⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 driver_nl80211.c

📁 IEEE802.11 a/b/g 客户端应用程序源代码
💻 C
📖 第 1 页 / 共 4 页
字号:
static int wpa_driver_nl80211_set_key(void *priv, wpa_alg alg,				      const u8 *addr, int key_idx,				      int set_tx, const u8 *seq,				      size_t seq_len,				      const u8 *key, size_t key_len){	struct wpa_driver_nl80211_data *drv = priv;	int ret = -1, err;	struct nl_msg *msg;	wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d "		   "seq_len=%lu key_len=%lu",		   __func__, alg, addr, key_idx, set_tx,		   (unsigned long) seq_len, (unsigned long) key_len);	msg = nlmsg_alloc();	if (msg == NULL)		return -1;	if (alg == WPA_ALG_NONE) {		genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,			    NL80211_CMD_DEL_KEY, 0);	} else {		genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,			    NL80211_CMD_NEW_KEY, 0);		NLA_PUT(msg, NL80211_ATTR_KEY_DATA, key_len, key);		switch (alg) {		case WPA_ALG_WEP:			if (key_len == 5)				NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER,					    0x000FAC01);			else				NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER,					    0x000FAC05);			break;		case WPA_ALG_TKIP:			NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC02);			break;		case WPA_ALG_CCMP:			NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC04);			break;		default:			nlmsg_free(msg);			return -1;		}	}	if (addr && os_memcmp(addr, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) != 0)	{		wpa_printf(MSG_DEBUG, "   addr=" MACSTR, MAC2STR(addr));		NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);	}	NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx);	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);	err = 0;	if (nl_send_auto_complete(drv->nl_handle, msg) < 0 ||	    (err = nl_wait_for_ack(drv->nl_handle)) < 0) {		wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d", err);		nlmsg_free(msg);		return -1;	}	if (set_tx && alg != WPA_ALG_NONE) {		nlmsg_free(msg);		msg = nlmsg_alloc();		if (msg == NULL)			return -1;		genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,			    0, NL80211_CMD_SET_KEY, 0);		NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx);		NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);		NLA_PUT_FLAG(msg, NL80211_ATTR_KEY_DEFAULT);		err = 0;		if (nl_send_auto_complete(drv->nl_handle, msg) < 0 ||		    (err = nl_wait_for_ack(drv->nl_handle)) < 0) {			wpa_printf(MSG_DEBUG, "nl80211: set default key "				   "failed; err=%d", err);			nlmsg_free(msg);			return -1;		}	}	ret = 0;nla_put_failure:	nlmsg_free(msg);	return ret;}static int wpa_driver_nl80211_set_countermeasures(void *priv,					       int enabled){	struct wpa_driver_nl80211_data *drv = priv;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	return wpa_driver_nl80211_set_auth_param(drv,					      IW_AUTH_TKIP_COUNTERMEASURES,					      enabled);}static int wpa_driver_nl80211_set_drop_unencrypted(void *priv,						int enabled){	struct wpa_driver_nl80211_data *drv = priv;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	drv->use_crypt = enabled;	return wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_DROP_UNENCRYPTED,					      enabled);}static int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,				const u8 *addr, int cmd, int reason_code){	struct iwreq iwr;	struct iw_mlme mlme;	int ret = 0;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	os_memset(&mlme, 0, sizeof(mlme));	mlme.cmd = cmd;	mlme.reason_code = reason_code;	mlme.addr.sa_family = ARPHRD_ETHER;	os_memcpy(mlme.addr.sa_data, addr, ETH_ALEN);	iwr.u.data.pointer = (caddr_t) &mlme;	iwr.u.data.length = sizeof(mlme);	if (ioctl(drv->ioctl_sock, SIOCSIWMLME, &iwr) < 0) {		perror("ioctl[SIOCSIWMLME]");		ret = -1;	}	return ret;}static int wpa_driver_nl80211_deauthenticate(void *priv, const u8 *addr,					  int reason_code){	struct wpa_driver_nl80211_data *drv = priv;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	return wpa_driver_nl80211_mlme(drv, addr, IW_MLME_DEAUTH, reason_code);}static int wpa_driver_nl80211_disassociate(void *priv, const u8 *addr,					int reason_code){	struct wpa_driver_nl80211_data *drv = priv;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	return wpa_driver_nl80211_mlme(drv, addr, IW_MLME_DISASSOC,				    reason_code);}static int wpa_driver_nl80211_set_gen_ie(void *priv, const u8 *ie,				      size_t ie_len){	struct wpa_driver_nl80211_data *drv = priv;	struct iwreq iwr;	int ret = 0;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	iwr.u.data.pointer = (caddr_t) ie;	iwr.u.data.length = ie_len;	if (ioctl(drv->ioctl_sock, SIOCSIWGENIE, &iwr) < 0) {		perror("ioctl[SIOCSIWGENIE]");		ret = -1;	}	return ret;}static int wpa_driver_nl80211_cipher2wext(int cipher){	switch (cipher) {	case CIPHER_NONE:		return IW_AUTH_CIPHER_NONE;	case CIPHER_WEP40:		return IW_AUTH_CIPHER_WEP40;	case CIPHER_TKIP:		return IW_AUTH_CIPHER_TKIP;	case CIPHER_CCMP:		return IW_AUTH_CIPHER_CCMP;	case CIPHER_WEP104:		return IW_AUTH_CIPHER_WEP104;	default:		return 0;	}}static int wpa_driver_nl80211_keymgmt2wext(int keymgmt){	switch (keymgmt) {	case KEY_MGMT_802_1X:	case KEY_MGMT_802_1X_NO_WPA:		return IW_AUTH_KEY_MGMT_802_1X;	case KEY_MGMT_PSK:		return IW_AUTH_KEY_MGMT_PSK;	default:		return 0;	}}static intwpa_driver_nl80211_auth_alg_fallback(struct wpa_driver_nl80211_data *drv,				  struct wpa_driver_associate_params *params){	struct iwreq iwr;	int ret = 0;	wpa_printf(MSG_DEBUG, "WEXT: Driver did not support "		   "SIOCSIWAUTH for AUTH_ALG, trying SIOCSIWENCODE");	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	/* Just changing mode, not actual keys */	iwr.u.encoding.flags = 0;	iwr.u.encoding.pointer = (caddr_t) NULL;	iwr.u.encoding.length = 0;	/*	 * Note: IW_ENCODE_{OPEN,RESTRICTED} can be interpreted to mean two	 * different things. Here they are used to indicate Open System vs.	 * Shared Key authentication algorithm. However, some drivers may use	 * them to select between open/restricted WEP encrypted (open = allow	 * both unencrypted and encrypted frames; restricted = only allow	 * encrypted frames).	 */	if (!drv->use_crypt) {		iwr.u.encoding.flags |= IW_ENCODE_DISABLED;	} else {		if (params->auth_alg & AUTH_ALG_OPEN_SYSTEM)			iwr.u.encoding.flags |= IW_ENCODE_OPEN;		if (params->auth_alg & AUTH_ALG_SHARED_KEY)			iwr.u.encoding.flags |= IW_ENCODE_RESTRICTED;	}	if (ioctl(drv->ioctl_sock, SIOCSIWENCODE, &iwr) < 0) {		perror("ioctl[SIOCSIWENCODE]");		ret = -1;	}	return ret;}static int wpa_driver_nl80211_associate(	void *priv, struct wpa_driver_associate_params *params){	struct wpa_driver_nl80211_data *drv = priv;	int ret = 0;	int allow_unencrypted_eapol;	int value;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	/*	 * If the driver did not support SIOCSIWAUTH, fallback to	 * SIOCSIWENCODE here.	 */	if (drv->auth_alg_fallback &&	    wpa_driver_nl80211_auth_alg_fallback(drv, params) < 0)		ret = -1;	if (!params->bssid &&	    wpa_driver_nl80211_set_bssid(drv, NULL) < 0)		ret = -1;	if (wpa_driver_nl80211_set_mode(drv, params->mode) < 0)		ret = -1;	/* TODO: should consider getting wpa version and cipher/key_mgmt suites	 * from configuration, not from here, where only the selected suite is	 * available */	if (wpa_driver_nl80211_set_gen_ie(drv, params->wpa_ie, params->wpa_ie_len)	    < 0)		ret = -1;	if (params->wpa_ie == NULL || params->wpa_ie_len == 0)		value = IW_AUTH_WPA_VERSION_DISABLED;	else if (params->wpa_ie[0] == WLAN_EID_RSN)		value = IW_AUTH_WPA_VERSION_WPA2;	else		value = IW_AUTH_WPA_VERSION_WPA;	if (wpa_driver_nl80211_set_auth_param(drv,					   IW_AUTH_WPA_VERSION, value) < 0)		ret = -1;	value = wpa_driver_nl80211_cipher2wext(params->pairwise_suite);	if (wpa_driver_nl80211_set_auth_param(drv,					   IW_AUTH_CIPHER_PAIRWISE, value) < 0)		ret = -1;	value = wpa_driver_nl80211_cipher2wext(params->group_suite);	if (wpa_driver_nl80211_set_auth_param(drv,					   IW_AUTH_CIPHER_GROUP, value) < 0)		ret = -1;	value = wpa_driver_nl80211_keymgmt2wext(params->key_mgmt_suite);	if (wpa_driver_nl80211_set_auth_param(drv,					   IW_AUTH_KEY_MGMT, value) < 0)		ret = -1;	value = params->key_mgmt_suite != KEY_MGMT_NONE ||		params->pairwise_suite != CIPHER_NONE ||		params->group_suite != CIPHER_NONE ||		params->wpa_ie_len;	if (wpa_driver_nl80211_set_auth_param(drv,					   IW_AUTH_PRIVACY_INVOKED, value) < 0)		ret = -1;	/* Allow unencrypted EAPOL messages even if pairwise keys are set when	 * not using WPA. IEEE 802.1X specifies that these frames are not	 * encrypted, but WPA encrypts them when pairwise keys are in use. */	if (params->key_mgmt_suite == KEY_MGMT_802_1X ||	    params->key_mgmt_suite == KEY_MGMT_PSK)		allow_unencrypted_eapol = 0;	else		allow_unencrypted_eapol = 1;		if (wpa_driver_nl80211_set_auth_param(drv,					   IW_AUTH_RX_UNENCRYPTED_EAPOL,					   allow_unencrypted_eapol) < 0)		ret = -1;	if (params->freq && wpa_driver_nl80211_set_freq(drv, params->freq) < 0)		ret = -1;	if (wpa_driver_nl80211_set_ssid(drv, params->ssid, params->ssid_len) < 0)		ret = -1;	if (params->bssid &&	    wpa_driver_nl80211_set_bssid(drv, params->bssid) < 0)		ret = -1;	return ret;}static int wpa_driver_nl80211_set_auth_alg(void *priv, int auth_alg){	struct wpa_driver_nl80211_data *drv = priv;	int algs = 0, res;	if (auth_alg & AUTH_ALG_OPEN_SYSTEM)		algs |= IW_AUTH_ALG_OPEN_SYSTEM;	if (auth_alg & AUTH_ALG_SHARED_KEY)		algs |= IW_AUTH_ALG_SHARED_KEY;	if (auth_alg & AUTH_ALG_LEAP)		algs |= IW_AUTH_ALG_LEAP;	if (algs == 0) {		/* at least one algorithm should be set */		algs = IW_AUTH_ALG_OPEN_SYSTEM;	}	res = wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_80211_AUTH_ALG,					     algs);	drv->auth_alg_fallback = res == -2;	return res;}/** * wpa_driver_nl80211_set_mode - Set wireless mode (infra/adhoc), SIOCSIWMODE * @priv: Pointer to private wext data from wpa_driver_nl80211_init() * @mode: 0 = infra/BSS (associate with an AP), 1 = adhoc/IBSS * Returns: 0 on success, -1 on failure */static int wpa_driver_nl80211_set_mode(void *priv, int mode){	struct wpa_driver_nl80211_data *drv = priv;	int ret = -1, flags;	struct nl_msg *msg;	msg = nlmsg_alloc();	if (!msg)		return -1;	genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,		    0, NL80211_CMD_SET_INTERFACE, 0);	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);	NLA_PUT_U32(msg, NL80211_ATTR_IFTYPE, NL80211_IFTYPE_AP);	if (nl_send_auto_complete(drv->nl_handle, msg) < 0 ||	    nl_wait_for_ack(drv->nl_handle) < 0)		goto try_again;	nlmsg_free(msg);	return 0;nla_put_failure:	nlmsg_free(msg);	return -1;try_again:	/* mac80211 doesn't allow mode changes while the device is up, so	 * take the device down, try to set the mode again, and bring the	 * device back up.	 */	if (wpa_driver_nl80211_get_ifflags(drv, &flags) == 0) {		(void) wpa_driver_nl80211_set_ifflags(drv, flags & ~IFF_UP);		/* Try to set the mode again while the interface is down */		if (nl_send_auto_complete(drv->nl_handle, msg) < 0 ||		    nl_wait_for_ack(drv->nl_handle) < 0) {			wpa_printf(MSG_ERROR, "Failed to set interface %s "				   "mode", drv->ifname);		} else			ret = 0;		/* Ignore return value of get_ifflags to ensure that the device		 * is always up like it was before this function was called.		 */		(void) wpa_driver_nl80211_get_ifflags(drv, &flags);		(void) wpa_driver_nl80211_set_ifflags(drv, flags | IFF_UP);	}	nlmsg_free(msg);	return ret;}static int wpa_driver_nl80211_pmksa(struct wpa_driver_nl80211_data *drv,				 u32 cmd, const u8 *bssid, const u8 *pmkid){	struct iwreq iwr;	struct iw_pmksa pmksa;	int ret = 0;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	os_memset(&pmksa, 0, sizeof(pmksa));	pmksa.cmd = cmd;	pmksa.bssid.sa_family = ARPHRD_ETHER;	if (bssid)		os_memcpy(pmksa.bssid.sa_data, bssid, ETH_ALEN);	if (pmkid)		os_memcpy(pmksa.pmkid, pmkid, IW_PMKID_LEN);	iwr.u.data.pointer = (caddr_t) &pmksa;	iwr.u.data.length = sizeof(pmksa);	if (ioctl(drv->ioctl_sock, SIOCSIWPMKSA, &iwr) < 0) {		if (errno != EOPNOTSUPP)			perror("ioctl[SIOCSIWPMKSA]");		ret = -1;	}	return ret;}static int wpa_driver_nl80211_add_pmkid(void *priv, const u8 *bssid,				     const u8 *pmkid){	struct wpa_driver_nl80211_data *drv = priv;	return wpa_driver_nl80211_pmksa(drv, IW_PMKSA_ADD, bssid, pmkid);}static int wpa_driver_nl80211_remove_pmkid(void *priv, const u8 *bssid,		 			const u8 *pmkid){	struct wpa_driver_nl80211_data *drv = priv;	return wpa_driver_nl80211_pmksa(drv, IW_PMKSA_REMOVE, bssid, pmkid);}static int wpa_driver_nl80211_flush_pmkid(void *priv){	struct wpa_driver_nl80211_data *drv = priv;	return wpa_driver_nl80211_pmksa(drv, IW_PMKSA_FLUSH, NULL, NULL);}static int wpa_driver_nl80211_get_capa(void *priv,				       struct wpa_driver_capa *capa){	struct wpa_driver_nl80211_data *drv = priv;	if (!drv->has_capability)		return -1;	os_memcpy(capa, &drv->capa, sizeof(*capa));	return 0;}static int wpa_driver_nl80211_set_operstate(void *priv, int state){	struct wpa_driver_nl80211_data *drv = priv;	wpa_printf(MSG_DEBUG, "%s: operstate %d->%d (%s)",		   __func__, drv->operstate, state, state ? "UP" : "DORMANT");	drv->operstate = state;	return wpa_driver_nl80211_send_oper_ifla(		drv, -1, state ? IF_OPER_UP : IF_OPER_DORMANT);}const struct wpa_driver_ops wpa_driver_nl80211_ops = {	.name = "nl80211",	.desc = "Linux nl80211/cfg80211",	.get_bssid = wpa_driver_nl80211_get_bssid,	.get_ssid = wpa_driver_nl80211_get_ssid,	.set_wpa = wpa_driver_nl80211_set_wpa,	.set_key = wpa_driver_nl80211_set_key,	.set_countermeasures = wpa_driver_nl80211_set_countermeasures,	.set_drop_unencrypted = wpa_driver_nl80211_set_drop_unencrypted,	.scan = wpa_driver_nl80211_scan,	.get_scan_results2 = wpa_driver_nl80211_get_scan_results,	.deauthenticate = wpa_driver_nl80211_deauthenticate,	.disassociate = wpa_driver_nl80211_disassociate,	.associate = wpa_driver_nl80211_associate,	.set_auth_alg = wpa_driver_nl80211_set_auth_alg,	.init = wpa_driver_nl80211_init,	.deinit = wpa_driver_nl80211_deinit,	.add_pmkid = wpa_driver_nl80211_add_pmkid,	.remove_pmkid = wpa_driver_nl80211_remove_pmkid,	.flush_pmkid = wpa_driver_nl80211_flush_pmkid,	.get_capa = wpa_driver_nl80211_get_capa,	.set_operstate = wpa_driver_nl80211_set_operstate,};

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -