mlme.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682
  1. /*
  2. * cfg80211 MLME SAP interface
  3. *
  4. * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
  5. */
  6. #include <linux/kernel.h>
  7. #include <linux/module.h>
  8. #include <linux/netdevice.h>
  9. #include <linux/nl80211.h>
  10. #include <linux/wireless.h>
  11. #include <net/cfg80211.h>
  12. #include <net/iw_handler.h>
  13. #include "core.h"
  14. #include "nl80211.h"
  15. void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len)
  16. {
  17. struct wireless_dev *wdev = dev->ieee80211_ptr;
  18. struct wiphy *wiphy = wdev->wiphy;
  19. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  20. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  21. u8 *bssid = mgmt->bssid;
  22. int i;
  23. u16 status = le16_to_cpu(mgmt->u.auth.status_code);
  24. bool done = false;
  25. wdev_lock(wdev);
  26. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  27. if (wdev->authtry_bsses[i] &&
  28. memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid,
  29. ETH_ALEN) == 0) {
  30. if (status == WLAN_STATUS_SUCCESS) {
  31. wdev->auth_bsses[i] = wdev->authtry_bsses[i];
  32. } else {
  33. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  34. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  35. }
  36. wdev->authtry_bsses[i] = NULL;
  37. done = true;
  38. break;
  39. }
  40. }
  41. WARN_ON(!done);
  42. nl80211_send_rx_auth(rdev, dev, buf, len, GFP_KERNEL);
  43. cfg80211_sme_rx_auth(dev, buf, len);
  44. wdev_unlock(wdev);
  45. }
  46. EXPORT_SYMBOL(cfg80211_send_rx_auth);
  47. void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len)
  48. {
  49. u16 status_code;
  50. struct wireless_dev *wdev = dev->ieee80211_ptr;
  51. struct wiphy *wiphy = wdev->wiphy;
  52. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  53. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  54. u8 *ie = mgmt->u.assoc_resp.variable;
  55. int i, ieoffs = offsetof(struct ieee80211_mgmt, u.assoc_resp.variable);
  56. struct cfg80211_internal_bss *bss = NULL;
  57. wdev_lock(wdev);
  58. status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code);
  59. /*
  60. * This is a bit of a hack, we don't notify userspace of
  61. * a (re-)association reply if we tried to send a reassoc
  62. * and got a reject -- we only try again with an assoc
  63. * frame instead of reassoc.
  64. */
  65. if (status_code != WLAN_STATUS_SUCCESS && wdev->conn &&
  66. cfg80211_sme_failed_reassoc(wdev))
  67. goto out;
  68. nl80211_send_rx_assoc(rdev, dev, buf, len, GFP_KERNEL);
  69. if (status_code == WLAN_STATUS_SUCCESS) {
  70. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  71. if (!wdev->auth_bsses[i])
  72. continue;
  73. if (memcmp(wdev->auth_bsses[i]->pub.bssid, mgmt->bssid,
  74. ETH_ALEN) == 0) {
  75. bss = wdev->auth_bsses[i];
  76. wdev->auth_bsses[i] = NULL;
  77. /* additional reference to drop hold */
  78. cfg80211_ref_bss(bss);
  79. break;
  80. }
  81. }
  82. WARN_ON(!bss);
  83. } else if (wdev->conn) {
  84. cfg80211_sme_failed_assoc(wdev);
  85. /*
  86. * do not call connect_result() now because the
  87. * sme will schedule work that does it later.
  88. */
  89. goto out;
  90. }
  91. if (!wdev->conn && wdev->sme_state == CFG80211_SME_IDLE) {
  92. /*
  93. * This is for the userspace SME, the CONNECTING
  94. * state will be changed to CONNECTED by
  95. * __cfg80211_connect_result() below.
