]> git.ipfire.org Git - thirdparty/hostap.git/blob - src/drivers/driver_ndis.c
Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 release
[thirdparty/hostap.git] / src / drivers / driver_ndis.c
1 /*
2 * WPA Supplicant - Windows/NDIS driver interface
3 * Copyright (c) 2004-2007, Jouni Malinen <j@w1.fi>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15 #ifdef __CYGWIN__
16 /* Avoid some header file conflicts by not including standard headers for
17 * cygwin builds when Packet32.h is included. */
18 #include "build_config.h"
19 int close(int fd);
20 #else /* __CYGWIN__ */
21 #include "includes.h"
22 #endif /* __CYGWIN__ */
23 #ifdef CONFIG_USE_NDISUIO
24 #include <winsock2.h>
25 #else /* CONFIG_USE_NDISUIO */
26 #include <Packet32.h>
27 #endif /* CONFIG_USE_NDISUIO */
28 #include <ntddndis.h>
29
30 #ifdef _WIN32_WCE
31 #include <winioctl.h>
32 #include <nuiouser.h>
33 #include <devload.h>
34 #endif /* _WIN32_WCE */
35
36 #include "common.h"
37 #include "driver.h"
38 #include "eloop.h"
39 #include "ieee802_11_defs.h"
40 #include "driver_ndis.h"
41
42 int wpa_driver_register_event_cb(struct wpa_driver_ndis_data *drv);
43 void wpa_driver_ndis_event_pipe_cb(void *eloop_data, void *user_data);
44
45 static void wpa_driver_ndis_deinit(void *priv);
46 static void wpa_driver_ndis_poll(void *drv);
47 static void wpa_driver_ndis_poll_timeout(void *eloop_ctx, void *timeout_ctx);
48 static int wpa_driver_ndis_adapter_init(struct wpa_driver_ndis_data *drv);
49 static int wpa_driver_ndis_adapter_open(struct wpa_driver_ndis_data *drv);
50 static void wpa_driver_ndis_adapter_close(struct wpa_driver_ndis_data *drv);
51
52
53 /* FIX: to be removed once this can be compiled with the complete NDIS
54 * header files */
55 #ifndef OID_802_11_BSSID
56 #define OID_802_11_BSSID 0x0d010101
57 #define OID_802_11_SSID 0x0d010102
58 #define OID_802_11_INFRASTRUCTURE_MODE 0x0d010108
59 #define OID_802_11_ADD_WEP 0x0D010113
60 #define OID_802_11_REMOVE_WEP 0x0D010114
61 #define OID_802_11_DISASSOCIATE 0x0D010115
62 #define OID_802_11_BSSID_LIST 0x0d010217
63 #define OID_802_11_AUTHENTICATION_MODE 0x0d010118
64 #define OID_802_11_PRIVACY_FILTER 0x0d010119
65 #define OID_802_11_BSSID_LIST_SCAN 0x0d01011A
66 #define OID_802_11_WEP_STATUS 0x0d01011B
67 #define OID_802_11_ENCRYPTION_STATUS OID_802_11_WEP_STATUS
68 #define OID_802_11_ADD_KEY 0x0d01011D
69 #define OID_802_11_REMOVE_KEY 0x0d01011E
70 #define OID_802_11_ASSOCIATION_INFORMATION 0x0d01011F
71 #define OID_802_11_TEST 0x0d010120
72 #define OID_802_11_CAPABILITY 0x0d010122
73 #define OID_802_11_PMKID 0x0d010123
74
75 #define NDIS_802_11_LENGTH_SSID 32
76 #define NDIS_802_11_LENGTH_RATES 8
77 #define NDIS_802_11_LENGTH_RATES_EX 16
78
79 typedef UCHAR NDIS_802_11_MAC_ADDRESS[6];
80
81 typedef struct NDIS_802_11_SSID {
82 ULONG SsidLength;
83 UCHAR Ssid[NDIS_802_11_LENGTH_SSID];
84 } NDIS_802_11_SSID;
85
86 typedef LONG NDIS_802_11_RSSI;
87
88 typedef enum NDIS_802_11_NETWORK_TYPE {
89 Ndis802_11FH,
90 Ndis802_11DS,
91 Ndis802_11OFDM5,
92 Ndis802_11OFDM24,
93 Ndis802_11NetworkTypeMax
94 } NDIS_802_11_NETWORK_TYPE;
95
96 typedef struct NDIS_802_11_CONFIGURATION_FH {
97 ULONG Length;
98 ULONG HopPattern;
99 ULONG HopSet;
100 ULONG DwellTime;
101 } NDIS_802_11_CONFIGURATION_FH;
102
103 typedef struct NDIS_802_11_CONFIGURATION {
104 ULONG Length;
105 ULONG BeaconPeriod;
106 ULONG ATIMWindow;
107 ULONG DSConfig;
108 NDIS_802_11_CONFIGURATION_FH FHConfig;
109 } NDIS_802_11_CONFIGURATION;
110
111 typedef enum NDIS_802_11_NETWORK_INFRASTRUCTURE {
112 Ndis802_11IBSS,
113 Ndis802_11Infrastructure,
114 Ndis802_11AutoUnknown,
115 Ndis802_11InfrastructureMax
116 } NDIS_802_11_NETWORK_INFRASTRUCTURE;
117
118 typedef enum NDIS_802_11_AUTHENTICATION_MODE {
119 Ndis802_11AuthModeOpen,
120 Ndis802_11AuthModeShared,
121 Ndis802_11AuthModeAutoSwitch,
122 Ndis802_11AuthModeWPA,
123 Ndis802_11AuthModeWPAPSK,
124 Ndis802_11AuthModeWPANone,
125 Ndis802_11AuthModeWPA2,
126 Ndis802_11AuthModeWPA2PSK,
127 Ndis802_11AuthModeMax
128 } NDIS_802_11_AUTHENTICATION_MODE;
129
130 typedef enum NDIS_802_11_WEP_STATUS {
131 Ndis802_11WEPEnabled,
132 Ndis802_11Encryption1Enabled = Ndis802_11WEPEnabled,
133 Ndis802_11WEPDisabled,
134 Ndis802_11EncryptionDisabled = Ndis802_11WEPDisabled,
135 Ndis802_11WEPKeyAbsent,
136 Ndis802_11Encryption1KeyAbsent = Ndis802_11WEPKeyAbsent,
137 Ndis802_11WEPNotSupported,
138 Ndis802_11EncryptionNotSupported = Ndis802_11WEPNotSupported,
139 Ndis802_11Encryption2Enabled,
140 Ndis802_11Encryption2KeyAbsent,
141 Ndis802_11Encryption3Enabled,
142 Ndis802_11Encryption3KeyAbsent
143 } NDIS_802_11_WEP_STATUS, NDIS_802_11_ENCRYPTION_STATUS;
144
145 typedef enum NDIS_802_11_PRIVACY_FILTER {
146 Ndis802_11PrivFilterAcceptAll,
147 Ndis802_11PrivFilter8021xWEP
148 } NDIS_802_11_PRIVACY_FILTER;
149
150 typedef UCHAR NDIS_802_11_RATES[NDIS_802_11_LENGTH_RATES];
151 typedef UCHAR NDIS_802_11_RATES_EX[NDIS_802_11_LENGTH_RATES_EX];
152
153 typedef struct NDIS_WLAN_BSSID_EX {
154 ULONG Length;
155 NDIS_802_11_MAC_ADDRESS MacAddress; /* BSSID */
156 UCHAR Reserved[2];
157 NDIS_802_11_SSID Ssid;
158 ULONG Privacy;
159 NDIS_802_11_RSSI Rssi;
160 NDIS_802_11_NETWORK_TYPE NetworkTypeInUse;
161 NDIS_802_11_CONFIGURATION Configuration;
162 NDIS_802_11_NETWORK_INFRASTRUCTURE InfrastructureMode;
163 NDIS_802_11_RATES_EX SupportedRates;
164 ULONG IELength;
165 UCHAR IEs[1];
166 } NDIS_WLAN_BSSID_EX;
167
168 typedef struct NDIS_802_11_BSSID_LIST_EX {
169 ULONG NumberOfItems;
170 NDIS_WLAN_BSSID_EX Bssid[1];
171 } NDIS_802_11_BSSID_LIST_EX;
172
173 typedef struct NDIS_802_11_FIXED_IEs {
174 UCHAR Timestamp[8];
175 USHORT BeaconInterval;
176 USHORT Capabilities;
177 } NDIS_802_11_FIXED_IEs;
178
179 typedef struct NDIS_802_11_WEP {
180 ULONG Length;
181 ULONG KeyIndex;
182 ULONG KeyLength;
183 UCHAR KeyMaterial[1];
184 } NDIS_802_11_WEP;
185
186 typedef ULONG NDIS_802_11_KEY_INDEX;
187 typedef ULONGLONG NDIS_802_11_KEY_RSC;
188
189 typedef struct NDIS_802_11_KEY {
190 ULONG Length;
191 ULONG KeyIndex;
192 ULONG KeyLength;
193 NDIS_802_11_MAC_ADDRESS BSSID;
194 NDIS_802_11_KEY_RSC KeyRSC;
195 UCHAR KeyMaterial[1];
196 } NDIS_802_11_KEY;
197
198 typedef struct NDIS_802_11_REMOVE_KEY {
199 ULONG Length;
200 ULONG KeyIndex;
201 NDIS_802_11_MAC_ADDRESS BSSID;
202 } NDIS_802_11_REMOVE_KEY;
203
204 typedef struct NDIS_802_11_AI_REQFI {
205 USHORT Capabilities;
206 USHORT ListenInterval;
207 NDIS_802_11_MAC_ADDRESS CurrentAPAddress;
208 } NDIS_802_11_AI_REQFI;
209
210 typedef struct NDIS_802_11_AI_RESFI {
211 USHORT Capabilities;
212 USHORT StatusCode;
213 USHORT AssociationId;
214 } NDIS_802_11_AI_RESFI;
215
216 typedef struct NDIS_802_11_ASSOCIATION_INFORMATION {
217 ULONG Length;
218 USHORT AvailableRequestFixedIEs;
219 NDIS_802_11_AI_REQFI RequestFixedIEs;
220 ULONG RequestIELength;
221 ULONG OffsetRequestIEs;
222 USHORT AvailableResponseFixedIEs;
223 NDIS_802_11_AI_RESFI ResponseFixedIEs;
224 ULONG ResponseIELength;
225 ULONG OffsetResponseIEs;
226 } NDIS_802_11_ASSOCIATION_INFORMATION;
227
228 typedef struct NDIS_802_11_AUTHENTICATION_ENCRYPTION {
229 NDIS_802_11_AUTHENTICATION_MODE AuthModeSupported;
230 NDIS_802_11_ENCRYPTION_STATUS EncryptStatusSupported;
231 } NDIS_802_11_AUTHENTICATION_ENCRYPTION;
232
233 typedef struct NDIS_802_11_CAPABILITY {
234 ULONG Length;
235 ULONG Version;
236 ULONG NoOfPMKIDs;
237 ULONG NoOfAuthEncryptPairsSupported;
238 NDIS_802_11_AUTHENTICATION_ENCRYPTION
239 AuthenticationEncryptionSupported[1];
240 } NDIS_802_11_CAPABILITY;
241
242 typedef UCHAR NDIS_802_11_PMKID_VALUE[16];
243
244 typedef struct BSSID_INFO {
245 NDIS_802_11_MAC_ADDRESS BSSID;
246 NDIS_802_11_PMKID_VALUE PMKID;
247 } BSSID_INFO;
248
249 typedef struct NDIS_802_11_PMKID {
250 ULONG Length;
251 ULONG BSSIDInfoCount;
252 BSSID_INFO BSSIDInfo[1];
253 } NDIS_802_11_PMKID;
254
255 typedef enum NDIS_802_11_STATUS_TYPE {
256 Ndis802_11StatusType_Authentication,
257 Ndis802_11StatusType_PMKID_CandidateList = 2,
258 Ndis802_11StatusTypeMax
259 } NDIS_802_11_STATUS_TYPE;
260
261 typedef struct NDIS_802_11_STATUS_INDICATION {
262 NDIS_802_11_STATUS_TYPE StatusType;
263 } NDIS_802_11_STATUS_INDICATION;
264
265 typedef struct PMKID_CANDIDATE {
266 NDIS_802_11_MAC_ADDRESS BSSID;
267 ULONG Flags;
268 } PMKID_CANDIDATE;
269
270 #define NDIS_802_11_PMKID_CANDIDATE_PREAUTH_ENABLED 0x01
271
272 typedef struct NDIS_802_11_PMKID_CANDIDATE_LIST {
273 ULONG Version;
274 ULONG NumCandidates;
275 PMKID_CANDIDATE CandidateList[1];
276 } NDIS_802_11_PMKID_CANDIDATE_LIST;
277
278 typedef struct NDIS_802_11_AUTHENTICATION_REQUEST {
279 ULONG Length;
280 NDIS_802_11_MAC_ADDRESS Bssid;
281 ULONG Flags;
282 } NDIS_802_11_AUTHENTICATION_REQUEST;
283
284 #define NDIS_802_11_AUTH_REQUEST_REAUTH 0x01
285 #define NDIS_802_11_AUTH_REQUEST_KEYUPDATE 0x02
286 #define NDIS_802_11_AUTH_REQUEST_PAIRWISE_ERROR 0x06
287 #define NDIS_802_11_AUTH_REQUEST_GROUP_ERROR 0x0E
288
289 #endif /* OID_802_11_BSSID */
290
291
292 #ifndef OID_802_11_PMKID
293 /* Platform SDK for XP did not include WPA2, so add needed definitions */
294
295 #define OID_802_11_CAPABILITY 0x0d010122
296 #define OID_802_11_PMKID 0x0d010123
297
298 #define Ndis802_11AuthModeWPA2 6
299 #define Ndis802_11AuthModeWPA2PSK 7
300
301 #define Ndis802_11StatusType_PMKID_CandidateList 2
302
303 typedef struct NDIS_802_11_AUTHENTICATION_ENCRYPTION {
304 NDIS_802_11_AUTHENTICATION_MODE AuthModeSupported;
305 NDIS_802_11_ENCRYPTION_STATUS EncryptStatusSupported;
306 } NDIS_802_11_AUTHENTICATION_ENCRYPTION;
307
308 typedef struct NDIS_802_11_CAPABILITY {
309 ULONG Length;
310 ULONG Version;
311 ULONG NoOfPMKIDs;
312 ULONG NoOfAuthEncryptPairsSupported;
313 NDIS_802_11_AUTHENTICATION_ENCRYPTION
314 AuthenticationEncryptionSupported[1];
315 } NDIS_802_11_CAPABILITY;
316
317 typedef UCHAR NDIS_802_11_PMKID_VALUE[16];
318
319 typedef struct BSSID_INFO {
320 NDIS_802_11_MAC_ADDRESS BSSID;
321 NDIS_802_11_PMKID_VALUE PMKID;
322 } BSSID_INFO;
323
324 typedef struct NDIS_802_11_PMKID {
325 ULONG Length;
326 ULONG BSSIDInfoCount;
327 BSSID_INFO BSSIDInfo[1];
328 } NDIS_802_11_PMKID;
329
330 typedef struct PMKID_CANDIDATE {
331 NDIS_802_11_MAC_ADDRESS BSSID;
332 ULONG Flags;
333 } PMKID_CANDIDATE;
334
335 #define NDIS_802_11_PMKID_CANDIDATE_PREAUTH_ENABLED 0x01
336
337 typedef struct NDIS_802_11_PMKID_CANDIDATE_LIST {
338 ULONG Version;
339 ULONG NumCandidates;
340 PMKID_CANDIDATE CandidateList[1];
341 } NDIS_802_11_PMKID_CANDIDATE_LIST;
342
343 #endif /* OID_802_11_CAPABILITY */
344
345
346 #ifdef CONFIG_USE_NDISUIO
347 #ifndef _WIN32_WCE
348 #ifdef __MINGW32_VERSION
349 typedef ULONG NDIS_OID;
350 #endif /* __MINGW32_VERSION */
351 /* from nuiouser.h */
352 #define FSCTL_NDISUIO_BASE FILE_DEVICE_NETWORK
353
354 #define _NDISUIO_CTL_CODE(_Function, _Method, _Access) \
355 CTL_CODE(FSCTL_NDISUIO_BASE, _Function, _Method, _Access)
356
357 #define IOCTL_NDISUIO_OPEN_DEVICE \
358 _NDISUIO_CTL_CODE(0x200, METHOD_BUFFERED, \
359 FILE_READ_ACCESS | FILE_WRITE_ACCESS)
360
361 #define IOCTL_NDISUIO_QUERY_OID_VALUE \
362 _NDISUIO_CTL_CODE(0x201, METHOD_BUFFERED, \
363 FILE_READ_ACCESS | FILE_WRITE_ACCESS)
364
365 #define IOCTL_NDISUIO_SET_OID_VALUE \
366 _NDISUIO_CTL_CODE(0x205, METHOD_BUFFERED, \
367 FILE_READ_ACCESS | FILE_WRITE_ACCESS)
368
369 #define IOCTL_NDISUIO_SET_ETHER_TYPE \
370 _NDISUIO_CTL_CODE(0x202, METHOD_BUFFERED, \
371 FILE_READ_ACCESS | FILE_WRITE_ACCESS)
372
373 #define IOCTL_NDISUIO_QUERY_BINDING \
374 _NDISUIO_CTL_CODE(0x203, METHOD_BUFFERED, \
375 FILE_READ_ACCESS | FILE_WRITE_ACCESS)
376
377 #define IOCTL_NDISUIO_BIND_WAIT \
378 _NDISUIO_CTL_CODE(0x204, METHOD_BUFFERED, \
379 FILE_READ_ACCESS | FILE_WRITE_ACCESS)
380
381 typedef struct _NDISUIO_QUERY_OID
382 {
383 NDIS_OID Oid;
384 UCHAR Data[sizeof(ULONG)];
385 } NDISUIO_QUERY_OID, *PNDISUIO_QUERY_OID;
386
387 typedef struct _NDISUIO_SET_OID
388 {
389 NDIS_OID Oid;
390 UCHAR Data[sizeof(ULONG)];
391 } NDISUIO_SET_OID, *PNDISUIO_SET_OID;
392
393 typedef struct _NDISUIO_QUERY_BINDING
394 {
395 ULONG BindingIndex;
396 ULONG DeviceNameOffset;
397 ULONG DeviceNameLength;
398 ULONG DeviceDescrOffset;
399 ULONG DeviceDescrLength;
400 } NDISUIO_QUERY_BINDING, *PNDISUIO_QUERY_BINDING;
401 #endif /* _WIN32_WCE */
402 #endif /* CONFIG_USE_NDISUIO */
403
404
405 static int ndis_get_oid(struct wpa_driver_ndis_data *drv, unsigned int oid,
406 char *data, size_t len)
407 {
408 #ifdef CONFIG_USE_NDISUIO
409 NDISUIO_QUERY_OID *o;
410 size_t buflen = sizeof(*o) + len;
411 DWORD written;
412 int ret;
413 size_t hdrlen;
414
415 o = os_zalloc(buflen);
416 if (o == NULL)
417 return -1;
418 o->Oid = oid;
419 #ifdef _WIN32_WCE
420 o->ptcDeviceName = drv->adapter_name;
421 #endif /* _WIN32_WCE */
422 if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_QUERY_OID_VALUE,
423 o, sizeof(NDISUIO_QUERY_OID), o, buflen, &written,
424 NULL)) {
425 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE "
426 "failed (oid=%08x): %d", oid, (int) GetLastError());
427 os_free(o);
428 return -1;
429 }
430 hdrlen = sizeof(NDISUIO_QUERY_OID) - sizeof(o->Data);
431 if (written < hdrlen) {
432 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); "
433 "too short", oid, (unsigned int) written);
434 os_free(o);
435 return -1;
436 }
437 written -= hdrlen;
438 if (written > len) {
439 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > "
440 "len (%d)",oid, (unsigned int) written, len);
441 os_free(o);
442 return -1;
443 }
444 os_memcpy(data, o->Data, written);
445 ret = written;
446 os_free(o);
447 return ret;
448 #else /* CONFIG_USE_NDISUIO */
449 char *buf;
450 PACKET_OID_DATA *o;
451 int ret;
452
453 buf = os_zalloc(sizeof(*o) + len);
454 if (buf == NULL)
455 return -1;
456 o = (PACKET_OID_DATA *) buf;
457 o->Oid = oid;
458 o->Length = len;
459
460 if (!PacketRequest(drv->adapter, FALSE, o)) {
461 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
462 __func__, oid, len);
463 os_free(buf);
464 return -1;
465 }
466 if (o->Length > len) {
467 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)",
468 __func__, oid, (unsigned int) o->Length, len);
469 os_free(buf);
470 return -1;
471 }
472 os_memcpy(data, o->Data, o->Length);
473 ret = o->Length;
474 os_free(buf);
475 return ret;
476 #endif /* CONFIG_USE_NDISUIO */
477 }
478
479
480 static int ndis_set_oid(struct wpa_driver_ndis_data *drv, unsigned int oid,
481 const char *data, size_t len)
482 {
483 #ifdef CONFIG_USE_NDISUIO
484 NDISUIO_SET_OID *o;
485 size_t buflen, reallen;
486 DWORD written;
487 char txt[50];
488
489 os_snprintf(txt, sizeof(txt), "NDIS: Set OID %08x", oid);
490 wpa_hexdump_key(MSG_MSGDUMP, txt, data, len);
491
492 buflen = sizeof(*o) + len;
493 reallen = buflen - sizeof(o->Data);
494 o = os_zalloc(buflen);
495 if (o == NULL)
496 return -1;
497 o->Oid = oid;
498 #ifdef _WIN32_WCE
499 o->ptcDeviceName = drv->adapter_name;
500 #endif /* _WIN32_WCE */
501 if (data)
502 os_memcpy(o->Data, data, len);
503 if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_SET_OID_VALUE,
504 o, reallen, NULL, 0, &written, NULL)) {
505 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE "
506 "(oid=%08x) failed: %d", oid, (int) GetLastError());
507 os_free(o);
508 return -1;
509 }
510 os_free(o);
511 return 0;
512 #else /* CONFIG_USE_NDISUIO */
513 char *buf;
514 PACKET_OID_DATA *o;
515 char txt[50];
516
517 os_snprintf(txt, sizeof(txt), "NDIS: Set OID %08x", oid);
518 wpa_hexdump_key(MSG_MSGDUMP, txt, data, len);
519
520 buf = os_zalloc(sizeof(*o) + len);
521 if (buf == NULL)
522 return -1;
523 o = (PACKET_OID_DATA *) buf;
524 o->Oid = oid;
525 o->Length = len;
526 if (data)
527 os_memcpy(o->Data, data, len);
528
529 if (!PacketRequest(drv->adapter, TRUE, o)) {
530 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
531 __func__, oid, len);
532 os_free(buf);
533 return -1;
534 }
535 os_free(buf);
536 return 0;
537 #endif /* CONFIG_USE_NDISUIO */
538 }
539
540
541 static int ndis_set_auth_mode(struct wpa_driver_ndis_data *drv, int mode)
542 {
543 u32 auth_mode = mode;
544 if (ndis_set_oid(drv, OID_802_11_AUTHENTICATION_MODE,
545 (char *) &auth_mode, sizeof(auth_mode)) < 0) {
546 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
547 "OID_802_11_AUTHENTICATION_MODE (%d)",
548 (int) auth_mode);
549 return -1;
550 }
551 return 0;
552 }
553
554
555 static int ndis_get_auth_mode(struct wpa_driver_ndis_data *drv)
556 {
557 u32 auth_mode;
558 int res;
559 res = ndis_get_oid(drv, OID_802_11_AUTHENTICATION_MODE,
560 (char *) &auth_mode, sizeof(auth_mode));
561 if (res != sizeof(auth_mode)) {
562 wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
563 "OID_802_11_AUTHENTICATION_MODE");
564 return -1;
565 }
566 return auth_mode;
567 }
568
569
570 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr)
571 {
572 u32 encr_status = encr;
573 if (ndis_set_oid(drv, OID_802_11_ENCRYPTION_STATUS,
574 (char *) &encr_status, sizeof(encr_status)) < 0) {
575 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
576 "OID_802_11_ENCRYPTION_STATUS (%d)", encr);
577 return -1;
578 }
579 return 0;
580 }
581
582
583 static int ndis_get_encr_status(struct wpa_driver_ndis_data *drv)
584 {
585 u32 encr;
586 int res;
587 res = ndis_get_oid(drv, OID_802_11_ENCRYPTION_STATUS,
588 (char *) &encr, sizeof(encr));
589 if (res != sizeof(encr)) {
590 wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
591 "OID_802_11_ENCRYPTION_STATUS");
592 return -1;
593 }
594 return encr;
595 }
596
597
598 static int wpa_driver_ndis_get_bssid(void *priv, u8 *bssid)
599 {
600 struct wpa_driver_ndis_data *drv = priv;
601
602 if (drv->wired) {
603 /*
604 * Report PAE group address as the "BSSID" for wired
605 * connection.
606 */
607 bssid[0] = 0x01;
608 bssid[1] = 0x80;
609 bssid[2] = 0xc2;
610 bssid[3] = 0x00;
611 bssid[4] = 0x00;
612 bssid[5] = 0x03;
613 return 0;
614 }
615
616 return ndis_get_oid(drv, OID_802_11_BSSID, bssid, ETH_ALEN) < 0 ?
617 -1 : 0;
618 }
619
620
621 static int wpa_driver_ndis_get_ssid(void *priv, u8 *ssid)
622 {
623 struct wpa_driver_ndis_data *drv = priv;
624 NDIS_802_11_SSID buf;
625 int res;
626
627 res = ndis_get_oid(drv, OID_802_11_SSID, (char *) &buf, sizeof(buf));
628 if (res < 4) {
629 wpa_printf(MSG_DEBUG, "NDIS: Failed to get SSID");
630 if (drv->wired) {
631 wpa_printf(MSG_DEBUG, "NDIS: Allow get_ssid failure "
632 "with a wired interface");
633 return 0;
634 }
635 return -1;
636 }
637 os_memcpy(ssid, buf.Ssid, buf.SsidLength);
638 return buf.SsidLength;
639 }
640
641
642 static int wpa_driver_ndis_set_ssid(struct wpa_driver_ndis_data *drv,
643 const u8 *ssid, size_t ssid_len)
644 {
645 NDIS_802_11_SSID buf;
646
647 os_memset(&buf, 0, sizeof(buf));
648 buf.SsidLength = ssid_len;
649 os_memcpy(buf.Ssid, ssid, ssid_len);
650 /*
651 * Make sure radio is marked enabled here so that scan request will not
652 * force SSID to be changed to a random one in order to enable radio at
653 * that point.
654 */
655 drv->radio_enabled = 1;
656 return ndis_set_oid(drv, OID_802_11_SSID, (char *) &buf, sizeof(buf));
657 }
658
659
660 /* Disconnect using OID_802_11_DISASSOCIATE. This will also turn the radio off.
661 */
662 static int wpa_driver_ndis_radio_off(struct wpa_driver_ndis_data *drv)
663 {
664 drv->radio_enabled = 0;
665 return ndis_set_oid(drv, OID_802_11_DISASSOCIATE, " ", 4);
666 }
667
668
669 /* Disconnect by setting SSID to random (i.e., likely not used). */
670 static int wpa_driver_ndis_disconnect(struct wpa_driver_ndis_data *drv)
671 {
672 char ssid[32];
673 int i;
674 for (i = 0; i < 32; i++)
675 ssid[i] = rand() & 0xff;
676 return wpa_driver_ndis_set_ssid(drv, ssid, 32);
677 }
678
679
680 static int wpa_driver_ndis_deauthenticate(void *priv, const u8 *addr,
681 int reason_code)
682 {
683 struct wpa_driver_ndis_data *drv = priv;
684 return wpa_driver_ndis_disconnect(drv);
685 }
686
687
688 static int wpa_driver_ndis_disassociate(void *priv, const u8 *addr,
689 int reason_code)
690 {
691 struct wpa_driver_ndis_data *drv = priv;
692 return wpa_driver_ndis_disconnect(drv);
693 }
694
695
696 static int wpa_driver_ndis_set_wpa(void *priv, int enabled)
697 {
698 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
699 return 0;
700 }
701
702
703 static void wpa_driver_ndis_scan_timeout(void *eloop_ctx, void *timeout_ctx)
704 {
705 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
706 wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
707 }
708
709
710 static int wpa_driver_ndis_scan(void *priv, const u8 *ssid, size_t ssid_len)
711 {
712 struct wpa_driver_ndis_data *drv = priv;
713 int res;
714
715 if (!drv->radio_enabled) {
716 wpa_printf(MSG_DEBUG, "NDIS: turning radio on before the first"
717 " scan");
718 if (wpa_driver_ndis_disconnect(drv) < 0) {
719 wpa_printf(MSG_DEBUG, "NDIS: failed to enable radio");
720 }
721 drv->radio_enabled = 1;
722 }
723
724 res = ndis_set_oid(drv, OID_802_11_BSSID_LIST_SCAN, " ", 4);
725 eloop_cancel_timeout(wpa_driver_ndis_scan_timeout, drv, drv->ctx);
726 eloop_register_timeout(7, 0, wpa_driver_ndis_scan_timeout, drv,
727 drv->ctx);
728 return res;
729 }
730
731
732 static struct wpa_scan_results * wpa_driver_ndis_get_scan_results(void *priv)
733 {
734 struct wpa_driver_ndis_data *drv = priv;
735 NDIS_802_11_BSSID_LIST_EX *b;
736 size_t blen, count, i;
737 int len;
738 char *pos;
739 struct wpa_scan_results *results;
740 struct wpa_scan_res *r;
741
742 blen = 65535;
743 b = os_zalloc(blen);
744 if (b == NULL)
745 return NULL;
746 len = ndis_get_oid(drv, OID_802_11_BSSID_LIST, (char *) b, blen);
747 if (len < 0) {
748 wpa_printf(MSG_DEBUG, "NDIS: failed to get scan results");
749 os_free(b);
750 return NULL;
751 }
752 count = b->NumberOfItems;
753
754 results = os_zalloc(sizeof(*results));
755 if (results == NULL) {
756 os_free(b);
757 return NULL;
758 }
759 results->res = os_zalloc(count * sizeof(struct wpa_scan_res *));
760 if (results->res == NULL) {
761 os_free(results);
762 os_free(b);
763 return NULL;
764 }
765
766 pos = (char *) &b->Bssid[0];
767 for (i = 0; i < count; i++) {
768 NDIS_WLAN_BSSID_EX *bss = (NDIS_WLAN_BSSID_EX *) pos;
769 NDIS_802_11_FIXED_IEs *fixed;
770
771 if (bss->IELength < sizeof(NDIS_802_11_FIXED_IEs)) {
772 wpa_printf(MSG_DEBUG, "NDIS: too small IELength=%d",
773 (int) bss->IELength);
774 break;
775 }
776 if (((char *) bss->IEs) + bss->IELength > (char *) b + blen) {
777 /*
778 * Some NDIS drivers have been reported to include an
779 * entry with an invalid IELength in scan results and
780 * this has crashed wpa_supplicant, so validate the
781 * returned value before using it.
782 */
783 wpa_printf(MSG_DEBUG, "NDIS: skipped invalid scan "
784 "result IE (BSSID=" MACSTR ") IELength=%d",
785 MAC2STR(bss->MacAddress),
786 (int) bss->IELength);
787 break;
788 }
789
790 r = os_zalloc(sizeof(*r) + bss->IELength -
791 sizeof(NDIS_802_11_FIXED_IEs));
792 if (r == NULL)
793 break;
794
795 os_memcpy(r->bssid, bss->MacAddress, ETH_ALEN);
796 r->level = (int) bss->Rssi;
797 r->freq = bss->Configuration.DSConfig / 1000;
798 fixed = (NDIS_802_11_FIXED_IEs *) bss->IEs;
799 r->beacon_int = WPA_GET_LE16((u8 *) &fixed->BeaconInterval);
800 r->caps = WPA_GET_LE16((u8 *) &fixed->Capabilities);
801 r->tsf = WPA_GET_LE64(fixed->Timestamp);
802 os_memcpy(r + 1, bss->IEs + sizeof(NDIS_802_11_FIXED_IEs),
803 bss->IELength - sizeof(NDIS_802_11_FIXED_IEs));
804 r->ie_len = bss->IELength - sizeof(NDIS_802_11_FIXED_IEs);
805
806 results->res[results->num++] = r;
807
808 pos += bss->Length;
809 if (pos > (char *) b + blen)
810 break;
811 }
812
813 os_free(b);
814
815 return results;
816 }
817
818
819 static int wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv,
820 int key_idx, const u8 *addr,
821 const u8 *bssid, int pairwise)
822 {
823 NDIS_802_11_REMOVE_KEY rkey;
824 NDIS_802_11_KEY_INDEX index;
825 int res, res2;
826
827 os_memset(&rkey, 0, sizeof(rkey));
828
829 rkey.Length = sizeof(rkey);
830 rkey.KeyIndex = key_idx;
831 if (pairwise)
832 rkey.KeyIndex |= 1 << 30;
833 os_memcpy(rkey.BSSID, bssid, ETH_ALEN);
834
835 res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey,
836 sizeof(rkey));
837 if (!pairwise) {
838 index = key_idx;
839 res2 = ndis_set_oid(drv, OID_802_11_REMOVE_WEP,
840 (char *) &index, sizeof(index));
841 } else
842 res2 = 0;
843
844 if (res < 0 && res2 < 0)
845 return -1;
846 return 0;
847 }
848
849
850 static int wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv,
851 int pairwise, int key_idx, int set_tx,
852 const u8 *key, size_t key_len)
853 {
854 NDIS_802_11_WEP *wep;
855 size_t len;
856 int res;
857
858 len = 12 + key_len;
859 wep = os_zalloc(len);
860 if (wep == NULL)
861 return -1;
862 wep->Length = len;
863 wep->KeyIndex = key_idx;
864 if (set_tx)
865 wep->KeyIndex |= 1 << 31;
866 #if 0 /* Setting bit30 does not seem to work with some NDIS drivers */
867 if (pairwise)
868 wep->KeyIndex |= 1 << 30;
869 #endif
870 wep->KeyLength = key_len;
871 os_memcpy(wep->KeyMaterial, key, key_len);
872
873 wpa_hexdump_key(MSG_MSGDUMP, "NDIS: OID_802_11_ADD_WEP",
874 (char *) wep, len);
875 res = ndis_set_oid(drv, OID_802_11_ADD_WEP, (char *) wep, len);
876
877 os_free(wep);
878
879 return res;
880 }
881
882
883 static int wpa_driver_ndis_set_key(void *priv, wpa_alg alg, const u8 *addr,
884 int key_idx, int set_tx,
885 const u8 *seq, size_t seq_len,
886 const u8 *key, size_t key_len)
887 {
888 struct wpa_driver_ndis_data *drv = priv;
889 size_t len, i;
890 NDIS_802_11_KEY *nkey;
891 int res, pairwise;
892 u8 bssid[ETH_ALEN];
893
894 if (addr == NULL || os_memcmp(addr, "\xff\xff\xff\xff\xff\xff",
895 ETH_ALEN) == 0) {
896 /* Group Key */
897 pairwise = 0;
898 if (wpa_driver_ndis_get_bssid(drv, bssid) < 0)
899 os_memset(bssid, 0xff, ETH_ALEN);
900 } else {
901 /* Pairwise Key */
902 pairwise = 1;
903 os_memcpy(bssid, addr, ETH_ALEN);
904 }
905
906 if (alg == WPA_ALG_NONE || key_len == 0) {
907 return wpa_driver_ndis_remove_key(drv, key_idx, addr, bssid,
908 pairwise);
909 }
910
911 if (alg == WPA_ALG_WEP) {
912 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx,
913 key, key_len);
914 }
915
916 len = 12 + 6 + 6 + 8 + key_len;
917
918 nkey = os_zalloc(len);
919 if (nkey == NULL)
920 return -1;
921
922 nkey->Length = len;
923 nkey->KeyIndex = key_idx;
924 if (set_tx)
925 nkey->KeyIndex |= 1 << 31;
926 if (pairwise)
927 nkey->KeyIndex |= 1 << 30;
928 if (seq && seq_len)
929 nkey->KeyIndex |= 1 << 29;
930 nkey->KeyLength = key_len;
931 os_memcpy(nkey->BSSID, bssid, ETH_ALEN);
932 if (seq && seq_len) {
933 for (i = 0; i < seq_len; i++)
934 nkey->KeyRSC |= (ULONGLONG) seq[i] << (i * 8);
935 }
936 if (alg == WPA_ALG_TKIP && key_len == 32) {
937 os_memcpy(nkey->KeyMaterial, key, 16);
938 os_memcpy(nkey->KeyMaterial + 16, key + 24, 8);
939 os_memcpy(nkey->KeyMaterial + 24, key + 16, 8);
940 } else {
941 os_memcpy(nkey->KeyMaterial, key, key_len);
942 }
943
944 wpa_hexdump_key(MSG_MSGDUMP, "NDIS: OID_802_11_ADD_KEY",
945 (char *) nkey, len);
946 res = ndis_set_oid(drv, OID_802_11_ADD_KEY, (char *) nkey, len);
947 os_free(nkey);
948
949 return res;
950 }
951
952
953 static int
954 wpa_driver_ndis_associate(void *priv,
955 struct wpa_driver_associate_params *params)
956 {
957 struct wpa_driver_ndis_data *drv = priv;
958 u32 auth_mode, encr, priv_mode, mode;
959
960 drv->mode = params->mode;
961
962 /* Note: Setting OID_802_11_INFRASTRUCTURE_MODE clears current keys,
963 * so static WEP keys needs to be set again after this. */
964 if (params->mode == IEEE80211_MODE_IBSS) {
965 mode = Ndis802_11IBSS;
966 /* Need to make sure that BSSID polling is enabled for
967 * IBSS mode. */
968 eloop_cancel_timeout(wpa_driver_ndis_poll_timeout, drv, NULL);
969 eloop_register_timeout(1, 0, wpa_driver_ndis_poll_timeout,
970 drv, NULL);
971 } else
972 mode = Ndis802_11Infrastructure;
973 if (ndis_set_oid(drv, OID_802_11_INFRASTRUCTURE_MODE,
974 (char *) &mode, sizeof(mode)) < 0) {
975 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
976 "OID_802_11_INFRASTRUCTURE_MODE (%d)",
977 (int) mode);
978 /* Try to continue anyway */
979 }
980
981 if (params->key_mgmt_suite == KEY_MGMT_NONE ||
982 params->key_mgmt_suite == KEY_MGMT_802_1X_NO_WPA) {
983 /* Re-set WEP keys if static WEP configuration is used. */
984 u8 bcast[ETH_ALEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
985 int i;
986 for (i = 0; i < 4; i++) {
987 if (!params->wep_key[i])
988 continue;
989 wpa_printf(MSG_DEBUG, "NDIS: Re-setting static WEP "
990 "key %d", i);
991 wpa_driver_ndis_set_key(drv, WPA_ALG_WEP, bcast, i,
992 i == params->wep_tx_keyidx,
993 NULL, 0, params->wep_key[i],
994 params->wep_key_len[i]);
995 }
996 }
997
998 if (params->wpa_ie == NULL || params->wpa_ie_len == 0) {
999 if (params->auth_alg & AUTH_ALG_SHARED_KEY) {
1000 if (params->auth_alg & AUTH_ALG_OPEN_SYSTEM)
1001 auth_mode = Ndis802_11AuthModeAutoSwitch;
1002 else
1003 auth_mode = Ndis802_11AuthModeShared;
1004 } else
1005 auth_mode = Ndis802_11AuthModeOpen;
1006 priv_mode = Ndis802_11PrivFilterAcceptAll;
1007 } else if (params->wpa_ie[0] == WLAN_EID_RSN) {
1008 priv_mode = Ndis802_11PrivFilter8021xWEP;
1009 if (params->key_mgmt_suite == KEY_MGMT_PSK)
1010 auth_mode = Ndis802_11AuthModeWPA2PSK;
1011 else
1012 auth_mode = Ndis802_11AuthModeWPA2;
1013 } else {
1014 priv_mode = Ndis802_11PrivFilter8021xWEP;
1015 if (params->key_mgmt_suite == KEY_MGMT_WPA_NONE)
1016 auth_mode = Ndis802_11AuthModeWPANone;
1017 else if (params->key_mgmt_suite == KEY_MGMT_PSK)
1018 auth_mode = Ndis802_11AuthModeWPAPSK;
1019 else
1020 auth_mode = Ndis802_11AuthModeWPA;
1021 }
1022
1023 switch (params->pairwise_suite) {
1024 case CIPHER_CCMP:
1025 encr = Ndis802_11Encryption3Enabled;
1026 break;
1027 case CIPHER_TKIP:
1028 encr = Ndis802_11Encryption2Enabled;
1029 break;
1030 case CIPHER_WEP40:
1031 case CIPHER_WEP104:
1032 encr = Ndis802_11Encryption1Enabled;
1033 break;
1034 case CIPHER_NONE:
1035 if (params->group_suite == CIPHER_CCMP)
1036 encr = Ndis802_11Encryption3Enabled;
1037 else if (params->group_suite == CIPHER_TKIP)
1038 encr = Ndis802_11Encryption2Enabled;
1039 else
1040 encr = Ndis802_11EncryptionDisabled;
1041 break;
1042 default:
1043 encr = Ndis802_11EncryptionDisabled;
1044 };
1045
1046 if (ndis_set_oid(drv, OID_802_11_PRIVACY_FILTER,
1047 (char *) &priv_mode, sizeof(priv_mode)) < 0) {
1048 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
1049 "OID_802_11_PRIVACY_FILTER (%d)",
1050 (int) priv_mode);
1051 /* Try to continue anyway */
1052 }
1053
1054 ndis_set_auth_mode(drv, auth_mode);
1055 ndis_set_encr_status(drv, encr);
1056
1057 if (params->bssid) {
1058 ndis_set_oid(drv, OID_802_11_BSSID, params->bssid, ETH_ALEN);
1059 drv->oid_bssid_set = 1;
1060 } else if (drv->oid_bssid_set) {
1061 ndis_set_oid(drv, OID_802_11_BSSID, "\xff\xff\xff\xff\xff\xff",
1062 ETH_ALEN);
1063 drv->oid_bssid_set = 0;
1064 }
1065
1066 return wpa_driver_ndis_set_ssid(drv, params->ssid, params->ssid_len);
1067 }
1068
1069
1070 static int wpa_driver_ndis_set_pmkid(struct wpa_driver_ndis_data *drv)
1071 {
1072 int len, count, i, ret;
1073 struct ndis_pmkid_entry *entry;
1074 NDIS_802_11_PMKID *p;
1075
1076 count = 0;
1077 entry = drv->pmkid;
1078 while (entry) {
1079 count++;
1080 if (count >= drv->no_of_pmkid)
1081 break;
1082 entry = entry->next;
1083 }
1084 len = 8 + count * sizeof(BSSID_INFO);
1085 p = os_zalloc(len);
1086 if (p == NULL)
1087 return -1;
1088
1089 p->Length = len;
1090 p->BSSIDInfoCount = count;
1091 entry = drv->pmkid;
1092 for (i = 0; i < count; i++) {
1093 os_memcpy(&p->BSSIDInfo[i].BSSID, entry->bssid, ETH_ALEN);
1094 os_memcpy(&p->BSSIDInfo[i].PMKID, entry->pmkid, 16);
1095 entry = entry->next;
1096 }
1097 wpa_hexdump(MSG_MSGDUMP, "NDIS: OID_802_11_PMKID", (char *) p, len);
1098 ret = ndis_set_oid(drv, OID_802_11_PMKID, (char *) p, len);
1099 os_free(p);
1100 return ret;
1101 }
1102
1103
1104 static int wpa_driver_ndis_add_pmkid(void *priv, const u8 *bssid,
1105 const u8 *pmkid)
1106 {
1107 struct wpa_driver_ndis_data *drv = priv;
1108 struct ndis_pmkid_entry *entry, *prev;
1109
1110 if (drv->no_of_pmkid == 0)
1111 return 0;
1112
1113 prev = NULL;
1114 entry = drv->pmkid;
1115 while (entry) {
1116 if (os_memcmp(entry->bssid, bssid, ETH_ALEN) == 0)
1117 break;
1118 prev = entry;
1119 entry = entry->next;
1120 }
1121
1122 if (entry) {
1123 /* Replace existing entry for this BSSID and move it into the
1124 * beginning of the list. */
1125 os_memcpy(entry->pmkid, pmkid, 16);
1126 if (prev) {
1127 prev->next = entry->next;
1128 entry->next = drv->pmkid;
1129 drv->pmkid = entry;
1130 }
1131 } else {
1132 entry = os_malloc(sizeof(*entry));
1133 if (entry) {
1134 os_memcpy(entry->bssid, bssid, ETH_ALEN);
1135 os_memcpy(entry->pmkid, pmkid, 16);
1136 entry->next = drv->pmkid;
1137 drv->pmkid = entry;
1138 }
1139 }
1140
1141 return wpa_driver_ndis_set_pmkid(drv);
1142 }
1143
1144
1145 static int wpa_driver_ndis_remove_pmkid(void *priv, const u8 *bssid,
1146 const u8 *pmkid)
1147 {
1148 struct wpa_driver_ndis_data *drv = priv;
1149 struct ndis_pmkid_entry *entry, *prev;
1150
1151 if (drv->no_of_pmkid == 0)
1152 return 0;
1153
1154 entry = drv->pmkid;
1155 prev = NULL;
1156 while (entry) {
1157 if (os_memcmp(entry->bssid, bssid, ETH_ALEN) == 0 &&
1158 os_memcmp(entry->pmkid, pmkid, 16) == 0) {
1159 if (prev)
1160 prev->next = entry->next;
1161 else
1162 drv->pmkid = entry->next;
1163 os_free(entry);
1164 break;
1165 }
1166 prev = entry;
1167 entry = entry->next;
1168 }
1169 return wpa_driver_ndis_set_pmkid(drv);
1170 }
1171
1172
1173 static int wpa_driver_ndis_flush_pmkid(void *priv)
1174 {
1175 struct wpa_driver_ndis_data *drv = priv;
1176 NDIS_802_11_PMKID p;
1177 struct ndis_pmkid_entry *pmkid, *prev;
1178
1179 if (drv->no_of_pmkid == 0)
1180 return 0;
1181
1182 pmkid = drv->pmkid;
1183 drv->pmkid = NULL;
1184 while (pmkid) {
1185 prev = pmkid;
1186 pmkid = pmkid->next;
1187 os_free(prev);
1188 }
1189
1190 os_memset(&p, 0, sizeof(p));
1191 p.Length = 8;
1192 p.BSSIDInfoCount = 0;
1193 wpa_hexdump(MSG_MSGDUMP, "NDIS: OID_802_11_PMKID (flush)",
1194 (char *) &p, 8);
1195 return ndis_set_oid(drv, OID_802_11_PMKID, (char *) &p, 8);
1196 }
1197
1198
1199 static int wpa_driver_ndis_get_associnfo(struct wpa_driver_ndis_data *drv)
1200 {
1201 char buf[512], *pos;
1202 NDIS_802_11_ASSOCIATION_INFORMATION *ai;
1203 int len;
1204 union wpa_event_data data;
1205 NDIS_802_11_BSSID_LIST_EX *b;
1206 size_t blen, i;
1207
1208 len = ndis_get_oid(drv, OID_802_11_ASSOCIATION_INFORMATION, buf,
1209 sizeof(buf));
1210 if (len < 0) {
1211 wpa_printf(MSG_DEBUG, "NDIS: failed to get association "
1212 "information");
1213 return -1;
1214 }
1215 if (len > sizeof(buf)) {
1216 /* Some drivers seem to be producing incorrect length for this
1217 * data. Limit the length to the current buffer size to avoid
1218 * crashing in hexdump. The data seems to be otherwise valid,
1219 * so better try to use it. */
1220 wpa_printf(MSG_DEBUG, "NDIS: ignored bogus association "
1221 "information length %d", len);
1222 len = ndis_get_oid(drv, OID_802_11_ASSOCIATION_INFORMATION,
1223 buf, sizeof(buf));
1224 if (len < -1) {
1225 wpa_printf(MSG_DEBUG, "NDIS: re-reading association "
1226 "information failed");
1227 return -1;
1228 }
1229 if (len > sizeof(buf)) {
1230 wpa_printf(MSG_DEBUG, "NDIS: ignored bogus association"
1231 " information length %d (re-read)", len);
1232 len = sizeof(buf);
1233 }
1234 }
1235 wpa_hexdump(MSG_MSGDUMP, "NDIS: association information", buf, len);
1236 if (len < sizeof(*ai)) {
1237 wpa_printf(MSG_DEBUG, "NDIS: too short association "
1238 "information");
1239 return -1;
1240 }
1241 ai = (NDIS_802_11_ASSOCIATION_INFORMATION *) buf;
1242 wpa_printf(MSG_DEBUG, "NDIS: ReqFixed=0x%x RespFixed=0x%x off_req=%d "
1243 "off_resp=%d len_req=%d len_resp=%d",
1244 ai->AvailableRequestFixedIEs, ai->AvailableResponseFixedIEs,
1245 (int) ai->OffsetRequestIEs, (int) ai->OffsetResponseIEs,
1246 (int) ai->RequestIELength, (int) ai->ResponseIELength);
1247
1248 if (ai->OffsetRequestIEs + ai->RequestIELength > (unsigned) len ||
1249 ai->OffsetResponseIEs + ai->ResponseIELength > (unsigned) len) {
1250 wpa_printf(MSG_DEBUG, "NDIS: association information - "
1251 "IE overflow");
1252 return -1;
1253 }
1254
1255 wpa_hexdump(MSG_MSGDUMP, "NDIS: Request IEs",
1256 buf + ai->OffsetRequestIEs, ai->RequestIELength);
1257 wpa_hexdump(MSG_MSGDUMP, "NDIS: Response IEs",
1258 buf + ai->OffsetResponseIEs, ai->ResponseIELength);
1259
1260 os_memset(&data, 0, sizeof(data));
1261 data.assoc_info.req_ies = buf + ai->OffsetRequestIEs;
1262 data.assoc_info.req_ies_len = ai->RequestIELength;
1263 data.assoc_info.resp_ies = buf + ai->OffsetResponseIEs;
1264 data.assoc_info.resp_ies_len = ai->ResponseIELength;
1265
1266 blen = 65535;
1267 b = os_zalloc(blen);
1268 if (b == NULL)
1269 goto skip_scan_results;
1270 len = ndis_get_oid(drv, OID_802_11_BSSID_LIST, (char *) b, blen);
1271 if (len < 0) {
1272 wpa_printf(MSG_DEBUG, "NDIS: failed to get scan results");
1273 os_free(b);
1274 b = NULL;
1275 goto skip_scan_results;
1276 }
1277 wpa_printf(MSG_DEBUG, "NDIS: %d BSSID items to process for AssocInfo",
1278 (unsigned int) b->NumberOfItems);
1279
1280 pos = (char *) &b->Bssid[0];
1281 for (i = 0; i < b->NumberOfItems; i++) {
1282 NDIS_WLAN_BSSID_EX *bss = (NDIS_WLAN_BSSID_EX *) pos;
1283 if (os_memcmp(drv->bssid, bss->MacAddress, ETH_ALEN) == 0 &&
1284 bss->IELength > sizeof(NDIS_802_11_FIXED_IEs)) {
1285 data.assoc_info.beacon_ies =
1286 ((u8 *) bss->IEs) +
1287 sizeof(NDIS_802_11_FIXED_IEs);
1288 data.assoc_info.beacon_ies_len =
1289 bss->IELength - sizeof(NDIS_802_11_FIXED_IEs);
1290 wpa_hexdump(MSG_MSGDUMP, "NDIS: Beacon IEs",
1291 data.assoc_info.beacon_ies,
1292 data.assoc_info.beacon_ies_len);
1293 break;
1294 }
1295 pos += bss->Length;
1296 if (pos > (char *) b + blen)
1297 break;
1298 }
1299
1300 skip_scan_results:
1301 wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &data);
1302
1303 os_free(b);
1304
1305 return 0;
1306 }
1307
1308
1309 static void wpa_driver_ndis_poll_timeout(void *eloop_ctx, void *timeout_ctx)
1310 {
1311 struct wpa_driver_ndis_data *drv = eloop_ctx;
1312 u8 bssid[ETH_ALEN];
1313 int poll;
1314
1315 if (drv->wired)
1316 return;
1317
1318 if (wpa_driver_ndis_get_bssid(drv, bssid)) {
1319 /* Disconnected */
1320 if (os_memcmp(drv->bssid, "\x00\x00\x00\x00\x00\x00", ETH_ALEN)
1321 != 0) {
1322 os_memset(drv->bssid, 0, ETH_ALEN);
1323 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1324 }
1325 } else {
1326 /* Connected */
1327 if (os_memcmp(drv->bssid, bssid, ETH_ALEN) != 0) {
1328 os_memcpy(drv->bssid, bssid, ETH_ALEN);
1329 wpa_driver_ndis_get_associnfo(drv);
1330 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
1331 }
1332 }
1333
1334 /* When using integrated NDIS event receiver, we can skip BSSID
1335 * polling when using infrastructure network. However, when using
1336 * IBSS mode, many driver do not seem to generate connection event,
1337 * so we need to enable BSSID polling to figure out when IBSS network
1338 * has been formed.
1339 */
1340 poll = drv->mode == IEEE80211_MODE_IBSS;
1341 #ifndef CONFIG_NDIS_EVENTS_INTEGRATED
1342 #ifndef _WIN32_WCE
1343 poll = 1;
1344 #endif /* _WIN32_WCE */
1345 #endif /* CONFIG_NDIS_EVENTS_INTEGRATED */
1346
1347 if (poll) {
1348 eloop_register_timeout(1, 0, wpa_driver_ndis_poll_timeout,
1349 drv, NULL);
1350 }
1351 }
1352
1353
1354 static void wpa_driver_ndis_poll(void *priv)
1355 {
1356 struct wpa_driver_ndis_data *drv = priv;
1357 eloop_cancel_timeout(wpa_driver_ndis_poll_timeout, drv, NULL);
1358 wpa_driver_ndis_poll_timeout(drv, NULL);
1359 }
1360
1361
1362 /* Called when driver generates Media Connect Event by calling
1363 * NdisMIndicateStatus() with NDIS_STATUS_MEDIA_CONNECT */
1364 void wpa_driver_ndis_event_connect(struct wpa_driver_ndis_data *drv)
1365 {
1366 wpa_printf(MSG_DEBUG, "NDIS: Media Connect Event");
1367 if (wpa_driver_ndis_get_bssid(drv, drv->bssid) == 0) {
1368 wpa_driver_ndis_get_associnfo(drv);
1369 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
1370 }
1371 }
1372
1373
1374 /* Called when driver generates Media Disconnect Event by calling
1375 * NdisMIndicateStatus() with NDIS_STATUS_MEDIA_DISCONNECT */
1376 void wpa_driver_ndis_event_disconnect(struct wpa_driver_ndis_data *drv)
1377 {
1378 wpa_printf(MSG_DEBUG, "NDIS: Media Disconnect Event");
1379 os_memset(drv->bssid, 0, ETH_ALEN);
1380 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
1381 }
1382
1383
1384 static void wpa_driver_ndis_event_auth(struct wpa_driver_ndis_data *drv,
1385 const u8 *data, size_t data_len)
1386 {
1387 NDIS_802_11_AUTHENTICATION_REQUEST *req;
1388 int pairwise = 0, group = 0;
1389 union wpa_event_data event;
1390
1391 if (data_len < sizeof(*req)) {
1392 wpa_printf(MSG_DEBUG, "NDIS: Too short Authentication Request "
1393 "Event (len=%d)", data_len);
1394 return;
1395 }
1396 req = (NDIS_802_11_AUTHENTICATION_REQUEST *) data;
1397
1398 wpa_printf(MSG_DEBUG, "NDIS: Authentication Request Event: "
1399 "Bssid " MACSTR " Flags 0x%x",
1400 MAC2STR(req->Bssid), (int) req->Flags);
1401
1402 if ((req->Flags & NDIS_802_11_AUTH_REQUEST_PAIRWISE_ERROR) ==
1403 NDIS_802_11_AUTH_REQUEST_PAIRWISE_ERROR)
1404 pairwise = 1;
1405 else if ((req->Flags & NDIS_802_11_AUTH_REQUEST_GROUP_ERROR) ==
1406 NDIS_802_11_AUTH_REQUEST_GROUP_ERROR)
1407 group = 1;
1408
1409 if (pairwise || group) {
1410 os_memset(&event, 0, sizeof(event));
1411 event.michael_mic_failure.unicast = pairwise;
1412 wpa_supplicant_event(drv->ctx, EVENT_MICHAEL_MIC_FAILURE,
1413 &event);
1414 }
1415 }
1416
1417
1418 static void wpa_driver_ndis_event_pmkid(struct wpa_driver_ndis_data *drv,
1419 const u8 *data, size_t data_len)
1420 {
1421 NDIS_802_11_PMKID_CANDIDATE_LIST *pmkid;
1422 size_t i;
1423 union wpa_event_data event;
1424
1425 if (data_len < 8) {
1426 wpa_printf(MSG_DEBUG, "NDIS: Too short PMKID Candidate List "
1427 "Event (len=%d)", data_len);
1428 return;
1429 }
1430 pmkid = (NDIS_802_11_PMKID_CANDIDATE_LIST *) data;
1431 wpa_printf(MSG_DEBUG, "NDIS: PMKID Candidate List Event - Version %d "
1432 "NumCandidates %d",
1433 (int) pmkid->Version, (int) pmkid->NumCandidates);
1434
1435 if (pmkid->Version != 1) {
1436 wpa_printf(MSG_DEBUG, "NDIS: Unsupported PMKID Candidate List "
1437 "Version %d", (int) pmkid->Version);
1438 return;
1439 }
1440
1441 if (data_len < 8 + pmkid->NumCandidates * sizeof(PMKID_CANDIDATE)) {
1442 wpa_printf(MSG_DEBUG, "NDIS: PMKID Candidate List underflow");
1443 return;
1444 }
1445
1446 os_memset(&event, 0, sizeof(event));
1447 for (i = 0; i < pmkid->NumCandidates; i++) {
1448 PMKID_CANDIDATE *p = &pmkid->CandidateList[i];
1449 wpa_printf(MSG_DEBUG, "NDIS: %d: " MACSTR " Flags 0x%x",
1450 i, MAC2STR(p->BSSID), (int) p->Flags);
1451 os_memcpy(event.pmkid_candidate.bssid, p->BSSID, ETH_ALEN);
1452 event.pmkid_candidate.index = i;
1453 event.pmkid_candidate.preauth =
1454 p->Flags & NDIS_802_11_PMKID_CANDIDATE_PREAUTH_ENABLED;
1455 wpa_supplicant_event(drv->ctx, EVENT_PMKID_CANDIDATE,
1456 &event);
1457 }
1458 }
1459
1460
1461 /* Called when driver calls NdisMIndicateStatus() with
1462 * NDIS_STATUS_MEDIA_SPECIFIC_INDICATION */
1463 void wpa_driver_ndis_event_media_specific(struct wpa_driver_ndis_data *drv,
1464 const u8 *data, size_t data_len)
1465 {
1466 NDIS_802_11_STATUS_INDICATION *status;
1467
1468 if (data == NULL || data_len < sizeof(*status))
1469 return;
1470
1471 wpa_hexdump(MSG_DEBUG, "NDIS: Media Specific Indication",
1472 data, data_len);
1473
1474 status = (NDIS_802_11_STATUS_INDICATION *) data;
1475 data += sizeof(status);
1476 data_len -= sizeof(status);
1477
1478 switch (status->StatusType) {
1479 case Ndis802_11StatusType_Authentication:
1480 wpa_driver_ndis_event_auth(drv, data, data_len);
1481 break;
1482 case Ndis802_11StatusType_PMKID_CandidateList:
1483 wpa_driver_ndis_event_pmkid(drv, data, data_len);
1484 break;
1485 default:
1486 wpa_printf(MSG_DEBUG, "NDIS: Unknown StatusType %d",
1487 (int) status->StatusType);
1488 break;
1489 }
1490 }
1491
1492
1493 /* Called when an adapter is added */
1494 void wpa_driver_ndis_event_adapter_arrival(struct wpa_driver_ndis_data *drv)
1495 {
1496 union wpa_event_data event;
1497 int i;
1498
1499 wpa_printf(MSG_DEBUG, "NDIS: Notify Adapter Arrival");
1500
1501 for (i = 0; i < 30; i++) {
1502 /* Re-open Packet32/NDISUIO connection */
1503 wpa_driver_ndis_adapter_close(drv);
1504 if (wpa_driver_ndis_adapter_init(drv) < 0 ||
1505 wpa_driver_ndis_adapter_open(drv) < 0) {
1506 wpa_printf(MSG_DEBUG, "NDIS: Driver re-initialization "
1507 "(%d) failed", i);
1508 os_sleep(1, 0);
1509 } else {
1510 wpa_printf(MSG_DEBUG, "NDIS: Driver re-initialized");
1511 break;
1512 }
1513 }
1514
1515 os_memset(&event, 0, sizeof(event));
1516 os_strlcpy(event.interface_status.ifname, drv->ifname,
1517 sizeof(event.interface_status.ifname));
1518 event.interface_status.ievent = EVENT_INTERFACE_ADDED;
1519 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
1520 }
1521
1522
1523 /* Called when an adapter is removed */
1524 void wpa_driver_ndis_event_adapter_removal(struct wpa_driver_ndis_data *drv)
1525 {
1526 union wpa_event_data event;
1527
1528 wpa_printf(MSG_DEBUG, "NDIS: Notify Adapter Removal");
1529 os_memset(&event, 0, sizeof(event));
1530 os_strlcpy(event.interface_status.ifname, drv->ifname,
1531 sizeof(event.interface_status.ifname));
1532 event.interface_status.ievent = EVENT_INTERFACE_REMOVED;
1533 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
1534 }
1535
1536
1537 static void
1538 wpa_driver_ndis_get_wpa_capability(struct wpa_driver_ndis_data *drv)
1539 {
1540 wpa_printf(MSG_DEBUG, "NDIS: verifying driver WPA capability");
1541
1542 if (ndis_set_auth_mode(drv, Ndis802_11AuthModeWPA) == 0 &&
1543 ndis_get_auth_mode(drv) == Ndis802_11AuthModeWPA) {
1544 wpa_printf(MSG_DEBUG, "NDIS: WPA key management supported");
1545 drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA;
1546 }
1547
1548 if (ndis_set_auth_mode(drv, Ndis802_11AuthModeWPAPSK) == 0 &&
1549 ndis_get_auth_mode(drv) == Ndis802_11AuthModeWPAPSK) {
1550 wpa_printf(MSG_DEBUG, "NDIS: WPA-PSK key management "
1551 "supported");
1552 drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK;
1553 }
1554
1555 if (ndis_set_encr_status(drv, Ndis802_11Encryption3Enabled) == 0 &&
1556 ndis_get_encr_status(drv) == Ndis802_11Encryption3KeyAbsent) {
1557 wpa_printf(MSG_DEBUG, "NDIS: CCMP encryption supported");
1558 drv->capa.enc |= WPA_DRIVER_CAPA_ENC_CCMP;
1559 }
1560
1561 if (ndis_set_encr_status(drv, Ndis802_11Encryption2Enabled) == 0 &&
1562 ndis_get_encr_status(drv) == Ndis802_11Encryption2KeyAbsent) {
1563 wpa_printf(MSG_DEBUG, "NDIS: TKIP encryption supported");
1564 drv->capa.enc |= WPA_DRIVER_CAPA_ENC_TKIP;
1565 }
1566
1567 if (ndis_set_encr_status(drv, Ndis802_11Encryption1Enabled) == 0 &&
1568 ndis_get_encr_status(drv) == Ndis802_11Encryption1KeyAbsent) {
1569 wpa_printf(MSG_DEBUG, "NDIS: WEP encryption supported");
1570 drv->capa.enc |= WPA_DRIVER_CAPA_ENC_WEP40 |
1571 WPA_DRIVER_CAPA_ENC_WEP104;
1572 }
1573
1574 if (ndis_set_auth_mode(drv, Ndis802_11AuthModeShared) == 0 &&
1575 ndis_get_auth_mode(drv) == Ndis802_11AuthModeShared) {
1576 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
1577 }
1578
1579 if (ndis_set_auth_mode(drv, Ndis802_11AuthModeOpen) == 0 &&
1580 ndis_get_auth_mode(drv) == Ndis802_11AuthModeOpen) {
1581 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
1582 }
1583
1584 ndis_set_encr_status(drv, Ndis802_11EncryptionDisabled);
1585
1586 /* Could also verify OID_802_11_ADD_KEY error reporting and
1587 * support for OID_802_11_ASSOCIATION_INFORMATION. */
1588
1589 if (drv->capa.key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_WPA &&
1590 drv->capa.enc & (WPA_DRIVER_CAPA_ENC_TKIP |
1591 WPA_DRIVER_CAPA_ENC_CCMP)) {
1592 wpa_printf(MSG_DEBUG, "NDIS: driver supports WPA");
1593 drv->has_capability = 1;
1594 } else {
1595 wpa_printf(MSG_DEBUG, "NDIS: no WPA support found");
1596 }
1597
1598 wpa_printf(MSG_DEBUG, "NDIS: driver capabilities: key_mgmt 0x%x "
1599 "enc 0x%x auth 0x%x",
1600 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
1601 }
1602
1603
1604 static void wpa_driver_ndis_get_capability(struct wpa_driver_ndis_data *drv)
1605 {
1606 char buf[512];
1607 int len;
1608 size_t i;
1609 NDIS_802_11_CAPABILITY *c;
1610
1611 drv->capa.flags = WPA_DRIVER_FLAGS_DRIVER_IE;
1612
1613 len = ndis_get_oid(drv, OID_802_11_CAPABILITY, buf, sizeof(buf));
1614 if (len < 0) {
1615 wpa_driver_ndis_get_wpa_capability(drv);
1616 return;
1617 }
1618
1619 wpa_hexdump(MSG_MSGDUMP, "OID_802_11_CAPABILITY", buf, len);
1620 c = (NDIS_802_11_CAPABILITY *) buf;
1621 if (len < sizeof(*c) || c->Version != 2) {
1622 wpa_printf(MSG_DEBUG, "NDIS: unsupported "
1623 "OID_802_11_CAPABILITY data");
1624 return;
1625 }
1626 wpa_printf(MSG_DEBUG, "NDIS: Driver supports OID_802_11_CAPABILITY - "
1627 "NoOfPMKIDs %d NoOfAuthEncrPairs %d",
1628 (int) c->NoOfPMKIDs,
1629 (int) c->NoOfAuthEncryptPairsSupported);
1630 drv->has_capability = 1;
1631 drv->no_of_pmkid = c->NoOfPMKIDs;
1632 for (i = 0; i < c->NoOfAuthEncryptPairsSupported; i++) {
1633 NDIS_802_11_AUTHENTICATION_ENCRYPTION *ae;
1634 ae = &c->AuthenticationEncryptionSupported[i];
1635 if ((char *) (ae + 1) > buf + len) {
1636 wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list "
1637 "overflow");
1638 break;
1639 }
1640 wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d",
1641 i, (int) ae->AuthModeSupported,
1642 (int) ae->EncryptStatusSupported);
1643 switch (ae->AuthModeSupported) {
1644 case Ndis802_11AuthModeOpen:
1645 drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
1646 break;
1647 case Ndis802_11AuthModeShared:
1648 drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
1649 break;
1650 case Ndis802_11AuthModeWPA:
1651 drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA;
1652 break;
1653 case Ndis802_11AuthModeWPAPSK:
1654 drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK;
1655 break;
1656 case Ndis802_11AuthModeWPA2:
1657 drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA2;
1658 break;
1659 case Ndis802_11AuthModeWPA2PSK:
1660 drv->capa.key_mgmt |=
1661 WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK;
1662 break;
1663 case Ndis802_11AuthModeWPANone:
1664 drv->capa.key_mgmt |=
1665 WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE;
1666 break;
1667 default:
1668 break;
1669 }
1670 switch (ae->EncryptStatusSupported) {
1671 case Ndis802_11Encryption1Enabled:
1672 drv->capa.enc |= WPA_DRIVER_CAPA_ENC_WEP40;
1673 drv->capa.enc |= WPA_DRIVER_CAPA_ENC_WEP104;
1674 break;
1675 case Ndis802_11Encryption2Enabled:
1676 drv->capa.enc |= WPA_DRIVER_CAPA_ENC_TKIP;
1677 break;
1678 case Ndis802_11Encryption3Enabled:
1679 drv->capa.enc |= WPA_DRIVER_CAPA_ENC_CCMP;
1680 break;
1681 default:
1682 break;
1683 }
1684 }
1685
1686 wpa_printf(MSG_DEBUG, "NDIS: driver capabilities: key_mgmt 0x%x "
1687 "enc 0x%x auth 0x%x",
1688 drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
1689 }
1690
1691
1692 static int wpa_driver_ndis_get_capa(void *priv, struct wpa_driver_capa *capa)
1693 {
1694 struct wpa_driver_ndis_data *drv = priv;
1695 if (!drv->has_capability)
1696 return -1;
1697 os_memcpy(capa, &drv->capa, sizeof(*capa));
1698 return 0;
1699 }
1700
1701
1702 static const char * wpa_driver_ndis_get_ifname(void *priv)
1703 {
1704 struct wpa_driver_ndis_data *drv = priv;
1705 return drv->ifname;
1706 }
1707
1708
1709 static const u8 * wpa_driver_ndis_get_mac_addr(void *priv)
1710 {
1711 struct wpa_driver_ndis_data *drv = priv;
1712 return drv->own_addr;
1713 }
1714
1715
1716 #ifdef _WIN32_WCE
1717
1718 #define NDISUIO_MSG_SIZE (sizeof(NDISUIO_DEVICE_NOTIFICATION) + 512)
1719
1720 static void ndisuio_notification_receive(void *eloop_data, void *user_ctx)
1721 {
1722 struct wpa_driver_ndis_data *drv = eloop_data;
1723 NDISUIO_DEVICE_NOTIFICATION *hdr;
1724 u8 buf[NDISUIO_MSG_SIZE];
1725 DWORD len, flags;
1726
1727 if (!ReadMsgQueue(drv->event_queue, buf, NDISUIO_MSG_SIZE, &len, 0,
1728 &flags)) {
1729 wpa_printf(MSG_DEBUG, "ndisuio_notification_receive: "
1730 "ReadMsgQueue failed: %d", (int) GetLastError());
1731 return;
1732 }
1733
1734 if (len < sizeof(NDISUIO_DEVICE_NOTIFICATION)) {
1735 wpa_printf(MSG_DEBUG, "ndisuio_notification_receive: "
1736 "Too short message (len=%d)", (int) len);
1737 return;
1738 }
1739
1740 hdr = (NDISUIO_DEVICE_NOTIFICATION *) buf;
1741 wpa_printf(MSG_DEBUG, "NDIS: Notification received: len=%d type=0x%x",
1742 (int) len, hdr->dwNotificationType);
1743
1744 switch (hdr->dwNotificationType) {
1745 #ifdef NDISUIO_NOTIFICATION_ADAPTER_ARRIVAL
1746 case NDISUIO_NOTIFICATION_ADAPTER_ARRIVAL:
1747 wpa_printf(MSG_DEBUG, "NDIS: ADAPTER_ARRIVAL");
1748 wpa_driver_ndis_event_adapter_arrival(drv);
1749 break;
1750 #endif
1751 #ifdef NDISUIO_NOTIFICATION_ADAPTER_REMOVAL
1752 case NDISUIO_NOTIFICATION_ADAPTER_REMOVAL:
1753 wpa_printf(MSG_DEBUG, "NDIS: ADAPTER_REMOVAL");
1754 wpa_driver_ndis_event_adapter_removal(drv);
1755 break;
1756 #endif
1757 case NDISUIO_NOTIFICATION_MEDIA_CONNECT:
1758 wpa_printf(MSG_DEBUG, "NDIS: MEDIA_CONNECT");
1759 SetEvent(drv->connected_event);
1760 wpa_driver_ndis_event_connect(drv);
1761 break;
1762 case NDISUIO_NOTIFICATION_MEDIA_DISCONNECT:
1763 ResetEvent(drv->connected_event);
1764 wpa_printf(MSG_DEBUG, "NDIS: MEDIA_DISCONNECT");
1765 wpa_driver_ndis_event_disconnect(drv);
1766 break;
1767 case NDISUIO_NOTIFICATION_MEDIA_SPECIFIC_NOTIFICATION:
1768 wpa_printf(MSG_DEBUG, "NDIS: MEDIA_SPECIFIC_NOTIFICATION");
1769 #if _WIN32_WCE == 420 || _WIN32_WCE == 0x420
1770 wpa_driver_ndis_event_media_specific(
1771 drv, hdr->pvStatusBuffer, hdr->uiStatusBufferSize);
1772 #else
1773 wpa_driver_ndis_event_media_specific(
1774 drv, ((const u8 *) hdr) + hdr->uiOffsetToStatusBuffer,
1775 (size_t) hdr->uiStatusBufferSize);
1776 #endif
1777 break;
1778 default:
1779 wpa_printf(MSG_DEBUG, "NDIS: Unknown notification type 0x%x",
1780 hdr->dwNotificationType);
1781 break;
1782 }
1783 }
1784
1785
1786 static void ndisuio_notification_deinit(struct wpa_driver_ndis_data *drv)
1787 {
1788 NDISUIO_REQUEST_NOTIFICATION req;
1789
1790 memset(&req, 0, sizeof(req));
1791 req.hMsgQueue = drv->event_queue;
1792 req.dwNotificationTypes = 0;
1793
1794 if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_REQUEST_NOTIFICATION,
1795 &req, sizeof(req), NULL, 0, NULL, NULL)) {
1796 wpa_printf(MSG_INFO, "ndisuio_notification_deinit: "
1797 "IOCTL_NDISUIO_REQUEST_NOTIFICATION failed: %d",
1798 (int) GetLastError());
1799 }
1800
1801 if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_CANCEL_NOTIFICATION,
1802 NULL, 0, NULL, 0, NULL, NULL)) {
1803 wpa_printf(MSG_INFO, "ndisuio_notification_deinit: "
1804 "IOCTL_NDISUIO_CANCEL_NOTIFICATION failed: %d",
1805 (int) GetLastError());
1806 }
1807
1808 if (drv->event_queue) {
1809 eloop_unregister_event(drv->event_queue,
1810 sizeof(drv->event_queue));
1811 CloseHandle(drv->event_queue);
1812 drv->event_queue = NULL;
1813 }
1814
1815 if (drv->connected_event) {
1816 CloseHandle(drv->connected_event);
1817 drv->connected_event = NULL;
1818 }
1819 }
1820
1821
1822 static int ndisuio_notification_init(struct wpa_driver_ndis_data *drv)
1823 {
1824 MSGQUEUEOPTIONS opt;
1825 NDISUIO_REQUEST_NOTIFICATION req;
1826
1827 drv->connected_event =
1828 CreateEvent(NULL, TRUE, FALSE, TEXT("WpaSupplicantConnected"));
1829 if (drv->connected_event == NULL) {
1830 wpa_printf(MSG_INFO, "ndisuio_notification_init: "
1831 "CreateEvent failed: %d",
1832 (int) GetLastError());
1833 return -1;
1834 }
1835
1836 memset(&opt, 0, sizeof(opt));
1837 opt.dwSize = sizeof(opt);
1838 opt.dwMaxMessages = 5;
1839 opt.cbMaxMessage = NDISUIO_MSG_SIZE;
1840 opt.bReadAccess = TRUE;
1841
1842 drv->event_queue = CreateMsgQueue(NULL, &opt);
1843 if (drv->event_queue == NULL) {
1844 wpa_printf(MSG_INFO, "ndisuio_notification_init: "
1845 "CreateMsgQueue failed: %d",
1846 (int) GetLastError());
1847 ndisuio_notification_deinit(drv);
1848 return -1;
1849 }
1850
1851 memset(&req, 0, sizeof(req));
1852 req.hMsgQueue = drv->event_queue;
1853 req.dwNotificationTypes =
1854 #ifdef NDISUIO_NOTIFICATION_ADAPTER_ARRIVAL
1855 NDISUIO_NOTIFICATION_ADAPTER_ARRIVAL |
1856 #endif
1857 #ifdef NDISUIO_NOTIFICATION_ADAPTER_REMOVAL
1858 NDISUIO_NOTIFICATION_ADAPTER_REMOVAL |
1859 #endif
1860 NDISUIO_NOTIFICATION_MEDIA_CONNECT |
1861 NDISUIO_NOTIFICATION_MEDIA_DISCONNECT |
1862 NDISUIO_NOTIFICATION_MEDIA_SPECIFIC_NOTIFICATION;
1863
1864 if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_REQUEST_NOTIFICATION,
1865 &req, sizeof(req), NULL, 0, NULL, NULL)) {
1866 wpa_printf(MSG_INFO, "ndisuio_notification_init: "
1867 "IOCTL_NDISUIO_REQUEST_NOTIFICATION failed: %d",
1868 (int) GetLastError());
1869 ndisuio_notification_deinit(drv);
1870 return -1;
1871 }
1872
1873 eloop_register_event(drv->event_queue, sizeof(drv->event_queue),
1874 ndisuio_notification_receive, drv, NULL);
1875
1876 return 0;
1877 }
1878 #endif /* _WIN32_WCE */
1879
1880
1881 static int wpa_driver_ndis_get_names(struct wpa_driver_ndis_data *drv)
1882 {
1883 #ifdef CONFIG_USE_NDISUIO
1884 NDISUIO_QUERY_BINDING *b;
1885 size_t blen = sizeof(*b) + 1024;
1886 int i, error, found = 0;
1887 DWORD written;
1888 char name[256], desc[256], *dpos;
1889 WCHAR *pos;
1890 size_t j, len, dlen;
1891
1892 b = os_malloc(blen);
1893 if (b == NULL)
1894 return -1;
1895
1896 for (i = 0; ; i++) {
1897 os_memset(b, 0, blen);
1898 b->BindingIndex = i;
1899 if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_QUERY_BINDING,
1900 b, sizeof(NDISUIO_QUERY_BINDING), b, blen,
1901 &written, NULL)) {
1902 error = (int) GetLastError();
1903 if (error == ERROR_NO_MORE_ITEMS)
1904 break;
1905 wpa_printf(MSG_DEBUG, "IOCTL_NDISUIO_QUERY_BINDING "
1906 "failed: %d", error);
1907 break;
1908 }
1909
1910 pos = (WCHAR *) ((char *) b + b->DeviceNameOffset);
1911 len = b->DeviceNameLength;
1912 if (len >= sizeof(name))
1913 len = sizeof(name) - 1;
1914 for (j = 0; j < len; j++)
1915 name[j] = (char) pos[j];
1916 name[len] = '\0';
1917
1918 pos = (WCHAR *) ((char *) b + b->DeviceDescrOffset);
1919 len = b->DeviceDescrLength;
1920 if (len >= sizeof(desc))
1921 len = sizeof(desc) - 1;
1922 for (j = 0; j < len; j++)
1923 desc[j] = (char) pos[j];
1924 desc[len] = '\0';
1925
1926 wpa_printf(MSG_DEBUG, "NDIS: %d - %s - %s", i, name, desc);
1927
1928 if (os_strstr(name, drv->ifname)) {
1929 wpa_printf(MSG_DEBUG, "NDIS: Interface name match");
1930 found = 1;
1931 break;
1932 }
1933
1934 if (os_strncmp(desc, drv->ifname, os_strlen(drv->ifname)) == 0)
1935 {
1936 wpa_printf(MSG_DEBUG, "NDIS: Interface description "
1937 "match");
1938 found = 1;
1939 break;
1940 }
1941 }
1942
1943 if (!found) {
1944 wpa_printf(MSG_DEBUG, "NDIS: Could not find interface '%s'",
1945 drv->ifname);
1946 os_free(b);
1947 return -1;
1948 }
1949
1950 os_strlcpy(drv->ifname,
1951 os_strncmp(name, "\\DEVICE\\", 8) == 0 ? name + 8 : name,
1952 sizeof(drv->ifname));
1953 #ifdef _WIN32_WCE
1954 drv->adapter_name = wpa_strdup_tchar(drv->ifname);
1955 if (drv->adapter_name == NULL) {
1956 wpa_printf(MSG_ERROR, "NDIS: Failed to allocate memory for "
1957 "adapter name");
1958 os_free(b);
1959 return -1;
1960 }
1961 #endif /* _WIN32_WCE */
1962
1963 dpos = os_strstr(desc, " - ");
1964 if (dpos)
1965 dlen = dpos - desc;
1966 else
1967 dlen = os_strlen(desc);
1968 drv->adapter_desc = os_malloc(dlen + 1);
1969 if (drv->adapter_desc) {
1970 os_memcpy(drv->adapter_desc, desc, dlen);
1971 drv->adapter_desc[dlen] = '\0';
1972 }
1973
1974 os_free(b);
1975
1976 if (drv->adapter_desc == NULL)
1977 return -1;
1978
1979 wpa_printf(MSG_DEBUG, "NDIS: Adapter description prefix '%s'",
1980 drv->adapter_desc);
1981
1982 return 0;
1983 #else /* CONFIG_USE_NDISUIO */
1984 PTSTR _names;
1985 char *names, *pos, *pos2;
1986 ULONG len;
1987 BOOLEAN res;
1988 #define MAX_ADAPTERS 32
1989 char *name[MAX_ADAPTERS];
1990 char *desc[MAX_ADAPTERS];
1991 int num_name, num_desc, i, found_name, found_desc;
1992 size_t dlen;
1993
1994 wpa_printf(MSG_DEBUG, "NDIS: Packet.dll version: %s",
1995 PacketGetVersion());
1996
1997 len = 8192;
1998 _names = os_zalloc(len);
1999 if (_names == NULL)
2000 return -1;
2001
2002 res = PacketGetAdapterNames(_names, &len);
2003 if (!res && len > 8192) {
2004 os_free(_names);
2005 _names = os_zalloc(len);
2006 if (_names == NULL)
2007 return -1;
2008 res = PacketGetAdapterNames(_names, &len);
2009 }
2010
2011 if (!res) {
2012 wpa_printf(MSG_ERROR, "NDIS: Failed to get adapter list "
2013 "(PacketGetAdapterNames)");
2014 os_free(_names);
2015 return -1;
2016 }
2017
2018 names = (char *) _names;
2019 if (names[0] && names[1] == '\0' && names[2] && names[3] == '\0') {
2020 wpa_printf(MSG_DEBUG, "NDIS: Looks like adapter names are in "
2021 "UNICODE");
2022 /* Convert to ASCII */
2023 pos2 = pos = names;
2024 while (pos2 < names + len) {
2025 if (pos2[0] == '\0' && pos2[1] == '\0' &&
2026 pos2[2] == '\0' && pos2[3] == '\0') {
2027 pos2 += 4;
2028 break;
2029 }
2030 *pos++ = pos2[0];
2031 pos2 += 2;
2032 }
2033 os_memcpy(pos + 2, names, pos - names);
2034 pos += 2;
2035 } else
2036 pos = names;
2037
2038 num_name = 0;
2039 while (pos < names + len) {
2040 name[num_name] = pos;
2041 while (*pos && pos < names + len)
2042 pos++;
2043 if (pos + 1 >= names + len) {
2044 os_free(names);
2045 return -1;
2046 }
2047 pos++;
2048 num_name++;
2049 if (num_name >= MAX_ADAPTERS) {
2050 wpa_printf(MSG_DEBUG, "NDIS: Too many adapters");
2051 os_free(names);
2052 return -1;
2053 }
2054 if (*pos == '\0') {
2055 wpa_printf(MSG_DEBUG, "NDIS: %d adapter names found",
2056 num_name);
2057 pos++;
2058 break;
2059 }
2060 }
2061
2062 num_desc = 0;
2063 while (pos < names + len) {
2064 desc[num_desc] = pos;
2065 while (*pos && pos < names + len)
2066 pos++;
2067 if (pos + 1 >= names + len) {
2068 os_free(names);
2069 return -1;
2070 }
2071 pos++;
2072 num_desc++;
2073 if (num_desc >= MAX_ADAPTERS) {
2074 wpa_printf(MSG_DEBUG, "NDIS: Too many adapter "
2075 "descriptions");
2076 os_free(names);
2077 return -1;
2078 }
2079 if (*pos == '\0') {
2080 wpa_printf(MSG_DEBUG, "NDIS: %d adapter descriptions "
2081 "found", num_name);
2082 pos++;
2083 break;
2084 }
2085 }
2086
2087 /*
2088 * Windows 98 with Packet.dll 3.0 alpha3 does not include adapter
2089 * descriptions. Fill in dummy descriptors to work around this.
2090 */
2091 while (num_desc < num_name)
2092 desc[num_desc++] = "dummy description";
2093
2094 if (num_name != num_desc) {
2095 wpa_printf(MSG_DEBUG, "NDIS: mismatch in adapter name and "
2096 "description counts (%d != %d)",
2097 num_name, num_desc);
2098 os_free(names);
2099 return -1;
2100 }
2101
2102 found_name = found_desc = -1;
2103 for (i = 0; i < num_name; i++) {
2104 wpa_printf(MSG_DEBUG, "NDIS: %d - %s - %s",
2105 i, name[i], desc[i]);
2106 if (found_name == -1 && os_strstr(name[i], drv->ifname))
2107 found_name = i;
2108 if (found_desc == -1 &&
2109 os_strncmp(desc[i], drv->ifname, os_strlen(drv->ifname)) ==
2110 0)
2111 found_desc = i;
2112 }
2113
2114 if (found_name < 0 && found_desc >= 0) {
2115 wpa_printf(MSG_DEBUG, "NDIS: Matched interface '%s' based on "
2116 "description '%s'",
2117 name[found_desc], desc[found_desc]);
2118 found_name = found_desc;
2119 os_strlcpy(drv->ifname,
2120 os_strncmp(name[found_desc], "\\Device\\NPF_", 12)
2121 == 0 ? name[found_desc] + 12 : name[found_desc],
2122 sizeof(drv->ifname));
2123 }
2124
2125 if (found_name < 0) {
2126 wpa_printf(MSG_DEBUG, "NDIS: Could not find interface '%s'",
2127 drv->ifname);
2128 os_free(names);
2129 return -1;
2130 }
2131
2132 i = found_name;
2133 pos = os_strrchr(desc[i], '(');
2134 if (pos) {
2135 dlen = pos - desc[i];
2136 pos--;
2137 if (pos > desc[i] && *pos == ' ')
2138 dlen--;
2139 } else {
2140 dlen = os_strlen(desc[i]);
2141 }
2142 drv->adapter_desc = os_malloc(dlen + 1);
2143 if (drv->adapter_desc) {
2144 os_memcpy(drv->adapter_desc, desc[i], dlen);
2145 drv->adapter_desc[dlen] = '\0';
2146 }
2147
2148 os_free(names);
2149
2150 if (drv->adapter_desc == NULL)
2151 return -1;
2152
2153 wpa_printf(MSG_DEBUG, "NDIS: Adapter description prefix '%s'",
2154 drv->adapter_desc);
2155
2156 return 0;
2157 #endif /* CONFIG_USE_NDISUIO */
2158 }
2159
2160
2161 #if defined(CONFIG_NATIVE_WINDOWS) || defined(__CYGWIN__)
2162 #ifndef _WIN32_WCE
2163 /*
2164 * These structures are undocumented for WinXP; only WinCE version is
2165 * documented. These would be included wzcsapi.h if it were available. Some
2166 * changes here have been needed to make the structures match with WinXP SP2.
2167 * It is unclear whether these work with any other version.
2168 */
2169
2170 typedef struct {
2171 LPWSTR wszGuid;
2172 } INTF_KEY_ENTRY, *PINTF_KEY_ENTRY;
2173
2174 typedef struct {
2175 DWORD dwNumIntfs;
2176 PINTF_KEY_ENTRY pIntfs;
2177 } INTFS_KEY_TABLE, *PINTFS_KEY_TABLE;
2178
2179 typedef struct {
2180 DWORD dwDataLen;
2181 LPBYTE pData;
2182 } RAW_DATA, *PRAW_DATA;
2183
2184 typedef struct {
2185 LPWSTR wszGuid;
2186 LPWSTR wszDescr;
2187 ULONG ulMediaState;
2188 ULONG ulMediaType;
2189 ULONG ulPhysicalMediaType;
2190 INT nInfraMode;
2191 INT nAuthMode;
2192 INT nWepStatus;
2193 #ifndef _WIN32_WCE
2194 u8 pad[2]; /* why is this needed? */
2195 #endif /* _WIN32_WCE */
2196 DWORD dwCtlFlags;
2197 DWORD dwCapabilities; /* something added for WinXP SP2(?) */
2198 RAW_DATA rdSSID;
2199 RAW_DATA rdBSSID;
2200 RAW_DATA rdBSSIDList;
2201 RAW_DATA rdStSSIDList;
2202 RAW_DATA rdCtrlData;
2203 #ifdef UNDER_CE
2204 BOOL bInitialized;
2205 #endif
2206 DWORD nWPAMCastCipher;
2207 /* add some extra buffer for later additions since this interface is
2208 * far from stable */
2209 u8 later_additions[100];
2210 } INTF_ENTRY, *PINTF_ENTRY;
2211
2212 #define INTF_ALL 0xffffffff
2213 #define INTF_ALL_FLAGS 0x0000ffff
2214 #define INTF_CTLFLAGS 0x00000010
2215 #define INTFCTL_ENABLED 0x8000
2216 #endif /* _WIN32_WCE */
2217
2218
2219 #ifdef _WIN32_WCE
2220 static int wpa_driver_ndis_rebind_adapter(struct wpa_driver_ndis_data *drv)
2221 {
2222 HANDLE ndis;
2223 TCHAR multi[100];
2224 int len;
2225
2226 len = _tcslen(drv->adapter_name);
2227 if (len > 80)
2228 return -1;
2229
2230 ndis = CreateFile(DD_NDIS_DEVICE_NAME, GENERIC_READ | GENERIC_WRITE,
2231 0, NULL, OPEN_EXISTING, 0, NULL);
2232 if (ndis == INVALID_HANDLE_VALUE) {
2233 wpa_printf(MSG_DEBUG, "NDIS: Failed to open file to NDIS "
2234 "device: %d", (int) GetLastError());
2235 return -1;
2236 }
2237
2238 len++;
2239 memcpy(multi, drv->adapter_name, len * sizeof(TCHAR));
2240 memcpy(&multi[len], TEXT("NDISUIO\0"), 9 * sizeof(TCHAR));
2241 len += 9;
2242
2243 if (!DeviceIoControl(ndis, IOCTL_NDIS_REBIND_ADAPTER,
2244 multi, len * sizeof(TCHAR), NULL, 0, NULL, NULL))
2245 {
2246 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDIS_REBIND_ADAPTER "
2247 "failed: 0x%x", (int) GetLastError());
2248 wpa_hexdump_ascii(MSG_DEBUG, "NDIS: rebind multi_sz",
2249 (u8 *) multi, len * sizeof(TCHAR));
2250 CloseHandle(ndis);
2251 return -1;
2252 }
2253
2254 CloseHandle(ndis);
2255
2256 wpa_printf(MSG_DEBUG, "NDIS: Requested NDIS rebind of NDISUIO "
2257 "protocol");
2258
2259 return 0;
2260 }
2261 #endif /* _WIN32_WCE */
2262
2263
2264 static int wpa_driver_ndis_set_wzc(struct wpa_driver_ndis_data *drv,
2265 int enable)
2266 {
2267 #ifdef _WIN32_WCE
2268 HKEY hk, hk2;
2269 LONG ret;
2270 DWORD i, hnd, len;
2271 TCHAR keyname[256], devname[256];
2272
2273 #define WZC_DRIVER TEXT("Drivers\\BuiltIn\\ZeroConfig")
2274
2275 if (enable) {
2276 HANDLE h;
2277 h = ActivateDeviceEx(WZC_DRIVER, NULL, 0, NULL);
2278 if (h == INVALID_HANDLE_VALUE || h == 0) {
2279 wpa_printf(MSG_DEBUG, "NDIS: Failed to re-enable WZC "
2280 "- ActivateDeviceEx failed: %d",
2281 (int) GetLastError());
2282 return -1;
2283 }
2284
2285 wpa_printf(MSG_DEBUG, "NDIS: WZC re-enabled");
2286 return wpa_driver_ndis_rebind_adapter(drv);
2287 }
2288
2289 /*
2290 * Unfortunately, just disabling the WZC for an interface is not enough
2291 * to free NDISUIO for us, so need to disable and unload WZC completely
2292 * for now when using WinCE with NDISUIO. In addition, must request
2293 * NDISUIO protocol to be rebound to the adapter in order to free the
2294 * NDISUIO binding that WZC hold before us.
2295 */
2296
2297 /* Enumerate HKLM\Drivers\Active\* to find a handle to WZC. */
2298 ret = RegOpenKeyEx(HKEY_LOCAL_MACHINE, DEVLOAD_ACTIVE_KEY, 0, 0, &hk);
2299 if (ret != ERROR_SUCCESS) {
2300 wpa_printf(MSG_DEBUG, "NDIS: RegOpenKeyEx(DEVLOAD_ACTIVE_KEY) "
2301 "failed: %d %d", (int) ret, (int) GetLastError());
2302 return -1;
2303 }
2304
2305 for (i = 0; ; i++) {
2306 len = sizeof(keyname);
2307 ret = RegEnumKeyEx(hk, i, keyname, &len, NULL, NULL, NULL,
2308 NULL);
2309 if (ret != ERROR_SUCCESS) {
2310 wpa_printf(MSG_DEBUG, "NDIS: Could not find active "
2311 "WZC - assuming it is not running.");
2312 RegCloseKey(hk);
2313 return -1;
2314 }
2315
2316 ret = RegOpenKeyEx(hk, keyname, 0, 0, &hk2);
2317 if (ret != ERROR_SUCCESS) {
2318 wpa_printf(MSG_DEBUG, "NDIS: RegOpenKeyEx(active dev) "
2319 "failed: %d %d",
2320 (int) ret, (int) GetLastError());
2321 continue;
2322 }
2323
2324 len = sizeof(devname);
2325 ret = RegQueryValueEx(hk2, DEVLOAD_DEVKEY_VALNAME, NULL, NULL,
2326 (LPBYTE) devname, &len);
2327 if (ret != ERROR_SUCCESS) {
2328 wpa_printf(MSG_DEBUG, "NDIS: RegQueryValueEx("
2329 "DEVKEY_VALNAME) failed: %d %d",
2330 (int) ret, (int) GetLastError());
2331 RegCloseKey(hk2);
2332 continue;
2333 }
2334
2335 if (_tcscmp(devname, WZC_DRIVER) == 0)
2336 break;
2337
2338 RegCloseKey(hk2);
2339 }
2340
2341 RegCloseKey(hk);
2342
2343 /* Found WZC - get handle to it. */
2344 len = sizeof(hnd);
2345 ret = RegQueryValueEx(hk2, DEVLOAD_HANDLE_VALNAME, NULL, NULL,
2346 (PUCHAR) &hnd, &len);
2347 if (ret != ERROR_SUCCESS) {
2348 wpa_printf(MSG_DEBUG, "NDIS: RegQueryValueEx(HANDLE_VALNAME) "
2349 "failed: %d %d", (int) ret, (int) GetLastError());
2350 RegCloseKey(hk2);
2351 return -1;
2352 }
2353
2354 RegCloseKey(hk2);
2355
2356 /* Deactivate WZC */
2357 if (!DeactivateDevice((HANDLE) hnd)) {
2358 wpa_printf(MSG_DEBUG, "NDIS: DeactivateDevice failed: %d",
2359 (int) GetLastError());
2360 return -1;
2361 }
2362
2363 wpa_printf(MSG_DEBUG, "NDIS: Disabled WZC temporarily");
2364 drv->wzc_disabled = 1;
2365 return wpa_driver_ndis_rebind_adapter(drv);
2366
2367 #else /* _WIN32_WCE */
2368
2369 HMODULE hm;
2370 DWORD (WINAPI *wzc_enum_interf)(LPWSTR pSrvAddr,
2371 PINTFS_KEY_TABLE pIntfs);
2372 DWORD (WINAPI *wzc_query_interf)(LPWSTR pSrvAddr, DWORD dwInFlags,
2373 PINTF_ENTRY pIntf,
2374 LPDWORD pdwOutFlags);
2375 DWORD (WINAPI *wzc_set_interf)(LPWSTR pSrvAddr, DWORD dwInFlags,
2376 PINTF_ENTRY pIntf, LPDWORD pdwOutFlags);
2377 int ret = -1, j;
2378 DWORD res;
2379 INTFS_KEY_TABLE guids;
2380 INTF_ENTRY intf;
2381 char guid[128];
2382 WCHAR *pos;
2383 DWORD flags, i;
2384
2385 hm = LoadLibrary(TEXT("wzcsapi.dll"));
2386 if (hm == NULL) {
2387 wpa_printf(MSG_DEBUG, "NDIS: Failed to load wzcsapi.dll (%u) "
2388 "- WZC probably not running",
2389 (unsigned int) GetLastError());
2390 return -1;
2391 }
2392
2393 #ifdef _WIN32_WCE
2394 wzc_enum_interf = (void *) GetProcAddressA(hm, "WZCEnumInterfaces");
2395 wzc_query_interf = (void *) GetProcAddressA(hm, "WZCQueryInterface");
2396 wzc_set_interf = (void *) GetProcAddressA(hm, "WZCSetInterface");
2397 #else /* _WIN32_WCE */
2398 wzc_enum_interf = (void *) GetProcAddress(hm, "WZCEnumInterfaces");
2399 wzc_query_interf = (void *) GetProcAddress(hm, "WZCQueryInterface");
2400 wzc_set_interf = (void *) GetProcAddress(hm, "WZCSetInterface");
2401 #endif /* _WIN32_WCE */
2402
2403 if (wzc_enum_interf == NULL || wzc_query_interf == NULL ||
2404 wzc_set_interf == NULL) {
2405 wpa_printf(MSG_DEBUG, "NDIS: WZCEnumInterfaces, "
2406 "WZCQueryInterface, or WZCSetInterface not found "
2407 "in wzcsapi.dll");
2408 goto fail;
2409 }
2410
2411 os_memset(&guids, 0, sizeof(guids));
2412 res = wzc_enum_interf(NULL, &guids);
2413 if (res != 0) {
2414 wpa_printf(MSG_DEBUG, "NDIS: WZCEnumInterfaces failed: %d; "
2415 "WZC service is apparently not running",
2416 (int) res);
2417 goto fail;
2418 }
2419
2420 wpa_printf(MSG_DEBUG, "NDIS: WZCEnumInterfaces: %d interfaces",
2421 (int) guids.dwNumIntfs);
2422
2423 for (i = 0; i < guids.dwNumIntfs; i++) {
2424 pos = guids.pIntfs[i].wszGuid;
2425 for (j = 0; j < sizeof(guid); j++) {
2426 guid[j] = (char) *pos;
2427 if (*pos == 0)
2428 break;
2429 pos++;
2430 }
2431 guid[sizeof(guid) - 1] = '\0';
2432 wpa_printf(MSG_DEBUG, "NDIS: intfs %d GUID '%s'",
2433 (int) i, guid);
2434 if (os_strstr(drv->ifname, guid) == NULL)
2435 continue;
2436
2437 wpa_printf(MSG_DEBUG, "NDIS: Current interface found from "
2438 "WZC");
2439 break;
2440 }
2441
2442 if (i >= guids.dwNumIntfs) {
2443 wpa_printf(MSG_DEBUG, "NDIS: Current interface not found from "
2444 "WZC");
2445 goto fail;
2446 }
2447
2448 os_memset(&intf, 0, sizeof(intf));
2449 intf.wszGuid = guids.pIntfs[i].wszGuid;
2450 /* Set flags to verify that the structure has not changed. */
2451 intf.dwCtlFlags = -1;
2452 flags = 0;
2453 res = wzc_query_interf(NULL, INTFCTL_ENABLED, &intf, &flags);
2454 if (res != 0) {
2455 wpa_printf(MSG_DEBUG, "NDIS: Could not query flags for the "
2456 "WZC interface: %d (0x%x)",
2457 (int) res, (int) res);
2458 wpa_printf(MSG_DEBUG, "NDIS: GetLastError: %u",
2459 (unsigned int) GetLastError());
2460 goto fail;
2461 }
2462
2463 wpa_printf(MSG_DEBUG, "NDIS: WZC interface flags 0x%x dwCtlFlags 0x%x",
2464 (int) flags, (int) intf.dwCtlFlags);
2465
2466 if (intf.dwCtlFlags == -1) {
2467 wpa_printf(MSG_DEBUG, "NDIS: Looks like wzcsapi has changed "
2468 "again - could not disable WZC");
2469 wpa_hexdump(MSG_MSGDUMP, "NDIS: intf",
2470 (u8 *) &intf, sizeof(intf));
2471 goto fail;
2472 }
2473
2474 if (enable) {
2475 if (!(intf.dwCtlFlags & INTFCTL_ENABLED)) {
2476 wpa_printf(MSG_DEBUG, "NDIS: Enabling WZC for this "
2477 "interface");
2478 intf.dwCtlFlags |= INTFCTL_ENABLED;
2479 res = wzc_set_interf(NULL, INTFCTL_ENABLED, &intf,
2480 &flags);
2481 if (res != 0) {
2482 wpa_printf(MSG_DEBUG, "NDIS: Failed to enable "
2483 "WZC: %d (0x%x)",
2484 (int) res, (int) res);
2485 wpa_printf(MSG_DEBUG, "NDIS: GetLastError: %u",
2486 (unsigned int) GetLastError());
2487 goto fail;
2488 }
2489 wpa_printf(MSG_DEBUG, "NDIS: Re-enabled WZC for this "
2490 "interface");
2491 drv->wzc_disabled = 0;
2492 }
2493 } else {
2494 if (intf.dwCtlFlags & INTFCTL_ENABLED) {
2495 wpa_printf(MSG_DEBUG, "NDIS: Disabling WZC for this "
2496 "interface");
2497 intf.dwCtlFlags &= ~INTFCTL_ENABLED;
2498 res = wzc_set_interf(NULL, INTFCTL_ENABLED, &intf,
2499 &flags);
2500 if (res != 0) {
2501 wpa_printf(MSG_DEBUG, "NDIS: Failed to "
2502 "disable WZC: %d (0x%x)",
2503 (int) res, (int) res);
2504 wpa_printf(MSG_DEBUG, "NDIS: GetLastError: %u",
2505 (unsigned int) GetLastError());
2506 goto fail;
2507 }
2508 wpa_printf(MSG_DEBUG, "NDIS: Disabled WZC temporarily "
2509 "for this interface");
2510 drv->wzc_disabled = 1;
2511 } else {
2512 wpa_printf(MSG_DEBUG, "NDIS: WZC was not enabled for "
2513 "this interface");
2514 }
2515 }
2516
2517 ret = 0;
2518
2519 fail:
2520 FreeLibrary(hm);
2521
2522 return ret;
2523 #endif /* _WIN32_WCE */
2524 }
2525
2526 #else /* CONFIG_NATIVE_WINDOWS || __CYGWIN__ */
2527
2528 static int wpa_driver_ndis_set_wzc(struct wpa_driver_ndis_data *drv,
2529 int enable)
2530 {
2531 return 0;
2532 }
2533
2534 #endif /* CONFIG_NATIVE_WINDOWS || __CYGWIN__ */
2535
2536
2537 #ifdef CONFIG_USE_NDISUIO
2538 /*
2539 * l2_packet_ndis.c is sharing the same handle to NDISUIO, so we must be able
2540 * to export this handle. This is somewhat ugly, but there is no better
2541 * mechanism available to pass data from driver interface to l2_packet wrapper.
2542 */
2543 static HANDLE driver_ndis_ndisuio_handle = INVALID_HANDLE_VALUE;
2544
2545 HANDLE driver_ndis_get_ndisuio_handle(void)
2546 {
2547 return driver_ndis_ndisuio_handle;
2548 }
2549 #endif /* CONFIG_USE_NDISUIO */
2550
2551
2552 static int wpa_driver_ndis_adapter_init(struct wpa_driver_ndis_data *drv)
2553 {
2554 #ifdef CONFIG_USE_NDISUIO
2555 #ifndef _WIN32_WCE
2556 #define NDISUIO_DEVICE_NAME TEXT("\\\\.\\\\Ndisuio")
2557 DWORD written;
2558 #endif /* _WIN32_WCE */
2559 drv->ndisuio = CreateFile(NDISUIO_DEVICE_NAME,
2560 GENERIC_READ | GENERIC_WRITE, 0, NULL,
2561 OPEN_EXISTING,
2562 FILE_ATTRIBUTE_NORMAL | FILE_FLAG_OVERLAPPED,
2563 INVALID_HANDLE_VALUE);
2564 if (drv->ndisuio == INVALID_HANDLE_VALUE) {
2565 wpa_printf(MSG_ERROR, "NDIS: Failed to open connection to "
2566 "NDISUIO: %d", (int) GetLastError());
2567 return -1;
2568 }
2569 driver_ndis_ndisuio_handle = drv->ndisuio;
2570
2571 #ifndef _WIN32_WCE
2572 if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_BIND_WAIT, NULL, 0,
2573 NULL, 0, &written, NULL)) {
2574 wpa_printf(MSG_ERROR, "NDIS: IOCTL_NDISUIO_BIND_WAIT failed: "
2575 "%d", (int) GetLastError());
2576 CloseHandle(drv->ndisuio);
2577 drv->ndisuio = INVALID_HANDLE_VALUE;
2578 return -1;
2579 }
2580 #endif /* _WIN32_WCE */
2581
2582 return 0;
2583 #else /* CONFIG_USE_NDISUIO */
2584 return 0;
2585 #endif /* CONFIG_USE_NDISUIO */
2586 }
2587
2588
2589 static int wpa_driver_ndis_adapter_open(struct wpa_driver_ndis_data *drv)
2590 {
2591 #ifdef CONFIG_USE_NDISUIO
2592 DWORD written;
2593 #define MAX_NDIS_DEVICE_NAME_LEN 256
2594 WCHAR ifname[MAX_NDIS_DEVICE_NAME_LEN];
2595 size_t len, i, pos;
2596 const char *prefix = "\\DEVICE\\";
2597
2598 #ifdef _WIN32_WCE
2599 pos = 0;
2600 #else /* _WIN32_WCE */
2601 pos = 8;
2602 #endif /* _WIN32_WCE */
2603 len = pos + os_strlen(drv->ifname);
2604 if (len >= MAX_NDIS_DEVICE_NAME_LEN)
2605 return -1;
2606 for (i = 0; i < pos; i++)
2607 ifname[i] = (WCHAR) prefix[i];
2608 for (i = pos; i < len; i++)
2609 ifname[i] = (WCHAR) drv->ifname[i - pos];
2610 ifname[i] = L'\0';
2611
2612 if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_OPEN_DEVICE,
2613 ifname, len * sizeof(WCHAR), NULL, 0, &written,
2614 NULL)) {
2615 wpa_printf(MSG_ERROR, "NDIS: IOCTL_NDISUIO_OPEN_DEVICE "
2616 "failed: %d", (int) GetLastError());
2617 wpa_hexdump_ascii(MSG_DEBUG, "NDIS: ifname",
2618 (const u8 *) ifname, len * sizeof(WCHAR));
2619 CloseHandle(drv->ndisuio);
2620 drv->ndisuio = INVALID_HANDLE_VALUE;
2621 return -1;
2622 }
2623
2624 wpa_printf(MSG_DEBUG, "NDIS: Opened NDISUIO device successfully");
2625
2626 return 0;
2627 #else /* CONFIG_USE_NDISUIO */
2628 char ifname[128];
2629 os_snprintf(ifname, sizeof(ifname), "\\Device\\NPF_%s", drv->ifname);
2630 drv->adapter = PacketOpenAdapter(ifname);
2631 if (drv->adapter == NULL) {
2632 wpa_printf(MSG_DEBUG, "NDIS: PacketOpenAdapter failed for "
2633 "'%s'", ifname);
2634 return -1;
2635 }
2636 return 0;
2637 #endif /* CONFIG_USE_NDISUIO */
2638 }
2639
2640
2641 static void wpa_driver_ndis_adapter_close(struct wpa_driver_ndis_data *drv)
2642 {
2643 #ifdef CONFIG_USE_NDISUIO
2644 driver_ndis_ndisuio_handle = INVALID_HANDLE_VALUE;
2645 if (drv->ndisuio != INVALID_HANDLE_VALUE)
2646 CloseHandle(drv->ndisuio);
2647 #else /* CONFIG_USE_NDISUIO */
2648 if (drv->adapter)
2649 PacketCloseAdapter(drv->adapter);
2650 #endif /* CONFIG_USE_NDISUIO */
2651 }
2652
2653
2654 static void * wpa_driver_ndis_init(void *ctx, const char *ifname)
2655 {
2656 struct wpa_driver_ndis_data *drv;
2657 u32 mode;
2658
2659 drv = os_zalloc(sizeof(*drv));
2660 if (drv == NULL)
2661 return NULL;
2662 drv->ctx = ctx;
2663 /*
2664 * Compatibility code to strip possible prefix from the GUID. Previous
2665 * versions include \Device\NPF_ prefix for all names, but the internal
2666 * interface name is now only the GUI. Both Packet32 and NDISUIO
2667 * prefixes are supported.
2668 */
2669 if (os_strncmp(ifname, "\\Device\\NPF_", 12) == 0)
2670 ifname += 12;
2671 else if (os_strncmp(ifname, "\\DEVICE\\", 8) == 0)
2672 ifname += 8;
2673 os_strlcpy(drv->ifname, ifname, sizeof(drv->ifname));
2674
2675 if (wpa_driver_ndis_adapter_init(drv) < 0) {
2676 os_free(drv);
2677 return NULL;
2678 }
2679
2680 if (wpa_driver_ndis_get_names(drv) < 0) {
2681 wpa_driver_ndis_adapter_close(drv);
2682 os_free(drv);
2683 return NULL;
2684 }
2685
2686 wpa_driver_ndis_set_wzc(drv, 0);
2687
2688 if (wpa_driver_ndis_adapter_open(drv) < 0) {
2689 wpa_driver_ndis_adapter_close(drv);
2690 os_free(drv);
2691 return NULL;
2692 }
2693
2694 if (ndis_get_oid(drv, OID_802_3_CURRENT_ADDRESS,
2695 drv->own_addr, ETH_ALEN) < 0) {
2696 wpa_printf(MSG_DEBUG, "NDIS: Get OID_802_3_CURRENT_ADDRESS "
2697 "failed");
2698 wpa_driver_ndis_adapter_close(drv);
2699 os_free(drv);
2700 return NULL;
2701 }
2702 wpa_driver_ndis_get_capability(drv);
2703
2704 /* Make sure that the driver does not have any obsolete PMKID entries.
2705 */
2706 wpa_driver_ndis_flush_pmkid(drv);
2707
2708 /*
2709 * Disconnect to make sure that driver re-associates if it was
2710 * connected.
2711 */
2712 wpa_driver_ndis_disconnect(drv);
2713
2714 eloop_register_timeout(1, 0, wpa_driver_ndis_poll_timeout, drv, NULL);
2715
2716 #ifdef CONFIG_NDIS_EVENTS_INTEGRATED
2717 drv->events = ndis_events_init(&drv->events_pipe, &drv->event_avail,
2718 drv->ifname, drv->adapter_desc);
2719 if (drv->events == NULL) {
2720 wpa_driver_ndis_deinit(drv);
2721 return NULL;
2722 }
2723 eloop_register_event(drv->event_avail, sizeof(drv->event_avail),
2724 wpa_driver_ndis_event_pipe_cb, drv, NULL);
2725 #endif /* CONFIG_NDIS_EVENTS_INTEGRATED */
2726
2727 #ifdef _WIN32_WCE
2728 if (ndisuio_notification_init(drv) < 0) {
2729 wpa_driver_ndis_deinit(drv);
2730 return NULL;
2731 }
2732 #endif /* _WIN32_WCE */
2733
2734 /* Set mode here in case card was configured for ad-hoc mode
2735 * previously. */
2736 mode = Ndis802_11Infrastructure;
2737 if (ndis_set_oid(drv, OID_802_11_INFRASTRUCTURE_MODE,
2738 (char *) &mode, sizeof(mode)) < 0) {
2739 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
2740 "OID_802_11_INFRASTRUCTURE_MODE (%d)",
2741 (int) mode);
2742 /* Try to continue anyway */
2743
2744 if (!drv->has_capability && drv->capa.enc == 0) {
2745 wpa_printf(MSG_DEBUG, "NDIS: Driver did not provide "
2746 "any wireless capabilities - assume it is "
2747 "a wired interface");
2748 drv->wired = 1;
2749 }
2750 }
2751
2752 return drv;
2753 }
2754
2755
2756 static void wpa_driver_ndis_deinit(void *priv)
2757 {
2758 struct wpa_driver_ndis_data *drv = priv;
2759
2760 #ifdef CONFIG_NDIS_EVENTS_INTEGRATED
2761 if (drv->events) {
2762 eloop_unregister_event(drv->event_avail,
2763 sizeof(drv->event_avail));
2764 ndis_events_deinit(drv->events);
2765 }
2766 #endif /* CONFIG_NDIS_EVENTS_INTEGRATED */
2767
2768 #ifdef _WIN32_WCE
2769 ndisuio_notification_deinit(drv);
2770 #endif /* _WIN32_WCE */
2771
2772 eloop_cancel_timeout(wpa_driver_ndis_scan_timeout, drv, drv->ctx);
2773 eloop_cancel_timeout(wpa_driver_ndis_poll_timeout, drv, NULL);
2774 wpa_driver_ndis_flush_pmkid(drv);
2775 wpa_driver_ndis_disconnect(drv);
2776 if (wpa_driver_ndis_radio_off(drv) < 0) {
2777 wpa_printf(MSG_DEBUG, "NDIS: failed to disassociate and turn "
2778 "radio off");
2779 }
2780
2781 wpa_driver_ndis_adapter_close(drv);
2782
2783 if (drv->wzc_disabled)
2784 wpa_driver_ndis_set_wzc(drv, 1);
2785
2786 #ifdef _WIN32_WCE
2787 os_free(drv->adapter_name);
2788 #endif /* _WIN32_WCE */
2789 os_free(drv->adapter_desc);
2790 os_free(drv);
2791 }
2792
2793
2794 const struct wpa_driver_ops wpa_driver_ndis_ops = {
2795 "ndis",
2796 "Windows NDIS driver",
2797 wpa_driver_ndis_get_bssid,
2798 wpa_driver_ndis_get_ssid,
2799 wpa_driver_ndis_set_wpa,
2800 wpa_driver_ndis_set_key,
2801 wpa_driver_ndis_init,
2802 wpa_driver_ndis_deinit,
2803 NULL /* set_param */,
2804 NULL /* set_countermeasures */,
2805 NULL /* set_drop_unencrypted */,
2806 wpa_driver_ndis_scan,
2807 NULL /* get_scan_results */,
2808 wpa_driver_ndis_deauthenticate,
2809 wpa_driver_ndis_disassociate,
2810 wpa_driver_ndis_associate,
2811 NULL /* set_auth_alg */,
2812 wpa_driver_ndis_add_pmkid,
2813 wpa_driver_ndis_remove_pmkid,
2814 wpa_driver_ndis_flush_pmkid,
2815 wpa_driver_ndis_get_capa,
2816 wpa_driver_ndis_poll,
2817 wpa_driver_ndis_get_ifname,
2818 wpa_driver_ndis_get_mac_addr,
2819 NULL /* send_eapol */,
2820 NULL /* set_operstate */,
2821 NULL /* mlme_setprotection */,
2822 NULL /* get_hw_feature_data */,
2823 NULL /* set_channel */,
2824 NULL /* set_ssid */,
2825 NULL /* set_bssid */,
2826 NULL /* send_mlme */,
2827 NULL /* mlme_add_sta */,
2828 NULL /* mlme_remove_sta */,
2829 NULL /* update_ft_ies */,
2830 NULL /* send_ft_action */,
2831 wpa_driver_ndis_get_scan_results
2832 };