2018-07-17 23:16:00 +02:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* Wireless daemon for Linux
|
|
|
|
*
|
2019-10-25 00:43:08 +02:00
|
|
|
* Copyright (C) 2018-2019 Intel Corporation. All rights reserved.
|
2018-07-17 23:16:00 +02:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include <config.h>
|
|
|
|
#endif
|
|
|
|
|
2020-04-08 19:33:17 +02:00
|
|
|
#include <linux/rtnetlink.h>
|
2023-11-27 04:19:55 +01:00
|
|
|
#include <sys/socket.h>
|
2020-04-08 19:33:17 +02:00
|
|
|
#include <linux/if.h>
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
#include <ell/ell.h>
|
|
|
|
|
2018-10-08 22:44:13 +02:00
|
|
|
#include "linux/nl80211.h"
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
#include "src/iwd.h"
|
2019-11-07 23:33:51 +01:00
|
|
|
#include "src/module.h"
|
2018-07-17 23:16:00 +02:00
|
|
|
#include "src/netdev.h"
|
|
|
|
#include "src/wiphy.h"
|
|
|
|
#include "src/crypto.h"
|
|
|
|
#include "src/ie.h"
|
|
|
|
#include "src/util.h"
|
|
|
|
#include "src/eapol.h"
|
|
|
|
#include "src/handshake.h"
|
|
|
|
#include "src/mpdu.h"
|
|
|
|
#include "src/dbus.h"
|
2018-10-14 05:41:06 +02:00
|
|
|
#include "src/nl80211util.h"
|
2018-07-17 23:16:00 +02:00
|
|
|
|
|
|
|
struct adhoc_state {
|
2018-08-20 06:36:24 +02:00
|
|
|
struct netdev *netdev;
|
2019-05-28 21:24:37 +02:00
|
|
|
struct l_genl_family *nl80211;
|
2018-07-17 23:16:00 +02:00
|
|
|
char *ssid;
|
|
|
|
uint8_t pmk[32];
|
|
|
|
struct l_queue *sta_states;
|
|
|
|
uint32_t sta_watch_id;
|
|
|
|
uint32_t netdev_watch_id;
|
2020-09-14 23:04:04 +02:00
|
|
|
unsigned int mlme_watch;
|
2018-07-17 23:16:00 +02:00
|
|
|
struct l_dbus_message *pending;
|
2018-10-08 22:44:13 +02:00
|
|
|
uint32_t ciphers;
|
|
|
|
uint32_t group_cipher;
|
|
|
|
uint8_t gtk[CRYPTO_MAX_GTK_LEN];
|
|
|
|
uint8_t gtk_index;
|
2018-07-17 23:16:00 +02:00
|
|
|
bool started : 1;
|
|
|
|
bool open : 1;
|
2018-10-08 22:44:13 +02:00
|
|
|
bool gtk_set : 1;
|
2018-07-17 23:16:00 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
struct sta_state {
|
|
|
|
uint8_t addr[6];
|
|
|
|
struct adhoc_state *adhoc;
|
|
|
|
struct eapol_sm *sm;
|
|
|
|
struct handshake_state *hs_sta;
|
|
|
|
struct eapol_sm *sm_a;
|
|
|
|
struct handshake_state *hs_auth;
|
2018-10-08 22:44:13 +02:00
|
|
|
uint32_t gtk_query_cmd_id;
|
2018-10-26 18:44:59 +02:00
|
|
|
bool hs_sta_done : 1;
|
|
|
|
bool hs_auth_done : 1;
|
2018-07-17 23:16:00 +02:00
|
|
|
bool authenticated : 1;
|
|
|
|
};
|
|
|
|
|
2018-08-18 06:40:49 +02:00
|
|
|
static uint32_t netdev_watch;
|
2018-07-18 01:39:54 +02:00
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
static void adhoc_sta_free(void *data)
|
|
|
|
{
|
|
|
|
struct sta_state *sta = data;
|
|
|
|
|
|
|
|
if (sta->adhoc->open)
|
|
|
|
goto end;
|
|
|
|
|
2018-10-08 22:44:13 +02:00
|
|
|
if (sta->gtk_query_cmd_id)
|
2019-05-28 21:24:37 +02:00
|
|
|
l_genl_family_cancel(sta->adhoc->nl80211,
|
|
|
|
sta->gtk_query_cmd_id);
|
2018-10-08 22:44:13 +02:00
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
if (sta->sm)
|
|
|
|
eapol_sm_free(sta->sm);
|
|
|
|
|
2018-07-30 16:05:52 +02:00
|
|
|
if (sta->hs_sta)
|
|
|
|
handshake_state_free(sta->hs_sta);
|
2018-07-17 23:16:00 +02:00
|
|
|
|
|
|
|
if (sta->sm_a)
|
|
|
|
eapol_sm_free(sta->sm_a);
|
|
|
|
|
2018-07-30 16:05:52 +02:00
|
|
|
if (sta->hs_auth)
|
|
|
|
handshake_state_free(sta->hs_auth);
|
2018-07-17 23:16:00 +02:00
|
|
|
|
|
|
|
end:
|
|
|
|
l_free(sta);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_remove_sta(struct sta_state *sta)
|
|
|
|
{
|
|
|
|
if (!l_queue_remove(sta->adhoc->sta_states, sta)) {
|
|
|
|
l_error("station %p was not found", sta);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-10-08 22:44:13 +02:00
|
|
|
if (sta->gtk_query_cmd_id) {
|
2019-05-28 21:24:37 +02:00
|
|
|
l_genl_family_cancel(sta->adhoc->nl80211,
|
|
|
|
sta->gtk_query_cmd_id);
|
2018-10-08 22:44:13 +02:00
|
|
|
sta->gtk_query_cmd_id = 0;
|
|
|
|
}
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
/* signal station has been removed */
|
|
|
|
if (sta->authenticated) {
|
|
|
|
l_dbus_property_changed(dbus_get_bus(),
|
2018-08-20 06:36:24 +02:00
|
|
|
netdev_get_path(sta->adhoc->netdev),
|
2018-07-17 23:16:00 +02:00
|
|
|
IWD_ADHOC_INTERFACE, "ConnectedPeers");
|
|
|
|
}
|
|
|
|
|
|
|
|
adhoc_sta_free(sta);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_reset(struct adhoc_state *adhoc)
|
|
|
|
{
|
|
|
|
if (adhoc->pending)
|
|
|
|
dbus_pending_reply(&adhoc->pending,
|
|
|
|
dbus_error_aborted(adhoc->pending));
|
|
|
|
|
|
|
|
l_free(adhoc->ssid);
|
2020-04-07 23:33:47 +02:00
|
|
|
adhoc->ssid = NULL;
|
2018-07-17 23:16:00 +02:00
|
|
|
|
2018-08-20 06:36:24 +02:00
|
|
|
netdev_station_watch_remove(adhoc->netdev, adhoc->sta_watch_id);
|
2020-09-14 23:04:04 +02:00
|
|
|
adhoc->sta_watch_id = 0;
|
2018-07-17 23:16:00 +02:00
|
|
|
|
|
|
|
l_queue_destroy(adhoc->sta_states, adhoc_sta_free);
|
2020-04-07 23:33:47 +02:00
|
|
|
adhoc->sta_states = NULL;
|
2018-07-17 23:16:00 +02:00
|
|
|
|
|
|
|
adhoc->started = false;
|
2018-07-30 00:32:59 +02:00
|
|
|
|
2018-08-20 06:36:24 +02:00
|
|
|
l_dbus_property_changed(dbus_get_bus(), netdev_get_path(adhoc->netdev),
|
2018-07-30 00:32:59 +02:00
|
|
|
IWD_ADHOC_INTERFACE, "Started");
|
2020-09-14 23:04:04 +02:00
|
|
|
|
|
|
|
if (adhoc->mlme_watch)
|
|
|
|
l_genl_family_unregister(adhoc->nl80211, adhoc->mlme_watch);
|
2018-07-17 23:16:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_set_rsn_info(struct adhoc_state *adhoc,
|
2018-08-20 06:36:24 +02:00
|
|
|
struct ie_rsn_info *rsn)
|
2018-07-17 23:16:00 +02:00
|
|
|
{
|
|
|
|
memset(rsn, 0, sizeof(*rsn));
|
|
|
|
rsn->akm_suites = IE_RSN_AKM_SUITE_PSK;
|
2018-10-08 22:44:13 +02:00
|
|
|
rsn->pairwise_ciphers = adhoc->ciphers;
|
|
|
|
rsn->group_cipher = adhoc->group_cipher;
|
2018-07-17 23:16:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static bool ap_sta_match_addr(const void *a, const void *b)
|
|
|
|
{
|
|
|
|
const struct sta_state *sta = a;
|
|
|
|
|
|
|
|
return !memcmp(sta->addr, b, 6);
|
|
|
|
}
|
|
|
|
|
2020-04-08 19:33:17 +02:00
|
|
|
static void adhoc_operstate_cb(int error, uint16_t type,
|
|
|
|
const void *data,
|
|
|
|
uint32_t len, void *user_data)
|
|
|
|
{
|
|
|
|
if (!error)
|
|
|
|
return;
|
|
|
|
|
|
|
|
l_debug("netdev: %u, error: %s", L_PTR_TO_UINT(user_data),
|
|
|
|
strerror(-error));
|
|
|
|
}
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
static void adhoc_handshake_event(struct handshake_state *hs,
|
2019-10-28 15:04:57 +01:00
|
|
|
enum handshake_event event, void *user_data, ...)
|
2018-07-17 23:16:00 +02:00
|
|
|
{
|
|
|
|
struct sta_state *sta = user_data;
|
|
|
|
struct adhoc_state *adhoc = sta->adhoc;
|
2020-09-14 23:04:03 +02:00
|
|
|
va_list args;
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
switch (event) {
|
|
|
|
case HANDSHAKE_EVENT_FAILED:
|
2021-02-08 22:07:25 +01:00
|
|
|
va_start(args, user_data);
|
|
|
|
|
2020-09-14 23:04:03 +02:00
|
|
|
l_error("handshake failed with STA "MAC" (%d)",
|
|
|
|
MAC_STR(sta->addr),
|
|
|
|
va_arg(args, int));
|
2018-07-17 23:16:00 +02:00
|
|
|
|
2021-02-08 22:07:25 +01:00
|
|
|
va_end(args);
|
2018-07-17 23:16:00 +02:00
|
|
|
/*
|
|
|
|
* eapol frees the state machines upon handshake failure. Since
|
|
|
|
* this is only a failure on one of the handshakes we need to
|
|
|
|
* set the failing SM to NULL so it will not get double freed
|
|
|
|
* by adhoc_remove_sta.
|
|
|
|
*/
|
|
|
|
if (sta->hs_auth == hs)
|
|
|
|
sta->sm_a = NULL;
|
|
|
|
else
|
|
|
|
sta->sm = NULL;
|
|
|
|
|
|
|
|
/* fall through */
|
|
|
|
case HANDSHAKE_EVENT_SETTING_KEYS_FAILED:
|
|
|
|
adhoc_remove_sta(sta);
|
|
|
|
|
|
|
|
return;
|
|
|
|
case HANDSHAKE_EVENT_COMPLETE:
|
2018-10-26 18:44:59 +02:00
|
|
|
if (sta->hs_auth == hs)
|
|
|
|
sta->hs_auth_done = true;
|
|
|
|
|
|
|
|
if (sta->hs_sta == hs)
|
|
|
|
sta->hs_sta_done = true;
|
|
|
|
|
|
|
|
if ((sta->hs_auth_done && sta->hs_sta_done) &&
|
2018-07-17 23:16:00 +02:00
|
|
|
!sta->authenticated) {
|
|
|
|
sta->authenticated = true;
|
|
|
|
l_dbus_property_changed(dbus_get_bus(),
|
2018-08-20 06:36:24 +02:00
|
|
|
netdev_get_path(adhoc->netdev),
|
2018-07-17 23:16:00 +02:00
|
|
|
IWD_ADHOC_INTERFACE, "ConnectedPeers");
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-08 22:44:13 +02:00
|
|
|
static struct eapol_sm *adhoc_new_sm(struct sta_state *sta, bool authenticator,
|
|
|
|
const uint8_t *gtk_rsc)
|
2018-07-17 23:16:00 +02:00
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = sta->adhoc;
|
2018-08-20 06:36:24 +02:00
|
|
|
struct netdev *netdev = adhoc->netdev;
|
2018-07-17 23:16:00 +02:00
|
|
|
const uint8_t *own_addr = netdev_get_address(netdev);
|
|
|
|
struct ie_rsn_info rsn;
|
|
|
|
uint8_t bss_rsne[24];
|
|
|
|
struct handshake_state *hs;
|
|
|
|
struct eapol_sm *sm;
|
|
|
|
|
|
|
|
/* fill in only what handshake setup requires */
|
|
|
|
adhoc_set_rsn_info(adhoc, &rsn);
|
|
|
|
ie_build_rsne(&rsn, bss_rsne);
|
|
|
|
|
|
|
|
hs = netdev_handshake_state_new(netdev);
|
|
|
|
if (!hs) {
|
|
|
|
l_error("could not create handshake object");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
handshake_state_set_event_func(hs, adhoc_handshake_event, sta);
|
|
|
|
handshake_state_set_ssid(hs, (void *)adhoc->ssid, strlen(adhoc->ssid));
|
2020-01-21 07:21:38 +01:00
|
|
|
/* we don't have the connecting peer rsn info, so just set ap == own */
|
2019-06-07 21:17:00 +02:00
|
|
|
handshake_state_set_authenticator_ie(hs, bss_rsne);
|
|
|
|
handshake_state_set_supplicant_ie(hs, bss_rsne);
|
2018-07-17 23:16:00 +02:00
|
|
|
handshake_state_set_pmk(hs, adhoc->pmk, 32);
|
|
|
|
|
|
|
|
if (authenticator) {
|
|
|
|
handshake_state_set_authenticator_address(hs, own_addr);
|
|
|
|
handshake_state_set_supplicant_address(hs, sta->addr);
|
2018-08-15 19:36:19 +02:00
|
|
|
handshake_state_set_authenticator(hs, true);
|
2018-07-17 23:16:00 +02:00
|
|
|
} else {
|
|
|
|
handshake_state_set_authenticator_address(hs, sta->addr);
|
|
|
|
handshake_state_set_supplicant_address(hs, own_addr);
|
|
|
|
}
|
|
|
|
|
2018-10-08 22:44:13 +02:00
|
|
|
if (gtk_rsc)
|
|
|
|
handshake_state_set_gtk(hs, adhoc->gtk, adhoc->gtk_index,
|
|
|
|
gtk_rsc);
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
sm = eapol_sm_new(hs);
|
|
|
|
if (!sm) {
|
|
|
|
l_error("could not create sm object");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
eapol_sm_set_listen_interval(sm, 100);
|
|
|
|
|
|
|
|
if (authenticator)
|
|
|
|
sta->hs_auth = hs;
|
|
|
|
else
|
|
|
|
sta->hs_sta = hs;
|
|
|
|
|
|
|
|
return sm;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_free(struct adhoc_state *adhoc)
|
|
|
|
{
|
|
|
|
adhoc_reset(adhoc);
|
2019-05-28 21:24:37 +02:00
|
|
|
l_genl_family_free(adhoc->nl80211);
|
2018-07-17 23:16:00 +02:00
|
|
|
l_free(adhoc);
|
|
|
|
}
|
|
|
|
|
2018-10-08 22:44:13 +02:00
|
|
|
static void adhoc_start_rsna(struct sta_state *sta, const uint8_t *gtk_rsc)
|
|
|
|
{
|
|
|
|
sta->sm_a = adhoc_new_sm(sta, true, gtk_rsc);
|
|
|
|
if (!sta->sm_a) {
|
|
|
|
l_error("could not create authenticator state machine");
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
sta->sm = adhoc_new_sm(sta, false, NULL);
|
|
|
|
if (!sta->sm) {
|
|
|
|
l_error("could not create station state machine");
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
eapol_register(sta->sm);
|
|
|
|
eapol_register(sta->sm_a);
|
|
|
|
|
|
|
|
eapol_start(sta->sm);
|
2020-09-14 23:04:02 +02:00
|
|
|
eapol_start(sta->sm_a);
|
2018-10-08 22:44:13 +02:00
|
|
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
failed:
|
|
|
|
adhoc_remove_sta(sta);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_gtk_op_cb(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
|
|
|
if (l_genl_msg_get_error(msg) < 0) {
|
|
|
|
uint8_t cmd = l_genl_msg_get_command(msg);
|
|
|
|
const char *cmd_name =
|
|
|
|
cmd == NL80211_CMD_NEW_KEY ? "NEW_KEY" : "SET_KEY";
|
|
|
|
|
|
|
|
l_error("%s failed for the GTK: %i",
|
|
|
|
cmd_name, l_genl_msg_get_error(msg));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_gtk_query_cb(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
|
|
|
struct sta_state *sta = user_data;
|
|
|
|
const void *gtk_rsc;
|
|
|
|
|
|
|
|
sta->gtk_query_cmd_id = 0;
|
|
|
|
|
|
|
|
gtk_rsc = nl80211_parse_get_key_seq(msg);
|
|
|
|
if (!gtk_rsc)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
adhoc_start_rsna(sta, gtk_rsc);
|
|
|
|
return;
|
|
|
|
|
|
|
|
error:
|
|
|
|
adhoc_remove_sta(sta);
|
|
|
|
}
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
static void adhoc_new_station(struct adhoc_state *adhoc, const uint8_t *mac)
|
|
|
|
{
|
|
|
|
struct sta_state *sta;
|
2018-10-08 22:44:13 +02:00
|
|
|
struct l_genl_msg *msg;
|
2018-07-17 23:16:00 +02:00
|
|
|
|
|
|
|
sta = l_queue_find(adhoc->sta_states, ap_sta_match_addr, mac);
|
|
|
|
if (sta) {
|
|
|
|
l_warn("new station event with already connected STA");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-10-08 22:44:13 +02:00
|
|
|
/*
|
|
|
|
* Follows same logic as AP. If this is the first station we create and
|
|
|
|
* set a group key. Any subsequent connections will use GET_KEY for this
|
|
|
|
* tx GTK.
|
|
|
|
*/
|
|
|
|
if (adhoc->group_cipher != IE_RSN_CIPHER_SUITE_NO_GROUP_TRAFFIC &&
|
|
|
|
!adhoc->gtk_set && !adhoc->open) {
|
|
|
|
enum crypto_cipher group_cipher =
|
|
|
|
ie_rsn_cipher_suite_to_cipher(adhoc->group_cipher);
|
|
|
|
int gtk_len = crypto_cipher_key_len(group_cipher);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Generate our GTK. Not following the example derivation
|
|
|
|
* method in 802.11-2016 section 12.7.1.4 because a simple
|
|
|
|
* l_getrandom is just as good.
|
|
|
|
*/
|
|
|
|
l_getrandom(adhoc->gtk, gtk_len);
|
|
|
|
adhoc->gtk_index = 1;
|
|
|
|
|
|
|
|
msg = nl80211_build_new_key_group(
|
|
|
|
netdev_get_ifindex(adhoc->netdev),
|
|
|
|
group_cipher, adhoc->gtk_index,
|
|
|
|
adhoc->gtk, gtk_len, NULL,
|
|
|
|
0, NULL);
|
|
|
|
|
2019-05-28 21:24:37 +02:00
|
|
|
if (!l_genl_family_send(adhoc->nl80211, msg, adhoc_gtk_op_cb,
|
|
|
|
NULL, NULL)) {
|
2018-10-08 22:44:13 +02:00
|
|
|
l_genl_msg_unref(msg);
|
|
|
|
l_error("Issuing NEW_KEY failed");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
msg = nl80211_build_set_key(netdev_get_ifindex(adhoc->netdev),
|
|
|
|
adhoc->gtk_index);
|
2019-05-28 21:24:37 +02:00
|
|
|
if (!l_genl_family_send(adhoc->nl80211, msg, adhoc_gtk_op_cb,
|
|
|
|
NULL, NULL)) {
|
2018-10-08 22:44:13 +02:00
|
|
|
l_genl_msg_unref(msg);
|
|
|
|
l_error("Issuing SET_KEY failed");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Set the flag now because any new associating STA will
|
|
|
|
* just use NL80211_CMD_GET_KEY from now.
|
|
|
|
*/
|
|
|
|
adhoc->gtk_set = true;
|
|
|
|
}
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
sta = l_new(struct sta_state, 1);
|
|
|
|
|
|
|
|
memset(sta, 0, sizeof(struct sta_state));
|
|
|
|
|
|
|
|
memcpy(sta->addr, mac, 6);
|
|
|
|
sta->adhoc = adhoc;
|
|
|
|
|
|
|
|
l_queue_push_tail(adhoc->sta_states, sta);
|
|
|
|
|
|
|
|
l_info("new Station: "MAC" adhoc=%p", MAC_STR(mac), adhoc);
|
|
|
|
|
|
|
|
/* with open networks nothing else is required */
|
|
|
|
if (sta->adhoc->open) {
|
2020-04-08 19:33:17 +02:00
|
|
|
int ifindex = netdev_get_ifindex(adhoc->netdev);
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
sta->authenticated = true;
|
2020-04-08 19:33:17 +02:00
|
|
|
|
|
|
|
l_rtnl_set_linkmode_and_operstate(iwd_get_rtnl(), ifindex,
|
|
|
|
IF_LINK_MODE_DORMANT, IF_OPER_UP,
|
|
|
|
adhoc_operstate_cb,
|
|
|
|
L_UINT_TO_PTR(ifindex), NULL);
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
l_dbus_property_changed(dbus_get_bus(),
|
2018-08-20 06:36:24 +02:00
|
|
|
netdev_get_path(adhoc->netdev),
|
2018-07-17 23:16:00 +02:00
|
|
|
IWD_ADHOC_INTERFACE, "ConnectedPeers");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-10-08 22:44:13 +02:00
|
|
|
if (adhoc->group_cipher == IE_RSN_CIPHER_SUITE_NO_GROUP_TRAFFIC)
|
|
|
|
adhoc_start_rsna(sta, NULL);
|
|
|
|
else {
|
|
|
|
msg = nl80211_build_get_key(netdev_get_ifindex(adhoc->netdev),
|
|
|
|
adhoc->gtk_index);
|
2019-05-28 21:24:37 +02:00
|
|
|
sta->gtk_query_cmd_id = l_genl_family_send(adhoc->nl80211, msg,
|
2018-10-08 22:44:13 +02:00
|
|
|
adhoc_gtk_query_cb,
|
|
|
|
sta, NULL);
|
|
|
|
if (!sta->gtk_query_cmd_id) {
|
|
|
|
l_genl_msg_unref(msg);
|
|
|
|
l_error("Issuing GET_KEY failed");
|
|
|
|
|
|
|
|
adhoc_remove_sta(sta);
|
|
|
|
return;
|
|
|
|
}
|
2018-07-17 23:16:00 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_del_station(struct adhoc_state *adhoc, const uint8_t *mac)
|
|
|
|
{
|
|
|
|
struct sta_state *sta;
|
|
|
|
|
|
|
|
sta = l_queue_find(adhoc->sta_states, ap_sta_match_addr, mac);
|
|
|
|
if (!sta) {
|
|
|
|
l_warn("could not find station "MAC" in list", MAC_STR(mac));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
l_debug("lost station "MAC, MAC_STR(mac));
|
|
|
|
|
|
|
|
adhoc_remove_sta(sta);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_station_changed_cb(struct netdev *netdev,
|
|
|
|
const uint8_t *mac, bool added, void *user_data)
|
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = user_data;
|
|
|
|
|
|
|
|
if (added)
|
|
|
|
adhoc_new_station(adhoc, mac);
|
|
|
|
else
|
|
|
|
adhoc_del_station(adhoc, mac);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_join_cb(struct netdev *netdev, int result, void *user_data)
|
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = user_data;
|
|
|
|
struct l_dbus_message *reply;
|
|
|
|
|
|
|
|
if (result < 0) {
|
|
|
|
l_error("Failed to join adhoc network, %i", result);
|
|
|
|
dbus_pending_reply(&adhoc->pending,
|
|
|
|
dbus_error_failed(adhoc->pending));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-05-01 00:40:01 +02:00
|
|
|
l_rtnl_set_linkmode_and_operstate(iwd_get_rtnl(),
|
|
|
|
netdev_get_ifindex(adhoc->netdev),
|
|
|
|
IF_LINK_MODE_DEFAULT, IF_OPER_UP,
|
|
|
|
NULL, NULL, NULL);
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
adhoc->sta_watch_id = netdev_station_watch_add(netdev,
|
|
|
|
adhoc_station_changed_cb, adhoc);
|
|
|
|
|
|
|
|
reply = l_dbus_message_new_method_return(adhoc->pending);
|
|
|
|
dbus_pending_reply(&adhoc->pending, reply);
|
2020-09-14 23:04:04 +02:00
|
|
|
}
|
2018-07-17 23:16:00 +02:00
|
|
|
|
2020-09-14 23:04:04 +02:00
|
|
|
static void adhoc_mlme_notify(struct l_genl_msg *msg, void *user_data)
|
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = user_data;
|
|
|
|
uint32_t ifindex;
|
2018-07-30 00:32:59 +02:00
|
|
|
|
2020-09-14 23:04:04 +02:00
|
|
|
if (nl80211_parse_attrs(msg, NL80211_ATTR_IFINDEX, &ifindex,
|
|
|
|
NL80211_ATTR_UNSPEC) < 0 ||
|
|
|
|
ifindex != netdev_get_ifindex(adhoc->netdev))
|
|
|
|
return;
|
|
|
|
|
|
|
|
switch (l_genl_msg_get_command(msg)) {
|
|
|
|
case NL80211_CMD_JOIN_IBSS:
|
|
|
|
/*
|
|
|
|
* if watch is set the join_ibss_cb has come back. This event
|
|
|
|
* will come in for each new STA joining the IBSS so we only
|
|
|
|
* want to set it once
|
|
|
|
*/
|
|
|
|
if (adhoc->sta_watch_id && !adhoc->started) {
|
|
|
|
adhoc->started = true;
|
|
|
|
|
|
|
|
l_dbus_property_changed(dbus_get_bus(),
|
|
|
|
netdev_get_path(adhoc->netdev),
|
2018-07-30 00:32:59 +02:00
|
|
|
IWD_ADHOC_INTERFACE, "Started");
|
2020-09-14 23:04:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
2018-07-17 23:16:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct l_dbus_message *adhoc_dbus_start(struct l_dbus *dbus,
|
|
|
|
struct l_dbus_message *message,
|
|
|
|
void *user_data)
|
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = user_data;
|
2018-08-20 06:36:24 +02:00
|
|
|
struct netdev *netdev = adhoc->netdev;
|
2018-07-17 23:16:00 +02:00
|
|
|
struct wiphy *wiphy = netdev_get_wiphy(netdev);
|
|
|
|
const char *ssid, *wpa2_psk;
|
|
|
|
struct ie_rsn_info rsn;
|
|
|
|
struct iovec rsn_ie;
|
|
|
|
uint8_t ie_elems[32];
|
|
|
|
|
|
|
|
if (adhoc->pending)
|
|
|
|
return dbus_error_busy(message);
|
|
|
|
|
|
|
|
if (!l_dbus_message_get_arguments(message, "ss", &ssid, &wpa2_psk))
|
|
|
|
return dbus_error_invalid_args(message);
|
|
|
|
|
|
|
|
adhoc->ssid = l_strdup(ssid);
|
|
|
|
adhoc->pending = l_dbus_message_ref(message);
|
|
|
|
adhoc->sta_states = l_queue_new();
|
2018-10-08 22:44:13 +02:00
|
|
|
adhoc->ciphers = wiphy_select_cipher(wiphy, 0xffff);
|
|
|
|
adhoc->group_cipher = wiphy_select_cipher(wiphy, 0xffff);
|
2018-07-17 23:16:00 +02:00
|
|
|
|
2018-10-08 22:44:13 +02:00
|
|
|
adhoc_set_rsn_info(adhoc, &rsn);
|
2018-07-17 23:16:00 +02:00
|
|
|
ie_build_rsne(&rsn, ie_elems);
|
|
|
|
|
|
|
|
rsn_ie.iov_base = ie_elems;
|
|
|
|
rsn_ie.iov_len = ie_elems[1] + 2;
|
|
|
|
|
|
|
|
if (crypto_psk_from_passphrase(wpa2_psk, (uint8_t *) ssid,
|
|
|
|
strlen(ssid), adhoc->pmk))
|
|
|
|
return dbus_error_invalid_args(message);
|
|
|
|
|
|
|
|
if (netdev_join_adhoc(netdev, ssid, &rsn_ie, 1, true, adhoc_join_cb,
|
|
|
|
adhoc))
|
|
|
|
return dbus_error_invalid_args(message);
|
|
|
|
|
2020-09-14 23:04:04 +02:00
|
|
|
adhoc->mlme_watch = l_genl_family_register(adhoc->nl80211, "mlme",
|
|
|
|
adhoc_mlme_notify, adhoc, NULL);
|
|
|
|
if (!adhoc->mlme_watch)
|
|
|
|
return dbus_error_failed(message);
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct l_dbus_message *adhoc_dbus_start_open(struct l_dbus *dbus,
|
|
|
|
struct l_dbus_message *message, void *user_data)
|
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = user_data;
|
2018-08-20 06:36:24 +02:00
|
|
|
struct netdev *netdev = adhoc->netdev;
|
2018-07-17 23:16:00 +02:00
|
|
|
const char *ssid;
|
|
|
|
struct iovec rsn_ie;
|
|
|
|
uint8_t ie_elems[10];
|
|
|
|
|
|
|
|
if (adhoc->pending)
|
|
|
|
return dbus_error_busy(message);
|
|
|
|
|
|
|
|
if (!l_dbus_message_get_arguments(message, "s", &ssid))
|
|
|
|
return dbus_error_invalid_args(message);
|
|
|
|
|
|
|
|
adhoc->ssid = l_strdup(ssid);
|
|
|
|
adhoc->pending = l_dbus_message_ref(message);
|
|
|
|
adhoc->sta_states = l_queue_new();
|
|
|
|
adhoc->open = true;
|
|
|
|
|
|
|
|
/* Mac/iPhone seem to require the extended capabilities field */
|
|
|
|
memset(ie_elems, 0, sizeof(ie_elems));
|
|
|
|
ie_elems[0] = IE_TYPE_EXTENDED_CAPABILITIES;
|
|
|
|
ie_elems[1] = 8;
|
|
|
|
|
|
|
|
rsn_ie.iov_base = ie_elems;
|
|
|
|
rsn_ie.iov_len = ie_elems[1] + 2;
|
|
|
|
|
|
|
|
if (netdev_join_adhoc(netdev, ssid, &rsn_ie, 1, false, adhoc_join_cb,
|
|
|
|
adhoc))
|
|
|
|
return dbus_error_invalid_args(message);
|
|
|
|
|
2020-09-14 23:04:04 +02:00
|
|
|
adhoc->mlme_watch = l_genl_family_register(adhoc->nl80211, "mlme",
|
|
|
|
adhoc_mlme_notify, adhoc, NULL);
|
|
|
|
if (!adhoc->mlme_watch)
|
|
|
|
return dbus_error_failed(message);
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_leave_cb(struct netdev *netdev, int result, void *user_data)
|
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = user_data;
|
|
|
|
|
|
|
|
if (result < 0) {
|
|
|
|
l_error("Failed to leave adhoc network, %i", result);
|
|
|
|
dbus_pending_reply(&adhoc->pending,
|
|
|
|
dbus_error_failed(adhoc->pending));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
dbus_pending_reply(&adhoc->pending,
|
|
|
|
l_dbus_message_new_method_return(adhoc->pending));
|
|
|
|
|
|
|
|
adhoc_reset(adhoc);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct l_dbus_message *adhoc_dbus_stop(struct l_dbus *dbus,
|
|
|
|
struct l_dbus_message *message,
|
|
|
|
void *user_data)
|
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = user_data;
|
|
|
|
|
|
|
|
if (adhoc->pending)
|
|
|
|
return dbus_error_busy(message);
|
|
|
|
|
|
|
|
/* already stopped, no-op */
|
|
|
|
if (!adhoc->started)
|
|
|
|
return l_dbus_message_new_method_return(message);
|
|
|
|
|
2020-04-07 23:33:46 +02:00
|
|
|
if (netdev_leave_adhoc(adhoc->netdev, adhoc_leave_cb, adhoc))
|
2018-07-17 23:16:00 +02:00
|
|
|
return dbus_error_failed(message);
|
|
|
|
|
2021-05-01 00:40:01 +02:00
|
|
|
l_rtnl_set_linkmode_and_operstate(iwd_get_rtnl(),
|
|
|
|
netdev_get_ifindex(adhoc->netdev),
|
|
|
|
IF_LINK_MODE_DORMANT, IF_OPER_DOWN,
|
|
|
|
NULL, NULL, NULL);
|
|
|
|
|
2020-04-07 23:33:46 +02:00
|
|
|
adhoc->pending = l_dbus_message_ref(message);
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sta_append(void *data, void *user_data)
|
|
|
|
{
|
|
|
|
struct sta_state *sta = data;
|
|
|
|
struct l_dbus_message_builder *builder = user_data;
|
2022-01-11 17:51:11 +01:00
|
|
|
const char *macstr;
|
2018-07-17 23:16:00 +02:00
|
|
|
|
|
|
|
if (!sta->authenticated)
|
|
|
|
return;
|
|
|
|
|
|
|
|
macstr = util_address_to_string(sta->addr);
|
|
|
|
|
|
|
|
l_dbus_message_builder_append_basic(builder, 's', macstr);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool adhoc_property_get_peers(struct l_dbus *dbus,
|
|
|
|
struct l_dbus_message *message,
|
|
|
|
struct l_dbus_message_builder *builder,
|
|
|
|
void *user_data)
|
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = user_data;
|
|
|
|
|
|
|
|
l_dbus_message_builder_enter_array(builder, "s");
|
|
|
|
|
|
|
|
l_queue_foreach(adhoc->sta_states, sta_append, builder);
|
|
|
|
|
|
|
|
l_dbus_message_builder_leave_array(builder);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-07-30 00:32:59 +02:00
|
|
|
static bool adhoc_property_get_started(struct l_dbus *dbus,
|
|
|
|
struct l_dbus_message *message,
|
|
|
|
struct l_dbus_message_builder *builder,
|
|
|
|
void *user_data)
|
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = user_data;
|
|
|
|
bool started = adhoc->started;
|
|
|
|
|
|
|
|
l_dbus_message_builder_append_basic(builder, 'b', &started);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-07-17 23:16:00 +02:00
|
|
|
static void adhoc_setup_interface(struct l_dbus_interface *interface)
|
|
|
|
{
|
|
|
|
l_dbus_interface_method(interface, "Start", 0, adhoc_dbus_start, "",
|
|
|
|
"ss", "ssid", "wpa2_psk");
|
|
|
|
l_dbus_interface_method(interface, "Stop", 0, adhoc_dbus_stop, "", "");
|
|
|
|
l_dbus_interface_method(interface, "StartOpen", 0,
|
|
|
|
adhoc_dbus_start_open, "", "s", "ssid");
|
|
|
|
l_dbus_interface_property(interface, "ConnectedPeers", 0, "as",
|
|
|
|
adhoc_property_get_peers, NULL);
|
2018-07-30 00:32:59 +02:00
|
|
|
l_dbus_interface_property(interface, "Started", 0, "b",
|
|
|
|
adhoc_property_get_started, NULL);
|
2018-07-17 23:16:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void adhoc_destroy_interface(void *user_data)
|
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc = user_data;
|
|
|
|
|
|
|
|
adhoc_free(adhoc);
|
|
|
|
}
|
|
|
|
|
2018-08-20 06:36:24 +02:00
|
|
|
static void adhoc_add_interface(struct netdev *netdev)
|
2018-07-17 23:16:00 +02:00
|
|
|
{
|
|
|
|
struct adhoc_state *adhoc;
|
|
|
|
|
|
|
|
/* just allocate/set device, Start method will complete setup */
|
|
|
|
adhoc = l_new(struct adhoc_state, 1);
|
2018-08-20 06:36:24 +02:00
|
|
|
adhoc->netdev = netdev;
|
2019-05-28 21:24:37 +02:00
|
|
|
adhoc->nl80211 = l_genl_family_new(iwd_get_genl(), NL80211_GENL_NAME);
|
2018-07-17 23:16:00 +02:00
|
|
|
|
2018-09-05 04:50:08 +02:00
|
|
|
/* setup adhoc dbus interface */
|
2018-07-18 01:39:54 +02:00
|
|
|
l_dbus_object_add_interface(dbus_get_bus(),
|
2018-08-20 06:36:24 +02:00
|
|
|
netdev_get_path(netdev), IWD_ADHOC_INTERFACE, adhoc);
|
2018-07-17 23:16:00 +02:00
|
|
|
}
|
|
|
|
|
2018-08-20 06:36:24 +02:00
|
|
|
static void adhoc_remove_interface(struct netdev *netdev)
|
2018-07-17 23:16:00 +02:00
|
|
|
{
|
2018-07-18 01:39:54 +02:00
|
|
|
l_dbus_object_remove_interface(dbus_get_bus(),
|
2018-08-20 06:36:24 +02:00
|
|
|
netdev_get_path(netdev), IWD_ADHOC_INTERFACE);
|
2018-07-17 23:16:00 +02:00
|
|
|
}
|
2018-07-18 01:39:54 +02:00
|
|
|
|
2018-08-18 06:40:49 +02:00
|
|
|
static void adhoc_netdev_watch(struct netdev *netdev,
|
|
|
|
enum netdev_watch_event event, void *userdata)
|
2018-07-18 01:39:54 +02:00
|
|
|
{
|
|
|
|
switch (event) {
|
2018-08-18 06:40:49 +02:00
|
|
|
case NETDEV_WATCH_EVENT_UP:
|
|
|
|
case NETDEV_WATCH_EVENT_NEW:
|
2018-09-22 18:48:22 +02:00
|
|
|
if (netdev_get_iftype(netdev) == NETDEV_IFTYPE_ADHOC &&
|
|
|
|
netdev_get_is_up(netdev))
|
2018-08-20 06:36:24 +02:00
|
|
|
adhoc_add_interface(netdev);
|
2018-08-18 06:40:49 +02:00
|
|
|
break;
|
|
|
|
case NETDEV_WATCH_EVENT_DOWN:
|
|
|
|
case NETDEV_WATCH_EVENT_DEL:
|
2018-08-20 06:36:24 +02:00
|
|
|
adhoc_remove_interface(netdev);
|
2018-08-18 06:40:49 +02:00
|
|
|
break;
|
2018-07-18 01:39:54 +02:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-28 21:24:37 +02:00
|
|
|
static int adhoc_init(void)
|
2018-07-18 01:39:54 +02:00
|
|
|
{
|
2018-08-18 06:40:49 +02:00
|
|
|
netdev_watch = netdev_watch_add(adhoc_netdev_watch, NULL, NULL);
|
|
|
|
l_dbus_register_interface(dbus_get_bus(), IWD_ADHOC_INTERFACE,
|
2018-07-18 01:39:54 +02:00
|
|
|
adhoc_setup_interface, adhoc_destroy_interface, false);
|
2018-10-08 22:44:13 +02:00
|
|
|
|
2019-05-28 21:24:37 +02:00
|
|
|
return 0;
|
2018-07-18 01:39:54 +02:00
|
|
|
}
|
|
|
|
|
2019-05-28 21:24:37 +02:00
|
|
|
static void adhoc_exit(void)
|
2018-07-18 01:39:54 +02:00
|
|
|
{
|
2018-08-18 06:40:49 +02:00
|
|
|
netdev_watch_remove(netdev_watch);
|
2018-07-18 01:39:54 +02:00
|
|
|
l_dbus_unregister_interface(dbus_get_bus(), IWD_ADHOC_INTERFACE);
|
|
|
|
}
|
2019-05-28 21:24:37 +02:00
|
|
|
|
|
|
|
IWD_MODULE(adhoc, adhoc_init, adhoc_exit)
|
2020-08-20 18:07:51 +02:00
|
|
|
IWD_MODULE_DEPENDS(adhoc, netdev);
|