]> git.ipfire.org Git - thirdparty/hostap.git/blame - src/drivers/driver_nl80211.c
mesh: Document Mesh Peering Management element structure in more detail
[thirdparty/hostap.git] / src / drivers / driver_nl80211.c
CommitLineData
3f5285e8 1/*
c5121837 2 * Driver interaction with Linux nl80211/cfg80211
98cd3d1c 3 * Copyright (c) 2002-2015, Jouni Malinen <j@w1.fi>
072ad14c
JM
4 * Copyright (c) 2003-2004, Instant802 Networks, Inc.
5 * Copyright (c) 2005-2006, Devicescape Software, Inc.
6 * Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
58f6fbe0 7 * Copyright (c) 2009-2010, Atheros Communications
3f5285e8 8 *
0f3d578e
JM
9 * This software may be distributed under the terms of the BSD license.
10 * See README for more details.
3f5285e8
JM
11 */
12
13#include "includes.h"
6859f1cb 14#include <sys/types.h>
73d2294f 15#include <fcntl.h>
37b7d082 16#include <net/if.h>
3f5285e8 17#include <netlink/genl/genl.h>
3f5285e8 18#include <netlink/genl/ctrl.h>
97ed9a06
KP
19#ifdef CONFIG_LIBNL3_ROUTE
20#include <netlink/route/neighbour.h>
21#endif /* CONFIG_LIBNL3_ROUTE */
8602b0f2 22#include <linux/rtnetlink.h>
1b648c7e 23#include <netpacket/packet.h>
32ab4855 24#include <linux/errqueue.h>
625f587b 25
3f5285e8 26#include "common.h"
1b648c7e 27#include "eloop.h"
1682c623 28#include "common/qca-vendor.h"
a26582cb 29#include "common/qca-vendor-attr.h"
1b648c7e 30#include "common/ieee802_11_defs.h"
9b90955e 31#include "common/ieee802_11_common.h"
f10bfc9a 32#include "l2_packet/l2_packet.h"
e2d02c29 33#include "netlink.h"
1474e6e9 34#include "linux_defines.h"
34f2f814 35#include "linux_ioctl.h"
e2d02c29
JM
36#include "radiotap.h"
37#include "radiotap_iter.h"
8401a6b0 38#include "rfkill.h"
1474e6e9 39#include "driver_nl80211.h"
32ab4855 40
1474e6e9
JM
41
42#ifndef CONFIG_LIBNL20
a65a9aed
JB
43/*
44 * libnl 1.1 has a bug, it tries to allocate socket numbers densely
45 * but when you free a socket again it will mess up its bitmap and
46 * and use the wrong number the next time it needs a socket ID.
47 * Therefore, we wrap the handle alloc/destroy and add our own pid
48 * accounting.
49 */
50static uint32_t port_bitmap[32] = { 0 };
51
52static struct nl_handle *nl80211_handle_alloc(void *cb)
53{
54 struct nl_handle *handle;
55 uint32_t pid = getpid() & 0x3FFFFF;
56 int i;
57
58 handle = nl_handle_alloc_cb(cb);
59
60 for (i = 0; i < 1024; i++) {
61 if (port_bitmap[i / 32] & (1 << (i % 32)))
62 continue;
63 port_bitmap[i / 32] |= 1 << (i % 32);
64 pid += i << 22;
65 break;
66 }
67
68 nl_socket_set_local_port(handle, pid);
69
70 return handle;
71}
72
73static void nl80211_handle_destroy(struct nl_handle *handle)
74{
75 uint32_t port = nl_socket_get_local_port(handle);
76
77 port >>= 22;
78 port_bitmap[port / 32] &= ~(1 << (port % 32));
79
80 nl_handle_destroy(handle);
81}
c5121837
JM
82#endif /* CONFIG_LIBNL20 */
83
c5121837 84
1c6edec6
JM
85#ifdef ANDROID
86/* system/core/libnl_2 does not include nl_socket_set_nonblocking() */
1c6edec6
JM
87#undef nl_socket_set_nonblocking
88#define nl_socket_set_nonblocking(h) android_nl_socket_set_nonblocking(h)
70a96c81 89
1c6edec6
JM
90#endif /* ANDROID */
91
92
481234cf 93static struct nl_handle * nl_create_handle(struct nl_cb *cb, const char *dbg)
a92dfde8 94{
481234cf 95 struct nl_handle *handle;
a92dfde8 96
481234cf
JM
97 handle = nl80211_handle_alloc(cb);
98 if (handle == NULL) {
a92dfde8
JB
99 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
100 "callbacks (%s)", dbg);
481234cf 101 return NULL;
a92dfde8
JB
102 }
103
481234cf 104 if (genl_connect(handle)) {
a92dfde8
JB
105 wpa_printf(MSG_ERROR, "nl80211: Failed to connect to generic "
106 "netlink (%s)", dbg);
481234cf
JM
107 nl80211_handle_destroy(handle);
108 return NULL;
a92dfde8
JB
109 }
110
481234cf 111 return handle;
a92dfde8
JB
112}
113
114
481234cf 115static void nl_destroy_handles(struct nl_handle **handle)
a92dfde8 116{
481234cf 117 if (*handle == NULL)
a92dfde8 118 return;
481234cf
JM
119 nl80211_handle_destroy(*handle);
120 *handle = NULL;
a92dfde8
JB
121}
122
123
10b85921
JB
124#if __WORDSIZE == 64
125#define ELOOP_SOCKET_INVALID (intptr_t) 0x8888888888888889ULL
126#else
127#define ELOOP_SOCKET_INVALID (intptr_t) 0x88888889ULL
128#endif
129
5f65e9f7
JB
130static void nl80211_register_eloop_read(struct nl_handle **handle,
131 eloop_sock_handler handler,
132 void *eloop_data)
133{
fa38860c 134#ifdef CONFIG_LIBNL20
630b3230
JM
135 /*
136 * libnl uses a pretty small buffer (32 kB that gets converted to 64 kB)
137 * by default. It is possible to hit that limit in some cases where
138 * operations are blocked, e.g., with a burst of Deauthentication frames
139 * to hostapd and STA entry deletion. Try to increase the buffer to make
140 * this less likely to occur.
141 */
142 if (nl_socket_set_buffer_size(*handle, 262144, 0) < 0) {
143 wpa_printf(MSG_DEBUG,
144 "nl80211: Could not set nl_socket RX buffer size: %s",
145 strerror(errno));
146 /* continue anyway with the default (smaller) buffer */
147 }
fa38860c 148#endif /* CONFIG_LIBNL20 */
630b3230 149
10b85921 150 nl_socket_set_nonblocking(*handle);
5f65e9f7
JB
151 eloop_register_read_sock(nl_socket_get_fd(*handle), handler,
152 eloop_data, *handle);
10b85921 153 *handle = (void *) (((intptr_t) *handle) ^ ELOOP_SOCKET_INVALID);
5f65e9f7
JB
154}
155
156
157static void nl80211_destroy_eloop_handle(struct nl_handle **handle)
158{
10b85921 159 *handle = (void *) (((intptr_t) *handle) ^ ELOOP_SOCKET_INVALID);
5f65e9f7
JB
160 eloop_unregister_read_sock(nl_socket_get_fd(*handle));
161 nl_destroy_handles(handle);
162}
163
164
36d84860 165static void nl80211_global_deinit(void *priv);
f51f54a0 166static void nl80211_check_global(struct nl80211_global *global);
36d84860 167
9ebce9c5 168static void wpa_driver_nl80211_deinit(struct i802_bss *bss);
4ec68377
JD
169static int wpa_driver_nl80211_set_mode_ibss(struct i802_bss *bss,
170 struct hostapd_freq_params *freq);
3c5d34e3 171
362f781e 172static int
0d547d5f 173wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
0ecff8d7
JM
174 const u8 *set_addr, int first,
175 const char *driver_params);
88df0ef7 176static int nl80211_send_frame_cmd(struct i802_bss *bss,
5dfca53f 177 unsigned int freq, unsigned int wait,
b106173a 178 const u8 *buf, size_t buf_len, u64 *cookie,
2d3943ce
AO
179 int no_cck, int no_ack, int offchanok,
180 const u16 *csa_offs, size_t csa_offs_len);
9ebce9c5
JM
181static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss,
182 int report);
0915d02c 183
2135f224
JM
184static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
185static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
97cfcf64 186static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
072ad14c 187
e87ef751
PX
188static int nl80211_set_channel(struct i802_bss *bss,
189 struct hostapd_freq_params *freq, int set_chan);
4e5cb1a3
JM
190static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
191 int ifindex, int disabled);
504e905c 192
666e508c
JM
193static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv,
194 int reset_mode);
21bdbe38 195
bf83eab5 196static int i802_set_iface_flags(struct i802_bss *bss, int up);
0ecff8d7 197static int nl80211_set_param(void *priv, const char *param);
bf83eab5 198
3f5285e8 199
8d1fdde7 200/* Converts nl80211_chan_width to a common format */
f3407c66 201enum chan_width convert2width(int width)
8d1fdde7
JD
202{
203 switch (width) {
204 case NL80211_CHAN_WIDTH_20_NOHT:
205 return CHAN_WIDTH_20_NOHT;
206 case NL80211_CHAN_WIDTH_20:
207 return CHAN_WIDTH_20;
208 case NL80211_CHAN_WIDTH_40:
209 return CHAN_WIDTH_40;
210 case NL80211_CHAN_WIDTH_80:
211 return CHAN_WIDTH_80;
212 case NL80211_CHAN_WIDTH_80P80:
213 return CHAN_WIDTH_80P80;
214 case NL80211_CHAN_WIDTH_160:
215 return CHAN_WIDTH_160;
216 }
217 return CHAN_WIDTH_UNKNOWN;
218}
219
220
f3407c66 221int is_ap_interface(enum nl80211_iftype nlmode)
b1f625e0 222{
0e80ea2c
JM
223 return nlmode == NL80211_IFTYPE_AP ||
224 nlmode == NL80211_IFTYPE_P2P_GO;
b1f625e0
EP
225}
226
227
477af8f8 228int is_sta_interface(enum nl80211_iftype nlmode)
b1f625e0 229{
0e80ea2c
JM
230 return nlmode == NL80211_IFTYPE_STATION ||
231 nlmode == NL80211_IFTYPE_P2P_CLIENT;
b1f625e0
EP
232}
233
234
6a71413e 235static int is_p2p_net_interface(enum nl80211_iftype nlmode)
b3af99d2 236{
0e80ea2c
JM
237 return nlmode == NL80211_IFTYPE_P2P_CLIENT ||
238 nlmode == NL80211_IFTYPE_P2P_GO;
b3af99d2
JM
239}
240
241
f3407c66
JM
242struct i802_bss * get_bss_ifindex(struct wpa_driver_nl80211_data *drv,
243 int ifindex)
5dfbd725
JM
244{
245 struct i802_bss *bss;
246
247 for (bss = drv->first_bss; bss; bss = bss->next) {
248 if (bss->ifindex == ifindex)
249 return bss;
250 }
251
252 return NULL;
253}
254
255
afb0550a
BC
256static int is_mesh_interface(enum nl80211_iftype nlmode)
257{
258 return nlmode == NL80211_IFTYPE_MESH_POINT;
259}
260
261
f3407c66 262void nl80211_mark_disconnected(struct wpa_driver_nl80211_data *drv)
add9b7a4
JM
263{
264 if (drv->associated)
265 os_memcpy(drv->prev_bssid, drv->bssid, ETH_ALEN);
266 drv->associated = 0;
267 os_memset(drv->bssid, 0, ETH_ALEN);
268}
269
270
6241fcb1
JM
271/* nl80211 code */
272static int ack_handler(struct nl_msg *msg, void *arg)
273{
274 int *err = arg;
275 *err = 0;
276 return NL_STOP;
277}
278
279static int finish_handler(struct nl_msg *msg, void *arg)
280{
8e8df255
JM
281 int *ret = arg;
282 *ret = 0;
6241fcb1
JM
283 return NL_SKIP;
284}
285
286static int error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err,
287 void *arg)
288{
289 int *ret = arg;
290 *ret = err->error;
291 return NL_SKIP;
292}
293
5b7b85f6
JM
294
295static int no_seq_check(struct nl_msg *msg, void *arg)
296{
297 return NL_OK;
298}
299
300
bbd89bfc
JM
301static void nl80211_nlmsg_clear(struct nl_msg *msg)
302{
303 /*
304 * Clear nlmsg data, e.g., to make sure key material is not left in
305 * heap memory for unnecessarily long time.
306 */
307 if (msg) {
308 struct nlmsghdr *hdr = nlmsg_hdr(msg);
309 void *data = nlmsg_data(hdr);
d58ade21
JM
310 /*
311 * This would use nlmsg_datalen() or the older nlmsg_len() if
312 * only libnl were to maintain a stable API.. Neither will work
313 * with all released versions, so just calculate the length
314 * here.
315 */
316 int len = hdr->nlmsg_len - NLMSG_HDRLEN;
bbd89bfc
JM
317
318 os_memset(data, 0, len);
319 }
320}
321
322
d6c9aab8 323static int send_and_recv(struct nl80211_global *global,
58f6fbe0
JM
324 struct nl_handle *nl_handle, struct nl_msg *msg,
325 int (*valid_handler)(struct nl_msg *, void *),
326 void *valid_data)
6241fcb1
JM
327{
328 struct nl_cb *cb;
329 int err = -ENOMEM;
330
9725b784
JM
331 if (!msg)
332 return -ENOMEM;
333
d6c9aab8 334 cb = nl_cb_clone(global->nl_cb);
6241fcb1
JM
335 if (!cb)
336 goto out;
337
58f6fbe0 338 err = nl_send_auto_complete(nl_handle, msg);
6241fcb1
JM
339 if (err < 0)
340 goto out;
341
342 err = 1;
343
344 nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &err);
8e8df255 345 nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, &err);
6241fcb1
JM
346 nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, ack_handler, &err);
347
348 if (valid_handler)
349 nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM,
350 valid_handler, valid_data);
351
34068ac3
JM
352 while (err > 0) {
353 int res = nl_recvmsgs(nl_handle, cb);
d3d04831 354 if (res < 0) {
34068ac3
JM
355 wpa_printf(MSG_INFO,
356 "nl80211: %s->nl_recvmsgs failed: %d",
357 __func__, res);
358 }
359 }
6241fcb1
JM
360 out:
361 nl_cb_put(cb);
bbd89bfc
JM
362 if (!valid_handler && valid_data == (void *) -1)
363 nl80211_nlmsg_clear(msg);
6241fcb1
JM
364 nlmsg_free(msg);
365 return err;
366}
367
368
f3407c66
JM
369int send_and_recv_msgs(struct wpa_driver_nl80211_data *drv,
370 struct nl_msg *msg,
371 int (*valid_handler)(struct nl_msg *, void *),
372 void *valid_data)
58f6fbe0 373{
481234cf 374 return send_and_recv(drv->global, drv->global->nl, msg,
d6c9aab8 375 valid_handler, valid_data);
58f6fbe0
JM
376}
377
378
97865538
JM
379struct family_data {
380 const char *group;
381 int id;
382};
383
384
385static int family_handler(struct nl_msg *msg, void *arg)
386{
387 struct family_data *res = arg;
388 struct nlattr *tb[CTRL_ATTR_MAX + 1];
389 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
390 struct nlattr *mcgrp;
391 int i;
392
393 nla_parse(tb, CTRL_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
394 genlmsg_attrlen(gnlh, 0), NULL);
395 if (!tb[CTRL_ATTR_MCAST_GROUPS])
396 return NL_SKIP;
397
398 nla_for_each_nested(mcgrp, tb[CTRL_ATTR_MCAST_GROUPS], i) {
399 struct nlattr *tb2[CTRL_ATTR_MCAST_GRP_MAX + 1];
400 nla_parse(tb2, CTRL_ATTR_MCAST_GRP_MAX, nla_data(mcgrp),
401 nla_len(mcgrp), NULL);
402 if (!tb2[CTRL_ATTR_MCAST_GRP_NAME] ||
403 !tb2[CTRL_ATTR_MCAST_GRP_ID] ||
404 os_strncmp(nla_data(tb2[CTRL_ATTR_MCAST_GRP_NAME]),
405 res->group,
406 nla_len(tb2[CTRL_ATTR_MCAST_GRP_NAME])) != 0)
407 continue;
408 res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]);
409 break;
410 };
411
412 return NL_SKIP;
413}
414
415
d6c9aab8 416static int nl_get_multicast_id(struct nl80211_global *global,
97865538
JM
417 const char *family, const char *group)
418{
419 struct nl_msg *msg;
a862e4a3 420 int ret;
97865538
JM
421 struct family_data res = { group, -ENOENT };
422
423 msg = nlmsg_alloc();
424 if (!msg)
425 return -ENOMEM;
a862e4a3
JM
426 if (!genlmsg_put(msg, 0, 0, genl_ctrl_resolve(global->nl, "nlctrl"),
427 0, 0, CTRL_CMD_GETFAMILY, 0) ||
428 nla_put_string(msg, CTRL_ATTR_FAMILY_NAME, family)) {
429 nlmsg_free(msg);
430 return -1;
431 }
97865538 432
1033315f 433 ret = send_and_recv(global, global->nl, msg, family_handler, &res);
97865538
JM
434 if (ret == 0)
435 ret = res.id;
97865538
JM
436 return ret;
437}
438
439
f3407c66
JM
440void * nl80211_cmd(struct wpa_driver_nl80211_data *drv,
441 struct nl_msg *msg, int flags, uint8_t cmd)
9fb04070 442{
335d42b1 443 return genlmsg_put(msg, 0, 0, drv->global->nl80211_id,
276e2d67 444 0, flags, cmd, 0);
9fb04070
JM
445}
446
447
350acc35
JM
448static int nl80211_set_iface_id(struct nl_msg *msg, struct i802_bss *bss)
449{
450 if (bss->wdev_id_set)
451 return nla_put_u64(msg, NL80211_ATTR_WDEV, bss->wdev_id);
452 return nla_put_u32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
453}
454
455
07c7757c
JM
456struct nl_msg * nl80211_cmd_msg(struct i802_bss *bss, int flags, uint8_t cmd)
457{
458 struct nl_msg *msg;
459
460 msg = nlmsg_alloc();
461 if (!msg)
462 return NULL;
463
464 if (!nl80211_cmd(bss->drv, msg, flags, cmd) ||
465 nl80211_set_iface_id(msg, bss) < 0) {
466 nlmsg_free(msg);
467 return NULL;
468 }
469
470 return msg;
471}
472
473
474static struct nl_msg *
475nl80211_ifindex_msg(struct wpa_driver_nl80211_data *drv, int ifindex,
476 int flags, uint8_t cmd)
477{
478 struct nl_msg *msg;
479
480 msg = nlmsg_alloc();
481 if (!msg)
482 return NULL;
483
484 if (!nl80211_cmd(drv, msg, flags, cmd) ||
485 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex)) {
486 nlmsg_free(msg);
487 return NULL;
488 }
489
490 return msg;
491}
492
493
494struct nl_msg * nl80211_drv_msg(struct wpa_driver_nl80211_data *drv, int flags,
495 uint8_t cmd)
496{
497 return nl80211_ifindex_msg(drv, drv->ifindex, flags, cmd);
498}
499
500
501struct nl_msg * nl80211_bss_msg(struct i802_bss *bss, int flags, uint8_t cmd)
502{
503 return nl80211_ifindex_msg(bss->drv, bss->ifindex, flags, cmd);
504}
505
506
e32ad281
JB
507struct wiphy_idx_data {
508 int wiphy_idx;
01517c8b 509 enum nl80211_iftype nlmode;
597b94f5 510 u8 *macaddr;
e32ad281
JB
511};
512
513
514static int netdev_info_handler(struct nl_msg *msg, void *arg)
515{
516 struct nlattr *tb[NL80211_ATTR_MAX + 1];
517 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
518 struct wiphy_idx_data *info = arg;
519
520 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
521 genlmsg_attrlen(gnlh, 0), NULL);
522
523 if (tb[NL80211_ATTR_WIPHY])
524 info->wiphy_idx = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
525
01517c8b
JB
526 if (tb[NL80211_ATTR_IFTYPE])
527 info->nlmode = nla_get_u32(tb[NL80211_ATTR_IFTYPE]);
528
597b94f5
AS
529 if (tb[NL80211_ATTR_MAC] && info->macaddr)
530 os_memcpy(info->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
531 ETH_ALEN);
532
e32ad281
JB
533 return NL_SKIP;
534}
535
536
f3407c66 537int nl80211_get_wiphy_index(struct i802_bss *bss)
e32ad281
JB
538{
539 struct nl_msg *msg;
540 struct wiphy_idx_data data = {
541 .wiphy_idx = -1,
597b94f5 542 .macaddr = NULL,
e32ad281
JB
543 };
544
56f77852 545 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
a862e4a3 546 return -1;
e32ad281
JB
547
548 if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data) == 0)
549 return data.wiphy_idx;
e32ad281
JB
550 return -1;
551}
552
553
01517c8b
JB
554static enum nl80211_iftype nl80211_get_ifmode(struct i802_bss *bss)
555{
556 struct nl_msg *msg;
557 struct wiphy_idx_data data = {
597b94f5
AS
558 .nlmode = NL80211_IFTYPE_UNSPECIFIED,
559 .macaddr = NULL,
01517c8b
JB
560 };
561
56f77852 562 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
a862e4a3 563 return NL80211_IFTYPE_UNSPECIFIED;
01517c8b
JB
564
565 if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data) == 0)
566 return data.nlmode;
01517c8b
JB
567 return NL80211_IFTYPE_UNSPECIFIED;
568}
01517c8b
JB
569
570
597b94f5
AS
571static int nl80211_get_macaddr(struct i802_bss *bss)
572{
573 struct nl_msg *msg;
574 struct wiphy_idx_data data = {
575 .macaddr = bss->addr,
576 };
577
56f77852 578 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
a862e4a3 579 return -1;
597b94f5 580
597b94f5 581 return send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data);
597b94f5 582}
597b94f5
AS
583
584
e32ad281
JB
585static int nl80211_register_beacons(struct wpa_driver_nl80211_data *drv,
586 struct nl80211_wiphy_data *w)
587{
588 struct nl_msg *msg;
a862e4a3 589 int ret;
e32ad281
JB
590
591 msg = nlmsg_alloc();
592 if (!msg)
593 return -1;
594
a862e4a3
JM
595 if (!nl80211_cmd(drv, msg, 0, NL80211_CMD_REGISTER_BEACONS) ||
596 nla_put_u32(msg, NL80211_ATTR_WIPHY, w->wiphy_idx)) {
597 nlmsg_free(msg);
598 return -1;
599 }
e32ad281 600
481234cf 601 ret = send_and_recv(drv->global, w->nl_beacons, msg, NULL, NULL);
e32ad281
JB
602 if (ret) {
603 wpa_printf(MSG_DEBUG, "nl80211: Register beacons command "
604 "failed: ret=%d (%s)",
605 ret, strerror(-ret));
e32ad281 606 }
e32ad281
JB
607 return ret;
608}
609
610
611static void nl80211_recv_beacons(int sock, void *eloop_ctx, void *handle)
612{
613 struct nl80211_wiphy_data *w = eloop_ctx;
34068ac3 614 int res;
e32ad281 615
ee9fc67a 616 wpa_printf(MSG_EXCESSIVE, "nl80211: Beacon event message available");
e32ad281 617
34068ac3 618 res = nl_recvmsgs(handle, w->nl_cb);
d3d04831 619 if (res < 0) {
34068ac3
JM
620 wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
621 __func__, res);
622 }
e32ad281
JB
623}
624
625
626static int process_beacon_event(struct nl_msg *msg, void *arg)
627{
628 struct nl80211_wiphy_data *w = arg;
629 struct wpa_driver_nl80211_data *drv;
630 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
631 struct nlattr *tb[NL80211_ATTR_MAX + 1];
632 union wpa_event_data event;
633
634 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
635 genlmsg_attrlen(gnlh, 0), NULL);
636
637 if (gnlh->cmd != NL80211_CMD_FRAME) {
638 wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)",
639 gnlh->cmd);
640 return NL_SKIP;
641 }
642
643 if (!tb[NL80211_ATTR_FRAME])
644 return NL_SKIP;
645
646 dl_list_for_each(drv, &w->drvs, struct wpa_driver_nl80211_data,
647 wiphy_list) {
648 os_memset(&event, 0, sizeof(event));
649 event.rx_mgmt.frame = nla_data(tb[NL80211_ATTR_FRAME]);
650 event.rx_mgmt.frame_len = nla_len(tb[NL80211_ATTR_FRAME]);
651 wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
652 }
653
654 return NL_SKIP;
655}
656
657
658static struct nl80211_wiphy_data *
659nl80211_get_wiphy_data_ap(struct i802_bss *bss)
660{
661 static DEFINE_DL_LIST(nl80211_wiphys);
662 struct nl80211_wiphy_data *w;
663 int wiphy_idx, found = 0;
664 struct i802_bss *tmp_bss;
665
666 if (bss->wiphy_data != NULL)
667 return bss->wiphy_data;
668
669 wiphy_idx = nl80211_get_wiphy_index(bss);
670
671 dl_list_for_each(w, &nl80211_wiphys, struct nl80211_wiphy_data, list) {
672 if (w->wiphy_idx == wiphy_idx)
673 goto add;
674 }
675
676 /* alloc new one */
677 w = os_zalloc(sizeof(*w));
678 if (w == NULL)
679 return NULL;
680 w->wiphy_idx = wiphy_idx;
681 dl_list_init(&w->bsss);
682 dl_list_init(&w->drvs);
683
684 w->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
685 if (!w->nl_cb) {
686 os_free(w);
687 return NULL;
688 }
689 nl_cb_set(w->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL);
690 nl_cb_set(w->nl_cb, NL_CB_VALID, NL_CB_CUSTOM, process_beacon_event,
691 w);
692
481234cf
JM
693 w->nl_beacons = nl_create_handle(bss->drv->global->nl_cb,
694 "wiphy beacons");
695 if (w->nl_beacons == NULL) {
e32ad281
JB
696 os_free(w);
697 return NULL;
698 }
699
700 if (nl80211_register_beacons(bss->drv, w)) {
701 nl_destroy_handles(&w->nl_beacons);
702 os_free(w);
703 return NULL;
704 }
705
5f65e9f7 706 nl80211_register_eloop_read(&w->nl_beacons, nl80211_recv_beacons, w);
e32ad281
JB
707
708 dl_list_add(&nl80211_wiphys, &w->list);
709
710add:
711 /* drv entry for this bss already there? */
712 dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
713 if (tmp_bss->drv == bss->drv) {
714 found = 1;
715 break;
716 }
717 }
718 /* if not add it */
719 if (!found)
720 dl_list_add(&w->drvs, &bss->drv->wiphy_list);
721
722 dl_list_add(&w->bsss, &bss->wiphy_list);
723 bss->wiphy_data = w;
724 return w;
725}
726
727
728static void nl80211_put_wiphy_data_ap(struct i802_bss *bss)
729{
730 struct nl80211_wiphy_data *w = bss->wiphy_data;
731 struct i802_bss *tmp_bss;
732 int found = 0;
733
734 if (w == NULL)
735 return;
736 bss->wiphy_data = NULL;
737 dl_list_del(&bss->wiphy_list);
738
739 /* still any for this drv present? */
740 dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
741 if (tmp_bss->drv == bss->drv) {
742 found = 1;
743 break;
744 }
745 }
746 /* if not remove it */
747 if (!found)
748 dl_list_del(&bss->drv->wiphy_list);
749
750 if (!dl_list_empty(&w->bsss))
751 return;
752
5f65e9f7 753 nl80211_destroy_eloop_handle(&w->nl_beacons);
e32ad281
JB
754
755 nl_cb_put(w->nl_cb);
e32ad281
JB
756 dl_list_del(&w->list);
757 os_free(w);
758}
759
760
3f5285e8
JM
761static int wpa_driver_nl80211_get_bssid(void *priv, u8 *bssid)
762{
a2e40bb6
FF
763 struct i802_bss *bss = priv;
764 struct wpa_driver_nl80211_data *drv = bss->drv;
c2a04078
JM
765 if (!drv->associated)
766 return -1;
767 os_memcpy(bssid, drv->bssid, ETH_ALEN);
768 return 0;
3f5285e8
JM
769}
770
771
3f5285e8
JM
772static int wpa_driver_nl80211_get_ssid(void *priv, u8 *ssid)
773{
a2e40bb6
FF
774 struct i802_bss *bss = priv;
775 struct wpa_driver_nl80211_data *drv = bss->drv;
fd05d64e
JM
776 if (!drv->associated)
777 return -1;
778 os_memcpy(ssid, drv->ssid, drv->ssid_len);
779 return drv->ssid_len;
3f5285e8
JM
780}
781
782
90a545cc 783static void wpa_driver_nl80211_event_newlink(
40e76396 784 struct wpa_driver_nl80211_data *drv, const char *ifname)
3f5285e8
JM
785{
786 union wpa_event_data event;
787
90a545cc
JM
788 if (os_strcmp(drv->first_bss->ifname, ifname) == 0) {
789 if (if_nametoindex(drv->first_bss->ifname) == 0) {
790 wpa_printf(MSG_DEBUG, "nl80211: Interface %s does not exist - ignore RTM_NEWLINK",
791 drv->first_bss->ifname);
792 return;
793 }
794 if (!drv->if_removed)
795 return;
796 wpa_printf(MSG_DEBUG, "nl80211: Mark if_removed=0 for %s based on RTM_NEWLINK event",
797 drv->first_bss->ifname);
798 drv->if_removed = 0;
799 }
800
3f5285e8 801 os_memset(&event, 0, sizeof(event));
90a545cc
JM
802 os_strlcpy(event.interface_status.ifname, ifname,
803 sizeof(event.interface_status.ifname));
804 event.interface_status.ievent = EVENT_INTERFACE_ADDED;
805 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
806}
807
808
809static void wpa_driver_nl80211_event_dellink(
40e76396 810 struct wpa_driver_nl80211_data *drv, const char *ifname)
90a545cc
JM
811{
812 union wpa_event_data event;
813
814 if (os_strcmp(drv->first_bss->ifname, ifname) == 0) {
815 if (drv->if_removed) {
816 wpa_printf(MSG_DEBUG, "nl80211: if_removed already set - ignore RTM_DELLINK event for %s",
817 ifname);
818 return;
d1f4942b 819 }
90a545cc
JM
820 wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed - mark if_removed=1",
821 ifname);
822 drv->if_removed = 1;
823 } else {
824 wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed",
825 ifname);
7524cfb1
JM
826 }
827
90a545cc
JM
828 os_memset(&event, 0, sizeof(event));
829 os_strlcpy(event.interface_status.ifname, ifname,
830 sizeof(event.interface_status.ifname));
831 event.interface_status.ievent = EVENT_INTERFACE_REMOVED;
08063178 832 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
3f5285e8
JM
833}
834
835
7524cfb1 836static int wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data *drv,
62d680c3 837 u8 *buf, size_t len)
7524cfb1 838{
62d680c3 839 int attrlen, rta_len;
7524cfb1
JM
840 struct rtattr *attr;
841
62d680c3
JM
842 attrlen = len;
843 attr = (struct rtattr *) buf;
7524cfb1
JM
844
845 rta_len = RTA_ALIGN(sizeof(struct rtattr));
846 while (RTA_OK(attr, attrlen)) {
847 if (attr->rta_type == IFLA_IFNAME) {
834ee56f
KP
848 if (os_strcmp(((char *) attr) + rta_len,
849 drv->first_bss->ifname) == 0)
7524cfb1
JM
850 return 1;
851 else
852 break;
853 }
854 attr = RTA_NEXT(attr, attrlen);
855 }
856
857 return 0;
858}
859
860
861static int wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data *drv,
62d680c3 862 int ifindex, u8 *buf, size_t len)
7524cfb1
JM
863{
864 if (drv->ifindex == ifindex)
865 return 1;
866
62d680c3 867 if (drv->if_removed && wpa_driver_nl80211_own_ifname(drv, buf, len)) {
f51f54a0 868 nl80211_check_global(drv->global);
7524cfb1
JM
869 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
870 "interface");
0ecff8d7 871 wpa_driver_nl80211_finish_drv_init(drv, NULL, 0, NULL);
7524cfb1
JM
872 return 1;
873 }
874
875 return 0;
876}
877
878
36d84860
BG
879static struct wpa_driver_nl80211_data *
880nl80211_find_drv(struct nl80211_global *global, int idx, u8 *buf, size_t len)
881{
882 struct wpa_driver_nl80211_data *drv;
883 dl_list_for_each(drv, &global->interfaces,
884 struct wpa_driver_nl80211_data, list) {
885 if (wpa_driver_nl80211_own_ifindex(drv, idx, buf, len) ||
886 have_ifidx(drv, idx))
887 return drv;
888 }
889 return NULL;
890}
891
892
62d680c3
JM
893static void wpa_driver_nl80211_event_rtm_newlink(void *ctx,
894 struct ifinfomsg *ifi,
895 u8 *buf, size_t len)
3f5285e8 896{
36d84860
BG
897 struct nl80211_global *global = ctx;
898 struct wpa_driver_nl80211_data *drv;
90a545cc 899 int attrlen;
62d680c3 900 struct rtattr *attr;
97cfcf64 901 u32 brid = 0;
aef85ba2 902 char namebuf[IFNAMSIZ];
90a545cc
JM
903 char ifname[IFNAMSIZ + 1];
904 char extra[100], *pos, *end;
3f5285e8 905
36d84860
BG
906 drv = nl80211_find_drv(global, ifi->ifi_index, buf, len);
907 if (!drv) {
90a545cc
JM
908 wpa_printf(MSG_DEBUG, "nl80211: Ignore RTM_NEWLINK event for foreign ifindex %d",
909 ifi->ifi_index);
3f5285e8
JM
910 return;
911 }
912
90a545cc
JM
913 extra[0] = '\0';
914 pos = extra;
915 end = pos + sizeof(extra);
916 ifname[0] = '\0';
917
918 attrlen = len;
919 attr = (struct rtattr *) buf;
920 while (RTA_OK(attr, attrlen)) {
921 switch (attr->rta_type) {
922 case IFLA_IFNAME:
923 if (RTA_PAYLOAD(attr) >= IFNAMSIZ)
924 break;
925 os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
926 ifname[RTA_PAYLOAD(attr)] = '\0';
927 break;
928 case IFLA_MASTER:
929 brid = nla_get_u32((struct nlattr *) attr);
930 pos += os_snprintf(pos, end - pos, " master=%u", brid);
931 break;
932 case IFLA_WIRELESS:
933 pos += os_snprintf(pos, end - pos, " wext");
934 break;
935 case IFLA_OPERSTATE:
936 pos += os_snprintf(pos, end - pos, " operstate=%u",
937 nla_get_u32((struct nlattr *) attr));
938 break;
939 case IFLA_LINKMODE:
940 pos += os_snprintf(pos, end - pos, " linkmode=%u",
941 nla_get_u32((struct nlattr *) attr));
942 break;
943 }
944 attr = RTA_NEXT(attr, attrlen);
945 }
946 extra[sizeof(extra) - 1] = '\0';
947
f2e90835
JM
948 wpa_printf(MSG_DEBUG, "RTM_NEWLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
949 ifi->ifi_index, ifname, extra, ifi->ifi_family,
950 ifi->ifi_flags,
3f5285e8
JM
951 (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
952 (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
953 (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
954 (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
a63063b4
JM
955
956 if (!drv->if_disabled && !(ifi->ifi_flags & IFF_UP)) {
106fa1e9 957 namebuf[0] = '\0';
59d24925 958 if (if_indextoname(ifi->ifi_index, namebuf) &&
106fa1e9 959 linux_iface_up(drv->global->ioctl_sock, namebuf) > 0) {
59d24925
JM
960 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
961 "event since interface %s is up", namebuf);
7a94120e 962 drv->ignore_if_down_event = 0;
59d24925
JM
963 return;
964 }
106fa1e9
JM
965 wpa_printf(MSG_DEBUG, "nl80211: Interface down (%s/%s)",
966 namebuf, ifname);
967 if (os_strcmp(drv->first_bss->ifname, ifname) != 0) {
968 wpa_printf(MSG_DEBUG,
969 "nl80211: Not the main interface (%s) - do not indicate interface down",
970 drv->first_bss->ifname);
971 } else if (drv->ignore_if_down_event) {
7d9c3698
JM
972 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
973 "event generated by mode change");
974 drv->ignore_if_down_event = 0;
975 } else {
976 drv->if_disabled = 1;
977 wpa_supplicant_event(drv->ctx,
978 EVENT_INTERFACE_DISABLED, NULL);
819f096f
AO
979
980 /*
981 * Try to get drv again, since it may be removed as
982 * part of the EVENT_INTERFACE_DISABLED handling for
983 * dynamic interfaces
984 */
985 drv = nl80211_find_drv(global, ifi->ifi_index,
986 buf, len);
987 if (!drv)
988 return;
7d9c3698 989 }
a63063b4
JM
990 }
991
992 if (drv->if_disabled && (ifi->ifi_flags & IFF_UP)) {
aef85ba2 993 if (if_indextoname(ifi->ifi_index, namebuf) &&
106fa1e9 994 linux_iface_up(drv->global->ioctl_sock, namebuf) == 0) {
aef85ba2
JM
995 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
996 "event since interface %s is down",
997 namebuf);
834ee56f 998 } else if (if_nametoindex(drv->first_bss->ifname) == 0) {
d1f4942b
JM
999 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1000 "event since interface %s does not exist",
834ee56f 1001 drv->first_bss->ifname);
d1f4942b
JM
1002 } else if (drv->if_removed) {
1003 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1004 "event since interface %s is marked "
834ee56f 1005 "removed", drv->first_bss->ifname);
aef85ba2 1006 } else {
3e0272ca
DW
1007 struct i802_bss *bss;
1008 u8 addr[ETH_ALEN];
1009
1010 /* Re-read MAC address as it may have changed */
1011 bss = get_bss_ifindex(drv, ifi->ifi_index);
1012 if (bss &&
1013 linux_get_ifhwaddr(drv->global->ioctl_sock,
1014 bss->ifname, addr) < 0) {
1015 wpa_printf(MSG_DEBUG,
1016 "nl80211: %s: failed to re-read MAC address",
1017 bss->ifname);
1018 } else if (bss &&
1019 os_memcmp(addr, bss->addr, ETH_ALEN) != 0) {
1020 wpa_printf(MSG_DEBUG,
1021 "nl80211: Own MAC address on ifindex %d (%s) changed from "
1022 MACSTR " to " MACSTR,
1023 ifi->ifi_index, bss->ifname,
1024 MAC2STR(bss->addr),
1025 MAC2STR(addr));
1026 os_memcpy(bss->addr, addr, ETH_ALEN);
1027 }
1028
aef85ba2
JM
1029 wpa_printf(MSG_DEBUG, "nl80211: Interface up");
1030 drv->if_disabled = 0;
1031 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED,
1032 NULL);
1033 }
a63063b4
JM
1034 }
1035
3f5285e8
JM
1036 /*
1037 * Some drivers send the association event before the operup event--in
1038 * this case, lifting operstate in wpa_driver_nl80211_set_operstate()
1039 * fails. This will hit us when wpa_supplicant does not need to do
1040 * IEEE 802.1X authentication
1041 */
1042 if (drv->operstate == 1 &&
1043 (ifi->ifi_flags & (IFF_LOWER_UP | IFF_DORMANT)) == IFF_LOWER_UP &&
90a545cc
JM
1044 !(ifi->ifi_flags & IFF_RUNNING)) {
1045 wpa_printf(MSG_DEBUG, "nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate");
36d84860 1046 netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
e2d02c29 1047 -1, IF_OPER_UP);
3f5285e8 1048 }
97cfcf64 1049
90a545cc
JM
1050 if (ifname[0])
1051 wpa_driver_nl80211_event_newlink(drv, ifname);
1052
97cfcf64 1053 if (ifi->ifi_family == AF_BRIDGE && brid) {
392dfd37
JM
1054 struct i802_bss *bss;
1055
97cfcf64 1056 /* device has been added to bridge */
40e76396
JM
1057 if (!if_indextoname(brid, namebuf)) {
1058 wpa_printf(MSG_DEBUG,
1059 "nl80211: Could not find bridge ifname for ifindex %u",
1060 brid);
1061 return;
1062 }
97cfcf64
B
1063 wpa_printf(MSG_DEBUG, "nl80211: Add ifindex %u for bridge %s",
1064 brid, namebuf);
1065 add_ifidx(drv, brid);
392dfd37
JM
1066
1067 for (bss = drv->first_bss; bss; bss = bss->next) {
1068 if (os_strcmp(ifname, bss->ifname) == 0) {
1069 os_strlcpy(bss->brname, namebuf, IFNAMSIZ);
1070 break;
1071 }
1072 }
97cfcf64 1073 }
3f5285e8
JM
1074}
1075
1076
62d680c3
JM
1077static void wpa_driver_nl80211_event_rtm_dellink(void *ctx,
1078 struct ifinfomsg *ifi,
1079 u8 *buf, size_t len)
3f5285e8 1080{
36d84860
BG
1081 struct nl80211_global *global = ctx;
1082 struct wpa_driver_nl80211_data *drv;
90a545cc 1083 int attrlen;
62d680c3 1084 struct rtattr *attr;
97cfcf64 1085 u32 brid = 0;
90a545cc 1086 char ifname[IFNAMSIZ + 1];
f2e90835 1087 char extra[100], *pos, *end;
3f5285e8 1088
36d84860
BG
1089 drv = nl80211_find_drv(global, ifi->ifi_index, buf, len);
1090 if (!drv) {
90a545cc
JM
1091 wpa_printf(MSG_DEBUG, "nl80211: Ignore RTM_DELLINK event for foreign ifindex %d",
1092 ifi->ifi_index);
36d84860
BG
1093 return;
1094 }
1095
f2e90835
JM
1096 extra[0] = '\0';
1097 pos = extra;
1098 end = pos + sizeof(extra);
90a545cc
JM
1099 ifname[0] = '\0';
1100
62d680c3
JM
1101 attrlen = len;
1102 attr = (struct rtattr *) buf;
3f5285e8 1103 while (RTA_OK(attr, attrlen)) {
90a545cc
JM
1104 switch (attr->rta_type) {
1105 case IFLA_IFNAME:
1106 if (RTA_PAYLOAD(attr) >= IFNAMSIZ)
1107 break;
1108 os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
1109 ifname[RTA_PAYLOAD(attr)] = '\0';
1110 break;
1111 case IFLA_MASTER:
97cfcf64 1112 brid = nla_get_u32((struct nlattr *) attr);
f2e90835
JM
1113 pos += os_snprintf(pos, end - pos, " master=%u", brid);
1114 break;
1115 case IFLA_OPERSTATE:
1116 pos += os_snprintf(pos, end - pos, " operstate=%u",
1117 nla_get_u32((struct nlattr *) attr));
1118 break;
1119 case IFLA_LINKMODE:
1120 pos += os_snprintf(pos, end - pos, " linkmode=%u",
1121 nla_get_u32((struct nlattr *) attr));
90a545cc
JM
1122 break;
1123 }
3f5285e8
JM
1124 attr = RTA_NEXT(attr, attrlen);
1125 }
f2e90835
JM
1126 extra[sizeof(extra) - 1] = '\0';
1127
1128 wpa_printf(MSG_DEBUG, "RTM_DELLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
1129 ifi->ifi_index, ifname, extra, ifi->ifi_family,
1130 ifi->ifi_flags,
1131 (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
1132 (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
1133 (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
1134 (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
97cfcf64 1135
728ff2f4 1136 if (ifname[0] && (ifi->ifi_family != AF_BRIDGE || !brid))
90a545cc
JM
1137 wpa_driver_nl80211_event_dellink(drv, ifname);
1138
97cfcf64
B
1139 if (ifi->ifi_family == AF_BRIDGE && brid) {
1140 /* device has been removed from bridge */
1141 char namebuf[IFNAMSIZ];
40e76396
JM
1142
1143 if (!if_indextoname(brid, namebuf)) {
1144 wpa_printf(MSG_DEBUG,
1145 "nl80211: Could not find bridge ifname for ifindex %u",
1146 brid);
1147 } else {
1148 wpa_printf(MSG_DEBUG,
1149 "nl80211: Remove ifindex %u for bridge %s",
1150 brid, namebuf);
1151 }
97cfcf64
B
1152 del_ifidx(drv, brid);
1153 }
3f5285e8
JM
1154}
1155
1156
f3407c66 1157unsigned int nl80211_get_assoc_freq(struct wpa_driver_nl80211_data *drv)
f5a8d422
JM
1158{
1159 struct nl_msg *msg;
1160 int ret;
1161 struct nl80211_bss_info_arg arg;
1162
9725b784 1163 msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
f5a8d422 1164 os_memset(&arg, 0, sizeof(arg));
f5a8d422
JM
1165 arg.drv = drv;
1166 ret = send_and_recv_msgs(drv, msg, bss_info_handler, &arg);
f5a8d422 1167 if (ret == 0) {
c7caac56
JM
1168 unsigned int freq = drv->nlmode == NL80211_IFTYPE_ADHOC ?
1169 arg.ibss_freq : arg.assoc_freq;
f5a8d422 1170 wpa_printf(MSG_DEBUG, "nl80211: Operating frequency for the "
c7caac56
JM
1171 "associated BSS from scan results: %u MHz", freq);
1172 if (freq)
1173 drv->assoc_freq = freq;
30158a0d 1174 return drv->assoc_freq;
f5a8d422
JM
1175 }
1176 wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
1177 "(%s)", ret, strerror(-ret));
f5a8d422
JM
1178 return drv->assoc_freq;
1179}
1180
1181
60a972a6
JM
1182static int get_link_signal(struct nl_msg *msg, void *arg)
1183{
1184 struct nlattr *tb[NL80211_ATTR_MAX + 1];
1185 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1186 struct nlattr *sinfo[NL80211_STA_INFO_MAX + 1];
1187 static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = {
1188 [NL80211_STA_INFO_SIGNAL] = { .type = NLA_U8 },
95783298 1189 [NL80211_STA_INFO_SIGNAL_AVG] = { .type = NLA_U8 },
74fa78b2 1190 [NL80211_STA_INFO_BEACON_SIGNAL_AVG] = { .type = NLA_U8 },
60a972a6 1191 };
7ee35bf3
PS
1192 struct nlattr *rinfo[NL80211_RATE_INFO_MAX + 1];
1193 static struct nla_policy rate_policy[NL80211_RATE_INFO_MAX + 1] = {
1194 [NL80211_RATE_INFO_BITRATE] = { .type = NLA_U16 },
1195 [NL80211_RATE_INFO_MCS] = { .type = NLA_U8 },
1196 [NL80211_RATE_INFO_40_MHZ_WIDTH] = { .type = NLA_FLAG },
1197 [NL80211_RATE_INFO_SHORT_GI] = { .type = NLA_FLAG },
1198 };
1c5c7273 1199 struct wpa_signal_info *sig_change = arg;
60a972a6
JM
1200
1201 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1202 genlmsg_attrlen(gnlh, 0), NULL);
1203 if (!tb[NL80211_ATTR_STA_INFO] ||
1204 nla_parse_nested(sinfo, NL80211_STA_INFO_MAX,
1205 tb[NL80211_ATTR_STA_INFO], policy))
1206 return NL_SKIP;
1207 if (!sinfo[NL80211_STA_INFO_SIGNAL])
1208 return NL_SKIP;
1209
7ee35bf3
PS
1210 sig_change->current_signal =
1211 (s8) nla_get_u8(sinfo[NL80211_STA_INFO_SIGNAL]);
1212
95783298
AO
1213 if (sinfo[NL80211_STA_INFO_SIGNAL_AVG])
1214 sig_change->avg_signal =
1215 (s8) nla_get_u8(sinfo[NL80211_STA_INFO_SIGNAL_AVG]);
1216 else
1217 sig_change->avg_signal = 0;
1218
74fa78b2
JM
1219 if (sinfo[NL80211_STA_INFO_BEACON_SIGNAL_AVG])
1220 sig_change->avg_beacon_signal =
1221 (s8)
1222 nla_get_u8(sinfo[NL80211_STA_INFO_BEACON_SIGNAL_AVG]);
1223 else
1224 sig_change->avg_beacon_signal = 0;
1225
7ee35bf3
PS
1226 if (sinfo[NL80211_STA_INFO_TX_BITRATE]) {
1227 if (nla_parse_nested(rinfo, NL80211_RATE_INFO_MAX,
1228 sinfo[NL80211_STA_INFO_TX_BITRATE],
1229 rate_policy)) {
1230 sig_change->current_txrate = 0;
1231 } else {
1232 if (rinfo[NL80211_RATE_INFO_BITRATE]) {
1233 sig_change->current_txrate =
1234 nla_get_u16(rinfo[
1235 NL80211_RATE_INFO_BITRATE]) * 100;
1236 }
1237 }
1238 }
1239
60a972a6
JM
1240 return NL_SKIP;
1241}
1242
1243
f3407c66
JM
1244int nl80211_get_link_signal(struct wpa_driver_nl80211_data *drv,
1245 struct wpa_signal_info *sig)
60a972a6
JM
1246{
1247 struct nl_msg *msg;
1248
7ee35bf3
PS
1249 sig->current_signal = -9999;
1250 sig->current_txrate = 0;
60a972a6 1251
9725b784 1252 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_STATION)) ||
a862e4a3
JM
1253 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, drv->bssid)) {
1254 nlmsg_free(msg);
1255 return -ENOBUFS;
1256 }
60a972a6
JM
1257
1258 return send_and_recv_msgs(drv, msg, get_link_signal, sig);
60a972a6
JM
1259}
1260
1261
7ee35bf3
PS
1262static int get_link_noise(struct nl_msg *msg, void *arg)
1263{
1264 struct nlattr *tb[NL80211_ATTR_MAX + 1];
1265 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1266 struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
1267 static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
1268 [NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
1269 [NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
1270 };
1c5c7273 1271 struct wpa_signal_info *sig_change = arg;
7ee35bf3
PS
1272
1273 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1274 genlmsg_attrlen(gnlh, 0), NULL);
1275
1276 if (!tb[NL80211_ATTR_SURVEY_INFO]) {
1277 wpa_printf(MSG_DEBUG, "nl80211: survey data missing!");
1278 return NL_SKIP;
1279 }
1280
1281 if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
1282 tb[NL80211_ATTR_SURVEY_INFO],
1283 survey_policy)) {
1284 wpa_printf(MSG_DEBUG, "nl80211: failed to parse nested "
1285 "attributes!");
1286 return NL_SKIP;
1287 }
1288
1289 if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
1290 return NL_SKIP;
1291
1292 if (nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
1293 sig_change->frequency)
1294 return NL_SKIP;
1295
1296 if (!sinfo[NL80211_SURVEY_INFO_NOISE])
1297 return NL_SKIP;
1298
1299 sig_change->current_noise =
1300 (s8) nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
1301
1302 return NL_SKIP;
1303}
1304
1305
f3407c66
JM
1306int nl80211_get_link_noise(struct wpa_driver_nl80211_data *drv,
1307 struct wpa_signal_info *sig_change)
7ee35bf3
PS
1308{
1309 struct nl_msg *msg;
1310
1311 sig_change->current_noise = 9999;
1312 sig_change->frequency = drv->assoc_freq;
1313
9725b784 1314 msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
7ee35bf3 1315 return send_and_recv_msgs(drv, msg, get_link_noise, sig_change);
7ee35bf3
PS
1316}
1317
1318
97865538 1319static void wpa_driver_nl80211_event_receive(int sock, void *eloop_ctx,
5582a5d1 1320 void *handle)
97865538 1321{
a4ae123c 1322 struct nl_cb *cb = eloop_ctx;
34068ac3 1323 int res;
97865538 1324
cc2ada86 1325 wpa_printf(MSG_MSGDUMP, "nl80211: Event message available");
97865538 1326
34068ac3 1327 res = nl_recvmsgs(handle, cb);
d3d04831 1328 if (res < 0) {
34068ac3
JM
1329 wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
1330 __func__, res);
1331 }
97865538
JM
1332}
1333
1334
6d158490
LR
1335/**
1336 * wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain
1337 * @priv: driver_nl80211 private data
1338 * @alpha2_arg: country to which to switch to
1339 * Returns: 0 on success, -1 on failure
1340 *
1341 * This asks nl80211 to set the regulatory domain for given
1342 * country ISO / IEC alpha2.
