cfg80211: fix leaks of wdev->conn->ie
[safe/jmp/linux-2.6] / net / wireless / sme.c
1 /*
2  * SME code for cfg80211's connect emulation.
3  *
4  * Copyright 2009       Johannes Berg <johannes@sipsolutions.net>
5  * Copyright (C) 2009   Intel Corporation. All rights reserved.
6  */
7
8 #include <linux/etherdevice.h>
9 #include <linux/if_arp.h>
10 #include <linux/workqueue.h>
11 #include <linux/wireless.h>
12 #include <net/iw_handler.h>
13 #include <net/cfg80211.h>
14 #include <net/rtnetlink.h>
15 #include "nl80211.h"
16 #include "reg.h"
17
18 struct cfg80211_conn {
19         struct cfg80211_connect_params params;
20         /* these are sub-states of the _CONNECTING sme_state */
21         enum {
22                 CFG80211_CONN_IDLE,
23                 CFG80211_CONN_SCANNING,
24                 CFG80211_CONN_SCAN_AGAIN,
25                 CFG80211_CONN_AUTHENTICATE_NEXT,
26                 CFG80211_CONN_AUTHENTICATING,
27                 CFG80211_CONN_ASSOCIATE_NEXT,
28                 CFG80211_CONN_ASSOCIATING,
29         } state;
30         u8 bssid[ETH_ALEN], prev_bssid[ETH_ALEN];
31         u8 *ie;
32         size_t ie_len;
33         bool auto_auth, prev_bssid_valid;
34 };
35
36
37 static int cfg80211_conn_scan(struct wireless_dev *wdev)
38 {
39         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
40         struct cfg80211_scan_request *request;
41         int n_channels, err;
42
43         ASSERT_RTNL();
44         ASSERT_RDEV_LOCK(rdev);
45         ASSERT_WDEV_LOCK(wdev);
46
47         if (rdev->scan_req)
48                 return -EBUSY;
49
50         if (wdev->conn->params.channel) {
51                 n_channels = 1;
52         } else {
53                 enum ieee80211_band band;
54                 n_channels = 0;
55
56                 for (band = 0; band < IEEE80211_NUM_BANDS; band++) {
57                         if (!wdev->wiphy->bands[band])
58                                 continue;
59                         n_channels += wdev->wiphy->bands[band]->n_channels;
60                 }
61         }
62         request = kzalloc(sizeof(*request) + sizeof(request->ssids[0]) +
63                           sizeof(request->channels[0]) * n_channels,
64                           GFP_KERNEL);
65         if (!request)
66                 return -ENOMEM;
67
68         if (wdev->conn->params.channel)
69                 request->channels[0] = wdev->conn->params.channel;
70         else {
71                 int i = 0, j;
72                 enum ieee80211_band band;
73
74                 for (band = 0; band < IEEE80211_NUM_BANDS; band++) {
75                         if (!wdev->wiphy->bands[band])
76                                 continue;
77                         for (j = 0; j < wdev->wiphy->bands[band]->n_channels;
78                              i++, j++)
79                                 request->channels[i] =
80                                         &wdev->wiphy->bands[band]->channels[j];
81                 }
82         }
83         request->n_channels = n_channels;
84         request->ssids = (void *)&request->channels[n_channels];
85         request->n_ssids = 1;
86
87         memcpy(request->ssids[0].ssid, wdev->conn->params.ssid,
88                 wdev->conn->params.ssid_len);
89         request->ssids[0].ssid_len = wdev->conn->params.ssid_len;
90
91         request->dev = wdev->netdev;
92         request->wiphy = &rdev->wiphy;
93
94         rdev->scan_req = request;
95
96         err = rdev->ops->scan(wdev->wiphy, wdev->netdev, request);
97         if (!err) {
98                 wdev->conn->state = CFG80211_CONN_SCANNING;
99                 nl80211_send_scan_start(rdev, wdev->netdev);
100                 dev_hold(wdev->netdev);
101         } else {
102                 rdev->scan_req = NULL;
103                 kfree(request);
104         }
105         return err;
106 }
107
108 static int cfg80211_conn_do_work(struct wireless_dev *wdev)
109 {
110         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
111         struct cfg80211_connect_params *params;
112         const u8 *prev_bssid = NULL;
113         int err;
114
115         ASSERT_WDEV_LOCK(wdev);
116
117         if (!wdev->conn)
118                 return 0;
119
120         params = &wdev->conn->params;
121
122         switch (wdev->conn->state) {
123         case CFG80211_CONN_SCAN_AGAIN:
124                 return cfg80211_conn_scan(wdev);
125         case CFG80211_CONN_AUTHENTICATE_NEXT:
126                 BUG_ON(!rdev->ops->auth);
127                 wdev->conn->state = CFG80211_CONN_AUTHENTICATING;
128                 return __cfg80211_mlme_auth(rdev, wdev->netdev,
129                                             params->channel, params->auth_type,
130                                             params->bssid,
131                                             params->ssid, params->ssid_len,
132                                             NULL, 0,
133                                             params->key, params->key_len,
134                                             params->key_idx);
135         case CFG80211_CONN_ASSOCIATE_NEXT:
136                 BUG_ON(!rdev->ops->assoc);
137                 wdev->conn->state = CFG80211_CONN_ASSOCIATING;
138                 if (wdev->conn->prev_bssid_valid)
139                         prev_bssid = wdev->conn->prev_bssid;
140                 err = __cfg80211_mlme_assoc(rdev, wdev->netdev,
141                                             params->channel, params->bssid,
142                                             prev_bssid,
143                                             params->ssid, params->ssid_len,
144                                             params->ie, params->ie_len,
145                                             false, &params->crypto);
146                 if (err)
147                         __cfg80211_mlme_deauth(rdev, wdev->netdev, params->bssid,
148                                                NULL, 0,
149                                                WLAN_REASON_DEAUTH_LEAVING);
150                 return err;
151         default:
152                 return 0;
153         }
154 }
155
156 void cfg80211_conn_work(struct work_struct *work)
157 {
158         struct cfg80211_registered_device *rdev =
159                 container_of(work, struct cfg80211_registered_device, conn_work);
160         struct wireless_dev *wdev;
161
162         rtnl_lock();
163         cfg80211_lock_rdev(rdev);
164         mutex_lock(&rdev->devlist_mtx);
165
166         list_for_each_entry(wdev, &rdev->netdev_list, list) {
167                 wdev_lock(wdev);
168                 if (!netif_running(wdev->netdev)) {
169                         wdev_unlock(wdev);
170                         continue;
171                 }
172                 if (wdev->sme_state != CFG80211_SME_CONNECTING) {
173                         wdev_unlock(wdev);
174                         continue;
175                 }
176                 if (cfg80211_conn_do_work(wdev))
177                         __cfg80211_connect_result(
178                                         wdev->netdev,
179                                         wdev->conn->params.bssid,
180                                         NULL, 0, NULL, 0,
181                                         WLAN_STATUS_UNSPECIFIED_FAILURE,
182                                         false, NULL);
183                 wdev_unlock(wdev);
184         }
185
186         mutex_unlock(&rdev->devlist_mtx);
187         cfg80211_unlock_rdev(rdev);
188         rtnl_unlock();
189 }
190
191 static bool cfg80211_get_conn_bss(struct wireless_dev *wdev)
192 {
193         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
194         struct cfg80211_bss *bss;
195         u16 capa = WLAN_CAPABILITY_ESS;
196
197         ASSERT_WDEV_LOCK(wdev);
198
199         if (wdev->conn->params.privacy)
200                 capa |= WLAN_CAPABILITY_PRIVACY;
201
202         bss = cfg80211_get_bss(wdev->wiphy, NULL, wdev->conn->params.bssid,
203                                wdev->conn->params.ssid,
204                                wdev->conn->params.ssid_len,
205                                WLAN_CAPABILITY_ESS | WLAN_CAPABILITY_PRIVACY,
206                                capa);
207         if (!bss)
208                 return false;
209
210         memcpy(wdev->conn->bssid, bss->bssid, ETH_ALEN);
211         wdev->conn->params.bssid = wdev->conn->bssid;
212         wdev->conn->params.channel = bss->channel;
213         wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
214         schedule_work(&rdev->conn_work);
215
216         cfg80211_put_bss(bss);
217         return true;
218 }
219
220 static void __cfg80211_sme_scan_done(struct net_device *dev)
221 {
222         struct wireless_dev *wdev = dev->ieee80211_ptr;
223         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
224
