xref: /freebsd/contrib/wpa/src/ap/ap_drv_ops.c (revision d6b92ffa)
1 /*
2  * hostapd - Driver operations
3  * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "utils/includes.h"
10 
11 #include "utils/common.h"
12 #include "common/ieee802_11_defs.h"
13 #include "common/hw_features_common.h"
14 #include "wps/wps.h"
15 #include "p2p/p2p.h"
16 #include "hostapd.h"
17 #include "ieee802_11.h"
18 #include "sta_info.h"
19 #include "ap_config.h"
20 #include "p2p_hostapd.h"
21 #include "hs20.h"
22 #include "ap_drv_ops.h"
23 
24 
25 u32 hostapd_sta_flags_to_drv(u32 flags)
26 {
27 	int res = 0;
28 	if (flags & WLAN_STA_AUTHORIZED)
29 		res |= WPA_STA_AUTHORIZED;
30 	if (flags & WLAN_STA_WMM)
31 		res |= WPA_STA_WMM;
32 	if (flags & WLAN_STA_SHORT_PREAMBLE)
33 		res |= WPA_STA_SHORT_PREAMBLE;
34 	if (flags & WLAN_STA_MFP)
35 		res |= WPA_STA_MFP;
36 	return res;
37 }
38 
39 
40 int hostapd_build_ap_extra_ies(struct hostapd_data *hapd,
41 			       struct wpabuf **beacon_ret,
42 			       struct wpabuf **proberesp_ret,
43 			       struct wpabuf **assocresp_ret)
44 {
45 	struct wpabuf *beacon = NULL, *proberesp = NULL, *assocresp = NULL;
46 	u8 buf[200], *pos;
47 
48 	*beacon_ret = *proberesp_ret = *assocresp_ret = NULL;
49 
50 	pos = buf;
51 	pos = hostapd_eid_time_adv(hapd, pos);
52 	if (pos != buf) {
53 		if (wpabuf_resize(&beacon, pos - buf) != 0)
54 			goto fail;
55 		wpabuf_put_data(beacon, buf, pos - buf);
56 	}
57 	pos = hostapd_eid_time_zone(hapd, pos);
58 	if (pos != buf) {
59 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
60 			goto fail;
61 		wpabuf_put_data(proberesp, buf, pos - buf);
62 	}
63 
64 	pos = buf;
65 	pos = hostapd_eid_ext_capab(hapd, pos);
66 	if (pos != buf) {
67 		if (wpabuf_resize(&assocresp, pos - buf) != 0)
68 			goto fail;
69 		wpabuf_put_data(assocresp, buf, pos - buf);
70 	}
71 	pos = hostapd_eid_interworking(hapd, pos);
72 	pos = hostapd_eid_adv_proto(hapd, pos);
73 	pos = hostapd_eid_roaming_consortium(hapd, pos);
74 	if (pos != buf) {
75 		if (wpabuf_resize(&beacon, pos - buf) != 0)
76 			goto fail;
77 		wpabuf_put_data(beacon, buf, pos - buf);
78 
79 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
80 			goto fail;
81 		wpabuf_put_data(proberesp, buf, pos - buf);
82 	}
83 
84 #ifdef CONFIG_FST
85 	if (hapd->iface->fst_ies) {
86 		size_t add = wpabuf_len(hapd->iface->fst_ies);
87 
88 		if (wpabuf_resize(&beacon, add) < 0)
89 			goto fail;
90 		wpabuf_put_buf(beacon, hapd->iface->fst_ies);
91 		if (wpabuf_resize(&proberesp, add) < 0)
92 			goto fail;
93 		wpabuf_put_buf(proberesp, hapd->iface->fst_ies);
94 		if (wpabuf_resize(&assocresp, add) < 0)
95 			goto fail;
96 		wpabuf_put_buf(assocresp, hapd->iface->fst_ies);
97 	}
98 #endif /* CONFIG_FST */
99 
100 	if (hapd->wps_beacon_ie) {
101 		if (wpabuf_resize(&beacon, wpabuf_len(hapd->wps_beacon_ie)) <
102 		    0)
103 			goto fail;
104 		wpabuf_put_buf(beacon, hapd->wps_beacon_ie);
105 	}
106 
107 	if (hapd->wps_probe_resp_ie) {
108 		if (wpabuf_resize(&proberesp,
109 				  wpabuf_len(hapd->wps_probe_resp_ie)) < 0)
110 			goto fail;
111 		wpabuf_put_buf(proberesp, hapd->wps_probe_resp_ie);
112 	}
113 
114 #ifdef CONFIG_P2P
115 	if (hapd->p2p_beacon_ie) {
