]>
Commit | Line | Data |
---|---|---|
6fc6879b JM |
1 | /* |
2 | * WPA Supplicant - driver interaction with BSD net80211 layer | |
3 | * Copyright (c) 2004, Sam Leffler <sam@errno.com> | |
4 | * | |
5 | * This program is free software; you can redistribute it and/or modify | |
6 | * it under the terms of the GNU General Public License version 2 as | |
7 | * published by the Free Software Foundation. | |
8 | * | |
9 | * Alternatively, this software may be distributed under the terms of BSD | |
10 | * license. | |
11 | * | |
12 | * See README and COPYING for more details. | |
13 | */ | |
14 | ||
15 | #include "includes.h" | |
16 | #include <sys/ioctl.h> | |
17 | ||
18 | #include "common.h" | |
19 | #include "driver.h" | |
20 | #include "eloop.h" | |
21 | #include "ieee802_11_defs.h" | |
22 | ||
23 | #include <net/if.h> | |
24 | #include <net/ethernet.h> | |
25 | ||
26 | #include <net80211/ieee80211.h> | |
27 | #include <net80211/ieee80211_crypto.h> | |
28 | #include <net80211/ieee80211_ioctl.h> | |
29 | ||
30 | struct wpa_driver_bsd_data { | |
31 | int sock; /* open socket for 802.11 ioctls */ | |
32 | int route; /* routing socket for events */ | |
33 | char ifname[IFNAMSIZ+1]; /* interface name */ | |
34 | unsigned int ifindex; /* interface index */ | |
35 | void *ctx; | |
36 | int prev_roaming; /* roaming state to restore on deinit */ | |
37 | int prev_privacy; /* privacy state to restore on deinit */ | |
38 | int prev_wpa; /* wpa state to restore on deinit */ | |
39 | }; | |
40 | ||
41 | static int | |
42 | set80211var(struct wpa_driver_bsd_data *drv, int op, const void *arg, int arg_len) | |
43 | { | |
44 | struct ieee80211req ireq; | |
45 | ||
46 | os_memset(&ireq, 0, sizeof(ireq)); | |
47 | os_strlcpy(ireq.i_name, drv->ifname, IFNAMSIZ); | |
48 | ireq.i_type = op; | |
49 | ireq.i_len = arg_len; | |
50 | ireq.i_data = (void *) arg; | |
51 | ||
52 | if (ioctl(drv->sock, SIOCS80211, &ireq) < 0) { | |
53 | fprintf(stderr, "ioctl[SIOCS80211, op %u, len %u]: %s\n", | |
54 | op, arg_len, strerror(errno)); | |
55 | return -1; | |
56 | } | |
57 | return 0; | |
58 | } | |
59 | ||
60 | static int | |
61 | get80211var(struct wpa_driver_bsd_data *drv, int op, void *arg, int arg_len) | |
62 | { | |
63 | struct ieee80211req ireq; | |
64 | ||
65 | os_memset(&ireq, 0, sizeof(ireq)); | |
66 | os_strlcpy(ireq.i_name, drv->ifname, IFNAMSIZ); | |
67 | ireq.i_type = op; | |
68 | ireq.i_len = arg_len; | |
69 | ireq.i_data = arg; | |
70 | ||
71 | if (ioctl(drv->sock, SIOCG80211, &ireq) < 0) { | |
72 | fprintf(stderr, "ioctl[SIOCG80211, op %u, len %u]: %s\n", | |
73 | op, arg_len, strerror(errno)); | |
74 | return -1; | |
75 | } | |
76 | return ireq.i_len; | |
77 | } | |
78 | ||
79 | static int | |
80 | set80211param(struct wpa_driver_bsd_data *drv, int op, int arg) | |
81 | { | |
82 | struct ieee80211req ireq; | |
83 | ||
84 | os_memset(&ireq, 0, sizeof(ireq)); | |
85 | os_strlcpy(ireq.i_name, drv->ifname, IFNAMSIZ); | |
86 | ireq.i_type = op; | |
87 | ireq.i_val = arg; | |
88 | ||
89 | if (ioctl(drv->sock, SIOCS80211, &ireq) < 0) { | |
90 | fprintf(stderr, "ioctl[SIOCS80211, op %u, arg 0x%x]: %s\n", | |
91 | op, arg, strerror(errno)); | |
92 | return -1; | |
93 | } | |
94 | return 0; | |
95 | } | |
96 | ||
97 | static int | |
98 | get80211param(struct wpa_driver_bsd_data *drv, int op) | |
99 | { | |
100 | struct ieee80211req ireq; | |
101 | ||
102 | os_memset(&ireq, 0, sizeof(ireq)); | |
103 | os_strlcpy(ireq.i_name, drv->ifname, IFNAMSIZ); | |
104 | ireq.i_type = op; | |
105 | ||
106 | if (ioctl(drv->sock, SIOCG80211, &ireq) < 0) { | |
107 | fprintf(stderr, "ioctl[SIOCG80211, op %u]: %s\n", | |
108 | op, strerror(errno)); | |
109 | return -1; | |
110 | } | |
111 | return ireq.i_val; | |
112 | } | |
113 | ||
114 | static int | |
115 | getifflags(struct wpa_driver_bsd_data *drv, int *flags) | |
116 | { | |
117 | struct ifreq ifr; | |
118 | ||
119 | os_memset(&ifr, 0, sizeof(ifr)); | |
120 | os_strlcpy(ifr.ifr_name, drv->ifname, sizeof(ifr.ifr_name)); | |
121 | if (ioctl(drv->sock, SIOCGIFFLAGS, (caddr_t)&ifr) < 0) { | |
122 | perror("SIOCGIFFLAGS"); | |
123 | return errno; | |
124 | } | |
125 | *flags = ifr.ifr_flags & 0xffff; | |
126 | return 0; | |
127 | } | |
128 | ||
129 | static int | |
130 | setifflags(struct wpa_driver_bsd_data *drv, int flags) | |
131 | { | |
132 | struct ifreq ifr; | |
133 | ||
134 | os_memset(&ifr, 0, sizeof(ifr)); | |
135 | os_strlcpy(ifr.ifr_name, drv->ifname, sizeof(ifr.ifr_name)); | |
136 | ifr.ifr_flags = flags & 0xffff; | |
137 | if (ioctl(drv->sock, SIOCSIFFLAGS, (caddr_t)&ifr) < 0) { | |
138 | perror("SIOCSIFFLAGS"); | |
139 | return errno; | |
140 | } | |
141 | return 0; | |
142 | } | |
143 | ||
144 | static int | |
145 | wpa_driver_bsd_get_bssid(void *priv, u8 *bssid) | |
146 | { | |
147 | struct wpa_driver_bsd_data *drv = priv; | |
148 | ||
149 | return get80211var(drv, IEEE80211_IOC_BSSID, | |
150 | bssid, IEEE80211_ADDR_LEN) < 0 ? -1 : 0; | |
151 | } | |
152 | ||
153 | #if 0 | |
154 | static int | |
155 | wpa_driver_bsd_set_bssid(void *priv, const char *bssid) | |
156 | { | |
157 | struct wpa_driver_bsd_data *drv = priv; | |
158 | ||
159 | return set80211var(drv, IEEE80211_IOC_BSSID, | |
160 | bssid, IEEE80211_ADDR_LEN); | |
161 | } | |
162 | #endif | |
163 | ||
164 | static int | |
165 | wpa_driver_bsd_get_ssid(void *priv, u8 *ssid) | |
166 | { | |
167 | struct wpa_driver_bsd_data *drv = priv; | |
168 | ||
169 | return get80211var(drv, IEEE80211_IOC_SSID, | |
170 | ssid, IEEE80211_NWID_LEN); | |
171 | } | |
172 | ||
173 | static int | |
174 | wpa_driver_bsd_set_ssid(void *priv, const char *ssid, | |
175 | size_t ssid_len) | |
176 | { | |
177 | struct wpa_driver_bsd_data *drv = priv; | |
178 | ||
179 | return set80211var(drv, IEEE80211_IOC_SSID, ssid, ssid_len); | |
180 | } | |
181 | ||
182 | static int | |
183 | wpa_driver_bsd_set_wpa_ie(struct wpa_driver_bsd_data *drv, | |
184 | const char *wpa_ie, size_t wpa_ie_len) | |
185 | { | |
186 | return set80211var(drv, IEEE80211_IOC_OPTIE, wpa_ie, wpa_ie_len); | |
187 | } | |
188 | ||
189 | static int | |
190 | wpa_driver_bsd_set_wpa_internal(void *priv, int wpa, int privacy) | |
191 | { | |
192 | struct wpa_driver_bsd_data *drv = priv; | |
193 | int ret = 0; | |
194 | ||
195 | wpa_printf(MSG_DEBUG, "%s: wpa=%d privacy=%d", | |
196 | __FUNCTION__, wpa, privacy); | |
197 | ||
198 | if (!wpa && wpa_driver_bsd_set_wpa_ie(drv, NULL, 0) < 0) | |
199 | ret = -1; | |
200 | if (set80211param(drv, IEEE80211_IOC_PRIVACY, privacy) < 0) | |
201 | ret = -1; | |
202 | if (set80211param(drv, IEEE80211_IOC_WPA, wpa) < 0) | |
203 | ret = -1; | |
204 | ||
205 | return ret; | |
206 | } | |
207 | ||
208 | static int | |
209 | wpa_driver_bsd_set_wpa(void *priv, int enabled) | |
210 | { | |
211 | wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); | |
212 | ||
213 | return wpa_driver_bsd_set_wpa_internal(priv, enabled ? 3 : 0, enabled); | |
214 | } | |
215 | ||
216 | static int | |
217 | wpa_driver_bsd_del_key(struct wpa_driver_bsd_data *drv, int key_idx, | |
218 | const unsigned char *addr) | |
219 | { | |
220 | struct ieee80211req_del_key wk; | |
221 | ||
222 | os_memset(&wk, 0, sizeof(wk)); | |
223 | if (addr != NULL && | |
224 | bcmp(addr, "\xff\xff\xff\xff\xff\xff", IEEE80211_ADDR_LEN) != 0) { | |
225 | struct ether_addr ea; | |
226 | ||
227 | os_memcpy(&ea, addr, IEEE80211_ADDR_LEN); | |
228 | wpa_printf(MSG_DEBUG, "%s: addr=%s keyidx=%d", | |
229 | __func__, ether_ntoa(&ea), key_idx); | |
230 | os_memcpy(wk.idk_macaddr, addr, IEEE80211_ADDR_LEN); | |
231 | wk.idk_keyix = (uint8_t) IEEE80211_KEYIX_NONE; | |
232 | } else { | |
233 | wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __func__, key_idx); | |
234 | wk.idk_keyix = key_idx; | |
235 | } | |
236 | return set80211var(drv, IEEE80211_IOC_DELKEY, &wk, sizeof(wk)); | |
237 | } | |
238 | ||
239 | static int | |
240 | wpa_driver_bsd_set_key(void *priv, wpa_alg alg, | |
241 | const unsigned char *addr, int key_idx, int set_tx, | |
242 | const u8 *seq, size_t seq_len, | |
243 | const u8 *key, size_t key_len) | |
244 | { | |
245 | struct wpa_driver_bsd_data *drv = priv; | |
246 | struct ieee80211req_key wk; | |
247 | struct ether_addr ea; | |
248 | char *alg_name; | |
249 | u_int8_t cipher; | |
250 | ||
251 | if (alg == WPA_ALG_NONE) | |
252 | return wpa_driver_bsd_del_key(drv, key_idx, addr); | |
253 | ||
254 | switch (alg) { | |
255 | case WPA_ALG_WEP: | |
256 | alg_name = "WEP"; | |
257 | cipher = IEEE80211_CIPHER_WEP; | |
258 | break; | |
259 | case WPA_ALG_TKIP: | |
260 | alg_name = "TKIP"; | |
261 | cipher = IEEE80211_CIPHER_TKIP; | |
262 | break; | |
263 | case WPA_ALG_CCMP: | |
264 | alg_name = "CCMP"; | |
265 | cipher = IEEE80211_CIPHER_AES_CCM; | |
266 | break; | |
267 | default: | |
268 | wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d", | |
269 | __func__, alg); | |
270 | return -1; | |
271 | } | |
272 | ||
273 | os_memcpy(&ea, addr, IEEE80211_ADDR_LEN); | |
274 | wpa_printf(MSG_DEBUG, | |
275 | "%s: alg=%s addr=%s key_idx=%d set_tx=%d seq_len=%zu key_len=%zu", | |
276 | __func__, alg_name, ether_ntoa(&ea), key_idx, set_tx, | |
277 | seq_len, key_len); | |
278 | ||
279 | if (seq_len > sizeof(u_int64_t)) { | |
280 | wpa_printf(MSG_DEBUG, "%s: seq_len %zu too big", | |
281 | __func__, seq_len); | |
282 | return -2; | |
283 | } | |
284 | if (key_len > sizeof(wk.ik_keydata)) { | |
285 | wpa_printf(MSG_DEBUG, "%s: key length %zu too big", | |
286 | __func__, key_len); | |
287 | return -3; | |
288 | } | |
289 | ||
290 | os_memset(&wk, 0, sizeof(wk)); | |
291 | wk.ik_type = cipher; | |
292 | wk.ik_flags = IEEE80211_KEY_RECV; | |
293 | if (set_tx) | |
294 | wk.ik_flags |= IEEE80211_KEY_XMIT; | |
295 | os_memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN); | |
296 | /* | |
297 | * Deduce whether group/global or unicast key by checking | |
298 | * the address (yech). Note also that we can only mark global | |
299 | * keys default; doing this for a unicast key is an error. | |
300 | */ | |
301 | if (bcmp(addr, "\xff\xff\xff\xff\xff\xff", IEEE80211_ADDR_LEN) == 0) { | |
302 | wk.ik_flags |= IEEE80211_KEY_GROUP; | |
303 | wk.ik_keyix = key_idx; | |
304 | } else { | |
305 | wk.ik_keyix = (key_idx == 0 ? IEEE80211_KEYIX_NONE : key_idx); | |
306 | } | |
307 | if (wk.ik_keyix != IEEE80211_KEYIX_NONE && set_tx) | |
308 | wk.ik_flags |= IEEE80211_KEY_DEFAULT; | |
309 | wk.ik_keylen = key_len; | |
310 | os_memcpy(&wk.ik_keyrsc, seq, seq_len); | |
311 | os_memcpy(wk.ik_keydata, key, key_len); | |
312 | ||
313 | return set80211var(drv, IEEE80211_IOC_WPAKEY, &wk, sizeof(wk)); | |
314 | } | |
315 | ||
316 | static int | |
317 | wpa_driver_bsd_set_countermeasures(void *priv, int enabled) | |
318 | { | |
319 | struct wpa_driver_bsd_data *drv = priv; | |
320 | ||
321 | wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); | |
322 | return set80211param(drv, IEEE80211_IOC_COUNTERMEASURES, enabled); | |
323 | } | |
324 | ||
325 | ||
326 | static int | |
327 | wpa_driver_bsd_set_drop_unencrypted(void *priv, int enabled) | |
328 | { | |
329 | struct wpa_driver_bsd_data *drv = priv; | |
330 | ||
331 | wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); | |
332 | return set80211param(drv, IEEE80211_IOC_DROPUNENCRYPTED, enabled); | |
333 | } | |
334 | ||
335 | static int | |
336 | wpa_driver_bsd_deauthenticate(void *priv, const u8 *addr, int reason_code) | |
337 | { | |
338 | struct wpa_driver_bsd_data *drv = priv; | |
339 | struct ieee80211req_mlme mlme; | |
340 | ||
341 | wpa_printf(MSG_DEBUG, "%s", __func__); | |
342 | os_memset(&mlme, 0, sizeof(mlme)); | |
343 | mlme.im_op = IEEE80211_MLME_DEAUTH; | |
344 | mlme.im_reason = reason_code; | |
345 | os_memcpy(mlme.im_macaddr, addr, IEEE80211_ADDR_LEN); | |
346 | return set80211var(drv, IEEE80211_IOC_MLME, &mlme, sizeof(mlme)); | |
347 | } | |
348 | ||
349 | static int | |
350 | wpa_driver_bsd_disassociate(void *priv, const u8 *addr, int reason_code) | |
351 | { | |
352 | struct wpa_driver_bsd_data *drv = priv; | |
353 | struct ieee80211req_mlme mlme; | |
354 | ||
355 | wpa_printf(MSG_DEBUG, "%s", __func__); | |
356 | os_memset(&mlme, 0, sizeof(mlme)); | |
357 | mlme.im_op = IEEE80211_MLME_DISASSOC; | |
358 | mlme.im_reason = reason_code; | |
359 | os_memcpy(mlme.im_macaddr, addr, IEEE80211_ADDR_LEN); | |
360 | return set80211var(drv, IEEE80211_IOC_MLME, &mlme, sizeof(mlme)); | |
361 | } | |
362 | ||
363 | static int | |
364 | wpa_driver_bsd_associate(void *priv, struct wpa_driver_associate_params *params) | |
365 | { | |
366 | struct wpa_driver_bsd_data *drv = priv; | |
367 | struct ieee80211req_mlme mlme; | |
368 | int privacy; | |
369 | ||
370 | wpa_printf(MSG_DEBUG, | |
371 | "%s: ssid '%.*s' wpa ie len %u pairwise %u group %u key mgmt %u" | |
372 | , __func__ | |
373 | , params->ssid_len, params->ssid | |
374 | , params->wpa_ie_len | |
375 | , params->pairwise_suite | |
376 | , params->group_suite | |
377 | , params->key_mgmt_suite | |
378 | ); | |
379 | ||
380 | /* XXX error handling is wrong but unclear what to do... */ | |
381 | if (wpa_driver_bsd_set_wpa_ie(drv, params->wpa_ie, params->wpa_ie_len) < 0) | |
382 | return -1; | |
383 | #ifndef NEW_FREEBSD_MLME_ASSOC | |
384 | if (wpa_driver_bsd_set_ssid(drv, params->ssid, params->ssid_len) < 0) | |
385 | return -1; | |
386 | #endif | |
387 | ||
388 | privacy = !(params->pairwise_suite == CIPHER_NONE && | |
389 | params->group_suite == CIPHER_NONE && | |
390 | params->key_mgmt_suite == KEY_MGMT_NONE && | |
391 | params->wpa_ie_len == 0); | |
392 | wpa_printf(MSG_DEBUG, "%s: set PRIVACY %u", __func__, privacy); | |
393 | ||
394 | if (set80211param(drv, IEEE80211_IOC_PRIVACY, privacy) < 0) | |
395 | return -1; | |
396 | ||
397 | if (params->wpa_ie_len && | |
398 | set80211param(drv, IEEE80211_IOC_WPA, | |
399 | params->wpa_ie[0] == WLAN_EID_RSN ? 2 : 1) < 0) | |
400 | return -1; | |
401 | ||
402 | os_memset(&mlme, 0, sizeof(mlme)); | |
403 | mlme.im_op = IEEE80211_MLME_ASSOC; | |
404 | #ifdef NEW_FREEBSD_MLME_ASSOC | |
405 | if (params->ssid != NULL) | |
406 | os_memcpy(mlme.im_ssid, params->ssid, params->ssid_len); | |
407 | mlme.im_ssid_len = params->ssid_len; | |
408 | #endif | |
409 | if (params->bssid != NULL) | |
410 | os_memcpy(mlme.im_macaddr, params->bssid, IEEE80211_ADDR_LEN); | |
411 | if (set80211var(drv, IEEE80211_IOC_MLME, &mlme, sizeof(mlme)) < 0) | |
412 | return -1; | |
413 | return 0; | |
414 | } | |
415 | ||
416 | static int | |
417 | wpa_driver_bsd_set_auth_alg(void *priv, int auth_alg) | |
418 | { | |
419 | struct wpa_driver_bsd_data *drv = priv; | |
420 | int authmode; | |
421 | ||
422 | if ((auth_alg & AUTH_ALG_OPEN_SYSTEM) && | |
423 | (auth_alg & AUTH_ALG_SHARED_KEY)) | |
424 | authmode = IEEE80211_AUTH_AUTO; | |
425 | else if (auth_alg & AUTH_ALG_SHARED_KEY) | |
426 | authmode = IEEE80211_AUTH_SHARED; | |
427 | else | |
428 | authmode = IEEE80211_AUTH_OPEN; | |
429 | ||
430 | return set80211param(drv, IEEE80211_IOC_AUTHMODE, authmode); | |
431 | } | |
432 | ||
433 | static int | |
434 | wpa_driver_bsd_scan(void *priv, const u8 *ssid, size_t ssid_len) | |
435 | { | |
436 | struct wpa_driver_bsd_data *drv = priv; | |
437 | int flags; | |
438 | ||
439 | /* NB: interface must be marked UP to do a scan */ | |
440 | if (getifflags(drv, &flags) != 0 || setifflags(drv, flags | IFF_UP) != 0) | |
441 | return -1; | |
442 | ||
443 | /* set desired ssid before scan */ | |
444 | if (wpa_driver_bsd_set_ssid(drv, ssid, ssid_len) < 0) | |
445 | return -1; | |
446 | ||
447 | /* NB: net80211 delivers a scan complete event so no need to poll */ | |
448 | return set80211param(drv, IEEE80211_IOC_SCAN_REQ, 0); | |
449 | } | |
450 | ||
451 | #include <net/route.h> | |
452 | #include <net80211/ieee80211_freebsd.h> | |
453 | ||
454 | static void | |
455 | wpa_driver_bsd_event_receive(int sock, void *ctx, void *sock_ctx) | |
456 | { | |
457 | struct wpa_driver_bsd_data *drv = sock_ctx; | |
458 | char buf[2048]; | |
459 | struct if_announcemsghdr *ifan; | |
460 | struct if_msghdr *ifm; | |
461 | struct rt_msghdr *rtm; | |
462 | union wpa_event_data event; | |
463 | struct ieee80211_michael_event *mic; | |
464 | int n; | |
465 | ||
466 | n = read(sock, buf, sizeof(buf)); | |
467 | if (n < 0) { | |
468 | if (errno != EINTR && errno != EAGAIN) | |
469 | perror("read(PF_ROUTE)"); | |
470 | return; | |
471 | } | |
472 | ||
473 | rtm = (struct rt_msghdr *) buf; | |
474 | if (rtm->rtm_version != RTM_VERSION) { | |
475 | wpa_printf(MSG_DEBUG, "Routing message version %d not " | |
476 | "understood\n", rtm->rtm_version); | |
477 | return; | |
478 | } | |
479 | os_memset(&event, 0, sizeof(event)); | |
480 | switch (rtm->rtm_type) { | |
481 | case RTM_IFANNOUNCE: | |
482 | ifan = (struct if_announcemsghdr *) rtm; | |
483 | if (ifan->ifan_index != drv->ifindex) | |
484 | break; | |
485 | strlcpy(event.interface_status.ifname, drv->ifname, | |
486 | sizeof(event.interface_status.ifname)); | |
487 | switch (ifan->ifan_what) { | |
488 | case IFAN_DEPARTURE: | |
489 | event.interface_status.ievent = EVENT_INTERFACE_REMOVED; | |
490 | default: | |
491 | return; | |
492 | } | |
493 | wpa_printf(MSG_DEBUG, "RTM_IFANNOUNCE: Interface '%s' %s", | |
494 | event.interface_status.ifname, | |
495 | ifan->ifan_what == IFAN_DEPARTURE ? | |
496 | "removed" : "added"); | |
497 | wpa_supplicant_event(ctx, EVENT_INTERFACE_STATUS, &event); | |
498 | break; | |
499 | case RTM_IEEE80211: | |
500 | ifan = (struct if_announcemsghdr *) rtm; | |
501 | if (ifan->ifan_index != drv->ifindex) | |
502 | break; | |
503 | switch (ifan->ifan_what) { | |
504 | case RTM_IEEE80211_ASSOC: | |
505 | case RTM_IEEE80211_REASSOC: | |
506 | wpa_supplicant_event(ctx, EVENT_ASSOC, NULL); | |
507 | break; | |
508 | case RTM_IEEE80211_DISASSOC: | |
509 | wpa_supplicant_event(ctx, EVENT_DISASSOC, NULL); | |
510 | break; | |
511 | case RTM_IEEE80211_SCAN: | |
512 | wpa_supplicant_event(ctx, EVENT_SCAN_RESULTS, NULL); | |
513 | break; | |
514 | case RTM_IEEE80211_REPLAY: | |
515 | /* ignore */ | |
516 | break; | |
517 | case RTM_IEEE80211_MICHAEL: | |
518 | mic = (struct ieee80211_michael_event *) &ifan[1]; | |
519 | wpa_printf(MSG_DEBUG, | |
520 | "Michael MIC failure wireless event: " | |
521 | "keyix=%u src_addr=" MACSTR, mic->iev_keyix, | |
522 | MAC2STR(mic->iev_src)); | |
523 | ||
524 | os_memset(&event, 0, sizeof(event)); | |
525 | event.michael_mic_failure.unicast = | |
526 | !IEEE80211_IS_MULTICAST(mic->iev_dst); | |
527 | wpa_supplicant_event(ctx, EVENT_MICHAEL_MIC_FAILURE, | |
528 | &event); | |
529 | break; | |
530 | } | |
531 | break; | |
532 | case RTM_IFINFO: | |
533 | ifm = (struct if_msghdr *) rtm; | |
534 | if (ifm->ifm_index != drv->ifindex) | |
535 | break; | |
536 | if ((rtm->rtm_flags & RTF_UP) == 0) { | |
537 | strlcpy(event.interface_status.ifname, drv->ifname, | |
538 | sizeof(event.interface_status.ifname)); | |
539 | event.interface_status.ievent = EVENT_INTERFACE_REMOVED; | |
540 | wpa_printf(MSG_DEBUG, "RTM_IFINFO: Interface '%s' DOWN", | |
541 | event.interface_status.ifname); | |
542 | wpa_supplicant_event(ctx, EVENT_INTERFACE_STATUS, &event); | |
543 | } | |
544 | break; | |
545 | } | |
546 | } | |
547 | ||
548 | /* Compare function for sorting scan results. Return >0 if @b is consider | |
549 | * better. */ | |
550 | static int | |
551 | wpa_scan_result_compar(const void *a, const void *b) | |
552 | { | |
553 | const struct wpa_scan_result *wa = a; | |
554 | const struct wpa_scan_result *wb = b; | |
555 | ||
556 | /* WPA/WPA2 support preferred */ | |
557 | if ((wb->wpa_ie_len || wb->rsn_ie_len) && | |
558 | !(wa->wpa_ie_len || wa->rsn_ie_len)) | |
559 | return 1; | |
560 | if (!(wb->wpa_ie_len || wb->rsn_ie_len) && | |
561 | (wa->wpa_ie_len || wa->rsn_ie_len)) | |
562 | return -1; | |
563 | ||
564 | /* privacy support preferred */ | |
565 | if ((wa->caps & IEEE80211_CAPINFO_PRIVACY) && | |
566 | (wb->caps & IEEE80211_CAPINFO_PRIVACY) == 0) | |
567 | return 1; | |
568 | if ((wa->caps & IEEE80211_CAPINFO_PRIVACY) == 0 && | |
569 | (wb->caps & IEEE80211_CAPINFO_PRIVACY)) | |
570 | return -1; | |
571 | ||
572 | /* best/max rate preferred if signal level close enough XXX */ | |
573 | if (wa->maxrate != wb->maxrate && abs(wb->level - wa->level) < 5) | |
574 | return wb->maxrate - wa->maxrate; | |
575 | ||
576 | /* use freq for channel preference */ | |
577 | ||
578 | /* all things being equal, use signal level */ | |
579 | return wb->level - wa->level; | |
580 | } | |
581 | ||
582 | static int | |
583 | getmaxrate(uint8_t rates[15], uint8_t nrates) | |
584 | { | |
585 | int i, maxrate = -1; | |
586 | ||
587 | for (i = 0; i < nrates; i++) { | |
588 | int rate = rates[i] & IEEE80211_RATE_VAL; | |
589 | if (rate > maxrate) | |
590 | rate = maxrate; | |
591 | } | |
592 | return maxrate; | |
593 | } | |
594 | ||
595 | /* unalligned little endian access */ | |
596 | #define LE_READ_4(p) \ | |
597 | ((u_int32_t) \ | |
598 | ((((const u_int8_t *)(p))[0] ) | \ | |
599 | (((const u_int8_t *)(p))[1] << 8) | \ | |
600 | (((const u_int8_t *)(p))[2] << 16) | \ | |
601 | (((const u_int8_t *)(p))[3] << 24))) | |
602 | ||
603 | static int __inline | |
604 | iswpaoui(const u_int8_t *frm) | |
605 | { | |
606 | return frm[1] > 3 && LE_READ_4(frm+2) == ((WPA_OUI_TYPE<<24)|WPA_OUI); | |
607 | } | |
608 | ||
609 | static int | |
610 | wpa_driver_bsd_get_scan_results(void *priv, | |
611 | struct wpa_scan_result *results, | |
612 | size_t max_size) | |
613 | { | |
614 | #define min(a,b) ((a)>(b)?(b):(a)) | |
615 | struct wpa_driver_bsd_data *drv = priv; | |
616 | uint8_t buf[24*1024]; | |
617 | uint8_t *cp, *vp; | |
618 | struct ieee80211req_scan_result *sr; | |
619 | struct wpa_scan_result *wsr; | |
620 | int len, ielen; | |
621 | ||
622 | os_memset(results, 0, max_size * sizeof(struct wpa_scan_result)); | |
623 | ||
624 | len = get80211var(drv, IEEE80211_IOC_SCAN_RESULTS, buf, sizeof(buf)); | |
625 | if (len < 0) | |
626 | return -1; | |
627 | cp = buf; | |
628 | wsr = results; | |
629 | while (len >= sizeof(struct ieee80211req_scan_result)) { | |
630 | sr = (struct ieee80211req_scan_result *) cp; | |
631 | os_memcpy(wsr->bssid, sr->isr_bssid, IEEE80211_ADDR_LEN); | |
632 | wsr->ssid_len = sr->isr_ssid_len; | |
633 | wsr->freq = sr->isr_freq; | |
634 | wsr->noise = sr->isr_noise; | |
635 | wsr->qual = sr->isr_rssi; | |
636 | wsr->level = 0; /* XXX? */ | |
637 | wsr->caps = sr->isr_capinfo; | |
638 | wsr->maxrate = getmaxrate(sr->isr_rates, sr->isr_nrates); | |
639 | vp = (u_int8_t *)(sr+1); | |
640 | os_memcpy(wsr->ssid, vp, sr->isr_ssid_len); | |
641 | if (sr->isr_ie_len > 0) { | |
642 | vp += sr->isr_ssid_len; | |
643 | ielen = sr->isr_ie_len; | |
644 | while (ielen > 0) { | |
645 | switch (vp[0]) { | |
646 | case IEEE80211_ELEMID_VENDOR: | |
647 | if (!iswpaoui(vp)) | |
648 | break; | |
649 | wsr->wpa_ie_len = | |
650 | min(2+vp[1], SSID_MAX_WPA_IE_LEN); | |
651 | os_memcpy(wsr->wpa_ie, vp, | |
652 | wsr->wpa_ie_len); | |
653 | break; | |
654 | case IEEE80211_ELEMID_RSN: | |
655 | wsr->rsn_ie_len = | |
656 | min(2+vp[1], SSID_MAX_WPA_IE_LEN); | |
657 | os_memcpy(wsr->rsn_ie, vp, | |
658 | wsr->rsn_ie_len); | |
659 | break; | |
660 | } | |
661 | ielen -= 2+vp[1]; | |
662 | vp += 2+vp[1]; | |
663 | } | |
664 | } | |
665 | ||
666 | cp += sr->isr_len, len -= sr->isr_len; | |
667 | wsr++; | |
668 | } | |
669 | qsort(results, wsr - results, sizeof(struct wpa_scan_result), | |
670 | wpa_scan_result_compar); | |
671 | ||
672 | wpa_printf(MSG_DEBUG, "Received %d bytes of scan results (%d BSSes)", | |
673 | len, wsr - results); | |
674 | ||
675 | return wsr - results; | |
676 | #undef min | |
677 | } | |
678 | ||
679 | static void * | |
680 | wpa_driver_bsd_init(void *ctx, const char *ifname) | |
681 | { | |
682 | #define GETPARAM(drv, param, v) \ | |
683 | (((v) = get80211param(drv, param)) != -1) | |
684 | struct wpa_driver_bsd_data *drv; | |
685 | ||
686 | drv = os_zalloc(sizeof(*drv)); | |
687 | if (drv == NULL) | |
688 | return NULL; | |
689 | /* | |
690 | * NB: We require the interface name be mappable to an index. | |
691 | * This implies we do not support having wpa_supplicant | |
692 | * wait for an interface to appear. This seems ok; that | |
693 | * doesn't belong here; it's really the job of devd. | |
694 | */ | |
695 | drv->ifindex = if_nametoindex(ifname); | |
696 | if (drv->ifindex == 0) { | |
697 | wpa_printf(MSG_DEBUG, "%s: interface %s does not exist", | |
698 | __func__, ifname); | |
699 | goto fail1; | |
700 | } | |
701 | drv->sock = socket(PF_INET, SOCK_DGRAM, 0); | |
702 | if (drv->sock < 0) | |
703 | goto fail1; | |
704 | drv->route = socket(PF_ROUTE, SOCK_RAW, 0); | |
705 | if (drv->route < 0) | |
706 | goto fail; | |
707 | eloop_register_read_sock(drv->route, | |
708 | wpa_driver_bsd_event_receive, ctx, drv); | |
709 | ||
710 | drv->ctx = ctx; | |
711 | os_strlcpy(drv->ifname, ifname, sizeof(drv->ifname)); | |
712 | ||
713 | if (!GETPARAM(drv, IEEE80211_IOC_ROAMING, drv->prev_roaming)) { | |
714 | wpa_printf(MSG_DEBUG, "%s: failed to get roaming state: %s", | |
715 | __func__, strerror(errno)); | |
716 | goto fail; | |
717 | } | |
718 | if (!GETPARAM(drv, IEEE80211_IOC_PRIVACY, drv->prev_privacy)) { | |
719 | wpa_printf(MSG_DEBUG, "%s: failed to get privacy state: %s", | |
720 | __func__, strerror(errno)); | |
721 | goto fail; | |
722 | } | |
723 | if (!GETPARAM(drv, IEEE80211_IOC_WPA, drv->prev_wpa)) { | |
724 | wpa_printf(MSG_DEBUG, "%s: failed to get wpa state: %s", | |
725 | __func__, strerror(errno)); | |
726 | goto fail; | |
727 | } | |
728 | if (set80211param(drv, IEEE80211_IOC_ROAMING, IEEE80211_ROAMING_MANUAL) < 0) { | |
729 | wpa_printf(MSG_DEBUG, "%s: failed to set wpa_supplicant-based " | |
730 | "roaming: %s", __func__, strerror(errno)); | |
731 | goto fail; | |
732 | } | |
733 | ||
734 | if (set80211param(drv, IEEE80211_IOC_WPA, 1+2) < 0) { | |
735 | wpa_printf(MSG_DEBUG, "%s: failed to enable WPA support %s", | |
736 | __func__, strerror(errno)); | |
737 | goto fail; | |
738 | } | |
739 | ||
740 | return drv; | |
741 | fail: | |
742 | close(drv->sock); | |
743 | fail1: | |
744 | os_free(drv); | |
745 | return NULL; | |
746 | #undef GETPARAM | |
747 | } | |
748 | ||
749 | static void | |
750 | wpa_driver_bsd_deinit(void *priv) | |
751 | { | |
752 | struct wpa_driver_bsd_data *drv = priv; | |
753 | int flags; | |
754 | ||
755 | eloop_unregister_read_sock(drv->route); | |
756 | ||
757 | /* NB: mark interface down */ | |
758 | if (getifflags(drv, &flags) == 0) | |
759 | (void) setifflags(drv, flags &~ IFF_UP); | |
760 | ||
761 | wpa_driver_bsd_set_wpa_internal(drv, drv->prev_wpa, drv->prev_privacy); | |
762 | if (set80211param(drv, IEEE80211_IOC_ROAMING, drv->prev_roaming) < 0) | |
763 | wpa_printf(MSG_DEBUG, "%s: failed to restore roaming state", | |
764 | __func__); | |
765 | ||
766 | (void) close(drv->route); /* ioctl socket */ | |
767 | (void) close(drv->sock); /* event socket */ | |
768 | os_free(drv); | |
769 | } | |
770 | ||
771 | ||
772 | const struct wpa_driver_ops wpa_driver_bsd_ops = { | |
773 | .name = "bsd", | |
774 | .desc = "BSD 802.11 support (Atheros, etc.)", | |
775 | .init = wpa_driver_bsd_init, | |
776 | .deinit = wpa_driver_bsd_deinit, | |
777 | .get_bssid = wpa_driver_bsd_get_bssid, | |
778 | .get_ssid = wpa_driver_bsd_get_ssid, | |
779 | .set_wpa = wpa_driver_bsd_set_wpa, | |
780 | .set_key = wpa_driver_bsd_set_key, | |
781 | .set_countermeasures = wpa_driver_bsd_set_countermeasures, | |
782 | .set_drop_unencrypted = wpa_driver_bsd_set_drop_unencrypted, | |
783 | .scan = wpa_driver_bsd_scan, | |
784 | .get_scan_results = wpa_driver_bsd_get_scan_results, | |
785 | .deauthenticate = wpa_driver_bsd_deauthenticate, | |
786 | .disassociate = wpa_driver_bsd_disassociate, | |
787 | .associate = wpa_driver_bsd_associate, | |
788 | .set_auth_alg = wpa_driver_bsd_set_auth_alg, | |
789 | }; |