Move more multi-BSSID processing into drv_callbacks.c
[wpasupplicant] / src / drivers / driver_nl80211.c
1 /*
2  * Driver interaction with Linux nl80211/cfg80211
3  * Copyright (c) 2002-2008, Jouni Malinen <j@w1.fi>
4  * Copyright (c) 2003-2004, Instant802 Networks, Inc.
5  * Copyright (c) 2005-2006, Devicescape Software, Inc.
6  * Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
7  * Copyright (c) 2009, Atheros Communications
8  *
9  * This program is free software; you can redistribute it and/or modify
10  * it under the terms of the GNU General Public License version 2 as
11  * published by the Free Software Foundation.
12  *
13  * Alternatively, this software may be distributed under the terms of BSD
14  * license.
15  *
16  * See README and COPYING for more details.
17  */
18
19 #include "includes.h"
20 #include <sys/ioctl.h>
21 #include <net/if_arp.h>
22 #include <net/if.h>
23 #include <netlink/genl/genl.h>
24 #include <netlink/genl/family.h>
25 #include <netlink/genl/ctrl.h>
26 #include "nl80211_copy.h"
27 #ifndef NO_WEXT
28 #include "wireless_copy.h"
29 #endif /* NO_WEXT */
30
31 #include "common.h"
32 #include "driver.h"
33 #include "eloop.h"
34 #include "ieee802_11_defs.h"
35
36 #if defined(CONFIG_AP) || defined(HOSTAPD)
37 #include <netpacket/packet.h>
38 #include <linux/filter.h>
39 #include "radiotap.h"
40 #include "radiotap_iter.h"
41
42 #include "../../hostapd/hostapd_defs.h"
43 #endif /* CONFIG_AP || HOSTAPD */
44
45 #ifdef HOSTAPD
46 #include "../../hostapd/sta_flags.h"
47 #include "ieee802_11_common.h"
48
49 #ifdef CONFIG_LIBNL20
50 /* libnl 2.0 compatibility code */
51 #define nl_handle_alloc_cb nl_socket_alloc_cb
52 #define nl_handle_destroy nl_socket_free
53 #endif /* CONFIG_LIBNL20 */
54
55 #endif /* HOSTAPD */
56
57
58 #ifndef IFF_LOWER_UP
59 #define IFF_LOWER_UP   0x10000         /* driver signals L1 up         */
60 #endif
61 #ifndef IFF_DORMANT
62 #define IFF_DORMANT    0x20000         /* driver signals dormant       */
63 #endif
64
65 #ifndef IF_OPER_DORMANT
66 #define IF_OPER_DORMANT 5
67 #endif
68 #ifndef IF_OPER_UP
69 #define IF_OPER_UP 6
70 #endif
71
72 struct i802_bss {
73         struct i802_bss *next;
74         int ifindex;
75         unsigned int beacon_set:1;
76 };
77
78 struct wpa_driver_nl80211_data {
79         void *ctx;
80         int link_event_sock;
81         int ioctl_sock; /* socket for ioctl() use */
82         char ifname[IFNAMSIZ + 1];
83         int ifindex;
84         int if_removed;
85         struct wpa_driver_capa capa;
86         int has_capability;
87
88         int operstate;
89
90         int scan_complete_events;
91
92         struct nl_handle *nl_handle;
93         struct nl_cache *nl_cache;
94         struct nl_cb *nl_cb;
95         struct genl_family *nl80211;
96
97         u8 bssid[ETH_ALEN];
98         int associated;
99         u8 ssid[32];
100         size_t ssid_len;
101         int nlmode;
102         int ap_scan_as_station;
103
104         int beacon_int;
105         int monitor_sock;
106         int monitor_ifidx;
107
108 #ifdef CONFIG_AP
109         unsigned int beacon_set:1;
110 #endif /* CONFIG_AP */
111
112 #ifdef HOSTAPD
113         int eapol_sock; /* socket for EAPOL frames */
114
115         int default_if_indices[16];
116         int *if_indices;
117         int num_if_indices;
118
119         struct i802_bss bss;
120
121         int last_freq;
122         int last_freq_ht;
123 #endif /* HOSTAPD */
124 };
125
126
127 static void wpa_driver_nl80211_scan_timeout(void *eloop_ctx,
128                                             void *timeout_ctx);
129 static int wpa_driver_nl80211_set_mode(void *priv, int mode);
130 static int
131 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv);
132
133 #ifdef CONFIG_AP
134 static void nl80211_remove_iface(struct wpa_driver_nl80211_data *drv,
135                                  int ifidx);
136 #endif /* CONFIG_AP */
137
138 #ifdef HOSTAPD
139 static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
140 static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
141 static struct i802_bss * get_bss(struct wpa_driver_nl80211_data *drv,
142                                  int ifindex);
143 static void nl80211_remove_iface(struct wpa_driver_nl80211_data *drv,
144                                  int ifidx);
145 static int i802_set_freq(void *priv, struct hostapd_freq_params *freq);
146 static int i802_del_beacon(struct wpa_driver_nl80211_data *drv);
147 #endif /* HOSTAPD */
148
149
150 /* nl80211 code */
151 static int ack_handler(struct nl_msg *msg, void *arg)
152 {
153         int *err = arg;
154         *err = 0;
155         return NL_STOP;
156 }
157
158 static int finish_handler(struct nl_msg *msg, void *arg)
159 {
160         int *ret = arg;
161         *ret = 0;
162         return NL_SKIP;
163 }
164
165 static int error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err,
166                          void *arg)
167 {
168         int *ret = arg;
169         *ret = err->error;
170         return NL_SKIP;
171 }
172
173
174 static int no_seq_check(struct nl_msg *msg, void *arg)
175 {
176         return NL_OK;
177 }
178
179
180 static int send_and_recv_msgs(struct wpa_driver_nl80211_data *drv,
181                               struct nl_msg *msg,
182                               int (*valid_handler)(struct nl_msg *, void *),
183                               void *valid_data)
184 {
185         struct nl_cb *cb;
186         int err = -ENOMEM;
187
188         cb = nl_cb_clone(drv->nl_cb);
189         if (!cb)
190                 goto out;
191
192         err = nl_send_auto_complete(drv->nl_handle, msg);
193         if (err < 0)
194                 goto out;
195
196         err = 1;
197
198         nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &err);
199         nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, &err);
200         nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, ack_handler, &err);
201
202         if (valid_handler)
203                 nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM,
204                           valid_handler, valid_data);
205
206         while (err > 0)
207                 nl_recvmsgs(drv->nl_handle, cb);
208  out:
209         nl_cb_put(cb);
210         nlmsg_free(msg);
211         return err;
212 }
213
214
215 struct family_data {
216         const char *group;
217         int id;
218 };
219
220
221 static int family_handler(struct nl_msg *msg, void *arg)
222 {
223         struct family_data *res = arg;
224         struct nlattr *tb[CTRL_ATTR_MAX + 1];
225         struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
226         struct nlattr *mcgrp;
227         int i;
228
229         nla_parse(tb, CTRL_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
230                   genlmsg_attrlen(gnlh, 0), NULL);
231         if (!tb[CTRL_ATTR_MCAST_GROUPS])
232                 return NL_SKIP;
233
234         nla_for_each_nested(mcgrp, tb[CTRL_ATTR_MCAST_GROUPS], i) {
235                 struct nlattr *tb2[CTRL_ATTR_MCAST_GRP_MAX + 1];
236                 nla_parse(tb2, CTRL_ATTR_MCAST_GRP_MAX, nla_data(mcgrp),
237                           nla_len(mcgrp), NULL);
238                 if (!tb2[CTRL_ATTR_MCAST_GRP_NAME] ||
239                     !tb2[CTRL_ATTR_MCAST_GRP_ID] ||
240                     os_strncmp(nla_data(tb2[CTRL_ATTR_MCAST_GRP_NAME]),
241                                res->group,
242                                nla_len(tb2[CTRL_ATTR_MCAST_GRP_NAME])) != 0)
243                         continue;
244                 res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]);
245                 break;
246         };
247
248         return NL_SKIP;
249 }
250
251
252 static int nl_get_multicast_id(struct wpa_driver_nl80211_data *drv,
253                                const char *family, const char *group)
254 {
255         struct nl_msg *msg;
256         int ret = -1;
257         struct family_data res = { group, -ENOENT };
258
259         msg = nlmsg_alloc();
260         if (!msg)
261                 return -ENOMEM;
262         genlmsg_put(msg, 0, 0, genl_ctrl_resolve(drv->nl_handle, "nlctrl"),
263                     0, 0, CTRL_CMD_GETFAMILY, 0);
264         NLA_PUT_STRING(msg, CTRL_ATTR_FAMILY_NAME, family);
265
266         ret = send_and_recv_msgs(drv, msg, family_handler, &res);
267         msg = NULL;
268         if (ret == 0)
269                 ret = res.id;
270
271 nla_put_failure:
272         nlmsg_free(msg);
273         return ret;
274 }
275
276
277 #ifdef HOSTAPD
278 static int get_ifhwaddr(struct wpa_driver_nl80211_data *drv,
279                         const char *ifname, u8 *addr)
280 {
281         struct ifreq ifr;
282
283         os_memset(&ifr, 0, sizeof(ifr));
284         os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
285         if (ioctl(drv->ioctl_sock, SIOCGIFHWADDR, &ifr)) {
286                 wpa_printf(MSG_ERROR, "%s: ioctl(SIOCGIFHWADDR): %d (%s)",
287                            ifname, errno, strerror(errno));
288                 return -1;
289         }
290
291         if (ifr.ifr_hwaddr.sa_family != ARPHRD_ETHER) {
292                 wpa_printf(MSG_ERROR, "%s: Invalid HW-addr family 0x%04x",
293                            ifname, ifr.ifr_hwaddr.sa_family);
294                 return -1;
295         }
296         os_memcpy(addr, ifr.ifr_hwaddr.sa_data, ETH_ALEN);
297
298         return 0;
299 }
300
301
302 static int set_ifhwaddr(struct wpa_driver_nl80211_data *drv,
303                         const char *ifname, const u8 *addr)
304 {
305         struct ifreq ifr;
306
307         os_memset(&ifr, 0, sizeof(ifr));
308         os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
309         os_memcpy(ifr.ifr_hwaddr.sa_data, addr, ETH_ALEN);
310         ifr.ifr_hwaddr.sa_family = ARPHRD_ETHER;
311
312         if (ioctl(drv->ioctl_sock, SIOCSIFHWADDR, &ifr)) {
313                 wpa_printf(MSG_DEBUG, "%s: ioctl(SIOCSIFHWADDR): %d (%s)",
314                            ifname, errno, strerror(errno));
315                 return -1;
316         }
317
318         return 0;
319 }
320 #endif /* HOSTAPD */
321
322
323 static int wpa_driver_nl80211_send_oper_ifla(
324         struct wpa_driver_nl80211_data *drv,
325         int linkmode, int operstate)
326 {
327         struct {
328                 struct nlmsghdr hdr;
329                 struct ifinfomsg ifinfo;
330                 char opts[16];
331         } req;
332         struct rtattr *rta;
333         static int nl_seq;
334         ssize_t ret;
335
336         os_memset(&req, 0, sizeof(req));
337
338         req.hdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
339         req.hdr.nlmsg_type = RTM_SETLINK;
340         req.hdr.nlmsg_flags = NLM_F_REQUEST;
341         req.hdr.nlmsg_seq = ++nl_seq;
342         req.hdr.nlmsg_pid = 0;
343
344         req.ifinfo.ifi_family = AF_UNSPEC;
345         req.ifinfo.ifi_type = 0;
346         req.ifinfo.ifi_index = drv->ifindex;
347         req.ifinfo.ifi_flags = 0;
348         req.ifinfo.ifi_change = 0;
349
350         if (linkmode != -1) {
351                 rta = (struct rtattr *)
352                         ((char *) &req + NLMSG_ALIGN(req.hdr.nlmsg_len));
353                 rta->rta_type = IFLA_LINKMODE;
354                 rta->rta_len = RTA_LENGTH(sizeof(char));
355                 *((char *) RTA_DATA(rta)) = linkmode;
356                 req.hdr.nlmsg_len = NLMSG_ALIGN(req.hdr.nlmsg_len) +
357                         RTA_LENGTH(sizeof(char));
358         }
359         if (operstate != -1) {
360                 rta = (struct rtattr *)
361                         ((char *) &req + NLMSG_ALIGN(req.hdr.nlmsg_len));
362                 rta->rta_type = IFLA_OPERSTATE;
363                 rta->rta_len = RTA_LENGTH(sizeof(char));
364                 *((char *) RTA_DATA(rta)) = operstate;
365                 req.hdr.nlmsg_len = NLMSG_ALIGN(req.hdr.nlmsg_len) +
366                         RTA_LENGTH(sizeof(char));
367         }
368
369         wpa_printf(MSG_DEBUG, "nl80211: Operstate: linkmode=%d, operstate=%d",
370                    linkmode, operstate);
371
372         ret = send(drv->link_event_sock, &req, req.hdr.nlmsg_len, 0);
373         if (ret < 0) {
374                 wpa_printf(MSG_DEBUG, "nl80211: Sending operstate IFLA failed:"
375                            " %s (assume operstate is not supported)",
376                            strerror(errno));
377         }
378
379         return ret < 0 ? -1 : 0;
380 }
381
382
383 #ifndef NO_WEXT
384 static int wpa_driver_nl80211_set_auth_param(
385         struct wpa_driver_nl80211_data *drv, int idx, u32 value)
386 {
387         struct iwreq iwr;
388         int ret = 0;
389
390         os_memset(&iwr, 0, sizeof(iwr));
391         os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
392         iwr.u.param.flags = idx & IW_AUTH_INDEX;
393         iwr.u.param.value = value;
394
395         if (ioctl(drv->ioctl_sock, SIOCSIWAUTH, &iwr) < 0) {
396                 if (errno != EOPNOTSUPP) {
397                         wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d "
398                                    "value 0x%x) failed: %s)",
399                                    idx, value, strerror(errno));
400                 }
401                 ret = errno == EOPNOTSUPP ? -2 : -1;
402         }
403
404         return ret;
405 }
406 #endif /* NO_WEXT */
407
408
409 static int wpa_driver_nl80211_get_bssid(void *priv, u8 *bssid)
410 {
411         struct wpa_driver_nl80211_data *drv = priv;
412         if (!drv->associated)
413                 return -1;
414         os_memcpy(bssid, drv->bssid, ETH_ALEN);
415         return 0;
416 }
417
418
419 static int wpa_driver_nl80211_get_ssid(void *priv, u8 *ssid)
420 {
421         struct wpa_driver_nl80211_data *drv = priv;
422         if (!drv->associated)
423                 return -1;
424         os_memcpy(ssid, drv->ssid, drv->ssid_len);
425         return drv->ssid_len;
426 }
427
428
429 #ifndef HOSTAPD
430 static void wpa_driver_nl80211_event_link(struct wpa_driver_nl80211_data *drv,
431                                           void *ctx, char *buf, size_t len,
432                                           int del)
433 {
434         union wpa_event_data event;
435
436         os_memset(&event, 0, sizeof(event));
437         if (len > sizeof(event.interface_status.ifname))
438                 len = sizeof(event.interface_status.ifname) - 1;
439         os_memcpy(event.interface_status.ifname, buf, len);
440         event.interface_status.ievent = del ? EVENT_INTERFACE_REMOVED :
441                 EVENT_INTERFACE_ADDED;
442
443         wpa_printf(MSG_DEBUG, "RTM_%sLINK, IFLA_IFNAME: Interface '%s' %s",
444                    del ? "DEL" : "NEW",
445                    event.interface_status.ifname,
446                    del ? "removed" : "added");
447
448         if (os_strcmp(drv->ifname, event.interface_status.ifname) == 0) {
449                 if (del)
450                         drv->if_removed = 1;
451                 else
452                         drv->if_removed = 0;
453         }
454
455         wpa_supplicant_event(ctx, EVENT_INTERFACE_STATUS, &event);
456 }
457
458
459 static int wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data *drv,
460                                          struct nlmsghdr *h)
461 {
462         struct ifinfomsg *ifi;
463         int attrlen, _nlmsg_len, rta_len;
464         struct rtattr *attr;
