2 * cfg80211 MLME SAP interface
4 * Copyright (c) 2009, Jouni Malinen <j@w1.fi>
7 #include <linux/kernel.h>
8 #include <linux/module.h>
9 #include <linux/netdevice.h>
10 #include <linux/nl80211.h>
11 #include <linux/wireless.h>
12 #include <net/cfg80211.h>
13 #include <net/iw_handler.h>
17 void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len)
19 struct wireless_dev *wdev = dev->ieee80211_ptr;
20 struct wiphy *wiphy = wdev->wiphy;
21 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
22 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
23 u8 *bssid = mgmt->bssid;
25 u16 status = le16_to_cpu(mgmt->u.auth.status_code);
30 for (i = 0; i < MAX_AUTH_BSSES; i++) {
31 if (wdev->authtry_bsses[i] &&
32 memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid,
34 if (status == WLAN_STATUS_SUCCESS) {
35 wdev->auth_bsses[i] = wdev->authtry_bsses[i];
37 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
38 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
40 wdev->authtry_bsses[i] = NULL;
48 nl80211_send_rx_auth(rdev, dev, buf, len, GFP_KERNEL);
49 cfg80211_sme_rx_auth(dev, buf, len);
53 EXPORT_SYMBOL(cfg80211_send_rx_auth);
55 void cfg80211_send_rx_assoc(struct net_device *dev, const u8 *buf, size_t len)
58 struct wireless_dev *wdev = dev->ieee80211_ptr;
59 struct wiphy *wiphy = wdev->wiphy;
60 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
61 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
62 u8 *ie = mgmt->u.assoc_resp.variable;
63 int i, ieoffs = offsetof(struct ieee80211_mgmt, u.assoc_resp.variable);
64 struct cfg80211_internal_bss *bss = NULL;
68 status_code = le16_to_cpu(mgmt->u.assoc_resp.status_code);
71 * This is a bit of a hack, we don't notify userspace of
72 * a (re-)association reply if we tried to send a reassoc
73 * and got a reject -- we only try again with an assoc
74 * frame instead of reassoc.
76 if (status_code != WLAN_STATUS_SUCCESS && wdev->conn &&
77 cfg80211_sme_failed_reassoc(wdev))
80 nl80211_send_rx_assoc(rdev, dev, buf, len, GFP_KERNEL);
82 if (status_code == WLAN_STATUS_SUCCESS) {
83 for (i = 0; i < MAX_AUTH_BSSES; i++) {
84 if (!wdev->auth_bsses[i])
86 if (memcmp(wdev->auth_bsses[i]->pub.bssid, mgmt->bssid,
88 bss = wdev->auth_bsses[i];
89 wdev->auth_bsses[i] = NULL;
90 /* additional reference to drop hold */
91 cfg80211_ref_bss(bss);
97 } else if (wdev->conn) {
98 cfg80211_sme_failed_assoc(wdev);
100 * do not call connect_result() now because the
101 * sme will schedule work that does it later.
106 if (!wdev->conn && wdev->sme_state == CFG80211_SME_IDLE) {
108 * This is for the userspace SME, the CONNECTING
109 * state will be changed to CONNECTED by
110 * __cfg80211_connect_result() below.
112 wdev->sme_state = CFG80211_SME_CONNECTING;
115 /* this consumes one bss reference (unless bss is NULL) */
116 __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, ie, len - ieoffs,
118 status_code == WLAN_STATUS_SUCCESS,
119 bss ? &bss->pub : NULL);
120 /* drop hold now, and also reference acquired above */
122 cfg80211_unhold_bss(bss);
123 cfg80211_put_bss(&bss->pub);
129 EXPORT_SYMBOL(cfg80211_send_rx_assoc);
131 void __cfg80211_send_deauth(struct net_device *dev,
132 const u8 *buf, size_t len)
134 struct wireless_dev *wdev = dev->ieee80211_ptr;
135 struct wiphy *wiphy = wdev->wiphy;
136 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
137 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
138 const u8 *bssid = mgmt->bssid;
141 ASSERT_WDEV_LOCK(wdev);
143 nl80211_send_deauth(rdev, dev, buf, len, GFP_KERNEL);
145 if (wdev->current_bss &&
146 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
147 cfg80211_unhold_bss(wdev->current_bss);
148 cfg80211_put_bss(&wdev->current_bss->pub);
149 wdev->current_bss = NULL;
150 } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
151 if (wdev->auth_bsses[i] &&
