📄 driver_nl80211.c
字号:
static int wpa_driver_nl80211_set_key(void *priv, wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len){ struct wpa_driver_nl80211_data *drv = priv; int ret = -1, err; struct nl_msg *msg; wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d " "seq_len=%lu key_len=%lu", __func__, alg, addr, key_idx, set_tx, (unsigned long) seq_len, (unsigned long) key_len); msg = nlmsg_alloc(); if (msg == NULL) return -1; if (alg == WPA_ALG_NONE) { genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0, NL80211_CMD_DEL_KEY, 0); } else { genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0, NL80211_CMD_NEW_KEY, 0); NLA_PUT(msg, NL80211_ATTR_KEY_DATA, key_len, key); switch (alg) { case WPA_ALG_WEP: if (key_len == 5) NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC01); else NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC05); break; case WPA_ALG_TKIP: NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC02); break; case WPA_ALG_CCMP: NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC04); break; default: nlmsg_free(msg); return -1; } } if (addr && os_memcmp(addr, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) != 0) { wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr)); NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr); } NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx); NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex); err = 0; if (nl_send_auto_complete(drv->nl_handle, msg) < 0 || (err = nl_wait_for_ack(drv->nl_handle)) < 0) { wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d", err); nlmsg_free(msg); return -1; } if (set_tx && alg != WPA_ALG_NONE) { nlmsg_free(msg); msg = nlmsg_alloc(); if (msg == NULL) return -1; genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0, NL80211_CMD_SET_KEY, 0); NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx); NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex); NLA_PUT_FLAG(msg, NL80211_ATTR_KEY_DEFAULT); err = 0; if (nl_send_auto_complete(drv->nl_handle, msg) < 0 || (err = nl_wait_for_ack(drv->nl_handle)) < 0) { wpa_printf(MSG_DEBUG, "nl80211: set default key " "failed; err=%d", err); nlmsg_free(msg); return -1; } } ret = 0;nla_put_failure: nlmsg_free(msg); return ret;}static int wpa_driver_nl80211_set_countermeasures(void *priv, int enabled){ struct wpa_driver_nl80211_data *drv = priv; wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); return wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_TKIP_COUNTERMEASURES, enabled);}static int wpa_driver_nl80211_set_drop_unencrypted(void *priv, int enabled){ struct wpa_driver_nl80211_data *drv = priv; wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); drv->use_crypt = enabled; return wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_DROP_UNENCRYPTED, enabled);}static int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv, const u8 *addr, int cmd, int reason_code){ struct iwreq iwr; struct iw_mlme mlme; int ret = 0; os_memset(&iwr, 0, sizeof(iwr)); os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ); os_memset(&mlme, 0, sizeof(mlme)); mlme.cmd = cmd; mlme.reason_code = reason_code; mlme.addr.sa_family = ARPHRD_ETHER; os_memcpy(mlme.addr.sa_data, addr, ETH_ALEN); iwr.u.data.pointer = (caddr_t) &mlme; iwr.u.data.length = sizeof(mlme); if (ioctl(drv->ioctl_sock, SIOCSIWMLME, &iwr) < 0) { perror("ioctl[SIOCSIWMLME]"); ret = -1; } return ret;}static int wpa_driver_nl80211_deauthenticate(void *priv, const u8 *addr, int reason_code){ struct wpa_driver_nl80211_data *drv = priv; wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); return wpa_driver_nl80211_mlme(drv, addr, IW_MLME_DEAUTH, reason_code);}static int wpa_driver_nl80211_disassociate(void *priv, const u8 *addr, int reason_code){ struct wpa_driver_nl80211_data *drv = priv; wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); return wpa_driver_nl80211_mlme(drv, addr, IW_MLME_DISASSOC, reason_code);}static int wpa_driver_nl80211_set_gen_ie(void *priv, const u8 *ie, size_t ie_len){ struct wpa_driver_nl80211_data *drv = priv; struct iwreq iwr; int ret = 0; os_memset(&iwr, 0, sizeof(iwr)); os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ); iwr.u.data.pointer = (caddr_t) ie; iwr.u.data.length = ie_len; if (ioctl(drv->ioctl_sock, SIOCSIWGENIE, &iwr) < 0) { perror("ioctl[SIOCSIWGENIE]"); ret = -1; } return ret;}static int wpa_driver_nl80211_cipher2wext(int cipher){ switch (cipher) { case CIPHER_NONE: return IW_AUTH_CIPHER_NONE; case CIPHER_WEP40: return IW_AUTH_CIPHER_WEP40; case CIPHER_TKIP: return IW_AUTH_CIPHER_TKIP; case CIPHER_CCMP: return IW_AUTH_CIPHER_CCMP; case CIPHER_WEP104: return IW_AUTH_CIPHER_WEP104; default: return 0; }}static int wpa_driver_nl80211_keymgmt2wext(int keymgmt){ switch (keymgmt) { case KEY_MGMT_802_1X: case KEY_MGMT_802_1X_NO_WPA: return IW_AUTH_KEY_MGMT_802_1X; case KEY_MGMT_PSK: return IW_AUTH_KEY_MGMT_PSK; default: return 0; }}static intwpa_driver_nl80211_auth_alg_fallback(struct wpa_driver_nl80211_data *drv, struct wpa_driver_associate_params *params){ struct iwreq iwr; int ret = 0; wpa_printf(MSG_DEBUG, "WEXT: Driver did not support " "SIOCSIWAUTH for AUTH_ALG, trying SIOCSIWENCODE"); os_memset(&iwr, 0, sizeof(iwr)); os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ); /* Just changing mode, not actual keys */ iwr.u.encoding.flags = 0; iwr.u.encoding.pointer = (caddr_t) NULL; iwr.u.encoding.length = 0; /* * Note: IW_ENCODE_{OPEN,RESTRICTED} can be interpreted to mean two * different things. Here they are used to indicate Open System vs. * Shared Key authentication algorithm. However, some drivers may use * them to select between open/restricted WEP encrypted (open = allow * both unencrypted and encrypted frames; restricted = only allow * encrypted frames). */ if (!drv->use_crypt) { iwr.u.encoding.flags |= IW_ENCODE_DISABLED; } else { if (params->auth_alg & AUTH_ALG_OPEN_SYSTEM) iwr.u.encoding.flags |= IW_ENCODE_OPEN; if (params->auth_alg & AUTH_ALG_SHARED_KEY) iwr.u.encoding.flags |= IW_ENCODE_RESTRICTED; } if (ioctl(drv->ioctl_sock, SIOCSIWENCODE, &iwr) < 0) { perror("ioctl[SIOCSIWENCODE]"); ret = -1; } return ret;}static int wpa_driver_nl80211_associate( void *priv, struct wpa_driver_associate_params *params){ struct wpa_driver_nl80211_data *drv = priv; int ret = 0; int allow_unencrypted_eapol; int value; wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); /* * If the driver did not support SIOCSIWAUTH, fallback to * SIOCSIWENCODE here. */ if (drv->auth_alg_fallback && wpa_driver_nl80211_auth_alg_fallback(drv, params) < 0) ret = -1; if (!params->bssid && wpa_driver_nl80211_set_bssid(drv, NULL) < 0) ret = -1; if (wpa_driver_nl80211_set_mode(drv, params->mode) < 0) ret = -1; /* TODO: should consider getting wpa version and cipher/key_mgmt suites * from configuration, not from here, where only the selected suite is * available */ if (wpa_driver_nl80211_set_gen_ie(drv, params->wpa_ie, params->wpa_ie_len) < 0) ret = -1; if (params->wpa_ie == NULL || params->wpa_ie_len == 0) value = IW_AUTH_WPA_VERSION_DISABLED; else if (params->wpa_ie[0] == WLAN_EID_RSN) value = IW_AUTH_WPA_VERSION_WPA2; else value = IW_AUTH_WPA_VERSION_WPA; if (wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_WPA_VERSION, value) < 0) ret = -1; value = wpa_driver_nl80211_cipher2wext(params->pairwise_suite); if (wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_CIPHER_PAIRWISE, value) < 0) ret = -1; value = wpa_driver_nl80211_cipher2wext(params->group_suite); if (wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_CIPHER_GROUP, value) < 0) ret = -1; value = wpa_driver_nl80211_keymgmt2wext(params->key_mgmt_suite); if (wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_KEY_MGMT, value) < 0) ret = -1; value = params->key_mgmt_suite != KEY_MGMT_NONE || params->pairwise_suite != CIPHER_NONE || params->group_suite != CIPHER_NONE || params->wpa_ie_len; if (wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_PRIVACY_INVOKED, value) < 0) ret = -1; /* Allow unencrypted EAPOL messages even if pairwise keys are set when * not using WPA. IEEE 802.1X specifies that these frames are not * encrypted, but WPA encrypts them when pairwise keys are in use. */ if (params->key_mgmt_suite == KEY_MGMT_802_1X || params->key_mgmt_suite == KEY_MGMT_PSK) allow_unencrypted_eapol = 0; else allow_unencrypted_eapol = 1; if (wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_RX_UNENCRYPTED_EAPOL, allow_unencrypted_eapol) < 0) ret = -1; if (params->freq && wpa_driver_nl80211_set_freq(drv, params->freq) < 0) ret = -1; if (wpa_driver_nl80211_set_ssid(drv, params->ssid, params->ssid_len) < 0) ret = -1; if (params->bssid && wpa_driver_nl80211_set_bssid(drv, params->bssid) < 0) ret = -1; return ret;}static int wpa_driver_nl80211_set_auth_alg(void *priv, int auth_alg){ struct wpa_driver_nl80211_data *drv = priv; int algs = 0, res; if (auth_alg & AUTH_ALG_OPEN_SYSTEM) algs |= IW_AUTH_ALG_OPEN_SYSTEM; if (auth_alg & AUTH_ALG_SHARED_KEY) algs |= IW_AUTH_ALG_SHARED_KEY; if (auth_alg & AUTH_ALG_LEAP) algs |= IW_AUTH_ALG_LEAP; if (algs == 0) { /* at least one algorithm should be set */ algs = IW_AUTH_ALG_OPEN_SYSTEM; } res = wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_80211_AUTH_ALG, algs); drv->auth_alg_fallback = res == -2; return res;}/** * wpa_driver_nl80211_set_mode - Set wireless mode (infra/adhoc), SIOCSIWMODE * @priv: Pointer to private wext data from wpa_driver_nl80211_init() * @mode: 0 = infra/BSS (associate with an AP), 1 = adhoc/IBSS * Returns: 0 on success, -1 on failure */static int wpa_driver_nl80211_set_mode(void *priv, int mode){ struct wpa_driver_nl80211_data *drv = priv; int ret = -1, flags; struct nl_msg *msg; msg = nlmsg_alloc(); if (!msg) return -1; genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0, NL80211_CMD_SET_INTERFACE, 0); NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex); NLA_PUT_U32(msg, NL80211_ATTR_IFTYPE, NL80211_IFTYPE_AP); if (nl_send_auto_complete(drv->nl_handle, msg) < 0 || nl_wait_for_ack(drv->nl_handle) < 0) goto try_again; nlmsg_free(msg); return 0;nla_put_failure: nlmsg_free(msg); return -1;try_again: /* mac80211 doesn't allow mode changes while the device is up, so * take the device down, try to set the mode again, and bring the * device back up. */ if (wpa_driver_nl80211_get_ifflags(drv, &flags) == 0) { (void) wpa_driver_nl80211_set_ifflags(drv, flags & ~IFF_UP); /* Try to set the mode again while the interface is down */ if (nl_send_auto_complete(drv->nl_handle, msg) < 0 || nl_wait_for_ack(drv->nl_handle) < 0) { wpa_printf(MSG_ERROR, "Failed to set interface %s " "mode", drv->ifname); } else ret = 0; /* Ignore return value of get_ifflags to ensure that the device * is always up like it was before this function was called. */ (void) wpa_driver_nl80211_get_ifflags(drv, &flags); (void) wpa_driver_nl80211_set_ifflags(drv, flags | IFF_UP); } nlmsg_free(msg); return ret;}static int wpa_driver_nl80211_pmksa(struct wpa_driver_nl80211_data *drv, u32 cmd, const u8 *bssid, const u8 *pmkid){ struct iwreq iwr; struct iw_pmksa pmksa; int ret = 0; os_memset(&iwr, 0, sizeof(iwr)); os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ); os_memset(&pmksa, 0, sizeof(pmksa)); pmksa.cmd = cmd; pmksa.bssid.sa_family = ARPHRD_ETHER; if (bssid) os_memcpy(pmksa.bssid.sa_data, bssid, ETH_ALEN); if (pmkid) os_memcpy(pmksa.pmkid, pmkid, IW_PMKID_LEN); iwr.u.data.pointer = (caddr_t) &pmksa; iwr.u.data.length = sizeof(pmksa); if (ioctl(drv->ioctl_sock, SIOCSIWPMKSA, &iwr) < 0) { if (errno != EOPNOTSUPP) perror("ioctl[SIOCSIWPMKSA]"); ret = -1; } return ret;}static int wpa_driver_nl80211_add_pmkid(void *priv, const u8 *bssid, const u8 *pmkid){ struct wpa_driver_nl80211_data *drv = priv; return wpa_driver_nl80211_pmksa(drv, IW_PMKSA_ADD, bssid, pmkid);}static int wpa_driver_nl80211_remove_pmkid(void *priv, const u8 *bssid, const u8 *pmkid){ struct wpa_driver_nl80211_data *drv = priv; return wpa_driver_nl80211_pmksa(drv, IW_PMKSA_REMOVE, bssid, pmkid);}static int wpa_driver_nl80211_flush_pmkid(void *priv){ struct wpa_driver_nl80211_data *drv = priv; return wpa_driver_nl80211_pmksa(drv, IW_PMKSA_FLUSH, NULL, NULL);}static int wpa_driver_nl80211_get_capa(void *priv, struct wpa_driver_capa *capa){ struct wpa_driver_nl80211_data *drv = priv; if (!drv->has_capability) return -1; os_memcpy(capa, &drv->capa, sizeof(*capa)); return 0;}static int wpa_driver_nl80211_set_operstate(void *priv, int state){ struct wpa_driver_nl80211_data *drv = priv; wpa_printf(MSG_DEBUG, "%s: operstate %d->%d (%s)", __func__, drv->operstate, state, state ? "UP" : "DORMANT"); drv->operstate = state; return wpa_driver_nl80211_send_oper_ifla( drv, -1, state ? IF_OPER_UP : IF_OPER_DORMANT);}const struct wpa_driver_ops wpa_driver_nl80211_ops = { .name = "nl80211", .desc = "Linux nl80211/cfg80211", .get_bssid = wpa_driver_nl80211_get_bssid, .get_ssid = wpa_driver_nl80211_get_ssid, .set_wpa = wpa_driver_nl80211_set_wpa, .set_key = wpa_driver_nl80211_set_key, .set_countermeasures = wpa_driver_nl80211_set_countermeasures, .set_drop_unencrypted = wpa_driver_nl80211_set_drop_unencrypted, .scan = wpa_driver_nl80211_scan, .get_scan_results2 = wpa_driver_nl80211_get_scan_results, .deauthenticate = wpa_driver_nl80211_deauthenticate, .disassociate = wpa_driver_nl80211_disassociate, .associate = wpa_driver_nl80211_associate, .set_auth_alg = wpa_driver_nl80211_set_auth_alg, .init = wpa_driver_nl80211_init, .deinit = wpa_driver_nl80211_deinit, .add_pmkid = wpa_driver_nl80211_add_pmkid, .remove_pmkid = wpa_driver_nl80211_remove_pmkid, .flush_pmkid = wpa_driver_nl80211_flush_pmkid, .get_capa = wpa_driver_nl80211_get_capa, .set_operstate = wpa_driver_nl80211_set_operstate,};
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -