sme.c 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839
  1. /*
  2. * SME code for cfg80211's connect emulation.
  3. *
  4. * Copyright 2009 Johannes Berg <johannes@sipsolutions.net>
  5. * Copyright (C) 2009 Intel Corporation. All rights reserved.
  6. */
  7. #include <linux/etherdevice.h>
  8. #include <linux/if_arp.h>
  9. #include <linux/workqueue.h>
  10. #include <linux/wireless.h>
  11. #include <net/iw_handler.h>
  12. #include <net/cfg80211.h>
  13. #include <net/rtnetlink.h>
  14. #include "nl80211.h"
  15. struct cfg80211_conn {
  16. struct cfg80211_connect_params params;
  17. /* these are sub-states of the _CONNECTING sme_state */
  18. enum {
  19. CFG80211_CONN_IDLE,
  20. CFG80211_CONN_SCANNING,
  21. CFG80211_CONN_SCAN_AGAIN,
  22. CFG80211_CONN_AUTHENTICATE_NEXT,
  23. CFG80211_CONN_AUTHENTICATING,
  24. CFG80211_CONN_ASSOCIATE_NEXT,
  25. CFG80211_CONN_ASSOCIATING,
  26. } state;
  27. u8 bssid[ETH_ALEN];
  28. u8 *ie;
  29. size_t ie_len;
  30. bool auto_auth;
  31. };
  32. static int cfg80211_conn_scan(struct wireless_dev *wdev)
  33. {
  34. struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  35. struct cfg80211_scan_request *request;
  36. int n_channels, err;
  37. ASSERT_RTNL();
  38. ASSERT_RDEV_LOCK(rdev);
  39. ASSERT_WDEV_LOCK(wdev);
  40. if (rdev->scan_req)
  41. return -EBUSY;
  42. if (wdev->conn->params.channel) {
  43. n_channels = 1;
  44. } else {
  45. enum ieee80211_band band;
  46. n_channels = 0;
  47. for (band = 0; band < IEEE80211_NUM_BANDS; band++) {
  48. if (!wdev->wiphy->bands[band])
  49. continue;
  50. n_channels += wdev->wiphy->bands[band]->n_channels;
  51. }
  52. }
  53. request = kzalloc(sizeof(*request) + sizeof(request->ssids[0]) +
  54. sizeof(request->channels[0]) * n_channels,
  55. GFP_KERNEL);
  56. if (!request)
  57. return -ENOMEM;
  58. request->channels = (void *)((char *)request + sizeof(*request));
  59. if (wdev->conn->params.channel)
  60. request->channels[0] = wdev->conn->params.channel;
  61. else {
  62. int i = 0, j;
  63. enum ieee80211_band band;
  64. for (band = 0; band < IEEE80211_NUM_BANDS; band++) {
  65. if (!wdev->wiphy->bands[band])
  66. continue;
  67. for (j = 0; j < wdev->wiphy->bands[band]->n_channels;
  68. i++, j++)
  69. request->channels[i] =
  70. &wdev->wiphy->bands[band]->channels[j];
  71. }
  72. }
  73. request->n_channels = n_channels;
  74. request->ssids = (void *)(request->channels + n_channels);
  75. request->n_ssids = 1;
  76. memcpy(request->ssids[0].ssid, wdev->conn->params.ssid,
  77. wdev->conn->params.ssid_len);
  78. request->ssids[0].ssid_len = wdev->conn->params.ssid_len;
  79. request->dev = wdev->netdev;
  80. request->wiphy = &rdev->wiphy;
  81. rdev->scan_req = request;
  82. err = rdev->ops->scan(wdev->wiphy, wdev->netdev, request);
  83. if (!err) {
  84. wdev->conn->state = CFG80211_CONN_SCANNING;
  85. nl80211_send_scan_start(rdev, wdev->netdev);
  86. dev_hold(wdev->netdev);
  87. } else {
  88. rdev->scan_req = NULL;
  89. kfree(request);
  90. }
  91. return err;
  92. }
  93. static int cfg80211_conn_do_work(struct wireless_dev *wdev)
  94. {
  95. struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  96. struct cfg80211_connect_params *params;
  97. int err;
  98. ASSERT_WDEV_LOCK(wdev);
  99. if (!wdev->conn)
  100. return 0;
  101. params = &wdev->conn->params;
  102. switch (wdev->conn->state) {
  103. case CFG80211_CONN_SCAN_AGAIN:
  104. return cfg80211_conn_scan(wdev);
  105. case CFG80211_CONN_AUTHENTICATE_NEXT:
  106. BUG_ON(!rdev->ops->auth);
  107. wdev->conn->state = CFG80211_CONN_AUTHENTICATING;
  108. return __cfg80211_mlme_auth(rdev, wdev->netdev,
  109. params->channel, params->auth_type,
  110. params->bssid,
  111. params->ssid, params->ssid_len,
  112. NULL, 0,
  113. params->key, params->key_len,
  114. params->key_idx);
  115. case CFG80211_CONN_ASSOCIATE_NEXT:
  116. BUG_ON(!rdev->ops->assoc);
  117. wdev->conn->state = CFG80211_CONN_ASSOCIATING;
  118. /*
  119. * We could, later, implement roaming here and then actually
  120. * set prev_bssid to non-NULL. But then we need to be aware
  121. * that some APs don't like that -- so we'd need to retry
  122. * the association.
  123. */
  124. err = __cfg80211_mlme_assoc(rdev, wdev->netdev,
  125. params->channel, params->bssid,
  126. NULL,
  127. params->ssid, params->ssid_len,
  128. params->ie, params->ie_len,
  129. false, &params->crypto);
  130. if (err)
  131. __cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
  132. NULL, 0,
  133. WLAN_REASON_DEAUTH_LEAVING);
  134. return err;
  135. default:
  136. return 0;
  137. }
  138. }
  139. void cfg80211_conn_work(struct work_struct *work)
  140. {
  141. struct cfg80211_registered_device *rdev =
  142. container_of(work, struct cfg80211_registered_device, conn_work);
  143. struct wireless_dev *wdev;
  144. rtnl_lock();
  145. cfg80211_lock_rdev(rdev);
  146. mutex_lock(&rdev->devlist_mtx);
  147. list_for_each_entry(wdev, &rdev->netdev_list, list) {
  148. wdev_lock(wdev);
  149. if (!netif_running(wdev->netdev)) {
  150. wdev_unlock(wdev);
  151. continue;
  152. }
  153. if (wdev->sme_state != CFG80211_SME_CONNECTING) {
  154. wdev_unlock(wdev);
  155. continue;
  156. }
  157. if (cfg80211_conn_do_work(wdev))
  158. __cfg80211_connect_result(
  159. wdev->netdev,
  160. wdev->conn->params.bssid,
  161. NULL, 0, NULL, 0,
  162. WLAN_STATUS_UNSPECIFIED_FAILURE,
  163. false);
  164. wdev_unlock(wdev);
  165. }
  166. mutex_unlock(&rdev->devlist_mtx);
  167. cfg80211_unlock_rdev(rdev);
  168. rtnl_unlock();
  169. }
  170. static bool cfg80211_get_conn_bss(struct wireless_dev *wdev)
  171. {
  172. struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  173. struct cfg80211_bss *bss;
  174. u16 capa = WLAN_CAPABILITY_ESS;
  175. ASSERT_WDEV_LOCK(wdev);
  176. if (wdev->conn->params.privacy)
  177. capa |= WLAN_CAPABILITY_PRIVACY;
  178. bss = cfg80211_get_bss(wdev->wiphy, NULL, wdev->conn->params.bssid,
  179. wdev->conn->params.ssid,
  180. wdev->conn->params.ssid_len,
  181. WLAN_CAPABILITY_ESS | WLAN_CAPABILITY_PRIVACY,
  182. capa);
  183. if (!bss)
  184. return false;
  185. memcpy(wdev->conn->bssid, bss->bssid, ETH_ALEN);
  186. wdev->conn->params.bssid = wdev->conn->bssid;
  187. wdev->conn->params.channel = bss->channel;
  188. wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
  189. schedule_work(&rdev->conn_work);
  190. cfg80211_put_bss(bss);
  191. return true;
  192. }
  193. static void __cfg80211_sme_scan_done(struct net_device *dev)
  194. {
  195. struct wireless_dev *wdev = dev->ieee80211_ptr;
  196. struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  197. ASSERT_WDEV_LOCK(wdev);
  198. if (wdev->sme_state != CFG80211_SME_CONNECTING)
  199. return;
  200. if (!wdev->conn)
  201. return;
  202. if (wdev->conn->state != CFG80211_CONN_SCANNING &&
  203. wdev->conn->state != CFG80211_CONN_SCAN_AGAIN)
  204. return;
  205. if (!cfg80211_get_conn_bss(wdev)) {
  206. /* not found */
  207. if (wdev->conn->state == CFG80211_CONN_SCAN_AGAIN)
  208. schedule_work(&rdev->conn_work);
  209. else
  210. __cfg80211_connect_result(
  211. wdev->netdev,
  212. wdev->conn->params.bssid,
  213. NULL, 0, NULL, 0,
  214. WLAN_STATUS_UNSPECIFIED_FAILURE,
  215. false);
  216. }
  217. }
  218. void cfg80211_sme_scan_done(struct net_device *dev)
  219. {
  220. struct wireless_dev *wdev = dev->ieee80211_ptr;
  221. wdev_lock(wdev);
  222. __cfg80211_sme_scan_done(dev);
  223. wdev_unlock(wdev);
  224. }
  225. void cfg80211_sme_rx_auth(struct net_device *dev,
  226. const u8 *buf, size_t len)
  227. {
  228. struct wireless_dev *wdev = dev->ieee80211_ptr;
  229. struct wiphy *wiphy = wdev->wiphy;
  230. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  231. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  232. u16 status_code = le16_to_cpu(mgmt->u.auth.status_code);
  233. ASSERT_WDEV_LOCK(wdev);
  234. /* should only RX auth frames when connecting */
  235. if (wdev->sme_state != CFG80211_SME_CONNECTING)
  236. return;
  237. if (WARN_ON(!wdev->conn))
  238. return;
  239. if (status_code == WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG &&
  240. wdev->conn->auto_auth &&
  241. wdev->conn->params.auth_type != NL80211_AUTHTYPE_NETWORK_EAP) {
  242. /* select automatically between only open, shared, leap */
  243. switch (wdev->conn->params.auth_type) {
  244. case NL80211_AUTHTYPE_OPEN_SYSTEM:
  245. if (wdev->connect_keys)
  246. wdev->conn->params.auth_type =
  247. NL80211_AUTHTYPE_SHARED_KEY;
  248. else
  249. wdev->conn->params.auth_type =
  250. NL80211_AUTHTYPE_NETWORK_EAP;
  251. break;
  252. case NL80211_AUTHTYPE_SHARED_KEY:
  253. wdev->conn->params.auth_type =
  254. NL80211_AUTHTYPE_NETWORK_EAP;
  255. break;
  256. default:
  257. /* huh? */
  258. wdev->conn->params.auth_type =
  259. NL80211_AUTHTYPE_OPEN_SYSTEM;
  260. break;
  261. }
  262. wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
  263. schedule_work(&rdev->conn_work);
  264. } else if (status_code != WLAN_STATUS_SUCCESS) {
  265. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
  266. status_code, false);
  267. } else if (wdev->sme_state == CFG80211_SME_CONNECTING &&
  268. wdev->conn->state == CFG80211_CONN_AUTHENTICATING) {
  269. wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
  270. schedule_work(&rdev->conn_work);
  271. }
  272. }
  273. void __cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
  274. const u8 *req_ie, size_t req_ie_len,
  275. const u8 *resp_ie, size_t resp_ie_len,
  276. u16 status, bool wextev)
  277. {
  278. struct wireless_dev *wdev = dev->ieee80211_ptr;
  279. struct cfg80211_bss *bss;
  280. #ifdef CONFIG_WIRELESS_EXT
  281. union iwreq_data wrqu;
  282. #endif
  283. ASSERT_WDEV_LOCK(wdev);
  284. if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
  285. return;
  286. if (wdev->sme_state == CFG80211_SME_CONNECTED)
  287. nl80211_send_roamed(wiphy_to_dev(wdev->wiphy), dev,
  288. bssid, req_ie, req_ie_len,
  289. resp_ie, resp_ie_len, GFP_KERNEL);
  290. else
  291. nl80211_send_connect_result(wiphy_to_dev(wdev->wiphy), dev,
  292. bssid, req_ie, req_ie_len,
  293. resp_ie, resp_ie_len,
  294. status, GFP_KERNEL);
  295. #ifdef CONFIG_WIRELESS_EXT
  296. if (wextev) {
  297. if (req_ie && status == WLAN_STATUS_SUCCESS) {
  298. memset(&wrqu, 0, sizeof(wrqu));
  299. wrqu.data.length = req_ie_len;
  300. wireless_send_event(dev, IWEVASSOCREQIE, &wrqu, req_ie);
  301. }
  302. if (resp_ie && status == WLAN_STATUS_SUCCESS) {
  303. memset(&wrqu, 0, sizeof(wrqu));
  304. wrqu.data.length = resp_ie_len;
  305. wireless_send_event(dev, IWEVASSOCRESPIE, &wrqu, resp_ie);
  306. }
  307. memset(&wrqu, 0, sizeof(wrqu));
  308. wrqu.ap_addr.sa_family = ARPHRD_ETHER;
  309. if (bssid && status == WLAN_STATUS_SUCCESS)
  310. memcpy(wrqu.ap_addr.sa_data, bssid, ETH_ALEN);
  311. wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
  312. }
  313. #endif
  314. if (status == WLAN_STATUS_SUCCESS &&
  315. wdev->sme_state == CFG80211_SME_IDLE)
  316. goto success;
  317. if (wdev->sme_state != CFG80211_SME_CONNECTING)
  318. return;
  319. if (wdev->current_bss) {
  320. cfg80211_unhold_bss(wdev->current_bss);
  321. cfg80211_put_bss(&wdev->current_bss->pub);
  322. wdev->current_bss = NULL;
  323. }
  324. if (wdev->conn)
  325. wdev->conn->state = CFG80211_CONN_IDLE;
  326. if (status != WLAN_STATUS_SUCCESS) {
  327. wdev->sme_state = CFG80211_SME_IDLE;
  328. kfree(wdev->conn);
  329. wdev->conn = NULL;
  330. kfree(wdev->connect_keys);
  331. wdev->connect_keys = NULL;
  332. return;
  333. }
  334. bss = cfg80211_get_bss(wdev->wiphy, NULL, bssid,
  335. wdev->ssid, wdev->ssid_len,
  336. WLAN_CAPABILITY_ESS,
  337. WLAN_CAPABILITY_ESS);
  338. if (WARN_ON(!bss))
  339. return;
  340. cfg80211_hold_bss(bss_from_pub(bss));
  341. wdev->current_bss = bss_from_pub(bss);
  342. success:
  343. wdev->sme_state = CFG80211_SME_CONNECTED;
  344. cfg80211_upload_connect_keys(wdev);
  345. }
  346. void cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
  347. const u8 *req_ie, size_t req_ie_len,
  348. const u8 *resp_ie, size_t resp_ie_len,
  349. u16 status, gfp_t gfp)
  350. {
  351. struct wireless_dev *wdev = dev->ieee80211_ptr;
  352. struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  353. struct cfg80211_event *ev;
  354. unsigned long flags;
  355. ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
  356. if (!ev)
  357. return;
  358. ev->type = EVENT_CONNECT_RESULT;
  359. memcpy(ev->cr.bssid, bssid, ETH_ALEN);
  360. ev->cr.req_ie = ((u8 *)ev) + sizeof(*ev);
  361. ev->cr.req_ie_len = req_ie_len;
  362. memcpy((void *)ev->cr.req_ie, req_ie, req_ie_len);
  363. ev->cr.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
  364. ev->cr.resp_ie_len = resp_ie_len;
  365. memcpy((void *)ev->cr.resp_ie, resp_ie, resp_ie_len);
  366. ev->cr.status = status;
  367. spin_lock_irqsave(&wdev->event_lock, flags);
  368. list_add_tail(&ev->list, &wdev->event_list);
  369. spin_unlock_irqrestore(&wdev->event_lock, flags);
  370. schedule_work(&rdev->event_work);
  371. }
  372. EXPORT_SYMBOL(cfg80211_connect_result);
  373. void __cfg80211_roamed(struct wireless_dev *wdev, const u8 *bssid,
  374. const u8 *req_ie, size_t req_ie_len,
  375. const u8 *resp_ie, size_t resp_ie_len)
  376. {
  377. struct cfg80211_bss *bss;
  378. #ifdef CONFIG_WIRELESS_EXT
  379. union iwreq_data wrqu;
  380. #endif
  381. ASSERT_WDEV_LOCK(wdev);
  382. if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
  383. return;
  384. if (WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED))
  385. return;
  386. /* internal error -- how did we get to CONNECTED w/o BSS? */
  387. if (WARN_ON(!wdev->current_bss)) {
  388. return;
  389. }
  390. cfg80211_unhold_bss(wdev->current_bss);
  391. cfg80211_put_bss(&wdev->current_bss->pub);
  392. wdev->current_bss = NULL;
  393. bss = cfg80211_get_bss(wdev->wiphy, NULL, bssid,
  394. wdev->ssid, wdev->ssid_len,
  395. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  396. if (WARN_ON(!bss))
  397. return;
  398. cfg80211_hold_bss(bss_from_pub(bss));
  399. wdev->current_bss = bss_from_pub(bss);
  400. nl80211_send_roamed(wiphy_to_dev(wdev->wiphy), wdev->netdev, bssid,
  401. req_ie, req_ie_len, resp_ie, resp_ie_len,
  402. GFP_KERNEL);
  403. #ifdef CONFIG_WIRELESS_EXT
  404. if (req_ie) {
  405. memset(&wrqu, 0, sizeof(wrqu));
  406. wrqu.data.length = req_ie_len;
  407. wireless_send_event(wdev->netdev, IWEVASSOCREQIE,
  408. &wrqu, req_ie);
  409. }
  410. if (resp_ie) {
  411. memset(&wrqu, 0, sizeof(wrqu));
  412. wrqu.data.length = resp_ie_len;
  413. wireless_send_event(wdev->netdev, IWEVASSOCRESPIE,
  414. &wrqu, resp_ie);
  415. }
  416. memset(&wrqu, 0, sizeof(wrqu));
  417. wrqu.ap_addr.sa_family = ARPHRD_ETHER;
  418. memcpy(wrqu.ap_addr.sa_data, bssid, ETH_ALEN);
  419. wireless_send_event(wdev->netdev, SIOCGIWAP, &wrqu, NULL);
  420. #endif
  421. }
  422. void cfg80211_roamed(struct net_device *dev, const u8 *bssid,
  423. const u8 *req_ie, size_t req_ie_len,
  424. const u8 *resp_ie, size_t resp_ie_len, gfp_t gfp)
  425. {
  426. struct wireless_dev *wdev = dev->ieee80211_ptr;
  427. struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  428. struct cfg80211_event *ev;
  429. unsigned long flags;
  430. ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
  431. if (!ev)
  432. return;
  433. ev->type = EVENT_ROAMED;
  434. memcpy(ev->rm.bssid, bssid, ETH_ALEN);
  435. ev->rm.req_ie = ((u8 *)ev) + sizeof(*ev);
  436. ev->rm.req_ie_len = req_ie_len;
  437. memcpy((void *)ev->rm.req_ie, req_ie, req_ie_len);
  438. ev->rm.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
  439. ev->rm.resp_ie_len = resp_ie_len;
  440. memcpy((void *)ev->rm.resp_ie, resp_ie, resp_ie_len);
  441. spin_lock_irqsave(&wdev->event_lock, flags);
  442. list_add_tail(&ev->list, &wdev->event_list);
  443. spin_unlock_irqrestore(&wdev->event_lock, flags);
  444. schedule_work(&rdev->event_work);
  445. }
  446. EXPORT_SYMBOL(cfg80211_roamed);
  447. void __cfg80211_disconnected(struct net_device *dev, const u8 *ie,
  448. size_t ie_len, u16 reason, bool from_ap)
  449. {
  450. struct wireless_dev *wdev = dev->ieee80211_ptr;
  451. struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  452. int i;
  453. #ifdef CONFIG_WIRELESS_EXT
  454. union iwreq_data wrqu;
  455. #endif
  456. ASSERT_WDEV_LOCK(wdev);
  457. if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
  458. return;
  459. if (WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED))
  460. return;
  461. if (wdev->current_bss) {
  462. cfg80211_unhold_bss(wdev->current_bss);
  463. cfg80211_put_bss(&wdev->current_bss->pub);
  464. }
  465. wdev->current_bss = NULL;
  466. wdev->sme_state = CFG80211_SME_IDLE;
  467. if (wdev->conn) {
  468. kfree(wdev->conn->ie);
  469. wdev->conn->ie = NULL;
  470. kfree(wdev->conn);
  471. wdev->conn = NULL;
  472. }
  473. nl80211_send_disconnected(rdev, dev, reason, ie, ie_len, from_ap);
  474. /*
  475. * Delete all the keys ... pairwise keys can't really
  476. * exist any more anyway, but default keys might.
  477. */
  478. if (rdev->ops->del_key)
  479. for (i = 0; i < 6; i++)
  480. rdev->ops->del_key(wdev->wiphy, dev, i, NULL);
  481. #ifdef CONFIG_WIRELESS_EXT
  482. memset(&wrqu, 0, sizeof(wrqu));
  483. wrqu.ap_addr.sa_family = ARPHRD_ETHER;
  484. wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
  485. #endif
  486. }
  487. void cfg80211_disconnected(struct net_device *dev, u16 reason,
  488. u8 *ie, size_t ie_len, gfp_t gfp)
  489. {
  490. struct wireless_dev *wdev = dev->ieee80211_ptr;
  491. struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  492. struct cfg80211_event *ev;
  493. unsigned long flags;
  494. ev = kzalloc(sizeof(*ev) + ie_len, gfp);
  495. if (!ev)
  496. return;
  497. ev->type = EVENT_DISCONNECTED;
  498. ev->dc.ie = ((u8 *)ev) + sizeof(*ev);
  499. ev->dc.ie_len = ie_len;
  500. memcpy((void *)ev->dc.ie, ie, ie_len);
  501. ev->dc.reason = reason;
  502. spin_lock_irqsave(&wdev->event_lock, flags);
  503. list_add_tail(&ev->list, &wdev->event_list);
  504. spin_unlock_irqrestore(&wdev->event_lock, flags);
  505. schedule_work(&rdev->event_work);
  506. }
  507. EXPORT_SYMBOL(cfg80211_disconnected);
  508. int __cfg80211_connect(struct cfg80211_registered_device *rdev,
  509. struct net_device *dev,
  510. struct cfg80211_connect_params *connect,
  511. struct cfg80211_cached_keys *connkeys)
  512. {
  513. struct wireless_dev *wdev = dev->ieee80211_ptr;
  514. int err;
  515. ASSERT_WDEV_LOCK(wdev);
  516. if (wdev->sme_state != CFG80211_SME_IDLE)
  517. return -EALREADY;
  518. if (WARN_ON(wdev->connect_keys)) {
  519. kfree(wdev->connect_keys);
  520. wdev->connect_keys = NULL;
  521. }
  522. if (connkeys && connkeys->def >= 0) {
  523. int idx;
  524. idx = connkeys->def;
  525. /* If given a WEP key we may need it for shared key auth */
  526. if (connkeys->params[idx].cipher == WLAN_CIPHER_SUITE_WEP40 ||
  527. connkeys->params[idx].cipher == WLAN_CIPHER_SUITE_WEP104) {
  528. connect->key_idx = idx;
  529. connect->key = connkeys->params[idx].key;
  530. connect->key_len = connkeys->params[idx].key_len;
  531. }
  532. }
  533. if (!rdev->ops->connect) {
  534. if (!rdev->ops->auth || !rdev->ops->assoc)
  535. return -EOPNOTSUPP;
  536. if (WARN_ON(wdev->conn))
  537. return -EINPROGRESS;
  538. wdev->conn = kzalloc(sizeof(*wdev->conn), GFP_KERNEL);
  539. if (!wdev->conn)
  540. return -ENOMEM;
  541. /*
  542. * Copy all parameters, and treat explicitly IEs, BSSID, SSID.
  543. */
  544. memcpy(&wdev->conn->params, connect, sizeof(*connect));
  545. if (connect->bssid) {
  546. wdev->conn->params.bssid = wdev->conn->bssid;
  547. memcpy(wdev->conn->bssid, connect->bssid, ETH_ALEN);
  548. }
  549. if (connect->ie) {
  550. wdev->conn->ie = kmemdup(connect->ie, connect->ie_len,
  551. GFP_KERNEL);
  552. wdev->conn->params.ie = wdev->conn->ie;
  553. if (!wdev->conn->ie) {
  554. kfree(wdev->conn);
  555. wdev->conn = NULL;
  556. return -ENOMEM;
  557. }
  558. }
  559. if (connect->auth_type == NL80211_AUTHTYPE_AUTOMATIC) {
  560. wdev->conn->auto_auth = true;
  561. /* start with open system ... should mostly work */
  562. wdev->conn->params.auth_type =
  563. NL80211_AUTHTYPE_OPEN_SYSTEM;
  564. } else {
  565. wdev->conn->auto_auth = false;
  566. }
  567. memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
  568. wdev->ssid_len = connect->ssid_len;
  569. wdev->conn->params.ssid = wdev->ssid;
  570. wdev->conn->params.ssid_len = connect->ssid_len;
  571. /* don't care about result -- but fill bssid & channel */
  572. if (!wdev->conn->params.bssid || !wdev->conn->params.channel)
  573. cfg80211_get_conn_bss(wdev);
  574. wdev->sme_state = CFG80211_SME_CONNECTING;
  575. wdev->connect_keys = connkeys;
  576. /* we're good if we have both BSSID and channel */
  577. if (wdev->conn->params.bssid && wdev->conn->params.channel) {
  578. wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
  579. err = cfg80211_conn_do_work(wdev);
  580. } else {
  581. /* otherwise we'll need to scan for the AP first */
  582. err = cfg80211_conn_scan(wdev);
  583. /*
  584. * If we can't scan right now, then we need to scan again
  585. * after the current scan finished, since the parameters
  586. * changed (unless we find a good AP anyway).
  587. */
  588. if (err == -EBUSY) {
  589. err = 0;
  590. wdev->conn->state = CFG80211_CONN_SCAN_AGAIN;
  591. }
  592. }
  593. if (err) {
  594. kfree(wdev->conn);
  595. wdev->conn = NULL;
  596. wdev->sme_state = CFG80211_SME_IDLE;
  597. wdev->connect_keys = NULL;
  598. }
  599. return err;
  600. } else {
  601. wdev->sme_state = CFG80211_SME_CONNECTING;
  602. wdev->connect_keys = connkeys;
  603. err = rdev->ops->connect(&rdev->wiphy, dev, connect);
  604. if (err) {
  605. wdev->connect_keys = NULL;
  606. wdev->sme_state = CFG80211_SME_IDLE;
  607. return err;
  608. }
  609. memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
  610. wdev->ssid_len = connect->ssid_len;
  611. return 0;
  612. }
  613. }
  614. int cfg80211_connect(struct cfg80211_registered_device *rdev,
  615. struct net_device *dev,
  616. struct cfg80211_connect_params *connect,
  617. struct cfg80211_cached_keys *connkeys)
  618. {
  619. int err;
  620. wdev_lock(dev->ieee80211_ptr);
  621. err = __cfg80211_connect(rdev, dev, connect, connkeys);
  622. wdev_unlock(dev->ieee80211_ptr);
  623. return err;
  624. }
  625. int __cfg80211_disconnect(struct cfg80211_registered_device *rdev,
  626. struct net_device *dev, u16 reason, bool wextev)
  627. {
  628. struct wireless_dev *wdev = dev->ieee80211_ptr;
  629. int err;
  630. ASSERT_WDEV_LOCK(wdev);
  631. if (wdev->sme_state == CFG80211_SME_IDLE)
  632. return -EINVAL;
  633. kfree(wdev->connect_keys);
  634. wdev->connect_keys = NULL;
  635. if (!rdev->ops->disconnect) {
  636. if (!rdev->ops->deauth)
  637. return -EOPNOTSUPP;
  638. /* was it connected by userspace SME? */
  639. if (!wdev->conn) {
  640. cfg80211_mlme_down(rdev, dev);
  641. return 0;
  642. }
  643. if (wdev->sme_state == CFG80211_SME_CONNECTING &&
  644. (wdev->conn->state == CFG80211_CONN_SCANNING ||
  645. wdev->conn->state == CFG80211_CONN_SCAN_AGAIN)) {
  646. wdev->sme_state = CFG80211_SME_IDLE;
  647. kfree(wdev->conn);
  648. wdev->conn = NULL;
  649. return 0;
  650. }
  651. /* wdev->conn->params.bssid must be set if > SCANNING */
  652. err = __cfg80211_mlme_deauth(rdev, dev,
  653. wdev->conn->params.bssid,
  654. NULL, 0, reason);
  655. if (err)
  656. return err;
  657. } else {
  658. err = rdev->ops->disconnect(&rdev->wiphy, dev, reason);
  659. if (err)
  660. return err;
  661. }
  662. if (wdev->sme_state == CFG80211_SME_CONNECTED)
  663. __cfg80211_disconnected(dev, NULL, 0, 0, false);
  664. else if (wdev->sme_state == CFG80211_SME_CONNECTING)
  665. __cfg80211_connect_result(dev, NULL, NULL, 0, NULL, 0,
  666. WLAN_STATUS_UNSPECIFIED_FAILURE,
  667. wextev);
  668. return 0;
  669. }
  670. int cfg80211_disconnect(struct cfg80211_registered_device *rdev,
  671. struct net_device *dev,
  672. u16 reason, bool wextev)
  673. {
  674. int err;
  675. wdev_lock(dev->ieee80211_ptr);
  676. err = __cfg80211_disconnect(rdev, dev, reason, wextev);
  677. wdev_unlock(dev->ieee80211_ptr);
  678. return err;
  679. }
  680. void cfg80211_sme_disassoc(struct net_device *dev, int idx)
  681. {
  682. struct wireless_dev *wdev = dev->ieee80211_ptr;
  683. struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  684. u8 bssid[ETH_ALEN];
  685. ASSERT_WDEV_LOCK(wdev);
  686. if (!wdev->conn)
  687. return;
  688. if (wdev->conn->state == CFG80211_CONN_IDLE)
  689. return;
  690. /*
  691. * Ok, so the association was made by this SME -- we don't
  692. * want it any more so deauthenticate too.
  693. */
  694. if (!wdev->auth_bsses[idx])
  695. return;
  696. memcpy(bssid, wdev->auth_bsses[idx]->pub.bssid, ETH_ALEN);
  697. if (__cfg80211_mlme_deauth(rdev, dev, bssid,
  698. NULL, 0, WLAN_REASON_DEAUTH_LEAVING)) {
  699. /* whatever -- assume gone anyway */
  700. cfg80211_unhold_bss(wdev->auth_bsses[idx]);
  701. cfg80211_put_bss(&wdev->auth_bsses[idx]->pub);
  702. wdev->auth_bsses[idx] = NULL;
  703. }
  704. }