df6561ec06
Multi link stations are represented in the kernel using a single station with multiple links and the first ADD_STA command also creates the first link. Subsequent links should be added with LINK_ADD commands. Implement this logic and provide the required MLD information per station/link. Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
1057 lines
29 KiB
C
1057 lines
29 KiB
C
/*
|
|
* hostapd - Driver operations
|
|
* Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "utils/includes.h"
|
|
|
|
#include "utils/common.h"
|
|
#include "common/ieee802_11_defs.h"
|
|
#include "common/ieee802_11_common.h"
|
|
#include "common/hw_features_common.h"
|
|
#include "wps/wps.h"
|
|
#include "p2p/p2p.h"
|
|
#include "hostapd.h"
|
|
#include "ieee802_11.h"
|
|
#include "sta_info.h"
|
|
#include "ap_config.h"
|
|
#include "p2p_hostapd.h"
|
|
#include "hs20.h"
|
|
#include "wpa_auth.h"
|
|
#include "ap_drv_ops.h"
|
|
|
|
|
|
u32 hostapd_sta_flags_to_drv(u32 flags)
|
|
{
|
|
int res = 0;
|
|
if (flags & WLAN_STA_AUTHORIZED)
|
|
res |= WPA_STA_AUTHORIZED;
|
|
if (flags & WLAN_STA_WMM)
|
|
res |= WPA_STA_WMM;
|
|
if (flags & WLAN_STA_SHORT_PREAMBLE)
|
|
res |= WPA_STA_SHORT_PREAMBLE;
|
|
if (flags & WLAN_STA_MFP)
|
|
res |= WPA_STA_MFP;
|
|
if (flags & WLAN_STA_AUTH)
|
|
res |= WPA_STA_AUTHENTICATED;
|
|
if (flags & WLAN_STA_ASSOC)
|
|
res |= WPA_STA_ASSOCIATED;
|
|
return res;
|
|
}
|
|
|
|
|
|
static int add_buf(struct wpabuf **dst, const struct wpabuf *src)
|
|
{
|
|
if (!src)
|
|
return 0;
|
|
if (wpabuf_resize(dst, wpabuf_len(src)) != 0)
|
|
return -1;
|
|
wpabuf_put_buf(*dst, src);
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int add_buf_data(struct wpabuf **dst, const u8 *data, size_t len)
|
|
{
|
|
if (!data || !len)
|
|
return 0;
|
|
if (wpabuf_resize(dst, len) != 0)
|
|
return -1;
|
|
wpabuf_put_data(*dst, data, len);
|
|
return 0;
|
|
}
|
|
|
|
|
|
int hostapd_build_ap_extra_ies(struct hostapd_data *hapd,
|
|
struct wpabuf **beacon_ret,
|
|
struct wpabuf **proberesp_ret,
|
|
struct wpabuf **assocresp_ret)
|
|
{
|
|
struct wpabuf *beacon = NULL, *proberesp = NULL, *assocresp = NULL;
|
|
u8 buf[200], *pos;
|
|
|
|
*beacon_ret = *proberesp_ret = *assocresp_ret = NULL;
|
|
|
|
#ifdef NEED_AP_MLME
|
|
pos = buf;
|
|
pos = hostapd_eid_rm_enabled_capab(hapd, pos, sizeof(buf));
|
|
if (add_buf_data(&assocresp, buf, pos - buf) < 0 ||
|
|
add_buf_data(&proberesp, buf, pos - buf) < 0)
|
|
goto fail;
|
|
#endif /* NEED_AP_MLME */
|
|
|
|
pos = buf;
|
|
pos = hostapd_eid_time_adv(hapd, pos);
|
|
if (add_buf_data(&beacon, buf, pos - buf) < 0)
|
|
goto fail;
|
|
pos = hostapd_eid_time_zone(hapd, pos);
|
|
if (add_buf_data(&proberesp, buf, pos - buf) < 0)
|
|
goto fail;
|
|
|
|
pos = buf;
|
|
pos = hostapd_eid_ext_capab(hapd, pos, false);
|
|
if (add_buf_data(&assocresp, buf, pos - buf) < 0)
|
|
goto fail;
|
|
pos = hostapd_eid_interworking(hapd, pos);
|
|
pos = hostapd_eid_adv_proto(hapd, pos);
|
|
pos = hostapd_eid_roaming_consortium(hapd, pos);
|
|
if (add_buf_data(&beacon, buf, pos - buf) < 0 ||
|
|
add_buf_data(&proberesp, buf, pos - buf) < 0)
|
|
goto fail;
|
|
|
|
#ifdef CONFIG_FST
|
|
if (add_buf(&beacon, hapd->iface->fst_ies) < 0 ||
|
|
add_buf(&proberesp, hapd->iface->fst_ies) < 0 ||
|
|
add_buf(&assocresp, hapd->iface->fst_ies) < 0)
|
|
goto fail;
|
|
#endif /* CONFIG_FST */
|
|
|
|
#ifdef CONFIG_FILS
|
|
pos = hostapd_eid_fils_indic(hapd, buf, 0);
|
|
if (add_buf_data(&beacon, buf, pos - buf) < 0 ||
|
|
add_buf_data(&proberesp, buf, pos - buf) < 0)
|
|
goto fail;
|
|
#endif /* CONFIG_FILS */
|
|
|
|
pos = hostapd_eid_rsnxe(hapd, buf, sizeof(buf));
|
|
if (add_buf_data(&assocresp, buf, pos - buf) < 0)
|
|
goto fail;
|
|
|
|
if (add_buf(&beacon, hapd->wps_beacon_ie) < 0 ||
|
|
add_buf(&proberesp, hapd->wps_probe_resp_ie) < 0)
|
|
goto fail;
|
|
|
|
#ifdef CONFIG_P2P
|
|
if (add_buf(&beacon, hapd->p2p_beacon_ie) < 0 ||
|
|
add_buf(&proberesp, hapd->p2p_probe_resp_ie) < 0)
|
|
goto fail;
|
|
#endif /* CONFIG_P2P */
|
|
|
|
