1 /* 2 * hostapd - Driver operations 3 * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9 #include "utils/includes.h" 10 11 #include "utils/common.h" 12 #include "common/ieee802_11_defs.h" 13 #include "common/hw_features_common.h" 14 #include "wps/wps.h" 15 #include "p2p/p2p.h" 16 #include "hostapd.h" 17 #include "ieee802_11.h" 18 #include "sta_info.h" 19 #include "ap_config.h" 20 #include "p2p_hostapd.h" 21 #include "hs20.h" 22 #include "wpa_auth.h" 23 #include "ap_drv_ops.h" 24 25 26 u32 hostapd_sta_flags_to_drv(u32 flags) 27 { 28 int res = 0; 29 if (flags & WLAN_STA_AUTHORIZED) 30 res |= WPA_STA_AUTHORIZED; 31 if (flags & WLAN_STA_WMM) 32 res |= WPA_STA_WMM; 33 if (flags & WLAN_STA_SHORT_PREAMBLE) 34 res |= WPA_STA_SHORT_PREAMBLE; 35 if (flags & WLAN_STA_MFP) 36 res |= WPA_STA_MFP; 37 if (flags & WLAN_STA_AUTH) 38 res |= WPA_STA_AUTHENTICATED; 39 if (flags & WLAN_STA_ASSOC) 40 res |= WPA_STA_ASSOCIATED; 41 return res; 42 } 43 44 45 static int add_buf(struct wpabuf **dst, const struct wpabuf *src) 46 { 47 if (!src) 48 return 0; 49 if (wpabuf_resize(dst, wpabuf_len(src)) != 0) 50 return -1; 51 wpabuf_put_buf(*dst, src); 52 return 0; 53 } 54 55 56 static int add_buf_data(struct wpabuf **dst, const u8 *data, size_t len) 57 { 58 if (!data || !len) 59 return 0; 60 if (wpabuf_resize(dst, len) != 0) 61 return -1; 62 wpabuf_put_data(*dst, data, len); 63 return 0; 64 } 65 66 67 int hostapd_build_ap_extra_ies(struct hostapd_data *hapd, 68 struct wpabuf **beacon_ret, 69 struct wpabuf **proberesp_ret, 70 struct wpabuf **assocresp_ret) 71 { 72 struct wpabuf *beacon = NULL, *proberesp = NULL, *assocresp = NULL; 73 u8 buf[200], *pos; 74 75 *beacon_ret = *proberesp_ret = *assocresp_ret = NULL; 76 77 pos = buf; 78 pos = hostapd_eid_time_adv(hapd, pos); 79 if (add_buf_data(&beacon, buf, pos - buf) < 0) 80 goto fail; 81 pos = hostapd_eid_time_zone(hapd, pos); 82 if (add_buf_data(&proberesp, buf, pos - buf) < 0) 83 goto fail; 84 85 pos = buf; 86 pos = hostapd_eid_ext_capab(hapd, pos); 87 if (add_buf_data(&assocresp, buf, pos - buf) < 0) 88 goto fail; 89 pos = hostapd_eid_interworking(hapd, pos); 90 pos = hostapd_eid_adv_proto(hapd, pos); 91 pos = hostapd_eid_roaming_consortium(hapd, pos); 92 if (add_buf_data(&beacon, buf, pos - buf) < 0 || 93 add_buf_data(&proberesp, buf, pos - buf) < 0) 94 goto fail; 95 96 #ifdef CONFIG_FST 97 if (add_buf(&beacon, hapd->iface->fst_ies) < 0 || 98 add_buf(&proberesp, hapd->iface->fst_ies) < 0 || 99 add_buf(&assocresp, hapd->iface->fst_ies) < 0) 100 goto fail; 101 #endif /* CONFIG_FST */ 102 103 #ifdef CONFIG_FILS 104 pos = hostapd_eid_fils_indic(hapd, buf, 0); 105 if (add_buf_data(&beacon, buf, pos - buf) < 0 || 106 add_buf_data(&proberesp, buf, pos - buf) < 0) 107 goto fail; 108 #endif /* CONFIG_FILS */ 109 110 if (add_buf(&beacon, hapd->wps_beacon_ie) < 0 || 111 add_buf(&proberesp, hapd->wps_probe_resp_ie) < 0) 112 goto fail; 113 114 #ifdef CONFIG_P2P 115 if (add_buf(&beacon, hapd->p2p_beacon_ie) < 0 || 116 add_buf(&proberesp, hapd->p2p_probe_resp_ie) < 0) 117 goto fail; 118 #endif /* CONFIG_P2P */ 119 120 #ifdef CONFIG_P2P_MANAGER 121 if (hapd->conf->p2p & P2P_MANAGE) { 122 if (wpabuf_resize(&beacon, 100) == 0) { 123 u8 *start, *p; 124 start = wpabuf_put(beacon, 0); 125 p = hostapd_eid_p2p_manage(hapd, start); 126 wpabuf_put(beacon, p - start); 127 } 128 129 if (wpabuf_resize(&proberesp, 100) == 0) { 130 u8 *start, *p; 131 start = wpabuf_put(proberesp, 0); 132 p = hostapd_eid_p2p_manage(hapd, start); 133 wpabuf_put(proberesp, p - start); 134 } 135 } 136 #endif /* CONFIG_P2P_MANAGER */ 137 138 #ifdef CONFIG_WPS 139 if (hapd->conf->wps_state) { 140 struct wpabuf *a = wps_build_assoc_resp_ie(); 141 add_buf(&assocresp, a); 142 wpabuf_free(a); 143 } 144 #endif /* CONFIG_WPS */ 145 146 #ifdef CONFIG_P2P_MANAGER 147 if (hapd->conf->p2p & P2P_MANAGE) { 148 if (wpabuf_resize(&assocresp, 100) == 0) { 149 u8 *start, *p; 150 start = wpabuf_put(assocresp, 0); 151 p = hostapd_eid_p2p_manage(hapd, start); 152 wpabuf_put(assocresp, p - start); 153 } 154 } 155 #endif /* CONFIG_P2P_MANAGER */ 156 157 #ifdef CONFIG_WIFI_DISPLAY 158 if (hapd->p2p_group) { 159 struct wpabuf *a; 160 a = p2p_group_assoc_resp_ie(hapd->p2p_group, P2P_SC_SUCCESS); 161 add_buf(&assocresp, a); 162 wpabuf_free(a); 163 } 164 #endif /* CONFIG_WIFI_DISPLAY */ 165 166 #ifdef CONFIG_HS20 167 pos = hostapd_eid_hs20_indication(hapd, buf); 168 if (add_buf_data(&beacon, buf, pos - buf) < 0 || 169 add_buf_data(&proberesp, buf, pos - buf) < 0) 170 goto fail; 171 172 pos = hostapd_eid_osen(hapd, buf); 173 if (add_buf_data(&beacon, buf, pos - buf) < 0 || 174 add_buf_data(&proberesp, buf, pos - buf) < 0) 175 goto fail; 176 #endif /* CONFIG_HS20 */ 177 178 #ifdef CONFIG_MBO 179 if (hapd->conf->mbo_enabled || 180 OCE_STA_CFON_ENABLED(hapd) || OCE_AP_ENABLED(hapd)) { 181 pos = hostapd_eid_mbo(hapd, buf, sizeof(buf)); 182 if (add_buf_data(&beacon, buf, pos - buf) < 0 || 183 add_buf_data(&proberesp, buf, pos - buf) < 0 || 184 add_buf_data(&assocresp, buf, pos - buf) < 0) 185 goto fail; 186 } 187 #endif /* CONFIG_MBO */ 188 189 #ifdef CONFIG_OWE 190 pos = hostapd_eid_owe_trans(hapd, buf, sizeof(buf)); 191 if (add_buf_data(&beacon, buf, pos - buf) < 0 || 192 add_buf_data(&proberesp, buf, pos - buf) < 0) 193 goto fail; 194 #endif /* CONFIG_OWE */ 195 196 add_buf(&beacon, hapd->conf->vendor_elements); 197 add_buf(&proberesp, hapd->conf->vendor_elements); 198 add_buf(&assocresp, hapd->conf->assocresp_elements); 199 200 *beacon_ret = beacon; 201 *proberesp_ret = proberesp; 202 *assocresp_ret = assocresp; 203 204 return 0; 205 206 fail: 207 wpabuf_free(beacon); 208 wpabuf_free(proberesp); 209 wpabuf_free(assocresp); 210 return -1; 211 } 212 213 214 void hostapd_free_ap_extra_ies(struct hostapd_data *hapd, 215 struct wpabuf *beacon, 216 struct wpabuf *proberesp, 217 struct wpabuf *assocresp) 218 { 219 wpabuf_free(beacon); 220 wpabuf_free(proberesp); 221 wpabuf_free(assocresp); 222 } 223 224 225 int hostapd_reset_ap_wps_ie(struct hostapd_data *hapd) 226 { 227 if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL) 228 return 0; 229 230 return hapd->driver->set_ap_wps_ie(hapd->drv_priv, NULL, NULL, NULL); 231 } 232 233 234 int hostapd_set_ap_wps_ie(struct hostapd_data *hapd) 235 { 236 struct wpabuf *beacon, *proberesp, *assocresp; 237 int ret; 238 239 if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL) 240 return 0; 241 242 if (hostapd_build_ap_extra_ies(hapd, &beacon, &proberesp, &assocresp) < 243 0) 244 return -1; 245 246 ret = hapd->driver->set_ap_wps_ie(hapd->drv_priv, beacon, proberesp, 247 assocresp); 248 249 hostapd_free_ap_extra_ies(hapd, beacon, proberesp, assocresp); 250 251 return ret; 252 } 253 254 255 int hostapd_set_authorized(struct hostapd_data *hapd, 256 struct sta_info *sta, int authorized) 257 { 258 if (authorized) { 259 return hostapd_sta_set_flags(hapd, sta->addr, 260 hostapd_sta_flags_to_drv( 261 sta->flags), 262 WPA_STA_AUTHORIZED, ~0); 263 } 264 265 return hostapd_sta_set_flags(hapd, sta->addr, 266 hostapd_sta_flags_to_drv(sta->flags), 267 0, ~WPA_STA_AUTHORIZED); 268 } 269 270 271 int hostapd_set_sta_flags(struct hostapd_data *hapd, struct sta_info *sta) 272 { 273 int set_flags, total_flags, flags_and, flags_or; 274 total_flags = hostapd_sta_flags_to_drv(sta->flags); 275 set_flags = WPA_STA_SHORT_PREAMBLE | WPA_STA_WMM | WPA_STA_MFP; 276 if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) || 277 sta->auth_alg == WLAN_AUTH_FT) && 278 sta->flags & WLAN_STA_AUTHORIZED) 279 set_flags |= WPA_STA_AUTHORIZED; 280 flags_or = total_flags & set_flags; 281 flags_and = total_flags | ~set_flags; 282 return hostapd_sta_set_flags(hapd, sta->addr, total_flags, 283 flags_or, flags_and); 284 } 285 286 287 int hostapd_set_drv_ieee8021x(struct hostapd_data *hapd, const char *ifname, 288 int enabled) 289 { 290 struct wpa_bss_params params; 291 os_memset(¶ms, 0, sizeof(params)); 292 params.ifname = ifname; 293 params.enabled = enabled; 294 if (enabled) { 295 params.wpa = hapd->conf->wpa; 296 params.ieee802_1x = hapd->conf->ieee802_1x; 297 params.wpa_group = hapd->conf->wpa_group; 298 if ((hapd->conf->wpa & (WPA_PROTO_WPA | WPA_PROTO_RSN)) == 299 (WPA_PROTO_WPA | WPA_PROTO_RSN)) 300 params.wpa_pairwise = hapd->conf->wpa_pairwise | 301 hapd->conf->rsn_pairwise; 302 else if (hapd->conf->wpa & WPA_PROTO_RSN) 303 params.wpa_pairwise = hapd->conf->rsn_pairwise; 304 else if (hapd->conf->wpa & WPA_PROTO_WPA) 305 params.wpa_pairwise = hapd->conf->wpa_pairwise; 306 params.wpa_key_mgmt = hapd->conf->wpa_key_mgmt; 307 params.rsn_preauth = hapd->conf->rsn_preauth; 308 #ifdef CONFIG_IEEE80211W 309 params.ieee80211w = hapd->conf->ieee80211w; 310 #endif /* CONFIG_IEEE80211W */ 311 } 312 return hostapd_set_ieee8021x(hapd, ¶ms); 313 } 314 315 316 int hostapd_vlan_if_add(struct hostapd_data *hapd, const char *ifname) 317 { 318 char force_ifname[IFNAMSIZ]; 319 u8 if_addr[ETH_ALEN]; 320 return hostapd_if_add(hapd, WPA_IF_AP_VLAN, ifname, hapd->own_addr, 321 NULL, NULL, force_ifname, if_addr, NULL, 0); 322 } 323 324 325 int hostapd_vlan_if_remove(struct hostapd_data *hapd, const char *ifname) 326 { 327 return hostapd_if_remove(hapd, WPA_IF_AP_VLAN, ifname); 328 } 329 330 331 int hostapd_set_wds_sta(struct hostapd_data *hapd, char *ifname_wds, 332 const u8 *addr, int aid, int val) 333 { 334 const char *bridge = NULL; 335 336 if (hapd->driver == NULL || hapd->driver->set_wds_sta == NULL) 337 return -1; 338 if (hapd->conf->wds_bridge[0]) 339 bridge = hapd->conf->wds_bridge; 340 else if (hapd->conf->bridge[0]) 341 bridge = hapd->conf->bridge; 342 return hapd->driver->set_wds_sta(hapd->drv_priv, addr, aid, val, 343 bridge, ifname_wds); 344 } 345 346 347 int hostapd_add_sta_node(struct hostapd_data *hapd, const u8 *addr, 348 u16 auth_alg) 349 { 350 if (hapd->driver == NULL || hapd->driver->add_sta_node == NULL) 351 return 0; 352 return hapd->driver->add_sta_node(hapd->drv_priv, addr, auth_alg); 353 } 354 355 356 int hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr, 357 u16 seq, u16 status, const u8 *ie, size_t len) 358 { 359 struct wpa_driver_sta_auth_params params; 360 #ifdef CONFIG_FILS 361 struct sta_info *sta; 362 #endif /* CONFIG_FILS */ 363 364 if (hapd->driver == NULL || hapd->driver->sta_auth == NULL) 365 return 0; 366 367 os_memset(¶ms, 0, sizeof(params)); 368 369 #ifdef CONFIG_FILS 370 sta = ap_get_sta(hapd, addr); 371 if (!sta) { 372 wpa_printf(MSG_DEBUG, "Station " MACSTR 373 " not found for sta_auth processing", 374 MAC2STR(addr)); 375 return 0; 376 } 377 378 if (sta->auth_alg == WLAN_AUTH_FILS_SK || 379 