xref: /aosp_15_r20/external/iw/connect.c (revision 92022041c981f431db0b590d0c3272306d0ea2a2)
1*92022041SSam Saccone #include <errno.h>
2*92022041SSam Saccone 
3*92022041SSam Saccone #include <netlink/genl/genl.h>
4*92022041SSam Saccone #include <netlink/genl/family.h>
5*92022041SSam Saccone #include <netlink/genl/ctrl.h>
6*92022041SSam Saccone #include <netlink/msg.h>
7*92022041SSam Saccone #include <netlink/attr.h>
8*92022041SSam Saccone 
9*92022041SSam Saccone #include "nl80211.h"
10*92022041SSam Saccone #include "iw.h"
11*92022041SSam Saccone 
iw_conn(struct nl80211_state * state,struct nl_msg * msg,int argc,char ** argv,enum id_input id)12*92022041SSam Saccone static int iw_conn(struct nl80211_state *state,
13*92022041SSam Saccone 		   struct nl_msg *msg, int argc, char **argv,
14*92022041SSam Saccone 		   enum id_input id)
15*92022041SSam Saccone {
16*92022041SSam Saccone 	char *end;
17*92022041SSam Saccone 	unsigned char bssid[6];
18*92022041SSam Saccone 	bool need_key = false;
19*92022041SSam Saccone 	int freq;
20*92022041SSam Saccone 	int ret;
21*92022041SSam Saccone 
22*92022041SSam Saccone 	if (argc < 1)
23*92022041SSam Saccone 		return 1;
24*92022041SSam Saccone 
25*92022041SSam Saccone 	/* SSID */
26*92022041SSam Saccone 	NLA_PUT(msg, NL80211_ATTR_SSID, strlen(argv[0]), argv[0]);
27*92022041SSam Saccone 	argv++;
28*92022041SSam Saccone 	argc--;
29*92022041SSam Saccone 
30*92022041SSam Saccone 	/* freq */
31*92022041SSam Saccone 	if (argc) {
32*92022041SSam Saccone 		freq = strtoul(argv[0], &end, 10);
33*92022041SSam Saccone 		if (*end == '\0') {
34*92022041SSam Saccone 			NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, freq);
35*92022041SSam Saccone 			argv++;
36*92022041SSam Saccone 			argc--;
37*92022041SSam Saccone 		}
38*92022041SSam Saccone 	}
39*92022041SSam Saccone 
40*92022041SSam Saccone 	/* bssid */
41*92022041SSam Saccone 	if (argc) {
42*92022041SSam Saccone 		if (mac_addr_a2n(bssid, argv[0]) == 0) {
43*92022041SSam Saccone 			NLA_PUT(msg, NL80211_ATTR_MAC, 6, bssid);
44*92022041SSam Saccone 			argv++;
45*92022041SSam Saccone 			argc--;
46*92022041SSam Saccone 		}
47*92022041SSam Saccone 	}
48*92022041SSam Saccone 
49*92022041SSam Saccone 	if (!argc)
50*92022041SSam Saccone 		return 0;
51*92022041SSam Saccone 
52*92022041SSam Saccone 	if (strcmp(*argv, "auth") == 0) {
53*92022041SSam Saccone 		argv++;
54*92022041SSam Saccone 		argc--;
55*92022041SSam Saccone 
56*92022041SSam Saccone 		if (!argc)
57*92022041SSam Saccone 			return 1;
58*92022041SSam Saccone 
59*92022041SSam Saccone 		if (strcmp(argv[0], "open") == 0) {
60*92022041SSam Saccone 			NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE,
61*92022041SSam Saccone 			    NL80211_AUTHTYPE_OPEN_SYSTEM);
62*92022041SSam Saccone 		} else if (strcmp(argv[0], "shared") == 0) {
63*92022041SSam Saccone 			NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE,
64*92022041SSam Saccone 			    NL80211_AUTHTYPE_SHARED_KEY);
65*92022041SSam Saccone 			need_key = true;
66*92022041SSam Saccone 		} else {
67*92022041SSam Saccone 			return 1;
68*92022041SSam Saccone 		}
69*92022041SSam Saccone 
70*92022041SSam Saccone 		argv++;
71*92022041SSam Saccone 		argc--;
72*92022041SSam Saccone 	}
73*92022041SSam Saccone 
74*92022041SSam Saccone 	if (need_key && !argc)
75*92022041SSam Saccone 		return 1;
76*92022041SSam Saccone 
77*92022041SSam Saccone 	if (argc && strcmp(*argv, "key") != 0 && strcmp(*argv, "keys") != 0)
78*92022041SSam Saccone 		return 1;
79*92022041SSam Saccone 
80*92022041SSam Saccone 	argv++;
81*92022041SSam Saccone 	argc--;
82*92022041SSam Saccone 
83*92022041SSam Saccone 	ret = parse_keys(msg, &argv, &argc);
84*92022041SSam Saccone 	if (ret)
85*92022041SSam Saccone 		return ret;
86*92022041SSam Saccone 
87*92022041SSam Saccone 	if (!argc)
88*92022041SSam Saccone 		return 0;
89*92022041SSam Saccone 
90*92022041SSam Saccone 	if (!strcmp(*argv, "mfp:req"))
91*92022041SSam Saccone 		NLA_PUT_U32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED);
92*92022041SSam Saccone 	else if (!strcmp(*argv, "mfp:opt"))
93*92022041SSam Saccone 		NLA_PUT_U32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_OPTIONAL);
94*92022041SSam Saccone 	else if (!strcmp(*argv, "mfp:no"))
95*92022041SSam Saccone 		NLA_PUT_U32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_NO);
96*92022041SSam Saccone 	else
97*92022041SSam Saccone 		return -EINVAL;
98*92022041SSam Saccone 
99*92022041SSam Saccone 	return 0;
100*92022041SSam Saccone 
101*92022041SSam Saccone  nla_put_failure:
102*92022041SSam Saccone 	return -ENOSPC;
103*92022041SSam Saccone }
104*92022041SSam Saccone 
disconnect(struct nl80211_state * state,struct nl_msg * msg,int argc,char ** argv,enum id_input id)105*92022041SSam Saccone static int disconnect(struct nl80211_state *state,
106*92022041SSam Saccone 		      struct nl_msg *msg,
107*92022041SSam Saccone 		      int argc, char **argv,
108*92022041SSam Saccone 		      enum id_input id)
109*92022041SSam Saccone {
110*92022041SSam Saccone 	return 0;
111*92022041SSam Saccone }
112*92022041SSam Saccone TOPLEVEL(disconnect, NULL,
113*92022041SSam Saccone 	NL80211_CMD_DISCONNECT, 0, CIB_NETDEV, disconnect,
114*92022041SSam Saccone 	"Disconnect from the current network.");
115*92022041SSam Saccone 
iw_connect(struct nl80211_state * state,struct nl_msg * msg,int argc,char ** argv,enum id_input id)116*92022041SSam Saccone static int iw_connect(struct nl80211_state *state,
117*92022041SSam Saccone 		      struct nl_msg *msg, int argc, char **argv,
118*92022041SSam Saccone 		      enum id_input id)
119*92022041SSam Saccone {
120*92022041SSam Saccone 	char **conn_argv, *dev = argv[0];
121*92022041SSam Saccone 	static const __u32 cmds[] = {
122*92022041SSam Saccone 		NL80211_CMD_CONNECT,
123*92022041SSam Saccone 	};
124*92022041SSam Saccone 	struct print_event_args printargs = { };
125*92022041SSam Saccone 	int conn_argc, err;
126*92022041SSam Saccone 	bool wait = false;
127*92022041SSam Saccone 	int i;
128*92022041SSam Saccone 
129*92022041SSam Saccone 	/* strip "wlan0 connect" */
130*92022041SSam Saccone 	argc -= 2;
131*92022041SSam Saccone 	argv += 2;
132*92022041SSam Saccone 
133*92022041SSam Saccone 	/* check -w */
134*92022041SSam Saccone 	if (argc && strcmp(argv[0], "-w") == 0) {
135*92022041SSam Saccone 		wait = true;
136*92022041SSam Saccone 		argc--;
137*92022041SSam Saccone 		argv++;
138*92022041SSam Saccone 	}
139*92022041SSam Saccone 
140*92022041SSam Saccone 	err = __prepare_listen_events(state);
141*92022041SSam Saccone 	if (err)
142*92022041SSam Saccone 		return err;
143*92022041SSam Saccone 
144*92022041SSam Saccone 	conn_argc = 3 + argc;
145*92022041SSam Saccone 	conn_argv = calloc(conn_argc, sizeof(*conn_argv));
146*92022041SSam Saccone 	if (!conn_argv)
147*92022041SSam Saccone 		return -ENOMEM;
148*92022041SSam Saccone 
149*92022041SSam Saccone 	conn_argv[0] = dev;
150*92022041SSam Saccone 	conn_argv[1] = "connect";
151*92022041SSam Saccone 	conn_argv[2] = "establish";
152*92022041SSam Saccone 	for (i = 0; i < argc; i++)
153*92022041SSam Saccone 		conn_argv[i + 3] = argv[i];
154*92022041SSam Saccone 	err = handle_cmd(state, id, conn_argc, conn_argv);
155*92022041SSam Saccone 	free(conn_argv);
156*92022041SSam Saccone 	if (err)
157*92022041SSam Saccone 		return err;
158*92022041SSam Saccone 
159*92022041SSam Saccone 	if (!wait)
160*92022041SSam Saccone 		return 0;
161*92022041SSam Saccone 
162*92022041SSam Saccone 	/*
163*92022041SSam Saccone 	 * WARNING: DO NOT COPY THIS CODE INTO YOUR APPLICATION
164*92022041SSam Saccone 	 *
165*92022041SSam Saccone 	 * This code has a bug:
166*92022041SSam Saccone 	 *
167*92022041SSam Saccone 	 * It is possible for a connect result message from another
168*92022041SSam Saccone 	 * connect attempt to be processed here first, because we
169*92022041SSam Saccone 	 * start listening to the multicast group before starting
170*92022041SSam Saccone 	 * our own connect request, which may succeed but we get a
171*92022041SSam Saccone 	 * fail message from a previous attempt that raced with us,
172*92022041SSam Saccone 	 * or similar.
173*92022041SSam Saccone 	 *
174*92022041SSam Saccone 	 * The only proper way to fix this would be to listen to events
175*92022041SSam Saccone 	 * before sending the command, and for the kernel to send the
176*92022041SSam Saccone 	 * connect request or a cookie along with the event, so that you
177*92022041SSam Saccone 	 * can match up whether the connect _you_ requested was finished
178*92022041SSam Saccone 	 * or aborted.
179*92022041SSam Saccone 	 *
180*92022041SSam Saccone 	 * Alas, the kernel doesn't do that (yet).
181*92022041SSam Saccone 	 */
182*92022041SSam Saccone 
183*92022041SSam Saccone 	__do_listen_events(state,
184*92022041SSam Saccone 			   ARRAY_SIZE(cmds), cmds,
185*92022041SSam Saccone 			   ARRAY_SIZE(cmds), cmds,
186*92022041SSam Saccone 			   &printargs);
187*92022041SSam Saccone 	return 0;
188*92022041SSam Saccone }
189*92022041SSam Saccone TOPLEVEL(connect, "[-w] <SSID> [<freq in MHz>] [<bssid>] [auth open|shared] [key 0:abcde d:1:6162636465] [mfp:req/opt/no]",
190*92022041SSam Saccone 	0, 0, CIB_NETDEV, iw_connect,
191*92022041SSam Saccone 	"Join the network with the given SSID (and frequency, BSSID).\n"
192*92022041SSam Saccone 	"With -w, wait for the connect to finish or fail.");
193*92022041SSam Saccone HIDDEN(connect, establish, "", NL80211_CMD_CONNECT, 0, CIB_NETDEV, iw_conn);
194*92022041SSam Saccone 
iw_auth(struct nl80211_state * state,struct nl_msg * msg,int argc,char ** argv,enum id_input id)195*92022041SSam Saccone static int iw_auth(struct nl80211_state *state,
196*92022041SSam Saccone 		   struct nl_msg *msg, int argc, char **argv,
197*92022041SSam Saccone 		   enum id_input id)
198*92022041SSam Saccone {
199*92022041SSam Saccone 	char *end;
200*92022041SSam Saccone 	unsigned char bssid[6];
201*92022041SSam Saccone 	int freq;
202*92022041SSam Saccone 	bool need_key = false;
203*92022041SSam Saccone 
204*92022041SSam Saccone 	if (argc < 4)
205*92022041SSam Saccone 		return 1;
206*92022041SSam Saccone 
207*92022041SSam Saccone 	/* SSID */
208*92022041SSam Saccone 	NLA_PUT(msg, NL80211_ATTR_SSID, strlen(argv[0]), argv[0]);
209*92022041SSam Saccone 	argv++;
210*92022041SSam Saccone 	argc--;
211*92022041SSam Saccone 
212*92022041SSam Saccone 	/* bssid */
213*92022041SSam Saccone 	if (mac_addr_a2n(bssid, argv[0]) == 0) {
214*92022041SSam Saccone 		NLA_PUT(msg, NL80211_ATTR_MAC, 6, bssid);
215*92022041SSam Saccone 		argv++;
216*92022041SSam Saccone 		argc--;
217*92022041SSam Saccone 	} else {
218*92022041SSam Saccone 		return 1;
219*92022041SSam Saccone 	}
220*92022041SSam Saccone 
221*92022041SSam Saccone 	/* FIXME */
222*92022041SSam Saccone 	if (strcmp(argv[0], "open") == 0) {
223*92022041SSam Saccone 		NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE,
224*92022041SSam Saccone 			    NL80211_AUTHTYPE_OPEN_SYSTEM);
225*92022041SSam Saccone 	} else if (strcmp(argv[0], "shared") == 0) {
226*92022041SSam Saccone 		NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE,
227*92022041SSam Saccone 			    NL80211_AUTHTYPE_SHARED_KEY);
228*92022041SSam Saccone 		need_key = true;
229*92022041SSam Saccone 	} else {
230*92022041SSam Saccone 		return 1;
231*92022041SSam Saccone 	}
232*92022041SSam Saccone 	argv++;
233*92022041SSam Saccone 	argc--;
234*92022041SSam Saccone 
235*92022041SSam Saccone 	freq = strtoul(argv[0], &end, 10);
236*92022041SSam Saccone 	if (*end == '\0') {
237*92022041SSam Saccone 		NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, freq);
238*92022041SSam Saccone 		argv++;
239*92022041SSam Saccone 		argc--;
240*92022041SSam Saccone 	} else {
241*92022041SSam Saccone 		return 1;
242*92022041SSam Saccone 	}
243*92022041SSam Saccone 
244*92022041SSam Saccone 	if (!argc && need_key)
245*92022041SSam Saccone 		return 1;
246*92022041SSam Saccone 	if (argc && !need_key)
247*92022041SSam Saccone 		return 1;
248*92022041SSam Saccone 	if (!argc)
249*92022041SSam Saccone 		return 0;
250*92022041SSam Saccone 
251*92022041SSam Saccone 	if (strcmp(*argv, "key") != 0 && strcmp(*argv, "keys") != 0)
252*92022041SSam Saccone 		return 1;
253*92022041SSam Saccone 
254*92022041SSam Saccone 	argv++;
255*92022041SSam Saccone 	argc--;
256*92022041SSam Saccone 
257*92022041SSam Saccone 	return parse_keys(msg, &argv, &argc);
258*92022041SSam Saccone  nla_put_failure:
259*92022041SSam Saccone 	return -ENOSPC;
260*92022041SSam Saccone }
261*92022041SSam Saccone 
262*92022041SSam Saccone TOPLEVEL(auth, "<SSID> <bssid> <type:open|shared> <freq in MHz> [key 0:abcde d:1:6162636465]",
263*92022041SSam Saccone 	 NL80211_CMD_AUTHENTICATE, 0, CIB_NETDEV, iw_auth,
264*92022041SSam Saccone 	 "Authenticate with the given network.\n");
265