Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 release
[wpasupplicant] / src / drivers / driver_bsd.c
1 /*
2  * WPA Supplicant - driver interaction with BSD net80211 layer
3  * Copyright (c) 2004, Sam Leffler <sam@errno.com>
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License version 2 as
7  * published by the Free Software Foundation.
8  *
9  * Alternatively, this software may be distributed under the terms of BSD
10  * license.
11  *
12  * See README and COPYING for more details.
13  */
14
15 #include "includes.h"
16 #include <sys/ioctl.h>
17
18 #include "common.h"
19 #include "driver.h"
20 #include "eloop.h"
21 #include "ieee802_11_defs.h"
22
23 #include <net/if.h>
24 #include <net/ethernet.h>
25
26 #include <net80211/ieee80211.h>
27 #include <net80211/ieee80211_crypto.h>
28 #include <net80211/ieee80211_ioctl.h>
29
30 struct wpa_driver_bsd_data {
31         int     sock;                   /* open socket for 802.11 ioctls */
32         int     route;                  /* routing socket for events */
33         char    ifname[IFNAMSIZ+1];     /* interface name */
34         unsigned int ifindex;           /* interface index */
35         void    *ctx;
36         int     prev_roaming;           /* roaming state to restore on deinit */
37         int     prev_privacy;           /* privacy state to restore on deinit */
38         int     prev_wpa;               /* wpa state to restore on deinit */
39 };
40
41 static int
42 set80211var(struct wpa_driver_bsd_data *drv, int op, const void *arg, int arg_len)
43 {
44         struct ieee80211req ireq;
45
46         os_memset(&ireq, 0, sizeof(ireq));
47         os_strlcpy(ireq.i_name, drv->ifname, IFNAMSIZ);
48         ireq.i_type = op;
49         ireq.i_len = arg_len;
50         ireq.i_data = (void *) arg;
51
52         if (ioctl(drv->sock, SIOCS80211, &ireq) < 0) {
53                 fprintf(stderr, "ioctl[SIOCS80211, op %u, len %u]: %s\n",
54                         op, arg_len, strerror(errno));
55                 return -1;
56         }
57         return 0;
58 }
59
60 static int
61 get80211var(struct wpa_driver_bsd_data *drv, int op, void *arg, int arg_len)
62 {
63         struct ieee80211req ireq;
64
65         os_memset(&ireq, 0, sizeof(ireq));
66         os_strlcpy(ireq.i_name, drv->ifname, IFNAMSIZ);
67         ireq.i_type = op;
68         ireq.i_len = arg_len;
69         ireq.i_data = arg;
70
71         if (ioctl(drv->sock, SIOCG80211, &ireq) < 0) {
72                 fprintf(stderr, "ioctl[SIOCG80211, op %u, len %u]: %s\n",
73                         op, arg_len, strerror(errno));
74                 return -1;
75         }
76         return ireq.i_len;
77 }
78
79 static int
80 set80211param(struct wpa_driver_bsd_data *drv, int op, int arg)
81 {
82         struct ieee80211req ireq;
83
84         os_memset(&ireq, 0, sizeof(ireq));
85         os_strlcpy(ireq.i_name, drv->ifname, IFNAMSIZ);
86         ireq.i_type = op;
87         ireq.i_val = arg;
88
89         if (ioctl(drv->sock, SIOCS80211, &ireq) < 0) {
90                 fprintf(stderr, "ioctl[SIOCS80211, op %u, arg 0x%x]: %s\n",
91                         op, arg, strerror(errno));
92                 return -1;
93         }
94         return 0;
95 }
96
97 static int
98 get80211param(struct wpa_driver_bsd_data *drv, int op)
99 {
100         struct ieee80211req ireq;
101
102         os_memset(&ireq, 0, sizeof(ireq));
103         os_strlcpy(ireq.i_name, drv->ifname, IFNAMSIZ);
104         ireq.i_type = op;
105
106         if (ioctl(drv->sock, SIOCG80211, &ireq) < 0) {
107                 fprintf(stderr, "ioctl[SIOCG80211, op %u]: %s\n",
108                         op, strerror(errno));
109                 return -1;
110         }
111         return ireq.i_val;
112 }
113
114 static int
115 getifflags(struct wpa_driver_bsd_data *drv, int *flags)
116 {
117         struct ifreq ifr;
118
119         os_memset(&ifr, 0, sizeof(ifr));
120         os_strlcpy(ifr.ifr_name, drv->ifname, sizeof(ifr.ifr_name));
121         if (ioctl(drv->sock, SIOCGIFFLAGS, (caddr_t)&ifr) < 0) {
122                 perror("SIOCGIFFLAGS");
123                 return errno;
124         }
125         *flags = ifr.ifr_flags & 0xffff;
126         return 0;
127 }
128
129 static int
130 setifflags(struct wpa_driver_bsd_data *drv, int flags)
131 {
132         struct ifreq ifr;
133
134         os_memset(&ifr, 0, sizeof(ifr));
135         os_strlcpy(ifr.ifr_name, drv->ifname, sizeof(ifr.ifr_name));
136         ifr.ifr_flags = flags & 0xffff;
137         if (ioctl(drv->sock, SIOCSIFFLAGS, (caddr_t)&ifr) < 0) {
138                 perror("SIOCSIFFLAGS");
139                 return errno;
140         }
141         return 0;
142 }
143
144 static int
145 wpa_driver_bsd_get_bssid(void *priv, u8 *bssid)
146 {
147         struct wpa_driver_bsd_data *drv = priv;
148
149         return get80211var(drv, IEEE80211_IOC_BSSID,
150                 bssid, IEEE80211_ADDR_LEN) < 0 ? -1 : 0;
151 }
152
153 #if 0
154 static int
155 wpa_driver_bsd_set_bssid(void *priv, const char *bssid)
156 {
157         struct wpa_driver_bsd_data *drv = priv;
158
159         return set80211var(drv, IEEE80211_IOC_BSSID,
160                 bssid, IEEE80211_ADDR_LEN);
161 }
162 #endif
163
164 static int
165 wpa_driver_bsd_get_ssid(void *priv, u8 *ssid)
166 {
167         struct wpa_driver_bsd_data *drv = priv;
168
169         return get80211var(drv, IEEE80211_IOC_SSID,
170                 ssid, IEEE80211_NWID_LEN);
171 }
172
173 static int
174 wpa_driver_bsd_set_ssid(void *priv, const char *ssid,
175                              size_t ssid_len)
176 {
177         struct wpa_driver_bsd_data *drv = priv;
178
179         return set80211var(drv, IEEE80211_IOC_SSID, ssid, ssid_len);
180 }
181
182 static int
183 wpa_driver_bsd_set_wpa_ie(struct wpa_driver_bsd_data *drv,
184         const char *wpa_ie, size_t wpa_ie_len)
185 {
186         return set80211var(drv, IEEE80211_IOC_OPTIE, wpa_ie, wpa_ie_len);
187 }
188
189 static int
190 wpa_driver_bsd_set_wpa_internal(void *priv, int wpa, int privacy)
191 {
192         struct wpa_driver_bsd_data *drv = priv;
193         int ret = 0;
194
195         wpa_printf(MSG_DEBUG, "%s: wpa=%d privacy=%d",
196                 __FUNCTION__, wpa, privacy);
197
198         if (!wpa && wpa_driver_bsd_set_wpa_ie(drv, NULL, 0) < 0)
199                 ret = -1;
200         if (set80211param(drv, IEEE80211_IOC_PRIVACY, privacy) < 0)
201                 ret = -1;
202         if (set80211param(drv, IEEE80211_IOC_WPA, wpa) < 0)
203                 ret = -1;
204
205         return ret;
206 }
207
208 static int
209 wpa_driver_bsd_set_wpa(void *priv, int enabled)
210 {
211         wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
212
213         return wpa_driver_bsd_set_wpa_internal(priv, enabled ? 3 : 0, enabled);
214 }
215
216 static int
217 wpa_driver_bsd_del_key(struct wpa_driver_bsd_data *drv, int key_idx,
218                        const unsigned char *addr)
219 {
220         struct ieee80211req_del_key wk;
221
222         os_memset(&wk, 0, sizeof(wk));
223         if (addr != NULL &&
224             bcmp(addr, "\xff\xff\xff\xff\xff\xff", IEEE80211_ADDR_LEN) != 0) {
225                 struct ether_addr ea;
226
227                 os_memcpy(&ea, addr, IEEE80211_ADDR_LEN);
228                 wpa_printf(MSG_DEBUG, "%s: addr=%s keyidx=%d",
229                         __func__, ether_ntoa(&ea), key_idx);
230                 os_memcpy(wk.idk_macaddr, addr, IEEE80211_ADDR_LEN);
231                 wk.idk_keyix = (uint8_t) IEEE80211_KEYIX_NONE;
232         } else {
233                 wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __func__, key_idx);
234                 wk.idk_keyix = key_idx;
235         }
236         return set80211var(drv, IEEE80211_IOC_DELKEY, &wk, sizeof(wk));
237 }
238
239 static int
240 wpa_driver_bsd_set_key(void *priv, wpa_alg alg,
241                        const unsigned char *addr, int key_idx, int set_tx,
242                        const u8 *seq, size_t seq_len,
243                        const u8 *key, size_t key_len)
244 {
245         struct wpa_driver_bsd_data *drv = priv;
246         struct ieee80211req_key wk;
247         struct ether_addr ea;
248         char *alg_name;
249         u_int8_t cipher;
250
251         if (alg == WPA_ALG_NONE)
252                 return wpa_driver_bsd_del_key(drv, key_idx, addr);
253
254         switch (alg) {
255         case WPA_ALG_WEP:
256                 alg_name = "WEP";
257                 cipher = IEEE80211_CIPHER_WEP;
258                 break;
259         case WPA_ALG_TKIP:
260                 alg_name = "TKIP";
261                 cipher = IEEE80211_CIPHER_TKIP;
262                 break;
263         case WPA_ALG_CCMP:
264                 alg_name = "CCMP";
265                 cipher = IEEE80211_CIPHER_AES_CCM;
266                 break;
267         default:
268                 wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d",
269                         __func__, alg);
270                 return -1;
271         }
272
273         os_memcpy(&ea, addr, IEEE80211_ADDR_LEN);
274         wpa_printf(MSG_DEBUG,
275                 "%s: alg=%s addr=%s key_idx=%d set_tx=%d seq_len=%zu key_len=%zu",
276                 __func__, alg_name, ether_ntoa(&ea), key_idx, set_tx,
277                 seq_len, key_len);
278
279         if (seq_len > sizeof(u_int64_t)) {
280                 wpa_printf(MSG_DEBUG, "%s: seq_len %zu too big",
281                         __func__, seq_len);
282                 return -2;
283         }
284         if (key_len > sizeof(wk.ik_keydata)) {
285                 wpa_printf(MSG_DEBUG, "%s: key length %zu too big",
286                         __func__, key_len);
287                 return -3;
288         }
289
290         os_memset(&wk, 0, sizeof(wk));
291         wk.ik_type = cipher;
292         wk.ik_flags = IEEE80211_KEY_RECV;
293         if (set_tx)
294                 wk.ik_flags |= IEEE80211_KEY_XMIT;
295         os_memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN);
296         /*
297          * Deduce whether group/global or unicast key by checking
298          * the address (yech).  Note also that we can only mark global
299          * keys default; doing this for a unicast key is an error.
