1 /*
2  * hostapd - Driver operations
3  * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "utils/includes.h"
10 
11 #include "utils/common.h"
12 #include "common/ieee802_11_defs.h"
13 #include "wps/wps.h"
14 #include "p2p/p2p.h"
15 #include "hostapd.h"
16 #include "ieee802_11.h"
17 #include "sta_info.h"
18 #include "ap_config.h"
19 #include "p2p_hostapd.h"
20 #include "hs20.h"
21 #include "ap_drv_ops.h"
22 
23 
24 u32 hostapd_sta_flags_to_drv(u32 flags)
25 {
26 	int res = 0;
27 	if (flags & WLAN_STA_AUTHORIZED)
28 		res |= WPA_STA_AUTHORIZED;
29 	if (flags & WLAN_STA_WMM)
30 		res |= WPA_STA_WMM;
31 	if (flags & WLAN_STA_SHORT_PREAMBLE)
32 		res |= WPA_STA_SHORT_PREAMBLE;
33 	if (flags & WLAN_STA_MFP)
34 		res |= WPA_STA_MFP;
35 	return res;
36 }
37 
38 
39 int hostapd_build_ap_extra_ies(struct hostapd_data *hapd,
40 			       struct wpabuf **beacon_ret,
41 			       struct wpabuf **proberesp_ret,
42 			       struct wpabuf **assocresp_ret)
43 {
44 	struct wpabuf *beacon = NULL, *proberesp = NULL, *assocresp = NULL;
45 	u8 buf[200], *pos;
46 
47 	*beacon_ret = *proberesp_ret = *assocresp_ret = NULL;
48 
49 	pos = buf;
50 	pos = hostapd_eid_time_adv(hapd, pos);
51 	if (pos != buf) {
52 		if (wpabuf_resize(&beacon, pos - buf) != 0)
53 			goto fail;
54 		wpabuf_put_data(beacon, buf, pos - buf);
55 	}
56 	pos = hostapd_eid_time_zone(hapd, pos);
57 	if (pos != buf) {
58 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
59 			goto fail;
60 		wpabuf_put_data(proberesp, buf, pos - buf);
61 	}
62 
63 	pos = buf;
64 	pos = hostapd_eid_ext_capab(hapd, pos);
65 	if (pos != buf) {
66 		if (wpabuf_resize(&assocresp, pos - buf) != 0)
67 			goto fail;
68 		wpabuf_put_data(assocresp, buf, pos - buf);
69 	}
70 	pos = hostapd_eid_interworking(hapd, pos);
71 	pos = hostapd_eid_adv_proto(hapd, pos);
72 	pos = hostapd_eid_roaming_consortium(hapd, pos);
73 	if (pos != buf) {
74 		if (wpabuf_resize(&beacon, pos - buf) != 0)
75 			goto fail;
76 		wpabuf_put_data(beacon, buf, pos - buf);
77 
78 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
79 			goto fail;
80 		wpabuf_put_data(proberesp, buf, pos - buf);
81 	}
82 
83 	if (hapd->wps_beacon_ie) {
84 		if (wpabuf_resize(&beacon, wpabuf_len(hapd->wps_beacon_ie)) <
85 		    0)
86 			goto fail;
87 		wpabuf_put_buf(beacon, hapd->wps_beacon_ie);
88 	}
89 
90 	if (hapd->wps_probe_resp_ie) {
91 		if (wpabuf_resize(&proberesp,
92 				  wpabuf_len(hapd->wps_probe_resp_ie)) < 0)
93 			goto fail;
94 		wpabuf_put_buf(proberesp, hapd->wps_probe_resp_ie);
95 	}
96 
97 #ifdef CONFIG_P2P
98 	if (hapd->p2p_beacon_ie) {
99 		if (wpabuf_resize(&beacon, wpabuf_len(hapd->p2p_beacon_ie)) <
100 		    0)
101 			goto fail;
102 		wpabuf_put_buf(beacon, hapd->p2p_beacon_ie);
103 	}
104 
105 	if (hapd->p2p_probe_resp_ie) {
106 		if (wpabuf_resize(&proberesp,
107 				  wpabuf_len(hapd->p2p_probe_resp_ie)) < 0)
108 			goto fail;
109 		wpabuf_put_buf(proberesp, hapd->p2p_probe_resp_ie);
110 	}
111 #endif /* CONFIG_P2P */
112 
113 #ifdef CONFIG_P2P_MANAGER
114 	if (hapd->conf->p2p & P2P_MANAGE) {
115 		if (wpabuf_resize(&beacon, 100) == 0) {
116 			u8 *start, *p;
117 			start = wpabuf_put(beacon, 0);
118 			p = hostapd_eid_p2p_manage(hapd, start);
119 			wpabuf_put(beacon, p - start);
120 		}
121 
122 		if (wpabuf_resize(&proberesp, 100) == 0) {
123 			u8 *start, *p;
124 			start = wpabuf_put(proberesp, 0);
125 			p = hostapd_eid_p2p_manage(hapd, start);
126 			wpabuf_put(proberesp, p - start);
127 		}
128 	}
129 #endif /* CONFIG_P2P_MANAGER */
130 
131 #ifdef CONFIG_WPS2
132 	if (hapd->conf->wps_state) {
133 		struct wpabuf *a = wps_build_assoc_resp_ie();
134 		if (a && wpabuf_resize(&assocresp, wpabuf_len(a)) == 0)
135 			wpabuf_put_buf(assocresp, a);
136 		wpabuf_free(a);
137 	}
138 #endif /* CONFIG_WPS2 */
139 
140 #ifdef CONFIG_P2P_MANAGER
141 	if (hapd->conf->p2p & P2P_MANAGE) {
142 		if (wpabuf_resize(&assocresp, 100) == 0) {
143 			u8 *start, *p;
144 			start = wpabuf_put(assocresp, 0);
145 			p = hostapd_eid_p2p_manage(hapd, start);
146 			wpabuf_put(assocresp, p - start);
147 		}
148 	}
149 #endif /* CONFIG_P2P_MANAGER */
150 
151 #ifdef CONFIG_WIFI_DISPLAY
152 	if (hapd->p2p_group) {
153 		struct wpabuf *a;
154 		a = p2p_group_assoc_resp_ie(hapd->p2p_group, P2P_SC_SUCCESS);
155 		if (a && wpabuf_resize(&assocresp, wpabuf_len(a)) == 0)
156 			wpabuf_put_buf(assocresp, a);
157 		wpabuf_free(a);
158 	}
159 #endif /* CONFIG_WIFI_DISPLAY */
160 
161 #ifdef CONFIG_HS20
162 	pos = buf;
163 	pos = hostapd_eid_hs20_indication(hapd, pos);
164 	if (pos != buf) {
165 		if (wpabuf_resize(&beacon, pos - buf) != 0)
166 			goto fail;
167 		wpabuf_put_data(beacon, buf, pos - buf);
168 
169 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
170 			goto fail;
171 		wpabuf_put_data(proberesp, buf, pos - buf);
172 	}
173 #endif /* CONFIG_HS20 */
174 
175 	if (hapd->conf->vendor_elements) {
176 		size_t add = wpabuf_len(hapd->conf->vendor_elements);
177 		if (wpabuf_resize(&beacon, add) == 0)
178 			wpabuf_put_buf(beacon, hapd->conf->vendor_elements);
179 		if (wpabuf_resize(&proberesp, add) == 0)
180 			wpabuf_put_buf(proberesp, hapd->conf->vendor_elements);
181 	}
182 
183 	*beacon_ret = beacon;
184 	*proberesp_ret = proberesp;
185 	*assocresp_ret = assocresp;
186 
187 	return 0;
188 
189 fail:
190 	wpabuf_free(beacon);
191 	wpabuf_free(proberesp);
192 	wpabuf_free(assocresp);
193 	return -1;
194 }
195 
196 
197 void hostapd_free_ap_extra_ies(struct hostapd_data *hapd,
198 			       struct wpabuf *beacon,
199 			       struct wpabuf *proberesp,
200 			       struct wpabuf *assocresp)
201 {
202 	wpabuf_free(beacon);
203 	wpabuf_free(proberesp);
204 	wpabuf_free(assocresp);
205 }
206 
207 
208 int hostapd_set_ap_wps_ie(struct hostapd_data *hapd)
209 {
210 	struct wpabuf *beacon, *proberesp, *assocresp;
211 	int ret;
212 
213 	if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL)
214 		return 0;
215 
216 	if (hostapd_build_ap_extra_ies(hapd, &beacon, &proberesp, &assocresp) <
217 	    0)
218 		return -1;
219 
220 	ret = hapd->driver->set_ap_wps_ie(hapd->drv_priv, beacon, proberesp,
221 					  assocresp);
222 
223 	hostapd_free_ap_extra_ies(hapd, beacon, proberesp, assocresp);
224 
225 	return ret;
226 }
227 
228 
229 int hostapd_set_authorized(struct hostapd_data *hapd,
230 			   struct sta_info *sta, int authorized)
231 {
232 	if (authorized) {
233 		return hostapd_sta_set_flags(hapd, sta->addr,
234 					     hostapd_sta_flags_to_drv(
235 						     sta->flags),
236 					     WPA_STA_AUTHORIZED, ~0);
237 	}
238 
239 	return hostapd_sta_set_flags(hapd, sta->addr,
240 				     hostapd_sta_flags_to_drv(sta->flags),
241 				     0, ~WPA_STA_AUTHORIZED);
242 }
243 
244 
245 int hostapd_set_sta_flags(struct hostapd_data *hapd, struct sta_info *sta)
246 {
247 	int set_flags, total_flags, flags_and, flags_or;
248 	total_flags = hostapd_sta_flags_to_drv(sta->flags);
249 	set_flags = WPA_STA_SHORT_PREAMBLE | WPA_STA_WMM | WPA_STA_MFP;
250 	if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) ||
251 	     sta->auth_alg == WLAN_AUTH_FT) &&
252 	    sta->flags & WLAN_STA_AUTHORIZED)
253 		set_flags |= WPA_STA_AUTHORIZED;
254 	flags_or = total_flags & set_flags;
255 	flags_and = total_flags | ~set_flags;
256 	return hostapd_sta_set_flags(hapd, sta->addr, total_flags,
257 				     flags_or, flags_and);
258 }
259 
260 
261 int hostapd_set_drv_ieee8021x(struct hostapd_data *hapd, const char *ifname,
262 			      int enabled)
263 {
264 	struct wpa_bss_params params;
265 	os_memset(&params, 0, sizeof(params));
266 	params.ifname = ifname;
267 	params.enabled = enabled;
268 	if (enabled) {
269 		params.wpa = hapd->conf->wpa;
270 		params.ieee802_1x = hapd->conf->ieee802_1x;
271 		params.wpa_group = hapd->conf->wpa_group;
272 		params.wpa_pairwise = hapd->conf->wpa_pairwise;
273 		params.wpa_key_mgmt = hapd->conf->wpa_key_mgmt;
274 		params.rsn_preauth = hapd->conf->rsn_preauth;
275 #ifdef CONFIG_IEEE80211W
276 		params.ieee80211w = hapd->conf->ieee80211w;
277 #endif /* CONFIG_IEEE80211W */
278 	}
279 	return hostapd_set_ieee8021x(hapd, &params);
280 }
281 
282 
283 int hostapd_vlan_if_add(struct hostapd_data *hapd, const char *ifname)
284 {
285 	char force_ifname[IFNAMSIZ];
286 	u8 if_addr[ETH_ALEN];
287 	return hostapd_if_add(hapd, WPA_IF_AP_VLAN, ifname, hapd->own_addr,
288 			      NULL, NULL, force_ifname, if_addr, NULL, 0);
289 }
290 
291 
292 int hostapd_vlan_if_remove(struct hostapd_data *hapd, const char *ifname)
293 {
294 	return hostapd_if_remove(hapd, WPA_IF_AP_VLAN, ifname);
295 }
296 
297 
298 int hostapd_set_wds_sta(struct hostapd_data *hapd, char *ifname_wds,
299 			const u8 *addr, int aid, int val)
300 {
301 	const char *bridge = NULL;
302 
303 	if (hapd->driver == NULL || hapd->driver->set_wds_sta == NULL)
304 		return -1;
305 	if (hapd->conf->wds_bridge[0])
306 		bridge = hapd->conf->wds_bridge;
307 	else if (hapd->conf->bridge[0])
308 		bridge = hapd->conf->bridge;
309 	return hapd->driver->set_wds_sta(hapd->drv_priv, addr, aid, val,
310 					 bridge, ifname_wds);
311 }
312 
313 
314 int hostapd_add_sta_node(struct hostapd_data *hapd, const u8 *addr,
315 			 u16 auth_alg)
316 {
317 	if (hapd->driver == NULL || hapd->driver->add_sta_node == NULL)
318 		return 0;
319 	return hapd->driver->add_sta_node(hapd->drv_priv, addr, auth_alg);
320 }
321 
322 
323 int hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr,
324 		     u16 seq, u16 status, const u8 *ie, size_t len)
325 {
326 	if (hapd->driver == NULL || hapd->driver->sta_auth == NULL)
327 		return 0;
328 	return hapd->driver->sta_auth(hapd->drv_priv, hapd->own_addr, addr,
329 				      seq, status, ie, len);
330 }
331 
332 
333 int hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr,
334 		      int reassoc, u16 status, const u8 *ie, size_t len)
335 {
336 	if (hapd->driver == NULL || hapd->driver->sta_assoc == NULL)
337 		return 0;
338 	return hapd->driver->sta_assoc(hapd->drv_priv, hapd->own_addr, addr,
339 				       reassoc, status, ie, len);
340 }
341 
342 
343 int hostapd_sta_add(struct hostapd_data *hapd,
344 		    const u8 *addr, u16 aid, u16 capability,
345 		    const u8 *supp_rates, size_t supp_rates_len,
346 		    u16 listen_interval,
347 		    const struct ieee80211_ht_capabilities *ht_capab,
348 		    const struct ieee80211_vht_capabilities *vht_capab,
349 		    u32 flags, u8 qosinfo)
350 {
351 	struct hostapd_sta_add_params params;
352 
353 	if (hapd->driver == NULL)
354 		return 0;
355 	if (hapd->driver->sta_add == NULL)
356 		return 0;
357 
358 	os_memset(&params, 0, sizeof(params));
359 	params.addr = addr;
360 	params.aid = aid;
361 	params.capability = capability;
362 	params.supp_rates = supp_rates;
363 	params.supp_rates_len = supp_rates_len;
364 	params.listen_interval = listen_interval;
365 	params.ht_capabilities = ht_capab;
366 	params.vht_capabilities = vht_capab;
367 	params.flags = hostapd_sta_flags_to_drv(flags);
368 	params.qosinfo = qosinfo;
369 	return hapd->driver->sta_add(hapd->drv_priv, &params);
370 }
371 
372 
373 int hostapd_add_tspec(struct hostapd_data *hapd, const u8 *addr,
374 		      u8 *tspec_ie, size_t tspec_ielen)
375 {
376 	if (hapd->driver == NULL || hapd->driver->add_tspec == NULL)
377 		return 0;
378 	return hapd->driver->add_tspec(hapd->drv_priv, addr, tspec_ie,
379 				       tspec_ielen);
380 }
381 
382 
383 int hostapd_set_privacy(struct hostapd_data *hapd, int enabled)
384 {
385 	if (hapd->driver == NULL || hapd->driver->set_privacy == NULL)
386 		return 0;
387 	return hapd->driver->set_privacy(hapd->drv_priv, enabled);
388 }
389 
390 
391 int hostapd_set_generic_elem(struct hostapd_data *hapd, const u8 *elem,
392 			     size_t elem_len)
393 {
394 	if (hapd->driver == NULL || hapd->driver->set_generic_elem == NULL)
395 		return 0;
396 	return hapd->driver->set_generic_elem(hapd->drv_priv, elem, elem_len);
397 }
398 
399 
400 int hostapd_get_ssid(struct hostapd_data *hapd, u8 *buf, size_t len)
401 {
402 	if (hapd->driver == NULL || hapd->driver->hapd_get_ssid == NULL)
403 		return 0;
404 	return hapd->driver->hapd_get_ssid(hapd->drv_priv, buf, len);
405 }
406 
407 
408 int hostapd_set_ssid(struct hostapd_data *hapd, const u8 *buf, size_t len)
409 {
410 	if (hapd->driver == NULL || hapd->driver->hapd_set_ssid == NULL)
411 		return 0;
412 	return hapd->driver->hapd_set_ssid(hapd->drv_priv, buf, len);
413 }
414 
415 
416 int hostapd_if_add(struct hostapd_data *hapd, enum wpa_driver_if_type type,
417 		   const char *ifname, const u8 *addr, void *bss_ctx,
418 		   void **drv_priv, char *force_ifname, u8 *if_addr,
419 		   const char *bridge, int use_existing)
420 {
421 	if (hapd->driver == NULL || hapd->driver->if_add == NULL)
422 		return -1;
423 	return hapd->driver->if_add(hapd->drv_priv, type, ifname, addr,
424 				    bss_ctx, drv_priv, force_ifname, if_addr,
425 				    bridge, use_existing);
426 }
427 
428 
429 int hostapd_if_remove(struct hostapd_data *hapd, enum wpa_driver_if_type type,
430 		      const char *ifname)
431 {
432 	if (hapd->driver == NULL || hapd->drv_priv == NULL ||
433 	    hapd->driver->if_remove == NULL)
434 		return -1;
435 	return hapd->driver->if_remove(hapd->drv_priv, type, ifname);
436 }
437 
438 
439 int hostapd_set_ieee8021x(struct hostapd_data *hapd,
440 			  struct wpa_bss_params *params)
441 {
442 	if (hapd->driver == NULL || hapd->driver->set_ieee8021x == NULL)
443 		return 0;
444 	return hapd->driver->set_ieee8021x(hapd->drv_priv, params);
445 }
446 
447 
448 int hostapd_get_seqnum(const char *ifname, struct hostapd_data *hapd,
449 		       const u8 *addr, int idx, u8 *seq)
450 {
451 	if (hapd->driver == NULL || hapd->driver->get_seqnum == NULL)
452 		return 0;
453 	return hapd->driver->get_seqnum(ifname, hapd->drv_priv, addr, idx,
454 					seq);
455 }
456 
457 
458 int hostapd_flush(struct hostapd_data *hapd)
459 {
460 	if (hapd->driver == NULL || hapd->driver->flush == NULL)
461 		return 0;
462 	return hapd->driver->flush(hapd->drv_priv);
463 }
464 
465 
466 int hostapd_set_freq_params(struct hostapd_freq_params *data, int mode,
467 			    int freq, int channel, int ht_enabled,
468 			    int vht_enabled, int sec_channel_offset,
469 			    int vht_oper_chwidth, int center_segment0,
470 			    int center_segment1, u32 vht_caps)
471 {
472 	int tmp;
473 
474 	os_memset(data, 0, sizeof(*data));
475 	data->mode = mode;
476 	data->freq = freq;
477 	data->channel = channel;
478 	data->ht_enabled = ht_enabled;
479 	data->vht_enabled = vht_enabled;
480 	data->sec_channel_offset = sec_channel_offset;
481 	data->center_freq1 = freq + sec_channel_offset * 10;
482 	data->center_freq2 = 0;
483 	data->bandwidth = sec_channel_offset ? 40 : 20;
484 
485 	/*
486 	 * This validation code is probably misplaced, maybe it should be
487 	 * in src/ap/hw_features.c and check the hardware support as well.
488 	 */
489 	if (data->vht_enabled) switch (vht_oper_chwidth) {
490 	case VHT_CHANWIDTH_USE_HT:
491 		if (center_segment1)
492 			return -1;
493 		if (5000 + center_segment0 * 5 != data->center_freq1 &&
494 		    2407 + center_segment0 * 5 != data->center_freq1)
495 			return -1;
496 		break;
497 	case VHT_CHANWIDTH_80P80MHZ:
498 		if (!(vht_caps & VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ)) {
499 			wpa_printf(MSG_ERROR,
500 				   "80+80 channel width is not supported!");
501 			return -1;
502 		}
503 		if (center_segment1 == center_segment0 + 4 ||
504 		    center_segment1 == center_segment0 - 4)
505 			return -1;
506 		data->center_freq2 = 5000 + center_segment1 * 5;
507 		/* fall through */
508 	case VHT_CHANWIDTH_80MHZ:
509 		data->bandwidth = 80;
510 		if (vht_oper_chwidth == 1 && center_segment1)
511 			return -1;
512 		if (vht_oper_chwidth == 3 && !center_segment1)
513 			return -1;
514 		if (!sec_channel_offset)
515 			return -1;
516 		/* primary 40 part must match the HT configuration */
517 		tmp = (30 + freq - 5000 - center_segment0 * 5)/20;
518 		tmp /= 2;
519 		if (data->center_freq1 != 5000 +
520 					 center_segment0 * 5 - 20 + 40 * tmp)
521 			return -1;
522 		data->center_freq1 = 5000 + center_segment0 * 5;
523 		break;
524 	case VHT_CHANWIDTH_160MHZ:
525 		data->bandwidth = 160;
526 		if (!(vht_caps & (VHT_CAP_SUPP_CHAN_WIDTH_160MHZ |
527 				  VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ))) {
528 			wpa_printf(MSG_ERROR,
529 				   "160MHZ channel width is not supported!");
530 			return -1;
531 		}
532 		if (center_segment1)
533 			return -1;
534 		if (!sec_channel_offset)
535 			return -1;
536 		/* primary 40 part must match the HT configuration */
537 		tmp = (70 + freq - 5000 - center_segment0 * 5)/20;
538 		tmp /= 2;
539 		if (data->center_freq1 != 5000 +
540 					 center_segment0 * 5 - 60 + 40 * tmp)
541 			return -1;
542 		data->center_freq1 = 5000 + center_segment0 * 5;
543 		break;
544 	}
545 
546 	return 0;
547 }
548 
549 
550 int hostapd_set_freq(struct hostapd_data *hapd, int mode, int freq,
551 		     int channel, int ht_enabled, int vht_enabled,
552 		     int sec_channel_offset, int vht_oper_chwidth,
553 		     int center_segment0, int center_segment1)
554 {
555 	struct hostapd_freq_params data;
556 
557 	if (hostapd_set_freq_params(&data, mode, freq, channel, ht_enabled,
558 				    vht_enabled, sec_channel_offset,
559 				    vht_oper_chwidth,
560 				    center_segment0, center_segment1,
561 				    hapd->iface->current_mode->vht_capab))
562 		return -1;
563 
564 	if (hapd->driver == NULL)
565 		return 0;
566 	if (hapd->driver->set_freq == NULL)
567 		return 0;
568 	return hapd->driver->set_freq(hapd->drv_priv, &data);
569 }
570 
571 int hostapd_set_rts(struct hostapd_data *hapd, int rts)
572 {
573 	if (hapd->driver == NULL || hapd->driver->set_rts == NULL)
574 		return 0;
575 	return hapd->driver->set_rts(hapd->drv_priv, rts);
576 }
577 
578 
579 int hostapd_set_frag(struct hostapd_data *hapd, int frag)
580 {
581 	if (hapd->driver == NULL || hapd->driver->set_frag == NULL)
582 		return 0;
583 	return hapd->driver->set_frag(hapd->drv_priv, frag);
584 }
585 
586 
587 int hostapd_sta_set_flags(struct hostapd_data *hapd, u8 *addr,
588 			  int total_flags, int flags_or, int flags_and)
589 {
590 	if (hapd->driver == NULL || hapd->driver->sta_set_flags == NULL)
591 		return 0;
592 	return hapd->driver->sta_set_flags(hapd->drv_priv, addr, total_flags,
593 					   flags_or, flags_and);
594 }
595 
596 
597 int hostapd_set_country(struct hostapd_data *hapd, const char *country)
598 {
599 	if (hapd->driver == NULL ||
600 	    hapd->driver->set_country == NULL)
601 		return 0;
602 	return hapd->driver->set_country(hapd->drv_priv, country);
603 }
604 
605 
606 int hostapd_set_tx_queue_params(struct hostapd_data *hapd, int queue, int aifs,
607 				int cw_min, int cw_max, int burst_time)
608 {
609 	if (hapd->driver == NULL || hapd->driver->set_tx_queue_params == NULL)
610 		return 0;
611 	return hapd->driver->set_tx_queue_params(hapd->drv_priv, queue, aifs,
612 						 cw_min, cw_max, burst_time);
613 }
614 
615 
616 struct hostapd_hw_modes *
617 hostapd_get_hw_feature_data(struct hostapd_data *hapd, u16 *num_modes,
618 			    u16 *flags)
619 {
620 	if (hapd->driver == NULL ||
621 	    hapd->driver->get_hw_feature_data == NULL)
622 		return NULL;
623 	return hapd->driver->get_hw_feature_data(hapd->drv_priv, num_modes,
624 						 flags);
625 }
626 
627 
628 int hostapd_driver_commit(struct hostapd_data *hapd)
629 {
630 	if (hapd->driver == NULL || hapd->driver->commit == NULL)
631 		return 0;
632 	return hapd->driver->commit(hapd->drv_priv);
633 }
634 
635 
636 int hostapd_drv_none(struct hostapd_data *hapd)
637 {
638 	return hapd->driver && os_strcmp(hapd->driver->name, "none") == 0;
639 }
640 
641 
642 int hostapd_driver_scan(struct hostapd_data *hapd,
643 			struct wpa_driver_scan_params *params)
644 {
645 	if (hapd->driver && hapd->driver->scan2)
646 		return hapd->driver->scan2(hapd->drv_priv, params);
647 	return -1;
648 }
649 
650 
651 struct wpa_scan_results * hostapd_driver_get_scan_results(
652 	struct hostapd_data *hapd)
653 {
654 	if (hapd->driver && hapd->driver->get_scan_results2)
655 		return hapd->driver->get_scan_results2(hapd->drv_priv);
656 	return NULL;
657 }
658 
659 
660 int hostapd_driver_set_noa(struct hostapd_data *hapd, u8 count, int start,
661 			   int duration)
662 {
663 	if (hapd->driver && hapd->driver->set_noa)
664 		return hapd->driver->set_noa(hapd->drv_priv, count, start,
665 					     duration);
666 	return -1;
667 }
668 
669 
670 int hostapd_drv_set_key(const char *ifname, struct hostapd_data *hapd,
671 			enum wpa_alg alg, const u8 *addr,
672 			int key_idx, int set_tx,
673 			const u8 *seq, size_t seq_len,
674 			const u8 *key, size_t key_len)
675 {
676 	if (hapd->driver == NULL || hapd->driver->set_key == NULL)
677 		return 0;
678 	return hapd->driver->set_key(ifname, hapd->drv_priv, alg, addr,
679 				     key_idx, set_tx, seq, seq_len, key,
680 				     key_len);
681 }
682 
683 
684 int hostapd_drv_send_mlme(struct hostapd_data *hapd,
685 			  const void *msg, size_t len, int noack)
686 {
687 	if (hapd->driver == NULL || hapd->driver->send_mlme == NULL)
688 		return 0;
689 	return hapd->driver->send_mlme(hapd->drv_priv, msg, len, noack);
690 }
691 
692 
693 int hostapd_drv_sta_deauth(struct hostapd_data *hapd,
694 			   const u8 *addr, int reason)
695 {
696 	if (hapd->driver == NULL || hapd->driver->sta_deauth == NULL)
697 		return 0;
698 	return hapd->driver->sta_deauth(hapd->drv_priv, hapd->own_addr, addr,
699 					reason);
700 }
701 
702 
703 int hostapd_drv_sta_disassoc(struct hostapd_data *hapd,
704 			     const u8 *addr, int reason)
705 {
706 	if (hapd->driver == NULL || hapd->driver->sta_disassoc == NULL)
707 		return 0;
708 	return hapd->driver->sta_disassoc(hapd->drv_priv, hapd->own_addr, addr,
709 					  reason);
710 }
711 
712 
713 int hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper,
714 			 const u8 *peer, u8 *buf, u16 *buf_len)
715 {
716 	if (hapd->driver == NULL || hapd->driver->wnm_oper == NULL)
717 		return -1;
718 	return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
719 				      buf_len);
720 }
721 
722 
723 int hostapd_drv_send_action(struct hostapd_data *hapd, unsigned int freq,
724 			    unsigned int wait, const u8 *dst, const u8 *data,
725 			    size_t len)
726 {
727 	if (hapd->driver == NULL || hapd->driver->send_action == NULL)
728 		return 0;
729 	return hapd->driver->send_action(hapd->drv_priv, freq, wait, dst,
730 					 hapd->own_addr, hapd->own_addr, data,
731 					 len, 0);
732 }
733 
734 
735 int hostapd_start_dfs_cac(struct hostapd_iface *iface, int mode, int freq,
736 			  int channel, int ht_enabled, int vht_enabled,
737 			  int sec_channel_offset, int vht_oper_chwidth,
738 			  int center_segment0, int center_segment1)
739 {
740 	struct hostapd_data *hapd = iface->bss[0];
741 	struct hostapd_freq_params data;
742 	int res;
743 
744 	if (!hapd->driver || !hapd->driver->start_dfs_cac)
745 		return 0;
746 
747 	if (!iface->conf->ieee80211h) {
748 		wpa_printf(MSG_ERROR, "Can't start DFS CAC, DFS functionality "
749 			   "is not enabled");
750 		return -1;
751 	}
752 
753 	if (hostapd_set_freq_params(&data, mode, freq, channel, ht_enabled,
754 				    vht_enabled, sec_channel_offset,
755 				    vht_oper_chwidth, center_segment0,
756 				    center_segment1,
757 				    iface->current_mode->vht_capab))
758 		return -1;
759 
760 	res = hapd->driver->start_dfs_cac(hapd->drv_priv, &data);
761 	if (!res)
762 		iface->cac_started = 1;
763 
764 	return res;
765 }
766 
767 
768 int hostapd_drv_set_qos_map(struct hostapd_data *hapd,
769 			    const u8 *qos_map_set, u8 qos_map_set_len)
770 {
771 	if (hapd->driver == NULL || hapd->driver->set_qos_map == NULL)
772 		return 0;
773 	return hapd->driver->set_qos_map(hapd->drv_priv, qos_map_set,
774 					 qos_map_set_len);
775 }
776