⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 driver_bsd.c

📁 hostapd无线AP工具
💻 C
📖 第 1 页 / 共 2 页
字号:
/* * Host AP - driver interaction with BSD net80211 layer * Copyright (c) 2004, Sam Leffler <sam@errno.com> * Copyright (c) 2004, 2Wire, Inc * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#include <stdlib.h>#include <stdio.h>#include <unistd.h>#include <string.h>#include <sys/ioctl.h>#include <errno.h>#include <sys/socket.h>#include <net/if.h>#include <netinet/in.h>#include <net80211/ieee80211.h>#include <net80211/ieee80211_crypto.h>#include <net80211/ieee80211_ioctl.h>#include "hostapd.h"#include "driver.h"#include "ieee802_1x.h"#include "eloop.h"#include "sta_info.h"#include "l2_packet.h"#include "eapol_sm.h"#include "wpa.h"#include "radius.h"#include "ieee802_11.h"#include "common.h"struct bsd_driver_data {	struct driver_ops ops;			/* base class */	struct hostapd_data *hapd;		/* back pointer */	char	iface[IFNAMSIZ + 1];	struct l2_packet_data *sock_xmit;	/* raw packet xmit socket */	int	ioctl_sock;			/* socket for ioctl() use */	int	wext_sock;			/* socket for wireless events */};static const struct driver_ops bsd_driver_ops;static int bsd_sta_deauth(void *priv, u8 *addr, int reason_code);static intset80211var(struct bsd_driver_data *drv, int op, const void *arg, int arg_len){	struct ieee80211req ireq;	memset(&ireq, 0, sizeof(ireq));	strncpy(ireq.i_name, drv->iface, IFNAMSIZ);	ireq.i_type = op;	ireq.i_len = arg_len;	ireq.i_data = (void *) arg;	if (ioctl(drv->ioctl_sock, SIOCS80211, &ireq) < 0) {		perror("ioctl[SIOCS80211]");		return -1;	}	return 0;}static intget80211var(struct bsd_driver_data *drv, int op, void *arg, int arg_len){	struct ieee80211req ireq;	memset(&ireq, 0, sizeof(ireq));	strncpy(ireq.i_name, drv->iface, IFNAMSIZ);	ireq.i_type = op;	ireq.i_len = arg_len;	ireq.i_data = arg;	if (ioctl(drv->ioctl_sock, SIOCG80211, &ireq) < 0) {		perror("ioctl[SIOCG80211]");		return -1;	}	return ireq.i_len;}static intset80211param(struct bsd_driver_data *drv, int op, int arg){	struct ieee80211req ireq;	memset(&ireq, 0, sizeof(ireq));	strncpy(ireq.i_name, drv->iface, IFNAMSIZ);	ireq.i_type = op;	ireq.i_val = arg;	if (ioctl(drv->ioctl_sock, SIOCS80211, &ireq) < 0) {		perror("ioctl[SIOCS80211]");		return -1;	}	return 0;}static const char *ether_sprintf(const u8 *addr){	static char buf[sizeof(MACSTR)];	if (addr != NULL)		snprintf(buf, sizeof(buf), MACSTR, MAC2STR(addr));	else		snprintf(buf, sizeof(buf), MACSTR, 0,0,0,0,0,0);	return buf;}/* * Configure WPA parameters. */static intbsd_configure_wpa(struct bsd_driver_data *drv){	static const char *ciphernames[] =		{ "WEP", "TKIP", "AES-OCB", "AES-CCM", "CKIP", "NONE" };	hostapd *hapd = drv->hapd;	struct hostapd_config *conf = hapd->conf;	int v;	switch (conf->wpa_group) {	case WPA_CIPHER_CCMP:		v = IEEE80211_CIPHER_AES_CCM;		break;	case WPA_CIPHER_TKIP:		v = IEEE80211_CIPHER_TKIP;		break;	case WPA_CIPHER_WEP104:		v = IEEE80211_CIPHER_WEP;		break;	case WPA_CIPHER_WEP40:		v = IEEE80211_CIPHER_WEP;		break;	case WPA_CIPHER_NONE:		v = IEEE80211_CIPHER_NONE;		break;	default:		printf("Unknown group key cipher %u\n",			conf->wpa_group);		return -1;	}	HOSTAPD_DEBUG(HOSTAPD_DEBUG_MINIMAL,		"%s: group key cipher=%s (%u)\n", __func__, ciphernames[v], v);	if (set80211param(drv, IEEE80211_IOC_MCASTCIPHER, v)) {		printf("Unable to set group key cipher to %u (%s)\n",			v, ciphernames[v]);		return -1;	}	if (v == IEEE80211_CIPHER_WEP) {		/* key length is done only for specific ciphers */		v = (conf->wpa_group == WPA_CIPHER_WEP104 ? 13 : 5);		if (set80211param(drv, IEEE80211_IOC_MCASTKEYLEN, v)) {			printf("Unable to set group key length to %u\n", v);			return -1;		}	}	v = 0;	if (conf->wpa_pairwise & WPA_CIPHER_CCMP)		v |= 1<<IEEE80211_CIPHER_AES_CCM;	if (conf->wpa_pairwise & WPA_CIPHER_TKIP)		v |= 1<<IEEE80211_CIPHER_TKIP;	if (conf->wpa_pairwise & WPA_CIPHER_NONE)		v |= 1<<IEEE80211_CIPHER_NONE;	HOSTAPD_DEBUG(HOSTAPD_DEBUG_MINIMAL,		"%s: pairwise key ciphers=0x%x\n", __func__, v);	if (set80211param(drv, IEEE80211_IOC_UCASTCIPHERS, v)) {		printf("Unable to set pairwise key ciphers to 0x%x\n", v);		return -1;	}	HOSTAPD_DEBUG(HOSTAPD_DEBUG_MINIMAL,		"%s: key management algorithms=0x%x\n",		__func__, conf->wpa_key_mgmt);	if (set80211param(drv, IEEE80211_IOC_KEYMGTALGS, conf->wpa_key_mgmt)) {		printf("Unable to set key management algorithms to 0x%x\n",			conf->wpa_key_mgmt);		return -1;	}	v = 0;	if (conf->rsn_preauth)		v |= BIT(0);	HOSTAPD_DEBUG(HOSTAPD_DEBUG_MINIMAL,		"%s: rsn capabilities=0x%x\n", __func__, conf->rsn_preauth);	if (set80211param(drv, IEEE80211_IOC_RSNCAPS, v)) {		printf("Unable to set RSN capabilities to 0x%x\n", v);		return -1;	}	HOSTAPD_DEBUG(HOSTAPD_DEBUG_MINIMAL,		"%s: enable WPA= 0x%x\n", __func__, conf->wpa);	if (set80211param(drv, IEEE80211_IOC_WPA, conf->wpa)) {		printf("Unable to set WPA to %u\n", conf->wpa);		return -1;	}	return 0;}static intbsd_set_iface_flags(void *priv, int dev_up){	struct bsd_driver_data *drv = priv;	hostapd *hapd = drv->hapd;	struct ifreq ifr;	HOSTAPD_DEBUG(HOSTAPD_DEBUG_VERBOSE,		"%s: dev_up=%d\n", __func__, dev_up);	if (drv->ioctl_sock < 0)		return -1;	memset(&ifr, 0, sizeof(ifr));	snprintf(ifr.ifr_name, IFNAMSIZ, "%s", drv->iface);	if (ioctl(drv->ioctl_sock, SIOCGIFFLAGS, &ifr) != 0) {		perror("ioctl[SIOCGIFFLAGS]");		return -1;	}	if (dev_up)		ifr.ifr_flags |= IFF_UP;	else		ifr.ifr_flags &= ~IFF_UP;	if (ioctl(drv->ioctl_sock, SIOCSIFFLAGS, &ifr) != 0) {		perror("ioctl[SIOCSIFFLAGS]");		return -1;	}	if (dev_up) {		memset(&ifr, 0, sizeof(ifr));		snprintf(ifr.ifr_name, IFNAMSIZ, "%s", drv->iface);		ifr.ifr_mtu = HOSTAPD_MTU;		if (ioctl(drv->ioctl_sock, SIOCSIFMTU, &ifr) != 0) {			perror("ioctl[SIOCSIFMTU]");			printf("Setting MTU failed - trying to survive with "			       "current value\n");		}	}	return 0;}static intbsd_set_ieee8021x(void *priv, int enabled){	struct bsd_driver_data *drv = priv;	hostapd *hapd = drv->hapd;	struct hostapd_config *conf = hapd->conf;	HOSTAPD_DEBUG(HOSTAPD_DEBUG_VERBOSE,		"%s: enabled=%d\n", __func__, enabled);	if (!enabled) {		/* XXX restore state */		return set80211param(priv, IEEE80211_IOC_AUTHMODE,			IEEE80211_AUTH_AUTO);	}	if (!conf->wpa && !conf->ieee802_1x) {		hostapd_logger(hapd, NULL, HOSTAPD_MODULE_DRIVER,			HOSTAPD_LEVEL_WARNING, "No 802.1X or WPA enabled!");		return -1;	}	if (conf->wpa && bsd_configure_wpa(drv) != 0) {		hostapd_logger(hapd, NULL, HOSTAPD_MODULE_DRIVER,			HOSTAPD_LEVEL_WARNING, "Error configuring WPA state!");		return -1;	}	if (set80211param(priv, IEEE80211_IOC_AUTHMODE,		(conf->wpa ?  IEEE80211_AUTH_WPA : IEEE80211_AUTH_8021X))) {		hostapd_logger(hapd, NULL, HOSTAPD_MODULE_DRIVER,			HOSTAPD_LEVEL_WARNING, "Error enabling WPA/802.1X!");		return -1;	}	return bsd_set_iface_flags(priv, 1);}static intbsd_set_privacy(void *priv, int enabled){	struct bsd_driver_data *drv = priv;	hostapd *hapd = drv->hapd;	HOSTAPD_DEBUG(HOSTAPD_DEBUG_MINIMAL,		"%s: enabled=%d\n", __func__, enabled);	return set80211param(priv, IEEE80211_IOC_PRIVACY, enabled);}static intbsd_set_sta_authorized(void *priv, u8 *addr, int authorized){	struct bsd_driver_data *drv = priv;	hostapd *hapd = drv->hapd;	struct ieee80211req_mlme mlme;	HOSTAPD_DEBUG(HOSTAPD_DEBUG_VERBOSE,		"%s: addr=%s authorized=%d\n",		__func__, ether_sprintf(addr), authorized);	if (authorized)		mlme.im_op = IEEE80211_MLME_AUTHORIZE;	else		mlme.im_op = IEEE80211_MLME_UNAUTHORIZE;	mlme.im_reason = 0;	memcpy(mlme.im_macaddr, addr, IEEE80211_ADDR_LEN);	return set80211var(priv, IEEE80211_IOC_MLME, &mlme, sizeof(mlme));}static intbsd_del_key(void *priv, unsigned char *addr, int key_idx){	struct bsd_driver_data *drv = priv;	hostapd *hapd = drv->hapd;	struct ieee80211req_del_key wk;	HOSTAPD_DEBUG(HOSTAPD_DEBUG_MINIMAL,		"%s: addr=%s key_idx=%d\n",		__func__, ether_sprintf(addr), key_idx);	memset(&wk, 0, sizeof(wk));	if (addr != NULL) {		memcpy(wk.idk_macaddr, addr, IEEE80211_ADDR_LEN);		wk.idk_keyix = (u_int8_t) IEEE80211_KEYIX_NONE;	/* XXX */	} else {		wk.idk_keyix = key_idx;	}	return set80211var(priv, IEEE80211_IOC_DELKEY, &wk, sizeof(wk));}static intbsd_set_key(void *priv, const char *alg,	     unsigned char *addr, int key_idx,	     u8 *key, size_t key_len){	struct bsd_driver_data *drv = priv;	hostapd *hapd = drv->hapd;	struct ieee80211req_key wk;	u_int8_t cipher;	if (strcmp(alg, "none") == 0)		return bsd_del_key(priv, addr, key_idx);	HOSTAPD_DEBUG(HOSTAPD_DEBUG_MINIMAL,		"%s: alg=%s addr=%s key_idx=%d\n",		__func__, alg, ether_sprintf(addr), key_idx);	if (strcmp(alg, "WEP") == 0)		cipher = IEEE80211_CIPHER_WEP;	else if (strcmp(alg, "TKIP") == 0)		cipher = IEEE80211_CIPHER_TKIP;	else if (strcmp(alg, "CCMP") == 0)		cipher = IEEE80211_CIPHER_AES_CCM;	else {		printf("%s: unknown/unsupported algorithm %s\n",			__func__, alg);		return -1;	}	if (key_len > sizeof(wk.ik_keydata)) {		printf("%s: key length %d too big\n", __func__, key_len);		return -3;	}	memset(&wk, 0, sizeof(wk));	wk.ik_type = cipher;	wk.ik_flags = IEEE80211_KEY_RECV | IEEE80211_KEY_XMIT;	if (addr == NULL) {		memset(wk.ik_macaddr, 0xff, IEEE80211_ADDR_LEN);		wk.ik_keyix = key_idx;		wk.ik_flags |= IEEE80211_KEY_DEFAULT;	} else {		memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN);		wk.ik_keyix = IEEE80211_KEYIX_NONE;	}	wk.ik_keylen = key_len;	memcpy(wk.ik_keydata, key, key_len);	return set80211var(priv, IEEE80211_IOC_WPAKEY, &wk, sizeof(wk));}static intbsd_get_seqnum(void *priv, u8 *addr, int idx, u8 *seq){	struct bsd_driver_data *drv = priv;	hostapd *hapd = drv->hapd;	struct ieee80211req_key wk;	HOSTAPD_DEBUG(HOSTAPD_DEBUG_MINIMAL,		"%s: addr=%s idx=%d\n", __func__, ether_sprintf(addr), idx);	memset(&wk, 0, sizeof(wk));	if (addr == NULL)		memset(wk.ik_macaddr, 0xff, IEEE80211_ADDR_LEN);	else		memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN);	wk.ik_keyix = idx;	if (get80211var(drv, IEEE80211_IOC_WPAKEY, &wk, sizeof(wk)) < 0) {		printf("Failed to get encryption.\n");		return -1;	}#ifdef WORDS_BIGENDIAN	{		/*		 * wk.ik_keytsc is in host byte order (big endian), need to		 * swap it to match with the byte order used in WPA.		 */		int i;		u8 tmp[WPA_KEY_RSC_LEN];		memcpy(tmp, &wk.ik_keytsc, sizeof(wk.ik_keytsc));		for (i = 0; i < WPA_KEY_RSC_LEN; i++) {			seq[i] = tmp[WPA_KEY_RSC_LEN - i - 1];		}	}#else /* WORDS_BIGENDIAN */	memcpy(seq, &wk.ik_keytsc, sizeof(wk.ik_keytsc));#endif /* WORDS_BIGENDIAN */	return 0;

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -