driver_prism54.c 36 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459
  1. /*
  2. * WPA Supplicant - driver interaction with Linux Prism54.org driver
  3. * Copyright (c) 2002-2007, Jouni Malinen <j@w1.fi>
  4. * Copyright (c) 2004, Luis R. Rodriguez <mcgrof@ruslug.rutgers.edu>
  5. * Copyright (c) 2004, Bell Kin <bell_kin@pek.com.tw>
  6. *
  7. * This program is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License version 2 as
  9. * published by the Free Software Foundation.
  10. *
  11. * Alternatively, this software may be distributed under the terms of BSD
  12. * license.
  13. *
  14. * See README and COPYING for more details.
  15. */
  16. #include "includes.h"
  17. #include <sys/ioctl.h>
  18. #include "wireless_copy.h"
  19. #include "common.h"
  20. #include "driver.h"
  21. #include "driver_wext.h"
  22. #include "driver_hostap.h"
  23. #ifdef HOSTAPD
  24. #include <net/if_arp.h>
  25. #include <netpacket/packet.h>
  26. #include "driver.h"
  27. #include "eloop.h"
  28. #include "prism54.h"
  29. #include "radius/radius.h"
  30. #include "../../hostapd/hostapd.h"
  31. #include "../../hostapd/config.h"
  32. #include "../../hostapd/ieee802_1x.h"
  33. #include "../../hostapd/ieee802_11.h"
  34. #include "../../hostapd/wpa.h"
  35. #include "../../hostapd/sta_info.h"
  36. #include "../../hostapd/accounting.h"
  37. const int PIM_BUF_SIZE = 4096;
  38. struct prism54_driver_data {
  39. struct hostapd_data *hapd;
  40. char iface[IFNAMSIZ + 1];
  41. int sock; /* raw packet socket for 802.3 access */
  42. int pim_sock; /* socket for pimfor packet */
  43. char macs[2007][6];
  44. };
  45. static int mac_id_refresh(struct prism54_driver_data *data, int id, char *mac)
  46. {
  47. if (id < 0 || id > 2006) {
  48. return -1;
  49. }
  50. memcpy(&data->macs[id][0], mac, ETH_ALEN);
  51. return 0;
  52. }
  53. static char * mac_id_get(struct prism54_driver_data *data, int id)
  54. {
  55. if (id < 0 || id > 2006) {
  56. return NULL;
  57. }
  58. return &data->macs[id][0];
  59. }
  60. /* wait for a specific pimfor, timeout in 10ms resolution */
  61. /* pim_sock must be non-block to prevent dead lock from no response */
  62. /* or same response type in series */
  63. static int prism54_waitpim(void *priv, unsigned long oid, void *buf, int len,
  64. int timeout)
  65. {
  66. struct prism54_driver_data *drv = priv;
  67. struct timeval tv, stv, ctv;
  68. fd_set pfd;
  69. int rlen;
  70. pimdev_hdr *pkt;
  71. pkt = malloc(8192);
  72. if (pkt == NULL)
  73. return -1;
  74. FD_ZERO(&pfd);
  75. gettimeofday(&stv, NULL);
  76. do {
  77. FD_SET(drv->pim_sock, &pfd);
  78. tv.tv_sec = 0;
  79. tv.tv_usec = 10000;
  80. if (select(drv->pim_sock + 1, &pfd, NULL, NULL, &tv)) {
  81. rlen = recv(drv->pim_sock, pkt, 8192, 0);
  82. if (rlen > 0) {
  83. if (pkt->oid == htonl(oid)) {
  84. if (rlen <= len) {
  85. if (buf != NULL) {
  86. memcpy(buf, pkt, rlen);
  87. }
  88. free(pkt);
  89. return rlen;
  90. } else {
  91. printf("buffer too small\n");
  92. free(pkt);
  93. return -1;
  94. }
  95. } else {
  96. gettimeofday(&ctv, NULL);
  97. continue;
  98. }
  99. }
  100. }
  101. gettimeofday(&ctv, NULL);
  102. } while (((ctv.tv_sec - stv.tv_sec) * 100 +
  103. (ctv.tv_usec - stv.tv_usec) / 10000) > timeout);
  104. free(pkt);
  105. return 0;
  106. }
  107. /* send an eapol packet */
  108. static int prism54_send_eapol(void *priv, const u8 *addr,
  109. const u8 *data, size_t data_len, int encrypt,
  110. const u8 *own_addr)
  111. {
  112. struct prism54_driver_data *drv = priv;
  113. ieee802_3_hdr *hdr;
  114. size_t len;
  115. u8 *pos;
  116. int res;
  117. len = sizeof(*hdr) + data_len;
  118. hdr = os_zalloc(len);
  119. if (hdr == NULL) {
  120. printf("malloc() failed for prism54_send_data(len=%lu)\n",
  121. (unsigned long) len);
  122. return -1;
  123. }
  124. memcpy(&hdr->da[0], addr, ETH_ALEN);
  125. memcpy(&hdr->sa[0], own_addr, ETH_ALEN);
  126. hdr->type = htons(ETH_P_PAE);
  127. pos = (u8 *) (hdr + 1);
  128. memcpy(pos, data, data_len);
  129. res = send(drv->sock, hdr, len, 0);
  130. free(hdr);
  131. if (res < 0) {
  132. perror("hostapd_send_eapol: send");
  133. printf("hostapd_send_eapol - packet len: %lu - failed\n",
  134. (unsigned long) len);
  135. }
  136. return res;
  137. }
  138. /* open data channel(auth-1) or eapol only(unauth-0) */
  139. static int prism54_set_sta_authorized(void *priv, const u8 *addr,
  140. int authorized)
  141. {
  142. struct prism54_driver_data *drv = priv;
  143. pimdev_hdr *hdr;
  144. char *pos;
  145. hdr = os_zalloc(sizeof(*hdr) + ETH_ALEN);
  146. if (hdr == NULL)
  147. return -1;
  148. hdr->op = htonl(PIMOP_SET);
  149. if (authorized) {
  150. hdr->oid = htonl(DOT11_OID_EAPAUTHSTA);
  151. } else {
  152. hdr->oid = htonl(DOT11_OID_EAPUNAUTHSTA);
  153. }
  154. pos = (char *) (hdr + 1);
  155. memcpy(pos, addr, ETH_ALEN);
  156. send(drv->pim_sock, hdr, sizeof(*hdr) + ETH_ALEN, 0);
  157. prism54_waitpim(priv, hdr->oid, hdr, sizeof(*hdr) + ETH_ALEN, 10);
  158. free(hdr);
  159. return 0;
  160. }
  161. static int
  162. prism54_sta_set_flags(void *priv, const u8 *addr, int total_flags,
  163. int flags_or, int flags_and)
  164. {
  165. /* For now, only support setting Authorized flag */
  166. if (flags_or & WLAN_STA_AUTHORIZED)
  167. return prism54_set_sta_authorized(priv, addr, 1);
  168. if (flags_and & WLAN_STA_AUTHORIZED)
  169. return prism54_set_sta_authorized(priv, addr, 0);
  170. return 0;
  171. }
  172. static int wpa_driver_prism54_set_key(const char *ifname, void *priv,
  173. wpa_alg alg, const u8 *addr, int key_idx,
  174. int set_tx,
  175. const u8 *seq, size_t seq_len,
  176. const u8 *key, size_t key_len)
  177. {
  178. struct prism54_driver_data *drv = priv;
  179. pimdev_hdr *hdr;
  180. struct obj_stakey *keys;
  181. u8 *buf;
  182. size_t blen;
  183. int ret = 0;
  184. blen = sizeof(struct obj_stakey) + sizeof(pimdev_hdr);
  185. hdr = os_zalloc(blen);
  186. if (hdr == NULL) {
  187. printf("memory low\n");
  188. return -1;
  189. }
  190. keys = (struct obj_stakey *) &hdr[1];
  191. if (!addr) {
  192. memset(&keys->address[0], 0xff, ETH_ALEN);
  193. } else {
  194. memcpy(&keys->address[0], addr, ETH_ALEN);
  195. }
  196. switch (alg) {
  197. case WPA_ALG_WEP:
  198. keys->type = DOT11_PRIV_WEP;
  199. break;
  200. case WPA_ALG_TKIP:
  201. keys->type = DOT11_PRIV_TKIP;
  202. break;
  203. case WPA_ALG_NONE:
  204. /* the only way to clear the key is to deauth it */
  205. /* and prism54 is capable to receive unencrypted packet */
  206. /* so we do nothing here */
  207. free(hdr);
  208. return 0;
  209. default:
  210. printf("bad auth type: %d\n", alg);
  211. free(hdr);
  212. return -1;
  213. }
  214. buf = (u8 *) &keys->key[0];
  215. keys->length = key_len;
  216. keys->keyid = key_idx;
  217. keys->options = htons(DOT11_STAKEY_OPTION_DEFAULTKEY);
  218. keys->reserved = 0;
  219. hdr->op = htonl(PIMOP_SET);
  220. hdr->oid = htonl(DOT11_OID_STAKEY);
  221. memcpy(buf, key, key_len);
  222. ret = send(drv->pim_sock, hdr, blen, 0);
  223. if (ret < 0) {
  224. free(hdr);
  225. return ret;
  226. }
  227. prism54_waitpim(priv, hdr->oid, hdr, blen, 10);
  228. free(hdr);
  229. return 0;
  230. }
  231. /* get TKIP station sequence counter, prism54 is only 6 bytes */
  232. static int prism54_get_seqnum(const char *ifname, void *priv, const u8 *addr,
  233. int idx, u8 *seq)
  234. {
  235. struct prism54_driver_data *drv = priv;
  236. struct obj_stasc *stasc;
  237. pimdev_hdr *hdr;
  238. size_t blen;
  239. int ret = 0;
  240. blen = sizeof(*stasc) + sizeof(*hdr);
  241. hdr = os_zalloc(blen);
  242. if (hdr == NULL)
  243. return -1;
  244. stasc = (struct obj_stasc *) &hdr[1];
  245. if (addr == NULL)
  246. memset(&stasc->address[0], 0xff, ETH_ALEN);
  247. else
  248. memcpy(&stasc->address[0], addr, ETH_ALEN);
  249. hdr->oid = htonl(DOT11_OID_STASC);
  250. hdr->op = htonl(PIMOP_GET);
  251. stasc->keyid = idx;
  252. if (send(drv->pim_sock,hdr,blen,0) <= 0) {
  253. free(hdr);
  254. return -1;
  255. }
  256. if (prism54_waitpim(priv, DOT11_OID_STASC, hdr, blen, 10) <= 0) {
  257. ret = -1;
  258. } else {
  259. if (hdr->op == (int) htonl(PIMOP_RESPONSE)) {
  260. memcpy(seq + 2, &stasc->sc_high, ETH_ALEN);
  261. memset(seq, 0, 2);
  262. } else {
  263. ret = -1;
  264. }
  265. }
  266. free(hdr);
  267. return ret;
  268. }
  269. /* include unencrypted, set mlme autolevel to extended */
  270. static int prism54_init_1x(void *priv)
  271. {
  272. struct prism54_driver_data *drv = priv;
  273. pimdev_hdr *hdr;
  274. unsigned long *ul;
  275. int blen = sizeof(*hdr) + sizeof(*ul);
  276. hdr = os_zalloc(blen);
  277. if (hdr == NULL)
  278. return -1;
  279. ul = (unsigned long *) &hdr[1];
  280. hdr->op = htonl(PIMOP_SET);
  281. hdr->oid = htonl(DOT11_OID_EXUNENCRYPTED);
  282. *ul = htonl(DOT11_BOOL_TRUE); /* not accept */
  283. send(drv->pim_sock, hdr, blen, 0);
  284. prism54_waitpim(priv, DOT11_OID_EXUNENCRYPTED, hdr, blen, 10);
  285. hdr->op = htonl(PIMOP_SET);
  286. hdr->oid = htonl(DOT11_OID_MLMEAUTOLEVEL);
  287. *ul = htonl(DOT11_MLME_EXTENDED);
  288. send(drv->pim_sock, hdr, blen, 0);
  289. prism54_waitpim(priv, DOT11_OID_MLMEAUTOLEVEL, hdr, blen, 10);
  290. hdr->op = htonl(PIMOP_SET);
  291. hdr->oid = htonl(DOT11_OID_DOT1XENABLE);
  292. *ul = htonl(DOT11_BOOL_TRUE);
  293. send(drv->pim_sock, hdr, blen, 0);
  294. prism54_waitpim(priv, DOT11_OID_DOT1XENABLE, hdr, blen, 10);
  295. hdr->op = htonl(PIMOP_SET);
  296. hdr->oid = htonl(DOT11_OID_AUTHENABLE);
  297. *ul = htonl(DOT11_AUTH_OS); /* OS */
  298. send(drv->pim_sock, hdr, blen, 0);
  299. prism54_waitpim(priv, DOT11_OID_AUTHENABLE, hdr, blen, 10);
  300. free(hdr);
  301. return 0;
  302. }
  303. static int prism54_set_privacy_invoked(const char *ifname, void *priv,
  304. int flag)
  305. {
  306. struct prism54_driver_data *drv = priv;
  307. pimdev_hdr *hdr;
  308. unsigned long *ul;
  309. int ret;
  310. int blen = sizeof(*hdr) + sizeof(*ul);
  311. hdr = os_zalloc(blen);
  312. if (hdr == NULL)
  313. return -1;
  314. ul = (unsigned long *) &hdr[1];
  315. hdr->op = htonl(PIMOP_SET);
  316. hdr->oid = htonl(DOT11_OID_PRIVACYINVOKED);
  317. if (flag) {
  318. *ul = htonl(DOT11_BOOL_TRUE); /* has privacy */
  319. } else {
  320. *ul = 0;
  321. }
  322. ret = send(drv->pim_sock, hdr, blen, 0);
  323. if (ret >= 0) {
  324. ret = prism54_waitpim(priv, DOT11_OID_PRIVACYINVOKED, hdr,
  325. blen, 10);
  326. }
  327. free(hdr);
  328. return ret;
  329. }
  330. static int prism54_ioctl_setiwessid(const char *ifname, void *priv,
  331. const u8 *buf, int len)
  332. {
  333. #if 0
  334. struct prism54_driver_data *drv = priv;
  335. struct iwreq iwr;
  336. memset(&iwr, 0, sizeof(iwr));
  337. os_strlcpy(iwr.ifr_name, drv->iface, IFNAMSIZ);
  338. iwr.u.essid.flags = 1; /* SSID active */
  339. iwr.u.essid.pointer = (caddr_t) buf;
  340. iwr.u.essid.length = len + 1;
  341. if (ioctl(drv->pim_sock, SIOCSIWESSID, &iwr) < 0) {
  342. perror("ioctl[SIOCSIWESSID]");
  343. printf("len=%d\n", len);
  344. return -1;
  345. }
  346. #endif
  347. return 0;
  348. }
  349. /* kick all stations */
  350. /* does not work during init, but at least it won't crash firmware */
  351. static int prism54_flush(void *priv)
  352. {
  353. struct prism54_driver_data *drv = priv;
  354. struct obj_mlmeex *mlme;
  355. pimdev_hdr *hdr;
  356. int ret;
  357. unsigned int i;
  358. long *nsta;
  359. int blen = sizeof(*hdr) + sizeof(*mlme);
  360. char *mac_id;
  361. hdr = os_zalloc(blen);
  362. if (hdr == NULL)
  363. return -1;
  364. mlme = (struct obj_mlmeex *) &hdr[1];
  365. nsta = (long *) &hdr[1];
  366. hdr->op = htonl(PIMOP_GET);
  367. hdr->oid = htonl(DOT11_OID_CLIENTS);
  368. ret = send(drv->pim_sock, hdr, sizeof(*hdr) + sizeof(long), 0);
  369. ret = prism54_waitpim(priv, DOT11_OID_CLIENTS, hdr, blen, 10);
  370. if ((ret < 0) || (hdr->op != (int) htonl(PIMOP_RESPONSE)) ||
  371. (le_to_host32(*nsta) > 2007)) {
  372. free(hdr);
  373. return 0;
  374. }
  375. for (i = 0; i < le_to_host32(*nsta); i++) {
  376. mlme->id = -1;
  377. mac_id = mac_id_get(drv, i);
  378. if (mac_id)
  379. memcpy(&mlme->address[0], mac_id, ETH_ALEN);
  380. mlme->code = host_to_le16(WLAN_REASON_UNSPECIFIED);
  381. mlme->state = htons(DOT11_STATE_NONE);
  382. mlme->size = 0;
  383. hdr->op = htonl(PIMOP_SET);
  384. hdr->oid = htonl(DOT11_OID_DISASSOCIATEEX);
  385. ret = send(drv->pim_sock, hdr, blen, 0);
  386. prism54_waitpim(priv, DOT11_OID_DISASSOCIATEEX, hdr, blen,
  387. 100);
  388. }
  389. for (i = 0; i < le_to_host32(*nsta); i++) {
  390. mlme->id = -1;
  391. mac_id = mac_id_get(drv, i);
  392. if (mac_id)
  393. memcpy(&mlme->address[0], mac_id, ETH_ALEN);
  394. mlme->code = host_to_le16(WLAN_REASON_UNSPECIFIED);
  395. mlme->state = htons(DOT11_STATE_NONE);
  396. mlme->size = 0;
  397. hdr->op = htonl(PIMOP_SET);
  398. hdr->oid = htonl(DOT11_OID_DEAUTHENTICATEEX);
  399. ret = send(drv->pim_sock, hdr, blen, 0);
  400. prism54_waitpim(priv, DOT11_OID_DEAUTHENTICATEEX, hdr, blen,
  401. 100);
  402. }
  403. free(hdr);
  404. return 0;
  405. }
  406. static int prism54_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr,
  407. int reason)
  408. {
  409. struct prism54_driver_data *drv = priv;
  410. pimdev_hdr *hdr;
  411. struct obj_mlmeex *mlme;
  412. int ret;
  413. int blen = sizeof(*hdr) + sizeof(*mlme);
  414. hdr = os_zalloc(blen);
  415. if (hdr == NULL)
  416. return -1;
  417. mlme = (struct obj_mlmeex *) &hdr[1];
  418. hdr->op = htonl(PIMOP_SET);
  419. hdr->oid = htonl(DOT11_OID_DEAUTHENTICATEEX);
  420. memcpy(&mlme->address[0], addr, ETH_ALEN);
  421. mlme->id = -1;
  422. mlme->state = htons(DOT11_STATE_NONE);
  423. mlme->code = host_to_le16(reason);
  424. mlme->size = 0;
  425. ret = send(drv->pim_sock, hdr, blen, 0);
  426. prism54_waitpim(priv, DOT11_OID_DEAUTHENTICATEEX, hdr, blen, 10);
  427. free(hdr);
  428. return ret;
  429. }
  430. static int prism54_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
  431. int reason)
  432. {
  433. struct prism54_driver_data *drv = priv;
  434. pimdev_hdr *hdr;
  435. struct obj_mlmeex *mlme;
  436. int ret;
  437. int blen = sizeof(*hdr) + sizeof(*mlme);
  438. hdr = os_zalloc(blen);
  439. if (hdr == NULL)
  440. return -1;
  441. mlme = (struct obj_mlmeex *) &hdr[1];
  442. hdr->op = htonl(PIMOP_SET);
  443. hdr->oid = htonl(DOT11_OID_DISASSOCIATEEX);
  444. memcpy(&mlme->address[0], addr, ETH_ALEN);
  445. mlme->id = -1;
  446. mlme->state = htons(DOT11_STATE_NONE);
  447. mlme->code = host_to_le16(reason);
  448. mlme->size = 0;
  449. ret = send(drv->pim_sock, hdr, blen, 0);
  450. prism54_waitpim(priv, DOT11_OID_DISASSOCIATEEX, hdr, blen, 10);
  451. free(hdr);
  452. return ret;
  453. }
  454. static int prism54_get_inact_sec(void *priv, const u8 *addr)
  455. {
  456. struct prism54_driver_data *drv = priv;
  457. pimdev_hdr *hdr;
  458. struct obj_sta *sta;
  459. int blen = sizeof(*hdr) + sizeof(*sta);
  460. int ret;
  461. hdr = os_zalloc(blen);
  462. if (hdr == NULL)
  463. return -1;
  464. hdr->op = htonl(PIMOP_GET);
  465. hdr->oid = htonl(DOT11_OID_CLIENTFIND);
  466. sta = (struct obj_sta *) &hdr[1];
  467. memcpy(&sta->address[0], addr, ETH_ALEN);
  468. ret = send(drv->pim_sock, hdr, blen, 0);
  469. ret = prism54_waitpim(priv, DOT11_OID_CLIENTFIND, hdr, blen, 10);
  470. if (ret != blen) {
  471. printf("get_inact_sec: bad return %d\n", ret);
  472. free(hdr);
  473. return -1;
  474. }
  475. if (hdr->op != (int) htonl(PIMOP_RESPONSE)) {
  476. printf("get_inact_sec: bad resp\n");
  477. free(hdr);
  478. return -1;
  479. }
  480. free(hdr);
  481. return le_to_host16(sta->age);
  482. }
  483. /* set attachments */
  484. static int prism54_set_generic_elem(const char *ifname, void *priv,
  485. const u8 *elem, size_t elem_len)
  486. {
  487. struct prism54_driver_data *drv = priv;
  488. pimdev_hdr *hdr;
  489. char *pos;
  490. struct obj_attachment_hdr *attach;
  491. size_t blen = sizeof(*hdr) + sizeof(*attach) + elem_len;
  492. hdr = os_zalloc(blen);
  493. if (hdr == NULL) {
  494. printf("%s: memory low\n", __func__);
  495. return -1;
  496. }
  497. hdr->op = htonl(PIMOP_SET);
  498. hdr->oid = htonl(DOT11_OID_ATTACHMENT);
  499. attach = (struct obj_attachment_hdr *)&hdr[1];
  500. attach->type = DOT11_PKT_BEACON;
  501. attach->id = -1;
  502. attach->size = host_to_le16((short)elem_len);
  503. pos = ((char*) attach) + sizeof(*attach);
  504. if (elem)
  505. memcpy(pos, elem, elem_len);
  506. send(drv->pim_sock, hdr, blen, 0);
  507. attach->type = DOT11_PKT_PROBE_RESP;
  508. send(drv->pim_sock, hdr, blen, 0);
  509. free(hdr);
  510. return 0;
  511. }
  512. /* tell the card to auth the sta */
  513. static void prism54_handle_probe(struct prism54_driver_data *drv,
  514. void *buf, size_t len)
  515. {
  516. struct obj_mlmeex *mlme;
  517. pimdev_hdr *hdr;
  518. struct sta_info *sta;
  519. hdr = (pimdev_hdr *)buf;
  520. mlme = (struct obj_mlmeex *) &hdr[1];
  521. sta = ap_get_sta(drv->hapd, (u8 *) &mlme->address[0]);
  522. if (sta != NULL) {
  523. if (sta->flags & (WLAN_STA_AUTH | WLAN_STA_ASSOC))
  524. return;
  525. }
  526. if (len < sizeof(*mlme)) {
  527. printf("bad probe packet\n");
  528. return;
  529. }
  530. mlme->state = htons(DOT11_STATE_AUTHING);
  531. mlme->code = 0;
  532. hdr->op = htonl(PIMOP_SET);
  533. hdr->oid = htonl(DOT11_OID_AUTHENTICATEEX);
  534. mlme->size = 0;
  535. send(drv->pim_sock, hdr, sizeof(*hdr)+sizeof(*mlme), 0);
  536. }
  537. static void prism54_handle_deauth(struct prism54_driver_data *drv,
  538. void *buf, size_t len)
  539. {
  540. struct obj_mlme *mlme;
  541. pimdev_hdr *hdr;
  542. struct sta_info *sta;
  543. char *mac_id;
  544. hdr = (pimdev_hdr *) buf;
  545. mlme = (struct obj_mlme *) &hdr[1];
  546. sta = ap_get_sta(drv->hapd, (u8 *) &mlme->address[0]);
  547. mac_id = mac_id_get(drv, mlme->id);
  548. if (sta == NULL || mac_id == NULL)
  549. return;
  550. memcpy(&mlme->address[0], mac_id, ETH_ALEN);
  551. sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC);
  552. wpa_auth_sm_event(sta->wpa_sm, WPA_DEAUTH);
  553. sta->acct_terminate_cause = RADIUS_ACCT_TERMINATE_CAUSE_USER_REQUEST;
  554. ieee802_1x_notify_port_enabled(sta->eapol_sm, 0);
  555. ap_free_sta(drv->hapd, sta);
  556. }
  557. static void prism54_handle_disassoc(struct prism54_driver_data *drv,
  558. void *buf, size_t len)
  559. {
  560. struct obj_mlme *mlme;
  561. pimdev_hdr *hdr;
  562. struct sta_info *sta;
  563. char *mac_id;
  564. hdr = (pimdev_hdr *) buf;
  565. mlme = (struct obj_mlme *) &hdr[1];
  566. mac_id = mac_id_get(drv, mlme->id);
  567. if (mac_id == NULL)
  568. return;
  569. memcpy(&mlme->address[0], mac_id, ETH_ALEN);
  570. sta = ap_get_sta(drv->hapd, (u8 *) &mlme->address[0]);
  571. if (sta == NULL) {
  572. return;
  573. }
  574. sta->flags &= ~WLAN_STA_ASSOC;
  575. wpa_auth_sm_event(sta->wpa_sm, WPA_DISASSOC);
  576. sta->acct_terminate_cause = RADIUS_ACCT_TERMINATE_CAUSE_USER_REQUEST;
  577. ieee802_1x_notify_port_enabled(sta->eapol_sm, 0);
  578. accounting_sta_stop(drv->hapd, sta);
  579. ieee802_1x_free_station(sta);
  580. }
  581. /* to auth it, just allow it now, later for os/sk */
  582. static void prism54_handle_auth(struct prism54_driver_data *drv,
  583. void *buf, size_t len)
  584. {
  585. struct obj_mlmeex *mlme;
  586. pimdev_hdr *hdr;
  587. struct sta_info *sta;
  588. int resp;
  589. hdr = (pimdev_hdr *) buf;
  590. mlme = (struct obj_mlmeex *) &hdr[1];
  591. if (len < sizeof(*mlme)) {
  592. printf("bad auth packet\n");
  593. return;
  594. }
  595. if (mlme->state == htons(DOT11_STATE_AUTHING)) {
  596. sta = ap_sta_add(drv->hapd, (u8 *) &mlme->address[0]);
  597. if (drv->hapd->tkip_countermeasures) {
  598. resp = WLAN_REASON_MICHAEL_MIC_FAILURE;
  599. goto fail;
  600. }
  601. mac_id_refresh(drv, mlme->id, &mlme->address[0]);
  602. if (!sta) {
  603. resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
  604. goto fail;
  605. }
  606. sta->flags &= ~WLAN_STA_PREAUTH;
  607. ieee802_1x_notify_pre_auth(sta->eapol_sm, 0);
  608. sta->flags |= WLAN_STA_AUTH;
  609. wpa_auth_sm_event(sta->wpa_sm, WPA_AUTH);
  610. mlme->code = 0;
  611. mlme->state=htons(DOT11_STATE_AUTH);
  612. hdr->op = htonl(PIMOP_SET);
  613. hdr->oid = htonl(DOT11_OID_AUTHENTICATEEX);
  614. mlme->size = 0;
  615. sta->timeout_next = STA_NULLFUNC;
  616. send(drv->pim_sock, hdr, sizeof(*hdr) + sizeof(*mlme), 0);
  617. }
  618. return;
  619. fail:
  620. printf("auth fail: %x\n", resp);
  621. mlme->code = host_to_le16(resp);
  622. mlme->size = 0;
  623. if (sta)
  624. sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC);
  625. hdr->oid = htonl(DOT11_OID_DEAUTHENTICATEEX);
  626. hdr->op = htonl(PIMOP_SET);
  627. send(drv->pim_sock, hdr, sizeof(*hdr)+sizeof(*mlme), 0);
  628. }
  629. /* do the wpa thing */
  630. static void prism54_handle_assoc(struct prism54_driver_data *drv,
  631. void *buf, size_t len)
  632. {
  633. pimdev_hdr *hdr;
  634. struct obj_mlmeex *mlme;
  635. struct ieee802_11_elems elems;
  636. struct sta_info *sta;
  637. u8 *wpa_ie;
  638. u8 *cb;
  639. int ieofs = 0;
  640. size_t wpa_ie_len;
  641. int resp, new_assoc;
  642. char *mac_id;
  643. resp = 0;
  644. hdr = (pimdev_hdr *) buf;
  645. mlme = (struct obj_mlmeex *) &hdr[1];
  646. switch (ntohl(hdr->oid)) {
  647. case DOT11_OID_ASSOCIATE:
  648. case DOT11_OID_REASSOCIATE:
  649. mlme->size = 0;
  650. default:
  651. break;
  652. }
  653. if ((mlme->state == (int) htonl(DOT11_STATE_ASSOCING)) ||
  654. (mlme->state == (int) htonl(DOT11_STATE_REASSOCING))) {
  655. if (len < sizeof(pimdev_hdr) + sizeof(struct obj_mlme)) {
