mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-26 17:28:29 -05:00
92 lines
2.2 KiB
C
92 lines
2.2 KiB
C
|
/*
|
||
|
* Generic Snooping for Proxy ARP
|
||
|
* Copyright (c) 2014, Qualcomm Atheros, Inc.
|
||
|
*
|
||
|
* This software may be distributed under the terms of the BSD license.
|
||
|
* See README for more details.
|
||
|
*/
|
||
|
|
||
|
#include "utils/includes.h"
|
||
|
|
||
|
#include "utils/common.h"
|
||
|
#include "hostapd.h"
|
||
|
#include "ap_drv_ops.h"
|
||
|
#include "x_snoop.h"
|
||
|
|
||
|
|
||
|
int x_snoop_init(struct hostapd_data *hapd)
|
||
|
{
|
||
|
struct hostapd_bss_config *conf = hapd->conf;
|
||
|
|
||
|
if (!conf->isolate) {
|
||
|
wpa_printf(MSG_DEBUG,
|
||
|
"x_snoop: ap_isolate must be enabled for x_snoop");
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
if (conf->bridge[0] == '\0') {
|
||
|
wpa_printf(MSG_DEBUG,
|
||
|
"x_snoop: Bridge must be configured for x_snoop");
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
if (hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_HAIRPIN_MODE,
|
||
|
1)) {
|
||
|
wpa_printf(MSG_DEBUG,
|
||
|
"x_snoop: Failed to enable hairpin_mode on the bridge port");
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
if (hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_PROXYARP, 1)) {
|
||
|
wpa_printf(MSG_DEBUG,
|
||
|
"x_snoop: Failed to enable proxyarp on the bridge port");
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
if (hostapd_drv_br_set_net_param(hapd, DRV_BR_NET_PARAM_GARP_ACCEPT,
|
||
|
1)) {
|
||
|
wpa_printf(MSG_DEBUG,
|
||
|
"x_snoop: Failed to enable accepting gratuitous ARP on the bridge");
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
|
||
|
struct l2_packet_data *
|
||
|
x_snoop_get_l2_packet(struct hostapd_data *hapd,
|
||
|
void (*handler)(void *ctx, const u8 *src_addr,
|
||
|
const u8 *buf, size_t len),
|
||
|
enum l2_packet_filter_type type)
|
||
|
{
|
||
|
struct hostapd_bss_config *conf = hapd->conf;
|
||
|
struct l2_packet_data *l2;
|
||
|
|
||
|
l2 = l2_packet_init(conf->bridge, NULL, ETH_P_ALL, handler, hapd, 1);
|
||
|
if (l2 == NULL) {
|
||
|
wpa_printf(MSG_DEBUG,
|
||
|
"x_snoop: Failed to initialize L2 packet processing %s",
|
||
|
strerror(errno));
|
||
|
return NULL;
|
||
|
}
|
||
|
|
||
|
if (l2_packet_set_packet_filter(l2, type)) {
|
||
|
wpa_printf(MSG_DEBUG,
|
||
|
"x_snoop: Failed to set L2 packet filter for type: %d",
|
||
|
type);
|
||
|
l2_packet_deinit(l2);
|
||
|
return NULL;
|
||
|
}
|
||
|
|
||
|
return l2;
|
||
|
}
|
||
|
|
||
|
|
||
|
void x_snoop_deinit(struct hostapd_data *hapd)
|
||
|
{
|
||
|
hostapd_drv_br_set_net_param(hapd, DRV_BR_NET_PARAM_GARP_ACCEPT, 0);
|
||
|
hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_PROXYARP, 0);
|
||
|
hostapd_drv_br_port_set_attr(hapd, DRV_BR_PORT_ATTR_HAIRPIN_MODE, 0);
|
||
|
}
|