116 		if (wpabuf_resize(&beacon, wpabuf_len(hapd->p2p_beacon_ie)) <
117 		    0)
118 			goto fail;
119 		wpabuf_put_buf(beacon, hapd->p2p_beacon_ie);
120 	}
121 
122 	if (hapd->p2p_probe_resp_ie) {
123 		if (wpabuf_resize(&proberesp,
124 				  wpabuf_len(hapd->p2p_probe_resp_ie)) < 0)
125 			goto fail;
126 		wpabuf_put_buf(proberesp, hapd->p2p_probe_resp_ie);
127 	}
128 #endif /* CONFIG_P2P */
129 
130 #ifdef CONFIG_P2P_MANAGER
131 	if (hapd->conf->p2p & P2P_MANAGE) {
132 		if (wpabuf_resize(&beacon, 100) == 0) {
133 			u8 *start, *p;
134 			start = wpabuf_put(beacon, 0);
135 			p = hostapd_eid_p2p_manage(hapd, start);
136 			wpabuf_put(beacon, p - start);
137 		}
138 
139 		if (wpabuf_resize(&proberesp, 100) == 0) {
140 			u8 *start, *p;
141 			start = wpabuf_put(proberesp, 0);
142 			p = hostapd_eid_p2p_manage(hapd, start);
143 			wpabuf_put(proberesp, p - start);
144 		}
145 	}
146 #endif /* CONFIG_P2P_MANAGER */
147 
148 #ifdef CONFIG_WPS
149 	if (hapd->conf->wps_state) {
150 		struct wpabuf *a = wps_build_assoc_resp_ie();
151 		if (a && wpabuf_resize(&assocresp, wpabuf_len(a)) == 0)
152 			wpabuf_put_buf(assocresp, a);
153 		wpabuf_free(a);
154 	}
155 #endif /* CONFIG_WPS */
156 
157 #ifdef CONFIG_P2P_MANAGER
158 	if (hapd->conf->p2p & P2P_MANAGE) {
159 		if (wpabuf_resize(&assocresp, 100) == 0) {
160 			u8 *start, *p;
161 			start = wpabuf_put(assocresp, 0);
162 			p = hostapd_eid_p2p_manage(hapd, start);
163 			wpabuf_put(assocresp, p - start);
164 		}
165 	}
166 #endif /* CONFIG_P2P_MANAGER */
167 
168 #ifdef CONFIG_WIFI_DISPLAY
169 	if (hapd->p2p_group) {
170 		struct wpabuf *a;
171 		a = p2p_group_assoc_resp_ie(hapd->p2p_group, P2P_SC_SUCCESS);
172 		if (a && wpabuf_resize(&assocresp, wpabuf_len(a)) == 0)
173 			wpabuf_put_buf(assocresp, a);
174 		wpabuf_free(a);
175 	}
176 #endif /* CONFIG_WIFI_DISPLAY */
177 
178 #ifdef CONFIG_HS20
179 	pos = buf;
180 	pos = hostapd_eid_hs20_indication(hapd, pos);
181 	if (pos != buf) {
182 		if (wpabuf_resize(&beacon, pos - buf) != 0)
183 			goto fail;
184 		wpabuf_put_data(beacon, buf, pos - buf);
185 
186 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
187 			goto fail;
188 		wpabuf_put_data(proberesp, buf, pos - buf);
189 	}
190 
191 	pos = hostapd_eid_osen(hapd, buf);
192 	if (pos != buf) {
193 		if (wpabuf_resize(&beacon, pos - buf) != 0)
194 			goto fail;
195 		wpabuf_put_data(beacon, buf, pos - buf);
196 
197 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
198 			goto fail;
199 		wpabuf_put_data(proberesp, buf, pos - buf);
200 	}
201 #endif /* CONFIG_HS20 */
202 
203 	if (hapd->conf->vendor_elements) {
204 		size_t add = wpabuf_len(hapd->conf->vendor_elements);
205 		if (wpabuf_resize(&beacon, add) == 0)
206 			wpabuf_put_buf(beacon, hapd->conf->vendor_elements);
207 		if (wpabuf_resize(&proberesp, add) == 0)
208 			wpabuf_put_buf(proberesp, hapd->conf->vendor_elements);
209 	}
210 
211 	*beacon_ret = beacon;
212 	*proberesp_ret = proberesp;
213 	*assocresp_ret = assocresp;
214 
215 	return 0;
216 
217 fail:
218 	wpabuf_free(beacon);
219 	wpabuf_free(proberesp);
220 	wpabuf_free(assocresp);
221 	return -1;
222 }
223 
224 
225 void hostapd_free_ap_extra_ies(struct hostapd_data *hapd,
226 			       struct wpabuf *beacon,
227 			       struct wpabuf *proberesp,
228 			       struct wpabuf *assocresp)
229 {
230 	wpabuf_free(beacon);
231 	wpabuf_free(proberesp);
232 	wpabuf_free(assocresp);
233 }
234 
235 
236 int hostapd_reset_ap_wps_ie(struct hostapd_data *hapd)
237 {
238 	if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL)
239 		return 0;
240 
241 	return hapd->driver->set_ap_wps_ie(hapd->drv_priv, NULL, NULL, NULL);
242 }
243 
244 
245 int hostapd_set_ap_wps_ie(struct hostapd_data *hapd)
246 {
247 	struct wpabuf *beacon, *proberesp, *assocresp;
248 	int ret;
249 
250 	if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL)
251 		return 0;
252 
253 	if (hostapd_build_ap_extra_ies(hapd, &beacon, &proberesp, &assocresp) <
254 	    0)
255 		return -1;
256 
257 	ret = hapd->driver->set_ap_wps_ie(hapd->drv_priv, beacon, proberesp,
258 					  assocresp);
259 
260 	hostapd_free_ap_extra_ies(hapd, beacon, proberesp, assocresp);
261 
262 	return ret;
263 }
264 
265 
266 int hostapd_set_authorized(struct hostapd_data *hapd,
267 			   struct sta_info *sta, int authorized)
268 {
269 	if (authorized) {
270 		return hostapd_sta_set_flags(hapd, sta->addr,
271 					     hostapd_sta_flags_to_drv(
272 						     sta->flags),
273 					     WPA_STA_AUTHORIZED, ~0);
274 	}
275 
276 	return hostapd_sta_set_flags(hapd, sta->addr,
277 				     hostapd_sta_flags_to_drv(sta->flags),
278 				     0, ~WPA_STA_AUTHORIZED);
279 }
280 
281 
282 int hostapd_set_sta_flags(struct hostapd_data *hapd, struct sta_info *sta)
283 {
284 	int set_flags, total_flags, flags_and, flags_or;
285 	total_flags = hostapd_sta_flags_to_drv(sta->flags);
286 	set_flags = WPA_STA_SHORT_PREAMBLE | WPA_STA_WMM | WPA_STA_MFP;
287 	if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) ||
288 	     sta->auth_alg == WLAN_AUTH_FT) &&
289 	    sta->flags & WLAN_STA_AUTHORIZED)
290 		set_flags |= WPA_STA_AUTHORIZED;
291 	flags_or = total_flags & set_flags;
292 	flags_and = total_flags | ~set_flags;
293 	return hostapd_sta_set_flags(hapd, sta->addr, total_flags,
294 				     flags_or, flags_and);
295 }
296 
297 
298 int hostapd_set_drv_ieee8021x(struct hostapd_data *hapd, const char *ifname,
299 			      int enabled)
300 {
301 	struct wpa_bss_params params;
302 	os_memset(&params, 0, sizeof(params));
303 	params.ifname = ifname;
304 	params.enabled = enabled;
305 	if (enabled) {
306 		params.wpa = hapd->conf->wpa;
307 		params.ieee802_1x = hapd->conf->ieee802_1x;
308 		params.wpa_group = hapd->conf->wpa_group;
309 		if ((hapd->conf->wpa & (WPA_PROTO_WPA | WPA_PROTO_RSN)) ==
310 		    (WPA_PROTO_WPA | WPA_PROTO_RSN))
311 			params.wpa_pairwise = hapd->conf->wpa_pairwise |
312 				hapd->conf->rsn_pairwise;
313 		else if (hapd->conf->wpa & WPA_PROTO_RSN)
314 			params.wpa_pairwise = hapd->conf->rsn_pairwise;
315 		else if (hapd->conf->wpa & WPA_PROTO_WPA)
316 			params.wpa_pairwise = hapd->conf->wpa_pairwise;
317 		params.wpa_key_mgmt = hapd->conf->wpa_key_mgmt;
318 		params.rsn_preauth = hapd->conf->rsn_preauth;
319 #ifdef CONFIG_IEEE80211W
320 		params.ieee80211w = hapd->conf->ieee80211w;
321 #endif /* CONFIG_IEEE80211W */
322 	}
323 	return hostapd_set_ieee8021x(hapd, &params);
324 }
325 
326 
327 int hostapd_vlan_if_add(struct hostapd_data *hapd, const char *ifname)
328 {
329 	char force_ifname[IFNAMSIZ];
330 	u8 if_addr[ETH_ALEN];
331 	return hostapd_if_add(hapd, WPA_IF_AP_VLAN, ifname, hapd->own_addr,
332 			      NULL, NULL, force_ifname, if_addr, NULL, 0);
333 }
334 
335 
336 int hostapd_vlan_if_remove(struct hostapd_data *hapd, const char *ifname)
337 {
338 	return hostapd_if_remove(hapd, WPA_IF_AP_VLAN, ifname);
339 }
340 
341 
342 int hostapd_set_wds_sta(struct hostapd_data *hapd, char *ifname_wds,
343 			const u8 *addr, int aid, int val)
344 {
345 	const char *bridge = NULL;
346 
347 	if (hapd->driver == NULL || hapd->driver->set_wds_sta == NULL)
348 		return -1;
349 	if (hapd->conf->wds_bridge[0])
350 		bridge = hapd->conf->wds_bridge;
351 	else if (hapd->conf->bridge[0])
352 		bridge = hapd->conf->bridge;
353 	return hapd->driver->set_wds_sta(hapd->drv_priv, addr, aid, val,
354 					 bridge, ifname_wds);
355 }
356 
357 
358 int hostapd_add_sta_node(struct hostapd_data *hapd, const u8 *addr,
359 			 u16 auth_alg)
360 {
361 	if (hapd->driver == NULL || hapd->driver->add_sta_node == NULL)
362 		return 0;
363 	return hapd->driver->add_sta_node(hapd->drv_priv, addr, auth_alg);
364 }
365 
366 
367 int hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr,
368 		     u16 seq, u16 status, const u8 *ie, size_t len)
369 {
370 	if (hapd->driver == NULL || hapd->driver->sta_auth == NULL)
371 		return 0;
372 	return hapd->driver->sta_auth(hapd->drv_priv, hapd->own_addr, addr,
373 				      seq, status, ie, len);
374 }
375 
376 
377 int hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr,
378 		      int reassoc, u16 status, const u8 *ie, size_t len)
379 {
380 	if (hapd->driver == NULL || hapd->driver->sta_assoc == NULL)
381 		return 0;
382 	return hapd->driver->sta_assoc(hapd->drv_priv, hapd->own_addr, addr,
383 				       reassoc, status, ie, len);
384 }
385 
386 
387 int hostapd_sta_add(struct hostapd_data *hapd,
388 		    const u8 *addr, u16 aid, u16 capability,
389 		    const u8 *supp_rates, size_t supp_rates_len,
390 		    u16 listen_interval,
391 		    const struct ieee80211_ht_capabilities *ht_capab,
392 		    const struct ieee80211_vht_capabilities *vht_capab,
393 		    u32 flags, u8 qosinfo, u8 vht_opmode)
394 {
395 	struct hostapd_sta_add_params params;
396 
397 	if (hapd->driver == NULL)
398 		return 0;
399 	if (hapd->driver->sta_add == NULL)
400 		return 0;
401 
402 	os_memset(&params, 0, sizeof(params));
403 	params.addr = addr;
404 	params.aid = aid;
405 	params.capability = capability;
406 	params.supp_rates = supp_rates;
407 	params.supp_rates_len = supp_rates_len;
408 	params.listen_interval = listen_interval;
409 	params.ht_capabilities = ht_capab;
410 	params.vht_capabilities = vht_capab;
411 	params.vht_opmode_enabled = !!(flags & WLAN_STA_VHT_OPMODE_ENABLED);
412 	params.vht_opmode = vht_opmode;
413 	params.flags = hostapd_sta_flags_to_drv(flags);
414 	params.qosinfo = qosinfo;
415 	return hapd->driver->sta_add(hapd->drv_priv, &params);
416 }
417 
418 
419 int hostapd_add_tspec(struct hostapd_data *hapd, const u8 *addr,
420 		      u8 *tspec_ie, size_t tspec_ielen)
421 {
422 	if (hapd->driver == NULL || hapd->driver->add_tspec == NULL)
423 		return 0;
424 	return hapd->driver->add_tspec(hapd->drv_priv, addr, tspec_ie,
425 				       tspec_ielen);
426 }
427 
428 
429 int hostapd_set_privacy(struct hostapd_data *hapd, int enabled)
430 {
431 	if (hapd->driver == NULL || hapd->driver->set_privacy == NULL)
432 		return 0;
433 	return hapd->driver->set_privacy(hapd->drv_priv, enabled);
434 }
435 
436 
437 int hostapd_set_generic_elem(struct hostapd_data *hapd, const u8 *elem,
438 			     size_t elem_len)
439 {
440 	if (hapd->driver == NULL || hapd->driver->set_generic_elem == NULL)
441 		return 0;
442 	return hapd->driver->set_generic_elem(hapd->drv_priv, elem, elem_len);
443 }
444 
445 
446 int hostapd_get_ssid(struct hostapd_data *hapd, u8 *buf, size_t len)
447 {
448 	if (hapd->driver == NULL || hapd->driver->hapd_get_ssid == NULL)
449 		return 0;
450 	return hapd->driver->hapd_get_ssid(hapd->drv_priv, buf, len);
451 }
452 
453 
454 int hostapd_set_ssid(struct hostapd_data *hapd, const u8 *buf, size_t len)
455 {
456 	if (hapd->driver == NULL || hapd->driver->hapd_set_ssid == NULL)
457 		return 0;
458 	return hapd->driver->hapd_set_ssid(hapd->drv_priv, buf, len);
459 }
460 
461 
462 int hostapd_if_add(struct hostapd_data *hapd, enum wpa_driver_if_type type,
463 		   const char *ifname, const u8 *addr, void *bss_ctx,
464 		   void **drv_priv, char *force_ifname, u8 *if_addr,
465 		   const char *bridge, int use_existing)
466 {
467 	if (hapd->driver == NULL || hapd->driver->if_add == NULL)
468 		return -1;
469 	return hapd->driver->if_add(hapd->drv_priv, type, ifname, addr,
470 				    bss_ctx, drv_priv, force_ifname, if_addr,
471 				    bridge, use_existing);
472 }
473 
474 
475 int hostapd_if_remove(struct hostapd_data *hapd, enum wpa_driver_if_type type,
476 		      const char *ifname)
477 {
478 	if (hapd->driver == NULL || hapd->drv_priv == NULL ||
479 	    hapd->driver->if_remove == NULL)
480 		return -1;
481 	return hapd->driver->if_remove(hapd->drv_priv, type, ifname);
482 }
483 
484 
485 int hostapd_set_ieee8021x(struct hostapd_data *hapd,
486 			  struct wpa_bss_params *params)
487 {
488 	if (hapd->driver == NULL || hapd->driver->set_ieee8021x == NULL)
489 		return 0;
490 	return hapd->driver->set_ieee8021x(hapd->drv_priv, params);
491 }
492 
493 
494 int hostapd_get_seqnum(const char *ifname, struct hostapd_data *hapd,
495 		       const u8 *addr, int idx, u8 *seq)
496 {
497 	if (hapd->driver == NULL || hapd->driver->get_seqnum == NULL)
498 		return 0;
499 	return hapd->driver->get_seqnum(ifname, hapd->drv_priv, addr, idx,
500 					seq);
501 }
502 
503 
504 int hostapd_flush(struct hostapd_data *hapd)
505 {
506 	if (hapd->driver == NULL || hapd->driver->flush == NULL)
507 		return 0;
508 	return hapd->driver->flush(hapd->drv_priv);
509 }
510 
511 
512 int hostapd_set_freq(struct hostapd_data *hapd, enum hostapd_hw_mode mode,
513 		     int freq, int channel, int ht_enabled, int vht_enabled,
514 		     int sec_channel_offset, int vht_oper_chwidth,
515 		     int center_segment0, int center_segment1)
516 {
517 	struct hostapd_freq_params data;
518 
519 	if (hostapd_set_freq_params(&data, mode, freq, channel, ht_enabled,
520 				    vht_enabled, sec_channel_offset,
521 				    vht_oper_chwidth,
522 				    center_segment0, center_segment1,
523 				    hapd->iface->current_mode ?
524 				    hapd->iface->current_mode->vht_capab : 0))
525 		return -1;
526 
527 	if (hapd->driver == NULL)
528 		return 0;
529 	if (hapd->driver->set_freq == NULL)
530 		return 0;
531 	return hapd->driver->set_freq(hapd->drv_priv, &data);
532 }
533 
534 int hostapd_set_rts(struct hostapd_data *hapd, int rts)
535 {
536 	if (hapd->driver == NULL || hapd->driver->set_rts == NULL)
537 		return 0;
538 	return hapd->driver->set_rts(hapd->drv_priv, rts);
539 }
540 
541 
542 int hostapd_set_frag(struct hostapd_data *hapd, int frag)
543 {
544 	if (hapd->driver == NULL || hapd->driver->set_frag == NULL)
545 		return 0;
546 	return hapd->driver->set_frag(hapd->drv_priv, frag);
547 }
548 
549 
550 int hostapd_sta_set_flags(struct hostapd_data *hapd, u8 *addr,
551 			  int total_flags, int flags_or, int flags_and)
552 {
553 	if (hapd->driver == NULL || hapd->driver->sta_set_flags == NULL)
554 		return 0;
555 	return hapd->driver->sta_set_flags(hapd->drv_priv, addr, total_flags,
556 					   flags_or, flags_and);
557 }
558 
559 
560 int hostapd_set_country(struct hostapd_data *hapd, const char *country)
561 {
562 	if (hapd->driver == NULL ||
563 	    hapd->driver->set_country == NULL)
564 		return 0;
565 	return hapd->driver->set_country(hapd->drv_priv, country);
566 }
567 
568 
569 int hostapd_set_tx_queue_params(struct hostapd_data *hapd, int queue, int aifs,
570 				int cw_min, int cw_max, int burst_time)
571 {
572 	if (hapd->driver == NULL || hapd->driver->set_tx_queue_params == NULL)
573 		return 0;
574 	return hapd->driver->set_tx_queue_params(hapd->drv_priv, queue, aifs,
575 						 cw_min, cw_max, burst_time);
576 }
577 
578 
579 struct hostapd_hw_modes *
580 hostapd_get_hw_feature_data(struct hostapd_data *hapd, u16 *num_modes,
581 			    u16 *flags)
582 {
583 	if (hapd->driver == NULL ||
584 	    hapd->driver->get_hw_feature_data == NULL)
585 		return NULL;
586 	return hapd->driver->get_hw_feature_data(hapd->drv_priv, num_modes,
587 						 flags);
588 }
589 
590 
591 int hostapd_driver_commit(struct hostapd_data *hapd)
592 {
593 	if (hapd->driver == NULL || hapd->driver->commit == NULL)
594 		return 0;
595 	return hapd->driver->commit(hapd->drv_priv);
596 }
597 
598 
599 int hostapd_drv_none(struct hostapd_data *hapd)
600 {
601 	return hapd->driver && os_strcmp(hapd->driver->name, "none") == 0;
602 }
603 
604 
605 int hostapd_driver_scan(struct hostapd_data *hapd,
606 			struct wpa_driver_scan_params *params)
607 {
608 	if (hapd->driver && hapd->driver->scan2)
609 		return hapd->driver->scan2(hapd->drv_priv, params);
610 	return -1;
611 }
612 
613 
614 struct wpa_scan_results * hostapd_driver_get_scan_results(
615 	struct hostapd_data *hapd)
616 {
617 	if (hapd->driver && hapd->driver->get_scan_results2)
618 		return hapd->driver->get_scan_results2(hapd->drv_priv);
619 	return NULL;
620 }
621 
622 
623 int hostapd_driver_set_noa(struct hostapd_data *hapd, u8 count, int start,
624 			   int duration)
625 {
626 	if (hapd->driver && hapd->driver->set_noa)
627 		return hapd->driver->set_noa(hapd->drv_priv, count, start,
628 					     duration);
629 	return -1;
630 }
631 
632 
633 int hostapd_drv_set_key(const char *ifname, struct hostapd_data *hapd,
634 			enum wpa_alg alg, const u8 *addr,
635 			int key_idx, int set_tx,
636 			const u8 *seq, size_t seq_len,
637 			const u8 *key, size_t key_len)
638 {
639 	if (hapd->driver == NULL || hapd->driver->set_key == NULL)
640 		return 0;
641 	return hapd->driver->set_key(ifname, hapd->drv_priv, alg, addr,
642 				     key_idx, set_tx, seq, seq_len, key,
643 				     key_len);
644 }
645 
646 
647 int hostapd_drv_send_mlme(struct hostapd_data *hapd,
648 			  const void *msg, size_t len, int noack)
649 {
650 	if (hapd->driver == NULL || hapd->driver->send_mlme == NULL)
651 		return 0;
652 	return hapd->driver->send_mlme(hapd->drv_priv, msg, len, noack, 0);
653 }
654 
655 
656 int hostapd_drv_sta_deauth(struct hostapd_data *hapd,
657 			   const u8 *addr, int reason)
658 {
659 	if (hapd->driver == NULL || hapd->driver->sta_deauth == NULL)
660 		return 0;
661 	return hapd->driver->sta_deauth(hapd->drv_priv, hapd->own_addr, addr,
662 					reason);
663 }
664 
665 
666 int hostapd_drv_sta_disassoc(struct hostapd_data *hapd,
667 			     const u8 *addr, int reason)
668 {
669 	if (hapd->driver == NULL || hapd->driver->sta_disassoc == NULL)
670 		return 0;
671 	return hapd->driver->sta_disassoc(hapd->drv_priv, hapd->own_addr, addr,
672 					  reason);
673 }
674 
675 
676 int hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper,
677 			 const u8 *peer, u8 *buf, u16 *buf_len)
678 {
679 	if (hapd->driver == NULL || hapd->driver->wnm_oper == NULL)
680 		return -1;
681 	return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
682 				      buf_len);
683 }
684 
685 
686 int hostapd_drv_send_action(struct hostapd_data *hapd, unsigned int freq,
687 			    unsigned int wait, const u8 *dst, const u8 *data,
688 			    size_t len)
689 {
690 	if (hapd->driver == NULL || hapd->driver->send_action == NULL)
691 		return 0;
692 	return hapd->driver->send_action(hapd->drv_priv, freq, wait, dst,
693 					 hapd->own_addr, hapd->own_addr, data,
694 					 len, 0);
695 }
696 
697 
698 int hostapd_start_dfs_cac(struct hostapd_iface *iface,
699 			  enum hostapd_hw_mode mode, int freq,
700 			  int channel, int ht_enabled, int vht_enabled,
701 			  int sec_channel_offset, int vht_oper_chwidth,
702 			  int center_segment0, int center_segment1)
703 {
704 	struct hostapd_data *hapd = iface->bss[0];
705 	struct hostapd_freq_params data;
706 	int res;
707 
708 	if (!hapd->driver || !hapd->driver->start_dfs_cac)
709 		return 0;
710 
711 	if (!iface->conf->ieee80211h) {
712 		wpa_printf(MSG_ERROR, "Can't start DFS CAC, DFS functionality "
713 			   "is not enabled");
714 		return -1;
715 	}
716 
717 	if (hostapd_set_freq_params(&data, mode, freq, channel, ht_enabled,
718 				    vht_enabled, sec_channel_offset,
719 				    vht_oper_chwidth, center_segment0,
720 				    center_segment1,
721 				    iface->current_mode->vht_capab)) {
722 		wpa_printf(MSG_ERROR, "Can't set freq params");
723 		return -1;
724 	}
725 
726 	res = hapd->driver->start_dfs_cac(hapd->drv_priv, &data);
727 	if (!res) {
728 		iface->cac_started = 1;
729 		os_get_reltime(&iface->dfs_cac_start);
730 	}
731 
732 	return res;
733 }
734 
735 
736 int hostapd_drv_set_qos_map(struct hostapd_data *hapd,
737 			    const u8 *qos_map_set, u8 qos_map_set_len)
738 {
739 	if (hapd->driver == NULL || hapd->driver->set_qos_map == NULL)