300          */
301         if (bcmp(addr, "\xff\xff\xff\xff\xff\xff", IEEE80211_ADDR_LEN) == 0) {
302                 wk.ik_flags |= IEEE80211_KEY_GROUP;
303                 wk.ik_keyix = key_idx;
304         } else {
305                 wk.ik_keyix = (key_idx == 0 ? IEEE80211_KEYIX_NONE : key_idx);
306         }
307         if (wk.ik_keyix != IEEE80211_KEYIX_NONE && set_tx)
308                 wk.ik_flags |= IEEE80211_KEY_DEFAULT;
309         wk.ik_keylen = key_len;
310         os_memcpy(&wk.ik_keyrsc, seq, seq_len);
311         os_memcpy(wk.ik_keydata, key, key_len);
312
313         return set80211var(drv, IEEE80211_IOC_WPAKEY, &wk, sizeof(wk));
314 }
315
316 static int
317 wpa_driver_bsd_set_countermeasures(void *priv, int enabled)
318 {
319         struct wpa_driver_bsd_data *drv = priv;
320
321         wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
322         return set80211param(drv, IEEE80211_IOC_COUNTERMEASURES, enabled);
323 }
324
325
326 static int
327 wpa_driver_bsd_set_drop_unencrypted(void *priv, int enabled)
328 {
329         struct wpa_driver_bsd_data *drv = priv;
330
331         wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
332         return set80211param(drv, IEEE80211_IOC_DROPUNENCRYPTED, enabled);
333 }
334
335 static int
336 wpa_driver_bsd_deauthenticate(void *priv, const u8 *addr, int reason_code)
337 {
338         struct wpa_driver_bsd_data *drv = priv;
339         struct ieee80211req_mlme mlme;
340
341         wpa_printf(MSG_DEBUG, "%s", __func__);
342         os_memset(&mlme, 0, sizeof(mlme));
343         mlme.im_op = IEEE80211_MLME_DEAUTH;
344         mlme.im_reason = reason_code;
345         os_memcpy(mlme.im_macaddr, addr, IEEE80211_ADDR_LEN);
346         return set80211var(drv, IEEE80211_IOC_MLME, &mlme, sizeof(mlme));
347 }
348
349 static int
350 wpa_driver_bsd_disassociate(void *priv, const u8 *addr, int reason_code)
351 {
352         struct wpa_driver_bsd_data *drv = priv;
353         struct ieee80211req_mlme mlme;
354
355         wpa_printf(MSG_DEBUG, "%s", __func__);
356         os_memset(&mlme, 0, sizeof(mlme));
357         mlme.im_op = IEEE80211_MLME_DISASSOC;
358         mlme.im_reason = reason_code;
359         os_memcpy(mlme.im_macaddr, addr, IEEE80211_ADDR_LEN);
360         return set80211var(drv, IEEE80211_IOC_MLME, &mlme, sizeof(mlme));
361 }
362
363 static int
364 wpa_driver_bsd_associate(void *priv, struct wpa_driver_associate_params *params)
365 {
366         struct wpa_driver_bsd_data *drv = priv;
367         struct ieee80211req_mlme mlme;
368         int privacy;
369
370         wpa_printf(MSG_DEBUG,
371                 "%s: ssid '%.*s' wpa ie len %u pairwise %u group %u key mgmt %u"
372                 , __func__
373                 , params->ssid_len, params->ssid
374                 , params->wpa_ie_len
375                 , params->pairwise_suite
376                 , params->group_suite
377                 , params->key_mgmt_suite
378         );
379
380         /* XXX error handling is wrong but unclear what to do... */
381         if (wpa_driver_bsd_set_wpa_ie(drv, params->wpa_ie, params->wpa_ie_len) < 0)
382                 return -1;
383 #ifndef NEW_FREEBSD_MLME_ASSOC
384         if (wpa_driver_bsd_set_ssid(drv, params->ssid, params->ssid_len) < 0)
385                 return -1;
386 #endif
387
388         privacy = !(params->pairwise_suite == CIPHER_NONE &&
389             params->group_suite == CIPHER_NONE &&
390             params->key_mgmt_suite == KEY_MGMT_NONE &&
391             params->wpa_ie_len == 0);
392         wpa_printf(MSG_DEBUG, "%s: set PRIVACY %u", __func__, privacy);
393
394         if (set80211param(drv, IEEE80211_IOC_PRIVACY, privacy) < 0)
395                 return -1;
396
397         if (params->wpa_ie_len &&
398             set80211param(drv, IEEE80211_IOC_WPA,
399                           params->wpa_ie[0] == WLAN_EID_RSN ? 2 : 1) < 0)
400                 return -1;
401
402         os_memset(&mlme, 0, sizeof(mlme));
403         mlme.im_op = IEEE80211_MLME_ASSOC;
404 #ifdef NEW_FREEBSD_MLME_ASSOC
405         if (params->ssid != NULL)
406                 os_memcpy(mlme.im_ssid, params->ssid, params->ssid_len);
407         mlme.im_ssid_len = params->ssid_len;
408 #endif
409         if (params->bssid != NULL)
410                 os_memcpy(mlme.im_macaddr, params->bssid, IEEE80211_ADDR_LEN);
411         if (set80211var(drv, IEEE80211_IOC_MLME, &mlme, sizeof(mlme)) < 0)
412                 return -1;
413         return 0;
414 }
415
416 static int
417 wpa_driver_bsd_set_auth_alg(void *priv, int auth_alg)
418 {
419         struct wpa_driver_bsd_data *drv = priv;
420         int authmode;
421
422         if ((auth_alg & AUTH_ALG_OPEN_SYSTEM) &&
423             (auth_alg & AUTH_ALG_SHARED_KEY))
424                 authmode = IEEE80211_AUTH_AUTO;
425         else if (auth_alg & AUTH_ALG_SHARED_KEY)
426                 authmode = IEEE80211_AUTH_SHARED;
427         else
428                 authmode = IEEE80211_AUTH_OPEN;
429
430         return set80211param(drv, IEEE80211_IOC_AUTHMODE, authmode);
431 }
432
433 static int
434 wpa_driver_bsd_scan(void *priv, const u8 *ssid, size_t ssid_len)
435 {
436         struct wpa_driver_bsd_data *drv = priv;
437         int flags;
438
439         /* NB: interface must be marked UP to do a scan */
440         if (getifflags(drv, &flags) != 0 || setifflags(drv, flags | IFF_UP) != 0)
441                 return -1;
442
443         /* set desired ssid before scan */
444         if (wpa_driver_bsd_set_ssid(drv, ssid, ssid_len) < 0)
445                 return -1;
446
447         /* NB: net80211 delivers a scan complete event so no need to poll */
448         return set80211param(drv, IEEE80211_IOC_SCAN_REQ, 0);
449 }
450
451 #include <net/route.h>
452 #include <net80211/ieee80211_freebsd.h>
453
454 static void
455 wpa_driver_bsd_event_receive(int sock, void *ctx, void *sock_ctx)
456 {
457         struct wpa_driver_bsd_data *drv = sock_ctx;
458         char buf[2048];
459         struct if_announcemsghdr *ifan;
460         struct if_msghdr *ifm;
461         struct rt_msghdr *rtm;
462         union wpa_event_data event;
463         struct ieee80211_michael_event *mic;
464         int n;
465
466         n = read(sock, buf, sizeof(buf));
467         if (n < 0) {
468                 if (errno != EINTR && errno != EAGAIN)
469                         perror("read(PF_ROUTE)");
470                 return;
471         }
472
473         rtm = (struct rt_msghdr *) buf;
474         if (rtm->rtm_version != RTM_VERSION) {
475                 wpa_printf(MSG_DEBUG, "Routing message version %d not "
476                         "understood\n", rtm->rtm_version);
477                 return;
478         }
479         os_memset(&event, 0, sizeof(event));
480         switch (rtm->rtm_type) {
481         case RTM_IFANNOUNCE:
482                 ifan = (struct if_announcemsghdr *) rtm;
483                 if (ifan->ifan_index != drv->ifindex)
484                         break;
485                 strlcpy(event.interface_status.ifname, drv->ifname,
486                         sizeof(event.interface_status.ifname));
487                 switch (ifan->ifan_what) {
488                 case IFAN_DEPARTURE:
489                         event.interface_status.ievent = EVENT_INTERFACE_REMOVED;
490                 default:
491                         return;
492                 }
493                 wpa_printf(MSG_DEBUG, "RTM_IFANNOUNCE: Interface '%s' %s",
494                            event.interface_status.ifname,
495                            ifan->ifan_what == IFAN_DEPARTURE ?
496                                 "removed" : "added");
497                 wpa_supplicant_event(ctx, EVENT_INTERFACE_STATUS, &event);
498                 break;
499         case RTM_IEEE80211:
500                 ifan = (struct if_announcemsghdr *) rtm;
501                 if (ifan->ifan_index != drv->ifindex)
502                         break;
503                 switch (ifan->ifan_what) {
504                 case RTM_IEEE80211_ASSOC:
505                 case RTM_IEEE80211_REASSOC:
506                         wpa_supplicant_event(ctx, EVENT_ASSOC, NULL);
507                         break;
508                 case RTM_IEEE80211_DISASSOC:
509                         wpa_supplicant_event(ctx, EVENT_DISASSOC, NULL);
510                         break;
511                 case RTM_IEEE80211_SCAN:
512                         wpa_supplicant_event(ctx, EVENT_SCAN_RESULTS, NULL);
513                         break;
514                 case RTM_IEEE80211_REPLAY:
515                         /* ignore */
516                         break;
517                 case RTM_IEEE80211_MICHAEL:
518                         mic = (struct ieee80211_michael_event *) &ifan[1];
519                         wpa_printf(MSG_DEBUG,
520                                 "Michael MIC failure wireless event: "
521                                 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
522                                 MAC2STR(mic->iev_src));
523
524                         os_memset(&event, 0, sizeof(event));
525                         event.michael_mic_failure.unicast =
526                                 !IEEE80211_IS_MULTICAST(mic->iev_dst);
527                         wpa_supplicant_event(ctx, EVENT_MICHAEL_MIC_FAILURE,
528                                 &event);
529                         break;
530                 }
531                 break;
532         case RTM_IFINFO:
533                 ifm = (struct if_msghdr *) rtm;
534                 if (ifm->ifm_index != drv->ifindex)
535                         break;
536                 if ((rtm->rtm_flags & RTF_UP) == 0) {
537                         strlcpy(event.interface_status.ifname, drv->ifname,
538                                 sizeof(event.interface_status.ifname));
539                         event.interface_status.ievent = EVENT_INTERFACE_REMOVED;
540                         wpa_printf(MSG_DEBUG, "RTM_IFINFO: Interface '%s' DOWN",
541                                    event.interface_status.ifname);
542                         wpa_supplicant_event(ctx, EVENT_INTERFACE_STATUS, &event);
543                 }
544                 break;
545         }
546 }
547
548 /* Compare function for sorting scan results. Return >0 if @b is consider
549  * better. */
550 static int
551 wpa_scan_result_compar(const void *a, const void *b)
552 {
553         const struct wpa_scan_result *wa = a;
554         const struct wpa_scan_result *wb = b;
555
556         /* WPA/WPA2 support preferred */
557         if ((wb->wpa_ie_len || wb->rsn_ie_len) &&
558             !(wa->wpa_ie_len || wa->rsn_ie_len))
559                 return 1;
560         if (!(wb->wpa_ie_len || wb->rsn_ie_len) &&
561             (wa->wpa_ie_len || wa->rsn_ie_len))
562                 return -1;
563
564         /* privacy support preferred */
565         if ((wa->caps & IEEE80211_CAPINFO_PRIVACY) &&
566             (wb->caps & IEEE80211_CAPINFO_PRIVACY) == 0)
567                 return 1;
568         if ((wa->caps & IEEE80211_CAPINFO_PRIVACY) == 0 &&
569             (wb->caps & IEEE80211_CAPINFO_PRIVACY))
570                 return -1;
571
572         /* best/max rate preferred if signal level close enough XXX */
573         if (wa->maxrate != wb->maxrate && abs(wb->level - wa->level) < 5)
574                 return wb->maxrate - wa->maxrate;
575
576         /* use freq for channel preference */
577
578         /* all things being equal, use signal level */
579         return wb->level - wa->level;
580 }
581
582 static int
583 getmaxrate(uint8_t rates[15], uint8_t nrates)
584 {
585         int i, maxrate = -1;
586
587         for (i = 0; i < nrates; i++) {
588                 int rate = rates[i] & IEEE80211_RATE_VAL;
589                 if (rate > maxrate)
590                         rate = maxrate;
591         }
592         return maxrate;
593 }
594
595 /* unalligned little endian access */     
596 #define LE_READ_4(p)                                    \
597         ((u_int32_t)                                    \
598          ((((const u_int8_t *)(p))[0]      ) |          \
599           (((const u_int8_t *)(p))[1] <<  8) |          \
600           (((const u_int8_t *)(p))[2] << 16) |          \
601           (((const u_int8_t *)(p))[3] << 24)))
602
603 static int __inline
604 iswpaoui(const u_int8_t *frm)
605 {
606         return frm[1] > 3 && LE_READ_4(frm+2) == ((WPA_OUI_TYPE<<24)|WPA_OUI);
607 }
608
609 static int
610 wpa_driver_bsd_get_scan_results(void *priv,
611                                      struct wpa_scan_result *results,
612                                      size_t max_size)
613 {
614 #define min(a,b)        ((a)>(b)?(b):(a))
615         struct wpa_driver_bsd_data *drv = priv;
616         uint8_t buf[24*1024];
617         uint8_t *cp, *vp;
618         struct ieee80211req_scan_result *sr;
619         struct wpa_scan_result *wsr;
620         int len, ielen;
621
622         os_memset(results, 0, max_size * sizeof(struct wpa_scan_result));
623
624         len = get80211var(drv, IEEE80211_IOC_SCAN_RESULTS, buf, sizeof(buf));
625         if (len < 0)
626                 return -1;
627         cp = buf;
628         wsr = results;
629         while (len >= sizeof(struct ieee80211req_scan_result)) {
630                 sr = (struct ieee80211req_scan_result *) cp;
631                 os_memcpy(wsr->bssid, sr->isr_bssid, IEEE80211_ADDR_LEN);
632                 wsr->ssid_len = sr->isr_ssid_len;
633                 wsr->freq = sr->isr_freq;
634                 wsr->noise = sr->isr_noise;
635                 wsr->qual = sr->isr_rssi;
636                 wsr->level = 0;         /* XXX? */
637                 wsr->caps = sr->isr_capinfo;
638                 wsr->maxrate = getmaxrate(sr->isr_rates, sr->isr_nrates);
639                 vp = (u_int8_t *)(sr+1);
640                 os_memcpy(wsr->ssid, vp, sr->isr_ssid_len);
641                 if (sr->isr_ie_len > 0) {
642                         vp += sr->isr_ssid_len;
643                         ielen = sr->isr_ie_len;
644                         while (ielen > 0) {
645                                 switch (vp[0]) {
646                                 case IEEE80211_ELEMID_VENDOR:
647                                         if (!iswpaoui(vp))
648                                                 break;
649                                         wsr->wpa_ie_len =
650                                             min(2+vp[1], SSID_MAX_WPA_IE_LEN);
651                                         os_memcpy(wsr->wpa_ie, vp,
652                                                   wsr->wpa_ie_len);
653                                         break;
654                                 case IEEE80211_ELEMID_RSN:
655                                         wsr->rsn_ie_len =
656                                             min(2+vp[1], SSID_MAX_WPA_IE_LEN);
657                                         os_memcpy(wsr->rsn_ie, vp,
658                                                   wsr->rsn_ie_len);
659                                         break;
660                                 }
661                                 ielen -= 2+vp[1];
662                                 vp += 2+vp[1];
663                         }
664                 }
665
666                 cp += sr->isr_len, len -= sr->isr_len;
667                 wsr++;
668         }
669         qsort(results, wsr - results, sizeof(struct wpa_scan_result),
670               wpa_scan_result_compar);
671
672         wpa_printf(MSG_DEBUG, "Received %d bytes of scan results (%d BSSes)",
673                    len, wsr - results);
674
675         return wsr - results;
676 #undef min
677 }
678
679 static void *
680 wpa_driver_bsd_init(void *ctx, const char *ifname)
681 {
682 #define GETPARAM(drv, param, v) \
683         (((v) = get80211param(drv, param)) != -1)
684         struct wpa_driver_bsd_data *drv;
685
686         drv = os_zalloc(sizeof(*drv));
687         if (drv == NULL)
688                 return NULL;
689         /*
690          * NB: We require the interface name be mappable to an index.
691          *     This implies we do not support having wpa_supplicant
692          *     wait for an interface to appear.  This seems ok; that
693          *     doesn't belong here; it's really the job of devd.
694          */
695         drv->ifindex = if_nametoindex(ifname);
696         if (drv->ifindex == 0) {
697                 wpa_printf(MSG_DEBUG, "%s: interface %s does not exist",
698                            __func__, ifname);
699                 goto fail1;
700         }
701         drv->sock = socket(PF_INET, SOCK_DGRAM, 0);
702         if (drv->sock < 0)
703                 goto fail1;
704         drv->route = socket(PF_ROUTE, SOCK_RAW, 0);
705         if (drv->route < 0)
706                 goto fail;
707         eloop_register_read_sock(drv->route,
708                 wpa_driver_bsd_event_receive, ctx, drv);
709
710         drv->ctx = ctx;
711         os_strlcpy(drv->ifname, ifname, sizeof(drv->ifname));
712
713         if (!GETPARAM(drv, IEEE80211_IOC_ROAMING, drv->prev_roaming)) {
714                 wpa_printf(MSG_DEBUG, "%s: failed to get roaming state: %s",
715                         __func__, strerror(errno));
716                 goto fail;
717         }
718         if (!GETPARAM(drv, IEEE80211_IOC_PRIVACY, drv->prev_privacy)) {
719                 wpa_printf(MSG_DEBUG, "%s: failed to get privacy state: %s",
720                         __func__, strerror(errno));
721                 goto fail;
722         }
723         if (!GETPARAM(drv, IEEE80211_IOC_WPA, drv->prev_wpa)) {
724                 wpa_printf(MSG_DEBUG, "%s: failed to get wpa state: %s",
725                         __func__, strerror(errno));
726                 goto fail;
727         }
728         if (set80211param(drv, IEEE80211_IOC_ROAMING, IEEE80211_ROAMING_MANUAL) < 0) {
729                 wpa_printf(MSG_DEBUG, "%s: failed to set wpa_supplicant-based "
730                            "roaming: %s", __func__, strerror(errno));
731                 goto fail;
732         }
733
734         if (set80211param(drv, IEEE80211_IOC_WPA, 1+2) < 0) {
735                 wpa_printf(MSG_DEBUG, "%s: failed to enable WPA support %s",
736                            __func__, strerror(errno));
737                 goto fail;
738         }
739
740         return drv;
741 fail:
742         close(drv->sock);
743 fail1:
744         os_free(drv);
745         return NULL;
746 #undef GETPARAM
747 }
748
749 static void
750 wpa_driver_bsd_deinit(void *priv)
751 {
752         struct wpa_driver_bsd_data *drv = priv;
753         int flags;
754
755         eloop_unregister_read_sock(drv->route);
756
757         /* NB: mark interface down */
758         if (getifflags(drv, &flags) == 0)
759                 (void) setifflags(drv, flags &~ IFF_UP);
760
761         wpa_driver_bsd_set_wpa_internal(drv, drv->prev_wpa, drv->prev_privacy);
762         if (set80211param(drv, IEEE80211_IOC_ROAMING, drv->prev_roaming) < 0)
763                 wpa_printf(MSG_DEBUG, "%s: failed to restore roaming state",
764                         __func__);
765
766         (void) close(drv->route);               /* ioctl socket */
767         (void) close(drv->sock);                /* event socket */
768         os_free(drv);
769 }
770
771
772 const struct wpa_driver_ops wpa_driver_bsd_ops = {
773         .name                   = "bsd",
774         .desc                   = "BSD 802.11 support (Atheros, etc.)",
775         .init                   = wpa_driver_bsd_init,
776         .deinit                 = wpa_driver_bsd_deinit,
777         .get_bssid              = wpa_driver_bsd_get_bssid,
778         .get_ssid               = wpa_driver_bsd_get_ssid,
779         .set_wpa                = wpa_driver_bsd_set_wpa,
780         .set_key                = wpa_driver_bsd_set_key,
781         .set_countermeasures    = wpa_driver_bsd_set_countermeasures,
782         .set_drop_unencrypted   = wpa_driver_bsd_set_drop_unencrypted,
783         .scan                   = wpa_driver_bsd_scan,
784         .get_scan_results       = wpa_driver_bsd_get_scan_results,
785         .deauthenticate         = wpa_driver_bsd_deauthenticate,
786         .disassociate           = wpa_driver_bsd_disassociate,
787         .associate              = wpa_driver_bsd_associate,
788         .set_auth_alg           = wpa_driver_bsd_set_auth_alg,
789 };