⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 driver_wext.c

📁 IEEE802.11 a/b/g 客户端应用程序源代码
💻 C
📖 第 1 页 / 共 5 页
字号:
	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	os_memset(&mlme, 0, sizeof(mlme));	mlme.cmd = cmd;	mlme.reason_code = reason_code;	mlme.addr.sa_family = ARPHRD_ETHER;	os_memcpy(mlme.addr.sa_data, addr, ETH_ALEN);	iwr.u.data.pointer = (caddr_t) &mlme;	iwr.u.data.length = sizeof(mlme);	if (ioctl(drv->ioctl_sock, SIOCSIWMLME, &iwr) < 0) {		perror("ioctl[SIOCSIWMLME]");		ret = -1;	}	return ret;}static int wpa_driver_wext_deauthenticate(void *priv, const u8 *addr,					  int reason_code){	struct wpa_driver_wext_data *drv = priv;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	return wpa_driver_wext_mlme(drv, addr, IW_MLME_DEAUTH, reason_code);}static int wpa_driver_wext_disassociate(void *priv, const u8 *addr,					int reason_code){	struct wpa_driver_wext_data *drv = priv;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	return wpa_driver_wext_mlme(drv, addr, IW_MLME_DISASSOC,				    reason_code);}static int wpa_driver_wext_set_gen_ie(void *priv, const u8 *ie,				      size_t ie_len){	struct wpa_driver_wext_data *drv = priv;	struct iwreq iwr;	int ret = 0;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	iwr.u.data.pointer = (caddr_t) ie;	iwr.u.data.length = ie_len;	if (ioctl(drv->ioctl_sock, SIOCSIWGENIE, &iwr) < 0) {		perror("ioctl[SIOCSIWGENIE]");		ret = -1;	}	return ret;}int wpa_driver_wext_cipher2wext(int cipher){	switch (cipher) {	case CIPHER_NONE:		return IW_AUTH_CIPHER_NONE;	case CIPHER_WEP40:		return IW_AUTH_CIPHER_WEP40;	case CIPHER_TKIP:		return IW_AUTH_CIPHER_TKIP;	case CIPHER_CCMP:		return IW_AUTH_CIPHER_CCMP;	case CIPHER_WEP104:		return IW_AUTH_CIPHER_WEP104;	default:		return 0;	}}int wpa_driver_wext_keymgmt2wext(int keymgmt){	switch (keymgmt) {	case KEY_MGMT_802_1X:	case KEY_MGMT_802_1X_NO_WPA:		return IW_AUTH_KEY_MGMT_802_1X;	case KEY_MGMT_PSK:		return IW_AUTH_KEY_MGMT_PSK;	default:		return 0;	}}static intwpa_driver_wext_auth_alg_fallback(struct wpa_driver_wext_data *drv,				  struct wpa_driver_associate_params *params){	struct iwreq iwr;	int ret = 0;	wpa_printf(MSG_DEBUG, "WEXT: Driver did not support "		   "SIOCSIWAUTH for AUTH_ALG, trying SIOCSIWENCODE");	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	/* Just changing mode, not actual keys */	iwr.u.encoding.flags = 0;	iwr.u.encoding.pointer = (caddr_t) NULL;	iwr.u.encoding.length = 0;	/*	 * Note: IW_ENCODE_{OPEN,RESTRICTED} can be interpreted to mean two	 * different things. Here they are used to indicate Open System vs.	 * Shared Key authentication algorithm. However, some drivers may use	 * them to select between open/restricted WEP encrypted (open = allow	 * both unencrypted and encrypted frames; restricted = only allow	 * encrypted frames).	 */	if (!drv->use_crypt) {		iwr.u.encoding.flags |= IW_ENCODE_DISABLED;	} else {		if (params->auth_alg & AUTH_ALG_OPEN_SYSTEM)			iwr.u.encoding.flags |= IW_ENCODE_OPEN;		if (params->auth_alg & AUTH_ALG_SHARED_KEY)			iwr.u.encoding.flags |= IW_ENCODE_RESTRICTED;	}	if (ioctl(drv->ioctl_sock, SIOCSIWENCODE, &iwr) < 0) {		perror("ioctl[SIOCSIWENCODE]");		ret = -1;	}	return ret;}int wpa_driver_wext_associate(void *priv,			      struct wpa_driver_associate_params *params){	struct wpa_driver_wext_data *drv = priv;	int ret = 0;	int allow_unencrypted_eapol;	int value;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	/*	 * If the driver did not support SIOCSIWAUTH, fallback to	 * SIOCSIWENCODE here.	 */	if (drv->auth_alg_fallback &&	    wpa_driver_wext_auth_alg_fallback(drv, params) < 0)		ret = -1;	if (!params->bssid &&	    wpa_driver_wext_set_bssid(drv, NULL) < 0)		ret = -1;	if (wpa_driver_wext_set_mode(drv, params->mode) < 0)		ret = -1;	/* TODO: should consider getting wpa version and cipher/key_mgmt suites	 * from configuration, not from here, where only the selected suite is	 * available */	if (wpa_driver_wext_set_gen_ie(drv, params->wpa_ie, params->wpa_ie_len)	    < 0)		ret = -1;	if (params->wpa_ie == NULL || params->wpa_ie_len == 0)		value = IW_AUTH_WPA_VERSION_DISABLED;	else if (params->wpa_ie[0] == WLAN_EID_RSN)		value = IW_AUTH_WPA_VERSION_WPA2;	else		value = IW_AUTH_WPA_VERSION_WPA;	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_WPA_VERSION, value) < 0)		ret = -1;	value = wpa_driver_wext_cipher2wext(params->pairwise_suite);	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_CIPHER_PAIRWISE, value) < 0)		ret = -1;	value = wpa_driver_wext_cipher2wext(params->group_suite);	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_CIPHER_GROUP, value) < 0)		ret = -1;	value = wpa_driver_wext_keymgmt2wext(params->key_mgmt_suite);	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_KEY_MGMT, value) < 0)		ret = -1;	value = params->key_mgmt_suite != KEY_MGMT_NONE ||		params->pairwise_suite != CIPHER_NONE ||		params->group_suite != CIPHER_NONE ||		params->wpa_ie_len;	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_PRIVACY_INVOKED, value) < 0)		ret = -1;	/* Allow unencrypted EAPOL messages even if pairwise keys are set when	 * not using WPA. IEEE 802.1X specifies that these frames are not	 * encrypted, but WPA encrypts them when pairwise keys are in use. */	if (params->key_mgmt_suite == KEY_MGMT_802_1X ||	    params->key_mgmt_suite == KEY_MGMT_PSK)		allow_unencrypted_eapol = 0;	else		allow_unencrypted_eapol = 1;	if (wpa_driver_wext_set_psk(drv, params->psk) < 0)		ret = -1;	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_RX_UNENCRYPTED_EAPOL,					   allow_unencrypted_eapol) < 0)		ret = -1;#ifdef WEXT_MFP_PENDING#ifdef CONFIG_IEEE80211W	switch (params->mgmt_frame_protection) {	case NO_MGMT_FRAME_PROTECTION:		value = IW_AUTH_MFP_DISABLED;		break;	case MGMT_FRAME_PROTECTION_OPTIONAL:		value = IW_AUTH_MFP_OPTIONAL;		break;	case MGMT_FRAME_PROTECTION_REQUIRED:		value = IW_AUTH_MFP_REQUIRED;		break;	};	if (wpa_driver_wext_set_auth_param(drv, IW_AUTH_MFP, value) < 0)		ret = -1;#endif /* CONFIG_IEEE80211W */#endif /* WEXT_MFP_PENDING */	if (params->freq && wpa_driver_wext_set_freq(drv, params->freq) < 0)		ret = -1;	if (wpa_driver_wext_set_ssid(drv, params->ssid, params->ssid_len) < 0)		ret = -1;	if (params->bssid &&	    wpa_driver_wext_set_bssid(drv, params->bssid) < 0)		ret = -1;	return ret;}static int wpa_driver_wext_set_auth_alg(void *priv, int auth_alg){	struct wpa_driver_wext_data *drv = priv;	int algs = 0, res;	if (auth_alg & AUTH_ALG_OPEN_SYSTEM)		algs |= IW_AUTH_ALG_OPEN_SYSTEM;	if (auth_alg & AUTH_ALG_SHARED_KEY)		algs |= IW_AUTH_ALG_SHARED_KEY;	if (auth_alg & AUTH_ALG_LEAP)		algs |= IW_AUTH_ALG_LEAP;	if (algs == 0) {		/* at least one algorithm should be set */		algs = IW_AUTH_ALG_OPEN_SYSTEM;	}	res = wpa_driver_wext_set_auth_param(drv, IW_AUTH_80211_AUTH_ALG,					     algs);	drv->auth_alg_fallback = res == -2;	return res;}/** * wpa_driver_wext_set_mode - Set wireless mode (infra/adhoc), SIOCSIWMODE * @priv: Pointer to private wext data from wpa_driver_wext_init() * @mode: 0 = infra/BSS (associate with an AP), 1 = adhoc/IBSS * Returns: 0 on success, -1 on failure */int wpa_driver_wext_set_mode(void *priv, int mode){	struct wpa_driver_wext_data *drv = priv;	struct iwreq iwr;	int ret = -1, flags;	unsigned int new_mode = mode ? IW_MODE_ADHOC : IW_MODE_INFRA;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	iwr.u.mode = new_mode;	if (ioctl(drv->ioctl_sock, SIOCSIWMODE, &iwr) == 0) {		ret = 0;		goto done;	}	if (errno != EBUSY) {		perror("ioctl[SIOCSIWMODE]");		goto done;	}	/* mac80211 doesn't allow mode changes while the device is up, so if	 * the device isn't in the mode we're about to change to, take device	 * down, try to set the mode again, and bring it back up.	 */	if (ioctl(drv->ioctl_sock, SIOCGIWMODE, &iwr) < 0) {		perror("ioctl[SIOCGIWMODE]");		goto done;	}	if (iwr.u.mode == new_mode) {		ret = 0;		goto done;	}	if (wpa_driver_wext_get_ifflags(drv, &flags) == 0) {		(void) wpa_driver_wext_set_ifflags(drv, flags & ~IFF_UP);		/* Try to set the mode again while the interface is down */		iwr.u.mode = new_mode;		if (ioctl(drv->ioctl_sock, SIOCSIWMODE, &iwr) < 0)			perror("ioctl[SIOCSIWMODE]");		else			ret = 0;		/* Ignore return value of get_ifflags to ensure that the device		 * is always up like it was before this function was called.		 */		(void) wpa_driver_wext_get_ifflags(drv, &flags);		(void) wpa_driver_wext_set_ifflags(drv, flags | IFF_UP);	}done:	return ret;}static int wpa_driver_wext_pmksa(struct wpa_driver_wext_data *drv,				 u32 cmd, const u8 *bssid, const u8 *pmkid){	struct iwreq iwr;	struct iw_pmksa pmksa;	int ret = 0;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	os_memset(&pmksa, 0, sizeof(pmksa));	pmksa.cmd = cmd;	pmksa.bssid.sa_family = ARPHRD_ETHER;	if (bssid)		os_memcpy(pmksa.bssid.sa_data, bssid, ETH_ALEN);	if (pmkid)		os_memcpy(pmksa.pmkid, pmkid, IW_PMKID_LEN);	iwr.u.data.pointer = (caddr_t) &pmksa;	iwr.u.data.length = sizeof(pmksa);	if (ioctl(drv->ioctl_sock, SIOCSIWPMKSA, &iwr) < 0) {		if (errno != EOPNOTSUPP)			perror("ioctl[SIOCSIWPMKSA]");		ret = -1;	}	return ret;}static int wpa_driver_wext_add_pmkid(void *priv, const u8 *bssid,				     const u8 *pmkid){	struct wpa_driver_wext_data *drv = priv;	return wpa_driver_wext_pmksa(drv, IW_PMKSA_ADD, bssid, pmkid);}static int wpa_driver_wext_remove_pmkid(void *priv, const u8 *bssid,		 			const u8 *pmkid){	struct wpa_driver_wext_data *drv = priv;	return wpa_driver_wext_pmksa(drv, IW_PMKSA_REMOVE, bssid, pmkid);}static int wpa_driver_wext_flush_pmkid(void *priv){	struct