mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-25 11:37:56 +00:00
1699 lines
43 KiB
C
1699 lines
43 KiB
C
/*
|
|
* WPA Supplicant - Windows/NDIS driver interface
|
|
* Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* Alternatively, this software may be distributed under the terms of BSD
|
|
* license.
|
|
*
|
|
* See README and COPYING for more details.
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <Packet32.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <sys/unistd.h>
|
|
#include <ntddndis.h>
|
|
|
|
#include "common.h"
|
|
#include "driver.h"
|
|
#include "wpa_supplicant.h"
|
|
#include "l2_packet.h"
|
|
#include "eloop.h"
|
|
#include "wpa.h"
|
|
#include "driver_ndis.h"
|
|
|
|
int wpa_driver_register_event_cb(struct wpa_driver_ndis_data *drv);
|
|
|
|
static void wpa_driver_ndis_poll(void *drv);
|
|
|
|
|
|
/* FIX: to be removed once this can be compiled with the complete NDIS
|
|
* header files */
|
|
#ifndef OID_802_11_BSSID
|
|
#define OID_802_11_BSSID 0x0d010101
|
|
#define OID_802_11_SSID 0x0d010102
|
|
#define OID_802_11_INFRASTRUCTURE_MODE 0x0d010108
|
|
#define OID_802_11_ADD_WEP 0x0D010113
|
|
#define OID_802_11_REMOVE_WEP 0x0D010114
|
|
#define OID_802_11_DISASSOCIATE 0x0D010115
|
|
#define OID_802_11_BSSID_LIST 0x0d010217
|
|
#define OID_802_11_AUTHENTICATION_MODE 0x0d010118
|
|
#define OID_802_11_PRIVACY_FILTER 0x0d010119
|
|
#define OID_802_11_BSSID_LIST_SCAN 0x0d01011A
|
|
#define OID_802_11_WEP_STATUS 0x0d01011B
|
|
#define OID_802_11_ENCRYPTION_STATUS OID_802_11_WEP_STATUS
|
|
#define OID_802_11_ADD_KEY 0x0d01011D
|
|
#define OID_802_11_REMOVE_KEY 0x0d01011E
|
|
#define OID_802_11_ASSOCIATION_INFORMATION 0x0d01011F
|
|
#define OID_802_11_TEST 0x0d010120
|
|
#define OID_802_11_CAPABILITY 0x0d010122
|
|
#define OID_802_11_PMKID 0x0d010123
|
|
|
|
#define NDIS_802_11_LENGTH_SSID 32
|
|
#define NDIS_802_11_LENGTH_RATES 8
|
|
#define NDIS_802_11_LENGTH_RATES_EX 16
|
|
|
|
typedef UCHAR NDIS_802_11_MAC_ADDRESS[6];
|
|
|
|
typedef struct NDIS_802_11_SSID {
|
|
ULONG SsidLength;
|
|
UCHAR Ssid[NDIS_802_11_LENGTH_SSID];
|
|
} NDIS_802_11_SSID;
|
|
|
|
typedef LONG NDIS_802_11_RSSI;
|
|
|
|
typedef enum NDIS_802_11_NETWORK_TYPE {
|
|
Ndis802_11FH,
|
|
Ndis802_11DS,
|
|
Ndis802_11OFDM5,
|
|
Ndis802_11OFDM24,
|
|
Ndis802_11NetworkTypeMax
|
|
} NDIS_802_11_NETWORK_TYPE;
|
|
|
|
typedef struct NDIS_802_11_CONFIGURATION_FH {
|
|
ULONG Length;
|
|
ULONG HopPattern;
|
|
ULONG HopSet;
|
|
ULONG DwellTime;
|
|
} NDIS_802_11_CONFIGURATION_FH;
|
|
|
|
typedef struct NDIS_802_11_CONFIGURATION {
|
|
ULONG Length;
|
|
ULONG BeaconPeriod;
|
|
ULONG ATIMWindow;
|
|
ULONG DSConfig;
|
|
NDIS_802_11_CONFIGURATION_FH FHConfig;
|
|
} NDIS_802_11_CONFIGURATION;
|
|
|
|
typedef enum NDIS_802_11_NETWORK_INFRASTRUCTURE {
|
|
Ndis802_11IBSS,
|
|
Ndis802_11Infrastructure,
|
|
Ndis802_11AutoUnknown,
|
|
Ndis802_11InfrastructureMax
|
|
} NDIS_802_11_NETWORK_INFRASTRUCTURE;
|
|
|
|
typedef enum NDIS_802_11_AUTHENTICATION_MODE {
|
|
Ndis802_11AuthModeOpen,
|
|
Ndis802_11AuthModeShared,
|
|
Ndis802_11AuthModeAutoSwitch,
|
|
Ndis802_11AuthModeWPA,
|
|
Ndis802_11AuthModeWPAPSK,
|
|
Ndis802_11AuthModeWPANone,
|
|
Ndis802_11AuthModeWPA2,
|
|
Ndis802_11AuthModeWPA2PSK,
|
|
Ndis802_11AuthModeMax
|
|
} NDIS_802_11_AUTHENTICATION_MODE;
|
|
|
|
typedef enum NDIS_802_11_WEP_STATUS {
|
|
Ndis802_11WEPEnabled,
|
|
Ndis802_11Encryption1Enabled = Ndis802_11WEPEnabled,
|
|
Ndis802_11WEPDisabled,
|
|
Ndis802_11EncryptionDisabled = Ndis802_11WEPDisabled,
|
|
Ndis802_11WEPKeyAbsent,
|
|
Ndis802_11Encryption1KeyAbsent = Ndis802_11WEPKeyAbsent,
|
|
Ndis802_11WEPNotSupported,
|
|
Ndis802_11EncryptionNotSupported = Ndis802_11WEPNotSupported,
|
|
Ndis802_11Encryption2Enabled,
|
|
Ndis802_11Encryption2KeyAbsent,
|
|
Ndis802_11Encryption3Enabled,
|
|
Ndis802_11Encryption3KeyAbsent
|
|
} NDIS_802_11_WEP_STATUS, NDIS_802_11_ENCRYPTION_STATUS;
|
|
|
|
typedef enum NDIS_802_11_PRIVACY_FILTER {
|
|
Ndis802_11PrivFilterAcceptAll,
|
|
Ndis802_11PrivFilter8021xWEP
|
|
} NDIS_802_11_PRIVACY_FILTER;
|
|
|
|
typedef UCHAR NDIS_802_11_RATES[NDIS_802_11_LENGTH_RATES];
|
|
typedef UCHAR NDIS_802_11_RATES_EX[NDIS_802_11_LENGTH_RATES_EX];
|
|
|
|
typedef struct NDIS_WLAN_BSSID_EX {
|
|
ULONG Length;
|
|
NDIS_802_11_MAC_ADDRESS MacAddress; /* BSSID */
|
|
UCHAR Reserved[2];
|
|
NDIS_802_11_SSID Ssid;
|
|
ULONG Privacy;
|
|
NDIS_802_11_RSSI Rssi;
|
|
NDIS_802_11_NETWORK_TYPE NetworkTypeInUse;
|
|
NDIS_802_11_CONFIGURATION Configuration;
|
|
NDIS_802_11_NETWORK_INFRASTRUCTURE InfrastructureMode;
|
|
NDIS_802_11_RATES_EX SupportedRates;
|
|
ULONG IELength;
|
|
UCHAR IEs[1];
|
|
} NDIS_WLAN_BSSID_EX;
|
|
|
|
typedef struct NDIS_802_11_BSSID_LIST_EX {
|
|
ULONG NumberOfItems;
|
|
NDIS_WLAN_BSSID_EX Bssid[1];
|
|
} NDIS_802_11_BSSID_LIST_EX;
|
|
|
|
typedef struct NDIS_802_11_FIXED_IEs {
|
|
UCHAR Timestamp[8];
|
|
USHORT BeaconInterval;
|
|
USHORT Capabilities;
|
|
} NDIS_802_11_FIXED_IEs;
|
|
|
|
typedef struct NDIS_802_11_WEP {
|
|
ULONG Length;
|
|
ULONG KeyIndex;
|
|
ULONG KeyLength;
|
|
UCHAR KeyMaterial[1];
|
|
} NDIS_802_11_WEP;
|
|
|
|
typedef ULONG NDIS_802_11_KEY_INDEX;
|
|
typedef ULONGLONG NDIS_802_11_KEY_RSC;
|
|
|
|
typedef struct NDIS_802_11_KEY {
|
|
ULONG Length;
|
|
ULONG KeyIndex;
|
|
ULONG KeyLength;
|
|
NDIS_802_11_MAC_ADDRESS BSSID;
|
|
NDIS_802_11_KEY_RSC KeyRSC;
|
|
UCHAR KeyMaterial[1];
|
|
} NDIS_802_11_KEY;
|
|
|
|
typedef struct NDIS_802_11_REMOVE_KEY {
|
|
ULONG Length;
|
|
ULONG KeyIndex;
|
|
NDIS_802_11_MAC_ADDRESS BSSID;
|
|
} NDIS_802_11_REMOVE_KEY;
|
|
|
|
typedef struct NDIS_802_11_AI_REQFI {
|
|
USHORT Capabilities;
|
|
USHORT ListenInterval;
|
|