#ifdef CONFIG_P2P_MANAGER
|
|
if (hapd->conf->p2p & P2P_MANAGE) {
|
|
if (wpabuf_resize(&beacon, 100) == 0) {
|
|
u8 *start, *p;
|
|
start = wpabuf_put(beacon, 0);
|
|
p = hostapd_eid_p2p_manage(hapd, start);
|
|
wpabuf_put(beacon, p - start);
|
|
}
|
|
|
|
if (wpabuf_resize(&proberesp, 100) == 0) {
|
|
u8 *start, *p;
|
|
start = wpabuf_put(proberesp, 0);
|
|
p = hostapd_eid_p2p_manage(hapd, start);
|
|
wpabuf_put(proberesp, p - start);
|
|
}
|
|
}
|
|
#endif /* CONFIG_P2P_MANAGER */
|
|
|
|
#ifdef CONFIG_WPS
|
|
if (hapd->conf->wps_state) {
|
|
struct wpabuf *a = wps_build_assoc_resp_ie();
|
|
add_buf(&assocresp, a);
|
|
wpabuf_free(a);
|
|
}
|
|
#endif /* CONFIG_WPS */
|
|
|
|
#ifdef CONFIG_P2P_MANAGER
|
|
if (hapd->conf->p2p & P2P_MANAGE) {
|
|
if (wpabuf_resize(&assocresp, 100) == 0) {
|
|
u8 *start, *p;
|
|
start = wpabuf_put(assocresp, 0);
|
|
p = hostapd_eid_p2p_manage(hapd, start);
|
|
wpabuf_put(assocresp, p - start);
|
|
}
|
|
}
|
|
#endif /* CONFIG_P2P_MANAGER */
|
|
|
|
#ifdef CONFIG_WIFI_DISPLAY
|
|
if (hapd->p2p_group) {
|
|
struct wpabuf *a;
|
|
a = p2p_group_assoc_resp_ie(hapd->p2p_group, P2P_SC_SUCCESS);
|
|
add_buf(&assocresp, a);
|
|
wpabuf_free(a);
|
|
}
|
|
#endif /* CONFIG_WIFI_DISPLAY */
|
|
|
|
#ifdef CONFIG_HS20
|
|
pos = hostapd_eid_hs20_indication(hapd, buf);
|
|
if (add_buf_data(&beacon, buf, pos - buf) < 0 ||
|
|
add_buf_data(&proberesp, buf, pos - buf) < 0)
|
|
goto fail;
|
|
|
|
pos = hostapd_eid_osen(hapd, buf);
|
|
if (add_buf_data(&beacon, buf, pos - buf) < 0 ||
|
|
add_buf_data(&proberesp, buf, pos - buf) < 0)
|
|
goto fail;
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
#ifdef CONFIG_MBO
|
|
if (hapd->conf->mbo_enabled ||
|
|
OCE_STA_CFON_ENABLED(hapd) || OCE_AP_ENABLED(hapd)) {
|
|
pos = hostapd_eid_mbo(hapd, buf, sizeof(buf));
|
|
if (add_buf_data(&beacon, buf, pos - buf) < 0 ||
|
|
add_buf_data(&proberesp, buf, pos - buf) < 0 ||
|
|
add_buf_data(&assocresp, buf, pos - buf) < 0)
|
|
goto fail;
|
|
}
|
|
#endif /* CONFIG_MBO */
|
|
|
|
#ifdef CONFIG_OWE
|
|
pos = hostapd_eid_owe_trans(hapd, buf, sizeof(buf));
|
|
if (add_buf_data(&beacon, buf, pos - buf) < 0 ||
|
|
add_buf_data(&proberesp, buf, pos - buf) < 0)
|
|
goto fail;
|
|
#endif /* CONFIG_OWE */
|
|
|
|
add_buf(&beacon, hapd->conf->vendor_elements);
|
|
add_buf(&proberesp, hapd->conf->vendor_elements);
|
|
add_buf(&assocresp, hapd->conf->assocresp_elements);
|
|
|
|
*beacon_ret = beacon;
|
|
*proberesp_ret = proberesp;
|
|
*assocresp_ret = assocresp;
|
|
|
|
return 0;
|
|
|
|
fail:
|
|
wpabuf_free(beacon);
|
|
wpabuf_free(proberesp);
|
|
wpabuf_free(assocresp);
|
|
return -1;
|
|
}
|
|
|
|
|
|
void hostapd_free_ap_extra_ies(struct hostapd_data *hapd,
|
|
struct wpabuf *beacon,
|
|
struct wpabuf *proberesp,
|
|
struct wpabuf *assocresp)
|
|
{
|
|
wpabuf_free(beacon);
|
|
wpabuf_free(proberesp);
|
|
wpabuf_free(assocresp);
|
|
}
|
|
|
|
|
|
int hostapd_reset_ap_wps_ie(struct hostapd_data *hapd)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL)
|
|
return 0;
|
|
|
|
return hapd->driver->set_ap_wps_ie(hapd->drv_priv, NULL, NULL, NULL);
|
|
}
|
|
|
|
|
|
int hostapd_set_ap_wps_ie(struct hostapd_data *hapd)
|
|
{
|
|
struct wpabuf *beacon, *proberesp, *assocresp;
|
|
int ret;
|
|
|
|
if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL)
|
|
return 0;
|
|
|
|
if (hostapd_build_ap_extra_ies(hapd, &beacon, &proberesp, &assocresp) <
|
|
0)
|
|
return -1;
|
|
|
|
ret = hapd->driver->set_ap_wps_ie(hapd->drv_priv, beacon, proberesp,
|
|
assocresp);
|
|
|
|
hostapd_free_ap_extra_ies(hapd, beacon, proberesp, assocresp);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
int hostapd_set_authorized(struct hostapd_data *hapd,
|
|
struct sta_info *sta, int authorized)
|
|
{
|
|
if (authorized) {
|
|
return hostapd_sta_set_flags(hapd, sta->addr,
|
|
hostapd_sta_flags_to_drv(
|
|
sta->flags),
|
|
WPA_STA_AUTHORIZED, ~0);
|
|
}
|
|
|
|
return hostapd_sta_set_flags(hapd, sta->addr,
|
|
hostapd_sta_flags_to_drv(sta->flags),
|
|
0, ~WPA_STA_AUTHORIZED);
|
|
}
|
|
|
|
|
|
int hostapd_set_sta_flags(struct hostapd_data *hapd, struct sta_info *sta)
|
|
{
|
|
int set_flags, total_flags, flags_and, flags_or;
|
|
total_flags = hostapd_sta_flags_to_drv(sta->flags);
|
|
set_flags = WPA_STA_SHORT_PREAMBLE | WPA_STA_WMM | WPA_STA_MFP;
|
|
if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) ||
|
|
sta->auth_alg == WLAN_AUTH_FT) &&
|
|
sta->flags & WLAN_STA_AUTHORIZED)
|
|
set_flags |= WPA_STA_AUTHORIZED;
|
|
flags_or = total_flags & set_flags;
|
|
flags_and = total_flags | ~set_flags;
|
|
return hostapd_sta_set_flags(hapd, sta->addr, total_flags,
|
|
flags_or, flags_and);
|
|
}
|
|
|
|
|
|
int hostapd_set_drv_ieee8021x(struct hostapd_data *hapd, const char *ifname,
|
|
int enabled)
|
|
{
|
|
struct wpa_bss_params params;
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
params.ifname = ifname;
|
|
params.enabled = enabled;
|
|
if (enabled) {
|
|
params.wpa = hapd->conf->wpa;
|
|
params.ieee802_1x = hapd->conf->ieee802_1x;
|
|
params.wpa_group = hapd->conf->wpa_group;
|
|
if ((hapd->conf->wpa & (WPA_PROTO_WPA | WPA_PROTO_RSN)) ==
|
|
(WPA_PROTO_WPA | WPA_PROTO_RSN))
|
|
params.wpa_pairwise = hapd->conf->wpa_pairwise |
|
|
hapd->conf->rsn_pairwise;
|
|
else if (hapd->conf->wpa & WPA_PROTO_RSN)
|
|
params.wpa_pairwise = hapd->conf->rsn_pairwise;
|
|
else if (hapd->conf->wpa & WPA_PROTO_WPA)
|
|
params.wpa_pairwise = hapd->conf->wpa_pairwise;
|
|
params.wpa_key_mgmt = hapd->conf->wpa_key_mgmt;
|
|
params.rsn_preauth = hapd->conf->rsn_preauth;
|
|
params.ieee80211w = hapd->conf->ieee80211w;
|
|
}
|
|
return hostapd_set_ieee8021x(hapd, ¶ms);
|
|
}
|
|
|
|
|
|
int hostapd_vlan_if_add(struct hostapd_data *hapd, const char *ifname)
|
|
{
|
|
char force_ifname[IFNAMSIZ];
|
|
u8 if_addr[ETH_ALEN];
|
|
return hostapd_if_add(hapd, WPA_IF_AP_VLAN, ifname, hapd->own_addr,
|
|
NULL, NULL, force_ifname, if_addr, NULL, 0);
|
|
}
|
|
|
|
|
|
int hostapd_vlan_if_remove(struct hostapd_data *hapd, const char *ifname)
|
|
{
|
|
return hostapd_if_remove(hapd, WPA_IF_AP_VLAN, ifname);
|
|
}
|
|
|
|
|
|
int hostapd_set_wds_sta(struct hostapd_data *hapd, char *ifname_wds,
|
|
const u8 *addr, int aid, int val)
|
|
{
|
|
const char *bridge = NULL;
|
|
|
|
if (hapd->driver == NULL || hapd->driver->set_wds_sta == NULL)
|
|
return -1;
|
|
if (hapd->conf->wds_bridge[0])
|
|
bridge = hapd->conf->wds_bridge;
|
|
else if (hapd->conf->bridge[0])
|
|
bridge = hapd->conf->bridge;
|
|
return hapd->driver->set_wds_sta(hapd->drv_priv, addr, aid, val,
|
|
bridge, ifname_wds);
|
|
}
|
|
|
|
|
|
int hostapd_add_sta_node(struct hostapd_data *hapd, const u8 *addr,
|
|
u16 auth_alg)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->add_sta_node == NULL)
|
|
return -EOPNOTSUPP;
|
|
return hapd->driver->add_sta_node(hapd->drv_priv, addr, auth_alg);
|
|
}
|
|
|
|
|
|
int hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr,
|
|
u16 seq, u16 status, const u8 *ie, size_t len)
|
|
{
|
|
struct wpa_driver_sta_auth_params params;
|
|
#ifdef CONFIG_FILS
|
|
struct sta_info *sta;
|
|
#endif /* CONFIG_FILS */
|
|
|
|
if (hapd->driver == NULL || hapd->driver->sta_auth == NULL)
|
|
return 0;
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
|
|
#ifdef CONFIG_FILS
|
|
sta = ap_get_sta(hapd, addr);
|
|
if (!sta) {
|
|
wpa_printf(MSG_DEBUG, "Station " MACSTR
|
|
" not found for sta_auth processing",
|
|
MAC2STR(addr));
|
|
return 0;
|
|
}
|
|
|
|
if (sta->auth_alg == WLAN_AUTH_FILS_SK ||
|
|
sta->auth_alg == WLAN_AUTH_FILS_SK_PFS ||
|
|
sta->auth_alg == WLAN_AUTH_FILS_PK) {
|
|
params.fils_auth = 1;
|
|
wpa_auth_get_fils_aead_params(sta->wpa_sm, params.fils_anonce,
|
|
params.fils_snonce,
|
|
params.fils_kek,
|
|
¶ms.fils_kek_len);
|
|
}
|
|
#endif /* CONFIG_FILS */
|
|
|
|
params.own_addr = hapd->own_addr;
|
|
params.addr = addr;
|
|
params.seq = seq;
|
|
params.status = status;
|
|
params.ie = ie;
|
|
params.len = len;
|
|
|
|
return hapd->driver->sta_auth(hapd->drv_priv, ¶ms);
|
|
}
|
|
|
|
|
|
int hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr,
|
|
int reassoc, u16 status, const u8 *ie, size_t len)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->sta_assoc == NULL)
|
|
return 0;
|
|
return hapd->driver->sta_assoc(hapd->drv_priv, hapd->own_addr, addr,
|
|
reassoc, status, ie, len);
|
|
}
|
|
|
|
|
|
int hostapd_sta_add(struct hostapd_data *hapd,
|
|
const u8 *addr, u16 aid, u16 capability,
|
|
const u8 *supp_rates, size_t supp_rates_len,
|
|
u16 listen_interval,
|
|
const struct ieee80211_ht_capabilities *ht_capab,
|
|
const struct ieee80211_vht_capabilities *vht_capab,
|
|
const struct ieee80211_he_capabilities *he_capab,
|
|
size_t he_capab_len,
|
|
const struct ieee80211_eht_capabilities *eht_capab,
|
|
size_t eht_capab_len,
|
|
const struct ieee80211_he_6ghz_band_cap *he_6ghz_capab,
|
|
u32 flags, u8 qosinfo, u8 vht_opmode, int supp_p2p_ps,
|
|
int set)
|
|
{
|
|
struct hostapd_sta_add_params params;
|
|
|
|
if (hapd->driver == NULL)
|
|
return 0;
|
|
if (hapd->driver->sta_add == NULL)
|
|
return 0;
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
params.addr = addr;
|
|
params.aid = aid;
|
|
params.capability = capability;
|
|
params.supp_rates = supp_rates;
|
|
params.supp_rates_len = supp_rates_len;
|
|
params.listen_interval = listen_interval;
|
|
params.ht_capabilities = ht_capab;
|
|
params.vht_capabilities = vht_capab;
|
|
params.he_capab = he_capab;
|
|
params.he_capab_len = he_capab_len;
|
|
params.eht_capab = eht_capab;
|
|
params.eht_capab_len = eht_capab_len;
|
|
params.he_6ghz_capab = he_6ghz_capab;
|
|
params.vht_opmode_enabled = !!(flags & WLAN_STA_VHT_OPMODE_ENABLED);
|
|
params.vht_opmode = vht_opmode;
|
|
params.flags = hostapd_sta_flags_to_drv(flags);
|
|
params.qosinfo = qosinfo;
|
|
params.support_p2p_ps = supp_p2p_ps;
|
|
params.set = set;
|
|
params.mld_link_id = -1;
|
|
return hapd->driver->sta_add(hapd->drv_priv, ¶ms);
|
|
}
|
|
|
|
|
|
int hostapd_add_tspec(struct hostapd_data *hapd, const u8 *addr,
|
|
u8 *tspec_ie, size_t tspec_ielen)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->add_tspec == NULL)
|
|
return 0;
|
|
return hapd->driver->add_tspec(hapd->drv_priv, addr, tspec_ie,
|
|
tspec_ielen);
|
|
}
|
|
|
|
|
|
int hostapd_set_privacy(struct hostapd_data *hapd, int enabled)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_privacy == NULL)
|
|
return 0;
|
|
return hapd->driver->set_privacy(hapd->drv_priv, enabled);
|
|
}
|
|
|
|
|
|
int hostapd_set_generic_elem(struct hostapd_data *hapd, const u8 *elem,
|
|
size_t elem_len)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_generic_elem == NULL)
|
|
return 0;
|
|
return hapd->driver->set_generic_elem(hapd->drv_priv, elem, elem_len);
|
|
}
|
|
|
|
|
|
int hostapd_get_ssid(struct hostapd_data *hapd, u8 *buf, size_t len)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->hapd_get_ssid == NULL)
|
|
return 0;
|
|
return hapd->driver->hapd_get_ssid(hapd->drv_priv, buf, len);
|
|
}
|
|
|
|
|
|
int hostapd_set_ssid(struct hostapd_data *hapd, const u8 *buf, size_t len)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->hapd_set_ssid == NULL)
|
|
return 0;
|
|
return hapd->driver->hapd_set_ssid(hapd->drv_priv, buf, len);
|
|
}
|
|
|
|
|
|
int hostapd_if_add(struct hostapd_data *hapd, enum wpa_driver_if_type type,
|
|
const char *ifname, const u8 *addr, void *bss_ctx,
|
|
void **drv_priv, char *force_ifname, u8 *if_addr,
|
|
const char *bridge, int use_existing)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->if_add == NULL)
|
|
return -1;
|
|
return hapd->driver->if_add(hapd->drv_priv, type, ifname, addr,
|
|
bss_ctx, drv_priv, force_ifname, if_addr,
|
|
bridge, use_existing, 1);
|
|
}
|
|
|
|
|
|
int hostapd_if_remove(struct hostapd_data *hapd, enum wpa_driver_if_type type,
|
|
const char *ifname)
|
|
{
|
|
if (hapd->driver == NULL || hapd->drv_priv == NULL ||
|
|
hapd->driver->if_remove == NULL)
|
|
return -1;
|
|
return hapd->driver->if_remove(hapd->drv_priv, type, ifname);
|
|
}
|
|
|
|
|
|
int hostapd_set_ieee8021x(struct hostapd_data *hapd,
|
|
struct wpa_bss_params *params)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_ieee8021x == NULL)
|
|
return 0;
|
|
return hapd->driver->set_ieee8021x(hapd->drv_priv, params);
|
|
}
|
|
|
|
|
|
int hostapd_get_seqnum(const char *ifname, struct hostapd_data *hapd,
|
|
const u8 *addr, int idx, u8 *seq)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->get_seqnum == NULL)
|
|
return 0;
|
|
return hapd->driver->get_seqnum(ifname, hapd->drv_priv, addr, idx,
|
|
seq);
|
|
}
|
|
|
|
|
|
int hostapd_flush(struct hostapd_data *hapd)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->flush == NULL)
|
|
return 0;
|
|
return hapd->driver->flush(hapd->drv_priv);
|
|
}
|
|
|
|
|
|
int hostapd_set_freq(struct hostapd_data *hapd, enum hostapd_hw_mode mode,
|
|
int freq, int channel, int edmg, u8 edmg_channel,
|
|
int ht_enabled, int vht_enabled,
|
|
int he_enabled, bool eht_enabled,
|
|
int sec_channel_offset, int oper_chwidth,
|
|
int center_segment0, int center_segment1)
|
|
{
|
|
struct hostapd_freq_params data;
|
|
struct hostapd_hw_modes *cmode = hapd->iface->current_mode;
|
|
|
|
if (hostapd_set_freq_params(&data, mode, freq, channel, edmg,
|
|
edmg_channel, ht_enabled,
|
|
vht_enabled, he_enabled, eht_enabled,
|
|
sec_channel_offset, oper_chwidth,
|
|
center_segment0, center_segment1,
|
|
cmode ? cmode->vht_capab : 0,
|
|
cmode ?
|
|
&cmode->he_capab[IEEE80211_MODE_AP] : NULL,
|
|
cmode ?
|
|
&cmode->eht_capab[IEEE80211_MODE_AP] :
|
|
NULL))
|
|
return -1;
|
|
|
|
if (hapd->driver == NULL)
|
|
return 0;
|
|
if (hapd->driver->set_freq == NULL)
|
|
return 0;
|
|
return hapd->driver->set_freq(hapd->drv_priv, &data);
|
|
}
|
|
|
|
int hostapd_set_rts(struct hostapd_data *hapd, int rts)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_rts == NULL)
|
|
return 0;
|
|
return hapd->driver->set_rts(hapd->drv_priv, rts);
|
|
}
|
|
|
|
|
|
int hostapd_set_frag(struct hostapd_data *hapd, int frag)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_frag == NULL)
|
|
return 0;
|
|
return hapd->driver->set_frag(hapd->drv_priv, frag);
|
|
}
|
|
|
|
|
|
int hostapd_sta_set_flags(struct hostapd_data *hapd, u8 *addr,
|
|
int total_flags, int flags_or, int flags_and)
|
|
{
|
|
if (!hapd->driver || !hapd->drv_priv || !hapd->driver->sta_set_flags)
|
|
return 0;
|
|
return hapd->driver->sta_set_flags(hapd->drv_priv, addr, total_flags,
|
|
flags_or, flags_and);
|
|
}
|
|
|
|
|
|
int hostapd_sta_set_airtime_weight(struct hostapd_data *hapd, const u8 *addr,
|
|
unsigned int weight)
|
|
{
|
|
if (!hapd->driver || !hapd->driver->sta_set_airtime_weight)
|
|
return 0;
|
|
return hapd->driver->sta_set_airtime_weight(hapd->drv_priv, addr,
|
|
weight);
|
|
}
|
|
|
|
|
|
int hostapd_set_country(struct hostapd_data *hapd, const char *country)
|
|
{
|
|
if (hapd->driver == NULL ||
|
|
hapd->driver->set_country == NULL)
|
|
return 0;
|
|
return hapd->driver->set_country(hapd->drv_priv, country);
|
|
}
|
|
|
|
|
|
int hostapd_set_tx_queue_params(struct hostapd_data *hapd, int queue, int aifs,
|
|
int cw_min, int cw_max, int burst_time)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->set_tx_queue_params == NULL)
|
|
return 0;
|
|
return hapd->driver->set_tx_queue_params(hapd->drv_priv, queue, aifs,
|
|
cw_min, cw_max, burst_time);
|
|
}
|
|
|
|
|
|
struct hostapd_hw_modes *
|
|
hostapd_get_hw_feature_data(struct hostapd_data *hapd, u16 *num_modes,
|
|
u16 *flags, u8 *dfs_domain)
|
|
{
|
|
if (hapd->driver == NULL ||
|
|
hapd->driver->get_hw_feature_data == NULL)
|
|
return NULL;
|
|
return hapd->driver->get_hw_feature_data(hapd->drv_priv, num_modes,
|
|
flags, dfs_domain);
|
|
}
|
|
|
|
|
|
int hostapd_driver_commit(struct hostapd_data *hapd)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->commit == NULL)
|
|
return 0;
|
|
return hapd->driver->commit(hapd->drv_priv);
|
|
}
|
|
|
|
|
|
int hostapd_drv_none(struct hostapd_data *hapd)
|
|
{
|
|
return hapd->driver && os_strcmp(hapd->driver->name, "none") == 0;
|
|
}
|
|
|
|
|
|
bool hostapd_drv_nl80211(struct hostapd_data *hapd)
|
|
{
|
|
return hapd->driver && os_strcmp(hapd->driver->name, "nl80211") == 0;
|
|
}
|
|
|
|
|
|
int hostapd_driver_scan(struct hostapd_data *hapd,
|
|
struct wpa_driver_scan_params *params)
|
|
{
|
|
if (hapd->driver && hapd->driver->scan2)
|
|
return hapd->driver->scan2(hapd->drv_priv, params);
|
|
return -1;
|
|
}
|
|
|
|
|
|
struct wpa_scan_results * hostapd_driver_get_scan_results(
|
|
struct hostapd_data *hapd)
|
|
{
|
|
if (hapd->driver && hapd->driver->get_scan_results2)
|
|
return hapd->driver->get_scan_results2(hapd->drv_priv);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
int hostapd_driver_set_noa(struct hostapd_data *hapd, u8 count, int start,
|
|
int duration)
|
|
{
|
|
if (hapd->driver && hapd->driver->set_noa)
|
|
return hapd->driver->set_noa(hapd->drv_priv, count, start,
|
|
duration);
|
|
return -1;
|
|
}
|
|
|
|
|
|
int hostapd_drv_set_key(const char *ifname, struct hostapd_data *hapd,
|
|
enum wpa_alg alg, const u8 *addr,
|
|
int key_idx, int vlan_id, int set_tx,
|
|
const u8 *seq, size_t seq_len,
|
|
const u8 *key, size_t key_len, enum key_flag key_flag)
|
|
{
|
|
struct wpa_driver_set_key_params params;
|
|
|
|
if (hapd->driver == NULL || hapd->driver->set_key == NULL)
|
|
return 0;
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
params.ifname = ifname;
|
|
params.alg = alg;
|
|
params.addr = addr;
|
|
params.key_idx = key_idx;
|
|
params.set_tx = set_tx;
|
|
params.seq = seq;
|
|
params.seq_len = seq_len;
|
|
params.key = key;
|
|
params.key_len = key_len;
|
|
params.vlan_id = vlan_id;
|
|
params.key_flag = key_flag;
|
|
params.link_id = -1;
|
|
|
|
return hapd->driver->set_key(hapd->drv_priv, ¶ms);
|
|
}
|
|
|
|
|
|
int hostapd_drv_send_mlme(struct hostapd_data *hapd,
|
|
const void *msg, size_t len, int noack,
|
|
const u16 *csa_offs, size_t csa_offs_len,
|
|
int no_encrypt)
|
|
{
|
|
if (!hapd->driver || !hapd->driver->send_mlme || !hapd->drv_priv)
|
|
return 0;
|
|
return hapd->driver->send_mlme(hapd->drv_priv, msg, len, noack, 0,
|
|
csa_offs, csa_offs_len, no_encrypt, 0);
|
|
}
|
|
|
|
|
|
int hostapd_drv_sta_deauth(struct hostapd_data *hapd,
|
|
const u8 *addr, int reason)
|
|
{
|
|
if (!hapd->driver || !hapd->driver->sta_deauth || !hapd->drv_priv)
|
|
return 0;
|
|
return hapd->driver->sta_deauth(hapd->drv_priv, hapd->own_addr, addr,
|
|
reason);
|
|
}
|
|
|
|
|
|
int hostapd_drv_sta_disassoc(struct hostapd_data *hapd,
|
|
const u8 *addr, int reason)
|
|
{
|
|
if (!hapd->driver || !hapd->driver->sta_disassoc || !hapd->drv_priv)
|
|
return 0;
|
|
return hapd->driver->sta_disassoc(hapd->drv_priv, hapd->own_addr, addr,
|
|
reason);
|
|
}
|
|
|
|
|
|
int hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper,
|
|
const u8 *peer, u8 *buf, u16 *buf_len)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->wnm_oper == NULL)
|
|
return -1;
|
|
return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
|
|
buf_len);
|
|
}
|
|
|
|
|
|
int hostapd_drv_send_action(struct hostapd_data *hapd, unsigned int freq,
|
|
unsigned int wait, const u8 *dst, const u8 *data,
|
|
size_t len)
|
|
{
|
|
const u8 *bssid;
|
|
const u8 wildcard_bssid[ETH_ALEN] = {
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff
|
|
};
|
|
|
|
if (!hapd->driver || !hapd->driver->send_action || !hapd->drv_priv)
|
|
return 0;
|
|
bssid = hapd->own_addr;
|
|
if (!is_multicast_ether_addr(dst) &&
|
|
len > 0 && data[0] == WLAN_ACTION_PUBLIC) {
|
|
struct sta_info *sta;
|
|
|
|
/*
|
|
* Public Action frames to a STA that is not a member of the BSS
|
|
* shall use wildcard BSSID value.
|
|
*/
|
|
sta = ap_get_sta(hapd, dst);
|
|
if (!sta || !(sta->flags & WLAN_STA_ASSOC))
|
|
bssid = wildcard_bssid;
|
|
} else if (is_broadcast_ether_addr(dst) &&
|
|
len > 0 && data[0] == WLAN_ACTION_PUBLIC) {
|
|
/*
|
|
* The only current use case of Public Action frames with
|
|
* broadcast destination address is DPP PKEX. That case is
|
|
* directing all devices and not just the STAs within the BSS,
|
|
* so have to use the wildcard BSSID value.
|
|
*/
|
|
bssid = wildcard_bssid;
|
|
}
|
|
return hapd->driver->send_action(hapd->drv_priv, freq, wait, dst,
|
|
hapd->own_addr, bssid, data, len, 0);
|
|
}
|
|
|
|
|
|
int hostapd_drv_send_action_addr3_ap(struct hostapd_data *hapd,
|
|
unsigned int freq,
|
|
unsigned int wait, const u8 *dst,
|
|
const u8 *data, size_t len)
|
|
{
|
|
if (hapd->driver == NULL || hapd->driver->send_action == NULL)
|
|
return 0;
|
|
return hapd->driver->send_action(hapd->drv_priv, freq, wait, dst,
|
|
hapd->own_addr, hapd->own_addr, data,
|
|
len, 0);
|
|
}
|
|
|
|
|
|
int hostapd_start_dfs_cac(struct hostapd_iface *iface,
|
|
enum hostapd_hw_mode mode, int freq,
|
|
int channel, int ht_enabled, int vht_enabled,
|
|
int he_enabled, bool eht_enabled,
|
|
int sec_channel_offset, int oper_chwidth,
|
|
int center_segment0, int center_segment1,
|
|
bool radar_background)
|
|
{
|
|
struct hostapd_data *hapd = iface->bss[0];
|
|
struct hostapd_freq_params data;
|
|
int res;
|
|
struct hostapd_hw_modes *cmode = iface->current_mode;
|
|
|
|
if (!hapd->driver || !hapd->driver->start_dfs_cac || !cmode)
|
|
return 0;
|
|
|
|
if (!iface->conf->ieee80211h) {
|
|
wpa_printf(MSG_ERROR, "Can't start DFS CAC, DFS functionality "
|
|
"is not enabled");
|
|
return -1;
|
|
}
|
|
|
|
if (hostapd_set_freq_params(&data, mode, freq, channel, 0, 0,
|
|
ht_enabled,
|
|
vht_enabled, he_enabled, eht_enabled,
|
|
sec_channel_offset,
|
|
oper_chwidth, center_segment0,
|
|
center_segment1,
|
|
cmode->vht_capab,
|
|
&cmode->he_capab[IEEE80211_MODE_AP],
|
|
&cmode->eht_capab[IEEE80211_MODE_AP])) {
|
|
wpa_printf(MSG_ERROR, "Can't set freq params");
|
|
return -1;
|
|
}
|
|
data.radar_background = radar_background;
|
|
|
|
res = hapd->driver->start_dfs_cac(hapd->drv_priv, &data);
|
|
if (!res) {
|
|
if (radar_background)
|
|
iface->radar_background.cac_started = 1;
|
|
else
|
|
iface->cac_started = 1;
|
|
os_get_reltime(&iface->dfs_cac_start);
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
|
|
int hostapd_drv_set_qos_map(struct hostapd_data *hapd,
|
|
const u8 *qos_map_set, u8 qos_map_set_len)
|
|
{
|
|
if (!hapd->driver || !hapd->driver->set_qos_map || !hapd->drv_priv)
|
|
return 0;
|
|
return hapd->driver->set_qos_map(hapd->drv_priv, qos_map_set,
|
|
qos_map_set_len);
|
|
}
|
|
|
|
|
|
static void hostapd_get_hw_mode_any_channels(struct hostapd_data *hapd,
|
|
struct hostapd_hw_modes *mode,
|
|
int acs_ch_list_all,
|
|
int **freq_list)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < mode->num_channels; i++) {
|
|
struct hostapd_channel_data *chan = &mode->channels[i];
|
|
|
|
if (!acs_ch_list_all &&
|
|
(hapd->iface->conf->acs_freq_list.num &&
|
|
!freq_range_list_includes(
|
|
&hapd->iface->conf->acs_freq_list,
|
|
chan->freq)))
|
|
continue;
|
|
if (!acs_ch_list_all &&
|
|
(!hapd->iface->conf->acs_freq_list_present &&
|
|
hapd->iface->conf->acs_ch_list.num &&
|
|
!freq_range_list_includes(
|
|
&hapd->iface->conf->acs_ch_list,
|
|
chan->chan)))
|
|
continue;
|
|
if (is_6ghz_freq(chan->freq) &&
|
|
((hapd->iface->conf->acs_exclude_6ghz_non_psc &&
|
|
!is_6ghz_psc_frequency(chan->freq)) ||
|
|
(!hapd->iface->conf->ieee80211ax &&
|
|
!hapd->iface->conf->ieee80211be)))
|
|
continue;
|
|
if (!(chan->flag & HOSTAPD_CHAN_DISABLED) &&
|
|
!(hapd->iface->conf->acs_exclude_dfs &&
|
|
(chan->flag & HOSTAPD_CHAN_RADAR)) &&
|
|
!(chan->max_tx_power < hapd->iface->conf->min_tx_power))
|
|
int_array_add_unique(freq_list, chan->freq);
|
|
}
|
|
}
|
|
|
|
|
|
void hostapd_get_ext_capa(struct hostapd_iface *iface)
|
|
{
|
|
struct hostapd_data *hapd = iface->bss[0];
|
|
|
|
if (!hapd->driver || !hapd->driver->get_ext_capab)
|
|
return;
|
|
|
|
hapd->driver->get_ext_capab(hapd->drv_priv, WPA_IF_AP_BSS,
|
|
&iface->extended_capa,
|
|
&iface->extended_capa_mask,
|
|
&iface->extended_capa_len);
|
|
}
|
|
|
|
|
|
int hostapd_drv_do_acs(struct hostapd_data *hapd)
|
|
{
|
|
struct drv_acs_params params;
|
|
int ret, i, acs_ch_list_all = 0;
|
|
struct hostapd_hw_modes *mode;
|
|
int *freq_list = NULL;
|
|
enum hostapd_hw_mode selected_mode;
|
|
|
|
if (hapd->driver == NULL || hapd->driver->do_acs == NULL)
|
|
return 0;
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
params.hw_mode = hapd->iface->conf->hw_mode;
|
|
|
|
/*
|
|
* If no chanlist config parameter is provided, include all enabled
|
|
* channels of the selected hw_mode.
|
|
*/
|
|
if (hapd->iface->conf->acs_freq_list_present)
|
|
acs_ch_list_all = !hapd->iface->conf->acs_freq_list.num;
|
|
else
|
|
acs_ch_list_all = !hapd->iface->conf->acs_ch_list.num;
|
|
|
|
if (hapd->iface->current_mode)
|
|
selected_mode = hapd->iface->current_mode->mode;
|
|
else
|
|
selected_mode = HOSTAPD_MODE_IEEE80211ANY;
|
|
|
|
for (i = 0; i < hapd->iface->num_hw_features; i++) {
|
|
mode = &hapd->iface->hw_features[i];
|
|
if (selected_mode != HOSTAPD_MODE_IEEE80211ANY &&
|
|
selected_mode != mode->mode)
|
|
continue;
|
|
hostapd_get_hw_mode_any_channels(hapd, mode, acs_ch_list_all,
|
|
&freq_list);
|
|
}
|
|
|
|
params.freq_list = freq_list;
|
|
params.edmg_enabled = hapd->iface->conf->enable_edmg;
|
|
|
|
params.ht_enabled = !!(hapd->iface->conf->ieee80211n);
|
|
params.ht40_enabled = !!(hapd->iface->conf->ht_capab &
|
|
HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET);
|
|
params.vht_enabled = !!(hapd->iface->conf->ieee80211ac);
|
|
params.eht_enabled = !!(hapd->iface->conf->ieee80211be);
|
|
params.ch_width = 20;
|
|
if (hapd->iface->conf->ieee80211n && params.ht40_enabled)
|
|
params.ch_width = 40;
|
|
|
|
/* Note: VHT20 is defined by combination of ht_capab & oper_chwidth
|
|
*/
|
|
if ((hapd->iface->conf->ieee80211be ||
|
|
hapd->iface->conf->ieee80211ax ||
|
|
hapd->iface->conf->ieee80211ac) &&
|
|
params.ht40_enabled) {
|
|
enum oper_chan_width oper_chwidth;
|
|
|
|
oper_chwidth = hostapd_get_oper_chwidth(hapd->iface->conf);
|
|
if (oper_chwidth == CONF_OPER_CHWIDTH_80MHZ)
|
|
params.ch_width = 80;
|
|
else if (oper_chwidth == CONF_OPER_CHWIDTH_160MHZ ||
|
|
oper_chwidth == CONF_OPER_CHWIDTH_80P80MHZ)
|
|
params.ch_width = 160;
|
|
else if (oper_chwidth == CONF_OPER_CHWIDTH_320MHZ)
|
|
params.ch_width = 320;
|
|
}
|
|
|
|
if (hapd->iface->conf->op_class)
|
|
params.ch_width = op_class_to_bandwidth(
|
|
hapd->iface->conf->op_class);
|
|
ret = hapd->driver->do_acs(hapd->drv_priv, ¶ms);
|
|
os_free(freq_list);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
int hostapd_drv_update_dh_ie(struct hostapd_data *hapd, const u8 *peer,
|
|
u16 reason_code, const u8 *ie, size_t ielen)
|
|
{
|
|
if (!hapd->driver || !hapd->driver->update_dh_ie || !hapd->drv_priv)
|
|
return 0;
|
|
return hapd->driver->update_dh_ie(hapd->drv_priv, peer, reason_code,
|
|
ie, ielen);
|
|
}
|
|
|
|
|
|
int hostapd_drv_dpp_listen(struct hostapd_data *hapd, bool enable)
|
|
{
|
|
if (!hapd->driver || !hapd->driver->dpp_listen || !hapd->drv_priv)
|
|
return 0;
|
|
return hapd->driver->dpp_listen(hapd->drv_priv, enable);
|
|
}
|
|
|
|
|
|
#ifdef CONFIG_PASN
|
|
int hostapd_drv_set_secure_ranging_ctx(struct hostapd_data *hapd,
|
|
const u8 *own_addr, const u8 *peer_addr,
|
|
u32 cipher, u8 tk_len, const u8 *tk,
|
|
u8 ltf_keyseed_len,
|
|
const u8 *ltf_keyseed, u32 action)
|
|
{
|
|
struct secure_ranging_params params;
|
|
|
|
if (!hapd->driver || !hapd->driver->set_secure_ranging_ctx)
|
|
return 0;
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
params.own_addr = own_addr;
|
|
params.peer_addr = peer_addr;
|
|
params.cipher = cipher;
|
|
params.tk_len = tk_len;
|
|
params.tk = tk;
|
|
params.ltf_keyseed_len = ltf_keyseed_len;
|
|
params.ltf_keyseed = ltf_keyseed;
|
|
params.action = action;
|
|
|
|
return hapd->driver->set_secure_ranging_ctx(hapd->drv_priv, ¶ms);
|
|
}
|
|
#endif /* CONFIG_PASN */
|