Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
Branch: gingerbread
Fetching contributors…

Cannot retrieve contributors at this time

2843 lines (2442 sloc) 76.229 kB
/*
* WPA Supplicant - Windows/NDIS driver interface
* Copyright (c) 2004-2006, Jouni Malinen <j@w1.fi>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*
* Alternatively, this software may be distributed under the terms of BSD
* license.
*
* See README and COPYING for more details.
*/
#ifdef __CYGWIN__
/* Avoid some header file conflicts by not including standard headers for
* cygwin builds when Packet32.h is included. */
#include "build_config.h"
int close(int fd);
#else /* __CYGWIN__ */
#include "includes.h"
#endif /* __CYGWIN__ */
#ifdef CONFIG_USE_NDISUIO
#include <winsock2.h>
#else /* CONFIG_USE_NDISUIO */
#include <Packet32.h>
#endif /* CONFIG_USE_NDISUIO */
#include <ntddndis.h>
#ifdef _WIN32_WCE
#include <winioctl.h>
#include <nuiouser.h>
#include <devload.h>
#endif /* _WIN32_WCE */
#include "common.h"
#include "driver.h"
#include "wpa_supplicant.h"
#include "l2_packet.h"
#include "eloop.h"
#include "wpa.h"
#include "driver_ndis.h"
int wpa_driver_register_event_cb(struct wpa_driver_ndis_data *drv);
#ifdef CONFIG_NDIS_EVENTS_INTEGRATED
void wpa_driver_ndis_event_pipe_cb(void *eloop_data, void *user_data);
#endif /* CONFIG_NDIS_EVENTS_INTEGRATED */
static void wpa_driver_ndis_deinit(void *priv);
static void wpa_driver_ndis_poll(void *drv);
static void wpa_driver_ndis_poll_timeout(void *eloop_ctx, void *timeout_ctx);
static int wpa_driver_ndis_adapter_init(struct wpa_driver_ndis_data *drv);
static int wpa_driver_ndis_adapter_open(struct wpa_driver_ndis_data *drv);
static void wpa_driver_ndis_adapter_close(struct wpa_driver_ndis_data *drv);
/* FIX: to be removed once this can be compiled with the complete NDIS
* header files */
#ifndef OID_802_11_BSSID
#define OID_802_11_BSSID 0x0d010101
#define OID_802_11_SSID 0x0d010102
#define OID_802_11_INFRASTRUCTURE_MODE 0x0d010108
#define OID_802_11_ADD_WEP 0x0D010113
#define OID_802_11_REMOVE_WEP 0x0D010114
#define OID_802_11_DISASSOCIATE 0x0D010115
#define OID_802_11_BSSID_LIST 0x0d010217
#define OID_802_11_AUTHENTICATION_MODE 0x0d010118
#define OID_802_11_PRIVACY_FILTER 0x0d010119
#define OID_802_11_BSSID_LIST_SCAN 0x0d01011A
#define OID_802_11_WEP_STATUS 0x0d01011B
#define OID_802_11_ENCRYPTION_STATUS OID_802_11_WEP_STATUS
#define OID_802_11_ADD_KEY 0x0d01011D
#define OID_802_11_REMOVE_KEY 0x0d01011E
#define OID_802_11_ASSOCIATION_INFORMATION 0x0d01011F
#define OID_802_11_TEST 0x0d010120
#define OID_802_11_CAPABILITY 0x0d010122
#define OID_802_11_PMKID 0x0d010123
#define NDIS_802_11_LENGTH_SSID 32
#define NDIS_802_11_LENGTH_RATES 8
#define NDIS_802_11_LENGTH_RATES_EX 16
typedef UCHAR NDIS_802_11_MAC_ADDRESS[6];
typedef struct NDIS_802_11_SSID {
ULONG SsidLength;
UCHAR Ssid[NDIS_802_11_LENGTH_SSID];
} NDIS_802_11_SSID;
typedef LONG NDIS_802_11_RSSI;
typedef enum NDIS_802_11_NETWORK_TYPE {
Ndis802_11FH,
Ndis802_11DS,
Ndis802_11OFDM5,
Ndis802_11OFDM24,
Ndis802_11NetworkTypeMax
} NDIS_802_11_NETWORK_TYPE;
typedef struct NDIS_802_11_CONFIGURATION_FH {
ULONG Length;
ULONG HopPattern;
ULONG HopSet;
ULONG DwellTime;
} NDIS_802_11_CONFIGURATION_FH;
typedef struct NDIS_802_11_CONFIGURATION {
ULONG Length;
ULONG BeaconPeriod;
ULONG ATIMWindow;
ULONG DSConfig;
NDIS_802_11_CONFIGURATION_FH FHConfig;
} NDIS_802_11_CONFIGURATION;
typedef enum NDIS_802_11_NETWORK_INFRASTRUCTURE {
Ndis802_11IBSS,
Ndis802_11Infrastructure,
Ndis802_11AutoUnknown,
Ndis802_11InfrastructureMax
} NDIS_802_11_NETWORK_INFRASTRUCTURE;
typedef enum NDIS_802_11_AUTHENTICATION_MODE {
Ndis802_11AuthModeOpen,
Ndis802_11AuthModeShared,
Ndis802_11AuthModeAutoSwitch,
Ndis802_11AuthModeWPA,
Ndis802_11AuthModeWPAPSK,
Ndis802_11AuthModeWPANone,
Ndis802_11AuthModeWPA2,
Ndis802_11AuthModeWPA2PSK,
Ndis802_11AuthModeMax
} NDIS_802_11_AUTHENTICATION_MODE;
typedef enum NDIS_802_11_WEP_STATUS {
Ndis802_11WEPEnabled,
Ndis802_11Encryption1Enabled = Ndis802_11WEPEnabled,
Ndis802_11WEPDisabled,
Ndis802_11EncryptionDisabled = Ndis802_11WEPDisabled,
Ndis802_11WEPKeyAbsent,
Ndis802_11Encryption1KeyAbsent = Ndis802_11WEPKeyAbsent,
Ndis802_11WEPNotSupported,
Ndis802_11EncryptionNotSupported = Ndis802_11WEPNotSupported,
Ndis802_11Encryption2Enabled,
Ndis802_11Encryption2KeyAbsent,
Ndis802_11Encryption3Enabled,
Ndis802_11Encryption3KeyAbsent
} NDIS_802_11_WEP_STATUS, NDIS_802_11_ENCRYPTION_STATUS;
typedef enum NDIS_802_11_PRIVACY_FILTER {
Ndis802_11PrivFilterAcceptAll,
Ndis802_11PrivFilter8021xWEP
} NDIS_802_11_PRIVACY_FILTER;
typedef UCHAR NDIS_802_11_RATES[NDIS_802_11_LENGTH_RATES];
typedef UCHAR NDIS_802_11_RATES_EX[NDIS_802_11_LENGTH_RATES_EX];
typedef struct NDIS_WLAN_BSSID_EX {
ULONG Length;
NDIS_802_11_MAC_ADDRESS MacAddress; /* BSSID */
UCHAR Reserved[2];
NDIS_802_11_SSID Ssid;
ULONG Privacy;
NDIS_802_11_RSSI Rssi;
NDIS_802_11_NETWORK_TYPE NetworkTypeInUse;
NDIS_802_11_CONFIGURATION Configuration;
NDIS_802_11_NETWORK_INFRASTRUCTURE InfrastructureMode;
NDIS_802_11_RATES_EX SupportedRates;
ULONG IELength;
UCHAR IEs[1];
} NDIS_WLAN_BSSID_EX;
typedef struct NDIS_802_11_BSSID_LIST_EX {
ULONG NumberOfItems;
NDIS_WLAN_BSSID_EX Bssid[1];
} NDIS_802_11_BSSID_LIST_EX;
typedef struct NDIS_802_11_FIXED_IEs {
UCHAR Timestamp[8];
USHORT BeaconInterval;
USHORT Capabilities;
} NDIS_802_11_FIXED_IEs;
typedef struct NDIS_802_11_WEP {
ULONG Length;
ULONG KeyIndex;
ULONG KeyLength;
UCHAR KeyMaterial[1];
} NDIS_802_11_WEP;
typedef ULONG NDIS_802_11_KEY_INDEX;
typedef ULONGLONG NDIS_802_11_KEY_RSC;
typedef struct NDIS_802_11_KEY {
ULONG Length;
ULONG KeyIndex;
ULONG KeyLength;
NDIS_802_11_MAC_ADDRESS BSSID;
NDIS_802_11_KEY_RSC KeyRSC;
UCHAR KeyMaterial[1];
} NDIS_802_11_KEY;
typedef struct NDIS_802_11_REMOVE_KEY {
ULONG Length;
ULONG KeyIndex;
NDIS_802_11_MAC_ADDRESS BSSID;
} NDIS_802_11_REMOVE_KEY;
typedef struct NDIS_802_11_AI_REQFI {
USHORT Capabilities;
USHORT ListenInterval;
NDIS_802_11_MAC_ADDRESS CurrentAPAddress;
} NDIS_802_11_AI_REQFI;
typedef struct NDIS_802_11_AI_RESFI {
USHORT Capabilities;
USHORT StatusCode;
USHORT AssociationId;
} NDIS_802_11_AI_RESFI;
typedef struct NDIS_802_11_ASSOCIATION_INFORMATION {
ULONG Length;
USHORT AvailableRequestFixedIEs;
NDIS_802_11_AI_REQFI RequestFixedIEs;
ULONG RequestIELength;
ULONG OffsetRequestIEs;
USHORT AvailableResponseFixedIEs;
NDIS_802_11_AI_RESFI ResponseFixedIEs;
ULONG ResponseIELength;
ULONG OffsetResponseIEs;
} NDIS_802_11_ASSOCIATION_INFORMATION;
typedef struct NDIS_802_11_AUTHENTICATION_ENCRYPTION {
NDIS_802_11_AUTHENTICATION_MODE AuthModeSupported;
NDIS_802_11_ENCRYPTION_STATUS EncryptStatusSupported;
} NDIS_802_11_AUTHENTICATION_ENCRYPTION;
typedef struct NDIS_802_11_CAPABILITY {
ULONG Length;
ULONG Version;
ULONG NoOfPMKIDs;
ULONG NoOfAuthEncryptPairsSupported;
NDIS_802_11_AUTHENTICATION_ENCRYPTION
AuthenticationEncryptionSupported[1];
} NDIS_802_11_CAPABILITY;
typedef UCHAR NDIS_802_11_PMKID_VALUE[16];
typedef struct BSSID_INFO {
NDIS_802_11_MAC_ADDRESS BSSID;
NDIS_802_11_PMKID_VALUE PMKID;
} BSSID_INFO;
typedef struct NDIS_802_11_PMKID {
ULONG Length;
ULONG BSSIDInfoCount;
BSSID_INFO BSSIDInfo[1];
} NDIS_802_11_PMKID;
typedef enum NDIS_802_11_STATUS_TYPE {
Ndis802_11StatusType_Authentication,
Ndis802_11StatusType_PMKID_CandidateList = 2,
Ndis802_11StatusTypeMax
} NDIS_802_11_STATUS_TYPE;
typedef struct NDIS_802_11_STATUS_INDICATION {
NDIS_802_11_STATUS_TYPE StatusType;
} NDIS_802_11_STATUS_INDICATION;
typedef struct PMKID_CANDIDATE {
NDIS_802_11_MAC_ADDRESS BSSID;
ULONG Flags;
} PMKID_CANDIDATE;
#define NDIS_802_11_PMKID_CANDIDATE_PREAUTH_ENABLED 0x01
typedef struct NDIS_802_11_PMKID_CANDIDATE_LIST {
ULONG Version;
ULONG NumCandidates;
PMKID_CANDIDATE CandidateList[1];
} NDIS_802_11_PMKID_CANDIDATE_LIST;
typedef struct NDIS_802_11_AUTHENTICATION_REQUEST {
ULONG Length;
NDIS_802_11_MAC_ADDRESS Bssid;
ULONG Flags;
} NDIS_802_11_AUTHENTICATION_REQUEST;
#define NDIS_802_11_AUTH_REQUEST_REAUTH 0x01
#define NDIS_802_11_AUTH_REQUEST_KEYUPDATE 0x02
#define NDIS_802_11_AUTH_REQUEST_PAIRWISE_ERROR 0x06
#define NDIS_802_11_AUTH_REQUEST_GROUP_ERROR 0x0E
#endif /* OID_802_11_BSSID */
#ifndef OID_802_11_PMKID
/* Platform SDK for XP did not include WPA2, so add needed definitions */
#define OID_802_11_CAPABILITY 0x0d010122
#define OID_802_11_PMKID 0x0d010123
#define Ndis802_11AuthModeWPA2 6
#define Ndis802_11AuthModeWPA2PSK 7
#define Ndis802_11StatusType_PMKID_CandidateList 2
typedef struct NDIS_802_11_AUTHENTICATION_ENCRYPTION {
NDIS_802_11_AUTHENTICATION_MODE AuthModeSupported;
NDIS_802_11_ENCRYPTION_STATUS EncryptStatusSupported;
} NDIS_802_11_AUTHENTICATION_ENCRYPTION;
typedef struct NDIS_802_11_CAPABILITY {
ULONG Length;
ULONG Version;
ULONG NoOfPMKIDs;
ULONG NoOfAuthEncryptPairsSupported;
NDIS_802_11_AUTHENTICATION_ENCRYPTION
AuthenticationEncryptionSupported[1];
} NDIS_802_11_CAPABILITY;
typedef UCHAR NDIS_802_11_PMKID_VALUE[16];
typedef struct BSSID_INFO {
NDIS_802_11_MAC_ADDRESS BSSID;
NDIS_802_11_PMKID_VALUE PMKID;
} BSSID_INFO;
typedef struct NDIS_802_11_PMKID {
ULONG Length;
ULONG BSSIDInfoCount;
BSSID_INFO BSSIDInfo[1];
} NDIS_802_11_PMKID;
typedef struct PMKID_CANDIDATE {
NDIS_802_11_MAC_ADDRESS BSSID;
ULONG Flags;
} PMKID_CANDIDATE;
#define NDIS_802_11_PMKID_CANDIDATE_PREAUTH_ENABLED 0x01
typedef struct NDIS_802_11_PMKID_CANDIDATE_LIST {
ULONG Version;
ULONG NumCandidates;
PMKID_CANDIDATE CandidateList[1];
} NDIS_802_11_PMKID_CANDIDATE_LIST;
#endif /* OID_802_11_CAPABILITY */
#ifdef CONFIG_USE_NDISUIO
#ifndef _WIN32_WCE
#ifdef __MINGW32_VERSION
typedef ULONG NDIS_OID;
#endif /* __MINGW32_VERSION */
/* from nuiouser.h */
#define FSCTL_NDISUIO_BASE FILE_DEVICE_NETWORK
#define _NDISUIO_CTL_CODE(_Function, _Method, _Access) \
CTL_CODE(FSCTL_NDISUIO_BASE, _Function, _Method, _Access)
#define IOCTL_NDISUIO_OPEN_DEVICE \
_NDISUIO_CTL_CODE(0x200, METHOD_BUFFERED, \
FILE_READ_ACCESS | FILE_WRITE_ACCESS)
#define IOCTL_NDISUIO_QUERY_OID_VALUE \
_NDISUIO_CTL_CODE(0x201, METHOD_BUFFERED, \
FILE_READ_ACCESS | FILE_WRITE_ACCESS)
#define IOCTL_NDISUIO_SET_OID_VALUE \
_NDISUIO_CTL_CODE(0x205, METHOD_BUFFERED, \
FILE_READ_ACCESS | FILE_WRITE_ACCESS)
#define IOCTL_NDISUIO_SET_ETHER_TYPE \
_NDISUIO_CTL_CODE(0x202, METHOD_BUFFERED, \
FILE_READ_ACCESS | FILE_WRITE_ACCESS)
#define IOCTL_NDISUIO_QUERY_BINDING \
_NDISUIO_CTL_CODE(0x203, METHOD_BUFFERED, \
FILE_READ_ACCESS | FILE_WRITE_ACCESS)
#define IOCTL_NDISUIO_BIND_WAIT \
_NDISUIO_CTL_CODE(0x204, METHOD_BUFFERED, \
FILE_READ_ACCESS | FILE_WRITE_ACCESS)
typedef struct _NDISUIO_QUERY_OID
{
NDIS_OID Oid;
UCHAR Data[sizeof(ULONG)];
} NDISUIO_QUERY_OID, *PNDISUIO_QUERY_OID;
typedef struct _NDISUIO_SET_OID
{
NDIS_OID Oid;
UCHAR Data[sizeof(ULONG)];
} NDISUIO_SET_OID, *PNDISUIO_SET_OID;
typedef struct _NDISUIO_QUERY_BINDING
{
ULONG BindingIndex;
ULONG DeviceNameOffset;
ULONG DeviceNameLength;
ULONG DeviceDescrOffset;
ULONG DeviceDescrLength;
} NDISUIO_QUERY_BINDING, *PNDISUIO_QUERY_BINDING;
#endif /* _WIN32_WCE */
#endif /* CONFIG_USE_NDISUIO */
static int ndis_get_oid(struct wpa_driver_ndis_data *drv, unsigned int oid,
char *data, size_t len)
{
#ifdef CONFIG_USE_NDISUIO
NDISUIO_QUERY_OID *o;
size_t buflen = sizeof(*o) + len;
DWORD written;
int ret;
size_t hdrlen;
o = os_zalloc(buflen);
if (o == NULL)
return -1;
o->Oid = oid;
#ifdef _WIN32_WCE
o->ptcDeviceName = drv->adapter_name;
#endif /* _WIN32_WCE */
if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_QUERY_OID_VALUE,
o, sizeof(NDISUIO_QUERY_OID), o, buflen, &written,
NULL)) {
wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE "
"failed (oid=%08x): %d", oid, (int) GetLastError());
os_free(o);
return -1;
}
hdrlen = sizeof(NDISUIO_QUERY_OID) - sizeof(o->Data);
if (written < hdrlen) {
wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); "
"too short", oid, (unsigned int) written);
os_free(o);
return -1;
}
written -= hdrlen;
if (written > len) {
wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > "
"len (%d)",oid, (unsigned int) written, len);
os_free(o);
return -1;
}
os_memcpy(data, o->Data, written);
ret = written;
os_free(o);
return ret;
#else /* CONFIG_USE_NDISUIO */
char *buf;
PACKET_OID_DATA *o;
int ret;
buf = os_zalloc(sizeof(*o) + len);
if (buf == NULL)
return -1;
o = (PACKET_OID_DATA *) buf;
o->Oid = oid;
o->Length = len;
if (!PacketRequest(drv->adapter, FALSE, o)) {
wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
__func__, oid, len);
os_free(buf);
return -1;
}
if (o->Length > len) {
wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)",
__func__, oid, (unsigned int) o->Length, len);
os_free(buf);
return -1;
}
os_memcpy(data, o->Data, o->Length);
ret = o->Length;
os_free(buf);
return ret;
#endif /* CONFIG_USE_NDISUIO */
}
static int ndis_set_oid(struct wpa_driver_ndis_data *drv, unsigned int oid,
const char *data, size_t len)
{
#ifdef CONFIG_USE_NDISUIO
NDISUIO_SET_OID *o;
size_t buflen, reallen;
DWORD written;
char txt[50];
os_snprintf(txt, sizeof(txt), "NDIS: Set OID %08x", oid);
wpa_hexdump_key(MSG_MSGDUMP, txt, data, len);
buflen = sizeof(*o) + len;
reallen = buflen - sizeof(o->Data);
o = os_zalloc(buflen);
if (o == NULL)
return -1;
o->Oid = oid;
#ifdef _WIN32_WCE
o->ptcDeviceName = drv->adapter_name;
#endif /* _WIN32_WCE */
if (data)
os_memcpy(o->Data, data, len);
if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_SET_OID_VALUE,
o, reallen, NULL, 0, &written, NULL)) {
wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE "
"(oid=%08x) failed: %d", oid, (int) GetLastError());
os_free(o);
return -1;
}
os_free(o);
return 0;
#else /* CONFIG_USE_NDISUIO */
char *buf;
PACKET_OID_DATA *o;
char txt[50];
os_snprintf(txt, sizeof(txt), "NDIS: Set OID %08x", oid);
wpa_hexdump_key(MSG_MSGDUMP, txt, data, len);
buf = os_zalloc(sizeof(*o) + len);
if (buf == NULL)
return -1;
o = (PACKET_OID_DATA *) buf;
o->Oid = oid;
o->Length = len;
if (data)
os_memcpy(o->Data, data, len);
if (!PacketRequest(drv->adapter, TRUE, o)) {
wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
__func__, oid, len);
os_free(buf);
return -1;
}
os_free(buf);
return 0;
#endif /* CONFIG_USE_NDISUIO */
}
static int ndis_set_auth_mode(struct wpa_driver_ndis_data *drv, int mode)
{
u32 auth_mode = mode;
if (ndis_set_oid(drv, OID_802_11_AUTHENTICATION_MODE,
(char *) &auth_mode, sizeof(auth_mode)) < 0) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
"OID_802_11_AUTHENTICATION_MODE (%d)",
(int) auth_mode);
return -1;
}
return 0;
}
static int ndis_get_auth_mode(struct wpa_driver_ndis_data *drv)
{
u32 auth_mode;
int res;
res = ndis_get_oid(drv, OID_802_11_AUTHENTICATION_MODE,
(char *) &auth_mode, sizeof(auth_mode));
if (res != sizeof(auth_mode)) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
"OID_802_11_AUTHENTICATION_MODE");
return -1;
}
return auth_mode;
}
static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr)
{
u32 encr_status = encr;
if (ndis_set_oid(drv, OID_802_11_ENCRYPTION_STATUS,
(char *) &encr_status, sizeof(encr_status)) < 0) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
"OID_802_11_ENCRYPTION_STATUS (%d)", encr);
return -1;
}
return 0;
}
static int ndis_get_encr_status(struct wpa_driver_ndis_data *drv)
{
u32 encr;
int res;
res = ndis_get_oid(drv, OID_802_11_ENCRYPTION_STATUS,
(char *) &encr, sizeof(encr));
if (res != sizeof(encr)) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
"OID_802_11_ENCRYPTION_STATUS");
return -1;
}
return encr;
}
static int wpa_driver_ndis_get_bssid(void *priv, u8 *bssid)
{
struct wpa_driver_ndis_data *drv = priv;
if (drv->wired) {
/*
* Report PAE group address as the "BSSID" for wired
* connection.
*/
bssid[0] = 0x01;
bssid[1] = 0x80;
bssid[2] = 0xc2;
bssid[3] = 0x00;
bssid[4] = 0x00;
bssid[5] = 0x03;
return 0;
}
return ndis_get_oid(drv, OID_802_11_BSSID, bssid, ETH_ALEN) < 0 ?
-1 : 0;
}
static int wpa_driver_ndis_get_ssid(void *priv, u8 *ssid)
{
struct wpa_driver_ndis_data *drv = priv;
NDIS_802_11_SSID buf;
int res;
res = ndis_get_oid(drv, OID_802_11_SSID, (char *) &buf, sizeof(buf));
if (res < 4) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to get SSID");
if (drv->wired) {
wpa_printf(MSG_DEBUG, "NDIS: Allow get_ssid failure "
"with a wired interface");
return 0;
}
return -1;
}
os_memcpy(ssid, buf.Ssid, buf.SsidLength);
return buf.SsidLength;
}
static int wpa_driver_ndis_set_ssid(struct wpa_driver_ndis_data *drv,
const u8 *ssid, size_t ssid_len)
{
NDIS_802_11_SSID buf;
os_memset(&buf, 0, sizeof(buf));
buf.SsidLength = ssid_len;
os_memcpy(buf.Ssid, ssid, ssid_len);
/*
* Make sure radio is marked enabled here so that scan request will not
* force SSID to be changed to a random one in order to enable radio at
* that point.
*/
drv->radio_enabled = 1;
return ndis_set_oid(drv, OID_802_11_SSID, (char *) &buf, sizeof(buf));
}
/* Disconnect using OID_802_11_DISASSOCIATE. This will also turn the radio off.
*/
static int wpa_driver_ndis_radio_off(struct wpa_driver_ndis_data *drv)
{
drv->radio_enabled = 0;
return ndis_set_oid(drv, OID_802_11_DISASSOCIATE, " ", 4);
}
/* Disconnect by setting SSID to random (i.e., likely not used). */
static int wpa_driver_ndis_disconnect(struct wpa_driver_ndis_data *drv)
{
char ssid[32];
int i;
for (i = 0; i < 32; i++)
ssid[i] = rand() & 0xff;
return wpa_driver_ndis_set_ssid(drv, ssid, 32);
}
static int wpa_driver_ndis_deauthenticate(void *priv, const u8 *addr,
int reason_code)
{
struct wpa_driver_ndis_data *drv = priv;
return wpa_driver_ndis_disconnect(drv);
}
static int wpa_driver_ndis_disassociate(void *priv, const u8 *addr,
int reason_code)
{
struct wpa_driver_ndis_data *drv = priv;
return wpa_driver_ndis_disconnect(drv);
}
static int wpa_driver_ndis_set_wpa(void *priv, int enabled)
{
wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
return 0;
}
static void wpa_driver_ndis_scan_timeout(void *eloop_ctx, void *timeout_ctx)
{
wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
}
static int wpa_driver_ndis_scan(void *priv, const u8 *ssid, size_t ssid_len)
{
struct wpa_driver_ndis_data *drv = priv;
int res;
if (!drv->radio_enabled) {
wpa_printf(MSG_DEBUG, "NDIS: turning radio on before the first"
" scan");
if (wpa_driver_ndis_disconnect(drv) < 0) {
wpa_printf(MSG_DEBUG, "NDIS: failed to enable radio");
}
drv->radio_enabled = 1;
}
res = ndis_set_oid(drv, OID_802_11_BSSID_LIST_SCAN, " ", 4);
eloop_cancel_timeout(wpa_driver_ndis_scan_timeout, drv, drv->ctx);
eloop_register_timeout(7, 0, wpa_driver_ndis_scan_timeout, drv,
drv->ctx);
return res;
}
static void wpa_driver_ndis_get_ies(struct wpa_scan_result *res, u8 *ie,
size_t ie_len)
{
u8 *pos = ie;
u8 *end = ie + ie_len;
if (ie_len < sizeof(NDIS_802_11_FIXED_IEs))
return;
pos += sizeof(NDIS_802_11_FIXED_IEs);
/* wpa_hexdump(MSG_MSGDUMP, "IEs", pos, end - pos); */
while (pos + 1 < end && pos + 2 + pos[1] <= end) {
u8 ielen = 2 + pos[1];
if (ielen > SSID_MAX_WPA_IE_LEN) {
pos += ielen;
continue;
}
if (pos[0] == GENERIC_INFO_ELEM && pos[1] >= 4 &&
os_memcmp(pos + 2, "\x00\x50\xf2\x01", 4) == 0) {
os_memcpy(res->wpa_ie, pos, ielen);
res->wpa_ie_len = ielen;
} else if (pos[0] == RSN_INFO_ELEM) {
os_memcpy(res->rsn_ie, pos, ielen);
res->rsn_ie_len = ielen;
}
pos += ielen;
}
}
static int wpa_driver_ndis_get_scan_results(void *priv,
struct wpa_scan_result *results,
size_t max_size)
{
struct wpa_driver_ndis_data *drv = priv;
NDIS_802_11_BSSID_LIST_EX *b;
size_t blen, count, i;
int len, j;
char *pos;
blen = 65535;
b = os_zalloc(blen);
if (b == NULL)
return -1;
len = ndis_get_oid(drv, OID_802_11_BSSID_LIST, (char *) b, blen);
if (len < 0) {
wpa_printf(MSG_DEBUG, "NDIS: failed to get scan results");
os_free(b);
return -1;
}
count = b->NumberOfItems;
if (count > max_size)
count = max_size;
os_memset(results, 0, max_size * sizeof(struct wpa_scan_result));
pos = (char *) &b->Bssid[0];
for (i = 0; i < count; i++) {
NDIS_WLAN_BSSID_EX *bss = (NDIS_WLAN_BSSID_EX *) pos;
os_memcpy(results[i].bssid, bss->MacAddress, ETH_ALEN);
os_memcpy(results[i].ssid, bss->Ssid.Ssid,
bss->Ssid.SsidLength);
results[i].ssid_len = bss->Ssid.SsidLength;
if (bss->Privacy)
results[i].caps |= IEEE80211_CAP_PRIVACY;
if (bss->InfrastructureMode == Ndis802_11IBSS)
results[i].caps |= IEEE80211_CAP_IBSS;
else if (bss->InfrastructureMode == Ndis802_11Infrastructure)
results[i].caps |= IEEE80211_CAP_ESS;
results[i].level = (int) bss->Rssi;
results[i].freq = bss->Configuration.DSConfig / 1000;
for (j = 0; j < sizeof(bss->SupportedRates); j++) {
if ((bss->SupportedRates[j] & 0x7f) >
results[i].maxrate) {
results[i].maxrate =
bss->SupportedRates[j] & 0x7f;
}
}
if (((char *) bss->IEs) + bss->IELength > (char *) b + blen) {
/*
* Some NDIS drivers have been reported to include an
* entry with an invalid IELength in scan results and
* this has crashed wpa_supplicant, so validate the
* returned value before using it.
*/
wpa_printf(MSG_DEBUG, "NDIS: skipped invalid scan "
"result IE (BSSID=" MACSTR ") IELength=%d",
MAC2STR(results[i].bssid),
(int) bss->IELength);
break;
}
wpa_driver_ndis_get_ies(&results[i], bss->IEs, bss->IELength);
pos += bss->Length;
if (pos > (char *) b + blen)
break;
}
os_free(b);
return (int) count;
}
static int wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv,
int key_idx, const u8 *addr,
const u8 *bssid, int pairwise)
{
NDIS_802_11_REMOVE_KEY rkey;
NDIS_802_11_KEY_INDEX index;
int res, res2;
os_memset(&rkey, 0, sizeof(rkey));
rkey.Length = sizeof(rkey);
rkey.KeyIndex = key_idx;
if (pairwise)
rkey.KeyIndex |= 1 << 30;
os_memcpy(rkey.BSSID, bssid, ETH_ALEN);
res = ndis_set_oid(drv, OID_802_11_REMOVE_KEY, (char *) &rkey,
sizeof(rkey));
if (!pairwise) {
index = key_idx;
res2 = ndis_set_oid(drv, OID_802_11_REMOVE_WEP,
(char *) &index, sizeof(index));
} else
res2 = 0;
if (res < 0 && res2 < 0)
return -1;
return 0;
}
static int wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv,
int pairwise, int key_idx, int set_tx,
const u8 *key, size_t key_len)
{
NDIS_802_11_WEP *wep;
size_t len;
int res;
len = 12 + key_len;
wep = os_zalloc(len);
if (wep == NULL)
return -1;
wep->Length = len;
wep->KeyIndex = key_idx;
if (set_tx)
wep->KeyIndex |= 1 << 31;
#if 0 /* Setting bit30 does not seem to work with some NDIS drivers */
if (pairwise)
wep->KeyIndex |= 1 << 30;
#endif
wep->KeyLength = key_len;
os_memcpy(wep->KeyMaterial, key, key_len);
wpa_hexdump_key(MSG_MSGDUMP, "NDIS: OID_802_11_ADD_WEP",
(char *) wep, len);
res = ndis_set_oid(drv, OID_802_11_ADD_WEP, (char *) wep, len);
os_free(wep);
return res;
}
static int wpa_driver_ndis_set_key(void *priv, wpa_alg alg, const u8 *addr,
int key_idx, int set_tx,
const u8 *seq, size_t seq_len,
const u8 *key, size_t key_len)
{
struct wpa_driver_ndis_data *drv = priv;
size_t len, i;
NDIS_802_11_KEY *nkey;
int res, pairwise;
u8 bssid[ETH_ALEN];
if (addr == NULL || os_memcmp(addr, "\xff\xff\xff\xff\xff\xff",
ETH_ALEN) == 0) {
/* Group Key */
pairwise = 0;
if (wpa_driver_ndis_get_bssid(drv, bssid) < 0)
os_memset(bssid, 0xff, ETH_ALEN);
} else {
/* Pairwise Key */
pairwise = 1;
os_memcpy(bssid, addr, ETH_ALEN);
}
if (alg == WPA_ALG_NONE || key_len == 0) {
return wpa_driver_ndis_remove_key(drv, key_idx, addr, bssid,
pairwise);
}
if (alg == WPA_ALG_WEP) {
return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx,
key, key_len);
}
len = 12 + 6 + 6 + 8 + key_len;
nkey = os_zalloc(len);
if (nkey == NULL)
return -1;
nkey->Length = len;
nkey->KeyIndex = key_idx;
if (set_tx)
nkey->KeyIndex |= 1 << 31;
if (pairwise)
nkey->KeyIndex |= 1 << 30;
if (seq && seq_len)
nkey->KeyIndex |= 1 << 29;
nkey->KeyLength = key_len;
os_memcpy(nkey->BSSID, bssid, ETH_ALEN);
if (seq && seq_len) {
for (i = 0; i < seq_len; i++)
nkey->KeyRSC |= (ULONGLONG) seq[i] << (i * 8);
}
if (alg == WPA_ALG_TKIP && key_len == 32) {
os_memcpy(nkey->KeyMaterial, key, 16);
os_memcpy(nkey->KeyMaterial + 16, key + 24, 8);
os_memcpy(nkey->KeyMaterial + 24, key + 16, 8);
} else {
os_memcpy(nkey->KeyMaterial, key, key_len);
}
wpa_hexdump_key(MSG_MSGDUMP, "NDIS: OID_802_11_ADD_KEY",
(char *) nkey, len);
res = ndis_set_oid(drv, OID_802_11_ADD_KEY, (char *) nkey, len);
os_free(nkey);
return res;
}
static int
wpa_driver_ndis_associate(void *priv,
struct wpa_driver_associate_params *params)
{
struct wpa_driver_ndis_data *drv = priv;
u32 auth_mode, encr, priv_mode, mode;
drv->mode = params->mode;
/* Note: Setting OID_802_11_INFRASTRUCTURE_MODE clears current keys,
* so static WEP keys needs to be set again after this. */
if (params->mode == IEEE80211_MODE_IBSS) {
mode = Ndis802_11IBSS;
/* Need to make sure that BSSID polling is enabled for
* IBSS mode. */
eloop_cancel_timeout(wpa_driver_ndis_poll_timeout, drv, NULL);
eloop_register_timeout(1, 0, wpa_driver_ndis_poll_timeout,
drv, NULL);
} else
mode = Ndis802_11Infrastructure;
if (ndis_set_oid(drv, OID_802_11_INFRASTRUCTURE_MODE,
(char *) &mode, sizeof(mode)) < 0) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
"OID_802_11_INFRASTRUCTURE_MODE (%d)",
(int) mode);
/* Try to continue anyway */
}
if (params->key_mgmt_suite == KEY_MGMT_NONE ||
params->key_mgmt_suite == KEY_MGMT_802_1X_NO_WPA) {
/* Re-set WEP keys if static WEP configuration is used. */
u8 bcast[ETH_ALEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
int i;
for (i = 0; i < 4; i++) {
if (!params->wep_key[i])
continue;
wpa_printf(MSG_DEBUG, "NDIS: Re-setting static WEP "
"key %d", i);
wpa_driver_ndis_set_key(drv, WPA_ALG_WEP, bcast, i,
i == params->wep_tx_keyidx,
NULL, 0, params->wep_key[i],
params->wep_key_len[i]);
}
}
if (params->wpa_ie == NULL || params->wpa_ie_len == 0) {
if (params->auth_alg & AUTH_ALG_SHARED_KEY) {
if (params->auth_alg & AUTH_ALG_OPEN_SYSTEM)
auth_mode = Ndis802_11AuthModeAutoSwitch;
else
auth_mode = Ndis802_11AuthModeShared;
} else
auth_mode = Ndis802_11AuthModeOpen;
priv_mode = Ndis802_11PrivFilterAcceptAll;
} else if (params->wpa_ie[0] == RSN_INFO_ELEM) {
priv_mode = Ndis802_11PrivFilter8021xWEP;
if (params->key_mgmt_suite == KEY_MGMT_PSK)
auth_mode = Ndis802_11AuthModeWPA2PSK;
else
auth_mode = Ndis802_11AuthModeWPA2;
} else {
priv_mode = Ndis802_11PrivFilter8021xWEP;
if (params->key_mgmt_suite == KEY_MGMT_WPA_NONE)
auth_mode = Ndis802_11AuthModeWPANone;
else if (params->key_mgmt_suite == KEY_MGMT_PSK)
auth_mode = Ndis802_11AuthModeWPAPSK;
else
auth_mode = Ndis802_11AuthModeWPA;
}
switch (params->pairwise_suite) {
case CIPHER_CCMP:
encr = Ndis802_11Encryption3Enabled;
break;
case CIPHER_TKIP:
encr = Ndis802_11Encryption2Enabled;
break;
case CIPHER_WEP40:
case CIPHER_WEP104:
encr = Ndis802_11Encryption1Enabled;
break;
case CIPHER_NONE:
if (params->group_suite == CIPHER_CCMP)
encr = Ndis802_11Encryption3Enabled;
else if (params->group_suite == CIPHER_TKIP)
encr = Ndis802_11Encryption2Enabled;
else
encr = Ndis802_11EncryptionDisabled;
break;
default:
encr = Ndis802_11EncryptionDisabled;
};
if (ndis_set_oid(drv, OID_802_11_PRIVACY_FILTER,
(char *) &priv_mode, sizeof(priv_mode)) < 0) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
"OID_802_11_PRIVACY_FILTER (%d)",
(int) priv_mode);
/* Try to continue anyway */
}
ndis_set_auth_mode(drv, auth_mode);
ndis_set_encr_status(drv, encr);
if (params->bssid) {
ndis_set_oid(drv, OID_802_11_BSSID, params->bssid, ETH_ALEN);
drv->oid_bssid_set = 1;
} else if (drv->oid_bssid_set) {
ndis_set_oid(drv, OID_802_11_BSSID, "\xff\xff\xff\xff\xff\xff",
ETH_ALEN);
drv->oid_bssid_set = 0;
}
return wpa_driver_ndis_set_ssid(drv, params->ssid, params->ssid_len);
}
static int wpa_driver_ndis_set_pmkid(struct wpa_driver_ndis_data *drv)
{
int len, count, i, ret;
struct ndis_pmkid_entry *entry;
NDIS_802_11_PMKID *p;
count = 0;
entry = drv->pmkid;
while (entry) {
count++;
if (count >= drv->no_of_pmkid)
break;
entry = entry->next;
}
len = 8 + count * sizeof(BSSID_INFO);
p = os_zalloc(len);
if (p == NULL)
return -1;
p->Length = len;
p->BSSIDInfoCount = count;
entry = drv->pmkid;
for (i = 0; i < count; i++) {
os_memcpy(&p->BSSIDInfo[i].BSSID, entry->bssid, ETH_ALEN);
os_memcpy(&p->BSSIDInfo[i].PMKID, entry->pmkid, 16);
entry = entry->next;
}
wpa_hexdump(MSG_MSGDUMP, "NDIS: OID_802_11_PMKID", (char *) p, len);
ret = ndis_set_oid(drv, OID_802_11_PMKID, (char *) p, len);
os_free(p);
return ret;
}
static int wpa_driver_ndis_add_pmkid(void *priv, const u8 *bssid,
const u8 *pmkid)
{
struct wpa_driver_ndis_data *drv = priv;
struct ndis_pmkid_entry *entry, *prev;
if (drv->no_of_pmkid == 0)
return 0;
prev = NULL;
entry = drv->pmkid;
while (entry) {
if (os_memcmp(entry->bssid, bssid, ETH_ALEN) == 0)
break;
prev = entry;
entry = entry->next;
}
if (entry) {
/* Replace existing entry for this BSSID and move it into the
* beginning of the list. */
os_memcpy(entry->pmkid, pmkid, 16);
if (prev) {
prev->next = entry->next;
entry->next = drv->pmkid;
drv->pmkid = entry;
}
} else {
entry = os_malloc(sizeof(*entry));
if (entry) {
os_memcpy(entry->bssid, bssid, ETH_ALEN);
os_memcpy(entry->pmkid, pmkid, 16);
entry->next = drv->pmkid;
drv->pmkid = entry;
}
}
return wpa_driver_ndis_set_pmkid(drv);
}
static int wpa_driver_ndis_remove_pmkid(void *priv, const u8 *bssid,
const u8 *pmkid)
{
struct wpa_driver_ndis_data *drv = priv;
struct ndis_pmkid_entry *entry, *prev;
if (drv->no_of_pmkid == 0)
return 0;
entry = drv->pmkid;
prev = NULL;
while (entry) {
if (os_memcmp(entry->bssid, bssid, ETH_ALEN) == 0 &&
os_memcmp(entry->pmkid, pmkid, 16) == 0) {
if (prev)
prev->next = entry->next;
else
drv->pmkid = entry->next;
os_free(entry);
break;
}
prev = entry;
entry = entry->next;
}
return wpa_driver_ndis_set_pmkid(drv);
}
static int wpa_driver_ndis_flush_pmkid(void *priv)
{
struct wpa_driver_ndis_data *drv = priv;
NDIS_802_11_PMKID p;
struct ndis_pmkid_entry *pmkid, *prev;
if (drv->no_of_pmkid == 0)
return 0;
pmkid = drv->pmkid;
drv->pmkid = NULL;
while (pmkid) {
prev = pmkid;
pmkid = pmkid->next;
os_free(prev);
}
os_memset(&p, 0, sizeof(p));
p.Length = 8;
p.BSSIDInfoCount = 0;
wpa_hexdump(MSG_MSGDUMP, "NDIS: OID_802_11_PMKID (flush)",
(char *) &p, 8);
return ndis_set_oid(drv, OID_802_11_PMKID, (char *) &p, 8);
}
static int wpa_driver_ndis_get_associnfo(struct wpa_driver_ndis_data *drv)
{
char buf[512], *pos;
NDIS_802_11_ASSOCIATION_INFORMATION *ai;
int len;
union wpa_event_data data;
NDIS_802_11_BSSID_LIST_EX *b;
size_t blen, i;
len = ndis_get_oid(drv, OID_802_11_ASSOCIATION_INFORMATION, buf,
sizeof(buf));
if (len < 0) {
wpa_printf(MSG_DEBUG, "NDIS: failed to get association "
"information");
return -1;
}
if (len > sizeof(buf)) {
/* Some drivers seem to be producing incorrect length for this
* data. Limit the length to the current buffer size to avoid
* crashing in hexdump. The data seems to be otherwise valid,
* so better try to use it. */
wpa_printf(MSG_DEBUG, "NDIS: ignored bogus association "
"information length %d", len);
len = ndis_get_oid(drv, OID_802_11_ASSOCIATION_INFORMATION,
buf, sizeof(buf));
if (len < -1) {
wpa_printf(MSG_DEBUG, "NDIS: re-reading association "
"information failed");
return -1;
}
if (len > sizeof(buf)) {
wpa_printf(MSG_DEBUG, "NDIS: ignored bogus association"
" information length %d (re-read)", len);
len = sizeof(buf);
}
}
wpa_hexdump(MSG_MSGDUMP, "NDIS: association information", buf, len);
if (len < sizeof(*ai)) {
wpa_printf(MSG_DEBUG, "NDIS: too short association "
"information");
return -1;
}
ai = (NDIS_802_11_ASSOCIATION_INFORMATION *) buf;
wpa_printf(MSG_DEBUG, "NDIS: ReqFixed=0x%x RespFixed=0x%x off_req=%d "
"off_resp=%d len_req=%d len_resp=%d",
ai->AvailableRequestFixedIEs, ai->AvailableResponseFixedIEs,
(int) ai->OffsetRequestIEs, (int) ai->OffsetResponseIEs,
(int) ai->RequestIELength, (int) ai->ResponseIELength);
if (ai->OffsetRequestIEs + ai->RequestIELength > (unsigned) len ||
ai->OffsetResponseIEs + ai->ResponseIELength > (unsigned) len) {
wpa_printf(MSG_DEBUG, "NDIS: association information - "
"IE overflow");
return -1;
}
wpa_hexdump(MSG_MSGDUMP, "NDIS: Request IEs",
buf + ai->OffsetRequestIEs, ai->RequestIELength);
wpa_hexdump(MSG_MSGDUMP, "NDIS: Response IEs",
buf + ai->OffsetResponseIEs, ai->ResponseIELength);
os_memset(&data, 0, sizeof(data));
data.assoc_info.req_ies = buf + ai->OffsetRequestIEs;
data.assoc_info.req_ies_len = ai->RequestIELength;
data.assoc_info.resp_ies = buf + ai->OffsetResponseIEs;
data.assoc_info.resp_ies_len = ai->ResponseIELength;
blen = 65535;
b = os_zalloc(blen);
if (b == NULL)
goto skip_scan_results;
len = ndis_get_oid(drv, OID_802_11_BSSID_LIST, (char *) b, blen);
if (len < 0) {
wpa_printf(MSG_DEBUG, "NDIS: failed to get scan results");
os_free(b);
b = NULL;
goto skip_scan_results;
}
wpa_printf(MSG_DEBUG, "NDIS: %d BSSID items to process for AssocInfo",
(unsigned int) b->NumberOfItems);
pos = (char *) &b->Bssid[0];
for (i = 0; i < b->NumberOfItems; i++) {
NDIS_WLAN_BSSID_EX *bss = (NDIS_WLAN_BSSID_EX *) pos;
if (os_memcmp(drv->bssid, bss->MacAddress, ETH_ALEN) == 0 &&
bss->IELength > sizeof(NDIS_802_11_FIXED_IEs)) {
data.assoc_info.beacon_ies =
((u8 *) bss->IEs) +
sizeof(NDIS_802_11_FIXED_IEs);
data.assoc_info.beacon_ies_len =
bss->IELength - sizeof(NDIS_802_11_FIXED_IEs);
wpa_hexdump(MSG_MSGDUMP, "NDIS: Beacon IEs",
data.assoc_info.beacon_ies,
data.assoc_info.beacon_ies_len);
break;
}
pos += bss->Length;
if (pos > (char *) b + blen)
break;
}
skip_scan_results:
wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &data);
os_free(b);
return 0;
}
static void wpa_driver_ndis_poll_timeout(void *eloop_ctx, void *timeout_ctx)
{
struct wpa_driver_ndis_data *drv = eloop_ctx;
u8 bssid[ETH_ALEN];
int poll;
if (drv->wired)
return;
if (wpa_driver_ndis_get_bssid(drv, bssid)) {
/* Disconnected */
if (os_memcmp(drv->bssid, "\x00\x00\x00\x00\x00\x00", ETH_ALEN)
!= 0) {
os_memset(drv->bssid, 0, ETH_ALEN);
wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
}
} else {
/* Connected */
if (os_memcmp(drv->bssid, bssid, ETH_ALEN) != 0) {
os_memcpy(drv->bssid, bssid, ETH_ALEN);
wpa_driver_ndis_get_associnfo(drv);
wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
}
}
/* When using integrated NDIS event receiver, we can skip BSSID
* polling when using infrastructure network. However, when using
* IBSS mode, many driver do not seem to generate connection event,
* so we need to enable BSSID polling to figure out when IBSS network
* has been formed.
*/
poll = drv->mode == IEEE80211_MODE_IBSS;
#ifndef CONFIG_NDIS_EVENTS_INTEGRATED
#ifndef _WIN32_WCE
poll = 1;
#endif /* _WIN32_WCE */
#endif /* CONFIG_NDIS_EVENTS_INTEGRATED */
if (poll) {
eloop_register_timeout(1, 0, wpa_driver_ndis_poll_timeout,
drv, NULL);
}
}
static void wpa_driver_ndis_poll(void *priv)
{
struct wpa_driver_ndis_data *drv = priv;
eloop_cancel_timeout(wpa_driver_ndis_poll_timeout, drv, NULL);
wpa_driver_ndis_poll_timeout(drv, NULL);
}
/* Called when driver generates Media Connect Event by calling
* NdisMIndicateStatus() with NDIS_STATUS_MEDIA_CONNECT */
void wpa_driver_ndis_event_connect(struct wpa_driver_ndis_data *drv)
{
wpa_printf(MSG_DEBUG, "NDIS: Media Connect Event");
if (wpa_driver_ndis_get_bssid(drv, drv->bssid) == 0) {
wpa_driver_ndis_get_associnfo(drv);
wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
}
}
/* Called when driver generates Media Disconnect Event by calling
* NdisMIndicateStatus() with NDIS_STATUS_MEDIA_DISCONNECT */
void wpa_driver_ndis_event_disconnect(struct wpa_driver_ndis_data *drv)
{
wpa_printf(MSG_DEBUG, "NDIS: Media Disconnect Event");
os_memset(drv->bssid, 0, ETH_ALEN);
wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
}
static void wpa_driver_ndis_event_auth(struct wpa_driver_ndis_data *drv,
const u8 *data, size_t data_len)
{
NDIS_802_11_AUTHENTICATION_REQUEST *req;
int pairwise = 0, group = 0;
union wpa_event_data event;
if (data_len < sizeof(*req)) {
wpa_printf(MSG_DEBUG, "NDIS: Too short Authentication Request "
"Event (len=%d)", data_len);
return;
}
req = (NDIS_802_11_AUTHENTICATION_REQUEST *) data;
wpa_printf(MSG_DEBUG, "NDIS: Authentication Request Event: "
"Bssid " MACSTR " Flags 0x%x",
MAC2STR(req->Bssid), (int) req->Flags);
if ((req->Flags & NDIS_802_11_AUTH_REQUEST_PAIRWISE_ERROR) ==
NDIS_802_11_AUTH_REQUEST_PAIRWISE_ERROR)
pairwise = 1;
else if ((req->Flags & NDIS_802_11_AUTH_REQUEST_GROUP_ERROR) ==
NDIS_802_11_AUTH_REQUEST_GROUP_ERROR)
group = 1;
if (pairwise || group) {
os_memset(&event, 0, sizeof(event));
event.michael_mic_failure.unicast = pairwise;
wpa_supplicant_event(drv->ctx, EVENT_MICHAEL_MIC_FAILURE,
&event);
}
}
static void wpa_driver_ndis_event_pmkid(struct wpa_driver_ndis_data *drv,
const u8 *data, size_t data_len)
{
NDIS_802_11_PMKID_CANDIDATE_LIST *pmkid;
size_t i;
union wpa_event_data event;
if (data_len < 8) {
wpa_printf(MSG_DEBUG, "NDIS: Too short PMKID Candidate List "
"Event (len=%d)", data_len);
return;
}
pmkid = (NDIS_802_11_PMKID_CANDIDATE_LIST *) data;
wpa_printf(MSG_DEBUG, "NDIS: PMKID Candidate List Event - Version %d "
"NumCandidates %d",
(int) pmkid->Version, (int) pmkid->NumCandidates);
if (pmkid->Version != 1) {
wpa_printf(MSG_DEBUG, "NDIS: Unsupported PMKID Candidate List "
"Version %d", (int) pmkid->Version);
return;
}
if (data_len < 8 + pmkid->NumCandidates * sizeof(PMKID_CANDIDATE)) {
wpa_printf(MSG_DEBUG, "NDIS: PMKID Candidate List underflow");
return;
}
os_memset(&event, 0, sizeof(event));
for (i = 0; i < pmkid->NumCandidates; i++) {
PMKID_CANDIDATE *p = &pmkid->CandidateList[i];
wpa_printf(MSG_DEBUG, "NDIS: %d: " MACSTR " Flags 0x%x",
i, MAC2STR(p->BSSID), (int) p->Flags);
os_memcpy(event.pmkid_candidate.bssid, p->BSSID, ETH_ALEN);
event.pmkid_candidate.index = i;
event.pmkid_candidate.preauth =
p->Flags & NDIS_802_11_PMKID_CANDIDATE_PREAUTH_ENABLED;
wpa_supplicant_event(drv->ctx, EVENT_PMKID_CANDIDATE,
&event);
}
}
/* Called when driver calls NdisMIndicateStatus() with
* NDIS_STATUS_MEDIA_SPECIFIC_INDICATION */
void wpa_driver_ndis_event_media_specific(struct wpa_driver_ndis_data *drv,
const u8 *data, size_t data_len)
{
NDIS_802_11_STATUS_INDICATION *status;
if (data == NULL || data_len < sizeof(*status))
return;
wpa_hexdump(MSG_DEBUG, "NDIS: Media Specific Indication",
data, data_len);
status = (NDIS_802_11_STATUS_INDICATION *) data;
data += sizeof(status);
data_len -= sizeof(status);
switch (status->StatusType) {
case Ndis802_11StatusType_Authentication:
wpa_driver_ndis_event_auth(drv, data, data_len);
break;
case Ndis802_11StatusType_PMKID_CandidateList:
wpa_driver_ndis_event_pmkid(drv, data, data_len);
break;
default:
wpa_printf(MSG_DEBUG, "NDIS: Unknown StatusType %d",
(int) status->StatusType);
break;
}
}
/* Called when an adapter is added */
void wpa_driver_ndis_event_adapter_arrival(struct wpa_driver_ndis_data *drv)
{
union wpa_event_data event;
int i;
wpa_printf(MSG_DEBUG, "NDIS: Notify Adapter Arrival");
for (i = 0; i < 30; i++) {
/* Re-open Packet32/NDISUIO connection */
wpa_driver_ndis_adapter_close(drv);
if (wpa_driver_ndis_adapter_init(drv) < 0 ||
wpa_driver_ndis_adapter_open(drv) < 0) {
wpa_printf(MSG_DEBUG, "NDIS: Driver re-initialization "
"(%d) failed", i);
os_sleep(1, 0);
} else {
wpa_printf(MSG_DEBUG, "NDIS: Driver re-initialized");
break;
}
}
os_memset(&event, 0, sizeof(event));
os_snprintf(event.interface_status.ifname,
sizeof(event.interface_status.ifname), "%s", drv->ifname);
event.interface_status.ievent = EVENT_INTERFACE_ADDED;
wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
}
/* Called when an adapter is removed */
void wpa_driver_ndis_event_adapter_removal(struct wpa_driver_ndis_data *drv)
{
union wpa_event_data event;
wpa_printf(MSG_DEBUG, "NDIS: Notify Adapter Removal");
os_memset(&event, 0, sizeof(event));
os_snprintf(event.interface_status.ifname,
sizeof(event.interface_status.ifname), "%s", drv->ifname);
event.interface_status.ievent = EVENT_INTERFACE_REMOVED;
wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
}
static void
wpa_driver_ndis_get_wpa_capability(struct wpa_driver_ndis_data *drv)
{
wpa_printf(MSG_DEBUG, "NDIS: verifying driver WPA capability");
if (ndis_set_auth_mode(drv, Ndis802_11AuthModeWPA) == 0 &&
ndis_get_auth_mode(drv) == Ndis802_11AuthModeWPA) {
wpa_printf(MSG_DEBUG, "NDIS: WPA key management supported");
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA;
}
if (ndis_set_auth_mode(drv, Ndis802_11AuthModeWPAPSK) == 0 &&
ndis_get_auth_mode(drv) == Ndis802_11AuthModeWPAPSK) {
wpa_printf(MSG_DEBUG, "NDIS: WPA-PSK key management "
"supported");
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK;
}
if (ndis_set_encr_status(drv, Ndis802_11Encryption3Enabled) == 0 &&
ndis_get_encr_status(drv) == Ndis802_11Encryption3KeyAbsent) {
wpa_printf(MSG_DEBUG, "NDIS: CCMP encryption supported");
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_CCMP;
}
if (ndis_set_encr_status(drv, Ndis802_11Encryption2Enabled) == 0 &&
ndis_get_encr_status(drv) == Ndis802_11Encryption2KeyAbsent) {
wpa_printf(MSG_DEBUG, "NDIS: TKIP encryption supported");
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_TKIP;
}
if (ndis_set_encr_status(drv, Ndis802_11Encryption1Enabled) == 0 &&
ndis_get_encr_status(drv) == Ndis802_11Encryption1KeyAbsent) {
wpa_printf(MSG_DEBUG, "NDIS: WEP encryption supported");
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_WEP40 |
WPA_DRIVER_CAPA_ENC_WEP104;
}
if (ndis_set_auth_mode(drv, Ndis802_11AuthModeShared) == 0 &&
ndis_get_auth_mode(drv) == Ndis802_11AuthModeShared) {
drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
}
if (ndis_set_auth_mode(drv, Ndis802_11AuthModeOpen) == 0 &&
ndis_get_auth_mode(drv) == Ndis802_11AuthModeOpen) {
drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
}
ndis_set_encr_status(drv, Ndis802_11EncryptionDisabled);
/* Could also verify OID_802_11_ADD_KEY error reporting and
* support for OID_802_11_ASSOCIATION_INFORMATION. */
if (drv->capa.key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_WPA &&
drv->capa.enc & (WPA_DRIVER_CAPA_ENC_TKIP |
WPA_DRIVER_CAPA_ENC_CCMP)) {
wpa_printf(MSG_DEBUG, "NDIS: driver supports WPA");
drv->has_capability = 1;
} else {
wpa_printf(MSG_DEBUG, "NDIS: no WPA support found");
}
wpa_printf(MSG_DEBUG, "NDIS: driver capabilities: key_mgmt 0x%x "
"enc 0x%x auth 0x%x",
drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
}
static void wpa_driver_ndis_get_capability(struct wpa_driver_ndis_data *drv)
{
char buf[512];
int len;
size_t i;
NDIS_802_11_CAPABILITY *c;
drv->capa.flags = WPA_DRIVER_FLAGS_DRIVER_IE;
len = ndis_get_oid(drv, OID_802_11_CAPABILITY, buf, sizeof(buf));
if (len < 0) {
wpa_driver_ndis_get_wpa_capability(drv);
return;
}
wpa_hexdump(MSG_MSGDUMP, "OID_802_11_CAPABILITY", buf, len);
c = (NDIS_802_11_CAPABILITY *) buf;
if (len < sizeof(*c) || c->Version != 2) {
wpa_printf(MSG_DEBUG, "NDIS: unsupported "
"OID_802_11_CAPABILITY data");
return;
}
wpa_printf(MSG_DEBUG, "NDIS: Driver supports OID_802_11_CAPABILITY - "
"NoOfPMKIDs %d NoOfAuthEncrPairs %d",
(int) c->NoOfPMKIDs,
(int) c->NoOfAuthEncryptPairsSupported);
drv->has_capability = 1;
drv->no_of_pmkid = c->NoOfPMKIDs;
for (i = 0; i < c->NoOfAuthEncryptPairsSupported; i++) {
NDIS_802_11_AUTHENTICATION_ENCRYPTION *ae;
ae = &c->AuthenticationEncryptionSupported[i];
if ((char *) (ae + 1) > buf + len) {
wpa_printf(MSG_DEBUG, "NDIS: auth/encr pair list "
"overflow");
break;
}
wpa_printf(MSG_MSGDUMP, "NDIS: %d - auth %d encr %d",
i, (int) ae->AuthModeSupported,
(int) ae->EncryptStatusSupported);
switch (ae->AuthModeSupported) {
case Ndis802_11AuthModeOpen:
drv->capa.auth |= WPA_DRIVER_AUTH_OPEN;
break;
case Ndis802_11AuthModeShared:
drv->capa.auth |= WPA_DRIVER_AUTH_SHARED;
break;
case Ndis802_11AuthModeWPA:
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA;
break;
case Ndis802_11AuthModeWPAPSK:
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK;
break;
case Ndis802_11AuthModeWPA2:
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_WPA2;
break;
case Ndis802_11AuthModeWPA2PSK:
drv->capa.key_mgmt |=
WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK;
break;
case Ndis802_11AuthModeWPANone:
drv->capa.key_mgmt |=
WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE;
break;
default:
break;
}
switch (ae->EncryptStatusSupported) {
case Ndis802_11Encryption1Enabled:
