driver_wext.c 60 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323
  1. /*
  2. * WPA Supplicant - driver interaction with generic Linux Wireless Extensions
  3. * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. *
  14. * This file implements a driver interface for the Linux Wireless Extensions.
  15. * When used with WE-18 or newer, this interface can be used as-is with number
  16. * of drivers. In addition to this, some of the common functions in this file
  17. * can be used by other driver interface implementations that use generic WE
  18. * ioctls, but require private ioctls for some of the functionality.
  19. */
  20. #include "includes.h"
  21. #include <sys/ioctl.h>
  22. #include <net/if_arp.h>
  23. #include "wireless_copy.h"
  24. #include "common.h"
  25. #include "driver.h"
  26. #include "eloop.h"
  27. #include "priv_netlink.h"
  28. #include "driver_wext.h"
  29. #include "ieee802_11_defs.h"
  30. #include "wpa_common.h"
  31. static int wpa_driver_wext_flush_pmkid(void *priv);
  32. static int wpa_driver_wext_get_range(void *priv);
  33. static void wpa_driver_wext_finish_drv_init(struct wpa_driver_wext_data *drv);
  34. static int wpa_driver_wext_send_oper_ifla(struct wpa_driver_wext_data *drv,
  35. int linkmode, int operstate)
  36. {
  37. struct {
  38. struct nlmsghdr hdr;
  39. struct ifinfomsg ifinfo;
  40. char opts[16];
  41. } req;
  42. struct rtattr *rta;
  43. static int nl_seq;
  44. ssize_t ret;
  45. os_memset(&req, 0, sizeof(req));
  46. req.hdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
  47. req.hdr.nlmsg_type = RTM_SETLINK;
  48. req.hdr.nlmsg_flags = NLM_F_REQUEST;
  49. req.hdr.nlmsg_seq = ++nl_seq;
  50. req.hdr.nlmsg_pid = 0;
  51. req.ifinfo.ifi_family = AF_UNSPEC;
  52. req.ifinfo.ifi_type = 0;
  53. req.ifinfo.ifi_index = drv->ifindex;
  54. req.ifinfo.ifi_flags = 0;
  55. req.ifinfo.ifi_change = 0;
  56. if (linkmode != -1) {
  57. rta = (struct rtattr *)
  58. ((char *) &req + NLMSG_ALIGN(req.hdr.nlmsg_len));
  59. rta->rta_type = IFLA_LINKMODE;
  60. rta->rta_len = RTA_LENGTH(sizeof(char));
  61. *((char *) RTA_DATA(rta)) = linkmode;
  62. req.hdr.nlmsg_len = NLMSG_ALIGN(req.hdr.nlmsg_len) +
  63. RTA_LENGTH(sizeof(char));
  64. }
  65. if (operstate != -1) {
  66. rta = (struct rtattr *)
  67. ((char *) &req + NLMSG_ALIGN(req.hdr.nlmsg_len));
  68. rta->rta_type = IFLA_OPERSTATE;
  69. rta->rta_len = RTA_LENGTH(sizeof(char));
  70. *((char *) RTA_DATA(rta)) = operstate;
  71. req.hdr.nlmsg_len = NLMSG_ALIGN(req.hdr.nlmsg_len) +
  72. RTA_LENGTH(sizeof(char));
  73. }
  74. wpa_printf(MSG_DEBUG, "WEXT: Operstate: linkmode=%d, operstate=%d",
  75. linkmode, operstate);
  76. ret = send(drv->event_sock, &req, req.hdr.nlmsg_len, 0);
  77. if (ret < 0) {
  78. wpa_printf(MSG_DEBUG, "WEXT: Sending operstate IFLA failed: "
  79. "%s (assume operstate is not supported)",
  80. strerror(errno));
  81. }
  82. return ret < 0 ? -1 : 0;
  83. }
  84. int wpa_driver_wext_set_auth_param(struct wpa_driver_wext_data *drv,
  85. int idx, u32 value)
  86. {
  87. struct iwreq iwr;
  88. int ret = 0;
  89. os_memset(&iwr, 0, sizeof(iwr));
  90. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  91. iwr.u.param.flags = idx & IW_AUTH_INDEX;
  92. iwr.u.param.value = value;
  93. if (ioctl(drv->ioctl_sock, SIOCSIWAUTH, &iwr) < 0) {
  94. if (errno != EOPNOTSUPP) {
  95. wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d "
  96. "value 0x%x) failed: %s)",
  97. idx, value, strerror(errno));
  98. }
  99. ret = errno == EOPNOTSUPP ? -2 : -1;
  100. }
  101. return ret;
  102. }
  103. /**
  104. * wpa_driver_wext_get_bssid - Get BSSID, SIOCGIWAP
  105. * @priv: Pointer to private wext data from wpa_driver_wext_init()
  106. * @bssid: Buffer for BSSID
  107. * Returns: 0 on success, -1 on failure
  108. */
  109. int wpa_driver_wext_get_bssid(void *priv, u8 *bssid)
  110. {
  111. struct wpa_driver_wext_data *drv = priv;
  112. struct iwreq iwr;
  113. int ret = 0;
  114. os_memset(&iwr, 0, sizeof(iwr));
  115. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  116. if (ioctl(drv->ioctl_sock, SIOCGIWAP, &iwr) < 0) {
  117. perror("ioctl[SIOCGIWAP]");
  118. ret = -1;
  119. }
  120. os_memcpy(bssid, iwr.u.ap_addr.sa_data, ETH_ALEN);
  121. return ret;
  122. }
  123. /**
  124. * wpa_driver_wext_set_bssid - Set BSSID, SIOCSIWAP
  125. * @priv: Pointer to private wext data from wpa_driver_wext_init()
  126. * @bssid: BSSID
  127. * Returns: 0 on success, -1 on failure
  128. */
  129. int wpa_driver_wext_set_bssid(void *priv, const u8 *bssid)
  130. {
  131. struct wpa_driver_wext_data *drv = priv;
  132. struct iwreq iwr;
  133. int ret = 0;
  134. os_memset(&iwr, 0, sizeof(iwr));
  135. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  136. iwr.u.ap_addr.sa_family = ARPHRD_ETHER;
  137. if (bssid)
  138. os_memcpy(iwr.u.ap_addr.sa_data, bssid, ETH_ALEN);
  139. else
  140. os_memset(iwr.u.ap_addr.sa_data, 0, ETH_ALEN);
  141. if (ioctl(drv->ioctl_sock, SIOCSIWAP, &iwr) < 0) {
  142. perror("ioctl[SIOCSIWAP]");
  143. ret = -1;
  144. }
  145. return ret;
  146. }
  147. /**
  148. * wpa_driver_wext_get_ssid - Get SSID, SIOCGIWESSID
  149. * @priv: Pointer to private wext data from wpa_driver_wext_init()
  150. * @ssid: Buffer for the SSID; must be at least 32 bytes long
  151. * Returns: SSID length on success, -1 on failure
  152. */
  153. int wpa_driver_wext_get_ssid(void *priv, u8 *ssid)
  154. {
  155. struct wpa_driver_wext_data *drv = priv;
  156. struct iwreq iwr;
  157. int ret = 0;
  158. os_memset(&iwr, 0, sizeof(iwr));
  159. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  160. iwr.u.essid.pointer = (caddr_t) ssid;
  161. iwr.u.essid.length = 32;
  162. if (ioctl(drv->ioctl_sock, SIOCGIWESSID, &iwr) < 0) {
  163. perror("ioctl[SIOCGIWESSID]");
  164. ret = -1;
  165. } else {
  166. ret = iwr.u.essid.length;
  167. if (ret > 32)
  168. ret = 32;
  169. /* Some drivers include nul termination in the SSID, so let's
  170. * remove it here before further processing. WE-21 changes this
  171. * to explicitly require the length _not_ to include nul
  172. * termination. */
  173. if (ret > 0 && ssid[ret - 1] == '\0' &&
  174. drv->we_version_compiled < 21)
  175. ret--;
  176. }
  177. return ret;
  178. }
  179. /**
  180. * wpa_driver_wext_set_ssid - Set SSID, SIOCSIWESSID
  181. * @priv: Pointer to private wext data from wpa_driver_wext_init()
  182. * @ssid: SSID
  183. * @ssid_len: Length of SSID (0..32)
  184. * Returns: 0 on success, -1 on failure
  185. */
  186. int wpa_driver_wext_set_ssid(void *priv, const u8 *ssid, size_t ssid_len)
  187. {
  188. struct wpa_driver_wext_data *drv = priv;
  189. struct iwreq iwr;
  190. int ret = 0;
  191. char buf[33];
  192. if (ssid_len > 32)
  193. return -1;
  194. os_memset(&iwr, 0, sizeof(iwr));
  195. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  196. /* flags: 1 = ESSID is active, 0 = not (promiscuous) */
  197. iwr.u.essid.flags = (ssid_len != 0);
  198. os_memset(buf, 0, sizeof(buf));
  199. os_memcpy(buf, ssid, ssid_len);
  200. iwr.u.essid.pointer = (caddr_t) buf;
  201. if (drv->we_version_compiled < 21) {
  202. /* For historic reasons, set SSID length to include one extra
  203. * character, C string nul termination, even though SSID is
  204. * really an octet string that should not be presented as a C
  205. * string. Some Linux drivers decrement the length by one and
  206. * can thus end up missing the last octet of the SSID if the
  207. * length is not incremented here. WE-21 changes this to
  208. * explicitly require the length _not_ to include nul
  209. * termination. */
  210. if (ssid_len)
  211. ssid_len++;
  212. }
  213. iwr.u.essid.length = ssid_len;
  214. if (ioctl(drv->ioctl_sock, SIOCSIWESSID, &iwr) < 0) {
  215. perror("ioctl[SIOCSIWESSID]");
  216. ret = -1;
  217. }
  218. return ret;
  219. }
  220. /**
  221. * wpa_driver_wext_set_freq - Set frequency/channel, SIOCSIWFREQ
  222. * @priv: Pointer to private wext data from wpa_driver_wext_init()
  223. * @freq: Frequency in MHz
  224. * Returns: 0 on success, -1 on failure
  225. */
  226. int wpa_driver_wext_set_freq(void *priv, int freq)
  227. {
  228. struct wpa_driver_wext_data *drv = priv;
  229. struct iwreq iwr;
  230. int ret = 0;
  231. os_memset(&iwr, 0, sizeof(iwr));
  232. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  233. iwr.u.freq.m = freq * 100000;
  234. iwr.u.freq.e = 1;
  235. if (ioctl(drv->ioctl_sock, SIOCSIWFREQ, &iwr) < 0) {
  236. perror("ioctl[SIOCSIWFREQ]");
  237. ret = -1;
  238. }
  239. return ret;
  240. }
  241. static void
  242. wpa_driver_wext_event_wireless_custom(void *ctx, char *custom)
  243. {
  244. union wpa_event_data data;
  245. wpa_printf(MSG_MSGDUMP, "WEXT: Custom wireless event: '%s'",
  246. custom);
  247. os_memset(&data, 0, sizeof(data));
  248. /* Host AP driver */
  249. if (os_strncmp(custom, "MLME-MICHAELMICFAILURE.indication", 33) == 0) {
  250. data.michael_mic_failure.unicast =
  251. os_strstr(custom, " unicast ") != NULL;
  252. /* TODO: parse parameters(?) */
  253. wpa_supplicant_event(ctx, EVENT_MICHAEL_MIC_FAILURE, &data);
  254. } else if (os_strncmp(custom, "ASSOCINFO(ReqIEs=", 17) == 0) {
  255. char *spos;
  256. int bytes;
  257. spos = custom + 17;
  258. bytes = strspn(spos, "0123456789abcdefABCDEF");
  259. if (!bytes || (bytes & 1))
  260. return;
  261. bytes /= 2;
  262. data.assoc_info.req_ies = os_malloc(bytes);
  263. if (data.assoc_info.req_ies == NULL)
  264. return;
  265. data.assoc_info.req_ies_len = bytes;
  266. hexstr2bin(spos, data.assoc_info.req_ies, bytes);
  267. spos += bytes * 2;
  268. data.assoc_info.resp_ies = NULL;
  269. data.assoc_info.resp_ies_len = 0;
  270. if (os_strncmp(spos, " RespIEs=", 9) == 0) {
  271. spos += 9;
  272. bytes = strspn(spos, "0123456789abcdefABCDEF");
  273. if (!bytes || (bytes & 1))
  274. goto done;
  275. bytes /= 2;
  276. data.assoc_info.resp_ies = os_malloc(bytes);
  277. if (data.assoc_info.resp_ies == NULL)
  278. goto done;
  279. data.assoc_info.resp_ies_len = bytes;
  280. hexstr2bin(spos, data.assoc_info.resp_ies, bytes);
  281. }
  282. wpa_supplicant_event(ctx, EVENT_ASSOCINFO, &data);
  283. done:
  284. os_free(data.assoc_info.resp_ies);
  285. os_free(data.assoc_info.req_ies);
  286. #ifdef CONFIG_PEERKEY
  287. } else if (os_strncmp(custom, "STKSTART.request=", 17) == 0) {
  288. if (hwaddr_aton(custom + 17, data.stkstart.peer)) {
  289. wpa_printf(MSG_DEBUG, "WEXT: unrecognized "
  290. "STKSTART.request '%s'", custom + 17);
  291. return;
  292. }
  293. wpa_supplicant_event(ctx, EVENT_STKSTART, &data);
  294. #endif /* CONFIG_PEERKEY */
  295. }
  296. }
  297. static int wpa_driver_wext_event_wireless_michaelmicfailure(
  298. void *ctx, const char *ev, size_t len)
  299. {
  300. const struct iw_michaelmicfailure *mic;
  301. union wpa_event_data data;
  302. if (len < sizeof(*mic))
  303. return -1;
  304. mic = (const struct iw_michaelmicfailure *) ev;
  305. wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
  306. "flags=0x%x src_addr=" MACSTR, mic->flags,
  307. MAC2STR(mic->src_addr.sa_data));
  308. os_memset(&data, 0, sizeof(data));
  309. data.michael_mic_failure.unicast = !(mic->flags & IW_MICFAILURE_GROUP);
  310. wpa_supplicant_event(ctx, EVENT_MICHAEL_MIC_FAILURE, &data);
  311. return 0;
  312. }
  313. static int wpa_driver_wext_event_wireless_pmkidcand(
  314. struct wpa_driver_wext_data *drv, const char *ev, size_t len)
  315. {
  316. const struct iw_pmkid_cand *cand;
  317. union wpa_event_data data;
  318. const u8 *addr;
  319. if (len < sizeof(*cand))
  320. return -1;
  321. cand = (const struct iw_pmkid_cand *) ev;
  322. addr = (const u8 *) cand->bssid.sa_data;
  323. wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: "
  324. "flags=0x%x index=%d bssid=" MACSTR, cand->flags,
  325. cand->index, MAC2STR(addr));
  326. os_memset(&data, 0, sizeof(data));
  327. os_memcpy(data.pmkid_candidate.bssid, addr, ETH_ALEN);
  328. data.pmkid_candidate.index = cand->index;
  329. data.pmkid_candidate.preauth = cand->flags & IW_PMKID_CAND_PREAUTH;
  330. wpa_supplicant_event(drv->ctx, EVENT_PMKID_CANDIDATE, &data);
  331. return 0;
  332. }
  333. static int wpa_driver_wext_event_wireless_assocreqie(
  334. struct wpa_driver_wext_data *drv, const char *ev, int len)
  335. {
  336. if (len < 0)
  337. return -1;
  338. wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev,
  339. len);
  340. os_free(drv->assoc_req_ies);
  341. drv->assoc_req_ies = os_malloc(len);
  342. if (drv->assoc_req_ies == NULL) {
  343. drv->assoc_req_ies_len = 0;
  344. return -1;
  345. }
  346. os_memcpy(drv->assoc_req_ies, ev, len);
  347. drv->assoc_req_ies_len = len;
  348. return 0;
  349. }
  350. static int wpa_driver_wext_event_wireless_assocrespie(
  351. struct wpa_driver_wext_data *drv, const char *ev, int len)
  352. {
  353. if (len < 0)
  354. return -1;
  355. wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev,
  356. len);
  357. os_free(drv->assoc_resp_ies);
  358. drv->assoc_resp_ies = os_malloc(len);
  359. if (drv->assoc_resp_ies == NULL) {
  360. drv->assoc_resp_ies_len = 0;
  361. return -1;
  362. }
  363. os_memcpy(drv->assoc_resp_ies, ev, len);
  364. drv->assoc_resp_ies_len = len;
  365. return 0;
  366. }
  367. static void wpa_driver_wext_event_assoc_ies(struct wpa_driver_wext_data *drv)
  368. {
  369. union wpa_event_data data;
  370. if (drv->assoc_req_ies == NULL && drv->assoc_resp_ies == NULL)
  371. return;
  372. os_memset(&data, 0, sizeof(data));
  373. if (drv->assoc_req_ies) {
  374. data.assoc_info.req_ies = drv->assoc_req_ies;
  375. drv->assoc_req_ies = NULL;
  376. data.assoc_info.req_ies_len = drv->assoc_req_ies_len;
  377. }
  378. if (drv->assoc_resp_ies) {
  379. data.assoc_info.resp_ies = drv->assoc_resp_ies;
  380. drv->assoc_resp_ies = NULL;
  381. data.assoc_info.resp_ies_len = drv->assoc_resp_ies_len;
  382. }
  383. wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &data);
  384. os_free(data.assoc_info.req_ies);
  385. os_free(data.assoc_info.resp_ies);
  386. }
  387. static void wpa_driver_wext_event_wireless(struct wpa_driver_wext_data *drv,
  388. void *ctx, char *data, int len)
  389. {
  390. struct iw_event iwe_buf, *iwe = &iwe_buf;
  391. char *pos, *end, *custom, *buf;
  392. pos = data;
  393. end = data + len;
  394. while (pos + IW_EV_LCP_LEN <= end) {
  395. /* Event data may be unaligned, so make a local, aligned copy
  396. * before processing. */
  397. os_memcpy(&iwe_buf, pos, IW_EV_LCP_LEN);
  398. wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d",
  399. iwe->cmd, iwe->len);
  400. if (iwe->len <= IW_EV_LCP_LEN)
  401. return;
  402. custom = pos + IW_EV_POINT_LEN;
  403. if (drv->we_version_compiled > 18 &&
  404. (iwe->cmd == IWEVMICHAELMICFAILURE ||
  405. iwe->cmd == IWEVCUSTOM ||
  406. iwe->cmd == IWEVASSOCREQIE ||
  407. iwe->cmd == IWEVASSOCRESPIE ||
  408. iwe->cmd == IWEVPMKIDCAND)) {
  409. /* WE-19 removed the pointer from struct iw_point */
  410. char *dpos = (char *) &iwe_buf.u.data.length;
  411. int dlen = dpos - (char *) &iwe_buf;
  412. os_memcpy(dpos, pos + IW_EV_LCP_LEN,
  413. sizeof(struct iw_event) - dlen);
  414. } else {
  415. os_memcpy(&iwe_buf, pos, sizeof(struct iw_event));
  416. custom += IW_EV_POINT_OFF;
  417. }
  418. switch (iwe->cmd) {
  419. case SIOCGIWAP:
  420. wpa_printf(MSG_DEBUG, "Wireless event: new AP: "
  421. MACSTR,
  422. MAC2STR((u8 *) iwe->u.ap_addr.sa_data));
  423. if (is_zero_ether_addr(
  424. (const u8 *) iwe->u.ap_addr.sa_data) ||
  425. os_memcmp(iwe->u.ap_addr.sa_data,
  426. "\x44\x44\x44\x44\x44\x44", ETH_ALEN) ==
  427. 0) {
  428. os_free(drv->assoc_req_ies);
  429. drv->assoc_req_ies = NULL;
  430. os_free(drv->assoc_resp_ies);
  431. drv->assoc_resp_ies = NULL;
  432. wpa_supplicant_event(ctx, EVENT_DISASSOC,
  433. NULL);
  434. } else {
  435. wpa_driver_wext_event_assoc_ies(drv);
  436. wpa_supplicant_event(ctx, EVENT_ASSOC, NULL);
  437. }
  438. break;
  439. case IWEVMICHAELMICFAILURE:
  440. if (custom + iwe->u.data.length > end) {
  441. wpa_printf(MSG_DEBUG, "WEXT: Invalid "
  442. "IWEVMICHAELMICFAILURE length");
  443. return;
  444. }
  445. wpa_driver_wext_event_wireless_michaelmicfailure(
  446. ctx, custom, iwe->u.data.length);
  447. break;
  448. case IWEVCUSTOM:
  449. if (custom + iwe->u.data.length > end) {
  450. wpa_printf(MSG_DEBUG, "WEXT: Invalid "
  451. "IWEVCUSTOM length");
  452. return;
  453. }
  454. buf = os_malloc(iwe->u.data.length + 1);
  455. if (buf == NULL)
  456. return;
  457. os_memcpy(buf, custom, iwe->u.data.length);
  458. buf[iwe->u.data.length] = '\0';
  459. wpa_driver_wext_event_wireless_custom(ctx, buf);
  460. os_free(buf);
  461. break;
  462. case SIOCGIWSCAN:
  463. drv->scan_complete_events = 1;
  464. eloop_cancel_timeout(wpa_driver_wext_scan_timeout,
  465. drv, ctx);
  466. wpa_supplicant_event(ctx, EVENT_SCAN_RESULTS, NULL);
  467. break;
  468. case IWEVASSOCREQIE:
  469. if (custom + iwe->u.data.length > end) {
  470. wpa_printf(MSG_DEBUG, "WEXT: Invalid "
  471. "IWEVASSOCREQIE length");
  472. return;
  473. }
  474. wpa_driver_wext_event_wireless_assocreqie(
  475. drv, custom, iwe->u.data.length);
  476. break;
  477. case IWEVASSOCRESPIE:
  478. if (custom + iwe->u.data.length > end) {
  479. wpa_printf(MSG_DEBUG, "WEXT: Invalid "
  480. "IWEVASSOCRESPIE length");
  481. return;
  482. }
  483. wpa_driver_wext_event_wireless_assocrespie(
  484. drv, custom, iwe->u.data.length);
  485. break;
  486. case IWEVPMKIDCAND:
  487. if (custom + iwe->u.data.length > end) {
  488. wpa_printf(MSG_DEBUG, "WEXT: Invalid "
  489. "IWEVPMKIDCAND length");
  490. return;
  491. }
  492. wpa_driver_wext_event_wireless_pmkidcand(
  493. drv, custom, iwe->u.data.length);
  494. break;
  495. }
  496. pos += iwe->len;
  497. }
  498. }
  499. static void wpa_driver_wext_event_link(struct wpa_driver_wext_data *drv,
  500. void *ctx, char *buf, size_t len,
  501. int del)
  502. {
  503. union wpa_event_data event;
  504. os_memset(&event, 0, sizeof(event));
  505. if (len > sizeof(event.interface_status.ifname))
  506. len = sizeof(event.interface_status.ifname) - 1;
  507. os_memcpy(event.interface_status.ifname, buf, len);
  508. event.interface_status.ievent = del ? EVENT_INTERFACE_REMOVED :
  509. EVENT_INTERFACE_ADDED;
  510. wpa_printf(MSG_DEBUG, "RTM_%sLINK, IFLA_IFNAME: Interface '%s' %s",
  511. del ? "DEL" : "NEW",
  512. event.interface_status.ifname,
  513. del ? "removed" : "added");
  514. if (os_strcmp(drv->ifname, event.interface_status.ifname) == 0) {
  515. if (del)
  516. drv->if_removed = 1;
  517. else
  518. drv->if_removed = 0;
  519. }
  520. wpa_supplicant_event(ctx, EVENT_INTERFACE_STATUS, &event);
  521. }
  522. static int wpa_driver_wext_own_ifname(struct wpa_driver_wext_data *drv,
  523. struct nlmsghdr *h)
  524. {
  525. struct ifinfomsg *ifi;
  526. int attrlen, nlmsg_len, rta_len;
  527. struct rtattr *attr;
  528. ifi = NLMSG_DATA(h);
  529. nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
  530. attrlen = h->nlmsg_len - nlmsg_len;
  531. if (attrlen < 0)
  532. return 0;
  533. attr = (struct rtattr *) (((char *) ifi) + nlmsg_len);
  534. rta_len = RTA_ALIGN(sizeof(struct rtattr));
  535. while (RTA_OK(attr, attrlen)) {
  536. if (attr->rta_type == IFLA_IFNAME) {
  537. if (os_strcmp(((char *) attr) + rta_len, drv->ifname)
  538. == 0)
  539. return 1;
  540. else
  541. break;
  542. }
  543. attr = RTA_NEXT(attr, attrlen);
  544. }
  545. return 0;
  546. }
  547. static int wpa_driver_wext_own_ifindex(struct wpa_driver_wext_data *drv,
  548. int ifindex, struct nlmsghdr *h)
  549. {
  550. if (drv->ifindex == ifindex || drv->ifindex2 == ifindex)
  551. return 1;
  552. if (drv->if_removed && wpa_driver_wext_own_ifname(drv, h)) {
  553. drv->ifindex = if_nametoindex(drv->ifname);
  554. wpa_printf(MSG_DEBUG, "WEXT: Update ifindex for a removed "
  555. "interface");
  556. wpa_driver_wext_finish_drv_init(drv);
  557. return 1;
  558. }
  559. return 0;
  560. }
  561. static void wpa_driver_wext_event_rtm_newlink(struct wpa_driver_wext_data *drv,
  562. void *ctx, struct nlmsghdr *h,
  563. size_t len)
  564. {
  565. struct ifinfomsg *ifi;
  566. int attrlen, nlmsg_len, rta_len;
  567. struct rtattr * attr;
  568. if (len < sizeof(*ifi))
  569. return;
  570. ifi = NLMSG_DATA(h);
  571. if (!wpa_driver_wext_own_ifindex(drv, ifi->ifi_index, h)) {
  572. wpa_printf(MSG_DEBUG, "Ignore event for foreign ifindex %d",
  573. ifi->ifi_index);
  574. return;
  575. }
  576. wpa_printf(MSG_DEBUG, "RTM_NEWLINK: operstate=%d ifi_flags=0x%x "
  577. "(%s%s%s%s)",
  578. drv->operstate, ifi->ifi_flags,
  579. (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
  580. (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
  581. (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
  582. (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
  583. /*
  584. * Some drivers send the association event before the operup event--in
  585. * this case, lifting operstate in wpa_driver_wext_set_operstate()
  586. * fails. This will hit us when wpa_supplicant does not need to do
  587. * IEEE 802.1X authentication
  588. */
  589. if (drv->operstate == 1 &&
  590. (ifi->ifi_flags & (IFF_LOWER_UP | IFF_DORMANT)) == IFF_LOWER_UP &&
  591. !(ifi->ifi_flags & IFF_RUNNING))
  592. wpa_driver_wext_send_oper_ifla(drv, -1, IF_OPER_UP);
  593. nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
  594. attrlen = h->nlmsg_len - nlmsg_len;
  595. if (attrlen < 0)
  596. return;
  597. attr = (struct rtattr *) (((char *) ifi) + nlmsg_len);
  598. rta_len = RTA_ALIGN(sizeof(struct rtattr));
  599. while (RTA_OK(attr, attrlen)) {
  600. if (attr->rta_type == IFLA_WIRELESS) {
  601. wpa_driver_wext_event_wireless(
  602. drv, ctx, ((char *) attr) + rta_len,
  603. attr->rta_len - rta_len);
  604. } else if (attr->rta_type == IFLA_IFNAME) {
  605. wpa_driver_wext_event_link(drv, ctx,
  606. ((char *) attr) + rta_len,
  607. attr->rta_len - rta_len, 0);
  608. }
  609. attr = RTA_NEXT(attr, attrlen);
  610. }
  611. }
  612. static void wpa_driver_wext_event_rtm_dellink(struct wpa_driver_wext_data *drv,
  613. void *ctx, struct nlmsghdr *h,
  614. size_t len)
  615. {
  616. struct ifinfomsg *ifi;
  617. int attrlen, nlmsg_len, rta_len;
  618. struct rtattr * attr;
  619. if (len < sizeof(*ifi))
  620. return;
  621. ifi = NLMSG_DATA(h);
  622. nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
  623. attrlen = h->nlmsg_len - nlmsg_len;
  624. if (attrlen < 0)
  625. return;
  626. attr = (struct rtattr *) (((char *) ifi) + nlmsg_len);
  627. rta_len = RTA_ALIGN(sizeof(struct rtattr));
  628. while (RTA_OK(attr, attrlen)) {
  629. if (attr->rta_type == IFLA_IFNAME) {
  630. wpa_driver_wext_event_link(drv, ctx,
  631. ((char *) attr) + rta_len,
  632. attr->rta_len - rta_len, 1);
  633. }
  634. attr = RTA_NEXT(attr, attrlen);
  635. }
  636. }
  637. static void wpa_driver_wext_event_receive(int sock, void *eloop_ctx,
  638. void *sock_ctx)
  639. {
  640. char buf[8192];
  641. int left;
  642. struct sockaddr_nl from;
  643. socklen_t fromlen;
  644. struct nlmsghdr *h;
  645. int max_events = 10;
  646. try_again:
  647. fromlen = sizeof(from);
  648. left = recvfrom(sock, buf, sizeof(buf), MSG_DONTWAIT,
  649. (struct sockaddr *) &from, &fromlen);
  650. if (left < 0) {
  651. if (errno != EINTR && errno != EAGAIN)
  652. perror("recvfrom(netlink)");
  653. return;
  654. }
  655. h = (struct nlmsghdr *) buf;
  656. while (left >= (int) sizeof(*h)) {
  657. int len, plen;
  658. len = h->nlmsg_len;
  659. plen = len - sizeof(*h);
  660. if (len > left || plen < 0) {
  661. wpa_printf(MSG_DEBUG, "Malformed netlink message: "
  662. "len=%d left=%d plen=%d",
  663. len, left, plen);
  664. break;
  665. }
  666. switch (h->nlmsg_type) {
  667. case RTM_NEWLINK:
  668. wpa_driver_wext_event_rtm_newlink(eloop_ctx, sock_ctx,
  669. h, plen);
  670. break;
  671. case RTM_DELLINK:
  672. wpa_driver_wext_event_rtm_dellink(eloop_ctx, sock_ctx,
  673. h, plen);
  674. break;
  675. }
  676. len = NLMSG_ALIGN(len);
  677. left -= len;
  678. h = (struct nlmsghdr *) ((char *) h + len);
  679. }
  680. if (left > 0) {
  681. wpa_printf(MSG_DEBUG, "%d extra bytes in the end of netlink "
  682. "message", left);
  683. }
  684. if (--max_events > 0) {
  685. /*
  686. * Try to receive all events in one eloop call in order to
  687. * limit race condition on cases where AssocInfo event, Assoc
  688. * event, and EAPOL frames are received more or less at the
  689. * same time. We want to process the event messages first
  690. * before starting EAPOL processing.
  691. */
  692. goto try_again;
  693. }
  694. }
  695. static int wpa_driver_wext_get_ifflags_ifname(struct wpa_driver_wext_data *drv,
  696. const char *ifname, int *flags)
  697. {
  698. struct ifreq ifr;
  699. os_memset(&ifr, 0, sizeof(ifr));
  700. os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
  701. if (ioctl(drv->ioctl_sock, SIOCGIFFLAGS, (caddr_t) &ifr) < 0) {
  702. perror("ioctl[SIOCGIFFLAGS]");
  703. return -1;
  704. }
  705. *flags = ifr.ifr_flags & 0xffff;
  706. return 0;
  707. }
  708. /**
  709. * wpa_driver_wext_get_ifflags - Get interface flags (SIOCGIFFLAGS)
  710. * @drv: driver_wext private data
  711. * @flags: Pointer to returned flags value
  712. * Returns: 0 on success, -1 on failure
  713. */
  714. int wpa_driver_wext_get_ifflags(struct wpa_driver_wext_data *drv, int *flags)
  715. {
  716. return wpa_driver_wext_get_ifflags_ifname(drv, drv->ifname, flags);
  717. }
  718. static int wpa_driver_wext_set_ifflags_ifname(struct wpa_driver_wext_data *drv,
  719. const char *ifname, int flags)
  720. {
  721. struct ifreq ifr;
  722. os_memset(&ifr, 0, sizeof(ifr));
  723. os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
  724. ifr.ifr_flags = flags & 0xffff;
  725. if (ioctl(drv->ioctl_sock, SIOCSIFFLAGS, (caddr_t) &ifr) < 0) {
  726. perror("SIOCSIFFLAGS");
  727. return -1;
  728. }
  729. return 0;
  730. }
  731. /**
  732. * wpa_driver_wext_set_ifflags - Set interface flags (SIOCSIFFLAGS)
  733. * @drv: driver_wext private data
  734. * @flags: New value for flags
  735. * Returns: 0 on success, -1 on failure
  736. */
  737. int wpa_driver_wext_set_ifflags(struct wpa_driver_wext_data *drv, int flags)
  738. {
  739. return wpa_driver_wext_set_ifflags_ifname(drv, drv->ifname, flags);
  740. }
  741. /**
  742. * wpa_driver_wext_init - Initialize WE driver interface
  743. * @ctx: context to be used when calling wpa_supplicant functions,
  744. * e.g., wpa_supplicant_event()
  745. * @ifname: interface name, e.g., wlan0
  746. * Returns: Pointer to private data, %NULL on failure
  747. */
  748. void * wpa_driver_wext_init(void *ctx, const char *ifname)
  749. {
  750. int s;
  751. struct sockaddr_nl local;
  752. struct wpa_driver_wext_data *drv;
  753. drv = os_zalloc(sizeof(*drv));
  754. if (drv == NULL)
  755. return NULL;
  756. drv->ctx = ctx;
  757. os_strlcpy(drv->ifname, ifname, sizeof(drv->ifname));
  758. drv->ioctl_sock = socket(PF_INET, SOCK_DGRAM, 0);
  759. if (drv->ioctl_sock < 0) {
  760. perror("socket(PF_INET,SOCK_DGRAM)");
  761. os_free(drv);
  762. return NULL;
  763. }
  764. s = socket(PF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
  765. if (s < 0) {
  766. perror("socket(PF_NETLINK,SOCK_RAW,NETLINK_ROUTE)");
  767. close(drv->ioctl_sock);
  768. os_free(drv);
  769. return NULL;
  770. }
  771. os_memset(&local, 0, sizeof(local));
  772. local.nl_family = AF_NETLINK;
  773. local.nl_groups = RTMGRP_LINK;
  774. if (bind(s, (struct sockaddr *) &local, sizeof(local)) < 0) {
  775. perror("bind(netlink)");
  776. close(s);
  777. close(drv->ioctl_sock);
  778. os_free(drv);
  779. return NULL;
  780. }
  781. eloop_register_read_sock(s, wpa_driver_wext_event_receive, drv, ctx);
  782. drv->event_sock = s;
  783. drv->mlme_sock = -1;
  784. wpa_driver_wext_finish_drv_init(drv);
  785. return drv;
  786. }
  787. static void wpa_driver_wext_finish_drv_init(struct wpa_driver_wext_data *drv)
  788. {
  789. int flags;
  790. if (wpa_driver_wext_get_ifflags(drv, &flags) != 0)
  791. printf("Could not get interface '%s' flags\n", drv->ifname);
  792. else if (!(flags & IFF_UP)) {
  793. if (wpa_driver_wext_set_ifflags(drv, flags | IFF_UP) != 0) {
  794. printf("Could not set interface '%s' UP\n",
  795. drv->ifname);
  796. } else {
  797. /*
  798. * Wait some time to allow driver to initialize before
  799. * starting configuring the driver. This seems to be
  800. * needed at least some drivers that load firmware etc.
  801. * when the interface is set up.
  802. */
  803. wpa_printf(MSG_DEBUG, "Interface %s set UP - waiting "
  804. "a second for the driver to complete "
  805. "initialization", drv->ifname);
  806. sleep(1);
  807. }
  808. }
  809. /*
  810. * Make sure that the driver does not have any obsolete PMKID entries.
  811. */
  812. wpa_driver_wext_flush_pmkid(drv);
  813. if (wpa_driver_wext_set_mode(drv, 0) < 0) {
  814. printf("Could not configure driver to use managed mode\n");
  815. }
  816. wpa_driver_wext_get_range(drv);
  817. drv->ifindex = if_nametoindex(drv->ifname);
  818. if (os_strncmp(drv->ifname, "wlan", 4) == 0) {
  819. /*
  820. * Host AP driver may use both wlan# and wifi# interface in
  821. * wireless events. Since some of the versions included WE-18
  822. * support, let's add the alternative ifindex also from
  823. * driver_wext.c for the time being. This may be removed at
  824. * some point once it is believed that old versions of the
  825. * driver are not in use anymore.
  826. */
  827. char ifname2[IFNAMSIZ + 1];
  828. os_strlcpy(ifname2, drv->ifname, sizeof(ifname2));
  829. os_memcpy(ifname2, "wifi", 4);
  830. wpa_driver_wext_alternative_ifindex(drv, ifname2);
  831. }
  832. wpa_driver_wext_send_oper_ifla(drv, 1, IF_OPER_DORMANT);
  833. }
  834. /**
  835. * wpa_driver_wext_deinit - Deinitialize WE driver interface
  836. * @priv: Pointer to private wext data from wpa_driver_wext_init()
  837. *
  838. * Shut down driver interface and processing of driver events. Free
  839. * private data buffer if one was allocated in wpa_driver_wext_init().
  840. */
  841. void wpa_driver_wext_deinit(void *priv)
  842. {
  843. struct wpa_driver_wext_data *drv = priv;
  844. int flags;
  845. eloop_cancel_timeout(wpa_driver_wext_scan_timeout, drv, drv->ctx);
  846. /*
  847. * Clear possibly configured driver parameters in order to make it
  848. * easier to use the driver after wpa_supplicant has been terminated.
  849. */
  850. (void) wpa_driver_wext_set_bssid(drv,
  851. (u8 *) "\x00\x00\x00\x00\x00\x00");
  852. wpa_driver_wext_send_oper_ifla(priv, 0, IF_OPER_UP);
  853. eloop_unregister_read_sock(drv->event_sock);
  854. if (drv->mlme_sock >= 0)
  855. eloop_unregister_read_sock(drv->mlme_sock);
  856. if (wpa_driver_wext_get_ifflags(drv, &flags) == 0)
  857. (void) wpa_driver_wext_set_ifflags(drv, flags & ~IFF_UP);
  858. close(drv->event_sock);
  859. close(drv->ioctl_sock);
  860. if (drv->mlme_sock >= 0)
  861. close(drv->mlme_sock);
  862. os_free(drv->assoc_req_ies);
  863. os_free(drv->assoc_resp_ies);
  864. os_free(drv);
  865. }
  866. /**
  867. * wpa_driver_wext_scan_timeout - Scan timeout to report scan completion
  868. * @eloop_ctx: Unused
  869. * @timeout_ctx: ctx argument given to wpa_driver_wext_init()
  870. *
  871. * This function can be used as registered timeout when starting a scan to
  872. * generate a scan completed event if the driver does not report this.
  873. */
  874. void wpa_driver_wext_scan_timeout(void *eloop_ctx, void *timeout_ctx)
  875. {
  876. wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
  877. wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
  878. }
  879. /**
  880. * wpa_driver_wext_scan - Request the driver to initiate scan
  881. * @priv: Pointer to private wext data from wpa_driver_wext_init()
  882. * @ssid: Specific SSID to scan for (ProbeReq) or %NULL to scan for
  883. * all SSIDs (either active scan with broadcast SSID or passive
  884. * scan
  885. * @ssid_len: Length of the SSID
  886. * Returns: 0 on success, -1 on failure
  887. */
  888. int wpa_driver_wext_scan(void *priv, const u8 *ssid, size_t ssid_len)
  889. {
  890. struct wpa_driver_wext_data *drv = priv;
  891. struct iwreq iwr;
  892. int ret = 0, timeout;
  893. struct iw_scan_req req;
  894. if (ssid_len > IW_ESSID_MAX_SIZE) {
  895. wpa_printf(MSG_DEBUG, "%s: too long SSID (%lu)",
  896. __FUNCTION__, (unsigned long) ssid_len);
  897. return -1;
  898. }
  899. os_memset(&iwr, 0, sizeof(iwr));
  900. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  901. if (ssid && ssid_len) {
  902. os_memset(&req, 0, sizeof(req));
  903. req.essid_len = ssid_len;
  904. req.bssid.sa_family = ARPHRD_ETHER;
  905. os_memset(req.bssid.sa_data, 0xff, ETH_ALEN);
  906. os_memcpy(req.essid, ssid, ssid_len);
  907. iwr.u.data.pointer = (caddr_t) &req;
  908. iwr.u.data.length = sizeof(req);
  909. iwr.u.data.flags = IW_SCAN_THIS_ESSID;
  910. }
  911. if (ioctl(drv->ioctl_sock, SIOCSIWSCAN, &iwr) < 0) {
  912. perror("ioctl[SIOCSIWSCAN]");
  913. ret = -1;
  914. }
  915. /* Not all drivers generate "scan completed" wireless event, so try to
  916. * read results after a timeout. */
  917. timeout = 5;
  918. if (drv->scan_complete_events) {
  919. /*
  920. * The driver seems to deliver SIOCGIWSCAN events to notify
  921. * when scan is complete, so use longer timeout to avoid race
  922. * conditions with scanning and following association request.
  923. */
  924. timeout = 30;
  925. }
  926. wpa_printf(MSG_DEBUG, "Scan requested (ret=%d) - scan timeout %d "
  927. "seconds", ret, timeout);
  928. eloop_cancel_timeout(wpa_driver_wext_scan_timeout, drv, drv->ctx);
  929. eloop_register_timeout(timeout, 0, wpa_driver_wext_scan_timeout, drv,
  930. drv->ctx);
  931. return ret;
  932. }
  933. static u8 * wpa_driver_wext_giwscan(struct wpa_driver_wext_data *drv,
  934. size_t *len)
  935. {
  936. struct iwreq iwr;
  937. u8 *res_buf;
  938. size_t res_buf_len;
  939. res_buf_len = IW_SCAN_MAX_DATA;
  940. for (;;) {
  941. res_buf = os_malloc(res_buf_len);
  942. if (res_buf == NULL)
  943. return NULL;
  944. os_memset(&iwr, 0, sizeof(iwr));
  945. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  946. iwr.u.data.pointer = res_buf;
  947. iwr.u.data.length = res_buf_len;
  948. if (ioctl(drv->ioctl_sock, SIOCGIWSCAN, &iwr) == 0)
  949. break;
  950. if (errno == E2BIG && res_buf_len < 100000) {
  951. os_free(res_buf);
  952. res_buf = NULL;
  953. res_buf_len *= 2;
  954. wpa_printf(MSG_DEBUG, "Scan results did not fit - "
  955. "trying larger buffer (%lu bytes)",
  956. (unsigned long) res_buf_len);
  957. } else {
  958. perror("ioctl[SIOCGIWSCAN]");
  959. os_free(res_buf);
  960. return NULL;
  961. }
  962. }
  963. if (iwr.u.data.length > res_buf_len) {
  964. os_free(res_buf);
  965. return NULL;
  966. }
  967. *len = iwr.u.data.length;
  968. return res_buf;
  969. }
  970. /*
  971. * Data structure for collecting WEXT scan results. This is needed to allow
  972. * the various methods of reporting IEs to be combined into a single IE buffer.
  973. */
  974. struct wext_scan_data {
  975. struct wpa_scan_res res;
  976. u8 *ie;
  977. size_t ie_len;
  978. u8 ssid[32];
  979. size_t ssid_len;
  980. int maxrate;
  981. };
  982. static void wext_get_scan_mode(struct iw_event *iwe,
  983. struct wext_scan_data *res)
  984. {
  985. if (iwe->u.mode == IW_MODE_ADHOC)
  986. res->res.caps |= IEEE80211_CAP_IBSS;
  987. else if (iwe->u.mode == IW_MODE_MASTER || iwe->u.mode == IW_MODE_INFRA)
  988. res->res.caps |= IEEE80211_CAP_ESS;
  989. }
  990. static void wext_get_scan_ssid(struct iw_event *iwe,
  991. struct wext_scan_data *res, char *custom,
  992. char *end)
  993. {
  994. int ssid_len = iwe->u.essid.length;
  995. if (custom + ssid_len > end)
  996. return;
  997. if (iwe->u.essid.flags &&
  998. ssid_len > 0 &&
  999. ssid_len <= IW_ESSID_MAX_SIZE) {
  1000. os_memcpy(res->ssid, custom, ssid_len);
  1001. res->ssid_len = ssid_len;
  1002. }
  1003. }
  1004. static void wext_get_scan_freq(struct iw_event *iwe,
  1005. struct wext_scan_data *res)
  1006. {
  1007. int divi = 1000000, i;
  1008. if (iwe->u.freq.e == 0) {
  1009. /*
  1010. * Some drivers do not report frequency, but a channel.
  1011. * Try to map this to frequency by assuming they are using
  1012. * IEEE 802.11b/g. But don't overwrite a previously parsed
  1013. * frequency if the driver sends both frequency and channel,
  1014. * since the driver may be sending an A-band channel that we
  1015. * don't handle here.
  1016. */
  1017. if (res->res.freq)
  1018. return;
  1019. if (iwe->u.freq.m >= 1 && iwe->u.freq.m <= 13) {
  1020. res->res.freq = 2407 + 5 * iwe->u.freq.m;
  1021. return;
  1022. } else if (iwe->u.freq.m == 14) {
  1023. res->res.freq = 2484;
  1024. return;
  1025. }
  1026. }
  1027. if (iwe->u.freq.e > 6) {
  1028. wpa_printf(MSG_DEBUG, "Invalid freq in scan results (BSSID="
  1029. MACSTR " m=%d e=%d)",
  1030. MAC2STR(res->res.bssid), iwe->u.freq.m,
  1031. iwe->u.freq.e);
  1032. return;
  1033. }
  1034. for (i = 0; i < iwe->u.freq.e; i++)
  1035. divi /= 10;
  1036. res->res.freq = iwe->u.freq.m / divi;
  1037. }
  1038. static void wext_get_scan_qual(struct iw_event *iwe,
  1039. struct wext_scan_data *res)
  1040. {
  1041. res->res.qual = iwe->u.qual.qual;
  1042. res->res.noise = iwe->u.qual.noise;
  1043. res->res.level = iwe->u.qual.level;
  1044. }
  1045. static void wext_get_scan_encode(struct iw_event *iwe,
  1046. struct wext_scan_data *res)
  1047. {
  1048. if (!(iwe->u.data.flags & IW_ENCODE_DISABLED))
  1049. res->res.caps |= IEEE80211_CAP_PRIVACY;
  1050. }
  1051. static void wext_get_scan_rate(struct iw_event *iwe,
  1052. struct wext_scan_data *res, char *pos,
  1053. char *end)
  1054. {
  1055. int maxrate;
  1056. char *custom = pos + IW_EV_LCP_LEN;
  1057. struct iw_param p;
  1058. size_t clen;
  1059. clen = iwe->len;
  1060. if (custom + clen > end)
  1061. return;
  1062. maxrate = 0;
  1063. while (((ssize_t) clen) >= (ssize_t) sizeof(struct iw_param)) {
  1064. /* Note: may be misaligned, make a local, aligned copy */
  1065. os_memcpy(&p, custom, sizeof(struct iw_param));
  1066. if (p.value > maxrate)
  1067. maxrate = p.value;
  1068. clen -= sizeof(struct iw_param);
  1069. custom += sizeof(struct iw_param);
  1070. }
  1071. /* Convert the maxrate from WE-style (b/s units) to
  1072. * 802.11 rates (500000 b/s units).
  1073. */
  1074. res->maxrate = maxrate / 500000;
  1075. }
  1076. static void wext_get_scan_iwevgenie(struct iw_event *iwe,
  1077. struct wext_scan_data *res, char *custom,
  1078. char *end)
  1079. {
  1080. char *genie, *gpos, *gend;
  1081. u8 *tmp;
  1082. if (iwe->u.data.length == 0)
  1083. return;
  1084. gpos = genie = custom;
  1085. gend = genie + iwe->u.data.length;
  1086. if (gend > end) {
  1087. wpa_printf(MSG_INFO, "IWEVGENIE overflow");
  1088. return;
  1089. }
  1090. tmp = os_realloc(res->ie, res->ie_len + gend - gpos);
  1091. if (tmp == NULL)
  1092. return;
  1093. os_memcpy(tmp + res->ie_len, gpos, gend - gpos);
  1094. res->ie = tmp;
  1095. res->ie_len += gend - gpos;
  1096. }
  1097. static void wext_get_scan_custom(struct iw_event *iwe,
  1098. struct wext_scan_data *res, char *custom,
  1099. char *end)
  1100. {
  1101. size_t clen;
  1102. u8 *tmp;
  1103. clen = iwe->u.data.length;
  1104. if (custom + clen > end)
  1105. return;
  1106. if (clen > 7 && os_strncmp(custom, "wpa_ie=", 7) == 0) {
  1107. char *spos;
  1108. int bytes;
  1109. spos = custom + 7;
  1110. bytes = custom + clen - spos;
  1111. if (bytes & 1 || bytes == 0)
  1112. return;
  1113. bytes /= 2;
  1114. tmp = os_realloc(res->ie, res->ie_len + bytes);
  1115. if (tmp == NULL)
  1116. return;
  1117. hexstr2bin(spos, tmp + res->ie_len, bytes);
  1118. res->ie = tmp;
  1119. res->ie_len += bytes;
  1120. } else if (clen > 7 && os_strncmp(custom, "rsn_ie=", 7) == 0) {
  1121. char *spos;
  1122. int bytes;
  1123. spos = custom + 7;
  1124. bytes = custom + clen - spos;
  1125. if (bytes & 1 || bytes == 0)
  1126. return;
  1127. bytes /= 2;
  1128. tmp = os_realloc(res->ie, res->ie_len + bytes);
  1129. if (tmp == NULL)
  1130. return;
  1131. hexstr2bin(spos, tmp + res->ie_len, bytes);
  1132. res->ie = tmp;
  1133. res->ie_len += bytes;
  1134. } else if (clen > 4 && os_strncmp(custom, "tsf=", 4) == 0) {
  1135. char *spos;
  1136. int bytes;
  1137. u8 bin[8];
  1138. spos = custom + 4;
  1139. bytes = custom + clen - spos;
  1140. if (bytes != 16) {
  1141. wpa_printf(MSG_INFO, "Invalid TSF length (%d)", bytes);
  1142. return;
  1143. }
  1144. bytes /= 2;
  1145. hexstr2bin(spos, bin, bytes);
  1146. res->res.tsf += WPA_GET_BE64(bin);
  1147. }
  1148. }
  1149. static int wext_19_iw_point(struct wpa_driver_wext_data *drv, u16 cmd)
  1150. {
  1151. return drv->we_version_compiled > 18 &&
  1152. (cmd == SIOCGIWESSID || cmd == SIOCGIWENCODE ||
  1153. cmd == IWEVGENIE || cmd == IWEVCUSTOM);
  1154. }
  1155. static void wpa_driver_wext_add_scan_entry(struct wpa_scan_results *res,
  1156. struct wext_scan_data *data)
  1157. {
  1158. struct wpa_scan_res **tmp;
  1159. struct wpa_scan_res *r;
  1160. size_t extra_len;
  1161. u8 *pos, *end, *ssid_ie = NULL, *rate_ie = NULL;
  1162. /* Figure out whether we need to fake any IEs */
  1163. pos = data->ie;
  1164. end = pos + data->ie_len;
  1165. while (pos && pos + 1 < end) {
  1166. if (pos + 2 + pos[1] > end)
  1167. break;
  1168. if (pos[0] == WLAN_EID_SSID)
  1169. ssid_ie = pos;
  1170. else if (pos[0] == WLAN_EID_SUPP_RATES)
  1171. rate_ie = pos;
  1172. else if (pos[0] == WLAN_EID_EXT_SUPP_RATES)
  1173. rate_ie = pos;
  1174. pos += 2 + pos[1];
  1175. }
  1176. extra_len = 0;
  1177. if (ssid_ie == NULL)
  1178. extra_len += 2 + data->ssid_len;
  1179. if (rate_ie == NULL && data->maxrate)
  1180. extra_len += 3;
  1181. r = os_zalloc(sizeof(*r) + extra_len + data->ie_len);
  1182. if (r == NULL)
  1183. return;
  1184. os_memcpy(r, &data->res, sizeof(*r));
  1185. r->ie_len = extra_len + data->ie_len;
  1186. pos = (u8 *) (r + 1);
  1187. if (ssid_ie == NULL) {
  1188. /*
  1189. * Generate a fake SSID IE since the driver did not report
  1190. * a full IE list.
  1191. */
  1192. *pos++ = WLAN_EID_SSID;
  1193. *pos++ = data->ssid_len;
  1194. os_memcpy(pos, data->ssid, data->ssid_len);
  1195. pos += data->ssid_len;
  1196. }
  1197. if (rate_ie == NULL && data->maxrate) {
  1198. /*
  1199. * Generate a fake Supported Rates IE since the driver did not
  1200. * report a full IE list.
  1201. */
  1202. *pos++ = WLAN_EID_SUPP_RATES;
  1203. *pos++ = 1;
  1204. *pos++ = data->maxrate;
  1205. }
  1206. if (data->ie)
  1207. os_memcpy(pos, data->ie, data->ie_len);
  1208. tmp = os_realloc(res->res,
  1209. (res->num + 1) * sizeof(struct wpa_scan_res *));
  1210. if (tmp == NULL) {
  1211. os_free(r);
  1212. return;
  1213. }
  1214. tmp[res->num++] = r;
  1215. res->res = tmp;
  1216. }
  1217. /**
  1218. * wpa_driver_wext_get_scan_results - Fetch the latest scan results
  1219. * @priv: Pointer to private wext data from wpa_driver_wext_init()
  1220. * Returns: Scan results on success, -1 on failure
  1221. */
  1222. struct wpa_scan_results * wpa_driver_wext_get_scan_results(void *priv)
  1223. {
  1224. struct wpa_driver_wext_data *drv = priv;
  1225. size_t ap_num = 0, len;
  1226. int first;
  1227. u8 *res_buf;
  1228. struct iw_event iwe_buf, *iwe = &iwe_buf;
  1229. char *pos, *end, *custom;
  1230. struct wpa_scan_results *res;
  1231. struct wext_scan_data data;
  1232. res_buf = wpa_driver_wext_giwscan(drv, &len);
  1233. if (res_buf == NULL)
  1234. return NULL;
  1235. ap_num = 0;
  1236. first = 1;
  1237. res = os_zalloc(sizeof(*res));
  1238. if (res == NULL) {
  1239. os_free(res_buf);
  1240. return NULL;
  1241. }
  1242. pos = (char *) res_buf;
  1243. end = (char *) res_buf + len;
  1244. os_memset(&data, 0, sizeof(data));
  1245. while (pos + IW_EV_LCP_LEN <= end) {
  1246. /* Event data may be unaligned, so make a local, aligned copy
  1247. * before processing. */
  1248. os_memcpy(&iwe_buf, pos, IW_EV_LCP_LEN);
  1249. if (iwe->len <= IW_EV_LCP_LEN)
  1250. break;
  1251. custom = pos + IW_EV_POINT_LEN;
  1252. if (wext_19_iw_point(drv, iwe->cmd)) {
  1253. /* WE-19 removed the pointer from struct iw_point */
  1254. char *dpos = (char *) &iwe_buf.u.data.length;
  1255. int dlen = dpos - (char *) &iwe_buf;
  1256. os_memcpy(dpos, pos + IW_EV_LCP_LEN,
  1257. sizeof(struct iw_event) - dlen);
  1258. } else {
  1259. os_memcpy(&iwe_buf, pos, sizeof(struct iw_event));
  1260. custom += IW_EV_POINT_OFF;
  1261. }
  1262. switch (iwe->cmd) {
  1263. case SIOCGIWAP:
  1264. if (!first)
  1265. wpa_driver_wext_add_scan_entry(res, &data);
  1266. first = 0;
  1267. os_free(data.ie);
  1268. os_memset(&data, 0, sizeof(data));
  1269. os_memcpy(data.res.bssid,
  1270. iwe->u.ap_addr.sa_data, ETH_ALEN);
  1271. break;
  1272. case SIOCGIWMODE:
  1273. wext_get_scan_mode(iwe, &data);
  1274. break;
  1275. case SIOCGIWESSID:
  1276. wext_get_scan_ssid(iwe, &data, custom, end);
  1277. break;
  1278. case SIOCGIWFREQ:
  1279. wext_get_scan_freq(iwe, &data);
  1280. break;
  1281. case IWEVQUAL:
  1282. wext_get_scan_qual(iwe, &data);
  1283. break;
  1284. case SIOCGIWENCODE:
  1285. wext_get_scan_encode(iwe, &data);
  1286. break;
  1287. case SIOCGIWRATE:
  1288. wext_get_scan_rate(iwe, &data, pos, end);
  1289. break;
  1290. case IWEVGENIE:
  1291. wext_get_scan_iwevgenie(iwe, &data, custom, end);
  1292. break;
  1293. case IWEVCUSTOM:
  1294. wext_get_scan_custom(iwe, &data, custom, end);
  1295. break;
  1296. }
  1297. pos += iwe->len;
  1298. }
  1299. os_free(res_buf);
  1300. res_buf = NULL;
  1301. if (!first)
  1302. wpa_driver_wext_add_scan_entry(res, &data);
  1303. os_free(data.ie);
  1304. wpa_printf(MSG_DEBUG, "Received %lu bytes of scan results (%lu BSSes)",
  1305. (unsigned long) len, (unsigned long) res->num);
  1306. return res;
  1307. }
  1308. static int wpa_driver_wext_get_range(void *priv)
  1309. {
  1310. struct wpa_driver_wext_data *drv = priv;
  1311. struct iw_range *range;
  1312. struct iwreq iwr;
  1313. int minlen;
  1314. size_t buflen;
  1315. /*
  1316. * Use larger buffer than struct iw_range in order to allow the
  1317. * structure to grow in the future.
  1318. */
  1319. buflen = sizeof(struct iw_range) + 500;
  1320. range = os_zalloc(buflen);
  1321. if (range == NULL)
  1322. return -1;
  1323. os_memset(&iwr, 0, sizeof(iwr));
  1324. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  1325. iwr.u.data.pointer = (caddr_t) range;
  1326. iwr.u.data.length = buflen;
  1327. minlen = ((char *) &range->enc_capa) - (char *) range +
  1328. sizeof(range->enc_capa);
  1329. if (ioctl(drv->ioctl_sock, SIOCGIWRANGE, &iwr) < 0) {
  1330. perror("ioctl[SIOCGIWRANGE]");
  1331. os_free(range);
  1332. return -1;
  1333. } else if (iwr.u.data.length >= minlen &&
  1334. range->we_version_compiled >= 18) {
  1335. wpa_printf(MSG_DEBUG, "SIOCGIWRANGE: WE(compiled)=%d "
  1336. "WE(source)=%d enc_capa=0x%x",
  1337. range->we_version_compiled,
  1338. range->we_version_source,
  1339. range->enc_capa);
  1340. drv->has_capability = 1;
  1341. drv->we_version_compiled = range->we_version_compiled;
  1342. if (range->enc_capa & IW_ENC_CAPA_WPA) {
  1343. drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA |
  1344. WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK;
  1345. }
  1346. if (range->enc_capa & IW_ENC_CAPA_WPA2) {
  1347. drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
  1348. WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK;
  1349. }
  1350. drv->capa.enc |= WPA_DRIVER_CAPA_ENC_WEP40 |
  1351. WPA_DRIVER_CAPA_ENC_WEP104;
  1352. if (range->enc_capa & IW_ENC_CAPA_CIPHER_TKIP)
  1353. drv->capa.enc |= WPA_DRIVER_CAPA_ENC_TKIP;
  1354. if (range->enc_capa & IW_ENC_CAPA_CIPHER_CCMP)
  1355. drv->capa.enc |= WPA_DRIVER_CAPA_ENC_CCMP;
  1356. if (range->enc_capa & IW_ENC_CAPA_4WAY_HANDSHAKE)
  1357. drv->capa.flags |= WPA_DRIVER_FLAGS_4WAY_HANDSHAKE;
  1358. wpa_printf(MSG_DEBUG, " capabilities: key_mgmt 0x%x enc 0x%x "
  1359. "flags 0x%x",
  1360. drv->capa.key_mgmt, drv->capa.enc, drv->capa.flags);
  1361. } else {
  1362. wpa_printf(MSG_DEBUG, "SIOCGIWRANGE: too old (short) data - "
  1363. "assuming WPA is not supported");
  1364. }
  1365. os_free(range);
  1366. return 0;
  1367. }
  1368. static int wpa_driver_wext_set_wpa(void *priv, int enabled)
  1369. {
  1370. struct wpa_driver_wext_data *drv = priv;
  1371. wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
  1372. return wpa_driver_wext_set_auth_param(drv, IW_AUTH_WPA_ENABLED,
  1373. enabled);
  1374. }
  1375. static int wpa_driver_wext_set_psk(struct wpa_driver_wext_data *drv,
  1376. const u8 *psk)
  1377. {
  1378. struct iw_encode_ext *ext;
  1379. struct iwreq iwr;
  1380. int ret;
  1381. wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
  1382. if (!(drv->capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE))
  1383. return 0;
  1384. if (!psk)
  1385. return 0;
  1386. os_memset(&iwr, 0, sizeof(iwr));
  1387. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  1388. ext = os_zalloc(sizeof(*ext) + PMK_LEN);
  1389. if (ext == NULL)
  1390. return -1;
  1391. iwr.u.encoding.pointer = (caddr_t) ext;
  1392. iwr.u.encoding.length = sizeof(*ext) + PMK_LEN;
  1393. ext->key_len = PMK_LEN;
  1394. os_memcpy(&ext->key, psk, ext->key_len);
  1395. ext->alg = IW_ENCODE_ALG_PMK;
  1396. ret = ioctl(drv->ioctl_sock, SIOCSIWENCODEEXT, &iwr);
  1397. if (ret < 0)
  1398. perror("ioctl[SIOCSIWENCODEEXT] PMK");
  1399. os_free(ext);
  1400. return ret;
  1401. }
  1402. static int wpa_driver_wext_set_key_ext(void *priv, wpa_alg alg,
  1403. const u8 *addr, int key_idx,
  1404. int set_tx, const u8 *seq,
  1405. size_t seq_len,
  1406. const u8 *key, size_t key_len)
  1407. {
  1408. struct wpa_driver_wext_data *drv = priv;
  1409. struct iwreq iwr;
  1410. int ret = 0;
  1411. struct iw_encode_ext *ext;
  1412. if (seq_len > IW_ENCODE_SEQ_MAX_SIZE) {
  1413. wpa_printf(MSG_DEBUG, "%s: Invalid seq_len %lu",
  1414. __FUNCTION__, (unsigned long) seq_len);
  1415. return -1;
  1416. }
  1417. ext = os_zalloc(sizeof(*ext) + key_len);
  1418. if (ext == NULL)
  1419. return -1;
  1420. os_memset(&iwr, 0, sizeof(iwr));
  1421. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  1422. iwr.u.encoding.flags = key_idx + 1;
  1423. if (alg == WPA_ALG_NONE)
  1424. iwr.u.encoding.flags |= IW_ENCODE_DISABLED;
  1425. iwr.u.encoding.pointer = (caddr_t) ext;
  1426. iwr.u.encoding.length = sizeof(*ext) + key_len;
  1427. if (addr == NULL ||
  1428. os_memcmp(addr, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0)
  1429. ext->ext_flags |= IW_ENCODE_EXT_GROUP_KEY;
  1430. if (set_tx)
  1431. ext->ext_flags |= IW_ENCODE_EXT_SET_TX_KEY;
  1432. ext->addr.sa_family = ARPHRD_ETHER;
  1433. if (addr)
  1434. os_memcpy(ext->addr.sa_data, addr, ETH_ALEN);
  1435. else
  1436. os_memset(ext->addr.sa_data, 0xff, ETH_ALEN);
  1437. if (key && key_len) {
  1438. os_memcpy(ext + 1, key, key_len);
  1439. ext->key_len = key_len;
  1440. }
  1441. switch (alg) {
  1442. case WPA_ALG_NONE:
  1443. ext->alg = IW_ENCODE_ALG_NONE;
  1444. break;
  1445. case WPA_ALG_WEP:
  1446. ext->alg = IW_ENCODE_ALG_WEP;
  1447. break;
  1448. case WPA_ALG_TKIP:
  1449. ext->alg = IW_ENCODE_ALG_TKIP;
  1450. break;
  1451. case WPA_ALG_CCMP:
  1452. ext->alg = IW_ENCODE_ALG_CCMP;
  1453. break;
  1454. case WPA_ALG_PMK:
  1455. ext->alg = IW_ENCODE_ALG_PMK;
  1456. break;
  1457. #ifdef WEXT_MFP_PENDING
  1458. #ifdef CONFIG_IEEE80211W
  1459. case WPA_ALG_IGTK:
  1460. ext->alg = IW_ENCODE_ALG_AES_CMAC;
  1461. break;
  1462. #endif /* CONFIG_IEEE80211W */
  1463. #endif /* WEXT_MFP_PENDING */
  1464. default:
  1465. wpa_printf(MSG_DEBUG, "%s: Unknown algorithm %d",
  1466. __FUNCTION__, alg);
  1467. os_free(ext);
  1468. return -1;
  1469. }
  1470. if (seq && seq_len) {
  1471. ext->ext_flags |= IW_ENCODE_EXT_RX_SEQ_VALID;
  1472. os_memcpy(ext->rx_seq, seq, seq_len);
  1473. }
  1474. if (ioctl(drv->ioctl_sock, SIOCSIWENCODEEXT, &iwr) < 0) {
  1475. ret = errno == EOPNOTSUPP ? -2 : -1;
  1476. if (errno == ENODEV) {
  1477. /*
  1478. * ndiswrapper seems to be returning incorrect error
  1479. * code.. */
  1480. ret = -2;
  1481. }
  1482. perror("ioctl[SIOCSIWENCODEEXT]");
  1483. }
  1484. os_free(ext);
  1485. return ret;
  1486. }
  1487. /**
  1488. * wpa_driver_wext_set_key - Configure encryption key
  1489. * @priv: Pointer to private wext data from wpa_driver_wext_init()
  1490. * @priv: Private driver interface data
  1491. * @alg: Encryption algorithm (%WPA_ALG_NONE, %WPA_ALG_WEP,
  1492. * %WPA_ALG_TKIP, %WPA_ALG_CCMP); %WPA_ALG_NONE clears the key.
  1493. * @addr: Address of the peer STA or ff:ff:ff:ff:ff:ff for
  1494. * broadcast/default keys
  1495. * @key_idx: key index (0..3), usually 0 for unicast keys
  1496. * @set_tx: Configure this key as the default Tx key (only used when
  1497. * driver does not support separate unicast/individual key
  1498. * @seq: Sequence number/packet number, seq_len octets, the next
  1499. * packet number to be used for in replay protection; configured
  1500. * for Rx keys (in most cases, this is only used with broadcast
  1501. * keys and set to zero for unicast keys)
  1502. * @seq_len: Length of the seq, depends on the algorithm:
  1503. * TKIP: 6 octets, CCMP: 6 octets
  1504. * @key: Key buffer; TKIP: 16-byte temporal key, 8-byte Tx Mic key,
  1505. * 8-byte Rx Mic Key
  1506. * @key_len: Length of the key buffer in octets (WEP: 5 or 13,
  1507. * TKIP: 32, CCMP: 16)
  1508. * Returns: 0 on success, -1 on failure
  1509. *
  1510. * This function uses SIOCSIWENCODEEXT by default, but tries to use
  1511. * SIOCSIWENCODE if the extended ioctl fails when configuring a WEP key.
  1512. */
  1513. int wpa_driver_wext_set_key(void *priv, wpa_alg alg,
  1514. const u8 *addr, int key_idx,
  1515. int set_tx, const u8 *seq, size_t seq_len,
  1516. const u8 *key, size_t key_len)
  1517. {
  1518. struct wpa_driver_wext_data *drv = priv;
  1519. struct iwreq iwr;
  1520. int ret = 0;
  1521. wpa_printf(MSG_DEBUG, "%s: alg=%d key_idx=%d set_tx=%d seq_len=%lu "
  1522. "key_len=%lu",
  1523. __FUNCTION__, alg, key_idx, set_tx,
  1524. (unsigned long) seq_len, (unsigned long) key_len);
  1525. ret = wpa_driver_wext_set_key_ext(drv, alg, addr, key_idx, set_tx,
  1526. seq, seq_len, key, key_len);
  1527. if (ret == 0)
  1528. return 0;
  1529. if (ret == -2 &&
  1530. (alg == WPA_ALG_NONE || alg == WPA_ALG_WEP)) {
  1531. wpa_printf(MSG_DEBUG, "Driver did not support "
  1532. "SIOCSIWENCODEEXT, trying SIOCSIWENCODE");
  1533. ret = 0;
  1534. } else {
  1535. wpa_printf(MSG_DEBUG, "Driver did not support "
  1536. "SIOCSIWENCODEEXT");
  1537. return ret;
  1538. }
  1539. os_memset(&iwr, 0, sizeof(iwr));
  1540. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  1541. iwr.u.encoding.flags = key_idx + 1;
  1542. if (alg == WPA_ALG_NONE)
  1543. iwr.u.encoding.flags |= IW_ENCODE_DISABLED;
  1544. iwr.u.encoding.pointer = (caddr_t) key;
  1545. iwr.u.encoding.length = key_len;
  1546. if (ioctl(drv->ioctl_sock, SIOCSIWENCODE, &iwr) < 0) {
  1547. perror("ioctl[SIOCSIWENCODE]");
  1548. ret = -1;
  1549. }
  1550. if (set_tx && alg != WPA_ALG_NONE) {
  1551. os_memset(&iwr, 0, sizeof(iwr));
  1552. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  1553. iwr.u.encoding.flags = key_idx + 1;
  1554. iwr.u.encoding.pointer = (caddr_t) NULL;
  1555. iwr.u.encoding.length = 0;
  1556. if (ioctl(drv->ioctl_sock, SIOCSIWENCODE, &iwr) < 0) {
  1557. perror("ioctl[SIOCSIWENCODE] (set_tx)");
  1558. ret = -1;
  1559. }
  1560. }
  1561. return ret;
  1562. }
  1563. static int wpa_driver_wext_set_countermeasures(void *priv,
  1564. int enabled)
  1565. {
  1566. struct wpa_driver_wext_data *drv = priv;
  1567. wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
  1568. return wpa_driver_wext_set_auth_param(drv,
  1569. IW_AUTH_TKIP_COUNTERMEASURES,
  1570. enabled);
  1571. }
  1572. static int wpa_driver_wext_set_drop_unencrypted(void *priv,
  1573. int enabled)
  1574. {
  1575. struct wpa_driver_wext_data *drv = priv;
  1576. wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
  1577. drv->use_crypt = enabled;
  1578. return wpa_driver_wext_set_auth_param(drv, IW_AUTH_DROP_UNENCRYPTED,
  1579. enabled);
  1580. }
  1581. static int wpa_driver_wext_mlme(struct wpa_driver_wext_data *drv,
  1582. const u8 *addr, int cmd, int reason_code)
  1583. {
  1584. struct iwreq iwr;
  1585. struct iw_mlme mlme;
  1586. int ret = 0;
  1587. os_memset(&iwr, 0, sizeof(iwr));
  1588. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  1589. os_memset(&mlme, 0, sizeof(mlme));
  1590. mlme.cmd = cmd;
  1591. mlme.reason_code = reason_code;
  1592. mlme.addr.sa_family = ARPHRD_ETHER;
  1593. os_memcpy(mlme.addr.sa_data, addr, ETH_ALEN);
  1594. iwr.u.data.pointer = (caddr_t) &mlme;
  1595. iwr.u.data.length = sizeof(mlme);
  1596. if (ioctl(drv->ioctl_sock, SIOCSIWMLME, &iwr) < 0) {
  1597. perror("ioctl[SIOCSIWMLME]");
  1598. ret = -1;
  1599. }
  1600. return ret;
  1601. }
  1602. static int wpa_driver_wext_deauthenticate(void *priv, const u8 *addr,
  1603. int reason_code)
  1604. {
  1605. struct wpa_driver_wext_data *drv = priv;
  1606. wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
  1607. return wpa_driver_wext_mlme(drv, addr, IW_MLME_DEAUTH, reason_code);
  1608. }
  1609. static int wpa_driver_wext_disassociate(void *priv, const u8 *addr,
  1610. int reason_code)
  1611. {
  1612. struct wpa_driver_wext_data *drv = priv;
  1613. wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
  1614. return wpa_driver_wext_mlme(drv, addr, IW_MLME_DISASSOC,
  1615. reason_code);
  1616. }
  1617. static int wpa_driver_wext_set_gen_ie(void *priv, const u8 *ie,
  1618. size_t ie_len)
  1619. {
  1620. struct wpa_driver_wext_data *drv = priv;
  1621. struct iwreq iwr;
  1622. int ret = 0;
  1623. os_memset(&iwr, 0, sizeof(iwr));
  1624. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  1625. iwr.u.data.pointer = (caddr_t) ie;
  1626. iwr.u.data.length = ie_len;
  1627. if (ioctl(drv->ioctl_sock, SIOCSIWGENIE, &iwr) < 0) {
  1628. perror("ioctl[SIOCSIWGENIE]");
  1629. ret = -1;
  1630. }
  1631. return ret;
  1632. }
  1633. int wpa_driver_wext_cipher2wext(int cipher)
  1634. {
  1635. switch (cipher) {
  1636. case CIPHER_NONE:
  1637. return IW_AUTH_CIPHER_NONE;
  1638. case CIPHER_WEP40:
  1639. return IW_AUTH_CIPHER_WEP40;
  1640. case CIPHER_TKIP:
  1641. return IW_AUTH_CIPHER_TKIP;
  1642. case CIPHER_CCMP:
  1643. return IW_AUTH_CIPHER_CCMP;
  1644. case CIPHER_WEP104:
  1645. return IW_AUTH_CIPHER_WEP104;
  1646. default:
  1647. return 0;
  1648. }
  1649. }
  1650. int wpa_driver_wext_keymgmt2wext(int keymgmt)
  1651. {
  1652. switch (keymgmt) {
  1653. case KEY_MGMT_802_1X:
  1654. case KEY_MGMT_802_1X_NO_WPA:
  1655. return IW_AUTH_KEY_MGMT_802_1X;
  1656. case KEY_MGMT_PSK:
  1657. return IW_AUTH_KEY_MGMT_PSK;
  1658. default:
  1659. return 0;
  1660. }
  1661. }
  1662. static int
  1663. wpa_driver_wext_auth_alg_fallback(struct wpa_driver_wext_data *drv,
  1664. struct wpa_driver_associate_params *params)
  1665. {
  1666. struct iwreq iwr;
  1667. int ret = 0;
  1668. wpa_printf(MSG_DEBUG, "WEXT: Driver did not support "
  1669. "SIOCSIWAUTH for AUTH_ALG, trying SIOCSIWENCODE");
  1670. os_memset(&iwr, 0, sizeof(iwr));
  1671. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  1672. /* Just changing mode, not actual keys */
  1673. iwr.u.encoding.flags = 0;
  1674. iwr.u.encoding.pointer = (caddr_t) NULL;
  1675. iwr.u.encoding.length = 0;
  1676. /*
  1677. * Note: IW_ENCODE_{OPEN,RESTRICTED} can be interpreted to mean two
  1678. * different things. Here they are used to indicate Open System vs.
  1679. * Shared Key authentication algorithm. However, some drivers may use
  1680. * them to select between open/restricted WEP encrypted (open = allow
  1681. * both unencrypted and encrypted frames; restricted = only allow
  1682. * encrypted frames).
  1683. */
  1684. if (!drv->use_crypt) {
  1685. iwr.u.encoding.flags |= IW_ENCODE_DISABLED;
  1686. } else {
  1687. if (params->auth_alg & AUTH_ALG_OPEN_SYSTEM)
  1688. iwr.u.encoding.flags |= IW_ENCODE_OPEN;
  1689. if (params->auth_alg & AUTH_ALG_SHARED_KEY)
  1690. iwr.u.encoding.flags |= IW_ENCODE_RESTRICTED;
  1691. }
  1692. if (ioctl(drv->ioctl_sock, SIOCSIWENCODE, &iwr) < 0) {
  1693. perror("ioctl[SIOCSIWENCODE]");
  1694. ret = -1;
  1695. }
  1696. return ret;
  1697. }
  1698. int wpa_driver_wext_associate(void *priv,
  1699. struct wpa_driver_associate_params *params)
  1700. {
  1701. struct wpa_driver_wext_data *drv = priv;
  1702. int ret = 0;
  1703. int allow_unencrypted_eapol;
  1704. int value;
  1705. wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
  1706. /*
  1707. * If the driver did not support SIOCSIWAUTH, fallback to
  1708. * SIOCSIWENCODE here.
  1709. */
  1710. if (drv->auth_alg_fallback &&
  1711. wpa_driver_wext_auth_alg_fallback(drv, params) < 0)
  1712. ret = -1;
  1713. if (!params->bssid &&
  1714. wpa_driver_wext_set_bssid(drv, NULL) < 0)
  1715. ret = -1;
  1716. /* TODO: should consider getting wpa version and cipher/key_mgmt suites
  1717. * from configuration, not from here, where only the selected suite is
  1718. * available */
  1719. if (wpa_driver_wext_set_gen_ie(drv, params->wpa_ie, params->wpa_ie_len)
  1720. < 0)
  1721. ret = -1;
  1722. if (params->wpa_ie == NULL || params->wpa_ie_len == 0)
  1723. value = IW_AUTH_WPA_VERSION_DISABLED;
  1724. else if (params->wpa_ie[0] == WLAN_EID_RSN)
  1725. value = IW_AUTH_WPA_VERSION_WPA2;
  1726. else
  1727. value = IW_AUTH_WPA_VERSION_WPA;
  1728. if (wpa_driver_wext_set_auth_param(drv,
  1729. IW_AUTH_WPA_VERSION, value) < 0)
  1730. ret = -1;
  1731. value = wpa_driver_wext_cipher2wext(params->pairwise_suite);
  1732. if (wpa_driver_wext_set_auth_param(drv,
  1733. IW_AUTH_CIPHER_PAIRWISE, value) < 0)
  1734. ret = -1;
  1735. value = wpa_driver_wext_cipher2wext(params->group_suite);
  1736. if (wpa_driver_wext_set_auth_param(drv,
  1737. IW_AUTH_CIPHER_GROUP, value) < 0)
  1738. ret = -1;
  1739. value = wpa_driver_wext_keymgmt2wext(params->key_mgmt_suite);
  1740. if (wpa_driver_wext_set_auth_param(drv,
  1741. IW_AUTH_KEY_MGMT, value) < 0)
  1742. ret = -1;
  1743. value = params->key_mgmt_suite != KEY_MGMT_NONE ||
  1744. params->pairwise_suite != CIPHER_NONE ||
  1745. params->group_suite != CIPHER_NONE ||
  1746. params->wpa_ie_len;
  1747. if (wpa_driver_wext_set_auth_param(drv,
  1748. IW_AUTH_PRIVACY_INVOKED, value) < 0)
  1749. ret = -1;
  1750. /* Allow unencrypted EAPOL messages even if pairwise keys are set when
  1751. * not using WPA. IEEE 802.1X specifies that these frames are not
  1752. * encrypted, but WPA encrypts them when pairwise keys are in use. */
  1753. if (params->key_mgmt_suite == KEY_MGMT_802_1X ||
  1754. params->key_mgmt_suite == KEY_MGMT_PSK)
  1755. allow_unencrypted_eapol = 0;
  1756. else
  1757. allow_unencrypted_eapol = 1;
  1758. if (wpa_driver_wext_set_psk(drv, params->psk) < 0)
  1759. ret = -1;
  1760. if (wpa_driver_wext_set_auth_param(drv,
  1761. IW_AUTH_RX_UNENCRYPTED_EAPOL,
  1762. allow_unencrypted_eapol) < 0)
  1763. ret = -1;
  1764. #ifdef WEXT_MFP_PENDING
  1765. #ifdef CONFIG_IEEE80211W
  1766. switch (params->mgmt_frame_protection) {
  1767. case NO_MGMT_FRAME_PROTECTION:
  1768. value = IW_AUTH_MFP_DISABLED;
  1769. break;
  1770. case MGMT_FRAME_PROTECTION_OPTIONAL:
  1771. value = IW_AUTH_MFP_OPTIONAL;
  1772. break;
  1773. case MGMT_FRAME_PROTECTION_REQUIRED:
  1774. value = IW_AUTH_MFP_REQUIRED;
  1775. break;
  1776. };
  1777. if (wpa_driver_wext_set_auth_param(drv, IW_AUTH_MFP, value) < 0)
  1778. ret = -1;
  1779. #endif /* CONFIG_IEEE80211W */
  1780. #endif /* WEXT_MFP_PENDING */
  1781. if (params->freq && wpa_driver_wext_set_freq(drv, params->freq) < 0)
  1782. ret = -1;
  1783. if (wpa_driver_wext_set_ssid(drv, params->ssid, params->ssid_len) < 0)
  1784. ret = -1;
  1785. if (params->bssid &&
  1786. wpa_driver_wext_set_bssid(drv, params->bssid) < 0)
  1787. ret = -1;
  1788. return ret;
  1789. }
  1790. static int wpa_driver_wext_set_auth_alg(void *priv, int auth_alg)
  1791. {
  1792. struct wpa_driver_wext_data *drv = priv;
  1793. int algs = 0, res;
  1794. if (auth_alg & AUTH_ALG_OPEN_SYSTEM)
  1795. algs |= IW_AUTH_ALG_OPEN_SYSTEM;
  1796. if (auth_alg & AUTH_ALG_SHARED_KEY)
  1797. algs |= IW_AUTH_ALG_SHARED_KEY;
  1798. if (auth_alg & AUTH_ALG_LEAP)
  1799. algs |= IW_AUTH_ALG_LEAP;
  1800. if (algs == 0) {
  1801. /* at least one algorithm should be set */
  1802. algs = IW_AUTH_ALG_OPEN_SYSTEM;
  1803. }
  1804. res = wpa_driver_wext_set_auth_param(drv, IW_AUTH_80211_AUTH_ALG,
  1805. algs);
  1806. drv->auth_alg_fallback = res == -2;
  1807. return res;
  1808. }
  1809. /**
  1810. * wpa_driver_wext_set_mode - Set wireless mode (infra/adhoc), SIOCSIWMODE
  1811. * @priv: Pointer to private wext data from wpa_driver_wext_init()
  1812. * @mode: 0 = infra/BSS (associate with an AP), 1 = adhoc/IBSS
  1813. * Returns: 0 on success, -1 on failure
  1814. */
  1815. int wpa_driver_wext_set_mode(void *priv, int mode)
  1816. {
  1817. struct wpa_driver_wext_data *drv = priv;
  1818. struct iwreq iwr;
  1819. int ret = -1, flags;
  1820. unsigned int new_mode = mode ? IW_MODE_ADHOC : IW_MODE_INFRA;
  1821. os_memset(&iwr, 0, sizeof(iwr));
  1822. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  1823. iwr.u.mode = new_mode;
  1824. if (ioctl(drv->ioctl_sock, SIOCSIWMODE, &iwr) == 0) {
  1825. ret = 0;
  1826. goto done;
  1827. }
  1828. if (errno != EBUSY) {
  1829. perror("ioctl[SIOCSIWMODE]");
  1830. goto done;
  1831. }
  1832. /* mac80211 doesn't allow mode changes while the device is up, so if
  1833. * the device isn't in the mode we're about to change to, take device
  1834. * down, try to set the mode again, and bring it back up.
  1835. */
  1836. if (ioctl(drv->ioctl_sock, SIOCGIWMODE, &iwr) < 0) {
  1837. perror("ioctl[SIOCGIWMODE]");
  1838. goto done;
  1839. }
  1840. if (iwr.u.mode == new_mode) {
  1841. ret = 0;
  1842. goto done;
  1843. }
  1844. if (wpa_driver_wext_get_ifflags(drv, &flags) == 0) {
  1845. (void) wpa_driver_wext_set_ifflags(drv, flags & ~IFF_UP);
  1846. /* Try to set the mode again while the interface is down */
  1847. iwr.u.mode = new_mode;
  1848. if (ioctl(drv->ioctl_sock, SIOCSIWMODE, &iwr) < 0)
  1849. perror("ioctl[SIOCSIWMODE]");
  1850. else
  1851. ret = 0;
  1852. /* Ignore return value of get_ifflags to ensure that the device
  1853. * is always up like it was before this function was called.
  1854. */
  1855. (void) wpa_driver_wext_get_ifflags(drv, &flags);
  1856. (void) wpa_driver_wext_set_ifflags(drv, flags | IFF_UP);
  1857. }
  1858. done:
  1859. return ret;
  1860. }
  1861. static int wpa_driver_wext_pmksa(struct wpa_driver_wext_data *drv,
  1862. u32 cmd, const u8 *bssid, const u8 *pmkid)
  1863. {
  1864. struct iwreq iwr;
  1865. struct iw_pmksa pmksa;
  1866. int ret = 0;
  1867. os_memset(&iwr, 0, sizeof(iwr));
  1868. os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
  1869. os_memset(&pmksa, 0, sizeof(pmksa));
  1870. pmksa.cmd = cmd;
  1871. pmksa.bssid.sa_family = ARPHRD_ETHER;
  1872. if (bssid)
  1873. os_memcpy(pmksa.bssid.sa_data, bssid, ETH_ALEN);
  1874. if (pmkid)
  1875. os_memcpy(pmksa.pmkid, pmkid, IW_PMKID_LEN);
  1876. iwr.u.data.pointer = (caddr_t) &pmksa;
  1877. iwr.u.data.length = sizeof(pmksa);
  1878. if (ioctl(drv->ioctl_sock, SIOCSIWPMKSA, &iwr) < 0) {
  1879. if (errno != EOPNOTSUPP)
  1880. perror("ioctl[SIOCSIWPMKSA]");
  1881. ret = -1;
  1882. }
  1883. return ret;
  1884. }
  1885. static int wpa_driver_wext_add_pmkid(void *priv, const u8 *bssid,
  1886. const u8 *pmkid)
  1887. {
  1888. struct wpa_driver_wext_data *drv = priv;
  1889. return wpa_driver_wext_pmksa(drv, IW_PMKSA_ADD, bssid, pmkid);
  1890. }
  1891. static int wpa_driver_wext_remove_pmkid(void *priv, const u8 *bssid,
  1892. const u8 *pmkid)
  1893. {
  1894. struct wpa_driver_wext_data *drv = priv;
  1895. return wpa_driver_wext_pmksa(drv, IW_PMKSA_REMOVE, bssid, pmkid);
  1896. }
  1897. static int wpa_driver_wext_flush_pmkid(void *priv)
  1898. {
  1899. struct wpa_driver_wext_data *drv = priv;
  1900. return wpa_driver_wext_pmksa(drv, IW_PMKSA_FLUSH, NULL, NULL);
  1901. }
  1902. int wpa_driver_wext_get_capa(void *priv, struct wpa_driver_capa *capa)
  1903. {
  1904. struct wpa_driver_wext_data *drv = priv;
  1905. if (!drv->has_capability)
  1906. return -1;
  1907. os_memcpy(capa, &drv->capa, sizeof(*capa));
  1908. return 0;
  1909. }
  1910. int wpa_driver_wext_alternative_ifindex(struct wpa_driver_wext_data *drv,
  1911. const char *ifname)
  1912. {
  1913. if (ifname == NULL) {
  1914. drv->ifindex2 = -1;
  1915. return 0;
  1916. }
  1917. drv->ifindex2 = if_nametoindex(ifname);
  1918. if (drv->ifindex2 <= 0)
  1919. return -1;
  1920. wpa_printf(MSG_DEBUG, "Added alternative ifindex %d (%s) for "
  1921. "wireless events", drv->ifindex2, ifname);
  1922. return 0;
  1923. }
  1924. int wpa_driver_wext_set_operstate(void *priv, int state)
  1925. {
  1926. struct wpa_driver_wext_data *drv = priv;
  1927. wpa_printf(MSG_DEBUG, "%s: operstate %d->%d (%s)",
  1928. __func__, drv->operstate, state, state ? "UP" : "DORMANT");
  1929. drv->operstate = state;
  1930. return wpa_driver_wext_send_oper_ifla(
  1931. drv, -1, state ? IF_OPER_UP : IF_OPER_DORMANT);
  1932. }
  1933. int wpa_driver_wext_get_version(struct wpa_driver_wext_data *drv)
  1934. {
  1935. return drv->we_version_compiled;
  1936. }
  1937. const struct wpa_driver_ops wpa_driver_wext_ops = {
  1938. .name = "wext",
  1939. .desc = "Linux wireless extensions (generic)",
  1940. .get_bssid = wpa_driver_wext_get_bssid,
  1941. .get_ssid = wpa_driver_wext_get_ssid,
  1942. .set_wpa = wpa_driver_wext_set_wpa,
  1943. .set_key = wpa_driver_wext_set_key,
  1944. .set_countermeasures = wpa_driver_wext_set_countermeasures,
  1945. .set_drop_unencrypted = wpa_driver_wext_set_drop_unencrypted,
  1946. .scan = wpa_driver_wext_scan,
  1947. .get_scan_results2 = wpa_driver_wext_get_scan_results,
  1948. .deauthenticate = wpa_driver_wext_deauthenticate,
  1949. .disassociate = wpa_driver_wext_disassociate,
  1950. .set_mode = wpa_driver_wext_set_mode,
  1951. .associate = wpa_driver_wext_associate,
  1952. .set_auth_alg = wpa_driver_wext_set_auth_alg,
  1953. .init = wpa_driver_wext_init,
  1954. .deinit = wpa_driver_wext_deinit,
  1955. .add_pmkid = wpa_driver_wext_add_pmkid,
  1956. .remove_pmkid = wpa_driver_wext_remove_pmkid,
  1957. .flush_pmkid = wpa_driver_wext_flush_pmkid,
  1958. .get_capa = wpa_driver_wext_get_capa,
  1959. .set_operstate = wpa_driver_wext_set_operstate,
  1960. };