3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-12-27 10:52:47 +01:00
The iNet Wireless Daemon (iwd) project aims to provide a comprehensive Wi-Fi connectivity solution for Linux based devices. The core goal of the project is to optimize resource utilization: storage, runtime memory and link-time costs. https://iwd.wiki.kernel.org/
Go to file
Andrew Zaborowski 316752c5e4 ie: Error in tlv_iter_next if no space to length byte
When parsing the EAPoL-Key key data field we don't strip the 0xdd /
0x00 padding from the decrypted data so there may be trailing padding
after the IE sequence and valgrind will report an invalid read of the
length byte.  Same thing may happen if we're sent garbage.
2016-09-05 23:00:01 -05:00
autotests autotests: utility: fix helper functions 2016-08-02 15:21:25 -05:00
client client: Update to new l_main api 2016-06-08 17:39:35 -05:00
doc doc: Don't go over 80 characters 2016-07-20 15:44:28 -05:00
linux dbus: Drop unused linux/kdbus.h src/kdbus.c 2016-04-04 14:27:26 -05:00
monitor iwmon: RX dBm is a signed integer 2016-09-05 22:46:53 -05:00
src ie: Error in tlv_iter_next if no space to length byte 2016-09-05 23:00:01 -05:00
test test: Add monitor-iwd script 2016-08-06 10:49:21 -05:00
tools tools: More key and crypto kernel config parameters 2016-09-05 22:40:07 -05:00
unit unit: Add parsing of wsc_credential 2016-08-31 22:36:50 -05:00
.gitignore gitignore: Add test-runner 2016-05-11 15:54:53 -05:00
acinclude.m4 build: Avoid redefining _FORTIFY_SOURCE 2014-08-01 09:52:36 -05:00
AUTHORS AUTHORS: Mention Rahul's contributions 2016-03-04 10:22:04 -06:00
bootstrap build: Add support for internal ELL compilation 2014-05-11 11:01:11 -07:00
bootstrap-configure bootstrap-configure: Set localstatedir 2015-04-27 07:55:13 -05:00
ChangeLog build: Add ChangeLog file to satisfy distribution requirements 2014-05-22 19:53:56 -07:00
configure.ac build: Undef _FORTIFY_SOURCE for unoptimized builds 2016-08-10 12:12:15 -05:00
COPYING build: Add COPYING and INSTALL template files 2014-05-22 10:09:24 -07:00
HACKING HACKING: Add Submitting Patches section 2015-01-22 08:53:10 -06:00
INSTALL build: Add COPYING and INSTALL template files 2014-05-22 10:09:24 -07:00
Makefile.am unit: Add end-to-end WSC handshake test 2016-08-30 09:22:35 -05:00
README README: Monitor interface is created automatically 2014-10-04 21:33:58 -05:00
TODO TODO: Add EAPoL <-> EAP timeout relationship task 2016-08-28 00:41:07 -05:00

Wireless daemon for Linux
*************************

Copyright (C) 2013-2014  Intel Corporation. All rights reserved.


Compilation and installation
============================

In order to compile the source code you need following software packages:
	- GCC compiler
	- GNU C library
	- Embedded Linux library

To configure run:
	./configure --prefix=/usr

Configure automatically searches for all required components and packages.

To compile and install run:
	make && make install


Embedded Linux library
======================

In order to compile the daemon and control utility the development version
of Embedded Linux library is required to be present. The development
repositories can be found here:

	git://git.kernel.org/pub/scm/libs/ell/ell.git
	https://kernel.googlesource.com/pub/scm/libs/ell/ell.git

The build systems requires that the Embedded Linux library source code
is available on the same top level directory as the Wireless daemon
source code:

	.
	|--- ell
	|    |--- ell
	|    `--- unit
	`--- iwd
	     |--- src
	     `--- client

It is not required to build or install Embedded Linux library. The build
will happen when building the Wireless daemon and it will then be linked
internally.


Kernel dependencies
===================

In order to use this daemon and control utility the kdbus kernel module
is required. The development repositories can be found here:

	https://github.com/gregkh/kdbus
	https://code.google.com/p/d-bus/

The daemon will start its own private bus that is located at the /dev/kdbus
device hierarchy:

	/dev/kdbus
	|--- control
	`--- 0-iwd
	     `--- bus

When started as root, the new private bus will be /dev/kdbus/0-iwd/bus
and it can be verified with the busctl utility from systemd:

	# busctl --address=kernel:path=/dev/kdbus/0-iwd/bus
	NAME       PID  PROCESS     USER      CONNECTION    CONNECTION-NAME
	:1.1     62151  iwd         root      :1.1          iwd
	:1.2     62153  busctl      root      :1.2          sd-busctl

Clients talking to the daemon must specifiy the private bus address.


Netlink monitoring
==================

The included iwmon utility can be used to monitor the 802.11 subsystem
generic netlink commands and events. It uses the nlmon kernel driver
from Linux 3.10 and later. On startup network monitor interface named
named 'nlmon' is created unless another interface name is given on the
command line. If the monitor interface was created by the iwmon utility,
it will be removed on program exit.

Manually the monitor interface can be created using the following
commands:

	ip link add name nlmon type nlmon
	ip link set dev nlmon allmulticast on
	ip link set dev nlmon up

It is possible to create netlink traces in PCAP format using tcpdump
and then read them via iwmon utility:

	tcpdump -i nlmon -w trace-file.pcap

The resulting PCAP files will use Linux cooked packet format containing
packets with ARPHRD_NETLINK type. They can be read using iwmon:

	iwmon -r trace-file.pcap

At this time iwmon is not able to write PCAP files by itself. This might
change in future versions.

When also the authentication protocol traffic on port 0x888e (ETH_P_PAE)
is needed, then a second capture is required:

	tcpdump -i any 'ether proto 0x888e' -w trace-pae.pcap

It is possible to combine these two PCAP files using the mergecap utility
and create a combined trace file:

	mergecap -F pcap -w trace.pcap trace-file.pcap trace-pae.pcap

This will create a trace.pcap file that includes the complete picture
of nl80211 netlink traffic and authentication messages. All packets are
merged in chronological order based on timestamps.

Unfortunately it is not possible to instruct tcpdump filtering to do
this in a single capture. Post-processing of the PCAP files is required
at the moment.


Simulating devices
==================

The Linux driver mac80211_hwsim provides the functionality to simulate
Wireless devices using fake virtual air. Just load the module.

	modprobe mac80211_hwsim radios=0

Provding the radios=0 is important since otherwise it starts out with
two new Wireless radios by default.

With the provided hwsim utility it is now possible to add and remove
virtual radio devices.

	hwsim --create
	hwsim --destroy=<radio-id>

The radio id assigned to each virtual device is its internal id used
by the Wireless device.