2014-05-11 19:39:22 +02:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* Wireless daemon for Linux
|
|
|
|
*
|
|
|
|
* Copyright (C) 2013-2014 Intel Corporation. All rights reserved.
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include <config.h>
|
|
|
|
#endif
|
|
|
|
|
2014-08-09 06:53:13 +02:00
|
|
|
#include <stdio.h>
|
2014-05-11 19:39:22 +02:00
|
|
|
#include <stdlib.h>
|
2018-05-03 21:45:26 +02:00
|
|
|
#include <errno.h>
|
2014-08-09 06:53:13 +02:00
|
|
|
#include <getopt.h>
|
2018-11-01 22:09:19 +01:00
|
|
|
#include <signal.h>
|
2014-05-11 19:39:22 +02:00
|
|
|
#include <ell/ell.h>
|
|
|
|
|
2015-09-29 02:51:40 +02:00
|
|
|
#include "linux/nl80211.h"
|
|
|
|
|
2016-05-12 04:59:03 +02:00
|
|
|
#include "src/iwd.h"
|
2014-07-29 21:25:01 +02:00
|
|
|
#include "src/wiphy.h"
|
2014-10-07 04:50:27 +02:00
|
|
|
#include "src/dbus.h"
|
2016-11-15 23:44:07 +01:00
|
|
|
#include "src/eap.h"
|
2015-09-29 02:51:40 +02:00
|
|
|
#include "src/eapol.h"
|
2016-07-02 16:42:39 +02:00
|
|
|
#include "src/rfkill.h"
|
2017-11-22 23:34:38 +01:00
|
|
|
#include "src/plugin.h"
|
2019-02-07 00:13:32 +01:00
|
|
|
#include "src/storage.h"
|
2019-06-27 00:15:55 +02:00
|
|
|
#include "src/anqp.h"
|
2015-03-02 15:19:08 +01:00
|
|
|
|
2016-04-13 21:07:36 +02:00
|
|
|
#include "src/backtrace.h"
|
|
|
|
|
2018-11-01 19:55:37 +01:00
|
|
|
static struct l_genl *genl;
|
|
|
|
static struct l_genl_family *nl80211;
|
2016-11-02 22:04:37 +01:00
|
|
|
static struct l_settings *iwd_config;
|
2016-11-03 18:42:57 +01:00
|
|
|
static struct l_timeout *timeout;
|
2016-06-23 22:49:05 +02:00
|
|
|
static const char *interfaces;
|
|
|
|
static const char *nointerfaces;
|
2017-03-16 22:45:10 +01:00
|
|
|
static const char *phys;
|
|
|
|
static const char *nophys;
|
2017-11-22 23:34:38 +01:00
|
|
|
static const char *plugins;
|
|
|
|
static const char *noplugins;
|
2018-05-20 01:29:28 +02:00
|
|
|
static const char *debugopt;
|
2017-05-03 19:53:52 +02:00
|
|
|
static bool terminating;
|
2015-03-02 15:19:08 +01:00
|
|
|
|
|
|
|
static void main_loop_quit(struct l_timeout *timeout, void *user_data)
|
|
|
|
{
|
|
|
|
l_main_quit();
|
|
|
|
}
|
2014-05-21 06:44:13 +02:00
|
|
|
|
2018-09-12 03:06:00 +02:00
|
|
|
static void iwd_shutdown(void)
|
2017-05-03 19:53:51 +02:00
|
|
|
{
|
2017-05-03 19:53:52 +02:00
|
|
|
if (terminating)
|
|
|
|
return;
|
|
|
|
|
|
|
|
terminating = true;
|
|
|
|
|
2018-09-12 03:06:00 +02:00
|
|
|
if (!nl80211) {
|
|
|
|
l_main_quit();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-05-03 19:53:51 +02:00
|
|
|
dbus_shutdown();
|
|
|
|
netdev_shutdown();
|
|
|
|
|
|
|
|
timeout = l_timeout_create(1, main_loop_quit, NULL, NULL);
|
|
|
|
}
|
|
|
|
|
2018-11-01 19:56:16 +01:00
|
|
|
static void signal_handler(uint32_t signo, void *user_data)
|
2014-05-11 19:39:22 +02:00
|
|
|
{
|
|
|
|
switch (signo) {
|
|
|
|
case SIGINT:
|
|
|
|
case SIGTERM:
|
|
|
|
l_info("Terminate");
|
2017-05-03 19:53:51 +02:00
|
|
|
iwd_shutdown();
|
2014-05-11 19:39:22 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-02 22:04:37 +01:00
|
|
|
const struct l_settings *iwd_get_config(void)
|
|
|
|
{
|
|
|
|
return iwd_config;
|
|
|
|
}
|
|
|
|
|
2019-05-18 00:05:52 +02:00
|
|
|
struct l_genl *iwd_get_genl(void)
|
|
|
|
{
|
|
|
|
return genl;
|
|
|
|
}
|
|
|
|
|
2014-08-09 06:53:13 +02:00
|
|
|
static void usage(void)
|
|
|
|
{
|
|
|
|
printf("iwd - Wireless daemon\n"
|
|
|
|
"Usage:\n");
|
|
|
|
printf("\tiwd [options]\n");
|
|
|
|
printf("Options:\n"
|
2016-10-16 19:41:27 +02:00
|
|
|
"\t-B, --dbus-debug Enable D-Bus debugging\n"
|
2016-06-23 22:49:05 +02:00
|
|
|
"\t-i, --interfaces Interfaces to manage\n"
|
|
|
|
"\t-I, --nointerfaces Interfaces to ignore\n"
|
2017-03-16 22:45:10 +01:00
|
|
|
"\t-p, --phys Phys to manage\n"
|
|
|
|
"\t-P, --nophys Phys to ignore\n"
|
2017-11-22 23:34:38 +01:00
|
|
|
"\t-l, --plugin Plugins to include\n"
|
|
|
|
"\t-L, --noplugin Plugins to exclude\n"
|
2018-05-20 01:29:28 +02:00
|
|
|
"\t-d, --debug Enable debug output\n"
|
2019-07-12 10:01:33 +02:00
|
|
|
"\t-v, --version Show version\n"
|
2014-08-09 06:53:13 +02:00
|
|
|
"\t-h, --help Show help options\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct option main_options[] = {
|
2016-06-23 22:49:05 +02:00
|
|
|
{ "dbus-debug", no_argument, NULL, 'B' },
|
|
|
|
{ "version", no_argument, NULL, 'v' },
|
|
|
|
{ "interfaces", required_argument, NULL, 'i' },
|
|
|
|
{ "nointerfaces", required_argument, NULL, 'I' },
|
2017-03-16 22:45:10 +01:00
|
|
|
{ "phys", required_argument, NULL, 'p' },
|
|
|
|
{ "nophys", required_argument, NULL, 'P' },
|
2017-11-22 23:34:38 +01:00
|
|
|
{ "plugin", required_argument, NULL, 'l' },
|
|
|
|
{ "noplugin", required_argument, NULL, 'L' },
|
2018-05-20 01:29:28 +02:00
|
|
|
{ "debug", optional_argument, NULL, 'd' },
|
2016-06-23 22:49:05 +02:00
|
|
|
{ "help", no_argument, NULL, 'h' },
|
2014-08-09 06:53:13 +02:00
|
|
|
{ }
|
|
|
|
};
|
|
|
|
|
2015-09-29 02:51:40 +02:00
|
|
|
static void do_debug(const char *str, void *user_data)
|
|
|
|
{
|
|
|
|
const char *prefix = user_data;
|
|
|
|
|
|
|
|
l_info("%s%s", prefix, str);
|
|
|
|
}
|
|
|
|
|
2019-05-18 00:05:52 +02:00
|
|
|
static void nl80211_appeared(const struct l_genl_family_info *info,
|
|
|
|
void *user_data)
|
2015-09-29 02:51:40 +02:00
|
|
|
{
|
|
|
|
l_debug("Found nl80211 interface");
|
2019-05-18 00:05:52 +02:00
|
|
|
nl80211 = l_genl_family_new(genl, NL80211_GENL_NAME);
|
2015-09-29 02:51:40 +02:00
|
|
|
|
2019-10-11 21:29:22 +02:00
|
|
|
if (iwd_modules_init() < 0) {
|
|
|
|
l_main_quit();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
plugin_init(plugins, noplugins);
|
|
|
|
|
2019-04-11 03:10:29 +02:00
|
|
|
manager_init(nl80211, interfaces, nointerfaces);
|
2019-06-27 00:15:55 +02:00
|
|
|
anqp_init(nl80211);
|
2019-04-11 19:03:52 +02:00
|
|
|
|
2017-03-16 22:45:10 +01:00
|
|
|
if (!wiphy_init(nl80211, phys, nophys))
|
2015-09-29 02:51:40 +02:00
|
|
|
l_error("Unable to init wiphy functionality");
|
|
|
|
|
2018-08-18 06:23:19 +02:00
|
|
|
netdev_set_nl80211(nl80211);
|
2015-09-29 02:51:40 +02:00
|
|
|
}
|
|
|
|
|
2018-09-12 03:06:00 +02:00
|
|
|
static void request_name_callback(struct l_dbus *dbus, bool success,
|
|
|
|
bool queued, void *user_data)
|
|
|
|
{
|
|
|
|
if (!success) {
|
|
|
|
l_error("Name request failed");
|
|
|
|
goto fail_exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_dbus_object_manager_enable(dbus))
|
|
|
|
l_warn("Unable to register the ObjectManager");
|
|
|
|
|
2019-05-18 00:05:52 +02:00
|
|
|
/* TODO: Always request nl80211 for now, ignoring auto-loading */
|
|
|
|
l_genl_request_family(genl, NL80211_GENL_NAME, nl80211_appeared,
|
|
|
|
NULL, NULL);
|
2018-09-12 03:06:00 +02:00
|
|
|
return;
|
|
|
|
|
|
|
|
fail_exit:
|
|
|
|
l_main_quit();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dbus_ready(void *user_data)
|
|
|
|
{
|
|
|
|
struct l_dbus *dbus = user_data;
|
|
|
|
|
2019-08-04 09:53:18 +02:00
|
|
|
l_dbus_name_acquire(dbus, "net.connman.iwd", false, false, false,
|
2018-09-12 03:06:00 +02:00
|
|
|
request_name_callback, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dbus_disconnected(void *user_data)
|
|
|
|
{
|
|
|
|
l_info("D-Bus disconnected, quitting...");
|
|
|
|
iwd_shutdown();
|
|
|
|
}
|
|
|
|
|
2018-05-03 21:45:26 +02:00
|
|
|
static void print_koption(const void *key, void *value, void *user_data)
|
|
|
|
{
|
|
|
|
l_info("\t%s", (const char *) key);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int check_crypto()
|
|
|
|
{
|
|
|
|
int r = 0;
|
|
|
|
struct l_hashmap *options = l_hashmap_string_new();
|
|
|
|
struct l_hashmap *optional = l_hashmap_string_new();
|
|
|
|
|
|
|
|
if (!l_checksum_is_supported(L_CHECKSUM_SHA1, true)) {
|
|
|
|
r = -ENOTSUP;
|
|
|
|
l_error("No HMAC(SHA1) support found");
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_USER_API_HASH", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_SHA1", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_HMAC", &r);
|
|
|
|
l_hashmap_insert(optional, "CONFIG_CRYPTO_SHA1_SSSE3", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_checksum_is_supported(L_CHECKSUM_MD5, true)) {
|
|
|
|
r = -ENOTSUP;
|
|
|
|
l_error("No HMAC(MD5) support found");
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_USER_API_HASH", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_MD5", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_HMAC", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_checksum_cmac_aes_supported()) {
|
|
|
|
r = -ENOTSUP;
|
|
|
|
l_error("No CMAC(AES) support found");
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_USER_API_HASH", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_AES", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_CMAC", &r);
|
|
|
|
l_hashmap_insert(optional, "CONFIG_CRYPTO_AES_X86_64", &r);
|
|
|
|
l_hashmap_insert(optional, "CONFIG_CRYPTO_AES_NI_INTEL", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_checksum_is_supported(L_CHECKSUM_SHA256, true)) {
|
|
|
|
r = -ENOTSUP;
|
|
|
|
l_error("No HMAC(SHA256) support not found");
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_USER_API_HASH", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_HMAC", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_SHA256", &r);
|
|
|
|
l_hashmap_insert(optional, "CONFIG_CRYPTO_SHA256_SSSE3", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_checksum_is_supported(L_CHECKSUM_SHA512, true)) {
|
|
|
|
l_warn("No HMAC(SHA512) support found, "
|
|
|
|
"certain TLS connections might fail");
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_SHA512", &r);
|
|
|
|
l_hashmap_insert(optional, "CONFIG_CRYPTO_SHA512_SSSE3", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_cipher_is_supported(L_CIPHER_ARC4)) {
|
|
|
|
r = -ENOTSUP;
|
|
|
|
l_error("RC4 support not found");
|
|
|
|
l_hashmap_insert(options,
|
|
|
|
"CONFIG_CRYPTO_USER_API_SKCIPHER", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_ARC4", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_ECB", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_cipher_is_supported(L_CIPHER_DES) ||
|
|
|
|
!l_cipher_is_supported(L_CIPHER_DES3_EDE_CBC)) {
|
|
|
|
r = -ENOTSUP;
|
|
|
|
l_error("DES support not found");
|
|
|
|
l_hashmap_insert(options,
|
|
|
|
"CONFIG_CRYPTO_USER_API_SKCIPHER", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_DES", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_ECB", &r);
|
|
|
|
l_hashmap_insert(optional, "CONFIG_CRYPTO_DES3_EDE_X86_64", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_cipher_is_supported(L_CIPHER_AES)) {
|
|
|
|
r = -ENOTSUP;
|
|
|
|
l_error("AES support not found");
|
|
|
|
l_hashmap_insert(options,
|
|
|
|
"CONFIG_CRYPTO_USER_API_SKCIPHER", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_AES", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_ECB", &r);
|
|
|
|
l_hashmap_insert(optional, "CONFIG_CRYPTO_AES_X86_64", &r);
|
|
|
|
l_hashmap_insert(optional, "CONFIG_CRYPTO_AES_NI_INTEL", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_cipher_is_supported(L_CIPHER_DES3_EDE_CBC)) {
|
|
|
|
l_warn("No CBC(DES3_EDE) support found, "
|
|
|
|
"certain TLS connections might fail");
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_DES", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_CBC", &r);
|
|
|
|
l_hashmap_insert(optional, "CONFIG_CRYPTO_DES3_EDE_X86_64", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_cipher_is_supported(L_CIPHER_AES_CBC)) {
|
|
|
|
l_warn("No CBC(AES) support found, "
|
|
|
|
"WPS will not be available");
|
|
|
|
l_hashmap_insert(options, "CONFIG_CRYPTO_CBC", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_key_is_supported(L_KEY_FEATURE_DH)) {
|
|
|
|
l_warn("No Diffie-Hellman support found, "
|
|
|
|
"WPS will not be available");
|
|
|
|
l_hashmap_insert(options, "CONFIG_KEY_DH_OPERATIONS", &r);
|
|
|
|
}
|
|
|
|
|
2018-11-09 18:50:29 +01:00
|
|
|
if (!l_key_is_supported(L_KEY_FEATURE_RESTRICT)) {
|
|
|
|
l_warn("No keyring restrictions support found.");
|
|
|
|
l_hashmap_insert(options, "CONFIG_KEYS", &r);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!l_key_is_supported(L_KEY_FEATURE_CRYPTO)) {
|
|
|
|
l_warn("No asymmetric key support found.");
|
|
|
|
l_warn("TLS based WPA-Enterprise authentication methods will"
|
|
|
|
" not function.");
|
|
|
|
l_warn("Kernel 4.20+ is required for this feature.");
|
|
|
|
l_hashmap_insert(options, "CONFIG_ASYMMETRIC_KEY_TYPE", &r);
|
|
|
|
l_hashmap_insert(options,
|
|
|
|
"CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_X509_CERTIFICATE_PARSER", &r);
|
|
|
|
l_hashmap_insert(options, "CONFIG_PKCS7_MESSAGE_PARSER", &r);
|
|
|
|
l_hashmap_insert(options,
|
|
|
|
"CONFIG_PKCS8_PRIVATE_KEY_PARSER", &r);
|
|
|
|
};
|
|
|
|
|
2018-05-03 21:45:26 +02:00
|
|
|
if (l_hashmap_isempty(options))
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
l_info("The following options are missing in the kernel:");
|
|
|
|
|
|
|
|
if (l_hashmap_remove(options, "CONFIG_CRYPTO_USER_API_HASH"))
|
|
|
|
l_info("\tCONFIG_CRYPTO_USER_API_HASH");
|
|
|
|
|
|
|
|
if (l_hashmap_remove(options, "CONFIG_CRYPTO_USER_API_SKCIPHER"))
|
|
|
|
l_info("\tCONFIG_CRYPTO_USER_API_SKCIPHER");
|
|
|
|
|
|
|
|
l_hashmap_foreach(options, print_koption, NULL);
|
|
|
|
|
2018-11-05 18:13:24 +01:00
|
|
|
if (!l_hashmap_isempty(optional)) {
|
|
|
|
l_info("The following optimized implementations might be "
|
|
|
|
"available:");
|
|
|
|
l_hashmap_foreach(optional, print_koption, NULL);
|
|
|
|
}
|
2018-05-03 21:45:26 +02:00
|
|
|
|
|
|
|
done:
|
|
|
|
l_hashmap_destroy(options, NULL);
|
|
|
|
l_hashmap_destroy(optional, NULL);
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2014-05-11 19:39:22 +02:00
|
|
|
int main(int argc, char *argv[])
|
|
|
|
{
|
2014-11-08 04:43:18 +01:00
|
|
|
bool enable_dbus_debug = false;
|
2014-05-21 06:44:13 +02:00
|
|
|
int exit_status;
|
2018-09-12 03:06:00 +02:00
|
|
|
struct l_dbus *dbus;
|
2019-09-08 18:17:19 +02:00
|
|
|
const char *config_dir;
|
2019-09-08 10:22:36 +02:00
|
|
|
char **config_dirs;
|
2016-11-15 23:44:07 +01:00
|
|
|
uint32_t eap_mtu;
|
2019-09-08 10:22:36 +02:00
|
|
|
int i;
|
2014-05-11 19:39:22 +02:00
|
|
|
|
2014-08-09 06:53:13 +02:00
|
|
|
for (;;) {
|
|
|
|
int opt;
|
|
|
|
|
2019-09-08 18:17:19 +02:00
|
|
|
opt = getopt_long(argc, argv, "Bi:I:p:P:d::vh",
|
2017-03-16 22:45:10 +01:00
|
|
|
main_options, NULL);
|
2014-08-09 06:53:13 +02:00
|
|
|
if (opt < 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
switch (opt) {
|
2014-11-08 04:43:18 +01:00
|
|
|
case 'B':
|
|
|
|
enable_dbus_debug = true;
|
|
|
|
break;
|
2016-06-23 22:49:05 +02:00
|
|
|
case 'i':
|
|
|
|
interfaces = optarg;
|
|
|
|
break;
|
|
|
|
case 'I':
|
|
|
|
nointerfaces = optarg;
|
|
|
|
break;
|
2017-03-16 22:45:10 +01:00
|
|
|
case 'p':
|
|
|
|
phys = optarg;
|
|
|
|
break;
|
|
|
|
case 'P':
|
|
|
|
nophys = optarg;
|
|
|
|
break;
|
2017-11-22 23:34:38 +01:00
|
|
|
case 'l':
|
|
|
|
plugins = optarg;
|
|
|
|
break;
|
|
|
|
case 'L':
|
|
|
|
noplugins = optarg;
|
|
|
|
break;
|
2018-05-20 01:29:28 +02:00
|
|
|
case 'd':
|
|
|
|
if (optarg)
|
|
|
|
debugopt = optarg;
|
|
|
|
else if (argv[optind] && argv[optind][0] != '-')
|
|
|
|
debugopt = argv[optind++];
|
|
|
|
else
|
|
|
|
debugopt = "*";
|
|
|
|
break;
|
2018-09-14 15:18:09 +02:00
|
|
|
case 'v':
|
|
|
|
printf("%s\n", VERSION);
|
|
|
|
return EXIT_SUCCESS;
|
2014-08-09 06:53:13 +02:00
|
|
|
case 'h':
|
|
|
|
usage();
|
|
|
|
return EXIT_SUCCESS;
|
|
|
|
default:
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (argc - optind > 0) {
|
|
|
|
fprintf(stderr, "Invalid command line parameters\n");
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
|
|
|
|
2018-05-03 21:45:26 +02:00
|
|
|
l_log_set_stderr();
|
|
|
|
|
|
|
|
if (check_crypto() < 0)
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
|
2016-06-09 16:38:13 +02:00
|
|
|
if (!l_main_init())
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
|
2018-05-20 01:29:28 +02:00
|
|
|
if (debugopt)
|
|
|
|
l_debug_enable(debugopt);
|
2014-05-11 19:39:22 +02:00
|
|
|
|
2018-11-24 03:27:04 +01:00
|
|
|
#ifdef HAVE_BACKTRACE
|
2017-03-16 21:13:35 +01:00
|
|
|
__iwd_backtrace_init();
|
2016-04-13 21:07:36 +02:00
|
|
|
#endif
|
|
|
|
|
2014-05-11 19:39:22 +02:00
|
|
|
l_info("Wireless daemon version %s", VERSION);
|
|
|
|
|
2019-09-08 18:17:19 +02:00
|
|
|
config_dir = getenv("CONFIGURATION_DIRECTORY");
|
|
|
|
if (!config_dir)
|
|
|
|
config_dir = DAEMON_CONFIGDIR;
|
2019-09-08 10:22:36 +02:00
|
|
|
|
|
|
|
l_debug("Using configuration directory %s", config_dir);
|
2016-11-02 22:04:37 +01:00
|
|
|
|
|
|
|
iwd_config = l_settings_new();
|
|
|
|
|
2019-09-08 10:22:36 +02:00
|
|
|
config_dirs = l_strsplit(config_dir, ':');
|
|
|
|
for (i = 0; config_dirs[i]; i++) {
|
|
|
|
char *path = l_strdup_printf("%s/%s", config_dirs[i],
|
|
|
|
"main.conf");
|
|
|
|
bool result = l_settings_load_from_file(iwd_config, path);
|
|
|
|
l_free(path);
|
2016-11-02 22:04:37 +01:00
|
|
|
|
2019-09-08 10:22:36 +02:00
|
|
|
if (result) {
|
|
|
|
l_info("Loaded configuration from %s/main.conf",
|
|
|
|
config_dirs[i]);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
l_strv_free(config_dirs);
|
2016-11-02 22:04:37 +01:00
|
|
|
|
2018-08-18 06:32:30 +02:00
|
|
|
__eapol_set_config(iwd_config);
|
|
|
|
|
|
|
|
if (!l_settings_get_uint(iwd_config, "EAP", "mtu", &eap_mtu))
|
|
|
|
eap_mtu = 1400; /* on WiFi the real MTU is around 2304 */
|
|
|
|
|
|
|
|
exit_status = EXIT_FAILURE;
|
|
|
|
|
2019-09-08 18:24:23 +02:00
|
|
|
if (!storage_create_dirs())
|
2019-02-07 00:13:32 +01:00
|
|
|
goto fail_dbus;
|
2019-06-26 21:20:35 +02:00
|
|
|
|
2019-05-18 00:05:52 +02:00
|
|
|
genl = l_genl_new();
|
|
|
|
if (!genl) {
|
|
|
|
l_error("Failed to open generic netlink socket");
|
|
|
|
goto fail_genl;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (getenv("IWD_GENL_DEBUG"))
|
|
|
|
l_genl_set_debug(genl, do_debug, "[GENL] ", NULL);
|
|
|
|
|
2018-09-12 03:06:00 +02:00
|
|
|
dbus = l_dbus_new_default(L_DBUS_SYSTEM_BUS);
|
|
|
|
if (!dbus) {
|
2018-08-18 06:32:30 +02:00
|
|
|
l_error("Failed to initialize D-Bus");
|
|
|
|
goto fail_dbus;
|
2014-10-07 04:50:27 +02:00
|
|
|
}
|
|
|
|
|
2018-09-12 03:06:00 +02:00
|
|
|
if (enable_dbus_debug)
|
|
|
|
l_dbus_set_debug(dbus, do_debug, "[DBUS] ", NULL);
|
2014-06-21 13:41:40 +02:00
|
|
|
|
2018-09-12 03:06:00 +02:00
|
|
|
l_dbus_set_ready_handler(dbus, dbus_ready, dbus, NULL);
|
|
|
|
l_dbus_set_disconnect_handler(dbus, dbus_disconnected, NULL, NULL);
|
|
|
|
dbus_init(dbus);
|
2015-09-29 02:51:40 +02:00
|
|
|
|
2018-08-18 06:32:30 +02:00
|
|
|
eap_init(eap_mtu);
|
|
|
|
eapol_init();
|
2016-11-15 23:44:07 +01:00
|
|
|
|
2019-05-13 15:44:28 +02:00
|
|
|
if (!netdev_init())
|
2018-08-18 06:23:19 +02:00
|
|
|
goto fail_netdev;
|
|
|
|
|
2018-11-01 19:56:16 +01:00
|
|
|
exit_status = l_main_run_with_signal(signal_handler, NULL);
|
2019-05-19 19:57:45 +02:00
|
|
|
plugin_exit();
|
|
|
|
|
|
|
|
iwd_modules_exit();
|
2018-08-18 06:23:19 +02:00
|
|
|
netdev_exit();
|
|
|
|
fail_netdev:
|
2018-08-18 06:32:30 +02:00
|
|
|
eapol_exit();
|
|
|
|
eap_exit();
|
2015-09-29 02:51:40 +02:00
|
|
|
|
2019-05-18 00:05:52 +02:00
|
|
|
if (nl80211) {
|
|
|
|
manager_exit();
|
2019-06-27 00:15:55 +02:00
|
|
|
anqp_exit();
|
2019-05-18 00:05:52 +02:00
|
|
|
wiphy_exit();
|
|
|
|
l_genl_family_free(nl80211);
|
|
|
|
}
|
|
|
|
|
2015-09-29 02:51:40 +02:00
|
|
|
dbus_exit();
|
2018-09-12 03:06:00 +02:00
|
|
|
l_dbus_destroy(dbus);
|
2019-09-08 19:18:48 +02:00
|
|
|
storage_cleanup_dirs();
|
2018-08-18 06:32:30 +02:00
|
|
|
fail_dbus:
|
2019-05-18 00:05:52 +02:00
|
|
|
l_genl_unref(genl);
|
|
|
|
fail_genl:
|
2016-11-02 22:04:37 +01:00
|
|
|
l_settings_free(iwd_config);
|
|
|
|
|
2015-03-02 15:19:08 +01:00
|
|
|
l_timeout_remove(timeout);
|
2014-05-11 19:39:22 +02:00
|
|
|
|
2016-06-09 16:38:13 +02:00
|
|
|
l_main_exit();
|
|
|
|
|
2014-05-21 06:44:13 +02:00
|
|
|
return exit_status;
|
2014-05-11 19:39:22 +02:00
|
|
|
}
|