveMemory(&Reason, Elem->Msg, sizeof(u16));
- if (Reason == MLME_SUCCESS) {
- /* 1. joined an IBSS, we are pretty much done here */
- if (pAd->MlmeAux.BssType == BSS_ADHOC) {
- /* */
- /* 5G bands rules of Japan: */
- /* Ad hoc must be disabled in W53(ch52,56,60,64) channels. */
- /* */
- if ((pAd->CommonCfg.bIEEE80211H == 1) &&
- RadarChannelCheck(pAd,
- pAd->CommonCfg.Channel)
- ) {
- pAd->Mlme.CntlMachine.CurrState =
- CNTL_IDLE;
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - Channel=%d, Join adhoc on W53(52,56,60,64) Channels are not accepted\n",
- pAd->CommonCfg.Channel));
- return;
- }
-
- LinkUp(pAd, BSS_ADHOC);
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - join the IBSS = %pM ...\n",
- pAd->CommonCfg.Bssid));
-
- pAd->IndicateMediaState =
- NdisMediaStateConnected;
- pAd->ExtraInfo = GENERAL_LINK_UP;
- }
- /* 2. joined a new INFRA network, start from authentication */
- else {
- {
- /* either Ndis802_11AuthModeShared or Ndis802_11AuthModeAutoSwitch, try shared key first */
- if ((pAd->StaCfg.AuthMode ==
- Ndis802_11AuthModeShared)
- || (pAd->StaCfg.AuthMode ==
- Ndis802_11AuthModeAutoSwitch)) {
- AuthParmFill(pAd, &AuthReq,
- pAd->MlmeAux.Bssid,
- AUTH_MODE_KEY);
- } else {
- AuthParmFill(pAd, &AuthReq,
- pAd->MlmeAux.Bssid,
- AUTH_MODE_OPEN);
- }
- MlmeEnqueue(pAd, AUTH_STATE_MACHINE,
- MT2_MLME_AUTH_REQ,
- sizeof
- (struct rt_mlme_auth_req),
- &AuthReq);
- }
-
- pAd->Mlme.CntlMachine.CurrState =
- CNTL_WAIT_AUTH;
- }
- } else {
- /* 3. failed, try next BSS */
- pAd->MlmeAux.BssIdx++;
- IterateOnBssTab(pAd);
- }
- }
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void CntlWaitStartProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- u16 Result;
-
- if (Elem->MsgType == MT2_START_CONF) {
- NdisMoveMemory(&Result, Elem->Msg, sizeof(u16));
- if (Result == MLME_SUCCESS) {
- /* */
- /* 5G bands rules of Japan: */
- /* Ad hoc must be disabled in W53(ch52,56,60,64) channels. */
- /* */
- if ((pAd->CommonCfg.bIEEE80211H == 1) &&
- RadarChannelCheck(pAd, pAd->CommonCfg.Channel)
- ) {
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - Channel=%d, Start adhoc on W53(52,56,60,64) Channels are not accepted\n",
- pAd->CommonCfg.Channel));
- return;
- }
- NdisZeroMemory(&pAd->StaActive.SupportedPhyInfo.
- MCSSet[0], 16);
- if (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED) {
- N_ChannelCheck(pAd);
- SetCommonHT(pAd);
- NdisMoveMemory(&pAd->MlmeAux.AddHtInfo,
- &pAd->CommonCfg.AddHTInfo,
- sizeof(struct rt_add_ht_info_ie));
- RTMPCheckHt(pAd, BSSID_WCID,
- &pAd->CommonCfg.HtCapability,
- &pAd->CommonCfg.AddHTInfo);
- pAd->StaActive.SupportedPhyInfo.bHtEnable =
- TRUE;
- NdisMoveMemory(&pAd->StaActive.SupportedPhyInfo.
- MCSSet[0],
- &pAd->CommonCfg.HtCapability.
- MCSSet[0], 16);
- COPY_HTSETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG
- (pAd);
-
- if ((pAd->CommonCfg.HtCapability.HtCapInfo.
- ChannelWidth == BW_40)
- && (pAd->CommonCfg.AddHTInfo.AddHtInfo.
- ExtChanOffset == EXTCHA_ABOVE)) {
- pAd->MlmeAux.CentralChannel =
- pAd->CommonCfg.Channel + 2;
- } else
- if ((pAd->CommonCfg.HtCapability.HtCapInfo.
- ChannelWidth == BW_40)
- && (pAd->CommonCfg.AddHTInfo.AddHtInfo.
- ExtChanOffset == EXTCHA_BELOW)) {
- pAd->MlmeAux.CentralChannel =
- pAd->CommonCfg.Channel - 2;
- }
- } else {
- pAd->StaActive.SupportedPhyInfo.bHtEnable =
- FALSE;
- }
- LinkUp(pAd, BSS_ADHOC);
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
- /* Before send beacon, driver need do radar detection */
- if ((pAd->CommonCfg.Channel > 14)
- && (pAd->CommonCfg.bIEEE80211H == 1)
- && RadarChannelCheck(pAd, pAd->CommonCfg.Channel)) {
- pAd->CommonCfg.RadarDetect.RDMode =
- RD_SILENCE_MODE;
- pAd->CommonCfg.RadarDetect.RDCount = 0;
- }
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - start a new IBSS = %pM ...\n",
- pAd->CommonCfg.Bssid));
- } else {
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - Start IBSS fail. BUG!\n"));
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
- }
- }
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void CntlWaitAuthProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- u16 Reason;
- struct rt_mlme_assoc_req AssocReq;
- struct rt_mlme_auth_req AuthReq;
-
- if (Elem->MsgType == MT2_AUTH_CONF) {
- NdisMoveMemory(&Reason, Elem->Msg, sizeof(u16));
- if (Reason == MLME_SUCCESS) {
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH OK\n"));
- AssocParmFill(pAd, &AssocReq, pAd->MlmeAux.Bssid,
- pAd->MlmeAux.CapabilityInfo,
- ASSOC_TIMEOUT,
- pAd->StaCfg.DefaultListenCount);
-
- {
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE,
- MT2_MLME_ASSOC_REQ,
- sizeof(struct rt_mlme_assoc_req),
- &AssocReq);
-
- pAd->Mlme.CntlMachine.CurrState =
- CNTL_WAIT_ASSOC;
- }
- } else {
- /* This fail may because of the AP already keep us in its MAC table without */
- /* ageing-out. The previous authentication attempt must have let it remove us. */
- /* so try Authentication again may help. For D-Link DWL-900AP+ compatibility. */
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - AUTH FAIL, try again...\n"));
-
- {
- if ((pAd->StaCfg.AuthMode ==
- Ndis802_11AuthModeShared)
- || (pAd->StaCfg.AuthMode ==
- Ndis802_11AuthModeAutoSwitch)) {
- /* either Ndis802_11AuthModeShared or Ndis802_11AuthModeAutoSwitch, try shared key first */
- AuthParmFill(pAd, &AuthReq,
- pAd->MlmeAux.Bssid,
- AUTH_MODE_KEY);
- } else {
- AuthParmFill(pAd, &AuthReq,
- pAd->MlmeAux.Bssid,
- AUTH_MODE_OPEN);
- }
- MlmeEnqueue(pAd, AUTH_STATE_MACHINE,
- MT2_MLME_AUTH_REQ,
- sizeof(struct rt_mlme_auth_req),
- &AuthReq);
-
- }
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH2;
- }
- }
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void CntlWaitAuthProc2(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- u16 Reason;
- struct rt_mlme_assoc_req AssocReq;
- struct rt_mlme_auth_req AuthReq;
-
- if (Elem->MsgType == MT2_AUTH_CONF) {
- NdisMoveMemory(&Reason, Elem->Msg, sizeof(u16));
- if (Reason == MLME_SUCCESS) {
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH OK\n"));
- AssocParmFill(pAd, &AssocReq, pAd->MlmeAux.Bssid,
- pAd->MlmeAux.CapabilityInfo,
- ASSOC_TIMEOUT,
- pAd->StaCfg.DefaultListenCount);
- {
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE,
- MT2_MLME_ASSOC_REQ,
- sizeof(struct rt_mlme_assoc_req),
- &AssocReq);
-
- pAd->Mlme.CntlMachine.CurrState =
- CNTL_WAIT_ASSOC;
- }
- } else {
- if ((pAd->StaCfg.AuthMode ==
- Ndis802_11AuthModeAutoSwitch)
- && (pAd->MlmeAux.Alg == Ndis802_11AuthModeShared)) {
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - AUTH FAIL, try OPEN system...\n"));
- AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid,
- Ndis802_11AuthModeOpen);
- MlmeEnqueue(pAd, AUTH_STATE_MACHINE,
- MT2_MLME_AUTH_REQ,
- sizeof(struct rt_mlme_auth_req),
- &AuthReq);
-
- pAd->Mlme.CntlMachine.CurrState =
- CNTL_WAIT_AUTH2;
- } else {
- /* not success, try next BSS */
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - AUTH FAIL, give up; try next BSS\n"));
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE; /*??????? */
- pAd->MlmeAux.BssIdx++;
- IterateOnBssTab(pAd);
- }
- }
- }
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void CntlWaitAssocProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- u16 Reason;
-
- if (Elem->MsgType == MT2_ASSOC_CONF) {
- NdisMoveMemory(&Reason, Elem->Msg, sizeof(u16));
- if (Reason == MLME_SUCCESS) {
- if (pAd->CommonCfg.bWirelessEvent) {
- RTMPSendWirelessEvent(pAd, IW_ASSOC_EVENT_FLAG,
- pAd->MacTab.
- Content[BSSID_WCID].Addr,
- BSS0, 0);
- }
-
- LinkUp(pAd, BSS_INFRA);
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - Association successful on BSS #%ld\n",
- pAd->MlmeAux.BssIdx));
- } else {
- /* not success, try next BSS */
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - Association fails on BSS #%ld\n",
- pAd->MlmeAux.BssIdx));
- pAd->MlmeAux.BssIdx++;
- IterateOnBssTab(pAd);
- }
- }
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void CntlWaitReassocProc(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem)
-{
- u16 Result;
-
- if (Elem->MsgType == MT2_REASSOC_CONF) {
- NdisMoveMemory(&Result, Elem->Msg, sizeof(u16));
- if (Result == MLME_SUCCESS) {
- /* send wireless event - for association */
- if (pAd->CommonCfg.bWirelessEvent)
- RTMPSendWirelessEvent(pAd, IW_ASSOC_EVENT_FLAG,
- pAd->MacTab.
- Content[BSSID_WCID].Addr,
- BSS0, 0);
-
- /* */
- /* NDIS requires a new Link UP indication but no Link Down for RE-ASSOC */
- /* */
- LinkUp(pAd, BSS_INFRA);
-
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - Re-assocition successful on BSS #%ld\n",
- pAd->MlmeAux.RoamIdx));
- } else {
- /* reassoc failed, try to pick next BSS in the BSS Table */
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - Re-assocition fails on BSS #%ld\n",
- pAd->MlmeAux.RoamIdx));
- {
- pAd->MlmeAux.RoamIdx++;
- IterateOnBssTab2(pAd);
- }
- }
- }
-}
-
-void AdhocTurnOnQos(struct rt_rtmp_adapter *pAd)
-{
-#define AC0_DEF_TXOP 0
-#define AC1_DEF_TXOP 0
-#define AC2_DEF_TXOP 94
-#define AC3_DEF_TXOP 47
-
- /* Turn on QOs if use HT rate. */
- if (pAd->CommonCfg.APEdcaParm.bValid == FALSE) {
- pAd->CommonCfg.APEdcaParm.bValid = TRUE;
- pAd->CommonCfg.APEdcaParm.Aifsn[0] = 3;
- pAd->CommonCfg.APEdcaParm.Aifsn[1] = 7;
- pAd->CommonCfg.APEdcaParm.Aifsn[2] = 1;
- pAd->CommonCfg.APEdcaParm.Aifsn[3] = 1;
-
- pAd->CommonCfg.APEdcaParm.Cwmin[0] = 4;
- pAd->CommonCfg.APEdcaParm.Cwmin[1] = 4;
- pAd->CommonCfg.APEdcaParm.Cwmin[2] = 3;
- pAd->CommonCfg.APEdcaParm.Cwmin[3] = 2;
-
- pAd->CommonCfg.APEdcaParm.Cwmax[0] = 10;
- pAd->CommonCfg.APEdcaParm.Cwmax[1] = 6;
- pAd->CommonCfg.APEdcaParm.Cwmax[2] = 4;
- pAd->CommonCfg.APEdcaParm.Cwmax[3] = 3;
-
- pAd->CommonCfg.APEdcaParm.Txop[0] = 0;
- pAd->CommonCfg.APEdcaParm.Txop[1] = 0;
- pAd->CommonCfg.APEdcaParm.Txop[2] = AC2_DEF_TXOP;
- pAd->CommonCfg.APEdcaParm.Txop[3] = AC3_DEF_TXOP;
- }
- AsicSetEdcaParm(pAd, &pAd->CommonCfg.APEdcaParm);
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void LinkUp(struct rt_rtmp_adapter *pAd, u8 BssType)
-{
- unsigned long Now;
- u32 Data;
- BOOLEAN Cancelled;
- u8 Value = 0, idx = 0, HashIdx = 0;
- struct rt_mac_table_entry *pEntry = NULL, *pCurrEntry = NULL;
-
- /* Init ChannelQuality to prevent DEAD_CQI at initial LinkUp */
- pAd->Mlme.ChannelQuality = 50;
-
- pEntry = MacTableLookup(pAd, pAd->CommonCfg.Bssid);
- if (pEntry) {
- MacTableDeleteEntry(pAd, pEntry->Aid, pEntry->Addr);
- pEntry = NULL;
- }
-
- pEntry = &pAd->MacTab.Content[BSSID_WCID];
-
- /* */
- /* ASSOC - DisassocTimeoutAction */
- /* CNTL - Dis-associate successful */
- /* ! LINK DOWN ! */
- /* [88888] OID_802_11_SSID should have returned NDTEST_WEP_AP2(Returned: ) */
- /* */
- /* To prevent DisassocTimeoutAction to call Link down after we link up, */
- /* cancel the DisassocTimer no matter what it start or not. */
- /* */
- RTMPCancelTimer(&pAd->MlmeAux.DisassocTimer, &Cancelled);
-
- COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
-
- COPY_HTSETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
-
-#ifdef RTMP_MAC_PCI
- /* Before power save before link up function, We will force use 1R. */
- /* So after link up, check Rx antenna # again. */
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
- if (pAd->Antenna.field.RxPath == 3) {
- Value |= (0x10);
- } else if (pAd->Antenna.field.RxPath == 2) {
- Value |= (0x8);
- } else if (pAd->Antenna.field.RxPath == 1) {
- Value |= (0x0);
- }
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
- pAd->StaCfg.BBPR3 = Value;
-#endif /* RTMP_MAC_PCI // */
-
- if (BssType == BSS_ADHOC) {
- OPSTATUS_SET_FLAG(pAd, fOP_STATUS_ADHOC_ON);
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_INFRA_ON);
-
- if (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED)
- AdhocTurnOnQos(pAd);
-
- DBGPRINT(RT_DEBUG_TRACE, ("Adhoc LINK UP!\n"));
- } else {
- OPSTATUS_SET_FLAG(pAd, fOP_STATUS_INFRA_ON);
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_ADHOC_ON);
-
- DBGPRINT(RT_DEBUG_TRACE, ("Infra LINK UP!\n"));
- }
-
- /* 3*3 */
- /* reset Tx beamforming bit */
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
- Value &= (~0x01);
- Value |= pAd->CommonCfg.RegTransmitSetting.field.TxBF;
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
-
- /* Change to AP channel */
- if ((pAd->CommonCfg.CentralChannel > pAd->CommonCfg.Channel)
- && (pAd->MlmeAux.HtCapability.HtCapInfo.ChannelWidth == BW_40)) {
- /* Must use 40MHz. */
- pAd->CommonCfg.BBPCurrentBW = BW_40;
- AsicSwitchChannel(pAd, pAd->CommonCfg.CentralChannel, FALSE);
- AsicLockChannel(pAd, pAd->CommonCfg.CentralChannel);
-
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
- Value &= (~0x18);
- Value |= 0x10;
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
-
- /* RX : control channel at lower */
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
- Value &= (~0x20);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
-#ifdef RTMP_MAC_PCI
- pAd->StaCfg.BBPR3 = Value;
-#endif /* RTMP_MAC_PCI // */
-
- RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
- Data &= 0xfffffffe;
- RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
-
- if (pAd->MACVersion == 0x28600100) {
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x1A);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x0A);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x16);
- DBGPRINT(RT_DEBUG_TRACE, ("rt2860C !\n"));
- }
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("40MHz Lower LINK UP! Control Channel at Below. Central = %d \n",
- pAd->CommonCfg.CentralChannel));
- } else if ((pAd->CommonCfg.CentralChannel < pAd->CommonCfg.Channel)
- && (pAd->MlmeAux.HtCapability.HtCapInfo.ChannelWidth ==
- BW_40)) {
- /* Must use 40MHz. */
- pAd->CommonCfg.BBPCurrentBW = BW_40;
- AsicSwitchChannel(pAd, pAd->CommonCfg.CentralChannel, FALSE);
- AsicLockChannel(pAd, pAd->CommonCfg.CentralChannel);
-
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
- Value &= (~0x18);
- Value |= 0x10;
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
-
- RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
- Data |= 0x1;
- RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
-
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
- Value |= (0x20);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
-#ifdef RTMP_MAC_PCI
- pAd->StaCfg.BBPR3 = Value;
-#endif /* RTMP_MAC_PCI // */
-
- if (pAd->MACVersion == 0x28600100) {
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x1A);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x0A);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x16);
- DBGPRINT(RT_DEBUG_TRACE, ("rt2860C !\n"));
- }
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("40MHz Upper LINK UP! Control Channel at UpperCentral = %d \n",
- pAd->CommonCfg.CentralChannel));
- } else {
- pAd->CommonCfg.BBPCurrentBW = BW_20;
- pAd->CommonCfg.CentralChannel = pAd->CommonCfg.Channel;
- AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
- AsicLockChannel(pAd, pAd->CommonCfg.Channel);
-
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
- Value &= (~0x18);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
-
- RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
- Data &= 0xfffffffe;
- RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
-
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
- Value &= (~0x20);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
-#ifdef RTMP_MAC_PCI
- pAd->StaCfg.BBPR3 = Value;
-#endif /* RTMP_MAC_PCI // */
-
- if (pAd->MACVersion == 0x28600100) {
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x16);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x08);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x11);
- DBGPRINT(RT_DEBUG_TRACE, ("rt2860C !\n"));
- }
-
- DBGPRINT(RT_DEBUG_TRACE, ("20MHz LINK UP!\n"));
- }
-
- RTMPSetAGCInitValue(pAd, pAd->CommonCfg.BBPCurrentBW);
-
- /* */
- /* Save BBP_R66 value, it will be used in RTUSBResumeMsduTransmission */
- /* */
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R66,
- &pAd->BbpTuning.R66CurrentValue);
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("LINK UP! (BssType=%d, AID=%d, ssid=%s, Channel=%d, CentralChannel = %d)\n",
- BssType, pAd->StaActive.Aid, pAd->CommonCfg.Ssid,
- pAd->CommonCfg.Channel, pAd->CommonCfg.CentralChannel));
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("LINK UP! (Density =%d, )\n",
- pAd->MacTab.Content[BSSID_WCID].MpduDensity));
-
- AsicSetBssid(pAd, pAd->CommonCfg.Bssid);
-
- AsicSetSlotTime(pAd, TRUE);
- AsicSetEdcaParm(pAd, &pAd->CommonCfg.APEdcaParm);
-
- /* Call this for RTS protection for legacy rate, we will always enable RTS threshold, but normally it will not hit */
- AsicUpdateProtect(pAd, 0, (OFDMSETPROTECT | CCKSETPROTECT), TRUE,
- FALSE);
-
- if ((pAd->StaActive.SupportedPhyInfo.bHtEnable == TRUE)) {
- /* Update HT protection for based on AP's operating mode. */
- if (pAd->MlmeAux.AddHtInfo.AddHtInfo2.NonGfPresent == 1) {
- AsicUpdateProtect(pAd,
- pAd->MlmeAux.AddHtInfo.AddHtInfo2.
- OperaionMode, ALLN_SETPROTECT, FALSE,
- TRUE);
- } else
- AsicUpdateProtect(pAd,
- pAd->MlmeAux.AddHtInfo.AddHtInfo2.
- OperaionMode, ALLN_SETPROTECT, FALSE,
- FALSE);
- }
-
- NdisZeroMemory(&pAd->DrsCounters, sizeof(struct rt_counter_drs));
-
- NdisGetSystemUpTime(&Now);
- pAd->StaCfg.LastBeaconRxTime = Now; /* last RX timestamp */
-
- if ((pAd->CommonCfg.TxPreamble != Rt802_11PreambleLong) &&
- CAP_IS_SHORT_PREAMBLE_ON(pAd->StaActive.CapabilityInfo)) {
- MlmeSetTxPreamble(pAd, Rt802_11PreambleShort);
- }
-
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
-
- if (pAd->CommonCfg.RadarDetect.RDMode == RD_SILENCE_MODE) {
- }
- pAd->CommonCfg.RadarDetect.RDMode = RD_NORMAL_MODE;
-
- if (BssType == BSS_ADHOC) {
- MakeIbssBeacon(pAd);
- if ((pAd->CommonCfg.Channel > 14)
- && (pAd->CommonCfg.bIEEE80211H == 1)
- && RadarChannelCheck(pAd, pAd->CommonCfg.Channel)) {
- ; /*Do nothing */
- } else {
- AsicEnableIbssSync(pAd);
- }
-
- /* In ad hoc mode, use MAC table from index 1. */
- /* p.s ASIC use all 0xff as termination of WCID table search.To prevent it's 0xff-ff-ff-ff-ff-ff, Write 0 here. */
- RTMP_IO_WRITE32(pAd, MAC_WCID_BASE, 0x00);
- RTMP_IO_WRITE32(pAd, 0x1808, 0x00);
-
- /* If WEP is enabled, add key material and cipherAlg into Asic */
- /* Fill in Shared Key Table(offset: 0x6c00) and Shared Key Mode(offset: 0x7000) */
-
- if (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled) {
- u8 *Key;
- u8 CipherAlg;
-
- for (idx = 0; idx < SHARE_KEY_NUM; idx++) {
- CipherAlg = pAd->SharedKey[BSS0][idx].CipherAlg;
- Key = pAd->SharedKey[BSS0][idx].Key;
-
- if (pAd->SharedKey[BSS0][idx].KeyLen > 0) {
- /* Set key material and cipherAlg to Asic */
- AsicAddSharedKeyEntry(pAd, BSS0, idx,
- CipherAlg, Key,
- NULL, NULL);
-
- if (idx == pAd->StaCfg.DefaultKeyId) {
- /* Update WCID attribute table and IVEIV table for this group key table */
- RTMPAddWcidAttributeEntry(pAd,
- BSS0,
- idx,
- CipherAlg,
- NULL);
- }
- }
-
- }
- }
- /* If WPANone is enabled, add key material and cipherAlg into Asic */
- /* Fill in Shared Key Table(offset: 0x6c00) and Shared Key Mode(offset: 0x7000) */
- else if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone) {
- pAd->StaCfg.DefaultKeyId = 0; /* always be zero */
-
- NdisZeroMemory(&pAd->SharedKey[BSS0][0],
- sizeof(struct rt_cipher_key));
- pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK;
- NdisMoveMemory(pAd->SharedKey[BSS0][0].Key,
- pAd->StaCfg.PMK, LEN_TKIP_EK);
-
- if (pAd->StaCfg.PairCipher ==
- Ndis802_11Encryption2Enabled) {
- NdisMoveMemory(pAd->SharedKey[BSS0][0].RxMic,
- &pAd->StaCfg.PMK[16],
- LEN_TKIP_RXMICK);
- NdisMoveMemory(pAd->SharedKey[BSS0][0].TxMic,
- &pAd->StaCfg.PMK[16],
- LEN_TKIP_TXMICK);
- }
- /* Decide its ChiperAlg */
- if (pAd->StaCfg.PairCipher ==
- Ndis802_11Encryption2Enabled)
- pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_TKIP;
- else if (pAd->StaCfg.PairCipher ==
- Ndis802_11Encryption3Enabled)
- pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_AES;
- else {
- DBGPRINT(RT_DEBUG_TRACE,
- ("Unknow Cipher (=%d), set Cipher to AES\n",
- pAd->StaCfg.PairCipher));
- pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_AES;
- }
-
- /* Set key material and cipherAlg to Asic */
- AsicAddSharedKeyEntry(pAd,
- BSS0,
- 0,
- pAd->SharedKey[BSS0][0].CipherAlg,
- pAd->SharedKey[BSS0][0].Key,
- pAd->SharedKey[BSS0][0].TxMic,
- pAd->SharedKey[BSS0][0].RxMic);
-
- /* Update WCID attribute table and IVEIV table for this group key table */
- RTMPAddWcidAttributeEntry(pAd, BSS0, 0,
- pAd->SharedKey[BSS0][0].
- CipherAlg, NULL);
-
- }
-
- } else /* BSS_INFRA */
- {
- /* Check the new SSID with last SSID */
- while (Cancelled == TRUE) {
- if (pAd->CommonCfg.LastSsidLen ==
- pAd->CommonCfg.SsidLen) {
- if (RTMPCompareMemory
- (pAd->CommonCfg.LastSsid,
- pAd->CommonCfg.Ssid,
- pAd->CommonCfg.LastSsidLen) == 0) {
- /* Link to the old one no linkdown is required. */
- break;
- }
- }
- /* Send link down event before set to link up */
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
- RTMP_IndicateMediaState(pAd);
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
- DBGPRINT(RT_DEBUG_TRACE,
- ("NDIS_STATUS_MEDIA_DISCONNECT Event AA!\n"));
- break;
- }
-
- /* */
- /* On WPA mode, Remove All Keys if not connect to the last BSSID */
- /* Key will be set after 4-way handshake. */
- /* */
- if (pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA) {
- unsigned long IV;
-
- /* Remove all WPA keys */
- RTMP_CLEAR_PSFLAG(pAd, fRTMP_PS_CAN_GO_SLEEP);
- RTMPWPARemoveAllKeys(pAd);
- pAd->StaCfg.PortSecured = WPA_802_1X_PORT_NOT_SECURED;
- pAd->StaCfg.PrivacyFilter =
- Ndis802_11PrivFilter8021xWEP;
-
- /* Fixed connection failed with Range Maximizer - 515 AP (Marvell Chip) when security is WPAPSK/TKIP */
- /* If IV related values are too large in GroupMsg2, AP would ignore this message. */
- IV = 1;
- IV |= (pAd->StaCfg.DefaultKeyId << 30);
- AsicUpdateWCIDIVEIV(pAd, BSSID_WCID, IV, 0);
- }
- /* NOTE: */
- /* the decision of using "short slot time" or not may change dynamically due to */
- /* new STA association to the AP. so we have to decide that upon parsing BEACON, not here */
-
- /* NOTE: */
- /* the decision to use "RTC/CTS" or "CTS-to-self" protection or not may change dynamically */
- /* due to new STA association to the AP. so we have to decide that upon parsing BEACON, not here */
-
- ComposePsPoll(pAd);
- ComposeNullFrame(pAd);
-
- AsicEnableBssSync(pAd);
-
- /* Add BSSID to WCID search table */
- AsicUpdateRxWCIDTable(pAd, BSSID_WCID, pAd->CommonCfg.Bssid);
-
- /* If WEP is enabled, add pairwise and shared key */
- if (((pAd->StaCfg.WpaSupplicantUP) &&
- (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled) &&
- (pAd->StaCfg.PortSecured == WPA_802_1X_PORT_SECURED)) ||
- ((pAd->StaCfg.WpaSupplicantUP == WPA_SUPPLICANT_DISABLE) &&
- (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled))) {
- u8 *Key;
- u8 CipherAlg;
-
- for (idx = 0; idx < SHARE_KEY_NUM; idx++) {
- CipherAlg = pAd->SharedKey[BSS0][idx].CipherAlg;
- Key = pAd->SharedKey[BSS0][idx].Key;
-
- if (pAd->SharedKey[BSS0][idx].KeyLen > 0) {
- /* Set key material and cipherAlg to Asic */
- AsicAddSharedKeyEntry(pAd, BSS0, idx,
- CipherAlg, Key,
- NULL, NULL);
-
- if (idx == pAd->StaCfg.DefaultKeyId) {
- /* Assign group key info */
- RTMPAddWcidAttributeEntry(pAd,
- BSS0,
- idx,
- CipherAlg,
- NULL);
-
- pEntry->Aid = BSSID_WCID;
- /* Assign pairwise key info */
- RTMPAddWcidAttributeEntry(pAd,
- BSS0,
- idx,
- CipherAlg,
- pEntry);
- }
- }
- }
- }
- /* only INFRASTRUCTURE mode need to indicate connectivity immediately; ADHOC mode */
- /* should wait until at least 2 active nodes in this BSSID. */
- OPSTATUS_SET_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
-
- /* For GUI ++ */
- if (pAd->StaCfg.AuthMode < Ndis802_11AuthModeWPA) {
- pAd->IndicateMediaState = NdisMediaStateConnected;
- pAd->ExtraInfo = GENERAL_LINK_UP;
- RTMP_IndicateMediaState(pAd);
- } else if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK) ||
- (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK))
- {
- if (pAd->StaCfg.WpaSupplicantUP ==
- WPA_SUPPLICANT_DISABLE)
- RTMPSetTimer(&pAd->Mlme.LinkDownTimer,
- LINK_DOWN_TIMEOUT);
- }
- /* -- */
-
- /* Add BSSID in my MAC Table. */
- NdisAcquireSpinLock(&pAd->MacTabLock);
- /* add this MAC entry into HASH table */
- if (pEntry) {
- HashIdx = MAC_ADDR_HASH_INDEX(pAd->CommonCfg.Bssid);
- if (pAd->MacTab.Hash[HashIdx] == NULL) {
- pAd->MacTab.Hash[HashIdx] = pEntry;
- } else {
- pCurrEntry = pAd->MacTab.Hash[HashIdx];
- while (pCurrEntry->pNext != NULL) {
- pCurrEntry = pCurrEntry->pNext;
- }
- pCurrEntry->pNext = pEntry;
- }
- }
- RTMPMoveMemory(pEntry->Addr, pAd->CommonCfg.Bssid,
- MAC_ADDR_LEN);
- pEntry->Aid = BSSID_WCID;
- pEntry->pAd = pAd;
- pEntry->ValidAsCLI = TRUE; /*Although this is bssid..still set ValidAsCl */
- pAd->MacTab.Size = 1; /* infra mode always set MACtab size =1. */
- pEntry->Sst = SST_ASSOC;
- pEntry->AuthState = SST_ASSOC;
- pEntry->AuthMode = pAd->StaCfg.AuthMode;
- pEntry->WepStatus = pAd->StaCfg.WepStatus;
- if (pEntry->AuthMode < Ndis802_11AuthModeWPA) {
- pEntry->WpaState = AS_NOTUSE;
- pEntry->PrivacyFilter = Ndis802_11PrivFilterAcceptAll;
- } else {
- pEntry->WpaState = AS_PTKSTART;
- pEntry->PrivacyFilter = Ndis802_11PrivFilter8021xWEP;
- }
- NdisReleaseSpinLock(&pAd->MacTabLock);
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("LINK UP! ClientStatusFlags=%lx)\n",
- pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
-
- MlmeUpdateTxRates(pAd, TRUE, BSS0);
- MlmeUpdateHtTxRates(pAd, BSS0);
- DBGPRINT(RT_DEBUG_TRACE,
- ("LINK UP! (StaActive.bHtEnable =%d, )\n",
- pAd->StaActive.SupportedPhyInfo.bHtEnable));
-
- if (pAd->CommonCfg.bAggregationCapable) {
- if ((pAd->CommonCfg.bPiggyBackCapable)
- && (pAd->MlmeAux.APRalinkIe & 0x00000003) == 3) {
- OPSTATUS_SET_FLAG(pAd,
- fOP_STATUS_PIGGYBACK_INUSED);
- OPSTATUS_SET_FLAG(pAd,
- fOP_STATUS_AGGREGATION_INUSED);
- CLIENT_STATUS_SET_FLAG(pEntry,
- fCLIENT_STATUS_AGGREGATION_CAPABLE);
- CLIENT_STATUS_SET_FLAG(pEntry,
- fCLIENT_STATUS_PIGGYBACK_CAPABLE);
- RTMPSetPiggyBack(pAd, TRUE);
- DBGPRINT(RT_DEBUG_TRACE,
- ("Turn on Piggy-Back\n"));
- } else if (pAd->MlmeAux.APRalinkIe & 0x00000001) {
- OPSTATUS_SET_FLAG(pAd,
- fOP_STATUS_AGGREGATION_INUSED);
- CLIENT_STATUS_SET_FLAG(pEntry,
- fCLIENT_STATUS_AGGREGATION_CAPABLE);
- DBGPRINT(RT_DEBUG_TRACE,
- ("Ralink Aggregation\n"));
- }
- }
-
- if (pAd->MlmeAux.APRalinkIe != 0x0) {
- if (CLIENT_STATUS_TEST_FLAG
- (pEntry, fCLIENT_STATUS_RDG_CAPABLE)) {
- AsicEnableRDG(pAd);
- }
- OPSTATUS_SET_FLAG(pAd, fCLIENT_STATUS_RALINK_CHIPSET);
- CLIENT_STATUS_SET_FLAG(pEntry,
- fCLIENT_STATUS_RALINK_CHIPSET);
- } else {
- OPSTATUS_CLEAR_FLAG(pAd, fCLIENT_STATUS_RALINK_CHIPSET);
- CLIENT_STATUS_CLEAR_FLAG(pEntry,
- fCLIENT_STATUS_RALINK_CHIPSET);
- }
- }
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("NDIS_STATUS_MEDIA_CONNECT Event B!.BACapability = %x. ClientStatusFlags = %lx\n",
- pAd->CommonCfg.BACapability.word,
- pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
-
- /* Set LED */
- RTMPSetLED(pAd, LED_LINK_UP);
-
- pAd->Mlme.PeriodicRound = 0;
- pAd->Mlme.OneSecPeriodicRound = 0;
- pAd->bConfigChanged = FALSE; /* Reset config flag */
- pAd->ExtraInfo = GENERAL_LINK_UP; /* Update extra information after link is up */
-
- /* Set basic auto fall back */
- {
- u8 *pTable;
- u8 TableSize = 0;
-
- MlmeSelectTxRateTable(pAd, &pAd->MacTab.Content[BSSID_WCID],
- &pTable, &TableSize,
- &pAd->CommonCfg.TxRateIndex);
- AsicUpdateAutoFallBackTable(pAd, pTable);
- }
-
- NdisAcquireSpinLock(&pAd->MacTabLock);
- pEntry->HTPhyMode.word = pAd->StaCfg.HTPhyMode.word;
- pEntry->MaxHTPhyMode.word = pAd->StaCfg.HTPhyMode.word;
- if (pAd->StaCfg.bAutoTxRateSwitch == FALSE) {
- pEntry->bAutoTxRateSwitch = FALSE;
-
- if (pEntry->HTPhyMode.field.MCS == 32)
- pEntry->HTPhyMode.field.ShortGI = GI_800;
-
- if ((pEntry->HTPhyMode.field.MCS > MCS_7)
- || (pEntry->HTPhyMode.field.MCS == 32))
- pEntry->HTPhyMode.field.STBC = STBC_NONE;
-
- /* If the legacy mode is set, overwrite the transmit setting of this entry. */
- if (pEntry->HTPhyMode.field.MODE <= MODE_OFDM)
- RTMPUpdateLegacyTxSetting((u8)pAd->StaCfg.
- DesiredTransmitSetting.field.
