| /* |
| * hostapd - Driver operations |
| * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi> |
| * |
| * This software may be distributed under the terms of the BSD license. |
| * See README for more details. |
| */ |
| |
| #include "utils/includes.h" |
| |
| #include "utils/common.h" |
| #include "common/ieee802_11_defs.h" |
| #include "common/ieee802_11_common.h" |
| #include "common/hw_features_common.h" |
| #include "wps/wps.h" |
| #include "p2p/p2p.h" |
| #include "hostapd.h" |
| #include "ieee802_11.h" |
| #include "sta_info.h" |
| #include "ap_config.h" |
| #include "p2p_hostapd.h" |
| #include "hs20.h" |
| #include "wpa_auth.h" |
| #include "ap_drv_ops.h" |
| |
| |
| u32 hostapd_sta_flags_to_drv(u32 flags) |
| { |
| int res = 0; |
| if (flags & WLAN_STA_AUTHORIZED) |
| res |= WPA_STA_AUTHORIZED; |
| if (flags & WLAN_STA_WMM) |
| res |= WPA_STA_WMM; |
| if (flags & WLAN_STA_SHORT_PREAMBLE) |
| res |= WPA_STA_SHORT_PREAMBLE; |
| if (flags & WLAN_STA_MFP) |
| res |= WPA_STA_MFP; |
| if (flags & WLAN_STA_AUTH) |
| res |= WPA_STA_AUTHENTICATED; |
| if (flags & WLAN_STA_ASSOC) |
| res |= WPA_STA_ASSOCIATED; |
| return res; |
| } |
| |
| |
| static int add_buf(struct wpabuf **dst, const struct wpabuf *src) |
| { |
| if (!src) |
| return 0; |
| if (wpabuf_resize(dst, wpabuf_len(src)) != 0) |
| return -1; |
| wpabuf_put_buf(*dst, src); |
| return 0; |
| } |
| |
| |
| static int add_buf_data(struct wpabuf **dst, const u8 *data, size_t len) |
| { |
| if (!data || !len) |
| return 0; |
| if (wpabuf_resize(dst, len) != 0) |
| return -1; |
| wpabuf_put_data(*dst, data, len); |
| return 0; |
| } |
| |
| |
| int hostapd_build_ap_extra_ies(struct hostapd_data *hapd, |
| struct wpabuf **beacon_ret, |
| struct wpabuf **proberesp_ret, |
| struct wpabuf **assocresp_ret) |
| { |
| struct wpabuf *beacon = NULL, *proberesp = NULL, *assocresp = NULL; |
| u8 buf[200], *pos; |
| |
| *beacon_ret = *proberesp_ret = *assocresp_ret = NULL; |
| |
| #ifdef NEED_AP_MLME |
| pos = buf; |
| pos = hostapd_eid_rm_enabled_capab(hapd, pos, sizeof(buf)); |
| if (add_buf_data(&assocresp, buf, pos - buf) < 0 || |
| add_buf_data(&proberesp, buf, pos - buf) < 0) |
| goto fail; |
| #endif /* NEED_AP_MLME */ |
| |
| pos = buf; |
| pos = hostapd_eid_time_adv(hapd, pos); |
| if (add_buf_data(&beacon, buf, pos - buf) < 0) |
| goto fail; |
| pos = hostapd_eid_time_zone(hapd, pos); |
| if (add_buf_data(&proberesp, buf, pos - buf) < 0) |
| goto fail; |
| |
| pos = buf; |
| pos = hostapd_eid_ext_capab(hapd, pos, false); |
| if (add_buf_data(&assocresp, buf, pos - buf) < 0) |
| goto fail; |
| pos = hostapd_eid_interworking(hapd, pos); |
| pos = hostapd_eid_adv_proto(hapd, pos); |
| pos = hostapd_eid_roaming_consortium(hapd, pos); |
| if (add_buf_data(&beacon, buf, pos - buf) < 0 || |
| add_buf_data(&proberesp, buf, pos - buf) < 0) |
| goto fail; |
| |
| #ifdef CONFIG_FST |
| if (add_buf(&beacon, hapd->iface->fst_ies) < 0 || |
| add_buf(&proberesp, hapd->iface->fst_ies) < 0 || |
| add_buf(&assocresp, hapd->iface->fst_ies) < 0) |
| goto fail; |
| #endif /* CONFIG_FST */ |
| |
| #ifdef CONFIG_FILS |
| pos = hostapd_eid_fils_indic(hapd, buf, 0); |
| if (add_buf_data(&beacon, buf, pos - buf) < 0 || |
| add_buf_data(&proberesp, buf, pos - buf) < 0) |
| goto fail; |
| #endif /* CONFIG_FILS */ |
| |
| pos = hostapd_eid_rsnxe(hapd, buf, sizeof(buf)); |
| if (add_buf_data(&assocresp, buf, pos - buf) < 0) |
| goto fail; |
| |
| if (add_buf(&beacon, hapd->wps_beacon_ie) < 0 || |
| add_buf(&proberesp, hapd->wps_probe_resp_ie) < 0) |
| goto fail; |
| |
| #ifdef CONFIG_P2P |
| if (add_buf(&beacon, hapd->p2p_beacon_ie) < 0 || |
| add_buf(&proberesp, hapd->p2p_probe_resp_ie) < 0) |
| goto fail; |
| #endif /* CONFIG_P2P */ |
| |
| #ifdef CONFIG_P2P_MANAGER |
| if (hapd->conf->p2p & P2P_MANAGE) { |
| if (wpabuf_resize(&beacon, 100) == 0) { |
| u8 *start, *p; |
| start = wpabuf_put(beacon, 0); |
| p = hostapd_eid_p2p_manage(hapd, start); |
| wpabuf_put(beacon, p - start); |
| } |
| |
| if (wpabuf_resize(&proberesp, 100) == 0) { |
| u8 *start, *p; |
| start = wpabuf_put(proberesp, 0); |
| p = hostapd_eid_p2p_manage(hapd, start); |
| wpabuf_put(proberesp, p - start); |
| } |
| } |
| #endif /* CONFIG_P2P_MANAGER */ |
| |
| #ifdef CONFIG_WPS |
| if (hapd->conf->wps_state) { |
| struct wpabuf *a = wps_build_assoc_resp_ie(); |
| add_buf(&assocresp, a); |
| wpabuf_free(a); |
| } |
| #endif /* CONFIG_WPS */ |
| |
| #ifdef CONFIG_P2P_MANAGER |
| if (hapd->conf->p2p & P2P_MANAGE) { |
| if (wpabuf_resize(&assocresp, 100) == 0) { |
| u8 *start, *p; |
| start = wpabuf_put(assocresp, 0); |
| p = hostapd_eid_p2p_manage(hapd, start); |
| wpabuf_put(assocresp, p - start); |
| } |
| } |
| #endif /* CONFIG_P2P_MANAGER */ |
| |
| #ifdef CONFIG_WIFI_DISPLAY |
| if (hapd->p2p_group) { |
| struct wpabuf *a; |
| a = p2p_group_assoc_resp_ie(hapd->p2p_group, P2P_SC_SUCCESS); |
| add_buf(&assocresp, a); |
| wpabuf_free(a); |
| } |
| #endif /* CONFIG_WIFI_DISPLAY */ |
| |
| #ifdef CONFIG_HS20 |
| pos = hostapd_eid_hs20_indication(hapd, buf); |
| if (add_buf_data(&beacon, buf, pos - buf) < 0 || |
| add_buf_data(&proberesp, buf, pos - buf) < 0) |
| goto fail; |
| |
| pos = hostapd_eid_osen(hapd, buf); |
| if (add_buf_data(&beacon, buf, pos - buf) < 0 || |
| add_buf_data(&proberesp, buf, pos - buf) < 0) |
| goto fail; |
| #endif /* CONFIG_HS20 */ |
| |
| #ifdef CONFIG_MBO |
| if (hapd->conf->mbo_enabled || |
| OCE_STA_CFON_ENABLED(hapd) || OCE_AP_ENABLED(hapd)) { |
| pos = hostapd_eid_mbo(hapd, buf, sizeof(buf)); |
| if (add_buf_data(&beacon, buf, pos - buf) < 0 || |
| add_buf_data(&proberesp, buf, pos - buf) < 0 || |
| add_buf_data(&assocresp, buf, pos - buf) < 0) |
| goto fail; |
| } |
| #endif /* CONFIG_MBO */ |
| |
| #ifdef CONFIG_OWE |
| pos = hostapd_eid_owe_trans(hapd, buf, sizeof(buf)); |
| if (add_buf_data(&beacon, buf, pos - buf) < 0 || |
| add_buf_data(&proberesp, buf, pos - buf) < 0) |
| goto fail; |
| #endif /* CONFIG_OWE */ |
| |
| add_buf(&beacon, hapd->conf->vendor_elements); |
| add_buf(&proberesp, hapd->conf->vendor_elements); |
| add_buf(&assocresp, hapd->conf->assocresp_elements); |
| |
| *beacon_ret = beacon; |
| *proberesp_ret = proberesp; |
| *assocresp_ret = assocresp; |
| |
| return 0; |
| |
| fail: |
| wpabuf_free(beacon); |
| wpabuf_free(proberesp); |
| wpabuf_free(assocresp); |
| return -1; |
| } |
| |
| |
| void hostapd_free_ap_extra_ies(struct hostapd_data *hapd, |
| struct wpabuf *beacon, |
| struct wpabuf *proberesp, |
| struct wpabuf *assocresp) |
| { |
| wpabuf_free(beacon); |
| wpabuf_free(proberesp); |
| wpabuf_free(assocresp); |
| } |
| |
| |
| int hostapd_reset_ap_wps_ie(struct hostapd_data *hapd) |
| { |
| if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL) |
| return 0; |
| |
| return hapd->driver->set_ap_wps_ie(hapd->drv_priv, NULL, NULL, NULL); |
| } |
| |
| |
| int hostapd_set_ap_wps_ie(struct hostapd_data *hapd) |
| { |
| struct wpabuf *beacon, *proberesp, *assocresp; |
| int ret; |
| |
| if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL) |
| return 0; |
| |
| if (hostapd_build_ap_extra_ies(hapd, &beacon, &proberesp, &assocresp) < |
| 0) |
| return -1; |
| |
| ret = hapd->driver->set_ap_wps_ie(hapd->drv_priv, beacon, proberesp, |
| assocresp); |
| |
| hostapd_free_ap_extra_ies(hapd, beacon, proberesp, assocresp); |
| |
| return ret; |
| } |
| |
| |
| int hostapd_set_authorized(struct hostapd_data *hapd, |
| struct sta_info *sta, int authorized) |
| { |
| if (authorized) { |
| return hostapd_sta_set_flags(hapd, sta->addr, |
| hostapd_sta_flags_to_drv( |
| sta->flags), |
| WPA_STA_AUTHORIZED, ~0); |
| } |
| |
| return hostapd_sta_set_flags(hapd, sta->addr, |
| hostapd_sta_flags_to_drv(sta->flags), |
| 0, ~WPA_STA_AUTHORIZED); |
| } |
| |
| |
| int hostapd_set_sta_flags(struct hostapd_data *hapd, struct sta_info *sta) |
| { |
| int set_flags, total_flags, flags_and, flags_or; |
| total_flags = hostapd_sta_flags_to_drv(sta->flags); |
| set_flags = WPA_STA_SHORT_PREAMBLE | WPA_STA_WMM | WPA_STA_MFP; |
| if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) || |
| sta->auth_alg == WLAN_AUTH_FT) && |
| sta->flags & WLAN_STA_AUTHORIZED) |
| set_flags |= WPA_STA_AUTHORIZED; |
| flags_or = total_flags & set_flags; |
| flags_and = total_flags | ~set_flags; |
| return hostapd_sta_set_flags(hapd, sta->addr, total_flags, |
| flags_or, flags_and); |
| } |
| |
| |
| int hostapd_set_drv_ieee8021x(struct hostapd_data *hapd, const char *ifname, |
| int enabled) |
| { |
| struct wpa_bss_params params; |
| os_memset(¶ms, 0, sizeof(params)); |
| params.ifname = ifname; |
| params.enabled = enabled; |
| if (enabled) { |
| params.wpa = hapd->conf->wpa; |
| params.ieee802_1x = hapd->conf->ieee802_1x; |
| params.wpa_group = hapd->conf->wpa_group; |
| if ((hapd->conf->wpa & (WPA_PROTO_WPA | WPA_PROTO_RSN)) == |
| (WPA_PROTO_WPA | WPA_PROTO_RSN)) |
| params.wpa_pairwise = hapd->conf->wpa_pairwise | |
| hapd->conf->rsn_pairwise; |
| else if (hapd->conf->wpa & WPA_PROTO_RSN) |
| params.wpa_pairwise = hapd->conf->rsn_pairwise; |
| else if (hapd->conf->wpa & WPA_PROTO_WPA) |
| params.wpa_pairwise = hapd->conf->wpa_pairwise; |
| params.wpa_key_mgmt = hapd->conf->wpa_key_mgmt; |
| params.rsn_preauth = hapd->conf->rsn_preauth; |
| params.ieee80211w = hapd->conf->ieee80211w; |
| } |
| return hostapd_set_ieee8021x(hapd, ¶ms); |
| } |
| |
| |
| int hostapd_vlan_if_add(struct hostapd_data *hapd, const char *ifname) |
| { |
| char force_ifname[IFNAMSIZ]; |
| u8 if_addr[ETH_ALEN]; |
| return hostapd_if_add(hapd, WPA_IF_AP_VLAN, ifname, hapd->own_addr, |
| NULL, NULL, force_ifname, if_addr, NULL, 0); |
| } |
| |
| |
| int hostapd_vlan_if_remove(struct hostapd_data *hapd, const char *ifname) |
| { |
| return hostapd_if_remove(hapd, WPA_IF_AP_VLAN, ifname); |
| } |
| |
| |
| int hostapd_set_wds_sta(struct hostapd_data *hapd, char *ifname_wds, |
| const u8 *addr, int aid, int val) |
| { |
| const char *bridge = NULL; |
| |
| if (hapd->driver == NULL || hapd->driver->set_wds_sta == NULL) |
| return -1; |
| if (hapd->conf->wds_bridge[0]) |
| bridge = hapd->conf->wds_bridge; |
| else if (hapd->conf->bridge[0]) |
| bridge = hapd->conf->bridge; |
| return hapd->driver->set_wds_sta(hapd->drv_priv, addr, aid, val, |
| bridge, ifname_wds); |
| } |
| |
| |
| int hostapd_add_sta_node(struct hostapd_data *hapd, const u8 *addr, |
| u16 auth_alg) |
| { |
| if (hapd->driver == NULL || hapd->driver->add_sta_node == NULL) |
| return -EOPNOTSUPP; |
| return hapd->driver->add_sta_node(hapd->drv_priv, addr, auth_alg); |
| } |
| |
| |
| int hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr, |
| u16 seq, u16 status, const u8 *ie, size_t len) |
| { |
| struct wpa_driver_sta_auth_params params; |
| #ifdef CONFIG_FILS |
| struct sta_info *sta; |
| #endif /* CONFIG_FILS */ |
| |
| if (hapd->driver == NULL || hapd->driver->sta_auth == NULL) |
| return 0; |
| |
| os_memset(¶ms, 0, sizeof(params)); |
| |
| #ifdef CONFIG_FILS |
| sta = ap_get_sta(hapd, addr); |
| if (!sta) { |
| wpa_printf(MSG_DEBUG, "Station " MACSTR |
| " not found for sta_auth processing", |
| MAC2STR(addr)); |
| return 0; |
| } |
| |
| if (sta->auth_alg == WLAN_AUTH_FILS_SK || |
| sta->auth_alg == WLAN_AUTH_FILS_SK_PFS || |
| sta->auth_alg == WLAN_AUTH_FILS_PK) { |
| params.fils_auth = 1; |
| wpa_auth_get_fils_aead_params(sta->wpa_sm, params.fils_anonce, |
| params.fils_snonce, |
| params.fils_kek, |
| ¶ms.fils_kek_len); |
| } |
| #endif /* CONFIG_FILS */ |
| |
| params.own_addr = hapd->own_addr; |
| params.addr = addr; |
| params.seq = seq; |
| params.status = status; |
| params.ie = ie; |
| params.len = len; |
| |
| return hapd->driver->sta_auth(hapd->drv_priv, ¶ms); |
| } |
| |
| |
| int hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr, |
| int reassoc, u16 status, const u8 *ie, size_t len) |
| { |
| if (hapd->driver == NULL || hapd->driver->sta_assoc == NULL) |
| return 0; |
| return hapd->driver->sta_assoc(hapd->drv_priv, hapd->own_addr, addr, |
| reassoc, status, ie, len); |
| } |
| |
| |
| int hostapd_sta_add(struct hostapd_data *hapd, |
| const u8 *addr, u16 aid, u16 capability, |
| const u8 *supp_rates, size_t supp_rates_len, |
| u16 listen_interval, |
| const struct ieee80211_ht_capabilities *ht_capab, |
| const struct ieee80211_vht_capabilities *vht_capab, |
| const struct ieee80211_he_capabilities *he_capab, |
| size_t he_capab_len, |
| const struct ieee80211_eht_capabilities *eht_capab, |
| size_t eht_capab_len, |
| const struct ieee80211_he_6ghz_band_cap *he_6ghz_capab, |
| u32 flags, u8 qosinfo, u8 vht_opmode, int supp_p2p_ps, |
| int set) |
| { |
| struct hostapd_sta_add_params params; |
| |
| if (hapd->driver == NULL) |
| return 0; |
| if (hapd->driver->sta_add == NULL) |
| return 0; |
| |
| os_memset(¶ms, 0, sizeof(params)); |
| params.addr = addr; |
| params.aid = aid; |
| params.capability = capability; |
| params.supp_rates = supp_rates; |
| params.supp_rates_len = supp_rates_len; |
| params.listen_interval = listen_interval; |
| params.ht_capabilities = ht_capab; |
| params.vht_capabilities = vht_capab; |
| params.he_capab = he_capab; |
| params.he_capab_len = he_capab_len; |
| params.eht_capab = eht_capab; |
| params.eht_capab_len = eht_capab_len; |
| params.he_6ghz_capab = he_6ghz_capab; |
| params.vht_opmode_enabled = !!(flags & WLAN_STA_VHT_OPMODE_ENABLED); |
| params.vht_opmode = vht_opmode; |
| params.flags = hostapd_sta_flags_to_drv(flags); |
| params.qosinfo = qosinfo; |
| params.support_p2p_ps = supp_p2p_ps; |
| params.set = set; |
| params.mld_link_id = -1; |
| return hapd->driver->sta_add(hapd->drv_priv, ¶ms); |
| } |
| |
| |
| int hostapd_add_tspec(struct hostapd_data *hapd, const u8 *addr, |
| u8 *tspec_ie, size_t tspec_ielen) |
| { |
| if (hapd->driver == NULL || hapd->driver->add_tspec == NULL) |
| return 0; |
| return hapd->driver->add_tspec(hapd->drv_priv, addr, tspec_ie, |
| tspec_ielen); |
| } |
| |
| |
| int hostapd_set_privacy(struct hostapd_data *hapd, int enabled) |
| { |
| if (hapd->driver == NULL || hapd->driver->set_privacy == NULL) |
| return 0; |
| return hapd->driver->set_privacy(hapd->drv_priv, enabled); |
| } |
| |
| |
| int hostapd_set_generic_elem(struct hostapd_data *hapd, const u8 *elem, |
| size_t elem_len) |
| { |
| if (hapd->driver == NULL || hapd->driver->set_generic_elem == NULL) |
| return 0; |
| return hapd->driver->set_generic_elem(hapd->drv_priv, elem, elem_len); |
| } |
| |
| |
| int hostapd_get_ssid(struct hostapd_data *hapd, u8 *buf, size_t len) |
| { |
| if (hapd->driver == NULL || hapd->driver->hapd_get_ssid == NULL) |
| return 0; |
| return hapd->driver->hapd_get_ssid(hapd->drv_priv, buf, len); |
| } |
| |
| |
| int hostapd_set_ssid(struct hostapd_data *hapd, const u8 *buf, size_t len) |
| { |
| if (hapd->driver == NULL || hapd->driver->hapd_set_ssid == NULL) |
| return 0; |
| return hapd->driver->hapd_set_ssid(hapd->drv_priv, buf, len); |
| } |
| |
| |
| int hostapd_if_add(struct hostapd_data *hapd, enum wpa_driver_if_type type, |
| const char *ifname, const u8 *addr, void *bss_ctx, |
| void **drv_priv, char *force_ifname, u8 *if_addr, |
| const char *bridge, int use_existing) |
| { |
| if (hapd->driver == NULL || hapd->driver->if_add == NULL) |
| return -1; |
| return hapd->driver->if_add(hapd->drv_priv, type, ifname, addr, |
| bss_ctx, drv_priv, force_ifname, if_addr, |
| bridge, use_existing, 1); |
| } |
| |
| |
| int hostapd_if_remove(struct hostapd_data *hapd, enum wpa_driver_if_type type, |
| const char *ifname) |
| { |
| if (hapd->driver == NULL || hapd->drv_priv == NULL || |
| hapd->driver->if_remove == NULL) |
| return -1; |
| return hapd->driver->if_remove(hapd->drv_priv, type, ifname); |
| } |
| |
| |
| int hostapd_set_ieee8021x(struct hostapd_data *hapd, |
| struct wpa_bss_params *params) |
| { |
| if (hapd->driver == NULL || hapd->driver->set_ieee8021x == NULL) |
| return 0; |
| return hapd->driver->set_ieee8021x(hapd->drv_priv, params); |
| } |
| |
| |
| int hostapd_get_seqnum(const char *ifname, struct hostapd_data *hapd, |
| const u8 *addr, int idx, u8 *seq) |
| { |
| if (hapd->driver == NULL || hapd->driver->get_seqnum == NULL) |
| return 0; |
| return hapd->driver->get_seqnum(ifname, hapd->drv_priv, addr, idx, |
| seq); |
| } |
| |
| |
| int hostapd_flush(struct hostapd_data *hapd) |
| { |
| if (hapd->driver == NULL || hapd->driver->flush == NULL) |
| return 0; |
| return hapd->driver->flush(hapd->drv_priv); |
| } |
| |
| |
| int hostapd_set_freq(struct hostapd_data *hapd, enum hostapd_hw_mode mode, |
| int freq, int channel, int edmg, u8 edmg_channel, |
| int ht_enabled, int vht_enabled, |
| int he_enabled, bool eht_enabled, |
| int sec_channel_offset, int oper_chwidth, |
| int center_segment0, int center_segment1) |
| { |
| struct hostapd_freq_params data; |
| struct hostapd_hw_modes *cmode = hapd->iface->current_mode; |
| |
| if (hostapd_set_freq_params(&data, mode, freq, channel, edmg, |
| edmg_channel, ht_enabled, |
| vht_enabled, he_enabled, eht_enabled, |
| sec_channel_offset, oper_chwidth, |
| center_segment0, center_segment1, |
| cmode ? cmode->vht_capab : 0, |
| cmode ? |
| &cmode->he_capab[IEEE80211_MODE_AP] : NULL, |
| cmode ? |
| &cmode->eht_capab[IEEE80211_MODE_AP] : |
| NULL)) |
| return -1; |
| |
| if (hapd->driver == NULL) |
| return 0; |
| if (hapd->driver->set_freq == NULL) |
| return 0; |
| return hapd->driver->set_freq(hapd->drv_priv, &data); |
| } |
| |
| int hostapd_set_rts(struct hostapd_data *hapd, int rts) |
| { |
| if (hapd->driver == NULL || hapd->driver->set_rts == NULL) |
| return 0; |
| return hapd->driver->set_rts(hapd->drv_priv, rts); |
| } |
| |
| |
| int hostapd_set_frag(struct hostapd_data *hapd, int frag) |
| { |
| if (hapd->driver == NULL || hapd->driver->set_frag == NULL) |
| return 0; |
| return hapd->driver->set_frag(hapd->drv_priv, frag); |
| } |
| |
| |
| int hostapd_sta_set_flags(struct hostapd_data *hapd, u8 *addr, |
| int total_flags, int flags_or, int flags_and) |
| { |
| if (!hapd->driver || !hapd->drv_priv || !hapd->driver->sta_set_flags) |
| return 0; |
| return hapd->driver->sta_set_flags(hapd->drv_priv, addr, total_flags, |
| flags_or, flags_and); |
| } |
| |
| |
| int hostapd_sta_set_airtime_weight(struct hostapd_data *hapd, const u8 *addr, |
| unsigned int weight) |
| { |
| if (!hapd->driver || !hapd->driver->sta_set_airtime_weight) |
| return 0; |
| return hapd->driver->sta_set_airtime_weight(hapd->drv_priv, addr, |
| weight); |
| } |
| |
| |
| int hostapd_set_country(struct hostapd_data *hapd, const char *country) |
| { |
| if (hapd->driver == NULL || |
| hapd->driver->set_country == NULL) |
| return 0; |
| return hapd->driver->set_country(hapd->drv_priv, country); |
| } |
| |
| |
| int hostapd_set_tx_queue_params(struct hostapd_data *hapd, int queue, int aifs, |
| int cw_min, int cw_max, int burst_time) |
| { |
| if (hapd->driver == NULL || hapd->driver->set_tx_queue_params == NULL) |
| return 0; |
| return hapd->driver->set_tx_queue_params(hapd->drv_priv, queue, aifs, |
| cw_min, cw_max, burst_time); |
| } |
| |
| |
| struct hostapd_hw_modes * |
| hostapd_get_hw_feature_data(struct hostapd_data *hapd, u16 *num_modes, |
| u16 *flags, u8 *dfs_domain) |
| { |
| if (hapd->driver == NULL || |
| hapd->driver->get_hw_feature_data == NULL) |
| return NULL; |
| return hapd->driver->get_hw_feature_data(hapd->drv_priv, num_modes, |
| flags, dfs_domain); |
| } |
| |
| |
| int hostapd_driver_commit(struct hostapd_data *hapd) |
| { |
| if (hapd->driver == NULL || hapd->driver->commit == NULL) |
| return 0; |
| return hapd->driver->commit(hapd->drv_priv); |
| } |
| |
| |
| int hostapd_drv_none(struct hostapd_data *hapd) |
| { |
| return hapd->driver && os_strcmp(hapd->driver->name, "none") == 0; |
| } |
| |
| |
| bool hostapd_drv_nl80211(struct hostapd_data *hapd) |
| { |
| return hapd->driver && os_strcmp(hapd->driver->name, "nl80211") == 0; |
| } |
| |
| |
| int hostapd_driver_scan(struct hostapd_data *hapd, |
| struct wpa_driver_scan_params *params) |
| { |
| if (hapd->driver && hapd->driver->scan2) |
| return hapd->driver->scan2(hapd->drv_priv, params); |
| return -1; |
| } |
| |
| |
| struct wpa_scan_results * hostapd_driver_get_scan_results( |
| struct hostapd_data *hapd) |
| { |
| if (hapd->driver && hapd->driver->get_scan_results2) |
| return hapd->driver->get_scan_results2(hapd->drv_priv); |
| return NULL; |
| } |
| |
| |
| int hostapd_driver_set_noa(struct hostapd_data *hapd, u8 count, int start, |
| int duration) |
| { |
| if (hapd->driver && hapd->driver->set_noa) |
| return hapd->driver->set_noa(hapd->drv_priv, count, start, |
| duration); |
| return -1; |
| } |
| |
| |
| int hostapd_drv_set_key(const char *ifname, struct hostapd_data *hapd, |
| enum wpa_alg alg, const u8 *addr, |
| int key_idx, int vlan_id, int set_tx, |
| const u8 *seq, size_t seq_len, |
| const u8 *key, size_t key_len, enum key_flag key_flag) |
| { |
| struct wpa_driver_set_key_params params; |
| |
| if (hapd->driver == NULL || hapd->driver->set_key == NULL) |
| return 0; |
| |
| os_memset(¶ms, 0, sizeof(params)); |
| params.ifname = ifname; |
| params.alg = alg; |
| params.addr = addr; |
| params.key_idx = key_idx; |
| params.set_tx = set_tx; |
| params.seq = seq; |
| params.seq_len = seq_len; |
| params.key = key; |
| params.key_len = key_len; |
| params.vlan_id = vlan_id; |
| params.key_flag = key_flag; |
| params.link_id = -1; |
| |
| return hapd->driver->set_key(hapd->drv_priv, ¶ms); |
| } |
| |
| |
| int hostapd_drv_send_mlme(struct hostapd_data *hapd, |
| const void *msg, size_t len, int noack, |
| const u16 *csa_offs, size_t csa_offs_len, |
| int no_encrypt) |
| { |
| if (!hapd->driver || !hapd->driver->send_mlme || !hapd->drv_priv) |
| return 0; |
| return hapd->driver->send_mlme(hapd->drv_priv, msg, len, noack, 0, |
| csa_offs, csa_offs_len, no_encrypt, 0); |
| } |
| |
| |
| int hostapd_drv_sta_deauth(struct hostapd_data *hapd, |
| const u8 *addr, int reason) |
| { |
| if (!hapd->driver || !hapd->driver->sta_deauth || !hapd->drv_priv) |
| return 0; |
| return hapd->driver->sta_deauth(hapd->drv_priv, hapd->own_addr, addr, |
| reason); |
| } |
| |
| |
| int hostapd_drv_sta_disassoc(struct hostapd_data *hapd, |
| const u8 *addr, int reason) |
| { |
| if (!hapd->driver || !hapd->driver->sta_disassoc || !hapd->drv_priv) |
| return 0; |
| return hapd->driver->sta_disassoc(hapd->drv_priv, hapd->own_addr, addr, |
| reason); |
| } |
| |
| |
| int hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, |
| const u8 *peer, u8 *buf, u16 *buf_len) |
| { |
| if (hapd->driver == NULL || hapd->driver->wnm_oper == NULL) |
| return -1; |
| return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf, |
| buf_len); |
| } |
| |
| |
| int hostapd_drv_send_action(struct hostapd_data *hapd, unsigned int freq, |
| unsigned int wait, const u8 *dst, const u8 *data, |
| size_t len) |
| { |
| const u8 *bssid; |
| const u8 wildcard_bssid[ETH_ALEN] = { |
| 0xff, 0xff, 0xff, 0xff, 0xff, 0xff |
| }; |
| |
| if (!hapd->driver || !hapd->driver->send_action || !hapd->drv_priv) |
| return 0; |
| bssid = hapd->own_addr; |
| if (!is_multicast_ether_addr(dst) && |
| len > 0 && data[0] == WLAN_ACTION_PUBLIC) { |
| struct sta_info *sta; |
| |
| /* |
| * Public Action frames to a STA that is not a member of the BSS |
| * shall use wildcard BSSID value. |
| */ |
| sta = ap_get_sta(hapd, dst); |
| if (!sta || !(sta->flags & WLAN_STA_ASSOC)) |
| bssid = wildcard_bssid; |
| } else if (is_broadcast_ether_addr(dst) && |
| len > 0 && data[0] == WLAN_ACTION_PUBLIC) { |
| /* |
| * The only current use case of Public Action frames with |
| * broadcast destination address is DPP PKEX. That case is |
| * directing all devices and not just the STAs within the BSS, |
| * so have to use the wildcard BSSID value. |
| */ |
| bssid = wildcard_bssid; |
| } |
| return hapd->driver->send_action(hapd->drv_priv, freq, wait, dst, |
| hapd->own_addr, bssid, data, len, 0); |
| } |
| |
| |
| int hostapd_drv_send_action_addr3_ap(struct hostapd_data *hapd, |
| unsigned int freq, |
| unsigned int wait, const u8 *dst, |
| const u8 *data, size_t len) |
| { |
| if (hapd->driver == NULL || hapd->driver->send_action == NULL) |
| return 0; |
| return hapd->driver->send_action(hapd->drv_priv, freq, wait, dst, |
| hapd->own_addr, hapd->own_addr, data, |
| len, 0); |
| } |
| |
| |
| int hostapd_start_dfs_cac(struct hostapd_iface *iface, |
| enum hostapd_hw_mode mode, int freq, |
| int channel, int ht_enabled, int vht_enabled, |
| int he_enabled, bool eht_enabled, |
| int sec_channel_offset, int oper_chwidth, |
| int center_segment0, int center_segment1, |
| bool radar_background) |
| { |
| struct hostapd_data *hapd = iface->bss[0]; |
| struct hostapd_freq_params data; |
| int res; |
| struct hostapd_hw_modes *cmode = iface->current_mode; |
| |
| if (!hapd->driver || !hapd->driver->start_dfs_cac || !cmode) |
| return 0; |
| |
| if (!iface->conf->ieee80211h) { |
| wpa_printf(MSG_ERROR, "Can't start DFS CAC, DFS functionality " |
| "is not enabled"); |
| return -1; |
| } |
| |
| if (hostapd_set_freq_params(&data, mode, freq, channel, 0, 0, |
| ht_enabled, |
| vht_enabled, he_enabled, eht_enabled, |
| sec_channel_offset, |
| oper_chwidth, center_segment0, |
| center_segment1, |
| cmode->vht_capab, |
| &cmode->he_capab[IEEE80211_MODE_AP], |
| &cmode->eht_capab[IEEE80211_MODE_AP])) { |
| wpa_printf(MSG_ERROR, "Can't set freq params"); |
| return -1; |
| } |
| data.radar_background = radar_background; |
| |
| res = hapd->driver->start_dfs_cac(hapd->drv_priv, &data); |
| if (!res) { |
| if (radar_background) |
| iface->radar_background.cac_started = 1; |
| else |
| iface->cac_started = 1; |
| os_get_reltime(&iface->dfs_cac_start); |
| } |
| |
| return res; |
| } |
| |
| |
| int hostapd_drv_set_qos_map(struct hostapd_data *hapd, |
| const u8 *qos_map_set, u8 qos_map_set_len) |
| { |
| if (!hapd->driver || !hapd->driver->set_qos_map || !hapd->drv_priv) |
| return 0; |
| return hapd->driver->set_qos_map(hapd->drv_priv, qos_map_set, |
| qos_map_set_len); |
| } |
| |
| |
| static void hostapd_get_hw_mode_any_channels(struct hostapd_data *hapd, |
| struct hostapd_hw_modes *mode, |
| int acs_ch_list_all, |
| int **freq_list) |
| { |
| int i; |
| |
| for (i = 0; i < mode->num_channels; i++) { |
| struct hostapd_channel_data *chan = &mode->channels[i]; |
| |
| if (!acs_ch_list_all && |
| (hapd->iface->conf->acs_freq_list.num && |
| !freq_range_list_includes( |
| &hapd->iface->conf->acs_freq_list, |
| chan->freq))) |
| continue; |
| if (!acs_ch_list_all && |
| (!hapd->iface->conf->acs_freq_list_present && |
| hapd->iface->conf->acs_ch_list.num && |
| !freq_range_list_includes( |
| &hapd->iface->conf->acs_ch_list, |
| chan->chan))) |
| continue; |
| if (is_6ghz_freq(chan->freq) && |
| ((hapd->iface->conf->acs_exclude_6ghz_non_psc && |
| !is_6ghz_psc_frequency(chan->freq)) || |
| (!hapd->iface->conf->ieee80211ax && |
| !hapd->iface->conf->ieee80211be))) |
| continue; |
| if (!(chan->flag & HOSTAPD_CHAN_DISABLED) && |
| !(hapd->iface->conf->acs_exclude_dfs && |
| (chan->flag & HOSTAPD_CHAN_RADAR)) && |
| !(chan->max_tx_power < hapd->iface->conf->min_tx_power)) |
| int_array_add_unique(freq_list, chan->freq); |
| } |
| } |
| |
| |
| void hostapd_get_ext_capa(struct hostapd_iface *iface) |
| { |
| struct hostapd_data *hapd = iface->bss[0]; |
| |
| if (!hapd->driver || !hapd->driver->get_ext_capab) |
| return; |
| |
| hapd->driver->get_ext_capab(hapd->drv_priv, WPA_IF_AP_BSS, |
| &iface->extended_capa, |
| &iface->extended_capa_mask, |
| &iface->extended_capa_len); |
| } |
| |
| |
| int hostapd_drv_do_acs(struct hostapd_data *hapd) |
| { |
| struct drv_acs_params params; |
| int ret, i, acs_ch_list_all = 0; |
| struct hostapd_hw_modes *mode; |
| int *freq_list = NULL; |
| enum hostapd_hw_mode selected_mode; |
| |
| if (hapd->driver == NULL || hapd->driver->do_acs == NULL) |
| return 0; |
| |
| os_memset(¶ms, 0, sizeof(params)); |
| params.hw_mode = hapd->iface->conf->hw_mode; |
| |
| /* |
| * If no chanlist config parameter is provided, include all enabled |
| * channels of the selected hw_mode. |
| */ |
| if (hapd->iface->conf->acs_freq_list_present) |
| acs_ch_list_all = !hapd->iface->conf->acs_freq_list.num; |
| else |
| acs_ch_list_all = !hapd->iface->conf->acs_ch_list.num; |
| |
| if (hapd->iface->current_mode) |
| selected_mode = hapd->iface->current_mode->mode; |
| else |
| selected_mode = HOSTAPD_MODE_IEEE80211ANY; |
| |
| for (i = 0; i < hapd->iface->num_hw_features; i++) { |
| mode = &hapd->iface->hw_features[i]; |
| if (selected_mode != HOSTAPD_MODE_IEEE80211ANY && |
| selected_mode != mode->mode) |
| continue; |
| hostapd_get_hw_mode_any_channels(hapd, mode, acs_ch_list_all, |
| &freq_list); |
| } |
| |
| params.freq_list = freq_list; |
| params.edmg_enabled = hapd->iface->conf->enable_edmg; |
| |
| params.ht_enabled = !!(hapd->iface->conf->ieee80211n); |
| params.ht40_enabled = !!(hapd->iface->conf->ht_capab & |
| HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET); |
| params.vht_enabled = !!(hapd->iface->conf->ieee80211ac); |
| params.eht_enabled = !!(hapd->iface->conf->ieee80211be); |
| params.ch_width = 20; |
| if (hapd->iface->conf->ieee80211n && params.ht40_enabled) |
| params.ch_width = 40; |
| |
| /* Note: VHT20 is defined by combination of ht_capab & oper_chwidth |
| */ |
| if ((hapd->iface->conf->ieee80211be || |
| hapd->iface->conf->ieee80211ax || |
| hapd->iface->conf->ieee80211ac) && |
| params.ht40_enabled) { |
| enum oper_chan_width oper_chwidth; |
| |
| oper_chwidth = hostapd_get_oper_chwidth(hapd->iface->conf); |
| if (oper_chwidth == CONF_OPER_CHWIDTH_80MHZ) |
| params.ch_width = 80; |
| else if (oper_chwidth == CONF_OPER_CHWIDTH_160MHZ || |
| oper_chwidth == CONF_OPER_CHWIDTH_80P80MHZ) |
| params.ch_width = 160; |
| else if (oper_chwidth == CONF_OPER_CHWIDTH_320MHZ) |
| params.ch_width = 320; |
| } |
| |
| if (hapd->iface->conf->op_class) |
| params.ch_width = op_class_to_bandwidth( |
| hapd->iface->conf->op_class); |
| ret = hapd->driver->do_acs(hapd->drv_priv, ¶ms); |
| os_free(freq_list); |
| |
| return ret; |
| } |
| |
| |
| int hostapd_drv_update_dh_ie(struct hostapd_data *hapd, const u8 *peer, |
| u16 reason_code, const u8 *ie, size_t ielen) |
| { |
| if (!hapd->driver || !hapd->driver->update_dh_ie || !hapd->drv_priv) |
| return 0; |
| return hapd->driver->update_dh_ie(hapd->drv_priv, peer, reason_code, |
| ie, ielen); |
| } |
| |
| |
| int hostapd_drv_dpp_listen(struct hostapd_data *hapd, bool enable) |
| { |
| if (!hapd->driver || !hapd->driver->dpp_listen || !hapd->drv_priv) |
| return 0; |
| return hapd->driver->dpp_listen(hapd->drv_priv, enable); |
| } |
| |
| |
| #ifdef CONFIG_PASN |
| int hostapd_drv_set_secure_ranging_ctx(struct hostapd_data *hapd, |
| const u8 *own_addr, const u8 *peer_addr, |
| u32 cipher, u8 tk_len, const u8 *tk, |
| u8 ltf_keyseed_len, |
| const u8 *ltf_keyseed, u32 action) |
| { |
| struct secure_ranging_params params; |
| |
| if (!hapd->driver || !hapd->driver->set_secure_ranging_ctx) |
| return 0; |
| |
| os_memset(¶ms, 0, sizeof(params)); |
| params.own_addr = own_addr; |
| params.peer_addr = peer_addr; |
| params.cipher = cipher; |
| params.tk_len = tk_len; |
| params.tk = tk; |
| params.ltf_keyseed_len = ltf_keyseed_len; |
| params.ltf_keyseed = ltf_keyseed; |
| params.action = action; |
| |
| return hapd->driver->set_secure_ranging_ctx(hapd->drv_priv, ¶ms); |
| } |
| #endif /* CONFIG_PASN */ |