NDIS_802_11_MAC_ADDRESS CurrentAPAddress;
|
|
} NDIS_802_11_AI_REQFI;
|
|
|
|
typedef struct NDIS_802_11_AI_RESFI {
|
|
USHORT Capabilities;
|
|
USHORT StatusCode;
|
|
USHORT AssociationId;
|
|
} NDIS_802_11_AI_RESFI;
|
|
|
|
typedef struct NDIS_802_11_ASSOCIATION_INFORMATION {
|
|
ULONG Length;
|
|
USHORT AvailableRequestFixedIEs;
|
|
NDIS_802_11_AI_REQFI RequestFixedIEs;
|
|
ULONG RequestIELength;
|
|
ULONG OffsetRequestIEs;
|
|
USHORT AvailableResponseFixedIEs;
|
|
NDIS_802_11_AI_RESFI ResponseFixedIEs;
|
|
ULONG ResponseIELength;
|
|
ULONG OffsetResponseIEs;
|
|
} NDIS_802_11_ASSOCIATION_INFORMATION;
|
|
|
|
typedef struct NDIS_802_11_AUTHENTICATION_ENCRYPTION {
|
|
NDIS_802_11_AUTHENTICATION_MODE AuthModeSupported;
|
|
NDIS_802_11_ENCRYPTION_STATUS EncryptStatusSupported;
|
|
} NDIS_802_11_AUTHENTICATION_ENCRYPTION;
|
|
|
|
typedef struct NDIS_802_11_CAPABILITY {
|
|
ULONG Length;
|
|
ULONG Version;
|
|
ULONG NoOfPMKIDs;
|
|
ULONG NoOfAuthEncryptPairSupported;
|
|
NDIS_802_11_AUTHENTICATION_ENCRYPTION
|
|
AuthenticationEncryptionSupported[1];
|
|
} NDIS_802_11_CAPABILITY;
|
|
|
|
typedef UCHAR NDIS_802_11_PMKID_VALUE[16];
|
|
|
|
typedef struct BSSID_INFO {
|
|
NDIS_802_11_MAC_ADDRESS BSSID;
|
|
NDIS_802_11_PMKID_VALUE PMKID;
|
|
} BSSID_INFO;
|
|
|
|
typedef struct NDIS_802_11_PMKID {
|
|
ULONG Length;
|
|
ULONG BSSIDInfoCount;
|
|
BSSID_INFO BSSIDInfo[1];
|
|
} NDIS_802_11_PMKID;
|
|
|
|
typedef enum NDIS_802_11_STATUS_TYPE {
|
|
Ndis802_11StatusType_Authentication,
|
|
Ndis802_11StatusType_PMKID_CandidateList = 2,
|
|
Ndis802_11StatusTypeMax
|
|
} NDIS_802_11_STATUS_TYPE;
|
|
|
|
typedef struct NDIS_802_11_STATUS_INDICATION {
|
|
NDIS_802_11_STATUS_TYPE StatusType;
|
|
} NDIS_802_11_STATUS_INDICATION;
|
|
|
|
typedef struct PMKID_CANDIDATE {
|
|
NDIS_802_11_MAC_ADDRESS BSSID;
|
|
ULONG Flags;
|
|
} PMKID_CANDIDATE;
|
|
|
|
#define NDIS_802_11_PMKID_CANDIDATE_PREAUTH_ENABLED 0x01
|
|
|
|
typedef struct NDIS_802_11_PMKID_CANDIDATE_LIST {
|
|
ULONG Version;
|
|
ULONG NumCandidates;
|
|
PMKID_CANDIDATE CandidateList[1];
|
|
} NDIS_802_11_PMKID_CANDIDATE_LIST;
|
|
|
|
typedef struct NDIS_802_11_AUTHENTICATION_REQUEST {
|
|
ULONG Length;
|
|
NDIS_802_11_MAC_ADDRESS Bssid;
|
|
ULONG Flags;
|
|
} NDIS_802_11_AUTHENTICATION_REQUEST;
|
|
|
|
#define NDIS_802_11_AUTH_REQUEST_REAUTH 0x01
|
|
#define NDIS_802_11_AUTH_REQUEST_KEYUPDATE 0x02
|
|
#define NDIS_802_11_AUTH_REQUEST_PAIRWISE_ERROR 0x06
|
|
#define NDIS_802_11_AUTH_REQUEST_GROUP_ERROR 0x0E
|
|
|
|
#endif
|
|
|
|
|
|
static int ndis_get_oid(struct wpa_driver_ndis_data *drv, unsigned int oid,
|
|
char *data, int len)
|
|
{
|
|
char *buf;
|
|
PACKET_OID_DATA *o;
|
|
int ret;
|
|
|
|
buf = malloc(sizeof(*o) + len);
|
|
if (buf == NULL)
|
|
return -1;
|
|
memset(buf, 0, sizeof(*o) + len);
|
|
o = (PACKET_OID_DATA *) buf;
|
|
o->Oid = oid;
|
|
o->Length = len;
|
|
|
|
if (!PacketRequest(drv->adapter, FALSE, o)) {
|
|
wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
|
|
__func__, oid, len);
|
|
free(buf);
|
|
return -1;
|
|
}
|
|
if (o->Length > len) {
|
|
wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)",
|
|
__func__, oid, (unsigned int) o->Length, len);
|
|
free(buf);
|
|
return -1;
|
|
}
|
|
memcpy(data, o->Data, o->Length);
|
|
ret = o->Length;
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int ndis_set_oid(struct wpa_driver_ndis_data *drv, unsigned int oid,
|
|
char *data, int len)
|
|
{
|
|
char *buf;
|
|
PACKET_OID_DATA *o;
|
|
|
|
buf = malloc(sizeof(*o) + len);
|
|
if (buf == NULL)
|
|
return -1;
|
|
memset(buf, 0, sizeof(*o) + len);
|
|
o = (PACKET_OID_DATA *) buf;
|
|
o->Oid = oid;
|
|
o->Length = len;
|
|
if (data)
|
|
memcpy(o->Data, data, len);
|
|
|
|
if (!PacketRequest(drv->adapter, TRUE, o)) {
|
|
wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
|
|
__func__, oid, len);
|
|
free(buf);
|
|
return -1;
|
|
}
|
|
free(buf);
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int ndis_set_auth_mode(struct wpa_driver_ndis_data *drv, int mode)
|
|
{
|
|
u32 auth_mode = mode;
|
|
if (ndis_set_oid(drv, OID_802_11_AUTHENTICATION_MODE,
|
|
(char *) &auth_mode, sizeof(auth_mode)) < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
|
|
"OID_802_11_AUTHENTICATION_MODE (%d)",
|
|
(int) auth_mode);
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int ndis_get_auth_mode(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
u32 auth_mode;
|
|
int res;
|
|
res = ndis_get_oid(drv, OID_802_11_AUTHENTICATION_MODE,
|
|
(char *) &auth_mode, sizeof(auth_mode));
|
|
if (res != sizeof(auth_mode)) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
|
|
"OID_802_11_AUTHENTICATION_MODE");
|
|
return -1;
|
|
}
|
|
return auth_mode;
|
|
}
|
|
|
|
|
|
static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr)
|
|
{
|
|
u32 encr_status = encr;
|
|
if (ndis_set_oid(drv, OID_802_11_ENCRYPTION_STATUS,
|
|
(char *) &encr_status, sizeof(encr_status)) < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
|
|
"OID_802_11_ENCRYPTION_STATUS (%d)", encr);
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int ndis_get_encr_status(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
u32 encr;
|
|
int res;
|
|
res = ndis_get_oid(drv, OID_802_11_ENCRYPTION_STATUS,
|
|
(char *) &encr, sizeof(encr));
|
|
if (res != sizeof(encr)) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
|
|
"OID_802_11_ENCRYPTION_STATUS");
|
|
return -1;
|
|
}
|
|
return encr;
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_get_bssid(void *priv, u8 *bssid)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
|
|
if (drv->wired) {
|
|
/*
|
|
* Report PAE group address as the "BSSID" for wired
|
|
* connection.
|
|
*/
|
|
bssid[0] = 0x01;
|
|
bssid[1] = 0x80;
|
|
bssid[2] = 0xc2;
|
|
bssid[3] = 0x00;
|
|
bssid[4] = 0x00;
|
|
bssid[5] = 0x03;
|
|
return 0;
|
|
}
|
|
|
|
return ndis_get_oid(drv, OID_802_11_BSSID, bssid, ETH_ALEN) < 0 ?
|
|
-1 : 0;
|
|
}
|
|
|
|
|
|
|
|
static int wpa_driver_ndis_get_ssid(void *priv, u8 *ssid)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
NDIS_802_11_SSID buf;
|
|
int res;
|
|
|
|
res = ndis_get_oid(drv, OID_802_11_SSID, (char *) &buf, sizeof(buf));
|
|
if (res < 4) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Failed to get SSID");
|
|
if (drv->wired) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Allow get_ssid failure "
|
|
"with a wired interface");
|
|
return 0;
|
|
}
|
|
return -1;
|
|
}
|
|
memcpy(ssid, buf.Ssid, buf.SsidLength);
|
|
return buf.SsidLength;
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_set_ssid(struct wpa_driver_ndis_data *drv,
|
|
const u8 *ssid, size_t ssid_len)
|
|
{
|
|
NDIS_802_11_SSID buf;
|
|
|
|
memset(&buf, 0, sizeof(buf));
|
|
buf.SsidLength = ssid_len;
|
|
memcpy(buf.Ssid, ssid, ssid_len);
|
|
/*
|
|
* Make sure radio is marked enabled here so that scan request will not
|
|
* force SSID to be changed to a random one in order to enable radio at
|
|
* that point.
|
|
*/
|
|
drv->radio_enabled = 1;
|
|
return ndis_set_oid(drv, OID_802_11_SSID, (char *) &buf, sizeof(buf));
|
|
}
|
|
|
|
|
|
/* Disconnect using OID_802_11_DISASSOCIATE. This will also turn the radio off.
|
|
*/
|
|
static int wpa_driver_ndis_radio_off(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
drv->radio_enabled = 0;
|
|
return ndis_set_oid(drv, OID_802_11_DISASSOCIATE, " ", 4);
|
|
}
|
|
|
|
|
|
/* Disconnect by setting SSID to random (i.e., likely not used). */
|
|
static int wpa_driver_ndis_disconnect(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
char ssid[32];
|
|
int i;
|
|
for (i = 0; i < 32; i++)
|
|
ssid[i] = rand() & 0xff;
|
|
return wpa_driver_ndis_set_ssid(drv, ssid, 32);
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_deauthenticate(void *priv, const u8 *addr,
|
|
int reason_code)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
return wpa_driver_ndis_disconnect(drv);
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_disassociate(void *priv, const u8 *addr,
|
|
int reason_code)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
return wpa_driver_ndis_disconnect(drv);
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_set_wpa(void *priv, int enabled)
|
|
{
|
|
wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void wpa_driver_ndis_scan_timeout(void *eloop_ctx, void *timeout_ctx)
|
|
{
|
|
wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
|
|
wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_scan(void *priv, const u8 *ssid, size_t ssid_len)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
int res;
|
|
|
|
if (!drv->radio_enabled) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: turning radio on before the first"
|
|
" scan");
|
|
if (wpa_driver_ndis_disconnect(drv) < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: failed to enable radio");
|
|
}
|
|
drv->radio_enabled = 1;
|
|
}
|
|
|
|
res = ndis_set_oid(drv, OID_802_11_BSSID_LIST_SCAN, " ", 4);
|
|
eloop_register_timeout(3, 0, wpa_driver_ndis_scan_timeout, drv,
|
|
drv->ctx);
|
|
return res;
|
|
}
|
|
|
|
|
|
static void wpa_driver_ndis_get_ies(struct wpa_scan_result *res, u8 *ie,
|
|
size_t ie_len)
|
|
{
|
|
u8 *pos = ie;
|
|
u8 *end = ie + ie_len;
|
|
|
|
if (ie_len < sizeof(NDIS_802_11_FIXED_IEs))
|
|
return;
|
|
|
|
pos += sizeof(NDIS_802_11_FIXED_IEs);
|
|
/* wpa_hexdump(MSG_MSGDUMP, "IEs", pos, end - pos); */
|
|
while (pos + 1 < end && pos + 2 + pos[1] <= end) {
|
|
u8 ielen = 2 + pos[1];
|
|
if (ielen > SSID_MAX_WPA_IE_LEN) {
|
|
pos += ielen;
|
|
continue;
|
|
}
|
|
if (pos[0] == GENERIC_INFO_ELEM && pos[1] >= 4 &&
|
|
memcmp(pos + 2, "\x00\x50\xf2\x01", 4) == 0) {
|
|
memcpy(res->wpa_ie, pos, ielen);
|
|
res->wpa_ie_len = ielen;
|
|
} else if (pos[0] == RSN_INFO_ELEM) {
|
|
memcpy(res->rsn_ie, pos, ielen);
|
|
res->rsn_ie_len = ielen;
|
|
}
|
|
pos += ielen;
|
|
}
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_get_scan_results(void *priv,
|
|
struct wpa_scan_result *results,
|
|
size_t max_size)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
NDIS_802_11_BSSID_LIST_EX *b;
|
|
size_t blen;
|
|
int len, count, i, j;
|
|
char *pos;
|
|
|
|
blen = 65535;
|
|
b = malloc(blen);
|
|
if (b == NULL)
|
|
return -1;
|
|
memset(b, 0, blen);
|
|
len = ndis_get_oid(drv, OID_802_11_BSSID_LIST, (char *) b, blen);
|
|
if (len < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: failed to get scan results");
|
|
free(b);
|
|
return -1;
|
|
}
|
|
count = b->NumberOfItems;
|
|
|
|
if (count > max_size)
|
|
count = max_size;
|
|
|
|
memset(results, 0, max_size * sizeof(struct wpa_scan_result));
|
|
pos = (char *) &b->Bssid[0];
|
|
for (i = 0; i < count; i++) {
|
|
NDIS_WLAN_BSSID_EX *bss = (NDIS_WLAN_BSSID_EX *) pos;
|
|
memcpy(results[i].bssid, bss->MacAddress, ETH_ALEN);
|
|
memcpy(results[i].ssid, bss->Ssid.Ssid, bss->Ssid.SsidLength);
|
|
results[i].ssid_len = bss->Ssid.SsidLength;
|
|
if (bss->Privacy)
|
|
results[i].caps |= IEEE80211_CAP_PRIVACY;
|
|
results[i].level = (int) bss->Rssi;
|
|
results[i].freq = bss->Configuration.DSConfig / 1000;
|
|
for (j = 0; j < sizeof(bss->SupportedRates); j++) {
|
|
if ((bss->SupportedRates[j] & 0x7f) >
|
|
results[i].maxrate) {
|
|
results[i].maxrate =
|
|
bss->SupportedRates[j] & 0x7f;
|
|
}
|
|
}
|
|
wpa_driver_ndis_get_ies(&results[i], bss->IEs, bss->IELength);
|
|
pos += bss->Length;
|
|
if (pos > (char *) b + blen)
|
|
break;
|
|
}
|
|
|
|
free(b);
|
|
return count;
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv,
|
|
int key_idx, const u8 *addr,
|
|
const u8 *bssid, int pairwise)
|
|
{
|
|
NDIS_802_11_REMOVE_KEY rkey;
|
|
NDIS_802_11_KEY_INDEX index;
|
|
int res, res2;
|
|
|
|
memset(&rkey, 0, sizeof(rkey));
|
|
|
|
rkey.Length = sizeof(rkey);
|
|
rkey.KeyIndex = key_idx;
|
|
if (pairwise)
|
|
rkey.KeyIndex |= 1 << 30;
|
|
memcpy(rkey.BSSID, bssid, ETH_ALEN);
|
|
|
|
res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey,
|
|
sizeof(rkey));
|
|
if (!pairwise) {
|
|
res2 = ndis_set_oid(drv, OID_802_11_REMOVE_WEP,
|
|
(char *) &index, sizeof(index));
|
|
} else
|
|
res2 = 0;
|
|
|
|
if (res < 0 && res2 < 0)
|
|
return res;
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv,
|
|
int pairwise, int key_idx, int set_tx,
|
|
const u8 *key, size_t key_len)
|
|
{
|
|
NDIS_802_11_WEP *wep;
|
|
size_t len;
|
|
int res;
|
|
|
|
len = 12 + key_len;
|
|
wep = malloc(len);
|
|
if (wep == NULL)
|
|
return -1;
|
|
memset(wep, 0, len);
|
|
wep->Length = len;
|
|
wep->KeyIndex = key_idx;
|
|
if (set_tx)
|
|
wep->KeyIndex |= 1 << 31;
|
|
#if 0 /* Setting bit30 does not seem to work with some NDIS drivers */
|
|
if (pairwise)
|
|
wep->KeyIndex |= 1 << 30;
|
|
#endif
|
|
wep->KeyLength = key_len;
|
|
memcpy(wep->KeyMaterial, key, key_len);
|
|
|
|
wpa_hexdump_key(MSG_MSGDUMP, "NDIS: OIS_802_11_ADD_WEP",
|
|
(char *) wep, len);
|
|
res = ndis_set_oid(drv, OID_802_11_ADD_WEP, (char *) wep, len);
|
|
|
|
free(wep);
|
|
|
|
return res;
|
|
}
|
|
|
|
static int wpa_driver_ndis_set_key(void *priv, wpa_alg alg, const u8 *addr,
|
|
int key_idx, int set_tx,
|
|
const u8 *seq, size_t seq_len,
|
|
const u8 *key, size_t key_len)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
size_t len;
|
|
NDIS_802_11_KEY *nkey;
|
|
int i, res, pairwise;
|
|
u8 bssid[ETH_ALEN];
|
|
|
|
if (addr == NULL || memcmp(addr, "\xff\xff\xff\xff\xff\xff",
|
|
ETH_ALEN) == 0) {
|
|
/* Group Key */
|
|
pairwise = 0;
|
|
wpa_driver_ndis_get_bssid(drv, bssid);
|
|
} else {
|
|
/* Pairwise Key */
|
|
pairwise = 1;
|
|
memcpy(bssid, addr, ETH_ALEN);
|
|
}
|
|
|
|
if (alg == WPA_ALG_NONE || key_len == 0) {
|
|
return wpa_driver_ndis_remove_key(drv, key_idx, addr, bssid,
|
|
pairwise);
|
|
}
|
|
|
|
if (alg == WPA_ALG_WEP) {
|
|
return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx,
|
|
key, key_len);
|
|
}
|
|
|
|
len = 12 + 6 + 6 + 8 + key_len;
|
|
|
|
nkey = malloc(len);
|
|
if (nkey == NULL)
|
|
return -1;
|
|
memset(nkey, 0, len);
|
|
|
|
nkey->Length = len;
|
|
nkey->KeyIndex = key_idx;
|
|
if (set_tx)
|
|
nkey->KeyIndex |= 1 << 31;
|
|
if (pairwise)
|
|
nkey->KeyIndex |= 1 << 30;
|
|
if (seq && seq_len)
|
|
nkey->KeyIndex |= 1 << 29;
|
|
nkey->KeyLength = key_len;
|
|
memcpy(nkey->BSSID, bssid, ETH_ALEN);
|
|
if (seq && seq_len) {
|
|
for (i = 0; i < seq_len; i++)
|
|
nkey->KeyRSC |= seq[i] << (i * 8);
|
|
}
|
|
if (alg == WPA_ALG_TKIP && key_len == 32) {
|
|
memcpy(nkey->KeyMaterial, key, 16);
|
|
memcpy(nkey->KeyMaterial + 16, key + 24, 8);
|
|
memcpy(nkey->KeyMaterial + 24, key + 16, 8);
|
|
} else {
|
|
memcpy(nkey->KeyMaterial, key, key_len);
|
|
}
|
|
|
|
wpa_hexdump_key(MSG_MSGDUMP, "NDIS: OIS_802_11_ADD_KEY",
|
|
(char *) nkey, len);
|
|
res = ndis_set_oid(drv, OID_802_11_ADD_KEY, (char *) nkey, len);
|
|
free(nkey);
|
|
|
|
return res;
|
|
}
|
|
|
|
|
|
static int
|
|
wpa_driver_ndis_associate(void *priv,
|
|
struct wpa_driver_associate_params *params)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
u32 auth_mode, encr, priv_mode, mode;
|
|
|
|
/* Note: Setting OID_802_11_INFRASTRUCTURE_MODE clears current keys,
|
|
* so static WEP keys needs to be set again after this. */
|
|
if (params->mode == IEEE80211_MODE_IBSS)
|
|
mode = Ndis802_11IBSS;
|
|
else
|
|
mode = Ndis802_11Infrastructure;
|
|
if (ndis_set_oid(drv, OID_802_11_INFRASTRUCTURE_MODE,
|
|
(char *) &mode, sizeof(mode)) < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
|
|
"OID_802_11_INFRASTRUCTURE_MODE (%d)",
|
|
(int) mode);
|
|
/* Try to continue anyway */
|
|
}
|
|
|
|
if (params->wpa_ie == NULL || params->wpa_ie_len == 0) {
|
|
if (params->auth_alg & AUTH_ALG_SHARED_KEY) {
|
|
if (params->auth_alg & AUTH_ALG_OPEN_SYSTEM)
|
|
auth_mode = Ndis802_11AuthModeAutoSwitch;
|
|
else
|
|
auth_mode = Ndis802_11AuthModeShared;
|
|
} else
|
|
auth_mode = Ndis802_11AuthModeOpen;
|
|
priv_mode = Ndis802_11PrivFilterAcceptAll;
|
|
} else if (params->wpa_ie[0] == RSN_INFO_ELEM) {
|
|
priv_mode = Ndis802_11PrivFilter8021xWEP;
|
|
if (params->key_mgmt_suite == KEY_MGMT_PSK)
|
|
auth_mode = Ndis802_11AuthModeWPA2PSK;
|
|
else
|
|
auth_mode = Ndis802_11AuthModeWPA2;
|
|
} else {
|
|
priv_mode = Ndis802_11PrivFilter8021xWEP;
|
|
if (params->key_mgmt_suite == KEY_MGMT_WPA_NONE)
|
|
auth_mode = Ndis802_11AuthModeWPANone;
|
|
else if (params->key_mgmt_suite == KEY_MGMT_PSK)
|
|
auth_mode = Ndis802_11AuthModeWPAPSK;
|
|
else
|
|
auth_mode = Ndis802_11AuthModeWPA;
|
|
}
|
|
|
|
switch (params->pairwise_suite) {
|
|
case CIPHER_CCMP:
|
|
encr = Ndis802_11Encryption3Enabled;
|
|
break;
|
|
case CIPHER_TKIP:
|
|
encr = Ndis802_11Encryption2Enabled;
|
|
break;
|
|
case CIPHER_WEP40:
|
|
case CIPHER_WEP104:
|
|
encr = Ndis802_11Encryption1Enabled;
|
|
break;
|
|
case CIPHER_NONE:
|
|
if (params->group_suite == CIPHER_CCMP)
|
|
encr = Ndis802_11Encryption3Enabled;
|
|
else
|
|
encr = Ndis802_11Encryption2Enabled;
|
|
break;
|
|
default:
|
|
encr = Ndis802_11EncryptionDisabled;
|
|
};
|
|
|
|
if (ndis_set_oid(drv, OID_802_11_PRIVACY_FILTER,
|
|
(char *) &priv_mode, sizeof(priv_mode)) < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
|
|
"OID_802_11_PRIVACY_FILTER (%d)",
|
|
(int) priv_mode);
|
|
/* Try to continue anyway */
|
|
}
|
|
|
|
ndis_set_auth_mode(drv, auth_mode);
|
|
ndis_set_encr_status(drv, encr);
|
|
|
|
return wpa_driver_ndis_set_ssid(drv, params->ssid, params->ssid_len);
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_set_pmkid(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
int len, count, i, ret;
|
|
struct ndis_pmkid_entry *entry;
|
|
NDIS_802_11_PMKID *p;
|
|
|
|
count = 0;
|
|
entry = drv->pmkid;
|
|
while (entry) {
|
|
count++;
|
|
if (count >= drv->no_of_pmkid)
|
|
break;
|
|
entry = entry->next;
|
|
}
|
|
len = 8 + count * sizeof(BSSID_INFO);
|
|
p = malloc(len);
|
|
if (p == NULL)
|
|
return -1;
|
|
memset(p, 0, len);
|
|
p->Length = len;
|
|
p->BSSIDInfoCount = count;
|
|
entry = drv->pmkid;
|
|
for (i = 0; i < count; i++) {
|
|
memcpy(&p->BSSIDInfo[i].BSSID, entry->bssid, ETH_ALEN);
|
|
memcpy(&p->BSSIDInfo[i].PMKID, entry->pmkid, 16);
|
|
entry = entry->next;
|
|
}
|
|
wpa_hexdump(MSG_MSGDUMP, "NDIS: OID_802_11_PMKID", (char *) p, len);
|
|
ret = ndis_set_oid(drv, OID_802_11_PMKID, (char *) p, len);
|
|
free(p);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_add_pmkid(void *priv, const u8 *bssid,
|
|
const u8 *pmkid)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
struct ndis_pmkid_entry *entry, *prev;
|
|
|
|
if (drv->no_of_pmkid == 0)
|
|
return 0;
|
|
|
|
prev = NULL;
|
|
entry = drv->pmkid;
|
|
while (entry) {
|
|
if (memcmp(entry->bssid, bssid, ETH_ALEN) == 0)
|
|
break;
|
|
prev = entry;
|
|
entry = entry->next;
|
|
}
|
|
|
|
if (entry) {
|
|
/* Replace existing entry for this BSSID and move it into the
|
|
* beginning of the list. */
|
|
memcpy(entry->pmkid, pmkid, 16);
|
|
if (prev) {
|
|
prev->next = entry->next;
|
|
entry->next = drv->pmkid;
|
|
drv->pmkid = entry;
|
|
}
|
|
} else {
|
|
entry = malloc(sizeof(*entry));
|
|
if (entry) {
|
|
memcpy(entry->bssid, bssid, ETH_ALEN);
|
|
memcpy(entry->pmkid, pmkid, 16);
|
|
entry->next = drv->pmkid;
|
|
drv->pmkid = entry;
|
|
}
|
|
}
|
|
|
|
return wpa_driver_ndis_set_pmkid(drv);
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_remove_pmkid(void *priv, const u8 *bssid,
|
|
const u8 *pmkid)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
struct ndis_pmkid_entry *entry, *prev;
|
|
|
|
if (drv->no_of_pmkid == 0)
|
|
return 0;
|
|
|
|
entry = drv->pmkid;
|
|
prev = NULL;
|
|
drv->pmkid = NULL;
|
|
while (entry) {
|
|
if (memcmp(entry->bssid, bssid, ETH_ALEN) == 0 &&
|
|
memcmp(entry->pmkid, pmkid, 16) == 0) {
|
|
if (prev)
|
|
prev->next = entry->next;
|
|
else
|
|
drv->pmkid = entry->next;
|
|
free(entry);
|
|
break;
|
|
}
|
|
prev = entry;
|
|
entry = entry->next;
|
|
}
|
|
return wpa_driver_ndis_set_pmkid(drv);
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_flush_pmkid(void *priv)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
NDIS_802_11_PMKID p;
|
|
struct ndis_pmkid_entry *pmkid, *prev;
|
|
|
|
if (drv->no_of_pmkid == 0)
|
|
return 0;
|
|
|
|
pmkid = drv->pmkid;
|
|
drv->pmkid = NULL;
|
|
while (pmkid) {
|
|
prev = pmkid;
|
|
pmkid = pmkid->next;
|
|
free(prev);
|
|
}
|
|
|
|
memset(&p, 0, sizeof(p));
|
|
p.Length = 8;
|
|
p.BSSIDInfoCount = 0;
|
|
wpa_hexdump(MSG_MSGDUMP, "NDIS: OID_802_11_PMKID (flush)",
|
|
(char *) &p, 8);
|
|
return ndis_set_oid(drv, OID_802_11_PMKID, (char *) &p, 8);
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_get_associnfo(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
char buf[512], *pos;
|
|
NDIS_802_11_ASSOCIATION_INFORMATION *ai;
|
|
int len, i;
|
|
union wpa_event_data data;
|
|
NDIS_802_11_BSSID_LIST_EX *b;
|
|
size_t blen;
|
|
|
|
len = ndis_get_oid(drv, OID_802_11_ASSOCIATION_INFORMATION, buf,
|
|
sizeof(buf));
|
|
if (len < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: failed to get association "
|
|
"information");
|
|
return -1;
|
|
}
|
|
if (len > sizeof(buf)) {
|
|
/* Some drivers seem to be producing incorrect length for this
|
|
* data. Limit the length to the current buffer size to avoid
|
|
* crashing in hexdump. The data seems to be otherwise valid,
|
|
* so better try to use it. */
|
|
wpa_printf(MSG_DEBUG, "NDIS: ignored bogus association "
|
|
"information length %d", len);
|
|
len = ndis_get_oid(drv, OID_802_11_ASSOCIATION_INFORMATION,
|
|
buf, sizeof(buf));
|
|
if (len < -1) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: re-reading association "
|
|
"information failed");
|
|
return -1;
|
|
}
|
|
if (len > sizeof(buf)) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: ignored bogus association"
|
|
" information length %d (re-read)", len);
|
|
len = sizeof(buf);
|
|
}
|
|
}
|
|
wpa_hexdump(MSG_MSGDUMP, "NDIS: association information", buf, len);
|
|
if (len < sizeof(*ai)) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: too short association "
|
|
"information");
|
|
return -1;
|
|
}
|
|
ai = (NDIS_802_11_ASSOCIATION_INFORMATION *) buf;
|
|
wpa_printf(MSG_DEBUG, "NDIS: ReqFixed=0x%x RespFixed=0x%x off_req=%d "
|
|
"off_resp=%d len_req=%d len_resp=%d",
|
|
ai->AvailableRequestFixedIEs, ai->AvailableResponseFixedIEs,
|
|
(int) ai->OffsetRequestIEs, (int) ai->OffsetResponseIEs,
|
|
(int) ai->RequestIELength, (int) ai->ResponseIELength);
|
|
|
|
if (ai->OffsetRequestIEs + ai->RequestIELength > len ||
|
|
ai->OffsetResponseIEs + ai->ResponseIELength > len) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: association information - "
|
|
"IE overflow");
|
|
return -1;
|
|
}
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "NDIS: Request IEs",
|
|
buf + ai->OffsetRequestIEs, ai->RequestIELength);
|
|
wpa_hexdump(MSG_MSGDUMP, "NDIS: Response IEs",
|
|
buf + ai->OffsetResponseIEs, ai->ResponseIELength);
|
|
|
|
memset(&data, 0, sizeof(data));
|
|
data.assoc_info.req_ies = buf + ai->OffsetRequestIEs;
|
|
data.assoc_info.req_ies_len = ai->RequestIELength;
|
|
data.assoc_info.resp_ies = buf + ai->OffsetResponseIEs;
|
|
data.assoc_info.resp_ies_len = ai->ResponseIELength;
|
|
|
|
blen = 65535;
|
|
b = malloc(blen);
|
|
if (b == NULL)
|
|
goto skip_scan_results;
|
|
memset(b, 0, blen);
|
|
len = ndis_get_oid(drv, OID_802_11_BSSID_LIST, (char *) b, blen);
|
|
if (len < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: failed to get scan results");
|
|
free(b);
|
|
b = NULL;
|
|
goto skip_scan_results;
|
|
}
|
|
wpa_printf(MSG_DEBUG, "NDIS: %d BSSID items to process for AssocInfo",
|
|
(unsigned int) b->NumberOfItems);
|
|
|
|
pos = (char *) &b->Bssid[0];
|
|
for (i = 0; i < b->NumberOfItems; i++) {
|
|
NDIS_WLAN_BSSID_EX *bss = (NDIS_WLAN_BSSID_EX *) pos;
|
|
if (memcmp(drv->bssid, bss->MacAddress, ETH_ALEN) == 0 &&
|
|
bss->IELength > sizeof(NDIS_802_11_FIXED_IEs)) {
|
|
data.assoc_info.beacon_ies =
|
|
((u8 *) bss->IEs) +
|
|
sizeof(NDIS_802_11_FIXED_IEs);
|
|
data.assoc_info.beacon_ies_len =
|
|
bss->IELength - sizeof(NDIS_802_11_FIXED_IEs);
|
|
wpa_hexdump(MSG_MSGDUMP, "NDIS: Beacon IEs",
|
|
data.assoc_info.beacon_ies,
|
|
data.assoc_info.beacon_ies_len);
|
|
break;
|
|
}
|
|
pos += bss->Length;
|
|
if (pos > (char *) b + blen)
|
|
break;
|
|
}
|
|
|
|
skip_scan_results:
|
|
wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &data);
|
|
|
|
free(b);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void wpa_driver_ndis_poll_timeout(void *eloop_ctx, void *timeout_ctx)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = eloop_ctx;
|
|
u8 bssid[ETH_ALEN];
|
|
|
|
if (drv->wired)
|
|
return;
|
|
|
|
if (wpa_driver_ndis_get_bssid(drv, bssid)) {
|
|
/* Disconnected */
|
|
if (memcmp(drv->bssid, "\x00\x00\x00\x00\x00\x00", ETH_ALEN)
|
|
!= 0) {
|
|
memset(drv->bssid, 0, ETH_ALEN);
|
|
wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
|
|
}
|
|
} else {
|
|
/* Connected */
|
|
if (memcmp(drv->bssid, bssid, ETH_ALEN) != 0) {
|
|
memcpy(drv->bssid, bssid, ETH_ALEN);
|
|
wpa_driver_ndis_get_associnfo(drv);
|
|
wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
|
|
}
|
|
}
|
|
eloop_register_timeout(1, 0, wpa_driver_ndis_poll_timeout, drv, NULL);
|
|
}
|
|
|
|
|
|
static void wpa_driver_ndis_poll(void *priv)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
eloop_cancel_timeout(wpa_driver_ndis_poll_timeout, drv, NULL);
|
|
wpa_driver_ndis_poll_timeout(drv, NULL);
|
|
}
|
|
|
|
|
|
/* Called when driver generates Media Connect Event by calling
|
|
* NdisMIndicateStatus() with NDIS_STATUS_MEDIA_CONNECT */
|
|
void wpa_driver_ndis_event_connect(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
wpa_printf(MSG_DEBUG, "NDIS: Media Connect Event");
|
|
if (wpa_driver_ndis_get_bssid(drv, drv->bssid) == 0) {
|
|
wpa_driver_ndis_get_associnfo(drv);
|
|
wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
|
|
}
|
|
}
|
|
|
|
|
|
/* Called when driver generates Media Disconnect Event by calling
|
|
* NdisMIndicateStatus() with NDIS_STATUS_MEDIA_DISCONNECT */
|
|
void wpa_driver_ndis_event_disconnect(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
wpa_printf(MSG_DEBUG, "NDIS: Media Disconnect Event");
|
|
memset(drv->bssid, 0, ETH_ALEN);
|
|
wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
|
|
}
|
|
|
|
|
|
static void wpa_driver_ndis_event_auth(struct wpa_driver_ndis_data *drv,
|
|
const u8 *data, size_t data_len)
|
|
{
|
|
NDIS_802_11_AUTHENTICATION_REQUEST *req;
|
|
int pairwise = 0, group = 0;
|
|
union wpa_event_data event;
|
|
|
|
if (data_len < sizeof(*req)) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Too short Authentication Request "
|
|
"Event (len=%d)", data_len);
|
|
return;
|
|
}
|
|
req = (NDIS_802_11_AUTHENTICATION_REQUEST *) data;
|
|
|
|
wpa_printf(MSG_DEBUG, "NDIS: Authentication Request Event: "
|
|
"Bssid " MACSTR " Flags 0x%x",
|
|
MAC2STR(req->Bssid), (int) req->Flags);
|
|
|
|
if ((req->Flags & NDIS_802_11_AUTH_REQUEST_PAIRWISE_ERROR) ==
|
|
NDIS_802_11_AUTH_REQUEST_PAIRWISE_ERROR)
|
|
pairwise = 1;
|
|
else if ((req->Flags & NDIS_802_11_AUTH_REQUEST_GROUP_ERROR) ==
|
|
NDIS_802_11_AUTH_REQUEST_GROUP_ERROR)
|
|
group = 1;
|
|
|
|
if (pairwise || group) {
|
|
memset(&event, 0, sizeof(event));
|
|
event.michael_mic_failure.unicast = pairwise;
|
|
wpa_supplicant_event(drv->ctx, EVENT_MICHAEL_MIC_FAILURE,
|
|
&event);
|
|
}
|
|
}
|
|
|
|
|
|
static void wpa_driver_ndis_event_pmkid(struct wpa_driver_ndis_data *drv,
|
|
const u8 *data, size_t data_len)
|
|
{
|
|
NDIS_802_11_PMKID_CANDIDATE_LIST *pmkid;
|
|
int i;
|
|
union wpa_event_data event;
|
|
|
|
if (data_len < 8) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Too short PMKID Candidate List "
|
|
"Event (len=%d)", data_len);
|
|
return;
|
|
}
|
|
pmkid = (NDIS_802_11_PMKID_CANDIDATE_LIST *) data;
|
|
wpa_printf(MSG_DEBUG, "NDIS: PMKID Candidate List Event - Version %d "
|
|
"NumCandidates %d",
|
|
(int) pmkid->Version, (int) pmkid->NumCandidates);
|
|
|
|
if (pmkid->Version != 1) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Unsupported PMKID Candidate List "
|
|
"Version %d", (int) pmkid->Version);
|
|
return;
|
|
}
|
|
|
|
if (data_len < 8 + pmkid->NumCandidates * sizeof(PMKID_CANDIDATE)) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: PMKID Candidate List underflow");
|
|
return;
|
|
}
|
|
|
|
memset(&event, 0, sizeof(event));
|
|
for (i = 0; i < pmkid->NumCandidates; i++) {
|
|
PMKID_CANDIDATE *p = &pmkid->CandidateList[i];
|
|
wpa_printf(MSG_DEBUG, "NDIS: %d: " MACSTR " Flags 0x%x",
|
|
i, MAC2STR(p->BSSID), (int) p->Flags);
|
|
memcpy(event.pmkid_candidate.bssid, p->BSSID, ETH_ALEN);
|
|
event.pmkid_candidate.index = i;
|
|
event.pmkid_candidate.preauth =
|
|
p->Flags & NDIS_802_11_PMKID_CANDIDATE_PREAUTH_ENABLED;
|
|
wpa_supplicant_event(drv->ctx, EVENT_PMKID_CANDIDATE,
|
|
&event);
|
|
}
|
|
}
|
|
|
|
|
|
/* Called when driver calls NdisMIndicateStatus() with
|
|
* NDIS_STATUS_MEDIA_SPECIFIC_INDICATION */
|
|
void wpa_driver_ndis_event_media_specific(struct wpa_driver_ndis_data *drv,
|
|
const u8 *data, size_t data_len)
|
|
{
|
|
NDIS_802_11_STATUS_INDICATION *status;
|
|
|
|
if (data == NULL || data_len < sizeof(*status))
|
|
return;
|
|
|
|
wpa_hexdump(MSG_DEBUG, "NDIS: Media Specific Indication",
|
|
data, data_len);
|
|
|
|
status = (NDIS_802_11_STATUS_INDICATION *) data;
|
|
data += sizeof(status);
|
|
data_len -= sizeof(status);
|
|
|
|
switch (status->StatusType) {
|
|
case Ndis802_11StatusType_Authentication:
|
|
wpa_driver_ndis_event_auth(drv, data, data_len);
|
|
break;
|
|
case Ndis802_11StatusType_PMKID_CandidateList:
|
|
wpa_driver_ndis_event_pmkid(drv, data, data_len);
|
|
break;
|
|
default:
|
|
wpa_printf(MSG_DEBUG, "NDIS: Unknown StatusType %d",
|
|
(int) status->StatusType);
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
static void
|
|
wpa_driver_ndis_get_wpa_capability(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
wpa_printf(MSG_DEBUG, "NDIS: verifying driver WPA capability");
|
|
|
|
if (ndis_set_auth_mode(drv, Ndis802_11AuthModeWPA) == 0 &&
|
|
ndis_get_auth_mode(drv) == Ndis802_11AuthModeWPA) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: WPA key management supported");
|
|
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA;
|
|
}
|
|
|
|
if (ndis_set_auth_mode(drv, Ndis802_11AuthModeWPAPSK) == 0 &&
|
|
ndis_get_auth_mode(drv) == Ndis802_11AuthModeWPAPSK) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: WPA-PSK key management "
|
|
"supported");
|
|
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK;
|
|
}
|
|
|
|
if (ndis_set_encr_status(drv, Ndis802_11Encryption3Enabled) == 0 &&
|
|
ndis_get_encr_status(drv) == Ndis802_11Encryption3KeyAbsent) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: CCMP encryption supported");
|
|
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_CCMP;
|
|
}
|
|
|
|
if (ndis_set_encr_status(drv, Ndis802_11Encryption2Enabled) == 0 &&
|
|
ndis_get_encr_status(drv) == Ndis802_11Encryption2KeyAbsent) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: TKIP encryption supported");
|
|
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_TKIP;
|
|
}
|
|
|
|
if (ndis_set_encr_status(drv, Ndis802_11Encryption1Enabled) == 0 &&
|
|
ndis_get_encr_status(drv) == Ndis802_11Encryption1KeyAbsent) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: WEP encryption supported");
|
|
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_WEP40 |
|
|
WPA_DRIVER_CAPA_ENC_WEP104;
|
|
}
|
|
|
|
if (ndis_set_auth_mode(drv, Ndis802_11AuthModeShared) == 0 &&
|
|
ndis_get_auth_mode(drv) == Ndis802_11AuthModeShared) {
|
|
drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
|
|
}
|
|
|
|
if (ndis_set_auth_mode(drv, Ndis802_11AuthModeOpen) == 0 &&
|
|
ndis_get_auth_mode(drv) == Ndis802_11AuthModeOpen) {
|
|
drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
|
|
}
|
|
|
|
ndis_set_encr_status(drv, Ndis802_11EncryptionDisabled);
|
|
|
|
/* Could also verify OID_802_11_ADD_KEY error reporting and
|
|
* support for OID_802_11_ASSOCIATION_INFORMATION. */
|
|
|
|
if (drv->capa.key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_WPA &&
|
|
drv->capa.enc & (WPA_DRIVER_CAPA_ENC_TKIP |
|
|
WPA_DRIVER_CAPA_ENC_CCMP)) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: driver supports WPA");
|
|
drv->has_capability = 1;
|
|
} else {
|
|
wpa_printf(MSG_DEBUG, "NDIS: no WPA support found");
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "NDIS: driver capabilities: key_mgmt 0x%x "
|
|
"enc 0x%x auth 0x%x",
|
|
drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
|
|
}
|
|
|
|
|
|
static void wpa_driver_ndis_get_capability(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
char buf[512];
|
|
int len, i;
|
|
NDIS_802_11_CAPABILITY *c;
|
|
|
|
drv->capa.flags = WPA_DRIVER_FLAGS_DRIVER_IE |
|
|
WPA_DRIVER_FLAGS_SET_KEYS_AFTER_ASSOC;
|
|
|
|
len = ndis_get_oid(drv, OID_802_11_CAPABILITY, buf, sizeof(buf));
|
|
if (len < 0) {
|
|
wpa_driver_ndis_get_wpa_capability(drv);
|
|
return;
|
|
}
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "OID_802_11_CAPABILITY", buf, len);
|
|
c = (NDIS_802_11_CAPABILITY *) buf;
|
|
if (len < sizeof(*c) || c->Version != 2) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: unsupported "
|
|
"OID_802_11_CAPABILITY data");
|
|
return;
|
|
}
|
|
wpa_printf(MSG_DEBUG, "NDIS: Driver supports OID_802_11_CAPABILITY - "
|
|
"NoOfPMKIDs %d NoOfAuthEncrPairs %d",
|
|
(int) c->NoOfPMKIDs, (int) c->NoOfAuthEncryptPairSupported);
|
|
drv->has_capability = 1;
|
|
drv->no_of_pmkid = c->NoOfPMKIDs;
|
|
for (i = 0; i < c->NoOfAuthEncryptPairSupported; i++) {
|
|
NDIS_802_11_AUTHENTICATION_ENCRYPTION *ae;
|
|
ae = &c->AuthenticationEncryptionSupported[i];
|
|
if ((char *) (ae + 1) > buf + len) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list "
|
|
"overflow");
|
|
break;
|
|
}
|
|
wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d",
|
|
i, (int) ae->AuthModeSupported,
|
|
(int) ae->EncryptStatusSupported);
|
|
switch (ae->AuthModeSupported) {
|
|
case Ndis802_11AuthModeOpen:
|
|
drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
|
|
break;
|
|
case Ndis802_11AuthModeShared:
|
|
drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
|
|
break;
|
|
case Ndis802_11AuthModeWPA:
|
|
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA;
|
|
break;
|
|
case Ndis802_11AuthModeWPAPSK:
|
|
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK;
|
|
break;
|
|
case Ndis802_11AuthModeWPA2:
|
|
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA2;
|
|
break;
|
|
case Ndis802_11AuthModeWPA2PSK:
|
|
drv->capa.key_mgmt |=
|
|
WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK;
|
|
break;
|
|
case Ndis802_11AuthModeWPANone:
|
|
drv->capa.key_mgmt |=
|
|
WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
switch (ae->EncryptStatusSupported) {
|
|
case Ndis802_11Encryption1Enabled:
|
|
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_WEP40;
|
|
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_WEP104;
|
|
break;
|
|
case Ndis802_11Encryption2Enabled:
|
|
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_TKIP;
|
|
break;
|
|
case Ndis802_11Encryption3Enabled:
|
|
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_CCMP;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "NDIS: driver capabilities: key_mgmt 0x%x "
|
|
"enc 0x%x auth 0x%x",
|
|
drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_get_capa(void *priv, struct wpa_driver_capa *capa)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
if (!drv->has_capability)
|
|
return -1;
|
|
memcpy(capa, &drv->capa, sizeof(*capa));
|
|
return 0;
|
|
}
|
|
|
|
|
|
static const char * wpa_driver_ndis_get_ifname(void *priv)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
return drv->ifname;
|
|
}
|
|
|
|
|
|
static const u8 * wpa_driver_ndis_get_mac_addr(void *priv)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
return drv->own_addr;
|
|
}
|
|
|
|
|
|
static int wpa_driver_ndis_get_names(struct wpa_driver_ndis_data *drv)
|
|
{
|
|
PTSTR names, pos, pos2;
|
|
ULONG len;
|
|
BOOLEAN res;
|
|
const int MAX_ADAPTERS = 32;
|
|
char *name[MAX_ADAPTERS];
|
|
char *desc[MAX_ADAPTERS];
|
|
int num_name, num_desc, i, found_name, found_desc;
|
|
size_t dlen;
|
|
|
|
wpa_printf(MSG_DEBUG, "NDIS: Packet.dll version: %s",
|
|
PacketGetVersion());
|
|
|
|
len = 8192;
|
|
names = malloc(len);
|
|
if (names == NULL)
|
|
return -1;
|
|
memset(names, 0, len);
|
|
|
|
res = PacketGetAdapterNames(names, &len);
|
|
if (!res && len > 8192) {
|
|
free(names);
|
|
names = malloc(len);
|
|
if (names == NULL)
|
|
return -1;
|
|
memset(names, 0, len);
|
|
res = PacketGetAdapterNames(names, &len);
|
|
}
|
|
|
|
if (!res) {
|
|
wpa_printf(MSG_ERROR, "NDIS: Failed to get adapter list "
|
|
"(PacketGetAdapterNames)");
|
|
free(names);
|
|
return -1;
|
|
}
|
|
|
|
/* wpa_hexdump_ascii(MSG_DEBUG, "NDIS: AdapterNames", names, len); */
|
|
|
|
if (names[0] && names[1] == '\0' && names[2] && names[3] == '\0') {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Looks like adapter names are in "
|
|
"UNICODE");
|
|
/* Convert to ASCII */
|
|
pos2 = pos = names;
|
|
while (pos2 < names + len) {
|
|
if (pos2[0] == '\0' && pos2[1] == '\0' &&
|
|
pos2[2] == '\0' && pos2[3] == '\0') {
|
|
pos2 += 4;
|
|
break;
|
|
}
|
|
*pos++ = pos2[0];
|
|
pos2 += 2;
|
|
}
|
|
memcpy(pos + 2, names, pos - names);
|
|
pos += 2;
|
|
} else
|
|
pos = names;
|
|
|
|
num_name = 0;
|
|
while (pos < names + len) {
|
|
name[num_name] = pos;
|
|
while (*pos && pos < names + len)
|
|
pos++;
|
|
if (pos + 1 >= names + len) {
|
|
free(names);
|
|
return -1;
|
|
}
|
|
pos++;
|
|
num_name++;
|
|
if (num_name >= MAX_ADAPTERS) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Too many adapters");
|
|
free(names);
|
|
return -1;
|
|
}
|
|
if (*pos == '\0') {
|
|
wpa_printf(MSG_DEBUG, "NDIS: %d adapter names found",
|
|
num_name);
|
|
pos++;
|
|
break;
|
|
}
|
|
}
|
|
|
|
num_desc = 0;
|
|
while (pos < names + len) {
|
|
desc[num_desc] = pos;
|
|
while (*pos && pos < names + len)
|
|
pos++;
|
|
if (pos + 1 >= names + len) {
|
|
free(names);
|
|
return -1;
|
|
}
|
|
pos++;
|
|
num_desc++;
|
|
if (num_desc >= MAX_ADAPTERS) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Too many adapter "
|
|
"descriptions");
|
|
free(names);
|
|
return -1;
|
|
}
|
|
if (*pos == '\0') {
|
|
wpa_printf(MSG_DEBUG, "NDIS: %d adapter descriptions "
|
|
"found", num_name);
|
|
pos++;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Windows 98 with Packet.dll 3.0 alpha3 does not include adapter
|
|
* descriptions. Fill in dummy descriptors to work around this.