1343 */
1344static int wpa_driver_nl80211_set_country(void *priv, const char *alpha2_arg)
1345{
a2e40bb6
FF
1346 struct i802_bss *bss = priv;
1347 struct wpa_driver_nl80211_data *drv = bss->drv;
6d158490
LR
1348 char alpha2[3];
1349 struct nl_msg *msg;
1350
1351 msg = nlmsg_alloc();
1352 if (!msg)
e785c2ba 1353 return -ENOMEM;
6d158490
LR
1354
1355 alpha2[0] = alpha2_arg[0];
1356 alpha2[1] = alpha2_arg[1];
1357 alpha2[2] = '\0';
1358
a862e4a3
JM
1359 if (!nl80211_cmd(drv, msg, 0, NL80211_CMD_REQ_SET_REG) ||
1360 nla_put_string(msg, NL80211_ATTR_REG_ALPHA2, alpha2)) {
1361 nlmsg_free(msg);
1362 return -EINVAL;
1363 }
6d158490
LR
1364 if (send_and_recv_msgs(drv, msg, NULL, NULL))
1365 return -EINVAL;
1366 return 0;
6d158490
LR
1367}
1368
1369
f0793bf1
JM
1370static int nl80211_get_country(struct nl_msg *msg, void *arg)
1371{
1372 char *alpha2 = arg;
1373 struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
1374 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1375
1376 nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1377 genlmsg_attrlen(gnlh, 0), NULL);
1378 if (!tb_msg[NL80211_ATTR_REG_ALPHA2]) {
1379 wpa_printf(MSG_DEBUG, "nl80211: No country information available");
1380 return NL_SKIP;
1381 }
1382 os_strlcpy(alpha2, nla_data(tb_msg[NL80211_ATTR_REG_ALPHA2]), 3);
1383 return NL_SKIP;
1384}
1385
1386
1387static int wpa_driver_nl80211_get_country(void *priv, char *alpha2)
1388{
1389 struct i802_bss *bss = priv;
1390 struct wpa_driver_nl80211_data *drv = bss->drv;
1391 struct nl_msg *msg;
1392 int ret;
1393
1394 msg = nlmsg_alloc();
1395 if (!msg)
1396 return -ENOMEM;
1397
1398 nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG);
1399 alpha2[0] = '\0';
1400 ret = send_and_recv_msgs(drv, msg, nl80211_get_country, alpha2);
1401 if (!alpha2[0])
1402 ret = -1;
1403
1404 return ret;
1405}
1406
1407
2a7b66f5
BG
1408static int wpa_driver_nl80211_init_nl_global(struct nl80211_global *global)
1409{
d6c9aab8
JB
1410 int ret;
1411
2a7b66f5
BG
1412 global->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
1413 if (global->nl_cb == NULL) {
1414 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
1415 "callbacks");
1416 return -1;
1417 }
1418
481234cf
JM
1419 global->nl = nl_create_handle(global->nl_cb, "nl");
1420 if (global->nl == NULL)
d6c9aab8 1421 goto err;
276e2d67 1422
481234cf 1423 global->nl80211_id = genl_ctrl_resolve(global->nl, "nl80211");
335d42b1 1424 if (global->nl80211_id < 0) {
276e2d67
BG
1425 wpa_printf(MSG_ERROR, "nl80211: 'nl80211' generic netlink not "
1426 "found");
d6c9aab8 1427 goto err;
276e2d67
BG
1428 }
1429
481234cf
JM
1430 global->nl_event = nl_create_handle(global->nl_cb, "event");
1431 if (global->nl_event == NULL)
d6c9aab8 1432 goto err;
9fff9fdc 1433
d6c9aab8 1434 ret = nl_get_multicast_id(global, "nl80211", "scan");
97865538 1435 if (ret >= 0)
481234cf 1436 ret = nl_socket_add_membership(global->nl_event, ret);
97865538
JM
1437 if (ret < 0) {
1438 wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
1439 "membership for scan events: %d (%s)",
1440 ret, strerror(-ret));
d6c9aab8 1441 goto err;
97865538 1442 }
c2a04078 1443
d6c9aab8 1444 ret = nl_get_multicast_id(global, "nl80211", "mlme");
c2a04078 1445 if (ret >= 0)
481234cf 1446 ret = nl_socket_add_membership(global->nl_event, ret);
c2a04078
JM
1447 if (ret < 0) {
1448 wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
1449 "membership for mlme events: %d (%s)",
1450 ret, strerror(-ret));
d6c9aab8 1451 goto err;
c2a04078 1452 }
c2a04078 1453
d6c9aab8 1454 ret = nl_get_multicast_id(global, "nl80211", "regulatory");
33c5deb8 1455 if (ret >= 0)
481234cf 1456 ret = nl_socket_add_membership(global->nl_event, ret);
33c5deb8
JM
1457 if (ret < 0) {
1458 wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
1459 "membership for regulatory events: %d (%s)",
1460 ret, strerror(-ret));
1461 /* Continue without regulatory events */
1462 }
1463
17b79e65
JM
1464 ret = nl_get_multicast_id(global, "nl80211", "vendor");
1465 if (ret >= 0)
1466 ret = nl_socket_add_membership(global->nl_event, ret);
1467 if (ret < 0) {
1468 wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
1469 "membership for vendor events: %d (%s)",
1470 ret, strerror(-ret));
1471 /* Continue without vendor events */
1472 }
1473
d6c9aab8
JB
1474 nl_cb_set(global->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
1475 no_seq_check, NULL);
1476 nl_cb_set(global->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
1477 process_global_event, global);
1478
5f65e9f7
JB
1479 nl80211_register_eloop_read(&global->nl_event,
1480 wpa_driver_nl80211_event_receive,
1481 global->nl_cb);
d6c9aab8
JB
1482
1483 return 0;
1484
1485err:
1486 nl_destroy_handles(&global->nl_event);
1487 nl_destroy_handles(&global->nl);
1488 nl_cb_put(global->nl_cb);
671a5039 1489 global->nl_cb = NULL;
d6c9aab8
JB
1490 return -1;
1491}
1492
1493
f51f54a0
JM
1494static void nl80211_check_global(struct nl80211_global *global)
1495{
1496 struct nl_handle *handle;
1497 const char *groups[] = { "scan", "mlme", "regulatory", "vendor", NULL };
1498 int ret;
1499 unsigned int i;
1500
1501 /*
1502 * Try to re-add memberships to handle case of cfg80211 getting reloaded
1503 * and all registration having been cleared.
1504 */
1505 handle = (void *) (((intptr_t) global->nl_event) ^
1506 ELOOP_SOCKET_INVALID);
1507
1508 for (i = 0; groups[i]; i++) {
1509 ret = nl_get_multicast_id(global, "nl80211", groups[i]);
1510 if (ret >= 0)
1511 ret = nl_socket_add_membership(handle, ret);
1512 if (ret < 0) {
1513 wpa_printf(MSG_INFO,
1514 "nl80211: Could not re-add multicast membership for %s events: %d (%s)",
1515 groups[i], ret, strerror(-ret));
1516 }
1517 }
1518}
1519
1520
8401a6b0
JM
1521static void wpa_driver_nl80211_rfkill_blocked(void *ctx)
1522{
6da504a1
IP
1523 struct wpa_driver_nl80211_data *drv = ctx;
1524
8401a6b0 1525 wpa_printf(MSG_DEBUG, "nl80211: RFKILL blocked");
6da504a1 1526
a63063b4 1527 /*
6da504a1
IP
1528 * rtnetlink ifdown handler will report interfaces other than the P2P
1529 * Device interface as disabled.
a63063b4 1530 */
6da504a1
IP
1531 if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
1532 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_DISABLED, NULL);
8401a6b0
JM
1533}
1534
1535
1536static void wpa_driver_nl80211_rfkill_unblocked(void *ctx)
1537{
1538 struct wpa_driver_nl80211_data *drv = ctx;
1539 wpa_printf(MSG_DEBUG, "nl80211: RFKILL unblocked");
834ee56f 1540 if (i802_set_iface_flags(drv->first_bss, 1)) {
8401a6b0
JM
1541 wpa_printf(MSG_DEBUG, "nl80211: Could not set interface UP "
1542 "after rfkill unblock");
1543 return;
1544 }
e8dc205f
AO
1545
1546 if (is_p2p_net_interface(drv->nlmode))
1547 nl80211_disable_11b_rates(drv, drv->ifindex, 1);
1548
6da504a1
IP
1549 /*
1550 * rtnetlink ifup handler will report interfaces other than the P2P
1551 * Device interface as enabled.
1552 */
1553 if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
1554 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED, NULL);
8401a6b0
JM
1555}
1556
1557
32ab4855
JB
1558static void wpa_driver_nl80211_handle_eapol_tx_status(int sock,
1559 void *eloop_ctx,
1560 void *handle)
1561{
1562 struct wpa_driver_nl80211_data *drv = eloop_ctx;
1563 u8 data[2048];
1564 struct msghdr msg;
1565 struct iovec entry;
cad0f50e 1566 u8 control[512];
32ab4855
JB
1567 struct cmsghdr *cmsg;
1568 int res, found_ee = 0, found_wifi = 0, acked = 0;
1569 union wpa_event_data event;
1570
1571 memset(&msg, 0, sizeof(msg));
1572 msg.msg_iov = &entry;
1573 msg.msg_iovlen = 1;
1574 entry.iov_base = data;
1575 entry.iov_len = sizeof(data);
1576 msg.msg_control = &control;
1577 msg.msg_controllen = sizeof(control);
1578
1579 res = recvmsg(sock, &msg, MSG_ERRQUEUE);
1580 /* if error or not fitting 802.3 header, return */
1581 if (res < 14)
1582 return;
1583
1584 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg))
1585 {
1586 if (cmsg->cmsg_level == SOL_SOCKET &&
1587 cmsg->cmsg_type == SCM_WIFI_STATUS) {
1588 int *ack;
1589
1590 found_wifi = 1;
1591 ack = (void *)CMSG_DATA(cmsg);
1592 acked = *ack;
1593 }
1594
1595 if (cmsg->cmsg_level == SOL_PACKET &&
1596 cmsg->cmsg_type == PACKET_TX_TIMESTAMP) {
1597 struct sock_extended_err *err =
1598 (struct sock_extended_err *)CMSG_DATA(cmsg);
1599
1600 if (err->ee_origin == SO_EE_ORIGIN_TXSTATUS)
1601 found_ee = 1;
1602 }
1603 }
1604
1605 if (!found_ee || !found_wifi)
1606 return;
1607
1608 memset(&event, 0, sizeof(event));
1609 event.eapol_tx_status.dst = data;
1610 event.eapol_tx_status.data = data + 14;
1611 event.eapol_tx_status.data_len = res - 14;
1612 event.eapol_tx_status.ack = acked;
1613 wpa_supplicant_event(drv->ctx, EVENT_EAPOL_TX_STATUS, &event);
1614}
1615
1616
cc7a48d1
JB
1617static int nl80211_init_bss(struct i802_bss *bss)
1618{
1619 bss->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
1620 if (!bss->nl_cb)
1621 return -1;
1622
1623 nl_cb_set(bss->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
1624 no_seq_check, NULL);
1625 nl_cb_set(bss->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
1626 process_bss_event, bss);
1627
1628 return 0;
1629}
1630
1631
1632static void nl80211_destroy_bss(struct i802_bss *bss)
1633{
1634 nl_cb_put(bss->nl_cb);
1635 bss->nl_cb = NULL;
1636}
1637
1638
0e92fb8f
JB
1639static void
1640wpa_driver_nl80211_drv_init_rfkill(struct wpa_driver_nl80211_data *drv)
1641{
1642 struct rfkill_config *rcfg;
1643
1644 if (drv->rfkill)
1645 return;
1646
1647 rcfg = os_zalloc(sizeof(*rcfg));
1648 if (!rcfg)
1649 return;
1650
1651 rcfg->ctx = drv;
1652
1653 /* rfkill uses netdev sysfs for initialization. However, P2P Device is
1654 * not associated with a netdev, so use the name of some other interface
1655 * sharing the same wiphy as the P2P Device interface.
1656 *
1657 * Note: This is valid, as a P2P Device interface is always dynamically
1658 * created and is created only once another wpa_s interface was added.
1659 */
1660 if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) {
1661 struct nl80211_global *global = drv->global;
1662 struct wpa_driver_nl80211_data *tmp1;
1663
1664 dl_list_for_each(tmp1, &global->interfaces,
1665 struct wpa_driver_nl80211_data, list) {
1666 if (drv == tmp1 || drv->wiphy_idx != tmp1->wiphy_idx ||
1667 !tmp1->rfkill)
1668 continue;
1669
1670 wpa_printf(MSG_DEBUG,
1671 "nl80211: Use (%s) to initialize P2P Device rfkill",
1672 tmp1->first_bss->ifname);
1673 os_strlcpy(rcfg->ifname, tmp1->first_bss->ifname,
1674 sizeof(rcfg->ifname));
1675 break;
1676 }
1677 } else {
1678 os_strlcpy(rcfg->ifname, drv->first_bss->ifname,
1679 sizeof(rcfg->ifname));
1680 }
1681
1682 rcfg->blocked_cb = wpa_driver_nl80211_rfkill_blocked;
1683 rcfg->unblocked_cb = wpa_driver_nl80211_rfkill_unblocked;
1684 drv->rfkill = rfkill_init(rcfg);
1685 if (!drv->rfkill) {
1686 wpa_printf(MSG_DEBUG, "nl80211: RFKILL status not available");
1687 os_free(rcfg);
1688 }
1689}
1690
1691
0d547d5f
JM
1692static void * wpa_driver_nl80211_drv_init(void *ctx, const char *ifname,
1693 void *global_priv, int hostapd,
0ecff8d7
JM
1694 const u8 *set_addr,
1695 const char *driver_params)
9fff9fdc 1696{
9fff9fdc 1697 struct wpa_driver_nl80211_data *drv;
a2e40bb6 1698 struct i802_bss *bss;
9fff9fdc 1699
a5c696ad
JM
1700 if (global_priv == NULL)
1701 return NULL;
9fff9fdc
JM
1702 drv = os_zalloc(sizeof(*drv));
1703 if (drv == NULL)
1704 return NULL;
f2ed8023 1705 drv->global = global_priv;
9fff9fdc 1706 drv->ctx = ctx;
0d547d5f
JM
1707 drv->hostapd = !!hostapd;
1708 drv->eapol_sock = -1;
64ae2447
JM
1709
1710 /*
1711 * There is no driver capability flag for this, so assume it is
1712 * supported and disable this on first attempt to use if the driver
1713 * rejects the command due to missing support.
1714 */
1715 drv->set_rekey_offload = 1;
1716
0d547d5f
JM
1717 drv->num_if_indices = sizeof(drv->default_if_indices) / sizeof(int);
1718 drv->if_indices = drv->default_if_indices;
834ee56f
KP
1719
1720 drv->first_bss = os_zalloc(sizeof(*drv->first_bss));
1721 if (!drv->first_bss) {
1722 os_free(drv);
1723 return NULL;
1724 }
1725 bss = drv->first_bss;
a2e40bb6 1726 bss->drv = drv;
a5e1eb20
SE
1727 bss->ctx = ctx;
1728
a2e40bb6 1729 os_strlcpy(bss->ifname, ifname, sizeof(bss->ifname));
9fff9fdc
JM
1730 drv->monitor_ifidx = -1;
1731 drv->monitor_sock = -1;
d12dab4c 1732 drv->eapol_tx_sock = -1;
b1f625e0 1733 drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
9fff9fdc 1734
cc7a48d1
JB
1735 if (nl80211_init_bss(bss))
1736 goto failed;
1737
146fa9b3
JM
1738 if (linux_iface_up(drv->global->ioctl_sock, ifname) > 0)
1739 drv->start_iface_up = 1;
1740
0ecff8d7 1741 if (wpa_driver_nl80211_finish_drv_init(drv, set_addr, 1, driver_params))
bbaf0837 1742 goto failed;
7524cfb1 1743
d12dab4c 1744 drv->eapol_tx_sock = socket(PF_PACKET, SOCK_DGRAM, 0);
32ab4855
JB
1745 if (drv->eapol_tx_sock < 0)
1746 goto failed;
1747
1748 if (drv->data_tx_status) {
1749 int enabled = 1;
1750
1751 if (setsockopt(drv->eapol_tx_sock, SOL_SOCKET, SO_WIFI_STATUS,
1752 &enabled, sizeof(enabled)) < 0) {
1753 wpa_printf(MSG_DEBUG,
1754 "nl80211: wifi status sockopt failed\n");
1755 drv->data_tx_status = 0;
a11241fa
JB
1756 if (!drv->use_monitor)
1757 drv->capa.flags &=
1758 ~WPA_DRIVER_FLAGS_EAPOL_TX_STATUS;
32ab4855
JB
1759 } else {
1760 eloop_register_read_sock(drv->eapol_tx_sock,
1761 wpa_driver_nl80211_handle_eapol_tx_status,
1762 drv, NULL);
1763 }
1764 }
f10bfc9a 1765
dac12351 1766 if (drv->global) {
f51f54a0 1767 nl80211_check_global(drv->global);
c4bb8817 1768 dl_list_add(&drv->global->interfaces, &drv->list);
dac12351
BG
1769 drv->in_interface_list = 1;
1770 }
c4bb8817 1771
a2e40bb6 1772 return bss;
7524cfb1 1773
bbaf0837 1774failed:
dac12351 1775 wpa_driver_nl80211_deinit(bss);
7524cfb1
JM
1776 return NULL;
1777}
1778
1779
0d547d5f
JM
1780/**
1781 * wpa_driver_nl80211_init - Initialize nl80211 driver interface
1782 * @ctx: context to be used when calling wpa_supplicant functions,
1783 * e.g., wpa_supplicant_event()
1784 * @ifname: interface name, e.g., wlan0
1785 * @global_priv: private driver global data from global_init()
1786 * Returns: Pointer to private data, %NULL on failure
1787 */
1788static void * wpa_driver_nl80211_init(void *ctx, const char *ifname,
1789 void *global_priv)
1790{
0ecff8d7
JM
1791 return wpa_driver_nl80211_drv_init(ctx, ifname, global_priv, 0, NULL,
1792 NULL);
0d547d5f
JM
1793}
1794
1795
a11241fa 1796static int nl80211_register_frame(struct i802_bss *bss,
5582a5d1 1797 struct nl_handle *nl_handle,
bd94971e 1798 u16 type, const u8 *match, size_t match_len)
58f6fbe0 1799{
a11241fa 1800 struct wpa_driver_nl80211_data *drv = bss->drv;
58f6fbe0 1801 struct nl_msg *msg;
a862e4a3 1802 int ret;
880de885 1803 char buf[30];
58f6fbe0 1804
880de885
JM
1805 buf[0] = '\0';
1806 wpa_snprintf_hex(buf, sizeof(buf), match, match_len);
dedfa440
PF
1807 wpa_printf(MSG_DEBUG, "nl80211: Register frame type=0x%x (%s) nl_handle=%p match=%s",
1808 type, fc2str(type), nl_handle, buf);
36488c05 1809
56f77852 1810 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_REGISTER_ACTION)) ||
a862e4a3
JM
1811 nla_put_u16(msg, NL80211_ATTR_FRAME_TYPE, type) ||
1812 nla_put(msg, NL80211_ATTR_FRAME_MATCH, match_len, match)) {
1813 nlmsg_free(msg);
1814 return -1;
1815 }
58f6fbe0 1816
d6c9aab8 1817 ret = send_and_recv(drv->global, nl_handle, msg, NULL, NULL);
58f6fbe0 1818 if (ret) {
5582a5d1
JB
1819 wpa_printf(MSG_DEBUG, "nl80211: Register frame command "
1820 "failed (type=%u): ret=%d (%s)",
1821 type, ret, strerror(-ret));
1822 wpa_hexdump(MSG_DEBUG, "nl80211: Register frame match",
58f6fbe0 1823 match, match_len);
58f6fbe0 1824 }
58f6fbe0
JM
1825 return ret;
1826}
1827
1828
a11241fa
JB
1829static int nl80211_alloc_mgmt_handle(struct i802_bss *bss)
1830{
481234cf 1831 if (bss->nl_mgmt) {
a11241fa 1832 wpa_printf(MSG_DEBUG, "nl80211: Mgmt reporting "
36488c05 1833 "already on! (nl_mgmt=%p)", bss->nl_mgmt);
a11241fa
JB
1834 return -1;
1835 }
1836
ce20a370 1837 bss->nl_mgmt = nl_create_handle(bss->nl_cb, "mgmt");
481234cf 1838 if (bss->nl_mgmt == NULL)
a11241fa
JB
1839 return -1;
1840
a11241fa
JB
1841 return 0;
1842}
1843
1844
5f65e9f7
JB
1845static void nl80211_mgmt_handle_register_eloop(struct i802_bss *bss)
1846{
1847 nl80211_register_eloop_read(&bss->nl_mgmt,
1848 wpa_driver_nl80211_event_receive,
1849 bss->nl_cb);
1850}
1851
1852
a11241fa 1853static int nl80211_register_action_frame(struct i802_bss *bss,
bd94971e
JB
1854 const u8 *match, size_t match_len)
1855{
1856 u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_ACTION << 4);
481234cf 1857 return nl80211_register_frame(bss, bss->nl_mgmt,
5582a5d1 1858 type, match, match_len);
bd94971e
JB
1859}
1860
1861
a11241fa 1862static int nl80211_mgmt_subscribe_non_ap(struct i802_bss *bss)
58f6fbe0 1863{
a11241fa 1864 struct wpa_driver_nl80211_data *drv = bss->drv;
6f06766e 1865 int ret = 0;
a11241fa
JB
1866
1867 if (nl80211_alloc_mgmt_handle(bss))
1868 return -1;
36488c05
JM
1869 wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with non-AP "
1870 "handle %p", bss->nl_mgmt);
a11241fa 1871
e8d1168b
JB
1872 if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
1873 u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4);
1874
1875 /* register for any AUTH message */
1876 nl80211_register_frame(bss, bss->nl_mgmt, type, NULL, 0);
1877 }
1878
56f5af48
JM
1879#ifdef CONFIG_INTERWORKING
1880 /* QoS Map Configure */
1881 if (nl80211_register_action_frame(bss, (u8 *) "\x01\x04", 2) < 0)
6f06766e 1882 ret = -1;
56f5af48 1883#endif /* CONFIG_INTERWORKING */
4fe9fa0d 1884#if defined(CONFIG_P2P) || defined(CONFIG_INTERWORKING)
046b26a2 1885 /* GAS Initial Request */
a11241fa 1886 if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0a", 2) < 0)
6f06766e 1887 ret = -1;
046b26a2 1888 /* GAS Initial Response */
a11241fa 1889 if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0b", 2) < 0)
6f06766e 1890 ret = -1;
18708aad 1891 /* GAS Comeback Request */
a11241fa 1892 if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0c", 2) < 0)
6f06766e 1893 ret = -1;
18708aad 1894 /* GAS Comeback Response */
a11241fa 1895 if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0d", 2) < 0)
6f06766e 1896 ret = -1;
c5a64e2d
JM
1897 /* Protected GAS Initial Request */
1898 if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0a", 2) < 0)
1899 ret = -1;
1900 /* Protected GAS Initial Response */
1901 if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0b", 2) < 0)
1902 ret = -1;
1903 /* Protected GAS Comeback Request */
1904 if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0c", 2) < 0)
1905 ret = -1;
1906 /* Protected GAS Comeback Response */
1907 if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0d", 2) < 0)
1908 ret = -1;
4fe9fa0d
JM
1909#endif /* CONFIG_P2P || CONFIG_INTERWORKING */
1910#ifdef CONFIG_P2P
046b26a2 1911 /* P2P Public Action */
a11241fa 1912 if (nl80211_register_action_frame(bss,
046b26a2
JM
1913 (u8 *) "\x04\x09\x50\x6f\x9a\x09",
1914 6) < 0)
6f06766e 1915 ret = -1;
046b26a2 1916 /* P2P Action */
a11241fa 1917 if (nl80211_register_action_frame(bss,
046b26a2
JM
1918 (u8 *) "\x7f\x50\x6f\x9a\x09",
1919 5) < 0)
6f06766e 1920 ret = -1;
046b26a2 1921#endif /* CONFIG_P2P */
7d878ca7
JM
1922#ifdef CONFIG_IEEE80211W
1923 /* SA Query Response */
a11241fa 1924 if (nl80211_register_action_frame(bss, (u8 *) "\x08\x01", 2) < 0)
6f06766e 1925 ret = -1;
7d878ca7 1926#endif /* CONFIG_IEEE80211W */
35287637
AN
1927#ifdef CONFIG_TDLS
1928 if ((drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT)) {
1929 /* TDLS Discovery Response */
aa543c0c 1930 if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0e", 2) <
35287637 1931 0)
6f06766e 1932 ret = -1;
35287637
AN
1933 }
1934#endif /* CONFIG_TDLS */
46ab9b8c
AN
1935#ifdef CONFIG_FST
1936 /* FST Action frames */
1937 if (nl80211_register_action_frame(bss, (u8 *) "\x12", 1) < 0)
1938 ret = -1;
1939#endif /* CONFIG_FST */
046b26a2 1940
7b90c16a 1941 /* FT Action frames */
a11241fa 1942 if (nl80211_register_action_frame(bss, (u8 *) "\x06", 1) < 0)
6f06766e 1943 ret = -1;
7b90c16a
JM
1944 else
1945 drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_FT |
1946 WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
1947
71269b37 1948 /* WNM - BSS Transition Management Request */
a11241fa 1949 if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x07", 2) < 0)
6f06766e 1950 ret = -1;
bd896433
JM
1951 /* WNM-Sleep Mode Response */
1952 if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x11", 2) < 0)
6f06766e 1953 ret = -1;
a11241fa 1954
95a3ea94
JM
1955#ifdef CONFIG_HS20
1956 /* WNM-Notification */
1957 if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x1a", 2) < 0)
3ee18569 1958 ret = -1;
95a3ea94
JM
1959#endif /* CONFIG_HS20 */
1960
dfa87878
MB
1961 /* WMM-AC ADDTS Response */
1962 if (nl80211_register_action_frame(bss, (u8 *) "\x11\x01", 2) < 0)
730a0d16 1963 ret = -1;
dfa87878
MB
1964
1965 /* WMM-AC DELTS */
1966 if (nl80211_register_action_frame(bss, (u8 *) "\x11\x02", 2) < 0)
730a0d16 1967 ret = -1;
dfa87878 1968
2526ccd9
AK
1969 /* Radio Measurement - Neighbor Report Response */
1970 if (nl80211_register_action_frame(bss, (u8 *) "\x05\x05", 2) < 0)
1971 ret = -1;
1972
7dc03388
AO
1973 /* Radio Measurement - Link Measurement Request */
1974 if ((drv->capa.rrm_flags & WPA_DRIVER_FLAGS_TX_POWER_INSERTION) &&
1975 (nl80211_register_action_frame(bss, (u8 *) "\x05\x02", 2) < 0))
1976 ret = -1;
1977
5f65e9f7
JB
1978 nl80211_mgmt_handle_register_eloop(bss);
1979
6f06766e 1980 return ret;
a11241fa
JB
1981}
1982
1983
afb0550a
BC
1984static int nl80211_mgmt_subscribe_mesh(struct i802_bss *bss)
1985{
1986 int ret = 0;
1987
1988 if (nl80211_alloc_mgmt_handle(bss))
1989 return -1;
1990
1991 wpa_printf(MSG_DEBUG,
1992 "nl80211: Subscribe to mgmt frames with mesh handle %p",
1993 bss->nl_mgmt);
1994
1995 /* Auth frames for mesh SAE */
1996 if (nl80211_register_frame(bss, bss->nl_mgmt,
1997 (WLAN_FC_TYPE_MGMT << 2) |
1998 (WLAN_FC_STYPE_AUTH << 4),
1999 NULL, 0) < 0)
2000 ret = -1;
2001
2002 /* Mesh peering open */
2003 if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x01", 2) < 0)
2004 ret = -1;
2005 /* Mesh peering confirm */
2006 if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x02", 2) < 0)
2007 ret = -1;
2008 /* Mesh peering close */
2009 if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x03", 2) < 0)
2010 ret = -1;
2011
2012 nl80211_mgmt_handle_register_eloop(bss);
2013
2014 return ret;
2015}
2016
2017
02bb32c3
JB
2018static int nl80211_register_spurious_class3(struct i802_bss *bss)
2019{
02bb32c3 2020 struct nl_msg *msg;
a862e4a3 2021 int ret;
02bb32c3 2022
13f83980
JM
2023 msg = nl80211_bss_msg(bss, 0, NL80211_CMD_UNEXPECTED_FRAME);
2024 ret = send_and_recv(bss->drv->global, bss->nl_mgmt, msg, NULL, NULL);
02bb32c3
JB
2025 if (ret) {
2026 wpa_printf(MSG_DEBUG, "nl80211: Register spurious class3 "
2027 "failed: ret=%d (%s)",
2028 ret, strerror(-ret));
02bb32c3 2029 }
02bb32c3
JB
2030 return ret;
2031}
2032
2033
a11241fa
JB
2034static int nl80211_mgmt_subscribe_ap(struct i802_bss *bss)
2035{
2036 static const int stypes[] = {
2037 WLAN_FC_STYPE_AUTH,
2038 WLAN_FC_STYPE_ASSOC_REQ,
2039 WLAN_FC_STYPE_REASSOC_REQ,
2040 WLAN_FC_STYPE_DISASSOC,
2041 WLAN_FC_STYPE_DEAUTH,
2042 WLAN_FC_STYPE_ACTION,
2043 WLAN_FC_STYPE_PROBE_REQ,
2044/* Beacon doesn't work as mac80211 doesn't currently allow
2045 * it, but it wouldn't really be the right thing anyway as
2046 * it isn't per interface ... maybe just dump the scan
2047 * results periodically for OLBC?
2048 */
0e80ea2c 2049 /* WLAN_FC_STYPE_BEACON, */
a11241fa
JB
2050 };
2051 unsigned int i;
2052
2053 if (nl80211_alloc_mgmt_handle(bss))
71269b37 2054 return -1;
36488c05
JM
2055 wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
2056 "handle %p", bss->nl_mgmt);
71269b37 2057
e7ecab4a 2058 for (i = 0; i < ARRAY_SIZE(stypes); i++) {
481234cf 2059 if (nl80211_register_frame(bss, bss->nl_mgmt,
a11241fa
JB
2060 (WLAN_FC_TYPE_MGMT << 2) |
2061 (stypes[i] << 4),
2062 NULL, 0) < 0) {
2063 goto out_err;
2064 }
2065 }
2066
02bb32c3
JB
2067 if (nl80211_register_spurious_class3(bss))
2068 goto out_err;
2069
e32ad281
JB
2070 if (nl80211_get_wiphy_data_ap(bss) == NULL)
2071 goto out_err;
2072
5f65e9f7 2073 nl80211_mgmt_handle_register_eloop(bss);
58f6fbe0 2074 return 0;
a11241fa
JB
2075
2076out_err:
a11241fa
JB
2077 nl_destroy_handles(&bss->nl_mgmt);
2078 return -1;
2079}
2080
2081
a6cc0602
JM
2082static int nl80211_mgmt_subscribe_ap_dev_sme(struct i802_bss *bss)
2083{
2084 if (nl80211_alloc_mgmt_handle(bss))
2085 return -1;
2086 wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
2087 "handle %p (device SME)", bss->nl_mgmt);
2088
2089 if (nl80211_register_frame(bss, bss->nl_mgmt,
2090 (WLAN_FC_TYPE_MGMT << 2) |
2091 (WLAN_FC_STYPE_ACTION << 4),
2092 NULL, 0) < 0)
2093 goto out_err;
2094
5f65e9f7 2095 nl80211_mgmt_handle_register_eloop(bss);
a6cc0602
JM
2096 return 0;
2097
2098out_err:
a6cc0602
JM
2099 nl_destroy_handles(&bss->nl_mgmt);
2100 return -1;
2101}
2102
2103
36488c05 2104static void nl80211_mgmt_unsubscribe(struct i802_bss *bss, const char *reason)
a11241fa 2105{
481234cf 2106 if (bss->nl_mgmt == NULL)
a11241fa 2107 return;
36488c05
JM
2108 wpa_printf(MSG_DEBUG, "nl80211: Unsubscribe mgmt frames handle %p "
2109 "(%s)", bss->nl_mgmt, reason);
5f65e9f7 2110 nl80211_destroy_eloop_handle(&bss->nl_mgmt);
e32ad281
JB
2111
2112 nl80211_put_wiphy_data_ap(bss);
58f6fbe0
JM
2113}
2114
2115
8401a6b0
JM
2116static void wpa_driver_nl80211_send_rfkill(void *eloop_ctx, void *timeout_ctx)
2117{
2118 wpa_supplicant_event(timeout_ctx, EVENT_INTERFACE_DISABLED, NULL);
2119}
2120
2121
eb4582f2
AS
2122static void nl80211_del_p2pdev(struct i802_bss *bss)
2123{
eb4582f2
AS
2124 struct nl_msg *msg;
2125 int ret;
2126
a3249fdf
JM
2127 msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_DEL_INTERFACE);
2128 ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL);
eb4582f2
AS
2129
2130 wpa_printf(MSG_DEBUG, "nl80211: Delete P2P Device %s (0x%llx): %s",
2131 bss->ifname, (long long unsigned int) bss->wdev_id,
6cb4f11d 2132 strerror(-ret));
eb4582f2
AS
2133}
2134
2135
eb4582f2 2136static int nl80211_set_p2pdev(struct i802_bss *bss, int start)
f632e483 2137{
f632e483 2138 struct nl_msg *msg;
a862e4a3 2139 int ret;
f632e483 2140
a3249fdf
JM
2141 msg = nl80211_cmd_msg(bss, 0, start ? NL80211_CMD_START_P2P_DEVICE :
2142 NL80211_CMD_STOP_P2P_DEVICE);
2143 ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL);
f632e483 2144
eb4582f2
AS
2145 wpa_printf(MSG_DEBUG, "nl80211: %s P2P Device %s (0x%llx): %s",
2146 start ? "Start" : "Stop",
2147 bss->ifname, (long long unsigned int) bss->wdev_id,
6cb4f11d 2148 strerror(-ret));
f632e483
AS
2149 return ret;
2150}
f632e483
AS
2151
2152
91724d6f
AS
2153static int i802_set_iface_flags(struct i802_bss *bss, int up)
2154{
2155 enum nl80211_iftype nlmode;
2156
2157 nlmode = nl80211_get_ifmode(bss);
2158 if (nlmode != NL80211_IFTYPE_P2P_DEVICE) {
2159 return linux_set_iface_flags(bss->drv->global->ioctl_sock,
2160 bss->ifname, up);
2161 }
2162
2163 /* P2P Device has start/stop which is equivalent */
2164 return nl80211_set_p2pdev(bss, up);
2165}
2166
2167
1db718b3
JM
2168#ifdef CONFIG_TESTING_OPTIONS
2169static int qca_vendor_test_cmd_handler(struct nl_msg *msg, void *arg)
2170{
2171 /* struct wpa_driver_nl80211_data *drv = arg; */
2172 struct nlattr *tb[NL80211_ATTR_MAX + 1];
2173 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
2174
2175
2176 wpa_printf(MSG_DEBUG,
2177 "nl80211: QCA vendor test command response received");
2178
2179 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
2180 genlmsg_attrlen(gnlh, 0), NULL);
2181 if (!tb[NL80211_ATTR_VENDOR_DATA]) {
2182 wpa_printf(MSG_DEBUG, "nl80211: No vendor data attribute");
2183 return NL_SKIP;
2184 }
2185
2186 wpa_hexdump(MSG_DEBUG,
2187 "nl80211: Received QCA vendor test command response",
2188 nla_data(tb[NL80211_ATTR_VENDOR_DATA]),
2189 nla_len(tb[NL80211_ATTR_VENDOR_DATA]));
2190
2191 return NL_SKIP;
2192}
2193#endif /* CONFIG_TESTING_OPTIONS */
2194
2195
2196static void qca_vendor_test(struct wpa_driver_nl80211_data *drv)
2197{
2198#ifdef CONFIG_TESTING_OPTIONS
2199 struct nl_msg *msg;
2200 struct nlattr *params;
2201 int ret;
2202
2203 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
2204 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
2205 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
2206 QCA_NL80211_VENDOR_SUBCMD_TEST) ||
2207 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
2208 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_TEST, 123)) {
2209 nlmsg_free(msg);
2210 return;
2211 }
2212 nla_nest_end(msg, params);
2213
2214 ret = send_and_recv_msgs(drv, msg, qca_vendor_test_cmd_handler, drv);
2215 wpa_printf(MSG_DEBUG,
2216 "nl80211: QCA vendor test command returned %d (%s)",
2217 ret, strerror(-ret));
2218#endif /* CONFIG_TESTING_OPTIONS */
2219}
2220
2221
362f781e 2222static int
0d547d5f 2223wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
0ecff8d7
JM
2224 const u8 *set_addr, int first,
2225 const char *driver_params)
7524cfb1 2226{
834ee56f 2227 struct i802_bss *bss = drv->first_bss;
8401a6b0 2228 int send_rfkill_event = 0;
0d547d5f 2229 enum nl80211_iftype nlmode;
a2e40bb6
FF
2230
2231 drv->ifindex = if_nametoindex(bss->ifname);
f632e483
AS
2232 bss->ifindex = drv->ifindex;
2233 bss->wdev_id = drv->global->if_add_wdevid;
2234 bss->wdev_id_set = drv->global->if_add_wdevid_set;
2235
60b13c20
IP
2236 bss->if_dynamic = drv->ifindex == drv->global->if_add_ifindex;
2237 bss->if_dynamic = bss->if_dynamic || drv->global->if_add_wdevid_set;
f632e483
AS
2238 drv->global->if_add_wdevid_set = 0;
2239
bf144cf6
AP
2240 if (!bss->if_dynamic && nl80211_get_ifmode(bss) == NL80211_IFTYPE_AP)
2241 bss->static_ap = 1;
2242
f632e483
AS
2243 if (wpa_driver_nl80211_capa(drv))
2244 return -1;
a87c9d96 2245
0ecff8d7
JM
2246 if (driver_params && nl80211_set_param(bss, driver_params) < 0)
2247 return -1;
2248
5fbcb45d
AS
2249 wpa_printf(MSG_DEBUG, "nl80211: interface %s in phy %s",
2250 bss->ifname, drv->phyname);
2251
0d547d5f
JM
2252 if (set_addr &&
2253 (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) ||
2254 linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
2255 set_addr)))
2256 return -1;
2257
49b4b205
JM
2258 if (first && nl80211_get_ifmode(bss) == NL80211_IFTYPE_AP)
2259 drv->start_mode_ap = 1;
2260
bf144cf6 2261 if (drv->hostapd || bss->static_ap)
0d547d5f
JM
2262 nlmode = NL80211_IFTYPE_AP;
2263 else if (bss->if_dynamic)
8e12685c 2264 nlmode = nl80211_get_ifmode(bss);
0d547d5f
JM
2265 else
2266 nlmode = NL80211_IFTYPE_STATION;
f632e483 2267
8e12685c 2268 if (wpa_driver_nl80211_set_mode(bss, nlmode) < 0) {
0d547d5f 2269 wpa_printf(MSG_ERROR, "nl80211: Could not configure driver mode");
8e12685c 2270 return -1;
a87c9d96
JM
2271 }
2272
8c06db70 2273 if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
597b94f5 2274 nl80211_get_macaddr(bss);
f632e483 2275
0e92fb8f
JB
2276 wpa_driver_nl80211_drv_init_rfkill(drv);
2277
8c06db70
MB
2278 if (!rfkill_is_blocked(drv->rfkill)) {
2279 int ret = i802_set_iface_flags(bss, 1);
2280 if (ret) {
8401a6b0
JM
2281 wpa_printf(MSG_ERROR, "nl80211: Could not set "
2282 "interface '%s' UP", bss->ifname);
8c06db70 2283 return ret;
8401a6b0 2284 }
e8dc205f
AO
2285
2286 if (is_p2p_net_interface(nlmode))
2287 nl80211_disable_11b_rates(bss->drv,
2288 bss->drv->ifindex, 1);
2289
8c06db70
MB
2290 if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
2291 return ret;
2292 } else {
2293 wpa_printf(MSG_DEBUG, "nl80211: Could not yet enable "
2294 "interface '%s' due to rfkill", bss->ifname);
6da504a1
IP
2295 if (nlmode != NL80211_IFTYPE_P2P_DEVICE)
2296 drv->if_disabled = 1;
2297
8c06db70 2298 send_rfkill_event = 1;
362f781e 2299 }
3f5285e8 2300
6da504a1 2301 if (!drv->hostapd && nlmode != NL80211_IFTYPE_P2P_DEVICE)
0d547d5f
JM
2302 netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
2303 1, IF_OPER_DORMANT);
362f781e 2304
6da504a1
IP
2305 if (nlmode != NL80211_IFTYPE_P2P_DEVICE) {
2306 if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
2307 bss->addr))
2308 return -1;
2309 os_memcpy(drv->perm_addr, bss->addr, ETH_ALEN);
2310 }
f2ed8023 2311
8401a6b0
JM
2312 if (send_rfkill_event) {
2313 eloop_register_timeout(0, 0, wpa_driver_nl80211_send_rfkill,
2314 drv, drv->ctx);
2315 }
2316
1db718b3
JM
2317 if (drv->vendor_cmd_test_avail)
2318 qca_vendor_test(drv);
2319
362f781e 2320 return 0;
3f5285e8
JM
2321}
2322
2323
8a27af5c
JM
2324static int wpa_driver_nl80211_del_beacon(struct wpa_driver_nl80211_data *drv)
2325{
2326 struct nl_msg *msg;
2327
08e55ebb
JM
2328 wpa_printf(MSG_DEBUG, "nl80211: Remove beacon (ifindex=%d)",
2329 drv->ifindex);
9725b784 2330 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_DEL_BEACON);
8a27af5c 2331 return send_and_recv_msgs(drv, msg, NULL, NULL);
8a27af5c 2332}
8a27af5c
JM
2333
2334
3f5285e8 2335/**
7e5ba1b9 2336 * wpa_driver_nl80211_deinit - Deinitialize nl80211 driver interface
9ebce9c5 2337 * @bss: Pointer to private nl80211 data from wpa_driver_nl80211_init()
3f5285e8
JM
2338 *
2339 * Shut down driver interface and processing of driver events. Free
2340 * private data buffer if one was allocated in wpa_driver_nl80211_init().
2341 */
9ebce9c5 2342static void wpa_driver_nl80211_deinit(struct i802_bss *bss)
3f5285e8 2343{
a2e40bb6 2344 struct wpa_driver_nl80211_data *drv = bss->drv;
3f5285e8 2345
3e208481
JM
2346 wpa_printf(MSG_INFO, "nl80211: deinit ifname=%s disabled_11b_rates=%d",
2347 bss->ifname, drv->disabled_11b_rates);
2348
873d0fcf 2349 bss->in_deinit = 1;
32ab4855
JB
2350 if (drv->data_tx_status)
2351 eloop_unregister_read_sock(drv->eapol_tx_sock);
d12dab4c
JB
2352 if (drv->eapol_tx_sock >= 0)
2353 close(drv->eapol_tx_sock);
f10bfc9a 2354
481234cf 2355 if (bss->nl_preq)
5582a5d1 2356 wpa_driver_nl80211_probe_req_report(bss, 0);
e17a2477 2357 if (bss->added_if_into_bridge) {
c81eff1a
BG
2358 if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
2359 bss->ifname) < 0)
94627f6c
JM
2360 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
2361 "interface %s from bridge %s: %s",
e17a2477 2362 bss->ifname, bss->brname, strerror(errno));
97ed9a06 2363 if (drv->rtnl_sk)
ca3c6b4d 2364 nl80211_handle_destroy(drv->rtnl_sk);
94627f6c 2365 }
e17a2477 2366 if (bss->added_bridge) {
f2535da8
JM
2367 if (linux_set_iface_flags(drv->global->ioctl_sock, bss->brname,
2368 0) < 0)
2369 wpa_printf(MSG_INFO,
2370 "nl80211: Could not set bridge %s down",
2371 bss->brname);
c81eff1a 2372 if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
94627f6c
JM
2373 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
2374 "bridge %s: %s",
e17a2477 2375 bss->brname, strerror(errno));
94627f6c
JM
2376 }
2377
460456f8 2378 nl80211_remove_monitor_interface(drv);
8a27af5c 2379
b1f625e0 2380 if (is_ap_interface(drv->nlmode))
8a27af5c 2381 wpa_driver_nl80211_del_beacon(drv);
0915d02c 2382
bbaf0837
JM
2383 if (drv->eapol_sock >= 0) {
2384 eloop_unregister_read_sock(drv->eapol_sock);
2385 close(drv->eapol_sock);
2386 }
2387
2388 if (drv->if_indices != drv->default_if_indices)
2389 os_free(drv->if_indices);
3f5285e8 2390
b3af99d2 2391 if (drv->disabled_11b_rates)
4e5cb1a3
JM
2392 nl80211_disable_11b_rates(drv, drv->ifindex, 0);
2393
36d84860
BG
2394 netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, 0,
2395 IF_OPER_UP);
e390df05 2396 eloop_cancel_timeout(wpa_driver_nl80211_send_rfkill, drv, drv->ctx);
8401a6b0 2397 rfkill_deinit(drv->rfkill);
3f5285e8 2398
bbaf0837
JM
2399 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
2400
146fa9b3
JM
2401 if (!drv->start_iface_up)
2402 (void) i802_set_iface_flags(bss, 0);
fee354c7
JM
2403
2404 if (drv->addr_changed) {
93da0498
JM
2405 if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname,
2406 0) < 0) {
2407 wpa_printf(MSG_DEBUG,
2408 "nl80211: Could not set interface down to restore permanent MAC address");
2409 }
fee354c7
JM
2410 if (linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
2411 drv->perm_addr) < 0) {
2412 wpa_printf(MSG_DEBUG,
2413 "nl80211: Could not restore permanent MAC address");
2414 }
2415 }
2416
8e12685c 2417 if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE) {
49b4b205
JM
2418 if (!drv->hostapd || !drv->start_mode_ap)
2419 wpa_driver_nl80211_set_mode(bss,
2420 NL80211_IFTYPE_STATION);
b378c41f 2421 nl80211_mgmt_unsubscribe(bss, "deinit");
8e12685c
AS
2422 } else {
2423 nl80211_mgmt_unsubscribe(bss, "deinit");
eb4582f2 2424 nl80211_del_p2pdev(bss);
8e12685c 2425 }
3f5285e8 2426
834ee56f 2427 nl80211_destroy_bss(drv->first_bss);
cc7a48d1 2428
3812464c
JM
2429 os_free(drv->filter_ssids);
2430
536fd62d
JM
2431 os_free(drv->auth_ie);
2432
dac12351 2433 if (drv->in_interface_list)
f2ed8023
JM
2434 dl_list_del(&drv->list);
2435
8cd6b7bc
JB
2436 os_free(drv->extended_capa);
2437 os_free(drv->extended_capa_mask);
834ee56f 2438 os_free(drv->first_bss);
3f5285e8
JM
2439 os_free(drv);
2440}
2441
2442
de4ed4a8
JM
2443static u32 wpa_alg_to_cipher_suite(enum wpa_alg alg, size_t key_len)
2444{
2445 switch (alg) {
2446 case WPA_ALG_WEP:
2447 if (key_len == 5)
2448 return WLAN_CIPHER_SUITE_WEP40;
2449 return WLAN_CIPHER_SUITE_WEP104;
2450 case WPA_ALG_TKIP:
2451 return WLAN_CIPHER_SUITE_TKIP;
2452 case WPA_ALG_CCMP:
2453 return WLAN_CIPHER_SUITE_CCMP;
2454 case WPA_ALG_GCMP:
2455 return WLAN_CIPHER_SUITE_GCMP;
2456 case WPA_ALG_CCMP_256:
2457 return WLAN_CIPHER_SUITE_CCMP_256;
2458 case WPA_ALG_GCMP_256:
2459 return WLAN_CIPHER_SUITE_GCMP_256;
2460 case WPA_ALG_IGTK:
2461 return WLAN_CIPHER_SUITE_AES_CMAC;
2462 case WPA_ALG_BIP_GMAC_128:
2463 return WLAN_CIPHER_SUITE_BIP_GMAC_128;
2464 case WPA_ALG_BIP_GMAC_256:
2465 return WLAN_CIPHER_SUITE_BIP_GMAC_256;
2466 case WPA_ALG_BIP_CMAC_256:
2467 return WLAN_CIPHER_SUITE_BIP_CMAC_256;
2468 case WPA_ALG_SMS4:
2469 return WLAN_CIPHER_SUITE_SMS4;
2470 case WPA_ALG_KRK:
2471 return WLAN_CIPHER_SUITE_KRK;
2472 case WPA_ALG_NONE:
2473 case WPA_ALG_PMK:
2474 wpa_printf(MSG_ERROR, "nl80211: Unexpected encryption algorithm %d",
2475 alg);
2476 return 0;
2477 }
2478
2479 wpa_printf(MSG_ERROR, "nl80211: Unsupported encryption algorithm %d",
2480 alg);
2481 return 0;
2482}
2483
2484
2485static u32 wpa_cipher_to_cipher_suite(unsigned int cipher)
2486{
2487 switch (cipher) {
2488 case WPA_CIPHER_CCMP_256:
2489 return WLAN_CIPHER_SUITE_CCMP_256;
2490 case WPA_CIPHER_GCMP_256:
2491 return WLAN_CIPHER_SUITE_GCMP_256;
2492 case WPA_CIPHER_CCMP:
2493 return WLAN_CIPHER_SUITE_CCMP;
2494 case WPA_CIPHER_GCMP:
2495 return WLAN_CIPHER_SUITE_GCMP;
2496 case WPA_CIPHER_TKIP:
2497 return WLAN_CIPHER_SUITE_TKIP;
2498 case WPA_CIPHER_WEP104:
2499 return WLAN_CIPHER_SUITE_WEP104;
2500 case WPA_CIPHER_WEP40:
2501 return WLAN_CIPHER_SUITE_WEP40;
ae6f9272
JM
2502 case WPA_CIPHER_GTK_NOT_USED:
2503 return WLAN_CIPHER_SUITE_NO_GROUP_ADDR;
de4ed4a8
JM
2504 }
2505
2506 return 0;
2507}
2508
2509
2510static int wpa_cipher_to_cipher_suites(unsigned int ciphers, u32 suites[],
2511 int max_suites)
2512{
2513 int num_suites = 0;
2514
2515 if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP_256)
2516 suites[num_suites++] = WLAN_CIPHER_SUITE_CCMP_256;
2517 if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP_256)
2518 suites[num_suites++] = WLAN_CIPHER_SUITE_GCMP_256;
2519 if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP)
2520 suites[num_suites++] = WLAN_CIPHER_SUITE_CCMP;
2521 if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP)
2522 suites[num_suites++] = WLAN_CIPHER_SUITE_GCMP;
2523 if (num_suites < max_suites && ciphers & WPA_CIPHER_TKIP)
2524 suites[num_suites++] = WLAN_CIPHER_SUITE_TKIP;
2525 if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP104)
2526 suites[num_suites++] = WLAN_CIPHER_SUITE_WEP104;
2527 if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP40)
2528 suites[num_suites++] = WLAN_CIPHER_SUITE_WEP40;
2529
2530 return num_suites;
2531}
2532
2533
b658547d 2534#ifdef CONFIG_DRIVER_NL80211_QCA
b41f2684
CL
2535static int issue_key_mgmt_set_key(struct wpa_driver_nl80211_data *drv,
2536 const u8 *key, size_t key_len)
2537{
2538 struct nl_msg *msg;
a862e4a3 2539 int ret;
b41f2684 2540
15badebd 2541 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_KEY_MGMT_OFFLOAD))
b41f2684
CL
2542 return 0;
2543
9725b784 2544 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
a862e4a3
JM
2545 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
2546 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
2547 QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_SET_KEY) ||
2548 nla_put(msg, NL80211_ATTR_VENDOR_DATA, key_len, key)) {
bbd89bfc 2549 nl80211_nlmsg_clear(msg);
a862e4a3
JM
2550 nlmsg_free(msg);
2551 return -1;
2552 }
bbd89bfc 2553 ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1);
b41f2684
CL
2554 if (ret) {
2555 wpa_printf(MSG_DEBUG,
2556 "nl80211: Key management set key failed: ret=%d (%s)",
2557 ret, strerror(-ret));
2558 }
2559
b41f2684
CL
2560 return ret;
2561}
b658547d 2562#endif /* CONFIG_DRIVER_NL80211_QCA */
b41f2684
CL
2563
2564
9ebce9c5 2565static int wpa_driver_nl80211_set_key(const char *ifname, struct i802_bss *bss,
71934751
JM
2566 enum wpa_alg alg, const u8 *addr,
2567 int key_idx, int set_tx,
642187d6
JM
2568 const u8 *seq, size_t seq_len,
2569 const u8 *key, size_t key_len)
3f5285e8 2570{
a2e40bb6 2571 struct wpa_driver_nl80211_data *drv = bss->drv;
e472e1b4 2572 int ifindex;
34651767 2573 struct nl_msg *msg = NULL;
1ad1cdc2 2574 int ret;
dc01de8a 2575 int tdls = 0;
3f5285e8 2576
e472e1b4
AS
2577 /* Ignore for P2P Device */
2578 if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
2579 return 0;
2580
2581 ifindex = if_nametoindex(ifname);
8393e1a0 2582 wpa_printf(MSG_DEBUG, "%s: ifindex=%d (%s) alg=%d addr=%p key_idx=%d "
1ad1cdc2 2583 "set_tx=%d seq_len=%lu key_len=%lu",
8393e1a0 2584 __func__, ifindex, ifname, alg, addr, key_idx, set_tx,
3f5285e8 2585 (unsigned long) seq_len, (unsigned long) key_len);
8c66e185 2586#ifdef CONFIG_TDLS
dc01de8a 2587 if (key_idx == -1) {
8c66e185 2588 key_idx = 0;
dc01de8a
JM
2589 tdls = 1;
2590 }
8c66e185 2591#endif /* CONFIG_TDLS */
3f5285e8 2592
b658547d 2593#ifdef CONFIG_DRIVER_NL80211_QCA
15badebd
CL
2594 if (alg == WPA_ALG_PMK &&
2595 (drv->capa.flags & WPA_DRIVER_FLAGS_KEY_MGMT_OFFLOAD)) {
b41f2684
CL
2596 wpa_printf(MSG_DEBUG, "%s: calling issue_key_mgmt_set_key",
2597 __func__);
2598 ret = issue_key_mgmt_set_key(drv, key, key_len);
2599 return ret;
2600 }
b658547d 2601#endif /* CONFIG_DRIVER_NL80211_QCA */
b41f2684 2602
3f5285e8 2603 if (alg == WPA_ALG_NONE) {
95376e1a
JM
2604 msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_DEL_KEY);
2605 if (!msg)
2606 return -ENOBUFS;
3f5285e8 2607 } else {
34651767
JM
2608 u32 suite;
2609
2610 suite = wpa_alg_to_cipher_suite(alg, key_len);
2611 if (!suite)
2612 goto fail;
95376e1a
JM
2613 msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_NEW_KEY);
2614 if (!msg ||
a862e4a3 2615 nla_put(msg, NL80211_ATTR_KEY_DATA, key_len, key) ||
34651767 2616 nla_put_u32(msg, NL80211_ATTR_KEY_CIPHER, suite))
a862e4a3 2617 goto fail;
e6ef73f1 2618 wpa_hexdump_key(MSG_DEBUG, "nl80211: KEY_DATA", key, key_len);
3f5285e8
JM
2619 }
2620
e6ef73f1 2621 if (seq && seq_len) {
a862e4a3
JM
2622 if (nla_put(msg, NL80211_ATTR_KEY_SEQ, seq_len, seq))
2623 goto fail;
e6ef73f1
JM
2624 wpa_hexdump(MSG_DEBUG, "nl80211: KEY_SEQ", seq, seq_len);
2625 }
1ad1cdc2 2626
0382097e 2627 if (addr && !is_broadcast_ether_addr(addr)) {
3f5285e8 2628 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
a862e4a3
JM
2629 if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
2630 goto fail;
89c38e32
JM
2631
2632 if (alg != WPA_ALG_WEP && key_idx && !set_tx) {
2633 wpa_printf(MSG_DEBUG, " RSN IBSS RX GTK");
a862e4a3
JM
2634 if (nla_put_u32(msg, NL80211_ATTR_KEY_TYPE,
2635 NL80211_KEYTYPE_GROUP))
2636 goto fail;
89c38e32 2637 }
60ea8187 2638 } else if (addr && is_broadcast_ether_addr(addr)) {
8970bae8
JB
2639 struct nlattr *types;
2640
60ea8187 2641 wpa_printf(MSG_DEBUG, " broadcast key");
8970bae8
JB
2642
2643 types = nla_nest_start(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
a862e4a3
JM
2644 if (!types ||
2645 nla_put_flag(msg, NL80211_KEY_DEFAULT_TYPE_MULTICAST))
2646 goto fail;
8970bae8 2647 nla_nest_end(msg, types);
3f5285e8 2648 }
95376e1a 2649 if (nla_put_u8(msg, NL80211_ATTR_KEY_IDX, key_idx))
a862e4a3 2650 goto fail;
3f5285e8 2651
bbd89bfc 2652 ret = send_and_recv_msgs(drv, msg, NULL, key ? (void *) -1 : NULL);
15664ad0 2653 if ((ret == -ENOENT || ret == -ENOLINK) && alg == WPA_ALG_NONE)
1ad1cdc2
JM
2654 ret = 0;
2655 if (ret)
2656 wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d %s)",
2657 ret, strerror(-ret));
3f5285e8 2658
1ad1cdc2
JM
2659 /*
2660 * If we failed or don't need to set the default TX key (below),
2661 * we're done here.
2662 */
dc01de8a 2663 if (ret || !set_tx || alg == WPA_ALG_NONE || tdls)
1ad1cdc2 2664 return ret;
b1f625e0 2665 if (is_ap_interface(drv->nlmode) && addr &&
0382097e 2666 !is_broadcast_ether_addr(addr))
de12717a 2667 return ret;
3f5285e8 2668
95376e1a
JM
2669 msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_SET_KEY);
2670 if (!msg ||
a862e4a3 2671 nla_put_u8(msg, NL80211_ATTR_KEY_IDX, key_idx) ||
86f9b1c7
JM
2672 nla_put_flag(msg, (alg == WPA_ALG_IGTK ||
2673 alg == WPA_ALG_BIP_GMAC_128 ||
2674 alg == WPA_ALG_BIP_GMAC_256 ||
2675 alg == WPA_ALG_BIP_CMAC_256) ?
a862e4a3
JM
2676 NL80211_ATTR_KEY_DEFAULT_MGMT :
2677 NL80211_ATTR_KEY_DEFAULT))
2678 goto fail;
60ea8187 2679 if (addr && is_broadcast_ether_addr(addr)) {
8970bae8
JB
2680 struct nlattr *types;
2681
2682 types = nla_nest_start(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
a862e4a3
JM
2683 if (!types ||
2684 nla_put_flag(msg, NL80211_KEY_DEFAULT_TYPE_MULTICAST))
2685 goto fail;
8970bae8 2686 nla_nest_end(msg, types);
60ea8187 2687 } else if (addr) {
8970bae8
JB
2688 struct nlattr *types;
2689
2690 types = nla_nest_start(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
a862e4a3
JM
2691 if (!types ||
2692 nla_put_flag(msg, NL80211_KEY_DEFAULT_TYPE_UNICAST))
2693 goto fail;
8970bae8 2694 nla_nest_end(msg, types);
60ea8187 2695 }
3f5285e8 2696
1ad1cdc2
JM
2697 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
2698 if (ret == -ENOENT)
2699 ret = 0;
2700 if (ret)
2701 wpa_printf(MSG_DEBUG, "nl80211: set_key default failed; "
2702 "err=%d %s)", ret, strerror(-ret));
2703 return ret;
3f5285e8 2704
a862e4a3 2705fail:
bbd89bfc 2706 nl80211_nlmsg_clear(msg);
5883168a 2707 nlmsg_free(msg);
6241fcb1 2708 return -ENOBUFS;
3f5285e8
JM
2709}
2710
2711
71934751 2712static int nl_add_key(struct nl_msg *msg, enum wpa_alg alg,
0194fedb
JB
2713 int key_idx, int defkey,
2714 const u8 *seq, size_t seq_len,
2715 const u8 *key, size_t key_len)
2716{
2717 struct nlattr *key_attr = nla_nest_start(msg, NL80211_ATTR_KEY);
34651767
JM
2718 u32 suite;
2719
0194fedb
JB
2720 if (!key_attr)
2721 return -1;
2722
34651767
JM
2723 suite = wpa_alg_to_cipher_suite(alg, key_len);
2724 if (!suite)
2725 return -1;
2726
a862e4a3
JM
2727 if (defkey && alg == WPA_ALG_IGTK) {
2728 if (nla_put_flag(msg, NL80211_KEY_DEFAULT_MGMT))
2729 return -1;
2730 } else if (defkey) {
2731 if (nla_put_flag(msg, NL80211_KEY_DEFAULT))
2732 return -1;
2733 }
0194fedb 2734
a862e4a3 2735 if (nla_put_u8(msg, NL80211_KEY_IDX, key_idx) ||
34651767 2736 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) ||
a862e4a3
JM
2737 (seq && seq_len &&
2738 nla_put(msg, NL80211_KEY_SEQ, seq_len, seq)) ||
2739 nla_put(msg, NL80211_KEY_DATA, key_len, key))
2740 return -1;
0194fedb
JB
2741
2742 nla_nest_end(msg, key_attr);
2743
2744 return 0;
0194fedb
JB
2745}
2746
c811d5bc 2747
cfaab580
ZY
2748static int nl80211_set_conn_keys(struct wpa_driver_associate_params *params,
2749 struct nl_msg *msg)
2750{
2751 int i, privacy = 0;
2752 struct nlattr *nl_keys, *nl_key;
2753
2754 for (i = 0; i < 4; i++) {
2755 if (!params->wep_key[i])
2756 continue;
2757 privacy = 1;
2758 break;
2759 }
ce04af5a
JM
2760 if (params->wps == WPS_MODE_PRIVACY)
2761 privacy = 1;
2762 if (params->pairwise_suite &&
2763 params->pairwise_suite != WPA_CIPHER_NONE)
2764 privacy = 1;
2765
cfaab580
ZY
2766 if (!privacy)
2767 return 0;
2768
a862e4a3
JM
2769 if (nla_put_flag(msg, NL80211_ATTR_PRIVACY))
2770 return -ENOBUFS;
cfaab580
ZY
2771
2772 nl_keys = nla_nest_start(msg, NL80211_ATTR_KEYS);
2773 if (!nl_keys)
a862e4a3 2774 return -ENOBUFS;
cfaab580
ZY
2775
2776 for (i = 0; i < 4; i++) {
2777 if (!params->wep_key[i])
2778 continue;
2779
2780 nl_key = nla_nest_start(msg, i);
a862e4a3
JM
2781 if (!nl_key ||
2782 nla_put(msg, NL80211_KEY_DATA, params->wep_key_len[i],
2783 params->wep_key[i]) ||
2784 nla_put_u32(msg, NL80211_KEY_CIPHER,
2785 params->wep_key_len[i] == 5 ?
2786 WLAN_CIPHER_SUITE_WEP40 :
2787 WLAN_CIPHER_SUITE_WEP104) ||
2788 nla_put_u8(msg, NL80211_KEY_IDX, i) ||
2789 (i == params->wep_tx_keyidx &&
2790 nla_put_flag(msg, NL80211_KEY_DEFAULT)))
2791 return -ENOBUFS;
cfaab580
ZY
2792
2793 nla_nest_end(msg, nl_key);
2794 }
2795 nla_nest_end(msg, nl_keys);
2796
2797 return 0;
cfaab580
ZY
2798}
2799
2800
477af8f8
JM
2801int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
2802 const u8 *addr, int cmd, u16 reason_code,
2803 int local_state_change)
c2a04078 2804{
a862e4a3 2805 int ret;
c2a04078
JM
2806 struct nl_msg *msg;
2807
9725b784 2808 if (!(msg = nl80211_drv_msg(drv, 0, cmd)) ||
a862e4a3
JM
2809 nla_put_u16(msg, NL80211_ATTR_REASON_CODE, reason_code) ||
2810 (addr && nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) ||
2811 (local_state_change &&
2812 nla_put_flag(msg, NL80211_ATTR_LOCAL_STATE_CHANGE))) {
2813 nlmsg_free(msg);
2814 return -1;
2815 }
c2a04078
JM
2816
2817 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
c2a04078 2818 if (ret) {
3b7ea880
BG
2819 wpa_dbg(drv->ctx, MSG_DEBUG,
2820 "nl80211: MLME command failed: reason=%u ret=%d (%s)",
2821 reason_code, ret, strerror(-ret));
c2a04078 2822 }
c2a04078
JM
2823 return ret;
2824}
3f5285e8
JM
2825
2826
cfaab580 2827static int wpa_driver_nl80211_disconnect(struct wpa_driver_nl80211_data *drv,
817762d9 2828 int reason_code)
cfaab580 2829{
3f53c006
JJ
2830 int ret;
2831
817762d9 2832 wpa_printf(MSG_DEBUG, "%s(reason_code=%d)", __func__, reason_code);
add9b7a4 2833 nl80211_mark_disconnected(drv);
817762d9 2834 /* Disconnect command doesn't need BSSID - it uses cached value */
3f53c006
JJ
2835 ret = wpa_driver_nl80211_mlme(drv, NULL, NL80211_CMD_DISCONNECT,
2836 reason_code, 0);
2837 /*
2838 * For locally generated disconnect, supplicant already generates a
2839 * DEAUTH event, so ignore the event from NL80211.
2840 */
2841 drv->ignore_next_local_disconnect = ret == 0;
2842
2843 return ret;
cfaab580
ZY
2844}
2845
2846
9ebce9c5
JM
2847static int wpa_driver_nl80211_deauthenticate(struct i802_bss *bss,
2848 const u8 *addr, int reason_code)
3f5285e8 2849{
a2e40bb6 2850 struct wpa_driver_nl80211_data *drv = bss->drv;
d6a36f39 2851 int ret;
9392c9be
AS
2852
2853 if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
2854 nl80211_mark_disconnected(drv);
666e508c 2855 return nl80211_leave_ibss(drv, 1);
9392c9be 2856 }
cfaab580 2857 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME))
817762d9 2858 return wpa_driver_nl80211_disconnect(drv, reason_code);
2e75a2b3
JM
2859 wpa_printf(MSG_DEBUG, "%s(addr=" MACSTR " reason_code=%d)",
2860 __func__, MAC2STR(addr), reason_code);
add9b7a4 2861 nl80211_mark_disconnected(drv);
d6a36f39
JM
2862 ret = wpa_driver_nl80211_mlme(drv, addr, NL80211_CMD_DEAUTHENTICATE,
2863 reason_code, 0);
2864 /*
2865 * For locally generated deauthenticate, supplicant already generates a
2866 * DEAUTH event, so ignore the event from NL80211.
2867 */
2868 drv->ignore_next_local_deauth = ret == 0;
2869 return ret;
3f5285e8
JM
2870}
2871
2872
536fd62d
JM
2873static void nl80211_copy_auth_params(struct wpa_driver_nl80211_data *drv,
2874 struct wpa_driver_auth_params *params)
2875{
2876 int i;
2877
2878 drv->auth_freq = params->freq;
2879 drv->auth_alg = params->auth_alg;
2880 drv->auth_wep_tx_keyidx = params->wep_tx_keyidx;
2881 drv->auth_local_state_change = params->local_state_change;
2882 drv->auth_p2p = params->p2p;
2883
2884 if (params->bssid)
2885 os_memcpy(drv->auth_bssid_, params->bssid, ETH_ALEN);
2886 else
2887 os_memset(drv->auth_bssid_, 0, ETH_ALEN);
2888
2889 if (params->ssid) {
2890 os_memcpy(drv->auth_ssid, params->ssid, params->ssid_len);
2891 drv->auth_ssid_len = params->ssid_len;
2892 } else
2893 drv->auth_ssid_len = 0;
2894
2895
2896 os_free(drv->auth_ie);
2897 drv->auth_ie = NULL;
2898 drv->auth_ie_len = 0;
2899 if (params->ie) {
2900 drv->auth_ie = os_malloc(params->ie_len);
2901 if (drv->auth_ie) {
2902 os_memcpy(drv->auth_ie, params->ie, params->ie_len);
2903 drv->auth_ie_len = params->ie_len;
2904 }
2905 }
2906
2907 for (i = 0; i < 4; i++) {
2908 if (params->wep_key[i] && params->wep_key_len[i] &&
2909 params->wep_key_len[i] <= 16) {
2910 os_memcpy(drv->auth_wep_key[i], params->wep_key[i],
2911 params->wep_key_len[i]);
2912 drv->auth_wep_key_len[i] = params->wep_key_len[i];
2913 } else
2914 drv->auth_wep_key_len[i] = 0;
2915 }
2916}
2917
2918
4bd71954
JM
2919static void nl80211_unmask_11b_rates(struct i802_bss *bss)
2920{
2921 struct wpa_driver_nl80211_data *drv = bss->drv;
2922
2923 if (is_p2p_net_interface(drv->nlmode) || !drv->disabled_11b_rates)
2924 return;
2925
2926 /*
2927 * Looks like we failed to unmask 11b rates previously. This could
2928 * happen, e.g., if the interface was down at the point in time when a
2929 * P2P group was terminated.
2930 */
2931 wpa_printf(MSG_DEBUG,
2932 "nl80211: Interface %s mode is for non-P2P, but 11b rates were disabled - re-enable them",
2933 bss->ifname);
2934 nl80211_disable_11b_rates(drv, drv->ifindex, 0);
2935}
2936
2937
c2a04078 2938static int wpa_driver_nl80211_authenticate(
9ebce9c5 2939 struct i802_bss *bss, struct wpa_driver_auth_params *params)
c2a04078 2940{
a2e40bb6 2941 struct wpa_driver_nl80211_data *drv = bss->drv;
a0b2f99b 2942 int ret = -1, i;
c2a04078
JM
2943 struct nl_msg *msg;
2944 enum nl80211_auth_type type;
2f4f73b1 2945 enum nl80211_iftype nlmode;
6d6f4bb8 2946 int count = 0;
536fd62d
JM
2947 int is_retry;
2948
4bd71954
JM
2949 nl80211_unmask_11b_rates(bss);
2950
536fd62d
JM
2951 is_retry = drv->retry_auth;
2952 drv->retry_auth = 0;
e8d70a73 2953 drv->ignore_deauth_event = 0;
c2a04078 2954
add9b7a4 2955 nl80211_mark_disconnected(drv);
e6b8efeb 2956 os_memset(drv->auth_bssid, 0, ETH_ALEN);
add9b7a4
JM
2957 if (params->bssid)
2958 os_memcpy(drv->auth_attempt_bssid, params->bssid, ETH_ALEN);
2959 else
2960 os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
af473088 2961 /* FIX: IBSS mode */
2f4f73b1
EP
2962 nlmode = params->p2p ?
2963 NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
2964 if (drv->nlmode != nlmode &&
9ebce9c5 2965 wpa_driver_nl80211_set_mode(bss, nlmode) < 0)
4a867032
JM
2966 return -1;
2967
6d6f4bb8 2968retry:
c2a04078
JM
2969 wpa_printf(MSG_DEBUG, "nl80211: Authenticate (ifindex=%d)",
2970 drv->ifindex);
a0b2f99b 2971
9725b784
JM
2972 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_AUTHENTICATE);
2973 if (!msg)
2974 goto fail;
0194fedb 2975
a0b2f99b
JM
2976 for (i = 0; i < 4; i++) {
2977 if (!params->wep_key[i])
2978 continue;
9ebce9c5 2979 wpa_driver_nl80211_set_key(bss->ifname, bss, WPA_ALG_WEP,
2ea2fcc7 2980 NULL, i,
a0b2f99b
JM
2981 i == params->wep_tx_keyidx, NULL, 0,
2982 params->wep_key[i],
2983 params->wep_key_len[i]);
0194fedb
JB
2984 if (params->wep_tx_keyidx != i)
2985 continue;
2986 if (nl_add_key(msg, WPA_ALG_WEP, i, 1, NULL, 0,
9725b784
JM
2987 params->wep_key[i], params->wep_key_len[i]))
2988 goto fail;
a0b2f99b
JM
2989 }
2990
c2a04078
JM
2991 if (params->bssid) {
2992 wpa_printf(MSG_DEBUG, " * bssid=" MACSTR,
2993 MAC2STR(params->bssid));
a862e4a3
JM
2994 if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
2995 goto fail;
c2a04078
JM
2996 }
2997 if (params->freq) {
2998 wpa_printf(MSG_DEBUG, " * freq=%d", params->freq);
a862e4a3
JM
2999 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq))
3000 goto fail;
c2a04078
JM
3001 }
3002 if (params->ssid) {
3003 wpa_hexdump_ascii(MSG_DEBUG, " * SSID",
3004 params->ssid, params->ssid_len);
a862e4a3
JM
3005 if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len,
3006 params->ssid))
3007 goto fail;
c2a04078
JM
3008 }
3009 wpa_hexdump(MSG_DEBUG, " * IEs", params->ie, params->ie_len);
a862e4a3
JM
3010 if (params->ie &&
3011 nla_put(msg, NL80211_ATTR_IE, params->ie_len, params->ie))
3012 goto fail;
569fed90
JM
3013 if (params->sae_data) {
3014 wpa_hexdump(MSG_DEBUG, " * SAE data", params->sae_data,
3015 params->sae_data_len);
a862e4a3
JM
3016 if (nla_put(msg, NL80211_ATTR_SAE_DATA, params->sae_data_len,
3017 params->sae_data))
3018 goto fail;
569fed90 3019 }
abd9fafa 3020 if (params->auth_alg & WPA_AUTH_ALG_OPEN)
c2a04078 3021 type = NL80211_AUTHTYPE_OPEN_SYSTEM;
abd9fafa 3022 else if (params->auth_alg & WPA_AUTH_ALG_SHARED)
c2a04078 3023 type = NL80211_AUTHTYPE_SHARED_KEY;
abd9fafa 3024 else if (params->auth_alg & WPA_AUTH_ALG_LEAP)
c2a04078 3025 type = NL80211_AUTHTYPE_NETWORK_EAP;
abd9fafa 3026 else if (params->auth_alg & WPA_AUTH_ALG_FT)
c2a04078 3027 type = NL80211_AUTHTYPE_FT;
569fed90
JM
3028 else if (params->auth_alg & WPA_AUTH_ALG_SAE)
3029 type = NL80211_AUTHTYPE_SAE;
c2a04078 3030 else
a862e4a3 3031 goto fail;
c2a04078 3032 wpa_printf(MSG_DEBUG, " * Auth Type %d", type);
a862e4a3
JM
3033 if (nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
3034 goto fail;
77339912
JM
3035 if (params->local_state_change) {
3036 wpa_printf(MSG_DEBUG, " * Local state change only");
a862e4a3
JM
3037 if (nla_put_flag(msg, NL80211_ATTR_LOCAL_STATE_CHANGE))
3038 goto fail;
77339912 3039 }
c2a04078
JM
3040
3041 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
3042 msg = NULL;
3043 if (ret) {
3b7ea880
BG
3044 wpa_dbg(drv->ctx, MSG_DEBUG,
3045 "nl80211: MLME command failed (auth): ret=%d (%s)",
3046 ret, strerror(-ret));
6d6f4bb8 3047 count++;
77339912
JM
3048 if (ret == -EALREADY && count == 1 && params->bssid &&
3049 !params->local_state_change) {
6d6f4bb8
JM
3050 /*
3051 * mac80211 does not currently accept new
3052 * authentication if we are already authenticated. As a
3053 * workaround, force deauthentication and try again.
3054 */
3055 wpa_printf(MSG_DEBUG, "nl80211: Retry authentication "
3056 "after forced deauthentication");
e8d70a73 3057 drv->ignore_deauth_event = 1;
6d6f4bb8 3058 wpa_driver_nl80211_deauthenticate(
5205c4f9 3059 bss, params->bssid,
6d6f4bb8
JM
3060 WLAN_REASON_PREV_AUTH_NOT_VALID);
3061 nlmsg_free(msg);
3062 goto retry;
3063 }
536fd62d
JM
3064
3065 if (ret == -ENOENT && params->freq && !is_retry) {
3066 /*
3067 * cfg80211 has likely expired the BSS entry even
3068 * though it was previously available in our internal
3069 * BSS table. To recover quickly, start a single
3070 * channel scan on the specified channel.
3071 */
3072 struct wpa_driver_scan_params scan;
3073 int freqs[2];
3074
3075 os_memset(&scan, 0, sizeof(scan));
3076 scan.num_ssids = 1;
3077 if (params->ssid) {
3078 scan.ssids[0].ssid = params->ssid;
3079 scan.ssids[0].ssid_len = params->ssid_len;
3080 }
3081 freqs[0] = params->freq;
3082 freqs[1] = 0;
3083 scan.freqs = freqs;
3084 wpa_printf(MSG_DEBUG, "nl80211: Trigger single "
3085 "channel scan to refresh cfg80211 BSS "
3086 "entry");
3087 ret = wpa_driver_nl80211_scan(bss, &scan);
3088 if (ret == 0) {
3089 nl80211_copy_auth_params(drv, params);
3090 drv->scan_for_auth = 1;
3091 }
8c3ba078
JM
3092 } else if (is_retry) {
3093 /*
3094 * Need to indicate this with an event since the return
3095 * value from the retry is not delivered to core code.
3096 */
3097 union wpa_event_data event;
3098 wpa_printf(MSG_DEBUG, "nl80211: Authentication retry "
3099 "failed");
3100 os_memset(&event, 0, sizeof(event));
3101 os_memcpy(event.timeout_event.addr, drv->auth_bssid_,
3102 ETH_ALEN);
3103 wpa_supplicant_event(drv->ctx, EVENT_AUTH_TIMED_OUT,
3104 &event);
536fd62d 3105 }
a862e4a3
JM
3106 } else {
3107 wpa_printf(MSG_DEBUG,
3108 "nl80211: Authentication request send successfully");
c2a04078 3109 }
c2a04078 3110
a862e4a3 3111fail:
c2a04078
JM
3112 nlmsg_free(msg);
3113 return ret;
3114}
3115
3116
f3407c66 3117int wpa_driver_nl80211_authenticate_retry(struct wpa_driver_nl80211_data *drv)
536fd62d
JM
3118{
3119 struct wpa_driver_auth_params params;
834ee56f 3120 struct i802_bss *bss = drv->first_bss;
536fd62d
JM
3121 int i;
3122
3123 wpa_printf(MSG_DEBUG, "nl80211: Try to authenticate again");
3124
3125 os_memset(&params, 0, sizeof(params));
3126 params.freq = drv->auth_freq;
3127 params.auth_alg = drv->auth_alg;
3128 params.wep_tx_keyidx = drv->auth_wep_tx_keyidx;
3129 params.local_state_change = drv->auth_local_state_change;
3130 params.p2p = drv->auth_p2p;
3131
3132 if (!is_zero_ether_addr(drv->auth_bssid_))
3133 params.bssid = drv->auth_bssid_;
3134
3135 if (drv->auth_ssid_len) {
3136 params.ssid = drv->auth_ssid;
3137 params.ssid_len = drv->auth_ssid_len;
3138 }
3139
3140 params.ie = drv->auth_ie;
3141 params.ie_len = drv->auth_ie_len;
3142
3143 for (i = 0; i < 4; i++) {
3144 if (drv->auth_wep_key_len[i]) {
3145 params.wep_key[i] = drv->auth_wep_key[i];
3146 params.wep_key_len[i] = drv->auth_wep_key_len[i];
3147 }
3148 }
3149
3150 drv->retry_auth = 1;
3151 return wpa_driver_nl80211_authenticate(bss, &params);
3152}
3153
3154
a11241fa
JB
3155static int wpa_driver_nl80211_send_frame(struct i802_bss *bss,
3156 const void *data, size_t len,
55231068
JM
3157 int encrypt, int noack,
3158 unsigned int freq, int no_cck,
2d3943ce
AO
3159 int offchanok, unsigned int wait_time,
3160 const u16 *csa_offs,
3161 size_t csa_offs_len)
a11241fa
JB
3162{
3163 struct wpa_driver_nl80211_data *drv = bss->drv;
3164 u64 cookie;
41cc50d1 3165 int res;
a11241fa 3166
c7caac56
JM
3167 if (freq == 0 && drv->nlmode == NL80211_IFTYPE_ADHOC) {
3168 freq = nl80211_get_assoc_freq(drv);
3169 wpa_printf(MSG_DEBUG,
3170 "nl80211: send_frame - Use assoc_freq=%u for IBSS",
3171 freq);
3172 }
af964484
JM
3173 if (freq == 0) {
3174 wpa_printf(MSG_DEBUG, "nl80211: send_frame - Use bss->freq=%u",
3175 bss->freq);
55231068 3176 freq = bss->freq;
af964484 3177 }
55231068 3178
739faee2 3179 if (drv->use_monitor) {
981cf85a 3180 wpa_printf(MSG_DEBUG, "nl80211: send_frame(freq=%u bss->freq=%u) -> send_monitor",
739faee2 3181 freq, bss->freq);
981cf85a 3182 return nl80211_send_monitor(drv, data, len, encrypt, noack);
739faee2 3183 }
a11241fa 3184
739faee2 3185 wpa_printf(MSG_DEBUG, "nl80211: send_frame -> send_frame_cmd");
41cc50d1 3186 res = nl80211_send_frame_cmd(bss, freq, wait_time, data, len,
2d3943ce
AO
3187 &cookie, no_cck, noack, offchanok,
3188 csa_offs, csa_offs_len);
41cc50d1
JM
3189 if (res == 0 && !noack) {
3190 const struct ieee80211_mgmt *mgmt;
3191 u16 fc;
3192
3193 mgmt = (const struct ieee80211_mgmt *) data;
3194 fc = le_to_host16(mgmt->frame_control);
3195 if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
3196 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION) {
3197 wpa_printf(MSG_MSGDUMP,
3198 "nl80211: Update send_action_cookie from 0x%llx to 0x%llx",
3199 (long long unsigned int)
3200 drv->send_action_cookie,
3201 (long long unsigned int) cookie);
3202 drv->send_action_cookie = cookie;
3203 }
3204 }
3205
3206 return res;
a11241fa
JB
3207}
3208
3209
9ebce9c5
JM
3210static int wpa_driver_nl80211_send_mlme(struct i802_bss *bss, const u8 *data,
3211 size_t data_len, int noack,
3212 unsigned int freq, int no_cck,
3213 int offchanok,
2d3943ce
AO
3214 unsigned int wait_time,
3215 const u16 *csa_offs,
3216 size_t csa_offs_len)
2c2010ac 3217{
a2e40bb6 3218 struct wpa_driver_nl80211_data *drv = bss->drv;
2c2010ac 3219 struct ieee80211_mgmt *mgmt;
7a47d567 3220 int encrypt = 1;
2c2010ac
JM
3221 u16 fc;
3222
3223 mgmt = (struct ieee80211_mgmt *) data;
3224 fc = le_to_host16(mgmt->frame_control);
f95a4524
PF
3225 wpa_printf(MSG_DEBUG, "nl80211: send_mlme - da= " MACSTR
3226 " noack=%d freq=%u no_cck=%d offchanok=%d wait_time=%u fc=0x%x (%s) nlmode=%d",
3227 MAC2STR(mgmt->da), noack, freq, no_cck, offchanok, wait_time,
3228 fc, fc2str(fc), drv->nlmode);
2c2010ac 3229
8e12685c
AS
3230 if ((is_sta_interface(drv->nlmode) ||
3231 drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) &&
5582a5d1
JB
3232 WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
3233 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_RESP) {
3234 /*
3235 * The use of last_mgmt_freq is a bit of a hack,
3236 * but it works due to the single-threaded nature
3237 * of wpa_supplicant.
3238 */
af964484
JM
3239 if (freq == 0) {
3240 wpa_printf(MSG_DEBUG, "nl80211: Use last_mgmt_freq=%d",
3241 drv->last_mgmt_freq);
55231068 3242 freq = drv->last_mgmt_freq;
af964484 3243 }
55231068 3244 return nl80211_send_frame_cmd(bss, freq, 0,
88df0ef7 3245 data, data_len, NULL, 1, noack,
2d3943ce 3246 1, csa_offs, csa_offs_len);
5582a5d1
JB
3247 }
3248
61cbe2ff 3249 if (drv->device_ap_sme && is_ap_interface(drv->nlmode)) {
af964484
JM
3250 if (freq == 0) {
3251 wpa_printf(MSG_DEBUG, "nl80211: Use bss->freq=%d",
3252 bss->freq);
55231068 3253 freq = bss->freq;
af964484 3254 }
b5671498
JM
3255 return nl80211_send_frame_cmd(bss, freq,
3256 (int) freq == bss->freq ? 0 :
3257 wait_time,
d8d6b32e
DG
3258 data, data_len,
3259 &drv->send_action_cookie,
2d3943ce
AO
3260 no_cck, noack, offchanok,
3261 csa_offs, csa_offs_len);
86957e62
JM
3262 }
3263
2c2010ac
JM
3264 if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
3265 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_AUTH) {
3266 /*
3267 * Only one of the authentication frame types is encrypted.
3268 * In order for static WEP encryption to work properly (i.e.,
3269 * to not encrypt the frame), we need to tell mac80211 about
3270 * the frames that must not be encrypted.
3271 */
3272 u16 auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
3273 u16 auth_trans = le_to_host16(mgmt->u.auth.auth_transaction);
7a47d567
JB
3274 if (auth_alg != WLAN_AUTH_SHARED_KEY || auth_trans != 3)
3275 encrypt = 0;
2c2010ac
JM
3276 }
3277
739faee2 3278 wpa_printf(MSG_DEBUG, "nl80211: send_mlme -> send_frame");
a11241fa 3279 return wpa_driver_nl80211_send_frame(bss, data, data_len, encrypt,
55231068 3280 noack, freq, no_cck, offchanok,
2d3943ce
AO
3281 wait_time, csa_offs,
3282 csa_offs_len);
55231068
JM
3283}
3284
3285
cae87abd
JM
3286static int nl80211_put_basic_rates(struct nl_msg *msg, const int *basic_rates)
3287{
3288 u8 rates[NL80211_MAX_SUPP_RATES];
3289 u8 rates_len = 0;
3290 int i;
3291
3292 if (!basic_rates)
3293 return 0;
3294
3295 for (i = 0; i < NL80211_MAX_SUPP_RATES && basic_rates[i] >= 0; i++)
3296 rates[rates_len++] = basic_rates[i] / 5;
3297
3298 return nla_put(msg, NL80211_ATTR_BSS_BASIC_RATES, rates_len, rates);
3299}
3300
3301
31357268 3302static int nl80211_set_bss(struct i802_bss *bss, int cts, int preamble,
e5693c47 3303 int slot, int ht_opmode, int ap_isolate,
cae87abd 3304 const int *basic_rates)
31357268
JM
3305{
3306 struct wpa_driver_nl80211_data *drv = bss->drv;
3307 struct nl_msg *msg;
3308
13f83980 3309 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_BSS)) ||
a862e4a3
JM
3310 (cts >= 0 &&
3311 nla_put_u8(msg, NL80211_ATTR_BSS_CTS_PROT, cts)) ||
3312 (preamble >= 0 &&
3313 nla_put_u8(msg, NL80211_ATTR_BSS_SHORT_PREAMBLE, preamble)) ||
3314 (slot >= 0 &&
3315 nla_put_u8(msg, NL80211_ATTR_BSS_SHORT_SLOT_TIME, slot)) ||
3316 (ht_opmode >= 0 &&
3317 nla_put_u16(msg, NL80211_ATTR_BSS_HT_OPMODE, ht_opmode)) ||
3318 (ap_isolate >= 0 &&
cae87abd
JM
3319 nla_put_u8(msg, NL80211_ATTR_AP_ISOLATE, ap_isolate)) ||
3320 nl80211_put_basic_rates(msg, basic_rates)) {
3321 nlmsg_free(msg);
3322 return -ENOBUFS;
e5693c47
JM
3323 }
3324
31357268 3325 return send_and_recv_msgs(drv, msg, NULL, NULL);
31357268
JM
3326}
3327
3328
3c4ca363
VN
3329static int wpa_driver_nl80211_set_acl(void *priv,
3330 struct hostapd_acl_params *params)
3331{
3332 struct i802_bss *bss = priv;
3333 struct wpa_driver_nl80211_data *drv = bss->drv;
3334 struct nl_msg *msg;
f429ec44 3335 struct nl_msg *acl;
3c4ca363 3336 unsigned int i;
a862e4a3 3337 int ret;
3c4ca363
VN
3338
3339 if (!(drv->capa.max_acl_mac_addrs))
3340 return -ENOTSUP;
3341
3342 if (params->num_mac_acl > drv->capa.max_acl_mac_addrs)
3343 return -ENOTSUP;
3344
3c4ca363
VN
3345 wpa_printf(MSG_DEBUG, "nl80211: Set %s ACL (num_mac_acl=%u)",
3346 params->acl_policy ? "Accept" : "Deny", params->num_mac_acl);
3347
f429ec44
JM
3348 acl = nlmsg_alloc();
3349 if (!acl)
3350 return -ENOMEM;
3351 for (i = 0; i < params->num_mac_acl; i++) {
3352 if (nla_put(acl, i + 1, ETH_ALEN, params->mac_acl[i].addr)) {
3353 nlmsg_free(acl);
3354 return -ENOMEM;
3355 }
3356 }
3357
9725b784 3358 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_MAC_ACL)) ||
a862e4a3
JM
3359 nla_put_u32(msg, NL80211_ATTR_ACL_POLICY, params->acl_policy ?
