2014-07-29 21:25:01 +02:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* Wireless daemon for Linux
|
|
|
|
*
|
|
|
|
* Copyright (C) 2013-2014 Intel Corporation. All rights reserved.
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include <config.h>
|
|
|
|
#endif
|
|
|
|
|
2014-08-07 01:06:51 +02:00
|
|
|
#include <stdlib.h>
|
2014-10-23 21:32:12 +02:00
|
|
|
#include <stdio.h>
|
2014-11-05 16:18:28 +01:00
|
|
|
#include <errno.h>
|
2014-08-07 05:15:20 +02:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <linux/if.h>
|
2015-03-20 03:54:28 +01:00
|
|
|
#include <linux/if_packet.h>
|
2014-08-07 05:15:20 +02:00
|
|
|
#include <linux/if_ether.h>
|
2015-03-20 18:29:50 +01:00
|
|
|
|
2014-07-29 21:25:01 +02:00
|
|
|
#include <ell/ell.h>
|
|
|
|
|
|
|
|
#include "linux/nl80211.h"
|
2014-10-30 06:26:49 +01:00
|
|
|
#include "src/iwd.h"
|
2014-08-09 08:23:56 +02:00
|
|
|
#include "src/ie.h"
|
2014-07-29 21:25:01 +02:00
|
|
|
#include "src/wiphy.h"
|
2014-10-23 21:32:12 +02:00
|
|
|
#include "src/dbus.h"
|
2015-01-12 16:52:37 +01:00
|
|
|
#include "src/scan.h"
|
2015-01-15 12:32:28 +01:00
|
|
|
#include "src/util.h"
|
2016-05-11 22:52:43 +02:00
|
|
|
#include "src/common.h"
|
2015-02-26 14:31:27 +01:00
|
|
|
#include "src/eapol.h"
|
2015-03-06 12:17:18 +01:00
|
|
|
#include "src/agent.h"
|
|
|
|
#include "src/crypto.h"
|
2015-03-27 08:54:25 +01:00
|
|
|
#include "src/netdev.h"
|
2015-03-30 03:27:57 +02:00
|
|
|
#include "src/mpdu.h"
|
2015-04-27 14:51:28 +02:00
|
|
|
#include "src/storage.h"
|
2015-06-23 00:42:30 +02:00
|
|
|
#include "src/network.h"
|
2016-05-05 19:13:45 +02:00
|
|
|
#include "src/device.h"
|
2014-10-23 21:32:12 +02:00
|
|
|
|
2014-07-29 21:25:01 +02:00
|
|
|
static struct l_genl_family *nl80211 = NULL;
|
|
|
|
|
2016-05-05 19:25:45 +02:00
|
|
|
enum device_state {
|
|
|
|
DEVICE_STATE_DISCONNECTED = 0, /* Disconnected, no auto-connect */
|
|
|
|
DEVICE_STATE_AUTOCONNECT, /* Disconnected, try auto-connect */
|
|
|
|
DEVICE_STATE_CONNECTING, /* Connecting */
|
|
|
|
DEVICE_STATE_CONNECTED,
|
|
|
|
DEVICE_STATE_DISCONNECTING,
|
2016-05-05 18:40:54 +02:00
|
|
|
};
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device {
|
2014-08-07 05:15:20 +02:00
|
|
|
uint32_t index;
|
|
|
|
uint8_t addr[ETH_ALEN];
|
2016-05-05 19:25:45 +02:00
|
|
|
enum device_state state;
|
2014-08-09 08:23:56 +02:00
|
|
|
struct l_queue *bss_list;
|
2014-10-30 04:50:27 +01:00
|
|
|
struct l_queue *old_bss_list;
|
2015-02-13 23:12:07 +01:00
|
|
|
struct l_dbus_message *scan_pending;
|
2014-10-30 05:20:43 +01:00
|
|
|
struct l_hashmap *networks;
|
2015-05-01 04:38:27 +02:00
|
|
|
struct scan_bss *connected_bss;
|
2015-04-30 22:00:02 +02:00
|
|
|
struct network *connected_network;
|
2015-06-23 00:42:30 +02:00
|
|
|
struct l_queue *autoconnect_list;
|
2015-02-13 23:12:08 +01:00
|
|
|
struct l_dbus_message *connect_pending;
|
2015-04-08 22:03:28 +02:00
|
|
|
struct l_dbus_message *disconnect_pending;
|
2015-02-26 14:31:27 +01:00
|
|
|
struct l_io *eapol_io;
|
2015-03-30 04:11:19 +02:00
|
|
|
|
|
|
|
uint32_t pairwise_new_key_cmd_id;
|
|
|
|
uint32_t pairwise_set_key_cmd_id;
|
|
|
|
uint32_t group_new_key_cmd_id;
|
2015-05-18 13:31:40 +02:00
|
|
|
|
|
|
|
struct wiphy *wiphy;
|
2016-06-02 04:09:22 +02:00
|
|
|
struct netdev *netdev;
|
2014-08-07 05:15:20 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
struct wiphy {
|
|
|
|
uint32_t id;
|
|
|
|
char name[20];
|
2014-08-08 00:41:30 +02:00
|
|
|
uint32_t feature_flags;
|
2015-04-17 19:27:02 +02:00
|
|
|
bool support_scheduled_scan:1;
|
2015-05-06 22:24:14 +02:00
|
|
|
bool support_rekey_offload:1;
|
2015-04-17 20:02:32 +02:00
|
|
|
uint16_t pairwise_ciphers;
|
2015-10-06 22:23:32 +02:00
|
|
|
struct scan_freq_set *supported_freqs;
|
2014-08-07 05:15:20 +02:00
|
|
|
};
|
|
|
|
|
2015-06-23 00:42:30 +02:00
|
|
|
struct autoconnect_entry {
|
|
|
|
uint16_t rank;
|
|
|
|
struct network *network;
|
|
|
|
struct scan_bss *bss;
|
|
|
|
};
|
|
|
|
|
2014-08-07 05:15:20 +02:00
|
|
|
static struct l_queue *wiphy_list = NULL;
|
2016-06-02 00:23:33 +02:00
|
|
|
static struct l_queue *device_list;
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2015-09-20 21:58:23 +02:00
|
|
|
static bool new_scan_results(uint32_t wiphy_id, uint32_t ifindex,
|
|
|
|
struct l_queue *bss_list, void *userdata);
|
|
|
|
|
2015-03-20 03:54:28 +01:00
|
|
|
static bool eapol_read(struct l_io *io, void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *netdev = user_data;
|
2015-03-20 03:54:28 +01:00
|
|
|
int fd = l_io_get_fd(io);
|
|
|
|
struct sockaddr_ll sll;
|
|
|
|
socklen_t sll_len;
|
|
|
|
ssize_t bytes;
|
|
|
|
uint8_t frame[2304]; /* IEEE Std 802.11 ch. 8.2.3 */
|
|
|
|
|
2015-03-20 06:43:54 +01:00
|
|
|
memset(&sll, 0, sizeof(sll));
|
2015-03-20 03:54:28 +01:00
|
|
|
sll_len = sizeof(sll);
|
|
|
|
|
|
|
|
bytes = recvfrom(fd, frame, sizeof(frame), 0,
|
|
|
|
(struct sockaddr *) &sll, &sll_len);
|
|
|
|
if (bytes <= 0) {
|
2015-03-20 18:30:11 +01:00
|
|
|
l_error("EAPoL read socket: %s", strerror(errno));
|
2015-03-20 03:54:28 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
__eapol_rx_packet(netdev->index, netdev->addr, sll.sll_addr,
|
2015-10-30 11:12:19 +01:00
|
|
|
frame, bytes);
|
2015-03-20 03:54:28 +01:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static const char *iwd_network_get_path(struct device *device,
|
2015-03-10 12:20:43 +01:00
|
|
|
const uint8_t *ssid, size_t ssid_len,
|
2016-05-11 22:52:43 +02:00
|
|
|
enum security security)
|
2015-01-28 13:14:54 +01:00
|
|
|
{
|
|
|
|
static char path[256];
|
2015-03-10 12:20:43 +01:00
|
|
|
unsigned int pos, i;
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
pos = snprintf(path, sizeof(path), "%s/", device_get_path(device));
|
2015-01-28 13:14:54 +01:00
|
|
|
|
|
|
|
for (i = 0; i < ssid_len && pos < sizeof(path); i++)
|
|
|
|
pos += snprintf(path + pos, sizeof(path) - pos, "%02x",
|
2015-03-10 12:20:43 +01:00
|
|
|
ssid[i]);
|
2015-01-28 13:14:54 +01:00
|
|
|
|
2015-03-10 12:20:43 +01:00
|
|
|
snprintf(path + pos, sizeof(path) - pos, "_%s",
|
2016-05-11 22:52:43 +02:00
|
|
|
security_to_str(security));
|
2015-01-28 13:14:54 +01:00
|
|
|
|
2014-10-23 22:09:52 +02:00
|
|
|
return path;
|
|
|
|
}
|
|
|
|
|
2016-05-05 19:25:45 +02:00
|
|
|
static const char *device_state_to_string(enum device_state state)
|
2015-06-23 00:02:52 +02:00
|
|
|
{
|
|
|
|
switch (state) {
|
2016-05-05 19:25:45 +02:00
|
|
|
case DEVICE_STATE_DISCONNECTED:
|
2015-06-23 00:02:52 +02:00
|
|
|
return "disconnected";
|
2016-05-05 19:25:45 +02:00
|
|
|
case DEVICE_STATE_AUTOCONNECT:
|
2015-06-23 00:02:52 +02:00
|
|
|
return "autoconnect";
|
2016-05-05 19:25:45 +02:00
|
|
|
case DEVICE_STATE_CONNECTING:
|
2015-06-23 00:02:52 +02:00
|
|
|
return "connecting";
|
2016-05-05 19:25:45 +02:00
|
|
|
case DEVICE_STATE_CONNECTED:
|
2015-06-23 00:02:52 +02:00
|
|
|
return "connected";
|
2016-05-05 19:25:45 +02:00
|
|
|
case DEVICE_STATE_DISCONNECTING:
|
2015-06-23 00:02:52 +02:00
|
|
|
return "disconnecting";
|
|
|
|
}
|
|
|
|
|
|
|
|
return "invalid";
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
struct network *device_get_connected_network(struct device *device)
|
2016-05-12 05:27:31 +02:00
|
|
|
{
|
|
|
|
return device->connected_network;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
bool device_is_busy(struct device *device)
|
2016-05-16 19:24:41 +02:00
|
|
|
{
|
|
|
|
if (device->state != DEVICE_STATE_DISCONNECTED &&
|
|
|
|
device->state != DEVICE_STATE_AUTOCONNECT)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
struct wiphy *device_get_wiphy(struct device *device)
|
2016-05-16 19:26:00 +02:00
|
|
|
{
|
|
|
|
return device->wiphy;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static void device_enter_state(struct device *device, enum device_state state)
|
2015-06-23 00:02:52 +02:00
|
|
|
{
|
|
|
|
l_debug("Old State: %s, new state: %s",
|
2016-05-31 19:57:24 +02:00
|
|
|
device_state_to_string(device->state),
|
2016-05-05 19:25:45 +02:00
|
|
|
device_state_to_string(state));
|
2015-06-23 00:02:52 +02:00
|
|
|
|
|
|
|
switch (state) {
|
2016-05-05 19:25:45 +02:00
|
|
|
case DEVICE_STATE_AUTOCONNECT:
|
2016-05-31 19:57:24 +02:00
|
|
|
scan_periodic_start(device->index, new_scan_results, device);
|
2015-06-23 00:02:52 +02:00
|
|
|
break;
|
2016-05-05 19:25:45 +02:00
|
|
|
case DEVICE_STATE_DISCONNECTED:
|
2016-05-31 19:57:24 +02:00
|
|
|
scan_periodic_stop(device->index);
|
2015-06-23 00:02:52 +02:00
|
|
|
break;
|
2016-05-05 19:25:45 +02:00
|
|
|
case DEVICE_STATE_CONNECTED:
|
2016-05-31 19:57:24 +02:00
|
|
|
scan_periodic_stop(device->index);
|
2015-06-23 00:02:52 +02:00
|
|
|
break;
|
2016-05-05 19:25:45 +02:00
|
|
|
case DEVICE_STATE_CONNECTING:
|
2015-06-23 00:02:52 +02:00
|
|
|
break;
|
2016-05-05 19:25:45 +02:00
|
|
|
case DEVICE_STATE_DISCONNECTING:
|
2015-06-23 00:02:52 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device->state = state;
|
2015-06-23 00:02:52 +02:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static void device_disassociated(struct device *device)
|
2015-04-27 14:51:28 +02:00
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct network *network = device->connected_network;
|
2016-05-21 03:39:38 +02:00
|
|
|
struct l_dbus *dbus = dbus_get_bus();
|
2015-04-27 14:51:28 +02:00
|
|
|
|
2016-05-16 03:58:09 +02:00
|
|
|
network_settings_close(network);
|
2015-04-27 14:51:28 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device->connected_bss = NULL;
|
|
|
|
device->connected_network = NULL;
|
2015-06-23 00:02:52 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device_enter_state(device, DEVICE_STATE_AUTOCONNECT);
|
2016-05-21 03:39:38 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
l_dbus_property_changed(dbus, device_get_path(device),
|
2016-05-21 03:39:38 +02:00
|
|
|
IWD_DEVICE_INTERFACE, "ConnectedNetwork");
|
|
|
|
l_dbus_property_changed(dbus, network_get_path(network),
|
|
|
|
IWD_NETWORK_INTERFACE, "Connected");
|
2015-04-27 14:51:28 +02:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static void device_lost_beacon(struct device *device)
|
2015-05-01 01:42:44 +02:00
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->connect_pending)
|
|
|
|
dbus_pending_reply(&device->connect_pending,
|
|
|
|
dbus_error_failed(device->connect_pending));
|
2015-05-01 01:42:44 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->connected_network)
|
|
|
|
device_disassociated(device);
|
2015-05-01 01:42:44 +02:00
|
|
|
}
|
|
|
|
|
2015-03-03 10:27:39 +01:00
|
|
|
static void genl_connect_cb(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2015-03-03 10:27:39 +01:00
|
|
|
|
2015-04-27 14:51:28 +02:00
|
|
|
if (l_genl_msg_get_error(msg) < 0) {
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->connect_pending)
|
|
|
|
dbus_pending_reply(&device->connect_pending,
|
|
|
|
dbus_error_failed(device->connect_pending));
|
2015-04-27 14:51:28 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device_disassociated(device);
|
2015-04-27 14:51:28 +02:00
|
|
|
}
|
2015-03-03 10:27:39 +01:00
|
|
|
}
|
|
|
|
|
2016-05-16 19:21:26 +02:00
|
|
|
enum ie_rsn_cipher_suite wiphy_select_cipher(struct wiphy *wiphy, uint16_t mask)
|
2015-05-26 19:51:23 +02:00
|
|
|
{
|
|
|
|
mask &= wiphy->pairwise_ciphers;
|
|
|
|
|
|
|
|
/* CCMP is our first choice, TKIP second */
|
|
|
|
if (mask & IE_RSN_CIPHER_SUITE_CCMP)
|
|
|
|
return IE_RSN_CIPHER_SUITE_CCMP;
|
|
|
|
|
|
|
|
if (mask & IE_RSN_CIPHER_SUITE_TKIP)
|
|
|
|
return IE_RSN_CIPHER_SUITE_TKIP;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int mlme_authenticate_cmd(struct network *network, struct scan_bss *bss)
|
2015-03-06 12:17:18 +01:00
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = network_get_device(network);
|
2016-05-12 05:01:44 +02:00
|
|
|
const char *ssid = network_get_ssid(network);
|
2015-03-06 12:17:18 +01:00
|
|
|
uint32_t auth_type = NL80211_AUTHTYPE_OPEN_SYSTEM;
|
|
|
|
struct l_genl_msg *msg;
|
|
|
|
|
|
|
|
msg = l_genl_msg_new_sized(NL80211_CMD_AUTHENTICATE, 512);
|
2016-05-31 19:57:24 +02:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_IFINDEX, 4, &device->index);
|
2015-03-06 12:17:18 +01:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_WIPHY_FREQ, 4, &bss->frequency);
|
|
|
|
msg_append_attr(msg, NL80211_ATTR_MAC, ETH_ALEN, bss->addr);
|
2016-05-12 05:01:44 +02:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_SSID, strlen(ssid), ssid);
|
2015-03-06 12:17:18 +01:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_AUTH_TYPE, 4, &auth_type);
|
2016-05-31 19:57:24 +02:00
|
|
|
l_genl_family_send(nl80211, msg, genl_connect_cb, device, NULL);
|
2015-03-06 12:17:18 +01:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
void device_connect_network(struct device *device, struct network *network,
|
2016-05-16 19:04:45 +02:00
|
|
|
struct scan_bss *bss,
|
|
|
|
struct l_dbus_message *message)
|
|
|
|
{
|
2016-05-21 03:39:38 +02:00
|
|
|
struct l_dbus *dbus = dbus_get_bus();
|
|
|
|
|
2016-05-16 19:04:45 +02:00
|
|
|
device->connect_pending = l_dbus_message_ref(message);
|
|
|
|
|
|
|
|
device->connected_bss = bss;
|
|
|
|
device->connected_network = network;
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device_enter_state(device, DEVICE_STATE_CONNECTING);
|
2016-05-16 19:04:45 +02:00
|
|
|
|
|
|
|
mlme_authenticate_cmd(network, bss);
|
2016-05-21 03:39:38 +02:00
|
|
|
|
|
|
|
l_dbus_property_changed(dbus, device_get_path(device),
|
|
|
|
IWD_DEVICE_INTERFACE, "ConnectedNetwork");
|
|
|
|
l_dbus_property_changed(dbus, network_get_path(network),
|
|
|
|
IWD_NETWORK_INTERFACE, "Connected");
|
2016-05-16 19:04:45 +02:00
|
|
|
}
|
|
|
|
|
2015-01-28 13:14:54 +01:00
|
|
|
static void bss_free(void *data)
|
|
|
|
{
|
2015-05-01 04:38:27 +02:00
|
|
|
struct scan_bss *bss = data;
|
2015-01-28 13:14:54 +01:00
|
|
|
|
|
|
|
l_debug("Freeing BSS %02X:%02X:%02X:%02X:%02X:%02X",
|
|
|
|
bss->addr[0], bss->addr[1], bss->addr[2],
|
|
|
|
bss->addr[3], bss->addr[4], bss->addr[5]);
|
2015-05-01 05:21:31 +02:00
|
|
|
|
|
|
|
scan_bss_free(bss);
|
2015-01-28 13:14:54 +01:00
|
|
|
}
|
|
|
|
|
2014-10-30 05:20:43 +01:00
|
|
|
static void network_free(void *data)
|
|
|
|
{
|
|
|
|
struct network *network = data;
|
2015-03-06 12:17:18 +01:00
|
|
|
|
2016-05-16 04:41:37 +02:00
|
|
|
network_remove(network);
|
2014-10-30 05:20:43 +01:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
const char *device_get_path(struct device *device)
|
2014-10-30 06:01:52 +01:00
|
|
|
{
|
2015-02-26 12:03:05 +01:00
|
|
|
static char path[12];
|
2014-10-30 06:01:52 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
snprintf(path, sizeof(path), "/%u", device->index);
|
2014-10-30 06:01:52 +01:00
|
|
|
return path;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
const uint8_t *device_get_address(struct device *device)
|
|
|
|
{
|
|
|
|
return device->addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t device_get_ifindex(struct device *device)
|
|
|
|
{
|
|
|
|
return device->index;
|
|
|
|
}
|
|
|
|
|
2014-10-24 04:47:38 +02:00
|
|
|
void __iwd_device_foreach(iwd_device_foreach_func func, void *user_data)
|
|
|
|
{
|
2016-06-02 00:23:33 +02:00
|
|
|
const struct l_queue_entry *device_entry;
|
2014-10-24 04:47:38 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
for (device_entry = l_queue_get_entries(device_list); device_entry;
|
|
|
|
device_entry = device_entry->next) {
|
|
|
|
struct device *device = device_entry->data;
|
2014-10-24 04:47:38 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
func(device, user_data);
|
2014-10-24 04:47:38 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-22 21:05:50 +02:00
|
|
|
static void device_scan_triggered(int err, void *user_data)
|
2014-10-28 05:43:21 +01:00
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2014-10-28 05:43:21 +01:00
|
|
|
struct l_dbus_message *reply;
|
|
|
|
|
2015-09-22 21:05:50 +02:00
|
|
|
l_debug("device_scan_triggered: %i", err);
|
2015-03-11 14:31:51 +01:00
|
|
|
|
2015-09-22 21:05:50 +02:00
|
|
|
if (err < 0) {
|
2016-05-31 19:57:24 +02:00
|
|
|
dbus_pending_reply(&device->scan_pending,
|
|
|
|
dbus_error_failed(device->scan_pending));
|
2014-10-28 05:43:21 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-06-02 04:09:22 +02:00
|
|
|
l_debug("Scan triggered for %s", netdev_get_name(device->netdev));
|
2014-10-28 05:43:21 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
reply = l_dbus_message_new_method_return(device->scan_pending);
|
2014-10-28 05:43:21 +01:00
|
|
|
l_dbus_message_set_arguments(reply, "");
|
2016-05-31 19:57:24 +02:00
|
|
|
dbus_pending_reply(&device->scan_pending, reply);
|
2014-10-28 05:43:21 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct l_dbus_message *device_scan(struct l_dbus *dbus,
|
|
|
|
struct l_dbus_message *message,
|
|
|
|
void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2014-10-28 05:43:21 +01:00
|
|
|
|
2015-03-11 14:31:51 +01:00
|
|
|
l_debug("Scan called from DBus");
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->scan_pending)
|
2014-10-28 05:43:21 +01:00
|
|
|
return dbus_error_busy(message);
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device->scan_pending = l_dbus_message_ref(message);
|
2014-10-28 05:43:21 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (!scan_passive(device->index, device_scan_triggered,
|
|
|
|
new_scan_results, device, NULL))
|
2015-09-22 21:05:50 +02:00
|
|
|
return dbus_error_failed(message);
|
2014-10-28 05:43:21 +01:00
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-09-28 18:32:26 +02:00
|
|
|
static void device_disconnect_cb(struct l_genl_msg *msg, void *user_data)
|
2015-03-03 10:27:39 +01:00
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2015-04-08 22:03:28 +02:00
|
|
|
struct l_dbus_message *reply;
|
2015-03-03 10:27:39 +01:00
|
|
|
|
2015-04-08 22:03:28 +02:00
|
|
|
if (l_genl_msg_get_error(msg) < 0) {
|
2016-05-31 19:57:24 +02:00
|
|
|
dbus_pending_reply(&device->disconnect_pending,
|
|
|
|
dbus_error_failed(device->disconnect_pending));
|
2015-04-08 22:03:28 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device_disassociated(device);
|
2015-05-01 00:01:20 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
reply = l_dbus_message_new_method_return(device->disconnect_pending);
|
2015-04-08 22:03:28 +02:00
|
|
|
l_dbus_message_set_arguments(reply, "");
|
2016-05-31 19:57:24 +02:00
|
|
|
dbus_pending_reply(&device->disconnect_pending, reply);
|
2015-03-03 10:27:39 +01:00
|
|
|
}
|
|
|
|
|
2015-02-20 12:27:58 +01:00
|
|
|
static struct l_dbus_message *device_disconnect(struct l_dbus *dbus,
|
|
|
|
struct l_dbus_message *message,
|
|
|
|
void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2015-02-20 12:27:58 +01:00
|
|
|
struct l_genl_msg *msg;
|
2015-03-30 03:27:57 +02:00
|
|
|
uint16_t reason_code = MPDU_REASON_CODE_DEAUTH_LEAVING;
|
2016-05-12 05:11:08 +02:00
|
|
|
enum security security;
|
2015-02-20 12:27:58 +01:00
|
|
|
|
|
|
|
l_debug("");
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->state == DEVICE_STATE_CONNECTING ||
|
|
|
|
device->state == DEVICE_STATE_DISCONNECTING)
|
2015-05-01 01:42:55 +02:00
|
|
|
return dbus_error_busy(message);
|
2015-02-20 12:27:58 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (!device->connected_bss)
|
2015-05-01 01:42:55 +02:00
|
|
|
return dbus_error_not_connected(message);
|
2015-02-20 12:27:58 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
security = network_get_security(device->connected_network);
|
2016-05-12 05:11:08 +02:00
|
|
|
if (security == SECURITY_PSK || security == SECURITY_8021X)
|
2016-05-31 19:57:24 +02:00
|
|
|
eapol_cancel(device->index);
|
2015-03-30 05:50:34 +02:00
|
|
|
|
2015-02-20 12:27:58 +01:00
|
|
|
msg = l_genl_msg_new_sized(NL80211_CMD_DEAUTHENTICATE, 512);
|
2016-05-31 19:57:24 +02:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_IFINDEX, 4, &device->index);
|
2015-02-20 12:27:58 +01:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_REASON_CODE, 2, &reason_code);
|
|
|
|
msg_append_attr(msg, NL80211_ATTR_MAC, ETH_ALEN,
|
2016-05-31 19:57:24 +02:00
|
|
|
device->connected_bss->addr);
|
|
|
|
l_genl_family_send(nl80211, msg, device_disconnect_cb, device, NULL);
|
2015-02-20 12:27:58 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device_enter_state(device, DEVICE_STATE_DISCONNECTING);
|
2015-06-23 00:02:52 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device->disconnect_pending = l_dbus_message_ref(message);
|
2015-02-20 12:27:58 +01:00
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-02-11 23:19:55 +01:00
|
|
|
static bool device_property_get_name(struct l_dbus *dbus,
|
|
|
|
struct l_dbus_message *message,
|
|
|
|
struct l_dbus_message_builder *builder,
|
|
|
|
void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2016-02-11 23:19:55 +01:00
|
|
|
|
2016-06-02 04:09:22 +02:00
|
|
|
l_dbus_message_builder_append_basic(builder, 's',
|
|
|
|
netdev_get_name(device->netdev));
|
2016-02-11 23:19:55 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-05-23 19:42:32 +02:00
|
|
|
static bool device_property_get_address(struct l_dbus *dbus,
|
2016-03-09 21:44:52 +01:00
|
|
|
struct l_dbus_message *message,
|
|
|
|
struct l_dbus_message_builder *builder,
|
|
|
|
void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2016-03-09 21:44:52 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
l_dbus_message_builder_append_basic(builder, 's', device->addr);
|
2016-05-23 19:42:32 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool device_property_get_connected_network(struct l_dbus *dbus,
|
|
|
|
struct l_dbus_message *message,
|
|
|
|
struct l_dbus_message_builder *builder,
|
|
|
|
void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
|
|
|
if (!device->connected_network)
|
2016-03-09 21:44:52 +01:00
|
|
|
return false;
|
|
|
|
|
|
|
|
l_dbus_message_builder_append_basic(builder, 'o',
|
2016-05-31 19:57:24 +02:00
|
|
|
network_get_path(device->connected_network));
|
2016-03-09 21:44:52 +01:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-10-23 21:32:12 +02:00
|
|
|
static void setup_device_interface(struct l_dbus_interface *interface)
|
|
|
|
{
|
2014-10-28 05:43:21 +01:00
|
|
|
l_dbus_interface_method(interface, "Scan", 0,
|
|
|
|
device_scan, "", "");
|
2015-02-20 12:27:58 +01:00
|
|
|
l_dbus_interface_method(interface, "Disconnect", 0,
|
|
|
|
device_disconnect, "", "");
|
2014-10-23 21:32:12 +02:00
|
|
|
|
2016-02-11 23:19:55 +01:00
|
|
|
l_dbus_interface_property(interface, "Name", 0, "s",
|
|
|
|
device_property_get_name, NULL);
|
2016-05-23 19:42:32 +02:00
|
|
|
l_dbus_interface_property(interface, "Address", 0, "s",
|
|
|
|
device_property_get_address, NULL);
|
2016-03-09 21:44:52 +01:00
|
|
|
l_dbus_interface_property(interface, "ConnectedNetwork", 0, "o",
|
|
|
|
device_property_get_connected_network,
|
|
|
|
NULL);
|
2014-10-23 21:32:12 +02:00
|
|
|
}
|
|
|
|
|
2014-10-30 04:50:27 +01:00
|
|
|
static bool bss_match(const void *a, const void *b)
|
|
|
|
{
|
2015-05-01 04:38:27 +02:00
|
|
|
const struct scan_bss *bss_a = a;
|
|
|
|
const struct scan_bss *bss_b = b;
|
2014-10-30 04:50:27 +01:00
|
|
|
|
|
|
|
return !memcmp(bss_a->addr, bss_b->addr, sizeof(bss_a->addr));
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static bool device_match(const void *a, const void *b)
|
2014-08-07 05:15:20 +02:00
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
const struct device *device = a;
|
2014-08-07 05:15:20 +02:00
|
|
|
uint32_t index = L_PTR_TO_UINT(b);
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
return (device->index == index);
|
2014-08-07 05:15:20 +02:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static void device_autoconnect_next(struct device *device)
|
2015-06-23 01:33:55 +02:00
|
|
|
{
|
|
|
|
struct autoconnect_entry *entry;
|
2016-05-16 21:24:47 +02:00
|
|
|
int r;
|
2015-06-23 01:33:55 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
while ((entry = l_queue_pop_head(device->autoconnect_list))) {
|
2015-06-23 01:33:55 +02:00
|
|
|
l_debug("Considering autoconnecting to BSS '%s' with SSID: %s,"
|
|
|
|
" freq: %u, rank: %u, strength: %i",
|
2015-10-02 19:06:20 +02:00
|
|
|
scan_bss_address_to_string(entry->bss),
|
2016-05-16 21:23:48 +02:00
|
|
|
network_get_ssid(entry->network),
|
2015-06-23 01:33:55 +02:00
|
|
|
entry->bss->frequency, entry->rank,
|
|
|
|
entry->bss->signal_strength);
|
|
|
|
|
2016-05-16 21:24:47 +02:00
|
|
|
/* TODO: Blacklist the network from auto-connect */
|
|
|
|
r = network_autoconnect(entry->network, entry->bss);
|
2015-06-23 01:33:55 +02:00
|
|
|
l_free(entry);
|
|
|
|
|
2016-05-16 21:24:47 +02:00
|
|
|
if (!r)
|
2015-06-23 01:33:55 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-07 05:15:20 +02:00
|
|
|
static void wiphy_free(void *data)
|
|
|
|
{
|
|
|
|
struct wiphy *wiphy = data;
|
|
|
|
|
|
|
|
l_debug("Freeing wiphy %s", wiphy->name);
|
|
|
|
|
2015-10-06 22:23:32 +02:00
|
|
|
scan_freq_set_free(wiphy->supported_freqs);
|
2014-08-07 05:15:20 +02:00
|
|
|
l_free(wiphy);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool wiphy_match(const void *a, const void *b)
|
|
|
|
{
|
|
|
|
const struct wiphy *wiphy = a;
|
|
|
|
uint32_t id = L_PTR_TO_UINT(b);
|
|
|
|
|
|
|
|
return (wiphy->id == id);
|
|
|
|
}
|
|
|
|
|
2015-05-06 01:48:38 +02:00
|
|
|
static void deauthenticate_cb(struct l_genl_msg *msg,
|
2015-03-30 05:01:20 +02:00
|
|
|
void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2015-03-30 05:01:20 +02:00
|
|
|
|
2015-05-06 01:48:38 +02:00
|
|
|
/* If we were inside a .Connect(), it has failed */
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->connect_pending)
|
|
|
|
dbus_pending_reply(&device->connect_pending,
|
|
|
|
dbus_error_failed(device->connect_pending));
|
2015-04-27 14:51:28 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device_disassociated(device);
|
2015-03-30 05:01:20 +02:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static void setting_keys_failed(struct device *device, uint16_t reason_code)
|
2015-03-30 05:01:20 +02:00
|
|
|
{
|
|
|
|
struct l_genl_msg *msg;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Something went wrong with our new_key, set_key, new_key,
|
|
|
|
* set_station, set_oper_state transaction
|
|
|
|
*
|
|
|
|
* Cancel all pending commands, then de-authenticate
|
|
|
|
*/
|
2016-05-31 19:57:24 +02:00
|
|
|
l_genl_family_cancel(nl80211, device->pairwise_new_key_cmd_id);
|
|
|
|
device->pairwise_new_key_cmd_id = 0;
|
2015-03-30 05:01:20 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
l_genl_family_cancel(nl80211, device->pairwise_set_key_cmd_id);
|
|
|
|
device->pairwise_set_key_cmd_id = 0;
|
2015-03-30 05:01:20 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
l_genl_family_cancel(nl80211, device->group_new_key_cmd_id);
|
|
|
|
device->group_new_key_cmd_id = 0;
|
2015-03-30 05:01:20 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
eapol_cancel(device->index);
|
2015-03-30 05:01:20 +02:00
|
|
|
|
|
|
|
msg = l_genl_msg_new_sized(NL80211_CMD_DEAUTHENTICATE, 512);
|
2016-05-31 19:57:24 +02:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_IFINDEX, 4, &device->index);
|
2015-03-30 05:01:20 +02:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_REASON_CODE, 2, &reason_code);
|
|
|
|
msg_append_attr(msg, NL80211_ATTR_MAC, ETH_ALEN,
|
2016-05-31 19:57:24 +02:00
|
|
|
device->connected_bss->addr);
|
|
|
|
l_genl_family_send(nl80211, msg, deauthenticate_cb, device, NULL);
|
|
|
|
device_enter_state(device, DEVICE_STATE_DISCONNECTING);
|
2015-03-30 05:01:20 +02:00
|
|
|
}
|
|
|
|
|
2015-03-30 05:13:49 +02:00
|
|
|
static void handshake_failed(uint32_t ifindex,
|
|
|
|
const uint8_t *aa, const uint8_t *spa,
|
|
|
|
uint16_t reason_code, void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2015-03-30 05:13:49 +02:00
|
|
|
struct l_genl_msg *msg;
|
|
|
|
|
|
|
|
l_error("4-Way Handshake failed for ifindex: %d", ifindex);
|
|
|
|
|
|
|
|
msg = l_genl_msg_new_sized(NL80211_CMD_DEAUTHENTICATE, 512);
|
|
|
|
msg_append_attr(msg, NL80211_ATTR_IFINDEX, 4, &ifindex);
|
|
|
|
msg_append_attr(msg, NL80211_ATTR_REASON_CODE, 2, &reason_code);
|
|
|
|
msg_append_attr(msg, NL80211_ATTR_MAC, ETH_ALEN, aa);
|
2016-05-31 19:57:24 +02:00
|
|
|
l_genl_family_send(nl80211, msg, deauthenticate_cb, device, NULL);
|
|
|
|
device_enter_state(device, DEVICE_STATE_DISCONNECTING);
|
2015-03-30 05:13:49 +02:00
|
|
|
}
|
|
|
|
|
2015-03-26 04:36:06 +01:00
|
|
|
static void mlme_set_pairwise_key_cb(struct l_genl_msg *msg, void *data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = data;
|
2015-03-30 04:11:19 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device->pairwise_set_key_cmd_id = 0;
|
2015-03-30 04:11:19 +02:00
|
|
|
|
2015-03-30 05:01:20 +02:00
|
|
|
if (l_genl_msg_get_error(msg) < 0) {
|
|
|
|
l_error("Set Key for Pairwise Key failed for ifindex: %d",
|
2016-05-31 19:57:24 +02:00
|
|
|
device->index);
|
|
|
|
setting_keys_failed(device, MPDU_REASON_CODE_UNSPECIFIED);
|
2015-03-26 04:36:06 +01:00
|
|
|
return;
|
2015-03-30 05:01:20 +02:00
|
|
|
}
|
2015-03-26 04:36:06 +01:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static unsigned int mlme_set_pairwise_key(struct device *device)
|
2015-03-26 04:36:06 +01:00
|
|
|
{
|
|
|
|
uint8_t key_id = 0;
|
|
|
|
struct l_genl_msg *msg;
|
|
|
|
unsigned int id;
|
|
|
|
|
|
|
|
msg = l_genl_msg_new_sized(NL80211_CMD_SET_KEY, 512);
|
|
|
|
if (!msg)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_KEY_IDX, 1, &key_id);
|
2016-05-31 19:57:24 +02:00
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_IFINDEX, 4, &device->index);
|
2015-03-26 04:36:06 +01:00
|
|
|
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_KEY_DEFAULT, 0, NULL);
|
|
|
|
|
|
|
|
l_genl_msg_enter_nested(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_KEY_DEFAULT_TYPE_UNICAST, 0, NULL);
|
|
|
|
l_genl_msg_leave_nested(msg);
|
|
|
|
|
|
|
|
id = l_genl_family_send(nl80211, msg, mlme_set_pairwise_key_cb,
|
2016-05-31 19:57:24 +02:00
|
|
|
device, NULL);
|
2015-03-26 04:36:06 +01:00
|
|
|
if (!id)
|
|
|
|
l_genl_msg_unref(msg);
|
|
|
|
|
|
|
|
return id;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void mlme_new_pairwise_key_cb(struct l_genl_msg *msg, void *data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = data;
|
2015-03-30 04:11:19 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device->pairwise_new_key_cmd_id = 0;
|
2015-03-30 04:11:19 +02:00
|
|
|
|
2015-03-30 05:01:20 +02:00
|
|
|
if (l_genl_msg_get_error(msg) < 0) {
|
|
|
|
l_error("New Key for Pairwise Key failed for ifindex: %d",
|
2016-05-31 19:57:24 +02:00
|
|
|
device->index);
|
|
|
|
setting_keys_failed(device, MPDU_REASON_CODE_UNSPECIFIED);
|
2015-03-26 04:36:06 +01:00
|
|
|
return;
|
2015-03-30 05:01:20 +02:00
|
|
|
}
|
2015-03-26 04:36:06 +01:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static unsigned int mlme_new_pairwise_key(struct device *device,
|
2015-03-26 04:36:06 +01:00
|
|
|
uint32_t cipher,
|
|
|
|
const uint8_t *aa,
|
|
|
|
const uint8_t *tk,
|
|
|
|
size_t tk_len)
|
|
|
|
{
|
|
|
|
uint8_t key_id = 0;
|
|
|
|
struct l_genl_msg *msg;
|
|
|
|
unsigned int id;
|
|
|
|
|
|
|
|
msg = l_genl_msg_new_sized(NL80211_CMD_NEW_KEY, 512);
|
|
|
|
if (!msg)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_KEY_DATA, tk_len, tk);
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_KEY_CIPHER, 4, &cipher);
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_MAC, ETH_ALEN, aa);
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_KEY_IDX, 1, &key_id);
|
2016-05-31 19:57:24 +02:00
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_IFINDEX, 4, &device->index);
|
2015-03-26 04:36:06 +01:00
|
|
|
|
|
|
|
id = l_genl_family_send(nl80211, msg, mlme_new_pairwise_key_cb,
|
2016-05-31 19:57:24 +02:00
|
|
|
device, NULL);
|
2015-03-26 04:36:06 +01:00
|
|
|
if (!id)
|
|
|
|
l_genl_msg_unref(msg);
|
|
|
|
|
|
|
|
return id;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void wiphy_set_tk(uint32_t ifindex, const uint8_t *aa,
|
2015-05-22 04:10:21 +02:00
|
|
|
const uint8_t *tk, uint32_t cipher,
|
2015-03-26 04:36:06 +01:00
|
|
|
void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
|
|
|
struct network *network = device->connected_network;
|
2015-05-18 13:31:40 +02:00
|
|
|
uint8_t tk_buf[32];
|
2015-03-26 04:36:06 +01:00
|
|
|
|
|
|
|
l_debug("");
|
|
|
|
|
2015-05-22 04:10:21 +02:00
|
|
|
switch (cipher) {
|
|
|
|
case CRYPTO_CIPHER_CCMP:
|
2015-05-18 13:31:40 +02:00
|
|
|
memcpy(tk_buf, tk, 16);
|
|
|
|
break;
|
2015-05-22 04:10:21 +02:00
|
|
|
case CRYPTO_CIPHER_TKIP:
|
2015-05-18 13:31:40 +02:00
|
|
|
/*
|
|
|
|
* Swap the TX and RX MIC key portions for supplicant.
|
|
|
|
* WPA_80211_v3_1_090922 doc's 3.3.4:
|
|
|
|
* The MIC key used on the Client for transmit (TX) is in
|
|
|
|
* bytes 24-31, and the MIC key used on the Client for
|
|
|
|
* receive (RX) is in bytes 16-23 of the PTK. That is,
|
|
|
|
* assume that TX MIC and RX MIC referred to in Clause 8.7
|
|
|
|
* are referenced to the Authenticator. Similarly, on the AP,
|
|
|
|
* the MIC used for TX is in bytes 16-23, and the MIC key
|
|
|
|
* used for RX is in bytes 24-31 of the PTK.
|
|
|
|
*/
|
|
|
|
memcpy(tk_buf, tk, 16);
|
|
|
|
memcpy(tk_buf + 16, tk + 24, 8);
|
|
|
|
memcpy(tk_buf + 24, tk + 16, 8);
|
2015-03-26 04:36:06 +01:00
|
|
|
break;
|
|
|
|
default:
|
2015-05-22 04:10:21 +02:00
|
|
|
l_error("Unexpected cipher: %x", cipher);
|
2016-05-31 19:57:24 +02:00
|
|
|
setting_keys_failed(device,
|
2015-03-30 05:01:20 +02:00
|
|
|
MPDU_REASON_CODE_INVALID_PAIRWISE_CIPHER);
|
2015-03-26 04:36:06 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-04-27 14:51:28 +02:00
|
|
|
/* If we got here, then our PSK works. Save if required */
|
2016-05-16 04:04:02 +02:00
|
|
|
network_sync_psk(network);
|
2015-04-27 14:51:28 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device->pairwise_new_key_cmd_id =
|
|
|
|
mlme_new_pairwise_key(device, cipher, aa,
|
2015-05-18 13:31:40 +02:00
|
|
|
tk_buf, crypto_cipher_key_len(cipher));
|
2016-05-31 19:57:24 +02:00
|
|
|
device->pairwise_set_key_cmd_id = mlme_set_pairwise_key(device);
|
2015-03-26 04:36:06 +01:00
|
|
|
}
|
|
|
|
|
2015-03-27 08:54:25 +01:00
|
|
|
static void operstate_cb(bool result, void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2015-03-27 08:54:25 +01:00
|
|
|
|
|
|
|
if (!result) {
|
|
|
|
l_error("Setting LinkMode and OperState failed for ifindex %d",
|
2016-05-31 19:57:24 +02:00
|
|
|
device->index);
|
|
|
|
setting_keys_failed(device, MPDU_REASON_CODE_UNSPECIFIED);
|
2015-03-27 08:54:25 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->connect_pending) {
|
2015-03-27 08:54:25 +01:00
|
|
|
struct l_dbus_message *reply;
|
|
|
|
|
|
|
|
reply = l_dbus_message_new_method_return(
|
2016-05-31 19:57:24 +02:00
|
|
|
device->connect_pending);
|
2015-03-27 08:54:25 +01:00
|
|
|
l_dbus_message_set_arguments(reply, "");
|
2016-05-31 19:57:24 +02:00
|
|
|
dbus_pending_reply(&device->connect_pending, reply);
|
2015-03-27 08:54:25 +01:00
|
|
|
}
|
2015-06-23 00:02:52 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
network_connected(device->connected_network);
|
|
|
|
device_enter_state(device, DEVICE_STATE_CONNECTED);
|
2015-03-27 08:54:25 +01:00
|
|
|
}
|
|
|
|
|
2015-03-27 08:54:23 +01:00
|
|
|
static void set_station_cb(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2015-03-27 08:54:23 +01:00
|
|
|
|
|
|
|
if (l_genl_msg_get_error(msg) < 0) {
|
2016-05-31 19:57:24 +02:00
|
|
|
l_error("Set Station failed for ifindex %d", device->index);
|
|
|
|
setting_keys_failed(device, MPDU_REASON_CODE_UNSPECIFIED);
|
2015-03-27 08:54:23 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
netdev_set_linkmode_and_operstate(device->index, 1, IF_OPER_UP,
|
|
|
|
operstate_cb, device);
|
2015-03-27 08:54:23 +01:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static int set_station_cmd(struct device *device)
|
2015-03-27 08:54:23 +01:00
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct scan_bss *bss = device->connected_bss;
|
2015-03-27 08:54:23 +01:00
|
|
|
struct l_genl_msg *msg;
|
|
|
|
struct nl80211_sta_flag_update flags;
|
|
|
|
|
|
|
|
flags.mask = 1 << NL80211_STA_FLAG_AUTHORIZED;
|
|
|
|
flags.set = flags.mask;
|
|
|
|
|
|
|
|
msg = l_genl_msg_new_sized(NL80211_CMD_SET_STATION, 512);
|
2016-05-31 19:57:24 +02:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_IFINDEX, 4, &device->index);
|
2015-03-27 08:54:23 +01:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_MAC, ETH_ALEN, bss->addr);
|
|
|
|
msg_append_attr(msg, NL80211_ATTR_STA_FLAGS2,
|
|
|
|
sizeof(struct nl80211_sta_flag_update), &flags);
|
2016-05-31 19:57:24 +02:00
|
|
|
l_genl_family_send(nl80211, msg, set_station_cb, device, NULL);
|
2015-03-27 08:54:23 +01:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-03-26 05:27:37 +01:00
|
|
|
static void mlme_new_group_key_cb(struct l_genl_msg *msg, void *data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = data;
|
2015-03-27 08:54:23 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device->group_new_key_cmd_id = 0;
|
2015-03-30 04:11:19 +02:00
|
|
|
|
2015-03-27 08:54:23 +01:00
|
|
|
if (l_genl_msg_get_error(msg) < 0) {
|
2015-03-30 05:01:20 +02:00
|
|
|
l_error("New Key for Group Key failed for ifindex: %d",
|
2016-05-31 19:57:24 +02:00
|
|
|
device->index);
|
|
|
|
setting_keys_failed(device, MPDU_REASON_CODE_UNSPECIFIED);
|
2015-03-26 05:27:37 +01:00
|
|
|
return;
|
2015-03-27 08:54:23 +01:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
set_station_cmd(device);
|
2015-03-26 05:27:37 +01:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static unsigned int mlme_new_group_key(struct device *device,
|
2015-03-26 05:27:37 +01:00
|
|
|
uint32_t cipher, uint8_t key_id,
|
|
|
|
const uint8_t *gtk, size_t gtk_len,
|
|
|
|
const uint8_t *rsc, size_t rsc_len)
|
|
|
|
{
|
|
|
|
struct l_genl_msg *msg;
|
|
|
|
unsigned int id;
|
|
|
|
|
|
|
|
msg = l_genl_msg_new_sized(NL80211_CMD_NEW_KEY, 512);
|
|
|
|
if (!msg)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_KEY_DATA, gtk_len, gtk);
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_KEY_CIPHER, 4, &cipher);
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_KEY_SEQ, rsc_len, rsc);
|
|
|
|
|
|
|
|
l_genl_msg_enter_nested(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_KEY_DEFAULT_TYPE_MULTICAST,
|
|
|
|
0, NULL);
|
|
|
|
l_genl_msg_leave_nested(msg);
|
|
|
|
|
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_KEY_IDX, 1, &key_id);
|
2016-05-31 19:57:24 +02:00
|
|
|
l_genl_msg_append_attr(msg, NL80211_ATTR_IFINDEX, 4, &device->index);
|
2015-03-26 05:27:37 +01:00
|
|
|
|
|
|
|
id = l_genl_family_send(nl80211, msg, mlme_new_group_key_cb,
|
2016-05-31 19:57:24 +02:00
|
|
|
device, NULL);
|
2015-03-26 05:27:37 +01:00
|
|
|
if (!id)
|
|
|
|
l_genl_msg_unref(msg);
|
|
|
|
|
|
|
|
return id;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void wiphy_set_gtk(uint32_t ifindex, uint8_t key_index,
|
|
|
|
const uint8_t *gtk, uint8_t gtk_len,
|
|
|
|
const uint8_t *rsc, uint8_t rsc_len,
|
2015-05-22 04:08:47 +02:00
|
|
|
uint32_t cipher, void *user_data)
|
2015-03-26 05:27:37 +01:00
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2015-05-18 13:31:40 +02:00
|
|
|
uint8_t gtk_buf[32];
|
2015-03-26 05:27:37 +01:00
|
|
|
|
|
|
|
l_debug("");
|
|
|
|
|
2015-05-22 04:08:47 +02:00
|
|
|
switch (cipher) {
|
|
|
|
case CRYPTO_CIPHER_CCMP:
|
2015-05-18 13:31:40 +02:00
|
|
|
memcpy(gtk_buf, gtk, 16);
|
|
|
|
break;
|
2015-05-22 04:08:47 +02:00
|
|
|
case CRYPTO_CIPHER_TKIP:
|
2015-05-18 13:31:40 +02:00
|
|
|
/*
|
|
|
|
* Swap the TX and RX MIC key portions for supplicant.
|
|
|
|
* WPA_80211_v3_1_090922 doc's 3.3.4:
|
|
|
|
* The MIC key used on the Client for transmit (TX) is in
|
|
|
|
* bytes 24-31, and the MIC key used on the Client for
|
|
|
|
* receive (RX) is in bytes 16-23 of the PTK. That is,
|
|
|
|
* assume that TX MIC and RX MIC referred to in Clause 8.7
|
|
|
|
* are referenced to the Authenticator. Similarly, on the AP,
|
|
|
|
* the MIC used for TX is in bytes 16-23, and the MIC key
|
|
|
|
* used for RX is in bytes 24-31 of the PTK.
|
|
|
|
*
|
|
|
|
* Here apply this to the GTK instead of the PTK.
|
|
|
|
*/
|
|
|
|
memcpy(gtk_buf, gtk, 16);
|
|
|
|
memcpy(gtk_buf + 16, gtk + 24, 8);
|
|
|
|
memcpy(gtk_buf + 24, gtk + 16, 8);
|
2015-03-26 05:27:37 +01:00
|
|
|
break;
|
|
|
|
default:
|
2015-05-22 04:08:47 +02:00
|
|
|
l_error("Unexpected cipher: %x", cipher);
|
2016-05-31 19:57:24 +02:00
|
|
|
setting_keys_failed(device,
|
2015-03-30 05:01:20 +02:00
|
|
|
MPDU_REASON_CODE_INVALID_GROUP_CIPHER);
|
2015-03-26 05:27:37 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (crypto_cipher_key_len(cipher) != gtk_len) {
|
|
|
|
l_error("Unexpected key length: %d", gtk_len);
|
2016-05-31 19:57:24 +02:00
|
|
|
setting_keys_failed(device,
|
2015-03-30 05:01:20 +02:00
|
|
|
MPDU_REASON_CODE_INVALID_GROUP_CIPHER);
|
2015-03-26 05:27:37 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device->group_new_key_cmd_id =
|
|
|
|
mlme_new_group_key(device, cipher, key_index,
|
2015-05-18 13:31:40 +02:00
|
|
|
gtk_buf, gtk_len, rsc, rsc_len);
|
2015-03-26 05:27:37 +01:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static void mlme_associate_event(struct l_genl_msg *msg, struct device *device)
|
2014-08-09 09:01:22 +02:00
|
|
|
{
|
2015-02-13 23:12:08 +01:00
|
|
|
int err;
|
2014-08-09 09:01:22 +02:00
|
|
|
|
2015-02-13 23:12:08 +01:00
|
|
|
l_debug("");
|
|
|
|
|
|
|
|
err = l_genl_msg_get_error(msg);
|
|
|
|
if (err < 0) {
|
|
|
|
l_error("association failed %s (%d)", strerror(-err), err);
|
2016-05-31 19:57:24 +02:00
|
|
|
dbus_pending_reply(&device->connect_pending,
|
|
|
|
dbus_error_failed(device->connect_pending));
|
|
|
|
device_disassociated(device);
|
2015-01-28 13:14:54 +01:00
|
|
|
return;
|
2014-08-09 09:01:22 +02:00
|
|
|
}
|
|
|
|
|
2015-02-13 23:12:08 +01:00
|
|
|
l_info("Association completed");
|
2015-03-19 14:21:44 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (network_get_security(device->connected_network) == SECURITY_NONE)
|
|
|
|
netdev_set_linkmode_and_operstate(device->index, 1, IF_OPER_UP,
|
|
|
|
operstate_cb, device);
|
2015-02-13 23:12:08 +01:00
|
|
|
}
|
|
|
|
|
2015-03-03 10:27:39 +01:00
|
|
|
static void genl_associate_cb(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = user_data;
|
2015-03-03 10:27:39 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (l_genl_msg_get_error(msg) < 0 && device->connect_pending)
|
|
|
|
dbus_pending_reply(&device->connect_pending,
|
|
|
|
dbus_error_failed(device->connect_pending));
|
2015-03-03 10:27:39 +01:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static void mlme_associate_cmd(struct device *device)
|
2015-02-13 23:12:08 +01:00
|
|
|
{
|
|
|
|
struct l_genl_msg *msg;
|
2016-05-31 19:57:24 +02:00
|
|
|
struct scan_bss *bss = device->connected_bss;
|
|
|
|
struct network *network = device->connected_network;
|
|
|
|
struct wiphy *wiphy = device->wiphy;
|
2016-05-16 21:23:48 +02:00
|
|
|
const char *ssid = network_get_ssid(network);
|
|
|
|
enum security security = network_get_security(network);
|
2015-02-13 23:12:08 +01:00
|
|
|
|
|
|
|
l_debug("");
|
|
|
|
|
2014-08-09 09:01:22 +02:00
|
|
|
msg = l_genl_msg_new_sized(NL80211_CMD_ASSOCIATE, 512);
|
2016-05-31 19:57:24 +02:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_IFINDEX, 4, &device->index);
|
2014-11-11 16:03:07 +01:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_WIPHY_FREQ, 4, &bss->frequency);
|
|
|
|
msg_append_attr(msg, NL80211_ATTR_MAC, ETH_ALEN, bss->addr);
|
2016-05-16 21:23:48 +02:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_SSID, strlen(ssid), ssid);
|
2015-02-26 03:56:46 +01:00
|
|
|
|
2016-05-16 21:23:48 +02:00
|
|
|
if (security == SECURITY_PSK || security == SECURITY_8021X) {
|
2015-05-18 13:31:40 +02:00
|
|
|
uint16_t pairwise_ciphers, group_ciphers;
|
|
|
|
uint32_t pairwise_cipher_attr;
|
|
|
|
uint32_t group_cipher_attr;
|
2015-02-26 03:56:46 +01:00
|
|
|
uint8_t rsne_buf[256];
|
|
|
|
struct ie_rsn_info info;
|
2015-03-20 05:53:55 +01:00
|
|
|
struct eapol_sm *sm = eapol_sm_new();
|
2015-02-26 03:56:46 +01:00
|
|
|
|
|
|
|
memset(&info, 0, sizeof(info));
|
2016-02-10 20:20:46 +01:00
|
|
|
|
2016-05-16 21:23:48 +02:00
|
|
|
if (security == SECURITY_PSK)
|
2016-02-10 20:20:46 +01:00
|
|
|
info.akm_suites =
|
|
|
|
bss->sha256 ? IE_RSN_AKM_SUITE_PSK_SHA256 :
|
|
|
|
IE_RSN_AKM_SUITE_PSK;
|
|
|
|
else
|
|
|
|
info.akm_suites =
|
|
|
|
bss->sha256 ? IE_RSN_AKM_SUITE_8021X_SHA256 :
|
|
|
|
IE_RSN_AKM_SUITE_8021X;
|
2015-02-26 03:56:46 +01:00
|
|
|
|
2015-05-18 13:31:40 +02:00
|
|
|
bss_get_supported_ciphers(bss, &pairwise_ciphers,
|
|
|
|
&group_ciphers);
|
|
|
|
|
|
|
|
info.pairwise_ciphers = wiphy_select_cipher(wiphy,
|
|
|
|
pairwise_ciphers);
|
|
|
|
if (info.pairwise_ciphers == IE_RSN_CIPHER_SUITE_CCMP)
|
|
|
|
pairwise_cipher_attr = CRYPTO_CIPHER_CCMP;
|
|
|
|
else
|
|
|
|
pairwise_cipher_attr = CRYPTO_CIPHER_TKIP;
|
|
|
|
|
|
|
|
info.group_cipher = wiphy_select_cipher(wiphy, group_ciphers);
|
|
|
|
if (info.group_cipher == IE_RSN_CIPHER_SUITE_CCMP)
|
|
|
|
group_cipher_attr = CRYPTO_CIPHER_CCMP;
|
|
|
|
else
|
|
|
|
group_cipher_attr = CRYPTO_CIPHER_TKIP;
|
|
|
|
|
2015-05-06 01:48:36 +02:00
|
|
|
/* RSN takes priority */
|
|
|
|
if (bss->rsne) {
|
|
|
|
ie_build_rsne(&info, rsne_buf);
|
2015-05-22 03:43:54 +02:00
|
|
|
eapol_sm_set_ap_rsn(sm, bss->rsne, bss->rsne[1] + 2);
|
|
|
|
eapol_sm_set_own_rsn(sm, rsne_buf, rsne_buf[1] + 2);
|
2015-05-06 01:48:36 +02:00
|
|
|
} else {
|
|
|
|
ie_build_wpa(&info, rsne_buf);
|
2015-05-22 03:43:54 +02:00
|
|
|
eapol_sm_set_ap_wpa(sm, bss->wpa, bss->wpa[1] + 2);
|
|
|
|
eapol_sm_set_own_wpa(sm, rsne_buf, rsne_buf[1] + 2);
|
2015-05-06 01:48:36 +02:00
|
|
|
}
|
2015-02-26 03:56:46 +01:00
|
|
|
|
2016-05-16 21:23:48 +02:00
|
|
|
if (security == SECURITY_PSK)
|
|
|
|
eapol_sm_set_pmk(sm, network_get_psk(network));
|
2015-10-30 11:12:21 +01:00
|
|
|
else
|
2016-05-16 21:23:48 +02:00
|
|
|
eapol_sm_set_8021x_config(sm,
|
|
|
|
network_get_settings(network));
|
2015-10-30 11:12:21 +01:00
|
|
|
|
2015-03-20 05:53:55 +01:00
|
|
|
eapol_sm_set_authenticator_address(sm, bss->addr);
|
2016-05-31 19:57:24 +02:00
|
|
|
eapol_sm_set_supplicant_address(sm, device->addr);
|
|
|
|
eapol_sm_set_user_data(sm, device);
|
2015-10-30 11:12:19 +01:00
|
|
|
eapol_sm_set_tx_user_data(sm,
|
2016-05-31 19:57:24 +02:00
|
|
|
L_INT_TO_PTR(l_io_get_fd(device->eapol_io)));
|
|
|
|
eapol_start(device->index, sm);
|
2015-03-20 05:53:55 +01:00
|
|
|
|
2015-02-26 03:56:46 +01:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
|
2015-05-18 13:31:40 +02:00
|
|
|
4, &pairwise_cipher_attr);
|
2015-02-26 03:56:46 +01:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_CIPHER_SUITE_GROUP,
|
2015-05-18 13:31:40 +02:00
|
|
|
4, &group_cipher_attr);
|
|
|
|
|
2015-02-26 03:56:46 +01:00
|
|
|
msg_append_attr(msg, NL80211_ATTR_CONTROL_PORT, 0, NULL);
|
|
|
|
msg_append_attr(msg, NL80211_ATTR_IE,
|
|
|
|
rsne_buf[1] + 2, rsne_buf);
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
l_genl_family_send(nl80211, msg, genl_associate_cb, device, NULL);
|
2014-08-09 09:01:22 +02:00
|
|
|
}
|
|
|
|
|
2015-02-13 23:12:08 +01:00
|
|
|
static void mlme_authenticate_event(struct l_genl_msg *msg,
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device)
|
2015-02-13 23:12:08 +01:00
|
|
|
{
|
|
|
|
struct l_genl_attr attr;
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
l_debug("");
|
|
|
|
|
|
|
|
err = l_genl_msg_get_error(msg);
|
|
|
|
if (err < 0) {
|
|
|
|
l_error("authentication failed %s (%d)", strerror(-err), err);
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_genl_attr_init(&attr, msg)) {
|
|
|
|
l_debug("attr init failed");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
|
|
|
switch (type) {
|
|
|
|
case NL80211_ATTR_TIMED_OUT:
|
|
|
|
l_warn("authentication timed out");
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
l_info("Authentication completed");
|
2016-05-31 19:57:24 +02:00
|
|
|
mlme_associate_cmd(device);
|
2015-02-13 23:12:08 +01:00
|
|
|
return;
|
|
|
|
|
|
|
|
error:
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->connect_pending)
|
|
|
|
dbus_pending_reply(&device->connect_pending,
|
|
|
|
dbus_error_failed(device->connect_pending));
|
2015-06-23 01:33:38 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device_disassociated(device);
|
2015-02-13 23:12:08 +01:00
|
|
|
}
|
|
|
|
|
2015-02-20 12:27:58 +01:00
|
|
|
static void mlme_deauthenticate_event(struct l_genl_msg *msg,
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device)
|
2015-04-08 22:04:22 +02:00
|
|
|
{
|
|
|
|
l_debug("");
|
|
|
|
}
|
|
|
|
|
|
|
|
static void mlme_disconnect_event(struct l_genl_msg *msg,
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device)
|
2015-02-20 12:27:58 +01:00
|
|
|
{
|
|
|
|
struct l_genl_attr attr;
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
2015-04-08 22:04:22 +02:00
|
|
|
uint16_t reason_code = 0;
|
|
|
|
bool disconnect_by_ap = false;
|
2015-02-20 12:27:58 +01:00
|
|
|
|
|
|
|
l_debug("");
|
|
|
|
|
|
|
|
if (!l_genl_attr_init(&attr, msg)) {
|
2015-04-08 22:04:22 +02:00
|
|
|
l_error("attr init failed");
|
|
|
|
return;
|
2015-02-20 12:27:58 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
|
|
|
switch (type) {
|
2015-04-08 22:04:22 +02:00
|
|
|
case NL80211_ATTR_REASON_CODE:
|
|
|
|
if (len != sizeof(uint16_t))
|
|
|
|
l_warn("Invalid reason code attribute");
|
|
|
|
else
|
|
|
|
reason_code = *((uint16_t *) data);
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NL80211_ATTR_DISCONNECTED_BY_AP:
|
|
|
|
disconnect_by_ap = true;
|
|
|
|
break;
|
2015-02-20 12:27:58 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-08 22:04:22 +02:00
|
|
|
l_info("Received Deauthentication event, reason: %hu, from_ap: %s",
|
|
|
|
reason_code, disconnect_by_ap ? "true" : "false");
|
2015-02-25 15:11:33 +01:00
|
|
|
|
2015-04-08 22:04:22 +02:00
|
|
|
if (!disconnect_by_ap)
|
2015-02-25 15:11:33 +01:00
|
|
|
return;
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->connect_pending) {
|
|
|
|
struct network *network = device->connected_network;
|
2015-02-20 12:27:58 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
dbus_pending_reply(&device->connect_pending,
|
|
|
|
dbus_error_failed(device->connect_pending));
|
2015-04-08 22:07:02 +02:00
|
|
|
|
2016-05-16 22:45:07 +02:00
|
|
|
network_connect_failed(network);
|
2015-04-08 22:04:22 +02:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device_disassociated(device);
|
2015-02-20 12:27:58 +01:00
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static void mlme_cqm_event(struct l_genl_msg *msg, struct device *device)
|
2015-05-01 01:42:44 +02:00
|
|
|
{
|
|
|
|
struct l_genl_attr attr;
|
|
|
|
struct l_genl_attr nested;
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
|
|
|
|
l_debug("");
|
|
|
|
|
|
|
|
if (!l_genl_attr_init(&attr, msg))
|
|
|
|
return;
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
|
|
|
switch (type) {
|
|
|
|
case NL80211_ATTR_CQM:
|
|
|
|
if (!l_genl_attr_recurse(&attr, &nested))
|
|
|
|
return;
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&nested, &type, &len, &data)) {
|
|
|
|
switch (type) {
|
|
|
|
case NL80211_ATTR_CQM_BEACON_LOSS_EVENT:
|
2016-05-31 19:57:24 +02:00
|
|
|
device_lost_beacon(device);
|
2015-05-01 01:42:44 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-01 16:17:54 +02:00
|
|
|
static void network_reset_bss_list(const void *key, void *value,
|
|
|
|
void *user_data)
|
2014-08-09 08:23:56 +02:00
|
|
|
{
|
2015-05-01 16:17:54 +02:00
|
|
|
struct network *network = value;
|
|
|
|
|
2016-05-16 23:14:15 +02:00
|
|
|
network_bss_list_clear(network);
|
2015-05-01 16:17:54 +02:00
|
|
|
}
|
|
|
|
|
2015-06-01 16:28:05 +02:00
|
|
|
static bool network_remove_if_lost(const void *key, void *data, void *user_data)
|
|
|
|
{
|
|
|
|
struct network *network = data;
|
|
|
|
|
2016-05-16 23:14:15 +02:00
|
|
|
if (!network_bss_list_isempty(network))
|
|
|
|
return false;
|
2015-06-01 16:28:05 +02:00
|
|
|
|
|
|
|
l_debug("No remaining BSSs for SSID: %s -- Removing network",
|
2016-05-16 21:23:48 +02:00
|
|
|
network_get_ssid(network));
|
2016-05-16 23:14:15 +02:00
|
|
|
network_remove(network);
|
2015-06-01 16:28:05 +02:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-06-23 00:42:30 +02:00
|
|
|
static int autoconnect_rank_compare(const void *a, const void *b, void *user)
|
|
|
|
{
|
|
|
|
const struct autoconnect_entry *new_ae = a;
|
|
|
|
const struct autoconnect_entry *ae = b;
|
|
|
|
|
|
|
|
return ae->rank - new_ae->rank;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
static void process_bss(struct device *device, struct scan_bss *bss)
|
2015-05-01 16:17:54 +02:00
|
|
|
{
|
2015-02-26 17:03:51 +01:00
|
|
|
struct network *network;
|
2016-05-11 22:52:43 +02:00
|
|
|
enum security security;
|
2015-03-10 12:20:43 +01:00
|
|
|
const char *path;
|
2015-06-23 00:42:30 +02:00
|
|
|
double rankmod;
|
|
|
|
struct autoconnect_entry *entry;
|
2014-10-28 17:04:31 +01:00
|
|
|
|
2015-06-16 21:03:25 +02:00
|
|
|
l_debug("Found BSS '%s' with SSID: %s, freq: %u, rank: %u, "
|
2015-06-01 16:28:05 +02:00
|
|
|
"strength: %i",
|
2015-10-02 19:06:20 +02:00
|
|
|
scan_bss_address_to_string(bss),
|
2015-06-01 16:28:05 +02:00
|
|
|
util_ssid_to_utf8(bss->ssid_len, bss->ssid),
|
2015-06-16 21:03:25 +02:00
|
|
|
bss->frequency, bss->rank, bss->signal_strength);
|
2014-08-09 08:23:56 +02:00
|
|
|
|
2015-06-01 16:28:05 +02:00
|
|
|
if (!util_ssid_is_utf8(bss->ssid_len, bss->ssid)) {
|
|
|
|
l_warn("Ignoring BSS with non-UTF8 SSID");
|
2015-05-01 16:17:54 +02:00
|
|
|
return;
|
2015-04-08 20:29:03 +02:00
|
|
|
}
|
|
|
|
|
2015-05-06 01:48:36 +02:00
|
|
|
/*
|
|
|
|
* If both an RSN and a WPA elements are present currently
|
|
|
|
* RSN takes priority and the WPA IE is ignored.
|
|
|
|
*/
|
2015-02-26 04:13:24 +01:00
|
|
|
if (bss->rsne) {
|
|
|
|
struct ie_rsn_info rsne;
|
|
|
|
int res = ie_parse_rsne_from_data(bss->rsne, bss->rsne[1] + 2,
|
|
|
|
&rsne);
|
|
|
|
if (res < 0) {
|
|
|
|
l_debug("Cannot parse RSN field (%d, %s)",
|
|
|
|
res, strerror(-res));
|
2015-06-01 16:28:05 +02:00
|
|
|
return;
|
2015-02-26 04:13:24 +01:00
|
|
|
}
|
|
|
|
|
2016-05-11 22:52:43 +02:00
|
|
|
security = scan_get_security(bss->capability, &rsne);
|
2016-02-10 19:56:11 +01:00
|
|
|
|
2016-05-11 22:52:43 +02:00
|
|
|
if (security == SECURITY_PSK)
|
2016-02-10 19:56:11 +01:00
|
|
|
bss->sha256 =
|
|
|
|
rsne.akm_suites & IE_RSN_AKM_SUITE_PSK_SHA256;
|
2016-05-11 22:52:43 +02:00
|
|
|
else if (security == SECURITY_8021X)
|
2016-02-10 19:56:11 +01:00
|
|
|
bss->sha256 =
|
|
|
|
rsne.akm_suites & IE_RSN_AKM_SUITE_8021X_SHA256;
|
2015-03-16 12:03:03 +01:00
|
|
|
} else if (bss->wpa) {
|
|
|
|
struct ie_rsn_info wpa;
|
|
|
|
int res = ie_parse_wpa_from_data(bss->wpa, bss->wpa[1] + 2,
|
|
|
|
&wpa);
|
|
|
|
if (res < 0) {
|
2015-06-01 16:28:05 +02:00
|
|
|
l_debug("Cannot parse WPA IE (%d, %s)",
|
2015-03-16 12:03:03 +01:00
|
|
|
res, strerror(-res));
|
2015-06-01 16:28:05 +02:00
|
|
|
return;
|
2015-03-16 12:03:03 +01:00
|
|
|
}
|
|
|
|
|
2016-05-11 22:52:43 +02:00
|
|
|
security = scan_get_security(bss->capability, &wpa);
|
2015-02-26 04:13:24 +01:00
|
|
|
} else
|
2016-05-11 22:52:43 +02:00
|
|
|
security = scan_get_security(bss->capability, NULL);
|
2015-02-25 06:11:48 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
path = iwd_network_get_path(device, bss->ssid, bss->ssid_len,
|
2016-05-11 22:52:43 +02:00
|
|
|
security);
|
2014-10-30 06:01:52 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
network = l_hashmap_lookup(device->networks, path);
|
2015-01-28 22:37:25 +01:00
|
|
|
if (!network) {
|
2016-05-31 19:57:24 +02:00
|
|
|
network = network_create(device, bss->ssid, bss->ssid_len,
|
2016-05-16 04:41:37 +02:00
|
|
|
security);
|
2015-01-28 22:37:25 +01:00
|
|
|
|
2016-05-16 04:41:37 +02:00
|
|
|
if (!network_register(network, path)) {
|
|
|
|
network_remove(network);
|
|
|
|
return;
|
|
|
|
}
|
2015-04-08 20:29:03 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
l_hashmap_insert(device->networks,
|
2016-05-16 04:41:37 +02:00
|
|
|
network_get_path(network), network);
|
|
|
|
l_debug("Added new Network \"%s\" security %s",
|
|
|
|
network_get_ssid(network), security_to_str(security));
|
2015-06-23 00:42:30 +02:00
|
|
|
|
2016-05-28 05:27:13 +02:00
|
|
|
network_seen(network);
|
2015-01-28 22:37:25 +01:00
|
|
|
}
|
2014-10-30 05:20:43 +01:00
|
|
|
|
2016-05-16 23:14:15 +02:00
|
|
|
network_bss_add(network, bss);
|
2015-06-23 00:42:30 +02:00
|
|
|
|
2016-05-16 21:23:48 +02:00
|
|
|
rankmod = network_rankmod(security, network_get_ssid(network));
|
2015-06-23 00:42:30 +02:00
|
|
|
if (rankmod == 0.0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
entry = l_new(struct autoconnect_entry, 1);
|
|
|
|
entry->network = network;
|
|
|
|
entry->bss = bss;
|
|
|
|
entry->rank = bss->rank * rankmod;
|
2016-05-31 19:57:24 +02:00
|
|
|
l_queue_insert(device->autoconnect_list, entry,
|
2015-06-23 00:42:30 +02:00
|
|
|
autoconnect_rank_compare, NULL);
|
2014-08-09 07:21:30 +02:00
|
|
|
}
|
|
|
|
|
2015-06-01 16:28:05 +02:00
|
|
|
static bool new_scan_results(uint32_t wiphy_id, uint32_t ifindex,
|
2015-09-20 21:58:23 +02:00
|
|
|
struct l_queue *bss_list, void *userdata)
|
2015-01-28 13:14:55 +01:00
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = userdata;
|
2015-06-01 16:28:05 +02:00
|
|
|
const struct l_queue_entry *bss_entry;
|
2015-01-28 13:14:55 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
device->old_bss_list = device->bss_list;
|
|
|
|
device->bss_list = bss_list;
|
|
|
|
l_hashmap_foreach(device->networks, network_reset_bss_list, NULL);
|
2015-01-28 13:14:55 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
l_queue_destroy(device->autoconnect_list, l_free);
|
|
|
|
device->autoconnect_list = l_queue_new();
|
2015-06-23 00:42:30 +02:00
|
|
|
|
2015-06-01 16:28:05 +02:00
|
|
|
for (bss_entry = l_queue_get_entries(bss_list); bss_entry;
|
|
|
|
bss_entry = bss_entry->next) {
|
|
|
|
struct scan_bss *bss = bss_entry->data;
|
2014-08-09 07:21:30 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
process_bss(device, bss);
|
2015-06-01 16:28:05 +02:00
|
|
|
}
|
2014-10-30 04:50:27 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->connected_bss) {
|
2015-05-01 04:38:27 +02:00
|
|
|
struct scan_bss *bss;
|
2015-04-30 23:03:17 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
bss = l_queue_find(device->bss_list, bss_match,
|
|
|
|
device->connected_bss);
|
2015-04-30 23:03:17 +02:00
|
|
|
|
|
|
|
if (!bss) {
|
|
|
|
l_warn("Connected BSS not in scan results!");
|
2016-05-31 19:57:24 +02:00
|
|
|
l_queue_push_tail(device->bss_list,
|
|
|
|
device->connected_bss);
|
|
|
|
network_bss_add(device->connected_network,
|
|
|
|
device->connected_bss);
|
|
|
|
l_queue_remove(device->old_bss_list,
|
|
|
|
device->connected_bss);
|
2015-04-30 23:03:17 +02:00
|
|
|
} else
|
2016-05-31 19:57:24 +02:00
|
|
|
device->connected_bss = bss;
|
2015-04-30 23:03:17 +02:00
|
|
|
}
|
2015-01-29 04:10:35 +01:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
l_hashmap_foreach_remove(device->networks,
|
2015-04-30 21:41:22 +02:00
|
|
|
network_remove_if_lost, NULL);
|
2015-04-30 23:03:17 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
l_queue_destroy(device->old_bss_list, bss_free);
|
|
|
|
device->old_bss_list = NULL;
|
2015-06-01 16:28:05 +02:00
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (device->state == DEVICE_STATE_AUTOCONNECT)
|
|
|
|
device_autoconnect_next(device);
|
2015-06-23 01:33:55 +02:00
|
|
|
|
2015-06-01 16:28:05 +02:00
|
|
|
return true;
|
2014-10-28 17:14:40 +01:00
|
|
|
}
|
2014-08-09 07:21:30 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
struct device *device_create(struct wiphy *wiphy, struct netdev *netdev)
|
2014-08-07 05:15:20 +02:00
|
|
|
{
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device;
|
2016-06-02 00:23:33 +02:00
|
|
|
struct l_dbus *dbus = dbus_get_bus();
|
|
|
|
uint32_t ifindex = netdev_get_ifindex(netdev);
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
device = l_new(struct device, 1);
|
|
|
|
device->bss_list = l_queue_new();
|
|
|
|
device->networks = l_hashmap_new();
|
|
|
|
l_hashmap_set_hash_function(device->networks, l_str_hash);
|
|
|
|
l_hashmap_set_compare_function(device->networks,
|
|
|
|
(l_hashmap_compare_func_t) strcmp);
|
|
|
|
memcpy(device->addr, netdev_get_address(netdev), sizeof(device->addr));
|
|
|
|
device->index = ifindex;
|
|
|
|
device->wiphy = wiphy;
|
2016-06-02 04:09:22 +02:00
|
|
|
device->netdev = netdev;
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
l_queue_push_head(device_list, device);
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
if (!l_dbus_object_add_interface(dbus, device_get_path(device),
|
|
|
|
IWD_DEVICE_INTERFACE, device))
|
|
|
|
l_info("Unable to register %s interface", IWD_DEVICE_INTERFACE);
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
__device_watch_call_added(device);
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
netdev_set_linkmode_and_operstate(device->index, 1,
|
|
|
|
IF_OPER_DORMANT, NULL, NULL);
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
scan_ifindex_add(device->index);
|
|
|
|
device_enter_state(device, DEVICE_STATE_AUTOCONNECT);
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
device->eapol_io = eapol_open_pae(device->index);
|
|
|
|
if (device->eapol_io)
|
|
|
|
l_io_set_read_handler(device->eapol_io, eapol_read,
|
|
|
|
device, NULL);
|
|
|
|
else
|
|
|
|
l_error("Failed to open PAE socket");
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
return device;
|
|
|
|
}
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
void device_remove(struct device *device)
|
|
|
|
{
|
|
|
|
struct l_dbus *dbus;
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
l_debug("");
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
l_queue_remove(device_list, device);
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
if (device->scan_pending)
|
|
|
|
dbus_pending_reply(&device->scan_pending,
|
|
|
|
dbus_error_aborted(device->scan_pending));
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
if (device->connect_pending)
|
|
|
|
dbus_pending_reply(&device->connect_pending,
|
|
|
|
dbus_error_aborted(device->connect_pending));
|
2015-05-18 13:31:40 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
__device_watch_call_removed(device);
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
dbus = dbus_get_bus();
|
|
|
|
l_dbus_unregister_object(dbus, device_get_path(device));
|
2015-06-23 00:02:52 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
l_hashmap_destroy(device->networks, network_free);
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
l_queue_destroy(device->bss_list, bss_free);
|
|
|
|
l_queue_destroy(device->old_bss_list, bss_free);
|
|
|
|
l_queue_destroy(device->autoconnect_list, l_free);
|
|
|
|
l_io_destroy(device->eapol_io);
|
2015-02-26 14:31:27 +01:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
scan_ifindex_remove(device->index);
|
|
|
|
netdev_set_linkmode_and_operstate(device->index, 0, IF_OPER_DOWN,
|
|
|
|
NULL, NULL);
|
2015-02-26 14:31:27 +01:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
l_free(device);
|
2014-08-07 05:15:20 +02:00
|
|
|
}
|
|
|
|
|
2016-06-01 22:20:33 +02:00
|
|
|
struct wiphy *wiphy_find(int wiphy_id)
|
|
|
|
{
|
|
|
|
return l_queue_find(wiphy_list, wiphy_match, L_UINT_TO_PTR(wiphy_id));
|
|
|
|
}
|
|
|
|
|
2014-11-05 16:18:28 +01:00
|
|
|
static void parse_supported_commands(struct wiphy *wiphy,
|
|
|
|
struct l_genl_attr *attr)
|
|
|
|
{
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
|
|
|
|
while (l_genl_attr_next(attr, &type, &len, &data)) {
|
|
|
|
uint32_t cmd = *(uint32_t *)data;
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case NL80211_CMD_START_SCHED_SCAN:
|
|
|
|
wiphy->support_scheduled_scan = true;
|
|
|
|
break;
|
2015-05-06 22:24:14 +02:00
|
|
|
case NL80211_CMD_SET_REKEY_OFFLOAD:
|
|
|
|
wiphy->support_rekey_offload = true;
|
2014-11-05 16:18:28 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-17 20:02:32 +02:00
|
|
|
static void parse_supported_ciphers(struct wiphy *wiphy, const void *data,
|
|
|
|
uint16_t len)
|
|
|
|
{
|
|
|
|
bool s;
|
|
|
|
|
|
|
|
while (len >= 4) {
|
|
|
|
uint32_t cipher = *(uint32_t *)data;
|
|
|
|
|
|
|
|
switch (cipher) {
|
|
|
|
case CRYPTO_CIPHER_CCMP:
|
|
|
|
wiphy->pairwise_ciphers |= IE_RSN_CIPHER_SUITE_CCMP;
|
|
|
|
break;
|
|
|
|
case CRYPTO_CIPHER_TKIP:
|
|
|
|
wiphy->pairwise_ciphers |= IE_RSN_CIPHER_SUITE_TKIP;
|
|
|
|
break;
|
|
|
|
case CRYPTO_CIPHER_WEP40:
|
|
|
|
wiphy->pairwise_ciphers |= IE_RSN_CIPHER_SUITE_WEP40;
|
|
|
|
break;
|
|
|
|
case CRYPTO_CIPHER_WEP104:
|
|
|
|
wiphy->pairwise_ciphers |= IE_RSN_CIPHER_SUITE_WEP104;
|
|
|
|
break;
|
|
|
|
case CRYPTO_CIPHER_BIP:
|
|
|
|
wiphy->pairwise_ciphers |= IE_RSN_CIPHER_SUITE_BIP;
|
|
|
|
break;
|
|
|
|
default: /* TODO: Support other ciphers */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
len -= 4;
|
|
|
|
data += 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
s = wiphy->pairwise_ciphers & IE_RSN_CIPHER_SUITE_CCMP;
|
|
|
|
l_info("Wiphy supports CCMP: %s", s ? "true" : "false");
|
|
|
|
|
|
|
|
s = wiphy->pairwise_ciphers & IE_RSN_CIPHER_SUITE_TKIP;
|
|
|
|
l_info("Wiphy supports TKIP: %s", s ? "true" : "false");
|
|
|
|
}
|
|
|
|
|
2015-10-06 22:23:32 +02:00
|
|
|
static void parse_supported_frequencies(struct wiphy *wiphy,
|
|
|
|
struct l_genl_attr *freqs)
|
|
|
|
{
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
struct l_genl_attr attr;
|
|
|
|
|
|
|
|
l_debug("");
|
|
|
|
|
|
|
|
while (l_genl_attr_next(freqs, NULL, NULL, NULL)) {
|
|
|
|
if (!l_genl_attr_recurse(freqs, &attr))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
|
|
|
uint32_t u32;
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case NL80211_FREQUENCY_ATTR_FREQ:
|
|
|
|
u32 = *((uint32_t *) data);
|
|
|
|
scan_freq_set_add(wiphy->supported_freqs, u32);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void parse_supported_bands(struct wiphy *wiphy,
|
|
|
|
struct l_genl_attr *bands)
|
|
|
|
{
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
struct l_genl_attr attr;
|
|
|
|
|
|
|
|
l_debug("");
|
|
|
|
|
|
|
|
while (l_genl_attr_next(bands, NULL, NULL, NULL)) {
|
|
|
|
if (!l_genl_attr_recurse(bands, &attr))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
|
|
|
struct l_genl_attr freqs;
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case NL80211_BAND_ATTR_FREQS:
|
|
|
|
if (!l_genl_attr_recurse(&attr, &freqs))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
parse_supported_frequencies(wiphy, &freqs);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#define FAIL_NO_WIPHY() \
|
|
|
|
if (!wiphy) { \
|
|
|
|
l_warn("No wiphy structure found"); \
|
|
|
|
return; \
|
|
|
|
} \
|
|
|
|
|
2014-08-07 05:15:20 +02:00
|
|
|
static void wiphy_dump_callback(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
|
|
|
struct wiphy *wiphy = NULL;
|
2014-11-05 16:18:28 +01:00
|
|
|
struct l_genl_attr attr, nested;
|
2014-08-07 05:15:20 +02:00
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
uint32_t id;
|
|
|
|
|
|
|
|
if (!l_genl_attr_init(&attr, msg))
|
|
|
|
return;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The wiphy attribute is always the first attribute in the
|
|
|
|
* list. If not then error out with a warning and ignore the
|
|
|
|
* whole message.
|
|
|
|
*
|
|
|
|
* In most cases multiple of these message will be send
|
|
|
|
* since the information included can not fit into a single
|
|
|
|
* message.
|
|
|
|
*/
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
|
|
|
switch (type) {
|
|
|
|
case NL80211_ATTR_WIPHY:
|
|
|
|
if (wiphy) {
|
|
|
|
l_warn("Duplicate wiphy attribute");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len != sizeof(uint32_t)) {
|
|
|
|
l_warn("Invalid wiphy attribute");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
id = *((uint32_t *) data);
|
|
|
|
|
|
|
|
wiphy = l_queue_find(wiphy_list, wiphy_match,
|
|
|
|
L_UINT_TO_PTR(id));
|
|
|
|
if (!wiphy) {
|
|
|
|
wiphy = l_new(struct wiphy, 1);
|
|
|
|
wiphy->id = id;
|
2015-10-06 22:23:32 +02:00
|
|
|
wiphy->supported_freqs = scan_freq_set_new();
|
2014-08-07 06:27:32 +02:00
|
|
|
l_queue_push_head(wiphy_list, wiphy);
|
2014-08-07 05:15:20 +02:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NL80211_ATTR_WIPHY_NAME:
|
2015-10-06 22:23:32 +02:00
|
|
|
FAIL_NO_WIPHY();
|
2014-08-07 05:15:20 +02:00
|
|
|
|
|
|
|
if (len > sizeof(wiphy->name)) {
|
|
|
|
l_warn("Invalid wiphy name attribute");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(wiphy->name, data, len);
|
|
|
|
break;
|
2014-08-08 00:41:30 +02:00
|
|
|
|
|
|
|
case NL80211_ATTR_FEATURE_FLAGS:
|
2015-10-06 22:23:32 +02:00
|
|
|
FAIL_NO_WIPHY();
|
2014-08-08 00:41:30 +02:00
|
|
|
|
|
|
|
if (len != sizeof(uint32_t)) {
|
|
|
|
l_warn("Invalid feature flags attribute");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wiphy->feature_flags = *((uint32_t *) data);
|
|
|
|
break;
|
2014-11-05 16:18:28 +01:00
|
|
|
case NL80211_ATTR_SUPPORTED_COMMANDS:
|
2015-10-06 22:23:32 +02:00
|
|
|
FAIL_NO_WIPHY();
|
2014-11-05 16:18:28 +01:00
|
|
|
|
|
|
|
if (!l_genl_attr_recurse(&attr, &nested))
|
|
|
|
return;
|
|
|
|
|
|
|
|
parse_supported_commands(wiphy, &nested);
|
|
|
|
break;
|
2015-04-17 20:02:32 +02:00
|
|
|
case NL80211_ATTR_CIPHER_SUITES:
|
2015-10-06 22:23:32 +02:00
|
|
|
FAIL_NO_WIPHY();
|
2015-04-17 20:02:32 +02:00
|
|
|
|
|
|
|
parse_supported_ciphers(wiphy, data, len);
|
|
|
|
break;
|
2015-10-06 22:23:32 +02:00
|
|
|
case NL80211_ATTR_WIPHY_BANDS:
|
|
|
|
FAIL_NO_WIPHY();
|
|
|
|
|
|
|
|
if (!l_genl_attr_recurse(&attr, &nested))
|
|
|
|
return;
|
|
|
|
|
|
|
|
parse_supported_bands(wiphy, &nested);
|
|
|
|
break;
|
2014-08-07 05:15:20 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-06 22:23:32 +02:00
|
|
|
static void wiphy_dump_done(void *user)
|
|
|
|
{
|
|
|
|
const struct l_queue_entry *wiphy_entry;
|
|
|
|
|
|
|
|
for (wiphy_entry = l_queue_get_entries(wiphy_list); wiphy_entry;
|
|
|
|
wiphy_entry = wiphy_entry->next) {
|
|
|
|
struct wiphy *wiphy = wiphy_entry->data;
|
|
|
|
uint32_t bands;
|
|
|
|
|
|
|
|
l_info("Wiphy: %d, Name: %s", wiphy->id, wiphy->name);
|
|
|
|
l_info("Bands:");
|
|
|
|
|
|
|
|
bands = scan_freq_set_get_bands(wiphy->supported_freqs);
|
|
|
|
|
|
|
|
if (bands & SCAN_BAND_2_4_GHZ)
|
|
|
|
l_info("\t2.4 Ghz");
|
|
|
|
|
|
|
|
if (bands & SCAN_BAND_5_GHZ)
|
|
|
|
l_info("\t5.0 Ghz");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-07 08:52:08 +02:00
|
|
|
static void wiphy_config_notify(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
|
|
|
struct l_genl_attr attr;
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
uint8_t cmd;
|
|
|
|
|
|
|
|
cmd = l_genl_msg_get_command(msg);
|
|
|
|
|
|
|
|
l_debug("Notification of command %u", cmd);
|
|
|
|
|
|
|
|
if (!l_genl_attr_init(&attr, msg))
|
|
|
|
return;
|
|
|
|
|
2016-05-31 23:17:00 +02:00
|
|
|
switch (cmd) {
|
|
|
|
case NL80211_CMD_NEW_WIPHY:
|
|
|
|
case NL80211_CMD_DEL_WIPHY:
|
|
|
|
{
|
|
|
|
const uint32_t *wiphy_id = NULL;
|
|
|
|
const char *wiphy_name = NULL;
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
|
|
|
switch (type) {
|
|
|
|
case NL80211_ATTR_WIPHY:
|
|
|
|
if (len != sizeof(uint32_t)) {
|
|
|
|
l_warn("Invalid wiphy attribute");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wiphy_id = data;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NL80211_ATTR_WIPHY_NAME:
|
|
|
|
wiphy_name = data;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!wiphy_id)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (cmd == NL80211_CMD_NEW_WIPHY)
|
|
|
|
l_info("New Wiphy %s[%d] added", wiphy_name, *wiphy_id);
|
|
|
|
else
|
|
|
|
l_info("Wiphy %s[%d] removed", wiphy_name, *wiphy_id);
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
2014-08-07 08:52:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void wiphy_mlme_notify(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
2014-08-09 09:01:22 +02:00
|
|
|
struct wiphy *wiphy = NULL;
|
2016-05-31 19:57:24 +02:00
|
|
|
struct device *device = NULL;
|
2014-08-07 08:52:08 +02:00
|
|
|
struct l_genl_attr attr;
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
uint8_t cmd;
|
|
|
|
|
|
|
|
cmd = l_genl_msg_get_command(msg);
|
|
|
|
|
|
|
|
l_debug("MLME notification %u", cmd);
|
|
|
|
|
|
|
|
if (!l_genl_attr_init(&attr, msg))
|
|
|
|
return;
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
2014-08-09 09:01:22 +02:00
|
|
|
switch (type) {
|
|
|
|
case NL80211_ATTR_WIPHY:
|
|
|
|
if (len != sizeof(uint32_t)) {
|
|
|
|
l_warn("Invalid wiphy attribute");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wiphy = l_queue_find(wiphy_list, wiphy_match,
|
|
|
|
L_UINT_TO_PTR(*((uint32_t *) data)));
|
|
|
|
if (!wiphy) {
|
|
|
|
l_warn("No wiphy structure found");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case NL80211_ATTR_IFINDEX:
|
|
|
|
if (!wiphy) {
|
|
|
|
l_warn("No wiphy structure found");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len != sizeof(uint32_t)) {
|
|
|
|
l_warn("Invalid interface index attribute");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
device = l_queue_find(device_list, device_match,
|
2014-08-09 09:01:22 +02:00
|
|
|
L_UINT_TO_PTR(*((uint32_t *) data)));
|
2016-05-31 19:57:24 +02:00
|
|
|
if (!device) {
|
2014-08-09 09:01:22 +02:00
|
|
|
l_warn("No interface structure found");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!wiphy) {
|
2015-01-28 15:17:12 +01:00
|
|
|
l_warn("MLME notification is missing wiphy attribute");
|
2014-08-09 09:01:22 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-05-31 19:57:24 +02:00
|
|
|
if (!device) {
|
2015-01-28 15:17:12 +01:00
|
|
|
l_warn("MLME notification is missing interface attribute");
|
2014-08-09 09:01:22 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-02-13 23:12:08 +01:00
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case NL80211_CMD_AUTHENTICATE:
|
2016-05-31 19:57:24 +02:00
|
|
|
mlme_authenticate_event(msg, device);
|
2015-02-13 23:12:08 +01:00
|
|
|
break;
|
|
|
|
case NL80211_CMD_ASSOCIATE:
|
2016-05-31 19:57:24 +02:00
|
|
|
mlme_associate_event(msg, device);
|
2015-02-13 23:12:08 +01:00
|
|
|
break;
|
2015-02-20 12:27:58 +01:00
|
|
|
case NL80211_CMD_DEAUTHENTICATE:
|
2016-05-31 19:57:24 +02:00
|
|
|
mlme_deauthenticate_event(msg, device);
|
2015-02-20 12:27:58 +01:00
|
|
|
break;
|
2015-04-08 22:04:22 +02:00
|
|
|
case NL80211_CMD_DISCONNECT:
|
2016-05-31 19:57:24 +02:00
|
|
|
mlme_disconnect_event(msg, device);
|
2015-04-08 22:04:22 +02:00
|
|
|
break;
|
2015-05-01 01:42:44 +02:00
|
|
|
case NL80211_CMD_NOTIFY_CQM:
|
2016-05-31 19:57:24 +02:00
|
|
|
mlme_cqm_event(msg, device);
|
2015-05-01 01:42:44 +02:00
|
|
|
break;
|
2014-08-07 08:52:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void wiphy_regulatory_notify(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
|
|
|
struct l_genl_attr attr;
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
uint8_t cmd;
|
|
|
|
|
|
|
|
cmd = l_genl_msg_get_command(msg);
|
|
|
|
|
|
|
|
l_debug("Regulatory notification %u", cmd);
|
|
|
|
|
|
|
|
if (!l_genl_attr_init(&attr, msg))
|
|
|
|
return;
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-07 22:23:02 +02:00
|
|
|
static void regulatory_info_callback(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
|
|
|
struct l_genl_attr attr;
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
|
|
|
|
if (!l_genl_attr_init(&attr, msg))
|
|
|
|
return;
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
|
|
|
switch (type) {
|
|
|
|
case NL80211_ATTR_REG_ALPHA2:
|
|
|
|
if (len != 3) {
|
|
|
|
l_warn("Invalid regulatory alpha2 attribute");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
l_debug("Regulatory alpha2 is %s", (char *) data);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-07 22:13:31 +02:00
|
|
|
static void protocol_features_callback(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
|
|
|
struct l_genl_attr attr;
|
|
|
|
uint16_t type, len;
|
|
|
|
const void *data;
|
|
|
|
uint32_t features = 0;
|
|
|
|
|
|
|
|
if (!l_genl_attr_init(&attr, msg))
|
|
|
|
return;
|
|
|
|
|
|
|
|
while (l_genl_attr_next(&attr, &type, &len, &data)) {
|
|
|
|
switch (type) {
|
|
|
|
case NL80211_ATTR_PROTOCOL_FEATURES:
|
|
|
|
if (len != sizeof(uint32_t)) {
|
|
|
|
l_warn("Invalid protocol features attribute");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
features = *((uint32_t *) data);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (features & NL80211_PROTOCOL_FEATURE_SPLIT_WIPHY_DUMP)
|
|
|
|
l_debug("Found split wiphy dump support");
|
|
|
|
}
|
|
|
|
|
2015-09-29 02:51:40 +02:00
|
|
|
bool wiphy_init(struct l_genl_family *in)
|
2014-07-29 21:25:01 +02:00
|
|
|
{
|
|
|
|
struct l_genl_msg *msg;
|
|
|
|
|
2014-08-07 05:15:20 +02:00
|
|
|
/*
|
|
|
|
* This is an extra sanity check so that no memory is leaked
|
|
|
|
* in case the generic netlink handling gets confused.
|
|
|
|
*/
|
|
|
|
if (wiphy_list) {
|
|
|
|
l_warn("Destroying existing list of wiphy devices");
|
|
|
|
l_queue_destroy(wiphy_list, NULL);
|
|
|
|
}
|
|
|
|
|
2016-02-11 23:19:55 +01:00
|
|
|
if (!l_dbus_register_interface(dbus_get_bus(),
|
|
|
|
IWD_DEVICE_INTERFACE,
|
|
|
|
setup_device_interface,
|
2016-05-16 19:37:48 +02:00
|
|
|
NULL, true))
|
2016-02-11 23:19:55 +01:00
|
|
|
return false;
|
|
|
|
|
2015-09-29 02:51:40 +02:00
|
|
|
nl80211 = in;
|
|
|
|
|
2014-08-07 08:52:08 +02:00
|
|
|
if (!l_genl_family_register(nl80211, "config", wiphy_config_notify,
|
|
|
|
NULL, NULL))
|
|
|
|
l_error("Registering for config notification failed");
|
|
|
|
|
|
|
|
if (!l_genl_family_register(nl80211, "mlme", wiphy_mlme_notify,
|
|
|
|
NULL, NULL))
|
|
|
|
l_error("Registering for MLME notification failed");
|
|
|
|
|
|
|
|
if (!l_genl_family_register(nl80211, "regulatory",
|
|
|
|
wiphy_regulatory_notify, NULL, NULL))
|
|
|
|
l_error("Registering for regulatory notification failed");
|
|
|
|
|
2015-09-29 02:51:40 +02:00
|
|
|
__eapol_set_install_tk_func(wiphy_set_tk);
|
|
|
|
__eapol_set_install_gtk_func(wiphy_set_gtk);
|
|
|
|
__eapol_set_deauthenticate_func(handshake_failed);
|
2015-06-01 16:28:05 +02:00
|
|
|
|
2014-08-07 05:15:20 +02:00
|
|
|
wiphy_list = l_queue_new();
|
2016-06-02 00:23:33 +02:00
|
|
|
device_list = l_queue_new();
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2014-08-07 22:13:31 +02:00
|
|
|
msg = l_genl_msg_new(NL80211_CMD_GET_PROTOCOL_FEATURES);
|
|
|
|
if (!l_genl_family_send(nl80211, msg, protocol_features_callback,
|
|
|
|
NULL, NULL))
|
|
|
|
l_error("Getting protocol features failed");
|
|
|
|
|
2014-08-07 22:23:02 +02:00
|
|
|
msg = l_genl_msg_new(NL80211_CMD_GET_REG);
|
|
|
|
if (!l_genl_family_send(nl80211, msg, regulatory_info_callback,
|
|
|
|
NULL, NULL))
|
|
|
|
l_error("Getting regulatory info failed");
|
|
|
|
|
2014-07-29 21:25:01 +02:00
|
|
|
msg = l_genl_msg_new(NL80211_CMD_GET_WIPHY);
|
2015-10-06 22:23:32 +02:00
|
|
|
if (!l_genl_family_dump(nl80211, msg, wiphy_dump_callback,
|
|
|
|
NULL, wiphy_dump_done))
|
2014-08-07 06:27:32 +02:00
|
|
|
l_error("Getting all wiphy devices failed");
|
|
|
|
|
2014-07-29 21:25:01 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool wiphy_exit(void)
|
|
|
|
{
|
2015-09-29 02:51:40 +02:00
|
|
|
l_queue_destroy(wiphy_list, wiphy_free);
|
|
|
|
wiphy_list = NULL;
|
2014-07-29 21:25:01 +02:00
|
|
|
|
2016-06-02 00:23:33 +02:00
|
|
|
l_queue_destroy(device_list, (l_queue_destroy_func_t) device_remove);
|
|
|
|
device_list = NULL;
|
|
|
|
|
2015-09-29 02:51:40 +02:00
|
|
|
nl80211 = NULL;
|
2014-08-07 05:15:20 +02:00
|
|
|
|
2016-02-11 23:19:55 +01:00
|
|
|
l_dbus_unregister_interface(dbus_get_bus(), IWD_DEVICE_INTERFACE);
|
|
|
|
|
2014-07-29 21:25:01 +02:00
|
|
|
return true;
|
|
|
|
}
|