mirror of
https://github.com/OpenIntelWireless/itlwm.git
synced 2025-05-15 23:02:24 +00:00
993 lines
29 KiB
C
993 lines
29 KiB
C
/*
|
|
* Copyright (C) 2020 钟先耀
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*/
|
|
/* $OpenBSD: ieee80211_ioctl.c,v 1.75 2019/09/02 12:54:21 stsp Exp $ */
|
|
/* $NetBSD: ieee80211_ioctl.c,v 1.15 2004/05/06 02:58:16 dyoung Exp $ */
|
|
|
|
/*-
|
|
* Copyright (c) 2001 Atsushi Onoe
|
|
* Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
/*
|
|
* IEEE 802.11 ioctl support
|
|
*/
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/kernel.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/sockio.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/endian.h>
|
|
#include <sys/tree.h>
|
|
|
|
#include <net/if.h>
|
|
#include <net/if_media.h>
|
|
|
|
#include <netinet/in.h>
|
|
#include <netinet/if_ether.h>
|
|
|
|
#include <net80211/ieee80211_var.h>
|
|
#include <net80211/ieee80211_crypto.h>
|
|
#include <net80211/ieee80211_ioctl.h>
|
|
|
|
void ieee80211_node2req(struct ieee80211com *,
|
|
const struct ieee80211_node *, struct ieee80211_nodereq *);
|
|
void ieee80211_req2node(struct ieee80211com *,
|
|
const struct ieee80211_nodereq *, struct ieee80211_node *);
|
|
|
|
static int kernel_copyin(const user_addr_t dest, void *src, size_t len)
|
|
{
|
|
memcpy(src, (void *)dest, len);
|
|
return 0;
|
|
}
|
|
|
|
static int kernel_copyout(void *src, const user_addr_t dest, size_t len)
|
|
{
|
|
memcpy((void *)dest, src, len);
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
ieee80211_node2req(struct ieee80211com *ic, const struct ieee80211_node *ni,
|
|
struct ieee80211_nodereq *nr)
|
|
{
|
|
uint8_t rssi;
|
|
|
|
memset(nr, 0, sizeof(*nr));
|
|
|
|
strlcpy(nr->nr_ifname, ic->ic_if.if_xname, sizeof(nr->nr_ifname));
|
|
|
|
/* Node address and name information */
|
|
IEEE80211_ADDR_COPY(nr->nr_macaddr, ni->ni_macaddr);
|
|
IEEE80211_ADDR_COPY(nr->nr_bssid, ni->ni_bssid);
|
|
nr->nr_nwid_len = ni->ni_esslen;
|
|
bcopy(ni->ni_essid, nr->nr_nwid, IEEE80211_NWID_LEN);
|
|
|
|
/* Channel and rates */
|
|
nr->nr_channel = ieee80211_chan2ieee(ic, ni->ni_chan);
|
|
if (ni->ni_chan != IEEE80211_CHAN_ANYC)
|
|
nr->nr_chan_flags = ni->ni_chan->ic_flags;
|
|
if (ic->ic_curmode != IEEE80211_MODE_11N)
|
|
nr->nr_chan_flags &= ~IEEE80211_CHAN_HT;
|
|
nr->nr_nrates = ni->ni_rates.rs_nrates;
|
|
bcopy(ni->ni_rates.rs_rates, nr->nr_rates, IEEE80211_RATE_MAXSIZE);
|
|
|
|
/* Node status information */
|
|
rssi = (*ic->ic_node_getrssi)(ic, ni);
|
|
if (ic->ic_max_rssi) {
|
|
/* Driver reports RSSI relative to ic_max_rssi. */
|
|
nr->nr_rssi = rssi;
|
|
} else {
|
|
/*
|
|
* Driver reports RSSI value in dBm.
|
|
* Convert from unsigned to signed.
|
|
* Some drivers report a negative value, some don't.
|
|
* Reasonable range is -20dBm to -80dBm.
|
|
*/
|
|
nr->nr_rssi = (rssi < 128) ? -rssi : rssi;
|
|
}
|
|
nr->nr_max_rssi = ic->ic_max_rssi;
|
|
bcopy(ni->ni_tstamp, nr->nr_tstamp, sizeof(nr->nr_tstamp));
|
|
nr->nr_intval = ni->ni_intval;
|
|
nr->nr_capinfo = ni->ni_capinfo;
|
|
nr->nr_erp = ni->ni_erp;
|
|
nr->nr_pwrsave = ni->ni_pwrsave;
|
|
nr->nr_associd = ni->ni_associd;
|
|
nr->nr_txseq = ni->ni_txseq;
|
|
nr->nr_rxseq = ni->ni_rxseq;
|
|
nr->nr_fails = ni->ni_fails;
|
|
nr->nr_assoc_fail = ni->ni_assoc_fail; /* flag values are the same */
|
|
nr->nr_inact = ni->ni_inact;
|
|
nr->nr_txrate = ni->ni_txrate;
|
|
nr->nr_state = ni->ni_state;
|
|
|
|
/* RSN */
|
|
nr->nr_rsnciphers = ni->ni_rsnciphers;
|
|
nr->nr_rsnakms = 0;
|
|
nr->nr_rsnprotos = 0;
|
|
if (ni->ni_supported_rsnprotos & IEEE80211_PROTO_RSN)
|
|
nr->nr_rsnprotos |= IEEE80211_WPA_PROTO_WPA2;
|
|
if (ni->ni_supported_rsnprotos & IEEE80211_PROTO_WPA)
|
|
nr->nr_rsnprotos |= IEEE80211_WPA_PROTO_WPA1;
