]>
Commit | Line | Data |
---|---|---|
c2a04078 JM |
1 | /* |
2 | * wpa_supplicant - SME | |
71024cb2 | 3 | * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi> |
c2a04078 JM |
4 | * |
5 | * This program is free software; you can redistribute it and/or modify | |
6 | * it under the terms of the GNU General Public License version 2 as | |
7 | * published by the Free Software Foundation. | |
8 | * | |
9 | * Alternatively, this software may be distributed under the terms of BSD | |
10 | * license. | |
11 | * | |
12 | * See README and COPYING for more details. | |
13 | */ | |
14 | ||
15 | #include "includes.h" | |
16 | ||
17 | #include "common.h" | |
90973fb2 | 18 | #include "common/ieee802_11_defs.h" |
d9a27b04 | 19 | #include "common/ieee802_11_common.h" |
c2a04078 | 20 | #include "eapol_supp/eapol_supp_sm.h" |
90973fb2 | 21 | #include "common/wpa_common.h" |
3acb5005 JM |
22 | #include "rsn_supp/wpa.h" |
23 | #include "rsn_supp/pmksa_cache.h" | |
c2a04078 JM |
24 | #include "config.h" |
25 | #include "wpa_supplicant_i.h" | |
2d5b792d | 26 | #include "driver_i.h" |
c2a04078 JM |
27 | #include "wpas_glue.h" |
28 | #include "wps_supplicant.h" | |
8bac466b | 29 | #include "notify.h" |
76d11d3f | 30 | #include "blacklist.h" |
6fa81a3b | 31 | #include "bss.h" |
9ba9fa07 | 32 | #include "scan.h" |
c2a04078 JM |
33 | #include "sme.h" |
34 | ||
35 | void sme_authenticate(struct wpa_supplicant *wpa_s, | |
6fa81a3b | 36 | struct wpa_bss *bss, struct wpa_ssid *ssid) |
c2a04078 JM |
37 | { |
38 | struct wpa_driver_auth_params params; | |
8bac466b | 39 | struct wpa_ssid *old_ssid; |
fdbe50ed | 40 | #ifdef CONFIG_IEEE80211R |
c2a04078 | 41 | const u8 *ie; |
fdbe50ed | 42 | #endif /* CONFIG_IEEE80211R */ |
c2a04078 JM |
43 | #ifdef CONFIG_IEEE80211R |
44 | const u8 *md = NULL; | |
45 | #endif /* CONFIG_IEEE80211R */ | |
8bac466b | 46 | int i, bssid_changed; |
c2a04078 JM |
47 | |
48 | if (bss == NULL) { | |
49 | wpa_printf(MSG_ERROR, "SME: No scan result available for the " | |
50 | "network"); | |
51 | return; | |
52 | } | |
53 | ||
8f770587 JM |
54 | wpa_s->current_bss = bss; |
55 | ||
c2a04078 JM |
56 | os_memset(¶ms, 0, sizeof(params)); |
57 | wpa_s->reassociate = 0; | |
58 | ||
59 | params.freq = bss->freq; | |
60 | params.bssid = bss->bssid; | |
6fa81a3b JM |
61 | params.ssid = bss->ssid; |
62 | params.ssid_len = bss->ssid_len; | |
c2a04078 | 63 | |
62fa124c JM |
64 | if (wpa_s->sme.ssid_len != params.ssid_len || |
65 | os_memcmp(wpa_s->sme.ssid, params.ssid, params.ssid_len) != 0) | |
66 | wpa_s->sme.prev_bssid_set = 0; | |
67 | ||
c2a04078 JM |
68 | wpa_s->sme.freq = params.freq; |
69 | os_memcpy(wpa_s->sme.ssid, params.ssid, params.ssid_len); | |
70 | wpa_s->sme.ssid_len = params.ssid_len; | |
71 | ||
abd9fafa | 72 | params.auth_alg = WPA_AUTH_ALG_OPEN; |
c2a04078 JM |
73 | #ifdef IEEE8021X_EAPOL |
74 | if (ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) { | |
75 | if (ssid->leap) { | |
76 | if (ssid->non_leap == 0) | |
abd9fafa | 77 | params.auth_alg = WPA_AUTH_ALG_LEAP; |
c2a04078 | 78 | else |
abd9fafa | 79 | params.auth_alg |= WPA_AUTH_ALG_LEAP; |
c2a04078 JM |
80 | } |
81 | } | |
82 | #endif /* IEEE8021X_EAPOL */ | |
83 | wpa_printf(MSG_DEBUG, "Automatic auth_alg selection: 0x%x", | |
84 | params.auth_alg); | |
85 | if (ssid->auth_alg) { | |
abd9fafa | 86 | params.auth_alg = ssid->auth_alg; |
c2a04078 JM |
87 | wpa_printf(MSG_DEBUG, "Overriding auth_alg selection: 0x%x", |
88 | params.auth_alg); | |
89 | } | |
90 | ||
a0b2f99b JM |
91 | for (i = 0; i < NUM_WEP_KEYS; i++) { |
92 | if (ssid->wep_key_len[i]) | |
93 | params.wep_key[i] = ssid->wep_key[i]; | |
94 | params.wep_key_len[i] = ssid->wep_key_len[i]; | |
95 | } | |
96 | params.wep_tx_keyidx = ssid->wep_tx_keyidx; | |
97 | ||
8bac466b | 98 | bssid_changed = !is_zero_ether_addr(wpa_s->bssid); |
c2a04078 JM |
99 | os_memset(wpa_s->bssid, 0, ETH_ALEN); |
100 | os_memcpy(wpa_s->pending_bssid, bss->bssid, ETH_ALEN); | |
8bac466b JM |
101 | if (bssid_changed) |
102 | wpas_notify_bssid_changed(wpa_s); | |
c2a04078 | 103 | |
f337f0e9 JM |
104 | if ((wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE) || |
105 | wpa_bss_get_ie(bss, WLAN_EID_RSN)) && | |
c2a04078 JM |
106 | (ssid->key_mgmt & (WPA_KEY_MGMT_IEEE8021X | WPA_KEY_MGMT_PSK | |
107 | WPA_KEY_MGMT_FT_IEEE8021X | | |
108 | WPA_KEY_MGMT_FT_PSK | | |
109 | WPA_KEY_MGMT_IEEE8021X_SHA256 | | |
110 | WPA_KEY_MGMT_PSK_SHA256))) { | |
111 | int try_opportunistic; | |
112 | try_opportunistic = ssid->proactive_key_caching && | |
113 | (ssid->proto & WPA_PROTO_RSN); | |
114 | if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid, | |
115 | wpa_s->current_ssid, | |
116 | try_opportunistic) == 0) | |
117 | eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1); | |
118 | wpa_s->sme.assoc_req_ie_len = sizeof(wpa_s->sme.assoc_req_ie); | |
119 | if (wpa_supplicant_set_suites(wpa_s, bss, ssid, | |
120 | wpa_s->sme.assoc_req_ie, | |
121 | &wpa_s->sme.assoc_req_ie_len)) { | |
122 | wpa_printf(MSG_WARNING, "SME: Failed to set WPA key " | |
123 | "management and encryption suites"); | |
124 | return; | |
125 | } | |
126 | } else if (ssid->key_mgmt & | |
127 | (WPA_KEY_MGMT_PSK | WPA_KEY_MGMT_IEEE8021X | | |
128 | WPA_KEY_MGMT_WPA_NONE | WPA_KEY_MGMT_FT_PSK | | |
129 | WPA_KEY_MGMT_FT_IEEE8021X | WPA_KEY_MGMT_PSK_SHA256 | | |
130 | WPA_KEY_MGMT_IEEE8021X_SHA256)) { | |
131 | wpa_s->sme.assoc_req_ie_len = sizeof(wpa_s->sme.assoc_req_ie); | |
132 | if (wpa_supplicant_set_suites(wpa_s, NULL, ssid, | |
133 | wpa_s->sme.assoc_req_ie, | |
134 | &wpa_s->sme.assoc_req_ie_len)) { | |
135 | wpa_printf(MSG_WARNING, "SME: Failed to set WPA key " | |
136 | "management and encryption suites (no scan " | |
137 | "results)"); | |
138 | return; | |
139 | } | |
140 | #ifdef CONFIG_WPS | |
141 | } else if (ssid->key_mgmt & WPA_KEY_MGMT_WPS) { | |
142 | struct wpabuf *wps_ie; | |
143 | wps_ie = wps_build_assoc_req_ie(wpas_wps_get_req_type(ssid)); | |
144 | if (wps_ie && wpabuf_len(wps_ie) <= | |
145 | sizeof(wpa_s->sme.assoc_req_ie)) { | |
146 | wpa_s->sme.assoc_req_ie_len = wpabuf_len(wps_ie); | |
147 | os_memcpy(wpa_s->sme.assoc_req_ie, wpabuf_head(wps_ie), | |
148 | wpa_s->sme.assoc_req_ie_len); | |
149 | } else | |
150 | wpa_s->sme.assoc_req_ie_len = 0; | |
151 | wpabuf_free(wps_ie); | |
152 | wpa_supplicant_set_non_wpa_policy(wpa_s, ssid); | |
153 | #endif /* CONFIG_WPS */ | |
154 | } else { | |
155 | wpa_supplicant_set_non_wpa_policy(wpa_s, ssid); | |
156 | wpa_s->sme.assoc_req_ie_len = 0; | |
157 | } | |
158 | ||
159 | #ifdef CONFIG_IEEE80211R | |
6fa81a3b | 160 | ie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN); |
c2a04078 JM |
161 | if (ie && ie[1] >= MOBILITY_DOMAIN_ID_LEN) |
162 | md = ie + 2; | |
e7846b68 | 163 | wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0); |
c2a04078 JM |
164 | if (md) { |
165 | /* Prepare for the next transition */ | |
76b7981d | 166 | wpa_ft_prepare_auth_request(wpa_s->wpa, ie); |
c2a04078 JM |
167 | } |
168 | ||
169 | if (md && ssid->key_mgmt & (WPA_KEY_MGMT_FT_PSK | | |
170 | WPA_KEY_MGMT_FT_IEEE8021X)) { | |
171 | if (wpa_s->sme.assoc_req_ie_len + 5 < | |
172 | sizeof(wpa_s->sme.assoc_req_ie)) { | |
173 | struct rsn_mdie *mdie; | |
174 | u8 *pos = wpa_s->sme.assoc_req_ie + | |
175 | wpa_s->sme.assoc_req_ie_len; | |
176 | *pos++ = WLAN_EID_MOBILITY_DOMAIN; | |
177 | *pos++ = sizeof(*mdie); | |
178 | mdie = (struct rsn_mdie *) pos; | |
179 | os_memcpy(mdie->mobility_domain, md, | |
180 | MOBILITY_DOMAIN_ID_LEN); | |
f4ec630d | 181 | mdie->ft_capab = md[MOBILITY_DOMAIN_ID_LEN]; |
c2a04078 JM |
182 | wpa_s->sme.assoc_req_ie_len += 5; |
183 | } | |
184 | ||
185 | if (wpa_s->sme.ft_used && | |
186 | os_memcmp(md, wpa_s->sme.mobility_domain, 2) == 0) { | |
187 | wpa_printf(MSG_DEBUG, "SME: Trying to use FT " | |
188 | "over-the-air"); | |
abd9fafa | 189 | params.auth_alg = WPA_AUTH_ALG_FT; |
c2a04078 JM |
190 | params.ie = wpa_s->sme.ft_ies; |
191 | params.ie_len = wpa_s->sme.ft_ies_len; | |
192 | } | |
193 | } | |
194 | #endif /* CONFIG_IEEE80211R */ | |
195 | ||
196 | #ifdef CONFIG_IEEE80211W | |
70f8cc8e | 197 | wpa_s->sme.mfp = ssid->ieee80211w; |
f337f0e9 | 198 | if (ssid->ieee80211w != NO_MGMT_FRAME_PROTECTION) { |
6fa81a3b | 199 | const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); |
c2a04078 JM |
200 | struct wpa_ie_data _ie; |
201 | if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &_ie) == 0 && | |
202 | _ie.capabilities & | |
203 | (WPA_CAPABILITY_MFPC | WPA_CAPABILITY_MFPR)) { | |
204 | wpa_printf(MSG_DEBUG, "WPA: Selected AP supports MFP: " | |
205 | "require MFP"); | |
206 | wpa_s->sme.mfp = MGMT_FRAME_PROTECTION_REQUIRED; | |
207 | } | |
208 | } | |
209 | #endif /* CONFIG_IEEE80211W */ | |
210 | ||
211 | wpa_supplicant_cancel_scan(wpa_s); | |
212 | ||
213 | wpa_msg(wpa_s, MSG_INFO, "Trying to authenticate with " MACSTR | |
214 | " (SSID='%s' freq=%d MHz)", MAC2STR(params.bssid), | |
215 | wpa_ssid_txt(params.ssid, params.ssid_len), params.freq); | |
216 | ||
217 | wpa_clear_keys(wpa_s, bss->bssid); | |
218 | wpa_supplicant_set_state(wpa_s, WPA_AUTHENTICATING); | |
8bac466b | 219 | old_ssid = wpa_s->current_ssid; |
c2a04078 JM |
220 | wpa_s->current_ssid = ssid; |
221 | wpa_supplicant_rsn_supp_set_config(wpa_s, wpa_s->current_ssid); | |
222 | wpa_supplicant_initiate_eapol(wpa_s); | |
8bac466b JM |
223 | if (old_ssid != wpa_s->current_ssid) |
224 | wpas_notify_network_changed(wpa_s); | |
c2a04078 | 225 | |
62c72d72 | 226 | wpa_s->sme.auth_alg = params.auth_alg; |
c2a04078 JM |
227 | if (wpa_drv_authenticate(wpa_s, ¶ms) < 0) { |
228 | wpa_msg(wpa_s, MSG_INFO, "Authentication request to the " | |
229 | "driver failed"); | |
230 | return; | |
231 | } | |
232 | ||
233 | /* TODO: add timeout on authentication */ | |
234 | ||
235 | /* | |
236 | * Association will be started based on the authentication event from | |
237 | * the driver. | |
238 | */ | |
239 | } | |
240 | ||
241 | ||
242 | void sme_event_auth(struct wpa_supplicant *wpa_s, union wpa_event_data *data) | |
243 | { | |
c2a04078 JM |
244 | struct wpa_ssid *ssid = wpa_s->current_ssid; |
245 | ||
246 | if (ssid == NULL) { | |
247 | wpa_printf(MSG_DEBUG, "SME: Ignore authentication event when " | |
248 | "network is not selected"); | |
249 | return; | |
250 | } | |
251 | ||
252 | if (wpa_s->wpa_state != WPA_AUTHENTICATING) { | |
253 | wpa_printf(MSG_DEBUG, "SME: Ignore authentication event when " | |
254 | "not in authenticating state"); | |
255 | return; | |
256 | } | |
257 | ||
258 | if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) { | |
259 | wpa_printf(MSG_DEBUG, "SME: Ignore authentication with " | |
260 | "unexpected peer " MACSTR, | |
261 | MAC2STR(data->auth.peer)); | |
262 | return; | |
263 | } | |
264 | ||
265 | wpa_printf(MSG_DEBUG, "SME: Authentication response: peer=" MACSTR | |
266 | " auth_type=%d status_code=%d", | |
267 | MAC2STR(data->auth.peer), data->auth.auth_type, | |
268 | data->auth.status_code); | |
269 | wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs", | |
270 | data->auth.ies, data->auth.ies_len); | |
271 | ||
272 | if (data->auth.status_code != WLAN_STATUS_SUCCESS) { | |
273 | wpa_printf(MSG_DEBUG, "SME: Authentication failed (status " | |
274 | "code %d)", data->auth.status_code); | |
275 | return; | |
276 | } | |
277 | ||
278 | #ifdef CONFIG_IEEE80211R | |
279 | if (data->auth.auth_type == WLAN_AUTH_FT) { | |
280 | union wpa_event_data edata; | |
281 | os_memset(&edata, 0, sizeof(edata)); | |
282 | edata.ft_ies.ies = data->auth.ies; | |
283 | edata.ft_ies.ies_len = data->auth.ies_len; | |
284 | os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN); | |
285 | wpa_supplicant_event(wpa_s, EVENT_FT_RESPONSE, &edata); | |
286 | } | |
287 | #endif /* CONFIG_IEEE80211R */ | |
288 | ||
71024cb2 JM |
289 | sme_associate(wpa_s, ssid->mode, data->auth.peer, |
290 | data->auth.auth_type); | |
291 | } | |
292 | ||
293 | ||
294 | void sme_associate(struct wpa_supplicant *wpa_s, enum wpas_mode mode, | |
295 | const u8 *bssid, u16 auth_type) | |
296 | { | |
297 | struct wpa_driver_associate_params params; | |
d9a27b04 | 298 | struct ieee802_11_elems elems; |
71024cb2 | 299 | |
c2a04078 | 300 | os_memset(¶ms, 0, sizeof(params)); |
71024cb2 | 301 | params.bssid = bssid; |
c2a04078 JM |
302 | params.ssid = wpa_s->sme.ssid; |
303 | params.ssid_len = wpa_s->sme.ssid_len; | |
304 | params.freq = wpa_s->sme.freq; | |
305 | params.wpa_ie = wpa_s->sme.assoc_req_ie_len ? | |
306 | wpa_s->sme.assoc_req_ie : NULL; | |
307 | params.wpa_ie_len = wpa_s->sme.assoc_req_ie_len; | |
308 | #ifdef CONFIG_IEEE80211R | |
71024cb2 | 309 | if (auth_type == WLAN_AUTH_FT && wpa_s->sme.ft_ies) { |
c2a04078 JM |
310 | params.wpa_ie = wpa_s->sme.ft_ies; |
311 | params.wpa_ie_len = wpa_s->sme.ft_ies_len; | |
312 | } | |
313 | #endif /* CONFIG_IEEE80211R */ | |
71024cb2 | 314 | params.mode = mode; |
c2a04078 | 315 | params.mgmt_frame_protection = wpa_s->sme.mfp; |
62fa124c JM |
316 | if (wpa_s->sme.prev_bssid_set) |
317 | params.prev_bssid = wpa_s->sme.prev_bssid; | |
c2a04078 JM |
318 | |
319 | wpa_msg(wpa_s, MSG_INFO, "Trying to associate with " MACSTR | |
320 | " (SSID='%s' freq=%d MHz)", MAC2STR(params.bssid), | |
321 | params.ssid ? wpa_ssid_txt(params.ssid, params.ssid_len) : "", | |
322 | params.freq); | |
323 | ||
324 | wpa_supplicant_set_state(wpa_s, WPA_ASSOCIATING); | |
325 | ||
d9a27b04 JM |
326 | if (ieee802_11_parse_elems(params.wpa_ie, params.wpa_ie_len, &elems, 0) |
327 | < 0) { | |
328 | wpa_printf(MSG_DEBUG, "SME: Could not parse own IEs?!"); | |
329 | os_memset(&elems, 0, sizeof(elems)); | |
330 | } | |
331 | if (elems.rsn_ie) | |
332 | wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.rsn_ie - 2, | |
333 | elems.rsn_ie_len + 2); | |
334 | else if (elems.wpa_ie) | |
335 | wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.wpa_ie - 2, | |
336 | elems.wpa_ie_len + 2); | |
337 | else | |
338 | wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0); | |
339 | ||
c2a04078 JM |
340 | if (wpa_drv_associate(wpa_s, ¶ms) < 0) { |
341 | wpa_msg(wpa_s, MSG_INFO, "Association request to the driver " | |
342 | "failed"); | |
b85e7724 | 343 | wpa_supplicant_req_scan(wpa_s, 5, 0); |
c2a04078 JM |
344 | return; |
345 | } | |
346 | ||
347 | /* TODO: add timeout on association */ | |
348 | } | |
349 | ||
350 | ||
351 | int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, | |
352 | const u8 *ies, size_t ies_len) | |
353 | { | |
354 | if (md == NULL || ies == NULL) { | |
355 | wpa_printf(MSG_DEBUG, "SME: Remove mobility domain"); | |
356 | os_free(wpa_s->sme.ft_ies); | |
357 | wpa_s->sme.ft_ies = NULL; | |
358 | wpa_s->sme.ft_ies_len = 0; | |
359 | wpa_s->sme.ft_used = 0; | |
360 | return 0; | |
361 | } | |
362 | ||
363 | os_memcpy(wpa_s->sme.mobility_domain, md, MOBILITY_DOMAIN_ID_LEN); | |
364 | wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len); | |
365 | os_free(wpa_s->sme.ft_ies); | |
366 | wpa_s->sme.ft_ies = os_malloc(ies_len); | |
367 | if (wpa_s->sme.ft_ies == NULL) | |
368 | return -1; | |
369 | os_memcpy(wpa_s->sme.ft_ies, ies, ies_len); | |
370 | wpa_s->sme.ft_ies_len = ies_len; | |
371 | return 0; | |
372 | } | |
efa46078 JM |
373 | |
374 | ||
375 | void sme_event_assoc_reject(struct wpa_supplicant *wpa_s, | |
376 | union wpa_event_data *data) | |
377 | { | |
8bac466b | 378 | int bssid_changed; |
76d11d3f | 379 | int timeout = 5000; |
8bac466b | 380 | |
76d11d3f JM |
381 | wpa_printf(MSG_DEBUG, "SME: Association with " MACSTR " failed: " |
382 | "status code %d", MAC2STR(wpa_s->pending_bssid), | |
efa46078 JM |
383 | data->assoc_reject.status_code); |
384 | ||
8bac466b | 385 | bssid_changed = !is_zero_ether_addr(wpa_s->bssid); |
76d11d3f JM |
386 | |
387 | /* | |
388 | * For now, unconditionally terminate the previous authentication. In | |
389 | * theory, this should not be needed, but mac80211 gets quite confused | |
390 | * if the authentication is left pending.. Some roaming cases might | |
391 | * benefit from using the previous authentication, so this could be | |
392 | * optimized in the future. | |
393 | */ | |
394 | if (wpa_drv_deauthenticate(wpa_s, wpa_s->pending_bssid, | |
395 | WLAN_REASON_DEAUTH_LEAVING) < 0) { | |
396 | wpa_msg(wpa_s, MSG_INFO, | |
397 | "Deauth request to the driver failed"); | |
398 | } | |
62fa124c | 399 | wpa_s->sme.prev_bssid_set = 0; |
76d11d3f JM |
400 | |
401 | if (wpa_blacklist_add(wpa_s, wpa_s->pending_bssid) == 0) { | |
402 | struct wpa_blacklist *b; | |
403 | b = wpa_blacklist_get(wpa_s, wpa_s->pending_bssid); | |
404 | if (b && b->count < 3) { | |
405 | /* | |
406 | * Speed up next attempt if there could be other APs | |
407 | * that could accept association. | |
408 | */ | |
409 | timeout = 100; | |
410 | } | |
411 | } | |
412 | wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED); | |
efa46078 JM |
413 | os_memset(wpa_s->bssid, 0, ETH_ALEN); |
414 | os_memset(wpa_s->pending_bssid, 0, ETH_ALEN); | |
8bac466b JM |
415 | if (bssid_changed) |
416 | wpas_notify_bssid_changed(wpa_s); | |
efa46078 JM |
417 | |
418 | /* | |
419 | * TODO: if more than one possible AP is available in scan results, | |
420 | * could try the other ones before requesting a new scan. | |
421 | */ | |
76d11d3f JM |
422 | wpa_supplicant_req_scan(wpa_s, timeout / 1000, |
423 | 1000 * (timeout % 1000)); | |
efa46078 | 424 | } |
da1fb17c JM |
425 | |
426 | ||
427 | void sme_event_auth_timed_out(struct wpa_supplicant *wpa_s, | |
428 | union wpa_event_data *data) | |
429 | { | |
430 | wpa_printf(MSG_DEBUG, "SME: Authentication timed out"); | |
431 | wpa_supplicant_req_scan(wpa_s, 5, 0); | |
432 | } | |
433 | ||
434 | ||
435 | void sme_event_assoc_timed_out(struct wpa_supplicant *wpa_s, | |
436 | union wpa_event_data *data) | |
437 | { | |
438 | wpa_printf(MSG_DEBUG, "SME: Association timed out"); | |
439 | wpa_supplicant_mark_disassoc(wpa_s); | |
440 | wpa_supplicant_req_scan(wpa_s, 5, 0); | |
441 | } | |
a84ed99e JM |
442 | |
443 | ||
444 | void sme_event_disassoc(struct wpa_supplicant *wpa_s, | |
445 | union wpa_event_data *data) | |
446 | { | |
447 | wpa_printf(MSG_DEBUG, "SME: Disassociation event received"); | |
448 | if (!is_zero_ether_addr(wpa_s->bssid) && | |
449 | !(wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)) { | |
450 | /* | |
451 | * cfg80211/mac80211 can get into somewhat confused state if | |
452 | * the AP only disassociates us and leaves us in authenticated | |
453 | * state. For now, force the state to be cleared to avoid | |
454 | * confusing errors if we try to associate with the AP again. | |
455 | */ | |
456 | wpa_printf(MSG_DEBUG, "SME: Deauthenticate to clear driver " | |
457 | "state"); | |
458 | wpa_drv_deauthenticate(wpa_s, wpa_s->bssid, | |
459 | WLAN_REASON_DEAUTH_LEAVING); | |
460 | } | |
461 | } |