2008-06-06 09:55:42 -04:00
|
|
|
/*
|
2009-04-09 06:40:12 -04:00
|
|
|
* Driver interaction with Linux nl80211/cfg80211
|
2014-01-06 04:49:46 -05:00
|
|
|
* Copyright (c) 2002-2014, Jouni Malinen <j@w1.fi>
|
2009-04-09 13:20:21 -04:00
|
|
|
* Copyright (c) 2003-2004, Instant802 Networks, Inc.
|
|
|
|
* Copyright (c) 2005-2006, Devicescape Software, Inc.
|
|
|
|
* Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
|
2010-02-16 12:41:49 -05:00
|
|
|
* Copyright (c) 2009-2010, Atheros Communications
|
2008-06-06 09:55:42 -04:00
|
|
|
*
|
2012-02-11 09:46:35 -05:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2008-06-06 09:55:42 -04:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "includes.h"
|
2010-11-26 14:46:30 -05:00
|
|
|
#include <sys/types.h>
|
2009-04-16 09:36:03 -04:00
|
|
|
#include <net/if.h>
|
2008-06-06 09:55:42 -04:00
|
|
|
#include <netlink/genl/genl.h>
|
|
|
|
#include <netlink/genl/ctrl.h>
|
2014-09-09 18:38:03 -04:00
|
|
|
#ifdef CONFIG_LIBNL3_ROUTE
|
|
|
|
#include <netlink/route/neighbour.h>
|
|
|
|
#endif /* CONFIG_LIBNL3_ROUTE */
|
2010-09-30 00:52:51 -04:00
|
|
|
#include <linux/rtnetlink.h>
|
2009-12-13 14:49:53 -05:00
|
|
|
#include <netpacket/packet.h>
|
|
|
|
#include <linux/filter.h>
|
2011-12-03 12:32:23 -05:00
|
|
|
#include <linux/errqueue.h>
|
2009-03-20 16:31:24 -04:00
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
#include "common.h"
|
2009-12-13 14:49:53 -05:00
|
|
|
#include "eloop.h"
|
2014-01-24 08:58:00 -05:00
|
|
|
#include "common/qca-vendor.h"
|
2014-04-25 04:41:36 -04:00
|
|
|
#include "common/qca-vendor-attr.h"
|
2009-12-13 14:49:53 -05:00
|
|
|
#include "common/ieee802_11_defs.h"
|
2011-10-20 14:51:32 -04:00
|
|
|
#include "common/ieee802_11_common.h"
|
2011-08-09 07:04:53 -04:00
|
|
|
#include "l2_packet/l2_packet.h"
|
2009-12-18 09:35:33 -05:00
|
|
|
#include "netlink.h"
|
2014-10-26 06:02:36 -04:00
|
|
|
#include "linux_defines.h"
|
2010-01-03 15:08:26 -05:00
|
|
|
#include "linux_ioctl.h"
|
2009-12-18 09:35:33 -05:00
|
|
|
#include "radiotap.h"
|
|
|
|
#include "radiotap_iter.h"
|
2010-05-23 03:27:32 -04:00
|
|
|
#include "rfkill.h"
|
2014-10-26 06:02:36 -04:00
|
|
|
#include "driver_nl80211.h"
|
2011-12-03 12:32:23 -05:00
|
|
|
|
2014-10-26 06:02:36 -04:00
|
|
|
|
|
|
|
#ifndef CONFIG_LIBNL20
|
2010-10-10 10:47:15 -04:00
|
|
|
/*
|
|
|
|
* libnl 1.1 has a bug, it tries to allocate socket numbers densely
|
|
|
|
* but when you free a socket again it will mess up its bitmap and
|
|
|
|
* and use the wrong number the next time it needs a socket ID.
|
|
|
|
* Therefore, we wrap the handle alloc/destroy and add our own pid
|
|
|
|
* accounting.
|
|
|
|
*/
|
|
|
|
static uint32_t port_bitmap[32] = { 0 };
|
|
|
|
|
|
|
|
static struct nl_handle *nl80211_handle_alloc(void *cb)
|
|
|
|
{
|
|
|
|
struct nl_handle *handle;
|
|
|
|
uint32_t pid = getpid() & 0x3FFFFF;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
handle = nl_handle_alloc_cb(cb);
|
|
|
|
|
|
|
|
for (i = 0; i < 1024; i++) {
|
|
|
|
if (port_bitmap[i / 32] & (1 << (i % 32)))
|
|
|
|
continue;
|
|
|
|
port_bitmap[i / 32] |= 1 << (i % 32);
|
|
|
|
pid += i << 22;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
nl_socket_set_local_port(handle, pid);
|
|
|
|
|
|
|
|
return handle;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nl80211_handle_destroy(struct nl_handle *handle)
|
|
|
|
{
|
|
|
|
uint32_t port = nl_socket_get_local_port(handle);
|
|
|
|
|
|
|
|
port >>= 22;
|
|
|
|
port_bitmap[port / 32] &= ~(1 << (port % 32));
|
|
|
|
|
|
|
|
nl_handle_destroy(handle);
|
|
|
|
}
|
2009-04-09 06:40:12 -04:00
|
|
|
#endif /* CONFIG_LIBNL20 */
|
|
|
|
|
|
|
|
|
2013-11-07 09:02:23 -05:00
|
|
|
#ifdef ANDROID
|
|
|
|
/* system/core/libnl_2 does not include nl_socket_set_nonblocking() */
|
|
|
|
#undef nl_socket_set_nonblocking
|
|
|
|
#define nl_socket_set_nonblocking(h) android_nl_socket_set_nonblocking(h)
|
2014-10-26 06:27:35 -04:00
|
|
|
|
|
|
|
#define genl_ctrl_resolve android_genl_ctrl_resolve
|
2013-11-07 09:02:23 -05:00
|
|
|
#endif /* ANDROID */
|
|
|
|
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
static struct nl_handle * nl_create_handle(struct nl_cb *cb, const char *dbg)
|
2011-10-22 09:56:43 -04:00
|
|
|
{
|
2011-12-06 12:47:59 -05:00
|
|
|
struct nl_handle *handle;
|
2011-10-22 09:56:43 -04:00
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
handle = nl80211_handle_alloc(cb);
|
|
|
|
if (handle == NULL) {
|
2011-10-22 09:56:43 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
|
|
|
|
"callbacks (%s)", dbg);
|
2011-12-06 12:47:59 -05:00
|
|
|
return NULL;
|
2011-10-22 09:56:43 -04:00
|
|
|
}
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
if (genl_connect(handle)) {
|
2011-10-22 09:56:43 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to connect to generic "
|
|
|
|
"netlink (%s)", dbg);
|
2011-12-06 12:47:59 -05:00
|
|
|
nl80211_handle_destroy(handle);
|
|
|
|
return NULL;
|
2011-10-22 09:56:43 -04:00
|
|
|
}
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
return handle;
|
2011-10-22 09:56:43 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
static void nl_destroy_handles(struct nl_handle **handle)
|
2011-10-22 09:56:43 -04:00
|
|
|
{
|
2011-12-06 12:47:59 -05:00
|
|
|
if (*handle == NULL)
|
2011-10-22 09:56:43 -04:00
|
|
|
return;
|
2011-12-06 12:47:59 -05:00
|
|
|
nl80211_handle_destroy(*handle);
|
|
|
|
*handle = NULL;
|
2011-10-22 09:56:43 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-26 09:09:56 -04:00
|
|
|
#if __WORDSIZE == 64
|
|
|
|
#define ELOOP_SOCKET_INVALID (intptr_t) 0x8888888888888889ULL
|
|
|
|
#else
|
|
|
|
#define ELOOP_SOCKET_INVALID (intptr_t) 0x88888889ULL
|
|
|
|
#endif
|
|
|
|
|
2013-10-26 09:06:49 -04:00
|
|
|
static void nl80211_register_eloop_read(struct nl_handle **handle,
|
|
|
|
eloop_sock_handler handler,
|
|
|
|
void *eloop_data)
|
|
|
|
{
|
2013-10-26 09:09:56 -04:00
|
|
|
nl_socket_set_nonblocking(*handle);
|
2013-10-26 09:06:49 -04:00
|
|
|
eloop_register_read_sock(nl_socket_get_fd(*handle), handler,
|
|
|
|
eloop_data, *handle);
|
2013-10-26 09:09:56 -04:00
|
|
|
*handle = (void *) (((intptr_t) *handle) ^ ELOOP_SOCKET_INVALID);
|
2013-10-26 09:06:49 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void nl80211_destroy_eloop_handle(struct nl_handle **handle)
|
|
|
|
{
|
2013-10-26 09:09:56 -04:00
|
|
|
*handle = (void *) (((intptr_t) *handle) ^ ELOOP_SOCKET_INVALID);
|
2013-10-26 09:06:49 -04:00
|
|
|
eloop_unregister_read_sock(nl_socket_get_fd(*handle));
|
|
|
|
nl_destroy_handles(handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-10-20 19:03:25 -04:00
|
|
|
static void nl80211_global_deinit(void *priv);
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
static void wpa_driver_nl80211_deinit(struct i802_bss *bss);
|
2014-10-01 03:52:53 -04:00
|
|
|
static int wpa_driver_nl80211_set_mode_ibss(struct i802_bss *bss,
|
|
|
|
struct hostapd_freq_params *freq);
|
2014-06-26 16:13:07 -04:00
|
|
|
|
2009-02-14 09:43:43 -05:00
|
|
|
static int
|
2013-11-09 09:18:39 -05:00
|
|
|
wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
|
2013-11-09 10:29:32 -05:00
|
|
|
const u8 *set_addr, int first);
|
2009-12-02 10:54:57 -05:00
|
|
|
static int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
|
2010-04-08 04:31:37 -04:00
|
|
|
const u8 *addr, int cmd, u16 reason_code,
|
|
|
|
int local_state_change);
|
2009-04-17 09:27:38 -04:00
|
|
|
static void nl80211_remove_monitor_interface(
|
|
|
|
struct wpa_driver_nl80211_data *drv);
|
2011-11-19 12:56:34 -05:00
|
|
|
static int nl80211_send_frame_cmd(struct i802_bss *bss,
|
2010-12-29 07:05:34 -05:00
|
|
|
unsigned int freq, unsigned int wait,
|
2011-10-29 14:49:46 -04:00
|
|
|
const u8 *buf, size_t buf_len, u64 *cookie,
|
2011-11-19 12:56:34 -05:00
|
|
|
int no_cck, int no_ack, int offchanok);
|
2013-07-21 08:27:19 -04:00
|
|
|
static int nl80211_register_frame(struct i802_bss *bss,
|
|
|
|
struct nl_handle *hl_handle,
|
|
|
|
u16 type, const u8 *match, size_t match_len);
|
2013-02-03 08:46:47 -05:00
|
|
|
static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss,
|
|
|
|
int report);
|
2009-04-02 14:59:14 -04:00
|
|
|
|
2009-04-09 13:41:21 -04:00
|
|
|
static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
|
|
|
|
static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
|
2010-04-15 17:36:33 -04:00
|
|
|
static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
|
2013-02-03 08:46:47 -05:00
|
|
|
static int wpa_driver_nl80211_if_remove(struct i802_bss *bss,
|
2009-12-24 04:46:22 -05:00
|
|
|
enum wpa_driver_if_type type,
|
|
|
|
const char *ifname);
|
2009-04-09 13:20:21 -04:00
|
|
|
|
2014-04-14 13:51:32 -04:00
|
|
|
static int nl80211_set_channel(struct i802_bss *bss,
|
|
|
|
struct hostapd_freq_params *freq, int set_chan);
|
2010-01-16 05:11:19 -05:00
|
|
|
static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
|
|
|
|
int ifindex, int disabled);
|
2010-01-03 06:30:22 -05:00
|
|
|
|
2011-03-23 15:15:22 -04:00
|
|
|
static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv);
|
|
|
|
|
2014-06-26 16:13:07 -04:00
|
|
|
static int i802_set_freq(void *priv, struct hostapd_freq_params *freq);
|
2013-08-25 03:43:32 -04:00
|
|
|
static int i802_set_iface_flags(struct i802_bss *bss, int up);
|
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2013-06-22 04:12:48 -04:00
|
|
|
static const char * nl80211_command_to_string(enum nl80211_commands cmd)
|
|
|
|
{
|
|
|
|
#define C2S(x) case x: return #x;
|
|
|
|
switch (cmd) {
|
|
|
|
C2S(NL80211_CMD_UNSPEC)
|
|
|
|
C2S(NL80211_CMD_GET_WIPHY)
|
|
|
|
C2S(NL80211_CMD_SET_WIPHY)
|
|
|
|
C2S(NL80211_CMD_NEW_WIPHY)
|
|
|
|
C2S(NL80211_CMD_DEL_WIPHY)
|
|
|
|
C2S(NL80211_CMD_GET_INTERFACE)
|
|
|
|
C2S(NL80211_CMD_SET_INTERFACE)
|
|
|
|
C2S(NL80211_CMD_NEW_INTERFACE)
|
|
|
|
C2S(NL80211_CMD_DEL_INTERFACE)
|
|
|
|
C2S(NL80211_CMD_GET_KEY)
|
|
|
|
C2S(NL80211_CMD_SET_KEY)
|
|
|
|
C2S(NL80211_CMD_NEW_KEY)
|
|
|
|
C2S(NL80211_CMD_DEL_KEY)
|
|
|
|
C2S(NL80211_CMD_GET_BEACON)
|
|
|
|
C2S(NL80211_CMD_SET_BEACON)
|
|
|
|
C2S(NL80211_CMD_START_AP)
|
|
|
|
C2S(NL80211_CMD_STOP_AP)
|
|
|
|
C2S(NL80211_CMD_GET_STATION)
|
|
|
|
C2S(NL80211_CMD_SET_STATION)
|
|
|
|
C2S(NL80211_CMD_NEW_STATION)
|
|
|
|
C2S(NL80211_CMD_DEL_STATION)
|
|
|
|
C2S(NL80211_CMD_GET_MPATH)
|
|
|
|
C2S(NL80211_CMD_SET_MPATH)
|
|
|
|
C2S(NL80211_CMD_NEW_MPATH)
|
|
|
|
C2S(NL80211_CMD_DEL_MPATH)
|
|
|
|
C2S(NL80211_CMD_SET_BSS)
|
|
|
|
C2S(NL80211_CMD_SET_REG)
|
|
|
|
C2S(NL80211_CMD_REQ_SET_REG)
|
|
|
|
C2S(NL80211_CMD_GET_MESH_CONFIG)
|
|
|
|
C2S(NL80211_CMD_SET_MESH_CONFIG)
|
|
|
|
C2S(NL80211_CMD_SET_MGMT_EXTRA_IE)
|
|
|
|
C2S(NL80211_CMD_GET_REG)
|
|
|
|
C2S(NL80211_CMD_GET_SCAN)
|
|
|
|
C2S(NL80211_CMD_TRIGGER_SCAN)
|
|
|
|
C2S(NL80211_CMD_NEW_SCAN_RESULTS)
|
|
|
|
C2S(NL80211_CMD_SCAN_ABORTED)
|
|
|
|
C2S(NL80211_CMD_REG_CHANGE)
|
|
|
|
C2S(NL80211_CMD_AUTHENTICATE)
|
|
|
|
C2S(NL80211_CMD_ASSOCIATE)
|
|
|
|
C2S(NL80211_CMD_DEAUTHENTICATE)
|
|
|
|
C2S(NL80211_CMD_DISASSOCIATE)
|
|
|
|
C2S(NL80211_CMD_MICHAEL_MIC_FAILURE)
|
|
|
|
C2S(NL80211_CMD_REG_BEACON_HINT)
|
|
|
|
C2S(NL80211_CMD_JOIN_IBSS)
|
|
|
|
C2S(NL80211_CMD_LEAVE_IBSS)
|
|
|
|
C2S(NL80211_CMD_TESTMODE)
|
|
|
|
C2S(NL80211_CMD_CONNECT)
|
|
|
|
C2S(NL80211_CMD_ROAM)
|
|
|
|
C2S(NL80211_CMD_DISCONNECT)
|
|
|
|
C2S(NL80211_CMD_SET_WIPHY_NETNS)
|
|
|
|
C2S(NL80211_CMD_GET_SURVEY)
|
|
|
|
C2S(NL80211_CMD_NEW_SURVEY_RESULTS)
|
|
|
|
C2S(NL80211_CMD_SET_PMKSA)
|
|
|
|
C2S(NL80211_CMD_DEL_PMKSA)
|
|
|
|
C2S(NL80211_CMD_FLUSH_PMKSA)
|
|
|
|
C2S(NL80211_CMD_REMAIN_ON_CHANNEL)
|
|
|
|
C2S(NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL)
|
|
|
|
C2S(NL80211_CMD_SET_TX_BITRATE_MASK)
|
|
|
|
C2S(NL80211_CMD_REGISTER_FRAME)
|
|
|
|
C2S(NL80211_CMD_FRAME)
|
|
|
|
C2S(NL80211_CMD_FRAME_TX_STATUS)
|
|
|
|
C2S(NL80211_CMD_SET_POWER_SAVE)
|
|
|
|
C2S(NL80211_CMD_GET_POWER_SAVE)
|
|
|
|
C2S(NL80211_CMD_SET_CQM)
|
|
|
|
C2S(NL80211_CMD_NOTIFY_CQM)
|
|
|
|
C2S(NL80211_CMD_SET_CHANNEL)
|
|
|
|
C2S(NL80211_CMD_SET_WDS_PEER)
|
|
|
|
C2S(NL80211_CMD_FRAME_WAIT_CANCEL)
|
|
|
|
C2S(NL80211_CMD_JOIN_MESH)
|
|
|
|
C2S(NL80211_CMD_LEAVE_MESH)
|
|
|
|
C2S(NL80211_CMD_UNPROT_DEAUTHENTICATE)
|
|
|
|
C2S(NL80211_CMD_UNPROT_DISASSOCIATE)
|
|
|
|
C2S(NL80211_CMD_NEW_PEER_CANDIDATE)
|
|
|
|
C2S(NL80211_CMD_GET_WOWLAN)
|
|
|
|
C2S(NL80211_CMD_SET_WOWLAN)
|
|
|
|
C2S(NL80211_CMD_START_SCHED_SCAN)
|
|
|
|
C2S(NL80211_CMD_STOP_SCHED_SCAN)
|
|
|
|
C2S(NL80211_CMD_SCHED_SCAN_RESULTS)
|
|
|
|
C2S(NL80211_CMD_SCHED_SCAN_STOPPED)
|
|
|
|
C2S(NL80211_CMD_SET_REKEY_OFFLOAD)
|
|
|
|
C2S(NL80211_CMD_PMKSA_CANDIDATE)
|
|
|
|
C2S(NL80211_CMD_TDLS_OPER)
|
|
|
|
C2S(NL80211_CMD_TDLS_MGMT)
|
|
|
|
C2S(NL80211_CMD_UNEXPECTED_FRAME)
|
|
|
|
C2S(NL80211_CMD_PROBE_CLIENT)
|
|
|
|
C2S(NL80211_CMD_REGISTER_BEACONS)
|
|
|
|
C2S(NL80211_CMD_UNEXPECTED_4ADDR_FRAME)
|
|
|
|
C2S(NL80211_CMD_SET_NOACK_MAP)
|
|
|
|
C2S(NL80211_CMD_CH_SWITCH_NOTIFY)
|
|
|
|
C2S(NL80211_CMD_START_P2P_DEVICE)
|
|
|
|
C2S(NL80211_CMD_STOP_P2P_DEVICE)
|
|
|
|
C2S(NL80211_CMD_CONN_FAILED)
|
|
|
|
C2S(NL80211_CMD_SET_MCAST_RATE)
|
|
|
|
C2S(NL80211_CMD_SET_MAC_ACL)
|
|
|
|
C2S(NL80211_CMD_RADAR_DETECT)
|
|
|
|
C2S(NL80211_CMD_GET_PROTOCOL_FEATURES)
|
|
|
|
C2S(NL80211_CMD_UPDATE_FT_IES)
|
|
|
|
C2S(NL80211_CMD_FT_EVENT)
|
|
|
|
C2S(NL80211_CMD_CRIT_PROTOCOL_START)
|
|
|
|
C2S(NL80211_CMD_CRIT_PROTOCOL_STOP)
|
2014-01-01 16:30:23 -05:00
|
|
|
C2S(NL80211_CMD_GET_COALESCE)
|
|
|
|
C2S(NL80211_CMD_SET_COALESCE)
|
|
|
|
C2S(NL80211_CMD_CHANNEL_SWITCH)
|
|
|
|
C2S(NL80211_CMD_VENDOR)
|
|
|
|
C2S(NL80211_CMD_SET_QOS_MAP)
|
2013-06-22 04:12:48 -04:00
|
|
|
default:
|
|
|
|
return "NL80211_CMD_UNKNOWN";
|
|
|
|
}
|
|
|
|
#undef C2S
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-11-25 14:16:12 -05:00
|
|
|
/* Converts nl80211_chan_width to a common format */
|
2014-10-26 11:20:37 -04:00
|
|
|
enum chan_width convert2width(int width)
|
2013-11-25 14:16:12 -05:00
|
|
|
{
|
|
|
|
switch (width) {
|
|
|
|
case NL80211_CHAN_WIDTH_20_NOHT:
|
|
|
|
return CHAN_WIDTH_20_NOHT;
|
|
|
|
case NL80211_CHAN_WIDTH_20:
|
|
|
|
return CHAN_WIDTH_20;
|
|
|
|
case NL80211_CHAN_WIDTH_40:
|
|
|
|
return CHAN_WIDTH_40;
|
|
|
|
case NL80211_CHAN_WIDTH_80:
|
|
|
|
return CHAN_WIDTH_80;
|
|
|
|
case NL80211_CHAN_WIDTH_80P80:
|
|
|
|
return CHAN_WIDTH_80P80;
|
|
|
|
case NL80211_CHAN_WIDTH_160:
|
|
|
|
return CHAN_WIDTH_160;
|
|
|
|
}
|
|
|
|
return CHAN_WIDTH_UNKNOWN;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
int is_ap_interface(enum nl80211_iftype nlmode)
|
2011-07-17 13:22:11 -04:00
|
|
|
{
|
2014-04-14 06:39:18 -04:00
|
|
|
return nlmode == NL80211_IFTYPE_AP ||
|
|
|
|
nlmode == NL80211_IFTYPE_P2P_GO;
|
2011-07-17 13:22:11 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int is_sta_interface(enum nl80211_iftype nlmode)
|
|
|
|
{
|
2014-04-14 06:39:18 -04:00
|
|
|
return nlmode == NL80211_IFTYPE_STATION ||
|
|
|
|
nlmode == NL80211_IFTYPE_P2P_CLIENT;
|
2011-07-17 13:22:11 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-25 06:26:17 -04:00
|
|
|
static int is_p2p_net_interface(enum nl80211_iftype nlmode)
|
2011-10-29 15:46:58 -04:00
|
|
|
{
|
2014-04-14 06:39:18 -04:00
|
|
|
return nlmode == NL80211_IFTYPE_P2P_CLIENT ||
|
|
|
|
nlmode == NL80211_IFTYPE_P2P_GO;
|
2011-10-29 15:46:58 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
struct i802_bss * get_bss_ifindex(struct wpa_driver_nl80211_data *drv,
|
|
|
|
int ifindex)
|
2014-10-04 09:20:38 -04:00
|
|
|
{
|
|
|
|
struct i802_bss *bss;
|
|
|
|
|
|
|
|
for (bss = drv->first_bss; bss; bss = bss->next) {
|
|
|
|
if (bss->ifindex == ifindex)
|
|
|
|
return bss;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-01 00:23:23 -04:00
|
|
|
static int is_mesh_interface(enum nl80211_iftype nlmode)
|
|
|
|
{
|
|
|
|
return nlmode == NL80211_IFTYPE_MESH_POINT;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
void nl80211_mark_disconnected(struct wpa_driver_nl80211_data *drv)
|
2013-05-27 13:10:57 -04:00
|
|
|
{
|
|
|
|
if (drv->associated)
|
|
|
|
os_memcpy(drv->prev_bssid, drv->bssid, ETH_ALEN);
|
|
|
|
drv->associated = 0;
|
|
|
|
os_memset(drv->bssid, 0, ETH_ALEN);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-05-16 11:35:42 -04:00
|
|
|
struct nl80211_bss_info_arg {
|
|
|
|
struct wpa_driver_nl80211_data *drv;
|
|
|
|
struct wpa_scan_results *res;
|
|
|
|
unsigned int assoc_freq;
|
2014-05-13 17:47:42 -04:00
|
|
|
unsigned int ibss_freq;
|
2011-09-18 14:26:55 -04:00
|
|
|
u8 assoc_bssid[ETH_ALEN];
|
2011-05-16 11:35:42 -04:00
|
|
|
};
|
|
|
|
|
|
|
|
static int bss_info_handler(struct nl_msg *msg, void *arg);
|
|
|
|
|
|
|
|
|
2008-09-30 09:46:22 -04:00
|
|
|
/* nl80211 code */
|
|
|
|
static int ack_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
int *err = arg;
|
|
|
|
*err = 0;
|
|
|
|
return NL_STOP;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int finish_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
2008-10-29 13:28:35 -04:00
|
|
|
int *ret = arg;
|
|
|
|
*ret = 0;
|
2008-09-30 09:46:22 -04:00
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err,
|
|
|
|
void *arg)
|
|
|
|
{
|
|
|
|
int *ret = arg;
|
|
|
|
*ret = err->error;
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
2009-04-09 10:10:22 -04:00
|
|
|
|
|
|
|
static int no_seq_check(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
return NL_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
static int send_and_recv(struct nl80211_global *global,
|
2010-02-16 12:41:49 -05:00
|
|
|
struct nl_handle *nl_handle, struct nl_msg *msg,
|
|
|
|
int (*valid_handler)(struct nl_msg *, void *),
|
|
|
|
void *valid_data)
|
2008-09-30 09:46:22 -04:00
|
|
|
{
|
|
|
|
struct nl_cb *cb;
|
|
|
|
int err = -ENOMEM;
|
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
cb = nl_cb_clone(global->nl_cb);
|
2008-09-30 09:46:22 -04:00
|
|
|
if (!cb)
|
|
|
|
goto out;
|
|
|
|
|
2010-02-16 12:41:49 -05:00
|
|
|
err = nl_send_auto_complete(nl_handle, msg);
|
2008-09-30 09:46:22 -04:00
|
|
|
if (err < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
err = 1;
|
|
|
|
|
|
|
|
nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &err);
|
2008-10-29 13:28:35 -04:00
|
|
|
nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, &err);
|
2008-09-30 09:46:22 -04:00
|
|
|
nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, ack_handler, &err);
|
|
|
|
|
|
|
|
if (valid_handler)
|
|
|
|
nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM,
|
|
|
|
valid_handler, valid_data);
|
|
|
|
|
2013-10-26 09:13:34 -04:00
|
|
|
while (err > 0) {
|
|
|
|
int res = nl_recvmsgs(nl_handle, cb);
|
2014-05-23 01:51:07 -04:00
|
|
|
if (res < 0) {
|
2013-10-26 09:13:34 -04:00
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"nl80211: %s->nl_recvmsgs failed: %d",
|
|
|
|
__func__, res);
|
|
|
|
}
|
|
|
|
}
|
2008-09-30 09:46:22 -04:00
|
|
|
out:
|
|
|
|
nl_cb_put(cb);
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
static int send_and_recv_msgs_global(struct nl80211_global *global,
|
|
|
|
struct nl_msg *msg,
|
|
|
|
int (*valid_handler)(struct nl_msg *, void *),
|
|
|
|
void *valid_data)
|
|
|
|
{
|
2011-12-06 12:47:59 -05:00
|
|
|
return send_and_recv(global, global->nl, msg, valid_handler,
|
2011-12-06 12:30:43 -05:00
|
|
|
valid_data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
int send_and_recv_msgs(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nl_msg *msg,
|
|
|
|
int (*valid_handler)(struct nl_msg *, void *),
|
|
|
|
void *valid_data)
|
2010-02-16 12:41:49 -05:00
|
|
|
{
|
2011-12-06 12:47:59 -05:00
|
|
|
return send_and_recv(drv->global, drv->global->nl, msg,
|
2011-12-06 12:30:43 -05:00
|
|
|
valid_handler, valid_data);
|
2010-02-16 12:41:49 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-02-12 13:11:43 -05:00
|
|
|
struct family_data {
|
|
|
|
const char *group;
|
|
|
|
int id;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
int nl80211_set_iface_id(struct nl_msg *msg, struct i802_bss *bss)
|
2013-06-25 06:33:45 -04:00
|
|
|
{
|
|
|
|
if (bss->wdev_id_set)
|
|
|
|
NLA_PUT_U64(msg, NL80211_ATTR_WDEV, bss->wdev_id);
|
|
|
|
else
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-02-12 13:11:43 -05:00
|
|
|
static int family_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct family_data *res = arg;
|
|
|
|
struct nlattr *tb[CTRL_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *mcgrp;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
nla_parse(tb, CTRL_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
if (!tb[CTRL_ATTR_MCAST_GROUPS])
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
nla_for_each_nested(mcgrp, tb[CTRL_ATTR_MCAST_GROUPS], i) {
|
|
|
|
struct nlattr *tb2[CTRL_ATTR_MCAST_GRP_MAX + 1];
|
|
|
|
nla_parse(tb2, CTRL_ATTR_MCAST_GRP_MAX, nla_data(mcgrp),
|
|
|
|
nla_len(mcgrp), NULL);
|
|
|
|
if (!tb2[CTRL_ATTR_MCAST_GRP_NAME] ||
|
|
|
|
!tb2[CTRL_ATTR_MCAST_GRP_ID] ||
|
|
|
|
os_strncmp(nla_data(tb2[CTRL_ATTR_MCAST_GRP_NAME]),
|
|
|
|
res->group,
|
|
|
|
nla_len(tb2[CTRL_ATTR_MCAST_GRP_NAME])) != 0)
|
|
|
|
continue;
|
|
|
|
res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]);
|
|
|
|
break;
|
|
|
|
};
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
static int nl_get_multicast_id(struct nl80211_global *global,
|
2009-02-12 13:11:43 -05:00
|
|
|
const char *family, const char *group)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = -1;
|
|
|
|
struct family_data res = { group, -ENOENT };
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
2011-12-06 12:47:59 -05:00
|
|
|
genlmsg_put(msg, 0, 0, genl_ctrl_resolve(global->nl, "nlctrl"),
|
2009-02-12 13:11:43 -05:00
|
|
|
0, 0, CTRL_CMD_GETFAMILY, 0);
|
|
|
|
NLA_PUT_STRING(msg, CTRL_ATTR_FAMILY_NAME, family);
|
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
ret = send_and_recv_msgs_global(global, msg, family_handler, &res);
|
2009-02-12 13:11:43 -05:00
|
|
|
msg = NULL;
|
|
|
|
if (ret == 0)
|
|
|
|
ret = res.id;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
void * nl80211_cmd(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nl_msg *msg, int flags, uint8_t cmd)
|
2011-10-20 18:34:54 -04:00
|
|
|
{
|
2011-11-16 09:42:49 -05:00
|
|
|
return genlmsg_put(msg, 0, 0, drv->global->nl80211_id,
|
2011-10-22 12:00:27 -04:00
|
|
|
0, flags, cmd, 0);
|
2011-10-20 18:34:54 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:39:57 -05:00
|
|
|
struct wiphy_idx_data {
|
|
|
|
int wiphy_idx;
|
2013-06-25 06:38:03 -04:00
|
|
|
enum nl80211_iftype nlmode;
|
2013-06-25 06:50:21 -04:00
|
|
|
u8 *macaddr;
|
2011-12-06 11:39:57 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
static int netdev_info_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct wiphy_idx_data *info = arg;
|
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_WIPHY])
|
|
|
|
info->wiphy_idx = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
|
|
|
|
|
2013-06-25 06:38:03 -04:00
|
|
|
if (tb[NL80211_ATTR_IFTYPE])
|
|
|
|
info->nlmode = nla_get_u32(tb[NL80211_ATTR_IFTYPE]);
|
|
|
|
|
2013-06-25 06:50:21 -04:00
|
|
|
if (tb[NL80211_ATTR_MAC] && info->macaddr)
|
|
|
|
os_memcpy(info->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
|
|
|
|
ETH_ALEN);
|
|
|
|
|
2011-12-06 11:39:57 -05:00
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
int nl80211_get_wiphy_index(struct i802_bss *bss)
|
2011-12-06 11:39:57 -05:00
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
struct wiphy_idx_data data = {
|
|
|
|
.wiphy_idx = -1,
|
2013-06-25 06:50:21 -04:00
|
|
|
.macaddr = NULL,
|
2011-12-06 11:39:57 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
2013-06-25 06:49:16 -04:00
|
|
|
return NL80211_IFTYPE_UNSPECIFIED;
|
2011-12-06 11:39:57 -05:00
|
|
|
|
|
|
|
nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_GET_INTERFACE);
|
|
|
|
|
2013-06-30 03:29:00 -04:00
|
|
|
if (nl80211_set_iface_id(msg, bss) < 0)
|
|
|
|
goto nla_put_failure;
|
2011-12-06 11:39:57 -05:00
|
|
|
|
|
|
|
if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data) == 0)
|
|
|
|
return data.wiphy_idx;
|
|
|
|
msg = NULL;
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-25 06:38:03 -04:00
|
|
|
static enum nl80211_iftype nl80211_get_ifmode(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
struct wiphy_idx_data data = {
|
2013-06-25 06:50:21 -04:00
|
|
|
.nlmode = NL80211_IFTYPE_UNSPECIFIED,
|
|
|
|
.macaddr = NULL,
|
2013-06-25 06:38:03 -04:00
|
|
|
};
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_GET_INTERFACE);
|
|
|
|
|
2013-06-25 06:44:54 -04:00
|
|
|
if (nl80211_set_iface_id(msg, bss) < 0)
|
|
|
|
goto nla_put_failure;
|
2013-06-25 06:38:03 -04:00
|
|
|
|
|
|
|
if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data) == 0)
|
|
|
|
return data.nlmode;
|
|
|
|
msg = NULL;
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return NL80211_IFTYPE_UNSPECIFIED;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-25 06:50:21 -04:00
|
|
|
static int nl80211_get_macaddr(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
struct wiphy_idx_data data = {
|
|
|
|
.macaddr = bss->addr,
|
|
|
|
};
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return NL80211_IFTYPE_UNSPECIFIED;
|
|
|
|
|
|
|
|
nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_GET_INTERFACE);
|
|
|
|
if (nl80211_set_iface_id(msg, bss) < 0)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
return send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data);
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return NL80211_IFTYPE_UNSPECIFIED;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:39:57 -05:00
|
|
|
static int nl80211_register_beacons(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nl80211_wiphy_data *w)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_REGISTER_BEACONS);
|
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY, w->wiphy_idx);
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
ret = send_and_recv(drv->global, w->nl_beacons, msg, NULL, NULL);
|
2011-12-06 11:39:57 -05:00
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Register beacons command "
|
|
|
|
"failed: ret=%d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void nl80211_recv_beacons(int sock, void *eloop_ctx, void *handle)
|
|
|
|
{
|
|
|
|
struct nl80211_wiphy_data *w = eloop_ctx;
|
2013-10-26 09:13:34 -04:00
|
|
|
int res;
|
2011-12-06 11:39:57 -05:00
|
|
|
|
2011-12-30 07:10:15 -05:00
|
|
|
wpa_printf(MSG_EXCESSIVE, "nl80211: Beacon event message available");
|
2011-12-06 11:39:57 -05:00
|
|
|
|
2013-10-26 09:13:34 -04:00
|
|
|
res = nl_recvmsgs(handle, w->nl_cb);
|
2014-05-23 01:51:07 -04:00
|
|
|
if (res < 0) {
|
2013-10-26 09:13:34 -04:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
|
|
|
|
__func__, res);
|
|
|
|
}
|
2011-12-06 11:39:57 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int process_beacon_event(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nl80211_wiphy_data *w = arg;
|
|
|
|
struct wpa_driver_nl80211_data *drv;
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
union wpa_event_data event;
|
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
if (gnlh->cmd != NL80211_CMD_FRAME) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)",
|
|
|
|
gnlh->cmd);
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_FRAME])
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
dl_list_for_each(drv, &w->drvs, struct wpa_driver_nl80211_data,
|
|
|
|
wiphy_list) {
|
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
event.rx_mgmt.frame = nla_data(tb[NL80211_ATTR_FRAME]);
|
|
|
|
event.rx_mgmt.frame_len = nla_len(tb[NL80211_ATTR_FRAME]);
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
|
|
|
|
}
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct nl80211_wiphy_data *
|
|
|
|
nl80211_get_wiphy_data_ap(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
static DEFINE_DL_LIST(nl80211_wiphys);
|
|
|
|
struct nl80211_wiphy_data *w;
|
|
|
|
int wiphy_idx, found = 0;
|
|
|
|
struct i802_bss *tmp_bss;
|
|
|
|
|
|
|
|
if (bss->wiphy_data != NULL)
|
|
|
|
return bss->wiphy_data;
|
|
|
|
|
|
|
|
wiphy_idx = nl80211_get_wiphy_index(bss);
|
|
|
|
|
|
|
|
dl_list_for_each(w, &nl80211_wiphys, struct nl80211_wiphy_data, list) {
|
|
|
|
if (w->wiphy_idx == wiphy_idx)
|
|
|
|
goto add;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* alloc new one */
|
|
|
|
w = os_zalloc(sizeof(*w));
|
|
|
|
if (w == NULL)
|
|
|
|
return NULL;
|
|
|
|
w->wiphy_idx = wiphy_idx;
|
|
|
|
dl_list_init(&w->bsss);
|
|
|
|
dl_list_init(&w->drvs);
|
|
|
|
|
|
|
|
w->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
|
|
|
|
if (!w->nl_cb) {
|
|
|
|
os_free(w);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
nl_cb_set(w->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL);
|
|
|
|
nl_cb_set(w->nl_cb, NL_CB_VALID, NL_CB_CUSTOM, process_beacon_event,
|
|
|
|
w);
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
w->nl_beacons = nl_create_handle(bss->drv->global->nl_cb,
|
|
|
|
"wiphy beacons");
|
|
|
|
if (w->nl_beacons == NULL) {
|
2011-12-06 11:39:57 -05:00
|
|
|
os_free(w);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nl80211_register_beacons(bss->drv, w)) {
|
|
|
|
nl_destroy_handles(&w->nl_beacons);
|
|
|
|
os_free(w);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-10-26 09:06:49 -04:00
|
|
|
nl80211_register_eloop_read(&w->nl_beacons, nl80211_recv_beacons, w);
|
2011-12-06 11:39:57 -05:00
|
|
|
|
|
|
|
dl_list_add(&nl80211_wiphys, &w->list);
|
|
|
|
|
|
|
|
add:
|
|
|
|
/* drv entry for this bss already there? */
|
|
|
|
dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
|
|
|
|
if (tmp_bss->drv == bss->drv) {
|
|
|
|
found = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* if not add it */
|
|
|
|
if (!found)
|
|
|
|
dl_list_add(&w->drvs, &bss->drv->wiphy_list);
|
|
|
|
|
|
|
|
dl_list_add(&w->bsss, &bss->wiphy_list);
|
|
|
|
bss->wiphy_data = w;
|
|
|
|
return w;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void nl80211_put_wiphy_data_ap(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
struct nl80211_wiphy_data *w = bss->wiphy_data;
|
|
|
|
struct i802_bss *tmp_bss;
|
|
|
|
int found = 0;
|
|
|
|
|
|
|
|
if (w == NULL)
|
|
|
|
return;
|
|
|
|
bss->wiphy_data = NULL;
|
|
|
|
dl_list_del(&bss->wiphy_list);
|
|
|
|
|
|
|
|
/* still any for this drv present? */
|
|
|
|
dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
|
|
|
|
if (tmp_bss->drv == bss->drv) {
|
|
|
|
found = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* if not remove it */
|
|
|
|
if (!found)
|
|
|
|
dl_list_del(&bss->drv->wiphy_list);
|
|
|
|
|
|
|
|
if (!dl_list_empty(&w->bsss))
|
|
|
|
return;
|
|
|
|
|
2013-10-26 09:06:49 -04:00
|
|
|
nl80211_destroy_eloop_handle(&w->nl_beacons);
|
2011-12-06 11:39:57 -05:00
|
|
|
|
|
|
|
nl_cb_put(w->nl_cb);
|
|
|
|
dl_list_del(&w->list);
|
|
|
|
os_free(w);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
static int wpa_driver_nl80211_get_bssid(void *priv, u8 *bssid)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-03-20 16:26:41 -04:00
|
|
|
if (!drv->associated)
|
|
|
|
return -1;
|
|
|
|
os_memcpy(bssid, drv->bssid, ETH_ALEN);
|
|
|
|
return 0;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_get_ssid(void *priv, u8 *ssid)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-03-20 17:03:18 -04:00
|
|
|
if (!drv->associated)
|
|
|
|
return -1;
|
|
|
|
os_memcpy(ssid, drv->ssid, drv->ssid_len);
|
|
|
|
return drv->ssid_len;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-06 04:49:46 -05:00
|
|
|
static void wpa_driver_nl80211_event_newlink(
|
|
|
|
struct wpa_driver_nl80211_data *drv, char *ifname)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
|
|
|
union wpa_event_data event;
|
|
|
|
|
2014-01-06 04:49:46 -05:00
|
|
|
if (os_strcmp(drv->first_bss->ifname, ifname) == 0) {
|
|
|
|
if (if_nametoindex(drv->first_bss->ifname) == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Interface %s does not exist - ignore RTM_NEWLINK",
|
|
|
|
drv->first_bss->ifname);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (!drv->if_removed)
|
|
|
|
return;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Mark if_removed=0 for %s based on RTM_NEWLINK event",
|
|
|
|
drv->first_bss->ifname);
|
|
|
|
drv->if_removed = 0;
|
|
|
|
}
|
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
2014-01-06 04:49:46 -05:00
|
|
|
os_strlcpy(event.interface_status.ifname, ifname,
|
|
|
|
sizeof(event.interface_status.ifname));
|
|
|
|
event.interface_status.ievent = EVENT_INTERFACE_ADDED;
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpa_driver_nl80211_event_dellink(
|
|
|
|
struct wpa_driver_nl80211_data *drv, char *ifname)
|
|
|
|
{
|
|
|
|
union wpa_event_data event;
|
|
|
|
|
|
|
|
if (os_strcmp(drv->first_bss->ifname, ifname) == 0) {
|
|
|
|
if (drv->if_removed) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: if_removed already set - ignore RTM_DELLINK event for %s",
|
|
|
|
ifname);
|
|
|
|
return;
|
2012-02-18 06:13:23 -05:00
|
|
|
}
|
2014-01-06 04:49:46 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed - mark if_removed=1",
|
|
|
|
ifname);
|
|
|
|
drv->if_removed = 1;
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed",
|
|
|
|
ifname);
|
2008-08-15 10:55:16 -04:00
|
|
|
}
|
|
|
|
|
2014-01-06 04:49:46 -05:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
os_strlcpy(event.interface_status.ifname, ifname,
|
|
|
|
sizeof(event.interface_status.ifname));
|
|
|
|
event.interface_status.ievent = EVENT_INTERFACE_REMOVED;
|
2009-12-18 10:11:54 -05:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-08-15 10:55:16 -04:00
|
|
|
static int wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data *drv,
|
2009-12-18 10:49:07 -05:00
|
|
|
u8 *buf, size_t len)
|
2008-08-15 10:55:16 -04:00
|
|
|
{
|
2009-12-18 10:49:07 -05:00
|
|
|
int attrlen, rta_len;
|
2008-08-15 10:55:16 -04:00
|
|
|
struct rtattr *attr;
|
|
|
|
|
2009-12-18 10:49:07 -05:00
|
|
|
attrlen = len;
|
|
|
|
attr = (struct rtattr *) buf;
|
2008-08-15 10:55:16 -04:00
|
|
|
|
|
|
|
rta_len = RTA_ALIGN(sizeof(struct rtattr));
|
|
|
|
while (RTA_OK(attr, attrlen)) {
|
|
|
|
if (attr->rta_type == IFLA_IFNAME) {
|
2013-10-29 20:41:39 -04:00
|
|
|
if (os_strcmp(((char *) attr) + rta_len,
|
|
|
|
drv->first_bss->ifname) == 0)
|
2008-08-15 10:55:16 -04:00
|
|
|
return 1;
|
|
|
|
else
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
attr = RTA_NEXT(attr, attrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data *drv,
|
2009-12-18 10:49:07 -05:00
|
|
|
int ifindex, u8 *buf, size_t len)
|
2008-08-15 10:55:16 -04:00
|
|
|
{
|
|
|
|
if (drv->ifindex == ifindex)
|
|
|
|
return 1;
|
|
|
|
|
2009-12-18 10:49:07 -05:00
|
|
|
if (drv->if_removed && wpa_driver_nl80211_own_ifname(drv, buf, len)) {
|
2008-08-15 10:55:16 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
|
|
|
|
"interface");
|
2013-11-09 10:29:32 -05:00
|
|
|
wpa_driver_nl80211_finish_drv_init(drv, NULL, 0);
|
2008-08-15 10:55:16 -04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-10-20 19:03:25 -04:00
|
|
|
static struct wpa_driver_nl80211_data *
|
|
|
|
nl80211_find_drv(struct nl80211_global *global, int idx, u8 *buf, size_t len)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv;
|
|
|
|
dl_list_for_each(drv, &global->interfaces,
|
|
|
|
struct wpa_driver_nl80211_data, list) {
|
|
|
|
if (wpa_driver_nl80211_own_ifindex(drv, idx, buf, len) ||
|
|
|
|
have_ifidx(drv, idx))
|
|
|
|
return drv;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-18 10:49:07 -05:00
|
|
|
static void wpa_driver_nl80211_event_rtm_newlink(void *ctx,
|
|
|
|
struct ifinfomsg *ifi,
|
|
|
|
u8 *buf, size_t len)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
2011-10-20 19:03:25 -04:00
|
|
|
struct nl80211_global *global = ctx;
|
|
|
|
struct wpa_driver_nl80211_data *drv;
|
2014-01-06 04:49:46 -05:00
|
|
|
int attrlen;
|
2009-12-18 10:49:07 -05:00
|
|
|
struct rtattr *attr;
|
2010-04-15 17:36:33 -04:00
|
|
|
u32 brid = 0;
|
2011-12-03 06:18:57 -05:00
|
|
|
char namebuf[IFNAMSIZ];
|
2014-01-06 04:49:46 -05:00
|
|
|
char ifname[IFNAMSIZ + 1];
|
|
|
|
char extra[100], *pos, *end;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2011-10-20 19:03:25 -04:00
|
|
|
drv = nl80211_find_drv(global, ifi->ifi_index, buf, len);
|
|
|
|
if (!drv) {
|
2014-01-06 04:49:46 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore RTM_NEWLINK event for foreign ifindex %d",
|
|
|
|
ifi->ifi_index);
|
2008-06-06 09:55:42 -04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-01-06 04:49:46 -05:00
|
|
|
extra[0] = '\0';
|
|
|
|
pos = extra;
|
|
|
|
end = pos + sizeof(extra);
|
|
|
|
ifname[0] = '\0';
|
|
|
|
|
|
|
|
attrlen = len;
|
|
|
|
attr = (struct rtattr *) buf;
|
|
|
|
while (RTA_OK(attr, attrlen)) {
|
|
|
|
switch (attr->rta_type) {
|
|
|
|
case IFLA_IFNAME:
|
|
|
|
if (RTA_PAYLOAD(attr) >= IFNAMSIZ)
|
|
|
|
break;
|
|
|
|
os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
|
|
|
|
ifname[RTA_PAYLOAD(attr)] = '\0';
|
|
|
|
break;
|
|
|
|
case IFLA_MASTER:
|
|
|
|
brid = nla_get_u32((struct nlattr *) attr);
|
|
|
|
pos += os_snprintf(pos, end - pos, " master=%u", brid);
|
|
|
|
break;
|
|
|
|
case IFLA_WIRELESS:
|
|
|
|
pos += os_snprintf(pos, end - pos, " wext");
|
|
|
|
break;
|
|
|
|
case IFLA_OPERSTATE:
|
|
|
|
pos += os_snprintf(pos, end - pos, " operstate=%u",
|
|
|
|
nla_get_u32((struct nlattr *) attr));
|
|
|
|
break;
|
|
|
|
case IFLA_LINKMODE:
|
|
|
|
pos += os_snprintf(pos, end - pos, " linkmode=%u",
|
|
|
|
nla_get_u32((struct nlattr *) attr));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
attr = RTA_NEXT(attr, attrlen);
|
|
|
|
}
|
|
|
|
extra[sizeof(extra) - 1] = '\0';
|
|
|
|
|
2014-09-01 09:18:01 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "RTM_NEWLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
|
|
|
|
ifi->ifi_index, ifname, extra, ifi->ifi_family,
|
|
|
|
ifi->ifi_flags,
|
2008-06-06 09:55:42 -04:00
|
|
|
(ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
|
|
|
|
(ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
|
|
|
|
(ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
|
|
|
|
(ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
|
2010-05-31 11:00:27 -04:00
|
|
|
|
|
|
|
if (!drv->if_disabled && !(ifi->ifi_flags & IFF_UP)) {
|
2011-10-28 14:08:15 -04:00
|
|
|
if (if_indextoname(ifi->ifi_index, namebuf) &&
|
|
|
|
linux_iface_up(drv->global->ioctl_sock,
|
2013-10-29 20:41:39 -04:00
|
|
|
drv->first_bss->ifname) > 0) {
|
2011-10-28 14:08:15 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
|
|
|
|
"event since interface %s is up", namebuf);
|
|
|
|
return;
|
|
|
|
}
|
2010-05-31 11:00:27 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Interface down");
|
2011-07-17 06:56:34 -04:00
|
|
|
if (drv->ignore_if_down_event) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
|
|
|
|
"event generated by mode change");
|
|
|
|
drv->ignore_if_down_event = 0;
|
|
|
|
} else {
|
|
|
|
drv->if_disabled = 1;
|
|
|
|
wpa_supplicant_event(drv->ctx,
|
|
|
|
EVENT_INTERFACE_DISABLED, NULL);
|
2014-03-03 07:53:19 -05:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Try to get drv again, since it may be removed as
|
|
|
|
* part of the EVENT_INTERFACE_DISABLED handling for
|
|
|
|
* dynamic interfaces
|
|
|
|
*/
|
|
|
|
drv = nl80211_find_drv(global, ifi->ifi_index,
|
|
|
|
buf, len);
|
|
|
|
if (!drv)
|
|
|
|
return;
|
2011-07-17 06:56:34 -04:00
|
|
|
}
|
2010-05-31 11:00:27 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (drv->if_disabled && (ifi->ifi_flags & IFF_UP)) {
|
2011-12-03 06:18:57 -05:00
|
|
|
if (if_indextoname(ifi->ifi_index, namebuf) &&
|
|
|
|
linux_iface_up(drv->global->ioctl_sock,
|
2013-10-29 20:41:39 -04:00
|
|
|
drv->first_bss->ifname) == 0) {
|
2011-12-03 06:18:57 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
|
|
|
|
"event since interface %s is down",
|
|
|
|
namebuf);
|
2013-10-29 20:41:39 -04:00
|
|
|
} else if (if_nametoindex(drv->first_bss->ifname) == 0) {
|
2012-02-18 06:13:23 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
|
|
|
|
"event since interface %s does not exist",
|
2013-10-29 20:41:39 -04:00
|
|
|
drv->first_bss->ifname);
|
2012-02-18 06:13:23 -05:00
|
|
|
} else if (drv->if_removed) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
|
|
|
|
"event since interface %s is marked "
|
2013-10-29 20:41:39 -04:00
|
|
|
"removed", drv->first_bss->ifname);
|
2011-12-03 06:18:57 -05:00
|
|
|
} else {
|
2014-10-02 11:30:05 -04:00
|
|
|
struct i802_bss *bss;
|
|
|
|
u8 addr[ETH_ALEN];
|
|
|
|
|
|
|
|
/* Re-read MAC address as it may have changed */
|
|
|
|
bss = get_bss_ifindex(drv, ifi->ifi_index);
|
|
|
|
if (bss &&
|
|
|
|
linux_get_ifhwaddr(drv->global->ioctl_sock,
|
|
|
|
bss->ifname, addr) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: %s: failed to re-read MAC address",
|
|
|
|
bss->ifname);
|
|
|
|
} else if (bss &&
|
|
|
|
os_memcmp(addr, bss->addr, ETH_ALEN) != 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Own MAC address on ifindex %d (%s) changed from "
|
|
|
|
MACSTR " to " MACSTR,
|
|
|
|
ifi->ifi_index, bss->ifname,
|
|
|
|
MAC2STR(bss->addr),
|
|
|
|
MAC2STR(addr));
|
|
|
|
os_memcpy(bss->addr, addr, ETH_ALEN);
|
|
|
|
}
|
|
|
|
|
2011-12-03 06:18:57 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Interface up");
|
|
|
|
drv->if_disabled = 0;
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED,
|
|
|
|
NULL);
|
|
|
|
}
|
2010-05-31 11:00:27 -04:00
|
|
|
}
|
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
/*
|
|
|
|
* Some drivers send the association event before the operup event--in
|
|
|
|
* this case, lifting operstate in wpa_driver_nl80211_set_operstate()
|
|
|
|
* fails. This will hit us when wpa_supplicant does not need to do
|
|
|
|
* IEEE 802.1X authentication
|
|
|
|
*/
|
|
|
|
if (drv->operstate == 1 &&
|
|
|
|
(ifi->ifi_flags & (IFF_LOWER_UP | IFF_DORMANT)) == IFF_LOWER_UP &&
|
2014-01-06 04:49:46 -05:00
|
|
|
!(ifi->ifi_flags & IFF_RUNNING)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate");
|
2011-10-20 19:03:25 -04:00
|
|
|
netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
|
2009-12-18 09:35:33 -05:00
|
|
|
-1, IF_OPER_UP);
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
2010-04-15 17:36:33 -04:00
|
|
|
|
2014-01-06 04:49:46 -05:00
|
|
|
if (ifname[0])
|
|
|
|
wpa_driver_nl80211_event_newlink(drv, ifname);
|
|
|
|
|
2010-04-15 17:36:33 -04:00
|
|
|
if (ifi->ifi_family == AF_BRIDGE && brid) {
|
2014-10-26 05:20:01 -04:00
|
|
|
struct i802_bss *bss;
|
|
|
|
|
2010-04-15 17:36:33 -04:00
|
|
|
/* device has been added to bridge */
|
|
|
|
if_indextoname(brid, namebuf);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Add ifindex %u for bridge %s",
|
|
|
|
brid, namebuf);
|
|
|
|
add_ifidx(drv, brid);
|
2014-10-26 05:20:01 -04:00
|
|
|
|
|
|
|
for (bss = drv->first_bss; bss; bss = bss->next) {
|
|
|
|
if (os_strcmp(ifname, bss->ifname) == 0) {
|
|
|
|
os_strlcpy(bss->brname, namebuf, IFNAMSIZ);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2010-04-15 17:36:33 -04:00
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-18 10:49:07 -05:00
|
|
|
static void wpa_driver_nl80211_event_rtm_dellink(void *ctx,
|
|
|
|
struct ifinfomsg *ifi,
|
|
|
|
u8 *buf, size_t len)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
2011-10-20 19:03:25 -04:00
|
|
|
struct nl80211_global *global = ctx;
|
|
|
|
struct wpa_driver_nl80211_data *drv;
|
2014-01-06 04:49:46 -05:00
|
|
|
int attrlen;
|
2009-12-18 10:49:07 -05:00
|
|
|
struct rtattr *attr;
|
2010-04-15 17:36:33 -04:00
|
|
|
u32 brid = 0;
|
2014-01-06 04:49:46 -05:00
|
|
|
char ifname[IFNAMSIZ + 1];
|
2014-09-01 09:18:01 -04:00
|
|
|
char extra[100], *pos, *end;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2011-10-20 19:03:25 -04:00
|
|
|
drv = nl80211_find_drv(global, ifi->ifi_index, buf, len);
|
|
|
|
if (!drv) {
|
2014-01-06 04:49:46 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore RTM_DELLINK event for foreign ifindex %d",
|
|
|
|
ifi->ifi_index);
|
2011-10-20 19:03:25 -04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-09-01 09:18:01 -04:00
|
|
|
extra[0] = '\0';
|
|
|
|
pos = extra;
|
|
|
|
end = pos + sizeof(extra);
|
2014-01-06 04:49:46 -05:00
|
|
|
ifname[0] = '\0';
|
|
|
|
|
2009-12-18 10:49:07 -05:00
|
|
|
attrlen = len;
|
|
|
|
attr = (struct rtattr *) buf;
|
2008-06-06 09:55:42 -04:00
|
|
|
while (RTA_OK(attr, attrlen)) {
|
2014-01-06 04:49:46 -05:00
|
|
|
switch (attr->rta_type) {
|
|
|
|
case IFLA_IFNAME:
|
|
|
|
if (RTA_PAYLOAD(attr) >= IFNAMSIZ)
|
|
|
|
break;
|
|
|
|
os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
|
|
|
|
ifname[RTA_PAYLOAD(attr)] = '\0';
|
|
|
|
break;
|
|
|
|
case IFLA_MASTER:
|
2010-04-15 17:36:33 -04:00
|
|
|
brid = nla_get_u32((struct nlattr *) attr);
|
2014-09-01 09:18:01 -04:00
|
|
|
pos += os_snprintf(pos, end - pos, " master=%u", brid);
|
|
|
|
break;
|
|
|
|
case IFLA_OPERSTATE:
|
|
|
|
pos += os_snprintf(pos, end - pos, " operstate=%u",
|
|
|
|
nla_get_u32((struct nlattr *) attr));
|
|
|
|
break;
|
|
|
|
case IFLA_LINKMODE:
|
|
|
|
pos += os_snprintf(pos, end - pos, " linkmode=%u",
|
|
|
|
nla_get_u32((struct nlattr *) attr));
|
2014-01-06 04:49:46 -05:00
|
|
|
break;
|
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
attr = RTA_NEXT(attr, attrlen);
|
|
|
|
}
|
2014-09-01 09:18:01 -04:00
|
|
|
extra[sizeof(extra) - 1] = '\0';
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "RTM_DELLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
|
|
|
|
ifi->ifi_index, ifname, extra, ifi->ifi_family,
|
|
|
|
ifi->ifi_flags,
|
|
|
|
(ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
|
|
|
|
(ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
|
|
|
|
(ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
|
|
|
|
(ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
|
2010-04-15 17:36:33 -04:00
|
|
|
|
2014-09-01 09:14:07 -04:00
|
|
|
if (ifname[0] && (ifi->ifi_family != AF_BRIDGE || !brid))
|
2014-01-06 04:49:46 -05:00
|
|
|
wpa_driver_nl80211_event_dellink(drv, ifname);
|
|
|
|
|
2010-04-15 17:36:33 -04:00
|
|
|
if (ifi->ifi_family == AF_BRIDGE && brid) {
|
|
|
|
/* device has been removed from bridge */
|
|
|
|
char namebuf[IFNAMSIZ];
|
|
|
|
if_indextoname(brid, namebuf);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Remove ifindex %u for bridge "
|
|
|
|
"%s", brid, namebuf);
|
|
|
|
del_ifidx(drv, brid);
|
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-03-20 16:26:41 -04:00
|
|
|
static void mlme_event_auth(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const u8 *frame, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
union wpa_event_data event;
|
|
|
|
|
2014-09-27 05:53:17 -04:00
|
|
|
if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME) &&
|
|
|
|
drv->force_connect_cmd) {
|
|
|
|
/*
|
|
|
|
* Avoid reporting two association events that would confuse
|
|
|
|
* the core code.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Ignore auth event when using driver SME");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-11-03 07:54:43 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Authenticate event");
|
2009-03-20 16:26:41 -04:00
|
|
|
mgmt = (const struct ieee80211_mgmt *) frame;
|
|
|
|
if (len < 24 + sizeof(mgmt->u.auth)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
|
|
|
|
"frame");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2009-12-02 09:45:31 -05:00
|
|
|
os_memcpy(drv->auth_bssid, mgmt->sa, ETH_ALEN);
|
2013-05-27 13:10:57 -04:00
|
|
|
os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
|
2009-03-20 16:26:41 -04:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
|
|
|
|
event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg);
|
2012-10-24 02:10:42 -04:00
|
|
|
event.auth.auth_transaction =
|
|
|
|
le_to_host16(mgmt->u.auth.auth_transaction);
|
2009-03-20 16:26:41 -04:00
|
|
|
event.auth.status_code = le_to_host16(mgmt->u.auth.status_code);
|
|
|
|
if (len > 24 + sizeof(mgmt->u.auth)) {
|
|
|
|
event.auth.ies = mgmt->u.auth.variable;
|
|
|
|
event.auth.ies_len = len - 24 - sizeof(mgmt->u.auth);
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_AUTH, &event);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
unsigned int nl80211_get_assoc_freq(struct wpa_driver_nl80211_data *drv)
|
2011-05-16 11:35:42 -04:00
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
struct nl80211_bss_info_arg arg;
|
|
|
|
|
|
|
|
os_memset(&arg, 0, sizeof(arg));
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
|
2011-05-16 11:35:42 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
arg.drv = drv;
|
|
|
|
ret = send_and_recv_msgs(drv, msg, bss_info_handler, &arg);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret == 0) {
|
2014-05-13 17:47:42 -04:00
|
|
|
unsigned int freq = drv->nlmode == NL80211_IFTYPE_ADHOC ?
|
|
|
|
arg.ibss_freq : arg.assoc_freq;
|
2011-05-16 11:35:42 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Operating frequency for the "
|
2014-05-13 17:47:42 -04:00
|
|
|
"associated BSS from scan results: %u MHz", freq);
|
|
|
|
if (freq)
|
|
|
|
drv->assoc_freq = freq;
|
2013-08-23 08:41:05 -04:00
|
|
|
return drv->assoc_freq;
|
2011-05-16 11:35:42 -04:00
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
|
|
|
|
"(%s)", ret, strerror(-ret));
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return drv->assoc_freq;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-03-20 16:26:41 -04:00
|
|
|
static void mlme_event_assoc(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const u8 *frame, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
union wpa_event_data event;
|
|
|
|
u16 status;
|
|
|
|
|
2014-09-27 05:53:17 -04:00
|
|
|
if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME) &&
|
|
|
|
drv->force_connect_cmd) {
|
|
|
|
/*
|
|
|
|
* Avoid reporting two association events that would confuse
|
|
|
|
* the core code.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Ignore assoc event when using driver SME");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-11-03 07:54:43 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Associate event");
|
2009-03-20 16:26:41 -04:00
|
|
|
mgmt = (const struct ieee80211_mgmt *) frame;
|
|
|
|
if (len < 24 + sizeof(mgmt->u.assoc_resp)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
|
|
|
|
"frame");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
status = le_to_host16(mgmt->u.assoc_resp.status_code);
|
|
|
|
if (status != WLAN_STATUS_SUCCESS) {
|
2009-04-01 10:10:36 -04:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
2010-10-27 13:27:39 -04:00
|
|
|
event.assoc_reject.bssid = mgmt->bssid;
|
2009-04-01 10:10:36 -04:00
|
|
|
if (len > 24 + sizeof(mgmt->u.assoc_resp)) {
|
|
|
|
event.assoc_reject.resp_ies =
|
|
|
|
(u8 *) mgmt->u.assoc_resp.variable;
|
|
|
|
event.assoc_reject.resp_ies_len =
|
|
|
|
len - 24 - sizeof(mgmt->u.assoc_resp);
|
|
|
|
}
|
|
|
|
event.assoc_reject.status_code = status;
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_ASSOC_REJECT, &event);
|
2009-03-20 16:26:41 -04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
drv->associated = 1;
|
|
|
|
os_memcpy(drv->bssid, mgmt->sa, ETH_ALEN);
|
2013-05-27 13:10:57 -04:00
|
|
|
os_memcpy(drv->prev_bssid, mgmt->sa, ETH_ALEN);
|
2009-03-20 16:26:41 -04:00
|
|
|
|
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
if (len > 24 + sizeof(mgmt->u.assoc_resp)) {
|
|
|
|
event.assoc_info.resp_ies = (u8 *) mgmt->u.assoc_resp.variable;
|
|
|
|
event.assoc_info.resp_ies_len =
|
2009-04-01 10:10:36 -04:00
|
|
|
len - 24 - sizeof(mgmt->u.assoc_resp);
|
2009-03-20 16:26:41 -04:00
|
|
|
}
|
|
|
|
|
2009-12-28 06:23:13 -05:00
|
|
|
event.assoc_info.freq = drv->assoc_freq;
|
|
|
|
|
2009-03-20 16:26:41 -04:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_ASSOC, &event);
|
|
|
|
}
|
|
|
|
|
2009-11-23 08:40:29 -05:00
|
|
|
|
2009-09-03 13:39:59 -04:00
|
|
|
static void mlme_event_connect(struct wpa_driver_nl80211_data *drv,
|
|
|
|
enum nl80211_commands cmd, struct nlattr *status,
|
|
|
|
struct nlattr *addr, struct nlattr *req_ie,
|
2014-10-23 11:21:49 -04:00
|
|
|
struct nlattr *resp_ie,
|
|
|
|
struct nlattr *authorized,
|
|
|
|
struct nlattr *key_replay_ctr,
|
|
|
|
struct nlattr *ptk_kck,
|
|
|
|
struct nlattr *ptk_kek)
|
2009-09-03 13:39:59 -04:00
|
|
|
{
|
|
|
|
union wpa_event_data event;
|
|
|
|
|
2009-09-04 09:39:41 -04:00
|
|
|
if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) {
|
|
|
|
/*
|
|
|
|
* Avoid reporting two association events that would confuse
|
|
|
|
* the core code.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore connect event (cmd=%d) "
|
|
|
|
"when using userspace SME", cmd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-11-03 07:54:43 -04:00
|
|
|
if (cmd == NL80211_CMD_CONNECT)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Connect event");
|
|
|
|
else if (cmd == NL80211_CMD_ROAM)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Roam event");
|
|
|
|
|
2009-09-03 13:39:59 -04:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
if (cmd == NL80211_CMD_CONNECT &&
|
|
|
|
nla_get_u16(status) != WLAN_STATUS_SUCCESS) {
|
2010-11-26 10:40:10 -05:00
|
|
|
if (addr)
|
|
|
|
event.assoc_reject.bssid = nla_data(addr);
|
2009-09-03 13:39:59 -04:00
|
|
|
if (resp_ie) {
|
|
|
|
event.assoc_reject.resp_ies = nla_data(resp_ie);
|
|
|
|
event.assoc_reject.resp_ies_len = nla_len(resp_ie);
|
|
|
|
}
|
|
|
|
event.assoc_reject.status_code = nla_get_u16(status);
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_ASSOC_REJECT, &event);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
drv->associated = 1;
|
2013-05-27 13:10:57 -04:00
|
|
|
if (addr) {
|
2009-09-03 13:39:59 -04:00
|
|
|
os_memcpy(drv->bssid, nla_data(addr), ETH_ALEN);
|
2013-05-27 13:10:57 -04:00
|
|
|
os_memcpy(drv->prev_bssid, drv->bssid, ETH_ALEN);
|
|
|
|
}
|
2009-09-03 13:39:59 -04:00
|
|
|
|
|
|
|
if (req_ie) {
|
|
|
|
event.assoc_info.req_ies = nla_data(req_ie);
|
|
|
|
event.assoc_info.req_ies_len = nla_len(req_ie);
|
|
|
|
}
|
|
|
|
if (resp_ie) {
|
|
|
|
event.assoc_info.resp_ies = nla_data(resp_ie);
|
|
|
|
event.assoc_info.resp_ies_len = nla_len(resp_ie);
|
|
|
|
}
|
|
|
|
|
2011-05-16 11:35:42 -04:00
|
|
|
event.assoc_info.freq = nl80211_get_assoc_freq(drv);
|
|
|
|
|
2014-10-23 11:21:49 -04:00
|
|
|
if (authorized && nla_get_u8(authorized)) {
|
|
|
|
event.assoc_info.authorized = 1;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: connection authorized");
|
|
|
|
}
|
|
|
|
if (key_replay_ctr) {
|
|
|
|
event.assoc_info.key_replay_ctr = nla_data(key_replay_ctr);
|
|
|
|
event.assoc_info.key_replay_ctr_len = nla_len(key_replay_ctr);
|
|
|
|
}
|
|
|
|
if (ptk_kck) {
|
|
|
|
event.assoc_info.ptk_kck = nla_data(ptk_kck);
|
|
|
|
event.assoc_info.ptk_kck_len = nla_len(ptk_kek);
|
|
|
|
}
|
|
|
|
if (ptk_kek) {
|
|
|
|
event.assoc_info.ptk_kek = nla_data(ptk_kek);
|
|
|
|
event.assoc_info.ptk_kek_len = nla_len(ptk_kek);
|
|
|
|
}
|
|
|
|
|
2009-09-03 13:39:59 -04:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_ASSOC, &event);
|
|
|
|
}
|
2009-03-20 16:26:41 -04:00
|
|
|
|
2009-11-23 08:40:29 -05:00
|
|
|
|
2011-09-18 14:26:55 -04:00
|
|
|
static void mlme_event_disconnect(struct wpa_driver_nl80211_data *drv,
|
2012-01-01 11:53:12 -05:00
|
|
|
struct nlattr *reason, struct nlattr *addr,
|
|
|
|
struct nlattr *by_ap)
|
2011-09-18 14:26:55 -04:00
|
|
|
{
|
|
|
|
union wpa_event_data data;
|
2012-11-11 09:15:29 -05:00
|
|
|
unsigned int locally_generated = by_ap == NULL;
|
2011-09-18 14:26:55 -04:00
|
|
|
|
|
|
|
if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) {
|
|
|
|
/*
|
|
|
|
* Avoid reporting two disassociation events that could
|
|
|
|
* confuse the core code.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore disconnect "
|
|
|
|
"event when using userspace SME");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-11-11 09:15:29 -05:00
|
|
|
if (drv->ignore_next_local_disconnect) {
|
|
|
|
drv->ignore_next_local_disconnect = 0;
|
|
|
|
if (locally_generated) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore disconnect "
|
|
|
|
"event triggered during reassociation");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_WARNING, "nl80211: Was expecting local "
|
|
|
|
"disconnect but got another disconnect "
|
|
|
|
"event first");
|
|
|
|
}
|
|
|
|
|
2012-11-03 07:54:43 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Disconnect event");
|
2013-05-27 13:10:57 -04:00
|
|
|
nl80211_mark_disconnected(drv);
|
2011-09-18 14:26:55 -04:00
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
if (reason)
|
2012-04-03 10:11:22 -04:00
|
|
|
data.deauth_info.reason_code = nla_get_u16(reason);
|
|
|
|
data.deauth_info.locally_generated = by_ap == NULL;
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_DEAUTH, &data);
|
2011-09-18 14:26:55 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-28 08:56:41 -05:00
|
|
|
static int calculate_chan_offset(int width, int freq, int cf1, int cf2)
|
|
|
|
{
|
|
|
|
int freq1 = 0;
|
|
|
|
|
|
|
|
switch (convert2width(width)) {
|
|
|
|
case CHAN_WIDTH_20_NOHT:
|
|
|
|
case CHAN_WIDTH_20:
|
|
|
|
return 0;
|
|
|
|
case CHAN_WIDTH_40:
|
|
|
|
freq1 = cf1 - 10;
|
|
|
|
break;
|
|
|
|
case CHAN_WIDTH_80:
|
|
|
|
freq1 = cf1 - 30;
|
|
|
|
break;
|
|
|
|
case CHAN_WIDTH_160:
|
|
|
|
freq1 = cf1 - 70;
|
|
|
|
break;
|
|
|
|
case CHAN_WIDTH_UNKNOWN:
|
|
|
|
case CHAN_WIDTH_80P80:
|
|
|
|
/* FIXME: implement this */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (abs(freq - freq1) / 20) % 2 == 0 ? 1 : -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-06-25 07:45:14 -04:00
|
|
|
static void mlme_event_ch_switch(struct wpa_driver_nl80211_data *drv,
|
2013-11-25 14:16:12 -05:00
|
|
|
struct nlattr *ifindex, struct nlattr *freq,
|
|
|
|
struct nlattr *type, struct nlattr *bw,
|
|
|
|
struct nlattr *cf1, struct nlattr *cf2)
|
2012-06-25 07:45:14 -04:00
|
|
|
{
|
2013-11-25 14:16:12 -05:00
|
|
|
struct i802_bss *bss;
|
2012-06-25 07:45:14 -04:00
|
|
|
union wpa_event_data data;
|
|
|
|
int ht_enabled = 1;
|
|
|
|
int chan_offset = 0;
|
2013-11-25 14:16:12 -05:00
|
|
|
int ifidx;
|
2012-06-25 07:45:14 -04:00
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Channel switch event");
|
|
|
|
|
2013-11-25 14:16:12 -05:00
|
|
|
if (!freq)
|
2012-06-25 07:45:14 -04:00
|
|
|
return;
|
|
|
|
|
2013-11-25 14:16:12 -05:00
|
|
|
ifidx = nla_get_u32(ifindex);
|
2014-10-04 09:20:38 -04:00
|
|
|
bss = get_bss_ifindex(drv, ifidx);
|
2013-11-25 14:16:12 -05:00
|
|
|
if (bss == NULL) {
|
|
|
|
wpa_printf(MSG_WARNING, "nl80211: Unknown ifindex (%d) for channel switch, ignoring",
|
|
|
|
ifidx);
|
|
|
|
return;
|
2012-06-25 07:45:14 -04:00
|
|
|
}
|
|
|
|
|
2013-11-25 14:16:12 -05:00
|
|
|
if (type) {
|
2014-10-25 04:28:56 -04:00
|
|
|
enum nl80211_channel_type ch_type = nla_get_u32(type);
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Channel type: %d", ch_type);
|
|
|
|
switch (ch_type) {
|
2013-11-25 14:16:12 -05:00
|
|
|
case NL80211_CHAN_NO_HT:
|
|
|
|
ht_enabled = 0;
|
|
|
|
break;
|
|
|
|
case NL80211_CHAN_HT20:
|
|
|
|
break;
|
|
|
|
case NL80211_CHAN_HT40PLUS:
|
|
|
|
chan_offset = 1;
|
|
|
|
break;
|
|
|
|
case NL80211_CHAN_HT40MINUS:
|
|
|
|
chan_offset = -1;
|
|
|
|
break;
|
|
|
|
}
|
2014-01-28 08:56:41 -05:00
|
|
|
} else if (bw && cf1) {
|
|
|
|
/* This can happen for example with VHT80 ch switch */
|
|
|
|
chan_offset = calculate_chan_offset(nla_get_u32(bw),
|
|
|
|
nla_get_u32(freq),
|
|
|
|
nla_get_u32(cf1),
|
|
|
|
cf2 ? nla_get_u32(cf2) : 0);
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_WARNING, "nl80211: Unknown secondary channel information - following channel definition calculations may fail");
|
2013-11-25 14:16:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
2012-06-25 07:45:14 -04:00
|
|
|
data.ch_switch.freq = nla_get_u32(freq);
|
|
|
|
data.ch_switch.ht_enabled = ht_enabled;
|
|
|
|
data.ch_switch.ch_offset = chan_offset;
|
2013-11-25 14:16:12 -05:00
|
|
|
if (bw)
|
|
|
|
data.ch_switch.ch_width = convert2width(nla_get_u32(bw));
|
|
|
|
if (cf1)
|
|
|
|
data.ch_switch.cf1 = nla_get_u32(cf1);
|
|
|
|
if (cf2)
|
|
|
|
data.ch_switch.cf2 = nla_get_u32(cf2);
|
2012-06-25 07:45:14 -04:00
|
|
|
|
2013-11-25 14:16:12 -05:00
|
|
|
bss->freq = data.ch_switch.freq;
|
2013-11-14 05:28:30 -05:00
|
|
|
|
2014-06-27 08:19:27 -04:00
|
|
|
wpa_supplicant_event(bss->ctx, EVENT_CH_SWITCH, &data);
|
2012-06-25 07:45:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-23 17:08:24 -04:00
|
|
|
static void mlme_timeout_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
enum nl80211_commands cmd, struct nlattr *addr)
|
|
|
|
{
|
|
|
|
union wpa_event_data event;
|
|
|
|
enum wpa_event_type ev;
|
|
|
|
|
|
|
|
if (nla_len(addr) != ETH_ALEN)
|
|
|
|
return;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: MLME event %d; timeout with " MACSTR,
|
|
|
|
cmd, MAC2STR((u8 *) nla_data(addr)));
|
|
|
|
|
|
|
|
if (cmd == NL80211_CMD_AUTHENTICATE)
|
|
|
|
ev = EVENT_AUTH_TIMED_OUT;
|
|
|
|
else if (cmd == NL80211_CMD_ASSOCIATE)
|
|
|
|
ev = EVENT_ASSOC_TIMED_OUT;
|
|
|
|
else
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
os_memcpy(event.timeout_event.addr, nla_data(addr), ETH_ALEN);
|
|
|
|
wpa_supplicant_event(drv->ctx, ev, &event);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-02-10 10:04:17 -05:00
|
|
|
static void mlme_event_mgmt(struct i802_bss *bss,
|
2012-04-01 05:39:33 -04:00
|
|
|
struct nlattr *freq, struct nlattr *sig,
|
|
|
|
const u8 *frame, size_t len)
|
2010-02-16 12:41:49 -05:00
|
|
|
{
|
2014-02-10 10:04:17 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2010-02-16 12:41:49 -05:00
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
union wpa_event_data event;
|
|
|
|
u16 fc, stype;
|
2012-04-01 05:39:33 -04:00
|
|
|
int ssi_signal = 0;
|
2013-09-25 10:42:00 -04:00
|
|
|
int rx_freq = 0;
|
2010-02-16 12:41:49 -05:00
|
|
|
|
2013-04-23 18:01:21 -04:00
|
|
|
wpa_printf(MSG_MSGDUMP, "nl80211: Frame event");
|
2010-02-16 12:41:49 -05:00
|
|
|
mgmt = (const struct ieee80211_mgmt *) frame;
|
|
|
|
if (len < 24) {
|
2013-12-29 04:22:23 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Too short management frame");
|
2010-02-16 12:41:49 -05:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
fc = le_to_host16(mgmt->frame_control);
|
|
|
|
stype = WLAN_FC_GET_STYPE(fc);
|
|
|
|
|
2012-04-01 05:39:33 -04:00
|
|
|
if (sig)
|
|
|
|
ssi_signal = (s32) nla_get_u32(sig);
|
|
|
|
|
2010-02-16 12:41:49 -05:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
2010-10-10 11:10:37 -04:00
|
|
|
if (freq) {
|
2013-12-29 04:22:23 -05:00
|
|
|
event.rx_mgmt.freq = nla_get_u32(freq);
|
|
|
|
rx_freq = drv->last_mgmt_freq = event.rx_mgmt.freq;
|
2010-10-10 11:10:37 -04:00
|
|
|
}
|
2013-09-25 10:42:00 -04:00
|
|
|
wpa_printf(MSG_DEBUG,
|
2014-06-03 04:24:54 -04:00
|
|
|
"nl80211: RX frame sa=" MACSTR
|
|
|
|
" freq=%d ssi_signal=%d stype=%u (%s) len=%u",
|
|
|
|
MAC2STR(mgmt->sa), rx_freq, ssi_signal, stype, fc2str(fc),
|
2014-06-03 04:24:53 -04:00
|
|
|
(unsigned int) len);
|
2013-12-29 04:22:23 -05:00
|
|
|
event.rx_mgmt.frame = frame;
|
|
|
|
event.rx_mgmt.frame_len = len;
|
|
|
|
event.rx_mgmt.ssi_signal = ssi_signal;
|
2014-02-10 10:04:17 -05:00
|
|
|
event.rx_mgmt.drv_priv = bss;
|
2013-12-29 04:22:23 -05:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
|
2010-02-16 12:41:49 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
static void mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr *cookie, const u8 *frame,
|
|
|
|
size_t len, struct nlattr *ack)
|
2010-02-16 12:41:49 -05:00
|
|
|
{
|
|
|
|
union wpa_event_data event;
|
|
|
|
const struct ieee80211_hdr *hdr;
|
|
|
|
u16 fc;
|
|
|
|
|
2012-11-03 07:54:43 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Frame TX status event");
|
2011-12-06 11:24:00 -05:00
|
|
|
if (!is_ap_interface(drv->nlmode)) {
|
|
|
|
u64 cookie_val;
|
2010-02-16 12:41:49 -05:00
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
if (!cookie)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cookie_val = nla_get_u64(cookie);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Action TX status:"
|
|
|
|
" cookie=0%llx%s (ack=%d)",
|
|
|
|
(long long unsigned int) cookie_val,
|
|
|
|
cookie_val == drv->send_action_cookie ?
|
|
|
|
" (match)" : " (unknown)", ack != NULL);
|
|
|
|
if (cookie_val != drv->send_action_cookie)
|
|
|
|
return;
|
|
|
|
}
|
2010-02-16 12:41:49 -05:00
|
|
|
|
|
|
|
hdr = (const struct ieee80211_hdr *) frame;
|
|
|
|
fc = le_to_host16(hdr->frame_control);
|
|
|
|
|
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
event.tx_status.type = WLAN_FC_GET_TYPE(fc);
|
|
|
|
event.tx_status.stype = WLAN_FC_GET_STYPE(fc);
|
|
|
|
event.tx_status.dst = hdr->addr1;
|
|
|
|
event.tx_status.data = frame;
|
|
|
|
event.tx_status.data_len = len;
|
|
|
|
event.tx_status.ack = ack != NULL;
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_TX_STATUS, &event);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-04-11 14:25:15 -04:00
|
|
|
static void mlme_event_deauth_disassoc(struct wpa_driver_nl80211_data *drv,
|
|
|
|
enum wpa_event_type type,
|
|
|
|
const u8 *frame, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
union wpa_event_data event;
|
|
|
|
const u8 *bssid = NULL;
|
|
|
|
u16 reason_code = 0;
|
|
|
|
|
2012-11-03 07:54:43 -04:00
|
|
|
if (type == EVENT_DEAUTH)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Deauthenticate event");
|
|
|
|
else
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Disassociate event");
|
|
|
|
|
2010-08-16 14:27:26 -04:00
|
|
|
mgmt = (const struct ieee80211_mgmt *) frame;
|
|
|
|
if (len >= 24) {
|
|
|
|
bssid = mgmt->bssid;
|
|
|
|
|
2013-05-27 13:10:57 -04:00
|
|
|
if ((drv->capa.flags & WPA_DRIVER_FLAGS_SME) &&
|
|
|
|
!drv->associated &&
|
|
|
|
os_memcmp(bssid, drv->auth_bssid, ETH_ALEN) != 0 &&
|
|
|
|
os_memcmp(bssid, drv->auth_attempt_bssid, ETH_ALEN) != 0 &&
|
|
|
|
os_memcmp(bssid, drv->prev_bssid, ETH_ALEN) == 0) {
|
|
|
|
/*
|
|
|
|
* Avoid issues with some roaming cases where
|
|
|
|
* disconnection event for the old AP may show up after
|
|
|
|
* we have started connection with the new AP.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore deauth/disassoc event from old AP " MACSTR " when already authenticating with " MACSTR,
|
|
|
|
MAC2STR(bssid),
|
|
|
|
MAC2STR(drv->auth_attempt_bssid));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-08-16 14:27:26 -04:00
|
|
|
if (drv->associated != 0 &&
|
|
|
|
os_memcmp(bssid, drv->bssid, ETH_ALEN) != 0 &&
|
|
|
|
os_memcmp(bssid, drv->auth_bssid, ETH_ALEN) != 0) {
|
|
|
|
/*
|
|
|
|
* We have presumably received this deauth as a
|
|
|
|
* response to a clear_state_mismatch() outgoing
|
|
|
|
* deauth. Don't let it take us offline!
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Deauth received "
|
|
|
|
"from Unknown BSSID " MACSTR " -- ignoring",
|
|
|
|
MAC2STR(bssid));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-27 13:10:57 -04:00
|
|
|
nl80211_mark_disconnected(drv);
|
2010-04-11 14:25:15 -04:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
|
|
|
|
/* Note: Same offset for Reason Code in both frame subtypes */
|
|
|
|
if (len >= 24 + sizeof(mgmt->u.deauth))
|
|
|
|
reason_code = le_to_host16(mgmt->u.deauth.reason_code);
|
|
|
|
|
|
|
|
if (type == EVENT_DISASSOC) {
|
2012-01-01 11:53:12 -05:00
|
|
|
event.disassoc_info.locally_generated =
|
2013-10-29 20:41:39 -04:00
|
|
|
!os_memcmp(mgmt->sa, drv->first_bss->addr, ETH_ALEN);
|
2010-04-11 14:25:15 -04:00
|
|
|
event.disassoc_info.addr = bssid;
|
|
|
|
event.disassoc_info.reason_code = reason_code;
|
2010-07-18 17:30:25 -04:00
|
|
|
if (frame + len > mgmt->u.disassoc.variable) {
|
|
|
|
event.disassoc_info.ie = mgmt->u.disassoc.variable;
|
|
|
|
event.disassoc_info.ie_len = frame + len -
|
|
|
|
mgmt->u.disassoc.variable;
|
|
|
|
}
|
2010-04-11 14:25:15 -04:00
|
|
|
} else {
|
2014-03-11 14:02:23 -04:00
|
|
|
if (drv->ignore_deauth_event) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore deauth event due to previous forced deauth-during-auth");
|
|
|
|
drv->ignore_deauth_event = 0;
|
|
|
|
return;
|
|
|
|
}
|
2012-01-01 11:53:12 -05:00
|
|
|
event.deauth_info.locally_generated =
|
2013-10-29 20:41:39 -04:00
|
|
|
!os_memcmp(mgmt->sa, drv->first_bss->addr, ETH_ALEN);
|
2014-04-13 04:39:49 -04:00
|
|
|
if (drv->ignore_next_local_deauth) {
|
|
|
|
drv->ignore_next_local_deauth = 0;
|
|
|
|
if (event.deauth_info.locally_generated) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore deauth event triggered due to own deauth request");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_WARNING, "nl80211: Was expecting local deauth but got another disconnect event first");
|
|
|
|
}
|
2010-04-11 14:25:15 -04:00
|
|
|
event.deauth_info.addr = bssid;
|
|
|
|
event.deauth_info.reason_code = reason_code;
|
2010-07-18 17:30:25 -04:00
|
|
|
if (frame + len > mgmt->u.deauth.variable) {
|
|
|
|
event.deauth_info.ie = mgmt->u.deauth.variable;
|
|
|
|
event.deauth_info.ie_len = frame + len -
|
|
|
|
mgmt->u.deauth.variable;
|
|
|
|
}
|
2010-04-11 14:25:15 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, type, &event);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-12-19 04:58:00 -05:00
|
|
|
static void mlme_event_unprot_disconnect(struct wpa_driver_nl80211_data *drv,
|
|
|
|
enum wpa_event_type type,
|
|
|
|
const u8 *frame, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
union wpa_event_data event;
|
|
|
|
u16 reason_code = 0;
|
|
|
|
|
2012-11-03 07:54:43 -04:00
|
|
|
if (type == EVENT_UNPROT_DEAUTH)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Unprot Deauthenticate event");
|
|
|
|
else
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Unprot Disassociate event");
|
|
|
|
|
2010-12-19 04:58:00 -05:00
|
|
|
if (len < 24)
|
|
|
|
return;
|
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) frame;
|
|
|
|
|
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
/* Note: Same offset for Reason Code in both frame subtypes */
|
|
|
|
if (len >= 24 + sizeof(mgmt->u.deauth))
|
|
|
|
reason_code = le_to_host16(mgmt->u.deauth.reason_code);
|
|
|
|
|
|
|
|
if (type == EVENT_UNPROT_DISASSOC) {
|
|
|
|
event.unprot_disassoc.sa = mgmt->sa;
|
|
|
|
event.unprot_disassoc.da = mgmt->da;
|
|
|
|
event.unprot_disassoc.reason_code = reason_code;
|
|
|
|
} else {
|
|
|
|
event.unprot_deauth.sa = mgmt->sa;
|
|
|
|
event.unprot_deauth.da = mgmt->da;
|
|
|
|
event.unprot_deauth.reason_code = reason_code;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, type, &event);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-04-23 18:02:01 -04:00
|
|
|
static void mlme_event(struct i802_bss *bss,
|
2009-04-23 17:08:24 -04:00
|
|
|
enum nl80211_commands cmd, struct nlattr *frame,
|
2010-02-16 12:41:49 -05:00
|
|
|
struct nlattr *addr, struct nlattr *timed_out,
|
|
|
|
struct nlattr *freq, struct nlattr *ack,
|
2012-04-01 05:39:33 -04:00
|
|
|
struct nlattr *cookie, struct nlattr *sig)
|
2009-03-20 16:26:41 -04:00
|
|
|
{
|
2013-04-23 18:02:01 -04:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
const u8 *data;
|
|
|
|
size_t len;
|
|
|
|
|
2009-04-23 17:08:24 -04:00
|
|
|
if (timed_out && addr) {
|
|
|
|
mlme_timeout_event(drv, cmd, addr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2009-03-20 16:26:41 -04:00
|
|
|
if (frame == NULL) {
|
2013-06-22 04:12:48 -04:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: MLME event %d (%s) without frame data",
|
|
|
|
cmd, nl80211_command_to_string(cmd));
|
2009-03-20 16:26:41 -04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2013-04-23 18:02:01 -04:00
|
|
|
data = nla_data(frame);
|
|
|
|
len = nla_len(frame);
|
2013-05-13 04:53:21 -04:00
|
|
|
if (len < 4 + 2 * ETH_ALEN) {
|
2013-06-22 04:12:48 -04:00
|
|
|
wpa_printf(MSG_MSGDUMP, "nl80211: MLME event %d (%s) on %s("
|
|
|
|
MACSTR ") - too short",
|
|
|
|
cmd, nl80211_command_to_string(cmd), bss->ifname,
|
|
|
|
MAC2STR(bss->addr));
|
2013-04-23 18:02:01 -04:00
|
|
|
return;
|
|
|
|
}
|
2013-06-22 04:12:48 -04:00
|
|
|
wpa_printf(MSG_MSGDUMP, "nl80211: MLME event %d (%s) on %s(" MACSTR
|
|
|
|
") A1=" MACSTR " A2=" MACSTR, cmd,
|
|
|
|
nl80211_command_to_string(cmd), bss->ifname,
|
|
|
|
MAC2STR(bss->addr), MAC2STR(data + 4),
|
|
|
|
MAC2STR(data + 4 + ETH_ALEN));
|
2013-04-23 18:02:01 -04:00
|
|
|
if (cmd != NL80211_CMD_FRAME_TX_STATUS && !(data[4] & 0x01) &&
|
2013-05-13 04:53:21 -04:00
|
|
|
os_memcmp(bss->addr, data + 4, ETH_ALEN) != 0 &&
|
|
|
|
os_memcmp(bss->addr, data + 4 + ETH_ALEN, ETH_ALEN) != 0) {
|
2013-04-23 18:02:01 -04:00
|
|
|
wpa_printf(MSG_MSGDUMP, "nl80211: %s: Ignore MLME frame event "
|
|
|
|
"for foreign address", bss->ifname);
|
|
|
|
return;
|
|
|
|
}
|
2009-03-20 16:26:41 -04:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "nl80211: MLME event frame",
|
|
|
|
nla_data(frame), nla_len(frame));
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case NL80211_CMD_AUTHENTICATE:
|
|
|
|
mlme_event_auth(drv, nla_data(frame), nla_len(frame));
|
|
|
|
break;
|
|
|
|
case NL80211_CMD_ASSOCIATE:
|
|
|
|
mlme_event_assoc(drv, nla_data(frame), nla_len(frame));
|
|
|
|
break;
|
|
|
|
case NL80211_CMD_DEAUTHENTICATE:
|
2010-04-11 14:25:15 -04:00
|
|
|
mlme_event_deauth_disassoc(drv, EVENT_DEAUTH,
|
|
|
|
nla_data(frame), nla_len(frame));
|
2009-03-20 16:26:41 -04:00
|
|
|
break;
|
|
|
|
case NL80211_CMD_DISASSOCIATE:
|
2010-04-11 14:25:15 -04:00
|
|
|
mlme_event_deauth_disassoc(drv, EVENT_DISASSOC,
|
|
|
|
nla_data(frame), nla_len(frame));
|
2009-03-20 16:26:41 -04:00
|
|
|
break;
|
2010-10-10 10:55:18 -04:00
|
|
|
case NL80211_CMD_FRAME:
|
2014-02-10 10:04:17 -05:00
|
|
|
mlme_event_mgmt(bss, freq, sig, nla_data(frame),
|
2012-04-01 05:39:33 -04:00
|
|
|
nla_len(frame));
|
2010-02-16 12:41:49 -05:00
|
|
|
break;
|
2010-10-10 10:55:18 -04:00
|
|
|
case NL80211_CMD_FRAME_TX_STATUS:
|
2011-12-06 11:24:00 -05:00
|
|
|
mlme_event_mgmt_tx_status(drv, cookie, nla_data(frame),
|
|
|
|
nla_len(frame), ack);
|
2010-02-16 12:41:49 -05:00
|
|
|
break;
|
2010-12-19 04:58:00 -05:00
|
|
|
case NL80211_CMD_UNPROT_DEAUTHENTICATE:
|
|
|
|
mlme_event_unprot_disconnect(drv, EVENT_UNPROT_DEAUTH,
|
|
|
|
nla_data(frame), nla_len(frame));
|
|
|
|
break;
|
|
|
|
case NL80211_CMD_UNPROT_DISASSOCIATE:
|
|
|
|
mlme_event_unprot_disconnect(drv, EVENT_UNPROT_DISASSOC,
|
|
|
|
nla_data(frame), nla_len(frame));
|
|
|
|
break;
|
2009-03-20 16:26:41 -04:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-22 09:19:52 -05:00
|
|
|
static void mlme_event_michael_mic_failure(struct i802_bss *bss,
|
2009-04-09 09:50:48 -04:00
|
|
|
struct nlattr *tb[])
|
|
|
|
{
|
|
|
|
union wpa_event_data data;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: MLME event Michael MIC failure");
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
if (tb[NL80211_ATTR_MAC]) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, "nl80211: Source MAC address",
|
|
|
|
nla_data(tb[NL80211_ATTR_MAC]),
|
|
|
|
nla_len(tb[NL80211_ATTR_MAC]));
|
2009-04-16 09:22:40 -04:00
|
|
|
data.michael_mic_failure.src = nla_data(tb[NL80211_ATTR_MAC]);
|
2009-04-09 09:50:48 -04:00
|
|
|
}
|
|
|
|
if (tb[NL80211_ATTR_KEY_SEQ]) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, "nl80211: TSC",
|
|
|
|
nla_data(tb[NL80211_ATTR_KEY_SEQ]),
|
|
|
|
nla_len(tb[NL80211_ATTR_KEY_SEQ]));
|
|
|
|
}
|
|
|
|
if (tb[NL80211_ATTR_KEY_TYPE]) {
|
|
|
|
enum nl80211_key_type key_type =
|
|
|
|
nla_get_u32(tb[NL80211_ATTR_KEY_TYPE]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Key Type %d", key_type);
|
|
|
|
if (key_type == NL80211_KEYTYPE_PAIRWISE)
|
|
|
|
data.michael_mic_failure.unicast = 1;
|
|
|
|
} else
|
|
|
|
data.michael_mic_failure.unicast = 1;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_KEY_IDX]) {
|
|
|
|
u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id);
|
|
|
|
}
|
|
|
|
|
2012-12-22 09:19:52 -05:00
|
|
|
wpa_supplicant_event(bss->ctx, EVENT_MICHAEL_MIC_FAILURE, &data);
|
2009-04-09 09:50:48 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-03 17:15:32 -05:00
|
|
|
static void mlme_event_join_ibss(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr *tb[])
|
|
|
|
{
|
2014-05-13 17:47:42 -04:00
|
|
|
unsigned int freq;
|
|
|
|
|
2009-12-03 17:15:32 -05:00
|
|
|
if (tb[NL80211_ATTR_MAC] == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: No address in IBSS joined "
|
|
|
|
"event");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
os_memcpy(drv->bssid, nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
|
2013-07-21 08:27:19 -04:00
|
|
|
|
2009-12-03 17:15:32 -05:00
|
|
|
drv->associated = 1;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: IBSS " MACSTR " joined",
|
|
|
|
MAC2STR(drv->bssid));
|
|
|
|
|
2014-05-13 17:47:42 -04:00
|
|
|
freq = nl80211_get_assoc_freq(drv);
|
|
|
|
if (freq) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: IBSS on frequency %u MHz",
|
|
|
|
freq);
|
|
|
|
drv->first_bss->freq = freq;
|
|
|
|
}
|
|
|
|
|
2009-12-03 17:15:32 -05:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-03 06:57:51 -05:00
|
|
|
static void mlme_event_remain_on_channel(struct wpa_driver_nl80211_data *drv,
|
|
|
|
int cancel_event, struct nlattr *tb[])
|
|
|
|
{
|
|
|
|
unsigned int freq, chan_type, duration;
|
|
|
|
union wpa_event_data data;
|
|
|
|
u64 cookie;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_WIPHY_FREQ])
|
|
|
|
freq = nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]);
|
|
|
|
else
|
|
|
|
freq = 0;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE])
|
|
|
|
chan_type = nla_get_u32(tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]);
|
|
|
|
else
|
|
|
|
chan_type = 0;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_DURATION])
|
|
|
|
duration = nla_get_u32(tb[NL80211_ATTR_DURATION]);
|
|
|
|
else
|
|
|
|
duration = 0;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_COOKIE])
|
|
|
|
cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]);
|
|
|
|
else
|
|
|
|
cookie = 0;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel event (cancel=%d "
|
|
|
|
"freq=%u channel_type=%u duration=%u cookie=0x%llx (%s))",
|
|
|
|
cancel_event, freq, chan_type, duration,
|
|
|
|
(long long unsigned int) cookie,
|
|
|
|
cookie == drv->remain_on_chan_cookie ? "match" : "unknown");
|
|
|
|
|
|
|
|
if (cookie != drv->remain_on_chan_cookie)
|
|
|
|
return; /* not for us */
|
|
|
|
|
2011-09-10 15:57:41 -04:00
|
|
|
if (cancel_event)
|
|
|
|
drv->pending_remain_on_chan = 0;
|
2010-01-03 06:57:51 -05:00
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
data.remain_on_channel.freq = freq;
|
|
|
|
data.remain_on_channel.duration = duration;
|
|
|
|
wpa_supplicant_event(drv->ctx, cancel_event ?
|
|
|
|
EVENT_CANCEL_REMAIN_ON_CHANNEL :
|
|
|
|
EVENT_REMAIN_ON_CHANNEL, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-12 14:08:53 -04:00
|
|
|
static void mlme_event_ft_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr *tb[])
|
|
|
|
{
|
|
|
|
union wpa_event_data data;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_IE]) {
|
|
|
|
data.ft_ies.ies = nla_data(tb[NL80211_ATTR_IE]);
|
|
|
|
data.ft_ies.ies_len = nla_len(tb[NL80211_ATTR_IE]);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_IE_RIC]) {
|
|
|
|
data.ft_ies.ric_ies = nla_data(tb[NL80211_ATTR_IE_RIC]);
|
|
|
|
data.ft_ies.ric_ies_len = nla_len(tb[NL80211_ATTR_IE_RIC]);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_MAC])
|
|
|
|
os_memcpy(data.ft_ies.target_ap,
|
|
|
|
nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: FT event target_ap " MACSTR,
|
|
|
|
MAC2STR(data.ft_ies.target_ap));
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_FT_RESPONSE, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-02 06:57:44 -05:00
|
|
|
static void send_scan_event(struct wpa_driver_nl80211_data *drv, int aborted,
|
|
|
|
struct nlattr *tb[])
|
|
|
|
{
|
|
|
|
union wpa_event_data event;
|
|
|
|
struct nlattr *nl;
|
|
|
|
int rem;
|
|
|
|
struct scan_info *info;
|
|
|
|
#define MAX_REPORT_FREQS 50
|
|
|
|
int freqs[MAX_REPORT_FREQS];
|
|
|
|
int num_freqs = 0;
|
|
|
|
|
2011-12-04 14:53:56 -05:00
|
|
|
if (drv->scan_for_auth) {
|
|
|
|
drv->scan_for_auth = 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Scan results for missing "
|
|
|
|
"cfg80211 BSS entry");
|
|
|
|
wpa_driver_nl80211_authenticate_retry(drv);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-01-02 06:57:44 -05:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
info = &event.scan_info;
|
|
|
|
info->aborted = aborted;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_SCAN_SSIDS]) {
|
|
|
|
nla_for_each_nested(nl, tb[NL80211_ATTR_SCAN_SSIDS], rem) {
|
|
|
|
struct wpa_driver_scan_ssid *s =
|
|
|
|
&info->ssids[info->num_ssids];
|
|
|
|
s->ssid = nla_data(nl);
|
|
|
|
s->ssid_len = nla_len(nl);
|
2013-12-26 09:39:39 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Scan probed for SSID '%s'",
|
|
|
|
wpa_ssid_txt(s->ssid, s->ssid_len));
|
2010-01-02 06:57:44 -05:00
|
|
|
info->num_ssids++;
|
|
|
|
if (info->num_ssids == WPAS_MAX_SCAN_SSIDS)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (tb[NL80211_ATTR_SCAN_FREQUENCIES]) {
|
2013-12-26 09:39:39 -05:00
|
|
|
char msg[200], *pos, *end;
|
|
|
|
int res;
|
|
|
|
|
|
|
|
pos = msg;
|
|
|
|
end = pos + sizeof(msg);
|
|
|
|
*pos = '\0';
|
|
|
|
|
2010-01-02 06:57:44 -05:00
|
|
|
nla_for_each_nested(nl, tb[NL80211_ATTR_SCAN_FREQUENCIES], rem)
|
|
|
|
{
|
|
|
|
freqs[num_freqs] = nla_get_u32(nl);
|
2013-12-26 09:39:39 -05:00
|
|
|
res = os_snprintf(pos, end - pos, " %d",
|
|
|
|
freqs[num_freqs]);
|
|
|
|
if (res > 0 && end - pos > res)
|
|
|
|
pos += res;
|
2010-01-02 06:57:44 -05:00
|
|
|
num_freqs++;
|
|
|
|
if (num_freqs == MAX_REPORT_FREQS - 1)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
info->freqs = freqs;
|
|
|
|
info->num_freqs = num_freqs;
|
2013-12-26 09:39:39 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Scan included frequencies:%s",
|
|
|
|
msg);
|
2010-01-02 06:57:44 -05:00
|
|
|
}
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_SCAN_RESULTS, &event);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-08-27 09:58:06 -04:00
|
|
|
static int get_link_signal(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *sinfo[NL80211_STA_INFO_MAX + 1];
|
|
|
|
static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = {
|
|
|
|
[NL80211_STA_INFO_SIGNAL] = { .type = NLA_U8 },
|
2013-06-22 04:59:29 -04:00
|
|
|
[NL80211_STA_INFO_SIGNAL_AVG] = { .type = NLA_U8 },
|
2010-08-27 09:58:06 -04:00
|
|
|
};
|
2010-10-12 13:01:50 -04:00
|
|
|
struct nlattr *rinfo[NL80211_RATE_INFO_MAX + 1];
|
|
|
|
static struct nla_policy rate_policy[NL80211_RATE_INFO_MAX + 1] = {
|
|
|
|
[NL80211_RATE_INFO_BITRATE] = { .type = NLA_U16 },
|
|
|
|
[NL80211_RATE_INFO_MCS] = { .type = NLA_U8 },
|
|
|
|
[NL80211_RATE_INFO_40_MHZ_WIDTH] = { .type = NLA_FLAG },
|
|
|
|
[NL80211_RATE_INFO_SHORT_GI] = { .type = NLA_FLAG },
|
|
|
|
};
|
2011-03-31 10:56:48 -04:00
|
|
|
struct wpa_signal_info *sig_change = arg;
|
2010-08-27 09:58:06 -04:00
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
if (!tb[NL80211_ATTR_STA_INFO] ||
|
|
|
|
nla_parse_nested(sinfo, NL80211_STA_INFO_MAX,
|
|
|
|
tb[NL80211_ATTR_STA_INFO], policy))
|
|
|
|
return NL_SKIP;
|
|
|
|
if (!sinfo[NL80211_STA_INFO_SIGNAL])
|
|
|
|
return NL_SKIP;
|
|
|
|
|
2010-10-12 13:01:50 -04:00
|
|
|
sig_change->current_signal =
|
|
|
|
(s8) nla_get_u8(sinfo[NL80211_STA_INFO_SIGNAL]);
|
|
|
|
|
2013-06-22 04:59:29 -04:00
|
|
|
if (sinfo[NL80211_STA_INFO_SIGNAL_AVG])
|
|
|
|
sig_change->avg_signal =
|
|
|
|
(s8) nla_get_u8(sinfo[NL80211_STA_INFO_SIGNAL_AVG]);
|
|
|
|
else
|
|
|
|
sig_change->avg_signal = 0;
|
|
|
|
|
2010-10-12 13:01:50 -04:00
|
|
|
if (sinfo[NL80211_STA_INFO_TX_BITRATE]) {
|
|
|
|
if (nla_parse_nested(rinfo, NL80211_RATE_INFO_MAX,
|
|
|
|
sinfo[NL80211_STA_INFO_TX_BITRATE],
|
|
|
|
rate_policy)) {
|
|
|
|
sig_change->current_txrate = 0;
|
|
|
|
} else {
|
|
|
|
if (rinfo[NL80211_RATE_INFO_BITRATE]) {
|
|
|
|
sig_change->current_txrate =
|
|
|
|
nla_get_u16(rinfo[
|
|
|
|
NL80211_RATE_INFO_BITRATE]) * 100;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-08-27 09:58:06 -04:00
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
int nl80211_get_link_signal(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_signal_info *sig)
|
2010-08-27 09:58:06 -04:00
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
2010-10-12 13:01:50 -04:00
|
|
|
sig->current_signal = -9999;
|
|
|
|
sig->current_txrate = 0;
|
2010-08-27 09:58:06 -04:00
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_STATION);
|
2010-08-27 09:58:06 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, drv->bssid);
|
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, get_link_signal, sig);
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2010-08-27 09:58:06 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-10-12 13:01:50 -04:00
|
|
|
static int get_link_noise(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
|
|
|
|
static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
|
|
|
|
[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
|
|
|
|
[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
|
|
|
|
};
|
2011-03-31 10:56:48 -04:00
|
|
|
struct wpa_signal_info *sig_change = arg;
|
2010-10-12 13:01:50 -04:00
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_SURVEY_INFO]) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: survey data missing!");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
|
|
|
|
tb[NL80211_ATTR_SURVEY_INFO],
|
|
|
|
survey_policy)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: failed to parse nested "
|
|
|
|
"attributes!");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
if (nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
|
|
|
|
sig_change->frequency)
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
if (!sinfo[NL80211_SURVEY_INFO_NOISE])
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
sig_change->current_noise =
|
|
|
|
(s8) nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
int nl80211_get_link_noise(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_signal_info *sig_change)
|
2010-10-12 13:01:50 -04:00
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
sig_change->current_noise = 9999;
|
|
|
|
sig_change->frequency = drv->assoc_freq;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
|
2010-10-12 13:01:50 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, get_link_noise, sig_change);
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2010-10-12 13:01:50 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-08-05 19:23:12 -04:00
|
|
|
static int get_noise_for_scan_results(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
|
|
|
|
static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
|
|
|
|
[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
|
|
|
|
[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
|
|
|
|
};
|
|
|
|
struct wpa_scan_results *scan_results = arg;
|
|
|
|
struct wpa_scan_res *scan_res;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_SURVEY_INFO]) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Survey data missing");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
|
|
|
|
tb[NL80211_ATTR_SURVEY_INFO],
|
|
|
|
survey_policy)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to parse nested "
|
|
|
|
"attributes");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!sinfo[NL80211_SURVEY_INFO_NOISE])
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
for (i = 0; i < scan_results->num; ++i) {
|
|
|
|
scan_res = scan_results->res[i];
|
|
|
|
if (!scan_res)
|
|
|
|
continue;
|
|
|
|
if ((int) nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
|
|
|
|
scan_res->freq)
|
|
|
|
continue;
|
|
|
|
if (!(scan_res->flags & WPA_SCAN_NOISE_INVALID))
|
|
|
|
continue;
|
|
|
|
scan_res->noise = (s8)
|
|
|
|
nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
|
|
|
|
scan_res->flags &= ~WPA_SCAN_NOISE_INVALID;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_get_noise_for_scan_results(
|
|
|
|
struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_scan_results *scan_res)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
|
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, get_noise_for_scan_results,
|
|
|
|
scan_res);
|
|
|
|
nla_put_failure:
|
2011-12-17 05:27:11 -05:00
|
|
|
nlmsg_free(msg);
|
2011-08-05 19:23:12 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-28 16:56:40 -04:00
|
|
|
static void nl80211_cqm_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr *tb[])
|
|
|
|
{
|
|
|
|
static struct nla_policy cqm_policy[NL80211_ATTR_CQM_MAX + 1] = {
|
|
|
|
[NL80211_ATTR_CQM_RSSI_THOLD] = { .type = NLA_U32 },
|
|
|
|
[NL80211_ATTR_CQM_RSSI_HYST] = { .type = NLA_U8 },
|
|
|
|
[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT] = { .type = NLA_U32 },
|
2010-12-28 10:15:01 -05:00
|
|
|
[NL80211_ATTR_CQM_PKT_LOSS_EVENT] = { .type = NLA_U32 },
|
2010-03-28 16:56:40 -04:00
|
|
|
};
|
|
|
|
struct nlattr *cqm[NL80211_ATTR_CQM_MAX + 1];
|
|
|
|
enum nl80211_cqm_rssi_threshold_event event;
|
2010-03-28 18:31:04 -04:00
|
|
|
union wpa_event_data ed;
|
2011-03-31 10:56:48 -04:00
|
|
|
struct wpa_signal_info sig;
|
2010-10-12 13:01:50 -04:00
|
|
|
int res;
|
2010-03-28 16:56:40 -04:00
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_CQM] == NULL ||
|
|
|
|
nla_parse_nested(cqm, NL80211_ATTR_CQM_MAX, tb[NL80211_ATTR_CQM],
|
|
|
|
cqm_policy)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore invalid CQM event");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-12-28 10:15:01 -05:00
|
|
|
os_memset(&ed, 0, sizeof(ed));
|
|
|
|
|
|
|
|
if (cqm[NL80211_ATTR_CQM_PKT_LOSS_EVENT]) {
|
|
|
|
if (!tb[NL80211_ATTR_MAC])
|
|
|
|
return;
|
|
|
|
os_memcpy(ed.low_ack.addr, nla_data(tb[NL80211_ATTR_MAC]),
|
|
|
|
ETH_ALEN);
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_STATION_LOW_ACK, &ed);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-03-28 16:56:40 -04:00
|
|
|
if (cqm[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT] == NULL)
|
|
|
|
return;
|
|
|
|
event = nla_get_u32(cqm[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT]);
|
2010-03-28 18:31:04 -04:00
|
|
|
|
2010-03-28 16:56:40 -04:00
|
|
|
if (event == NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Connection quality monitor "
|
|
|
|
"event: RSSI high");
|
2010-03-28 18:31:04 -04:00
|
|
|
ed.signal_change.above_threshold = 1;
|
2010-03-28 16:56:40 -04:00
|
|
|
} else if (event == NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Connection quality monitor "
|
|
|
|
"event: RSSI low");
|
2010-03-28 18:31:04 -04:00
|
|
|
ed.signal_change.above_threshold = 0;
|
|
|
|
} else
|
|
|
|
return;
|
|
|
|
|
2010-08-27 09:58:06 -04:00
|
|
|
res = nl80211_get_link_signal(drv, &sig);
|
|
|
|
if (res == 0) {
|
2010-10-12 13:01:50 -04:00
|
|
|
ed.signal_change.current_signal = sig.current_signal;
|
|
|
|
ed.signal_change.current_txrate = sig.current_txrate;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Signal: %d dBm txrate: %d",
|
|
|
|
sig.current_signal, sig.current_txrate);
|
|
|
|
}
|
|
|
|
|
|
|
|
res = nl80211_get_link_noise(drv, &sig);
|
|
|
|
if (res == 0) {
|
|
|
|
ed.signal_change.current_noise = sig.current_noise;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Noise: %d dBm",
|
|
|
|
sig.current_noise);
|
2010-08-27 09:58:06 -04:00
|
|
|
}
|
|
|
|
|
2010-03-28 18:31:04 -04:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_SIGNAL_CHANGE, &ed);
|
2010-03-28 16:56:40 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-01 00:23:23 -04:00
|
|
|
static void nl80211_new_peer_candidate(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
const u8 *addr;
|
|
|
|
union wpa_event_data data;
|
|
|
|
|
|
|
|
if (drv->nlmode != NL80211_IFTYPE_MESH_POINT)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_MAC] || !tb[NL80211_ATTR_IE])
|
|
|
|
return;
|
|
|
|
|
|
|
|
addr = nla_data(tb[NL80211_ATTR_MAC]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: New peer candidate" MACSTR,
|
|
|
|
MAC2STR(addr));
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
data.mesh_peer.peer = addr;
|
|
|
|
data.mesh_peer.ies = nla_data(tb[NL80211_ATTR_IE]);
|
|
|
|
data.mesh_peer.ie_len = nla_len(tb[NL80211_ATTR_IE]);
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_NEW_PEER_CANDIDATE, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-12-04 21:17:58 -05:00
|
|
|
static void nl80211_new_station_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
u8 *addr;
|
|
|
|
union wpa_event_data data;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_MAC] == NULL)
|
|
|
|
return;
|
|
|
|
addr = nla_data(tb[NL80211_ATTR_MAC]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: New station " MACSTR, MAC2STR(addr));
|
2011-07-01 11:44:09 -04:00
|
|
|
|
2011-11-19 06:42:49 -05:00
|
|
|
if (is_ap_interface(drv->nlmode) && drv->device_ap_sme) {
|
2011-07-01 11:44:09 -04:00
|
|
|
u8 *ies = NULL;
|
|
|
|
size_t ies_len = 0;
|
|
|
|
if (tb[NL80211_ATTR_IE]) {
|
|
|
|
ies = nla_data(tb[NL80211_ATTR_IE]);
|
|
|
|
ies_len = nla_len(tb[NL80211_ATTR_IE]);
|
|
|
|
}
|
|
|
|
wpa_hexdump(MSG_DEBUG, "nl80211: Assoc Req IEs", ies, ies_len);
|
|
|
|
drv_event_assoc(drv->ctx, addr, ies, ies_len, 0);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-12-04 21:17:58 -05:00
|
|
|
if (drv->nlmode != NL80211_IFTYPE_ADHOC)
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
os_memcpy(data.ibss_rsn_start.peer, addr, ETH_ALEN);
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_IBSS_RSN_START, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-03-23 09:32:55 -04:00
|
|
|
static void nl80211_del_station_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
u8 *addr;
|
|
|
|
union wpa_event_data data;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_MAC] == NULL)
|
|
|
|
return;
|
|
|
|
addr = nla_data(tb[NL80211_ATTR_MAC]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Delete station " MACSTR,
|
|
|
|
MAC2STR(addr));
|
2011-07-01 11:44:09 -04:00
|
|
|
|
2011-11-19 06:42:49 -05:00
|
|
|
if (is_ap_interface(drv->nlmode) && drv->device_ap_sme) {
|
2011-07-01 11:44:09 -04:00
|
|
|
drv_event_disassoc(drv->ctx, addr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-03-23 09:32:55 -04:00
|
|
|
if (drv->nlmode != NL80211_IFTYPE_ADHOC)
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
os_memcpy(data.ibss_peer_lost.peer, addr, ETH_ALEN);
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_IBSS_PEER_LOST, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-12 14:22:51 -04:00
|
|
|
static void nl80211_rekey_offload_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
struct nlattr *rekey_info[NUM_NL80211_REKEY_DATA];
|
|
|
|
static struct nla_policy rekey_policy[NUM_NL80211_REKEY_DATA] = {
|
|
|
|
[NL80211_REKEY_DATA_KEK] = {
|
|
|
|
.minlen = NL80211_KEK_LEN,
|
|
|
|
.maxlen = NL80211_KEK_LEN,
|
|
|
|
},
|
|
|
|
[NL80211_REKEY_DATA_KCK] = {
|
|
|
|
.minlen = NL80211_KCK_LEN,
|
|
|
|
.maxlen = NL80211_KCK_LEN,
|
|
|
|
},
|
|
|
|
[NL80211_REKEY_DATA_REPLAY_CTR] = {
|
|
|
|
.minlen = NL80211_REPLAY_CTR_LEN,
|
|
|
|
.maxlen = NL80211_REPLAY_CTR_LEN,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
union wpa_event_data data;
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_MAC])
|
|
|
|
return;
|
|
|
|
if (!tb[NL80211_ATTR_REKEY_DATA])
|
|
|
|
return;
|
|
|
|
if (nla_parse_nested(rekey_info, MAX_NL80211_REKEY_DATA,
|
|
|
|
tb[NL80211_ATTR_REKEY_DATA], rekey_policy))
|
|
|
|
return;
|
|
|
|
if (!rekey_info[NL80211_REKEY_DATA_REPLAY_CTR])
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
data.driver_gtk_rekey.bssid = nla_data(tb[NL80211_ATTR_MAC]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Rekey offload event for BSSID " MACSTR,
|
|
|
|
MAC2STR(data.driver_gtk_rekey.bssid));
|
|
|
|
data.driver_gtk_rekey.replay_ctr =
|
|
|
|
nla_data(rekey_info[NL80211_REKEY_DATA_REPLAY_CTR]);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "nl80211: Rekey offload - Replay Counter",
|
|
|
|
data.driver_gtk_rekey.replay_ctr, NL80211_REPLAY_CTR_LEN);
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_DRIVER_GTK_REKEY, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-09-21 09:14:41 -04:00
|
|
|
static void nl80211_pmksa_candidate_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
struct nlattr *cand[NUM_NL80211_PMKSA_CANDIDATE];
|
|
|
|
static struct nla_policy cand_policy[NUM_NL80211_PMKSA_CANDIDATE] = {
|
|
|
|
[NL80211_PMKSA_CANDIDATE_INDEX] = { .type = NLA_U32 },
|
|
|
|
[NL80211_PMKSA_CANDIDATE_BSSID] = {
|
|
|
|
.minlen = ETH_ALEN,
|
|
|
|
.maxlen = ETH_ALEN,
|
|
|
|
},
|
|
|
|
[NL80211_PMKSA_CANDIDATE_PREAUTH] = { .type = NLA_FLAG },
|
|
|
|
};
|
|
|
|
union wpa_event_data data;
|
|
|
|
|
2012-11-03 07:54:43 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: PMKSA candidate event");
|
|
|
|
|
2011-09-21 09:14:41 -04:00
|
|
|
if (!tb[NL80211_ATTR_PMKSA_CANDIDATE])
|
|
|
|
return;
|
|
|
|
if (nla_parse_nested(cand, MAX_NL80211_PMKSA_CANDIDATE,
|
|
|
|
tb[NL80211_ATTR_PMKSA_CANDIDATE], cand_policy))
|
|
|
|
return;
|
|
|
|
if (!cand[NL80211_PMKSA_CANDIDATE_INDEX] ||
|
|
|
|
!cand[NL80211_PMKSA_CANDIDATE_BSSID])
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
os_memcpy(data.pmkid_candidate.bssid,
|
|
|
|
nla_data(cand[NL80211_PMKSA_CANDIDATE_BSSID]), ETH_ALEN);
|
|
|
|
data.pmkid_candidate.index =
|
|
|
|
nla_get_u32(cand[NL80211_PMKSA_CANDIDATE_INDEX]);
|
|
|
|
data.pmkid_candidate.preauth =
|
|
|
|
cand[NL80211_PMKSA_CANDIDATE_PREAUTH] != NULL;
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_PMKID_CANDIDATE, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-11-19 07:23:46 -05:00
|
|
|
static void nl80211_client_probe_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
union wpa_event_data data;
|
|
|
|
|
2012-11-03 07:54:43 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Probe client event");
|
|
|
|
|
2011-11-19 07:23:46 -05:00
|
|
|
if (!tb[NL80211_ATTR_MAC] || !tb[NL80211_ATTR_ACK])
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
os_memcpy(data.client_poll.addr,
|
|
|
|
nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_DRIVER_CLIENT_POLL_OK, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-11-19 10:00:07 -05:00
|
|
|
static void nl80211_tdls_oper_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
union wpa_event_data data;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: TDLS operation event");
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_MAC] || !tb[NL80211_ATTR_TDLS_OPERATION])
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
os_memcpy(data.tdls.peer, nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
|
|
|
|
switch (nla_get_u8(tb[NL80211_ATTR_TDLS_OPERATION])) {
|
|
|
|
case NL80211_TDLS_SETUP:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: TDLS setup request for peer "
|
|
|
|
MACSTR, MAC2STR(data.tdls.peer));
|
|
|
|
data.tdls.oper = TDLS_REQUEST_SETUP;
|
|
|
|
break;
|
|
|
|
case NL80211_TDLS_TEARDOWN:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: TDLS teardown request for peer "
|
|
|
|
MACSTR, MAC2STR(data.tdls.peer));
|
|
|
|
data.tdls.oper = TDLS_REQUEST_TEARDOWN;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Unsupported TDLS operatione "
|
|
|
|
"event");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (tb[NL80211_ATTR_REASON_CODE]) {
|
|
|
|
data.tdls.reason_code =
|
|
|
|
nla_get_u16(tb[NL80211_ATTR_REASON_CODE]);
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_TDLS, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-08-06 16:28:40 -04:00
|
|
|
static void nl80211_stop_ap(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_UNAVAILABLE, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-07 08:24:53 -05:00
|
|
|
static void nl80211_connect_failed_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
union wpa_event_data data;
|
|
|
|
u32 reason;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Connect failed event");
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_MAC] || !tb[NL80211_ATTR_CONN_FAILED_REASON])
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
os_memcpy(data.connect_failed_reason.addr,
|
|
|
|
nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
|
|
|
|
|
|
|
|
reason = nla_get_u32(tb[NL80211_ATTR_CONN_FAILED_REASON]);
|
|
|
|
switch (reason) {
|
|
|
|
case NL80211_CONN_FAIL_MAX_CLIENTS:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Max client reached");
|
|
|
|
data.connect_failed_reason.code = MAX_CLIENT_REACHED;
|
|
|
|
break;
|
|
|
|
case NL80211_CONN_FAIL_BLOCKED_CLIENT:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Blocked client " MACSTR
|
|
|
|
" tried to connect",
|
|
|
|
MAC2STR(data.connect_failed_reason.addr));
|
|
|
|
data.connect_failed_reason.code = BLOCKED_CLIENT;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl8021l: Unknown connect failed reason "
|
|
|
|
"%u", reason);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_CONNECT_FAILED_REASON, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-05-09 12:54:18 -04:00
|
|
|
static void nl80211_radar_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
union wpa_event_data data;
|
|
|
|
enum nl80211_radar_event event_type;
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_WIPHY_FREQ] || !tb[NL80211_ATTR_RADAR_EVENT])
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
2013-10-22 08:50:07 -04:00
|
|
|
data.dfs_event.freq = nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]);
|
|
|
|
event_type = nla_get_u32(tb[NL80211_ATTR_RADAR_EVENT]);
|
2013-05-09 12:54:18 -04:00
|
|
|
|
2013-10-16 05:18:52 -04:00
|
|
|
/* Check HT params */
|
|
|
|
if (tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]) {
|
|
|
|
data.dfs_event.ht_enabled = 1;
|
|
|
|
data.dfs_event.chan_offset = 0;
|
|
|
|
|
|
|
|
switch (nla_get_u32(tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE])) {
|
|
|
|
case NL80211_CHAN_NO_HT:
|
|
|
|
data.dfs_event.ht_enabled = 0;
|
|
|
|
break;
|
|
|
|
case NL80211_CHAN_HT20:
|
|
|
|
break;
|
|
|
|
case NL80211_CHAN_HT40PLUS:
|
|
|
|
data.dfs_event.chan_offset = 1;
|
|
|
|
break;
|
|
|
|
case NL80211_CHAN_HT40MINUS:
|
|
|
|
data.dfs_event.chan_offset = -1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get VHT params */
|
2013-11-02 14:39:57 -04:00
|
|
|
if (tb[NL80211_ATTR_CHANNEL_WIDTH])
|
|
|
|
data.dfs_event.chan_width =
|
|
|
|
convert2width(nla_get_u32(
|
|
|
|
tb[NL80211_ATTR_CHANNEL_WIDTH]));
|
|
|
|
if (tb[NL80211_ATTR_CENTER_FREQ1])
|
|
|
|
data.dfs_event.cf1 = nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
|
2013-10-16 05:18:52 -04:00
|
|
|
if (tb[NL80211_ATTR_CENTER_FREQ2])
|
|
|
|
data.dfs_event.cf2 = nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: DFS event on freq %d MHz, ht: %d, offset: %d, width: %d, cf1: %dMHz, cf2: %dMHz",
|
|
|
|
data.dfs_event.freq, data.dfs_event.ht_enabled,
|
|
|
|
data.dfs_event.chan_offset, data.dfs_event.chan_width,
|
|
|
|
data.dfs_event.cf1, data.dfs_event.cf2);
|
2013-05-09 12:54:18 -04:00
|
|
|
|
|
|
|
switch (event_type) {
|
|
|
|
case NL80211_RADAR_DETECTED:
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_DFS_RADAR_DETECTED, &data);
|
|
|
|
break;
|
|
|
|
case NL80211_RADAR_CAC_FINISHED:
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_DFS_CAC_FINISHED, &data);
|
|
|
|
break;
|
|
|
|
case NL80211_RADAR_CAC_ABORTED:
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_DFS_CAC_ABORTED, &data);
|
|
|
|
break;
|
|
|
|
case NL80211_RADAR_NOP_FINISHED:
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_DFS_NOP_FINISHED, &data);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Unknown radar event %d "
|
|
|
|
"received", event_type);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 12:32:41 -05:00
|
|
|
static void nl80211_spurious_frame(struct i802_bss *bss, struct nlattr **tb,
|
|
|
|
int wds)
|
2011-12-06 11:29:45 -05:00
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
union wpa_event_data event;
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_MAC])
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&event, 0, sizeof(event));
|
2011-12-10 04:56:31 -05:00
|
|
|
event.rx_from_unknown.bssid = bss->addr;
|
2011-12-06 11:29:45 -05:00
|
|
|
event.rx_from_unknown.addr = nla_data(tb[NL80211_ATTR_MAC]);
|
2011-12-06 12:32:41 -05:00
|
|
|
event.rx_from_unknown.wds = wds;
|
2011-12-06 11:29:45 -05:00
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_RX_FROM_UNKNOWN, &event);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-24 09:14:29 -05:00
|
|
|
static void qca_nl80211_avoid_freq(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const u8 *data, size_t len)
|
|
|
|
{
|
|
|
|
u32 i, count;
|
|
|
|
union wpa_event_data event;
|
|
|
|
struct wpa_freq_range *range = NULL;
|
|
|
|
const struct qca_avoid_freq_list *freq_range;
|
|
|
|
|
|
|
|
freq_range = (const struct qca_avoid_freq_list *) data;
|
|
|
|
if (len < sizeof(freq_range->count))
|
|
|
|
return;
|
|
|
|
|
|
|
|
count = freq_range->count;
|
|
|
|
if (len < sizeof(freq_range->count) +
|
|
|
|
count * sizeof(struct qca_avoid_freq_range)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignored too short avoid frequency list (len=%u)",
|
|
|
|
(unsigned int) len);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (count > 0) {
|
|
|
|
range = os_calloc(count, sizeof(struct wpa_freq_range));
|
|
|
|
if (range == NULL)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
for (i = 0; i < count; i++) {
|
|
|
|
unsigned int idx = event.freq_range.num;
|
|
|
|
range[idx].min = freq_range->range[i].start_freq;
|
|
|
|
range[idx].max = freq_range->range[i].end_freq;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Avoid frequency range: %u-%u",
|
|
|
|
range[idx].min, range[idx].max);
|
|
|
|
if (range[idx].min > range[idx].max) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore invalid frequency range");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
event.freq_range.num++;
|
|
|
|
}
|
|
|
|
event.freq_range.range = range;
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_AVOID_FREQUENCIES, &event);
|
|
|
|
|
|
|
|
os_free(range);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-23 11:21:49 -04:00
|
|
|
static void qca_nl80211_key_mgmt_auth(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const u8 *data, size_t len)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_MAX + 1];
|
|
|
|
u8 *bssid;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Key management roam+auth vendor event received");
|
|
|
|
|
|
|
|
if (nla_parse(tb, QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_MAX,
|
|
|
|
(struct nlattr *) data, len, NULL))
|
|
|
|
return;
|
|
|
|
if (!tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_BSSID] ||
|
|
|
|
nla_len(tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_BSSID]) != ETH_ALEN ||
|
|
|
|
!tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_REQ_IE] ||
|
|
|
|
!tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_RESP_IE] ||
|
|
|
|
!tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_AUTHORIZED])
|
|
|
|
return;
|
|
|
|
|
|
|
|
bssid = nla_data(tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_BSSID]);
|
|
|
|
wpa_printf(MSG_DEBUG, " * roam BSSID " MACSTR, MAC2STR(bssid));
|
|
|
|
|
|
|
|
mlme_event_connect(drv, NL80211_CMD_ROAM, NULL,
|
|
|
|
tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_BSSID],
|
|
|
|
tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_REQ_IE],
|
|
|
|
tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_RESP_IE],
|
|
|
|
tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_AUTHORIZED],
|
|
|
|
tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_KEY_REPLAY_CTR],
|
|
|
|
tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_PTK_KCK],
|
|
|
|
tb[QCA_WLAN_VENDOR_ATTR_ROAM_AUTH_PTK_KEK]);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-24 08:58:00 -05:00
|
|
|
static void nl80211_vendor_event_qca(struct wpa_driver_nl80211_data *drv,
|
|
|
|
u32 subcmd, u8 *data, size_t len)
|
|
|
|
{
|
|
|
|
switch (subcmd) {
|
2014-01-24 09:14:29 -05:00
|
|
|
case QCA_NL80211_VENDOR_SUBCMD_AVOID_FREQUENCY:
|
|
|
|
qca_nl80211_avoid_freq(drv, data, len);
|
|
|
|
break;
|
2014-10-23 11:21:49 -04:00
|
|
|
case QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_ROAM_AUTH:
|
|
|
|
qca_nl80211_key_mgmt_auth(drv, data, len);
|
|
|
|
break;
|
2014-01-24 08:58:00 -05:00
|
|
|
default:
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Ignore unsupported QCA vendor event %u",
|
|
|
|
subcmd);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-01 16:30:23 -05:00
|
|
|
static void nl80211_vendor_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr **tb)
|
|
|
|
{
|
|
|
|
u32 vendor_id, subcmd, wiphy = 0;
|
|
|
|
int wiphy_idx;
|
|
|
|
u8 *data = NULL;
|
|
|
|
size_t len = 0;
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_VENDOR_ID] ||
|
|
|
|
!tb[NL80211_ATTR_VENDOR_SUBCMD])
|
|
|
|
return;
|
|
|
|
|
|
|
|
vendor_id = nla_get_u32(tb[NL80211_ATTR_VENDOR_ID]);
|
|
|
|
subcmd = nla_get_u32(tb[NL80211_ATTR_VENDOR_SUBCMD]);
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_WIPHY])
|
|
|
|
wiphy = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Vendor event: wiphy=%u vendor_id=0x%x subcmd=%u",
|
|
|
|
wiphy, vendor_id, subcmd);
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_VENDOR_DATA]) {
|
|
|
|
data = nla_data(tb[NL80211_ATTR_VENDOR_DATA]);
|
|
|
|
len = nla_len(tb[NL80211_ATTR_VENDOR_DATA]);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "nl80211: Vendor data", data, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
wiphy_idx = nl80211_get_wiphy_index(drv->first_bss);
|
|
|
|
if (wiphy_idx >= 0 && wiphy_idx != (int) wiphy) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore vendor event for foreign wiphy %u (own: %d)",
|
|
|
|
wiphy, wiphy_idx);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (vendor_id) {
|
2014-01-24 08:58:00 -05:00
|
|
|
case OUI_QCA:
|
|
|
|
nl80211_vendor_event_qca(drv, subcmd, data, len);
|
|
|
|
break;
|
2014-01-01 16:30:23 -05:00
|
|
|
default:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignore unsupported vendor event");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-04-13 09:32:38 -04:00
|
|
|
static void nl80211_reg_change_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nlattr *tb[])
|
|
|
|
{
|
|
|
|
union wpa_event_data data;
|
|
|
|
enum nl80211_reg_initiator init;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Regulatory domain change");
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_REG_INITIATOR] == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
init = nla_get_u8(tb[NL80211_ATTR_REG_INITIATOR]);
|
|
|
|
wpa_printf(MSG_DEBUG, " * initiator=%d", init);
|
|
|
|
switch (init) {
|
|
|
|
case NL80211_REGDOM_SET_BY_CORE:
|
|
|
|
data.channel_list_changed.initiator = REGDOM_SET_BY_CORE;
|
|
|
|
break;
|
|
|
|
case NL80211_REGDOM_SET_BY_USER:
|
|
|
|
data.channel_list_changed.initiator = REGDOM_SET_BY_USER;
|
|
|
|
break;
|
|
|
|
case NL80211_REGDOM_SET_BY_DRIVER:
|
|
|
|
data.channel_list_changed.initiator = REGDOM_SET_BY_DRIVER;
|
|
|
|
break;
|
|
|
|
case NL80211_REGDOM_SET_BY_COUNTRY_IE:
|
|
|
|
data.channel_list_changed.initiator = REGDOM_SET_BY_COUNTRY_IE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_REG_TYPE]) {
|
|
|
|
enum nl80211_reg_type type;
|
|
|
|
type = nla_get_u8(tb[NL80211_ATTR_REG_TYPE]);
|
|
|
|
wpa_printf(MSG_DEBUG, " * type=%d", type);
|
|
|
|
switch (type) {
|
|
|
|
case NL80211_REGDOM_TYPE_COUNTRY:
|
|
|
|
data.channel_list_changed.type = REGDOM_TYPE_COUNTRY;
|
|
|
|
break;
|
|
|
|
case NL80211_REGDOM_TYPE_WORLD:
|
|
|
|
data.channel_list_changed.type = REGDOM_TYPE_WORLD;
|
|
|
|
break;
|
|
|
|
case NL80211_REGDOM_TYPE_CUSTOM_WORLD:
|
|
|
|
data.channel_list_changed.type =
|
|
|
|
REGDOM_TYPE_CUSTOM_WORLD;
|
|
|
|
break;
|
|
|
|
case NL80211_REGDOM_TYPE_INTERSECTION:
|
|
|
|
data.channel_list_changed.type =
|
|
|
|
REGDOM_TYPE_INTERSECTION;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_REG_ALPHA2]) {
|
|
|
|
os_strlcpy(data.channel_list_changed.alpha2,
|
|
|
|
nla_get_string(tb[NL80211_ATTR_REG_ALPHA2]),
|
|
|
|
sizeof(data.channel_list_changed.alpha2));
|
|
|
|
wpa_printf(MSG_DEBUG, " * alpha2=%s",
|
|
|
|
data.channel_list_changed.alpha2);
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_CHANNEL_LIST_CHANGED, &data);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-22 09:19:52 -05:00
|
|
|
static void do_process_drv_event(struct i802_bss *bss, int cmd,
|
|
|
|
struct nlattr **tb)
|
2009-02-12 13:11:43 -05:00
|
|
|
{
|
2012-12-22 09:19:52 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2013-11-13 07:00:27 -05:00
|
|
|
union wpa_event_data data;
|
2012-12-22 09:19:52 -05:00
|
|
|
|
2013-06-22 04:12:48 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Drv Event %d (%s) received for %s",
|
|
|
|
cmd, nl80211_command_to_string(cmd), bss->ifname);
|
|
|
|
|
2014-10-23 11:21:49 -04:00
|
|
|
if (cmd == NL80211_CMD_ROAM && drv->roam_auth_vendor_event_avail) {
|
|
|
|
/*
|
|
|
|
* Device will use roam+auth vendor event to indicate
|
|
|
|
* roaming, so ignore the regular roam event.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Ignore roam event (cmd=%d), device will use vendor event roam+auth",
|
|
|
|
cmd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-07-17 13:22:11 -04:00
|
|
|
if (drv->ap_scan_as_station != NL80211_IFTYPE_UNSPECIFIED &&
|
2011-12-06 12:30:43 -05:00
|
|
|
(cmd == NL80211_CMD_NEW_SCAN_RESULTS ||
|
|
|
|
cmd == NL80211_CMD_SCAN_ABORTED)) {
|
2013-10-29 20:41:39 -04:00
|
|
|
wpa_driver_nl80211_set_mode(drv->first_bss,
|
2011-07-17 13:22:11 -04:00
|
|
|
drv->ap_scan_as_station);
|
|
|
|
drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
|
2009-04-16 09:22:40 -04:00
|
|
|
}
|
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
switch (cmd) {
|
2009-10-01 06:58:17 -04:00
|
|
|
case NL80211_CMD_TRIGGER_SCAN:
|
2013-03-18 10:05:24 -04:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Scan trigger");
|
2013-09-28 10:19:30 -04:00
|
|
|
drv->scan_state = SCAN_STARTED;
|
2014-03-18 16:45:07 -04:00
|
|
|
if (drv->scan_for_auth) {
|
|
|
|
/*
|
|
|
|
* Cannot indicate EVENT_SCAN_STARTED here since we skip
|
|
|
|
* EVENT_SCAN_RESULTS in scan_for_auth case and the
|
|
|
|
* upper layer implementation could get confused about
|
|
|
|
* scanning state.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Do not indicate scan-start event due to internal scan_for_auth");
|
|
|
|
break;
|
|
|
|
}
|
2013-12-26 10:33:26 -05:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_SCAN_STARTED, NULL);
|
2009-10-01 06:58:17 -04:00
|
|
|
break;
|
2011-09-27 15:21:30 -04:00
|
|
|
case NL80211_CMD_START_SCHED_SCAN:
|
2013-03-18 10:05:24 -04:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Sched scan started");
|
2013-09-28 10:19:30 -04:00
|
|
|
drv->scan_state = SCHED_SCAN_STARTED;
|
2011-09-27 15:21:30 -04:00
|
|
|
break;
|
|
|
|
case NL80211_CMD_SCHED_SCAN_STOPPED:
|
2013-03-18 10:05:24 -04:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Sched scan stopped");
|
2013-09-28 10:19:30 -04:00
|
|
|
drv->scan_state = SCHED_SCAN_STOPPED;
|
2011-09-27 15:21:30 -04:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_SCHED_SCAN_STOPPED, NULL);
|
|
|
|
break;
|
2009-02-12 13:11:43 -05:00
|
|
|
case NL80211_CMD_NEW_SCAN_RESULTS:
|
2013-03-18 10:05:24 -04:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG,
|
|
|
|
"nl80211: New scan results available");
|
2013-09-28 10:19:30 -04:00
|
|
|
drv->scan_state = SCAN_COMPLETED;
|
2009-02-12 13:11:43 -05:00
|
|
|
drv->scan_complete_events = 1;
|
|
|
|
eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv,
|
|
|
|
drv->ctx);
|
2010-01-02 06:57:44 -05:00
|
|
|
send_scan_event(drv, 0, tb);
|
2009-02-12 13:11:43 -05:00
|
|
|
break;
|
2011-09-27 15:21:30 -04:00
|
|
|
case NL80211_CMD_SCHED_SCAN_RESULTS:
|
2013-03-18 10:05:24 -04:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG,
|
|
|
|
"nl80211: New sched scan results available");
|
2013-09-28 10:19:30 -04:00
|
|
|
drv->scan_state = SCHED_SCAN_RESULTS;
|
2011-09-27 15:21:30 -04:00
|
|
|
send_scan_event(drv, 0, tb);
|
|
|
|
break;
|
2009-02-12 13:11:43 -05:00
|
|
|
case NL80211_CMD_SCAN_ABORTED:
|
2013-03-18 10:05:24 -04:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Scan aborted");
|
2013-09-28 10:19:30 -04:00
|
|
|
drv->scan_state = SCAN_ABORTED;
|
2009-02-12 13:11:43 -05:00
|
|
|
/*
|
|
|
|
* Need to indicate that scan results are available in order
|
|
|
|
* not to make wpa_supplicant stop its scanning.
|
|
|
|
*/
|
|
|
|
eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv,
|
|
|
|
drv->ctx);
|
2010-01-02 06:57:44 -05:00
|
|
|
send_scan_event(drv, 1, tb);
|
2009-02-12 13:11:43 -05:00
|
|
|
break;
|
2009-03-20 16:26:41 -04:00
|
|
|
case NL80211_CMD_AUTHENTICATE:
|
|
|
|
case NL80211_CMD_ASSOCIATE:
|
|
|
|
case NL80211_CMD_DEAUTHENTICATE:
|
|
|
|
case NL80211_CMD_DISASSOCIATE:
|
2010-10-10 10:55:18 -04:00
|
|
|
case NL80211_CMD_FRAME_TX_STATUS:
|
2010-12-19 04:58:00 -05:00
|
|
|
case NL80211_CMD_UNPROT_DEAUTHENTICATE:
|
|
|
|
case NL80211_CMD_UNPROT_DISASSOCIATE:
|
2013-04-23 18:02:01 -04:00
|
|
|
mlme_event(bss, cmd, tb[NL80211_ATTR_FRAME],
|
2010-02-16 12:41:49 -05:00
|
|
|
tb[NL80211_ATTR_MAC], tb[NL80211_ATTR_TIMED_OUT],
|
|
|
|
tb[NL80211_ATTR_WIPHY_FREQ], tb[NL80211_ATTR_ACK],
|
2012-04-01 05:39:33 -04:00
|
|
|
tb[NL80211_ATTR_COOKIE],
|
|
|
|
tb[NL80211_ATTR_RX_SIGNAL_DBM]);
|
2009-03-20 16:26:41 -04:00
|
|
|
break;
|
2009-09-03 13:39:59 -04:00
|
|
|
case NL80211_CMD_CONNECT:
|
|
|
|
case NL80211_CMD_ROAM:
|
2011-12-06 12:30:43 -05:00
|
|
|
mlme_event_connect(drv, cmd,
|
2009-09-03 13:39:59 -04:00
|
|
|
tb[NL80211_ATTR_STATUS_CODE],
|
|
|
|
tb[NL80211_ATTR_MAC],
|
|
|
|
tb[NL80211_ATTR_REQ_IE],
|
2014-10-23 11:21:49 -04:00
|
|
|
tb[NL80211_ATTR_RESP_IE],
|
|
|
|
NULL, NULL, NULL, NULL);
|
2009-09-03 13:39:59 -04:00
|
|
|
break;
|
2012-06-25 07:45:14 -04:00
|
|
|
case NL80211_CMD_CH_SWITCH_NOTIFY:
|
2013-11-25 14:16:12 -05:00
|
|
|
mlme_event_ch_switch(drv,
|
|
|
|
tb[NL80211_ATTR_IFINDEX],
|
|
|
|
tb[NL80211_ATTR_WIPHY_FREQ],
|
|
|
|
tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE],
|
|
|
|
tb[NL80211_ATTR_CHANNEL_WIDTH],
|
|
|
|
tb[NL80211_ATTR_CENTER_FREQ1],
|
|
|
|
tb[NL80211_ATTR_CENTER_FREQ2]);
|
2012-06-25 07:45:14 -04:00
|
|
|
break;
|
2009-09-03 13:39:59 -04:00
|
|
|
case NL80211_CMD_DISCONNECT:
|
2011-09-18 14:26:55 -04:00
|
|
|
mlme_event_disconnect(drv, tb[NL80211_ATTR_REASON_CODE],
|
2012-01-01 11:53:12 -05:00
|
|
|
tb[NL80211_ATTR_MAC],
|
|
|
|
tb[NL80211_ATTR_DISCONNECTED_BY_AP]);
|
2009-09-03 13:39:59 -04:00
|
|
|
break;
|
2009-04-09 09:50:48 -04:00
|
|
|
case NL80211_CMD_MICHAEL_MIC_FAILURE:
|
2012-12-22 09:19:52 -05:00
|
|
|
mlme_event_michael_mic_failure(bss, tb);
|
2009-04-09 09:50:48 -04:00
|
|
|
break;
|
2009-12-03 17:15:32 -05:00
|
|
|
case NL80211_CMD_JOIN_IBSS:
|
|
|
|
mlme_event_join_ibss(drv, tb);
|
|
|
|
break;
|
2010-01-03 06:57:51 -05:00
|
|
|
case NL80211_CMD_REMAIN_ON_CHANNEL:
|
|
|
|
mlme_event_remain_on_channel(drv, 0, tb);
|
|
|
|
break;
|
|
|
|
case NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL:
|
|
|
|
mlme_event_remain_on_channel(drv, 1, tb);
|
|
|
|
break;
|
2010-03-28 16:56:40 -04:00
|
|
|
case NL80211_CMD_NOTIFY_CQM:
|
|
|
|
nl80211_cqm_event(drv, tb);
|
|
|
|
break;
|
2010-10-15 11:56:36 -04:00
|
|
|
case NL80211_CMD_REG_CHANGE:
|
2014-04-13 09:32:38 -04:00
|
|
|
nl80211_reg_change_event(drv, tb);
|
2010-10-15 11:56:36 -04:00
|
|
|
break;
|
|
|
|
case NL80211_CMD_REG_BEACON_HINT:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Regulatory beacon hint");
|
2014-02-03 06:24:50 -05:00
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
data.channel_list_changed.initiator = REGDOM_BEACON_HINT;
|
2010-10-15 11:56:36 -04:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_CHANNEL_LIST_CHANGED,
|
2014-02-03 06:24:50 -05:00
|
|
|
&data);
|
2010-10-15 11:56:36 -04:00
|
|
|
break;
|
2010-12-04 21:17:58 -05:00
|
|
|
case NL80211_CMD_NEW_STATION:
|
|
|
|
nl80211_new_station_event(drv, tb);
|
|
|
|
break;
|
2011-03-23 09:32:55 -04:00
|
|
|
case NL80211_CMD_DEL_STATION:
|
|
|
|
nl80211_del_station_event(drv, tb);
|
|
|
|
break;
|
2011-07-12 14:22:51 -04:00
|
|
|
case NL80211_CMD_SET_REKEY_OFFLOAD:
|
|
|
|
nl80211_rekey_offload_event(drv, tb);
|
|
|
|
break;
|
2011-09-21 09:14:41 -04:00
|
|
|
case NL80211_CMD_PMKSA_CANDIDATE:
|
|
|
|
nl80211_pmksa_candidate_event(drv, tb);
|
|
|
|
break;
|
2011-11-19 07:23:46 -05:00
|
|
|
case NL80211_CMD_PROBE_CLIENT:
|
|
|
|
nl80211_client_probe_event(drv, tb);
|
|
|
|
break;
|
2012-11-19 10:00:07 -05:00
|
|
|
case NL80211_CMD_TDLS_OPER:
|
|
|
|
nl80211_tdls_oper_event(drv, tb);
|
|
|
|
break;
|
2013-02-07 08:24:53 -05:00
|
|
|
case NL80211_CMD_CONN_FAILED:
|
|
|
|
nl80211_connect_failed_event(drv, tb);
|
|
|
|
break;
|
2013-03-12 14:08:53 -04:00
|
|
|
case NL80211_CMD_FT_EVENT:
|
|
|
|
mlme_event_ft_event(drv, tb);
|
|
|
|
break;
|
2013-05-09 12:54:18 -04:00
|
|
|
case NL80211_CMD_RADAR_DETECT:
|
|
|
|
nl80211_radar_event(drv, tb);
|
|
|
|
break;
|
2013-08-06 16:28:40 -04:00
|
|
|
case NL80211_CMD_STOP_AP:
|
|
|
|
nl80211_stop_ap(drv, tb);
|
|
|
|
break;
|
2014-01-01 16:30:23 -05:00
|
|
|
case NL80211_CMD_VENDOR:
|
|
|
|
nl80211_vendor_event(drv, tb);
|
|
|
|
break;
|
2014-09-01 00:23:23 -04:00
|
|
|
case NL80211_CMD_NEW_PEER_CANDIDATE:
|
|
|
|
nl80211_new_peer_candidate(drv, tb);
|
|
|
|
break;
|
2009-02-12 13:11:43 -05:00
|
|
|
default:
|
2013-03-18 10:05:24 -04:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Ignored unknown event "
|
|
|
|
"(cmd=%d)", cmd);
|
2009-02-12 13:11:43 -05:00
|
|
|
break;
|
|
|
|
}
|
2011-12-06 12:30:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int process_drv_event(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = arg;
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
2012-12-22 09:19:52 -05:00
|
|
|
struct i802_bss *bss;
|
|
|
|
int ifidx = -1;
|
2011-12-06 12:30:43 -05:00
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
2013-06-25 06:33:45 -04:00
|
|
|
if (tb[NL80211_ATTR_IFINDEX]) {
|
2012-12-22 09:19:52 -05:00
|
|
|
ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
|
|
|
|
|
2013-10-29 20:41:39 -04:00
|
|
|
for (bss = drv->first_bss; bss; bss = bss->next)
|
2013-06-25 06:33:45 -04:00
|
|
|
if (ifidx == -1 || ifidx == bss->ifindex) {
|
|
|
|
do_process_drv_event(bss, gnlh->cmd, tb);
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Ignored event (cmd=%d) for foreign interface (ifindex %d)",
|
|
|
|
gnlh->cmd, ifidx);
|
|
|
|
} else if (tb[NL80211_ATTR_WDEV]) {
|
|
|
|
u64 wdev_id = nla_get_u64(tb[NL80211_ATTR_WDEV]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Process event on P2P device");
|
2013-10-29 20:41:39 -04:00
|
|
|
for (bss = drv->first_bss; bss; bss = bss->next) {
|
2013-06-25 06:33:45 -04:00
|
|
|
if (bss->wdev_id_set && wdev_id == bss->wdev_id) {
|
|
|
|
do_process_drv_event(bss, gnlh->cmd, tb);
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
2011-12-06 12:30:43 -05:00
|
|
|
}
|
2013-06-25 06:33:45 -04:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Ignored event (cmd=%d) for foreign interface (wdev 0x%llx)",
|
|
|
|
gnlh->cmd, (long long unsigned int) wdev_id);
|
2011-12-06 12:30:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int process_global_event(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nl80211_global *global = arg;
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
2012-06-04 13:25:11 -04:00
|
|
|
struct wpa_driver_nl80211_data *drv, *tmp;
|
2011-12-06 12:30:43 -05:00
|
|
|
int ifidx = -1;
|
2012-12-22 09:19:52 -05:00
|
|
|
struct i802_bss *bss;
|
2013-06-30 05:54:47 -04:00
|
|
|
u64 wdev_id = 0;
|
2013-06-25 06:33:45 -04:00
|
|
|
int wdev_id_set = 0;
|
2011-12-06 12:30:43 -05:00
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_IFINDEX])
|
|
|
|
ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
|
2013-06-25 06:33:45 -04:00
|
|
|
else if (tb[NL80211_ATTR_WDEV]) {
|
|
|
|
wdev_id = nla_get_u64(tb[NL80211_ATTR_WDEV]);
|
|
|
|
wdev_id_set = 1;
|
|
|
|
}
|
2011-12-06 12:30:43 -05:00
|
|
|
|
2012-06-04 13:25:11 -04:00
|
|
|
dl_list_for_each_safe(drv, tmp, &global->interfaces,
|
|
|
|
struct wpa_driver_nl80211_data, list) {
|
2013-10-29 20:41:39 -04:00
|
|
|
for (bss = drv->first_bss; bss; bss = bss->next) {
|
2013-06-25 06:33:45 -04:00
|
|
|
if ((ifidx == -1 && !wdev_id_set) ||
|
|
|
|
ifidx == bss->ifindex ||
|
|
|
|
(wdev_id_set && bss->wdev_id_set &&
|
|
|
|
wdev_id == bss->wdev_id)) {
|
2012-12-22 09:19:52 -05:00
|
|
|
do_process_drv_event(bss, gnlh->cmd, tb);
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
}
|
2011-12-06 12:30:43 -05:00
|
|
|
}
|
2009-02-12 13:11:43 -05:00
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-03 13:14:53 -05:00
|
|
|
static int process_bss_event(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
2011-12-06 11:24:00 -05:00
|
|
|
struct i802_bss *bss = arg;
|
2011-12-03 13:14:53 -05:00
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
2013-06-22 04:12:48 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: BSS Event %d (%s) received for %s",
|
|
|
|
gnlh->cmd, nl80211_command_to_string(gnlh->cmd),
|
|
|
|
bss->ifname);
|
|
|
|
|
2011-12-03 13:14:53 -05:00
|
|
|
switch (gnlh->cmd) {
|
2011-12-06 11:24:00 -05:00
|
|
|
case NL80211_CMD_FRAME:
|
|
|
|
case NL80211_CMD_FRAME_TX_STATUS:
|
2013-04-23 18:02:01 -04:00
|
|
|
mlme_event(bss, gnlh->cmd, tb[NL80211_ATTR_FRAME],
|
2011-12-06 11:24:00 -05:00
|
|
|
tb[NL80211_ATTR_MAC], tb[NL80211_ATTR_TIMED_OUT],
|
|
|
|
tb[NL80211_ATTR_WIPHY_FREQ], tb[NL80211_ATTR_ACK],
|
2012-04-01 05:39:33 -04:00
|
|
|
tb[NL80211_ATTR_COOKIE],
|
|
|
|
tb[NL80211_ATTR_RX_SIGNAL_DBM]);
|
2011-12-06 11:24:00 -05:00
|
|
|
break;
|
2011-12-06 11:29:45 -05:00
|
|
|
case NL80211_CMD_UNEXPECTED_FRAME:
|
2011-12-06 12:32:41 -05:00
|
|
|
nl80211_spurious_frame(bss, tb, 0);
|
|
|
|
break;
|
|
|
|
case NL80211_CMD_UNEXPECTED_4ADDR_FRAME:
|
|
|
|
nl80211_spurious_frame(bss, tb, 1);
|
2011-12-06 11:29:45 -05:00
|
|
|
break;
|
2011-12-03 13:14:53 -05:00
|
|
|
default:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Ignored unknown event "
|
|
|
|
"(cmd=%d)", gnlh->cmd);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-02-12 13:11:43 -05:00
|
|
|
static void wpa_driver_nl80211_event_receive(int sock, void *eloop_ctx,
|
2010-10-10 11:10:37 -04:00
|
|
|
void *handle)
|
2009-02-12 13:11:43 -05:00
|
|
|
{
|
2011-12-03 13:07:54 -05:00
|
|
|
struct nl_cb *cb = eloop_ctx;
|
2013-10-26 09:13:34 -04:00
|
|
|
int res;
|
2009-02-12 13:11:43 -05:00
|
|
|
|
2013-04-23 18:01:21 -04:00
|
|
|
wpa_printf(MSG_MSGDUMP, "nl80211: Event message available");
|
2009-02-12 13:11:43 -05:00
|
|
|
|
2013-10-26 09:13:34 -04:00
|
|
|
res = nl_recvmsgs(handle, cb);
|
2014-05-23 01:51:07 -04:00
|
|
|
if (res < 0) {
|
2013-10-26 09:13:34 -04:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
|
|
|
|
__func__, res);
|
|
|
|
}
|
2009-02-12 13:11:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-12-09 15:11:14 -05:00
|
|
|
/**
|
|
|
|
* wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain
|
|
|
|
* @priv: driver_nl80211 private data
|
|
|
|
* @alpha2_arg: country to which to switch to
|
|
|
|
* Returns: 0 on success, -1 on failure
|
|
|
|
*
|
|
|
|
* This asks nl80211 to set the regulatory domain for given
|
|
|
|
* country ISO / IEC alpha2.
|
|
|
|
*/
|
|
|
|
static int wpa_driver_nl80211_set_country(void *priv, const char *alpha2_arg)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2008-12-09 15:11:14 -05:00
|
|
|
char alpha2[3];
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
2009-04-09 13:01:25 -04:00
|
|
|
return -ENOMEM;
|
2008-12-09 15:11:14 -05:00
|
|
|
|
|
|
|
alpha2[0] = alpha2_arg[0];
|
|
|
|
alpha2[1] = alpha2_arg[1];
|
|
|
|
alpha2[2] = '\0';
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_REQ_SET_REG);
|
2008-12-09 15:11:14 -05:00
|
|
|
|
|
|
|
NLA_PUT_STRING(msg, NL80211_ATTR_REG_ALPHA2, alpha2);
|
|
|
|
if (send_and_recv_msgs(drv, msg, NULL, NULL))
|
|
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2008-12-09 15:11:14 -05:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-11-03 09:33:11 -05:00
|
|
|
static int nl80211_get_country(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
char *alpha2 = arg;
|
|
|
|
struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
|
|
|
|
nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
if (!tb_msg[NL80211_ATTR_REG_ALPHA2]) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: No country information available");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
os_strlcpy(alpha2, nla_data(tb_msg[NL80211_ATTR_REG_ALPHA2]), 3);
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_get_country(void *priv, char *alpha2)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG);
|
|
|
|
alpha2[0] = '\0';
|
|
|
|
ret = send_and_recv_msgs(drv, msg, nl80211_get_country, alpha2);
|
|
|
|
if (!alpha2[0])
|
|
|
|
ret = -1;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-10 07:22:43 -04:00
|
|
|
static int protocol_feature_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
u32 *feat = arg;
|
|
|
|
struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
|
|
|
|
nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
if (tb_msg[NL80211_ATTR_PROTOCOL_FEATURES])
|
|
|
|
*feat = nla_get_u32(tb_msg[NL80211_ATTR_PROTOCOL_FEATURES]);
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static u32 get_nl80211_protocol_features(struct wpa_driver_nl80211_data *drv)
|
|
|
|
{
|
|
|
|
u32 feat = 0;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_PROTOCOL_FEATURES);
|
|
|
|
if (send_and_recv_msgs(drv, msg, protocol_feature_handler, &feat) == 0)
|
|
|
|
return feat;
|
|
|
|
|
|
|
|
msg = NULL;
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-02-12 14:49:57 -05:00
|
|
|
struct wiphy_info_data {
|
2013-03-31 14:51:44 -04:00
|
|
|
struct wpa_driver_nl80211_data *drv;
|
2011-10-20 14:57:32 -04:00
|
|
|
struct wpa_driver_capa *capa;
|
|
|
|
|
2013-07-21 12:49:47 -04:00
|
|
|
unsigned int num_multichan_concurrent;
|
|
|
|
|
2011-10-20 14:57:32 -04:00
|
|
|
unsigned int error:1;
|
2011-11-19 06:42:49 -05:00
|
|
|
unsigned int device_ap_sme:1;
|
2011-11-19 07:23:46 -05:00
|
|
|
unsigned int poll_command_supported:1;
|
2011-12-03 12:32:23 -05:00
|
|
|
unsigned int data_tx_status:1;
|
2011-12-23 11:13:01 -05:00
|
|
|
unsigned int monitor_supported:1;
|
2013-03-10 07:22:43 -04:00
|
|
|
unsigned int auth_supported:1;
|
|
|
|
unsigned int connect_supported:1;
|
|
|
|
unsigned int p2p_go_supported:1;
|
|
|
|
unsigned int p2p_client_supported:1;
|
|
|
|
unsigned int p2p_concurrent:1;
|
2013-11-14 05:28:30 -05:00
|
|
|
unsigned int channel_switch_supported:1;
|
2013-12-23 04:05:20 -05:00
|
|
|
unsigned int set_qos_map_supported:1;
|
2014-06-04 05:21:40 -04:00
|
|
|
unsigned int have_low_prio_scan:1;
|
2009-02-12 14:49:57 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2011-12-10 09:50:00 -05:00
|
|
|
static unsigned int probe_resp_offload_support(int supp_protocols)
|
|
|
|
{
|
|
|
|
unsigned int prot = 0;
|
|
|
|
|
|
|
|
if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_WPS)
|
|
|
|
prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS;
|
|
|
|
if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_WPS2)
|
|
|
|
prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2;
|
|
|
|
if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_P2P)
|
|
|
|
prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P;
|
|
|
|
if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_80211U)
|
|
|
|
prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING;
|
|
|
|
|
|
|
|
return prot;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-10 10:05:55 -04:00
|
|
|
static void wiphy_info_supported_iftypes(struct wiphy_info_data *info,
|
|
|
|
struct nlattr *tb)
|
2009-02-12 14:49:57 -05:00
|
|
|
{
|
2013-03-10 10:05:55 -04:00
|
|
|
struct nlattr *nl_mode;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (tb == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
nla_for_each_nested(nl_mode, tb, i) {
|
|
|
|
switch (nla_type(nl_mode)) {
|
|
|
|
case NL80211_IFTYPE_AP:
|
|
|
|
info->capa->flags |= WPA_DRIVER_FLAGS_AP;
|
|
|
|
break;
|
2014-09-01 00:23:23 -04:00
|
|
|
case NL80211_IFTYPE_MESH_POINT:
|
|
|
|
info->capa->flags |= WPA_DRIVER_FLAGS_MESH;
|
|
|
|
break;
|
2013-03-16 06:42:15 -04:00
|
|
|
case NL80211_IFTYPE_ADHOC:
|
|
|
|
info->capa->flags |= WPA_DRIVER_FLAGS_IBSS;
|
|
|
|
break;
|
2013-06-25 06:29:48 -04:00
|
|
|
case NL80211_IFTYPE_P2P_DEVICE:
|
|
|
|
info->capa->flags |=
|
|
|
|
WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE;
|
|
|
|
break;
|
2013-03-10 10:05:55 -04:00
|
|
|
case NL80211_IFTYPE_P2P_GO:
|
|
|
|
info->p2p_go_supported = 1;
|
|
|
|
break;
|
|
|
|
case NL80211_IFTYPE_P2P_CLIENT:
|
|
|
|
info->p2p_client_supported = 1;
|
|
|
|
break;
|
|
|
|
case NL80211_IFTYPE_MONITOR:
|
|
|
|
info->monitor_supported = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wiphy_info_iface_comb_process(struct wiphy_info_data *info,
|
|
|
|
struct nlattr *nl_combi)
|
|
|
|
{
|
|
|
|
struct nlattr *tb_comb[NUM_NL80211_IFACE_COMB];
|
|
|
|
struct nlattr *tb_limit[NUM_NL80211_IFACE_LIMIT];
|
|
|
|
struct nlattr *nl_limit, *nl_mode;
|
|
|
|
int err, rem_limit, rem_mode;
|
|
|
|
int combination_has_p2p = 0, combination_has_mgd = 0;
|
2011-09-10 14:52:21 -04:00
|
|
|
static struct nla_policy
|
|
|
|
iface_combination_policy[NUM_NL80211_IFACE_COMB] = {
|
|
|
|
[NL80211_IFACE_COMB_LIMITS] = { .type = NLA_NESTED },
|
|
|
|
[NL80211_IFACE_COMB_MAXNUM] = { .type = NLA_U32 },
|
|
|
|
[NL80211_IFACE_COMB_STA_AP_BI_MATCH] = { .type = NLA_FLAG },
|
|
|
|
[NL80211_IFACE_COMB_NUM_CHANNELS] = { .type = NLA_U32 },
|
2013-05-09 12:58:55 -04:00
|
|
|
[NL80211_IFACE_COMB_RADAR_DETECT_WIDTHS] = { .type = NLA_U32 },
|
2011-09-10 14:52:21 -04:00
|
|
|
},
|
|
|
|
iface_limit_policy[NUM_NL80211_IFACE_LIMIT] = {
|
|
|
|
[NL80211_IFACE_LIMIT_TYPES] = { .type = NLA_NESTED },
|
|
|
|
[NL80211_IFACE_LIMIT_MAX] = { .type = NLA_U32 },
|
|
|
|
};
|
2009-02-12 14:49:57 -05:00
|
|
|
|
2013-03-10 10:05:55 -04:00
|
|
|
err = nla_parse_nested(tb_comb, MAX_NL80211_IFACE_COMB,
|
|
|
|
nl_combi, iface_combination_policy);
|
|
|
|
if (err || !tb_comb[NL80211_IFACE_COMB_LIMITS] ||
|
|
|
|
!tb_comb[NL80211_IFACE_COMB_MAXNUM] ||
|
|
|
|
!tb_comb[NL80211_IFACE_COMB_NUM_CHANNELS])
|
|
|
|
return 0; /* broken combination */
|
|
|
|
|
2013-05-09 12:58:55 -04:00
|
|
|
if (tb_comb[NL80211_IFACE_COMB_RADAR_DETECT_WIDTHS])
|
|
|
|
info->capa->flags |= WPA_DRIVER_FLAGS_RADAR;
|
|
|
|
|
2013-03-10 10:05:55 -04:00
|
|
|
nla_for_each_nested(nl_limit, tb_comb[NL80211_IFACE_COMB_LIMITS],
|
|
|
|
rem_limit) {
|
|
|
|
err = nla_parse_nested(tb_limit, MAX_NL80211_IFACE_LIMIT,
|
|
|
|
nl_limit, iface_limit_policy);
|
|
|
|
if (err || !tb_limit[NL80211_IFACE_LIMIT_TYPES])
|
|
|
|
return 0; /* broken combination */
|
|
|
|
|
|
|
|
nla_for_each_nested(nl_mode,
|
|
|
|
tb_limit[NL80211_IFACE_LIMIT_TYPES],
|
|
|
|
rem_mode) {
|
|
|
|
int ift = nla_type(nl_mode);
|
|
|
|
if (ift == NL80211_IFTYPE_P2P_GO ||
|
|
|
|
ift == NL80211_IFTYPE_P2P_CLIENT)
|
|
|
|
combination_has_p2p = 1;
|
|
|
|
if (ift == NL80211_IFTYPE_STATION)
|
|
|
|
combination_has_mgd = 1;
|
|
|
|
}
|
|
|
|
if (combination_has_p2p && combination_has_mgd)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (combination_has_p2p && combination_has_mgd) {
|
2014-04-06 07:11:53 -04:00
|
|
|
unsigned int num_channels =
|
2013-07-21 12:49:47 -04:00
|
|
|
nla_get_u32(tb_comb[NL80211_IFACE_COMB_NUM_CHANNELS]);
|
2014-04-06 07:11:53 -04:00
|
|
|
|
|
|
|
info->p2p_concurrent = 1;
|
|
|
|
if (info->num_multichan_concurrent < num_channels)
|
|
|
|
info->num_multichan_concurrent = num_channels;
|
2013-03-10 10:05:55 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wiphy_info_iface_comb(struct wiphy_info_data *info,
|
|
|
|
struct nlattr *tb)
|
|
|
|
{
|
|
|
|
struct nlattr *nl_combi;
|
|
|
|
int rem_combi;
|
|
|
|
|
|
|
|
if (tb == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
nla_for_each_nested(nl_combi, tb, rem_combi) {
|
|
|
|
if (wiphy_info_iface_comb_process(info, nl_combi) > 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wiphy_info_supp_cmds(struct wiphy_info_data *info,
|
|
|
|
struct nlattr *tb)
|
|
|
|
{
|
|
|
|
struct nlattr *nl_cmd;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (tb == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
nla_for_each_nested(nl_cmd, tb, i) {
|
|
|
|
switch (nla_get_u32(nl_cmd)) {
|
|
|
|
case NL80211_CMD_AUTHENTICATE:
|
|
|
|
info->auth_supported = 1;
|
|
|
|
break;
|
|
|
|
case NL80211_CMD_CONNECT:
|
|
|
|
info->connect_supported = 1;
|
|
|
|
break;
|
|
|
|
case NL80211_CMD_START_SCHED_SCAN:
|
|
|
|
info->capa->sched_scan_supported = 1;
|
|
|
|
break;
|
|
|
|
case NL80211_CMD_PROBE_CLIENT:
|
|
|
|
info->poll_command_supported = 1;
|
|
|
|
break;
|
2013-11-14 05:28:30 -05:00
|
|
|
case NL80211_CMD_CHANNEL_SWITCH:
|
|
|
|
info->channel_switch_supported = 1;
|
|
|
|
break;
|
2013-12-23 04:05:20 -05:00
|
|
|
case NL80211_CMD_SET_QOS_MAP:
|
|
|
|
info->set_qos_map_supported = 1;
|
|
|
|
break;
|
2013-03-10 10:05:55 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-12-25 04:07:58 -05:00
|
|
|
static void wiphy_info_cipher_suites(struct wiphy_info_data *info,
|
|
|
|
struct nlattr *tb)
|
|
|
|
{
|
|
|
|
int i, num;
|
|
|
|
u32 *ciphers;
|
|
|
|
|
|
|
|
if (tb == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
num = nla_len(tb) / sizeof(u32);
|
|
|
|
ciphers = nla_data(tb);
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
u32 c = ciphers[i];
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Supported cipher %02x-%02x-%02x:%d",
|
|
|
|
c >> 24, (c >> 16) & 0xff,
|
|
|
|
(c >> 8) & 0xff, c & 0xff);
|
|
|
|
switch (c) {
|
|
|
|
case WLAN_CIPHER_SUITE_CCMP_256:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_CCMP_256;
|
|
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_GCMP_256:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_GCMP_256;
|
|
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_CCMP:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_CCMP;
|
|
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_GCMP:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_GCMP;
|
|
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_TKIP:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_TKIP;
|
|
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_WEP104:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_WEP104;
|
|
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_WEP40:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_WEP40;
|
|
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_AES_CMAC:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_BIP;
|
|
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_BIP_GMAC_128:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_BIP_GMAC_128;
|
|
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_BIP_GMAC_256:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_BIP_GMAC_256;
|
|
|
|
break;
|
|
|
|
case WLAN_CIPHER_SUITE_BIP_CMAC_256:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_BIP_CMAC_256;
|
|
|
|
break;
|
2014-01-27 12:11:15 -05:00
|
|
|
case WLAN_CIPHER_SUITE_NO_GROUP_ADDR:
|
|
|
|
info->capa->enc |= WPA_DRIVER_CAPA_ENC_GTK_NOT_USED;
|
|
|
|
break;
|
2013-12-25 04:07:58 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-10 10:05:55 -04:00
|
|
|
static void wiphy_info_max_roc(struct wpa_driver_capa *capa,
|
|
|
|
struct nlattr *tb)
|
|
|
|
{
|
|
|
|
if (tb)
|
|
|
|
capa->max_remain_on_chan = nla_get_u32(tb);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wiphy_info_tdls(struct wpa_driver_capa *capa, struct nlattr *tdls,
|
|
|
|
struct nlattr *ext_setup)
|
|
|
|
{
|
|
|
|
if (tdls == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: TDLS supported");
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_TDLS_SUPPORT;
|
|
|
|
|
|
|
|
if (ext_setup) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: TDLS external setup");
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_TDLS_EXTERNAL_SETUP;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wiphy_info_feature_flags(struct wiphy_info_data *info,
|
|
|
|
struct nlattr *tb)
|
|
|
|
{
|
|
|
|
u32 flags;
|
|
|
|
struct wpa_driver_capa *capa = info->capa;
|
|
|
|
|
|
|
|
if (tb == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
flags = nla_get_u32(tb);
|
|
|
|
|
|
|
|
if (flags & NL80211_FEATURE_SK_TX_STATUS)
|
|
|
|
info->data_tx_status = 1;
|
|
|
|
|
|
|
|
if (flags & NL80211_FEATURE_INACTIVITY_TIMER)
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_INACTIVITY_TIMER;
|
|
|
|
|
|
|
|
if (flags & NL80211_FEATURE_SAE)
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_SAE;
|
|
|
|
|
|
|
|
if (flags & NL80211_FEATURE_NEED_OBSS_SCAN)
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_OBSS_SCAN;
|
2014-04-14 13:51:32 -04:00
|
|
|
|
|
|
|
if (flags & NL80211_FEATURE_AP_MODE_CHAN_WIDTH_CHANGE)
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_HT_2040_COEX;
|
2014-06-04 05:21:40 -04:00
|
|
|
|
|
|
|
if (flags & NL80211_FEATURE_LOW_PRIORITY_SCAN)
|
|
|
|
info->have_low_prio_scan = 1;
|
2014-10-19 23:21:41 -04:00
|
|
|
|
|
|
|
if (flags & NL80211_FEATURE_STATIC_SMPS)
|
|
|
|
capa->smps_modes |= WPA_DRIVER_SMPS_MODE_STATIC;
|
|
|
|
|
|
|
|
if (flags & NL80211_FEATURE_DYNAMIC_SMPS)
|
|
|
|
capa->smps_modes |= WPA_DRIVER_SMPS_MODE_DYNAMIC;
|
2013-03-10 10:05:55 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wiphy_info_probe_resp_offload(struct wpa_driver_capa *capa,
|
|
|
|
struct nlattr *tb)
|
|
|
|
{
|
|
|
|
u32 protocols;
|
|
|
|
|
|
|
|
if (tb == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
protocols = nla_get_u32(tb);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Supports Probe Response offload in AP "
|
|
|
|
"mode");
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_PROBE_RESP_OFFLOAD;
|
|
|
|
capa->probe_resp_offloads = probe_resp_offload_support(protocols);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-04-24 01:45:39 -04:00
|
|
|
static void wiphy_info_wowlan_triggers(struct wpa_driver_capa *capa,
|
|
|
|
struct nlattr *tb)
|
|
|
|
{
|
|
|
|
struct nlattr *triggers[MAX_NL80211_WOWLAN_TRIG + 1];
|
|
|
|
|
|
|
|
if (tb == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (nla_parse_nested(triggers, MAX_NL80211_WOWLAN_TRIG,
|
|
|
|
tb, NULL))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (triggers[NL80211_WOWLAN_TRIG_ANY])
|
|
|
|
capa->wowlan_triggers.any = 1;
|
|
|
|
if (triggers[NL80211_WOWLAN_TRIG_DISCONNECT])
|
|
|
|
capa->wowlan_triggers.disconnect = 1;
|
|
|
|
if (triggers[NL80211_WOWLAN_TRIG_MAGIC_PKT])
|
|
|
|
capa->wowlan_triggers.magic_pkt = 1;
|
|
|
|
if (triggers[NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE])
|
|
|
|
capa->wowlan_triggers.gtk_rekey_failure = 1;
|
|
|
|
if (triggers[NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST])
|
|
|
|
capa->wowlan_triggers.eap_identity_req = 1;
|
|
|
|
if (triggers[NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE])
|
|
|
|
capa->wowlan_triggers.four_way_handshake = 1;
|
|
|
|
if (triggers[NL80211_WOWLAN_TRIG_RFKILL_RELEASE])
|
|
|
|
capa->wowlan_triggers.rfkill_release = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-10 10:05:55 -04:00
|
|
|
static int wiphy_info_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct wiphy_info_data *info = arg;
|
|
|
|
struct wpa_driver_capa *capa = info->capa;
|
2013-03-31 14:51:44 -04:00
|
|
|
struct wpa_driver_nl80211_data *drv = info->drv;
|
2013-03-10 10:05:55 -04:00
|
|
|
|
2009-02-12 14:49:57 -05:00
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
2013-06-30 03:34:48 -04:00
|
|
|
if (tb[NL80211_ATTR_WIPHY_NAME])
|
2013-10-26 04:42:09 -04:00
|
|
|
os_strlcpy(drv->phyname,
|
2013-06-30 03:34:48 -04:00
|
|
|
nla_get_string(tb[NL80211_ATTR_WIPHY_NAME]),
|
|
|
|
sizeof(drv->phyname));
|
2009-02-12 14:49:57 -05:00
|
|
|
if (tb[NL80211_ATTR_MAX_NUM_SCAN_SSIDS])
|
2011-10-20 14:57:32 -04:00
|
|
|
capa->max_scan_ssids =
|
2009-02-12 14:49:57 -05:00
|
|
|
nla_get_u8(tb[NL80211_ATTR_MAX_NUM_SCAN_SSIDS]);
|
|
|
|
|
2011-09-27 15:21:30 -04:00
|
|
|
if (tb[NL80211_ATTR_MAX_NUM_SCHED_SCAN_SSIDS])
|
2011-10-20 14:57:32 -04:00
|
|
|
capa->max_sched_scan_ssids =
|
2011-09-27 15:21:30 -04:00
|
|
|
nla_get_u8(tb[NL80211_ATTR_MAX_NUM_SCHED_SCAN_SSIDS]);
|
|
|
|
|
2011-09-27 15:21:36 -04:00
|
|
|
if (tb[NL80211_ATTR_MAX_MATCH_SETS])
|
2011-10-20 14:57:32 -04:00
|
|
|
capa->max_match_sets =
|
2011-09-27 15:21:36 -04:00
|
|
|
nla_get_u8(tb[NL80211_ATTR_MAX_MATCH_SETS]);
|
|
|
|
|
2013-05-23 07:38:20 -04:00
|
|
|
if (tb[NL80211_ATTR_MAC_ACL_MAX])
|
|
|
|
capa->max_acl_mac_addrs =
|
|
|
|
nla_get_u8(tb[NL80211_ATTR_MAC_ACL_MAX]);
|
|
|
|
|
2013-03-10 10:05:55 -04:00
|
|
|
wiphy_info_supported_iftypes(info, tb[NL80211_ATTR_SUPPORTED_IFTYPES]);
|
|
|
|
wiphy_info_iface_comb(info, tb[NL80211_ATTR_INTERFACE_COMBINATIONS]);
|
|
|
|
wiphy_info_supp_cmds(info, tb[NL80211_ATTR_SUPPORTED_COMMANDS]);
|
2013-12-25 04:07:58 -05:00
|
|
|
wiphy_info_cipher_suites(info, tb[NL80211_ATTR_CIPHER_SUITES]);
|
2009-09-03 13:36:09 -04:00
|
|
|
|
2011-10-20 14:57:32 -04:00
|
|
|
if (tb[NL80211_ATTR_OFFCHANNEL_TX_OK]) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Using driver-based "
|
|
|
|
"off-channel TX");
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_OFFCHANNEL_TX;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_ROAM_SUPPORT]) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Using driver-based roaming");
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_BSS_SELECTION;
|
|
|
|
}
|
2010-12-29 07:05:34 -05:00
|
|
|
|
2013-03-10 10:05:55 -04:00
|
|
|
wiphy_info_max_roc(capa,
|
|
|
|
tb[NL80211_ATTR_MAX_REMAIN_ON_CHANNEL_DURATION]);
|
2011-09-26 07:26:55 -04:00
|
|
|
|
2011-12-17 04:45:53 -05:00
|
|
|
if (tb[NL80211_ATTR_SUPPORT_AP_UAPSD])
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_AP_UAPSD;
|
|
|
|
|
2013-03-10 10:05:55 -04:00
|
|
|
wiphy_info_tdls(capa, tb[NL80211_ATTR_TDLS_SUPPORT],
|
|
|
|
tb[NL80211_ATTR_TDLS_EXTERNAL_SETUP]);
|
2011-10-23 06:59:00 -04:00
|
|
|
|
2011-11-19 06:42:49 -05:00
|
|
|
if (tb[NL80211_ATTR_DEVICE_AP_SME])
|
|
|
|
info->device_ap_sme = 1;
|
|
|
|
|
2013-03-10 10:05:55 -04:00
|
|
|
wiphy_info_feature_flags(info, tb[NL80211_ATTR_FEATURE_FLAGS]);
|
|
|
|
wiphy_info_probe_resp_offload(capa,
|
|
|
|
tb[NL80211_ATTR_PROBE_RESP_OFFLOAD]);
|
2011-12-10 09:50:00 -05:00
|
|
|
|
2013-03-31 14:51:44 -04:00
|
|
|
if (tb[NL80211_ATTR_EXT_CAPA] && tb[NL80211_ATTR_EXT_CAPA_MASK] &&
|
|
|
|
drv->extended_capa == NULL) {
|
|
|
|
drv->extended_capa =
|
|
|
|
os_malloc(nla_len(tb[NL80211_ATTR_EXT_CAPA]));
|
|
|
|
if (drv->extended_capa) {
|
|
|
|
os_memcpy(drv->extended_capa,
|
|
|
|
nla_data(tb[NL80211_ATTR_EXT_CAPA]),
|
|
|
|
nla_len(tb[NL80211_ATTR_EXT_CAPA]));
|
|
|
|
drv->extended_capa_len =
|
|
|
|
nla_len(tb[NL80211_ATTR_EXT_CAPA]);
|
|
|
|
}
|
|
|
|
drv->extended_capa_mask =
|
|
|
|
os_malloc(nla_len(tb[NL80211_ATTR_EXT_CAPA]));
|
|
|
|
if (drv->extended_capa_mask) {
|
|
|
|
os_memcpy(drv->extended_capa_mask,
|
|
|
|
nla_data(tb[NL80211_ATTR_EXT_CAPA]),
|
|
|
|
nla_len(tb[NL80211_ATTR_EXT_CAPA]));
|
|
|
|
} else {
|
|
|
|
os_free(drv->extended_capa);
|
|
|
|
drv->extended_capa = NULL;
|
|
|
|
drv->extended_capa_len = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-01 16:30:23 -05:00
|
|
|
if (tb[NL80211_ATTR_VENDOR_DATA]) {
|
|
|
|
struct nlattr *nl;
|
|
|
|
int rem;
|
|
|
|
|
|
|
|
nla_for_each_nested(nl, tb[NL80211_ATTR_VENDOR_DATA], rem) {
|
|
|
|
struct nl80211_vendor_cmd_info *vinfo;
|
2014-01-22 09:05:47 -05:00
|
|
|
if (nla_len(nl) != sizeof(*vinfo)) {
|
2014-01-01 16:30:23 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Unexpected vendor data info");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
vinfo = nla_data(nl);
|
2014-09-11 08:54:57 -04:00
|
|
|
switch (vinfo->subcmd) {
|
|
|
|
case QCA_NL80211_VENDOR_SUBCMD_ROAMING:
|
|
|
|
drv->roaming_vendor_cmd_avail = 1;
|
|
|
|
break;
|
|
|
|
case QCA_NL80211_VENDOR_SUBCMD_DFS_CAPABILITY:
|
2014-03-22 15:20:32 -04:00
|
|
|
drv->dfs_vendor_cmd_avail = 1;
|
2014-09-11 08:54:57 -04:00
|
|
|
break;
|
2014-10-23 11:21:49 -04:00
|
|
|
case QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_SET_KEY:
|
|
|
|
drv->key_mgmt_set_key_vendor_cmd_avail = 1;
|
|
|
|
break;
|
2014-09-11 08:54:57 -04:00
|
|
|
}
|
2014-03-22 15:20:32 -04:00
|
|
|
|
2014-01-01 16:30:23 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Supported vendor command: vendor_id=0x%x subcmd=%u",
|
|
|
|
vinfo->vendor_id, vinfo->subcmd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_VENDOR_EVENTS]) {
|
|
|
|
struct nlattr *nl;
|
|
|
|
int rem;
|
|
|
|
|
|
|
|
nla_for_each_nested(nl, tb[NL80211_ATTR_VENDOR_EVENTS], rem) {
|
|
|
|
struct nl80211_vendor_cmd_info *vinfo;
|
2014-01-22 09:05:47 -05:00
|
|
|
if (nla_len(nl) != sizeof(*vinfo)) {
|
2014-01-01 16:30:23 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Unexpected vendor data info");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
vinfo = nla_data(nl);
|
2014-10-23 11:21:49 -04:00
|
|
|
if (vinfo->subcmd ==
|
|
|
|
QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_ROAM_AUTH)
|
|
|
|
drv->roam_auth_vendor_event_avail = 1;
|
2014-01-01 16:30:23 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Supported vendor event: vendor_id=0x%x subcmd=%u",
|
|
|
|
vinfo->vendor_id, vinfo->subcmd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-24 01:45:39 -04:00
|
|
|
wiphy_info_wowlan_triggers(capa,
|
|
|
|
tb[NL80211_ATTR_WOWLAN_TRIGGERS_SUPPORTED]);
|
|
|
|
|
2014-05-05 05:21:37 -04:00
|
|
|
if (tb[NL80211_ATTR_MAX_AP_ASSOC_STA])
|
|
|
|
capa->max_stations =
|
|
|
|
nla_get_u32(tb[NL80211_ATTR_MAX_AP_ASSOC_STA]);
|
|
|
|
|
2009-02-12 14:49:57 -05:00
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_get_info(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wiphy_info_data *info)
|
|
|
|
{
|
2013-03-10 07:22:43 -04:00
|
|
|
u32 feat;
|
2009-02-12 14:49:57 -05:00
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
os_memset(info, 0, sizeof(*info));
|
2011-10-20 14:57:32 -04:00
|
|
|
info->capa = &drv->capa;
|
2013-03-31 14:51:44 -04:00
|
|
|
info->drv = drv;
|
2011-02-01 11:18:32 -05:00
|
|
|
|
2009-02-12 14:49:57 -05:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2013-03-10 07:22:43 -04:00
|
|
|
feat = get_nl80211_protocol_features(drv);
|
|
|
|
if (feat & NL80211_PROTOCOL_FEATURE_SPLIT_WIPHY_DUMP)
|
|
|
|
nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_WIPHY);
|
|
|
|
else
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_WIPHY);
|
2009-02-12 14:49:57 -05:00
|
|
|
|
2013-03-10 07:22:43 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_SPLIT_WIPHY_DUMP);
|
2013-10-29 20:41:39 -04:00
|
|
|
if (nl80211_set_iface_id(msg, drv->first_bss) < 0)
|
2013-06-25 06:44:54 -04:00
|
|
|
goto nla_put_failure;
|
2009-02-12 14:49:57 -05:00
|
|
|
|
2013-03-10 07:22:43 -04:00
|
|
|
if (send_and_recv_msgs(drv, msg, wiphy_info_handler, info))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (info->auth_supported)
|
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_SME;
|
|
|
|
else if (!info->connect_supported) {
|
|
|
|
wpa_printf(MSG_INFO, "nl80211: Driver does not support "
|
|
|
|
"authentication/association or connect commands");
|
|
|
|
info->error = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info->p2p_go_supported && info->p2p_client_supported)
|
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_CAPABLE;
|
|
|
|
if (info->p2p_concurrent) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group "
|
|
|
|
"interface (driver advertised support)");
|
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT;
|
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_MGMT_AND_NON_P2P;
|
|
|
|
}
|
2013-07-21 12:49:47 -04:00
|
|
|
if (info->num_multichan_concurrent > 1) {
|
2013-03-10 07:22:43 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Enable multi-channel "
|
|
|
|
"concurrent (driver advertised support)");
|
2013-07-21 12:49:47 -04:00
|
|
|
drv->capa.num_multichan_concurrent =
|
|
|
|
info->num_multichan_concurrent;
|
2013-03-10 07:22:43 -04:00
|
|
|
}
|
2014-10-20 06:00:08 -04:00
|
|
|
if (drv->capa.flags & WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: use P2P_DEVICE support");
|
2013-05-04 04:28:54 -04:00
|
|
|
|
|
|
|
/* default to 5000 since early versions of mac80211 don't set it */
|
|
|
|
if (!drv->capa.max_remain_on_chan)
|
|
|
|
drv->capa.max_remain_on_chan = 5000;
|
|
|
|
|
2014-01-01 08:32:09 -05:00
|
|
|
if (info->channel_switch_supported)
|
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_AP_CSA;
|
|
|
|
|
2013-03-10 07:22:43 -04:00
|
|
|
return 0;
|
2009-02-12 14:49:57 -05:00
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-09-03 13:36:09 -04:00
|
|
|
static int wpa_driver_nl80211_capa(struct wpa_driver_nl80211_data *drv)
|
2009-02-12 14:49:57 -05:00
|
|
|
{
|
|
|
|
struct wiphy_info_data info;
|
|
|
|
if (wpa_driver_nl80211_get_info(drv, &info))
|
2009-09-03 13:36:09 -04:00
|
|
|
return -1;
|
2011-10-20 14:57:32 -04:00
|
|
|
|
|
|
|
if (info.error)
|
|
|
|
return -1;
|
|
|
|
|
2009-02-12 14:49:57 -05:00
|
|
|
drv->has_capability = 1;
|
2009-03-31 07:25:15 -04:00
|
|
|
drv->capa.key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |
|
|
|
|
WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
|
|
|
|
WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
|
|
|
|
WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK;
|
2010-01-01 14:41:19 -05:00
|
|
|
drv->capa.auth = WPA_DRIVER_AUTH_OPEN |
|
|
|
|
WPA_DRIVER_AUTH_SHARED |
|
|
|
|
WPA_DRIVER_AUTH_LEAP;
|
2009-03-31 07:25:15 -04:00
|
|
|
|
2010-11-26 10:41:21 -05:00
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_SANE_ERROR_CODES;
|
2009-09-15 03:48:30 -04:00
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_SET_KEYS_AFTER_ASSOC_DONE;
|
2011-03-29 10:36:06 -04:00
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_EAPOL_TX_STATUS;
|
2012-03-14 20:06:06 -04:00
|
|
|
|
2014-03-05 07:55:29 -05:00
|
|
|
/*
|
|
|
|
* As all cfg80211 drivers must support cases where the AP interface is
|
|
|
|
* removed without the knowledge of wpa_supplicant/hostapd, e.g., in
|
|
|
|
* case that the user space daemon has crashed, they must be able to
|
|
|
|
* cleanup all stations and key entries in the AP tear down flow. Thus,
|
|
|
|
* this flag can/should always be set for cfg80211 drivers.
|
|
|
|
*/
|
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_AP_TEARDOWN_SUPPORT;
|
|
|
|
|
2012-08-01 03:34:35 -04:00
|
|
|
if (!info.device_ap_sme) {
|
2012-03-14 20:06:06 -04:00
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_DEAUTH_TX_STATUS;
|
2009-09-15 03:48:30 -04:00
|
|
|
|
2012-08-01 03:34:35 -04:00
|
|
|
/*
|
|
|
|
* No AP SME is currently assumed to also indicate no AP MLME
|
|
|
|
* in the driver/firmware.
|
|
|
|
*/
|
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_AP_MLME;
|
|
|
|
}
|
|
|
|
|
2011-11-19 06:42:49 -05:00
|
|
|
drv->device_ap_sme = info.device_ap_sme;
|
2011-11-19 07:23:46 -05:00
|
|
|
drv->poll_command_supported = info.poll_command_supported;
|
2011-12-03 12:32:23 -05:00
|
|
|
drv->data_tx_status = info.data_tx_status;
|
2013-12-23 04:05:20 -05:00
|
|
|
if (info.set_qos_map_supported)
|
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_QOS_MAPPING;
|
2014-06-04 05:21:40 -04:00
|
|
|
drv->have_low_prio_scan = info.have_low_prio_scan;
|
2011-11-19 06:42:49 -05:00
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
/*
|
2012-09-23 06:28:31 -04:00
|
|
|
* If poll command and tx status are supported, mac80211 is new enough
|
|
|
|
* to have everything we need to not need monitor interfaces.
|
2011-12-06 11:24:00 -05:00
|
|
|
*/
|
2012-09-23 06:28:31 -04:00
|
|
|
drv->use_monitor = !info.poll_command_supported || !info.data_tx_status;
|
2011-12-06 11:24:00 -05:00
|
|
|
|
2011-12-23 11:13:01 -05:00
|
|
|
if (drv->device_ap_sme && drv->use_monitor) {
|
|
|
|
/*
|
|
|
|
* Non-mac80211 drivers may not support monitor interface.
|
|
|
|
* Make sure we do not get stuck with incorrect capability here
|
|
|
|
* by explicitly testing this.
|
|
|
|
*/
|
|
|
|
if (!info.monitor_supported) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Disable use_monitor "
|
|
|
|
"with device_ap_sme since no monitor mode "
|
|
|
|
"support detected");
|
|
|
|
drv->use_monitor = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
/*
|
|
|
|
* If we aren't going to use monitor interfaces, but the
|
|
|
|
* driver doesn't support data TX status, we won't get TX
|
|
|
|
* status for EAPOL frames.
|
|
|
|
*/
|
|
|
|
if (!drv->use_monitor && !info.data_tx_status)
|
|
|
|
drv->capa.flags &= ~WPA_DRIVER_FLAGS_EAPOL_TX_STATUS;
|
|
|
|
|
2009-09-03 13:36:09 -04:00
|
|
|
return 0;
|
2009-02-12 14:49:57 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-10-22 11:42:42 -04:00
|
|
|
static int wpa_driver_nl80211_init_nl_global(struct nl80211_global *global)
|
|
|
|
{
|
2011-12-06 12:30:43 -05:00
|
|
|
int ret;
|
|
|
|
|
2011-10-22 11:42:42 -04:00
|
|
|
global->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
|
|
|
|
if (global->nl_cb == NULL) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
|
|
|
|
"callbacks");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
global->nl = nl_create_handle(global->nl_cb, "nl");
|
|
|
|
if (global->nl == NULL)
|
2011-12-06 12:30:43 -05:00
|
|
|
goto err;
|
2011-10-22 12:00:27 -04:00
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
global->nl80211_id = genl_ctrl_resolve(global->nl, "nl80211");
|
2011-11-16 09:42:49 -05:00
|
|
|
if (global->nl80211_id < 0) {
|
2011-10-22 12:00:27 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: 'nl80211' generic netlink not "
|
|
|
|
"found");
|
2011-12-06 12:30:43 -05:00
|
|
|
goto err;
|
2011-10-22 12:00:27 -04:00
|
|
|
}
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
global->nl_event = nl_create_handle(global->nl_cb, "event");
|
|
|
|
if (global->nl_event == NULL)
|
2011-12-06 12:30:43 -05:00
|
|
|
goto err;
|
2009-04-14 08:52:05 -04:00
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
ret = nl_get_multicast_id(global, "nl80211", "scan");
|
2009-02-12 13:11:43 -05:00
|
|
|
if (ret >= 0)
|
2011-12-06 12:47:59 -05:00
|
|
|
ret = nl_socket_add_membership(global->nl_event, ret);
|
2009-02-12 13:11:43 -05:00
|
|
|
if (ret < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
|
|
|
|
"membership for scan events: %d (%s)",
|
|
|
|
ret, strerror(-ret));
|
2011-12-06 12:30:43 -05:00
|
|
|
goto err;
|
2009-02-12 13:11:43 -05:00
|
|
|
}
|
2009-03-20 16:26:41 -04:00
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
ret = nl_get_multicast_id(global, "nl80211", "mlme");
|
2009-03-20 16:26:41 -04:00
|
|
|
if (ret >= 0)
|
2011-12-06 12:47:59 -05:00
|
|
|
ret = nl_socket_add_membership(global->nl_event, ret);
|
2009-03-20 16:26:41 -04:00
|
|
|
if (ret < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
|
|
|
|
"membership for mlme events: %d (%s)",
|
|
|
|
ret, strerror(-ret));
|
2011-12-06 12:30:43 -05:00
|
|
|
goto err;
|
2009-03-20 16:26:41 -04:00
|
|
|
}
|
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
ret = nl_get_multicast_id(global, "nl80211", "regulatory");
|
2010-10-15 11:56:36 -04:00
|
|
|
if (ret >= 0)
|
2011-12-06 12:47:59 -05:00
|
|
|
ret = nl_socket_add_membership(global->nl_event, ret);
|
2010-10-15 11:56:36 -04:00
|
|
|
if (ret < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
|
|
|
|
"membership for regulatory events: %d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
/* Continue without regulatory events */
|
|
|
|
}
|
|
|
|
|
2014-01-01 16:30:23 -05:00
|
|
|
ret = nl_get_multicast_id(global, "nl80211", "vendor");
|
|
|
|
if (ret >= 0)
|
|
|
|
ret = nl_socket_add_membership(global->nl_event, ret);
|
|
|
|
if (ret < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
|
|
|
|
"membership for vendor events: %d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
/* Continue without vendor events */
|
|
|
|
}
|
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
nl_cb_set(global->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
|
|
|
|
no_seq_check, NULL);
|
|
|
|
nl_cb_set(global->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
|
|
|
|
process_global_event, global);
|
|
|
|
|
2013-10-26 09:06:49 -04:00
|
|
|
nl80211_register_eloop_read(&global->nl_event,
|
|
|
|
wpa_driver_nl80211_event_receive,
|
|
|
|
global->nl_cb);
|
2011-12-06 12:30:43 -05:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
err:
|
|
|
|
nl_destroy_handles(&global->nl_event);
|
|
|
|
nl_destroy_handles(&global->nl);
|
|
|
|
nl_cb_put(global->nl_cb);
|
2011-12-11 11:51:55 -05:00
|
|
|
global->nl_cb = NULL;
|
2011-12-06 12:30:43 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_init_nl(struct wpa_driver_nl80211_data *drv)
|
|
|
|
{
|
2011-12-03 13:00:11 -05:00
|
|
|
drv->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
|
|
|
|
if (!drv->nl_cb) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to alloc cb struct");
|
2011-12-06 12:30:43 -05:00
|
|
|
return -1;
|
2011-12-03 13:00:11 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
nl_cb_set(drv->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
|
|
|
|
no_seq_check, NULL);
|
2011-12-03 13:10:44 -05:00
|
|
|
nl_cb_set(drv->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
|
|
|
|
process_drv_event, drv);
|
2011-12-03 13:00:11 -05:00
|
|
|
|
2009-04-14 08:52:05 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-05-23 03:27:32 -04:00
|
|
|
static void wpa_driver_nl80211_rfkill_blocked(void *ctx)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: RFKILL blocked");
|
2010-05-31 11:00:27 -04:00
|
|
|
/*
|
|
|
|
* This may be for any interface; use ifdown event to disable
|
|
|
|
* interface.
|
|
|
|
*/
|
2010-05-23 03:27:32 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpa_driver_nl80211_rfkill_unblocked(void *ctx)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = ctx;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: RFKILL unblocked");
|
2013-10-29 20:41:39 -04:00
|
|
|
if (i802_set_iface_flags(drv->first_bss, 1)) {
|
2010-05-23 03:27:32 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Could not set interface UP "
|
|
|
|
"after rfkill unblock");
|
|
|
|
return;
|
|
|
|
}
|
2010-05-31 11:00:27 -04:00
|
|
|
/* rtnetlink ifup handler will report interface as enabled */
|
2010-05-23 03:27:32 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-03 12:32:23 -05:00
|
|
|
static void wpa_driver_nl80211_handle_eapol_tx_status(int sock,
|
|
|
|
void *eloop_ctx,
|
|
|
|
void *handle)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = eloop_ctx;
|
|
|
|
u8 data[2048];
|
|
|
|
struct msghdr msg;
|
|
|
|
struct iovec entry;
|
2012-06-23 13:37:09 -04:00
|
|
|
u8 control[512];
|
2011-12-03 12:32:23 -05:00
|
|
|
struct cmsghdr *cmsg;
|
|
|
|
int res, found_ee = 0, found_wifi = 0, acked = 0;
|
|
|
|
union wpa_event_data event;
|
|
|
|
|
|
|
|
memset(&msg, 0, sizeof(msg));
|
|
|
|
msg.msg_iov = &entry;
|
|
|
|
msg.msg_iovlen = 1;
|
|
|
|
entry.iov_base = data;
|
|
|
|
entry.iov_len = sizeof(data);
|
|
|
|
msg.msg_control = &control;
|
|
|
|
msg.msg_controllen = sizeof(control);
|
|
|
|
|
|
|
|
res = recvmsg(sock, &msg, MSG_ERRQUEUE);
|
|
|
|
/* if error or not fitting 802.3 header, return */
|
|
|
|
if (res < 14)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg))
|
|
|
|
{
|
|
|
|
if (cmsg->cmsg_level == SOL_SOCKET &&
|
|
|
|
cmsg->cmsg_type == SCM_WIFI_STATUS) {
|
|
|
|
int *ack;
|
|
|
|
|
|
|
|
found_wifi = 1;
|
|
|
|
ack = (void *)CMSG_DATA(cmsg);
|
|
|
|
acked = *ack;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cmsg->cmsg_level == SOL_PACKET &&
|
|
|
|
cmsg->cmsg_type == PACKET_TX_TIMESTAMP) {
|
|
|
|
struct sock_extended_err *err =
|
|
|
|
(struct sock_extended_err *)CMSG_DATA(cmsg);
|
|
|
|
|
|
|
|
if (err->ee_origin == SO_EE_ORIGIN_TXSTATUS)
|
|
|
|
found_ee = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!found_ee || !found_wifi)
|
|
|
|
return;
|
|
|
|
|
|
|
|
memset(&event, 0, sizeof(event));
|
|
|
|
event.eapol_tx_status.dst = data;
|
|
|
|
event.eapol_tx_status.data = data + 14;
|
|
|
|
event.eapol_tx_status.data_len = res - 14;
|
|
|
|
event.eapol_tx_status.ack = acked;
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_EAPOL_TX_STATUS, &event);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-03 13:14:53 -05:00
|
|
|
static int nl80211_init_bss(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
bss->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
|
|
|
|
if (!bss->nl_cb)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
nl_cb_set(bss->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
|
|
|
|
no_seq_check, NULL);
|
|
|
|
nl_cb_set(bss->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
|
|
|
|
process_bss_event, bss);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void nl80211_destroy_bss(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
nl_cb_put(bss->nl_cb);
|
|
|
|
bss->nl_cb = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-11-09 09:18:39 -05:00
|
|
|
static void * wpa_driver_nl80211_drv_init(void *ctx, const char *ifname,
|
|
|
|
void *global_priv, int hostapd,
|
|
|
|
const u8 *set_addr)
|
2009-04-14 08:52:05 -04:00
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv;
|
2010-05-23 03:27:32 -04:00
|
|
|
struct rfkill_config *rcfg;
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss;
|
2009-04-14 08:52:05 -04:00
|
|
|
|
2011-11-13 15:39:57 -05:00
|
|
|
if (global_priv == NULL)
|
|
|
|
return NULL;
|
2009-04-14 08:52:05 -04:00
|
|
|
drv = os_zalloc(sizeof(*drv));
|
|
|
|
if (drv == NULL)
|
|
|
|
return NULL;
|
2010-11-26 11:14:51 -05:00
|
|
|
drv->global = global_priv;
|
2009-04-14 08:52:05 -04:00
|
|
|
drv->ctx = ctx;
|
2013-11-09 09:18:39 -05:00
|
|
|
drv->hostapd = !!hostapd;
|
|
|
|
drv->eapol_sock = -1;
|
|
|
|
drv->num_if_indices = sizeof(drv->default_if_indices) / sizeof(int);
|
|
|
|
drv->if_indices = drv->default_if_indices;
|
2013-10-29 20:41:39 -04:00
|
|
|
|
|
|
|
drv->first_bss = os_zalloc(sizeof(*drv->first_bss));
|
|
|
|
if (!drv->first_bss) {
|
|
|
|
os_free(drv);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
bss = drv->first_bss;
|
2010-03-06 15:22:56 -05:00
|
|
|
bss->drv = drv;
|
2012-12-22 09:19:52 -05:00
|
|
|
bss->ctx = ctx;
|
|
|
|
|
2010-03-06 15:22:56 -05:00
|
|
|
os_strlcpy(bss->ifname, ifname, sizeof(bss->ifname));
|
2009-04-14 08:52:05 -04:00
|
|
|
drv->monitor_ifidx = -1;
|
|
|
|
drv->monitor_sock = -1;
|
2011-11-19 07:00:53 -05:00
|
|
|
drv->eapol_tx_sock = -1;
|
2011-07-17 13:22:11 -04:00
|
|
|
drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
|
2009-04-14 08:52:05 -04:00
|
|
|
|
2010-08-11 05:55:51 -04:00
|
|
|
if (wpa_driver_nl80211_init_nl(drv)) {
|
2009-04-16 10:16:41 -04:00
|
|
|
os_free(drv);
|
|
|
|
return NULL;
|
|
|
|
}
|
2009-04-14 08:52:05 -04:00
|
|
|
|
2011-12-03 13:14:53 -05:00
|
|
|
if (nl80211_init_bss(bss))
|
|
|
|
goto failed;
|
|
|
|
|
2010-05-23 03:27:32 -04:00
|
|
|
rcfg = os_zalloc(sizeof(*rcfg));
|
|
|
|
if (rcfg == NULL)
|
|
|
|
goto failed;
|
|
|
|
rcfg->ctx = drv;
|
|
|
|
os_strlcpy(rcfg->ifname, ifname, sizeof(rcfg->ifname));
|
|
|
|
rcfg->blocked_cb = wpa_driver_nl80211_rfkill_blocked;
|
|
|
|
rcfg->unblocked_cb = wpa_driver_nl80211_rfkill_unblocked;
|
|
|
|
drv->rfkill = rfkill_init(rcfg);
|
2010-05-25 05:06:25 -04:00
|
|
|
if (drv->rfkill == NULL) {
|
2010-05-23 03:27:32 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: RFKILL status not available");
|
2010-05-25 05:06:25 -04:00
|
|
|
os_free(rcfg);
|
|
|
|
}
|
2010-05-23 03:27:32 -04:00
|
|
|
|
2013-11-09 10:33:23 -05:00
|
|
|
if (linux_iface_up(drv->global->ioctl_sock, ifname) > 0)
|
|
|
|
drv->start_iface_up = 1;
|
|
|
|
|
2013-11-09 10:29:32 -05:00
|
|
|
if (wpa_driver_nl80211_finish_drv_init(drv, set_addr, 1))
|
2009-04-16 10:16:41 -04:00
|
|
|
goto failed;
|
2008-08-15 10:55:16 -04:00
|
|
|
|
2011-11-19 07:00:53 -05:00
|
|
|
drv->eapol_tx_sock = socket(PF_PACKET, SOCK_DGRAM, 0);
|
2011-12-03 12:32:23 -05:00
|
|
|
if (drv->eapol_tx_sock < 0)
|
|
|
|
goto failed;
|
|
|
|
|
|
|
|
if (drv->data_tx_status) {
|
|
|
|
int enabled = 1;
|
|
|
|
|
|
|
|
if (setsockopt(drv->eapol_tx_sock, SOL_SOCKET, SO_WIFI_STATUS,
|
|
|
|
&enabled, sizeof(enabled)) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: wifi status sockopt failed\n");
|
|
|
|
drv->data_tx_status = 0;
|
2011-12-06 11:24:00 -05:00
|
|
|
if (!drv->use_monitor)
|
|
|
|
drv->capa.flags &=
|
|
|
|
~WPA_DRIVER_FLAGS_EAPOL_TX_STATUS;
|
2011-12-03 12:32:23 -05:00
|
|
|
} else {
|
|
|
|
eloop_register_read_sock(drv->eapol_tx_sock,
|
|
|
|
wpa_driver_nl80211_handle_eapol_tx_status,
|
|
|
|
drv, NULL);
|
|
|
|
}
|
|
|
|
}
|
2011-08-09 07:04:53 -04:00
|
|
|
|
2011-10-22 11:28:06 -04:00
|
|
|
if (drv->global) {
|
2011-03-22 09:52:04 -04:00
|
|
|
dl_list_add(&drv->global->interfaces, &drv->list);
|
2011-10-22 11:28:06 -04:00
|
|
|
drv->in_interface_list = 1;
|
|
|
|
}
|
2011-03-22 09:52:04 -04:00
|
|
|
|
2010-03-06 15:22:56 -05:00
|
|
|
return bss;
|
2008-08-15 10:55:16 -04:00
|
|
|
|
2009-04-16 10:16:41 -04:00
|
|
|
failed:
|
2011-10-22 11:28:06 -04:00
|
|
|
wpa_driver_nl80211_deinit(bss);
|
2008-08-15 10:55:16 -04:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-11-09 09:18:39 -05:00
|
|
|
/**
|
|
|
|
* wpa_driver_nl80211_init - Initialize nl80211 driver interface
|
|
|
|
* @ctx: context to be used when calling wpa_supplicant functions,
|
|
|
|
* e.g., wpa_supplicant_event()
|
|
|
|
* @ifname: interface name, e.g., wlan0
|
|
|
|
* @global_priv: private driver global data from global_init()
|
|
|
|
* Returns: Pointer to private data, %NULL on failure
|
|
|
|
*/
|
|
|
|
static void * wpa_driver_nl80211_init(void *ctx, const char *ifname,
|
|
|
|
void *global_priv)
|
|
|
|
{
|
|
|
|
return wpa_driver_nl80211_drv_init(ctx, ifname, global_priv, 0, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
static int nl80211_register_frame(struct i802_bss *bss,
|
2010-10-10 11:10:37 -04:00
|
|
|
struct nl_handle *nl_handle,
|
2010-10-10 10:55:18 -04:00
|
|
|
u16 type, const u8 *match, size_t match_len)
|
2010-02-16 12:41:49 -05:00
|
|
|
{
|
2011-12-06 11:24:00 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2010-02-16 12:41:49 -05:00
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = -1;
|
2013-12-30 08:50:09 -05:00
|
|
|
char buf[30];
|
2010-02-16 12:41:49 -05:00
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2013-12-30 08:50:09 -05:00
|
|
|
buf[0] = '\0';
|
|
|
|
wpa_snprintf_hex(buf, sizeof(buf), match, match_len);
|
2014-06-03 04:24:53 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Register frame type=0x%x (%s) nl_handle=%p match=%s",
|
|
|
|
type, fc2str(type), nl_handle, buf);
|
2011-12-23 11:10:59 -05:00
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_REGISTER_ACTION);
|
2010-02-16 12:41:49 -05:00
|
|
|
|
2013-06-25 06:44:54 -04:00
|
|
|
if (nl80211_set_iface_id(msg, bss) < 0)
|
2013-06-25 06:33:45 -04:00
|
|
|
goto nla_put_failure;
|
|
|
|
|
2010-10-10 10:55:18 -04:00
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_FRAME_TYPE, type);
|
2010-02-16 12:41:49 -05:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_FRAME_MATCH, match_len, match);
|
|
|
|
|
2011-12-06 12:30:43 -05:00
|
|
|
ret = send_and_recv(drv->global, nl_handle, msg, NULL, NULL);
|
2010-02-16 12:41:49 -05:00
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
2010-10-10 11:10:37 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Register frame command "
|
|
|
|
"failed (type=%u): ret=%d (%s)",
|
|
|
|
type, ret, strerror(-ret));
|
|
|
|
wpa_hexdump(MSG_DEBUG, "nl80211: Register frame match",
|
2010-02-16 12:41:49 -05:00
|
|
|
match, match_len);
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
static int nl80211_alloc_mgmt_handle(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
if (bss->nl_mgmt) {
|
2011-12-06 11:24:00 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Mgmt reporting "
|
2011-12-23 11:10:59 -05:00
|
|
|
"already on! (nl_mgmt=%p)", bss->nl_mgmt);
|
2011-12-06 11:24:00 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
bss->nl_mgmt = nl_create_handle(drv->nl_cb, "mgmt");
|
|
|
|
if (bss->nl_mgmt == NULL)
|
2011-12-06 11:24:00 -05:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-26 09:06:49 -04:00
|
|
|
static void nl80211_mgmt_handle_register_eloop(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
nl80211_register_eloop_read(&bss->nl_mgmt,
|
|
|
|
wpa_driver_nl80211_event_receive,
|
|
|
|
bss->nl_cb);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
static int nl80211_register_action_frame(struct i802_bss *bss,
|
2010-10-10 10:55:18 -04:00
|
|
|
const u8 *match, size_t match_len)
|
|
|
|
{
|
|
|
|
u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_ACTION << 4);
|
2011-12-06 12:47:59 -05:00
|
|
|
return nl80211_register_frame(bss, bss->nl_mgmt,
|
2010-10-10 11:10:37 -04:00
|
|
|
type, match, match_len);
|
2010-10-10 10:55:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
static int nl80211_mgmt_subscribe_non_ap(struct i802_bss *bss)
|
2010-02-16 12:41:49 -05:00
|
|
|
{
|
2011-12-06 11:24:00 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2013-12-31 03:17:53 -05:00
|
|
|
int ret = 0;
|
2011-12-06 11:24:00 -05:00
|
|
|
|
|
|
|
if (nl80211_alloc_mgmt_handle(bss))
|
|
|
|
return -1;
|
2011-12-23 11:10:59 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with non-AP "
|
|
|
|
"handle %p", bss->nl_mgmt);
|
2011-12-06 11:24:00 -05:00
|
|
|
|
2013-10-26 09:00:52 -04:00
|
|
|
if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
|
|
|
|
u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4);
|
|
|
|
|
|
|
|
/* register for any AUTH message */
|
|
|
|
nl80211_register_frame(bss, bss->nl_mgmt, type, NULL, 0);
|
|
|
|
}
|
|
|
|
|
2013-07-24 06:17:56 -04:00
|
|
|
#ifdef CONFIG_INTERWORKING
|
|
|
|
/* QoS Map Configure */
|
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x01\x04", 2) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2013-07-24 06:17:56 -04:00
|
|
|
#endif /* CONFIG_INTERWORKING */
|
2011-09-08 13:52:23 -04:00
|
|
|
#if defined(CONFIG_P2P) || defined(CONFIG_INTERWORKING)
|
2010-07-18 17:30:25 -04:00
|
|
|
/* GAS Initial Request */
|
2011-12-06 11:24:00 -05:00
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0a", 2) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2010-07-18 17:30:25 -04:00
|
|
|
/* GAS Initial Response */
|
2011-12-06 11:24:00 -05:00
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0b", 2) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2010-06-28 12:24:17 -04:00
|
|
|
/* GAS Comeback Request */
|
2011-12-06 11:24:00 -05:00
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0c", 2) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2010-06-28 12:24:17 -04:00
|
|
|
/* GAS Comeback Response */
|
2011-12-06 11:24:00 -05:00
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0d", 2) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2014-01-23 04:18:20 -05:00
|
|
|
/* Protected GAS Initial Request */
|
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0a", 2) < 0)
|
|
|
|
ret = -1;
|
|
|
|
/* Protected GAS Initial Response */
|
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0b", 2) < 0)
|
|
|
|
ret = -1;
|
|
|
|
/* Protected GAS Comeback Request */
|
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0c", 2) < 0)
|
|
|
|
ret = -1;
|
|
|
|
/* Protected GAS Comeback Response */
|
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0d", 2) < 0)
|
|
|
|
ret = -1;
|
2011-09-08 13:52:23 -04:00
|
|
|
#endif /* CONFIG_P2P || CONFIG_INTERWORKING */
|
|
|
|
#ifdef CONFIG_P2P
|
2010-07-18 17:30:25 -04:00
|
|
|
/* P2P Public Action */
|
2011-12-06 11:24:00 -05:00
|
|
|
if (nl80211_register_action_frame(bss,
|
2010-07-18 17:30:25 -04:00
|
|
|
(u8 *) "\x04\x09\x50\x6f\x9a\x09",
|
|
|
|
6) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2010-07-18 17:30:25 -04:00
|
|
|
/* P2P Action */
|
2011-12-06 11:24:00 -05:00
|
|
|
if (nl80211_register_action_frame(bss,
|
2010-07-18 17:30:25 -04:00
|
|
|
(u8 *) "\x7f\x50\x6f\x9a\x09",
|
|
|
|
5) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2010-07-18 17:30:25 -04:00
|
|
|
#endif /* CONFIG_P2P */
|
2010-12-19 04:58:00 -05:00
|
|
|
#ifdef CONFIG_IEEE80211W
|
|
|
|
/* SA Query Response */
|
2011-12-06 11:24:00 -05:00
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x08\x01", 2) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2010-12-19 04:58:00 -05:00
|
|
|
#endif /* CONFIG_IEEE80211W */
|
2011-09-26 06:55:27 -04:00
|
|
|
#ifdef CONFIG_TDLS
|
|
|
|
if ((drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT)) {
|
|
|
|
/* TDLS Discovery Response */
|
2011-12-12 09:32:07 -05:00
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0e", 2) <
|
2011-09-26 06:55:27 -04:00
|
|
|
0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2011-09-26 06:55:27 -04:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_TDLS */
|
2010-07-18 17:30:25 -04:00
|
|
|
|
2010-03-07 15:47:39 -05:00
|
|
|
/* FT Action frames */
|
2011-12-06 11:24:00 -05:00
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x06", 1) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2010-03-07 15:47:39 -05:00
|
|
|
else
|
|
|
|
drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_FT |
|
|
|
|
WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
|
|
|
|
|
2011-10-07 06:33:04 -04:00
|
|
|
/* WNM - BSS Transition Management Request */
|
2011-12-06 11:24:00 -05:00
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x07", 2) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2012-12-16 05:42:26 -05:00
|
|
|
/* WNM-Sleep Mode Response */
|
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x11", 2) < 0)
|
2013-12-31 03:17:53 -05:00
|
|
|
ret = -1;
|
2011-12-06 11:24:00 -05:00
|
|
|
|
2012-11-02 07:05:57 -04:00
|
|
|
#ifdef CONFIG_HS20
|
|
|
|
/* WNM-Notification */
|
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x1a", 2) < 0)
|
2014-08-31 23:20:21 -04:00
|
|
|
ret = -1;
|
2012-11-02 07:05:57 -04:00
|
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
|
2013-10-26 09:06:49 -04:00
|
|
|
nl80211_mgmt_handle_register_eloop(bss);
|
|
|
|
|
2013-12-31 03:17:53 -05:00
|
|
|
return ret;
|
2011-12-06 11:24:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-01 00:23:23 -04:00
|
|
|
static int nl80211_mgmt_subscribe_mesh(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
if (nl80211_alloc_mgmt_handle(bss))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Subscribe to mgmt frames with mesh handle %p",
|
|
|
|
bss->nl_mgmt);
|
|
|
|
|
|
|
|
/* Auth frames for mesh SAE */
|
|
|
|
if (nl80211_register_frame(bss, bss->nl_mgmt,
|
|
|
|
(WLAN_FC_TYPE_MGMT << 2) |
|
|
|
|
(WLAN_FC_STYPE_AUTH << 4),
|
|
|
|
NULL, 0) < 0)
|
|
|
|
ret = -1;
|
|
|
|
|
|
|
|
/* Mesh peering open */
|
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x01", 2) < 0)
|
|
|
|
ret = -1;
|
|
|
|
/* Mesh peering confirm */
|
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x02", 2) < 0)
|
|
|
|
ret = -1;
|
|
|
|
/* Mesh peering close */
|
|
|
|
if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x03", 2) < 0)
|
|
|
|
ret = -1;
|
|
|
|
|
|
|
|
nl80211_mgmt_handle_register_eloop(bss);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:29:45 -05:00
|
|
|
static int nl80211_register_spurious_class3(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_UNEXPECTED_FRAME);
|
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
ret = send_and_recv(drv->global, bss->nl_mgmt, msg, NULL, NULL);
|
2011-12-06 11:29:45 -05:00
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Register spurious class3 "
|
|
|
|
"failed: ret=%d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
static int nl80211_mgmt_subscribe_ap(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
static const int stypes[] = {
|
|
|
|
WLAN_FC_STYPE_AUTH,
|
|
|
|
WLAN_FC_STYPE_ASSOC_REQ,
|
|
|
|
WLAN_FC_STYPE_REASSOC_REQ,
|
|
|
|
WLAN_FC_STYPE_DISASSOC,
|
|
|
|
WLAN_FC_STYPE_DEAUTH,
|
|
|
|
WLAN_FC_STYPE_ACTION,
|
|
|
|
WLAN_FC_STYPE_PROBE_REQ,
|
|
|
|
/* Beacon doesn't work as mac80211 doesn't currently allow
|
|
|
|
* it, but it wouldn't really be the right thing anyway as
|
|
|
|
* it isn't per interface ... maybe just dump the scan
|
|
|
|
* results periodically for OLBC?
|
|
|
|
*/
|
2014-04-14 06:39:18 -04:00
|
|
|
/* WLAN_FC_STYPE_BEACON, */
|
2011-12-06 11:24:00 -05:00
|
|
|
};
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
if (nl80211_alloc_mgmt_handle(bss))
|
2011-10-07 06:33:04 -04:00
|
|
|
return -1;
|
2011-12-23 11:10:59 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
|
|
|
|
"handle %p", bss->nl_mgmt);
|
2011-10-07 06:33:04 -04:00
|
|
|
|
2013-10-26 10:00:57 -04:00
|
|
|
for (i = 0; i < ARRAY_SIZE(stypes); i++) {
|
2011-12-06 12:47:59 -05:00
|
|
|
if (nl80211_register_frame(bss, bss->nl_mgmt,
|
2011-12-06 11:24:00 -05:00
|
|
|
(WLAN_FC_TYPE_MGMT << 2) |
|
|
|
|
(stypes[i] << 4),
|
|
|
|
NULL, 0) < 0) {
|
|
|
|
goto out_err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-12-06 11:29:45 -05:00
|
|
|
if (nl80211_register_spurious_class3(bss))
|
|
|
|
goto out_err;
|
|
|
|
|
2011-12-06 11:39:57 -05:00
|
|
|
if (nl80211_get_wiphy_data_ap(bss) == NULL)
|
|
|
|
goto out_err;
|
|
|
|
|
2013-10-26 09:06:49 -04:00
|
|
|
nl80211_mgmt_handle_register_eloop(bss);
|
2010-02-16 12:41:49 -05:00
|
|
|
return 0;
|
2011-12-06 11:24:00 -05:00
|
|
|
|
|
|
|
out_err:
|
|
|
|
nl_destroy_handles(&bss->nl_mgmt);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-23 11:15:07 -05:00
|
|
|
static int nl80211_mgmt_subscribe_ap_dev_sme(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
if (nl80211_alloc_mgmt_handle(bss))
|
|
|
|
return -1;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
|
|
|
|
"handle %p (device SME)", bss->nl_mgmt);
|
|
|
|
|
|
|
|
if (nl80211_register_frame(bss, bss->nl_mgmt,
|
|
|
|
(WLAN_FC_TYPE_MGMT << 2) |
|
|
|
|
(WLAN_FC_STYPE_ACTION << 4),
|
|
|
|
NULL, 0) < 0)
|
|
|
|
goto out_err;
|
|
|
|
|
2013-10-26 09:06:49 -04:00
|
|
|
nl80211_mgmt_handle_register_eloop(bss);
|
2011-12-23 11:15:07 -05:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_err:
|
|
|
|
nl_destroy_handles(&bss->nl_mgmt);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-23 11:10:59 -05:00
|
|
|
static void nl80211_mgmt_unsubscribe(struct i802_bss *bss, const char *reason)
|
2011-12-06 11:24:00 -05:00
|
|
|
{
|
2011-12-06 12:47:59 -05:00
|
|
|
if (bss->nl_mgmt == NULL)
|
2011-12-06 11:24:00 -05:00
|
|
|
return;
|
2011-12-23 11:10:59 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Unsubscribe mgmt frames handle %p "
|
|
|
|
"(%s)", bss->nl_mgmt, reason);
|
2013-10-26 09:06:49 -04:00
|
|
|
nl80211_destroy_eloop_handle(&bss->nl_mgmt);
|
2011-12-06 11:39:57 -05:00
|
|
|
|
|
|
|
nl80211_put_wiphy_data_ap(bss);
|
2010-02-16 12:41:49 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-05-23 03:27:32 -04:00
|
|
|
static void wpa_driver_nl80211_send_rfkill(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
wpa_supplicant_event(timeout_ctx, EVENT_INTERFACE_DISABLED, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-25 06:46:34 -04:00
|
|
|
static void nl80211_del_p2pdev(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_INTERFACE);
|
|
|
|
NLA_PUT_U64(msg, NL80211_ATTR_WDEV, bss->wdev_id);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Delete P2P Device %s (0x%llx): %s",
|
|
|
|
bss->ifname, (long long unsigned int) bss->wdev_id,
|
2013-10-26 04:53:02 -04:00
|
|
|
strerror(-ret));
|
2013-06-25 06:46:34 -04:00
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_set_p2pdev(struct i802_bss *bss, int start)
|
2013-06-25 06:44:54 -04:00
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2013-06-25 06:46:34 -04:00
|
|
|
if (start)
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_START_P2P_DEVICE);
|
|
|
|
else
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_STOP_P2P_DEVICE);
|
|
|
|
|
2013-06-25 06:44:54 -04:00
|
|
|
NLA_PUT_U64(msg, NL80211_ATTR_WDEV, bss->wdev_id);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
|
2013-06-25 06:46:34 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: %s P2P Device %s (0x%llx): %s",
|
|
|
|
start ? "Start" : "Stop",
|
|
|
|
bss->ifname, (long long unsigned int) bss->wdev_id,
|
2013-10-26 04:53:02 -04:00
|
|
|
strerror(-ret));
|
2013-06-25 06:46:34 -04:00
|
|
|
|
2013-06-25 06:44:54 -04:00
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-25 06:48:03 -04:00
|
|
|
static int i802_set_iface_flags(struct i802_bss *bss, int up)
|
|
|
|
{
|
|
|
|
enum nl80211_iftype nlmode;
|
|
|
|
|
|
|
|
nlmode = nl80211_get_ifmode(bss);
|
|
|
|
if (nlmode != NL80211_IFTYPE_P2P_DEVICE) {
|
|
|
|
return linux_set_iface_flags(bss->drv->global->ioctl_sock,
|
|
|
|
bss->ifname, up);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* P2P Device has start/stop which is equivalent */
|
|
|
|
return nl80211_set_p2pdev(bss, up);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-02-14 09:43:43 -05:00
|
|
|
static int
|
2013-11-09 09:18:39 -05:00
|
|
|
wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
|
2013-11-09 10:29:32 -05:00
|
|
|
const u8 *set_addr, int first)
|
2008-08-15 10:55:16 -04:00
|
|
|
{
|
2013-10-29 20:41:39 -04:00
|
|
|
struct i802_bss *bss = drv->first_bss;
|
2010-05-23 03:27:32 -04:00
|
|
|
int send_rfkill_event = 0;
|
2013-11-09 09:18:39 -05:00
|
|
|
enum nl80211_iftype nlmode;
|
2010-03-06 15:22:56 -05:00
|
|
|
|
|
|
|
drv->ifindex = if_nametoindex(bss->ifname);
|
2013-06-25 06:44:54 -04:00
|
|
|
bss->ifindex = drv->ifindex;
|
|
|
|
bss->wdev_id = drv->global->if_add_wdevid;
|
|
|
|
bss->wdev_id_set = drv->global->if_add_wdevid_set;
|
|
|
|
|
2013-08-25 03:20:54 -04:00
|
|
|
bss->if_dynamic = drv->ifindex == drv->global->if_add_ifindex;
|
|
|
|
bss->if_dynamic = bss->if_dynamic || drv->global->if_add_wdevid_set;
|
2013-06-25 06:44:54 -04:00
|
|
|
drv->global->if_add_wdevid_set = 0;
|
|
|
|
|
2014-08-05 03:19:46 -04:00
|
|
|
if (!bss->if_dynamic && nl80211_get_ifmode(bss) == NL80211_IFTYPE_AP)
|
|
|
|
bss->static_ap = 1;
|
|
|
|
|
2013-06-25 06:44:54 -04:00
|
|
|
if (wpa_driver_nl80211_capa(drv))
|
|
|
|
return -1;
|
2009-03-24 14:50:40 -04:00
|
|
|
|
2013-06-30 03:34:48 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: interface %s in phy %s",
|
|
|
|
bss->ifname, drv->phyname);
|
|
|
|
|
2013-11-09 09:18:39 -05:00
|
|
|
if (set_addr &&
|
|
|
|
(linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) ||
|
|
|
|
linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
|
|
|
|
set_addr)))
|
|
|
|
return -1;
|
|
|
|
|
2013-11-09 10:29:32 -05:00
|
|
|
if (first && nl80211_get_ifmode(bss) == NL80211_IFTYPE_AP)
|
|
|
|
drv->start_mode_ap = 1;
|
|
|
|
|
2014-08-05 03:19:46 -04:00
|
|
|
if (drv->hostapd || bss->static_ap)
|
2013-11-09 09:18:39 -05:00
|
|
|
nlmode = NL80211_IFTYPE_AP;
|
|
|
|
else if (bss->if_dynamic)
|
2013-06-25 06:49:16 -04:00
|
|
|
nlmode = nl80211_get_ifmode(bss);
|
2013-11-09 09:18:39 -05:00
|
|
|
else
|
|
|
|
nlmode = NL80211_IFTYPE_STATION;
|
2013-06-25 06:44:54 -04:00
|
|
|
|
2013-06-25 06:49:16 -04:00
|
|
|
if (wpa_driver_nl80211_set_mode(bss, nlmode) < 0) {
|
2013-11-09 09:18:39 -05:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Could not configure driver mode");
|
2013-06-25 06:49:16 -04:00
|
|
|
return -1;
|
2009-03-24 14:50:40 -04:00
|
|
|
}
|
|
|
|
|
2014-03-03 07:53:21 -05:00
|
|
|
if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
|
2013-06-25 06:50:21 -04:00
|
|
|
nl80211_get_macaddr(bss);
|
2013-06-25 06:44:54 -04:00
|
|
|
|
2014-03-03 07:53:21 -05:00
|
|
|
if (!rfkill_is_blocked(drv->rfkill)) {
|
|
|
|
int ret = i802_set_iface_flags(bss, 1);
|
|
|
|
if (ret) {
|
2010-05-23 03:27:32 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Could not set "
|
|
|
|
"interface '%s' UP", bss->ifname);
|
2014-03-03 07:53:21 -05:00
|
|
|
return ret;
|
2010-05-23 03:27:32 -04:00
|
|
|
}
|
2014-03-03 07:53:21 -05:00
|
|
|
if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
|
|
|
|
return ret;
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Could not yet enable "
|
|
|
|
"interface '%s' due to rfkill", bss->ifname);
|
|
|
|
if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
|
|
|
|
return 0;
|
|
|
|
drv->if_disabled = 1;
|
|
|
|
send_rfkill_event = 1;
|
2009-02-14 09:43:43 -05:00
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2013-11-09 09:18:39 -05:00
|
|
|
if (!drv->hostapd)
|
|
|
|
netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
|
|
|
|
1, IF_OPER_DORMANT);
|
2009-02-14 09:43:43 -05:00
|
|
|
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
|
2011-12-10 04:56:31 -05:00
|
|
|
bss->addr))
|
2010-12-17 06:55:13 -05:00
|
|
|
return -1;
|
2014-09-27 12:11:24 -04:00
|
|
|
os_memcpy(drv->perm_addr, bss->addr, ETH_ALEN);
|
2010-11-26 11:14:51 -05:00
|
|
|
|
2010-05-23 03:27:32 -04:00
|
|
|
if (send_rfkill_event) {
|
|
|
|
eloop_register_timeout(0, 0, wpa_driver_nl80211_send_rfkill,
|
|
|
|
drv, drv->ctx);
|
|
|
|
}
|
|
|
|
|
2009-02-14 09:43:43 -05:00
|
|
|
return 0;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-17 09:06:12 -04:00
|
|
|
static int wpa_driver_nl80211_del_beacon(struct wpa_driver_nl80211_data *drv)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2013-10-31 15:56:40 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Remove beacon (ifindex=%d)",
|
|
|
|
drv->ifindex);
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_BEACON);
|
2009-04-17 09:06:12 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-17 09:06:12 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
/**
|
2009-01-03 13:38:42 -05:00
|
|
|
* wpa_driver_nl80211_deinit - Deinitialize nl80211 driver interface
|
2013-02-03 08:46:47 -05:00
|
|
|
* @bss: Pointer to private nl80211 data from wpa_driver_nl80211_init()
|
2008-06-06 09:55:42 -04:00
|
|
|
*
|
|
|
|
* Shut down driver interface and processing of driver events. Free
|
|
|
|
* private data buffer if one was allocated in wpa_driver_nl80211_init().
|
|
|
|
*/
|
2013-02-03 08:46:47 -05:00
|
|
|
static void wpa_driver_nl80211_deinit(struct i802_bss *bss)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2012-04-06 11:58:44 -04:00
|
|
|
bss->in_deinit = 1;
|
2011-12-03 12:32:23 -05:00
|
|
|
if (drv->data_tx_status)
|
|
|
|
eloop_unregister_read_sock(drv->eapol_tx_sock);
|
2011-11-19 07:00:53 -05:00
|
|
|
if (drv->eapol_tx_sock >= 0)
|
|
|
|
close(drv->eapol_tx_sock);
|
2011-08-09 07:04:53 -04:00
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
if (bss->nl_preq)
|
2010-10-10 11:10:37 -04:00
|
|
|
wpa_driver_nl80211_probe_req_report(bss, 0);
|
2011-03-15 07:02:49 -04:00
|
|
|
if (bss->added_if_into_bridge) {
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
|
|
|
|
bss->ifname) < 0)
|
2010-01-16 08:19:58 -05:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: Failed to remove "
|
|
|
|
"interface %s from bridge %s: %s",
|
2011-03-15 07:02:49 -04:00
|
|
|
bss->ifname, bss->brname, strerror(errno));
|
2014-09-09 18:38:03 -04:00
|
|
|
if (drv->rtnl_sk)
|
2014-10-01 02:01:25 -04:00
|
|
|
nl80211_handle_destroy(drv->rtnl_sk);
|
2010-01-16 08:19:58 -05:00
|
|
|
}
|
2011-03-15 07:02:49 -04:00
|
|
|
if (bss->added_bridge) {
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
|
2010-01-16 08:19:58 -05:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: Failed to remove "
|
|
|
|
"bridge %s: %s",
|
2011-03-15 07:02:49 -04:00
|
|
|
bss->brname, strerror(errno));
|
2010-01-16 08:19:58 -05:00
|
|
|
}
|
|
|
|
|
2009-04-17 09:27:38 -04:00
|
|
|
nl80211_remove_monitor_interface(drv);
|
2009-04-17 09:06:12 -04:00
|
|
|
|
2011-07-17 13:22:11 -04:00
|
|
|
if (is_ap_interface(drv->nlmode))
|
2009-04-17 09:06:12 -04:00
|
|
|
wpa_driver_nl80211_del_beacon(drv);
|
2009-04-02 14:59:14 -04:00
|
|
|
|
2009-04-16 10:16:41 -04:00
|
|
|
if (drv->eapol_sock >= 0) {
|
|
|
|
eloop_unregister_read_sock(drv->eapol_sock);
|
|
|
|
close(drv->eapol_sock);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (drv->if_indices != drv->default_if_indices)
|
|
|
|
os_free(drv->if_indices);
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2011-10-29 15:46:58 -04:00
|
|
|
if (drv->disabled_11b_rates)
|
2010-01-16 05:11:19 -05:00
|
|
|
nl80211_disable_11b_rates(drv, drv->ifindex, 0);
|
|
|
|
|
2011-10-20 19:03:25 -04:00
|
|
|
netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, 0,
|
|
|
|
IF_OPER_UP);
|
2014-04-25 20:46:03 -04:00
|
|
|
eloop_cancel_timeout(wpa_driver_nl80211_send_rfkill, drv, drv->ctx);
|
2010-05-23 03:27:32 -04:00
|
|
|
rfkill_deinit(drv->rfkill);
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2009-04-16 10:16:41 -04:00
|
|
|
eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
|
|
|
|
|
2013-11-09 10:33:23 -05:00
|
|
|
if (!drv->start_iface_up)
|
|
|
|
(void) i802_set_iface_flags(bss, 0);
|
2014-09-27 12:11:24 -04:00
|
|
|
|
|
|
|
if (drv->addr_changed) {
|
2014-10-11 11:43:30 -04:00
|
|
|
if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname,
|
|
|
|
0) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Could not set interface down to restore permanent MAC address");
|
|
|
|
}
|
2014-09-27 12:11:24 -04:00
|
|
|
if (linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
|
|
|
|
drv->perm_addr) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Could not restore permanent MAC address");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-25 06:49:16 -04:00
|
|
|
if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE) {
|
2013-11-09 10:29:32 -05:00
|
|
|
if (!drv->hostapd || !drv->start_mode_ap)
|
|
|
|
wpa_driver_nl80211_set_mode(bss,
|
|
|
|
NL80211_IFTYPE_STATION);
|
2013-08-24 16:45:11 -04:00
|
|
|
nl80211_mgmt_unsubscribe(bss, "deinit");
|
2013-06-25 06:49:16 -04:00
|
|
|
} else {
|
|
|
|
nl80211_mgmt_unsubscribe(bss, "deinit");
|
2013-06-25 06:46:34 -04:00
|
|
|
nl80211_del_p2pdev(bss);
|
2013-06-25 06:49:16 -04:00
|
|
|
}
|
2011-12-03 13:00:11 -05:00
|
|
|
nl_cb_put(drv->nl_cb);
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2013-10-29 20:41:39 -04:00
|
|
|
nl80211_destroy_bss(drv->first_bss);
|
2011-12-03 13:14:53 -05:00
|
|
|
|
2010-03-05 14:42:06 -05:00
|
|
|
os_free(drv->filter_ssids);
|
|
|
|
|
2011-12-04 14:53:56 -05:00
|
|
|
os_free(drv->auth_ie);
|
|
|
|
|
2011-10-22 11:28:06 -04:00
|
|
|
if (drv->in_interface_list)
|
2010-11-26 11:14:51 -05:00
|
|
|
dl_list_del(&drv->list);
|
|
|
|
|
2013-03-31 14:51:44 -04:00
|
|
|
os_free(drv->extended_capa);
|
|
|
|
os_free(drv->extended_capa_mask);
|
2013-10-29 20:41:39 -04:00
|
|
|
os_free(drv->first_bss);
|
2008-06-06 09:55:42 -04:00
|
|
|
os_free(drv);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpa_driver_nl80211_scan_timeout - Scan timeout to report scan completion
|
2009-04-16 09:22:40 -04:00
|
|
|
* @eloop_ctx: Driver private data
|
2008-06-06 09:55:42 -04:00
|
|
|
* @timeout_ctx: ctx argument given to wpa_driver_nl80211_init()
|
|
|
|
*
|
|
|
|
* This function can be used as registered timeout when starting a scan to
|
|
|
|
* generate a scan completed event if the driver does not report this.
|
|
|
|
*/
|
2014-10-26 11:20:37 -04:00
|
|
|
void wpa_driver_nl80211_scan_timeout(void *eloop_ctx, void *timeout_ctx)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
2009-04-16 09:22:40 -04:00
|
|
|
struct wpa_driver_nl80211_data *drv = eloop_ctx;
|
2011-07-17 13:22:11 -04:00
|
|
|
if (drv->ap_scan_as_station != NL80211_IFTYPE_UNSPECIFIED) {
|
2013-10-29 20:41:39 -04:00
|
|
|
wpa_driver_nl80211_set_mode(drv->first_bss,
|
2011-07-17 13:22:11 -04:00
|
|
|
drv->ap_scan_as_station);
|
|
|
|
drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
|
2009-04-16 09:22:40 -04:00
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
|
|
|
|
wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-08-07 10:48:52 -04:00
|
|
|
static struct nl_msg *
|
|
|
|
nl80211_scan_common(struct wpa_driver_nl80211_data *drv, u8 cmd,
|
2013-06-25 06:33:45 -04:00
|
|
|
struct wpa_driver_scan_params *params, u64 *wdev_id)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
2012-08-07 10:48:52 -04:00
|
|
|
struct nl_msg *msg;
|
2009-02-14 14:17:46 -05:00
|
|
|
size_t i;
|
2014-06-04 05:21:40 -04:00
|
|
|
u32 scan_flags = 0;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2009-02-12 09:20:22 -05:00
|
|
|
msg = nlmsg_alloc();
|
2012-08-07 10:27:55 -04:00
|
|
|
if (!msg)
|
2012-08-07 10:48:52 -04:00
|
|
|
return NULL;
|
2010-03-05 14:42:06 -05:00
|
|
|
|
2012-08-07 10:48:52 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, cmd);
|
2009-02-12 09:20:22 -05:00
|
|
|
|
2013-06-25 06:33:45 -04:00
|
|
|
if (!wdev_id)
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
else
|
|
|
|
NLA_PUT_U64(msg, NL80211_ATTR_WDEV, *wdev_id);
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2012-08-07 10:27:55 -04:00
|
|
|
if (params->num_ssids) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *ssids;
|
|
|
|
|
|
|
|
ssids = nla_nest_start(msg, NL80211_ATTR_SCAN_SSIDS);
|
2012-08-07 10:27:55 -04:00
|
|
|
if (ssids == NULL)
|
2012-08-07 10:48:52 -04:00
|
|
|
goto fail;
|
2012-08-07 10:27:55 -04:00
|
|
|
for (i = 0; i < params->num_ssids; i++) {
|
|
|
|
wpa_hexdump_ascii(MSG_MSGDUMP, "nl80211: Scan SSID",
|
|
|
|
params->ssids[i].ssid,
|
|
|
|
params->ssids[i].ssid_len);
|
2013-03-30 14:37:44 -04:00
|
|
|
if (nla_put(msg, i + 1, params->ssids[i].ssid_len,
|
|
|
|
params->ssids[i].ssid) < 0)
|
2012-08-07 10:48:52 -04:00
|
|
|
goto fail;
|
2012-08-07 10:27:55 -04:00
|
|
|
}
|
2013-03-30 14:37:44 -04:00
|
|
|
nla_nest_end(msg, ssids);
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
2009-02-18 05:49:25 -05:00
|
|
|
if (params->extra_ies) {
|
2011-12-03 05:47:34 -05:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs",
|
|
|
|
params->extra_ies, params->extra_ies_len);
|
2012-08-07 10:48:52 -04:00
|
|
|
if (nla_put(msg, NL80211_ATTR_IE, params->extra_ies_len,
|
|
|
|
params->extra_ies) < 0)
|
|
|
|
goto fail;
|
2009-02-18 05:49:25 -05:00
|
|
|
}
|
|
|
|
|
2009-03-26 15:55:01 -04:00
|
|
|
if (params->freqs) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *freqs;
|
|
|
|
freqs = nla_nest_start(msg, NL80211_ATTR_SCAN_FREQUENCIES);
|
2012-08-07 10:27:55 -04:00
|
|
|
if (freqs == NULL)
|
2012-08-07 10:48:52 -04:00
|
|
|
goto fail;
|
2010-03-27 01:22:38 -04:00
|
|
|
for (i = 0; params->freqs[i]; i++) {
|
|
|
|
wpa_printf(MSG_MSGDUMP, "nl80211: Scan frequency %u "
|
|
|
|
"MHz", params->freqs[i]);
|
2013-03-30 14:37:44 -04:00
|
|
|
if (nla_put_u32(msg, i + 1, params->freqs[i]) < 0)
|
2012-08-07 10:48:52 -04:00
|
|
|
goto fail;
|
2010-03-27 01:22:38 -04:00
|
|
|
}
|
2013-03-30 14:37:44 -04:00
|
|
|
nla_nest_end(msg, freqs);
|
2009-03-26 15:55:01 -04:00
|
|
|
}
|
|
|
|
|
2012-08-07 10:48:52 -04:00
|
|
|
os_free(drv->filter_ssids);
|
|
|
|
drv->filter_ssids = params->filter_ssids;
|
|
|
|
params->filter_ssids = NULL;
|
|
|
|
drv->num_filter_ssids = params->num_filter_ssids;
|
|
|
|
|
2014-01-02 16:03:31 -05:00
|
|
|
if (params->only_new_results) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Add NL80211_SCAN_FLAG_FLUSH");
|
2014-06-04 05:21:40 -04:00
|
|
|
scan_flags |= NL80211_SCAN_FLAG_FLUSH;
|
2014-01-02 16:03:31 -05:00
|
|
|
}
|
|
|
|
|
2014-06-04 05:21:40 -04:00
|
|
|
if (params->low_priority && drv->have_low_prio_scan) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Add NL80211_SCAN_FLAG_LOW_PRIORITY");
|
|
|
|
scan_flags |= NL80211_SCAN_FLAG_LOW_PRIORITY;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (scan_flags)
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_SCAN_FLAGS, scan_flags);
|
|
|
|
|
2012-08-07 10:48:52 -04:00
|
|
|
return msg;
|
|
|
|
|
|
|
|
fail:
|
2013-06-25 06:33:45 -04:00
|
|
|
nla_put_failure:
|
2012-08-07 10:48:52 -04:00
|
|
|
nlmsg_free(msg);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpa_driver_nl80211_scan - Request the driver to initiate scan
|
2013-02-03 08:46:47 -05:00
|
|
|
* @bss: Pointer to private driver data from wpa_driver_nl80211_init()
|
2012-08-07 10:48:52 -04:00
|
|
|
* @params: Scan parameters
|
|
|
|
* Returns: 0 on success, -1 on failure
|
|
|
|
*/
|
2013-02-03 08:46:47 -05:00
|
|
|
static int wpa_driver_nl80211_scan(struct i802_bss *bss,
|
2012-08-07 10:48:52 -04:00
|
|
|
struct wpa_driver_scan_params *params)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
int ret = -1, timeout;
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nl_msg *msg = NULL;
|
2012-08-07 10:48:52 -04:00
|
|
|
|
2013-03-18 10:05:24 -04:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: scan request");
|
2012-08-07 10:48:52 -04:00
|
|
|
drv->scan_for_auth = 0;
|
|
|
|
|
2013-06-25 06:33:45 -04:00
|
|
|
msg = nl80211_scan_common(drv, NL80211_CMD_TRIGGER_SCAN, params,
|
|
|
|
bss->wdev_id_set ? &bss->wdev_id : NULL);
|
2012-08-07 10:48:52 -04:00
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-09-10 15:40:30 -04:00
|
|
|
if (params->p2p_probe) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *rates;
|
|
|
|
|
2012-02-18 05:39:01 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: P2P probe - mask SuppRates");
|
|
|
|
|
2013-03-30 14:37:44 -04:00
|
|
|
rates = nla_nest_start(msg, NL80211_ATTR_SCAN_SUPP_RATES);
|
2012-08-07 10:27:55 -04:00
|
|
|
if (rates == NULL)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2011-09-10 15:40:30 -04:00
|
|
|
/*
|
|
|
|
* Remove 2.4 GHz rates 1, 2, 5.5, 11 Mbps from supported rates
|
|
|
|
* by masking out everything else apart from the OFDM rates 6,
|
|
|
|
* 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS rates. All 5 GHz
|
|
|
|
* rates are left enabled.
|
|
|
|
*/
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT(msg, NL80211_BAND_2GHZ, 8,
|
2011-09-10 15:40:30 -04:00
|
|
|
"\x0c\x12\x18\x24\x30\x48\x60\x6c");
|
2013-03-30 14:37:44 -04:00
|
|
|
nla_nest_end(msg, rates);
|
2011-10-29 14:23:27 -04:00
|
|
|
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_TX_NO_CCK_RATE);
|
2011-09-10 15:40:30 -04:00
|
|
|
}
|
|
|
|
|
2009-02-12 09:20:22 -05:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Scan trigger failed: ret=%d "
|
|
|
|
"(%s)", ret, strerror(-ret));
|
2013-11-09 10:22:49 -05:00
|
|
|
if (drv->hostapd && is_ap_interface(drv->nlmode)) {
|
2014-02-04 16:11:14 -05:00
|
|
|
enum nl80211_iftype old_mode = drv->nlmode;
|
|
|
|
|
2009-04-16 09:22:40 -04:00
|
|
|
/*
|
|
|
|
* mac80211 does not allow scan requests in AP mode, so
|
|
|
|
* try to do this in station mode.
|
|
|
|
*/
|
2011-07-17 13:22:11 -04:00
|
|
|
if (wpa_driver_nl80211_set_mode(
|
|
|
|
bss, NL80211_IFTYPE_STATION))
|
2009-04-16 09:22:40 -04:00
|
|
|
goto nla_put_failure;
|
|
|
|
|
2013-02-03 06:51:54 -05:00
|
|
|
if (wpa_driver_nl80211_scan(bss, params)) {
|
2011-07-17 13:22:11 -04:00
|
|
|
wpa_driver_nl80211_set_mode(bss, drv->nlmode);
|
2009-04-16 09:22:40 -04:00
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Restore AP mode when processing scan results */
|
2014-02-04 16:11:14 -05:00
|
|
|
drv->ap_scan_as_station = old_mode;
|
2009-04-16 09:22:40 -04:00
|
|
|
ret = 0;
|
|
|
|
} else
|
|
|
|
goto nla_put_failure;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
2013-09-28 10:19:30 -04:00
|
|
|
drv->scan_state = SCAN_REQUESTED;
|
2008-06-06 09:55:42 -04:00
|
|
|
/* Not all drivers generate "scan completed" wireless event, so try to
|
|
|
|
* read results after a timeout. */
|
2009-02-12 09:20:22 -05:00
|
|
|
timeout = 10;
|
2008-06-06 09:55:42 -04:00
|
|
|
if (drv->scan_complete_events) {
|
|
|
|
/*
|
2009-02-18 05:49:25 -05:00
|
|
|
* The driver seems to deliver events to notify when scan is
|
|
|
|
* complete, so use longer timeout to avoid race conditions
|
|
|
|
* with scanning and following association request.
|
2008-06-06 09:55:42 -04:00
|
|
|
*/
|
|
|
|
timeout = 30;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "Scan requested (ret=%d) - scan timeout %d "
|
|
|
|
"seconds", ret, timeout);
|
|
|
|
eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
|
2009-02-12 09:20:22 -05:00
|
|
|
eloop_register_timeout(timeout, 0, wpa_driver_nl80211_scan_timeout,
|
|
|
|
drv, drv->ctx);
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2009-02-12 09:20:22 -05:00
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
2008-06-06 09:55:42 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-09-27 15:21:30 -04:00
|
|
|
/**
|
|
|
|
* wpa_driver_nl80211_sched_scan - Initiate a scheduled scan
|
|
|
|
* @priv: Pointer to private driver data from wpa_driver_nl80211_init()
|
|
|
|
* @params: Scan parameters
|
|
|
|
* @interval: Interval between scan cycles in milliseconds
|
|
|
|
* Returns: 0 on success, -1 on failure or if not supported
|
|
|
|
*/
|
|
|
|
static int wpa_driver_nl80211_sched_scan(void *priv,
|
|
|
|
struct wpa_driver_scan_params *params,
|
|
|
|
u32 interval)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2012-08-07 10:11:08 -04:00
|
|
|
int ret = -1;
|
2012-08-07 10:48:52 -04:00
|
|
|
struct nl_msg *msg;
|
2011-09-27 15:21:30 -04:00
|
|
|
size_t i;
|
|
|
|
|
2013-03-18 10:05:24 -04:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: sched_scan request");
|
|
|
|
|
2011-11-23 09:29:28 -05:00
|
|
|
#ifdef ANDROID
|
|
|
|
if (!drv->capa.sched_scan_supported)
|
|
|
|
return android_pno_start(bss, params);
|
|
|
|
#endif /* ANDROID */
|
|
|
|
|
2013-06-25 06:33:45 -04:00
|
|
|
msg = nl80211_scan_common(drv, NL80211_CMD_START_SCHED_SCAN, params,
|
|
|
|
bss->wdev_id_set ? &bss->wdev_id : NULL);
|
2012-08-07 10:11:08 -04:00
|
|
|
if (!msg)
|
|
|
|
goto nla_put_failure;
|
2011-09-27 15:21:30 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_SCHED_SCAN_INTERVAL, interval);
|
|
|
|
|
2012-07-25 09:56:43 -04:00
|
|
|
if ((drv->num_filter_ssids &&
|
|
|
|
(int) drv->num_filter_ssids <= drv->capa.max_match_sets) ||
|
|
|
|
params->filter_rssi) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *match_sets;
|
|
|
|
match_sets = nla_nest_start(msg, NL80211_ATTR_SCHED_SCAN_MATCH);
|
2012-08-07 10:11:08 -04:00
|
|
|
if (match_sets == NULL)
|
|
|
|
goto nla_put_failure;
|
2011-09-27 15:21:36 -04:00
|
|
|
|
|
|
|
for (i = 0; i < drv->num_filter_ssids; i++) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *match_set_ssid;
|
2011-09-27 15:21:36 -04:00
|
|
|
wpa_hexdump_ascii(MSG_MSGDUMP,
|
|
|
|
"nl80211: Sched scan filter SSID",
|
|
|
|
drv->filter_ssids[i].ssid,
|
|
|
|
drv->filter_ssids[i].ssid_len);
|
|
|
|
|
2013-03-30 14:37:44 -04:00
|
|
|
match_set_ssid = nla_nest_start(msg, i + 1);
|
2012-08-07 10:11:08 -04:00
|
|
|
if (match_set_ssid == NULL)
|
|
|
|
goto nla_put_failure;
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_SCHED_SCAN_MATCH_SSID,
|
2011-09-27 15:21:36 -04:00
|
|
|
drv->filter_ssids[i].ssid_len,
|
|
|
|
drv->filter_ssids[i].ssid);
|
nl80211: Treat RSSI as part of each sched scan matchset
The original RSSI filter semantics for scheduled scan were
really confusing - a separate matchset was created, but it
wasn't actually treated as a separate matchset in the kernel
but rather used as the global RSSI value. The RSSI matchset
thus behaved like an RSSI filter outside of the matchsets,
being ANDed rather than ORed (as normal between matchsets.)
To make this less confusing, I changed the kernel API a bit
to actually treat the RSSI inside each matchset properly,
but keeping it compatible with the old approach by using a
matchset with only an RSSI value as the default for all the
other matchsets, and adding it as a separate matchset only
if it's the only one.
The proper way for wpa_supplicant to do this then would be
to add the RSSI to each SSID matchset, and only add another
matchset without SSID if there's none with.
However, to keep compatibility with older kernels, always
keep the non-SSID matchset and only add the RSSI to all the
other matchsets. This gets close to the desired behaviour,
the only difference would be that we shouldn't add the RSSI
matchset if there are others, but stays compatible with old
and new kernels, as new ones ignore the RSSI-only matchset
if there are others and those others have an RSSI.
Signed-hostap: Johannes Berg <johannes.berg@intel.com>
2014-01-24 07:32:27 -05:00
|
|
|
if (params->filter_rssi)
|
|
|
|
NLA_PUT_U32(msg,
|
|
|
|
NL80211_SCHED_SCAN_MATCH_ATTR_RSSI,
|
|
|
|
params->filter_rssi);
|
2011-09-27 15:21:36 -04:00
|
|
|
|
2013-04-23 10:19:20 -04:00
|
|
|
nla_nest_end(msg, match_set_ssid);
|
2011-09-27 15:21:36 -04:00
|
|
|
}
|
|
|
|
|
nl80211: Treat RSSI as part of each sched scan matchset
The original RSSI filter semantics for scheduled scan were
really confusing - a separate matchset was created, but it
wasn't actually treated as a separate matchset in the kernel
but rather used as the global RSSI value. The RSSI matchset
thus behaved like an RSSI filter outside of the matchsets,
being ANDed rather than ORed (as normal between matchsets.)
To make this less confusing, I changed the kernel API a bit
to actually treat the RSSI inside each matchset properly,
but keeping it compatible with the old approach by using a
matchset with only an RSSI value as the default for all the
other matchsets, and adding it as a separate matchset only
if it's the only one.
The proper way for wpa_supplicant to do this then would be
to add the RSSI to each SSID matchset, and only add another
matchset without SSID if there's none with.
However, to keep compatibility with older kernels, always
keep the non-SSID matchset and only add the RSSI to all the
other matchsets. This gets close to the desired behaviour,
the only difference would be that we shouldn't add the RSSI
matchset if there are others, but stays compatible with old
and new kernels, as new ones ignore the RSSI-only matchset
if there are others and those others have an RSSI.
Signed-hostap: Johannes Berg <johannes.berg@intel.com>
2014-01-24 07:32:27 -05:00
|
|
|
/*
|
|
|
|
* Due to backward compatibility code, newer kernels treat this
|
|
|
|
* matchset (with only an RSSI filter) as the default for all
|
|
|
|
* other matchsets, unless it's the only one, in which case the
|
|
|
|
* matchset will actually allow all SSIDs above the RSSI.
|
|
|
|
*/
|
2012-07-25 09:56:43 -04:00
|
|
|
if (params->filter_rssi) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *match_set_rssi;
|
|
|
|
match_set_rssi = nla_nest_start(msg, 0);
|
2012-08-07 10:11:08 -04:00
|
|
|
if (match_set_rssi == NULL)
|
|
|
|
goto nla_put_failure;
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_SCHED_SCAN_MATCH_ATTR_RSSI,
|
2012-07-25 09:56:43 -04:00
|
|
|
params->filter_rssi);
|
|
|
|
wpa_printf(MSG_MSGDUMP,
|
|
|
|
"nl80211: Sched scan RSSI filter %d dBm",
|
|
|
|
params->filter_rssi);
|
2013-03-30 14:37:44 -04:00
|
|
|
nla_nest_end(msg, match_set_rssi);
|
2012-07-25 09:56:43 -04:00
|
|
|
}
|
|
|
|
|
2013-03-30 14:37:44 -04:00
|
|
|
nla_nest_end(msg, match_sets);
|
2011-09-27 15:21:36 -04:00
|
|
|
}
|
|
|
|
|
2011-09-27 15:21:30 -04:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
|
|
|
|
/* TODO: if we get an error here, we should fall back to normal scan */
|
|
|
|
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Sched scan start failed: "
|
|
|
|
"ret=%d (%s)", ret, strerror(-ret));
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Sched scan requested (ret=%d) - "
|
|
|
|
"scan interval %d msec", ret, interval);
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpa_driver_nl80211_stop_sched_scan - Stop a scheduled scan
|
|
|
|
* @priv: Pointer to private driver data from wpa_driver_nl80211_init()
|
|
|
|
* Returns: 0 on success, -1 on failure or if not supported
|
|
|
|
*/
|
|
|
|
static int wpa_driver_nl80211_stop_sched_scan(void *priv)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
int ret = 0;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
2011-11-23 09:29:28 -05:00
|
|
|
#ifdef ANDROID
|
|
|
|
if (!drv->capa.sched_scan_supported)
|
|
|
|
return android_pno_stop(bss);
|
|
|
|
#endif /* ANDROID */
|
|
|
|
|
2011-09-27 15:21:30 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_STOP_SCHED_SCAN);
|
2011-09-27 15:21:30 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Sched scan stop failed: "
|
|
|
|
"ret=%d (%s)", ret, strerror(-ret));
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Sched scan stop sent (ret=%d)", ret);
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-05 14:42:06 -05:00
|
|
|
static const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie)
|
|
|
|
{
|
|
|
|
const u8 *end, *pos;
|
|
|
|
|
|
|
|
if (ies == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
pos = ies;
|
|
|
|
end = ies + ies_len;
|
|
|
|
|
|
|
|
while (pos + 1 < end) {
|
|
|
|
if (pos + 2 + pos[1] > end)
|
|
|
|
break;
|
|
|
|
if (pos[0] == ie)
|
|
|
|
return pos;
|
|
|
|
pos += 2 + pos[1];
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_scan_filtered(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const u8 *ie, size_t ie_len)
|
|
|
|
{
|
|
|
|
const u8 *ssid;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if (drv->filter_ssids == NULL)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ssid = nl80211_get_ie(ie, ie_len, WLAN_EID_SSID);
|
|
|
|
if (ssid == NULL)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
for (i = 0; i < drv->num_filter_ssids; i++) {
|
|
|
|
if (ssid[1] == drv->filter_ssids[i].ssid_len &&
|
|
|
|
os_memcmp(ssid + 2, drv->filter_ssids[i].ssid, ssid[1]) ==
|
|
|
|
0)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-02-12 10:12:58 -05:00
|
|
|
static int bss_info_handler(struct nl_msg *msg, void *arg)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
2009-02-12 10:12:58 -05:00
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *bss[NL80211_BSS_MAX + 1];
|
|
|
|
static struct nla_policy bss_policy[NL80211_BSS_MAX + 1] = {
|
|
|
|
[NL80211_BSS_BSSID] = { .type = NLA_UNSPEC },
|
|
|
|
[NL80211_BSS_FREQUENCY] = { .type = NLA_U32 },
|
|
|
|
[NL80211_BSS_TSF] = { .type = NLA_U64 },
|
|
|
|
[NL80211_BSS_BEACON_INTERVAL] = { .type = NLA_U16 },
|
|
|
|
[NL80211_BSS_CAPABILITY] = { .type = NLA_U16 },
|
|
|
|
[NL80211_BSS_INFORMATION_ELEMENTS] = { .type = NLA_UNSPEC },
|
|
|
|
[NL80211_BSS_SIGNAL_MBM] = { .type = NLA_U32 },
|
|
|
|
[NL80211_BSS_SIGNAL_UNSPEC] = { .type = NLA_U8 },
|
2009-12-02 09:45:31 -05:00
|
|
|
[NL80211_BSS_STATUS] = { .type = NLA_U32 },
|
2009-10-01 10:53:22 -04:00
|
|
|
[NL80211_BSS_SEEN_MS_AGO] = { .type = NLA_U32 },
|
2010-01-16 09:11:05 -05:00
|
|
|
[NL80211_BSS_BEACON_IES] = { .type = NLA_UNSPEC },
|
2009-02-12 10:12:58 -05:00
|
|
|
};
|
2010-03-05 14:42:06 -05:00
|
|
|
struct nl80211_bss_info_arg *_arg = arg;
|
|
|
|
struct wpa_scan_results *res = _arg->res;
|
2008-06-06 09:55:42 -04:00
|
|
|
struct wpa_scan_res **tmp;
|
|
|
|
struct wpa_scan_res *r;
|
2010-01-16 09:11:05 -05:00
|
|
|
const u8 *ie, *beacon_ie;
|
|
|
|
size_t ie_len, beacon_ie_len;
|
|
|
|
u8 *pos;
|
2011-05-16 12:18:42 -04:00
|
|
|
size_t i;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2009-02-12 10:12:58 -05:00
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
if (!tb[NL80211_ATTR_BSS])
|
|
|
|
return NL_SKIP;
|
|
|
|
if (nla_parse_nested(bss, NL80211_BSS_MAX, tb[NL80211_ATTR_BSS],
|
|
|
|
bss_policy))
|
|
|
|
return NL_SKIP;
|
2011-05-16 11:35:42 -04:00
|
|
|
if (bss[NL80211_BSS_STATUS]) {
|
|
|
|
enum nl80211_bss_status status;
|
|
|
|
status = nla_get_u32(bss[NL80211_BSS_STATUS]);
|
|
|
|
if (status == NL80211_BSS_STATUS_ASSOCIATED &&
|
|
|
|
bss[NL80211_BSS_FREQUENCY]) {
|
|
|
|
_arg->assoc_freq =
|
|
|
|
nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Associated on %u MHz",
|
|
|
|
_arg->assoc_freq);
|
|
|
|
}
|
2014-05-13 17:47:42 -04:00
|
|
|
if (status == NL80211_BSS_STATUS_IBSS_JOINED &&
|
|
|
|
bss[NL80211_BSS_FREQUENCY]) {
|
|
|
|
_arg->ibss_freq =
|
|
|
|
nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: IBSS-joined on %u MHz",
|
|
|
|
_arg->ibss_freq);
|
|
|
|
}
|
2011-09-18 14:26:55 -04:00
|
|
|
if (status == NL80211_BSS_STATUS_ASSOCIATED &&
|
|
|
|
bss[NL80211_BSS_BSSID]) {
|
|
|
|
os_memcpy(_arg->assoc_bssid,
|
|
|
|
nla_data(bss[NL80211_BSS_BSSID]), ETH_ALEN);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Associated with "
|
|
|
|
MACSTR, MAC2STR(_arg->assoc_bssid));
|
|
|
|
}
|
2011-05-16 11:35:42 -04:00
|
|
|
}
|
|
|
|
if (!res)
|
|
|
|
return NL_SKIP;
|
2009-02-12 10:12:58 -05:00
|
|
|
if (bss[NL80211_BSS_INFORMATION_ELEMENTS]) {
|
|
|
|
ie = nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
|
|
|
|
ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
|
|
|
|
} else {
|
|
|
|
ie = NULL;
|
|
|
|
ie_len = 0;
|
|
|
|
}
|
2010-01-16 09:11:05 -05:00
|
|
|
if (bss[NL80211_BSS_BEACON_IES]) {
|
|
|
|
beacon_ie = nla_data(bss[NL80211_BSS_BEACON_IES]);
|
|
|
|
beacon_ie_len = nla_len(bss[NL80211_BSS_BEACON_IES]);
|
|
|
|
} else {
|
|
|
|
beacon_ie = NULL;
|
|
|
|
beacon_ie_len = 0;
|
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2010-03-05 14:42:06 -05:00
|
|
|
if (nl80211_scan_filtered(_arg->drv, ie ? ie : beacon_ie,
|
|
|
|
ie ? ie_len : beacon_ie_len))
|
|
|
|
return NL_SKIP;
|
|
|
|
|
2010-01-16 09:11:05 -05:00
|
|
|
r = os_zalloc(sizeof(*r) + ie_len + beacon_ie_len);
|
2008-06-06 09:55:42 -04:00
|
|
|
if (r == NULL)
|
2009-02-12 10:12:58 -05:00
|
|
|
return NL_SKIP;
|
|
|
|
if (bss[NL80211_BSS_BSSID])
|
|
|
|
os_memcpy(r->bssid, nla_data(bss[NL80211_BSS_BSSID]),
|
|
|
|
ETH_ALEN);
|
|
|
|
if (bss[NL80211_BSS_FREQUENCY])
|
|
|
|
r->freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
|
|
|
|
if (bss[NL80211_BSS_BEACON_INTERVAL])
|
|
|
|
r->beacon_int = nla_get_u16(bss[NL80211_BSS_BEACON_INTERVAL]);
|
|
|
|
if (bss[NL80211_BSS_CAPABILITY])
|
|
|
|
r->caps = nla_get_u16(bss[NL80211_BSS_CAPABILITY]);
|
2009-02-18 06:40:38 -05:00
|
|
|
r->flags |= WPA_SCAN_NOISE_INVALID;
|
|
|
|
if (bss[NL80211_BSS_SIGNAL_MBM]) {
|
2009-02-12 10:12:58 -05:00
|
|
|
r->level = nla_get_u32(bss[NL80211_BSS_SIGNAL_MBM]);
|
2009-02-18 06:40:38 -05:00
|
|
|
r->level /= 100; /* mBm to dBm */
|
|
|
|
r->flags |= WPA_SCAN_LEVEL_DBM | WPA_SCAN_QUAL_INVALID;
|
|
|
|
} else if (bss[NL80211_BSS_SIGNAL_UNSPEC]) {
|
|
|
|
r->level = nla_get_u8(bss[NL80211_BSS_SIGNAL_UNSPEC]);
|
2011-11-18 16:23:45 -05:00
|
|
|
r->flags |= WPA_SCAN_QUAL_INVALID;
|
2009-02-18 06:40:38 -05:00
|
|
|
} else
|
|
|
|
r->flags |= WPA_SCAN_LEVEL_INVALID | WPA_SCAN_QUAL_INVALID;
|
2009-02-12 10:12:58 -05:00
|
|
|
if (bss[NL80211_BSS_TSF])
|
|
|
|
r->tsf = nla_get_u64(bss[NL80211_BSS_TSF]);
|
2009-10-01 10:53:22 -04:00
|
|
|
if (bss[NL80211_BSS_SEEN_MS_AGO])
|
|
|
|
r->age = nla_get_u32(bss[NL80211_BSS_SEEN_MS_AGO]);
|
2009-02-12 10:12:58 -05:00
|
|
|
r->ie_len = ie_len;
|
2010-01-16 09:11:05 -05:00
|
|
|
pos = (u8 *) (r + 1);
|
|
|
|
if (ie) {
|
|
|
|
os_memcpy(pos, ie, ie_len);
|
|
|
|
pos += ie_len;
|
|
|
|
}
|
|
|
|
r->beacon_ie_len = beacon_ie_len;
|
|
|
|
if (beacon_ie)
|
|
|
|
os_memcpy(pos, beacon_ie, beacon_ie_len);
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2009-12-02 09:45:31 -05:00
|
|
|
if (bss[NL80211_BSS_STATUS]) {
|
|
|
|
enum nl80211_bss_status status;
|
|
|
|
status = nla_get_u32(bss[NL80211_BSS_STATUS]);
|
|
|
|
switch (status) {
|
|
|
|
case NL80211_BSS_STATUS_AUTHENTICATED:
|
|
|
|
r->flags |= WPA_SCAN_AUTHENTICATED;
|
|
|
|
break;
|
|
|
|
case NL80211_BSS_STATUS_ASSOCIATED:
|
|
|
|
r->flags |= WPA_SCAN_ASSOCIATED;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-05-16 12:18:42 -04:00
|
|
|
/*
|
|
|
|
* cfg80211 maintains separate BSS table entries for APs if the same
|
|
|
|
* BSSID,SSID pair is seen on multiple channels. wpa_supplicant does
|
|
|
|
* not use frequency as a separate key in the BSS table, so filter out
|
|
|
|
* duplicated entries. Prefer associated BSS entry in such a case in
|
2013-12-31 02:38:55 -05:00
|
|
|
* order to get the correct frequency into the BSS table. Similarly,
|
|
|
|
* prefer newer entries over older.
|
2011-05-16 12:18:42 -04:00
|
|
|
*/
|
|
|
|
for (i = 0; i < res->num; i++) {
|
|
|
|
const u8 *s1, *s2;
|
|
|
|
if (os_memcmp(res->res[i]->bssid, r->bssid, ETH_ALEN) != 0)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
s1 = nl80211_get_ie((u8 *) (res->res[i] + 1),
|
|
|
|
res->res[i]->ie_len, WLAN_EID_SSID);
|
|
|
|
s2 = nl80211_get_ie((u8 *) (r + 1), r->ie_len, WLAN_EID_SSID);
|
|
|
|
if (s1 == NULL || s2 == NULL || s1[1] != s2[1] ||
|
|
|
|
os_memcmp(s1, s2, 2 + s1[1]) != 0)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* Same BSSID,SSID was already included in scan results */
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Remove duplicated scan result "
|
|
|
|
"for " MACSTR, MAC2STR(r->bssid));
|
|
|
|
|
2013-12-31 02:38:55 -05:00
|
|
|
if (((r->flags & WPA_SCAN_ASSOCIATED) &&
|
|
|
|
!(res->res[i]->flags & WPA_SCAN_ASSOCIATED)) ||
|
|
|
|
r->age < res->res[i]->age) {
|
2011-05-16 12:18:42 -04:00
|
|
|
os_free(res->res[i]);
|
|
|
|
res->res[i] = r;
|
|
|
|
} else
|
|
|
|
os_free(r);
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
2012-08-13 14:21:23 -04:00
|
|
|
tmp = os_realloc_array(res->res, res->num + 1,
|
|
|
|
sizeof(struct wpa_scan_res *));
|
2008-06-06 09:55:42 -04:00
|
|
|
if (tmp == NULL) {
|
|
|
|
os_free(r);
|
2009-02-12 10:12:58 -05:00
|
|
|
return NL_SKIP;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
tmp[res->num++] = r;
|
|
|
|
res->res = tmp;
|
2009-02-12 10:12:58 -05:00
|
|
|
|
|
|
|
return NL_SKIP;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
2009-02-12 10:12:58 -05:00
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2009-12-02 10:54:57 -05:00
|
|
|
static void clear_state_mismatch(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const u8 *addr)
|
|
|
|
{
|
|
|
|
if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Clear possible state "
|
2010-01-24 21:07:34 -05:00
|
|
|
"mismatch (" MACSTR ")", MAC2STR(addr));
|
2009-12-02 10:54:57 -05:00
|
|
|
wpa_driver_nl80211_mlme(drv, addr,
|
|
|
|
NL80211_CMD_DEAUTHENTICATE,
|
2010-04-08 04:31:37 -04:00
|
|
|
WLAN_REASON_PREV_AUTH_NOT_VALID, 1);
|
2009-12-02 10:54:57 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-02 09:45:31 -05:00
|
|
|
static void wpa_driver_nl80211_check_bss_status(
|
|
|
|
struct wpa_driver_nl80211_data *drv, struct wpa_scan_results *res)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
for (i = 0; i < res->num; i++) {
|
|
|
|
struct wpa_scan_res *r = res->res[i];
|
|
|
|
if (r->flags & WPA_SCAN_AUTHENTICATED) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Scan results "
|
|
|
|
"indicates BSS status with " MACSTR
|
|
|
|
" as authenticated",
|
|
|
|
MAC2STR(r->bssid));
|
2011-07-17 13:22:11 -04:00
|
|
|
if (is_sta_interface(drv->nlmode) &&
|
2009-12-02 09:45:31 -05:00
|
|
|
os_memcmp(r->bssid, drv->bssid, ETH_ALEN) != 0 &&
|
|
|
|
os_memcmp(r->bssid, drv->auth_bssid, ETH_ALEN) !=
|
|
|
|
0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Unknown BSSID"
|
|
|
|
" in local state (auth=" MACSTR
|
|
|
|
" assoc=" MACSTR ")",
|
|
|
|
MAC2STR(drv->auth_bssid),
|
|
|
|
MAC2STR(drv->bssid));
|
2010-01-24 21:07:34 -05:00
|
|
|
clear_state_mismatch(drv, r->bssid);
|
2009-12-02 09:45:31 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (r->flags & WPA_SCAN_ASSOCIATED) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Scan results "
|
|
|
|
"indicate BSS status with " MACSTR
|
|
|
|
" as associated",
|
|
|
|
MAC2STR(r->bssid));
|
2011-07-17 13:22:11 -04:00
|
|
|
if (is_sta_interface(drv->nlmode) &&
|
2009-12-02 09:45:31 -05:00
|
|
|
!drv->associated) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Local state "
|
|
|
|
"(not associated) does not match "
|
|
|
|
"with BSS state");
|
2009-12-02 10:54:57 -05:00
|
|
|
clear_state_mismatch(drv, r->bssid);
|
2011-07-17 13:22:11 -04:00
|
|
|
} else if (is_sta_interface(drv->nlmode) &&
|
2009-12-02 09:45:31 -05:00
|
|
|
os_memcmp(drv->bssid, r->bssid, ETH_ALEN) !=
|
|
|
|
0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Local state "
|
|
|
|
"(associated with " MACSTR ") does "
|
|
|
|
"not match with BSS state",
|
2009-12-02 10:54:57 -05:00
|
|
|
MAC2STR(drv->bssid));
|
|
|
|
clear_state_mismatch(drv, r->bssid);
|
|
|
|
clear_state_mismatch(drv, drv->bssid);
|
2009-12-02 09:45:31 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-01-03 13:38:42 -05:00
|
|
|
static struct wpa_scan_results *
|
2010-01-24 21:11:30 -05:00
|
|
|
nl80211_get_scan_results(struct wpa_driver_nl80211_data *drv)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
2009-02-12 10:12:58 -05:00
|
|
|
struct nl_msg *msg;
|
2008-06-06 09:55:42 -04:00
|
|
|
struct wpa_scan_results *res;
|
2009-02-12 10:12:58 -05:00
|
|
|
int ret;
|
2010-03-05 14:42:06 -05:00
|
|
|
struct nl80211_bss_info_arg arg;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
|
|
|
res = os_zalloc(sizeof(*res));
|
2009-02-12 10:12:58 -05:00
|
|
|
if (res == NULL)
|
2009-11-24 17:57:00 -05:00
|
|
|
return NULL;
|
2009-02-12 10:12:58 -05:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
goto nla_put_failure;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
|
2013-10-29 20:41:39 -04:00
|
|
|
if (nl80211_set_iface_id(msg, drv->first_bss) < 0)
|
2013-06-25 06:51:14 -04:00
|
|
|
goto nla_put_failure;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2010-03-05 14:42:06 -05:00
|
|
|
arg.drv = drv;
|
|
|
|
arg.res = res;
|
|
|
|
ret = send_and_recv_msgs(drv, msg, bss_info_handler, &arg);
|
2009-02-12 10:12:58 -05:00
|
|
|
msg = NULL;
|
|
|
|
if (ret == 0) {
|
2011-08-05 19:23:12 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Received scan results (%lu "
|
|
|
|
"BSSes)", (unsigned long) res->num);
|
|
|
|
nl80211_get_noise_for_scan_results(drv, res);
|
2009-02-12 10:12:58 -05:00
|
|
|
return res;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
2009-02-12 10:12:58 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
|
|
|
|
"(%s)", ret, strerror(-ret));
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
wpa_scan_results_free(res);
|
|
|
|
return NULL;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-24 21:11:30 -05:00
|
|
|
/**
|
|
|
|
* wpa_driver_nl80211_get_scan_results - Fetch the latest scan results
|
|
|
|
* @priv: Pointer to private wext data from wpa_driver_nl80211_init()
|
|
|
|
* Returns: Scan results on success, -1 on failure
|
|
|
|
*/
|
|
|
|
static struct wpa_scan_results *
|
|
|
|
wpa_driver_nl80211_get_scan_results(void *priv)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2010-01-24 21:11:30 -05:00
|
|
|
struct wpa_scan_results *res;
|
|
|
|
|
|
|
|
res = nl80211_get_scan_results(drv);
|
|
|
|
if (res)
|
|
|
|
wpa_driver_nl80211_check_bss_status(drv, res);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void nl80211_dump_scan(struct wpa_driver_nl80211_data *drv)
|
|
|
|
{
|
|
|
|
struct wpa_scan_results *res;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
res = nl80211_get_scan_results(drv);
|
|
|
|
if (res == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to get scan results");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Scan result dump");
|
|
|
|
for (i = 0; i < res->num; i++) {
|
|
|
|
struct wpa_scan_res *r = res->res[i];
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: %d/%d " MACSTR "%s%s",
|
|
|
|
(int) i, (int) res->num, MAC2STR(r->bssid),
|
|
|
|
r->flags & WPA_SCAN_AUTHENTICATED ? " [auth]" : "",
|
|
|
|
r->flags & WPA_SCAN_ASSOCIATED ? " [assoc]" : "");
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_scan_results_free(res);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-12-30 11:59:29 -05:00
|
|
|
static u32 wpa_alg_to_cipher_suite(enum wpa_alg alg, size_t key_len)
|
|
|
|
{
|
|
|
|
switch (alg) {
|
|
|
|
case WPA_ALG_WEP:
|
|
|
|
if (key_len == 5)
|
|
|
|
return WLAN_CIPHER_SUITE_WEP40;
|
|
|
|
return WLAN_CIPHER_SUITE_WEP104;
|
|
|
|
case WPA_ALG_TKIP:
|
|
|
|
return WLAN_CIPHER_SUITE_TKIP;
|
|
|
|
case WPA_ALG_CCMP:
|
|
|
|
return WLAN_CIPHER_SUITE_CCMP;
|
|
|
|
case WPA_ALG_GCMP:
|
|
|
|
return WLAN_CIPHER_SUITE_GCMP;
|
|
|
|
case WPA_ALG_CCMP_256:
|
|
|
|
return WLAN_CIPHER_SUITE_CCMP_256;
|
|
|
|
case WPA_ALG_GCMP_256:
|
|
|
|
return WLAN_CIPHER_SUITE_GCMP_256;
|
|
|
|
case WPA_ALG_IGTK:
|
|
|
|
return WLAN_CIPHER_SUITE_AES_CMAC;
|
|
|
|
case WPA_ALG_BIP_GMAC_128:
|
|
|
|
return WLAN_CIPHER_SUITE_BIP_GMAC_128;
|
|
|
|
case WPA_ALG_BIP_GMAC_256:
|
|
|
|
return WLAN_CIPHER_SUITE_BIP_GMAC_256;
|
|
|
|
case WPA_ALG_BIP_CMAC_256:
|
|
|
|
return WLAN_CIPHER_SUITE_BIP_CMAC_256;
|
|
|
|
case WPA_ALG_SMS4:
|
|
|
|
return WLAN_CIPHER_SUITE_SMS4;
|
|
|
|
case WPA_ALG_KRK:
|
|
|
|
return WLAN_CIPHER_SUITE_KRK;
|
|
|
|
case WPA_ALG_NONE:
|
|
|
|
case WPA_ALG_PMK:
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Unexpected encryption algorithm %d",
|
|
|
|
alg);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Unsupported encryption algorithm %d",
|
|
|
|
alg);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static u32 wpa_cipher_to_cipher_suite(unsigned int cipher)
|
|
|
|
{
|
|
|
|
switch (cipher) {
|
|
|
|
case WPA_CIPHER_CCMP_256:
|
|
|
|
return WLAN_CIPHER_SUITE_CCMP_256;
|
|
|
|
case WPA_CIPHER_GCMP_256:
|
|
|
|
return WLAN_CIPHER_SUITE_GCMP_256;
|
|
|
|
case WPA_CIPHER_CCMP:
|
|
|
|
return WLAN_CIPHER_SUITE_CCMP;
|
|
|
|
case WPA_CIPHER_GCMP:
|
|
|
|
return WLAN_CIPHER_SUITE_GCMP;
|
|
|
|
case WPA_CIPHER_TKIP:
|
|
|
|
return WLAN_CIPHER_SUITE_TKIP;
|
|
|
|
case WPA_CIPHER_WEP104:
|
|
|
|
return WLAN_CIPHER_SUITE_WEP104;
|
|
|
|
case WPA_CIPHER_WEP40:
|
|
|
|
return WLAN_CIPHER_SUITE_WEP40;
|
2014-01-27 12:11:15 -05:00
|
|
|
case WPA_CIPHER_GTK_NOT_USED:
|
|
|
|
return WLAN_CIPHER_SUITE_NO_GROUP_ADDR;
|
2013-12-30 11:59:29 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_cipher_to_cipher_suites(unsigned int ciphers, u32 suites[],
|
|
|
|
int max_suites)
|
|
|
|
{
|
|
|
|
int num_suites = 0;
|
|
|
|
|
|
|
|
if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP_256)
|
|
|
|
suites[num_suites++] = WLAN_CIPHER_SUITE_CCMP_256;
|
|
|
|
if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP_256)
|
|
|
|
suites[num_suites++] = WLAN_CIPHER_SUITE_GCMP_256;
|
|
|
|
if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP)
|
|
|
|
suites[num_suites++] = WLAN_CIPHER_SUITE_CCMP;
|
|
|
|
if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP)
|
|
|
|
suites[num_suites++] = WLAN_CIPHER_SUITE_GCMP;
|
|
|
|
if (num_suites < max_suites && ciphers & WPA_CIPHER_TKIP)
|
|
|
|
suites[num_suites++] = WLAN_CIPHER_SUITE_TKIP;
|
|
|
|
if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP104)
|
|
|
|
suites[num_suites++] = WLAN_CIPHER_SUITE_WEP104;
|
|
|
|
if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP40)
|
|
|
|
suites[num_suites++] = WLAN_CIPHER_SUITE_WEP40;
|
|
|
|
|
|
|
|
return num_suites;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-23 11:21:49 -04:00
|
|
|
static int issue_key_mgmt_set_key(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const u8 *key, size_t key_len)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
if (!drv->key_mgmt_set_key_vendor_cmd_avail)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_VENDOR);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_SUBCMD,
|
|
|
|
QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_SET_KEY);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_VENDOR_DATA, key_len, key);
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Key management set key failed: ret=%d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
}
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
static int wpa_driver_nl80211_set_key(const char *ifname, struct i802_bss *bss,
|
2009-12-26 03:35:08 -05:00
|
|
|
enum wpa_alg alg, const u8 *addr,
|
|
|
|
int key_idx, int set_tx,
|
2009-11-23 09:58:32 -05:00
|
|
|
const u8 *seq, size_t seq_len,
|
|
|
|
const u8 *key, size_t key_len)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2013-06-25 06:41:55 -04:00
|
|
|
int ifindex;
|
2008-06-06 09:55:42 -04:00
|
|
|
struct nl_msg *msg;
|
2009-04-09 09:31:11 -04:00
|
|
|
int ret;
|
2013-07-31 11:34:16 -04:00
|
|
|
int tdls = 0;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2013-06-25 06:41:55 -04:00
|
|
|
/* Ignore for P2P Device */
|
|
|
|
if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ifindex = if_nametoindex(ifname);
|
2013-06-25 05:25:15 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "%s: ifindex=%d (%s) alg=%d addr=%p key_idx=%d "
|
2009-04-09 09:31:11 -04:00
|
|
|
"set_tx=%d seq_len=%lu key_len=%lu",
|
2013-06-25 05:25:15 -04:00
|
|
|
__func__, ifindex, ifname, alg, addr, key_idx, set_tx,
|
2008-06-06 09:55:42 -04:00
|
|
|
(unsigned long) seq_len, (unsigned long) key_len);
|
2011-10-23 15:12:32 -04:00
|
|
|
#ifdef CONFIG_TDLS
|
2013-07-31 11:34:16 -04:00
|
|
|
if (key_idx == -1) {
|
2011-10-23 15:12:32 -04:00
|
|
|
key_idx = 0;
|
2013-07-31 11:34:16 -04:00
|
|
|
tdls = 1;
|
|
|
|
}
|
2011-10-23 15:12:32 -04:00
|
|
|
#endif /* CONFIG_TDLS */
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2014-10-23 11:21:49 -04:00
|
|
|
if (alg == WPA_ALG_PMK && drv->key_mgmt_set_key_vendor_cmd_avail) {
|
|
|
|
wpa_printf(MSG_DEBUG, "%s: calling issue_key_mgmt_set_key",
|
|
|
|
__func__);
|
|
|
|
ret = issue_key_mgmt_set_key(drv, key, key_len);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
msg = nlmsg_alloc();
|
2009-04-09 09:31:11 -04:00
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
|
|
|
if (alg == WPA_ALG_NONE) {
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_KEY);
|
2008-06-06 09:55:42 -04:00
|
|
|
} else {
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_NEW_KEY);
|
2008-06-06 09:55:42 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_KEY_DATA, key_len, key);
|
2014-03-11 08:59:15 -04:00
|
|
|
wpa_hexdump_key(MSG_DEBUG, "nl80211: KEY_DATA", key, key_len);
|
2013-12-30 11:59:29 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER,
|
|
|
|
wpa_alg_to_cipher_suite(alg, key_len));
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
2014-03-11 08:59:15 -04:00
|
|
|
if (seq && seq_len) {
|
2009-04-09 09:31:11 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_KEY_SEQ, seq_len, seq);
|
2014-03-11 08:59:15 -04:00
|
|
|
wpa_hexdump(MSG_DEBUG, "nl80211: KEY_SEQ", seq, seq_len);
|
|
|
|
}
|
2009-04-09 09:31:11 -04:00
|
|
|
|
2011-01-09 12:44:28 -05:00
|
|
|
if (addr && !is_broadcast_ether_addr(addr)) {
|
2008-06-06 09:55:42 -04:00
|
|
|
wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
|
2010-12-04 23:31:22 -05:00
|
|
|
|
|
|
|
if (alg != WPA_ALG_WEP && key_idx && !set_tx) {
|
|
|
|
wpa_printf(MSG_DEBUG, " RSN IBSS RX GTK");
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_KEY_TYPE,
|
|
|
|
NL80211_KEYTYPE_GROUP);
|
|
|
|
}
|
2011-01-09 12:54:50 -05:00
|
|
|
} else if (addr && is_broadcast_ether_addr(addr)) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *types;
|
|
|
|
|
2011-01-09 12:54:50 -05:00
|
|
|
wpa_printf(MSG_DEBUG, " broadcast key");
|
2013-03-30 14:37:44 -04:00
|
|
|
|
|
|
|
types = nla_nest_start(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
|
2011-01-09 12:54:50 -05:00
|
|
|
if (!types)
|
|
|
|
goto nla_put_failure;
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT_TYPE_MULTICAST);
|
|
|
|
nla_nest_end(msg, types);
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx);
|
2009-04-09 09:31:11 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2009-04-09 09:31:11 -04:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2010-03-27 00:58:31 -04:00
|
|
|
if ((ret == -ENOENT || ret == -ENOLINK) && alg == WPA_ALG_NONE)
|
2009-04-09 09:31:11 -04:00
|
|
|
ret = 0;
|
|
|
|
if (ret)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d %s)",
|
|
|
|
ret, strerror(-ret));
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2009-04-09 09:31:11 -04:00
|
|
|
/*
|
|
|
|
* If we failed or don't need to set the default TX key (below),
|
|
|
|
* we're done here.
|
|
|
|
*/
|
2013-07-31 11:34:16 -04:00
|
|
|
if (ret || !set_tx || alg == WPA_ALG_NONE || tdls)
|
2009-04-09 09:31:11 -04:00
|
|
|
return ret;
|
2011-07-17 13:22:11 -04:00
|
|
|
if (is_ap_interface(drv->nlmode) && addr &&
|
2011-01-09 12:44:28 -05:00
|
|
|
!is_broadcast_ether_addr(addr))
|
2010-04-11 12:35:24 -04:00
|
|
|
return ret;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2009-04-09 09:31:11 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_KEY);
|
2009-04-09 09:31:11 -04:00
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
|
|
|
|
if (alg == WPA_ALG_IGTK)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_KEY_DEFAULT_MGMT);
|
|
|
|
else
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_KEY_DEFAULT);
|
2011-01-09 12:54:50 -05:00
|
|
|
if (addr && is_broadcast_ether_addr(addr)) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *types;
|
|
|
|
|
|
|
|
types = nla_nest_start(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
|
2011-01-09 12:54:50 -05:00
|
|
|
if (!types)
|
|
|
|
goto nla_put_failure;
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT_TYPE_MULTICAST);
|
|
|
|
nla_nest_end(msg, types);
|
2011-01-09 12:54:50 -05:00
|
|
|
} else if (addr) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *types;
|
|
|
|
|
|
|
|
types = nla_nest_start(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
|
2011-01-09 12:54:50 -05:00
|
|
|
if (!types)
|
|
|
|
goto nla_put_failure;
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT_TYPE_UNICAST);
|
|
|
|
nla_nest_end(msg, types);
|
2011-01-09 12:54:50 -05:00
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2009-04-09 09:31:11 -04:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
if (ret == -ENOENT)
|
|
|
|
ret = 0;
|
|
|
|
if (ret)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: set_key default failed; "
|
|
|
|
"err=%d %s)", ret, strerror(-ret));
|
|
|
|
return ret;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2008-09-30 09:46:22 -04:00
|
|
|
return -ENOBUFS;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-26 03:35:08 -05:00
|
|
|
static int nl_add_key(struct nl_msg *msg, enum wpa_alg alg,
|
2009-09-15 03:48:30 -04:00
|
|
|
int key_idx, int defkey,
|
|
|
|
const u8 *seq, size_t seq_len,
|
|
|
|
const u8 *key, size_t key_len)
|
|
|
|
{
|
|
|
|
struct nlattr *key_attr = nla_nest_start(msg, NL80211_ATTR_KEY);
|
|
|
|
if (!key_attr)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (defkey && alg == WPA_ALG_IGTK)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT_MGMT);
|
|
|
|
else if (defkey)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT);
|
|
|
|
|
|
|
|
NLA_PUT_U8(msg, NL80211_KEY_IDX, key_idx);
|
|
|
|
|
2013-12-30 11:59:29 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_KEY_CIPHER,
|
|
|
|
wpa_alg_to_cipher_suite(alg, key_len));
|
2009-09-15 03:48:30 -04:00
|
|
|
|
|
|
|
if (seq && seq_len)
|
|
|
|
NLA_PUT(msg, NL80211_KEY_SEQ, seq_len, seq);
|
|
|
|
|
|
|
|
NLA_PUT(msg, NL80211_KEY_DATA, key_len, key);
|
|
|
|
|
|
|
|
nla_nest_end(msg, key_attr);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
nla_put_failure:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2009-04-17 08:36:06 -04:00
|
|
|
|
2009-09-03 14:31:29 -04:00
|
|
|
static int nl80211_set_conn_keys(struct wpa_driver_associate_params *params,
|
|
|
|
struct nl_msg *msg)
|
|
|
|
{
|
|
|
|
int i, privacy = 0;
|
|
|
|
struct nlattr *nl_keys, *nl_key;
|
|
|
|
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
|
|
if (!params->wep_key[i])
|
|
|
|
continue;
|
|
|
|
privacy = 1;
|
|
|
|
break;
|
|
|
|
}
|
2010-11-26 10:39:31 -05:00
|
|
|
if (params->wps == WPS_MODE_PRIVACY)
|
|
|
|
privacy = 1;
|
|
|
|
if (params->pairwise_suite &&
|
|
|
|
params->pairwise_suite != WPA_CIPHER_NONE)
|
|
|
|
privacy = 1;
|
|
|
|
|
2009-09-03 14:31:29 -04:00
|
|
|
if (!privacy)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_PRIVACY);
|
|
|
|
|
|
|
|
nl_keys = nla_nest_start(msg, NL80211_ATTR_KEYS);
|
|
|
|
if (!nl_keys)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
|
|
if (!params->wep_key[i])
|
|
|
|
continue;
|
|
|
|
|
|
|
|
nl_key = nla_nest_start(msg, i);
|
|
|
|
if (!nl_key)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
NLA_PUT(msg, NL80211_KEY_DATA, params->wep_key_len[i],
|
|
|
|
params->wep_key[i]);
|
|
|
|
if (params->wep_key_len[i] == 5)
|
|
|
|
NLA_PUT_U32(msg, NL80211_KEY_CIPHER,
|
|
|
|
WLAN_CIPHER_SUITE_WEP40);
|
|
|
|
else
|
|
|
|
NLA_PUT_U32(msg, NL80211_KEY_CIPHER,
|
|
|
|
WLAN_CIPHER_SUITE_WEP104);
|
|
|
|
|
|
|
|
NLA_PUT_U8(msg, NL80211_KEY_IDX, i);
|
|
|
|
|
|
|
|
if (i == params->wep_tx_keyidx)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT);
|
|
|
|
|
|
|
|
nla_nest_end(msg, nl_key);
|
|
|
|
}
|
|
|
|
nla_nest_end(msg, nl_keys);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-03-20 16:26:41 -04:00
|
|
|
static int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
|
2010-04-08 04:31:37 -04:00
|
|
|
const u8 *addr, int cmd, u16 reason_code,
|
|
|
|
int local_state_change)
|
2009-03-20 16:26:41 -04:00
|
|
|
{
|
|
|
|
int ret = -1;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, cmd);
|
2009-03-20 16:26:41 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_REASON_CODE, reason_code);
|
2012-09-29 12:01:50 -04:00
|
|
|
if (addr)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
|
2010-04-08 04:31:37 -04:00
|
|
|
if (local_state_change)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_LOCAL_STATE_CHANGE);
|
2009-03-20 16:26:41 -04:00
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
2011-11-18 16:41:52 -05:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG,
|
|
|
|
"nl80211: MLME command failed: reason=%u ret=%d (%s)",
|
|
|
|
reason_code, ret, strerror(-ret));
|
2009-03-20 16:26:41 -04:00
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
|
|
|
|
|
2009-09-03 14:31:29 -04:00
|
|
|
static int wpa_driver_nl80211_disconnect(struct wpa_driver_nl80211_data *drv,
|
2012-09-29 12:01:50 -04:00
|
|
|
int reason_code)
|
2009-09-03 14:31:29 -04:00
|
|
|
{
|
2013-07-20 09:06:13 -04:00
|
|
|
int ret;
|
|
|
|
|
2012-09-29 12:01:50 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "%s(reason_code=%d)", __func__, reason_code);
|
2013-05-27 13:10:57 -04:00
|
|
|
nl80211_mark_disconnected(drv);
|
2012-09-29 12:01:50 -04:00
|
|
|
/* Disconnect command doesn't need BSSID - it uses cached value */
|
2013-07-20 09:06:13 -04:00
|
|
|
ret = wpa_driver_nl80211_mlme(drv, NULL, NL80211_CMD_DISCONNECT,
|
|
|
|
reason_code, 0);
|
|
|
|
/*
|
|
|
|
* For locally generated disconnect, supplicant already generates a
|
|
|
|
* DEAUTH event, so ignore the event from NL80211.
|
|
|
|
*/
|
|
|
|
drv->ignore_next_local_disconnect = ret == 0;
|
|
|
|
|
|
|
|
return ret;
|
2009-09-03 14:31:29 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
static int wpa_driver_nl80211_deauthenticate(struct i802_bss *bss,
|
|
|
|
const u8 *addr, int reason_code)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2014-04-13 04:39:49 -04:00
|
|
|
int ret;
|
2014-04-10 08:23:40 -04:00
|
|
|
|
|
|
|
if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
|
|
|
|
nl80211_mark_disconnected(drv);
|
|
|
|
return nl80211_leave_ibss(drv);
|
|
|
|
}
|
2009-09-03 14:31:29 -04:00
|
|
|
if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME))
|
2012-09-29 12:01:50 -04:00
|
|
|
return wpa_driver_nl80211_disconnect(drv, reason_code);
|
2010-08-17 14:04:38 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "%s(addr=" MACSTR " reason_code=%d)",
|
|
|
|
__func__, MAC2STR(addr), reason_code);
|
2013-05-27 13:10:57 -04:00
|
|
|
nl80211_mark_disconnected(drv);
|
2014-04-13 04:39:49 -04:00
|
|
|
ret = wpa_driver_nl80211_mlme(drv, addr, NL80211_CMD_DEAUTHENTICATE,
|
|
|
|
reason_code, 0);
|
|
|
|
/*
|
|
|
|
* For locally generated deauthenticate, supplicant already generates a
|
|
|
|
* DEAUTH event, so ignore the event from NL80211.
|
|
|
|
*/
|
|
|
|
drv->ignore_next_local_deauth = ret == 0;
|
|
|
|
return ret;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-04 14:53:56 -05:00
|
|
|
static void nl80211_copy_auth_params(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_driver_auth_params *params)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
drv->auth_freq = params->freq;
|
|
|
|
drv->auth_alg = params->auth_alg;
|
|
|
|
drv->auth_wep_tx_keyidx = params->wep_tx_keyidx;
|
|
|
|
drv->auth_local_state_change = params->local_state_change;
|
|
|
|
drv->auth_p2p = params->p2p;
|
|
|
|
|
|
|
|
if (params->bssid)
|
|
|
|
os_memcpy(drv->auth_bssid_, params->bssid, ETH_ALEN);
|
|
|
|
else
|
|
|
|
os_memset(drv->auth_bssid_, 0, ETH_ALEN);
|
|
|
|
|
|
|
|
if (params->ssid) {
|
|
|
|
os_memcpy(drv->auth_ssid, params->ssid, params->ssid_len);
|
|
|
|
drv->auth_ssid_len = params->ssid_len;
|
|
|
|
} else
|
|
|
|
drv->auth_ssid_len = 0;
|
|
|
|
|
|
|
|
|
|
|
|
os_free(drv->auth_ie);
|
|
|
|
drv->auth_ie = NULL;
|
|
|
|
drv->auth_ie_len = 0;
|
|
|
|
if (params->ie) {
|
|
|
|
drv->auth_ie = os_malloc(params->ie_len);
|
|
|
|
if (drv->auth_ie) {
|
|
|
|
os_memcpy(drv->auth_ie, params->ie, params->ie_len);
|
|
|
|
drv->auth_ie_len = params->ie_len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
|
|
if (params->wep_key[i] && params->wep_key_len[i] &&
|
|
|
|
params->wep_key_len[i] <= 16) {
|
|
|
|
os_memcpy(drv->auth_wep_key[i], params->wep_key[i],
|
|
|
|
params->wep_key_len[i]);
|
|
|
|
drv->auth_wep_key_len[i] = params->wep_key_len[i];
|
|
|
|
} else
|
|
|
|
drv->auth_wep_key_len[i] = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-03-20 16:26:41 -04:00
|
|
|
static int wpa_driver_nl80211_authenticate(
|
2013-02-03 08:46:47 -05:00
|
|
|
struct i802_bss *bss, struct wpa_driver_auth_params *params)
|
2009-03-20 16:26:41 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-04 09:58:16 -04:00
|
|
|
int ret = -1, i;
|
2009-03-20 16:26:41 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
enum nl80211_auth_type type;
|
2011-07-17 13:25:58 -04:00
|
|
|
enum nl80211_iftype nlmode;
|
2009-10-12 02:39:55 -04:00
|
|
|
int count = 0;
|
2011-12-04 14:53:56 -05:00
|
|
|
int is_retry;
|
|
|
|
|
|
|
|
is_retry = drv->retry_auth;
|
|
|
|
drv->retry_auth = 0;
|
2014-03-11 14:02:23 -04:00
|
|
|
drv->ignore_deauth_event = 0;
|
2009-03-20 16:26:41 -04:00
|
|
|
|
2013-05-27 13:10:57 -04:00
|
|
|
nl80211_mark_disconnected(drv);
|
2009-12-02 09:45:31 -05:00
|
|
|
os_memset(drv->auth_bssid, 0, ETH_ALEN);
|
2013-05-27 13:10:57 -04:00
|
|
|
if (params->bssid)
|
|
|
|
os_memcpy(drv->auth_attempt_bssid, params->bssid, ETH_ALEN);
|
|
|
|
else
|
|
|
|
os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
|
2010-01-16 05:20:51 -05:00
|
|
|
/* FIX: IBSS mode */
|
2011-07-17 13:25:58 -04:00
|
|
|
nlmode = params->p2p ?
|
|
|
|
NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
|
|
|
|
if (drv->nlmode != nlmode &&
|
2013-02-03 08:46:47 -05:00
|
|
|
wpa_driver_nl80211_set_mode(bss, nlmode) < 0)
|
2009-11-23 13:22:38 -05:00
|
|
|
return -1;
|
|
|
|
|
2009-10-12 02:39:55 -04:00
|
|
|
retry:
|
2009-03-20 16:26:41 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Authenticate (ifindex=%d)",
|
|
|
|
drv->ifindex);
|
2009-04-04 09:58:16 -04:00
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_AUTHENTICATE);
|
2009-09-15 03:48:30 -04:00
|
|
|
|
2009-04-04 09:58:16 -04:00
|
|
|
for (i = 0; i < 4; i++) {
|
|
|
|
if (!params->wep_key[i])
|
|
|
|
continue;
|
2013-02-03 08:46:47 -05:00
|
|
|
wpa_driver_nl80211_set_key(bss->ifname, bss, WPA_ALG_WEP,
|
2010-03-28 01:22:17 -04:00
|
|
|
NULL, i,
|
2009-04-04 09:58:16 -04:00
|
|
|
i == params->wep_tx_keyidx, NULL, 0,
|
|
|
|
params->wep_key[i],
|
|
|
|
params->wep_key_len[i]);
|
2009-09-15 03:48:30 -04:00
|
|
|
if (params->wep_tx_keyidx != i)
|
|
|
|
continue;
|
|
|
|
if (nl_add_key(msg, WPA_ALG_WEP, i, 1, NULL, 0,
|
|
|
|
params->wep_key[i], params->wep_key_len[i])) {
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -1;
|
|
|
|
}
|
2009-04-04 09:58:16 -04:00
|
|
|
}
|
|
|
|
|
2009-03-20 16:26:41 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
if (params->bssid) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * bssid=" MACSTR,
|
|
|
|
MAC2STR(params->bssid));
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid);
|
|
|
|
}
|
|
|
|
if (params->freq) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * freq=%d", params->freq);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq);
|
|
|
|
}
|
|
|
|
if (params->ssid) {
|
|
|
|
wpa_hexdump_ascii(MSG_DEBUG, " * SSID",
|
|
|
|
params->ssid, params->ssid_len);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
|
|
|
|
params->ssid);
|
|
|
|
}
|
|
|
|
wpa_hexdump(MSG_DEBUG, " * IEs", params->ie, params->ie_len);
|
|
|
|
if (params->ie)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_IE, params->ie_len, params->ie);
|
2012-10-24 02:10:42 -04:00
|
|
|
if (params->sae_data) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, " * SAE data", params->sae_data,
|
|
|
|
params->sae_data_len);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_SAE_DATA, params->sae_data_len,
|
|
|
|
params->sae_data);
|
|
|
|
}
|
2010-01-03 14:14:40 -05:00
|
|
|
if (params->auth_alg & WPA_AUTH_ALG_OPEN)
|
2009-03-20 16:26:41 -04:00
|
|
|
type = NL80211_AUTHTYPE_OPEN_SYSTEM;
|
2010-01-03 14:14:40 -05:00
|
|
|
else if (params->auth_alg & WPA_AUTH_ALG_SHARED)
|
2009-03-20 16:26:41 -04:00
|
|
|
type = NL80211_AUTHTYPE_SHARED_KEY;
|
2010-01-03 14:14:40 -05:00
|
|
|
else if (params->auth_alg & WPA_AUTH_ALG_LEAP)
|
2009-03-20 16:26:41 -04:00
|
|
|
type = NL80211_AUTHTYPE_NETWORK_EAP;
|
2010-01-03 14:14:40 -05:00
|
|
|
else if (params->auth_alg & WPA_AUTH_ALG_FT)
|
2009-03-20 16:26:41 -04:00
|
|
|
type = NL80211_AUTHTYPE_FT;
|
2012-10-24 02:10:42 -04:00
|
|
|
else if (params->auth_alg & WPA_AUTH_ALG_SAE)
|
|
|
|
type = NL80211_AUTHTYPE_SAE;
|
2009-03-20 16:26:41 -04:00
|
|
|
else
|
|
|
|
goto nla_put_failure;
|
|
|
|
wpa_printf(MSG_DEBUG, " * Auth Type %d", type);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE, type);
|
2010-04-08 04:31:37 -04:00
|
|
|
if (params->local_state_change) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * Local state change only");
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_LOCAL_STATE_CHANGE);
|
|
|
|
}
|
2009-03-20 16:26:41 -04:00
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
2011-11-18 16:41:52 -05:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG,
|
|
|
|
"nl80211: MLME command failed (auth): ret=%d (%s)",
|
|
|
|
ret, strerror(-ret));
|
2009-10-12 02:39:55 -04:00
|
|
|
count++;
|
2010-04-08 04:31:37 -04:00
|
|
|
if (ret == -EALREADY && count == 1 && params->bssid &&
|
|
|
|
!params->local_state_change) {
|
2009-10-12 02:39:55 -04:00
|
|
|
/*
|
|
|
|
* mac80211 does not currently accept new
|
|
|
|
* authentication if we are already authenticated. As a
|
|
|
|
* workaround, force deauthentication and try again.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Retry authentication "
|
|
|
|
"after forced deauthentication");
|
2014-03-11 14:02:23 -04:00
|
|
|
drv->ignore_deauth_event = 1;
|
2009-10-12 02:39:55 -04:00
|
|
|
wpa_driver_nl80211_deauthenticate(
|
2010-03-07 14:29:34 -05:00
|
|
|
bss, params->bssid,
|
2009-10-12 02:39:55 -04:00
|
|
|
WLAN_REASON_PREV_AUTH_NOT_VALID);
|
|
|
|
nlmsg_free(msg);
|
|
|
|
goto retry;
|
|
|
|
}
|
2011-12-04 14:53:56 -05:00
|
|
|
|
|
|
|
if (ret == -ENOENT && params->freq && !is_retry) {
|
|
|
|
/*
|
|
|
|
* cfg80211 has likely expired the BSS entry even
|
|
|
|
* though it was previously available in our internal
|
|
|
|
* BSS table. To recover quickly, start a single
|
|
|
|
* channel scan on the specified channel.
|
|
|
|
*/
|
|
|
|
struct wpa_driver_scan_params scan;
|
|
|
|
int freqs[2];
|
|
|
|
|
|
|
|
os_memset(&scan, 0, sizeof(scan));
|
|
|
|
scan.num_ssids = 1;
|
|
|
|
if (params->ssid) {
|
|
|
|
scan.ssids[0].ssid = params->ssid;
|
|
|
|
scan.ssids[0].ssid_len = params->ssid_len;
|
|
|
|
}
|
|
|
|
freqs[0] = params->freq;
|
|
|
|
freqs[1] = 0;
|
|
|
|
scan.freqs = freqs;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Trigger single "
|
|
|
|
"channel scan to refresh cfg80211 BSS "
|
|
|
|
"entry");
|
|
|
|
ret = wpa_driver_nl80211_scan(bss, &scan);
|
|
|
|
if (ret == 0) {
|
|
|
|
nl80211_copy_auth_params(drv, params);
|
|
|
|
drv->scan_for_auth = 1;
|
|
|
|
}
|
2011-12-04 15:28:30 -05:00
|
|
|
} else if (is_retry) {
|
|
|
|
/*
|
|
|
|
* Need to indicate this with an event since the return
|
|
|
|
* value from the retry is not delivered to core code.
|
|
|
|
*/
|
|
|
|
union wpa_event_data event;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Authentication retry "
|
|
|
|
"failed");
|
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
os_memcpy(event.timeout_event.addr, drv->auth_bssid_,
|
|
|
|
ETH_ALEN);
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_AUTH_TIMED_OUT,
|
|
|
|
&event);
|
2011-12-04 14:53:56 -05:00
|
|
|
}
|
|
|
|
|
2009-03-20 16:26:41 -04:00
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Authentication request send "
|
|
|
|
"successfully");
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
int wpa_driver_nl80211_authenticate_retry(struct wpa_driver_nl80211_data *drv)
|
2011-12-04 14:53:56 -05:00
|
|
|
{
|
|
|
|
struct wpa_driver_auth_params params;
|
2013-10-29 20:41:39 -04:00
|
|
|
struct i802_bss *bss = drv->first_bss;
|
2011-12-04 14:53:56 -05:00
|
|
|
int i;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Try to authenticate again");
|
|
|
|
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
|
|
params.freq = drv->auth_freq;
|
|
|
|
params.auth_alg = drv->auth_alg;
|
|
|
|
params.wep_tx_keyidx = drv->auth_wep_tx_keyidx;
|
|
|
|
params.local_state_change = drv->auth_local_state_change;
|
|
|
|
params.p2p = drv->auth_p2p;
|
|
|
|
|
|
|
|
if (!is_zero_ether_addr(drv->auth_bssid_))
|
|
|
|
params.bssid = drv->auth_bssid_;
|
|
|
|
|
|
|
|
if (drv->auth_ssid_len) {
|
|
|
|
params.ssid = drv->auth_ssid;
|
|
|
|
params.ssid_len = drv->auth_ssid_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
params.ie = drv->auth_ie;
|
|
|
|
params.ie_len = drv->auth_ie_len;
|
|
|
|
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
|
|
if (drv->auth_wep_key_len[i]) {
|
|
|
|
params.wep_key[i] = drv->auth_wep_key[i];
|
|
|
|
params.wep_key_len[i] = drv->auth_wep_key_len[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
drv->retry_auth = 1;
|
|
|
|
return wpa_driver_nl80211_authenticate(bss, ¶ms);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-03 12:11:22 -04:00
|
|
|
struct phy_info_arg {
|
|
|
|
u16 *num_modes;
|
|
|
|
struct hostapd_hw_modes *modes;
|
2013-03-10 07:22:43 -04:00
|
|
|
int last_mode, last_chan_idx;
|
2009-04-03 12:11:22 -04:00
|
|
|
};
|
|
|
|
|
2013-03-10 10:35:23 -04:00
|
|
|
static void phy_info_ht_capa(struct hostapd_hw_modes *mode, struct nlattr *capa,
|
|
|
|
struct nlattr *ampdu_factor,
|
|
|
|
struct nlattr *ampdu_density,
|
|
|
|
struct nlattr *mcs_set)
|
|
|
|
{
|
|
|
|
if (capa)
|
|
|
|
mode->ht_capab = nla_get_u16(capa);
|
|
|
|
|
|
|
|
if (ampdu_factor)
|
|
|
|
mode->a_mpdu_params |= nla_get_u8(ampdu_factor) & 0x03;
|
|
|
|
|
|
|
|
if (ampdu_density)
|
|
|
|
mode->a_mpdu_params |= nla_get_u8(ampdu_density) << 2;
|
|
|
|
|
|
|
|
if (mcs_set && nla_len(mcs_set) >= 16) {
|
|
|
|
u8 *mcs;
|
|
|
|
mcs = nla_data(mcs_set);
|
|
|
|
os_memcpy(mode->mcs_set, mcs, 16);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void phy_info_vht_capa(struct hostapd_hw_modes *mode,
|
|
|
|
struct nlattr *capa,
|
|
|
|
struct nlattr *mcs_set)
|
|
|
|
{
|
|
|
|
if (capa)
|
|
|
|
mode->vht_capab = nla_get_u32(capa);
|
|
|
|
|
|
|
|
if (mcs_set && nla_len(mcs_set) >= 8) {
|
|
|
|
u8 *mcs;
|
|
|
|
mcs = nla_data(mcs_set);
|
|
|
|
os_memcpy(mode->vht_mcs_set, mcs, 8);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-10 10:44:23 -04:00
|
|
|
static void phy_info_freq(struct hostapd_hw_modes *mode,
|
|
|
|
struct hostapd_channel_data *chan,
|
|
|
|
struct nlattr *tb_freq[])
|
|
|
|
{
|
2013-04-27 14:27:15 -04:00
|
|
|
u8 channel;
|
2013-03-10 10:44:23 -04:00
|
|
|
chan->freq = nla_get_u32(tb_freq[NL80211_FREQUENCY_ATTR_FREQ]);
|
|
|
|
chan->flag = 0;
|
2014-03-05 03:23:42 -05:00
|
|
|
chan->dfs_cac_ms = 0;
|
2013-04-27 14:27:15 -04:00
|
|
|
if (ieee80211_freq_to_chan(chan->freq, &channel) != NUM_HOSTAPD_MODES)
|
|
|
|
chan->chan = channel;
|
2013-03-10 10:44:23 -04:00
|
|
|
|
|
|
|
if (tb_freq[NL80211_FREQUENCY_ATTR_DISABLED])
|
|
|
|
chan->flag |= HOSTAPD_CHAN_DISABLED;
|
2013-12-19 12:24:58 -05:00
|
|
|
if (tb_freq[NL80211_FREQUENCY_ATTR_NO_IR])
|
2014-07-07 07:20:54 -04:00
|
|
|
chan->flag |= HOSTAPD_CHAN_NO_IR;
|
2013-03-10 10:44:23 -04:00
|
|
|
if (tb_freq[NL80211_FREQUENCY_ATTR_RADAR])
|
|
|
|
chan->flag |= HOSTAPD_CHAN_RADAR;
|
2014-07-07 07:20:55 -04:00
|
|
|
if (tb_freq[NL80211_FREQUENCY_ATTR_INDOOR_ONLY])
|
|
|
|
chan->flag |= HOSTAPD_CHAN_INDOOR_ONLY;
|
|
|
|
if (tb_freq[NL80211_FREQUENCY_ATTR_GO_CONCURRENT])
|
|
|
|
chan->flag |= HOSTAPD_CHAN_GO_CONCURRENT;
|
2013-03-10 10:44:23 -04:00
|
|
|
|
2013-05-09 13:02:57 -04:00
|
|
|
if (tb_freq[NL80211_FREQUENCY_ATTR_DFS_STATE]) {
|
|
|
|
enum nl80211_dfs_state state =
|
|
|
|
nla_get_u32(tb_freq[NL80211_FREQUENCY_ATTR_DFS_STATE]);
|
|
|
|
|
|
|
|
switch (state) {
|
|
|
|
case NL80211_DFS_USABLE:
|
|
|
|
chan->flag |= HOSTAPD_CHAN_DFS_USABLE;
|
|
|
|
break;
|
|
|
|
case NL80211_DFS_AVAILABLE:
|
|
|
|
chan->flag |= HOSTAPD_CHAN_DFS_AVAILABLE;
|
|
|
|
break;
|
|
|
|
case NL80211_DFS_UNAVAILABLE:
|
|
|
|
chan->flag |= HOSTAPD_CHAN_DFS_UNAVAILABLE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2014-03-05 03:23:42 -05:00
|
|
|
|
|
|
|
if (tb_freq[NL80211_FREQUENCY_ATTR_DFS_CAC_TIME]) {
|
|
|
|
chan->dfs_cac_ms = nla_get_u32(
|
|
|
|
tb_freq[NL80211_FREQUENCY_ATTR_DFS_CAC_TIME]);
|
|
|
|
}
|
2013-03-10 10:44:23 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-10 10:35:23 -04:00
|
|
|
static int phy_info_freqs(struct phy_info_arg *phy_info,
|
|
|
|
struct hostapd_hw_modes *mode, struct nlattr *tb)
|
2009-04-03 12:11:22 -04:00
|
|
|
{
|
|
|
|
static struct nla_policy freq_policy[NL80211_FREQUENCY_ATTR_MAX + 1] = {
|
|
|
|
[NL80211_FREQUENCY_ATTR_FREQ] = { .type = NLA_U32 },
|
|
|
|
[NL80211_FREQUENCY_ATTR_DISABLED] = { .type = NLA_FLAG },
|
2013-12-19 12:24:58 -05:00
|
|
|
[NL80211_FREQUENCY_ATTR_NO_IR] = { .type = NLA_FLAG },
|
2009-04-03 12:11:22 -04:00
|
|
|
[NL80211_FREQUENCY_ATTR_RADAR] = { .type = NLA_FLAG },
|
|
|
|
[NL80211_FREQUENCY_ATTR_MAX_TX_POWER] = { .type = NLA_U32 },
|
2013-05-09 13:02:57 -04:00
|
|
|
[NL80211_FREQUENCY_ATTR_DFS_STATE] = { .type = NLA_U32 },
|
2009-04-03 12:11:22 -04:00
|
|
|
};
|
2013-03-10 10:35:23 -04:00
|
|
|
int new_channels = 0;
|
|
|
|
struct hostapd_channel_data *channel;
|
|
|
|
struct nlattr *tb_freq[NL80211_FREQUENCY_ATTR_MAX + 1];
|
|
|
|
struct nlattr *nl_freq;
|
|
|
|
int rem_freq, idx;
|
|
|
|
|
|
|
|
if (tb == NULL)
|
|
|
|
return NL_OK;
|
|
|
|
|
|
|
|
nla_for_each_nested(nl_freq, tb, rem_freq) {
|
|
|
|
nla_parse(tb_freq, NL80211_FREQUENCY_ATTR_MAX,
|
|
|
|
nla_data(nl_freq), nla_len(nl_freq), freq_policy);
|
|
|
|
if (!tb_freq[NL80211_FREQUENCY_ATTR_FREQ])
|
|
|
|
continue;
|
|
|
|
new_channels++;
|
|
|
|
}
|
|
|
|
|
|
|
|
channel = os_realloc_array(mode->channels,
|
|
|
|
mode->num_channels + new_channels,
|
|
|
|
sizeof(struct hostapd_channel_data));
|
|
|
|
if (!channel)
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
mode->channels = channel;
|
|
|
|
mode->num_channels += new_channels;
|
|
|
|
|
|
|
|
idx = phy_info->last_chan_idx;
|
|
|
|
|
|
|
|
nla_for_each_nested(nl_freq, tb, rem_freq) {
|
|
|
|
nla_parse(tb_freq, NL80211_FREQUENCY_ATTR_MAX,
|
|
|
|
nla_data(nl_freq), nla_len(nl_freq), freq_policy);
|
|
|
|
if (!tb_freq[NL80211_FREQUENCY_ATTR_FREQ])
|
|
|
|
continue;
|
2013-03-10 10:44:23 -04:00
|
|
|
phy_info_freq(mode, &mode->channels[idx], tb_freq);
|
2013-03-10 10:35:23 -04:00
|
|
|
idx++;
|
|
|
|
}
|
|
|
|
phy_info->last_chan_idx = idx;
|
|
|
|
|
|
|
|
return NL_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int phy_info_rates(struct hostapd_hw_modes *mode, struct nlattr *tb)
|
|
|
|
{
|
2009-04-03 12:11:22 -04:00
|
|
|
static struct nla_policy rate_policy[NL80211_BITRATE_ATTR_MAX + 1] = {
|
|
|
|
[NL80211_BITRATE_ATTR_RATE] = { .type = NLA_U32 },
|
2013-03-10 10:17:18 -04:00
|
|
|
[NL80211_BITRATE_ATTR_2GHZ_SHORTPREAMBLE] =
|
|
|
|
{ .type = NLA_FLAG },
|
2009-04-03 12:11:22 -04:00
|
|
|
};
|
2013-03-10 10:35:23 -04:00
|
|
|
struct nlattr *tb_rate[NL80211_BITRATE_ATTR_MAX + 1];
|
2009-04-03 12:11:22 -04:00
|
|
|
struct nlattr *nl_rate;
|
2013-03-10 10:35:23 -04:00
|
|
|
int rem_rate, idx;
|
|
|
|
|
|
|
|
if (tb == NULL)
|
|
|
|
return NL_OK;
|
|
|
|
|
|
|
|
nla_for_each_nested(nl_rate, tb, rem_rate) {
|
|
|
|
nla_parse(tb_rate, NL80211_BITRATE_ATTR_MAX,
|
|
|
|
nla_data(nl_rate), nla_len(nl_rate),
|
|
|
|
rate_policy);
|
|
|
|
if (!tb_rate[NL80211_BITRATE_ATTR_RATE])
|
|
|
|
continue;
|
|
|
|
mode->num_rates++;
|
|
|
|
}
|
|
|
|
|
|
|
|
mode->rates = os_calloc(mode->num_rates, sizeof(int));
|
|
|
|
if (!mode->rates)
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
idx = 0;
|
|
|
|
|
|
|
|
nla_for_each_nested(nl_rate, tb, rem_rate) {
|
|
|
|
nla_parse(tb_rate, NL80211_BITRATE_ATTR_MAX,
|
|
|
|
nla_data(nl_rate), nla_len(nl_rate),
|
|
|
|
rate_policy);
|
|
|
|
if (!tb_rate[NL80211_BITRATE_ATTR_RATE])
|
|
|
|
continue;
|
|
|
|
mode->rates[idx] = nla_get_u32(
|
|
|
|
tb_rate[NL80211_BITRATE_ATTR_RATE]);
|
|
|
|
idx++;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NL_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int phy_info_band(struct phy_info_arg *phy_info, struct nlattr *nl_band)
|
|
|
|
{
|
|
|
|
struct nlattr *tb_band[NL80211_BAND_ATTR_MAX + 1];
|
2009-04-03 12:11:22 -04:00
|
|
|
struct hostapd_hw_modes *mode;
|
2013-03-10 10:35:23 -04:00
|
|
|
int ret;
|
2009-04-03 12:11:22 -04:00
|
|
|
|
2013-03-10 10:17:18 -04:00
|
|
|
if (phy_info->last_mode != nl_band->nla_type) {
|
|
|
|
mode = os_realloc_array(phy_info->modes,
|
|
|
|
*phy_info->num_modes + 1,
|
|
|
|
sizeof(*mode));
|
|
|
|
if (!mode)
|
|
|
|
return NL_SKIP;
|
|
|
|
phy_info->modes = mode;
|
|
|
|
|
|
|
|
mode = &phy_info->modes[*(phy_info->num_modes)];
|
|
|
|
os_memset(mode, 0, sizeof(*mode));
|
|
|
|
mode->mode = NUM_HOSTAPD_MODES;
|
2013-07-20 10:28:42 -04:00
|
|
|
mode->flags = HOSTAPD_MODE_FLAG_HT_INFO_KNOWN |
|
|
|
|
HOSTAPD_MODE_FLAG_VHT_INFO_KNOWN;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Unsupported VHT MCS stream is defined as value 3, so the VHT
|
|
|
|
* MCS RX/TX map must be initialized with 0xffff to mark all 8
|
|
|
|
* possible streams as unsupported. This will be overridden if
|
|
|
|
* driver advertises VHT support.
|
|
|
|
*/
|
|
|
|
mode->vht_mcs_set[0] = 0xff;
|
|
|
|
mode->vht_mcs_set[1] = 0xff;
|
|
|
|
mode->vht_mcs_set[4] = 0xff;
|
|
|
|
mode->vht_mcs_set[5] = 0xff;
|
|
|
|
|
2013-03-10 10:17:18 -04:00
|
|
|
*(phy_info->num_modes) += 1;
|
|
|
|
phy_info->last_mode = nl_band->nla_type;
|
|
|
|
phy_info->last_chan_idx = 0;
|
|
|
|
} else
|
|
|
|
mode = &phy_info->modes[*(phy_info->num_modes) - 1];
|
2009-04-03 12:11:22 -04:00
|
|
|
|
2013-03-10 10:17:18 -04:00
|
|
|
nla_parse(tb_band, NL80211_BAND_ATTR_MAX, nla_data(nl_band),
|
|
|
|
nla_len(nl_band), NULL);
|
2009-04-03 12:11:22 -04:00
|
|
|
|
2013-03-10 10:35:23 -04:00
|
|
|
phy_info_ht_capa(mode, tb_band[NL80211_BAND_ATTR_HT_CAPA],
|
|
|
|
tb_band[NL80211_BAND_ATTR_HT_AMPDU_FACTOR],
|
|
|
|
tb_band[NL80211_BAND_ATTR_HT_AMPDU_DENSITY],
|
|
|
|
tb_band[NL80211_BAND_ATTR_HT_MCS_SET]);
|
|
|
|
phy_info_vht_capa(mode, tb_band[NL80211_BAND_ATTR_VHT_CAPA],
|
|
|
|
tb_band[NL80211_BAND_ATTR_VHT_MCS_SET]);
|
|
|
|
ret = phy_info_freqs(phy_info, mode, tb_band[NL80211_BAND_ATTR_FREQS]);
|
|
|
|
if (ret != NL_OK)
|
|
|
|
return ret;
|
|
|
|
ret = phy_info_rates(mode, tb_band[NL80211_BAND_ATTR_RATES]);
|
|
|
|
if (ret != NL_OK)
|
|
|
|
return ret;
|
2009-04-03 12:11:22 -04:00
|
|
|
|
2013-03-10 10:17:18 -04:00
|
|
|
return NL_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int phy_info_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct phy_info_arg *phy_info = arg;
|
|
|
|
struct nlattr *nl_band;
|
|
|
|
int rem_band;
|
|
|
|
|
|
|
|
nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
if (!tb_msg[NL80211_ATTR_WIPHY_BANDS])
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
nla_for_each_nested(nl_band, tb_msg[NL80211_ATTR_WIPHY_BANDS], rem_band)
|
|
|
|
{
|
|
|
|
int res = phy_info_band(phy_info, nl_band);
|
|
|
|
if (res != NL_OK)
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2009-04-03 12:11:22 -04:00
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
2013-03-10 10:17:18 -04:00
|
|
|
|
2009-04-03 12:11:22 -04:00
|
|
|
static struct hostapd_hw_modes *
|
2013-03-18 20:01:46 -04:00
|
|
|
wpa_driver_nl80211_postprocess_modes(struct hostapd_hw_modes *modes,
|
|
|
|
u16 *num_modes)
|
2009-04-03 12:11:22 -04:00
|
|
|
{
|
|
|
|
u16 m;
|
|
|
|
struct hostapd_hw_modes *mode11g = NULL, *nmodes, *mode;
|
|
|
|
int i, mode11g_idx = -1;
|
|
|
|
|
2013-03-18 20:01:46 -04:00
|
|
|
/* heuristic to set up modes */
|
|
|
|
for (m = 0; m < *num_modes; m++) {
|
|
|
|
if (!modes[m].num_channels)
|
|
|
|
continue;
|
|
|
|
if (modes[m].channels[0].freq < 4000) {
|
|
|
|
modes[m].mode = HOSTAPD_MODE_IEEE80211B;
|
|
|
|
for (i = 0; i < modes[m].num_rates; i++) {
|
|
|
|
if (modes[m].rates[i] > 200) {
|
|
|
|
modes[m].mode = HOSTAPD_MODE_IEEE80211G;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if (modes[m].channels[0].freq > 50000)
|
|
|
|
modes[m].mode = HOSTAPD_MODE_IEEE80211AD;
|
|
|
|
else
|
|
|
|
modes[m].mode = HOSTAPD_MODE_IEEE80211A;
|
|
|
|
}
|
|
|
|
|
2009-04-03 12:11:22 -04:00
|
|
|
/* If only 802.11g mode is included, use it to construct matching
|
|
|
|
* 802.11b mode data. */
|
|
|
|
|
|
|
|
for (m = 0; m < *num_modes; m++) {
|
|
|
|
if (modes[m].mode == HOSTAPD_MODE_IEEE80211B)
|
|
|
|
return modes; /* 802.11b already included */
|
|
|
|
if (modes[m].mode == HOSTAPD_MODE_IEEE80211G)
|
|
|
|
mode11g_idx = m;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mode11g_idx < 0)
|
|
|
|
return modes; /* 2.4 GHz band not supported at all */
|
|
|
|
|
2012-08-13 14:21:23 -04:00
|
|
|
nmodes = os_realloc_array(modes, *num_modes + 1, sizeof(*nmodes));
|
2009-04-03 12:11:22 -04:00
|
|
|
if (nmodes == NULL)
|
|
|
|
return modes; /* Could not add 802.11b mode */
|
|
|
|
|
|
|
|
mode = &nmodes[*num_modes];
|
|
|
|
os_memset(mode, 0, sizeof(*mode));
|
|
|
|
(*num_modes)++;
|
|
|
|
modes = nmodes;
|
|
|
|
|
|
|
|
mode->mode = HOSTAPD_MODE_IEEE80211B;
|
|
|
|
|
|
|
|
mode11g = &modes[mode11g_idx];
|
|
|
|
mode->num_channels = mode11g->num_channels;
|
|
|
|
mode->channels = os_malloc(mode11g->num_channels *
|
|
|
|
sizeof(struct hostapd_channel_data));
|
|
|
|
if (mode->channels == NULL) {
|
|
|
|
(*num_modes)--;
|
|
|
|
return modes; /* Could not add 802.11b mode */
|
|
|
|
}
|
|
|
|
os_memcpy(mode->channels, mode11g->channels,
|
|
|
|
mode11g->num_channels * sizeof(struct hostapd_channel_data));
|
|
|
|
|
|
|
|
mode->num_rates = 0;
|
2009-12-09 14:57:50 -05:00
|
|
|
mode->rates = os_malloc(4 * sizeof(int));
|
2009-04-03 12:11:22 -04:00
|
|
|
if (mode->rates == NULL) {
|
|
|
|
os_free(mode->channels);
|
|
|
|
(*num_modes)--;
|
|
|
|
return modes; /* Could not add 802.11b mode */
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < mode11g->num_rates; i++) {
|
2009-12-09 14:57:50 -05:00
|
|
|
if (mode11g->rates[i] != 10 && mode11g->rates[i] != 20 &&
|
|
|
|
mode11g->rates[i] != 55 && mode11g->rates[i] != 110)
|
2009-04-03 12:11:22 -04:00
|
|
|
continue;
|
|
|
|
mode->rates[mode->num_rates] = mode11g->rates[i];
|
|
|
|
mode->num_rates++;
|
|
|
|
if (mode->num_rates == 4)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mode->num_rates == 0) {
|
|
|
|
os_free(mode->channels);
|
|
|
|
os_free(mode->rates);
|
|
|
|
(*num_modes)--;
|
|
|
|
return modes; /* No 802.11b rates */
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Added 802.11b mode based on 802.11g "
|
|
|
|
"information");
|
|
|
|
|
|
|
|
return modes;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-12 11:13:37 -05:00
|
|
|
static void nl80211_set_ht40_mode(struct hostapd_hw_modes *mode, int start,
|
|
|
|
int end)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
|
|
|
|
for (c = 0; c < mode->num_channels; c++) {
|
|
|
|
struct hostapd_channel_data *chan = &mode->channels[c];
|
|
|
|
if (chan->freq - 10 >= start && chan->freq + 10 <= end)
|
|
|
|
chan->flag |= HOSTAPD_CHAN_HT40;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void nl80211_set_ht40_mode_sec(struct hostapd_hw_modes *mode, int start,
|
|
|
|
int end)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
|
|
|
|
for (c = 0; c < mode->num_channels; c++) {
|
|
|
|
struct hostapd_channel_data *chan = &mode->channels[c];
|
|
|
|
if (!(chan->flag & HOSTAPD_CHAN_HT40))
|
|
|
|
continue;
|
|
|
|
if (chan->freq - 30 >= start && chan->freq - 10 <= end)
|
|
|
|
chan->flag |= HOSTAPD_CHAN_HT40MINUS;
|
|
|
|
if (chan->freq + 10 >= start && chan->freq + 30 <= end)
|
|
|
|
chan->flag |= HOSTAPD_CHAN_HT40PLUS;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-12-30 09:41:51 -05:00
|
|
|
static void nl80211_reg_rule_max_eirp(u32 start, u32 end, u32 max_eirp,
|
2013-10-27 12:42:16 -04:00
|
|
|
struct phy_info_arg *results)
|
|
|
|
{
|
|
|
|
u16 m;
|
|
|
|
|
|
|
|
for (m = 0; m < *results->num_modes; m++) {
|
|
|
|
int c;
|
|
|
|
struct hostapd_hw_modes *mode = &results->modes[m];
|
|
|
|
|
|
|
|
for (c = 0; c < mode->num_channels; c++) {
|
|
|
|
struct hostapd_channel_data *chan = &mode->channels[c];
|
|
|
|
if ((u32) chan->freq - 10 >= start &&
|
|
|
|
(u32) chan->freq + 10 <= end)
|
|
|
|
chan->max_tx_power = max_eirp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-12-30 09:41:51 -05:00
|
|
|
static void nl80211_reg_rule_ht40(u32 start, u32 end,
|
2010-11-12 11:13:37 -05:00
|
|
|
struct phy_info_arg *results)
|
|
|
|
{
|
|
|
|
u16 m;
|
|
|
|
|
|
|
|
for (m = 0; m < *results->num_modes; m++) {
|
|
|
|
if (!(results->modes[m].ht_capab &
|
|
|
|
HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET))
|
|
|
|
continue;
|
|
|
|
nl80211_set_ht40_mode(&results->modes[m], start, end);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void nl80211_reg_rule_sec(struct nlattr *tb[],
|
|
|
|
struct phy_info_arg *results)
|
|
|
|
{
|
|
|
|
u32 start, end, max_bw;
|
|
|
|
u16 m;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_FREQ_RANGE_START] == NULL ||
|
|
|
|
tb[NL80211_ATTR_FREQ_RANGE_END] == NULL ||
|
|
|
|
tb[NL80211_ATTR_FREQ_RANGE_MAX_BW] == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
start = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_START]) / 1000;
|
|
|
|
end = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_END]) / 1000;
|
|
|
|
max_bw = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_MAX_BW]) / 1000;
|
|
|
|
|
|
|
|
if (max_bw < 20)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (m = 0; m < *results->num_modes; m++) {
|
|
|
|
if (!(results->modes[m].ht_capab &
|
|
|
|
HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET))
|
|
|
|
continue;
|
|
|
|
nl80211_set_ht40_mode_sec(&results->modes[m], start, end);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-27 13:37:10 -04:00
|
|
|
static void nl80211_set_vht_mode(struct hostapd_hw_modes *mode, int start,
|
|
|
|
int end)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
|
|
|
|
for (c = 0; c < mode->num_channels; c++) {
|
|
|
|
struct hostapd_channel_data *chan = &mode->channels[c];
|
|
|
|
if (chan->freq - 10 >= start && chan->freq + 70 <= end)
|
|
|
|
chan->flag |= HOSTAPD_CHAN_VHT_10_70;
|
|
|
|
|
|
|
|
if (chan->freq - 30 >= start && chan->freq + 50 <= end)
|
|
|
|
chan->flag |= HOSTAPD_CHAN_VHT_30_50;
|
|
|
|
|
|
|
|
if (chan->freq - 50 >= start && chan->freq + 30 <= end)
|
|
|
|
chan->flag |= HOSTAPD_CHAN_VHT_50_30;
|
|
|
|
|
|
|
|
if (chan->freq - 70 >= start && chan->freq + 10 <= end)
|
|
|
|
chan->flag |= HOSTAPD_CHAN_VHT_70_10;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void nl80211_reg_rule_vht(struct nlattr *tb[],
|
|
|
|
struct phy_info_arg *results)
|
|
|
|
{
|
|
|
|
u32 start, end, max_bw;
|
|
|
|
u16 m;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_FREQ_RANGE_START] == NULL ||
|
|
|
|
tb[NL80211_ATTR_FREQ_RANGE_END] == NULL ||
|
|
|
|
tb[NL80211_ATTR_FREQ_RANGE_MAX_BW] == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
start = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_START]) / 1000;
|
|
|
|
end = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_END]) / 1000;
|
|
|
|
max_bw = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_MAX_BW]) / 1000;
|
|
|
|
|
|
|
|
if (max_bw < 80)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (m = 0; m < *results->num_modes; m++) {
|
|
|
|
if (!(results->modes[m].ht_capab &
|
|
|
|
HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET))
|
|
|
|
continue;
|
|
|
|
/* TODO: use a real VHT support indication */
|
|
|
|
if (!results->modes[m].vht_capab)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
nl80211_set_vht_mode(&results->modes[m], start, end);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-24 17:12:23 -05:00
|
|
|
static const char * dfs_domain_name(enum nl80211_dfs_regions region)
|
|
|
|
{
|
|
|
|
switch (region) {
|
|
|
|
case NL80211_DFS_UNSET:
|
|
|
|
return "DFS-UNSET";
|
|
|
|
case NL80211_DFS_FCC:
|
|
|
|
return "DFS-FCC";
|
|
|
|
case NL80211_DFS_ETSI:
|
|
|
|
return "DFS-ETSI";
|
|
|
|
case NL80211_DFS_JP:
|
|
|
|
return "DFS-JP";
|
|
|
|
default:
|
|
|
|
return "DFS-invalid";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-12 11:13:37 -05:00
|
|
|
static int nl80211_get_reg(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct phy_info_arg *results = arg;
|
|
|
|
struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *nl_rule;
|
|
|
|
struct nlattr *tb_rule[NL80211_FREQUENCY_ATTR_MAX + 1];
|
|
|
|
int rem_rule;
|
|
|
|
static struct nla_policy reg_policy[NL80211_FREQUENCY_ATTR_MAX + 1] = {
|
|
|
|
[NL80211_ATTR_REG_RULE_FLAGS] = { .type = NLA_U32 },
|
|
|
|
[NL80211_ATTR_FREQ_RANGE_START] = { .type = NLA_U32 },
|
|
|
|
[NL80211_ATTR_FREQ_RANGE_END] = { .type = NLA_U32 },
|
|
|
|
[NL80211_ATTR_FREQ_RANGE_MAX_BW] = { .type = NLA_U32 },
|
|
|
|
[NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN] = { .type = NLA_U32 },
|
|
|
|
[NL80211_ATTR_POWER_RULE_MAX_EIRP] = { .type = NLA_U32 },
|
|
|
|
};
|
|
|
|
|
|
|
|
nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
if (!tb_msg[NL80211_ATTR_REG_ALPHA2] ||
|
|
|
|
!tb_msg[NL80211_ATTR_REG_RULES]) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: No regulatory information "
|
|
|
|
"available");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
2014-01-24 17:12:23 -05:00
|
|
|
if (tb_msg[NL80211_ATTR_DFS_REGION]) {
|
|
|
|
enum nl80211_dfs_regions dfs_domain;
|
|
|
|
dfs_domain = nla_get_u8(tb_msg[NL80211_ATTR_DFS_REGION]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Regulatory information - country=%s (%s)",
|
|
|
|
(char *) nla_data(tb_msg[NL80211_ATTR_REG_ALPHA2]),
|
|
|
|
dfs_domain_name(dfs_domain));
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Regulatory information - country=%s",
|
|
|
|
(char *) nla_data(tb_msg[NL80211_ATTR_REG_ALPHA2]));
|
|
|
|
}
|
2010-11-12 11:13:37 -05:00
|
|
|
|
|
|
|
nla_for_each_nested(nl_rule, tb_msg[NL80211_ATTR_REG_RULES], rem_rule)
|
|
|
|
{
|
2014-02-25 06:34:20 -05:00
|
|
|
u32 start, end, max_eirp = 0, max_bw = 0, flags = 0;
|
2010-11-12 11:13:37 -05:00
|
|
|
nla_parse(tb_rule, NL80211_FREQUENCY_ATTR_MAX,
|
|
|
|
nla_data(nl_rule), nla_len(nl_rule), reg_policy);
|
2013-12-30 09:41:51 -05:00
|
|
|
if (tb_rule[NL80211_ATTR_FREQ_RANGE_START] == NULL ||
|
|
|
|
tb_rule[NL80211_ATTR_FREQ_RANGE_END] == NULL)
|
|
|
|
continue;
|
|
|
|
start = nla_get_u32(tb_rule[NL80211_ATTR_FREQ_RANGE_START]) / 1000;
|
|
|
|
end = nla_get_u32(tb_rule[NL80211_ATTR_FREQ_RANGE_END]) / 1000;
|
|
|
|
if (tb_rule[NL80211_ATTR_POWER_RULE_MAX_EIRP])
|
|
|
|
max_eirp = nla_get_u32(tb_rule[NL80211_ATTR_POWER_RULE_MAX_EIRP]) / 100;
|
|
|
|
if (tb_rule[NL80211_ATTR_FREQ_RANGE_MAX_BW])
|
|
|
|
max_bw = nla_get_u32(tb_rule[NL80211_ATTR_FREQ_RANGE_MAX_BW]) / 1000;
|
2014-02-25 06:34:20 -05:00
|
|
|
if (tb_rule[NL80211_ATTR_REG_RULE_FLAGS])
|
|
|
|
flags = nla_get_u32(tb_rule[NL80211_ATTR_REG_RULE_FLAGS]);
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: %u-%u @ %u MHz %u mBm%s%s%s%s%s%s%s%s",
|
|
|
|
start, end, max_bw, max_eirp,
|
|
|
|
flags & NL80211_RRF_NO_OFDM ? " (no OFDM)" : "",
|
|
|
|
flags & NL80211_RRF_NO_CCK ? " (no CCK)" : "",
|
|
|
|
flags & NL80211_RRF_NO_INDOOR ? " (no indoor)" : "",
|
|
|
|
flags & NL80211_RRF_NO_OUTDOOR ? " (no outdoor)" :
|
|
|
|
"",
|
|
|
|
flags & NL80211_RRF_DFS ? " (DFS)" : "",
|
|
|
|
flags & NL80211_RRF_PTP_ONLY ? " (PTP only)" : "",
|
|
|
|
flags & NL80211_RRF_PTMP_ONLY ? " (PTMP only)" : "",
|
|
|
|
flags & NL80211_RRF_NO_IR ? " (no IR)" : "");
|
2013-12-30 09:41:51 -05:00
|
|
|
if (max_bw >= 40)
|
|
|
|
nl80211_reg_rule_ht40(start, end, results);
|
|
|
|
if (tb_rule[NL80211_ATTR_POWER_RULE_MAX_EIRP])
|
|
|
|
nl80211_reg_rule_max_eirp(start, end, max_eirp,
|
|
|
|
results);
|
2010-11-12 11:13:37 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
nla_for_each_nested(nl_rule, tb_msg[NL80211_ATTR_REG_RULES], rem_rule)
|
|
|
|
{
|
|
|
|
nla_parse(tb_rule, NL80211_FREQUENCY_ATTR_MAX,
|
|
|
|
nla_data(nl_rule), nla_len(nl_rule), reg_policy);
|
|
|
|
nl80211_reg_rule_sec(tb_rule, results);
|
|
|
|
}
|
|
|
|
|
2013-10-27 13:37:10 -04:00
|
|
|
nla_for_each_nested(nl_rule, tb_msg[NL80211_ATTR_REG_RULES], rem_rule)
|
|
|
|
{
|
|
|
|
nla_parse(tb_rule, NL80211_FREQUENCY_ATTR_MAX,
|
|
|
|
nla_data(nl_rule), nla_len(nl_rule), reg_policy);
|
|
|
|
nl80211_reg_rule_vht(tb_rule, results);
|
|
|
|
}
|
|
|
|
|
2010-11-12 11:13:37 -05:00
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-27 13:37:10 -04:00
|
|
|
static int nl80211_set_regulatory_flags(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct phy_info_arg *results)
|
2010-11-12 11:13:37 -05:00
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG);
|
2010-11-12 11:13:37 -05:00
|
|
|
return send_and_recv_msgs(drv, msg, nl80211_get_reg, results);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-03 12:11:22 -04:00
|
|
|
static struct hostapd_hw_modes *
|
|
|
|
wpa_driver_nl80211_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags)
|
|
|
|
{
|
2013-03-10 07:22:43 -04:00
|
|
|
u32 feat;
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-03 12:11:22 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
struct phy_info_arg result = {
|
|
|
|
.num_modes = num_modes,
|
|
|
|
.modes = NULL,
|
2013-03-10 07:22:43 -04:00
|
|
|
.last_mode = -1,
|
2009-04-03 12:11:22 -04:00
|
|
|
};
|
|
|
|
|
|
|
|
*num_modes = 0;
|
|
|
|
*flags = 0;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return NULL;
|
|
|
|
|
2013-03-10 07:22:43 -04:00
|
|
|
feat = get_nl80211_protocol_features(drv);
|
|
|
|
if (feat & NL80211_PROTOCOL_FEATURE_SPLIT_WIPHY_DUMP)
|
|
|
|
nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_WIPHY);
|
|
|
|
else
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_WIPHY);
|
2009-04-03 12:11:22 -04:00
|
|
|
|
2013-03-10 07:22:43 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_SPLIT_WIPHY_DUMP);
|
2014-02-13 04:24:01 -05:00
|
|
|
if (nl80211_set_iface_id(msg, bss) < 0)
|
|
|
|
goto nla_put_failure;
|
2009-04-03 12:11:22 -04:00
|
|
|
|
2010-11-12 11:13:37 -05:00
|
|
|
if (send_and_recv_msgs(drv, msg, phy_info_handler, &result) == 0) {
|
2013-10-27 13:37:10 -04:00
|
|
|
nl80211_set_regulatory_flags(drv, &result);
|
2013-03-18 20:01:46 -04:00
|
|
|
return wpa_driver_nl80211_postprocess_modes(result.modes,
|
|
|
|
num_modes);
|
2010-11-12 11:13:37 -05:00
|
|
|
}
|
2011-12-17 05:19:36 -05:00
|
|
|
msg = NULL;
|
2009-04-03 12:11:22 -04:00
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-03 12:11:22 -04:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
static int wpa_driver_nl80211_send_mntr(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const void *data, size_t len,
|
|
|
|
int encrypt, int noack)
|
2009-04-03 09:45:09 -04:00
|
|
|
{
|
|
|
|
__u8 rtap_hdr[] = {
|
|
|
|
0x00, 0x00, /* radiotap version */
|
|
|
|
0x0e, 0x00, /* radiotap length */
|
|
|
|
0x02, 0xc0, 0x00, 0x00, /* bmap: flags, tx and rx flags */
|
|
|
|
IEEE80211_RADIOTAP_F_FRAG, /* F_FRAG (fragment if required) */
|
|
|
|
0x00, /* padding */
|
|
|
|
0x00, 0x00, /* RX and TX flags to indicate that */
|
|
|
|
0x00, 0x00, /* this is the injected frame directly */
|
|
|
|
};
|
|
|
|
struct iovec iov[2] = {
|
|
|
|
{
|
|
|
|
.iov_base = &rtap_hdr,
|
|
|
|
.iov_len = sizeof(rtap_hdr),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.iov_base = (void *) data,
|
|
|
|
.iov_len = len,
|
|
|
|
}
|
|
|
|
};
|
|
|
|
struct msghdr msg = {
|
|
|
|
.msg_name = NULL,
|
|
|
|
.msg_namelen = 0,
|
|
|
|
.msg_iov = iov,
|
|
|
|
.msg_iovlen = 2,
|
|
|
|
.msg_control = NULL,
|
|
|
|
.msg_controllen = 0,
|
|
|
|
.msg_flags = 0,
|
|
|
|
};
|
2010-11-24 07:58:58 -05:00
|
|
|
int res;
|
2011-11-19 12:22:13 -05:00
|
|
|
u16 txflags = 0;
|
2009-04-03 09:45:09 -04:00
|
|
|
|
|
|
|
if (encrypt)
|
|
|
|
rtap_hdr[8] |= IEEE80211_RADIOTAP_F_WEP;
|
|
|
|
|
2011-06-28 14:59:44 -04:00
|
|
|
if (drv->monitor_sock < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: No monitor socket available "
|
|
|
|
"for %s", __func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-11-19 12:22:13 -05:00
|
|
|
if (noack)
|
|
|
|
txflags |= IEEE80211_RADIOTAP_F_TX_NOACK;
|
2012-11-11 13:28:27 -05:00
|
|
|
WPA_PUT_LE16(&rtap_hdr[12], txflags);
|
2011-11-19 12:22:13 -05:00
|
|
|
|
2010-11-24 07:58:58 -05:00
|
|
|
res = sendmsg(drv->monitor_sock, &msg, 0);
|
|
|
|
if (res < 0) {
|
|
|
|
wpa_printf(MSG_INFO, "nl80211: sendmsg: %s", strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
2009-04-03 09:45:09 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
static int wpa_driver_nl80211_send_frame(struct i802_bss *bss,
|
|
|
|
const void *data, size_t len,
|
2012-01-26 10:44:11 -05:00
|
|
|
int encrypt, int noack,
|
|
|
|
unsigned int freq, int no_cck,
|
|
|
|
int offchanok, unsigned int wait_time)
|
2011-12-06 11:24:00 -05:00
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
u64 cookie;
|
2013-10-21 11:09:37 -04:00
|
|
|
int res;
|
2011-12-06 11:24:00 -05:00
|
|
|
|
2014-05-13 17:47:42 -04:00
|
|
|
if (freq == 0 && drv->nlmode == NL80211_IFTYPE_ADHOC) {
|
|
|
|
freq = nl80211_get_assoc_freq(drv);
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: send_frame - Use assoc_freq=%u for IBSS",
|
|
|
|
freq);
|
|
|
|
}
|
2013-09-25 16:18:33 -04:00
|
|
|
if (freq == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: send_frame - Use bss->freq=%u",
|
|
|
|
bss->freq);
|
2012-01-26 10:44:11 -05:00
|
|
|
freq = bss->freq;
|
2013-09-25 16:18:33 -04:00
|
|
|
}
|
2012-01-26 10:44:11 -05:00
|
|
|
|
2013-09-28 04:33:38 -04:00
|
|
|
if (drv->use_monitor) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: send_frame(freq=%u bss->freq=%u) -> send_mntr",
|
|
|
|
freq, bss->freq);
|
2011-12-06 11:24:00 -05:00
|
|
|
return wpa_driver_nl80211_send_mntr(drv, data, len,
|
|
|
|
encrypt, noack);
|
2013-09-28 04:33:38 -04:00
|
|
|
}
|
2011-12-06 11:24:00 -05:00
|
|
|
|
2013-09-28 04:33:38 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: send_frame -> send_frame_cmd");
|
2013-10-21 11:09:37 -04:00
|
|
|
res = nl80211_send_frame_cmd(bss, freq, wait_time, data, len,
|
|
|
|
&cookie, no_cck, noack, offchanok);
|
|
|
|
if (res == 0 && !noack) {
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
u16 fc;
|
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
|
|
|
fc = le_to_host16(mgmt->frame_control);
|
|
|
|
if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
|
|
|
|
WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION) {
|
|
|
|
wpa_printf(MSG_MSGDUMP,
|
|
|
|
"nl80211: Update send_action_cookie from 0x%llx to 0x%llx",
|
|
|
|
(long long unsigned int)
|
|
|
|
drv->send_action_cookie,
|
|
|
|
(long long unsigned int) cookie);
|
|
|
|
drv->send_action_cookie = cookie;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
2011-12-06 11:24:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
static int wpa_driver_nl80211_send_mlme(struct i802_bss *bss, const u8 *data,
|
|
|
|
size_t data_len, int noack,
|
|
|
|
unsigned int freq, int no_cck,
|
|
|
|
int offchanok,
|
|
|
|
unsigned int wait_time)
|
2009-04-03 09:45:09 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-03 09:45:09 -04:00
|
|
|
struct ieee80211_mgmt *mgmt;
|
2009-07-26 14:15:47 -04:00
|
|
|
int encrypt = 1;
|
2009-04-03 09:45:09 -04:00
|
|
|
u16 fc;
|
|
|
|
|
|
|
|
mgmt = (struct ieee80211_mgmt *) data;
|
|
|
|
fc = le_to_host16(mgmt->frame_control);
|
2014-06-03 04:24:54 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: send_mlme - da= " MACSTR
|
|
|
|
" noack=%d freq=%u no_cck=%d offchanok=%d wait_time=%u fc=0x%x (%s) nlmode=%d",
|
|
|
|
MAC2STR(mgmt->da), noack, freq, no_cck, offchanok, wait_time,
|
|
|
|
fc, fc2str(fc), drv->nlmode);
|
2009-04-03 09:45:09 -04:00
|
|
|
|
2013-06-25 06:49:16 -04:00
|
|
|
if ((is_sta_interface(drv->nlmode) ||
|
|
|
|
drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) &&
|
2010-10-10 11:10:37 -04:00
|
|
|
WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
|
|
|
|
WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_RESP) {
|
|
|
|
/*
|
|
|
|
* The use of last_mgmt_freq is a bit of a hack,
|
|
|
|
* but it works due to the single-threaded nature
|
|
|
|
* of wpa_supplicant.
|
|
|
|
*/
|
2013-09-25 16:18:33 -04:00
|
|
|
if (freq == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Use last_mgmt_freq=%d",
|
|
|
|
drv->last_mgmt_freq);
|
2012-01-26 10:44:11 -05:00
|
|
|
freq = drv->last_mgmt_freq;
|
2013-09-25 16:18:33 -04:00
|
|
|
}
|
2012-01-26 10:44:11 -05:00
|
|
|
return nl80211_send_frame_cmd(bss, freq, 0,
|
2011-11-19 12:56:34 -05:00
|
|
|
data, data_len, NULL, 1, noack,
|
|
|
|
1);
|
2010-10-10 11:10:37 -04:00
|
|
|
}
|
|
|
|
|
2011-11-19 06:42:49 -05:00
|
|
|
if (drv->device_ap_sme && is_ap_interface(drv->nlmode)) {
|
2013-09-25 16:18:33 -04:00
|
|
|
if (freq == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Use bss->freq=%d",
|
|
|
|
bss->freq);
|
2012-01-26 10:44:11 -05:00
|
|
|
freq = bss->freq;
|
2013-09-25 16:18:33 -04:00
|
|
|
}
|
2012-05-11 11:24:31 -04:00
|
|
|
return nl80211_send_frame_cmd(bss, freq,
|
|
|
|
(int) freq == bss->freq ? 0 :
|
|
|
|
wait_time,
|
2012-01-23 13:12:06 -05:00
|
|
|
data, data_len,
|
|
|
|
&drv->send_action_cookie,
|
2012-01-26 10:44:11 -05:00
|
|
|
no_cck, noack, offchanok);
|
2011-08-29 07:26:55 -04:00
|
|
|
}
|
|
|
|
|
2009-04-03 09:45:09 -04:00
|
|
|
if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
|
|
|
|
WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_AUTH) {
|
|
|
|
/*
|
|
|
|
* Only one of the authentication frame types is encrypted.
|
|
|
|
* In order for static WEP encryption to work properly (i.e.,
|
|
|
|
* to not encrypt the frame), we need to tell mac80211 about
|
|
|
|
* the frames that must not be encrypted.
|
|
|
|
*/
|
|
|
|
u16 auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
|
|
|
|
u16 auth_trans = le_to_host16(mgmt->u.auth.auth_transaction);
|
2009-07-26 14:15:47 -04:00
|
|
|
if (auth_alg != WLAN_AUTH_SHARED_KEY || auth_trans != 3)
|
|
|
|
encrypt = 0;
|
2009-04-03 09:45:09 -04:00
|
|
|
}
|
|
|
|
|
2013-09-28 04:33:38 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: send_mlme -> send_frame");
|
2011-12-06 11:24:00 -05:00
|
|
|
return wpa_driver_nl80211_send_frame(bss, data, data_len, encrypt,
|
2012-01-26 10:44:11 -05:00
|
|
|
noack, freq, no_cck, offchanok,
|
|
|
|
wait_time);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-10-17 12:31:33 -04:00
|
|
|
static int nl80211_set_bss(struct i802_bss *bss, int cts, int preamble,
|
2011-12-03 05:16:03 -05:00
|
|
|
int slot, int ht_opmode, int ap_isolate,
|
|
|
|
int *basic_rates)
|
2011-10-17 12:31:33 -04:00
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_BSS);
|
2011-10-17 12:31:33 -04:00
|
|
|
|
|
|
|
if (cts >= 0)
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_BSS_CTS_PROT, cts);
|
|
|
|
if (preamble >= 0)
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_BSS_SHORT_PREAMBLE, preamble);
|
|
|
|
if (slot >= 0)
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_BSS_SHORT_SLOT_TIME, slot);
|
|
|
|
if (ht_opmode >= 0)
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_BSS_HT_OPMODE, ht_opmode);
|
2011-12-03 04:43:18 -05:00
|
|
|
if (ap_isolate >= 0)
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_AP_ISOLATE, ap_isolate);
|
2011-12-03 05:16:03 -05:00
|
|
|
|
|
|
|
if (basic_rates) {
|
|
|
|
u8 rates[NL80211_MAX_SUPP_RATES];
|
|
|
|
u8 rates_len = 0;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < NL80211_MAX_SUPP_RATES && basic_rates[i] >= 0;
|
|
|
|
i++)
|
|
|
|
rates[rates_len++] = basic_rates[i] / 5;
|
|
|
|
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_BSS_BASIC_RATES, rates_len, rates);
|
|
|
|
}
|
|
|
|
|
2011-10-17 12:31:33 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(bss->ifname));
|
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2011-10-17 12:31:33 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-05-23 07:38:20 -04:00
|
|
|
static int wpa_driver_nl80211_set_acl(void *priv,
|
|
|
|
struct hostapd_acl_params *params)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
struct nlattr *acl;
|
|
|
|
unsigned int i;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
if (!(drv->capa.max_acl_mac_addrs))
|
|
|
|
return -ENOTSUP;
|
|
|
|
|
|
|
|
if (params->num_mac_acl > drv->capa.max_acl_mac_addrs)
|
|
|
|
return -ENOTSUP;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Set %s ACL (num_mac_acl=%u)",
|
|
|
|
params->acl_policy ? "Accept" : "Deny", params->num_mac_acl);
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_MAC_ACL);
|
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_ACL_POLICY, params->acl_policy ?
|
|
|
|
NL80211_ACL_POLICY_DENY_UNLESS_LISTED :
|
|
|
|
NL80211_ACL_POLICY_ACCEPT_UNLESS_LISTED);
|
|
|
|
|
|
|
|
acl = nla_nest_start(msg, NL80211_ATTR_MAC_ADDRS);
|
|
|
|
if (acl == NULL)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
for (i = 0; i < params->num_mac_acl; i++)
|
|
|
|
NLA_PUT(msg, i + 1, ETH_ALEN, params->mac_acl[i].addr);
|
|
|
|
|
|
|
|
nla_nest_end(msg, acl);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to set MAC ACL: %d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
}
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-08-10 06:22:37 -04:00
|
|
|
static int wpa_driver_nl80211_set_ap(void *priv,
|
|
|
|
struct wpa_driver_ap_params *params)
|
2009-04-02 09:09:48 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-02 09:09:48 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
u8 cmd = NL80211_CMD_NEW_BEACON;
|
|
|
|
int ret;
|
2009-04-09 16:44:39 -04:00
|
|
|
int beacon_set;
|
2010-03-06 15:36:40 -05:00
|
|
|
int ifindex = if_nametoindex(bss->ifname);
|
2011-08-26 14:11:42 -04:00
|
|
|
int num_suites;
|
2014-10-19 23:21:41 -04:00
|
|
|
int smps_mode;
|
2013-12-30 11:59:29 -05:00
|
|
|
u32 suites[10], suite;
|
2011-08-26 14:11:42 -04:00
|
|
|
u32 ver;
|
2009-04-09 16:44:39 -04:00
|
|
|
|
|
|
|
beacon_set = bss->beacon_set;
|
2009-04-02 09:09:48 -04:00
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Set beacon (beacon_set=%d)",
|
2009-04-09 16:44:39 -04:00
|
|
|
beacon_set);
|
|
|
|
if (beacon_set)
|
2009-04-02 09:09:48 -04:00
|
|
|
cmd = NL80211_CMD_SET_BEACON;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, cmd);
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_hexdump(MSG_DEBUG, "nl80211: Beacon head",
|
|
|
|
params->head, params->head_len);
|
2011-08-10 06:22:37 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_BEACON_HEAD, params->head_len, params->head);
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_hexdump(MSG_DEBUG, "nl80211: Beacon tail",
|
|
|
|
params->tail, params->tail_len);
|
2011-08-10 06:22:37 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_BEACON_TAIL, params->tail_len, params->tail);
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: ifindex=%d", ifindex);
|
2009-04-09 16:44:39 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: beacon_int=%d", params->beacon_int);
|
2011-08-10 06:22:37 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_BEACON_INTERVAL, params->beacon_int);
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: dtim_period=%d", params->dtim_period);
|
2011-08-10 06:22:37 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_DTIM_PERIOD, params->dtim_period);
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_hexdump_ascii(MSG_DEBUG, "nl80211: ssid",
|
|
|
|
params->ssid, params->ssid_len);
|
2011-08-10 06:29:32 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
|
|
|
|
params->ssid);
|
2013-03-21 09:40:25 -04:00
|
|
|
if (params->proberesp && params->proberesp_len) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, "nl80211: proberesp (offload)",
|
|
|
|
params->proberesp, params->proberesp_len);
|
2011-12-10 14:01:36 -05:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_PROBE_RESP, params->proberesp_len,
|
|
|
|
params->proberesp);
|
2013-03-21 09:40:25 -04:00
|
|
|
}
|
2011-08-26 14:12:47 -04:00
|
|
|
switch (params->hide_ssid) {
|
|
|
|
case NO_SSID_HIDING:
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: hidden SSID not in use");
|
2011-08-26 14:12:47 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_HIDDEN_SSID,
|
|
|
|
NL80211_HIDDEN_SSID_NOT_IN_USE);
|
|
|
|
break;
|
|
|
|
case HIDDEN_SSID_ZERO_LEN:
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero len");
|
2011-08-26 14:12:47 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_HIDDEN_SSID,
|
|
|
|
NL80211_HIDDEN_SSID_ZERO_LEN);
|
|
|
|
break;
|
|
|
|
case HIDDEN_SSID_ZERO_CONTENTS:
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero contents");
|
2011-08-26 14:12:47 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_HIDDEN_SSID,
|
|
|
|
NL80211_HIDDEN_SSID_ZERO_CONTENTS);
|
|
|
|
break;
|
|
|
|
}
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: privacy=%d", params->privacy);
|
2011-08-26 14:11:42 -04:00
|
|
|
if (params->privacy)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_PRIVACY);
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: auth_algs=0x%x", params->auth_algs);
|
2011-08-26 14:11:42 -04:00
|
|
|
if ((params->auth_algs & (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) ==
|
|
|
|
(WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) {
|
|
|
|
/* Leave out the attribute */
|
|
|
|
} else if (params->auth_algs & WPA_AUTH_ALG_SHARED)
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE,
|
|
|
|
NL80211_AUTHTYPE_SHARED_KEY);
|
|
|
|
else
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE,
|
|
|
|
NL80211_AUTHTYPE_OPEN_SYSTEM);
|
|
|
|
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: wpa_version=0x%x", params->wpa_version);
|
2011-08-26 14:11:42 -04:00
|
|
|
ver = 0;
|
|
|
|
if (params->wpa_version & WPA_PROTO_WPA)
|
|
|
|
ver |= NL80211_WPA_VERSION_1;
|
|
|
|
if (params->wpa_version & WPA_PROTO_RSN)
|
|
|
|
ver |= NL80211_WPA_VERSION_2;
|
|
|
|
if (ver)
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver);
|
|
|
|
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: key_mgmt_suites=0x%x",
|
|
|
|
params->key_mgmt_suites);
|
2011-08-26 14:11:42 -04:00
|
|
|
num_suites = 0;
|
|
|
|
if (params->key_mgmt_suites & WPA_KEY_MGMT_IEEE8021X)
|
|
|
|
suites[num_suites++] = WLAN_AKM_SUITE_8021X;
|
|
|
|
if (params->key_mgmt_suites & WPA_KEY_MGMT_PSK)
|
|
|
|
suites[num_suites++] = WLAN_AKM_SUITE_PSK;
|
|
|
|
if (num_suites) {
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_AKM_SUITES,
|
|
|
|
num_suites * sizeof(u32), suites);
|
|
|
|
}
|
|
|
|
|
2011-12-03 13:46:12 -05:00
|
|
|
if (params->key_mgmt_suites & WPA_KEY_MGMT_IEEE8021X &&
|
|
|
|
params->pairwise_ciphers & (WPA_CIPHER_WEP104 | WPA_CIPHER_WEP40))
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT);
|
|
|
|
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: pairwise_ciphers=0x%x",
|
|
|
|
params->pairwise_ciphers);
|
2013-12-30 11:59:29 -05:00
|
|
|
num_suites = wpa_cipher_to_cipher_suites(params->pairwise_ciphers,
|
|
|
|
suites, ARRAY_SIZE(suites));
|
2011-08-26 14:11:42 -04:00
|
|
|
if (num_suites) {
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
|
|
|
|
num_suites * sizeof(u32), suites);
|
|
|
|
}
|
|
|
|
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: group_cipher=0x%x",
|
|
|
|
params->group_cipher);
|
2013-12-30 11:59:29 -05:00
|
|
|
suite = wpa_cipher_to_cipher_suite(params->group_cipher);
|
|
|
|
if (suite)
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, suite);
|
2009-04-02 09:09:48 -04:00
|
|
|
|
2014-10-19 23:21:41 -04:00
|
|
|
switch (params->smps_mode) {
|
|
|
|
case HT_CAP_INFO_SMPS_DYNAMIC:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: SMPS mode - dynamic");
|
|
|
|
smps_mode = NL80211_SMPS_DYNAMIC;
|
|
|
|
break;
|
|
|
|
case HT_CAP_INFO_SMPS_STATIC:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: SMPS mode - static");
|
|
|
|
smps_mode = NL80211_SMPS_STATIC;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* invalid - fallback to smps off */
|
|
|
|
case HT_CAP_INFO_SMPS_DISABLED:
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: SMPS mode - off");
|
|
|
|
smps_mode = NL80211_SMPS_OFF;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_SMPS_MODE, smps_mode);
|
|
|
|
|
2011-08-26 14:14:25 -04:00
|
|
|
if (params->beacon_ies) {
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_hexdump_buf(MSG_DEBUG, "nl80211: beacon_ies",
|
|
|
|
params->beacon_ies);
|
2011-08-26 14:14:25 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_IE, wpabuf_len(params->beacon_ies),
|
|
|
|
wpabuf_head(params->beacon_ies));
|
|
|
|
}
|
|
|
|
if (params->proberesp_ies) {
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_hexdump_buf(MSG_DEBUG, "nl80211: proberesp_ies",
|
|
|
|
params->proberesp_ies);
|
2011-08-26 14:14:25 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_IE_PROBE_RESP,
|
|
|
|
wpabuf_len(params->proberesp_ies),
|
|
|
|
wpabuf_head(params->proberesp_ies));
|
|
|
|
}
|
|
|
|
if (params->assocresp_ies) {
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_hexdump_buf(MSG_DEBUG, "nl80211: assocresp_ies",
|
|
|
|
params->assocresp_ies);
|
2011-08-26 14:14:25 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_IE_ASSOC_RESP,
|
|
|
|
wpabuf_len(params->assocresp_ies),
|
|
|
|
wpabuf_head(params->assocresp_ies));
|
|
|
|
}
|
|
|
|
|
2012-03-27 13:45:23 -04:00
|
|
|
if (drv->capa.flags & WPA_DRIVER_FLAGS_INACTIVITY_TIMER) {
|
2013-03-21 09:40:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: ap_max_inactivity=%d",
|
|
|
|
params->ap_max_inactivity);
|
2012-03-27 13:45:23 -04:00
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_INACTIVITY_TIMEOUT,
|
|
|
|
params->ap_max_inactivity);
|
|
|
|
}
|
|
|
|
|
2009-04-02 09:09:48 -04:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Beacon set failed: %d (%s)",
|
|
|
|
ret, strerror(-ret));
|
2009-04-09 16:44:39 -04:00
|
|
|
} else {
|
|
|
|
bss->beacon_set = 1;
|
2011-10-17 12:31:33 -04:00
|
|
|
nl80211_set_bss(bss, params->cts_protect, params->preamble,
|
2011-12-03 04:43:18 -05:00
|
|
|
params->short_slot_time, params->ht_opmode,
|
2011-12-03 05:16:03 -05:00
|
|
|
params->isolate, params->basic_rates);
|
2014-04-14 13:51:32 -04:00
|
|
|
if (beacon_set && params->freq &&
|
|
|
|
params->freq->bandwidth != bss->bandwidth) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Update BSS %s bandwidth: %d -> %d",
|
|
|
|
bss->ifname, bss->bandwidth,
|
|
|
|
params->freq->bandwidth);
|
|
|
|
ret = nl80211_set_channel(bss, params->freq, 1);
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Frequency set failed: %d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Frequency set succeeded for ht2040 coex");
|
|
|
|
bss->bandwidth = params->freq->bandwidth;
|
|
|
|
}
|
|
|
|
} else if (!beacon_set) {
|
|
|
|
/*
|
|
|
|
* cfg80211 updates the driver on frequence change in AP
|
|
|
|
* mode only at the point when beaconing is started, so
|
|
|
|
* set the initial value here.
|
|
|
|
*/
|
|
|
|
bss->bandwidth = params->freq->bandwidth;
|
|
|
|
}
|
2009-04-09 16:44:39 -04:00
|
|
|
}
|
2009-04-02 09:09:48 -04:00
|
|
|
return ret;
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-02 09:09:48 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-11-14 05:28:30 -05:00
|
|
|
static int nl80211_put_freq_params(struct nl_msg *msg,
|
|
|
|
struct hostapd_freq_params *freq)
|
2009-03-25 05:38:47 -04:00
|
|
|
{
|
2012-12-28 10:29:20 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, freq->freq);
|
|
|
|
if (freq->vht_enabled) {
|
|
|
|
switch (freq->bandwidth) {
|
|
|
|
case 20:
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
|
|
|
|
NL80211_CHAN_WIDTH_20);
|
|
|
|
break;
|
|
|
|
case 40:
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
|
|
|
|
NL80211_CHAN_WIDTH_40);
|
|
|
|
break;
|
|
|
|
case 80:
|
|
|
|
if (freq->center_freq2)
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
|
|
|
|
NL80211_CHAN_WIDTH_80P80);
|
|
|
|
else
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
|
|
|
|
NL80211_CHAN_WIDTH_80);
|
|
|
|
break;
|
|
|
|
case 160:
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
|
|
|
|
NL80211_CHAN_WIDTH_160);
|
|
|
|
break;
|
|
|
|
default:
|
2013-11-14 05:28:30 -05:00
|
|
|
return -EINVAL;
|
2012-12-28 10:29:20 -05:00
|
|
|
}
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CENTER_FREQ1, freq->center_freq1);
|
|
|
|
if (freq->center_freq2)
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CENTER_FREQ2,
|
|
|
|
freq->center_freq2);
|
|
|
|
} else if (freq->ht_enabled) {
|
|
|
|
switch (freq->sec_channel_offset) {
|
2009-04-14 08:15:33 -04:00
|
|
|
case -1:
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
|
|
|
|
NL80211_CHAN_HT40MINUS);
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
|
|
|
|
NL80211_CHAN_HT40PLUS);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
|
|
|
|
NL80211_CHAN_HT20);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2013-11-14 05:28:30 -05:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-04-14 13:51:32 -04:00
|
|
|
static int nl80211_set_channel(struct i802_bss *bss,
|
|
|
|
struct hostapd_freq_params *freq, int set_chan)
|
2013-11-14 05:28:30 -05:00
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Set freq %d (ht_enabled=%d, vht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
|
|
|
|
freq->freq, freq->ht_enabled, freq->vht_enabled,
|
|
|
|
freq->bandwidth, freq->center_freq1, freq->center_freq2);
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2014-04-14 13:51:32 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, set_chan ? NL80211_CMD_SET_CHANNEL :
|
|
|
|
NL80211_CMD_SET_WIPHY);
|
2013-11-14 05:28:30 -05:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
if (nl80211_put_freq_params(msg, freq) < 0)
|
|
|
|
goto nla_put_failure;
|
2009-03-25 05:38:47 -04:00
|
|
|
|
2009-04-02 09:09:48 -04:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2011-12-17 05:19:36 -05:00
|
|
|
msg = NULL;
|
2011-12-03 12:55:22 -05:00
|
|
|
if (ret == 0) {
|
2012-12-28 10:29:20 -05:00
|
|
|
bss->freq = freq->freq;
|
2009-03-25 05:38:47 -04:00
|
|
|
return 0;
|
2011-12-03 12:55:22 -05:00
|
|
|
}
|
2009-04-14 08:15:33 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to set channel (freq=%d): "
|
2012-12-28 10:29:20 -05:00
|
|
|
"%d (%s)", freq->freq, ret, strerror(-ret));
|
2009-03-25 05:38:47 -04:00
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-03-25 05:38:47 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2009-04-17 13:09:20 -04:00
|
|
|
|
2011-07-12 13:28:31 -04:00
|
|
|
static u32 sta_flags_nl80211(int flags)
|
|
|
|
{
|
|
|
|
u32 f = 0;
|
|
|
|
|
|
|
|
if (flags & WPA_STA_AUTHORIZED)
|
|
|
|
f |= BIT(NL80211_STA_FLAG_AUTHORIZED);
|
|
|
|
if (flags & WPA_STA_WMM)
|
|
|
|
f |= BIT(NL80211_STA_FLAG_WME);
|
|
|
|
if (flags & WPA_STA_SHORT_PREAMBLE)
|
|
|
|
f |= BIT(NL80211_STA_FLAG_SHORT_PREAMBLE);
|
|
|
|
if (flags & WPA_STA_MFP)
|
|
|
|
f |= BIT(NL80211_STA_FLAG_MFP);
|
2011-10-23 07:02:57 -04:00
|
|
|
if (flags & WPA_STA_TDLS_PEER)
|
|
|
|
f |= BIT(NL80211_STA_FLAG_TDLS_PEER);
|
2014-09-01 00:23:23 -04:00
|
|
|
if (flags & WPA_STA_AUTHENTICATED)
|
|
|
|
f |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
|
2011-07-12 13:28:31 -04:00
|
|
|
|
|
|
|
return f;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-01 00:23:23 -04:00
|
|
|
#ifdef CONFIG_MESH
|
|
|
|
static u32 sta_plink_state_nl80211(enum mesh_plink_state state)
|
|
|
|
{
|
|
|
|
switch (state) {
|
|
|
|
case PLINK_LISTEN:
|
|
|
|
return NL80211_PLINK_LISTEN;
|
|
|
|
case PLINK_OPEN_SENT:
|
|
|
|
return NL80211_PLINK_OPN_SNT;
|
|
|
|
case PLINK_OPEN_RCVD:
|
|
|
|
return NL80211_PLINK_OPN_RCVD;
|
|
|
|
case PLINK_CNF_RCVD:
|
|
|
|
return NL80211_PLINK_CNF_RCVD;
|
|
|
|
case PLINK_ESTAB:
|
|
|
|
return NL80211_PLINK_ESTAB;
|
|
|
|
case PLINK_HOLDING:
|
|
|
|
return NL80211_PLINK_HOLDING;
|
|
|
|
case PLINK_BLOCKED:
|
|
|
|
return NL80211_PLINK_BLOCKED;
|
|
|
|
default:
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Invalid mesh plink state %d",
|
|
|
|
state);
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_MESH */
|
|
|
|
|
|
|
|
|
2010-03-07 04:42:41 -05:00
|
|
|
static int wpa_driver_nl80211_sta_add(void *priv,
|
2009-04-17 13:09:20 -04:00
|
|
|
struct hostapd_sta_add_params *params)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nl_msg *msg;
|
2011-07-12 13:28:31 -04:00
|
|
|
struct nl80211_sta_flag_update upd;
|
2009-04-17 13:09:20 -04:00
|
|
|
int ret = -ENOBUFS;
|
|
|
|
|
2011-10-23 07:02:57 -04:00
|
|
|
if ((params->flags & WPA_STA_TDLS_PEER) &&
|
|
|
|
!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2009-04-17 13:09:20 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2013-02-14 10:44:21 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: %s STA " MACSTR,
|
|
|
|
params->set ? "Set" : "Add", MAC2STR(params->addr));
|
2011-10-23 07:02:57 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, params->set ? NL80211_CMD_SET_STATION :
|
|
|
|
NL80211_CMD_NEW_STATION);
|
2009-04-17 13:09:20 -04:00
|
|
|
|
2010-03-07 04:42:41 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(bss->ifname));
|
2009-04-17 13:09:20 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->addr);
|
2014-09-01 00:23:23 -04:00
|
|
|
|
|
|
|
if (!params->set || (params->flags & WPA_STA_TDLS_PEER)) {
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_STA_SUPPORTED_RATES,
|
|
|
|
params->supp_rates_len, params->supp_rates);
|
|
|
|
wpa_hexdump(MSG_DEBUG, " * supported rates",
|
|
|
|
params->supp_rates, params->supp_rates_len);
|
|
|
|
}
|
2011-10-23 07:02:57 -04:00
|
|
|
if (!params->set) {
|
2013-05-06 08:57:03 -04:00
|
|
|
if (params->aid) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * aid=%u", params->aid);
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_STA_AID, params->aid);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* cfg80211 validates that AID is non-zero, so we have
|
|
|
|
* to make this a non-zero value for the TDLS case where
|
|
|
|
* a dummy STA entry is used for now.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, " * aid=1 (TDLS workaround)");
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_STA_AID, 1);
|
|
|
|
}
|
2013-02-14 10:44:21 -05:00
|
|
|
wpa_printf(MSG_DEBUG, " * listen_interval=%u",
|
|
|
|
params->listen_interval);
|
2011-10-23 07:02:57 -04:00
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_STA_LISTEN_INTERVAL,
|
|
|
|
params->listen_interval);
|
2013-05-30 03:25:23 -04:00
|
|
|
} else if (params->aid && (params->flags & WPA_STA_TDLS_PEER)) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * peer_aid=%u", params->aid);
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_PEER_AID, params->aid);
|
2011-10-23 07:02:57 -04:00
|
|
|
}
|
2009-04-17 13:09:20 -04:00
|
|
|
if (params->ht_capabilities) {
|
2013-02-14 10:44:21 -05:00
|
|
|
wpa_hexdump(MSG_DEBUG, " * ht_capabilities",
|
|
|
|
(u8 *) params->ht_capabilities,
|
|
|
|
sizeof(*params->ht_capabilities));
|
2009-04-17 13:09:20 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_HT_CAPABILITY,
|
2009-11-29 06:04:21 -05:00
|
|
|
sizeof(*params->ht_capabilities),
|
|
|
|
params->ht_capabilities);
|
2009-04-17 13:09:20 -04:00
|
|
|
}
|
|
|
|
|
2012-12-28 10:31:22 -05:00
|
|
|
if (params->vht_capabilities) {
|
2013-02-14 10:44:21 -05:00
|
|
|
wpa_hexdump(MSG_DEBUG, " * vht_capabilities",
|
|
|
|
(u8 *) params->vht_capabilities,
|
|
|
|
sizeof(*params->vht_capabilities));
|
2012-12-28 10:31:22 -05:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_VHT_CAPABILITY,
|
|
|
|
sizeof(*params->vht_capabilities),
|
|
|
|
params->vht_capabilities);
|
|
|
|
}
|
|
|
|
|
2014-02-10 07:43:05 -05:00
|
|
|
if (params->vht_opmode_enabled) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * opmode=%u", params->vht_opmode);
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_OPMODE_NOTIF,
|
|
|
|
params->vht_opmode);
|
|
|
|
}
|
|
|
|
|
2013-02-14 11:12:42 -05:00
|
|
|
wpa_printf(MSG_DEBUG, " * capability=0x%x", params->capability);
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_STA_CAPABILITY, params->capability);
|
|
|
|
|
|
|
|
if (params->ext_capab) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, " * ext_capab",
|
|
|
|
params->ext_capab, params->ext_capab_len);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_STA_EXT_CAPABILITY,
|
|
|
|
params->ext_capab_len, params->ext_capab);
|
|
|
|
}
|
|
|
|
|
2014-01-06 08:01:58 -05:00
|
|
|
if (params->supp_channels) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, " * supported channels",
|
|
|
|
params->supp_channels, params->supp_channels_len);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_STA_SUPPORTED_CHANNELS,
|
|
|
|
params->supp_channels_len, params->supp_channels);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (params->supp_oper_classes) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, " * supported operating classes",
|
|
|
|
params->supp_oper_classes,
|
|
|
|
params->supp_oper_classes_len);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES,
|
|
|
|
params->supp_oper_classes_len,
|
|
|
|
params->supp_oper_classes);
|
|
|
|
}
|
|
|
|
|
2011-07-12 13:28:31 -04:00
|
|
|
os_memset(&upd, 0, sizeof(upd));
|
2014-09-01 00:23:23 -04:00
|
|
|
upd.set = sta_flags_nl80211(params->flags);
|
|
|
|
upd.mask = upd.set | sta_flags_nl80211(params->flags_mask);
|
2013-02-14 10:44:21 -05:00
|
|
|
wpa_printf(MSG_DEBUG, " * flags set=0x%x mask=0x%x",
|
|
|
|
upd.set, upd.mask);
|
2011-07-12 13:28:31 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd);
|
|
|
|
|
2014-09-01 00:23:23 -04:00
|
|
|
#ifdef CONFIG_MESH
|
|
|
|
if (params->plink_state)
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_STA_PLINK_STATE,
|
|
|
|
sta_plink_state_nl80211(params->plink_state));
|
|
|
|
#endif /* CONFIG_MESH */
|
|
|
|
|
2011-12-17 04:59:34 -05:00
|
|
|
if (params->flags & WPA_STA_WMM) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *wme = nla_nest_start(msg, NL80211_ATTR_STA_WME);
|
|
|
|
|
2011-12-17 04:59:34 -05:00
|
|
|
if (!wme)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2013-02-14 10:44:21 -05:00
|
|
|
wpa_printf(MSG_DEBUG, " * qosinfo=0x%x", params->qosinfo);
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_U8(msg, NL80211_STA_WME_UAPSD_QUEUES,
|
2011-12-17 05:38:06 -05:00
|
|
|
params->qosinfo & WMM_QOSINFO_STA_AC_MASK);
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_U8(msg, NL80211_STA_WME_MAX_SP,
|
2013-02-16 04:15:13 -05:00
|
|
|
(params->qosinfo >> WMM_QOSINFO_STA_SP_SHIFT) &
|
2011-12-17 05:38:06 -05:00
|
|
|
WMM_QOSINFO_STA_SP_MASK);
|
2013-03-30 14:37:44 -04:00
|
|
|
nla_nest_end(msg, wme);
|
2011-12-17 04:59:34 -05:00
|
|
|
}
|
|
|
|
|
2009-04-17 13:09:20 -04:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2011-12-17 05:19:36 -05:00
|
|
|
msg = NULL;
|
2009-04-17 13:09:20 -04:00
|
|
|
if (ret)
|
2011-10-23 07:02:57 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: NL80211_CMD_%s_STATION "
|
|
|
|
"result: %d (%s)", params->set ? "SET" : "NEW", ret,
|
|
|
|
strerror(-ret));
|
2009-04-17 13:09:20 -04:00
|
|
|
if (ret == -EEXIST)
|
|
|
|
ret = 0;
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-17 13:09:20 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-09 18:38:03 -04:00
|
|
|
static void rtnl_neigh_delete_fdb_entry(struct i802_bss *bss, const u8 *addr)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_LIBNL3_ROUTE
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct rtnl_neigh *rn;
|
|
|
|
struct nl_addr *nl_addr;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
rn = rtnl_neigh_alloc();
|
|
|
|
if (!rn)
|
|
|
|
return;
|
|
|
|
|
|
|
|
rtnl_neigh_set_family(rn, AF_BRIDGE);
|
|
|
|
rtnl_neigh_set_ifindex(rn, bss->ifindex);
|
|
|
|
nl_addr = nl_addr_build(AF_BRIDGE, (void *) addr, ETH_ALEN);
|
|
|
|
if (!nl_addr) {
|
|
|
|
rtnl_neigh_put(rn);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
rtnl_neigh_set_lladdr(rn, nl_addr);
|
|
|
|
|
|
|
|
err = rtnl_neigh_delete(drv->rtnl_sk, rn, 0);
|
|
|
|
if (err < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: bridge FDB entry delete for "
|
|
|
|
MACSTR " ifindex=%d failed: %s", MAC2STR(addr),
|
|
|
|
bss->ifindex, nl_geterror(err));
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: deleted bridge FDB entry for "
|
|
|
|
MACSTR, MAC2STR(addr));
|
|
|
|
}
|
|
|
|
|
|
|
|
nl_addr_put(nl_addr);
|
|
|
|
rtnl_neigh_put(rn);
|
|
|
|
#endif /* CONFIG_LIBNL3_ROUTE */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-09 09:52:38 -04:00
|
|
|
static int wpa_driver_nl80211_sta_remove(struct i802_bss *bss, const u8 *addr,
|
|
|
|
int deauth, u16 reason_code)
|
2009-04-17 13:09:20 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-17 13:09:20 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_STATION);
|
2009-04-17 13:09:20 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
|
2010-03-06 15:22:56 -05:00
|
|
|
if_nametoindex(bss->ifname));
|
2009-04-17 13:09:20 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
|
2014-10-09 09:52:38 -04:00
|
|
|
if (deauth == 0)
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_MGMT_SUBTYPE,
|
|
|
|
WLAN_FC_STYPE_DISASSOC);
|
|
|
|
else if (deauth == 1)
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_MGMT_SUBTYPE,
|
|
|
|
WLAN_FC_STYPE_DEAUTH);
|
|
|
|
if (reason_code)
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_REASON_CODE, reason_code);
|
2009-04-17 13:09:20 -04:00
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2013-08-23 05:03:28 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: sta_remove -> DEL_STATION %s " MACSTR
|
|
|
|
" --> %d (%s)",
|
|
|
|
bss->ifname, MAC2STR(addr), ret, strerror(-ret));
|
2014-09-09 18:38:03 -04:00
|
|
|
|
|
|
|
if (drv->rtnl_sk)
|
|
|
|
rtnl_neigh_delete_fdb_entry(bss, addr);
|
|
|
|
|
2009-04-17 13:09:20 -04:00
|
|
|
if (ret == -ENOENT)
|
|
|
|
return 0;
|
|
|
|
return ret;
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-17 13:09:20 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
2009-03-25 05:38:47 -04:00
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
void nl80211_remove_iface(struct wpa_driver_nl80211_data *drv, int ifidx)
|
2009-04-02 14:59:14 -04:00
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
2014-05-27 11:16:58 -04:00
|
|
|
struct wpa_driver_nl80211_data *drv2;
|
2009-04-02 14:59:14 -04:00
|
|
|
|
2009-12-28 06:25:17 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Remove interface ifindex=%d", ifidx);
|
|
|
|
|
2009-04-09 13:41:21 -04:00
|
|
|
/* stop listening for EAPOL on this interface */
|
2014-05-27 11:16:58 -04:00
|
|
|
dl_list_for_each(drv2, &drv->global->interfaces,
|
|
|
|
struct wpa_driver_nl80211_data, list)
|
|
|
|
del_ifidx(drv2, ifidx);
|
2009-04-09 13:41:21 -04:00
|
|
|
|
2009-04-02 14:59:14 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_INTERFACE);
|
2009-04-02 14:59:14 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifidx);
|
|
|
|
|
|
|
|
if (send_and_recv_msgs(drv, msg, NULL, NULL) == 0)
|
|
|
|
return;
|
2011-12-17 05:19:36 -05:00
|
|
|
msg = NULL;
|
2009-04-02 14:59:14 -04:00
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2010-02-10 04:29:53 -05:00
|
|
|
wpa_printf(MSG_ERROR, "Failed to remove interface (ifidx=%d)", ifidx);
|
2009-04-02 14:59:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-17 12:47:41 -04:00
|
|
|
static const char * nl80211_iftype_str(enum nl80211_iftype mode)
|
|
|
|
{
|
|
|
|
switch (mode) {
|
|
|
|
case NL80211_IFTYPE_ADHOC:
|
|
|
|
return "ADHOC";
|
|
|
|
case NL80211_IFTYPE_STATION:
|
|
|
|
return "STATION";
|
|
|
|
case NL80211_IFTYPE_AP:
|
|
|
|
return "AP";
|
2013-05-21 09:51:06 -04:00
|
|
|
case NL80211_IFTYPE_AP_VLAN:
|
|
|
|
return "AP_VLAN";
|
|
|
|
case NL80211_IFTYPE_WDS:
|
|
|
|
return "WDS";
|
2011-07-17 12:47:41 -04:00
|
|
|
case NL80211_IFTYPE_MONITOR:
|
|
|
|
return "MONITOR";
|
2013-05-21 09:51:06 -04:00
|
|
|
case NL80211_IFTYPE_MESH_POINT:
|
|
|
|
return "MESH_POINT";
|
2011-07-17 12:47:41 -04:00
|
|
|
case NL80211_IFTYPE_P2P_CLIENT:
|
|
|
|
return "P2P_CLIENT";
|
|
|
|
case NL80211_IFTYPE_P2P_GO:
|
|
|
|
return "P2P_GO";
|
2013-06-25 06:29:48 -04:00
|
|
|
case NL80211_IFTYPE_P2P_DEVICE:
|
|
|
|
return "P2P_DEVICE";
|
2011-07-17 12:47:41 -04:00
|
|
|
default:
|
|
|
|
return "unknown";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-05-29 14:48:19 -04:00
|
|
|
static int nl80211_create_iface_once(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const char *ifname,
|
|
|
|
enum nl80211_iftype iftype,
|
2013-06-25 06:35:05 -04:00
|
|
|
const u8 *addr, int wds,
|
|
|
|
int (*handler)(struct nl_msg *, void *),
|
|
|
|
void *arg)
|
2009-04-02 14:59:14 -04:00
|
|
|
{
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nl_msg *msg;
|
2009-04-02 14:59:14 -04:00
|
|
|
int ifidx;
|
|
|
|
int ret = -ENOBUFS;
|
|
|
|
|
2011-07-17 12:47:41 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Create interface iftype %d (%s)",
|
|
|
|
iftype, nl80211_iftype_str(iftype));
|
|
|
|
|
2009-04-02 14:59:14 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_NEW_INTERFACE);
|
2013-10-29 20:41:39 -04:00
|
|
|
if (nl80211_set_iface_id(msg, drv->first_bss) < 0)
|
2013-06-25 06:51:59 -04:00
|
|
|
goto nla_put_failure;
|
2009-04-02 14:59:14 -04:00
|
|
|
NLA_PUT_STRING(msg, NL80211_ATTR_IFNAME, ifname);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFTYPE, iftype);
|
|
|
|
|
|
|
|
if (iftype == NL80211_IFTYPE_MONITOR) {
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nlattr *flags;
|
2009-04-02 14:59:14 -04:00
|
|
|
|
2013-03-30 14:37:44 -04:00
|
|
|
flags = nla_nest_start(msg, NL80211_ATTR_MNTR_FLAGS);
|
2009-04-02 14:59:14 -04:00
|
|
|
if (!flags)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_MNTR_FLAG_COOK_FRAMES);
|
2009-04-02 14:59:14 -04:00
|
|
|
|
2013-03-30 14:37:44 -04:00
|
|
|
nla_nest_end(msg, flags);
|
2009-12-24 04:46:22 -05:00
|
|
|
} else if (wds) {
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_4ADDR, wds);
|
2009-04-02 14:59:14 -04:00
|
|
|
}
|
|
|
|
|
2014-04-24 01:45:33 -04:00
|
|
|
/*
|
|
|
|
* Tell cfg80211 that the interface belongs to the socket that created
|
|
|
|
* it, and the interface should be deleted when the socket is closed.
|
|
|
|
*/
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_IFACE_SOCKET_OWNER);
|
|
|
|
|
2013-06-25 06:35:05 -04:00
|
|
|
ret = send_and_recv_msgs(drv, msg, handler, arg);
|
2011-12-17 05:19:36 -05:00
|
|
|
msg = NULL;
|
2009-04-02 14:59:14 -04:00
|
|
|
if (ret) {
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-05-29 14:48:19 -04:00
|
|
|
wpa_printf(MSG_ERROR, "Failed to create interface %s: %d (%s)",
|
|
|
|
ifname, ret, strerror(-ret));
|
2009-04-02 14:59:14 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-06-25 06:44:54 -04:00
|
|
|
if (iftype == NL80211_IFTYPE_P2P_DEVICE)
|
2013-06-25 06:36:04 -04:00
|
|
|
return 0;
|
|
|
|
|
2009-04-02 14:59:14 -04:00
|
|
|
ifidx = if_nametoindex(ifname);
|
2009-12-28 06:25:17 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: New interface %s created: ifindex=%d",
|
|
|
|
ifname, ifidx);
|
2009-04-02 14:59:14 -04:00
|
|
|
|
|
|
|
if (ifidx <= 0)
|
|
|
|
return -1;
|
|
|
|
|
2014-05-27 11:47:41 -04:00
|
|
|
/*
|
|
|
|
* Some virtual interfaces need to process EAPOL packets and events on
|
|
|
|
* the parent interface. This is used mainly with hostapd.
|
|
|
|
*/
|
|
|
|
if (drv->hostapd ||
|
|
|
|
iftype == NL80211_IFTYPE_AP_VLAN ||
|
|
|
|
iftype == NL80211_IFTYPE_WDS ||
|
|
|
|
iftype == NL80211_IFTYPE_MONITOR) {
|
|
|
|
/* start listening for EAPOL on this interface */
|
|
|
|
add_ifidx(drv, ifidx);
|
|
|
|
}
|
2009-04-09 13:41:21 -04:00
|
|
|
|
2010-01-03 06:42:06 -05:00
|
|
|
if (addr && iftype != NL80211_IFTYPE_MONITOR &&
|
2011-10-22 14:33:58 -04:00
|
|
|
linux_set_ifhwaddr(drv->global->ioctl_sock, ifname, addr)) {
|
2009-04-17 04:22:16 -04:00
|
|
|
nl80211_remove_iface(drv, ifidx);
|
|
|
|
return -1;
|
2009-04-09 13:41:21 -04:00
|
|
|
}
|
|
|
|
|
2009-04-02 14:59:14 -04:00
|
|
|
return ifidx;
|
|
|
|
}
|
2009-12-09 09:49:28 -05:00
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
int nl80211_create_iface(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const char *ifname, enum nl80211_iftype iftype,
|
|
|
|
const u8 *addr, int wds,
|
|
|
|
int (*handler)(struct nl_msg *, void *),
|
|
|
|
void *arg, int use_existing)
|
2009-05-29 14:48:19 -04:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2013-06-25 06:35:05 -04:00
|
|
|
ret = nl80211_create_iface_once(drv, ifname, iftype, addr, wds, handler,
|
|
|
|
arg);
|
2009-05-29 14:48:19 -04:00
|
|
|
|
2011-09-21 17:43:59 -04:00
|
|
|
/* if error occurred and interface exists already */
|
2009-05-29 14:48:19 -04:00
|
|
|
if (ret == -ENFILE && if_nametoindex(ifname)) {
|
2013-10-31 13:41:42 -04:00
|
|
|
if (use_existing) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Continue using existing interface %s",
|
|
|
|
ifname);
|
2014-03-25 19:17:29 -04:00
|
|
|
if (addr && iftype != NL80211_IFTYPE_MONITOR &&
|
|
|
|
linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
|
|
|
|
addr) < 0 &&
|
|
|
|
(linux_set_iface_flags(drv->global->ioctl_sock,
|
|
|
|
ifname, 0) < 0 ||
|
|
|
|
linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
|
|
|
|
addr) < 0 ||
|
|
|
|
linux_set_iface_flags(drv->global->ioctl_sock,
|
|
|
|
ifname, 1) < 0))
|
|
|
|
return -1;
|
2013-10-31 13:41:42 -04:00
|
|
|
return -ENFILE;
|
|
|
|
}
|
2009-05-29 14:48:19 -04:00
|
|
|
wpa_printf(MSG_INFO, "Try to remove and re-create %s", ifname);
|
|
|
|
|
|
|
|
/* Try to remove the interface that was already there. */
|
|
|
|
nl80211_remove_iface(drv, if_nametoindex(ifname));
|
|
|
|
|
|
|
|
/* Try to create the interface again */
|
2009-12-24 04:46:22 -05:00
|
|
|
ret = nl80211_create_iface_once(drv, ifname, iftype, addr,
|
2013-06-25 06:35:05 -04:00
|
|
|
wds, handler, arg);
|
2009-05-29 14:48:19 -04:00
|
|
|
}
|
|
|
|
|
2013-06-25 06:26:17 -04:00
|
|
|
if (ret >= 0 && is_p2p_net_interface(iftype))
|
2010-01-16 05:11:19 -05:00
|
|
|
nl80211_disable_11b_rates(drv, ret, 1);
|
|
|
|
|
2009-05-29 14:48:19 -04:00
|
|
|
return ret;
|
|
|
|
}
|
2009-04-02 14:59:14 -04:00
|
|
|
|
2009-04-09 13:41:21 -04:00
|
|
|
|
2009-04-02 14:59:14 -04:00
|
|
|
static void handle_tx_callback(void *ctx, u8 *buf, size_t len, int ok)
|
|
|
|
{
|
|
|
|
struct ieee80211_hdr *hdr;
|
2009-12-13 16:05:39 -05:00
|
|
|
u16 fc;
|
|
|
|
union wpa_event_data event;
|
2009-04-02 14:59:14 -04:00
|
|
|
|
|
|
|
hdr = (struct ieee80211_hdr *) buf;
|
|
|
|
fc = le_to_host16(hdr->frame_control);
|
|
|
|
|
2009-12-13 16:05:39 -05:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
event.tx_status.type = WLAN_FC_GET_TYPE(fc);
|
|
|
|
event.tx_status.stype = WLAN_FC_GET_STYPE(fc);
|
|
|
|
event.tx_status.dst = hdr->addr1;
|
|
|
|
event.tx_status.data = buf;
|
|
|
|
event.tx_status.data_len = len;
|
|
|
|
event.tx_status.ack = ok;
|
|
|
|
wpa_supplicant_event(ctx, EVENT_TX_STATUS, &event);
|
2009-04-02 14:59:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-17 06:29:29 -04:00
|
|
|
static void from_unknown_sta(struct wpa_driver_nl80211_data *drv,
|
2010-01-03 05:17:20 -05:00
|
|
|
u8 *buf, size_t len)
|
2009-04-02 14:59:14 -04:00
|
|
|
{
|
2011-10-20 14:51:32 -04:00
|
|
|
struct ieee80211_hdr *hdr = (void *)buf;
|
|
|
|
u16 fc;
|
2009-12-13 16:05:39 -05:00
|
|
|
union wpa_event_data event;
|
2011-10-20 14:51:32 -04:00
|
|
|
|
|
|
|
if (len < sizeof(*hdr))
|
|
|
|
return;
|
|
|
|
|
|
|
|
fc = le_to_host16(hdr->frame_control);
|
|
|
|
|
2009-12-13 16:05:39 -05:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
2011-10-20 14:51:32 -04:00
|
|
|
event.rx_from_unknown.bssid = get_hdr_bssid(hdr, len);
|
|
|
|
event.rx_from_unknown.addr = hdr->addr2;
|
|
|
|
event.rx_from_unknown.wds = (fc & (WLAN_FC_FROMDS | WLAN_FC_TODS)) ==
|
|
|
|
(WLAN_FC_FROMDS | WLAN_FC_TODS);
|
2009-12-13 16:05:39 -05:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_RX_FROM_UNKNOWN, &event);
|
2009-04-17 06:29:29 -04:00
|
|
|
}
|
2009-04-02 14:59:14 -04:00
|
|
|
|
2009-04-17 06:29:29 -04:00
|
|
|
|
|
|
|
static void handle_frame(struct wpa_driver_nl80211_data *drv,
|
2010-01-03 05:37:02 -05:00
|
|
|
u8 *buf, size_t len, int datarate, int ssi_signal)
|
2009-04-17 06:29:29 -04:00
|
|
|
{
|
|
|
|
struct ieee80211_hdr *hdr;
|
2009-12-13 16:05:39 -05:00
|
|
|
u16 fc;
|
|
|
|
union wpa_event_data event;
|
2009-04-02 14:59:14 -04:00
|
|
|
|
|
|
|
hdr = (struct ieee80211_hdr *) buf;
|
|
|
|
fc = le_to_host16(hdr->frame_control);
|
|
|
|
|
2009-04-17 06:29:29 -04:00
|
|
|
switch (WLAN_FC_GET_TYPE(fc)) {
|
2009-04-02 14:59:14 -04:00
|
|
|
case WLAN_FC_TYPE_MGMT:
|
2009-12-13 16:05:39 -05:00
|
|
|
os_memset(&event, 0, sizeof(event));
|
|
|
|
event.rx_mgmt.frame = buf;
|
|
|
|
event.rx_mgmt.frame_len = len;
|
2010-01-03 05:37:02 -05:00
|
|
|
event.rx_mgmt.datarate = datarate;
|
|
|
|
event.rx_mgmt.ssi_signal = ssi_signal;
|
2009-12-13 16:05:39 -05:00
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
|
2009-04-02 14:59:14 -04:00
|
|
|
break;
|
|
|
|
case WLAN_FC_TYPE_CTRL:
|
|
|
|
/* can only get here with PS-Poll frames */
|
|
|
|
wpa_printf(MSG_DEBUG, "CTRL");
|
2010-01-03 05:17:20 -05:00
|
|
|
from_unknown_sta(drv, buf, len);
|
2009-04-02 14:59:14 -04:00
|
|
|
break;
|
|
|
|
case WLAN_FC_TYPE_DATA:
|
2010-01-03 05:17:20 -05:00
|
|
|
from_unknown_sta(drv, buf, len);
|
2009-04-02 14:59:14 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void handle_monitor_read(int sock, void *eloop_ctx, void *sock_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = eloop_ctx;
|
|
|
|
int len;
|
|
|
|
unsigned char buf[3000];
|
|
|
|
struct ieee80211_radiotap_iterator iter;
|
|
|
|
int ret;
|
2010-01-03 05:37:02 -05:00
|
|
|
int datarate = 0, ssi_signal = 0;
|
2009-04-17 06:29:29 -04:00
|
|
|
int injected = 0, failed = 0, rxflags = 0;
|
2009-04-02 14:59:14 -04:00
|
|
|
|
|
|
|
len = recv(sock, buf, sizeof(buf), 0);
|
|
|
|
if (len < 0) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Monitor socket recv failed: %s",
|
|
|
|
strerror(errno));
|
2009-04-02 14:59:14 -04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-04-14 06:39:18 -04:00
|
|
|
if (ieee80211_radiotap_iterator_init(&iter, (void *) buf, len, NULL)) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: received invalid radiotap frame");
|
2009-04-02 14:59:14 -04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
ret = ieee80211_radiotap_iterator_next(&iter);
|
|
|
|
if (ret == -ENOENT)
|
|
|
|
break;
|
|
|
|
if (ret) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: received invalid radiotap frame (%d)",
|
|
|
|
ret);
|
2009-04-02 14:59:14 -04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
switch (iter.this_arg_index) {
|
|
|
|
case IEEE80211_RADIOTAP_FLAGS:
|
|
|
|
if (*iter.this_arg & IEEE80211_RADIOTAP_F_FCS)
|
|
|
|
len -= 4;
|
|
|
|
break;
|
|
|
|
case IEEE80211_RADIOTAP_RX_FLAGS:
|
|
|
|
rxflags = 1;
|
|
|
|
break;
|
|
|
|
case IEEE80211_RADIOTAP_TX_FLAGS:
|
|
|
|
injected = 1;
|
|
|
|
failed = le_to_host16((*(uint16_t *) iter.this_arg)) &
|
|
|
|
IEEE80211_RADIOTAP_F_TX_FAIL;
|
|
|
|
break;
|
|
|
|
case IEEE80211_RADIOTAP_DATA_RETRIES:
|
|
|
|
break;
|
|
|
|
case IEEE80211_RADIOTAP_CHANNEL:
|
2010-01-03 05:37:02 -05:00
|
|
|
/* TODO: convert from freq/flags to channel number */
|
2009-04-02 14:59:14 -04:00
|
|
|
break;
|
|
|
|
case IEEE80211_RADIOTAP_RATE:
|
2010-01-03 05:37:02 -05:00
|
|
|
datarate = *iter.this_arg * 5;
|
2009-04-02 14:59:14 -04:00
|
|
|
break;
|
2012-04-01 11:48:12 -04:00
|
|
|
case IEEE80211_RADIOTAP_DBM_ANTSIGNAL:
|
|
|
|
ssi_signal = (s8) *iter.this_arg;
|
2009-04-02 14:59:14 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rxflags && injected)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!injected)
|
2014-04-09 05:50:54 -04:00
|
|
|
handle_frame(drv, buf + iter._max_length,
|
|
|
|
len - iter._max_length, datarate, ssi_signal);
|
2009-04-02 14:59:14 -04:00
|
|
|
else
|
2014-04-09 05:50:54 -04:00
|
|
|
handle_tx_callback(drv->ctx, buf + iter._max_length,
|
|
|
|
len - iter._max_length, !failed);
|
2009-04-02 14:59:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* we post-process the filter code later and rewrite
|
|
|
|
* this to the offset to the last instruction
|
|
|
|
*/
|
|
|
|
#define PASS 0xFF
|
|
|
|
#define FAIL 0xFE
|
|
|
|
|
|
|
|
static struct sock_filter msock_filter_insns[] = {
|
|
|
|
/*
|
|
|
|
* do a little-endian load of the radiotap length field
|
|
|
|
*/
|
|
|
|
/* load lower byte into A */
|
|
|
|
BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 2),
|
|
|
|
/* put it into X (== index register) */
|
|
|
|
BPF_STMT(BPF_MISC| BPF_TAX, 0),
|
|
|
|
/* load upper byte into A */
|
|
|
|
BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 3),
|
|
|
|
/* left-shift it by 8 */
|
|
|
|
BPF_STMT(BPF_ALU | BPF_LSH | BPF_K, 8),
|
|
|
|
/* or with X */
|
|
|
|
BPF_STMT(BPF_ALU | BPF_OR | BPF_X, 0),
|
|
|
|
/* put result into X */
|
|
|
|
BPF_STMT(BPF_MISC| BPF_TAX, 0),
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Allow management frames through, this also gives us those
|
|
|
|
* management frames that we sent ourselves with status
|
|
|
|
*/
|
|
|
|
/* load the lower byte of the IEEE 802.11 frame control field */
|
|
|
|
BPF_STMT(BPF_LD | BPF_B | BPF_IND, 0),
|
|
|
|
/* mask off frame type and version */
|
|
|
|
BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0xF),
|
|
|
|
/* accept frame if it's both 0, fall through otherwise */
|
|
|
|
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0, PASS, 0),
|
|
|
|
|
|
|
|
/*
|
|
|
|
* TODO: add a bit to radiotap RX flags that indicates
|
|
|
|
* that the sending station is not associated, then
|
|
|
|
* add a filter here that filters on our DA and that flag
|
|
|
|
* to allow us to deauth frames to that bad station.
|
|
|
|
*
|
2010-10-31 15:36:43 -04:00
|
|
|
* For now allow all To DS data frames through.
|
2009-04-02 14:59:14 -04:00
|
|
|
*/
|
2010-10-31 15:36:43 -04:00
|
|
|
/* load the IEEE 802.11 frame control field */
|
|
|
|
BPF_STMT(BPF_LD | BPF_H | BPF_IND, 0),
|
|
|
|
/* mask off frame type, version and DS status */
|
|
|
|
BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0x0F03),
|
|
|
|
/* accept frame if version 0, type 2 and To DS, fall through otherwise
|
|
|
|
*/
|
|
|
|
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x0801, PASS, 0),
|
2009-04-02 14:59:14 -04:00
|
|
|
|
|
|
|
#if 0
|
|
|
|
/*
|
2009-12-24 04:46:22 -05:00
|
|
|
* drop non-data frames
|
2009-04-02 14:59:14 -04:00
|
|
|
*/
|
|
|
|
/* load the lower byte of the frame control field */
|
|
|
|
BPF_STMT(BPF_LD | BPF_B | BPF_IND, 0),
|
|
|
|
/* mask off QoS bit */
|
|
|
|
BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0x0c),
|
|
|
|
/* drop non-data frames */
|
|
|
|
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 8, 0, FAIL),
|
2009-12-24 04:46:22 -05:00
|
|
|
#endif
|
2009-04-02 14:59:14 -04:00
|
|
|
/* load the upper byte of the frame control field */
|
2009-12-24 04:46:22 -05:00
|
|
|
BPF_STMT(BPF_LD | BPF_B | BPF_IND, 1),
|
2009-04-02 14:59:14 -04:00
|
|
|
/* mask off toDS/fromDS */
|
|
|
|
BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0x03),
|
2009-12-24 04:46:22 -05:00
|
|
|
/* accept WDS frames */
|
|
|
|
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 3, PASS, 0),
|
2009-04-02 14:59:14 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* add header length to index
|
|
|
|
*/
|
|
|
|
/* load the lower byte of the frame control field */
|
|
|
|
BPF_STMT(BPF_LD | BPF_B | BPF_IND, 0),
|
|
|
|
/* mask off QoS bit */
|
|
|
|
BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0x80),
|
|
|
|
/* right shift it by 6 to give 0 or 2 */
|
|
|
|
BPF_STMT(BPF_ALU | BPF_RSH | BPF_K, 6),
|
|
|
|
/* add data frame header length */
|
|
|
|
BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 24),
|
|
|
|
/* add index, was start of 802.11 header */
|
|
|
|
BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
|
|
|
|
/* move to index, now start of LL header */
|
|
|
|
BPF_STMT(BPF_MISC | BPF_TAX, 0),
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Accept empty data frames, we use those for
|
|
|
|
* polling activity.
|
|
|
|
*/
|
|
|
|
BPF_STMT(BPF_LD | BPF_W | BPF_LEN, 0),
|
|
|
|
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_X, 0, PASS, 0),
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Accept EAPOL frames
|
|
|
|
*/
|
|
|
|
BPF_STMT(BPF_LD | BPF_W | BPF_IND, 0),
|
|
|
|
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0xAAAA0300, 0, FAIL),
|
|
|
|
BPF_STMT(BPF_LD | BPF_W | BPF_IND, 4),
|
|
|
|
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x0000888E, PASS, FAIL),
|
|
|
|
|
|
|
|
/* keep these last two statements or change the code below */
|
|
|
|
/* return 0 == "DROP" */
|
|
|
|
BPF_STMT(BPF_RET | BPF_K, 0),
|
|
|
|
/* return ~0 == "keep all" */
|
|
|
|
BPF_STMT(BPF_RET | BPF_K, ~0),
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct sock_fprog msock_filter = {
|
2013-10-26 10:00:57 -04:00
|
|
|
.len = ARRAY_SIZE(msock_filter_insns),
|
2009-04-02 14:59:14 -04:00
|
|
|
.filter = msock_filter_insns,
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
static int add_monitor_filter(int s)
|
|
|
|
{
|
|
|
|
int idx;
|
|
|
|
|
|
|
|
/* rewrite all PASS/FAIL jump offsets */
|
|
|
|
for (idx = 0; idx < msock_filter.len; idx++) {
|
|
|
|
struct sock_filter *insn = &msock_filter_insns[idx];
|
|
|
|
|
|
|
|
if (BPF_CLASS(insn->code) == BPF_JMP) {
|
|
|
|
if (insn->code == (BPF_JMP|BPF_JA)) {
|
|
|
|
if (insn->k == PASS)
|
|
|
|
insn->k = msock_filter.len - idx - 2;
|
|
|
|
else if (insn->k == FAIL)
|
|
|
|
insn->k = msock_filter.len - idx - 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (insn->jt == PASS)
|
|
|
|
insn->jt = msock_filter.len - idx - 2;
|
|
|
|
else if (insn->jt == FAIL)
|
|
|
|
insn->jt = msock_filter.len - idx - 3;
|
|
|
|
|
|
|
|
if (insn->jf == PASS)
|
|
|
|
insn->jf = msock_filter.len - idx - 2;
|
|
|
|
else if (insn->jf == FAIL)
|
|
|
|
insn->jf = msock_filter.len - idx - 3;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (setsockopt(s, SOL_SOCKET, SO_ATTACH_FILTER,
|
|
|
|
&msock_filter, sizeof(msock_filter))) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: setsockopt(SO_ATTACH_FILTER) failed: %s",
|
|
|
|
strerror(errno));
|
2009-04-02 14:59:14 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-17 09:27:38 -04:00
|
|
|
static void nl80211_remove_monitor_interface(
|
|
|
|
struct wpa_driver_nl80211_data *drv)
|
|
|
|
{
|
2013-10-31 15:55:17 -04:00
|
|
|
if (drv->monitor_refcount > 0)
|
|
|
|
drv->monitor_refcount--;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Remove monitor interface: refcount=%d",
|
|
|
|
drv->monitor_refcount);
|
2011-12-03 12:47:01 -05:00
|
|
|
if (drv->monitor_refcount > 0)
|
|
|
|
return;
|
|
|
|
|
2009-04-17 09:27:38 -04:00
|
|
|
if (drv->monitor_ifidx >= 0) {
|
|
|
|
nl80211_remove_iface(drv, drv->monitor_ifidx);
|
|
|
|
drv->monitor_ifidx = -1;
|
|
|
|
}
|
2010-01-03 06:30:22 -05:00
|
|
|
if (drv->monitor_sock >= 0) {
|
|
|
|
eloop_unregister_read_sock(drv->monitor_sock);
|
|
|
|
close(drv->monitor_sock);
|
|
|
|
drv->monitor_sock = -1;
|
|
|
|
}
|
2009-04-17 09:27:38 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-02 14:59:14 -04:00
|
|
|
static int
|
|
|
|
nl80211_create_monitor_interface(struct wpa_driver_nl80211_data *drv)
|
|
|
|
{
|
|
|
|
char buf[IFNAMSIZ];
|
|
|
|
struct sockaddr_ll ll;
|
|
|
|
int optval;
|
|
|
|
socklen_t optlen;
|
|
|
|
|
2011-12-03 12:47:01 -05:00
|
|
|
if (drv->monitor_ifidx >= 0) {
|
|
|
|
drv->monitor_refcount++;
|
2013-10-31 15:55:17 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Re-use existing monitor interface: refcount=%d",
|
|
|
|
drv->monitor_refcount);
|
2011-12-03 12:47:01 -05:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-10-29 20:41:39 -04:00
|
|
|
if (os_strncmp(drv->first_bss->ifname, "p2p-", 4) == 0) {
|
2011-10-15 06:07:30 -04:00
|
|
|
/*
|
|
|
|
* P2P interface name is of the format p2p-%s-%d. For monitor
|
|
|
|
* interface name corresponding to P2P GO, replace "p2p-" with
|
|
|
|
* "mon-" to retain the same interface name length and to
|
|
|
|
* indicate that it is a monitor interface.
|
|
|
|
*/
|
2013-10-29 20:41:39 -04:00
|
|
|
snprintf(buf, IFNAMSIZ, "mon-%s", drv->first_bss->ifname + 4);
|
2011-10-15 06:07:30 -04:00
|
|
|
} else {
|
|
|
|
/* Non-P2P interface with AP functionality. */
|
2013-10-29 20:41:39 -04:00
|
|
|
snprintf(buf, IFNAMSIZ, "mon.%s", drv->first_bss->ifname);
|
2011-10-15 06:07:30 -04:00
|
|
|
}
|
|
|
|
|
2009-04-02 14:59:14 -04:00
|
|
|
buf[IFNAMSIZ - 1] = '\0';
|
|
|
|
|
|
|
|
drv->monitor_ifidx =
|
2009-12-24 04:46:22 -05:00
|
|
|
nl80211_create_iface(drv, buf, NL80211_IFTYPE_MONITOR, NULL,
|
2013-10-31 13:41:42 -04:00
|
|
|
0, NULL, NULL, 0);
|
2009-04-02 14:59:14 -04:00
|
|
|
|
2011-06-28 14:59:44 -04:00
|
|
|
if (drv->monitor_ifidx == -EOPNOTSUPP) {
|
2011-11-19 06:42:49 -05:00
|
|
|
/*
|
|
|
|
* This is backward compatibility for a few versions of
|
|
|
|
* the kernel only that didn't advertise the right
|
|
|
|
* attributes for the only driver that then supported
|
|
|
|
* AP mode w/o monitor -- ath6kl.
|
|
|
|
*/
|
2011-06-28 14:59:44 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Driver does not support "
|
|
|
|
"monitor interface type - try to run without it");
|
2011-11-19 06:42:49 -05:00
|
|
|
drv->device_ap_sme = 1;
|
2011-06-28 14:59:44 -04:00
|
|
|
}
|
|
|
|
|
2009-04-02 14:59:14 -04:00
|
|
|
if (drv->monitor_ifidx < 0)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_set_iface_flags(drv->global->ioctl_sock, buf, 1))
|
2009-04-02 14:59:14 -04:00
|
|
|
goto error;
|
|
|
|
|
|
|
|
memset(&ll, 0, sizeof(ll));
|
|
|
|
ll.sll_family = AF_PACKET;
|
|
|
|
ll.sll_ifindex = drv->monitor_ifidx;
|
|
|
|
drv->monitor_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
|
|
|
|
if (drv->monitor_sock < 0) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: socket[PF_PACKET,SOCK_RAW] failed: %s",
|
|
|
|
strerror(errno));
|
2009-04-02 14:59:14 -04:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (add_monitor_filter(drv->monitor_sock)) {
|
|
|
|
wpa_printf(MSG_INFO, "Failed to set socket filter for monitor "
|
|
|
|
"interface; do filtering in user space");
|
|
|
|
/* This works, but will cost in performance. */
|
|
|
|
}
|
|
|
|
|
2009-04-09 13:41:21 -04:00
|
|
|
if (bind(drv->monitor_sock, (struct sockaddr *) &ll, sizeof(ll)) < 0) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: monitor socket bind failed: %s",
|
|
|
|
strerror(errno));
|
2009-04-02 14:59:14 -04:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
optlen = sizeof(optval);
|
|
|
|
optval = 20;
|
|
|
|
if (setsockopt
|
|
|
|
(drv->monitor_sock, SOL_SOCKET, SO_PRIORITY, &optval, optlen)) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to set socket priority: %s",
|
|
|
|
strerror(errno));
|
2009-04-02 14:59:14 -04:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (eloop_register_read_sock(drv->monitor_sock, handle_monitor_read,
|
|
|
|
drv, NULL)) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: Could not register monitor read socket");
|
2009-04-02 14:59:14 -04:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2013-10-31 15:55:17 -04:00
|
|
|
drv->monitor_refcount++;
|
2009-04-02 14:59:14 -04:00
|
|
|
return 0;
|
|
|
|
error:
|
2009-04-17 09:27:38 -04:00
|
|
|
nl80211_remove_monitor_interface(drv);
|
2009-04-02 14:59:14 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2009-04-20 09:27:45 -04:00
|
|
|
|
2011-12-03 12:47:01 -05:00
|
|
|
static int nl80211_setup_ap(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
|
2013-10-31 15:55:17 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Setup AP(%s) - device_ap_sme=%d use_monitor=%d",
|
|
|
|
bss->ifname, drv->device_ap_sme, drv->use_monitor);
|
2011-12-23 11:10:59 -05:00
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
/*
|
|
|
|
* Disable Probe Request reporting unless we need it in this way for
|
|
|
|
* devices that include the AP SME, in the other case (unless using
|
|
|
|
* monitor iface) we'll get it through the nl_mgmt socket instead.
|
|
|
|
*/
|
|
|
|
if (!drv->device_ap_sme)
|
|
|
|
wpa_driver_nl80211_probe_req_report(bss, 0);
|
|
|
|
|
|
|
|
if (!drv->device_ap_sme && !drv->use_monitor)
|
|
|
|
if (nl80211_mgmt_subscribe_ap(bss))
|
|
|
|
return -1;
|
|
|
|
|
2011-12-23 11:15:07 -05:00
|
|
|
if (drv->device_ap_sme && !drv->use_monitor)
|
|
|
|
if (nl80211_mgmt_subscribe_ap_dev_sme(bss))
|
|
|
|
return -1;
|
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
if (!drv->device_ap_sme && drv->use_monitor &&
|
2011-12-03 12:47:01 -05:00
|
|
|
nl80211_create_monitor_interface(drv) &&
|
|
|
|
!drv->device_ap_sme)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (drv->device_ap_sme &&
|
|
|
|
wpa_driver_nl80211_probe_req_report(bss, 1) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to enable "
|
|
|
|
"Probe Request frame reporting in AP mode");
|
|
|
|
/* Try to survive without this */
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void nl80211_teardown_ap(struct i802_bss *bss)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
|
2013-10-31 15:55:17 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Teardown AP(%s) - device_ap_sme=%d use_monitor=%d",
|
|
|
|
bss->ifname, drv->device_ap_sme, drv->use_monitor);
|
2011-12-23 11:15:07 -05:00
|
|
|
if (drv->device_ap_sme) {
|
2011-12-03 12:47:01 -05:00
|
|
|
wpa_driver_nl80211_probe_req_report(bss, 0);
|
2011-12-23 11:15:07 -05:00
|
|
|
if (!drv->use_monitor)
|
|
|
|
nl80211_mgmt_unsubscribe(bss, "AP teardown (dev SME)");
|
|
|
|
} else if (drv->use_monitor)
|
2011-12-03 12:47:01 -05:00
|
|
|
nl80211_remove_monitor_interface(drv);
|
2011-12-06 11:24:00 -05:00
|
|
|
else
|
2011-12-23 11:10:59 -05:00
|
|
|
nl80211_mgmt_unsubscribe(bss, "AP teardown");
|
2011-12-06 11:24:00 -05:00
|
|
|
|
2011-12-03 12:47:01 -05:00
|
|
|
bss->beacon_set = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-08-09 07:04:53 -04:00
|
|
|
static int nl80211_send_eapol_data(struct i802_bss *bss,
|
|
|
|
const u8 *addr, const u8 *data,
|
2011-11-19 07:00:53 -05:00
|
|
|
size_t data_len)
|
2011-08-09 07:04:53 -04:00
|
|
|
{
|
2011-11-19 07:00:53 -05:00
|
|
|
struct sockaddr_ll ll;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (bss->drv->eapol_tx_sock < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: No socket to send EAPOL");
|
2011-08-09 07:04:53 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-11-19 07:00:53 -05:00
|
|
|
os_memset(&ll, 0, sizeof(ll));
|
|
|
|
ll.sll_family = AF_PACKET;
|
|
|
|
ll.sll_ifindex = bss->ifindex;
|
|
|
|
ll.sll_protocol = htons(ETH_P_PAE);
|
|
|
|
ll.sll_halen = ETH_ALEN;
|
|
|
|
os_memcpy(ll.sll_addr, addr, ETH_ALEN);
|
|
|
|
ret = sendto(bss->drv->eapol_tx_sock, data, data_len, 0,
|
|
|
|
(struct sockaddr *) &ll, sizeof(ll));
|
|
|
|
if (ret < 0)
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: EAPOL TX: %s",
|
|
|
|
strerror(errno));
|
|
|
|
|
|
|
|
return ret;
|
2011-08-09 07:04:53 -04:00
|
|
|
}
|
2011-08-09 16:32:26 -04:00
|
|
|
|
2011-08-09 07:04:53 -04:00
|
|
|
|
2009-04-20 09:27:45 -04:00
|
|
|
static const u8 rfc1042_header[6] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_hapd_send_eapol(
|
|
|
|
void *priv, const u8 *addr, const u8 *data,
|
2011-04-02 15:03:05 -04:00
|
|
|
size_t data_len, int encrypt, const u8 *own_addr, u32 flags)
|
2009-04-20 09:27:45 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-20 09:27:45 -04:00
|
|
|
struct ieee80211_hdr *hdr;
|
|
|
|
size_t len;
|
|
|
|
u8 *pos;
|
|
|
|
int res;
|
2011-04-02 15:03:05 -04:00
|
|
|
int qos = flags & WPA_STA_WMM;
|
2009-04-20 09:27:45 -04:00
|
|
|
|
2011-12-06 11:24:00 -05:00
|
|
|
if (drv->device_ap_sme || !drv->use_monitor)
|
2011-11-19 07:00:53 -05:00
|
|
|
return nl80211_send_eapol_data(bss, addr, data, data_len);
|
2011-08-09 07:04:53 -04:00
|
|
|
|
2009-04-20 09:27:45 -04:00
|
|
|
len = sizeof(*hdr) + (qos ? 2 : 0) + sizeof(rfc1042_header) + 2 +
|
|
|
|
data_len;
|
|
|
|
hdr = os_zalloc(len);
|
|
|
|
if (hdr == NULL) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: Failed to allocate EAPOL buffer(len=%lu)",
|
|
|
|
(unsigned long) len);
|
2009-04-20 09:27:45 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
hdr->frame_control =
|
|
|
|
IEEE80211_FC(WLAN_FC_TYPE_DATA, WLAN_FC_STYPE_DATA);
|
|
|
|
hdr->frame_control |= host_to_le16(WLAN_FC_FROMDS);
|
|
|
|
if (encrypt)
|
|
|
|
hdr->frame_control |= host_to_le16(WLAN_FC_ISWEP);
|
|
|
|
if (qos) {
|
|
|
|
hdr->frame_control |=
|
|
|
|
host_to_le16(WLAN_FC_STYPE_QOS_DATA << 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(hdr->IEEE80211_DA_FROMDS, addr, ETH_ALEN);
|
|
|
|
memcpy(hdr->IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
|
|
|
|
memcpy(hdr->IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
|
|
|
|
pos = (u8 *) (hdr + 1);
|
|
|
|
|
|
|
|
if (qos) {
|
2012-09-16 01:40:00 -04:00
|
|
|
/* Set highest priority in QoS header */
|
|
|
|
pos[0] = 7;
|
2009-04-20 09:27:45 -04:00
|
|
|
pos[1] = 0;
|
|
|
|
pos += 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(pos, rfc1042_header, sizeof(rfc1042_header));
|
|
|
|
pos += sizeof(rfc1042_header);
|
|
|
|
WPA_PUT_BE16(pos, ETH_P_PAE);
|
|
|
|
pos += 2;
|
|
|
|
memcpy(pos, data, data_len);
|
|
|
|
|
2012-01-26 10:44:11 -05:00
|
|
|
res = wpa_driver_nl80211_send_frame(bss, (u8 *) hdr, len, encrypt, 0,
|
|
|
|
0, 0, 0, 0);
|
2009-04-20 09:27:45 -04:00
|
|
|
if (res < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "i802_send_eapol - packet len: %lu - "
|
|
|
|
"failed: %d (%s)",
|
|
|
|
(unsigned long) len, errno, strerror(errno));
|
|
|
|
}
|
2009-12-21 15:32:59 -05:00
|
|
|
os_free(hdr);
|
2009-04-20 09:27:45 -04:00
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2009-04-20 09:33:13 -04:00
|
|
|
|
2010-03-07 04:45:41 -05:00
|
|
|
static int wpa_driver_nl80211_sta_set_flags(void *priv, const u8 *addr,
|
|
|
|
int total_flags,
|
2010-03-06 13:44:31 -05:00
|
|
|
int flags_or, int flags_and)
|
2009-04-20 09:33:13 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
struct nlattr *flags;
|
2009-05-14 14:53:21 -04:00
|
|
|
struct nl80211_sta_flag_update upd;
|
2009-04-20 09:33:13 -04:00
|
|
|
|
2014-09-11 04:25:04 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Set STA flags - ifname=%s addr=" MACSTR
|
|
|
|
" total_flags=0x%x flags_or=0x%x flags_and=0x%x authorized=%d",
|
|
|
|
bss->ifname, MAC2STR(addr), total_flags, flags_or, flags_and,
|
|
|
|
!!(total_flags & WPA_STA_AUTHORIZED));
|
|
|
|
|
2009-04-20 09:33:13 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_STATION);
|
2009-04-20 09:33:13 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
|
2010-03-07 04:45:41 -05:00
|
|
|
if_nametoindex(bss->ifname));
|
2009-04-20 09:33:13 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
|
|
|
|
|
2009-05-14 14:53:21 -04:00
|
|
|
/*
|
|
|
|
* Backwards compatibility version using NL80211_ATTR_STA_FLAGS. This
|
|
|
|
* can be removed eventually.
|
|
|
|
*/
|
2013-03-30 14:37:44 -04:00
|
|
|
flags = nla_nest_start(msg, NL80211_ATTR_STA_FLAGS);
|
|
|
|
if (!flags)
|
|
|
|
goto nla_put_failure;
|
2009-12-13 04:35:39 -05:00
|
|
|
if (total_flags & WPA_STA_AUTHORIZED)
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_STA_FLAG_AUTHORIZED);
|
2009-04-20 09:33:13 -04:00
|
|
|
|
2009-12-13 04:35:39 -05:00
|
|
|
if (total_flags & WPA_STA_WMM)
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_STA_FLAG_WME);
|
2009-04-20 09:33:13 -04:00
|
|
|
|
2009-12-13 04:35:39 -05:00
|
|
|
if (total_flags & WPA_STA_SHORT_PREAMBLE)
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_STA_FLAG_SHORT_PREAMBLE);
|
2009-04-20 09:33:13 -04:00
|
|
|
|
2009-12-13 04:35:39 -05:00
|
|
|
if (total_flags & WPA_STA_MFP)
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_STA_FLAG_MFP);
|
2009-04-20 09:33:13 -04:00
|
|
|
|
2011-10-23 07:02:57 -04:00
|
|
|
if (total_flags & WPA_STA_TDLS_PEER)
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_STA_FLAG_TDLS_PEER);
|
2011-10-23 07:02:57 -04:00
|
|
|
|
2013-03-30 14:37:44 -04:00
|
|
|
nla_nest_end(msg, flags);
|
2009-04-20 09:33:13 -04:00
|
|
|
|
2009-05-14 14:53:21 -04:00
|
|
|
os_memset(&upd, 0, sizeof(upd));
|
|
|
|
upd.mask = sta_flags_nl80211(flags_or | ~flags_and);
|
|
|
|
upd.set = sta_flags_nl80211(flags_or);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd);
|
|
|
|
|
2009-04-20 09:33:13 -04:00
|
|
|
return send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-20 09:33:13 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
2009-04-02 14:59:14 -04:00
|
|
|
|
2009-03-25 05:38:47 -04:00
|
|
|
static int wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_driver_associate_params *params)
|
|
|
|
{
|
2013-01-07 17:34:08 -05:00
|
|
|
enum nl80211_iftype nlmode, old_mode;
|
2011-07-17 13:22:11 -04:00
|
|
|
|
|
|
|
if (params->p2p) {
|
2010-07-18 17:30:25 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Setup AP operations for P2P "
|
|
|
|
"group (GO)");
|
2011-07-17 13:22:11 -04:00
|
|
|
nlmode = NL80211_IFTYPE_P2P_GO;
|
|
|
|
} else
|
|
|
|
nlmode = NL80211_IFTYPE_AP;
|
|
|
|
|
2013-01-07 17:34:08 -05:00
|
|
|
old_mode = drv->nlmode;
|
2013-10-29 20:41:39 -04:00
|
|
|
if (wpa_driver_nl80211_set_mode(drv->first_bss, nlmode)) {
|
2013-01-07 17:34:08 -05:00
|
|
|
nl80211_remove_monitor_interface(drv);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2014-10-01 03:52:53 -04:00
|
|
|
if (nl80211_set_channel(drv->first_bss, ¶ms->freq, 0)) {
|
2013-01-07 17:34:08 -05:00
|
|
|
if (old_mode != nlmode)
|
2013-10-29 20:41:39 -04:00
|
|
|
wpa_driver_nl80211_set_mode(drv->first_bss, old_mode);
|
2009-04-17 09:27:38 -04:00
|
|
|
nl80211_remove_monitor_interface(drv);
|
2009-03-25 05:38:47 -04:00
|
|
|
return -1;
|
2009-04-02 14:59:14 -04:00
|
|
|
}
|
2009-03-25 05:38:47 -04:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-03 17:15:32 -05:00
|
|
|
static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_LEAVE_IBSS);
|
2009-12-03 17:15:32 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Leave IBSS failed: ret=%d "
|
|
|
|
"(%s)", ret, strerror(-ret));
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Leave IBSS request sent successfully");
|
|
|
|
|
|
|
|
nla_put_failure:
|
2013-10-29 20:41:39 -04:00
|
|
|
if (wpa_driver_nl80211_set_mode(drv->first_bss,
|
2013-09-25 16:14:41 -04:00
|
|
|
NL80211_IFTYPE_STATION)) {
|
|
|
|
wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
|
|
|
|
"station mode");
|
|
|
|
}
|
|
|
|
|
2009-12-03 17:15:32 -05:00
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_ibss(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_driver_associate_params *params)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = -1;
|
|
|
|
int count = 0;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Join IBSS (ifindex=%d)", drv->ifindex);
|
|
|
|
|
2014-10-01 03:52:53 -04:00
|
|
|
if (wpa_driver_nl80211_set_mode_ibss(drv->first_bss, ¶ms->freq)) {
|
2009-12-03 17:15:32 -05:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
|
|
|
|
"IBSS mode");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
retry:
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_JOIN_IBSS);
|
2009-12-03 17:15:32 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
if (params->ssid == NULL || params->ssid_len > sizeof(drv->ssid))
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
wpa_hexdump_ascii(MSG_DEBUG, " * SSID",
|
|
|
|
params->ssid, params->ssid_len);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
|
|
|
|
params->ssid);
|
|
|
|
os_memcpy(drv->ssid, params->ssid, params->ssid_len);
|
|
|
|
drv->ssid_len = params->ssid_len;
|
|
|
|
|
2014-10-01 03:52:53 -04:00
|
|
|
wpa_printf(MSG_DEBUG, " * freq=%d", params->freq.freq);
|
|
|
|
wpa_printf(MSG_DEBUG, " * ht_enabled=%d", params->freq.ht_enabled);
|
|
|
|
wpa_printf(MSG_DEBUG, " * sec_channel_offset=%d",
|
|
|
|
params->freq.sec_channel_offset);
|
|
|
|
wpa_printf(MSG_DEBUG, " * vht_enabled=%d", params->freq.vht_enabled);
|
|
|
|
wpa_printf(MSG_DEBUG, " * center_freq1=%d", params->freq.center_freq1);
|
|
|
|
wpa_printf(MSG_DEBUG, " * center_freq2=%d", params->freq.center_freq2);
|
|
|
|
wpa_printf(MSG_DEBUG, " * bandwidth=%d", params->freq.bandwidth);
|
|
|
|
if (nl80211_put_freq_params(msg, ¶ms->freq) < 0)
|
|
|
|
goto nla_put_failure;
|
2009-12-03 17:15:32 -05:00
|
|
|
|
2014-03-06 16:09:20 -05:00
|
|
|
if (params->beacon_int > 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * beacon_int=%d", params->beacon_int);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_BEACON_INTERVAL,
|
|
|
|
params->beacon_int);
|
|
|
|
}
|
|
|
|
|
2009-12-03 17:15:32 -05:00
|
|
|
ret = nl80211_set_conn_keys(params, msg);
|
|
|
|
if (ret)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2012-01-28 04:35:32 -05:00
|
|
|
if (params->bssid && params->fixed_bssid) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * BSSID=" MACSTR,
|
|
|
|
MAC2STR(params->bssid));
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid);
|
|
|
|
}
|
|
|
|
|
2013-12-30 12:33:39 -05:00
|
|
|
if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
|
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
|
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
|
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256) {
|
2012-02-12 11:08:34 -05:00
|
|
|
wpa_printf(MSG_DEBUG, " * control port");
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_CONTROL_PORT);
|
|
|
|
}
|
|
|
|
|
2009-12-04 15:20:59 -05:00
|
|
|
if (params->wpa_ie) {
|
|
|
|
wpa_hexdump(MSG_DEBUG,
|
|
|
|
" * Extra IEs for Beacon/Probe Response frames",
|
|
|
|
params->wpa_ie, params->wpa_ie_len);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_IE, params->wpa_ie_len,
|
|
|
|
params->wpa_ie);
|
|
|
|
}
|
|
|
|
|
2009-12-03 17:15:32 -05:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Join IBSS failed: ret=%d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
count++;
|
|
|
|
if (ret == -EALREADY && count == 1) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Retry IBSS join after "
|
|
|
|
"forced leave");
|
|
|
|
nl80211_leave_ibss(drv);
|
|
|
|
nlmsg_free(msg);
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Join IBSS request sent successfully");
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-12-30 13:34:57 -05:00
|
|
|
static int nl80211_connect_common(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_driver_associate_params *params,
|
|
|
|
struct nl_msg *msg)
|
2009-09-03 14:31:29 -04:00
|
|
|
{
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
2013-12-30 13:34:57 -05:00
|
|
|
|
2009-09-03 14:31:29 -04:00
|
|
|
if (params->bssid) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * bssid=" MACSTR,
|
|
|
|
MAC2STR(params->bssid));
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid);
|
|
|
|
}
|
2013-12-30 13:34:57 -05:00
|
|
|
|
2014-02-13 08:14:18 -05:00
|
|
|
if (params->bssid_hint) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * bssid_hint=" MACSTR,
|
|
|
|
MAC2STR(params->bssid_hint));
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC_HINT, ETH_ALEN,
|
|
|
|
params->bssid_hint);
|
|
|
|
}
|
|
|
|
|
2014-10-01 03:52:53 -04:00
|
|
|
if (params->freq.freq) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * freq=%d", params->freq.freq);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq.freq);
|
|
|
|
drv->assoc_freq = params->freq.freq;
|
2013-08-23 08:41:05 -04:00
|
|
|
} else
|
|
|
|
drv->assoc_freq = 0;
|
2013-12-30 13:34:57 -05:00
|
|
|
|
2014-02-13 08:14:18 -05:00
|
|
|
if (params->freq_hint) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * freq_hint=%d", params->freq_hint);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ_HINT,
|
|
|
|
params->freq_hint);
|
|
|
|
}
|
|
|
|
|
2012-03-30 08:20:35 -04:00
|
|
|
if (params->bg_scan_period >= 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * bg scan period=%d",
|
|
|
|
params->bg_scan_period);
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_BG_SCAN_PERIOD,
|
|
|
|
params->bg_scan_period);
|
|
|
|
}
|
2013-12-30 13:34:57 -05:00
|
|
|
|
2009-09-03 14:31:29 -04:00
|
|
|
if (params->ssid) {
|
|
|
|
wpa_hexdump_ascii(MSG_DEBUG, " * SSID",
|
|
|
|
params->ssid, params->ssid_len);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
|
|
|
|
params->ssid);
|
|
|
|
if (params->ssid_len > sizeof(drv->ssid))
|
|
|
|
goto nla_put_failure;
|
|
|
|
os_memcpy(drv->ssid, params->ssid, params->ssid_len);
|
|
|
|
drv->ssid_len = params->ssid_len;
|
|
|
|
}
|
2013-12-30 13:34:57 -05:00
|
|
|
|
2009-09-03 14:31:29 -04:00
|
|
|
wpa_hexdump(MSG_DEBUG, " * IEs", params->wpa_ie, params->wpa_ie_len);
|
|
|
|
if (params->wpa_ie)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_IE, params->wpa_ie_len,
|
|
|
|
params->wpa_ie);
|
|
|
|
|
2011-09-02 13:40:23 -04:00
|
|
|
if (params->wpa_proto) {
|
|
|
|
enum nl80211_wpa_versions ver = 0;
|
2009-09-03 14:31:29 -04:00
|
|
|
|
2011-09-02 13:40:23 -04:00
|
|
|
if (params->wpa_proto & WPA_PROTO_WPA)
|
|
|
|
ver |= NL80211_WPA_VERSION_1;
|
|
|
|
if (params->wpa_proto & WPA_PROTO_RSN)
|
|
|
|
ver |= NL80211_WPA_VERSION_2;
|
2009-09-03 14:31:29 -04:00
|
|
|
|
2011-09-02 13:40:23 -04:00
|
|
|
wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver);
|
2009-09-03 14:31:29 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver);
|
|
|
|
}
|
|
|
|
|
2013-12-30 12:33:39 -05:00
|
|
|
if (params->pairwise_suite != WPA_CIPHER_NONE) {
|
2013-12-30 13:34:57 -05:00
|
|
|
u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite);
|
|
|
|
wpa_printf(MSG_DEBUG, " * pairwise=0x%x", cipher);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE, cipher);
|
2009-09-03 14:31:29 -04:00
|
|
|
}
|
|
|
|
|
2014-01-27 12:11:15 -05:00
|
|
|
if (params->group_suite == WPA_CIPHER_GTK_NOT_USED &&
|
|
|
|
!(drv->capa.enc & WPA_DRIVER_CAPA_ENC_GTK_NOT_USED)) {
|
|
|
|
/*
|
|
|
|
* This is likely to work even though many drivers do not
|
|
|
|
* advertise support for operations without GTK.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, " * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement");
|
|
|
|
} else if (params->group_suite != WPA_CIPHER_NONE) {
|
2013-12-30 13:34:57 -05:00
|
|
|
u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite);
|
|
|
|
wpa_printf(MSG_DEBUG, " * group=0x%x", cipher);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher);
|
2009-09-03 14:31:29 -04:00
|
|
|
}
|
|
|
|
|
2013-12-30 12:33:39 -05:00
|
|
|
if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
|
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
|
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_FT_IEEE8021X ||
|
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_FT_PSK ||
|
2014-03-25 11:57:54 -04:00
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_CCKM ||
|
2014-05-20 01:35:15 -04:00
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_OSEN ||
|
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
|
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256) {
|
2009-09-03 14:31:29 -04:00
|
|
|
int mgmt = WLAN_AKM_SUITE_PSK;
|
|
|
|
|
|
|
|
switch (params->key_mgmt_suite) {
|
2013-12-30 12:33:39 -05:00
|
|
|
case WPA_KEY_MGMT_CCKM:
|
2012-09-30 13:26:55 -04:00
|
|
|
mgmt = WLAN_AKM_SUITE_CCKM;
|
|
|
|
break;
|
2013-12-30 12:33:39 -05:00
|
|
|
case WPA_KEY_MGMT_IEEE8021X:
|
2009-09-03 14:31:29 -04:00
|
|
|
mgmt = WLAN_AKM_SUITE_8021X;
|
|
|
|
break;
|
2013-12-30 12:33:39 -05:00
|
|
|
case WPA_KEY_MGMT_FT_IEEE8021X:
|
2013-03-12 14:08:53 -04:00
|
|
|
mgmt = WLAN_AKM_SUITE_FT_8021X;
|
|
|
|
break;
|
2013-12-30 12:33:39 -05:00
|
|
|
case WPA_KEY_MGMT_FT_PSK:
|
2013-03-12 14:08:53 -04:00
|
|
|
mgmt = WLAN_AKM_SUITE_FT_PSK;
|
|
|
|
break;
|
2014-05-20 01:35:15 -04:00
|
|
|
case WPA_KEY_MGMT_IEEE8021X_SHA256:
|
|
|
|
mgmt = WLAN_AKM_SUITE_8021X_SHA256;
|
|
|
|
break;
|
|
|
|
case WPA_KEY_MGMT_PSK_SHA256:
|
|
|
|
mgmt = WLAN_AKM_SUITE_PSK_SHA256;
|
|
|
|
break;
|
2014-03-25 11:57:54 -04:00
|
|
|
case WPA_KEY_MGMT_OSEN:
|
|
|
|
mgmt = WLAN_AKM_SUITE_OSEN;
|
|
|
|
break;
|
2013-12-30 12:33:39 -05:00
|
|
|
case WPA_KEY_MGMT_PSK:
|
2009-09-03 14:31:29 -04:00
|
|
|
default:
|
|
|
|
mgmt = WLAN_AKM_SUITE_PSK;
|
|
|
|
break;
|
|
|
|
}
|
2014-03-25 11:57:54 -04:00
|
|
|
wpa_printf(MSG_DEBUG, " * akm=0x%x", mgmt);
|
2009-09-03 14:31:29 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_AKM_SUITES, mgmt);
|
|
|
|
}
|
|
|
|
|
2013-12-30 13:34:57 -05:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_CONTROL_PORT);
|
|
|
|
|
2013-01-12 02:54:54 -05:00
|
|
|
if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED)
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED);
|
2013-12-30 11:21:04 -05:00
|
|
|
|
2012-01-29 14:01:31 -05:00
|
|
|
if (params->disable_ht)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_DISABLE_HT);
|
|
|
|
|
|
|
|
if (params->htcaps && params->htcaps_mask) {
|
|
|
|
int sz = sizeof(struct ieee80211_ht_capabilities);
|
2014-04-15 10:22:05 -04:00
|
|
|
wpa_hexdump(MSG_DEBUG, " * htcaps", params->htcaps, sz);
|
2012-01-29 14:01:31 -05:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_HT_CAPABILITY, sz, params->htcaps);
|
2014-04-15 10:22:05 -04:00
|
|
|
wpa_hexdump(MSG_DEBUG, " * htcaps_mask",
|
|
|
|
params->htcaps_mask, sz);
|
2012-01-29 14:01:31 -05:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_HT_CAPABILITY_MASK, sz,
|
|
|
|
params->htcaps_mask);
|
|
|
|
}
|
|
|
|
|
2013-03-10 12:04:39 -04:00
|
|
|
#ifdef CONFIG_VHT_OVERRIDES
|
|
|
|
if (params->disable_vht) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * VHT disabled");
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_DISABLE_VHT);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (params->vhtcaps && params->vhtcaps_mask) {
|
|
|
|
int sz = sizeof(struct ieee80211_vht_capabilities);
|
2014-04-15 10:22:05 -04:00
|
|
|
wpa_hexdump(MSG_DEBUG, " * vhtcaps", params->vhtcaps, sz);
|
2013-03-10 12:04:39 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_VHT_CAPABILITY, sz, params->vhtcaps);
|
2014-04-15 10:22:05 -04:00
|
|
|
wpa_hexdump(MSG_DEBUG, " * vhtcaps_mask",
|
|
|
|
params->vhtcaps_mask, sz);
|
2013-03-10 12:04:39 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_VHT_CAPABILITY_MASK, sz,
|
|
|
|
params->vhtcaps_mask);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_VHT_OVERRIDES */
|
|
|
|
|
2013-12-30 13:34:57 -05:00
|
|
|
if (params->p2p)
|
|
|
|
wpa_printf(MSG_DEBUG, " * P2P group");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
nla_put_failure:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_try_connect(
|
|
|
|
struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_driver_associate_params *params)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
enum nl80211_auth_type type;
|
|
|
|
int ret;
|
|
|
|
int algs;
|
|
|
|
|
2014-10-23 11:21:49 -04:00
|
|
|
if (params->req_key_mgmt_offload && params->psk &&
|
|
|
|
(params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
|
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256 ||
|
|
|
|
params->key_mgmt_suite == WPA_KEY_MGMT_FT_PSK)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Key management set PSK");
|
|
|
|
ret = issue_key_mgmt_set_key(drv, params->psk, 32);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-12-30 13:34:57 -05:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Connect (ifindex=%d)", drv->ifindex);
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_CONNECT);
|
|
|
|
|
|
|
|
ret = nl80211_connect_common(drv, params, msg);
|
|
|
|
if (ret)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
algs = 0;
|
|
|
|
if (params->auth_alg & WPA_AUTH_ALG_OPEN)
|
|
|
|
algs++;
|
|
|
|
if (params->auth_alg & WPA_AUTH_ALG_SHARED)
|
|
|
|
algs++;
|
|
|
|
if (params->auth_alg & WPA_AUTH_ALG_LEAP)
|
|
|
|
algs++;
|
|
|
|
if (algs > 1) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * Leave out Auth Type for automatic "
|
|
|
|
"selection");
|
|
|
|
goto skip_auth_type;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (params->auth_alg & WPA_AUTH_ALG_OPEN)
|
|
|
|
type = NL80211_AUTHTYPE_OPEN_SYSTEM;
|
|
|
|
else if (params->auth_alg & WPA_AUTH_ALG_SHARED)
|
|
|
|
type = NL80211_AUTHTYPE_SHARED_KEY;
|
|
|
|
else if (params->auth_alg & WPA_AUTH_ALG_LEAP)
|
|
|
|
type = NL80211_AUTHTYPE_NETWORK_EAP;
|
|
|
|
else if (params->auth_alg & WPA_AUTH_ALG_FT)
|
|
|
|
type = NL80211_AUTHTYPE_FT;
|
|
|
|
else
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, " * Auth Type %d", type);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE, type);
|
|
|
|
|
|
|
|
skip_auth_type:
|
2009-09-03 14:31:29 -04:00
|
|
|
ret = nl80211_set_conn_keys(params, msg);
|
|
|
|
if (ret)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: MLME connect failed: ret=%d "
|
|
|
|
"(%s)", ret, strerror(-ret));
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Connect request send successfully");
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-11-11 09:15:29 -05:00
|
|
|
static int wpa_driver_nl80211_connect(
|
|
|
|
struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_driver_associate_params *params)
|
|
|
|
{
|
|
|
|
int ret = wpa_driver_nl80211_try_connect(drv, params);
|
|
|
|
if (ret == -EALREADY) {
|
|
|
|
/*
|
|
|
|
* cfg80211 does not currently accept new connections if
|
|
|
|
* we are already connected. As a workaround, force
|
|
|
|
* disconnection and try again.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Explicitly "
|
|
|
|
"disconnecting before reassociation "
|
|
|
|
"attempt");
|
|
|
|
if (wpa_driver_nl80211_disconnect(
|
|
|
|
drv, WLAN_REASON_PREV_AUTH_NOT_VALID))
|
|
|
|
return -1;
|
|
|
|
ret = wpa_driver_nl80211_try_connect(drv, params);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-03-20 16:26:41 -04:00
|
|
|
static int wpa_driver_nl80211_associate(
|
|
|
|
void *priv, struct wpa_driver_associate_params *params)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2013-12-30 13:34:57 -05:00
|
|
|
int ret;
|
2009-03-20 16:26:41 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
|
2009-12-03 17:15:32 -05:00
|
|
|
if (params->mode == IEEE80211_MODE_AP)
|
2009-03-25 05:38:47 -04:00
|
|
|
return wpa_driver_nl80211_ap(drv, params);
|
|
|
|
|
2009-12-03 17:15:32 -05:00
|
|
|
if (params->mode == IEEE80211_MODE_IBSS)
|
|
|
|
return wpa_driver_nl80211_ibss(drv, params);
|
|
|
|
|
2009-11-23 13:22:38 -05:00
|
|
|
if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
|
2011-07-17 13:22:11 -04:00
|
|
|
enum nl80211_iftype nlmode = params->p2p ?
|
|
|
|
NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
|
|
|
|
|
|
|
|
if (wpa_driver_nl80211_set_mode(priv, nlmode) < 0)
|
2009-11-23 13:22:38 -05:00
|
|
|
return -1;
|
2009-09-03 14:31:29 -04:00
|
|
|
return wpa_driver_nl80211_connect(drv, params);
|
2009-11-23 13:22:38 -05:00
|
|
|
}
|
2009-09-03 14:31:29 -04:00
|
|
|
|
2013-05-27 13:10:57 -04:00
|
|
|
nl80211_mark_disconnected(drv);
|
2009-03-20 16:26:41 -04:00
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Associate (ifindex=%d)",
|
|
|
|
drv->ifindex);
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_ASSOCIATE);
|
2009-03-20 16:26:41 -04:00
|
|
|
|
2013-12-30 13:34:57 -05:00
|
|
|
ret = nl80211_connect_common(drv, params, msg);
|
|
|
|
if (ret)
|
|
|
|
goto nla_put_failure;
|
2009-05-14 14:54:47 -04:00
|
|
|
|
2009-11-17 12:25:05 -05:00
|
|
|
if (params->prev_bssid) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * prev_bssid=" MACSTR,
|
|
|
|
MAC2STR(params->prev_bssid));
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_PREV_BSSID, ETH_ALEN,
|
|
|
|
params->prev_bssid);
|
|
|
|
}
|
|
|
|
|
2009-03-20 16:26:41 -04:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
2011-11-18 16:41:52 -05:00
|
|
|
wpa_dbg(drv->ctx, MSG_DEBUG,
|
|
|
|
"nl80211: MLME command failed (assoc): ret=%d (%s)",
|
|
|
|
ret, strerror(-ret));
|
2010-01-24 21:11:30 -05:00
|
|
|
nl80211_dump_scan(drv);
|
2009-03-20 16:26:41 -04:00
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Association request send "
|
|
|
|
"successfully");
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
|
|
|
|
|
2009-04-16 09:22:40 -04:00
|
|
|
static int nl80211_set_mode(struct wpa_driver_nl80211_data *drv,
|
2011-07-17 12:47:41 -04:00
|
|
|
int ifindex, enum nl80211_iftype mode)
|
2008-06-06 09:55:42 -04:00
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
2009-04-16 09:22:40 -04:00
|
|
|
int ret = -ENOBUFS;
|
|
|
|
|
2011-07-17 12:47:41 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Set mode ifindex %d iftype %d (%s)",
|
|
|
|
ifindex, mode, nl80211_iftype_str(mode));
|
|
|
|
|
2009-04-16 09:22:40 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_INTERFACE);
|
2013-10-29 20:41:39 -04:00
|
|
|
if (nl80211_set_iface_id(msg, drv->first_bss) < 0)
|
2013-06-25 06:44:54 -04:00
|
|
|
goto nla_put_failure;
|
2009-04-16 09:22:40 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFTYPE, mode);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2011-12-17 05:19:36 -05:00
|
|
|
msg = NULL;
|
2009-04-16 09:22:40 -04:00
|
|
|
if (!ret)
|
|
|
|
return 0;
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-16 09:22:40 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface %d to mode %d:"
|
|
|
|
" %d (%s)", ifindex, mode, ret, strerror(-ret));
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-06-26 16:13:07 -04:00
|
|
|
static int wpa_driver_nl80211_set_mode_impl(
|
|
|
|
struct i802_bss *bss,
|
|
|
|
enum nl80211_iftype nlmode,
|
|
|
|
struct hostapd_freq_params *desired_freq_params)
|
2009-04-16 09:22:40 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-16 09:22:40 -04:00
|
|
|
int ret = -1;
|
2010-07-18 17:30:24 -04:00
|
|
|
int i;
|
2011-08-29 07:26:55 -04:00
|
|
|
int was_ap = is_ap_interface(drv->nlmode);
|
2011-12-11 11:51:55 -05:00
|
|
|
int res;
|
2014-06-26 16:13:06 -04:00
|
|
|
int mode_switch_res;
|
2009-03-25 05:38:47 -04:00
|
|
|
|
2014-06-26 16:13:06 -04:00
|
|
|
mode_switch_res = nl80211_set_mode(drv, drv->ifindex, nlmode);
|
|
|
|
if (mode_switch_res && nlmode == nl80211_get_ifmode(bss))
|
|
|
|
mode_switch_res = 0;
|
2013-06-25 06:49:16 -04:00
|
|
|
|
2014-06-26 16:13:06 -04:00
|
|
|
if (mode_switch_res == 0) {
|
2009-04-16 09:22:40 -04:00
|
|
|
drv->nlmode = nlmode;
|
2009-04-17 09:27:38 -04:00
|
|
|
ret = 0;
|
|
|
|
goto done;
|
2009-04-16 09:22:40 -04:00
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2014-06-26 16:13:06 -04:00
|
|
|
if (mode_switch_res == -ENODEV)
|
2011-12-11 11:51:55 -05:00
|
|
|
return -1;
|
|
|
|
|
2009-04-17 09:27:38 -04:00
|
|
|
if (nlmode == drv->nlmode) {
|
2009-12-28 06:25:17 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Interface already in "
|
|
|
|
"requested mode - ignore error");
|
2009-04-17 09:27:38 -04:00
|
|
|
ret = 0;
|
|
|
|
goto done; /* Already in the requested mode */
|
|
|
|
}
|
2008-06-06 09:55:42 -04:00
|
|
|
|
|
|
|
/* mac80211 doesn't allow mode changes while the device is up, so
|
|
|
|
* take the device down, try to set the mode again, and bring the
|
|
|
|
* device back up.
|
|
|
|
*/
|
2010-07-18 17:30:24 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Try mode change after setting "
|
|
|
|
"interface down");
|
|
|
|
for (i = 0; i < 10; i++) {
|
2013-06-25 06:48:03 -04:00
|
|
|
res = i802_set_iface_flags(bss, 0);
|
2011-10-20 14:36:36 -04:00
|
|
|
if (res == -EACCES || res == -ENODEV)
|
|
|
|
break;
|
2014-06-26 16:13:06 -04:00
|
|
|
if (res != 0) {
|
2010-07-18 17:30:24 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to set "
|
|
|
|
"interface down");
|
2014-06-26 16:13:06 -04:00
|
|
|
os_sleep(0, 100000);
|
|
|
|
continue;
|
|
|
|
}
|
2014-06-26 16:13:07 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Setting the mode will fail for some drivers if the phy is
|
|
|
|
* on a frequency that the mode is disallowed in.
|
|
|
|
*/
|
|
|
|
if (desired_freq_params) {
|
|
|
|
res = i802_set_freq(bss, desired_freq_params);
|
|
|
|
if (res) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Failed to set frequency on interface");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-06-26 16:13:06 -04:00
|
|
|
/* Try to set the mode again while the interface is down */
|
|
|
|
mode_switch_res = nl80211_set_mode(drv, drv->ifindex, nlmode);
|
|
|
|
if (mode_switch_res == -EBUSY) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Delaying mode set while interface going down");
|
|
|
|
os_sleep(0, 100000);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
ret = mode_switch_res;
|
|
|
|
break;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
2009-12-28 06:25:17 -05:00
|
|
|
if (!ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Mode change succeeded while "
|
|
|
|
"interface is down");
|
2009-04-16 09:22:40 -04:00
|
|
|
drv->nlmode = nlmode;
|
2011-07-17 06:56:34 -04:00
|
|
|
drv->ignore_if_down_event = 1;
|
2009-12-28 06:25:17 -05:00
|
|
|
}
|
2009-04-16 09:22:40 -04:00
|
|
|
|
2014-06-26 16:13:06 -04:00
|
|
|
/* Bring the interface back up */
|
|
|
|
res = linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 1);
|
|
|
|
if (res != 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Failed to set interface up after switching mode");
|
|
|
|
ret = -1;
|
|
|
|
}
|
|
|
|
|
2009-04-17 09:27:38 -04:00
|
|
|
done:
|
2011-12-03 12:47:01 -05:00
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Interface mode change to %d "
|
|
|
|
"from %d failed", nlmode, drv->nlmode);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-06-25 06:26:17 -04:00
|
|
|
if (is_p2p_net_interface(nlmode))
|
2012-08-10 04:35:33 -04:00
|
|
|
nl80211_disable_11b_rates(drv, drv->ifindex, 1);
|
2012-08-10 04:48:57 -04:00
|
|
|
else if (drv->disabled_11b_rates)
|
|
|
|
nl80211_disable_11b_rates(drv, drv->ifindex, 0);
|
2012-08-10 04:35:33 -04:00
|
|
|
|
2011-12-03 12:47:01 -05:00
|
|
|
if (is_ap_interface(nlmode)) {
|
2011-12-23 11:10:59 -05:00
|
|
|
nl80211_mgmt_unsubscribe(bss, "start AP");
|
2009-04-17 09:27:38 -04:00
|
|
|
/* Setup additional AP mode functionality if needed */
|
2011-12-03 12:47:01 -05:00
|
|
|
if (nl80211_setup_ap(bss))
|
2009-04-17 09:27:38 -04:00
|
|
|
return -1;
|
2011-12-03 12:47:01 -05:00
|
|
|
} else if (was_ap) {
|
2009-04-17 09:27:38 -04:00
|
|
|
/* Remove additional AP mode functionality */
|
2011-12-03 12:47:01 -05:00
|
|
|
nl80211_teardown_ap(bss);
|
2011-12-06 11:24:00 -05:00
|
|
|
} else {
|
2011-12-23 11:10:59 -05:00
|
|
|
nl80211_mgmt_unsubscribe(bss, "mode change");
|
2009-04-17 09:27:38 -04:00
|
|
|
}
|
|
|
|
|
2014-09-01 00:23:23 -04:00
|
|
|
if (is_mesh_interface(nlmode) &&
|
|
|
|
nl80211_mgmt_subscribe_mesh(bss))
|
|
|
|
return -1;
|
|
|
|
|
2012-04-06 11:58:44 -04:00
|
|
|
if (!bss->in_deinit && !is_ap_interface(nlmode) &&
|
2014-09-01 00:23:23 -04:00
|
|
|
!is_mesh_interface(nlmode) &&
|
2011-12-06 11:24:00 -05:00
|
|
|
nl80211_mgmt_subscribe_non_ap(bss) < 0)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to register Action "
|
|
|
|
"frame processing - ignore for now");
|
2011-10-29 15:00:07 -04:00
|
|
|
|
2011-12-03 12:47:01 -05:00
|
|
|
return 0;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-22 15:20:32 -04:00
|
|
|
static int dfs_info_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
int *dfs_capability_ptr = arg;
|
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_VENDOR_DATA]) {
|
|
|
|
struct nlattr *nl_vend = tb[NL80211_ATTR_VENDOR_DATA];
|
|
|
|
struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_MAX + 1];
|
|
|
|
|
|
|
|
nla_parse(tb_vendor, QCA_WLAN_VENDOR_ATTR_MAX,
|
|
|
|
nla_data(nl_vend), nla_len(nl_vend), NULL);
|
|
|
|
|
|
|
|
if (tb_vendor[QCA_WLAN_VENDOR_ATTR_DFS]) {
|
|
|
|
u32 val;
|
|
|
|
val = nla_get_u32(tb_vendor[QCA_WLAN_VENDOR_ATTR_DFS]);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: DFS offload capability: %u",
|
|
|
|
val);
|
|
|
|
*dfs_capability_ptr = val;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
2014-06-26 16:13:07 -04:00
|
|
|
|
|
|
|
|
2014-10-26 11:20:37 -04:00
|
|
|
int wpa_driver_nl80211_set_mode(struct i802_bss *bss,
|
|
|
|
enum nl80211_iftype nlmode)
|
2014-06-26 16:13:07 -04:00
|
|
|
{
|
|
|
|
return wpa_driver_nl80211_set_mode_impl(bss, nlmode, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-01 03:52:53 -04:00
|
|
|
static int wpa_driver_nl80211_set_mode_ibss(struct i802_bss *bss,
|
|
|
|
struct hostapd_freq_params *freq)
|
2014-06-26 16:13:07 -04:00
|
|
|
{
|
|
|
|
return wpa_driver_nl80211_set_mode_impl(bss, NL80211_IFTYPE_ADHOC,
|
2014-10-01 03:52:53 -04:00
|
|
|
freq);
|
2014-06-26 16:13:07 -04:00
|
|
|
}
|
2014-03-22 15:20:32 -04:00
|
|
|
|
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
static int wpa_driver_nl80211_get_capa(void *priv,
|
|
|
|
struct wpa_driver_capa *capa)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2014-03-22 15:20:32 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
int dfs_capability = 0;
|
|
|
|
int ret = 0;
|
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
if (!drv->has_capability)
|
|
|
|
return -1;
|
|
|
|
os_memcpy(capa, &drv->capa, sizeof(*capa));
|
2013-03-31 14:51:44 -04:00
|
|
|
if (drv->extended_capa && drv->extended_capa_mask) {
|
|
|
|
capa->extended_capa = drv->extended_capa;
|
|
|
|
capa->extended_capa_mask = drv->extended_capa_mask;
|
|
|
|
capa->extended_capa_len = drv->extended_capa_len;
|
|
|
|
}
|
2013-06-30 02:58:50 -04:00
|
|
|
|
2014-03-22 15:20:32 -04:00
|
|
|
if (drv->dfs_vendor_cmd_avail == 1) {
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_VENDOR);
|
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_SUBCMD,
|
|
|
|
QCA_NL80211_VENDOR_SUBCMD_DFS_CAPABILITY);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, dfs_info_handler,
|
|
|
|
&dfs_capability);
|
|
|
|
if (!ret) {
|
|
|
|
if (dfs_capability)
|
|
|
|
capa->flags |= WPA_DRIVER_FLAGS_DFS_OFFLOAD;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -ENOBUFS;
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_set_operstate(void *priv, int state)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2014-01-06 04:49:46 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Set %s operstate %d->%d (%s)",
|
|
|
|
bss->ifname, drv->operstate, state,
|
|
|
|
state ? "UP" : "DORMANT");
|
2008-06-06 09:55:42 -04:00
|
|
|
drv->operstate = state;
|
2011-10-20 19:03:25 -04:00
|
|
|
return netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, -1,
|
2009-12-18 09:35:33 -05:00
|
|
|
state ? IF_OPER_UP : IF_OPER_DORMANT);
|
2008-06-06 09:55:42 -04:00
|
|
|
}
|
|
|
|
|
2009-05-14 14:54:47 -04:00
|
|
|
|
|
|
|
static int wpa_driver_nl80211_set_supp_port(void *priv, int authorized)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-05-14 14:54:47 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
struct nl80211_sta_flag_update upd;
|
2013-12-30 15:11:40 -05:00
|
|
|
int ret = -ENOBUFS;
|
|
|
|
|
|
|
|
if (!drv->associated && is_zero_ether_addr(drv->bssid) && !authorized) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Skip set_supp_port(unauthorized) while not associated");
|
|
|
|
return 0;
|
|
|
|
}
|
2009-05-14 14:54:47 -04:00
|
|
|
|
2013-05-27 13:32:54 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Set supplicant port %sauthorized for "
|
|
|
|
MACSTR, authorized ? "" : "un", MAC2STR(drv->bssid));
|
|
|
|
|
2009-05-14 14:54:47 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_STATION);
|
2009-05-14 14:54:47 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
|
2010-03-06 15:22:56 -05:00
|
|
|
if_nametoindex(bss->ifname));
|
2009-05-14 14:54:47 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, drv->bssid);
|
|
|
|
|
|
|
|
os_memset(&upd, 0, sizeof(upd));
|
|
|
|
upd.mask = BIT(NL80211_STA_FLAG_AUTHORIZED);
|
|
|
|
if (authorized)
|
|
|
|
upd.set = BIT(NL80211_STA_FLAG_AUTHORIZED);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd);
|
|
|
|
|
2013-12-30 15:11:40 -05:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (!ret)
|
|
|
|
return 0;
|
2009-05-14 14:54:47 -04:00
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2013-12-30 15:11:40 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to set STA flag: %d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
return ret;
|
2009-05-14 14:54:47 -04:00
|
|
|
}
|
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
|
2011-05-27 12:02:04 -04:00
|
|
|
/* Set kernel driver on given frequency (MHz) */
|
|
|
|
static int i802_set_freq(void *priv, struct hostapd_freq_params *freq)
|
2009-04-09 06:40:12 -04:00
|
|
|
{
|
2011-05-27 12:02:04 -04:00
|
|
|
struct i802_bss *bss = priv;
|
2014-04-25 05:02:25 -04:00
|
|
|
return nl80211_set_channel(bss, freq, 0);
|
2009-04-09 06:40:12 -04:00
|
|
|
}
|
|
|
|
|
2011-05-27 11:54:36 -04:00
|
|
|
|
2009-04-09 06:40:12 -04:00
|
|
|
static inline int min_int(int a, int b)
|
|
|
|
{
|
|
|
|
if (a < b)
|
|
|
|
return a;
|
|
|
|
return b;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int get_key_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* TODO: validate the key index and mac address!
|
|
|
|
* Otherwise, there's a race condition as soon as
|
|
|
|
* the kernel starts sending key notifications.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_KEY_SEQ])
|
|
|
|
memcpy(arg, nla_data(tb[NL80211_ATTR_KEY_SEQ]),
|
|
|
|
min_int(nla_len(tb[NL80211_ATTR_KEY_SEQ]), 6));
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int i802_get_seqnum(const char *iface, void *priv, const u8 *addr,
|
|
|
|
int idx, u8 *seq)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-09 06:40:12 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_KEY);
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
if (addr)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, idx);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(iface));
|
|
|
|
|
|
|
|
memset(seq, 0, 6);
|
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, get_key_handler, seq);
|
|
|
|
nla_put_failure:
|
2011-12-17 05:27:11 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-09 06:40:12 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int i802_set_rts(void *priv, int rts)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-21 11:11:07 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = -ENOBUFS;
|
|
|
|
u32 val;
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2009-04-21 11:11:07 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2009-04-21 11:11:07 -04:00
|
|
|
if (rts >= 2347)
|
|
|
|
val = (u32) -1;
|
|
|
|
else
|
|
|
|
val = rts;
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_WIPHY);
|
2009-04-21 11:11:07 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_RTS_THRESHOLD, val);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2011-12-17 05:19:36 -05:00
|
|
|
msg = NULL;
|
2009-04-21 11:11:07 -04:00
|
|
|
if (!ret)
|
|
|
|
return 0;
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-21 11:11:07 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to set RTS threshold %d: "
|
|
|
|
"%d (%s)", rts, ret, strerror(-ret));
|
|
|
|
return ret;
|
2009-04-09 06:40:12 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int i802_set_frag(void *priv, int frag)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-21 11:11:07 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = -ENOBUFS;
|
|
|
|
u32 val;
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2009-04-21 11:11:07 -04:00
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2009-04-21 11:11:07 -04:00
|
|
|
if (frag >= 2346)
|
|
|
|
val = (u32) -1;
|
|
|
|
else
|
|
|
|
val = frag;
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_WIPHY);
|
2009-04-21 11:11:07 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FRAG_THRESHOLD, val);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2011-12-17 05:19:36 -05:00
|
|
|
msg = NULL;
|
2009-04-21 11:11:07 -04:00
|
|
|
if (!ret)
|
|
|
|
return 0;
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-21 11:11:07 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to set fragmentation threshold "
|
|
|
|
"%d: %d (%s)", frag, ret, strerror(-ret));
|
|
|
|
return ret;
|
2009-04-09 06:40:12 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int i802_flush(void *priv)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-09 06:40:12 -04:00
|
|
|
struct nl_msg *msg;
|
2011-12-23 11:12:07 -05:00
|
|
|
int res;
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2013-08-23 05:03:28 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: flush -> DEL_STATION %s (all)",
|
|
|
|
bss->ifname);
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_STATION);
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX: FIX! this needs to flush all VLANs too
|
|
|
|
*/
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
|
2010-03-06 15:22:56 -05:00
|
|
|
if_nametoindex(bss->ifname));
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2011-12-23 11:12:07 -05:00
|
|
|
res = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
if (res) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Station flush failed: ret=%d "
|
|
|
|
"(%s)", res, strerror(-res));
|
|
|
|
}
|
|
|
|
return res;
|
2009-04-09 06:40:12 -04:00
|
|
|
nla_put_failure:
|
2011-12-17 05:27:11 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-09 06:40:12 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int get_sta_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct hostap_sta_driver_data *data = arg;
|
|
|
|
struct nlattr *stats[NL80211_STA_INFO_MAX + 1];
|
|
|
|
static struct nla_policy stats_policy[NL80211_STA_INFO_MAX + 1] = {
|
|
|
|
[NL80211_STA_INFO_INACTIVE_TIME] = { .type = NLA_U32 },
|
|
|
|
[NL80211_STA_INFO_RX_BYTES] = { .type = NLA_U32 },
|
|
|
|
[NL80211_STA_INFO_TX_BYTES] = { .type = NLA_U32 },
|
|
|
|
[NL80211_STA_INFO_RX_PACKETS] = { .type = NLA_U32 },
|
|
|
|
[NL80211_STA_INFO_TX_PACKETS] = { .type = NLA_U32 },
|
2012-09-05 10:02:02 -04:00
|
|
|
[NL80211_STA_INFO_TX_FAILED] = { .type = NLA_U32 },
|
2009-04-09 06:40:12 -04:00
|
|
|
};
|
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* TODO: validate the interface and mac address!
|
|
|
|
* Otherwise, there's a race condition as soon as
|
|
|
|
* the kernel starts sending station notifications.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_STA_INFO]) {
|
|
|
|
wpa_printf(MSG_DEBUG, "sta stats missing!");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
if (nla_parse_nested(stats, NL80211_STA_INFO_MAX,
|
|
|
|
tb[NL80211_ATTR_STA_INFO],
|
|
|
|
stats_policy)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "failed to parse nested attributes!");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (stats[NL80211_STA_INFO_INACTIVE_TIME])
|
|
|
|
data->inactive_msec =
|
|
|
|
nla_get_u32(stats[NL80211_STA_INFO_INACTIVE_TIME]);
|
|
|
|
if (stats[NL80211_STA_INFO_RX_BYTES])
|
|
|
|
data->rx_bytes = nla_get_u32(stats[NL80211_STA_INFO_RX_BYTES]);
|
|
|
|
if (stats[NL80211_STA_INFO_TX_BYTES])
|
|
|
|
data->tx_bytes = nla_get_u32(stats[NL80211_STA_INFO_TX_BYTES]);
|
|
|
|
if (stats[NL80211_STA_INFO_RX_PACKETS])
|
|
|
|
data->rx_packets =
|
|
|
|
nla_get_u32(stats[NL80211_STA_INFO_RX_PACKETS]);
|
|
|
|
if (stats[NL80211_STA_INFO_TX_PACKETS])
|
|
|
|
data->tx_packets =
|
|
|
|
nla_get_u32(stats[NL80211_STA_INFO_TX_PACKETS]);
|
2012-09-05 10:02:02 -04:00
|
|
|
if (stats[NL80211_STA_INFO_TX_FAILED])
|
|
|
|
data->tx_retry_failed =
|
|
|
|
nla_get_u32(stats[NL80211_STA_INFO_TX_FAILED]);
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
static int i802_read_sta_data(struct i802_bss *bss,
|
|
|
|
struct hostap_sta_driver_data *data,
|
2009-04-09 06:40:12 -04:00
|
|
|
const u8 *addr)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-09 06:40:12 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
os_memset(data, 0, sizeof(*data));
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_STATION);
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
|
2010-03-06 15:22:56 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(bss->ifname));
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, get_sta_handler, data);
|
|
|
|
nla_put_failure:
|
2011-12-17 05:27:11 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-09 06:40:12 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int i802_set_tx_queue_params(void *priv, int queue, int aifs,
|
|
|
|
int cw_min, int cw_max, int burst_time)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-09 06:40:12 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
struct nlattr *txq, *params;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_WIPHY);
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2010-03-06 15:22:56 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(bss->ifname));
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
txq = nla_nest_start(msg, NL80211_ATTR_WIPHY_TXQ_PARAMS);
|
|
|
|
if (!txq)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
/* We are only sending parameters for a single TXQ at a time */
|
|
|
|
params = nla_nest_start(msg, 1);
|
|
|
|
if (!params)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2010-11-04 19:23:17 -04:00
|
|
|
switch (queue) {
|
|
|
|
case 0:
|
|
|
|
NLA_PUT_U8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VO);
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
NLA_PUT_U8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VI);
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
NLA_PUT_U8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BE);
|
|
|
|
break;
|
|
|
|
case 3:
|
|
|
|
NLA_PUT_U8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BK);
|
|
|
|
break;
|
|
|
|
}
|
2009-04-09 06:40:12 -04:00
|
|
|
/* Burst time is configured in units of 0.1 msec and TXOP parameter in
|
|
|
|
* 32 usec, so need to convert the value here. */
|
|
|
|
NLA_PUT_U16(msg, NL80211_TXQ_ATTR_TXOP, (burst_time * 100 + 16) / 32);
|
|
|
|
NLA_PUT_U16(msg, NL80211_TXQ_ATTR_CWMIN, cw_min);
|
|
|
|
NLA_PUT_U16(msg, NL80211_TXQ_ATTR_CWMAX, cw_max);
|
|
|
|
NLA_PUT_U8(msg, NL80211_TXQ_ATTR_AIFS, aifs);
|
|
|
|
|
|
|
|
nla_nest_end(msg, params);
|
|
|
|
|
|
|
|
nla_nest_end(msg, txq);
|
|
|
|
|
|
|
|
if (send_and_recv_msgs(drv, msg, NULL, NULL) == 0)
|
|
|
|
return 0;
|
2011-12-17 05:27:11 -05:00
|
|
|
msg = NULL;
|
2009-04-09 06:40:12 -04:00
|
|
|
nla_put_failure:
|
2011-12-17 05:27:11 -05:00
|
|
|
nlmsg_free(msg);
|
2009-04-09 06:40:12 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
static int i802_set_sta_vlan(struct i802_bss *bss, const u8 *addr,
|
2009-04-09 06:40:12 -04:00
|
|
|
const char *ifname, int vlan_id)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-09 06:40:12 -04:00
|
|
|
struct nl_msg *msg;
|
2010-04-15 16:46:49 -04:00
|
|
|
int ret = -ENOBUFS;
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2013-10-29 18:37:47 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: %s[%d]: set_sta_vlan(" MACSTR
|
|
|
|
", ifname=%s[%d], vlan_id=%d)",
|
|
|
|
bss->ifname, if_nametoindex(bss->ifname),
|
|
|
|
MAC2STR(addr), ifname, if_nametoindex(ifname), vlan_id);
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_STATION);
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
|
2010-03-06 15:22:56 -05:00
|
|
|
if_nametoindex(bss->ifname));
|
2009-04-09 06:40:12 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
|
2009-09-30 12:23:52 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_STA_VLAN,
|
2009-04-09 06:40:12 -04:00
|
|
|
if_nametoindex(ifname));
|
|
|
|
|
2010-04-15 16:46:49 -04:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2011-12-17 05:27:11 -05:00
|
|
|
msg = NULL;
|
2010-04-15 16:46:49 -04:00
|
|
|
if (ret < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: NL80211_ATTR_STA_VLAN (addr="
|
|
|
|
MACSTR " ifname=%s vlan_id=%d) failed: %d (%s)",
|
|
|
|
MAC2STR(addr), ifname, vlan_id, ret,
|
|
|
|
strerror(-ret));
|
|
|
|
}
|
2009-04-09 06:40:12 -04:00
|
|
|
nla_put_failure:
|
2011-12-17 05:27:11 -05:00
|
|
|
nlmsg_free(msg);
|
2010-04-15 16:46:49 -04:00
|
|
|
return ret;
|
2009-04-09 06:40:12 -04:00
|
|
|
}
|
|
|
|
|
2009-12-24 04:46:22 -05:00
|
|
|
|
2009-04-09 06:40:12 -04:00
|
|
|
static int i802_get_inact_sec(void *priv, const u8 *addr)
|
|
|
|
{
|
|
|
|
struct hostap_sta_driver_data data;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
data.inactive_msec = (unsigned long) -1;
|
|
|
|
ret = i802_read_sta_data(priv, &data, addr);
|
|
|
|
if (ret || data.inactive_msec == (unsigned long) -1)
|
|
|
|
return -1;
|
|
|
|
return data.inactive_msec / 1000;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int i802_sta_clear_stats(void *priv, const u8 *addr)
|
|
|
|
{
|
|
|
|
#if 0
|
|
|
|
/* TODO */
|
|
|
|
#endif
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-17 04:37:22 -04:00
|
|
|
static int i802_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr,
|
|
|
|
int reason)
|
2009-04-09 06:40:12 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
2012-03-14 20:06:06 -04:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-09 06:40:12 -04:00
|
|
|
struct ieee80211_mgmt mgmt;
|
|
|
|
|
2014-09-01 00:23:23 -04:00
|
|
|
if (is_mesh_interface(drv->nlmode))
|
|
|
|
return -1;
|
|
|
|
|
2012-03-14 20:06:06 -04:00
|
|
|
if (drv->device_ap_sme)
|
2014-10-09 09:52:38 -04:00
|
|
|
return wpa_driver_nl80211_sta_remove(bss, addr, 1, reason);
|
2012-03-14 20:06:06 -04:00
|
|
|
|
2009-04-09 06:40:12 -04:00
|
|
|
memset(&mgmt, 0, sizeof(mgmt));
|
|
|
|
mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
|
|
|
|
WLAN_FC_STYPE_DEAUTH);
|
|
|
|
memcpy(mgmt.da, addr, ETH_ALEN);
|
2009-04-17 04:37:22 -04:00
|
|
|
memcpy(mgmt.sa, own_addr, ETH_ALEN);
|
|
|
|
memcpy(mgmt.bssid, own_addr, ETH_ALEN);
|
2009-04-09 06:40:12 -04:00
|
|
|
mgmt.u.deauth.reason_code = host_to_le16(reason);
|
2010-03-06 15:22:56 -05:00
|
|
|
return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
|
2009-04-09 12:57:20 -04:00
|
|
|
IEEE80211_HDRLEN +
|
2013-02-03 08:46:47 -05:00
|
|
|
sizeof(mgmt.u.deauth), 0, 0, 0, 0,
|
|
|
|
0);
|
2009-04-09 06:40:12 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-17 04:37:22 -04:00
|
|
|
static int i802_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
|
|
|
|
int reason)
|
2009-04-09 06:40:12 -04:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
2012-03-14 20:06:06 -04:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-04-09 06:40:12 -04:00
|
|
|
struct ieee80211_mgmt mgmt;
|
|
|
|
|
2014-09-01 00:23:23 -04:00
|
|
|
if (is_mesh_interface(drv->nlmode))
|
|
|
|
return -1;
|
|
|
|
|
2012-03-14 20:06:06 -04:00
|
|
|
if (drv->device_ap_sme)
|
2014-10-09 09:52:38 -04:00
|
|
|
return wpa_driver_nl80211_sta_remove(bss, addr, 0, reason);
|
2012-03-14 20:06:06 -04:00
|
|
|
|
2009-04-09 06:40:12 -04:00
|
|
|
memset(&mgmt, 0, sizeof(mgmt));
|
|
|
|
mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
|
|
|
|
WLAN_FC_STYPE_DISASSOC);
|
|
|
|
memcpy(mgmt.da, addr, ETH_ALEN);
|
2009-04-17 04:37:22 -04:00
|
|
|
memcpy(mgmt.sa, own_addr, ETH_ALEN);
|
|
|
|
memcpy(mgmt.bssid, own_addr, ETH_ALEN);
|
2009-04-09 06:40:12 -04:00
|
|
|
mgmt.u.disassoc.reason_code = host_to_le16(reason);
|
2010-03-06 15:22:56 -05:00
|
|
|
return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
|
2009-04-09 12:57:20 -04:00
|
|
|
IEEE80211_HDRLEN +
|
2013-02-03 08:46:47 -05:00
|
|
|
sizeof(mgmt.u.disassoc), 0, 0, 0, 0,
|
|
|
|
0);
|
2009-04-09 06:40:12 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-25 18:42:24 -04:00
|
|
|
static void dump_ifidx(struct wpa_driver_nl80211_data *drv)
|
|
|
|
{
|
|
|
|
char buf[200], *pos, *end;
|
|
|
|
int i, res;
|
|
|
|
|
|
|
|
pos = buf;
|
|
|
|
end = pos + sizeof(buf);
|
|
|
|
|
|
|
|
for (i = 0; i < drv->num_if_indices; i++) {
|
|
|
|
if (!drv->if_indices[i])
|
|
|
|
continue;
|
|
|
|
res = os_snprintf(pos, end - pos, " %d", drv->if_indices[i]);
|
|
|
|
if (res < 0 || res >= end - pos)
|
|
|
|
break;
|
|
|
|
pos += res;
|
|
|
|
}
|
|
|
|
*pos = '\0';
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: if_indices[%d]:%s",
|
|
|
|
drv->num_if_indices, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-05-27 12:02:04 -04:00
|
|
|
static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
int *old;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Add own interface ifindex %d",
|
|
|
|
ifidx);
|
2014-03-20 14:29:44 -04:00
|
|
|
if (have_ifidx(drv, ifidx)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: ifindex %d already in the list",
|
|
|
|
ifidx);
|
|
|
|
return;
|
|
|
|
}
|
2011-05-27 12:02:04 -04:00
|
|
|
for (i = 0; i < drv->num_if_indices; i++) {
|
|
|
|
if (drv->if_indices[i] == 0) {
|
|
|
|
drv->if_indices[i] = ifidx;
|
2014-03-25 18:42:24 -04:00
|
|
|
dump_ifidx(drv);
|
2011-05-27 12:02:04 -04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (drv->if_indices != drv->default_if_indices)
|
|
|
|
old = drv->if_indices;
|
|
|
|
else
|
|
|
|
old = NULL;
|
|
|
|
|
2012-08-13 14:21:23 -04:00
|
|
|
drv->if_indices = os_realloc_array(old, drv->num_if_indices + 1,
|
|
|
|
sizeof(int));
|
2011-05-27 12:02:04 -04:00
|
|
|
if (!drv->if_indices) {
|
|
|
|
if (!old)
|
|
|
|
drv->if_indices = drv->default_if_indices;
|
|
|
|
else
|
|
|
|
drv->if_indices = old;
|
|
|
|
wpa_printf(MSG_ERROR, "Failed to reallocate memory for "
|
|
|
|
"interfaces");
|
|
|
|
wpa_printf(MSG_ERROR, "Ignoring EAPOL on interface %d", ifidx);
|
|
|
|
return;
|
|
|
|
} else if (!old)
|
|
|
|
os_memcpy(drv->if_indices, drv->default_if_indices,
|
|
|
|
sizeof(drv->default_if_indices));
|
|
|
|
drv->if_indices[drv->num_if_indices] = ifidx;
|
|
|
|
drv->num_if_indices++;
|
2014-03-25 18:42:24 -04:00
|
|
|
dump_ifidx(drv);
|
2011-05-27 12:02:04 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < drv->num_if_indices; i++) {
|
|
|
|
if (drv->if_indices[i] == ifidx) {
|
|
|
|
drv->if_indices[i] = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2014-03-25 18:42:24 -04:00
|
|
|
dump_ifidx(drv);
|
2011-05-27 12:02:04 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < drv->num_if_indices; i++)
|
|
|
|
if (drv->if_indices[i] == ifidx)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int i802_set_wds_sta(void *priv, const u8 *addr, int aid, int val,
|
2014-04-14 06:39:18 -04:00
|
|
|
const char *bridge_ifname, char *ifname_wds)
|
2011-05-27 12:02:04 -04:00
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
char name[IFNAMSIZ + 1];
|
|
|
|
|
|
|
|
os_snprintf(name, sizeof(name), "%s.sta%d", bss->ifname, aid);
|
2013-07-20 10:41:22 -04:00
|
|
|
if (ifname_wds)
|
|
|
|
os_strlcpy(ifname_wds, name, IFNAMSIZ + 1);
|
|
|
|
|
2011-05-27 12:02:04 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Set WDS STA addr=" MACSTR
|
|
|
|
" aid=%d val=%d name=%s", MAC2STR(addr), aid, val, name);
|
|
|
|
if (val) {
|
|
|
|
if (!if_nametoindex(name)) {
|
|
|
|
if (nl80211_create_iface(drv, name,
|
|
|
|
NL80211_IFTYPE_AP_VLAN,
|
2013-10-31 13:41:42 -04:00
|
|
|
bss->addr, 1, NULL, NULL, 0) <
|
|
|
|
0)
|
2011-05-27 12:02:04 -04:00
|
|
|
return -1;
|
|
|
|
if (bridge_ifname &&
|
2011-10-22 14:33:58 -04:00
|
|
|
linux_br_add_if(drv->global->ioctl_sock,
|
|
|
|
bridge_ifname, name) < 0)
|
2011-05-27 12:02:04 -04:00
|
|
|
return -1;
|
|
|
|
}
|
2012-08-19 11:28:55 -04:00
|
|
|
if (linux_set_iface_flags(drv->global->ioctl_sock, name, 1)) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to set WDS STA "
|
|
|
|
"interface %s up", name);
|
|
|
|
}
|
2011-05-27 12:02:04 -04:00
|
|
|
return i802_set_sta_vlan(priv, addr, name, 0);
|
|
|
|
} else {
|
2012-09-16 01:38:14 -04:00
|
|
|
if (bridge_ifname)
|
|
|
|
linux_br_del_if(drv->global->ioctl_sock, bridge_ifname,
|
|
|
|
name);
|
|
|
|
|
2011-05-27 12:02:04 -04:00
|
|
|
i802_set_sta_vlan(priv, addr, bss->ifname, 0);
|
2014-02-28 09:41:49 -05:00
|
|
|
nl80211_remove_iface(drv, if_nametoindex(name));
|
|
|
|
return 0;
|
2011-05-27 12:02:04 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void handle_eapol(int sock, void *eloop_ctx, void *sock_ctx)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv = eloop_ctx;
|
|
|
|
struct sockaddr_ll lladdr;
|
|
|
|
unsigned char buf[3000];
|
|
|
|
int len;
|
|
|
|
socklen_t fromlen = sizeof(lladdr);
|
|
|
|
|
|
|
|
len = recvfrom(sock, buf, sizeof(buf), 0,
|
|
|
|
(struct sockaddr *)&lladdr, &fromlen);
|
|
|
|
if (len < 0) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: EAPOL recv failed: %s",
|
|
|
|
strerror(errno));
|
2011-05-27 12:02:04 -04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (have_ifidx(drv, lladdr.sll_ifindex))
|
|
|
|
drv_event_eapol_rx(drv->ctx, lladdr.sll_addr, buf, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-16 08:19:58 -05:00
|
|
|
static int i802_check_bridge(struct wpa_driver_nl80211_data *drv,
|
2011-03-15 07:02:49 -04:00
|
|
|
struct i802_bss *bss,
|
2010-01-16 08:19:58 -05:00
|
|
|
const char *brname, const char *ifname)
|
|
|
|
{
|
|
|
|
int ifindex;
|
|
|
|
char in_br[IFNAMSIZ];
|
|
|
|
|
2011-03-15 07:02:49 -04:00
|
|
|
os_strlcpy(bss->brname, brname, IFNAMSIZ);
|
2010-01-16 08:19:58 -05:00
|
|
|
ifindex = if_nametoindex(brname);
|
|
|
|
if (ifindex == 0) {
|
|
|
|
/*
|
|
|
|
* Bridge was configured, but the bridge device does
|
|
|
|
* not exist. Try to add it now.
|
|
|
|
*/
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_br_add(drv->global->ioctl_sock, brname) < 0) {
|
2010-01-16 08:19:58 -05:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to add the "
|
|
|
|
"bridge interface %s: %s",
|
|
|
|
brname, strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
2011-03-15 07:02:49 -04:00
|
|
|
bss->added_bridge = 1;
|
2010-01-16 08:19:58 -05:00
|
|
|
add_ifidx(drv, if_nametoindex(brname));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (linux_br_get(in_br, ifname) == 0) {
|
|
|
|
if (os_strcmp(in_br, brname) == 0)
|
|
|
|
return 0; /* already in the bridge */
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Removing interface %s from "
|
|
|
|
"bridge %s", ifname, in_br);
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_br_del_if(drv->global->ioctl_sock, in_br, ifname) <
|
|
|
|
0) {
|
2010-01-16 08:19:58 -05:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to "
|
|
|
|
"remove interface %s from bridge "
|
|
|
|
"%s: %s",
|
|
|
|
ifname, brname, strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Adding interface %s into bridge %s",
|
|
|
|
ifname, brname);
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_br_add_if(drv->global->ioctl_sock, brname, ifname) < 0) {
|
2010-01-16 08:19:58 -05:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to add interface %s "
|
|
|
|
"into bridge %s: %s",
|
|
|
|
ifname, brname, strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
2011-03-15 07:02:49 -04:00
|
|
|
bss->added_if_into_bridge = 1;
|
2010-01-16 08:19:58 -05:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-09 16:28:21 -04:00
|
|
|
static void *i802_init(struct hostapd_data *hapd,
|
|
|
|
struct wpa_init_params *params)
|
2009-04-09 06:40:12 -04:00
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv;
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss;
|
2009-04-09 06:40:12 -04:00
|
|
|
size_t i;
|
2010-01-16 08:19:58 -05:00
|
|
|
char brname[IFNAMSIZ];
|
|
|
|
int ifindex, br_ifindex;
|
|
|
|
int br_added = 0;
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2013-11-09 09:18:39 -05:00
|
|
|
bss = wpa_driver_nl80211_drv_init(hapd, params->ifname,
|
|
|
|
params->global_priv, 1,
|
|
|
|
params->bssid);
|
2010-03-06 15:22:56 -05:00
|
|
|
if (bss == NULL)
|
2009-04-09 06:40:12 -04:00
|
|
|
return NULL;
|
|
|
|
|
2010-03-06 15:22:56 -05:00
|
|
|
drv = bss->drv;
|
2011-10-22 06:04:47 -04:00
|
|
|
|
2010-01-16 08:19:58 -05:00
|
|
|
if (linux_br_get(brname, params->ifname) == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in bridge %s",
|
|
|
|
params->ifname, brname);
|
|
|
|
br_ifindex = if_nametoindex(brname);
|
2014-10-26 05:20:01 -04:00
|
|
|
os_strlcpy(bss->brname, brname, IFNAMSIZ);
|
2010-01-16 08:19:58 -05:00
|
|
|
} else {
|
|
|
|
brname[0] = '\0';
|
|
|
|
br_ifindex = 0;
|
|
|
|
}
|
|
|
|
|
2009-04-09 16:28:21 -04:00
|
|
|
for (i = 0; i < params->num_bridge; i++) {
|
2010-01-16 08:19:58 -05:00
|
|
|
if (params->bridge[i]) {
|
|
|
|
ifindex = if_nametoindex(params->bridge[i]);
|
|
|
|
if (ifindex)
|
|
|
|
add_ifidx(drv, ifindex);
|
|
|
|
if (ifindex == br_ifindex)
|
|
|
|
br_added = 1;
|
|
|
|
}
|
2009-04-09 06:40:12 -04:00
|
|
|
}
|
2010-01-16 08:19:58 -05:00
|
|
|
if (!br_added && br_ifindex &&
|
|
|
|
(params->num_bridge == 0 || !params->bridge[0]))
|
|
|
|
add_ifidx(drv, br_ifindex);
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2009-04-16 09:22:40 -04:00
|
|
|
/* start listening for EAPOL on the default AP interface */
|
|
|
|
add_ifidx(drv, drv->ifindex);
|
|
|
|
|
2010-01-16 08:19:58 -05:00
|
|
|
if (params->num_bridge && params->bridge[0] &&
|
2011-03-15 07:02:49 -04:00
|
|
|
i802_check_bridge(drv, bss, params->bridge[0], params->ifname) < 0)
|
2010-01-16 08:19:58 -05:00
|
|
|
goto failed;
|
|
|
|
|
2014-09-09 18:38:03 -04:00
|
|
|
#ifdef CONFIG_LIBNL3_ROUTE
|
|
|
|
if (bss->added_if_into_bridge) {
|
|
|
|
drv->rtnl_sk = nl_socket_alloc();
|
|
|
|
if (drv->rtnl_sk == NULL) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to allocate nl_sock");
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nl_connect(drv->rtnl_sk, NETLINK_ROUTE)) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to connect nl_sock to NETLINK_ROUTE: %s",
|
|
|
|
strerror(errno));
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_LIBNL3_ROUTE */
|
|
|
|
|
2009-04-16 09:22:40 -04:00
|
|
|
drv->eapol_sock = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_PAE));
|
|
|
|
if (drv->eapol_sock < 0) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: socket(PF_PACKET, SOCK_DGRAM, ETH_P_PAE) failed: %s",
|
|
|
|
strerror(errno));
|
2009-04-16 10:16:41 -04:00
|
|
|
goto failed;
|
2009-04-16 09:22:40 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (eloop_register_read_sock(drv->eapol_sock, handle_eapol, drv, NULL))
|
|
|
|
{
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: Could not register read socket for eapol");
|
2009-04-09 06:40:12 -04:00
|
|
|
goto failed;
|
2009-04-16 09:22:40 -04:00
|
|
|
}
|
|
|
|
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
|
|
|
|
params->own_addr))
|
2009-04-16 10:16:41 -04:00
|
|
|
goto failed;
|
2014-09-27 12:11:24 -04:00
|
|
|
os_memcpy(drv->perm_addr, params->own_addr, ETH_ALEN);
|
2009-04-09 06:40:12 -04:00
|
|
|
|
2011-12-10 04:56:31 -05:00
|
|
|
memcpy(bss->addr, params->own_addr, ETH_ALEN);
|
|
|
|
|
2010-03-06 15:22:56 -05:00
|
|
|
return bss;
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
failed:
|
2011-10-22 06:04:47 -04:00
|
|
|
wpa_driver_nl80211_deinit(bss);
|
2009-04-16 10:16:41 -04:00
|
|
|
return NULL;
|
|
|
|
}
|
2009-04-09 06:40:12 -04:00
|
|
|
|
|
|
|
|
2009-04-16 10:16:41 -04:00
|
|
|
static void i802_deinit(void *priv)
|
|
|
|
{
|
2013-02-03 08:46:47 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
wpa_driver_nl80211_deinit(bss);
|
2009-04-09 06:40:12 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-09 09:49:28 -05:00
|
|
|
static enum nl80211_iftype wpa_driver_nl80211_if_type(
|
|
|
|
enum wpa_driver_if_type type)
|
|
|
|
{
|
|
|
|
switch (type) {
|
|
|
|
case WPA_IF_STATION:
|
2011-01-31 14:49:48 -05:00
|
|
|
return NL80211_IFTYPE_STATION;
|
2010-07-18 17:30:24 -04:00
|
|
|
case WPA_IF_P2P_CLIENT:
|
|
|
|
case WPA_IF_P2P_GROUP:
|
2011-01-31 14:49:48 -05:00
|
|
|
return NL80211_IFTYPE_P2P_CLIENT;
|
2009-12-09 09:49:28 -05:00
|
|
|
case WPA_IF_AP_VLAN:
|
|
|
|
return NL80211_IFTYPE_AP_VLAN;
|
|
|
|
case WPA_IF_AP_BSS:
|
|
|
|
return NL80211_IFTYPE_AP;
|
2011-01-31 14:49:48 -05:00
|
|
|
case WPA_IF_P2P_GO:
|
|
|
|
return NL80211_IFTYPE_P2P_GO;
|
2013-06-25 06:29:48 -04:00
|
|
|
case WPA_IF_P2P_DEVICE:
|
|
|
|
return NL80211_IFTYPE_P2P_DEVICE;
|
2009-12-09 09:49:28 -05:00
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-27 06:05:37 -05:00
|
|
|
#ifdef CONFIG_P2P
|
|
|
|
|
2010-11-26 11:14:51 -05:00
|
|
|
static int nl80211_addr_in_use(struct nl80211_global *global, const u8 *addr)
|
|
|
|
{
|
|
|
|
struct wpa_driver_nl80211_data *drv;
|
|
|
|
dl_list_for_each(drv, &global->interfaces,
|
|
|
|
struct wpa_driver_nl80211_data, list) {
|
2013-10-29 20:41:39 -04:00
|
|
|
if (os_memcmp(addr, drv->first_bss->addr, ETH_ALEN) == 0)
|
2010-11-26 11:14:51 -05:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_p2p_interface_addr(struct wpa_driver_nl80211_data *drv,
|
|
|
|
u8 *new_addr)
|
|
|
|
{
|
|
|
|
unsigned int idx;
|
|
|
|
|
|
|
|
if (!drv->global)
|
|
|
|
return -1;
|
|
|
|
|
2013-10-29 20:41:39 -04:00
|
|
|
os_memcpy(new_addr, drv->first_bss->addr, ETH_ALEN);
|
2010-11-26 11:14:51 -05:00
|
|
|
for (idx = 0; idx < 64; idx++) {
|
2013-10-29 20:41:39 -04:00
|
|
|
new_addr[0] = drv->first_bss->addr[0] | 0x02;
|
2010-11-26 11:14:51 -05:00
|
|
|
new_addr[0] ^= idx << 2;
|
|
|
|
if (!nl80211_addr_in_use(drv->global, new_addr))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (idx == 64)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Assigned new P2P Interface Address "
|
|
|
|
MACSTR, MAC2STR(new_addr));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-11-27 06:05:37 -05:00
|
|
|
#endif /* CONFIG_P2P */
|
|
|
|
|
2010-11-26 11:14:51 -05:00
|
|
|
|
2013-06-25 06:44:54 -04:00
|
|
|
struct wdev_info {
|
|
|
|
u64 wdev_id;
|
|
|
|
int wdev_id_set;
|
|
|
|
u8 macaddr[ETH_ALEN];
|
|
|
|
};
|
|
|
|
|
|
|
|
static int nl80211_wdev_handler(struct nl_msg *msg, void *arg)
|
2013-06-25 06:41:55 -04:00
|
|
|
{
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
2013-06-25 06:44:54 -04:00
|
|
|
struct wdev_info *wi = arg;
|
2013-06-25 06:41:55 -04:00
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
if (tb[NL80211_ATTR_WDEV]) {
|
2013-06-25 06:44:54 -04:00
|
|
|
wi->wdev_id = nla_get_u64(tb[NL80211_ATTR_WDEV]);
|
|
|
|
wi->wdev_id_set = 1;
|
2013-06-25 06:41:55 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_MAC])
|
2013-06-25 06:44:54 -04:00
|
|
|
os_memcpy(wi->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
|
2013-06-25 06:41:55 -04:00
|
|
|
ETH_ALEN);
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-07 03:05:05 -05:00
|
|
|
static int wpa_driver_nl80211_if_add(void *priv, enum wpa_driver_if_type type,
|
2009-12-13 11:54:11 -05:00
|
|
|
const char *ifname, const u8 *addr,
|
2010-04-11 12:23:09 -04:00
|
|
|
void *bss_ctx, void **drv_priv,
|
2011-03-15 07:02:49 -04:00
|
|
|
char *force_ifname, u8 *if_addr,
|
2013-10-31 13:41:42 -04:00
|
|
|
const char *bridge, int use_existing)
|
2009-12-09 09:49:28 -05:00
|
|
|
{
|
2013-06-25 06:41:55 -04:00
|
|
|
enum nl80211_iftype nlmode;
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-12-09 09:49:28 -05:00
|
|
|
int ifidx;
|
2013-10-31 13:41:42 -04:00
|
|
|
int added = 1;
|
2009-12-09 09:49:28 -05:00
|
|
|
|
2010-04-11 12:23:09 -04:00
|
|
|
if (addr)
|
|
|
|
os_memcpy(if_addr, addr, ETH_ALEN);
|
2013-06-25 06:41:55 -04:00
|
|
|
nlmode = wpa_driver_nl80211_if_type(type);
|
|
|
|
if (nlmode == NL80211_IFTYPE_P2P_DEVICE) {
|
2013-06-25 06:44:54 -04:00
|
|
|
struct wdev_info p2pdev_info;
|
|
|
|
|
|
|
|
os_memset(&p2pdev_info, 0, sizeof(p2pdev_info));
|
2013-06-25 06:41:55 -04:00
|
|
|
ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
|
2013-06-25 06:44:54 -04:00
|
|
|
0, nl80211_wdev_handler,
|
2013-10-31 13:41:42 -04:00
|
|
|
&p2pdev_info, use_existing);
|
2013-06-25 06:44:54 -04:00
|
|
|
if (!p2pdev_info.wdev_id_set || ifidx != 0) {
|
2013-06-25 06:41:55 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to create a P2P Device interface %s",
|
|
|
|
ifname);
|
|
|
|
return -1;
|
|
|
|
}
|
2013-06-25 06:44:54 -04:00
|
|
|
|
|
|
|
drv->global->if_add_wdevid = p2pdev_info.wdev_id;
|
|
|
|
drv->global->if_add_wdevid_set = p2pdev_info.wdev_id_set;
|
|
|
|
if (!is_zero_ether_addr(p2pdev_info.macaddr))
|
|
|
|
os_memcpy(if_addr, p2pdev_info.macaddr, ETH_ALEN);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: New P2P Device interface %s (0x%llx) created",
|
|
|
|
ifname,
|
|
|
|
(long long unsigned int) p2pdev_info.wdev_id);
|
2013-06-25 06:41:55 -04:00
|
|
|
} else {
|
|
|
|
ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
|
2013-10-31 13:41:42 -04:00
|
|
|
0, NULL, NULL, use_existing);
|
|
|
|
if (use_existing && ifidx == -ENFILE) {
|
|
|
|
added = 0;
|
|
|
|
ifidx = if_nametoindex(ifname);
|
|
|
|
} else if (ifidx < 0) {
|
2013-06-25 06:41:55 -04:00
|
|
|
return -1;
|
|
|
|
}
|
2009-12-09 09:49:28 -05:00
|
|
|
}
|
|
|
|
|
2013-06-25 06:52:58 -04:00
|
|
|
if (!addr) {
|
|
|
|
if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
|
|
|
|
os_memcpy(if_addr, bss->addr, ETH_ALEN);
|
|
|
|
else if (linux_get_ifhwaddr(drv->global->ioctl_sock,
|
|
|
|
bss->ifname, if_addr) < 0) {
|
2013-10-31 13:41:42 -04:00
|
|
|
if (added)
|
|
|
|
nl80211_remove_iface(drv, ifidx);
|
2013-06-25 06:52:58 -04:00
|
|
|
return -1;
|
|
|
|
}
|
2010-11-26 08:54:53 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_P2P
|
|
|
|
if (!addr &&
|
|
|
|
(type == WPA_IF_P2P_CLIENT || type == WPA_IF_P2P_GROUP ||
|
|
|
|
type == WPA_IF_P2P_GO)) {
|
|
|
|
/* Enforce unique P2P Interface Address */
|
2013-06-25 06:52:58 -04:00
|
|
|
u8 new_addr[ETH_ALEN];
|
2010-11-26 08:54:53 -05:00
|
|
|
|
2013-06-25 06:52:58 -04:00
|
|
|
if (linux_get_ifhwaddr(drv->global->ioctl_sock, ifname,
|
2011-10-22 14:33:58 -04:00
|
|
|
new_addr) < 0) {
|
2014-05-28 05:57:09 -04:00
|
|
|
if (added)
|
|
|
|
nl80211_remove_iface(drv, ifidx);
|
2010-11-26 08:54:53 -05:00
|
|
|
return -1;
|
|
|
|
}
|
2013-06-30 03:38:41 -04:00
|
|
|
if (nl80211_addr_in_use(drv->global, new_addr)) {
|
2010-11-26 08:54:53 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Allocate new address "
|
|
|
|
"for P2P group interface");
|
2010-11-26 11:14:51 -05:00
|
|
|
if (nl80211_p2p_interface_addr(drv, new_addr) < 0) {
|
2014-05-28 05:57:09 -04:00
|
|
|
if (added)
|
|
|
|
nl80211_remove_iface(drv, ifidx);
|
2010-11-26 08:54:53 -05:00
|
|
|
return -1;
|
|
|
|
}
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
|
2010-11-26 08:54:53 -05:00
|
|
|
new_addr) < 0) {
|
2014-05-28 05:57:09 -04:00
|
|
|
if (added)
|
|
|
|
nl80211_remove_iface(drv, ifidx);
|
2010-11-26 08:54:53 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
2011-07-15 05:05:19 -04:00
|
|
|
os_memcpy(if_addr, new_addr, ETH_ALEN);
|
2010-11-26 08:54:53 -05:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_P2P */
|
2010-04-11 12:23:09 -04:00
|
|
|
|
2009-12-09 09:49:28 -05:00
|
|
|
if (type == WPA_IF_AP_BSS) {
|
2013-10-26 05:14:03 -04:00
|
|
|
struct i802_bss *new_bss = os_zalloc(sizeof(*new_bss));
|
|
|
|
if (new_bss == NULL) {
|
2013-10-31 13:41:42 -04:00
|
|
|
if (added)
|
|
|
|
nl80211_remove_iface(drv, ifidx);
|
2013-10-26 05:14:03 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bridge &&
|
|
|
|
i802_check_bridge(drv, new_bss, bridge, ifname) < 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to add the new "
|
|
|
|
"interface %s to a bridge %s",
|
|
|
|
ifname, bridge);
|
2013-10-31 13:41:42 -04:00
|
|
|
if (added)
|
|
|
|
nl80211_remove_iface(drv, ifidx);
|
2013-10-26 05:14:03 -04:00
|
|
|
os_free(new_bss);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_set_iface_flags(drv->global->ioctl_sock, ifname, 1))
|
|
|
|
{
|
2014-05-28 05:57:09 -04:00
|
|
|
if (added)
|
|
|
|
nl80211_remove_iface(drv, ifidx);
|
2010-03-07 02:59:22 -05:00
|
|
|
os_free(new_bss);
|
2009-12-09 09:49:28 -05:00
|
|
|
return -1;
|
|
|
|
}
|
2010-03-06 15:22:56 -05:00
|
|
|
os_strlcpy(new_bss->ifname, ifname, IFNAMSIZ);
|
2011-12-10 04:56:31 -05:00
|
|
|
os_memcpy(new_bss->addr, if_addr, ETH_ALEN);
|
2010-03-06 15:22:56 -05:00
|
|
|
new_bss->ifindex = ifidx;
|
|
|
|
new_bss->drv = drv;
|
2013-10-29 20:41:39 -04:00
|
|
|
new_bss->next = drv->first_bss->next;
|
|
|
|
new_bss->freq = drv->first_bss->freq;
|
2012-12-22 09:19:52 -05:00
|
|
|
new_bss->ctx = bss_ctx;
|
2013-10-31 13:41:42 -04:00
|
|
|
new_bss->added_if = added;
|
2013-10-29 20:41:39 -04:00
|
|
|
drv->first_bss->next = new_bss;
|
2010-03-06 15:22:56 -05:00
|
|
|
if (drv_priv)
|
|
|
|
*drv_priv = new_bss;
|
2011-12-03 13:14:53 -05:00
|
|
|
nl80211_init_bss(new_bss);
|
2012-01-29 05:33:05 -05:00
|
|
|
|
|
|
|
/* Subscribe management frames for this WPA_IF_AP_BSS */
|
|
|
|
if (nl80211_setup_ap(new_bss))
|
|
|
|
return -1;
|
2009-12-09 09:49:28 -05:00
|
|
|
}
|
|
|
|
|
2011-07-17 13:03:25 -04:00
|
|
|
if (drv->global)
|
|
|
|
drv->global->if_add_ifindex = ifidx;
|
|
|
|
|
2014-06-16 17:40:55 -04:00
|
|
|
/*
|
|
|
|
* Some virtual interfaces need to process EAPOL packets and events on
|
|
|
|
* the parent interface. This is used mainly with hostapd.
|
|
|
|
*/
|
|
|
|
if (ifidx > 0 &&
|
|
|
|
(drv->hostapd ||
|
|
|
|
nlmode == NL80211_IFTYPE_AP_VLAN ||
|
|
|
|
nlmode == NL80211_IFTYPE_WDS ||
|
|
|
|
nlmode == NL80211_IFTYPE_MONITOR))
|
2014-03-20 14:29:44 -04:00
|
|
|
add_ifidx(drv, ifidx);
|
|
|
|
|
2009-12-09 09:49:28 -05:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
static int wpa_driver_nl80211_if_remove(struct i802_bss *bss,
|
2009-12-09 09:49:28 -05:00
|
|
|
enum wpa_driver_if_type type,
|
|
|
|
const char *ifname)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2009-12-09 09:49:28 -05:00
|
|
|
int ifindex = if_nametoindex(ifname);
|
|
|
|
|
2013-10-31 13:41:42 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: %s(type=%d ifname=%s) ifindex=%d added_if=%d",
|
|
|
|
__func__, type, ifname, ifindex, bss->added_if);
|
2013-11-24 05:41:32 -05:00
|
|
|
if (ifindex > 0 && (bss->added_if || bss->ifindex != ifindex))
|
2013-10-22 06:35:32 -04:00
|
|
|
nl80211_remove_iface(drv, ifindex);
|
2014-05-27 11:16:58 -04:00
|
|
|
else if (ifindex > 0 && !bss->added_if) {
|
|
|
|
struct wpa_driver_nl80211_data *drv2;
|
|
|
|
dl_list_for_each(drv2, &drv->global->interfaces,
|
|
|
|
struct wpa_driver_nl80211_data, list)
|
|
|
|
del_ifidx(drv2, ifindex);
|
|
|
|
}
|
2012-09-16 01:38:14 -04:00
|
|
|
|
|
|
|
if (type != WPA_IF_AP_BSS)
|
|
|
|
return 0;
|
|
|
|
|
2011-03-15 07:02:49 -04:00
|
|
|
if (bss->added_if_into_bridge) {
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
|
|
|
|
bss->ifname) < 0)
|
2011-03-15 07:02:49 -04:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: Failed to remove "
|
|
|
|
"interface %s from bridge %s: %s",
|
|
|
|
bss->ifname, bss->brname, strerror(errno));
|
|
|
|
}
|
|
|
|
if (bss->added_bridge) {
|
2011-10-22 14:33:58 -04:00
|
|
|
if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
|
2011-03-15 07:02:49 -04:00
|
|
|
wpa_printf(MSG_INFO, "nl80211: Failed to remove "
|
|
|
|
"bridge %s: %s",
|
|
|
|
bss->brname, strerror(errno));
|
|
|
|
}
|
2010-03-06 15:22:56 -05:00
|
|
|
|
2013-10-29 20:41:39 -04:00
|
|
|
if (bss != drv->first_bss) {
|
2011-01-09 12:18:50 -05:00
|
|
|
struct i802_bss *tbss;
|
2010-03-06 15:22:56 -05:00
|
|
|
|
2013-10-31 13:41:42 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Not the first BSS - remove it");
|
2013-10-29 20:41:39 -04:00
|
|
|
for (tbss = drv->first_bss; tbss; tbss = tbss->next) {
|
2011-01-09 12:18:50 -05:00
|
|
|
if (tbss->next == bss) {
|
|
|
|
tbss->next = bss->next;
|
2012-01-29 05:33:05 -05:00
|
|
|
/* Unsubscribe management frames */
|
|
|
|
nl80211_teardown_ap(bss);
|
2011-12-03 13:14:53 -05:00
|
|
|
nl80211_destroy_bss(bss);
|
2014-03-20 14:23:43 -04:00
|
|
|
if (!bss->added_if)
|
|
|
|
i802_set_iface_flags(bss, 0);
|
2011-01-09 12:18:50 -05:00
|
|
|
os_free(bss);
|
|
|
|
bss = NULL;
|
|
|
|
break;
|
|
|
|
}
|
2009-12-09 09:49:28 -05:00
|
|
|
}
|
2011-01-09 12:18:50 -05:00
|
|
|
if (bss)
|
|
|
|
wpa_printf(MSG_INFO, "nl80211: %s - could not find "
|
|
|
|
"BSS %p in the list", __func__, bss);
|
2013-10-30 19:34:32 -04:00
|
|
|
} else {
|
2013-10-31 13:41:42 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: First BSS - reassign context");
|
2013-10-30 19:34:32 -04:00
|
|
|
nl80211_teardown_ap(bss);
|
2013-10-31 13:41:42 -04:00
|
|
|
if (!bss->added_if && !drv->first_bss->next)
|
|
|
|
wpa_driver_nl80211_del_beacon(drv);
|
2013-10-30 19:34:32 -04:00
|
|
|
nl80211_destroy_bss(bss);
|
2013-10-31 13:41:42 -04:00
|
|
|
if (!bss->added_if)
|
|
|
|
i802_set_iface_flags(bss, 0);
|
2013-10-30 19:34:32 -04:00
|
|
|
if (drv->first_bss->next) {
|
|
|
|
drv->first_bss = drv->first_bss->next;
|
|
|
|
drv->ctx = drv->first_bss->ctx;
|
|
|
|
os_free(bss);
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: No second BSS to reassign context to");
|
|
|
|
}
|
2009-12-09 09:49:28 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-03 06:57:51 -05:00
|
|
|
static int cookie_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
u64 *cookie = arg;
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
if (tb[NL80211_ATTR_COOKIE])
|
|
|
|
*cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]);
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-11-19 12:56:34 -05:00
|
|
|
static int nl80211_send_frame_cmd(struct i802_bss *bss,
|
2010-12-29 07:05:34 -05:00
|
|
|
unsigned int freq, unsigned int wait,
|
|
|
|
const u8 *buf, size_t buf_len,
|
2011-11-19 12:56:34 -05:00
|
|
|
u64 *cookie_out, int no_cck, int no_ack,
|
|
|
|
int offchanok)
|
2010-10-10 11:00:25 -04:00
|
|
|
{
|
2011-11-19 12:56:34 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2010-10-10 11:00:25 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
u64 cookie;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2013-04-23 18:01:21 -04:00
|
|
|
wpa_printf(MSG_MSGDUMP, "nl80211: CMD_FRAME freq=%u wait=%u no_cck=%d "
|
2012-05-11 11:22:53 -04:00
|
|
|
"no_ack=%d offchanok=%d",
|
|
|
|
freq, wait, no_cck, no_ack, offchanok);
|
2013-07-21 08:24:50 -04:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "CMD_FRAME", buf, buf_len);
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_FRAME);
|
2010-10-10 11:00:25 -04:00
|
|
|
|
2013-06-25 06:44:54 -04:00
|
|
|
if (nl80211_set_iface_id(msg, bss) < 0)
|
2013-06-25 06:33:45 -04:00
|
|
|
goto nla_put_failure;
|
2013-07-21 08:24:50 -04:00
|
|
|
if (freq)
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, freq);
|
2011-08-09 07:01:31 -04:00
|
|
|
if (wait)
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_DURATION, wait);
|
2014-03-01 15:24:55 -05:00
|
|
|
if (offchanok && ((drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
|
|
|
|
drv->test_use_roc_tx))
|
2011-11-19 12:56:34 -05:00
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_OFFCHANNEL_TX_OK);
|
2011-10-29 14:49:46 -04:00
|
|
|
if (no_cck)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_TX_NO_CCK_RATE);
|
2011-11-19 12:32:05 -05:00
|
|
|
if (no_ack)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_DONT_WAIT_FOR_ACK);
|
2011-10-29 14:23:27 -04:00
|
|
|
|
2010-10-10 11:00:25 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_FRAME, buf_len, buf);
|
|
|
|
|
|
|
|
cookie = 0;
|
|
|
|
ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Frame command failed: ret=%d "
|
2011-08-09 06:59:12 -04:00
|
|
|
"(%s) (freq=%u wait=%u)", ret, strerror(-ret),
|
|
|
|
freq, wait);
|
2010-10-10 11:00:25 -04:00
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
2013-04-23 18:01:21 -04:00
|
|
|
wpa_printf(MSG_MSGDUMP, "nl80211: Frame TX command accepted%s; "
|
2011-11-19 12:32:05 -05:00
|
|
|
"cookie 0x%llx", no_ack ? " (no ACK)" : "",
|
|
|
|
(long long unsigned int) cookie);
|
2010-10-10 11:00:25 -04:00
|
|
|
|
|
|
|
if (cookie_out)
|
2011-11-19 12:32:05 -05:00
|
|
|
*cookie_out = no_ack ? (u64) -1 : cookie;
|
2010-10-10 11:00:25 -04:00
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
static int wpa_driver_nl80211_send_action(struct i802_bss *bss,
|
|
|
|
unsigned int freq,
|
2010-12-29 06:59:17 -05:00
|
|
|
unsigned int wait_time,
|
2010-02-16 12:41:49 -05:00
|
|
|
const u8 *dst, const u8 *src,
|
|
|
|
const u8 *bssid,
|
2011-10-29 14:49:46 -04:00
|
|
|
const u8 *data, size_t data_len,
|
|
|
|
int no_cck)
|
2010-02-16 12:41:49 -05:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2010-02-16 12:41:49 -05:00
|
|
|
int ret = -1;
|
|
|
|
u8 *buf;
|
|
|
|
struct ieee80211_hdr *hdr;
|
|
|
|
|
2010-12-29 07:05:34 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Send Action frame (ifindex=%d, "
|
2012-01-26 10:44:11 -05:00
|
|
|
"freq=%u MHz wait=%d ms no_cck=%d)",
|
|
|
|
drv->ifindex, freq, wait_time, no_cck);
|
2010-02-16 12:41:49 -05:00
|
|
|
|
|
|
|
buf = os_zalloc(24 + data_len);
|
|
|
|
if (buf == NULL)
|
|
|
|
return ret;
|
|
|
|
os_memcpy(buf + 24, data, data_len);
|
|
|
|
hdr = (struct ieee80211_hdr *) buf;
|
|
|
|
hdr->frame_control =
|
|
|
|
IEEE80211_FC(WLAN_FC_TYPE_MGMT, WLAN_FC_STYPE_ACTION);
|
|
|
|
os_memcpy(hdr->addr1, dst, ETH_ALEN);
|
|
|
|
os_memcpy(hdr->addr2, src, ETH_ALEN);
|
|
|
|
os_memcpy(hdr->addr3, bssid, ETH_ALEN);
|
|
|
|
|
2013-09-28 05:05:03 -04:00
|
|
|
if (is_ap_interface(drv->nlmode) &&
|
|
|
|
(!(drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
|
|
|
|
(int) freq == bss->freq || drv->device_ap_sme ||
|
|
|
|
!drv->use_monitor))
|
2013-02-03 08:46:47 -05:00
|
|
|
ret = wpa_driver_nl80211_send_mlme(bss, buf, 24 + data_len,
|
|
|
|
0, freq, no_cck, 1,
|
|
|
|
wait_time);
|
2010-10-10 11:00:25 -04:00
|
|
|
else
|
2011-11-19 12:56:34 -05:00
|
|
|
ret = nl80211_send_frame_cmd(bss, freq, wait_time, buf,
|
2010-12-29 07:05:34 -05:00
|
|
|
24 + data_len,
|
2011-10-29 14:49:46 -04:00
|
|
|
&drv->send_action_cookie,
|
2011-11-19 12:56:34 -05:00
|
|
|
no_cck, 0, 1);
|
2010-02-16 12:41:49 -05:00
|
|
|
|
2010-04-11 05:29:16 -04:00
|
|
|
os_free(buf);
|
2010-02-16 12:41:49 -05:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-12-29 07:05:34 -05:00
|
|
|
static void wpa_driver_nl80211_send_action_cancel_wait(void *priv)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return;
|
|
|
|
|
2013-02-28 15:09:32 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Cancel TX frame wait: cookie=0x%llx",
|
|
|
|
(long long unsigned int) drv->send_action_cookie);
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_FRAME_WAIT_CANCEL);
|
2010-12-29 07:05:34 -05:00
|
|
|
|
2013-06-30 03:46:19 -04:00
|
|
|
if (nl80211_set_iface_id(msg, bss) < 0)
|
|
|
|
goto nla_put_failure;
|
2010-12-29 07:05:34 -05:00
|
|
|
NLA_PUT_U64(msg, NL80211_ATTR_COOKIE, drv->send_action_cookie);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: wait cancel failed: ret=%d "
|
|
|
|
"(%s)", ret, strerror(-ret));
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-03 06:57:51 -05:00
|
|
|
static int wpa_driver_nl80211_remain_on_channel(void *priv, unsigned int freq,
|
|
|
|
unsigned int duration)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2010-01-03 06:57:51 -05:00
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
u64 cookie;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_REMAIN_ON_CHANNEL);
|
2010-01-03 06:57:51 -05:00
|
|
|
|
2013-06-25 06:44:54 -04:00
|
|
|
if (nl80211_set_iface_id(msg, bss) < 0)
|
2013-06-25 06:33:45 -04:00
|
|
|
goto nla_put_failure;
|
|
|
|
|
2010-01-03 06:57:51 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, freq);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_DURATION, duration);
|
|
|
|
|
|
|
|
cookie = 0;
|
|
|
|
ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie);
|
2011-12-17 05:19:36 -05:00
|
|
|
msg = NULL;
|
2010-01-03 06:57:51 -05:00
|
|
|
if (ret == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel cookie "
|
|
|
|
"0x%llx for freq=%u MHz duration=%u",
|
|
|
|
(long long unsigned int) cookie, freq, duration);
|
|
|
|
drv->remain_on_chan_cookie = cookie;
|
2011-09-10 15:57:41 -04:00
|
|
|
drv->pending_remain_on_chan = 1;
|
2010-01-03 06:57:51 -05:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to request remain-on-channel "
|
2010-07-18 17:30:24 -04:00
|
|
|
"(freq=%d duration=%u): %d (%s)",
|
|
|
|
freq, duration, ret, strerror(-ret));
|
2010-01-03 06:57:51 -05:00
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2010-01-03 06:57:51 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_cancel_remain_on_channel(void *priv)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2010-01-03 06:57:51 -05:00
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!drv->pending_remain_on_chan) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: No pending remain-on-channel "
|
|
|
|
"to cancel");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Cancel remain-on-channel with cookie "
|
|
|
|
"0x%llx",
|
|
|
|
(long long unsigned int) drv->remain_on_chan_cookie);
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL);
|
2010-01-03 06:57:51 -05:00
|
|
|
|
2013-06-25 06:44:54 -04:00
|
|
|
if (nl80211_set_iface_id(msg, bss) < 0)
|
2013-06-25 06:33:45 -04:00
|
|
|
goto nla_put_failure;
|
|
|
|
|
2010-01-03 06:57:51 -05:00
|
|
|
NLA_PUT_U64(msg, NL80211_ATTR_COOKIE, drv->remain_on_chan_cookie);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2011-12-17 05:19:36 -05:00
|
|
|
msg = NULL;
|
2010-01-03 06:57:51 -05:00
|
|
|
if (ret == 0)
|
|
|
|
return 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to cancel remain-on-channel: "
|
|
|
|
"%d (%s)", ret, strerror(-ret));
|
|
|
|
nla_put_failure:
|
2011-12-17 05:19:36 -05:00
|
|
|
nlmsg_free(msg);
|
2010-01-03 06:57:51 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss, int report)
|
2010-01-03 06:30:22 -05:00
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2010-01-03 06:30:22 -05:00
|
|
|
|
2010-10-10 11:10:37 -04:00
|
|
|
if (!report) {
|
2011-12-27 13:32:29 -05:00
|
|
|
if (bss->nl_preq && drv->device_ap_sme &&
|
2014-08-05 03:20:53 -04:00
|
|
|
is_ap_interface(drv->nlmode) && !bss->in_deinit &&
|
|
|
|
!bss->static_ap) {
|
2011-12-27 13:32:29 -05:00
|
|
|
/*
|
|
|
|
* Do not disable Probe Request reporting that was
|
|
|
|
* enabled in nl80211_setup_ap().
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Skip disabling of "
|
|
|
|
"Probe Request reporting nl_preq=%p while "
|
|
|
|
"in AP mode", bss->nl_preq);
|
|
|
|
} else if (bss->nl_preq) {
|
2011-12-23 11:10:59 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Disable Probe Request "
|
|
|
|
"reporting nl_preq=%p", bss->nl_preq);
|
2013-10-26 09:06:49 -04:00
|
|
|
nl80211_destroy_eloop_handle(&bss->nl_preq);
|
2010-10-10 11:10:37 -04:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
if (bss->nl_preq) {
|
2010-10-10 11:10:37 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Probe Request reporting "
|
2011-12-23 11:10:59 -05:00
|
|
|
"already on! nl_preq=%p", bss->nl_preq);
|
2010-10-10 11:10:37 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
bss->nl_preq = nl_create_handle(drv->global->nl_cb, "preq");
|
|
|
|
if (bss->nl_preq == NULL)
|
2010-10-10 11:10:37 -04:00
|
|
|
return -1;
|
2011-12-23 11:10:59 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Enable Probe Request "
|
|
|
|
"reporting nl_preq=%p", bss->nl_preq);
|
2010-10-10 11:10:37 -04:00
|
|
|
|
2011-12-06 12:47:59 -05:00
|
|
|
if (nl80211_register_frame(bss, bss->nl_preq,
|
2010-10-10 11:10:37 -04:00
|
|
|
(WLAN_FC_TYPE_MGMT << 2) |
|
|
|
|
(WLAN_FC_STYPE_PROBE_REQ << 4),
|
2011-10-22 09:56:43 -04:00
|
|
|
NULL, 0) < 0)
|
|
|
|
goto out_err;
|
2010-10-10 11:10:37 -04:00
|
|
|
|
2013-10-26 09:06:49 -04:00
|
|
|
nl80211_register_eloop_read(&bss->nl_preq,
|
|
|
|
wpa_driver_nl80211_event_receive,
|
|
|
|
bss->nl_cb);
|
2010-10-10 11:10:37 -04:00
|
|
|
|
2010-01-03 06:30:22 -05:00
|
|
|
return 0;
|
2010-10-10 11:10:37 -04:00
|
|
|
|
2011-10-22 09:56:43 -04:00
|
|
|
out_err:
|
2011-11-19 12:48:49 -05:00
|
|
|
nl_destroy_handles(&bss->nl_preq);
|
2010-10-10 11:10:37 -04:00
|
|
|
return -1;
|
2010-01-03 06:30:22 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-16 05:11:19 -05:00
|
|
|
static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
|
|
|
|
int ifindex, int disabled)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
struct nlattr *bands, *band;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_TX_BITRATE_MASK);
|
2010-01-16 05:11:19 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
|
|
|
|
|
|
|
|
bands = nla_nest_start(msg, NL80211_ATTR_TX_RATES);
|
|
|
|
if (!bands)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Disable 2 GHz rates 1, 2, 5.5, 11 Mbps by masking out everything
|
|
|
|
* else apart from 6, 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS
|
|
|
|
* rates. All 5 GHz rates are left enabled.
|
|
|
|
*/
|
|
|
|
band = nla_nest_start(msg, NL80211_BAND_2GHZ);
|
|
|
|
if (!band)
|
|
|
|
goto nla_put_failure;
|
2011-10-29 15:12:26 -04:00
|
|
|
if (disabled) {
|
|
|
|
NLA_PUT(msg, NL80211_TXRATE_LEGACY, 8,
|
|
|
|
"\x0c\x12\x18\x24\x30\x48\x60\x6c");
|
|
|
|
}
|
2010-01-16 05:11:19 -05:00
|
|
|
nla_nest_end(msg, band);
|
|
|
|
|
|
|
|
nla_nest_end(msg, bands);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Set TX rates failed: ret=%d "
|
|
|
|
"(%s)", ret, strerror(-ret));
|
2012-08-10 04:48:57 -04:00
|
|
|
} else
|
|
|
|
drv->disabled_11b_rates = disabled;
|
2010-01-16 05:11:19 -05:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-16 05:20:51 -05:00
|
|
|
static int wpa_driver_nl80211_deinit_ap(void *priv)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2011-07-17 13:22:11 -04:00
|
|
|
if (!is_ap_interface(drv->nlmode))
|
2010-01-16 05:20:51 -05:00
|
|
|
return -1;
|
|
|
|
wpa_driver_nl80211_del_beacon(drv);
|
2014-07-07 07:20:58 -04:00
|
|
|
bss->beacon_set = 0;
|
2013-08-25 03:20:54 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If the P2P GO interface was dynamically added, then it is
|
|
|
|
* possible that the interface change to station is not possible.
|
|
|
|
*/
|
|
|
|
if (drv->nlmode == NL80211_IFTYPE_P2P_GO && bss->if_dynamic)
|
|
|
|
return 0;
|
|
|
|
|
2011-07-17 13:22:11 -04:00
|
|
|
return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
|
2010-01-16 05:20:51 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-05-09 13:06:33 -04:00
|
|
|
static int wpa_driver_nl80211_stop_ap(void *priv)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
if (!is_ap_interface(drv->nlmode))
|
|
|
|
return -1;
|
|
|
|
wpa_driver_nl80211_del_beacon(drv);
|
|
|
|
bss->beacon_set = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-04-01 14:41:23 -04:00
|
|
|
static int wpa_driver_nl80211_deinit_p2p_cli(void *priv)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
if (drv->nlmode != NL80211_IFTYPE_P2P_CLIENT)
|
|
|
|
return -1;
|
2013-08-25 03:20:54 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If the P2P Client interface was dynamically added, then it is
|
|
|
|
* possible that the interface change to station is not possible.
|
|
|
|
*/
|
|
|
|
if (bss->if_dynamic)
|
|
|
|
return 0;
|
|
|
|
|
2012-04-01 14:41:23 -04:00
|
|
|
return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-02-27 11:46:02 -05:00
|
|
|
static void wpa_driver_nl80211_resume(void *priv)
|
|
|
|
{
|
2010-03-06 15:22:56 -05:00
|
|
|
struct i802_bss *bss = priv;
|
2013-06-25 06:48:03 -04:00
|
|
|
|
|
|
|
if (i802_set_iface_flags(bss, 1))
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface up on resume event");
|
2010-02-27 11:46:02 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-07 15:47:39 -05:00
|
|
|
static int nl80211_send_ft_action(void *priv, u8 action, const u8 *target_ap,
|
|
|
|
const u8 *ies, size_t ies_len)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
int ret;
|
|
|
|
u8 *data, *pos;
|
|
|
|
size_t data_len;
|
2011-12-10 04:56:31 -05:00
|
|
|
const u8 *own_addr = bss->addr;
|
2010-03-07 15:47:39 -05:00
|
|
|
|
|
|
|
if (action != 1) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Unsupported send_ft_action "
|
|
|
|
"action %d", action);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Action frame payload:
|
|
|
|
* Category[1] = 6 (Fast BSS Transition)
|
|
|
|
* Action[1] = 1 (Fast BSS Transition Request)
|
|
|
|
* STA Address
|
|
|
|
* Target AP Address
|
|
|
|
* FT IEs
|
|
|
|
*/
|
|
|
|
|
2010-03-11 17:41:03 -05:00
|
|
|
data_len = 2 + 2 * ETH_ALEN + ies_len;
|
|
|
|
data = os_malloc(data_len);
|
2010-03-07 15:47:39 -05:00
|
|
|
if (data == NULL)
|
|
|
|
return -1;
|
|
|
|
pos = data;
|
|
|
|
*pos++ = 0x06; /* FT Action category */
|
|
|
|
*pos++ = action;
|
|
|
|
os_memcpy(pos, own_addr, ETH_ALEN);
|
|
|
|
pos += ETH_ALEN;
|
|
|
|
os_memcpy(pos, target_ap, ETH_ALEN);
|
|
|
|
pos += ETH_ALEN;
|
|
|
|
os_memcpy(pos, ies, ies_len);
|
|
|
|
|
2010-12-29 06:59:17 -05:00
|
|
|
ret = wpa_driver_nl80211_send_action(bss, drv->assoc_freq, 0,
|
|
|
|
drv->bssid, own_addr, drv->bssid,
|
2011-10-29 14:49:46 -04:00
|
|
|
data, data_len, 0);
|
2010-03-07 15:47:39 -05:00
|
|
|
os_free(data);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-28 18:31:04 -04:00
|
|
|
static int nl80211_signal_monitor(void *priv, int threshold, int hysteresis)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
2013-03-30 14:37:44 -04:00
|
|
|
struct nl_msg *msg;
|
|
|
|
struct nlattr *cqm;
|
2012-08-07 10:27:55 -04:00
|
|
|
int ret = -1;
|
2010-03-28 18:31:04 -04:00
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Signal monitor threshold=%d "
|
|
|
|
"hysteresis=%d", threshold, hysteresis);
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_CQM);
|
2010-03-28 18:31:04 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
|
|
|
|
|
2013-03-30 14:37:44 -04:00
|
|
|
cqm = nla_nest_start(msg, NL80211_ATTR_CQM);
|
2010-03-28 18:31:04 -04:00
|
|
|
if (cqm == NULL)
|
2012-08-04 13:10:08 -04:00
|
|
|
goto nla_put_failure;
|
2010-03-28 18:31:04 -04:00
|
|
|
|
2013-03-30 14:37:44 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CQM_RSSI_THOLD, threshold);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CQM_RSSI_HYST, hysteresis);
|
|
|
|
nla_nest_end(msg, cqm);
|
2012-08-04 13:10:08 -04:00
|
|
|
|
2012-08-07 10:27:55 -04:00
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2010-03-28 18:31:04 -04:00
|
|
|
msg = NULL;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
2012-08-07 10:27:55 -04:00
|
|
|
return ret;
|
2010-03-28 18:31:04 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-22 04:56:24 -04:00
|
|
|
static int get_channel_width(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct wpa_signal_info *sig_change = arg;
|
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
|
|
|
sig_change->center_frq1 = -1;
|
|
|
|
sig_change->center_frq2 = -1;
|
|
|
|
sig_change->chanwidth = CHAN_WIDTH_UNKNOWN;
|
|
|
|
|
|
|
|
if (tb[NL80211_ATTR_CHANNEL_WIDTH]) {
|
|
|
|
sig_change->chanwidth = convert2width(
|
|
|
|
nla_get_u32(tb[NL80211_ATTR_CHANNEL_WIDTH]));
|
|
|
|
if (tb[NL80211_ATTR_CENTER_FREQ1])
|
|
|
|
sig_change->center_frq1 =
|
|
|
|
nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
|
|
|
|
if (tb[NL80211_ATTR_CENTER_FREQ2])
|
|
|
|
sig_change->center_frq2 =
|
|
|
|
nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
|
|
|
|
}
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_get_channel_width(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_signal_info *sig)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_INTERFACE);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, get_channel_width, sig);
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-03-31 10:56:48 -04:00
|
|
|
static int nl80211_signal_poll(void *priv, struct wpa_signal_info *si)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
int res;
|
|
|
|
|
|
|
|
os_memset(si, 0, sizeof(*si));
|
|
|
|
res = nl80211_get_link_signal(drv, si);
|
|
|
|
if (res != 0)
|
|
|
|
return res;
|
|
|
|
|
2013-06-22 04:56:24 -04:00
|
|
|
res = nl80211_get_channel_width(drv, si);
|
|
|
|
if (res != 0)
|
|
|
|
return res;
|
|
|
|
|
2011-03-31 10:56:48 -04:00
|
|
|
return nl80211_get_link_noise(drv, si);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-11-19 04:23:49 -05:00
|
|
|
static int wpa_driver_nl80211_shared_freq(void *priv)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct wpa_driver_nl80211_data *driver;
|
|
|
|
int freq = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the same PHY is in connected state with some other interface,
|
|
|
|
* then retrieve the assoc freq.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Get shared freq for PHY %s",
|
|
|
|
drv->phyname);
|
|
|
|
|
|
|
|
dl_list_for_each(driver, &drv->global->interfaces,
|
|
|
|
struct wpa_driver_nl80211_data, list) {
|
|
|
|
if (drv == driver ||
|
|
|
|
os_strcmp(drv->phyname, driver->phyname) != 0 ||
|
|
|
|
!driver->associated)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Found a match for PHY %s - %s "
|
|
|
|
MACSTR,
|
2013-10-29 20:41:39 -04:00
|
|
|
driver->phyname, driver->first_bss->ifname,
|
|
|
|
MAC2STR(driver->first_bss->addr));
|
2012-04-08 13:44:05 -04:00
|
|
|
if (is_ap_interface(driver->nlmode))
|
2013-10-29 20:41:39 -04:00
|
|
|
freq = driver->first_bss->freq;
|
2012-04-08 13:44:05 -04:00
|
|
|
else
|
|
|
|
freq = nl80211_get_assoc_freq(driver);
|
2011-11-19 04:23:49 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Shared freq for PHY %s: %d",
|
|
|
|
drv->phyname, freq);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!freq)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: No shared interface for "
|
|
|
|
"PHY (%s) in associated state", drv->phyname);
|
|
|
|
|
|
|
|
return freq;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-29 15:01:40 -04:00
|
|
|
static int nl80211_send_frame(void *priv, const u8 *data, size_t data_len,
|
|
|
|
int encrypt)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
2012-01-26 10:44:11 -05:00
|
|
|
return wpa_driver_nl80211_send_frame(bss, data, data_len, encrypt, 0,
|
|
|
|
0, 0, 0, 0);
|
2010-03-29 15:01:40 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-26 08:54:53 -05:00
|
|
|
static int nl80211_set_param(void *priv, const char *param)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: driver param='%s'", param);
|
|
|
|
if (param == NULL)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
#ifdef CONFIG_P2P
|
|
|
|
if (os_strstr(param, "use_p2p_group_interface=1")) {
|
2010-11-27 06:05:37 -05:00
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
|
2010-11-26 08:54:53 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group "
|
|
|
|
"interface");
|
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT;
|
|
|
|
drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_MGMT_AND_NON_P2P;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_P2P */
|
|
|
|
|
2013-12-30 17:07:23 -05:00
|
|
|
if (os_strstr(param, "use_monitor=1")) {
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
drv->use_monitor = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (os_strstr(param, "force_connect_cmd=1")) {
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
drv->capa.flags &= ~WPA_DRIVER_FLAGS_SME;
|
2014-09-27 05:53:17 -04:00
|
|
|
drv->force_connect_cmd = 1;
|
2013-12-30 17:07:23 -05:00
|
|
|
}
|
|
|
|
|
2014-03-01 15:24:55 -05:00
|
|
|
if (os_strstr(param, "no_offchannel_tx=1")) {
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
drv->capa.flags &= ~WPA_DRIVER_FLAGS_OFFCHANNEL_TX;
|
|
|
|
drv->test_use_roc_tx = 1;
|
|
|
|
}
|
|
|
|
|
2010-11-26 08:54:53 -05:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-26 11:14:51 -05:00
|
|
|
static void * nl80211_global_init(void)
|
|
|
|
{
|
|
|
|
struct nl80211_global *global;
|
2011-10-20 19:03:25 -04:00
|
|
|
struct netlink_config *cfg;
|
|
|
|
|
2010-11-26 11:14:51 -05:00
|
|
|
global = os_zalloc(sizeof(*global));
|
|
|
|
if (global == NULL)
|
|
|
|
return NULL;
|
2011-10-22 14:33:58 -04:00
|
|
|
global->ioctl_sock = -1;
|
2010-11-26 11:14:51 -05:00
|
|
|
dl_list_init(&global->interfaces);
|
2011-07-17 13:03:25 -04:00
|
|
|
global->if_add_ifindex = -1;
|
2011-10-20 19:03:25 -04:00
|
|
|
|
|
|
|
cfg = os_zalloc(sizeof(*cfg));
|
|
|
|
if (cfg == NULL)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
cfg->ctx = global;
|
|
|
|
cfg->newlink_cb = wpa_driver_nl80211_event_rtm_newlink;
|
|
|
|
cfg->dellink_cb = wpa_driver_nl80211_event_rtm_dellink;
|
|
|
|
global->netlink = netlink_init(cfg);
|
|
|
|
if (global->netlink == NULL) {
|
|
|
|
os_free(cfg);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2011-10-22 11:42:42 -04:00
|
|
|
if (wpa_driver_nl80211_init_nl_global(global) < 0)
|
|
|
|
goto err;
|
|
|
|
|
2011-10-22 14:33:58 -04:00
|
|
|
global->ioctl_sock = socket(PF_INET, SOCK_DGRAM, 0);
|
|
|
|
if (global->ioctl_sock < 0) {
|
2013-10-27 11:58:12 -04:00
|
|
|
wpa_printf(MSG_ERROR, "nl80211: socket(PF_INET,SOCK_DGRAM) failed: %s",
|
|
|
|
strerror(errno));
|
2011-10-22 14:33:58 -04:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2010-11-26 11:14:51 -05:00
|
|
|
return global;
|
2011-10-20 19:03:25 -04:00
|
|
|
|
|
|
|
err:
|
|
|
|
nl80211_global_deinit(global);
|
|
|
|
return NULL;
|
2010-11-26 11:14:51 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void nl80211_global_deinit(void *priv)
|
|
|
|
{
|
|
|
|
struct nl80211_global *global = priv;
|
|
|
|
if (global == NULL)
|
|
|
|
return;
|
|
|
|
if (!dl_list_empty(&global->interfaces)) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: %u interface(s) remain at "
|
|
|
|
"nl80211_global_deinit",
|
|
|
|
dl_list_len(&global->interfaces));
|
|
|
|
}
|
2011-10-20 19:03:25 -04:00
|
|
|
|
|
|
|
if (global->netlink)
|
|
|
|
netlink_deinit(global->netlink);
|
|
|
|
|
2011-10-22 12:00:27 -04:00
|
|
|
nl_destroy_handles(&global->nl);
|
|
|
|
|
2013-10-26 09:06:49 -04:00
|
|
|
if (global->nl_event)
|
|
|
|
nl80211_destroy_eloop_handle(&global->nl_event);
|
2011-12-06 12:30:43 -05:00
|
|
|
|
|
|
|
nl_cb_put(global->nl_cb);
|
2011-10-22 11:42:42 -04:00
|
|
|
|
2011-10-22 14:33:58 -04:00
|
|
|
if (global->ioctl_sock >= 0)
|
|
|
|
close(global->ioctl_sock);
|
|
|
|
|
2010-11-26 11:14:51 -05:00
|
|
|
os_free(global);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-26 14:46:30 -05:00
|
|
|
static const char * nl80211_get_radio_name(void *priv)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
return drv->phyname;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-06-20 03:17:33 -04:00
|
|
|
static int nl80211_pmkid(struct i802_bss *bss, int cmd, const u8 *bssid,
|
|
|
|
const u8 *pmkid)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(bss->drv, msg, 0, cmd);
|
2011-06-20 03:17:33 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(bss->ifname));
|
|
|
|
if (pmkid)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_PMKID, 16, pmkid);
|
|
|
|
if (bssid)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, bssid);
|
|
|
|
|
|
|
|
return send_and_recv_msgs(bss->drv, msg, NULL, NULL);
|
|
|
|
nla_put_failure:
|
2011-12-17 05:27:11 -05:00
|
|
|
nlmsg_free(msg);
|
2011-06-20 03:17:33 -04:00
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_add_pmkid(void *priv, const u8 *bssid, const u8 *pmkid)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Add PMKID for " MACSTR, MAC2STR(bssid));
|
|
|
|
return nl80211_pmkid(bss, NL80211_CMD_SET_PMKSA, bssid, pmkid);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_remove_pmkid(void *priv, const u8 *bssid, const u8 *pmkid)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Delete PMKID for " MACSTR,
|
|
|
|
MAC2STR(bssid));
|
|
|
|
return nl80211_pmkid(bss, NL80211_CMD_DEL_PMKSA, bssid, pmkid);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_flush_pmkid(void *priv)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Flush PMKIDs");
|
|
|
|
return nl80211_pmkid(bss, NL80211_CMD_FLUSH_PMKSA, NULL, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-07-24 02:59:13 -04:00
|
|
|
static void clean_survey_results(struct survey_results *survey_results)
|
|
|
|
{
|
|
|
|
struct freq_survey *survey, *tmp;
|
|
|
|
|
|
|
|
if (dl_list_empty(&survey_results->survey_list))
|
|
|
|
return;
|
|
|
|
|
|
|
|
dl_list_for_each_safe(survey, tmp, &survey_results->survey_list,
|
|
|
|
struct freq_survey, list) {
|
|
|
|
dl_list_del(&survey->list);
|
|
|
|
os_free(survey);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void add_survey(struct nlattr **sinfo, u32 ifidx,
|
|
|
|
struct dl_list *survey_list)
|
|
|
|
{
|
|
|
|
struct freq_survey *survey;
|
|
|
|
|
|
|
|
survey = os_zalloc(sizeof(struct freq_survey));
|
|
|
|
if (!survey)
|
|
|
|
return;
|
|
|
|
|
|
|
|
survey->ifidx = ifidx;
|
|
|
|
survey->freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
|
|
|
|
survey->filled = 0;
|
|
|
|
|
|
|
|
if (sinfo[NL80211_SURVEY_INFO_NOISE]) {
|
|
|
|
survey->nf = (int8_t)
|
|
|
|
nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
|
|
|
|
survey->filled |= SURVEY_HAS_NF;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]) {
|
|
|
|
survey->channel_time =
|
|
|
|
nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]);
|
|
|
|
survey->filled |= SURVEY_HAS_CHAN_TIME;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]) {
|
|
|
|
survey->channel_time_busy =
|
|
|
|
nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]);
|
|
|
|
survey->filled |= SURVEY_HAS_CHAN_TIME_BUSY;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]) {
|
|
|
|
survey->channel_time_rx =
|
|
|
|
nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]);
|
|
|
|
survey->filled |= SURVEY_HAS_CHAN_TIME_RX;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]) {
|
|
|
|
survey->channel_time_tx =
|
|
|
|
nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]);
|
|
|
|
survey->filled |= SURVEY_HAS_CHAN_TIME_TX;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Freq survey dump event (freq=%d MHz noise=%d channel_time=%ld busy_time=%ld tx_time=%ld rx_time=%ld filled=%04x)",
|
|
|
|
survey->freq,
|
|
|
|
survey->nf,
|
|
|
|
(unsigned long int) survey->channel_time,
|
|
|
|
(unsigned long int) survey->channel_time_busy,
|
|
|
|
(unsigned long int) survey->channel_time_tx,
|
|
|
|
(unsigned long int) survey->channel_time_rx,
|
|
|
|
survey->filled);
|
|
|
|
|
|
|
|
dl_list_add_tail(survey_list, &survey->list);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int check_survey_ok(struct nlattr **sinfo, u32 surveyed_freq,
|
|
|
|
unsigned int freq_filter)
|
|
|
|
{
|
|
|
|
if (!freq_filter)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
return freq_filter == surveyed_freq;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int survey_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
|
|
|
|
struct survey_results *survey_results;
|
|
|
|
u32 surveyed_freq = 0;
|
|
|
|
u32 ifidx;
|
|
|
|
|
|
|
|
static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
|
|
|
|
[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
|
|
|
|
[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
|
|
|
|
};
|
|
|
|
|
|
|
|
survey_results = (struct survey_results *) arg;
|
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
|
2014-01-30 06:44:07 -05:00
|
|
|
if (!tb[NL80211_ATTR_IFINDEX])
|
|
|
|
return NL_SKIP;
|
|
|
|
|
2013-07-24 02:59:13 -04:00
|
|
|
ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
|
|
|
|
|
|
|
|
if (!tb[NL80211_ATTR_SURVEY_INFO])
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
|
|
|
|
tb[NL80211_ATTR_SURVEY_INFO],
|
|
|
|
survey_policy))
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY]) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Invalid survey data");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
surveyed_freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
|
|
|
|
|
|
|
|
if (!check_survey_ok(sinfo, surveyed_freq,
|
|
|
|
survey_results->freq_filter))
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
if (survey_results->freq_filter &&
|
|
|
|
survey_results->freq_filter != surveyed_freq) {
|
|
|
|
wpa_printf(MSG_EXCESSIVE, "nl80211: Ignoring survey data for freq %d MHz",
|
|
|
|
surveyed_freq);
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
add_survey(sinfo, ifidx, &survey_results->survey_list);
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_get_survey(void *priv, unsigned int freq)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int err = -ENOBUFS;
|
|
|
|
union wpa_event_data data;
|
|
|
|
struct survey_results *survey_results;
|
|
|
|
|
|
|
|
os_memset(&data, 0, sizeof(data));
|
|
|
|
survey_results = &data.survey_results;
|
|
|
|
|
|
|
|
dl_list_init(&survey_results->survey_list);
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
|
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
if (freq)
|
|
|
|
data.survey_results.freq_filter = freq;
|
|
|
|
|
|
|
|
do {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Fetch survey data");
|
|
|
|
err = send_and_recv_msgs(drv, msg, survey_handler,
|
|
|
|
survey_results);
|
|
|
|
} while (err > 0);
|
|
|
|
|
|
|
|
if (err) {
|
|
|
|
wpa_printf(MSG_ERROR, "nl80211: Failed to process survey data");
|
|
|
|
goto out_clean;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_supplicant_event(drv->ctx, EVENT_SURVEY, &data);
|
|
|
|
|
|
|
|
out_clean:
|
|
|
|
clean_survey_results(survey_results);
|
|
|
|
nla_put_failure:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-12 14:22:51 -04:00
|
|
|
static void nl80211_set_rekey_info(void *priv, const u8 *kek, const u8 *kck,
|
|
|
|
const u8 *replay_ctr)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nlattr *replay_nested;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return;
|
|
|
|
|
2011-10-20 18:34:54 -04:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_REKEY_OFFLOAD);
|
2011-07-12 14:22:51 -04:00
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
|
|
|
|
|
|
|
|
replay_nested = nla_nest_start(msg, NL80211_ATTR_REKEY_DATA);
|
|
|
|
if (!replay_nested)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
NLA_PUT(msg, NL80211_REKEY_DATA_KEK, NL80211_KEK_LEN, kek);
|
|
|
|
NLA_PUT(msg, NL80211_REKEY_DATA_KCK, NL80211_KCK_LEN, kck);
|
|
|
|
NLA_PUT(msg, NL80211_REKEY_DATA_REPLAY_CTR, NL80211_REPLAY_CTR_LEN,
|
|
|
|
replay_ctr);
|
|
|
|
|
|
|
|
nla_nest_end(msg, replay_nested);
|
|
|
|
|
|
|
|
send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
return;
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-11-19 07:23:46 -05:00
|
|
|
static void nl80211_send_null_frame(struct i802_bss *bss, const u8 *own_addr,
|
|
|
|
const u8 *addr, int qos)
|
2011-10-20 14:03:08 -04:00
|
|
|
{
|
2011-11-19 07:23:46 -05:00
|
|
|
/* send data frame to poll STA and check whether
|
|
|
|
* this frame is ACKed */
|
2011-10-20 14:03:08 -04:00
|
|
|
struct {
|
|
|
|
struct ieee80211_hdr hdr;
|
|
|
|
u16 qos_ctl;
|
|
|
|
} STRUCT_PACKED nulldata;
|
|
|
|
size_t size;
|
|
|
|
|
|
|
|
/* Send data frame to poll STA and check whether this frame is ACKed */
|
|
|
|
|
|
|
|
os_memset(&nulldata, 0, sizeof(nulldata));
|
|
|
|
|
|
|
|
if (qos) {
|
|
|
|
nulldata.hdr.frame_control =
|
|
|
|
IEEE80211_FC(WLAN_FC_TYPE_DATA,
|
|
|
|
WLAN_FC_STYPE_QOS_NULL);
|
|
|
|
size = sizeof(nulldata);
|
|
|
|
} else {
|
|
|
|
nulldata.hdr.frame_control =
|
|
|
|
IEEE80211_FC(WLAN_FC_TYPE_DATA,
|
|
|
|
WLAN_FC_STYPE_NULLFUNC);
|
|
|
|
size = sizeof(struct ieee80211_hdr);
|
|
|
|
}
|
|
|
|
|
|
|
|
nulldata.hdr.frame_control |= host_to_le16(WLAN_FC_FROMDS);
|
|
|
|
os_memcpy(nulldata.hdr.IEEE80211_DA_FROMDS, addr, ETH_ALEN);
|
|
|
|
os_memcpy(nulldata.hdr.IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
|
|
|
|
os_memcpy(nulldata.hdr.IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
if (wpa_driver_nl80211_send_mlme(bss, (u8 *) &nulldata, size, 0, 0, 0,
|
|
|
|
0, 0) < 0)
|
2011-10-20 14:03:08 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211_send_null_frame: Failed to "
|
|
|
|
"send poll frame");
|
|
|
|
}
|
|
|
|
|
2011-11-19 07:23:46 -05:00
|
|
|
static void nl80211_poll_client(void *priv, const u8 *own_addr, const u8 *addr,
|
|
|
|
int qos)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
if (!drv->poll_command_supported) {
|
|
|
|
nl80211_send_null_frame(bss, own_addr, addr, qos);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_PROBE_CLIENT);
|
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
|
|
|
|
|
|
|
|
send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
return;
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
}
|
|
|
|
|
2011-10-20 14:03:08 -04:00
|
|
|
|
2011-11-25 06:11:22 -05:00
|
|
|
static int nl80211_set_power_save(struct i802_bss *bss, int enabled)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_SET_POWER_SAVE);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_PS_STATE,
|
|
|
|
enabled ? NL80211_PS_ENABLED : NL80211_PS_DISABLED);
|
|
|
|
return send_and_recv_msgs(bss->drv, msg, NULL, NULL);
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_set_p2p_powersave(void *priv, int legacy_ps, int opp_ps,
|
|
|
|
int ctwindow)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: set_p2p_powersave (legacy_ps=%d "
|
|
|
|
"opp_ps=%d ctwindow=%d)", legacy_ps, opp_ps, ctwindow);
|
|
|
|
|
2013-11-07 09:18:44 -05:00
|
|
|
if (opp_ps != -1 || ctwindow != -1) {
|
|
|
|
#ifdef ANDROID_P2P
|
|
|
|
wpa_driver_set_p2p_ps(priv, legacy_ps, opp_ps, ctwindow);
|
|
|
|
#else /* ANDROID_P2P */
|
2011-11-25 06:11:22 -05:00
|
|
|
return -1; /* Not yet supported */
|
2013-11-07 09:18:44 -05:00
|
|
|
#endif /* ANDROID_P2P */
|
|
|
|
}
|
2011-11-25 06:11:22 -05:00
|
|
|
|
|
|
|
if (legacy_ps == -1)
|
|
|
|
return 0;
|
|
|
|
if (legacy_ps != 0 && legacy_ps != 1)
|
|
|
|
return -1; /* Not yet supported */
|
|
|
|
|
|
|
|
return nl80211_set_power_save(bss, legacy_ps);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-16 05:18:52 -04:00
|
|
|
static int nl80211_start_radar_detection(void *priv,
|
|
|
|
struct hostapd_freq_params *freq)
|
2013-05-09 13:05:01 -04:00
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
|
2013-10-16 05:18:52 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Start radar detection (CAC) %d MHz (ht_enabled=%d, vht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
|
|
|
|
freq->freq, freq->ht_enabled, freq->vht_enabled,
|
|
|
|
freq->bandwidth, freq->center_freq1, freq->center_freq2);
|
|
|
|
|
2013-05-09 13:05:01 -04:00
|
|
|
if (!(drv->capa.flags & WPA_DRIVER_FLAGS_RADAR)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Driver does not support radar "
|
|
|
|
"detection");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_RADAR_DETECT);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
2014-09-26 14:21:24 -04:00
|
|
|
if (nl80211_put_freq_params(msg, freq) < 0)
|
|
|
|
goto nla_put_failure;
|
2013-05-09 13:05:01 -04:00
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
2014-09-26 14:21:25 -04:00
|
|
|
msg = NULL;
|
2013-05-09 13:05:01 -04:00
|
|
|
if (ret == 0)
|
|
|
|
return 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Failed to start radar detection: "
|
|
|
|
"%d (%s)", ret, strerror(-ret));
|
|
|
|
nla_put_failure:
|
2014-09-26 14:21:25 -04:00
|
|
|
nlmsg_free(msg);
|
2013-05-09 13:05:01 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-10-23 06:59:00 -04:00
|
|
|
#ifdef CONFIG_TDLS
|
|
|
|
|
|
|
|
static int nl80211_send_tdls_mgmt(void *priv, const u8 *dst, u8 action_code,
|
|
|
|
u8 dialog_token, u16 status_code,
|
2014-09-29 14:47:51 -04:00
|
|
|
u32 peer_capab, int initiator, const u8 *buf,
|
|
|
|
size_t len)
|
2011-10-23 06:59:00 -04:00
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
|
|
|
|
if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
if (!dst)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_TDLS_MGMT);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, dst);
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_TDLS_ACTION, action_code);
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_TDLS_DIALOG_TOKEN, dialog_token);
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_STATUS_CODE, status_code);
|
2014-03-26 12:04:50 -04:00
|
|
|
if (peer_capab) {
|
|
|
|
/*
|
|
|
|
* The internal enum tdls_peer_capability definition is
|
|
|
|
* currently identical with the nl80211 enum
|
|
|
|
* nl80211_tdls_peer_capability, so no conversion is needed
|
|
|
|
* here.
|
|
|
|
*/
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_TDLS_PEER_CAPABILITY, peer_capab);
|
|
|
|
}
|
2014-09-29 14:47:51 -04:00
|
|
|
if (initiator)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_TDLS_INITIATOR);
|
2011-10-23 06:59:00 -04:00
|
|
|
NLA_PUT(msg, NL80211_ATTR_IE, len, buf);
|
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_tdls_oper(void *priv, enum tdls_oper oper, const u8 *peer)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
enum nl80211_tdls_operation nl80211_oper;
|
|
|
|
|
|
|
|
if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
switch (oper) {
|
|
|
|
case TDLS_DISCOVERY_REQ:
|
|
|
|
nl80211_oper = NL80211_TDLS_DISCOVERY_REQ;
|
|
|
|
break;
|
|
|
|
case TDLS_SETUP:
|
|
|
|
nl80211_oper = NL80211_TDLS_SETUP;
|
|
|
|
break;
|
|
|
|
case TDLS_TEARDOWN:
|
|
|
|
nl80211_oper = NL80211_TDLS_TEARDOWN;
|
|
|
|
break;
|
|
|
|
case TDLS_ENABLE_LINK:
|
|
|
|
nl80211_oper = NL80211_TDLS_ENABLE_LINK;
|
|
|
|
break;
|
|
|
|
case TDLS_DISABLE_LINK:
|
|
|
|
nl80211_oper = NL80211_TDLS_DISABLE_LINK;
|
|
|
|
break;
|
|
|
|
case TDLS_ENABLE:
|
|
|
|
return 0;
|
|
|
|
case TDLS_DISABLE:
|
|
|
|
return 0;
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_TDLS_OPER);
|
|
|
|
NLA_PUT_U8(msg, NL80211_ATTR_TDLS_OPERATION, nl80211_oper);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, peer);
|
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG TDLS */
|
|
|
|
|
|
|
|
|
2013-02-03 08:46:47 -05:00
|
|
|
static int driver_nl80211_set_key(const char *ifname, void *priv,
|
|
|
|
enum wpa_alg alg, const u8 *addr,
|
|
|
|
int key_idx, int set_tx,
|
|
|
|
const u8 *seq, size_t seq_len,
|
|
|
|
const u8 *key, size_t key_len)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
return wpa_driver_nl80211_set_key(ifname, bss, alg, addr, key_idx,
|
|
|
|
set_tx, seq, seq_len, key, key_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int driver_nl80211_scan2(void *priv,
|
|
|
|
struct wpa_driver_scan_params *params)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
return wpa_driver_nl80211_scan(bss, params);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int driver_nl80211_deauthenticate(void *priv, const u8 *addr,
|
|
|
|
int reason_code)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
return wpa_driver_nl80211_deauthenticate(bss, addr, reason_code);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int driver_nl80211_authenticate(void *priv,
|
|
|
|
struct wpa_driver_auth_params *params)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
return wpa_driver_nl80211_authenticate(bss, params);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void driver_nl80211_deinit(void *priv)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
wpa_driver_nl80211_deinit(bss);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int driver_nl80211_if_remove(void *priv, enum wpa_driver_if_type type,
|
|
|
|
const char *ifname)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
return wpa_driver_nl80211_if_remove(bss, type, ifname);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int driver_nl80211_send_mlme(void *priv, const u8 *data,
|
|
|
|
size_t data_len, int noack)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
return wpa_driver_nl80211_send_mlme(bss, data, data_len, noack,
|
|
|
|
0, 0, 0, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int driver_nl80211_sta_remove(void *priv, const u8 *addr)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
2014-10-09 09:52:38 -04:00
|
|
|
return wpa_driver_nl80211_sta_remove(bss, addr, -1, 0);
|
2013-02-03 08:46:47 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int driver_nl80211_set_sta_vlan(void *priv, const u8 *addr,
|
|
|
|
const char *ifname, int vlan_id)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
return i802_set_sta_vlan(bss, addr, ifname, vlan_id);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int driver_nl80211_read_sta_data(void *priv,
|
|
|
|
struct hostap_sta_driver_data *data,
|
|
|
|
const u8 *addr)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
return i802_read_sta_data(bss, data, addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int driver_nl80211_send_action(void *priv, unsigned int freq,
|
|
|
|
unsigned int wait_time,
|
|
|
|
const u8 *dst, const u8 *src,
|
|
|
|
const u8 *bssid,
|
|
|
|
const u8 *data, size_t data_len,
|
|
|
|
int no_cck)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
return wpa_driver_nl80211_send_action(bss, freq, wait_time, dst, src,
|
|
|
|
bssid, data, data_len, no_cck);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int driver_nl80211_probe_req_report(void *priv, int report)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
return wpa_driver_nl80211_probe_req_report(bss, report);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-12 14:08:53 -04:00
|
|
|
static int wpa_driver_nl80211_update_ft_ies(void *priv, const u8 *md,
|
|
|
|
const u8 *ies, size_t ies_len)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
u16 mdid = WPA_GET_LE16(md);
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Updating FT IEs");
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_UPDATE_FT_IES);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_IE, ies_len, ies);
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_MDID, mdid);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: update_ft_ies failed "
|
|
|
|
"err=%d (%s)", ret, strerror(-ret));
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-25 06:50:21 -04:00
|
|
|
const u8 * wpa_driver_nl80211_get_macaddr(void *priv)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
|
|
|
|
if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return bss->addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-28 10:19:30 -04:00
|
|
|
static const char * scan_state_str(enum scan_states scan_state)
|
|
|
|
{
|
|
|
|
switch (scan_state) {
|
|
|
|
case NO_SCAN:
|
|
|
|
return "NO_SCAN";
|
|
|
|
case SCAN_REQUESTED:
|
|
|
|
return "SCAN_REQUESTED";
|
|
|
|
case SCAN_STARTED:
|
|
|
|
return "SCAN_STARTED";
|
|
|
|
case SCAN_COMPLETED:
|
|
|
|
return "SCAN_COMPLETED";
|
|
|
|
case SCAN_ABORTED:
|
|
|
|
return "SCAN_ABORTED";
|
|
|
|
case SCHED_SCAN_STARTED:
|
|
|
|
return "SCHED_SCAN_STARTED";
|
|
|
|
case SCHED_SCAN_STOPPED:
|
|
|
|
return "SCHED_SCAN_STOPPED";
|
|
|
|
case SCHED_SCAN_RESULTS:
|
|
|
|
return "SCHED_SCAN_RESULTS";
|
|
|
|
}
|
|
|
|
|
|
|
|
return "??";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_status(void *priv, char *buf, size_t buflen)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
int res;
|
|
|
|
char *pos, *end;
|
|
|
|
|
|
|
|
pos = buf;
|
|
|
|
end = buf + buflen;
|
|
|
|
|
|
|
|
res = os_snprintf(pos, end - pos,
|
|
|
|
"ifindex=%d\n"
|
|
|
|
"ifname=%s\n"
|
|
|
|
"brname=%s\n"
|
|
|
|
"addr=" MACSTR "\n"
|
|
|
|
"freq=%d\n"
|
|
|
|
"%s%s%s%s%s",
|
|
|
|
bss->ifindex,
|
|
|
|
bss->ifname,
|
|
|
|
bss->brname,
|
|
|
|
MAC2STR(bss->addr),
|
|
|
|
bss->freq,
|
|
|
|
bss->beacon_set ? "beacon_set=1\n" : "",
|
|
|
|
bss->added_if_into_bridge ?
|
|
|
|
"added_if_into_bridge=1\n" : "",
|
|
|
|
bss->added_bridge ? "added_bridge=1\n" : "",
|
|
|
|
bss->in_deinit ? "in_deinit=1\n" : "",
|
|
|
|
bss->if_dynamic ? "if_dynamic=1\n" : "");
|
|
|
|
if (res < 0 || res >= end - pos)
|
|
|
|
return pos - buf;
|
|
|
|
pos += res;
|
|
|
|
|
|
|
|
if (bss->wdev_id_set) {
|
|
|
|
res = os_snprintf(pos, end - pos, "wdev_id=%llu\n",
|
|
|
|
(unsigned long long) bss->wdev_id);
|
|
|
|
if (res < 0 || res >= end - pos)
|
|
|
|
return pos - buf;
|
|
|
|
pos += res;
|
|
|
|
}
|
|
|
|
|
|
|
|
res = os_snprintf(pos, end - pos,
|
|
|
|
"phyname=%s\n"
|
2014-09-27 12:11:24 -04:00
|
|
|
"perm_addr=" MACSTR "\n"
|
2013-09-28 10:19:30 -04:00
|
|
|
"drv_ifindex=%d\n"
|
|
|
|
"operstate=%d\n"
|
|
|
|
"scan_state=%s\n"
|
|
|
|
"auth_bssid=" MACSTR "\n"
|
|
|
|
"auth_attempt_bssid=" MACSTR "\n"
|
|
|
|
"bssid=" MACSTR "\n"
|
|
|
|
"prev_bssid=" MACSTR "\n"
|
|
|
|
"associated=%d\n"
|
|
|
|
"assoc_freq=%u\n"
|
|
|
|
"monitor_sock=%d\n"
|
|
|
|
"monitor_ifidx=%d\n"
|
|
|
|
"monitor_refcount=%d\n"
|
|
|
|
"last_mgmt_freq=%u\n"
|
|
|
|
"eapol_tx_sock=%d\n"
|
2014-10-20 06:00:08 -04:00
|
|
|
"%s%s%s%s%s%s%s%s%s%s%s%s%s",
|
2013-09-28 10:19:30 -04:00
|
|
|
drv->phyname,
|
2014-09-27 12:11:24 -04:00
|
|
|
MAC2STR(drv->perm_addr),
|
2013-09-28 10:19:30 -04:00
|
|
|
drv->ifindex,
|
|
|
|
drv->operstate,
|
|
|
|
scan_state_str(drv->scan_state),
|
|
|
|
MAC2STR(drv->auth_bssid),
|
|
|
|
MAC2STR(drv->auth_attempt_bssid),
|
|
|
|
MAC2STR(drv->bssid),
|
|
|
|
MAC2STR(drv->prev_bssid),
|
|
|
|
drv->associated,
|
|
|
|
drv->assoc_freq,
|
|
|
|
drv->monitor_sock,
|
|
|
|
drv->monitor_ifidx,
|
|
|
|
drv->monitor_refcount,
|
|
|
|
drv->last_mgmt_freq,
|
|
|
|
drv->eapol_tx_sock,
|
|
|
|
drv->ignore_if_down_event ?
|
|
|
|
"ignore_if_down_event=1\n" : "",
|
|
|
|
drv->scan_complete_events ?
|
|
|
|
"scan_complete_events=1\n" : "",
|
|
|
|
drv->disabled_11b_rates ?
|
|
|
|
"disabled_11b_rates=1\n" : "",
|
|
|
|
drv->pending_remain_on_chan ?
|
|
|
|
"pending_remain_on_chan=1\n" : "",
|
|
|
|
drv->in_interface_list ? "in_interface_list=1\n" : "",
|
|
|
|
drv->device_ap_sme ? "device_ap_sme=1\n" : "",
|
|
|
|
drv->poll_command_supported ?
|
|
|
|
"poll_command_supported=1\n" : "",
|
|
|
|
drv->data_tx_status ? "data_tx_status=1\n" : "",
|
|
|
|
drv->scan_for_auth ? "scan_for_auth=1\n" : "",
|
|
|
|
drv->retry_auth ? "retry_auth=1\n" : "",
|
|
|
|
drv->use_monitor ? "use_monitor=1\n" : "",
|
|
|
|
drv->ignore_next_local_disconnect ?
|
|
|
|
"ignore_next_local_disconnect=1\n" : "",
|
2014-04-13 04:39:49 -04:00
|
|
|
drv->ignore_next_local_deauth ?
|
2014-10-20 06:00:08 -04:00
|
|
|
"ignore_next_local_deauth=1\n" : "");
|
2013-09-28 10:19:30 -04:00
|
|
|
if (res < 0 || res >= end - pos)
|
|
|
|
return pos - buf;
|
|
|
|
pos += res;
|
|
|
|
|
|
|
|
if (drv->has_capability) {
|
|
|
|
res = os_snprintf(pos, end - pos,
|
|
|
|
"capa.key_mgmt=0x%x\n"
|
|
|
|
"capa.enc=0x%x\n"
|
|
|
|
"capa.auth=0x%x\n"
|
2014-09-01 00:23:23 -04:00
|
|
|
"capa.flags=0x%llx\n"
|
2013-09-28 10:19:30 -04:00
|
|
|
"capa.max_scan_ssids=%d\n"
|
|
|
|
"capa.max_sched_scan_ssids=%d\n"
|
|
|
|
"capa.sched_scan_supported=%d\n"
|
|
|
|
"capa.max_match_sets=%d\n"
|
|
|
|
"capa.max_remain_on_chan=%u\n"
|
|
|
|
"capa.max_stations=%u\n"
|
|
|
|
"capa.probe_resp_offloads=0x%x\n"
|
|
|
|
"capa.max_acl_mac_addrs=%u\n"
|
|
|
|
"capa.num_multichan_concurrent=%u\n",
|
|
|
|
drv->capa.key_mgmt,
|
|
|
|
drv->capa.enc,
|
|
|
|
drv->capa.auth,
|
2014-09-01 00:23:23 -04:00
|
|
|
(unsigned long long) drv->capa.flags,
|
2013-09-28 10:19:30 -04:00
|
|
|
drv->capa.max_scan_ssids,
|
|
|
|
drv->capa.max_sched_scan_ssids,
|
|
|
|
drv->capa.sched_scan_supported,
|
|
|
|
drv->capa.max_match_sets,
|
|
|
|
drv->capa.max_remain_on_chan,
|
|
|
|
drv->capa.max_stations,
|
|
|
|
drv->capa.probe_resp_offloads,
|
|
|
|
drv->capa.max_acl_mac_addrs,
|
|
|
|
drv->capa.num_multichan_concurrent);
|
|
|
|
if (res < 0 || res >= end - pos)
|
|
|
|
return pos - buf;
|
|
|
|
pos += res;
|
|
|
|
}
|
|
|
|
|
|
|
|
return pos - buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-11-14 05:28:30 -05:00
|
|
|
static int set_beacon_data(struct nl_msg *msg, struct beacon_data *settings)
|
|
|
|
{
|
|
|
|
if (settings->head)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_BEACON_HEAD,
|
|
|
|
settings->head_len, settings->head);
|
|
|
|
|
|
|
|
if (settings->tail)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_BEACON_TAIL,
|
|
|
|
settings->tail_len, settings->tail);
|
|
|
|
|
|
|
|
if (settings->beacon_ies)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_IE,
|
|
|
|
settings->beacon_ies_len, settings->beacon_ies);
|
|
|
|
|
|
|
|
if (settings->proberesp_ies)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_IE_PROBE_RESP,
|
|
|
|
settings->proberesp_ies_len, settings->proberesp_ies);
|
|
|
|
|
|
|
|
if (settings->assocresp_ies)
|
|
|
|
NLA_PUT(msg,
|
|
|
|
NL80211_ATTR_IE_ASSOC_RESP,
|
|
|
|
settings->assocresp_ies_len, settings->assocresp_ies);
|
|
|
|
|
|
|
|
if (settings->probe_resp)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_PROBE_RESP,
|
|
|
|
settings->probe_resp_len, settings->probe_resp);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_switch_channel(void *priv, struct csa_settings *settings)
|
|
|
|
{
|
|
|
|
struct nl_msg *msg;
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nlattr *beacon_csa;
|
|
|
|
int ret = -ENOBUFS;
|
|
|
|
|
2013-11-25 14:16:12 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Channel switch request (cs_count=%u block_tx=%u freq=%d width=%d cf1=%d cf2=%d)",
|
2013-11-14 05:28:30 -05:00
|
|
|
settings->cs_count, settings->block_tx,
|
2013-11-25 14:16:12 -05:00
|
|
|
settings->freq_params.freq, settings->freq_params.bandwidth,
|
|
|
|
settings->freq_params.center_freq1,
|
|
|
|
settings->freq_params.center_freq2);
|
2013-11-14 05:28:30 -05:00
|
|
|
|
2014-01-01 08:32:09 -05:00
|
|
|
if (!(drv->capa.flags & WPA_DRIVER_FLAGS_AP_CSA)) {
|
2013-11-14 05:28:30 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Driver does not support channel switch command");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((drv->nlmode != NL80211_IFTYPE_AP) &&
|
|
|
|
(drv->nlmode != NL80211_IFTYPE_P2P_GO))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
/* check settings validity */
|
|
|
|
if (!settings->beacon_csa.tail ||
|
|
|
|
((settings->beacon_csa.tail_len <=
|
|
|
|
settings->counter_offset_beacon) ||
|
|
|
|
(settings->beacon_csa.tail[settings->counter_offset_beacon] !=
|
|
|
|
settings->cs_count)))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (settings->beacon_csa.probe_resp &&
|
|
|
|
((settings->beacon_csa.probe_resp_len <=
|
|
|
|
settings->counter_offset_presp) ||
|
|
|
|
(settings->beacon_csa.probe_resp[settings->counter_offset_presp] !=
|
|
|
|
settings->cs_count)))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_CHANNEL_SWITCH);
|
2014-06-27 08:19:27 -04:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
|
2013-11-14 05:28:30 -05:00
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_CH_SWITCH_COUNT, settings->cs_count);
|
|
|
|
ret = nl80211_put_freq_params(msg, &settings->freq_params);
|
|
|
|
if (ret)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
if (settings->block_tx)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_ATTR_CH_SWITCH_BLOCK_TX);
|
|
|
|
|
|
|
|
/* beacon_after params */
|
|
|
|
ret = set_beacon_data(msg, &settings->beacon_after);
|
|
|
|
if (ret)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
/* beacon_csa params */
|
|
|
|
beacon_csa = nla_nest_start(msg, NL80211_ATTR_CSA_IES);
|
|
|
|
if (!beacon_csa)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
ret = set_beacon_data(msg, &settings->beacon_csa);
|
|
|
|
if (ret)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_CSA_C_OFF_BEACON,
|
|
|
|
settings->counter_offset_beacon);
|
|
|
|
|
|
|
|
if (settings->beacon_csa.probe_resp)
|
|
|
|
NLA_PUT_U16(msg, NL80211_ATTR_CSA_C_OFF_PRESP,
|
|
|
|
settings->counter_offset_presp);
|
|
|
|
|
|
|
|
nla_nest_end(msg, beacon_csa);
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: switch_channel failed err=%d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
ret = -ENOBUFS;
|
|
|
|
error:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Could not build channel switch request");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-05 10:19:58 -05:00
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
static int cmd_reply_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct wpabuf *buf = arg;
|
|
|
|
|
|
|
|
if (!buf)
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
if ((size_t) genlmsg_attrlen(gnlh, 0) > wpabuf_tailroom(buf)) {
|
|
|
|
wpa_printf(MSG_INFO, "nl80211: insufficient buffer space for reply");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpabuf_put_data(buf, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0));
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
|
|
|
|
|
|
|
|
2014-03-03 06:09:50 -05:00
|
|
|
static int vendor_reply_handler(struct nl_msg *msg, void *arg)
|
|
|
|
{
|
|
|
|
struct nlattr *tb[NL80211_ATTR_MAX + 1];
|
|
|
|
struct nlattr *nl_vendor_reply, *nl;
|
|
|
|
struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
|
|
|
|
struct wpabuf *buf = arg;
|
|
|
|
int rem;
|
|
|
|
|
|
|
|
if (!buf)
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
|
|
|
|
genlmsg_attrlen(gnlh, 0), NULL);
|
|
|
|
nl_vendor_reply = tb[NL80211_ATTR_VENDOR_DATA];
|
|
|
|
|
|
|
|
if (!nl_vendor_reply)
|
|
|
|
return NL_SKIP;
|
|
|
|
|
|
|
|
if ((size_t) nla_len(nl_vendor_reply) > wpabuf_tailroom(buf)) {
|
|
|
|
wpa_printf(MSG_INFO, "nl80211: Vendor command: insufficient buffer space for reply");
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
nla_for_each_nested(nl, nl_vendor_reply, rem) {
|
|
|
|
wpabuf_put_data(buf, nla_data(nl), nla_len(nl));
|
|
|
|
}
|
|
|
|
|
|
|
|
return NL_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int nl80211_vendor_cmd(void *priv, unsigned int vendor_id,
|
|
|
|
unsigned int subcmd, const u8 *data,
|
|
|
|
size_t data_len, struct wpabuf *buf)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2014-03-05 10:19:58 -05:00
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
if (vendor_id == 0xffffffff) {
|
|
|
|
nl80211_cmd(drv, msg, 0, subcmd);
|
|
|
|
if (nlmsg_append(msg, (void *) data, data_len, NLMSG_ALIGNTO) <
|
|
|
|
0)
|
|
|
|
goto nla_put_failure;
|
|
|
|
ret = send_and_recv_msgs(drv, msg, cmd_reply_handler, buf);
|
|
|
|
if (ret)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: command failed err=%d",
|
|
|
|
ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
|
|
|
|
2014-03-03 06:09:50 -05:00
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_VENDOR);
|
|
|
|
if (nl80211_set_iface_id(msg, bss) < 0)
|
|
|
|
goto nla_put_failure;
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_ID, vendor_id);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_SUBCMD, subcmd);
|
|
|
|
if (data)
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_VENDOR_DATA, data_len, data);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, vendor_reply_handler, buf);
|
|
|
|
if (ret)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: vendor command failed err=%d",
|
|
|
|
ret);
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-09 18:41:10 -04:00
|
|
|
static int nl80211_set_qos_map(void *priv, const u8 *qos_map_set,
|
|
|
|
u8 qos_map_set_len)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
wpa_hexdump(MSG_DEBUG, "nl80211: Setting QoS Map",
|
|
|
|
qos_map_set, qos_map_set_len);
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_QOS_MAP);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_QOS_MAP, qos_map_set_len, qos_map_set);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
if (ret)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Setting QoS Map failed");
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-04-24 01:45:39 -04:00
|
|
|
static int nl80211_set_wowlan(void *priv,
|
|
|
|
const struct wowlan_triggers *triggers)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
struct nlattr *wowlan_triggers;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan");
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_WOWLAN);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
wowlan_triggers = nla_nest_start(msg, NL80211_ATTR_WOWLAN_TRIGGERS);
|
|
|
|
if (!wowlan_triggers)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
if (triggers->any)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_ANY);
|
|
|
|
if (triggers->disconnect)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_DISCONNECT);
|
|
|
|
if (triggers->magic_pkt)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_MAGIC_PKT);
|
|
|
|
if (triggers->gtk_rekey_failure)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE);
|
|
|
|
if (triggers->eap_identity_req)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST);
|
|
|
|
if (triggers->four_way_handshake)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE);
|
|
|
|
if (triggers->rfkill_release)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_RFKILL_RELEASE);
|
|
|
|
|
|
|
|
nla_nest_end(msg, wowlan_triggers);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
if (ret)
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan failed");
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -ENOBUFS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-11 08:54:57 -04:00
|
|
|
static int nl80211_roaming(void *priv, int allowed, const u8 *bssid)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
struct nlattr *params;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
|
|
|
|
|
|
|
|
if (!drv->roaming_vendor_cmd_avail) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Ignore roaming policy change since driver does not provide command for setting it");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_VENDOR);
|
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_SUBCMD,
|
|
|
|
QCA_NL80211_VENDOR_SUBCMD_ROAMING);
|
|
|
|
|
|
|
|
params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
|
|
|
|
if (!params)
|
|
|
|
goto nla_put_failure;
|
|
|
|
NLA_PUT_U32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_POLICY,
|
|
|
|
allowed ? QCA_ROAMING_ALLOWED_WITHIN_ESS :
|
|
|
|
QCA_ROAMING_NOT_ALLOWED);
|
|
|
|
if (bssid)
|
|
|
|
NLA_PUT(msg, QCA_WLAN_VENDOR_ATTR_MAC_ADDR, ETH_ALEN, bssid);
|
|
|
|
nla_nest_end(msg, params);
|
|
|
|
|
|
|
|
return send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-27 12:11:24 -04:00
|
|
|
static int nl80211_set_mac_addr(void *priv, const u8 *addr)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
int new_addr = addr != NULL;
|
|
|
|
|
|
|
|
if (!addr)
|
|
|
|
addr = drv->perm_addr;
|
|
|
|
|
|
|
|
if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname, addr) < 0)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: failed to set_mac_addr for %s to " MACSTR,
|
|
|
|
bss->ifname, MAC2STR(addr));
|
|
|
|
if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname,
|
|
|
|
1) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Could not restore interface UP after failed set_mac_addr");
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: set_mac_addr for %s to " MACSTR,
|
|
|
|
bss->ifname, MAC2STR(addr));
|
|
|
|
drv->addr_changed = new_addr;
|
|
|
|
os_memcpy(bss->addr, addr, ETH_ALEN);
|
|
|
|
|
|
|
|
if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 1) < 0)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"nl80211: Could not restore interface UP after set_mac_addr");
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-01 00:23:23 -04:00
|
|
|
#ifdef CONFIG_MESH
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_init_mesh(void *priv)
|
|
|
|
{
|
|
|
|
if (wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_MESH_POINT)) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"nl80211: Failed to set interface into mesh mode");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
wpa_driver_nl80211_join_mesh(void *priv,
|
|
|
|
struct wpa_driver_mesh_join_params *params)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
struct nlattr *container;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: mesh join (ifindex=%d)", drv->ifindex);
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_JOIN_MESH);
|
|
|
|
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
/* XXX: need chtype too in case we want HT */
|
|
|
|
if (params->freq) {
|
|
|
|
wpa_printf(MSG_DEBUG, " * freq=%d", params->freq);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (params->basic_rates) {
|
|
|
|
u8 rates[NL80211_MAX_SUPP_RATES];
|
|
|
|
u8 rates_len = 0;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < NL80211_MAX_SUPP_RATES; i++) {
|
|
|
|
if (params->basic_rates[i] < 0)
|
|
|
|
break;
|
|
|
|
rates[rates_len++] = params->basic_rates[i] / 5;
|
|
|
|
}
|
|
|
|
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_BSS_BASIC_RATES, rates_len, rates);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (params->meshid) {
|
|
|
|
wpa_hexdump_ascii(MSG_DEBUG, " * SSID",
|
|
|
|
params->meshid, params->meshid_len);
|
|
|
|
NLA_PUT(msg, NL80211_ATTR_MESH_ID, params->meshid_len,
|
|
|
|
params->meshid);
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, " * flags=%08X", params->flags);
|
|
|
|
|
|
|
|
container = nla_nest_start(msg, NL80211_ATTR_MESH_SETUP);
|
|
|
|
if (!container)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
if (params->ies) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, " * IEs", params->ies, params->ie_len);
|
|
|
|
NLA_PUT(msg, NL80211_MESH_SETUP_IE, params->ie_len,
|
|
|
|
params->ies);
|
|
|
|
}
|
|
|
|
/* WPA_DRIVER_MESH_FLAG_OPEN_AUTH is treated as default by nl80211 */
|
|
|
|
if (params->flags & WPA_DRIVER_MESH_FLAG_SAE_AUTH) {
|
|
|
|
NLA_PUT_U8(msg, NL80211_MESH_SETUP_AUTH_PROTOCOL, 0x1);
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_MESH_SETUP_USERSPACE_AUTH);
|
|
|
|
}
|
|
|
|
if (params->flags & WPA_DRIVER_MESH_FLAG_AMPE)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_MESH_SETUP_USERSPACE_AMPE);
|
|
|
|
if (params->flags & WPA_DRIVER_MESH_FLAG_USER_MPM)
|
|
|
|
NLA_PUT_FLAG(msg, NL80211_MESH_SETUP_USERSPACE_MPM);
|
|
|
|
nla_nest_end(msg, container);
|
|
|
|
|
|
|
|
container = nla_nest_start(msg, NL80211_ATTR_MESH_CONFIG);
|
|
|
|
if (!container)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
if (!(params->conf.flags & WPA_DRIVER_MESH_CONF_FLAG_AUTO_PLINKS))
|
|
|
|
NLA_PUT_U32(msg, NL80211_MESHCONF_AUTO_OPEN_PLINKS, 0);
|
|
|
|
nla_nest_end(msg, container);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: mesh join failed: ret=%d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
bss->freq = params->freq;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: mesh join request send successfully");
|
|
|
|
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int wpa_driver_nl80211_leave_mesh(void *priv)
|
|
|
|
{
|
|
|
|
struct i802_bss *bss = priv;
|
|
|
|
struct wpa_driver_nl80211_data *drv = bss->drv;
|
|
|
|
struct nl_msg *msg;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
msg = nlmsg_alloc();
|
|
|
|
if (!msg)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: mesh leave (ifindex=%d)", drv->ifindex);
|
|
|
|
nl80211_cmd(drv, msg, 0, NL80211_CMD_LEAVE_MESH);
|
|
|
|
NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
|
|
|
|
|
|
|
|
ret = send_and_recv_msgs(drv, msg, NULL, NULL);
|
|
|
|
msg = NULL;
|
|
|
|
if (ret) {
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: mesh leave failed: ret=%d (%s)",
|
|
|
|
ret, strerror(-ret));
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
wpa_printf(MSG_DEBUG, "nl80211: mesh leave request send successfully");
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
nlmsg_free(msg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_MESH */
|
|
|
|
|
|
|
|
|
2008-06-06 09:55:42 -04:00
|
|
|
const struct wpa_driver_ops wpa_driver_nl80211_ops = {
|
|
|
|
.name = "nl80211",
|
|
|
|
.desc = "Linux nl80211/cfg80211",
|
|
|
|
.get_bssid = wpa_driver_nl80211_get_bssid,
|
|
|
|
.get_ssid = wpa_driver_nl80211_get_ssid,
|
2013-02-03 08:46:47 -05:00
|
|
|
.set_key = driver_nl80211_set_key,
|
|
|
|
.scan2 = driver_nl80211_scan2,
|
2011-09-27 15:21:30 -04:00
|
|
|
.sched_scan = wpa_driver_nl80211_sched_scan,
|
|
|
|
.stop_sched_scan = wpa_driver_nl80211_stop_sched_scan,
|
2008-06-06 09:55:42 -04:00
|
|
|
.get_scan_results2 = wpa_driver_nl80211_get_scan_results,
|
2013-02-03 08:46:47 -05:00
|
|
|
.deauthenticate = driver_nl80211_deauthenticate,
|
|
|
|
.authenticate = driver_nl80211_authenticate,
|
2008-06-06 09:55:42 -04:00
|
|
|
.associate = wpa_driver_nl80211_associate,
|
2010-11-26 11:14:51 -05:00
|
|
|
.global_init = nl80211_global_init,
|
|
|
|
.global_deinit = nl80211_global_deinit,
|
|
|
|
.init2 = wpa_driver_nl80211_init,
|
2013-02-03 08:46:47 -05:00
|
|
|
.deinit = driver_nl80211_deinit,
|
2008-06-06 09:55:42 -04:00
|
|
|
.get_capa = wpa_driver_nl80211_get_capa,
|
|
|
|
.set_operstate = wpa_driver_nl80211_set_operstate,
|
2009-05-14 14:54:47 -04:00
|
|
|
.set_supp_port = wpa_driver_nl80211_set_supp_port,
|
2008-12-09 15:11:14 -05:00
|
|
|
.set_country = wpa_driver_nl80211_set_country,
|
2013-11-03 09:33:11 -05:00
|
|
|
.get_country = wpa_driver_nl80211_get_country,
|
2011-08-10 06:22:37 -04:00
|
|
|
.set_ap = wpa_driver_nl80211_set_ap,
|
2013-05-23 07:38:20 -04:00
|
|
|
.set_acl = wpa_driver_nl80211_set_acl,
|
2009-12-09 09:49:28 -05:00
|
|
|
.if_add = wpa_driver_nl80211_if_add,
|
2013-02-03 08:46:47 -05:00
|
|
|
.if_remove = driver_nl80211_if_remove,
|
|
|
|
.send_mlme = driver_nl80211_send_mlme,
|
2009-04-09 07:11:39 -04:00
|
|
|
.get_hw_feature_data = wpa_driver_nl80211_get_hw_feature_data,
|
2009-04-17 13:09:20 -04:00
|
|
|
.sta_add = wpa_driver_nl80211_sta_add,
|
2013-02-03 08:46:47 -05:00
|
|
|
.sta_remove = driver_nl80211_sta_remove,
|
2009-04-20 09:27:45 -04:00
|
|
|
.hapd_send_eapol = wpa_driver_nl80211_hapd_send_eapol,
|
2009-04-20 09:33:13 -04:00
|
|
|
.sta_set_flags = wpa_driver_nl80211_sta_set_flags,
|
2009-04-09 06:40:12 -04:00
|
|
|
.hapd_init = i802_init,
|
|
|
|
.hapd_deinit = i802_deinit,
|
2011-05-27 11:54:36 -04:00
|
|
|
.set_wds_sta = i802_set_wds_sta,
|
2009-04-09 06:40:12 -04:00
|
|
|
.get_seqnum = i802_get_seqnum,
|
|
|
|
.flush = i802_flush,
|
|
|
|
.get_inact_sec = i802_get_inact_sec,
|
|
|
|
.sta_clear_stats = i802_sta_clear_stats,
|
|
|
|
.set_rts = i802_set_rts,
|
|
|
|
.set_frag = i802_set_frag,
|
|
|
|
.set_tx_queue_params = i802_set_tx_queue_params,
|
2013-02-03 08:46:47 -05:00
|
|
|
.set_sta_vlan = driver_nl80211_set_sta_vlan,
|
2011-03-16 10:11:05 -04:00
|
|
|
.sta_deauth = i802_sta_deauth,
|
|
|
|
.sta_disassoc = i802_sta_disassoc,
|
2013-02-03 08:46:47 -05:00
|
|
|
.read_sta_data = driver_nl80211_read_sta_data,
|
2010-04-11 13:36:16 -04:00
|
|
|
.set_freq = i802_set_freq,
|
2013-02-03 08:46:47 -05:00
|
|
|
.send_action = driver_nl80211_send_action,
|
2010-12-29 07:05:34 -05:00
|
|
|
.send_action_cancel_wait = wpa_driver_nl80211_send_action_cancel_wait,
|
2010-01-03 06:57:51 -05:00
|
|
|
.remain_on_channel = wpa_driver_nl80211_remain_on_channel,
|
|
|
|
.cancel_remain_on_channel =
|
|
|
|
wpa_driver_nl80211_cancel_remain_on_channel,
|
2013-02-03 08:46:47 -05:00
|
|
|
.probe_req_report = driver_nl80211_probe_req_report,
|
2010-01-16 05:20:51 -05:00
|
|
|
.deinit_ap = wpa_driver_nl80211_deinit_ap,
|
2012-04-01 14:41:23 -04:00
|
|
|
.deinit_p2p_cli = wpa_driver_nl80211_deinit_p2p_cli,
|
2010-02-27 11:46:02 -05:00
|
|
|
.resume = wpa_driver_nl80211_resume,
|
2010-03-07 15:47:39 -05:00
|
|
|
.send_ft_action = nl80211_send_ft_action,
|
2010-03-28 18:31:04 -04:00
|
|
|
.signal_monitor = nl80211_signal_monitor,
|
2011-03-31 10:56:48 -04:00
|
|
|
.signal_poll = nl80211_signal_poll,
|
2010-03-29 15:01:40 -04:00
|
|
|
.send_frame = nl80211_send_frame,
|
2011-11-19 04:23:49 -05:00
|
|
|
.shared_freq = wpa_driver_nl80211_shared_freq,
|
2010-11-26 08:54:53 -05:00
|
|
|
.set_param = nl80211_set_param,
|
2010-11-26 14:46:30 -05:00
|
|
|
.get_radio_name = nl80211_get_radio_name,
|
2011-06-20 03:17:33 -04:00
|
|
|
.add_pmkid = nl80211_add_pmkid,
|
|
|
|
.remove_pmkid = nl80211_remove_pmkid,
|
|
|
|
.flush_pmkid = nl80211_flush_pmkid,
|
2011-07-12 14:22:51 -04:00
|
|
|
.set_rekey_info = nl80211_set_rekey_info,
|
2011-10-20 14:03:08 -04:00
|
|
|
.poll_client = nl80211_poll_client,
|
2011-11-25 06:11:22 -05:00
|
|
|
.set_p2p_powersave = nl80211_set_p2p_powersave,
|
2013-05-09 13:05:01 -04:00
|
|
|
.start_dfs_cac = nl80211_start_radar_detection,
|
2013-05-09 13:06:33 -04:00
|
|
|
.stop_ap = wpa_driver_nl80211_stop_ap,
|
2011-10-23 06:59:00 -04:00
|
|
|
#ifdef CONFIG_TDLS
|
|
|
|
.send_tdls_mgmt = nl80211_send_tdls_mgmt,
|
|
|
|
.tdls_oper = nl80211_tdls_oper,
|
|
|
|
#endif /* CONFIG_TDLS */
|
2013-03-12 14:08:53 -04:00
|
|
|
.update_ft_ies = wpa_driver_nl80211_update_ft_ies,
|
2013-06-25 06:50:21 -04:00
|
|
|
.get_mac_addr = wpa_driver_nl80211_get_macaddr,
|
2013-07-24 02:59:13 -04:00
|
|
|
.get_survey = wpa_driver_nl80211_get_survey,
|
2013-09-28 10:19:30 -04:00
|
|
|
.status = wpa_driver_nl80211_status,
|
2013-11-14 05:28:30 -05:00
|
|
|
.switch_channel = nl80211_switch_channel,
|
2013-11-07 09:18:44 -05:00
|
|
|
#ifdef ANDROID_P2P
|
|
|
|
.set_noa = wpa_driver_set_p2p_noa,
|
|
|
|
.get_noa = wpa_driver_get_p2p_noa,
|
|
|
|
.set_ap_wps_ie = wpa_driver_set_ap_wps_p2p_ie,
|
|
|
|
#endif /* ANDROID_P2P */
|
2013-11-07 09:16:15 -05:00
|
|
|
#ifdef ANDROID
|
|
|
|
.driver_cmd = wpa_driver_nl80211_driver_cmd,
|
|
|
|
#endif /* ANDROID */
|
2014-03-03 06:09:50 -05:00
|
|
|
.vendor_cmd = nl80211_vendor_cmd,
|
2013-10-09 18:41:10 -04:00
|
|
|
.set_qos_map = nl80211_set_qos_map,
|
2014-04-24 01:45:39 -04:00
|
|
|
.set_wowlan = nl80211_set_wowlan,
|
2014-09-11 08:54:57 -04:00
|
|
|
.roaming = nl80211_roaming,
|
2014-09-27 12:11:24 -04:00
|
|
|
.set_mac_addr = nl80211_set_mac_addr,
|
2014-09-01 00:23:23 -04:00
|
|
|
#ifdef CONFIG_MESH
|
|
|
|
.init_mesh = wpa_driver_nl80211_init_mesh,
|
|
|
|
.join_mesh = wpa_driver_nl80211_join_mesh,
|
|
|
|
.leave_mesh = wpa_driver_nl80211_leave_mesh,
|
|
|
|
#endif /* CONFIG_MESH */
|
2008-06-06 09:55:42 -04:00
|
|
|
};
|