mlme.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621
  1. /*
  2. * cfg80211 MLME SAP interface
  3. *
  4. * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
  5. */
  6. #include <linux/kernel.h>
  7. #include <linux/module.h>
  8. #include <linux/netdevice.h>
  9. #include <linux/nl80211.h>
  10. #include <net/cfg80211.h>
  11. #include "core.h"
  12. #include "nl80211.h"
  13. void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len)
  14. {
  15. struct wireless_dev *wdev = dev->ieee80211_ptr;
  16. struct wiphy *wiphy = wdev->wiphy;
  17. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  18. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  19. u8 *bssid = mgmt->bssid;
  20. int i;
  21. u16 status = le16_to_cpu(mgmt->u.auth.status_code);
  22. bool done = false;
  23. wdev_lock(wdev);
  24. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  25. if (wdev->authtry_bsses[i] &&
  26. memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid,
  27. ETH_ALEN) == 0) {
  28. if (status == WLAN_STATUS_SUCCESS) {
  29. wdev->auth_bsses[i] = wdev->authtry_bsses[i];
  30. } else {
  31. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  32. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  33. }
  34. wdev->authtry_bsses[i] = NULL;
  35. done = true;
  36. break;
  37. }
  38. }
  39. WARN_ON(!done);
  40. nl80211_send_rx_auth(rdev, dev, buf, len, GFP_KERNEL);
  41. cfg80211_sme_rx_auth(dev, buf, len);
  42. wdev_unlock(wdev);
  43. }
  44. EXPORT_SYMBOL(cfg80211_send_rx_auth);
  45. void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len)
  46. {
  47. u16 status_code;
  48. struct wireless_dev *wdev = dev->ieee80211_ptr;
  49. struct wiphy *wiphy = wdev->wiphy;
  50. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  51. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  52. u8 *ie = mgmt->u.assoc_resp.variable;
  53. int i, ieoffs = offsetof(struct ieee80211_mgmt, u.assoc_resp.variable);
  54. bool done;
  55. wdev_lock(wdev);
  56. status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code);
  57. nl80211_send_rx_assoc(rdev, dev, buf, len, GFP_KERNEL);
  58. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs,
  59. status_code,
  60. status_code == WLAN_STATUS_SUCCESS);
  61. if (status_code == WLAN_STATUS_SUCCESS) {
  62. for (i = 0; wdev->current_bss && i < MAX_AUTH_BSSES; i++) {
  63. if (wdev->auth_bsses[i] == wdev->current_bss) {
  64. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  65. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  66. wdev->auth_bsses[i] = NULL;
  67. done = true;
  68. break;
  69. }
  70. }
  71. WARN_ON(!done);
  72. }
  73. wdev_unlock(wdev);
  74. }
  75. EXPORT_SYMBOL(cfg80211_send_rx_assoc);
  76. static void __cfg80211_send_deauth(struct net_device *dev,
  77. const u8 *buf, size_t len)
  78. {
  79. struct wireless_dev *wdev = dev->ieee80211_ptr;
  80. struct wiphy *wiphy = wdev->wiphy;
  81. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  82. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  83. const u8 *bssid = mgmt->bssid;
  84. int i;
  85. bool done = false;
  86. ASSERT_WDEV_LOCK(wdev);
  87. nl80211_send_deauth(rdev, dev, buf, len, GFP_KERNEL);
  88. if (wdev->current_bss &&
  89. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  90. done = true;
  91. cfg80211_unhold_bss(wdev->current_bss);
  92. cfg80211_put_bss(&wdev->current_bss->pub);
  93. wdev->current_bss = NULL;
  94. } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
  95. if (wdev->auth_bsses[i] &&
  96. memcmp(wdev->auth_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
  97. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  98. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  99. wdev->auth_bsses[i] = NULL;
  100. done = true;
  101. break;
  102. }
  103. if (wdev->authtry_bsses[i] &&
  104. memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
  105. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  106. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  107. wdev->authtry_bsses[i] = NULL;
  108. done = true;
  109. break;
  110. }
  111. }
  112. WARN_ON(!done);
  113. if (wdev->sme_state == CFG80211_SME_CONNECTED) {
  114. u16 reason_code;
  115. bool from_ap;
  116. reason_code = le16_to_cpu(mgmt->u.deauth.reason_code);
  117. from_ap = memcmp(mgmt->da, dev->dev_addr, ETH_ALEN) == 0;
  118. __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
  119. } else if (wdev->sme_state == CFG80211_SME_CONNECTING) {
  120. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
  121. WLAN_STATUS_UNSPECIFIED_FAILURE,
  122. false);
  123. }
  124. }
  125. void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len,
  126. void *cookie)
  127. {
  128. struct wireless_dev *wdev = dev->ieee80211_ptr;
  129. BUG_ON(cookie && wdev != cookie);
  130. if (cookie) {
  131. /* called within callback */
  132. __cfg80211_send_deauth(dev, buf, len);
  133. } else {
  134. wdev_lock(wdev);
  135. __cfg80211_send_deauth(dev, buf, len);
  136. wdev_unlock(wdev);
  137. }
  138. }
  139. EXPORT_SYMBOL(cfg80211_send_deauth);
  140. static void __cfg80211_send_disassoc(struct net_device *dev,
  141. const u8 *buf, size_t len)
  142. {
  143. struct wireless_dev *wdev = dev->ieee80211_ptr;
  144. struct wiphy *wiphy = wdev->wiphy;
  145. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  146. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  147. const u8 *bssid = mgmt->bssid;
  148. int i;
  149. u16 reason_code;
  150. bool from_ap;
  151. bool done = false;
  152. ASSERT_WDEV_LOCK(wdev);
  153. nl80211_send_disassoc(rdev, dev, buf, len, GFP_KERNEL);
  154. if (wdev->sme_state != CFG80211_SME_CONNECTED)
  155. return;
  156. if (wdev->current_bss &&
  157. memcmp(wdev->current_bss, bssid, ETH_ALEN) == 0) {
  158. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  159. if (wdev->authtry_bsses[i] || wdev->auth_bsses[i])
  160. continue;
  161. wdev->auth_bsses[i] = wdev->current_bss;
  162. wdev->current_bss = NULL;
  163. done = true;
  164. cfg80211_sme_disassoc(dev, i);
  165. break;
  166. }
  167. WARN_ON(!done);
  168. } else
  169. WARN_ON(1);
  170. reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code);
  171. from_ap = memcmp(mgmt->da, dev->dev_addr, ETH_ALEN) == 0;
  172. __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
  173. }
  174. void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len,
  175. void *cookie)
  176. {
  177. struct wireless_dev *wdev = dev->ieee80211_ptr;
  178. BUG_ON(cookie && wdev != cookie);
  179. if (cookie) {
  180. /* called within callback */
  181. __cfg80211_send_disassoc(dev, buf, len);
  182. } else {
  183. wdev_lock(wdev);
  184. __cfg80211_send_disassoc(dev, buf, len);
  185. wdev_unlock(wdev);
  186. }
  187. }
  188. EXPORT_SYMBOL(cfg80211_send_disassoc);
  189. void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr)
  190. {
  191. struct wireless_dev *wdev = dev->ieee80211_ptr;
  192. struct wiphy *wiphy = wdev->wiphy;
  193. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  194. int i;
  195. bool done = false;
  196. wdev_lock(wdev);
  197. nl80211_send_auth_timeout(rdev, dev, addr, GFP_KERNEL);
  198. if (wdev->sme_state == CFG80211_SME_CONNECTING)
  199. __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
  200. WLAN_STATUS_UNSPECIFIED_FAILURE,
  201. false);
  202. for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
  203. if (wdev->authtry_bsses[i] &&
  204. memcmp(wdev->authtry_bsses[i]->pub.bssid,
  205. addr, ETH_ALEN) == 0) {
  206. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  207. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  208. wdev->authtry_bsses[i] = NULL;
  209. done = true;
  210. break;
  211. }
  212. }
  213. WARN_ON(!done);
  214. wdev_unlock(wdev);
  215. }
  216. EXPORT_SYMBOL(cfg80211_send_auth_timeout);
  217. void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr)
  218. {
  219. struct wireless_dev *wdev = dev->ieee80211_ptr;
  220. struct wiphy *wiphy = wdev->wiphy;
  221. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  222. int i;
  223. bool done = false;
  224. wdev_lock(wdev);
  225. nl80211_send_assoc_timeout(rdev, dev, addr, GFP_KERNEL);
  226. if (wdev->sme_state == CFG80211_SME_CONNECTING)
  227. __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
  228. WLAN_STATUS_UNSPECIFIED_FAILURE,
  229. false);
  230. for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
  231. if (wdev->auth_bsses[i] &&
  232. memcmp(wdev->auth_bsses[i]->pub.bssid,
  233. addr, ETH_ALEN) == 0) {
  234. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  235. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  236. wdev->auth_bsses[i] = NULL;
  237. done = true;
  238. break;
  239. }
  240. }
  241. WARN_ON(!done);
  242. wdev_unlock(wdev);
  243. }
  244. EXPORT_SYMBOL(cfg80211_send_assoc_timeout);
  245. void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr,
  246. enum nl80211_key_type key_type, int key_id,
  247. const u8 *tsc, gfp_t gfp)
  248. {
  249. struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
  250. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  251. #ifdef CONFIG_WIRELESS_EXT
  252. union iwreq_data wrqu;
  253. char *buf = kmalloc(128, gfp);
  254. if (buf) {
  255. sprintf(buf, "MLME-MICHAELMICFAILURE.indication("
  256. "keyid=%d %scast addr=%pM)", key_id,
  257. key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni",
  258. addr);
  259. memset(&wrqu, 0, sizeof(wrqu));
  260. wrqu.data.length = strlen(buf);
  261. wireless_send_event(dev, IWEVCUSTOM, &wrqu, buf);
  262. kfree(buf);
  263. }
  264. #endif
  265. nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp);
  266. }
  267. EXPORT_SYMBOL(cfg80211_michael_mic_failure);
  268. /* some MLME handling for userspace SME */
  269. int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
  270. struct net_device *dev,
  271. struct ieee80211_channel *chan,
  272. enum nl80211_auth_type auth_type,
  273. const u8 *bssid,
  274. const u8 *ssid, int ssid_len,
  275. const u8 *ie, int ie_len,
  276. const u8 *key, int key_len, int key_idx)
  277. {
  278. struct wireless_dev *wdev = dev->ieee80211_ptr;
  279. struct cfg80211_auth_request req;
  280. struct cfg80211_internal_bss *bss;
  281. int i, err, slot = -1, nfree = 0;
  282. ASSERT_WDEV_LOCK(wdev);
  283. if (auth_type == NL80211_AUTHTYPE_SHARED_KEY)
  284. if (!key || !key_len || key_idx < 0 || key_idx > 4)
  285. return -EINVAL;
  286. if (wdev->current_bss &&
  287. memcmp(bssid, wdev->current_bss->pub.bssid, ETH_ALEN) == 0)
  288. return -EALREADY;
  289. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  290. if (wdev->authtry_bsses[i] &&
  291. memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid,
  292. ETH_ALEN) == 0)
  293. return -EALREADY;
  294. if (wdev->auth_bsses[i] &&
  295. memcmp(bssid, wdev->auth_bsses[i]->pub.bssid,
  296. ETH_ALEN) == 0)
  297. return -EALREADY;
  298. }
  299. memset(&req, 0, sizeof(req));
  300. req.ie = ie;
  301. req.ie_len = ie_len;
  302. req.auth_type = auth_type;
  303. req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
  304. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  305. req.key = key;
  306. req.key_len = key_len;
  307. req.key_idx = key_idx;
  308. if (!req.bss)
  309. return -ENOENT;
  310. bss = bss_from_pub(req.bss);
  311. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  312. if (!wdev->auth_bsses[i] && !wdev->authtry_bsses[i]) {
  313. slot = i;
  314. nfree++;
  315. }
  316. }
  317. /* we need one free slot for disassoc and one for this auth */
  318. if (nfree < 2) {
  319. err = -ENOSPC;
  320. goto out;
  321. }
  322. wdev->authtry_bsses[slot] = bss;
  323. cfg80211_hold_bss(bss);
  324. err = rdev->ops->auth(&rdev->wiphy, dev, &req);
  325. if (err) {
  326. wdev->authtry_bsses[slot] = NULL;
  327. cfg80211_unhold_bss(bss);
  328. }
  329. out:
  330. if (err)
  331. cfg80211_put_bss(req.bss);
  332. return err;
  333. }
  334. int cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
  335. struct net_device *dev, struct ieee80211_channel *chan,
  336. enum nl80211_auth_type auth_type, const u8 *bssid,
  337. const u8 *ssid, int ssid_len,
  338. const u8 *ie, int ie_len,
  339. const u8 *key, int key_len, int key_idx)
  340. {
  341. int err;
  342. wdev_lock(dev->ieee80211_ptr);
  343. err = __cfg80211_mlme_auth(rdev, dev, chan, auth_type, bssid,
  344. ssid, ssid_len, ie, ie_len,
  345. key, key_len, key_idx);
  346. wdev_unlock(dev->ieee80211_ptr);
  347. return err;
  348. }
  349. int __cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
  350. struct net_device *dev,
  351. struct ieee80211_channel *chan,
  352. const u8 *bssid, const u8 *prev_bssid,
  353. const u8 *ssid, int ssid_len,
  354. const u8 *ie, int ie_len, bool use_mfp,
  355. struct cfg80211_crypto_settings *crypt)
  356. {
  357. struct wireless_dev *wdev = dev->ieee80211_ptr;
  358. struct cfg80211_assoc_request req;
  359. struct cfg80211_internal_bss *bss;
  360. int i, err, slot = -1;
  361. ASSERT_WDEV_LOCK(wdev);
  362. memset(&req, 0, sizeof(req));
  363. if (wdev->current_bss)
  364. return -EALREADY;
  365. req.ie = ie;
  366. req.ie_len = ie_len;
  367. memcpy(&req.crypto, crypt, sizeof(req.crypto));
  368. req.use_mfp = use_mfp;
  369. req.prev_bssid = prev_bssid;
  370. req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
  371. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  372. if (!req.bss)
  373. return -ENOENT;
  374. bss = bss_from_pub(req.bss);
  375. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  376. if (bss == wdev->auth_bsses[i]) {
  377. slot = i;
  378. break;
  379. }
  380. }
  381. if (slot < 0) {
  382. err = -ENOTCONN;
  383. goto out;
  384. }
  385. err = rdev->ops->assoc(&rdev->wiphy, dev, &req);
  386. out:
  387. /* still a reference in wdev->auth_bsses[slot] */
  388. cfg80211_put_bss(req.bss);
  389. return err;
  390. }
  391. int cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
  392. struct net_device *dev,
  393. struct ieee80211_channel *chan,
  394. const u8 *bssid, const u8 *prev_bssid,
  395. const u8 *ssid, int ssid_len,
  396. const u8 *ie, int ie_len, bool use_mfp,
  397. struct cfg80211_crypto_settings *crypt)
  398. {
  399. struct wireless_dev *wdev = dev->ieee80211_ptr;
  400. int err;
  401. wdev_lock(wdev);
  402. err = __cfg80211_mlme_assoc(rdev, dev, chan, bssid, prev_bssid,
  403. ssid, ssid_len, ie, ie_len, use_mfp, crypt);
  404. wdev_unlock(wdev);
  405. return err;
  406. }
  407. int __cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
  408. struct net_device *dev, const u8 *bssid,
  409. const u8 *ie, int ie_len, u16 reason)
  410. {
  411. struct wireless_dev *wdev = dev->ieee80211_ptr;
  412. struct cfg80211_deauth_request req;
  413. int i;
  414. ASSERT_WDEV_LOCK(wdev);
  415. memset(&req, 0, sizeof(req));
  416. req.reason_code = reason;
  417. req.ie = ie;
  418. req.ie_len = ie_len;
  419. if (wdev->current_bss &&
  420. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  421. req.bss = &wdev->current_bss->pub;
  422. } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
  423. if (wdev->auth_bsses[i] &&
  424. memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
  425. req.bss = &wdev->auth_bsses[i]->pub;
  426. break;
  427. }
  428. if (wdev->authtry_bsses[i] &&
  429. memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
  430. req.bss = &wdev->authtry_bsses[i]->pub;
  431. break;
  432. }
  433. }
  434. if (!req.bss)
  435. return -ENOTCONN;
  436. return rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  437. }
  438. int cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
  439. struct net_device *dev, const u8 *bssid,
  440. const u8 *ie, int ie_len, u16 reason)
  441. {
  442. struct wireless_dev *wdev = dev->ieee80211_ptr;
  443. int err;
  444. wdev_lock(wdev);
  445. err = __cfg80211_mlme_deauth(rdev, dev, bssid, ie, ie_len, reason);
  446. wdev_unlock(wdev);
  447. return err;
  448. }
  449. static int __cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
  450. struct net_device *dev, const u8 *bssid,
  451. const u8 *ie, int ie_len, u16 reason)
  452. {
  453. struct wireless_dev *wdev = dev->ieee80211_ptr;
  454. struct cfg80211_disassoc_request req;
  455. ASSERT_WDEV_LOCK(wdev);
  456. memset(&req, 0, sizeof(req));
  457. req.reason_code = reason;
  458. req.ie = ie;
  459. req.ie_len = ie_len;
  460. if (memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0)
  461. req.bss = &wdev->current_bss->pub;
  462. else
  463. return -ENOTCONN;
  464. return rdev->ops->disassoc(&rdev->wiphy, dev, &req, wdev);
  465. }
  466. int cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
  467. struct net_device *dev, const u8 *bssid,
  468. const u8 *ie, int ie_len, u16 reason)
  469. {
  470. struct wireless_dev *wdev = dev->ieee80211_ptr;
  471. int err;
  472. wdev_lock(wdev);
  473. err = __cfg80211_mlme_disassoc(rdev, dev, bssid, ie, ie_len, reason);
  474. wdev_unlock(wdev);
  475. return err;
  476. }
  477. void cfg80211_mlme_down(struct cfg80211_registered_device *rdev,
  478. struct net_device *dev)
  479. {
  480. struct wireless_dev *wdev = dev->ieee80211_ptr;
  481. struct cfg80211_deauth_request req;
  482. int i;
  483. ASSERT_WDEV_LOCK(wdev);
  484. if (!rdev->ops->deauth)
  485. return;
  486. memset(&req, 0, sizeof(req));
  487. req.reason_code = WLAN_REASON_DEAUTH_LEAVING;
  488. req.ie = NULL;
  489. req.ie_len = 0;
  490. if (wdev->current_bss) {
  491. req.bss = &wdev->current_bss->pub;
  492. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  493. if (wdev->current_bss) {
  494. cfg80211_unhold_bss(wdev->current_bss);
  495. cfg80211_put_bss(&wdev->current_bss->pub);
  496. wdev->current_bss = NULL;
  497. }
  498. }
  499. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  500. if (wdev->auth_bsses[i]) {
  501. req.bss = &wdev->auth_bsses[i]->pub;
  502. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  503. if (wdev->auth_bsses[i]) {
  504. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  505. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  506. wdev->auth_bsses[i] = NULL;
  507. }
  508. }
  509. if (wdev->authtry_bsses[i]) {
  510. req.bss = &wdev->authtry_bsses[i]->pub;
  511. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  512. if (wdev->authtry_bsses[i]) {
  513. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  514. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  515. wdev->authtry_bsses[i] = NULL;
  516. }
  517. }
  518. }
  519. }