465
466         ifi = NLMSG_DATA(h);
467
468         _nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
469
470         attrlen = h->nlmsg_len - _nlmsg_len;
471         if (attrlen < 0)
472                 return 0;
473
474         attr = (struct rtattr *) (((char *) ifi) + _nlmsg_len);
475
476         rta_len = RTA_ALIGN(sizeof(struct rtattr));
477         while (RTA_OK(attr, attrlen)) {
478                 if (attr->rta_type == IFLA_IFNAME) {
479                         if (os_strcmp(((char *) attr) + rta_len, drv->ifname)
480                             == 0)
481                                 return 1;
482                         else
483                                 break;
484                 }
485                 attr = RTA_NEXT(attr, attrlen);
486         }
487
488         return 0;
489 }
490
491
492 static int wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data *drv,
493                                           int ifindex, struct nlmsghdr *h)
494 {
495         if (drv->ifindex == ifindex)
496                 return 1;
497
498         if (drv->if_removed && wpa_driver_nl80211_own_ifname(drv, h)) {
499                 drv->ifindex = if_nametoindex(drv->ifname);
500                 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
501                            "interface");
502                 wpa_driver_nl80211_finish_drv_init(drv);
503                 return 1;
504         }
505
506         return 0;
507 }
508
509
510 static void wpa_driver_nl80211_event_rtm_newlink(struct wpa_driver_nl80211_data *drv,
511                                               void *ctx, struct nlmsghdr *h,
512                                               size_t len)
513 {
514         struct ifinfomsg *ifi;
515         int attrlen, _nlmsg_len, rta_len;
516         struct rtattr * attr;
517
518         if (len < sizeof(*ifi))
519                 return;
520
521         ifi = NLMSG_DATA(h);
522
523         if (!wpa_driver_nl80211_own_ifindex(drv, ifi->ifi_index, h)) {
524                 wpa_printf(MSG_DEBUG, "Ignore event for foreign ifindex %d",
525                            ifi->ifi_index);
526                 return;
527         }
528
529         wpa_printf(MSG_DEBUG, "RTM_NEWLINK: operstate=%d ifi_flags=0x%x "
530                    "(%s%s%s%s)",
531                    drv->operstate, ifi->ifi_flags,
532                    (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
533                    (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
534                    (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
535                    (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
536         /*
537          * Some drivers send the association event before the operup event--in
538          * this case, lifting operstate in wpa_driver_nl80211_set_operstate()
539          * fails. This will hit us when wpa_supplicant does not need to do
540          * IEEE 802.1X authentication
541          */
542         if (drv->operstate == 1 &&
543             (ifi->ifi_flags & (IFF_LOWER_UP | IFF_DORMANT)) == IFF_LOWER_UP &&
544             !(ifi->ifi_flags & IFF_RUNNING))
545                 wpa_driver_nl80211_send_oper_ifla(drv, -1, IF_OPER_UP);
546
547         _nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
548
549         attrlen = h->nlmsg_len - _nlmsg_len;
550         if (attrlen < 0)
551                 return;
552
553         attr = (struct rtattr *) (((char *) ifi) + _nlmsg_len);
554
555         rta_len = RTA_ALIGN(sizeof(struct rtattr));
556         while (RTA_OK(attr, attrlen)) {
557                 if (attr->rta_type == IFLA_IFNAME) {
558                         wpa_driver_nl80211_event_link(
559                                 drv, ctx,
560                                 ((char *) attr) + rta_len,
561                                 attr->rta_len - rta_len, 0);
562                 }
563                 attr = RTA_NEXT(attr, attrlen);
564         }
565 }
566
567
568 static void wpa_driver_nl80211_event_rtm_dellink(struct wpa_driver_nl80211_data *drv,
569                                               void *ctx, struct nlmsghdr *h,
570                                               size_t len)
571 {
572         struct ifinfomsg *ifi;
573         int attrlen, _nlmsg_len, rta_len;
574         struct rtattr * attr;
575
576         if (len < sizeof(*ifi))
577                 return;
578
579         ifi = NLMSG_DATA(h);
580
581         _nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
582
583         attrlen = h->nlmsg_len - _nlmsg_len;
584         if (attrlen < 0)
585                 return;
586
587         attr = (struct rtattr *) (((char *) ifi) + _nlmsg_len);
588
589         rta_len = RTA_ALIGN(sizeof(struct rtattr));
590         while (RTA_OK(attr, attrlen)) {
591                 if (attr->rta_type == IFLA_IFNAME) {
592                         wpa_driver_nl80211_event_link(
593                                 drv, ctx,
594                                 ((char *) attr) + rta_len,
595                                 attr->rta_len - rta_len, 1);
596                 }
597                 attr = RTA_NEXT(attr, attrlen);
598         }
599 }
600
601
602 static void wpa_driver_nl80211_event_receive_link(int sock, void *eloop_ctx,
603                                                   void *sock_ctx)
604 {
605         char buf[8192];
606         int left;
607         struct sockaddr_nl from;
608         socklen_t fromlen;
609         struct nlmsghdr *h;
610         int max_events = 10;
611
612 try_again:
613         fromlen = sizeof(from);
614         left = recvfrom(sock, buf, sizeof(buf), MSG_DONTWAIT,
615                         (struct sockaddr *) &from, &fromlen);
616         if (left < 0) {
617                 if (errno != EINTR && errno != EAGAIN)
618                         perror("recvfrom(netlink)");
619                 return;
620         }
621
622         h = (struct nlmsghdr *) buf;
623         while (left >= (int) sizeof(*h)) {
624                 int len, plen;
625
626                 len = h->nlmsg_len;
627                 plen = len - sizeof(*h);
628                 if (len > left || plen < 0) {
629                         wpa_printf(MSG_DEBUG, "Malformed netlink message: "
630                                    "len=%d left=%d plen=%d",
631                                    len, left, plen);
632                         break;
633                 }
634
635                 switch (h->nlmsg_type) {
636                 case RTM_NEWLINK:
637                         wpa_driver_nl80211_event_rtm_newlink(eloop_ctx, sock_ctx,
638                                                           h, plen);
639                         break;
640                 case RTM_DELLINK:
641                         wpa_driver_nl80211_event_rtm_dellink(eloop_ctx, sock_ctx,
642                                                           h, plen);
643                         break;
644                 }
645
646                 len = NLMSG_ALIGN(len);
647                 left -= len;
648                 h = (struct nlmsghdr *) ((char *) h + len);
649         }
650
651         if (left > 0) {
652                 wpa_printf(MSG_DEBUG, "%d extra bytes in the end of netlink "
653                            "message", left);
654         }
655
656         if (--max_events > 0) {
657                 /*
658                  * Try to receive all events in one eloop call in order to
659                  * limit race condition on cases where AssocInfo event, Assoc
660                  * event, and EAPOL frames are received more or less at the
661                  * same time. We want to process the event messages first
662                  * before starting EAPOL processing.
663                  */
664                 goto try_again;
665         }
666 }
667
668
669 static void mlme_event_auth(struct wpa_driver_nl80211_data *drv,
670                             const u8 *frame, size_t len)
671 {
672         const struct ieee80211_mgmt *mgmt;
673         union wpa_event_data event;
674
675         mgmt = (const struct ieee80211_mgmt *) frame;
676         if (len < 24 + sizeof(mgmt->u.auth)) {
677                 wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
678                            "frame");
679                 return;
680         }
681
682         os_memset(&event, 0, sizeof(event));
683         os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
684         event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg);
685         event.auth.status_code = le_to_host16(mgmt->u.auth.status_code);
686         if (len > 24 + sizeof(mgmt->u.auth)) {
687                 event.auth.ies = mgmt->u.auth.variable;
688                 event.auth.ies_len = len - 24 - sizeof(mgmt->u.auth);
689         }
690
691         wpa_supplicant_event(drv->ctx, EVENT_AUTH, &event);
692 }
693
694
695 static void mlme_event_assoc(struct wpa_driver_nl80211_data *drv,
696                             const u8 *frame, size_t len)
697 {
698         const struct ieee80211_mgmt *mgmt;
699         union wpa_event_data event;
700         u16 status;
701
702         mgmt = (const struct ieee80211_mgmt *) frame;
703         if (len < 24 + sizeof(mgmt->u.assoc_resp)) {
704                 wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
705                            "frame");
706                 return;
707         }
708
709         status = le_to_host16(mgmt->u.assoc_resp.status_code);
710         if (status != WLAN_STATUS_SUCCESS) {
711                 os_memset(&event, 0, sizeof(event));
712                 if (len > 24 + sizeof(mgmt->u.assoc_resp)) {
713                         event.assoc_reject.resp_ies =
714                                 (u8 *) mgmt->u.assoc_resp.variable;
715                         event.assoc_reject.resp_ies_len =
716                                 len - 24 - sizeof(mgmt->u.assoc_resp);
717                 }
718                 event.assoc_reject.status_code = status;
719
720                 wpa_supplicant_event(drv->ctx, EVENT_ASSOC_REJECT, &event);
721                 return;
722         }
723
724         drv->associated = 1;
725         os_memcpy(drv->bssid, mgmt->sa, ETH_ALEN);
726
727         os_memset(&event, 0, sizeof(event));
728         if (len > 24 + sizeof(mgmt->u.assoc_resp)) {
729                 event.assoc_info.resp_ies = (u8 *) mgmt->u.assoc_resp.variable;
730                 event.assoc_info.resp_ies_len =
731                         len - 24 - sizeof(mgmt->u.assoc_resp);
732         }
733
734         wpa_supplicant_event(drv->ctx, EVENT_ASSOC, &event);
735 }
736
737
738 static void mlme_event(struct wpa_driver_nl80211_data *drv,
739                        enum nl80211_commands cmd, struct nlattr *frame)
740 {
741         if (frame == NULL) {
742                 wpa_printf(MSG_DEBUG, "nl80211: MLME event %d without frame "
743                            "data", cmd);
744                 return;
745         }
746
747         wpa_printf(MSG_DEBUG, "nl80211: MLME event %d", cmd);
748         wpa_hexdump(MSG_MSGDUMP, "nl80211: MLME event frame",
749                     nla_data(frame), nla_len(frame));
750
751         switch (cmd) {
752         case NL80211_CMD_AUTHENTICATE:
753                 mlme_event_auth(drv, nla_data(frame), nla_len(frame));
754                 break;
755         case NL80211_CMD_ASSOCIATE:
756                 mlme_event_assoc(drv, nla_data(frame), nla_len(frame));
757                 break;
758         case NL80211_CMD_DEAUTHENTICATE:
759                 drv->associated = 0;
760                 wpa_supplicant_event(drv->ctx, EVENT_DEAUTH, NULL);
761                 break;
762         case NL80211_CMD_DISASSOCIATE:
763                 drv->associated = 0;
764                 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
765                 break;
766         default:
767                 break;
768         }
769 }
770
771 #endif /* HOSTAPD */
772
773
774 static void mlme_event_michael_mic_failure(struct wpa_driver_nl80211_data *drv,
775                                            struct nlattr *tb[])
776 {
777         union wpa_event_data data;
778
779         wpa_printf(MSG_DEBUG, "nl80211: MLME event Michael MIC failure");
780         os_memset(&data, 0, sizeof(data));
781         if (tb[NL80211_ATTR_MAC]) {
782                 wpa_hexdump(MSG_DEBUG, "nl80211: Source MAC address",
783                             nla_data(tb[NL80211_ATTR_MAC]),
784                             nla_len(tb[NL80211_ATTR_MAC]));
785                 data.michael_mic_failure.src = nla_data(tb[NL80211_ATTR_MAC]);
786         }
787         if (tb[NL80211_ATTR_KEY_SEQ]) {
788                 wpa_hexdump(MSG_DEBUG, "nl80211: TSC",
789                             nla_data(tb[NL80211_ATTR_KEY_SEQ]),
790                             nla_len(tb[NL80211_ATTR_KEY_SEQ]));
791         }
792         if (tb[NL80211_ATTR_KEY_TYPE]) {
793                 enum nl80211_key_type key_type =
794                         nla_get_u32(tb[NL80211_ATTR_KEY_TYPE]);
795                 wpa_printf(MSG_DEBUG, "nl80211: Key Type %d", key_type);
796                 if (key_type == NL80211_KEYTYPE_PAIRWISE)
797                         data.michael_mic_failure.unicast = 1;
798         } else
799                 data.michael_mic_failure.unicast = 1;
800
801         if (tb[NL80211_ATTR_KEY_IDX]) {
802                 u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]);
803                 wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id);
804         }
805
806         wpa_supplicant_event(drv->ctx, EVENT_MICHAEL_MIC_FAILURE, &data);
807 }
808
809
810 static int process_event(struct nl_msg *msg, void *arg)
811 {
812         struct wpa_driver_nl80211_data *drv = arg;
813         struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
814         struct nlattr *tb[NL80211_ATTR_MAX + 1];
815
816         nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
817                   genlmsg_attrlen(gnlh, 0), NULL);
818
819         if (tb[NL80211_ATTR_IFINDEX]) {
820                 int ifindex = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
821                 if (ifindex != drv->ifindex) {
822                         wpa_printf(MSG_DEBUG, "nl80211: Ignored event (cmd=%d)"
823                                    " for foreign interface (ifindex %d)",
824                                    gnlh->cmd, ifindex);
825                         return NL_SKIP;
826                 }
827         }
828
829         if (drv->ap_scan_as_station &&
830             (gnlh->cmd == NL80211_CMD_NEW_SCAN_RESULTS ||
831              gnlh->cmd == NL80211_CMD_SCAN_ABORTED)) {
832                 wpa_driver_nl80211_set_mode(drv, IEEE80211_MODE_AP);
833                 drv->ap_scan_as_station = 0;
834         }
835
836         switch (gnlh->cmd) {
837         case NL80211_CMD_NEW_SCAN_RESULTS:
838                 wpa_printf(MSG_DEBUG, "nl80211: New scan results available");
839                 drv->scan_complete_events = 1;
840                 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv,
841                                      drv->ctx);
842                 wpa_supplicant_event(drv->ctx, EVENT_SCAN_RESULTS, NULL);
843                 break;
844         case NL80211_CMD_SCAN_ABORTED:
845                 wpa_printf(MSG_DEBUG, "nl80211: Scan aborted");
846                 /*
847                  * Need to indicate that scan results are available in order
848                  * not to make wpa_supplicant stop its scanning.
849                  */
850                 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv,
851                                      drv->ctx);
852                 wpa_supplicant_event(drv->ctx, EVENT_SCAN_RESULTS, NULL);
853                 break;
854 #ifndef HOSTAPD
855         case NL80211_CMD_AUTHENTICATE:
856         case NL80211_CMD_ASSOCIATE:
857         case NL80211_CMD_DEAUTHENTICATE:
858         case NL80211_CMD_DISASSOCIATE:
859                 mlme_event(drv, gnlh->cmd, tb[NL80211_ATTR_FRAME]);
860                 break;
861 #endif /* HOSTAPD */
862         case NL80211_CMD_MICHAEL_MIC_FAILURE:
863                 mlme_event_michael_mic_failure(drv, tb);
864                 break;
865         default:
866                 wpa_printf(MSG_DEBUG, "nl80211: Ignored unknown event "
867                            "(cmd=%d)", gnlh->cmd);
868                 break;
869         }
870
871         return NL_SKIP;
872 }
873
874
875 static void wpa_driver_nl80211_event_receive(int sock, void *eloop_ctx,
876                                              void *sock_ctx)
877 {
878         struct nl_cb *cb;
879         struct wpa_driver_nl80211_data *drv = eloop_ctx;
880
881         wpa_printf(MSG_DEBUG, "nl80211: Event message available");
882
883         cb = nl_cb_clone(drv->nl_cb);
884         if (!cb)
885                 return;
886         nl_cb_set(cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL);
887         nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, process_event, drv);
888         nl_recvmsgs(drv->nl_handle, cb);
889         nl_cb_put(cb);
890 }
891
892
893 static int hostapd_set_iface_flags(struct wpa_driver_nl80211_data *drv,
894                                    const char *ifname, int dev_up)
895 {
896         struct ifreq ifr;
897
898         if (drv->ioctl_sock < 0)
899                 return -1;
900
901         os_memset(&ifr, 0, sizeof(ifr));
902         os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
903
904         if (ioctl(drv->ioctl_sock, SIOCGIFFLAGS, &ifr) != 0) {
905                 perror("ioctl[SIOCGIFFLAGS]");
906                 wpa_printf(MSG_DEBUG, "Could not read interface flags (%s)",
907                            ifname);
908                 return -1;
909         }
910
911         if (dev_up) {
912                 if (ifr.ifr_flags & IFF_UP)
913                         return 0;
914                 ifr.ifr_flags |= IFF_UP;
915         } else {
916                 if (!(ifr.ifr_flags & IFF_UP))
917                         return 0;
918                 ifr.ifr_flags &= ~IFF_UP;
919         }
920
921         if (ioctl(drv->ioctl_sock, SIOCSIFFLAGS, &ifr) != 0) {
922                 perror("ioctl[SIOCSIFFLAGS]");
923                 return -1;
924         }
925
926         return 0;
927 }
928
929
930 /**
931  * wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain
932  * @priv: driver_nl80211 private data
933  * @alpha2_arg: country to which to switch to
934  * Returns: 0 on success, -1 on failure
935  *
936  * This asks nl80211 to set the regulatory domain for given
937  * country ISO / IEC alpha2.
938  */
939 static int wpa_driver_nl80211_set_country(void *priv, const char *alpha2_arg)
940 {
941         struct wpa_driver_nl80211_data *drv = priv;
942         char alpha2[3];
943         struct nl_msg *msg;
944
945         msg = nlmsg_alloc();
946         if (!msg)
947                 return -ENOMEM;
948
949         alpha2[0] = alpha2_arg[0];
950         alpha2[1] = alpha2_arg[1];
951         alpha2[2] = '\0';
952
953         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
954                     0, NL80211_CMD_REQ_SET_REG, 0);
955
956         NLA_PUT_STRING(msg, NL80211_ATTR_REG_ALPHA2, alpha2);
957         if (send_and_recv_msgs(drv, msg, NULL, NULL))
958                 return -EINVAL;
959         return 0;
960 nla_put_failure:
961         return -EINVAL;
962 }
963
964
965 #ifndef HOSTAPD
966 struct wiphy_info_data {
967         int max_scan_ssids;
968         int ap_supported;
969 };
970
971
972 static int wiphy_info_handler(struct nl_msg *msg, void *arg)
973 {
974         struct nlattr *tb[NL80211_ATTR_MAX + 1];
975         struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
976         struct wiphy_info_data *info = arg;
977
978         nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
979                   genlmsg_attrlen(gnlh, 0), NULL);
980
981         if (tb[NL80211_ATTR_MAX_NUM_SCAN_SSIDS])
982                 info->max_scan_ssids =
983                         nla_get_u8(tb[NL80211_ATTR_MAX_NUM_SCAN_SSIDS]);
984
985         if (tb[NL80211_ATTR_SUPPORTED_IFTYPES]) {
986                 struct nlattr *nl_mode;
987                 int i;
988                 nla_for_each_nested(nl_mode,
989                                     tb[NL80211_ATTR_SUPPORTED_IFTYPES], i) {
990                         if (nl_mode->nla_type == NL80211_IFTYPE_AP) {
991                                 info->ap_supported = 1;
992                                 break;
993                         }
994                 }
995         }
996
997         return NL_SKIP;
998 }
999
1000
1001 static int wpa_driver_nl80211_get_info(struct wpa_driver_nl80211_data *drv,
1002                                        struct wiphy_info_data *info)
1003 {
1004         struct nl_msg *msg;
1005
1006         os_memset(info, 0, sizeof(*info));
1007         msg = nlmsg_alloc();
1008         if (!msg)
1009                 return -1;
1010
1011         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
1012                     0, NL80211_CMD_GET_WIPHY, 0);
1013
1014         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1015
1016         if (send_and_recv_msgs(drv, msg, wiphy_info_handler, info) == 0)
1017                 return 0;
1018         msg = NULL;
1019 nla_put_failure:
1020         nlmsg_free(msg);
1021         return -1;
1022 }
1023
1024
1025 static void wpa_driver_nl80211_capa(struct wpa_driver_nl80211_data *drv)
1026 {
1027         struct wiphy_info_data info;
1028         if (wpa_driver_nl80211_get_info(drv, &info))
1029                 return;
1030         drv->has_capability = 1;
1031         /* For now, assume TKIP, CCMP, WPA, WPA2 are supported */
1032         drv->capa.key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |
1033                 WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
1034                 WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
1035                 WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK;
1036         drv->capa.enc = WPA_DRIVER_CAPA_ENC_WEP40 |
1037                 WPA_DRIVER_CAPA_ENC_WEP104 |
1038                 WPA_DRIVER_CAPA_ENC_TKIP |
1039                 WPA_DRIVER_CAPA_ENC_CCMP;
1040
1041         drv->capa.max_scan_ssids = info.max_scan_ssids;
1042         if (info.ap_supported)
1043                 drv->capa.flags |= WPA_DRIVER_FLAGS_AP;
1044 }
1045 #endif /* HOSTAPD */
1046
1047
1048 static int wpa_driver_nl80211_init_nl(struct wpa_driver_nl80211_data *drv,
1049                                       void *ctx)
1050 {
1051         int ret;
1052
1053         /* Initialize generic netlink and nl80211 */
1054
1055         drv->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
1056         if (drv->nl_cb == NULL) {
1057                 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
1058                            "callbacks");
1059                 goto err1;
1060         }
1061
1062         drv->nl_handle = nl_handle_alloc_cb(drv->nl_cb);
1063         if (drv->nl_handle == NULL) {
1064                 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
1065                            "callbacks");
1066                 goto err2;
1067         }
1068
1069         if (genl_connect(drv->nl_handle)) {
1070                 wpa_printf(MSG_ERROR, "nl80211: Failed to connect to generic "
1071                            "netlink");
1072                 goto err3;
1073         }
1074
1075 #ifdef CONFIG_LIBNL20
1076         if (genl_ctrl_alloc_cache(drv->nl_handle, &drv->nl_cache) < 0) {
1077                 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate generic "
1078                            "netlink cache");
1079                 goto err3;
1080         }
1081 #else /* CONFIG_LIBNL20 */
1082         drv->nl_cache = genl_ctrl_alloc_cache(drv->nl_handle);
1083         if (drv->nl_cache == NULL) {
1084                 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate generic "
1085                            "netlink cache");
1086                 goto err3;
1087         }
1088 #endif /* CONFIG_LIBNL20 */
1089
1090
1091         drv->nl80211 = genl_ctrl_search_by_name(drv->nl_cache, "nl80211");
1092         if (drv->nl80211 == NULL) {
1093                 wpa_printf(MSG_ERROR, "nl80211: 'nl80211' generic netlink not "
1094                            "found");
1095                 goto err4;
1096         }
1097
1098         ret = nl_get_multicast_id(drv, "nl80211", "scan");
1099         if (ret >= 0)
1100                 ret = nl_socket_add_membership(drv->nl_handle, ret);
1101         if (ret < 0) {
1102                 wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
1103                            "membership for scan events: %d (%s)",
1104                            ret, strerror(-ret));
1105                 goto err4;
1106         }
1107
1108         ret = nl_get_multicast_id(drv, "nl80211", "mlme");
1109         if (ret >= 0)
1110                 ret = nl_socket_add_membership(drv->nl_handle, ret);
1111         if (ret < 0) {
1112                 wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
1113                            "membership for mlme events: %d (%s)",
1114                            ret, strerror(-ret));
1115                 goto err4;
1116         }
1117
1118         eloop_register_read_sock(nl_socket_get_fd(drv->nl_handle),
1119                                  wpa_driver_nl80211_event_receive, drv, ctx);
1120
1121         return 0;
1122
1123 err4:
1124         nl_cache_free(drv->nl_cache);
1125 err3:
1126         nl_handle_destroy(drv->nl_handle);
1127 err2:
1128         nl_cb_put(drv->nl_cb);
1129 err1:
1130         return -1;
1131 }
1132
1133
1134 static int wpa_driver_nl80211_init_link_events(
1135         struct wpa_driver_nl80211_data *drv)
1136 {
1137 #ifdef HOSTAPD
1138         return 0;
1139 #else /* HOSTAPD */
1140         int s;
1141         struct sockaddr_nl local;
1142
1143         s = socket(PF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
1144         if (s < 0) {
1145                 perror("socket(PF_NETLINK,SOCK_RAW,NETLINK_ROUTE)");
1146                 return -1;
1147         }
1148
1149         os_memset(&local, 0, sizeof(local));
1150         local.nl_family = AF_NETLINK;
1151         local.nl_groups = RTMGRP_LINK;
1152         if (bind(s, (struct sockaddr *) &local, sizeof(local)) < 0) {
1153                 perror("bind(netlink)");
1154                 close(s);
1155                 return -1;
1156         }
1157
1158         eloop_register_read_sock(s, wpa_driver_nl80211_event_receive_link, drv,
1159                                  drv->ctx);
1160         drv->link_event_sock = s;
1161
1162         return 0;
1163 #endif /* HOSTAPD */
1164 }
1165
1166
1167 /**
1168  * wpa_driver_nl80211_init - Initialize nl80211 driver interface
1169  * @ctx: context to be used when calling wpa_supplicant functions,
1170  * e.g., wpa_supplicant_event()
1171  * @ifname: interface name, e.g., wlan0
1172  * Returns: Pointer to private data, %NULL on failure
1173  */
1174 static void * wpa_driver_nl80211_init(void *ctx, const char *ifname)
1175 {
1176         struct wpa_driver_nl80211_data *drv;
1177
1178         drv = os_zalloc(sizeof(*drv));
1179         if (drv == NULL)
1180                 return NULL;
1181         drv->ctx = ctx;
1182         os_strlcpy(drv->ifname, ifname, sizeof(drv->ifname));
1183         drv->monitor_ifidx = -1;
1184         drv->monitor_sock = -1;
1185         drv->link_event_sock = -1;
1186         drv->ioctl_sock = -1;
1187
1188         if (wpa_driver_nl80211_init_nl(drv, ctx)) {
1189                 os_free(drv);
1190                 return NULL;
1191         }
1192
1193         drv->capa.flags |= WPA_DRIVER_FLAGS_SME;
1194
1195         drv->ioctl_sock = socket(PF_INET, SOCK_DGRAM, 0);
1196         if (drv->ioctl_sock < 0) {
1197                 perror("socket(PF_INET,SOCK_DGRAM)");
1198                 goto failed;
1199         }
1200
1201         if (wpa_driver_nl80211_init_link_events(drv) ||
1202             wpa_driver_nl80211_finish_drv_init(drv))
1203                 goto failed;
1204
1205         return drv;
1206
1207 failed:
1208         if (drv->link_event_sock >= 0) {
1209                 eloop_unregister_read_sock(drv->link_event_sock);
1210                 close(drv->link_event_sock);
1211         }
1212         if (drv->ioctl_sock >= 0)
1213                 close(drv->ioctl_sock);
1214
1215         genl_family_put(drv->nl80211);
1216         nl_cache_free(drv->nl_cache);
1217         nl_handle_destroy(drv->nl_handle);
1218         nl_cb_put(drv->nl_cb);
1219
1220         os_free(drv);
1221         return NULL;
1222 }
1223
1224
1225 static int
1226 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv)
1227 {
1228         drv->ifindex = if_nametoindex(drv->ifname);
1229
1230 #ifndef HOSTAPD
1231         if (wpa_driver_nl80211_set_mode(drv, IEEE80211_MODE_INFRA) < 0) {
1232                 wpa_printf(MSG_DEBUG, "nl80211: Could not configure driver to "
1233                            "use managed mode");
1234         }
1235
1236         if (hostapd_set_iface_flags(drv, drv->ifname, 1)) {
1237                 wpa_printf(MSG_ERROR, "Could not set interface '%s' "
1238                            "UP", drv->ifname);
1239                 return -1;
1240         }
1241
1242         wpa_driver_nl80211_capa(drv);
1243
1244         wpa_driver_nl80211_send_oper_ifla(drv, 1, IF_OPER_DORMANT);
1245 #endif /* HOSTAPD */
1246
1247         return 0;
1248 }
1249
1250
1251 #ifdef HOSTAPD
1252 static void wpa_driver_nl80211_free_bss(struct wpa_driver_nl80211_data *drv)
1253 {
1254         struct i802_bss *bss, *prev;
1255         bss = drv->bss.next;
1256         while (bss) {
1257                 prev = bss;
1258                 bss = bss->next;
1259                 os_free(bss);
1260         }
1261 }
1262 #endif /* HOSTAPD */
1263
1264
1265 /**
1266  * wpa_driver_nl80211_deinit - Deinitialize nl80211 driver interface
1267  * @priv: Pointer to private nl80211 data from wpa_driver_nl80211_init()
1268  *
1269  * Shut down driver interface and processing of driver events. Free
1270  * private data buffer if one was allocated in wpa_driver_nl80211_init().