3360 NL80211_ACL_POLICY_DENY_UNLESS_LISTED :
3361 NL80211_ACL_POLICY_ACCEPT_UNLESS_LISTED) ||
f429ec44 3362 nla_put_nested(msg, NL80211_ATTR_MAC_ADDRS, acl)) {
a862e4a3 3363 nlmsg_free(msg);
f429ec44 3364 nlmsg_free(acl);
a862e4a3
JM
3365 return -ENOMEM;
3366 }
f429ec44 3367 nlmsg_free(acl);
3c4ca363
VN
3368
3369 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
3c4ca363
VN
3370 if (ret) {
3371 wpa_printf(MSG_DEBUG, "nl80211: Failed to set MAC ACL: %d (%s)",
3372 ret, strerror(-ret));
3373 }
3374
3c4ca363
VN
3375 return ret;
3376}
3377
3378
85e1fad8
JM
3379static int nl80211_put_beacon_int(struct nl_msg *msg, int beacon_int)
3380{
3381 if (beacon_int > 0) {
3382 wpa_printf(MSG_DEBUG, " * beacon_int=%d", beacon_int);
3383 return nla_put_u32(msg, NL80211_ATTR_BEACON_INTERVAL,
3384 beacon_int);
3385 }
3386
3387 return 0;
3388}
3389
3390
19c3b566
JM
3391static int wpa_driver_nl80211_set_ap(void *priv,
3392 struct wpa_driver_ap_params *params)
d2440ba0 3393{
a2e40bb6
FF
3394 struct i802_bss *bss = priv;
3395 struct wpa_driver_nl80211_data *drv = bss->drv;
d2440ba0
JM
3396 struct nl_msg *msg;
3397 u8 cmd = NL80211_CMD_NEW_BEACON;
3398 int ret;
b4fd6fab 3399 int beacon_set;
b11d1d64 3400 int num_suites;
da1080d7 3401 int smps_mode;
de4ed4a8 3402 u32 suites[10], suite;
b11d1d64 3403 u32 ver;
b4fd6fab 3404
f33c8606 3405 beacon_set = params->reenable ? 0 : bss->beacon_set;
d2440ba0 3406
d2440ba0 3407 wpa_printf(MSG_DEBUG, "nl80211: Set beacon (beacon_set=%d)",
b4fd6fab
JM
3408 beacon_set);
3409 if (beacon_set)
d2440ba0
JM
3410 cmd = NL80211_CMD_SET_BEACON;
3411
b92e08fc
JM
3412 wpa_hexdump(MSG_DEBUG, "nl80211: Beacon head",
3413 params->head, params->head_len);
b92e08fc
JM
3414 wpa_hexdump(MSG_DEBUG, "nl80211: Beacon tail",
3415 params->tail, params->tail_len);
13f83980 3416 wpa_printf(MSG_DEBUG, "nl80211: ifindex=%d", bss->ifindex);
b92e08fc 3417 wpa_printf(MSG_DEBUG, "nl80211: beacon_int=%d", params->beacon_int);
b92e08fc 3418 wpa_printf(MSG_DEBUG, "nl80211: dtim_period=%d", params->dtim_period);
b92e08fc
JM
3419 wpa_hexdump_ascii(MSG_DEBUG, "nl80211: ssid",
3420 params->ssid, params->ssid_len);
13f83980 3421 if (!(msg = nl80211_bss_msg(bss, 0, cmd)) ||
a862e4a3
JM
3422 nla_put(msg, NL80211_ATTR_BEACON_HEAD, params->head_len,
3423 params->head) ||
3424 nla_put(msg, NL80211_ATTR_BEACON_TAIL, params->tail_len,
3425 params->tail) ||
85e1fad8 3426 nl80211_put_beacon_int(msg, params->beacon_int) ||
a862e4a3
JM
3427 nla_put_u32(msg, NL80211_ATTR_DTIM_PERIOD, params->dtim_period) ||
3428 nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid))
3429 goto fail;
b92e08fc
JM
3430 if (params->proberesp && params->proberesp_len) {
3431 wpa_hexdump(MSG_DEBUG, "nl80211: proberesp (offload)",
3432 params->proberesp, params->proberesp_len);
a862e4a3
JM
3433 if (nla_put(msg, NL80211_ATTR_PROBE_RESP, params->proberesp_len,
3434 params->proberesp))
3435 goto fail;
b92e08fc 3436 }
97a7a0b5
JM
3437 switch (params->hide_ssid) {
3438 case NO_SSID_HIDING:
b92e08fc 3439 wpa_printf(MSG_DEBUG, "nl80211: hidden SSID not in use");
a862e4a3
JM
3440 if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
3441 NL80211_HIDDEN_SSID_NOT_IN_USE))
3442 goto fail;
97a7a0b5
JM
3443 break;
3444 case HIDDEN_SSID_ZERO_LEN:
b92e08fc 3445 wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero len");
a862e4a3
JM
3446 if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
3447 NL80211_HIDDEN_SSID_ZERO_LEN))
3448 goto fail;
97a7a0b5
JM
3449 break;
3450 case HIDDEN_SSID_ZERO_CONTENTS:
b92e08fc 3451 wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero contents");
a862e4a3
JM
3452 if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
3453 NL80211_HIDDEN_SSID_ZERO_CONTENTS))
3454 goto fail;
97a7a0b5
JM
3455 break;
3456 }
b92e08fc 3457 wpa_printf(MSG_DEBUG, "nl80211: privacy=%d", params->privacy);
a862e4a3
JM
3458 if (params->privacy &&
3459 nla_put_flag(msg, NL80211_ATTR_PRIVACY))
3460 goto fail;
b92e08fc 3461 wpa_printf(MSG_DEBUG, "nl80211: auth_algs=0x%x", params->auth_algs);
b11d1d64
JM
3462 if ((params->auth_algs & (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) ==
3463 (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) {
3464 /* Leave out the attribute */
a862e4a3
JM
3465 } else if (params->auth_algs & WPA_AUTH_ALG_SHARED) {
3466 if (nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE,
3467 NL80211_AUTHTYPE_SHARED_KEY))
3468 goto fail;
3469 } else {
3470 if (nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE,
3471 NL80211_AUTHTYPE_OPEN_SYSTEM))
3472 goto fail;
3473 }
b11d1d64 3474
b92e08fc 3475 wpa_printf(MSG_DEBUG, "nl80211: wpa_version=0x%x", params->wpa_version);
b11d1d64
JM
3476 ver = 0;
3477 if (params->wpa_version & WPA_PROTO_WPA)
3478 ver |= NL80211_WPA_VERSION_1;
3479 if (params->wpa_version & WPA_PROTO_RSN)
3480 ver |= NL80211_WPA_VERSION_2;
a862e4a3
JM
3481 if (ver &&
3482 nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
3483 goto fail;
b11d1d64 3484
b92e08fc
JM
3485 wpa_printf(MSG_DEBUG, "nl80211: key_mgmt_suites=0x%x",
3486 params->key_mgmt_suites);
b11d1d64
JM
3487 num_suites = 0;
3488 if (params->key_mgmt_suites & WPA_KEY_MGMT_IEEE8021X)
3489 suites[num_suites++] = WLAN_AKM_SUITE_8021X;
3490 if (params->key_mgmt_suites & WPA_KEY_MGMT_PSK)
3491 suites[num_suites++] = WLAN_AKM_SUITE_PSK;
a862e4a3
JM
3492 if (num_suites &&
3493 nla_put(msg, NL80211_ATTR_AKM_SUITES, num_suites * sizeof(u32),
3494 suites))
3495 goto fail;
b11d1d64 3496
533fe09b 3497 if (params->key_mgmt_suites & WPA_KEY_MGMT_IEEE8021X_NO_WPA &&
a862e4a3
JM
3498 params->pairwise_ciphers & (WPA_CIPHER_WEP104 | WPA_CIPHER_WEP40) &&
3499 nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT))
3500 goto fail;
9f12614b 3501
b92e08fc
JM
3502 wpa_printf(MSG_DEBUG, "nl80211: pairwise_ciphers=0x%x",
3503 params->pairwise_ciphers);
de4ed4a8
JM
3504 num_suites = wpa_cipher_to_cipher_suites(params->pairwise_ciphers,
3505 suites, ARRAY_SIZE(suites));
a862e4a3
JM
3506 if (num_suites &&
3507 nla_put(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
3508 num_suites * sizeof(u32), suites))
3509 goto fail;
b11d1d64 3510
b92e08fc
JM
3511 wpa_printf(MSG_DEBUG, "nl80211: group_cipher=0x%x",
3512 params->group_cipher);
de4ed4a8 3513 suite = wpa_cipher_to_cipher_suite(params->group_cipher);
a862e4a3
JM
3514 if (suite &&
3515 nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, suite))
3516 goto fail;
d2440ba0 3517
da1080d7
EP
3518 switch (params->smps_mode) {
3519 case HT_CAP_INFO_SMPS_DYNAMIC:
3520 wpa_printf(MSG_DEBUG, "nl80211: SMPS mode - dynamic");
3521 smps_mode = NL80211_SMPS_DYNAMIC;
3522 break;
3523 case HT_CAP_INFO_SMPS_STATIC:
3524 wpa_printf(MSG_DEBUG, "nl80211: SMPS mode - static");
3525 smps_mode = NL80211_SMPS_STATIC;
3526 break;
3527 default:
3528 /* invalid - fallback to smps off */
3529 case HT_CAP_INFO_SMPS_DISABLED:
3530 wpa_printf(MSG_DEBUG, "nl80211: SMPS mode - off");
3531 smps_mode = NL80211_SMPS_OFF;
3532 break;
3533 }
a862e4a3
JM
3534 if (nla_put_u32(msg, NL80211_ATTR_SMPS_MODE, smps_mode))
3535 goto fail;
da1080d7 3536
fb91db56 3537 if (params->beacon_ies) {
b92e08fc
JM
3538 wpa_hexdump_buf(MSG_DEBUG, "nl80211: beacon_ies",
3539 params->beacon_ies);
a862e4a3
JM
3540 if (nla_put(msg, NL80211_ATTR_IE,
3541 wpabuf_len(params->beacon_ies),
3542 wpabuf_head(params->beacon_ies)))
3543 goto fail;
fb91db56
JM
3544 }
3545 if (params->proberesp_ies) {
b92e08fc
JM
3546 wpa_hexdump_buf(MSG_DEBUG, "nl80211: proberesp_ies",
3547 params->proberesp_ies);
a862e4a3
JM
3548 if (nla_put(msg, NL80211_ATTR_IE_PROBE_RESP,
3549 wpabuf_len(params->proberesp_ies),
3550 wpabuf_head(params->proberesp_ies)))
3551 goto fail;
fb91db56
JM
3552 }
3553 if (params->assocresp_ies) {
b92e08fc
JM
3554 wpa_hexdump_buf(MSG_DEBUG, "nl80211: assocresp_ies",
3555 params->assocresp_ies);
a862e4a3
JM
3556 if (nla_put(msg, NL80211_ATTR_IE_ASSOC_RESP,
3557 wpabuf_len(params->assocresp_ies),
3558 wpabuf_head(params->assocresp_ies)))
3559 goto fail;
fb91db56
JM
3560 }
3561
a0133ee1 3562 if (drv->capa.flags & WPA_DRIVER_FLAGS_INACTIVITY_TIMER) {
b92e08fc
JM
3563 wpa_printf(MSG_DEBUG, "nl80211: ap_max_inactivity=%d",
3564 params->ap_max_inactivity);
a862e4a3
JM
3565 if (nla_put_u16(msg, NL80211_ATTR_INACTIVITY_TIMEOUT,
3566 params->ap_max_inactivity))
3567 goto fail;
a0133ee1
VT
3568 }
3569
abb8d08b
EP
3570#ifdef CONFIG_P2P
3571 if (params->p2p_go_ctwindow > 0) {
3572 if (drv->p2p_go_ctwindow_supported) {
3573 wpa_printf(MSG_DEBUG, "nl80211: P2P GO ctwindow=%d",
3574 params->p2p_go_ctwindow);
3575 if (nla_put_u8(msg, NL80211_ATTR_P2P_CTWINDOW,
3576 params->p2p_go_ctwindow))
3577 goto fail;
3578 } else {
3579 wpa_printf(MSG_INFO,
3580 "nl80211: Driver does not support CTWindow configuration - ignore this parameter");
3581 }
3582 }
3583#endif /* CONFIG_P2P */
3584
d2440ba0
JM
3585 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
3586 if (ret) {
3587 wpa_printf(MSG_DEBUG, "nl80211: Beacon set failed: %d (%s)",
3588 ret, strerror(-ret));
b4fd6fab 3589 } else {
b4fd6fab 3590 bss->beacon_set = 1;
31357268 3591 nl80211_set_bss(bss, params->cts_protect, params->preamble,
d03e8d11 3592 params->short_slot_time, params->ht_opmode,
e5693c47 3593 params->isolate, params->basic_rates);
e87ef751
PX
3594 if (beacon_set && params->freq &&
3595 params->freq->bandwidth != bss->bandwidth) {
3596 wpa_printf(MSG_DEBUG,
3597 "nl80211: Update BSS %s bandwidth: %d -> %d",
3598 bss->ifname, bss->bandwidth,
3599 params->freq->bandwidth);
3600 ret = nl80211_set_channel(bss, params->freq, 1);
3601 if (ret) {
3602 wpa_printf(MSG_DEBUG,
3603 "nl80211: Frequency set failed: %d (%s)",
3604 ret, strerror(-ret));
3605 } else {
3606 wpa_printf(MSG_DEBUG,
3607 "nl80211: Frequency set succeeded for ht2040 coex");
3608 bss->bandwidth = params->freq->bandwidth;
3609 }
3610 } else if (!beacon_set) {
3611 /*
3612 * cfg80211 updates the driver on frequence change in AP
3613 * mode only at the point when beaconing is started, so
3614 * set the initial value here.
3615 */
3616 bss->bandwidth = params->freq->bandwidth;
3617 }
b4fd6fab 3618 }
d2440ba0 3619 return ret;
a862e4a3 3620fail:
5883168a 3621 nlmsg_free(msg);
d2440ba0
JM
3622 return -ENOBUFS;
3623}
3624
3625
1c4ffa87 3626static int nl80211_put_freq_params(struct nl_msg *msg,
72b2605f 3627 const struct hostapd_freq_params *freq)
1581b38b 3628{
1fc4ab23 3629 wpa_printf(MSG_DEBUG, " * freq=%d", freq->freq);
a862e4a3
JM
3630 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq->freq))
3631 return -ENOBUFS;
3632
1fc4ab23
JM
3633 wpa_printf(MSG_DEBUG, " * vht_enabled=%d", freq->vht_enabled);
3634 wpa_printf(MSG_DEBUG, " * ht_enabled=%d", freq->ht_enabled);
3635
89b800d7 3636 if (freq->vht_enabled) {
a862e4a3
JM
3637 enum nl80211_chan_width cw;
3638
1fc4ab23 3639 wpa_printf(MSG_DEBUG, " * bandwidth=%d", freq->bandwidth);
89b800d7
JB
3640 switch (freq->bandwidth) {
3641 case 20:
a862e4a3 3642 cw = NL80211_CHAN_WIDTH_20;
89b800d7
JB
3643 break;
3644 case 40:
a862e4a3 3645 cw = NL80211_CHAN_WIDTH_40;
89b800d7
JB
3646 break;
3647 case 80:
3648 if (freq->center_freq2)
a862e4a3 3649 cw = NL80211_CHAN_WIDTH_80P80;
89b800d7 3650 else
a862e4a3 3651 cw = NL80211_CHAN_WIDTH_80;
89b800d7
JB
3652 break;
3653 case 160:
a862e4a3 3654 cw = NL80211_CHAN_WIDTH_160;
89b800d7
JB
3655 break;
3656 default:
1c4ffa87 3657 return -EINVAL;
89b800d7 3658 }
a862e4a3 3659
1fc4ab23
JM
3660 wpa_printf(MSG_DEBUG, " * channel_width=%d", cw);
3661 wpa_printf(MSG_DEBUG, " * center_freq1=%d",
3662 freq->center_freq1);
3663 wpa_printf(MSG_DEBUG, " * center_freq2=%d",
3664 freq->center_freq2);
a862e4a3
JM
3665 if (nla_put_u32(msg, NL80211_ATTR_CHANNEL_WIDTH, cw) ||
3666 nla_put_u32(msg, NL80211_ATTR_CENTER_FREQ1,
3667 freq->center_freq1) ||
3668 (freq->center_freq2 &&
3669 nla_put_u32(msg, NL80211_ATTR_CENTER_FREQ2,
3670 freq->center_freq2)))
3671 return -ENOBUFS;
89b800d7 3672 } else if (freq->ht_enabled) {
a862e4a3
JM
3673 enum nl80211_channel_type ct;
3674
1fc4ab23
JM
3675 wpa_printf(MSG_DEBUG, " * sec_channel_offset=%d",
3676 freq->sec_channel_offset);
89b800d7 3677 switch (freq->sec_channel_offset) {
f019981a 3678 case -1:
a862e4a3 3679 ct = NL80211_CHAN_HT40MINUS;
f019981a
JM
3680 break;
3681 case 1:
a862e4a3 3682 ct = NL80211_CHAN_HT40PLUS;
f019981a
JM
3683 break;
3684 default:
a862e4a3 3685 ct = NL80211_CHAN_HT20;
f019981a
JM
3686 break;
3687 }
a862e4a3 3688
1fc4ab23 3689 wpa_printf(MSG_DEBUG, " * channel_type=%d", ct);
a862e4a3
JM
3690 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE, ct))
3691 return -ENOBUFS;
f019981a 3692 }
1c4ffa87 3693 return 0;
1c4ffa87
AO
3694}
3695
3696
e87ef751
PX
3697static int nl80211_set_channel(struct i802_bss *bss,
3698 struct hostapd_freq_params *freq, int set_chan)
1c4ffa87
AO
3699{
3700 struct wpa_driver_nl80211_data *drv = bss->drv;
3701 struct nl_msg *msg;
3702 int ret;
3703
3704 wpa_printf(MSG_DEBUG,
3705 "nl80211: Set freq %d (ht_enabled=%d, vht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
3706 freq->freq, freq->ht_enabled, freq->vht_enabled,
3707 freq->bandwidth, freq->center_freq1, freq->center_freq2);
1c4ffa87 3708
9725b784
JM
3709 msg = nl80211_drv_msg(drv, 0, set_chan ? NL80211_CMD_SET_CHANNEL :
3710 NL80211_CMD_SET_WIPHY);
3711 if (!msg || nl80211_put_freq_params(msg, freq) < 0) {
a862e4a3
JM
3712 nlmsg_free(msg);
3713 return -1;
3714 }
1581b38b 3715
d2440ba0 3716 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
e4fb2167 3717 if (ret == 0) {
89b800d7 3718 bss->freq = freq->freq;
1581b38b 3719 return 0;
e4fb2167 3720 }
f019981a 3721 wpa_printf(MSG_DEBUG, "nl80211: Failed to set channel (freq=%d): "
89b800d7 3722 "%d (%s)", freq->freq, ret, strerror(-ret));
1581b38b
JM
3723 return -1;
3724}
3725
0f4e8b4f 3726
95ab6063
AN
3727static u32 sta_flags_nl80211(int flags)
3728{
3729 u32 f = 0;
3730
3731 if (flags & WPA_STA_AUTHORIZED)
3732 f |= BIT(NL80211_STA_FLAG_AUTHORIZED);
3733 if (flags & WPA_STA_WMM)
3734 f |= BIT(NL80211_STA_FLAG_WME);
3735 if (flags & WPA_STA_SHORT_PREAMBLE)
3736 f |= BIT(NL80211_STA_FLAG_SHORT_PREAMBLE);
3737 if (flags & WPA_STA_MFP)
3738 f |= BIT(NL80211_STA_FLAG_MFP);
45b722f1
AN
3739 if (flags & WPA_STA_TDLS_PEER)
3740 f |= BIT(NL80211_STA_FLAG_TDLS_PEER);
7a228b5c
BC
3741 if (flags & WPA_STA_AUTHENTICATED)
3742 f |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
95ab6063
AN
3743
3744 return f;
3745}
3746
3747
7c7e7877
BC
3748#ifdef CONFIG_MESH
3749static u32 sta_plink_state_nl80211(enum mesh_plink_state state)
3750{
3751 switch (state) {
3752 case PLINK_LISTEN:
3753 return NL80211_PLINK_LISTEN;
3754 case PLINK_OPEN_SENT:
3755 return NL80211_PLINK_OPN_SNT;
3756 case PLINK_OPEN_RCVD:
3757 return NL80211_PLINK_OPN_RCVD;
3758 case PLINK_CNF_RCVD:
3759 return NL80211_PLINK_CNF_RCVD;
3760 case PLINK_ESTAB:
3761 return NL80211_PLINK_ESTAB;
3762 case PLINK_HOLDING:
3763 return NL80211_PLINK_HOLDING;
3764 case PLINK_BLOCKED:
3765 return NL80211_PLINK_BLOCKED;
3766 default:
3767 wpa_printf(MSG_ERROR, "nl80211: Invalid mesh plink state %d",
3768 state);
3769 }
3770 return -1;
3771}
3772#endif /* CONFIG_MESH */
3773
3774
62847751 3775static int wpa_driver_nl80211_sta_add(void *priv,
0f4e8b4f
JM
3776 struct hostapd_sta_add_params *params)
3777{
a2e40bb6
FF
3778 struct i802_bss *bss = priv;
3779 struct wpa_driver_nl80211_data *drv = bss->drv;
8970bae8 3780 struct nl_msg *msg;
95ab6063 3781 struct nl80211_sta_flag_update upd;
0f4e8b4f
JM
3782 int ret = -ENOBUFS;
3783
45b722f1
AN
3784 if ((params->flags & WPA_STA_TDLS_PEER) &&
3785 !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
3786 return -EOPNOTSUPP;
3787
e4dea253
JM
3788 wpa_printf(MSG_DEBUG, "nl80211: %s STA " MACSTR,
3789 params->set ? "Set" : "Add", MAC2STR(params->addr));
13f83980
JM
3790 msg = nl80211_bss_msg(bss, 0, params->set ? NL80211_CMD_SET_STATION :
3791 NL80211_CMD_NEW_STATION);
3792 if (!msg || nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->addr))
a862e4a3 3793 goto fail;
5551bc9c
BC
3794
3795 if (!params->set || (params->flags & WPA_STA_TDLS_PEER)) {
5551bc9c
BC
3796 wpa_hexdump(MSG_DEBUG, " * supported rates",
3797 params->supp_rates, params->supp_rates_len);
a862e4a3
JM
3798 wpa_printf(MSG_DEBUG, " * capability=0x%x",
3799 params->capability);
3800 if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_RATES,
3801 params->supp_rates_len, params->supp_rates) ||
3802 nla_put_u16(msg, NL80211_ATTR_STA_CAPABILITY,
3803 params->capability))
3804 goto fail;
e503861f
JM
3805
3806 if (params->ht_capabilities) {
3807 wpa_hexdump(MSG_DEBUG, " * ht_capabilities",
3808 (u8 *) params->ht_capabilities,
3809 sizeof(*params->ht_capabilities));
a862e4a3
JM
3810 if (nla_put(msg, NL80211_ATTR_HT_CAPABILITY,
3811 sizeof(*params->ht_capabilities),
3812 params->ht_capabilities))
3813 goto fail;
e503861f
JM
3814 }
3815
3816 if (params->vht_capabilities) {
3817 wpa_hexdump(MSG_DEBUG, " * vht_capabilities",
3818 (u8 *) params->vht_capabilities,
3819 sizeof(*params->vht_capabilities));
a862e4a3
JM
3820 if (nla_put(msg, NL80211_ATTR_VHT_CAPABILITY,
3821 sizeof(*params->vht_capabilities),
3822 params->vht_capabilities))
3823 goto fail;
e503861f
JM
3824 }
3825
e503861f
JM
3826 if (params->ext_capab) {
3827 wpa_hexdump(MSG_DEBUG, " * ext_capab",
3828 params->ext_capab, params->ext_capab_len);
a862e4a3
JM
3829 if (nla_put(msg, NL80211_ATTR_STA_EXT_CAPABILITY,
3830 params->ext_capab_len, params->ext_capab))
3831 goto fail;
e503861f 3832 }
5551bc9c 3833 }
45b722f1 3834 if (!params->set) {
f11b72c3
JM
3835 if (params->aid) {
3836 wpa_printf(MSG_DEBUG, " * aid=%u", params->aid);
a862e4a3
JM
3837 if (nla_put_u16(msg, NL80211_ATTR_STA_AID, params->aid))
3838 goto fail;
f11b72c3
JM
3839 } else {
3840 /*
3841 * cfg80211 validates that AID is non-zero, so we have
3842 * to make this a non-zero value for the TDLS case where
3843 * a dummy STA entry is used for now.
3844 */
3845 wpa_printf(MSG_DEBUG, " * aid=1 (TDLS workaround)");
a862e4a3
JM
3846 if (nla_put_u16(msg, NL80211_ATTR_STA_AID, 1))
3847 goto fail;
f11b72c3 3848 }
e4dea253
JM
3849 wpa_printf(MSG_DEBUG, " * listen_interval=%u",
3850 params->listen_interval);
a862e4a3
JM
3851 if (nla_put_u16(msg, NL80211_ATTR_STA_LISTEN_INTERVAL,
3852 params->listen_interval))
3853 goto fail;
e112764e
JM
3854 } else if (params->aid && (params->flags & WPA_STA_TDLS_PEER)) {
3855 wpa_printf(MSG_DEBUG, " * peer_aid=%u", params->aid);
a862e4a3
JM
3856 if (nla_put_u16(msg, NL80211_ATTR_PEER_AID, params->aid))
3857 goto fail;
45b722f1 3858 }
05a8d422 3859
8a458116
MK
3860 if (params->vht_opmode_enabled) {
3861 wpa_printf(MSG_DEBUG, " * opmode=%u", params->vht_opmode);
a862e4a3
JM
3862 if (nla_put_u8(msg, NL80211_ATTR_OPMODE_NOTIF,
3863 params->vht_opmode))
3864 goto fail;
8a458116
MK
3865 }
3866
efc64886
SD
3867 if (params->supp_channels) {
3868 wpa_hexdump(MSG_DEBUG, " * supported channels",
3869 params->supp_channels, params->supp_channels_len);
a862e4a3
JM
3870 if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_CHANNELS,
3871 params->supp_channels_len, params->supp_channels))
3872 goto fail;
efc64886
SD
3873 }
3874
3875 if (params->supp_oper_classes) {
3876 wpa_hexdump(MSG_DEBUG, " * supported operating classes",
3877 params->supp_oper_classes,
3878 params->supp_oper_classes_len);
a862e4a3
JM
3879 if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES,
3880 params->supp_oper_classes_len,
3881 params->supp_oper_classes))
3882 goto fail;
efc64886
SD
3883 }
3884
95ab6063 3885 os_memset(&upd, 0, sizeof(upd));
7e31703e
BC
3886 upd.set = sta_flags_nl80211(params->flags);
3887 upd.mask = upd.set | sta_flags_nl80211(params->flags_mask);
e4dea253
JM
3888 wpa_printf(MSG_DEBUG, " * flags set=0x%x mask=0x%x",
3889 upd.set, upd.mask);
a862e4a3
JM
3890 if (nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd))
3891 goto fail;
95ab6063 3892
7c7e7877 3893#ifdef CONFIG_MESH
a862e4a3
JM
3894 if (params->plink_state &&
3895 nla_put_u8(msg, NL80211_ATTR_STA_PLINK_STATE,
3896 sta_plink_state_nl80211(params->plink_state)))
3897 goto fail;
7c7e7877
BC
3898#endif /* CONFIG_MESH */
3899
774bfa62 3900 if (params->flags & WPA_STA_WMM) {
8970bae8
JB
3901 struct nlattr *wme = nla_nest_start(msg, NL80211_ATTR_STA_WME);
3902
e4dea253 3903 wpa_printf(MSG_DEBUG, " * qosinfo=0x%x", params->qosinfo);
a862e4a3
JM
3904 if (!wme ||
3905 nla_put_u8(msg, NL80211_STA_WME_UAPSD_QUEUES,
3906 params->qosinfo & WMM_QOSINFO_STA_AC_MASK) ||
3907 nla_put_u8(msg, NL80211_STA_WME_MAX_SP,
3908 (params->qosinfo >> WMM_QOSINFO_STA_SP_SHIFT) &
3909 WMM_QOSINFO_STA_SP_MASK))
3910 goto fail;
8970bae8 3911 nla_nest_end(msg, wme);
774bfa62
EP
3912 }
3913
0f4e8b4f 3914 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5883168a 3915 msg = NULL;
0f4e8b4f 3916 if (ret)
45b722f1
AN
3917 wpa_printf(MSG_DEBUG, "nl80211: NL80211_CMD_%s_STATION "
3918 "result: %d (%s)", params->set ? "SET" : "NEW", ret,
3919 strerror(-ret));
0f4e8b4f
JM
3920 if (ret == -EEXIST)
3921 ret = 0;
a862e4a3 3922fail:
5883168a 3923 nlmsg_free(msg);
0f4e8b4f
JM
3924 return ret;
3925}
3926
3927
97ed9a06
KP
3928static void rtnl_neigh_delete_fdb_entry(struct i802_bss *bss, const u8 *addr)
3929{
3930#ifdef CONFIG_LIBNL3_ROUTE
3931 struct wpa_driver_nl80211_data *drv = bss->drv;
3932 struct rtnl_neigh *rn;
3933 struct nl_addr *nl_addr;
3934 int err;
3935
3936 rn = rtnl_neigh_alloc();
3937 if (!rn)
3938 return;
3939
3940 rtnl_neigh_set_family(rn, AF_BRIDGE);
3941 rtnl_neigh_set_ifindex(rn, bss->ifindex);
3942 nl_addr = nl_addr_build(AF_BRIDGE, (void *) addr, ETH_ALEN);
3943 if (!nl_addr) {
3944 rtnl_neigh_put(rn);
3945 return;
3946 }
3947 rtnl_neigh_set_lladdr(rn, nl_addr);
3948
3949 err = rtnl_neigh_delete(drv->rtnl_sk, rn, 0);
3950 if (err < 0) {
3951 wpa_printf(MSG_DEBUG, "nl80211: bridge FDB entry delete for "
3952 MACSTR " ifindex=%d failed: %s", MAC2STR(addr),
3953 bss->ifindex, nl_geterror(err));
3954 } else {
3955 wpa_printf(MSG_DEBUG, "nl80211: deleted bridge FDB entry for "
3956 MACSTR, MAC2STR(addr));
3957 }
3958
3959 nl_addr_put(nl_addr);
3960 rtnl_neigh_put(rn);
3961#endif /* CONFIG_LIBNL3_ROUTE */
3962}
3963
3964
59d7148a
JM
3965static int wpa_driver_nl80211_sta_remove(struct i802_bss *bss, const u8 *addr,
3966 int deauth, u16 reason_code)
0f4e8b4f 3967{
a2e40bb6 3968 struct wpa_driver_nl80211_data *drv = bss->drv;
0f4e8b4f
JM
3969 struct nl_msg *msg;
3970 int ret;
3971
13f83980 3972 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_DEL_STATION)) ||
a862e4a3
JM
3973 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
3974 (deauth == 0 &&
3975 nla_put_u8(msg, NL80211_ATTR_MGMT_SUBTYPE,
3976 WLAN_FC_STYPE_DISASSOC)) ||
3977 (deauth == 1 &&
3978 nla_put_u8(msg, NL80211_ATTR_MGMT_SUBTYPE,
3979 WLAN_FC_STYPE_DEAUTH)) ||
3980 (reason_code &&
3981 nla_put_u16(msg, NL80211_ATTR_REASON_CODE, reason_code))) {
3982 nlmsg_free(msg);
3983 return -ENOBUFS;
3984 }
0f4e8b4f
JM
3985
3986 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
83e7bb0e
JM
3987 wpa_printf(MSG_DEBUG, "nl80211: sta_remove -> DEL_STATION %s " MACSTR
3988 " --> %d (%s)",
3989 bss->ifname, MAC2STR(addr), ret, strerror(-ret));
97ed9a06
KP
3990
3991 if (drv->rtnl_sk)
3992 rtnl_neigh_delete_fdb_entry(bss, addr);
3993
0f4e8b4f
JM
3994 if (ret == -ENOENT)
3995 return 0;
3996 return ret;
0f4e8b4f
JM
3997}
3998
1581b38b 3999
f3407c66 4000void nl80211_remove_iface(struct wpa_driver_nl80211_data *drv, int ifidx)
0915d02c
JM
4001{
4002 struct nl_msg *msg;
de884303 4003 struct wpa_driver_nl80211_data *drv2;
0915d02c 4004
c6e8e8e4
JM
4005 wpa_printf(MSG_DEBUG, "nl80211: Remove interface ifindex=%d", ifidx);
4006
2135f224 4007 /* stop listening for EAPOL on this interface */
de884303
JM
4008 dl_list_for_each(drv2, &drv->global->interfaces,
4009 struct wpa_driver_nl80211_data, list)
4010 del_ifidx(drv2, ifidx);
2135f224 4011
95376e1a 4012 msg = nl80211_ifindex_msg(drv, ifidx, 0, NL80211_CMD_DEL_INTERFACE);
0915d02c
JM
4013 if (send_and_recv_msgs(drv, msg, NULL, NULL) == 0)
4014 return;
e748062b 4015 wpa_printf(MSG_ERROR, "Failed to remove interface (ifidx=%d)", ifidx);
0915d02c
JM
4016}
4017
4018
a1922f93
JM
4019static const char * nl80211_iftype_str(enum nl80211_iftype mode)
4020{
4021 switch (mode) {
4022 case NL80211_IFTYPE_ADHOC:
4023 return "ADHOC";
4024 case NL80211_IFTYPE_STATION:
4025 return "STATION";
4026 case NL80211_IFTYPE_AP:
4027 return "AP";
1045ec36
JM
4028 case NL80211_IFTYPE_AP_VLAN:
4029 return "AP_VLAN";
4030 case NL80211_IFTYPE_WDS:
4031 return "WDS";
a1922f93
JM
4032 case NL80211_IFTYPE_MONITOR:
4033 return "MONITOR";
1045ec36
JM
4034 case NL80211_IFTYPE_MESH_POINT:
4035 return "MESH_POINT";
a1922f93
JM
4036 case NL80211_IFTYPE_P2P_CLIENT:
4037 return "P2P_CLIENT";
4038 case NL80211_IFTYPE_P2P_GO:
4039 return "P2P_GO";
7aad838c
NS
4040 case NL80211_IFTYPE_P2P_DEVICE:
4041 return "P2P_DEVICE";
a1922f93
JM
4042 default:
4043 return "unknown";
4044 }
4045}
4046
4047
a35187e7
KH
4048static int nl80211_create_iface_once(struct wpa_driver_nl80211_data *drv,
4049 const char *ifname,
4050 enum nl80211_iftype iftype,
d6dcfcda
DS
4051 const u8 *addr, int wds,
4052 int (*handler)(struct nl_msg *, void *),
4053 void *arg)
0915d02c 4054{
8970bae8 4055 struct nl_msg *msg;
0915d02c
JM
4056 int ifidx;
4057 int ret = -ENOBUFS;
4058
a1922f93
JM
4059 wpa_printf(MSG_DEBUG, "nl80211: Create interface iftype %d (%s)",
4060 iftype, nl80211_iftype_str(iftype));
4061
56f77852
JM
4062 msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_NEW_INTERFACE);
4063 if (!msg ||
a862e4a3
JM
4064 nla_put_string(msg, NL80211_ATTR_IFNAME, ifname) ||
4065 nla_put_u32(msg, NL80211_ATTR_IFTYPE, iftype))
4066 goto fail;
0915d02c
JM
4067
4068 if (iftype == NL80211_IFTYPE_MONITOR) {
8970bae8 4069 struct nlattr *flags;
0915d02c 4070
8970bae8 4071 flags = nla_nest_start(msg, NL80211_ATTR_MNTR_FLAGS);
a862e4a3
JM
4072 if (!flags ||
4073 nla_put_flag(msg, NL80211_MNTR_FLAG_COOK_FRAMES))
4074 goto fail;
0915d02c 4075
8970bae8 4076 nla_nest_end(msg, flags);
fbbfcbac 4077 } else if (wds) {
a862e4a3
JM
4078 if (nla_put_u8(msg, NL80211_ATTR_4ADDR, wds))
4079 goto fail;
0915d02c
JM
4080 }
4081
52f5877a
IP
4082 /*
4083 * Tell cfg80211 that the interface belongs to the socket that created
4084 * it, and the interface should be deleted when the socket is closed.
4085 */
a862e4a3
JM
4086 if (nla_put_flag(msg, NL80211_ATTR_IFACE_SOCKET_OWNER))
4087 goto fail;
52f5877a 4088
d6dcfcda 4089 ret = send_and_recv_msgs(drv, msg, handler, arg);
5883168a 4090 msg = NULL;
0915d02c 4091 if (ret) {
a862e4a3 4092 fail:
5883168a 4093 nlmsg_free(msg);
a35187e7
KH
4094 wpa_printf(MSG_ERROR, "Failed to create interface %s: %d (%s)",
4095 ifname, ret, strerror(-ret));
0915d02c
JM
4096 return ret;
4097 }
4098
f632e483 4099 if (iftype == NL80211_IFTYPE_P2P_DEVICE)
6bae92e0 4100 return 0;
6bae92e0 4101
0915d02c 4102 ifidx = if_nametoindex(ifname);
c6e8e8e4
JM
4103 wpa_printf(MSG_DEBUG, "nl80211: New interface %s created: ifindex=%d",
4104 ifname, ifidx);
0915d02c
JM
4105
4106 if (ifidx <= 0)
4107 return -1;
4108
147848ec
JM
4109 /*
4110 * Some virtual interfaces need to process EAPOL packets and events on
4111 * the parent interface. This is used mainly with hostapd.
4112 */
4113 if (drv->hostapd ||
4114 iftype == NL80211_IFTYPE_AP_VLAN ||
4115 iftype == NL80211_IFTYPE_WDS ||
4116 iftype == NL80211_IFTYPE_MONITOR) {
4117 /* start listening for EAPOL on this interface */
4118 add_ifidx(drv, ifidx);
4119 }
2135f224 4120
7bfc47c3 4121 if (addr && iftype != NL80211_IFTYPE_MONITOR &&
c81eff1a 4122 linux_set_ifhwaddr(drv->global->ioctl_sock, ifname, addr)) {
41d931ee
JM
4123 nl80211_remove_iface(drv, ifidx);
4124 return -1;
2135f224 4125 }
2135f224 4126
0915d02c
JM
4127 return ifidx;
4128}
22a7c9d7
JM
4129
4130
f3407c66
JM
4131int nl80211_create_iface(struct wpa_driver_nl80211_data *drv,
4132 const char *ifname, enum nl80211_iftype iftype,
4133 const u8 *addr, int wds,
4134 int (*handler)(struct nl_msg *, void *),
4135 void *arg, int use_existing)
a35187e7
KH
4136{
4137 int ret;
4138
d6dcfcda
DS
4139 ret = nl80211_create_iface_once(drv, ifname, iftype, addr, wds, handler,
4140 arg);
a35187e7 4141
ffbf1eaa 4142 /* if error occurred and interface exists already */
a35187e7 4143 if (ret == -ENFILE && if_nametoindex(ifname)) {
2aec4f3c
JM
4144 if (use_existing) {
4145 wpa_printf(MSG_DEBUG, "nl80211: Continue using existing interface %s",
4146 ifname);
6997f8ba
JM
4147 if (addr && iftype != NL80211_IFTYPE_MONITOR &&
4148 linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
4149 addr) < 0 &&
4150 (linux_set_iface_flags(drv->global->ioctl_sock,
4151 ifname, 0) < 0 ||
4152 linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
4153 addr) < 0 ||
4154 linux_set_iface_flags(drv->global->ioctl_sock,
4155 ifname, 1) < 0))
4156 return -1;
2aec4f3c
JM
4157 return -ENFILE;
4158 }
a35187e7
KH
4159 wpa_printf(MSG_INFO, "Try to remove and re-create %s", ifname);
4160
4161 /* Try to remove the interface that was already there. */
4162 nl80211_remove_iface(drv, if_nametoindex(ifname));
4163
4164 /* Try to create the interface again */
fbbfcbac 4165 ret = nl80211_create_iface_once(drv, ifname, iftype, addr,
d6dcfcda 4166 wds, handler, arg);
a35187e7
KH
4167 }
4168
3e208481
JM
4169 if (ret >= 0 && is_p2p_net_interface(iftype)) {
4170 wpa_printf(MSG_DEBUG,
4171 "nl80211: Interface %s created for P2P - disable 11b rates",
4172 ifname);
4e5cb1a3 4173 nl80211_disable_11b_rates(drv, ret, 1);
3e208481 4174 }
4e5cb1a3 4175
a35187e7
KH
4176 return ret;
4177}
0915d02c 4178
2135f224 4179
3fd1cefb
JB
4180static int nl80211_setup_ap(struct i802_bss *bss)
4181{
4182 struct wpa_driver_nl80211_data *drv = bss->drv;
4183
748c0ac0
JM
4184 wpa_printf(MSG_DEBUG, "nl80211: Setup AP(%s) - device_ap_sme=%d use_monitor=%d",
4185 bss->ifname, drv->device_ap_sme, drv->use_monitor);
36488c05 4186
a11241fa
JB
4187 /*
4188 * Disable Probe Request reporting unless we need it in this way for
4189 * devices that include the AP SME, in the other case (unless using
4190 * monitor iface) we'll get it through the nl_mgmt socket instead.
4191 */
4192 if (!drv->device_ap_sme)
4193 wpa_driver_nl80211_probe_req_report(bss, 0);
4194
4195 if (!drv->device_ap_sme && !drv->use_monitor)
4196 if (nl80211_mgmt_subscribe_ap(bss))
4197 return -1;
4198
a6cc0602
JM
4199 if (drv->device_ap_sme && !drv->use_monitor)
4200 if (nl80211_mgmt_subscribe_ap_dev_sme(bss))
4201 return -1;
4202
a11241fa 4203 if (!drv->device_ap_sme && drv->use_monitor &&
3fd1cefb
JB
4204 nl80211_create_monitor_interface(drv) &&
4205 !drv->device_ap_sme)
4206 return -1;
4207
4208 if (drv->device_ap_sme &&
4209 wpa_driver_nl80211_probe_req_report(bss, 1) < 0) {
4210 wpa_printf(MSG_DEBUG, "nl80211: Failed to enable "
4211 "Probe Request frame reporting in AP mode");
4212 /* Try to survive without this */
4213 }
4214
4215 return 0;
4216}
4217
4218
4219static void nl80211_teardown_ap(struct i802_bss *bss)
4220{
4221 struct wpa_driver_nl80211_data *drv = bss->drv;
4222
748c0ac0
JM
4223 wpa_printf(MSG_DEBUG, "nl80211: Teardown AP(%s) - device_ap_sme=%d use_monitor=%d",
4224 bss->ifname, drv->device_ap_sme, drv->use_monitor);
a6cc0602 4225 if (drv->device_ap_sme) {
3fd1cefb 4226 wpa_driver_nl80211_probe_req_report(bss, 0);
a6cc0602
JM
4227 if (!drv->use_monitor)
4228 nl80211_mgmt_unsubscribe(bss, "AP teardown (dev SME)");
4229 } else if (drv->use_monitor)
3fd1cefb 4230 nl80211_remove_monitor_interface(drv);
a11241fa 4231 else
36488c05 4232 nl80211_mgmt_unsubscribe(bss, "AP teardown");
a11241fa 4233
3fd1cefb
JB
4234 bss->beacon_set = 0;
4235}
4236
4237
f10bfc9a
JM
4238static int nl80211_send_eapol_data(struct i802_bss *bss,
4239 const u8 *addr, const u8 *data,
d12dab4c 4240 size_t data_len)
f10bfc9a 4241{
d12dab4c
JB
4242 struct sockaddr_ll ll;
4243 int ret;
4244
4245 if (bss->drv->eapol_tx_sock < 0) {
4246 wpa_printf(MSG_DEBUG, "nl80211: No socket to send EAPOL");
f10bfc9a
JM
4247 return -1;
4248 }
4249
d12dab4c
JB
4250 os_memset(&ll, 0, sizeof(ll));
4251 ll.sll_family = AF_PACKET;
4252 ll.sll_ifindex = bss->ifindex;
4253 ll.sll_protocol = htons(ETH_P_PAE);
4254 ll.sll_halen = ETH_ALEN;
4255 os_memcpy(ll.sll_addr, addr, ETH_ALEN);
4256 ret = sendto(bss->drv->eapol_tx_sock, data, data_len, 0,
4257 (struct sockaddr *) &ll, sizeof(ll));
4258 if (ret < 0)
4259 wpa_printf(MSG_ERROR, "nl80211: EAPOL TX: %s",
4260 strerror(errno));
4261
4262 return ret;
f10bfc9a 4263}
5fb1a232 4264
f10bfc9a 4265
db149ac9
JM
4266static const u8 rfc1042_header[6] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
4267
4268static int wpa_driver_nl80211_hapd_send_eapol(
4269 void *priv, const u8 *addr, const u8 *data,
4378fc14 4270 size_t data_len, int encrypt, const u8 *own_addr, u32 flags)
db149ac9 4271{
a2e40bb6
FF
4272 struct i802_bss *bss = priv;
4273 struct wpa_driver_nl80211_data *drv = bss->drv;
db149ac9
JM
4274 struct ieee80211_hdr *hdr;
4275 size_t len;
4276 u8 *pos;
4277 int res;
4378fc14 4278 int qos = flags & WPA_STA_WMM;
db149ac9 4279
a11241fa 4280 if (drv->device_ap_sme || !drv->use_monitor)
d12dab4c 4281 return nl80211_send_eapol_data(bss, addr, data, data_len);
f10bfc9a 4282
db149ac9
JM
4283 len = sizeof(*hdr) + (qos ? 2 : 0) + sizeof(rfc1042_header) + 2 +
4284 data_len;
4285 hdr = os_zalloc(len);
4286 if (hdr == NULL) {
7ac3616d
JM
4287 wpa_printf(MSG_INFO, "nl80211: Failed to allocate EAPOL buffer(len=%lu)",
4288 (unsigned long) len);
db149ac9
JM
4289 return -1;
4290 }
4291
4292 hdr->frame_control =
4293 IEEE80211_FC(WLAN_FC_TYPE_DATA, WLAN_FC_STYPE_DATA);
4294 hdr->frame_control |= host_to_le16(WLAN_FC_FROMDS);
4295 if (encrypt)
4296 hdr->frame_control |= host_to_le16(WLAN_FC_ISWEP);
db149ac9
JM
4297 if (qos) {
4298 hdr->frame_control |=
4299 host_to_le16(WLAN_FC_STYPE_QOS_DATA << 4);
4300 }
db149ac9
JM
4301
4302 memcpy(hdr->IEEE80211_DA_FROMDS, addr, ETH_ALEN);
4303 memcpy(hdr->IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
4304 memcpy(hdr->IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
4305 pos = (u8 *) (hdr + 1);
4306
db149ac9 4307 if (qos) {
92d521d8
FF
4308 /* Set highest priority in QoS header */
4309 pos[0] = 7;
db149ac9
JM
4310 pos[1] = 0;
4311 pos += 2;
4312 }
db149ac9
JM
4313
4314 memcpy(pos, rfc1042_header, sizeof(rfc1042_header));
4315 pos += sizeof(rfc1042_header);
4316 WPA_PUT_BE16(pos, ETH_P_PAE);
4317 pos += 2;
4318 memcpy(pos, data, data_len);
4319
55231068 4320 res = wpa_driver_nl80211_send_frame(bss, (u8 *) hdr, len, encrypt, 0,
2d3943ce 4321 0, 0, 0, 0, NULL, 0);
db149ac9
JM
4322 if (res < 0) {
4323 wpa_printf(MSG_ERROR, "i802_send_eapol - packet len: %lu - "
4324 "failed: %d (%s)",
4325 (unsigned long) len, errno, strerror(errno));
4326 }
7bf12757 4327 os_free(hdr);
db149ac9
JM
4328
4329 return res;
4330}
4331
a8d6ffa4 4332
3234cba4 4333static int wpa_driver_nl80211_sta_set_flags(void *priv, const u8 *addr,
f97e3ce4
JM
4334 unsigned int total_flags,
4335 unsigned int flags_or,
4336 unsigned int flags_and)
a8d6ffa4 4337{
a2e40bb6 4338 struct i802_bss *bss = priv;
8970bae8
JB
4339 struct nl_msg *msg;
4340 struct nlattr *flags;
7e76ee9c 4341 struct nl80211_sta_flag_update upd;
a8d6ffa4 4342
0cd9846c
JM
4343 wpa_printf(MSG_DEBUG, "nl80211: Set STA flags - ifname=%s addr=" MACSTR
4344 " total_flags=0x%x flags_or=0x%x flags_and=0x%x authorized=%d",
4345 bss->ifname, MAC2STR(addr), total_flags, flags_or, flags_and,
4346 !!(total_flags & WPA_STA_AUTHORIZED));
4347
13f83980 4348 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
a862e4a3
JM
4349 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
4350 goto fail;
a8d6ffa4 4351
7e76ee9c
JM
4352 /*
4353 * Backwards compatibility version using NL80211_ATTR_STA_FLAGS. This
4354 * can be removed eventually.
4355 */
8970bae8 4356 flags = nla_nest_start(msg, NL80211_ATTR_STA_FLAGS);
a862e4a3
JM
4357 if (!flags ||
4358 ((total_flags & WPA_STA_AUTHORIZED) &&
4359 nla_put_flag(msg, NL80211_STA_FLAG_AUTHORIZED)) ||
4360 ((total_flags & WPA_STA_WMM) &&
4361 nla_put_flag(msg, NL80211_STA_FLAG_WME)) ||
4362 ((total_flags & WPA_STA_SHORT_PREAMBLE) &&
4363 nla_put_flag(msg, NL80211_STA_FLAG_SHORT_PREAMBLE)) ||
4364 ((total_flags & WPA_STA_MFP) &&
4365 nla_put_flag(msg, NL80211_STA_FLAG_MFP)) ||
4366 ((total_flags & WPA_STA_TDLS_PEER) &&
4367 nla_put_flag(msg, NL80211_STA_FLAG_TDLS_PEER)))
4368 goto fail;
45b722f1 4369
8970bae8 4370 nla_nest_end(msg, flags);
a8d6ffa4 4371
7e76ee9c
JM
4372 os_memset(&upd, 0, sizeof(upd));
4373 upd.mask = sta_flags_nl80211(flags_or | ~flags_and);
4374 upd.set = sta_flags_nl80211(flags_or);
a862e4a3
JM
4375 if (nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd))
4376 goto fail;
7e76ee9c 4377
13f83980 4378 return send_and_recv_msgs(bss->drv, msg, NULL, NULL);
a862e4a3 4379fail:
5883168a 4380 nlmsg_free(msg);
a8d6ffa4
JM
4381 return -ENOBUFS;
4382}
4383
0915d02c 4384
1581b38b
JM
4385static int wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data *drv,
4386 struct wpa_driver_associate_params *params)
4387{
708bc8e0 4388 enum nl80211_iftype nlmode, old_mode;
b1f625e0
EP
4389
4390 if (params->p2p) {
046b26a2
JM
4391 wpa_printf(MSG_DEBUG, "nl80211: Setup AP operations for P2P "
4392 "group (GO)");
b1f625e0
EP
4393 nlmode = NL80211_IFTYPE_P2P_GO;
4394 } else
4395 nlmode = NL80211_IFTYPE_AP;
4396
708bc8e0 4397 old_mode = drv->nlmode;
834ee56f 4398 if (wpa_driver_nl80211_set_mode(drv->first_bss, nlmode)) {
708bc8e0
JM
4399 nl80211_remove_monitor_interface(drv);
4400 return -1;
4401 }
4402
6e9023ea
JM
4403 if (params->freq.freq &&
4404 nl80211_set_channel(drv->first_bss, &params->freq, 0)) {
708bc8e0 4405 if (old_mode != nlmode)
834ee56f 4406 wpa_driver_nl80211_set_mode(drv->first_bss, old_mode);
460456f8 4407 nl80211_remove_monitor_interface(drv);
1581b38b 4408 return -1;
0915d02c 4409 }
1581b38b 4410
1581b38b
JM
4411 return 0;
4412}
1581b38b
JM
4413
4414
666e508c
JM
4415static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv,
4416 int reset_mode)
5cc4d64b
JM
4417{
4418 struct nl_msg *msg;
9725b784 4419 int ret;
a862e4a3 4420
9725b784 4421 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_LEAVE_IBSS);
5cc4d64b 4422 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5cc4d64b
JM
4423 if (ret) {
4424 wpa_printf(MSG_DEBUG, "nl80211: Leave IBSS failed: ret=%d "
4425 "(%s)", ret, strerror(-ret));
9725b784
JM
4426 } else {
4427 wpa_printf(MSG_DEBUG,
4428 "nl80211: Leave IBSS request sent successfully");
5cc4d64b
JM
4429 }
4430
666e508c
JM
4431 if (reset_mode &&
4432 wpa_driver_nl80211_set_mode(drv->first_bss,
5d4c78fb
JM
4433 NL80211_IFTYPE_STATION)) {
4434 wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
4435 "station mode");
4436 }
4437
5cc4d64b
JM
4438 return ret;
4439}
4440
4441
95ff3069
JD
4442static int nl80211_ht_vht_overrides(struct nl_msg *msg,
4443 struct wpa_driver_associate_params *params)
4444{
4445 if (params->disable_ht && nla_put_flag(msg, NL80211_ATTR_DISABLE_HT))
4446 return -1;
4447
4448 if (params->htcaps && params->htcaps_mask) {
4449 int sz = sizeof(struct ieee80211_ht_capabilities);
4450 wpa_hexdump(MSG_DEBUG, " * htcaps", params->htcaps, sz);
4451 wpa_hexdump(MSG_DEBUG, " * htcaps_mask",
4452 params->htcaps_mask, sz);
4453 if (nla_put(msg, NL80211_ATTR_HT_CAPABILITY, sz,
4454 params->htcaps) ||
4455 nla_put(msg, NL80211_ATTR_HT_CAPABILITY_MASK, sz,
4456 params->htcaps_mask))
4457 return -1;
4458 }
4459
4460#ifdef CONFIG_VHT_OVERRIDES
4461 if (params->disable_vht) {
4462 wpa_printf(MSG_DEBUG, " * VHT disabled");
4463 if (nla_put_flag(msg, NL80211_ATTR_DISABLE_VHT))
4464 return -1;
4465 }
4466
4467 if (params->vhtcaps && params->vhtcaps_mask) {
4468 int sz = sizeof(struct ieee80211_vht_capabilities);
4469 wpa_hexdump(MSG_DEBUG, " * vhtcaps", params->vhtcaps, sz);
4470 wpa_hexdump(MSG_DEBUG, " * vhtcaps_mask",
4471 params->vhtcaps_mask, sz);
4472 if (nla_put(msg, NL80211_ATTR_VHT_CAPABILITY, sz,
4473 params->vhtcaps) ||
4474 nla_put(msg, NL80211_ATTR_VHT_CAPABILITY_MASK, sz,
4475 params->vhtcaps_mask))
4476 return -1;
4477 }
4478#endif /* CONFIG_VHT_OVERRIDES */
4479
4480 return 0;
4481}
4482
4483
5cc4d64b
JM
4484static int wpa_driver_nl80211_ibss(struct wpa_driver_nl80211_data *drv,
4485 struct wpa_driver_associate_params *params)
4486{
4487 struct nl_msg *msg;
4488 int ret = -1;
4489 int count = 0;
4490
4491 wpa_printf(MSG_DEBUG, "nl80211: Join IBSS (ifindex=%d)", drv->ifindex);
4492
4ec68377 4493 if (wpa_driver_nl80211_set_mode_ibss(drv->first_bss, &params->freq)) {
5cc4d64b
JM
4494 wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
4495 "IBSS mode");
4496 return -1;
4497 }
4498
4499retry:
9725b784 4500 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_JOIN_IBSS)) ||
a862e4a3
JM
4501 params->ssid == NULL || params->ssid_len > sizeof(drv->ssid))
4502 goto fail;
5cc4d64b
JM
4503
4504 wpa_hexdump_ascii(MSG_DEBUG, " * SSID",
4505 params->ssid, params->ssid_len);
a862e4a3
JM
4506 if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid))
4507 goto fail;
5cc4d64b
JM
4508 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
4509 drv->ssid_len = params->ssid_len;
4510
85e1fad8
JM
4511 if (nl80211_put_freq_params(msg, &params->freq) < 0 ||
4512 nl80211_put_beacon_int(msg, params->beacon_int))
a862e4a3 4513 goto fail;
5cc4d64b
JM
4514
4515 ret = nl80211_set_conn_keys(params, msg);
4516 if (ret)
a862e4a3 4517 goto fail;
5cc4d64b 4518
913e3cf7
NC
4519 if (params->bssid && params->fixed_bssid) {
4520 wpa_printf(MSG_DEBUG, " * BSSID=" MACSTR,
4521 MAC2STR(params->bssid));
a862e4a3
JM
4522 if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
4523 goto fail;
913e3cf7
NC
4524 }
4525
4d9e6fba
JD
4526 if (params->fixed_freq) {
4527 wpa_printf(MSG_DEBUG, " * fixed_freq");
4528 if (nla_put_flag(msg, NL80211_ATTR_FREQ_FIXED))
4529 goto fail;
4530 }
4531
4848a38d
JM
4532 if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
4533 params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
4534 params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
4535 params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256) {
e640888c 4536 wpa_printf(MSG_DEBUG, " * control port");
a862e4a3
JM
4537 if (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT))
4538 goto fail;
e640888c
AQ
4539 }
4540
a95795ad
JM
4541 if (params->wpa_ie) {
4542 wpa_hexdump(MSG_DEBUG,
4543 " * Extra IEs for Beacon/Probe Response frames",
4544 params->wpa_ie, params->wpa_ie_len);
a862e4a3
JM
4545 if (nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len,
4546 params->wpa_ie))
4547 goto fail;
a95795ad
JM
4548 }
4549
95ff3069
JD
4550 if (nl80211_ht_vht_overrides(msg, params) < 0)
4551 return -1;
4552
5cc4d64b
JM
4553 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
4554 msg = NULL;
4555 if (ret) {
4556 wpa_printf(MSG_DEBUG, "nl80211: Join IBSS failed: ret=%d (%s)",
4557 ret, strerror(-ret));
4558 count++;
4559 if (ret == -EALREADY && count == 1) {
4560 wpa_printf(MSG_DEBUG, "nl80211: Retry IBSS join after "
4561 "forced leave");
666e508c 4562 nl80211_leave_ibss(drv, 0);
5cc4d64b
JM
4563 nlmsg_free(msg);
4564 goto retry;
4565 }
a862e4a3
JM
4566 } else {
4567 wpa_printf(MSG_DEBUG,
4568 "nl80211: Join IBSS request sent successfully");
5cc4d64b 4569 }
5cc4d64b 4570
a862e4a3 4571fail:
5cc4d64b
JM
4572 nlmsg_free(msg);
4573 return ret;
4574}
4575
4576
a0bdd191
JM
4577static int nl80211_connect_common(struct wpa_driver_nl80211_data *drv,
4578 struct wpa_driver_associate_params *params,
4579 struct nl_msg *msg)
cfaab580 4580{
cfaab580
ZY
4581 if (params->bssid) {
4582 wpa_printf(MSG_DEBUG, " * bssid=" MACSTR,
4583 MAC2STR(params->bssid));
a862e4a3
JM
4584 if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
4585 return -1;
cfaab580 4586 }
a0bdd191 4587
7ac7fd43
DS
4588 if (params->bssid_hint) {
4589 wpa_printf(MSG_DEBUG, " * bssid_hint=" MACSTR,
4590 MAC2STR(params->bssid_hint));
a862e4a3
JM
4591 if (nla_put(msg, NL80211_ATTR_MAC_HINT, ETH_ALEN,
4592 params->bssid_hint))
4593 return -1;
7ac7fd43
DS
4594 }
4595
4ec68377
JD
4596 if (params->freq.freq) {
4597 wpa_printf(MSG_DEBUG, " * freq=%d", params->freq.freq);
a862e4a3
JM
4598 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ,
4599 params->freq.freq))
4600 return -1;
4ec68377 4601 drv->assoc_freq = params->freq.freq;
30158a0d
SD
4602 } else
4603 drv->assoc_freq = 0;
a0bdd191 4604
7ac7fd43
DS
4605 if (params->freq_hint) {
4606 wpa_printf(MSG_DEBUG, " * freq_hint=%d", params->freq_hint);
a862e4a3
JM
4607 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ_HINT,
4608 params->freq_hint))
4609 return -1;
7ac7fd43
DS
4610 }
4611
1f6c0ab8
BS
4612 if (params->bg_scan_period >= 0) {
4613 wpa_printf(MSG_DEBUG, " * bg scan period=%d",
4614 params->bg_scan_period);
a862e4a3
JM
4615 if (nla_put_u16(msg, NL80211_ATTR_BG_SCAN_PERIOD,
4616 params->bg_scan_period))
4617 return -1;
1f6c0ab8 4618 }
a0bdd191 4619
cfaab580
ZY
4620 if (params->ssid) {
4621 wpa_hexdump_ascii(MSG_DEBUG, " * SSID",
4622 params->ssid, params->ssid_len);
a862e4a3
JM
4623 if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len,
4624 params->ssid))
4625 return -1;
cfaab580 4626 if (params->ssid_len > sizeof(drv->ssid))
a862e4a3 4627 return -1;
cfaab580
ZY
4628 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
4629 drv->ssid_len = params->ssid_len;
4630 }
a0bdd191 4631
cfaab580 4632 wpa_hexdump(MSG_DEBUG, " * IEs", params->wpa_ie, params->wpa_ie_len);
a862e4a3
JM
4633 if (params->wpa_ie &&
4634 nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len, params->wpa_ie))
4635 return -1;
cfaab580 4636
64fa840a
JM
4637 if (params->wpa_proto) {
4638 enum nl80211_wpa_versions ver = 0;
cfaab580 4639
64fa840a
JM
4640 if (params->wpa_proto & WPA_PROTO_WPA)
4641 ver |= NL80211_WPA_VERSION_1;
4642 if (params->wpa_proto & WPA_PROTO_RSN)
4643 ver |= NL80211_WPA_VERSION_2;
cfaab580 4644
64fa840a 4645 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver);
a862e4a3
JM
4646 if (nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
4647 return -1;
cfaab580
ZY
4648 }
4649
4848a38d 4650 if (params->pairwise_suite != WPA_CIPHER_NONE) {
a0bdd191
JM
4651 u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite);
4652 wpa_printf(MSG_DEBUG, " * pairwise=0x%x", cipher);
a862e4a3
JM
4653 if (nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
4654 cipher))
4655 return -1;
cfaab580
ZY
4656 }
4657
ae6f9272
JM
4658 if (params->group_suite == WPA_CIPHER_GTK_NOT_USED &&
4659 !(drv->capa.enc & WPA_DRIVER_CAPA_ENC_GTK_NOT_USED)) {
4660 /*
4661 * This is likely to work even though many drivers do not
4662 * advertise support for operations without GTK.
4663 */
4664 wpa_printf(MSG_DEBUG, " * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement");
4665 } else if (params->group_suite != WPA_CIPHER_NONE) {
a0bdd191
JM
4666 u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite);
4667 wpa_printf(MSG_DEBUG, " * group=0x%x", cipher);
a862e4a3
JM
4668 if (nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher))
4669 return -1;
cfaab580
ZY
4670 }
4671
4848a38d
JM
4672 if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
4673 params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
4674 params->key_mgmt_suite == WPA_KEY_MGMT_FT_IEEE8021X ||
4675 params->key_mgmt_suite == WPA_KEY_MGMT_FT_PSK ||
163f801e 4676 params->key_mgmt_suite == WPA_KEY_MGMT_CCKM ||
8802326f
JJ
4677 params->key_mgmt_suite == WPA_KEY_MGMT_OSEN ||
4678 params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
666497c8 4679 params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256 ||
5e3b5197
JM
4680 params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B ||
4681 params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) {
cfaab580
ZY
4682 int mgmt = WLAN_AKM_SUITE_PSK;
4683
4684 switch (params->key_mgmt_suite) {
4848a38d 4685 case WPA_KEY_MGMT_CCKM:
369c8d7b
JM
4686 mgmt = WLAN_AKM_SUITE_CCKM;
4687 break;
4848a38d 4688 case WPA_KEY_MGMT_IEEE8021X:
cfaab580
ZY
4689 mgmt = WLAN_AKM_SUITE_8021X;
4690 break;
4848a38d 4691 case WPA_KEY_MGMT_FT_IEEE8021X:
6a1ce395
DG
4692 mgmt = WLAN_AKM_SUITE_FT_8021X;
4693 break;
4848a38d 4694 case WPA_KEY_MGMT_FT_PSK:
6a1ce395
DG
4695 mgmt = WLAN_AKM_SUITE_FT_PSK;
4696 break;
8802326f
JJ
4697 case WPA_KEY_MGMT_IEEE8021X_SHA256:
4698 mgmt = WLAN_AKM_SUITE_8021X_SHA256;
4699 break;
4700 case WPA_KEY_MGMT_PSK_SHA256:
4701 mgmt = WLAN_AKM_SUITE_PSK_SHA256;
4702 break;
163f801e
JM
4703 case WPA_KEY_MGMT_OSEN:
4704 mgmt = WLAN_AKM_SUITE_OSEN;
4705 break;
666497c8
JM
4706 case WPA_KEY_MGMT_IEEE8021X_SUITE_B:
4707 mgmt = WLAN_AKM_SUITE_8021X_SUITE_B;
4708 break;
5e3b5197
JM
4709 case WPA_KEY_MGMT_IEEE8021X_SUITE_B_192:
4710 mgmt = WLAN_AKM_SUITE_8021X_SUITE_B_192;
4711 break;
4848a38d 4712 case WPA_KEY_MGMT_PSK:
cfaab580
ZY
4713 default:
4714 mgmt = WLAN_AKM_SUITE_PSK;
4715 break;
4716 }
163f801e 4717 wpa_printf(MSG_DEBUG, " * akm=0x%x", mgmt);
a862e4a3
JM
4718 if (nla_put_u32(msg, NL80211_ATTR_AKM_SUITES, mgmt))
4719 return -1;
cfaab580
ZY
4720 }
4721
a862e4a3
JM
4722 if (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT))
4723 return -1;
a0bdd191 4724
a862e4a3
JM
4725 if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED &&
4726 nla_put_u32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED))
4727 return -1;
a565084f 4728
58162adf
AK
4729 if (params->rrm_used) {
4730 u32 drv_rrm_flags = drv->capa.rrm_flags;
4731 if (!(drv_rrm_flags &
4732 WPA_DRIVER_FLAGS_DS_PARAM_SET_IE_IN_PROBES) ||
a862e4a3
JM
4733 !(drv_rrm_flags & WPA_DRIVER_FLAGS_QUIET) ||
4734 nla_put_flag(msg, NL80211_ATTR_USE_RRM))
4735 return -1;
58162adf
AK
4736 }
4737
95ff3069 4738 if (nl80211_ht_vht_overrides(msg, params) < 0)
a862e4a3 4739 return -1;
80e8a5ee 4740
a0bdd191
JM
4741 if (params->p2p)
4742 wpa_printf(MSG_DEBUG, " * P2P group");
4743
4744 return 0;
a0bdd191
JM
4745}
4746
4747
4748static int wpa_driver_nl80211_try_connect(
4749 struct wpa_driver_nl80211_data *drv,
4750 struct wpa_driver_associate_params *params)
4751{
4752 struct nl_msg *msg;
4753 enum nl80211_auth_type type;
4754 int ret;
4755 int algs;
4756
b658547d 4757#ifdef CONFIG_DRIVER_NL80211_QCA
b41f2684
CL
4758 if (params->req_key_mgmt_offload && params->psk &&
4759 (params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
4760 params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256 ||
4761 params->key_mgmt_suite == WPA_KEY_MGMT_FT_PSK)) {
4762 wpa_printf(MSG_DEBUG, "nl80211: Key management set PSK");
4763 ret = issue_key_mgmt_set_key(drv, params->psk, 32);
4764 if (ret)
4765 return ret;
4766 }
b658547d 4767#endif /* CONFIG_DRIVER_NL80211_QCA */
b41f2684 4768
9725b784
JM
4769 wpa_printf(MSG_DEBUG, "nl80211: Connect (ifindex=%d)", drv->ifindex);
4770 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_CONNECT);
a0bdd191
JM
4771 if (!msg)
4772 return -1;
4773
a0bdd191
JM
4774 ret = nl80211_connect_common(drv, params, msg);
4775 if (ret)
a862e4a3 4776 goto fail;
a0bdd191
JM
4777
4778 algs = 0;
4779 if (params->auth_alg & WPA_AUTH_ALG_OPEN)
4780 algs++;
4781 if (params->auth_alg & WPA_AUTH_ALG_SHARED)
4782 algs++;
4783 if (params->auth_alg & WPA_AUTH_ALG_LEAP)
4784 algs++;
4785 if (algs > 1) {
4786 wpa_printf(MSG_DEBUG, " * Leave out Auth Type for automatic "
4787 "selection");
4788 goto skip_auth_type;
4789 }
4790
4791 if (params->auth_alg & WPA_AUTH_ALG_OPEN)
4792 type = NL80211_AUTHTYPE_OPEN_SYSTEM;
4793 else if (params->auth_alg & WPA_AUTH_ALG_SHARED)
4794 type = NL80211_AUTHTYPE_SHARED_KEY;
4795 else if (params->auth_alg & WPA_AUTH_ALG_LEAP)
4796 type = NL80211_AUTHTYPE_NETWORK_EAP;
4797 else if (params->auth_alg & WPA_AUTH_ALG_FT)
4798 type = NL80211_AUTHTYPE_FT;
4799 else
a862e4a3 4800 goto fail;
a0bdd191
JM
4801
4802 wpa_printf(MSG_DEBUG, " * Auth Type %d", type);
a862e4a3
JM
4803 if (nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
4804 goto fail;
a0bdd191
JM
4805
4806skip_auth_type:
cfaab580
ZY
4807 ret = nl80211_set_conn_keys(params, msg);
4808 if (ret)
a862e4a3 4809 goto fail;
cfaab580
ZY
4810
4811 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
4812 msg = NULL;
4813 if (ret) {
4814 wpa_printf(MSG_DEBUG, "nl80211: MLME connect failed: ret=%d "
4815 "(%s)", ret, strerror(-ret));
a862e4a3
JM
4816 } else {
4817 wpa_printf(MSG_DEBUG,
4818 "nl80211: Connect request send successfully");
cfaab580 4819 }
cfaab580 4820
a862e4a3 4821fail:
cfaab580
ZY
4822 nlmsg_free(msg);
4823 return ret;
4824
4825}
4826
4827
a8c5b43a
CW
4828static int wpa_driver_nl80211_connect(
4829 struct wpa_driver_nl80211_data *drv,
4830 struct wpa_driver_associate_params *params)
4831{
0d4e3d1d
JJ
4832 int ret;
4833
4834 /* Store the connection attempted bssid for future use */
4835 if (params->bssid)
4836 os_memcpy(drv->auth_attempt_bssid, params->bssid, ETH_ALEN);
4837 else
4838 os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
4839
4840 ret = wpa_driver_nl80211_try_connect(drv, params);
a8c5b43a
CW
4841 if (ret == -EALREADY) {
4842 /*
4843 * cfg80211 does not currently accept new connections if
4844 * we are already connected. As a workaround, force
4845 * disconnection and try again.
4846 */
4847 wpa_printf(MSG_DEBUG, "nl80211: Explicitly "
4848 "disconnecting before reassociation "
4849 "attempt");
4850 if (wpa_driver_nl80211_disconnect(
4851 drv, WLAN_REASON_PREV_AUTH_NOT_VALID))
4852 return -1;
a8c5b43a
CW
4853 ret = wpa_driver_nl80211_try_connect(drv, params);
4854 }
4855 return ret;
4856}
4857
4858
c2a04078
JM
4859static int wpa_driver_nl80211_associate(
4860 void *priv, struct wpa_driver_associate_params *params)
4861{
a2e40bb6
FF
4862 struct i802_bss *bss = priv;
4863 struct wpa_driver_nl80211_data *drv = bss->drv;
a862e4a3 4864 int ret = -1;
c2a04078
JM
4865 struct nl_msg *msg;
4866
4bd71954
JM
4867 nl80211_unmask_11b_rates(bss);
4868
5cc4d64b 4869 if (params->mode == IEEE80211_MODE_AP)
1581b38b 4870 return wpa_driver_nl80211_ap(drv, params);
1581b38b 4871
5cc4d64b
JM
4872 if (params->mode == IEEE80211_MODE_IBSS)
4873 return wpa_driver_nl80211_ibss(drv, params);
4874
4a867032 4875 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
b1f625e0
EP
4876 enum nl80211_iftype nlmode = params->p2p ?
4877 NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
4878
4879 if (wpa_driver_nl80211_set_mode(priv, nlmode) < 0)
4a867032 4880 return -1;
cfaab580 4881 return wpa_driver_nl80211_connect(drv, params);
4a867032 4882 }
cfaab580 4883
add9b7a4 4884 nl80211_mark_disconnected(drv);
c2a04078 4885
c2a04078
JM
4886 wpa_printf(MSG_DEBUG, "nl80211: Associate (ifindex=%d)",
4887 drv->ifindex);
9725b784
JM
4888 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_ASSOCIATE);
4889 if (!msg)
4890 return -1;
c2a04078 4891
a0bdd191
JM
4892 ret = nl80211_connect_common(drv, params, msg);
4893 if (ret)
a862e4a3 4894 goto fail;
01652550 4895
62fa124c
JM
4896 if (params->prev_bssid) {
4897 wpa_printf(MSG_DEBUG, " * prev_bssid=" MACSTR,
4898 MAC2STR(params->prev_bssid));
a862e4a3
JM
4899 if (nla_put(msg, NL80211_ATTR_PREV_BSSID, ETH_ALEN,
4900 params->prev_bssid))
4901 goto fail;
62fa124c
JM
4902 }
4903
c2a04078
JM
4904 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
4905 msg = NULL;
4906 if (ret) {
3b7ea880
BG
4907 wpa_dbg(drv->ctx, MSG_DEBUG,
4908 "nl80211: MLME command failed (assoc): ret=%d (%s)",
4909 ret, strerror(-ret));
8856462d 4910 nl80211_dump_scan(drv);
a862e4a3
JM
4911 } else {
4912 wpa_printf(MSG_DEBUG,
4913 "nl80211: Association request send successfully");
c2a04078 4914 }
c2a04078 4915
a862e4a3 4916fail:
c2a04078
JM
4917 nlmsg_free(msg);
4918 return ret;
4919}
3f5285e8
JM
4920
4921
ad1e68e6 4922static int nl80211_set_mode(struct wpa_driver_nl80211_data *drv,
a1922f93 4923 int ifindex, enum nl80211_iftype mode)
3f5285e8 4924{
3f5285e8 4925 struct nl_msg *msg;
ad1e68e6
JM
4926 int ret = -ENOBUFS;
4927
a1922f93
JM
4928 wpa_printf(MSG_DEBUG, "nl80211: Set mode ifindex %d iftype %d (%s)",
4929 ifindex, mode, nl80211_iftype_str(mode));
4930
56f77852
JM
4931 msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_SET_INTERFACE);
4932 if (!msg || nla_put_u32(msg, NL80211_ATTR_IFTYPE, mode))
a862e4a3 4933 goto fail;
ad1e68e6
JM
4934
4935 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5883168a 4936 msg = NULL;
ad1e68e6
JM
4937 if (!ret)
4938 return 0;
a862e4a3 4939fail:
5883168a 4940 nlmsg_free(msg);
ad1e68e6
JM
4941 wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface %d to mode %d:"
4942 " %d (%s)", ifindex, mode, ret, strerror(-ret));
4943 return ret;
4944}
4945
4946
3c5d34e3
CW
4947static int wpa_driver_nl80211_set_mode_impl(
4948 struct i802_bss *bss,
4949 enum nl80211_iftype nlmode,
4950 struct hostapd_freq_params *desired_freq_params)
ad1e68e6 4951{
a2e40bb6 4952 struct wpa_driver_nl80211_data *drv = bss->drv;
ad1e68e6 4953 int ret = -1;
26af9dca 4954 int i;
86957e62 4955 int was_ap = is_ap_interface(drv->nlmode);
671a5039 4956 int res;
ebffdbc4 4957 int mode_switch_res;
1581b38b 4958
ebffdbc4
CW
4959 mode_switch_res = nl80211_set_mode(drv, drv->ifindex, nlmode);
4960 if (mode_switch_res && nlmode == nl80211_get_ifmode(bss))
4961 mode_switch_res = 0;
8e12685c 4962
ebffdbc4 4963 if (mode_switch_res == 0) {
ad1e68e6 4964 drv->nlmode = nlmode;
460456f8
JM
4965 ret = 0;
4966 goto done;
ad1e68e6 4967 }
3f5285e8 4968
ebffdbc4 4969 if (mode_switch_res == -ENODEV)
671a5039
JM
4970 return -1;
4971
460456f8 4972 if (nlmode == drv->nlmode) {
c6e8e8e4
JM
4973 wpa_printf(MSG_DEBUG, "nl80211: Interface already in "
4974 "requested mode - ignore error");
460456f8
JM
4975 ret = 0;
4976 goto done; /* Already in the requested mode */
4977 }
3f5285e8 4978
3f5285e8
JM
4979 /* mac80211 doesn't allow mode changes while the device is up, so
4980 * take the device down, try to set the mode again, and bring the
4981 * device back up.
4982 */
26af9dca
JM
4983 wpa_printf(MSG_DEBUG, "nl80211: Try mode change after setting "
4984 "interface down");
4985 for (i = 0; i < 10; i++) {
91724d6f 4986 res = i802_set_iface_flags(bss, 0);
6e8183d7
JM
4987 if (res == -EACCES || res == -ENODEV)
4988 break;
ebffdbc4 4989 if (res != 0) {
26af9dca
JM
4990 wpa_printf(MSG_DEBUG, "nl80211: Failed to set "
4991 "interface down");
ebffdbc4
CW
4992 os_sleep(0, 100000);
4993 continue;
4994 }
3c5d34e3
CW
4995
4996 /*
4997 * Setting the mode will fail for some drivers if the phy is
4998 * on a frequency that the mode is disallowed in.
4999 */
5000 if (desired_freq_params) {
bdf5ccb2 5001 res = nl80211_set_channel(bss, desired_freq_params, 0);
3c5d34e3
CW
5002 if (res) {
5003 wpa_printf(MSG_DEBUG,
5004 "nl80211: Failed to set frequency on interface");
5005 }
5006 }
5007
ebffdbc4
CW
5008 /* Try to set the mode again while the interface is down */
5009 mode_switch_res = nl80211_set_mode(drv, drv->ifindex, nlmode);
5010 if (mode_switch_res == -EBUSY) {
5011 wpa_printf(MSG_DEBUG,
5012 "nl80211: Delaying mode set while interface going down");
5013 os_sleep(0, 100000);
5014 continue;
5015 }
5016 ret = mode_switch_res;
5017 break;
3f5285e8
JM
5018 }
5019
c6e8e8e4
JM
5020 if (!ret) {
5021 wpa_printf(MSG_DEBUG, "nl80211: Mode change succeeded while "
5022 "interface is down");
ad1e68e6 5023 drv->nlmode = nlmode;
7d9c3698 5024 drv->ignore_if_down_event = 1;
c6e8e8e4 5025 }
ad1e68e6 5026
ebffdbc4
CW
5027 /* Bring the interface back up */
5028 res = linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 1);
5029 if (res != 0) {
5030 wpa_printf(MSG_DEBUG,
5031 "nl80211: Failed to set interface up after switching mode");
5032 ret = -1;
5033 }
5034
460456f8 5035done:
3fd1cefb
JB
5036 if (ret) {
5037 wpa_printf(MSG_DEBUG, "nl80211: Interface mode change to %d "
5038 "from %d failed", nlmode, drv->nlmode);
5039 return ret;
5040 }
5041
3e208481
JM
5042 if (is_p2p_net_interface(nlmode)) {
5043 wpa_printf(MSG_DEBUG,
5044 "nl80211: Interface %s mode change to P2P - disable 11b rates",
5045 bss->ifname);
edb9bfba 5046 nl80211_disable_11b_rates(drv, drv->ifindex, 1);
3e208481
JM
5047 } else if (drv->disabled_11b_rates) {
5048 wpa_printf(MSG_DEBUG,
5049 "nl80211: Interface %s mode changed to non-P2P - re-enable 11b rates",
5050 bss->ifname);
1d0c6fb1 5051 nl80211_disable_11b_rates(drv, drv->ifindex, 0);
3e208481 5052 }
edb9bfba 5053
3fd1cefb 5054 if (is_ap_interface(nlmode)) {
36488c05 5055 nl80211_mgmt_unsubscribe(bss, "start AP");
460456f8 5056 /* Setup additional AP mode functionality if needed */
3fd1cefb 5057 if (nl80211_setup_ap(bss))
460456f8 5058 return -1;
3fd1cefb 5059 } else if (was_ap) {
460456f8 5060 /* Remove additional AP mode functionality */
3fd1cefb 5061 nl80211_teardown_ap(bss);
a11241fa 5062 } else {
36488c05 5063 nl80211_mgmt_unsubscribe(bss, "mode change");
460456f8 5064 }
460456f8 5065
afb0550a
BC
5066 if (is_mesh_interface(nlmode) &&
5067 nl80211_mgmt_subscribe_mesh(bss))
5068 return -1;
5069
873d0fcf 5070 if (!bss->in_deinit && !is_ap_interface(nlmode) &&
afb0550a 5071 !is_mesh_interface(nlmode) &&
a11241fa
JB
5072 nl80211_mgmt_subscribe_non_ap(bss) < 0)
5073 wpa_printf(MSG_DEBUG, "nl80211: Failed to register Action "
5074 "frame processing - ignore for now");
08359050 5075
3fd1cefb 5076 return 0;
3f5285e8
JM
5077}
5078
5079
f3407c66
JM
5080int wpa_driver_nl80211_set_mode(struct i802_bss *bss,
5081 enum nl80211_iftype nlmode)
3c5d34e3
CW
5082{
5083 return wpa_driver_nl80211_set_mode_impl(bss, nlmode, NULL);
5084}
5085
5086
4ec68377
JD
5087static int wpa_driver_nl80211_set_mode_ibss(struct i802_bss *bss,
5088 struct hostapd_freq_params *freq)
3c5d34e3 5089{
3c5d34e3 5090 return wpa_driver_nl80211_set_mode_impl(bss, NL80211_IFTYPE_ADHOC,
4ec68377 5091 freq);
3c5d34e3 5092}
65d645ce
AS
5093
5094
3f5285e8
JM
5095static int wpa_driver_nl80211_get_capa(void *priv,
5096 struct wpa_driver_capa *capa)
5097{
a2e40bb6
FF
5098 struct i802_bss *bss = priv;
5099 struct wpa_driver_nl80211_data *drv = bss->drv;
65d645ce 5100
3f5285e8
JM
5101 if (!drv->has_capability)
5102 return -1;
5103 os_memcpy(capa, &drv->capa, sizeof(*capa));
8cd6b7bc
JB
5104 if (drv->extended_capa && drv->extended_capa_mask) {
5105 capa->extended_capa = drv->extended_capa;
5106 capa->extended_capa_mask = drv->extended_capa_mask;
5107 capa->extended_capa_len = drv->extended_capa_len;
5108 }
851b0c55 5109
906bc4c7 5110 return 0;
3f5285e8
JM
5111}
5112
5113
5114static int wpa_driver_nl80211_set_operstate(void *priv, int state)
5115{
a2e40bb6
FF
5116 struct i802_bss *bss = priv;
5117 struct wpa_driver_nl80211_data *drv = bss->drv;
3f5285e8 5118
90a545cc
JM
5119 wpa_printf(MSG_DEBUG, "nl80211: Set %s operstate %d->%d (%s)",
5120 bss->ifname, drv->operstate, state,
5121 state ? "UP" : "DORMANT");
3f5285e8 5122 drv->operstate = state;
36d84860 5123 return netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, -1,
e2d02c29 5124 state ? IF_OPER_UP : IF_OPER_DORMANT);
3f5285e8
JM
5125}
5126
01652550
JM
5127
5128static int wpa_driver_nl80211_set_supp_port(void *priv, int authorized)
5129{
a2e40bb6
FF
5130 struct i802_bss *bss = priv;
5131 struct wpa_driver_nl80211_data *drv = bss->drv;
01652550
JM
5132 struct nl_msg *msg;
5133 struct nl80211_sta_flag_update upd;
a862e4a3 5134 int ret;
2eef5177
JM
5135
5136 if (!drv->associated && is_zero_ether_addr(drv->bssid) && !authorized) {
5137 wpa_printf(MSG_DEBUG, "nl80211: Skip set_supp_port(unauthorized) while not associated");
5138 return 0;
5139 }
01652550 5140
1ba51ec0
JM
5141 wpa_printf(MSG_DEBUG, "nl80211: Set supplicant port %sauthorized for "
5142 MACSTR, authorized ? "" : "un", MAC2STR(drv->bssid));
5143
01652550
JM
5144 os_memset(&upd, 0, sizeof(upd));
5145 upd.mask = BIT(NL80211_STA_FLAG_AUTHORIZED);
5146 if (authorized)
5147 upd.set = BIT(NL80211_STA_FLAG_AUTHORIZED);
a862e4a3 5148
13f83980 5149 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
a862e4a3
JM
5150 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, drv->bssid) ||
5151 nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd)) {
5152 nlmsg_free(msg);
5153 return -ENOBUFS;
5154 }
01652550 5155
2eef5177 5156 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
2eef5177
JM
5157 if (!ret)
5158 return 0;
2eef5177
JM
5159 wpa_printf(MSG_DEBUG, "nl80211: Failed to set STA flag: %d (%s)",
5160 ret, strerror(-ret));
5161 return ret;
01652550
JM
5162}
5163
3f5285e8 5164
f07ead6a
JM
5165/* Set kernel driver on given frequency (MHz) */
5166static int i802_set_freq(void *priv, struct hostapd_freq_params *freq)
c5121837 5167{
f07ead6a 5168 struct i802_bss *bss = priv;
13a524a3 5169 return nl80211_set_channel(bss, freq, 0);
c5121837
JM
5170}
5171
f7b3920c 5172
c5121837
JM
5173static inline int min_int(int a, int b)
5174{
5175 if (a < b)
5176 return a;
5177 return b;
5178}
5179
5180
5181static int get_key_handler(struct nl_msg *msg, void *arg)
5182{
5183 struct nlattr *tb[NL80211_ATTR_MAX + 1];
5184 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
5185
5186 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
5187 genlmsg_attrlen(gnlh, 0), NULL);
5188
5189 /*
5190 * TODO: validate the key index and mac address!
5191 * Otherwise, there's a race condition as soon as
5192 * the kernel starts sending key notifications.
5193 */
5194
5195 if (tb[NL80211_ATTR_KEY_SEQ])
5196 memcpy(arg, nla_data(tb[NL80211_ATTR_KEY_SEQ]),
5197 min_int(nla_len(tb[NL80211_ATTR_KEY_SEQ]), 6));
5198 return NL_SKIP;
5199}
5200
5201
5202static int i802_get_seqnum(const char *iface, void *priv, const u8 *addr,
5203 int idx, u8 *seq)
5204{
a2e40bb6
FF
5205 struct i802_bss *bss = priv;
5206 struct wpa_driver_nl80211_data *drv = bss->drv;
c5121837
JM
5207 struct nl_msg *msg;
5208
95376e1a
JM
5209 msg = nl80211_ifindex_msg(drv, if_nametoindex(iface), 0,
5210 NL80211_CMD_GET_KEY);
5211 if (!msg ||
a862e4a3 5212 (addr && nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) ||
95376e1a 5213 nla_put_u8(msg, NL80211_ATTR_KEY_IDX, idx)) {
a862e4a3
JM
5214 nlmsg_free(msg);
5215 return -ENOBUFS;
5216 }
c5121837
JM
5217
5218 memset(seq, 0, 6);
5219
5220 return send_and_recv_msgs(drv, msg, get_key_handler, seq);
c5121837
JM
5221}
5222
5223
c5121837
JM
5224static int i802_set_rts(void *priv, int rts)
5225{
a2e40bb6
FF
5226 struct i802_bss *bss = priv;
5227 struct wpa_driver_nl80211_data *drv = bss->drv;
ad649451 5228 struct nl_msg *msg;
a862e4a3 5229 int ret;
ad649451 5230 u32 val;
c5121837 5231
ad649451
JM
5232 if (rts >= 2347)
5233 val = (u32) -1;
5234 else
5235 val = rts;
c5121837 5236
9725b784 5237 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_WIPHY)) ||
a862e4a3
JM
5238 nla_put_u32(msg, NL80211_ATTR_WIPHY_RTS_THRESHOLD, val)) {
5239 nlmsg_free(msg);
5240 return -ENOBUFS;
5241 }
ad649451
JM
5242
5243 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5244 if (!ret)
5245 return 0;
ad649451
JM
5246 wpa_printf(MSG_DEBUG, "nl80211: Failed to set RTS threshold %d: "
5247 "%d (%s)", rts, ret, strerror(-ret));
5248 return ret;
c5121837
JM
5249}
5250
5251
5252static int i802_set_frag(void *priv, int frag)
5253{
a2e40bb6
FF
5254 struct i802_bss *bss = priv;
5255 struct wpa_driver_nl80211_data *drv = bss->drv;
ad649451 5256 struct nl_msg *msg;
a862e4a3 5257 int ret;
ad649451 5258 u32 val;
c5121837 5259
ad649451
JM
5260 if (frag >= 2346)
5261 val = (u32) -1;
5262 else
5263 val = frag;
c5121837 5264
9725b784 5265 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_WIPHY)) ||
a862e4a3
JM
5266 nla_put_u32(msg, NL80211_ATTR_WIPHY_FRAG_THRESHOLD, val)) {
5267 nlmsg_free(msg);
5268 return -ENOBUFS;
5269 }
ad649451
JM
5270
5271 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5272 if (!ret)
5273 return 0;
ad649451
JM
5274 wpa_printf(MSG_DEBUG, "nl80211: Failed to set fragmentation threshold "
5275 "%d: %d (%s)", frag, ret, strerror(-ret));
5276 return ret;
c5121837
JM
5277}
5278
5279
c5121837
JM
5280static int i802_flush(void *priv)
5281{
a2e40bb6 5282 struct i802_bss *bss = priv;
c5121837 5283 struct nl_msg *msg;
82554b10 5284 int res;
c5121837 5285
83e7bb0e
JM
5286 wpa_printf(MSG_DEBUG, "nl80211: flush -> DEL_STATION %s (all)",
5287 bss->ifname);
c5121837
JM
5288
5289 /*
5290 * XXX: FIX! this needs to flush all VLANs too
5291 */
13f83980
JM
5292 msg = nl80211_bss_msg(bss, 0, NL80211_CMD_DEL_STATION);
5293 res = send_and_recv_msgs(bss->drv, msg, NULL, NULL);
82554b10
JM
5294 if (res) {
5295 wpa_printf(MSG_DEBUG, "nl80211: Station flush failed: ret=%d "
5296 "(%s)", res, strerror(-res));
5297 }
5298 return res;
c5121837
JM
5299}
5300
5301
5302static int get_sta_handler(struct nl_msg *msg, void *arg)
5303{
5304 struct nlattr *tb[NL80211_ATTR_MAX + 1];
5305 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
5306 struct hostap_sta_driver_data *data = arg;
5307 struct nlattr *stats[NL80211_STA_INFO_MAX + 1];
5308 static struct nla_policy stats_policy[NL80211_STA_INFO_MAX + 1] = {
5309 [NL80211_STA_INFO_INACTIVE_TIME] = { .type = NLA_U32 },
5310 [NL80211_STA_INFO_RX_BYTES] = { .type = NLA_U32 },
5311 [NL80211_STA_INFO_TX_BYTES] = { .type = NLA_U32 },
5312 [NL80211_STA_INFO_RX_PACKETS] = { .type = NLA_U32 },
5313 [NL80211_STA_INFO_TX_PACKETS] = { .type = NLA_U32 },
dc7785f8 5314 [NL80211_STA_INFO_TX_FAILED] = { .type = NLA_U32 },
c5121837
JM
5315 };
5316
5317 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
5318 genlmsg_attrlen(gnlh, 0), NULL);
5319
5320 /*
5321 * TODO: validate the interface and mac address!
5322 * Otherwise, there's a race condition as soon as
5323 * the kernel starts sending station notifications.
5324 */
5325
5326 if (!tb[NL80211_ATTR_STA_INFO]) {
5327 wpa_printf(MSG_DEBUG, "sta stats missing!");
5328 return NL_SKIP;
5329 }
5330 if (nla_parse_nested(stats, NL80211_STA_INFO_MAX,
5331 tb[NL80211_ATTR_STA_INFO],
5332 stats_policy)) {
5333 wpa_printf(MSG_DEBUG, "failed to parse nested attributes!");
5334 return NL_SKIP;
5335 }
5336
5337 if (stats[NL80211_STA_INFO_INACTIVE_TIME])
5338 data->inactive_msec =
5339 nla_get_u32(stats[NL80211_STA_INFO_INACTIVE_TIME]);
5340 if (stats[NL80211_STA_INFO_RX_BYTES])
5341 data->rx_bytes = nla_get_u32(stats[NL80211_STA_INFO_RX_BYTES]);
5342 if (stats[NL80211_STA_INFO_TX_BYTES])
5343 data->tx_bytes = nla_get_u32(stats[NL80211_STA_INFO_TX_BYTES]);
5344 if (stats[NL80211_STA_INFO_RX_PACKETS])
5345 data->rx_packets =
5346 nla_get_u32(stats[NL80211_STA_INFO_RX_PACKETS]);
5347 if (stats[NL80211_STA_INFO_TX_PACKETS])
5348 data->tx_packets =
5349 nla_get_u32(stats[NL80211_STA_INFO_TX_PACKETS]);
dc7785f8
YZ
5350 if (stats[NL80211_STA_INFO_TX_FAILED])
5351 data->tx_retry_failed =
5352 nla_get_u32(stats[NL80211_STA_INFO_TX_FAILED]);
c5121837
JM
5353
5354 return NL_SKIP;
5355}
5356
9ebce9c5
JM
5357static int i802_read_sta_data(struct i802_bss *bss,
5358 struct hostap_sta_driver_data *data,
c5121837
JM
5359 const u8 *addr)
5360{
c5121837
JM
5361 struct nl_msg *msg;
5362
5363 os_memset(data, 0, sizeof(*data));
c5121837 5364
13f83980
JM
5365 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_GET_STATION)) ||
5366 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
a862e4a3
JM
5367 nlmsg_free(msg);
5368 return -ENOBUFS;
5369 }
c5121837 5370
13f83980 5371 return send_and_recv_msgs(bss->drv, msg, get_sta_handler, data);
c5121837
JM
5372}
5373
5374
c5121837
JM
5375static int i802_set_tx_queue_params(void *priv, int queue, int aifs,
5376 int cw_min, int cw_max, int burst_time)
5377{
a2e40bb6
FF
5378 struct i802_bss *bss = priv;
5379 struct wpa_driver_nl80211_data *drv = bss->drv;
c5121837
JM
5380 struct nl_msg *msg;
5381 struct nlattr *txq, *params;
5382
13f83980 5383 msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_WIPHY);
c5121837
JM
5384 if (!msg)
5385 return -1;
5386
c5121837
JM
5387 txq = nla_nest_start(msg, NL80211_ATTR_WIPHY_TXQ_PARAMS);
5388 if (!txq)
a862e4a3 5389 goto fail;
c5121837
JM
5390
5391 /* We are only sending parameters for a single TXQ at a time */
5392 params = nla_nest_start(msg, 1);
5393 if (!params)
a862e4a3 5394 goto fail;
c5121837 5395
7e3c1781
JM
5396 switch (queue) {
5397 case 0:
a862e4a3
JM
5398 if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VO))
5399 goto fail;
7e3c1781
JM
5400 break;
5401 case 1:
a862e4a3
JM
5402 if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VI))
5403 goto fail;
7e3c1781
JM
5404 break;
5405 case 2:
a862e4a3
JM
5406 if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BE))
5407 goto fail;
7e3c1781
JM
5408 break;
5409 case 3:
a862e4a3
JM
5410 if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BK))
5411 goto fail;
7e3c1781
JM
5412 break;
5413 }
c5121837
JM
5414 /* Burst time is configured in units of 0.1 msec and TXOP parameter in
5415 * 32 usec, so need to convert the value here. */
a862e4a3
JM
5416 if (nla_put_u16(msg, NL80211_TXQ_ATTR_TXOP,
5417 (burst_time * 100 + 16) / 32) ||
5418 nla_put_u16(msg, NL80211_TXQ_ATTR_CWMIN, cw_min) ||
5419 nla_put_u16(msg, NL80211_TXQ_ATTR_CWMAX, cw_max) ||
5420 nla_put_u8(msg, NL80211_TXQ_ATTR_AIFS, aifs))
5421 goto fail;
c5121837
JM
5422
5423 nla_nest_end(msg, params);
5424
5425 nla_nest_end(msg, txq);
5426
5427 if (send_and_recv_msgs(drv, msg, NULL, NULL) == 0)
5428 return 0;
9e088e74 5429 msg = NULL;
a862e4a3 5430fail:
9e088e74 5431 nlmsg_free(msg);
c5121837
JM
5432 return -1;
5433}
5434
5435
9ebce9c5 5436static int i802_set_sta_vlan(struct i802_bss *bss, const u8 *addr,
c5121837
JM
5437 const char *ifname, int vlan_id)
5438{
a2e40bb6 5439 struct wpa_driver_nl80211_data *drv = bss->drv;
c5121837 5440 struct nl_msg *msg;
a862e4a3 5441 int ret;
c5121837 5442
bbc706a3
JM
5443 wpa_printf(MSG_DEBUG, "nl80211: %s[%d]: set_sta_vlan(" MACSTR
5444 ", ifname=%s[%d], vlan_id=%d)",
5445 bss->ifname, if_nametoindex(bss->ifname),
5446 MAC2STR(addr), ifname, if_nametoindex(ifname), vlan_id);
13f83980 5447 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
a862e4a3
JM
5448 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
5449 nla_put_u32(msg, NL80211_ATTR_STA_VLAN, if_nametoindex(ifname))) {
5450 nlmsg_free(msg);
5451 return -ENOBUFS;
5452 }
c5121837 5453
cd1d72c1
JM
5454 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5455 if (ret < 0) {
5456 wpa_printf(MSG_ERROR, "nl80211: NL80211_ATTR_STA_VLAN (addr="
5457 MACSTR " ifname=%s vlan_id=%d) failed: %d (%s)",
5458 MAC2STR(addr), ifname, vlan_id, ret,
5459 strerror(-ret));
5460 }
cd1d72c1 5461 return ret;
c5121837
JM
5462}
5463
fbbfcbac 5464
c5121837
JM
5465static int i802_get_inact_sec(void *priv, const u8 *addr)
5466{
5467 struct hostap_sta_driver_data data;
5468 int ret;
5469
5470 data.inactive_msec = (unsigned long) -1;
5471 ret = i802_read_sta_data(priv, &data, addr);
b9749bac
MH
5472 if (ret == -ENOENT)
5473 return -ENOENT;
c5121837
JM
5474 if (ret || data.inactive_msec == (unsigned long) -1)
5475 return -1;
5476 return data.inactive_msec / 1000;
5477}
5478
5479
5480static int i802_sta_clear_stats(void *priv, const u8 *addr)
5481{
5482#if 0
5483 /* TODO */
5484#endif
5485 return 0;
5486}
5487
5488
731723a5
JM
5489static int i802_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr,
5490 int reason)
c5121837 5491{
a2e40bb6 5492 struct i802_bss *bss = priv;
e1bd4e19 5493 struct wpa_driver_nl80211_data *drv = bss->drv;
c5121837
JM
5494 struct ieee80211_mgmt mgmt;
5495
0d391b03
BC
5496 if (is_mesh_interface(drv->nlmode))
5497 return -1;
5498
e1bd4e19 5499 if (drv->device_ap_sme)
59d7148a 5500 return wpa_driver_nl80211_sta_remove(bss, addr, 1, reason);
e1bd4e19 5501
c5121837
JM
5502 memset(&mgmt, 0, sizeof(mgmt));
5503 mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
5504 WLAN_FC_STYPE_DEAUTH);
5505 memcpy(mgmt.da, addr, ETH_ALEN);
731723a5
JM
5506 memcpy(mgmt.sa, own_addr, ETH_ALEN);
5507 memcpy(mgmt.bssid, own_addr, ETH_ALEN);
c5121837 5508 mgmt.u.deauth.reason_code = host_to_le16(reason);
a2e40bb6 5509 return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
9f324b61 5510 IEEE80211_HDRLEN +
9ebce9c5 5511 sizeof(mgmt.u.deauth), 0, 0, 0, 0,
2d3943ce 5512 0, NULL, 0);
c5121837
JM
5513}
5514
5515
731723a5
JM
5516static int i802_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
5517 int reason)
c5121837 5518{
a2e40bb6 5519 struct i802_bss *bss = priv;
e1bd4e19 5520 struct wpa_driver_nl80211_data *drv = bss->drv;
c5121837
JM
5521 struct ieee80211_mgmt mgmt;
5522
0d391b03
BC
5523 if (is_mesh_interface(drv->nlmode))
5524 return -1;
5525
e1bd4e19 5526 if (drv->device_ap_sme)
59d7148a 5527 return wpa_driver_nl80211_sta_remove(bss, addr, 0, reason);
e1bd4e19 5528
c5121837
JM
5529 memset(&mgmt, 0, sizeof(mgmt));
5530 mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
5531 WLAN_FC_STYPE_DISASSOC);
5532 memcpy(mgmt.da, addr, ETH_ALEN);
731723a5
JM
5533 memcpy(mgmt.sa, own_addr, ETH_ALEN);
5534 memcpy(mgmt.bssid, own_addr, ETH_ALEN);
c5121837 5535 mgmt.u.disassoc.reason_code = host_to_le16(reason);
a2e40bb6 5536 return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
9f324b61 5537 IEEE80211_HDRLEN +
9ebce9c5 5538 sizeof(mgmt.u.disassoc), 0, 0, 0, 0,
2d3943ce 5539 0, NULL, 0);
c5121837
JM
5540}
5541
5542
9b4d9c8b
JM
5543static void dump_ifidx(struct wpa_driver_nl80211_data *drv)
5544{
5545 char buf[200], *pos, *end;
5546 int i, res;
5547
5548 pos = buf;
5549 end = pos + sizeof(buf);
5550
5551 for (i = 0; i < drv->num_if_indices; i++) {
5552 if (!drv->if_indices[i])
5553 continue;
5554 res = os_snprintf(pos, end - pos, " %d", drv->if_indices[i]);
d85e1fc8 5555 if (os_snprintf_error(end - pos, res))
9b4d9c8b
JM
5556 break;
5557 pos += res;
5558 }
5559 *pos = '\0';
5560
5561 wpa_printf(MSG_DEBUG, "nl80211: if_indices[%d]:%s",
5562 drv->num_if_indices, buf);
5563}
5564
5565
f07ead6a
JM
5566static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
5567{
5568 int i;
5569 int *old;
5570
5571 wpa_printf(MSG_DEBUG, "nl80211: Add own interface ifindex %d",
5572 ifidx);
b36935be
MB
5573 if (have_ifidx(drv, ifidx)) {
5574 wpa_printf(MSG_DEBUG, "nl80211: ifindex %d already in the list",
5575 ifidx);
5576 return;
5577 }
f07ead6a
JM
5578 for (i = 0; i < drv->num_if_indices; i++) {
5579 if (drv->if_indices[i] == 0) {
5580 drv->if_indices[i] = ifidx;
9b4d9c8b 5581 dump_ifidx(drv);
f07ead6a
JM
5582 return;
5583 }
5584 }
5585
5586 if (drv->if_indices != drv->default_if_indices)
5587 old = drv->if_indices;
5588 else
5589 old = NULL;
5590
067ffa26
JM
5591 drv->if_indices = os_realloc_array(old, drv->num_if_indices + 1,
5592 sizeof(int));
f07ead6a
JM
5593 if (!drv->if_indices) {
5594 if (!old)
5595 drv->if_indices = drv->default_if_indices;
5596 else
5597 drv->if_indices = old;
5598 wpa_printf(MSG_ERROR, "Failed to reallocate memory for "
5599 "interfaces");
5600 wpa_printf(MSG_ERROR, "Ignoring EAPOL on interface %d", ifidx);
5601 return;
5602 } else if (!old)
5603 os_memcpy(drv->if_indices, drv->default_if_indices,
5604 sizeof(drv->default_if_indices));
5605 drv->if_indices[drv->num_if_indices] = ifidx;
5606 drv->num_if_indices++;
9b4d9c8b 5607 dump_ifidx(drv);
f07ead6a
JM
5608}
5609
5610
5611static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
5612{
5613 int i;
5614
5615 for (i = 0; i < drv->num_if_indices; i++) {
5616 if (drv->if_indices[i] == ifidx) {
5617 drv->if_indices[i] = 0;
5618 break;
5619 }
5620 }
9b4d9c8b 5621 dump_ifidx(drv);
f07ead6a
JM
5622}
5623
5624
5625static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
5626{
5627 int i;
5628
5629 for (i = 0; i < drv->num_if_indices; i++)
5630 if (drv->if_indices[i] == ifidx)
5631 return 1;
5632
5633 return 0;
5634}
5635
5636
5637static int i802_set_wds_sta(void *priv, const u8 *addr, int aid, int val,
0e80ea2c 5638 const char *bridge_ifname, char *ifname_wds)
f07ead6a
JM
5639{
5640 struct i802_bss *bss = priv;
5641 struct wpa_driver_nl80211_data *drv = bss->drv;
5642 char name[IFNAMSIZ + 1];
5643
5644 os_snprintf(name, sizeof(name), "%s.sta%d", bss->ifname, aid);
69dd2967
SM
5645 if (ifname_wds)
5646 os_strlcpy(ifname_wds, name, IFNAMSIZ + 1);
5647
f07ead6a
JM
5648 wpa_printf(MSG_DEBUG, "nl80211: Set WDS STA addr=" MACSTR
5649 " aid=%d val=%d name=%s", MAC2STR(addr), aid, val, name);
5650 if (val) {
5651 if (!if_nametoindex(name)) {
5652 if (nl80211_create_iface(drv, name,
5653 NL80211_IFTYPE_AP_VLAN,
2aec4f3c
JM
5654 bss->addr, 1, NULL, NULL, 0) <
5655 0)
f07ead6a
JM
5656 return -1;
5657 if (bridge_ifname &&
c81eff1a
BG
5658 linux_br_add_if(drv->global->ioctl_sock,
5659 bridge_ifname, name) < 0)
f07ead6a
JM
5660 return -1;
5661 }
75227f3a
JM
5662 if (linux_set_iface_flags(drv->global->ioctl_sock, name, 1)) {
5663 wpa_printf(MSG_ERROR, "nl80211: Failed to set WDS STA "
5664 "interface %s up", name);
5665 }
f07ead6a
JM
5666 return i802_set_sta_vlan(priv, addr, name, 0);
5667 } else {
c34e618d
FF
5668 if (bridge_ifname)
5669 linux_br_del_if(drv->global->ioctl_sock, bridge_ifname,
5670 name);
5671
f07ead6a 5672 i802_set_sta_vlan(priv, addr, bss->ifname, 0);
d0595b25
FF
5673 nl80211_remove_iface(drv, if_nametoindex(name));
5674 return 0;
f07ead6a
JM
5675 }
5676}
5677
5678
5679static void handle_eapol(int sock, void *eloop_ctx, void *sock_ctx)
5680{
5681 struct wpa_driver_nl80211_data *drv = eloop_ctx;
5682 struct sockaddr_ll lladdr;
5683 unsigned char buf[3000];
5684 int len;
5685 socklen_t fromlen = sizeof(lladdr);
5686
5687 len = recvfrom(sock, buf, sizeof(buf), 0,
5688 (struct sockaddr *)&lladdr, &fromlen);
5689 if (len < 0) {
7ac3616d
JM
5690 wpa_printf(MSG_ERROR, "nl80211: EAPOL recv failed: %s",
5691 strerror(errno));
f07ead6a
JM
5692 return;
5693 }
5694
5695 if (have_ifidx(drv, lladdr.sll_ifindex))
5696 drv_event_eapol_rx(drv->ctx, lladdr.sll_addr, buf, len);
5697}
5698
5699
94627f6c 5700static int i802_check_bridge(struct wpa_driver_nl80211_data *drv,
e17a2477 5701 struct i802_bss *bss,
94627f6c
JM
5702 const char *brname, const char *ifname)
5703{
6c6678e7 5704 int br_ifindex;
94627f6c
JM
5705 char in_br[IFNAMSIZ];
5706
e17a2477 5707 os_strlcpy(bss->brname, brname, IFNAMSIZ);
6c6678e7 5708 br_ifindex = if_nametoindex(brname);
6c6678e7 5709 if (br_ifindex == 0) {
94627f6c
JM
5710 /*
5711 * Bridge was configured, but the bridge device does
5712 * not exist. Try to add it now.
5713 */
c81eff1a 5714 if (linux_br_add(drv->global->ioctl_sock, brname) < 0) {
94627f6c
JM
5715 wpa_printf(MSG_ERROR, "nl80211: Failed to add the "
5716 "bridge interface %s: %s",
5717 brname, strerror(errno));
5718 return -1;
5719 }
e17a2477 5720 bss->added_bridge = 1;
8997613c
JM
5721 br_ifindex = if_nametoindex(brname);
5722 add_ifidx(drv, br_ifindex);
94627f6c 5723 }
8997613c 5724 bss->br_ifindex = br_ifindex;
94627f6c
JM
5725
5726 if (linux_br_get(in_br, ifname) == 0) {
5727 if (os_strcmp(in_br, brname) == 0)
5728 return 0; /* already in the bridge */
5729
5730 wpa_printf(MSG_DEBUG, "nl80211: Removing interface %s from "
5731 "bridge %s", ifname, in_br);
c81eff1a
BG
5732 if (linux_br_del_if(drv->global->ioctl_sock, in_br, ifname) <
5733 0) {
94627f6c
JM
5734 wpa_printf(MSG_ERROR, "nl80211: Failed to "
5735 "remove interface %s from bridge "
5736 "%s: %s",
5737 ifname, brname, strerror(errno));
5738 return -1;
5739 }
5740 }
5741
5742 wpa_printf(MSG_DEBUG, "nl80211: Adding interface %s into bridge %s",
5743 ifname, brname);
c81eff1a 5744 if (linux_br_add_if(drv->global->ioctl_sock, brname, ifname) < 0) {
94627f6c
JM
5745 wpa_printf(MSG_ERROR, "nl80211: Failed to add interface %s "
5746 "into bridge %s: %s",
5747 ifname, brname, strerror(errno));
5748 return -1;
5749 }
e17a2477 5750 bss->added_if_into_bridge = 1;
94627f6c
JM
5751
5752 return 0;
5753}
5754
5755
92f475b4
JM
5756static void *i802_init(struct hostapd_data *hapd,
5757 struct wpa_init_params *params)
c5121837
JM
5758{
5759 struct wpa_driver_nl80211_data *drv;
a2e40bb6 5760 struct i802_bss *bss;
c5121837 5761 size_t i;
cb05808c
AN
5762 char master_ifname[IFNAMSIZ];
5763 int ifindex, br_ifindex = 0;
94627f6c 5764 int br_added = 0;
c5121837 5765
0d547d5f
JM
5766 bss = wpa_driver_nl80211_drv_init(hapd, params->ifname,
5767 params->global_priv, 1,
0ecff8d7 5768 params->bssid, params->driver_params);
a2e40bb6 5769 if (bss == NULL)
c5121837 5770 return NULL;
c5121837 5771
a2e40bb6 5772 drv = bss->drv;
7635bfb0 5773
cb05808c 5774 if (linux_br_get(master_ifname, params->ifname) == 0) {
94627f6c 5775 wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in bridge %s",
cb05808c
AN
5776 params->ifname, master_ifname);
5777 br_ifindex = if_nametoindex(master_ifname);
5778 os_strlcpy(bss->brname, master_ifname, IFNAMSIZ);
5779 } else if ((params->num_bridge == 0 || !params->bridge[0]) &&
5780 linux_master_get(master_ifname, params->ifname) == 0) {
5781 wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in master %s",
5782 params->ifname, master_ifname);
5783 /* start listening for EAPOL on the master interface */
5784 add_ifidx(drv, if_nametoindex(master_ifname));
94627f6c 5785 } else {
cb05808c 5786 master_ifname[0] = '\0';
94627f6c 5787 }
cb05808c 5788
6c6678e7 5789 bss->br_ifindex = br_ifindex;
94627f6c 5790
92f475b4 5791 for (i = 0; i < params->num_bridge; i++) {
94627f6c
JM
5792 if (params->bridge[i]) {
5793 ifindex = if_nametoindex(params->bridge[i]);
5794 if (ifindex)
5795 add_ifidx(drv, ifindex);
5796 if (ifindex == br_ifindex)
5797 br_added = 1;
5798 }
c5121837 5799 }
c5121837 5800
ad1e68e6
JM
5801 /* start listening for EAPOL on the default AP interface */
5802 add_ifidx(drv, drv->ifindex);
5803
5ef8e39f
JM
5804 if (params->num_bridge && params->bridge[0]) {
5805 if (i802_check_bridge(drv, bss, params->bridge[0],
5806 params->ifname) < 0)
5807 goto failed;
cb05808c 5808 if (os_strcmp(params->bridge[0], master_ifname) != 0)
5ef8e39f
JM
5809 br_added = 1;
5810 }
5811
5812 if (!br_added && br_ifindex &&
5813 (params->num_bridge == 0 || !params->bridge[0]))
5814 add_ifidx(drv, br_ifindex);
94627f6c 5815
97ed9a06
KP
5816#ifdef CONFIG_LIBNL3_ROUTE
5817 if (bss->added_if_into_bridge) {
5818 drv->rtnl_sk = nl_socket_alloc();
5819 if (drv->rtnl_sk == NULL) {
5820 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate nl_sock");
5821 goto failed;
5822 }
5823
5824 if (nl_connect(drv->rtnl_sk, NETLINK_ROUTE)) {
5825 wpa_printf(MSG_ERROR, "nl80211: Failed to connect nl_sock to NETLINK_ROUTE: %s",
5826 strerror(errno));
5827 goto failed;
5828 }
5829 }
5830#endif /* CONFIG_LIBNL3_ROUTE */
5831
ad1e68e6
JM
5832 drv->eapol_sock = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_PAE));
5833 if (drv->eapol_sock < 0) {
7ac3616d
JM
5834 wpa_printf(MSG_ERROR, "nl80211: socket(PF_PACKET, SOCK_DGRAM, ETH_P_PAE) failed: %s",
5835 strerror(errno));
bbaf0837 5836 goto failed;
ad1e68e6
JM
5837 }
5838
5839 if (eloop_register_read_sock(drv->eapol_sock, handle_eapol, drv, NULL))
5840 {
7ac3616d 5841 wpa_printf(MSG_INFO, "nl80211: Could not register read socket for eapol");
c5121837 5842 goto failed;
ad1e68e6
JM
5843 }
5844
c81eff1a
BG
5845 if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
5846 params->own_addr))
bbaf0837 5847 goto failed;
fee354c7 5848 os_memcpy(drv->perm_addr, params->own_addr, ETH_ALEN);
c5121837 5849
341eebee
JB
5850 memcpy(bss->addr, params->own_addr, ETH_ALEN);
5851
a2e40bb6 5852 return bss;
c5121837
JM
5853
5854failed:
7635bfb0 5855 wpa_driver_nl80211_deinit(bss);
bbaf0837
JM
5856 return NULL;
5857}
c5121837 5858
c5121837 5859
bbaf0837
JM
5860static void i802_deinit(void *priv)
5861{
9ebce9c5
JM
5862 struct i802_bss *bss = priv;
5863 wpa_driver_nl80211_deinit(bss);
c5121837
JM
5864}
5865
c5121837 5866
22a7c9d7
JM
5867static enum nl80211_iftype wpa_driver_nl80211_if_type(
5868 enum wpa_driver_if_type type)
5869{
5870 switch (type) {
5871 case WPA_IF_STATION:
9f51b113 5872 return NL80211_IFTYPE_STATION;
75bde05d
JM
5873 case WPA_IF_P2P_CLIENT:
5874 case WPA_IF_P2P_GROUP:
9f51b113 5875 return NL80211_IFTYPE_P2P_CLIENT;
22a7c9d7
JM
5876 case WPA_IF_AP_VLAN:
5877 return NL80211_IFTYPE_AP_VLAN;
5878 case WPA_IF_AP_BSS:
5879 return NL80211_IFTYPE_AP;
9f51b113
JB
5880 case WPA_IF_P2P_GO:
5881 return NL80211_IFTYPE_P2P_GO;
7aad838c
NS
5882 case WPA_IF_P2P_DEVICE:
5883 return NL80211_IFTYPE_P2P_DEVICE;
5b78493f
MH
5884 case WPA_IF_MESH:
5885 return NL80211_IFTYPE_MESH_POINT;
98342208
AK
5886 default:
5887 return -1;
22a7c9d7 5888 }
22a7c9d7
JM
5889}
5890
5891
f2ed8023
JM
5892static int nl80211_addr_in_use(struct nl80211_global *global, const u8 *addr)
5893{
5894 struct wpa_driver_nl80211_data *drv;
5895 dl_list_for_each(drv, &global->interfaces,
5896 struct wpa_driver_nl80211_data, list) {
834ee56f 5897 if (os_memcmp(addr, drv->first_bss->addr, ETH_ALEN) == 0)
f2ed8023
JM
5898 return 1;
5899 }
5900 return 0;
5901}
5902
5903
5b78493f 5904static int nl80211_vif_addr(struct wpa_driver_nl80211_data *drv, u8 *new_addr)
f2ed8023
JM
5905{
5906 unsigned int idx;
5907
5908 if (!drv->global)
5909 return -1;
5910
834ee56f 5911 os_memcpy(new_addr, drv->first_bss->addr, ETH_ALEN);
f2ed8023 5912 for (idx = 0; idx < 64; idx++) {
834ee56f 5913 new_addr[0] = drv->first_bss->addr[0] | 0x02;
f2ed8023
JM
5914 new_addr[0] ^= idx << 2;
5915 if (!nl80211_addr_in_use(drv->global, new_addr))
5916 break;
5917 }
5918 if (idx == 64)
5919 return -1;
5920
5b78493f 5921 wpa_printf(MSG_DEBUG, "nl80211: Assigned new virtual interface address "
f2ed8023
JM
5922 MACSTR, MAC2STR(new_addr));
5923
5924 return 0;
5925}
5926
5927
f632e483
AS
5928struct wdev_info {
5929 u64 wdev_id;
5930 int wdev_id_set;
5931 u8 macaddr[ETH_ALEN];
5932};
5933
5934static int nl80211_wdev_handler(struct nl_msg *msg, void *arg)
e472e1b4
AS
5935{
5936 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
5937 struct nlattr *tb[NL80211_ATTR_MAX + 1];
f632e483 5938 struct wdev_info *wi = arg;
e472e1b4
AS
5939
5940 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
5941 genlmsg_attrlen(gnlh, 0), NULL);
5942 if (tb[NL80211_ATTR_WDEV]) {
f632e483
AS
5943 wi->wdev_id = nla_get_u64(tb[NL80211_ATTR_WDEV]);
5944 wi->wdev_id_set = 1;
e472e1b4
AS
5945 }
5946
5947 if (tb[NL80211_ATTR_MAC])
f632e483 5948 os_memcpy(wi->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
e472e1b4
AS
5949 ETH_ALEN);
5950
5951 return NL_SKIP;
5952}
5953
5954
7ab68865 5955static int wpa_driver_nl80211_if_add(void *priv, enum wpa_driver_if_type type,
8043e725 5956 const char *ifname, const u8 *addr,
f3585c8a 5957 void *bss_ctx, void **drv_priv,
e17a2477 5958 char *force_ifname, u8 *if_addr,
d8a3b66d
AS
5959 const char *bridge, int use_existing,
5960 int setup_ap)
22a7c9d7 5961{
e472e1b4 5962 enum nl80211_iftype nlmode;
a2e40bb6
FF
5963 struct i802_bss *bss = priv;
5964 struct wpa_driver_nl80211_data *drv = bss->drv;
22a7c9d7 5965 int ifidx;
2aec4f3c 5966 int added = 1;
22a7c9d7 5967
f3585c8a
JM
5968 if (addr)
5969 os_memcpy(if_addr, addr, ETH_ALEN);
e472e1b4
AS
5970 nlmode = wpa_driver_nl80211_if_type(type);
5971 if (nlmode == NL80211_IFTYPE_P2P_DEVICE) {
f632e483
AS
5972 struct wdev_info p2pdev_info;
5973
5974 os_memset(&p2pdev_info, 0, sizeof(p2pdev_info));
e472e1b4 5975 ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
f632e483 5976 0, nl80211_wdev_handler,
2aec4f3c 5977 &p2pdev_info, use_existing);
f632e483 5978 if (!p2pdev_info.wdev_id_set || ifidx != 0) {
e472e1b4
AS
5979 wpa_printf(MSG_ERROR, "nl80211: Failed to create a P2P Device interface %s",
5980 ifname);
e472e1b4
AS
5981 return -1;
5982 }
f632e483
AS
5983
5984 drv->global->if_add_wdevid = p2pdev_info.wdev_id;
5985 drv->global->if_add_wdevid_set = p2pdev_info.wdev_id_set;
5986 if (!is_zero_ether_addr(p2pdev_info.macaddr))
5987 os_memcpy(if_addr, p2pdev_info.macaddr, ETH_ALEN);
5988 wpa_printf(MSG_DEBUG, "nl80211: New P2P Device interface %s (0x%llx) created",
5989 ifname,
5990 (long long unsigned int) p2pdev_info.wdev_id);
e472e1b4
AS
5991 } else {
5992 ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
2aec4f3c
JM
5993 0, NULL, NULL, use_existing);
5994 if (use_existing && ifidx == -ENFILE) {
5995 added = 0;
5996 ifidx = if_nametoindex(ifname);
5997 } else if (ifidx < 0) {
e472e1b4
AS
5998 return -1;
5999 }
22a7c9d7
JM
6000 }
6001
ab7a1add 6002 if (!addr) {
8ea8a89c 6003 if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
ab7a1add
AS
6004 os_memcpy(if_addr, bss->addr, ETH_ALEN);
6005 else if (linux_get_ifhwaddr(drv->global->ioctl_sock,
8ea8a89c 6006 ifname, if_addr) < 0) {
2aec4f3c
JM
6007 if (added)
6008 nl80211_remove_iface(drv, ifidx);
ab7a1add
AS
6009 return -1;
6010 }
c55f774d
JM
6011 }
6012
c55f774d
JM
6013 if (!addr &&
6014 (type == WPA_IF_P2P_CLIENT || type == WPA_IF_P2P_GROUP ||
8ea8a89c
JM
6015 type == WPA_IF_P2P_GO || type == WPA_IF_MESH ||
6016 type == WPA_IF_STATION)) {
6017 /* Enforce unique address */
ab7a1add 6018 u8 new_addr[ETH_ALEN];
c55f774d 6019
ab7a1add 6020 if (linux_get_ifhwaddr(drv->global->ioctl_sock, ifname,
c81eff1a 6021 new_addr) < 0) {
ea39367c
MK
6022 if (added)
6023 nl80211_remove_iface(drv, ifidx);
c55f774d
JM
6024 return -1;
6025 }
f608081c 6026 if (nl80211_addr_in_use(drv->global, new_addr)) {
c55f774d 6027 wpa_printf(MSG_DEBUG, "nl80211: Allocate new address "
8ea8a89c 6028 "for interface %s type %d", ifname, type);
5b78493f 6029 if (nl80211_vif_addr(drv, new_addr) < 0) {
ea39367c
MK
6030 if (added)
6031 nl80211_remove_iface(drv, ifidx);
c55f774d
JM
6032 return -1;
6033 }
c81eff1a 6034 if (linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
c55f774d 6035 new_addr) < 0) {
ea39367c
MK
6036 if (added)
6037 nl80211_remove_iface(drv, ifidx);
c55f774d
JM
6038 return -1;
6039 }
c55f774d 6040 }
f67eeb5c 6041 os_memcpy(if_addr, new_addr, ETH_ALEN);
c55f774d 6042 }
f3585c8a 6043
d8a3b66d 6044 if (type == WPA_IF_AP_BSS && setup_ap) {
f5eb9da3
JM
6045 struct i802_bss *new_bss = os_zalloc(sizeof(*new_bss));
6046 if (new_bss == NULL) {
2aec4f3c
JM
6047 if (added)
6048 nl80211_remove_iface(drv, ifidx);
f5eb9da3
JM
6049 return -1;
6050 }
6051
6052 if (bridge &&
6053 i802_check_bridge(drv, new_bss, bridge, ifname) < 0) {
6054 wpa_printf(MSG_ERROR, "nl80211: Failed to add the new "
6055 "interface %s to a bridge %s",
6056 ifname, bridge);
2aec4f3c
JM
6057 if (added)
6058 nl80211_remove_iface(drv, ifidx);
f5eb9da3
JM
6059 os_free(new_bss);
6060 return -1;
6061 }
6062
c81eff1a
BG
6063 if (linux_set_iface_flags(drv->global->ioctl_sock, ifname, 1))
6064 {
ea39367c
MK
6065 if (added)
6066 nl80211_remove_iface(drv, ifidx);
07179987 6067 os_free(new_bss);
22a7c9d7
JM
6068 return -1;
6069 }
a2e40bb6 6070 os_strlcpy(new_bss->ifname, ifname, IFNAMSIZ);
341eebee 6071 os_memcpy(new_bss->addr, if_addr, ETH_ALEN);
a2e40bb6
FF
6072 new_bss->ifindex = ifidx;
6073 new_bss->drv = drv;
834ee56f
KP
6074 new_bss->next = drv->first_bss->next;
6075 new_bss->freq = drv->first_bss->freq;
a5e1eb20 6076 new_bss->ctx = bss_ctx;
2aec4f3c 6077 new_bss->added_if = added;
834ee56f 6078 drv->first_bss->next = new_bss;
a2e40bb6
FF
6079 if (drv_priv)
6080 *drv_priv = new_bss;
cc7a48d1 6081 nl80211_init_bss(new_bss);
3dd1d890
YAP
6082
6083 /* Subscribe management frames for this WPA_IF_AP_BSS */
6084 if (nl80211_setup_ap(new_bss))
6085 return -1;
22a7c9d7 6086 }
22a7c9d7 6087
ff6a158b
JM
6088 if (drv->global)
6089 drv->global->if_add_ifindex = ifidx;
6090
d1bb7aed
JJ
6091 /*
6092 * Some virtual interfaces need to process EAPOL packets and events on
6093 * the parent interface. This is used mainly with hostapd.
6094 */
6095 if (ifidx > 0 &&
6096 (drv->hostapd ||
6097 nlmode == NL80211_IFTYPE_AP_VLAN ||
6098 nlmode == NL80211_IFTYPE_WDS ||
6099 nlmode == NL80211_IFTYPE_MONITOR))
b36935be
MB
6100 add_ifidx(drv, ifidx);
6101
22a7c9d7
JM
6102 return 0;
6103}
6104
6105
9ebce9c5 6106static int wpa_driver_nl80211_if_remove(struct i802_bss *bss,
22a7c9d7
JM
6107 enum wpa_driver_if_type type,
6108 const char *ifname)
6109{
a2e40bb6 6110 struct wpa_driver_nl80211_data *drv = bss->drv;
22a7c9d7
JM
6111 int ifindex = if_nametoindex(ifname);
6112
2aec4f3c
JM
6113 wpa_printf(MSG_DEBUG, "nl80211: %s(type=%d ifname=%s) ifindex=%d added_if=%d",
6114 __func__, type, ifname, ifindex, bss->added_if);
158b090c 6115 if (ifindex > 0 && (bss->added_if || bss->ifindex != ifindex))
2b72df63 6116 nl80211_remove_iface(drv, ifindex);
de884303
JM
6117 else if (ifindex > 0 && !bss->added_if) {
6118 struct wpa_driver_nl80211_data *drv2;
6119 dl_list_for_each(drv2, &drv->global->interfaces,
6120 struct wpa_driver_nl80211_data, list)
6121 del_ifidx(drv2, ifindex);
6122 }
c34e618d 6123
c34e618d
FF
6124 if (type != WPA_IF_AP_BSS)
6125 return 0;
6126
e17a2477 6127 if (bss->added_if_into_bridge) {
c81eff1a
BG
6128 if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
6129 bss->ifname) < 0)
e17a2477
JM
6130 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
6131 "interface %s from bridge %s: %s",
6132 bss->ifname, bss->brname, strerror(errno));
6133 }
6134 if (bss->added_bridge) {
c81eff1a 6135 if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
e17a2477
JM
6136 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
6137 "bridge %s: %s",
6138 bss->brname, strerror(errno));
6139 }
a2e40bb6 6140
834ee56f 6141 if (bss != drv->first_bss) {
8546ea19 6142 struct i802_bss *tbss;
a2e40bb6 6143
2aec4f3c 6144 wpa_printf(MSG_DEBUG, "nl80211: Not the first BSS - remove it");
834ee56f 6145 for (tbss = drv->first_bss; tbss; tbss = tbss->next) {
8546ea19
JM
6146 if (tbss->next == bss) {
6147 tbss->next = bss->next;
3dd1d890
YAP
6148 /* Unsubscribe management frames */
6149 nl80211_teardown_ap(bss);
cc7a48d1 6150 nl80211_destroy_bss(bss);
5c9da160
MB
6151 if (!bss->added_if)
6152 i802_set_iface_flags(bss, 0);
8546ea19
JM
6153 os_free(bss);
6154 bss = NULL;
6155 break;
6156 }
22a7c9d7 6157 }
8546ea19
JM
6158 if (bss)
6159 wpa_printf(MSG_INFO, "nl80211: %s - could not find "
6160 "BSS %p in the list", __func__, bss);
390e489c 6161 } else {
2aec4f3c 6162 wpa_printf(MSG_DEBUG, "nl80211: First BSS - reassign context");
390e489c 6163 nl80211_teardown_ap(bss);
2aec4f3c
JM
6164 if (!bss->added_if && !drv->first_bss->next)
6165 wpa_driver_nl80211_del_beacon(drv);
390e489c 6166 nl80211_destroy_bss(bss);
2aec4f3c
JM
6167 if (!bss->added_if)
6168 i802_set_iface_flags(bss, 0);
390e489c
KP
6169 if (drv->first_bss->next) {
6170 drv->first_bss = drv->first_bss->next;
6171 drv->ctx = drv->first_bss->ctx;
6172 os_free(bss);
6173 } else {
6174 wpa_printf(MSG_DEBUG, "nl80211: No second BSS to reassign context to");
6175 }
22a7c9d7 6176 }
22a7c9d7
JM
6177
6178 return 0;
6179}
6180
6181
55777702
JM
6182static int cookie_handler(struct nl_msg *msg, void *arg)
6183{
6184 struct nlattr *tb[NL80211_ATTR_MAX + 1];
6185 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
6186 u64 *cookie = arg;
6187 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
6188 genlmsg_attrlen(gnlh, 0), NULL);
6189 if (tb[NL80211_ATTR_COOKIE])
6190 *cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]);
6191 return NL_SKIP;
6192}
6193
6194
88df0ef7 6195static int nl80211_send_frame_cmd(struct i802_bss *bss,
5dfca53f
JB
6196 unsigned int freq, unsigned int wait,
6197 const u8 *buf, size_t buf_len,
88df0ef7 6198 u64 *cookie_out, int no_cck, int no_ack,
2d3943ce
AO
6199 int offchanok, const u16 *csa_offs,
6200 size_t csa_offs_len)
9884f9cc 6201{
88df0ef7 6202 struct wpa_driver_nl80211_data *drv = bss->drv;
9884f9cc
JB
6203 struct nl_msg *msg;
6204 u64 cookie;
6205 int ret = -1;
6206
cc2ada86 6207 wpa_printf(MSG_MSGDUMP, "nl80211: CMD_FRAME freq=%u wait=%u no_cck=%d "
2e3e4566
JM
6208 "no_ack=%d offchanok=%d",
6209 freq, wait, no_cck, no_ack, offchanok);
c91f796f 6210 wpa_hexdump(MSG_MSGDUMP, "CMD_FRAME", buf, buf_len);
9884f9cc 6211
56f77852 6212 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_FRAME)) ||
a862e4a3
JM
6213 (freq && nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq)) ||
6214 (wait && nla_put_u32(msg, NL80211_ATTR_DURATION, wait)) ||
6215 (offchanok && ((drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
6216 drv->test_use_roc_tx) &&
6217 nla_put_flag(msg, NL80211_ATTR_OFFCHANNEL_TX_OK)) ||
6218 (no_cck && nla_put_flag(msg, NL80211_ATTR_TX_NO_CCK_RATE)) ||
6219 (no_ack && nla_put_flag(msg, NL80211_ATTR_DONT_WAIT_FOR_ACK)) ||
2d3943ce
AO
6220 (csa_offs && nla_put(msg, NL80211_ATTR_CSA_C_OFFSETS_TX,
6221 csa_offs_len * sizeof(u16), csa_offs)) ||
a862e4a3
JM
6222 nla_put(msg, NL80211_ATTR_FRAME, buf_len, buf))
6223 goto fail;
9884f9cc
JB
6224
6225 cookie = 0;
6226 ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie);
6227 msg = NULL;
6228 if (ret) {
6229 wpa_printf(MSG_DEBUG, "nl80211: Frame command failed: ret=%d "
a05225c8
JM
6230 "(%s) (freq=%u wait=%u)", ret, strerror(-ret),
6231 freq, wait);
a862e4a3
JM
6232 } else {
6233 wpa_printf(MSG_MSGDUMP, "nl80211: Frame TX command accepted%s; "
6234 "cookie 0x%llx", no_ack ? " (no ACK)" : "",
6235 (long long unsigned int) cookie);
9884f9cc 6236
a862e4a3
JM
6237 if (cookie_out)
6238 *cookie_out = no_ack ? (u64) -1 : cookie;
759a8a3a
JM
6239
6240 if (drv->num_send_action_cookies == MAX_SEND_ACTION_COOKIES) {
6241 wpa_printf(MSG_DEBUG,
6242 "nl80211: Drop oldest pending send action cookie 0x%llx",
6243 (long long unsigned int)
6244 drv->send_action_cookies[0]);
6245 os_memmove(&drv->send_action_cookies[0],
6246 &drv->send_action_cookies[1],
6247 (MAX_SEND_ACTION_COOKIES - 1) *
6248 sizeof(u64));
6249 drv->num_send_action_cookies--;
6250 }
6251 drv->send_action_cookies[drv->num_send_action_cookies] = cookie;
6252 drv->num_send_action_cookies++;
a862e4a3 6253 }
9884f9cc 6254
a862e4a3 6255fail:
9884f9cc
JB
6256 nlmsg_free(msg);
6257 return ret;
6258}
6259
6260
9ebce9c5
JM
6261static int wpa_driver_nl80211_send_action(struct i802_bss *bss,
6262 unsigned int freq,
190b9062 6263 unsigned int wait_time,
58f6fbe0
JM
6264 const u8 *dst, const u8 *src,
6265 const u8 *bssid,
b106173a
JM
6266 const u8 *data, size_t data_len,
6267 int no_cck)
58f6fbe0 6268{
a2e40bb6 6269 struct wpa_driver_nl80211_data *drv = bss->drv;
58f6fbe0 6270 int ret = -1;
58f6fbe0
JM
6271 u8 *buf;
6272 struct ieee80211_hdr *hdr;
58f6fbe0 6273
5dfca53f 6274 wpa_printf(MSG_DEBUG, "nl80211: Send Action frame (ifindex=%d, "
55231068
JM
6275 "freq=%u MHz wait=%d ms no_cck=%d)",
6276 drv->ifindex, freq, wait_time, no_cck);
58f6fbe0
JM
6277
6278 buf = os_zalloc(24 + data_len);
6279 if (buf == NULL)
6280 return ret;
6281 os_memcpy(buf + 24, data, data_len);
6282 hdr = (struct ieee80211_hdr *) buf;
6283 hdr->frame_control =
6284 IEEE80211_FC(WLAN_FC_TYPE_MGMT, WLAN_FC_STYPE_ACTION);
6285 os_memcpy(hdr->addr1, dst, ETH_ALEN);
6286 os_memcpy(hdr->addr2, src, ETH_ALEN);
6287 os_memcpy(hdr->addr3, bssid, ETH_ALEN);
6288
f78f2785
JM
6289 if (is_ap_interface(drv->nlmode) &&
6290 (!(drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
6291 (int) freq == bss->freq || drv->device_ap_sme ||
6292 !drv->use_monitor))
9ebce9c5
JM
6293 ret = wpa_driver_nl80211_send_mlme(bss, buf, 24 + data_len,
6294 0, freq, no_cck, 1,
2d3943ce 6295 wait_time, NULL, 0);
9884f9cc 6296 else
88df0ef7 6297 ret = nl80211_send_frame_cmd(bss, freq, wait_time, buf,
5dfca53f 6298 24 + data_len,
b106173a 6299 &drv->send_action_cookie,
2d3943ce 6300 no_cck, 0, 1, NULL, 0);
58f6fbe0 6301
f8bf1421 6302 os_free(buf);
58f6fbe0
JM
6303 return ret;
6304}
6305
6306
759a8a3a 6307static void nl80211_frame_wait_cancel(struct i802_bss *bss, u64 cookie)
5dfca53f 6308{
5dfca53f
JB
6309 struct wpa_driver_nl80211_data *drv = bss->drv;
6310 struct nl_msg *msg;
6311 int ret;
6312
316a9e4d 6313 wpa_printf(MSG_DEBUG, "nl80211: Cancel TX frame wait: cookie=0x%llx",
759a8a3a 6314 (long long unsigned int) cookie);
56f77852 6315 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_FRAME_WAIT_CANCEL)) ||
759a8a3a 6316 nla_put_u64(msg, NL80211_ATTR_COOKIE, cookie)) {
a862e4a3
JM
6317 nlmsg_free(msg);
6318 return;
6319 }
5dfca53f
JB
6320
6321 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5dfca53f
JB
6322 if (ret)
6323 wpa_printf(MSG_DEBUG, "nl80211: wait cancel failed: ret=%d "
6324 "(%s)", ret, strerror(-ret));
5dfca53f
JB
6325}
6326
6327
759a8a3a
JM
6328static void wpa_driver_nl80211_send_action_cancel_wait(void *priv)
6329{
6330 struct i802_bss *bss = priv;
6331 struct wpa_driver_nl80211_data *drv = bss->drv;
6332 unsigned int i;
6333 u64 cookie;
6334
6335 /* Cancel the last pending TX cookie */
6336 nl80211_frame_wait_cancel(bss, drv->send_action_cookie);
6337
6338 /*
6339 * Cancel the other pending TX cookies, if any. This is needed since
6340 * the driver may keep a list of all pending offchannel TX operations
6341 * and free up the radio only once they have expired or cancelled.
6342 */
6343 for (i = drv->num_send_action_cookies; i > 0; i--) {
6344 cookie = drv->send_action_cookies[i - 1];
6345 if (cookie != drv->send_action_cookie)
6346 nl80211_frame_wait_cancel(bss, cookie);
6347 }
6348 drv->num_send_action_cookies = 0;
6349}
6350
6351
55777702
JM
6352static int wpa_driver_nl80211_remain_on_channel(void *priv, unsigned int freq,
6353 unsigned int duration)
6354{
a2e40bb6
FF
6355 struct i802_bss *bss = priv;
6356 struct wpa_driver_nl80211_data *drv = bss->drv;
55777702
JM
6357 struct nl_msg *msg;
6358 int ret;
6359 u64 cookie;
6360
56f77852 6361 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_REMAIN_ON_CHANNEL)) ||
a862e4a3
JM
6362 nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq) ||
6363 nla_put_u32(msg, NL80211_ATTR_DURATION, duration)) {
6364 nlmsg_free(msg);
6365 return -1;
6366 }
55777702
JM
6367
6368 cookie = 0;
6369 ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie);
6370 if (ret == 0) {
6371 wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel cookie "
6372 "0x%llx for freq=%u MHz duration=%u",
6373 (long long unsigned int) cookie, freq, duration);
6374 drv->remain_on_chan_cookie = cookie;
531f0331 6375 drv->pending_remain_on_chan = 1;
55777702
JM
6376 return 0;
6377 }
6378 wpa_printf(MSG_DEBUG, "nl80211: Failed to request remain-on-channel "
15ed5535
JM
6379 "(freq=%d duration=%u): %d (%s)",
6380 freq, duration, ret, strerror(-ret));
55777702
JM
6381 return -1;
6382}
6383
6384
6385static int wpa_driver_nl80211_cancel_remain_on_channel(void *priv)
6386{
a2e40bb6
FF
6387 struct i802_bss *bss = priv;
6388 struct wpa_driver_nl80211_data *drv = bss->drv;
55777702
JM
6389 struct nl_msg *msg;
6390 int ret;
6391
6392 if (!drv->pending_remain_on_chan) {
6393 wpa_printf(MSG_DEBUG, "nl80211: No pending remain-on-channel "
6394 "to cancel");
6395 return -1;
6396 }
6397
6398 wpa_printf(MSG_DEBUG, "nl80211: Cancel remain-on-channel with cookie "
6399 "0x%llx",
6400 (long long unsigned int) drv->remain_on_chan_cookie);
6401
56f77852
JM
6402 msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL);
6403 if (!msg ||
a862e4a3
JM
6404 nla_put_u64(msg, NL80211_ATTR_COOKIE, drv->remain_on_chan_cookie)) {
6405 nlmsg_free(msg);
6406 return -1;
6407 }
55777702
JM
6408
6409 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
6410 if (ret == 0)
6411 return 0;
6412 wpa_printf(MSG_DEBUG, "nl80211: Failed to cancel remain-on-channel: "
6413 "%d (%s)", ret, strerror(-ret));
55777702
JM
6414 return -1;
6415}
6416
6417
9ebce9c5 6418static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss, int report)
504e905c 6419{
a2e40bb6 6420 struct wpa_driver_nl80211_data *drv = bss->drv;
504e905c 6421
5582a5d1 6422 if (!report) {
0d891981 6423 if (bss->nl_preq && drv->device_ap_sme &&
b8d87ed2
AP
6424 is_ap_interface(drv->nlmode) && !bss->in_deinit &&
6425 !bss->static_ap) {
0d891981
JM
6426 /*
6427 * Do not disable Probe Request reporting that was
6428 * enabled in nl80211_setup_ap().
6429 */
6430 wpa_printf(MSG_DEBUG, "nl80211: Skip disabling of "
6431 "Probe Request reporting nl_preq=%p while "
6432 "in AP mode", bss->nl_preq);
6433 } else if (bss->nl_preq) {
36488c05
JM
6434 wpa_printf(MSG_DEBUG, "nl80211: Disable Probe Request "
6435 "reporting nl_preq=%p", bss->nl_preq);
5f65e9f7 6436 nl80211_destroy_eloop_handle(&bss->nl_preq);
5582a5d1
JB
6437 }
6438 return 0;
6439 }
6440
481234cf 6441 if (bss->nl_preq) {
5582a5d1 6442 wpa_printf(MSG_DEBUG, "nl80211: Probe Request reporting "
36488c05 6443 "already on! nl_preq=%p", bss->nl_preq);
5582a5d1
JB
6444 return 0;
6445 }
6446
481234cf
JM
6447 bss->nl_preq = nl_create_handle(drv->global->nl_cb, "preq");
6448 if (bss->nl_preq == NULL)
5582a5d1 6449 return -1;
36488c05
JM
6450 wpa_printf(MSG_DEBUG, "nl80211: Enable Probe Request "
6451 "reporting nl_preq=%p", bss->nl_preq);
5582a5d1 6452
481234cf 6453 if (nl80211_register_frame(bss, bss->nl_preq,
5582a5d1
JB
6454 (WLAN_FC_TYPE_MGMT << 2) |
6455 (WLAN_FC_STYPE_PROBE_REQ << 4),
a92dfde8
JB
6456 NULL, 0) < 0)
6457 goto out_err;
5582a5d1 6458
5f65e9f7
JB
6459 nl80211_register_eloop_read(&bss->nl_preq,
6460 wpa_driver_nl80211_event_receive,
6461 bss->nl_cb);
5582a5d1 6462
504e905c 6463 return 0;
5582a5d1 6464
a92dfde8 6465 out_err:
221a59c9 6466 nl_destroy_handles(&bss->nl_preq);
5582a5d1 6467 return -1;
504e905c
JM
6468}
6469
6470
4e5cb1a3
JM
6471static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
6472 int ifindex, int disabled)
6473{
6474 struct nl_msg *msg;
6475 struct nlattr *bands, *band;
6476 int ret;
6477
3e208481
JM
6478 wpa_printf(MSG_DEBUG,
6479 "nl80211: NL80211_CMD_SET_TX_BITRATE_MASK (ifindex=%d %s)",
6480 ifindex, disabled ? "NL80211_TXRATE_LEGACY=OFDM-only" :
6481 "no NL80211_TXRATE_LEGACY constraint");
6482
95376e1a
JM
6483 msg = nl80211_ifindex_msg(drv, ifindex, 0,
6484 NL80211_CMD_SET_TX_BITRATE_MASK);
4e5cb1a3
JM
6485 if (!msg)
6486 return -1;
6487
4e5cb1a3
JM
6488 bands = nla_nest_start(msg, NL80211_ATTR_TX_RATES);
6489 if (!bands)
a862e4a3 6490 goto fail;
4e5cb1a3
JM
6491
6492 /*
6493 * Disable 2 GHz rates 1, 2, 5.5, 11 Mbps by masking out everything
6494 * else apart from 6, 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS
6495 * rates. All 5 GHz rates are left enabled.
6496 */
6497 band = nla_nest_start(msg, NL80211_BAND_2GHZ);
a862e4a3
JM
6498 if (!band ||
6499 (disabled && nla_put(msg, NL80211_TXRATE_LEGACY, 8,
6500 "\x0c\x12\x18\x24\x30\x48\x60\x6c")))
6501 goto fail;
4e5cb1a3
JM
6502 nla_nest_end(msg, band);
6503
6504 nla_nest_end(msg, bands);
6505
6506 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
4e5cb1a3
JM
6507 if (ret) {
6508 wpa_printf(MSG_DEBUG, "nl80211: Set TX rates failed: ret=%d "
6509 "(%s)", ret, strerror(-ret));
1d0c6fb1
JM
6510 } else
6511 drv->disabled_11b_rates = disabled;
4e5cb1a3
JM
6512
6513 return ret;
6514
a862e4a3 6515fail:
4e5cb1a3
JM
6516 nlmsg_free(msg);
6517 return -1;
6518}
6519
6520
af473088
JM
6521static int wpa_driver_nl80211_deinit_ap(void *priv)
6522{
a2e40bb6
FF
6523 struct i802_bss *bss = priv;
6524 struct wpa_driver_nl80211_data *drv = bss->drv;
b1f625e0 6525 if (!is_ap_interface(drv->nlmode))
af473088
JM
6526 return -1;
6527 wpa_driver_nl80211_del_beacon(drv);
9bc5cfa3 6528 bss->beacon_set = 0;
60b13c20
IP
6529
6530 /*
6531 * If the P2P GO interface was dynamically added, then it is
6532 * possible that the interface change to station is not possible.
6533 */
6534 if (drv->nlmode == NL80211_IFTYPE_P2P_GO && bss->if_dynamic)
6535 return 0;
6536
b1f625e0 6537 return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
af473088
JM
6538}
6539
6540
695c7038
SW
6541static int wpa_driver_nl80211_stop_ap(void *priv)
6542{
6543 struct i802_bss *bss = priv;
6544 struct wpa_driver_nl80211_data *drv = bss->drv;
6545 if (!is_ap_interface(drv->nlmode))
6546 return -1;
6547 wpa_driver_nl80211_del_beacon(drv);
6548 bss->beacon_set = 0;
6549 return 0;
6550}
6551
6552
3c29244e
EP
6553static int wpa_driver_nl80211_deinit_p2p_cli(void *priv)
6554{
6555 struct i802_bss *bss = priv;
6556 struct wpa_driver_nl80211_data *drv = bss->drv;
6557 if (drv->nlmode != NL80211_IFTYPE_P2P_CLIENT)
6558 return -1;
60b13c20
IP
6559
6560 /*
6561 * If the P2P Client interface was dynamically added, then it is
6562 * possible that the interface change to station is not possible.
6563 */
6564 if (bss->if_dynamic)
6565 return 0;
6566
3c29244e
EP
6567 return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
6568}
6569
6570
207ef3fb
JM
6571static void wpa_driver_nl80211_resume(void *priv)
6572{
a2e40bb6 6573 struct i802_bss *bss = priv;
e8dc205f 6574 enum nl80211_iftype nlmode = nl80211_get_ifmode(bss);
91724d6f
AS
6575
6576 if (i802_set_iface_flags(bss, 1))
6577 wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface up on resume event");
e8dc205f
AO
6578
6579 if (is_p2p_net_interface(nlmode))
6580 nl80211_disable_11b_rates(bss->drv, bss->drv->ifindex, 1);
207ef3fb
JM
6581}
6582
6583
b625473c
JM
6584static int nl80211_signal_monitor(void *priv, int threshold, int hysteresis)
6585{
6586 struct i802_bss *bss = priv;
6587 struct wpa_driver_nl80211_data *drv = bss->drv;
8970bae8
JB
6588 struct nl_msg *msg;
6589 struct nlattr *cqm;
b625473c
JM
6590
6591 wpa_printf(MSG_DEBUG, "nl80211: Signal monitor threshold=%d "
6592 "hysteresis=%d", threshold, hysteresis);
6593
13f83980 6594 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_CQM)) ||
a862e4a3
JM
6595 !(cqm = nla_nest_start(msg, NL80211_ATTR_CQM)) ||
6596 nla_put_u32(msg, NL80211_ATTR_CQM_RSSI_THOLD, threshold) ||
6597 nla_put_u32(msg, NL80211_ATTR_CQM_RSSI_HYST, hysteresis)) {
6598 nlmsg_free(msg);
6599 return -1;
6600 }
8970bae8 6601 nla_nest_end(msg, cqm);
21270bb4 6602
a862e4a3 6603 return send_and_recv_msgs(drv, msg, NULL, NULL);
b625473c
JM
6604}
6605
6606
2cc8d8f4
AO
6607static int get_channel_width(struct nl_msg *msg, void *arg)
6608{
6609 struct nlattr *tb[NL80211_ATTR_MAX + 1];
6610 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
6611 struct wpa_signal_info *sig_change = arg;
6612
6613 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
6614 genlmsg_attrlen(gnlh, 0), NULL);
6615
6616 sig_change->center_frq1 = -1;
6617 sig_change->center_frq2 = -1;
6618 sig_change->chanwidth = CHAN_WIDTH_UNKNOWN;
6619
6620 if (tb[NL80211_ATTR_CHANNEL_WIDTH]) {
6621 sig_change->chanwidth = convert2width(
6622 nla_get_u32(tb[NL80211_ATTR_CHANNEL_WIDTH]));
6623 if (tb[NL80211_ATTR_CENTER_FREQ1])
6624 sig_change->center_frq1 =
6625 nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
6626 if (tb[NL80211_ATTR_CENTER_FREQ2])
6627 sig_change->center_frq2 =
6628 nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
6629 }
6630
6631 return NL_SKIP;
6632}
6633
6634
6635static int nl80211_get_channel_width(struct wpa_driver_nl80211_data *drv,
6636 struct wpa_signal_info *sig)
6637{
6638 struct nl_msg *msg;
6639
9725b784 6640 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
2cc8d8f4 6641 return send_and_recv_msgs(drv, msg, get_channel_width, sig);
2cc8d8f4
AO
6642}
6643
6644
1c5c7273
PS
6645static int nl80211_signal_poll(void *priv, struct wpa_signal_info *si)
6646{
6647 struct i802_bss *bss = priv;
6648 struct wpa_driver_nl80211_data *drv = bss->drv;
6649 int res;
6650
6651 os_memset(si, 0, sizeof(*si));
6652 res = nl80211_get_link_signal(drv, si);
1d6955e6
JM
6653 if (res) {
6654 if (drv->nlmode != NL80211_IFTYPE_ADHOC &&
6655 drv->nlmode != NL80211_IFTYPE_MESH_POINT)
6656 return res;
6657 si->current_signal = 0;
6658 }
1c5c7273 6659
2cc8d8f4
AO
6660 res = nl80211_get_channel_width(drv, si);
6661 if (res != 0)
6662 return res;
6663
1c5c7273
PS
6664 return nl80211_get_link_noise(drv, si);
6665}
6666
6667
b91ab76e
JM
6668static int nl80211_send_frame(void *priv, const u8 *data, size_t data_len,
6669 int encrypt)
6670{
6671 struct i802_bss *bss = priv;
55231068 6672 return wpa_driver_nl80211_send_frame(bss, data, data_len, encrypt, 0,
2d3943ce 6673 0, 0, 0, 0, NULL, 0);
b91ab76e
JM
6674}
6675
6676
c55f774d
JM
6677static int nl80211_set_param(void *priv, const char *param)
6678{
c55f774d
JM
6679 wpa_printf(MSG_DEBUG, "nl80211: driver param='%s'", param);
6680 if (param == NULL)
6681 return 0;
6682
6683#ifdef CONFIG_P2P
6684 if (os_strstr(param, "use_p2p_group_interface=1")) {
482856c8
JM
6685 struct i802_bss *bss = priv;
6686 struct wpa_driver_nl80211_data *drv = bss->drv;
6687
c55f774d
JM
6688 wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group "
6689 "interface");
6690 drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT;
6691 drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_MGMT_AND_NON_P2P;
6692 }
6693#endif /* CONFIG_P2P */
6694
327b01d3
JM
6695 if (os_strstr(param, "use_monitor=1")) {
6696 struct i802_bss *bss = priv;
6697 struct wpa_driver_nl80211_data *drv = bss->drv;
6698 drv->use_monitor = 1;
6699 }
6700
6701 if (os_strstr(param, "force_connect_cmd=1")) {
6702 struct i802_bss *bss = priv;
6703 struct wpa_driver_nl80211_data *drv = bss->drv;
6704 drv->capa.flags &= ~WPA_DRIVER_FLAGS_SME;
b497a212 6705 drv->force_connect_cmd = 1;
327b01d3
JM
6706 }
6707
64abb725
JM
6708 if (os_strstr(param, "no_offchannel_tx=1")) {
6709 struct i802_bss *bss = priv;
6710 struct wpa_driver_nl80211_data *drv = bss->drv;
6711 drv->capa.flags &= ~WPA_DRIVER_FLAGS_OFFCHANNEL_TX;
6712 drv->test_use_roc_tx = 1;
6713 }
6714
c55f774d
JM
6715 return 0;
6716}
6717
6718
f2ed8023
JM
6719static void * nl80211_global_init(void)
6720{
6721 struct nl80211_global *global;
36d84860
BG
6722 struct netlink_config *cfg;
6723
f2ed8023
JM
6724 global = os_zalloc(sizeof(*global));
6725 if (global == NULL)
6726 return NULL;
c81eff1a 6727 global->ioctl_sock = -1;
f2ed8023 6728 dl_list_init(&global->interfaces);
ff6a158b 6729 global->if_add_ifindex = -1;
36d84860
BG
6730
6731 cfg = os_zalloc(sizeof(*cfg));
6732 if (cfg == NULL)
6733 goto err;
6734
6735 cfg->ctx = global;
6736 cfg->newlink_cb = wpa_driver_nl80211_event_rtm_newlink;
6737 cfg->dellink_cb = wpa_driver_nl80211_event_rtm_dellink;
6738 global->netlink = netlink_init(cfg);
6739 if (global->netlink == NULL) {
6740 os_free(cfg);
6741 goto err;
6742 }
6743
2a7b66f5
BG
6744 if (wpa_driver_nl80211_init_nl_global(global) < 0)
6745 goto err;
6746
c81eff1a
BG
6747 global->ioctl_sock = socket(PF_INET, SOCK_DGRAM, 0);
6748 if (global->ioctl_sock < 0) {
7ac3616d
JM
6749 wpa_printf(MSG_ERROR, "nl80211: socket(PF_INET,SOCK_DGRAM) failed: %s",
6750 strerror(errno));
c81eff1a
BG
6751 goto err;
6752 }
6753
f2ed8023 6754 return global;
36d84860
BG
6755
6756err:
6757 nl80211_global_deinit(global);
6758 return NULL;
f2ed8023
JM
6759}
6760
6761
6762static void nl80211_global_deinit(void *priv)
6763{
6764 struct nl80211_global *global = priv;
6765 if (global == NULL)
6766 return;
6767 if (!dl_list_empty(&global->interfaces)) {
6768 wpa_printf(MSG_ERROR, "nl80211: %u interface(s) remain at "
6769 "nl80211_global_deinit",
6770 dl_list_len(&global->interfaces));
6771 }
36d84860
BG
6772
6773 if (global->netlink)
6774 netlink_deinit(global->netlink);
6775
276e2d67
BG
6776 nl_destroy_handles(&global->nl);
6777
5f65e9f7
JB
6778 if (global->nl_event)
6779 nl80211_destroy_eloop_handle(&global->nl_event);
d6c9aab8
JB
6780
6781 nl_cb_put(global->nl_cb);
2a7b66f5 6782
c81eff1a
BG
6783 if (global->ioctl_sock >= 0)
6784 close(global->ioctl_sock);
6785
f2ed8023
JM
6786 os_free(global);
6787}
6788
6789
6859f1cb
BG
6790static const char * nl80211_get_radio_name(void *priv)
6791{
6792 struct i802_bss *bss = priv;
6793 struct wpa_driver_nl80211_data *drv = bss->drv;
6794 return drv->phyname;
6795}
6796
6797
a6efc65d
JM
6798static int nl80211_pmkid(struct i802_bss *bss, int cmd, const u8 *bssid,
6799 const u8 *pmkid)
6800{
6801 struct nl_msg *msg;
6802
13f83980 6803 if (!(msg = nl80211_bss_msg(bss, 0, cmd)) ||
a862e4a3
JM
6804 (pmkid && nla_put(msg, NL80211_ATTR_PMKID, 16, pmkid)) ||
6805 (bssid && nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, bssid))) {
6806 nlmsg_free(msg);
6807 return -ENOBUFS;
6808 }
a6efc65d
JM
6809
6810 return send_and_recv_msgs(bss->drv, msg, NULL, NULL);
a6efc65d
JM
6811}
6812
6813
6814static int nl80211_add_pmkid(void *priv, const u8 *bssid, const u8 *pmkid)
6815{
6816 struct i802_bss *bss = priv;
6817 wpa_printf(MSG_DEBUG, "nl80211: Add PMKID for " MACSTR, MAC2STR(bssid));
6818 return nl80211_pmkid(bss, NL80211_CMD_SET_PMKSA, bssid, pmkid);
6819}
6820
6821
6822static int nl80211_remove_pmkid(void *priv, const u8 *bssid, const u8 *pmkid)
6823{
6824 struct i802_bss *bss = priv;
6825 wpa_printf(MSG_DEBUG, "nl80211: Delete PMKID for " MACSTR,
6826 MAC2STR(bssid));
6827 return nl80211_pmkid(bss, NL80211_CMD_DEL_PMKSA, bssid, pmkid);
6828}
6829
6830
6831static int nl80211_flush_pmkid(void *priv)
6832{
6833 struct i802_bss *bss = priv;
6834 wpa_printf(MSG_DEBUG, "nl80211: Flush PMKIDs");
6835 return nl80211_pmkid(bss, NL80211_CMD_FLUSH_PMKSA, NULL, NULL);
6836}
6837
6838
0185007c
MK
6839static void clean_survey_results(struct survey_results *survey_results)
6840{
6841 struct freq_survey *survey, *tmp;
6842
6843 if (dl_list_empty(&survey_results->survey_list))
6844 return;
6845
6846 dl_list_for_each_safe(survey, tmp, &survey_results->survey_list,
6847 struct freq_survey, list) {
6848 dl_list_del(&survey->list);
6849 os_free(survey);
6850 }
6851}
6852
6853
6854static void add_survey(struct nlattr **sinfo, u32 ifidx,
6855 struct dl_list *survey_list)
6856{
6857 struct freq_survey *survey;
6858
6859 survey = os_zalloc(sizeof(struct freq_survey));
6860 if (!survey)
6861 return;
6862
6863 survey->ifidx = ifidx;
6864 survey->freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
6865 survey->filled = 0;
6866
6867 if (sinfo[NL80211_SURVEY_INFO_NOISE]) {
6868 survey->nf = (int8_t)
6869 nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
6870 survey->filled |= SURVEY_HAS_NF;
6871 }
6872
6873 if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]) {
6874 survey->channel_time =
6875 nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]);
6876 survey->filled |= SURVEY_HAS_CHAN_TIME;
6877 }
6878
6879 if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]) {
6880 survey->channel_time_busy =
6881 nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]);
6882 survey->filled |= SURVEY_HAS_CHAN_TIME_BUSY;
6883 }
6884
6885 if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]) {
6886 survey->channel_time_rx =
6887 nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]);
6888 survey->filled |= SURVEY_HAS_CHAN_TIME_RX;
6889 }
6890
6891 if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]) {
6892 survey->channel_time_tx =
6893 nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]);
6894 survey->filled |= SURVEY_HAS_CHAN_TIME_TX;
6895 }
6896
6897 wpa_printf(MSG_DEBUG, "nl80211: Freq survey dump event (freq=%d MHz noise=%d channel_time=%ld busy_time=%ld tx_time=%ld rx_time=%ld filled=%04x)",
6898 survey->freq,
6899 survey->nf,
6900 (unsigned long int) survey->channel_time,
6901 (unsigned long int) survey->channel_time_busy,
6902 (unsigned long int) survey->channel_time_tx,
6903 (unsigned long int) survey->channel_time_rx,
6904 survey->filled);
6905
6906 dl_list_add_tail(survey_list, &survey->list);
6907}
6908
6909
6910static int check_survey_ok(struct nlattr **sinfo, u32 surveyed_freq,
6911 unsigned int freq_filter)
6912{
6913 if (!freq_filter)
6914 return 1;
6915
6916 return freq_filter == surveyed_freq;
6917}
6918
6919
6920static int survey_handler(struct nl_msg *msg, void *arg)
6921{
6922 struct nlattr *tb[NL80211_ATTR_MAX + 1];
6923 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
6924 struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
6925 struct survey_results *survey_results;
6926 u32 surveyed_freq = 0;
6927 u32 ifidx;
6928
6929 static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
6930 [NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
6931 [NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
6932 };
6933
6934 survey_results = (struct survey_results *) arg;
6935
6936 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
6937 genlmsg_attrlen(gnlh, 0), NULL);
6938
e28f39b7
SJ
6939 if (!tb[NL80211_ATTR_IFINDEX])
6940 return NL_SKIP;
6941
0185007c
MK
6942 ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
6943
6944 if (!tb[NL80211_ATTR_SURVEY_INFO])
6945 return NL_SKIP;
6946
6947 if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
6948 tb[NL80211_ATTR_SURVEY_INFO],
6949 survey_policy))
6950 return NL_SKIP;
6951
6952 if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY]) {
6953 wpa_printf(MSG_ERROR, "nl80211: Invalid survey data");
6954 return NL_SKIP;
6955 }
6956
6957 surveyed_freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
6958
6959 if (!check_survey_ok(sinfo, surveyed_freq,
6960 survey_results->freq_filter))
6961 return NL_SKIP;
6962
6963 if (survey_results->freq_filter &&
6964 survey_results->freq_filter != surveyed_freq) {
6965 wpa_printf(MSG_EXCESSIVE, "nl80211: Ignoring survey data for freq %d MHz",
6966 surveyed_freq);
6967 return NL_SKIP;
6968 }
6969
6970 add_survey(sinfo, ifidx, &survey_results->survey_list);
6971
6972 return NL_SKIP;
6973}
6974
6975
6976static int wpa_driver_nl80211_get_survey(void *priv, unsigned int freq)
6977{
6978 struct i802_bss *bss = priv;
6979 struct wpa_driver_nl80211_data *drv = bss->drv;
6980 struct nl_msg *msg;
9725b784 6981 int err;
0185007c
MK
6982 union wpa_event_data data;
6983 struct survey_results *survey_results;
6984
6985 os_memset(&data, 0, sizeof(data));
6986 survey_results = &data.survey_results;
6987
6988 dl_list_init(&survey_results->survey_list);
6989
9725b784 6990 msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
0185007c 6991 if (!msg)
a862e4a3 6992 return -ENOBUFS;
0185007c 6993
0185007c
MK
6994 if (freq)
6995 data.survey_results.freq_filter = freq;
6996
6997 do {
6998 wpa_printf(MSG_DEBUG, "nl80211: Fetch survey data");
6999 err = send_and_recv_msgs(drv, msg, survey_handler,
7000 survey_results);
7001 } while (err > 0);
7002
a862e4a3 7003 if (err)
0185007c 7004 wpa_printf(MSG_ERROR, "nl80211: Failed to process survey data");
a862e4a3
JM
7005 else
7006 wpa_supplicant_event(drv->ctx, EVENT_SURVEY, &data);
0185007c 7007
0185007c 7008 clean_survey_results(survey_results);
0185007c
MK
7009 return err;
7010}
7011
7012
98cd3d1c
JM
7013static void nl80211_set_rekey_info(void *priv, const u8 *kek, size_t kek_len,
7014 const u8 *kck, size_t kck_len,
b14a210c
JB
7015 const u8 *replay_ctr)
7016{
7017 struct i802_bss *bss = priv;
7018 struct wpa_driver_nl80211_data *drv = bss->drv;
7019 struct nlattr *replay_nested;
7020 struct nl_msg *msg;
64ae2447 7021 int ret;
b14a210c 7022
64ae2447
JM
7023 if (!drv->set_rekey_offload)
7024 return;
7025
7026 wpa_printf(MSG_DEBUG, "nl80211: Set rekey offload");
13f83980 7027 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_REKEY_OFFLOAD)) ||
a862e4a3 7028 !(replay_nested = nla_nest_start(msg, NL80211_ATTR_REKEY_DATA)) ||
98cd3d1c
JM
7029 nla_put(msg, NL80211_REKEY_DATA_KEK, kek_len, kek) ||
7030 nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck) ||
a862e4a3
JM
7031 nla_put(msg, NL80211_REKEY_DATA_REPLAY_CTR, NL80211_REPLAY_CTR_LEN,
7032 replay_ctr)) {
bbd89bfc 7033 nl80211_nlmsg_clear(msg);
a862e4a3
JM
7034 nlmsg_free(msg);
7035 return;
7036 }
b14a210c
JB
7037
7038 nla_nest_end(msg, replay_nested);
7039
64ae2447
JM
7040 ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1);
7041 if (ret == -EOPNOTSUPP) {
7042 wpa_printf(MSG_DEBUG,
7043 "nl80211: Driver does not support rekey offload");
7044 drv->set_rekey_offload = 0;
7045 }
b14a210c
JB
7046}
7047
7048
39718852
JB
7049static void nl80211_send_null_frame(struct i802_bss *bss, const u8 *own_addr,
7050 const u8 *addr, int qos)
bcf24348 7051{
39718852
JB
7052 /* send data frame to poll STA and check whether
7053 * this frame is ACKed */
bcf24348
JB
7054 struct {
7055 struct ieee80211_hdr hdr;
7056 u16 qos_ctl;
7057 } STRUCT_PACKED nulldata;
7058 size_t size;
7059
7060 /* Send data frame to poll STA and check whether this frame is ACKed */
7061
7062 os_memset(&nulldata, 0, sizeof(nulldata));
7063
7064 if (qos) {
7065 nulldata.hdr.frame_control =
7066 IEEE80211_FC(WLAN_FC_TYPE_DATA,
7067 WLAN_FC_STYPE_QOS_NULL);
7068 size = sizeof(nulldata);
7069 } else {
7070 nulldata.hdr.frame_control =
7071 IEEE80211_FC(WLAN_FC_TYPE_DATA,
7072 WLAN_FC_STYPE_NULLFUNC);
7073 size = sizeof(struct ieee80211_hdr);
7074 }
7075
7076 nulldata.hdr.frame_control |= host_to_le16(WLAN_FC_FROMDS);
7077 os_memcpy(nulldata.hdr.IEEE80211_DA_FROMDS, addr, ETH_ALEN);
7078 os_memcpy(nulldata.hdr.IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
7079 os_memcpy(nulldata.hdr.IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
7080
9ebce9c5 7081 if (wpa_driver_nl80211_send_mlme(bss, (u8 *) &nulldata, size, 0, 0, 0,
2d3943ce 7082 0, 0, NULL, 0) < 0)
bcf24348
JB
7083 wpa_printf(MSG_DEBUG, "nl80211_send_null_frame: Failed to "
7084 "send poll frame");
7085}
7086
39718852
JB
7087static void nl80211_poll_client(void *priv, const u8 *own_addr, const u8 *addr,
7088 int qos)
7089{
7090 struct i802_bss *bss = priv;
7091 struct wpa_driver_nl80211_data *drv = bss->drv;
7092 struct nl_msg *msg;
fc99fab7 7093 int ret;
39718852
JB
7094
7095 if (!drv->poll_command_supported) {
7096 nl80211_send_null_frame(bss, own_addr, addr, qos);
7097 return;
7098 }
7099
13f83980 7100 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_PROBE_CLIENT)) ||
a862e4a3
JM
7101 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
7102 nlmsg_free(msg);
7103 return;
7104 }
39718852 7105
fc99fab7
JM
7106 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7107 if (ret < 0) {
7108 wpa_printf(MSG_DEBUG, "nl80211: Client probe request for "
7109 MACSTR " failed: ret=%d (%s)",
7110 MAC2STR(addr), ret, strerror(-ret));
7111 }
39718852
JB
7112}
7113
bcf24348 7114
29f338af
JM
7115static int nl80211_set_power_save(struct i802_bss *bss, int enabled)
7116{
7117 struct nl_msg *msg;
7118
13f83980 7119 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_POWER_SAVE)) ||
a862e4a3
JM
7120 nla_put_u32(msg, NL80211_ATTR_PS_STATE,
7121 enabled ? NL80211_PS_ENABLED : NL80211_PS_DISABLED)) {
7122 nlmsg_free(msg);
7123 return -ENOBUFS;
7124 }
29f338af 7125 return send_and_recv_msgs(bss->drv, msg, NULL, NULL);
29f338af
JM
7126}
7127
7128
7129static int nl80211_set_p2p_powersave(void *priv, int legacy_ps, int opp_ps,
7130 int ctwindow)
7131{
7132 struct i802_bss *bss = priv;
7133
7134 wpa_printf(MSG_DEBUG, "nl80211: set_p2p_powersave (legacy_ps=%d "
7135 "opp_ps=%d ctwindow=%d)", legacy_ps, opp_ps, ctwindow);
7136
0de38036
JM
7137 if (opp_ps != -1 || ctwindow != -1) {
7138#ifdef ANDROID_P2P
7139 wpa_driver_set_p2p_ps(priv, legacy_ps, opp_ps, ctwindow);
7140#else /* ANDROID_P2P */
29f338af 7141 return -1; /* Not yet supported */
0de38036
JM
7142#endif /* ANDROID_P2P */
7143 }
29f338af
JM
7144
7145 if (legacy_ps == -1)
7146 return 0;
7147 if (legacy_ps != 0 && legacy_ps != 1)
7148 return -1; /* Not yet supported */
7149
7150 return nl80211_set_power_save(bss, legacy_ps);
7151}
7152
7153
04e8003c
JD
7154static int nl80211_start_radar_detection(void *priv,
7155 struct hostapd_freq_params *freq)
f90e9c1c
SW
7156{
7157 struct i802_bss *bss = priv;
7158 struct wpa_driver_nl80211_data *drv = bss->drv;
7159 struct nl_msg *msg;
7160 int ret;
7161
04e8003c
JD
7162 wpa_printf(MSG_DEBUG, "nl80211: Start radar detection (CAC) %d MHz (ht_enabled=%d, vht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
7163 freq->freq, freq->ht_enabled, freq->vht_enabled,
7164 freq->bandwidth, freq->center_freq1, freq->center_freq2);
7165
f90e9c1c
SW
7166 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_RADAR)) {
7167 wpa_printf(MSG_DEBUG, "nl80211: Driver does not support radar "
7168 "detection");
7169 return -1;
7170 }
7171
9725b784 7172 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_RADAR_DETECT)) ||
a862e4a3
JM
7173 nl80211_put_freq_params(msg, freq) < 0) {
7174 nlmsg_free(msg);
7175 return -1;
7176 }
f90e9c1c
SW
7177
7178 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7179 if (ret == 0)
7180 return 0;
7181 wpa_printf(MSG_DEBUG, "nl80211: Failed to start radar detection: "
7182 "%d (%s)", ret, strerror(-ret));
f90e9c1c
SW
7183 return -1;
7184}
7185
03ea1786
AN
7186#ifdef CONFIG_TDLS
7187
7188static int nl80211_send_tdls_mgmt(void *priv, const u8 *dst, u8 action_code,
7189 u8 dialog_token, u16 status_code,
984dadc2
AN
7190 u32 peer_capab, int initiator, const u8 *buf,
7191 size_t len)
03ea1786
AN
7192{
7193 struct i802_bss *bss = priv;
7194 struct wpa_driver_nl80211_data *drv = bss->drv;
7195 struct nl_msg *msg;
7196
7197 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
7198 return -EOPNOTSUPP;
7199
7200 if (!dst)
7201 return -EINVAL;
7202
9725b784 7203 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_TDLS_MGMT)) ||
a862e4a3
JM
7204 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, dst) ||
7205 nla_put_u8(msg, NL80211_ATTR_TDLS_ACTION, action_code) ||
7206 nla_put_u8(msg, NL80211_ATTR_TDLS_DIALOG_TOKEN, dialog_token) ||
7207 nla_put_u16(msg, NL80211_ATTR_STATUS_CODE, status_code))
7208 goto fail;
96ecea5e
SD
7209 if (peer_capab) {
7210 /*
7211 * The internal enum tdls_peer_capability definition is
7212 * currently identical with the nl80211 enum
7213 * nl80211_tdls_peer_capability, so no conversion is needed
7214 * here.
7215 */
a862e4a3
JM
7216 if (nla_put_u32(msg, NL80211_ATTR_TDLS_PEER_CAPABILITY,
7217 peer_capab))
7218 goto fail;
96ecea5e 7219 }
a862e4a3
JM
7220 if ((initiator &&
7221 nla_put_flag(msg, NL80211_ATTR_TDLS_INITIATOR)) ||
7222 nla_put(msg, NL80211_ATTR_IE, len, buf))
7223 goto fail;
03ea1786
AN
7224
7225 return send_and_recv_msgs(drv, msg, NULL, NULL);
7226
a862e4a3 7227fail:
03ea1786
AN
7228 nlmsg_free(msg);
7229 return -ENOBUFS;
7230}
7231
7232
7233static int nl80211_tdls_oper(void *priv, enum tdls_oper oper, const u8 *peer)
7234{
7235 struct i802_bss *bss = priv;
7236 struct wpa_driver_nl80211_data *drv = bss->drv;
7237 struct nl_msg *msg;
7238 enum nl80211_tdls_operation nl80211_oper;
7239
7240 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
7241 return -EOPNOTSUPP;
7242
7243 switch (oper) {
7244 case TDLS_DISCOVERY_REQ:
7245 nl80211_oper = NL80211_TDLS_DISCOVERY_REQ;
7246 break;
7247 case TDLS_SETUP:
7248 nl80211_oper = NL80211_TDLS_SETUP;
7249 break;
7250 case TDLS_TEARDOWN:
7251 nl80211_oper = NL80211_TDLS_TEARDOWN;
7252 break;
7253 case TDLS_ENABLE_LINK:
7254 nl80211_oper = NL80211_TDLS_ENABLE_LINK;
7255 break;
7256 case TDLS_DISABLE_LINK:
7257 nl80211_oper = NL80211_TDLS_DISABLE_LINK;
7258 break;
7259 case TDLS_ENABLE:
7260 return 0;
7261 case TDLS_DISABLE:
7262 return 0;
7263 default:
7264 return -EINVAL;
7265 }
7266
9725b784 7267 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_TDLS_OPER)) ||
a862e4a3 7268 nla_put_u8(msg, NL80211_ATTR_TDLS_OPERATION, nl80211_oper) ||
a862e4a3
JM
7269 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, peer)) {
7270 nlmsg_free(msg);
7271 return -ENOBUFS;
7272 }
03ea1786
AN
7273
7274 return send_and_recv_msgs(drv, msg, NULL, NULL);
03ea1786
AN
7275}
7276
72b2605f
AN
7277
7278static int
7279nl80211_tdls_enable_channel_switch(void *priv, const u8 *addr, u8 oper_class,
7280 const struct hostapd_freq_params *params)
7281{
7282 struct i802_bss *bss = priv;
7283 struct wpa_driver_nl80211_data *drv = bss->drv;
7284 struct nl_msg *msg;
7285 int ret = -ENOBUFS;
7286
7287 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT) ||
7288 !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_CHANNEL_SWITCH))
7289 return -EOPNOTSUPP;
7290
7291 wpa_printf(MSG_DEBUG, "nl80211: Enable TDLS channel switch " MACSTR
7292 " oper_class=%u freq=%u",
7293 MAC2STR(addr), oper_class, params->freq);
7294 msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_TDLS_CHANNEL_SWITCH);
7295 if (!msg ||
7296 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
7297 nla_put_u8(msg, NL80211_ATTR_OPER_CLASS, oper_class) ||
7298 (ret = nl80211_put_freq_params(msg, params))) {
7299 nlmsg_free(msg);
7300 wpa_printf(MSG_DEBUG, "nl80211: Could not build TDLS chan switch");
7301 return ret;
7302 }
7303
7304 return send_and_recv_msgs(drv, msg, NULL, NULL);
7305}
7306
7307
7308static int
7309nl80211_tdls_disable_channel_switch(void *priv, const u8 *addr)
7310{
7311 struct i802_bss *bss = priv;
7312 struct wpa_driver_nl80211_data *drv = bss->drv;
7313 struct nl_msg *msg;
7314
7315 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT) ||
7316 !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_CHANNEL_SWITCH))
7317 return -EOPNOTSUPP;
7318
7319 wpa_printf(MSG_DEBUG, "nl80211: Disable TDLS channel switch " MACSTR,
7320 MAC2STR(addr));
7321 msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH);
7322 if (!msg ||
7323 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
7324 nlmsg_free(msg);
7325 wpa_printf(MSG_DEBUG,
7326 "nl80211: Could not build TDLS cancel chan switch");
7327 return -ENOBUFS;
7328 }
7329
7330 return send_and_recv_msgs(drv, msg, NULL, NULL);
7331}
7332
03ea1786
AN
7333#endif /* CONFIG TDLS */
7334
7335
9ebce9c5
JM
7336static int driver_nl80211_set_key(const char *ifname, void *priv,
7337 enum wpa_alg alg, const u8 *addr,
7338 int key_idx, int set_tx,
7339 const u8 *seq, size_t seq_len,
7340 const u8 *key, size_t key_len)
7341{
7342 struct i802_bss *bss = priv;
7343 return wpa_driver_nl80211_set_key(ifname, bss, alg, addr, key_idx,
7344 set_tx, seq, seq_len, key, key_len);
7345}
7346
7347
7348static int driver_nl80211_scan2(void *priv,
7349 struct wpa_driver_scan_params *params)
7350{
7351 struct i802_bss *bss = priv;
b658547d 7352#ifdef CONFIG_DRIVER_NL80211_QCA
adcd7c4b
KV
7353 struct wpa_driver_nl80211_data *drv = bss->drv;
7354
7355 /*
7356 * Do a vendor specific scan if possible. If only_new_results is
7357 * set, do a normal scan since a kernel (cfg80211) BSS cache flush
7358 * cannot be achieved through a vendor scan. The below condition may
7359 * need to be modified if new scan flags are added in the future whose
7360 * functionality can only be achieved through a normal scan.
7361 */
7362 if (drv->scan_vendor_cmd_avail && !params->only_new_results)
7363 return wpa_driver_nl80211_vendor_scan(bss, params);
b658547d 7364#endif /* CONFIG_DRIVER_NL80211_QCA */
9ebce9c5
JM
7365 return wpa_driver_nl80211_scan(bss, params);
7366}
7367
7368
7369static int driver_nl80211_deauthenticate(void *priv, const u8 *addr,
7370 int reason_code)
7371{
7372 struct i802_bss *bss = priv;
7373 return wpa_driver_nl80211_deauthenticate(bss, addr, reason_code);
7374}
7375
7376
7377static int driver_nl80211_authenticate(void *priv,
7378 struct wpa_driver_auth_params *params)
7379{
7380 struct i802_bss *bss = priv;
7381 return wpa_driver_nl80211_authenticate(bss, params);
7382}
7383
7384
7385static void driver_nl80211_deinit(void *priv)
7386{
7387 struct i802_bss *bss = priv;
7388 wpa_driver_nl80211_deinit(bss);
7389}
7390
7391
7392static int driver_nl80211_if_remove(void *priv, enum wpa_driver_if_type type,
7393 const char *ifname)
7394{
7395 struct i802_bss *bss = priv;
7396 return wpa_driver_nl80211_if_remove(bss, type, ifname);
7397}
7398
7399
7400static int driver_nl80211_send_mlme(void *priv, const u8 *data,
5d180a77 7401 size_t data_len, int noack,
2d3943ce
AO
7402 unsigned int freq,
7403 const u16 *csa_offs, size_t csa_offs_len)
9ebce9c5
JM
7404{
7405 struct i802_bss *bss = priv;
7406 return wpa_driver_nl80211_send_mlme(bss, data, data_len, noack,
2d3943ce
AO
7407 freq, 0, 0, 0, csa_offs,
7408 csa_offs_len);
9ebce9c5
JM
7409}
7410
7411
7412static int driver_nl80211_sta_remove(void *priv, const u8 *addr)
7413{
7414 struct i802_bss *bss = priv;
59d7148a 7415 return wpa_driver_nl80211_sta_remove(bss, addr, -1, 0);
9ebce9c5
JM
7416}
7417
7418
9ebce9c5
JM
7419static int driver_nl80211_set_sta_vlan(void *priv, const u8 *addr,
7420 const char *ifname, int vlan_id)
7421{
7422 struct i802_bss *bss = priv;
7423 return i802_set_sta_vlan(bss, addr, ifname, vlan_id);
7424}
9ebce9c5
JM
7425
7426
7427static int driver_nl80211_read_sta_data(void *priv,
7428 struct hostap_sta_driver_data *data,
7429 const u8 *addr)
7430{
7431 struct i802_bss *bss = priv;
7432 return i802_read_sta_data(bss, data, addr);
7433}
7434
7435
7436static int driver_nl80211_send_action(void *priv, unsigned int freq,
7437 unsigned int wait_time,
7438 const u8 *dst, const u8 *src,
7439 const u8 *bssid,
7440 const u8 *data, size_t data_len,
7441 int no_cck)
7442{
7443 struct i802_bss *bss = priv;
7444 return wpa_driver_nl80211_send_action(bss, freq, wait_time, dst, src,
7445 bssid, data, data_len, no_cck);
7446}
7447
7448
7449static int driver_nl80211_probe_req_report(void *priv, int report)
7450{
7451 struct i802_bss *bss = priv;
7452 return wpa_driver_nl80211_probe_req_report(bss, report);
7453}
7454
7455
6a1ce395
DG
7456static int wpa_driver_nl80211_update_ft_ies(void *priv, const u8 *md,
7457 const u8 *ies, size_t ies_len)
7458{
7459 int ret;
7460 struct nl_msg *msg;
7461 struct i802_bss *bss = priv;
7462 struct wpa_driver_nl80211_data *drv = bss->drv;
7463 u16 mdid = WPA_GET_LE16(md);
7464
6a1ce395 7465 wpa_printf(MSG_DEBUG, "nl80211: Updating FT IEs");
9725b784 7466 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_UPDATE_FT_IES)) ||
a862e4a3
JM
7467 nla_put(msg, NL80211_ATTR_IE, ies_len, ies) ||
7468 nla_put_u16(msg, NL80211_ATTR_MDID, mdid)) {
7469 nlmsg_free(msg);
7470 return -ENOBUFS;
7471 }
6a1ce395
DG
7472
7473 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7474 if (ret) {
7475 wpa_printf(MSG_DEBUG, "nl80211: update_ft_ies failed "
7476 "err=%d (%s)", ret, strerror(-ret));
7477 }
7478
7479 return ret;
6a1ce395
DG
7480}
7481
7482
597b94f5
AS
7483const u8 * wpa_driver_nl80211_get_macaddr(void *priv)
7484{
7485 struct i802_bss *bss = priv;
7486 struct wpa_driver_nl80211_data *drv = bss->drv;
7487
7488 if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE)
7489 return NULL;
7490
7491 return bss->addr;
7492}
7493
7494
a771c07d
JM
7495static const char * scan_state_str(enum scan_states scan_state)
7496{
7497 switch (scan_state) {
7498 case NO_SCAN:
7499 return "NO_SCAN";
7500 case SCAN_REQUESTED:
7501 return "SCAN_REQUESTED";
7502 case SCAN_STARTED:
7503 return "SCAN_STARTED";
7504 case SCAN_COMPLETED:
7505 return "SCAN_COMPLETED";
7506 case SCAN_ABORTED:
7507 return "SCAN_ABORTED";
7508 case SCHED_SCAN_STARTED:
7509 return "SCHED_SCAN_STARTED";
7510 case SCHED_SCAN_STOPPED:
7511 return "SCHED_SCAN_STOPPED";
7512 case SCHED_SCAN_RESULTS:
7513 return "SCHED_SCAN_RESULTS";
7514 }
7515
7516 return "??";
7517}
7518
7519
7520static int wpa_driver_nl80211_status(void *priv, char *buf, size_t buflen)
7521{
7522 struct i802_bss *bss = priv;
7523 struct wpa_driver_nl80211_data *drv = bss->drv;
7524 int res;
7525 char *pos, *end;
7526
7527 pos = buf;
7528 end = buf + buflen;
7529
7530 res = os_snprintf(pos, end - pos,
7531 "ifindex=%d\n"
7532 "ifname=%s\n"
7533 "brname=%s\n"
7534 "addr=" MACSTR "\n"
7535 "freq=%d\n"
7536 "%s%s%s%s%s",
7537 bss->ifindex,
7538 bss->ifname,
7539 bss->brname,
7540 MAC2STR(bss->addr),
7541 bss->freq,
7542 bss->beacon_set ? "beacon_set=1\n" : "",
7543 bss->added_if_into_bridge ?
7544 "added_if_into_bridge=1\n" : "",
7545 bss->added_bridge ? "added_bridge=1\n" : "",
7546 bss->in_deinit ? "in_deinit=1\n" : "",
7547 bss->if_dynamic ? "if_dynamic=1\n" : "");
d85e1fc8 7548 if (os_snprintf_error(end - pos, res))
a771c07d
JM
7549 return pos - buf;
7550 pos += res;
7551
7552 if (bss->wdev_id_set) {
7553 res = os_snprintf(pos, end - pos, "wdev_id=%llu\n",
7554 (unsigned long long) bss->wdev_id);
d85e1fc8 7555 if (os_snprintf_error(end - pos, res))
a771c07d
JM
7556 return pos - buf;
7557 pos += res;
7558 }
7559
7560 res = os_snprintf(pos, end - pos,
7561 "phyname=%s\n"
fee354c7 7562 "perm_addr=" MACSTR "\n"
a771c07d
JM
7563 "drv_ifindex=%d\n"
7564 "operstate=%d\n"
7565 "scan_state=%s\n"
7566 "auth_bssid=" MACSTR "\n"
7567 "auth_attempt_bssid=" MACSTR "\n"
7568 "bssid=" MACSTR "\n"
7569 "prev_bssid=" MACSTR "\n"
7570 "associated=%d\n"
7571 "assoc_freq=%u\n"
7572 "monitor_sock=%d\n"
7573 "monitor_ifidx=%d\n"
7574 "monitor_refcount=%d\n"
7575 "last_mgmt_freq=%u\n"
7576 "eapol_tx_sock=%d\n"
97752f79 7577 "%s%s%s%s%s%s%s%s%s%s%s%s%s",
a771c07d 7578 drv->phyname,
fee354c7 7579 MAC2STR(drv->perm_addr),
a771c07d
JM
7580 drv->ifindex,
7581 drv->operstate,
7582 scan_state_str(drv->scan_state),
7583 MAC2STR(drv->auth_bssid),
7584 MAC2STR(drv->auth_attempt_bssid),
7585 MAC2STR(drv->bssid),
7586 MAC2STR(drv->prev_bssid),
7587 drv->associated,
7588 drv->assoc_freq,
7589 drv->monitor_sock,
7590 drv->monitor_ifidx,
7591 drv->monitor_refcount,
7592 drv->last_mgmt_freq,
7593 drv->eapol_tx_sock,
7594 drv->ignore_if_down_event ?
7595 "ignore_if_down_event=1\n" : "",
7596 drv->scan_complete_events ?
7597 "scan_complete_events=1\n" : "",
7598 drv->disabled_11b_rates ?
7599 "disabled_11b_rates=1\n" : "",
7600 drv->pending_remain_on_chan ?
7601 "pending_remain_on_chan=1\n" : "",
7602 drv->in_interface_list ? "in_interface_list=1\n" : "",
7603 drv->device_ap_sme ? "device_ap_sme=1\n" : "",
7604 drv->poll_command_supported ?
7605 "poll_command_supported=1\n" : "",
7606 drv->data_tx_status ? "data_tx_status=1\n" : "",
7607 drv->scan_for_auth ? "scan_for_auth=1\n" : "",
7608 drv->retry_auth ? "retry_auth=1\n" : "",
7609 drv->use_monitor ? "use_monitor=1\n" : "",
7610 drv->ignore_next_local_disconnect ?
7611 "ignore_next_local_disconnect=1\n" : "",
d6a36f39 7612 drv->ignore_next_local_deauth ?
97752f79 7613 "ignore_next_local_deauth=1\n" : "");
d85e1fc8 7614 if (os_snprintf_error(end - pos, res))
a771c07d
JM
7615 return pos - buf;
7616 pos += res;
7617
7618 if (drv->has_capability) {
7619 res = os_snprintf(pos, end - pos,
7620 "capa.key_mgmt=0x%x\n"
7621 "capa.enc=0x%x\n"
7622 "capa.auth=0x%x\n"
24bd4e0b 7623 "capa.flags=0x%llx\n"
a0a34d53 7624 "capa.rrm_flags=0x%x\n"
a771c07d
JM
7625 "capa.max_scan_ssids=%d\n"
7626 "capa.max_sched_scan_ssids=%d\n"
7627 "capa.sched_scan_supported=%d\n"
7628 "capa.max_match_sets=%d\n"
7629 "capa.max_remain_on_chan=%u\n"
7630 "capa.max_stations=%u\n"
7631 "capa.probe_resp_offloads=0x%x\n"
7632 "capa.max_acl_mac_addrs=%u\n"
86056fea
IP
7633 "capa.num_multichan_concurrent=%u\n"
7634 "capa.mac_addr_rand_sched_scan_supported=%d\n"
079a28f7
AK
7635 "capa.mac_addr_rand_scan_supported=%d\n"
7636 "capa.conc_capab=%u\n"
7637 "capa.max_conc_chan_2_4=%u\n"
09ea4309
AS
7638 "capa.max_conc_chan_5_0=%u\n"
7639 "capa.max_sched_scan_plans=%u\n"
7640 "capa.max_sched_scan_plan_interval=%u\n"
7641 "capa.max_sched_scan_plan_iterations=%u\n",
a771c07d
JM
7642 drv->capa.key_mgmt,
7643 drv->capa.enc,
7644 drv->capa.auth,
24bd4e0b 7645 (unsigned long long) drv->capa.flags,
a0a34d53 7646 drv->capa.rrm_flags,
a771c07d
JM
7647 drv->capa.max_scan_ssids,
7648 drv->capa.max_sched_scan_ssids,
7649 drv->capa.sched_scan_supported,
7650 drv->capa.max_match_sets,
7651 drv->capa.max_remain_on_chan,
7652 drv->capa.max_stations,
7653 drv->capa.probe_resp_offloads,
7654 drv->capa.max_acl_mac_addrs,
86056fea
IP
7655 drv->capa.num_multichan_concurrent,
7656 drv->capa.mac_addr_rand_sched_scan_supported,
079a28f7
AK
7657 drv->capa.mac_addr_rand_scan_supported,
7658 drv->capa.conc_capab,
7659 drv->capa.max_conc_chan_2_4,
09ea4309
AS
7660 drv->capa.max_conc_chan_5_0,
7661 drv->capa.max_sched_scan_plans,
7662 drv->capa.max_sched_scan_plan_interval,
7663 drv->capa.max_sched_scan_plan_iterations);
d85e1fc8 7664 if (os_snprintf_error(end - pos, res))
a771c07d
JM
7665 return pos - buf;
7666 pos += res;
7667 }
7668
7669 return pos - buf;
7670}
7671
7672
1c4ffa87
AO
7673static int set_beacon_data(struct nl_msg *msg, struct beacon_data *settings)
7674{
a862e4a3
JM
7675 if ((settings->head &&
7676 nla_put(msg, NL80211_ATTR_BEACON_HEAD,
7677 settings->head_len, settings->head)) ||
7678 (settings->tail &&
7679 nla_put(msg, NL80211_ATTR_BEACON_TAIL,
7680 settings->tail_len, settings->tail)) ||
7681 (settings->beacon_ies &&
7682 nla_put(msg, NL80211_ATTR_IE,
7683 settings->beacon_ies_len, settings->beacon_ies)) ||
7684 (settings->proberesp_ies &&
7685 nla_put(msg, NL80211_ATTR_IE_PROBE_RESP,
7686 settings->proberesp_ies_len, settings->proberesp_ies)) ||
7687 (settings->assocresp_ies &&
7688 nla_put(msg, NL80211_ATTR_IE_ASSOC_RESP,
7689 settings->assocresp_ies_len, settings->assocresp_ies)) ||
7690 (settings->probe_resp &&
7691 nla_put(msg, NL80211_ATTR_PROBE_RESP,
7692 settings->probe_resp_len, settings->probe_resp)))
7693 return -ENOBUFS;
1c4ffa87
AO
7694
7695 return 0;
1c4ffa87
AO
7696}
7697
7698
7699static int nl80211_switch_channel(void *priv, struct csa_settings *settings)
7700{
7701 struct nl_msg *msg;
7702 struct i802_bss *bss = priv;
7703 struct wpa_driver_nl80211_data *drv = bss->drv;
7704 struct nlattr *beacon_csa;
7705 int ret = -ENOBUFS;
366179d2
AO
7706 int csa_off_len = 0;
7707 int i;
1c4ffa87 7708
8d1fdde7 7709 wpa_printf(MSG_DEBUG, "nl80211: Channel switch request (cs_count=%u block_tx=%u freq=%d width=%d cf1=%d cf2=%d)",
1c4ffa87 7710 settings->cs_count, settings->block_tx,
8d1fdde7
JD
7711 settings->freq_params.freq, settings->freq_params.bandwidth,
7712 settings->freq_params.center_freq1,
7713 settings->freq_params.center_freq2);
1c4ffa87 7714
991aa9c7 7715 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_AP_CSA)) {
1c4ffa87
AO
7716 wpa_printf(MSG_DEBUG, "nl80211: Driver does not support channel switch command");
7717 return -EOPNOTSUPP;
7718 }
7719
7720 if ((drv->nlmode != NL80211_IFTYPE_AP) &&
7721 (drv->nlmode != NL80211_IFTYPE_P2P_GO))
7722 return -EOPNOTSUPP;
7723
366179d2
AO
7724 /*
7725 * Remove empty counters, assuming Probe Response and Beacon frame
7726 * counters match. This implementation assumes that there are only two
7727 * counters.
7728 */
7729 if (settings->counter_offset_beacon[0] &&
7730 !settings->counter_offset_beacon[1]) {
7731 csa_off_len = 1;
7732 } else if (settings->counter_offset_beacon[1] &&
7733 !settings->counter_offset_beacon[0]) {
7734 csa_off_len = 1;
7735 settings->counter_offset_beacon[0] =
7736 settings->counter_offset_beacon[1];
7737 settings->counter_offset_presp[0] =
7738 settings->counter_offset_presp[1];
7739 } else if (settings->counter_offset_beacon[1] &&
7740 settings->counter_offset_beacon[0]) {
7741 csa_off_len = 2;
7742 } else {
7743 wpa_printf(MSG_ERROR, "nl80211: No CSA counters provided");
7744 return -EINVAL;
7745 }
7746
7747 /* Check CSA counters validity */
7748 if (drv->capa.max_csa_counters &&
7749 csa_off_len > drv->capa.max_csa_counters) {
7750 wpa_printf(MSG_ERROR,
7751 "nl80211: Too many CSA counters provided");
1c4ffa87 7752 return -EINVAL;
366179d2 7753 }
1c4ffa87 7754
366179d2 7755 if (!settings->beacon_csa.tail)
1c4ffa87
AO
7756 return -EINVAL;
7757
366179d2
AO
7758 for (i = 0; i < csa_off_len; i++) {
7759 u16 csa_c_off_bcn = settings->counter_offset_beacon[i];
7760 u16 csa_c_off_presp = settings->counter_offset_presp[i];
7761
7762 if ((settings->beacon_csa.tail_len <= csa_c_off_bcn) ||
7763 (settings->beacon_csa.tail[csa_c_off_bcn] !=
7764 settings->cs_count))
7765 return -EINVAL;
7766
7767 if (settings->beacon_csa.probe_resp &&
7768 ((settings->beacon_csa.probe_resp_len <=
7769 csa_c_off_presp) ||
7770 (settings->beacon_csa.probe_resp[csa_c_off_presp] !=
7771 settings->cs_count)))
7772 return -EINVAL;
7773 }
7774
13f83980 7775 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_CHANNEL_SWITCH)) ||
a862e4a3
JM
7776 nla_put_u32(msg, NL80211_ATTR_CH_SWITCH_COUNT,
7777 settings->cs_count) ||
7778 (ret = nl80211_put_freq_params(msg, &settings->freq_params)) ||
7779 (settings->block_tx &&
7780 nla_put_flag(msg, NL80211_ATTR_CH_SWITCH_BLOCK_TX)))
1c4ffa87
AO
7781 goto error;
7782
1c4ffa87
AO
7783 /* beacon_after params */
7784 ret = set_beacon_data(msg, &settings->beacon_after);
7785 if (ret)
7786 goto error;
7787
7788 /* beacon_csa params */
7789 beacon_csa = nla_nest_start(msg, NL80211_ATTR_CSA_IES);
7790 if (!beacon_csa)
a862e4a3 7791 goto fail;
1c4ffa87
AO
7792
7793 ret = set_beacon_data(msg, &settings->beacon_csa);
7794 if (ret)
7795 goto error;
7796
366179d2
AO
7797 if (nla_put(msg, NL80211_ATTR_CSA_C_OFF_BEACON,
7798 csa_off_len * sizeof(u16),
7799 settings->counter_offset_beacon) ||
a862e4a3 7800 (settings->beacon_csa.probe_resp &&
366179d2
AO
7801 nla_put(msg, NL80211_ATTR_CSA_C_OFF_PRESP,
7802 csa_off_len * sizeof(u16),
7803 settings->counter_offset_presp)))
a862e4a3 7804 goto fail;
1c4ffa87
AO
7805
7806 nla_nest_end(msg, beacon_csa);
7807 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7808 if (ret) {
7809 wpa_printf(MSG_DEBUG, "nl80211: switch_channel failed err=%d (%s)",
7810 ret, strerror(-ret));
7811 }
7812 return ret;
7813
a862e4a3 7814fail:
1c4ffa87
AO
7815 ret = -ENOBUFS;
7816error:
7817 nlmsg_free(msg);
7818 wpa_printf(MSG_DEBUG, "nl80211: Could not build channel switch request");
7819 return ret;
7820}
7821
7822
dfa87878
MB
7823static int nl80211_add_ts(void *priv, u8 tsid, const u8 *addr,
7824 u8 user_priority, u16 admitted_time)
7825{
7826 struct i802_bss *bss = priv;
7827 struct wpa_driver_nl80211_data *drv = bss->drv;
7828 struct nl_msg *msg;
7829 int ret;
7830
7831 wpa_printf(MSG_DEBUG,
7832 "nl80211: add_ts request: tsid=%u admitted_time=%u up=%d",
7833 tsid, admitted_time, user_priority);
7834
7835 if (!is_sta_interface(drv->nlmode))
7836 return -ENOTSUP;
7837
56f77852
JM
7838 msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_ADD_TX_TS);
7839 if (!msg ||
a862e4a3
JM
7840 nla_put_u8(msg, NL80211_ATTR_TSID, tsid) ||
7841 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
7842 nla_put_u8(msg, NL80211_ATTR_USER_PRIO, user_priority) ||
7843 nla_put_u16(msg, NL80211_ATTR_ADMITTED_TIME, admitted_time)) {
7844 nlmsg_free(msg);
7845 return -ENOBUFS;
7846 }
dfa87878
MB
7847
7848 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7849 if (ret)
7850 wpa_printf(MSG_DEBUG, "nl80211: add_ts failed err=%d (%s)",
7851 ret, strerror(-ret));
7852 return ret;
dfa87878
MB
7853}
7854
7855
7856static int nl80211_del_ts(void *priv, u8 tsid, const u8 *addr)
7857{
7858 struct i802_bss *bss = priv;
7859 struct wpa_driver_nl80211_data *drv = bss->drv;
7860 struct nl_msg *msg;
7861 int ret;
7862
7863 wpa_printf(MSG_DEBUG, "nl80211: del_ts request: tsid=%u", tsid);
7864
7865 if (!is_sta_interface(drv->nlmode))
7866 return -ENOTSUP;
7867
56f77852 7868 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_DEL_TX_TS)) ||
a862e4a3
JM
7869 nla_put_u8(msg, NL80211_ATTR_TSID, tsid) ||
7870 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
7871 nlmsg_free(msg);
7872 return -ENOBUFS;
7873 }
dfa87878
MB
7874
7875 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7876 if (ret)
7877 wpa_printf(MSG_DEBUG, "nl80211: del_ts failed err=%d (%s)",
7878 ret, strerror(-ret));
7879 return ret;
dfa87878
MB
7880}
7881
7882
6b9f7af6
JM
7883#ifdef CONFIG_TESTING_OPTIONS
7884static int cmd_reply_handler(struct nl_msg *msg, void *arg)
7885{
7886 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
7887 struct wpabuf *buf = arg;
7888
7889 if (!buf)
7890 return NL_SKIP;
7891
7892 if ((size_t) genlmsg_attrlen(gnlh, 0) > wpabuf_tailroom(buf)) {
7893 wpa_printf(MSG_INFO, "nl80211: insufficient buffer space for reply");
7894 return NL_SKIP;
7895 }
7896
7897 wpabuf_put_data(buf, genlmsg_attrdata(gnlh, 0),
7898 genlmsg_attrlen(gnlh, 0));
7899
7900 return NL_SKIP;
7901}
7902#endif /* CONFIG_TESTING_OPTIONS */
7903
7904
adef8948
BL
7905static int vendor_reply_handler(struct nl_msg *msg, void *arg)
7906{
7907 struct nlattr *tb[NL80211_ATTR_MAX + 1];
7908 struct nlattr *nl_vendor_reply, *nl;
7909 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
7910 struct wpabuf *buf = arg;
7911 int rem;
7912
7913 if (!buf)
7914 return NL_SKIP;
7915
7916 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
7917 genlmsg_attrlen(gnlh, 0), NULL);
7918 nl_vendor_reply = tb[NL80211_ATTR_VENDOR_DATA];
7919
7920 if (!nl_vendor_reply)
7921 return NL_SKIP;
7922
7923 if ((size_t) nla_len(nl_vendor_reply) > wpabuf_tailroom(buf)) {
7924 wpa_printf(MSG_INFO, "nl80211: Vendor command: insufficient buffer space for reply");
7925 return NL_SKIP;
7926 }
7927
7928 nla_for_each_nested(nl, nl_vendor_reply, rem) {
7929 wpabuf_put_data(buf, nla_data(nl), nla_len(nl));
7930 }
7931
7932 return NL_SKIP;
7933}
7934
7935
7936static int nl80211_vendor_cmd(void *priv, unsigned int vendor_id,
7937 unsigned int subcmd, const u8 *data,
7938 size_t data_len, struct wpabuf *buf)
7939{
7940 struct i802_bss *bss = priv;
7941 struct wpa_driver_nl80211_data *drv = bss->drv;
7942 struct nl_msg *msg;
7943 int ret;
7944
6b9f7af6
JM
7945#ifdef CONFIG_TESTING_OPTIONS
7946 if (vendor_id == 0xffffffff) {
56f77852
JM
7947 msg = nlmsg_alloc();
7948 if (!msg)
7949 return -ENOMEM;
7950
6b9f7af6
JM
7951 nl80211_cmd(drv, msg, 0, subcmd);
7952 if (nlmsg_append(msg, (void *) data, data_len, NLMSG_ALIGNTO) <
7953 0)
a862e4a3 7954 goto fail;
6b9f7af6
JM
7955 ret = send_and_recv_msgs(drv, msg, cmd_reply_handler, buf);
7956 if (ret)
7957 wpa_printf(MSG_DEBUG, "nl80211: command failed err=%d",
7958 ret);
7959 return ret;
7960 }
7961#endif /* CONFIG_TESTING_OPTIONS */
7962
56f77852 7963 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_VENDOR)) ||
a862e4a3
JM
7964 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, vendor_id) ||
7965 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, subcmd) ||
7966 (data &&
7967 nla_put(msg, NL80211_ATTR_VENDOR_DATA, data_len, data)))
7968 goto fail;
adef8948
BL
7969
7970 ret = send_and_recv_msgs(drv, msg, vendor_reply_handler, buf);
7971 if (ret)
7972 wpa_printf(MSG_DEBUG, "nl80211: vendor command failed err=%d",
7973 ret);
7974 return ret;
7975
a862e4a3 7976fail:
adef8948
BL
7977 nlmsg_free(msg);
7978 return -ENOBUFS;
7979}
7980
7981
049105b4
KP
7982static int nl80211_set_qos_map(void *priv, const u8 *qos_map_set,
7983 u8 qos_map_set_len)
7984{
7985 struct i802_bss *bss = priv;
7986 struct wpa_driver_nl80211_data *drv = bss->drv;
7987 struct nl_msg *msg;
7988 int ret;
7989
049105b4
KP
7990 wpa_hexdump(MSG_DEBUG, "nl80211: Setting QoS Map",
7991 qos_map_set, qos_map_set_len);
7992
9725b784 7993 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_QOS_MAP)) ||
a862e4a3
JM
7994 nla_put(msg, NL80211_ATTR_QOS_MAP, qos_map_set_len, qos_map_set)) {
7995 nlmsg_free(msg);
7996 return -ENOBUFS;
7997 }
049105b4
KP
7998
7999 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
8000 if (ret)
8001 wpa_printf(MSG_DEBUG, "nl80211: Setting QoS Map failed");
8002
8003 return ret;
049105b4
KP
8004}
8005
8006
e4fa8b12
EP
8007static int nl80211_set_wowlan(void *priv,
8008 const struct wowlan_triggers *triggers)
8009{
8010 struct i802_bss *bss = priv;
8011 struct wpa_driver_nl80211_data *drv = bss->drv;
8012 struct nl_msg *msg;
8013 struct nlattr *wowlan_triggers;
8014 int ret;
8015
e4fa8b12
EP
8016 wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan");
8017
1ac977bd 8018 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_SET_WOWLAN)) ||
a862e4a3
JM
8019 !(wowlan_triggers = nla_nest_start(msg,
8020 NL80211_ATTR_WOWLAN_TRIGGERS)) ||
8021 (triggers->any &&
8022 nla_put_flag(msg, NL80211_WOWLAN_TRIG_ANY)) ||
8023 (triggers->disconnect &&
8024 nla_put_flag(msg, NL80211_WOWLAN_TRIG_DISCONNECT)) ||
8025 (triggers->magic_pkt &&
8026 nla_put_flag(msg, NL80211_WOWLAN_TRIG_MAGIC_PKT)) ||
8027 (triggers->gtk_rekey_failure &&
8028 nla_put_flag(msg, NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE)) ||
8029 (triggers->eap_identity_req &&
8030 nla_put_flag(msg, NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST)) ||
8031 (triggers->four_way_handshake &&
8032 nla_put_flag(msg, NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE)) ||
8033 (triggers->rfkill_release &&
8034 nla_put_flag(msg, NL80211_WOWLAN_TRIG_RFKILL_RELEASE))) {
8035 nlmsg_free(msg);
8036 return -ENOBUFS;
8037 }
e4fa8b12
EP
8038
8039 nla_nest_end(msg, wowlan_triggers);
8040
8041 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
8042 if (ret)
8043 wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan failed");
8044
8045 return ret;
e4fa8b12
EP
8046}
8047
8048
b658547d 8049#ifdef CONFIG_DRIVER_NL80211_QCA
0800f9ee
JM
8050static int nl80211_roaming(void *priv, int allowed, const u8 *bssid)
8051{
8052 struct i802_bss *bss = priv;
8053 struct wpa_driver_nl80211_data *drv = bss->drv;
8054 struct nl_msg *msg;
8055 struct nlattr *params;
8056
8057 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
8058
8059 if (!drv->roaming_vendor_cmd_avail) {
8060 wpa_printf(MSG_DEBUG,
8061 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
8062 return -1;
8063 }
8064
9725b784 8065 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
a862e4a3
JM
8066 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
8067 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
8068 QCA_NL80211_VENDOR_SUBCMD_ROAMING) ||
8069 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
8070 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_POLICY,
8071 allowed ? QCA_ROAMING_ALLOWED_WITHIN_ESS :
8072 QCA_ROAMING_NOT_ALLOWED) ||
8073 (bssid &&
8074 nla_put(msg, QCA_WLAN_VENDOR_ATTR_MAC_ADDR, ETH_ALEN, bssid))) {
8075 nlmsg_free(msg);
8076 return -1;
8077 }
0800f9ee
JM
8078 nla_nest_end(msg, params);
8079
8080 return send_and_recv_msgs(drv, msg, NULL, NULL);
0800f9ee 8081}
b658547d 8082#endif /* CONFIG_DRIVER_NL80211_QCA */
0800f9ee
JM
8083
8084
fee354c7
JM
8085static int nl80211_set_mac_addr(void *priv, const u8 *addr)
8086{
8087 struct i802_bss *bss = priv;
8088 struct wpa_driver_nl80211_data *drv = bss->drv;
8089 int new_addr = addr != NULL;
8090
8091 if (!addr)
8092 addr = drv->perm_addr;
8093
8094 if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) < 0)
8095 return -1;
8096
8097 if (linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname, addr) < 0)
8098 {
8099 wpa_printf(MSG_DEBUG,
8100 "nl80211: failed to set_mac_addr for %s to " MACSTR,
8101 bss->ifname, MAC2STR(addr));
8102 if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname,
8103 1) < 0) {
8104 wpa_printf(MSG_DEBUG,
8105 "nl80211: Could not restore interface UP after failed set_mac_addr");
8106 }
8107 return -1;
8108 }
8109
8110 wpa_printf(MSG_DEBUG, "nl80211: set_mac_addr for %s to " MACSTR,
8111 bss->ifname, MAC2STR(addr));
8112 drv->addr_changed = new_addr;
8113 os_memcpy(bss->addr, addr, ETH_ALEN);
8114
8115 if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 1) < 0)
8116 {
8117 wpa_printf(MSG_DEBUG,
8118 "nl80211: Could not restore interface UP after set_mac_addr");
8119 }
8120
8121 return 0;
8122}
8123
8124
6c1664f6
BC
8125#ifdef CONFIG_MESH
8126
8127static int wpa_driver_nl80211_init_mesh(void *priv)
8128{
8129 if (wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_MESH_POINT)) {
8130 wpa_printf(MSG_INFO,
8131 "nl80211: Failed to set interface into mesh mode");
8132 return -1;
8133 }
8134 return 0;
8135}
8136
8137
21c74e84
JM
8138static int nl80211_put_mesh_id(struct nl_msg *msg, const u8 *mesh_id,
8139 size_t mesh_id_len)
8140{
8141 if (mesh_id) {
8142 wpa_hexdump_ascii(MSG_DEBUG, " * Mesh ID (SSID)",
8143 mesh_id, mesh_id_len);
8144 return nla_put(msg, NL80211_ATTR_MESH_ID, mesh_id_len, mesh_id);
8145 }
8146
8147 return 0;
8148}
8149
8150
0cb5f8d9 8151static int nl80211_join_mesh(struct i802_bss *bss,
6c1664f6
BC
8152 struct wpa_driver_mesh_join_params *params)
8153{
6c1664f6
BC
8154 struct wpa_driver_nl80211_data *drv = bss->drv;
8155 struct nl_msg *msg;
8156 struct nlattr *container;
7451a217 8157 int ret = -1;
6c1664f6 8158
6c1664f6 8159 wpa_printf(MSG_DEBUG, "nl80211: mesh join (ifindex=%d)", drv->ifindex);
9725b784 8160 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_JOIN_MESH);
f7e889fa
JM
8161 if (!msg ||
8162 nl80211_put_freq_params(msg, &params->freq) ||
21c74e84
JM
8163 nl80211_put_basic_rates(msg, params->basic_rates) ||
8164 nl80211_put_mesh_id(msg, params->meshid, params->meshid_len) ||
8165 nl80211_put_beacon_int(msg, params->beacon_int))
85e1fad8 8166 goto fail;
9c58c5f7 8167
6c1664f6
BC
8168 wpa_printf(MSG_DEBUG, " * flags=%08X", params->flags);
8169
8170 container = nla_nest_start(msg, NL80211_ATTR_MESH_SETUP);
8171 if (!container)
a862e4a3 8172 goto fail;
6c1664f6
BC
8173
8174 if (params->ies) {
8175 wpa_hexdump(MSG_DEBUG, " * IEs", params->ies, params->ie_len);
a862e4a3
JM
8176 if (nla_put(msg, NL80211_MESH_SETUP_IE, params->ie_len,
8177 params->ies))
8178 goto fail;
6c1664f6
BC
8179 }
8180 /* WPA_DRIVER_MESH_FLAG_OPEN_AUTH is treated as default by nl80211 */
8181 if (params->flags & WPA_DRIVER_MESH_FLAG_SAE_AUTH) {
a862e4a3
JM
8182 if (nla_put_u8(msg, NL80211_MESH_SETUP_AUTH_PROTOCOL, 0x1) ||
8183 nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_AUTH))
8184 goto fail;
6c1664f6 8185 }
a862e4a3
JM
8186 if ((params->flags & WPA_DRIVER_MESH_FLAG_AMPE) &&
8187 nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_AMPE))
8188 goto fail;
8189 if ((params->flags & WPA_DRIVER_MESH_FLAG_USER_MPM) &&
8190 nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_MPM))
8191 goto fail;
6c1664f6
BC
8192 nla_nest_end(msg, container);
8193
8194 container = nla_nest_start(msg, NL80211_ATTR_MESH_CONFIG);
8195 if (!container)
a862e4a3 8196 goto fail;
6c1664f6 8197
a862e4a3
JM
8198 if (!(params->conf.flags & WPA_DRIVER_MESH_CONF_FLAG_AUTO_PLINKS) &&
8199 nla_put_u32(msg, NL80211_MESHCONF_AUTO_OPEN_PLINKS, 0))
8200 goto fail;
4b409368
MH
8201 if ((params->conf.flags & WPA_DRIVER_MESH_FLAG_DRIVER_MPM) &&
8202 nla_put_u16(msg, NL80211_MESHCONF_MAX_PEER_LINKS,
8203 params->max_peer_links))
8204 goto fail;
5a2a6de6
MH
8205
8206 /*
8207 * Set NL80211_MESHCONF_PLINK_TIMEOUT even if user mpm is used because
8208 * the timer could disconnect stations even in that case.
5a2a6de6 8209 */
0cb5f8d9
MH
8210 if (nla_put_u32(msg, NL80211_MESHCONF_PLINK_TIMEOUT,
8211 params->conf.peer_link_timeout)) {
5a2a6de6
MH
8212 wpa_printf(MSG_ERROR, "nl80211: Failed to set PLINK_TIMEOUT");
8213 goto fail;
8214 }
8215
6c1664f6
BC
8216 nla_nest_end(msg, container);
8217
8218 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
8219 msg = NULL;
8220 if (ret) {
8221 wpa_printf(MSG_DEBUG, "nl80211: mesh join failed: ret=%d (%s)",
8222 ret, strerror(-ret));
a862e4a3 8223 goto fail;
6c1664f6
BC
8224 }
8225 ret = 0;
f7e889fa 8226 bss->freq = params->freq.freq;
6c1664f6
BC
8227 wpa_printf(MSG_DEBUG, "nl80211: mesh join request send successfully");
8228
a862e4a3 8229fail:
6c1664f6
BC
8230 nlmsg_free(msg);
8231 return ret;
8232}
8233
8234
0cb5f8d9
MH
8235static int
8236wpa_driver_nl80211_join_mesh(void *priv,
8237 struct wpa_driver_mesh_join_params *params)
8238{
8239 struct i802_bss *bss = priv;
8240 int ret, timeout;
8241
8242 timeout = params->conf.peer_link_timeout;
8243
8244 /* Disable kernel inactivity timer */
8245 if (params->flags & WPA_DRIVER_MESH_FLAG_USER_MPM)
8246 params->conf.peer_link_timeout = 0;
8247
8248 ret = nl80211_join_mesh(bss, params);
8249 if (ret == -EINVAL && params->conf.peer_link_timeout == 0) {
8250 wpa_printf(MSG_DEBUG,
8251 "nl80211: Mesh join retry for peer_link_timeout");
8252 /*
8253 * Old kernel does not support setting
8254 * NL80211_MESHCONF_PLINK_TIMEOUT to zero, so set 60 seconds
8255 * into future from peer_link_timeout.
8256 */
8257 params->conf.peer_link_timeout = timeout + 60;
8258 ret = nl80211_join_mesh(priv, params);
8259 }
8260
8261 params->conf.peer_link_timeout = timeout;
8262 return ret;
8263}
8264
8265
6c1664f6
BC
8266static int wpa_driver_nl80211_leave_mesh(void *priv)
8267{
8268 struct i802_bss *bss = priv;
8269 struct wpa_driver_nl80211_data *drv = bss->drv;
8270 struct nl_msg *msg;
9725b784 8271 int ret;
6c1664f6
BC
8272
8273 wpa_printf(MSG_DEBUG, "nl80211: mesh leave (ifindex=%d)", drv->ifindex);
9725b784 8274 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_LEAVE_MESH);
6c1664f6 8275 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
6c1664f6
BC
8276 if (ret) {
8277 wpa_printf(MSG_DEBUG, "nl80211: mesh leave failed: ret=%d (%s)",
8278 ret, strerror(-ret));
a862e4a3
JM
8279 } else {
8280 wpa_printf(MSG_DEBUG,
8281 "nl80211: mesh leave request send successfully");
6c1664f6 8282 }
6c1664f6 8283
f33c82d2
JM
8284 if (wpa_driver_nl80211_set_mode(drv->first_bss,
8285 NL80211_IFTYPE_STATION)) {
8286 wpa_printf(MSG_INFO,
8287 "nl80211: Failed to set interface into station mode");
8288 }
6c1664f6
BC
8289 return ret;
8290}
8291
8292#endif /* CONFIG_MESH */
8293
8294
ed4ddb6d
KP
8295static int wpa_driver_br_add_ip_neigh(void *priv, u8 version,
8296 const u8 *ipaddr, int prefixlen,
8297 const u8 *addr)
71103bed
KP
8298{
8299#ifdef CONFIG_LIBNL3_ROUTE
8300 struct i802_bss *bss = priv;
8301 struct wpa_driver_nl80211_data *drv = bss->drv;
8302 struct rtnl_neigh *rn;
8303 struct nl_addr *nl_ipaddr = NULL;
8304 struct nl_addr *nl_lladdr = NULL;
ed4ddb6d 8305 int family, addrsize;
71103bed
KP
8306 int res;
8307
ed4ddb6d 8308 if (!ipaddr || prefixlen == 0 || !addr)
71103bed
KP
8309 return -EINVAL;
8310
8311 if (bss->br_ifindex == 0) {
8312 wpa_printf(MSG_DEBUG,
8313 "nl80211: bridge must be set before adding an ip neigh to it");
8314 return -1;
8315 }
8316
8317 if (!drv->rtnl_sk) {
8318 wpa_printf(MSG_DEBUG,
8319 "nl80211: nl_sock for NETLINK_ROUTE is not initialized");
8320 return -1;
8321 }
8322
ed4ddb6d
KP
8323 if (version == 4) {
8324 family = AF_INET;
8325 addrsize = 4;
8326 } else if (version == 6) {
8327 family = AF_INET6;
8328 addrsize = 16;
8329 } else {
8330 return -EINVAL;
8331 }
8332
71103bed
KP
8333 rn = rtnl_neigh_alloc();
8334 if (rn == NULL)
8335 return -ENOMEM;
8336
8337 /* set the destination ip address for neigh */
ed4ddb6d 8338 nl_ipaddr = nl_addr_build(family, (void *) ipaddr, addrsize);
71103bed
KP
8339 if (nl_ipaddr == NULL) {
8340 wpa_printf(MSG_DEBUG, "nl80211: nl_ipaddr build failed");
8341 res = -ENOMEM;
8342 goto errout;
8343 }
8344 nl_addr_set_prefixlen(nl_ipaddr, prefixlen);
8345 res = rtnl_neigh_set_dst(rn, nl_ipaddr);
8346 if (res) {
8347 wpa_printf(MSG_DEBUG,
8348 "nl80211: neigh set destination addr failed");
8349 goto errout;
8350 }
8351
8352 /* set the corresponding lladdr for neigh */
8353 nl_lladdr = nl_addr_build(AF_BRIDGE, (u8 *) addr, ETH_ALEN);
8354 if (nl_lladdr == NULL) {
8355 wpa_printf(MSG_DEBUG, "nl80211: neigh set lladdr failed");
8356 res = -ENOMEM;
8357 goto errout;
8358 }
8359 rtnl_neigh_set_lladdr(rn, nl_lladdr);
8360
8361 rtnl_neigh_set_ifindex(rn, bss->br_ifindex);
8362 rtnl_neigh_set_state(rn, NUD_PERMANENT);
8363
8364 res = rtnl_neigh_add(drv->rtnl_sk, rn, NLM_F_CREATE);
8365 if (res) {
8366 wpa_printf(MSG_DEBUG,
8367 "nl80211: Adding bridge ip neigh failed: %s",
8368 strerror(errno));
8369 }
8370errout:
8371 if (nl_lladdr)
8372 nl_addr_put(nl_lladdr);
8373 if (nl_ipaddr)
8374 nl_addr_put(nl_ipaddr);
8375 if (rn)
8376 rtnl_neigh_put(rn);
8377 return res;
8378#else /* CONFIG_LIBNL3_ROUTE */
8379 return -1;
8380#endif /* CONFIG_LIBNL3_ROUTE */
8381}
8382
8383
ed4ddb6d
KP
8384static int wpa_driver_br_delete_ip_neigh(void *priv, u8 version,
8385 const u8 *ipaddr)
71103bed
KP
8386{
8387#ifdef CONFIG_LIBNL3_ROUTE
8388 struct i802_bss *bss = priv;
8389 struct wpa_driver_nl80211_data *drv = bss->drv;
8390 struct rtnl_neigh *rn;
8391 struct nl_addr *nl_ipaddr;
ed4ddb6d 8392 int family, addrsize;
71103bed
KP
8393 int res;
8394
ed4ddb6d 8395 if (!ipaddr)
71103bed
KP
8396 return -EINVAL;
8397
ed4ddb6d
KP
8398 if (version == 4) {
8399 family = AF_INET;
8400 addrsize = 4;
8401 } else if (version == 6) {
8402 family = AF_INET6;
8403 addrsize = 16;
8404 } else {
8405 return -EINVAL;
8406 }
8407
71103bed
KP
8408 if (bss->br_ifindex == 0) {
8409 wpa_printf(MSG_DEBUG,
8410 "nl80211: bridge must be set to delete an ip neigh");
8411 return -1;
8412 }
8413
8414 if (!drv->rtnl_sk) {
8415 wpa_printf(MSG_DEBUG,
8416 "nl80211: nl_sock for NETLINK_ROUTE is not initialized");
8417 return -1;
8418 }
8419
8420 rn = rtnl_neigh_alloc();
8421 if (rn == NULL)
8422 return -ENOMEM;
8423
8424 /* set the destination ip address for neigh */
ed4ddb6d 8425 nl_ipaddr = nl_addr_build(family, (void *) ipaddr, addrsize);
71103bed
KP
8426 if (nl_ipaddr == NULL) {
8427 wpa_printf(MSG_DEBUG, "nl80211: nl_ipaddr build failed");
8428 res = -ENOMEM;
8429 goto errout;
8430 }
8431 res = rtnl_neigh_set_dst(rn, nl_ipaddr);
8432 if (res) {
8433 wpa_printf(MSG_DEBUG,
8434 "nl80211: neigh set destination addr failed");
8435 goto errout;
8436 }
8437
8438 rtnl_neigh_set_ifindex(rn, bss->br_ifindex);
8439
8440 res = rtnl_neigh_delete(drv->rtnl_sk, rn, 0);
8441 if (res) {
8442 wpa_printf(MSG_DEBUG,
8443 "nl80211: Deleting bridge ip neigh failed: %s",
8444 strerror(errno));
8445 }
8446errout:
8447 if (nl_ipaddr)
8448 nl_addr_put(nl_ipaddr);
8449 if (rn)
8450 rtnl_neigh_put(rn);
8451 return res;
8452#else /* CONFIG_LIBNL3_ROUTE */
8453 return -1;
8454#endif /* CONFIG_LIBNL3_ROUTE */
8455}
8456
8457
73d2294f
KP
8458static int linux_write_system_file(const char *path, unsigned int val)
8459{
8460 char buf[50];
8461 int fd, len;
8462
8463 len = os_snprintf(buf, sizeof(buf), "%u\n", val);
a9aaacbb 8464 if (os_snprintf_error(sizeof(buf), len))
73d2294f
KP
8465 return -1;
8466
8467 fd = open(path, O_WRONLY);
8468 if (fd < 0)
8469 return -1;
8470
8471 if (write(fd, buf, len) < 0) {
8472 wpa_printf(MSG_DEBUG,
8473 "nl80211: Failed to write Linux system file: %s with the value of %d",
8474 path, val);
8475 close(fd);
8476 return -1;
8477 }
8478 close(fd);
8479
8480 return 0;
8481}
8482
8483
8484static const char * drv_br_port_attr_str(enum drv_br_port_attr attr)
8485{
8486 switch (attr) {
8487 case DRV_BR_PORT_ATTR_PROXYARP:
bea8d9a3 8488 return "proxyarp_wifi";
73d2294f
KP
8489 case DRV_BR_PORT_ATTR_HAIRPIN_MODE:
8490 return "hairpin_mode";
8491 }
8492
8493 return NULL;
8494}
8495
8496
8497static int wpa_driver_br_port_set_attr(void *priv, enum drv_br_port_attr attr,
8498 unsigned int val)
8499{
8500 struct i802_bss *bss = priv;
8501 char path[128];
8502 const char *attr_txt;
8503
8504 attr_txt = drv_br_port_attr_str(attr);
8505 if (attr_txt == NULL)
8506 return -EINVAL;
8507
8508 os_snprintf(path, sizeof(path), "/sys/class/net/%s/brport/%s",
8509 bss->ifname, attr_txt);
8510
8511 if (linux_write_system_file(path, val))
8512 return -1;
8513
8514 return 0;
8515}
8516
8517
7565752d
KP
8518static const char * drv_br_net_param_str(enum drv_br_net_param param)
8519{
8520 switch (param) {
8521 case DRV_BR_NET_PARAM_GARP_ACCEPT:
8522 return "arp_accept";
60eb9e17
JM
8523 default:
8524 return NULL;
7565752d 8525 }
7565752d
KP
8526}
8527
8528
8529static int wpa_driver_br_set_net_param(void *priv, enum drv_br_net_param param,
8530 unsigned int val)
8531{
8532 struct i802_bss *bss = priv;
8533 char path[128];
8534 const char *param_txt;
8535 int ip_version = 4;
8536
60eb9e17
JM
8537 if (param == DRV_BR_MULTICAST_SNOOPING) {
8538 os_snprintf(path, sizeof(path),
8539 "/sys/devices/virtual/net/%s/bridge/multicast_snooping",
8540 bss->brname);
8541 goto set_val;
8542 }
8543
7565752d
KP
8544 param_txt = drv_br_net_param_str(param);
8545 if (param_txt == NULL)
8546 return -EINVAL;
8547
8548 switch (param) {
8549 case DRV_BR_NET_PARAM_GARP_ACCEPT:
8550 ip_version = 4;
8551 break;
8552 default:
8553 return -EINVAL;
8554 }
8555
8556 os_snprintf(path, sizeof(path), "/proc/sys/net/ipv%d/conf/%s/%s",
8557 ip_version, bss->brname, param_txt);
8558
60eb9e17 8559set_val:
7565752d
KP
8560 if (linux_write_system_file(path, val))
8561 return -1;
8562
8563 return 0;
8564}
8565
8566
b658547d
JM
8567#ifdef CONFIG_DRIVER_NL80211_QCA
8568
16689c7c
PX
8569static int hw_mode_to_qca_acs(enum hostapd_hw_mode hw_mode)
8570{
8571 switch (hw_mode) {
8572 case HOSTAPD_MODE_IEEE80211B:
8573 return QCA_ACS_MODE_IEEE80211B;
8574 case HOSTAPD_MODE_IEEE80211G:
8575 return QCA_ACS_MODE_IEEE80211G;
8576 case HOSTAPD_MODE_IEEE80211A:
8577 return QCA_ACS_MODE_IEEE80211A;
8578 case HOSTAPD_MODE_IEEE80211AD:
8579 return QCA_ACS_MODE_IEEE80211AD;
3784c058
PX
8580 case HOSTAPD_MODE_IEEE80211ANY:
8581 return QCA_ACS_MODE_IEEE80211ANY;
16689c7c
PX
8582 default:
8583 return -1;
8584 }
8585}
8586
8587
d0cdccd3
PX
8588static int add_acs_freq_list(struct nl_msg *msg, const int *freq_list)
8589{
8590 int i, len, ret;
8591 u32 *freqs;
8592
8593 if (!freq_list)
8594 return 0;
8595 len = int_array_len(freq_list);
8596 freqs = os_malloc(sizeof(u32) * len);
8597 if (!freqs)
8598 return -1;
8599 for (i = 0; i < len; i++)
8600 freqs[i] = freq_list[i];
8601 ret = nla_put(msg, QCA_WLAN_VENDOR_ATTR_ACS_FREQ_LIST,
8602 sizeof(u32) * len, freqs);
8603 os_free(freqs);
8604 return ret;
8605}
8606
8607
16689c7c
PX
8608static int wpa_driver_do_acs(void *priv, struct drv_acs_params *params)
8609{
8610 struct i802_bss *bss = priv;
8611 struct wpa_driver_nl80211_data *drv = bss->drv;
8612 struct nl_msg *msg;
8613 struct nlattr *data;
a862e4a3 8614 int ret;
16689c7c
PX
8615 int mode;
8616
8617 mode = hw_mode_to_qca_acs(params->hw_mode);
8618 if (mode < 0)
8619 return -1;
8620
9725b784 8621 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
a862e4a3
JM
8622 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
8623 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
8624 QCA_NL80211_VENDOR_SUBCMD_DO_ACS) ||
8625 !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
8626 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_ACS_HW_MODE, mode) ||
8627 (params->ht_enabled &&
8628 nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_HT_ENABLED)) ||
8629 (params->ht40_enabled &&
857d9422
MM
8630 nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_HT40_ENABLED)) ||
8631 (params->vht_enabled &&
8632 nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_VHT_ENABLED)) ||
8633 nla_put_u16(msg, QCA_WLAN_VENDOR_ATTR_ACS_CHWIDTH,
8634 params->ch_width) ||
8635 (params->ch_list_len &&
8636 nla_put(msg, QCA_WLAN_VENDOR_ATTR_ACS_CH_LIST, params->ch_list_len,
d0cdccd3
PX
8637 params->ch_list)) ||
8638 add_acs_freq_list(msg, params->freq_list)) {
a862e4a3
JM
8639 nlmsg_free(msg);
8640 return -ENOBUFS;
8641 }
16689c7c
PX
8642 nla_nest_end(msg, data);
8643
857d9422
MM
8644 wpa_printf(MSG_DEBUG,
8645 "nl80211: ACS Params: HW_MODE: %d HT: %d HT40: %d VHT: %d BW: %d CH_LIST_LEN: %u",
8646 params->hw_mode, params->ht_enabled, params->ht40_enabled,
8647 params->vht_enabled, params->ch_width, params->ch_list_len);
8648
16689c7c 8649 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
16689c7c
PX
8650 if (ret) {
8651 wpa_printf(MSG_DEBUG,
8652 "nl80211: Failed to invoke driver ACS function: %s",
8653 strerror(errno));
8654 }
16689c7c
PX
8655 return ret;
8656}
8657
8658
844dfeb8
SD
8659static int nl80211_set_band(void *priv, enum set_band band)
8660{
8661 struct i802_bss *bss = priv;
8662 struct wpa_driver_nl80211_data *drv = bss->drv;
8663 struct nl_msg *msg;
8664 struct nlattr *data;
8665 int ret;
8666 enum qca_set_band qca_band;
8667
8668 if (!drv->setband_vendor_cmd_avail)
8669 return -1;
8670
8671 switch (band) {
8672 case WPA_SETBAND_AUTO:
8673 qca_band = QCA_SETBAND_AUTO;
8674 break;
8675 case WPA_SETBAND_5G:
8676 qca_band = QCA_SETBAND_5G;
8677 break;
8678 case WPA_SETBAND_2G:
8679 qca_band = QCA_SETBAND_2G;
8680 break;
8681 default:
8682 return -1;
8683 }
8684
8685 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
8686 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
8687 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
8688 QCA_NL80211_VENDOR_SUBCMD_SETBAND) ||
8689 !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
8690 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_SETBAND_VALUE, qca_band)) {
8691 nlmsg_free(msg);
8692 return -ENOBUFS;
8693 }
8694 nla_nest_end(msg, data);
8695
8696 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
8697 if (ret) {
8698 wpa_printf(MSG_DEBUG,
8699 "nl80211: Driver setband function failed: %s",
8700 strerror(errno));
8701 }
8702 return ret;
8703}
8704
8705
98342208
AK
8706struct nl80211_pcl {
8707 unsigned int num;
8708 unsigned int *freq_list;
8709};
8710
8711static int preferred_freq_info_handler(struct nl_msg *msg, void *arg)
8712{
8713 struct nlattr *tb[NL80211_ATTR_MAX + 1];
8714 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
8715 struct nl80211_pcl *param = arg;
8716 struct nlattr *nl_vend, *attr;
8717 enum qca_iface_type iface_type;
8718 struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_MAX + 1];
8719 unsigned int num, max_num;
8720 u32 *freqs;
8721
8722 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
8723 genlmsg_attrlen(gnlh, 0), NULL);
8724
8725 nl_vend = tb[NL80211_ATTR_VENDOR_DATA];
8726 if (!nl_vend)
8727 return NL_SKIP;
8728
8729 nla_parse(tb_vendor, QCA_WLAN_VENDOR_ATTR_MAX,
8730 nla_data(nl_vend), nla_len(nl_vend), NULL);
8731
8732 attr = tb_vendor[
8733 QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST_IFACE_TYPE];
8734 if (!attr) {
8735 wpa_printf(MSG_ERROR, "nl80211: iface_type couldn't be found");
8736 param->num = 0;
8737 return NL_SKIP;
8738 }
8739
8740 iface_type = (enum qca_iface_type) nla_get_u32(attr);
8741 wpa_printf(MSG_DEBUG, "nl80211: Driver returned iface_type=%d",
8742 iface_type);
8743
8744 attr = tb_vendor[QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST];
8745 if (!attr) {
8746 wpa_printf(MSG_ERROR,
8747 "nl80211: preferred_freq_list couldn't be found");
8748 param->num = 0;
8749 return NL_SKIP;
8750 }
8751
8752 /*
8753 * param->num has the maximum number of entries for which there
8754 * is room in the freq_list provided by the caller.
8755 */
8756 freqs = nla_data(attr);
8757 max_num = nla_len(attr) / sizeof(u32);
8758 if (max_num > param->num)
8759 max_num = param->num;
8760 for (num = 0; num < max_num; num++)
8761 param->freq_list[num] = freqs[num];
8762 param->num = num;
8763
8764 return NL_SKIP;
8765}
8766
8767
8768static int nl80211_get_pref_freq_list(void *priv,
8769 enum wpa_driver_if_type if_type,
8770 unsigned int *num,
8771 unsigned int *freq_list)
8772{
8773 struct i802_bss *bss = priv;
8774 struct wpa_driver_nl80211_data *drv = bss->drv;
8775 struct nl_msg *msg;
8776 int ret;
8777 unsigned int i;
8778 struct nlattr *params;
8779 struct nl80211_pcl param;
8780 enum qca_iface_type iface_type;
8781
8782 if (!drv->get_pref_freq_list)
8783 return -1;
8784
8785 switch (if_type) {
8786 case WPA_IF_STATION:
8787 iface_type = QCA_IFACE_TYPE_STA;
8788 break;
8789 case WPA_IF_AP_BSS:
8790 iface_type = QCA_IFACE_TYPE_AP;
8791 break;
8792 case WPA_IF_P2P_GO:
8793 iface_type = QCA_IFACE_TYPE_P2P_GO;
8794 break;
8795 case WPA_IF_P2P_CLIENT:
8796 iface_type = QCA_IFACE_TYPE_P2P_CLIENT;
8797 break;
8798 case WPA_IF_IBSS:
8799 iface_type = QCA_IFACE_TYPE_IBSS;
8800 break;
8801 case WPA_IF_TDLS:
8802 iface_type = QCA_IFACE_TYPE_TDLS;
8803 break;
8804 default:
8805 return -1;
8806 }
8807
8808 param.num = *num;
8809 param.freq_list = freq_list;
8810
8811 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
8812 nla_put_u32(msg, NL80211_ATTR_IFINDEX, drv->ifindex) ||
8813 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
8814 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
8815 QCA_NL80211_VENDOR_SUBCMD_GET_PREFERRED_FREQ_LIST) ||
8816 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
8817 nla_put_u32(msg,
8818 QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST_IFACE_TYPE,
8819 iface_type)) {
8820 wpa_printf(MSG_ERROR,
8821 "%s: err in adding vendor_cmd and vendor_data",
8822 __func__);
8823 nlmsg_free(msg);
8824 return -1;
8825 }
8826 nla_nest_end(msg, params);
8827
8828 os_memset(freq_list, 0, *num * sizeof(freq_list[0]));
8829 ret = send_and_recv_msgs(drv, msg, preferred_freq_info_handler, &param);
8830 if (ret) {
8831 wpa_printf(MSG_ERROR,
8832 "%s: err in send_and_recv_msgs", __func__);
8833 return ret;
8834 }
8835
8836 *num = param.num;
8837
8838 for (i = 0; i < *num; i++) {
8839 wpa_printf(MSG_DEBUG, "nl80211: preferred_channel_list[%d]=%d",
8840 i, freq_list[i]);
8841 }
8842
8843 return 0;
8844}
8845
8846
7c813acf
AK
8847static int nl80211_set_prob_oper_freq(void *priv, unsigned int freq)
8848{
8849 struct i802_bss *bss = priv;
8850 struct wpa_driver_nl80211_data *drv = bss->drv;
8851 struct nl_msg *msg;
8852 int ret;
8853 struct nlattr *params;
8854
8855 if (!drv->set_prob_oper_freq)
8856 return -1;
8857
8858 wpa_printf(MSG_DEBUG,
8859 "nl80211: Set P2P probable operating freq %u for ifindex %d",
8860 freq, bss->ifindex);
8861
8862 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
8863 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
8864 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
8865 QCA_NL80211_VENDOR_SUBCMD_SET_PROBABLE_OPER_CHANNEL) ||
8866 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
8867 nla_put_u32(msg,
8868 QCA_WLAN_VENDOR_ATTR_PROBABLE_OPER_CHANNEL_IFACE_TYPE,
8869 QCA_IFACE_TYPE_P2P_CLIENT) ||
8870 nla_put_u32(msg,
8871 QCA_WLAN_VENDOR_ATTR_PROBABLE_OPER_CHANNEL_FREQ,
8872 freq)) {
8873 wpa_printf(MSG_ERROR,
8874 "%s: err in adding vendor_cmd and vendor_data",
8875 __func__);
8876 nlmsg_free(msg);
8877 return -1;
8878 }
8879 nla_nest_end(msg, params);
8880
8881 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
8882 msg = NULL;
8883 if (ret) {
8884 wpa_printf(MSG_ERROR, "%s: err in send_and_recv_msgs",
8885 __func__);
8886 return ret;
8887 }
8888 nlmsg_free(msg);
8889 return 0;
8890}
8891
b658547d
JM
8892#endif /* CONFIG_DRIVER_NL80211_QCA */
8893
7c813acf 8894
3f5285e8
JM
8895const struct wpa_driver_ops wpa_driver_nl80211_ops = {
8896 .name = "nl80211",
8897 .desc = "Linux nl80211/cfg80211",
8898 .get_bssid = wpa_driver_nl80211_get_bssid,
8899 .get_ssid = wpa_driver_nl80211_get_ssid,
9ebce9c5
JM
8900 .set_key = driver_nl80211_set_key,
8901 .scan2 = driver_nl80211_scan2,
d21c63b9
LC
8902 .sched_scan = wpa_driver_nl80211_sched_scan,
8903 .stop_sched_scan = wpa_driver_nl80211_stop_sched_scan,
3f5285e8 8904 .get_scan_results2 = wpa_driver_nl80211_get_scan_results,
4f30addb 8905 .abort_scan = wpa_driver_nl80211_abort_scan,
9ebce9c5
JM
8906 .deauthenticate = driver_nl80211_deauthenticate,
8907 .authenticate = driver_nl80211_authenticate,
3f5285e8 8908 .associate = wpa_driver_nl80211_associate,
f2ed8023
JM
8909 .global_init = nl80211_global_init,
8910 .global_deinit = nl80211_global_deinit,
8911 .init2 = wpa_driver_nl80211_init,
9ebce9c5 8912 .deinit = driver_nl80211_deinit,
3f5285e8
JM
8913 .get_capa = wpa_driver_nl80211_get_capa,
8914 .set_operstate = wpa_driver_nl80211_set_operstate,
01652550 8915 .set_supp_port = wpa_driver_nl80211_set_supp_port,
6d158490 8916 .set_country = wpa_driver_nl80211_set_country,
f0793bf1 8917 .get_country = wpa_driver_nl80211_get_country,
19c3b566 8918 .set_ap = wpa_driver_nl80211_set_ap,
3c4ca363 8919 .set_acl = wpa_driver_nl80211_set_acl,
22a7c9d7 8920 .if_add = wpa_driver_nl80211_if_add,
9ebce9c5
JM
8921 .if_remove = driver_nl80211_if_remove,
8922 .send_mlme = driver_nl80211_send_mlme,
0fafeb54 8923 .get_hw_feature_data = nl80211_get_hw_feature_data,
0f4e8b4f 8924 .sta_add = wpa_driver_nl80211_sta_add,
9ebce9c5 8925 .sta_remove = driver_nl80211_sta_remove,
db149ac9 8926 .hapd_send_eapol = wpa_driver_nl80211_hapd_send_eapol,
a8d6ffa4 8927 .sta_set_flags = wpa_driver_nl80211_sta_set_flags,
c5121837 8928 .hapd_init = i802_init,
c5121837 8929 .hapd_deinit = i802_deinit,
f7b3920c 8930 .set_wds_sta = i802_set_wds_sta,
c5121837
JM
8931 .get_seqnum = i802_get_seqnum,
8932 .flush = i802_flush,
c5121837
JM
8933 .get_inact_sec = i802_get_inact_sec,
8934 .sta_clear_stats = i802_sta_clear_stats,
c5121837
JM
8935 .set_rts = i802_set_rts,
8936 .set_frag = i802_set_frag,
c5121837 8937 .set_tx_queue_params = i802_set_tx_queue_params,
9ebce9c5 8938 .set_sta_vlan = driver_nl80211_set_sta_vlan,
ee7ab173
JB
8939 .sta_deauth = i802_sta_deauth,
8940 .sta_disassoc = i802_sta_disassoc,
9ebce9c5 8941 .read_sta_data = driver_nl80211_read_sta_data,
e3802622 8942 .set_freq = i802_set_freq,
9ebce9c5 8943 .send_action = driver_nl80211_send_action,
5dfca53f 8944 .send_action_cancel_wait = wpa_driver_nl80211_send_action_cancel_wait,
55777702
JM
8945 .remain_on_channel = wpa_driver_nl80211_remain_on_channel,
8946 .cancel_remain_on_channel =
8947 wpa_driver_nl80211_cancel_remain_on_channel,
9ebce9c5 8948 .probe_req_report = driver_nl80211_probe_req_report,
af473088 8949 .deinit_ap = wpa_driver_nl80211_deinit_ap,
3c29244e 8950 .deinit_p2p_cli = wpa_driver_nl80211_deinit_p2p_cli,
207ef3fb 8951 .resume = wpa_driver_nl80211_resume,
b625473c 8952 .signal_monitor = nl80211_signal_monitor,
1c5c7273 8953 .signal_poll = nl80211_signal_poll,
b91ab76e 8954 .send_frame = nl80211_send_frame,
c55f774d 8955 .set_param = nl80211_set_param,
6859f1cb 8956 .get_radio_name = nl80211_get_radio_name,
a6efc65d
JM
8957 .add_pmkid = nl80211_add_pmkid,
8958 .remove_pmkid = nl80211_remove_pmkid,
8959 .flush_pmkid = nl80211_flush_pmkid,
b14a210c 8960 .set_rekey_info = nl80211_set_rekey_info,
bcf24348 8961 .poll_client = nl80211_poll_client,
29f338af 8962 .set_p2p_powersave = nl80211_set_p2p_powersave,
f90e9c1c 8963 .start_dfs_cac = nl80211_start_radar_detection,
695c7038 8964 .stop_ap = wpa_driver_nl80211_stop_ap,
03ea1786
AN
8965#ifdef CONFIG_TDLS
8966 .send_tdls_mgmt = nl80211_send_tdls_mgmt,
8967 .tdls_oper = nl80211_tdls_oper,
72b2605f
AN
8968 .tdls_enable_channel_switch = nl80211_tdls_enable_channel_switch,
8969 .tdls_disable_channel_switch = nl80211_tdls_disable_channel_switch,
03ea1786 8970#endif /* CONFIG_TDLS */
6a1ce395 8971 .update_ft_ies = wpa_driver_nl80211_update_ft_ies,
597b94f5 8972 .get_mac_addr = wpa_driver_nl80211_get_macaddr,
0185007c 8973 .get_survey = wpa_driver_nl80211_get_survey,
a771c07d 8974 .status = wpa_driver_nl80211_status,
1c4ffa87 8975 .switch_channel = nl80211_switch_channel,
0de38036
JM
8976#ifdef ANDROID_P2P
8977 .set_noa = wpa_driver_set_p2p_noa,
8978 .get_noa = wpa_driver_get_p2p_noa,
8979 .set_ap_wps_ie = wpa_driver_set_ap_wps_p2p_ie,
8980#endif /* ANDROID_P2P */
5e2c3490 8981#ifdef ANDROID
ded14ce9 8982#ifndef ANDROID_LIB_STUB
5e2c3490 8983 .driver_cmd = wpa_driver_nl80211_driver_cmd,
ded14ce9 8984#endif /* !ANDROID_LIB_STUB */
5e2c3490 8985#endif /* ANDROID */
adef8948 8986 .vendor_cmd = nl80211_vendor_cmd,
049105b4 8987 .set_qos_map = nl80211_set_qos_map,
e4fa8b12 8988 .set_wowlan = nl80211_set_wowlan,
b658547d 8989#ifdef CONFIG_DRIVER_NL80211_QCA
0800f9ee 8990 .roaming = nl80211_roaming,
b658547d 8991#endif /* CONFIG_DRIVER_NL80211_QCA */
fee354c7 8992 .set_mac_addr = nl80211_set_mac_addr,
6c1664f6
BC
8993#ifdef CONFIG_MESH
8994 .init_mesh = wpa_driver_nl80211_init_mesh,
8995 .join_mesh = wpa_driver_nl80211_join_mesh,
8996 .leave_mesh = wpa_driver_nl80211_leave_mesh,
8997#endif /* CONFIG_MESH */
71103bed
KP
8998 .br_add_ip_neigh = wpa_driver_br_add_ip_neigh,
8999 .br_delete_ip_neigh = wpa_driver_br_delete_ip_neigh,
73d2294f 9000 .br_port_set_attr = wpa_driver_br_port_set_attr,
7565752d 9001 .br_set_net_param = wpa_driver_br_set_net_param,
dfa87878
MB
9002 .add_tx_ts = nl80211_add_ts,
9003 .del_tx_ts = nl80211_del_ts,
b658547d 9004#ifdef CONFIG_DRIVER_NL80211_QCA
16689c7c 9005 .do_acs = wpa_driver_do_acs,
844dfeb8 9006 .set_band = nl80211_set_band,
98342208 9007 .get_pref_freq_list = nl80211_get_pref_freq_list,
7c813acf 9008 .set_prob_oper_freq = nl80211_set_prob_oper_freq,
b658547d 9009#endif /* CONFIG_DRIVER_NL80211_QCA */
3f5285e8 9010};