740 		return 0;
741 	return hapd->driver->set_qos_map(hapd->drv_priv, qos_map_set,
742 					 qos_map_set_len);
743 }
744 
745 
746 static void hostapd_get_hw_mode_any_channels(struct hostapd_data *hapd,
747 					     struct hostapd_hw_modes *mode,
748 					     int acs_ch_list_all,
749 					     int **freq_list)
750 {
751 	int i;
752 
753 	for (i = 0; i < mode->num_channels; i++) {
754 		struct hostapd_channel_data *chan = &mode->channels[i];
755 
756 		if ((acs_ch_list_all ||
757 		     freq_range_list_includes(&hapd->iface->conf->acs_ch_list,
758 					      chan->chan)) &&
759 		    !(chan->flag & HOSTAPD_CHAN_DISABLED))
760 			int_array_add_unique(freq_list, chan->freq);
761 	}
762 }
763 
764 
765 int hostapd_drv_do_acs(struct hostapd_data *hapd)
766 {
767 	struct drv_acs_params params;
768 	int ret, i, acs_ch_list_all = 0;
769 	u8 *channels = NULL;
770 	unsigned int num_channels = 0;
771 	struct hostapd_hw_modes *mode;
772 	int *freq_list = NULL;
773 
774 	if (hapd->driver == NULL || hapd->driver->do_acs == NULL)
775 		return 0;
776 
777 	os_memset(&params, 0, sizeof(params));
778 	params.hw_mode = hapd->iface->conf->hw_mode;
779 
780 	/*
781 	 * If no chanlist config parameter is provided, include all enabled
782 	 * channels of the selected hw_mode.
783 	 */
784 	if (!hapd->iface->conf->acs_ch_list.num)
785 		acs_ch_list_all = 1;
786 
787 	mode = hapd->iface->current_mode;
788 	if (mode) {
789 		channels = os_malloc(mode->num_channels);
790 		if (channels == NULL)
791 			return -1;
792 
793 		for (i = 0; i < mode->num_channels; i++) {
794 			struct hostapd_channel_data *chan = &mode->channels[i];
795 			if (!acs_ch_list_all &&
796 			    !freq_range_list_includes(
797 				    &hapd->iface->conf->acs_ch_list,
798 				    chan->chan))
799 				continue;
800 			if (!(chan->flag & HOSTAPD_CHAN_DISABLED)) {
801 				channels[num_channels++] = chan->chan;
802 				int_array_add_unique(&freq_list, chan->freq);
803 			}
804 		}
805 	} else {
806 		for (i = 0; i < hapd->iface->num_hw_features; i++) {
807 			mode = &hapd->iface->hw_features[i];
808 			hostapd_get_hw_mode_any_channels(hapd, mode,
809 							 acs_ch_list_all,
810 							 &freq_list);
811 		}
812 	}
813 
814 	params.ch_list = channels;
815 	params.ch_list_len = num_channels;
816 	params.freq_list = freq_list;
817 
818 	params.ht_enabled = !!(hapd->iface->conf->ieee80211n);
819 	params.ht40_enabled = !!(hapd->iface->conf->ht_capab &
820 				 HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET);
821 	params.vht_enabled = !!(hapd->iface->conf->ieee80211ac);
822 	params.ch_width = 20;
823 	if (hapd->iface->conf->ieee80211n && params.ht40_enabled)
824 		params.ch_width = 40;
825 
826 	/* Note: VHT20 is defined by combination of ht_capab & vht_oper_chwidth
827 	 */
828 	if (hapd->iface->conf->ieee80211ac && params.ht40_enabled) {
829 		if (hapd->iface->conf->vht_oper_chwidth == VHT_CHANWIDTH_80MHZ)
830 			params.ch_width = 80;
831 		else if (hapd->iface->conf->vht_oper_chwidth ==
832 			 VHT_CHANWIDTH_160MHZ ||
833 			 hapd->iface->conf->vht_oper_chwidth ==
834 			 VHT_CHANWIDTH_80P80MHZ)
835 			params.ch_width = 160;
836 	}
837 
838 	ret = hapd->driver->do_acs(hapd->drv_priv, &params);
839 	os_free(channels);
840 
841 	return ret;
842 }
843