blob: 506e596aa955186e5364a2cb96419664f162e1c6 [file] [log] [blame]
/*
*
* Wireless daemon for Linux
*
* Copyright (C) 2018-2019 Intel Corporation. All rights reserved.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <linux/rtnetlink.h>
#include <linux/if.h>
#include <ell/ell.h>
#include "linux/nl80211.h"
#include "src/iwd.h"
#include "src/module.h"
#include "src/netdev.h"
#include "src/wiphy.h"
#include "src/crypto.h"
#include "src/ie.h"
#include "src/util.h"
#include "src/eapol.h"
#include "src/handshake.h"
#include "src/mpdu.h"
#include "src/dbus.h"
#include "src/nl80211util.h"
struct adhoc_state {
struct netdev *netdev;
struct l_genl_family *nl80211;
char *ssid;
uint8_t pmk[32];
struct l_queue *sta_states;
uint32_t sta_watch_id;
uint32_t netdev_watch_id;
unsigned int mlme_watch;
struct l_dbus_message *pending;
uint32_t ciphers;
uint32_t group_cipher;
uint8_t gtk[CRYPTO_MAX_GTK_LEN];
uint8_t gtk_index;
bool started : 1;
bool open : 1;
bool gtk_set : 1;
};
struct sta_state {
uint8_t addr[6];
struct adhoc_state *adhoc;
struct eapol_sm *sm;
struct handshake_state *hs_sta;
struct eapol_sm *sm_a;
struct handshake_state *hs_auth;
uint32_t gtk_query_cmd_id;
bool hs_sta_done : 1;
bool hs_auth_done : 1;
bool authenticated : 1;
};
static uint32_t netdev_watch;
static void adhoc_sta_free(void *data)
{
struct sta_state *sta = data;
if (sta->adhoc->open)
goto end;
if (sta->gtk_query_cmd_id)
l_genl_family_cancel(sta->adhoc->nl80211,
sta->gtk_query_cmd_id);
if (sta->sm)
eapol_sm_free(sta->sm);
if (sta->hs_sta)
handshake_state_free(sta->hs_sta);
if (sta->sm_a)
eapol_sm_free(sta->sm_a);
if (sta->hs_auth)
handshake_state_free(sta->hs_auth);
end:
l_free(sta);
}
static void adhoc_remove_sta(struct sta_state *sta)
{
if (!l_queue_remove(sta->adhoc->sta_states, sta)) {
l_error("station %p was not found", sta);
return;
}
if (sta->gtk_query_cmd_id) {
l_genl_family_cancel(sta->adhoc->nl80211,
sta->gtk_query_cmd_id);
sta->gtk_query_cmd_id = 0;
}
/* signal station has been removed */
if (sta->authenticated) {
l_dbus_property_changed(dbus_get_bus(),
netdev_get_path(sta->adhoc->netdev),
IWD_ADHOC_INTERFACE, "ConnectedPeers");
}
adhoc_sta_free(sta);
}
static void adhoc_reset(struct adhoc_state *adhoc)
{
if (adhoc->pending)
dbus_pending_reply(&adhoc->pending,
dbus_error_aborted(adhoc->pending));
l_free(adhoc->ssid);
adhoc->ssid = NULL;
netdev_station_watch_remove(adhoc->netdev, adhoc->sta_watch_id);
adhoc->sta_watch_id = 0;
l_queue_destroy(adhoc->sta_states, adhoc_sta_free);
adhoc->sta_states = NULL;
adhoc->started = false;
l_dbus_property_changed(dbus_get_bus(), netdev_get_path(adhoc->netdev),
IWD_ADHOC_INTERFACE, "Started");
if (adhoc->mlme_watch)
l_genl_family_unregister(adhoc->nl80211, adhoc->mlme_watch);
}
static void adhoc_set_rsn_info(struct adhoc_state *adhoc,
struct ie_rsn_info *rsn)
{
memset(rsn, 0, sizeof(*rsn));
rsn->akm_suites = IE_RSN_AKM_SUITE_PSK;
rsn->pairwise_ciphers = adhoc->ciphers;
rsn->group_cipher = adhoc->group_cipher;
}
static bool ap_sta_match_addr(const void *a, const void *b)
{
const struct sta_state *sta = a;
return !memcmp(sta->addr, b, 6);
}
static void adhoc_operstate_cb(int error, uint16_t type,
const void *data,
uint32_t len, void *user_data)
{
if (!error)
return;
l_debug("netdev: %u, error: %s", L_PTR_TO_UINT(user_data),
strerror(-error));
}
static void adhoc_handshake_event(struct handshake_state *hs,
enum handshake_event event, void *user_data, ...)
{
struct sta_state *sta = user_data;
struct adhoc_state *adhoc = sta->adhoc;
va_list args;
switch (event) {
case HANDSHAKE_EVENT_FAILED:
va_start(args, user_data);
l_error("handshake failed with STA "MAC" (%d)",
MAC_STR(sta->addr),
va_arg(args, int));
va_end(args);
/*
* eapol frees the state machines upon handshake failure. Since
* this is only a failure on one of the handshakes we need to
* set the failing SM to NULL so it will not get double freed
* by adhoc_remove_sta.
*/
if (sta->hs_auth == hs)
sta->sm_a = NULL;
else
sta->sm = NULL;
/* fall through */
case HANDSHAKE_EVENT_SETTING_KEYS_FAILED:
adhoc_remove_sta(sta);
return;
case HANDSHAKE_EVENT_COMPLETE:
if (sta->hs_auth == hs)
sta->hs_auth_done = true;
if (sta->hs_sta == hs)
sta->hs_sta_done = true;
if ((sta->hs_auth_done && sta->hs_sta_done) &&
!sta->authenticated) {
sta->authenticated = true;
l_dbus_property_changed(dbus_get_bus(),
netdev_get_path(adhoc->netdev),
IWD_ADHOC_INTERFACE, "ConnectedPeers");
}
break;
default:
break;
}
}
static struct eapol_sm *adhoc_new_sm(struct sta_state *sta, bool authenticator,
const uint8_t *gtk_rsc)
{
struct adhoc_state *adhoc = sta->adhoc;
struct netdev *netdev = adhoc->netdev;
const uint8_t *own_addr = netdev_get_address(netdev);
struct ie_rsn_info rsn;
uint8_t bss_rsne[24];
struct handshake_state *hs;
struct eapol_sm *sm;
/* fill in only what handshake setup requires */
adhoc_set_rsn_info(adhoc, &rsn);
ie_build_rsne(&rsn, bss_rsne);
hs = netdev_handshake_state_new(netdev);
if (!hs) {
l_error("could not create handshake object");
return NULL;
}
handshake_state_set_event_func(hs, adhoc_handshake_event, sta);
handshake_state_set_ssid(hs, (void *)adhoc->ssid, strlen(adhoc->ssid));
/* we don't have the connecting peer rsn info, so just set ap == own */
handshake_state_set_authenticator_ie(hs, bss_rsne);
handshake_state_set_supplicant_ie(hs, bss_rsne);
handshake_state_set_pmk(hs, adhoc->pmk, 32);
if (authenticator) {
handshake_state_set_authenticator_address(hs, own_addr);
handshake_state_set_supplicant_address(hs, sta->addr);
handshake_state_set_authenticator(hs, true);
} else {
handshake_state_set_authenticator_address(hs, sta->addr);
handshake_state_set_supplicant_address(hs, own_addr);
}
if (gtk_rsc)
handshake_state_set_gtk(hs, adhoc->gtk, adhoc->gtk_index,
gtk_rsc);
sm = eapol_sm_new(hs);
if (!sm) {
l_error("could not create sm object");
return NULL;
}
eapol_sm_set_listen_interval(sm, 100);
if (authenticator)
sta->hs_auth = hs;
else
sta->hs_sta = hs;
return sm;
}
static void adhoc_free(struct adhoc_state *adhoc)
{
adhoc_reset(adhoc);
l_genl_family_free(adhoc->nl80211);
l_free(adhoc);
}
static void adhoc_start_rsna(struct sta_state *sta, const uint8_t *gtk_rsc)
{
sta->sm_a = adhoc_new_sm(sta, true, gtk_rsc);
if (!sta->sm_a) {
l_error("could not create authenticator state machine");
goto failed;
}
sta->sm = adhoc_new_sm(sta, false, NULL);
if (!sta->sm) {
l_error("could not create station state machine");
goto failed;
}
eapol_register(sta->sm);
eapol_register(sta->sm_a);
eapol_start(sta->sm);
eapol_start(sta->sm_a);
return;
failed:
adhoc_remove_sta(sta);
}
static void adhoc_gtk_op_cb(struct l_genl_msg *msg, void *user_data)
{
if (l_genl_msg_get_error(msg) < 0) {
uint8_t cmd = l_genl_msg_get_command(msg);
const char *cmd_name =
cmd == NL80211_CMD_NEW_KEY ? "NEW_KEY" : "SET_KEY";
l_error("%s failed for the GTK: %i",
cmd_name, l_genl_msg_get_error(msg));
}
}
static void adhoc_gtk_query_cb(struct l_genl_msg *msg, void *user_data)
{
struct sta_state *sta = user_data;
const void *gtk_rsc;
sta->gtk_query_cmd_id = 0;
gtk_rsc = nl80211_parse_get_key_seq(msg);
if (!gtk_rsc)
goto error;
adhoc_start_rsna(sta, gtk_rsc);
return;
error:
adhoc_remove_sta(sta);
}
static void adhoc_new_station(struct adhoc_state *adhoc, const uint8_t *mac)
{
struct sta_state *sta;
struct l_genl_msg *msg;
sta = l_queue_find(adhoc->sta_states, ap_sta_match_addr, mac);
if (sta) {
l_warn("new station event with already connected STA");
return;
}
/*
* Follows same logic as AP. If this is the first station we create and
* set a group key. Any subsequent connections will use GET_KEY for this
* tx GTK.
*/
if (adhoc->group_cipher != IE_RSN_CIPHER_SUITE_NO_GROUP_TRAFFIC &&
!adhoc->gtk_set && !adhoc->open) {
enum crypto_cipher group_cipher =
ie_rsn_cipher_suite_to_cipher(adhoc->group_cipher);
int gtk_len = crypto_cipher_key_len(group_cipher);
/*
* Generate our GTK. Not following the example derivation
* method in 802.11-2016 section 12.7.1.4 because a simple
* l_getrandom is just as good.
*/
l_getrandom(adhoc->gtk, gtk_len);
adhoc->gtk_index = 1;
msg = nl80211_build_new_key_group(
netdev_get_ifindex(adhoc->netdev),
group_cipher, adhoc->gtk_index,
adhoc->gtk, gtk_len, NULL,
0, NULL);
if (!l_genl_family_send(adhoc->nl80211, msg, adhoc_gtk_op_cb,
NULL, NULL)) {
l_genl_msg_unref(msg);
l_error("Issuing NEW_KEY failed");
return;
}
msg = nl80211_build_set_key(netdev_get_ifindex(adhoc->netdev),
adhoc->gtk_index);
if (!l_genl_family_send(adhoc->nl80211, msg, adhoc_gtk_op_cb,
NULL, NULL)) {
l_genl_msg_unref(msg);
l_error("Issuing SET_KEY failed");
return;
}
/*
* Set the flag now because any new associating STA will
* just use NL80211_CMD_GET_KEY from now.
*/
adhoc->gtk_set = true;
}
sta = l_new(struct sta_state, 1);
memset(sta, 0, sizeof(struct sta_state));
memcpy(sta->addr, mac, 6);
sta->adhoc = adhoc;
l_queue_push_tail(adhoc->sta_states, sta);
l_info("new Station: "MAC" adhoc=%p", MAC_STR(mac), adhoc);
/* with open networks nothing else is required */
if (sta->adhoc->open) {
int ifindex = netdev_get_ifindex(adhoc->netdev);
sta->authenticated = true;
l_rtnl_set_linkmode_and_operstate(iwd_get_rtnl(), ifindex,
IF_LINK_MODE_DORMANT, IF_OPER_UP,
adhoc_operstate_cb,
L_UINT_TO_PTR(ifindex), NULL);
l_dbus_property_changed(dbus_get_bus(),
netdev_get_path(adhoc->netdev),
IWD_ADHOC_INTERFACE, "ConnectedPeers");
return;
}
if (adhoc->group_cipher == IE_RSN_CIPHER_SUITE_NO_GROUP_TRAFFIC)
adhoc_start_rsna(sta, NULL);
else {
msg = nl80211_build_get_key(netdev_get_ifindex(adhoc->netdev),
adhoc->gtk_index);
sta->gtk_query_cmd_id = l_genl_family_send(adhoc->nl80211, msg,
adhoc_gtk_query_cb,
sta, NULL);
if (!sta->gtk_query_cmd_id) {
l_genl_msg_unref(msg);
l_error("Issuing GET_KEY failed");
adhoc_remove_sta(sta);
return;
}
}
}
static void adhoc_del_station(struct adhoc_state *adhoc, const uint8_t *mac)
{
struct sta_state *sta;
sta = l_queue_find(adhoc->sta_states, ap_sta_match_addr, mac);
if (!sta) {
l_warn("could not find station "MAC" in list", MAC_STR(mac));
return;
}
l_debug("lost station "MAC, MAC_STR(mac));
adhoc_remove_sta(sta);
}
static void adhoc_station_changed_cb(struct netdev *netdev,
const uint8_t *mac, bool added, void *user_data)
{
struct adhoc_state *adhoc = user_data;
if (added)
adhoc_new_station(adhoc, mac);
else
adhoc_del_station(adhoc, mac);
}
static void adhoc_join_cb(struct netdev *netdev, int result, void *user_data)
{
struct adhoc_state *adhoc = user_data;
struct l_dbus_message *reply;
if (result < 0) {
l_error("Failed to join adhoc network, %i", result);
dbus_pending_reply(&adhoc->pending,
dbus_error_failed(adhoc->pending));
return;
}
adhoc->sta_watch_id = netdev_station_watch_add(netdev,
adhoc_station_changed_cb, adhoc);
reply = l_dbus_message_new_method_return(adhoc->pending);
dbus_pending_reply(&adhoc->pending, reply);
}
static void adhoc_mlme_notify(struct l_genl_msg *msg, void *user_data)
{
struct adhoc_state *adhoc = user_data;
uint32_t ifindex;
if (nl80211_parse_attrs(msg, NL80211_ATTR_IFINDEX, &ifindex,
NL80211_ATTR_UNSPEC) < 0 ||
ifindex != netdev_get_ifindex(adhoc->netdev))
return;
switch (l_genl_msg_get_command(msg)) {
case NL80211_CMD_JOIN_IBSS:
/*
* if watch is set the join_ibss_cb has come back. This event
* will come in for each new STA joining the IBSS so we only
* want to set it once
*/
if (adhoc->sta_watch_id && !adhoc->started) {
adhoc->started = true;
l_dbus_property_changed(dbus_get_bus(),
netdev_get_path(adhoc->netdev),
IWD_ADHOC_INTERFACE, "Started");
}
break;
}
}
static struct l_dbus_message *adhoc_dbus_start(struct l_dbus *dbus,
struct l_dbus_message *message,
void *user_data)
{
struct adhoc_state *adhoc = user_data;
struct netdev *netdev = adhoc->netdev;
struct wiphy *wiphy = netdev_get_wiphy(netdev);
const char *ssid, *wpa2_psk;
struct ie_rsn_info rsn;
struct iovec rsn_ie;
uint8_t ie_elems[32];
if (adhoc->pending)
return dbus_error_busy(message);
if (!l_dbus_message_get_arguments(message, "ss", &ssid, &wpa2_psk))
return dbus_error_invalid_args(message);
adhoc->ssid = l_strdup(ssid);
adhoc->pending = l_dbus_message_ref(message);
adhoc->sta_states = l_queue_new();
adhoc->ciphers = wiphy_select_cipher(wiphy, 0xffff);
adhoc->group_cipher = wiphy_select_cipher(wiphy, 0xffff);
adhoc_set_rsn_info(adhoc, &rsn);
ie_build_rsne(&rsn, ie_elems);
rsn_ie.iov_base = ie_elems;
rsn_ie.iov_len = ie_elems[1] + 2;
if (crypto_psk_from_passphrase(wpa2_psk, (uint8_t *) ssid,
strlen(ssid), adhoc->pmk))
return dbus_error_invalid_args(message);
if (netdev_join_adhoc(netdev, ssid, &rsn_ie, 1, true, adhoc_join_cb,
adhoc))
return dbus_error_invalid_args(message);
adhoc->mlme_watch = l_genl_family_register(adhoc->nl80211, "mlme",
adhoc_mlme_notify, adhoc, NULL);
if (!adhoc->mlme_watch)
return dbus_error_failed(message);
return NULL;
}
static struct l_dbus_message *adhoc_dbus_start_open(struct l_dbus *dbus,
struct l_dbus_message *message, void *user_data)
{
struct adhoc_state *adhoc = user_data;
struct netdev *netdev = adhoc->netdev;
const char *ssid;
struct iovec rsn_ie;
uint8_t ie_elems[10];
if (adhoc->pending)
return dbus_error_busy(message);
if (!l_dbus_message_get_arguments(message, "s", &ssid))
return dbus_error_invalid_args(message);
adhoc->ssid = l_strdup(ssid);
adhoc->pending = l_dbus_message_ref(message);
adhoc->sta_states = l_queue_new();
adhoc->open = true;
/* Mac/iPhone seem to require the extended capabilities field */
memset(ie_elems, 0, sizeof(ie_elems));
ie_elems[0] = IE_TYPE_EXTENDED_CAPABILITIES;
ie_elems[1] = 8;
rsn_ie.iov_base = ie_elems;
rsn_ie.iov_len = ie_elems[1] + 2;
if (netdev_join_adhoc(netdev, ssid, &rsn_ie, 1, false, adhoc_join_cb,
adhoc))
return dbus_error_invalid_args(message);
adhoc->mlme_watch = l_genl_family_register(adhoc->nl80211, "mlme",
adhoc_mlme_notify, adhoc, NULL);
if (!adhoc->mlme_watch)
return dbus_error_failed(message);
return NULL;
}
static void adhoc_leave_cb(struct netdev *netdev, int result, void *user_data)
{
struct adhoc_state *adhoc = user_data;
if (result < 0) {
l_error("Failed to leave adhoc network, %i", result);
dbus_pending_reply(&adhoc->pending,
dbus_error_failed(adhoc->pending));
return;
}
dbus_pending_reply(&adhoc->pending,
l_dbus_message_new_method_return(adhoc->pending));
adhoc_reset(adhoc);
}
static struct l_dbus_message *adhoc_dbus_stop(struct l_dbus *dbus,
struct l_dbus_message *message,
void *user_data)
{
struct adhoc_state *adhoc = user_data;
if (adhoc->pending)
return dbus_error_busy(message);
/* already stopped, no-op */
if (!adhoc->started)
return l_dbus_message_new_method_return(message);
if (netdev_leave_adhoc(adhoc->netdev, adhoc_leave_cb, adhoc))
return dbus_error_failed(message);
adhoc->pending = l_dbus_message_ref(message);
return NULL;
}
static void sta_append(void *data, void *user_data)
{
struct sta_state *sta = data;
struct l_dbus_message_builder *builder = user_data;
const char* macstr;
if (!sta->authenticated)
return;
macstr = util_address_to_string(sta->addr);
l_dbus_message_builder_append_basic(builder, 's', macstr);
}
static bool adhoc_property_get_peers(struct l_dbus *dbus,
struct l_dbus_message *message,
struct l_dbus_message_builder *builder,
void *user_data)
{
struct adhoc_state *adhoc = user_data;
l_dbus_message_builder_enter_array(builder, "s");
l_queue_foreach(adhoc->sta_states, sta_append, builder);
l_dbus_message_builder_leave_array(builder);
return true;
}
static bool adhoc_property_get_started(struct l_dbus *dbus,
struct l_dbus_message *message,
struct l_dbus_message_builder *builder,
void *user_data)
{
struct adhoc_state *adhoc = user_data;
bool started = adhoc->started;
l_dbus_message_builder_append_basic(builder, 'b', &started);
return true;
}
static void adhoc_setup_interface(struct l_dbus_interface *interface)
{
l_dbus_interface_method(interface, "Start", 0, adhoc_dbus_start, "",
"ss", "ssid", "wpa2_psk");
l_dbus_interface_method(interface, "Stop", 0, adhoc_dbus_stop, "", "");
l_dbus_interface_method(interface, "StartOpen", 0,
adhoc_dbus_start_open, "", "s", "ssid");
l_dbus_interface_property(interface, "ConnectedPeers", 0, "as",
adhoc_property_get_peers, NULL);
l_dbus_interface_property(interface, "Started", 0, "b",
adhoc_property_get_started, NULL);
}
static void adhoc_destroy_interface(void *user_data)
{
struct adhoc_state *adhoc = user_data;
adhoc_free(adhoc);
}
static void adhoc_add_interface(struct netdev *netdev)
{
struct adhoc_state *adhoc;
/* just allocate/set device, Start method will complete setup */
adhoc = l_new(struct adhoc_state, 1);
adhoc->netdev = netdev;
adhoc->nl80211 = l_genl_family_new(iwd_get_genl(), NL80211_GENL_NAME);
/* setup adhoc dbus interface */
l_dbus_object_add_interface(dbus_get_bus(),
netdev_get_path(netdev), IWD_ADHOC_INTERFACE, adhoc);
}
static void adhoc_remove_interface(struct netdev *netdev)
{
l_dbus_object_remove_interface(dbus_get_bus(),
netdev_get_path(netdev), IWD_ADHOC_INTERFACE);
}
static void adhoc_netdev_watch(struct netdev *netdev,
enum netdev_watch_event event, void *userdata)
{
switch (event) {
case NETDEV_WATCH_EVENT_UP:
case NETDEV_WATCH_EVENT_NEW:
if (netdev_get_iftype(netdev) == NETDEV_IFTYPE_ADHOC &&
netdev_get_is_up(netdev))
adhoc_add_interface(netdev);
break;
case NETDEV_WATCH_EVENT_DOWN:
case NETDEV_WATCH_EVENT_DEL:
adhoc_remove_interface(netdev);
break;
default:
break;
}
}
static int adhoc_init(void)
{
netdev_watch = netdev_watch_add(adhoc_netdev_watch, NULL, NULL);
l_dbus_register_interface(dbus_get_bus(), IWD_ADHOC_INTERFACE,
adhoc_setup_interface, adhoc_destroy_interface, false);
return 0;
}
static void adhoc_exit(void)
{
netdev_watch_remove(netdev_watch);
l_dbus_unregister_interface(dbus_get_bus(), IWD_ADHOC_INTERFACE);
}
IWD_MODULE(adhoc, adhoc_init, adhoc_exit)
IWD_MODULE_DEPENDS(adhoc, netdev);