1a399b765Szf /*
2d62bc4baSyz * Copyright 2008 Sun Microsystems, Inc. All rights reserved.
3a399b765Szf * Use is subject to license terms.
4a399b765Szf */
5a399b765Szf
6a399b765Szf /*
7a399b765Szf * Copyright (c) 2004, Sam Leffler <sam@errno.com>
8a399b765Szf * Sun elects to license this software under the BSD license.
9a399b765Szf * See README for more details.
10a399b765Szf */
11a399b765Szf
12a399b765Szf #include <stdio.h>
13a399b765Szf #include <stdlib.h>
14a399b765Szf #include <errno.h>
15a399b765Szf #include <stdarg.h>
16a399b765Szf #include <fcntl.h>
17a399b765Szf #include <unistd.h>
18a399b765Szf #include <stropts.h>
19a399b765Szf #include <string.h>
20a399b765Szf #include <stddef.h>
21a399b765Szf
22a399b765Szf #include "wpa_impl.h"
23a399b765Szf #include "driver.h"
24a399b765Szf
25a399b765Szf #define WPA_STATUS(status) (status == DLADM_STATUS_OK? 0 : -1)
26a399b765Szf
27a399b765Szf /*
28a399b765Szf * get_bssid - get the current BSSID
29d62bc4baSyz * @linkid: linkid of the given interface
30a399b765Szf * @bssid: buffer for BSSID (IEEE80211_ADDR_LEN = 6 bytes)
31a399b765Szf *
32a399b765Szf * Returns: 0 on success, -1 on failure
33a399b765Szf *
34a399b765Szf * Query kernel driver for the current BSSID and copy it to @bssid.
35a399b765Szf * Setting @bssid to 00:00:00:00:00:00 is recommended if the STA is not
36a399b765Szf * associated.
37a399b765Szf */
38a399b765Szf int
wpa_driver_wifi_get_bssid(dladm_handle_t handle,datalink_id_t linkid,char * bssid)39*4ac67f02SAnurag S. Maskey wpa_driver_wifi_get_bssid(dladm_handle_t handle, datalink_id_t linkid,
40*4ac67f02SAnurag S. Maskey char *bssid)
41a399b765Szf {
42d62bc4baSyz dladm_status_t status;
43a399b765Szf dladm_wlan_linkattr_t attr;
44a399b765Szf dladm_wlan_attr_t *wl_attrp;
45a399b765Szf
46*4ac67f02SAnurag S. Maskey status = dladm_wlan_get_linkattr(handle, linkid, &attr);
47d62bc4baSyz if (status != DLADM_STATUS_OK)
48a399b765Szf return (-1);
49a399b765Szf
50a399b765Szf wl_attrp = &attr.la_wlan_attr;
51a399b765Szf if ((attr.la_valid & DLADM_WLAN_LINKATTR_WLAN) == 0 ||
52a399b765Szf (wl_attrp->wa_valid & DLADM_WLAN_ATTR_BSSID) == 0)
53a399b765Szf return (-1);
54a399b765Szf
55a399b765Szf (void) memcpy(bssid, wl_attrp->wa_bssid.wb_bytes, DLADM_WLAN_BSSID_LEN);
56a399b765Szf
57a399b765Szf wpa_printf(MSG_DEBUG, "wpa_driver_wifi_get_bssid: " MACSTR,
58a399b765Szf MAC2STR((unsigned char *)bssid));
59a399b765Szf
60d62bc4baSyz return (WPA_STATUS(status));
61a399b765Szf }
62a399b765Szf
63a399b765Szf /*
64a399b765Szf * get_ssid - get the current SSID
65d62bc4baSyz * @linkid: linkid of the given interface
66a399b765Szf * @ssid: buffer for SSID (at least 32 bytes)
67a399b765Szf *
68a399b765Szf * Returns: length of the SSID on success, -1 on failure
69a399b765Szf *
70a399b765Szf * Query kernel driver for the current SSID and copy it to @ssid.
71a399b765Szf * Returning zero is recommended if the STA is not associated.
72a399b765Szf */
73a399b765Szf int
wpa_driver_wifi_get_ssid(dladm_handle_t handle,datalink_id_t linkid,char * ssid)74*4ac67f02SAnurag S. Maskey wpa_driver_wifi_get_ssid(dladm_handle_t handle, datalink_id_t linkid,
75*4ac67f02SAnurag S. Maskey char *ssid)
76a399b765Szf {
77a399b765Szf int ret;
78d62bc4baSyz dladm_status_t status;
79a399b765Szf dladm_wlan_linkattr_t attr;
80a399b765Szf dladm_wlan_attr_t *wl_attrp;
81a399b765Szf
82*4ac67f02SAnurag S. Maskey status = dladm_wlan_get_linkattr(handle, linkid, &attr);
83d62bc4baSyz if (status != DLADM_STATUS_OK)
84a399b765Szf return (-1);
85a399b765Szf
86a399b765Szf wl_attrp = &attr.la_wlan_attr;
87a399b765Szf if ((attr.la_valid & DLADM_WLAN_LINKATTR_WLAN) == 0 ||
88a399b765Szf (wl_attrp->wa_valid & DLADM_WLAN_ATTR_ESSID) == 0)
89a399b765Szf return (-1);
90a399b765Szf
91a399b765Szf (void) memcpy(ssid, wl_attrp->wa_essid.we_bytes, MAX_ESSID_LENGTH);
92a399b765Szf ret = strlen(ssid);
93a399b765Szf
94a399b765Szf wpa_printf(MSG_DEBUG, "wpa_driver_wifi_get_ssid: ssid=%s len=%d",
95a399b765Szf ssid, ret);
96a399b765Szf
97a399b765Szf return (ret);
98a399b765Szf }
99a399b765Szf
100a399b765Szf static int
wpa_driver_wifi_set_wpa_ie(dladm_handle_t handle,datalink_id_t linkid,uint8_t * wpa_ie,uint32_t wpa_ie_len)101*4ac67f02SAnurag S. Maskey wpa_driver_wifi_set_wpa_ie(dladm_handle_t handle, datalink_id_t linkid,
102*4ac67f02SAnurag S. Maskey uint8_t *wpa_ie, uint32_t wpa_ie_len)
103a399b765Szf {
104d62bc4baSyz dladm_status_t status;
105a399b765Szf
106a399b765Szf wpa_printf(MSG_DEBUG, "%s", "wpa_driver_wifi_set_wpa_ie");
107*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_set_ie(handle, linkid, wpa_ie, wpa_ie_len);
108a399b765Szf
109d62bc4baSyz return (WPA_STATUS(status));
110a399b765Szf }
111a399b765Szf
112a399b765Szf /*
113a399b765Szf * set_wpa - enable/disable WPA support
114d62bc4baSyz * @linkid: linkid of the given interface
115a399b765Szf * @enabled: 1 = enable, 0 = disable
116a399b765Szf *
117a399b765Szf * Returns: 0 on success, -1 on failure
118a399b765Szf *
119a399b765Szf * Configure the kernel driver to enable/disable WPA support. This may
120a399b765Szf * be empty function, if WPA support is always enabled. Common
121a399b765Szf * configuration items are WPA IE (clearing it when WPA support is
122a399b765Szf * disabled), Privacy flag for capability field, roaming mode (need to
123a399b765Szf * allow wpa_supplicant to control roaming).
124a399b765Szf */
125a399b765Szf static int
wpa_driver_wifi_set_wpa(dladm_handle_t handle,datalink_id_t linkid,boolean_t enabled)126*4ac67f02SAnurag S. Maskey wpa_driver_wifi_set_wpa(dladm_handle_t handle, datalink_id_t linkid,
127*4ac67f02SAnurag S. Maskey boolean_t enabled)
128a399b765Szf {
129d62bc4baSyz dladm_status_t status;
130a399b765Szf
131a399b765Szf wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_wpa: enable=%d", enabled);
132a399b765Szf
133*4ac67f02SAnurag S. Maskey if (!enabled && wpa_driver_wifi_set_wpa_ie(handle, linkid, NULL, 0) < 0)
134a399b765Szf return (-1);
135a399b765Szf
136*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_set_wpa(handle, linkid, enabled);
137a399b765Szf
138d62bc4baSyz return (WPA_STATUS(status));
139a399b765Szf }
140a399b765Szf
141a399b765Szf static int
wpa_driver_wifi_del_key(dladm_handle_t handle,datalink_id_t linkid,int key_idx,unsigned char * addr)142*4ac67f02SAnurag S. Maskey wpa_driver_wifi_del_key(dladm_handle_t handle, datalink_id_t linkid,
143*4ac67f02SAnurag S. Maskey int key_idx, unsigned char *addr)
144a399b765Szf {
145d62bc4baSyz dladm_status_t status;
146a399b765Szf dladm_wlan_bssid_t bss;
147a399b765Szf
148a399b765Szf wpa_printf(MSG_DEBUG, "%s: id=%d", "wpa_driver_wifi_del_key",
149a399b765Szf key_idx);
150a399b765Szf
151a399b765Szf (void) memcpy(bss.wb_bytes, addr, DLADM_WLAN_BSSID_LEN);
152*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_del_key(handle, linkid, key_idx, &bss);
153a399b765Szf
154d62bc4baSyz return (WPA_STATUS(status));
155a399b765Szf }
156a399b765Szf
157a399b765Szf /*
158a399b765Szf * set_key - configure encryption key
159d62bc4baSyz * @linkid: linkid of the given interface
160a399b765Szf * @alg: encryption algorithm (%WPA_ALG_NONE, %WPA_ALG_WEP,
161a399b765Szf * %WPA_ALG_TKIP, %WPA_ALG_CCMP); %WPA_ALG_NONE clears the key.
162a399b765Szf * @addr: address of the peer STA or ff:ff:ff:ff:ff:ff for
163a399b765Szf * broadcast/default keys
164a399b765Szf * @key_idx: key index (0..3), always 0 for unicast keys
165a399b765Szf * @set_tx: configure this key as the default Tx key (only used when
166a399b765Szf * driver does not support separate unicast/individual key
167a399b765Szf * @seq: sequence number/packet number, @seq_len octets, the next
168a399b765Szf * packet number to be used for in replay protection; configured
169a399b765Szf * for Rx keys (in most cases, this is only used with broadcast
170a399b765Szf * keys and set to zero for unicast keys)
171a399b765Szf * @seq_len: length of the @seq, depends on the algorithm:
172a399b765Szf * TKIP: 6 octets, CCMP: 6 octets
173a399b765Szf * @key: key buffer; TKIP: 16-byte temporal key, 8-byte Tx Mic key,
174a399b765Szf * 8-byte Rx Mic Key
175a399b765Szf * @key_len: length of the key buffer in octets (WEP: 5 or 13,
176a399b765Szf * TKIP: 32, CCMP: 16)
177a399b765Szf *
178a399b765Szf * Returns: 0 on success, -1 on failure
179a399b765Szf *
180a399b765Szf * Configure the given key for the kernel driver. If the driver
181a399b765Szf * supports separate individual keys (4 default keys + 1 individual),
182a399b765Szf * @addr can be used to determine whether the key is default or
183a399b765Szf * individual. If only 4 keys are supported, the default key with key
184a399b765Szf * index 0 is used as the individual key. STA must be configured to use
185a399b765Szf * it as the default Tx key (@set_tx is set) and accept Rx for all the
186a399b765Szf * key indexes. In most cases, WPA uses only key indexes 1 and 2 for
187a399b765Szf * broadcast keys, so key index 0 is available for this kind of
188a399b765Szf * configuration.
189a399b765Szf */
190a399b765Szf static int
wpa_driver_wifi_set_key(dladm_handle_t handle,datalink_id_t linkid,wpa_alg alg,unsigned char * addr,int key_idx,boolean_t set_tx,uint8_t * seq,uint32_t seq_len,uint8_t * key,uint32_t key_len)191*4ac67f02SAnurag S. Maskey wpa_driver_wifi_set_key(dladm_handle_t handle, datalink_id_t linkid,
192*4ac67f02SAnurag S. Maskey wpa_alg alg, unsigned char *addr, int key_idx, boolean_t set_tx,
193*4ac67f02SAnurag S. Maskey uint8_t *seq, uint32_t seq_len, uint8_t *key, uint32_t key_len)
194a399b765Szf {
195a399b765Szf char *alg_name;
196a399b765Szf dladm_wlan_cipher_t cipher;
197a399b765Szf dladm_wlan_bssid_t bss;
198d62bc4baSyz dladm_status_t status;
199a399b765Szf
200a399b765Szf wpa_printf(MSG_DEBUG, "%s", "wpa_driver_wifi_set_key");
201a399b765Szf if (alg == WPA_ALG_NONE)
202*4ac67f02SAnurag S. Maskey return (wpa_driver_wifi_del_key(handle, linkid, key_idx, addr));
203a399b765Szf
204a399b765Szf switch (alg) {
205a399b765Szf case WPA_ALG_WEP:
206a399b765Szf alg_name = "WEP";
207a399b765Szf cipher = DLADM_WLAN_CIPHER_WEP;
208a399b765Szf break;
209a399b765Szf case WPA_ALG_TKIP:
210a399b765Szf alg_name = "TKIP";
211a399b765Szf cipher = DLADM_WLAN_CIPHER_TKIP;
212a399b765Szf break;
213a399b765Szf case WPA_ALG_CCMP:
214a399b765Szf alg_name = "CCMP";
215a399b765Szf cipher = DLADM_WLAN_CIPHER_AES_CCM;
216a399b765Szf break;
217a399b765Szf default:
218a399b765Szf wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key:"
219a399b765Szf " unknown/unsupported algorithm %d", alg);
220a399b765Szf return (-1);
221a399b765Szf }
222a399b765Szf
223a399b765Szf wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key: alg=%s key_idx=%d"
224a399b765Szf " set_tx=%d seq_len=%d seq=%d key_len=%d",
225a399b765Szf alg_name, key_idx, set_tx,
226ff3124efSff seq_len, *(uint64_t *)(uintptr_t)seq, key_len);
227a399b765Szf
228a399b765Szf if (seq_len > sizeof (uint64_t)) {
229a399b765Szf wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key:"
230a399b765Szf " seq_len %d too big", seq_len);
231a399b765Szf return (-1);
232a399b765Szf }
233a399b765Szf (void) memcpy(bss.wb_bytes, addr, DLADM_WLAN_BSSID_LEN);
234a399b765Szf
235*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_set_key(handle, linkid, cipher, &bss, set_tx,
236ff3124efSff *(uint64_t *)(uintptr_t)seq, key_idx, key, key_len);
237a399b765Szf
238d62bc4baSyz return (WPA_STATUS(status));
239a399b765Szf }
240a399b765Szf
241a399b765Szf /*
242a399b765Szf * disassociate - request driver to disassociate
243d62bc4baSyz * @linkid: linkid of the given interface
244a399b765Szf * @reason_code: 16-bit reason code to be sent in the disassociation
245a399b765Szf * frame
246a399b765Szf *
247a399b765Szf * Return: 0 on success, -1 on failure
248a399b765Szf */
249a399b765Szf static int
wpa_driver_wifi_disassociate(dladm_handle_t handle,datalink_id_t linkid,int reason_code)250*4ac67f02SAnurag S. Maskey wpa_driver_wifi_disassociate(dladm_handle_t handle, datalink_id_t linkid,
251*4ac67f02SAnurag S. Maskey int reason_code)
252a399b765Szf {
253d62bc4baSyz dladm_status_t status;
254a399b765Szf
255a399b765Szf wpa_printf(MSG_DEBUG, "wpa_driver_wifi_disassociate");
256a399b765Szf
257*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_set_mlme(handle, linkid,
258*4ac67f02SAnurag S. Maskey DLADM_WLAN_MLME_DISASSOC, reason_code, NULL);
259a399b765Szf
260d62bc4baSyz return (WPA_STATUS(status));
261a399b765Szf }
262a399b765Szf
263a399b765Szf /*
264a399b765Szf * associate - request driver to associate
265d62bc4baSyz * @linkid: linkid of the given interface
266a399b765Szf * @bssid: BSSID of the selected AP
267a399b765Szf * @wpa_ie: WPA information element to be included in (Re)Association
268a399b765Szf * Request (including information element id and length). Use of
269a399b765Szf * this WPA IE is optional. If the driver generates the WPA IE, it
270a399b765Szf * can use @pairwise_suite, @group_suite, and @key_mgmt_suite
271a399b765Szf * to select proper algorithms. In this case, the driver has to
272a399b765Szf * notify wpa_supplicant about the used WPA IE by generating an
273a399b765Szf * event that the interface code will convert into EVENT_ASSOCINFO
274a399b765Szf * data (see wpa_supplicant.h). When using WPA2/IEEE 802.11i,
275a399b765Szf * @wpa_ie is used for RSN IE instead. The driver can determine
276a399b765Szf * which version is used by looking at the first byte of the IE
277a399b765Szf * (0xdd for WPA, 0x30 for WPA2/RSN).
278a399b765Szf * @wpa_ie_len: length of the @wpa_ie
279a399b765Szf *
280a399b765Szf * Return: 0 on success, -1 on failure
281a399b765Szf */
282a399b765Szf static int
wpa_driver_wifi_associate(dladm_handle_t handle,datalink_id_t linkid,const char * bssid,uint8_t * wpa_ie,uint32_t wpa_ie_len)283*4ac67f02SAnurag S. Maskey wpa_driver_wifi_associate(dladm_handle_t handle, datalink_id_t linkid,
284*4ac67f02SAnurag S. Maskey const char *bssid, uint8_t *wpa_ie, uint32_t wpa_ie_len)
285a399b765Szf {
286d62bc4baSyz dladm_status_t status;
287a399b765Szf dladm_wlan_bssid_t bss;
288a399b765Szf
289a399b765Szf wpa_printf(MSG_DEBUG, "wpa_driver_wifi_associate : "
290a399b765Szf MACSTR, MAC2STR(bssid));
291a399b765Szf
292a399b765Szf /*
293a399b765Szf * NB: Don't need to set the freq or cipher-related state as
294a399b765Szf * this is implied by the bssid which is used to locate
295a399b765Szf * the scanned node state which holds it.
296a399b765Szf */
297*4ac67f02SAnurag S. Maskey if (wpa_driver_wifi_set_wpa_ie(handle, linkid, wpa_ie, wpa_ie_len) < 0)
298a399b765Szf return (-1);
299a399b765Szf
300a399b765Szf (void) memcpy(bss.wb_bytes, bssid, DLADM_WLAN_BSSID_LEN);
301*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_set_mlme(handle, linkid, DLADM_WLAN_MLME_ASSOC,
302a399b765Szf 0, &bss);
303a399b765Szf
304d62bc4baSyz return (WPA_STATUS(status));
305a399b765Szf }
306a399b765Szf
307a399b765Szf /*
308a399b765Szf * scan - request the driver to initiate scan
309d62bc4baSyz * @linkid: linkid of the given interface
310a399b765Szf *
311a399b765Szf * Return: 0 on success, -1 on failure
312a399b765Szf *
313a399b765Szf * Once the scan results are ready, the driver should report scan
314a399b765Szf * results event for wpa_supplicant which will eventually request the
315a399b765Szf * results with wpa_driver_get_scan_results().
316a399b765Szf */
317a399b765Szf static int
wpa_driver_wifi_scan(dladm_handle_t handle,datalink_id_t linkid)318*4ac67f02SAnurag S. Maskey wpa_driver_wifi_scan(dladm_handle_t handle, datalink_id_t linkid)
319a399b765Szf {
320d62bc4baSyz dladm_status_t status;
321a399b765Szf
322a399b765Szf wpa_printf(MSG_DEBUG, "%s", "wpa_driver_wifi_scan");
323a399b765Szf /*
324a399b765Szf * We force the state to INIT before calling ieee80211_new_state
325a399b765Szf * to get ieee80211_begin_scan called. We really want to scan w/o
326a399b765Szf * altering the current state but that's not possible right now.
327a399b765Szf */
328*4ac67f02SAnurag S. Maskey (void) wpa_driver_wifi_disassociate(handle, linkid,
329a399b765Szf DLADM_WLAN_REASON_DISASSOC_LEAVING);
330a399b765Szf
331*4ac67f02SAnurag S. Maskey status = dladm_wlan_scan(handle, linkid, NULL, NULL);
332a399b765Szf
333a399b765Szf wpa_printf(MSG_DEBUG, "%s: return", "wpa_driver_wifi_scan");
334d62bc4baSyz return (WPA_STATUS(status));
335a399b765Szf }
336a399b765Szf
337a399b765Szf /*
338a399b765Szf * get_scan_results - fetch the latest scan results
339d62bc4baSyz * @linkid: linkid of the given interface
340a399b765Szf * @results: pointer to buffer for scan results
341a399b765Szf * @max_size: maximum number of entries (buffer size)
342a399b765Szf *
343a399b765Szf * Return: number of scan result entries used on success, -1 on failure
344a399b765Szf *
345a399b765Szf * If scan results include more than @max_size BSSes, @max_size will be
346a399b765Szf * returned and the remaining entries will not be included in the
347a399b765Szf * buffer.
348a399b765Szf */
349a399b765Szf int
wpa_driver_wifi_get_scan_results(dladm_handle_t handle,datalink_id_t linkid,dladm_wlan_ess_t * results,uint32_t max_size)350*4ac67f02SAnurag S. Maskey wpa_driver_wifi_get_scan_results(dladm_handle_t handle, datalink_id_t linkid,
351a399b765Szf dladm_wlan_ess_t *results, uint32_t max_size)
352a399b765Szf {
353a399b765Szf uint_t ret;
354a399b765Szf
355d62bc4baSyz wpa_printf(MSG_DEBUG, "%s: max size=%d\n",
356d62bc4baSyz "wpa_driver_wifi_get_scan_results", max_size);
357a399b765Szf
358*4ac67f02SAnurag S. Maskey if (dladm_wlan_wpa_get_sr(handle, linkid, results, max_size, &ret)
359a399b765Szf != DLADM_STATUS_OK) {
360a399b765Szf return (-1);
361a399b765Szf }
362a399b765Szf
363a399b765Szf return (ret);
364a399b765Szf }
365a399b765Szf
366a399b765Szf struct wpa_driver_ops wpa_driver_wifi_ops = {
367a399b765Szf wpa_driver_wifi_get_bssid,
368a399b765Szf wpa_driver_wifi_get_ssid,
369a399b765Szf wpa_driver_wifi_set_wpa,
370a399b765Szf wpa_driver_wifi_set_key,
371a399b765Szf wpa_driver_wifi_scan,
372a399b765Szf wpa_driver_wifi_get_scan_results,
373a399b765Szf wpa_driver_wifi_disassociate,
374a399b765Szf wpa_driver_wifi_associate
375a399b765Szf };
376