pandora: defconfig: update
[pandora-kernel.git] / net / wireless / sme.c
1 /*
2  * SME code for cfg80211's connect emulation.
3  *
4  * Copyright 2009       Johannes Berg <johannes@sipsolutions.net>
5  * Copyright (C) 2009   Intel Corporation. All rights reserved.
6  */
7
8 #include <linux/etherdevice.h>
9 #include <linux/if_arp.h>
10 #include <linux/slab.h>
11 #include <linux/workqueue.h>
12 #include <linux/wireless.h>
13 #include <linux/export.h>
14 #include <net/iw_handler.h>
15 #include <net/cfg80211.h>
16 #include <net/rtnetlink.h>
17 #include "nl80211.h"
18 #include "reg.h"
19
20 struct cfg80211_conn {
21         struct cfg80211_connect_params params;
22         /* these are sub-states of the _CONNECTING sme_state */
23         enum {
24                 CFG80211_CONN_IDLE,
25                 CFG80211_CONN_SCANNING,
26                 CFG80211_CONN_SCAN_AGAIN,
27                 CFG80211_CONN_AUTHENTICATE_NEXT,
28                 CFG80211_CONN_AUTHENTICATING,
29                 CFG80211_CONN_ASSOCIATE_NEXT,
30                 CFG80211_CONN_ASSOCIATING,
31                 CFG80211_CONN_DEAUTH_ASSOC_FAIL,
32         } state;
33         u8 bssid[ETH_ALEN], prev_bssid[ETH_ALEN];
34         u8 *ie;
35         size_t ie_len;
36         bool auto_auth, prev_bssid_valid;
37 };
38
39 static bool cfg80211_is_all_idle(void)
40 {
41         struct cfg80211_registered_device *rdev;
42         struct wireless_dev *wdev;
43         bool is_all_idle = true;
44
45         mutex_lock(&cfg80211_mutex);
46
47         /*
48          * All devices must be idle as otherwise if you are actively
49          * scanning some new beacon hints could be learned and would
50          * count as new regulatory hints.
51          */
52         list_for_each_entry(rdev, &cfg80211_rdev_list, list) {
53                 cfg80211_lock_rdev(rdev);
54                 list_for_each_entry(wdev, &rdev->netdev_list, list) {
55                         wdev_lock(wdev);
56                         if (wdev->sme_state != CFG80211_SME_IDLE)
57                                 is_all_idle = false;
58                         wdev_unlock(wdev);
59                 }
60                 cfg80211_unlock_rdev(rdev);
61         }
62
63         mutex_unlock(&cfg80211_mutex);
64
65         return is_all_idle;
66 }
67
68 static void disconnect_work(struct work_struct *work)
69 {
70         if (!cfg80211_is_all_idle())
71                 return;
72
73         regulatory_hint_disconnect();
74 }
75
76 static DECLARE_WORK(cfg80211_disconnect_work, disconnect_work);
77
78 static int cfg80211_conn_scan(struct wireless_dev *wdev)
79 {
80         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
81         struct cfg80211_scan_request *request;
82         int n_channels, err;
83
84         ASSERT_RTNL();
85         ASSERT_RDEV_LOCK(rdev);
86         ASSERT_WDEV_LOCK(wdev);
87
88         if (rdev->scan_req)
89                 return -EBUSY;
90
91         if (wdev->conn->params.channel) {
92                 n_channels = 1;
93         } else {
94                 enum ieee80211_band band;
95                 n_channels = 0;
96
97                 for (band = 0; band < IEEE80211_NUM_BANDS; band++) {
98                         if (!wdev->wiphy->bands[band])
99                                 continue;
100                         n_channels += wdev->wiphy->bands[band]->n_channels;
101                 }
102         }
103         request = kzalloc(sizeof(*request) + sizeof(request->ssids[0]) +
104                           sizeof(request->channels[0]) * n_channels,
105                           GFP_KERNEL);
106         if (!request)
107                 return -ENOMEM;
108
109         if (wdev->conn->params.channel)
110                 request->channels[0] = wdev->conn->params.channel;
111         else {
112                 int i = 0, j;
113                 enum ieee80211_band band;
114                 struct ieee80211_supported_band *bands;
115                 struct ieee80211_channel *channel;
116
117                 for (band = 0; band < IEEE80211_NUM_BANDS; band++) {
118                         bands = wdev->wiphy->bands[band];
119                         if (!bands)
120                                 continue;
121                         for (j = 0; j < bands->n_channels; j++) {
122                                 channel = &bands->channels[j];
123                                 if (channel->flags & IEEE80211_CHAN_DISABLED)
124                                         continue;
125                                 request->channels[i++] = channel;
126                         }
127                         request->rates[band] = (1 << bands->n_bitrates) - 1;
128                 }
129                 n_channels = i;
130         }
131         request->n_channels = n_channels;
132         request->ssids = (void *)&request->channels[n_channels];
133         request->n_ssids = 1;
134
135         memcpy(request->ssids[0].ssid, wdev->conn->params.ssid,
136                 wdev->conn->params.ssid_len);
137         request->ssids[0].ssid_len = wdev->conn->params.ssid_len;
138
139         request->dev = wdev->netdev;
140         request->wiphy = &rdev->wiphy;
141
142         rdev->scan_req = request;
143
144         err = rdev->ops->scan(wdev->wiphy, wdev->netdev, request);
145         if (!err) {
146                 wdev->conn->state = CFG80211_CONN_SCANNING;
147                 nl80211_send_scan_start(rdev, wdev->netdev);
148                 dev_hold(wdev->netdev);
149         } else {
150                 rdev->scan_req = NULL;
151                 kfree(request);
152         }
153         return err;
154 }
155
156 static int cfg80211_conn_do_work(struct wireless_dev *wdev)
157 {
158         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
159         struct cfg80211_connect_params *params;
160         const u8 *prev_bssid = NULL;
161         int err;
162
163         ASSERT_WDEV_LOCK(wdev);
164
165         if (!wdev->conn)
166                 return 0;
167
168         params = &wdev->conn->params;
169
170         switch (wdev->conn->state) {
171         case CFG80211_CONN_SCAN_AGAIN:
172                 return cfg80211_conn_scan(wdev);
173         case CFG80211_CONN_AUTHENTICATE_NEXT:
174                 BUG_ON(!rdev->ops->auth);
175                 wdev->conn->state = CFG80211_CONN_AUTHENTICATING;
176                 return __cfg80211_mlme_auth(rdev, wdev->netdev,
177                                             params->channel, params->auth_type,
178                                             params->bssid,
179                                             params->ssid, params->ssid_len,
180                                             NULL, 0,
181                                             params->key, params->key_len,
182                                             params->key_idx, false);
183         case CFG80211_CONN_ASSOCIATE_NEXT:
184                 BUG_ON(!rdev->ops->assoc);
185                 wdev->conn->state = CFG80211_CONN_ASSOCIATING;
186                 if (wdev->conn->prev_bssid_valid)
187                         prev_bssid = wdev->conn->prev_bssid;
188                 err = __cfg80211_mlme_assoc(rdev, wdev->netdev,
189                                             params->channel, params->bssid,
190                                             prev_bssid,
191                                             params->ssid, params->ssid_len,
192                                             params->ie, params->ie_len,
193                                             false, &params->crypto);
194                 if (err)
195                         __cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
196                                                NULL, 0,
197                                                WLAN_REASON_DEAUTH_LEAVING,
198                                                false);
199                 return err;
200         case CFG80211_CONN_DEAUTH_ASSOC_FAIL:
201                 __cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
202                                        NULL, 0,
203                                        WLAN_REASON_DEAUTH_LEAVING, false);
204                 /* return an error so that we call __cfg80211_connect_result() */
205                 return -EINVAL;
206         default:
207                 return 0;
208         }
209 }
210
211 void cfg80211_conn_work(struct work_struct *work)
212 {
213         struct cfg80211_registered_device *rdev =
214                 container_of(work, struct cfg80211_registered_device, conn_work);
215         struct wireless_dev *wdev;
216         u8 bssid_buf[ETH_ALEN], *bssid = NULL;
217
218         rtnl_lock();
219         cfg80211_lock_rdev(rdev);
220         mutex_lock(&rdev->devlist_mtx);
221
222         list_for_each_entry(wdev, &rdev->netdev_list, list) {
223                 if (!wdev->netdev)
224                         continue;
225
226                 wdev_lock(wdev);
227                 if (!netif_running(wdev->netdev)) {
228                         wdev_unlock(wdev);
229                         continue;
230                 }
231                 if (wdev->sme_state != CFG80211_SME_CONNECTING) {
232                         wdev_unlock(wdev);
233                         continue;
234                 }
235                 if (wdev->conn->params.bssid) {
236                         memcpy(bssid_buf, wdev->conn->params.bssid, ETH_ALEN);
237                         bssid = bssid_buf;
238                 }
239                 if (cfg80211_conn_do_work(wdev))
240                         __cfg80211_connect_result(
241                                         wdev->netdev, bssid,
242                                         NULL, 0, NULL, 0,
243                                         WLAN_STATUS_UNSPECIFIED_FAILURE,
244                                         false, NULL);
245                 wdev_unlock(wdev);
246         }
247
248         mutex_unlock(&rdev->devlist_mtx);
249         cfg80211_unlock_rdev(rdev);
250         rtnl_unlock();
251 }
252
253 static struct cfg80211_bss *cfg80211_get_conn_bss(struct wireless_dev *wdev)
254 {
255         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
256         struct cfg80211_bss *bss;
257         u16 capa = WLAN_CAPABILITY_ESS;
258
259         ASSERT_WDEV_LOCK(wdev);
260
261         if (wdev->conn->params.privacy)
262                 capa |= WLAN_CAPABILITY_PRIVACY;
263
264         bss = cfg80211_get_bss(wdev->wiphy, wdev->conn->params.channel,
265                                wdev->conn->params.bssid,
266                                wdev->conn->params.ssid,