- FixedTxMode, pEntry);
- } else
- pEntry->bAutoTxRateSwitch = TRUE;
- NdisReleaseSpinLock(&pAd->MacTabLock);
-
- /* Let Link Status Page display first initial rate. */
- pAd->LastTxRate = (u16)(pEntry->HTPhyMode.word);
- /* Select DAC according to HT or Legacy */
- if (pAd->StaActive.SupportedPhyInfo.MCSSet[0] != 0x00) {
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &Value);
- Value &= (~0x18);
- if (pAd->Antenna.field.TxPath == 2) {
- Value |= 0x10;
- }
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, Value);
- } else {
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &Value);
- Value &= (~0x18);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, Value);
- }
-
- if (pAd->StaActive.SupportedPhyInfo.bHtEnable == FALSE) {
- } else if (pEntry->MaxRAmpduFactor == 0) {
- /* If HT AP doesn't support MaxRAmpduFactor = 1, we need to set max PSDU to 0. */
- /* Because our Init value is 1 at MACRegTable. */
- RTMP_IO_WRITE32(pAd, MAX_LEN_CFG, 0x0fff);
- }
- /* Patch for Marvel AP to gain high throughput */
- /* Need to set as following, */
- /* 1. Set txop in register-EDCA_AC0_CFG as 0x60 */
- /* 2. Set EnTXWriteBackDDONE in register-WPDMA_GLO_CFG as zero */
- /* 3. PBF_MAX_PCNT as 0x1F3FBF9F */
- /* 4. kick per two packets when dequeue */
- /* */
- /* Txop can only be modified when RDG is off, WMM is disable and TxBurst is enable */
- /* */
- /* if 1. Legacy AP WMM on, or 2. 11n AP, AMPDU disable. Force turn off burst no matter what bEnableTxBurst is. */
- if (!((pAd->CommonCfg.RxStream == 1) && (pAd->CommonCfg.TxStream == 1))
- && (pAd->StaCfg.bForceTxBurst == FALSE)
- &&
- (((pAd->StaActive.SupportedPhyInfo.bHtEnable == FALSE)
- && OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_WMM_INUSED))
- || ((pAd->StaActive.SupportedPhyInfo.bHtEnable == TRUE)
- && (pAd->CommonCfg.BACapability.field.Policy == BA_NOTUSE)))) {
- RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
- Data &= 0xFFFFFF00;
- RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
-
- RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3F7F9F);
- DBGPRINT(RT_DEBUG_TRACE, ("Txburst 1\n"));
- } else if (pAd->CommonCfg.bEnableTxBurst) {
- RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
- Data &= 0xFFFFFF00;
- Data |= 0x60;
- RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
- pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = TRUE;
-
- RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3FBF9F);
- DBGPRINT(RT_DEBUG_TRACE, ("Txburst 2\n"));
- } else {
- RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
- Data &= 0xFFFFFF00;
- RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
-
- RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3F7F9F);
- DBGPRINT(RT_DEBUG_TRACE, ("Txburst 3\n"));
- }
-
- /* Re-check to turn on TX burst or not. */
- if ((pAd->CommonCfg.IOTestParm.bLastAtheros == TRUE)
- && ((STA_WEP_ON(pAd)) || (STA_TKIP_ON(pAd)))) {
- pAd->CommonCfg.IOTestParm.bNextDisableRxBA = TRUE;
- if (pAd->CommonCfg.bEnableTxBurst) {
- u32 MACValue = 0;
- /* Force disable TXOP value in this case. The same action in MLMEUpdateProtect too. */
- /* I didn't change PBF_MAX_PCNT setting. */
- RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &MACValue);
- MACValue &= 0xFFFFFF00;
- RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, MACValue);
- pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = FALSE;
- }
- } else {
- pAd->CommonCfg.IOTestParm.bNextDisableRxBA = FALSE;
- }
-
- pAd->CommonCfg.IOTestParm.bLastAtheros = FALSE;
- COPY_MAC_ADDR(pAd->CommonCfg.LastBssid, pAd->CommonCfg.Bssid);
- DBGPRINT(RT_DEBUG_TRACE,
- ("pAd->bNextDisableRxBA= %d \n",
- pAd->CommonCfg.IOTestParm.bNextDisableRxBA));
- /* BSSID add in one MAC entry too. Because in Tx, ASIC need to check Cipher and IV/EIV, BAbitmap */
- /* Pther information in MACTab.Content[BSSID_WCID] is not necessary for driver. */
- /* Note: As STA, The MACTab.Content[BSSID_WCID]. PairwiseKey and Shared Key for BSS0 are the same. */
-
- if (pAd->StaCfg.WepStatus <= Ndis802_11WEPDisabled) {
- if (pAd->StaCfg.WpaSupplicantUP &&
- (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled) &&
- (pAd->StaCfg.IEEE8021X == TRUE)) ;
- else {
- pAd->StaCfg.PortSecured = WPA_802_1X_PORT_SECURED;
- pAd->StaCfg.PrivacyFilter =
- Ndis802_11PrivFilterAcceptAll;
- }
- }
-
- NdisAcquireSpinLock(&pAd->MacTabLock);
- pEntry->PortSecured = pAd->StaCfg.PortSecured;
- NdisReleaseSpinLock(&pAd->MacTabLock);
-
- /* */
- /* Patch Atheros AP TX will breakdown issue. */
- /* AP Model: DLink DWL-8200AP */
- /* */
- if (INFRA_ON(pAd) && OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_WMM_INUSED)
- && STA_TKIP_ON(pAd)) {
- RTMP_IO_WRITE32(pAd, RX_PARSER_CFG, 0x01);
- } else {
- RTMP_IO_WRITE32(pAd, RX_PARSER_CFG, 0x00);
- }
-
- RTMP_CLEAR_FLAG(pAd, fRTMP_ADAPTER_BSS_SCAN_IN_PROGRESS);
-
- RTMP_CLEAR_PSFLAG(pAd, fRTMP_PS_GO_TO_SLEEP_NOW);
-}
-
-/*
- ==========================================================================
-
- Routine Description:
- Disconnect current BSSID
-
- Arguments:
- pAd - Pointer to our adapter
- IsReqFromAP - Request from AP
-
- Return Value:
- None
-
- IRQL = DISPATCH_LEVEL
-
- Note:
- We need more information to know it's this requst from AP.
- If yes! we need to do extra handling, for example, remove the WPA key.
- Otherwise on 4-way handshaking will fail, since the WPA key didn't get
- removed while auto reconnect.
- Disconnect request from AP, it means we will start afresh 4-way handshaking
- on WPA mode.
-
- ==========================================================================
-*/
-void LinkDown(struct rt_rtmp_adapter *pAd, IN BOOLEAN IsReqFromAP)
-{
- u8 i, ByteValue = 0;
-
- /* Do nothing if monitor mode is on */
- if (MONITOR_ON(pAd))
- return;
-
- RTMP_CLEAR_PSFLAG(pAd, fRTMP_PS_GO_TO_SLEEP_NOW);
- /* Comment the codes, because the line 2291 call the same function. */
- /* RTMPCancelTimer(&pAd->Mlme.PsPollTimer, &Cancelled); */
- /* Not allowed go to sleep within the linkdown function. */
- RTMP_CLEAR_PSFLAG(pAd, fRTMP_PS_CAN_GO_SLEEP);
-
- if (pAd->CommonCfg.bWirelessEvent) {
- RTMPSendWirelessEvent(pAd, IW_STA_LINKDOWN_EVENT_FLAG,
- pAd->MacTab.Content[BSSID_WCID].Addr,
- BSS0, 0);
- }
-
- DBGPRINT(RT_DEBUG_TRACE, ("LINK DOWN!\n"));
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
-
-#ifdef RTMP_MAC_PCI
- if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_PCIE_DEVICE)) {
- BOOLEAN Cancelled;
- pAd->Mlme.bPsPollTimerRunning = FALSE;
- RTMPCancelTimer(&pAd->Mlme.PsPollTimer, &Cancelled);
- }
-
- pAd->bPCIclkOff = FALSE;
-#endif /* RTMP_MAC_PCI // */
-
- if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_DOZE)
- || RTMP_TEST_PSFLAG(pAd, fRTMP_PS_SET_PCI_CLK_OFF_COMMAND)
- || RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_IDLE_RADIO_OFF)) {
- AUTO_WAKEUP_STRUC AutoWakeupCfg;
- AsicForceWakeup(pAd, TRUE);
- AutoWakeupCfg.word = 0;
- RTMP_IO_WRITE32(pAd, AUTO_WAKEUP_CFG, AutoWakeupCfg.word);
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_DOZE);
- }
-#ifdef RTMP_MAC_PCI
- pAd->bPCIclkOff = FALSE;
-#endif /* RTMP_MAC_PCI // */
-
- if (ADHOC_ON(pAd)) /* Adhoc mode link down */
- {
- DBGPRINT(RT_DEBUG_TRACE, ("LINK DOWN 1!\n"));
-
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_ADHOC_ON);
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
- RTMP_IndicateMediaState(pAd);
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
- BssTableDeleteEntry(&pAd->ScanTab, pAd->CommonCfg.Bssid,
- pAd->CommonCfg.Channel);
- DBGPRINT(RT_DEBUG_TRACE,
- (" MacTab.Size=%d !\n", pAd->MacTab.Size));
- } else /* Infra structure mode */
- {
- DBGPRINT(RT_DEBUG_TRACE, ("LINK DOWN 2!\n"));
-
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_INFRA_ON);
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
-
- /* Saved last SSID for linkup comparison */
- pAd->CommonCfg.LastSsidLen = pAd->CommonCfg.SsidLen;
- NdisMoveMemory(pAd->CommonCfg.LastSsid, pAd->CommonCfg.Ssid,
- pAd->CommonCfg.LastSsidLen);
- COPY_MAC_ADDR(pAd->CommonCfg.LastBssid, pAd->CommonCfg.Bssid);
- if (pAd->MlmeAux.CurrReqIsFromNdis == TRUE) {
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
- RTMP_IndicateMediaState(pAd);
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
- DBGPRINT(RT_DEBUG_TRACE,
- ("NDIS_STATUS_MEDIA_DISCONNECT Event A!\n"));
- pAd->MlmeAux.CurrReqIsFromNdis = FALSE;
- } else {
- /* */
- /* If disassociation request is from NDIS, then we don't need to delete BSSID from entry. */
- /* Otherwise lost beacon or receive De-Authentication from AP, */
- /* then we should delete BSSID from BssTable. */
- /* If we don't delete from entry, roaming will fail. */
- /* */
- BssTableDeleteEntry(&pAd->ScanTab, pAd->CommonCfg.Bssid,
- pAd->CommonCfg.Channel);
- }
-
- /* restore back to - */
- /* 1. long slot (20 us) or short slot (9 us) time */
- /* 2. turn on/off RTS/CTS and/or CTS-to-self protection */
- /* 3. short preamble */
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_BG_PROTECTION_INUSED);
-
- }
-
- for (i = 1; i < MAX_LEN_OF_MAC_TABLE; i++) {
- if (pAd->MacTab.Content[i].ValidAsCLI == TRUE)
- MacTableDeleteEntry(pAd, pAd->MacTab.Content[i].Aid,
- pAd->MacTab.Content[i].Addr);
- }
-
- AsicSetSlotTime(pAd, TRUE); /*FALSE); */
- AsicSetEdcaParm(pAd, NULL);
-
- /* Set LED */
- RTMPSetLED(pAd, LED_LINK_DOWN);
- pAd->LedIndicatorStrength = 0xF0;
- RTMPSetSignalLED(pAd, -100); /* Force signal strength Led to be turned off, firmware has not done it. */
-
- AsicDisableSync(pAd);
-
- pAd->Mlme.PeriodicRound = 0;
- pAd->Mlme.OneSecPeriodicRound = 0;
-
- if (pAd->StaCfg.BssType == BSS_INFRA) {
- /* Remove StaCfg Information after link down */
- NdisZeroMemory(pAd->CommonCfg.Bssid, MAC_ADDR_LEN);
- NdisZeroMemory(pAd->CommonCfg.Ssid, MAX_LEN_OF_SSID);
- pAd->CommonCfg.SsidLen = 0;
- }
-
- NdisZeroMemory(&pAd->MlmeAux.HtCapability, sizeof(struct rt_ht_capability_ie));
- NdisZeroMemory(&pAd->MlmeAux.AddHtInfo, sizeof(struct rt_add_ht_info_ie));
- pAd->MlmeAux.HtCapabilityLen = 0;
- pAd->MlmeAux.NewExtChannelOffset = 0xff;
-
- /* Reset WPA-PSK state. Only reset when supplicant enabled */
- if (pAd->StaCfg.WpaState != SS_NOTUSE) {
- pAd->StaCfg.WpaState = SS_START;
- /* Clear Replay counter */
- NdisZeroMemory(pAd->StaCfg.ReplayCounter, 8);
-
- }
- /* */
- /* if link down come from AP, we need to remove all WPA keys on WPA mode. */
- /* otherwise will cause 4-way handshaking failed, since the WPA key not empty. */
- /* */
- if ((IsReqFromAP) && (pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA)) {
- /* Remove all WPA keys */
- RTMPWPARemoveAllKeys(pAd);
- }
- /* 802.1x port control */
-
- /* Prevent clear PortSecured here with static WEP */
- /* NetworkManger set security policy first then set SSID to connect AP. */
- if (pAd->StaCfg.WpaSupplicantUP &&
- (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled) &&
- (pAd->StaCfg.IEEE8021X == FALSE)) {
- pAd->StaCfg.PortSecured = WPA_802_1X_PORT_SECURED;
- } else {
- pAd->StaCfg.PortSecured = WPA_802_1X_PORT_NOT_SECURED;
- pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilter8021xWEP;
- }
-
- NdisAcquireSpinLock(&pAd->MacTabLock);
- NdisZeroMemory(&pAd->MacTab, sizeof(struct rt_mac_table));
- pAd->MacTab.Content[BSSID_WCID].PortSecured = pAd->StaCfg.PortSecured;
- NdisReleaseSpinLock(&pAd->MacTabLock);
-
- pAd->StaCfg.MicErrCnt = 0;
-
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
- /* Update extra information to link is up */
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
-
- pAd->StaActive.SupportedPhyInfo.bHtEnable = FALSE;
-
-#ifdef RTMP_MAC_USB
- pAd->bUsbTxBulkAggre = FALSE;
-#endif /* RTMP_MAC_USB // */
-
- /* Clean association information */
- NdisZeroMemory(&pAd->StaCfg.AssocInfo,
- sizeof(struct rt_ndis_802_11_association_information));
- pAd->StaCfg.AssocInfo.Length =
- sizeof(struct rt_ndis_802_11_association_information);
- pAd->StaCfg.ReqVarIELen = 0;
- pAd->StaCfg.ResVarIELen = 0;
-
- /* */
- /* Reset RSSI value after link down */
- /* */
- pAd->StaCfg.RssiSample.AvgRssi0 = 0;
- pAd->StaCfg.RssiSample.AvgRssi0X8 = 0;
- pAd->StaCfg.RssiSample.AvgRssi1 = 0;
- pAd->StaCfg.RssiSample.AvgRssi1X8 = 0;
- pAd->StaCfg.RssiSample.AvgRssi2 = 0;
- pAd->StaCfg.RssiSample.AvgRssi2X8 = 0;
-
- /* Restore MlmeRate */
- pAd->CommonCfg.MlmeRate = pAd->CommonCfg.BasicMlmeRate;
- pAd->CommonCfg.RtsRate = pAd->CommonCfg.BasicMlmeRate;
-
- /* */
- /* After Link down, reset piggy-back setting in ASIC. Disable RDG. */
- /* */
- if (pAd->CommonCfg.BBPCurrentBW == BW_40) {
- pAd->CommonCfg.BBPCurrentBW = BW_20;
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &ByteValue);
- ByteValue &= (~0x18);
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, ByteValue);
- }
- /* Reset DAC */
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &ByteValue);
- ByteValue &= (~0x18);
- if (pAd->Antenna.field.TxPath == 2) {
- ByteValue |= 0x10;
- }
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, ByteValue);
-
- RTMPSetPiggyBack(pAd, FALSE);
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_PIGGYBACK_INUSED);
-
- pAd->CommonCfg.BACapability.word = pAd->CommonCfg.REGBACapability.word;
-
- /* Restore all settings in the following. */
- AsicUpdateProtect(pAd, 0,
- (ALLN_SETPROTECT | CCKSETPROTECT | OFDMSETPROTECT),
- TRUE, FALSE);
- AsicDisableRDG(pAd);
- pAd->CommonCfg.IOTestParm.bCurrentAtheros = FALSE;
- pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = FALSE;
-
- RTMP_IO_WRITE32(pAd, MAX_LEN_CFG, 0x1fff);
- RTMP_CLEAR_FLAG(pAd, fRTMP_ADAPTER_BSS_SCAN_IN_PROGRESS);
-
-/* Allow go to sleep after linkdown steps. */
- RTMP_SET_PSFLAG(pAd, fRTMP_PS_CAN_GO_SLEEP);
-
- RtmpOSWrielessEventSend(pAd, SIOCGIWAP, -1, NULL, NULL, 0);
-
-#ifdef RT30xx
- if ((IS_RT30xx(pAd) || IS_RT3090(pAd) || IS_RT3390(pAd))
- && (pAd->Antenna.field.RxPath > 1 || pAd->Antenna.field.TxPath > 1)) {
- RTMP_ASIC_MMPS_DISABLE(pAd);
- }
-#endif /* RT30xx // */
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void IterateOnBssTab(struct rt_rtmp_adapter *pAd)
-{
- struct rt_mlme_start_req StartReq;
- struct rt_mlme_join_req JoinReq;
- unsigned long BssIdx;
-
- /* Change the wepstatus to original wepstatus */
- pAd->StaCfg.WepStatus = pAd->StaCfg.OrigWepStatus;
- pAd->StaCfg.PairCipher = pAd->StaCfg.OrigWepStatus;
- pAd->StaCfg.GroupCipher = pAd->StaCfg.OrigWepStatus;
-
- BssIdx = pAd->MlmeAux.BssIdx;
- if (BssIdx < pAd->MlmeAux.SsidBssTab.BssNr) {
- /* Check cipher suite, AP must have more secured cipher than station setting */
- /* Set the Pairwise and Group cipher to match the intended AP setting */
- /* We can only connect to AP with less secured cipher setting */
- if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA)
- || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK)) {
- pAd->StaCfg.GroupCipher =
- pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.
- GroupCipher;
-
- if (pAd->StaCfg.WepStatus ==
- pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.
- PairCipher)
- pAd->StaCfg.PairCipher =
- pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].
- WPA.PairCipher;
- else if (pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.
- PairCipherAux != Ndis802_11WEPDisabled)
- pAd->StaCfg.PairCipher =
- pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].
- WPA.PairCipherAux;
- else /* There is no PairCipher Aux, downgrade our capability to TKIP */
- pAd->StaCfg.PairCipher =
- Ndis802_11Encryption2Enabled;
- } else if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2)
- || (pAd->StaCfg.AuthMode ==
- Ndis802_11AuthModeWPA2PSK)) {
- pAd->StaCfg.GroupCipher =
- pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.
- GroupCipher;
-
- if (pAd->StaCfg.WepStatus ==
- pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.
- PairCipher)
- pAd->StaCfg.PairCipher =
- pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].
- WPA2.PairCipher;
- else if (pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.
- PairCipherAux != Ndis802_11WEPDisabled)
- pAd->StaCfg.PairCipher =
- pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].
- WPA2.PairCipherAux;
- else /* There is no PairCipher Aux, downgrade our capability to TKIP */
- pAd->StaCfg.PairCipher =
- Ndis802_11Encryption2Enabled;
-
- /* RSN capability */
- pAd->StaCfg.RsnCapability =
- pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.
- RsnCapability;
- }
- /* Set Mix cipher flag */
- pAd->StaCfg.bMixCipher =
- (pAd->StaCfg.PairCipher ==
- pAd->StaCfg.GroupCipher) ? FALSE : TRUE;
- /*if (pAd->StaCfg.bMixCipher == TRUE)
- {
- // If mix cipher, re-build RSNIE
- RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, 0);
- } */
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - iterate BSS %ld of %d\n", BssIdx,
- pAd->MlmeAux.SsidBssTab.BssNr));
- JoinParmFill(pAd, &JoinReq, BssIdx);
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_JOIN_REQ,
- sizeof(struct rt_mlme_join_req), &JoinReq);
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_JOIN;
- } else if (pAd->StaCfg.BssType == BSS_ADHOC) {
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - All BSS fail; start a new ADHOC (Ssid=%s)...\n",
- pAd->MlmeAux.Ssid));
- StartParmFill(pAd, &StartReq, (char *)pAd->MlmeAux.Ssid,
- pAd->MlmeAux.SsidLen);
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_START_REQ,
- sizeof(struct rt_mlme_start_req), &StartReq);
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_START;
- } else /* no more BSS */
- {
-
- {
- AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
- AsicLockChannel(pAd, pAd->CommonCfg.Channel);
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - All roaming failed, restore to channel %d, Total BSS[%02d]\n",
- pAd->CommonCfg.Channel, pAd->ScanTab.BssNr));
- }
-
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
- }
-}
-
-/* for re-association only */
-/* IRQL = DISPATCH_LEVEL */
-void IterateOnBssTab2(struct rt_rtmp_adapter *pAd)
-{
- struct rt_mlme_assoc_req ReassocReq;
- unsigned long BssIdx;
- struct rt_bss_entry *pBss;
-
- BssIdx = pAd->MlmeAux.RoamIdx;
- pBss = &pAd->MlmeAux.RoamTab.BssEntry[BssIdx];
-
- if (BssIdx < pAd->MlmeAux.RoamTab.BssNr) {
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - iterate BSS %ld of %d\n", BssIdx,
- pAd->MlmeAux.RoamTab.BssNr));
-
- AsicSwitchChannel(pAd, pBss->Channel, FALSE);
- AsicLockChannel(pAd, pBss->Channel);
-
- /* reassociate message has the same structure as associate message */
- AssocParmFill(pAd, &ReassocReq, pBss->Bssid,
- pBss->CapabilityInfo, ASSOC_TIMEOUT,
- pAd->StaCfg.DefaultListenCount);
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_REASSOC_REQ,
- sizeof(struct rt_mlme_assoc_req), &ReassocReq);
-
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_REASSOC;
- } else /* no more BSS */
- {
-
- {
- AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
- AsicLockChannel(pAd, pAd->CommonCfg.Channel);
- DBGPRINT(RT_DEBUG_TRACE,
- ("CNTL - All roaming failed, restore to channel %d, Total BSS[%02d]\n",
- pAd->CommonCfg.Channel, pAd->ScanTab.BssNr));
- }
-
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
- }
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void JoinParmFill(struct rt_rtmp_adapter *pAd,
- struct rt_mlme_join_req *JoinReq, unsigned long BssIdx)
-{
- JoinReq->BssIdx = BssIdx;
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void ScanParmFill(struct rt_rtmp_adapter *pAd,
- struct rt_mlme_scan_req *ScanReq,
- char Ssid[],
- u8 SsidLen, u8 BssType, u8 ScanType)
-{
- NdisZeroMemory(ScanReq->Ssid, MAX_LEN_OF_SSID);
- ScanReq->SsidLen = SsidLen;
- NdisMoveMemory(ScanReq->Ssid, Ssid, SsidLen);
- ScanReq->BssType = BssType;
- ScanReq->ScanType = ScanType;
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void StartParmFill(struct rt_rtmp_adapter *pAd,
- struct rt_mlme_start_req *StartReq,
- char Ssid[], u8 SsidLen)
-{
- ASSERT(SsidLen <= MAX_LEN_OF_SSID);
- NdisMoveMemory(StartReq->Ssid, Ssid, SsidLen);
- StartReq->SsidLen = SsidLen;
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-void AuthParmFill(struct rt_rtmp_adapter *pAd,
- struct rt_mlme_auth_req *AuthReq,
- u8 *pAddr, u16 Alg)
-{
- COPY_MAC_ADDR(AuthReq->Addr, pAddr);
- AuthReq->Alg = Alg;
- AuthReq->Timeout = AUTH_TIMEOUT;
-}
-
-/*
- ==========================================================================
- Description:
-
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
- */
-#ifdef RTMP_MAC_PCI
-void ComposePsPoll(struct rt_rtmp_adapter *pAd)
-{
- NdisZeroMemory(&pAd->PsPollFrame, sizeof(struct rt_pspoll_frame));
- pAd->PsPollFrame.FC.Type = BTYPE_CNTL;
- pAd->PsPollFrame.FC.SubType = SUBTYPE_PS_POLL;
- pAd->PsPollFrame.Aid = pAd->StaActive.Aid | 0xC000;
- COPY_MAC_ADDR(pAd->PsPollFrame.Bssid, pAd->CommonCfg.Bssid);
- COPY_MAC_ADDR(pAd->PsPollFrame.Ta, pAd->CurrentAddress);
-}
-
-/* IRQL = DISPATCH_LEVEL */
-void ComposeNullFrame(struct rt_rtmp_adapter *pAd)
-{
- NdisZeroMemory(&pAd->NullFrame, sizeof(struct rt_header_802_11));
- pAd->NullFrame.FC.Type = BTYPE_DATA;
- pAd->NullFrame.FC.SubType = SUBTYPE_NULL_FUNC;
- pAd->NullFrame.FC.ToDs = 1;
- COPY_MAC_ADDR(pAd->NullFrame.Addr1, pAd->CommonCfg.Bssid);
- COPY_MAC_ADDR(pAd->NullFrame.Addr2, pAd->CurrentAddress);
- COPY_MAC_ADDR(pAd->NullFrame.Addr3, pAd->CommonCfg.Bssid);
-}
-#endif /* RTMP_MAC_PCI // */
-#ifdef RTMP_MAC_USB
-void MlmeCntlConfirm(struct rt_rtmp_adapter *pAd, unsigned long MsgType, u16 Msg)
-{
- MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MsgType, sizeof(u16),
- &Msg);
-}
-
-void ComposePsPoll(struct rt_rtmp_adapter *pAd)
-{
- struct rt_txinfo *pTxInfo;
- struct rt_txwi * pTxWI;
-
- DBGPRINT(RT_DEBUG_TRACE, ("ComposePsPoll\n"));
- NdisZeroMemory(&pAd->PsPollFrame, sizeof(struct rt_pspoll_frame));
-
- pAd->PsPollFrame.FC.PwrMgmt = 0;
- pAd->PsPollFrame.FC.Type = BTYPE_CNTL;
- pAd->PsPollFrame.FC.SubType = SUBTYPE_PS_POLL;
- pAd->PsPollFrame.Aid = pAd->StaActive.Aid | 0xC000;
- COPY_MAC_ADDR(pAd->PsPollFrame.Bssid, pAd->CommonCfg.Bssid);
- COPY_MAC_ADDR(pAd->PsPollFrame.Ta, pAd->CurrentAddress);
-
- RTMPZeroMemory(&pAd->PsPollContext.TransferBuffer->field.
- WirelessPacket[0], 100);
- pTxInfo =
- (struct rt_txinfo *)& pAd->PsPollContext.TransferBuffer->field.
- WirelessPacket[0];
- RTMPWriteTxInfo(pAd, pTxInfo,
- (u16)(sizeof(struct rt_pspoll_frame) + TXWI_SIZE), TRUE,
- EpToQueue[MGMTPIPEIDX], FALSE, FALSE);
- pTxWI =
- (struct rt_txwi *) & pAd->PsPollContext.TransferBuffer->field.
- WirelessPacket[TXINFO_SIZE];
- RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, FALSE, FALSE, TRUE, FALSE, 0,
- BSSID_WCID, (sizeof(struct rt_pspoll_frame)), 0, 0,
- (u8)pAd->CommonCfg.MlmeTransmit.field.MCS,
- IFS_BACKOFF, FALSE, &pAd->CommonCfg.MlmeTransmit);
- RTMPMoveMemory(&pAd->PsPollContext.TransferBuffer->field.
- WirelessPacket[TXWI_SIZE + TXINFO_SIZE],
- &pAd->PsPollFrame, sizeof(struct rt_pspoll_frame));
- /* Append 4 extra zero bytes. */
- pAd->PsPollContext.BulkOutSize =
- TXINFO_SIZE + TXWI_SIZE + sizeof(struct rt_pspoll_frame) + 4;
-}
-
-/* IRQL = DISPATCH_LEVEL */
-void ComposeNullFrame(struct rt_rtmp_adapter *pAd)
-{
- struct rt_txinfo *pTxInfo;
- struct rt_txwi * pTxWI;
-
- NdisZeroMemory(&pAd->NullFrame, sizeof(struct rt_header_802_11));
- pAd->NullFrame.FC.Type = BTYPE_DATA;
- pAd->NullFrame.FC.SubType = SUBTYPE_NULL_FUNC;
- pAd->NullFrame.FC.ToDs = 1;
- COPY_MAC_ADDR(pAd->NullFrame.Addr1, pAd->CommonCfg.Bssid);
- COPY_MAC_ADDR(pAd->NullFrame.Addr2, pAd->CurrentAddress);
- COPY_MAC_ADDR(pAd->NullFrame.Addr3, pAd->CommonCfg.Bssid);
- RTMPZeroMemory(&pAd->NullContext.TransferBuffer->field.
- WirelessPacket[0], 100);
- pTxInfo =
- (struct rt_txinfo *)& pAd->NullContext.TransferBuffer->field.
- WirelessPacket[0];
- RTMPWriteTxInfo(pAd, pTxInfo,
- (u16)(sizeof(struct rt_header_802_11) + TXWI_SIZE), TRUE,
- EpToQueue[MGMTPIPEIDX], FALSE, FALSE);
- pTxWI =
- (struct rt_txwi *) & pAd->NullContext.TransferBuffer->field.
- WirelessPacket[TXINFO_SIZE];
- RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, FALSE, FALSE, TRUE, FALSE, 0,
- BSSID_WCID, (sizeof(struct rt_header_802_11)), 0, 0,
- (u8)pAd->CommonCfg.MlmeTransmit.field.MCS,
- IFS_BACKOFF, FALSE, &pAd->CommonCfg.MlmeTransmit);
- RTMPMoveMemory(&pAd->NullContext.TransferBuffer->field.
- WirelessPacket[TXWI_SIZE + TXINFO_SIZE], &pAd->NullFrame,
- sizeof(struct rt_header_802_11));
- pAd->NullContext.BulkOutSize =
- TXINFO_SIZE + TXWI_SIZE + sizeof(pAd->NullFrame) + 4;
-}
-#endif /* RTMP_MAC_USB // */
-
-/*
- ==========================================================================
- Description:
- Pre-build a BEACON frame in the shared memory
-
- IRQL = PASSIVE_LEVEL
- IRQL = DISPATCH_LEVEL
-
- ==========================================================================
-*/
-unsigned long MakeIbssBeacon(struct rt_rtmp_adapter *pAd)
-{
- u8 DsLen = 1, IbssLen = 2;
- u8 LocalErpIe[3] = { IE_ERP, 1, 0x04 };
- struct rt_header_802_11 BcnHdr;
- u16 CapabilityInfo;
- LARGE_INTEGER FakeTimestamp;
- unsigned long FrameLen = 0;
- struct rt_txwi * pTxWI = &pAd->BeaconTxWI;
- u8 *pBeaconFrame = pAd->BeaconBuf;
- BOOLEAN Privacy;
- u8 SupRate[MAX_LEN_OF_SUPPORTED_RATES];
- u8 SupRateLen = 0;
- u8 ExtRate[MAX_LEN_OF_SUPPORTED_RATES];
- u8 ExtRateLen = 0;
- u8 RSNIe = IE_WPA;
-
- if ((pAd->CommonCfg.PhyMode == PHY_11B)
- && (pAd->CommonCfg.Channel <= 14)) {
- SupRate[0] = 0x82; /* 1 mbps */
- SupRate[1] = 0x84; /* 2 mbps */
- SupRate[2] = 0x8b; /* 5.5 mbps */
- SupRate[3] = 0x96; /* 11 mbps */
- SupRateLen = 4;
- ExtRateLen = 0;
- } else if (pAd->CommonCfg.Channel > 14) {
- SupRate[0] = 0x8C; /* 6 mbps, in units of 0.5 Mbps, basic rate */
- SupRate[1] = 0x12; /* 9 mbps, in units of 0.5 Mbps */
- SupRate[2] = 0x98; /* 12 mbps, in units of 0.5 Mbps, basic rate */
- SupRate[3] = 0x24; /* 18 mbps, in units of 0.5 Mbps */
- SupRate[4] = 0xb0; /* 24 mbps, in units of 0.5 Mbps, basic rate */
- SupRate[5] = 0x48; /* 36 mbps, in units of 0.5 Mbps */
- SupRate[6] = 0x60; /* 48 mbps, in units of 0.5 Mbps */
- SupRate[7] = 0x6c; /* 54 mbps, in units of 0.5 Mbps */
- SupRateLen = 8;
- ExtRateLen = 0;
-
- /* */
- /* Also Update MlmeRate & RtsRate for G only & A only */
- /* */
- pAd->CommonCfg.MlmeRate = RATE_6;
- pAd->CommonCfg.RtsRate = RATE_6;
- pAd->CommonCfg.MlmeTransmit.field.MODE = MODE_OFDM;
- pAd->CommonCfg.MlmeTransmit.field.MCS =
- OfdmRateToRxwiMCS[pAd->CommonCfg.MlmeRate];
- pAd->MacTab.Content[BSS0Mcast_WCID].HTPhyMode.field.MODE =
- MODE_OFDM;
- pAd->MacTab.Content[BSS0Mcast_WCID].HTPhyMode.field.MCS =
- OfdmRateToRxwiMCS[pAd->CommonCfg.MlmeRate];
- } else {
- SupRate[0] = 0x82; /* 1 mbps */
- SupRate[1] = 0x84; /* 2 mbps */
- SupRate[2] = 0x8b; /* 5.5 mbps */
- SupRate[3] = 0x96; /* 11 mbps */
- SupRateLen = 4;
-
- ExtRate[0] = 0x0C; /* 6 mbps, in units of 0.5 Mbps, */
- ExtRate[1] = 0x12; /* 9 mbps, in units of 0.5 Mbps */
- ExtRate[2] = 0x18; /* 12 mbps, in units of 0.5 Mbps, */
- ExtRate[3] = 0x24; /* 18 mbps, in units of 0.5 Mbps */
- ExtRate[4] = 0x30; /* 24 mbps, in units of 0.5 Mbps, */
- ExtRate[5] = 0x48; /* 36 mbps, in units of 0.5 Mbps */
- ExtRate[6] = 0x60; /* 48 mbps, in units of 0.5 Mbps */
- ExtRate[7] = 0x6c; /* 54 mbps, in units of 0.5 Mbps */
- ExtRateLen = 8;
- }
-
- pAd->StaActive.SupRateLen = SupRateLen;
- NdisMoveMemory(pAd->StaActive.SupRate, SupRate, SupRateLen);
- pAd->StaActive.ExtRateLen = ExtRateLen;
- NdisMoveMemory(pAd->StaActive.ExtRate, ExtRate, ExtRateLen);
-
- /* compose IBSS beacon frame */
- MgtMacHeaderInit(pAd, &BcnHdr, SUBTYPE_BEACON, 0, BROADCAST_ADDR,
- pAd->CommonCfg.Bssid);
- Privacy = (pAd->StaCfg.WepStatus == Ndis802_11Encryption1Enabled)
- || (pAd->StaCfg.WepStatus == Ndis802_11Encryption2Enabled)
- || (pAd->StaCfg.WepStatus == Ndis802_11Encryption3Enabled);
- CapabilityInfo =
- CAP_GENERATE(0, 1, Privacy,
- (pAd->CommonCfg.TxPreamble == Rt802_11PreambleShort),
- 0, 0);
-
- MakeOutgoingFrame(pBeaconFrame, &FrameLen,
- sizeof(struct rt_header_802_11), &BcnHdr,
- TIMESTAMP_LEN, &FakeTimestamp,
- 2, &pAd->CommonCfg.BeaconPeriod,
- 2, &CapabilityInfo,
- 1, &SsidIe,
- 1, &pAd->CommonCfg.SsidLen,
- pAd->CommonCfg.SsidLen, pAd->CommonCfg.Ssid,
- 1, &SupRateIe,
- 1, &SupRateLen,
- SupRateLen, SupRate,
- 1, &DsIe,
- 1, &DsLen,
- 1, &pAd->CommonCfg.Channel,
- 1, &IbssIe,
- 1, &IbssLen, 2, &pAd->StaActive.AtimWin, END_OF_ARGS);
-
- /* add ERP_IE and EXT_RAE IE of in 802.11g */
- if (ExtRateLen) {
- unsigned long tmp;
-
- MakeOutgoingFrame(pBeaconFrame + FrameLen, &tmp,
- 3, LocalErpIe,
- 1, &ExtRateIe,
- 1, &ExtRateLen,
- ExtRateLen, ExtRate, END_OF_ARGS);
- FrameLen += tmp;
- }
- /* If adhoc secruity is set for WPA-None, append the cipher suite IE */
- if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone) {
- unsigned long tmp;
- RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus,
- BSS0);
-
- MakeOutgoingFrame(pBeaconFrame + FrameLen, &tmp,
- 1, &RSNIe,
- 1, &pAd->StaCfg.RSNIE_Len,
- pAd->StaCfg.RSNIE_Len, pAd->StaCfg.RSN_IE,
- END_OF_ARGS);
- FrameLen += tmp;
- }
-
- if ((pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED)) {
- unsigned long TmpLen;
- u8 HtLen, HtLen1;
-
- /* add HT Capability IE */
- HtLen = sizeof(pAd->CommonCfg.HtCapability);
- HtLen1 = sizeof(pAd->CommonCfg.AddHTInfo);
-
- MakeOutgoingFrame(pBeaconFrame + FrameLen, &TmpLen,
- 1, &HtCapIe,
- 1, &HtLen,
- HtLen, &pAd->CommonCfg.HtCapability,
- 1, &AddHtInfoIe,
- 1, &HtLen1,
- HtLen1, &pAd->CommonCfg.AddHTInfo,
- END_OF_ARGS);
-
- FrameLen += TmpLen;
- }
- /*beacon use reserved WCID 0xff */
- if (pAd->CommonCfg.Channel > 14) {
- RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, TRUE, FALSE, FALSE,
- TRUE, 0, 0xff, FrameLen, PID_MGMT, PID_BEACON,
- RATE_1, IFS_HTTXOP, FALSE,
- &pAd->CommonCfg.MlmeTransmit);
- } else {
- /* Set to use 1Mbps for Adhoc beacon. */
- HTTRANSMIT_SETTING Transmit;
- Transmit.word = 0;
- RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, TRUE, FALSE, FALSE,
- TRUE, 0, 0xff, FrameLen, PID_MGMT, PID_BEACON,
- RATE_1, IFS_HTTXOP, FALSE, &Transmit);
- }
-
- DBGPRINT(RT_DEBUG_TRACE,
- ("MakeIbssBeacon (len=%ld), SupRateLen=%d, ExtRateLen=%d, Channel=%d, PhyMode=%d\n",
- FrameLen, SupRateLen, ExtRateLen, pAd->CommonCfg.Channel,
- pAd->CommonCfg.PhyMode));
- return FrameLen;
-}