152 memcmp(wdev->auth_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
153 cfg80211_unhold_bss(wdev->auth_bsses[i]);
154 cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
155 wdev->auth_bsses[i] = NULL;
158 if (wdev->authtry_bsses[i] &&
159 memcmp(wdev->authtry_bsses[i]->pub.bssid, bssid, ETH_ALEN) == 0) {
160 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
161 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
162 wdev->authtry_bsses[i] = NULL;
167 if (wdev->sme_state == CFG80211_SME_CONNECTED) {
171 reason_code = le16_to_cpu(mgmt->u.deauth.reason_code);
173 from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0;
174 __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
175 } else if (wdev->sme_state == CFG80211_SME_CONNECTING) {
176 __cfg80211_connect_result(dev, mgmt->bssid, NULL, 0, NULL, 0,
177 WLAN_STATUS_UNSPECIFIED_FAILURE,
181 EXPORT_SYMBOL(__cfg80211_send_deauth);
183 void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len)
185 struct wireless_dev *wdev = dev->ieee80211_ptr;
188 __cfg80211_send_deauth(dev, buf, len);
191 EXPORT_SYMBOL(cfg80211_send_deauth);
193 void __cfg80211_send_disassoc(struct net_device *dev,
194 const u8 *buf, size_t len)
196 struct wireless_dev *wdev = dev->ieee80211_ptr;
197 struct wiphy *wiphy = wdev->wiphy;
198 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
199 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)buf;
200 const u8 *bssid = mgmt->bssid;
206 ASSERT_WDEV_LOCK(wdev);
208 nl80211_send_disassoc(rdev, dev, buf, len, GFP_KERNEL);
210 if (wdev->sme_state != CFG80211_SME_CONNECTED)
213 if (wdev->current_bss &&
214 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
215 for (i = 0; i < MAX_AUTH_BSSES; i++) {
216 if (wdev->authtry_bsses[i] || wdev->auth_bsses[i])
218 wdev->auth_bsses[i] = wdev->current_bss;
219 wdev->current_bss = NULL;
221 cfg80211_sme_disassoc(dev, i);
229 reason_code = le16_to_cpu(mgmt->u.disassoc.reason_code);
231 from_ap = memcmp(mgmt->sa, dev->dev_addr, ETH_ALEN) != 0;
232 __cfg80211_disconnected(dev, NULL, 0, reason_code, from_ap);
234 EXPORT_SYMBOL(__cfg80211_send_disassoc);
236 void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len)
238 struct wireless_dev *wdev = dev->ieee80211_ptr;
241 __cfg80211_send_disassoc(dev, buf, len);
244 EXPORT_SYMBOL(cfg80211_send_disassoc);
246 void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr)
248 struct wireless_dev *wdev = dev->ieee80211_ptr;
249 struct wiphy *wiphy = wdev->wiphy;
250 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
256 nl80211_send_auth_timeout(rdev, dev, addr, GFP_KERNEL);
257 if (wdev->sme_state == CFG80211_SME_CONNECTING)
258 __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
259 WLAN_STATUS_UNSPECIFIED_FAILURE,
262 for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
263 if (wdev->authtry_bsses[i] &&
264 memcmp(wdev->authtry_bsses[i]->pub.bssid,
265 addr, ETH_ALEN) == 0) {
266 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
267 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
268 wdev->authtry_bsses[i] = NULL;
278 EXPORT_SYMBOL(cfg80211_send_auth_timeout);
280 void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr)
282 struct wireless_dev *wdev = dev->ieee80211_ptr;
283 struct wiphy *wiphy = wdev->wiphy;
284 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
290 nl80211_send_assoc_timeout(rdev, dev, addr, GFP_KERNEL);
291 if (wdev->sme_state == CFG80211_SME_CONNECTING)
292 __cfg80211_connect_result(dev, addr, NULL, 0, NULL, 0,
293 WLAN_STATUS_UNSPECIFIED_FAILURE,
296 for (i = 0; addr && i < MAX_AUTH_BSSES; i++) {
297 if (wdev->auth_bsses[i] &&
298 memcmp(wdev->auth_bsses[i]->pub.bssid,
299 addr, ETH_ALEN) == 0) {
300 cfg80211_unhold_bss(wdev->auth_bsses[i]);
301 cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
302 wdev->auth_bsses[i] = NULL;
312 EXPORT_SYMBOL(cfg80211_send_assoc_timeout);
314 void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr,
315 enum nl80211_key_type key_type, int key_id,
316 const u8 *tsc, gfp_t gfp)
318 struct wiphy *wiphy = dev->ieee80211_ptr->wiphy;
319 struct cfg80211_registered_device *rdev = wiphy_to_dev(wiphy);
320 #ifdef CONFIG_CFG80211_WEXT
321 union iwreq_data wrqu;
322 char *buf = kmalloc(128, gfp);
325 sprintf(buf, "MLME-MICHAELMICFAILURE.indication("
326 "keyid=%d %scast addr=%pM)", key_id,
327 key_type == NL80211_KEYTYPE_GROUP ? "broad" : "uni",
329 memset(&wrqu, 0, sizeof(wrqu));
330 wrqu.data.length = strlen(buf);
331 wireless_send_event(dev, IWEVCUSTOM, &wrqu, buf);
336 nl80211_michael_mic_failure(rdev, dev, addr, key_type, key_id, tsc, gfp);
338 EXPORT_SYMBOL(cfg80211_michael_mic_failure);
340 /* some MLME handling for userspace SME */
341 int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
342 struct net_device *dev,
343 struct ieee80211_channel *chan,
344 enum nl80211_auth_type auth_type,
346 const u8 *ssid, int ssid_len,
347 const u8 *ie, int ie_len,
348 const u8 *key, int key_len, int key_idx)
350 struct wireless_dev *wdev = dev->ieee80211_ptr;
351 struct cfg80211_auth_request req;
352 struct cfg80211_internal_bss *bss;
353 int i, err, slot = -1, nfree = 0;
355 ASSERT_WDEV_LOCK(wdev);
357 if (auth_type == NL80211_AUTHTYPE_SHARED_KEY)
358 if (!key || !key_len || key_idx < 0 || key_idx > 4)
361 if (wdev->current_bss &&
362 memcmp(bssid, wdev->current_bss->pub.bssid, ETH_ALEN) == 0)
365 for (i = 0; i < MAX_AUTH_BSSES; i++) {
366 if (wdev->authtry_bsses[i] &&
367 memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid,
370 if (wdev->auth_bsses[i] &&
371 memcmp(bssid, wdev->auth_bsses[i]->pub.bssid,
376 memset(&req, 0, sizeof(req));
380 req.auth_type = auth_type;
381 req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
382 WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
384 req.key_len = key_len;
385 req.key_idx = key_idx;
389 bss = bss_from_pub(req.bss);
391 for (i = 0; i < MAX_AUTH_BSSES; i++) {
392 if (!wdev->auth_bsses[i] && !wdev->authtry_bsses[i]) {
398 /* we need one free slot for disassoc and one for this auth */
404 wdev->authtry_bsses[slot] = bss;
405 cfg80211_hold_bss(bss);
407 err = rdev->ops->auth(&rdev->wiphy, dev, &req);
409 wdev->authtry_bsses[slot] = NULL;
410 cfg80211_unhold_bss(bss);
415 cfg80211_put_bss(req.bss);
419 int cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
420 struct net_device *dev, struct ieee80211_channel *chan,
421 enum nl80211_auth_type auth_type, const u8 *bssid,
422 const u8 *ssid, int ssid_len,
423 const u8 *ie, int ie_len,
424 const u8 *key, int key_len, int key_idx)
428 wdev_lock(dev->ieee80211_ptr);
429 err = __cfg80211_mlme_auth(rdev, dev, chan, auth_type, bssid,
430 ssid, ssid_len, ie, ie_len,
431 key, key_len, key_idx);
432 wdev_unlock(dev->ieee80211_ptr);
437 int __cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
438 struct net_device *dev,
439 struct ieee80211_channel *chan,
440 const u8 *bssid, const u8 *prev_bssid,
441 const u8 *ssid, int ssid_len,
442 const u8 *ie, int ie_len, bool use_mfp,
443 struct cfg80211_crypto_settings *crypt)
445 struct wireless_dev *wdev = dev->ieee80211_ptr;
446 struct cfg80211_assoc_request req;
447 struct cfg80211_internal_bss *bss;
448 int i, err, slot = -1;
450 ASSERT_WDEV_LOCK(wdev);
452 memset(&req, 0, sizeof(req));
454 if (wdev->current_bss)
459 memcpy(&req.crypto, crypt, sizeof(req.crypto));
460 req.use_mfp = use_mfp;
461 req.prev_bssid = prev_bssid;
462 req.bss = cfg80211_get_bss(&rdev->wiphy, chan, bssid, ssid, ssid_len,
463 WLAN_CAPABILITY_ESS, WLAN_CAPABILITY_ESS);
467 bss = bss_from_pub(req.bss);
469 for (i = 0; i < MAX_AUTH_BSSES; i++) {
470 if (bss == wdev->auth_bsses[i]) {
481 err = rdev->ops->assoc(&rdev->wiphy, dev, &req);
483 /* still a reference in wdev->auth_bsses[slot] */
484 cfg80211_put_bss(req.bss);
488 int cfg80211_mlme_assoc(struct cfg80211_registered_device *rdev,
489 struct net_device *dev,
490 struct ieee80211_channel *chan,
491 const u8 *bssid, const u8 *prev_bssid,
492 const u8 *ssid, int ssid_len,
493 const u8 *ie, int ie_len, bool use_mfp,
494 struct cfg80211_crypto_settings *crypt)
496 struct wireless_dev *wdev = dev->ieee80211_ptr;
500 err = __cfg80211_mlme_assoc(rdev, dev, chan, bssid, prev_bssid,
501 ssid, ssid_len, ie, ie_len, use_mfp, crypt);
507 int __cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
508 struct net_device *dev, const u8 *bssid,
509 const u8 *ie, int ie_len, u16 reason)
511 struct wireless_dev *wdev = dev->ieee80211_ptr;
512 struct cfg80211_deauth_request req;
515 ASSERT_WDEV_LOCK(wdev);
517 memset(&req, 0, sizeof(req));
518 req.reason_code = reason;
521 if (wdev->current_bss &&
522 memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0) {
523 req.bss = &wdev->current_bss->pub;
524 } else for (i = 0; i < MAX_AUTH_BSSES; i++) {
525 if (wdev->auth_bsses[i] &&
526 memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
527 req.bss = &wdev->auth_bsses[i]->pub;
530 if (wdev->authtry_bsses[i] &&
531 memcmp(bssid, wdev->authtry_bsses[i]->pub.bssid, ETH_ALEN) == 0) {
532 req.bss = &wdev->authtry_bsses[i]->pub;
540 return rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
543 int cfg80211_mlme_deauth(struct cfg80211_registered_device *rdev,
544 struct net_device *dev, const u8 *bssid,
545 const u8 *ie, int ie_len, u16 reason)
547 struct wireless_dev *wdev = dev->ieee80211_ptr;
551 err = __cfg80211_mlme_deauth(rdev, dev, bssid, ie, ie_len, reason);
557 static int __cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
558 struct net_device *dev, const u8 *bssid,
559 const u8 *ie, int ie_len, u16 reason)
561 struct wireless_dev *wdev = dev->ieee80211_ptr;
562 struct cfg80211_disassoc_request req;
564 ASSERT_WDEV_LOCK(wdev);
566 if (wdev->sme_state != CFG80211_SME_CONNECTED)
569 if (WARN_ON(!wdev->current_bss))
572 memset(&req, 0, sizeof(req));
573 req.reason_code = reason;
576 if (memcmp(wdev->current_bss->pub.bssid, bssid, ETH_ALEN) == 0)
577 req.bss = &wdev->current_bss->pub;
581 return rdev->ops->disassoc(&rdev->wiphy, dev, &req, wdev);
584 int cfg80211_mlme_disassoc(struct cfg80211_registered_device *rdev,
585 struct net_device *dev, const u8 *bssid,
586 const u8 *ie, int ie_len, u16 reason)
588 struct wireless_dev *wdev = dev->ieee80211_ptr;
592 err = __cfg80211_mlme_disassoc(rdev, dev, bssid, ie, ie_len, reason);
598 void cfg80211_mlme_down(struct cfg80211_registered_device *rdev,
599 struct net_device *dev)
601 struct wireless_dev *wdev = dev->ieee80211_ptr;
602 struct cfg80211_deauth_request req;
605 ASSERT_WDEV_LOCK(wdev);
607 if (!rdev->ops->deauth)
610 memset(&req, 0, sizeof(req));
611 req.reason_code = WLAN_REASON_DEAUTH_LEAVING;
615 if (wdev->current_bss) {
616 req.bss = &wdev->current_bss->pub;
617 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
618 if (wdev->current_bss) {
619 cfg80211_unhold_bss(wdev->current_bss);
620 cfg80211_put_bss(&wdev->current_bss->pub);
621 wdev->current_bss = NULL;
625 for (i = 0; i < MAX_AUTH_BSSES; i++) {
626 if (wdev->auth_bsses[i]) {
627 req.bss = &wdev->auth_bsses[i]->pub;
628 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
629 if (wdev->auth_bsses[i]) {
630 cfg80211_unhold_bss(wdev->auth_bsses[i]);
631 cfg80211_put_bss(&wdev->auth_bsses[i]->pub);
632 wdev->auth_bsses[i] = NULL;
635 if (wdev->authtry_bsses[i]) {
636 req.bss = &wdev->authtry_bsses[i]->pub;
637 rdev->ops->deauth(&rdev->wiphy, dev, &req, wdev);
638 if (wdev->authtry_bsses[i]) {
639 cfg80211_unhold_bss(wdev->authtry_bsses[i]);
640 cfg80211_put_bss(&wdev->authtry_bsses[i]->pub);
641 wdev->authtry_bsses[i] = NULL;