1a399b765Szf /*
2d62bc4baSyz  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
3a399b765Szf  * Use is subject to license terms.
4a399b765Szf  */
5a399b765Szf 
6a399b765Szf /*
7a399b765Szf  * Copyright (c) 2004, Sam Leffler <sam@errno.com>
8a399b765Szf  * Sun elects to license this software under the BSD license.
9a399b765Szf  * See README for more details.
10a399b765Szf  */
11a399b765Szf 
12a399b765Szf #include <stdio.h>
13a399b765Szf #include <stdlib.h>
14a399b765Szf #include <errno.h>
15a399b765Szf #include <stdarg.h>
16a399b765Szf #include <fcntl.h>
17a399b765Szf #include <unistd.h>
18a399b765Szf #include <stropts.h>
19a399b765Szf #include <string.h>
20a399b765Szf #include <stddef.h>
21a399b765Szf 
22a399b765Szf #include "wpa_impl.h"
23a399b765Szf #include "driver.h"
24a399b765Szf 
25a399b765Szf #define	WPA_STATUS(status)	(status == DLADM_STATUS_OK? 0 : -1)
26a399b765Szf 
27a399b765Szf /*
28a399b765Szf  * get_bssid - get the current BSSID
29d62bc4baSyz  * @linkid: linkid of the given interface
30a399b765Szf  * @bssid: buffer for BSSID (IEEE80211_ADDR_LEN = 6 bytes)
31a399b765Szf  *
32a399b765Szf  * Returns: 0 on success, -1 on failure
33a399b765Szf  *
34a399b765Szf  * Query kernel driver for the current BSSID and copy it to @bssid.
35a399b765Szf  * Setting @bssid to 00:00:00:00:00:00 is recommended if the STA is not
36a399b765Szf  * associated.
37a399b765Szf  */
38a399b765Szf int
wpa_driver_wifi_get_bssid(dladm_handle_t handle,datalink_id_t linkid,char * bssid)39*4ac67f02SAnurag S. Maskey wpa_driver_wifi_get_bssid(dladm_handle_t handle, datalink_id_t linkid,
40*4ac67f02SAnurag S. Maskey     char *bssid)
41a399b765Szf {
42d62bc4baSyz 	dladm_status_t status;
43a399b765Szf 	dladm_wlan_linkattr_t attr;
44a399b765Szf 	dladm_wlan_attr_t *wl_attrp;
45a399b765Szf 
46*4ac67f02SAnurag S. Maskey 	status = dladm_wlan_get_linkattr(handle, linkid, &attr);
47d62bc4baSyz 	if (status != DLADM_STATUS_OK)
48a399b765Szf 		return (-1);
49a399b765Szf 
50a399b765Szf 	wl_attrp = &attr.la_wlan_attr;
51a399b765Szf 	if ((attr.la_valid & DLADM_WLAN_LINKATTR_WLAN) == 0 ||
52a399b765Szf 	    (wl_attrp->wa_valid & DLADM_WLAN_ATTR_BSSID) == 0)
53a399b765Szf 		return (-1);
54a399b765Szf 
55a399b765Szf 	(void) memcpy(bssid, wl_attrp->wa_bssid.wb_bytes, DLADM_WLAN_BSSID_LEN);
56a399b765Szf 
57a399b765Szf 	wpa_printf(MSG_DEBUG, "wpa_driver_wifi_get_bssid: " MACSTR,
58a399b765Szf 	    MAC2STR((unsigned char *)bssid));
59a399b765Szf 
60d62bc4baSyz 	return (WPA_STATUS(status));
61a399b765Szf }
62a399b765Szf 
63a399b765Szf /*
64a399b765Szf  * get_ssid - get the current SSID
65d62bc4baSyz  * @linkid: linkid of the given interface
66a399b765Szf  * @ssid: buffer for SSID (at least 32 bytes)
67a399b765Szf  *
68a399b765Szf  * Returns: length of the SSID on success, -1 on failure
69a399b765Szf  *
70a399b765Szf  * Query kernel driver for the current SSID and copy it to @ssid.
71a399b765Szf  * Returning zero is recommended if the STA is not associated.
72a399b765Szf  */
73a399b765Szf int
wpa_driver_wifi_get_ssid(dladm_handle_t handle,datalink_id_t linkid,char * ssid)74*4ac67f02SAnurag S. Maskey wpa_driver_wifi_get_ssid(dladm_handle_t handle, datalink_id_t linkid,
75*4ac67f02SAnurag S. Maskey     char *ssid)
76a399b765Szf {
77a399b765Szf 	int ret;
78d62bc4baSyz 	dladm_status_t status;
79a399b765Szf 	dladm_wlan_linkattr_t attr;
80a399b765Szf 	dladm_wlan_attr_t *wl_attrp;
81a399b765Szf 
82*4ac67f02SAnurag S. Maskey 	status = dladm_wlan_get_linkattr(handle, linkid, &attr);
83d62bc4baSyz 	if (status != DLADM_STATUS_OK)
84a399b765Szf 		return (-1);
85a399b765Szf 
86a399b765Szf 	wl_attrp = &attr.la_wlan_attr;
87a399b765Szf 	if ((attr.la_valid & DLADM_WLAN_LINKATTR_WLAN) == 0 ||
88a399b765Szf 	    (wl_attrp->wa_valid & DLADM_WLAN_ATTR_ESSID) == 0)
89a399b765Szf 		return (-1);
90a399b765Szf 
91a399b765Szf 	(void) memcpy(ssid, wl_attrp->wa_essid.we_bytes, MAX_ESSID_LENGTH);
92a399b765Szf 	ret = strlen(ssid);
93a399b765Szf 
94a399b765Szf 	wpa_printf(MSG_DEBUG, "wpa_driver_wifi_get_ssid: ssid=%s len=%d",
95a399b765Szf 	    ssid, ret);
96a399b765Szf 
97a399b765Szf 	return (ret);
98a399b765Szf }
99a399b765Szf 
100a399b765Szf static int
wpa_driver_wifi_set_wpa_ie(dladm_handle_t handle,datalink_id_t linkid,uint8_t * wpa_ie,uint32_t wpa_ie_len)101*4ac67f02SAnurag S. Maskey wpa_driver_wifi_set_wpa_ie(dladm_handle_t handle, datalink_id_t linkid,
102*4ac67f02SAnurag S. Maskey     uint8_t *wpa_ie, uint32_t wpa_ie_len)
103a399b765Szf {
104d62bc4baSyz 	dladm_status_t status;
105a399b765Szf 
106a399b765Szf 	wpa_printf(MSG_DEBUG, "%s", "wpa_driver_wifi_set_wpa_ie");
107*4ac67f02SAnurag S. Maskey 	status = dladm_wlan_wpa_set_ie(handle, linkid, wpa_ie, wpa_ie_len);
108a399b765Szf 
109d62bc4baSyz 	return (WPA_STATUS(status));
110a399b765Szf }
111a399b765Szf 
112a399b765Szf /*
113a399b765Szf  * set_wpa - enable/disable WPA support
114d62bc4baSyz  * @linkid: linkid of the given interface
115a399b765Szf  * @enabled: 1 = enable, 0 = disable
116a399b765Szf  *
117a399b765Szf  * Returns: 0 on success, -1 on failure
118a399b765Szf  *
119a399b765Szf  * Configure the kernel driver to enable/disable WPA support. This may
120a399b765Szf  * be empty function, if WPA support is always enabled. Common
121a399b765Szf  * configuration items are WPA IE (clearing it when WPA support is
122a399b765Szf  * disabled), Privacy flag for capability field, roaming mode (need to
123a399b765Szf  * allow wpa_supplicant to control roaming).
124a399b765Szf  */
125a399b765Szf static int
wpa_driver_wifi_set_wpa(dladm_handle_t handle,datalink_id_t linkid,boolean_t enabled)126*4ac67f02SAnurag S. Maskey wpa_driver_wifi_set_wpa(dladm_handle_t handle, datalink_id_t linkid,
127*4ac67f02SAnurag S. Maskey     boolean_t enabled)
128a399b765Szf {
129d62bc4baSyz 	dladm_status_t status;
130a399b765Szf 
131a399b765Szf 	wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_wpa: enable=%d", enabled);
132a399b765Szf 
133*4ac67f02SAnurag S. Maskey 	if (!enabled && wpa_driver_wifi_set_wpa_ie(handle, linkid, NULL, 0) < 0)
134a399b765Szf 		return (-1);
135a399b765Szf 
136*4ac67f02SAnurag S. Maskey 	status = dladm_wlan_wpa_set_wpa(handle, linkid, enabled);
137a399b765Szf 
138d62bc4baSyz 	return (WPA_STATUS(status));
139a399b765Szf }
140a399b765Szf 
141a399b765Szf static int
wpa_driver_wifi_del_key(dladm_handle_t handle,datalink_id_t linkid,int key_idx,unsigned char * addr)142*4ac67f02SAnurag S. Maskey wpa_driver_wifi_del_key(dladm_handle_t handle, datalink_id_t linkid,
143*4ac67f02SAnurag S. Maskey     int key_idx, unsigned char *addr)
144a399b765Szf {
145d62bc4baSyz 	dladm_status_t status;
146a399b765Szf 	dladm_wlan_bssid_t bss;
147a399b765Szf 
148a399b765Szf 	wpa_printf(MSG_DEBUG, "%s: id=%d", "wpa_driver_wifi_del_key",
149a399b765Szf 	    key_idx);
150a399b765Szf 
151a399b765Szf 	(void) memcpy(bss.wb_bytes, addr, DLADM_WLAN_BSSID_LEN);
152*4ac67f02SAnurag S. Maskey 	status = dladm_wlan_wpa_del_key(handle, linkid, key_idx, &bss);
153a399b765Szf 
154d62bc4baSyz 	return (WPA_STATUS(status));
155a399b765Szf }
156a399b765Szf 
157a399b765Szf /*
158a399b765Szf  * set_key - configure encryption key
159d62bc4baSyz  * @linkid: linkid of the given interface
160a399b765Szf  * @alg: encryption algorithm (%WPA_ALG_NONE, %WPA_ALG_WEP,
161a399b765Szf  *	%WPA_ALG_TKIP, %WPA_ALG_CCMP); %WPA_ALG_NONE clears the key.
162a399b765Szf  * @addr: address of the peer STA or ff:ff:ff:ff:ff:ff for
163a399b765Szf  *	broadcast/default keys
164a399b765Szf  * @key_idx: key index (0..3), always 0 for unicast keys
165a399b765Szf  * @set_tx: configure this key as the default Tx key (only used when
166a399b765Szf  *	driver does not support separate unicast/individual key
167a399b765Szf  * @seq: sequence number/packet number, @seq_len octets, the next
168a399b765Szf  *	packet number to be used for in replay protection; configured
169a399b765Szf  *	for Rx keys (in most cases, this is only used with broadcast
170a399b765Szf  *	keys and set to zero for unicast keys)
171a399b765Szf  * @seq_len: length of the @seq, depends on the algorithm:
172a399b765Szf  *	TKIP: 6 octets, CCMP: 6 octets
173a399b765Szf  * @key: key buffer; TKIP: 16-byte temporal key, 8-byte Tx Mic key,
174a399b765Szf  *	8-byte Rx Mic Key
175a399b765Szf  * @key_len: length of the key buffer in octets (WEP: 5 or 13,
176a399b765Szf  *	TKIP: 32, CCMP: 16)
177a399b765Szf  *
178a399b765Szf  * Returns: 0 on success, -1 on failure
179a399b765Szf  *
180a399b765Szf  * Configure the given key for the kernel driver. If the driver
181a399b765Szf  * supports separate individual keys (4 default keys + 1 individual),
182a399b765Szf  * @addr can be used to determine whether the key is default or
183a399b765Szf  * individual. If only 4 keys are supported, the default key with key
184a399b765Szf  * index 0 is used as the individual key. STA must be configured to use
185a399b765Szf  * it as the default Tx key (@set_tx is set) and accept Rx for all the
186a399b765Szf  * key indexes. In most cases, WPA uses only key indexes 1 and 2 for
187a399b765Szf  * broadcast keys, so key index 0 is available for this kind of
188a399b765Szf  * configuration.
189a399b765Szf  */
190a399b765Szf static int
wpa_driver_wifi_set_key(dladm_handle_t handle,datalink_id_t linkid,wpa_alg alg,unsigned char * addr,int key_idx,boolean_t set_tx,uint8_t * seq,uint32_t seq_len,uint8_t * key,uint32_t key_len)191*4ac67f02SAnurag S. Maskey wpa_driver_wifi_set_key(dladm_handle_t handle, datalink_id_t linkid,
192*4ac67f02SAnurag S. Maskey     wpa_alg alg, unsigned char *addr, int key_idx, boolean_t set_tx,
193*4ac67f02SAnurag S. Maskey     uint8_t *seq, uint32_t seq_len, uint8_t *key, uint32_t key_len)
194a399b765Szf {
195a399b765Szf 	char *alg_name;
196a399b765Szf 	dladm_wlan_cipher_t cipher;
197a399b765Szf 	dladm_wlan_bssid_t bss;
198d62bc4baSyz 	dladm_status_t status;
199a399b765Szf 
200a399b765Szf 	wpa_printf(MSG_DEBUG, "%s", "wpa_driver_wifi_set_key");
201a399b765Szf 	if (alg == WPA_ALG_NONE)
202*4ac67f02SAnurag S. Maskey 		return (wpa_driver_wifi_del_key(handle, linkid, key_idx, addr));
203a399b765Szf 
204a399b765Szf 	switch (alg) {
205a399b765Szf 	case WPA_ALG_WEP:
206a399b765Szf 		alg_name = "WEP";
207a399b765Szf 		cipher = DLADM_WLAN_CIPHER_WEP;
208a399b765Szf 		break;
209a399b765Szf 	case WPA_ALG_TKIP:
210a399b765Szf 		alg_name = "TKIP";
211a399b765Szf 		cipher = DLADM_WLAN_CIPHER_TKIP;
212a399b765Szf 		break;
213a399b765Szf 	case WPA_ALG_CCMP:
214a399b765Szf 		alg_name = "CCMP";
215a399b765Szf 		cipher = DLADM_WLAN_CIPHER_AES_CCM;
216a399b765Szf 		break;
217a399b765Szf 	default:
218a399b765Szf 		wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key:"
219a399b765Szf 		    " unknown/unsupported algorithm %d", alg);
220a399b765Szf 		return (-1);
221a399b765Szf 	}
222a399b765Szf 
223a399b765Szf 	wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key: alg=%s key_idx=%d"
224a399b765Szf 	    " set_tx=%d seq_len=%d seq=%d key_len=%d",
225a399b765Szf 	    alg_name, key_idx, set_tx,
226ff3124efSff 	    seq_len, *(uint64_t *)(uintptr_t)seq, key_len);
227a399b765Szf 
228a399b765Szf 	if (seq_len > sizeof (uint64_t)) {
229a399b765Szf 		wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key:"
230a399b765Szf 		    " seq_len %d too big", seq_len);
231a399b765Szf 		return (-1);
232a399b765Szf 	}
233a399b765Szf 	(void) memcpy(bss.wb_bytes, addr, DLADM_WLAN_BSSID_LEN);
234a399b765Szf 
235*4ac67f02SAnurag S. Maskey 	status = dladm_wlan_wpa_set_key(handle, linkid, cipher, &bss, set_tx,
236ff3124efSff 	    *(uint64_t *)(uintptr_t)seq, key_idx, key, key_len);
237a399b765Szf 
238d62bc4baSyz 	return (WPA_STATUS(status));
239a399b765Szf }
240a399b765Szf 
241a399b765Szf /*
242a399b765Szf  * disassociate - request driver to disassociate
243d62bc4baSyz  * @linkid: linkid of the given interface
244a399b765Szf  * @reason_code: 16-bit reason code to be sent in the disassociation
245a399b765Szf  * frame
246a399b765Szf  *
247a399b765Szf  * Return: 0 on success, -1 on failure
248a399b765Szf  */
249a399b765Szf static int
wpa_driver_wifi_disassociate(dladm_handle_t handle,datalink_id_t linkid,int reason_code)250*4ac67f02SAnurag S. Maskey wpa_driver_wifi_disassociate(dladm_handle_t handle, datalink_id_t linkid,
251*4ac67f02SAnurag S. Maskey     int reason_code)
252a399b765Szf {
253d62bc4baSyz 	dladm_status_t status;
254a399b765Szf 
255a399b765Szf 	wpa_printf(MSG_DEBUG, "wpa_driver_wifi_disassociate");
256a399b765Szf 
257*4ac67f02SAnurag S. Maskey 	status = dladm_wlan_wpa_set_mlme(handle, linkid,
258*4ac67f02SAnurag S. Maskey 	    DLADM_WLAN_MLME_DISASSOC, reason_code, NULL);
259a399b765Szf 
260d62bc4baSyz 	return (WPA_STATUS(status));
261a399b765Szf }
262a399b765Szf 
263a399b765Szf /*
264a399b765Szf  * associate - request driver to associate
265d62bc4baSyz  * @linkid: linkid of the given interface
266a399b765Szf  * @bssid: BSSID of the selected AP
267a399b765Szf  * @wpa_ie: WPA information element to be included in (Re)Association
268a399b765Szf  *	Request (including information element id and length). Use of
269a399b765Szf  *	this WPA IE is optional. If the driver generates the WPA IE, it
270a399b765Szf  *	can use @pairwise_suite, @group_suite, and @key_mgmt_suite
271a399b765Szf  *	to select proper algorithms. In this case, the driver has to
272a399b765Szf  *	notify wpa_supplicant about the used WPA IE by generating an
273a399b765Szf  *	event that the interface code will convert into EVENT_ASSOCINFO
274a399b765Szf  *	data (see wpa_supplicant.h). When using WPA2/IEEE 802.11i,
275a399b765Szf  *	@wpa_ie is used for RSN IE instead. The driver can determine
276a399b765Szf  *	which version is used by looking at the first byte of the IE
277a399b765Szf  *	(0xdd for WPA, 0x30 for WPA2/RSN).
278a399b765Szf  * @wpa_ie_len: length of the @wpa_ie
279a399b765Szf  *
280a399b765Szf  * Return: 0 on success, -1 on failure
281a399b765Szf  */
282a399b765Szf static int
wpa_driver_wifi_associate(dladm_handle_t handle,datalink_id_t linkid,const char * bssid,uint8_t * wpa_ie,uint32_t wpa_ie_len)283*4ac67f02SAnurag S. Maskey wpa_driver_wifi_associate(dladm_handle_t handle, datalink_id_t linkid,
284*4ac67f02SAnurag S. Maskey     const char *bssid, uint8_t *wpa_ie, uint32_t wpa_ie_len)
285a399b765Szf {
286d62bc4baSyz 	dladm_status_t status;
287a399b765Szf 	dladm_wlan_bssid_t bss;
288a399b765Szf 
289a399b765Szf 	wpa_printf(MSG_DEBUG, "wpa_driver_wifi_associate : "
290a399b765Szf 	    MACSTR, MAC2STR(bssid));
291a399b765Szf 
292a399b765Szf 	/*
293a399b765Szf 	 * NB: Don't need to set the freq or cipher-related state as
294a399b765Szf 	 * this is implied by the bssid which is used to locate
295a399b765Szf 	 * the scanned node state which holds it.
296a399b765Szf 	 */
297*4ac67f02SAnurag S. Maskey 	if (wpa_driver_wifi_set_wpa_ie(handle, linkid, wpa_ie, wpa_ie_len) < 0)
298a399b765Szf 		return (-1);
299a399b765Szf 
300a399b765Szf 	(void) memcpy(bss.wb_bytes, bssid, DLADM_WLAN_BSSID_LEN);
301*4ac67f02SAnurag S. Maskey 	status = dladm_wlan_wpa_set_mlme(handle, linkid, DLADM_WLAN_MLME_ASSOC,
302a399b765Szf 	    0, &bss);
303a399b765Szf 
304d62bc4baSyz 	return (WPA_STATUS(status));
305a399b765Szf }
306a399b765Szf 
307a399b765Szf /*
308a399b765Szf  * scan - request the driver to initiate scan
309d62bc4baSyz  * @linkid: linkid of the given interface
310a399b765Szf  *
311a399b765Szf  * Return: 0 on success, -1 on failure
312a399b765Szf  *
313a399b765Szf  * Once the scan results are ready, the driver should report scan
314a399b765Szf  * results event for wpa_supplicant which will eventually request the
315a399b765Szf  * results with wpa_driver_get_scan_results().
316a399b765Szf  */
317a399b765Szf static int
wpa_driver_wifi_scan(dladm_handle_t handle,datalink_id_t linkid)318*4ac67f02SAnurag S. Maskey wpa_driver_wifi_scan(dladm_handle_t handle, datalink_id_t linkid)
319a399b765Szf {
320d62bc4baSyz 	dladm_status_t status;
321a399b765Szf 
322a399b765Szf 	wpa_printf(MSG_DEBUG, "%s", "wpa_driver_wifi_scan");
323a399b765Szf 	/*
324a399b765Szf 	 * We force the state to INIT before calling ieee80211_new_state
325a399b765Szf 	 * to get ieee80211_begin_scan called.  We really want to scan w/o
326a399b765Szf 	 * altering the current state but that's not possible right now.
327a399b765Szf 	 */
328*4ac67f02SAnurag S. Maskey 	(void) wpa_driver_wifi_disassociate(handle, linkid,
329a399b765Szf 	    DLADM_WLAN_REASON_DISASSOC_LEAVING);
330a399b765Szf 
331*4ac67f02SAnurag S. Maskey 	status = dladm_wlan_scan(handle, linkid, NULL, NULL);
332a399b765Szf 
333a399b765Szf 	wpa_printf(MSG_DEBUG, "%s: return", "wpa_driver_wifi_scan");
334d62bc4baSyz 	return (WPA_STATUS(status));
335a399b765Szf }
336a399b765Szf 
337a399b765Szf /*
338a399b765Szf  * get_scan_results - fetch the latest scan results
339d62bc4baSyz  * @linkid: linkid of the given interface
340a399b765Szf  * @results: pointer to buffer for scan results
341a399b765Szf  * @max_size: maximum number of entries (buffer size)
342a399b765Szf  *
343a399b765Szf  * Return: number of scan result entries used on success, -1 on failure
344a399b765Szf  *
345a399b765Szf  * If scan results include more than @max_size BSSes, @max_size will be
346a399b765Szf  * returned and the remaining entries will not be included in the
347a399b765Szf  * buffer.
348a399b765Szf  */
349a399b765Szf int
wpa_driver_wifi_get_scan_results(dladm_handle_t handle,datalink_id_t linkid,dladm_wlan_ess_t * results,uint32_t max_size)350*4ac67f02SAnurag S. Maskey wpa_driver_wifi_get_scan_results(dladm_handle_t handle, datalink_id_t linkid,
351a399b765Szf     dladm_wlan_ess_t *results, uint32_t max_size)
352a399b765Szf {
353a399b765Szf 	uint_t ret;
354a399b765Szf 
355d62bc4baSyz 	wpa_printf(MSG_DEBUG, "%s: max size=%d\n",
356d62bc4baSyz 	    "wpa_driver_wifi_get_scan_results", max_size);
357a399b765Szf 
358*4ac67f02SAnurag S. Maskey 	if (dladm_wlan_wpa_get_sr(handle, linkid, results, max_size, &ret)
359a399b765Szf 	    != DLADM_STATUS_OK) {
360a399b765Szf 		return (-1);
361a399b765Szf 	}
362a399b765Szf 
363a399b765Szf 	return (ret);
364a399b765Szf }
365a399b765Szf 
366a399b765Szf struct wpa_driver_ops wpa_driver_wifi_ops = {
367a399b765Szf 	wpa_driver_wifi_get_bssid,
368a399b765Szf 	wpa_driver_wifi_get_ssid,
369a399b765Szf 	wpa_driver_wifi_set_wpa,
370a399b765Szf 	wpa_driver_wifi_set_key,
371a399b765Szf 	wpa_driver_wifi_scan,
372a399b765Szf 	wpa_driver_wifi_get_scan_results,
373a399b765Szf 	wpa_driver_wifi_disassociate,
374a399b765Szf 	wpa_driver_wifi_associate
375a399b765Szf };
376