From eb2d46e3b26e788c413e8f7e1ca25c365ded4a32 Mon Sep 17 00:00:00 2001 From: ant <13826173658@163.com> Date: Wed, 14 Sep 2016 15:41:46 +0800 Subject: [PATCH] delete joylink. delete joylink --- .../jd_joinlink/example_joinlink.c | 675 ---------- .../common/application/jd_joinlink/joinlink.c | 1100 ----------------- .../common/application/jd_joinlink/joinlink.h | 64 - 3 files changed, 1839 deletions(-) delete mode 100644 component/common/application/jd_joinlink/example_joinlink.c delete mode 100644 component/common/application/jd_joinlink/joinlink.c delete mode 100644 component/common/application/jd_joinlink/joinlink.h diff --git a/component/common/application/jd_joinlink/example_joinlink.c b/component/common/application/jd_joinlink/example_joinlink.c deleted file mode 100644 index 3e837b5..0000000 --- a/component/common/application/jd_joinlink/example_joinlink.c +++ /dev/null @@ -1,675 +0,0 @@ -/*******************************example_joinlink **************************/ - -#include "autoconf.h" -#include "platform_stdlib.h" -#include "wifi_conf.h" -#include "wifi_structures.h" -#include "osdep_service.h" -#include "lwip_netconf.h" -#include "task.h" -#include "joinlink.h" -#include "cJSON.h" - -#include -#include -#include -#include -#include - -#define MASK_SIZE_JOINLINK 3 -#define SOURCE_PORT 101 - -//gloable -static unsigned char cur_channel = 1; -static unsigned char lock_channel = 1; -static _timer timer_handler_phase2; -static _timer timer_handler_phase1; -static u8 joinlink_finished = 0; -static u8 security_type = 0xff; -static u8 jl_rx_flag = 0; -static rtw_scan_result_t *all_channel_scan_result = NULL; -static rtw_scan_result_t *p_result = NULL; -static int all_channel_ret = 0; -static int phase1_finished = 0; -static int phase2_started = 0; -static u32 start_time = 0; -static u32 current_time = 0; -static int idx = 1; -static int phase1_scanned_channel[14]; -static char ap_bssid[6]; -static char aes_key[] = "123456789"; - -static void* pre_scan_sema; -static int ack_socket; -static struct sockaddr_in to_addr; -static struct sockaddr_in from_addr; -static char header_cmd[] = "cmd"; -static cJSON *ack_content = NULL; -extern struct netif xnetif[]; - -void example_joinlink(void); - -static rtw_result_t joinlink_scan_result_handler(rtw_scan_handler_result_t* malloced_scan_result ) -{ - - static int ApNum = 0; - //TODO: add timer of 2s, wf, 1021 - if (malloced_scan_result->scan_complete != RTW_TRUE) { - rtw_scan_result_t* record = &malloced_scan_result->ap_details; - record->SSID.val[record->SSID.len] = 0; /* Ensure the SSID is null terminated */ - ++ApNum; - - if(malloced_scan_result->user_data) - memcpy((void *)((char *)malloced_scan_result->user_data+(ApNum-1)*sizeof(rtw_scan_result_t)), (char *)record, sizeof(rtw_scan_result_t)); - } - // scan finished, wf, 1022 - else - { - rtw_up_sema(&pre_scan_sema); - ApNum = 0; - } - return RTW_SUCCESS; -} - -void* joinlink_all_scan() -{ - int ret = 0; - rtw_scan_result_t *joinlink_scan_buf = NULL; - - if(joinlink_scan_buf != NULL) - free(joinlink_scan_buf); - - joinlink_scan_buf = (rtw_scan_result_t *)malloc(65*sizeof(rtw_scan_result_t)); - if(joinlink_scan_buf == NULL){ - return 0; - } - memset(joinlink_scan_buf, 0, 65*sizeof(rtw_scan_result_t)); - - if((ret = wifi_scan_networks(joinlink_scan_result_handler, joinlink_scan_buf)) != RTW_SUCCESS){ - printf("[ATWS]ERROR: wifi scan failed\n\r"); - free(joinlink_scan_buf); - return 0; - } - return joinlink_scan_buf; -} - -void joinlink_deinit_content() -{ - rtw_del_timer(&timer_handler_phase2); - rtw_del_timer(&timer_handler_phase1); - if(all_channel_scan_result) - { - free(all_channel_scan_result); - all_channel_scan_result = NULL; - } - rtw_free_sema(&pre_scan_sema); - joinlink_deinit(); - - return; -} -static char *jl_itoa(int value) -{ - char *val_str; - int tmp = value, len = 1; - - while((tmp /= 10) > 0) - len ++; - - val_str = (char *) malloc(len + 1); - sprintf(val_str, "%d", value); - - return val_str; -} - -static void get_ip_str(int *ip_int, char *ip_ch) -{ - char *ip_single = NULL; - u8 pos = 0, len = 0; - - for(int i = 0; i < 4; i++) - { - ip_single = jl_itoa(ip_int[i]); - len = strlen(ip_single); - memcpy(ip_ch + pos, ip_single,len); - free(ip_single); - ip_single = NULL; - pos += len; - if(i == 3) - { - *(ip_ch + pos) = 0; - break; - } - *(ip_ch + pos) = '.'; - pos++; - } -} - -static int joinlink_set_ack_content(u8 check_sum) -{ - cJSON_Hooks memoryHook; - memoryHook.malloc_fn = malloc; - memoryHook.free_fn = free; - cJSON_InitHooks(&memoryHook); - - if(ack_content != NULL) - { - cJSON_Delete(ack_content); - ack_content = NULL; - } - if((ack_content = cJSON_CreateObject()) != NULL) - { - char mac_str[18]; - u8 pos = 0; - memset(mac_str, 0, sizeof(mac_str)); - for(int i = 0; i < 6; i++) - { - sprintf(mac_str + pos, "%02x", xnetif[0].hwaddr[i]); - pos += 2; - if(i != 5) - mac_str[pos++] = ':'; - } - - cJSON_AddItemToObject(ack_content, "deviceid", cJSON_CreateString(mac_str)); - cJSON_AddItemToObject(ack_content, "code", cJSON_CreateNumber(check_sum)); - } - else - { - printf("create jSON object failure\n"); - return -1; - } - - return 0; -} - -#if 1 - -static void recv_cmd(void *para) -{ - int rev_len = 0; - char pkt_buf[16]; - while(1) - { - vTaskDelay(500); - if((rev_len = recvfrom(ack_socket, pkt_buf, sizeof(pkt_buf), 0, NULL, NULL)) >= 0) - { - if(memcmp(pkt_buf, header_cmd, sizeof(header_cmd)) == 0) - { - printf("received reboot command, restart join_link process\n"); - // do we need to reboot? - example_joinlink(); - close(ack_socket); - break; - } - } - } - vTaskDelete(NULL); - return; -} - -static int send_ack(int *dest_ip, int dest_port, u8 sum) -{ -#if CONFIG_LWIP_LAYER - int ack_transmit_round; - char ip[16]; - char *jsonString = NULL; - int sended_data = 0; - - if(joinlink_set_ack_content(sum) == -1) - return -1; - - jsonString = cJSON_Print(ack_content); - if(jsonString == NULL) - { - printf("json string convert failure\n"); - cJSON_Delete(ack_content); - return -1; - } - - get_ip_str(dest_ip, ip); - - ack_socket = socket(PF_INET, SOCK_DGRAM, IP_PROTO_UDP); - if (ack_socket == -1) { - printf("create socket failure\n"); - return -1; - } - - FD_ZERO(&to_addr); - to_addr.sin_family = AF_INET; - to_addr.sin_port = htons(dest_port); - to_addr.sin_addr.s_addr = htonl(INADDR_ANY); - - FD_ZERO(&from_addr); - from_addr.sin_family = AF_INET; - from_addr.sin_port = htons(SOURCE_PORT); - to_addr.sin_addr.s_addr = inet_addr(ip); - - if(bind(ack_socket, (struct sockaddr *)&from_addr, sizeof(from_addr)) < 0) - { - printf("bind to source port error\n"); - return -1; - } - - for (ack_transmit_round = 0; ack_transmit_round < 5; ack_transmit_round++) { - sended_data = sendto(ack_socket, (unsigned char *)jsonString, strlen(jsonString), 0, (struct sockaddr *) &to_addr, sizeof(struct sockaddr)); - //printf("\r\nAlready send %d bytes data\n", sended_data); - vTaskDelay(100); /* delay 100 ms */ - } - - if(xTaskCreate(recv_cmd, (char const *)"recv_cmd", 1512, NULL, tskIDLE_PRIORITY + 2, NULL) != pdPASS) - printf("%s xTaskCreate failed\n", __FUNCTION__); - - close(ack_socket); - if(jsonString) - { - free(jsonString); - jsonString = NULL; - } - cJSON_Delete(ack_content); -#endif - - return 0; -} -#endif -static void remove_filter() -{ - wifi_disable_packet_filter(1); - wifi_disable_packet_filter(2); - wifi_remove_packet_filter(1); - wifi_remove_packet_filter(2); -} - -int joinlink_finish(unsigned char security_type) -{ - int ret = 0; - int retry = 3; - unsigned char pscan_config = 1; - joinlink_result_t result; - rtw_security_t security_mode; - - wifi_set_promisc(RTW_PROMISC_DISABLE,NULL,0); - remove_filter(); - - pscan_config = PSCAN_ENABLE | PSCAN_SIMPLE_CONFIG; - ret = joinlink_get_result(&result); - if (ret == 0) { - printf("get result OK\n"); - //printf("\r\n joinlink get result ok,ssid = %s, pwd = %s,ssid length = %d,pwd length = %d", - // result.ssid, result.pwd, result.ssid_length,result.pwd_length); - } - else{ - printf("joinlink result not get!\n"); - joinlink_deinit_content(); - return -1; - } - //ap security type - switch(security_type){ - case RTW_ENCRYPTION_OPEN: - security_mode = RTW_SECURITY_OPEN; - break; - case RTW_ENCRYPTION_WEP40: - case RTW_ENCRYPTION_WEP104: - security_mode = RTW_SECURITY_WEP_PSK; - break; - case RTW_ENCRYPTION_WPA_TKIP: - case RTW_ENCRYPTION_WPA_AES: - case RTW_ENCRYPTION_WPA2_TKIP: - case RTW_ENCRYPTION_WPA2_AES: - case RTW_ENCRYPTION_WPA2_MIXED: - security_mode = RTW_SECURITY_WPA2_AES_PSK; - break; - case RTW_ENCRYPTION_UNKNOWN: - case RTW_ENCRYPTION_UNDEF: - default: - printf("unknow security mode,connect fail!\n"); - } - -#if 1 - while(1){ - if(wifi_set_pscan_chan(&lock_channel, &pscan_config, 1) < 0){ - printf("ERROR: wifi set partial scan channel fail\n"); - break; - } - printf("wifi_connect\n"); - //printf("ap_bssid: 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x\n", ap_bssid[0],ap_bssid[1],ap_bssid[2],ap_bssid[3],ap_bssid[4],ap_bssid[5]); - - - ret = wifi_connect((unsigned char *)result.ssid, security_mode, - (unsigned char *)result.pwd, result.ssid_length, - result.pwd_length, - 0,NULL); - - if(ret == RTW_SUCCESS){ - printf("Connect ok!\n"); -#if CONFIG_LWIP_LAYER - /* If not rise priority, LwIP DHCP may timeout */ - vTaskPrioritySet(NULL, tskIDLE_PRIORITY + 3); - /* Start DHCP Client */ - ret = LwIP_DHCP(0, DHCP_START); - vTaskPrioritySet(NULL, tskIDLE_PRIORITY + 1); -#endif - break; - } - if (retry == 0) { - break; - } - - retry--; - } - if(send_ack(result.source_ip, result.source_port, result.sum) != 0) - printf("send ack failure\n"); -#endif - - joinlink_deinit_content(); - return 0; - -} -// handler for phase2 -void timer_handler_phase2_func(void *FunctionContext) -{ - // do not switch channel while handle frames, wf, 1021 - if(jl_rx_flag){ - rtw_set_timer(&timer_handler_phase2, CHANNEL_SWITCH_TIME - 25); - } else { - if(cur_channel >= 13) - {cur_channel = 1;} - else - cur_channel ++; - wifi_set_channel(cur_channel); - rtw_set_timer(&timer_handler_phase2, CHANNEL_SWITCH_TIME); - } - - //printf("phase2:wifi switch channel to %d\n",cur_channel); - return; -} - -// timer handler for the 1st phase, wf, 1022 -void timer_handler_phase1_func(void *FunctionContext) -{ - // do not switch channel while handle frames, wf, 1021 - if(jl_rx_flag){ - rtw_set_timer(&timer_handler_phase1, SSID_SWITCH_TIME - 25); - } - // switch ssid, wf, 1022 - else - { - if(idx >= 14) - { - phase1_finished = 1; - printf("wifi: phase1 scan finished\n"); - printf("wifi: start phase2 scan\n"); -// move from pkt handler to here in case no pkt to trigue phase2 -#if 1 - if(phase1_finished) - { - phase1_finished = 0; - phase2_started = 1; - rtw_cancel_timer(&timer_handler_phase1); - //start phase2 for ch1~ch13 - cur_channel = 1; - wifi_set_channel(cur_channel); - - rtw_init_timer(&timer_handler_phase2, NULL, &timer_handler_phase2_func, NULL, "phase_2"); - rtw_set_timer(&timer_handler_phase2, CHANNEL_SWITCH_TIME); - } -#endif - return; - } - - while(idx < 14) - { - if(phase1_scanned_channel[idx]) - { - wifi_set_channel(idx); - rtw_set_timer(&timer_handler_phase1, SSID_SWITCH_TIME); - //printf("phase1: wifi switch channel to %d\n",idx); - idx++; - break; - } - else - { - if(idx == 13) - rtw_set_timer(&timer_handler_phase1, SSID_SWITCH_TIME); - idx++; - } - - } - - } - return; -} - -static void rtl_frame_recv_handle(unsigned char *buf, int len, unsigned char *da, unsigned char *sa, void *user_data) { - - int ret = 0; - int fixed_channel; - char scanned_ssid[50] = {0}; - unsigned char *current_bssid = NULL; - int scanned_ssid_len = 0; - - //set this flag prevent joinlink_recv interruptted by timer,since timer has higher priority - jl_rx_flag = 1; - if (joinlink_finished) { - jl_rx_flag = 0; - return; - } - - ret = joinlink_recv(da, sa, len, user_data); - if(ret == JOINLINK_STATUS_CHANNEL_LOCKED) - { - if(phase2_started) - { - phase2_started = 0; - rtw_cancel_timer(&timer_handler_phase2); - } - else - rtw_cancel_timer(&timer_handler_phase1); - - lock_channel = cur_channel; - security_type = ((ieee80211_frame_info_t *)user_data)->encrypt; - printf("JoinLink locked to channel[%d]\n",lock_channel); - - current_bssid = buf + 4 + ETH_ALEN; - memcpy(ap_bssid, current_bssid, 6); - - fixed_channel = promisc_get_fixed_channel(current_bssid, scanned_ssid, &scanned_ssid_len); - if (fixed_channel != 0) { - printf("JoinLink force fixed to channel[%d]\r\n",fixed_channel); - printf("JoinLink ssid scanned[%s]\r\n",scanned_ssid); - wifi_set_channel(fixed_channel); - } - - } - else if(ret == JOINLINK_STATUS_COMPLETE){ - //wifi_set_promisc(RTW_PROMISC_DISABLE,NULL,0); - joinlink_finished = 1; - printf("quit promisc mode!\r\n"); - } - //release flag - jl_rx_flag = 0; - - return; -} - - -// callback for promisc packets, like rtk_start_parse_packet in SC, wf, 1021 -void wifi_promisc_rx(unsigned char* buf, unsigned int len, void* user_data) -{ - unsigned char * da = buf; - unsigned char * sa = buf + ETH_ALEN; - - if (joinlink_finished) - return; - - rtl_frame_recv_handle(buf, len, da, sa, user_data); - return; - -} - -// the entry point for joinlink -void joinlink_process(void *param) -{ - - while(1) - { - current_time = xTaskGetTickCount(); - - if(joinlink_finished) - { - printf("joinlink finished\n"); - break; - } - - if((current_time - start_time) > JOINLINK_TIME * configTICK_RATE_HZ) - { - printf("joinlink timeout\n"); - break; - } - - vTaskDelay(500); - } - - joinlink_finish(security_type); - - vTaskDelete(NULL); - return; -} - -int joinlink_init_content() -{ - - int ret = 0; - ret = joinlink_init(); - if(ret < 0){ - printf("JoinLink init failed!\n"); - return ret; - } - memset(phase1_scanned_channel, 0, sizeof(phase1_scanned_channel)); - security_type = 0xff; - cur_channel = 1; - lock_channel = 1; - joinlink_finished = 0; - jl_rx_flag = 0; - p_result = NULL; - all_channel_ret = 0; - phase1_finished = 0; - phase2_started = 0; - idx = 1; - rtw_init_sema(&pre_scan_sema, 0); - memset(ap_bssid, 0, sizeof(ap_bssid)); - set_aes_key(aes_key, sizeof(aes_key) - 1); - - return 0; -} - -// ret:1 indicate suc, else fail -int scan_all_channel() -{ - all_channel_scan_result = (rtw_scan_result_t *)joinlink_all_scan(); - - if(all_channel_scan_result == NULL) - return 0; - else - return 1; - -} - -void get_phase1_channel() -{ - p_result = all_channel_scan_result; - while(p_result->channel) - { - if((p_result->channel >= 1) && (p_result->channel <= 13)) - phase1_scanned_channel[p_result->channel] = 1; - p_result++; - } - return; -} - -// now only accept mcast and bcast pkt -static void filter_add_enable() -{ - u8 mask[MASK_SIZE_JOINLINK]={0xFF,0xFF,0xFF}; - u8 pattern[MASK_SIZE_JOINLINK]={0x01,0x00,0x5e}; - u8 pattern_bcast[MASK_SIZE_JOINLINK]={0xff,0xff,0xff}; - - rtw_packet_filter_pattern_t packet_filter; - rtw_packet_filter_pattern_t packet_filter_bcast; - rtw_packet_filter_rule_e rule; - - packet_filter.offset = 0; - packet_filter.mask_size = 3; - packet_filter.mask = mask; - packet_filter.pattern = pattern; - - packet_filter_bcast.offset = 0; - packet_filter_bcast.mask_size = 3; - packet_filter_bcast.mask = mask; - packet_filter_bcast.pattern = pattern_bcast; - - rule = RTW_POSITIVE_MATCHING; - - wifi_init_packet_filter(); - wifi_add_packet_filter(1, &packet_filter,rule); - wifi_add_packet_filter(2, &packet_filter_bcast,rule); - - wifi_enable_packet_filter(1); - wifi_enable_packet_filter(2); -} - - -void joinlink_start(void *param) -{ - joinlink_finished = 0; - start_time = xTaskGetTickCount(); - - if(xTaskCreate(joinlink_process, (char const *)"JoinLink", 1512, NULL, tskIDLE_PRIORITY + 2, NULL) != pdPASS) - printf("%s xTaskCreate failed\n", __FUNCTION__); - - if (joinlink_init_content() < 0) - printf("joinlink init fail!\n"); - while(1) - { - if(wifi_is_ready_to_transceive(RTW_STA_INTERFACE) == RTW_SUCCESS) - break; - else - vTaskDelay(3000); - } - all_channel_ret = scan_all_channel(); - - if (rtw_down_sema(&pre_scan_sema) == _FAIL) - printf("%s, Take Semaphore Fail\n", __FUNCTION__); - - //printf("\npre scan finished\n"); - - //set wifi to station mode,enable promisc mode and timer to change channel - wifi_enter_promisc_mode(); - filter_add_enable(); - - /* enable all 802.11 packets*/ - wifi_set_promisc(RTW_PROMISC_ENABLE, wifi_promisc_rx, 1); - - //init timer handler,and set timer hanler funcion - if(all_channel_ret) - { - printf("\nstart the phase1 scan\n"); - get_phase1_channel(); - rtw_init_timer(&timer_handler_phase1, NULL, &timer_handler_phase1_func, NULL, "phase1_timer"); - rtw_set_timer(&timer_handler_phase1, SSID_SWITCH_TIME); - } - else - { - printf("phase1 scan fail, start phase2 scan\n"); - rtw_init_timer(&timer_handler_phase2, NULL, &timer_handler_phase2_func, NULL, "phase2_timer"); - wifi_set_channel(cur_channel); - rtw_set_timer(&timer_handler_phase2, CHANNEL_SWITCH_TIME); - } - - vTaskDelete(NULL); - return; -} - -void example_joinlink(void) -{ - if(xTaskCreate(joinlink_start, (char const *)"JoinLink_entry", 1512, NULL, tskIDLE_PRIORITY + 2, NULL) != pdPASS) - printf("%s xTaskCreate failed\n", __FUNCTION__); -} \ No newline at end of file diff --git a/component/common/application/jd_joinlink/joinlink.c b/component/common/application/jd_joinlink/joinlink.c deleted file mode 100644 index 73be5ad..0000000 --- a/component/common/application/jd_joinlink/joinlink.c +++ /dev/null @@ -1,1100 +0,0 @@ -/******************************* joinlink **************************/ -//includes -#include "joinlink.h" - -// macro -#define NUM_MCAST 53 // the max len of pkt in mcast, original: 13 -#define NUM_BCAST 36 // the max number of index of bcast -#define HEAD_LEN 9 // sum(1 byte) + pwd_len(1 byte) + port(2 byte) + ip(4 byte) + ssid_len(1 byte) -#define NUM_IDX 10 // number of index in bcast -#define NUM_PKT 4 // number of packets for every index -#define SEQ_INCREMENT_ONE_BCAST 1 // only the