|
@@ -1,2462 +1,2 @@
|
|
-/*
|
|
|
|
- *************************************************************************
|
|
|
|
- * Ralink Tech Inc.
|
|
|
|
- * 5F., No.36, Taiyuan St., Jhubei City,
|
|
|
|
- * Hsinchu County 302,
|
|
|
|
- * Taiwan, R.O.C.
|
|
|
|
- *
|
|
|
|
- * (c) Copyright 2002-2007, Ralink Technology, Inc.
|
|
|
|
- *
|
|
|
|
- * This program is free software; you can redistribute it and/or modify *
|
|
|
|
- * it under the terms of the GNU General Public License as published by *
|
|
|
|
- * the Free Software Foundation; either version 2 of the License, or *
|
|
|
|
- * (at your option) any later version. *
|
|
|
|
- * *
|
|
|
|
- * This program is distributed in the hope that it will be useful, *
|
|
|
|
- * but WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
|
|
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
|
|
|
|
- * GNU General Public License for more details. *
|
|
|
|
- * *
|
|
|
|
- * You should have received a copy of the GNU General Public License *
|
|
|
|
- * along with this program; if not, write to the *
|
|
|
|
- * Free Software Foundation, Inc., *
|
|
|
|
- * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
|
|
|
|
- * *
|
|
|
|
- *************************************************************************
|
|
|
|
-
|
|
|
|
- Module Name:
|
|
|
|
- connect.c
|
|
|
|
-
|
|
|
|
- Abstract:
|
|
|
|
-
|
|
|
|
- Revision History:
|
|
|
|
- Who When What
|
|
|
|
- -------- ---------- ----------------------------------------------
|
|
|
|
- John 2004-08-08 Major modification from RT2560
|
|
|
|
-*/
|
|
|
|
-#include "../rt_config.h"
|
|
|
|
-
|
|
|
|
-UCHAR CipherSuiteWpaNoneTkip[] = {
|
|
|
|
- 0x00, 0x50, 0xf2, 0x01, // oui
|
|
|
|
- 0x01, 0x00, // Version
|
|
|
|
- 0x00, 0x50, 0xf2, 0x02, // Multicast
|
|
|
|
- 0x01, 0x00, // Number of unicast
|
|
|
|
- 0x00, 0x50, 0xf2, 0x02, // unicast
|
|
|
|
- 0x01, 0x00, // number of authentication method
|
|
|
|
- 0x00, 0x50, 0xf2, 0x00 // authentication
|
|
|
|
- };
|
|
|
|
-UCHAR CipherSuiteWpaNoneTkipLen = (sizeof(CipherSuiteWpaNoneTkip) / sizeof(UCHAR));
|
|
|
|
-
|
|
|
|
-UCHAR CipherSuiteWpaNoneAes[] = {
|
|
|
|
- 0x00, 0x50, 0xf2, 0x01, // oui
|
|
|
|
- 0x01, 0x00, // Version
|
|
|
|
- 0x00, 0x50, 0xf2, 0x04, // Multicast
|
|
|
|
- 0x01, 0x00, // Number of unicast
|
|
|
|
- 0x00, 0x50, 0xf2, 0x04, // unicast
|
|
|
|
- 0x01, 0x00, // number of authentication method
|
|
|
|
- 0x00, 0x50, 0xf2, 0x00 // authentication
|
|
|
|
- };
|
|
|
|
-UCHAR CipherSuiteWpaNoneAesLen = (sizeof(CipherSuiteWpaNoneAes) / sizeof(UCHAR));
|
|
|
|
-
|
|
|
|
-// The following MACRO is called after 1. starting an new IBSS, 2. succesfully JOIN an IBSS,
|
|
|
|
-// or 3. succesfully ASSOCIATE to a BSS, 4. successfully RE_ASSOCIATE to a BSS
|
|
|
|
-// All settings successfuly negotiated furing MLME state machines become final settings
|
|
|
|
-// and are copied to pAd->StaActive
|
|
|
|
-#define COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(_pAd) \
|
|
|
|
-{ \
|
|
|
|
- (_pAd)->CommonCfg.SsidLen = (_pAd)->MlmeAux.SsidLen; \
|
|
|
|
- NdisMoveMemory((_pAd)->CommonCfg.Ssid, (_pAd)->MlmeAux.Ssid, (_pAd)->MlmeAux.SsidLen); \
|
|
|
|
- COPY_MAC_ADDR((_pAd)->CommonCfg.Bssid, (_pAd)->MlmeAux.Bssid); \
|
|
|
|
- (_pAd)->CommonCfg.Channel = (_pAd)->MlmeAux.Channel; \
|
|
|
|
- (_pAd)->CommonCfg.CentralChannel = (_pAd)->MlmeAux.CentralChannel; \
|
|
|
|
- (_pAd)->StaActive.Aid = (_pAd)->MlmeAux.Aid; \
|
|
|
|
- (_pAd)->StaActive.AtimWin = (_pAd)->MlmeAux.AtimWin; \
|
|
|
|
- (_pAd)->StaActive.CapabilityInfo = (_pAd)->MlmeAux.CapabilityInfo; \
|
|
|
|
- (_pAd)->CommonCfg.BeaconPeriod = (_pAd)->MlmeAux.BeaconPeriod; \
|
|
|
|
- (_pAd)->StaActive.CfpMaxDuration = (_pAd)->MlmeAux.CfpMaxDuration; \
|
|
|
|
- (_pAd)->StaActive.CfpPeriod = (_pAd)->MlmeAux.CfpPeriod; \
|
|
|
|
- (_pAd)->StaActive.SupRateLen = (_pAd)->MlmeAux.SupRateLen; \
|
|
|
|
- NdisMoveMemory((_pAd)->StaActive.SupRate, (_pAd)->MlmeAux.SupRate, (_pAd)->MlmeAux.SupRateLen);\
|
|
|
|
- (_pAd)->StaActive.ExtRateLen = (_pAd)->MlmeAux.ExtRateLen; \
|
|
|
|
- NdisMoveMemory((_pAd)->StaActive.ExtRate, (_pAd)->MlmeAux.ExtRate, (_pAd)->MlmeAux.ExtRateLen);\
|
|
|
|
- NdisMoveMemory(&(_pAd)->CommonCfg.APEdcaParm, &(_pAd)->MlmeAux.APEdcaParm, sizeof(EDCA_PARM));\
|
|
|
|
- NdisMoveMemory(&(_pAd)->CommonCfg.APQosCapability, &(_pAd)->MlmeAux.APQosCapability, sizeof(QOS_CAPABILITY_PARM));\
|
|
|
|
- NdisMoveMemory(&(_pAd)->CommonCfg.APQbssLoad, &(_pAd)->MlmeAux.APQbssLoad, sizeof(QBSS_LOAD_PARM));\
|
|
|
|
- COPY_MAC_ADDR((_pAd)->MacTab.Content[BSSID_WCID].Addr, (_pAd)->MlmeAux.Bssid); \
|
|
|
|
- (_pAd)->MacTab.Content[BSSID_WCID].Aid = (_pAd)->MlmeAux.Aid; \
|
|
|
|
- (_pAd)->MacTab.Content[BSSID_WCID].PairwiseKey.CipherAlg = (_pAd)->StaCfg.PairCipher;\
|
|
|
|
- COPY_MAC_ADDR((_pAd)->MacTab.Content[BSSID_WCID].PairwiseKey.BssId, (_pAd)->MlmeAux.Bssid);\
|
|
|
|
- (_pAd)->MacTab.Content[BSSID_WCID].RateLen = (_pAd)->StaActive.SupRateLen + (_pAd)->StaActive.ExtRateLen;\
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = PASSIVE_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID MlmeCntlInit(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN STATE_MACHINE *S,
|
|
|
|
- OUT STATE_MACHINE_FUNC Trans[])
|
|
|
|
-{
|
|
|
|
- // Control state machine differs from other state machines, the interface
|
|
|
|
- // follows the standard interface
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID MlmeCntlMachinePerformAction(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN STATE_MACHINE *S,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- switch(pAd->Mlme.CntlMachine.CurrState)
|
|
|
|
- {
|
|
|
|
- case CNTL_IDLE:
|
|
|
|
- {
|
|
|
|
- CntlIdleProc(pAd, Elem);
|
|
|
|
- }
|
|
|
|
- break;
|
|
|
|
- case CNTL_WAIT_DISASSOC:
|
|
|
|
- CntlWaitDisassocProc(pAd, Elem);
|
|
|
|
- break;
|
|
|
|
- case CNTL_WAIT_JOIN:
|
|
|
|
- CntlWaitJoinProc(pAd, Elem);
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- // CNTL_WAIT_REASSOC is the only state in CNTL machine that does
|
|
|
|
- // not triggered directly or indirectly by "RTMPSetInformation(OID_xxx)".
|
|
|
|
- // Therefore not protected by NDIS's "only one outstanding OID request"
|
|
|
|
- // rule. Which means NDIS may SET OID in the middle of ROAMing attempts.
|
|
|
|
- // Current approach is to block new SET request at RTMPSetInformation()
|
|
|
|
- // when CntlMachine.CurrState is not CNTL_IDLE
|
|
|
|
- case CNTL_WAIT_REASSOC:
|
|
|
|
- CntlWaitReassocProc(pAd, Elem);
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- case CNTL_WAIT_START:
|
|
|
|
- CntlWaitStartProc(pAd, Elem);
|
|
|
|
- break;
|
|
|
|
- case CNTL_WAIT_AUTH:
|
|
|
|
- CntlWaitAuthProc(pAd, Elem);
|
|
|
|
- break;
|
|
|
|
- case CNTL_WAIT_AUTH2:
|
|
|
|
- CntlWaitAuthProc2(pAd, Elem);
|
|
|
|
- break;
|
|
|
|
- case CNTL_WAIT_ASSOC:
|
|
|
|
- CntlWaitAssocProc(pAd, Elem);
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- case CNTL_WAIT_OID_LIST_SCAN:
|
|
|
|
- if(Elem->MsgType == MT2_SCAN_CONF)
|
|
|
|
- {
|
|
|
|
- // Resume TxRing after SCANING complete. We hope the out-of-service time
|
|
|
|
- // won't be too long to let upper layer time-out the waiting frames
|
|
|
|
- RTMPResumeMsduTransmission(pAd);
|
|
|
|
- if (pAd->StaCfg.CCXReqType != MSRN_TYPE_UNUSED)
|
|
|
|
- {
|
|
|
|
- // Cisco scan request is finished, prepare beacon report
|
|
|
|
- MlmeEnqueue(pAd, AIRONET_STATE_MACHINE, MT2_AIRONET_SCAN_DONE, 0, NULL);
|
|
|
|
- }
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // Set LED status to previous status.
|
|
|
|
- //
|
|
|
|
- if (pAd->bLedOnScanning)
|
|
|
|
- {
|
|
|
|
- pAd->bLedOnScanning = FALSE;
|
|
|
|
- RTMPSetLED(pAd, pAd->LedStatus);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- case CNTL_WAIT_OID_DISASSOC:
|
|
|
|
- if (Elem->MsgType == MT2_DISASSOC_CONF)
|
|
|
|
- {
|
|
|
|
- LinkDown(pAd, FALSE);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- }
|
|
|
|
- break;
|
|
|
|
-#ifdef RT2870
|
|
|
|
- //
|
|
|
|
- // This state is for that we want to connect to an AP but
|
|
|
|
- // it didn't find on BSS List table. So we need to scan the air first,
|
|
|
|
- // after that we can try to connect to the desired AP if available.
|
|
|
|
- //
|
|
|
|
- case CNTL_WAIT_SCAN_FOR_CONNECT:
|
|
|
|
- if(Elem->MsgType == MT2_SCAN_CONF)
|
|
|
|
- {
|
|
|
|
- // Resume TxRing after SCANING complete. We hope the out-of-service time
|
|
|
|
- // won't be too long to let upper layer time-out the waiting frames
|
|
|
|
- RTMPResumeMsduTransmission(pAd);
|
|
|
|
-#ifdef CCX_SUPPORT
|
|
|
|
- if (pAd->StaCfg.CCXReqType != MSRN_TYPE_UNUSED)
|
|
|
|
- {
|
|
|
|
- // Cisco scan request is finished, prepare beacon report
|
|
|
|
- MlmeEnqueue(pAd, AIRONET_STATE_MACHINE, MT2_AIRONET_SCAN_DONE, 0, NULL);
|
|
|
|
- }
|
|
|
|
-#endif // CCX_SUPPORT //
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // Check if we can connect to.
|
|
|
|
- //
|
|
|
|
- BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab, pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.AutoReconnectSsidLen);
|
|
|
|
- if (pAd->MlmeAux.SsidBssTab.BssNr > 0)
|
|
|
|
- {
|
|
|
|
- MlmeAutoReconnectLastSSID(pAd);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- break;
|
|
|
|
-#endif // RT2870 //
|
|
|
|
- default:
|
|
|
|
- DBGPRINT_ERR(("!ERROR! CNTL - Illegal message type(=%ld)", Elem->MsgType));
|
|
|
|
- break;
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID CntlIdleProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- MLME_DISASSOC_REQ_STRUCT DisassocReq;
|
|
|
|
-
|
|
|
|
- if (RTMP_TEST_FLAG(pAd, fRTMP_ADAPTER_RADIO_OFF))
|
|
|
|
- return;
|
|
|
|
-
|
|
|
|
- switch(Elem->MsgType)
|
|
|
|
- {
|
|
|
|
- case OID_802_11_SSID:
|
|
|
|
- CntlOidSsidProc(pAd, Elem);
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- case OID_802_11_BSSID:
|
|
|
|
- CntlOidRTBssidProc(pAd,Elem);
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- case OID_802_11_BSSID_LIST_SCAN:
|
|
|
|
- CntlOidScanProc(pAd,Elem);
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- case OID_802_11_DISASSOCIATE:
|
|
|
|
- DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
|
|
|
|
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ, sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_DISASSOC;
|
|
|
|
-
|
|
|
|
- if (pAd->StaCfg.WpaSupplicantUP != WPA_SUPPLICANT_ENABLE_WITH_WEB_UI)
|
|
|
|
- {
|
|
|
|
- // Set the AutoReconnectSsid to prevent it reconnect to old SSID
|
|
|
|
- // Since calling this indicate user don't want to connect to that SSID anymore.
|
|
|
|
- pAd->MlmeAux.AutoReconnectSsidLen= 32;
|
|
|
|
- NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.AutoReconnectSsidLen);
|
|
|
|
- }
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- case MT2_MLME_ROAMING_REQ:
|
|
|
|
- CntlMlmeRoamingProc(pAd, Elem);
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- case OID_802_11_MIC_FAILURE_REPORT_FRAME:
|
|
|
|
- WpaMicFailureReportFrame(pAd, Elem);
|
|
|
|
- break;
|
|
|
|
-
|
|
|
|
- default:
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Illegal message in CntlIdleProc(MsgType=%ld)\n",Elem->MsgType));
|
|
|
|
- break;
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-VOID CntlOidScanProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- MLME_SCAN_REQ_STRUCT ScanReq;
|
|
|
|
- ULONG BssIdx = BSS_NOT_FOUND;
|
|
|
|
- BSS_ENTRY CurrBss;
|
|
|
|
-
|
|
|
|
- // record current BSS if network is connected.
|
|
|
|
- // 2003-2-13 do not include current IBSS if this is the only STA in this IBSS.
