Linux Audio

Check our new training course

Loading...
v3.1
   1/*
   2 * SME code for cfg80211's connect emulation.
   3 *
   4 * Copyright 2009	Johannes Berg <johannes@sipsolutions.net>
   5 * Copyright (C) 2009   Intel Corporation. All rights reserved.
   6 */
   7
   8#include <linux/etherdevice.h>
   9#include <linux/if_arp.h>
  10#include <linux/slab.h>
  11#include <linux/workqueue.h>
  12#include <linux/wireless.h>
 
  13#include <net/iw_handler.h>
  14#include <net/cfg80211.h>
  15#include <net/rtnetlink.h>
  16#include "nl80211.h"
  17#include "reg.h"
  18
  19struct cfg80211_conn {
  20	struct cfg80211_connect_params params;
  21	/* these are sub-states of the _CONNECTING sme_state */
  22	enum {
  23		CFG80211_CONN_IDLE,
  24		CFG80211_CONN_SCANNING,
  25		CFG80211_CONN_SCAN_AGAIN,
  26		CFG80211_CONN_AUTHENTICATE_NEXT,
  27		CFG80211_CONN_AUTHENTICATING,
  28		CFG80211_CONN_ASSOCIATE_NEXT,
  29		CFG80211_CONN_ASSOCIATING,
  30		CFG80211_CONN_DEAUTH_ASSOC_FAIL,
  31	} state;
  32	u8 bssid[ETH_ALEN], prev_bssid[ETH_ALEN];
  33	u8 *ie;
  34	size_t ie_len;
  35	bool auto_auth, prev_bssid_valid;
  36};
  37
  38static bool cfg80211_is_all_idle(void)
  39{
  40	struct cfg80211_registered_device *rdev;
  41	struct wireless_dev *wdev;
  42	bool is_all_idle = true;
  43
  44	mutex_lock(&cfg80211_mutex);
  45
  46	/*
  47	 * All devices must be idle as otherwise if you are actively
  48	 * scanning some new beacon hints could be learned and would
  49	 * count as new regulatory hints.
  50	 */
  51	list_for_each_entry(rdev, &cfg80211_rdev_list, list) {
  52		cfg80211_lock_rdev(rdev);
  53		list_for_each_entry(wdev, &rdev->netdev_list, list) {
  54			wdev_lock(wdev);
  55			if (wdev->sme_state != CFG80211_SME_IDLE)
  56				is_all_idle = false;
  57			wdev_unlock(wdev);
  58		}
  59		cfg80211_unlock_rdev(rdev);
  60	}
  61
  62	mutex_unlock(&cfg80211_mutex);
  63
  64	return is_all_idle;
  65}
  66
  67static void disconnect_work(struct work_struct *work)
  68{
  69	if (!cfg80211_is_all_idle())
  70		return;
  71
  72	regulatory_hint_disconnect();
  73}
  74
  75static DECLARE_WORK(cfg80211_disconnect_work, disconnect_work);
  76
  77static int cfg80211_conn_scan(struct wireless_dev *wdev)
  78{
  79	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  80	struct cfg80211_scan_request *request;
  81	int n_channels, err;
  82
  83	ASSERT_RTNL();
  84	ASSERT_RDEV_LOCK(rdev);
  85	ASSERT_WDEV_LOCK(wdev);
  86
  87	if (rdev->scan_req)
  88		return -EBUSY;
  89
  90	if (wdev->conn->params.channel) {
  91		n_channels = 1;
  92	} else {
  93		enum ieee80211_band band;
  94		n_channels = 0;
  95
  96		for (band = 0; band < IEEE80211_NUM_BANDS; band++) {
  97			if (!wdev->wiphy->bands[band])
  98				continue;
  99			n_channels += wdev->wiphy->bands[band]->n_channels;
 100		}
 101	}
 102	request = kzalloc(sizeof(*request) + sizeof(request->ssids[0]) +
 103			  sizeof(request->channels[0]) * n_channels,
 104			  GFP_KERNEL);
 105	if (!request)
 106		return -ENOMEM;
 107
 108	if (wdev->conn->params.channel)
 109		request->channels[0] = wdev->conn->params.channel;
 110	else {
 111		int i = 0, j;
 112		enum ieee80211_band band;
 
 
 113
 114		for (band = 0; band < IEEE80211_NUM_BANDS; band++) {
 115			if (!wdev->wiphy->bands[band])
 
 116				continue;
 117			for (j = 0; j < wdev->wiphy->bands[band]->n_channels;
 118			     i++, j++)
 119				request->channels[i] =
 120					&wdev->wiphy->bands[band]->channels[j];
 121			request->rates[band] =
 122				(1 << wdev->wiphy->bands[band]->n_bitrates) - 1;
 
 123		}
 
 124	}
 125	request->n_channels = n_channels;
 126	request->ssids = (void *)&request->channels[n_channels];
 127	request->n_ssids = 1;
 128
 129	memcpy(request->ssids[0].ssid, wdev->conn->params.ssid,
 130		wdev->conn->params.ssid_len);
 131	request->ssids[0].ssid_len = wdev->conn->params.ssid_len;
 132
 133	request->dev = wdev->netdev;
 134	request->wiphy = &rdev->wiphy;
 135
 136	rdev->scan_req = request;
 137
 138	err = rdev->ops->scan(wdev->wiphy, wdev->netdev, request);
 139	if (!err) {
 140		wdev->conn->state = CFG80211_CONN_SCANNING;
 141		nl80211_send_scan_start(rdev, wdev->netdev);
 142		dev_hold(wdev->netdev);
 143	} else {
 144		rdev->scan_req = NULL;
 145		kfree(request);
 146	}
 147	return err;
 148}
 149
 150static int cfg80211_conn_do_work(struct wireless_dev *wdev)
 151{
 152	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 153	struct cfg80211_connect_params *params;
 154	const u8 *prev_bssid = NULL;
 155	int err;
 156
 157	ASSERT_WDEV_LOCK(wdev);
 158
 159	if (!wdev->conn)
 160		return 0;
 161
 162	params = &wdev->conn->params;
 163
 164	switch (wdev->conn->state) {
 165	case CFG80211_CONN_SCAN_AGAIN:
 166		return cfg80211_conn_scan(wdev);
 167	case CFG80211_CONN_AUTHENTICATE_NEXT:
 168		BUG_ON(!rdev->ops->auth);
 169		wdev->conn->state = CFG80211_CONN_AUTHENTICATING;
 170		return __cfg80211_mlme_auth(rdev, wdev->netdev,
 171					    params->channel, params->auth_type,
 172					    params->bssid,
 173					    params->ssid, params->ssid_len,
 174					    NULL, 0,
 175					    params->key, params->key_len,
 176					    params->key_idx, false);
 177	case CFG80211_CONN_ASSOCIATE_NEXT:
 178		BUG_ON(!rdev->ops->assoc);
 179		wdev->conn->state = CFG80211_CONN_ASSOCIATING;
 180		if (wdev->conn->prev_bssid_valid)
 181			prev_bssid = wdev->conn->prev_bssid;
 182		err = __cfg80211_mlme_assoc(rdev, wdev->netdev,
 183					    params->channel, params->bssid,
 184					    prev_bssid,
 185					    params->ssid, params->ssid_len,
 186					    params->ie, params->ie_len,
 187					    false, &params->crypto);
 
 
 188		if (err)
 189			__cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
 190					       NULL, 0,
 191					       WLAN_REASON_DEAUTH_LEAVING,
 192					       false);
 193		return err;
 194	case CFG80211_CONN_DEAUTH_ASSOC_FAIL:
 195		__cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
 196				       NULL, 0,
 197				       WLAN_REASON_DEAUTH_LEAVING, false);
 198		/* return an error so that we call __cfg80211_connect_result() */
 199		return -EINVAL;
 200	default:
 201		return 0;
 202	}
 203}
 204
 205void cfg80211_conn_work(struct work_struct *work)
 206{
 207	struct cfg80211_registered_device *rdev =
 208		container_of(work, struct cfg80211_registered_device, conn_work);
 209	struct wireless_dev *wdev;
 210	u8 bssid_buf[ETH_ALEN], *bssid = NULL;
 211
 212	rtnl_lock();
 213	cfg80211_lock_rdev(rdev);
 214	mutex_lock(&rdev->devlist_mtx);
 215
 216	list_for_each_entry(wdev, &rdev->netdev_list, list) {
 217		wdev_lock(wdev);
 218		if (!netif_running(wdev->netdev)) {
 219			wdev_unlock(wdev);
 220			continue;
 221		}
 222		if (wdev->sme_state != CFG80211_SME_CONNECTING) {
 223			wdev_unlock(wdev);
 224			continue;
 225		}
 226		if (wdev->conn->params.bssid) {
 227			memcpy(bssid_buf, wdev->conn->params.bssid, ETH_ALEN);
 228			bssid = bssid_buf;
 229		}
 230		if (cfg80211_conn_do_work(wdev))
 231			__cfg80211_connect_result(
 232					wdev->netdev, bssid,
 233					NULL, 0, NULL, 0,
 234					WLAN_STATUS_UNSPECIFIED_FAILURE,
 235					false, NULL);
 236		wdev_unlock(wdev);
 237	}
 238
 239	mutex_unlock(&rdev->devlist_mtx);
 240	cfg80211_unlock_rdev(rdev);
 241	rtnl_unlock();
 242}
 243
 244static struct cfg80211_bss *cfg80211_get_conn_bss(struct wireless_dev *wdev)
 245{
 246	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 247	struct cfg80211_bss *bss;
 248	u16 capa = WLAN_CAPABILITY_ESS;
 249
 250	ASSERT_WDEV_LOCK(wdev);
 251
 252	if (wdev->conn->params.privacy)
 253		capa |= WLAN_CAPABILITY_PRIVACY;
 254
 255	bss = cfg80211_get_bss(wdev->wiphy, wdev->conn->params.channel,
 256			       wdev->conn->params.bssid,
 257			       wdev->conn->params.ssid,
 258			       wdev->conn->params.ssid_len,
 259			       WLAN_CAPABILITY_ESS | WLAN_CAPABILITY_PRIVACY,
 260			       capa);
 261	if (!bss)
 262		return NULL;
 263
 264	memcpy(wdev->conn->bssid, bss->bssid, ETH_ALEN);
 265	wdev->conn->params.bssid = wdev->conn->bssid;
 266	wdev->conn->params.channel = bss->channel;
 267	wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
 268	schedule_work(&rdev->conn_work);
 269
 270	return bss;
 271}
 272
 273static void __cfg80211_sme_scan_done(struct net_device *dev)
 274{
 275	struct wireless_dev *wdev = dev->ieee80211_ptr;
 276	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 277	struct cfg80211_bss *bss;
 278
 279	ASSERT_WDEV_LOCK(wdev);
 280
 281	if (wdev->sme_state != CFG80211_SME_CONNECTING)
 282		return;
 283
 284	if (!wdev->conn)
 285		return;
 286
 287	if (wdev->conn->state != CFG80211_CONN_SCANNING &&
 288	    wdev->conn->state != CFG80211_CONN_SCAN_AGAIN)
 289		return;
 290
 291	bss = cfg80211_get_conn_bss(wdev);
 292	if (bss) {
 293		cfg80211_put_bss(bss);
 294	} else {
 295		/* not found */
 296		if (wdev->conn->state == CFG80211_CONN_SCAN_AGAIN)
 297			schedule_work(&rdev->conn_work);
 298		else
 299			__cfg80211_connect_result(
 300					wdev->netdev,
 301					wdev->conn->params.bssid,
 302					NULL, 0, NULL, 0,
 303					WLAN_STATUS_UNSPECIFIED_FAILURE,
 304					false, NULL);
 305	}
 306}
 307
 308void cfg80211_sme_scan_done(struct net_device *dev)
 309{
 310	struct wireless_dev *wdev = dev->ieee80211_ptr;
 311
 312	mutex_lock(&wiphy_to_dev(wdev->wiphy)->devlist_mtx);
 313	wdev_lock(wdev);
 314	__cfg80211_sme_scan_done(dev);
 315	wdev_unlock(wdev);
 316	mutex_unlock(&wiphy_to_dev(wdev->wiphy)->devlist_mtx);
 317}
 318
 319void cfg80211_sme_rx_auth(struct net_device *dev,
 320			  const u8 *buf, size_t len)
 321{
 322	struct wireless_dev *wdev = dev->ieee80211_ptr;
 323	struct wiphy *wiphy = wdev->wiphy;
 324	struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
 325	struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
 326	u16 status_code = le16_to_cpu(mgmt->u.auth.status_code);
 327
 328	ASSERT_WDEV_LOCK(wdev);
 329
 330	/* should only RX auth frames when connecting */
 331	if (wdev->sme_state != CFG80211_SME_CONNECTING)
 332		return;
 333
 334	if (WARN_ON(!wdev->conn))
 335		return;
 336
 337	if (status_code == WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG &&
 338	    wdev->conn->auto_auth &&
 339	    wdev->conn->params.auth_type != NL80211_AUTHTYPE_NETWORK_EAP) {
 340		/* select automatically between only open, shared, leap */
 341		switch (wdev->conn->params.auth_type) {
 342		case NL80211_AUTHTYPE_OPEN_SYSTEM:
 343			if (wdev->connect_keys)
 344				wdev->conn->params.auth_type =
 345					NL80211_AUTHTYPE_SHARED_KEY;
 346			else
 347				wdev->conn->params.auth_type =
 348					NL80211_AUTHTYPE_NETWORK_EAP;
 349			break;
 350		case NL80211_AUTHTYPE_SHARED_KEY:
 351			wdev->conn->params.auth_type =
 352				NL80211_AUTHTYPE_NETWORK_EAP;
 353			break;
 354		default:
 355			/* huh? */
 356			wdev->conn->params.auth_type =
 357				NL80211_AUTHTYPE_OPEN_SYSTEM;
 358			break;
 359		}
 360		wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
 361		schedule_work(&rdev->conn_work);
 362	} else if (status_code != WLAN_STATUS_SUCCESS) {
 363		__cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
 364					  status_code, false, NULL);
 365	} else if (wdev->sme_state == CFG80211_SME_CONNECTING &&
 366		 wdev->conn->state == CFG80211_CONN_AUTHENTICATING) {
 367		wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
 368		schedule_work(&rdev->conn_work);
 369	}
 370}
 371
 372bool cfg80211_sme_failed_reassoc(struct wireless_dev *wdev)
 373{
 374	struct wiphy *wiphy = wdev->wiphy;
 375	struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
 376
 377	if (WARN_ON(!wdev->conn))
 378		return false;
 379
 380	if (!wdev->conn->prev_bssid_valid)
 381		return false;
 382
 383	/*
 384	 * Some stupid APs don't accept reassoc, so we
 385	 * need to fall back to trying regular assoc.
 386	 */
 387	wdev->conn->prev_bssid_valid = false;
 388	wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
 389	schedule_work(&rdev->conn_work);
 390
 391	return true;
 392}
 393
 394void cfg80211_sme_failed_assoc(struct wireless_dev *wdev)
 395{
 396	struct wiphy *wiphy = wdev->wiphy;
 397	struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
 398
 399	wdev->conn->state = CFG80211_CONN_DEAUTH_ASSOC_FAIL;
 400	schedule_work(&rdev->conn_work);
 401}
 402
 403void __cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
 404			       const u8 *req_ie, size_t req_ie_len,
 405			       const u8 *resp_ie, size_t resp_ie_len,
 406			       u16 status, bool wextev,
 407			       struct cfg80211_bss *bss)
 408{
 409	struct wireless_dev *wdev = dev->ieee80211_ptr;
 410	u8 *country_ie;
 411#ifdef CONFIG_CFG80211_WEXT
 412	union iwreq_data wrqu;
 413#endif
 414
 415	ASSERT_WDEV_LOCK(wdev);
 416
 417	if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
 418		    wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
 419		return;
 420
 421	if (wdev->sme_state != CFG80211_SME_CONNECTING)
 422		return;
 423
 424	nl80211_send_connect_result(wiphy_to_dev(wdev->wiphy), dev,
 425				    bssid, req_ie, req_ie_len,
 426				    resp_ie, resp_ie_len,
 427				    status, GFP_KERNEL);
 428
 429#ifdef CONFIG_CFG80211_WEXT
 430	if (wextev) {
 431		if (req_ie && status == WLAN_STATUS_SUCCESS) {
 432			memset(&wrqu, 0, sizeof(wrqu));
 433			wrqu.data.length = req_ie_len;
 434			wireless_send_event(dev, IWEVASSOCREQIE, &wrqu, req_ie);
 435		}
 436
 437		if (resp_ie && status == WLAN_STATUS_SUCCESS) {
 438			memset(&wrqu, 0, sizeof(wrqu));
 439			wrqu.data.length = resp_ie_len;
 440			wireless_send_event(dev, IWEVASSOCRESPIE, &wrqu, resp_ie);
 441		}
 442
 443		memset(&wrqu, 0, sizeof(wrqu));
 444		wrqu.ap_addr.sa_family = ARPHRD_ETHER;
 445		if (bssid && status == WLAN_STATUS_SUCCESS) {
 446			memcpy(wrqu.ap_addr.sa_data, bssid, ETH_ALEN);
 447			memcpy(wdev->wext.prev_bssid, bssid, ETH_ALEN);
 448			wdev->wext.prev_bssid_valid = true;
 449		}
 450		wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
 451	}
 452#endif
 453
 454	if (wdev->current_bss) {
 455		cfg80211_unhold_bss(wdev->current_bss);
 456		cfg80211_put_bss(&wdev->current_bss->pub);
 457		wdev->current_bss = NULL;
 458	}
 459
 460	if (wdev->conn)
 461		wdev->conn->state = CFG80211_CONN_IDLE;
 462
 463	if (status != WLAN_STATUS_SUCCESS) {
 464		wdev->sme_state = CFG80211_SME_IDLE;
 465		if (wdev->conn)
 466			kfree(wdev->conn->ie);
 467		kfree(wdev->conn);
 468		wdev->conn = NULL;
 469		kfree(wdev->connect_keys);
 470		wdev->connect_keys = NULL;
 471		wdev->ssid_len = 0;
 
 472		return;
 473	}
 474
 475	if (!bss)
 476		bss = cfg80211_get_bss(wdev->wiphy,
 477				       wdev->conn ? wdev->conn->params.channel :
 478				       NULL,
 479				       bssid,
 480				       wdev->ssid, wdev->ssid_len,
 481				       WLAN_CAPABILITY_ESS,
 482				       WLAN_CAPABILITY_ESS);
 483
 484	if (WARN_ON(!bss))
 485		return;
 486
 487	cfg80211_hold_bss(bss_from_pub(bss));
 488	wdev->current_bss = bss_from_pub(bss);
 489
 490	wdev->sme_state = CFG80211_SME_CONNECTED;
 491	cfg80211_upload_connect_keys(wdev);
 492
 493	country_ie = (u8 *) ieee80211_bss_get_ie(bss, WLAN_EID_COUNTRY);
 494
 495	if (!country_ie)
 496		return;
 497
 498	/*
 499	 * ieee80211_bss_get_ie() ensures we can access:
 500	 * - country_ie + 2, the start of the country ie data, and
 501	 * - and country_ie[1] which is the IE length
 502	 */
 503	regulatory_hint_11d(wdev->wiphy,
 504			    bss->channel->band,
 505			    country_ie + 2,
 506			    country_ie[1]);
 507}
 508
 509void cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
 510			     const u8 *req_ie, size_t req_ie_len,
 511			     const u8 *resp_ie, size_t resp_ie_len,
 512			     u16 status, gfp_t gfp)
 513{
 514	struct wireless_dev *wdev = dev->ieee80211_ptr;
 515	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 516	struct cfg80211_event *ev;
 517	unsigned long flags;
 518
 519	CFG80211_DEV_WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTING);
 520
 521	ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
 522	if (!ev)
 523		return;
 524
 525	ev->type = EVENT_CONNECT_RESULT;
 526	if (bssid)
 527		memcpy(ev->cr.bssid, bssid, ETH_ALEN);
 528	if (req_ie_len) {
 529		ev->cr.req_ie = ((u8 *)ev) + sizeof(*ev);
 530		ev->cr.req_ie_len = req_ie_len;
 531		memcpy((void *)ev->cr.req_ie, req_ie, req_ie_len);
 532	}
 533	if (resp_ie_len) {
 534		ev->cr.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
 535		ev->cr.resp_ie_len = resp_ie_len;
 536		memcpy((void *)ev->cr.resp_ie, resp_ie, resp_ie_len);
 537	}
 538	ev->cr.status = status;
 539
 540	spin_lock_irqsave(&wdev->event_lock, flags);
 541	list_add_tail(&ev->list, &wdev->event_list);
 542	spin_unlock_irqrestore(&wdev->event_lock, flags);
 543	queue_work(cfg80211_wq, &rdev->event_work);
 544}
 545EXPORT_SYMBOL(cfg80211_connect_result);
 546
 547void __cfg80211_roamed(struct wireless_dev *wdev,
 548		       struct ieee80211_channel *channel,
 549		       const u8 *bssid,
 550		       const u8 *req_ie, size_t req_ie_len,
 551		       const u8 *resp_ie, size_t resp_ie_len)
 552{
 553	struct cfg80211_bss *bss;
 554#ifdef CONFIG_CFG80211_WEXT
 555	union iwreq_data wrqu;
 556#endif
 557
 558	ASSERT_WDEV_LOCK(wdev);
 559
 560	if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
 561		    wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
 562		return;
 563
 564	if (wdev->sme_state != CFG80211_SME_CONNECTED)
 565		return;
 566
 567	/* internal error -- how did we get to CONNECTED w/o BSS? */
 568	if (WARN_ON(!wdev->current_bss)) {
 569		return;
 570	}
 571
 572	cfg80211_unhold_bss(wdev->current_bss);
 573	cfg80211_put_bss(&wdev->current_bss->pub);
 574	wdev->current_bss = NULL;
 575
 576	bss = cfg80211_get_bss(wdev->wiphy, channel, bssid,
 577			       wdev->ssid, wdev->ssid_len,
 578			       WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
 579
 580	if (WARN_ON(!bss))
 581		return;
 582
 583	cfg80211_hold_bss(bss_from_pub(bss));
 584	wdev->current_bss = bss_from_pub(bss);
 585
 586	nl80211_send_roamed(wiphy_to_dev(wdev->wiphy), wdev->netdev, bssid,
 587			    req_ie, req_ie_len, resp_ie, resp_ie_len,
 588			    GFP_KERNEL);
 589
 590#ifdef CONFIG_CFG80211_WEXT
 591	if (req_ie) {
 592		memset(&wrqu, 0, sizeof(wrqu));
 593		wrqu.data.length = req_ie_len;
 594		wireless_send_event(wdev->netdev, IWEVASSOCREQIE,
 595				    &wrqu, req_ie);
 596	}
 597
 598	if (resp_ie) {
 599		memset(&wrqu, 0, sizeof(wrqu));
 600		wrqu.data.length = resp_ie_len;
 601		wireless_send_event(wdev->netdev, IWEVASSOCRESPIE,
 602				    &wrqu, resp_ie);
 603	}
 604
 605	memset(&wrqu, 0, sizeof(wrqu));
 606	wrqu.ap_addr.sa_family = ARPHRD_ETHER;
 607	memcpy(wrqu.ap_addr.sa_data, bssid, ETH_ALEN);
 608	memcpy(wdev->wext.prev_bssid, bssid, ETH_ALEN);
 609	wdev->wext.prev_bssid_valid = true;
 610	wireless_send_event(wdev->netdev, SIOCGIWAP, &wrqu, NULL);
 611#endif
 
 
 
 
 612}
 613
 614void cfg80211_roamed(struct net_device *dev,
 615		     struct ieee80211_channel *channel,
 616		     const u8 *bssid,
 617		     const u8 *req_ie, size_t req_ie_len,
 618		     const u8 *resp_ie, size_t resp_ie_len, gfp_t gfp)
 619{
 620	struct wireless_dev *wdev = dev->ieee80211_ptr;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 621	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 622	struct cfg80211_event *ev;
 623	unsigned long flags;
 624
 625	CFG80211_DEV_WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED);
 626
 
 
 
 627	ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
 628	if (!ev)
 
 629		return;
 
 630
 631	ev->type = EVENT_ROAMED;
 632	ev->rm.channel = channel;
 633	memcpy(ev->rm.bssid, bssid, ETH_ALEN);
 634	ev->rm.req_ie = ((u8 *)ev) + sizeof(*ev);
 635	ev->rm.req_ie_len = req_ie_len;
 636	memcpy((void *)ev->rm.req_ie, req_ie, req_ie_len);
 637	ev->rm.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
 638	ev->rm.resp_ie_len = resp_ie_len;
 639	memcpy((void *)ev->rm.resp_ie, resp_ie, resp_ie_len);
 
 640
 641	spin_lock_irqsave(&wdev->event_lock, flags);
 642	list_add_tail(&ev->list, &wdev->event_list);
 643	spin_unlock_irqrestore(&wdev->event_lock, flags);
 644	queue_work(cfg80211_wq, &rdev->event_work);
 645}
 646EXPORT_SYMBOL(cfg80211_roamed);
 647
 648void __cfg80211_disconnected(struct net_device *dev, const u8 *ie,
 649			     size_t ie_len, u16 reason, bool from_ap)
 650{
 651	struct wireless_dev *wdev = dev->ieee80211_ptr;
 652	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 653	int i;
 654#ifdef CONFIG_CFG80211_WEXT
 655	union iwreq_data wrqu;
 656#endif
 657
 658	ASSERT_WDEV_LOCK(wdev);
 659
 660	if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
 661		    wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
 662		return;
 663
 664	if (wdev->sme_state != CFG80211_SME_CONNECTED)
 665		return;
 666
 667	if (wdev->current_bss) {
 668		cfg80211_unhold_bss(wdev->current_bss);
 669		cfg80211_put_bss(&wdev->current_bss->pub);
 670	}
 671
 672	wdev->current_bss = NULL;
 673	wdev->sme_state = CFG80211_SME_IDLE;
 674	wdev->ssid_len = 0;
 675
 676	if (wdev->conn) {
 677		const u8 *bssid;
 678		int ret;
 679
 680		kfree(wdev->conn->ie);
 681		wdev->conn->ie = NULL;
 682		kfree(wdev->conn);
 683		wdev->conn = NULL;
 684
 685		/*
 686		 * If this disconnect was due to a disassoc, we
 687		 * we might still have an auth BSS around. For
 688		 * the userspace SME that's currently expected,
 689		 * but for the kernel SME (nl80211 CONNECT or
 690		 * wireless extensions) we want to clear up all
 691		 * state.
 692		 */
 693		for (i = 0; i < MAX_AUTH_BSSES; i++) {
 694			if (!wdev->auth_bsses[i])
 695				continue;
 696			bssid = wdev->auth_bsses[i]->pub.bssid;
 697			ret = __cfg80211_mlme_deauth(rdev, dev, bssid, NULL, 0,
 698						WLAN_REASON_DEAUTH_LEAVING,
 699						false);
 700			WARN(ret, "deauth failed: %d\n", ret);
 701		}
 702	}
 703
 704	nl80211_send_disconnected(rdev, dev, reason, ie, ie_len, from_ap);
 705
 706	/*
 707	 * Delete all the keys ... pairwise keys can't really
 708	 * exist any more anyway, but default keys might.
 709	 */
 710	if (rdev->ops->del_key)
 711		for (i = 0; i < 6; i++)
 712			rdev->ops->del_key(wdev->wiphy, dev, i, false, NULL);
 713
 714#ifdef CONFIG_CFG80211_WEXT
 715	memset(&wrqu, 0, sizeof(wrqu));
 716	wrqu.ap_addr.sa_family = ARPHRD_ETHER;
 717	wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
 718	wdev->wext.connect.ssid_len = 0;
 719#endif
 720
 721	schedule_work(&cfg80211_disconnect_work);
 722}
 723
 724void cfg80211_disconnected(struct net_device *dev, u16 reason,
 725			   u8 *ie, size_t ie_len, gfp_t gfp)
 726{
 727	struct wireless_dev *wdev = dev->ieee80211_ptr;
 728	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 729	struct cfg80211_event *ev;
 730	unsigned long flags;
 731
 732	CFG80211_DEV_WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED);
 733
 734	ev = kzalloc(sizeof(*ev) + ie_len, gfp);
 735	if (!ev)
 736		return;
 737
 738	ev->type = EVENT_DISCONNECTED;
 739	ev->dc.ie = ((u8 *)ev) + sizeof(*ev);
 740	ev->dc.ie_len = ie_len;
 741	memcpy((void *)ev->dc.ie, ie, ie_len);
 742	ev->dc.reason = reason;
 743
 744	spin_lock_irqsave(&wdev->event_lock, flags);
 745	list_add_tail(&ev->list, &wdev->event_list);
 746	spin_unlock_irqrestore(&wdev->event_lock, flags);
 747	queue_work(cfg80211_wq, &rdev->event_work);
 748}
 749EXPORT_SYMBOL(cfg80211_disconnected);
 750
 751int __cfg80211_connect(struct cfg80211_registered_device *rdev,
 752		       struct net_device *dev,
 753		       struct cfg80211_connect_params *connect,
 754		       struct cfg80211_cached_keys *connkeys,
 755		       const u8 *prev_bssid)
 756{
 757	struct wireless_dev *wdev = dev->ieee80211_ptr;
 758	struct cfg80211_bss *bss = NULL;
 759	int err;
 760
 761	ASSERT_WDEV_LOCK(wdev);
 762
 763	if (wdev->sme_state != CFG80211_SME_IDLE)
 764		return -EALREADY;
 765
 766	if (WARN_ON(wdev->connect_keys)) {
 767		kfree(wdev->connect_keys);
 768		wdev->connect_keys = NULL;
 769	}
 770
 
 
 
 771	if (connkeys && connkeys->def >= 0) {
 772		int idx;
 773		u32 cipher;
 774
 775		idx = connkeys->def;
 776		cipher = connkeys->params[idx].cipher;
 777		/* If given a WEP key we may need it for shared key auth */
 778		if (cipher == WLAN_CIPHER_SUITE_WEP40 ||
 779		    cipher == WLAN_CIPHER_SUITE_WEP104) {
 780			connect->key_idx = idx;
 781			connect->key = connkeys->params[idx].key;
 782			connect->key_len = connkeys->params[idx].key_len;
 783
 784			/*
 785			 * If ciphers are not set (e.g. when going through
 786			 * iwconfig), we have to set them appropriately here.
 787			 */
 788			if (connect->crypto.cipher_group == 0)
 789				connect->crypto.cipher_group = cipher;
 790
 791			if (connect->crypto.n_ciphers_pairwise == 0) {
 792				connect->crypto.n_ciphers_pairwise = 1;
 793				connect->crypto.ciphers_pairwise[0] = cipher;
 794			}
 795		}
 796	}
 797
 798	if (!rdev->ops->connect) {
 799		if (!rdev->ops->auth || !rdev->ops->assoc)
 800			return -EOPNOTSUPP;
 801
 802		if (WARN_ON(wdev->conn))
 803			return -EINPROGRESS;
 804
 805		wdev->conn = kzalloc(sizeof(*wdev->conn), GFP_KERNEL);
 806		if (!wdev->conn)
 807			return -ENOMEM;
 808
 809		/*
 810		 * Copy all parameters, and treat explicitly IEs, BSSID, SSID.
 811		 */
 812		memcpy(&wdev->conn->params, connect, sizeof(*connect));
 813		if (connect->bssid) {
 814			wdev->conn->params.bssid = wdev->conn->bssid;
 815			memcpy(wdev->conn->bssid, connect->bssid, ETH_ALEN);
 816		}
 817
 818		if (connect->ie) {
 819			wdev->conn->ie = kmemdup(connect->ie, connect->ie_len,
 820						GFP_KERNEL);
 821			wdev->conn->params.ie = wdev->conn->ie;
 822			if (!wdev->conn->ie) {
 823				kfree(wdev->conn);
 824				wdev->conn = NULL;
 825				return -ENOMEM;
 826			}
 827		}
 828
 829		if (connect->auth_type == NL80211_AUTHTYPE_AUTOMATIC) {
 830			wdev->conn->auto_auth = true;
 831			/* start with open system ... should mostly work */
 832			wdev->conn->params.auth_type =
 833				NL80211_AUTHTYPE_OPEN_SYSTEM;
 834		} else {
 835			wdev->conn->auto_auth = false;
 836		}
 837
 838		memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
 839		wdev->ssid_len = connect->ssid_len;
 840		wdev->conn->params.ssid = wdev->ssid;
 841		wdev->conn->params.ssid_len = connect->ssid_len;
 842
 843		/* see if we have the bss already */
 844		bss = cfg80211_get_conn_bss(wdev);
 845
 846		wdev->sme_state = CFG80211_SME_CONNECTING;
 847		wdev->connect_keys = connkeys;
 848
 849		if (prev_bssid) {
 850			memcpy(wdev->conn->prev_bssid, prev_bssid, ETH_ALEN);
 851			wdev->conn->prev_bssid_valid = true;
 852		}
 853
 854		/* we're good if we have a matching bss struct */
 855		if (bss) {
 856			wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
 857			err = cfg80211_conn_do_work(wdev);
 858			cfg80211_put_bss(bss);
 859		} else {
 860			/* otherwise we'll need to scan for the AP first */
 861			err = cfg80211_conn_scan(wdev);
 862			/*
 863			 * If we can't scan right now, then we need to scan again
 864			 * after the current scan finished, since the parameters
 865			 * changed (unless we find a good AP anyway).
 866			 */
 867			if (err == -EBUSY) {
 868				err = 0;
 869				wdev->conn->state = CFG80211_CONN_SCAN_AGAIN;
 870			}
 871		}
 872		if (err) {
 873			kfree(wdev->conn->ie);
 874			kfree(wdev->conn);
 875			wdev->conn = NULL;
 876			wdev->sme_state = CFG80211_SME_IDLE;
 877			wdev->connect_keys = NULL;
 878			wdev->ssid_len = 0;
 879		}
 880
 881		return err;
 882	} else {
 883		wdev->sme_state = CFG80211_SME_CONNECTING;
 884		wdev->connect_keys = connkeys;
 885		err = rdev->ops->connect(&rdev->wiphy, dev, connect);
 886		if (err) {
 887			wdev->connect_keys = NULL;
 888			wdev->sme_state = CFG80211_SME_IDLE;
 889			return err;
 890		}
 891
 892		memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
 893		wdev->ssid_len = connect->ssid_len;
 894
 895		return 0;
 896	}
 897}
 898
 899int cfg80211_connect(struct cfg80211_registered_device *rdev,
 900		     struct net_device *dev,
 901		     struct cfg80211_connect_params *connect,
 902		     struct cfg80211_cached_keys *connkeys)
 903{
 904	int err;
 905
 906	mutex_lock(&rdev->devlist_mtx);
 907	wdev_lock(dev->ieee80211_ptr);
 908	err = __cfg80211_connect(rdev, dev, connect, connkeys, NULL);
 909	wdev_unlock(dev->ieee80211_ptr);
 910	mutex_unlock(&rdev->devlist_mtx);
 911
 912	return err;
 913}
 914
 915int __cfg80211_disconnect(struct cfg80211_registered_device *rdev,
 916			  struct net_device *dev, u16 reason, bool wextev)
 917{
 918	struct wireless_dev *wdev = dev->ieee80211_ptr;
 919	int err;
 920
 921	ASSERT_WDEV_LOCK(wdev);
 922
 923	if (wdev->sme_state == CFG80211_SME_IDLE)
 924		return -EINVAL;
 925
 926	kfree(wdev->connect_keys);
 927	wdev->connect_keys = NULL;
 928
 929	if (!rdev->ops->disconnect) {
 930		if (!rdev->ops->deauth)
 931			return -EOPNOTSUPP;
 932
 933		/* was it connected by userspace SME? */
 934		if (!wdev->conn) {
 935			cfg80211_mlme_down(rdev, dev);
 936			return 0;
 937		}
 938
 939		if (wdev->sme_state == CFG80211_SME_CONNECTING &&
 940		    (wdev->conn->state == CFG80211_CONN_SCANNING ||
 941		     wdev->conn->state == CFG80211_CONN_SCAN_AGAIN)) {
 942			wdev->sme_state = CFG80211_SME_IDLE;
 943			kfree(wdev->conn->ie);
 944			kfree(wdev->conn);
 945			wdev->conn = NULL;
 946			wdev->ssid_len = 0;
 947			return 0;
 948		}
 949
 950		/* wdev->conn->params.bssid must be set if > SCANNING */
 951		err = __cfg80211_mlme_deauth(rdev, dev,
 952					     wdev->conn->params.bssid,
 953					     NULL, 0, reason, false);
 954		if (err)
 955			return err;
 956	} else {
 957		err = rdev->ops->disconnect(&rdev->wiphy, dev, reason);
 958		if (err)
 959			return err;
 960	}
 961
 962	if (wdev->sme_state == CFG80211_SME_CONNECTED)
 963		__cfg80211_disconnected(dev, NULL, 0, 0, false);
 964	else if (wdev->sme_state == CFG80211_SME_CONNECTING)
 965		__cfg80211_connect_result(dev, NULL, NULL, 0, NULL, 0,
 966					  WLAN_STATUS_UNSPECIFIED_FAILURE,
 967					  wextev, NULL);
 968
 969	return 0;
 970}
 971
 972int cfg80211_disconnect(struct cfg80211_registered_device *rdev,
 973			struct net_device *dev,
 974			u16 reason, bool wextev)
 975{
 976	int err;
 977
 978	wdev_lock(dev->ieee80211_ptr);
 979	err = __cfg80211_disconnect(rdev, dev, reason, wextev);
 980	wdev_unlock(dev->ieee80211_ptr);
 981
 982	return err;
 983}
 984
 985void cfg80211_sme_disassoc(struct net_device *dev, int idx)
 
 986{
 987	struct wireless_dev *wdev = dev->ieee80211_ptr;
 988	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 989	u8 bssid[ETH_ALEN];
 990
 991	ASSERT_WDEV_LOCK(wdev);
 992
 993	if (!wdev->conn)
 994		return;
 995
 996	if (wdev->conn->state == CFG80211_CONN_IDLE)
 997		return;
 998
 999	/*
1000	 * Ok, so the association was made by this SME -- we don't
1001	 * want it any more so deauthenticate too.
1002	 */
1003
1004	if (!wdev->auth_bsses[idx])
1005		return;
1006
1007	memcpy(bssid, wdev->auth_bsses[idx]->pub.bssid, ETH_ALEN);
1008	if (__cfg80211_mlme_deauth(rdev, dev, bssid,
1009				   NULL, 0, WLAN_REASON_DEAUTH_LEAVING,
1010				   false)) {
1011		/* whatever -- assume gone anyway */
1012		cfg80211_unhold_bss(wdev->auth_bsses[idx]);
1013		cfg80211_put_bss(&wdev->auth_bsses[idx]->pub);
1014		wdev->auth_bsses[idx] = NULL;
1015	}
1016}
v3.5.6
   1/*
   2 * SME code for cfg80211's connect emulation.
   3 *
   4 * Copyright 2009	Johannes Berg <johannes@sipsolutions.net>
   5 * Copyright (C) 2009   Intel Corporation. All rights reserved.
   6 */
   7
   8#include <linux/etherdevice.h>
   9#include <linux/if_arp.h>
  10#include <linux/slab.h>
  11#include <linux/workqueue.h>
  12#include <linux/wireless.h>
  13#include <linux/export.h>
  14#include <net/iw_handler.h>
  15#include <net/cfg80211.h>
  16#include <net/rtnetlink.h>
  17#include "nl80211.h"
  18#include "reg.h"
  19
  20struct cfg80211_conn {
  21	struct cfg80211_connect_params params;
  22	/* these are sub-states of the _CONNECTING sme_state */
  23	enum {
  24		CFG80211_CONN_IDLE,
  25		CFG80211_CONN_SCANNING,
  26		CFG80211_CONN_SCAN_AGAIN,
  27		CFG80211_CONN_AUTHENTICATE_NEXT,
  28		CFG80211_CONN_AUTHENTICATING,
  29		CFG80211_CONN_ASSOCIATE_NEXT,
  30		CFG80211_CONN_ASSOCIATING,
  31		CFG80211_CONN_DEAUTH_ASSOC_FAIL,
  32	} state;
  33	u8 bssid[ETH_ALEN], prev_bssid[ETH_ALEN];
  34	u8 *ie;
  35	size_t ie_len;
  36	bool auto_auth, prev_bssid_valid;
  37};
  38
  39static bool cfg80211_is_all_idle(void)
  40{
  41	struct cfg80211_registered_device *rdev;
  42	struct wireless_dev *wdev;
  43	bool is_all_idle = true;
  44
  45	mutex_lock(&cfg80211_mutex);
  46
  47	/*
  48	 * All devices must be idle as otherwise if you are actively
  49	 * scanning some new beacon hints could be learned and would
  50	 * count as new regulatory hints.
  51	 */
  52	list_for_each_entry(rdev, &cfg80211_rdev_list, list) {
  53		cfg80211_lock_rdev(rdev);
  54		list_for_each_entry(wdev, &rdev->netdev_list, list) {
  55			wdev_lock(wdev);
  56			if (wdev->sme_state != CFG80211_SME_IDLE)
  57				is_all_idle = false;
  58			wdev_unlock(wdev);
  59		}
  60		cfg80211_unlock_rdev(rdev);
  61	}
  62
  63	mutex_unlock(&cfg80211_mutex);
  64
  65	return is_all_idle;
  66}
  67
  68static void disconnect_work(struct work_struct *work)
  69{
  70	if (!cfg80211_is_all_idle())
  71		return;
  72
  73	regulatory_hint_disconnect();
  74}
  75
  76static DECLARE_WORK(cfg80211_disconnect_work, disconnect_work);
  77
  78static int cfg80211_conn_scan(struct wireless_dev *wdev)
  79{
  80	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
  81	struct cfg80211_scan_request *request;
  82	int n_channels, err;
  83
  84	ASSERT_RTNL();
  85	ASSERT_RDEV_LOCK(rdev);
  86	ASSERT_WDEV_LOCK(wdev);
  87
  88	if (rdev->scan_req)
  89		return -EBUSY;
  90
  91	if (wdev->conn->params.channel) {
  92		n_channels = 1;
  93	} else {
  94		enum ieee80211_band band;
  95		n_channels = 0;
  96
  97		for (band = 0; band < IEEE80211_NUM_BANDS; band++) {
  98			if (!wdev->wiphy->bands[band])
  99				continue;
 100			n_channels += wdev->wiphy->bands[band]->n_channels;
 101		}
 102	}
 103	request = kzalloc(sizeof(*request) + sizeof(request->ssids[0]) +
 104			  sizeof(request->channels[0]) * n_channels,
 105			  GFP_KERNEL);
 106	if (!request)
 107		return -ENOMEM;
 108
 109	if (wdev->conn->params.channel)
 110		request->channels[0] = wdev->conn->params.channel;
 111	else {
 112		int i = 0, j;
 113		enum ieee80211_band band;
 114		struct ieee80211_supported_band *bands;
 115		struct ieee80211_channel *channel;
 116
 117		for (band = 0; band < IEEE80211_NUM_BANDS; band++) {
 118			bands = wdev->wiphy->bands[band];
 119			if (!bands)
 120				continue;
 121			for (j = 0; j < bands->n_channels; j++) {
 122				channel = &bands->channels[j];
 123				if (channel->flags & IEEE80211_CHAN_DISABLED)
 124					continue;
 125				request->channels[i++] = channel;
 126			}
 127			request->rates[band] = (1 << bands->n_bitrates) - 1;
 128		}
 129		n_channels = i;
 130	}
 131	request->n_channels = n_channels;
 132	request->ssids = (void *)&request->channels[n_channels];
 133	request->n_ssids = 1;
 134
 135	memcpy(request->ssids[0].ssid, wdev->conn->params.ssid,
 136		wdev->conn->params.ssid_len);
 137	request->ssids[0].ssid_len = wdev->conn->params.ssid_len;
 138
 139	request->dev = wdev->netdev;
 140	request->wiphy = &rdev->wiphy;
 141
 142	rdev->scan_req = request;
 143
 144	err = rdev->ops->scan(wdev->wiphy, wdev->netdev, request);
 145	if (!err) {
 146		wdev->conn->state = CFG80211_CONN_SCANNING;
 147		nl80211_send_scan_start(rdev, wdev->netdev);
 148		dev_hold(wdev->netdev);
 149	} else {
 150		rdev->scan_req = NULL;
 151		kfree(request);
 152	}
 153	return err;
 154}
 155
 156static int cfg80211_conn_do_work(struct wireless_dev *wdev)
 157{
 158	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 159	struct cfg80211_connect_params *params;
 160	const u8 *prev_bssid = NULL;
 161	int err;
 162
 163	ASSERT_WDEV_LOCK(wdev);
 164
 165	if (!wdev->conn)
 166		return 0;
 167
 168	params = &wdev->conn->params;
 169
 170	switch (wdev->conn->state) {
 171	case CFG80211_CONN_SCAN_AGAIN:
 172		return cfg80211_conn_scan(wdev);
 173	case CFG80211_CONN_AUTHENTICATE_NEXT:
 174		BUG_ON(!rdev->ops->auth);
 175		wdev->conn->state = CFG80211_CONN_AUTHENTICATING;
 176		return __cfg80211_mlme_auth(rdev, wdev->netdev,
 177					    params->channel, params->auth_type,
 178					    params->bssid,
 179					    params->ssid, params->ssid_len,
 180					    NULL, 0,
 181					    params->key, params->key_len,
 182					    params->key_idx);
 183	case CFG80211_CONN_ASSOCIATE_NEXT:
 184		BUG_ON(!rdev->ops->assoc);
 185		wdev->conn->state = CFG80211_CONN_ASSOCIATING;
 186		if (wdev->conn->prev_bssid_valid)
 187			prev_bssid = wdev->conn->prev_bssid;
 188		err = __cfg80211_mlme_assoc(rdev, wdev->netdev,
 189					    params->channel, params->bssid,
 190					    prev_bssid,
 191					    params->ssid, params->ssid_len,
 192					    params->ie, params->ie_len,
 193					    false, &params->crypto,
 194					    params->flags, &params->ht_capa,
 195					    &params->ht_capa_mask);
 196		if (err)
 197			__cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
 198					       NULL, 0,
 199					       WLAN_REASON_DEAUTH_LEAVING,
 200					       false);
 201		return err;
 202	case CFG80211_CONN_DEAUTH_ASSOC_FAIL:
 203		__cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
 204				       NULL, 0,
 205				       WLAN_REASON_DEAUTH_LEAVING, false);
 206		/* return an error so that we call __cfg80211_connect_result() */
 207		return -EINVAL;
 208	default:
 209		return 0;
 210	}
 211}
 212
 213void cfg80211_conn_work(struct work_struct *work)
 214{
 215	struct cfg80211_registered_device *rdev =
 216		container_of(work, struct cfg80211_registered_device, conn_work);
 217	struct wireless_dev *wdev;
 218	u8 bssid_buf[ETH_ALEN], *bssid = NULL;
 219
 220	rtnl_lock();
 221	cfg80211_lock_rdev(rdev);
 222	mutex_lock(&rdev->devlist_mtx);
 223
 224	list_for_each_entry(wdev, &rdev->netdev_list, list) {
 225		wdev_lock(wdev);
 226		if (!netif_running(wdev->netdev)) {
 227			wdev_unlock(wdev);
 228			continue;
 229		}
 230		if (wdev->sme_state != CFG80211_SME_CONNECTING) {
 231			wdev_unlock(wdev);
 232			continue;
 233		}
 234		if (wdev->conn->params.bssid) {
 235			memcpy(bssid_buf, wdev->conn->params.bssid, ETH_ALEN);
 236			bssid = bssid_buf;
 237		}
 238		if (cfg80211_conn_do_work(wdev))
 239			__cfg80211_connect_result(
 240					wdev->netdev, bssid,
 241					NULL, 0, NULL, 0,
 242					WLAN_STATUS_UNSPECIFIED_FAILURE,
 243					false, NULL);
 244		wdev_unlock(wdev);
 245	}
 246
 247	mutex_unlock(&rdev->devlist_mtx);
 248	cfg80211_unlock_rdev(rdev);
 249	rtnl_unlock();
 250}
 251
 252static struct cfg80211_bss *cfg80211_get_conn_bss(struct wireless_dev *wdev)
 253{
 254	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 255	struct cfg80211_bss *bss;
 256	u16 capa = WLAN_CAPABILITY_ESS;
 257
 258	ASSERT_WDEV_LOCK(wdev);
 259
 260	if (wdev->conn->params.privacy)
 261		capa |= WLAN_CAPABILITY_PRIVACY;
 262
 263	bss = cfg80211_get_bss(wdev->wiphy, wdev->conn->params.channel,
 264			       wdev->conn->params.bssid,
 265			       wdev->conn->params.ssid,
 266			       wdev->conn->params.ssid_len,
 267			       WLAN_CAPABILITY_ESS | WLAN_CAPABILITY_PRIVACY,
 268			       capa);
 269	if (!bss)
 270		return NULL;
 271
 272	memcpy(wdev->conn->bssid, bss->bssid, ETH_ALEN);
 273	wdev->conn->params.bssid = wdev->conn->bssid;
 274	wdev->conn->params.channel = bss->channel;
 275	wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
 276	schedule_work(&rdev->conn_work);
 277
 278	return bss;
 279}
 280
 281static void __cfg80211_sme_scan_done(struct net_device *dev)
 282{
 283	struct wireless_dev *wdev = dev->ieee80211_ptr;
 284	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 285	struct cfg80211_bss *bss;
 286
 287	ASSERT_WDEV_LOCK(wdev);
 288
 289	if (wdev->sme_state != CFG80211_SME_CONNECTING)
 290		return;
 291
 292	if (!wdev->conn)
 293		return;
 294
 295	if (wdev->conn->state != CFG80211_CONN_SCANNING &&
 296	    wdev->conn->state != CFG80211_CONN_SCAN_AGAIN)
 297		return;
 298
 299	bss = cfg80211_get_conn_bss(wdev);
 300	if (bss) {
 301		cfg80211_put_bss(bss);
 302	} else {
 303		/* not found */
 304		if (wdev->conn->state == CFG80211_CONN_SCAN_AGAIN)
 305			schedule_work(&rdev->conn_work);
 306		else
 307			__cfg80211_connect_result(
 308					wdev->netdev,
 309					wdev->conn->params.bssid,
 310					NULL, 0, NULL, 0,
 311					WLAN_STATUS_UNSPECIFIED_FAILURE,
 312					false, NULL);
 313	}
 314}
 315
 316void cfg80211_sme_scan_done(struct net_device *dev)
 317{
 318	struct wireless_dev *wdev = dev->ieee80211_ptr;
 319
 320	mutex_lock(&wiphy_to_dev(wdev->wiphy)->devlist_mtx);
 321	wdev_lock(wdev);
 322	__cfg80211_sme_scan_done(dev);
 323	wdev_unlock(wdev);
 324	mutex_unlock(&wiphy_to_dev(wdev->wiphy)->devlist_mtx);
 325}
 326
 327void cfg80211_sme_rx_auth(struct net_device *dev,
 328			  const u8 *buf, size_t len)
 329{
 330	struct wireless_dev *wdev = dev->ieee80211_ptr;
 331	struct wiphy *wiphy = wdev->wiphy;
 332	struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
 333	struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
 334	u16 status_code = le16_to_cpu(mgmt->u.auth.status_code);
 335
 336	ASSERT_WDEV_LOCK(wdev);
 337
 338	/* should only RX auth frames when connecting */
 339	if (wdev->sme_state != CFG80211_SME_CONNECTING)
 340		return;
 341
 342	if (WARN_ON(!wdev->conn))
 343		return;
 344
 345	if (status_code == WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG &&
 346	    wdev->conn->auto_auth &&
 347	    wdev->conn->params.auth_type != NL80211_AUTHTYPE_NETWORK_EAP) {
 348		/* select automatically between only open, shared, leap */
 349		switch (wdev->conn->params.auth_type) {
 350		case NL80211_AUTHTYPE_OPEN_SYSTEM:
 351			if (wdev->connect_keys)
 352				wdev->conn->params.auth_type =
 353					NL80211_AUTHTYPE_SHARED_KEY;
 354			else
 355				wdev->conn->params.auth_type =
 356					NL80211_AUTHTYPE_NETWORK_EAP;
 357			break;
 358		case NL80211_AUTHTYPE_SHARED_KEY:
 359			wdev->conn->params.auth_type =
 360				NL80211_AUTHTYPE_NETWORK_EAP;
 361			break;
 362		default:
 363			/* huh? */
 364			wdev->conn->params.auth_type =
 365				NL80211_AUTHTYPE_OPEN_SYSTEM;
 366			break;
 367		}
 368		wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
 369		schedule_work(&rdev->conn_work);
 370	} else if (status_code != WLAN_STATUS_SUCCESS) {
 371		__cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
 372					  status_code, false, NULL);
 373	} else if (wdev->sme_state == CFG80211_SME_CONNECTING &&
 374		 wdev->conn->state == CFG80211_CONN_AUTHENTICATING) {
 375		wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
 376		schedule_work(&rdev->conn_work);
 377	}
 378}
 379
 380bool cfg80211_sme_failed_reassoc(struct wireless_dev *wdev)
 381{
 382	struct wiphy *wiphy = wdev->wiphy;
 383	struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
 384
 385	if (WARN_ON(!wdev->conn))
 386		return false;
 387
 388	if (!wdev->conn->prev_bssid_valid)
 389		return false;
 390
 391	/*
 392	 * Some stupid APs don't accept reassoc, so we
 393	 * need to fall back to trying regular assoc.
 394	 */
 395	wdev->conn->prev_bssid_valid = false;
 396	wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
 397	schedule_work(&rdev->conn_work);
 398
 399	return true;
 400}
 401
 402void cfg80211_sme_failed_assoc(struct wireless_dev *wdev)
 403{
 404	struct wiphy *wiphy = wdev->wiphy;
 405	struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
 406
 407	wdev->conn->state = CFG80211_CONN_DEAUTH_ASSOC_FAIL;
 408	schedule_work(&rdev->conn_work);
 409}
 410
 411void __cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
 412			       const u8 *req_ie, size_t req_ie_len,
 413			       const u8 *resp_ie, size_t resp_ie_len,
 414			       u16 status, bool wextev,
 415			       struct cfg80211_bss *bss)
 416{
 417	struct wireless_dev *wdev = dev->ieee80211_ptr;
 418	u8 *country_ie;
 419#ifdef CONFIG_CFG80211_WEXT
 420	union iwreq_data wrqu;
 421#endif
 422
 423	ASSERT_WDEV_LOCK(wdev);
 424
 425	if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
 426		    wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
 427		return;
 428
 429	if (wdev->sme_state != CFG80211_SME_CONNECTING)
 430		return;
 431
 432	nl80211_send_connect_result(wiphy_to_dev(wdev->wiphy), dev,
 433				    bssid, req_ie, req_ie_len,
 434				    resp_ie, resp_ie_len,
 435				    status, GFP_KERNEL);
 436
 437#ifdef CONFIG_CFG80211_WEXT
 438	if (wextev) {
 439		if (req_ie && status == WLAN_STATUS_SUCCESS) {
 440			memset(&wrqu, 0, sizeof(wrqu));
 441			wrqu.data.length = req_ie_len;
 442			wireless_send_event(dev, IWEVASSOCREQIE, &wrqu, req_ie);
 443		}
 444
 445		if (resp_ie && status == WLAN_STATUS_SUCCESS) {
 446			memset(&wrqu, 0, sizeof(wrqu));
 447			wrqu.data.length = resp_ie_len;
 448			wireless_send_event(dev, IWEVASSOCRESPIE, &wrqu, resp_ie);
 449		}
 450
 451		memset(&wrqu, 0, sizeof(wrqu));
 452		wrqu.ap_addr.sa_family = ARPHRD_ETHER;
 453		if (bssid && status == WLAN_STATUS_SUCCESS) {
 454			memcpy(wrqu.ap_addr.sa_data, bssid, ETH_ALEN);
 455			memcpy(wdev->wext.prev_bssid, bssid, ETH_ALEN);
 456			wdev->wext.prev_bssid_valid = true;
 457		}
 458		wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
 459	}
 460#endif
 461
 462	if (wdev->current_bss) {
 463		cfg80211_unhold_bss(wdev->current_bss);
 464		cfg80211_put_bss(&wdev->current_bss->pub);
 465		wdev->current_bss = NULL;
 466	}
 467
 468	if (wdev->conn)
 469		wdev->conn->state = CFG80211_CONN_IDLE;
 470
 471	if (status != WLAN_STATUS_SUCCESS) {
 472		wdev->sme_state = CFG80211_SME_IDLE;
 473		if (wdev->conn)
 474			kfree(wdev->conn->ie);
 475		kfree(wdev->conn);
 476		wdev->conn = NULL;
 477		kfree(wdev->connect_keys);
 478		wdev->connect_keys = NULL;
 479		wdev->ssid_len = 0;
 480		cfg80211_put_bss(bss);
 481		return;
 482	}
 483
 484	if (!bss)
 485		bss = cfg80211_get_bss(wdev->wiphy,
 486				       wdev->conn ? wdev->conn->params.channel :
 487				       NULL,
 488				       bssid,
 489				       wdev->ssid, wdev->ssid_len,
 490				       WLAN_CAPABILITY_ESS,
 491				       WLAN_CAPABILITY_ESS);
 492
 493	if (WARN_ON(!bss))
 494		return;
 495
 496	cfg80211_hold_bss(bss_from_pub(bss));
 497	wdev->current_bss = bss_from_pub(bss);
 498
 499	wdev->sme_state = CFG80211_SME_CONNECTED;
 500	cfg80211_upload_connect_keys(wdev);
 501
 502	country_ie = (u8 *) ieee80211_bss_get_ie(bss, WLAN_EID_COUNTRY);
 503
 504	if (!country_ie)
 505		return;
 506
 507	/*
 508	 * ieee80211_bss_get_ie() ensures we can access:
 509	 * - country_ie + 2, the start of the country ie data, and
 510	 * - and country_ie[1] which is the IE length
 511	 */
 512	regulatory_hint_11d(wdev->wiphy,
 513			    bss->channel->band,
 514			    country_ie + 2,
 515			    country_ie[1]);
 516}
 517
 518void cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
 519			     const u8 *req_ie, size_t req_ie_len,
 520			     const u8 *resp_ie, size_t resp_ie_len,
 521			     u16 status, gfp_t gfp)
 522{
 523	struct wireless_dev *wdev = dev->ieee80211_ptr;
 524	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 525	struct cfg80211_event *ev;
 526	unsigned long flags;
 527
 528	CFG80211_DEV_WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTING);
 529
 530	ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
 531	if (!ev)
 532		return;
 533
 534	ev->type = EVENT_CONNECT_RESULT;
 535	if (bssid)
 536		memcpy(ev->cr.bssid, bssid, ETH_ALEN);
 537	if (req_ie_len) {
 538		ev->cr.req_ie = ((u8 *)ev) + sizeof(*ev);
 539		ev->cr.req_ie_len = req_ie_len;
 540		memcpy((void *)ev->cr.req_ie, req_ie, req_ie_len);
 541	}
 542	if (resp_ie_len) {
 543		ev->cr.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
 544		ev->cr.resp_ie_len = resp_ie_len;
 545		memcpy((void *)ev->cr.resp_ie, resp_ie, resp_ie_len);
 546	}
 547	ev->cr.status = status;
 548
 549	spin_lock_irqsave(&wdev->event_lock, flags);
 550	list_add_tail(&ev->list, &wdev->event_list);
 551	spin_unlock_irqrestore(&wdev->event_lock, flags);
 552	queue_work(cfg80211_wq, &rdev->event_work);
 553}
 554EXPORT_SYMBOL(cfg80211_connect_result);
 555
 556void __cfg80211_roamed(struct wireless_dev *wdev,
 557		       struct cfg80211_bss *bss,
 
 558		       const u8 *req_ie, size_t req_ie_len,
 559		       const u8 *resp_ie, size_t resp_ie_len)
 560{
 
 561#ifdef CONFIG_CFG80211_WEXT
 562	union iwreq_data wrqu;
 563#endif
 
 564	ASSERT_WDEV_LOCK(wdev);
 565
 566	if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
 567		    wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
 568		goto out;
 569
 570	if (wdev->sme_state != CFG80211_SME_CONNECTED)
 571		goto out;
 572
 573	/* internal error -- how did we get to CONNECTED w/o BSS? */
 574	if (WARN_ON(!wdev->current_bss)) {
 575		goto out;
 576	}
 577
 578	cfg80211_unhold_bss(wdev->current_bss);
 579	cfg80211_put_bss(&wdev->current_bss->pub);
 580	wdev->current_bss = NULL;
 581
 
 
 
 
 
 
 
 582	cfg80211_hold_bss(bss_from_pub(bss));
 583	wdev->current_bss = bss_from_pub(bss);
 584
 585	nl80211_send_roamed(wiphy_to_dev(wdev->wiphy), wdev->netdev, bss->bssid,
 586			    req_ie, req_ie_len, resp_ie, resp_ie_len,
 587			    GFP_KERNEL);
 588
 589#ifdef CONFIG_CFG80211_WEXT
 590	if (req_ie) {
 591		memset(&wrqu, 0, sizeof(wrqu));
 592		wrqu.data.length = req_ie_len;
 593		wireless_send_event(wdev->netdev, IWEVASSOCREQIE,
 594				    &wrqu, req_ie);
 595	}
 596
 597	if (resp_ie) {
 598		memset(&wrqu, 0, sizeof(wrqu));
 599		wrqu.data.length = resp_ie_len;
 600		wireless_send_event(wdev->netdev, IWEVASSOCRESPIE,
 601				    &wrqu, resp_ie);
 602	}
 603
 604	memset(&wrqu, 0, sizeof(wrqu));
 605	wrqu.ap_addr.sa_family = ARPHRD_ETHER;
 606	memcpy(wrqu.ap_addr.sa_data, bss->bssid, ETH_ALEN);
 607	memcpy(wdev->wext.prev_bssid, bss->bssid, ETH_ALEN);
 608	wdev->wext.prev_bssid_valid = true;
 609	wireless_send_event(wdev->netdev, SIOCGIWAP, &wrqu, NULL);
 610#endif
 611
 612	return;
 613out:
 614	cfg80211_put_bss(bss);
 615}
 616
 617void cfg80211_roamed(struct net_device *dev,
 618		     struct ieee80211_channel *channel,
 619		     const u8 *bssid,
 620		     const u8 *req_ie, size_t req_ie_len,
 621		     const u8 *resp_ie, size_t resp_ie_len, gfp_t gfp)
 622{
 623	struct wireless_dev *wdev = dev->ieee80211_ptr;
 624	struct cfg80211_bss *bss;
 625
 626	CFG80211_DEV_WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED);
 627
 628	bss = cfg80211_get_bss(wdev->wiphy, channel, bssid, wdev->ssid,
 629			       wdev->ssid_len, WLAN_CAPABILITY_ESS,
 630			       WLAN_CAPABILITY_ESS);
 631	if (WARN_ON(!bss))
 632		return;
 633
 634	cfg80211_roamed_bss(dev, bss, req_ie, req_ie_len, resp_ie,
 635			    resp_ie_len, gfp);
 636}
 637EXPORT_SYMBOL(cfg80211_roamed);
 638
 639void cfg80211_roamed_bss(struct net_device *dev,
 640			 struct cfg80211_bss *bss, const u8 *req_ie,
 641			 size_t req_ie_len, const u8 *resp_ie,
 642			 size_t resp_ie_len, gfp_t gfp)
 643{
 644	struct wireless_dev *wdev = dev->ieee80211_ptr;
 645	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 646	struct cfg80211_event *ev;
 647	unsigned long flags;
 648
 649	CFG80211_DEV_WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED);
 650
 651	if (WARN_ON(!bss))
 652		return;
 653
 654	ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
 655	if (!ev) {
 656		cfg80211_put_bss(bss);
 657		return;
 658	}
 659
 660	ev->type = EVENT_ROAMED;
 
 
 661	ev->rm.req_ie = ((u8 *)ev) + sizeof(*ev);
 662	ev->rm.req_ie_len = req_ie_len;
 663	memcpy((void *)ev->rm.req_ie, req_ie, req_ie_len);
 664	ev->rm.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
 665	ev->rm.resp_ie_len = resp_ie_len;
 666	memcpy((void *)ev->rm.resp_ie, resp_ie, resp_ie_len);
 667	ev->rm.bss = bss;
 668
 669	spin_lock_irqsave(&wdev->event_lock, flags);
 670	list_add_tail(&ev->list, &wdev->event_list);
 671	spin_unlock_irqrestore(&wdev->event_lock, flags);
 672	queue_work(cfg80211_wq, &rdev->event_work);
 673}
 674EXPORT_SYMBOL(cfg80211_roamed_bss);
 675
 676void __cfg80211_disconnected(struct net_device *dev, const u8 *ie,
 677			     size_t ie_len, u16 reason, bool from_ap)
 678{
 679	struct wireless_dev *wdev = dev->ieee80211_ptr;
 680	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 681	int i;
 682#ifdef CONFIG_CFG80211_WEXT
 683	union iwreq_data wrqu;
 684#endif
 685
 686	ASSERT_WDEV_LOCK(wdev);
 687
 688	if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
 689		    wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
 690		return;
 691
 692	if (wdev->sme_state != CFG80211_SME_CONNECTED)
 693		return;
 694
 695	if (wdev->current_bss) {
 696		cfg80211_unhold_bss(wdev->current_bss);
 697		cfg80211_put_bss(&wdev->current_bss->pub);
 698	}
 699
 700	wdev->current_bss = NULL;
 701	wdev->sme_state = CFG80211_SME_IDLE;
 702	wdev->ssid_len = 0;
 703
 704	if (wdev->conn) {
 
 
 
 705		kfree(wdev->conn->ie);
 706		wdev->conn->ie = NULL;
 707		kfree(wdev->conn);
 708		wdev->conn = NULL;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 709	}
 710
 711	nl80211_send_disconnected(rdev, dev, reason, ie, ie_len, from_ap);
 712
 713	/*
 714	 * Delete all the keys ... pairwise keys can't really
 715	 * exist any more anyway, but default keys might.
 716	 */
 717	if (rdev->ops->del_key)
 718		for (i = 0; i < 6; i++)
 719			rdev->ops->del_key(wdev->wiphy, dev, i, false, NULL);
 720
 721#ifdef CONFIG_CFG80211_WEXT
 722	memset(&wrqu, 0, sizeof(wrqu));
 723	wrqu.ap_addr.sa_family = ARPHRD_ETHER;
 724	wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
 725	wdev->wext.connect.ssid_len = 0;
 726#endif
 727
 728	schedule_work(&cfg80211_disconnect_work);
 729}
 730
 731void cfg80211_disconnected(struct net_device *dev, u16 reason,
 732			   u8 *ie, size_t ie_len, gfp_t gfp)
 733{
 734	struct wireless_dev *wdev = dev->ieee80211_ptr;
 735	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
 736	struct cfg80211_event *ev;
 737	unsigned long flags;
 738
 739	CFG80211_DEV_WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED);
 740
 741	ev = kzalloc(sizeof(*ev) + ie_len, gfp);
 742	if (!ev)
 743		return;
 744
 745	ev->type = EVENT_DISCONNECTED;
 746	ev->dc.ie = ((u8 *)ev) + sizeof(*ev);
 747	ev->dc.ie_len = ie_len;
 748	memcpy((void *)ev->dc.ie, ie, ie_len);
 749	ev->dc.reason = reason;
 750
 751	spin_lock_irqsave(&wdev->event_lock, flags);
 752	list_add_tail(&ev->list, &wdev->event_list);
 753	spin_unlock_irqrestore(&wdev->event_lock, flags);
 754	queue_work(cfg80211_wq, &rdev->event_work);
 755}
 756EXPORT_SYMBOL(cfg80211_disconnected);
 757
 758int __cfg80211_connect(struct cfg80211_registered_device *rdev,
 759		       struct net_device *dev,
 760		       struct cfg80211_connect_params *connect,
 761		       struct cfg80211_cached_keys *connkeys,
 762		       const u8 *prev_bssid)
 763{
 764	struct wireless_dev *wdev = dev->ieee80211_ptr;
 765	struct cfg80211_bss *bss = NULL;
 766	int err;
 767
 768	ASSERT_WDEV_LOCK(wdev);
 769
 770	if (wdev->sme_state != CFG80211_SME_IDLE)
 771		return -EALREADY;
 772
 773	if (WARN_ON(wdev->connect_keys)) {
 774		kfree(wdev->connect_keys);
 775		wdev->connect_keys = NULL;
 776	}
 777
 778	cfg80211_oper_and_ht_capa(&connect->ht_capa_mask,
 779				  rdev->wiphy.ht_capa_mod_mask);
 780
 781	if (connkeys && connkeys->def >= 0) {
 782		int idx;
 783		u32 cipher;
 784
 785		idx = connkeys->def;
 786		cipher = connkeys->params[idx].cipher;
 787		/* If given a WEP key we may need it for shared key auth */
 788		if (cipher == WLAN_CIPHER_SUITE_WEP40 ||
 789		    cipher == WLAN_CIPHER_SUITE_WEP104) {
 790			connect->key_idx = idx;
 791			connect->key = connkeys->params[idx].key;
 792			connect->key_len = connkeys->params[idx].key_len;
 793
 794			/*
 795			 * If ciphers are not set (e.g. when going through
 796			 * iwconfig), we have to set them appropriately here.
 797			 */
 798			if (connect->crypto.cipher_group == 0)
 799				connect->crypto.cipher_group = cipher;
 800
 801			if (connect->crypto.n_ciphers_pairwise == 0) {
 802				connect->crypto.n_ciphers_pairwise = 1;
 803				connect->crypto.ciphers_pairwise[0] = cipher;
 804			}
 805		}
 806	}
 807
 808	if (!rdev->ops->connect) {
 809		if (!rdev->ops->auth || !rdev->ops->assoc)
 810			return -EOPNOTSUPP;
 811
 812		if (WARN_ON(wdev->conn))
 813			return -EINPROGRESS;
 814
 815		wdev->conn = kzalloc(sizeof(*wdev->conn), GFP_KERNEL);
 816		if (!wdev->conn)
 817			return -ENOMEM;
 818
 819		/*
 820		 * Copy all parameters, and treat explicitly IEs, BSSID, SSID.
 821		 */
 822		memcpy(&wdev->conn->params, connect, sizeof(*connect));
 823		if (connect->bssid) {
 824			wdev->conn->params.bssid = wdev->conn->bssid;
 825			memcpy(wdev->conn->bssid, connect->bssid, ETH_ALEN);
 826		}
 827
 828		if (connect->ie) {
 829			wdev->conn->ie = kmemdup(connect->ie, connect->ie_len,
 830						GFP_KERNEL);
 831			wdev->conn->params.ie = wdev->conn->ie;
 832			if (!wdev->conn->ie) {
 833				kfree(wdev->conn);
 834				wdev->conn = NULL;
 835				return -ENOMEM;
 836			}
 837		}
 838
 839		if (connect->auth_type == NL80211_AUTHTYPE_AUTOMATIC) {
 840			wdev->conn->auto_auth = true;
 841			/* start with open system ... should mostly work */
 842			wdev->conn->params.auth_type =
 843				NL80211_AUTHTYPE_OPEN_SYSTEM;
 844		} else {
 845			wdev->conn->auto_auth = false;
 846		}
 847
 848		memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
 849		wdev->ssid_len = connect->ssid_len;
 850		wdev->conn->params.ssid = wdev->ssid;
 851		wdev->conn->params.ssid_len = connect->ssid_len;
 852
 853		/* see if we have the bss already */
 854		bss = cfg80211_get_conn_bss(wdev);
 855
 856		wdev->sme_state = CFG80211_SME_CONNECTING;
 857		wdev->connect_keys = connkeys;
 858
 859		if (prev_bssid) {
 860			memcpy(wdev->conn->prev_bssid, prev_bssid, ETH_ALEN);
 861			wdev->conn->prev_bssid_valid = true;
 862		}
 863
 864		/* we're good if we have a matching bss struct */
 865		if (bss) {
 866			wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
 867			err = cfg80211_conn_do_work(wdev);
 868			cfg80211_put_bss(bss);
 869		} else {
 870			/* otherwise we'll need to scan for the AP first */
 871			err = cfg80211_conn_scan(wdev);
 872			/*
 873			 * If we can't scan right now, then we need to scan again
 874			 * after the current scan finished, since the parameters
 875			 * changed (unless we find a good AP anyway).
 876			 */
 877			if (err == -EBUSY) {
 878				err = 0;
 879				wdev->conn->state = CFG80211_CONN_SCAN_AGAIN;
 880			}
 881		}
 882		if (err) {
 883			kfree(wdev->conn->ie);
 884			kfree(wdev->conn);
 885			wdev->conn = NULL;
 886			wdev->sme_state = CFG80211_SME_IDLE;
 887			wdev->connect_keys = NULL;
 888			wdev->ssid_len = 0;
 889		}
 890
 891		return err;
 892	} else {
 893		wdev->sme_state = CFG80211_SME_CONNECTING;
 894		wdev->connect_keys = connkeys;
 895		err = rdev->ops->connect(&rdev->wiphy, dev, connect);
 896		if (err) {
 897			wdev->connect_keys = NULL;
 898			wdev->sme_state = CFG80211_SME_IDLE;
 899			return err;
 900		}
 901
 902		memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
 903		wdev->ssid_len = connect->ssid_len;
 904
 905		return 0;
 906	}
 907}
 908
 909int cfg80211_connect(struct cfg80211_registered_device *rdev,
 910		     struct net_device *dev,
 911		     struct cfg80211_connect_params *connect,
 912		     struct cfg80211_cached_keys *connkeys)
 913{
 914	int err;
 915
 916	mutex_lock(&rdev->devlist_mtx);
 917	wdev_lock(dev->ieee80211_ptr);
 918	err = __cfg80211_connect(rdev, dev, connect, connkeys, NULL);
 919	wdev_unlock(dev->ieee80211_ptr);
 920	mutex_unlock(&rdev->devlist_mtx);
 921
 922	return err;
 923}
 924
 925int __cfg80211_disconnect(struct cfg80211_registered_device *rdev,
 926			  struct net_device *dev, u16 reason, bool wextev)
 927{
 928	struct wireless_dev *wdev = dev->ieee80211_ptr;
 929	int err;
 930
 931	ASSERT_WDEV_LOCK(wdev);
 932
 933	if (wdev->sme_state == CFG80211_SME_IDLE)
 934		return -EINVAL;
 935
 936	kfree(wdev->connect_keys);
 937	wdev->connect_keys = NULL;
 938
 939	if (!rdev->ops->disconnect) {
 940		if (!rdev->ops->deauth)
 941			return -EOPNOTSUPP;
 942
 943		/* was it connected by userspace SME? */
 944		if (!wdev->conn) {
 945			cfg80211_mlme_down(rdev, dev);
 946			return 0;
 947		}
 948
 949		if (wdev->sme_state == CFG80211_SME_CONNECTING &&
 950		    (wdev->conn->state == CFG80211_CONN_SCANNING ||
 951		     wdev->conn->state == CFG80211_CONN_SCAN_AGAIN)) {
 952			wdev->sme_state = CFG80211_SME_IDLE;
 953			kfree(wdev->conn->ie);
 954			kfree(wdev->conn);
 955			wdev->conn = NULL;
 956			wdev->ssid_len = 0;
 957			return 0;
 958		}
 959
 960		/* wdev->conn->params.bssid must be set if > SCANNING */
 961		err = __cfg80211_mlme_deauth(rdev, dev,
 962					     wdev->conn->params.bssid,
 963					     NULL, 0, reason, false);
 964		if (err)
 965			return err;
 966	} else {
 967		err = rdev->ops->disconnect(&rdev->wiphy, dev, reason);
 968		if (err)
 969			return err;
 970	}
 971
 972	if (wdev->sme_state == CFG80211_SME_CONNECTED)
 973		__cfg80211_disconnected(dev, NULL, 0, 0, false);
 974	else if (wdev->sme_state == CFG80211_SME_CONNECTING)
 975		__cfg80211_connect_result(dev, NULL, NULL, 0, NULL, 0,
 976					  WLAN_STATUS_UNSPECIFIED_FAILURE,
 977					  wextev, NULL);
 978
 979	return 0;
 980}
 981
 982int cfg80211_disconnect(struct cfg80211_registered_device *rdev,
 983			struct net_device *dev,
 984			u16 reason, bool wextev)
 985{
 986	int err;
 987
 988	wdev_lock(dev->ieee80211_ptr);
 989	err = __cfg80211_disconnect(rdev, dev, reason, wextev);
 990	wdev_unlock(dev->ieee80211_ptr);
 991
 992	return err;
 993}
 994
 995void cfg80211_sme_disassoc(struct net_device *dev,
 996			   struct cfg80211_internal_bss *bss)
 997{
 998	struct wireless_dev *wdev = dev->ieee80211_ptr;
 999	struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
1000	u8 bssid[ETH_ALEN];
1001
1002	ASSERT_WDEV_LOCK(wdev);
1003
1004	if (!wdev->conn)
1005		return;
1006
1007	if (wdev->conn->state == CFG80211_CONN_IDLE)
1008		return;
1009
1010	/*
1011	 * Ok, so the association was made by this SME -- we don't
1012	 * want it any more so deauthenticate too.
1013	 */
1014
1015	memcpy(bssid, bss->pub.bssid, ETH_ALEN);
 
1016
1017	__cfg80211_mlme_deauth(rdev, dev, bssid, NULL, 0,
1018			       WLAN_REASON_DEAUTH_LEAVING, false);
 
 
 
 
 
 
 
1019}