⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 driver_madwifi.c

📁 IEEE 802.11a/b/g 服务器端AP
💻 C
📖 第 1 页 / 共 2 页
字号:
/* * WPA Supplicant - driver interaction with MADWIFI 802.11 driver * Copyright (c) 2004, Sam Leffler <sam@errno.com> * Copyright (c) 2004-2005, Jouni Malinen <j@w1.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#include "includes.h"#include <sys/ioctl.h>#include "common.h"#include "driver.h"#include "driver_wext.h"#include "eloop.h"#include "ieee802_11_defs.h"#include "wireless_copy.h"#include <include/compat.h>#include <net80211/ieee80211.h>#ifdef WME_NUM_AC/* Assume this is built against BSD branch of madwifi driver. */#define MADWIFI_BSD#include <net80211/_ieee80211.h>#endif /* WME_NUM_AC */#include <net80211/ieee80211_crypto.h>#include <net80211/ieee80211_ioctl.h>#ifdef IEEE80211_IOCTL_SETWMMPARAMS/* Assume this is built against madwifi-ng */#define MADWIFI_NG#endif /* IEEE80211_IOCTL_SETWMMPARAMS */struct wpa_driver_madwifi_data {	void *wext; /* private data for driver_wext */	void *ctx;	char ifname[IFNAMSIZ + 1];	int sock;};static intset80211priv(struct wpa_driver_madwifi_data *drv, int op, void *data, int len,	     int show_err){	struct iwreq iwr;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	if (len < IFNAMSIZ) {		/*		 * Argument data fits inline; put it there.		 */		os_memcpy(iwr.u.name, data, len);	} else {		/*		 * Argument data too big for inline transfer; setup a		 * parameter block instead; the kernel will transfer		 * the data for the driver.		 */		iwr.u.data.pointer = data;		iwr.u.data.length = len;	}	if (ioctl(drv->sock, op, &iwr) < 0) {		if (show_err) {#ifdef MADWIFI_NG			int first = IEEE80211_IOCTL_SETPARAM;			int last = IEEE80211_IOCTL_KICKMAC;			static const char *opnames[] = {				"ioctl[IEEE80211_IOCTL_SETPARAM]",				"ioctl[IEEE80211_IOCTL_GETPARAM]",				"ioctl[IEEE80211_IOCTL_SETMODE]",				"ioctl[IEEE80211_IOCTL_GETMODE]",				"ioctl[IEEE80211_IOCTL_SETWMMPARAMS]",				"ioctl[IEEE80211_IOCTL_GETWMMPARAMS]",				"ioctl[IEEE80211_IOCTL_SETCHANLIST]",				"ioctl[IEEE80211_IOCTL_GETCHANLIST]",				"ioctl[IEEE80211_IOCTL_CHANSWITCH]",				NULL,				NULL,				"ioctl[IEEE80211_IOCTL_GETSCANRESULTS]",				NULL,				"ioctl[IEEE80211_IOCTL_GETCHANINFO]",				"ioctl[IEEE80211_IOCTL_SETOPTIE]",				"ioctl[IEEE80211_IOCTL_GETOPTIE]",				"ioctl[IEEE80211_IOCTL_SETMLME]",				NULL,				"ioctl[IEEE80211_IOCTL_SETKEY]",				NULL,				"ioctl[IEEE80211_IOCTL_DELKEY]",				NULL,				"ioctl[IEEE80211_IOCTL_ADDMAC]",				NULL,				"ioctl[IEEE80211_IOCTL_DELMAC]",				NULL,				"ioctl[IEEE80211_IOCTL_WDSMAC]",				NULL,				"ioctl[IEEE80211_IOCTL_WDSDELMAC]",				NULL,				"ioctl[IEEE80211_IOCTL_KICKMAC]",			};#else /* MADWIFI_NG */			int first = IEEE80211_IOCTL_SETPARAM;			int last = IEEE80211_IOCTL_CHANLIST;			static const char *opnames[] = {				"ioctl[IEEE80211_IOCTL_SETPARAM]",				"ioctl[IEEE80211_IOCTL_GETPARAM]",				"ioctl[IEEE80211_IOCTL_SETKEY]",				"ioctl[IEEE80211_IOCTL_GETKEY]",				"ioctl[IEEE80211_IOCTL_DELKEY]",				NULL,				"ioctl[IEEE80211_IOCTL_SETMLME]",				NULL,				"ioctl[IEEE80211_IOCTL_SETOPTIE]",				"ioctl[IEEE80211_IOCTL_GETOPTIE]",				"ioctl[IEEE80211_IOCTL_ADDMAC]",				NULL,				"ioctl[IEEE80211_IOCTL_DELMAC]",				NULL,				"ioctl[IEEE80211_IOCTL_CHANLIST]",			};#endif /* MADWIFI_NG */			int idx = op - first;			if (first <= op && op <= last &&			    idx < (int) (sizeof(opnames) / sizeof(opnames[0]))			    && opnames[idx])				perror(opnames[idx]);			else				perror("ioctl[unknown???]");		}		return -1;	}	return 0;}static intset80211param(struct wpa_driver_madwifi_data *drv, int op, int arg,	      int show_err){	struct iwreq iwr;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	iwr.u.mode = op;	os_memcpy(iwr.u.name+sizeof(u32), &arg, sizeof(arg));	if (ioctl(drv->sock, IEEE80211_IOCTL_SETPARAM, &iwr) < 0) {		if (show_err) 			perror("ioctl[IEEE80211_IOCTL_SETPARAM]");		return -1;	}	return 0;}static intwpa_driver_madwifi_set_wpa_ie(struct wpa_driver_madwifi_data *drv,			      const u8 *wpa_ie, size_t wpa_ie_len){	struct iwreq iwr;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	/* NB: SETOPTIE is not fixed-size so must not be inlined */	iwr.u.data.pointer = (void *) wpa_ie;	iwr.u.data.length = wpa_ie_len;	if (ioctl(drv->sock, IEEE80211_IOCTL_SETOPTIE, &iwr) < 0) {		perror("ioctl[IEEE80211_IOCTL_SETOPTIE]");		return -1;	}	return 0;}static intwpa_driver_madwifi_del_key(struct wpa_driver_madwifi_data *drv, int key_idx,			   const u8 *addr){	struct ieee80211req_del_key wk;	wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __FUNCTION__, key_idx);	os_memset(&wk, 0, sizeof(wk));	wk.idk_keyix = key_idx;	if (addr != NULL)		os_memcpy(wk.idk_macaddr, addr, IEEE80211_ADDR_LEN);	return set80211priv(drv, IEEE80211_IOCTL_DELKEY, &wk, sizeof(wk), 1);}static intwpa_driver_madwifi_set_key(void *priv, wpa_alg alg,			   const u8 *addr, int key_idx, int set_tx,			   const u8 *seq, size_t seq_len,			   const u8 *key, size_t key_len){	struct wpa_driver_madwifi_data *drv = priv;	struct ieee80211req_key wk;	char *alg_name;	u_int8_t cipher;	if (alg == WPA_ALG_NONE)		return wpa_driver_madwifi_del_key(drv, key_idx, addr);	switch (alg) {	case WPA_ALG_WEP:		if (addr == NULL || os_memcmp(addr, "\xff\xff\xff\xff\xff\xff",					      ETH_ALEN) == 0) {			/*			 * madwifi did not seem to like static WEP key			 * configuration with IEEE80211_IOCTL_SETKEY, so use			 * Linux wireless extensions ioctl for this.			 */			return wpa_driver_wext_set_key(drv->wext, alg, addr,						       key_idx, set_tx,						       seq, seq_len,						       key, key_len);		}		alg_name = "WEP";		cipher = IEEE80211_CIPHER_WEP;		break;	case WPA_ALG_TKIP:		alg_name = "TKIP";		cipher = IEEE80211_CIPHER_TKIP;		break;	case WPA_ALG_CCMP:		alg_name = "CCMP";		cipher = IEEE80211_CIPHER_AES_CCM;		break;	default:		wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d",			__FUNCTION__, alg);		return -1;	}	wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu "		   "key_len=%lu", __FUNCTION__, alg_name, key_idx, set_tx,		   (unsigned long) seq_len, (unsigned long) key_len);	if (seq_len > sizeof(u_int64_t)) {		wpa_printf(MSG_DEBUG, "%s: seq_len %lu too big",			   __FUNCTION__, (unsigned long) seq_len);		return -2;	}	if (key_len > sizeof(wk.ik_keydata)) {		wpa_printf(MSG_DEBUG, "%s: key length %lu too big",			   __FUNCTION__, (unsigned long) key_len);		return -3;	}	os_memset(&wk, 0, sizeof(wk));	wk.ik_type = cipher;	wk.ik_flags = IEEE80211_KEY_RECV;	if (addr == NULL ||	    os_memcmp(addr, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) == 0)		wk.ik_flags |= IEEE80211_KEY_GROUP;	if (set_tx) {		wk.ik_flags |= IEEE80211_KEY_XMIT | IEEE80211_KEY_DEFAULT;		os_memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN);	} else		os_memset(wk.ik_macaddr, 0, IEEE80211_ADDR_LEN);	wk.ik_keyix = key_idx;	wk.ik_keylen = key_len;#ifdef WORDS_BIGENDIAN#define WPA_KEY_RSC_LEN 8	{		size_t i;		u8 tmp[WPA_KEY_RSC_LEN];		os_memset(tmp, 0, sizeof(tmp));		for (i = 0; i < seq_len; i++)			tmp[WPA_KEY_RSC_LEN - i - 1] = seq[i];		os_memcpy(&wk.ik_keyrsc, tmp, WPA_KEY_RSC_LEN);	}#else /* WORDS_BIGENDIAN */	os_memcpy(&wk.ik_keyrsc, seq, seq_len);#endif /* WORDS_BIGENDIAN */	os_memcpy(wk.ik_keydata, key, key_len);

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -