⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 driver_wext.c

📁 最新的Host AP 新添加了许多pcmcia 的驱动
💻 C
📖 第 1 页 / 共 5 页
字号:
	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	os_memset(&mlme, 0, sizeof(mlme));	mlme.cmd = cmd;	mlme.reason_code = reason_code;	mlme.addr.sa_family = ARPHRD_ETHER;	os_memcpy(mlme.addr.sa_data, addr, ETH_ALEN);	iwr.u.data.pointer = (caddr_t) &mlme;	iwr.u.data.length = sizeof(mlme);	if (ioctl(drv->ioctl_sock, SIOCSIWMLME, &iwr) < 0) {		perror("ioctl[SIOCSIWMLME]");		ret = -1;	}	return ret;}static void wpa_driver_wext_disconnect(struct wpa_driver_wext_data *drv){	const u8 null_bssid[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };	u8 ssid[32];	int i;	/*	 * Clear the BSSID selection and set a random SSID to make sure the	 * driver will not be trying to associate with something even if it	 * does not understand SIOCSIWMLME commands (or tries to associate	 * automatically after deauth/disassoc).	 */	wpa_driver_wext_set_bssid(drv, null_bssid);	for (i = 0; i < 32; i++)		ssid[i] = rand() & 0xFF;	wpa_driver_wext_set_ssid(drv, ssid, 32);}static int wpa_driver_wext_deauthenticate(void *priv, const u8 *addr,					  int reason_code){	struct wpa_driver_wext_data *drv = priv;	int ret;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	wpa_driver_wext_disconnect(drv);	ret = wpa_driver_wext_mlme(drv, addr, IW_MLME_DEAUTH, reason_code);	return ret;}static int wpa_driver_wext_disassociate(void *priv, const u8 *addr,					int reason_code){	struct wpa_driver_wext_data *drv = priv;	int ret;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	ret = wpa_driver_wext_mlme(drv, addr, IW_MLME_DISASSOC, reason_code);	wpa_driver_wext_disconnect(drv);	return ret;}static int wpa_driver_wext_set_gen_ie(void *priv, const u8 *ie,				      size_t ie_len){	struct wpa_driver_wext_data *drv = priv;	struct iwreq iwr;	int ret = 0;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	iwr.u.data.pointer = (caddr_t) ie;	iwr.u.data.length = ie_len;	if (ioctl(drv->ioctl_sock, SIOCSIWGENIE, &iwr) < 0) {		perror("ioctl[SIOCSIWGENIE]");		ret = -1;	}	return ret;}int wpa_driver_wext_cipher2wext(int cipher){	switch (cipher) {	case CIPHER_NONE:		return IW_AUTH_CIPHER_NONE;	case CIPHER_WEP40:		return IW_AUTH_CIPHER_WEP40;	case CIPHER_TKIP:		return IW_AUTH_CIPHER_TKIP;	case CIPHER_CCMP:		return IW_AUTH_CIPHER_CCMP;	case CIPHER_WEP104:		return IW_AUTH_CIPHER_WEP104;	default:		return 0;	}}int wpa_driver_wext_keymgmt2wext(int keymgmt){	switch (keymgmt) {	case KEY_MGMT_802_1X:	case KEY_MGMT_802_1X_NO_WPA:		return IW_AUTH_KEY_MGMT_802_1X;	case KEY_MGMT_PSK:		return IW_AUTH_KEY_MGMT_PSK;	default:		return 0;	}}static intwpa_driver_wext_auth_alg_fallback(struct wpa_driver_wext_data *drv,				  struct wpa_driver_associate_params *params){	struct iwreq iwr;	int ret = 0;	wpa_printf(MSG_DEBUG, "WEXT: Driver did not support "		   "SIOCSIWAUTH for AUTH_ALG, trying SIOCSIWENCODE");	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	/* Just changing mode, not actual keys */	iwr.u.encoding.flags = 0;	iwr.u.encoding.pointer = (caddr_t) NULL;	iwr.u.encoding.length = 0;	/*	 * Note: IW_ENCODE_{OPEN,RESTRICTED} can be interpreted to mean two	 * different things. Here they are used to indicate Open System vs.	 * Shared Key authentication algorithm. However, some drivers may use	 * them to select between open/restricted WEP encrypted (open = allow	 * both unencrypted and encrypted frames; restricted = only allow	 * encrypted frames).	 */	if (!drv->use_crypt) {		iwr.u.encoding.flags |= IW_ENCODE_DISABLED;	} else {		if (params->auth_alg & AUTH_ALG_OPEN_SYSTEM)			iwr.u.encoding.flags |= IW_ENCODE_OPEN;		if (params->auth_alg & AUTH_ALG_SHARED_KEY)			iwr.u.encoding.flags |= IW_ENCODE_RESTRICTED;	}	if (ioctl(drv->ioctl_sock, SIOCSIWENCODE, &iwr) < 0) {		perror("ioctl[SIOCSIWENCODE]");		ret = -1;	}	return ret;}int wpa_driver_wext_associate(void *priv,			      struct wpa_driver_associate_params *params){	struct wpa_driver_wext_data *drv = priv;	int ret = 0;	int allow_unencrypted_eapol;	int value;	wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);	/*	 * If the driver did not support SIOCSIWAUTH, fallback to	 * SIOCSIWENCODE here.	 */	if (drv->auth_alg_fallback &&	    wpa_driver_wext_auth_alg_fallback(drv, params) < 0)		ret = -1;	if (!params->bssid &&	    wpa_driver_wext_set_bssid(drv, NULL) < 0)		ret = -1;	/* TODO: should consider getting wpa version and cipher/key_mgmt suites	 * from configuration, not from here, where only the selected suite is	 * available */	if (wpa_driver_wext_set_gen_ie(drv, params->wpa_ie, params->wpa_ie_len)	    < 0)		ret = -1;	if (params->wpa_ie == NULL || params->wpa_ie_len == 0)		value = IW_AUTH_WPA_VERSION_DISABLED;	else if (params->wpa_ie[0] == WLAN_EID_RSN)		value = IW_AUTH_WPA_VERSION_WPA2;	else		value = IW_AUTH_WPA_VERSION_WPA;	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_WPA_VERSION, value) < 0)		ret = -1;	value = wpa_driver_wext_cipher2wext(params->pairwise_suite);	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_CIPHER_PAIRWISE, value) < 0)		ret = -1;	value = wpa_driver_wext_cipher2wext(params->group_suite);	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_CIPHER_GROUP, value) < 0)		ret = -1;	value = wpa_driver_wext_keymgmt2wext(params->key_mgmt_suite);	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_KEY_MGMT, value) < 0)		ret = -1;	value = params->key_mgmt_suite != KEY_MGMT_NONE ||		params->pairwise_suite != CIPHER_NONE ||		params->group_suite != CIPHER_NONE ||		params->wpa_ie_len;	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_PRIVACY_INVOKED, value) < 0)		ret = -1;	/* Allow unencrypted EAPOL messages even if pairwise keys are set when	 * not using WPA. IEEE 802.1X specifies that these frames are not	 * encrypted, but WPA encrypts them when pairwise keys are in use. */	if (params->key_mgmt_suite == KEY_MGMT_802_1X ||	    params->key_mgmt_suite == KEY_MGMT_PSK)		allow_unencrypted_eapol = 0;	else		allow_unencrypted_eapol = 1;	if (wpa_driver_wext_set_psk(drv, params->psk) < 0)		ret = -1;	if (wpa_driver_wext_set_auth_param(drv,					   