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_WEP40;
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_WEP104;
break;
case Ndis802_11Encryption2Enabled:
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_TKIP;
break;
case Ndis802_11Encryption3Enabled:
drv->capa.enc |= WPA_DRIVER_CAPA_ENC_CCMP;
break;
default:
break;
}
}
wpa_printf(MSG_DEBUG, "NDIS: driver capabilities: key_mgmt 0x%x "
"enc 0x%x auth 0x%x",
drv->capa.key_mgmt, drv->capa.enc, drv->capa.auth);
}
static int wpa_driver_ndis_get_capa(void *priv, struct wpa_driver_capa *capa)
{
struct wpa_driver_ndis_data *drv = priv;
if (!drv->has_capability)
return -1;
os_memcpy(capa, &drv->capa, sizeof(*capa));
return 0;
}
static const char * wpa_driver_ndis_get_ifname(void *priv)
{
struct wpa_driver_ndis_data *drv = priv;
return drv->ifname;
}
static const u8 * wpa_driver_ndis_get_mac_addr(void *priv)
{
struct wpa_driver_ndis_data *drv = priv;
return drv->own_addr;
}
#ifdef _WIN32_WCE
#define NDISUIO_MSG_SIZE (sizeof(NDISUIO_DEVICE_NOTIFICATION) + 512)
static void ndisuio_notification_receive(void *eloop_data, void *user_ctx)
{
struct wpa_driver_ndis_data *drv = eloop_data;
NDISUIO_DEVICE_NOTIFICATION *hdr;
u8 buf[NDISUIO_MSG_SIZE];
DWORD len, flags;
if (!ReadMsgQueue(drv->event_queue, buf, NDISUIO_MSG_SIZE, &len, 0,
&flags)) {
wpa_printf(MSG_DEBUG, "ndisuio_notification_receive: "
"ReadMsgQueue failed: %d", (int) GetLastError());
return;
}
if (len < sizeof(NDISUIO_DEVICE_NOTIFICATION)) {
wpa_printf(MSG_DEBUG, "ndisuio_notification_receive: "
"Too short message (len=%d)", (int) len);
return;
}
hdr = (NDISUIO_DEVICE_NOTIFICATION *) buf;
wpa_printf(MSG_DEBUG, "NDIS: Notification received: len=%d type=0x%x",
(int) len, hdr->dwNotificationType);
switch (hdr->dwNotificationType) {
#ifdef NDISUIO_NOTIFICATION_ADAPTER_ARRIVAL
case NDISUIO_NOTIFICATION_ADAPTER_ARRIVAL:
wpa_printf(MSG_DEBUG, "NDIS: ADAPTER_ARRIVAL");
wpa_driver_ndis_event_adapter_arrival(drv);
break;
#endif
#ifdef NDISUIO_NOTIFICATION_ADAPTER_REMOVAL
case NDISUIO_NOTIFICATION_ADAPTER_REMOVAL:
wpa_printf(MSG_DEBUG, "NDIS: ADAPTER_REMOVAL");
wpa_driver_ndis_event_adapter_removal(drv);
break;
#endif
case NDISUIO_NOTIFICATION_MEDIA_CONNECT:
wpa_printf(MSG_DEBUG, "NDIS: MEDIA_CONNECT");
SetEvent(drv->connected_event);
wpa_driver_ndis_event_connect(drv);
break;
case NDISUIO_NOTIFICATION_MEDIA_DISCONNECT:
ResetEvent(drv->connected_event);
wpa_printf(MSG_DEBUG, "NDIS: MEDIA_DISCONNECT");
wpa_driver_ndis_event_disconnect(drv);
break;
case NDISUIO_NOTIFICATION_MEDIA_SPECIFIC_NOTIFICATION:
wpa_printf(MSG_DEBUG, "NDIS: MEDIA_SPECIFIC_NOTIFICATION");
#if _WIN32_WCE == 420 || _WIN32_WCE == 0x420
wpa_driver_ndis_event_media_specific(
drv, hdr->pvStatusBuffer, hdr->uiStatusBufferSize);
#else
wpa_driver_ndis_event_media_specific(
drv, ((const u8 *) hdr) + hdr->uiOffsetToStatusBuffer,
(size_t) hdr->uiStatusBufferSize);
#endif
break;
default:
wpa_printf(MSG_DEBUG, "NDIS: Unknown notification type 0x%x",
hdr->dwNotificationType);
break;
}
}
static void ndisuio_notification_deinit(struct wpa_driver_ndis_data *drv)
{
NDISUIO_REQUEST_NOTIFICATION req;
memset(&req, 0, sizeof(req));
req.hMsgQueue = drv->event_queue;
req.dwNotificationTypes = 0;
if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_REQUEST_NOTIFICATION,
&req, sizeof(req), NULL, 0, NULL, NULL)) {
wpa_printf(MSG_INFO, "ndisuio_notification_deinit: "
"IOCTL_NDISUIO_REQUEST_NOTIFICATION failed: %d",
(int) GetLastError());
}
if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_CANCEL_NOTIFICATION,
NULL, 0, NULL, 0, NULL, NULL)) {
wpa_printf(MSG_INFO, "ndisuio_notification_deinit: "
"IOCTL_NDISUIO_CANCEL_NOTIFICATION failed: %d",
(int) GetLastError());
}
if (drv->event_queue) {
eloop_unregister_event(drv->event_queue,
sizeof(drv->event_queue));
CloseHandle(drv->event_queue);
drv->event_queue = NULL;
}
if (drv->connected_event) {
CloseHandle(drv->connected_event);
drv->connected_event = NULL;
}
}
static int ndisuio_notification_init(struct wpa_driver_ndis_data *drv)
{
MSGQUEUEOPTIONS opt;
NDISUIO_REQUEST_NOTIFICATION req;
drv->connected_event =
CreateEvent(NULL, TRUE, FALSE, TEXT("WpaSupplicantConnected"));
if (drv->connected_event == NULL) {
wpa_printf(MSG_INFO, "ndisuio_notification_init: "
"CreateEvent failed: %d",
(int) GetLastError());
return -1;
}
memset(&opt, 0, sizeof(opt));
opt.dwSize = sizeof(opt);
opt.dwMaxMessages = 5;
opt.cbMaxMessage = NDISUIO_MSG_SIZE;
opt.bReadAccess = TRUE;
drv->event_queue = CreateMsgQueue(NULL, &opt);
if (drv->event_queue == NULL) {
wpa_printf(MSG_INFO, "ndisuio_notification_init: "
"CreateMsgQueue failed: %d",
(int) GetLastError());
ndisuio_notification_deinit(drv);
return -1;
}
memset(&req, 0, sizeof(req));
req.hMsgQueue = drv->event_queue;
req.dwNotificationTypes =
#ifdef NDISUIO_NOTIFICATION_ADAPTER_ARRIVAL
NDISUIO_NOTIFICATION_ADAPTER_ARRIVAL |
#endif
#ifdef NDISUIO_NOTIFICATION_ADAPTER_REMOVAL
NDISUIO_NOTIFICATION_ADAPTER_REMOVAL |
#endif
NDISUIO_NOTIFICATION_MEDIA_CONNECT |
NDISUIO_NOTIFICATION_MEDIA_DISCONNECT |
NDISUIO_NOTIFICATION_MEDIA_SPECIFIC_NOTIFICATION;
if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_REQUEST_NOTIFICATION,
&req, sizeof(req), NULL, 0, NULL, NULL)) {
wpa_printf(MSG_INFO, "ndisuio_notification_init: "
"IOCTL_NDISUIO_REQUEST_NOTIFICATION failed: %d",
(int) GetLastError());
ndisuio_notification_deinit(drv);
return -1;
}
eloop_register_event(drv->event_queue, sizeof(drv->event_queue),
ndisuio_notification_receive, drv, NULL);
return 0;
}
#endif /* _WIN32_WCE */
static int wpa_driver_ndis_get_names(struct wpa_driver_ndis_data *drv)
{
#ifdef CONFIG_USE_NDISUIO
NDISUIO_QUERY_BINDING *b;
size_t blen = sizeof(*b) + 1024;
int i, error, found = 0;
DWORD written;
char name[256], desc[256], *dpos;
WCHAR *pos;
size_t j, len, dlen;
b = os_malloc(blen);
if (b == NULL)
return -1;
for (i = 0; ; i++) {
os_memset(b, 0, blen);
b->BindingIndex = i;
if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_QUERY_BINDING,
b, sizeof(NDISUIO_QUERY_BINDING), b, blen,
&written, NULL)) {
error = (int) GetLastError();
if (error == ERROR_NO_MORE_ITEMS)
break;
wpa_printf(MSG_DEBUG, "IOCTL_NDISUIO_QUERY_BINDING "
"failed: %d", error);
break;
}
pos = (WCHAR *) ((char *) b + b->DeviceNameOffset);
len = b->DeviceNameLength;
if (len >= sizeof(name))
len = sizeof(name) - 1;
for (j = 0; j < len; j++)
name[j] = (char) pos[j];
name[len] = '\0';
pos = (WCHAR *) ((char *) b + b->DeviceDescrOffset);
len = b->DeviceDescrLength;
if (len >= sizeof(desc))
len = sizeof(desc) - 1;
for (j = 0; j < len; j++)
desc[j] = (char) pos[j];
desc[len] = '\0';
wpa_printf(MSG_DEBUG, "NDIS: %d - %s - %s", i, name, desc);
if (os_strstr(name, drv->ifname)) {
wpa_printf(MSG_DEBUG, "NDIS: Interface name match");
found = 1;
break;
}
if (os_strncmp(desc, drv->ifname, os_strlen(drv->ifname)) == 0)
{
wpa_printf(MSG_DEBUG, "NDIS: Interface description "
"match");
found = 1;
break;
}
}
if (!found) {
wpa_printf(MSG_DEBUG, "NDIS: Could not find interface '%s'",
drv->ifname);
os_free(b);
return -1;
}
os_strncpy(drv->ifname,
os_strncmp(name, "\\DEVICE\\", 8) == 0 ? name + 8 : name,
sizeof(drv->ifname));
#ifdef _WIN32_WCE
drv->adapter_name = wpa_strdup_tchar(drv->ifname);
if (drv->adapter_name == NULL) {
wpa_printf(MSG_ERROR, "NDIS: Failed to allocate memory for "
"adapter name");
os_free(b);
return -1;
}
#endif /* _WIN32_WCE */
dpos = os_strstr(desc, " - ");
if (dpos)
dlen = dpos - desc;
else
dlen = os_strlen(desc);
drv->adapter_desc = os_malloc(dlen + 1);
if (drv->adapter_desc) {
os_memcpy(drv->adapter_desc, desc, dlen);
drv->adapter_desc[dlen] = '\0';
}
os_free(b);
if (drv->adapter_desc == NULL)
return -1;
wpa_printf(MSG_DEBUG, "NDIS: Adapter description prefix '%s'",
drv->adapter_desc);
return 0;
#else /* CONFIG_USE_NDISUIO */
PTSTR _names;
char *names, *pos, *pos2;
ULONG len;
BOOLEAN res;
#define MAX_ADAPTERS 32
char *name[MAX_ADAPTERS];
char *desc[MAX_ADAPTERS];
int num_name, num_desc, i, found_name, found_desc;
size_t dlen;
wpa_printf(MSG_DEBUG, "NDIS: Packet.dll version: %s",
PacketGetVersion());
len = 8192;
_names = os_zalloc(len);
if (_names == NULL)
return -1;
res = PacketGetAdapterNames(_names, &len);
if (!res && len > 8192) {
os_free(_names);
_names = os_zalloc(len);
if (_names == NULL)
return -1;
res = PacketGetAdapterNames(_names, &len);
}
if (!res) {
wpa_printf(MSG_ERROR, "NDIS: Failed to get adapter list "
"(PacketGetAdapterNames)");
os_free(_names);
return -1;
}
names = (char *) _names;
if (names[0] && names[1] == '\0' && names[2] && names[3] == '\0') {
wpa_printf(MSG_DEBUG, "NDIS: Looks like adapter names are in "
"UNICODE");
/* Convert to ASCII */
pos2 = pos = names;
while (pos2 < names + len) {
if (pos2[0] == '\0' && pos2[1] == '\0' &&
pos2[2] == '\0' && pos2[3] == '\0') {
pos2 += 4;
break;
}
*pos++ = pos2[0];
pos2 += 2;
}
os_memcpy(pos + 2, names, pos - names);
pos += 2;
} else
pos = names;
num_name = 0;
while (pos < names + len) {
name[num_name] = pos;
while (*pos && pos < names + len)
pos++;
if (pos + 1 >= names + len) {
os_free(names);
return -1;
}
pos++;
num_name++;
if (num_name >= MAX_ADAPTERS) {
wpa_printf(MSG_DEBUG, "NDIS: Too many adapters");
os_free(names);
return -1;
}
if (*pos == '\0') {
wpa_printf(MSG_DEBUG, "NDIS: %d adapter names found",
num_name);
pos++;
break;
}
}
num_desc = 0;
while (pos < names + len) {
desc[num_desc] = pos;
while (*pos && pos < names + len)
pos++;
if (pos + 1 >= names + len) {
os_free(names);
return -1;
}
pos++;
num_desc++;
if (num_desc >= MAX_ADAPTERS) {
wpa_printf(MSG_DEBUG, "NDIS: Too many adapter "
"descriptions");
os_free(names);
return -1;
}
if (*pos == '\0') {
wpa_printf(MSG_DEBUG, "NDIS: %d adapter descriptions "
"found", num_name);
pos++;
break;
}
}
/*
* Windows 98 with Packet.dll 3.0 alpha3 does not include adapter
* descriptions. Fill in dummy descriptors to work around this.
*/
while (num_desc < num_name)
desc[num_desc++] = "dummy description";
if (num_name != num_desc) {
wpa_printf(MSG_DEBUG, "NDIS: mismatch in adapter name and "
"description counts (%d != %d)",
num_name, num_desc);
os_free(names);
return -1;
}
found_name = found_desc = -1;
for (i = 0; i < num_name; i++) {
wpa_printf(MSG_DEBUG, "NDIS: %d - %s - %s",
i, name[i], desc[i]);
if (found_name == -1 && os_strstr(name[i], drv->ifname))
found_name = i;
if (found_desc == -1 &&
os_strncmp(desc[i], drv->ifname, os_strlen(drv->ifname)) ==
0)
found_desc = i;
}
if (found_name < 0 && found_desc >= 0) {
wpa_printf(MSG_DEBUG, "NDIS: Matched interface '%s' based on "
"description '%s'",
name[found_desc], desc[found_desc]);
found_name = found_desc;
os_strncpy(drv->ifname,
os_strncmp(name[found_desc], "\\Device\\NPF_", 12)
== 0 ? name[found_desc] + 12 : name[found_desc],
sizeof(drv->ifname));
}
if (found_name < 0) {
wpa_printf(MSG_DEBUG, "NDIS: Could not find interface '%s'",
drv->ifname);
os_free(names);
return -1;
}
i = found_name;
pos = os_strrchr(desc[i], '(');
if (pos) {
dlen = pos - desc[i];
pos--;
if (pos > desc[i] && *pos == ' ')
dlen--;
} else {
dlen = os_strlen(desc[i]);
}
drv->adapter_desc = os_malloc(dlen + 1);
if (drv->adapter_desc) {
os_memcpy(drv->adapter_desc, desc[i], dlen);
drv->adapter_desc[dlen] = '\0';
}
os_free(names);
if (drv->adapter_desc == NULL)
return -1;
wpa_printf(MSG_DEBUG, "NDIS: Adapter description prefix '%s'",
drv->adapter_desc);
return 0;
#endif /* CONFIG_USE_NDISUIO */
}
#if defined(CONFIG_NATIVE_WINDOWS) || defined(__CYGWIN__)
#ifndef _WIN32_WCE
/*
* These structures are undocumented for WinXP; only WinCE version is
* documented. These would be included wzcsapi.h if it were available. Some
* changes here have been needed to make the structures match with WinXP SP2.
* It is unclear whether these work with any other version.
*/
typedef struct {
LPWSTR wszGuid;
} INTF_KEY_ENTRY, *PINTF_KEY_ENTRY;
typedef struct {
DWORD dwNumIntfs;
PINTF_KEY_ENTRY pIntfs;
} INTFS_KEY_TABLE, *PINTFS_KEY_TABLE;
typedef struct {
DWORD dwDataLen;
LPBYTE pData;
} RAW_DATA, *PRAW_DATA;
typedef struct {
LPWSTR wszGuid;
LPWSTR wszDescr;
ULONG ulMediaState;
ULONG ulMediaType;
ULONG ulPhysicalMediaType;
INT nInfraMode;
INT nAuthMode;
INT nWepStatus;
#ifndef _WIN32_WCE
u8 pad[2]; /* why is this needed? */
#endif /* _WIN32_WCE */
DWORD dwCtlFlags;
DWORD dwCapabilities; /* something added for WinXP SP2(?) */
RAW_DATA rdSSID;
RAW_DATA rdBSSID;
RAW_DATA rdBSSIDList;
RAW_DATA rdStSSIDList;
RAW_DATA rdCtrlData;
#ifdef UNDER_CE
BOOL bInitialized;
#endif
DWORD nWPAMCastCipher;
/* add some extra buffer for later additions since this interface is
* far from stable */
u8 later_additions[100];
} INTF_ENTRY, *PINTF_ENTRY;
#define INTF_ALL 0xffffffff
#define INTF_ALL_FLAGS 0x0000ffff
#define INTF_CTLFLAGS 0x00000010
#define INTFCTL_ENABLED 0x8000
#endif /* _WIN32_WCE */
#ifdef _WIN32_WCE
static int wpa_driver_ndis_rebind_adapter(struct wpa_driver_ndis_data *drv)
{
HANDLE ndis;
TCHAR multi[100];
int len;
len = _tcslen(drv->adapter_name);
if (len > 80)
return -1;
ndis = CreateFile(DD_NDIS_DEVICE_NAME, GENERIC_READ | GENERIC_WRITE,
0, NULL, OPEN_EXISTING, 0, NULL);
if (ndis == INVALID_HANDLE_VALUE) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to open file to NDIS "
"device: %d", (int) GetLastError());
return -1;
}
len++;
memcpy(multi, drv->adapter_name, len * sizeof(TCHAR));
memcpy(&multi[len], TEXT("NDISUIO\0"), 9 * sizeof(TCHAR));
len += 9;
if (!DeviceIoControl(ndis, IOCTL_NDIS_REBIND_ADAPTER,
multi, len * sizeof(TCHAR), NULL, 0, NULL, NULL))
{
wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDIS_REBIND_ADAPTER "
"failed: 0x%x", (int) GetLastError());
wpa_hexdump_ascii(MSG_DEBUG, "NDIS: rebind multi_sz",
(u8 *) multi, len * sizeof(TCHAR));
CloseHandle(ndis);
return -1;
}
CloseHandle(ndis);
wpa_printf(MSG_DEBUG, "NDIS: Requested NDIS rebind of NDISUIO "
"protocol");
return 0;
}
#endif /* _WIN32_WCE */
static int wpa_driver_ndis_set_wzc(struct wpa_driver_ndis_data *drv,
int enable)
{
#ifdef _WIN32_WCE
HKEY hk, hk2;
LONG ret;
DWORD i, hnd, len;
TCHAR keyname[256], devname[256];
#define WZC_DRIVER TEXT("Drivers\\BuiltIn\\ZeroConfig")
if (enable) {
HANDLE h;
h = ActivateDeviceEx(WZC_DRIVER, NULL, 0, NULL);
if (h == INVALID_HANDLE_VALUE || h == 0) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to re-enable WZC "
"- ActivateDeviceEx failed: %d",
(int) GetLastError());
return -1;
}
wpa_printf(MSG_DEBUG, "NDIS: WZC re-enabled");
return wpa_driver_ndis_rebind_adapter(drv);
}
/*
* Unfortunately, just disabling the WZC for an interface is not enough
* to free NDISUIO for us, so need to disable and unload WZC completely
* for now when using WinCE with NDISUIO. In addition, must request
* NDISUIO protocol to be rebound to the adapter in order to free the
* NDISUIO binding that WZC hold before us.
*/
/* Enumerate HKLM\Drivers\Active\* to find a handle to WZC. */
ret = RegOpenKeyEx(HKEY_LOCAL_MACHINE, DEVLOAD_ACTIVE_KEY, 0, 0, &hk);
if (ret != ERROR_SUCCESS) {
wpa_printf(MSG_DEBUG, "NDIS: RegOpenKeyEx(DEVLOAD_ACTIVE_KEY) "
"failed: %d %d", (int) ret, (int) GetLastError());
return -1;
}
for (i = 0; ; i++) {
len = sizeof(keyname);
ret = RegEnumKeyEx(hk, i, keyname, &len, NULL, NULL, NULL,
NULL);
if (ret != ERROR_SUCCESS) {
wpa_printf(MSG_DEBUG, "NDIS: Could not find active "
"WZC - assuming it is not running.");
RegCloseKey(hk);
return -1;
}
ret = RegOpenKeyEx(hk, keyname, 0, 0, &hk2);
if (ret != ERROR_SUCCESS) {
wpa_printf(MSG_DEBUG, "NDIS: RegOpenKeyEx(active dev) "
"failed: %d %d",
(int) ret, (int) GetLastError());
continue;
}
len = sizeof(devname);
ret = RegQueryValueEx(hk2, DEVLOAD_DEVKEY_VALNAME, NULL, NULL,
(LPBYTE) devname, &len);
if (ret != ERROR_SUCCESS) {
wpa_printf(MSG_DEBUG, "NDIS: RegQueryValueEx("
"DEVKEY_VALNAME) failed: %d %d",
(int) ret, (int) GetLastError());
RegCloseKey(hk2);
continue;
}
if (_tcscmp(devname, WZC_DRIVER) == 0)
break;
RegCloseKey(hk2);
}
RegCloseKey(hk);
/* Found WZC - get handle to it. */
len = sizeof(hnd);
ret = RegQueryValueEx(hk2, DEVLOAD_HANDLE_VALNAME, NULL, NULL,
(PUCHAR) &hnd, &len);
if (ret != ERROR_SUCCESS) {
wpa_printf(MSG_DEBUG, "NDIS: RegQueryValueEx(HANDLE_VALNAME) "
"failed: %d %d", (int) ret, (int) GetLastError());
RegCloseKey(hk2);
return -1;
}
RegCloseKey(hk2);
/* Deactivate WZC */
if (!DeactivateDevice((HANDLE) hnd)) {
wpa_printf(MSG_DEBUG, "NDIS: DeactivateDevice failed: %d",
(int) GetLastError());
return -1;
}
wpa_printf(MSG_DEBUG, "NDIS: Disabled WZC temporarily");
drv->wzc_disabled = 1;
return wpa_driver_ndis_rebind_adapter(drv);
#else /* _WIN32_WCE */
HMODULE hm;
DWORD (WINAPI *wzc_enum_interf)(LPWSTR pSrvAddr,
PINTFS_KEY_TABLE pIntfs);
DWORD (WINAPI *wzc_query_interf)(LPWSTR pSrvAddr, DWORD dwInFlags,
PINTF_ENTRY pIntf,
LPDWORD pdwOutFlags);
DWORD (WINAPI *wzc_set_interf)(LPWSTR pSrvAddr, DWORD dwInFlags,
PINTF_ENTRY pIntf, LPDWORD pdwOutFlags);
int ret = -1, j;
DWORD res;
INTFS_KEY_TABLE guids;
INTF_ENTRY intf;
char guid[128];
WCHAR *pos;
DWORD flags, i;
hm = LoadLibrary(TEXT("wzcsapi.dll"));
if (hm == NULL) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to load wzcsapi.dll (%u) "
"- WZC probably not running",
(unsigned int) GetLastError());
return -1;
}
#ifdef _WIN32_WCE
wzc_enum_interf = (void *) GetProcAddressA(hm, "WZCEnumInterfaces");
wzc_query_interf = (void *) GetProcAddressA(hm, "WZCQueryInterface");
wzc_set_interf = (void *) GetProcAddressA(hm, "WZCSetInterface");
#else /* _WIN32_WCE */
wzc_enum_interf = (void *) GetProcAddress(hm, "WZCEnumInterfaces");
wzc_query_interf = (void *) GetProcAddress(hm, "WZCQueryInterface");
wzc_set_interf = (void *) GetProcAddress(hm, "WZCSetInterface");
#endif /* _WIN32_WCE */
if (wzc_enum_interf == NULL || wzc_query_interf == NULL ||
wzc_set_interf == NULL) {
wpa_printf(MSG_DEBUG, "NDIS: WZCEnumInterfaces, "
"WZCQueryInterface, or WZCSetInterface not found "
"in wzcsapi.dll");
goto fail;
}
os_memset(&guids, 0, sizeof(guids));
res = wzc_enum_interf(NULL, &guids);
if (res != 0) {
wpa_printf(MSG_DEBUG, "NDIS: WZCEnumInterfaces failed: %d; "
"WZC service is apparently not running",
(int) res);
goto fail;
}
wpa_printf(MSG_DEBUG, "NDIS: WZCEnumInterfaces: %d interfaces",
(int) guids.dwNumIntfs);
for (i = 0; i < guids.dwNumIntfs; i++) {
pos = guids.pIntfs[i].wszGuid;
for (j = 0; j < sizeof(guid); j++) {
guid[j] = (char) *pos;
if (*pos == 0)
break;
pos++;
}
guid[sizeof(guid) - 1] = '\0';
wpa_printf(MSG_DEBUG, "NDIS: intfs %d GUID '%s'",
(int) i, guid);
if (os_strstr(drv->ifname, guid) == NULL)
continue;
wpa_printf(MSG_DEBUG, "NDIS: Current interface found from "
"WZC");
break;
}
if (i >= guids.dwNumIntfs) {
wpa_printf(MSG_DEBUG, "NDIS: Current interface not found from "
"WZC");
goto fail;
}
os_memset(&intf, 0, sizeof(intf));
intf.wszGuid = guids.pIntfs[i].wszGuid;
/* Set flags to verify that the structure has not changed. */
intf.dwCtlFlags = -1;
flags = 0;
res = wzc_query_interf(NULL, INTFCTL_ENABLED, &intf, &flags);
if (res != 0) {
wpa_printf(MSG_DEBUG, "NDIS: Could not query flags for the "
"WZC interface: %d (0x%x)",
(int) res, (int) res);
wpa_printf(MSG_DEBUG, "NDIS: GetLastError: %u",
(unsigned int) GetLastError());
goto fail;
}
wpa_printf(MSG_DEBUG, "NDIS: WZC interface flags 0x%x dwCtlFlags 0x%x",
(int) flags, (int) intf.dwCtlFlags);
if (intf.dwCtlFlags == -1) {
wpa_printf(MSG_DEBUG, "NDIS: Looks like wzcsapi has changed "
"again - could not disable WZC");
wpa_hexdump(MSG_MSGDUMP, "NDIS: intf",
(u8 *) &intf, sizeof(intf));
goto fail;
}
if (enable) {
if (!(intf.dwCtlFlags & INTFCTL_ENABLED)) {
wpa_printf(MSG_DEBUG, "NDIS: Enabling WZC for this "
"interface");
intf.dwCtlFlags |= INTFCTL_ENABLED;
res = wzc_set_interf(NULL, INTFCTL_ENABLED, &intf,
&flags);
if (res != 0) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to enable "
"WZC: %d (0x%x)",
(int) res, (int) res);
wpa_printf(MSG_DEBUG, "NDIS: GetLastError: %u",
(unsigned int) GetLastError());
goto fail;
}
wpa_printf(MSG_DEBUG, "NDIS: Re-enabled WZC for this "
"interface");
drv->wzc_disabled = 0;
}
} else {
if (intf.dwCtlFlags & INTFCTL_ENABLED) {
wpa_printf(MSG_DEBUG, "NDIS: Disabling WZC for this "
"interface");
intf.dwCtlFlags &= ~INTFCTL_ENABLED;
res = wzc_set_interf(NULL, INTFCTL_ENABLED, &intf,
&flags);
if (res != 0) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to "
"disable WZC: %d (0x%x)",
(int) res, (int) res);
wpa_printf(MSG_DEBUG, "NDIS: GetLastError: %u",
(unsigned int) GetLastError());
goto fail;
}
wpa_printf(MSG_DEBUG, "NDIS: Disabled WZC temporarily "
"for this interface");
drv->wzc_disabled = 1;
} else {
wpa_printf(MSG_DEBUG, "NDIS: WZC was not enabled for "
"this interface");
}
}
ret = 0;
fail:
FreeLibrary(hm);
return ret;
#endif /* _WIN32_WCE */
}
#else /* CONFIG_NATIVE_WINDOWS || __CYGWIN__ */
static int wpa_driver_ndis_set_wzc(struct wpa_driver_ndis_data *drv,
int enable)
{
return 0;
}
#endif /* CONFIG_NATIVE_WINDOWS || __CYGWIN__ */
#ifdef CONFIG_USE_NDISUIO
/*
* l2_packet_ndis.c is sharing the same handle to NDISUIO, so we must be able
* to export this handle. This is somewhat ugly, but there is no better
* mechanism available to pass data from driver interface to l2_packet wrapper.
*/
static HANDLE driver_ndis_ndisuio_handle = INVALID_HANDLE_VALUE;
HANDLE driver_ndis_get_ndisuio_handle(void)
{
return driver_ndis_ndisuio_handle;
}
#endif /* CONFIG_USE_NDISUIO */
static int wpa_driver_ndis_adapter_init(struct wpa_driver_ndis_data *drv)
{
#ifdef CONFIG_USE_NDISUIO
#ifndef _WIN32_WCE
#define NDISUIO_DEVICE_NAME TEXT("\\\\.\\\\Ndisuio")
DWORD written;
#endif /* _WIN32_WCE */
drv->ndisuio = CreateFile(NDISUIO_DEVICE_NAME,
GENERIC_READ | GENERIC_WRITE, 0, NULL,
OPEN_EXISTING,
FILE_ATTRIBUTE_NORMAL | FILE_FLAG_OVERLAPPED,
INVALID_HANDLE_VALUE);
if (drv->ndisuio == INVALID_HANDLE_VALUE) {
wpa_printf(MSG_ERROR, "NDIS: Failed to open connection to "
"NDISUIO: %d", (int) GetLastError());
return -1;
}
driver_ndis_ndisuio_handle = drv->ndisuio;
#ifndef _WIN32_WCE
if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_BIND_WAIT, NULL, 0,
NULL, 0, &written, NULL)) {
wpa_printf(MSG_ERROR, "NDIS: IOCTL_NDISUIO_BIND_WAIT failed: "
"%d", (int) GetLastError());
CloseHandle(drv->ndisuio);
drv->ndisuio = INVALID_HANDLE_VALUE;
return -1;
}
#endif /* _WIN32_WCE */
return 0;
#else /* CONFIG_USE_NDISUIO */
return 0;
#endif /* CONFIG_USE_NDISUIO */
}
static int wpa_driver_ndis_adapter_open(struct wpa_driver_ndis_data *drv)
{
#ifdef CONFIG_USE_NDISUIO
DWORD written;
#define MAX_NDIS_DEVICE_NAME_LEN 256
WCHAR ifname[MAX_NDIS_DEVICE_NAME_LEN];
size_t len, i, pos;
const char *prefix = "\\DEVICE\\";
#ifdef _WIN32_WCE
pos = 0;
#else /* _WIN32_WCE */
pos = 8;
#endif /* _WIN32_WCE */
len = pos + os_strlen(drv->ifname);
if (len >= MAX_NDIS_DEVICE_NAME_LEN)
return -1;
for (i = 0; i < pos; i++)
ifname[i] = (WCHAR) prefix[i];
for (i = pos; i < len; i++)
ifname[i] = (WCHAR) drv->ifname[i - pos];
ifname[i] = L'\0';
if (!DeviceIoControl(drv->ndisuio, IOCTL_NDISUIO_OPEN_DEVICE,
ifname, len * sizeof(WCHAR), NULL, 0, &written,
NULL)) {
wpa_printf(MSG_ERROR, "NDIS: IOCTL_NDISUIO_OPEN_DEVICE "
"failed: %d", (int) GetLastError());
wpa_hexdump_ascii(MSG_DEBUG, "NDIS: ifname",
(const u8 *) ifname, len * sizeof(WCHAR));
CloseHandle(drv->ndisuio);
drv->ndisuio = INVALID_HANDLE_VALUE;
return -1;
}
wpa_printf(MSG_DEBUG, "NDIS: Opened NDISUIO device successfully");
return 0;
#else /* CONFIG_USE_NDISUIO */
char ifname[128];
os_snprintf(ifname, sizeof(ifname), "\\Device\\NPF_%s", drv->ifname);
drv->adapter = PacketOpenAdapter(ifname);
if (drv->adapter == NULL) {
wpa_printf(MSG_DEBUG, "NDIS: PacketOpenAdapter failed for "
"'%s'", ifname);
return -1;
}
return 0;
#endif /* CONFIG_USE_NDISUIO */
}
static void wpa_driver_ndis_adapter_close(struct wpa_driver_ndis_data *drv)
{
#ifdef CONFIG_USE_NDISUIO
driver_ndis_ndisuio_handle = INVALID_HANDLE_VALUE;
if (drv->ndisuio != INVALID_HANDLE_VALUE)
CloseHandle(drv->ndisuio);
#else /* CONFIG_USE_NDISUIO */
if (drv->adapter)
PacketCloseAdapter(drv->adapter);
#endif /* CONFIG_USE_NDISUIO */
}
static void * wpa_driver_ndis_init(void *ctx, const char *ifname)
{
struct wpa_driver_ndis_data *drv;
u32 mode;
drv = os_zalloc(sizeof(*drv));
if (drv == NULL)
return NULL;
drv->ctx = ctx;
/*
* Compatibility code to strip possible prefix from the GUID. Previous
* versions include \Device\NPF_ prefix for all names, but the internal
* interface name is now only the GUI. Both Packet32 and NDISUIO
* prefixes are supported.
*/
if (os_strncmp(ifname, "\\Device\\NPF_", 12) == 0)
ifname += 12;
else if (os_strncmp(ifname, "\\DEVICE\\", 8) == 0)
ifname += 8;
os_strncpy(drv->ifname, ifname, sizeof(drv->ifname));
if (wpa_driver_ndis_adapter_init(drv) < 0) {
os_free(drv);
return NULL;
}
if (wpa_driver_ndis_get_names(drv) < 0) {
wpa_driver_ndis_adapter_close(drv);
os_free(drv);
return NULL;
}
wpa_driver_ndis_set_wzc(drv, 0);
if (wpa_driver_ndis_adapter_open(drv) < 0) {
wpa_driver_ndis_adapter_close(drv);
os_free(drv);
return NULL;
}
if (ndis_get_oid(drv, OID_802_3_CURRENT_ADDRESS,
drv->own_addr, ETH_ALEN) < 0) {
wpa_printf(MSG_DEBUG, "NDIS: Get OID_802_3_CURRENT_ADDRESS "
"failed");
wpa_driver_ndis_adapter_close(drv);
os_free(drv);
return NULL;
}
wpa_driver_ndis_get_capability(drv);
/* Make sure that the driver does not have any obsolete PMKID entries.
*/
wpa_driver_ndis_flush_pmkid(drv);
eloop_register_timeout(1, 0, wpa_driver_ndis_poll_timeout, drv, NULL);
#ifdef CONFIG_NDIS_EVENTS_INTEGRATED
drv->events = ndis_events_init(&drv->events_pipe, &drv->event_avail,
drv->ifname, drv->adapter_desc);
if (drv->events == NULL) {
wpa_driver_ndis_deinit(drv);
return NULL;
}
eloop_register_event(drv->event_avail, sizeof(drv->event_avail),
wpa_driver_ndis_event_pipe_cb, drv, NULL);
#endif /* CONFIG_NDIS_EVENTS_INTEGRATED */
#ifdef _WIN32_WCE
if (ndisuio_notification_init(drv) < 0) {
wpa_driver_ndis_deinit(drv);
return NULL;
}
#endif /* _WIN32_WCE */
/* Set mode here in case card was configured for ad-hoc mode
* previously. */
mode = Ndis802_11Infrastructure;
if (ndis_set_oid(drv, OID_802_11_INFRASTRUCTURE_MODE,
(char *) &mode, sizeof(mode)) < 0) {
wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
"OID_802_11_INFRASTRUCTURE_MODE (%d)",
(int) mode);
/* Try to continue anyway */
if (!drv->has_capability && drv->capa.enc == 0) {
wpa_printf(MSG_DEBUG, "NDIS: Driver did not provide "
"any wireless capabilities - assume it is "
"a wired interface");
drv->wired = 1;
}
}
return drv;
}
static void wpa_driver_ndis_deinit(void *priv)
{
struct wpa_driver_ndis_data *drv = priv;
#ifdef CONFIG_NDIS_EVENTS_INTEGRATED
if (drv->events) {
eloop_unregister_event(drv->event_avail,
sizeof(drv->event_avail));
ndis_events_deinit(drv->events);
}
#endif /* CONFIG_NDIS_EVENTS_INTEGRATED */
#ifdef _WIN32_WCE
ndisuio_notification_deinit(drv);
#endif /* _WIN32_WCE */
eloop_cancel_timeout(wpa_driver_ndis_scan_timeout, drv, drv->ctx);
eloop_cancel_timeout(wpa_driver_ndis_poll_timeout, drv, NULL);
wpa_driver_ndis_flush_pmkid(drv);
wpa_driver_ndis_disconnect(drv);
if (wpa_driver_ndis_radio_off(drv) < 0) {
wpa_printf(MSG_DEBUG, "NDIS: failed to disassociate and turn "
"radio off");
}
wpa_driver_ndis_adapter_close(drv);
if (drv->wzc_disabled)
wpa_driver_ndis_set_wzc(drv, 1);
#ifdef _WIN32_WCE
os_free(drv->adapter_name);
#endif /* _WIN32_WCE */
os_free(drv->adapter_desc);
os_free(drv);
}
const struct wpa_driver_ops wpa_driver_ndis_ops = {
"ndis",
"Windows NDIS driver",
wpa_driver_ndis_get_bssid,
wpa_driver_ndis_get_ssid,
wpa_driver_ndis_set_wpa,
wpa_driver_ndis_set_key,
wpa_driver_ndis_init,
wpa_driver_ndis_deinit,
NULL /* set_param */,
NULL /* set_countermeasures */,
NULL /* set_drop_unencrypted */,
wpa_driver_ndis_scan,
wpa_driver_ndis_get_scan_results,
wpa_driver_ndis_deauthenticate,
wpa_driver_ndis_disassociate,
wpa_driver_ndis_associate,
NULL /* set_auth_alg */,
wpa_driver_ndis_add_pmkid,
wpa_driver_ndis_remove_pmkid,
wpa_driver_ndis_flush_pmkid,
wpa_driver_ndis_get_capa,
wpa_driver_ndis_poll,
wpa_driver_ndis_get_ifname,
wpa_driver_ndis_get_mac_addr,
NULL /* send_eapol */,
NULL /* set_operstate */,
NULL /* mlme_setprotection */,
NULL /* get_hw_feature_data */,
NULL /* set_channel */,
NULL /* set_ssid */,
NULL /* set_bssid */,
NULL /* send_mlme */,
NULL /* mlme_add_sta */,
NULL /* mlme_remove_sta */
};
Jump to Line
Something went wrong with that request. Please try again.