2009-07-01 15:26:56 -04:00
|
|
|
/*
|
|
|
|
* cfg80211 wext compat for managed mode.
|
|
|
|
*
|
|
|
|
* Copyright 2009 Johannes Berg <johannes@sipsolutions.net>
|
|
|
|
* Copyright (C) 2009 Intel Corporation. All rights reserved.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/etherdevice.h>
|
|
|
|
#include <linux/if_arp.h>
|
|
|
|
#include <net/cfg80211.h>
|
2009-07-27 06:01:50 -04:00
|
|
|
#include "wext-compat.h"
|
2009-07-01 15:26:56 -04:00
|
|
|
#include "nl80211.h"
|
|
|
|
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 08:22:54 -04:00
|
|
|
int cfg80211_mgd_wext_connect(struct cfg80211_registered_device *rdev,
|
|
|
|
struct wireless_dev *wdev)
|
2009-07-01 15:26:56 -04:00
|
|
|
{
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 08:22:54 -04:00
|
|
|
struct cfg80211_cached_keys *ck = NULL;
|
2009-08-07 08:51:05 -04:00
|
|
|
const u8 *prev_bssid = NULL;
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 08:22:54 -04:00
|
|
|
int err, i;
|
2009-07-01 15:26:56 -04:00
|
|
|
|
2009-07-06 21:56:11 -04:00
|
|
|
ASSERT_RDEV_LOCK(rdev);
|
|
|
|
ASSERT_WDEV_LOCK(wdev);
|
|
|
|
|
2009-07-01 15:26:56 -04:00
|
|
|
if (!netif_running(wdev->netdev))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
wdev->wext.connect.ie = wdev->wext.ie;
|
|
|
|
wdev->wext.connect.ie_len = wdev->wext.ie_len;
|
|
|
|
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 08:22:54 -04:00
|
|
|
if (wdev->wext.keys) {
|
|
|
|
wdev->wext.keys->def = wdev->wext.default_key;
|
|
|
|
wdev->wext.keys->defmgmt = wdev->wext.default_mgmt_key;
|
2009-09-17 20:15:31 -04:00
|
|
|
wdev->wext.connect.privacy = true;
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 08:22:54 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!wdev->wext.connect.ssid_len)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (wdev->wext.keys) {
|
|
|
|
ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL);
|
|
|
|
if (!ck)
|
|
|
|
return -ENOMEM;
|
|
|
|
for (i = 0; i < 6; i++)
|
|
|
|
ck->params[i].key = ck->data[i];
|
|
|
|
}
|
2009-08-07 08:51:05 -04:00
|
|
|
|
|
|
|
if (wdev->wext.prev_bssid_valid)
|
|
|
|
prev_bssid = wdev->wext.prev_bssid;
|
|
|
|
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 08:22:54 -04:00
|
|
|
err = __cfg80211_connect(rdev, wdev->netdev,
|
2009-08-07 08:51:05 -04:00
|
|
|
&wdev->wext.connect, ck, prev_bssid);
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 08:22:54 -04:00
|
|
|
if (err)
|
|
|
|
kfree(ck);
|
2009-07-01 15:26:56 -04:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
int cfg80211_mgd_wext_siwfreq(struct net_device *dev,
|
|
|
|
struct iw_request_info *info,
|
2009-08-07 11:22:35 -04:00
|
|
|
struct iw_freq *wextfreq, char *extra)
|
2009-07-01 15:26:56 -04:00
|
|
|
{
|
|
|
|
struct wireless_dev *wdev = dev->ieee80211_ptr;
|
|
|
|
struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
|
2009-08-07 11:22:35 -04:00
|
|
|
struct ieee80211_channel *chan = NULL;
|
|
|
|
int err, freq;
|
2009-07-01 15:26:56 -04:00
|
|
|
|
|
|
|
/* call only for station! */
|
|
|
|
if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2009-08-07 11:22:35 -04:00
|
|
|