|
|
|
|
- if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED))
|
|
|
|
- {
|
|
|
|
- BssIdx = BssSsidTableSearch(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Ssid, pAd->CommonCfg.SsidLen, pAd->CommonCfg.Channel);
|
|
|
|
- if (BssIdx != BSS_NOT_FOUND)
|
|
|
|
- {
|
|
|
|
- NdisMoveMemory(&CurrBss, &pAd->ScanTab.BssEntry[BssIdx], sizeof(BSS_ENTRY));
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // clean up previous SCAN result, add current BSS back to table if any
|
|
|
|
- BssTableInit(&pAd->ScanTab);
|
|
|
|
- if (BssIdx != BSS_NOT_FOUND)
|
|
|
|
- {
|
|
|
|
- // DDK Note: If the NIC is associated with a particular BSSID and SSID
|
|
|
|
- // that are not contained in the list of BSSIDs generated by this scan, the
|
|
|
|
- // BSSID description of the currently associated BSSID and SSID should be
|
|
|
|
- // appended to the list of BSSIDs in the NIC's database.
|
|
|
|
- // To ensure this, we append this BSS as the first entry in SCAN result
|
|
|
|
- NdisMoveMemory(&pAd->ScanTab.BssEntry[0], &CurrBss, sizeof(BSS_ENTRY));
|
|
|
|
- pAd->ScanTab.BssNr = 1;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- ScanParmFill(pAd, &ScanReq, "", 0, BSS_ANY, SCAN_ACTIVE);
|
|
|
|
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ,
|
|
|
|
- sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
- Before calling this routine, user desired SSID should already been
|
|
|
|
- recorded in CommonCfg.Ssid[]
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID CntlOidSsidProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM * Elem)
|
|
|
|
-{
|
|
|
|
- PNDIS_802_11_SSID pOidSsid = (NDIS_802_11_SSID *)Elem->Msg;
|
|
|
|
- MLME_DISASSOC_REQ_STRUCT DisassocReq;
|
|
|
|
- ULONG Now;
|
|
|
|
-
|
|
|
|
- // Step 1. record the desired user settings to MlmeAux
|
|
|
|
- NdisZeroMemory(pAd->MlmeAux.Ssid, MAX_LEN_OF_SSID);
|
|
|
|
- NdisMoveMemory(pAd->MlmeAux.Ssid, pOidSsid->Ssid, pOidSsid->SsidLength);
|
|
|
|
- pAd->MlmeAux.SsidLen = (UCHAR)pOidSsid->SsidLength;
|
|
|
|
- NdisZeroMemory(pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
|
|
|
|
- pAd->MlmeAux.BssType = pAd->StaCfg.BssType;
|
|
|
|
-
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // Update Reconnect Ssid, that user desired to connect.
|
|
|
|
- //
|
|
|
|
- NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, MAX_LEN_OF_SSID);
|
|
|
|
- NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
|
|
|
|
- pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;
|
|
|
|
-
|
|
|
|
- // step 2. find all matching BSS in the lastest SCAN result (inBssTab)
|
|
|
|
- // & log them into MlmeAux.SsidBssTab for later-on iteration. Sort by RSSI order
|
|
|
|
- BssTableSsidSort(pAd, &pAd->MlmeAux.SsidBssTab, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - %d BSS of %d BSS match the desire (%d)SSID - %s\n",
|
|
|
|
- pAd->MlmeAux.SsidBssTab.BssNr, pAd->ScanTab.BssNr, pAd->MlmeAux.SsidLen, pAd->MlmeAux.Ssid));
|
|
|
|
- NdisGetSystemUpTime(&Now);
|
|
|
|
-
|
|
|
|
- if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) &&
|
|
|
|
- (pAd->CommonCfg.SsidLen == pAd->MlmeAux.SsidBssTab.BssEntry[0].SsidLen) &&
|
|
|
|
- NdisEqualMemory(pAd->CommonCfg.Ssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Ssid, pAd->CommonCfg.SsidLen) &&
|
|
|
|
- MAC_ADDR_EQUAL(pAd->CommonCfg.Bssid, pAd->MlmeAux.SsidBssTab.BssEntry[0].Bssid))
|
|
|
|
- {
|
|
|
|
- // Case 1. already connected with an AP who has the desired SSID
|
|
|
|
- // with highest RSSI
|
|
|
|
-
|
|
|
|
- // Add checking Mode "LEAP" for CCX 1.0
|
|
|
|
- if (((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) ||
|
|
|
|
- (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK) ||
|
|
|
|
- (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) ||
|
|
|
|
- (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK)
|
|
|
|
- ) &&
|
|
|
|
- (pAd->StaCfg.PortSecured == WPA_802_1X_PORT_NOT_SECURED))
|
|
|
|
- {
|
|
|
|
- // case 1.1 For WPA, WPA-PSK, if the 1x port is not secured, we have to redo
|
|
|
|
- // connection process
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP...\n"));
|
|
|
|
- DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
|
|
|
|
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
|
|
|
|
- sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
|
|
|
|
- }
|
|
|
|
- else if (pAd->bConfigChanged == TRUE)
|
|
|
|
- {
|
|
|
|
- // case 1.2 Important Config has changed, we have to reconnect to the same AP
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP Because config changed...\n"));
|
|
|
|
- DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
|
|
|
|
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
|
|
|
|
- sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- // case 1.3. already connected to the SSID with highest RSSI.
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - already with this BSSID. ignore this SET_SSID request\n"));
|
|
|
|
- //
|
|
|
|
- // (HCT 12.1) 1c_wlan_mediaevents required
|
|
|
|
- // media connect events are indicated when associating with the same AP
|
|
|
|
- //
|
|
|
|
- if (INFRA_ON(pAd))
|
|
|
|
- {
|
|
|
|
- //
|
|
|
|
- // Since MediaState already is NdisMediaStateConnected
|
|
|
|
- // We just indicate the connect event again to meet the WHQL required.
|
|
|
|
- //
|
|
|
|
- pAd->IndicateMediaState = NdisMediaStateConnected;
|
|
|
|
- RTMP_IndicateMediaState(pAd);
|
|
|
|
- pAd->ExtraInfo = GENERAL_LINK_UP; // Update extra information to link is up
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
-
|
|
|
|
- {
|
|
|
|
- union iwreq_data wrqu;
|
|
|
|
-
|
|
|
|
- memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
|
|
|
|
- memcpy(wrqu.ap_addr.sa_data, pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
|
|
|
|
- wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
|
|
|
|
-
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- else if (INFRA_ON(pAd))
|
|
|
|
- {
|
|
|
|
- //
|
|
|
|
- // For RT61
|
|
|
|
- // [88888] OID_802_11_SSID should have returned NDTEST_WEP_AP2(Returned: )
|
|
|
|
- // RT61 may lost SSID, and not connect to NDTEST_WEP_AP2 and will connect to NDTEST_WEP_AP2 by Autoreconnect
|
|
|
|
- // But media status is connected, so the SSID not report correctly.
|
|
|
|
- //
|
|
|
|
- if (!SSID_EQUAL(pAd->CommonCfg.Ssid, pAd->CommonCfg.SsidLen, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen))
|
|
|
|
- {
|
|
|
|
- //
|
|
|
|
- // Different SSID means not Roaming case, so we let LinkDown() to Indicate a disconnect event.
|
|
|
|
- //
|
|
|
|
- pAd->MlmeAux.CurrReqIsFromNdis = TRUE;
|
|
|
|
- }
|
|
|
|
- // case 2. active INFRA association existent
|
|
|
|
- // roaming is done within miniport driver, nothing to do with configuration
|
|
|
|
- // utility. so upon a new SET(OID_802_11_SSID) is received, we just
|
|
|
|
- // disassociate with the current associated AP,
|
|
|
|
- // then perform a new association with this new SSID, no matter the
|
|
|
|
- // new/old SSID are the same or not.
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - disassociate with current AP...\n"));
|
|
|
|
- DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
|
|
|
|
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
|
|
|
|
- sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- if (ADHOC_ON(pAd))
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - drop current ADHOC\n"));
|
|
|
|
- LinkDown(pAd, FALSE);
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
|
|
|
|
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
|
|
|
|
- RTMP_IndicateMediaState(pAd);
|
|
|
|
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():NDIS_STATUS_MEDIA_DISCONNECT Event C!\n"));
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- if ((pAd->MlmeAux.SsidBssTab.BssNr == 0) &&
|
|
|
|
- (pAd->StaCfg.bAutoReconnect == TRUE) &&
|
|
|
|
- (pAd->MlmeAux.BssType == BSS_INFRA) &&
|
|
|
|
- (MlmeValidateSSID(pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen) == TRUE)
|
|
|
|
- )
|
|
|
|
- {
|
|
|
|
- MLME_SCAN_REQ_STRUCT ScanReq;
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CntlOidSsidProc():CNTL - No matching BSS, start a new scan\n"));
|
|
|
|
- ScanParmFill(pAd, &ScanReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen, BSS_ANY, SCAN_ACTIVE);
|
|
|
|
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_SCAN_REQ, sizeof(MLME_SCAN_REQ_STRUCT), &ScanReq);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_OID_LIST_SCAN;
|
|
|
|
- // Reset Missed scan number
|
|
|
|
- pAd->StaCfg.LastScanTime = Now;
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- pAd->MlmeAux.BssIdx = 0;
|
|
|
|
- IterateOnBssTab(pAd);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID CntlOidRTBssidProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM * Elem)
|
|
|
|
-{
|
|
|
|
- ULONG BssIdx;
|
|
|
|
- PUCHAR pOidBssid = (PUCHAR)Elem->Msg;
|
|
|
|
- MLME_DISASSOC_REQ_STRUCT DisassocReq;
|
|
|
|
- MLME_JOIN_REQ_STRUCT JoinReq;
|
|
|
|
-
|
|
|
|
- // record user desired settings
|
|
|
|
- COPY_MAC_ADDR(pAd->MlmeAux.Bssid, pOidBssid);
|
|
|
|
- pAd->MlmeAux.BssType = pAd->StaCfg.BssType;
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // Update Reconnect Ssid, that user desired to connect.
|
|
|
|
- //
|
|
|
|
- NdisZeroMemory(pAd->MlmeAux.AutoReconnectSsid, MAX_LEN_OF_SSID);
|
|
|
|
- pAd->MlmeAux.AutoReconnectSsidLen = pAd->MlmeAux.SsidLen;
|
|
|
|
- NdisMoveMemory(pAd->MlmeAux.AutoReconnectSsid, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
|
|
|
|
-
|
|
|
|
- // find the desired BSS in the latest SCAN result table
|
|
|
|
- BssIdx = BssTableSearch(&pAd->ScanTab, pOidBssid, pAd->MlmeAux.Channel);
|
|
|
|
- if (BssIdx == BSS_NOT_FOUND)
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - BSSID not found. reply NDIS_STATUS_NOT_ACCEPTED\n"));
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- return;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // copy the matched BSS entry from ScanTab to MlmeAux.SsidBssTab. Why?
|
|
|
|
- // Because we need this entry to become the JOIN target in later on SYNC state machine
|
|
|
|
- pAd->MlmeAux.BssIdx = 0;
|
|
|
|
- pAd->MlmeAux.SsidBssTab.BssNr = 1;
|
|
|
|
- NdisMoveMemory(&pAd->MlmeAux.SsidBssTab.BssEntry[0], &pAd->ScanTab.BssEntry[BssIdx], sizeof(BSS_ENTRY));
|
|
|
|
-
|
|
|
|
- // 2002-11-26 skip the following checking. i.e. if user wants to re-connect to same AP
|
|
|
|
- // we just follow normal procedure. The reason of user doing this may because he/she changed
|
|
|
|
- // AP to another channel, but we still received BEACON from it thus don't claim Link Down.
|
|
|
|
- // Since user knows he's changed AP channel, he'll re-connect again. By skipping the following
|
|
|
|
- // checking, we'll disassociate then re-do normal association with this AP at the new channel.
|
|
|
|
- // 2003-1-6 Re-enable this feature based on microsoft requirement which prefer not to re-do
|
|
|
|
- // connection when setting the same BSSID.
|
|
|
|
- if (OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED) &&
|
|
|
|
- MAC_ADDR_EQUAL(pAd->CommonCfg.Bssid, pOidBssid))
|
|
|
|
- {
|
|
|
|
- // already connected to the same BSSID, go back to idle state directly
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - already in this BSSID. ignore this SET_BSSID request\n"));
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
-
|
|
|
|
- {
|
|
|
|
- union iwreq_data wrqu;
|
|
|
|
-
|
|
|
|
- memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
|
|
|
|
- memcpy(wrqu.ap_addr.sa_data, pAd->MlmeAux.Bssid, MAC_ADDR_LEN);
|
|
|
|
- wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
|
|
|
|
-
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- if (INFRA_ON(pAd))
|
|
|
|
- {
|
|
|
|
- // disassoc from current AP first
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - disassociate with current AP ...\n"));
|
|
|
|
- DisassocParmFill(pAd, &DisassocReq, pAd->CommonCfg.Bssid, REASON_DISASSOC_STA_LEAVING);
|
|
|
|
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_DISASSOC_REQ,
|
|
|
|
- sizeof(MLME_DISASSOC_REQ_STRUCT), &DisassocReq);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_DISASSOC;
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- if (ADHOC_ON(pAd))
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - drop current ADHOC\n"));
|
|
|
|
- LinkDown(pAd, FALSE);
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
|
|
|
|
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
|
|
|
|
- RTMP_IndicateMediaState(pAd);
|
|
|
|
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event C!\n"));
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // Change the wepstatus to original wepstatus
|
|
|
|
- pAd->StaCfg.WepStatus = pAd->StaCfg.OrigWepStatus;
|
|
|
|
- pAd->StaCfg.PairCipher = pAd->StaCfg.OrigWepStatus;
|
|
|
|
- pAd->StaCfg.GroupCipher = pAd->StaCfg.OrigWepStatus;
|
|
|
|
-
|
|
|
|
- // Check cipher suite, AP must have more secured cipher than station setting
|
|
|
|
- // Set the Pairwise and Group cipher to match the intended AP setting
|
|
|
|
- // We can only connect to AP with less secured cipher setting
|
|
|
|
- if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK))
|
|
|
|
- {
|
|
|
|
- pAd->StaCfg.GroupCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.GroupCipher;
|
|
|
|
-
|
|
|
|
- if (pAd->StaCfg.WepStatus == pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipher)
|
|
|
|
- pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipher;
|
|
|
|
- else if (pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipherAux != Ndis802_11WEPDisabled)
|
|
|
|
- pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA.PairCipherAux;
|
|
|
|
- else // There is no PairCipher Aux, downgrade our capability to TKIP
|
|
|
|
- pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
|
|
|
|
- }
|
|
|
|
- else if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK))
|
|
|
|
- {
|
|
|
|
- pAd->StaCfg.GroupCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.GroupCipher;
|
|
|
|
-
|
|
|
|
- if (pAd->StaCfg.WepStatus == pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipher)
|
|
|
|
- pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipher;
|
|
|
|
- else if (pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipherAux != Ndis802_11WEPDisabled)
|
|
|
|
- pAd->StaCfg.PairCipher = pAd->ScanTab.BssEntry[BssIdx].WPA2.PairCipherAux;
|
|
|
|
- else // There is no PairCipher Aux, downgrade our capability to TKIP
|
|
|
|
- pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
|
|
|
|
-
|
|
|
|
- // RSN capability
|
|
|
|
- pAd->StaCfg.RsnCapability = pAd->ScanTab.BssEntry[BssIdx].WPA2.RsnCapability;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // Set Mix cipher flag
|
|
|
|
- pAd->StaCfg.bMixCipher = (pAd->StaCfg.PairCipher == pAd->StaCfg.GroupCipher) ? FALSE : TRUE;
|
|
|
|
- if (pAd->StaCfg.bMixCipher == TRUE)
|
|
|
|
- {
|
|
|
|
- // If mix cipher, re-build RSNIE
|
|
|
|
- RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, 0);
|
|
|
|
- }
|
|
|
|
- // No active association, join the BSS immediately
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - joining %02x:%02x:%02x:%02x:%02x:%02x ...\n",
|
|
|
|
- pOidBssid[0],pOidBssid[1],pOidBssid[2],pOidBssid[3],pOidBssid[4],pOidBssid[5]));
|
|
|
|
-
|
|
|
|
- JoinParmFill(pAd, &JoinReq, pAd->MlmeAux.BssIdx);
|
|
|
|
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_JOIN_REQ, sizeof(MLME_JOIN_REQ_STRUCT), &JoinReq);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_JOIN;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-// Roaming is the only external request triggering CNTL state machine
|
|
|
|
-// despite of other "SET OID" operation. All "SET OID" related oerations
|
|
|
|
-// happen in sequence, because no other SET OID will be sent to this device
|
|
|
|
-// until the the previous SET operation is complete (successful o failed).
|
|
|
|
-// So, how do we quarantee this ROAMING request won't corrupt other "SET OID"?
|
|
|
|
-// or been corrupted by other "SET OID"?
|
|
|
|
-//
|
|
|
|
-// IRQL = DISPATCH_LEVEL
|
|
|
|
-VOID CntlMlmeRoamingProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- // TODO:
|
|
|
|
- // AP in different channel may show lower RSSI than actual value??
|
|
|
|
- // should we add a weighting factor to compensate it?
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE,("CNTL - Roaming in MlmeAux.RoamTab...\n"));
|
|
|
|
-
|
|
|
|
- NdisMoveMemory(&pAd->MlmeAux.SsidBssTab, &pAd->MlmeAux.RoamTab, sizeof(pAd->MlmeAux.RoamTab));
|
|
|
|
- pAd->MlmeAux.SsidBssTab.BssNr = pAd->MlmeAux.RoamTab.BssNr;
|
|
|
|
-
|
|
|
|
- BssTableSortByRssi(&pAd->MlmeAux.SsidBssTab);
|
|
|
|
- pAd->MlmeAux.BssIdx = 0;
|
|
|
|
- IterateOnBssTab(pAd);
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID CntlWaitDisassocProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- MLME_START_REQ_STRUCT StartReq;
|
|
|
|
-
|
|
|
|
- if (Elem->MsgType == MT2_DISASSOC_CONF)
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Dis-associate successful\n"));
|
|
|
|
-
|
|
|
|
- if (pAd->CommonCfg.bWirelessEvent)
|
|
|
|
- {
|
|
|
|
- RTMPSendWirelessEvent(pAd, IW_DISASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- LinkDown(pAd, FALSE);
|
|
|
|
-
|
|
|
|
- // case 1. no matching BSS, and user wants ADHOC, so we just start a new one
|
|
|
|
- if ((pAd->MlmeAux.SsidBssTab.BssNr==0) && (pAd->StaCfg.BssType == BSS_ADHOC))
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - No matching BSS, start a new ADHOC (Ssid=%s)...\n",pAd->MlmeAux.Ssid));
|
|
|
|
- StartParmFill(pAd, &StartReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
|
|
|
|
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_START_REQ, sizeof(MLME_START_REQ_STRUCT), &StartReq);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_START;
|
|
|
|
- }
|
|
|
|
- // case 2. try each matched BSS
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- pAd->MlmeAux.BssIdx = 0;
|
|
|
|
-
|
|
|
|
- IterateOnBssTab(pAd);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID CntlWaitJoinProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- USHORT Reason;
|
|
|
|
- MLME_AUTH_REQ_STRUCT AuthReq;
|
|
|
|
-
|
|
|
|
- if (Elem->MsgType == MT2_JOIN_CONF)
|
|
|
|
- {
|
|
|
|
- NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
|
|
|
|
- if (Reason == MLME_SUCCESS)
|
|
|
|
- {
|
|
|
|
- // 1. joined an IBSS, we are pretty much done here
|
|
|
|
- if (pAd->MlmeAux.BssType == BSS_ADHOC)
|
|
|
|
- {
|
|
|
|
- //
|
|
|
|
- // 5G bands rules of Japan:
|
|
|
|
- // Ad hoc must be disabled in W53(ch52,56,60,64) channels.
|
|
|
|
- //
|
|
|
|
- if ( (pAd->CommonCfg.bIEEE80211H == 1) &&
|
|
|
|
- RadarChannelCheck(pAd, pAd->CommonCfg.Channel)
|
|
|
|
- )
|
|
|
|
- {
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Channel=%d, Join adhoc on W53(52,56,60,64) Channels are not accepted\n", pAd->CommonCfg.Channel));
|
|
|
|
- return;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- LinkUp(pAd, BSS_ADHOC);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - join the IBSS = %02x:%02x:%02x:%02x:%02x:%02x ...\n",
|
|
|
|
- pAd->CommonCfg.Bssid[0],pAd->CommonCfg.Bssid[1],pAd->CommonCfg.Bssid[2],
|
|
|
|
- pAd->CommonCfg.Bssid[3],pAd->CommonCfg.Bssid[4],pAd->CommonCfg.Bssid[5]));
|
|
|
|
-
|
|
|
|
- pAd->IndicateMediaState = NdisMediaStateConnected;
|
|
|
|
- pAd->ExtraInfo = GENERAL_LINK_UP;
|
|
|
|
- }
|
|
|
|
- // 2. joined a new INFRA network, start from authentication
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- {
|
|
|
|
- // either Ndis802_11AuthModeShared or Ndis802_11AuthModeAutoSwitch, try shared key first
|
|
|
|
- if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeShared) ||
|
|
|
|
- (pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch))
|
|
|
|
- {
|
|
|
|
- AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeShared);
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
|
|
|
|
- sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- // 3. failed, try next BSS
|
|
|
|
- pAd->MlmeAux.BssIdx++;
|
|
|
|
- IterateOnBssTab(pAd);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID CntlWaitStartProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- USHORT Result;
|
|
|
|
-
|
|
|
|
- if (Elem->MsgType == MT2_START_CONF)
|
|
|
|
- {
|
|
|
|
- NdisMoveMemory(&Result, Elem->Msg, sizeof(USHORT));
|
|
|
|
- if (Result == MLME_SUCCESS)
|
|
|
|
- {
|
|
|
|
- //
|
|
|
|
- // 5G bands rules of Japan:
|
|
|
|
- // Ad hoc must be disabled in W53(ch52,56,60,64) channels.
|
|
|
|
- //
|
|
|
|
- if ( (pAd->CommonCfg.bIEEE80211H == 1) &&
|
|
|
|
- RadarChannelCheck(pAd, pAd->CommonCfg.Channel)
|
|
|
|
- )
|
|
|
|
- {
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Channel=%d, Start adhoc on W53(52,56,60,64) Channels are not accepted\n", pAd->CommonCfg.Channel));
|
|
|
|
- return;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- if (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED)
|
|
|
|
- {
|
|
|
|
- N_ChannelCheck(pAd);
|
|
|
|
- SetCommonHT(pAd);
|
|
|
|
- NdisMoveMemory(&pAd->MlmeAux.AddHtInfo, &pAd->CommonCfg.AddHTInfo, sizeof(ADD_HT_INFO_IE));
|
|
|
|
- RTMPCheckHt(pAd, BSSID_WCID, &pAd->CommonCfg.HtCapability, &pAd->CommonCfg.AddHTInfo);
|
|
|
|
- pAd->StaActive.SupportedPhyInfo.bHtEnable = TRUE;
|
|
|
|
- NdisZeroMemory(&pAd->StaActive.SupportedPhyInfo.MCSSet[0], 16);
|
|
|
|
- NdisMoveMemory(&pAd->StaActive.SupportedPhyInfo.MCSSet[0], &pAd->CommonCfg.HtCapability.MCSSet[0], 16);
|
|
|
|
- COPY_HTSETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
|
|
|
|
-
|
|
|
|
- if ((pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth == BW_40) &&
|
|
|
|
- (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_ABOVE))
|
|
|
|
- {
|
|
|
|
- pAd->MlmeAux.CentralChannel = pAd->CommonCfg.Channel + 2;
|
|
|
|
- }
|
|
|
|
- else if ((pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth == BW_40) &&
|
|
|
|
- (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_BELOW))
|
|
|
|
- {
|
|
|
|
- pAd->MlmeAux.CentralChannel = pAd->CommonCfg.Channel - 2;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- pAd->StaActive.SupportedPhyInfo.bHtEnable = FALSE;
|
|
|
|
- }
|
|
|
|
- LinkUp(pAd, BSS_ADHOC);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- // Before send beacon, driver need do radar detection
|
|
|
|
- if ((pAd->CommonCfg.Channel > 14 )
|
|
|
|
- && (pAd->CommonCfg.bIEEE80211H == 1)
|
|
|
|
- && RadarChannelCheck(pAd, pAd->CommonCfg.Channel))
|
|
|
|
- {
|
|
|
|
- pAd->CommonCfg.RadarDetect.RDMode = RD_SILENCE_MODE;
|
|
|
|
- pAd->CommonCfg.RadarDetect.RDCount = 0;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - start a new IBSS = %02x:%02x:%02x:%02x:%02x:%02x ...\n",
|
|
|
|
- pAd->CommonCfg.Bssid[0],pAd->CommonCfg.Bssid[1],pAd->CommonCfg.Bssid[2],
|
|
|
|
- pAd->CommonCfg.Bssid[3],pAd->CommonCfg.Bssid[4],pAd->CommonCfg.Bssid[5]));
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Start IBSS fail. BUG!!!!!\n"));
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID CntlWaitAuthProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- USHORT Reason;
|
|
|
|
- MLME_ASSOC_REQ_STRUCT AssocReq;
|
|
|
|
- MLME_AUTH_REQ_STRUCT AuthReq;
|
|
|
|
-
|
|
|
|
- if (Elem->MsgType == MT2_AUTH_CONF)
|
|
|
|
- {
|
|
|
|
- NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
|
|
|
|
- if (Reason == MLME_SUCCESS)
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH OK\n"));
|
|
|
|
- AssocParmFill(pAd, &AssocReq, pAd->MlmeAux.Bssid, pAd->MlmeAux.CapabilityInfo,
|
|
|
|
- ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
|
|
|
|
-
|
|
|
|
- {
|
|
|
|
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_ASSOC_REQ,
|
|
|
|
- sizeof(MLME_ASSOC_REQ_STRUCT), &AssocReq);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_ASSOC;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- // This fail may because of the AP already keep us in its MAC table without
|
|
|
|
- // ageing-out. The previous authentication attempt must have let it remove us.
|
|
|
|
- // so try Authentication again may help. For D-Link DWL-900AP+ compatibility.
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, try again...\n"));
|
|
|
|
-
|
|
|
|
- {
|
|
|
|
- if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeShared) ||
|
|
|
|
- (pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch))
|
|
|
|
- {
|
|
|
|
- // either Ndis802_11AuthModeShared or Ndis802_11AuthModeAutoSwitch, try shared key first
|
|
|
|
- AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeShared);
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
|
|
|
|
- sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH2;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID CntlWaitAuthProc2(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- USHORT Reason;
|
|
|
|
- MLME_ASSOC_REQ_STRUCT AssocReq;
|
|
|
|
- MLME_AUTH_REQ_STRUCT AuthReq;
|
|
|
|
-
|
|
|
|
- if (Elem->MsgType == MT2_AUTH_CONF)
|
|
|
|
- {
|
|
|
|
- NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
|
|
|
|
- if (Reason == MLME_SUCCESS)
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH OK\n"));
|
|
|
|
- AssocParmFill(pAd, &AssocReq, pAd->MlmeAux.Bssid, pAd->MlmeAux.CapabilityInfo,
|
|
|
|
- ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
|
|
|
|
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_ASSOC_REQ,
|
|
|
|
- sizeof(MLME_ASSOC_REQ_STRUCT), &AssocReq);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_ASSOC;
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeAutoSwitch) &&
|
|
|
|
- (pAd->MlmeAux.Alg == Ndis802_11AuthModeShared))
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, try OPEN system...\n"));
|
|
|
|
- AuthParmFill(pAd, &AuthReq, pAd->MlmeAux.Bssid, Ndis802_11AuthModeOpen);
|
|
|
|
- MlmeEnqueue(pAd, AUTH_STATE_MACHINE, MT2_MLME_AUTH_REQ,
|
|
|
|
- sizeof(MLME_AUTH_REQ_STRUCT), &AuthReq);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_AUTH2;
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- // not success, try next BSS
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - AUTH FAIL, give up; try next BSS\n"));
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE; //???????
|
|
|
|
- pAd->MlmeAux.BssIdx++;
|
|
|
|
- IterateOnBssTab(pAd);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID CntlWaitAssocProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- USHORT Reason;
|
|
|
|
-
|
|
|
|
- if (Elem->MsgType == MT2_ASSOC_CONF)
|
|
|
|
- {
|
|
|
|
- NdisMoveMemory(&Reason, Elem->Msg, sizeof(USHORT));
|
|
|
|
- if (Reason == MLME_SUCCESS)
|
|
|
|
- {
|
|
|
|
- LinkUp(pAd, BSS_INFRA);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Association successful on BSS #%ld\n",pAd->MlmeAux.BssIdx));
|
|
|
|
-
|
|
|
|
- if (pAd->CommonCfg.bWirelessEvent)
|
|
|
|
- {
|
|
|
|
- RTMPSendWirelessEvent(pAd, IW_ASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- // not success, try next BSS
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Association fails on BSS #%ld\n",pAd->MlmeAux.BssIdx));
|
|
|
|
- pAd->MlmeAux.BssIdx++;
|
|
|
|
- IterateOnBssTab(pAd);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID CntlWaitReassocProc(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN MLME_QUEUE_ELEM *Elem)
|
|
|
|
-{
|
|
|
|
- USHORT Result;
|
|
|
|
-
|
|
|
|
- if (Elem->MsgType == MT2_REASSOC_CONF)
|
|
|
|
- {
|
|
|
|
- NdisMoveMemory(&Result, Elem->Msg, sizeof(USHORT));
|
|
|
|
- if (Result == MLME_SUCCESS)
|
|
|
|
- {
|
|
|
|
- //
|
|
|
|
- // NDIS requires a new Link UP indication but no Link Down for RE-ASSOC
|
|
|
|
- //
|
|
|
|
- LinkUp(pAd, BSS_INFRA);
|
|
|
|
-
|
|
|
|
- // send wireless event - for association
|
|
|
|
- if (pAd->CommonCfg.bWirelessEvent)
|
|
|
|
- RTMPSendWirelessEvent(pAd, IW_ASSOC_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Re-assocition successful on BSS #%ld\n", pAd->MlmeAux.RoamIdx));
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- // reassoc failed, try to pick next BSS in the BSS Table
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - Re-assocition fails on BSS #%ld\n", pAd->MlmeAux.RoamIdx));
|
|
|
|
- pAd->MlmeAux.RoamIdx++;
|
|
|
|
- IterateOnBssTab2(pAd);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-
|
|
|
|
-VOID AdhocTurnOnQos(
|
|
|
|
- IN PRTMP_ADAPTER pAd)
|
|
|
|
-{
|
|
|
|
-#define AC0_DEF_TXOP 0
|
|
|
|
-#define AC1_DEF_TXOP 0
|
|
|
|
-#define AC2_DEF_TXOP 94
|
|
|
|
-#define AC3_DEF_TXOP 47
|
|
|
|
-
|
|
|
|
- // Turn on QOs if use HT rate.
|
|
|
|
- if (pAd->CommonCfg.APEdcaParm.bValid == FALSE)
|
|
|
|
- {
|
|
|
|
- pAd->CommonCfg.APEdcaParm.bValid = TRUE;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Aifsn[0] = 3;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Aifsn[1] = 7;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Aifsn[2] = 1;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Aifsn[3] = 1;
|
|
|
|
-
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Cwmin[0] = 4;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Cwmin[1] = 4;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Cwmin[2] = 3;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Cwmin[3] = 2;
|
|
|
|
-
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Cwmax[0] = 10;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Cwmax[1] = 6;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Cwmax[2] = 4;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Cwmax[3] = 3;
|
|
|
|
-
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Txop[0] = 0;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Txop[1] = 0;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Txop[2] = AC2_DEF_TXOP;
|
|
|
|
- pAd->CommonCfg.APEdcaParm.Txop[3] = AC3_DEF_TXOP;
|
|
|
|
- }
|
|
|
|
- AsicSetEdcaParm(pAd, &pAd->CommonCfg.APEdcaParm);
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID LinkUp(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN UCHAR BssType)
|
|
|
|
-{
|
|
|
|
- ULONG Now;
|
|
|
|
- UINT32 Data;
|
|
|
|
- BOOLEAN Cancelled;
|
|
|
|
- UCHAR Value = 0, idx;
|
|
|
|
- MAC_TABLE_ENTRY *pEntry = NULL, *pCurrEntry;
|
|
|
|
-
|
|
|
|
- pEntry = &pAd->MacTab.Content[BSSID_WCID];
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // ASSOC - DisassocTimeoutAction
|
|
|
|
- // CNTL - Dis-associate successful
|
|
|
|
- // !!! LINK DOWN !!!
|
|
|
|
- // [88888] OID_802_11_SSID should have returned NDTEST_WEP_AP2(Returned: )
|
|
|
|
- //
|
|
|
|
- // To prevent DisassocTimeoutAction to call Link down after we link up,
|
|
|
|
- // cancel the DisassocTimer no matter what it start or not.
|
|
|
|
- //
|
|
|
|
- RTMPCancelTimer(&pAd->MlmeAux.DisassocTimer, &Cancelled);
|
|
|
|
-
|
|
|
|
- COPY_SETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
|
|
|
|
-
|
|
|
|
- COPY_HTSETTINGS_FROM_MLME_AUX_TO_ACTIVE_CFG(pAd);
|
|
|
|
-
|
|
|
|
- // It's quite difficult to tell if a newly added KEY is WEP or CKIP until a new BSS
|
|
|
|
- // is formed (either ASSOC/RE-ASSOC done or IBSS started. LinkUP should be a safe place
|
|
|
|
- // to examine if cipher algorithm switching is required.
|
|
|
|
- //rt2860b. Don't know why need this
|
|
|
|
- SwitchBetweenWepAndCkip(pAd);
|
|
|
|
-
|
|
|
|
-
|
|
|
|
- if (BssType == BSS_ADHOC)
|
|
|
|
- {
|
|
|
|
- OPSTATUS_SET_FLAG(pAd, fOP_STATUS_ADHOC_ON);
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_INFRA_ON);
|
|
|
|
-
|
|
|
|
- if ((pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth == BW_40) &&
|
|
|
|
- (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_ABOVE))
|
|
|
|
- {
|
|
|
|
- pAd->CommonCfg.CentralChannel = pAd->CommonCfg.Channel + 2;
|
|
|
|
- }
|
|
|
|
- else if ((pAd->CommonCfg.Channel > 2) &&
|
|
|
|
- (pAd->CommonCfg.HtCapability.HtCapInfo.ChannelWidth == BW_40) &&
|
|
|
|
- (pAd->CommonCfg.AddHTInfo.AddHtInfo.ExtChanOffset == EXTCHA_BELOW))
|
|
|
|
- {
|
|
|
|
- pAd->CommonCfg.CentralChannel = pAd->CommonCfg.Channel - 2;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- if (pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED)
|
|
|
|
- AdhocTurnOnQos(pAd);
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!!Adhoc LINK UP !!! \n" ));
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- OPSTATUS_SET_FLAG(pAd, fOP_STATUS_INFRA_ON);
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_ADHOC_ON);
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!!Infra LINK UP !!! \n" ));
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // 3*3
|
|
|
|
- // reset Tx beamforming bit
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
|
|
|
|
- Value &= (~0x01);
|
|
|
|
- Value |= pAd->CommonCfg.RegTransmitSetting.field.TxBF;
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
|
|
|
|
-
|
|
|
|
- // Change to AP channel
|
|
|
|
- if ((pAd->CommonCfg.CentralChannel > pAd->CommonCfg.Channel) && (pAd->MlmeAux.HtCapability.HtCapInfo.ChannelWidth == BW_40))
|
|
|
|
- {
|
|
|
|
- // Must using 40MHz.
|
|
|
|
- pAd->CommonCfg.BBPCurrentBW = BW_40;
|
|
|
|
- AsicSwitchChannel(pAd, pAd->CommonCfg.CentralChannel, FALSE);
|
|
|
|
- AsicLockChannel(pAd, pAd->CommonCfg.CentralChannel);
|
|
|
|
-
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
|
|
|
|
- Value &= (~0x18);
|
|
|
|
- Value |= 0x10;
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
|
|
|
|
-
|
|
|
|
- // RX : control channel at lower
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
|
|
|
|
- Value &= (~0x20);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
|
|
|
|
-
|
|
|
|
- RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
|
|
|
|
- Data &= 0xfffffffe;
|
|
|
|
- RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
|
|
|
|
-
|
|
|
|
- if (pAd->MACVersion == 0x28600100)
|
|
|
|
- {
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x1A);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x0A);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x16);
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!!40MHz Lower LINK UP !!! Control Channel at Below. Central = %d \n", pAd->CommonCfg.CentralChannel ));
|
|
|
|
- }
|
|
|
|
- else if ((pAd->CommonCfg.CentralChannel < pAd->CommonCfg.Channel) && (pAd->MlmeAux.HtCapability.HtCapInfo.ChannelWidth == BW_40))
|
|
|
|
- {
|
|
|
|
- // Must using 40MHz.
|
|
|
|
- pAd->CommonCfg.BBPCurrentBW = BW_40;
|
|
|
|
- AsicSwitchChannel(pAd, pAd->CommonCfg.CentralChannel, FALSE);
|
|
|
|
- AsicLockChannel(pAd, pAd->CommonCfg.CentralChannel);
|
|
|
|
-
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
|
|
|
|
- Value &= (~0x18);
|
|
|
|
- Value |= 0x10;
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
|
|
|
|
-
|
|
|
|
- RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
|
|
|
|
- Data |= 0x1;
|
|
|
|
- RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
|
|
|
|
-
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
|
|
|
|
- Value |= (0x20);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
|
|
|
|
-
|
|
|
|
- if (pAd->MACVersion == 0x28600100)
|
|
|
|
- {
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x1A);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x0A);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x16);
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!! 40MHz Upper LINK UP !!! Control Channel at UpperCentral = %d \n", pAd->CommonCfg.CentralChannel ));
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- pAd->CommonCfg.BBPCurrentBW = BW_20;
|
|
|
|
- pAd->CommonCfg.CentralChannel = pAd->CommonCfg.Channel;
|
|
|
|
- AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
|
|
|
|
- AsicLockChannel(pAd, pAd->CommonCfg.Channel);
|
|
|
|
-
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &Value);
|
|
|
|
- Value &= (~0x18);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, Value);
|
|
|
|
-
|
|
|
|
- RTMP_IO_READ32(pAd, TX_BAND_CFG, &Data);
|
|
|
|
- Data &= 0xfffffffe;
|
|
|
|
- RTMP_IO_WRITE32(pAd, TX_BAND_CFG, Data);
|
|
|
|
-
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &Value);
|
|
|
|
- Value &= (~0x20);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, Value);
|
|
|
|
-
|
|
|
|
- if (pAd->MACVersion == 0x28600100)
|
|
|
|
- {
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R69, 0x16);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R70, 0x08);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R73, 0x11);
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!!rt2860C !!! \n" ));
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!! 20MHz LINK UP !!! \n" ));
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- RTMPSetAGCInitValue(pAd, pAd->CommonCfg.BBPCurrentBW);
|
|
|
|
- //
|
|
|
|
- // Save BBP_R66 value, it will be used in RTUSBResumeMsduTransmission
|
|
|
|
- //
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R66, &pAd->BbpTuning.R66CurrentValue);
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!! (BssType=%d, AID=%d, ssid=%s, Channel=%d, CentralChannel = %d)\n",
|
|
|
|
- BssType, pAd->StaActive.Aid, pAd->CommonCfg.Ssid, pAd->CommonCfg.Channel, pAd->CommonCfg.CentralChannel));
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!! (Density =%d, )\n", pAd->MacTab.Content[BSSID_WCID].MpduDensity));
|
|
|
|
-
|
|
|
|
- AsicSetBssid(pAd, pAd->CommonCfg.Bssid);
|
|
|
|
-
|
|
|
|
- AsicSetSlotTime(pAd, TRUE);
|
|
|
|
- AsicSetEdcaParm(pAd, &pAd->CommonCfg.APEdcaParm);
|
|
|
|
-
|
|
|
|
- // Call this for RTS protectionfor legacy rate, we will always enable RTS threshold, but normally it will not hit
|
|
|
|
- AsicUpdateProtect(pAd, 0, (OFDMSETPROTECT | CCKSETPROTECT), TRUE, FALSE);
|
|
|
|
-
|
|
|
|
- if ((pAd->StaActive.SupportedPhyInfo.bHtEnable == TRUE))
|
|
|
|
- {
|
|
|
|
- // Update HT protectionfor based on AP's operating mode.
|
|
|
|
- if (pAd->MlmeAux.AddHtInfo.AddHtInfo2.NonGfPresent == 1)
|
|
|
|
- {
|
|
|
|
- AsicUpdateProtect(pAd, pAd->MlmeAux.AddHtInfo.AddHtInfo2.OperaionMode, ALLN_SETPROTECT, FALSE, TRUE);
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- AsicUpdateProtect(pAd, pAd->MlmeAux.AddHtInfo.AddHtInfo2.OperaionMode, ALLN_SETPROTECT, FALSE, FALSE);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- NdisZeroMemory(&pAd->DrsCounters, sizeof(COUNTER_DRS));
|
|
|
|
-
|
|
|
|
- NdisGetSystemUpTime(&Now);
|
|
|
|
- pAd->StaCfg.LastBeaconRxTime = Now; // last RX timestamp
|
|
|
|
-
|
|
|
|
- if ((pAd->CommonCfg.TxPreamble != Rt802_11PreambleLong) &&
|
|
|
|
- CAP_IS_SHORT_PREAMBLE_ON(pAd->StaActive.CapabilityInfo))
|
|
|
|
- {
|
|
|
|
- MlmeSetTxPreamble(pAd, Rt802_11PreambleShort);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
|
|
|
|
-
|
|
|
|
- if (pAd->CommonCfg.RadarDetect.RDMode == RD_SILENCE_MODE)
|
|
|
|
- {
|
|
|
|
- }
|
|
|
|
- pAd->CommonCfg.RadarDetect.RDMode = RD_NORMAL_MODE;
|
|
|
|
-
|
|
|
|
- if (BssType == BSS_ADHOC)
|
|
|
|
- {
|
|
|
|
- MakeIbssBeacon(pAd);
|
|
|
|
- if ((pAd->CommonCfg.Channel > 14)
|
|
|
|
- && (pAd->CommonCfg.bIEEE80211H == 1)
|
|
|
|
- && RadarChannelCheck(pAd, pAd->CommonCfg.Channel))
|
|
|
|
- {
|
|
|
|
- ; //Do nothing
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- AsicEnableIbssSync(pAd);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // In ad hoc mode, use MAC table from index 1.
|
|
|
|
- // p.s ASIC use all 0xff as termination of WCID table search.To prevent it's 0xff-ff-ff-ff-ff-ff, Write 0 here.
|
|
|
|
- RTMP_IO_WRITE32(pAd, MAC_WCID_BASE, 0x00);
|
|
|
|
- RTMP_IO_WRITE32(pAd, 0x1808, 0x00);
|
|
|
|
-
|
|
|
|
- // If WEP is enabled, add key material and cipherAlg into Asic
|
|
|
|
- // Fill in Shared Key Table(offset: 0x6c00) and Shared Key Mode(offset: 0x7000)
|
|
|
|
-
|
|
|
|
- if (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)
|
|
|
|
- {
|
|
|
|
- PUCHAR Key;
|
|
|
|
- UCHAR CipherAlg;
|
|
|
|
-
|
|
|
|
- for (idx=0; idx < SHARE_KEY_NUM; idx++)
|
|
|
|
- {
|
|
|
|
- CipherAlg = pAd->SharedKey[BSS0][idx].CipherAlg;
|
|
|
|
- Key = pAd->SharedKey[BSS0][idx].Key;
|
|
|
|
-
|
|
|
|
- if (pAd->SharedKey[BSS0][idx].KeyLen > 0)
|
|
|
|
- {
|
|
|
|
- // Set key material and cipherAlg to Asic
|
|
|
|
- AsicAddSharedKeyEntry(pAd, BSS0, idx, CipherAlg, Key, NULL, NULL);
|
|
|
|
-
|
|
|
|
- if (idx == pAd->StaCfg.DefaultKeyId)
|
|
|
|
- {
|
|
|
|
- // Update WCID attribute table and IVEIV table for this group key table
|
|
|
|
- RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, NULL);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
-
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- // If WPANone is enabled, add key material and cipherAlg into Asic
|
|
|
|
- // Fill in Shared Key Table(offset: 0x6c00) and Shared Key Mode(offset: 0x7000)
|
|
|
|
- else if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone)
|
|
|
|
- {
|
|
|
|
- pAd->StaCfg.DefaultKeyId = 0; // always be zero
|
|
|
|
-
|
|
|
|
- NdisZeroMemory(&pAd->SharedKey[BSS0][0], sizeof(CIPHER_KEY));
|
|
|
|
- pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK;
|
|
|
|
- NdisMoveMemory(pAd->SharedKey[BSS0][0].Key, pAd->StaCfg.PMK, LEN_TKIP_EK);
|
|
|
|
-
|
|
|
|
- if (pAd->StaCfg.PairCipher == Ndis802_11Encryption2Enabled)
|
|
|
|
- {
|
|
|
|
- NdisMoveMemory(pAd->SharedKey[BSS0][0].RxMic, &pAd->StaCfg.PMK[16], LEN_TKIP_RXMICK);
|
|
|
|
- NdisMoveMemory(pAd->SharedKey[BSS0][0].TxMic, &pAd->StaCfg.PMK[16], LEN_TKIP_TXMICK);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // Decide its ChiperAlg
|
|
|
|
- if (pAd->StaCfg.PairCipher == Ndis802_11Encryption2Enabled)
|
|
|
|
- pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_TKIP;
|
|
|
|
- else if (pAd->StaCfg.PairCipher == Ndis802_11Encryption3Enabled)
|
|
|
|
- pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_AES;
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("Unknow Cipher (=%d), set Cipher to AES\n", pAd->StaCfg.PairCipher));
|
|
|
|
- pAd->SharedKey[BSS0][0].CipherAlg = CIPHER_AES;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // Set key material and cipherAlg to Asic
|
|
|
|
- AsicAddSharedKeyEntry(pAd,
|
|
|
|
- BSS0,
|
|
|
|
- 0,
|
|
|
|
- pAd->SharedKey[BSS0][0].CipherAlg,
|
|
|
|
- pAd->SharedKey[BSS0][0].Key,
|
|
|
|
- pAd->SharedKey[BSS0][0].TxMic,
|
|
|
|
- pAd->SharedKey[BSS0][0].RxMic);
|
|
|
|
-
|
|
|
|
- // Update WCID attribute table and IVEIV table for this group key table
|
|
|
|
- RTMPAddWcidAttributeEntry(pAd, BSS0, 0, pAd->SharedKey[BSS0][0].CipherAlg, NULL);
|
|
|
|
-
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- }
|
|
|
|
- else // BSS_INFRA
|
|
|
|
- {
|
|
|
|
- // Check the new SSID with last SSID
|
|
|
|
- while (Cancelled == TRUE)
|
|
|
|
- {
|
|
|
|
- if (pAd->CommonCfg.LastSsidLen == pAd->CommonCfg.SsidLen)
|
|
|
|
- {
|
|
|
|
- if (RTMPCompareMemory(pAd->CommonCfg.LastSsid, pAd->CommonCfg.Ssid, pAd->CommonCfg.LastSsidLen) == 0)
|
|
|
|
- {
|
|
|
|
- // Link to the old one no linkdown is required.
|
|
|
|
- break;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- // Send link down event before set to link up
|
|
|
|
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
|
|
|
|
- RTMP_IndicateMediaState(pAd);
|
|
|
|
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event AA!\n"));
|
|
|
|
- break;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // On WPA mode, Remove All Keys if not connect to the last BSSID
|
|
|
|
- // Key will be set after 4-way handshake.
|
|
|
|
- //
|
|
|
|
- if ((pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA))
|
|
|
|
- {
|
|
|
|
- ULONG IV;
|
|
|
|
-
|
|
|
|
- // Remove all WPA keys
|
|
|
|
- RTMPWPARemoveAllKeys(pAd);
|
|
|
|
- pAd->StaCfg.PortSecured = WPA_802_1X_PORT_NOT_SECURED;
|
|
|
|
- pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilter8021xWEP;
|
|
|
|
-
|
|
|
|
- // Fixed connection failed with Range Maximizer - 515 AP (Marvell Chip) when security is WPAPSK/TKIP
|
|
|
|
- // If IV related values are too large in GroupMsg2, AP would ignore this message.
|
|
|
|
- IV = 0;
|
|
|
|
- IV |= (pAd->StaCfg.DefaultKeyId << 30);
|
|
|
|
- AsicUpdateWCIDIVEIV(pAd, BSSID_WCID, IV, 0);
|
|
|
|
- }
|
|
|
|
- // NOTE:
|
|
|
|
- // the decision of using "short slot time" or not may change dynamically due to
|
|
|
|
- // new STA association to the AP. so we have to decide that upon parsing BEACON, not here
|
|
|
|
-
|
|
|
|
- // NOTE:
|
|
|
|
- // the decision to use "RTC/CTS" or "CTS-to-self" protection or not may change dynamically
|
|
|
|
- // due to new STA association to the AP. so we have to decide that upon parsing BEACON, not here
|
|
|
|
-
|
|
|
|
- ComposePsPoll(pAd);
|
|
|
|
- ComposeNullFrame(pAd);
|
|
|
|
-
|
|
|
|
- AsicEnableBssSync(pAd);
|
|
|
|
-
|
|
|
|
- // Add BSSID to WCID search table
|
|
|
|
- AsicUpdateRxWCIDTable(pAd, BSSID_WCID, pAd->CommonCfg.Bssid);
|
|
|
|
-
|
|
|
|
- NdisAcquireSpinLock(&pAd->MacTabLock);
|
|
|
|
- // add this BSSID entry into HASH table
|
|
|
|
- {
|
|
|
|
- UCHAR HashIdx;
|
|
|
|
-
|
|
|
|
- //pEntry = &pAd->MacTab.Content[BSSID_WCID];
|
|
|
|
- HashIdx = MAC_ADDR_HASH_INDEX(pAd->CommonCfg.Bssid);
|
|
|
|
- if (pAd->MacTab.Hash[HashIdx] == NULL)
|
|
|
|
- {
|
|
|
|
- pAd->MacTab.Hash[HashIdx] = pEntry;
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- pCurrEntry = pAd->MacTab.Hash[HashIdx];
|
|
|
|
- while (pCurrEntry->pNext != NULL)
|
|
|
|
- pCurrEntry = pCurrEntry->pNext;
|
|
|
|
- pCurrEntry->pNext = pEntry;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- NdisReleaseSpinLock(&pAd->MacTabLock);
|
|
|
|
-
|
|
|
|
-
|
|
|
|
- // If WEP is enabled, add paiewise and shared key
|
|
|
|
- if (((pAd->StaCfg.WpaSupplicantUP)&&
|
|
|
|
- (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)&&
|
|
|
|
- (pAd->StaCfg.PortSecured == WPA_802_1X_PORT_SECURED)) ||
|
|
|
|
- ((pAd->StaCfg.WpaSupplicantUP == WPA_SUPPLICANT_DISABLE)&&
|
|
|
|
- (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled)))
|
|
|
|
- {
|
|
|
|
- PUCHAR Key;
|
|
|
|
- UCHAR CipherAlg;
|
|
|
|
-
|
|
|
|
- for (idx=0; idx < SHARE_KEY_NUM; idx++)
|
|
|
|
- {
|
|
|
|
- CipherAlg = pAd->SharedKey[BSS0][idx].CipherAlg;
|
|
|
|
- Key = pAd->SharedKey[BSS0][idx].Key;
|
|
|
|
-
|
|
|
|
- if (pAd->SharedKey[BSS0][idx].KeyLen > 0)
|
|
|
|
- {
|
|
|
|
- // Set key material and cipherAlg to Asic
|
|
|
|
- AsicAddSharedKeyEntry(pAd, BSS0, idx, CipherAlg, Key, NULL, NULL);
|
|
|
|
-
|
|
|
|
- if (idx == pAd->StaCfg.DefaultKeyId)
|
|
|
|
- {
|
|
|
|
- // Assign group key info
|
|
|
|
- RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, NULL);
|
|
|
|
-
|
|
|
|
- // Assign pairwise key info
|
|
|
|
- RTMPAddWcidAttributeEntry(pAd, BSS0, idx, CipherAlg, pEntry);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // only INFRASTRUCTURE mode need to indicate connectivity immediately; ADHOC mode
|
|
|
|
- // should wait until at least 2 active nodes in this BSSID.
|
|
|
|
- OPSTATUS_SET_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
|
|
|
|
-
|
|
|
|
- // For GUI ++
|
|
|
|
- if (pAd->StaCfg.AuthMode < Ndis802_11AuthModeWPA)
|
|
|
|
- {
|
|
|
|
- pAd->IndicateMediaState = NdisMediaStateConnected;
|
|
|
|
- pAd->ExtraInfo = GENERAL_LINK_UP;
|
|
|
|
- RTMP_IndicateMediaState(pAd);
|
|
|
|
- }
|
|
|
|
- // --
|
|
|
|
-
|
|
|
|
- // Add BSSID in my MAC Table.
|
|
|
|
- NdisAcquireSpinLock(&pAd->MacTabLock);
|
|
|
|
- RTMPMoveMemory(pAd->MacTab.Content[BSSID_WCID].Addr, pAd->CommonCfg.Bssid, MAC_ADDR_LEN);
|
|
|
|
- pAd->MacTab.Content[BSSID_WCID].Aid = BSSID_WCID;
|
|
|
|
- pAd->MacTab.Content[BSSID_WCID].pAd = pAd;
|
|
|
|
- pAd->MacTab.Content[BSSID_WCID].ValidAsCLI = TRUE; //Although this is bssid..still set ValidAsCl
|
|
|
|
- pAd->MacTab.Size = 1; // infra mode always set MACtab size =1.
|
|
|
|
- pAd->MacTab.Content[BSSID_WCID].Sst = SST_ASSOC;
|
|
|
|
- pAd->MacTab.Content[BSSID_WCID].AuthState = SST_ASSOC;
|
|
|
|
- pAd->MacTab.Content[BSSID_WCID].AuthMode = pAd->StaCfg.AuthMode;
|
|
|
|
- pAd->MacTab.Content[BSSID_WCID].WepStatus = pAd->StaCfg.WepStatus;
|
|
|
|
- NdisReleaseSpinLock(&pAd->MacTabLock);
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !!! ClientStatusFlags=%lx)\n",
|
|
|
|
- pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
|
|
|
|
-
|
|
|
|
- MlmeUpdateTxRates(pAd, TRUE, BSS0);
|
|
|
|
- MlmeUpdateHtTxRates(pAd, BSS0);
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK UP !! (StaActive.bHtEnable =%d, )\n", pAd->StaActive.SupportedPhyInfo.bHtEnable));
|
|
|
|
-
|
|
|
|
- if (pAd->CommonCfg.bAggregationCapable)
|
|
|
|
- {
|
|
|
|
- if ((pAd->CommonCfg.bPiggyBackCapable) && (pAd->MlmeAux.APRalinkIe & 0x00000003) == 3)
|
|
|
|
- {
|
|
|
|
-
|
|
|
|
- OPSTATUS_SET_FLAG(pAd, fOP_STATUS_PIGGYBACK_INUSED);
|
|
|
|
- OPSTATUS_SET_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
|
|
|
|
- RTMPSetPiggyBack(pAd, TRUE);
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("Turn on Piggy-Back\n"));
|
|
|
|
- }
|
|
|
|
- else if (pAd->MlmeAux.APRalinkIe & 0x00000001)
|
|
|
|
- {
|
|
|
|
- OPSTATUS_SET_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- if (pAd->MlmeAux.APRalinkIe != 0x0)
|
|
|
|
- {
|
|
|
|
- if (CLIENT_STATUS_TEST_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RDG_CAPABLE))
|
|
|
|
- {
|
|
|
|
- AsicEnableRDG(pAd);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- OPSTATUS_SET_FLAG(pAd, fCLIENT_STATUS_RALINK_CHIPSET);
|
|
|
|
- CLIENT_STATUS_SET_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RALINK_CHIPSET);
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fCLIENT_STATUS_RALINK_CHIPSET);
|
|
|
|
- CLIENT_STATUS_CLEAR_FLAG(&pAd->MacTab.Content[BSSID_WCID], fCLIENT_STATUS_RALINK_CHIPSET);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_CONNECT Event B!.BACapability = %x. ClientStatusFlags = %lx\n", pAd->CommonCfg.BACapability.word, pAd->MacTab.Content[BSSID_WCID].ClientStatusFlags));
|
|
|
|
-
|
|
|
|
- // Set LED
|
|
|
|
- RTMPSetLED(pAd, LED_LINK_UP);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.PeriodicRound = 0;
|
|
|
|
- pAd->Mlme.OneSecPeriodicRound = 0;
|
|
|
|
- pAd->bConfigChanged = FALSE; // Reset config flag
|
|
|
|
- pAd->ExtraInfo = GENERAL_LINK_UP; // Update extra information to link is up
|
|
|
|
-
|
|
|
|
- // Set asic auto fall back
|
|
|
|
- {
|
|
|
|
- PUCHAR pTable;
|
|
|
|
- UCHAR TableSize = 0;
|
|
|
|
-
|
|
|
|
- MlmeSelectTxRateTable(pAd, &pAd->MacTab.Content[BSSID_WCID], &pTable, &TableSize, &pAd->CommonCfg.TxRateIndex);
|
|
|
|
- AsicUpdateAutoFallBackTable(pAd, pTable);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- NdisAcquireSpinLock(&pAd->MacTabLock);
|
|
|
|
- pEntry->HTPhyMode.word = pAd->StaCfg.HTPhyMode.word;
|
|
|
|
- pEntry->MaxHTPhyMode.word = pAd->StaCfg.HTPhyMode.word;
|
|
|
|
- if (pAd->StaCfg.bAutoTxRateSwitch == FALSE)
|
|
|
|
- {
|
|
|
|
- pEntry->bAutoTxRateSwitch = FALSE;
|
|
|
|
-
|
|
|
|
- if (pEntry->HTPhyMode.field.MCS == 32)
|
|
|
|
- pEntry->HTPhyMode.field.ShortGI = GI_800;
|
|
|
|
-
|
|
|
|
- if ((pEntry->HTPhyMode.field.MCS > MCS_7) || (pEntry->HTPhyMode.field.MCS == 32))
|
|
|
|
- pEntry->HTPhyMode.field.STBC = STBC_NONE;
|
|
|
|
-
|
|
|
|
- // If the legacy mode is set, overwrite the transmit setting of this entry.
|
|
|
|
- if (pEntry->HTPhyMode.field.MODE <= MODE_OFDM)
|
|
|
|
- RTMPUpdateLegacyTxSetting((UCHAR)pAd->StaCfg.DesiredTransmitSetting.field.FixedTxMode, pEntry);
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- pEntry->bAutoTxRateSwitch = TRUE;
|
|
|
|
- NdisReleaseSpinLock(&pAd->MacTabLock);
|
|
|
|
-
|
|
|
|
- // Let Link Status Page display first initial rate.
|
|
|
|
- pAd->LastTxRate = (USHORT)(pEntry->HTPhyMode.word);
|
|
|
|
- // Select DAC according to HT or Legacy
|
|
|
|
- if (pAd->StaActive.SupportedPhyInfo.MCSSet[0] != 0x00)
|
|
|
|
- {
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &Value);
|
|
|
|
- Value &= (~0x18);
|
|
|
|
- if (pAd->Antenna.field.TxPath == 2)
|
|
|
|
- {
|
|
|
|
- Value |= 0x10;
|
|
|
|
- }
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, Value);
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &Value);
|
|
|
|
- Value &= (~0x18);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, Value);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- if (pAd->StaActive.SupportedPhyInfo.bHtEnable == FALSE)
|
|
|
|
- {
|
|
|
|
- }
|
|
|
|
- else if (pEntry->MaxRAmpduFactor == 0)
|
|
|
|
- {
|
|
|
|
- // If HT AP doesn't support MaxRAmpduFactor = 1, we need to set max PSDU to 0.
|
|
|
|
- // Because our Init value is 1 at MACRegTable.
|
|
|
|
- RTMP_IO_WRITE32(pAd, MAX_LEN_CFG, 0x0fff);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // Patch for Marvel AP to gain high throughput
|
|
|
|
- // Need to set as following,
|
|
|
|
- // 1. Set txop in register-EDCA_AC0_CFG as 0x60
|
|
|
|
- // 2. Set EnTXWriteBackDDONE in register-WPDMA_GLO_CFG as zero
|
|
|
|
- // 3. PBF_MAX_PCNT as 0x1F3FBF9F
|
|
|
|
- // 4. kick per two packets when dequeue
|
|
|
|
- //
|
|
|
|
- // Txop can only be modified when RDG is off, WMM is disable and TxBurst is enable
|
|
|
|
- //
|
|
|
|
- // if 1. Legacy AP WMM on, or 2. 11n AP, AMPDU disable. Force turn off burst no matter what bEnableTxBurst is.
|
|
|
|
- if (!((pAd->CommonCfg.RxStream == 1)&&(pAd->CommonCfg.TxStream == 1)) &&
|
|
|
|
- (((pAd->StaActive.SupportedPhyInfo.bHtEnable == FALSE) && OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_WMM_INUSED))
|
|
|
|
- || ((pAd->StaActive.SupportedPhyInfo.bHtEnable == TRUE) && (pAd->CommonCfg.BACapability.field.Policy == BA_NOTUSE))))
|
|
|
|
- {
|
|
|
|
- RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
|
|
|
|
- Data &= 0xFFFFFF00;
|
|
|
|
- RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
|
|
|
|
-
|
|
|
|
- RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3F7F9F);
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("Txburst 1\n"));
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- if (pAd->CommonCfg.bEnableTxBurst)
|
|
|
|
- {
|
|
|
|
- RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
|
|
|
|
- Data &= 0xFFFFFF00;
|
|
|
|
- Data |= 0x60;
|
|
|
|
- RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
|
|
|
|
- pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = TRUE;
|
|
|
|
-
|
|
|
|
- RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3FBF9F);
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("Txburst 2\n"));
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &Data);
|
|
|
|
- Data &= 0xFFFFFF00;
|
|
|
|
- RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, Data);
|
|
|
|
-
|
|
|
|
- RTMP_IO_WRITE32(pAd, PBF_MAX_PCNT, 0x1F3F7F9F);
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("Txburst 3\n"));
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // Re-check to turn on TX burst or not.
|
|
|
|
- if ((pAd->CommonCfg.IOTestParm.bLastAtheros == TRUE) && ((STA_WEP_ON(pAd))||(STA_TKIP_ON(pAd))))
|
|
|
|
- {
|
|
|
|
- pAd->CommonCfg.IOTestParm.bNextDisableRxBA = TRUE;
|
|
|
|
- if (pAd->CommonCfg.bEnableTxBurst)
|
|
|
|
- {
|
|
|
|
- UINT32 MACValue = 0;
|
|
|
|
- // Force disable TXOP value in this case. The same action in MLMEUpdateProtect too.
|
|
|
|
- // I didn't change PBF_MAX_PCNT setting.
|
|
|
|
- RTMP_IO_READ32(pAd, EDCA_AC0_CFG, &MACValue);
|
|
|
|
- MACValue &= 0xFFFFFF00;
|
|
|
|
- RTMP_IO_WRITE32(pAd, EDCA_AC0_CFG, MACValue);
|
|
|
|
- pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = FALSE;
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- pAd->CommonCfg.IOTestParm.bNextDisableRxBA = FALSE;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- pAd->CommonCfg.IOTestParm.bLastAtheros = FALSE;
|
|
|
|
- COPY_MAC_ADDR(pAd->CommonCfg.LastBssid, pAd->CommonCfg.Bssid);
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!!pAd->bNextDisableRxBA= %d \n", pAd->CommonCfg.IOTestParm.bNextDisableRxBA));
|
|
|
|
- // BSSID add in one MAC entry too. Because in Tx, ASIC need to check Cipher and IV/EIV, BAbitmap
|
|
|
|
- // Pther information in MACTab.Content[BSSID_WCID] is not necessary for driver.
|
|
|
|
- // Note: As STA, The MACTab.Content[BSSID_WCID]. PairwiseKey and Shared Key for BSS0 are the same.
|
|
|
|
-
|
|
|
|
- if (pAd->StaCfg.WepStatus <= Ndis802_11WEPDisabled)
|
|
|
|
- {
|
|
|
|
- pAd->StaCfg.PortSecured = WPA_802_1X_PORT_SECURED;
|
|
|
|
- pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilterAcceptAll;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- NdisAcquireSpinLock(&pAd->MacTabLock);
|
|
|
|
- pEntry->PortSecured = pAd->StaCfg.PortSecured;
|
|
|
|
- NdisReleaseSpinLock(&pAd->MacTabLock);
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // Patch Atheros AP TX will breakdown issue.
|
|
|
|
- // AP Model: DLink DWL-8200AP
|
|
|
|
- //
|
|
|
|
- if (INFRA_ON(pAd) && OPSTATUS_TEST_FLAG(pAd, fOP_STATUS_WMM_INUSED) && STA_TKIP_ON(pAd))
|
|
|
|
- {
|
|
|
|
- RTMP_IO_WRITE32(pAd, RX_PARSER_CFG, 0x01);
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- RTMP_IO_WRITE32(pAd, RX_PARSER_CFG, 0x00);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- RTMP_CLEAR_FLAG(pAd, fRTMP_ADAPTER_BSS_SCAN_IN_PROGRESS);
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
-
|
|
|
|
- Routine Description:
|
|
|
|
- Disconnect current BSSID
|
|
|
|
-
|
|
|
|
- Arguments:
|
|
|
|
- pAd - Pointer to our adapter
|
|
|
|
- IsReqFromAP - Request from AP
|
|
|
|
-
|
|
|
|
- Return Value:
|
|
|
|
- None
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- Note:
|
|
|
|
- We need more information to know it's this requst from AP.
|
|
|
|
- If yes! we need to do extra handling, for example, remove the WPA key.
|
|
|
|
- Otherwise on 4-way handshaking will faied, since the WPA key didn't be
|
|
|
|
- remove while auto reconnect.
|
|
|
|
- Disconnect request from AP, it means we will start afresh 4-way handshaking
|
|
|
|
- on WPA mode.
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID LinkDown(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN BOOLEAN IsReqFromAP)
|
|
|
|
-{
|
|
|
|
- UCHAR i, ByteValue = 0;
|
|
|
|
-
|
|
|
|
- // Do nothing if monitor mode is on
|
|
|
|
- if (MONITOR_ON(pAd))
|
|
|
|
- return;
|
|
|
|
-
|
|
|
|
- if (pAd->CommonCfg.bWirelessEvent)
|
|
|
|
- {
|
|
|
|
- RTMPSendWirelessEvent(pAd, IW_STA_LINKDOWN_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN !!!\n"));
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_AGGREGATION_INUSED);
|
|
|
|
-
|
|
|
|
- if (ADHOC_ON(pAd)) // Adhoc mode link down
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN 1!!!\n"));
|
|
|
|
-
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_ADHOC_ON);
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
|
|
|
|
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
|
|
|
|
- RTMP_IndicateMediaState(pAd);
|
|
|
|
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
|
|
|
|
- BssTableDeleteEntry(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Channel);
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!! MacTab.Size=%d !!!\n", pAd->MacTab.Size));
|
|
|
|
- }
|
|
|
|
- else // Infra structure mode
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("!!! LINK DOWN 2!!!\n"));
|
|
|
|
-
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_INFRA_ON);
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_MEDIA_STATE_CONNECTED);
|
|
|
|
-
|
|
|
|
- // Saved last SSID for linkup comparison
|
|
|
|
- pAd->CommonCfg.LastSsidLen = pAd->CommonCfg.SsidLen;
|
|
|
|
- NdisMoveMemory(pAd->CommonCfg.LastSsid, pAd->CommonCfg.Ssid, pAd->CommonCfg.LastSsidLen);
|
|
|
|
- COPY_MAC_ADDR(pAd->CommonCfg.LastBssid, pAd->CommonCfg.Bssid);
|
|
|
|
- if (pAd->MlmeAux.CurrReqIsFromNdis == TRUE)
|
|
|
|
- {
|
|
|
|
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
|
|
|
|
- RTMP_IndicateMediaState(pAd);
|
|
|
|
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("NDIS_STATUS_MEDIA_DISCONNECT Event A!\n"));
|
|
|
|
- pAd->MlmeAux.CurrReqIsFromNdis = FALSE;
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- //
|
|
|
|
- // If disassociation request is from NDIS, then we don't need to delete BSSID from entry.
|
|
|
|
- // Otherwise lost beacon or receive De-Authentication from AP,
|
|
|
|
- // then we should delete BSSID from BssTable.
|
|
|
|
- // If we don't delete from entry, roaming will fail.
|
|
|
|
- //
|
|
|
|
- BssTableDeleteEntry(&pAd->ScanTab, pAd->CommonCfg.Bssid, pAd->CommonCfg.Channel);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // restore back to -
|
|
|
|
- // 1. long slot (20 us) or short slot (9 us) time
|
|
|
|
- // 2. turn on/off RTS/CTS and/or CTS-to-self protection
|
|
|
|
- // 3. short preamble
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_BG_PROTECTION_INUSED);
|
|
|
|
-
|
|
|
|
- if (pAd->StaCfg.CCXAdjacentAPReportFlag == TRUE)
|
|
|
|
- {
|
|
|
|
- //
|
|
|
|
- // Record current AP's information.
|
|
|
|
- // for later used reporting Adjacent AP report.
|
|
|
|
- //
|
|
|
|
- pAd->StaCfg.CCXAdjacentAPChannel = pAd->CommonCfg.Channel;
|
|
|
|
- pAd->StaCfg.CCXAdjacentAPSsidLen = pAd->CommonCfg.SsidLen;
|
|
|
|
- NdisMoveMemory(pAd->StaCfg.CCXAdjacentAPSsid, pAd->CommonCfg.Ssid, pAd->StaCfg.CCXAdjacentAPSsidLen);
|
|
|
|
- COPY_MAC_ADDR(pAd->StaCfg.CCXAdjacentAPBssid, pAd->CommonCfg.Bssid);
|
|
|
|
- }
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- for (i=1; i<MAX_LEN_OF_MAC_TABLE; i++)
|
|
|
|
- {
|
|
|
|
- if (pAd->MacTab.Content[i].ValidAsCLI == TRUE)
|
|
|
|
- MacTableDeleteEntry(pAd, pAd->MacTab.Content[i].Aid, pAd->MacTab.Content[i].Addr);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- pAd->StaCfg.CCXQosECWMin = 4;
|
|
|
|
- pAd->StaCfg.CCXQosECWMax = 10;
|
|
|
|
-
|
|
|
|
- AsicSetSlotTime(pAd, TRUE); //FALSE);
|
|
|
|
- AsicSetEdcaParm(pAd, NULL);
|
|
|
|
-
|
|
|
|
- // Set LED
|
|
|
|
- RTMPSetLED(pAd, LED_LINK_DOWN);
|
|
|
|
- pAd->LedIndicatorStregth = 0xF0;
|
|
|
|
- RTMPSetSignalLED(pAd, -100); // Force signal strength Led to be turned off, firmware is not done it.
|
|
|
|
-
|
|
|
|
- AsicDisableSync(pAd);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.PeriodicRound = 0;
|
|
|
|
- pAd->Mlme.OneSecPeriodicRound = 0;
|
|
|
|
-
|
|
|
|
- if (pAd->StaCfg.BssType == BSS_INFRA)
|
|
|
|
- {
|
|
|
|
- // Remove StaCfg Information after link down
|
|
|
|
- NdisZeroMemory(pAd->CommonCfg.Bssid, MAC_ADDR_LEN);
|
|
|
|
- NdisZeroMemory(pAd->CommonCfg.Ssid, MAX_LEN_OF_SSID);
|
|
|
|
- pAd->CommonCfg.SsidLen = 0;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- NdisZeroMemory(&pAd->MlmeAux.HtCapability, sizeof(HT_CAPABILITY_IE));
|
|
|
|
- NdisZeroMemory(&pAd->MlmeAux.AddHtInfo, sizeof(ADD_HT_INFO_IE));
|
|
|
|
- pAd->MlmeAux.HtCapabilityLen = 0;
|
|
|
|
- pAd->MlmeAux.NewExtChannelOffset = 0xff;
|
|
|
|
-
|
|
|
|
- // Reset WPA-PSK state. Only reset when supplicant enabled
|
|
|
|
- if (pAd->StaCfg.WpaState != SS_NOTUSE)
|
|
|
|
- {
|
|
|
|
- pAd->StaCfg.WpaState = SS_START;
|
|
|
|
- // Clear Replay counter
|
|
|
|
- NdisZeroMemory(pAd->StaCfg.ReplayCounter, 8);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // if link down come from AP, we need to remove all WPA keys on WPA mode.
|
|
|
|
- // otherwise will cause 4-way handshaking failed, since the WPA key not empty.
|
|
|
|
- //
|
|
|
|
- if ((IsReqFromAP) && (pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA))
|
|
|
|
- {
|
|
|
|
- // Remove all WPA keys
|
|
|
|
- RTMPWPARemoveAllKeys(pAd);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // 802.1x port control
|
|
|
|
-
|
|
|
|
- // Prevent clear PortSecured here with static WEP
|
|
|
|
- // NetworkManger set security policy first then set SSID to connect AP.
|
|
|
|
- if (pAd->StaCfg.WpaSupplicantUP &&
|
|
|
|
- (pAd->StaCfg.WepStatus == Ndis802_11WEPEnabled) &&
|
|
|
|
- (pAd->StaCfg.IEEE8021X == FALSE))
|
|
|
|
- {
|
|
|
|
- pAd->StaCfg.PortSecured = WPA_802_1X_PORT_SECURED;
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- pAd->StaCfg.PortSecured = WPA_802_1X_PORT_NOT_SECURED;
|
|
|
|
- pAd->StaCfg.PrivacyFilter = Ndis802_11PrivFilter8021xWEP;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- NdisAcquireSpinLock(&pAd->MacTabLock);
|
|
|
|
- pAd->MacTab.Content[BSSID_WCID].PortSecured = pAd->StaCfg.PortSecured;
|
|
|
|
- NdisReleaseSpinLock(&pAd->MacTabLock);
|
|
|
|
-
|
|
|
|
- pAd->StaCfg.MicErrCnt = 0;
|
|
|
|
-
|
|
|
|
- // Turn off Ckip control flag
|
|
|
|
- pAd->StaCfg.bCkipOn = FALSE;
|
|
|
|
- pAd->StaCfg.CCXEnable = FALSE;
|
|
|
|
-
|
|
|
|
- pAd->IndicateMediaState = NdisMediaStateDisconnected;
|
|
|
|
- // Update extra information to link is up
|
|
|
|
- pAd->ExtraInfo = GENERAL_LINK_DOWN;
|
|
|
|
-
|
|
|
|
- pAd->StaActive.SupportedPhyInfo.bHtEnable = FALSE;
|
|
|
|
-
|
|
|
|
- // Reset the Current AP's IP address
|
|
|
|
- NdisZeroMemory(pAd->StaCfg.AironetIPAddress, 4);
|
|
|
|
-#ifdef RT2870
|
|
|
|
- pAd->bUsbTxBulkAggre = FALSE;
|
|
|
|
-#endif // RT2870 //
|
|
|
|
-
|
|
|
|
- // Clean association information
|
|
|
|
- NdisZeroMemory(&pAd->StaCfg.AssocInfo, sizeof(NDIS_802_11_ASSOCIATION_INFORMATION));
|
|
|
|
- pAd->StaCfg.AssocInfo.Length = sizeof(NDIS_802_11_ASSOCIATION_INFORMATION);
|
|
|
|
- pAd->StaCfg.ReqVarIELen = 0;
|
|
|
|
- pAd->StaCfg.ResVarIELen = 0;
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // Reset RSSI value after link down
|
|
|
|
- //
|
|
|
|
- pAd->StaCfg.RssiSample.AvgRssi0 = 0;
|
|
|
|
- pAd->StaCfg.RssiSample.AvgRssi0X8 = 0;
|
|
|
|
- pAd->StaCfg.RssiSample.AvgRssi1 = 0;
|
|
|
|
- pAd->StaCfg.RssiSample.AvgRssi1X8 = 0;
|
|
|
|
- pAd->StaCfg.RssiSample.AvgRssi2 = 0;
|
|
|
|
- pAd->StaCfg.RssiSample.AvgRssi2X8 = 0;
|
|
|
|
-
|
|
|
|
- // Restore MlmeRate
|
|
|
|
- pAd->CommonCfg.MlmeRate = pAd->CommonCfg.BasicMlmeRate;
|
|
|
|
- pAd->CommonCfg.RtsRate = pAd->CommonCfg.BasicMlmeRate;
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // After Link down, reset piggy-back setting in ASIC. Disable RDG.
|
|
|
|
- //
|
|
|
|
- if (pAd->CommonCfg.BBPCurrentBW == BW_40)
|
|
|
|
- {
|
|
|
|
- pAd->CommonCfg.BBPCurrentBW = BW_20;
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R4, &ByteValue);
|
|
|
|
- ByteValue &= (~0x18);
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R4, ByteValue);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // Reset DAC
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R1, &ByteValue);
|
|
|
|
- ByteValue &= (~0x18);
|
|
|
|
- if (pAd->Antenna.field.TxPath == 2)
|
|
|
|
- {
|
|
|
|
- ByteValue |= 0x10;
|
|
|
|
- }
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R1, ByteValue);
|
|
|
|
-
|
|
|
|
- RTMPSetPiggyBack(pAd,FALSE);
|
|
|
|
- OPSTATUS_CLEAR_FLAG(pAd, fOP_STATUS_PIGGYBACK_INUSED);
|
|
|
|
-
|
|
|
|
- pAd->CommonCfg.BACapability.word = pAd->CommonCfg.REGBACapability.word;
|
|
|
|
-
|
|
|
|
- // Restore all settings in the following.
|
|
|
|
- AsicUpdateProtect(pAd, 0, (ALLN_SETPROTECT|CCKSETPROTECT|OFDMSETPROTECT), TRUE, FALSE);
|
|
|
|
- AsicDisableRDG(pAd);
|
|
|
|
- pAd->CommonCfg.IOTestParm.bCurrentAtheros = FALSE;
|
|
|
|
- pAd->CommonCfg.IOTestParm.bNowAtherosBurstOn = FALSE;
|
|
|
|
-
|
|
|
|
- RTMP_IO_WRITE32(pAd, MAX_LEN_CFG, 0x1fff);
|
|
|
|
- RTMP_CLEAR_FLAG(pAd, fRTMP_ADAPTER_BSS_SCAN_IN_PROGRESS);
|
|
|
|
-
|
|
|
|
- {
|
|
|
|
- union iwreq_data wrqu;
|
|
|
|
- memset(wrqu.ap_addr.sa_data, 0, MAC_ADDR_LEN);
|
|
|
|
- wireless_send_event(pAd->net_dev, SIOCGIWAP, &wrqu, NULL);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
-#ifdef RT30xx
|
|
|
|
- if (IS_RT3090(pAd))
|
|
|
|
- {
|
|
|
|
- UINT32 macdata;
|
|
|
|
- // disable MMPS BBP control register
|
|
|
|
- RTMP_BBP_IO_READ8_BY_REG_ID(pAd, BBP_R3, &ByteValue);
|
|
|
|
- ByteValue &= ~(0x04); //bit 2
|
|
|
|
- RTMP_BBP_IO_WRITE8_BY_REG_ID(pAd, BBP_R3, ByteValue);
|
|
|
|
-
|
|
|
|
- // disable MMPS MAC control register
|
|
|
|
- RTMP_IO_READ32(pAd, 0x1210, &macdata);
|
|
|
|
- macdata &= ~(0x09); //bit 0, 3
|
|
|
|
- RTMP_IO_WRITE32(pAd, 0x1210, macdata);
|
|
|
|
- }
|
|
|
|
-#endif // RT30xx //
|
|
|
|
-
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID IterateOnBssTab(
|
|
|
|
- IN PRTMP_ADAPTER pAd)
|
|
|
|
-{
|
|
|
|
- MLME_START_REQ_STRUCT StartReq;
|
|
|
|
- MLME_JOIN_REQ_STRUCT JoinReq;
|
|
|
|
- ULONG BssIdx;
|
|
|
|
-
|
|
|
|
- // Change the wepstatus to original wepstatus
|
|
|
|
- pAd->StaCfg.WepStatus = pAd->StaCfg.OrigWepStatus;
|
|
|
|
- pAd->StaCfg.PairCipher = pAd->StaCfg.OrigWepStatus;
|
|
|
|
- pAd->StaCfg.GroupCipher = pAd->StaCfg.OrigWepStatus;
|
|
|
|
-
|
|
|
|
- BssIdx = pAd->MlmeAux.BssIdx;
|
|
|
|
- if (BssIdx < pAd->MlmeAux.SsidBssTab.BssNr)
|
|
|
|
- {
|
|
|
|
- // Check cipher suite, AP must have more secured cipher than station setting
|
|
|
|
- // Set the Pairwise and Group cipher to match the intended AP setting
|
|
|
|
- // We can only connect to AP with less secured cipher setting
|
|
|
|
- if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPAPSK))
|
|
|
|
- {
|
|
|
|
- pAd->StaCfg.GroupCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.GroupCipher;
|
|
|
|
-
|
|
|
|
- if (pAd->StaCfg.WepStatus == pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipher)
|
|
|
|
- pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipher;
|
|
|
|
- else if (pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipherAux != Ndis802_11WEPDisabled)
|
|
|
|
- pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA.PairCipherAux;
|
|
|
|
- else // There is no PairCipher Aux, downgrade our capability to TKIP
|
|
|
|
- pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
|
|
|
|
- }
|
|
|
|
- else if ((pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2) || (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPA2PSK))
|
|
|
|
- {
|
|
|
|
- pAd->StaCfg.GroupCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.GroupCipher;
|
|
|
|
-
|
|
|
|
- if (pAd->StaCfg.WepStatus == pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipher)
|
|
|
|
- pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipher;
|
|
|
|
- else if (pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipherAux != Ndis802_11WEPDisabled)
|
|
|
|
- pAd->StaCfg.PairCipher = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.PairCipherAux;
|
|
|
|
- else // There is no PairCipher Aux, downgrade our capability to TKIP
|
|
|
|
- pAd->StaCfg.PairCipher = Ndis802_11Encryption2Enabled;
|
|
|
|
-
|
|
|
|
- // RSN capability
|
|
|
|
- pAd->StaCfg.RsnCapability = pAd->MlmeAux.SsidBssTab.BssEntry[BssIdx].WPA2.RsnCapability;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // Set Mix cipher flag
|
|
|
|
- pAd->StaCfg.bMixCipher = (pAd->StaCfg.PairCipher == pAd->StaCfg.GroupCipher) ? FALSE : TRUE;
|
|
|
|
- if (pAd->StaCfg.bMixCipher == TRUE)
|
|
|
|
- {
|
|
|
|
- // If mix cipher, re-build RSNIE
|
|
|
|
- RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, 0);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - iterate BSS %ld of %d\n", BssIdx, pAd->MlmeAux.SsidBssTab.BssNr));
|
|
|
|
- JoinParmFill(pAd, &JoinReq, BssIdx);
|
|
|
|
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_JOIN_REQ, sizeof(MLME_JOIN_REQ_STRUCT),
|
|
|
|
- &JoinReq);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_JOIN;
|
|
|
|
- }
|
|
|
|
- else if (pAd->StaCfg.BssType == BSS_ADHOC)
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All BSS fail; start a new ADHOC (Ssid=%s)...\n",pAd->MlmeAux.Ssid));
|
|
|
|
- StartParmFill(pAd, &StartReq, pAd->MlmeAux.Ssid, pAd->MlmeAux.SsidLen);
|
|
|
|
- MlmeEnqueue(pAd, SYNC_STATE_MACHINE, MT2_MLME_START_REQ, sizeof(MLME_START_REQ_STRUCT), &StartReq);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_START;
|
|
|
|
- }
|
|
|
|
- else // no more BSS
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All roaming failed, stay @ ch #%d\n", pAd->CommonCfg.Channel));
|
|
|
|
- AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
|
|
|
|
- AsicLockChannel(pAd, pAd->CommonCfg.Channel);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-// for re-association only
|
|
|
|
-// IRQL = DISPATCH_LEVEL
|
|
|
|
-VOID IterateOnBssTab2(
|
|
|
|
- IN PRTMP_ADAPTER pAd)
|
|
|
|
-{
|
|
|
|
- MLME_REASSOC_REQ_STRUCT ReassocReq;
|
|
|
|
- ULONG BssIdx;
|
|
|
|
- BSS_ENTRY *pBss;
|
|
|
|
-
|
|
|
|
- BssIdx = pAd->MlmeAux.RoamIdx;
|
|
|
|
- pBss = &pAd->MlmeAux.RoamTab.BssEntry[BssIdx];
|
|
|
|
-
|
|
|
|
- if (BssIdx < pAd->MlmeAux.RoamTab.BssNr)
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - iterate BSS %ld of %d\n", BssIdx, pAd->MlmeAux.RoamTab.BssNr));
|
|
|
|
-
|
|
|
|
- AsicSwitchChannel(pAd, pBss->Channel, FALSE);
|
|
|
|
- AsicLockChannel(pAd, pBss->Channel);
|
|
|
|
-
|
|
|
|
- // reassociate message has the same structure as associate message
|
|
|
|
- AssocParmFill(pAd, &ReassocReq, pBss->Bssid, pBss->CapabilityInfo,
|
|
|
|
- ASSOC_TIMEOUT, pAd->StaCfg.DefaultListenCount);
|
|
|
|
- MlmeEnqueue(pAd, ASSOC_STATE_MACHINE, MT2_MLME_REASSOC_REQ,
|
|
|
|
- sizeof(MLME_REASSOC_REQ_STRUCT), &ReassocReq);
|
|
|
|
-
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_WAIT_REASSOC;
|
|
|
|
- }
|
|
|
|
- else // no more BSS
|
|
|
|
- {
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("CNTL - All fast roaming failed, back to ch #%d\n",pAd->CommonCfg.Channel));
|
|
|
|
- AsicSwitchChannel(pAd, pAd->CommonCfg.Channel, FALSE);
|
|
|
|
- AsicLockChannel(pAd, pAd->CommonCfg.Channel);
|
|
|
|
- pAd->Mlme.CntlMachine.CurrState = CNTL_IDLE;
|
|
|
|
- }
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID JoinParmFill(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN OUT MLME_JOIN_REQ_STRUCT *JoinReq,
|
|
|
|
- IN ULONG BssIdx)
|
|
|
|
-{
|
|
|
|
- JoinReq->BssIdx = BssIdx;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID ScanParmFill(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN OUT MLME_SCAN_REQ_STRUCT *ScanReq,
|
|
|
|
- IN CHAR Ssid[],
|
|
|
|
- IN UCHAR SsidLen,
|
|
|
|
- IN UCHAR BssType,
|
|
|
|
- IN UCHAR ScanType)
|
|
|
|
-{
|
|
|
|
- NdisZeroMemory(ScanReq->Ssid, MAX_LEN_OF_SSID);
|
|
|
|
- ScanReq->SsidLen = SsidLen;
|
|
|
|
- NdisMoveMemory(ScanReq->Ssid, Ssid, SsidLen);
|
|
|
|
- ScanReq->BssType = BssType;
|
|
|
|
- ScanReq->ScanType = ScanType;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID StartParmFill(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN OUT MLME_START_REQ_STRUCT *StartReq,
|
|
|
|
- IN CHAR Ssid[],
|
|
|
|
- IN UCHAR SsidLen)
|
|
|
|
-{
|
|
|
|
- ASSERT(SsidLen <= MAX_LEN_OF_SSID);
|
|
|
|
- NdisMoveMemory(StartReq->Ssid, Ssid, SsidLen);
|
|
|
|
- StartReq->SsidLen = SsidLen;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-VOID AuthParmFill(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN OUT MLME_AUTH_REQ_STRUCT *AuthReq,
|
|
|
|
- IN PUCHAR pAddr,
|
|
|
|
- IN USHORT Alg)
|
|
|
|
-{
|
|
|
|
- COPY_MAC_ADDR(AuthReq->Addr, pAddr);
|
|
|
|
- AuthReq->Alg = Alg;
|
|
|
|
- AuthReq->Timeout = AUTH_TIMEOUT;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
-
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
- */
|
|
|
|
-
|
|
|
|
-
|
|
|
|
-#ifdef RT2870
|
|
|
|
-
|
|
|
|
-VOID MlmeCntlConfirm(
|
|
|
|
- IN PRTMP_ADAPTER pAd,
|
|
|
|
- IN ULONG MsgType,
|
|
|
|
- IN USHORT Msg)
|
|
|
|
-{
|
|
|
|
- MlmeEnqueue(pAd, MLME_CNTL_STATE_MACHINE, MsgType, sizeof(USHORT), &Msg);
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-VOID ComposePsPoll(
|
|
|
|
- IN PRTMP_ADAPTER pAd)
|
|
|
|
-{
|
|
|
|
- PTXINFO_STRUC pTxInfo;
|
|
|
|
- PTXWI_STRUC pTxWI;
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("ComposePsPoll\n"));
|
|
|
|
- NdisZeroMemory(&pAd->PsPollFrame, sizeof(PSPOLL_FRAME));
|
|
|
|
-
|
|
|
|
- pAd->PsPollFrame.FC.PwrMgmt = 0;
|
|
|
|
- pAd->PsPollFrame.FC.Type = BTYPE_CNTL;
|
|
|
|
- pAd->PsPollFrame.FC.SubType = SUBTYPE_PS_POLL;
|
|
|
|
- pAd->PsPollFrame.Aid = pAd->StaActive.Aid | 0xC000;
|
|
|
|
- COPY_MAC_ADDR(pAd->PsPollFrame.Bssid, pAd->CommonCfg.Bssid);
|
|
|
|
- COPY_MAC_ADDR(pAd->PsPollFrame.Ta, pAd->CurrentAddress);
|
|
|
|
-
|
|
|
|
- RTMPZeroMemory(&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[0], 100);
|
|
|
|
- pTxInfo = (PTXINFO_STRUC)&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[0];
|
|
|
|
- RTMPWriteTxInfo(pAd, pTxInfo, (USHORT)(sizeof(PSPOLL_FRAME)+TXWI_SIZE), TRUE, EpToQueue[MGMTPIPEIDX], FALSE, FALSE);
|
|
|
|
- pTxWI = (PTXWI_STRUC)&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[TXINFO_SIZE];
|
|
|
|
- RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, FALSE, FALSE, TRUE, FALSE, 0, BSSID_WCID, (sizeof(PSPOLL_FRAME)),
|
|
|
|
- 0, 0, (UCHAR)pAd->CommonCfg.MlmeTransmit.field.MCS, IFS_BACKOFF, FALSE, &pAd->CommonCfg.MlmeTransmit);
|
|
|
|
- RTMPMoveMemory(&pAd->PsPollContext.TransferBuffer->field.WirelessPacket[TXWI_SIZE+TXINFO_SIZE], &pAd->PsPollFrame, sizeof(PSPOLL_FRAME));
|
|
|
|
- // Append 4 extra zero bytes.
