2 * Driver interaction with Linux nl80211/cfg80211
3 * Copyright (c) 2002-2008, Jouni Malinen <j@w1.fi>
4 * Copyright (c) 2003-2004, Instant802 Networks, Inc.
5 * Copyright (c) 2005-2006, Devicescape Software, Inc.
6 * Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
7 * Copyright (c) 2009, Atheros Communications
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License version 2 as
11 * published by the Free Software Foundation.
13 * Alternatively, this software may be distributed under the terms of BSD
16 * See README and COPYING for more details.
20 #include <sys/ioctl.h>
21 #include <net/if_arp.h>
23 #include <netlink/genl/genl.h>
24 #include <netlink/genl/family.h>
25 #include <netlink/genl/ctrl.h>
26 #include "nl80211_copy.h"
28 #include "wireless_copy.h"
34 #include "ieee802_11_defs.h"
36 #if defined(CONFIG_AP) || defined(HOSTAPD)
37 #include <netpacket/packet.h>
38 #include <linux/filter.h>
40 #include "radiotap_iter.h"
42 #include "../../hostapd/hostapd_defs.h"
43 #endif /* CONFIG_AP || HOSTAPD */
46 #include "../../hostapd/sta_flags.h"
47 #include "ieee802_11_common.h"
50 /* libnl 2.0 compatibility code */
51 #define nl_handle_alloc_cb nl_socket_alloc_cb
52 #define nl_handle_destroy nl_socket_free
53 #endif /* CONFIG_LIBNL20 */
59 #define IFF_LOWER_UP 0x10000 /* driver signals L1 up */
62 #define IFF_DORMANT 0x20000 /* driver signals dormant */
65 #ifndef IF_OPER_DORMANT
66 #define IF_OPER_DORMANT 5
73 struct i802_bss
*next
;
75 unsigned int beacon_set
:1;
78 struct wpa_driver_nl80211_data
{
81 int ioctl_sock
; /* socket for ioctl() use */
82 char ifname
[IFNAMSIZ
+ 1];
85 struct wpa_driver_capa capa
;
90 int scan_complete_events
;
92 struct nl_handle
*nl_handle
;
93 struct nl_cache
*nl_cache
;
95 struct genl_family
*nl80211
;
102 int ap_scan_as_station
;
109 unsigned int beacon_set
:1;
110 #endif /* CONFIG_AP */
113 int eapol_sock
; /* socket for EAPOL frames */
115 int default_if_indices
[16];
127 static void wpa_driver_nl80211_scan_timeout(void *eloop_ctx
,
129 static int wpa_driver_nl80211_set_mode(void *priv
, int mode
);
131 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data
*drv
);
134 static void nl80211_remove_iface(struct wpa_driver_nl80211_data
*drv
,
136 #endif /* CONFIG_AP */
139 static void add_ifidx(struct wpa_driver_nl80211_data
*drv
, int ifidx
);
140 static void del_ifidx(struct wpa_driver_nl80211_data
*drv
, int ifidx
);
141 static struct i802_bss
* get_bss(struct wpa_driver_nl80211_data
*drv
,
143 static void nl80211_remove_iface(struct wpa_driver_nl80211_data
*drv
,
145 static int i802_set_freq(void *priv
, struct hostapd_freq_params
*freq
);
146 static int i802_del_beacon(struct wpa_driver_nl80211_data
*drv
);
151 static int ack_handler(struct nl_msg
*msg
, void *arg
)
158 static int finish_handler(struct nl_msg
*msg
, void *arg
)
165 static int error_handler(struct sockaddr_nl
*nla
, struct nlmsgerr
*err
,
174 static int no_seq_check(struct nl_msg
*msg
, void *arg
)
180 static int send_and_recv_msgs(struct wpa_driver_nl80211_data
*drv
,
182 int (*valid_handler
)(struct nl_msg
*, void *),
188 cb
= nl_cb_clone(drv
->nl_cb
);
192 err
= nl_send_auto_complete(drv
->nl_handle
, msg
);
198 nl_cb_err(cb
, NL_CB_CUSTOM
, error_handler
, &err
);
199 nl_cb_set(cb
, NL_CB_FINISH
, NL_CB_CUSTOM
, finish_handler
, &err
);
200 nl_cb_set(cb
, NL_CB_ACK
, NL_CB_CUSTOM
, ack_handler
, &err
);
203 nl_cb_set(cb
, NL_CB_VALID
, NL_CB_CUSTOM
,
204 valid_handler
, valid_data
);
207 nl_recvmsgs(drv
->nl_handle
, cb
);
221 static int family_handler(struct nl_msg
*msg
, void *arg
)
223 struct family_data
*res
= arg
;
224 struct nlattr
*tb
[CTRL_ATTR_MAX
+ 1];
225 struct genlmsghdr
*gnlh
= nlmsg_data(nlmsg_hdr(msg
));
226 struct nlattr
*mcgrp
;
229 nla_parse(tb
, CTRL_ATTR_MAX
, genlmsg_attrdata(gnlh
, 0),
230 genlmsg_attrlen(gnlh
, 0), NULL
);
231 if (!tb
[CTRL_ATTR_MCAST_GROUPS
])
234 nla_for_each_nested(mcgrp
, tb
[CTRL_ATTR_MCAST_GROUPS
], i
) {
235 struct nlattr
*tb2
[CTRL_ATTR_MCAST_GRP_MAX
+ 1];
236 nla_parse(tb2
, CTRL_ATTR_MCAST_GRP_MAX
, nla_data(mcgrp
),
237 nla_len(mcgrp
), NULL
);
238 if (!tb2
[CTRL_ATTR_MCAST_GRP_NAME
] ||
239 !tb2
[CTRL_ATTR_MCAST_GRP_ID
] ||
240 os_strncmp(nla_data(tb2
[CTRL_ATTR_MCAST_GRP_NAME
]),
242 nla_len(tb2
[CTRL_ATTR_MCAST_GRP_NAME
])) != 0)
244 res
->id
= nla_get_u32(tb2
[CTRL_ATTR_MCAST_GRP_ID
]);
252 static int nl_get_multicast_id(struct wpa_driver_nl80211_data
*drv
,
253 const char *family
, const char *group
)
257 struct family_data res
= { group
, -ENOENT
};
262 genlmsg_put(msg
, 0, 0, genl_ctrl_resolve(drv
->nl_handle
, "nlctrl"),
263 0, 0, CTRL_CMD_GETFAMILY
, 0);
264 NLA_PUT_STRING(msg
, CTRL_ATTR_FAMILY_NAME
, family
);
266 ret
= send_and_recv_msgs(drv
, msg
, family_handler
, &res
);
278 static int get_ifhwaddr(struct wpa_driver_nl80211_data
*drv
,
279 const char *ifname
, u8
*addr
)
283 os_memset(&ifr
, 0, sizeof(ifr
));
284 os_strlcpy(ifr
.ifr_name
, ifname
, IFNAMSIZ
);
285 if (ioctl(drv
->ioctl_sock
, SIOCGIFHWADDR
, &ifr
)) {
286 wpa_printf(MSG_ERROR
, "%s: ioctl(SIOCGIFHWADDR): %d (%s)",
287 ifname
, errno
, strerror(errno
));
291 if (ifr
.ifr_hwaddr
.sa_family
!= ARPHRD_ETHER
) {
292 wpa_printf(MSG_ERROR
, "%s: Invalid HW-addr family 0x%04x",
293 ifname
, ifr
.ifr_hwaddr
.sa_family
);
296 os_memcpy(addr
, ifr
.ifr_hwaddr
.sa_data
, ETH_ALEN
);
302 static int set_ifhwaddr(struct wpa_driver_nl80211_data
*drv
,
303 const char *ifname
, const u8
*addr
)
307 os_memset(&ifr
, 0, sizeof(ifr
));
308 os_strlcpy(ifr
.ifr_name
, ifname
, IFNAMSIZ
);
309 os_memcpy(ifr
.ifr_hwaddr
.sa_data
, addr
, ETH_ALEN
);
310 ifr
.ifr_hwaddr
.sa_family
= ARPHRD_ETHER
;
312 if (ioctl(drv
->ioctl_sock
, SIOCSIFHWADDR
, &ifr
)) {
313 wpa_printf(MSG_DEBUG
, "%s: ioctl(SIOCSIFHWADDR): %d (%s)",
314 ifname
, errno
, strerror(errno
));
325 static int wpa_driver_nl80211_send_oper_ifla(
326 struct wpa_driver_nl80211_data
*drv
,
327 int linkmode
, int operstate
)
331 struct ifinfomsg ifinfo
;
338 os_memset(&req
, 0, sizeof(req
));
340 req
.hdr
.nlmsg_len
= NLMSG_LENGTH(sizeof(struct ifinfomsg
));
341 req
.hdr
.nlmsg_type
= RTM_SETLINK
;
342 req
.hdr
.nlmsg_flags
= NLM_F_REQUEST
;
343 req
.hdr
.nlmsg_seq
= ++nl_seq
;
344 req
.hdr
.nlmsg_pid
= 0;
346 req
.ifinfo
.ifi_family
= AF_UNSPEC
;
347 req
.ifinfo
.ifi_type
= 0;
348 req
.ifinfo
.ifi_index
= drv
->ifindex
;
349 req
.ifinfo
.ifi_flags
= 0;
350 req
.ifinfo
.ifi_change
= 0;
352 if (linkmode
!= -1) {
353 rta
= (struct rtattr
*)
354 ((char *) &req
+ NLMSG_ALIGN(req
.hdr
.nlmsg_len
));
355 rta
->rta_type
= IFLA_LINKMODE
;
356 rta
->rta_len
= RTA_LENGTH(sizeof(char));
357 *((char *) RTA_DATA(rta
)) = linkmode
;
358 req
.hdr
.nlmsg_len
= NLMSG_ALIGN(req
.hdr
.nlmsg_len
) +
359 RTA_LENGTH(sizeof(char));
361 if (operstate
!= -1) {
362 rta
= (struct rtattr
*)
363 ((char *) &req
+ NLMSG_ALIGN(req
.hdr
.nlmsg_len
));
364 rta
->rta_type
= IFLA_OPERSTATE
;
365 rta
->rta_len
= RTA_LENGTH(sizeof(char));
366 *((char *) RTA_DATA(rta
)) = operstate
;
367 req
.hdr
.nlmsg_len
= NLMSG_ALIGN(req
.hdr
.nlmsg_len
) +
368 RTA_LENGTH(sizeof(char));
371 wpa_printf(MSG_DEBUG
, "nl80211: Operstate: linkmode=%d, operstate=%d",
372 linkmode
, operstate
);
374 ret
= send(drv
->link_event_sock
, &req
, req
.hdr
.nlmsg_len
, 0);
376 wpa_printf(MSG_DEBUG
, "nl80211: Sending operstate IFLA failed:"
377 " %s (assume operstate is not supported)",
381 return ret
< 0 ? -1 : 0;
386 static int wpa_driver_nl80211_set_auth_param(
387 struct wpa_driver_nl80211_data
*drv
, int idx
, u32 value
)
392 os_memset(&iwr
, 0, sizeof(iwr
));
393 os_strlcpy(iwr
.ifr_name
, drv
->ifname
, IFNAMSIZ
);
394 iwr
.u
.param
.flags
= idx
& IW_AUTH_INDEX
;
395 iwr
.u
.param
.value
= value
;
397 if (ioctl(drv
->ioctl_sock
, SIOCSIWAUTH
, &iwr
) < 0) {
398 if (errno
!= EOPNOTSUPP
) {
399 wpa_printf(MSG_DEBUG
, "WEXT: SIOCSIWAUTH(param %d "
400 "value 0x%x) failed: %s)",
401 idx
, value
, strerror(errno
));
403 ret
= errno
== EOPNOTSUPP
? -2 : -1;
411 static int wpa_driver_nl80211_get_bssid(void *priv
, u8
*bssid
)
413 struct wpa_driver_nl80211_data
*drv
= priv
;
414 if (!drv
->associated
)
416 os_memcpy(bssid
, drv
->bssid
, ETH_ALEN
);
421 static int wpa_driver_nl80211_get_ssid(void *priv
, u8
*ssid
)
423 struct wpa_driver_nl80211_data
*drv
= priv
;
424 if (!drv
->associated
)
426 os_memcpy(ssid
, drv
->ssid
, drv
->ssid_len
);
427 return drv
->ssid_len
;
431 static void wpa_driver_nl80211_event_link(struct wpa_driver_nl80211_data
*drv
,
432 void *ctx
, char *buf
, size_t len
,
435 union wpa_event_data event
;
437 os_memset(&event
, 0, sizeof(event
));
438 if (len
> sizeof(event
.interface_status
.ifname
))
439 len
= sizeof(event
.interface_status
.ifname
) - 1;
440 os_memcpy(event
.interface_status
.ifname
, buf
, len
);
441 event
.interface_status
.ievent
= del
? EVENT_INTERFACE_REMOVED
:
442 EVENT_INTERFACE_ADDED
;
444 wpa_printf(MSG_DEBUG
, "RTM_%sLINK, IFLA_IFNAME: Interface '%s' %s",
446 event
.interface_status
.ifname
,
447 del
? "removed" : "added");
449 if (os_strcmp(drv
->ifname
, event
.interface_status
.ifname
) == 0) {
456 wpa_supplicant_event(ctx
, EVENT_INTERFACE_STATUS
, &event
);
460 static int wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data
*drv
,
463 struct ifinfomsg
*ifi
;
464 int attrlen
, _nlmsg_len
, rta_len
;
469 _nlmsg_len
= NLMSG_ALIGN(sizeof(struct ifinfomsg
));
471 attrlen
= h
->nlmsg_len
- _nlmsg_len
;
475 attr
= (struct rtattr
*) (((char *) ifi
) + _nlmsg_len
);
477 rta_len
= RTA_ALIGN(sizeof(struct rtattr
));
478 while (RTA_OK(attr
, attrlen
)) {
479 if (attr
->rta_type
== IFLA_IFNAME
) {
480 if (os_strcmp(((char *) attr
) + rta_len
, drv
->ifname
)
486 attr
= RTA_NEXT(attr
, attrlen
);
493 static int wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data
*drv
,
494 int ifindex
, struct nlmsghdr
*h
)
496 if (drv
->ifindex
== ifindex
)
499 if (drv
->if_removed
&& wpa_driver_nl80211_own_ifname(drv
, h
)) {
500 drv
->ifindex
= if_nametoindex(drv
->ifname
);
501 wpa_printf(MSG_DEBUG
, "nl80211: Update ifindex for a removed "
503 wpa_driver_nl80211_finish_drv_init(drv
);
511 static void wpa_driver_nl80211_event_rtm_newlink(struct wpa_driver_nl80211_data
*drv
,
512 void *ctx
, struct nlmsghdr
*h
,
515 struct ifinfomsg
*ifi
;
516 int attrlen
, _nlmsg_len
, rta_len
;
517 struct rtattr
* attr
;
519 if (len
< sizeof(*ifi
))
524 if (!wpa_driver_nl80211_own_ifindex(drv
, ifi
->ifi_index
, h
)) {
525 wpa_printf(MSG_DEBUG
, "Ignore event for foreign ifindex %d",
530 wpa_printf(MSG_DEBUG
, "RTM_NEWLINK: operstate=%d ifi_flags=0x%x "
532 drv
->operstate
, ifi
->ifi_flags
,
533 (ifi
->ifi_flags
& IFF_UP
) ? "[UP]" : "",
534 (ifi
->ifi_flags
& IFF_RUNNING
) ? "[RUNNING]" : "",
535 (ifi
->ifi_flags
& IFF_LOWER_UP
) ? "[LOWER_UP]" : "",
536 (ifi
->ifi_flags
& IFF_DORMANT
) ? "[DORMANT]" : "");
538 * Some drivers send the association event before the operup event--in
539 * this case, lifting operstate in wpa_driver_nl80211_set_operstate()
540 * fails. This will hit us when wpa_supplicant does not need to do
541 * IEEE 802.1X authentication
543 if (drv
->operstate
== 1 &&
544 (ifi
->ifi_flags
& (IFF_LOWER_UP
| IFF_DORMANT
)) == IFF_LOWER_UP
&&
545 !(ifi
->ifi_flags
& IFF_RUNNING
))
546 wpa_driver_nl80211_send_oper_ifla(drv
, -1, IF_OPER_UP
);
548 _nlmsg_len
= NLMSG_ALIGN(sizeof(struct ifinfomsg
));
550 attrlen
= h
->nlmsg_len
- _nlmsg_len
;
554 attr
= (struct rtattr
*) (((char *) ifi
) + _nlmsg_len
);
556 rta_len
= RTA_ALIGN(sizeof(struct rtattr
));
557 while (RTA_OK(attr
, attrlen
)) {
558 if (attr
->rta_type
== IFLA_IFNAME
) {
559 wpa_driver_nl80211_event_link(
561 ((char *) attr
) + rta_len
,
562 attr
->rta_len
- rta_len
, 0);
564 attr
= RTA_NEXT(attr
, attrlen
);
569 static void wpa_driver_nl80211_event_rtm_dellink(struct wpa_driver_nl80211_data
*drv
,
570 void *ctx
, struct nlmsghdr
*h
,
573 struct ifinfomsg
*ifi
;
574 int attrlen
, _nlmsg_len
, rta_len
;
575 struct rtattr
* attr
;
577 if (len
< sizeof(*ifi
))
582 _nlmsg_len
= NLMSG_ALIGN(sizeof(struct ifinfomsg
));
584 attrlen
= h
->nlmsg_len
- _nlmsg_len
;
588 attr
= (struct rtattr
*) (((char *) ifi
) + _nlmsg_len
);
590 rta_len
= RTA_ALIGN(sizeof(struct rtattr
));
591 while (RTA_OK(attr
, attrlen
)) {
592 if (attr
->rta_type
== IFLA_IFNAME
) {
593 wpa_driver_nl80211_event_link(
595 ((char *) attr
) + rta_len
,
596 attr
->rta_len
- rta_len
, 1);
598 attr
= RTA_NEXT(attr
, attrlen
);
603 static void wpa_driver_nl80211_event_receive_link(int sock
, void *eloop_ctx
,
608 struct sockaddr_nl from
;
614 fromlen
= sizeof(from
);
615 left
= recvfrom(sock
, buf
, sizeof(buf
), MSG_DONTWAIT
,
616 (struct sockaddr
*) &from
, &fromlen
);
618 if (errno
!= EINTR
&& errno
!= EAGAIN
)
619 perror("recvfrom(netlink)");
623 h
= (struct nlmsghdr
*) buf
;
624 while (left
>= (int) sizeof(*h
)) {
628 plen
= len
- sizeof(*h
);
629 if (len
> left
|| plen
< 0) {
630 wpa_printf(MSG_DEBUG
, "Malformed netlink message: "
631 "len=%d left=%d plen=%d",
636 switch (h
->nlmsg_type
) {
638 wpa_driver_nl80211_event_rtm_newlink(eloop_ctx
, sock_ctx
,
642 wpa_driver_nl80211_event_rtm_dellink(eloop_ctx
, sock_ctx
,
647 len
= NLMSG_ALIGN(len
);
649 h
= (struct nlmsghdr
*) ((char *) h
+ len
);
653 wpa_printf(MSG_DEBUG
, "%d extra bytes in the end of netlink "
657 if (--max_events
> 0) {
659 * Try to receive all events in one eloop call in order to
660 * limit race condition on cases where AssocInfo event, Assoc
661 * event, and EAPOL frames are received more or less at the
662 * same time. We want to process the event messages first
663 * before starting EAPOL processing.
670 static void mlme_event_auth(struct wpa_driver_nl80211_data
*drv
,
671 const u8
*frame
, size_t len
)
673 const struct ieee80211_mgmt
*mgmt
;
674 union wpa_event_data event
;
676 mgmt
= (const struct ieee80211_mgmt
*) frame
;
677 if (len
< 24 + sizeof(mgmt
->u
.auth
)) {
678 wpa_printf(MSG_DEBUG
, "nl80211: Too short association event "
683 os_memset(&event
, 0, sizeof(event
));
684 os_memcpy(event
.auth
.peer
, mgmt
->sa
, ETH_ALEN
);
685 event
.auth
.auth_type
= le_to_host16(mgmt
->u
.auth
.auth_alg
);
686 event
.auth
.status_code
= le_to_host16(mgmt
->u
.auth
.status_code
);
687 if (len
> 24 + sizeof(mgmt
->u
.auth
)) {
688 event
.auth
.ies
= mgmt
->u
.auth
.variable
;
689 event
.auth
.ies_len
= len
- 24 - sizeof(mgmt
->u
.auth
);
692 wpa_supplicant_event(drv
->ctx
, EVENT_AUTH
, &event
);
696 static void mlme_event_assoc(struct wpa_driver_nl80211_data
*drv
,
697 const u8
*frame
, size_t len
)
699 const struct ieee80211_mgmt
*mgmt
;
700 union wpa_event_data event
;
703 mgmt
= (const struct ieee80211_mgmt
*) frame
;
704 if (len
< 24 + sizeof(mgmt
->u
.assoc_resp
)) {
705 wpa_printf(MSG_DEBUG
, "nl80211: Too short association event "
710 status
= le_to_host16(mgmt
->u
.assoc_resp
.status_code
);
711 if (status
!= WLAN_STATUS_SUCCESS
) {
712 os_memset(&event
, 0, sizeof(event
));
713 if (len
> 24 + sizeof(mgmt
->u
.assoc_resp
)) {
714 event
.assoc_reject
.resp_ies
=
715 (u8
*) mgmt
->u
.assoc_resp
.variable
;
716 event
.assoc_reject
.resp_ies_len
=
717 len
- 24 - sizeof(mgmt
->u
.assoc_resp
);
719 event
.assoc_reject
.status_code
= status
;
721 wpa_supplicant_event(drv
->ctx
, EVENT_ASSOC_REJECT
, &event
);
726 os_memcpy(drv
->bssid
, mgmt
->sa
, ETH_ALEN
);
728 os_memset(&event
, 0, sizeof(event
));
729 if (len
> 24 + sizeof(mgmt
->u
.assoc_resp
)) {
730 event
.assoc_info
.resp_ies
= (u8
*) mgmt
->u
.assoc_resp
.variable
;
731 event
.assoc_info
.resp_ies_len
=
732 len
- 24 - sizeof(mgmt
->u
.assoc_resp
);
735 wpa_supplicant_event(drv
->ctx
, EVENT_ASSOC
, &event
);
739 static void mlme_event(struct wpa_driver_nl80211_data
*drv
,
740 enum nl80211_commands cmd
, struct nlattr
*frame
)
743 wpa_printf(MSG_DEBUG
, "nl80211: MLME event %d without frame "
748 wpa_printf(MSG_DEBUG
, "nl80211: MLME event %d", cmd
);
749 wpa_hexdump(MSG_MSGDUMP
, "nl80211: MLME event frame",
750 nla_data(frame
), nla_len(frame
));
753 case NL80211_CMD_AUTHENTICATE
:
754 mlme_event_auth(drv
, nla_data(frame
), nla_len(frame
));
756 case NL80211_CMD_ASSOCIATE
:
757 mlme_event_assoc(drv
, nla_data(frame
), nla_len(frame
));
759 case NL80211_CMD_DEAUTHENTICATE
:
761 wpa_supplicant_event(drv
->ctx
, EVENT_DEAUTH
, NULL
);
763 case NL80211_CMD_DISASSOCIATE
:
765 wpa_supplicant_event(drv
->ctx
, EVENT_DISASSOC
, NULL
);
775 static void mlme_event_michael_mic_failure(struct wpa_driver_nl80211_data
*drv
,
778 union wpa_event_data data
;
780 wpa_printf(MSG_DEBUG
, "nl80211: MLME event Michael MIC failure");
781 os_memset(&data
, 0, sizeof(data
));
782 if (tb
[NL80211_ATTR_MAC
]) {
783 wpa_hexdump(MSG_DEBUG
, "nl80211: Source MAC address",
784 nla_data(tb
[NL80211_ATTR_MAC
]),
785 nla_len(tb
[NL80211_ATTR_MAC
]));
786 data
.michael_mic_failure
.src
= nla_data(tb
[NL80211_ATTR_MAC
]);
788 if (tb
[NL80211_ATTR_KEY_SEQ
]) {
789 wpa_hexdump(MSG_DEBUG
, "nl80211: TSC",
790 nla_data(tb
[NL80211_ATTR_KEY_SEQ
]),
791 nla_len(tb
[NL80211_ATTR_KEY_SEQ
]));
793 if (tb
[NL80211_ATTR_KEY_TYPE
]) {
794 enum nl80211_key_type key_type
=
795 nla_get_u32(tb
[NL80211_ATTR_KEY_TYPE
]);
796 wpa_printf(MSG_DEBUG
, "nl80211: Key Type %d", key_type
);
797 if (key_type
== NL80211_KEYTYPE_PAIRWISE
)
798 data
.michael_mic_failure
.unicast
= 1;
800 data
.michael_mic_failure
.unicast
= 1;
802 if (tb
[NL80211_ATTR_KEY_IDX
]) {
803 u8 key_id
= nla_get_u8(tb
[NL80211_ATTR_KEY_IDX
]);
804 wpa_printf(MSG_DEBUG
, "nl80211: Key Id %d", key_id
);
807 wpa_supplicant_event(drv
->ctx
, EVENT_MICHAEL_MIC_FAILURE
, &data
);
811 static int process_event(struct nl_msg
*msg
, void *arg
)
813 struct wpa_driver_nl80211_data
*drv
= arg
;
814 struct genlmsghdr
*gnlh
= nlmsg_data(nlmsg_hdr(msg
));
815 struct nlattr
*tb
[NL80211_ATTR_MAX
+ 1];
817 nla_parse(tb
, NL80211_ATTR_MAX
, genlmsg_attrdata(gnlh
, 0),
818 genlmsg_attrlen(gnlh
, 0), NULL
);
820 if (tb
[NL80211_ATTR_IFINDEX
]) {
821 int ifindex
= nla_get_u32(tb
[NL80211_ATTR_IFINDEX
]);
822 if (ifindex
!= drv
->ifindex
) {
823 wpa_printf(MSG_DEBUG
, "nl80211: Ignored event (cmd=%d)"
824 " for foreign interface (ifindex %d)",
830 if (drv
->ap_scan_as_station
&&
831 (gnlh
->cmd
== NL80211_CMD_NEW_SCAN_RESULTS
||
832 gnlh
->cmd
== NL80211_CMD_SCAN_ABORTED
)) {
833 wpa_driver_nl80211_set_mode(drv
, IEEE80211_MODE_AP
);
834 drv
->ap_scan_as_station
= 0;
838 case NL80211_CMD_NEW_SCAN_RESULTS
:
839 wpa_printf(MSG_DEBUG
, "nl80211: New scan results available");
840 drv
->scan_complete_events
= 1;
841 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout
, drv
,
843 wpa_supplicant_event(drv
->ctx
, EVENT_SCAN_RESULTS
, NULL
);
845 case NL80211_CMD_SCAN_ABORTED
:
846 wpa_printf(MSG_DEBUG
, "nl80211: Scan aborted");
848 * Need to indicate that scan results are available in order
849 * not to make wpa_supplicant stop its scanning.
851 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout
, drv
,
853 wpa_supplicant_event(drv
->ctx
, EVENT_SCAN_RESULTS
, NULL
);
856 case NL80211_CMD_AUTHENTICATE
:
857 case NL80211_CMD_ASSOCIATE
:
858 case NL80211_CMD_DEAUTHENTICATE
:
859 case NL80211_CMD_DISASSOCIATE
:
860 mlme_event(drv
, gnlh
->cmd
, tb
[NL80211_ATTR_FRAME
]);
863 case NL80211_CMD_MICHAEL_MIC_FAILURE
:
864 mlme_event_michael_mic_failure(drv
, tb
);
867 wpa_printf(MSG_DEBUG
, "nl80211: Ignored unknown event "
868 "(cmd=%d)", gnlh
->cmd
);
876 static void wpa_driver_nl80211_event_receive(int sock
, void *eloop_ctx
,
880 struct wpa_driver_nl80211_data
*drv
= eloop_ctx
;
882 wpa_printf(MSG_DEBUG
, "nl80211: Event message available");
884 cb
= nl_cb_clone(drv
->nl_cb
);
887 nl_cb_set(cb
, NL_CB_SEQ_CHECK
, NL_CB_CUSTOM
, no_seq_check
, NULL
);
888 nl_cb_set(cb
, NL_CB_VALID
, NL_CB_CUSTOM
, process_event
, drv
);
889 nl_recvmsgs(drv
->nl_handle
, cb
);
894 static int hostapd_set_iface_flags(struct wpa_driver_nl80211_data
*drv
,
895 const char *ifname
, int dev_up
)
899 if (drv
->ioctl_sock
< 0)
902 os_memset(&ifr
, 0, sizeof(ifr
));
903 os_strlcpy(ifr
.ifr_name
, ifname
, IFNAMSIZ
);
905 if (ioctl(drv
->ioctl_sock
, SIOCGIFFLAGS
, &ifr
) != 0) {
906 perror("ioctl[SIOCGIFFLAGS]");
907 wpa_printf(MSG_DEBUG
, "Could not read interface flags (%s)",
913 if (ifr
.ifr_flags
& IFF_UP
)
915 ifr
.ifr_flags
|= IFF_UP
;
917 if (!(ifr
.ifr_flags
& IFF_UP
))
919 ifr
.ifr_flags
&= ~IFF_UP
;
922 if (ioctl(drv
->ioctl_sock
, SIOCSIFFLAGS
, &ifr
) != 0) {
923 perror("ioctl[SIOCSIFFLAGS]");
932 * wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain
933 * @priv: driver_nl80211 private data
934 * @alpha2_arg: country to which to switch to
935 * Returns: 0 on success, -1 on failure
937 * This asks nl80211 to set the regulatory domain for given
938 * country ISO / IEC alpha2.
940 static int wpa_driver_nl80211_set_country(void *priv
, const char *alpha2_arg
)
942 struct wpa_driver_nl80211_data
*drv
= priv
;
950 alpha2
[0] = alpha2_arg
[0];
951 alpha2
[1] = alpha2_arg
[1];
954 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
955 0, NL80211_CMD_REQ_SET_REG
, 0);
957 NLA_PUT_STRING(msg
, NL80211_ATTR_REG_ALPHA2
, alpha2
);
958 if (send_and_recv_msgs(drv
, msg
, NULL
, NULL
))
967 struct wiphy_info_data
{
973 static int wiphy_info_handler(struct nl_msg
*msg
, void *arg
)
975 struct nlattr
*tb
[NL80211_ATTR_MAX
+ 1];
976 struct genlmsghdr
*gnlh
= nlmsg_data(nlmsg_hdr(msg
));
977 struct wiphy_info_data
*info
= arg
;
979 nla_parse(tb
, NL80211_ATTR_MAX
, genlmsg_attrdata(gnlh
, 0),
980 genlmsg_attrlen(gnlh
, 0), NULL
);
982 if (tb
[NL80211_ATTR_MAX_NUM_SCAN_SSIDS
])
983 info
->max_scan_ssids
=
984 nla_get_u8(tb
[NL80211_ATTR_MAX_NUM_SCAN_SSIDS
]);
986 if (tb
[NL80211_ATTR_SUPPORTED_IFTYPES
]) {
987 struct nlattr
*nl_mode
;
989 nla_for_each_nested(nl_mode
,
990 tb
[NL80211_ATTR_SUPPORTED_IFTYPES
], i
) {
991 if (nl_mode
->nla_type
== NL80211_IFTYPE_AP
) {
992 info
->ap_supported
= 1;
1002 static int wpa_driver_nl80211_get_info(struct wpa_driver_nl80211_data
*drv
,
1003 struct wiphy_info_data
*info
)
1007 os_memset(info
, 0, sizeof(*info
));
1008 msg
= nlmsg_alloc();
1012 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
1013 0, NL80211_CMD_GET_WIPHY
, 0);
1015 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, drv
->ifindex
);
1017 if (send_and_recv_msgs(drv
, msg
, wiphy_info_handler
, info
) == 0)
1026 static void wpa_driver_nl80211_capa(struct wpa_driver_nl80211_data
*drv
)
1028 struct wiphy_info_data info
;
1029 if (wpa_driver_nl80211_get_info(drv
, &info
))
1031 drv
->has_capability
= 1;
1032 /* For now, assume TKIP, CCMP, WPA, WPA2 are supported */
1033 drv
->capa
.key_mgmt
= WPA_DRIVER_CAPA_KEY_MGMT_WPA
|
1034 WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK
|
1035 WPA_DRIVER_CAPA_KEY_MGMT_WPA2
|
1036 WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK
;
1037 drv
->capa
.enc
= WPA_DRIVER_CAPA_ENC_WEP40
|
1038 WPA_DRIVER_CAPA_ENC_WEP104
|
1039 WPA_DRIVER_CAPA_ENC_TKIP
|
1040 WPA_DRIVER_CAPA_ENC_CCMP
;
1042 drv
->capa
.max_scan_ssids
= info
.max_scan_ssids
;
1043 if (info
.ap_supported
)
1044 drv
->capa
.flags
|= WPA_DRIVER_FLAGS_AP
;
1046 #endif /* HOSTAPD */
1049 static int wpa_driver_nl80211_init_nl(struct wpa_driver_nl80211_data
*drv
,
1054 /* Initialize generic netlink and nl80211 */
1056 drv
->nl_cb
= nl_cb_alloc(NL_CB_DEFAULT
);
1057 if (drv
->nl_cb
== NULL
) {
1058 wpa_printf(MSG_ERROR
, "nl80211: Failed to allocate netlink "
1063 drv
->nl_handle
= nl_handle_alloc_cb(drv
->nl_cb
);
1064 if (drv
->nl_handle
== NULL
) {
1065 wpa_printf(MSG_ERROR
, "nl80211: Failed to allocate netlink "
1070 if (genl_connect(drv
->nl_handle
)) {
1071 wpa_printf(MSG_ERROR
, "nl80211: Failed to connect to generic "
1076 #ifdef CONFIG_LIBNL20
1077 if (genl_ctrl_alloc_cache(drv
->nl_handle
, &drv
->nl_cache
) < 0) {
1078 wpa_printf(MSG_ERROR
, "nl80211: Failed to allocate generic "
1082 #else /* CONFIG_LIBNL20 */
1083 drv
->nl_cache
= genl_ctrl_alloc_cache(drv
->nl_handle
);
1084 if (drv
->nl_cache
== NULL
) {
1085 wpa_printf(MSG_ERROR
, "nl80211: Failed to allocate generic "
1089 #endif /* CONFIG_LIBNL20 */
1092 drv
->nl80211
= genl_ctrl_search_by_name(drv
->nl_cache
, "nl80211");
1093 if (drv
->nl80211
== NULL
) {
1094 wpa_printf(MSG_ERROR
, "nl80211: 'nl80211' generic netlink not "
1099 ret
= nl_get_multicast_id(drv
, "nl80211", "scan");
1101 ret
= nl_socket_add_membership(drv
->nl_handle
, ret
);
1103 wpa_printf(MSG_ERROR
, "nl80211: Could not add multicast "
1104 "membership for scan events: %d (%s)",
1105 ret
, strerror(-ret
));
1109 ret
= nl_get_multicast_id(drv
, "nl80211", "mlme");
1111 ret
= nl_socket_add_membership(drv
->nl_handle
, ret
);
1113 wpa_printf(MSG_ERROR
, "nl80211: Could not add multicast "
1114 "membership for mlme events: %d (%s)",
1115 ret
, strerror(-ret
));
1119 eloop_register_read_sock(nl_socket_get_fd(drv
->nl_handle
),
1120 wpa_driver_nl80211_event_receive
, drv
, ctx
);
1125 nl_cache_free(drv
->nl_cache
);
1127 nl_handle_destroy(drv
->nl_handle
);
1129 nl_cb_put(drv
->nl_cb
);
1135 static int wpa_driver_nl80211_init_link_events(
1136 struct wpa_driver_nl80211_data
*drv
)
1142 struct sockaddr_nl local
;
1144 s
= socket(PF_NETLINK
, SOCK_RAW
, NETLINK_ROUTE
);
1146 perror("socket(PF_NETLINK,SOCK_RAW,NETLINK_ROUTE)");
1150 os_memset(&local
, 0, sizeof(local
));
1151 local
.nl_family
= AF_NETLINK
;
1152 local
.nl_groups
= RTMGRP_LINK
;
1153 if (bind(s
, (struct sockaddr
*) &local
, sizeof(local
)) < 0) {
1154 perror("bind(netlink)");
1159 eloop_register_read_sock(s
, wpa_driver_nl80211_event_receive_link
, drv
,
1161 drv
->link_event_sock
= s
;
1164 #endif /* HOSTAPD */
1169 * wpa_driver_nl80211_init - Initialize nl80211 driver interface
1170 * @ctx: context to be used when calling wpa_supplicant functions,
1171 * e.g., wpa_supplicant_event()
1172 * @ifname: interface name, e.g., wlan0
1173 * Returns: Pointer to private data, %NULL on failure
1175 static void * wpa_driver_nl80211_init(void *ctx
, const char *ifname
)
1177 struct wpa_driver_nl80211_data
*drv
;
1179 drv
= os_zalloc(sizeof(*drv
));
1183 os_strlcpy(drv
->ifname
, ifname
, sizeof(drv
->ifname
));
1184 drv
->monitor_ifidx
= -1;
1185 drv
->monitor_sock
= -1;
1186 drv
->link_event_sock
= -1;
1187 drv
->ioctl_sock
= -1;
1189 if (wpa_driver_nl80211_init_nl(drv
, ctx
)) {
1194 drv
->capa
.flags
|= WPA_DRIVER_FLAGS_SME
;
1196 drv
->ioctl_sock
= socket(PF_INET
, SOCK_DGRAM
, 0);
1197 if (drv
->ioctl_sock
< 0) {
1198 perror("socket(PF_INET,SOCK_DGRAM)");
1202 if (wpa_driver_nl80211_init_link_events(drv
) ||
1203 wpa_driver_nl80211_finish_drv_init(drv
))
1209 if (drv
->link_event_sock
>= 0) {
1210 eloop_unregister_read_sock(drv
->link_event_sock
);
1211 close(drv
->link_event_sock
);
1213 if (drv
->ioctl_sock
>= 0)
1214 close(drv
->ioctl_sock
);
1216 genl_family_put(drv
->nl80211
);
1217 nl_cache_free(drv
->nl_cache
);
1218 nl_handle_destroy(drv
->nl_handle
);
1219 nl_cb_put(drv
->nl_cb
);
1227 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data
*drv
)
1229 drv
->ifindex
= if_nametoindex(drv
->ifname
);
1232 if (wpa_driver_nl80211_set_mode(drv
, IEEE80211_MODE_INFRA
) < 0) {
1233 wpa_printf(MSG_DEBUG
, "nl80211: Could not configure driver to "
1234 "use managed mode");
1237 if (hostapd_set_iface_flags(drv
, drv
->ifname
, 1)) {
1238 wpa_printf(MSG_ERROR
, "Could not set interface '%s' "
1243 wpa_driver_nl80211_capa(drv
);
1245 wpa_driver_nl80211_send_oper_ifla(drv
, 1, IF_OPER_DORMANT
);
1246 #endif /* HOSTAPD */
1253 static void wpa_driver_nl80211_free_bss(struct wpa_driver_nl80211_data
*drv
)
1255 struct i802_bss
*bss
, *prev
;
1256 bss
= drv
->bss
.next
;
1263 #endif /* HOSTAPD */
1267 * wpa_driver_nl80211_deinit - Deinitialize nl80211 driver interface
1268 * @priv: Pointer to private nl80211 data from wpa_driver_nl80211_init()
1270 * Shut down driver interface and processing of driver events. Free
1271 * private data buffer if one was allocated in wpa_driver_nl80211_init().
1273 static void wpa_driver_nl80211_deinit(void *priv
)
1275 struct wpa_driver_nl80211_data
*drv
= priv
;
1277 #if defined(CONFIG_AP) || defined(HOSTAPD)
1278 if (drv
->monitor_ifidx
>= 0)
1279 nl80211_remove_iface(drv
, drv
->monitor_ifidx
);
1280 if (drv
->monitor_sock
>= 0) {
1281 eloop_unregister_read_sock(drv
->monitor_sock
);
1282 close(drv
->monitor_sock
);
1284 #endif /* CONFIG_AP || HOSTAPD */
1287 if (drv
->last_freq_ht
) {
1288 /* Clear HT flags from the driver */
1289 struct hostapd_freq_params freq
;
1290 os_memset(&freq
, 0, sizeof(freq
));
1291 freq
.freq
= drv
->last_freq
;
1292 i802_set_freq(priv
, &freq
);
1295 i802_del_beacon(drv
);
1297 if (drv
->eapol_sock
>= 0) {
1298 eloop_unregister_read_sock(drv
->eapol_sock
);
1299 close(drv
->eapol_sock
);
1302 if (drv
->if_indices
!= drv
->default_if_indices
)
1303 os_free(drv
->if_indices
);
1305 wpa_driver_nl80211_free_bss(drv
);
1308 wpa_driver_nl80211_set_auth_param(drv
, IW_AUTH_DROP_UNENCRYPTED
, 0);
1309 #endif /* NO_WEXT */
1311 wpa_driver_nl80211_send_oper_ifla(priv
, 0, IF_OPER_UP
);
1313 if (drv
->link_event_sock
>= 0) {
1314 eloop_unregister_read_sock(drv
->link_event_sock
);
1315 close(drv
->link_event_sock
);
1317 #endif /* HOSTAPD */
1319 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout
, drv
, drv
->ctx
);
1321 (void) hostapd_set_iface_flags(drv
, drv
->ifname
, 0);
1322 wpa_driver_nl80211_set_mode(drv
, IEEE80211_MODE_INFRA
);
1324 if (drv
->ioctl_sock
>= 0)
1325 close(drv
->ioctl_sock
);
1327 eloop_unregister_read_sock(nl_socket_get_fd(drv
->nl_handle
));
1328 genl_family_put(drv
->nl80211
);
1329 nl_cache_free(drv
->nl_cache
);
1330 nl_handle_destroy(drv
->nl_handle
);
1331 nl_cb_put(drv
->nl_cb
);
1338 * wpa_driver_nl80211_scan_timeout - Scan timeout to report scan completion
1339 * @eloop_ctx: Driver private data
1340 * @timeout_ctx: ctx argument given to wpa_driver_nl80211_init()
1342 * This function can be used as registered timeout when starting a scan to
1343 * generate a scan completed event if the driver does not report this.
1345 static void wpa_driver_nl80211_scan_timeout(void *eloop_ctx
, void *timeout_ctx
)
1347 struct wpa_driver_nl80211_data
*drv
= eloop_ctx
;
1348 if (drv
->ap_scan_as_station
) {
1349 wpa_driver_nl80211_set_mode(drv
, IEEE80211_MODE_AP
);
1350 drv
->ap_scan_as_station
= 0;
1352 wpa_printf(MSG_DEBUG
, "Scan timeout - try to get results");
1353 wpa_supplicant_event(timeout_ctx
, EVENT_SCAN_RESULTS
, NULL
);
1358 * wpa_driver_nl80211_scan - Request the driver to initiate scan
1359 * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
1360 * @params: Scan parameters
1361 * Returns: 0 on success, -1 on failure
1363 static int wpa_driver_nl80211_scan(void *priv
,
1364 struct wpa_driver_scan_params
*params
)
1366 struct wpa_driver_nl80211_data
*drv
= priv
;
1367 int ret
= 0, timeout
;
1368 struct nl_msg
*msg
, *ssids
, *freqs
;
1371 msg
= nlmsg_alloc();
1372 ssids
= nlmsg_alloc();
1373 freqs
= nlmsg_alloc();
1374 if (!msg
|| !ssids
|| !freqs
) {
1381 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0, 0,
1382 NL80211_CMD_TRIGGER_SCAN
, 0);
1384 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, drv
->ifindex
);
1386 for (i
= 0; i
< params
->num_ssids
; i
++) {
1387 NLA_PUT(ssids
, i
+ 1, params
->ssids
[i
].ssid_len
,
1388 params
->ssids
[i
].ssid
);
1390 if (params
->num_ssids
)
1391 nla_put_nested(msg
, NL80211_ATTR_SCAN_SSIDS
, ssids
);
1393 if (params
->extra_ies
) {
1394 NLA_PUT(msg
, NL80211_ATTR_IE
, params
->extra_ies_len
,
1398 if (params
->freqs
) {
1399 for (i
= 0; params
->freqs
[i
]; i
++)
1400 NLA_PUT_U32(freqs
, i
+ 1, params
->freqs
[i
]);
1401 nla_put_nested(msg
, NL80211_ATTR_SCAN_FREQUENCIES
, freqs
);
1404 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
1407 wpa_printf(MSG_DEBUG
, "nl80211: Scan trigger failed: ret=%d "
1408 "(%s)", ret
, strerror(-ret
));
1410 if (drv
->nlmode
== NL80211_IFTYPE_AP
) {
1412 * mac80211 does not allow scan requests in AP mode, so
1413 * try to do this in station mode.
1415 if (wpa_driver_nl80211_set_mode(drv
,
1416 IEEE80211_MODE_INFRA
))
1417 goto nla_put_failure
;
1419 if (wpa_driver_nl80211_scan(drv
, params
)) {
1420 wpa_driver_nl80211_set_mode(drv
,
1422 goto nla_put_failure
;
1425 /* Restore AP mode when processing scan results */
1426 drv
->ap_scan_as_station
= 1;
1429 goto nla_put_failure
;
1431 goto nla_put_failure
;
1432 #endif /* HOSTAPD */
1435 /* Not all drivers generate "scan completed" wireless event, so try to
1436 * read results after a timeout. */
1438 if (drv
->scan_complete_events
) {
1440 * The driver seems to deliver events to notify when scan is
1441 * complete, so use longer timeout to avoid race conditions
1442 * with scanning and following association request.
1446 wpa_printf(MSG_DEBUG
, "Scan requested (ret=%d) - scan timeout %d "
1447 "seconds", ret
, timeout
);
1448 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout
, drv
, drv
->ctx
);
1449 eloop_register_timeout(timeout
, 0, wpa_driver_nl80211_scan_timeout
,
1460 static int bss_info_handler(struct nl_msg
*msg
, void *arg
)
1462 struct nlattr
*tb
[NL80211_ATTR_MAX
+ 1];
1463 struct genlmsghdr
*gnlh
= nlmsg_data(nlmsg_hdr(msg
));
1464 struct nlattr
*bss
[NL80211_BSS_MAX
+ 1];
1465 static struct nla_policy bss_policy
[NL80211_BSS_MAX
+ 1] = {
1466 [NL80211_BSS_BSSID
] = { .type
= NLA_UNSPEC
},
1467 [NL80211_BSS_FREQUENCY
] = { .type
= NLA_U32
},
1468 [NL80211_BSS_TSF
] = { .type
= NLA_U64
},
1469 [NL80211_BSS_BEACON_INTERVAL
] = { .type
= NLA_U16
},
1470 [NL80211_BSS_CAPABILITY
] = { .type
= NLA_U16
},
1471 [NL80211_BSS_INFORMATION_ELEMENTS
] = { .type
= NLA_UNSPEC
},
1472 [NL80211_BSS_SIGNAL_MBM
] = { .type
= NLA_U32
},
1473 [NL80211_BSS_SIGNAL_UNSPEC
] = { .type
= NLA_U8
},
1475 struct wpa_scan_results
*res
= arg
;
1476 struct wpa_scan_res
**tmp
;
1477 struct wpa_scan_res
*r
;
1481 nla_parse(tb
, NL80211_ATTR_MAX
, genlmsg_attrdata(gnlh
, 0),
1482 genlmsg_attrlen(gnlh
, 0), NULL
);
1483 if (!tb
[NL80211_ATTR_BSS
])
1485 if (nla_parse_nested(bss
, NL80211_BSS_MAX
, tb
[NL80211_ATTR_BSS
],
1488 if (bss
[NL80211_BSS_INFORMATION_ELEMENTS
]) {
1489 ie
= nla_data(bss
[NL80211_BSS_INFORMATION_ELEMENTS
]);
1490 ie_len
= nla_len(bss
[NL80211_BSS_INFORMATION_ELEMENTS
]);
1496 r
= os_zalloc(sizeof(*r
) + ie_len
);
1499 if (bss
[NL80211_BSS_BSSID
])
1500 os_memcpy(r
->bssid
, nla_data(bss
[NL80211_BSS_BSSID
]),
1502 if (bss
[NL80211_BSS_FREQUENCY
])
1503 r
->freq
= nla_get_u32(bss
[NL80211_BSS_FREQUENCY
]);
1504 if (bss
[NL80211_BSS_BEACON_INTERVAL
])
1505 r
->beacon_int
= nla_get_u16(bss
[NL80211_BSS_BEACON_INTERVAL
]);
1506 if (bss
[NL80211_BSS_CAPABILITY
])
1507 r
->caps
= nla_get_u16(bss
[NL80211_BSS_CAPABILITY
]);
1508 r
->flags
|= WPA_SCAN_NOISE_INVALID
;
1509 if (bss
[NL80211_BSS_SIGNAL_MBM
]) {
1510 r
->level
= nla_get_u32(bss
[NL80211_BSS_SIGNAL_MBM
]);
1511 r
->level
/= 100; /* mBm to dBm */
1512 r
->flags
|= WPA_SCAN_LEVEL_DBM
| WPA_SCAN_QUAL_INVALID
;
1513 } else if (bss
[NL80211_BSS_SIGNAL_UNSPEC
]) {
1514 r
->level
= nla_get_u8(bss
[NL80211_BSS_SIGNAL_UNSPEC
]);
1515 r
->flags
|= WPA_SCAN_LEVEL_INVALID
;
1517 r
->flags
|= WPA_SCAN_LEVEL_INVALID
| WPA_SCAN_QUAL_INVALID
;
1518 if (bss
[NL80211_BSS_TSF
])
1519 r
->tsf
= nla_get_u64(bss
[NL80211_BSS_TSF
]);
1522 os_memcpy(r
+ 1, ie
, ie_len
);
1524 tmp
= os_realloc(res
->res
,
1525 (res
->num
+ 1) * sizeof(struct wpa_scan_res
*));
1530 tmp
[res
->num
++] = r
;
1538 * wpa_driver_nl80211_get_scan_results - Fetch the latest scan results
1539 * @priv: Pointer to private wext data from wpa_driver_nl80211_init()
1540 * Returns: Scan results on success, -1 on failure
1542 static struct wpa_scan_results
*
1543 wpa_driver_nl80211_get_scan_results(void *priv
)
1545 struct wpa_driver_nl80211_data
*drv
= priv
;
1547 struct wpa_scan_results
*res
;
1550 res
= os_zalloc(sizeof(*res
));
1553 msg
= nlmsg_alloc();
1555 goto nla_put_failure
;
1557 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0, NLM_F_DUMP
,
1558 NL80211_CMD_GET_SCAN
, 0);
1559 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, drv
->ifindex
);
1561 ret
= send_and_recv_msgs(drv
, msg
, bss_info_handler
, res
);
1564 wpa_printf(MSG_DEBUG
, "Received scan results (%lu BSSes)",
1565 (unsigned long) res
->num
);
1568 wpa_printf(MSG_DEBUG
, "nl80211: Scan result fetch failed: ret=%d "
1569 "(%s)", ret
, strerror(-ret
));
1572 wpa_scan_results_free(res
);
1577 static int nl_set_encr(int ifindex
, struct wpa_driver_nl80211_data
*drv
,
1578 wpa_alg alg
, const u8
*addr
, int key_idx
, int set_tx
,
1579 const u8
*seq
, size_t seq_len
,
1580 const u8
*key
, size_t key_len
)
1585 wpa_printf(MSG_DEBUG
, "%s: ifindex=%d alg=%d addr=%p key_idx=%d "
1586 "set_tx=%d seq_len=%lu key_len=%lu",
1587 __func__
, ifindex
, alg
, addr
, key_idx
, set_tx
,
1588 (unsigned long) seq_len
, (unsigned long) key_len
);
1590 msg
= nlmsg_alloc();
1594 if (alg
== WPA_ALG_NONE
) {
1595 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
1596 0, NL80211_CMD_DEL_KEY
, 0);
1598 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
1599 0, NL80211_CMD_NEW_KEY
, 0);
1600 NLA_PUT(msg
, NL80211_ATTR_KEY_DATA
, key_len
, key
);
1604 NLA_PUT_U32(msg
, NL80211_ATTR_KEY_CIPHER
,
1607 NLA_PUT_U32(msg
, NL80211_ATTR_KEY_CIPHER
,
1611 NLA_PUT_U32(msg
, NL80211_ATTR_KEY_CIPHER
, 0x000FAC02);
1614 NLA_PUT_U32(msg
, NL80211_ATTR_KEY_CIPHER
, 0x000FAC04);
1617 NLA_PUT_U32(msg
, NL80211_ATTR_KEY_CIPHER
, 0x000FAC06);
1620 wpa_printf(MSG_ERROR
, "%s: Unsupported encryption "
1621 "algorithm %d", __func__
, alg
);
1628 NLA_PUT(msg
, NL80211_ATTR_KEY_SEQ
, seq_len
, seq
);
1630 if (addr
&& os_memcmp(addr
, "\xff\xff\xff\xff\xff\xff", ETH_ALEN
) != 0)
1632 wpa_printf(MSG_DEBUG
, " addr=" MACSTR
, MAC2STR(addr
));
1633 NLA_PUT(msg
, NL80211_ATTR_MAC
, ETH_ALEN
, addr
);
1635 NLA_PUT_U8(msg
, NL80211_ATTR_KEY_IDX
, key_idx
);
1636 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, ifindex
);
1638 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
1639 if (ret
== -ENOENT
&& alg
== WPA_ALG_NONE
)
1642 wpa_printf(MSG_DEBUG
, "nl80211: set_key failed; err=%d %s)",
1643 ret
, strerror(-ret
));
1646 * If we failed or don't need to set the default TX key (below),
1649 if (ret
|| !set_tx
|| alg
== WPA_ALG_NONE
)
1651 #ifdef HOSTAPD /* FIX: is this needed? */
1654 #endif /* HOSTAPD */
1656 msg
= nlmsg_alloc();
1660 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
1661 0, NL80211_CMD_SET_KEY
, 0);
1662 NLA_PUT_U8(msg
, NL80211_ATTR_KEY_IDX
, key_idx
);
1663 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, ifindex
);
1664 if (alg
== WPA_ALG_IGTK
)
1665 NLA_PUT_FLAG(msg
, NL80211_ATTR_KEY_DEFAULT_MGMT
);
1667 NLA_PUT_FLAG(msg
, NL80211_ATTR_KEY_DEFAULT
);
1669 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
1673 wpa_printf(MSG_DEBUG
, "nl80211: set_key default failed; "
1674 "err=%d %s)", ret
, strerror(-ret
));
1684 static int wpa_driver_nl80211_set_key(void *priv
, wpa_alg alg
,
1685 const u8
*addr
, int key_idx
,
1686 int set_tx
, const u8
*seq
,
1688 const u8
*key
, size_t key_len
)
1690 struct wpa_driver_nl80211_data
*drv
= priv
;
1691 return nl_set_encr(drv
->ifindex
, drv
, alg
, addr
, key_idx
, set_tx
, seq
,
1692 seq_len
, key
, key_len
);
1696 static int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data
*drv
,
1697 const u8
*addr
, int cmd
, u16 reason_code
)
1702 msg
= nlmsg_alloc();
1706 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0, 0, cmd
, 0);
1708 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, drv
->ifindex
);
1709 NLA_PUT_U16(msg
, NL80211_ATTR_REASON_CODE
, reason_code
);
1710 NLA_PUT(msg
, NL80211_ATTR_MAC
, ETH_ALEN
, addr
);
1712 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
1715 wpa_printf(MSG_DEBUG
, "nl80211: MLME command failed: ret=%d "
1716 "(%s)", ret
, strerror(-ret
));
1717 goto nla_put_failure
;
1727 static int wpa_driver_nl80211_deauthenticate(void *priv
, const u8
*addr
,
1730 struct wpa_driver_nl80211_data
*drv
= priv
;
1731 wpa_printf(MSG_DEBUG
, "%s", __func__
);
1732 return wpa_driver_nl80211_mlme(drv
, addr
, NL80211_CMD_DEAUTHENTICATE
,
1737 static int wpa_driver_nl80211_disassociate(void *priv
, const u8
*addr
,
1740 struct wpa_driver_nl80211_data
*drv
= priv
;
1741 wpa_printf(MSG_DEBUG
, "%s", __func__
);
1742 return wpa_driver_nl80211_mlme(drv
, addr
, NL80211_CMD_DISASSOCIATE
,
1747 static int wpa_driver_nl80211_authenticate(
1748 void *priv
, struct wpa_driver_auth_params
*params
)
1750 struct wpa_driver_nl80211_data
*drv
= priv
;
1753 enum nl80211_auth_type type
;
1755 drv
->associated
= 0;
1757 msg
= nlmsg_alloc();
1761 wpa_printf(MSG_DEBUG
, "nl80211: Authenticate (ifindex=%d)",
1764 for (i
= 0; i
< 4; i
++) {
1765 if (!params
->wep_key
[i
])
1767 wpa_driver_nl80211_set_key(drv
, WPA_ALG_WEP
, NULL
, i
,
1768 i
== params
->wep_tx_keyidx
, NULL
, 0,
1770 params
->wep_key_len
[i
]);
1773 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0, 0,
1774 NL80211_CMD_AUTHENTICATE
, 0);
1776 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, drv
->ifindex
);
1777 if (params
->bssid
) {
1778 wpa_printf(MSG_DEBUG
, " * bssid=" MACSTR
,
1779 MAC2STR(params
->bssid
));
1780 NLA_PUT(msg
, NL80211_ATTR_MAC
, ETH_ALEN
, params
->bssid
);
1783 wpa_printf(MSG_DEBUG
, " * freq=%d", params
->freq
);
1784 NLA_PUT_U32(msg
, NL80211_ATTR_WIPHY_FREQ
, params
->freq
);
1787 wpa_hexdump_ascii(MSG_DEBUG
, " * SSID",
1788 params
->ssid
, params
->ssid_len
);
1789 NLA_PUT(msg
, NL80211_ATTR_SSID
, params
->ssid_len
,
1792 wpa_hexdump(MSG_DEBUG
, " * IEs", params
->ie
, params
->ie_len
);
1794 NLA_PUT(msg
, NL80211_ATTR_IE
, params
->ie_len
, params
->ie
);
1796 * TODO: if multiple auth_alg options enabled, try them one by one if
1797 * the AP rejects authentication due to unknown auth alg
1799 if (params
->auth_alg
& AUTH_ALG_OPEN_SYSTEM
)
1800 type
= NL80211_AUTHTYPE_OPEN_SYSTEM
;
1801 else if (params
->auth_alg
& AUTH_ALG_SHARED_KEY
)
1802 type
= NL80211_AUTHTYPE_SHARED_KEY
;
1803 else if (params
->auth_alg
& AUTH_ALG_LEAP
)
1804 type
= NL80211_AUTHTYPE_NETWORK_EAP
;
1805 else if (params
->auth_alg
& AUTH_ALG_FT
)
1806 type
= NL80211_AUTHTYPE_FT
;
1808 goto nla_put_failure
;
1809 wpa_printf(MSG_DEBUG
, " * Auth Type %d", type
);
1810 NLA_PUT_U32(msg
, NL80211_ATTR_AUTH_TYPE
, type
);
1812 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
1815 wpa_printf(MSG_DEBUG
, "nl80211: MLME command failed: ret=%d "
1816 "(%s)", ret
, strerror(-ret
));
1817 goto nla_put_failure
;
1820 wpa_printf(MSG_DEBUG
, "nl80211: Authentication request send "
1828 #endif /* HOSTAPD */
1831 #if defined(CONFIG_AP) || defined(HOSTAPD)
1833 struct phy_info_arg
{
1835 struct hostapd_hw_modes
*modes
;
1838 static int phy_info_handler(struct nl_msg
*msg
, void *arg
)
1840 struct nlattr
*tb_msg
[NL80211_ATTR_MAX
+ 1];
1841 struct genlmsghdr
*gnlh
= nlmsg_data(nlmsg_hdr(msg
));
1842 struct phy_info_arg
*phy_info
= arg
;
1844 struct nlattr
*tb_band
[NL80211_BAND_ATTR_MAX
+ 1];
1846 struct nlattr
*tb_freq
[NL80211_FREQUENCY_ATTR_MAX
+ 1];
1847 static struct nla_policy freq_policy
[NL80211_FREQUENCY_ATTR_MAX
+ 1] = {
1848 [NL80211_FREQUENCY_ATTR_FREQ
] = { .type
= NLA_U32
},
1849 [NL80211_FREQUENCY_ATTR_DISABLED
] = { .type
= NLA_FLAG
},
1850 [NL80211_FREQUENCY_ATTR_PASSIVE_SCAN
] = { .type
= NLA_FLAG
},
1851 [NL80211_FREQUENCY_ATTR_NO_IBSS
] = { .type
= NLA_FLAG
},
1852 [NL80211_FREQUENCY_ATTR_RADAR
] = { .type
= NLA_FLAG
},
1853 [NL80211_FREQUENCY_ATTR_MAX_TX_POWER
] = { .type
= NLA_U32
},
1856 struct nlattr
*tb_rate
[NL80211_BITRATE_ATTR_MAX
+ 1];
1857 static struct nla_policy rate_policy
[NL80211_BITRATE_ATTR_MAX
+ 1] = {
1858 [NL80211_BITRATE_ATTR_RATE
] = { .type
= NLA_U32
},
1859 [NL80211_BITRATE_ATTR_2GHZ_SHORTPREAMBLE
] = { .type
= NLA_FLAG
},
1862 struct nlattr
*nl_band
;
1863 struct nlattr
*nl_freq
;
1864 struct nlattr
*nl_rate
;
1865 int rem_band
, rem_freq
, rem_rate
;
1866 struct hostapd_hw_modes
*mode
;
1867 int idx
, mode_is_set
;
1869 nla_parse(tb_msg
, NL80211_ATTR_MAX
, genlmsg_attrdata(gnlh
, 0),
1870 genlmsg_attrlen(gnlh
, 0), NULL
);
1872 if (!tb_msg
[NL80211_ATTR_WIPHY_BANDS
])
1875 nla_for_each_nested(nl_band
, tb_msg
[NL80211_ATTR_WIPHY_BANDS
], rem_band
) {
1876 mode
= realloc(phy_info
->modes
, (*phy_info
->num_modes
+ 1) * sizeof(*mode
));
1879 phy_info
->modes
= mode
;
1883 mode
= &phy_info
->modes
[*(phy_info
->num_modes
)];
1884 memset(mode
, 0, sizeof(*mode
));
1885 *(phy_info
->num_modes
) += 1;
1887 nla_parse(tb_band
, NL80211_BAND_ATTR_MAX
, nla_data(nl_band
),
1888 nla_len(nl_band
), NULL
);
1890 if (tb_band
[NL80211_BAND_ATTR_HT_CAPA
]) {
1891 mode
->ht_capab
= nla_get_u16(
1892 tb_band
[NL80211_BAND_ATTR_HT_CAPA
]);
1895 nla_for_each_nested(nl_freq
, tb_band
[NL80211_BAND_ATTR_FREQS
], rem_freq
) {
1896 nla_parse(tb_freq
, NL80211_FREQUENCY_ATTR_MAX
, nla_data(nl_freq
),
1897 nla_len(nl_freq
), freq_policy
);
1898 if (!tb_freq
[NL80211_FREQUENCY_ATTR_FREQ
])
1900 mode
->num_channels
++;
1903 mode
->channels
= calloc(mode
->num_channels
, sizeof(struct hostapd_channel_data
));
1904 if (!mode
->channels
)
1909 nla_for_each_nested(nl_freq
, tb_band
[NL80211_BAND_ATTR_FREQS
], rem_freq
) {
1910 nla_parse(tb_freq
, NL80211_FREQUENCY_ATTR_MAX
, nla_data(nl_freq
),
1911 nla_len(nl_freq
), freq_policy
);
1912 if (!tb_freq
[NL80211_FREQUENCY_ATTR_FREQ
])
1915 mode
->channels
[idx
].freq
= nla_get_u32(tb_freq
[NL80211_FREQUENCY_ATTR_FREQ
]);
1916 mode
->channels
[idx
].flag
= 0;
1919 /* crude heuristic */
1920 if (mode
->channels
[idx
].freq
< 4000)
1921 mode
->mode
= HOSTAPD_MODE_IEEE80211B
;
1923 mode
->mode
= HOSTAPD_MODE_IEEE80211A
;
1927 /* crude heuristic */
1928 if (mode
->channels
[idx
].freq
< 4000)
1929 if (mode
->channels
[idx
].freq
== 2484)
1930 mode
->channels
[idx
].chan
= 14;
1932 mode
->channels
[idx
].chan
= (mode
->channels
[idx
].freq
- 2407) / 5;
1934 mode
->channels
[idx
].chan
= mode
->channels
[idx
].freq
/5 - 1000;
1936 if (tb_freq
[NL80211_FREQUENCY_ATTR_DISABLED
])
1937 mode
->channels
[idx
].flag
|=
1938 HOSTAPD_CHAN_DISABLED
;
1939 if (tb_freq
[NL80211_FREQUENCY_ATTR_PASSIVE_SCAN
])
1940 mode
->channels
[idx
].flag
|=
1941 HOSTAPD_CHAN_PASSIVE_SCAN
;
1942 if (tb_freq
[NL80211_FREQUENCY_ATTR_NO_IBSS
])
1943 mode
->channels
[idx
].flag
|=
1944 HOSTAPD_CHAN_NO_IBSS
;
1945 if (tb_freq
[NL80211_FREQUENCY_ATTR_RADAR
])
1946 mode
->channels
[idx
].flag
|=
1949 if (tb_freq
[NL80211_FREQUENCY_ATTR_MAX_TX_POWER
] &&
1950 !tb_freq
[NL80211_FREQUENCY_ATTR_DISABLED
])
1951 mode
->channels
[idx
].max_tx_power
=
1952 nla_get_u32(tb_freq
[NL80211_FREQUENCY_ATTR_MAX_TX_POWER
]) / 100;
1957 nla_for_each_nested(nl_rate
, tb_band
[NL80211_BAND_ATTR_RATES
], rem_rate
) {
1958 nla_parse(tb_rate
, NL80211_BITRATE_ATTR_MAX
, nla_data(nl_rate
),
1959 nla_len(nl_rate
), rate_policy
);
1960 if (!tb_rate
[NL80211_BITRATE_ATTR_RATE
])
1965 mode
->rates
= calloc(mode
->num_rates
, sizeof(struct hostapd_rate_data
));
1971 nla_for_each_nested(nl_rate
, tb_band
[NL80211_BAND_ATTR_RATES
], rem_rate
) {
1972 nla_parse(tb_rate
, NL80211_BITRATE_ATTR_MAX
, nla_data(nl_rate
),
1973 nla_len(nl_rate
), rate_policy
);
1974 if (!tb_rate
[NL80211_BITRATE_ATTR_RATE
])
1976 mode
->rates
[idx
].rate
= nla_get_u32(tb_rate
[NL80211_BITRATE_ATTR_RATE
]);
1978 /* crude heuristic */
1979 if (mode
->mode
== HOSTAPD_MODE_IEEE80211B
&&
1980 mode
->rates
[idx
].rate
> 200)
1981 mode
->mode
= HOSTAPD_MODE_IEEE80211G
;
1983 if (tb_rate
[NL80211_BITRATE_ATTR_2GHZ_SHORTPREAMBLE
])
1984 mode
->rates
[idx
].flags
|= HOSTAPD_RATE_PREAMBLE2
;
1993 static struct hostapd_hw_modes
*
1994 wpa_driver_nl80211_add_11b(struct hostapd_hw_modes
*modes
, u16
*num_modes
)
1997 struct hostapd_hw_modes
*mode11g
= NULL
, *nmodes
, *mode
;
1998 int i
, mode11g_idx
= -1;
2000 /* If only 802.11g mode is included, use it to construct matching
2001 * 802.11b mode data. */
2003 for (m
= 0; m
< *num_modes
; m
++) {
2004 if (modes
[m
].mode
== HOSTAPD_MODE_IEEE80211B
)
2005 return modes
; /* 802.11b already included */
2006 if (modes
[m
].mode
== HOSTAPD_MODE_IEEE80211G
)
2010 if (mode11g_idx
< 0)
2011 return modes
; /* 2.4 GHz band not supported at all */
2013 nmodes
= os_realloc(modes
, (*num_modes
+ 1) * sizeof(*nmodes
));
2015 return modes
; /* Could not add 802.11b mode */
2017 mode
= &nmodes
[*num_modes
];
2018 os_memset(mode
, 0, sizeof(*mode
));
2022 mode
->mode
= HOSTAPD_MODE_IEEE80211B
;
2024 mode11g
= &modes
[mode11g_idx
];
2025 mode
->num_channels
= mode11g
->num_channels
;
2026 mode
->channels
= os_malloc(mode11g
->num_channels
*
2027 sizeof(struct hostapd_channel_data
));
2028 if (mode
->channels
== NULL
) {
2030 return modes
; /* Could not add 802.11b mode */
2032 os_memcpy(mode
->channels
, mode11g
->channels
,
2033 mode11g
->num_channels
* sizeof(struct hostapd_channel_data
));
2035 mode
->num_rates
= 0;
2036 mode
->rates
= os_malloc(4 * sizeof(struct hostapd_rate_data
));
2037 if (mode
->rates
== NULL
) {
2038 os_free(mode
->channels
);
2040 return modes
; /* Could not add 802.11b mode */
2043 for (i
= 0; i
< mode11g
->num_rates
; i
++) {
2044 if (mode11g
->rates
[i
].rate
> 110 ||
2045 mode11g
->rates
[i
].flags
&
2046 (HOSTAPD_RATE_ERP
| HOSTAPD_RATE_OFDM
))
2048 mode
->rates
[mode
->num_rates
] = mode11g
->rates
[i
];
2050 if (mode
->num_rates
== 4)
2054 if (mode
->num_rates
== 0) {
2055 os_free(mode
->channels
);
2056 os_free(mode
->rates
);
2058 return modes
; /* No 802.11b rates */
2061 wpa_printf(MSG_DEBUG
, "nl80211: Added 802.11b mode based on 802.11g "
2068 static struct hostapd_hw_modes
*
2069 wpa_driver_nl80211_get_hw_feature_data(void *priv
, u16
*num_modes
, u16
*flags
)
2071 struct wpa_driver_nl80211_data
*drv
= priv
;
2073 struct phy_info_arg result
= {
2074 .num_modes
= num_modes
,
2081 msg
= nlmsg_alloc();
2085 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
2086 0, NL80211_CMD_GET_WIPHY
, 0);
2088 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, drv
->ifindex
);
2090 if (send_and_recv_msgs(drv
, msg
, phy_info_handler
, &result
) == 0)
2091 return wpa_driver_nl80211_add_11b(result
.modes
, num_modes
);
2097 static int wpa_driver_nl80211_send_frame(struct wpa_driver_nl80211_data
*drv
,
2098 const void *data
, size_t len
,
2102 0x00, 0x00, /* radiotap version */
2103 0x0e, 0x00, /* radiotap length */
2104 0x02, 0xc0, 0x00, 0x00, /* bmap: flags, tx and rx flags */
2105 IEEE80211_RADIOTAP_F_FRAG
, /* F_FRAG (fragment if required) */
2107 0x00, 0x00, /* RX and TX flags to indicate that */
2108 0x00, 0x00, /* this is the injected frame directly */
2110 struct iovec iov
[2] = {
2112 .iov_base
= &rtap_hdr
,
2113 .iov_len
= sizeof(rtap_hdr
),
2116 .iov_base
= (void *) data
,
2120 struct msghdr msg
= {
2125 .msg_control
= NULL
,
2126 .msg_controllen
= 0,
2131 rtap_hdr
[8] |= IEEE80211_RADIOTAP_F_WEP
;
2133 return sendmsg(drv
->monitor_sock
, &msg
, 0);
2137 static int wpa_driver_nl80211_send_mlme(void *priv
, const u8
*data
,
2140 struct wpa_driver_nl80211_data
*drv
= priv
;
2141 struct ieee80211_mgmt
*mgmt
;
2142 int do_not_encrypt
= 0;
2145 mgmt
= (struct ieee80211_mgmt
*) data
;
2146 fc
= le_to_host16(mgmt
->frame_control
);
2148 if (WLAN_FC_GET_TYPE(fc
) == WLAN_FC_TYPE_MGMT
&&
2149 WLAN_FC_GET_STYPE(fc
) == WLAN_FC_STYPE_AUTH
) {
2151 * Only one of the authentication frame types is encrypted.
2152 * In order for static WEP encryption to work properly (i.e.,
2153 * to not encrypt the frame), we need to tell mac80211 about
2154 * the frames that must not be encrypted.
2156 u16 auth_alg
= le_to_host16(mgmt
->u
.auth
.auth_alg
);
2157 u16 auth_trans
= le_to_host16(mgmt
->u
.auth
.auth_transaction
);
2158 if (auth_alg
== WLAN_AUTH_OPEN
||
2159 (auth_alg
== WLAN_AUTH_SHARED_KEY
&& auth_trans
!= 3))
2163 return wpa_driver_nl80211_send_frame(drv
, data
, data_len
,
2168 static int wpa_driver_nl80211_set_beacon_iface(int ifindex
, void *priv
,
2169 const u8
*head
, size_t head_len
,
2170 const u8
*tail
, size_t tail_len
,
2173 struct wpa_driver_nl80211_data
*drv
= priv
;
2175 u8 cmd
= NL80211_CMD_NEW_BEACON
;
2179 struct i802_bss
*bss
;
2181 bss
= get_bss(drv
, ifindex
);
2184 beacon_set
= bss
->beacon_set
;
2186 beacon_set
= drv
->beacon_set
;
2187 #endif /* HOSTAPD */
2189 msg
= nlmsg_alloc();
2193 wpa_printf(MSG_DEBUG
, "nl80211: Set beacon (beacon_set=%d)",
2196 cmd
= NL80211_CMD_SET_BEACON
;
2198 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
2200 NLA_PUT(msg
, NL80211_ATTR_BEACON_HEAD
, head_len
, head
);
2201 NLA_PUT(msg
, NL80211_ATTR_BEACON_TAIL
, tail_len
, tail
);
2202 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, ifindex
);
2203 if (!drv
->beacon_int
)
2204 drv
->beacon_int
= 100;
2205 NLA_PUT_U32(msg
, NL80211_ATTR_BEACON_INTERVAL
, drv
->beacon_int
);
2206 NLA_PUT_U32(msg
, NL80211_ATTR_DTIM_PERIOD
, dtim_period
);
2208 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
2210 wpa_printf(MSG_DEBUG
, "nl80211: Beacon set failed: %d (%s)",
2211 ret
, strerror(-ret
));
2214 bss
->beacon_set
= 1;
2216 drv
->beacon_set
= 1;
2217 #endif /* HOSTAPD */
2225 static int wpa_driver_nl80211_set_beacon_int(void *priv
, int value
)
2227 struct wpa_driver_nl80211_data
*drv
= priv
;
2230 drv
->beacon_int
= value
;
2233 if (!drv
->bss
.beacon_set
)
2236 if (!drv
->beacon_set
)
2238 #endif /* HOSTAPD */
2240 msg
= nlmsg_alloc();
2244 wpa_printf(MSG_DEBUG
, "nl80211: Set beacon interval %d", value
);
2245 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
2246 0, NL80211_CMD_SET_BEACON
, 0);
2247 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, drv
->ifindex
);
2249 NLA_PUT_U32(msg
, NL80211_ATTR_BEACON_INTERVAL
, value
);
2251 return send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
2257 static int wpa_driver_nl80211_set_freq(struct wpa_driver_nl80211_data
*drv
,
2258 int freq
, int ht_enabled
,
2259 int sec_channel_offset
)
2264 msg
= nlmsg_alloc();
2268 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0, 0,
2269 NL80211_CMD_SET_WIPHY
, 0);
2271 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, drv
->ifindex
);
2272 NLA_PUT_U32(msg
, NL80211_ATTR_WIPHY_FREQ
, freq
);
2274 switch (sec_channel_offset
) {
2276 NLA_PUT_U32(msg
, NL80211_ATTR_WIPHY_CHANNEL_TYPE
,
2277 NL80211_CHAN_HT40MINUS
);
2280 NLA_PUT_U32(msg
, NL80211_ATTR_WIPHY_CHANNEL_TYPE
,
2281 NL80211_CHAN_HT40PLUS
);
2284 NLA_PUT_U32(msg
, NL80211_ATTR_WIPHY_CHANNEL_TYPE
,
2290 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
2293 wpa_printf(MSG_DEBUG
, "nl80211: Failed to set channel (freq=%d): "
2294 "%d (%s)", freq
, ret
, strerror(-ret
));
2299 #endif /* CONFIG_AP || HOSTAPD */
2304 static int wpa_driver_nl80211_set_beacon(void *priv
,
2305 const u8
*head
, size_t head_len
,
2306 const u8
*tail
, size_t tail_len
,
2309 struct wpa_driver_nl80211_data
*drv
= priv
;
2310 return wpa_driver_nl80211_set_beacon_iface(drv
->ifindex
, priv
,
2316 #endif /* CONFIG_AP */
2318 #if defined(CONFIG_AP) || defined(HOSTAPD)
2320 static void nl80211_remove_iface(struct wpa_driver_nl80211_data
*drv
,
2326 /* stop listening for EAPOL on this interface */
2327 del_ifidx(drv
, ifidx
);
2328 #endif /* HOSTAPD */
2330 msg
= nlmsg_alloc();
2332 goto nla_put_failure
;
2334 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
2335 0, NL80211_CMD_DEL_INTERFACE
, 0);
2336 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, ifidx
);
2338 if (send_and_recv_msgs(drv
, msg
, NULL
, NULL
) == 0)
2341 wpa_printf(MSG_ERROR
, "Failed to remove interface (ifidx=%d).\n",
2346 static int nl80211_create_iface(struct wpa_driver_nl80211_data
*drv
,
2347 const char *ifname
, enum nl80211_iftype iftype
,
2350 struct nl_msg
*msg
, *flags
= NULL
;
2354 msg
= nlmsg_alloc();
2358 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
2359 0, NL80211_CMD_NEW_INTERFACE
, 0);
2360 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, drv
->ifindex
);
2361 NLA_PUT_STRING(msg
, NL80211_ATTR_IFNAME
, ifname
);
2362 NLA_PUT_U32(msg
, NL80211_ATTR_IFTYPE
, iftype
);
2364 if (iftype
== NL80211_IFTYPE_MONITOR
) {
2367 flags
= nlmsg_alloc();
2369 goto nla_put_failure
;
2371 NLA_PUT_FLAG(flags
, NL80211_MNTR_FLAG_COOK_FRAMES
);
2373 err
= nla_put_nested(msg
, NL80211_ATTR_MNTR_FLAGS
, flags
);
2378 goto nla_put_failure
;
2381 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
2384 wpa_printf(MSG_ERROR
, "Failed to create interface %s.",
2389 ifidx
= if_nametoindex(ifname
);
2395 /* start listening for EAPOL on this interface */
2396 add_ifidx(drv
, ifidx
);
2398 if (addr
&& iftype
== NL80211_IFTYPE_AP
&&
2399 set_ifhwaddr(drv
, ifname
, addr
)) {
2400 nl80211_remove_iface(drv
, ifidx
);
2403 #endif /* HOSTAPD */
2408 #endif /* CONFIG_AP || HOSTAPD */
2412 void ap_tx_status(void *ctx
, const u8
*addr
,
2413 const u8
*buf
, size_t len
, int ack
);
2414 void ap_rx_from_unknown_sta(void *ctx
, const u8
*addr
);
2415 void ap_mgmt_rx(void *ctx
, u8
*buf
, size_t len
, u16 stype
,
2416 struct hostapd_frame_info
*fi
);
2417 void ap_mgmt_tx_cb(void *ctx
, u8
*buf
, size_t len
, u16 stype
, int ok
);
2419 #endif /* CONFIG_AP */
2421 #if defined(CONFIG_AP) || defined(HOSTAPD)
2423 static void handle_tx_callback(void *ctx
, u8
*buf
, size_t len
, int ok
)
2425 struct ieee80211_hdr
*hdr
;
2426 u16 fc
, type
, stype
;
2428 hdr
= (struct ieee80211_hdr
*) buf
;
2429 fc
= le_to_host16(hdr
->frame_control
);
2431 type
= WLAN_FC_GET_TYPE(fc
);
2432 stype
= WLAN_FC_GET_STYPE(fc
);
2435 case WLAN_FC_TYPE_MGMT
:
2436 wpa_printf(MSG_DEBUG
, "MGMT (TX callback) %s",
2437 ok
? "ACK" : "fail");
2439 hostapd_mgmt_tx_cb(ctx
, buf
, len
, stype
, ok
);
2441 ap_mgmt_tx_cb(ctx
, buf
, len
, stype
, ok
);
2442 #endif /* HOSTAPD */
2444 case WLAN_FC_TYPE_CTRL
:
2445 wpa_printf(MSG_DEBUG
, "CTRL (TX callback) %s",
2446 ok
? "ACK" : "fail");
2448 case WLAN_FC_TYPE_DATA
:
2450 hostapd_tx_status(ctx
, hdr
->addr1
, buf
, len
, ok
);
2452 ap_tx_status(ctx
, hdr
->addr1
, buf
, len
, ok
);
2453 #endif /* HOSTAPD */
2456 wpa_printf(MSG_DEBUG
, "unknown TX callback frame type %d",
2463 static void from_unknown_sta(struct wpa_driver_nl80211_data
*drv
,
2464 struct ieee80211_hdr
*hdr
, size_t len
)
2467 hostapd_rx_from_unknown_sta(drv
->ctx
, hdr
, len
);
2469 ap_rx_from_unknown_sta(drv
->ctx
, hdr
->addr2
);
2470 #endif /* HOSTAPD */
2474 static void handle_frame(struct wpa_driver_nl80211_data
*drv
,
2475 u8
*buf
, size_t len
,
2476 struct hostapd_frame_info
*hfi
)
2478 struct ieee80211_hdr
*hdr
;
2481 hdr
= (struct ieee80211_hdr
*) buf
;
2482 fc
= le_to_host16(hdr
->frame_control
);
2483 stype
= WLAN_FC_GET_STYPE(fc
);
2485 switch (WLAN_FC_GET_TYPE(fc
)) {
2486 case WLAN_FC_TYPE_MGMT
:
2487 if (stype
!= WLAN_FC_STYPE_BEACON
&&
2488 stype
!= WLAN_FC_STYPE_PROBE_REQ
)
2489 wpa_printf(MSG_MSGDUMP
, "MGMT");
2491 hostapd_mgmt_rx(drv
->ctx
, buf
, len
, stype
, hfi
);
2493 ap_mgmt_rx(drv
->ctx
, buf
, len
, stype
, hfi
);
2494 #endif /* HOSTAPD */
2496 case WLAN_FC_TYPE_CTRL
:
2497 /* can only get here with PS-Poll frames */
2498 wpa_printf(MSG_DEBUG
, "CTRL");
2499 from_unknown_sta(drv
, hdr
, len
);
2501 case WLAN_FC_TYPE_DATA
:
2502 from_unknown_sta(drv
, hdr
, len
);
2508 static void handle_monitor_read(int sock
, void *eloop_ctx
, void *sock_ctx
)
2510 struct wpa_driver_nl80211_data
*drv
= eloop_ctx
;
2512 unsigned char buf
[3000];
2513 struct ieee80211_radiotap_iterator iter
;
2515 struct hostapd_frame_info hfi
;
2516 int injected
= 0, failed
= 0, rxflags
= 0;
2518 len
= recv(sock
, buf
, sizeof(buf
), 0);
2524 if (ieee80211_radiotap_iterator_init(&iter
, (void*)buf
, len
)) {
2525 printf("received invalid radiotap frame\n");
2529 memset(&hfi
, 0, sizeof(hfi
));
2532 ret
= ieee80211_radiotap_iterator_next(&iter
);
2536 printf("received invalid radiotap frame (%d)\n", ret
);
2539 switch (iter
.this_arg_index
) {
2540 case IEEE80211_RADIOTAP_FLAGS
:
2541 if (*iter
.this_arg
& IEEE80211_RADIOTAP_F_FCS
)
2544 case IEEE80211_RADIOTAP_RX_FLAGS
:
2547 case IEEE80211_RADIOTAP_TX_FLAGS
:
2549 failed
= le_to_host16((*(uint16_t *) iter
.this_arg
)) &
2550 IEEE80211_RADIOTAP_F_TX_FAIL
;
2552 case IEEE80211_RADIOTAP_DATA_RETRIES
:
2554 case IEEE80211_RADIOTAP_CHANNEL
:
2555 /* TODO convert from freq/flags to channel number
2560 case IEEE80211_RADIOTAP_RATE
:
2561 hfi
.datarate
= *iter
.this_arg
* 5;
2563 case IEEE80211_RADIOTAP_DB_ANTSIGNAL
:
2564 hfi
.ssi_signal
= *iter
.this_arg
;
2569 if (rxflags
&& injected
)
2573 handle_frame(drv
, buf
+ iter
.max_length
,
2574 len
- iter
.max_length
, &hfi
);
2576 handle_tx_callback(drv
->ctx
, buf
+ iter
.max_length
,
2577 len
- iter
.max_length
, !failed
);
2582 * we post-process the filter code later and rewrite
2583 * this to the offset to the last instruction
2588 static struct sock_filter msock_filter_insns
[] = {
2590 * do a little-endian load of the radiotap length field
2592 /* load lower byte into A */
2593 BPF_STMT(BPF_LD
| BPF_B
| BPF_ABS
, 2),
2594 /* put it into X (== index register) */
2595 BPF_STMT(BPF_MISC
| BPF_TAX
, 0),
2596 /* load upper byte into A */
2597 BPF_STMT(BPF_LD
| BPF_B
| BPF_ABS
, 3),
2598 /* left-shift it by 8 */
2599 BPF_STMT(BPF_ALU
| BPF_LSH
| BPF_K
, 8),
2601 BPF_STMT(BPF_ALU
| BPF_OR
| BPF_X
, 0),
2602 /* put result into X */
2603 BPF_STMT(BPF_MISC
| BPF_TAX
, 0),
2606 * Allow management frames through, this also gives us those
2607 * management frames that we sent ourselves with status
2609 /* load the lower byte of the IEEE 802.11 frame control field */
2610 BPF_STMT(BPF_LD
| BPF_B
| BPF_IND
, 0),
2611 /* mask off frame type and version */
2612 BPF_STMT(BPF_ALU
| BPF_AND
| BPF_K
, 0xF),
2613 /* accept frame if it's both 0, fall through otherwise */
2614 BPF_JUMP(BPF_JMP
| BPF_JEQ
| BPF_K
, 0, PASS
, 0),
2617 * TODO: add a bit to radiotap RX flags that indicates
2618 * that the sending station is not associated, then
2619 * add a filter here that filters on our DA and that flag
2620 * to allow us to deauth frames to that bad station.
2622 * Not a regression -- we didn't do it before either.
2627 * drop non-data frames, WDS frames
2629 /* load the lower byte of the frame control field */
2630 BPF_STMT(BPF_LD
| BPF_B
| BPF_IND
, 0),
2631 /* mask off QoS bit */
2632 BPF_STMT(BPF_ALU
| BPF_AND
| BPF_K
, 0x0c),
2633 /* drop non-data frames */
2634 BPF_JUMP(BPF_JMP
| BPF_JEQ
| BPF_K
, 8, 0, FAIL
),
2635 /* load the upper byte of the frame control field */
2636 BPF_STMT(BPF_LD
| BPF_B
| BPF_IND
, 0),
2637 /* mask off toDS/fromDS */
2638 BPF_STMT(BPF_ALU
| BPF_AND
| BPF_K
, 0x03),
2639 /* drop WDS frames */
2640 BPF_JUMP(BPF_JMP
| BPF_JEQ
| BPF_K
, 3, FAIL
, 0),
2644 * add header length to index
2646 /* load the lower byte of the frame control field */
2647 BPF_STMT(BPF_LD
| BPF_B
| BPF_IND
, 0),
2648 /* mask off QoS bit */
2649 BPF_STMT(BPF_ALU
| BPF_AND
| BPF_K
, 0x80),
2650 /* right shift it by 6 to give 0 or 2 */
2651 BPF_STMT(BPF_ALU
| BPF_RSH
| BPF_K
, 6),
2652 /* add data frame header length */
2653 BPF_STMT(BPF_ALU
| BPF_ADD
| BPF_K
, 24),
2654 /* add index, was start of 802.11 header */
2655 BPF_STMT(BPF_ALU
| BPF_ADD
| BPF_X
, 0),
2656 /* move to index, now start of LL header */
2657 BPF_STMT(BPF_MISC
| BPF_TAX
, 0),
2660 * Accept empty data frames, we use those for
2663 BPF_STMT(BPF_LD
| BPF_W
| BPF_LEN
, 0),
2664 BPF_JUMP(BPF_JMP
| BPF_JEQ
| BPF_X
, 0, PASS
, 0),
2667 * Accept EAPOL frames
2669 BPF_STMT(BPF_LD
| BPF_W
| BPF_IND
, 0),
2670 BPF_JUMP(BPF_JMP
| BPF_JEQ
| BPF_K
, 0xAAAA0300, 0, FAIL
),
2671 BPF_STMT(BPF_LD
| BPF_W
| BPF_IND
, 4),
2672 BPF_JUMP(BPF_JMP
| BPF_JEQ
| BPF_K
, 0x0000888E, PASS
, FAIL
),
2674 /* keep these last two statements or change the code below */
2675 /* return 0 == "DROP" */
2676 BPF_STMT(BPF_RET
| BPF_K
, 0),
2677 /* return ~0 == "keep all" */
2678 BPF_STMT(BPF_RET
| BPF_K
, ~0),
2681 static struct sock_fprog msock_filter
= {
2682 .len
= sizeof(msock_filter_insns
)/sizeof(msock_filter_insns
[0]),
2683 .filter
= msock_filter_insns
,
2687 static int add_monitor_filter(int s
)
2691 /* rewrite all PASS/FAIL jump offsets */
2692 for (idx
= 0; idx
< msock_filter
.len
; idx
++) {
2693 struct sock_filter
*insn
= &msock_filter_insns
[idx
];
2695 if (BPF_CLASS(insn
->code
) == BPF_JMP
) {
2696 if (insn
->code
== (BPF_JMP
|BPF_JA
)) {
2697 if (insn
->k
== PASS
)
2698 insn
->k
= msock_filter
.len
- idx
- 2;
2699 else if (insn
->k
== FAIL
)
2700 insn
->k
= msock_filter
.len
- idx
- 3;
2703 if (insn
->jt
== PASS
)
2704 insn
->jt
= msock_filter
.len
- idx
- 2;
2705 else if (insn
->jt
== FAIL
)
2706 insn
->jt
= msock_filter
.len
- idx
- 3;
2708 if (insn
->jf
== PASS
)
2709 insn
->jf
= msock_filter
.len
- idx
- 2;
2710 else if (insn
->jf
== FAIL
)
2711 insn
->jf
= msock_filter
.len
- idx
- 3;
2715 if (setsockopt(s
, SOL_SOCKET
, SO_ATTACH_FILTER
,
2716 &msock_filter
, sizeof(msock_filter
))) {
2717 perror("SO_ATTACH_FILTER");
2726 nl80211_create_monitor_interface(struct wpa_driver_nl80211_data
*drv
)
2729 struct sockaddr_ll ll
;
2733 snprintf(buf
, IFNAMSIZ
, "mon.%s", drv
->ifname
);
2734 buf
[IFNAMSIZ
- 1] = '\0';
2736 drv
->monitor_ifidx
=
2737 nl80211_create_iface(drv
, buf
, NL80211_IFTYPE_MONITOR
, NULL
);
2739 if (drv
->monitor_ifidx
< 0)
2742 if (hostapd_set_iface_flags(drv
, buf
, 1))
2745 memset(&ll
, 0, sizeof(ll
));
2746 ll
.sll_family
= AF_PACKET
;
2747 ll
.sll_ifindex
= drv
->monitor_ifidx
;
2748 drv
->monitor_sock
= socket(PF_PACKET
, SOCK_RAW
, htons(ETH_P_ALL
));
2749 if (drv
->monitor_sock
< 0) {
2750 perror("socket[PF_PACKET,SOCK_RAW]");
2754 if (add_monitor_filter(drv
->monitor_sock
)) {
2755 wpa_printf(MSG_INFO
, "Failed to set socket filter for monitor "
2756 "interface; do filtering in user space");
2757 /* This works, but will cost in performance. */
2760 if (bind(drv
->monitor_sock
, (struct sockaddr
*) &ll
, sizeof(ll
)) < 0) {
2761 perror("monitor socket bind");
2765 optlen
= sizeof(optval
);
2768 (drv
->monitor_sock
, SOL_SOCKET
, SO_PRIORITY
, &optval
, optlen
)) {
2769 perror("Failed to set socket priority");
2773 if (eloop_register_read_sock(drv
->monitor_sock
, handle_monitor_read
,
2775 printf("Could not register monitor read socket\n");
2781 nl80211_remove_iface(drv
, drv
->monitor_ifidx
);
2785 #endif /* CONFIG_AP || HOSTAPD */
2789 static int wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data
*drv
,
2790 struct wpa_driver_associate_params
*params
)
2792 if (drv
->monitor_ifidx
< 0 &&
2793 nl80211_create_monitor_interface(drv
))
2796 if (wpa_driver_nl80211_set_mode(drv
, params
->mode
) ||
2797 wpa_driver_nl80211_set_freq(drv
, params
->freq
, 0, 0)) {
2798 nl80211_remove_iface(drv
, drv
->monitor_ifidx
);
2799 drv
->monitor_ifidx
= -1;
2803 /* TODO: setup monitor interface (and add code somewhere to remove this
2804 * when AP mode is stopped; associate with mode != 2 or drv_deinit) */
2808 #endif /* CONFIG_AP */
2812 static int wpa_driver_nl80211_associate(
2813 void *priv
, struct wpa_driver_associate_params
*params
)
2815 struct wpa_driver_nl80211_data
*drv
= priv
;
2820 if (params
->mode
== 2)
2821 return wpa_driver_nl80211_ap(drv
, params
);
2822 #endif /* CONFIG_AP */
2825 wpa_driver_nl80211_set_auth_param(drv
, IW_AUTH_DROP_UNENCRYPTED
,
2826 params
->drop_unencrypted
);
2827 #endif /* NO_WEXT */
2829 drv
->associated
= 0;
2831 msg
= nlmsg_alloc();
2835 wpa_printf(MSG_DEBUG
, "nl80211: Associate (ifindex=%d)",
2837 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0, 0,
2838 NL80211_CMD_ASSOCIATE
, 0);
2840 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, drv
->ifindex
);
2841 if (params
->bssid
) {
2842 wpa_printf(MSG_DEBUG
, " * bssid=" MACSTR
,
2843 MAC2STR(params
->bssid
));
2844 NLA_PUT(msg
, NL80211_ATTR_MAC
, ETH_ALEN
, params
->bssid
);
2847 wpa_printf(MSG_DEBUG
, " * freq=%d", params
->freq
);
2848 NLA_PUT_U32(msg
, NL80211_ATTR_WIPHY_FREQ
, params
->freq
);
2851 wpa_hexdump_ascii(MSG_DEBUG
, " * SSID",
2852 params
->ssid
, params
->ssid_len
);
2853 NLA_PUT(msg
, NL80211_ATTR_SSID
, params
->ssid_len
,
2855 if (params
->ssid_len
> sizeof(drv
->ssid
))
2856 goto nla_put_failure
;
2857 os_memcpy(drv
->ssid
, params
->ssid
, params
->ssid_len
);
2858 drv
->ssid_len
= params
->ssid_len
;
2860 wpa_hexdump(MSG_DEBUG
, " * IEs", params
->wpa_ie
, params
->wpa_ie_len
);
2862 NLA_PUT(msg
, NL80211_ATTR_IE
, params
->wpa_ie_len
,
2865 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
2868 wpa_printf(MSG_DEBUG
, "nl80211: MLME command failed: ret=%d "
2869 "(%s)", ret
, strerror(-ret
));
2870 goto nla_put_failure
;
2873 wpa_printf(MSG_DEBUG
, "nl80211: Association request send "
2880 #endif /* HOSTAPD */
2883 static int nl80211_set_mode(struct wpa_driver_nl80211_data
*drv
,
2884 int ifindex
, int mode
)
2889 msg
= nlmsg_alloc();
2893 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
2894 0, NL80211_CMD_SET_INTERFACE
, 0);
2895 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, ifindex
);
2896 NLA_PUT_U32(msg
, NL80211_ATTR_IFTYPE
, mode
);
2898 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
2902 wpa_printf(MSG_DEBUG
, "nl80211: Failed to set interface %d to mode %d:"
2903 " %d (%s)", ifindex
, mode
, ret
, strerror(-ret
));
2908 static int wpa_driver_nl80211_set_mode(void *priv
, int mode
)
2910 struct wpa_driver_nl80211_data
*drv
= priv
;
2916 nlmode
= NL80211_IFTYPE_STATION
;
2919 nlmode
= NL80211_IFTYPE_ADHOC
;
2922 nlmode
= NL80211_IFTYPE_AP
;
2928 if (nl80211_set_mode(drv
, drv
->ifindex
, nlmode
) == 0) {
2929 drv
->nlmode
= nlmode
;
2933 if (nlmode
== drv
->nlmode
)
2934 return 0; /* Already in the requested mode */
2936 /* mac80211 doesn't allow mode changes while the device is up, so
2937 * take the device down, try to set the mode again, and bring the
2940 if (hostapd_set_iface_flags(drv
, drv
->ifname
, 0) == 0) {
2941 /* Try to set the mode again while the interface is down */
2942 ret
= nl80211_set_mode(drv
, drv
->ifindex
, nlmode
);
2943 if (hostapd_set_iface_flags(drv
, drv
->ifname
, 1))
2948 drv
->nlmode
= nlmode
;
2956 static int wpa_driver_nl80211_get_capa(void *priv
,
2957 struct wpa_driver_capa
*capa
)
2959 struct wpa_driver_nl80211_data
*drv
= priv
;
2960 if (!drv
->has_capability
)
2962 os_memcpy(capa
, &drv
->capa
, sizeof(*capa
));
2967 static int wpa_driver_nl80211_set_operstate(void *priv
, int state
)
2969 struct wpa_driver_nl80211_data
*drv
= priv
;
2971 wpa_printf(MSG_DEBUG
, "%s: operstate %d->%d (%s)",
2972 __func__
, drv
->operstate
, state
, state
? "UP" : "DORMANT");
2973 drv
->operstate
= state
;
2974 return wpa_driver_nl80211_send_oper_ifla(
2975 drv
, -1, state
? IF_OPER_UP
: IF_OPER_DORMANT
);
2978 #endif /* HOSTAPD */
2983 static const u8 rfc1042_header
[6] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
2986 static struct i802_bss
* get_bss(struct wpa_driver_nl80211_data
*drv
,
2989 struct i802_bss
*bss
= &drv
->bss
;
2991 if (ifindex
== bss
->ifindex
)
2995 wpa_printf(MSG_DEBUG
, "nl80211: get_bss(%d) failed", ifindex
);
3000 static void add_ifidx(struct wpa_driver_nl80211_data
*drv
, int ifidx
)
3005 wpa_printf(MSG_DEBUG
, "nl80211: Add own interface ifindex %d",
3007 for (i
= 0; i
< drv
->num_if_indices
; i
++) {
3008 if (drv
->if_indices
[i
] == 0) {
3009 drv
->if_indices
[i
] = ifidx
;
3014 if (drv
->if_indices
!= drv
->default_if_indices
)
3015 old
= drv
->if_indices
;
3019 drv
->if_indices
= realloc(old
,
3020 sizeof(int) * (drv
->num_if_indices
+ 1));
3021 if (!drv
->if_indices
) {
3023 drv
->if_indices
= drv
->default_if_indices
;
3025 drv
->if_indices
= old
;
3026 wpa_printf(MSG_ERROR
, "Failed to reallocate memory for "
3028 wpa_printf(MSG_ERROR
, "Ignoring EAPOL on interface %d", ifidx
);
3031 drv
->if_indices
[drv
->num_if_indices
] = ifidx
;
3032 drv
->num_if_indices
++;
3036 static void del_ifidx(struct wpa_driver_nl80211_data
*drv
, int ifidx
)
3040 for (i
= 0; i
< drv
->num_if_indices
; i
++) {
3041 if (drv
->if_indices
[i
] == ifidx
) {
3042 drv
->if_indices
[i
] = 0;
3049 static int have_ifidx(struct wpa_driver_nl80211_data
*drv
, int ifidx
)
3053 for (i
= 0; i
< drv
->num_if_indices
; i
++)
3054 if (drv
->if_indices
[i
] == ifidx
)
3061 static int i802_set_key(const char *iface
, void *priv
, wpa_alg alg
,
3062 const u8
*addr
, int key_idx
, int set_tx
, const u8
*seq
,
3063 size_t seq_len
, const u8
*key
, size_t key_len
)
3065 struct wpa_driver_nl80211_data
*drv
= priv
;
3066 return nl_set_encr(if_nametoindex(iface
), drv
, alg
, addr
, key_idx
,
3067 set_tx
, seq
, seq_len
, key
, key_len
);
3071 static inline int min_int(int a
, int b
)
3079 static int get_key_handler(struct nl_msg
*msg
, void *arg
)
3081 struct nlattr
*tb
[NL80211_ATTR_MAX
+ 1];
3082 struct genlmsghdr
*gnlh
= nlmsg_data(nlmsg_hdr(msg
));
3084 nla_parse(tb
, NL80211_ATTR_MAX
, genlmsg_attrdata(gnlh
, 0),
3085 genlmsg_attrlen(gnlh
, 0), NULL
);
3088 * TODO: validate the key index and mac address!
3089 * Otherwise, there's a race condition as soon as
3090 * the kernel starts sending key notifications.
3093 if (tb
[NL80211_ATTR_KEY_SEQ
])
3094 memcpy(arg
, nla_data(tb
[NL80211_ATTR_KEY_SEQ
]),
3095 min_int(nla_len(tb
[NL80211_ATTR_KEY_SEQ
]), 6));
3100 static int i802_get_seqnum(const char *iface
, void *priv
, const u8
*addr
,
3103 struct wpa_driver_nl80211_data
*drv
= priv
;
3106 msg
= nlmsg_alloc();
3110 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
3111 0, NL80211_CMD_GET_KEY
, 0);
3114 NLA_PUT(msg
, NL80211_ATTR_MAC
, ETH_ALEN
, addr
);
3115 NLA_PUT_U8(msg
, NL80211_ATTR_KEY_IDX
, idx
);
3116 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, if_nametoindex(iface
));
3120 return send_and_recv_msgs(drv
, msg
, get_key_handler
, seq
);
3126 static int i802_set_rate_sets(void *priv
, int *supp_rates
, int *basic_rates
,
3129 struct wpa_driver_nl80211_data
*drv
= priv
;
3131 u8 rates
[NL80211_MAX_SUPP_RATES
];
3135 msg
= nlmsg_alloc();
3139 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0, 0,
3140 NL80211_CMD_SET_BSS
, 0);
3142 for (i
= 0; i
< NL80211_MAX_SUPP_RATES
&& basic_rates
[i
] >= 0; i
++)
3143 rates
[rates_len
++] = basic_rates
[i
] / 5;
3145 NLA_PUT(msg
, NL80211_ATTR_BSS_BASIC_RATES
, rates_len
, rates
);
3147 /* TODO: multi-BSS support */
3148 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, if_nametoindex(drv
->ifname
));
3150 return send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
3156 /* Set kernel driver on given frequency (MHz) */
3157 static int i802_set_freq(void *priv
, struct hostapd_freq_params
*freq
)
3159 struct wpa_driver_nl80211_data
*drv
= priv
;
3160 return wpa_driver_nl80211_set_freq(drv
, freq
->freq
, freq
->ht_enabled
,
3161 freq
->sec_channel_offset
);
3165 static int i802_set_rts(void *priv
, int rts
)
3170 struct wpa_driver_nl80211_data
*drv
= priv
;
3173 memset(&iwr
, 0, sizeof(iwr
));
3174 os_strlcpy(iwr
.ifr_name
, drv
->ifname
, IFNAMSIZ
);
3175 iwr
.u
.rts
.value
= rts
;
3176 iwr
.u
.rts
.fixed
= 1;
3178 if (ioctl(drv
->ioctl_sock
, SIOCSIWRTS
, &iwr
) < 0) {
3179 perror("ioctl[SIOCSIWRTS]");
3184 #endif /* NO_WEXT */
3188 static int i802_set_frag(void *priv
, int frag
)
3193 struct wpa_driver_nl80211_data
*drv
= priv
;
3196 memset(&iwr
, 0, sizeof(iwr
));
3197 os_strlcpy(iwr
.ifr_name
, drv
->ifname
, IFNAMSIZ
);
3198 iwr
.u
.frag
.value
= frag
;
3199 iwr
.u
.frag
.fixed
= 1;
3201 if (ioctl(drv
->ioctl_sock
, SIOCSIWFRAG
, &iwr
) < 0) {
3202 perror("ioctl[SIOCSIWFRAG]");
3207 #endif /* NO_WEXT */
3211 static int i802_set_retry(void *priv
, int short_retry
, int long_retry
)
3216 struct wpa_driver_nl80211_data
*drv
= priv
;
3219 memset(&iwr
, 0, sizeof(iwr
));
3220 os_strlcpy(iwr
.ifr_name
, drv
->ifname
, IFNAMSIZ
);
3222 iwr
.u
.retry
.value
= short_retry
;
3223 iwr
.u
.retry
.flags
= IW_RETRY_LIMIT
| IW_RETRY_MIN
;
3224 if (ioctl(drv
->ioctl_sock
, SIOCSIWRETRY
, &iwr
) < 0) {
3225 perror("ioctl[SIOCSIWRETRY(short)]");
3229 iwr
.u
.retry
.value
= long_retry
;
3230 iwr
.u
.retry
.flags
= IW_RETRY_LIMIT
| IW_RETRY_MAX
;
3231 if (ioctl(drv
->ioctl_sock
, SIOCSIWRETRY
, &iwr
) < 0) {
3232 perror("ioctl[SIOCSIWRETRY(long)]");
3237 #endif /* NO_WEXT */
3241 static int i802_flush(void *priv
)
3243 struct wpa_driver_nl80211_data
*drv
= priv
;
3246 msg
= nlmsg_alloc();
3250 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
3251 0, NL80211_CMD_DEL_STATION
, 0);
3254 * XXX: FIX! this needs to flush all VLANs too
3256 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
,
3257 if_nametoindex(drv
->ifname
));
3259 return send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
3265 static int get_sta_handler(struct nl_msg
*msg
, void *arg
)
3267 struct nlattr
*tb
[NL80211_ATTR_MAX
+ 1];
3268 struct genlmsghdr
*gnlh
= nlmsg_data(nlmsg_hdr(msg
));
3269 struct hostap_sta_driver_data
*data
= arg
;
3270 struct nlattr
*stats
[NL80211_STA_INFO_MAX
+ 1];
3271 static struct nla_policy stats_policy
[NL80211_STA_INFO_MAX
+ 1] = {
3272 [NL80211_STA_INFO_INACTIVE_TIME
] = { .type
= NLA_U32
},
3273 [NL80211_STA_INFO_RX_BYTES
] = { .type
= NLA_U32
},
3274 [NL80211_STA_INFO_TX_BYTES
] = { .type
= NLA_U32
},
3275 [NL80211_STA_INFO_RX_PACKETS
] = { .type
= NLA_U32
},
3276 [NL80211_STA_INFO_TX_PACKETS
] = { .type
= NLA_U32
},
3279 nla_parse(tb
, NL80211_ATTR_MAX
, genlmsg_attrdata(gnlh
, 0),
3280 genlmsg_attrlen(gnlh
, 0), NULL
);
3283 * TODO: validate the interface and mac address!
3284 * Otherwise, there's a race condition as soon as
3285 * the kernel starts sending station notifications.
3288 if (!tb
[NL80211_ATTR_STA_INFO
]) {
3289 wpa_printf(MSG_DEBUG
, "sta stats missing!");
3292 if (nla_parse_nested(stats
, NL80211_STA_INFO_MAX
,
3293 tb
[NL80211_ATTR_STA_INFO
],
3295 wpa_printf(MSG_DEBUG
, "failed to parse nested attributes!");
3299 if (stats
[NL80211_STA_INFO_INACTIVE_TIME
])
3300 data
->inactive_msec
=
3301 nla_get_u32(stats
[NL80211_STA_INFO_INACTIVE_TIME
]);
3302 if (stats
[NL80211_STA_INFO_RX_BYTES
])
3303 data
->rx_bytes
= nla_get_u32(stats
[NL80211_STA_INFO_RX_BYTES
]);
3304 if (stats
[NL80211_STA_INFO_TX_BYTES
])
3305 data
->tx_bytes
= nla_get_u32(stats
[NL80211_STA_INFO_TX_BYTES
]);
3306 if (stats
[NL80211_STA_INFO_RX_PACKETS
])
3308 nla_get_u32(stats
[NL80211_STA_INFO_RX_PACKETS
]);
3309 if (stats
[NL80211_STA_INFO_TX_PACKETS
])
3311 nla_get_u32(stats
[NL80211_STA_INFO_TX_PACKETS
]);
3316 static int i802_read_sta_data(void *priv
, struct hostap_sta_driver_data
*data
,
3319 struct wpa_driver_nl80211_data
*drv
= priv
;
3322 os_memset(data
, 0, sizeof(*data
));
3323 msg
= nlmsg_alloc();
3327 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
3328 0, NL80211_CMD_GET_STATION
, 0);
3330 NLA_PUT(msg
, NL80211_ATTR_MAC
, ETH_ALEN
, addr
);
3331 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, if_nametoindex(drv
->ifname
));
3333 return send_and_recv_msgs(drv
, msg
, get_sta_handler
, data
);
3339 static int i802_send_eapol(void *priv
, const u8
*addr
, const u8
*data
,
3340 size_t data_len
, int encrypt
, const u8
*own_addr
)
3342 struct wpa_driver_nl80211_data
*drv
= priv
;
3343 struct ieee80211_hdr
*hdr
;
3348 int qos
= sta
->flags
& WLAN_STA_WME
;
3353 len
= sizeof(*hdr
) + (qos
? 2 : 0) + sizeof(rfc1042_header
) + 2 +
3355 hdr
= os_zalloc(len
);
3357 printf("malloc() failed for i802_send_data(len=%lu)\n",
3358 (unsigned long) len
);
3362 hdr
->frame_control
=
3363 IEEE80211_FC(WLAN_FC_TYPE_DATA
, WLAN_FC_STYPE_DATA
);
3364 hdr
->frame_control
|= host_to_le16(WLAN_FC_FROMDS
);
3366 hdr
->frame_control
|= host_to_le16(WLAN_FC_ISWEP
);
3367 #if 0 /* To be enabled if qos determination is added above */
3369 hdr
->frame_control
|=
3370 host_to_le16(WLAN_FC_STYPE_QOS_DATA
<< 4);
3374 memcpy(hdr
->IEEE80211_DA_FROMDS
, addr
, ETH_ALEN
);
3375 memcpy(hdr
->IEEE80211_BSSID_FROMDS
, own_addr
, ETH_ALEN
);
3376 memcpy(hdr
->IEEE80211_SA_FROMDS
, own_addr
, ETH_ALEN
);
3377 pos
= (u8
*) (hdr
+ 1);
3379 #if 0 /* To be enabled if qos determination is added above */
3381 /* add an empty QoS header if needed */
3388 memcpy(pos
, rfc1042_header
, sizeof(rfc1042_header
));
3389 pos
+= sizeof(rfc1042_header
);
3390 WPA_PUT_BE16(pos
, ETH_P_PAE
);
3392 memcpy(pos
, data
, data_len
);
3394 res
= wpa_driver_nl80211_send_frame(drv
, (u8
*) hdr
, len
, encrypt
);
3396 wpa_printf(MSG_ERROR
, "i802_send_eapol - packet len: %lu - "
3398 (unsigned long) len
, errno
, strerror(errno
));
3406 static int i802_sta_add(const char *ifname
, void *priv
,
3407 struct hostapd_sta_add_params
*params
)
3409 struct wpa_driver_nl80211_data
*drv
= priv
;
3413 msg
= nlmsg_alloc();
3417 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
3418 0, NL80211_CMD_NEW_STATION
, 0);
3420 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
,
3421 if_nametoindex(drv
->ifname
));
3422 NLA_PUT(msg
, NL80211_ATTR_MAC
, ETH_ALEN
, params
->addr
);
3423 NLA_PUT_U16(msg
, NL80211_ATTR_STA_AID
, params
->aid
);
3424 NLA_PUT(msg
, NL80211_ATTR_STA_SUPPORTED_RATES
, params
->supp_rates_len
,
3425 params
->supp_rates
);
3426 NLA_PUT_U16(msg
, NL80211_ATTR_STA_LISTEN_INTERVAL
,
3427 params
->listen_interval
);
3429 #ifdef CONFIG_IEEE80211N
3430 if (params
->ht_capabilities
) {
3431 NLA_PUT(msg
, NL80211_ATTR_HT_CAPABILITY
,
3432 params
->ht_capabilities
->length
,
3433 ¶ms
->ht_capabilities
->data
);
3435 #endif /* CONFIG_IEEE80211N */
3437 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
3439 wpa_printf(MSG_DEBUG
, "nl80211: NL80211_CMD_NEW_STATION "
3440 "result: %d (%s)", ret
, strerror(-ret
));
3448 static int i802_sta_remove(void *priv
, const u8
*addr
)
3450 struct wpa_driver_nl80211_data
*drv
= priv
;
3454 msg
= nlmsg_alloc();
3458 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
3459 0, NL80211_CMD_DEL_STATION
, 0);
3461 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
,
3462 if_nametoindex(drv
->ifname
));
3463 NLA_PUT(msg
, NL80211_ATTR_MAC
, ETH_ALEN
, addr
);
3465 ret
= send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
3474 static int i802_sta_set_flags(void *priv
, const u8
*addr
,
3475 int total_flags
, int flags_or
, int flags_and
)
3477 struct wpa_driver_nl80211_data
*drv
= priv
;
3478 struct nl_msg
*msg
, *flags
= NULL
;
3480 msg
= nlmsg_alloc();
3484 flags
= nlmsg_alloc();
3490 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
3491 0, NL80211_CMD_SET_STATION
, 0);
3493 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
,
3494 if_nametoindex(drv
->ifname
));
3495 NLA_PUT(msg
, NL80211_ATTR_MAC
, ETH_ALEN
, addr
);
3497 if (total_flags
& WLAN_STA_AUTHORIZED
)
3498 NLA_PUT_FLAG(flags
, NL80211_STA_FLAG_AUTHORIZED
);
3500 if (total_flags
& WLAN_STA_WMM
)
3501 NLA_PUT_FLAG(flags
, NL80211_STA_FLAG_WME
);
3503 if (total_flags
& WLAN_STA_SHORT_PREAMBLE
)
3504 NLA_PUT_FLAG(flags
, NL80211_STA_FLAG_SHORT_PREAMBLE
);
3506 if (total_flags
& WLAN_STA_MFP
)
3507 NLA_PUT_FLAG(flags
, NL80211_STA_FLAG_MFP
);
3509 if (nla_put_nested(msg
, NL80211_ATTR_STA_FLAGS
, flags
))
3510 goto nla_put_failure
;
3514 return send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
3521 static int i802_set_tx_queue_params(void *priv
, int queue
, int aifs
,
3522 int cw_min
, int cw_max
, int burst_time
)
3524 struct wpa_driver_nl80211_data
*drv
= priv
;
3526 struct nlattr
*txq
, *params
;
3528 msg
= nlmsg_alloc();
3532 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
3533 0, NL80211_CMD_SET_WIPHY
, 0);
3535 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, if_nametoindex(drv
->ifname
));
3537 txq
= nla_nest_start(msg
, NL80211_ATTR_WIPHY_TXQ_PARAMS
);
3539 goto nla_put_failure
;
3541 /* We are only sending parameters for a single TXQ at a time */
3542 params
= nla_nest_start(msg
, 1);
3544 goto nla_put_failure
;
3546 NLA_PUT_U8(msg
, NL80211_TXQ_ATTR_QUEUE
, queue
);
3547 /* Burst time is configured in units of 0.1 msec and TXOP parameter in
3548 * 32 usec, so need to convert the value here. */
3549 NLA_PUT_U16(msg
, NL80211_TXQ_ATTR_TXOP
, (burst_time
* 100 + 16) / 32);
3550 NLA_PUT_U16(msg
, NL80211_TXQ_ATTR_CWMIN
, cw_min
);
3551 NLA_PUT_U16(msg
, NL80211_TXQ_ATTR_CWMAX
, cw_max
);
3552 NLA_PUT_U8(msg
, NL80211_TXQ_ATTR_AIFS
, aifs
);
3554 nla_nest_end(msg
, params
);
3556 nla_nest_end(msg
, txq
);
3558 if (send_and_recv_msgs(drv
, msg
, NULL
, NULL
) == 0)
3565 static int i802_bss_add(void *priv
, const char *ifname
, const u8
*bssid
)
3567 struct wpa_driver_nl80211_data
*drv
= priv
;
3569 struct i802_bss
*bss
;
3571 bss
= os_zalloc(sizeof(*bss
));
3575 ifidx
= nl80211_create_iface(priv
, ifname
, NL80211_IFTYPE_AP
, bssid
);
3580 bss
->ifindex
= ifidx
;
3581 if (hostapd_set_iface_flags(priv
, ifname
, 1)) {
3582 nl80211_remove_iface(priv
, ifidx
);
3586 bss
->next
= drv
->bss
.next
;
3587 drv
->bss
.next
= bss
;
3592 static int i802_bss_remove(void *priv
, const char *ifname
)
3594 struct wpa_driver_nl80211_data
*drv
= priv
;
3595 struct i802_bss
*bss
, *prev
;
3596 int ifindex
= if_nametoindex(ifname
);
3597 nl80211_remove_iface(priv
, ifindex
);
3599 bss
= drv
->bss
.next
;
3601 if (ifindex
== bss
->ifindex
) {
3602 prev
->next
= bss
->next
;
3613 static int i802_set_beacon(const char *iface
, void *priv
,
3614 const u8
*head
, size_t head_len
,
3615 const u8
*tail
, size_t tail_len
, int dtim_period
)
3617 return wpa_driver_nl80211_set_beacon_iface(if_nametoindex(iface
), priv
,
3624 static int i802_del_beacon(struct wpa_driver_nl80211_data
*drv
)
3628 msg
= nlmsg_alloc();
3632 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
3633 0, NL80211_CMD_DEL_BEACON
, 0);
3634 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, if_nametoindex(drv
->ifname
));
3636 return send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
3642 static int i802_set_bss(void *priv
, int cts
, int preamble
, int slot
)
3644 struct wpa_driver_nl80211_data
*drv
= priv
;
3647 msg
= nlmsg_alloc();
3651 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0, 0,
3652 NL80211_CMD_SET_BSS
, 0);
3655 NLA_PUT_U8(msg
, NL80211_ATTR_BSS_CTS_PROT
, cts
);
3657 NLA_PUT_U8(msg
, NL80211_ATTR_BSS_SHORT_PREAMBLE
, preamble
);
3659 NLA_PUT_U8(msg
, NL80211_ATTR_BSS_SHORT_SLOT_TIME
, slot
);
3661 /* TODO: multi-BSS support */
3662 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
, if_nametoindex(drv
->ifname
));
3664 return send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
3670 static int i802_set_cts_protect(void *priv
, int value
)
3672 return i802_set_bss(priv
, value
, -1, -1);
3676 static int i802_set_preamble(void *priv
, int value
)
3678 return i802_set_bss(priv
, -1, value
, -1);
3682 static int i802_set_short_slot_time(void *priv
, int value
)
3684 return i802_set_bss(priv
, -1, -1, value
);
3688 static enum nl80211_iftype
i802_if_type(enum hostapd_driver_if_type type
)
3691 case HOSTAPD_IF_VLAN
:
3692 return NL80211_IFTYPE_AP_VLAN
;
3698 static int i802_if_add(const char *iface
, void *priv
,
3699 enum hostapd_driver_if_type type
, char *ifname
,
3702 if (nl80211_create_iface(priv
, ifname
, i802_if_type(type
), addr
) < 0)
3708 static int i802_if_update(void *priv
, enum hostapd_driver_if_type type
,
3709 char *ifname
, const u8
*addr
)
3711 /* unused at the moment */
3716 static int i802_if_remove(void *priv
, enum hostapd_driver_if_type type
,
3717 const char *ifname
, const u8
*addr
)
3719 nl80211_remove_iface(priv
, if_nametoindex(ifname
));
3724 static int i802_set_sta_vlan(void *priv
, const u8
*addr
,
3725 const char *ifname
, int vlan_id
)
3727 struct wpa_driver_nl80211_data
*drv
= priv
;
3730 msg
= nlmsg_alloc();
3734 genlmsg_put(msg
, 0, 0, genl_family_get_id(drv
->nl80211
), 0,
3735 0, NL80211_CMD_SET_STATION
, 0);
3737 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
,
3738 if_nametoindex(drv
->ifname
));
3739 NLA_PUT(msg
, NL80211_ATTR_MAC
, ETH_ALEN
, addr
);
3740 NLA_PUT_U32(msg
, NL80211_ATTR_IFINDEX
,
3741 if_nametoindex(ifname
));
3743 return send_and_recv_msgs(drv
, msg
, NULL
, NULL
);
3749 static void handle_eapol(int sock
, void *eloop_ctx
, void *sock_ctx
)
3751 struct wpa_driver_nl80211_data
*drv
= eloop_ctx
;
3752 struct sockaddr_ll lladdr
;
3753 unsigned char buf
[3000];
3755 socklen_t fromlen
= sizeof(lladdr
);
3757 len
= recvfrom(sock
, buf
, sizeof(buf
), 0,
3758 (struct sockaddr
*)&lladdr
, &fromlen
);
3764 if (have_ifidx(drv
, lladdr
.sll_ifindex
)) {
3766 ctx
= hostapd_sta_get_bss(drv
->ctx
, lladdr
.sll_addr
);
3769 hostapd_eapol_receive(ctx
, lladdr
.sll_addr
, buf
, len
);
3774 static int i802_get_inact_sec(void *priv
, const u8
*addr
)
3776 struct hostap_sta_driver_data data
;
3779 data
.inactive_msec
= (unsigned long) -1;
3780 ret
= i802_read_sta_data(priv
, &data
, addr
);
3781 if (ret
|| data
.inactive_msec
== (unsigned long) -1)
3783 return data
.inactive_msec
/ 1000;
3787 static int i802_sta_clear_stats(void *priv
, const u8
*addr
)
3796 static int i802_sta_deauth(void *priv
, const u8
*own_addr
, const u8
*addr
,
3799 struct wpa_driver_nl80211_data
*drv
= priv
;
3800 struct ieee80211_mgmt mgmt
;
3802 memset(&mgmt
, 0, sizeof(mgmt
));
3803 mgmt
.frame_control
= IEEE80211_FC(WLAN_FC_TYPE_MGMT
,
3804 WLAN_FC_STYPE_DEAUTH
);
3805 memcpy(mgmt
.da
, addr
, ETH_ALEN
);
3806 memcpy(mgmt
.sa
, own_addr
, ETH_ALEN
);
3807 memcpy(mgmt
.bssid
, own_addr
, ETH_ALEN
);
3808 mgmt
.u
.deauth
.reason_code
= host_to_le16(reason
);
3809 return wpa_driver_nl80211_send_mlme(drv
, (u8
*) &mgmt
,
3811 sizeof(mgmt
.u
.deauth
));
3815 static int i802_sta_disassoc(void *priv
, const u8
*own_addr
, const u8
*addr
,
3818 struct wpa_driver_nl80211_data
*drv
= priv
;
3819 struct ieee80211_mgmt mgmt
;
3821 memset(&mgmt
, 0, sizeof(mgmt
));
3822 mgmt
.frame_control
= IEEE80211_FC(WLAN_FC_TYPE_MGMT
,
3823 WLAN_FC_STYPE_DISASSOC
);
3824 memcpy(mgmt
.da
, addr
, ETH_ALEN
);
3825 memcpy(mgmt
.sa
, own_addr
, ETH_ALEN
);
3826 memcpy(mgmt
.bssid
, own_addr
, ETH_ALEN
);
3827 mgmt
.u
.disassoc
.reason_code
= host_to_le16(reason
);
3828 return wpa_driver_nl80211_send_mlme(drv
, (u8
*) &mgmt
,
3830 sizeof(mgmt
.u
.disassoc
));
3834 static void *i802_init(struct hostapd_data
*hapd
,
3835 struct wpa_init_params
*params
)
3837 struct wpa_driver_nl80211_data
*drv
;
3840 drv
= wpa_driver_nl80211_init(hapd
, params
->ifname
);
3844 drv
->bss
.ifindex
= drv
->ifindex
;
3846 drv
->num_if_indices
= sizeof(drv
->default_if_indices
) / sizeof(int);
3847 drv
->if_indices
= drv
->default_if_indices
;
3848 for (i
= 0; i
< params
->num_bridge
; i
++) {
3849 if (params
->bridge
[i
])
3850 add_ifidx(drv
, if_nametoindex(params
->bridge
[i
]));
3853 /* start listening for EAPOL on the default AP interface */
3854 add_ifidx(drv
, drv
->ifindex
);
3856 if (hostapd_set_iface_flags(drv
, drv
->ifname
, 0))
3859 if (params
->bssid
&& set_ifhwaddr(drv
, drv
->ifname
, params
->bssid
))
3862 /* Initialise a monitor interface */
3863 if (nl80211_create_monitor_interface(drv
))
3866 if (nl80211_set_mode(drv
, drv
->ifindex
, NL80211_IFTYPE_AP
)) {
3867 wpa_printf(MSG_ERROR
, "nl80211: Failed to set interface %s "
3868 "into AP mode", drv
->ifname
);
3872 if (hostapd_set_iface_flags(drv
, drv
->ifname
, 1))
3875 drv
->eapol_sock
= socket(PF_PACKET
, SOCK_DGRAM
, htons(ETH_P_PAE
));
3876 if (drv
->eapol_sock
< 0) {
3877 perror("socket(PF_PACKET, SOCK_DGRAM, ETH_P_PAE)");
3881 if (eloop_register_read_sock(drv
->eapol_sock
, handle_eapol
, drv
, NULL
))
3883 printf("Could not register read socket for eapol\n");
3887 if (get_ifhwaddr(drv
, drv
->ifname
, params
->own_addr
))
3893 if (drv
->monitor_ifidx
>= 0)
3894 nl80211_remove_iface(drv
, drv
->monitor_ifidx
);
3895 if (drv
->ioctl_sock
>= 0)
3896 close(drv
->ioctl_sock
);
3898 genl_family_put(drv
->nl80211
);
3899 nl_cache_free(drv
->nl_cache
);
3900 nl_handle_destroy(drv
->nl_handle
);
3901 nl_cb_put(drv
->nl_cb
);
3908 static void i802_deinit(void *priv
)
3910 wpa_driver_nl80211_deinit(priv
);
3913 #endif /* HOSTAPD */
3916 const struct wpa_driver_ops wpa_driver_nl80211_ops
= {
3918 .desc
= "Linux nl80211/cfg80211",
3920 .get_bssid
= wpa_driver_nl80211_get_bssid
,
3921 .get_ssid
= wpa_driver_nl80211_get_ssid
,
3922 .set_key
= wpa_driver_nl80211_set_key
,
3923 #endif /* HOSTAPD */
3924 .scan2
= wpa_driver_nl80211_scan
,
3925 .get_scan_results2
= wpa_driver_nl80211_get_scan_results
,
3927 .deauthenticate
= wpa_driver_nl80211_deauthenticate
,
3928 .disassociate
= wpa_driver_nl80211_disassociate
,
3929 .authenticate
= wpa_driver_nl80211_authenticate
,
3930 .associate
= wpa_driver_nl80211_associate
,
3931 .init
= wpa_driver_nl80211_init
,
3932 .deinit
= wpa_driver_nl80211_deinit
,
3933 .get_capa
= wpa_driver_nl80211_get_capa
,
3934 .set_operstate
= wpa_driver_nl80211_set_operstate
,
3935 #endif /* HOSTAPD */
3936 .set_country
= wpa_driver_nl80211_set_country
,
3937 .set_mode
= wpa_driver_nl80211_set_mode
,
3939 .set_beacon
= wpa_driver_nl80211_set_beacon
,
3940 #endif /* CONFIG_AP */
3941 #if defined(CONFIG_AP) || defined(HOSTAPD)
3942 .send_mlme
= wpa_driver_nl80211_send_mlme
,
3943 .set_beacon_int
= wpa_driver_nl80211_set_beacon_int
,
3944 .get_hw_feature_data
= wpa_driver_nl80211_get_hw_feature_data
,
3945 #endif /* CONFIG_AP || HOSTAPD */
3947 .hapd_init
= i802_init
,
3948 .hapd_deinit
= i802_deinit
,
3949 .hapd_set_key
= i802_set_key
,
3950 .get_seqnum
= i802_get_seqnum
,
3951 .flush
= i802_flush
,
3952 .read_sta_data
= i802_read_sta_data
,
3953 .hapd_send_eapol
= i802_send_eapol
,
3954 .sta_set_flags
= i802_sta_set_flags
,
3955 .sta_deauth
= i802_sta_deauth
,
3956 .sta_disassoc
= i802_sta_disassoc
,
3957 .sta_remove
= i802_sta_remove
,
3958 .sta_add
= i802_sta_add
,
3959 .get_inact_sec
= i802_get_inact_sec
,
3960 .sta_clear_stats
= i802_sta_clear_stats
,
3961 .set_freq
= i802_set_freq
,
3962 .set_rts
= i802_set_rts
,
3963 .set_frag
= i802_set_frag
,
3964 .set_retry
= i802_set_retry
,
3965 .set_rate_sets
= i802_set_rate_sets
,
3966 .hapd_set_beacon
= i802_set_beacon
,
3967 .set_cts_protect
= i802_set_cts_protect
,
3968 .set_preamble
= i802_set_preamble
,
3969 .set_short_slot_time
= i802_set_short_slot_time
,
3970 .set_tx_queue_params
= i802_set_tx_queue_params
,
3971 .bss_add
= i802_bss_add
,
3972 .bss_remove
= i802_bss_remove
,
3973 .if_add
= i802_if_add
,
3974 .if_update
= i802_if_update
,
3975 .if_remove
= i802_if_remove
,
3976 .set_sta_vlan
= i802_set_sta_vlan
,
3977 #endif /* HOSTAPD */