Johannes Berg | 4855d25 | 2006-01-12 21:12:59 +0100 | [diff] [blame] | 1 | /* |
| 2 | * This file contains the softmac's authentication logic. |
| 3 | * |
Johannes Berg | 7985905 | 2006-01-31 19:31:41 +0100 | [diff] [blame] | 4 | * Copyright (c) 2005, 2006 Johannes Berg <johannes@sipsolutions.net> |
| 5 | * Joseph Jezak <josejx@gentoo.org> |
| 6 | * Larry Finger <Larry.Finger@lwfinger.net> |
| 7 | * Danny van Dyk <kugelfang@gentoo.org> |
| 8 | * Michael Buesch <mbuesch@freenet.de> |
Johannes Berg | 4855d25 | 2006-01-12 21:12:59 +0100 | [diff] [blame] | 9 | * |
| 10 | * This program is free software; you can redistribute it and/or modify it |
| 11 | * under the terms of version 2 of the GNU General Public License as |
| 12 | * published by the Free Software Foundation. |
| 13 | * |
| 14 | * This program is distributed in the hope that it will be useful, but WITHOUT |
| 15 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| 16 | * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for |
| 17 | * more details. |
| 18 | * |
| 19 | * You should have received a copy of the GNU General Public License |
| 20 | * along with this program; if not, write to the Free Software |
| 21 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
| 22 | * |
| 23 | * The full GNU General Public License is included in this distribution in the |
| 24 | * file called COPYING. |
| 25 | */ |
| 26 | |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 27 | #include "ieee80211softmac_priv.h" |
| 28 | |
| 29 | static void ieee80211softmac_auth_queue(void *data); |
| 30 | |
| 31 | /* Queues an auth request to the desired AP */ |
| 32 | int |
| 33 | ieee80211softmac_auth_req(struct ieee80211softmac_device *mac, |
| 34 | struct ieee80211softmac_network *net) |
| 35 | { |
| 36 | struct ieee80211softmac_auth_queue_item *auth; |
| 37 | unsigned long flags; |
| 38 | |
Joseph Jezak | cb74c43 | 2006-06-11 12:00:37 -0400 | [diff] [blame] | 39 | if (net->authenticating || net->authenticated) |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 40 | return 0; |
Joseph Jezak | cb74c43 | 2006-06-11 12:00:37 -0400 | [diff] [blame] | 41 | net->authenticating = 1; |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 42 | |
| 43 | /* Add the network if it's not already added */ |
| 44 | ieee80211softmac_add_network(mac, net); |
| 45 | |
| 46 | dprintk(KERN_NOTICE PFX "Queueing Authentication Request to "MAC_FMT"\n", MAC_ARG(net->bssid)); |
| 47 | /* Queue the auth request */ |
| 48 | auth = (struct ieee80211softmac_auth_queue_item *) |
| 49 | kmalloc(sizeof(struct ieee80211softmac_auth_queue_item), GFP_KERNEL); |
| 50 | if(auth == NULL) |
| 51 | return -ENOMEM; |
| 52 | |
| 53 | auth->net = net; |
| 54 | auth->mac = mac; |
| 55 | auth->retry = IEEE80211SOFTMAC_AUTH_RETRY_LIMIT; |
| 56 | auth->state = IEEE80211SOFTMAC_AUTH_OPEN_REQUEST; |
| 57 | INIT_WORK(&auth->work, &ieee80211softmac_auth_queue, (void *)auth); |
| 58 | |
| 59 | /* Lock (for list) */ |
| 60 | spin_lock_irqsave(&mac->lock, flags); |
| 61 | |
| 62 | /* add to list */ |
| 63 | list_add_tail(&auth->list, &mac->auth_queue); |
Johannes Berg | 5c4df6d | 2006-01-06 01:43:45 +0100 | [diff] [blame] | 64 | schedule_work(&auth->work); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 65 | spin_unlock_irqrestore(&mac->lock, flags); |
| 66 | |
| 67 | return 0; |
| 68 | } |
| 69 | |
| 70 | |
| 71 | /* Sends an auth request to the desired AP and handles timeouts */ |
| 72 | static void |
| 73 | ieee80211softmac_auth_queue(void *data) |
| 74 | { |
| 75 | struct ieee80211softmac_device *mac; |
| 76 | struct ieee80211softmac_auth_queue_item *auth; |
| 77 | struct ieee80211softmac_network *net; |
| 78 | unsigned long flags; |
| 79 | |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 80 | auth = (struct ieee80211softmac_auth_queue_item *)data; |
| 81 | net = auth->net; |
| 82 | mac = auth->mac; |
| 83 | |
| 84 | if(auth->retry > 0) { |
| 85 | /* Switch to correct channel for this network */ |
| 86 | mac->set_channel(mac->dev, net->channel); |
| 87 | |
| 88 | /* Lock and set flags */ |
| 89 | spin_lock_irqsave(&mac->lock, flags); |
Daniel Drake | d57336e | 2006-04-30 22:09:07 +0100 | [diff] [blame] | 90 | if (unlikely(!mac->running)) { |
| 91 | /* Prevent reschedule on workqueue flush */ |
| 92 | spin_unlock_irqrestore(&mac->lock, flags); |
| 93 | return; |
| 94 | } |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 95 | net->authenticated = 0; |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 96 | /* add a timeout call so we eventually give up waiting for an auth reply */ |
Johannes Berg | 5c4df6d | 2006-01-06 01:43:45 +0100 | [diff] [blame] | 97 | schedule_delayed_work(&auth->work, IEEE80211SOFTMAC_AUTH_TIMEOUT); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 98 | auth->retry--; |
| 99 | spin_unlock_irqrestore(&mac->lock, flags); |
| 100 | if (ieee80211softmac_send_mgt_frame(mac, auth->net, IEEE80211_STYPE_AUTH, auth->state)) |
| 101 | dprintk(KERN_NOTICE PFX "Sending Authentication Request to "MAC_FMT" failed (this shouldn't happen, wait for the timeout).\n", MAC_ARG(net->bssid)); |
| 102 | else |
| 103 | dprintk(KERN_NOTICE PFX "Sent Authentication Request to "MAC_FMT".\n", MAC_ARG(net->bssid)); |
| 104 | return; |
| 105 | } |
| 106 | |
| 107 | printkl(KERN_WARNING PFX "Authentication timed out with "MAC_FMT"\n", MAC_ARG(net->bssid)); |
| 108 | /* Remove this item from the queue */ |
| 109 | spin_lock_irqsave(&mac->lock, flags); |
Daniel Drake | 76ea4c7 | 2006-06-01 15:34:26 +0100 | [diff] [blame] | 110 | net->authenticating = 0; |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 111 | ieee80211softmac_call_events_locked(mac, IEEE80211SOFTMAC_EVENT_AUTH_TIMEOUT, net); |
| 112 | cancel_delayed_work(&auth->work); /* just to make sure... */ |
| 113 | list_del(&auth->list); |
| 114 | spin_unlock_irqrestore(&mac->lock, flags); |
| 115 | /* Free it */ |
| 116 | kfree(auth); |
| 117 | } |
| 118 | |
Daniel Drake | 345f6b8 | 2006-07-11 23:16:34 +0100 | [diff] [blame] | 119 | /* Sends a response to an auth challenge (for shared key auth). */ |
| 120 | static void |
| 121 | ieee80211softmac_auth_challenge_response(void *_aq) |
| 122 | { |
| 123 | struct ieee80211softmac_auth_queue_item *aq = _aq; |
| 124 | |
| 125 | /* Send our response */ |
| 126 | ieee80211softmac_send_mgt_frame(aq->mac, aq->net, IEEE80211_STYPE_AUTH, aq->state); |
| 127 | } |
| 128 | |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 129 | /* Handle the auth response from the AP |
| 130 | * This should be registered with ieee80211 as handle_auth |
| 131 | */ |
| 132 | int |
| 133 | ieee80211softmac_auth_resp(struct net_device *dev, struct ieee80211_auth *auth) |
| 134 | { |
| 135 | |
| 136 | struct list_head *list_ptr; |
| 137 | struct ieee80211softmac_device *mac = ieee80211_priv(dev); |
| 138 | struct ieee80211softmac_auth_queue_item *aq = NULL; |
| 139 | struct ieee80211softmac_network *net = NULL; |
| 140 | unsigned long flags; |
| 141 | u8 * data; |
| 142 | |
Daniel Drake | d57336e | 2006-04-30 22:09:07 +0100 | [diff] [blame] | 143 | if (unlikely(!mac->running)) |
| 144 | return -ENODEV; |
| 145 | |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 146 | /* Find correct auth queue item */ |
| 147 | spin_lock_irqsave(&mac->lock, flags); |
| 148 | list_for_each(list_ptr, &mac->auth_queue) { |
| 149 | aq = list_entry(list_ptr, struct ieee80211softmac_auth_queue_item, list); |
| 150 | net = aq->net; |
| 151 | if (!memcmp(net->bssid, auth->header.addr2, ETH_ALEN)) |
| 152 | break; |
| 153 | else |
| 154 | aq = NULL; |
| 155 | } |
| 156 | spin_unlock_irqrestore(&mac->lock, flags); |
| 157 | |
| 158 | /* Make sure that we've got an auth queue item for this request */ |
| 159 | if(aq == NULL) |
| 160 | { |
Larry Finger | 5398d59 | 2006-11-04 13:29:50 -0600 | [diff] [blame] | 161 | dprintkl(KERN_DEBUG PFX "Authentication response received from "MAC_FMT" but no queue item exists.\n", MAC_ARG(auth->header.addr2)); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 162 | /* Error #? */ |
| 163 | return -1; |
| 164 | } |
| 165 | |
| 166 | /* Check for out of order authentication */ |
| 167 | if(!net->authenticating) |
| 168 | { |
Larry Finger | 5398d59 | 2006-11-04 13:29:50 -0600 | [diff] [blame] | 169 | dprintkl(KERN_DEBUG PFX "Authentication response received from "MAC_FMT" but did not request authentication.\n",MAC_ARG(auth->header.addr2)); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 170 | return -1; |
| 171 | } |
| 172 | |
| 173 | /* Parse the auth packet */ |
| 174 | switch(auth->algorithm) { |
| 175 | case WLAN_AUTH_OPEN: |
| 176 | /* Check the status code of the response */ |
| 177 | |
| 178 | switch(auth->status) { |
| 179 | case WLAN_STATUS_SUCCESS: |
| 180 | /* Update the status to Authenticated */ |
| 181 | spin_lock_irqsave(&mac->lock, flags); |
| 182 | net->authenticating = 0; |
| 183 | net->authenticated = 1; |
| 184 | spin_unlock_irqrestore(&mac->lock, flags); |
| 185 | |
| 186 | /* Send event */ |
| 187 | printkl(KERN_NOTICE PFX "Open Authentication completed with "MAC_FMT"\n", MAC_ARG(net->bssid)); |
| 188 | ieee80211softmac_call_events(mac, IEEE80211SOFTMAC_EVENT_AUTHENTICATED, net); |
| 189 | break; |
| 190 | default: |
| 191 | /* Lock and reset flags */ |
| 192 | spin_lock_irqsave(&mac->lock, flags); |
| 193 | net->authenticated = 0; |
| 194 | net->authenticating = 0; |
| 195 | spin_unlock_irqrestore(&mac->lock, flags); |
| 196 | |
| 197 | printkl(KERN_NOTICE PFX "Open Authentication with "MAC_FMT" failed, error code: %i\n", |
| 198 | MAC_ARG(net->bssid), le16_to_cpup(&auth->status)); |
| 199 | /* Count the error? */ |
| 200 | break; |
| 201 | } |
| 202 | goto free_aq; |
| 203 | break; |
| 204 | case WLAN_AUTH_SHARED_KEY: |
| 205 | /* Figure out where we are in the process */ |
| 206 | switch(auth->transaction) { |
| 207 | case IEEE80211SOFTMAC_AUTH_SHARED_CHALLENGE: |
| 208 | /* Check to make sure we have a challenge IE */ |
| 209 | data = (u8 *)auth->info_element; |
Daniel Drake | 345f6b8 | 2006-07-11 23:16:34 +0100 | [diff] [blame] | 210 | if (*data++ != MFIE_TYPE_CHALLENGE) { |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 211 | printkl(KERN_NOTICE PFX "Shared Key Authentication failed due to a missing challenge.\n"); |
| 212 | break; |
| 213 | } |
| 214 | /* Save the challenge */ |
| 215 | spin_lock_irqsave(&mac->lock, flags); |
| 216 | net->challenge_len = *data++; |
Daniel Drake | 345f6b8 | 2006-07-11 23:16:34 +0100 | [diff] [blame] | 217 | if (net->challenge_len > WLAN_AUTH_CHALLENGE_LEN) |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 218 | net->challenge_len = WLAN_AUTH_CHALLENGE_LEN; |
Arnaldo Carvalho de Melo | 571d6ee | 2006-11-21 01:26:49 -0200 | [diff] [blame] | 219 | kfree(net->challenge); |
| 220 | net->challenge = kmemdup(data, net->challenge_len, |
| 221 | GFP_ATOMIC); |
| 222 | if (net->challenge == NULL) { |
| 223 | printkl(KERN_NOTICE PFX "Shared Key " |
| 224 | "Authentication failed due to " |
| 225 | "memory shortage.\n"); |
| 226 | spin_unlock_irqrestore(&mac->lock, flags); |
| 227 | break; |
| 228 | } |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 229 | aq->state = IEEE80211SOFTMAC_AUTH_SHARED_RESPONSE; |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 230 | |
Daniel Drake | 345f6b8 | 2006-07-11 23:16:34 +0100 | [diff] [blame] | 231 | /* We reuse the work struct from the auth request here. |
| 232 | * It is safe to do so as each one is per-request, and |
| 233 | * at this point (dealing with authentication response) |
| 234 | * we have obviously already sent the initial auth |
| 235 | * request. */ |
| 236 | cancel_delayed_work(&aq->work); |
| 237 | INIT_WORK(&aq->work, &ieee80211softmac_auth_challenge_response, (void *)aq); |
| 238 | schedule_work(&aq->work); |
| 239 | spin_unlock_irqrestore(&mac->lock, flags); |
Daniel Drake | 76ea4c7 | 2006-06-01 15:34:26 +0100 | [diff] [blame] | 240 | return 0; |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 241 | case IEEE80211SOFTMAC_AUTH_SHARED_PASS: |
Daniel Drake | 76ea4c7 | 2006-06-01 15:34:26 +0100 | [diff] [blame] | 242 | kfree(net->challenge); |
| 243 | net->challenge = NULL; |
| 244 | net->challenge_len = 0; |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 245 | /* Check the status code of the response */ |
| 246 | switch(auth->status) { |
| 247 | case WLAN_STATUS_SUCCESS: |
| 248 | /* Update the status to Authenticated */ |
| 249 | spin_lock_irqsave(&mac->lock, flags); |
| 250 | net->authenticating = 0; |
| 251 | net->authenticated = 1; |
| 252 | spin_unlock_irqrestore(&mac->lock, flags); |
| 253 | printkl(KERN_NOTICE PFX "Shared Key Authentication completed with "MAC_FMT"\n", |
| 254 | MAC_ARG(net->bssid)); |
Daniel Drake | 76ea4c7 | 2006-06-01 15:34:26 +0100 | [diff] [blame] | 255 | ieee80211softmac_call_events(mac, IEEE80211SOFTMAC_EVENT_AUTHENTICATED, net); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 256 | break; |
| 257 | default: |
| 258 | printkl(KERN_NOTICE PFX "Shared Key Authentication with "MAC_FMT" failed, error code: %i\n", |
| 259 | MAC_ARG(net->bssid), le16_to_cpup(&auth->status)); |
| 260 | /* Lock and reset flags */ |
| 261 | spin_lock_irqsave(&mac->lock, flags); |
| 262 | net->authenticating = 0; |
| 263 | net->authenticated = 0; |
| 264 | spin_unlock_irqrestore(&mac->lock, flags); |
| 265 | /* Count the error? */ |
| 266 | break; |
| 267 | } |
| 268 | goto free_aq; |
| 269 | break; |
| 270 | default: |
| 271 | printkl(KERN_WARNING PFX "Unhandled Authentication Step: %i\n", auth->transaction); |
| 272 | break; |
| 273 | } |
| 274 | goto free_aq; |
| 275 | break; |
| 276 | default: |
| 277 | /* ERROR */ |
| 278 | goto free_aq; |
| 279 | break; |
| 280 | } |
| 281 | return 0; |
| 282 | free_aq: |
| 283 | /* Cancel the timeout */ |
| 284 | spin_lock_irqsave(&mac->lock, flags); |
| 285 | cancel_delayed_work(&aq->work); |
| 286 | /* Remove this item from the queue */ |
| 287 | list_del(&aq->list); |
| 288 | spin_unlock_irqrestore(&mac->lock, flags); |
| 289 | |
| 290 | /* Free it */ |
| 291 | kfree(aq); |
| 292 | return 0; |
| 293 | } |
| 294 | |
| 295 | /* |
| 296 | * Handle deauthorization |
| 297 | */ |
Johannes Berg | 714e1a5 | 2006-01-04 21:06:28 +0100 | [diff] [blame] | 298 | static void |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 299 | ieee80211softmac_deauth_from_net(struct ieee80211softmac_device *mac, |
| 300 | struct ieee80211softmac_network *net) |
| 301 | { |
| 302 | struct ieee80211softmac_auth_queue_item *aq = NULL; |
| 303 | struct list_head *list_ptr; |
| 304 | unsigned long flags; |
| 305 | |
Daniel Drake | 6d92f83 | 2006-05-01 22:23:27 +0100 | [diff] [blame] | 306 | /* deauthentication implies disassociation */ |
| 307 | ieee80211softmac_disassoc(mac); |
| 308 | |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 309 | /* Lock and reset status flags */ |
| 310 | spin_lock_irqsave(&mac->lock, flags); |
| 311 | net->authenticating = 0; |
| 312 | net->authenticated = 0; |
| 313 | |
| 314 | /* Find correct auth queue item, if it exists */ |
| 315 | list_for_each(list_ptr, &mac->auth_queue) { |
| 316 | aq = list_entry(list_ptr, struct ieee80211softmac_auth_queue_item, list); |
| 317 | if (!memcmp(net->bssid, aq->net->bssid, ETH_ALEN)) |
| 318 | break; |
| 319 | else |
| 320 | aq = NULL; |
| 321 | } |
| 322 | |
| 323 | /* Cancel pending work */ |
| 324 | if(aq != NULL) |
| 325 | /* Not entirely safe? What about running work? */ |
| 326 | cancel_delayed_work(&aq->work); |
| 327 | |
| 328 | /* Free our network ref */ |
| 329 | ieee80211softmac_del_network_locked(mac, net); |
| 330 | if(net->challenge != NULL) |
| 331 | kfree(net->challenge); |
| 332 | kfree(net); |
| 333 | |
Johannes Berg | 2dd5080 | 2006-01-06 18:11:23 +0100 | [diff] [blame] | 334 | /* can't transmit data right now... */ |
| 335 | netif_carrier_off(mac->dev); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 336 | spin_unlock_irqrestore(&mac->lock, flags); |
| 337 | } |
| 338 | |
| 339 | /* |
| 340 | * Sends a deauth request to the desired AP |
| 341 | */ |
| 342 | int |
| 343 | ieee80211softmac_deauth_req(struct ieee80211softmac_device *mac, |
| 344 | struct ieee80211softmac_network *net, int reason) |
| 345 | { |
| 346 | int ret; |
| 347 | |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 348 | /* Make sure the network is authenticated */ |
| 349 | if (!net->authenticated) |
| 350 | { |
Larry Finger | 5398d59 | 2006-11-04 13:29:50 -0600 | [diff] [blame] | 351 | dprintkl(KERN_DEBUG PFX "Can't send deauthentication packet, network is not authenticated.\n"); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 352 | /* Error okay? */ |
| 353 | return -EPERM; |
| 354 | } |
| 355 | |
| 356 | /* Send the de-auth packet */ |
| 357 | if((ret = ieee80211softmac_send_mgt_frame(mac, net, IEEE80211_STYPE_DEAUTH, reason))) |
| 358 | return ret; |
| 359 | |
| 360 | ieee80211softmac_deauth_from_net(mac, net); |
| 361 | return 0; |
| 362 | } |
| 363 | |
| 364 | /* |
| 365 | * This should be registered with ieee80211 as handle_deauth |
| 366 | */ |
| 367 | int |
Johannes Berg | b10c991 | 2006-01-31 19:48:06 +0100 | [diff] [blame] | 368 | ieee80211softmac_deauth_resp(struct net_device *dev, struct ieee80211_deauth *deauth) |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 369 | { |
| 370 | |
| 371 | struct ieee80211softmac_network *net = NULL; |
| 372 | struct ieee80211softmac_device *mac = ieee80211_priv(dev); |
| 373 | |
Daniel Drake | d57336e | 2006-04-30 22:09:07 +0100 | [diff] [blame] | 374 | if (unlikely(!mac->running)) |
| 375 | return -ENODEV; |
| 376 | |
Johannes Berg | b10c991 | 2006-01-31 19:48:06 +0100 | [diff] [blame] | 377 | if (!deauth) { |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 378 | dprintk("deauth without deauth packet. eek!\n"); |
| 379 | return 0; |
| 380 | } |
| 381 | |
Johannes Berg | b10c991 | 2006-01-31 19:48:06 +0100 | [diff] [blame] | 382 | net = ieee80211softmac_get_network_by_bssid(mac, deauth->header.addr2); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 383 | |
| 384 | if (net == NULL) { |
Larry Finger | 5398d59 | 2006-11-04 13:29:50 -0600 | [diff] [blame] | 385 | dprintkl(KERN_DEBUG PFX "Received deauthentication packet from "MAC_FMT", but that network is unknown.\n", |
Johannes Berg | b10c991 | 2006-01-31 19:48:06 +0100 | [diff] [blame] | 386 | MAC_ARG(deauth->header.addr2)); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 387 | return 0; |
| 388 | } |
| 389 | |
| 390 | /* Make sure the network is authenticated */ |
| 391 | if(!net->authenticated) |
| 392 | { |
Larry Finger | 5398d59 | 2006-11-04 13:29:50 -0600 | [diff] [blame] | 393 | dprintkl(KERN_DEBUG PFX "Can't perform deauthentication, network is not authenticated.\n"); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 394 | /* Error okay? */ |
| 395 | return -EPERM; |
| 396 | } |
| 397 | |
| 398 | ieee80211softmac_deauth_from_net(mac, net); |
Daniel Drake | 995c992 | 2006-04-30 19:49:30 +0100 | [diff] [blame] | 399 | |
| 400 | /* let's try to re-associate */ |
| 401 | schedule_work(&mac->associnfo.work); |
Johannes Berg | 370121e | 2006-01-04 16:32:16 +0100 | [diff] [blame] | 402 | return 0; |
| 403 | } |