Commit | Line | Data |
---|---|---|
92b96797 FB |
1 | /* |
2 | * Copyright (c) 1996, 2003 VIA Networking Technologies, Inc. | |
3 | * All rights reserved. | |
4 | * | |
5 | * This program is free software; you can redistribute it and/or modify | |
6 | * it under the terms of the GNU General Public License as published by | |
7 | * the Free Software Foundation; either version 2 of the License, or | |
8 | * (at your option) any later version. | |
9 | * | |
10 | * This program is distributed in the hope that it will be useful, | |
11 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
13 | * GNU General Public License for more details. | |
14 | * | |
15 | * You should have received a copy of the GNU General Public License along | |
16 | * with this program; if not, write to the Free Software Foundation, Inc., | |
17 | * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. | |
18 | * | |
19 | * | |
20 | * File: wpactl.c | |
21 | * | |
22 | * Purpose: handle wpa supplicant ioctl input/out functions | |
23 | * | |
24 | * Author: Lyndon Chen | |
25 | * | |
26 | * Date: July 28, 2006 | |
27 | * | |
28 | * Functions: | |
29 | * | |
30 | * Revision History: | |
31 | * | |
32 | */ | |
33 | ||
92b96797 | 34 | #include "wpactl.h" |
92b96797 | 35 | #include "key.h" |
92b96797 | 36 | #include "mac.h" |
92b96797 | 37 | #include "device.h" |
92b96797 | 38 | #include "wmgr.h" |
92b96797 | 39 | #include "iocmd.h" |
92b96797 | 40 | #include "iowpa.h" |
92b96797 | 41 | #include "control.h" |
92b96797 | 42 | #include "rndis.h" |
92b96797 | 43 | #include "rf.h" |
92b96797 FB |
44 | |
45 | /*--------------------- Static Definitions -------------------------*/ | |
46 | ||
47 | #define VIAWGET_WPA_MAX_BUF_SIZE 1024 | |
48 | ||
49 | ||
50 | ||
51 | static const int frequency_list[] = { | |
52 | 2412, 2417, 2422, 2427, 2432, 2437, 2442, | |
53 | 2447, 2452, 2457, 2462, 2467, 2472, 2484 | |
54 | }; | |
55 | /*--------------------- Static Classes ----------------------------*/ | |
56 | ||
57 | /*--------------------- Static Variables --------------------------*/ | |
58 | //static int msglevel =MSG_LEVEL_DEBUG; | |
59 | static int msglevel =MSG_LEVEL_INFO; | |
60 | ||
61 | /*--------------------- Static Functions --------------------------*/ | |
62 | ||
63 | ||
64 | ||
65 | ||
66 | /*--------------------- Export Variables --------------------------*/ | |
67 | static void wpadev_setup(struct net_device *dev) | |
68 | { | |
69 | dev->type = ARPHRD_IEEE80211; | |
70 | dev->hard_header_len = ETH_HLEN; | |
71 | dev->mtu = 2048; | |
72 | dev->addr_len = ETH_ALEN; | |
73 | dev->tx_queue_len = 1000; | |
74 | ||
75 | memset(dev->broadcast,0xFF, ETH_ALEN); | |
76 | ||
77 | dev->flags = IFF_BROADCAST|IFF_MULTICAST; | |
78 | } | |
79 | ||
80 | /* | |
81 | * Description: | |
82 | * register netdev for wpa supplicant deamon | |
83 | * | |
84 | * Parameters: | |
85 | * In: | |
86 | * pDevice - | |
87 | * enable - | |
88 | * Out: | |
89 | * | |
90 | * Return Value: | |
91 | * | |
92 | */ | |
93 | ||
94 | static int wpa_init_wpadev(PSDevice pDevice) | |
95 | { | |
1e28efa3 | 96 | PSDevice wpadev_priv; |
92b96797 FB |
97 | struct net_device *dev = pDevice->dev; |
98 | int ret=0; | |
99 | ||
1e28efa3 | 100 | pDevice->wpadev = alloc_netdev(sizeof(PSDevice), "vntwpa", wpadev_setup); |
92b96797 FB |
101 | if (pDevice->wpadev == NULL) |
102 | return -ENOMEM; | |
103 | ||
1e28efa3 FB |
104 | wpadev_priv = netdev_priv(pDevice->wpadev); |
105 | *wpadev_priv = *pDevice; | |
9a0e756c | 106 | memcpy(pDevice->wpadev->dev_addr, dev->dev_addr, ETH_ALEN); |
92b96797 FB |
107 | pDevice->wpadev->base_addr = dev->base_addr; |
108 | pDevice->wpadev->irq = dev->irq; | |
109 | pDevice->wpadev->mem_start = dev->mem_start; | |
110 | pDevice->wpadev->mem_end = dev->mem_end; | |
111 | ret = register_netdev(pDevice->wpadev); | |
112 | if (ret) { | |
113 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "%s: register_netdev(WPA) failed!\n", | |
114 | dev->name); | |
115 | free_netdev(pDevice->wpadev); | |
116 | return -1; | |
117 | } | |
118 | ||
119 | if (pDevice->skb == NULL) { | |
120 | pDevice->skb = dev_alloc_skb((int)pDevice->rx_buf_sz); | |
121 | if (pDevice->skb == NULL) | |
122 | return -ENOMEM; | |
123 | } | |
124 | ||
125 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "%s: Registered netdev %s for WPA management\n", | |
126 | dev->name, pDevice->wpadev->name); | |
127 | ||
128 | return 0; | |
129 | } | |
130 | ||
131 | ||
132 | /* | |
133 | * Description: | |
134 | * unregister net_device (wpadev) | |
135 | * | |
136 | * Parameters: | |
137 | * In: | |
138 | * pDevice - | |
139 | * Out: | |
140 | * | |
141 | * Return Value: | |
142 | * | |
143 | */ | |
144 | ||
145 | static int wpa_release_wpadev(PSDevice pDevice) | |
146 | { | |
147 | if (pDevice->skb) { | |
148 | dev_kfree_skb(pDevice->skb); | |
149 | pDevice->skb = NULL; | |
150 | } | |
151 | ||
152 | if (pDevice->wpadev) { | |
153 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "%s: Netdevice %s unregistered\n", | |
154 | pDevice->dev->name, pDevice->wpadev->name); | |
155 | unregister_netdev(pDevice->wpadev); | |
156 | free_netdev(pDevice->wpadev); | |
157 | pDevice->wpadev = NULL; | |
158 | } | |
159 | ||
160 | return 0; | |
161 | } | |
162 | ||
163 | ||
164 | ||
165 | ||
166 | ||
167 | /* | |
168 | * Description: | |
169 | * Set enable/disable dev for wpa supplicant deamon | |
170 | * | |
171 | * Parameters: | |
172 | * In: | |
173 | * pDevice - | |
174 | * val - | |
175 | * Out: | |
176 | * | |
177 | * Return Value: | |
178 | * | |
179 | */ | |
180 | ||
181 | int wpa_set_wpadev(PSDevice pDevice, int val) | |
182 | { | |
183 | if (val) | |
184 | return wpa_init_wpadev(pDevice); | |
185 | else | |
186 | return wpa_release_wpadev(pDevice); | |
187 | } | |
188 | ||
189 | ||
190 | /* | |
191 | * Description: | |
192 | * Set WPA algorithm & keys | |
193 | * | |
194 | * Parameters: | |
195 | * In: | |
196 | * pDevice - | |
197 | * param - | |
198 | * Out: | |
199 | * | |
200 | * Return Value: | |
201 | * | |
202 | */ | |
203 | ||
204 | int wpa_set_keys(PSDevice pDevice, void *ctx, BOOL fcpfkernel) | |
205 | { | |
206 | struct viawget_wpa_param *param=ctx; | |
207 | PSMgmtObject pMgmt = &(pDevice->sMgmtObj); | |
208 | DWORD dwKeyIndex = 0; | |
209 | BYTE abyKey[MAX_KEY_LEN]; | |
210 | BYTE abySeq[MAX_KEY_LEN]; | |
211 | QWORD KeyRSC; | |
212 | // NDIS_802_11_KEY_RSC KeyRSC; | |
213 | BYTE byKeyDecMode = KEY_CTL_WEP; | |
214 | int ret = 0; | |
215 | int uu, ii; | |
216 | ||
217 | ||
218 | if (param->u.wpa_key.alg_name > WPA_ALG_CCMP) | |
219 | return -EINVAL; | |
220 | ||
221 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "param->u.wpa_key.alg_name = %d \n", param->u.wpa_key.alg_name); | |
222 | if (param->u.wpa_key.alg_name == WPA_ALG_NONE) { | |
223 | pDevice->eEncryptionStatus = Ndis802_11EncryptionDisabled; | |
224 | pDevice->bEncryptionEnable = FALSE; | |
225 | pDevice->byKeyIndex = 0; | |
226 | pDevice->bTransmitKey = FALSE; | |
227 | for (uu=0; uu<MAX_KEY_TABLE; uu++) { | |
228 | MACvDisableKeyEntry(pDevice, uu); | |
229 | } | |
230 | return ret; | |
231 | } | |
232 | ||
233 | spin_unlock_irq(&pDevice->lock); | |
234 | if(param->u.wpa_key.key && fcpfkernel) { | |
235 | memcpy(&abyKey[0], param->u.wpa_key.key, param->u.wpa_key.key_len); | |
236 | } | |
237 | else { | |
238 | if (param->u.wpa_key.key && | |
239 | copy_from_user(&abyKey[0], param->u.wpa_key.key, param->u.wpa_key.key_len)) { | |
240 | spin_lock_irq(&pDevice->lock); | |
241 | return -EINVAL; | |
242 | } | |
243 | } | |
244 | spin_lock_irq(&pDevice->lock); | |
245 | ||
246 | dwKeyIndex = (DWORD)(param->u.wpa_key.key_index); | |
247 | ||
248 | if (param->u.wpa_key.alg_name == WPA_ALG_WEP) { | |
249 | if (dwKeyIndex > 3) { | |
250 | return -EINVAL; | |
251 | } | |
252 | else { | |
253 | if (param->u.wpa_key.set_tx) { | |
254 | pDevice->byKeyIndex = (BYTE)dwKeyIndex; | |
255 | pDevice->bTransmitKey = TRUE; | |
256 | dwKeyIndex |= (1 << 31); | |
257 | } | |
258 | KeybSetDefaultKey( pDevice, | |
259 | &(pDevice->sKey), | |
260 | dwKeyIndex & ~(BIT30 | USE_KEYRSC), | |
261 | param->u.wpa_key.key_len, | |
262 | NULL, | |
263 | abyKey, | |
264 | KEY_CTL_WEP | |
265 | ); | |
266 | ||
267 | } | |
268 | pDevice->eEncryptionStatus = Ndis802_11Encryption1Enabled; | |
269 | pDevice->bEncryptionEnable = TRUE; | |
270 | return ret; | |
271 | } | |
272 | ||
273 | spin_unlock_irq(&pDevice->lock); | |
274 | if(param->u.wpa_key.seq && fcpfkernel) { | |
275 | memcpy(&abySeq[0], param->u.wpa_key.seq, param->u.wpa_key.seq_len); | |
276 | } | |
277 | else { | |
278 | if (param->u.wpa_key.seq && | |
279 | copy_from_user(&abySeq[0], param->u.wpa_key.seq, param->u.wpa_key.seq_len)) { | |
280 | spin_lock_irq(&pDevice->lock); | |
281 | return -EINVAL; | |
282 | } | |
283 | } | |
284 | spin_lock_irq(&pDevice->lock); | |
285 | ||
286 | if (param->u.wpa_key.seq_len > 0) { | |
287 | for (ii = 0 ; ii < param->u.wpa_key.seq_len ; ii++) { | |
288 | if (ii < 4) | |
289 | LODWORD(KeyRSC) |= (abySeq[ii] << (ii * 8)); | |
290 | else | |
291 | HIDWORD(KeyRSC) |= (abySeq[ii] << ((ii-4) * 8)); | |
292 | //KeyRSC |= (abySeq[ii] << (ii * 8)); | |
293 | } | |
294 | dwKeyIndex |= 1 << 29; | |
295 | } | |
296 | ||
297 | if (param->u.wpa_key.key_index >= MAX_GROUP_KEY) { | |
298 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "return dwKeyIndex > 3\n"); | |
299 | return -EINVAL; | |
300 | } | |
301 | ||
302 | if (param->u.wpa_key.alg_name == WPA_ALG_TKIP) { | |
303 | pDevice->eEncryptionStatus = Ndis802_11Encryption2Enabled; | |
304 | } | |
305 | ||
306 | if (param->u.wpa_key.alg_name == WPA_ALG_CCMP) { | |
307 | pDevice->eEncryptionStatus = Ndis802_11Encryption3Enabled; | |
308 | } | |
309 | ||
310 | if (param->u.wpa_key.set_tx) | |
311 | dwKeyIndex |= (1 << 31); | |
312 | ||
313 | ||
314 | if (pDevice->eEncryptionStatus == Ndis802_11Encryption3Enabled) | |
315 | byKeyDecMode = KEY_CTL_CCMP; | |
316 | else if (pDevice->eEncryptionStatus == Ndis802_11Encryption2Enabled) | |
317 | byKeyDecMode = KEY_CTL_TKIP; | |
318 | else | |
319 | byKeyDecMode = KEY_CTL_WEP; | |
320 | ||
321 | // Fix HCT test that set 256 bits KEY and Ndis802_11Encryption3Enabled | |
322 | if (pDevice->eEncryptionStatus == Ndis802_11Encryption3Enabled) { | |
323 | if (param->u.wpa_key.key_len == MAX_KEY_LEN) | |
324 | byKeyDecMode = KEY_CTL_TKIP; | |
325 | else if (param->u.wpa_key.key_len == WLAN_WEP40_KEYLEN) | |
326 | byKeyDecMode = KEY_CTL_WEP; | |
327 | else if (param->u.wpa_key.key_len == WLAN_WEP104_KEYLEN) | |
328 | byKeyDecMode = KEY_CTL_WEP; | |
329 | } else if (pDevice->eEncryptionStatus == Ndis802_11Encryption2Enabled) { | |
330 | if (param->u.wpa_key.key_len == WLAN_WEP40_KEYLEN) | |
331 | byKeyDecMode = KEY_CTL_WEP; | |
332 | else if (param->u.wpa_key.key_len == WLAN_WEP104_KEYLEN) | |
333 | byKeyDecMode = KEY_CTL_WEP; | |
334 | } | |
335 | ||
336 | // Check TKIP key length | |
337 | if ((byKeyDecMode == KEY_CTL_TKIP) && | |
338 | (param->u.wpa_key.key_len != MAX_KEY_LEN)) { | |
339 | // TKIP Key must be 256 bits | |
340 | //DBG_PRN_WLAN03(("return NDIS_STATUS_INVALID_DATA - TKIP Key must be 256 bits\n")); | |
341 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "return- TKIP Key must be 256 bits!\n"); | |
342 | return -EINVAL; | |
343 | } | |
344 | // Check AES key length | |
345 | if ((byKeyDecMode == KEY_CTL_CCMP) && | |
346 | (param->u.wpa_key.key_len != AES_KEY_LEN)) { | |
347 | // AES Key must be 128 bits | |
348 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "return - AES Key must be 128 bits\n"); | |
349 | return -EINVAL; | |
350 | } | |
351 | ||
352 | ||
353 | if (IS_BROADCAST_ADDRESS(¶m->addr[0]) || (param->addr == NULL)) { | |
354 | // If IS_BROADCAST_ADDRESS, set the key as every key entry's group key. | |
355 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Groupe Key Assign.\n"); | |
356 | ||
357 | if ((KeybSetAllGroupKey(pDevice, | |
358 | &(pDevice->sKey), | |
359 | dwKeyIndex, | |
360 | param->u.wpa_key.key_len, | |
361 | (PQWORD) &(KeyRSC), | |
362 | (PBYTE)abyKey, | |
363 | byKeyDecMode | |
364 | ) == TRUE) && | |
365 | (KeybSetDefaultKey(pDevice, | |
366 | &(pDevice->sKey), | |
367 | dwKeyIndex, | |
368 | param->u.wpa_key.key_len, | |
369 | (PQWORD) &(KeyRSC), | |
370 | (PBYTE)abyKey, | |
371 | byKeyDecMode | |
372 | ) == TRUE) ) { | |
373 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "GROUP Key Assign.\n"); | |
374 | ||
375 | } else { | |
376 | //DBG_PRN_WLAN03(("return NDIS_STATUS_INVALID_DATA -KeybSetDefaultKey Fail.0\n")); | |
377 | return -EINVAL; | |
378 | } | |
379 | ||
380 | } else { | |
381 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Pairwise Key Assign.\n"); | |
382 | // BSSID not 0xffffffffffff | |
383 | // Pairwise Key can't be WEP | |
384 | if (byKeyDecMode == KEY_CTL_WEP) { | |
385 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Pairwise Key can't be WEP\n"); | |
386 | return -EINVAL; | |
387 | } | |
388 | ||
389 | dwKeyIndex |= (1 << 30); // set pairwise key | |
390 | if (pMgmt->eConfigMode == WMAC_CONFIG_IBSS_STA) { | |
391 | //DBG_PRN_WLAN03(("return NDIS_STATUS_INVALID_DATA - WMAC_CONFIG_IBSS_STA\n")); | |
392 | return -EINVAL; | |
393 | } | |
394 | if (KeybSetKey(pDevice, | |
395 | &(pDevice->sKey), | |
396 | ¶m->addr[0], | |
397 | dwKeyIndex, | |
398 | param->u.wpa_key.key_len, | |
399 | (PQWORD) &(KeyRSC), | |
400 | (PBYTE)abyKey, | |
401 | byKeyDecMode | |
402 | ) == TRUE) { | |
403 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Pairwise Key Set\n"); | |
404 | ||
405 | } else { | |
406 | // Key Table Full | |
407 | if (IS_ETH_ADDRESS_EQUAL(¶m->addr[0], pDevice->abyBSSID)) { | |
408 | //DBG_PRN_WLAN03(("return NDIS_STATUS_INVALID_DATA -Key Table Full.2\n")); | |
409 | return -EINVAL; | |
410 | ||
411 | } else { | |
412 | // Save Key and configure just before associate/reassociate to BSSID | |
413 | // we do not implement now | |
414 | return -EINVAL; | |
415 | } | |
416 | } | |
417 | } // BSSID not 0xffffffffffff | |
418 | if ((ret == 0) && ((param->u.wpa_key.set_tx) != 0)) { | |
419 | pDevice->byKeyIndex = (BYTE)param->u.wpa_key.key_index; | |
420 | pDevice->bTransmitKey = TRUE; | |
421 | } | |
422 | pDevice->bEncryptionEnable = TRUE; | |
423 | ||
424 | /* | |
425 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO " key=%x-%x-%x-%x-%x-xxxxx \n", | |
426 | pMgmt->sNodeDBTable[iNodeIndex].abyWepKey[byKeyIndex][0], | |
427 | pMgmt->sNodeDBTable[iNodeIndex].abyWepKey[byKeyIndex][1], | |
428 | pMgmt->sNodeDBTable[iNodeIndex].abyWepKey[byKeyIndex][2], | |
429 | pMgmt->sNodeDBTable[iNodeIndex].abyWepKey[byKeyIndex][3], | |
430 | pMgmt->sNodeDBTable[iNodeIndex].abyWepKey[byKeyIndex][4] | |
431 | ); | |
432 | */ | |
433 | ||
434 | return ret; | |
435 | ||
436 | } | |
437 | ||
438 | ||
439 | /* | |
440 | * Description: | |
441 | * enable wpa auth & mode | |
442 | * | |
443 | * Parameters: | |
444 | * In: | |
445 | * pDevice - | |
446 | * param - | |
447 | * Out: | |
448 | * | |
449 | * Return Value: | |
450 | * | |
451 | */ | |
452 | ||
453 | static int wpa_set_wpa(PSDevice pDevice, | |
454 | struct viawget_wpa_param *param) | |
455 | { | |
456 | ||
457 | PSMgmtObject pMgmt = &(pDevice->sMgmtObj); | |
458 | int ret = 0; | |
459 | ||
460 | pMgmt->eAuthenMode = WMAC_AUTH_OPEN; | |
461 | pMgmt->bShareKeyAlgorithm = FALSE; | |
462 | ||
463 | return ret; | |
464 | } | |
465 | ||
466 | ||
467 | ||
468 | ||
469 | /* | |
470 | * Description: | |
471 | * set disassociate | |
472 | * | |
473 | * Parameters: | |
474 | * In: | |
475 | * pDevice - | |
476 | * param - | |
477 | * Out: | |
478 | * | |
479 | * Return Value: | |
480 | * | |
481 | */ | |
482 | ||
483 | static int wpa_set_disassociate(PSDevice pDevice, | |
484 | struct viawget_wpa_param *param) | |
485 | { | |
486 | PSMgmtObject pMgmt = &(pDevice->sMgmtObj); | |
487 | int ret = 0; | |
488 | ||
489 | spin_lock_irq(&pDevice->lock); | |
490 | if (pDevice->bLinkPass) { | |
491 | if (!memcmp(param->addr, pMgmt->abyCurrBSSID, 6)) | |
0cbd8d98 | 492 | bScheduleCommand((void *) pDevice, WLAN_CMD_DISASSOCIATE, NULL); |
92b96797 FB |
493 | } |
494 | spin_unlock_irq(&pDevice->lock); | |
495 | ||
496 | return ret; | |
497 | } | |
498 | ||
499 | ||
500 | ||
501 | /* | |
502 | * Description: | |
503 | * enable scan process | |
504 | * | |
505 | * Parameters: | |
506 | * In: | |
507 | * pDevice - | |
508 | * param - | |
509 | * Out: | |
510 | * | |
511 | * Return Value: | |
512 | * | |
513 | */ | |
514 | ||
515 | static int wpa_set_scan(PSDevice pDevice, | |
0cbd8d98 | 516 | struct viawget_wpa_param *param) |
92b96797 FB |
517 | { |
518 | int ret = 0; | |
519 | ||
520 | //2007-0919-01<Add>by MikeLiu | |
521 | /**set ap_scan=1&&scan_ssid=1 under hidden ssid mode**/ | |
522 | PSMgmtObject pMgmt = &(pDevice->sMgmtObj); | |
523 | PWLAN_IE_SSID pItemSSID; | |
524 | printk("wpa_set_scan-->desired [ssid=%s,ssid_len=%d]\n", | |
525 | param->u.scan_req.ssid,param->u.scan_req.ssid_len); | |
526 | // Set the SSID | |
527 | memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1); | |
528 | pItemSSID = (PWLAN_IE_SSID)pMgmt->abyDesireSSID; | |
529 | pItemSSID->byElementID = WLAN_EID_SSID; | |
530 | memcpy(pItemSSID->abySSID, param->u.scan_req.ssid, param->u.scan_req.ssid_len); | |
531 | pItemSSID->len = param->u.scan_req.ssid_len; | |
532 | ||
533 | spin_lock_irq(&pDevice->lock); | |
0cbd8d98 AM |
534 | BSSvClearBSSList((void *) pDevice, pDevice->bLinkPass); |
535 | /* bScheduleCommand((void *) pDevice, WLAN_CMD_BSSID_SCAN, NULL); */ | |
536 | bScheduleCommand((void *) pDevice, | |
537 | WLAN_CMD_BSSID_SCAN, | |
538 | pMgmt->abyDesireSSID); | |
92b96797 FB |
539 | spin_unlock_irq(&pDevice->lock); |
540 | ||
541 | return ret; | |
542 | } | |
543 | ||
544 | ||
545 | ||
546 | /* | |
547 | * Description: | |
548 | * get bssid | |
549 | * | |
550 | * Parameters: | |
551 | * In: | |
552 | * pDevice - | |
553 | * param - | |
554 | * Out: | |
555 | * | |
556 | * Return Value: | |
557 | * | |
558 | */ | |
559 | ||
560 | static int wpa_get_bssid(PSDevice pDevice, | |
561 | struct viawget_wpa_param *param) | |
562 | { | |
563 | PSMgmtObject pMgmt = &(pDevice->sMgmtObj); | |
564 | int ret = 0; | |
565 | memcpy(param->u.wpa_associate.bssid, pMgmt->abyCurrBSSID , 6); | |
566 | ||
567 | return ret; | |
568 | ||
569 | } | |
570 | ||
571 | ||
572 | /* | |
573 | * Description: | |
574 | * get bssid | |
575 | * | |
576 | * Parameters: | |
577 | * In: | |
578 | * pDevice - | |
579 | * param - | |
580 | * Out: | |
581 | * | |
582 | * Return Value: | |
583 | * | |
584 | */ | |
585 | ||
586 | static int wpa_get_ssid(PSDevice pDevice, | |
587 | struct viawget_wpa_param *param) | |
588 | { | |
589 | PSMgmtObject pMgmt = &(pDevice->sMgmtObj); | |
590 | PWLAN_IE_SSID pItemSSID; | |
591 | int ret = 0; | |
592 | ||
593 | pItemSSID = (PWLAN_IE_SSID)pMgmt->abyCurrSSID; | |
594 | ||
595 | memcpy(param->u.wpa_associate.ssid, pItemSSID->abySSID , pItemSSID->len); | |
596 | param->u.wpa_associate.ssid_len = pItemSSID->len; | |
597 | ||
598 | return ret; | |
599 | } | |
600 | ||
601 | ||
602 | ||
603 | /* | |
604 | * Description: | |
605 | * get scan results | |
606 | * | |
607 | * Parameters: | |
608 | * In: | |
609 | * pDevice - | |
610 | * param - | |
611 | * Out: | |
612 | * | |
613 | * Return Value: | |
614 | * | |
615 | */ | |
616 | ||
617 | static int wpa_get_scan(PSDevice pDevice, | |
618 | struct viawget_wpa_param *param) | |
619 | { | |
620 | struct viawget_scan_result *scan_buf; | |
621 | PSMgmtObject pMgmt = &(pDevice->sMgmtObj); | |
622 | PWLAN_IE_SSID pItemSSID; | |
623 | PKnownBSS pBSS; | |
624 | PBYTE pBuf; | |
625 | int ret = 0; | |
626 | u16 count = 0; | |
627 | u16 ii, jj; | |
628 | long ldBm;//James //add | |
629 | ||
630 | //******mike:bubble sort by stronger RSSI*****// | |
631 | ||
632 | PBYTE ptempBSS; | |
633 | ||
634 | ||
635 | ||
636 | ptempBSS = kmalloc(sizeof(KnownBSS), (int)GFP_ATOMIC); | |
637 | ||
638 | if (ptempBSS == NULL) { | |
639 | ||
640 | printk("bubble sort kmalloc memory fail@@@\n"); | |
641 | ||
642 | ret = -ENOMEM; | |
643 | ||
644 | return ret; | |
645 | ||
646 | } | |
647 | ||
648 | for (ii = 0; ii < MAX_BSS_NUM; ii++) { | |
649 | ||
650 | for(jj=0;jj<MAX_BSS_NUM-ii-1;jj++) { | |
651 | ||
652 | if((pMgmt->sBSSList[jj].bActive!=TRUE) || | |
653 | ||
654 | ((pMgmt->sBSSList[jj].uRSSI>pMgmt->sBSSList[jj+1].uRSSI) &&(pMgmt->sBSSList[jj+1].bActive!=FALSE))) { | |
655 | ||
656 | memcpy(ptempBSS,&pMgmt->sBSSList[jj],sizeof(KnownBSS)); | |
657 | ||
658 | memcpy(&pMgmt->sBSSList[jj],&pMgmt->sBSSList[jj+1],sizeof(KnownBSS)); | |
659 | ||
660 | memcpy(&pMgmt->sBSSList[jj+1],ptempBSS,sizeof(KnownBSS)); | |
661 | ||
662 | } | |
663 | ||
664 | } | |
665 | ||
666 | }; | |
667 | ||
668 | kfree(ptempBSS); | |
669 | ||
670 | // printk("bubble sort result:\n"); | |
671 | ||
672 | count = 0; | |
673 | pBSS = &(pMgmt->sBSSList[0]); | |
674 | for (ii = 0; ii < MAX_BSS_NUM; ii++) { | |
675 | pBSS = &(pMgmt->sBSSList[ii]); | |
676 | if (!pBSS->bActive) | |
677 | continue; | |
678 | count++; | |
679 | }; | |
680 | ||
7a6cb0d5 | 681 | pBuf = kcalloc(count, sizeof(struct viawget_scan_result), (int)GFP_ATOMIC); |
92b96797 FB |
682 | |
683 | if (pBuf == NULL) { | |
684 | ret = -ENOMEM; | |
685 | return ret; | |
686 | } | |
92b96797 FB |
687 | scan_buf = (struct viawget_scan_result *)pBuf; |
688 | pBSS = &(pMgmt->sBSSList[0]); | |
689 | for (ii = 0, jj = 0; ii < MAX_BSS_NUM ; ii++) { | |
690 | pBSS = &(pMgmt->sBSSList[ii]); | |
691 | if (pBSS->bActive) { | |
692 | if (jj >= count) | |
693 | break; | |
694 | memcpy(scan_buf->bssid, pBSS->abyBSSID, WLAN_BSSID_LEN); | |
695 | pItemSSID = (PWLAN_IE_SSID)pBSS->abySSID; | |
696 | memcpy(scan_buf->ssid, pItemSSID->abySSID, pItemSSID->len); | |
697 | scan_buf->ssid_len = pItemSSID->len; | |
698 | scan_buf->freq = frequency_list[pBSS->uChannel-1]; | |
699 | scan_buf->caps = pBSS->wCapInfo; //DavidWang for sharemode | |
700 | //20080717-05,<Add> by James Li | |
701 | RFvRSSITodBm(pDevice, (BYTE)(pBSS->uRSSI), &ldBm); | |
702 | if(-ldBm<50){ | |
703 | scan_buf->qual = 100; | |
704 | }else if(-ldBm > 90) { | |
705 | scan_buf->qual = 0; | |
706 | }else { | |
707 | scan_buf->qual=(40-(-ldBm-50))*100/40; | |
708 | } | |
709 | ||
710 | //James | |
711 | //scan_buf->caps = pBSS->wCapInfo; | |
712 | //scan_buf->qual = | |
713 | scan_buf->noise = 0; | |
714 | scan_buf->level = ldBm; | |
715 | //20080717-05,<Add> by James Li--End | |
716 | //scan_buf->maxrate = | |
717 | if (pBSS->wWPALen != 0) { | |
718 | scan_buf->wpa_ie_len = pBSS->wWPALen; | |
719 | memcpy(scan_buf->wpa_ie, pBSS->byWPAIE, pBSS->wWPALen); | |
720 | } | |
721 | if (pBSS->wRSNLen != 0) { | |
722 | scan_buf->rsn_ie_len = pBSS->wRSNLen; | |
723 | memcpy(scan_buf->rsn_ie, pBSS->byRSNIE, pBSS->wRSNLen); | |
724 | } | |
725 | scan_buf = (struct viawget_scan_result *)((PBYTE)scan_buf + sizeof(struct viawget_scan_result)); | |
726 | jj ++; | |
727 | } | |
728 | } | |
729 | ||
730 | if (jj < count) | |
731 | count = jj; | |
732 | ||
733 | if (copy_to_user(param->u.scan_results.buf, pBuf, sizeof(struct viawget_scan_result) * count)) { | |
734 | ret = -EFAULT; | |
735 | }; | |
736 | param->u.scan_results.scan_count = count; | |
737 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO " param->u.scan_results.scan_count = %d\n", count) | |
738 | ||
739 | kfree(pBuf); | |
740 | return ret; | |
741 | } | |
742 | ||
743 | ||
744 | ||
745 | /* | |
746 | * Description: | |
747 | * set associate with AP | |
748 | * | |
749 | * Parameters: | |
750 | * In: | |
751 | * pDevice - | |
752 | * param - | |
753 | * Out: | |
754 | * | |
755 | * Return Value: | |
756 | * | |
757 | */ | |
758 | ||
759 | static int wpa_set_associate(PSDevice pDevice, | |
760 | struct viawget_wpa_param *param) | |
761 | { | |
762 | PSMgmtObject pMgmt = &(pDevice->sMgmtObj); | |
763 | PWLAN_IE_SSID pItemSSID; | |
764 | BYTE abyNullAddr[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; | |
765 | BYTE abyWPAIE[64]; | |
766 | int ret = 0; | |
767 | BOOL bwepEnabled=FALSE; | |
768 | ||
769 | // set key type & algorithm | |
770 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "pairwise_suite = %d\n", param->u.wpa_associate.pairwise_suite); | |
771 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "group_suite = %d\n", param->u.wpa_associate.group_suite); | |
772 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "key_mgmt_suite = %d\n", param->u.wpa_associate.key_mgmt_suite); | |
773 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "auth_alg = %d\n", param->u.wpa_associate.auth_alg); | |
774 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "mode = %d\n", param->u.wpa_associate.mode); | |
775 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "wpa_ie_len = %d\n", param->u.wpa_associate.wpa_ie_len); | |
776 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Roaming dBm = %d\n", param->u.wpa_associate.roam_dbm); //Davidwang | |
777 | ||
778 | if (param->u.wpa_associate.wpa_ie && | |
779 | copy_from_user(&abyWPAIE[0], param->u.wpa_associate.wpa_ie, param->u.wpa_associate.wpa_ie_len)) | |
780 | return -EINVAL; | |
781 | ||
782 | if (param->u.wpa_associate.mode == 1) | |
783 | pMgmt->eConfigMode = WMAC_CONFIG_IBSS_STA; | |
784 | else | |
785 | pMgmt->eConfigMode = WMAC_CONFIG_ESS_STA; | |
786 | ||
787 | // set bssid | |
788 | if (memcmp(param->u.wpa_associate.bssid, &abyNullAddr[0], 6) != 0) | |
789 | memcpy(pMgmt->abyDesireBSSID, param->u.wpa_associate.bssid, 6); | |
790 | // set ssid | |
791 | memset(pMgmt->abyDesireSSID, 0, WLAN_IEHDR_LEN + WLAN_SSID_MAXLEN + 1); | |
792 | pItemSSID = (PWLAN_IE_SSID)pMgmt->abyDesireSSID; | |
793 | pItemSSID->byElementID = WLAN_EID_SSID; | |
794 | pItemSSID->len = param->u.wpa_associate.ssid_len; | |
795 | memcpy(pItemSSID->abySSID, param->u.wpa_associate.ssid, pItemSSID->len); | |
796 | ||
797 | if (param->u.wpa_associate.wpa_ie_len == 0) { | |
798 | if (param->u.wpa_associate.auth_alg & AUTH_ALG_SHARED_KEY) | |
799 | pMgmt->eAuthenMode = WMAC_AUTH_SHAREKEY; | |
800 | else | |
801 | pMgmt->eAuthenMode = WMAC_AUTH_OPEN; | |
802 | } else if (abyWPAIE[0] == RSN_INFO_ELEM) { | |
803 | if (param->u.wpa_associate.key_mgmt_suite == KEY_MGMT_PSK) | |
804 | pMgmt->eAuthenMode = WMAC_AUTH_WPA2PSK; | |
805 | else | |
806 | pMgmt->eAuthenMode = WMAC_AUTH_WPA2; | |
807 | } else { | |
808 | if (param->u.wpa_associate.key_mgmt_suite == KEY_MGMT_WPA_NONE) | |
809 | pMgmt->eAuthenMode = WMAC_AUTH_WPANONE; | |
810 | else if (param->u.wpa_associate.key_mgmt_suite == KEY_MGMT_PSK) | |
811 | pMgmt->eAuthenMode = WMAC_AUTH_WPAPSK; | |
812 | else | |
813 | pMgmt->eAuthenMode = WMAC_AUTH_WPA; | |
814 | } | |
815 | ||
816 | switch (param->u.wpa_associate.pairwise_suite) { | |
817 | case CIPHER_CCMP: | |
818 | pDevice->eEncryptionStatus = Ndis802_11Encryption3Enabled; | |
819 | break; | |
820 | case CIPHER_TKIP: | |
821 | pDevice->eEncryptionStatus = Ndis802_11Encryption2Enabled; | |
822 | break; | |
823 | case CIPHER_WEP40: | |
824 | case CIPHER_WEP104: | |
825 | pDevice->eEncryptionStatus = Ndis802_11Encryption1Enabled; | |
826 | bwepEnabled = TRUE; | |
827 | // printk("****************wpa_set_associate:set CIPHER_WEP40_104\n"); | |
828 | break; | |
829 | case CIPHER_NONE: | |
830 | if (param->u.wpa_associate.group_suite == CIPHER_CCMP) | |
831 | pDevice->eEncryptionStatus = Ndis802_11Encryption3Enabled; | |
832 | else | |
833 | pDevice->eEncryptionStatus = Ndis802_11Encryption2Enabled; | |
834 | break; | |
835 | default: | |
836 | pDevice->eEncryptionStatus = Ndis802_11EncryptionDisabled; | |
837 | }; | |
838 | ||
839 | pMgmt->Roam_dbm = param->u.wpa_associate.roam_dbm; | |
840 | // if ((pMgmt->Roam_dbm > 40)&&(pMgmt->Roam_dbm<80)) | |
841 | // pDevice->bEnableRoaming = TRUE; | |
842 | ||
843 | if (pMgmt->eAuthenMode == WMAC_AUTH_SHAREKEY) { //@wep-sharekey | |
844 | pDevice->eEncryptionStatus = Ndis802_11Encryption1Enabled; | |
845 | pMgmt->bShareKeyAlgorithm = TRUE; | |
846 | } | |
847 | else if (pMgmt->eAuthenMode == WMAC_AUTH_OPEN) { | |
848 | if(bwepEnabled==TRUE) { //@open-wep | |
849 | pDevice->eEncryptionStatus = Ndis802_11Encryption1Enabled; | |
850 | } | |
851 | else { //@only open | |
852 | pDevice->eEncryptionStatus = Ndis802_11EncryptionDisabled; | |
853 | } | |
854 | } | |
855 | //mike save old encryption status | |
856 | pDevice->eOldEncryptionStatus = pDevice->eEncryptionStatus; | |
857 | ||
858 | if (pDevice->eEncryptionStatus != Ndis802_11EncryptionDisabled) | |
859 | pDevice->bEncryptionEnable = TRUE; | |
860 | else | |
861 | pDevice->bEncryptionEnable = FALSE; | |
862 | ||
863 | if ((pMgmt->eAuthenMode == WMAC_AUTH_SHAREKEY) || | |
864 | ((pMgmt->eAuthenMode == WMAC_AUTH_OPEN) && (bwepEnabled==TRUE))) { | |
865 | //mike re-comment:open-wep && sharekey-wep needn't do initial key!! | |
866 | ||
867 | } | |
868 | else | |
869 | KeyvInitTable(pDevice,&pDevice->sKey); | |
870 | ||
871 | spin_lock_irq(&pDevice->lock); | |
872 | pDevice->bLinkPass = FALSE; | |
873 | ControlvMaskByte(pDevice,MESSAGE_REQUEST_MACREG,MAC_REG_PAPEDELAY,LEDSTS_STS,LEDSTS_SLOW); | |
874 | memset(pMgmt->abyCurrBSSID, 0, 6); | |
875 | pMgmt->eCurrState = WMAC_STATE_IDLE; | |
876 | netif_stop_queue(pDevice->dev); | |
877 | ||
878 | //20080701-02,<Add> by Mike Liu | |
879 | /*******search if ap_scan=2 ,which is associating request in hidden ssid mode ****/ | |
880 | { | |
881 | PKnownBSS pCurr = NULL; | |
882 | pCurr = BSSpSearchBSSList(pDevice, | |
883 | pMgmt->abyDesireBSSID, | |
884 | pMgmt->abyDesireSSID, | |
885 | pDevice->eConfigPHYMode | |
886 | ); | |
887 | ||
888 | if (pCurr == NULL){ | |
889 | printk("wpa_set_associate---->hidden mode site survey before associate.......\n"); | |
0cbd8d98 AM |
890 | bScheduleCommand((void *) pDevice, |
891 | WLAN_CMD_BSSID_SCAN, | |
892 | pMgmt->abyDesireSSID); | |
92b96797 FB |
893 | }; |
894 | } | |
895 | /****************************************************************/ | |
896 | ||
0cbd8d98 | 897 | bScheduleCommand((void *) pDevice, WLAN_CMD_SSID, NULL); |
92b96797 FB |
898 | spin_unlock_irq(&pDevice->lock); |
899 | ||
900 | return ret; | |
901 | } | |
902 | ||
903 | ||
904 | /* | |
905 | * Description: | |
906 | * wpa_ioctl main function supported for wpa supplicant | |
907 | * | |
908 | * Parameters: | |
909 | * In: | |
910 | * pDevice - | |
911 | * iw_point - | |
912 | * Out: | |
913 | * | |
914 | * Return Value: | |
915 | * | |
916 | */ | |
917 | ||
918 | int wpa_ioctl(PSDevice pDevice, struct iw_point *p) | |
919 | { | |
920 | struct viawget_wpa_param *param; | |
921 | int ret = 0; | |
922 | int wpa_ioctl = 0; | |
923 | ||
924 | if (p->length < sizeof(struct viawget_wpa_param) || | |
925 | p->length > VIAWGET_WPA_MAX_BUF_SIZE || !p->pointer) | |
926 | return -EINVAL; | |
927 | ||
32414878 | 928 | param = kmalloc((int)p->length, (int)GFP_KERNEL); |
92b96797 FB |
929 | if (param == NULL) |
930 | return -ENOMEM; | |
931 | ||
932 | if (copy_from_user(param, p->pointer, p->length)) { | |
933 | ret = -EFAULT; | |
934 | goto out; | |
935 | } | |
936 | ||
937 | switch (param->cmd) { | |
938 | case VIAWGET_SET_WPA: | |
939 | ret = wpa_set_wpa(pDevice, param); | |
940 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_WPA \n"); | |
941 | break; | |
942 | ||
943 | case VIAWGET_SET_KEY: | |
944 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_KEY \n"); | |
945 | spin_lock_irq(&pDevice->lock); | |
946 | ret = wpa_set_keys(pDevice, param, FALSE); | |
947 | spin_unlock_irq(&pDevice->lock); | |
948 | break; | |
949 | ||
950 | case VIAWGET_SET_SCAN: | |
951 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_SCAN \n"); | |
952 | ret = wpa_set_scan(pDevice, param); | |
953 | break; | |
954 | ||
955 | case VIAWGET_GET_SCAN: | |
956 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_GET_SCAN\n"); | |
957 | ret = wpa_get_scan(pDevice, param); | |
958 | wpa_ioctl = 1; | |
959 | break; | |
960 | ||
961 | case VIAWGET_GET_SSID: | |
962 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_GET_SSID \n"); | |
963 | ret = wpa_get_ssid(pDevice, param); | |
964 | wpa_ioctl = 1; | |
965 | break; | |
966 | ||
967 | case VIAWGET_GET_BSSID: | |
968 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_GET_BSSID \n"); | |
969 | ret = wpa_get_bssid(pDevice, param); | |
970 | wpa_ioctl = 1; | |
971 | break; | |
972 | ||
973 | case VIAWGET_SET_ASSOCIATE: | |
974 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_ASSOCIATE \n"); | |
975 | ret = wpa_set_associate(pDevice, param); | |
976 | break; | |
977 | ||
978 | case VIAWGET_SET_DISASSOCIATE: | |
979 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_DISASSOCIATE \n"); | |
980 | ret = wpa_set_disassociate(pDevice, param); | |
981 | break; | |
982 | ||
983 | case VIAWGET_SET_DROP_UNENCRYPT: | |
984 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_DROP_UNENCRYPT \n"); | |
985 | break; | |
986 | ||
987 | case VIAWGET_SET_DEAUTHENTICATE: | |
988 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_DEAUTHENTICATE \n"); | |
989 | break; | |
990 | ||
991 | default: | |
992 | DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "wpa_ioctl: unknown cmd=%d\n", | |
993 | param->cmd); | |
994 | return -EOPNOTSUPP; | |
995 | break; | |
996 | } | |
997 | ||
998 | if ((ret == 0) && wpa_ioctl) { | |
999 | if (copy_to_user(p->pointer, param, p->length)) { | |
1000 | ret = -EFAULT; | |
1001 | goto out; | |
1002 | } | |
1003 | } | |
1004 | ||
1005 | out: | |
1006 | if (param != NULL) | |
1007 | kfree(param); | |
1008 | ||
1009 | return ret; | |
1010 | } | |
1011 |