| /* |
| * This file contains the softmac's authentication logic. |
| * |
| * Copyright (c) 2005, 2006 Johannes Berg <johannes@sipsolutions.net> |
| * Joseph Jezak <josejx@gentoo.org> |
| * Larry Finger <Larry.Finger@lwfinger.net> |
| * Danny van Dyk <kugelfang@gentoo.org> |
| * Michael Buesch <mbuesch@freenet.de> |
| * |
| * This program is free software; you can redistribute it and/or modify it |
| * under the terms of version 2 of the GNU General Public License as |
| * published by the Free Software Foundation. |
| * |
| * This program is distributed in the hope that it will be useful, but WITHOUT |
| * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for |
| * more details. |
| * |
| * You should have received a copy of the GNU General Public License |
| * along with this program; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
| * |
| * The full GNU General Public License is included in this distribution in the |
| * file called COPYING. |
| */ |
| |
| #include "ieee80211softmac_priv.h" |
| |
| static void ieee80211softmac_auth_queue(struct work_struct *work); |
| |
| /* Queues an auth request to the desired AP */ |
| int |
| ieee80211softmac_auth_req(struct ieee80211softmac_device *mac, |
| struct ieee80211softmac_network *net) |
| { |
| struct ieee80211softmac_auth_queue_item *auth; |
| unsigned long flags; |
| DECLARE_MAC_BUF(mac2); |
| |
| if (net->authenticating || net->authenticated) |
| return 0; |
| net->authenticating = 1; |
| |
| /* Add the network if it's not already added */ |
| ieee80211softmac_add_network(mac, net); |
| |
| dprintk(KERN_NOTICE PFX "Queueing Authentication Request to %s\n", print_mac(mac2, net->bssid)); |
| /* Queue the auth request */ |
| auth = (struct ieee80211softmac_auth_queue_item *) |
| kmalloc(sizeof(struct ieee80211softmac_auth_queue_item), GFP_KERNEL); |
| if(auth == NULL) |
| return -ENOMEM; |
| |
| auth->net = net; |
| auth->mac = mac; |
| auth->retry = IEEE80211SOFTMAC_AUTH_RETRY_LIMIT; |
| auth->state = IEEE80211SOFTMAC_AUTH_OPEN_REQUEST; |
| INIT_DELAYED_WORK(&auth->work, ieee80211softmac_auth_queue); |
| |
| /* Lock (for list) */ |
| spin_lock_irqsave(&mac->lock, flags); |
| |
| /* add to list */ |
| list_add_tail(&auth->list, &mac->auth_queue); |
| queue_delayed_work(mac->wq, &auth->work, 0); |
| spin_unlock_irqrestore(&mac->lock, flags); |
| |
| return 0; |
| } |
| |
| |
| /* Sends an auth request to the desired AP and handles timeouts */ |
| static void |
| ieee80211softmac_auth_queue(struct work_struct *work) |
| { |
| struct ieee80211softmac_device *mac; |
| struct ieee80211softmac_auth_queue_item *auth; |
| struct ieee80211softmac_network *net; |
| unsigned long flags; |
| DECLARE_MAC_BUF(mac2); |
| |
| auth = container_of(work, struct ieee80211softmac_auth_queue_item, |
| work.work); |
| net = auth->net; |
| mac = auth->mac; |
| |
| if(auth->retry > 0) { |
| /* Switch to correct channel for this network */ |
| mac->set_channel(mac->dev, net->channel); |
| |
| /* Lock and set flags */ |
| spin_lock_irqsave(&mac->lock, flags); |
| if (unlikely(!mac->running)) { |
| /* Prevent reschedule on workqueue flush */ |
| spin_unlock_irqrestore(&mac->lock, flags); |
| return; |
| } |
| net->authenticated = 0; |
| /* add a timeout call so we eventually give up waiting for an auth reply */ |
| queue_delayed_work(mac->wq, &auth->work, IEEE80211SOFTMAC_AUTH_TIMEOUT); |
| auth->retry--; |
| spin_unlock_irqrestore(&mac->lock, flags); |
| if (ieee80211softmac_send_mgt_frame(mac, auth->net, IEEE80211_STYPE_AUTH, auth->state)) |
| dprintk(KERN_NOTICE PFX "Sending Authentication Request to %s failed (this shouldn't happen, wait for the timeout).\n", |
| print_mac(mac2, net->bssid)); |
| else |
| dprintk(KERN_NOTICE PFX "Sent Authentication Request to %s.\n", print_mac(mac2, net->bssid)); |
| return; |
| } |
| |
| printkl(KERN_WARNING PFX "Authentication timed out with %s\n", print_mac(mac2, net->bssid)); |
| /* Remove this item from the queue */ |
| spin_lock_irqsave(&mac->lock, flags); |
| net->authenticating = 0; |
| ieee80211softmac_call_events_locked(mac, IEEE80211SOFTMAC_EVENT_AUTH_TIMEOUT, net); |
| cancel_delayed_work(&auth->work); /* just to make sure... */ |
| list_del(&auth->list); |
| spin_unlock_irqrestore(&mac->lock, flags); |
| /* Free it */ |
| kfree(auth); |
| } |
| |
| /* Sends a response to an auth challenge (for shared key auth). */ |
| static void |
| ieee80211softmac_auth_challenge_response(struct work_struct *work) |
| { |
| struct ieee80211softmac_auth_queue_item *aq = |
| container_of(work, struct ieee80211softmac_auth_queue_item, |
| work.work); |
| |
| /* Send our response */ |
| ieee80211softmac_send_mgt_frame(aq->mac, aq->net, IEEE80211_STYPE_AUTH, aq->state); |
| } |
| |
| /* Handle the auth response from the AP |
| * This should be registered with ieee80211 as handle_auth |
| */ |
| int |
| ieee80211softmac_auth_resp(struct net_device *dev, struct ieee80211_auth *auth) |
| { |
| |
| struct list_head *list_ptr; |
| struct ieee80211softmac_device *mac = ieee80211_priv(dev); |
| struct ieee80211softmac_auth_queue_item *aq = NULL; |
| struct ieee80211softmac_network *net = NULL; |
| unsigned long flags; |
| u8 * data; |
| DECLARE_MAC_BUF(mac2); |
| |
| if (unlikely(!mac->running)) |
| return -ENODEV; |
| |
| /* Find correct auth queue item */ |
| spin_lock_irqsave(&mac->lock, flags); |
| list_for_each(list_ptr, &mac->auth_queue) { |
| aq = list_entry(list_ptr, struct ieee80211softmac_auth_queue_item, list); |
| net = aq->net; |
| if (!memcmp(net->bssid, auth->header.addr2, ETH_ALEN)) |
| break; |
| else |
| aq = NULL; |
| } |
| spin_unlock_irqrestore(&mac->lock, flags); |
| |
| /* Make sure that we've got an auth queue item for this request */ |
| if(aq == NULL) |
| { |
| dprintkl(KERN_DEBUG PFX "Authentication response received from %s but no queue item exists.\n", print_mac(mac2, auth->header.addr2)); |
| /* Error #? */ |
| return -1; |
| } |
| |
| /* Check for out of order authentication */ |
| if(!net->authenticating) |
| { |
| dprintkl(KERN_DEBUG PFX "Authentication response received from %s but did not request authentication.\n",print_mac(mac2, auth->header.addr2)); |
| return -1; |
| } |
| |
| /* Parse the auth packet */ |
| switch(auth->algorithm) { |
| case WLAN_AUTH_OPEN: |
| /* Check the status code of the response */ |
| |
| switch(auth->status) { |
| case WLAN_STATUS_SUCCESS: |
| /* Update the status to Authenticated */ |
| spin_lock_irqsave(&mac->lock, flags); |
| net->authenticating = 0; |
| net->authenticated = 1; |
| spin_unlock_irqrestore(&mac->lock, flags); |
| |
| /* Send event */ |
| printkl(KERN_NOTICE PFX "Open Authentication completed with %s\n", print_mac(mac2, net->bssid)); |
| ieee80211softmac_call_events(mac, IEEE80211SOFTMAC_EVENT_AUTHENTICATED, net); |
| break; |
| default: |
| /* Lock and reset flags */ |
| spin_lock_irqsave(&mac->lock, flags); |
| net->authenticated = 0; |
| net->authenticating = 0; |
| spin_unlock_irqrestore(&mac->lock, flags); |
| |
| printkl(KERN_NOTICE PFX "Open Authentication with %s failed, error code: %i\n", |
| print_mac(mac2, net->bssid), le16_to_cpup(&auth->status)); |
| /* Count the error? */ |
| break; |
| } |
| goto free_aq; |
| break; |
| case WLAN_AUTH_SHARED_KEY: |
| /* Figure out where we are in the process */ |
| switch(auth->transaction) { |
| case IEEE80211SOFTMAC_AUTH_SHARED_CHALLENGE: |
| /* Check to make sure we have a challenge IE */ |
| data = (u8 *)auth->info_element; |
| if (*data++ != MFIE_TYPE_CHALLENGE) { |
| printkl(KERN_NOTICE PFX "Shared Key Authentication failed due to a missing challenge.\n"); |
| break; |
| } |
| /* Save the challenge */ |
| spin_lock_irqsave(&mac->lock, flags); |
| net->challenge_len = *data++; |
| if (net->challenge_len > WLAN_AUTH_CHALLENGE_LEN) |
| net->challenge_len = WLAN_AUTH_CHALLENGE_LEN; |
| kfree(net->challenge); |
| net->challenge = kmemdup(data, net->challenge_len, |
| GFP_ATOMIC); |
| if (net->challenge == NULL) { |
| printkl(KERN_NOTICE PFX "Shared Key " |
| "Authentication failed due to " |
| "memory shortage.\n"); |
| spin_unlock_irqrestore(&mac->lock, flags); |
| break; |
| } |
| aq->state = IEEE80211SOFTMAC_AUTH_SHARED_RESPONSE; |
| |
| /* We reuse the work struct from the auth request here. |
| * It is safe to do so as each one is per-request, and |
| * at this point (dealing with authentication response) |
| * we have obviously already sent the initial auth |
| * request. */ |
| cancel_delayed_work(&aq->work); |
| INIT_DELAYED_WORK(&aq->work, &ieee80211softmac_auth_challenge_response); |
| queue_delayed_work(mac->wq, &aq->work, 0); |
| spin_unlock_irqrestore(&mac->lock, flags); |
| return 0; |
| case IEEE80211SOFTMAC_AUTH_SHARED_PASS: |
| kfree(net->challenge); |
| net->challenge = NULL; |
| net->challenge_len = 0; |
| /* Check the status code of the response */ |
| switch(auth->status) { |
| case WLAN_STATUS_SUCCESS: |
| /* Update the status to Authenticated */ |
| spin_lock_irqsave(&mac->lock, flags); |
| net->authenticating = 0; |
| net->authenticated = 1; |
| spin_unlock_irqrestore(&mac->lock, flags); |
| printkl(KERN_NOTICE PFX "Shared Key Authentication completed with %s\n", |
| print_mac(mac2, net->bssid)); |
| ieee80211softmac_call_events(mac, IEEE80211SOFTMAC_EVENT_AUTHENTICATED, net); |
| break; |
| default: |
| printkl(KERN_NOTICE PFX "Shared Key Authentication with %s failed, error code: %i\n", |
| print_mac(mac2, net->bssid), le16_to_cpup(&auth->status)); |
| /* Lock and reset flags */ |
| spin_lock_irqsave(&mac->lock, flags); |
| net->authenticating = 0; |
| net->authenticated = 0; |
| spin_unlock_irqrestore(&mac->lock, flags); |
| /* Count the error? */ |
| break; |
| } |
| goto free_aq; |
| break; |
| default: |
| printkl(KERN_WARNING PFX "Unhandled Authentication Step: %i\n", auth->transaction); |
| break; |
| } |
| goto free_aq; |
| break; |
| default: |
| /* ERROR */ |
| goto free_aq; |
| break; |
| } |
| return 0; |
| free_aq: |
| /* Cancel the timeout */ |
| spin_lock_irqsave(&mac->lock, flags); |
| cancel_delayed_work(&aq->work); |
| /* Remove this item from the queue */ |
| list_del(&aq->list); |
| spin_unlock_irqrestore(&mac->lock, flags); |
| |
| /* Free it */ |
| kfree(aq); |
| return 0; |
| } |
| |
| /* |
| * Handle deauthorization |
| */ |
| static void |
| ieee80211softmac_deauth_from_net(struct ieee80211softmac_device *mac, |
| struct ieee80211softmac_network *net) |
| { |
| struct ieee80211softmac_auth_queue_item *aq = NULL; |
| struct list_head *list_ptr; |
| unsigned long flags; |
| |
| /* deauthentication implies disassociation */ |
| ieee80211softmac_disassoc(mac); |
| |
| /* Lock and reset status flags */ |
| spin_lock_irqsave(&mac->lock, flags); |
| net->authenticating = 0; |
| net->authenticated = 0; |
| |
| /* Find correct auth queue item, if it exists */ |
| list_for_each(list_ptr, &mac->auth_queue) { |
| aq = list_entry(list_ptr, struct ieee80211softmac_auth_queue_item, list); |
| if (!memcmp(net->bssid, aq->net->bssid, ETH_ALEN)) |
| break; |
| else |
| aq = NULL; |
| } |
| |
| /* Cancel pending work */ |
| if(aq != NULL) |
| /* Not entirely safe? What about running work? */ |
| cancel_delayed_work(&aq->work); |
| |
| /* Free our network ref */ |
| ieee80211softmac_del_network_locked(mac, net); |
| if(net->challenge != NULL) |
| kfree(net->challenge); |
| kfree(net); |
| |
| /* can't transmit data right now... */ |
| netif_carrier_off(mac->dev); |
| spin_unlock_irqrestore(&mac->lock, flags); |
| |
| ieee80211softmac_try_reassoc(mac); |
| } |
| |
| /* |
| * Sends a deauth request to the desired AP |
| */ |
| int |
| ieee80211softmac_deauth_req(struct ieee80211softmac_device *mac, |
| struct ieee80211softmac_network *net, int reason) |
| { |
| int ret; |
| |
| /* Make sure the network is authenticated */ |
| if (!net->authenticated) |
| { |
| dprintkl(KERN_DEBUG PFX "Can't send deauthentication packet, network is not authenticated.\n"); |
| /* Error okay? */ |
| return -EPERM; |
| } |
| |
| /* Send the de-auth packet */ |
| if((ret = ieee80211softmac_send_mgt_frame(mac, net, IEEE80211_STYPE_DEAUTH, reason))) |
| return ret; |
| |
| ieee80211softmac_deauth_from_net(mac, net); |
| return 0; |
| } |
| |
| /* |
| * This should be registered with ieee80211 as handle_deauth |
| */ |
| int |
| ieee80211softmac_deauth_resp(struct net_device *dev, struct ieee80211_deauth *deauth) |
| { |
| |
| struct ieee80211softmac_network *net = NULL; |
| struct ieee80211softmac_device *mac = ieee80211_priv(dev); |
| DECLARE_MAC_BUF(mac2); |
| |
| if (unlikely(!mac->running)) |
| return -ENODEV; |
| |
| if (!deauth) { |
| dprintk("deauth without deauth packet. eek!\n"); |
| return 0; |
| } |
| |
| net = ieee80211softmac_get_network_by_bssid(mac, deauth->header.addr2); |
| |
| if (net == NULL) { |
| dprintkl(KERN_DEBUG PFX "Received deauthentication packet from %s, but that network is unknown.\n", |
| print_mac(mac2, deauth->header.addr2)); |
| return 0; |
| } |
| |
| /* Make sure the network is authenticated */ |
| if(!net->authenticated) |
| { |
| dprintkl(KERN_DEBUG PFX "Can't perform deauthentication, network is not authenticated.\n"); |
| /* Error okay? */ |
| return -EPERM; |
| } |
| |
| ieee80211softmac_deauth_from_net(mac, net); |
| |
| /* let's try to re-associate */ |
| queue_delayed_work(mac->wq, &mac->associnfo.work, 0); |
| return 0; |
| } |