  96. */
  97. wdev->sme_state = CFG80211_SME_CONNECTING;
  98. }
  99. /* this consumes one bss reference (unless bss is NULL) */
  100. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs,
  101. status_code,
  102. status_code == WLAN_STATUS_SUCCESS,
  103. bss ? &bss->pub : NULL);
  104. /* drop hold now, and also reference acquired above */
  105. if (bss) {
  106. cfg80211_unhold_bss(bss);
  107. cfg80211_put_bss(&bss->pub);
  108. }
  109. out:
  110. wdev_unlock(wdev);
  111. }
  112. EXPORT_SYMBOL(cfg80211_send_rx_assoc);
  113. void __cfg80211_send_deauth(struct net_device *dev,
  114. const u8 *buf, size_t len)
  115. {
  116. struct wireless_dev *wdev = dev->ieee80211_ptr;
  117. struct wiphy *wiphy = wdev->wiphy;
  118. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  119. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  120. const u8 *bssid = mgmt->bssid;
  121. int i;
  122. bool found = false;
  123. ASSERT_WDEV_LOCK(wdev);
  124. if (wdev->current_bss &&
  125. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  126. cfg80211_unhold_bss(wdev->current_bss);
  127. cfg80211_put_bss(&wdev->current_bss->pub);
  128. wdev->current_bss = NULL;
  129. found = true;
  130. } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
  131. if (wdev->auth_bsses[i] &&
  132. memcmp(wdev->auth_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
  133. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  134. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  135. wdev->auth_bsses[i] = NULL;
  136. found = true;
  137. break;
  138. }
  139. if (wdev->authtry_bsses[i] &&
  140. memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
  141. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  142. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  143. wdev->authtry_bsses[i] = NULL;
  144. found = true;
  145. break;
  146. }
  147. }
  148. if (!found)
  149. return;
  150. nl80211_send_deauth(rdev, dev, buf, len, GFP_KERNEL);
  151. if (wdev->sme_state == CFG80211_SME_CONNECTED) {
  152. u16 reason_code;
  153. bool from_ap;
  154. reason_code = le16_to_cpu(mgmt->u.deauth.reason_code);
  155. from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0;
  156. __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
  157. } else if (wdev->sme_state == CFG80211_SME_CONNECTING) {
  158. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
  159. WLAN_STATUS_UNSPECIFIED_FAILURE,
  160. false, NULL);
  161. }
  162. }
  163. EXPORT_SYMBOL(__cfg80211_send_deauth);
  164. void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len)
  165. {
  166. struct wireless_dev *wdev = dev->ieee80211_ptr;
  167. wdev_lock(wdev);
  168. __cfg80211_send_deauth(dev, buf, len);
  169. wdev_unlock(wdev);
  170. }
  171. EXPORT_SYMBOL(cfg80211_send_deauth);
  172. void __cfg80211_send_disassoc(struct net_device *dev,
  173. const u8 *buf, size_t len)
  174. {
  175. struct wireless_dev *wdev = dev->ieee80211_ptr;
  176. struct wiphy *wiphy = wdev->wiphy;
  177. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  178. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  179. const u8 *bssid = mgmt->bssid;
  180. int i;
  181. u16 reason_code;
  182. bool from_ap;
  183. bool done = false;
  184. ASSERT_WDEV_LOCK(wdev);
  185. nl80211_send_disassoc(rdev, dev, buf, len, GFP_KERNEL);
  186. if (wdev->sme_state != CFG80211_SME_CONNECTED)
  187. return;
  188. if (wdev->current_bss &&
  189. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  190. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  191. if (wdev->authtry_bsses[i] || wdev->auth_bsses[i])
  192. continue;
  193. wdev->auth_bsses[i] = wdev->current_bss;
  194. wdev->current_bss = NULL;
  195. done = true;
  196. cfg80211_sme_disassoc(dev, i);
  197. break;
  198. }
  199. WARN_ON(!done);
  200. } else
  201. WARN_ON(1);
  202. reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code);
  203. from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0;
  204. __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
  205. }
  206. EXPORT_SYMBOL(__cfg80211_send_disassoc);
  207. void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len)
  208. {
  209. struct wireless_dev *wdev = dev->ieee80211_ptr;
  210. wdev_lock(wdev);
  211. __cfg80211_send_disassoc(dev, buf, len);
  212. wdev_unlock(wdev);