1271  */
1272 static void wpa_driver_nl80211_deinit(void *priv)
1273 {
1274         struct wpa_driver_nl80211_data *drv = priv;
1275
1276 #if defined(CONFIG_AP) || defined(HOSTAPD)
1277         if (drv->monitor_ifidx >= 0)
1278                 nl80211_remove_iface(drv, drv->monitor_ifidx);
1279         if (drv->monitor_sock >= 0) {
1280                 eloop_unregister_read_sock(drv->monitor_sock);
1281                 close(drv->monitor_sock);
1282         }
1283 #endif /* CONFIG_AP || HOSTAPD */
1284
1285 #ifdef HOSTAPD
1286         if (drv->last_freq_ht) {
1287                 /* Clear HT flags from the driver */
1288                 struct hostapd_freq_params freq;
1289                 os_memset(&freq, 0, sizeof(freq));
1290                 freq.freq = drv->last_freq;
1291                 i802_set_freq(priv, &freq);
1292         }
1293
1294         i802_del_beacon(drv);
1295
1296         if (drv->eapol_sock >= 0) {
1297                 eloop_unregister_read_sock(drv->eapol_sock);
1298                 close(drv->eapol_sock);
1299         }
1300
1301         if (drv->if_indices != drv->default_if_indices)
1302                 os_free(drv->if_indices);
1303
1304         wpa_driver_nl80211_free_bss(drv);
1305 #else /* HOSTAPD */
1306 #ifndef NO_WEXT
1307         wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_DROP_UNENCRYPTED, 0);
1308 #endif /* NO_WEXT */
1309
1310         wpa_driver_nl80211_send_oper_ifla(priv, 0, IF_OPER_UP);
1311
1312         if (drv->link_event_sock >= 0) {
1313                 eloop_unregister_read_sock(drv->link_event_sock);
1314                 close(drv->link_event_sock);
1315         }
1316 #endif /* HOSTAPD */
1317
1318         eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
1319
1320         (void) hostapd_set_iface_flags(drv, drv->ifname, 0);
1321         wpa_driver_nl80211_set_mode(drv, IEEE80211_MODE_INFRA);
1322
1323         if (drv->ioctl_sock >= 0)
1324                 close(drv->ioctl_sock);
1325
1326         eloop_unregister_read_sock(nl_socket_get_fd(drv->nl_handle));
1327         genl_family_put(drv->nl80211);
1328         nl_cache_free(drv->nl_cache);
1329         nl_handle_destroy(drv->nl_handle);
1330         nl_cb_put(drv->nl_cb);
1331
1332         os_free(drv);
1333 }
1334
1335
1336 /**
1337  * wpa_driver_nl80211_scan_timeout - Scan timeout to report scan completion
1338  * @eloop_ctx: Driver private data
1339  * @timeout_ctx: ctx argument given to wpa_driver_nl80211_init()
1340  *
1341  * This function can be used as registered timeout when starting a scan to
1342  * generate a scan completed event if the driver does not report this.
1343  */
1344 static void wpa_driver_nl80211_scan_timeout(void *eloop_ctx, void *timeout_ctx)
1345 {
1346         struct wpa_driver_nl80211_data *drv = eloop_ctx;
1347         if (drv->ap_scan_as_station) {
1348                 wpa_driver_nl80211_set_mode(drv, IEEE80211_MODE_AP);
1349                 drv->ap_scan_as_station = 0;
1350         }
1351         wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
1352         wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
1353 }
1354
1355
1356 /**
1357  * wpa_driver_nl80211_scan - Request the driver to initiate scan
1358  * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
1359  * @params: Scan parameters
1360  * Returns: 0 on success, -1 on failure
1361  */
1362 static int wpa_driver_nl80211_scan(void *priv,
1363                                    struct wpa_driver_scan_params *params)
1364 {
1365         struct wpa_driver_nl80211_data *drv = priv;
1366         int ret = 0, timeout;
1367         struct nl_msg *msg, *ssids, *freqs;
1368         size_t i;
1369
1370         msg = nlmsg_alloc();
1371         ssids = nlmsg_alloc();
1372         freqs = nlmsg_alloc();
1373         if (!msg || !ssids || !freqs) {
1374                 nlmsg_free(msg);
1375                 nlmsg_free(ssids);
1376                 nlmsg_free(freqs);
1377                 return -1;
1378         }
1379
1380         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
1381                     NL80211_CMD_TRIGGER_SCAN, 0);
1382
1383         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1384
1385         for (i = 0; i < params->num_ssids; i++) {
1386                 NLA_PUT(ssids, i + 1, params->ssids[i].ssid_len,
1387                         params->ssids[i].ssid);
1388         }
1389         if (params->num_ssids)
1390                 nla_put_nested(msg, NL80211_ATTR_SCAN_SSIDS, ssids);
1391
1392         if (params->extra_ies) {
1393                 NLA_PUT(msg, NL80211_ATTR_IE, params->extra_ies_len,
1394                         params->extra_ies);
1395         }
1396
1397         if (params->freqs) {
1398                 for (i = 0; params->freqs[i]; i++)
1399                         NLA_PUT_U32(freqs, i + 1, params->freqs[i]);
1400                 nla_put_nested(msg, NL80211_ATTR_SCAN_FREQUENCIES, freqs);
1401         }
1402
1403         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1404         msg = NULL;
1405         if (ret) {
1406                 wpa_printf(MSG_DEBUG, "nl80211: Scan trigger failed: ret=%d "
1407                            "(%s)", ret, strerror(-ret));
1408 #ifdef HOSTAPD
1409                 if (drv->nlmode == NL80211_IFTYPE_AP) {
1410                         /*
1411                          * mac80211 does not allow scan requests in AP mode, so
1412                          * try to do this in station mode.
