2 * cfg80211 MLME SAP interface
4 * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
7 #include <linux/kernel.h>
8 #include <linux/module.h>
9 #include <linux/netdevice.h>
10 #include <linux/nl80211.h>
11 #include <linux/wireless.h>
12 #include <net/cfg80211.h>
13 #include <net/iw_handler.h>
17 void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len)
19 struct wireless_dev *wdev = dev->ieee80211_ptr;
20 struct wiphy *wiphy = wdev->wiphy;
21 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
22 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
23 u8 *bssid = mgmt->bssid;
25 u16 status = le16_to_cpu(mgmt->u.auth.status_code);
30 for (i = 0; i < MAX_AUTH_BSSES; i++) {
31 if (wdev->authtry_bsses[i] &&
32 memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid,
34 if (status == WLAN_STATUS_SUCCESS) {
35 wdev->auth_bsses[i] = wdev->authtry_bsses[i];
37 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
38 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
40 wdev->authtry_bsses[i] = NULL;
48 nl80211_send_rx_auth(rdev, dev, buf, len, GFP_KERNEL);
49 cfg80211_sme_rx_auth(dev, buf, len);
53 EXPORT_SYMBOL(cfg80211_send_rx_auth);
55 void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len)
58 struct wireless_dev *wdev = dev->ieee80211_ptr;
59 struct wiphy *wiphy = wdev->wiphy;
60 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
61 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
62 u8 *ie = mgmt->u.assoc_resp.variable;
63 int i, ieoffs = offsetof(struct ieee80211_mgmt, u.assoc_resp.variable);
64 struct cfg80211_internal_bss *bss = NULL;
68 status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code);
71 * This is a bit of a hack, we don't notify userspace of
72 * a (re-)association reply if we tried to send a reassoc
73 * and got a reject -- we only try again with an assoc
74 * frame instead of reassoc.
76 if (status_code != WLAN_STATUS_SUCCESS && wdev->conn &&
77 cfg80211_sme_failed_reassoc(wdev))
80 nl80211_send_rx_assoc(rdev, dev, buf, len, GFP_KERNEL);
82 if (status_code == WLAN_STATUS_SUCCESS) {
83 for (i = 0; i < MAX_AUTH_BSSES; i++) {
84 if (!wdev->auth_bsses[i])
86 if (memcmp(wdev->auth_bsses[i]->pub.bssid, mgmt->bssid,
88 bss = wdev->auth_bsses[i];
89 wdev->auth_bsses[i] = NULL;
90 /* additional reference to drop hold */
91 cfg80211_ref_bss(bss);
99 /* this consumes one bss reference (unless bss is NULL) */
100 __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs,
102 status_code == WLAN_STATUS_SUCCESS,
103 bss ? &bss->pub : NULL);
104 /* drop hold now, and also reference acquired above */
106 cfg80211_unhold_bss(bss);
107 cfg80211_put_bss(&bss->pub);
113 EXPORT_SYMBOL(cfg80211_send_rx_assoc);
115 static void __cfg80211_send_deauth(struct net_device *dev,
116 const u8 *buf, size_t len)
118 struct wireless_dev *wdev = dev->ieee80211_ptr;
119 struct wiphy *wiphy = wdev->wiphy;
120 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
121 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
122 const u8 *bssid = mgmt->bssid;
126 ASSERT_WDEV_LOCK(wdev);
128 nl80211_send_deauth(rdev, dev, buf, len, GFP_KERNEL);
130 if (wdev->current_bss &&
131 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
133 cfg80211_unhold_bss(wdev->current_bss);
134 cfg80211_put_bss(&wdev->current_bss->pub);
135 wdev->current_bss = NULL;
136 } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
137 if (wdev->auth_bsses[i] &&
138 memcmp(wdev->auth_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
139 cfg80211_unhold_bss(wdev->auth_bsses[i]);
140 cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
141 wdev->auth_bsses[i] = NULL;
145 if (wdev->authtry_bsses[i] &&
146 memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
147 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
148 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
149 wdev->authtry_bsses[i] = NULL;
157 if (wdev->sme_state == CFG80211_SME_CONNECTED) {
161 reason_code = le16_to_cpu(mgmt->u.deauth.reason_code);
163 from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0;
164 __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
165 } else if (wdev->sme_state == CFG80211_SME_CONNECTING) {
166 __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
167 WLAN_STATUS_UNSPECIFIED_FAILURE,
173 void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len,
176 struct wireless_dev *wdev = dev->ieee80211_ptr;
178 BUG_ON(cookie && wdev != cookie);
181 /* called within callback */
182 __cfg80211_send_deauth(dev, buf, len);
185 __cfg80211_send_deauth(dev, buf, len);
189 EXPORT_SYMBOL(cfg80211_send_deauth);
191 static void __cfg80211_send_disassoc(struct net_device *dev,
192 const u8 *buf, size_t len)
194 struct wireless_dev *wdev = dev->ieee80211_ptr;
195 struct wiphy *wiphy = wdev->wiphy;
196 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
197 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
198 const u8 *bssid = mgmt->bssid;
204 ASSERT_WDEV_LOCK(wdev);
206 nl80211_send_disassoc(rdev, dev, buf, len, GFP_KERNEL);
208 if (wdev->sme_state != CFG80211_SME_CONNECTED)
211 if (wdev->current_bss &&
212 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
213 for (i = 0; i < MAX_AUTH_BSSES; i++) {
214 if (wdev->authtry_bsses[i] || wdev->auth_bsses[i])
216 wdev->auth_bsses[i] = wdev->current_bss;
217 wdev->current_bss = NULL;
219 cfg80211_sme_disassoc(dev, i);
227 reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code);
229 from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0;
230 __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
233 void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len,
236 struct wireless_dev *wdev = dev->ieee80211_ptr;
238 BUG_ON(cookie && wdev != cookie);
241 /* called within callback */
242 __cfg80211_send_disassoc(dev, buf, len);
245 __cfg80211_send_disassoc(dev, buf, len);
249 EXPORT_SYMBOL(cfg80211_send_disassoc);
251 void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr)
253 struct wireless_dev *wdev = dev->ieee80211_ptr;
254 struct wiphy *wiphy = wdev->wiphy;
255 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
261 nl80211_send_auth_timeout(rdev, dev, addr, GFP_KERNEL);
262 if (wdev->sme_state == CFG80211_SME_CONNECTING)
263 __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
264 WLAN_STATUS_UNSPECIFIED_FAILURE,
267 for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
268 if (wdev->authtry_bsses[i] &&
269 memcmp(wdev->authtry_bsses[i]->pub.bssid,
270 addr, ETH_ALEN) == 0) {
271 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
272 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
273 wdev->authtry_bsses[i] = NULL;
283 EXPORT_SYMBOL(cfg80211_send_auth_timeout);
285 void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr)
287 struct wireless_dev *wdev = dev->ieee80211_ptr;
288 struct wiphy *wiphy = wdev->wiphy;
289 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
295 nl80211_send_assoc_timeout(rdev, dev, addr, GFP_KERNEL);
296 if (wdev->sme_state == CFG80211_SME_CONNECTING)
297 __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
298 WLAN_STATUS_UNSPECIFIED_FAILURE,
301 for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
302 if (wdev->auth_bsses[i] &&
303 memcmp(wdev->auth_bsses[i]->pub.bssid,
304 addr, ETH_ALEN) == 0) {
305 cfg80211_unhold_bss(wdev->auth_bsses[i]);
306 cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
307 wdev->auth_bsses[i] = NULL;
317 EXPORT_SYMBOL(cfg80211_send_assoc_timeout);
319 void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr,
320 enum nl80211_key_type key_type, int key_id,
321 const u8 *tsc, gfp_t gfp)
323 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
324 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
325 #ifdef CONFIG_WIRELESS_EXT
326 union iwreq_data wrqu;
327 char *buf = kmalloc(128, gfp);
330 sprintf(buf, "MLME-MICHAELMICFAILURE.indication("
331 "keyid=%d %scast addr=%pM)", key_id,
332 key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni",
334 memset(&wrqu, 0, sizeof(wrqu));
335 wrqu.data.length = strlen(buf);
336 wireless_send_event(dev, IWEVCUSTOM, &wrqu, buf);
341 nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp);
343 EXPORT_SYMBOL(cfg80211_michael_mic_failure);
345 /* some MLME handling for userspace SME */
346 int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
347 struct net_device *dev,
348 struct ieee80211_channel *chan,
349 enum nl80211_auth_type auth_type,
351 const u8 *ssid, int ssid_len,
352 const u8 *ie, int ie_len,
353 const u8 *key, int key_len, int key_idx)
355 struct wireless_dev *wdev = dev->ieee80211_ptr;
356 struct cfg80211_auth_request req;
357 struct cfg80211_internal_bss *bss;
358 int i, err, slot = -1, nfree = 0;
360 ASSERT_WDEV_LOCK(wdev);
362 if (auth_type == NL80211_AUTHTYPE_SHARED_KEY)
363 if (!key || !key_len || key_idx < 0 || key_idx > 4)
366 if (wdev->current_bss &&
367 memcmp(bssid, wdev->current_bss->pub.bssid, ETH_ALEN) == 0)
370 for (i = 0; i < MAX_AUTH_BSSES; i++) {
371 if (wdev->authtry_bsses[i] &&
372 memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid,
375 if (wdev->auth_bsses[i] &&
376 memcmp(bssid, wdev->auth_bsses[i]->pub.bssid,
381 memset(&req, 0, sizeof(req));
385 req.auth_type = auth_type;
386 req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
387 WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
389 req.key_len = key_len;
390 req.key_idx = key_idx;
394 bss = bss_from_pub(req.bss);
396 for (i = 0; i < MAX_AUTH_BSSES; i++) {
397 if (!wdev->auth_bsses[i] && !wdev->authtry_bsses[i]) {
403 /* we need one free slot for disassoc and one for this auth */
409 wdev->authtry_bsses[slot] = bss;
410 cfg80211_hold_bss(bss);
412 err = rdev->ops->auth(&rdev->wiphy, dev, &req);
414 wdev->authtry_bsses[slot] = NULL;
415 cfg80211_unhold_bss(bss);
420 cfg80211_put_bss(req.bss);
424 int cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
425 struct net_device *dev, struct ieee80211_channel *chan,
426 enum nl80211_auth_type auth_type, const u8 *bssid,
427 const u8 *ssid, int ssid_len,
428 const u8 *ie, int ie_len,
429 const u8 *key, int key_len, int key_idx)
433 wdev_lock(dev->ieee80211_ptr);
434 err = __cfg80211_mlme_auth(rdev, dev, chan, auth_type, bssid,
435 ssid, ssid_len, ie, ie_len,
436 key, key_len, key_idx);
437 wdev_unlock(dev->ieee80211_ptr);
442 int __cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
443 struct net_device *dev,
444 struct ieee80211_channel *chan,
445 const u8 *bssid, const u8 *prev_bssid,
446 const u8 *ssid, int ssid_len,
447 const u8 *ie, int ie_len, bool use_mfp,
448 struct cfg80211_crypto_settings *crypt)
450 struct wireless_dev *wdev = dev->ieee80211_ptr;
451 struct cfg80211_assoc_request req;
452 struct cfg80211_internal_bss *bss;
453 int i, err, slot = -1;
455 ASSERT_WDEV_LOCK(wdev);
457 memset(&req, 0, sizeof(req));
459 if (wdev->current_bss)
464 memcpy(&req.crypto, crypt, sizeof(req.crypto));
465 req.use_mfp = use_mfp;
466 req.prev_bssid = prev_bssid;
467 req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
468 WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
472 bss = bss_from_pub(req.bss);
474 for (i = 0; i < MAX_AUTH_BSSES; i++) {
475 if (bss == wdev->auth_bsses[i]) {
486 err = rdev->ops->assoc(&rdev->wiphy, dev, &req);
488 /* still a reference in wdev->auth_bsses[slot] */
489 cfg80211_put_bss(req.bss);
493 int cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
494 struct net_device *dev,
495 struct ieee80211_channel *chan,
496 const u8 *bssid, const u8 *prev_bssid,
497 const u8 *ssid, int ssid_len,
498 const u8 *ie, int ie_len, bool use_mfp,
499 struct cfg80211_crypto_settings *crypt)
501 struct wireless_dev *wdev = dev->ieee80211_ptr;
505 err = __cfg80211_mlme_assoc(rdev, dev, chan, bssid, prev_bssid,
506 ssid, ssid_len, ie, ie_len, use_mfp, crypt);
512 int __cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
513 struct net_device *dev, const u8 *bssid,
514 const u8 *ie, int ie_len, u16 reason)
516 struct wireless_dev *wdev = dev->ieee80211_ptr;
517 struct cfg80211_deauth_request req;
520 ASSERT_WDEV_LOCK(wdev);
522 memset(&req, 0, sizeof(req));
523 req.reason_code = reason;
526 if (wdev->current_bss &&
527 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
528 req.bss = &wdev->current_bss->pub;
529 } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
530 if (wdev->auth_bsses[i] &&
531 memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
532 req.bss = &wdev->auth_bsses[i]->pub;
535 if (wdev->authtry_bsses[i] &&
536 memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
537 req.bss = &wdev->authtry_bsses[i]->pub;
545 return rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
548 int cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
549 struct net_device *dev, const u8 *bssid,
550 const u8 *ie, int ie_len, u16 reason)
552 struct wireless_dev *wdev = dev->ieee80211_ptr;
556 err = __cfg80211_mlme_deauth(rdev, dev, bssid, ie, ie_len, reason);
562 static int __cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
563 struct net_device *dev, const u8 *bssid,
564 const u8 *ie, int ie_len, u16 reason)
566 struct wireless_dev *wdev = dev->ieee80211_ptr;
567 struct cfg80211_disassoc_request req;
569 ASSERT_WDEV_LOCK(wdev);
571 if (wdev->sme_state != CFG80211_SME_CONNECTED)
574 if (WARN_ON(!wdev->current_bss))
577 memset(&req, 0, sizeof(req));
578 req.reason_code = reason;
581 if (memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0)
582 req.bss = &wdev->current_bss->pub;
586 return rdev->ops->disassoc(&rdev->wiphy, dev, &req, wdev);
589 int cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
590 struct net_device *dev, const u8 *bssid,
591 const u8 *ie, int ie_len, u16 reason)
593 struct wireless_dev *wdev = dev->ieee80211_ptr;
597 err = __cfg80211_mlme_disassoc(rdev, dev, bssid, ie, ie_len, reason);
603 void cfg80211_mlme_down(struct cfg80211_registered_device *rdev,
604 struct net_device *dev)
606 struct wireless_dev *wdev = dev->ieee80211_ptr;
607 struct cfg80211_deauth_request req;
610 ASSERT_WDEV_LOCK(wdev);
612 if (!rdev->ops->deauth)
615 memset(&req, 0, sizeof(req));
616 req.reason_code = WLAN_REASON_DEAUTH_LEAVING;
620 if (wdev->current_bss) {
621 req.bss = &wdev->current_bss->pub;
622 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
623 if (wdev->current_bss) {
624 cfg80211_unhold_bss(wdev->current_bss);
625 cfg80211_put_bss(&wdev->current_bss->pub);
626 wdev->current_bss = NULL;
630 for (i = 0; i < MAX_AUTH_BSSES; i++) {
631 if (wdev->auth_bsses[i]) {
632 req.bss = &wdev->auth_bsses[i]->pub;
633 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
634 if (wdev->auth_bsses[i]) {
635 cfg80211_unhold_bss(wdev->auth_bsses[i]);
636 cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
637 wdev->auth_bsses[i] = NULL;
640 if (wdev->authtry_bsses[i]) {
641 req.bss = &wdev->authtry_bsses[i]->pub;
642 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
643 if (wdev->authtry_bsses[i]) {
644 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
645 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
646 wdev->authtry_bsses[i] = NULL;