|
|
if (ni->ni_supported_rsnakms & IEEE80211_AKM_8021X)
|
|
nr->nr_rsnakms |= IEEE80211_WPA_AKM_8021X;
|
|
if (ni->ni_supported_rsnakms & IEEE80211_AKM_PSK)
|
|
nr->nr_rsnakms |= IEEE80211_WPA_AKM_PSK;
|
|
if (ni->ni_supported_rsnakms & IEEE80211_AKM_SHA256_8021X)
|
|
nr->nr_rsnakms |= IEEE80211_WPA_AKM_SHA256_8021X;
|
|
if (ni->ni_supported_rsnakms & IEEE80211_AKM_SHA256_PSK)
|
|
nr->nr_rsnakms |= IEEE80211_WPA_AKM_SHA256_PSK;
|
|
|
|
/* Node flags */
|
|
nr->nr_flags = 0;
|
|
if (bcmp(nr->nr_macaddr, nr->nr_bssid, IEEE80211_ADDR_LEN) == 0)
|
|
nr->nr_flags |= IEEE80211_NODEREQ_AP;
|
|
if (ni == ic->ic_bss)
|
|
nr->nr_flags |= IEEE80211_NODEREQ_AP_BSS;
|
|
|
|
/* HT */
|
|
nr->nr_htcaps = ni->ni_htcaps;
|
|
memcpy(nr->nr_rxmcs, ni->ni_rxmcs, sizeof(nr->nr_rxmcs));
|
|
nr->nr_max_rxrate = ni->ni_max_rxrate;
|
|
nr->nr_tx_mcs_set = ni->ni_tx_mcs_set;
|
|
if (ni->ni_flags & IEEE80211_NODE_HT)
|
|
nr->nr_flags |= IEEE80211_NODEREQ_HT;
|
|
|
|
/* HT / VHT */
|
|
nr->nr_txmcs = ni->ni_txmcs;
|
|
|
|
/* VHT */
|
|
nr->nr_vht_ss = ni->ni_vht_ss;
|
|
if (ni->ni_flags & IEEE80211_NODE_VHT)
|
|
nr->nr_flags |= IEEE80211_NODEREQ_VHT;
|
|
}
|
|
|
|
void
|
|
ieee80211_req2node(struct ieee80211com *ic, const struct ieee80211_nodereq *nr,
|
|
struct ieee80211_node *ni)
|
|
{
|
|
/* Node address and name information */
|
|
IEEE80211_ADDR_COPY(ni->ni_macaddr, nr->nr_macaddr);
|
|
IEEE80211_ADDR_COPY(ni->ni_bssid, nr->nr_bssid);
|
|
ni->ni_esslen = nr->nr_nwid_len;
|
|
bcopy(nr->nr_nwid, ni->ni_essid, IEEE80211_NWID_LEN);
|
|
|
|
/* Rates */
|
|
ni->ni_rates.rs_nrates = nr->nr_nrates;
|
|
bcopy(nr->nr_rates, ni->ni_rates.rs_rates, IEEE80211_RATE_MAXSIZE);
|
|
|
|
/* Node information */
|
|
ni->ni_intval = nr->nr_intval;
|
|
ni->ni_capinfo = nr->nr_capinfo;
|
|
ni->ni_erp = nr->nr_erp;
|
|
ni->ni_pwrsave = nr->nr_pwrsave;
|
|
ni->ni_associd = nr->nr_associd;
|
|
ni->ni_txseq = nr->nr_txseq;
|
|
ni->ni_rxseq = nr->nr_rxseq;
|
|
ni->ni_fails = nr->nr_fails;
|
|
ni->ni_inact = nr->nr_inact;
|
|
ni->ni_txrate = nr->nr_txrate;
|
|
ni->ni_state = nr->nr_state;
|
|
}
|
|
|
|
void
|
|
ieee80211_disable_wep(struct ieee80211com *ic)
|
|
{
|
|
struct ieee80211_key *k;
|
|
int i;
|
|
|
|
for (i = 0; i < IEEE80211_WEP_NKID; i++) {
|
|
k = &ic->ic_nw_keys[i];
|
|
if (k->k_cipher != IEEE80211_CIPHER_NONE)
|
|
(*ic->ic_delete_key)(ic, NULL, k);
|
|
memset(k, 0, sizeof(*k));
|
|
}
|
|
ic->ic_flags &= ~IEEE80211_F_WEPON;
|
|
}
|
|
|
|
void
|
|
ieee80211_disable_rsn(struct ieee80211com *ic)
|
|
{
|
|
ic->ic_flags &= ~(IEEE80211_F_PSK | IEEE80211_F_RSNON);
|
|
memset(ic->ic_psk, 0, sizeof(ic->ic_psk));
|
|
ic->ic_rsnprotos = 0;
|
|
ic->ic_rsnakms = 0;
|
|
ic->ic_rsngroupcipher = (enum ieee80211_cipher)0;
|
|
ic->ic_rsnciphers = 0;
|
|
}
|
|
|
|
/* Keep in sync with ieee80211_node.c:ieee80211_ess_setnwkeys() */
|
|
int
|
|
ieee80211_ioctl_setnwkeys(struct ieee80211com *ic,
|
|
const struct ieee80211_nwkey *nwkey)
|
|
{
|
|
XYLog("%s\n", __FUNCTION__);
|
|
struct ieee80211_key *k;
|
|
int error, i;
|
|
|
|
if (!(ic->ic_caps & IEEE80211_C_WEP))
|
|
return ENODEV;
|
|
|
|
if (nwkey->i_wepon == IEEE80211_NWKEY_OPEN) {
|
|
if (!(ic->ic_flags & IEEE80211_F_WEPON))
|
|
return 0;
|
|
ic->ic_flags &= ~IEEE80211_F_WEPON;
|
|
return ENETRESET;
|
|
}
|
|
if (nwkey->i_defkid < 1 || nwkey->i_defkid > IEEE80211_WEP_NKID)
|
|
return EINVAL;
|
|
|
|
for (i = 0; i < IEEE80211_WEP_NKID; i++) {
|
|
if (nwkey->i_key[i].i_keylen == 0 ||
|
|
nwkey->i_key[i].i_keydat == NULL)
|
|
continue; /* entry not set */
|
|
if (nwkey->i_key[i].i_keylen > IEEE80211_KEYBUF_SIZE)
|
|
return EINVAL;
|
|
|
|
/* map wep key to ieee80211_key */
|
|
k = &ic->ic_nw_keys[i];
|
|
if (k->k_cipher != IEEE80211_CIPHER_NONE)
|
|
(*ic->ic_delete_key)(ic, NULL, k);
|
|
memset(k, 0, sizeof(*k));
|
|
if (nwkey->i_key[i].i_keylen <= 5)
|
|
k->k_cipher = IEEE80211_CIPHER_WEP40;
|
|
else
|
|
k->k_cipher = IEEE80211_CIPHER_WEP104;
|
|
k->k_len = ieee80211_cipher_keylen(k->k_cipher);
|
|
k->k_flags = IEEE80211_KEY_GROUP | IEEE80211_KEY_TX;
|
|
error = kernel_copyin((const user_addr_t)nwkey->i_key[i].i_keydat, k->k_key, k->k_len);
|
|
if (error != 0)
|
|
return error;
|
|
error = (*ic->ic_set_key)(ic, NULL, k);
|
|
switch (error) {
|
|
case 0:
|
|
case EBUSY:
|
|
break;
|
|
default:
|
|
return error;
|
|
}
|
|
}
|
|
|
|
ic->ic_def_txkey = nwkey->i_defkid - 1;
|
|
ic->ic_flags |= IEEE80211_F_WEPON;
|
|
if (ic->ic_flags & IEEE80211_F_RSNON)
|
|
ieee80211_disable_rsn(ic);
|
|
|
|
return ENETRESET;
|
|
}
|
|
|
|
static int
|
|
ieee80211_ioctl_getnwkeys(struct ieee80211com *ic,
|
|
struct ieee80211_nwkey *nwkey)
|
|
{
|
|
int i;
|
|
|
|
if (ic->ic_flags & IEEE80211_F_WEPON)
|
|
nwkey->i_wepon = IEEE80211_NWKEY_WEP;
|
|
else
|
|
nwkey->i_wepon = IEEE80211_NWKEY_OPEN;
|
|
|
|
nwkey->i_defkid = ic->ic_wep_txkey + 1;
|
|
|
|
for (i = 0; i < IEEE80211_WEP_NKID; i++) {
|
|
if (nwkey->i_key[i].i_keydat == NULL)
|
|
continue;
|
|
/* do not show any keys to userland */
|
|
return EPERM;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/* Keep in sync with ieee80211_node.c:ieee80211_ess_setwpaparms() */
|
|
int
|
|
ieee80211_ioctl_setwpaparms(struct ieee80211com *ic,
|
|
const struct ieee80211_wpaparams *wpa)
|
|
{
|
|
if (!(ic->ic_caps & IEEE80211_C_RSN))
|
|
return ENODEV;
|
|
|
|
if (!wpa->i_enabled) {
|
|
if (!(ic->ic_flags & IEEE80211_F_RSNON))
|
|
return 0;
|
|
ic->ic_flags &= ~IEEE80211_F_RSNON;
|
|
ic->ic_rsnprotos = 0;
|
|
ic->ic_rsnakms = 0;
|
|
ic->ic_rsngroupcipher = (enum ieee80211_cipher)0;
|
|
ic->ic_rsnciphers = 0;
|
|
return ENETRESET;
|
|
}
|
|
|
|
ic->ic_rsnprotos = 0;
|
|
if (wpa->i_protos & IEEE80211_WPA_PROTO_WPA1)
|
|
ic->ic_rsnprotos |= IEEE80211_PROTO_WPA;
|
|
if (wpa->i_protos & IEEE80211_WPA_PROTO_WPA2)
|
|
ic->ic_rsnprotos |= IEEE80211_PROTO_RSN;
|
|
if (ic->ic_rsnprotos == 0) /* set to default (RSN) */
|
|
ic->ic_rsnprotos = IEEE80211_PROTO_RSN;
|
|
|
|
ic->ic_rsnakms = 0;
|
|
if (wpa->i_akms & IEEE80211_WPA_AKM_PSK)
|
|
ic->ic_rsnakms |= IEEE80211_AKM_PSK;
|
|
if (wpa->i_akms & IEEE80211_WPA_AKM_SHA256_PSK)
|
|
ic->ic_rsnakms |= IEEE80211_AKM_SHA256_PSK;
|
|
if (wpa->i_akms & IEEE80211_WPA_AKM_8021X)
|
|
ic->ic_rsnakms |= IEEE80211_AKM_8021X;
|
|
if (wpa->i_akms & IEEE80211_WPA_AKM_SHA256_8021X)
|
|
ic->ic_rsnakms |= IEEE80211_AKM_SHA256_8021X;
|
|
if (ic->ic_rsnakms == 0) /* set to default (PSK) */
|
|
ic->ic_rsnakms = IEEE80211_AKM_PSK;
|
|
|
|
if (wpa->i_groupcipher == IEEE80211_WPA_CIPHER_WEP40)
|
|
ic->ic_rsngroupcipher = IEEE80211_CIPHER_WEP40;
|
|
else if (wpa->i_groupcipher == IEEE80211_WPA_CIPHER_TKIP)
|
|
ic->ic_rsngroupcipher = IEEE80211_CIPHER_TKIP;
|
|
else if (wpa->i_groupcipher == IEEE80211_WPA_CIPHER_CCMP)
|
|
ic->ic_rsngroupcipher = IEEE80211_CIPHER_CCMP;
|
|
else if (wpa->i_groupcipher == IEEE80211_WPA_CIPHER_WEP104)
|
|
ic->ic_rsngroupcipher = IEEE80211_CIPHER_WEP104;
|
|
else { /* set to default */
|
|
if (ic->ic_rsnprotos & IEEE80211_PROTO_WPA)
|
|
ic->ic_rsngroupcipher = IEEE80211_CIPHER_TKIP;
|
|
else
|
|
ic->ic_rsngroupcipher = IEEE80211_CIPHER_CCMP;
|
|
}
|
|
|
|
ic->ic_rsnciphers = 0;
|
|
if (wpa->i_ciphers & IEEE80211_WPA_CIPHER_TKIP)
|
|
ic->ic_rsnciphers |= IEEE80211_CIPHER_TKIP;
|
|
if (wpa->i_ciphers & IEEE80211_WPA_CIPHER_CCMP)
|
|
ic->ic_rsnciphers |= IEEE80211_CIPHER_CCMP;
|
|
if (wpa->i_ciphers & IEEE80211_WPA_CIPHER_USEGROUP)
|
|
ic->ic_rsnciphers = IEEE80211_CIPHER_USEGROUP;
|
|
if (ic->ic_rsnciphers == 0) { /* set to default (CCMP, TKIP if WPA1) */
|
|
ic->ic_rsnciphers = IEEE80211_CIPHER_CCMP;
|
|
if (ic->ic_rsnprotos & IEEE80211_PROTO_WPA)
|
|
ic->ic_rsnciphers |= IEEE80211_CIPHER_TKIP;
|
|
}
|
|
|
|
ic->ic_flags |= IEEE80211_F_RSNON;
|
|
|
|
return ENETRESET;
|
|
}
|
|
|
|
int
|
|
ieee80211_ioctl_getwpaparms(struct ieee80211com *ic,
|
|
struct ieee80211_wpaparams *wpa)
|
|
{
|
|
wpa->i_enabled = (ic->ic_flags & IEEE80211_F_RSNON) ? 1 : 0;
|
|
|
|
wpa->i_protos = 0;
|
|
if (ic->ic_rsnprotos & IEEE80211_PROTO_WPA)
|
|
wpa->i_protos |= IEEE80211_WPA_PROTO_WPA1;
|
|
if (ic->ic_rsnprotos & IEEE80211_PROTO_RSN)
|
|
wpa->i_protos |= IEEE80211_WPA_PROTO_WPA2;
|
|
|
|
wpa->i_akms = 0;
|
|
if (ic->ic_rsnakms & IEEE80211_AKM_PSK)
|
|
wpa->i_akms |= IEEE80211_WPA_AKM_PSK;
|
|
if (ic->ic_rsnakms & IEEE80211_AKM_SHA256_PSK)
|
|
wpa->i_akms |= IEEE80211_WPA_AKM_SHA256_PSK;
|
|
if (ic->ic_rsnakms & IEEE80211_AKM_8021X)
|
|
wpa->i_akms |= IEEE80211_WPA_AKM_8021X;
|
|
if (ic->ic_rsnakms & IEEE80211_AKM_SHA256_8021X)
|
|
wpa->i_akms |= IEEE80211_WPA_AKM_SHA256_8021X;
|
|
|
|
if (ic->ic_rsngroupcipher == IEEE80211_CIPHER_WEP40)
|
|
wpa->i_groupcipher = IEEE80211_WPA_CIPHER_WEP40;
|
|
else if (ic->ic_rsngroupcipher == IEEE80211_CIPHER_TKIP)
|
|
wpa->i_groupcipher = IEEE80211_WPA_CIPHER_TKIP;
|
|
else if (ic->ic_rsngroupcipher == IEEE80211_CIPHER_CCMP)
|
|
wpa->i_groupcipher = IEEE80211_WPA_CIPHER_CCMP;
|
|
else if (ic->ic_rsngroupcipher == IEEE80211_CIPHER_WEP104)
|
|
wpa->i_groupcipher = IEEE80211_WPA_CIPHER_WEP104;
|
|
else
|
|
wpa->i_groupcipher = IEEE80211_WPA_CIPHER_NONE;
|
|
|
|
wpa->i_ciphers = 0;
|
|
if (ic->ic_rsnciphers & IEEE80211_CIPHER_TKIP)
|
|
wpa->i_ciphers |= IEEE80211_WPA_CIPHER_TKIP;
|
|
if (ic->ic_rsnciphers & IEEE80211_CIPHER_CCMP)
|
|
wpa->i_ciphers |= IEEE80211_WPA_CIPHER_CCMP;
|
|
if (ic->ic_rsnciphers & IEEE80211_CIPHER_USEGROUP)
|
|
wpa->i_ciphers = IEEE80211_WPA_CIPHER_USEGROUP;
|
|
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
ieee80211_ess_getwpaparms(struct ieee80211_ess *ess,
|
|
struct ieee80211_wpaparams *wpa)
|
|
{
|
|
wpa->i_enabled = (ess->flags & IEEE80211_F_RSNON) ? 1 : 0;
|
|
|
|
wpa->i_protos = 0;
|
|
if (ess->rsnprotos & IEEE80211_PROTO_WPA)
|
|
wpa->i_protos |= IEEE80211_WPA_PROTO_WPA1;
|
|
if (ess->rsnprotos & IEEE80211_PROTO_RSN)
|
|
wpa->i_protos |= IEEE80211_WPA_PROTO_WPA2;
|
|
|
|
wpa->i_akms = 0;
|
|
if (ess->rsnakms & IEEE80211_AKM_PSK)
|
|
wpa->i_akms |= IEEE80211_WPA_AKM_PSK;
|
|
if (ess->rsnakms & IEEE80211_AKM_SHA256_PSK)
|
|
wpa->i_akms |= IEEE80211_WPA_AKM_SHA256_PSK;
|
|
if (ess->rsnakms & IEEE80211_AKM_8021X)
|
|
wpa->i_akms |= IEEE80211_WPA_AKM_8021X;
|
|
if (ess->rsnakms & IEEE80211_AKM_SHA256_8021X)
|
|
wpa->i_akms |= IEEE80211_WPA_AKM_SHA256_8021X;
|
|
|
|
if (ess->rsngroupcipher == IEEE80211_CIPHER_WEP40)
|
|
wpa->i_groupcipher = IEEE80211_WPA_CIPHER_WEP40;
|
|
else if (ess->rsngroupcipher == IEEE80211_CIPHER_TKIP)
|
|
wpa->i_groupcipher = IEEE80211_WPA_CIPHER_TKIP;
|
|
else if (ess->rsngroupcipher == IEEE80211_CIPHER_CCMP)
|
|
wpa->i_groupcipher = IEEE80211_WPA_CIPHER_CCMP;
|
|
else if (ess->rsngroupcipher == IEEE80211_CIPHER_WEP104)
|
|
wpa->i_groupcipher = IEEE80211_WPA_CIPHER_WEP104;
|
|
else
|
|
wpa->i_groupcipher = IEEE80211_WPA_CIPHER_NONE;
|
|
|
|
wpa->i_ciphers = 0;
|
|
if (ess->rsnciphers & IEEE80211_CIPHER_TKIP)
|
|
wpa->i_ciphers |= IEEE80211_WPA_CIPHER_TKIP;
|
|
if (ess->rsnciphers & IEEE80211_CIPHER_CCMP)
|
|
wpa->i_ciphers |= IEEE80211_WPA_CIPHER_CCMP;
|
|
if (ess->rsnciphers & IEEE80211_CIPHER_USEGROUP)
|
|
wpa->i_ciphers = IEEE80211_WPA_CIPHER_USEGROUP;
|
|
}
|
|
|
|
int
|
|
ieee80211_ioctl(struct _ifnet *ifp, u_long cmd, caddr_t data)
|
|
{
|
|
struct ieee80211com *ic = (struct ieee80211com *)ifp;
|
|
struct ifreq *ifr = (struct ifreq *)data;
|
|
int i, error = 0;
|
|
size_t len;
|
|
struct ieee80211_nwid nwid;
|
|
struct ieee80211_join join;
|
|
struct ieee80211_joinreq_all *ja;
|
|
struct ieee80211_ess *ess;
|
|
struct ieee80211_wpapsk *psk;
|
|
struct ieee80211_keyavail *ka;
|
|
struct ieee80211_keyrun *kr;
|
|
struct ieee80211_power *power;
|
|
struct ieee80211_bssid *bssid;
|
|
struct ieee80211chanreq *chanreq;
|
|
struct ieee80211_channel *chan;
|
|
struct ieee80211_txpower *txpower;
|
|
static const u_int8_t empty_macaddr[IEEE80211_ADDR_LEN] = {
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00
|
|
};
|
|
struct ieee80211_nodereq *nr, nrbuf;
|
|
struct ieee80211_nodereq_all *na;
|
|
struct ieee80211_node *ni;
|
|
u_int32_t flags;
|
|
|
|
switch (cmd) {
|
|
// case SIOCSIFMEDIA:
|
|
// case SIOCGIFMEDIA:
|
|
// error = ifmedia_ioctl(ifp, ifr, &ic->ic_media, cmd);
|
|
// break;
|
|
case SIOCS80211NWID:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
if ((error = kernel_copyin((const user_addr_t)ifr->ifr_data, &nwid, sizeof(nwid))) != 0)
|
|
break;
|
|
if (nwid.i_len > IEEE80211_NWID_LEN) {
|
|
error = EINVAL;
|
|
break;
|
|
}
|
|
memset(ic->ic_des_essid, 0, IEEE80211_NWID_LEN);
|
|
ic->ic_des_esslen = nwid.i_len;
|
|
memcpy(ic->ic_des_essid, nwid.i_nwid, nwid.i_len);
|
|
if (ic->ic_des_esslen > 0) {
|
|
/* 'nwid' disables auto-join magic */
|
|
ic->ic_flags &= ~IEEE80211_F_AUTO_JOIN;
|
|
} else if (!TAILQ_EMPTY(&ic->ic_ess)) {
|
|
/* '-nwid' re-enables auto-join */
|
|
ic->ic_flags |= IEEE80211_F_AUTO_JOIN;
|
|
}
|
|
/* disable WPA/WEP */
|
|
ieee80211_disable_rsn(ic);
|
|
ieee80211_disable_wep(ic);
|
|
error = ENETRESET;
|
|
break;
|
|
case SIOCG80211NWID:
|
|
memset(&nwid, 0, sizeof(nwid));
|
|
switch (ic->ic_state) {
|
|
case IEEE80211_S_INIT:
|
|
case IEEE80211_S_SCAN:
|
|
nwid.i_len = ic->ic_des_esslen;
|
|
memcpy(nwid.i_nwid, ic->ic_des_essid, nwid.i_len);
|
|
break;
|
|
default:
|
|
nwid.i_len = ic->ic_bss->ni_esslen;
|
|
memcpy(nwid.i_nwid, ic->ic_bss->ni_essid, nwid.i_len);
|
|
break;
|
|
}
|
|
error = kernel_copyout((void *)&nwid, (user_addr_t)ifr->ifr_data, sizeof(nwid));
|
|
break;
|
|
case SIOCS80211JOIN:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
if ((error = kernel_copyin((user_addr_t)ifr->ifr_data, &join, sizeof(join))) != 0)
|
|
break;
|
|
if (join.i_len > IEEE80211_NWID_LEN) {
|
|
error = EINVAL;
|
|
break;
|
|
}
|
|
if (join.i_flags & IEEE80211_JOIN_DEL) {
|
|
int update_ic = 0;
|
|
if (ic->ic_des_esslen == join.i_len &&
|
|
memcmp(join.i_nwid, ic->ic_des_essid,
|
|
join.i_len) == 0)
|
|
update_ic = 1;
|
|
if (join.i_flags & IEEE80211_JOIN_DEL_ALL &&
|
|
ieee80211_get_ess(ic, (const char *)ic->ic_des_essid,
|
|
ic->ic_des_esslen) != NULL)
|
|
update_ic = 1;
|
|
ieee80211_del_ess(ic, (char *)join.i_nwid, join.i_len,
|
|
join.i_flags & IEEE80211_JOIN_DEL_ALL ? 1 : 0);
|
|
if (update_ic == 1) {
|
|
/* Unconfigure this essid */
|
|
memset(ic->ic_des_essid, 0, IEEE80211_NWID_LEN);
|
|
ic->ic_des_esslen = 0;
|
|
/* disable WPA/WEP */
|
|
ieee80211_disable_rsn(ic);
|
|
ieee80211_disable_wep(ic);
|
|
error = ENETRESET;
|
|
}
|
|
} else {
|
|
if (ic->ic_des_esslen == join.i_len &&
|
|
memcmp(join.i_nwid, ic->ic_des_essid,
|
|
join.i_len) == 0) {
|
|
struct ieee80211_node *ni;
|
|
|
|
ieee80211_deselect_ess(ic);
|
|
ni = ieee80211_find_node(ic,
|
|
ic->ic_bss->ni_bssid);
|
|
if (ni != NULL)
|
|
ieee80211_free_node(ic, ni);
|
|
error = ENETRESET;
|
|
}
|
|
/* save nwid for auto-join */
|
|
if (ieee80211_add_ess(ic, &join) == 0)
|
|
ic->ic_flags |= IEEE80211_F_AUTO_JOIN;
|
|
}
|
|
break;
|
|
case SIOCG80211JOIN:
|
|
memset(&join, 0, sizeof(join));
|
|
error = ENOENT;
|
|
if (ic->ic_bss == NULL)
|
|
break;
|
|
TAILQ_FOREACH(ess, &ic->ic_ess, ess_next) {
|
|
