blob: 0612015f1c782688602e4965e23532a121e5eed6 [file] [log] [blame]
Johannes Berg4855d252006-01-12 21:12:59 +01001/*
2 * This file contains the softmac's authentication logic.
3 *
Johannes Berg79859052006-01-31 19:31:41 +01004 * Copyright (c) 2005, 2006 Johannes Berg <johannes@sipsolutions.net>
5 * Joseph Jezak <josejx@gentoo.org>
6 * Larry Finger <Larry.Finger@lwfinger.net>
7 * Danny van Dyk <kugelfang@gentoo.org>
8 * Michael Buesch <mbuesch@freenet.de>
Johannes Berg4855d252006-01-12 21:12:59 +01009 *
10 * This program is free software; you can redistribute it and/or modify it
11 * under the terms of version 2 of the GNU General Public License as
12 * published by the Free Software Foundation.
13 *
14 * This program is distributed in the hope that it will be useful, but WITHOUT
15 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
16 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
17 * more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
22 *
23 * The full GNU General Public License is included in this distribution in the
24 * file called COPYING.
25 */
26
Johannes Berg370121e2006-01-04 16:32:16 +010027#include "ieee80211softmac_priv.h"
28
29static void ieee80211softmac_auth_queue(void *data);
30
31/* Queues an auth request to the desired AP */
32int
33ieee80211softmac_auth_req(struct ieee80211softmac_device *mac,
34 struct ieee80211softmac_network *net)
35{
36 struct ieee80211softmac_auth_queue_item *auth;
37 unsigned long flags;
38
Joseph Jezakcb74c432006-06-11 12:00:37 -040039 if (net->authenticating || net->authenticated)
Johannes Berg370121e2006-01-04 16:32:16 +010040 return 0;
Joseph Jezakcb74c432006-06-11 12:00:37 -040041 net->authenticating = 1;
Johannes Berg370121e2006-01-04 16:32:16 +010042
43 /* Add the network if it's not already added */
44 ieee80211softmac_add_network(mac, net);
45
46 dprintk(KERN_NOTICE PFX "Queueing Authentication Request to "MAC_FMT"\n", MAC_ARG(net->bssid));
47 /* Queue the auth request */
48 auth = (struct ieee80211softmac_auth_queue_item *)
49 kmalloc(sizeof(struct ieee80211softmac_auth_queue_item), GFP_KERNEL);
50 if(auth == NULL)
51 return -ENOMEM;
52
53 auth->net = net;
54 auth->mac = mac;
55 auth->retry = IEEE80211SOFTMAC_AUTH_RETRY_LIMIT;
56 auth->state = IEEE80211SOFTMAC_AUTH_OPEN_REQUEST;
57 INIT_WORK(&auth->work, &ieee80211softmac_auth_queue, (void *)auth);
58
59 /* Lock (for list) */
60 spin_lock_irqsave(&mac->lock, flags);
61
62 /* add to list */
63 list_add_tail(&auth->list, &mac->auth_queue);
Johannes Berg5c4df6d2006-01-06 01:43:45 +010064 schedule_work(&auth->work);
Johannes Berg370121e2006-01-04 16:32:16 +010065 spin_unlock_irqrestore(&mac->lock, flags);
66
67 return 0;
68}
69
70
71/* Sends an auth request to the desired AP and handles timeouts */
72static void
73ieee80211softmac_auth_queue(void *data)
74{
75 struct ieee80211softmac_device *mac;
76 struct ieee80211softmac_auth_queue_item *auth;
77 struct ieee80211softmac_network *net;
78 unsigned long flags;
79
Johannes Berg370121e2006-01-04 16:32:16 +010080 auth = (struct ieee80211softmac_auth_queue_item *)data;
81 net = auth->net;
82 mac = auth->mac;
83
84 if(auth->retry > 0) {
85 /* Switch to correct channel for this network */
86 mac->set_channel(mac->dev, net->channel);
87
88 /* Lock and set flags */
89 spin_lock_irqsave(&mac->lock, flags);
Daniel Draked57336e2006-04-30 22:09:07 +010090 if (unlikely(!mac->running)) {
91 /* Prevent reschedule on workqueue flush */
92 spin_unlock_irqrestore(&mac->lock, flags);
93 return;
94 }
Johannes Berg370121e2006-01-04 16:32:16 +010095 net->authenticated = 0;
Johannes Berg370121e2006-01-04 16:32:16 +010096 /* add a timeout call so we eventually give up waiting for an auth reply */
Johannes Berg5c4df6d2006-01-06 01:43:45 +010097 schedule_delayed_work(&auth->work, IEEE80211SOFTMAC_AUTH_TIMEOUT);
Johannes Berg370121e2006-01-04 16:32:16 +010098 auth->retry--;
99 spin_unlock_irqrestore(&mac->lock, flags);
100 if (ieee80211softmac_send_mgt_frame(mac, auth->net, IEEE80211_STYPE_AUTH, auth->state))
101 dprintk(KERN_NOTICE PFX "Sending Authentication Request to "MAC_FMT" failed (this shouldn't happen, wait for the timeout).\n", MAC_ARG(net->bssid));
102 else
103 dprintk(KERN_NOTICE PFX "Sent Authentication Request to "MAC_FMT".\n", MAC_ARG(net->bssid));
104 return;
105 }
106
107 printkl(KERN_WARNING PFX "Authentication timed out with "MAC_FMT"\n", MAC_ARG(net->bssid));
108 /* Remove this item from the queue */
109 spin_lock_irqsave(&mac->lock, flags);
Daniel Drake76ea4c72006-06-01 15:34:26 +0100110 net->authenticating = 0;
Johannes Berg370121e2006-01-04 16:32:16 +0100111 ieee80211softmac_call_events_locked(mac, IEEE80211SOFTMAC_EVENT_AUTH_TIMEOUT, net);
112 cancel_delayed_work(&auth->work); /* just to make sure... */
113 list_del(&auth->list);
114 spin_unlock_irqrestore(&mac->lock, flags);
115 /* Free it */
116 kfree(auth);
117}
118
Daniel Drake345f6b82006-07-11 23:16:34 +0100119/* Sends a response to an auth challenge (for shared key auth). */
120static void
121ieee80211softmac_auth_challenge_response(void *_aq)
122{
123 struct ieee80211softmac_auth_queue_item *aq = _aq;
124
125 /* Send our response */
126 ieee80211softmac_send_mgt_frame(aq->mac, aq->net, IEEE80211_STYPE_AUTH, aq->state);
127}
128
Johannes Berg370121e2006-01-04 16:32:16 +0100129/* Handle the auth response from the AP
130 * This should be registered with ieee80211 as handle_auth
131 */
132int
133ieee80211softmac_auth_resp(struct net_device *dev, struct ieee80211_auth *auth)
134{
135
136 struct list_head *list_ptr;
137 struct ieee80211softmac_device *mac = ieee80211_priv(dev);
138 struct ieee80211softmac_auth_queue_item *aq = NULL;
139 struct ieee80211softmac_network *net = NULL;
140 unsigned long flags;
141 u8 * data;
142
Daniel Draked57336e2006-04-30 22:09:07 +0100143 if (unlikely(!mac->running))
144 return -ENODEV;
145
Johannes Berg370121e2006-01-04 16:32:16 +0100146 /* Find correct auth queue item */
147 spin_lock_irqsave(&mac->lock, flags);
148 list_for_each(list_ptr, &mac->auth_queue) {
149 aq = list_entry(list_ptr, struct ieee80211softmac_auth_queue_item, list);
150 net = aq->net;
151 if (!memcmp(net->bssid, auth->header.addr2, ETH_ALEN))
152 break;
153 else
154 aq = NULL;
155 }
156 spin_unlock_irqrestore(&mac->lock, flags);
157
158 /* Make sure that we've got an auth queue item for this request */
159 if(aq == NULL)
160 {
Larry Finger5398d592006-11-04 13:29:50 -0600161 dprintkl(KERN_DEBUG PFX "Authentication response received from "MAC_FMT" but no queue item exists.\n", MAC_ARG(auth->header.addr2));
Johannes Berg370121e2006-01-04 16:32:16 +0100162 /* Error #? */
163 return -1;
164 }
165
166 /* Check for out of order authentication */
167 if(!net->authenticating)
168 {
Larry Finger5398d592006-11-04 13:29:50 -0600169 dprintkl(KERN_DEBUG PFX "Authentication response received from "MAC_FMT" but did not request authentication.\n",MAC_ARG(auth->header.addr2));
Johannes Berg370121e2006-01-04 16:32:16 +0100170 return -1;
171 }
172
173 /* Parse the auth packet */
174 switch(auth->algorithm) {
175 case WLAN_AUTH_OPEN:
176 /* Check the status code of the response */
177
178 switch(auth->status) {
179 case WLAN_STATUS_SUCCESS:
180 /* Update the status to Authenticated */
181 spin_lock_irqsave(&mac->lock, flags);
182 net->authenticating = 0;
183 net->authenticated = 1;
184 spin_unlock_irqrestore(&mac->lock, flags);
185
186 /* Send event */
187 printkl(KERN_NOTICE PFX "Open Authentication completed with "MAC_FMT"\n", MAC_ARG(net->bssid));
188 ieee80211softmac_call_events(mac, IEEE80211SOFTMAC_EVENT_AUTHENTICATED, net);
189 break;
190 default:
191 /* Lock and reset flags */
192 spin_lock_irqsave(&mac->lock, flags);
193 net->authenticated = 0;
194 net->authenticating = 0;
195 spin_unlock_irqrestore(&mac->lock, flags);
196
197 printkl(KERN_NOTICE PFX "Open Authentication with "MAC_FMT" failed, error code: %i\n",
198 MAC_ARG(net->bssid), le16_to_cpup(&auth->status));
199 /* Count the error? */
200 break;
201 }
202 goto free_aq;
203 break;
204 case WLAN_AUTH_SHARED_KEY:
205 /* Figure out where we are in the process */
206 switch(auth->transaction) {
207 case IEEE80211SOFTMAC_AUTH_SHARED_CHALLENGE:
208 /* Check to make sure we have a challenge IE */
209 data = (u8 *)auth->info_element;
Daniel Drake345f6b82006-07-11 23:16:34 +0100210 if (*data++ != MFIE_TYPE_CHALLENGE) {
Johannes Berg370121e2006-01-04 16:32:16 +0100211 printkl(KERN_NOTICE PFX "Shared Key Authentication failed due to a missing challenge.\n");
212 break;
213 }
214 /* Save the challenge */
215 spin_lock_irqsave(&mac->lock, flags);
216 net->challenge_len = *data++;
Daniel Drake345f6b82006-07-11 23:16:34 +0100217 if (net->challenge_len > WLAN_AUTH_CHALLENGE_LEN)
Johannes Berg370121e2006-01-04 16:32:16 +0100218 net->challenge_len = WLAN_AUTH_CHALLENGE_LEN;
Arnaldo Carvalho de Melo571d6ee2006-11-21 01:26:49 -0200219 kfree(net->challenge);
220 net->challenge = kmemdup(data, net->challenge_len,
221 GFP_ATOMIC);
222 if (net->challenge == NULL) {
223 printkl(KERN_NOTICE PFX "Shared Key "
224 "Authentication failed due to "
225 "memory shortage.\n");
226 spin_unlock_irqrestore(&mac->lock, flags);
227 break;
228 }
Johannes Berg370121e2006-01-04 16:32:16 +0100229 aq->state = IEEE80211SOFTMAC_AUTH_SHARED_RESPONSE;
Johannes Berg370121e2006-01-04 16:32:16 +0100230
Daniel Drake345f6b82006-07-11 23:16:34 +0100231 /* We reuse the work struct from the auth request here.
232 * It is safe to do so as each one is per-request, and
233 * at this point (dealing with authentication response)
234 * we have obviously already sent the initial auth
235 * request. */
236 cancel_delayed_work(&aq->work);
237 INIT_WORK(&aq->work, &ieee80211softmac_auth_challenge_response, (void *)aq);
238 schedule_work(&aq->work);
239 spin_unlock_irqrestore(&mac->lock, flags);
Daniel Drake76ea4c72006-06-01 15:34:26 +0100240 return 0;
Johannes Berg370121e2006-01-04 16:32:16 +0100241 case IEEE80211SOFTMAC_AUTH_SHARED_PASS:
Daniel Drake76ea4c72006-06-01 15:34:26 +0100242 kfree(net->challenge);
243 net->challenge = NULL;
244 net->challenge_len = 0;
Johannes Berg370121e2006-01-04 16:32:16 +0100245 /* Check the status code of the response */
246 switch(auth->status) {
247 case WLAN_STATUS_SUCCESS:
248 /* Update the status to Authenticated */
249 spin_lock_irqsave(&mac->lock, flags);
250 net->authenticating = 0;
251 net->authenticated = 1;
252 spin_unlock_irqrestore(&mac->lock, flags);
253 printkl(KERN_NOTICE PFX "Shared Key Authentication completed with "MAC_FMT"\n",
254 MAC_ARG(net->bssid));
Daniel Drake76ea4c72006-06-01 15:34:26 +0100255 ieee80211softmac_call_events(mac, IEEE80211SOFTMAC_EVENT_AUTHENTICATED, net);
Johannes Berg370121e2006-01-04 16:32:16 +0100256 break;
257 default:
258 printkl(KERN_NOTICE PFX "Shared Key Authentication with "MAC_FMT" failed, error code: %i\n",
259 MAC_ARG(net->bssid), le16_to_cpup(&auth->status));
260 /* Lock and reset flags */
261 spin_lock_irqsave(&mac->lock, flags);
262 net->authenticating = 0;
263 net->authenticated = 0;
264 spin_unlock_irqrestore(&mac->lock, flags);
265 /* Count the error? */
266 break;
267 }
268 goto free_aq;
269 break;
270 default:
271 printkl(KERN_WARNING PFX "Unhandled Authentication Step: %i\n", auth->transaction);
272 break;
273 }
274 goto free_aq;
275 break;
276 default:
277 /* ERROR */
278 goto free_aq;
279 break;
280 }
281 return 0;
282free_aq:
283 /* Cancel the timeout */
284 spin_lock_irqsave(&mac->lock, flags);
285 cancel_delayed_work(&aq->work);
286 /* Remove this item from the queue */
287 list_del(&aq->list);
288 spin_unlock_irqrestore(&mac->lock, flags);
289
290 /* Free it */
291 kfree(aq);
292 return 0;
293}
294
295/*
296 * Handle deauthorization
297 */
Johannes Berg714e1a52006-01-04 21:06:28 +0100298static void
Johannes Berg370121e2006-01-04 16:32:16 +0100299ieee80211softmac_deauth_from_net(struct ieee80211softmac_device *mac,
300 struct ieee80211softmac_network *net)
301{
302 struct ieee80211softmac_auth_queue_item *aq = NULL;
303 struct list_head *list_ptr;
304 unsigned long flags;
305
Daniel Drake6d92f832006-05-01 22:23:27 +0100306 /* deauthentication implies disassociation */
307 ieee80211softmac_disassoc(mac);
308
Johannes Berg370121e2006-01-04 16:32:16 +0100309 /* Lock and reset status flags */
310 spin_lock_irqsave(&mac->lock, flags);
311 net->authenticating = 0;
312 net->authenticated = 0;
313
314 /* Find correct auth queue item, if it exists */
315 list_for_each(list_ptr, &mac->auth_queue) {
316 aq = list_entry(list_ptr, struct ieee80211softmac_auth_queue_item, list);
317 if (!memcmp(net->bssid, aq->net->bssid, ETH_ALEN))
318 break;
319 else
320 aq = NULL;
321 }
322
323 /* Cancel pending work */
324 if(aq != NULL)
325 /* Not entirely safe? What about running work? */
326 cancel_delayed_work(&aq->work);
327
328 /* Free our network ref */
329 ieee80211softmac_del_network_locked(mac, net);
330 if(net->challenge != NULL)
331 kfree(net->challenge);
332 kfree(net);
333
Johannes Berg2dd50802006-01-06 18:11:23 +0100334 /* can't transmit data right now... */
335 netif_carrier_off(mac->dev);
Johannes Berg370121e2006-01-04 16:32:16 +0100336 spin_unlock_irqrestore(&mac->lock, flags);
337}
338
339/*
340 * Sends a deauth request to the desired AP
341 */
342int
343ieee80211softmac_deauth_req(struct ieee80211softmac_device *mac,
344 struct ieee80211softmac_network *net, int reason)
345{
346 int ret;
347
Johannes Berg370121e2006-01-04 16:32:16 +0100348 /* Make sure the network is authenticated */
349 if (!net->authenticated)
350 {
Larry Finger5398d592006-11-04 13:29:50 -0600351 dprintkl(KERN_DEBUG PFX "Can't send deauthentication packet, network is not authenticated.\n");
Johannes Berg370121e2006-01-04 16:32:16 +0100352 /* Error okay? */
353 return -EPERM;
354 }
355
356 /* Send the de-auth packet */
357 if((ret = ieee80211softmac_send_mgt_frame(mac, net, IEEE80211_STYPE_DEAUTH, reason)))
358 return ret;
359
360 ieee80211softmac_deauth_from_net(mac, net);
361 return 0;
362}
363
364/*
365 * This should be registered with ieee80211 as handle_deauth
366 */
367int
Johannes Bergb10c9912006-01-31 19:48:06 +0100368ieee80211softmac_deauth_resp(struct net_device *dev, struct ieee80211_deauth *deauth)
Johannes Berg370121e2006-01-04 16:32:16 +0100369{
370
371 struct ieee80211softmac_network *net = NULL;
372 struct ieee80211softmac_device *mac = ieee80211_priv(dev);
373
Daniel Draked57336e2006-04-30 22:09:07 +0100374 if (unlikely(!mac->running))
375 return -ENODEV;
376
Johannes Bergb10c9912006-01-31 19:48:06 +0100377 if (!deauth) {
Johannes Berg370121e2006-01-04 16:32:16 +0100378 dprintk("deauth without deauth packet. eek!\n");
379 return 0;
380 }
381
Johannes Bergb10c9912006-01-31 19:48:06 +0100382 net = ieee80211softmac_get_network_by_bssid(mac, deauth->header.addr2);
Johannes Berg370121e2006-01-04 16:32:16 +0100383
384 if (net == NULL) {
Larry Finger5398d592006-11-04 13:29:50 -0600385 dprintkl(KERN_DEBUG PFX "Received deauthentication packet from "MAC_FMT", but that network is unknown.\n",
Johannes Bergb10c9912006-01-31 19:48:06 +0100386 MAC_ARG(deauth->header.addr2));
Johannes Berg370121e2006-01-04 16:32:16 +0100387 return 0;
388 }
389
390 /* Make sure the network is authenticated */
391 if(!net->authenticated)
392 {
Larry Finger5398d592006-11-04 13:29:50 -0600393 dprintkl(KERN_DEBUG PFX "Can't perform deauthentication, network is not authenticated.\n");
Johannes Berg370121e2006-01-04 16:32:16 +0100394 /* Error okay? */
395 return -EPERM;
396 }
397
398 ieee80211softmac_deauth_from_net(mac, net);
Daniel Drake995c9922006-04-30 19:49:30 +0100399
400 /* let's try to re-associate */
401 schedule_work(&mac->associnfo.work);
Johannes Berg370121e2006-01-04 16:32:16 +0100402 return 0;
403}