wpa_driver_wext_data *drv = priv;	return wpa_driver_wext_pmksa(drv, IW_PMKSA_FLUSH, NULL, NULL);}int wpa_driver_wext_get_capa(void *priv, struct wpa_driver_capa *capa){	struct wpa_driver_wext_data *drv = priv;	if (!drv->has_capability)		return -1;	os_memcpy(capa, &drv->capa, sizeof(*capa));	return 0;}int wpa_driver_wext_alternative_ifindex(struct wpa_driver_wext_data *drv,					const char *ifname){	if (ifname == NULL) {		drv->ifindex2 = -1;		return 0;	}	drv->ifindex2 = if_nametoindex(ifname);	if (drv->ifindex2 <= 0)		return -1;	wpa_printf(MSG_DEBUG, "Added alternative ifindex %d (%s) for "		   "wireless events", drv->ifindex2, ifname);	return 0;}int wpa_driver_wext_set_operstate(void *priv, int state){	struct wpa_driver_wext_data *drv = priv;	wpa_printf(MSG_DEBUG, "%s: operstate %d->%d (%s)",		   __func__, drv->operstate, state, state ? "UP" : "DORMANT");	drv->operstate = state;	return wpa_driver_wext_send_oper_ifla(		drv, -1, state ? IF_OPER_UP : IF_OPER_DORMANT);}#ifdef CONFIG_CLIENT_MLMEstatic int hostapd_ioctl(struct wpa_driver_wext_data *drv,			 struct prism2_hostapd_param *param, int len){	struct iwreq iwr;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	iwr.u.data.pointer = (caddr_t) param;	iwr.u.data.length = len;	if (ioctl(drv->ioctl_sock, PRISM2_IOCTL_HOSTAPD, &iwr) < 0) {		perror("ioctl[PRISM2_IOCTL_HOSTAPD]");		return -1;	}	return 0;}static struct wpa_hw_modes *wpa_driver_wext_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags){	struct wpa_driver_wext_data *drv = priv;	struct prism2_hostapd_param *param;	u8 *pos, *end;	struct wpa_hw_modes *modes = NULL;	int i;	param = os_zalloc(PRISM2_HOSTAPD_MAX_BUF_SIZE);	if (param == NULL)		return NULL;	param->cmd = PRISM2_HOSTAPD_GET_HW_FEATURES;	if (hostapd_ioctl(drv, param, PRISM2_HOSTAPD_MAX_BUF_SIZE) < 0) {		perror("ioctl[PRISM2_IOCTL_HOSTAPD]");		goto out;	}	*num_modes = param->u.hw_features.num_modes;	*flags = param->u.hw_features.flags;	pos = param->u.hw_features.data;	end = pos + PRISM2_HOSTAPD_MAX_BUF_SIZE -		(param->u.hw_features.data - (u8 *) param);	modes = os_zalloc(*num_modes * sizeof(struct wpa_hw_modes));	if (modes == NULL)		goto out;	for (i = 0; i < *num_modes; i++) {		struct hostapd_ioctl_hw_modes_hdr *hdr;		struct wpa_hw_modes *feature;		int clen, rlen;		hdr = (struct hostapd_ioctl_hw_modes_hdr *) pos;		pos = (u8 *) (hdr + 1);		clen = hdr->num_channels * sizeof(struct wpa_channel_data);		rlen = hdr->num_rates * sizeof(struct wpa_rate_data);		feature = &modes[i];		switch (hdr->mode) {		case MODE_IEEE80211A:			feature->mode = WPA_MODE_IEEE80211A;			break;		case MODE_IEEE80211B:			feature->mode = WPA_MODE_IEEE80211B;			break;		case MODE_IEEE80211G:			feature->mode = WPA_MODE_IEEE80211G;			break;		case MODE_ATHEROS_TURBO:		case MODE_ATHEROS_TURBOG:			wpa_printf(MSG_ERROR, "Skip unsupported hw_mode=%d in "				   "get_hw_features data", hdr->mode);			pos += clen + rlen;			continue;		default:			wpa_printf(MSG_ERROR, "Unknown hw_mode=%d in "				   "get_hw_features data", hdr->mode);			wpa_supplicant_sta_free_hw_features(modes, *num_modes);			modes = NULL;			break;		}		feature->num_cha

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -