]>
Commit | Line | Data |
---|---|---|
f1a48710 JM |
1 | /* |
2 | * WPA Supplicant - Basic AP mode support routines | |
3 | * Copyright (c) 2003-2009, Jouni Malinen <j@w1.fi> | |
4 | * Copyright (c) 2009, Atheros Communications | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License version 2 as | |
8 | * published by the Free Software Foundation. | |
9 | * | |
10 | * Alternatively, this software may be distributed under the terms of BSD | |
11 | * license. | |
12 | * | |
13 | * See README and COPYING for more details. | |
14 | */ | |
15 | ||
16 | #include "includes.h" | |
17 | ||
18 | #include "common.h" | |
19 | #include "../hostapd/hostapd.h" | |
089757c6 | 20 | #include "../hostapd/config.h" |
fe6bdb77 | 21 | #ifdef NEED_AP_MLME |
0915d02c | 22 | #include "../hostapd/ieee802_11.h" |
fe6bdb77 | 23 | #endif /* NEED_AP_MLME */ |
3ec97afe | 24 | #include "../hostapd/wps_hostapd.h" |
e653b622 | 25 | #include "../hostapd/ctrl_iface_ap.h" |
f1a48710 JM |
26 | #include "eap_common/eap_defs.h" |
27 | #include "eap_server/eap_methods.h" | |
28 | #include "eap_common/eap_wsc_common.h" | |
3ec97afe | 29 | #include "wps/wps.h" |
1f1b62a0 | 30 | #include "config_ssid.h" |
094393b1 | 31 | #include "config.h" |
1f1b62a0 | 32 | #include "wpa_supplicant_i.h" |
2d5b792d JM |
33 | #include "driver_i.h" |
34 | #include "ap.h" | |
f1a48710 JM |
35 | |
36 | ||
9969e5a4 JM |
37 | struct hapd_interfaces { |
38 | size_t count; | |
39 | struct hostapd_iface **iface; | |
40 | }; | |
41 | ||
42 | ||
43 | int hostapd_for_each_interface(struct hapd_interfaces *interfaces, | |
44 | int (*cb)(struct hostapd_iface *iface, | |
2d5b792d | 45 | void *ctx), void *ctx) |
f1a48710 JM |
46 | { |
47 | /* TODO */ | |
2d5b792d | 48 | return 0; |
f1a48710 JM |
49 | } |
50 | ||
51 | ||
2d5b792d | 52 | int hostapd_ctrl_iface_init(struct hostapd_data *hapd) |
f1a48710 | 53 | { |
f1a48710 JM |
54 | return 0; |
55 | } | |
56 | ||
57 | ||
2d5b792d | 58 | void hostapd_ctrl_iface_deinit(struct hostapd_data *hapd) |
f1a48710 | 59 | { |
2d5b792d | 60 | } |
f1a48710 | 61 | |
f1a48710 | 62 | |
2d5b792d JM |
63 | struct ap_driver_data { |
64 | struct hostapd_data *hapd; | |
65 | }; | |
f1a48710 | 66 | |
2d5b792d | 67 | |
92f475b4 JM |
68 | static void * ap_driver_init(struct hostapd_data *hapd, |
69 | struct wpa_init_params *params) | |
2d5b792d JM |
70 | { |
71 | struct ap_driver_data *drv; | |
0892aaaf | 72 | struct wpa_supplicant *wpa_s = hapd->iface->owner; |
2d5b792d JM |
73 | |
74 | drv = os_zalloc(sizeof(struct ap_driver_data)); | |
75 | if (drv == NULL) { | |
76 | wpa_printf(MSG_ERROR, "Could not allocate memory for AP " | |
77 | "driver data"); | |
78 | return NULL; | |
79 | } | |
80 | drv->hapd = hapd; | |
0892aaaf | 81 | os_memcpy(hapd->own_addr, wpa_s->own_addr, ETH_ALEN); |
2d5b792d JM |
82 | |
83 | return drv; | |
f1a48710 JM |
84 | } |
85 | ||
86 | ||
2d5b792d | 87 | static void ap_driver_deinit(void *priv) |
f1a48710 | 88 | { |
2d5b792d JM |
89 | struct ap_driver_data *drv = priv; |
90 | ||
91 | os_free(drv); | |
f1a48710 JM |
92 | } |
93 | ||
94 | ||
2d5b792d JM |
95 | static int ap_driver_send_ether(void *priv, const u8 *dst, const u8 *src, |
96 | u16 proto, const u8 *data, size_t data_len) | |
f1a48710 | 97 | { |
0f2b2c19 JM |
98 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); |
99 | return -1; | |
100 | } | |
101 | ||
102 | ||
103 | static int ap_driver_set_key(const char *iface, void *priv, wpa_alg alg, | |
104 | const u8 *addr, int key_idx, int set_tx, | |
105 | const u8 *seq, size_t seq_len, const u8 *key, | |
106 | size_t key_len) | |
107 | { | |
108 | struct ap_driver_data *drv = priv; | |
109 | struct wpa_supplicant *wpa_s = drv->hapd->iface->owner; | |
110 | return wpa_drv_set_key(wpa_s, alg, addr, key_idx, set_tx, seq, seq_len, | |
111 | key, key_len); | |
112 | } | |
113 | ||
114 | ||
115 | static int ap_driver_get_seqnum(const char *iface, void *priv, const u8 *addr, | |
116 | int idx, u8 *seq) | |
117 | { | |
118 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
119 | return -1; | |
120 | } | |
121 | ||
122 | ||
123 | static int ap_driver_flush(void *priv) | |
124 | { | |
125 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
126 | return -1; | |
127 | } | |
128 | ||
129 | ||
130 | static int ap_driver_read_sta_data(void *priv, | |
131 | struct hostap_sta_driver_data *data, | |
132 | const u8 *addr) | |
133 | { | |
134 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
135 | return -1; | |
136 | } | |
137 | ||
138 | ||
139 | static int ap_driver_sta_set_flags(void *priv, const u8 *addr, int total_flags, | |
140 | int flags_or, int flags_and) | |
141 | { | |
a8d6ffa4 JM |
142 | struct ap_driver_data *drv = priv; |
143 | struct wpa_supplicant *wpa_s = drv->hapd->iface->owner; | |
144 | return wpa_drv_sta_set_flags(wpa_s, addr, total_flags, flags_or, | |
145 | flags_and); | |
0f2b2c19 JM |
146 | } |
147 | ||
148 | ||
be301e56 JM |
149 | static int ap_driver_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr, |
150 | int reason) | |
0f2b2c19 JM |
151 | { |
152 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
153 | return -1; | |
154 | } | |
155 | ||
156 | ||
be301e56 JM |
157 | static int ap_driver_sta_disassoc(void *priv, const u8 *own_addr, |
158 | const u8 *addr, int reason) | |
0f2b2c19 JM |
159 | { |
160 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
161 | return -1; | |
162 | } | |
163 | ||
164 | ||
165 | static int ap_driver_sta_remove(void *priv, const u8 *addr) | |
166 | { | |
0f4e8b4f JM |
167 | struct ap_driver_data *drv = priv; |
168 | struct wpa_supplicant *wpa_s = drv->hapd->iface->owner; | |
169 | return wpa_drv_sta_remove(wpa_s, addr); | |
0f2b2c19 JM |
170 | } |
171 | ||
172 | ||
be301e56 | 173 | static int ap_driver_send_mlme(void *priv, const u8 *data, size_t len) |
0f2b2c19 | 174 | { |
2c2010ac JM |
175 | struct ap_driver_data *drv = priv; |
176 | struct wpa_supplicant *wpa_s = drv->hapd->iface->owner; | |
177 | return wpa_drv_send_mlme(wpa_s, data, len); | |
0f2b2c19 JM |
178 | } |
179 | ||
180 | ||
181 | static int ap_driver_sta_add(const char *ifname, void *priv, | |
182 | struct hostapd_sta_add_params *params) | |
183 | { | |
0f4e8b4f JM |
184 | struct ap_driver_data *drv = priv; |
185 | struct wpa_supplicant *wpa_s = drv->hapd->iface->owner; | |
186 | return wpa_drv_sta_add(wpa_s, params); | |
0f2b2c19 JM |
187 | } |
188 | ||
189 | ||
190 | static int ap_driver_get_inact_sec(void *priv, const u8 *addr) | |
191 | { | |
192 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
193 | return -1; | |
194 | } | |
195 | ||
196 | ||
197 | static int ap_driver_set_freq(void *priv, struct hostapd_freq_params *freq) | |
198 | { | |
199 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
f1a48710 JM |
200 | return 0; |
201 | } | |
202 | ||
203 | ||
0f2b2c19 | 204 | static int ap_driver_set_beacon(const char *iface, void *priv, |
d2440ba0 JM |
205 | const u8 *head, size_t head_len, |
206 | const u8 *tail, size_t tail_len, | |
5d674872 | 207 | int dtim_period, int beacon_int) |
0f2b2c19 | 208 | { |
d2440ba0 JM |
209 | struct ap_driver_data *drv = priv; |
210 | struct wpa_supplicant *wpa_s = drv->hapd->iface->owner; | |
211 | return wpa_drv_set_beacon(wpa_s, head, head_len, tail, tail_len, | |
5d674872 | 212 | dtim_period, beacon_int); |
0f2b2c19 JM |
213 | } |
214 | ||
215 | ||
216 | static int ap_driver_set_cts_protect(void *priv, int value) | |
217 | { | |
218 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
219 | return -1; | |
220 | } | |
221 | ||
222 | ||
223 | static int ap_driver_set_preamble(void *priv, int value) | |
224 | { | |
225 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
226 | return -1; | |
227 | } | |
228 | ||
229 | ||
230 | static int ap_driver_set_short_slot_time(void *priv, int value) | |
231 | { | |
232 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
233 | return -1; | |
234 | } | |
235 | ||
236 | ||
237 | static int ap_driver_set_tx_queue_params(void *priv, int queue, int aifs, | |
238 | int cw_min, int cw_max, | |
239 | int burst_time) | |
240 | { | |
241 | wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__); | |
242 | return -1; | |
243 | } | |
244 | ||
245 | ||
246 | static struct hostapd_hw_modes *ap_driver_get_hw_feature_data(void *priv, | |
247 | u16 *num_modes, | |
248 | u16 *flags) | |
249 | { | |
282d5590 JM |
250 | struct ap_driver_data *drv = priv; |
251 | struct wpa_supplicant *wpa_s = drv->hapd->iface->owner; | |
252 | return wpa_drv_get_hw_feature_data(wpa_s, num_modes, flags); | |
0f2b2c19 JM |
253 | } |
254 | ||
255 | ||
db149ac9 JM |
256 | static int ap_driver_hapd_send_eapol(void *priv, const u8 *addr, |
257 | const u8 *data, size_t data_len, | |
258 | int encrypt, const u8 *own_addr) | |
259 | { | |
260 | struct ap_driver_data *drv = priv; | |
261 | struct wpa_supplicant *wpa_s = drv->hapd->iface->owner; | |
262 | return wpa_drv_hapd_send_eapol(wpa_s, addr, data, data_len, encrypt, | |
263 | own_addr); | |
264 | } | |
265 | ||
266 | ||
c5121837 | 267 | struct wpa_driver_ops ap_driver_ops = |
f1a48710 | 268 | { |
2d5b792d | 269 | .name = "wpa_supplicant", |
c5121837 JM |
270 | .hapd_init = ap_driver_init, |
271 | .hapd_deinit = ap_driver_deinit, | |
2d5b792d | 272 | .send_ether = ap_driver_send_ether, |
331c1208 | 273 | .set_key = ap_driver_set_key, |
0f2b2c19 JM |
274 | .get_seqnum = ap_driver_get_seqnum, |
275 | .flush = ap_driver_flush, | |
276 | .read_sta_data = ap_driver_read_sta_data, | |
277 | .sta_set_flags = ap_driver_sta_set_flags, | |
278 | .sta_deauth = ap_driver_sta_deauth, | |
279 | .sta_disassoc = ap_driver_sta_disassoc, | |
280 | .sta_remove = ap_driver_sta_remove, | |
be301e56 | 281 | .send_mlme = ap_driver_send_mlme, |
0f2b2c19 JM |
282 | .sta_add = ap_driver_sta_add, |
283 | .get_inact_sec = ap_driver_get_inact_sec, | |
284 | .set_freq = ap_driver_set_freq, | |
5d674872 | 285 | .set_beacon = ap_driver_set_beacon, |
0f2b2c19 JM |
286 | .set_cts_protect = ap_driver_set_cts_protect, |
287 | .set_preamble = ap_driver_set_preamble, | |
288 | .set_short_slot_time = ap_driver_set_short_slot_time, | |
289 | .set_tx_queue_params = ap_driver_set_tx_queue_params, | |
c3965310 | 290 | .get_hw_feature_data = ap_driver_get_hw_feature_data, |
db149ac9 | 291 | .hapd_send_eapol = ap_driver_hapd_send_eapol, |
2d5b792d | 292 | }; |
f1a48710 | 293 | |
f1a48710 | 294 | |
c5121837 | 295 | extern struct wpa_driver_ops *wpa_drivers[]; |
07f117ed JM |
296 | |
297 | static int wpa_supplicant_conf_ap(struct wpa_supplicant *wpa_s, | |
298 | struct wpa_ssid *ssid, | |
299 | struct hostapd_config *conf) | |
300 | { | |
301 | struct hostapd_bss_config *bss = &conf->bss[0]; | |
07d9a552 | 302 | int j, pairwise; |
c5121837 JM |
303 | |
304 | for (j = 0; wpa_drivers[j]; j++) { | |
305 | if (os_strcmp("wpa_supplicant", wpa_drivers[j]->name) == 0) { | |
306 | conf->driver = wpa_drivers[j]; | |
307 | break; | |
308 | } | |
309 | } | |
310 | if (conf->driver == NULL) { | |
311 | wpa_printf(MSG_ERROR, "No AP driver ops found"); | |
312 | return -1; | |
313 | } | |
07f117ed JM |
314 | |
315 | os_strlcpy(bss->iface, wpa_s->ifname, sizeof(bss->iface)); | |
316 | ||
317 | if (ssid->frequency == 0) { | |
318 | /* default channel 11 */ | |
319 | conf->hw_mode = HOSTAPD_MODE_IEEE80211G; | |
320 | conf->channel = 11; | |
321 | } else if (ssid->frequency >= 2412 && ssid->frequency <= 2472) { | |
322 | conf->hw_mode = HOSTAPD_MODE_IEEE80211G; | |
323 | conf->channel = (ssid->frequency - 2407) / 5; | |
324 | } else if ((ssid->frequency >= 5180 && ssid->frequency <= 5240) || | |
325 | (ssid->frequency >= 5745 && ssid->frequency <= 5825)) { | |
b615a25e | 326 | conf->hw_mode = HOSTAPD_MODE_IEEE80211A; |
07f117ed JM |
327 | conf->channel = (ssid->frequency - 5000) / 5; |
328 | } else { | |
329 | wpa_printf(MSG_ERROR, "Unsupported AP mode frequency: %d MHz", | |
330 | ssid->frequency); | |
331 | return -1; | |
332 | } | |
333 | ||
334 | /* TODO: enable HT if driver supports it; | |
335 | * drop to 11b if driver does not support 11g */ | |
336 | ||
337 | if (ssid->ssid_len == 0) { | |
338 | wpa_printf(MSG_ERROR, "No SSID configured for AP mode"); | |
339 | return -1; | |
340 | } | |
341 | os_memcpy(bss->ssid.ssid, ssid->ssid, ssid->ssid_len); | |
342 | bss->ssid.ssid[ssid->ssid_len] = '\0'; | |
343 | bss->ssid.ssid_len = ssid->ssid_len; | |
344 | bss->ssid.ssid_set = 1; | |
345 | ||
346 | if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt)) | |
347 | bss->wpa = ssid->proto; | |
348 | bss->wpa_key_mgmt = ssid->key_mgmt; | |
349 | bss->wpa_pairwise = ssid->pairwise_cipher; | |
350 | if (ssid->passphrase) { | |
351 | bss->ssid.wpa_passphrase = os_strdup(ssid->passphrase); | |
07f117ed JM |
352 | } else if (ssid->psk_set) { |
353 | os_free(bss->ssid.wpa_psk); | |
354 | bss->ssid.wpa_psk = os_zalloc(sizeof(struct hostapd_wpa_psk)); | |
355 | if (bss->ssid.wpa_psk == NULL) | |
356 | return -1; | |
357 | os_memcpy(bss->ssid.wpa_psk->psk, ssid->psk, PMK_LEN); | |
358 | bss->ssid.wpa_psk->group = 1; | |
359 | } | |
360 | ||
07d9a552 JM |
361 | /* Select group cipher based on the enabled pairwise cipher suites */ |
362 | pairwise = 0; | |
363 | if (bss->wpa & 1) | |
364 | pairwise |= bss->wpa_pairwise; | |
365 | if (bss->wpa & 2) { | |
366 | if (bss->rsn_pairwise == 0) | |
367 | bss->rsn_pairwise = bss->wpa_pairwise; | |
368 | pairwise |= bss->rsn_pairwise; | |
369 | } | |
370 | if (pairwise & WPA_CIPHER_TKIP) | |
371 | bss->wpa_group = WPA_CIPHER_TKIP; | |
372 | else | |
373 | bss->wpa_group = WPA_CIPHER_CCMP; | |
374 | ||
375 | if (bss->wpa && bss->ieee802_1x) | |
376 | bss->ssid.security_policy = SECURITY_WPA; | |
377 | else if (bss->wpa) | |
378 | bss->ssid.security_policy = SECURITY_WPA_PSK; | |
379 | else if (bss->ieee802_1x) { | |
380 | bss->ssid.security_policy = SECURITY_IEEE_802_1X; | |
381 | bss->ssid.wep.default_len = bss->default_wep_key_len; | |
382 | } else if (bss->ssid.wep.keys_set) | |
383 | bss->ssid.security_policy = SECURITY_STATIC_WEP; | |
384 | else | |
385 | bss->ssid.security_policy = SECURITY_PLAINTEXT; | |
386 | ||
3ec97afe JM |
387 | #ifdef CONFIG_WPS |
388 | /* | |
389 | * Enable WPS by default, but require user interaction to actually use | |
390 | * it. Only the internal Registrar is supported. | |
391 | */ | |
392 | bss->eap_server = 1; | |
393 | bss->wps_state = 2; | |
394 | bss->ap_setup_locked = 1; | |
094393b1 JM |
395 | if (wpa_s->conf->config_methods) |
396 | bss->config_methods = os_strdup(wpa_s->conf->config_methods); | |
397 | if (wpa_s->conf->device_type) | |
398 | bss->device_type = os_strdup(wpa_s->conf->device_type); | |
3ec97afe JM |
399 | #endif /* CONFIG_WPS */ |
400 | ||
07f117ed JM |
401 | return 0; |
402 | } | |
403 | ||
404 | ||
2d5b792d JM |
405 | int wpa_supplicant_create_ap(struct wpa_supplicant *wpa_s, |
406 | struct wpa_ssid *ssid) | |
407 | { | |
408 | struct wpa_driver_associate_params params; | |
409 | struct hostapd_iface *hapd_iface; | |
410 | struct hostapd_config *conf; | |
411 | size_t i; | |
f1a48710 | 412 | |
2d5b792d JM |
413 | if (ssid->ssid == NULL || ssid->ssid_len == 0) { |
414 | wpa_printf(MSG_ERROR, "No SSID configured for AP mode"); | |
415 | return -1; | |
f1a48710 JM |
416 | } |
417 | ||
2d5b792d | 418 | wpa_supplicant_ap_deinit(wpa_s); |
d2440ba0 JM |
419 | |
420 | wpa_printf(MSG_DEBUG, "Setting up AP (SSID='%s')", | |
421 | wpa_ssid_txt(ssid->ssid, ssid->ssid_len)); | |
422 | ||
423 | os_memset(¶ms, 0, sizeof(params)); | |
424 | params.ssid = ssid->ssid; | |
425 | params.ssid_len = ssid->ssid_len; | |
426 | params.mode = ssid->mode; | |
427 | params.freq = ssid->frequency; | |
428 | ||
429 | if (wpa_drv_associate(wpa_s, ¶ms) < 0) { | |
430 | wpa_msg(wpa_s, MSG_INFO, "Failed to start AP functionality"); | |
431 | return -1; | |
432 | } | |
433 | ||
2d5b792d JM |
434 | wpa_s->ap_iface = hapd_iface = os_zalloc(sizeof(*wpa_s->ap_iface)); |
435 | if (hapd_iface == NULL) | |
436 | return -1; | |
0f2b2c19 | 437 | hapd_iface->owner = wpa_s; |
1f1b62a0 | 438 | |
2d5b792d JM |
439 | wpa_s->ap_iface->conf = conf = hostapd_config_defaults(); |
440 | if (conf == NULL) { | |
441 | wpa_supplicant_ap_deinit(wpa_s); | |
442 | return -1; | |
443 | } | |
1f1b62a0 | 444 | |
07f117ed JM |
445 | if (wpa_supplicant_conf_ap(wpa_s, ssid, conf)) { |
446 | wpa_printf(MSG_ERROR, "Failed to create AP configuration"); | |
447 | wpa_supplicant_ap_deinit(wpa_s); | |
448 | return -1; | |
449 | } | |
450 | ||
2d5b792d JM |
451 | hapd_iface->num_bss = conf->num_bss; |
452 | hapd_iface->bss = os_zalloc(conf->num_bss * | |
453 | sizeof(struct hostapd_data *)); | |
454 | if (hapd_iface->bss == NULL) { | |
455 | wpa_supplicant_ap_deinit(wpa_s); | |
456 | return -1; | |
457 | } | |
1f1b62a0 | 458 | |
2d5b792d JM |
459 | for (i = 0; i < conf->num_bss; i++) { |
460 | hapd_iface->bss[i] = | |
461 | hostapd_alloc_bss_data(hapd_iface, conf, | |
462 | &conf->bss[i]); | |
463 | if (hapd_iface->bss[i] == NULL) { | |
464 | wpa_supplicant_ap_deinit(wpa_s); | |
465 | return -1; | |
466 | } | |
4f760fcc JM |
467 | |
468 | hapd_iface->bss[i]->msg_ctx = wpa_s; | |
2d5b792d JM |
469 | } |
470 | ||
471 | if (hostapd_setup_interface(wpa_s->ap_iface)) { | |
472 | wpa_printf(MSG_ERROR, "Failed to initialize AP interface"); | |
473 | wpa_supplicant_ap_deinit(wpa_s); | |
474 | return -1; | |
1f1b62a0 JM |
475 | } |
476 | ||
b2cc8056 | 477 | wpa_s->current_ssid = ssid; |
43fb5297 | 478 | os_memcpy(wpa_s->bssid, wpa_s->own_addr, ETH_ALEN); |
137fb724 WS |
479 | wpa_supplicant_set_state(wpa_s, WPA_COMPLETED); |
480 | ||
2d5b792d JM |
481 | return 0; |
482 | } | |
483 | ||
484 | ||
485 | void wpa_supplicant_ap_deinit(struct wpa_supplicant *wpa_s) | |
486 | { | |
487 | if (wpa_s->ap_iface == NULL) | |
488 | return; | |
489 | ||
490 | hostapd_interface_deinit(wpa_s->ap_iface); | |
491 | wpa_s->ap_iface = NULL; | |
1f1b62a0 | 492 | } |
0915d02c JM |
493 | |
494 | ||
495 | void ap_tx_status(void *ctx, const u8 *addr, | |
496 | const u8 *buf, size_t len, int ack) | |
497 | { | |
f8b1f695 | 498 | #ifdef NEED_AP_MLME |
0915d02c JM |
499 | struct wpa_supplicant *wpa_s = ctx; |
500 | hostapd_tx_status(wpa_s->ap_iface->bss[0], addr, buf, len, ack); | |
f8b1f695 | 501 | #endif /* NEED_AP_MLME */ |
0915d02c JM |
502 | } |
503 | ||
504 | ||
f8b1f695 JM |
505 | void ap_rx_from_unknown_sta(void *ctx, const struct ieee80211_hdr *hdr, |
506 | size_t len) | |
0915d02c | 507 | { |
f8b1f695 | 508 | #ifdef NEED_AP_MLME |
0915d02c | 509 | struct wpa_supplicant *wpa_s = ctx; |
fbbfcbac FF |
510 | u16 fc = le_to_host16(hdr->frame_control); |
511 | ieee802_11_rx_from_unknown(wpa_s->ap_iface->bss[0], hdr->addr2, | |
512 | (fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) == | |
513 | (WLAN_FC_TODS | WLAN_FC_FROMDS)); | |
f8b1f695 | 514 | #endif /* NEED_AP_MLME */ |
0915d02c JM |
515 | } |
516 | ||
517 | ||
b57e086c | 518 | void ap_mgmt_rx(void *ctx, const u8 *buf, size_t len, |
0915d02c JM |
519 | struct hostapd_frame_info *fi) |
520 | { | |
f8b1f695 | 521 | #ifdef NEED_AP_MLME |
0915d02c | 522 | struct wpa_supplicant *wpa_s = ctx; |
f8b1f695 JM |
523 | ieee802_11_mgmt(wpa_s->ap_iface->bss[0], buf, len, fi); |
524 | #endif /* NEED_AP_MLME */ | |
0915d02c JM |
525 | } |
526 | ||
527 | ||
f8b1f695 | 528 | void ap_mgmt_tx_cb(void *ctx, const u8 *buf, size_t len, u16 stype, int ok) |
0915d02c | 529 | { |
f8b1f695 | 530 | #ifdef NEED_AP_MLME |
0915d02c JM |
531 | struct wpa_supplicant *wpa_s = ctx; |
532 | ieee802_11_mgmt_cb(wpa_s->ap_iface->bss[0], buf, len, stype, ok); | |
fe6bdb77 | 533 | #endif /* NEED_AP_MLME */ |
f8b1f695 | 534 | } |
db149ac9 JM |
535 | |
536 | ||
537 | void wpa_supplicant_ap_rx_eapol(struct wpa_supplicant *wpa_s, | |
538 | const u8 *src_addr, const u8 *buf, size_t len) | |
539 | { | |
540 | hostapd_eapol_receive(wpa_s->ap_iface->bss[0], src_addr, buf, len); | |
541 | } | |
3ec97afe JM |
542 | |
543 | ||
544 | #ifdef CONFIG_WPS | |
545 | ||
546 | int wpa_supplicant_ap_wps_pbc(struct wpa_supplicant *wpa_s, const u8 *bssid) | |
547 | { | |
548 | return hostapd_wps_button_pushed(wpa_s->ap_iface->bss[0]); | |
549 | } | |
550 | ||
551 | ||
552 | int wpa_supplicant_ap_wps_pin(struct wpa_supplicant *wpa_s, const u8 *bssid, | |
553 | const char *pin, char *buf, size_t buflen) | |
554 | { | |
555 | int ret, ret_len = 0; | |
556 | ||
557 | if (pin == NULL) { | |
558 | unsigned int rpin = wps_generate_pin(); | |
559 | ret_len = os_snprintf(buf, buflen, "%d", rpin); | |
560 | pin = buf; | |
561 | } | |
562 | ||
077a781f | 563 | ret = hostapd_wps_add_pin(wpa_s->ap_iface->bss[0], "any", pin, 0); |
3ec97afe JM |
564 | if (ret) |
565 | return -1; | |
566 | return ret_len; | |
567 | } | |
568 | ||
569 | #endif /* CONFIG_WPS */ | |
e653b622 JM |
570 | |
571 | ||
35deb646 JM |
572 | #ifdef CONFIG_CTRL_IFACE |
573 | ||
e653b622 JM |
574 | int ap_ctrl_iface_sta_first(struct wpa_supplicant *wpa_s, |
575 | char *buf, size_t buflen) | |
576 | { | |
577 | if (wpa_s->ap_iface == NULL) | |
578 | return -1; | |
579 | return hostapd_ctrl_iface_sta_first(wpa_s->ap_iface->bss[0], | |
580 | buf, buflen); | |
581 | } | |
582 | ||
583 | ||
584 | int ap_ctrl_iface_sta(struct wpa_supplicant *wpa_s, const char *txtaddr, | |
585 | char *buf, size_t buflen) | |
586 | { | |
587 | if (wpa_s->ap_iface == NULL) | |
588 | return -1; | |
589 | return hostapd_ctrl_iface_sta(wpa_s->ap_iface->bss[0], txtaddr, | |
590 | buf, buflen); | |
591 | } | |
592 | ||
593 | ||
594 | int ap_ctrl_iface_sta_next(struct wpa_supplicant *wpa_s, const char *txtaddr, | |
595 | char *buf, size_t buflen) | |
596 | { | |
597 | if (wpa_s->ap_iface == NULL) | |
598 | return -1; | |
599 | return hostapd_ctrl_iface_sta_next(wpa_s->ap_iface->bss[0], txtaddr, | |
600 | buf, buflen); | |
601 | } | |
35deb646 | 602 | |
43fb5297 JM |
603 | |
604 | int ap_ctrl_iface_wpa_get_status(struct wpa_supplicant *wpa_s, char *buf, | |
605 | size_t buflen, int verbose) | |
606 | { | |
607 | char *pos = buf, *end = buf + buflen; | |
608 | int ret; | |
609 | struct hostapd_bss_config *conf; | |
610 | ||
611 | if (wpa_s->ap_iface == NULL) | |
612 | return -1; | |
613 | ||
614 | conf = wpa_s->ap_iface->bss[0]->conf; | |
615 | if (conf->wpa == 0) | |
616 | return 0; | |
617 | ||
618 | ret = os_snprintf(pos, end - pos, | |
619 | "pairwise_cipher=%s\n" | |
620 | "group_cipher=%s\n" | |
621 | "key_mgmt=%s\n", | |
622 | wpa_cipher_txt(conf->rsn_pairwise), | |
623 | wpa_cipher_txt(conf->wpa_group), | |
624 | wpa_key_mgmt_txt(conf->wpa_key_mgmt, | |
625 | conf->wpa)); | |
626 | if (ret < 0 || ret >= end - pos) | |
627 | return pos - buf; | |
628 | pos += ret; | |
629 | return pos - buf; | |
630 | } | |
631 | ||
35deb646 | 632 | #endif /* CONFIG_CTRL_IFACE */ |