  213. }
  214. EXPORT_SYMBOL(cfg80211_send_disassoc);
  215. static void __cfg80211_auth_remove(struct wireless_dev *wdev, const u8 *addr)
  216. {
  217. int i;
  218. bool done = false;
  219. ASSERT_WDEV_LOCK(wdev);
  220. for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
  221. if (wdev->authtry_bsses[i] &&
  222. memcmp(wdev->authtry_bsses[i]->pub.bssid,
  223. addr, ETH_ALEN) == 0) {
  224. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  225. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  226. wdev->authtry_bsses[i] = NULL;
  227. done = true;
  228. break;
  229. }
  230. }
  231. WARN_ON(!done);
  232. }
  233. void __cfg80211_auth_canceled(struct net_device *dev, const u8 *addr)
  234. {
  235. __cfg80211_auth_remove(dev->ieee80211_ptr, addr);
  236. }
  237. EXPORT_SYMBOL(__cfg80211_auth_canceled);
  238. void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr)
  239. {
  240. struct wireless_dev *wdev = dev->ieee80211_ptr;
  241. struct wiphy *wiphy = wdev->wiphy;
  242. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  243. wdev_lock(wdev);
  244. nl80211_send_auth_timeout(rdev, dev, addr, GFP_KERNEL);
  245. if (wdev->sme_state == CFG80211_SME_CONNECTING)
  246. __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
  247. WLAN_STATUS_UNSPECIFIED_FAILURE,
  248. false, NULL);
  249. __cfg80211_auth_remove(wdev, addr);
  250. wdev_unlock(wdev);
  251. }
  252. EXPORT_SYMBOL(cfg80211_send_auth_timeout);
  253. void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr)
  254. {
  255. struct wireless_dev *wdev = dev->ieee80211_ptr;
  256. struct wiphy *wiphy = wdev->wiphy;
  257. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  258. int i;
  259. bool done = false;
  260. wdev_lock(wdev);
  261. nl80211_send_assoc_timeout(rdev, dev, addr, GFP_KERNEL);
  262. if (wdev->sme_state == CFG80211_SME_CONNECTING)
  263. __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
  264. WLAN_STATUS_UNSPECIFIED_FAILURE,
  265. false, NULL);
  266. for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
  267. if (wdev->auth_bsses[i] &&
  268. memcmp(wdev->auth_bsses[i]->pub.bssid,
  269. addr, ETH_ALEN) == 0) {
  270. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  271. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  272. wdev->auth_bsses[i] = NULL;
  273. done = true;
  274. break;
  275. }
  276. }
  277. WARN_ON(!done);
  278. wdev_unlock(wdev);
  279. }
  280. EXPORT_SYMBOL(cfg80211_send_assoc_timeout);
  281. void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr,
  282. enum nl80211_key_type key_type, int key_id,
  283. const u8 *tsc, gfp_t gfp)
  284. {
  285. struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
  286. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  287. #ifdef CONFIG_CFG80211_WEXT
  288. union iwreq_data wrqu;
  289. char *buf = kmalloc(128, gfp);
  290. if (buf) {
  291. sprintf(buf, "MLME-MICHAELMICFAILURE.indication("
  292. "keyid=%d %scast addr=%pM)", key_id,
  293. key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni",
  294. addr);
  295. memset(&wrqu, 0, sizeof(wrqu));
  296. wrqu.data.length = strlen(buf);
  297. wireless_send_event(dev, IWEVCUSTOM, &wrqu, buf);
  298. kfree(buf);
  299. }
  300. #endif
  301. nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp);
  302. }
  303. EXPORT_SYMBOL(cfg80211_michael_mic_failure);
  304. /* some MLME handling for userspace SME */
  305. int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
  306. struct net_device *dev,
  307. struct ieee80211_channel *chan,
  308. enum nl80211_auth_type auth_type,
  309. const u8 *bssid,
  310. const u8 *ssid, int ssid_len,
  311. const u8 *ie, int ie_len,
  312. const u8 *key, int key_len, int key_idx)
  313. {
  314. struct wireless_dev *wdev = dev->ieee80211_ptr;
  315. struct cfg80211_auth_request req;
  316. struct cfg80211_internal_bss *bss;
  317. int i, err, slot = -1, nfree = 0;
  318. ASSERT_WDEV_LOCK(wdev);
  319. if (auth_type == NL80211_AUTHTYPE_SHARED_KEY)
  320. if (!key || !key_len || key_idx < 0 || key_idx > 4)
  321. return -EINVAL;
  322. if (wdev->current_bss &&
  323. memcmp(bssid, wdev->current_bss->pub.bssid, ETH_ALEN) == 0)
  324. return -EALREADY;
  325. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  326. if (wdev->authtry_bsses[i] &&
  327. memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid,
  328. ETH_ALEN) == 0)
  329. return -EALREADY;
  330. if (wdev->auth_bsses[i] &&
  331. memcmp(bssid, wdev->auth_bsses[i]->pub.bssid,
  332. ETH_ALEN) == 0)
  333. return -EALREADY;
  334. }
  335. memset(&req, 0, sizeof(req));
  336. req.ie = ie;
  337. req.ie_len = ie_len;
  338. req.auth_type = auth_type;
  339. req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
  340. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  341. req.key = key;
  342. req.key_len = key_len;
  343. req.key_idx = key_idx;
  344. if (!req.bss)
  345. return -ENOENT;
  346. bss = bss_from_pub(req.bss);
  347. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  348. if (!wdev->auth_bsses[i] && !wdev->authtry_bsses[i]) {
  349. slot = i;
  350. nfree++;
  351. }
  352. }
  353. /* we need one free slot for disassoc and one for this auth */
  354. if (nfree < 2) {
  355. err = -ENOSPC;
  356. goto out;
  357. }
  358. wdev->authtry_bsses[slot] = bss;
  359. cfg80211_hold_bss(bss);
  360. err = rdev->ops->auth(&rdev->wiphy, dev, &req);
  361. if (err) {
  362. wdev->authtry_bsses[slot] = NULL;
  363. cfg80211_unhold_bss(bss);
  364. }
  365. out:
  366. if (err)
  367. cfg80211_put_bss(req.bss);
  368. return err;
  369. }
  370. int cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
  371. struct net_device *dev, struct ieee80211_channel *chan,
  372. enum nl80211_auth_type auth_type, const u8 *bssid,
  373. const u8 *ssid, int ssid_len,
  374. const u8 *ie, int ie_len,
  375. const u8 *key, int key_len, int key_idx)
  376. {
  377. int err;
  378. wdev_lock(dev->ieee80211_ptr);
  379. err = __cfg80211_mlme_auth(rdev, dev, chan, auth_type, bssid,
  380. ssid, ssid_len, ie, ie_len,
  381. key, key_len, key_idx);
  382. wdev_unlock(dev->ieee80211_ptr);
  383. return err;
  384. }
  385. int __cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
  386. struct net_device *dev,
  387. struct ieee80211_channel *chan,
  388. const u8 *bssid, const u8 *prev_bssid,
  389. const u8 *ssid, int ssid_len,
  390. const u8 *ie, int ie_len, bool use_mfp,
  391. struct cfg80211_crypto_settings *crypt)
  392. {
  393. struct wireless_dev *wdev = dev->ieee80211_ptr;
  394. struct cfg80211_assoc_request req;
  395. struct cfg80211_internal_bss *bss;
  396. int i, err, slot = -1;
  397. bool was_connected = false;
  398. ASSERT_WDEV_LOCK(wdev);
  399. memset(&req, 0, sizeof(req));
  400. if (wdev->current_bss && prev_bssid &&
  401. memcmp(wdev->current_bss->pub.bssid, prev_bssid, ETH_ALEN) == 0) {
  402. /*
  403. * Trying to reassociate: Allow this to proceed and let the old
  404. * association to be dropped when the new one is completed.
  405. */
  406. if (wdev->sme_state == CFG80211_SME_CONNECTED) {
  407. was_connected = true;
  408. wdev->sme_state = CFG80211_SME_CONNECTING;
  409. }
  410. } else if (wdev->current_bss)
  411. return -EALREADY;
  412. req.ie = ie;
  413. req.ie_len = ie_len;
  414. memcpy(&req.crypto, crypt, sizeof(req.crypto));
  415. req.use_mfp = use_mfp;
  416. req.prev_bssid = prev_bssid;
  417. req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
  418. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  419. if (!req.bss) {
  420. if (was_connected)
  421. wdev->sme_state = CFG80211_SME_CONNECTED;
  422. return -ENOENT;
  423. }
  424. bss = bss_from_pub(req.bss);
  425. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  426. if (bss == wdev->auth_bsses[i]) {
  427. slot = i;
  428. break;
  429. }
  430. }
  431. if (slot < 0) {
  432. err = -ENOTCONN;
  433. goto out;
  434. }
  435. err = rdev->ops->assoc(&rdev->wiphy, dev, &req);
  436. out:
  437. if (err && was_connected)
  438. wdev->sme_state = CFG80211_SME_CONNECTED;
  439. /* still a reference in wdev->auth_bsses[slot] */
  440. cfg80211_put_bss(req.bss);
  441. return err;
  442. }
  443. int cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
  444. struct net_device *dev,
  445. struct ieee80211_channel *chan,
  446. const u8 *bssid, const u8 *prev_bssid,
  447. const u8 *ssid, int ssid_len,
  448. const u8 *ie, int ie_len, bool use_mfp,
  449. struct cfg80211_crypto_settings *crypt)
  450. {
  451. struct wireless_dev *wdev = dev->ieee80211_ptr;
  452. int err;
  453. wdev_lock(wdev);
  454. err = __cfg80211_mlme_assoc(rdev, dev, chan, bssid, prev_bssid,
  455. ssid, ssid_len, ie, ie_len, use_mfp, crypt);
  456. wdev_unlock(wdev);
  457. return err;
  458. }
  459. int __cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
  460. struct net_device *dev, const u8 *bssid,
  461. const u8 *ie, int ie_len, u16 reason)
  462. {
  463. struct wireless_dev *wdev = dev->ieee80211_ptr;
  464. struct cfg80211_deauth_request req;
  465. int i;
  466. ASSERT_WDEV_LOCK(wdev);
  467. memset(&req, 0, sizeof(req));
  468. req.reason_code = reason;
  469. req.ie = ie;
  470. req.ie_len = ie_len;
  471. if (wdev->current_bss &&
  472. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  473. req.bss = &wdev->current_bss->pub;
  474. } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
  475. if (wdev->auth_bsses[i] &&
  476. memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
  477. req.bss = &wdev->auth_bsses[i]->pub;
  478. break;
  479. }
  480. if (wdev->authtry_bsses[i] &&
  481. memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
  482. req.bss = &wdev->authtry_bsses[i]->pub;
  483. break;
  484. }
  485. }
  486. if (!req.bss)
  487. return -ENOTCONN;
  488. return rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  489. }
  490. int cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
  491. struct net_device *dev, const u8 *bssid,
  492. const u8 *ie, int ie_len, u16 reason)
  493. {
  494. struct wireless_dev *wdev = dev->ieee80211_ptr;
  495. int err;
  496. wdev_lock(wdev);
  497. err = __cfg80211_mlme_deauth(rdev, dev, bssid, ie, ie_len, reason);
  498. wdev_unlock(wdev);
  499. return err;
  500. }
  501. static int __cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
  502. struct net_device *dev, const u8 *bssid,
  503. const u8 *ie, int ie_len, u16 reason)
  504. {
  505. struct wireless_dev *wdev = dev->ieee80211_ptr;
  506. struct cfg80211_disassoc_request req;
  507. ASSERT_WDEV_LOCK(wdev);
  508. if (wdev->sme_state != CFG80211_SME_CONNECTED)
  509. return -ENOTCONN;
  510. if (WARN_ON(!wdev->current_bss))
  511. return -ENOTCONN;
  512. memset(&req, 0, sizeof(req));
  513. req.reason_code = reason;
  514. req.ie = ie;
  515. req.ie_len = ie_len;
  516. if (memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0)
  517. req.bss = &wdev->current_bss->pub;
  518. else
  519. return -ENOTCONN;
  520. return rdev->ops->disassoc(&rdev->wiphy, dev, &req, wdev);
  521. }
  522. int cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
  523. struct net_device *dev, const u8 *bssid,
  524. const u8 *ie, int ie_len, u16 reason)
  525. {
  526. struct wireless_dev *wdev = dev->ieee80211_ptr;
  527. int err;
  528. wdev_lock(wdev);
  529. err = __cfg80211_mlme_disassoc(rdev, dev, bssid, ie, ie_len, reason);
  530. wdev_unlock(wdev);
  531. return err;
  532. }
  533. void cfg80211_mlme_down(struct cfg80211_registered_device *rdev,
  534. struct net_device *dev)
  535. {
  536. struct wireless_dev *wdev = dev->ieee80211_ptr;
  537. struct cfg80211_deauth_request req;
  538. int i;
  539. ASSERT_WDEV_LOCK(wdev);
  540. if (!rdev->ops->deauth)
  541. return;
  542. memset(&req, 0, sizeof(req));
  543. req.reason_code = WLAN_REASON_DEAUTH_LEAVING;
  544. req.ie = NULL;
  545. req.ie_len = 0;
  546. if (wdev->current_bss) {
  547. req.bss = &wdev->current_bss->pub;
  548. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  549. if (wdev->current_bss) {
  550. cfg80211_unhold_bss(wdev->current_bss);
  551. cfg80211_put_bss(&wdev->current_bss->pub);
  552. wdev->current_bss = NULL;
  553. }
  554. }
  555. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  556. if (wdev->auth_bsses[i]) {
  557. req.bss = &wdev->auth_bsses[i]->pub;
  558. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  559. if (wdev->auth_bsses[i]) {
  560. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  561. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  562. wdev->auth_bsses[i] = NULL;
  563. }
  564. }
  565. if (wdev->authtry_bsses[i]) {
  566. req.bss = &wdev->authtry_bsses[i]->pub;
  567. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  568. if (wdev->authtry_bsses[i]) {
  569. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  570. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  571. wdev->authtry_bsses[i] = NULL;
  572. }
  573. }
  574. }
  575. }