|
|
*/
|
|
while (num_desc < num_name)
|
|
desc[num_desc++] = "dummy description";
|
|
|
|
if (num_name != num_desc) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: mismatch in adapter name and "
|
|
"description counts (%d != %d)",
|
|
num_name, num_desc);
|
|
free(names);
|
|
return -1;
|
|
}
|
|
|
|
found_name = found_desc = -1;
|
|
for (i = 0; i < num_name; i++) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: %d - %s - %s",
|
|
i, name[i], desc[i]);
|
|
if (found_name == -1 && strcmp(name[i], drv->ifname) == 0) {
|
|
found_name = i;
|
|
}
|
|
if (found_desc == -1 &&
|
|
strncmp(desc[i], drv->ifname, strlen(drv->ifname)) == 0) {
|
|
found_desc = i;
|
|
}
|
|
}
|
|
|
|
if (found_name < 0 && found_desc >= 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Matched interface '%s' based on "
|
|
"description '%s'",
|
|
name[found_desc], desc[found_desc]);
|
|
found_name = found_desc;
|
|
strncpy(drv->ifname, name[found_desc], sizeof(drv->ifname));
|
|
}
|
|
|
|
if (found_name < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Could not find interface '%s'",
|
|
drv->ifname);
|
|
free(names);
|
|
return -1;
|
|
}
|
|
|
|
i = found_name;
|
|
pos = strchr(desc[i], '(');
|
|
if (pos) {
|
|
dlen = pos - desc[i];
|
|
pos--;
|
|
if (pos > desc[i] && *pos == ' ')
|
|
dlen--;
|
|
} else {
|
|
dlen = strlen(desc[i]);
|
|
}
|
|
drv->adapter_desc = malloc(dlen + 1);
|
|
if (drv->adapter_desc) {
|
|
memcpy(drv->adapter_desc, desc[i], dlen);
|
|
drv->adapter_desc[dlen] = '\0';
|
|
}
|
|
|
|
free(names);
|
|
|
|
if (drv->adapter_desc == NULL)
|
|
return -1;
|
|
|
|
wpa_printf(MSG_DEBUG, "NDIS: Adapter description prefix '%s'",
|
|
drv->adapter_desc);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void * wpa_driver_ndis_init(void *ctx, const char *ifname)
|
|
{
|
|
struct wpa_driver_ndis_data *drv;
|
|
u32 mode;
|
|
|
|
drv = malloc(sizeof(*drv));
|
|
if (drv == NULL)
|
|
return NULL;
|
|
memset(drv, 0, sizeof(*drv));
|
|
drv->ctx = ctx;
|
|
strncpy(drv->ifname, ifname, sizeof(drv->ifname));
|
|
drv->event_sock = -1;
|
|
|
|
if (wpa_driver_ndis_get_names(drv) < 0) {
|
|
free(drv);
|
|
return NULL;
|
|
}
|
|
|
|
drv->adapter = PacketOpenAdapter(drv->ifname);
|
|
if (drv->adapter == NULL) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: PacketOpenAdapter failed for "
|
|
"'%s'", drv->ifname);
|
|
free(drv);
|
|
return NULL;
|
|
}
|
|
|
|
if (ndis_get_oid(drv, OID_802_3_CURRENT_ADDRESS,
|
|
drv->own_addr, ETH_ALEN) < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Get OID_802_3_CURRENT_ADDRESS "
|
|
"failed");
|
|
PacketCloseAdapter(drv->adapter);
|
|
free(drv);
|
|
return NULL;
|
|
}
|
|
wpa_driver_ndis_get_capability(drv);
|
|
|
|
/* Make sure that the driver does not have any obsolete PMKID entries.
|
|
*/
|
|
wpa_driver_ndis_flush_pmkid(drv);
|
|
|
|
eloop_register_timeout(1, 0, wpa_driver_ndis_poll_timeout, drv, NULL);
|
|
|
|
wpa_driver_register_event_cb(drv);
|
|
|
|
/* Set mode here in case card was configured for ad-hoc mode
|
|
* previously. */
|
|
mode = Ndis802_11Infrastructure;
|
|
if (ndis_set_oid(drv, OID_802_11_INFRASTRUCTURE_MODE,
|
|
(char *) &mode, sizeof(mode)) < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
|
|
"OID_802_11_INFRASTRUCTURE_MODE (%d)",
|
|
(int) mode);
|
|
/* Try to continue anyway */
|
|
|
|
if (!drv->has_capability && drv->capa.enc == 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: Driver did not provide "
|
|
"any wireless capabilities - assume it is "
|
|
"a wired interface");
|
|
drv->wired = 1;
|
|
}
|
|
}
|
|
|
|
return drv;
|
|
}
|
|
|
|
|
|
static void wpa_driver_ndis_deinit(void *priv)
|
|
{
|
|
struct wpa_driver_ndis_data *drv = priv;
|
|
eloop_cancel_timeout(wpa_driver_ndis_poll_timeout, drv, NULL);
|
|
wpa_driver_ndis_flush_pmkid(drv);
|
|
wpa_driver_ndis_disconnect(drv);
|
|
if (wpa_driver_ndis_radio_off(drv) < 0) {
|
|
wpa_printf(MSG_DEBUG, "NDIS: failed to disassociate and turn "
|
|
"radio off");
|
|
}
|
|
if (drv->event_sock >= 0) {
|
|
eloop_unregister_read_sock(drv->event_sock);
|
|
close(drv->event_sock);
|
|
}
|
|
if (drv->adapter)
|
|
PacketCloseAdapter(drv->adapter);
|
|
|
|
free(drv->adapter_desc);
|
|
free(drv);
|
|
}
|
|
|
|
|
|
const struct wpa_driver_ops wpa_driver_ndis_ops = {
|
|
.name = "ndis",
|
|
.desc = "Windows NDIS driver",
|
|
.init = wpa_driver_ndis_init,
|
|
.deinit = wpa_driver_ndis_deinit,
|
|
.set_wpa = wpa_driver_ndis_set_wpa,
|
|
.scan = wpa_driver_ndis_scan,
|
|
.get_scan_results = wpa_driver_ndis_get_scan_results,
|
|
.get_bssid = wpa_driver_ndis_get_bssid,
|
|
.get_ssid = wpa_driver_ndis_get_ssid,
|
|
.set_key = wpa_driver_ndis_set_key,
|
|
.associate = wpa_driver_ndis_associate,
|
|
.deauthenticate = wpa_driver_ndis_deauthenticate,
|
|
.disassociate = wpa_driver_ndis_disassociate,
|
|
.poll = wpa_driver_ndis_poll,
|
|
.add_pmkid = wpa_driver_ndis_add_pmkid,
|
|
.remove_pmkid = wpa_driver_ndis_remove_pmkid,
|
|
.flush_pmkid = wpa_driver_ndis_flush_pmkid,
|
|
.get_capa = wpa_driver_ndis_get_capa,
|
|
.get_ifname = wpa_driver_ndis_get_ifname,
|
|
.get_mac_addr = wpa_driver_ndis_get_mac_addr,
|
|
};
|