267                                wdev->conn->params.ssid_len,
268                                WLAN_CAPABILITY_ESS | WLAN_CAPABILITY_PRIVACY,
269                                capa);
270         if (!bss)
271                 return NULL;
272
273         memcpy(wdev->conn->bssid, bss->bssid, ETH_ALEN);
274         wdev->conn->params.bssid = wdev->conn->bssid;
275         wdev->conn->params.channel = bss->channel;
276         wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
277         schedule_work(&rdev->conn_work);
278
279         return bss;
280 }
281
282 static void __cfg80211_sme_scan_done(struct net_device *dev)
283 {
284         struct wireless_dev *wdev = dev->ieee80211_ptr;
285         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
286         struct cfg80211_bss *bss;
287
288         ASSERT_WDEV_LOCK(wdev);
289
290         if (wdev->sme_state != CFG80211_SME_CONNECTING)
291                 return;
292
293         if (!wdev->conn)
294                 return;
295
296         if (wdev->conn->state != CFG80211_CONN_SCANNING &&
297             wdev->conn->state != CFG80211_CONN_SCAN_AGAIN)
298                 return;
299
300         bss = cfg80211_get_conn_bss(wdev);
301         if (bss) {
302                 cfg80211_put_bss(bss);
303         } else {
304                 /* not found */
305                 if (wdev->conn->state == CFG80211_CONN_SCAN_AGAIN)
306                         schedule_work(&rdev->conn_work);
307                 else
308                         __cfg80211_connect_result(
309                                         wdev->netdev,
310                                         wdev->conn->params.bssid,
311                                         NULL, 0, NULL, 0,
312                                         WLAN_STATUS_UNSPECIFIED_FAILURE,
313                                         false, NULL);
314         }
315 }
316
317 void cfg80211_sme_scan_done(struct net_device *dev)
318 {
319         struct wireless_dev *wdev = dev->ieee80211_ptr;
320
321         mutex_lock(&wiphy_to_dev(wdev->wiphy)->devlist_mtx);
322         wdev_lock(wdev);
323         __cfg80211_sme_scan_done(dev);
324         wdev_unlock(wdev);
325         mutex_unlock(&wiphy_to_dev(wdev->wiphy)->devlist_mtx);
326 }
327
328 void cfg80211_sme_rx_auth(struct net_device *dev,
329                           const u8 *buf, size_t len)
330 {
331         struct wireless_dev *wdev = dev->ieee80211_ptr;
332         struct wiphy *wiphy = wdev->wiphy;
333         struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
334         struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
335         u16 status_code = le16_to_cpu(mgmt->u.auth.status_code);
336
337         ASSERT_WDEV_LOCK(wdev);
338
339         /* should only RX auth frames when connecting */
340         if (wdev->sme_state != CFG80211_SME_CONNECTING)
341                 return;
342
343         if (WARN_ON(!wdev->conn))
344                 return;
345
346         if (status_code == WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG &&
347             wdev->conn->auto_auth &&
348             wdev->conn->params.auth_type != NL80211_AUTHTYPE_NETWORK_EAP) {
349                 /* select automatically between only open, shared, leap */
350                 switch (wdev->conn->params.auth_type) {
351                 case NL80211_AUTHTYPE_OPEN_SYSTEM:
352                         if (wdev->connect_keys)
353                                 wdev->conn->params.auth_type =
354                                         NL80211_AUTHTYPE_SHARED_KEY;
355                         else
356                                 wdev->conn->params.auth_type =
357                                         NL80211_AUTHTYPE_NETWORK_EAP;
358                         break;
359                 case NL80211_AUTHTYPE_SHARED_KEY:
360                         wdev->conn->params.auth_type =
361                                 NL80211_AUTHTYPE_NETWORK_EAP;
362                         break;
363                 default:
364                         /* huh? */
365                         wdev->conn->params.auth_type =
366                                 NL80211_AUTHTYPE_OPEN_SYSTEM;
367                         break;
368                 }
369                 wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
370                 schedule_work(&rdev->conn_work);
371         } else if (status_code != WLAN_STATUS_SUCCESS) {
372                 __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
373                                           status_code, false, NULL);
374         } else if (wdev->sme_state == CFG80211_SME_CONNECTING &&
375                  wdev->conn->state == CFG80211_CONN_AUTHENTICATING) {
376                 wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
377                 schedule_work(&rdev->conn_work);
378         }
379 }
380
381 bool cfg80211_sme_failed_reassoc(struct wireless_dev *wdev)
382 {
383         struct wiphy *wiphy = wdev->wiphy;
384         struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
385
386         if (WARN_ON(!wdev->conn))
387                 return false;
388
389         if (!wdev->conn->prev_bssid_valid)
390                 return false;
391
392         /*
393          * Some stupid APs don't accept reassoc, so we
394          * need to fall back to trying regular assoc.
395          */
396         wdev->conn->prev_bssid_valid = false;
397         wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
398         schedule_work(&rdev->conn_work);
399
400         return true;
401 }
402
403 void cfg80211_sme_failed_assoc(struct wireless_dev *wdev)
404 {
405         struct wiphy *wiphy = wdev->wiphy;
406         struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
407
408         wdev->conn->state = CFG80211_CONN_DEAUTH_ASSOC_FAIL;
409         schedule_work(&rdev->conn_work);
410 }
411
412 void __cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
413                                const u8 *req_ie, size_t req_ie_len,
414                                const u8 *resp_ie, size_t resp_ie_len,
415                                u16 status, bool wextev,
416                                struct cfg80211_bss *bss)
417 {
418         struct wireless_dev *wdev = dev->ieee80211_ptr;
419         u8 *country_ie;
420 #ifdef CONFIG_CFG80211_WEXT
421         union iwreq_data wrqu;
422 #endif
423
424         ASSERT_WDEV_LOCK(wdev);
425
426         if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
427                     wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
428                 return;
429
430         if (wdev->sme_state != CFG80211_SME_CONNECTING)
431                 return;
432
433         nl80211_send_connect_result(wiphy_to_dev(wdev->wiphy), dev,
434                                     bssid, req_ie, req_ie_len,
435                                     resp_ie, resp_ie_len,
436                                     status, GFP_KERNEL);
437
438 #ifdef CONFIG_CFG80211_WEXT
439         if (wextev) {
440                 if (req_ie && status == WLAN_STATUS_SUCCESS) {
441                         memset(&wrqu, 0, sizeof(wrqu));
442                         wrqu.data.length = req_ie_len;
443                         wireless_send_event(dev, IWEVASSOCREQIE, &wrqu, req_ie);
444                 }
445
446                 if (resp_ie && status == WLAN_STATUS_SUCCESS) {
447                         memset(&wrqu, 0, sizeof(wrqu));
448                         wrqu.data.length = resp_ie_len;
449                         wireless_send_event(dev, IWEVASSOCRESPIE, &wrqu, resp_ie);
450                 }
451
452                 memset(&wrqu, 0, sizeof(wrqu));
453                 wrqu.ap_addr.sa_family = ARPHRD_ETHER;
454                 if (bssid && status == WLAN_STATUS_SUCCESS) {
455                         memcpy(wrqu.ap_addr.sa_data, bssid, ETH_ALEN);
456                         memcpy(wdev->wext.prev_bssid, bssid, ETH_ALEN);
457                         wdev->wext.prev_bssid_valid = true;
458                 }
459                 wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
460         }
461 #endif
462
463         if (wdev->current_bss) {
464                 cfg80211_unhold_bss(wdev->current_bss);
465                 cfg80211_put_bss(&wdev->current_bss->pub);
466                 wdev->current_bss = NULL;
467         }
468
469         if (wdev->conn)
470                 wdev->conn->state = CFG80211_CONN_IDLE;
471
472         if (status != WLAN_STATUS_SUCCESS) {
473                 wdev->sme_state = CFG80211_SME_IDLE;
474                 if (wdev->conn)
475                         kfree(wdev->conn->ie);
476                 kfree(wdev->conn);
477                 wdev->conn = NULL;
478                 kfree(wdev->connect_keys);
479                 wdev->connect_keys = NULL;
480                 wdev->ssid_len = 0;
481                 return;
482         }
483
484         if (!bss)
485                 bss = cfg80211_get_bss(wdev->wiphy,
486                                        wdev->conn ? wdev->conn->params.channel :
487                                        NULL,
488                                        bssid,
489                                        wdev->ssid, wdev->ssid_len,
490                                        WLAN_CAPABILITY_ESS,
491                                        WLAN_CAPABILITY_ESS);
492
493         if (WARN_ON(!bss))
494                 return;
495
496         cfg80211_hold_bss(bss_from_pub(bss));
497         wdev->current_bss = bss_from_pub(bss);
498
499         wdev->sme_state = CFG80211_SME_CONNECTED;
500         cfg80211_upload_connect_keys(wdev);
501
502         country_ie = (u8 *) ieee80211_bss_get_ie(bss, WLAN_EID_COUNTRY);
503
504         if (!country_ie)
505                 return;
506
507         /*
508          * ieee80211_bss_get_ie() ensures we can access:
509          * - country_ie + 2, the start of the country ie data, and
510          * - and country_ie[1] which is the IE length
511          */
512         regulatory_hint_11d(wdev->wiphy,
513                             bss->channel->band,
514                             country_ie + 2,
515                             country_ie[1]);
516 }
517
518 void cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
519                              const u8 *req_ie, size_t req_ie_len,
520                              const u8 *resp_ie, size_t resp_ie_len,
521                              u16 status, gfp_t gfp)
522 {
523         struct wireless_dev *wdev = dev->ieee80211_ptr;
524         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
525         struct cfg80211_event *ev;
526         unsigned long flags;
527
528         CFG80211_DEV_WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTING);
529
530         ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
531         if (!ev)
532                 return;
533
534         ev->type = EVENT_CONNECT_RESULT;
535         if (bssid)
536                 memcpy(ev->cr.bssid, bssid, ETH_ALEN);
537         if (req_ie_len) {
538                 ev->cr.req_ie = ((u8 *)ev) + sizeof(*ev);
539                 ev->cr.req_ie_len = req_ie_len;
540                 memcpy((void *)ev->cr.req_ie, req_ie, req_ie_len);
541         }
542         if (resp_ie_len) {
543                 ev->cr.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
544                 ev->cr.resp_ie_len = resp_ie_len;
545                 memcpy((void *)ev->cr.resp_ie, resp_ie, resp_ie_len);
546         }
547         ev->cr.status = status;
548
549         spin_lock_irqsave(&wdev->event_lock, flags);
550         list_add_tail(&ev->list, &wdev->event_list);
551         spin_unlock_irqrestore(&wdev->event_lock, flags);
552         queue_work(cfg80211_wq, &rdev->event_work);
553 }
554 EXPORT_SYMBOL(cfg80211_connect_result);
555
556 void __cfg80211_roamed(struct wireless_dev *wdev,
557                        struct ieee80211_channel *channel,
558                        const u8 *bssid,
559                        const u8 *req_ie, size_t req_ie_len,
560                        const u8 *resp_ie, size_t resp_ie_len)
561 {
562         struct cfg80211_bss *bss;
563 #ifdef CONFIG_CFG80211_WEXT
564         union iwreq_data wrqu;
565 #endif
566
567         ASSERT_WDEV_LOCK(wdev);
568
569         if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
570                     wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
571                 return;
572
573         if (wdev->sme_state != CFG80211_SME_CONNECTED)
574                 return;
575
576         /* internal error -- how did we get to CONNECTED w/o BSS? */
577         if (WARN_ON(!wdev->current_bss)) {
578                 return;
579         }
580
581         cfg80211_unhold_bss(wdev->current_bss);
582         cfg80211_put_bss(&wdev->current_bss->pub);
583         wdev->current_bss = NULL;
584
585         bss = cfg80211_get_bss(wdev->wiphy, channel, bssid,
586                                wdev->ssid, wdev->ssid_len,
587                                WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
588
589         if (WARN_ON(!bss))
590                 return;
591
592         cfg80211_hold_bss(bss_from_pub(bss));
593         wdev->current_bss = bss_from_pub(bss);
594
595         nl80211_send_roamed(wiphy_to_dev(wdev->wiphy), wdev->netdev, bssid,
596                             req_ie, req_ie_len, resp_ie, resp_ie_len,
597                             GFP_KERNEL);
598
599 #ifdef CONFIG_CFG80211_WEXT
600         if (req_ie) {
601                 memset(&wrqu, 0, sizeof(wrqu));
602                 wrqu.data.length = req_ie_len;
603                 wireless_send_event(wdev->netdev, IWEVASSOCREQIE,
604                                     &wrqu, req_ie);
605         }
606
607         if (resp_ie) {
608                 memset(&wrqu, 0, sizeof(wrqu));
609                 wrqu.data.length = resp_ie_len;
610                 wireless_send_event(wdev->netdev, IWEVASSOCRESPIE,
611                                     &wrqu, resp_ie);
612         }
613
614         memset(&wrqu, 0, sizeof(wrqu));
615         wrqu.ap_addr.sa_family = ARPHRD_ETHER;
616         memcpy(wrqu.ap_addr.sa_data, bssid, ETH_ALEN);
617         memcpy(wdev->wext.prev_bssid, bssid, ETH_ALEN);
618         wdev->wext.prev_bssid_valid = true;
619         wireless_send_event(wdev->netdev, SIOCGIWAP, &wrqu, NULL);
620 #endif
621 }
622
623 void cfg80211_roamed(struct net_device *dev,
624                      struct ieee80211_channel *channel,
625                      const u8 *bssid,
626                      const u8 *req_ie, size_t req_ie_len,
627                      const u8 *resp_ie, size_t resp_ie_len, gfp_t gfp)
628 {
629         struct wireless_dev *wdev = dev->ieee80211_ptr;
630         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
631         struct cfg80211_event *ev;
632         unsigned long flags;
633
634         CFG80211_DEV_WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED);
635
636         ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
637         if (!ev)
638                 return;
639
640         ev->type = EVENT_ROAMED;
641         ev->rm.channel = channel;
642         memcpy(ev->rm.bssid, bssid, ETH_ALEN);
643         ev->rm.req_ie = ((u8 *)ev) + sizeof(*ev);
644         ev->rm.req_ie_len = req_ie_len;
645         memcpy((void *)ev->rm.req_ie, req_ie, req_ie_len);
646         ev->rm.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
647         ev->rm.resp_ie_len = resp_ie_len;
648         memcpy((void *)ev->rm.resp_ie, resp_ie, resp_ie_len);
649
650         spin_lock_irqsave(&wdev->event_lock, flags);
651         list_add_tail(&ev->list, &wdev->event_list);
652         spin_unlock_irqrestore(&wdev->event_lock, flags);
653         queue_work(cfg80211_wq, &rdev->event_work);
654 }
655 EXPORT_SYMBOL(cfg80211_roamed);
656
657 void __cfg80211_disconnected(struct net_device *dev, const u8 *ie,
658                              size_t ie_len, u16 reason, bool from_ap)
659 {
660         struct wireless_dev *wdev = dev->ieee80211_ptr;