|
|
|
|
- pAd->PsPollContext.BulkOutSize = TXINFO_SIZE + TXWI_SIZE + sizeof(PSPOLL_FRAME) + 4;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-// IRQL = DISPATCH_LEVEL
|
|
|
|
-VOID ComposeNullFrame(
|
|
|
|
- IN PRTMP_ADAPTER pAd)
|
|
|
|
-{
|
|
|
|
- PTXINFO_STRUC pTxInfo;
|
|
|
|
- PTXWI_STRUC pTxWI;
|
|
|
|
-
|
|
|
|
- NdisZeroMemory(&pAd->NullFrame, sizeof(HEADER_802_11));
|
|
|
|
- pAd->NullFrame.FC.Type = BTYPE_DATA;
|
|
|
|
- pAd->NullFrame.FC.SubType = SUBTYPE_NULL_FUNC;
|
|
|
|
- pAd->NullFrame.FC.ToDs = 1;
|
|
|
|
- COPY_MAC_ADDR(pAd->NullFrame.Addr1, pAd->CommonCfg.Bssid);
|
|
|
|
- COPY_MAC_ADDR(pAd->NullFrame.Addr2, pAd->CurrentAddress);
|
|
|
|
- COPY_MAC_ADDR(pAd->NullFrame.Addr3, pAd->CommonCfg.Bssid);
|
|
|
|
- RTMPZeroMemory(&pAd->NullContext.TransferBuffer->field.WirelessPacket[0], 100);
|
|
|
|
- pTxInfo = (PTXINFO_STRUC)&pAd->NullContext.TransferBuffer->field.WirelessPacket[0];
|
|
|
|
- RTMPWriteTxInfo(pAd, pTxInfo, (USHORT)(sizeof(HEADER_802_11)+TXWI_SIZE), TRUE, EpToQueue[MGMTPIPEIDX], FALSE, FALSE);
|
|
|
|
- pTxWI = (PTXWI_STRUC)&pAd->NullContext.TransferBuffer->field.WirelessPacket[TXINFO_SIZE];
|
|
|
|
- RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, FALSE, FALSE, TRUE, FALSE, 0, BSSID_WCID, (sizeof(HEADER_802_11)),
|
|
|
|
- 0, 0, (UCHAR)pAd->CommonCfg.MlmeTransmit.field.MCS, IFS_BACKOFF, FALSE, &pAd->CommonCfg.MlmeTransmit);
|
|
|
|
- RTMPMoveMemory(&pAd->NullContext.TransferBuffer->field.WirelessPacket[TXWI_SIZE+TXINFO_SIZE], &pAd->NullFrame, sizeof(HEADER_802_11));
|
|
|
|
- pAd->NullContext.BulkOutSize = TXINFO_SIZE + TXWI_SIZE + sizeof(pAd->NullFrame) + 4;
|
|
|
|
-}
|
|
|
|
-#endif // RT2870 //
|
|
|
|
-
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- ==========================================================================
|
|
|
|
- Description:
|
|
|
|
- Pre-build a BEACON frame in the shared memory
|
|
|
|
-
|
|
|
|
- IRQL = PASSIVE_LEVEL
|
|
|
|
- IRQL = DISPATCH_LEVEL
|
|
|
|
-
|
|
|
|
- ==========================================================================
|
|
|
|
-*/
|
|
|
|
-ULONG MakeIbssBeacon(
|
|
|
|
- IN PRTMP_ADAPTER pAd)
|
|
|
|
-{
|
|
|
|
- UCHAR DsLen = 1, IbssLen = 2;
|
|
|
|
- UCHAR LocalErpIe[3] = {IE_ERP, 1, 0x04};
|
|
|
|
- HEADER_802_11 BcnHdr;
|
|
|
|
- USHORT CapabilityInfo;
|
|
|
|
- LARGE_INTEGER FakeTimestamp;
|
|
|
|
- ULONG FrameLen = 0;
|
|
|
|
- PTXWI_STRUC pTxWI = &pAd->BeaconTxWI;
|
|
|
|
- CHAR *pBeaconFrame = pAd->BeaconBuf;
|
|
|
|
- BOOLEAN Privacy;
|
|
|
|
- UCHAR SupRate[MAX_LEN_OF_SUPPORTED_RATES];
|
|
|
|
- UCHAR SupRateLen = 0;
|
|
|
|
- UCHAR ExtRate[MAX_LEN_OF_SUPPORTED_RATES];
|
|
|
|
- UCHAR ExtRateLen = 0;
|
|
|
|
- UCHAR RSNIe = IE_WPA;
|
|
|
|
-
|
|
|
|
- if ((pAd->CommonCfg.PhyMode == PHY_11B) && (pAd->CommonCfg.Channel <= 14))
|
|
|
|
- {
|
|
|
|
- SupRate[0] = 0x82; // 1 mbps
|
|
|
|
- SupRate[1] = 0x84; // 2 mbps
|
|
|
|
- SupRate[2] = 0x8b; // 5.5 mbps
|
|
|
|
- SupRate[3] = 0x96; // 11 mbps
|
|
|
|
- SupRateLen = 4;
|
|
|
|
- ExtRateLen = 0;
|
|
|
|
- }
|
|
|
|
- else if (pAd->CommonCfg.Channel > 14)
|
|
|
|
- {
|
|
|
|
- SupRate[0] = 0x8C; // 6 mbps, in units of 0.5 Mbps, basic rate
|
|
|
|
- SupRate[1] = 0x12; // 9 mbps, in units of 0.5 Mbps
|
|
|
|
- SupRate[2] = 0x98; // 12 mbps, in units of 0.5 Mbps, basic rate
|
|
|
|
- SupRate[3] = 0x24; // 18 mbps, in units of 0.5 Mbps
|
|
|
|
- SupRate[4] = 0xb0; // 24 mbps, in units of 0.5 Mbps, basic rate
|
|
|
|
- SupRate[5] = 0x48; // 36 mbps, in units of 0.5 Mbps
|
|
|
|
- SupRate[6] = 0x60; // 48 mbps, in units of 0.5 Mbps
|
|
|
|
- SupRate[7] = 0x6c; // 54 mbps, in units of 0.5 Mbps
|
|
|
|
- SupRateLen = 8;
|
|
|
|
- ExtRateLen = 0;
|
|
|
|
-
|
|
|
|
- //
|
|
|
|
- // Also Update MlmeRate & RtsRate for G only & A only
|
|
|
|
- //
|
|
|
|
- pAd->CommonCfg.MlmeRate = RATE_6;
|
|
|
|
- pAd->CommonCfg.RtsRate = RATE_6;
|
|
|
|
- pAd->CommonCfg.MlmeTransmit.field.MODE = MODE_OFDM;
|
|
|
|
- pAd->CommonCfg.MlmeTransmit.field.MCS = OfdmRateToRxwiMCS[pAd->CommonCfg.MlmeRate];
|
|
|
|
- pAd->MacTab.Content[BSS0Mcast_WCID].HTPhyMode.field.MODE = MODE_OFDM;
|
|
|
|
- pAd->MacTab.Content[BSS0Mcast_WCID].HTPhyMode.field.MCS = OfdmRateToRxwiMCS[pAd->CommonCfg.MlmeRate];
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- SupRate[0] = 0x82; // 1 mbps
|
|
|
|
- SupRate[1] = 0x84; // 2 mbps
|
|
|
|
- SupRate[2] = 0x8b; // 5.5 mbps
|
|
|
|
- SupRate[3] = 0x96; // 11 mbps
|
|
|
|
- SupRateLen = 4;
|
|
|
|
-
|
|
|
|
- ExtRate[0] = 0x0C; // 6 mbps, in units of 0.5 Mbps,
|
|
|
|
- ExtRate[1] = 0x12; // 9 mbps, in units of 0.5 Mbps
|
|
|
|
- ExtRate[2] = 0x18; // 12 mbps, in units of 0.5 Mbps,
|
|
|
|
- ExtRate[3] = 0x24; // 18 mbps, in units of 0.5 Mbps
|
|
|
|
- ExtRate[4] = 0x30; // 24 mbps, in units of 0.5 Mbps,
|
|
|
|
- ExtRate[5] = 0x48; // 36 mbps, in units of 0.5 Mbps
|
|
|
|
- ExtRate[6] = 0x60; // 48 mbps, in units of 0.5 Mbps
|
|
|
|
- ExtRate[7] = 0x6c; // 54 mbps, in units of 0.5 Mbps
|
|
|
|
- ExtRateLen = 8;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- pAd->StaActive.SupRateLen = SupRateLen;
|
|
|
|
- NdisMoveMemory(pAd->StaActive.SupRate, SupRate, SupRateLen);
|
|
|
|
- pAd->StaActive.ExtRateLen = ExtRateLen;
|
|
|
|
- NdisMoveMemory(pAd->StaActive.ExtRate, ExtRate, ExtRateLen);
|
|
|
|
-
|
|
|
|
- // compose IBSS beacon frame
|
|
|
|
- MgtMacHeaderInit(pAd, &BcnHdr, SUBTYPE_BEACON, 0, BROADCAST_ADDR, pAd->CommonCfg.Bssid);
|
|
|
|
- Privacy = (pAd->StaCfg.WepStatus == Ndis802_11Encryption1Enabled) ||
|
|
|
|
- (pAd->StaCfg.WepStatus == Ndis802_11Encryption2Enabled) ||
|
|
|
|
- (pAd->StaCfg.WepStatus == Ndis802_11Encryption3Enabled);
|
|
|
|
- CapabilityInfo = CAP_GENERATE(0, 1, Privacy, (pAd->CommonCfg.TxPreamble == Rt802_11PreambleShort), 0, 0);
|
|
|
|
-
|
|
|
|
- MakeOutgoingFrame(pBeaconFrame, &FrameLen,
|
|
|
|
- sizeof(HEADER_802_11), &BcnHdr,
|
|
|
|
- TIMESTAMP_LEN, &FakeTimestamp,
|
|
|
|
- 2, &pAd->CommonCfg.BeaconPeriod,
|
|
|
|
- 2, &CapabilityInfo,
|
|
|
|
- 1, &SsidIe,
|
|
|
|
- 1, &pAd->CommonCfg.SsidLen,
|
|
|
|
- pAd->CommonCfg.SsidLen, pAd->CommonCfg.Ssid,
|
|
|
|
- 1, &SupRateIe,
|
|
|
|
- 1, &SupRateLen,
|
|
|
|
- SupRateLen, SupRate,
|
|
|
|
- 1, &DsIe,
|
|
|
|
- 1, &DsLen,
|
|
|
|
- 1, &pAd->CommonCfg.Channel,
|
|
|
|
- 1, &IbssIe,
|
|
|
|
- 1, &IbssLen,
|
|
|
|
- 2, &pAd->StaActive.AtimWin,
|
|
|
|
- END_OF_ARGS);
|
|
|
|
-
|
|
|
|
- // add ERP_IE and EXT_RAE IE of in 802.11g
|
|
|
|
- if (ExtRateLen)
|
|
|
|
- {
|
|
|
|
- ULONG tmp;
|
|
|
|
-
|
|
|
|
- MakeOutgoingFrame(pBeaconFrame + FrameLen, &tmp,
|
|
|
|
- 3, LocalErpIe,
|
|
|
|
- 1, &ExtRateIe,
|
|
|
|
- 1, &ExtRateLen,
|
|
|
|
- ExtRateLen, ExtRate,
|
|
|
|
- END_OF_ARGS);
|
|
|
|
- FrameLen += tmp;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- // If adhoc secruity is set for WPA-None, append the cipher suite IE
|
|
|
|
- if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone)
|
|
|
|
- {
|
|
|
|
- ULONG tmp;
|
|
|
|
- RTMPMakeRSNIE(pAd, pAd->StaCfg.AuthMode, pAd->StaCfg.WepStatus, BSS0);
|
|
|
|
-
|
|
|
|
- MakeOutgoingFrame(pBeaconFrame + FrameLen, &tmp,
|
|
|
|
- 1, &RSNIe,
|
|
|
|
- 1, &pAd->StaCfg.RSNIE_Len,
|
|
|
|
- pAd->StaCfg.RSNIE_Len, pAd->StaCfg.RSN_IE,
|
|
|
|
- END_OF_ARGS);
|
|
|
|
- FrameLen += tmp;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- if ((pAd->CommonCfg.PhyMode >= PHY_11ABGN_MIXED))
|
|
|
|
- {
|
|
|
|
- ULONG TmpLen;
|
|
|
|
- UCHAR HtLen, HtLen1;
|
|
|
|
-
|
|
|
|
- // add HT Capability IE
|
|
|
|
- HtLen = sizeof(pAd->CommonCfg.HtCapability);
|
|
|
|
- HtLen1 = sizeof(pAd->CommonCfg.AddHTInfo);
|
|
|
|
-
|
|
|
|
- MakeOutgoingFrame(pBeaconFrame+FrameLen, &TmpLen,
|
|
|
|
- 1, &HtCapIe,
|
|
|
|
- 1, &HtLen,
|
|
|
|
- HtLen, &pAd->CommonCfg.HtCapability,
|
|
|
|
- 1, &AddHtInfoIe,
|
|
|
|
- 1, &HtLen1,
|
|
|
|
- HtLen1, &pAd->CommonCfg.AddHTInfo,
|
|
|
|
- END_OF_ARGS);
|
|
|
|
-
|
|
|
|
- FrameLen += TmpLen;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- //beacon use reserved WCID 0xff
|
|
|
|
- if (pAd->CommonCfg.Channel > 14)
|
|
|
|
- {
|
|
|
|
- RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, TRUE, FALSE, FALSE, TRUE, 0, 0xff, FrameLen,
|
|
|
|
- PID_MGMT, PID_BEACON, RATE_1, IFS_HTTXOP, FALSE, &pAd->CommonCfg.MlmeTransmit);
|
|
|
|
- }
|
|
|
|
- else
|
|
|
|
- {
|
|
|
|
- // Set to use 1Mbps for Adhoc beacon.
|
|
|
|
- HTTRANSMIT_SETTING Transmit;
|
|
|
|
- Transmit.word = 0;
|
|
|
|
- RTMPWriteTxWI(pAd, pTxWI, FALSE, FALSE, TRUE, FALSE, FALSE, TRUE, 0, 0xff, FrameLen,
|
|
|
|
- PID_MGMT, PID_BEACON, RATE_1, IFS_HTTXOP, FALSE, &Transmit);
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- DBGPRINT(RT_DEBUG_TRACE, ("MakeIbssBeacon (len=%ld), SupRateLen=%d, ExtRateLen=%d, Channel=%d, PhyMode=%d\n",
|
|
|
|
- FrameLen, SupRateLen, ExtRateLen, pAd->CommonCfg.Channel, pAd->CommonCfg.PhyMode));
|
|
|
|
- return FrameLen;
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
|
|
+#include "../../rt2870/sta/connect.c"
|
|
|
|
|