1a399b765Szf162725 /*
2d62bc4baSyz147064 * Copyright 2008 Sun Microsystems, Inc. All rights reserved.
3a399b765Szf162725 * Use is subject to license terms.
4a399b765Szf162725 */
5a399b765Szf162725
6a399b765Szf162725 /*
7a399b765Szf162725 * Copyright (c) 2004, Sam Leffler <sam@errno.com>
8a399b765Szf162725 * Sun elects to license this software under the BSD license.
9a399b765Szf162725 * See README for more details.
10a399b765Szf162725 */
11a399b765Szf162725
12a399b765Szf162725 #include <stdio.h>
13a399b765Szf162725 #include <stdlib.h>
14a399b765Szf162725 #include <errno.h>
15a399b765Szf162725 #include <stdarg.h>
16a399b765Szf162725 #include <fcntl.h>
17a399b765Szf162725 #include <unistd.h>
18a399b765Szf162725 #include <stropts.h>
19a399b765Szf162725 #include <string.h>
20a399b765Szf162725 #include <stddef.h>
21a399b765Szf162725
22a399b765Szf162725 #include "wpa_impl.h"
23a399b765Szf162725 #include "driver.h"
24a399b765Szf162725
25a399b765Szf162725 #define WPA_STATUS(status) (status == DLADM_STATUS_OK? 0 : -1)
26a399b765Szf162725
27a399b765Szf162725 /*
28a399b765Szf162725 * get_bssid - get the current BSSID
29d62bc4baSyz147064 * @linkid: linkid of the given interface
30a399b765Szf162725 * @bssid: buffer for BSSID (IEEE80211_ADDR_LEN = 6 bytes)
31a399b765Szf162725 *
32a399b765Szf162725 * Returns: 0 on success, -1 on failure
33a399b765Szf162725 *
34a399b765Szf162725 * Query kernel driver for the current BSSID and copy it to @bssid.
35a399b765Szf162725 * Setting @bssid to 00:00:00:00:00:00 is recommended if the STA is not
36a399b765Szf162725 * associated.
37a399b765Szf162725 */
38a399b765Szf162725 int
wpa_driver_wifi_get_bssid(dladm_handle_t handle,datalink_id_t linkid,char * bssid)39*4ac67f02SAnurag S. Maskey wpa_driver_wifi_get_bssid(dladm_handle_t handle, datalink_id_t linkid,
40*4ac67f02SAnurag S. Maskey char *bssid)
41a399b765Szf162725 {
42d62bc4baSyz147064 dladm_status_t status;
43a399b765Szf162725 dladm_wlan_linkattr_t attr;
44a399b765Szf162725 dladm_wlan_attr_t *wl_attrp;
45a399b765Szf162725
46*4ac67f02SAnurag S. Maskey status = dladm_wlan_get_linkattr(handle, linkid, &attr);
47d62bc4baSyz147064 if (status != DLADM_STATUS_OK)
48a399b765Szf162725 return (-1);
49a399b765Szf162725
50a399b765Szf162725 wl_attrp = &attr.la_wlan_attr;
51a399b765Szf162725 if ((attr.la_valid & DLADM_WLAN_LINKATTR_WLAN) == 0 ||
52a399b765Szf162725 (wl_attrp->wa_valid & DLADM_WLAN_ATTR_BSSID) == 0)
53a399b765Szf162725 return (-1);
54a399b765Szf162725
55a399b765Szf162725 (void) memcpy(bssid, wl_attrp->wa_bssid.wb_bytes, DLADM_WLAN_BSSID_LEN);
56a399b765Szf162725
57a399b765Szf162725 wpa_printf(MSG_DEBUG, "wpa_driver_wifi_get_bssid: " MACSTR,
58a399b765Szf162725 MAC2STR((unsigned char *)bssid));
59a399b765Szf162725
60d62bc4baSyz147064 return (WPA_STATUS(status));
61a399b765Szf162725 }
62a399b765Szf162725
63a399b765Szf162725 /*
64a399b765Szf162725 * get_ssid - get the current SSID
65d62bc4baSyz147064 * @linkid: linkid of the given interface
66a399b765Szf162725 * @ssid: buffer for SSID (at least 32 bytes)
67a399b765Szf162725 *
68a399b765Szf162725 * Returns: length of the SSID on success, -1 on failure
69a399b765Szf162725 *
70a399b765Szf162725 * Query kernel driver for the current SSID and copy it to @ssid.
71a399b765Szf162725 * Returning zero is recommended if the STA is not associated.
72a399b765Szf162725 */
73a399b765Szf162725 int
wpa_driver_wifi_get_ssid(dladm_handle_t handle,datalink_id_t linkid,char * ssid)74*4ac67f02SAnurag S. Maskey wpa_driver_wifi_get_ssid(dladm_handle_t handle, datalink_id_t linkid,
75*4ac67f02SAnurag S. Maskey char *ssid)
76a399b765Szf162725 {
77a399b765Szf162725 int ret;
78d62bc4baSyz147064 dladm_status_t status;
79a399b765Szf162725 dladm_wlan_linkattr_t attr;
80a399b765Szf162725 dladm_wlan_attr_t *wl_attrp;
81a399b765Szf162725
82*4ac67f02SAnurag S. Maskey status = dladm_wlan_get_linkattr(handle, linkid, &attr);
83d62bc4baSyz147064 if (status != DLADM_STATUS_OK)
84a399b765Szf162725 return (-1);
85a399b765Szf162725
86a399b765Szf162725 wl_attrp = &attr.la_wlan_attr;
87a399b765Szf162725 if ((attr.la_valid & DLADM_WLAN_LINKATTR_WLAN) == 0 ||
88a399b765Szf162725 (wl_attrp->wa_valid & DLADM_WLAN_ATTR_ESSID) == 0)
89a399b765Szf162725 return (-1);
90a399b765Szf162725
91a399b765Szf162725 (void) memcpy(ssid, wl_attrp->wa_essid.we_bytes, MAX_ESSID_LENGTH);
92a399b765Szf162725 ret = strlen(ssid);
93a399b765Szf162725
94a399b765Szf162725 wpa_printf(MSG_DEBUG, "wpa_driver_wifi_get_ssid: ssid=%s len=%d",
95a399b765Szf162725 ssid, ret);
96a399b765Szf162725
97a399b765Szf162725 return (ret);
98a399b765Szf162725 }
99a399b765Szf162725
100a399b765Szf162725 static int
wpa_driver_wifi_set_wpa_ie(dladm_handle_t handle,datalink_id_t linkid,uint8_t * wpa_ie,uint32_t wpa_ie_len)101*4ac67f02SAnurag S. Maskey wpa_driver_wifi_set_wpa_ie(dladm_handle_t handle, datalink_id_t linkid,
102*4ac67f02SAnurag S. Maskey uint8_t *wpa_ie, uint32_t wpa_ie_len)
103a399b765Szf162725 {
104d62bc4baSyz147064 dladm_status_t status;
105a399b765Szf162725
106a399b765Szf162725 wpa_printf(MSG_DEBUG, "%s", "wpa_driver_wifi_set_wpa_ie");
107*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_set_ie(handle, linkid, wpa_ie, wpa_ie_len);
108a399b765Szf162725
109d62bc4baSyz147064 return (WPA_STATUS(status));
110a399b765Szf162725 }
111a399b765Szf162725
112a399b765Szf162725 /*
113a399b765Szf162725 * set_wpa - enable/disable WPA support
114d62bc4baSyz147064 * @linkid: linkid of the given interface
115a399b765Szf162725 * @enabled: 1 = enable, 0 = disable
116a399b765Szf162725 *
117a399b765Szf162725 * Returns: 0 on success, -1 on failure
118a399b765Szf162725 *
119a399b765Szf162725 * Configure the kernel driver to enable/disable WPA support. This may
120a399b765Szf162725 * be empty function, if WPA support is always enabled. Common
121a399b765Szf162725 * configuration items are WPA IE (clearing it when WPA support is
122a399b765Szf162725 * disabled), Privacy flag for capability field, roaming mode (need to
123a399b765Szf162725 * allow wpa_supplicant to control roaming).
124a399b765Szf162725 */
125a399b765Szf162725 static int
wpa_driver_wifi_set_wpa(dladm_handle_t handle,datalink_id_t linkid,boolean_t enabled)126*4ac67f02SAnurag S. Maskey wpa_driver_wifi_set_wpa(dladm_handle_t handle, datalink_id_t linkid,
127*4ac67f02SAnurag S. Maskey boolean_t enabled)
128a399b765Szf162725 {
129d62bc4baSyz147064 dladm_status_t status;
130a399b765Szf162725
131a399b765Szf162725 wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_wpa: enable=%d", enabled);
132a399b765Szf162725
133*4ac67f02SAnurag S. Maskey if (!enabled && wpa_driver_wifi_set_wpa_ie(handle, linkid, NULL, 0) < 0)
134a399b765Szf162725 return (-1);
135a399b765Szf162725
136*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_set_wpa(handle, linkid, enabled);
137a399b765Szf162725
138d62bc4baSyz147064 return (WPA_STATUS(status));
139a399b765Szf162725 }
140a399b765Szf162725
141a399b765Szf162725 static int
wpa_driver_wifi_del_key(dladm_handle_t handle,datalink_id_t linkid,int key_idx,unsigned char * addr)142*4ac67f02SAnurag S. Maskey wpa_driver_wifi_del_key(dladm_handle_t handle, datalink_id_t linkid,
143*4ac67f02SAnurag S. Maskey int key_idx, unsigned char *addr)
144a399b765Szf162725 {
145d62bc4baSyz147064 dladm_status_t status;
146a399b765Szf162725 dladm_wlan_bssid_t bss;
147a399b765Szf162725
148a399b765Szf162725 wpa_printf(MSG_DEBUG, "%s: id=%d", "wpa_driver_wifi_del_key",
149a399b765Szf162725 key_idx);
150a399b765Szf162725
151a399b765Szf162725 (void) memcpy(bss.wb_bytes, addr, DLADM_WLAN_BSSID_LEN);
152*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_del_key(handle, linkid, key_idx, &bss);
153a399b765Szf162725
154d62bc4baSyz147064 return (WPA_STATUS(status));
155a399b765Szf162725 }
156a399b765Szf162725
157a399b765Szf162725 /*
158a399b765Szf162725 * set_key - configure encryption key
159d62bc4baSyz147064 * @linkid: linkid of the given interface
160a399b765Szf162725 * @alg: encryption algorithm (%WPA_ALG_NONE, %WPA_ALG_WEP,
161a399b765Szf162725 * %WPA_ALG_TKIP, %WPA_ALG_CCMP); %WPA_ALG_NONE clears the key.
162a399b765Szf162725 * @addr: address of the peer STA or ff:ff:ff:ff:ff:ff for
163a399b765Szf162725 * broadcast/default keys
164a399b765Szf162725 * @key_idx: key index (0..3), always 0 for unicast keys
165a399b765Szf162725 * @set_tx: configure this key as the default Tx key (only used when
166a399b765Szf162725 * driver does not support separate unicast/individual key
167a399b765Szf162725 * @seq: sequence number/packet number, @seq_len octets, the next
168a399b765Szf162725 * packet number to be used for in replay protection; configured
169a399b765Szf162725 * for Rx keys (in most cases, this is only used with broadcast
170a399b765Szf162725 * keys and set to zero for unicast keys)
171a399b765Szf162725 * @seq_len: length of the @seq, depends on the algorithm:
172a399b765Szf162725 * TKIP: 6 octets, CCMP: 6 octets
173a399b765Szf162725 * @key: key buffer; TKIP: 16-byte temporal key, 8-byte Tx Mic key,
174a399b765Szf162725 * 8-byte Rx Mic Key
175a399b765Szf162725 * @key_len: length of the key buffer in octets (WEP: 5 or 13,
176a399b765Szf162725 * TKIP: 32, CCMP: 16)
177a399b765Szf162725 *
178a399b765Szf162725 * Returns: 0 on success, -1 on failure
179a399b765Szf162725 *
180a399b765Szf162725 * Configure the given key for the kernel driver. If the driver
181a399b765Szf162725 * supports separate individual keys (4 default keys + 1 individual),
182a399b765Szf162725 * @addr can be used to determine whether the key is default or
183a399b765Szf162725 * individual. If only 4 keys are supported, the default key with key
184a399b765Szf162725 * index 0 is used as the individual key. STA must be configured to use
185a399b765Szf162725 * it as the default Tx key (@set_tx is set) and accept Rx for all the
186a399b765Szf162725 * key indexes. In most cases, WPA uses only key indexes 1 and 2 for
187a399b765Szf162725 * broadcast keys, so key index 0 is available for this kind of
188a399b765Szf162725 * configuration.
189a399b765Szf162725 */
190a399b765Szf162725 static int
wpa_driver_wifi_set_key(dladm_handle_t handle,datalink_id_t linkid,wpa_alg alg,unsigned char * addr,int key_idx,boolean_t set_tx,uint8_t * seq,uint32_t seq_len,uint8_t * key,uint32_t key_len)191*4ac67f02SAnurag S. Maskey wpa_driver_wifi_set_key(dladm_handle_t handle, datalink_id_t linkid,
192*4ac67f02SAnurag S. Maskey wpa_alg alg, unsigned char *addr, int key_idx, boolean_t set_tx,
193*4ac67f02SAnurag S. Maskey uint8_t *seq, uint32_t seq_len, uint8_t *key, uint32_t key_len)
194a399b765Szf162725 {
195a399b765Szf162725 char *alg_name;
196a399b765Szf162725 dladm_wlan_cipher_t cipher;
197a399b765Szf162725 dladm_wlan_bssid_t bss;
198d62bc4baSyz147064 dladm_status_t status;
199a399b765Szf162725
200a399b765Szf162725 wpa_printf(MSG_DEBUG, "%s", "wpa_driver_wifi_set_key");
201a399b765Szf162725 if (alg == WPA_ALG_NONE)
202*4ac67f02SAnurag S. Maskey return (wpa_driver_wifi_del_key(handle, linkid, key_idx, addr));
203a399b765Szf162725
204a399b765Szf162725 switch (alg) {
205a399b765Szf162725 case WPA_ALG_WEP:
206a399b765Szf162725 alg_name = "WEP";
207a399b765Szf162725 cipher = DLADM_WLAN_CIPHER_WEP;
208a399b765Szf162725 break;
209a399b765Szf162725 case WPA_ALG_TKIP:
210a399b765Szf162725 alg_name = "TKIP";
211a399b765Szf162725 cipher = DLADM_WLAN_CIPHER_TKIP;
212a399b765Szf162725 break;
213a399b765Szf162725 case WPA_ALG_CCMP:
214a399b765Szf162725 alg_name = "CCMP";
215a399b765Szf162725 cipher = DLADM_WLAN_CIPHER_AES_CCM;
216a399b765Szf162725 break;
217a399b765Szf162725 default:
218a399b765Szf162725 wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key:"
219a399b765Szf162725 " unknown/unsupported algorithm %d", alg);
220a399b765Szf162725 return (-1);
221a399b765Szf162725 }
222a399b765Szf162725
223a399b765Szf162725 wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key: alg=%s key_idx=%d"
224a399b765Szf162725 " set_tx=%d seq_len=%d seq=%d key_len=%d",
225a399b765Szf162725 alg_name, key_idx, set_tx,
226ff3124efSff224033 seq_len, *(uint64_t *)(uintptr_t)seq, key_len);
227a399b765Szf162725
228a399b765Szf162725 if (seq_len > sizeof (uint64_t)) {
229a399b765Szf162725 wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key:"
230a399b765Szf162725 " seq_len %d too big", seq_len);
231a399b765Szf162725 return (-1);
232a399b765Szf162725 }
233a399b765Szf162725 (void) memcpy(bss.wb_bytes, addr, DLADM_WLAN_BSSID_LEN);
234a399b765Szf162725
235*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_set_key(handle, linkid, cipher, &bss, set_tx,
236ff3124efSff224033 *(uint64_t *)(uintptr_t)seq, key_idx, key, key_len);
237a399b765Szf162725
238d62bc4baSyz147064 return (WPA_STATUS(status));
239a399b765Szf162725 }
240a399b765Szf162725
241a399b765Szf162725 /*
242a399b765Szf162725 * disassociate - request driver to disassociate
243d62bc4baSyz147064 * @linkid: linkid of the given interface
244a399b765Szf162725 * @reason_code: 16-bit reason code to be sent in the disassociation
245a399b765Szf162725 * frame
246a399b765Szf162725 *
247a399b765Szf162725 * Return: 0 on success, -1 on failure
248a399b765Szf162725 */
249a399b765Szf162725 static int
wpa_driver_wifi_disassociate(dladm_handle_t handle,datalink_id_t linkid,int reason_code)250*4ac67f02SAnurag S. Maskey wpa_driver_wifi_disassociate(dladm_handle_t handle, datalink_id_t linkid,
251*4ac67f02SAnurag S. Maskey int reason_code)
252a399b765Szf162725 {
253d62bc4baSyz147064 dladm_status_t status;
254a399b765Szf162725
255a399b765Szf162725 wpa_printf(MSG_DEBUG, "wpa_driver_wifi_disassociate");
256a399b765Szf162725
257*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_set_mlme(handle, linkid,
258*4ac67f02SAnurag S. Maskey DLADM_WLAN_MLME_DISASSOC, reason_code, NULL);
259a399b765Szf162725
260d62bc4baSyz147064 return (WPA_STATUS(status));
261a399b765Szf162725 }
262a399b765Szf162725
263a399b765Szf162725 /*
264a399b765Szf162725 * associate - request driver to associate
265d62bc4baSyz147064 * @linkid: linkid of the given interface
266a399b765Szf162725 * @bssid: BSSID of the selected AP
267a399b765Szf162725 * @wpa_ie: WPA information element to be included in (Re)Association
268a399b765Szf162725 * Request (including information element id and length). Use of
269a399b765Szf162725 * this WPA IE is optional. If the driver generates the WPA IE, it
270a399b765Szf162725 * can use @pairwise_suite, @group_suite, and @key_mgmt_suite
271a399b765Szf162725 * to select proper algorithms. In this case, the driver has to
272a399b765Szf162725 * notify wpa_supplicant about the used WPA IE by generating an
273a399b765Szf162725 * event that the interface code will convert into EVENT_ASSOCINFO
274a399b765Szf162725 * data (see wpa_supplicant.h). When using WPA2/IEEE 802.11i,
275a399b765Szf162725 * @wpa_ie is used for RSN IE instead. The driver can determine
276a399b765Szf162725 * which version is used by looking at the first byte of the IE
277a399b765Szf162725 * (0xdd for WPA, 0x30 for WPA2/RSN).
278a399b765Szf162725 * @wpa_ie_len: length of the @wpa_ie
279a399b765Szf162725 *
280a399b765Szf162725 * Return: 0 on success, -1 on failure
281a399b765Szf162725 */
282a399b765Szf162725 static int
wpa_driver_wifi_associate(dladm_handle_t handle,datalink_id_t linkid,const char * bssid,uint8_t * wpa_ie,uint32_t wpa_ie_len)283*4ac67f02SAnurag S. Maskey wpa_driver_wifi_associate(dladm_handle_t handle, datalink_id_t linkid,
284*4ac67f02SAnurag S. Maskey const char *bssid, uint8_t *wpa_ie, uint32_t wpa_ie_len)
285a399b765Szf162725 {
286d62bc4baSyz147064 dladm_status_t status;
287a399b765Szf162725 dladm_wlan_bssid_t bss;
288a399b765Szf162725
289a399b765Szf162725 wpa_printf(MSG_DEBUG, "wpa_driver_wifi_associate : "
290a399b765Szf162725 MACSTR, MAC2STR(bssid));
291a399b765Szf162725
292a399b765Szf162725 /*
293a399b765Szf162725 * NB: Don't need to set the freq or cipher-related state as
294a399b765Szf162725 * this is implied by the bssid which is used to locate
295a399b765Szf162725 * the scanned node state which holds it.
296a399b765Szf162725 */
297*4ac67f02SAnurag S. Maskey if (wpa_driver_wifi_set_wpa_ie(handle, linkid, wpa_ie, wpa_ie_len) < 0)
298a399b765Szf162725 return (-1);
299a399b765Szf162725
300a399b765Szf162725 (void) memcpy(bss.wb_bytes, bssid, DLADM_WLAN_BSSID_LEN);
301*4ac67f02SAnurag S. Maskey status = dladm_wlan_wpa_set_mlme(handle, linkid, DLADM_WLAN_MLME_ASSOC,
302a399b765Szf162725 0, &bss);
303a399b765Szf162725
304d62bc4baSyz147064 return (WPA_STATUS(status));
305a399b765Szf162725 }
306a399b765Szf162725
307a399b765Szf162725 /*
308a399b765Szf162725 * scan - request the driver to initiate scan
309d62bc4baSyz147064 * @linkid: linkid of the given interface
310a399b765Szf162725 *
311a399b765Szf162725 * Return: 0 on success, -1 on failure
312a399b765Szf162725 *
313a399b765Szf162725 * Once the scan results are ready, the driver should report scan
314a399b765Szf162725 * results event for wpa_supplicant which will eventually request the
315a399b765Szf162725 * results with wpa_driver_get_scan_results().
316a399b765Szf162725 */
317a399b765Szf162725 static int
wpa_driver_wifi_scan(dladm_handle_t handle,datalink_id_t linkid)318*4ac67f02SAnurag S. Maskey wpa_driver_wifi_scan(dladm_handle_t handle, datalink_id_t linkid)
319a399b765Szf162725 {
320d62bc4baSyz147064 dladm_status_t status;
321a399b765Szf162725
322a399b765Szf162725 wpa_printf(MSG_DEBUG, "%s", "wpa_driver_wifi_scan");
323a399b765Szf162725 /*
324a399b765Szf162725 * We force the state to INIT before calling ieee80211_new_state
325a399b765Szf162725 * to get ieee80211_begin_scan called. We really want to scan w/o
326a399b765Szf162725 * altering the current state but that's not possible right now.
327a399b765Szf162725 */
328*4ac67f02SAnurag S. Maskey (void) wpa_driver_wifi_disassociate(handle, linkid,
329a399b765Szf162725 DLADM_WLAN_REASON_DISASSOC_LEAVING);
330a399b765Szf162725
331*4ac67f02SAnurag S. Maskey status = dladm_wlan_scan(handle, linkid, NULL, NULL);
332a399b765Szf162725
333a399b765Szf162725 wpa_printf(MSG_DEBUG, "%s: return", "wpa_driver_wifi_scan");
334d62bc4baSyz147064 return (WPA_STATUS(status));
335a399b765Szf162725 }
336a399b765Szf162725
337a399b765Szf162725 /*
338a399b765Szf162725 * get_scan_results - fetch the latest scan results
339d62bc4baSyz147064 * @linkid: linkid of the given interface
340a399b765Szf162725 * @results: pointer to buffer for scan results
341a399b765Szf162725 * @max_size: maximum number of entries (buffer size)
342a399b765Szf162725 *
343a399b765Szf162725 * Return: number of scan result entries used on success, -1 on failure
344a399b765Szf162725 *
345a399b765Szf162725 * If scan results include more than @max_size BSSes, @max_size will be
346a399b765Szf162725 * returned and the remaining entries will not be included in the
347a399b765Szf162725 * buffer.
348a399b765Szf162725 */
349a399b765Szf162725 int
wpa_driver_wifi_get_scan_results(dladm_handle_t handle,datalink_id_t linkid,dladm_wlan_ess_t * results,uint32_t max_size)350*4ac67f02SAnurag S. Maskey wpa_driver_wifi_get_scan_results(dladm_handle_t handle, datalink_id_t linkid,
351a399b765Szf162725 dladm_wlan_ess_t *results, uint32_t max_size)
352a399b765Szf162725 {
353a399b765Szf162725 uint_t ret;
354a399b765Szf162725
355d62bc4baSyz147064 wpa_printf(MSG_DEBUG, "%s: max size=%d\n",
356d62bc4baSyz147064 "wpa_driver_wifi_get_scan_results", max_size);
357a399b765Szf162725
358*4ac67f02SAnurag S. Maskey if (dladm_wlan_wpa_get_sr(handle, linkid, results, max_size, &ret)
359a399b765Szf162725 != DLADM_STATUS_OK) {
360a399b765Szf162725 return (-1);
361a399b765Szf162725 }
362a399b765Szf162725
363a399b765Szf162725 return (ret);
364a399b765Szf162725 }
365a399b765Szf162725
366a399b765Szf162725 struct wpa_driver_ops wpa_driver_wifi_ops = {
367a399b765Szf162725 wpa_driver_wifi_get_bssid,
368a399b765Szf162725 wpa_driver_wifi_get_ssid,
369a399b765Szf162725 wpa_driver_wifi_set_wpa,
370a399b765Szf162725 wpa_driver_wifi_set_key,
371a399b765Szf162725 wpa_driver_wifi_scan,
372a399b765Szf162725 wpa_driver_wifi_get_scan_results,
373a399b765Szf162725 wpa_driver_wifi_disassociate,
374a399b765Szf162725 wpa_driver_wifi_associate
375a399b765Szf162725 };
376