661         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
662         int i;
663 #ifdef CONFIG_CFG80211_WEXT
664         union iwreq_data wrqu;
665 #endif
666
667         ASSERT_WDEV_LOCK(wdev);
668
669         if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION &&
670                     wdev->iftype != NL80211_IFTYPE_P2P_CLIENT))
671                 return;
672
673         if (wdev->sme_state != CFG80211_SME_CONNECTED)
674                 return;
675
676         if (wdev->current_bss) {
677                 cfg80211_unhold_bss(wdev->current_bss);
678                 cfg80211_put_bss(&wdev->current_bss->pub);
679         }
680
681         wdev->current_bss = NULL;
682         wdev->sme_state = CFG80211_SME_IDLE;
683         wdev->ssid_len = 0;
684
685         if (wdev->conn) {
686                 const u8 *bssid;
687                 int ret;
688
689                 kfree(wdev->conn->ie);
690                 wdev->conn->ie = NULL;
691                 kfree(wdev->conn);
692                 wdev->conn = NULL;
693
694                 /*
695                  * If this disconnect was due to a disassoc, we
696                  * we might still have an auth BSS around. For
697                  * the userspace SME that's currently expected,
698                  * but for the kernel SME (nl80211 CONNECT or
699                  * wireless extensions) we want to clear up all
700                  * state.
701                  */
702                 for (i = 0; i < MAX_AUTH_BSSES; i++) {
703                         if (!wdev->auth_bsses[i])
704                                 continue;
705                         bssid = wdev->auth_bsses[i]->pub.bssid;
706                         ret = __cfg80211_mlme_deauth(rdev, dev, bssid, NULL, 0,
707                                                 WLAN_REASON_DEAUTH_LEAVING,
708                                                 false);
709                         WARN(ret, "deauth failed: %d\n", ret);
710                 }
711         }
712
713         nl80211_send_disconnected(rdev, dev, reason, ie, ie_len, from_ap);
714
715         /*
716          * Delete all the keys ... pairwise keys can't really
717          * exist any more anyway, but default keys might.
718          */
719         if (rdev->ops->del_key)
720                 for (i = 0; i < 6; i++)
721                         rdev->ops->del_key(wdev->wiphy, dev, i, false, NULL);
722
723 #ifdef CONFIG_CFG80211_WEXT
724         memset(&wrqu, 0, sizeof(wrqu));
725         wrqu.ap_addr.sa_family = ARPHRD_ETHER;
726         wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
727         wdev->wext.connect.ssid_len = 0;
728 #endif
729
730         schedule_work(&cfg80211_disconnect_work);
731 }
732
733 void cfg80211_disconnected(struct net_device *dev, u16 reason,
734                            u8 *ie, size_t ie_len, gfp_t gfp)
735 {
736         struct wireless_dev *wdev = dev->ieee80211_ptr;
737         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
738         struct cfg80211_event *ev;
739         unsigned long flags;
740
741         CFG80211_DEV_WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED);
742
743         ev = kzalloc(sizeof(*ev) + ie_len, gfp);
744         if (!ev)
745                 return;
746
747         ev->type = EVENT_DISCONNECTED;
748         ev->dc.ie = ((u8 *)ev) + sizeof(*ev);
749         ev->dc.ie_len = ie_len;
750         memcpy((void *)ev->dc.ie, ie, ie_len);
751         ev->dc.reason = reason;
752
753         spin_lock_irqsave(&wdev->event_lock, flags);
754         list_add_tail(&ev->list, &wdev->event_list);
755         spin_unlock_irqrestore(&wdev->event_lock, flags);
756         queue_work(cfg80211_wq, &rdev->event_work);
757 }
758 EXPORT_SYMBOL(cfg80211_disconnected);
759
760 int __cfg80211_connect(struct cfg80211_registered_device *rdev,
761                        struct net_device *dev,
762                        struct cfg80211_connect_params *connect,
763                        struct cfg80211_cached_keys *connkeys,
764                        const u8 *prev_bssid)
765 {
766         struct wireless_dev *wdev = dev->ieee80211_ptr;
767         struct cfg80211_bss *bss = NULL;
768         int err;
769
770         ASSERT_WDEV_LOCK(wdev);
771
772         if (wdev->sme_state != CFG80211_SME_IDLE)
773                 return -EALREADY;
774
775         if (WARN_ON(wdev->connect_keys)) {
776                 kfree(wdev->connect_keys);
777                 wdev->connect_keys = NULL;
778         }
779
780         if (connkeys && connkeys->def >= 0) {
781                 int idx;
782                 u32 cipher;
783
784                 idx = connkeys->def;
785                 cipher = connkeys->params[idx].cipher;
786                 /* If given a WEP key we may need it for shared key auth */
787                 if (cipher == WLAN_CIPHER_SUITE_WEP40 ||
788                     cipher == WLAN_CIPHER_SUITE_WEP104) {
789                         connect->key_idx = idx;
790                         connect->key = connkeys->params[idx].key;
791                         connect->key_len = connkeys->params[idx].key_len;
792
793                         /*
794                          * If ciphers are not set (e.g. when going through
795                          * iwconfig), we have to set them appropriately here.
796                          */
797                         if (connect->crypto.cipher_group == 0)
798                                 connect->crypto.cipher_group = cipher;
799
800                         if (connect->crypto.n_ciphers_pairwise == 0) {
801                                 connect->crypto.n_ciphers_pairwise = 1;
802                                 connect->crypto.ciphers_pairwise[0] = cipher;
803                         }
804                 }
805         }
806
807         if (!rdev->ops->connect) {
808                 if (!rdev->ops->auth || !rdev->ops->assoc)
809                         return -EOPNOTSUPP;
810
811                 if (WARN_ON(wdev->conn))
812                         return -EINPROGRESS;
813
814                 wdev->conn = kzalloc(sizeof(*wdev->conn), GFP_KERNEL);
815                 if (!wdev->conn)
816                         return -ENOMEM;
817
818                 /*
819                  * Copy all parameters, and treat explicitly IEs, BSSID, SSID.
820                  */
821                 memcpy(&wdev->conn->params, connect, sizeof(*connect));
822                 if (connect->bssid) {
823                         wdev->conn->params.bssid = wdev->conn->bssid;
824                         memcpy(wdev->conn->bssid, connect->bssid, ETH_ALEN);
825                 }
826
827                 if (connect->ie) {
828                         wdev->conn->ie = kmemdup(connect->ie, connect->ie_len,
829                                                 GFP_KERNEL);
830                         wdev->conn->params.ie = wdev->conn->ie;
831                         if (!wdev->conn->ie) {
832                                 kfree(wdev->conn);
833                                 wdev->conn = NULL;
834                                 return -ENOMEM;
835                         }
836                 }
837
838                 if (connect->auth_type == NL80211_AUTHTYPE_AUTOMATIC) {
839                         wdev->conn->auto_auth = true;
840                         /* start with open system ... should mostly work */
841                         wdev->conn->params.auth_type =
842                                 NL80211_AUTHTYPE_OPEN_SYSTEM;
843                 } else {
844                         wdev->conn->auto_auth = false;
845                 }
846
847                 memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
848                 wdev->ssid_len = connect->ssid_len;
849                 wdev->conn->params.ssid = wdev->ssid;
850                 wdev->conn->params.ssid_len = connect->ssid_len;
851
852                 /* see if we have the bss already */
853                 bss = cfg80211_get_conn_bss(wdev);
854
855                 wdev->sme_state = CFG80211_SME_CONNECTING;
856                 wdev->connect_keys = connkeys;
857
858                 if (prev_bssid) {
859                         memcpy(wdev->conn->prev_bssid, prev_bssid, ETH_ALEN);
860                         wdev->conn->prev_bssid_valid = true;
861                 }
862
863                 /* we're good if we have a matching bss struct */
864                 if (bss) {
865                         wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
866                         err = cfg80211_conn_do_work(wdev);
867                         cfg80211_put_bss(bss);
868                 } else {
869                         /* otherwise we'll need to scan for the AP first */
870                         err = cfg80211_conn_scan(wdev);
871                         /*
872                          * If we can't scan right now, then we need to scan again
873                          * after the current scan finished, since the parameters
874                          * changed (unless we find a good AP anyway).
875                          */
876                         if (err == -EBUSY) {
877                                 err = 0;
878                                 wdev->conn->state = CFG80211_CONN_SCAN_AGAIN;
879                         }
880                 }
881                 if (err) {
882                         kfree(wdev->conn->ie);
883                         kfree(wdev->conn);
884                         wdev->conn = NULL;
885                         wdev->sme_state = CFG80211_SME_IDLE;
886                         wdev->connect_keys = NULL;
887                         wdev->ssid_len = 0;
888                 }
889
890                 return err;
891         } else {
892                 wdev->sme_state = CFG80211_SME_CONNECTING;
893                 wdev->connect_keys = connkeys;
894                 err = rdev->ops->connect(&rdev->wiphy, dev, connect);
895                 if (err) {
896                         wdev->connect_keys = NULL;
897                         wdev->sme_state = CFG80211_SME_IDLE;
898                         return err;
899                 }
900
901                 memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
902                 wdev->ssid_len = connect->ssid_len;
903
904                 return 0;
905         }
906 }
907
908 int cfg80211_connect(struct cfg80211_registered_device *rdev,
909                      struct net_device *dev,
910                      struct cfg80211_connect_params *connect,
911                      struct cfg80211_cached_keys *connkeys)
912 {
913         int err;
914
915         mutex_lock(&rdev->devlist_mtx);
916         wdev_lock(dev->ieee80211_ptr);
917         err = __cfg80211_connect(rdev, dev, connect, connkeys, NULL);
918         wdev_unlock(dev->ieee80211_ptr);
919         mutex_unlock(&rdev->devlist_mtx);
920
921         return err;
922 }
923
924 int __cfg80211_disconnect(struct cfg80211_registered_device *rdev,
925                           struct net_device *dev, u16 reason, bool wextev)
926 {
927         struct wireless_dev *wdev = dev->ieee80211_ptr;
928         int err;
929
930         ASSERT_WDEV_LOCK(wdev);
931
932         if (wdev->sme_state == CFG80211_SME_IDLE)
933                 return -EINVAL;
934
935         kfree(wdev->connect_keys);
936         wdev->connect_keys = NULL;
937
938         if (!rdev->ops->disconnect) {
939                 if (!rdev->ops->deauth)
940                         return -EOPNOTSUPP;
941
942                 /* was it connected by userspace SME? */
943                 if (!wdev->conn) {
944                         cfg80211_mlme_down(rdev, dev);
945                         return 0;
946                 }
947
948                 if (wdev->sme_state == CFG80211_SME_CONNECTING &&
949                     (wdev->conn->state == CFG80211_CONN_SCANNING ||
950                      wdev->conn->state == CFG80211_CONN_SCAN_AGAIN)) {
951                         wdev->sme_state = CFG80211_SME_IDLE;
952                         kfree(wdev->conn->ie);
953                         kfree(wdev->conn);
954                         wdev->conn = NULL;
955                         wdev->ssid_len = 0;
956                         return 0;
957                 }
958
959                 /* wdev->conn->params.bssid must be set if > SCANNING */
960                 err = __cfg80211_mlme_deauth(rdev, dev,
961                                              wdev->conn->params.bssid,
962                                              NULL, 0, reason, false);
963                 if (err)
964                         return err;
965         } else {
966                 err = rdev->ops->disconnect(&rdev->wiphy, dev, reason);
967                 if (err)
968                         return err;
969         }
970
971         if (wdev->sme_state == CFG80211_SME_CONNECTED)
972                 __cfg80211_disconnected(dev, NULL, 0, 0, false);
973         else if (wdev->sme_state == CFG80211_SME_CONNECTING)
974                 __cfg80211_connect_result(dev, NULL, NULL, 0, NULL, 0,
975                                           WLAN_STATUS_UNSPECIFIED_FAILURE,
976                                           wextev, NULL);
977
978         return 0;
979 }
980
981 int cfg80211_disconnect(struct cfg80211_registered_device *rdev,
982                         struct net_device *dev,
983                         u16 reason, bool wextev)
984 {
985         int err;
986
987         wdev_lock(dev->ieee80211_ptr);
988         err = __cfg80211_disconnect(rdev, dev, reason, wextev);
989         wdev_unlock(dev->ieee80211_ptr);
990
991         return err;
992 }
993
994 void cfg80211_sme_disassoc(struct net_device *dev, int idx)
995 {
996         struct wireless_dev *wdev = dev->ieee80211_ptr;
997         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
998         u8 bssid[ETH_ALEN];
999
1000         ASSERT_WDEV_LOCK(wdev);
1001
1002         if (!wdev->conn)
1003                 return;
1004
1005         if (wdev->conn->state == CFG80211_CONN_IDLE)
1006                 return;
1007
1008         /*
1009          * Ok, so the association was made by this SME -- we don't
1010          * want it any more so deauthenticate too.
1011          */
1012
1013         if (!wdev->auth_bsses[idx])
1014                 return;
1015
1016         memcpy(bssid, wdev->auth_bsses[idx]->pub.bssid, ETH_ALEN);
1017         if (__cfg80211_mlme_deauth(rdev, dev, bssid,
1018                                    NULL, 0, WLAN_REASON_DEAUTH_LEAVING,
1019                                    false)) {
1020                 /* whatever -- assume gone anyway */
1021                 cfg80211_unhold_bss(wdev->auth_bsses[idx]);
1022                 cfg80211_put_bss(&wdev->auth_bsses[idx]->pub);
1023                 wdev->auth_bsses[idx] = NULL;
1024         }
1025 }