225         ASSERT_WDEV_LOCK(wdev);
226
227         if (wdev->sme_state != CFG80211_SME_CONNECTING)
228                 return;
229
230         if (!wdev->conn)
231                 return;
232
233         if (wdev->conn->state != CFG80211_CONN_SCANNING &&
234             wdev->conn->state != CFG80211_CONN_SCAN_AGAIN)
235                 return;
236
237         if (!cfg80211_get_conn_bss(wdev)) {
238                 /* not found */
239                 if (wdev->conn->state == CFG80211_CONN_SCAN_AGAIN)
240                         schedule_work(&rdev->conn_work);
241                 else
242                         __cfg80211_connect_result(
243                                         wdev->netdev,
244                                         wdev->conn->params.bssid,
245                                         NULL, 0, NULL, 0,
246                                         WLAN_STATUS_UNSPECIFIED_FAILURE,
247                                         false, NULL);
248         }
249 }
250
251 void cfg80211_sme_scan_done(struct net_device *dev)
252 {
253         struct wireless_dev *wdev = dev->ieee80211_ptr;
254
255         mutex_lock(&wiphy_to_dev(wdev->wiphy)->devlist_mtx);
256         wdev_lock(wdev);
257         __cfg80211_sme_scan_done(dev);
258         wdev_unlock(wdev);
259         mutex_unlock(&wiphy_to_dev(wdev->wiphy)->devlist_mtx);
260 }
261
262 void cfg80211_sme_rx_auth(struct net_device *dev,
263                           const u8 *buf, size_t len)
264 {
265         struct wireless_dev *wdev = dev->ieee80211_ptr;
266         struct wiphy *wiphy = wdev->wiphy;
267         struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
268         struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
269         u16 status_code = le16_to_cpu(mgmt->u.auth.status_code);
270
271         ASSERT_WDEV_LOCK(wdev);
272
273         /* should only RX auth frames when connecting */
274         if (wdev->sme_state != CFG80211_SME_CONNECTING)
275                 return;
276
277         if (WARN_ON(!wdev->conn))
278                 return;
279
280         if (status_code == WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG &&
281             wdev->conn->auto_auth &&
282             wdev->conn->params.auth_type != NL80211_AUTHTYPE_NETWORK_EAP) {
283                 /* select automatically between only open, shared, leap */
284                 switch (wdev->conn->params.auth_type) {
285                 case NL80211_AUTHTYPE_OPEN_SYSTEM:
286                         if (wdev->connect_keys)
287                                 wdev->conn->params.auth_type =
288                                         NL80211_AUTHTYPE_SHARED_KEY;
289                         else
290                                 wdev->conn->params.auth_type =
291                                         NL80211_AUTHTYPE_NETWORK_EAP;
292                         break;
293                 case NL80211_AUTHTYPE_SHARED_KEY:
294                         wdev->conn->params.auth_type =
295                                 NL80211_AUTHTYPE_NETWORK_EAP;
296                         break;
297                 default:
298                         /* huh? */
299                         wdev->conn->params.auth_type =
300                                 NL80211_AUTHTYPE_OPEN_SYSTEM;
301                         break;
302                 }
303                 wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
304                 schedule_work(&rdev->conn_work);
305         } else if (status_code != WLAN_STATUS_SUCCESS) {
306                 __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
307                                           status_code, false, NULL);
308         } else if (wdev->sme_state == CFG80211_SME_CONNECTING &&
309                  wdev->conn->state == CFG80211_CONN_AUTHENTICATING) {
310                 wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
311                 schedule_work(&rdev->conn_work);
312         }
313 }
314
315 bool cfg80211_sme_failed_reassoc(struct wireless_dev *wdev)
316 {
317         struct wiphy *wiphy = wdev->wiphy;
318         struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
319
320         if (WARN_ON(!wdev->conn))
321                 return false;
322
323         if (!wdev->conn->prev_bssid_valid)
324                 return false;
325
326         /*
327          * Some stupid APs don't accept reassoc, so we
328          * need to fall back to trying regular assoc.
329          */
330         wdev->conn->prev_bssid_valid = false;
331         wdev->conn->state = CFG80211_CONN_ASSOCIATE_NEXT;
332         schedule_work(&rdev->conn_work);
333
334         return true;
335 }
336
337 void __cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
338                                const u8 *req_ie, size_t req_ie_len,
339                                const u8 *resp_ie, size_t resp_ie_len,
340                                u16 status, bool wextev,
341                                struct cfg80211_bss *bss)
342 {
343         struct wireless_dev *wdev = dev->ieee80211_ptr;
344         u8 *country_ie;
345 #ifdef CONFIG_WIRELESS_EXT
346         union iwreq_data wrqu;
347 #endif
348
349         ASSERT_WDEV_LOCK(wdev);
350
351         if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
352                 return;
353
354         if (WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTING))
355                 return;
356
357         nl80211_send_connect_result(wiphy_to_dev(wdev->wiphy), dev,
358                                     bssid, req_ie, req_ie_len,
359                                     resp_ie, resp_ie_len,
360                                     status, GFP_KERNEL);
361
362 #ifdef CONFIG_WIRELESS_EXT
363         if (wextev) {
364                 if (req_ie && status == WLAN_STATUS_SUCCESS) {
365                         memset(&wrqu, 0, sizeof(wrqu));
366                         wrqu.data.length = req_ie_len;
367                         wireless_send_event(dev, IWEVASSOCREQIE, &wrqu, req_ie);
368                 }
369
370                 if (resp_ie && status == WLAN_STATUS_SUCCESS) {
371                         memset(&wrqu, 0, sizeof(wrqu));
372                         wrqu.data.length = resp_ie_len;
373                         wireless_send_event(dev, IWEVASSOCRESPIE, &wrqu, resp_ie);
374                 }
375
376                 memset(&wrqu, 0, sizeof(wrqu));
377                 wrqu.ap_addr.sa_family = ARPHRD_ETHER;
378                 if (bssid && status == WLAN_STATUS_SUCCESS) {
379                         memcpy(wrqu.ap_addr.sa_data, bssid, ETH_ALEN);
380                         memcpy(wdev->wext.prev_bssid, bssid, ETH_ALEN);
381                         wdev->wext.prev_bssid_valid = true;
382                 }
383                 wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
384         }
385 #endif
386
387         if (wdev->current_bss) {
388                 cfg80211_unhold_bss(wdev->current_bss);
389                 cfg80211_put_bss(&wdev->current_bss->pub);
390                 wdev->current_bss = NULL;
391         }
392
393         if (wdev->conn)
394                 wdev->conn->state = CFG80211_CONN_IDLE;
395
396         if (status != WLAN_STATUS_SUCCESS) {
397                 wdev->sme_state = CFG80211_SME_IDLE;
398                 if (wdev->conn)
399                         kfree(wdev->conn->ie);
400                 kfree(wdev->conn);
401                 wdev->conn = NULL;
402                 kfree(wdev->connect_keys);
403                 wdev->connect_keys = NULL;
404                 wdev->ssid_len = 0;
405                 return;
406         }
407
408         if (!bss)
409                 bss = cfg80211_get_bss(wdev->wiphy, NULL, bssid,
410                                        wdev->ssid, wdev->ssid_len,
411                                        WLAN_CAPABILITY_ESS,
412                                        WLAN_CAPABILITY_ESS);
413
414         if (WARN_ON(!bss))
415                 return;
416
417         cfg80211_hold_bss(bss_from_pub(bss));
418         wdev->current_bss = bss_from_pub(bss);
419
420         wdev->sme_state = CFG80211_SME_CONNECTED;
421         cfg80211_upload_connect_keys(wdev);
422
423         country_ie = (u8 *) ieee80211_bss_get_ie(bss, WLAN_EID_COUNTRY);
424
425         if (!country_ie)
426                 return;
427
428         /*
429          * ieee80211_bss_get_ie() ensures we can access:
430          * - country_ie + 2, the start of the country ie data, and
431          * - and country_ie[1] which is the IE length
432          */
433         regulatory_hint_11d(wdev->wiphy,
434                             country_ie + 2,
435                             country_ie[1]);
436 }
437
438 void cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
439                              const u8 *req_ie, size_t req_ie_len,
440                              const u8 *resp_ie, size_t resp_ie_len,
441                              u16 status, gfp_t gfp)
442 {
443         struct wireless_dev *wdev = dev->ieee80211_ptr;
444         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
445         struct cfg80211_event *ev;
446         unsigned long flags;
447
448         ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
449         if (!ev)
450                 return;
451
452         ev->type = EVENT_CONNECT_RESULT;
453         memcpy(ev->cr.bssid, bssid, ETH_ALEN);
454         ev->cr.req_ie = ((u8 *)ev) + sizeof(*ev);
455         ev->cr.req_ie_len = req_ie_len;
456         memcpy((void *)ev->cr.req_ie, req_ie, req_ie_len);
457         ev->cr.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
458         ev->cr.resp_ie_len = resp_ie_len;
459         memcpy((void *)ev->cr.resp_ie, resp_ie, resp_ie_len);
460         ev->cr.status = status;
461
462         spin_lock_irqsave(&wdev->event_lock, flags);
463         list_add_tail(&ev->list, &wdev->event_list);
464         spin_unlock_irqrestore(&wdev->event_lock, flags);
465         schedule_work(&rdev->event_work);
466 }
467 EXPORT_SYMBOL(cfg80211_connect_result);
468
469 void __cfg80211_roamed(struct wireless_dev *wdev, const u8 *bssid,
470                        const u8 *req_ie, size_t req_ie_len,
471                        const u8 *resp_ie, size_t resp_ie_len)
472 {
473         struct cfg80211_bss *bss;
474 #ifdef CONFIG_WIRELESS_EXT
475         union iwreq_data wrqu;
476 #endif
477
478         ASSERT_WDEV_LOCK(wdev);
479
480         if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
481                 return;
482
483         if (WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED))
484                 return;
485
486         /* internal error -- how did we get to CONNECTED w/o BSS? */
487         if (WARN_ON(!wdev->current_bss)) {
488                 return;
489         }
490
491         cfg80211_unhold_bss(wdev->current_bss);
492         cfg80211_put_bss(&wdev->current_bss->pub);
493         wdev->current_bss = NULL;
494
495         bss = cfg80211_get_bss(wdev->wiphy, NULL, bssid,
496                                wdev->ssid, wdev->ssid_len,
497                                WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
498
499         if (WARN_ON(!bss))
500                 return;
501
502         cfg80211_hold_bss(bss_from_pub(bss));
503         wdev->current_bss = bss_from_pub(bss);
504
505         nl80211_send_roamed(wiphy_to_dev(wdev->wiphy), wdev->netdev, bssid,
506                             req_ie, req_ie_len, resp_ie, resp_ie_len,
507                             GFP_KERNEL);
508
509 #ifdef CONFIG_WIRELESS_EXT
510         if (req_ie) {
511                 memset(&wrqu, 0, sizeof(wrqu));
512                 wrqu.data.length = req_ie_len;
513                 wireless_send_event(wdev->netdev, IWEVASSOCREQIE,
514                                     &wrqu, req_ie);
515         }
516
517         if (resp_ie) {
518                 memset(&wrqu, 0, sizeof(wrqu));
519                 wrqu.data.length = resp_ie_len;
520                 wireless_send_event(wdev->netdev, IWEVASSOCRESPIE,
521                                     &wrqu, resp_ie);
522         }
523
524         memset(&wrqu, 0, sizeof(wrqu));
525         wrqu.ap_addr.sa_family = ARPHRD_ETHER;
526         memcpy(wrqu.ap_addr.sa_data, bssid, ETH_ALEN);
527         memcpy(wdev->wext.prev_bssid, bssid, ETH_ALEN);
528         wdev->wext.prev_bssid_valid = true;
529         wireless_send_event(wdev->netdev, SIOCGIWAP, &wrqu, NULL);
530 #endif
531 }
532
533 void cfg80211_roamed(struct net_device *dev, const u8 *bssid,
534                      const u8 *req_ie, size_t req_ie_len,
535                      const u8 *resp_ie, size_t resp_ie_len, gfp_t gfp)
536 {
537         struct wireless_dev *wdev = dev->ieee80211_ptr;
538         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
539         struct cfg80211_event *ev;
540         unsigned long flags;
541
542         ev = kzalloc(sizeof(*ev) + req_ie_len + resp_ie_len, gfp);
543         if (!ev)
544                 return;
545
546         ev->type = EVENT_ROAMED;
547         memcpy(ev->rm.bssid, bssid, ETH_ALEN);
548         ev->rm.req_ie = ((u8 *)ev) + sizeof(*ev);
549         ev->rm.req_ie_len = req_ie_len;
550         memcpy((void *)ev->rm.req_ie, req_ie, req_ie_len);
551         ev->rm.resp_ie = ((u8 *)ev) + sizeof(*ev) + req_ie_len;
552         ev->rm.resp_ie_len = resp_ie_len;
553         memcpy((void *)ev->rm.resp_ie, resp_ie, resp_ie_len);
554
555         spin_lock_irqsave(&wdev->event_lock, flags);
556         list_add_tail(&ev->list, &wdev->event_list);
557         spin_unlock_irqrestore(&wdev->event_lock, flags);
558         schedule_work(&rdev->event_work);
559 }
560 EXPORT_SYMBOL(cfg80211_roamed);
561
562 void __cfg80211_disconnected(struct net_device *dev, const u8 *ie,
563                              size_t ie_len, u16 reason, bool from_ap)
564 {
565         struct wireless_dev *wdev = dev->ieee80211_ptr;
566         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
567         int i;
568 #ifdef CONFIG_WIRELESS_EXT
569         union iwreq_data wrqu;
570 #endif
571
572         ASSERT_WDEV_LOCK(wdev);
573
574         if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
575                 return;
576
577         if (WARN_ON(wdev->sme_state != CFG80211_SME_CONNECTED))
578                 return;
579
580         if (wdev->current_bss) {
581                 cfg80211_unhold_bss(wdev->current_bss);
582                 cfg80211_put_bss(&wdev->current_bss->pub);
583         }
584
585         wdev->current_bss = NULL;
586         wdev->sme_state = CFG80211_SME_IDLE;
587         wdev->ssid_len = 0;
588
589         if (wdev->conn) {
590                 const u8 *bssid;
591                 int ret;
592
593                 kfree(wdev->conn->ie);
594                 wdev->conn->ie = NULL;
595                 kfree(wdev->conn);
596                 wdev->conn = NULL;
597
598                 /*
599                  * If this disconnect was due to a disassoc, we
600                  * we might still have an auth BSS around. For
601                  * the userspace SME that's currently expected,
602                  * but for the kernel SME (nl80211 CONNECT or
603                  * wireless extensions) we want to clear up all
604                  * state.
605                  */
606                 for (i = 0; i < MAX_AUTH_BSSES; i++) {
607                         if (!wdev->auth_bsses[i])
608                                 continue;
609                         bssid = wdev->auth_bsses[i]->pub.bssid;
610                         ret = __cfg80211_mlme_deauth(rdev, dev, bssid, NULL, 0,
611                                                 WLAN_REASON_DEAUTH_LEAVING);
612                         WARN(ret, "deauth failed: %d\n", ret);
613                 }
614         }
615
616         nl80211_send_disconnected(rdev, dev, reason, ie, ie_len, from_ap);
617
618         /*
619          * Delete all the keys ... pairwise keys can't really
620          * exist any more anyway, but default keys might.
621          */
622         if (rdev->ops->del_key)
623                 for (i = 0; i < 6; i++)
624                         rdev->ops->del_key(wdev->wiphy, dev, i, NULL);
625
626 #ifdef CONFIG_WIRELESS_EXT
627         memset(&wrqu, 0, sizeof(wrqu));
628         wrqu.ap_addr.sa_family = ARPHRD_ETHER;
629         wireless_send_event(dev, SIOCGIWAP, &wrqu, NULL);
630 #endif
631 }
632
633 void cfg80211_disconnected(struct net_device *dev, u16 reason,
634                            u8 *ie, size_t ie_len, gfp_t gfp)
635 {
636         struct wireless_dev *wdev = dev->ieee80211_ptr;
637         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
638         struct cfg80211_event *ev;
639         unsigned long flags;
640
641         ev = kzalloc(sizeof(*ev) + ie_len, gfp);
642         if (!ev)
643                 return;
644
645         ev->type = EVENT_DISCONNECTED;
646         ev->dc.ie = ((u8 *)ev) + sizeof(*ev);
647         ev->dc.ie_len = ie_len;
648         memcpy((void *)ev->dc.ie, ie, ie_len);
649         ev->dc.reason = reason;
650
651         spin_lock_irqsave(&wdev->event_lock, flags);
652         list_add_tail(&ev->list, &wdev->event_list);
653         spin_unlock_irqrestore(&wdev->event_lock, flags);
654         schedule_work(&rdev->event_work);
655 }
656 EXPORT_SYMBOL(cfg80211_disconnected);
657
658 int __cfg80211_connect(struct cfg80211_registered_device *rdev,
659                        struct net_device *dev,
660                        struct cfg80211_connect_params *connect,
661                        struct cfg80211_cached_keys *connkeys,
662                        const u8 *prev_bssid)
663 {
664         struct wireless_dev *wdev = dev->ieee80211_ptr;
665         struct ieee80211_channel *chan;
666         int err;
667
668         ASSERT_WDEV_LOCK(wdev);
669
670         if (wdev->sme_state != CFG80211_SME_IDLE)
671                 return -EALREADY;
672
673         chan = rdev_fixed_channel(rdev, wdev);
674         if (chan && chan != connect->channel)
675                 return -EBUSY;
676
677         if (WARN_ON(wdev->connect_keys)) {
678                 kfree(wdev->connect_keys);
679                 wdev->connect_keys = NULL;
680         }
681
682         if (connkeys && connkeys->def >= 0) {
683                 int idx;
684                 u32 cipher;
685
686                 idx = connkeys->def;
687                 cipher = connkeys->params[idx].cipher;
688                 /* If given a WEP key we may need it for shared key auth */
689                 if (cipher == WLAN_CIPHER_SUITE_WEP40 ||
690                     cipher == WLAN_CIPHER_SUITE_WEP104) {
691                         connect->key_idx = idx;
692                         connect->key = connkeys->params[idx].key;
693                         connect->key_len = connkeys->params[idx].key_len;
694
695                         /*
696                          * If ciphers are not set (e.g. when going through
697                          * iwconfig), we have to set them appropriately here.
698                          */
699                         if (connect->crypto.cipher_group == 0)
700                                 connect->crypto.cipher_group = cipher;
701
702                         if (connect->crypto.n_ciphers_pairwise == 0) {
703                                 connect->crypto.n_ciphers_pairwise = 1;
704                                 connect->crypto.ciphers_pairwise[0] = cipher;
705                         }
706                 }
707         }
708
709         if (!rdev->ops->connect) {
710                 if (!rdev->ops->auth || !rdev->ops->assoc)
711                         return -EOPNOTSUPP;
712
713                 if (WARN_ON(wdev->conn))
714                         return -EINPROGRESS;
715
716                 wdev->conn = kzalloc(sizeof(*wdev->conn), GFP_KERNEL);
717                 if (!wdev->conn)
718                         return -ENOMEM;
719
720                 /*
721                  * Copy all parameters, and treat explicitly IEs, BSSID, SSID.
722                  */
723                 memcpy(&wdev->conn->params, connect, sizeof(*connect));
724                 if (connect->bssid) {
725                         wdev->conn->params.bssid = wdev->conn->bssid;
726                         memcpy(wdev->conn->bssid, connect->bssid, ETH_ALEN);
727                 }
728
729                 if (connect->ie) {
730                         wdev->conn->ie = kmemdup(connect->ie, connect->ie_len,
731                                                 GFP_KERNEL);
732                         wdev->conn->params.ie = wdev->conn->ie;
733                         if (!wdev->conn->ie) {
734                                 kfree(wdev->conn);
735                                 wdev->conn = NULL;
736                                 return -ENOMEM;
737                         }
738                 }
739
740                 if (connect->auth_type == NL80211_AUTHTYPE_AUTOMATIC) {
741                         wdev->conn->auto_auth = true;
742                         /* start with open system ... should mostly work */
743                         wdev->conn->params.auth_type =
744                                 NL80211_AUTHTYPE_OPEN_SYSTEM;
745                 } else {
746                         wdev->conn->auto_auth = false;
747                 }
748
749                 memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
750                 wdev->ssid_len = connect->ssid_len;
751                 wdev->conn->params.ssid = wdev->ssid;
752                 wdev->conn->params.ssid_len = connect->ssid_len;
753
754                 /* don't care about result -- but fill bssid & channel */
755                 if (!wdev->conn->params.bssid || !wdev->conn->params.channel)
756                         cfg80211_get_conn_bss(wdev);
757
758                 wdev->sme_state = CFG80211_SME_CONNECTING;
759                 wdev->connect_keys = connkeys;
760
761                 if (prev_bssid) {
762                         memcpy(wdev->conn->prev_bssid, prev_bssid, ETH_ALEN);
763                         wdev->conn->prev_bssid_valid = true;
764                 }
765
766                 /* we're good if we have both BSSID and channel */
767                 if (wdev->conn->params.bssid && wdev->conn->params.channel) {
768                         wdev->conn->state = CFG80211_CONN_AUTHENTICATE_NEXT;
769                         err = cfg80211_conn_do_work(wdev);
770                 } else {
771                         /* otherwise we'll need to scan for the AP first */
772                         err = cfg80211_conn_scan(wdev);
773                         /*
774                          * If we can't scan right now, then we need to scan again
775                          * after the current scan finished, since the parameters
776                          * changed (unless we find a good AP anyway).
777                          */
778                         if (err == -EBUSY) {
779                                 err = 0;
780                                 wdev->conn->state = CFG80211_CONN_SCAN_AGAIN;
781                         }
782                 }
783                 if (err) {
784                         kfree(wdev->conn->ie);
785                         kfree(wdev->conn);
786                         wdev->conn = NULL;
787                         wdev->sme_state = CFG80211_SME_IDLE;
788                         wdev->connect_keys = NULL;
789                         wdev->ssid_len = 0;
790                 }
791
792                 return err;
793         } else {
794                 wdev->sme_state = CFG80211_SME_CONNECTING;
795                 wdev->connect_keys = connkeys;
796                 err = rdev->ops->connect(&rdev->wiphy, dev, connect);
797                 if (err) {
798                         wdev->connect_keys = NULL;
799                         wdev->sme_state = CFG80211_SME_IDLE;
800                         return err;
801                 }
802
803                 memcpy(wdev->ssid, connect->ssid, connect->ssid_len);
804                 wdev->ssid_len = connect->ssid_len;
805
806                 return 0;
807         }
808 }
809
810 int cfg80211_connect(struct cfg80211_registered_device *rdev,
811                      struct net_device *dev,
812                      struct cfg80211_connect_params *connect,
813                      struct cfg80211_cached_keys *connkeys)
814 {
815         int err;
816
817         mutex_lock(&rdev->devlist_mtx);
818         wdev_lock(dev->ieee80211_ptr);
819         err = __cfg80211_connect(rdev, dev, connect, connkeys, NULL);
820         wdev_unlock(dev->ieee80211_ptr);
821         mutex_unlock(&rdev->devlist_mtx);
822
823         return err;
824 }
825
826 int __cfg80211_disconnect(struct cfg80211_registered_device *rdev,
827                           struct net_device *dev, u16 reason, bool wextev)
828 {
829         struct wireless_dev *wdev = dev->ieee80211_ptr;
830         int err;
831
832         ASSERT_WDEV_LOCK(wdev);
833
834         if (wdev->sme_state == CFG80211_SME_IDLE)
835                 return -EINVAL;
836
837         kfree(wdev->connect_keys);
838         wdev->connect_keys = NULL;
839
840         if (!rdev->ops->disconnect) {
841                 if (!rdev->ops->deauth)
842                         return -EOPNOTSUPP;
843
844                 /* was it connected by userspace SME? */
845                 if (!wdev->conn) {
846                         cfg80211_mlme_down(rdev, dev);
847                         return 0;
848                 }
849
850                 if (wdev->sme_state == CFG80211_SME_CONNECTING &&
851                     (wdev->conn->state == CFG80211_CONN_SCANNING ||
852                      wdev->conn->state == CFG80211_CONN_SCAN_AGAIN)) {
853                         wdev->sme_state = CFG80211_SME_IDLE;
854                         kfree(wdev->conn->ie);
855                         kfree(wdev->conn);
856                         wdev->conn = NULL;
857                         wdev->ssid_len = 0;
858                         return 0;
859                 }
860
861                 /* wdev->conn->params.bssid must be set if > SCANNING */
862                 err = __cfg80211_mlme_deauth(rdev, dev,
863                                              wdev->conn->params.bssid,
864                                              NULL, 0, reason);
865                 if (err)
866                         return err;
867         } else {
868                 err = rdev->ops->disconnect(&rdev->wiphy, dev, reason);
869                 if (err)
870                         return err;
871         }
872
873         if (wdev->sme_state == CFG80211_SME_CONNECTED)
874                 __cfg80211_disconnected(dev, NULL, 0, 0, false);
875         else if (wdev->sme_state == CFG80211_SME_CONNECTING)
876                 __cfg80211_connect_result(dev, NULL, NULL, 0, NULL, 0,
877                                           WLAN_STATUS_UNSPECIFIED_FAILURE,
878                                           wextev, NULL);
879
880         return 0;
881 }
882
883 int cfg80211_disconnect(struct cfg80211_registered_device *rdev,
884                         struct net_device *dev,
885                         u16 reason, bool wextev)
886 {
887         int err;
888
889         wdev_lock(dev->ieee80211_ptr);
890         err = __cfg80211_disconnect(rdev, dev, reason, wextev);
891         wdev_unlock(dev->ieee80211_ptr);
892
893         return err;
894 }
895
896 void cfg80211_sme_disassoc(struct net_device *dev, int idx)
897 {
898         struct wireless_dev *wdev = dev->ieee80211_ptr;
899         struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
900         u8 bssid[ETH_ALEN];
901
902         ASSERT_WDEV_LOCK(wdev);
903
904         if (!wdev->conn)
905                 return;
906
907         if (wdev->conn->state == CFG80211_CONN_IDLE)
908                 return;
909
910         /*
911          * Ok, so the association was made by this SME -- we don't
912          * want it any more so deauthenticate too.
913          */
914
915         if (!wdev->auth_bsses[idx])
916                 return;
917
918         memcpy(bssid, wdev->auth_bsses[idx]->pub.bssid, ETH_ALEN);
919         if (__cfg80211_mlme_deauth(rdev, dev, bssid,
920                                    NULL, 0, WLAN_REASON_DEAUTH_LEAVING)) {
921                 /* whatever -- assume gone anyway */
922                 cfg80211_unhold_bss(wdev->auth_bsses[idx]);
923                 cfg80211_put_bss(&wdev->auth_bsses[idx]->pub);
924                 wdev->auth_bsses[idx] = NULL;
925         }
926 }