[NET]: Introduce and use print_mac() and DECLARE_MAC_BUF()
[deliverable/linux.git] / net / ieee80211 / softmac / ieee80211softmac_auth.c
CommitLineData
4855d25b
JB
1/*
2 * This file contains the softmac's authentication logic.
3 *
79859051
JB
4 * Copyright (c) 2005, 2006 Johannes Berg <johannes@sipsolutions.net>
5 * Joseph Jezak <josejx@gentoo.org>
6 * Larry Finger <Larry.Finger@lwfinger.net>
7 * Danny van Dyk <kugelfang@gentoo.org>
8 * Michael Buesch <mbuesch@freenet.de>
4855d25b
JB
9 *
10 * This program is free software; you can redistribute it and/or modify it
11 * under the terms of version 2 of the GNU General Public License as
12 * published by the Free Software Foundation.
13 *
14 * This program is distributed in the hope that it will be useful, but WITHOUT
15 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
16 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
17 * more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
22 *
23 * The full GNU General Public License is included in this distribution in the
24 * file called COPYING.
25 */
26
370121e5
JB
27#include "ieee80211softmac_priv.h"
28
c4028958 29static void ieee80211softmac_auth_queue(struct work_struct *work);
370121e5
JB
30
31/* Queues an auth request to the desired AP */
32int
64265651 33ieee80211softmac_auth_req(struct ieee80211softmac_device *mac,
370121e5
JB
34 struct ieee80211softmac_network *net)
35{
36 struct ieee80211softmac_auth_queue_item *auth;
37 unsigned long flags;
0795af57 38 DECLARE_MAC_BUF(mac2);
64265651 39
cb74c432 40 if (net->authenticating || net->authenticated)
370121e5 41 return 0;
cb74c432 42 net->authenticating = 1;
370121e5
JB
43
44 /* Add the network if it's not already added */
45 ieee80211softmac_add_network(mac, net);
46
0795af57 47 dprintk(KERN_NOTICE PFX "Queueing Authentication Request to %s\n", print_mac(mac2, net->bssid));
370121e5
JB
48 /* Queue the auth request */
49 auth = (struct ieee80211softmac_auth_queue_item *)
50 kmalloc(sizeof(struct ieee80211softmac_auth_queue_item), GFP_KERNEL);
51 if(auth == NULL)
52 return -ENOMEM;
53
54 auth->net = net;
55 auth->mac = mac;
56 auth->retry = IEEE80211SOFTMAC_AUTH_RETRY_LIMIT;
57 auth->state = IEEE80211SOFTMAC_AUTH_OPEN_REQUEST;
c4028958 58 INIT_DELAYED_WORK(&auth->work, ieee80211softmac_auth_queue);
64265651 59
370121e5
JB
60 /* Lock (for list) */
61 spin_lock_irqsave(&mac->lock, flags);
62
63 /* add to list */
64 list_add_tail(&auth->list, &mac->auth_queue);
c4028958 65 schedule_delayed_work(&auth->work, 0);
370121e5 66 spin_unlock_irqrestore(&mac->lock, flags);
64265651 67
370121e5
JB
68 return 0;
69}
70
71
72/* Sends an auth request to the desired AP and handles timeouts */
73static void
c4028958 74ieee80211softmac_auth_queue(struct work_struct *work)
370121e5
JB
75{
76 struct ieee80211softmac_device *mac;
77 struct ieee80211softmac_auth_queue_item *auth;
78 struct ieee80211softmac_network *net;
79 unsigned long flags;
0795af57 80 DECLARE_MAC_BUF(mac2);
370121e5 81
c4028958
DH
82 auth = container_of(work, struct ieee80211softmac_auth_queue_item,
83 work.work);
370121e5
JB
84 net = auth->net;
85 mac = auth->mac;
86
87 if(auth->retry > 0) {
88 /* Switch to correct channel for this network */
89 mac->set_channel(mac->dev, net->channel);
64265651 90
370121e5
JB
91 /* Lock and set flags */
92 spin_lock_irqsave(&mac->lock, flags);
d57336e3
DD
93 if (unlikely(!mac->running)) {
94 /* Prevent reschedule on workqueue flush */
95 spin_unlock_irqrestore(&mac->lock, flags);
96 return;
97 }
370121e5 98 net->authenticated = 0;
370121e5 99 /* add a timeout call so we eventually give up waiting for an auth reply */
5c4df6da 100 schedule_delayed_work(&auth->work, IEEE80211SOFTMAC_AUTH_TIMEOUT);
370121e5
JB
101 auth->retry--;
102 spin_unlock_irqrestore(&mac->lock, flags);
103 if (ieee80211softmac_send_mgt_frame(mac, auth->net, IEEE80211_STYPE_AUTH, auth->state))
0795af57
JP
104 dprintk(KERN_NOTICE PFX "Sending Authentication Request to %s failed (this shouldn't happen, wait for the timeout).\n",
105 print_mac(mac2, net->bssid));
370121e5 106 else
0795af57 107 dprintk(KERN_NOTICE PFX "Sent Authentication Request to %s.\n", print_mac(mac2, net->bssid));
370121e5
JB
108 return;
109 }
110
0795af57 111 printkl(KERN_WARNING PFX "Authentication timed out with %s\n", print_mac(mac2, net->bssid));
370121e5
JB
112 /* Remove this item from the queue */
113 spin_lock_irqsave(&mac->lock, flags);
76ea4c7f 114 net->authenticating = 0;
370121e5
JB
115 ieee80211softmac_call_events_locked(mac, IEEE80211SOFTMAC_EVENT_AUTH_TIMEOUT, net);
116 cancel_delayed_work(&auth->work); /* just to make sure... */
117 list_del(&auth->list);
118 spin_unlock_irqrestore(&mac->lock, flags);
119 /* Free it */
120 kfree(auth);
121}
122
345f6b8b
DD
123/* Sends a response to an auth challenge (for shared key auth). */
124static void
c4028958 125ieee80211softmac_auth_challenge_response(struct work_struct *work)
345f6b8b 126{
c4028958
DH
127 struct ieee80211softmac_auth_queue_item *aq =
128 container_of(work, struct ieee80211softmac_auth_queue_item,
129 work.work);
345f6b8b
DD
130
131 /* Send our response */
132 ieee80211softmac_send_mgt_frame(aq->mac, aq->net, IEEE80211_STYPE_AUTH, aq->state);
133}
134
370121e5 135/* Handle the auth response from the AP
64265651 136 * This should be registered with ieee80211 as handle_auth
370121e5 137 */
64265651 138int
370121e5 139ieee80211softmac_auth_resp(struct net_device *dev, struct ieee80211_auth *auth)
64265651 140{
370121e5
JB
141
142 struct list_head *list_ptr;
143 struct ieee80211softmac_device *mac = ieee80211_priv(dev);
144 struct ieee80211softmac_auth_queue_item *aq = NULL;
145 struct ieee80211softmac_network *net = NULL;
146 unsigned long flags;
147 u8 * data;
0795af57 148 DECLARE_MAC_BUF(mac2);
64265651 149
d57336e3
DD
150 if (unlikely(!mac->running))
151 return -ENODEV;
152
370121e5
JB
153 /* Find correct auth queue item */
154 spin_lock_irqsave(&mac->lock, flags);
155 list_for_each(list_ptr, &mac->auth_queue) {
156 aq = list_entry(list_ptr, struct ieee80211softmac_auth_queue_item, list);
157 net = aq->net;
158 if (!memcmp(net->bssid, auth->header.addr2, ETH_ALEN))
159 break;
160 else
161 aq = NULL;
162 }
163 spin_unlock_irqrestore(&mac->lock, flags);
64265651 164
370121e5
JB
165 /* Make sure that we've got an auth queue item for this request */
166 if(aq == NULL)
167 {
0795af57 168 dprintkl(KERN_DEBUG PFX "Authentication response received from %s but no queue item exists.\n", print_mac(mac2, auth->header.addr2));
370121e5
JB
169 /* Error #? */
170 return -1;
64265651
YH
171 }
172
370121e5
JB
173 /* Check for out of order authentication */
174 if(!net->authenticating)
175 {
0795af57 176 dprintkl(KERN_DEBUG PFX "Authentication response received from %s but did not request authentication.\n",print_mac(mac2, auth->header.addr2));
370121e5
JB
177 return -1;
178 }
179
180 /* Parse the auth packet */
181 switch(auth->algorithm) {
182 case WLAN_AUTH_OPEN:
183 /* Check the status code of the response */
184
185 switch(auth->status) {
186 case WLAN_STATUS_SUCCESS:
187 /* Update the status to Authenticated */
188 spin_lock_irqsave(&mac->lock, flags);
64265651 189 net->authenticating = 0;
370121e5
JB
190 net->authenticated = 1;
191 spin_unlock_irqrestore(&mac->lock, flags);
64265651 192
370121e5 193 /* Send event */
0795af57 194 printkl(KERN_NOTICE PFX "Open Authentication completed with %s\n", print_mac(mac2, net->bssid));
370121e5
JB
195 ieee80211softmac_call_events(mac, IEEE80211SOFTMAC_EVENT_AUTHENTICATED, net);
196 break;
197 default:
198 /* Lock and reset flags */
199 spin_lock_irqsave(&mac->lock, flags);
200 net->authenticated = 0;
201 net->authenticating = 0;
202 spin_unlock_irqrestore(&mac->lock, flags);
64265651 203
0795af57
JP
204 printkl(KERN_NOTICE PFX "Open Authentication with %s failed, error code: %i\n",
205 print_mac(mac2, net->bssid), le16_to_cpup(&auth->status));
370121e5
JB
206 /* Count the error? */
207 break;
208 }
209 goto free_aq;
210 break;
211 case WLAN_AUTH_SHARED_KEY:
212 /* Figure out where we are in the process */
213 switch(auth->transaction) {
214 case IEEE80211SOFTMAC_AUTH_SHARED_CHALLENGE:
215 /* Check to make sure we have a challenge IE */
216 data = (u8 *)auth->info_element;
345f6b8b 217 if (*data++ != MFIE_TYPE_CHALLENGE) {
370121e5 218 printkl(KERN_NOTICE PFX "Shared Key Authentication failed due to a missing challenge.\n");
64265651 219 break;
370121e5
JB
220 }
221 /* Save the challenge */
222 spin_lock_irqsave(&mac->lock, flags);
64265651 223 net->challenge_len = *data++;
345f6b8b 224 if (net->challenge_len > WLAN_AUTH_CHALLENGE_LEN)
370121e5 225 net->challenge_len = WLAN_AUTH_CHALLENGE_LEN;
571d6eee
ACM
226 kfree(net->challenge);
227 net->challenge = kmemdup(data, net->challenge_len,
228 GFP_ATOMIC);
229 if (net->challenge == NULL) {
230 printkl(KERN_NOTICE PFX "Shared Key "
231 "Authentication failed due to "
232 "memory shortage.\n");
233 spin_unlock_irqrestore(&mac->lock, flags);
234 break;
235 }
64265651 236 aq->state = IEEE80211SOFTMAC_AUTH_SHARED_RESPONSE;
370121e5 237
345f6b8b
DD
238 /* We reuse the work struct from the auth request here.
239 * It is safe to do so as each one is per-request, and
240 * at this point (dealing with authentication response)
241 * we have obviously already sent the initial auth
242 * request. */
243 cancel_delayed_work(&aq->work);
c4028958
DH
244 INIT_DELAYED_WORK(&aq->work, &ieee80211softmac_auth_challenge_response);
245 schedule_delayed_work(&aq->work, 0);
345f6b8b 246 spin_unlock_irqrestore(&mac->lock, flags);
76ea4c7f 247 return 0;
370121e5 248 case IEEE80211SOFTMAC_AUTH_SHARED_PASS:
76ea4c7f
DD
249 kfree(net->challenge);
250 net->challenge = NULL;
251 net->challenge_len = 0;
370121e5
JB
252 /* Check the status code of the response */
253 switch(auth->status) {
254 case WLAN_STATUS_SUCCESS:
64265651 255 /* Update the status to Authenticated */
370121e5
JB
256 spin_lock_irqsave(&mac->lock, flags);
257 net->authenticating = 0;
258 net->authenticated = 1;
259 spin_unlock_irqrestore(&mac->lock, flags);
0795af57
JP
260 printkl(KERN_NOTICE PFX "Shared Key Authentication completed with %s\n",
261 print_mac(mac2, net->bssid));
76ea4c7f 262 ieee80211softmac_call_events(mac, IEEE80211SOFTMAC_EVENT_AUTHENTICATED, net);
370121e5
JB
263 break;
264 default:
0795af57
JP
265 printkl(KERN_NOTICE PFX "Shared Key Authentication with %s failed, error code: %i\n",
266 print_mac(mac2, net->bssid), le16_to_cpup(&auth->status));
370121e5
JB
267 /* Lock and reset flags */
268 spin_lock_irqsave(&mac->lock, flags);
64265651
YH
269 net->authenticating = 0;
270 net->authenticated = 0;
370121e5
JB
271 spin_unlock_irqrestore(&mac->lock, flags);
272 /* Count the error? */
273 break;
274 }
275 goto free_aq;
276 break;
277 default:
278 printkl(KERN_WARNING PFX "Unhandled Authentication Step: %i\n", auth->transaction);
279 break;
280 }
281 goto free_aq;
282 break;
283 default:
64265651 284 /* ERROR */
370121e5
JB
285 goto free_aq;
286 break;
287 }
288 return 0;
289free_aq:
290 /* Cancel the timeout */
291 spin_lock_irqsave(&mac->lock, flags);
292 cancel_delayed_work(&aq->work);
293 /* Remove this item from the queue */
294 list_del(&aq->list);
295 spin_unlock_irqrestore(&mac->lock, flags);
296
297 /* Free it */
298 kfree(aq);
299 return 0;
300}
301
302/*
303 * Handle deauthorization
304 */
714e1a51 305static void
370121e5
JB
306ieee80211softmac_deauth_from_net(struct ieee80211softmac_device *mac,
307 struct ieee80211softmac_network *net)
308{
309 struct ieee80211softmac_auth_queue_item *aq = NULL;
310 struct list_head *list_ptr;
311 unsigned long flags;
312
6d92f83f
DD
313 /* deauthentication implies disassociation */
314 ieee80211softmac_disassoc(mac);
315
370121e5
JB
316 /* Lock and reset status flags */
317 spin_lock_irqsave(&mac->lock, flags);
318 net->authenticating = 0;
319 net->authenticated = 0;
64265651 320
370121e5
JB
321 /* Find correct auth queue item, if it exists */
322 list_for_each(list_ptr, &mac->auth_queue) {
323 aq = list_entry(list_ptr, struct ieee80211softmac_auth_queue_item, list);
324 if (!memcmp(net->bssid, aq->net->bssid, ETH_ALEN))
325 break;
326 else
327 aq = NULL;
328 }
64265651 329
370121e5
JB
330 /* Cancel pending work */
331 if(aq != NULL)
332 /* Not entirely safe? What about running work? */
333 cancel_delayed_work(&aq->work);
334
335 /* Free our network ref */
336 ieee80211softmac_del_network_locked(mac, net);
337 if(net->challenge != NULL)
338 kfree(net->challenge);
339 kfree(net);
64265651 340
2dd50801
JB
341 /* can't transmit data right now... */
342 netif_carrier_off(mac->dev);
370121e5 343 spin_unlock_irqrestore(&mac->lock, flags);
2b50c245
UK
344
345 ieee80211softmac_try_reassoc(mac);
370121e5
JB
346}
347
64265651 348/*
370121e5
JB
349 * Sends a deauth request to the desired AP
350 */
64265651
YH
351int
352ieee80211softmac_deauth_req(struct ieee80211softmac_device *mac,
370121e5
JB
353 struct ieee80211softmac_network *net, int reason)
354{
355 int ret;
64265651 356
370121e5
JB
357 /* Make sure the network is authenticated */
358 if (!net->authenticated)
359 {
5398d590 360 dprintkl(KERN_DEBUG PFX "Can't send deauthentication packet, network is not authenticated.\n");
370121e5
JB
361 /* Error okay? */
362 return -EPERM;
363 }
64265651 364
370121e5
JB
365 /* Send the de-auth packet */
366 if((ret = ieee80211softmac_send_mgt_frame(mac, net, IEEE80211_STYPE_DEAUTH, reason)))
367 return ret;
64265651 368
370121e5
JB
369 ieee80211softmac_deauth_from_net(mac, net);
370 return 0;
371}
64265651 372
370121e5
JB
373/*
374 * This should be registered with ieee80211 as handle_deauth
375 */
64265651 376int
b10c991f 377ieee80211softmac_deauth_resp(struct net_device *dev, struct ieee80211_deauth *deauth)
370121e5 378{
64265651 379
370121e5
JB
380 struct ieee80211softmac_network *net = NULL;
381 struct ieee80211softmac_device *mac = ieee80211_priv(dev);
0795af57 382 DECLARE_MAC_BUF(mac2);
64265651 383
d57336e3
DD
384 if (unlikely(!mac->running))
385 return -ENODEV;
386
b10c991f 387 if (!deauth) {
370121e5
JB
388 dprintk("deauth without deauth packet. eek!\n");
389 return 0;
390 }
391
b10c991f 392 net = ieee80211softmac_get_network_by_bssid(mac, deauth->header.addr2);
64265651 393
370121e5 394 if (net == NULL) {
0795af57
JP
395 dprintkl(KERN_DEBUG PFX "Received deauthentication packet from %s, but that network is unknown.\n",
396 print_mac(mac2, deauth->header.addr2));
370121e5
JB
397 return 0;
398 }
399
400 /* Make sure the network is authenticated */
401 if(!net->authenticated)
402 {
5398d590 403 dprintkl(KERN_DEBUG PFX "Can't perform deauthentication, network is not authenticated.\n");
370121e5
JB
404 /* Error okay? */
405 return -EPERM;
406 }
407
408 ieee80211softmac_deauth_from_net(mac, net);
995c9926
DD
409
410 /* let's try to re-associate */
c4028958 411 schedule_delayed_work(&mac->associnfo.work, 0);
370121e5
JB
412 return 0;
413}
This page took 0.24754 seconds and 5 git commands to generate.