sta->auth_alg == WLAN_AUTH_FILS_SK_PFS || 380 sta->auth_alg == WLAN_AUTH_FILS_PK) { 381 params.fils_auth = 1; 382 wpa_auth_get_fils_aead_params(sta->wpa_sm, params.fils_anonce, 383 params.fils_snonce, 384 params.fils_kek, 385 ¶ms.fils_kek_len); 386 } 387 #endif /* CONFIG_FILS */ 388 389 params.own_addr = hapd->own_addr; 390 params.addr = addr; 391 params.seq = seq; 392 params.status = status; 393 params.ie = ie; 394 params.len = len; 395 396 return hapd->driver->sta_auth(hapd->drv_priv, ¶ms); 397 } 398 399 400 int hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr, 401 int reassoc, u16 status, const u8 *ie, size_t len) 402 { 403 if (hapd->driver == NULL || hapd->driver->sta_assoc == NULL) 404 return 0; 405 return hapd->driver->sta_assoc(hapd->drv_priv, hapd->own_addr, addr, 406 reassoc, status, ie, len); 407 } 408 409 410 int hostapd_sta_add(struct hostapd_data *hapd, 411 const u8 *addr, u16 aid, u16 capability, 412 const u8 *supp_rates, size_t supp_rates_len, 413 u16 listen_interval, 414 const struct ieee80211_ht_capabilities *ht_capab, 415 const struct ieee80211_vht_capabilities *vht_capab, 416 const struct ieee80211_he_capabilities *he_capab, 417 size_t he_capab_len, 418 u32 flags, u8 qosinfo, u8 vht_opmode, int supp_p2p_ps, 419 int set) 420 { 421 struct hostapd_sta_add_params params; 422 423 if (hapd->driver == NULL) 424 return 0; 425 if (hapd->driver->sta_add == NULL) 426 return 0; 427 428 os_memset(¶ms, 0, sizeof(params)); 429 params.addr = addr; 430 params.aid = aid; 431 params.capability = capability; 432 params.supp_rates = supp_rates; 433 params.supp_rates_len = supp_rates_len; 434 params.listen_interval = listen_interval; 435 params.ht_capabilities = ht_capab; 436 params.vht_capabilities = vht_capab; 437 params.he_capab = he_capab; 438 params.he_capab_len = he_capab_len; 439 params.vht_opmode_enabled = !!(flags & WLAN_STA_VHT_OPMODE_ENABLED); 440 params.vht_opmode = vht_opmode; 441 params.flags = hostapd_sta_flags_to_drv(flags); 442 params.qosinfo = qosinfo; 443 params.support_p2p_ps = supp_p2p_ps; 444 params.set = set; 445 return hapd->driver->sta_add(hapd->drv_priv, ¶ms); 446 } 447 448 449 int hostapd_add_tspec(struct hostapd_data *hapd, const u8 *addr, 450 u8 *tspec_ie, size_t tspec_ielen) 451 { 452 if (hapd->driver == NULL || hapd->driver->add_tspec == NULL) 453 return 0; 454 return hapd->driver->add_tspec(hapd->drv_priv, addr, tspec_ie, 455 tspec_ielen); 456 } 457 458 459 int hostapd_set_privacy(struct hostapd_data *hapd, int enabled) 460 { 461 if (hapd->driver == NULL || hapd->driver->set_privacy == NULL) 462 return 0; 463 return hapd->driver->set_privacy(hapd->drv_priv, enabled); 464 } 465 466 467 int hostapd_set_generic_elem(struct hostapd_data *hapd, const u8 *elem, 468 size_t elem_len) 469 { 470 if (hapd->driver == NULL || hapd->driver->set_generic_elem == NULL) 471 return 0; 472 return hapd->driver->set_generic_elem(hapd->drv_priv, elem, elem_len); 473 } 474 475 476 int hostapd_get_ssid(struct hostapd_data *hapd, u8 *buf, size_t len) 477 { 478 if (hapd->driver == NULL || hapd->driver->hapd_get_ssid == NULL) 479 return 0; 480 return hapd->driver->hapd_get_ssid(hapd->drv_priv, buf, len); 481 } 482 483 484 int hostapd_set_ssid(struct hostapd_data *hapd, const u8 *buf, size_t len) 485 { 486 if (hapd->driver == NULL || hapd->driver->hapd_set_ssid == NULL) 487 return 0; 488 return hapd->driver->hapd_set_ssid(hapd->drv_priv, buf, len); 489 } 490 491 492 int hostapd_if_add(struct hostapd_data *hapd, enum wpa_driver_if_type type, 493 const char *ifname, const u8 *addr, void *bss_ctx, 494 void **drv_priv, char *force_ifname, u8 *if_addr, 495 const char *bridge, int use_existing) 496 { 497 if (hapd->driver == NULL || hapd->driver->if_add == NULL) 498 return -1; 499 return hapd->driver->if_add(hapd->drv_priv, type, ifname, addr, 500 bss_ctx, drv_priv, force_ifname, if_addr, 501 bridge, use_existing, 1); 502 } 503 504 505 int hostapd_if_remove(struct hostapd_data *hapd, enum wpa_driver_if_type type, 506 const char *ifname) 507 { 508 if (hapd->driver == NULL || hapd->drv_priv == NULL || 509 hapd->driver->if_remove == NULL) 510 return -1; 511 return hapd->driver->if_remove(hapd->drv_priv, type, ifname); 512 } 513 514 515 int hostapd_set_ieee8021x(struct hostapd_data *hapd, 516 struct wpa_bss_params *params) 517 { 518 if (hapd->driver == NULL || hapd->driver->set_ieee8021x == NULL) 519 return 0; 520 return hapd->driver->set_ieee8021x(hapd->drv_priv, params); 521 } 522 523 524 int hostapd_get_seqnum(const char *ifname, struct hostapd_data *hapd, 525 const u8 *addr, int idx, u8 *seq) 526 { 527 if (hapd->driver == NULL || hapd->driver->get_seqnum == NULL) 528 return 0; 529 return hapd->driver->get_seqnum(ifname, hapd->drv_priv, addr, idx, 530 seq); 531 } 532 533 534 int hostapd_flush(struct hostapd_data *hapd) 535 { 536 if (hapd->driver == NULL || hapd->driver->flush == NULL) 537 return 0; 538 return hapd->driver->flush(hapd->drv_priv); 539 } 540 541 542 int hostapd_set_freq(struct hostapd_data *hapd, enum hostapd_hw_mode mode, 543 int freq, int channel, int ht_enabled, int vht_enabled, 544 int he_enabled, 545 int sec_channel_offset, int oper_chwidth, 546 int center_segment0, int center_segment1) 547 { 548 struct hostapd_freq_params data; 549 struct hostapd_hw_modes *cmode = hapd->iface->current_mode; 550 551 if (hostapd_set_freq_params(&data, mode, freq, channel, ht_enabled, 552 vht_enabled, he_enabled, sec_channel_offset, 553 oper_chwidth, 554 center_segment0, center_segment1, 555 cmode ? cmode->vht_capab : 0, 556 cmode ? 557 &cmode->he_capab[IEEE80211_MODE_AP] : NULL)) 558 return -1; 559 560 if (hapd->driver == NULL) 561 return 0; 562 if (hapd->driver->set_freq == NULL) 563 return 0; 564 return hapd->driver->set_freq(hapd->drv_priv, &data); 565 } 566 567 int hostapd_set_rts(struct hostapd_data *hapd, int rts) 568 { 569 if (hapd->driver == NULL || hapd->driver->set_rts == NULL) 570 return 0; 571 return hapd->driver->set_rts(hapd->drv_priv, rts); 572 } 573 574 575 int hostapd_set_frag(struct hostapd_data *hapd, int frag) 576 { 577 if (hapd->driver == NULL || hapd->driver->set_frag == NULL) 578 return 0; 579 return hapd->driver->set_frag(hapd->drv_priv, frag); 580 } 581 582 583 int hostapd_sta_set_flags(struct hostapd_data *hapd, u8 *addr, 584 int total_flags, int flags_or, int flags_and) 585 { 586 if (hapd->driver == NULL || hapd->driver->sta_set_flags == NULL) 587 return 0; 588 return hapd->driver->sta_set_flags(hapd->drv_priv, addr, total_flags, 589 flags_or, flags_and); 590 } 591 592 593 int hostapd_sta_set_airtime_weight(struct hostapd_data *hapd, const u8 *addr, 594 unsigned int weight) 595 { 596 if (!hapd->driver || !hapd->driver->sta_set_airtime_weight) 597 return 0; 598 return hapd->driver->sta_set_airtime_weight(hapd->drv_priv, addr, 599 weight); 600 } 601 602 603 int hostapd_set_country(struct hostapd_data *hapd, const char *country) 604 { 605 if (hapd->driver == NULL || 606 hapd->driver->set_country == NULL) 607 return 0; 608 return hapd->driver->set_country(hapd->drv_priv, country); 609 } 610 611 612 int hostapd_set_tx_queue_params(struct hostapd_data *hapd, int queue, int aifs, 613 int cw_min, int cw_max, int burst_time) 614 { 615 if (hapd->driver == NULL || hapd->driver->set_tx_queue_params == NULL) 616 return 0; 617 return hapd->driver->set_tx_queue_params(hapd->drv_priv, queue, aifs, 618 cw_min, cw_max, burst_time); 619 } 620 621 622 struct hostapd_hw_modes * 623 hostapd_get_hw_feature_data(struct hostapd_data *hapd, u16 *num_modes, 624 u16 *flags, u8 *dfs_domain) 625 { 626 if (hapd->driver == NULL || 627 hapd->driver->get_hw_feature_data == NULL) 628 return NULL; 629 return hapd->driver->get_hw_feature_data(hapd->drv_priv, num_modes, 630 flags, dfs_domain); 631 } 632 633 634 int hostapd_driver_commit(struct hostapd_data *hapd) 635 { 636 if (hapd->driver == NULL || hapd->driver->commit == NULL) 637 return 0; 638 return hapd->driver->commit(hapd->drv_priv); 639 } 640 641 642 int hostapd_drv_none(struct hostapd_data *hapd) 643 { 644 return hapd->driver && os_strcmp(hapd->driver->name, "none") == 0; 645 } 646 647 648 int hostapd_driver_scan(struct hostapd_data *hapd, 649 struct wpa_driver_scan_params *params) 650 { 651 if (hapd->driver && hapd->driver->scan2) 652 return hapd->driver->scan2(hapd->drv_priv, params); 653 return -1; 654 } 655 656 657 struct wpa_scan_results * hostapd_driver_get_scan_results( 658 struct hostapd_data *hapd) 659 { 660 if (hapd->driver && hapd->driver->get_scan_results2) 661 return hapd->driver->get_scan_results2(hapd->drv_priv); 662 return NULL; 663 } 664 665 666 int hostapd_driver_set_noa(struct hostapd_data *hapd, u8 count, int start, 667 int duration) 668 { 669 if (hapd->driver && hapd->driver->set_noa) 670 return hapd->driver->set_noa(hapd->drv_priv, count, start, 671 duration); 672 return -1; 673 } 674 675 676 int hostapd_drv_set_key(const char *ifname, struct hostapd_data *hapd, 677 enum wpa_alg alg, const u8 *addr, 678 int key_idx, int set_tx, 679 const u8 *seq, size_t seq_len, 680 const u8 *key, size_t key_len) 681 { 682 if (hapd->driver == NULL || hapd->driver->set_key == NULL) 683 return 0; 684 return hapd->driver->set_key(ifname, hapd->drv_priv, alg, addr, 685 key_idx, set_tx, seq, seq_len, key, 686 key_len); 687 } 688 689 690 int hostapd_drv_send_mlme(struct hostapd_data *hapd, 691 const void *msg, size_t len, int noack) 692 { 693 if (!hapd->driver || !hapd->driver->send_mlme || !hapd->drv_priv) 694 return 0; 695 return hapd->driver->send_mlme(hapd->drv_priv, msg, len, noack, 0, 696 NULL, 0); 697 } 698 699 700 int hostapd_drv_send_mlme_csa(struct hostapd_data *hapd, 701 const void *msg, size_t len, int noack, 702 const u16 *csa_offs, size_t csa_offs_len) 703 { 704 if (hapd->driver == NULL || hapd->driver->send_mlme == NULL) 705 return 0; 706 return hapd->driver->send_mlme(hapd->drv_priv, msg, len, noack, 0, 707 csa_offs, csa_offs_len); 708 } 709 710 711 int hostapd_drv_sta_deauth(struct hostapd_data *hapd, 712 const u8 *addr, int reason) 713 { 714 if (!hapd->driver || !hapd->driver->sta_deauth || !hapd->drv_priv) 715 return 0; 716 return hapd->driver->sta_deauth(hapd->drv_priv, hapd->own_addr, addr, 717 reason); 718 } 719 720 721 int hostapd_drv_sta_disassoc(struct hostapd_data *hapd, 722 const u8 *addr, int reason) 723 { 724 if (!hapd->driver || !hapd->driver->sta_disassoc || !hapd->drv_priv) 725 return 0; 726 return hapd->driver->sta_disassoc(hapd->drv_priv, hapd->own_addr, addr, 727 reason); 728 } 729 730 731 int hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, 732 const u8 *peer, u8 *buf, u16 *buf_len) 733 { 734 if (hapd->driver == NULL || hapd->driver->wnm_oper == NULL) 735 return -1; 736 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, 737 buf_len); 738 } 739 740 741 int hostapd_drv_send_action(struct hostapd_data *hapd, unsigned int freq, 742 unsigned int wait, const u8 *dst, const u8 *data, 743 size_t len) 744 { 745 const u8 *bssid; 746 const u8 wildcard_bssid[ETH_ALEN] = { 747 0xff, 0xff, 0xff, 0xff, 0xff, 0xff 748 }; 749 750 if (!hapd->driver || !hapd->driver->send_action || !hapd->drv_priv) 751 return 0; 752 bssid = hapd->own_addr; 753 if (!is_multicast_ether_addr(dst) && 754 len > 0 && data[0] == WLAN_ACTION_PUBLIC) { 755 struct sta_info *sta; 756 757 /* 758 * Public Action frames to a STA that is not a member of the BSS 759 * shall use wildcard BSSID value. 760 */ 761 sta = ap_get_sta(hapd, dst); 762 if (!sta || !(sta->flags & WLAN_STA_ASSOC)) 763 bssid = wildcard_bssid; 764 } else if (is_broadcast_ether_addr(dst) && 765 len > 0 && data[0] == WLAN_ACTION_PUBLIC) { 766 /* 767 * The only current use case of Public Action frames with 768 * broadcast destination address is DPP PKEX. That case is 769 * directing all devices and not just the STAs within the BSS, 770 * so have to use the wildcard BSSID value. 771 */ 772 bssid = wildcard_bssid; 773 } 774 return hapd->driver->send_action(hapd->drv_priv, freq, wait, dst, 775 hapd->own_addr, bssid, data, len, 0); 776 } 777 778 779 int hostapd_drv_send_action_addr3_ap(struct hostapd_data *hapd, 780 unsigned int freq, 781 unsigned int wait, const u8 *dst, 782 const u8 *data, size_t len) 783 { 784 if (hapd->driver == NULL || hapd->driver->send_action == NULL) 785 return 0; 786 return hapd->driver->send_action(hapd->drv_priv, freq, wait, dst, 787 hapd->own_addr, hapd->own_addr, data, 788 len, 0); 789 } 790 791 792 int hostapd_start_dfs_cac(struct hostapd_iface *iface, 793 enum hostapd_hw_mode mode, int freq, 794 int channel, int ht_enabled, int vht_enabled, 795 int he_enabled, 796 int sec_channel_offset, int oper_chwidth, 797 int center_segment0, int center_segment1) 798 { 799 struct hostapd_data *hapd = iface->bss[0]; 800 struct hostapd_freq_params data; 801 int res; 802 struct hostapd_hw_modes *cmode = iface->current_mode; 803 804 if (!hapd->driver || !hapd->driver->start_dfs_cac || !cmode) 805 return 0; 806 807 if (!iface->conf->ieee80211h) { 808 wpa_printf(MSG_ERROR, "Can't start DFS CAC, DFS functionality " 809 "is not enabled"); 810 return -1; 811 } 812 813 if (hostapd_set_freq_params(&data, mode, freq, channel, ht_enabled, 814 vht_enabled, he_enabled, sec_channel_offset, 815 oper_chwidth, center_segment0, 816 center_segment1, 817 cmode->vht_capab, 818 &cmode->he_capab[IEEE80211_MODE_AP])) { 819 wpa_printf(MSG_ERROR, "Can't set freq params"); 820 return -1; 821 } 822 823 res = hapd->driver->start_dfs_cac(hapd->drv_priv, &data); 824 if (!res) { 825 iface->cac_started = 1; 826 os_get_reltime(&iface->dfs_cac_start); 827 } 828 829 return res; 830 } 831 832 833 int hostapd_drv_set_qos_map(struct hostapd_data *hapd, 834 const u8 *qos_map_set, u8 qos_map_set_len) 835 { 836 if (!hapd->driver || !hapd->driver->set_qos_map || !hapd->drv_priv) 837 return 0; 838 return hapd->driver->set_qos_map(hapd->drv_priv, qos_map_set, 839 qos_map_set_len); 840 } 841 842 843 static void hostapd_get_hw_mode_any_channels(struct hostapd_data *hapd, 844 struct hostapd_hw_modes *mode, 845 int acs_ch_list_all, 846 int **freq_list) 847 { 848 int i; 849 850 for (i = 0; i < mode->num_channels; i++) { 851 struct hostapd_channel_data *chan = &mode->channels[i]; 852 853 if ((acs_ch_list_all || 854 freq_range_list_includes(&hapd->iface->conf->acs_ch_list, 855 chan->chan)) && 856 !(chan->flag & HOSTAPD_CHAN_DISABLED) && 857 !(hapd->iface->conf->acs_exclude_dfs && 858 (chan->flag & HOSTAPD_CHAN_RADAR))) 859 int_array_add_unique(freq_list, chan->freq); 860 } 861 } 862 863 864 void hostapd_get_ext_capa(struct hostapd_iface *iface) 865 { 866 struct hostapd_data *hapd = iface->bss[0]; 867 868 if (!hapd->driver || !hapd->driver->get_ext_capab) 869 return; 870 871 hapd->driver->get_ext_capab(hapd->drv_priv, WPA_IF_AP_BSS, 872 &iface->extended_capa, 873 &iface->extended_capa_mask, 874 &iface->extended_capa_len); 875 } 876 877 878 int hostapd_drv_do_acs(struct hostapd_data *hapd) 879 { 880 struct drv_acs_params params; 881 int ret, i, acs_ch_list_all = 0; 882 u8 *channels = NULL; 883 unsigned int num_channels = 0; 884 struct hostapd_hw_modes *mode; 885 int *freq_list = NULL; 886 887 if (hapd->driver == NULL || hapd->driver->do_acs == NULL) 888 return 0; 889 890 os_memset(¶ms, 0, sizeof(params)); 891 params.hw_mode = hapd->iface->conf->hw_mode; 892 893 /* 894 * If no chanlist config parameter is provided, include all enabled 895 * channels of the selected hw_mode. 896 */ 897 if (!hapd->iface->conf->acs_ch_list.num) 898 acs_ch_list_all = 1; 899 900 mode = hapd->iface->current_mode; 901 if (mode) { 902 channels = os_malloc(mode->num_channels); 903 if (channels == NULL) 904 return -1; 905 906 for (i = 0; i < mode->num_channels; i++) { 907 struct hostapd_channel_data *chan = &mode->channels[i]; 908 if (!acs_ch_list_all && 909 !freq_range_list_includes( 910 &hapd->iface->conf->acs_ch_list, 911 chan->chan)) 912 continue; 913 if (hapd->iface->conf->acs_exclude_dfs && 914 (chan->flag & HOSTAPD_CHAN_RADAR)) 915 continue; 916 if (!(chan->flag & HOSTAPD_CHAN_DISABLED)) { 917 channels[num_channels++] = chan->chan; 918 int_array_add_unique(&freq_list, chan->freq); 919 } 920 } 921 } else { 922 for (i = 0; i < hapd->iface->num_hw_features; i++) { 923 mode = &hapd->iface->hw_features[i]; 924 hostapd_get_hw_mode_any_channels(hapd, mode, 925 acs_ch_list_all, 926 &freq_list); 927 } 928 } 929 930 params.ch_list = channels; 931 params.ch_list_len = num_channels; 932 params.freq_list = freq_list; 933 934 params.ht_enabled = !!(hapd->iface->conf->ieee80211n); 935 params.ht40_enabled = !!(hapd->iface->conf->ht_capab & 936 HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET); 937 params.vht_enabled = !!(hapd->iface->conf->ieee80211ac); 938 params.ch_width = 20; 939 if (hapd->iface->conf->ieee80211n && params.ht40_enabled) 940 params.ch_width = 40; 941 942 /* Note: VHT20 is defined by combination of ht_capab & oper_chwidth 943 */ 944 if ((hapd->iface->conf->ieee80211ax || 945 hapd->iface->conf->ieee80211ac) && 946 params.ht40_enabled) { 947 u8 oper_chwidth = hostapd_get_oper_chwidth(hapd->iface->conf); 948 949 if (oper_chwidth == CHANWIDTH_80MHZ) 950 params.ch_width = 80; 951 else if (oper_chwidth == CHANWIDTH_160MHZ || 952 oper_chwidth == CHANWIDTH_80P80MHZ) 953 params.ch_width = 160; 954 } 955 956 ret = hapd->driver->do_acs(hapd->drv_priv, ¶ms); 957 os_free(channels); 958 959 return ret; 960 } 961 962 963 int hostapd_drv_update_dh_ie(struct hostapd_data *hapd, const u8 *peer, 964 u16 reason_code, const u8 *ie, size_t ielen) 965 { 966 if (!hapd->driver || !hapd->driver->update_dh_ie || !hapd->drv_priv) 967 return 0; 968 return hapd->driver->update_dh_ie(hapd->drv_priv, peer, reason_code, 969 ie, ielen); 970 } 971