aboutsummaryrefslogtreecommitdiffstats
path: root/package/acx-mac80211/Makefile
blob: 51a6ce37ffadfcaffc0aad187732656fd568dad6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
# 
# Copyright (C) 2007 OpenWrt.org
#
# This is free software, licensed under the GNU General Public License v2.
# See /LICENSE for more information.
#
# $Id$

include $(TOPDIR)/rules.mk
include $(INCLUDE_DIR)/kernel.mk

PKG_NAME:=acx-mac80211
PKG_VERSION:=20070718
PKG_RELEASE:=1

PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.bz2
PKG_SOURCE_URL:=http://teknoraver.campuslife.it/software/acx-mac80211/
PKG_MD5SUM:=c6f339384c8ad17181a9f867a227ddae

PKG_FW_NAME:=tiacx111c16
PKG_FW_URL:=http://teknoraver.campuslife.it/software/acx-mac80211/
PKG_FW_MD5SUM:=7026826460376f6b174f9225bd7781b9

include $(INCLUDE_DIR)/package.mk
ifeq ($(DUMP),)
  include $(LINUX_DIR)/.config
endif

# XXX: remove @!TARGET_* later when we have PCI support properly detected on all targets
define KernelPackage/acx-mac80211
  SUBMENU:=Wireless Drivers
  TITLE:=ACX111 Mac80211 driver
  DESCRIPTION:=Driver for acx111 cards (Mac80211 version)
  DEPENDS:=@LINUX_2_6 +kmod-mac80211 @!TARGET_atheros
  KCONFIG:=CONFIG_MAC80211
  FILES:=$(PKG_BUILD_DIR)/acx-mac80211.$(LINUX_KMOD_SUFFIX)
  AUTOLOAD:=$(call AutoLoad,50,acx-mac80211)
endef

$(STAMP_BUILT): $(DL_DIR)/$(PKG_FW_NAME)

$(DL_DIR)/$(PKG_FW_NAME):
	$(SCRIPT_DIR)/download.pl "$(DL_DIR)" "$(PKG_FW_NAME)" "$(PKG_FW_MD5SUM)" $(PKG_FW_URL)

ifneq ($(CONFIG_MAC80211),)

  PKG_EXTRA_KCONFIG:= \
	CONFIG_ACX_MAC80211=m \
	CONFIG_ACX_MAC80211_PCI=m \

  PKG_EXTRA_CFLAGS:= \
	-I$(STAGING_DIR)/usr/include/mac80211 \
	$(patsubst CONFIG_%, -DCONFIG_%=1, $(patsubst %=m,%,$(filter %=m,$(PKG_EXTRA_KCONFIG)))) \
	$(patsubst CONFIG_%, -DCONFIG_%=1, $(patsubst %=y,%,$(filter %=y,$(PKG_EXTRA_KCONFIG)))) \

  define Build/Compile/it
	$(MAKE) -C "$(LINUX_DIR)" \
		ARCH="$(LINUX_KARCH)" \
		CROSS_COMPILE="$(TARGET_CROSS)" \
		SUBDIRS="$(PKG_BUILD_DIR)" \
		$(PKG_EXTRA_KCONFIG) \
		EXTRA_CFLAGS="$(PKG_EXTRA_CFLAGS)" \
		V="$(V)" \
		modules
  endef

endif

define Build/Configure
endef

define Build/Compile
$(call Build/Compile/it)
endef

define KernelPackage/acx-mac80211/install
	$(INSTALL_DIR) $(1)/lib/firmware
	$(INSTALL_DATA) $(DL_DIR)/$(PKG_FW_NAME) $(1)/lib/firmware/
endef

$(eval $(call KernelPackage,acx-mac80211))
class="cm"> * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, * MA 02110-1301 USA */ #include <sys/types.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <time.h> #include <limits.h> #include <unistd.h> #include <fcntl.h> #include <stdbool.h> #include <polarssl/bignum.h> #include <polarssl/x509_crt.h> #include <polarssl/rsa.h> #define PX5G_VERSION "0.2" #define PX5G_COPY "Copyright (c) 2009 Steven Barth <steven@midlink.org>" #define PX5G_LICENSE "Licensed under the GNU Lesser General Public License v2.1" static int urandom_fd; static char buf[16384]; static int _urandom(void *ctx, unsigned char *out, size_t len) { read(urandom_fd, out, len); return 0; } static void write_file(const char *path, int len, bool pem) { FILE *f = stdout; const char *buf_start = buf; if (!pem) buf_start += sizeof(buf) - len; if (!len) { fprintf(stderr, "No data to write\n"); exit(1); } if (!f) { fprintf(stderr, "error: I/O error\n"); exit(1); } if (path) f = fopen(path, "w"); fwrite(buf_start, 1, len, f); fclose(f); } static void write_key(pk_context *key, const char *path, bool pem) { int len = 0; if (pem) { if (pk_write_key_pem(key, (void *) buf, sizeof(buf)) == 0) len = strlen(buf); } else { len = pk_write_key_der(key, (void *) buf, sizeof(buf)); if (len < 0) len = 0; } write_file(path, len, pem); } static void gen_key(pk_context *key, int ksize, int exp, bool pem) { pk_init(key); pk_init_ctx(key, pk_info_from_type(POLARSSL_PK_RSA)); fprintf(stderr, "Generating RSA private key, %i bit long modulus\n", ksize); if (rsa_gen_key(pk_rsa(*key), _urandom, NULL, ksize, exp)) { fprintf(stderr, "error: key generation failed\n"); exit(1); } } int rsakey(char **arg) { pk_context key; unsigned int ksize = 512; int exp = 65537; char *path = NULL; bool pem = true; while (*arg && **arg == '-') { if (!strcmp(*arg, "-out") && arg[1]) { path = arg[1]; arg++; } else if (!strcmp(*arg, "-3")) { exp = 3; } else if (!strcmp(*arg, "-der")) { pem = false; } arg++; } if (*arg) ksize = (unsigned int)atoi(*arg); gen_key(&key, ksize, exp, pem); write_key(&key, path, pem); pk_free(&key); return 0; } int selfsigned(char **arg) { pk_context key; x509write_cert cert; mpi serial; char *subject = ""; unsigned int ksize = 512; int exp = 65537; unsigned int days = 30; char *keypath = NULL, *certpath = NULL; bool pem = true; time_t from = time(NULL), to; char fstr[20], tstr[20], sstr[17]; int len; while (*arg && **arg == '-') { if (!strcmp(*arg, "-der")) { pem = false; } else if (!strcmp(*arg, "-newkey") && arg[1]) { if (strncmp(arg[1], "rsa:", 4)) { fprintf(stderr, "error: invalid algorithm"); return 1; } ksize = (unsigned int)atoi(arg[1] + 4); arg++; } else if (!strcmp(*arg, "-days") && arg[1]) { days = (unsigned int)atoi(arg[1]); arg++; } else if (!strcmp(*arg, "-keyout") && arg[1]) { keypath = arg[1]; arg++; } else if (!strcmp(*arg, "-out") && arg[1]) { certpath = arg[1]; arg++; } else if (!strcmp(*arg, "-subj") && arg[1]) { if (arg[1][0] != '/' || strchr(arg[1], ';')) { fprintf(stderr, "error: invalid subject"); return 1; } subject = calloc(strlen(arg[1]) + 1, 1); char *oldc = arg[1] + 1, *newc = subject, *delim; do { delim = strchr(oldc, '='); if (!delim) { fprintf(stderr, "error: invalid subject"); return 1; } memcpy(newc, oldc, delim - oldc + 1); newc += delim - oldc + 1; oldc = delim + 1; delim = strchr(oldc, '/'); if (!delim) { delim = arg[1] + strlen(arg[1]); } memcpy(newc, oldc, delim - oldc); newc += delim - oldc; *newc++ = ','; oldc = delim + 1; } while(*delim); arg++; } arg++; } gen_key(&key, ksize, exp, pem); if (keypath) write_key(&key, keypath, pem); from = (from < 1000000000) ? 1000000000 : from; strftime(fstr, sizeof(fstr), "%Y%m%d%H%M%S", gmtime(&from)); to = from + 60 * 60 * 24 * days; if (to < from) to = INT_MAX; strftime(tstr, sizeof(tstr), "%Y%m%d%H%M%S", gmtime(&to)); fprintf(stderr, "Generating selfsigned certificate with subject '%s'" " and validity %s-%s\n", subject, fstr, tstr); x509write_crt_init(&cert); x509write_crt_set_md_alg(&cert, POLARSSL_MD_SHA1); x509write_crt_set_issuer_key(&cert, &key); x509write_crt_set_subject_key(&cert, &key); x509write_crt_set_subject_name(&cert, subject); x509write_crt_set_issuer_name(&cert, subject); x509write_crt_set_validity(&cert, fstr, tstr); x509write_crt_set_basic_constraints(&cert, 0, -1); x509write_crt_set_subject_key_identifier(&cert); x509write_crt_set_authority_key_identifier(&cert); _urandom(NULL, buf, 8); for (len = 0; len < 8; len++) sprintf(sstr + len*2, "%02x", (unsigned char) buf[len]); mpi_init(&serial); mpi_read_string(&serial, 16, sstr); x509write_crt_set_serial(&cert, &serial); if (pem) { if (x509write_crt_pem(&cert, (void *) buf, sizeof(buf), _urandom, NULL) < 0) { fprintf(stderr, "Failed to generate certificate\n"); return 1; } len = strlen(buf); } else { len = x509write_crt_der(&cert, (void *) buf, sizeof(buf), _urandom, NULL); if (len < 0) { fprintf(stderr, "Failed to generate certificate: %d\n", len); return 1; } } write_file(certpath, len, pem); x509write_crt_free(&cert); mpi_free(&serial); pk_free(&key); return 0; } int main(int argc, char *argv[]) { urandom_fd = open("/dev/urandom", O_RDONLY); if (!argv[1]) { //Usage } else if (!strcmp(argv[1], "rsakey")) { return rsakey(argv+2); } else if (!strcmp(argv[1], "selfsigned")) { return selfsigned(argv+2); } fprintf(stderr, "PX5G X.509 Certificate Generator Utility v" PX5G_VERSION "\n" PX5G_COPY "\nbased on PolarSSL by Christophe Devine and Paul Bakker\n\n"); fprintf(stderr, "Usage: %s [rsakey|selfsigned]\n", *argv); return 1; }