mlme.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639
  1. /*
  2. * cfg80211 MLME SAP interface
  3. *
  4. * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
  5. */
  6. #include <linux/kernel.h>
  7. #include <linux/module.h>
  8. #include <linux/netdevice.h>
  9. #include <linux/nl80211.h>
  10. #include <linux/wireless.h>
  11. #include <net/cfg80211.h>
  12. #include <net/iw_handler.h>
  13. #include "core.h"
  14. #include "nl80211.h"
  15. void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len)
  16. {
  17. struct wireless_dev *wdev = dev->ieee80211_ptr;
  18. struct wiphy *wiphy = wdev->wiphy;
  19. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  20. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  21. u8 *bssid = mgmt->bssid;
  22. int i;
  23. u16 status = le16_to_cpu(mgmt->u.auth.status_code);
  24. bool done = false;
  25. wdev_lock(wdev);
  26. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  27. if (wdev->authtry_bsses[i] &&
  28. memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid,
  29. ETH_ALEN) == 0) {
  30. if (status == WLAN_STATUS_SUCCESS) {
  31. wdev->auth_bsses[i] = wdev->authtry_bsses[i];
  32. } else {
  33. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  34. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  35. }
  36. wdev->authtry_bsses[i] = NULL;
  37. done = true;
  38. break;
  39. }
  40. }
  41. WARN_ON(!done);
  42. nl80211_send_rx_auth(rdev, dev, buf, len, GFP_KERNEL);
  43. cfg80211_sme_rx_auth(dev, buf, len);
  44. wdev_unlock(wdev);
  45. }
  46. EXPORT_SYMBOL(cfg80211_send_rx_auth);
  47. void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len)
  48. {
  49. u16 status_code;
  50. struct wireless_dev *wdev = dev->ieee80211_ptr;
  51. struct wiphy *wiphy = wdev->wiphy;
  52. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  53. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  54. u8 *ie = mgmt->u.assoc_resp.variable;
  55. int i, ieoffs = offsetof(struct ieee80211_mgmt, u.assoc_resp.variable);
  56. struct cfg80211_internal_bss *bss = NULL;
  57. wdev_lock(wdev);
  58. status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code);
  59. nl80211_send_rx_assoc(rdev, dev, buf, len, GFP_KERNEL);
  60. if (status_code == WLAN_STATUS_SUCCESS) {
  61. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  62. if (!wdev->auth_bsses[i])
  63. continue;
  64. if (memcmp(wdev->auth_bsses[i]->pub.bssid, mgmt->bssid,
  65. ETH_ALEN) == 0) {
  66. bss = wdev->auth_bsses[i];
  67. wdev->auth_bsses[i] = NULL;
  68. /* additional reference to drop hold */
  69. cfg80211_ref_bss(bss);
  70. break;
  71. }
  72. }
  73. WARN_ON(!bss);
  74. }
  75. /* this consumes one bss reference (unless bss is NULL) */
  76. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs,
  77. status_code,
  78. status_code == WLAN_STATUS_SUCCESS,
  79. bss ? &bss->pub : NULL);
  80. /* drop hold now, and also reference acquired above */
  81. if (bss) {
  82. cfg80211_unhold_bss(bss);
  83. cfg80211_put_bss(&bss->pub);
  84. }
  85. wdev_unlock(wdev);
  86. }
  87. EXPORT_SYMBOL(cfg80211_send_rx_assoc);
  88. static void __cfg80211_send_deauth(struct net_device *dev,
  89. const u8 *buf, size_t len)
  90. {
  91. struct wireless_dev *wdev = dev->ieee80211_ptr;
  92. struct wiphy *wiphy = wdev->wiphy;
  93. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  94. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  95. const u8 *bssid = mgmt->bssid;
  96. int i;
  97. bool done = false;
  98. ASSERT_WDEV_LOCK(wdev);
  99. nl80211_send_deauth(rdev, dev, buf, len, GFP_KERNEL);
  100. if (wdev->current_bss &&
  101. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  102. done = true;
  103. cfg80211_unhold_bss(wdev->current_bss);
  104. cfg80211_put_bss(&wdev->current_bss->pub);
  105. wdev->current_bss = NULL;
  106. } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
  107. if (wdev->auth_bsses[i] &&
  108. memcmp(wdev->auth_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
  109. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  110. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  111. wdev->auth_bsses[i] = NULL;
  112. done = true;
  113. break;
  114. }
  115. if (wdev->authtry_bsses[i] &&
  116. memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
  117. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  118. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  119. wdev->authtry_bsses[i] = NULL;
  120. done = true;
  121. break;
  122. }
  123. }
  124. WARN_ON(!done);
  125. if (wdev->sme_state == CFG80211_SME_CONNECTED) {
  126. u16 reason_code;
  127. bool from_ap;
  128. reason_code = le16_to_cpu(mgmt->u.deauth.reason_code);
  129. from_ap = memcmp(mgmt->da, dev->dev_addr, ETH_ALEN) == 0;
  130. __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
  131. } else if (wdev->sme_state == CFG80211_SME_CONNECTING) {
  132. __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
  133. WLAN_STATUS_UNSPECIFIED_FAILURE,
  134. false, NULL);
  135. }
  136. }
  137. void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len,
  138. void *cookie)
  139. {
  140. struct wireless_dev *wdev = dev->ieee80211_ptr;
  141. BUG_ON(cookie && wdev != cookie);
  142. if (cookie) {
  143. /* called within callback */
  144. __cfg80211_send_deauth(dev, buf, len);
  145. } else {
  146. wdev_lock(wdev);
  147. __cfg80211_send_deauth(dev, buf, len);
  148. wdev_unlock(wdev);
  149. }
  150. }
  151. EXPORT_SYMBOL(cfg80211_send_deauth);
  152. static void __cfg80211_send_disassoc(struct net_device *dev,
  153. const u8 *buf, size_t len)
  154. {
  155. struct wireless_dev *wdev = dev->ieee80211_ptr;
  156. struct wiphy *wiphy = wdev->wiphy;
  157. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  158. struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
  159. const u8 *bssid = mgmt->bssid;
  160. int i;
  161. u16 reason_code;
  162. bool from_ap;
  163. bool done = false;
  164. ASSERT_WDEV_LOCK(wdev);
  165. nl80211_send_disassoc(rdev, dev, buf, len, GFP_KERNEL);
  166. if (wdev->sme_state != CFG80211_SME_CONNECTED)
  167. return;
  168. if (wdev->current_bss &&
  169. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  170. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  171. if (wdev->authtry_bsses[i] || wdev->auth_bsses[i])
  172. continue;
  173. wdev->auth_bsses[i] = wdev->current_bss;
  174. wdev->current_bss = NULL;
  175. done = true;
  176. cfg80211_sme_disassoc(dev, i);
  177. break;
  178. }
  179. WARN_ON(!done);
  180. } else
  181. WARN_ON(1);
  182. reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code);
  183. from_ap = memcmp(mgmt->da, dev->dev_addr, ETH_ALEN) == 0;
  184. __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
  185. }
  186. void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len,
  187. void *cookie)
  188. {
  189. struct wireless_dev *wdev = dev->ieee80211_ptr;
  190. BUG_ON(cookie && wdev != cookie);
  191. if (cookie) {
  192. /* called within callback */
  193. __cfg80211_send_disassoc(dev, buf, len);
  194. } else {
  195. wdev_lock(wdev);
  196. __cfg80211_send_disassoc(dev, buf, len);
  197. wdev_unlock(wdev);
  198. }
  199. }
  200. EXPORT_SYMBOL(cfg80211_send_disassoc);
  201. void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr)
  202. {
  203. struct wireless_dev *wdev = dev->ieee80211_ptr;
  204. struct wiphy *wiphy = wdev->wiphy;
  205. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  206. int i;
  207. bool done = false;
  208. wdev_lock(wdev);
  209. nl80211_send_auth_timeout(rdev, dev, addr, GFP_KERNEL);
  210. if (wdev->sme_state == CFG80211_SME_CONNECTING)
  211. __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
  212. WLAN_STATUS_UNSPECIFIED_FAILURE,
  213. false, NULL);
  214. for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
  215. if (wdev->authtry_bsses[i] &&
  216. memcmp(wdev->authtry_bsses[i]->pub.bssid,
  217. addr, ETH_ALEN) == 0) {
  218. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  219. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  220. wdev->authtry_bsses[i] = NULL;
  221. done = true;
  222. break;
  223. }
  224. }
  225. WARN_ON(!done);
  226. wdev_unlock(wdev);
  227. }
  228. EXPORT_SYMBOL(cfg80211_send_auth_timeout);
  229. void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr)
  230. {
  231. struct wireless_dev *wdev = dev->ieee80211_ptr;
  232. struct wiphy *wiphy = wdev->wiphy;
  233. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  234. int i;
  235. bool done = false;
  236. wdev_lock(wdev);
  237. nl80211_send_assoc_timeout(rdev, dev, addr, GFP_KERNEL);
  238. if (wdev->sme_state == CFG80211_SME_CONNECTING)
  239. __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
  240. WLAN_STATUS_UNSPECIFIED_FAILURE,
  241. false, NULL);
  242. for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
  243. if (wdev->auth_bsses[i] &&
  244. memcmp(wdev->auth_bsses[i]->pub.bssid,
  245. addr, ETH_ALEN) == 0) {
  246. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  247. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  248. wdev->auth_bsses[i] = NULL;
  249. done = true;
  250. break;
  251. }
  252. }
  253. WARN_ON(!done);
  254. wdev_unlock(wdev);
  255. }
  256. EXPORT_SYMBOL(cfg80211_send_assoc_timeout);
  257. void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr,
  258. enum nl80211_key_type key_type, int key_id,
  259. const u8 *tsc, gfp_t gfp)
  260. {
  261. struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
  262. struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
  263. #ifdef CONFIG_WIRELESS_EXT
  264. union iwreq_data wrqu;
  265. char *buf = kmalloc(128, gfp);
  266. if (buf) {
  267. sprintf(buf, "MLME-MICHAELMICFAILURE.indication("
  268. "keyid=%d %scast addr=%pM)", key_id,
  269. key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni",
  270. addr);
  271. memset(&wrqu, 0, sizeof(wrqu));
  272. wrqu.data.length = strlen(buf);
  273. wireless_send_event(dev, IWEVCUSTOM, &wrqu, buf);
  274. kfree(buf);
  275. }
  276. #endif
  277. nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp);
  278. }
  279. EXPORT_SYMBOL(cfg80211_michael_mic_failure);
  280. /* some MLME handling for userspace SME */
  281. int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
  282. struct net_device *dev,
  283. struct ieee80211_channel *chan,
  284. enum nl80211_auth_type auth_type,
  285. const u8 *bssid,
  286. const u8 *ssid, int ssid_len,
  287. const u8 *ie, int ie_len,
  288. const u8 *key, int key_len, int key_idx)
  289. {
  290. struct wireless_dev *wdev = dev->ieee80211_ptr;
  291. struct cfg80211_auth_request req;
  292. struct cfg80211_internal_bss *bss;
  293. int i, err, slot = -1, nfree = 0;
  294. ASSERT_WDEV_LOCK(wdev);
  295. if (auth_type == NL80211_AUTHTYPE_SHARED_KEY)
  296. if (!key || !key_len || key_idx < 0 || key_idx > 4)
  297. return -EINVAL;
  298. if (wdev->current_bss &&
  299. memcmp(bssid, wdev->current_bss->pub.bssid, ETH_ALEN) == 0)
  300. return -EALREADY;
  301. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  302. if (wdev->authtry_bsses[i] &&
  303. memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid,
  304. ETH_ALEN) == 0)
  305. return -EALREADY;
  306. if (wdev->auth_bsses[i] &&
  307. memcmp(bssid, wdev->auth_bsses[i]->pub.bssid,
  308. ETH_ALEN) == 0)
  309. return -EALREADY;
  310. }
  311. memset(&req, 0, sizeof(req));
  312. req.ie = ie;
  313. req.ie_len = ie_len;
  314. req.auth_type = auth_type;
  315. req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
  316. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  317. req.key = key;
  318. req.key_len = key_len;
  319. req.key_idx = key_idx;
  320. if (!req.bss)
  321. return -ENOENT;
  322. bss = bss_from_pub(req.bss);
  323. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  324. if (!wdev->auth_bsses[i] && !wdev->authtry_bsses[i]) {
  325. slot = i;
  326. nfree++;
  327. }
  328. }
  329. /* we need one free slot for disassoc and one for this auth */
  330. if (nfree < 2) {
  331. err = -ENOSPC;
  332. goto out;
  333. }
  334. wdev->authtry_bsses[slot] = bss;
  335. cfg80211_hold_bss(bss);
  336. err = rdev->ops->auth(&rdev->wiphy, dev, &req);
  337. if (err) {
  338. wdev->authtry_bsses[slot] = NULL;
  339. cfg80211_unhold_bss(bss);
  340. }
  341. out:
  342. if (err)
  343. cfg80211_put_bss(req.bss);
  344. return err;
  345. }
  346. int cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
  347. struct net_device *dev, struct ieee80211_channel *chan,
  348. enum nl80211_auth_type auth_type, const u8 *bssid,
  349. const u8 *ssid, int ssid_len,
  350. const u8 *ie, int ie_len,
  351. const u8 *key, int key_len, int key_idx)
  352. {
  353. int err;
  354. wdev_lock(dev->ieee80211_ptr);
  355. err = __cfg80211_mlme_auth(rdev, dev, chan, auth_type, bssid,
  356. ssid, ssid_len, ie, ie_len,
  357. key, key_len, key_idx);
  358. wdev_unlock(dev->ieee80211_ptr);
  359. return err;
  360. }
  361. int __cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
  362. struct net_device *dev,
  363. struct ieee80211_channel *chan,
  364. const u8 *bssid, const u8 *prev_bssid,
  365. const u8 *ssid, int ssid_len,
  366. const u8 *ie, int ie_len, bool use_mfp,
  367. struct cfg80211_crypto_settings *crypt)
  368. {
  369. struct wireless_dev *wdev = dev->ieee80211_ptr;
  370. struct cfg80211_assoc_request req;
  371. struct cfg80211_internal_bss *bss;
  372. int i, err, slot = -1;
  373. ASSERT_WDEV_LOCK(wdev);
  374. memset(&req, 0, sizeof(req));
  375. if (wdev->current_bss)
  376. return -EALREADY;
  377. req.ie = ie;
  378. req.ie_len = ie_len;
  379. memcpy(&req.crypto, crypt, sizeof(req.crypto));
  380. req.use_mfp = use_mfp;
  381. req.prev_bssid = prev_bssid;
  382. req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
  383. WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
  384. if (!req.bss)
  385. return -ENOENT;
  386. bss = bss_from_pub(req.bss);
  387. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  388. if (bss == wdev->auth_bsses[i]) {
  389. slot = i;
  390. break;
  391. }
  392. }
  393. if (slot < 0) {
  394. err = -ENOTCONN;
  395. goto out;
  396. }
  397. err = rdev->ops->assoc(&rdev->wiphy, dev, &req);
  398. out:
  399. /* still a reference in wdev->auth_bsses[slot] */
  400. cfg80211_put_bss(req.bss);
  401. return err;
  402. }
  403. int cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
  404. struct net_device *dev,
  405. struct ieee80211_channel *chan,
  406. const u8 *bssid, const u8 *prev_bssid,
  407. const u8 *ssid, int ssid_len,
  408. const u8 *ie, int ie_len, bool use_mfp,
  409. struct cfg80211_crypto_settings *crypt)
  410. {
  411. struct wireless_dev *wdev = dev->ieee80211_ptr;
  412. int err;
  413. wdev_lock(wdev);
  414. err = __cfg80211_mlme_assoc(rdev, dev, chan, bssid, prev_bssid,
  415. ssid, ssid_len, ie, ie_len, use_mfp, crypt);
  416. wdev_unlock(wdev);
  417. return err;
  418. }
  419. int __cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
  420. struct net_device *dev, const u8 *bssid,
  421. const u8 *ie, int ie_len, u16 reason)
  422. {
  423. struct wireless_dev *wdev = dev->ieee80211_ptr;
  424. struct cfg80211_deauth_request req;
  425. int i;
  426. ASSERT_WDEV_LOCK(wdev);
  427. memset(&req, 0, sizeof(req));
  428. req.reason_code = reason;
  429. req.ie = ie;
  430. req.ie_len = ie_len;
  431. if (wdev->current_bss &&
  432. memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
  433. req.bss = &wdev->current_bss->pub;
  434. } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
  435. if (wdev->auth_bsses[i] &&
  436. memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
  437. req.bss = &wdev->auth_bsses[i]->pub;
  438. break;
  439. }
  440. if (wdev->authtry_bsses[i] &&
  441. memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
  442. req.bss = &wdev->authtry_bsses[i]->pub;
  443. break;
  444. }
  445. }
  446. if (!req.bss)
  447. return -ENOTCONN;
  448. return rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  449. }
  450. int cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
  451. struct net_device *dev, const u8 *bssid,
  452. const u8 *ie, int ie_len, u16 reason)
  453. {
  454. struct wireless_dev *wdev = dev->ieee80211_ptr;
  455. int err;
  456. wdev_lock(wdev);
  457. err = __cfg80211_mlme_deauth(rdev, dev, bssid, ie, ie_len, reason);
  458. wdev_unlock(wdev);
  459. return err;
  460. }
  461. static int __cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
  462. struct net_device *dev, const u8 *bssid,
  463. const u8 *ie, int ie_len, u16 reason)
  464. {
  465. struct wireless_dev *wdev = dev->ieee80211_ptr;
  466. struct cfg80211_disassoc_request req;
  467. ASSERT_WDEV_LOCK(wdev);
  468. if (wdev->sme_state != CFG80211_SME_CONNECTED)
  469. return -ENOTCONN;
  470. if (WARN_ON(!wdev->current_bss))
  471. return -ENOTCONN;
  472. memset(&req, 0, sizeof(req));
  473. req.reason_code = reason;
  474. req.ie = ie;
  475. req.ie_len = ie_len;
  476. if (memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0)
  477. req.bss = &wdev->current_bss->pub;
  478. else
  479. return -ENOTCONN;
  480. return rdev->ops->disassoc(&rdev->wiphy, dev, &req, wdev);
  481. }
  482. int cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
  483. struct net_device *dev, const u8 *bssid,
  484. const u8 *ie, int ie_len, u16 reason)
  485. {
  486. struct wireless_dev *wdev = dev->ieee80211_ptr;
  487. int err;
  488. wdev_lock(wdev);
  489. err = __cfg80211_mlme_disassoc(rdev, dev, bssid, ie, ie_len, reason);
  490. wdev_unlock(wdev);
  491. return err;
  492. }
  493. void cfg80211_mlme_down(struct cfg80211_registered_device *rdev,
  494. struct net_device *dev)
  495. {
  496. struct wireless_dev *wdev = dev->ieee80211_ptr;
  497. struct cfg80211_deauth_request req;
  498. int i;
  499. ASSERT_WDEV_LOCK(wdev);
  500. if (!rdev->ops->deauth)
  501. return;
  502. memset(&req, 0, sizeof(req));
  503. req.reason_code = WLAN_REASON_DEAUTH_LEAVING;
  504. req.ie = NULL;
  505. req.ie_len = 0;
  506. if (wdev->current_bss) {
  507. req.bss = &wdev->current_bss->pub;
  508. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  509. if (wdev->current_bss) {
  510. cfg80211_unhold_bss(wdev->current_bss);
  511. cfg80211_put_bss(&wdev->current_bss->pub);
  512. wdev->current_bss = NULL;
  513. }
  514. }
  515. for (i = 0; i < MAX_AUTH_BSSES; i++) {
  516. if (wdev->auth_bsses[i]) {
  517. req.bss = &wdev->auth_bsses[i]->pub;
  518. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  519. if (wdev->auth_bsses[i]) {
  520. cfg80211_unhold_bss(wdev->auth_bsses[i]);
  521. cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
  522. wdev->auth_bsses[i] = NULL;
  523. }
  524. }
  525. if (wdev->authtry_bsses[i]) {
  526. req.bss = &wdev->authtry_bsses[i]->pub;
  527. rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
  528. if (wdev->authtry_bsses[i]) {
  529. cfg80211_unhold_bss(wdev->authtry_bsses[i]);
  530. cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
  531. wdev->authtry_bsses[i] = NULL;
  532. }
  533. }
  534. }
  535. }