mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-29 10:48:22 -05:00
1057d78eb8
This code can be shared by both hostapd and wpa_supplicant and this is an initial step in getting the generic code moved to be under the src directories. Couple of generic files still remain under the hostapd directory due to direct dependencies to files there. Once the dependencies have been removed, they will also be moved to the src/ap directory to allow wpa_supplicant to be built without requiring anything from the hostapd directory.
368 lines
10 KiB
C
368 lines
10 KiB
C
/*
|
|
* hostapd - Driver operations
|
|
* Copyright (c) 2009, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* Alternatively, this software may be distributed under the terms of BSD
|
|
* license.
|
|
*
|
|
* See README and COPYING for more details.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#include "common.h"
|
|
#include "ap/hostapd.h"
|
|
#include "ap/ieee802_11.h"
|
|
#include "ap/sta_info.h"
|
|
#include "driver_i.h"
|
|
|
|
|
|
static int hostapd_sta_flags_to_drv(int flags)
|
|
{
|
|
int res = 0;
|
|
if (flags & WLAN_STA_AUTHORIZED)
|
|
res |= WPA_STA_AUTHORIZED;
|
|
if (flags & WLAN_STA_WMM)
|
|
res |= WPA_STA_WMM;
|
|
if (flags & WLAN_STA_SHORT_PREAMBLE)
|
|
res |= WPA_STA_SHORT_PREAMBLE;
|
|
if (flags & WLAN_STA_MFP)
|
|
res |= WPA_STA_MFP;
|
|
return res;
|
|
}
|
|
|
|
|
|
static int hostapd_set_ap_wps_ie(struct hostapd_data *hapd,
|
|
const struct wpabuf *beacon,
|
|
const struct wpabuf *proberesp)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL)
|
|
return 0;
|
|
return hapd->driver->set_ap_wps_ie(hapd->conf->iface, hapd->drv_priv,
|
|
beacon, proberesp);
|
|
}
|
|
|
|
|
|
static int hostapd_send_mgmt_frame(struct hostapd_data *hapd, const void *msg,
|
|
size_t len)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->send_mlme == NULL)
|
|
return 0;
|
|
return hapd->driver->send_mlme(hapd->drv_priv, msg, len);
|
|
}
|
|
|
|
|
|
static int hostapd_send_eapol(struct hostapd_data *hapd, const u8 *addr,
|
|
const u8 *data, size_t data_len, int encrypt)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->hapd_send_eapol == NULL)
|
|
return 0;
|
|
return hapd->driver->hapd_send_eapol(hapd->drv_priv, addr, data,
|
|
data_len, encrypt,
|
|
hapd->own_addr);
|
|
}
|
|
|
|
|
|
static int hostapd_set_authorized(struct hostapd_data *hapd,
|
|
struct sta_info *sta, int authorized)
|
|
{
|
|
if (authorized) {
|
|
return hostapd_sta_set_flags(hapd, sta->addr,
|
|
hostapd_sta_flags_to_drv(
|
|
sta->flags),
|
|
WPA_STA_AUTHORIZED, ~0);
|
|
}
|
|
|
|
return hostapd_sta_set_flags(hapd, sta->addr,
|
|
hostapd_sta_flags_to_drv(sta->flags),
|
|
0, ~WPA_STA_AUTHORIZED);
|
|
}
|
|
|
|
|
|
static int hostapd_set_key(const char *ifname, struct hostapd_data *hapd,
|
|
wpa_alg alg, const u8 *addr, int key_idx,
|
|
int set_tx, const u8 *seq, size_t seq_len,
|
|
const u8 *key, size_t key_len)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_key == NULL)
|
|
return 0;
|
|
return hapd->driver->set_key(ifname, hapd->drv_priv, alg, addr,
|
|
key_idx, set_tx, seq, seq_len, key,
|
|
key_len);
|
|
}
|
|
|
|
|
|
static int hostapd_read_sta_data(struct hostapd_data *hapd,
|
|
struct hostap_sta_driver_data *data,
|
|
const u8 *addr)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->read_sta_data == NULL)
|
|
return -1;
|
|
return hapd->driver->read_sta_data(hapd->drv_priv, data, addr);
|
|
}
|
|
|
|
|
|
static int hostapd_sta_clear_stats(struct hostapd_data *hapd, const u8 *addr)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->sta_clear_stats == NULL)
|
|
return 0;
|
|
return hapd->driver->sta_clear_stats(hapd->drv_priv, addr);
|
|
}
|
|
|
|
|
|
static int hostapd_set_sta_flags(struct hostapd_data *hapd,
|
|
struct sta_info *sta)
|
|
{
|
|
int set_flags, total_flags, flags_and, flags_or;
|
|
total_flags = hostapd_sta_flags_to_drv(sta->flags);
|
|
set_flags = WPA_STA_SHORT_PREAMBLE | WPA_STA_WMM | WPA_STA_MFP;
|
|
if (!hapd->conf->ieee802_1x && !hapd->conf->wpa &&
|
|
sta->flags & WLAN_STA_AUTHORIZED)
|
|
set_flags |= WPA_STA_AUTHORIZED;
|
|
flags_or = total_flags & set_flags;
|
|
flags_and = total_flags | ~set_flags;
|
|
return hostapd_sta_set_flags(hapd, sta->addr, total_flags,
|
|
flags_or, flags_and);
|
|
}
|
|
|
|
|
|
static int hostapd_set_drv_ieee8021x(struct hostapd_data *hapd,
|
|
const char *ifname, int enabled)
|
|
{
|
|
struct wpa_bss_params params;
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
params.ifname = ifname;
|
|
params.enabled = enabled;
|
|
if (enabled) {
|
|
params.wpa = hapd->conf->wpa;
|
|
params.ieee802_1x = hapd->conf->ieee802_1x;
|
|
params.wpa_group = hapd->conf->wpa_group;
|
|
params.wpa_pairwise = hapd->conf->wpa_pairwise;
|
|
params.wpa_key_mgmt = hapd->conf->wpa_key_mgmt;
|
|
params.rsn_preauth = hapd->conf->rsn_preauth;
|
|
}
|
|
return hostapd_set_ieee8021x(hapd, ¶ms);
|
|
}
|
|
|
|
|
|
static int hostapd_set_radius_acl_auth(struct hostapd_data *hapd,
|
|
const u8 *mac, int accepted,
|
|
u32 session_timeout)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_radius_acl_auth == NULL)
|
|
return 0;
|
|
return hapd->driver->set_radius_acl_auth(hapd->drv_priv, mac, accepted,
|
|
session_timeout);
|
|
}
|
|
|
|
|
|
static int hostapd_set_radius_acl_expire(struct hostapd_data *hapd,
|
|
const u8 *mac)
|
|
{
|
|
if (hapd->driver == NULL ||
|
|
hapd->driver->set_radius_acl_expire == NULL)
|
|
return 0;
|
|
return hapd->driver->set_radius_acl_expire(hapd->drv_priv, mac);
|
|
}
|
|
|
|
|
|
static int hostapd_set_bss_params(struct hostapd_data *hapd,
|
|
int use_protection)
|
|
{
|
|
int ret = 0;
|
|
int preamble;
|
|
#ifdef CONFIG_IEEE80211N
|
|
u8 buf[60], *ht_capab, *ht_oper, *pos;
|
|
|
|
pos = buf;
|
|
ht_capab = pos;
|
|
pos = hostapd_eid_ht_capabilities(hapd, pos);
|
|
ht_oper = pos;
|
|
pos = hostapd_eid_ht_operation(hapd, pos);
|
|
if (pos > ht_oper && ht_oper > ht_capab &&
|
|
hostapd_set_ht_params(hapd->conf->iface, hapd,
|
|
ht_capab + 2, ht_capab[1],
|
|
ht_oper + 2, ht_oper[1])) {
|
|
wpa_printf(MSG_ERROR, "Could not set HT capabilities "
|
|
"for kernel driver");
|
|
ret = -1;
|
|
}
|
|
|
|
#endif /* CONFIG_IEEE80211N */
|
|
|
|
if (hostapd_set_cts_protect(hapd, use_protection)) {
|
|
wpa_printf(MSG_ERROR, "Failed to set CTS protect in kernel "
|
|
"driver");
|
|
ret = -1;
|
|
}
|
|
|
|
if (hapd->iface->current_mode &&
|
|
hapd->iface->current_mode->mode == HOSTAPD_MODE_IEEE80211G &&
|
|
hostapd_set_short_slot_time(hapd,
|
|
hapd->iface->num_sta_no_short_slot_time
|
|
> 0 ? 0 : 1)) {
|
|
wpa_printf(MSG_ERROR, "Failed to set Short Slot Time option "
|
|
"in kernel driver");
|
|
ret = -1;
|
|
}
|
|
|
|
if (hapd->iface->num_sta_no_short_preamble == 0 &&
|
|
hapd->iconf->preamble == SHORT_PREAMBLE)
|
|
preamble = SHORT_PREAMBLE;
|
|
else
|
|
preamble = LONG_PREAMBLE;
|
|
if (hostapd_set_preamble(hapd, preamble)) {
|
|
wpa_printf(MSG_ERROR, "Could not set preamble for kernel "
|
|
"driver");
|
|
ret = -1;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int hostapd_set_beacon(const char *ifname, struct hostapd_data *hapd,
|
|
const u8 *head, size_t head_len,
|
|
const u8 *tail, size_t tail_len, int dtim_period,
|
|
int beacon_int)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_beacon == NULL)
|
|
return 0;
|
|
return hapd->driver->set_beacon(ifname, hapd->drv_priv,
|
|
head, head_len, tail, tail_len,
|
|
dtim_period, beacon_int);
|
|
}
|
|
|
|
|
|
static int hostapd_vlan_if_add(struct hostapd_data *hapd, const char *ifname)
|
|
{
|
|
return hostapd_if_add(hapd, WPA_IF_AP_VLAN, ifname, NULL, NULL);
|
|
}
|
|
|
|
static int hostapd_vlan_if_remove(struct hostapd_data *hapd,
|
|
const char *ifname)
|
|
{
|
|
return hostapd_if_remove(hapd, WPA_IF_AP_VLAN, ifname);
|
|
}
|
|
|
|
|
|
static int hostapd_set_wds_sta(struct hostapd_data *hapd, const u8 *addr,
|
|
int aid, int val)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_wds_sta == NULL)
|
|
return 0;
|
|
return hapd->driver->set_wds_sta(hapd->drv_priv, addr, aid, val);
|
|
}
|
|
|
|
|
|
static int hostapd_set_sta_vlan(const char *ifname, struct hostapd_data *hapd,
|
|
const u8 *addr, int vlan_id)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_sta_vlan == NULL)
|
|
return 0;
|
|
return hapd->driver->set_sta_vlan(hapd->drv_priv, addr, ifname,
|
|
vlan_id);
|
|
}
|
|
|
|
|
|
static int hostapd_get_inact_sec(struct hostapd_data *hapd, const u8 *addr)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->get_inact_sec == NULL)
|
|
return 0;
|
|
return hapd->driver->get_inact_sec(hapd->drv_priv, addr);
|
|
}
|
|
|
|
|
|
static int hostapd_sta_deauth(struct hostapd_data *hapd, const u8 *addr,
|
|
int reason)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->sta_deauth == NULL)
|
|
return 0;
|
|
return hapd->driver->sta_deauth(hapd->drv_priv, hapd->own_addr, addr,
|
|
reason);
|
|
}
|
|
|
|
|
|
static int hostapd_sta_disassoc(struct hostapd_data *hapd, const u8 *addr,
|
|
int reason)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->sta_disassoc == NULL)
|
|
return 0;
|
|
return hapd->driver->sta_disassoc(hapd->drv_priv, hapd->own_addr, addr,
|
|
reason);
|
|
}
|
|
|
|
|
|
static int hostapd_sta_add(const char *ifname, struct hostapd_data *hapd,
|
|
const u8 *addr, u16 aid, u16 capability,
|
|
const u8 *supp_rates, size_t supp_rates_len,
|
|
u16 listen_interval,
|
|
const struct ieee80211_ht_capabilities *ht_capab)
|
|
{
|
|
struct hostapd_sta_add_params params;
|
|
|
|
if (hapd->driver == NULL)
|
|
return 0;
|
|
if (hapd->driver->sta_add == NULL)
|
|
return 0;
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
params.addr = addr;
|
|
params.aid = aid;
|
|
params.capability = capability;
|
|
params.supp_rates = supp_rates;
|
|
params.supp_rates_len = supp_rates_len;
|
|
params.listen_interval = listen_interval;
|
|
params.ht_capabilities = ht_capab;
|
|
return hapd->driver->sta_add(ifname, hapd->drv_priv, ¶ms);
|
|
}
|
|
|
|
|
|
static int hostapd_sta_remove(struct hostapd_data *hapd, const u8 *addr)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->sta_remove == NULL)
|
|
return 0;
|
|
return hapd->driver->sta_remove(hapd->drv_priv, addr);
|
|
}
|
|
|
|
|
|
static int hostapd_set_countermeasures(struct hostapd_data *hapd, int enabled)
|
|
{
|
|
if (hapd->driver == NULL ||
|
|
hapd->driver->hapd_set_countermeasures == NULL)
|
|
return 0;
|
|
return hapd->driver->hapd_set_countermeasures(hapd->drv_priv, enabled);
|
|
}
|
|
|
|
|
|
void hostapd_set_driver_ops(struct hostapd_driver_ops *ops)
|
|
{
|
|
ops->set_ap_wps_ie = hostapd_set_ap_wps_ie;
|
|
ops->send_mgmt_frame = hostapd_send_mgmt_frame;
|
|
ops->send_eapol = hostapd_send_eapol;
|
|
ops->set_authorized = hostapd_set_authorized;
|
|
ops->set_key = hostapd_set_key;
|
|
ops->read_sta_data = hostapd_read_sta_data;
|
|
ops->sta_clear_stats = hostapd_sta_clear_stats;
|
|
ops->set_sta_flags = hostapd_set_sta_flags;
|
|
ops->set_drv_ieee8021x = hostapd_set_drv_ieee8021x;
|
|
ops->set_radius_acl_auth = hostapd_set_radius_acl_auth;
|
|
ops->set_radius_acl_expire = hostapd_set_radius_acl_expire;
|
|
ops->set_bss_params = hostapd_set_bss_params;
|
|
ops->set_beacon = hostapd_set_beacon;
|
|
ops->vlan_if_add = hostapd_vlan_if_add;
|
|
ops->vlan_if_remove = hostapd_vlan_if_remove;
|
|
ops->set_wds_sta = hostapd_set_wds_sta;
|
|
ops->set_sta_vlan = hostapd_set_sta_vlan;
|
|
ops->get_inact_sec = hostapd_get_inact_sec;
|
|
ops->sta_deauth = hostapd_sta_deauth;
|
|
ops->sta_disassoc = hostapd_sta_disassoc;
|
|
ops->sta_add = hostapd_sta_add;
|
|
ops->sta_remove = hostapd_sta_remove;
|
|
ops->set_countermeasures = hostapd_set_countermeasures;
|
|
}
|