  656. printf("bad assoc packet\n");
  657. return;
  658. }
  659. mac_id = mac_id_get(drv, mlme->id);
  660. if (mac_id == NULL)
  661. return;
  662. memcpy(&mlme->address[0], mac_id, ETH_ALEN);
  663. sta = ap_get_sta(drv->hapd, (u8 *) &mlme->address[0]);
  664. if (sta == NULL) {
  665. printf("cannot get sta\n");
  666. return;
  667. }
  668. cb = (u8 *) &mlme->data[0];
  669. if (hdr->oid == htonl(DOT11_OID_ASSOCIATEEX)) {
  670. ieofs = 4;
  671. } else if (hdr->oid == htonl(DOT11_OID_REASSOCIATEEX)) {
  672. ieofs = 10;
  673. }
  674. if (le_to_host16(mlme->size) <= ieofs) {
  675. printf("attach too small\n");
  676. resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
  677. goto fail;
  678. }
  679. if (ieee802_11_parse_elems(cb + ieofs,
  680. le_to_host16(mlme->size) - ieofs,
  681. &elems, 1) == ParseFailed) {
  682. printf("STA " MACSTR " sent invalid association "
  683. "request\n", MAC2STR(sta->addr));
  684. resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
  685. goto fail;
  686. }
  687. if ((drv->hapd->conf->wpa & WPA_PROTO_RSN) &&
  688. elems.rsn_ie) {
  689. wpa_ie = elems.rsn_ie;
  690. wpa_ie_len = elems.rsn_ie_len;
  691. } else if ((drv->hapd->conf->wpa & WPA_PROTO_WPA) &&
  692. elems.wpa_ie) {
  693. wpa_ie = elems.wpa_ie;
  694. wpa_ie_len = elems.wpa_ie_len;
  695. } else {
  696. wpa_ie = NULL;
  697. wpa_ie_len = 0;
  698. }
  699. if (drv->hapd->conf->wpa && wpa_ie == NULL) {
  700. printf("STA " MACSTR ": No WPA/RSN IE in association "
  701. "request\n", MAC2STR(sta->addr));
  702. resp = WLAN_STATUS_INVALID_IE;
  703. goto fail;
  704. }
  705. if (drv->hapd->conf->wpa) {
  706. int res;
  707. wpa_ie -= 2;
  708. wpa_ie_len += 2;
  709. if (sta->wpa_sm == NULL)
  710. sta->wpa_sm = wpa_auth_sta_init(
  711. drv->hapd->wpa_auth, sta->addr);
  712. if (sta->wpa_sm == NULL) {
  713. printf("Failed to initialize WPA state "
  714. "machine\n");
  715. resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
  716. goto fail;
  717. }
  718. res = wpa_validate_wpa_ie(drv->hapd->wpa_auth,
  719. sta->wpa_sm,
  720. wpa_ie, wpa_ie_len,
  721. NULL, 0);
  722. if (res == WPA_INVALID_GROUP)
  723. resp = WLAN_STATUS_GROUP_CIPHER_NOT_VALID;
  724. else if (res == WPA_INVALID_PAIRWISE)
  725. resp = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID;
  726. else if (res == WPA_INVALID_AKMP)
  727. resp = WLAN_STATUS_AKMP_NOT_VALID;
  728. else if (res == WPA_ALLOC_FAIL)
  729. resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
  730. else if (res != WPA_IE_OK)
  731. resp = WLAN_STATUS_INVALID_IE;
  732. if (resp != WLAN_STATUS_SUCCESS)
  733. goto fail;
  734. }
  735. hdr->oid = (hdr->oid == htonl(DOT11_OID_ASSOCIATEEX)) ?
  736. htonl(DOT11_OID_ASSOCIATEEX) :
  737. htonl(DOT11_OID_REASSOCIATEEX);
  738. hdr->op = htonl(PIMOP_SET);
  739. mlme->code = 0;
  740. mlme->state = htons(DOT11_STATE_ASSOC);
  741. mlme->size = 0;
  742. send(drv->pim_sock, hdr, sizeof(*hdr) + sizeof(*mlme), 0);
  743. return;
  744. } else if (mlme->state==htons(DOT11_STATE_ASSOC)) {
  745. if (len < sizeof(pimdev_hdr) + sizeof(struct obj_mlme)) {
  746. printf("bad assoc packet\n");
  747. return;
  748. }
  749. mac_id = mac_id_get(drv, mlme->id);
  750. if (mac_id == NULL)
  751. return;
  752. memcpy(&mlme->address[0], mac_id, ETH_ALEN);
  753. sta = ap_get_sta(drv->hapd, (u8 *) &mlme->address[0]);
  754. if (sta == NULL) {
  755. printf("cannot get sta\n");
  756. return;
  757. }
  758. new_assoc = (sta->flags & WLAN_STA_ASSOC) == 0;
  759. sta->flags |= WLAN_STA_AUTH | WLAN_STA_ASSOC;
  760. wpa_auth_sm_event(sta->wpa_sm, WPA_ASSOC);
  761. hostapd_new_assoc_sta(drv->hapd, sta, !new_assoc);
  762. ieee802_1x_notify_port_enabled(sta->eapol_sm, 1);
  763. sta->timeout_next = STA_NULLFUNC;
  764. return;
  765. }
  766. return;
  767. fail:
  768. printf("Prism54: assoc fail: %x\n", resp);
  769. mlme->code = host_to_le16(resp);
  770. mlme->size = 0;
  771. mlme->state = htons(DOT11_STATE_ASSOCING);
  772. hdr->oid = htonl(DOT11_OID_DISASSOCIATEEX);
  773. hdr->op = htonl(PIMOP_SET);
  774. sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC);
  775. send(drv->pim_sock, hdr, sizeof(*hdr) + sizeof(*mlme), 0);
  776. }
  777. static void handle_pim(int sock, void *eloop_ctx, void *sock_ctx)
  778. {
  779. struct prism54_driver_data *drv = eloop_ctx;
  780. int len;
  781. pimdev_hdr *hdr;
  782. hdr = malloc(PIM_BUF_SIZE);
  783. if (hdr == NULL)
  784. return;
  785. len = recv(sock, hdr, PIM_BUF_SIZE, 0);
  786. if (len < 0) {
  787. perror("recv");
  788. free(hdr);
  789. return;
  790. }
  791. if (len < 8) {
  792. printf("handle_pim: too short (%d)\n", len);
  793. free(hdr);
  794. return;
  795. }
  796. if (hdr->op != (int) htonl(PIMOP_TRAP)) {
  797. free(hdr);
  798. return;
  799. }
  800. switch (ntohl(hdr->oid)) {
  801. case DOT11_OID_PROBE:
  802. prism54_handle_probe(drv, hdr, len);
  803. break;
  804. case DOT11_OID_DEAUTHENTICATEEX:
  805. case DOT11_OID_DEAUTHENTICATE:
  806. prism54_handle_deauth(drv, hdr, len);
  807. break;
  808. case DOT11_OID_DISASSOCIATEEX:
  809. case DOT11_OID_DISASSOCIATE:
  810. prism54_handle_disassoc(drv, hdr, len);
  811. break;
  812. case DOT11_OID_AUTHENTICATEEX:
  813. case DOT11_OID_AUTHENTICATE:
  814. prism54_handle_auth(drv, hdr, len);
  815. break;
  816. case DOT11_OID_ASSOCIATEEX:
  817. case DOT11_OID_REASSOCIATEEX:
  818. case DOT11_OID_ASSOCIATE:
  819. case DOT11_OID_REASSOCIATE:
  820. prism54_handle_assoc(drv, hdr, len);
  821. default:
  822. break;
  823. }
  824. free(hdr);
  825. }
  826. static void handle_802_3(int sock, void *eloop_ctx, void *sock_ctx)
  827. {
  828. struct hostapd_data *hapd = (struct hostapd_data *) eloop_ctx;
  829. int len;
  830. ieee802_3_hdr *hdr;
  831. hdr = malloc(PIM_BUF_SIZE);
  832. if (hdr == NULL)
  833. return;
  834. len = recv(sock, hdr, PIM_BUF_SIZE, 0);
  835. if (len < 0) {
  836. perror("recv");
  837. free(hdr);
  838. return;
  839. }
  840. if (len < 14) {
  841. wpa_printf(MSG_MSGDUMP, "handle_802_3: too short (%d)", len);
  842. free(hdr);
  843. return;
  844. }
  845. if (hdr->type == htons(ETH_P_PAE)) {
  846. hostapd_eapol_receive(hapd, (u8 *) &hdr->sa[0], (u8 *) &hdr[1],
  847. len - sizeof(*hdr));
  848. }
  849. free(hdr);
  850. }
  851. static int prism54_init_sockets(struct prism54_driver_data *drv,
  852. struct wpa_init_params *params)
  853. {
  854. struct ifreq ifr;
  855. struct sockaddr_ll addr;
  856. drv->sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_PAE));
  857. if (drv->sock < 0) {
  858. perror("socket[PF_PACKET,SOCK_RAW]");
  859. return -1;
  860. }
  861. if (eloop_register_read_sock(drv->sock, handle_802_3, drv->hapd, NULL))
  862. {
  863. printf("Could not register read socket\n");
  864. return -1;
  865. }
  866. memset(&ifr, 0, sizeof(ifr));
  867. if (params->num_bridge && params->bridge[0]) {
  868. printf("opening bridge: %s\n", params->bridge[0]);
  869. os_strlcpy(ifr.ifr_name, params->bridge[0],
  870. sizeof(ifr.ifr_name));
  871. } else {
  872. os_strlcpy(ifr.ifr_name, drv->iface, sizeof(ifr.ifr_name));
  873. }
  874. if (ioctl(drv->sock, SIOCGIFINDEX, &ifr) != 0) {
  875. perror("ioctl(SIOCGIFINDEX)");
  876. return -1;
  877. }
  878. memset(&addr, 0, sizeof(addr));
  879. addr.sll_family = AF_PACKET;
  880. addr.sll_ifindex = ifr.ifr_ifindex;
  881. addr.sll_protocol = htons(ETH_P_PAE);
  882. wpa_printf(MSG_DEBUG, "Opening raw packet socket for ifindex %d",
  883. addr.sll_ifindex);
  884. if (bind(drv->sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
  885. perror("bind");
  886. return -1;
  887. }
  888. memset(&ifr, 0, sizeof(ifr));
  889. os_strlcpy(ifr.ifr_name, drv->iface, sizeof(ifr.ifr_name));
  890. if (ioctl(drv->sock, SIOCGIFHWADDR, &ifr) != 0) {
  891. perror("ioctl(SIOCGIFHWADDR)");
  892. return -1;
  893. }
  894. if (ifr.ifr_hwaddr.sa_family != ARPHRD_ETHER) {
  895. printf("Invalid HW-addr family 0x%04x\n",
  896. ifr.ifr_hwaddr.sa_family);
  897. return -1;
  898. }
  899. memcpy(params->own_addr, ifr.ifr_hwaddr.sa_data, ETH_ALEN);
  900. drv->pim_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
  901. if (drv->pim_sock < 0) {
  902. perror("socket[PF_PACKET,SOCK_RAW]");
  903. return -1;
  904. }
  905. if (eloop_register_read_sock(drv->pim_sock, handle_pim, drv, NULL)) {
  906. printf("Could not register read socket\n");
  907. return -1;
  908. }
  909. memset(&ifr, 0, sizeof(ifr));
  910. snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), "%sap", drv->iface);
  911. if (ioctl(drv->pim_sock, SIOCGIFINDEX, &ifr) != 0) {
  912. perror("ioctl(SIOCGIFINDEX)");
  913. return -1;
  914. }
  915. memset(&addr, 0, sizeof(addr));
  916. addr.sll_family = AF_PACKET;
  917. addr.sll_ifindex = ifr.ifr_ifindex;
  918. addr.sll_protocol = htons(ETH_P_ALL);
  919. wpa_printf(MSG_DEBUG, "Opening raw packet socket for ifindex %d",
  920. addr.sll_ifindex);
  921. if (bind(drv->pim_sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
  922. perror("bind");
  923. return -1;
  924. }
  925. return 0;
  926. }
  927. static void * prism54_driver_init(struct hostapd_data *hapd,
  928. struct wpa_init_params *params)
  929. {
  930. struct prism54_driver_data *drv;
  931. drv = os_zalloc(sizeof(struct prism54_driver_data));
  932. if (drv == NULL) {
  933. printf("Could not allocate memory for hostapd Prism54 driver "
  934. "data\n");
  935. return NULL;
  936. }
  937. drv->hapd = hapd;
  938. drv->pim_sock = drv->sock = -1;
  939. memcpy(drv->iface, params->ifname, sizeof(drv->iface));
  940. if (prism54_init_sockets(drv, params)) {
  941. free(drv);
  942. return NULL;
  943. }
  944. prism54_init_1x(drv);
  945. /* must clean previous elems */
  946. prism54_set_generic_elem(drv->iface, drv, NULL, 0);
  947. return drv;
  948. }
  949. static void prism54_driver_deinit(void *priv)
  950. {
  951. struct prism54_driver_data *drv = priv;
  952. if (drv->pim_sock >= 0)
  953. close(drv->pim_sock);
  954. if (drv->sock >= 0)
  955. close(drv->sock);
  956. free(drv);
  957. }
  958. #else /* HOSTAPD */
  959. struct wpa_driver_prism54_data {
  960. void *wext; /* private data for driver_wext */
  961. void *ctx;
  962. char ifname[IFNAMSIZ + 1];
  963. int sock;
  964. };
  965. #define PRISM54_SET_WPA SIOCIWFIRSTPRIV+12
  966. #define PRISM54_HOSTAPD SIOCIWFIRSTPRIV+25
  967. #define PRISM54_DROP_UNENCRYPTED SIOCIWFIRSTPRIV+26
  968. static void show_set_key_error(struct prism2_hostapd_param *);
  969. static int hostapd_ioctl_prism54(struct wpa_driver_prism54_data *drv,
  970. struct prism2_hostapd_param *param,
  971. int len, int show_err)
  972. {
  973. struct iwreq iwr;
  974. os_memset(&iwr, 0, sizeof(iwr));
  975. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  976. iwr.u.data.pointer = (caddr_t) param;
  977. iwr.u.data.length = len;
  978. if (ioctl(drv->sock, PRISM54_HOSTAPD, &iwr) < 0) {
  979. int ret = errno;
  980. if (show_err)
  981. perror("ioctl[PRISM54_HOSTAPD]");
  982. return ret;
  983. }
  984. return 0;
  985. }
  986. static int wpa_driver_prism54_set_wpa_ie(struct wpa_driver_prism54_data *drv,
  987. const u8 *wpa_ie,
  988. size_t wpa_ie_len)
  989. {
  990. struct prism2_hostapd_param *param;
  991. int res;
  992. size_t blen = PRISM2_HOSTAPD_GENERIC_ELEMENT_HDR_LEN + wpa_ie_len;
  993. if (blen < sizeof(*param))
  994. blen = sizeof(*param);
  995. param = os_zalloc(blen);
  996. if (param == NULL)
  997. return -1;
  998. param->cmd = PRISM2_HOSTAPD_SET_GENERIC_ELEMENT;
  999. param->u.generic_elem.len = wpa_ie_len;
  1000. os_memcpy(param->u.generic_elem.data, wpa_ie, wpa_ie_len);
  1001. res = hostapd_ioctl_prism54(drv, param, blen, 1);
  1002. os_free(param);
  1003. return res;
  1004. }
  1005. /* This is called at wpa_supplicant daemon init time */
  1006. static int wpa_driver_prism54_set_wpa(void *priv, int enabled)
  1007. {
  1008. struct wpa_driver_prism54_data *drv = priv;
  1009. struct prism2_hostapd_param *param;
  1010. int res;
  1011. size_t blen = PRISM2_HOSTAPD_GENERIC_ELEMENT_HDR_LEN;
  1012. if (blen < sizeof(*param))
  1013. blen = sizeof(*param);
  1014. param = os_zalloc(blen);
  1015. if (param == NULL)
  1016. return -1;
  1017. param->cmd = PRISM54_SET_WPA;
  1018. param->u.generic_elem.len = 0;
  1019. res = hostapd_ioctl_prism54(drv, param, blen, 1);
  1020. os_free(param);
  1021. return res;
  1022. }
  1023. static int wpa_driver_prism54_set_key(const char *ifname, void *priv,
  1024. wpa_alg alg,
  1025. const u8 *addr, int key_idx, int set_tx,
  1026. const u8 *seq, size_t seq_len,
  1027. const u8 *key, size_t key_len)
  1028. {
  1029. struct wpa_driver_prism54_data *drv = priv;
  1030. struct prism2_hostapd_param *param;
  1031. u8 *buf;
  1032. size_t blen;
  1033. int ret = 0;
  1034. char *alg_name;
  1035. switch (alg) {
  1036. case WPA_ALG_NONE:
  1037. alg_name = "none";
  1038. return -1;
  1039. break;
  1040. case WPA_ALG_WEP:
  1041. alg_name = "WEP";
  1042. return -1;
  1043. break;
  1044. case WPA_ALG_TKIP:
  1045. alg_name = "TKIP";
  1046. break;
  1047. case WPA_ALG_CCMP:
  1048. alg_name = "CCMP";
  1049. return -1;
  1050. break;
  1051. default:
  1052. return -1;
  1053. }
  1054. wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu "
  1055. "key_len=%lu", __FUNCTION__, alg_name, key_idx, set_tx,
  1056. (unsigned long) seq_len, (unsigned long) key_len);
  1057. if (seq_len > 8)
  1058. return -2;
  1059. blen = sizeof(*param) + key_len;
  1060. buf = os_zalloc(blen);
  1061. if (buf == NULL)
  1062. return -1;
  1063. param = (struct prism2_hostapd_param *) buf;
  1064. param->cmd = PRISM2_SET_ENCRYPTION;
  1065. /* TODO: In theory, STA in client mode can use five keys; four default
  1066. * keys for receiving (with keyidx 0..3) and one individual key for
  1067. * both transmitting and receiving (keyidx 0) _unicast_ packets. Now,
  1068. * keyidx 0 is reserved for this unicast use and default keys can only
  1069. * use keyidx 1..3 (i.e., default key with keyidx 0 is not supported).
  1070. * This should be fine for more or less all cases, but for completeness
  1071. * sake, the driver could be enhanced to support the missing key. */
  1072. #if 0
  1073. if (addr == NULL)
  1074. os_memset(param->sta_addr, 0xff, ETH_ALEN);
  1075. else
  1076. os_memcpy(param->sta_addr, addr, ETH_ALEN);
  1077. #else
  1078. os_memset(param->sta_addr, 0xff, ETH_ALEN);
  1079. #endif
  1080. os_strlcpy((char *) param->u.crypt.alg, alg_name,
  1081. HOSTAP_CRYPT_ALG_NAME_LEN);
  1082. param->u.crypt.flags = set_tx ? HOSTAP_CRYPT_FLAG_SET_TX_KEY : 0;
  1083. param->u.crypt.idx = key_idx;
  1084. os_memcpy(param->u.crypt.seq, seq, seq_len);
  1085. param->u.crypt.key_len = key_len;
  1086. os_memcpy((u8 *) (param + 1), key, key_len);
  1087. if (hostapd_ioctl_prism54(drv, param, blen, 1)) {
  1088. wpa_printf(MSG_WARNING, "Failed to set encryption.");
  1089. show_set_key_error(param);
  1090. ret = -1;
  1091. }
  1092. os_free(buf);
  1093. return ret;
  1094. }
  1095. static int wpa_driver_prism54_set_countermeasures(void *priv,
  1096. int enabled)
  1097. {
  1098. /* FIX */
  1099. printf("wpa_driver_prism54_set_countermeasures - not yet "
  1100. "implemented\n");
  1101. return 0;
  1102. }
  1103. static int wpa_driver_prism54_set_drop_unencrypted(void *priv,
  1104. int enabled)
  1105. {
  1106. struct wpa_driver_prism54_data *drv = priv;
  1107. struct prism2_hostapd_param *param;
  1108. int res;
  1109. size_t blen = PRISM2_HOSTAPD_GENERIC_ELEMENT_HDR_LEN;
  1110. if (blen < sizeof(*param))
  1111. blen = sizeof(*param);
  1112. param = os_zalloc(blen);
  1113. if (param == NULL)
  1114. return -1;
  1115. param->cmd = PRISM54_DROP_UNENCRYPTED;
  1116. param->u.generic_elem.len = 0;
  1117. res = hostapd_ioctl_prism54(drv, param, blen, 1);
  1118. os_free(param);
  1119. return res;
  1120. }
  1121. static int wpa_driver_prism54_deauthenticate(void *priv, const u8 *addr,
  1122. int reason_code)
  1123. {
  1124. /* FIX */
  1125. printf("wpa_driver_prism54_deauthenticate - not yet implemented\n");
  1126. return 0;
  1127. }
  1128. static int wpa_driver_prism54_disassociate(void *priv, const u8 *addr,
  1129. int reason_code)
  1130. {
  1131. /* FIX */
  1132. printf("wpa_driver_prism54_disassociate - not yet implemented\n");
  1133. return 0;
  1134. }
  1135. static int
  1136. wpa_driver_prism54_associate(void *priv,
  1137. struct wpa_driver_associate_params *params)
  1138. {
  1139. struct wpa_driver_prism54_data *drv = priv;
  1140. int ret = 0;
  1141. if (wpa_driver_prism54_set_drop_unencrypted(drv,
  1142. params->drop_unencrypted)
  1143. < 0)
  1144. ret = -1;
  1145. if (wpa_driver_prism54_set_wpa_ie(drv, params->wpa_ie,
  1146. params->wpa_ie_len) < 0)
  1147. ret = -1;
  1148. if (wpa_driver_wext_set_freq(drv->wext, params->freq) < 0)
  1149. ret = -1;
  1150. if (wpa_driver_wext_set_ssid(drv->wext, params->ssid,
  1151. params->ssid_len) < 0)
  1152. ret = -1;
  1153. if (wpa_driver_wext_set_bssid(drv->wext, params->bssid) < 0)
  1154. ret = -1;
  1155. return ret;
  1156. }
  1157. static void show_set_key_error(struct prism2_hostapd_param *param)
  1158. {
  1159. switch (param->u.crypt.err) {
  1160. case HOSTAP_CRYPT_ERR_UNKNOWN_ALG:
  1161. wpa_printf(MSG_INFO, "Unknown algorithm '%s'.",
  1162. param->u.crypt.alg);
  1163. wpa_printf(MSG_INFO, "You may need to load kernel module to "
  1164. "register that algorithm.");
  1165. wpa_printf(MSG_INFO, "E.g., 'modprobe hostap_crypt_wep' for "
  1166. "WEP.");
  1167. break;
  1168. case HOSTAP_CRYPT_ERR_UNKNOWN_ADDR:
  1169. wpa_printf(MSG_INFO, "Unknown address " MACSTR ".",
  1170. MAC2STR(param->sta_addr));
  1171. break;
  1172. case HOSTAP_CRYPT_ERR_CRYPT_INIT_FAILED:
  1173. wpa_printf(MSG_INFO, "Crypt algorithm initialization failed.");
  1174. break;
  1175. case HOSTAP_CRYPT_ERR_KEY_SET_FAILED:
  1176. wpa_printf(MSG_INFO, "Key setting failed.");
  1177. break;
  1178. case HOSTAP_CRYPT_ERR_TX_KEY_SET_FAILED:
  1179. wpa_printf(MSG_INFO, "TX key index setting failed.");
  1180. break;
  1181. case HOSTAP_CRYPT_ERR_CARD_CONF_FAILED:
  1182. wpa_printf(MSG_INFO, "Card configuration failed.");
  1183. break;
  1184. }
  1185. }
  1186. static int wpa_driver_prism54_get_bssid(void *priv, u8 *bssid)
  1187. {
  1188. struct wpa_driver_prism54_data *drv = priv;
  1189. return wpa_driver_wext_get_bssid(drv->wext, bssid);
  1190. }
  1191. static int wpa_driver_prism54_get_ssid(void *priv, u8 *ssid)
  1192. {
  1193. struct wpa_driver_prism54_data *drv = priv;
  1194. return wpa_driver_wext_get_ssid(drv->wext, ssid);
  1195. }
  1196. static int wpa_driver_prism54_scan(void *priv, const u8 *ssid, size_t ssid_len)
  1197. {
  1198. struct wpa_driver_prism54_data *drv = priv;
  1199. return wpa_driver_wext_scan(drv->wext, ssid, ssid_len);
  1200. }
  1201. static struct wpa_scan_results *
  1202. wpa_driver_prism54_get_scan_results(void *priv)
  1203. {
  1204. struct wpa_driver_prism54_data *drv = priv;
  1205. return wpa_driver_wext_get_scan_results(drv->wext);
  1206. }
  1207. static int wpa_driver_prism54_set_operstate(void *priv, int state)
  1208. {
  1209. struct wpa_driver_prism54_data *drv = priv;
  1210. return wpa_driver_wext_set_operstate(drv->wext, state);
  1211. }
  1212. static void * wpa_driver_prism54_init(void *ctx, const char *ifname)
  1213. {
  1214. struct wpa_driver_prism54_data *drv;
  1215. drv = os_zalloc(sizeof(*drv));
  1216. if (drv == NULL)
  1217. return NULL;
  1218. drv->wext = wpa_driver_wext_init(ctx, ifname);
  1219. if (drv->wext == NULL) {
  1220. os_free(drv);
  1221. return NULL;
  1222. }
  1223. drv->ctx = ctx;
  1224. os_strlcpy(drv->ifname, ifname, sizeof(drv->ifname));
  1225. drv->sock = socket(PF_INET, SOCK_DGRAM, 0);
  1226. if (drv->sock < 0) {
  1227. wpa_driver_wext_deinit(drv->wext);
  1228. os_free(drv);
  1229. return NULL;
  1230. }
  1231. wpa_driver_prism54_set_wpa(drv, 1);
  1232. return drv;
  1233. }
  1234. static void wpa_driver_prism54_deinit(void *priv)
  1235. {
  1236. struct wpa_driver_prism54_data *drv = priv;
  1237. wpa_driver_prism54_set_wpa(drv, 0);
  1238. wpa_driver_wext_deinit(drv->wext);
  1239. close(drv->sock);
  1240. os_free(drv);
  1241. }
  1242. #endif /* HOSTAPD */
  1243. const struct wpa_driver_ops wpa_driver_prism54_ops = {
  1244. .name = "prism54",
  1245. .desc = "Prism54.org driver (Intersil Prism GT/Duette/Indigo)",
  1246. .set_key = wpa_driver_prism54_set_key,
  1247. #ifdef HOSTAPD
  1248. .hapd_init = prism54_driver_init,
  1249. .hapd_deinit = prism54_driver_deinit,
  1250. /* .set_ieee8021x = prism54_init_1x, */
  1251. .set_privacy = prism54_set_privacy_invoked,
  1252. .get_seqnum = prism54_get_seqnum,
  1253. .flush = prism54_flush,
  1254. .set_generic_elem = prism54_set_generic_elem,
  1255. .hapd_send_eapol = prism54_send_eapol,
  1256. .sta_set_flags = prism54_sta_set_flags,
  1257. .sta_deauth = prism54_sta_deauth,
  1258. .sta_disassoc = prism54_sta_disassoc,
  1259. .hapd_set_ssid = prism54_ioctl_setiwessid,
  1260. .get_inact_sec = prism54_get_inact_sec,
  1261. #else /* HOSTAPD */
  1262. .get_bssid = wpa_driver_prism54_get_bssid,
  1263. .get_ssid = wpa_driver_prism54_get_ssid,
  1264. .set_countermeasures = wpa_driver_prism54_set_countermeasures,
  1265. .scan = wpa_driver_prism54_scan,
  1266. .get_scan_results2 = wpa_driver_prism54_get_scan_results,
  1267. .deauthenticate = wpa_driver_prism54_deauthenticate,
  1268. .disassociate = wpa_driver_prism54_disassociate,
  1269. .associate = wpa_driver_prism54_associate,
  1270. .init = wpa_driver_prism54_init,
  1271. .deinit = wpa_driver_prism54_deinit,
  1272. .set_operstate = wpa_driver_prism54_set_operstate,
  1273. #endif /* HOSTAPD */
  1274. };