IW_AUTH_RX_UNENCRYPTED_EAPOL,					   allow_unencrypted_eapol) < 0)		ret = -1;#ifdef CONFIG_IEEE80211W	switch (params->mgmt_frame_protection) {	case NO_MGMT_FRAME_PROTECTION:		value = IW_AUTH_MFP_DISABLED;		break;	case MGMT_FRAME_PROTECTION_OPTIONAL:		value = IW_AUTH_MFP_OPTIONAL;		break;	case MGMT_FRAME_PROTECTION_REQUIRED:		value = IW_AUTH_MFP_REQUIRED;		break;	};	if (wpa_driver_wext_set_auth_param(drv, IW_AUTH_MFP, value) < 0)		ret = -1;#endif /* CONFIG_IEEE80211W */	if (params->freq && wpa_driver_wext_set_freq(drv, params->freq) < 0)		ret = -1;	if (wpa_driver_wext_set_ssid(drv, params->ssid, params->ssid_len) < 0)		ret = -1;	if (params->bssid &&	    wpa_driver_wext_set_bssid(drv, params->bssid) < 0)		ret = -1;	return ret;}static int wpa_driver_wext_set_auth_alg(void *priv, int auth_alg){	struct wpa_driver_wext_data *drv = priv;	int algs = 0, res;	if (auth_alg & AUTH_ALG_OPEN_SYSTEM)		algs |= IW_AUTH_ALG_OPEN_SYSTEM;	if (auth_alg & AUTH_ALG_SHARED_KEY)		algs |= IW_AUTH_ALG_SHARED_KEY;	if (auth_alg & AUTH_ALG_LEAP)		algs |= IW_AUTH_ALG_LEAP;	if (algs == 0) {		/* at least one algorithm should be set */		algs = IW_AUTH_ALG_OPEN_SYSTEM;	}	res = wpa_driver_wext_set_auth_param(drv, IW_AUTH_80211_AUTH_ALG,					     algs);	drv->auth_alg_fallback = res == -2;	return res;}/** * wpa_driver_wext_set_mode - Set wireless mode (infra/adhoc), SIOCSIWMODE * @priv: Pointer to private wext data from wpa_driver_wext_init() * @mode: 0 = infra/BSS (associate with an AP), 1 = adhoc/IBSS * Returns: 0 on success, -1 on failure */int wpa_driver_wext_set_mode(void *priv, int mode){	struct wpa_driver_wext_data *drv = priv;	struct iwreq iwr;	int ret = -1, flags;	unsigned int new_mode = mode ? IW_MODE_ADHOC : IW_MODE_INFRA;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	iwr.u.mode = new_mode;	if (ioctl(drv->ioctl_sock, SIOCSIWMODE, &iwr) == 0) {		ret = 0;		goto done;	}	if (errno != EBUSY) {		perror("ioctl[SIOCSIWMODE]");		goto done;	}	/* mac80211 doesn't allow mode changes while the device is up, so if	 * the device isn't in the mode we're about to change to, take device	 * down, try to set the mode again, and bring it back up.	 */	if (ioctl(drv->ioctl_sock, SIOCGIWMODE, &iwr) < 0) {		perror("ioctl[SIOCGIWMODE]");		goto done;	}	if (iwr.u.mode == new_mode) {		ret = 0;		goto done;	}	if (wpa_driver_wext_get_ifflags(drv, &flags) == 0) {		(void) wpa_driver_wext_set_ifflags(drv, flags & ~IFF_UP);		/* Try to set the mode again while the interface is down */		iwr.u.mode = new_mode;		if (ioctl(drv->ioctl_sock, SIOCSIWMODE, &iwr) < 0)			perror("ioctl[SIOCSIWMODE]");		else			ret = 0;		/* Ignore return value of get_ifflags to ensure that the device		 * is always up like it was before this function was called.		 */		(void) wpa_driver_wext_get_ifflags(drv, &flags);		(void) wpa_driver_wext_set_ifflags(drv, flags | IFF_UP);	}done:	return ret;}static int wpa_driver_wext_pmksa(struct wpa_driver_wext_data *drv,				 u32 cmd, const u8 *bssid, const u8 *pmkid){	struct iwreq iwr;	struct iw_pmksa pmksa;	int ret = 0;	os_memset(&iwr, 0, sizeof(iwr));	os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);	os_memset(&pmksa, 0, sizeof(pmksa));	pmksa.cmd = cmd;	pmksa.bssid.sa_family = ARPHRD_ETHER;	if (bssid)		os_memcpy(pmksa.bssid.sa_data, bssid, ETH_ALEN);	if (pmkid)		os_memcpy(pmksa.pmkid, pmkid, IW_PMKID_LEN);	iwr.u.data.pointer = (caddr_t) &pmksa;	iwr.u.data.length = sizeof(pmksa);	if (ioctl(drv->ioctl_sock, SIOCSIWPMKSA, &iwr) < 0) {		if (errno != EOPNOTSUPP)			perror("ioctl[SIOCSIWPMKSA]");		ret = -1;	}	return ret;}static int wpa_driver_wext_add_pmkid(void *priv, const u8 *bssid,				     const u8 *pmkid){	struct wpa_driver_wext_data *drv = priv;	return wpa_driver_wext_pmksa(drv, IW_PMKSA_ADD, bssid, pmkid);}static int wpa_driver_wext_remove_pmkid(void *priv, const u8 *bssid,		 			const u8 *pmkid){	struct wpa_driver_wext_data *drv = priv;	return wpa_driver_wext_pmksa(drv, IW_PMKSA_REMOVE, bssid, pmkid);}static int wpa_driver_wext_flush_pmkid(void *priv){	struct wpa_driver_wext_data *drv = priv;	return wpa_driver_wext_pmksa(drv, IW_PMKSA_FLUSH, NULL, NULL);}int wpa_driver_wext_get_capa(void *priv, struct wpa_driver_capa *capa){	struct wpa_driver_wext_data *drv = priv;	if (!drv->has_capability)		return -1;	os_memcpy(capa, &drv->capa, sizeof(*capa));	return 0;}int wpa_driver_wext_alternative_ifindex(struct wpa_driver_wext_data *drv,					const char *ifname){	if (ifname == NULL) {		drv->ifindex2 = -1;		return 0;	}	drv->ifindex2 = if_nametoindex(ifname);	if (drv->ifindex2 <= 0)		return -1;	wpa_printf(MSG_DEBUG, "Added alternative ifindex %d (%s) for "		   "wireless events", drv->ifindex2, ifname);	return 0;}int wpa_driver_wext_set_operstate(void *priv, int state){	struct wpa_driver_wext_data *drv = priv;	wpa_printf(MSG_DEBUG, "%s: operstate %d->%d (%s)",		   __func__, drv->operstate, state, state ? "UP" : "DORMANT");	drv->operstate = state;	return wpa_driver_wext_send_oper_ifla(		drv, -1, state ? IF_OPER_UP : IF_OPER_DORMANT);}int wpa_driver_wext_get_version(struct wpa_driver_wext_data *drv){	return drv->we_version_compiled;}const struct wpa_driver_ops wpa_driver_wext_ops = {	.name = "wext",	.desc = "Linux wireless extensions (generic)",	.get_bssid = wpa_driver_wext_get_bssid,	.get_ssid = wpa_driver_wext_get_ssid,	.set_wpa = wpa_driver_wext_set_wpa,	.set_key = wpa_driver_wext_set_key,	.set_countermeasures = wpa_driver_wext_set_countermeasures,	.set_drop_unencrypted = wpa_driver_wext_set_drop_unencrypted,	.scan = wpa_driver_wext_scan,	.get_scan_results2 = wpa_driver_wext_get_scan_results,	.deauthenticate = wpa_driver_wext_deauthenticate,	.disassociate = wpa_driver_wext_disassociate,	.set_mode = wpa_driver_wext_set_mode,	.associate = wpa_driver_wext_associate,	.set_auth_alg = wpa_driver_wext_set_auth_alg,	.init = wpa_driver_wext_init,	.deinit = wpa_driver_wext_deinit,	.add_pmkid = wpa_driver_wext_add_pmkid,	.remove_pmkid = wpa_driver_wext_remove_pmkid,	.flush_pmkid = wpa_driver_wext_flush_pmkid,	.get_capa = wpa_driver_wext_get_capa,	.set_operstate = wpa_driver_wext_set_operstate,};

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -