2020-09-29 16:42:22 +02:00
|
|
|
/* SPDX-License-Identifier: LGPL-2.1+ */
|
2014-07-24 08:53:33 -04:00
|
|
|
/*
|
2019-10-01 09:20:35 +02:00
|
|
|
* Copyright (C) 2007 - 2014 Red Hat, Inc.
|
|
|
|
|
* Copyright (C) 2007 - 2008 Novell, Inc.
|
2014-07-24 08:53:33 -04:00
|
|
|
*/
|
|
|
|
|
|
2016-02-19 14:57:48 +01:00
|
|
|
#include "nm-default.h"
|
2014-11-13 10:07:02 -05:00
|
|
|
|
device: extend MAC address handling including randomization for ethernet and wifi
Extend the "ethernet.cloned-mac-address" and "wifi.cloned-mac-address"
settings. Instead of specifying an explicit MAC address, the additional
special values "permanent", "preserve", "random", "random-bia", "stable" and
"stable-bia" are supported.
"permanent" means to use the permanent hardware address. Previously that
was the default if no explict cloned-mac-address was set. The default is
thus still "permanent", but it can be overwritten by global
configuration.
"preserve" means not to configure the MAC address when activating the
device. That was actually the default behavior before introducing MAC
address handling with commit 1b49f941a69af910b0e68530be7339e8053068e5.
"random" and "random-bia" use a randomized MAC address for each
connection. "stable" and "stable-bia" use a generated, stable
address based on some token. The "bia" suffix says to generate a
burned-in address. The stable method by default uses as token the
connection UUID, but the token can be explicitly choosen via
"stable:<TOKEN>" and "stable-bia:<TOKEN>".
On a D-Bus level, the "cloned-mac-address" is a bytestring and thus
cannot express the new forms. It is replaced by the new
"assigned-mac-address" field. For the GObject property, libnm's API,
nmcli, keyfile, etc. the old name "cloned-mac-address" is still used.
Deprecating the old field seems more complicated then just extending
the use of the existing "cloned-mac-address" field, although the name
doesn't match well with the extended meaning.
There is some overlap with the "wifi.mac-address-randomization" setting.
https://bugzilla.gnome.org/show_bug.cgi?id=705545
https://bugzilla.gnome.org/show_bug.cgi?id=708820
https://bugzilla.gnome.org/show_bug.cgi?id=758301
2016-05-24 15:57:16 +02:00
|
|
|
#include "nm-setting-wireless.h"
|
|
|
|
|
|
2014-07-24 08:53:33 -04:00
|
|
|
#include <net/ethernet.h>
|
|
|
|
|
|
|
|
|
|
#include "nm-utils.h"
|
shared: build helper "libnm-libnm-core-{intern|aux}.la" library for libnm-core
"libnm-core" implements common functionality for "NetworkManager" and
"libnm".
Note that clients like "nmcli" cannot access the internal API provided
by "libnm-core". So, if nmcli wants to do something that is also done by
"libnm-core", , "libnm", or "NetworkManager", the code would have to be
duplicated.
Instead, such code can be in "libnm-libnm-core-{intern|aux}.la".
Note that:
0) "libnm-libnm-core-intern.la" is used by libnm-core itsself.
On the other hand, "libnm-libnm-core-aux.la" is not used by
libnm-core, but provides utilities on top of it.
1) they both extend "libnm-core" with utlities that are not public
API of libnm itself. Maybe part of the code should one day become
public API of libnm. On the other hand, this is code for which
we may not want to commit to a stable interface or which we
don't want to provide as part of the API.
2) "libnm-libnm-core-intern.la" is statically linked by "libnm-core"
and thus directly available to "libnm" and "NetworkManager".
On the other hand, "libnm-libnm-core-aux.la" may be used by "libnm"
and "NetworkManager".
Both libraries may be statically linked by libnm clients (like
nmcli).
3) it must only use glib, libnm-glib-aux.la, and the public API
of libnm-core.
This is important: it must not use "libnm-core/nm-core-internal.h"
nor "libnm-core/nm-utils-private.h" so the static library is usable
by nmcli which couldn't access these.
Note that "shared/nm-meta-setting.c" is an entirely different case,
because it behaves differently depending on whether linking against
"libnm-core" or the client programs. As such, this file must be compiled
twice.
(cherry picked from commit af07ed01c04867e281cc3982a7ab0d244d4f8e2e)
2019-04-15 09:26:53 +02:00
|
|
|
#include "nm-libnm-core-intern/nm-common-macros.h"
|
2014-07-24 08:53:33 -04:00
|
|
|
#include "nm-utils-private.h"
|
|
|
|
|
#include "nm-setting-private.h"
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* SECTION:nm-setting-wireless
|
|
|
|
|
* @short_description: Describes connection properties for 802.11 Wi-Fi networks
|
|
|
|
|
*
|
|
|
|
|
* The #NMSettingWireless object is a #NMSetting subclass that describes properties
|
|
|
|
|
* necessary for connection to 802.11 Wi-Fi networks.
|
|
|
|
|
**/
|
|
|
|
|
|
2019-01-11 08:32:54 +01:00
|
|
|
/*****************************************************************************/
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
NM_GOBJECT_PROPERTIES_DEFINE(NMSettingWireless,
|
|
|
|
|
PROP_SSID,
|
|
|
|
|
PROP_MODE,
|
|
|
|
|
PROP_BAND,
|
|
|
|
|
PROP_CHANNEL,
|
|
|
|
|
PROP_BSSID,
|
|
|
|
|
PROP_RATE,
|
|
|
|
|
PROP_TX_POWER,
|
|
|
|
|
PROP_MAC_ADDRESS,
|
|
|
|
|
PROP_CLONED_MAC_ADDRESS,
|
|
|
|
|
PROP_GENERATE_MAC_ADDRESS_MASK,
|
|
|
|
|
PROP_MAC_ADDRESS_BLACKLIST,
|
|
|
|
|
PROP_MTU,
|
|
|
|
|
PROP_SEEN_BSSIDS,
|
|
|
|
|
PROP_HIDDEN,
|
|
|
|
|
PROP_POWERSAVE,
|
|
|
|
|
PROP_MAC_ADDRESS_RANDOMIZATION,
|
|
|
|
|
PROP_WAKE_ON_WLAN,
|
|
|
|
|
PROP_AP_ISOLATION, );
|
2014-07-24 08:53:33 -04:00
|
|
|
|
|
|
|
|
typedef struct {
|
2020-09-28 16:03:33 +02:00
|
|
|
GBytes * ssid;
|
|
|
|
|
GArray * mac_address_blacklist;
|
|
|
|
|
GPtrArray * seen_bssids;
|
|
|
|
|
char * mode;
|
|
|
|
|
char * band;
|
|
|
|
|
char * bssid;
|
|
|
|
|
char * device_mac_address;
|
|
|
|
|
char * cloned_mac_address;
|
|
|
|
|
char * generate_mac_address_mask;
|
|
|
|
|
NMSettingMacRandomization mac_address_randomization;
|
|
|
|
|
NMTernary ap_isolation;
|
|
|
|
|
guint32 channel;
|
|
|
|
|
guint32 rate;
|
|
|
|
|
guint32 tx_power;
|
|
|
|
|
guint32 mtu;
|
|
|
|
|
guint32 powersave;
|
|
|
|
|
guint32 wowl;
|
|
|
|
|
bool hidden : 1;
|
2014-07-24 08:53:33 -04:00
|
|
|
} NMSettingWirelessPrivate;
|
|
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
G_DEFINE_TYPE(NMSettingWireless, nm_setting_wireless, NM_TYPE_SETTING)
|
2019-01-11 08:32:54 +01:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
#define NM_SETTING_WIRELESS_GET_PRIVATE(o) \
|
|
|
|
|
(G_TYPE_INSTANCE_GET_PRIVATE((o), NM_TYPE_SETTING_WIRELESS, NMSettingWirelessPrivate))
|
2019-01-11 08:32:54 +01:00
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
2014-07-24 08:53:33 -04:00
|
|
|
|
|
|
|
|
static gboolean
|
2020-09-28 16:03:33 +02:00
|
|
|
match_cipher(const char *cipher,
|
|
|
|
|
const char *expected,
|
|
|
|
|
guint32 wpa_flags,
|
|
|
|
|
guint32 rsn_flags,
|
|
|
|
|
guint32 flag)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
if (strcmp(cipher, expected) != 0)
|
|
|
|
|
return FALSE;
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
if (!(wpa_flags & flag) && !(rsn_flags & flag))
|
|
|
|
|
return FALSE;
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return TRUE;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_ap_security_compatible:
|
|
|
|
|
* @s_wireless: a #NMSettingWireless
|
|
|
|
|
* @s_wireless_sec: a #NMSettingWirelessSecurity or %NULL
|
|
|
|
|
* @ap_flags: the %NM80211ApFlags of the given access point
|
|
|
|
|
* @ap_wpa: the %NM80211ApSecurityFlags of the given access point's WPA
|
|
|
|
|
* capabilities
|
|
|
|
|
* @ap_rsn: the %NM80211ApSecurityFlags of the given access point's WPA2/RSN
|
|
|
|
|
* capabilities
|
|
|
|
|
* @ap_mode: the 802.11 mode of the AP, either Ad-Hoc or Infrastructure
|
|
|
|
|
*
|
|
|
|
|
* Given a #NMSettingWireless and an optional #NMSettingWirelessSecurity,
|
|
|
|
|
* determine if the configuration given by the settings is compatible with
|
|
|
|
|
* the security of an access point using that access point's capability flags
|
|
|
|
|
* and mode. Useful for clients that wish to filter a set of connections
|
|
|
|
|
* against a set of access points and determine which connections are
|
|
|
|
|
* compatible with which access points.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if the given settings are compatible with the access point's
|
|
|
|
|
* security flags and mode, %FALSE if they are not.
|
|
|
|
|
*/
|
|
|
|
|
gboolean
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_ap_security_compatible(NMSettingWireless * s_wireless,
|
|
|
|
|
NMSettingWirelessSecurity *s_wireless_sec,
|
|
|
|
|
NM80211ApFlags ap_flags,
|
|
|
|
|
NM80211ApSecurityFlags ap_wpa,
|
|
|
|
|
NM80211ApSecurityFlags ap_rsn,
|
|
|
|
|
NM80211Mode ap_mode)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
const char *key_mgmt = NULL, *cipher;
|
|
|
|
|
guint32 num, i;
|
|
|
|
|
gboolean found = FALSE;
|
|
|
|
|
|
|
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(s_wireless), FALSE);
|
|
|
|
|
|
|
|
|
|
if (!s_wireless_sec) {
|
|
|
|
|
if ((ap_flags & NM_802_11_AP_FLAGS_PRIVACY) || (ap_wpa != NM_802_11_AP_SEC_NONE)
|
|
|
|
|
|| (ap_rsn != NM_802_11_AP_SEC_NONE))
|
|
|
|
|
return FALSE;
|
|
|
|
|
return TRUE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
key_mgmt = nm_setting_wireless_security_get_key_mgmt(s_wireless_sec);
|
|
|
|
|
if (!key_mgmt)
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
/* Static WEP */
|
|
|
|
|
if (!strcmp(key_mgmt, "none")) {
|
|
|
|
|
if (!(ap_flags & NM_802_11_AP_FLAGS_PRIVACY) || (ap_wpa != NM_802_11_AP_SEC_NONE)
|
|
|
|
|
|| (ap_rsn != NM_802_11_AP_SEC_NONE))
|
|
|
|
|
return FALSE;
|
|
|
|
|
return TRUE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Adhoc WPA2 (ie, RSN IBSS) */
|
|
|
|
|
if (ap_mode == NM_802_11_MODE_ADHOC) {
|
|
|
|
|
if (strcmp(key_mgmt, "wpa-psk"))
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
/* Ensure the AP has RSN PSK capability */
|
|
|
|
|
if (!(ap_rsn & NM_802_11_AP_SEC_KEY_MGMT_PSK))
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
/* Fall through and check ciphers in generic WPA-PSK code */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Dynamic WEP or LEAP */
|
|
|
|
|
if (!strcmp(key_mgmt, "ieee8021x")) {
|
|
|
|
|
if (!(ap_flags & NM_802_11_AP_FLAGS_PRIVACY))
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
/* If the AP is advertising a WPA IE, make sure it supports WEP ciphers */
|
|
|
|
|
if (ap_wpa != NM_802_11_AP_SEC_NONE) {
|
|
|
|
|
if (!(ap_wpa & NM_802_11_AP_SEC_KEY_MGMT_802_1X))
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
/* quick check; can't use AP if it doesn't support at least one
|
2020-09-28 14:50:01 +02:00
|
|
|
* WEP cipher in both pairwise and group suites.
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
if (!(ap_wpa & (NM_802_11_AP_SEC_PAIR_WEP40 | NM_802_11_AP_SEC_PAIR_WEP104))
|
|
|
|
|
|| !(ap_wpa & (NM_802_11_AP_SEC_GROUP_WEP40 | NM_802_11_AP_SEC_GROUP_WEP104)))
|
|
|
|
|
return FALSE;
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
/* Match at least one pairwise cipher with AP's capability if the
|
2020-09-28 14:50:01 +02:00
|
|
|
* wireless-security setting explicitly lists pairwise ciphers
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
num = nm_setting_wireless_security_get_num_pairwise(s_wireless_sec);
|
|
|
|
|
for (i = 0, found = FALSE; i < num; i++) {
|
|
|
|
|
cipher = nm_setting_wireless_security_get_pairwise(s_wireless_sec, i);
|
|
|
|
|
if ((found = match_cipher(cipher,
|
|
|
|
|
"wep40",
|
|
|
|
|
ap_wpa,
|
|
|
|
|
ap_wpa,
|
|
|
|
|
NM_802_11_AP_SEC_PAIR_WEP40)))
|
|
|
|
|
break;
|
|
|
|
|
if ((found = match_cipher(cipher,
|
|
|
|
|
"wep104",
|
|
|
|
|
ap_wpa,
|
|
|
|
|
ap_wpa,
|
|
|
|
|
NM_802_11_AP_SEC_PAIR_WEP104)))
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
if (!found && num)
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
/* Match at least one group cipher with AP's capability if the
|
2020-09-28 14:50:01 +02:00
|
|
|
* wireless-security setting explicitly lists group ciphers
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
num = nm_setting_wireless_security_get_num_groups(s_wireless_sec);
|
|
|
|
|
for (i = 0, found = FALSE; i < num; i++) {
|
|
|
|
|
cipher = nm_setting_wireless_security_get_group(s_wireless_sec, i);
|
|
|
|
|
if ((found = match_cipher(cipher,
|
|
|
|
|
"wep40",
|
|
|
|
|
ap_wpa,
|
|
|
|
|
ap_wpa,
|
|
|
|
|
NM_802_11_AP_SEC_GROUP_WEP40)))
|
|
|
|
|
break;
|
|
|
|
|
if ((found = match_cipher(cipher,
|
|
|
|
|
"wep104",
|
|
|
|
|
ap_wpa,
|
|
|
|
|
ap_wpa,
|
|
|
|
|
NM_802_11_AP_SEC_GROUP_WEP104)))
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
if (!found && num)
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
return TRUE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* WPA[2]-PSK and WPA[2] Enterprise */
|
|
|
|
|
if (!strcmp(key_mgmt, "wpa-psk") || !strcmp(key_mgmt, "wpa-eap") || !strcmp(key_mgmt, "sae")
|
|
|
|
|
|| !strcmp(key_mgmt, "owe")) {
|
|
|
|
|
if (!strcmp(key_mgmt, "wpa-psk")) {
|
|
|
|
|
if (!(ap_wpa & NM_802_11_AP_SEC_KEY_MGMT_PSK)
|
|
|
|
|
&& !(ap_rsn & NM_802_11_AP_SEC_KEY_MGMT_PSK))
|
|
|
|
|
return FALSE;
|
|
|
|
|
} else if (!strcmp(key_mgmt, "wpa-eap")) {
|
|
|
|
|
if (!(ap_wpa & NM_802_11_AP_SEC_KEY_MGMT_802_1X)
|
|
|
|
|
&& !(ap_rsn & NM_802_11_AP_SEC_KEY_MGMT_802_1X))
|
|
|
|
|
return FALSE;
|
|
|
|
|
} else if (!strcmp(key_mgmt, "sae")) {
|
|
|
|
|
if (!(ap_wpa & NM_802_11_AP_SEC_KEY_MGMT_SAE)
|
|
|
|
|
&& !(ap_rsn & NM_802_11_AP_SEC_KEY_MGMT_SAE))
|
|
|
|
|
return FALSE;
|
|
|
|
|
} else if (!strcmp(key_mgmt, "owe")) {
|
|
|
|
|
if (!NM_FLAGS_ANY(ap_wpa,
|
|
|
|
|
NM_802_11_AP_SEC_KEY_MGMT_OWE | NM_802_11_AP_SEC_KEY_MGMT_OWE_TM)
|
|
|
|
|
&& !NM_FLAGS_ANY(ap_rsn,
|
|
|
|
|
NM_802_11_AP_SEC_KEY_MGMT_OWE | NM_802_11_AP_SEC_KEY_MGMT_OWE_TM))
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// FIXME: should handle WPA and RSN separately here to ensure that
|
|
|
|
|
// if the Connection only uses WPA we don't match a cipher against
|
|
|
|
|
// the AP's RSN IE instead
|
|
|
|
|
|
|
|
|
|
/* Match at least one pairwise cipher with AP's capability if the
|
2020-09-28 14:50:01 +02:00
|
|
|
* wireless-security setting explicitly lists pairwise ciphers
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
num = nm_setting_wireless_security_get_num_pairwise(s_wireless_sec);
|
|
|
|
|
for (i = 0, found = FALSE; i < num; i++) {
|
|
|
|
|
cipher = nm_setting_wireless_security_get_pairwise(s_wireless_sec, i);
|
|
|
|
|
if ((found = match_cipher(cipher, "tkip", ap_wpa, ap_rsn, NM_802_11_AP_SEC_PAIR_TKIP)))
|
|
|
|
|
break;
|
|
|
|
|
if ((found = match_cipher(cipher, "ccmp", ap_wpa, ap_rsn, NM_802_11_AP_SEC_PAIR_CCMP)))
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
if (!found && num)
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
/* Match at least one group cipher with AP's capability if the
|
2020-09-28 14:50:01 +02:00
|
|
|
* wireless-security setting explicitly lists group ciphers
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
num = nm_setting_wireless_security_get_num_groups(s_wireless_sec);
|
|
|
|
|
for (i = 0, found = FALSE; i < num; i++) {
|
|
|
|
|
cipher = nm_setting_wireless_security_get_group(s_wireless_sec, i);
|
|
|
|
|
|
|
|
|
|
if ((found =
|
|
|
|
|
match_cipher(cipher, "wep40", ap_wpa, ap_rsn, NM_802_11_AP_SEC_GROUP_WEP40)))
|
|
|
|
|
break;
|
|
|
|
|
if ((found =
|
|
|
|
|
match_cipher(cipher, "wep104", ap_wpa, ap_rsn, NM_802_11_AP_SEC_GROUP_WEP104)))
|
|
|
|
|
break;
|
|
|
|
|
if ((found = match_cipher(cipher, "tkip", ap_wpa, ap_rsn, NM_802_11_AP_SEC_GROUP_TKIP)))
|
|
|
|
|
break;
|
|
|
|
|
if ((found = match_cipher(cipher, "ccmp", ap_wpa, ap_rsn, NM_802_11_AP_SEC_GROUP_CCMP)))
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
if (!found && num)
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return FALSE;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_ssid:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
2014-11-13 14:14:11 -05:00
|
|
|
* Returns: (transfer none): the #NMSettingWireless:ssid property of the setting
|
2014-07-24 08:53:33 -04:00
|
|
|
**/
|
2014-06-26 10:42:11 -04:00
|
|
|
GBytes *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_ssid(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NULL);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->ssid;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_mode:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:mode property of the setting
|
|
|
|
|
**/
|
|
|
|
|
const char *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_mode(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NULL);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->mode;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_band:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:band property of the setting
|
|
|
|
|
**/
|
|
|
|
|
const char *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_band(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NULL);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->band;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_channel:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:channel property of the setting
|
|
|
|
|
**/
|
|
|
|
|
guint32
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_channel(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), 0);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->channel;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_bssid:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:bssid property of the setting
|
|
|
|
|
**/
|
2014-07-30 10:57:45 -04:00
|
|
|
const char *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_bssid(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NULL);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->bssid;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_rate:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:rate property of the setting
|
|
|
|
|
**/
|
|
|
|
|
guint32
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_rate(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), 0);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->rate;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_tx_power:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:tx-power property of the setting
|
|
|
|
|
**/
|
|
|
|
|
guint32
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_tx_power(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), 0);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->tx_power;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_mac_address:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:mac-address property of the setting
|
|
|
|
|
**/
|
2014-07-30 10:57:45 -04:00
|
|
|
const char *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_mac_address(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NULL);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->device_mac_address;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_cloned_mac_address:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:cloned-mac-address property of the setting
|
|
|
|
|
**/
|
2014-07-30 10:57:45 -04:00
|
|
|
const char *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_cloned_mac_address(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NULL);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->cloned_mac_address;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
all: make MAC address randomization algorithm configurable
For the per-connection settings "ethernet.cloned-mac-address"
and "wifi.cloned-mac-address", and for the per-device setting
"wifi.scan-rand-mac-address", we may generate MAC addresses using
either the "random" or "stable" algorithm.
Add new properties "generate-mac-address-mask" that allow to configure
which bits of the MAC address will be scrambled.
By default, the "random" and "stable" algorithms scamble all bits
of the MAC address, including the OUI part and generate a locally-
administered, unicast address.
By specifying a MAC address mask, we can now configure to perserve
parts of the current MAC address of the device. For example, setting
"FF:FF:FF:00:00:00" will preserve the first 3 octects of the current
MAC address.
One can also explicitly specify a MAC address to use instead of the
current MAC address. For example, "FF:FF:FF:00:00:00 68:F7:28:00:00:00"
sets the OUI part of the MAC address to "68:F7:28" while scrambling
the last 3 octects.
Similarly, "02:00:00:00:00:00 00:00:00:00:00:00" will scamble
all bits of the MAC address, except clearing the second-least
significant bit. Thus, creating a burned-in address, globally
administered.
One can also supply a list of MAC addresses like
"FF:FF:FF:00:00:00 68:F7:28:00:00:00 00:0C:29:00:00:00 ..." in which
case a MAC address is choosen randomly.
To fully scamble the MAC address one can configure
"02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00".
which also randomly creates either a locally or globally administered
address.
With this, the following macchanger options can be implemented:
`macchanger --random`
This is the default if no mask is configured.
-> ""
while is the same as:
-> "00:00:00:00:00:00"
-> "02:00:00:00:00:00 02:00:00:00:00:00"
`macchanger --random --bia`
-> "02:00:00:00:00:00 00:00:00:00:00:00"
`macchanger --ending`
This option cannot be fully implemented, because macchanger
uses the current MAC address but also implies --bia.
-> "FF:FF:FF:00:00:00"
This would yields the same result only if the current MAC address
is already a burned-in address too. Otherwise, it has not the same
effect as --ending.
-> "FF:FF:FF:00:00:00 <MAC_ADDR>"
Alternatively, instead of using the current MAC address,
spell the OUI part out. But again, that is not really the
same as macchanger does because you explictly have to name
the OUI part to use.
`machanger --another`
`machanger --another_any`
-> "FF:FF:FF:00:00:00 <MAC_ADDR> <MAC_ADDR> ..."
"$(printf "FF:FF:FF:00:00:00 %s\n" "$(sed -n 's/^\([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) .*/\1:\2:\3:00:00:00/p' /usr/share/macchanger/wireless.list | xargs)")"
2016-06-22 20:31:39 +02:00
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_generate_mac_address_mask:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:generate-mac-address-mask property of the setting
|
|
|
|
|
*
|
|
|
|
|
* Since: 1.4
|
|
|
|
|
**/
|
|
|
|
|
const char *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_generate_mac_address_mask(NMSettingWireless *setting)
|
all: make MAC address randomization algorithm configurable
For the per-connection settings "ethernet.cloned-mac-address"
and "wifi.cloned-mac-address", and for the per-device setting
"wifi.scan-rand-mac-address", we may generate MAC addresses using
either the "random" or "stable" algorithm.
Add new properties "generate-mac-address-mask" that allow to configure
which bits of the MAC address will be scrambled.
By default, the "random" and "stable" algorithms scamble all bits
of the MAC address, including the OUI part and generate a locally-
administered, unicast address.
By specifying a MAC address mask, we can now configure to perserve
parts of the current MAC address of the device. For example, setting
"FF:FF:FF:00:00:00" will preserve the first 3 octects of the current
MAC address.
One can also explicitly specify a MAC address to use instead of the
current MAC address. For example, "FF:FF:FF:00:00:00 68:F7:28:00:00:00"
sets the OUI part of the MAC address to "68:F7:28" while scrambling
the last 3 octects.
Similarly, "02:00:00:00:00:00 00:00:00:00:00:00" will scamble
all bits of the MAC address, except clearing the second-least
significant bit. Thus, creating a burned-in address, globally
administered.
One can also supply a list of MAC addresses like
"FF:FF:FF:00:00:00 68:F7:28:00:00:00 00:0C:29:00:00:00 ..." in which
case a MAC address is choosen randomly.
To fully scamble the MAC address one can configure
"02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00".
which also randomly creates either a locally or globally administered
address.
With this, the following macchanger options can be implemented:
`macchanger --random`
This is the default if no mask is configured.
-> ""
while is the same as:
-> "00:00:00:00:00:00"
-> "02:00:00:00:00:00 02:00:00:00:00:00"
`macchanger --random --bia`
-> "02:00:00:00:00:00 00:00:00:00:00:00"
`macchanger --ending`
This option cannot be fully implemented, because macchanger
uses the current MAC address but also implies --bia.
-> "FF:FF:FF:00:00:00"
This would yields the same result only if the current MAC address
is already a burned-in address too. Otherwise, it has not the same
effect as --ending.
-> "FF:FF:FF:00:00:00 <MAC_ADDR>"
Alternatively, instead of using the current MAC address,
spell the OUI part out. But again, that is not really the
same as macchanger does because you explictly have to name
the OUI part to use.
`machanger --another`
`machanger --another_any`
-> "FF:FF:FF:00:00:00 <MAC_ADDR> <MAC_ADDR> ..."
"$(printf "FF:FF:FF:00:00:00 %s\n" "$(sed -n 's/^\([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) .*/\1:\2:\3:00:00:00/p' /usr/share/macchanger/wireless.list | xargs)")"
2016-06-22 20:31:39 +02:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NULL);
|
all: make MAC address randomization algorithm configurable
For the per-connection settings "ethernet.cloned-mac-address"
and "wifi.cloned-mac-address", and for the per-device setting
"wifi.scan-rand-mac-address", we may generate MAC addresses using
either the "random" or "stable" algorithm.
Add new properties "generate-mac-address-mask" that allow to configure
which bits of the MAC address will be scrambled.
By default, the "random" and "stable" algorithms scamble all bits
of the MAC address, including the OUI part and generate a locally-
administered, unicast address.
By specifying a MAC address mask, we can now configure to perserve
parts of the current MAC address of the device. For example, setting
"FF:FF:FF:00:00:00" will preserve the first 3 octects of the current
MAC address.
One can also explicitly specify a MAC address to use instead of the
current MAC address. For example, "FF:FF:FF:00:00:00 68:F7:28:00:00:00"
sets the OUI part of the MAC address to "68:F7:28" while scrambling
the last 3 octects.
Similarly, "02:00:00:00:00:00 00:00:00:00:00:00" will scamble
all bits of the MAC address, except clearing the second-least
significant bit. Thus, creating a burned-in address, globally
administered.
One can also supply a list of MAC addresses like
"FF:FF:FF:00:00:00 68:F7:28:00:00:00 00:0C:29:00:00:00 ..." in which
case a MAC address is choosen randomly.
To fully scamble the MAC address one can configure
"02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00".
which also randomly creates either a locally or globally administered
address.
With this, the following macchanger options can be implemented:
`macchanger --random`
This is the default if no mask is configured.
-> ""
while is the same as:
-> "00:00:00:00:00:00"
-> "02:00:00:00:00:00 02:00:00:00:00:00"
`macchanger --random --bia`
-> "02:00:00:00:00:00 00:00:00:00:00:00"
`macchanger --ending`
This option cannot be fully implemented, because macchanger
uses the current MAC address but also implies --bia.
-> "FF:FF:FF:00:00:00"
This would yields the same result only if the current MAC address
is already a burned-in address too. Otherwise, it has not the same
effect as --ending.
-> "FF:FF:FF:00:00:00 <MAC_ADDR>"
Alternatively, instead of using the current MAC address,
spell the OUI part out. But again, that is not really the
same as macchanger does because you explictly have to name
the OUI part to use.
`machanger --another`
`machanger --another_any`
-> "FF:FF:FF:00:00:00 <MAC_ADDR> <MAC_ADDR> ..."
"$(printf "FF:FF:FF:00:00:00 %s\n" "$(sed -n 's/^\([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) .*/\1:\2:\3:00:00:00/p' /usr/share/macchanger/wireless.list | xargs)")"
2016-06-22 20:31:39 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->generate_mac_address_mask;
|
all: make MAC address randomization algorithm configurable
For the per-connection settings "ethernet.cloned-mac-address"
and "wifi.cloned-mac-address", and for the per-device setting
"wifi.scan-rand-mac-address", we may generate MAC addresses using
either the "random" or "stable" algorithm.
Add new properties "generate-mac-address-mask" that allow to configure
which bits of the MAC address will be scrambled.
By default, the "random" and "stable" algorithms scamble all bits
of the MAC address, including the OUI part and generate a locally-
administered, unicast address.
By specifying a MAC address mask, we can now configure to perserve
parts of the current MAC address of the device. For example, setting
"FF:FF:FF:00:00:00" will preserve the first 3 octects of the current
MAC address.
One can also explicitly specify a MAC address to use instead of the
current MAC address. For example, "FF:FF:FF:00:00:00 68:F7:28:00:00:00"
sets the OUI part of the MAC address to "68:F7:28" while scrambling
the last 3 octects.
Similarly, "02:00:00:00:00:00 00:00:00:00:00:00" will scamble
all bits of the MAC address, except clearing the second-least
significant bit. Thus, creating a burned-in address, globally
administered.
One can also supply a list of MAC addresses like
"FF:FF:FF:00:00:00 68:F7:28:00:00:00 00:0C:29:00:00:00 ..." in which
case a MAC address is choosen randomly.
To fully scamble the MAC address one can configure
"02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00".
which also randomly creates either a locally or globally administered
address.
With this, the following macchanger options can be implemented:
`macchanger --random`
This is the default if no mask is configured.
-> ""
while is the same as:
-> "00:00:00:00:00:00"
-> "02:00:00:00:00:00 02:00:00:00:00:00"
`macchanger --random --bia`
-> "02:00:00:00:00:00 00:00:00:00:00:00"
`macchanger --ending`
This option cannot be fully implemented, because macchanger
uses the current MAC address but also implies --bia.
-> "FF:FF:FF:00:00:00"
This would yields the same result only if the current MAC address
is already a burned-in address too. Otherwise, it has not the same
effect as --ending.
-> "FF:FF:FF:00:00:00 <MAC_ADDR>"
Alternatively, instead of using the current MAC address,
spell the OUI part out. But again, that is not really the
same as macchanger does because you explictly have to name
the OUI part to use.
`machanger --another`
`machanger --another_any`
-> "FF:FF:FF:00:00:00 <MAC_ADDR> <MAC_ADDR> ..."
"$(printf "FF:FF:FF:00:00:00 %s\n" "$(sed -n 's/^\([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) .*/\1:\2:\3:00:00:00/p' /usr/share/macchanger/wireless.list | xargs)")"
2016-06-22 20:31:39 +02:00
|
|
|
}
|
|
|
|
|
|
2014-07-24 08:53:33 -04:00
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_mac_address_blacklist:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
2014-10-22 12:31:31 -04:00
|
|
|
* Returns: the #NMSettingWireless:mac-address-blacklist property of the setting
|
2014-07-24 08:53:33 -04:00
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
const char *const *
|
|
|
|
|
nm_setting_wireless_get_mac_address_blacklist(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv;
|
2014-10-22 12:31:31 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NULL);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
|
|
|
|
return (const char *const *) priv->mac_address_blacklist->data;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_num_mac_blacklist_items:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the number of blacklisted MAC addresses
|
|
|
|
|
**/
|
|
|
|
|
guint32
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_num_mac_blacklist_items(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), 0);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->mac_address_blacklist->len;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_mac_blacklist_item:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
* @idx: the zero-based index of the MAC address entry
|
|
|
|
|
*
|
|
|
|
|
* Returns: the blacklisted MAC address string (hex-digits-and-colons notation)
|
|
|
|
|
* at index @idx
|
|
|
|
|
**/
|
|
|
|
|
const char *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_mac_blacklist_item(NMSettingWireless *setting, guint32 idx)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv;
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NULL);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
|
|
|
|
g_return_val_if_fail(idx <= priv->mac_address_blacklist->len, NULL);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return g_array_index(priv->mac_address_blacklist, const char *, idx);
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_add_mac_blacklist_item:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
* @mac: the MAC address string (hex-digits-and-colons notation) to blacklist
|
|
|
|
|
*
|
|
|
|
|
* Adds a new MAC address to the #NMSettingWireless:mac-address-blacklist property.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if the MAC address was added; %FALSE if the MAC address
|
|
|
|
|
* is invalid or was already present
|
|
|
|
|
**/
|
|
|
|
|
gboolean
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_add_mac_blacklist_item(NMSettingWireless *setting, const char *mac)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv;
|
|
|
|
|
const char * candidate;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), FALSE);
|
|
|
|
|
g_return_val_if_fail(mac != NULL, FALSE);
|
|
|
|
|
|
|
|
|
|
if (!nm_utils_hwaddr_valid(mac, ETH_ALEN))
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
|
|
|
|
for (i = 0; i < priv->mac_address_blacklist->len; i++) {
|
|
|
|
|
candidate = g_array_index(priv->mac_address_blacklist, char *, i);
|
|
|
|
|
if (nm_utils_hwaddr_matches(mac, -1, candidate, -1))
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
mac = nm_utils_hwaddr_canonical(mac, ETH_ALEN);
|
|
|
|
|
g_array_append_val(priv->mac_address_blacklist, mac);
|
|
|
|
|
_notify(setting, PROP_MAC_ADDRESS_BLACKLIST);
|
|
|
|
|
return TRUE;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_remove_mac_blacklist_item:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
* @idx: index number of the MAC address
|
|
|
|
|
*
|
|
|
|
|
* Removes the MAC address at index @idx from the blacklist.
|
|
|
|
|
**/
|
|
|
|
|
void
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_remove_mac_blacklist_item(NMSettingWireless *setting, guint32 idx)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv;
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_if_fail(NM_IS_SETTING_WIRELESS(setting));
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
|
|
|
|
g_return_if_fail(idx < priv->mac_address_blacklist->len);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_array_remove_index(priv->mac_address_blacklist, idx);
|
|
|
|
|
_notify(setting, PROP_MAC_ADDRESS_BLACKLIST);
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_remove_mac_blacklist_item_by_value:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
* @mac: the MAC address string (hex-digits-and-colons notation) to remove from
|
|
|
|
|
* the blacklist
|
|
|
|
|
*
|
|
|
|
|
* Removes the MAC address @mac from the blacklist.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if the MAC address was found and removed; %FALSE if it was not.
|
|
|
|
|
**/
|
|
|
|
|
gboolean
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_remove_mac_blacklist_item_by_value(NMSettingWireless *setting, const char *mac)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv;
|
|
|
|
|
const char * candidate;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), FALSE);
|
|
|
|
|
g_return_val_if_fail(mac != NULL, FALSE);
|
|
|
|
|
|
|
|
|
|
priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
|
|
|
|
for (i = 0; i < priv->mac_address_blacklist->len; i++) {
|
|
|
|
|
candidate = g_array_index(priv->mac_address_blacklist, char *, i);
|
|
|
|
|
if (!nm_utils_hwaddr_matches(mac, -1, candidate, -1)) {
|
|
|
|
|
g_array_remove_index(priv->mac_address_blacklist, i);
|
|
|
|
|
_notify(setting, PROP_MAC_ADDRESS_BLACKLIST);
|
|
|
|
|
return TRUE;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return FALSE;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_clear_mac_blacklist_items:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Removes all blacklisted MAC addresses.
|
|
|
|
|
**/
|
|
|
|
|
void
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_clear_mac_blacklist_items(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_if_fail(NM_IS_SETTING_WIRELESS(setting));
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_array_set_size(NM_SETTING_WIRELESS_GET_PRIVATE(setting)->mac_address_blacklist, 0);
|
|
|
|
|
_notify(setting, PROP_MAC_ADDRESS_BLACKLIST);
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_mtu:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:mtu property of the setting
|
|
|
|
|
**/
|
|
|
|
|
guint32
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_mtu(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), 0);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->mtu;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_hidden:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:hidden property of the setting
|
|
|
|
|
**/
|
|
|
|
|
gboolean
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_hidden(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), FALSE);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->hidden;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
2014-10-30 09:49:38 -05:00
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_powersave:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:powersave property of the setting
|
|
|
|
|
*
|
|
|
|
|
* Since: 1.2
|
|
|
|
|
**/
|
|
|
|
|
guint32
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_powersave(NMSettingWireless *setting)
|
2014-10-30 09:49:38 -05:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), 0);
|
2014-10-30 09:49:38 -05:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->powersave;
|
2014-10-30 09:49:38 -05:00
|
|
|
}
|
|
|
|
|
|
2015-10-06 17:42:15 -04:00
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_mac_address_randomization:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:mac-address-randomization property of the
|
|
|
|
|
* setting
|
|
|
|
|
*
|
|
|
|
|
* Since: 1.2
|
|
|
|
|
**/
|
|
|
|
|
NMSettingMacRandomization
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_mac_address_randomization(NMSettingWireless *setting)
|
2015-10-06 17:42:15 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), 0);
|
2015-10-06 17:42:15 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->mac_address_randomization;
|
2015-10-06 17:42:15 -04:00
|
|
|
}
|
|
|
|
|
|
2014-07-24 08:53:33 -04:00
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_add_seen_bssid:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
* @bssid: the new BSSID to add to the list
|
|
|
|
|
*
|
|
|
|
|
* Adds a new Wi-Fi AP's BSSID to the previously seen BSSID list of the setting.
|
|
|
|
|
* NetworkManager now tracks previously seen BSSIDs internally so this function
|
|
|
|
|
* no longer has much use. Actually, changes you make using this function will
|
|
|
|
|
* not be preserved.
|
|
|
|
|
*
|
|
|
|
|
* Returns: %TRUE if @bssid was already known, %FALSE if not
|
|
|
|
|
**/
|
|
|
|
|
gboolean
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_add_seen_bssid(NMSettingWireless *setting, const char *bssid)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv;
|
|
|
|
|
gs_free char * lower_bssid = NULL;
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), FALSE);
|
|
|
|
|
g_return_val_if_fail(bssid != NULL, FALSE);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
lower_bssid = g_ascii_strdown(bssid, -1);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
if (!priv->seen_bssids) {
|
|
|
|
|
priv->seen_bssids = g_ptr_array_new_with_free_func(g_free);
|
|
|
|
|
} else {
|
|
|
|
|
if (nm_utils_strv_find_first((char **) priv->seen_bssids->pdata,
|
|
|
|
|
priv->seen_bssids->len,
|
|
|
|
|
lower_bssid)
|
|
|
|
|
>= 0)
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_ptr_array_add(priv->seen_bssids, g_steal_pointer(&lower_bssid));
|
|
|
|
|
_notify(setting, PROP_SEEN_BSSIDS);
|
|
|
|
|
return TRUE;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_num_seen_bssids:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the number of BSSIDs in the previously seen BSSID list
|
|
|
|
|
**/
|
|
|
|
|
guint32
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_num_seen_bssids(NMSettingWireless *setting)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv;
|
2019-06-27 10:08:54 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), 0);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
2019-06-27 10:08:54 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return priv->seen_bssids ? priv->seen_bssids->len : 0u;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_seen_bssid:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
* @i: index of a BSSID in the previously seen BSSID list
|
|
|
|
|
*
|
|
|
|
|
* Returns: the BSSID at index @i
|
|
|
|
|
**/
|
|
|
|
|
const char *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_seen_bssid(NMSettingWireless *setting, guint32 i)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv;
|
2019-06-27 10:08:54 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), 0);
|
2019-06-27 10:08:54 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
2019-06-27 10:08:54 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
if (!priv->seen_bssids || i >= priv->seen_bssids->len)
|
|
|
|
|
return NULL;
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return priv->seen_bssids->pdata[i];
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
2019-06-27 09:09:06 +02:00
|
|
|
static GVariant *
|
2020-09-28 16:03:33 +02:00
|
|
|
_to_dbus_fcn_seen_bssids(const NMSettInfoSetting * sett_info,
|
|
|
|
|
guint property_idx,
|
|
|
|
|
NMConnection * connection,
|
|
|
|
|
NMSetting * setting,
|
|
|
|
|
NMConnectionSerializationFlags flags,
|
|
|
|
|
const NMConnectionSerializationOptions *options)
|
2019-06-27 09:09:06 +02:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv;
|
2019-06-27 09:09:06 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
if (options && options->seen_bssids) {
|
|
|
|
|
return options->seen_bssids[0] ? g_variant_new_strv(options->seen_bssids, -1) : NULL;
|
|
|
|
|
}
|
2019-06-27 09:09:06 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
2019-06-27 09:09:06 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
if (!priv->seen_bssids || priv->seen_bssids->len == 0)
|
|
|
|
|
return NULL;
|
2019-06-27 09:09:06 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return g_variant_new_strv((const char *const *) priv->seen_bssids->pdata,
|
|
|
|
|
priv->seen_bssids->len);
|
2019-06-27 09:09:06 +02:00
|
|
|
}
|
|
|
|
|
|
2020-06-29 17:33:12 +02:00
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_ap_isolation:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns: the #NMSettingWireless:ap-isolation property of the setting
|
|
|
|
|
*
|
|
|
|
|
* Since: 1.28
|
|
|
|
|
*/
|
|
|
|
|
NMTernary
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_ap_isolation(NMSettingWireless *setting)
|
2020-06-29 17:33:12 +02:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NM_TERNARY_DEFAULT);
|
2020-06-29 17:33:12 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->ap_isolation;
|
2020-06-29 17:33:12 +02:00
|
|
|
}
|
|
|
|
|
|
2019-06-27 09:09:06 +02:00
|
|
|
/*****************************************************************************/
|
|
|
|
|
|
2014-07-24 08:53:33 -04:00
|
|
|
static gboolean
|
2020-09-28 16:03:33 +02:00
|
|
|
verify(NMSetting *setting, NMConnection *connection, GError **error)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
|
|
|
|
const char * valid_modes[] = {NM_SETTING_WIRELESS_MODE_INFRA,
|
|
|
|
|
NM_SETTING_WIRELESS_MODE_ADHOC,
|
|
|
|
|
NM_SETTING_WIRELESS_MODE_AP,
|
|
|
|
|
NM_SETTING_WIRELESS_MODE_MESH,
|
|
|
|
|
NULL};
|
|
|
|
|
const char * valid_bands[] = {"a", "bg", NULL};
|
|
|
|
|
guint i;
|
|
|
|
|
gsize length;
|
|
|
|
|
GError * local = NULL;
|
|
|
|
|
|
|
|
|
|
if (!priv->ssid) {
|
|
|
|
|
g_set_error_literal(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_MISSING_PROPERTY,
|
|
|
|
|
_("property is missing"));
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_SSID);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
length = g_bytes_get_size(priv->ssid);
|
|
|
|
|
if (length == 0 || length > 32) {
|
|
|
|
|
g_set_error_literal(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("SSID length is out of range <1-32> bytes"));
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_SSID);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (priv->mode && !g_strv_contains(valid_modes, priv->mode)) {
|
|
|
|
|
g_set_error(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("'%s' is not a valid Wi-Fi mode"),
|
|
|
|
|
priv->mode);
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_MODE);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (priv->band && !g_strv_contains(valid_bands, priv->band)) {
|
|
|
|
|
g_set_error(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("'%s' is not a valid band"),
|
|
|
|
|
priv->band);
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_BAND);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (priv->channel && !priv->band) {
|
|
|
|
|
g_set_error(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_MISSING_PROPERTY,
|
|
|
|
|
_("'%s' requires setting '%s' property"),
|
|
|
|
|
NM_SETTING_WIRELESS_CHANNEL,
|
|
|
|
|
NM_SETTING_WIRELESS_BAND);
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_BAND);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (priv->channel) {
|
|
|
|
|
if (!nm_utils_wifi_is_channel_valid(priv->channel, priv->band)) {
|
|
|
|
|
g_set_error(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("'%d' is not a valid channel"),
|
|
|
|
|
priv->channel);
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_CHANNEL);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ((g_strcmp0(priv->mode, NM_SETTING_WIRELESS_MODE_MESH) == 0)
|
|
|
|
|
&& !(priv->channel && priv->band)) {
|
|
|
|
|
g_set_error(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_MISSING_PROPERTY,
|
|
|
|
|
_("'%s' requires '%s' and '%s' property"),
|
|
|
|
|
priv->mode,
|
|
|
|
|
NM_SETTING_WIRELESS_BAND,
|
|
|
|
|
NM_SETTING_WIRELESS_CHANNEL);
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_MODE);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (priv->bssid && !nm_utils_hwaddr_valid(priv->bssid, ETH_ALEN)) {
|
|
|
|
|
g_set_error_literal(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("property is invalid"));
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_BSSID);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (priv->device_mac_address && !nm_utils_hwaddr_valid(priv->device_mac_address, ETH_ALEN)) {
|
|
|
|
|
g_set_error_literal(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("property is invalid"));
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_MAC_ADDRESS);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (priv->cloned_mac_address && !NM_CLONED_MAC_IS_SPECIAL(priv->cloned_mac_address)
|
|
|
|
|
&& !nm_utils_hwaddr_valid(priv->cloned_mac_address, ETH_ALEN)) {
|
|
|
|
|
g_set_error_literal(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("property is invalid"));
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_CLONED_MAC_ADDRESS);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* generate-mac-address-mask only makes sense with cloned-mac-address "random" or
|
2020-09-28 14:50:01 +02:00
|
|
|
* "stable". Still, let's not be so strict about that and accept the value
|
|
|
|
|
* even if it is unused. */
|
2020-09-28 16:03:33 +02:00
|
|
|
if (!_nm_utils_generate_mac_address_mask_parse(priv->generate_mac_address_mask,
|
|
|
|
|
NULL,
|
|
|
|
|
NULL,
|
|
|
|
|
NULL,
|
|
|
|
|
&local)) {
|
|
|
|
|
g_set_error_literal(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
local->message);
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_GENERATE_MAC_ADDRESS_MASK);
|
|
|
|
|
g_error_free(local);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < priv->mac_address_blacklist->len; i++) {
|
|
|
|
|
const char *mac = g_array_index(priv->mac_address_blacklist, const char *, i);
|
|
|
|
|
|
|
|
|
|
if (!nm_utils_hwaddr_valid(mac, ETH_ALEN)) {
|
|
|
|
|
g_set_error(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("'%s' is not a valid MAC address"),
|
|
|
|
|
mac);
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_MAC_ADDRESS_BLACKLIST);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (priv->seen_bssids) {
|
|
|
|
|
for (i = 0; i < priv->seen_bssids->len; i++) {
|
|
|
|
|
const char *b;
|
|
|
|
|
|
|
|
|
|
b = priv->seen_bssids->pdata[i];
|
|
|
|
|
if (!nm_utils_hwaddr_valid(b, ETH_ALEN)) {
|
|
|
|
|
g_set_error(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("'%s' is not a valid MAC address"),
|
|
|
|
|
b);
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_SEEN_BSSIDS);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!NM_IN_SET(priv->mac_address_randomization,
|
|
|
|
|
NM_SETTING_MAC_RANDOMIZATION_DEFAULT,
|
|
|
|
|
NM_SETTING_MAC_RANDOMIZATION_NEVER,
|
|
|
|
|
NM_SETTING_MAC_RANDOMIZATION_ALWAYS)) {
|
|
|
|
|
g_set_error(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("invalid value"));
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_MAC_ADDRESS_RANDOMIZATION);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (NM_FLAGS_ANY(priv->wowl, NM_SETTING_WIRELESS_WAKE_ON_WLAN_EXCLUSIVE_FLAGS)) {
|
|
|
|
|
if (!nm_utils_is_power_of_two(priv->wowl)) {
|
|
|
|
|
g_set_error_literal(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("Wake-on-WLAN mode 'default' and 'ignore' are exclusive flags"));
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_WAKE_ON_WLAN);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
} else if (NM_FLAGS_ANY(priv->wowl, ~NM_SETTING_WIRELESS_WAKE_ON_WLAN_ALL)) {
|
|
|
|
|
g_set_error_literal(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("Wake-on-WLAN trying to set unknown flag"));
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_WAKE_ON_WLAN);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (priv->ap_isolation != NM_TERNARY_DEFAULT
|
|
|
|
|
&& !nm_streq0(priv->mode, NM_SETTING_WIRELESS_MODE_AP)) {
|
|
|
|
|
g_set_error_literal(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("AP isolation can be set only in AP mode"));
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_AP_ISOLATION);
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* from here on, check for NM_SETTING_VERIFY_NORMALIZABLE conditions. */
|
|
|
|
|
|
|
|
|
|
if (priv->cloned_mac_address) {
|
|
|
|
|
if (priv->mac_address_randomization == NM_SETTING_MAC_RANDOMIZATION_ALWAYS
|
|
|
|
|
&& nm_streq(priv->cloned_mac_address, "random"))
|
|
|
|
|
goto mac_addr_rand_ok;
|
|
|
|
|
if (priv->mac_address_randomization == NM_SETTING_MAC_RANDOMIZATION_NEVER
|
|
|
|
|
&& nm_streq(priv->cloned_mac_address, "permanent"))
|
|
|
|
|
goto mac_addr_rand_ok;
|
|
|
|
|
if (priv->mac_address_randomization == NM_SETTING_MAC_RANDOMIZATION_DEFAULT)
|
|
|
|
|
goto mac_addr_rand_ok;
|
|
|
|
|
} else if (priv->mac_address_randomization == NM_SETTING_MAC_RANDOMIZATION_DEFAULT)
|
|
|
|
|
goto mac_addr_rand_ok;
|
|
|
|
|
g_set_error(error,
|
|
|
|
|
NM_CONNECTION_ERROR,
|
|
|
|
|
NM_CONNECTION_ERROR_INVALID_PROPERTY,
|
|
|
|
|
_("conflicting value of mac-address-randomization and cloned-mac-address"));
|
|
|
|
|
g_prefix_error(error,
|
|
|
|
|
"%s.%s: ",
|
|
|
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
|
|
|
NM_SETTING_WIRELESS_CLONED_MAC_ADDRESS);
|
|
|
|
|
return NM_SETTING_VERIFY_NORMALIZABLE;
|
2016-06-19 13:01:57 +02:00
|
|
|
mac_addr_rand_ok:
|
|
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return TRUE;
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
libnm: rework compare_property() implementation for NMSetting
NMSetting's compare_property() has and had two callers:
nm_setting_compare() and nm_setting_diff().
compare_property() accepts a NMSettingCompareFlags argument, but
at the same time, both callers have another complex (and
inconsistent!) set of pre-checks for shortcuting the call of
compare_property(): should_compare_prop().
Merge should_compare_prop() into compare_property(). This way,
nm_setting_compare() and nm_setting_diff() has less additional
code, and are simpler to follow. Especially nm_setting_compare()
is now trivial. And nm_setting_diff() is still complicated, but
not related to the question how the property compares or whether
it should be compared at all.
If you want to know whether it should be compared, all you need to do
now is follow NMSettingClass.compare_property().
This changes function pointer NMSettingClass.compare_property(),
which is public API. However, no user can actually use this (and shall
not!), because _nm_setting_class_commit_full() etc. is private API. A
user outside of libnm-core cannot create his/her own subclasses of
NMSetting, and never could in the past. So, this API/ABI change doesn't
matter.
2019-01-09 09:08:39 +01:00
|
|
|
static NMTernary
|
2020-09-28 16:03:33 +02:00
|
|
|
compare_property(const NMSettInfoSetting *sett_info,
|
|
|
|
|
guint property_idx,
|
|
|
|
|
NMConnection * con_a,
|
|
|
|
|
NMSetting * set_a,
|
|
|
|
|
NMConnection * con_b,
|
|
|
|
|
NMSetting * set_b,
|
|
|
|
|
NMSettingCompareFlags flags)
|
device: extend MAC address handling including randomization for ethernet and wifi
Extend the "ethernet.cloned-mac-address" and "wifi.cloned-mac-address"
settings. Instead of specifying an explicit MAC address, the additional
special values "permanent", "preserve", "random", "random-bia", "stable" and
"stable-bia" are supported.
"permanent" means to use the permanent hardware address. Previously that
was the default if no explict cloned-mac-address was set. The default is
thus still "permanent", but it can be overwritten by global
configuration.
"preserve" means not to configure the MAC address when activating the
device. That was actually the default behavior before introducing MAC
address handling with commit 1b49f941a69af910b0e68530be7339e8053068e5.
"random" and "random-bia" use a randomized MAC address for each
connection. "stable" and "stable-bia" use a generated, stable
address based on some token. The "bia" suffix says to generate a
burned-in address. The stable method by default uses as token the
connection UUID, but the token can be explicitly choosen via
"stable:<TOKEN>" and "stable-bia:<TOKEN>".
On a D-Bus level, the "cloned-mac-address" is a bytestring and thus
cannot express the new forms. It is replaced by the new
"assigned-mac-address" field. For the GObject property, libnm's API,
nmcli, keyfile, etc. the old name "cloned-mac-address" is still used.
Deprecating the old field seems more complicated then just extending
the use of the existing "cloned-mac-address" field, although the name
doesn't match well with the extended meaning.
There is some overlap with the "wifi.mac-address-randomization" setting.
https://bugzilla.gnome.org/show_bug.cgi?id=705545
https://bugzilla.gnome.org/show_bug.cgi?id=708820
https://bugzilla.gnome.org/show_bug.cgi?id=758301
2016-05-24 15:57:16 +02:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
if (nm_streq(sett_info->property_infos[property_idx].name,
|
|
|
|
|
NM_SETTING_WIRELESS_CLONED_MAC_ADDRESS)) {
|
|
|
|
|
return !set_b
|
|
|
|
|
|| nm_streq0(NM_SETTING_WIRELESS_GET_PRIVATE(set_a)->cloned_mac_address,
|
|
|
|
|
NM_SETTING_WIRELESS_GET_PRIVATE(set_b)->cloned_mac_address);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NM_SETTING_CLASS(nm_setting_wireless_parent_class)
|
|
|
|
|
->compare_property(sett_info, property_idx, con_a, set_a, con_b, set_b, flags);
|
device: extend MAC address handling including randomization for ethernet and wifi
Extend the "ethernet.cloned-mac-address" and "wifi.cloned-mac-address"
settings. Instead of specifying an explicit MAC address, the additional
special values "permanent", "preserve", "random", "random-bia", "stable" and
"stable-bia" are supported.
"permanent" means to use the permanent hardware address. Previously that
was the default if no explict cloned-mac-address was set. The default is
thus still "permanent", but it can be overwritten by global
configuration.
"preserve" means not to configure the MAC address when activating the
device. That was actually the default behavior before introducing MAC
address handling with commit 1b49f941a69af910b0e68530be7339e8053068e5.
"random" and "random-bia" use a randomized MAC address for each
connection. "stable" and "stable-bia" use a generated, stable
address based on some token. The "bia" suffix says to generate a
burned-in address. The stable method by default uses as token the
connection UUID, but the token can be explicitly choosen via
"stable:<TOKEN>" and "stable-bia:<TOKEN>".
On a D-Bus level, the "cloned-mac-address" is a bytestring and thus
cannot express the new forms. It is replaced by the new
"assigned-mac-address" field. For the GObject property, libnm's API,
nmcli, keyfile, etc. the old name "cloned-mac-address" is still used.
Deprecating the old field seems more complicated then just extending
the use of the existing "cloned-mac-address" field, although the name
doesn't match well with the extended meaning.
There is some overlap with the "wifi.mac-address-randomization" setting.
https://bugzilla.gnome.org/show_bug.cgi?id=705545
https://bugzilla.gnome.org/show_bug.cgi?id=708820
https://bugzilla.gnome.org/show_bug.cgi?id=758301
2016-05-24 15:57:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
|
|
2014-08-16 10:09:48 -04:00
|
|
|
static GVariant *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_security(const NMSettInfoSetting * sett_info,
|
|
|
|
|
guint property_idx,
|
|
|
|
|
NMConnection * connection,
|
|
|
|
|
NMSetting * setting,
|
|
|
|
|
NMConnectionSerializationFlags flags,
|
|
|
|
|
const NMConnectionSerializationOptions *options)
|
2014-07-29 18:42:02 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
if (flags & NM_CONNECTION_SERIALIZE_ONLY_SECRETS)
|
|
|
|
|
return NULL;
|
2019-01-02 15:54:18 +01:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
if (!connection)
|
|
|
|
|
return NULL;
|
2019-01-02 15:24:35 +01:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
if (!nm_connection_get_setting_wireless_security(connection))
|
|
|
|
|
return NULL;
|
2019-01-02 15:54:18 +01:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return g_variant_new_string(NM_SETTING_WIRELESS_SECURITY_SETTING_NAME);
|
2014-07-29 18:42:02 -04:00
|
|
|
}
|
|
|
|
|
|
2018-05-25 16:44:52 +02:00
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_get_wake_on_wlan:
|
|
|
|
|
* @setting: the #NMSettingWireless
|
|
|
|
|
*
|
|
|
|
|
* Returns the Wake-on-WLAN options enabled for the connection
|
|
|
|
|
*
|
|
|
|
|
* Returns: the Wake-on-WLAN options
|
|
|
|
|
*
|
|
|
|
|
* Since: 1.12
|
|
|
|
|
*/
|
|
|
|
|
NMSettingWirelessWakeOnWLan
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_get_wake_on_wlan(NMSettingWireless *setting)
|
2018-05-25 16:44:52 +02:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_return_val_if_fail(NM_IS_SETTING_WIRELESS(setting), NM_SETTING_WIRELESS_WAKE_ON_WLAN_NONE);
|
2018-05-25 16:44:52 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
return NM_SETTING_WIRELESS_GET_PRIVATE(setting)->wowl;
|
2018-05-25 16:44:52 +02:00
|
|
|
}
|
|
|
|
|
|
2014-10-22 12:31:31 -04:00
|
|
|
static void
|
2020-09-28 16:03:33 +02:00
|
|
|
clear_blacklist_item(char **item_p)
|
2014-10-22 12:31:31 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
g_free(*item_p);
|
2014-10-22 12:31:31 -04:00
|
|
|
}
|
|
|
|
|
|
2019-01-11 08:32:54 +01:00
|
|
|
/*****************************************************************************/
|
2014-07-24 08:53:33 -04:00
|
|
|
|
|
|
|
|
static void
|
2020-09-28 16:03:33 +02:00
|
|
|
get_property(GObject *object, guint prop_id, GValue *value, GParamSpec *pspec)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWireless * setting = NM_SETTING_WIRELESS(object);
|
|
|
|
|
NMSettingWirelessPrivate *priv = NM_SETTING_WIRELESS_GET_PRIVATE(object);
|
|
|
|
|
|
|
|
|
|
switch (prop_id) {
|
|
|
|
|
case PROP_SSID:
|
|
|
|
|
g_value_set_boxed(value, nm_setting_wireless_get_ssid(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_MODE:
|
|
|
|
|
g_value_set_string(value, nm_setting_wireless_get_mode(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_BAND:
|
|
|
|
|
g_value_set_string(value, nm_setting_wireless_get_band(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_CHANNEL:
|
|
|
|
|
g_value_set_uint(value, nm_setting_wireless_get_channel(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_BSSID:
|
|
|
|
|
g_value_set_string(value, nm_setting_wireless_get_bssid(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_RATE:
|
|
|
|
|
g_value_set_uint(value, nm_setting_wireless_get_rate(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_TX_POWER:
|
|
|
|
|
g_value_set_uint(value, nm_setting_wireless_get_tx_power(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_MAC_ADDRESS:
|
|
|
|
|
g_value_set_string(value, nm_setting_wireless_get_mac_address(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_CLONED_MAC_ADDRESS:
|
|
|
|
|
g_value_set_string(value, nm_setting_wireless_get_cloned_mac_address(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_GENERATE_MAC_ADDRESS_MASK:
|
|
|
|
|
g_value_set_string(value, nm_setting_wireless_get_generate_mac_address_mask(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_MAC_ADDRESS_BLACKLIST:
|
|
|
|
|
g_value_set_boxed(value, (char **) priv->mac_address_blacklist->data);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_MTU:
|
|
|
|
|
g_value_set_uint(value, nm_setting_wireless_get_mtu(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_SEEN_BSSIDS:
|
|
|
|
|
g_value_take_boxed(value,
|
|
|
|
|
priv->seen_bssids ? nm_utils_strv_dup((char **) priv->seen_bssids->pdata,
|
|
|
|
|
priv->seen_bssids->len,
|
|
|
|
|
TRUE)
|
|
|
|
|
: NULL);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_HIDDEN:
|
|
|
|
|
g_value_set_boolean(value, nm_setting_wireless_get_hidden(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_POWERSAVE:
|
|
|
|
|
g_value_set_uint(value, nm_setting_wireless_get_powersave(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_MAC_ADDRESS_RANDOMIZATION:
|
|
|
|
|
g_value_set_uint(value, nm_setting_wireless_get_mac_address_randomization(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_WAKE_ON_WLAN:
|
|
|
|
|
g_value_set_uint(value, nm_setting_wireless_get_wake_on_wlan(setting));
|
|
|
|
|
break;
|
|
|
|
|
case PROP_AP_ISOLATION:
|
|
|
|
|
g_value_set_enum(value, priv->ap_isolation);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
G_OBJECT_WARN_INVALID_PROPERTY_ID(object, prop_id, pspec);
|
|
|
|
|
break;
|
|
|
|
|
}
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2020-09-28 16:03:33 +02:00
|
|
|
set_property(GObject *object, guint prop_id, const GValue *value, GParamSpec *pspec)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv = NM_SETTING_WIRELESS_GET_PRIVATE(object);
|
|
|
|
|
const char *const * blacklist;
|
|
|
|
|
const char * mac;
|
|
|
|
|
gboolean bool_val;
|
|
|
|
|
|
|
|
|
|
switch (prop_id) {
|
|
|
|
|
case PROP_SSID:
|
|
|
|
|
if (priv->ssid)
|
|
|
|
|
g_bytes_unref(priv->ssid);
|
|
|
|
|
priv->ssid = g_value_dup_boxed(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_MODE:
|
|
|
|
|
g_free(priv->mode);
|
|
|
|
|
priv->mode = g_value_dup_string(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_BAND:
|
|
|
|
|
g_free(priv->band);
|
|
|
|
|
priv->band = g_value_dup_string(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_CHANNEL:
|
|
|
|
|
priv->channel = g_value_get_uint(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_BSSID:
|
|
|
|
|
g_free(priv->bssid);
|
|
|
|
|
priv->bssid = g_value_dup_string(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_RATE:
|
|
|
|
|
priv->rate = g_value_get_uint(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_TX_POWER:
|
|
|
|
|
priv->tx_power = g_value_get_uint(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_MAC_ADDRESS:
|
|
|
|
|
g_free(priv->device_mac_address);
|
|
|
|
|
priv->device_mac_address =
|
|
|
|
|
_nm_utils_hwaddr_canonical_or_invalid(g_value_get_string(value), ETH_ALEN);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_CLONED_MAC_ADDRESS:
|
|
|
|
|
bool_val = !!priv->cloned_mac_address;
|
|
|
|
|
g_free(priv->cloned_mac_address);
|
|
|
|
|
priv->cloned_mac_address =
|
|
|
|
|
_nm_utils_hwaddr_canonical_or_invalid(g_value_get_string(value), ETH_ALEN);
|
|
|
|
|
if (bool_val && !priv->cloned_mac_address) {
|
|
|
|
|
/* cloned-mac-address was set before but was now explicitly cleared.
|
2020-09-28 14:50:01 +02:00
|
|
|
* In this case, we also clear mac-address-randomization flag */
|
2020-09-28 16:03:33 +02:00
|
|
|
if (priv->mac_address_randomization != NM_SETTING_MAC_RANDOMIZATION_DEFAULT) {
|
|
|
|
|
priv->mac_address_randomization = NM_SETTING_MAC_RANDOMIZATION_DEFAULT;
|
|
|
|
|
_notify(NM_SETTING_WIRELESS(object), PROP_MAC_ADDRESS_RANDOMIZATION);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case PROP_GENERATE_MAC_ADDRESS_MASK:
|
|
|
|
|
g_free(priv->generate_mac_address_mask);
|
|
|
|
|
priv->generate_mac_address_mask = g_value_dup_string(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_MAC_ADDRESS_BLACKLIST:
|
|
|
|
|
blacklist = g_value_get_boxed(value);
|
|
|
|
|
g_array_set_size(priv->mac_address_blacklist, 0);
|
|
|
|
|
if (blacklist && blacklist[0]) {
|
|
|
|
|
gsize i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; blacklist[i]; i++) {
|
|
|
|
|
mac = _nm_utils_hwaddr_canonical_or_invalid(blacklist[i], ETH_ALEN);
|
|
|
|
|
g_array_append_val(priv->mac_address_blacklist, mac);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
case PROP_MTU:
|
|
|
|
|
priv->mtu = g_value_get_uint(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_SEEN_BSSIDS:
|
|
|
|
|
{
|
|
|
|
|
gs_unref_ptrarray GPtrArray *arr_old = NULL;
|
|
|
|
|
const char *const * strv;
|
|
|
|
|
|
|
|
|
|
arr_old = g_steal_pointer(&priv->seen_bssids);
|
|
|
|
|
|
|
|
|
|
strv = g_value_get_boxed(value);
|
|
|
|
|
if (strv && strv[0]) {
|
|
|
|
|
gsize i, l;
|
|
|
|
|
|
|
|
|
|
l = NM_PTRARRAY_LEN(strv);
|
|
|
|
|
priv->seen_bssids = g_ptr_array_new_full(l, g_free);
|
|
|
|
|
for (i = 0; i < l; i++)
|
|
|
|
|
g_ptr_array_add(priv->seen_bssids, g_strdup(strv[i]));
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
case PROP_HIDDEN:
|
|
|
|
|
priv->hidden = g_value_get_boolean(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_POWERSAVE:
|
|
|
|
|
priv->powersave = g_value_get_uint(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_MAC_ADDRESS_RANDOMIZATION:
|
|
|
|
|
priv->mac_address_randomization = g_value_get_uint(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_WAKE_ON_WLAN:
|
|
|
|
|
priv->wowl = g_value_get_uint(value);
|
|
|
|
|
break;
|
|
|
|
|
case PROP_AP_ISOLATION:
|
|
|
|
|
priv->ap_isolation = g_value_get_enum(value);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
G_OBJECT_WARN_INVALID_PROPERTY_ID(object, prop_id, pspec);
|
|
|
|
|
break;
|
|
|
|
|
}
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
2019-01-11 08:32:54 +01:00
|
|
|
/*****************************************************************************/
|
|
|
|
|
|
2014-07-24 08:53:33 -04:00
|
|
|
static void
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_init(NMSettingWireless *setting)
|
2019-01-11 08:32:54 +01:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv = NM_SETTING_WIRELESS_GET_PRIVATE(setting);
|
2019-01-11 08:32:54 +01:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
/* We use GArray rather than GPtrArray so it will automatically be NULL-terminated */
|
|
|
|
|
priv->mac_address_blacklist = g_array_new(TRUE, FALSE, sizeof(char *));
|
|
|
|
|
g_array_set_clear_func(priv->mac_address_blacklist, (GDestroyNotify) clear_blacklist_item);
|
2019-12-12 11:52:11 +01:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
priv->wowl = NM_SETTING_WIRELESS_WAKE_ON_WLAN_DEFAULT;
|
|
|
|
|
priv->ap_isolation = NM_TERNARY_DEFAULT;
|
2019-01-11 08:32:54 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_setting_wireless_new:
|
|
|
|
|
*
|
|
|
|
|
* Creates a new #NMSettingWireless object with default values.
|
|
|
|
|
*
|
|
|
|
|
* Returns: (transfer full): the new empty #NMSettingWireless object
|
|
|
|
|
**/
|
|
|
|
|
NMSetting *
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_new(void)
|
2019-01-11 08:32:54 +01:00
|
|
|
{
|
2020-11-12 15:57:06 +01:00
|
|
|
return g_object_new(NM_TYPE_SETTING_WIRELESS, NULL);
|
2019-01-11 08:32:54 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2020-09-28 16:03:33 +02:00
|
|
|
finalize(GObject *object)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
NMSettingWirelessPrivate *priv = NM_SETTING_WIRELESS_GET_PRIVATE(object);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_free(priv->mode);
|
|
|
|
|
g_free(priv->band);
|
2019-01-11 08:32:54 +01:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
if (priv->ssid)
|
|
|
|
|
g_bytes_unref(priv->ssid);
|
|
|
|
|
g_free(priv->bssid);
|
|
|
|
|
g_free(priv->device_mac_address);
|
|
|
|
|
g_free(priv->cloned_mac_address);
|
|
|
|
|
g_free(priv->generate_mac_address_mask);
|
|
|
|
|
g_array_unref(priv->mac_address_blacklist);
|
|
|
|
|
nm_clear_pointer(&priv->seen_bssids, g_ptr_array_unref);
|
2019-01-11 08:32:54 +01:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
G_OBJECT_CLASS(nm_setting_wireless_parent_class)->finalize(object);
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2020-09-28 16:03:33 +02:00
|
|
|
nm_setting_wireless_class_init(NMSettingWirelessClass *klass)
|
2014-07-24 08:53:33 -04:00
|
|
|
{
|
2020-09-28 16:03:33 +02:00
|
|
|
GObjectClass * object_class = G_OBJECT_CLASS(klass);
|
|
|
|
|
NMSettingClass *setting_class = NM_SETTING_CLASS(klass);
|
|
|
|
|
GArray * properties_override = _nm_sett_info_property_override_create_array();
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
g_type_class_add_private(klass, sizeof(NMSettingWirelessPrivate));
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
object_class->set_property = set_property;
|
|
|
|
|
object_class->get_property = get_property;
|
|
|
|
|
object_class->finalize = finalize;
|
libnm/trivial: cleanup variable names in settings' class-init functions
- Don't use @parent_class name. This local variable (and @object_class) is
the class instance up-cast to the pointer types of the parents. The point
here is not that it is the direct parent. The point is, that it's the
NMSettingClass type.
Also, it can only be used inconsistently, in face of NMSettingIP4Config,
who's parent type is NMSettingIPConfig. Clearly, inside
nm-setting-ip4-config.c we wouldn't want to use the "parent_class"
name. Consistently rename @parent_class to @setting_class.
- Also rename the pointer to the own class to @klass. "setting_class" is also the
wrong name for that, because the right name would be something like
"setting_6lowpan_class".
However, "klass" is preferred over the latter, because we commonly create new
GObject implementations by copying an existing one. Generic names like "klass"
and "self" inside a type implementation make that simpler.
- drop useless comments like
/* virtual functions */
/* Properties */
It's better to logically and visually structure the code, and avoid trival
remarks about that. They only end up being used inconsistently. If you
even need a stronger visual separator, then an 80 char /****/ line
should be preferred.
2018-07-28 10:43:21 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
setting_class->verify = verify;
|
|
|
|
|
setting_class->compare_property = compare_property;
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:ssid:
|
|
|
|
|
*
|
|
|
|
|
* SSID of the Wi-Fi network. Must be specified.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---keyfile---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: ssid
|
|
|
|
|
* format: string (or decimal-byte list - obsolete)
|
|
|
|
|
* description: SSID of Wi-Fi network.
|
|
|
|
|
* example: ssid=Quick Net
|
|
|
|
|
* ---end---
|
|
|
|
|
* ---ifcfg-rh---
|
|
|
|
|
* property: ssid
|
|
|
|
|
* variable: ESSID
|
|
|
|
|
* description: SSID of Wi-Fi network.
|
|
|
|
|
* example: ESSID="Quick Net"
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_SSID] = g_param_spec_boxed(NM_SETTING_WIRELESS_SSID,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
G_TYPE_BYTES,
|
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:mode:
|
|
|
|
|
*
|
|
|
|
|
* Wi-Fi network mode; one of "infrastructure", "mesh", "adhoc" or "ap". If blank,
|
|
|
|
|
* infrastructure is assumed.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: mode
|
|
|
|
|
* variable: MODE
|
|
|
|
|
* values: Ad-Hoc, Managed (Auto) [case insensitive]
|
|
|
|
|
* description: Wi-Fi network mode.
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_MODE] = g_param_spec_string(NM_SETTING_WIRELESS_MODE,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
NULL,
|
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:band:
|
|
|
|
|
*
|
|
|
|
|
* 802.11 frequency band of the network. One of "a" for 5GHz 802.11a or
|
|
|
|
|
* "bg" for 2.4GHz 802.11. This will lock associations to the Wi-Fi network
|
|
|
|
|
* to the specific band, i.e. if "a" is specified, the device will not
|
|
|
|
|
* associate with the same network in the 2.4GHz band even if the network's
|
|
|
|
|
* settings are compatible. This setting depends on specific driver
|
|
|
|
|
* capability and may not work with all drivers.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: band
|
|
|
|
|
* variable: BAND(+)
|
|
|
|
|
* values: a, bg
|
|
|
|
|
* description: BAND alone is honored, but CHANNEL overrides BAND since it
|
|
|
|
|
* implies a band.
|
|
|
|
|
* example: BAND=bg
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_BAND] = g_param_spec_string(NM_SETTING_WIRELESS_BAND,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
NULL,
|
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
2014-07-24 08:53:33 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:channel:
|
|
|
|
|
*
|
|
|
|
|
* Wireless channel to use for the Wi-Fi connection. The device will only
|
|
|
|
|
* join (or create for Ad-Hoc networks) a Wi-Fi network on the specified
|
|
|
|
|
* channel. Because channel numbers overlap between bands, this property
|
|
|
|
|
* also requires the "band" property to be set.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: channel
|
|
|
|
|
* variable: CHANNEL
|
|
|
|
|
* description: Channel used for the Wi-Fi communication.
|
|
|
|
|
* Channels greater than 14 mean "a" band, otherwise the
|
|
|
|
|
* band is "bg".
|
|
|
|
|
* example: CHANNEL=6
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_CHANNEL] = g_param_spec_uint(NM_SETTING_WIRELESS_CHANNEL,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
0,
|
|
|
|
|
G_MAXUINT32,
|
|
|
|
|
0,
|
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:bssid:
|
|
|
|
|
*
|
|
|
|
|
* If specified, directs the device to only associate with the given access
|
|
|
|
|
* point. This capability is highly driver dependent and not supported by
|
|
|
|
|
* all devices. Note: this property does not control the BSSID used when
|
|
|
|
|
* creating an Ad-Hoc network and is unlikely to in the future.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: bssid
|
|
|
|
|
* variable: BSSID(+)
|
|
|
|
|
* description: Restricts association only to a single AP.
|
|
|
|
|
* example: BSSID=00:1E:BD:64:83:21
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_BSSID] = g_param_spec_string(NM_SETTING_WIRELESS_BSSID,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
NULL,
|
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
_nm_properties_override_gobj(properties_override,
|
|
|
|
|
obj_properties[PROP_BSSID],
|
|
|
|
|
&nm_sett_info_propert_type_mac_address);
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:rate:
|
|
|
|
|
*
|
|
|
|
|
* If non-zero, directs the device to only use the specified bitrate for
|
|
|
|
|
* communication with the access point. Units are in Kb/s, ie 5500 = 5.5
|
|
|
|
|
* Mbit/s. This property is highly driver dependent and not all devices
|
|
|
|
|
* support setting a static bitrate.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: rate
|
|
|
|
|
* variable: (none)
|
|
|
|
|
* description: This property is not handled by ifcfg-rh plugin.
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_RATE] = g_param_spec_uint(NM_SETTING_WIRELESS_RATE,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
0,
|
|
|
|
|
G_MAXUINT32,
|
|
|
|
|
0,
|
|
|
|
|
G_PARAM_READWRITE | NM_SETTING_PARAM_FUZZY_IGNORE
|
|
|
|
|
| G_PARAM_STATIC_STRINGS);
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:tx-power:
|
|
|
|
|
*
|
|
|
|
|
* If non-zero, directs the device to use the specified transmit power.
|
|
|
|
|
* Units are dBm. This property is highly driver dependent and not all
|
|
|
|
|
* devices support setting a static transmit power.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: tx-power
|
|
|
|
|
* variable: (none)
|
|
|
|
|
* description: This property is not handled by ifcfg-rh plugin.
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_TX_POWER] = g_param_spec_uint(
|
|
|
|
|
NM_SETTING_WIRELESS_TX_POWER,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
0,
|
|
|
|
|
G_MAXUINT32,
|
|
|
|
|
0,
|
|
|
|
|
G_PARAM_READWRITE | NM_SETTING_PARAM_FUZZY_IGNORE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:mac-address:
|
|
|
|
|
*
|
|
|
|
|
* If specified, this connection will only apply to the Wi-Fi device whose
|
|
|
|
|
* permanent MAC address matches. This property does not change the MAC
|
|
|
|
|
* address of the device (i.e. MAC spoofing).
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---keyfile---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: mac-address
|
|
|
|
|
* format: usual hex-digits-and-colons notation
|
|
|
|
|
* description: MAC address in traditional hex-digits-and-colons notation
|
|
|
|
|
* (e.g. 00:22:68:12:79:A2), or semicolon separated list of 6 bytes (obsolete)
|
|
|
|
|
* (e.g. 0;34;104;18;121;162).
|
|
|
|
|
* ---end---
|
|
|
|
|
* ---ifcfg-rh---
|
|
|
|
|
* property: mac-address
|
|
|
|
|
* variable: HWADDR
|
|
|
|
|
* description: Hardware address of the device in traditional hex-digits-and-colons
|
|
|
|
|
* notation (e.g. 00:22:68:14:5A:05).
|
|
|
|
|
* Note that for initscripts this is the current MAC address of the device as found
|
|
|
|
|
* during ifup. For NetworkManager this is the permanent MAC address. Or in case no
|
|
|
|
|
* permanent MAC address exists, the MAC address initially configured on the device.
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_MAC_ADDRESS] =
|
|
|
|
|
g_param_spec_string(NM_SETTING_WIRELESS_MAC_ADDRESS,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
NULL,
|
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
_nm_properties_override_gobj(properties_override,
|
|
|
|
|
obj_properties[PROP_MAC_ADDRESS],
|
|
|
|
|
&nm_sett_info_propert_type_mac_address);
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:cloned-mac-address:
|
|
|
|
|
*
|
|
|
|
|
* If specified, request that the device use this MAC address instead.
|
|
|
|
|
* This is known as MAC cloning or spoofing.
|
|
|
|
|
*
|
|
|
|
|
* Beside explicitly specifying a MAC address, the special values "preserve", "permanent",
|
|
|
|
|
* "random" and "stable" are supported.
|
|
|
|
|
* "preserve" means not to touch the MAC address on activation.
|
|
|
|
|
* "permanent" means to use the permanent hardware address of the device.
|
|
|
|
|
* "random" creates a random MAC address on each connect.
|
|
|
|
|
* "stable" creates a hashed MAC address based on connection.stable-id and a
|
|
|
|
|
* machine dependent key.
|
|
|
|
|
*
|
|
|
|
|
* If unspecified, the value can be overwritten via global defaults, see manual
|
|
|
|
|
* of NetworkManager.conf. If still unspecified, it defaults to "preserve"
|
|
|
|
|
* (older versions of NetworkManager may use a different default value).
|
|
|
|
|
*
|
|
|
|
|
* On D-Bus, this field is expressed as "assigned-mac-address" or the deprecated
|
|
|
|
|
* "cloned-mac-address".
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---keyfile---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: cloned-mac-address
|
|
|
|
|
* format: usual hex-digits-and-colons notation
|
|
|
|
|
* description: Cloned MAC address in traditional hex-digits-and-colons notation
|
|
|
|
|
* (e.g. 00:22:68:12:79:B2), or semicolon separated list of 6 bytes (obsolete)
|
|
|
|
|
* (e.g. 0;34;104;18;121;178).
|
|
|
|
|
* ---end---
|
|
|
|
|
* ---ifcfg-rh---
|
|
|
|
|
* property: cloned-mac-address
|
|
|
|
|
* variable: MACADDR
|
|
|
|
|
* description: Cloned (spoofed) MAC address in traditional hex-digits-and-colons
|
|
|
|
|
* notation (e.g. 00:22:68:14:5A:99).
|
|
|
|
|
* ---end---
|
|
|
|
|
* ---dbus---
|
|
|
|
|
* property: cloned-mac-address
|
|
|
|
|
* format: byte array
|
|
|
|
|
* description: This D-Bus field is deprecated in favor of "assigned-mac-address"
|
|
|
|
|
* which is more flexible and allows specifying special variants like "random".
|
|
|
|
|
* For libnm and nmcli, this field is called "cloned-mac-address".
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_CLONED_MAC_ADDRESS] = g_param_spec_string(
|
|
|
|
|
NM_SETTING_WIRELESS_CLONED_MAC_ADDRESS,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
NULL,
|
|
|
|
|
G_PARAM_READWRITE | NM_SETTING_PARAM_INFERRABLE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
_nm_properties_override_gobj(properties_override,
|
|
|
|
|
obj_properties[PROP_CLONED_MAC_ADDRESS],
|
|
|
|
|
&nm_sett_info_propert_type_cloned_mac_address);
|
|
|
|
|
|
|
|
|
|
/* ---dbus---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: assigned-mac-address
|
|
|
|
|
* format: string
|
|
|
|
|
* description: The new field for the cloned MAC address. It can be either
|
|
|
|
|
* a hardware address in ASCII representation, or one of the special values
|
|
|
|
|
* "preserve", "permanent", "random" or "stable".
|
|
|
|
|
* This field replaces the deprecated "cloned-mac-address" on D-Bus, which
|
|
|
|
|
* can only contain explicit hardware addresses. Note that this property
|
|
|
|
|
* only exists in D-Bus API. libnm and nmcli continue to call this property
|
|
|
|
|
* "cloned-mac-address".
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
_nm_properties_override_dbus(properties_override,
|
|
|
|
|
"assigned-mac-address",
|
|
|
|
|
&nm_sett_info_propert_type_assigned_mac_address);
|
all: make MAC address randomization algorithm configurable
For the per-connection settings "ethernet.cloned-mac-address"
and "wifi.cloned-mac-address", and for the per-device setting
"wifi.scan-rand-mac-address", we may generate MAC addresses using
either the "random" or "stable" algorithm.
Add new properties "generate-mac-address-mask" that allow to configure
which bits of the MAC address will be scrambled.
By default, the "random" and "stable" algorithms scamble all bits
of the MAC address, including the OUI part and generate a locally-
administered, unicast address.
By specifying a MAC address mask, we can now configure to perserve
parts of the current MAC address of the device. For example, setting
"FF:FF:FF:00:00:00" will preserve the first 3 octects of the current
MAC address.
One can also explicitly specify a MAC address to use instead of the
current MAC address. For example, "FF:FF:FF:00:00:00 68:F7:28:00:00:00"
sets the OUI part of the MAC address to "68:F7:28" while scrambling
the last 3 octects.
Similarly, "02:00:00:00:00:00 00:00:00:00:00:00" will scamble
all bits of the MAC address, except clearing the second-least
significant bit. Thus, creating a burned-in address, globally
administered.
One can also supply a list of MAC addresses like
"FF:FF:FF:00:00:00 68:F7:28:00:00:00 00:0C:29:00:00:00 ..." in which
case a MAC address is choosen randomly.
To fully scamble the MAC address one can configure
"02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00".
which also randomly creates either a locally or globally administered
address.
With this, the following macchanger options can be implemented:
`macchanger --random`
This is the default if no mask is configured.
-> ""
while is the same as:
-> "00:00:00:00:00:00"
-> "02:00:00:00:00:00 02:00:00:00:00:00"
`macchanger --random --bia`
-> "02:00:00:00:00:00 00:00:00:00:00:00"
`macchanger --ending`
This option cannot be fully implemented, because macchanger
uses the current MAC address but also implies --bia.
-> "FF:FF:FF:00:00:00"
This would yields the same result only if the current MAC address
is already a burned-in address too. Otherwise, it has not the same
effect as --ending.
-> "FF:FF:FF:00:00:00 <MAC_ADDR>"
Alternatively, instead of using the current MAC address,
spell the OUI part out. But again, that is not really the
same as macchanger does because you explictly have to name
the OUI part to use.
`machanger --another`
`machanger --another_any`
-> "FF:FF:FF:00:00:00 <MAC_ADDR> <MAC_ADDR> ..."
"$(printf "FF:FF:FF:00:00:00 %s\n" "$(sed -n 's/^\([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) .*/\1:\2:\3:00:00:00/p' /usr/share/macchanger/wireless.list | xargs)")"
2016-06-22 20:31:39 +02:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:generate-mac-address-mask:
|
|
|
|
|
*
|
|
|
|
|
* With #NMSettingWireless:cloned-mac-address setting "random" or "stable",
|
|
|
|
|
* by default all bits of the MAC address are scrambled and a locally-administered,
|
|
|
|
|
* unicast MAC address is created. This property allows to specify that certain bits
|
|
|
|
|
* are fixed. Note that the least significant bit of the first MAC address will
|
|
|
|
|
* always be unset to create a unicast MAC address.
|
|
|
|
|
*
|
|
|
|
|
* If the property is %NULL, it is eligible to be overwritten by a default
|
|
|
|
|
* connection setting. If the value is still %NULL or an empty string, the
|
|
|
|
|
* default is to create a locally-administered, unicast MAC address.
|
|
|
|
|
*
|
|
|
|
|
* If the value contains one MAC address, this address is used as mask. The set
|
|
|
|
|
* bits of the mask are to be filled with the current MAC address of the device,
|
|
|
|
|
* while the unset bits are subject to randomization.
|
|
|
|
|
* Setting "FE:FF:FF:00:00:00" means to preserve the OUI of the current MAC address
|
|
|
|
|
* and only randomize the lower 3 bytes using the "random" or "stable" algorithm.
|
|
|
|
|
*
|
|
|
|
|
* If the value contains one additional MAC address after the mask,
|
|
|
|
|
* this address is used instead of the current MAC address to fill the bits
|
|
|
|
|
* that shall not be randomized. For example, a value of
|
|
|
|
|
* "FE:FF:FF:00:00:00 68:F7:28:00:00:00" will set the OUI of the MAC address
|
|
|
|
|
* to 68:F7:28, while the lower bits are randomized. A value of
|
|
|
|
|
* "02:00:00:00:00:00 00:00:00:00:00:00" will create a fully scrambled
|
|
|
|
|
* globally-administered, burned-in MAC address.
|
|
|
|
|
*
|
|
|
|
|
* If the value contains more than one additional MAC addresses, one of
|
|
|
|
|
* them is chosen randomly. For example, "02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00"
|
|
|
|
|
* will create a fully scrambled MAC address, randomly locally or globally
|
|
|
|
|
* administered.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: generate-mac-address-mask
|
|
|
|
|
* variable: GENERATE_MAC_ADDRESS_MASK(+)
|
|
|
|
|
* description: the MAC address mask for generating randomized and stable
|
|
|
|
|
* cloned-mac-address.
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_GENERATE_MAC_ADDRESS_MASK] = g_param_spec_string(
|
|
|
|
|
NM_SETTING_WIRELESS_GENERATE_MAC_ADDRESS_MASK,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
NULL,
|
|
|
|
|
G_PARAM_READWRITE | NM_SETTING_PARAM_FUZZY_IGNORE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:mac-address-blacklist:
|
|
|
|
|
*
|
|
|
|
|
* A list of permanent MAC addresses of Wi-Fi devices to which this
|
|
|
|
|
* connection should never apply. Each MAC address should be given in the
|
|
|
|
|
* standard hex-digits-and-colons notation (eg "00:11:22:33:44:55").
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---keyfile---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: mac-address-blacklist
|
|
|
|
|
* format: list of MACs (separated with semicolons)
|
|
|
|
|
* description: MAC address blacklist.
|
|
|
|
|
* example: mac-address-blacklist= 00:22:68:12:79:A6;00:22:68:12:79:78
|
|
|
|
|
* ---end---
|
|
|
|
|
* ---ifcfg-rh---
|
|
|
|
|
* property: mac-address-blacklist
|
|
|
|
|
* variable: HWADDR_BLACKLIST(+)
|
|
|
|
|
* description: It denies usage of the connection for any device whose address
|
|
|
|
|
* is listed.
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_MAC_ADDRESS_BLACKLIST] = g_param_spec_boxed(
|
|
|
|
|
NM_SETTING_WIRELESS_MAC_ADDRESS_BLACKLIST,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
G_TYPE_STRV,
|
|
|
|
|
G_PARAM_READWRITE | NM_SETTING_PARAM_FUZZY_IGNORE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:seen-bssids:
|
|
|
|
|
*
|
|
|
|
|
* A list of BSSIDs (each BSSID formatted as a MAC address like
|
|
|
|
|
* "00:11:22:33:44:55") that have been detected as part of the Wi-Fi
|
|
|
|
|
* network. NetworkManager internally tracks previously seen BSSIDs. The
|
|
|
|
|
* property is only meant for reading and reflects the BSSID list of
|
|
|
|
|
* NetworkManager. The changes you make to this property will not be
|
|
|
|
|
* preserved.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: seen-bssids
|
|
|
|
|
* variable: (none)
|
|
|
|
|
* description: This property is not handled by ifcfg-rh plugin.
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_SEEN_BSSIDS] = g_param_spec_boxed(
|
|
|
|
|
NM_SETTING_WIRELESS_SEEN_BSSIDS,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
G_TYPE_STRV,
|
|
|
|
|
G_PARAM_READWRITE | NM_SETTING_PARAM_FUZZY_IGNORE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
_nm_properties_override_gobj(
|
|
|
|
|
properties_override,
|
|
|
|
|
obj_properties[PROP_SEEN_BSSIDS],
|
|
|
|
|
NM_SETT_INFO_PROPERT_TYPE(.dbus_type = G_VARIANT_TYPE_STRING_ARRAY,
|
|
|
|
|
.to_dbus_fcn = _to_dbus_fcn_seen_bssids, ));
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:mtu:
|
|
|
|
|
*
|
|
|
|
|
* If non-zero, only transmit packets of the specified size or smaller,
|
|
|
|
|
* breaking larger packets up into multiple Ethernet frames.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: mtu
|
|
|
|
|
* variable: MTU
|
|
|
|
|
* description: MTU of the wireless interface.
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_MTU] = g_param_spec_uint(NM_SETTING_WIRELESS_MTU,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
0,
|
|
|
|
|
G_MAXUINT32,
|
|
|
|
|
0,
|
|
|
|
|
G_PARAM_READWRITE | NM_SETTING_PARAM_FUZZY_IGNORE
|
|
|
|
|
| G_PARAM_STATIC_STRINGS);
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:hidden:
|
|
|
|
|
*
|
|
|
|
|
* If %TRUE, indicates that the network is a non-broadcasting network that
|
|
|
|
|
* hides its SSID. This works both in infrastructure and AP mode.
|
|
|
|
|
*
|
|
|
|
|
* In infrastructure mode, various workarounds are used for a more reliable
|
|
|
|
|
* discovery of hidden networks, such as probe-scanning the SSID. However,
|
|
|
|
|
* these workarounds expose inherent insecurities with hidden SSID networks,
|
|
|
|
|
* and thus hidden SSID networks should be used with caution.
|
|
|
|
|
*
|
|
|
|
|
* In AP mode, the created network does not broadcast its SSID.
|
|
|
|
|
*
|
|
|
|
|
* Note that marking the network as hidden may be a privacy issue for you
|
|
|
|
|
* (in infrastructure mode) or client stations (in AP mode), as the explicit
|
|
|
|
|
* probe-scans are distinctly recognizable on the air.
|
|
|
|
|
*
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: hidden
|
|
|
|
|
* variable: SSID_HIDDEN(+)
|
|
|
|
|
* description: Whether the network hides the SSID.
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_HIDDEN] = g_param_spec_boolean(NM_SETTING_WIRELESS_HIDDEN,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
FALSE,
|
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
2014-07-29 18:42:02 -04:00
|
|
|
|
2020-09-28 16:03:33 +02:00
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:powersave:
|
|
|
|
|
*
|
|
|
|
|
* One of %NM_SETTING_WIRELESS_POWERSAVE_DISABLE (disable Wi-Fi power
|
|
|
|
|
* saving), %NM_SETTING_WIRELESS_POWERSAVE_ENABLE (enable Wi-Fi power
|
|
|
|
|
* saving), %NM_SETTING_WIRELESS_POWERSAVE_IGNORE (don't touch currently
|
|
|
|
|
* configure setting) or %NM_SETTING_WIRELESS_POWERSAVE_DEFAULT (use the
|
|
|
|
|
* globally configured value). All other values are reserved.
|
|
|
|
|
*
|
|
|
|
|
* Since: 1.2
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: powersave
|
|
|
|
|
* variable: POWERSAVE(+)
|
|
|
|
|
* values: default, ignore, enable, disable
|
|
|
|
|
* description: Enables or disables Wi-Fi power saving.
|
|
|
|
|
* example: POWERSAVE=enable
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_POWERSAVE] = g_param_spec_uint(NM_SETTING_WIRELESS_POWERSAVE,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
0,
|
|
|
|
|
G_MAXUINT32,
|
|
|
|
|
NM_SETTING_WIRELESS_POWERSAVE_DEFAULT,
|
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:mac-address-randomization:
|
|
|
|
|
*
|
|
|
|
|
* One of %NM_SETTING_MAC_RANDOMIZATION_DEFAULT (never randomize unless
|
|
|
|
|
* the user has set a global default to randomize and the supplicant
|
|
|
|
|
* supports randomization), %NM_SETTING_MAC_RANDOMIZATION_NEVER (never
|
|
|
|
|
* randomize the MAC address), or %NM_SETTING_MAC_RANDOMIZATION_ALWAYS
|
|
|
|
|
* (always randomize the MAC address). This property is deprecated for
|
|
|
|
|
* 'cloned-mac-address'.
|
|
|
|
|
*
|
|
|
|
|
* Since: 1.2
|
|
|
|
|
* Deprecated: 1.4: Deprecated by NMSettingWireless:cloned-mac-address property.
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: mac-address-randomization
|
|
|
|
|
* variable: MAC_ADDRESS_RANDOMIZATION(+)
|
|
|
|
|
* values: default, never, always
|
|
|
|
|
* description: Enables or disables Wi-Fi MAC address randomization.
|
|
|
|
|
* example: MAC_ADDRESS_RANDOMIZATION=always
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_MAC_ADDRESS_RANDOMIZATION] =
|
|
|
|
|
g_param_spec_uint(NM_SETTING_WIRELESS_MAC_ADDRESS_RANDOMIZATION,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
0,
|
|
|
|
|
G_MAXUINT32,
|
|
|
|
|
NM_SETTING_MAC_RANDOMIZATION_DEFAULT,
|
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
|
|
|
|
|
/* Compatibility for deprecated property */
|
|
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: security
|
|
|
|
|
* variable: (none)
|
|
|
|
|
* description: This property is deprecated and not handled by ifcfg-rh-plugin.
|
|
|
|
|
* ---end---
|
|
|
|
|
* ---dbus---
|
|
|
|
|
* property: security
|
|
|
|
|
* description: This property is deprecated, but can be set to the value
|
|
|
|
|
* '802-11-wireless-security' when a wireless security setting is also
|
|
|
|
|
* present in the connection dictionary, for compatibility with very old
|
|
|
|
|
* NetworkManager daemons.
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
_nm_properties_override_dbus(
|
|
|
|
|
properties_override,
|
|
|
|
|
"security",
|
|
|
|
|
NM_SETT_INFO_PROPERT_TYPE(.dbus_type = G_VARIANT_TYPE_STRING,
|
|
|
|
|
.to_dbus_fcn = nm_setting_wireless_get_security, ));
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:wake-on-wlan:
|
|
|
|
|
*
|
|
|
|
|
* The #NMSettingWirelessWakeOnWLan options to enable. Not all devices support all options.
|
|
|
|
|
* May be any combination of %NM_SETTING_WIRELESS_WAKE_ON_WLAN_ANY,
|
|
|
|
|
* %NM_SETTING_WIRELESS_WAKE_ON_WLAN_DISCONNECT,
|
|
|
|
|
* %NM_SETTING_WIRELESS_WAKE_ON_WLAN_MAGIC,
|
|
|
|
|
* %NM_SETTING_WIRELESS_WAKE_ON_WLAN_GTK_REKEY_FAILURE,
|
|
|
|
|
* %NM_SETTING_WIRELESS_WAKE_ON_WLAN_EAP_IDENTITY_REQUEST,
|
|
|
|
|
* %NM_SETTING_WIRELESS_WAKE_ON_WLAN_4WAY_HANDSHAKE,
|
|
|
|
|
* %NM_SETTING_WIRELESS_WAKE_ON_WLAN_RFKILL_RELEASE,
|
|
|
|
|
* %NM_SETTING_WIRELESS_WAKE_ON_WLAN_TCP or the special values
|
|
|
|
|
* %NM_SETTING_WIRELESS_WAKE_ON_WLAN_DEFAULT (to use global settings) and
|
|
|
|
|
* %NM_SETTING_WIRELESS_WAKE_ON_WLAN_IGNORE (to disable management of Wake-on-LAN in
|
|
|
|
|
* NetworkManager).
|
|
|
|
|
*
|
|
|
|
|
* Since: 1.12
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_WAKE_ON_WLAN] =
|
|
|
|
|
g_param_spec_uint(NM_SETTING_WIRELESS_WAKE_ON_WLAN,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
0,
|
|
|
|
|
G_MAXUINT32,
|
|
|
|
|
NM_SETTING_WIRELESS_WAKE_ON_WLAN_DEFAULT,
|
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
|
|
|
|
|
/**
|
2020-09-28 14:50:01 +02:00
|
|
|
* NMSettingWireless:ap-isolation
|
|
|
|
|
*
|
|
|
|
|
* Configures AP isolation, which prevents communication between
|
|
|
|
|
* wireless devices connected to this AP. This property can be set
|
|
|
|
|
* to a value different from %NM_TERNARY_DEFAULT only when the
|
|
|
|
|
* interface is configured in AP mode.
|
|
|
|
|
*
|
|
|
|
|
* If set to %NM_TERNARY_TRUE, devices are not able to communicate
|
|
|
|
|
* with each other. This increases security because it protects
|
|
|
|
|
* devices against attacks from other clients in the network. At
|
|
|
|
|
* the same time, it prevents devices to access resources on the
|
|
|
|
|
* same wireless networks as file shares, printers, etc.
|
|
|
|
|
*
|
|
|
|
|
* If set to %NM_TERNARY_FALSE, devices can talk to each other.
|
|
|
|
|
*
|
|
|
|
|
* When set to %NM_TERNARY_DEFAULT, the global default is used; in
|
|
|
|
|
* case the global default is unspecified it is assumed to be
|
|
|
|
|
* %NM_TERNARY_FALSE.
|
|
|
|
|
*
|
|
|
|
|
* Since: 1.28
|
|
|
|
|
**/
|
2020-09-28 16:03:33 +02:00
|
|
|
/* ---ifcfg-rh---
|
2020-09-28 14:50:01 +02:00
|
|
|
* property: ap-isolation
|
|
|
|
|
* variable: AP_ISOLATION(+)
|
|
|
|
|
* values: "yes", "no"
|
|
|
|
|
* default: missing variable means global default
|
|
|
|
|
* description: Whether AP isolation is enabled
|
|
|
|
|
* ---end---
|
|
|
|
|
*/
|
2020-09-28 16:03:33 +02:00
|
|
|
obj_properties[PROP_AP_ISOLATION] = g_param_spec_enum(
|
|
|
|
|
NM_SETTING_WIRELESS_AP_ISOLATION,
|
|
|
|
|
"",
|
|
|
|
|
"",
|
|
|
|
|
NM_TYPE_TERNARY,
|
|
|
|
|
NM_TERNARY_DEFAULT,
|
|
|
|
|
NM_SETTING_PARAM_FUZZY_IGNORE | G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
|
|
|
|
|
|
|
|
|
|
g_object_class_install_properties(object_class, _PROPERTY_ENUMS_LAST, obj_properties);
|
|
|
|
|
|
|
|
|
|
_nm_setting_class_commit_full(setting_class,
|
|
|
|
|
NM_META_SETTING_TYPE_WIRELESS,
|
|
|
|
|
NULL,
|
|
|
|
|
properties_override);
|
2014-07-24 08:53:33 -04:00
|
|
|
}
|