if (memcmp(ess->essid, ic->ic_bss->ni_essid,
|
|
IEEE80211_NWID_LEN) == 0) {
|
|
join.i_len = ic->ic_bss->ni_esslen;
|
|
memcpy(join.i_nwid, ic->ic_bss->ni_essid,
|
|
join.i_len);
|
|
if (ic->ic_flags & IEEE80211_F_AUTO_JOIN)
|
|
join.i_flags = IEEE80211_JOIN_FOUND;
|
|
error = kernel_copyout(&join, (user_addr_t)ifr->ifr_data,
|
|
sizeof(join));
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
case SIOCG80211JOINALL:
|
|
ja = (struct ieee80211_joinreq_all *)data;
|
|
ja->ja_nodes = len = 0;
|
|
TAILQ_FOREACH(ess, &ic->ic_ess, ess_next) {
|
|
if (len + sizeof(ja->ja_node[0]) >= ja->ja_size) {
|
|
error = E2BIG;
|
|
break;
|
|
}
|
|
memset(&join, 0, sizeof(join));
|
|
join.i_len = ess->esslen;
|
|
memcpy(&join.i_nwid, ess->essid, join.i_len);
|
|
if (ess->flags & IEEE80211_F_RSNON)
|
|
join.i_flags |= IEEE80211_JOIN_WPA;
|
|
if (ess->flags & IEEE80211_F_PSK)
|
|
join.i_flags |= IEEE80211_JOIN_WPAPSK;
|
|
if (ess->flags & IEEE80211_JOIN_8021X)
|
|
join.i_flags |= IEEE80211_JOIN_8021X;
|
|
if (ess->flags & IEEE80211_F_WEPON)
|
|
join.i_flags |= IEEE80211_JOIN_NWKEY;
|
|
if (ess->flags & IEEE80211_JOIN_ANY)
|
|
join.i_flags |= IEEE80211_JOIN_ANY;
|
|
ieee80211_ess_getwpaparms(ess, &join.i_wpaparams);
|
|
error = kernel_copyout(&join, (user_addr_t)&ja->ja_node[ja->ja_nodes],
|
|
sizeof(ja->ja_node[0]));
|
|
if (error)
|
|
break;
|
|
len += sizeof(join);
|
|
ja->ja_nodes++;
|
|
}
|
|
break;
|
|
case SIOCS80211NWKEY:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
error = ieee80211_ioctl_setnwkeys(ic, (const struct ieee80211_nwkey *)data);
|
|
break;
|
|
case SIOCG80211NWKEY:
|
|
error = ieee80211_ioctl_getnwkeys(ic, (struct ieee80211_nwkey *)data);
|
|
break;
|
|
case SIOCS80211WPAPARMS:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
error = ieee80211_ioctl_setwpaparms(ic, (const struct ieee80211_wpaparams *)data);
|
|
break;
|
|
case SIOCG80211WPAPARMS:
|
|
error = ieee80211_ioctl_getwpaparms(ic, (struct ieee80211_wpaparams *)data);
|
|
break;
|
|
case SIOCS80211WPAPSK:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
psk = (struct ieee80211_wpapsk *)data;
|
|
if (psk->i_enabled) {
|
|
ic->ic_flags |= IEEE80211_F_PSK;
|
|
memcpy(ic->ic_psk, psk->i_psk, sizeof(ic->ic_psk));
|
|
if (ic->ic_flags & IEEE80211_F_WEPON)
|
|
ieee80211_disable_wep(ic);
|
|
} else {
|
|
ic->ic_flags &= ~IEEE80211_F_PSK;
|
|
memset(ic->ic_psk, 0, sizeof(ic->ic_psk));
|
|
}
|
|
error = ENETRESET;
|
|
break;
|
|
case SIOCG80211WPAPSK:
|
|
psk = (struct ieee80211_wpapsk *)data;
|
|
if (ic->ic_flags & IEEE80211_F_PSK) {
|
|
/* do not show any keys to userland */
|
|
psk->i_enabled = 2;
|
|
memset(psk->i_psk, 0, sizeof(psk->i_psk));
|
|
break; /* return ok but w/o key */
|
|
} else
|
|
psk->i_enabled = 0;
|
|
break;
|
|
case SIOCS80211KEYAVAIL:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
ka = (struct ieee80211_keyavail *)data;
|
|
(void)ieee80211_pmksa_add(ic, IEEE80211_AKM_8021X,
|
|
ka->i_macaddr, ka->i_key, ka->i_lifetime);
|
|
break;
|
|
case SIOCS80211KEYRUN:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
kr = (struct ieee80211_keyrun *)data;
|
|
error = ieee80211_keyrun(ic, kr->i_macaddr);
|
|
if (error == 0 && (ic->ic_flags & IEEE80211_F_WEPON))
|
|
ieee80211_disable_wep(ic);
|
|
break;
|
|
case SIOCS80211POWER:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
power = (struct ieee80211_power *)data;
|
|
ic->ic_lintval = power->i_maxsleep;
|
|
if (power->i_enabled != 0) {
|
|
if ((ic->ic_caps & IEEE80211_C_PMGT) == 0)
|
|
error = EINVAL;
|
|
else if ((ic->ic_flags & IEEE80211_F_PMGTON) == 0) {
|
|
ic->ic_flags |= IEEE80211_F_PMGTON;
|
|
error = ENETRESET;
|
|
}
|
|
} else {
|
|
if (ic->ic_flags & IEEE80211_F_PMGTON) {
|
|
ic->ic_flags &= ~IEEE80211_F_PMGTON;
|
|
error = ENETRESET;
|
|
}
|
|
}
|
|
break;
|
|
case SIOCG80211POWER:
|
|
power = (struct ieee80211_power *)data;
|
|
power->i_enabled = (ic->ic_flags & IEEE80211_F_PMGTON) ? 1 : 0;
|
|
power->i_maxsleep = ic->ic_lintval;
|
|
break;
|
|
case SIOCS80211BSSID:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
bssid = (struct ieee80211_bssid *)data;
|
|
if (IEEE80211_ADDR_EQ(bssid->i_bssid, empty_macaddr))
|
|
ic->ic_flags &= ~IEEE80211_F_DESBSSID;
|
|
else {
|
|
ic->ic_flags |= IEEE80211_F_DESBSSID;
|
|
IEEE80211_ADDR_COPY(ic->ic_des_bssid, bssid->i_bssid);
|
|
}
|
|
#ifndef IEEE80211_STA_ONLY
|
|
if (ic->ic_opmode == IEEE80211_M_HOSTAP)
|
|
break;
|
|
#endif
|
|
switch (ic->ic_state) {
|
|
case IEEE80211_S_INIT:
|
|
case IEEE80211_S_SCAN:
|
|
error = ENETRESET;
|
|
break;
|
|
default:
|
|
if ((ic->ic_flags & IEEE80211_F_DESBSSID) &&
|
|
!IEEE80211_ADDR_EQ(ic->ic_des_bssid,
|
|
ic->ic_bss->ni_bssid))
|
|
error = ENETRESET;
|
|
break;
|
|
}
|
|
break;
|
|
case SIOCG80211BSSID:
|
|
bssid = (struct ieee80211_bssid *)data;
|
|
switch (ic->ic_state) {
|
|
case IEEE80211_S_INIT:
|
|
case IEEE80211_S_SCAN:
|
|
#ifndef IEEE80211_STA_ONLY
|
|
if (ic->ic_opmode == IEEE80211_M_HOSTAP)
|
|
IEEE80211_ADDR_COPY(bssid->i_bssid,
|
|
ic->ic_myaddr);
|
|
else
|
|
#endif
|
|
if (ic->ic_flags & IEEE80211_F_DESBSSID)
|
|
IEEE80211_ADDR_COPY(bssid->i_bssid,
|
|
ic->ic_des_bssid);
|
|
else
|
|
memset(bssid->i_bssid, 0, IEEE80211_ADDR_LEN);
|
|
break;
|
|
default:
|
|
IEEE80211_ADDR_COPY(bssid->i_bssid,
|
|
ic->ic_bss->ni_bssid);
|
|
break;
|
|
}
|
|
break;
|
|
case SIOCS80211CHANNEL:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
chanreq = (struct ieee80211chanreq *)data;
|
|
if (chanreq->i_channel == IEEE80211_CHAN_ANY)
|
|
ic->ic_des_chan = IEEE80211_CHAN_ANYC;
|
|
else if (chanreq->i_channel > IEEE80211_CHAN_MAX ||
|
|
isclr(ic->ic_chan_active, chanreq->i_channel)) {
|
|
error = EINVAL;
|
|
break;
|
|
} else
|
|
ic->ic_ibss_chan = ic->ic_des_chan =
|
|
&ic->ic_channels[chanreq->i_channel];
|
|
switch (ic->ic_state) {
|
|
case IEEE80211_S_INIT:
|
|
case IEEE80211_S_SCAN:
|
|
error = ENETRESET;
|
|
break;
|
|
default:
|
|
if (ic->ic_opmode == IEEE80211_M_STA) {
|
|
if (ic->ic_des_chan != IEEE80211_CHAN_ANYC &&
|
|
ic->ic_bss->ni_chan != ic->ic_des_chan)
|
|
error = ENETRESET;
|
|
} else {
|
|
if (ic->ic_bss->ni_chan != ic->ic_ibss_chan)
|
|
error = ENETRESET;
|
|
}
|
|
break;
|
|
}
|
|
break;
|
|
case SIOCG80211CHANNEL:
|
|
chanreq = (struct ieee80211chanreq *)data;
|
|
switch (ic->ic_state) {
|
|
case IEEE80211_S_INIT:
|
|
case IEEE80211_S_SCAN:
|
|
if (ic->ic_opmode == IEEE80211_M_STA)
|
|
chan = ic->ic_des_chan;
|
|
else
|
|
chan = ic->ic_ibss_chan;
|
|
break;
|
|
default:
|
|
chan = ic->ic_bss->ni_chan;
|
|
break;
|
|
}
|
|
chanreq->i_channel = ieee80211_chan2ieee(ic, chan);
|
|
break;
|
|
case SIOCG80211ALLCHANS:
|
|
error = kernel_copyout(ic->ic_channels,
|
|
(user_addr_t)((struct ieee80211_chanreq_all *)data)->i_chans,
|
|
sizeof(ic->ic_channels));
|
|
break;
|
|
#if 0
|
|
case SIOCG80211ZSTATS:
|
|
#endif
|
|
case SIOCG80211STATS:
|
|
ifr = (struct ifreq *)data;
|
|
error = kernel_copyout(&ic->ic_stats, (user_addr_t)ifr->ifr_data,
|
|
sizeof(ic->ic_stats));
|
|
#if 0
|
|
if (cmd == SIOCG80211ZSTATS)
|
|
memset(&ic->ic_stats, 0, sizeof(ic->ic_stats));
|
|
#endif
|
|
break;
|
|
case SIOCS80211TXPOWER:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
txpower = (struct ieee80211_txpower *)data;
|
|
if ((ic->ic_caps & IEEE80211_C_TXPMGT) == 0) {
|
|
error = EINVAL;
|
|
break;
|
|
}
|
|
if (!(IEEE80211_TXPOWER_MIN <= txpower->i_val &&
|
|
txpower->i_val <= IEEE80211_TXPOWER_MAX)) {
|
|
error = EINVAL;
|
|
break;
|
|
}
|
|
ic->ic_txpower = txpower->i_val;
|
|
error = ENETRESET;
|
|
break;
|
|
case SIOCG80211TXPOWER:
|
|
txpower = (struct ieee80211_txpower *)data;
|
|
if ((ic->ic_caps & IEEE80211_C_TXPMGT) == 0)
|
|
error = EINVAL;
|
|
else
|
|
txpower->i_val = ic->ic_txpower;
|
|
break;
|
|
case SIOCSIFMTU:
|
|
// ifr = (struct ifreq *)data;
|
|
// if (!(IEEE80211_MTU_MIN <= ifr->ifr_mtu &&
|
|
// ifr->ifr_mtu <= IEEE80211_MTU_MAX))
|
|
// error = EINVAL;
|
|
// else
|
|
// ifp->if_mtu = ifr->ifr_mtu;
|
|
break;
|
|
case SIOCS80211SCAN:
|
|
/* Disabled. SIOCG80211ALLNODES is enough. */
|
|
break;
|
|
case SIOCG80211NODE:
|
|
nr = (struct ieee80211_nodereq *)data;
|
|
if (ic->ic_bss &&
|
|
IEEE80211_ADDR_EQ(nr->nr_macaddr, ic->ic_bss->ni_macaddr))
|
|
ni = ic->ic_bss;
|
|
else
|
|
ni = ieee80211_find_node(ic, nr->nr_macaddr);
|
|
if (ni == NULL) {
|
|
error = ENOENT;
|
|
break;
|
|
}
|
|
ieee80211_node2req(ic, ni, nr);
|
|
break;
|
|
case SIOCS80211NODE:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
#ifndef IEEE80211_STA_ONLY
|
|
if (ic->ic_opmode == IEEE80211_M_HOSTAP) {
|
|
error = EINVAL;
|
|
break;
|
|
}
|
|
#endif
|
|
nr = (struct ieee80211_nodereq *)data;
|
|
|
|
ni = ieee80211_find_node(ic, nr->nr_macaddr);
|
|
if (ni == NULL)
|
|
ni = ieee80211_alloc_node(ic, nr->nr_macaddr);
|
|
if (ni == NULL) {
|
|
error = ENOENT;
|
|
break;
|
|
}
|
|
|
|
if (nr->nr_flags & IEEE80211_NODEREQ_COPY)
|
|
ieee80211_req2node(ic, nr, ni);
|
|
break;
|
|
#ifndef IEEE80211_STA_ONLY
|
|
case SIOCS80211DELNODE:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
nr = (struct ieee80211_nodereq *)data;
|
|
ni = ieee80211_find_node(ic, nr->nr_macaddr);
|
|
if (ni == NULL)
|
|
error = ENOENT;
|
|
else if (ni == ic->ic_bss)
|
|
error = EPERM;
|
|
else {
|
|
if (ni->ni_state == IEEE80211_STA_COLLECT)
|
|
break;
|
|
|
|
/* Disassociate station. */
|
|
if (ni->ni_state == IEEE80211_STA_ASSOC)
|
|
IEEE80211_SEND_MGMT(ic, ni,
|
|
IEEE80211_FC0_SUBTYPE_DISASSOC,
|
|
IEEE80211_REASON_ASSOC_LEAVE);
|
|
|
|
/* Deauth station. */
|
|
if (ni->ni_state >= IEEE80211_STA_AUTH)
|
|
IEEE80211_SEND_MGMT(ic, ni,
|
|
IEEE80211_FC0_SUBTYPE_DEAUTH,
|
|
IEEE80211_REASON_AUTH_LEAVE);
|
|
|
|
ieee80211_node_leave(ic, ni);
|
|
}
|
|
break;
|
|
#endif
|
|
case SIOCG80211ALLNODES:
|
|
if ((ifp->if_flags & (IFF_UP | IFF_RUNNING)) !=
|
|
(IFF_UP | IFF_RUNNING)) {
|
|
error = ENETDOWN;
|
|
break;
|
|
}
|
|
|
|
na = (struct ieee80211_nodereq_all *)data;
|
|
na->na_nodes = i = 0;
|
|
ni = RB_MIN(ieee80211_tree, &ic->ic_tree);
|
|
while (ni && na->na_size >=
|
|
i + sizeof(struct ieee80211_nodereq)) {
|
|
ieee80211_node2req(ic, ni, &nrbuf);
|
|
error = kernel_copyout(&nrbuf, (user_addr_t)(caddr_t)na->na_node + i,
|
|
sizeof(struct ieee80211_nodereq));
|
|
if (error)
|
|
break;
|
|
i += sizeof(struct ieee80211_nodereq);
|
|
na->na_nodes++;
|
|
ni = RB_NEXT(ieee80211_tree, &ic->ic_tree, ni);
|
|
}
|
|
break;
|
|
case SIOCG80211FLAGS:
|
|
flags = ic->ic_userflags;
|
|
#ifndef IEEE80211_STA_ONLY
|
|
if (ic->ic_opmode != IEEE80211_M_HOSTAP)
|
|
#endif
|
|
flags &= ~IEEE80211_F_HOSTAPMASK;
|
|
ifr->ifr_flags = flags;
|
|
break;
|
|
case SIOCS80211FLAGS:
|
|
// if ((error = suser(curproc)) != 0)
|
|
// break;
|
|
flags = ifr->ifr_flags;
|
|
if (
|
|
#ifndef IEEE80211_STA_ONLY
|
|
ic->ic_opmode != IEEE80211_M_HOSTAP &&
|
|
#endif
|
|
(flags & IEEE80211_F_HOSTAPMASK)) {
|
|
error = EINVAL;
|
|
break;
|
|
}
|
|
ic->ic_userflags = flags;
|
|
error = ENETRESET;
|
|
break;
|
|
// case SIOCADDMULTI:
|
|
// case SIOCDELMULTI:
|
|
// error = (cmd == SIOCADDMULTI) ?
|
|
// ether_addmulti(ifr, &ic->ic_ac) :
|
|
// ether_delmulti(ifr, &ic->ic_ac);
|
|
// if (error == ENETRESET)
|
|
// error = 0;
|
|
// break;
|
|
default:
|
|
// error = ether_ioctl(ifp, &ic->ic_ac, cmd, data);
|
|
break;
|
|
}
|
|
|
|
return error;
|
|
}
|