increment of 1 in seq of pkt is accepted - -static char smac[6]; -static u8 decoded_state = 0; -static int joinlink_state_mcast = 0; -static int joinlink_state_bcast = 0; -static u8 sync_label_mcast = 0; -static u8 version_mcast = 0; -// every pkt has two byte -static u8 *raw_data_mcast = NULL; -static u8 *decrypted_data_mcast = NULL; -static u8 count_mcast = 0; -static u8 sum_mcast = 0; // the total len of ssid and pwd -static char pass_len = -1; -static u8 ssid_len = 0; -static u8 ssid_offset = 0; -static u8 odd_check = 0; -static u8 total_len_mcast = 0; -static u8 *recved_flag_mcast = NULL; -static u8 range_mcast[NUM_MCAST >> 3]; // the range for aes decryption -static u8 decryp_flag_mcast[NUM_MCAST >> 3]; - -static u8 sync_label_bcast = 0; -static u8 version_bcast_ready = 0; -static u8 version_bcast = 0; -static u8 count_in_idx_bcast = 0; -static u8 count_decoded_bcast = 0; -static unsigned short seq_now_bcast = 0; -static u8 locked_bssid_bcast[6]; -static u8 ssid_offset_bcast = 0; - -// for data phase in bcast -// 0: wating index pkt, 1: waiting info pkt -// TODO: need to fix bssid/ssid for bcast to filter unnecessary pkt -static u8 data_phase_state_bcast = 0; -static u8 *raw_data_bcast = NULL; -static u8 *decrypted_data_bcast = NULL; - -static u8 version_CRC = 0; -static u8 *decoded_flag_bcast = NULL; -static u8 current_idx_bcast = 0; - -static u8 sum_bcast = 0; -static char pass_len_bcast = -1; -static u8 ssid_len_bcast = 0; -static u8 fc_version_bcast = 0; -static u8 fc_data_bcast = 0; -static u8 idx_CRC = 0; -static u8 idx_data = 0; - -//store decode result of AP profile -joinlink_result_t *AP_profile = NULL; - -// AES decryption related -static u8 aes_iv[16]; -static u8 aes_key[16]; -static u8 ssid_range_mcast = 255; -static u8 decryp_data_buf[16]; -/* -ret: 0, success, -1, failure -*/ -int joinlink_init() -{ - decoded_state = 0; - joinlink_state_mcast = 0; - joinlink_state_bcast = 0; - sync_label_mcast = 0; - version_mcast = 0; - - raw_data_mcast = (u8 *)malloc(NUM_MCAST*2); - decrypted_data_mcast = (u8 *)malloc(NUM_MCAST*2); - recved_flag_mcast = (u8 *)malloc(NUM_MCAST); - raw_data_bcast = (u8 *)malloc(NUM_BCAST*NUM_PKT); - decrypted_data_bcast = (u8 *)malloc(NUM_BCAST*NUM_PKT); - decoded_flag_bcast = (u8 *)malloc(NUM_BCAST); - AP_profile = (joinlink_result_t *)malloc(sizeof(joinlink_result_t)); - - if(!raw_data_mcast || !decrypted_data_mcast || !recved_flag_mcast|| - !raw_data_bcast || !decrypted_data_bcast || !decoded_flag_bcast|| - !AP_profile) - { - printf("join_link: malloc memory fail\n"); - return -1; - } - - memset(raw_data_mcast, 0, NUM_MCAST*2); - count_mcast = 0; - sum_mcast = 0; - pass_len = -1; - ssid_len = 0; - ssid_offset = 0; - odd_check = 0; - total_len_mcast = 0; - memset(recved_flag_mcast, 0, NUM_MCAST); - - sync_label_bcast = 0; - version_bcast_ready = 0; - version_bcast = 0; - seq_now_bcast = 0; - memset(locked_bssid_bcast, 0, sizeof(locked_bssid_bcast)); - - data_phase_state_bcast = 0; - memset(raw_data_bcast, 0, NUM_BCAST*NUM_PKT); - version_CRC = 0; - count_in_idx_bcast = 0; - count_decoded_bcast = 0; - memset(decoded_flag_bcast, 0, NUM_BCAST); - current_idx_bcast = 0; - sum_bcast = 0; - pass_len_bcast = -1; - ssid_len_bcast = 0; - fc_version_bcast = 0; - fc_data_bcast = 0; - idx_CRC = 0; - idx_data = 0; - - memset(AP_profile, 0, sizeof(joinlink_result_t)); - memset(smac, 0, sizeof(smac)); - - memset(aes_iv, 0, sizeof(aes_iv)); - memset(aes_key, 0, sizeof(aes_key)); - memset(range_mcast, 0, sizeof(range_mcast)); - memset(decryp_flag_mcast, 0, sizeof(decryp_flag_mcast)); - ssid_range_mcast = 255; - memset(decrypted_data_mcast, 0, NUM_MCAST*2); - memset(decryp_data_buf, 0, sizeof(decryp_data_buf)); - memset(decrypted_data_bcast, 0, NUM_BCAST*NUM_PKT); - ssid_offset_bcast = 0; - - return 0; -} - -// set the aes_key, the max len should be 16 -int set_aes_key(char *key, int len) -{ - if (len <= 0 || len > 16) - return 0; - - memcpy(aes_key, key, len); - if (rtl_crypto_aes_cbc_init(aes_key, sizeof(aes_key)) != 0) - { - printf("AES CBC init failed\n"); - return 0; - } - printf("the AES key is set to %s\n", aes_key); - return 1; -} -// free memory -void joinlink_deinit() -{ - free(raw_data_mcast); - free(decrypted_data_mcast); - free(recved_flag_mcast); - free(raw_data_bcast); - free(decrypted_data_bcast); - free(decoded_flag_bcast); - free(AP_profile); - - raw_data_mcast = NULL; - decrypted_data_mcast = NULL; - recved_flag_mcast = NULL; - raw_data_bcast = NULL; - decrypted_data_bcast = NULL; - decoded_flag_bcast = NULL; - AP_profile = NULL; - - return; -} -// restart joinlink when error -static void joinlink_restart() -{ - joinlink_deinit(); - joinlink_init(); - return; -} -/* -ret: 0, failure; 1 true. -*/ -static int check_sync_mcast(u8 *da) -{ - if((da[3] == 0) && (da[4] == 1) && (da[5] >= 1) && (da[5] <= 3)) - { - sync_label_mcast |= 0x01 << (da[5] - 1); - if(sync_label_mcast == 0x07) - return 1; - else - return 0; - } - else - return 0; -} -// ret: 0, failure; 1 true -static int check_version_mcast(u8 *da) -{ - // 239.0.{Version}.4 - if((da[3] == 0) && (da[5] == 4)) - { - version_mcast = da[4]; - return 1; - } - else - return 0; -} - -static u8 getCrc(u8 *ptr, u8 len) -{ - u8 crc; - u8 i; - crc = 0; - while (len--) - { - crc ^= *ptr++; - for (i = 0; i < 8; i++) - { - if (crc & 0x01) - { - crc = (crc >> 1) ^ 0x8C; - } - else - crc >>= 1; - } - } - return crc; -} -// check whether received enough pkt to decrypt -static u8 decryp_ready(u8 range) -{ - int first = (range << 3) + 1; - u8 count = 0; - while(count < 8) - { - if(!recved_flag_mcast[first + count]) - return 0; - ++count; - } - return 1; -} -// ret: 0 suc, ret: -1 failure -static int decryp_data(u8 decryp_range) -{ - // before decryption dump - memset(decryp_data_buf, 0, sizeof(decryp_data_buf)); - - // this decrpytion API only accept 16 byte size - if (rtl_crypto_aes_cbc_decrypt(raw_data_mcast + (decryp_range << 4), 16, aes_iv, sizeof(aes_iv), decryp_data_buf) != 0 ) - { - printf("AES CBC decrypt failed\n"); - return -1; - } - memcpy(decrypted_data_mcast + (decryp_range << 4), decryp_data_buf, 16); - // dump encrypted and decrypted data -#if 0 - printf("range %d encryp data:", decryp_range); - for(int i = 0; i < 16; i++) - printf("0x%02x ", raw_data_mcast[(decryp_range << 4) + i]); - printf("\n"); - - printf("range %d decrypted to:", decryp_range); - for(int i = 0; i < 16; i++) - printf("0x%02x ", decrypted_data_mcast[(decryp_range << 4) + i]); - printf("\n"); -#endif - return 0; -} - -// for aes_cbc, need to remove the chain using xor -static void dechain_aes_mcast(u8 range) -{ - if(range != 0) - { - for(int i = 0; i < 16; i++) - decrypted_data_mcast[(range << 4) + i] ^= raw_data_mcast[(range - 1 << 4) + i]; - } - // dump data -#if 0 - printf("range %d dechained to: ", range); - for(int i = 0; i < 16; i++) - printf("0x%02x ", decrypted_data_mcast[(range << 4) + i]); - printf("\n"); -#endif - printf("mcast: block %d is dechained\n", range); - decryp_flag_mcast[range] = 2; - count_mcast += 8; - return; -} -/* -ret: 1, enough data; 0 error or not enough -239.{index}.{byte[i]}{byte[i+1]} -{index} = (CRCLSB*3bit) + (Index*5bit) -*/ -static int check_data_mcast(u8 *da) -{ - u8 raw_index = da[3]; - u8 CRC_index = (raw_index & 0x40) >> 6; - u8 idx = raw_index & 0x3f; - u8 first, second; - u8 range = 0; - int first_in_range = 0; - // check CRC - - // idx is invalid, start with 1 - if((idx > NUM_MCAST) || (idx < 1)) - return 0; - - // CRC check pass - if(((da[4] ^ da[5]) & 0x01) == CRC_index) - { - // already received - if(recved_flag_mcast[idx] == 1) - return 0; - - // new pkt - recved_flag_mcast[idx] = 1; - first = (idx -1) * 2; - second = first + 1; - - raw_data_mcast[first] = da[4]; - raw_data_mcast[second] = da[5]; - printf("mcast: new pkt, idx is %d\n", idx); - // range begins with 0, every 8 pkts belongs to 1 range,e.g idx: {1~8} -> range:0 - range = (idx - 1) >> 3; - // not enough pkt for decryption - if(!decryp_ready(range)) - return 0; - // start to decrypt - first_in_range = range << 4; - if(decryp_data(range) == -1) - { - // clear the received flag for this range - for (int i = 1; i < 9; i++) - recved_flag_mcast[first_in_range + i] = 0; - printf("decryped error in range %d\n",range); - return 0; - } - // decryption success here; - decryp_flag_mcast[range] = 1; - printf("mcast: block %d is decrypted\n", range); - - // this is the sum and pass_len - //if((idx == 1) && (!sum_mcast)) - if(range == 0) - { - dechain_aes_mcast(range); - - sum_mcast = decrypted_data_mcast[0]; - pass_len = decrypted_data_mcast[1]; - printf("mcast: sum_mcast 0x%02x pass_len %d \n",sum_mcast, pass_len); - - // check whether the pass_len is valid - if(pass_len < 0 || pass_len > 64) - { - printf("mcast: pass_len is wrong, clear\n"); - decryp_flag_mcast[range] = 0; - count_mcast -= 8; - for (int i = 1; i < 9; i++) - recved_flag_mcast[first_in_range + i] = 0; - return 0; - } - - // printf("[DEBUG]_mcast: the 2nd flag is %d\n", decryp_flag_mcast[range + 1]); - // check whether 2nd block is ready - if(decryp_flag_mcast[range + 1] == 1) - { - printf("here\n"); - dechain_aes_mcast(range + 1); - } - - if((pass_len & 0x01) == 0) - odd_check = 2; // even - else - odd_check = 1; // odd - // get the idx of pkt which contains the ssid_len info - ssid_offset = 1 + (u8)((8 + pass_len)/2); - ssid_range_mcast = (ssid_offset - 1) >> 3; - printf("ssid_offset %d ssid_range_mcast %d\n",ssid_offset, ssid_range_mcast); -#if 1 - // already dechained - if(decryp_flag_mcast[ssid_range_mcast] == 2) - { - if(total_len_mcast == 0) - { - if(ssid_len == 0) - { - if(odd_check == 2) - ssid_len = decrypted_data_mcast[2 * (ssid_offset - 1)]; - if(odd_check == 1) - ssid_len = decrypted_data_mcast[2 * (ssid_offset - 1) + 1]; - printf("ssid_len is %d\n",ssid_len); - } - total_len_mcast = (u8)((pass_len + ssid_len + HEAD_LEN + 1)/2); - printf("total_len_mcast is recalculated as %d\n",total_len_mcast); - } - } -#endif - } - // need to dechain for the 2nd and following block - else - { - if(decryp_flag_mcast[range - 1] > 0) - dechain_aes_mcast(range); - - if(decryp_flag_mcast[range + 1] == 1) - dechain_aes_mcast(range + 1); - - if(!decryp_flag_mcast[range - 1] && !decryp_flag_mcast[range + 1]) - return 0; - } - // 8 new pkts has been de chained for AES - - // set the ssid_len - if(ssid_range_mcast != 255 && decryp_flag_mcast[ssid_range_mcast] == 2) - { - if(ssid_len == 0) - { - if(odd_check == 2) - ssid_len = decrypted_data_mcast[2 * (ssid_offset - 1)]; - if(odd_check == 1) - ssid_len = decrypted_data_mcast[2 * (ssid_offset - 1) + 1]; - printf("ssid_len is %d\n",ssid_len); - } - } - - // set the total_len - if((pass_len != -1) && (ssid_len != 0)) - { - if(total_len_mcast == 0) - { - total_len_mcast = (u8)((pass_len + ssid_len + HEAD_LEN + 1)/2); - printf("total_len_mcast is calculated as %d\n",total_len_mcast); - } - } - - printf("total_len needed is %d already decrypted %d\n", total_len_mcast, count_mcast); - - if(!total_len_mcast) - { - if(count_mcast >= NUM_MCAST) - return 1; - else - return 0; - } - else - { - //printf("count_mcast is %d total_len_mcast is %d\n"); - if(count_mcast >= total_len_mcast) - { - // check CRC - u8 crc_ret = 0; - printf("enough decrypted pkt, start to check sum\n"); - if((pass_len + ssid_len) & 0x01) - crc_ret = getCrc(decrypted_data_mcast + 1, total_len_mcast * 2 - 1); - else - crc_ret = getCrc(decrypted_data_mcast + 1, total_len_mcast * 2 - 2); - - if(crc_ret == sum_mcast) - {printf("sum check pass\n"); return 1;} - else - { - printf("sum crc check failure, restart\n"); - joinlink_restart(); // fine tune: only restart the mcast part - return 0; - } - } - else - return 0; - } - } - // check CRC failure - else - { - //printf("CRC failure in mcast, getCrc is 0x%02x, CRC is 0x%02x\n",(da[4] ^ da[5]), CRC_index); - return 0; - } - -} -/* -ret: 0, failure; 1 true. -*/ -static int check_sync_bcast(int len) -{ - // make sure the bits larger than 9 is 0 - if(len >= 256) - return 0; - // only the least 9 bits are useful - len &= 0x01ff; - if((len >=1) && (len <=4)) - { - sync_label_bcast |= 0x01 << (len - 1); - if(sync_label_bcast == 0x0f) - return 1; - else - return 0; - } - else - return 0; -} - -/* -{0b10000*5bit}+{CRCLSB*4bit} -{0*1bit}{Version} - ret: 0, failure; 1 true - */ -static int check_version_bcast(int len, u8 i_fc) -{ - version_bcast = 0; - - if(!version_bcast_ready) - { - u8 version_pre_CRC = len & 0x0007; - u8 version_pre_data = (len & 0x01f8) >> 3; - - if(len >= 512) - return 0; - - if(version_pre_data == 0x20) - { - version_bcast_ready = 1; - version_CRC = version_pre_CRC; - // fix the direction(fromDS/toDS) to receive version info - fc_version_bcast = i_fc; - -// printf("get the CRC of version, change to wait version state\n"); - } - - return 0; - } - else - { - if(i_fc != fc_version_bcast) - return 0; - - if((len & 0xff00) != 0) - return 0; - - version_bcast = len & 0x00ff; - if((getCrc(&version_bcast,1) & 0x07) == version_CRC) - { - printf("version CRC pass\n"); - return 1; - } - else - { - //printf("version CRC failure,reset this state, version is 0x%02x calculated CRC is 0x%02x, CRC is 0x%02x\n", - // version_bcast, getCrc(&version_bcast,1), version_CRC); - version_bcast_ready = 0; - } - - } - return 0; -} - -/*ret 1: valid seq, ret 0: invalid seq*/ -static u8 check_and_update_seq(unsigned short frame_seq) -{ - int seq_delta = frame_seq - seq_now_bcast; - -#if SEQ_INCREMENT_ONE_BCAST - if((seq_delta == 1) || (seq_now_bcast == 4095) && (frame_seq == 0)) - { - seq_now_bcast = frame_seq; - return 1; - } - else - { - seq_now_bcast = frame_seq; - return 0; - } -#else - if(((seq_delta <= 10) && (seq_delta >= 0)) || - ((seq_now_bcast > 4085) && (seq_delta + 4096 <= 10) && (seq_delta + 4096 >= 0))) - { - seq_now_bcast = frame_seq; - //printf("valid seq, seq_delta %d seq_now is updated to %d\n", seq_delta, seq_now_bcast); - return 1; - } - else - { - seq_now_bcast = frame_seq; - //printf("invalid seq, seq_delta %d seq_now is updated to %d\n", seq_delta, seq_now_bcast); - return 0; - } -#endif -} -// idx starts with 1, every 4 is one decryption block -static int decryp_ready_bcast(u8 first_idx) -{ - for(int i = 0; i < 4; i++) - { - if(decoded_flag_bcast[first_idx + i] == 0) - return 0; - } - return 1; -} -// decryption for bcast -static int decryp_data_bcast(u8 idx) -{ - memset(decryp_data_buf, 0, sizeof(decryp_data_buf)); -// dump the encryption info -#if 0 - printf("before decryption of idx %d:", idx); - for(int i = 0; i < 16; i++) - printf("0x%02x ", raw_data_bcast[((idx >> 2) << 4) + i]); - printf("\n"); -#endif - - // this decrpytion API only accept 16 byte size - if (rtl_crypto_aes_cbc_decrypt(raw_data_bcast + ((idx >> 2) << 4), 16, aes_iv, sizeof(aes_iv), decryp_data_buf) != 0 ) - { - printf("AES CBC decrypt failed\n"); - return -1; - } - memcpy(decrypted_data_bcast + ((idx >> 2) << 4), decryp_data_buf, 16); - printf("bcast: blcok %d is decrypted\n", idx >> 2); -// dump the info after decryption -#if 0 - printf("after decryption of idx %d:", idx); - for(int i = 0; i < 16; i++) - printf("0x%02x ", decrypted_data_bcast[((idx >> 2) << 4) + i]); - printf("\n"); -#endif - - return 0; -} -// remove chain for aes cbc for bcast mode -static void dechain_aes_bcast(u8 idx) -{ - u8 first_idx = (idx >> 2) << 4; - if(idx != 1) - { - for(int i = 0; i < 16; i++) - decrypted_data_bcast[first_idx + i] ^= raw_data_bcast[first_idx - 16 + i]; - } - count_decoded_bcast += 4; - // set the dechained flag - for(int i = 0; i < 4; i++) - decoded_flag_bcast[idx + i] = 3; - // dump the info after dechain -#if 0 - printf("idx %d is de chained to: ", idx); - for(int i = 0; i < 16; i++) - printf("0x%02x ", decrypted_data_bcast[first_idx + i]); - printf("\n"); -#endif - printf("bcast: block %d is dechained\n", idx >> 2); - return; -} - -/* -{EncodeIndex*5bit}+{CRCLSB*4bit} -{0*1bit}{Byte(i+0) *8bit} -{0*1bit}{Byte(i+1) *8bit} -{0*1bit}{Byte(i+2) *8bit} -{0*1bit}{Byte(i+3) *8bit} -*/ -static int check_data_bcast(int len, u8 i_fc, unsigned short frame_seq, unsigned const char *temp_bssid) -{ - // waiting index pkt - if(!data_phase_state_bcast) - { - - // make sure the 9th bit is 1 and bit larger than 9 is 0 - if(((len & 0x0fff) >= 512) || ((len & 0x0fff) <= 256)) - return 0; - // idx_data is increase from 1, not 0 - idx_data = (len & 0x00f8) >> 3; - if(idx_data == 0) - return 0; - - if(idx_data > NUM_BCAST) - { - printf("index is too large\n"); - return 0; - } - - // already decoded this idx - if(decoded_flag_bcast[idx_data] >= 1) - return 0; - else - { - current_idx_bcast = idx_data; - count_in_idx_bcast = 0; - data_phase_state_bcast = 1; - idx_CRC = len & 0x0007; - seq_now_bcast = frame_seq; - //printf("idx_CRC is 0x%02x len is 0x%02x\n",idx_CRC, len); - fc_data_bcast = i_fc; - //printf("waiting data pkt of idx %d, locked in i_fc %d, seq_now %d\n", - // current_idx_bcast,fc_data_bcast,seq_now_bcast); - return 0; - } - - } - // waiting info pkt - else - { - u8 array_idx = 0; - // check whether the data is valid, the 9th bit should be 0 - if(len >= 256) - { - //printf("not info pkt\n"); - return 0; - } - - // only receive the data from the previous idx direction - if(i_fc != fc_data_bcast) - return 0; - - array_idx = 4 * (current_idx_bcast - 1); - - //printf("from bssid 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x 0x%02x\n", - // temp_bssid[0],temp_bssid[1],temp_bssid[2],temp_bssid[3],temp_bssid[4],temp_bssid[5]); - // check whether seq is valid - if(check_and_update_seq(frame_seq) == 0) - { - //memset(raw_data_bcast + array_idx, 0, 4); - data_phase_state_bcast = 0; - return 0; - } - - raw_data_bcast[array_idx + count_in_idx_bcast] = len & 0x00ff; - count_in_idx_bcast++; - - //printf("len 0x%02x, info 0x%02x, i_fc %d i_seq %d\n",len, len & 0x00ff, i_fc, frame_seq); - if(count_in_idx_bcast != NUM_PKT) - return 0; - else - { - u8 temp_ret = 0; - u8 first_idx = 0; - -#if 0 - printf("enough data pkt for idx, check CRC\n",current_idx_bcast); - printf("data to be decoded in idx %d: 0x%02x 0x%02x 0x%02x 0x%02x\n",current_idx_bcast, - *(raw_data_bcast + array_idx),*(raw_data_bcast + array_idx + 1), - *(raw_data_bcast + array_idx + 2),*(raw_data_bcast + array_idx + 3)); -#endif - - // assume first encryption and then CRC, so CRC check first and then decryption for receiver. - temp_ret = getCrc(raw_data_bcast + array_idx, 4) & 0x07; - //printf("calculated CRC is 0x%02x true CRC is 0x%02x\n",temp_ret, idx_CRC); - // CRC pass - if(temp_ret == idx_CRC) - { - printf("bcast: idx %d is decoded\n",current_idx_bcast); - // the first idx in every decryption block - first_idx = 1 + ((current_idx_bcast - 1 >> 2) << 2); - // set the flag of this idx to 1, indicate pass CRC but not yet to decrypt - decoded_flag_bcast[current_idx_bcast] = 1; - // not enough neighbor idx for decryption - if(decryp_ready_bcast(first_idx) == 0) - return 0; - - if(decryp_data_bcast(first_idx) == -1) - { - for(int i = 0; i < 4; i++) - decoded_flag_bcast[first_idx + i] = 0; - // clear the 4 idx data in this block; - memset(raw_data_bcast + ((current_idx_bcast - 1 >> 2) << 4), 0, 16); - data_phase_state_bcast = 0; - return 0; - } - // decryption PASS - // set the decryption flag - for(int i = 0; i < 4; i++) - decoded_flag_bcast[first_idx + i] = 2; - - // if 1st block, get the pass_len - if(current_idx_bcast <= 4) - { - dechain_aes_bcast(first_idx); - sum_bcast = *decrypted_data_bcast; - pass_len_bcast = *(decrypted_data_bcast + 1); - // make sure the pass len is in the right range {0,63} - if((pass_len_bcast > 63) || (pass_len_bcast < 0)) - { - printf("pass_len is wrong, clear\n"); - for(int i = 0; i < 4; i++) - decoded_flag_bcast[first_idx + i] = 0; - count_decoded_bcast -= 4; - // clear the 4 idx data in this block; - memset(raw_data_bcast + ((current_idx_bcast - 1 >> 2) << 4), 0, 16); - data_phase_state_bcast = 0; - return 0; - } - printf("sum_bcast is %d pass_len_bcast is %d\n",sum_bcast, pass_len_bcast); - // recalculate ssid_len if the idx containning ssid_len is already decoded - - // to de chain the neighbor block - if(decryp_ready_bcast(first_idx + 4)) - dechain_aes_bcast(first_idx + 4); - - ssid_offset_bcast = (8 + pass_len_bcast)/4 + 1; - if(decoded_flag_bcast[ssid_offset_bcast] == 3) - { - ssid_len_bcast = *(decrypted_data_bcast + 8 + pass_len_bcast); - // check whether ssid len is in the right range {0,32} - if(ssid_len_bcast > 32) - { - //memset(raw_data_bcast + 4 * (2 + pass_len_bcast/4), 0, 4); - data_phase_state_bcast = 0; - for(int i = 0; i < 4; i++) - decoded_flag_bcast[(ssid_len_bcast - 1 >> 2) + i] = 0; - count_decoded_bcast -= 4; - printf("ssid_len_bcast is wrong, clear idx %d\n", ((8 + pass_len_bcast)/4 + 1)); - return 0; - } - printf("recalculated ssid_len_bcast is %d\n",ssid_len_bcast); - } - } - // for the 2nd and following block, need the preceeding block to de chain - else - { - if(decryp_ready_bcast(first_idx - 4)) - dechain_aes_bcast(first_idx); - - if(decryp_ready_bcast(first_idx + 4)) - dechain_aes_bcast(first_idx + 4); - - if(!decryp_ready_bcast(first_idx - 4) && !decryp_ready_bcast(first_idx + 4)) - return 0; - } - // check whether ssid_len idx has been dechained - for(int i = 0; i < 4; i++) - { - if((pass_len_bcast != -1) && (decoded_flag_bcast[ssid_offset_bcast] == 3)) - { - ssid_len_bcast = *(decrypted_data_bcast + 8 + pass_len_bcast); - // make sure ssid_len is valid in the range {0, 32} - if(ssid_len_bcast > 32) - { - //memset(raw_data_bcast + 4 * (2 + pass_len_bcast/4), 0, 4); - data_phase_state_bcast = 0; - for(int i = 0; i < 4; i++) - decoded_flag_bcast[(ssid_offset_bcast >> 2) << 2 + i + 1] = 0; - count_decoded_bcast -= 4; - printf("ssid_len_bcast is wrong\n"); - return 0; - } - printf("ssid_len_bcast is %d\n",ssid_len_bcast); - break; - } - } - // check whether enough - if((ssid_len_bcast != 0) && (pass_len_bcast != -1)) - { - u8 total_len_bcast = HEAD_LEN + ssid_len_bcast + pass_len_bcast; - printf("needed %d pkt, decoded %d\n",(u8)((total_len_bcast + 3)/4),count_decoded_bcast); - if(count_decoded_bcast >= (u8)((total_len_bcast + 3)/4)) - { - printf("enough decoded packets, start to check sum\n"); - if(getCrc(decrypted_data_bcast + 1,total_len_bcast - 1) == sum_bcast) - { - printf("sum check pass in bcast\n"); - return 1; - } - else - { - //printf("bcast sum check failure, restart\n"); - joinlink_restart(); // fine tune: only restart the bcast part - return 0; - } - } - } - - data_phase_state_bcast = 0; - } - else - { - memset(raw_data_bcast + 4 * (current_idx_bcast - 1), 0, 4); - data_phase_state_bcast = 0; - printf("CRC failure of idx %d\n",current_idx_bcast); - return 0; - } - } - - } - - return 0; -} -/* -ret: 0, failure, 1 true -if success, assign the AP profile to a structure. -*/ -static int decode_AP_profile(u8 *raw_data) -{ - int pos = 0; - - AP_profile->sum = raw_data[pos]; - pos++; - printf("AP_profile: sum %d\n",AP_profile->sum); - - AP_profile->pwd_length = raw_data[pos]; - pos++; - printf("AP_profile: pwd_len %d\n",AP_profile->pwd_length); - - if(AP_profile->pwd_length > 64) - { - printf("the pwd len: %d, larger than 64\n",AP_profile->pwd_length); - return 0; - } - - memcpy(AP_profile->pwd, (raw_data + pos), AP_profile->pwd_length); - pos += AP_profile->pwd_length; - printf("AP_profile: pwd %s\n",AP_profile->pwd); - - AP_profile->source_ip[0] = *(raw_data + pos); - AP_profile->source_ip[1] = *(raw_data + pos + 1); - AP_profile->source_ip[2] = *(raw_data + pos + 2); - AP_profile->source_ip[3] = *(raw_data + pos + 3); - - pos += 4; - printf("AP_profile: sip %d %d %d %d\n",AP_profile->source_ip[0], - AP_profile->source_ip[1], - AP_profile->source_ip[2], - AP_profile->source_ip[3]); - // assume the high byte is the most significant - #if 1 - AP_profile->source_port = ((unsigned int)(*(raw_data + pos + 1)) << 8) | (*(raw_data + pos)); - //printf("port high_part, low_part: %d %d\n", *(raw_data + pos + 1), *(raw_data + pos)); - #endif - - pos += 2; - printf("AP_profile: port %d\n",AP_profile->source_port); - - AP_profile->ssid_length = *(raw_data + pos); - pos++; - printf("AP_profile: ssid_len %d\n",AP_profile->ssid_length); - - if(AP_profile->ssid_length > 64) - { - printf("the ssid len: %d, larger than 64\n",AP_profile->ssid_length); - return 0; - } - memcpy(AP_profile->ssid, (raw_data + pos), AP_profile->ssid_length); - printf("AP_profile: ssid %s\n",AP_profile->ssid); - - return 1; -} - -joinlink_status_t joinlink_recv(u8 *da, u8 *sa, int len, void *user_data) -{ - joinlink_status_t ret; - const ieee80211_frame_info_t *promisc_info = user_data; - // 1 from ds, 2 to ds - u8 i_fc = ((promisc_info->i_fc & 0x0100) == 0x0100)? 2: 1; - unsigned short frame_seq = promisc_info->i_seq; - unsigned const char *temp_bssid = promisc_info->bssid; - - // for mcast - if(!((da[0] == 0xff) && (da[1] == 0xff) && (da[2] == 0xff) && - (da[3] == 0xff) && (da[4] == 0xff) && (da[5] == 0xff))) - { - if(joinlink_state_mcast == 0) - { - if(!check_sync_mcast(da)) - return JOINLINK_STATUS_CONTINUE; - else - { - // TODO: consider to fix source mac here - joinlink_state_mcast = 1; - memcpy(smac, sa, 6); - printf("turn to wait version state\n"); - return JOINLINK_STATUS_CONTINUE; - } - - } - else if(joinlink_state_mcast == 1) - { - // only accept the pkt from fixed source mac - if(memcmp(smac, sa, 6)) - return JOINLINK_STATUS_CONTINUE; - - if(!check_version_mcast(da)) - return JOINLINK_STATUS_CONTINUE; - else - { - joinlink_state_mcast = 2; - printf("mcast version is %d\n",version_mcast); - printf("turn to wait data state\n"); - return JOINLINK_STATUS_CHANNEL_LOCKED; - } - } - else if(joinlink_state_mcast == 2) - { - if(memcmp(smac, sa, 6)) - return JOINLINK_STATUS_CONTINUE; - - if(!check_data_mcast(da)) - return JOINLINK_STATUS_CONTINUE; - else - { - printf("enough packets, start to decode AP profile\n"); - // AP profile has been gotten - if(!decode_AP_profile(decrypted_data_mcast)) - { - printf("decode failure, restart joinlink\n"); - joinlink_restart(); - //TODO: intialize the data structure to restart receive data - return JOINLINK_STATUS_CONTINUE; - } - else - { - decoded_state = 1; - return JOINLINK_STATUS_COMPLETE; - } - } - } - } - // for bcast - else - { - len -= 42; // remove the unnecessary part - - if(joinlink_state_bcast == 0) - { - if(!check_sync_bcast(len)) - return JOINLINK_STATUS_CONTINUE; - else - { - // fix the smac and bssid - memcpy(smac, sa, 6); - memcpy(locked_bssid_bcast, temp_bssid, 6); - joinlink_state_bcast = 1; - printf("change to bcast_state_1, lock channel\n"); - return /*JOINLINK_STATUS_CONTINUE*/JOINLINK_STATUS_CHANNEL_LOCKED; - } - - } - else if(joinlink_state_bcast == 1) - { - if(memcmp(smac, sa, 6) || memcmp(temp_bssid, locked_bssid_bcast, 6)) - return JOINLINK_STATUS_CONTINUE; - - if(!check_version_bcast(len, i_fc)) - return JOINLINK_STATUS_CONTINUE; - else - { - joinlink_state_bcast = 2; - printf("change to bcast_state_2\n"); - return /*JOINLINK_STATUS_CHANNEL_LOCKED*/JOINLINK_STATUS_CONTINUE; - } - } - else if(joinlink_state_bcast == 2) - { - if(memcmp(smac, sa, 6) || memcmp(temp_bssid, locked_bssid_bcast, 6)) - return JOINLINK_STATUS_CONTINUE; - - if(!check_data_bcast(len, i_fc, frame_seq, temp_bssid)) - return JOINLINK_STATUS_CONTINUE; - else - { - // AP profile has been gotten - if(!decode_AP_profile(decrypted_data_bcast)) - { - printf("decode failure, restart joinlink\n"); - //TODO: intialize the data structure to restart receive data - return JOINLINK_STATUS_CONTINUE; - } - else - { - decoded_state = 1; - return JOINLINK_STATUS_COMPLETE; - } - } - } - } - ret = JOINLINK_STATUS_CONTINUE; - return ret; -} - -/* - * copy the decode AP info to user space -* store the AP profile to result; -* ret: 0, success -* ret: -1, failure - */ -int joinlink_get_result(joinlink_result_t *result) -{ - if(decoded_state == 0) - return -1; - else - { - memcpy(result, AP_profile, sizeof(joinlink_result_t)); - return 0; - } -} - - - -/*********************************************************/ diff --git a/component/common/application/jd_joinlink/joinlink.h b/component/common/application/jd_joinlink/joinlink.h deleted file mode 100644 index 5c3b151..0000000 --- a/component/common/application/jd_joinlink/joinlink.h +++ /dev/null @@ -1,64 +0,0 @@ -/******************************* joinlink **************************/ -#ifndef __JOINLINK_H -#define __JOINLINK_H - -#include "autoconf.h" -#include "platform_stdlib.h" -#include "wifi_conf.h" -#include "wifi_structures.h" -#include "osdep_service.h" -#include "lwip_netconf.h" -#include "task.h" -#include "hal_crypto.h" - -#define SSID_SWITCH_TIME 500 //ssid switch time in phase1,units:ms, 50 -#define CHANNEL_SWITCH_TIME 500 //channel switch time in phase2,units:ms, 50 -#define JOINLINK_TIME 120 //timeout for joinlink process, units: s - -/* - * store AP profile after successfully decode - * SUM +£¨length£¬pass£©+£¨IP+Port£©+£¨length£¬SSID) - */ -typedef struct -{ - unsigned char sum; - unsigned char pwd_length; - char pwd[65]; - int source_ip[4]; - unsigned int source_port; - unsigned char ssid_length; - char ssid[65]; -} joinlink_result_t; - -/* - * return value of joinlink_recv() - */ -typedef enum -{ - JOINLINK_STATUS_CONTINUE = 0, - JOINLINK_STATUS_CHANNEL_LOCKED = 1, - JOINLINK_STATUS_COMPLETE = 2 -} joinlink_status_t; - -//initialize the related data structure -int joinlink_init(); -/* - handler to decode pkt - */ -joinlink_status_t joinlink_recv(unsigned char *da, unsigned char *sa, int len, void *user_data); - -/* - * get the AP profile after decode - */ -int joinlink_get_result(joinlink_result_t *result); - -/* - * set the aes_key, the max len should be 16 - * ret 1: success; ret 0: the len is invalid; - */ -int set_aes_key(char *key, int len); - -// call this after finish join_link process -void joinlink_deinit(); - -#endif //__JOINLINK_H