freq = cfg80211_wext_freq(wdev->wiphy, wextfreq);
|
|
|
|
if (freq < 0)
|
|
|
|
return freq;
|
2009-07-01 15:26:56 -04:00
|
|
|
|
2009-08-07 11:22:35 -04:00
|
|
|
if (freq) {
|
|
|
|
chan = ieee80211_get_channel(wdev->wiphy, freq);
|
|
|
|
if (!chan)
|
|
|
|
return -EINVAL;
|
|
|
|
if (chan->flags & IEEE80211_CHAN_DISABLED)
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2009-07-01 15:26:56 -04:00
|
|
|
|
2009-07-06 21:56:11 -04:00
|
|
|
cfg80211_lock_rdev(rdev);
|
2009-08-07 11:22:35 -04:00
|
|
|
mutex_lock(&rdev->devlist_mtx);
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_lock(wdev);
|
|
|
|
|
2009-07-01 15:26:56 -04:00
|
|
|
if (wdev->sme_state != CFG80211_SME_IDLE) {
|
|
|
|
bool event = true;
|
2009-07-16 05:39:04 -04:00
|
|
|
|
|
|
|
if (wdev->wext.connect.channel == chan) {
|
|
|
|
err = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2009-07-01 15:26:56 -04:00
|
|
|
/* if SSID set, we'll try right again, avoid event */
|
|
|
|
if (wdev->wext.connect.ssid_len)
|
|
|
|
event = false;
|
2009-08-07 11:22:35 -04:00
|
|
|
err = __cfg80211_disconnect(rdev, dev,
|
|
|
|
WLAN_REASON_DEAUTH_LEAVING, event);
|
2009-07-01 15:26:56 -04:00
|
|
|
if (err)
|
2009-07-06 21:56:11 -04:00
|
|
|
goto out;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
|
|
|
|
2009-07-06 21:56:11 -04:00
|
|
|
|
2009-07-01 15:26:56 -04:00
|
|
|
wdev->wext.connect.channel = chan;
|
|
|
|
|
|
|
|
/* SSID is not set, we just want to switch channel */
|
2009-08-07 11:22:35 -04:00
|
|
|
if (chan && !wdev->wext.connect.ssid_len) {
|
2009-08-08 05:03:58 -04:00
|
|
|
err = rdev_set_freq(rdev, wdev, freq, NL80211_CHAN_NO_HT);
|
2009-07-06 21:56:11 -04:00
|
|
|
goto out;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
|
|
|
|
2009-08-07 11:22:35 -04:00
|
|
|
err = cfg80211_mgd_wext_connect(rdev, wdev);
|
2009-07-06 21:56:11 -04:00
|
|
|
out:
|
|
|
|
wdev_unlock(wdev);
|
2009-08-07 11:22:35 -04:00
|
|
|
mutex_unlock(&rdev->devlist_mtx);
|
2009-07-06 21:56:11 -04:00
|
|
|
cfg80211_unlock_rdev(rdev);
|
|
|
|
return err;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
int cfg80211_mgd_wext_giwfreq(struct net_device *dev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct iw_freq *freq, char *extra)
|
|
|
|
{
|
|
|
|
struct wireless_dev *wdev = dev->ieee80211_ptr;
|
|
|
|
struct ieee80211_channel *chan = NULL;
|
|
|
|
|
|
|
|
/* call only for station! */
|
|
|
|
if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_lock(wdev);
|
2009-07-01 15:26:56 -04:00
|
|
|
if (wdev->current_bss)
|
2009-07-02 11:20:43 -04:00
|
|
|
chan = wdev->current_bss->pub.channel;
|
2009-07-01 15:26:56 -04:00
|
|
|
else if (wdev->wext.connect.channel)
|
|
|
|
chan = wdev->wext.connect.channel;
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_unlock(wdev);
|
2009-07-01 15:26:56 -04:00
|
|
|
|
|
|
|
if (chan) {
|
|
|
|
freq->m = chan->center_freq;
|
|
|
|
freq->e = 6;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* no channel if not joining */
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
int cfg80211_mgd_wext_siwessid(struct net_device *dev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct iw_point *data, char *ssid)
|
|
|
|
{
|
|
|
|
struct wireless_dev *wdev = dev->ieee80211_ptr;
|
2009-08-07 11:22:35 -04:00
|
|
|
struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
|
2009-07-01 15:26:56 -04:00
|
|
|
size_t len = data->length;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
/* call only for station! */
|
|
|
|
if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (!data->flags)
|
|
|
|
len = 0;
|
|
|
|
|
|
|
|
/* iwconfig uses nul termination in SSID.. */
|
|
|
|
if (len > 0 && ssid[len - 1] == '\0')
|
|
|
|
len--;
|
|
|
|
|
2009-08-07 11:22:35 -04:00
|
|
|
cfg80211_lock_rdev(rdev);
|
|
|
|
mutex_lock(&rdev->devlist_mtx);
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_lock(wdev);
|
|
|
|
|
|
|
|
err = 0;
|
|
|
|
|
2009-07-01 15:26:56 -04:00
|
|
|
if (wdev->sme_state != CFG80211_SME_IDLE) {
|
|
|
|
bool event = true;
|
2009-07-16 05:39:04 -04:00
|
|
|
|
|
|
|
if (wdev->wext.connect.ssid && len &&
|
|
|
|
len == wdev->wext.connect.ssid_len &&
|
|
|
|
memcmp(wdev->wext.connect.ssid, ssid, len) == 0)
|
|
|
|
goto out;
|
|
|
|
|
2009-07-01 15:26:56 -04:00
|
|
|
/* if SSID set now, we'll try to connect, avoid event */
|
|
|
|
if (len)
|
|
|
|
event = false;
|
2009-08-07 11:22:35 -04:00
|
|
|
err = __cfg80211_disconnect(rdev, dev,
|
|
|
|
WLAN_REASON_DEAUTH_LEAVING, event);
|
2009-07-01 15:26:56 -04:00
|
|
|
if (err)
|
2009-07-06 21:56:11 -04:00
|
|
|
goto out;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
|
|
|
|
2009-08-07 08:51:05 -04:00
|
|
|
wdev->wext.prev_bssid_valid = false;
|
2009-07-01 15:26:56 -04:00
|
|
|
wdev->wext.connect.ssid = wdev->wext.ssid;
|
|
|
|
memcpy(wdev->wext.ssid, ssid, len);
|
|
|
|
wdev->wext.connect.ssid_len = len;
|
|
|
|
|
|
|
|
wdev->wext.connect.crypto.control_port = false;
|
|
|
|
|
2009-08-07 11:22:35 -04:00
|
|
|
err = cfg80211_mgd_wext_connect(rdev, wdev);
|
2009-07-06 21:56:11 -04:00
|
|
|
out:
|
|
|
|
wdev_unlock(wdev);
|
2009-08-07 11:22:35 -04:00
|
|
|
mutex_unlock(&rdev->devlist_mtx);
|
|
|
|
cfg80211_unlock_rdev(rdev);
|
2009-07-06 21:56:11 -04:00
|
|
|
return err;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
int cfg80211_mgd_wext_giwessid(struct net_device *dev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct iw_point *data, char *ssid)
|
|
|
|
{
|
|
|
|
struct wireless_dev *wdev = dev->ieee80211_ptr;
|
|
|
|
|
|
|
|
/* call only for station! */
|
|
|
|
if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
data->flags = 0;
|
|
|
|
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_lock(wdev);
|
2009-08-05 03:07:13 -04:00
|
|
|
if (wdev->current_bss) {
|
|
|
|
const u8 *ie = ieee80211_bss_get_ie(&wdev->current_bss->pub,
|
|
|
|
WLAN_EID_SSID);
|
|
|
|
if (ie) {
|
|
|
|
data->flags = 1;
|
|
|
|
data->length = ie[1];
|
|
|
|
memcpy(ssid, ie + 2, data->length);
|
|
|
|
}
|
|
|
|
} else if (wdev->wext.connect.ssid && wdev->wext.connect.ssid_len) {
|
2009-07-01 15:26:56 -04:00
|
|
|
data->flags = 1;
|
|
|
|
data->length = wdev->wext.connect.ssid_len;
|
|
|
|
memcpy(ssid, wdev->wext.connect.ssid, data->length);
|
|
|
|
} else
|
|
|
|
data->flags = 0;
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_unlock(wdev);
|
2009-07-01 15:26:56 -04:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int cfg80211_mgd_wext_siwap(struct net_device *dev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct sockaddr *ap_addr, char *extra)
|
|
|
|
{
|
|
|
|
struct wireless_dev *wdev = dev->ieee80211_ptr;
|
2009-08-07 11:22:35 -04:00
|
|
|
struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
|
2009-07-01 15:26:56 -04:00
|
|
|
u8 *bssid = ap_addr->sa_data;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
/* call only for station! */
|
|
|
|
if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (ap_addr->sa_family != ARPHRD_ETHER)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/* automatic mode */
|
|
|
|
if (is_zero_ether_addr(bssid) || is_broadcast_ether_addr(bssid))
|
|
|
|
bssid = NULL;
|
|
|
|
|
2009-08-07 11:22:35 -04:00
|
|
|
cfg80211_lock_rdev(rdev);
|
|
|
|
mutex_lock(&rdev->devlist_mtx);
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_lock(wdev);
|
|
|
|
|
2009-07-16 05:39:04 -04:00
|
|
|
if (wdev->sme_state != CFG80211_SME_IDLE) {
|
|
|
|
err = 0;
|
|
|
|
/* both automatic */
|
|
|
|
if (!bssid && !wdev->wext.connect.bssid)
|
|
|
|
goto out;
|
2009-07-01 15:26:56 -04:00
|
|
|
|
2009-07-16 05:39:04 -04:00
|
|
|
/* fixed already - and no change */
|
|
|
|
if (wdev->wext.connect.bssid && bssid &&
|
|
|
|
compare_ether_addr(bssid, wdev->wext.connect.bssid) == 0)
|
|
|
|
goto out;
|
2009-07-01 15:26:56 -04:00
|
|
|
|
2009-08-07 11:22:35 -04:00
|
|
|
err = __cfg80211_disconnect(rdev, dev,
|
|
|
|
WLAN_REASON_DEAUTH_LEAVING, false);
|
2009-07-01 15:26:56 -04:00
|
|
|
if (err)
|
2009-07-06 21:56:11 -04:00
|
|
|
goto out;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (bssid) {
|
|
|
|
memcpy(wdev->wext.bssid, bssid, ETH_ALEN);
|
|
|
|
wdev->wext.connect.bssid = wdev->wext.bssid;
|
|
|
|
} else
|
|
|
|
wdev->wext.connect.bssid = NULL;
|
|
|
|
|
2009-08-07 11:22:35 -04:00
|
|
|
err = cfg80211_mgd_wext_connect(rdev, wdev);
|
2009-07-06 21:56:11 -04:00
|
|
|
out:
|
|
|
|
wdev_unlock(wdev);
|
2009-08-07 11:22:35 -04:00
|
|
|
mutex_unlock(&rdev->devlist_mtx);
|
|
|
|
cfg80211_unlock_rdev(rdev);
|
2009-07-06 21:56:11 -04:00
|
|
|
return err;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
int cfg80211_mgd_wext_giwap(struct net_device *dev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct sockaddr *ap_addr, char *extra)
|
|
|
|
{
|
|
|
|
struct wireless_dev *wdev = dev->ieee80211_ptr;
|
|
|
|
|
|
|
|
/* call only for station! */
|
|
|
|
if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
ap_addr->sa_family = ARPHRD_ETHER;
|
|
|
|
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_lock(wdev);
|
2009-07-01 15:26:56 -04:00
|
|
|
if (wdev->current_bss)
|
2009-07-02 11:20:43 -04:00
|
|
|
memcpy(ap_addr->sa_data, wdev->current_bss->pub.bssid, ETH_ALEN);
|
2009-07-01 15:26:56 -04:00
|
|
|
else if (wdev->wext.connect.bssid)
|
|
|
|
memcpy(ap_addr->sa_data, wdev->wext.connect.bssid, ETH_ALEN);
|
|
|
|
else
|
|
|
|
memset(ap_addr->sa_data, 0, ETH_ALEN);
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_unlock(wdev);
|
2009-07-01 15:26:56 -04:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int cfg80211_wext_siwgenie(struct net_device *dev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct iw_point *data, char *extra)
|
|
|
|
{
|
|
|
|
struct wireless_dev *wdev = dev->ieee80211_ptr;
|
|
|
|
struct cfg80211_registered_device *rdev = wiphy_to_dev(wdev->wiphy);
|
|
|
|
u8 *ie = extra;
|
|
|
|
int ie_len = data->length, err;
|
|
|
|
|
|
|
|
if (wdev->iftype != NL80211_IFTYPE_STATION)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
if (!ie_len)
|
|
|
|
ie = NULL;
|
|
|
|
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_lock(wdev);
|
|
|
|
|
2009-07-01 15:26:56 -04:00
|
|
|
/* no change */
|
2009-07-06 21:56:11 -04:00
|
|
|
err = 0;
|
2009-07-01 15:26:56 -04:00
|
|
|
if (wdev->wext.ie_len == ie_len &&
|
|
|
|
memcmp(wdev->wext.ie, ie, ie_len) == 0)
|
2009-07-06 21:56:11 -04:00
|
|
|
goto out;
|
2009-07-01 15:26:56 -04:00
|
|
|
|
|
|
|
if (ie_len) {
|
|
|
|
ie = kmemdup(extra, ie_len, GFP_KERNEL);
|
2009-07-06 21:56:11 -04:00
|
|
|
if (!ie) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
2009-07-01 15:26:56 -04:00
|
|
|
} else
|
|
|
|
ie = NULL;
|
|
|
|
|
|
|
|
kfree(wdev->wext.ie);
|
|
|
|
wdev->wext.ie = ie;
|
|
|
|
wdev->wext.ie_len = ie_len;
|
|
|
|
|
|
|
|
if (wdev->sme_state != CFG80211_SME_IDLE) {
|
2009-07-06 21:56:11 -04:00
|
|
|
err = __cfg80211_disconnect(rdev, dev,
|
|
|
|
WLAN_REASON_DEAUTH_LEAVING, false);
|
2009-07-01 15:26:56 -04:00
|
|
|
if (err)
|
2009-07-06 21:56:11 -04:00
|
|
|
goto out;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* userspace better not think we'll reconnect */
|
2009-07-06 21:56:11 -04:00
|
|
|
err = 0;
|
|
|
|
out:
|
|
|
|
wdev_unlock(wdev);
|
|
|
|
return err;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(cfg80211_wext_siwgenie);
|
|
|
|
|
|
|
|
int cfg80211_wext_siwmlme(struct net_device *dev,
|
|
|
|
struct iw_request_info *info,
|
|
|
|
struct iw_point *data, char *extra)
|
|
|
|
{
|
|
|
|
struct wireless_dev *wdev = dev->ieee80211_ptr;
|
|
|
|
struct iw_mlme *mlme = (struct iw_mlme *)extra;
|
|
|
|
struct cfg80211_registered_device *rdev;
|
2009-07-06 21:56:11 -04:00
|
|
|
int err;
|
2009-07-01 15:26:56 -04:00
|
|
|
|
|
|
|
if (!wdev)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
rdev = wiphy_to_dev(wdev->wiphy);
|
|
|
|
|
|
|
|
if (wdev->iftype != NL80211_IFTYPE_STATION)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (mlme->addr.sa_family != ARPHRD_ETHER)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_lock(wdev);
|
2009-07-01 15:26:56 -04:00
|
|
|
switch (mlme->cmd) {
|
|
|
|
case IW_MLME_DEAUTH:
|
|
|
|
case IW_MLME_DISASSOC:
|
2009-07-06 21:56:11 -04:00
|
|
|
err = __cfg80211_disconnect(rdev, dev, mlme->reason_code,
|
|
|
|
true);
|
|
|
|
break;
|
2009-07-01 15:26:56 -04:00
|
|
|
default:
|
2009-07-06 21:56:11 -04:00
|
|
|
err = -EOPNOTSUPP;
|
|
|
|
break;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
2009-07-06 21:56:11 -04:00
|
|
|
wdev_unlock(wdev);
|
|
|
|
|
|
|
|
return err;
|
2009-07-01 15:26:56 -04:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(cfg80211_wext_siwmlme);
|