1413                          */
1414                         if (wpa_driver_nl80211_set_mode(drv,
1415                                                         IEEE80211_MODE_INFRA))
1416                                 goto nla_put_failure;
1417
1418                         if (wpa_driver_nl80211_scan(drv, params)) {
1419                                 wpa_driver_nl80211_set_mode(drv,
1420                                                             IEEE80211_MODE_AP);
1421                                 goto nla_put_failure;
1422                         }
1423
1424                         /* Restore AP mode when processing scan results */
1425                         drv->ap_scan_as_station = 1;
1426                         ret = 0;
1427                 } else
1428                         goto nla_put_failure;
1429 #else /* HOSTAPD */
1430                 goto nla_put_failure;
1431 #endif /* HOSTAPD */
1432         }
1433
1434         /* Not all drivers generate "scan completed" wireless event, so try to
1435          * read results after a timeout. */
1436         timeout = 10;
1437         if (drv->scan_complete_events) {
1438                 /*
1439                  * The driver seems to deliver events to notify when scan is
1440                  * complete, so use longer timeout to avoid race conditions
1441                  * with scanning and following association request.
1442                  */
1443                 timeout = 30;
1444         }
1445         wpa_printf(MSG_DEBUG, "Scan requested (ret=%d) - scan timeout %d "
1446                    "seconds", ret, timeout);
1447         eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
1448         eloop_register_timeout(timeout, 0, wpa_driver_nl80211_scan_timeout,
1449                                drv, drv->ctx);
1450
1451 nla_put_failure:
1452         nlmsg_free(ssids);
1453         nlmsg_free(msg);
1454         nlmsg_free(freqs);
1455         return ret;
1456 }
1457
1458
1459 static int bss_info_handler(struct nl_msg *msg, void *arg)
1460 {
1461         struct nlattr *tb[NL80211_ATTR_MAX + 1];
1462         struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1463         struct nlattr *bss[NL80211_BSS_MAX + 1];
1464         static struct nla_policy bss_policy[NL80211_BSS_MAX + 1] = {
1465                 [NL80211_BSS_BSSID] = { .type = NLA_UNSPEC },
1466                 [NL80211_BSS_FREQUENCY] = { .type = NLA_U32 },
1467                 [NL80211_BSS_TSF] = { .type = NLA_U64 },
1468                 [NL80211_BSS_BEACON_INTERVAL] = { .type = NLA_U16 },
1469                 [NL80211_BSS_CAPABILITY] = { .type = NLA_U16 },
1470                 [NL80211_BSS_INFORMATION_ELEMENTS] = { .type = NLA_UNSPEC },
1471                 [NL80211_BSS_SIGNAL_MBM] = { .type = NLA_U32 },
1472                 [NL80211_BSS_SIGNAL_UNSPEC] = { .type = NLA_U8 },
1473         };
1474         struct wpa_scan_results *res = arg;
1475         struct wpa_scan_res **tmp;
1476         struct wpa_scan_res *r;
1477         const u8 *ie;
1478         size_t ie_len;
1479
1480         nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1481                   genlmsg_attrlen(gnlh, 0), NULL);
1482         if (!tb[NL80211_ATTR_BSS])
1483                 return NL_SKIP;
1484         if (nla_parse_nested(bss, NL80211_BSS_MAX, tb[NL80211_ATTR_BSS],
1485                              bss_policy))
1486                 return NL_SKIP;
1487         if (bss[NL80211_BSS_INFORMATION_ELEMENTS]) {
1488                 ie = nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
1489                 ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
1490         } else {
1491                 ie = NULL;
1492                 ie_len = 0;
1493         }
1494
1495         r = os_zalloc(sizeof(*r) + ie_len);
1496         if (r == NULL)
1497                 return NL_SKIP;
1498         if (bss[NL80211_BSS_BSSID])
1499                 os_memcpy(r->bssid, nla_data(bss[NL80211_BSS_BSSID]),
1500                           ETH_ALEN);
1501         if (bss[NL80211_BSS_FREQUENCY])
1502                 r->freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
1503         if (bss[NL80211_BSS_BEACON_INTERVAL])
1504                 r->beacon_int = nla_get_u16(bss[NL80211_BSS_BEACON_INTERVAL]);
1505         if (bss[NL80211_BSS_CAPABILITY])
1506                 r->caps = nla_get_u16(bss[NL80211_BSS_CAPABILITY]);
1507         r->flags |= WPA_SCAN_NOISE_INVALID;
1508         if (bss[NL80211_BSS_SIGNAL_MBM]) {
1509                 r->level = nla_get_u32(bss[NL80211_BSS_SIGNAL_MBM]);
1510                 r->level /= 100; /* mBm to dBm */
1511                 r->flags |= WPA_SCAN_LEVEL_DBM | WPA_SCAN_QUAL_INVALID;
1512         } else if (bss[NL80211_BSS_SIGNAL_UNSPEC]) {
1513                 r->level = nla_get_u8(bss[NL80211_BSS_SIGNAL_UNSPEC]);
1514                 r->flags |= WPA_SCAN_LEVEL_INVALID;
1515         } else
1516                 r->flags |= WPA_SCAN_LEVEL_INVALID | WPA_SCAN_QUAL_INVALID;
1517         if (bss[NL80211_BSS_TSF])
1518                 r->tsf = nla_get_u64(bss[NL80211_BSS_TSF]);
1519         r->ie_len = ie_len;
1520         if (ie)
1521                 os_memcpy(r + 1, ie, ie_len);
1522
1523         tmp = os_realloc(res->res,
1524                          (res->num + 1) * sizeof(struct wpa_scan_res *));
1525         if (tmp == NULL) {
1526                 os_free(r);
1527                 return NL_SKIP;
1528         }
1529         tmp[res->num++] = r;
1530         res->res = tmp;
1531
1532         return NL_SKIP;
1533 }
1534
1535
1536 /**
1537  * wpa_driver_nl80211_get_scan_results - Fetch the latest scan results
1538  * @priv: Pointer to private wext data from wpa_driver_nl80211_init()
1539  * Returns: Scan results on success, -1 on failure
1540  */
1541 static struct wpa_scan_results *
1542 wpa_driver_nl80211_get_scan_results(void *priv)
1543 {
1544         struct wpa_driver_nl80211_data *drv = priv;
1545         struct nl_msg *msg;
1546         struct wpa_scan_results *res;
1547         int ret;
1548
1549         res = os_zalloc(sizeof(*res));
1550         if (res == NULL)
1551                 return 0;
1552         msg = nlmsg_alloc();
1553         if (!msg)
1554                 goto nla_put_failure;
1555
1556         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, NLM_F_DUMP,
1557                     NL80211_CMD_GET_SCAN, 0);
1558         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1559
1560         ret = send_and_recv_msgs(drv, msg, bss_info_handler, res);
1561         msg = NULL;
1562         if (ret == 0) {
1563                 wpa_printf(MSG_DEBUG, "Received scan results (%lu BSSes)",
1564                            (unsigned long) res->num);
1565                 return res;
1566         }
1567         wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
1568                    "(%s)", ret, strerror(-ret));
1569 nla_put_failure:
1570         nlmsg_free(msg);
1571         wpa_scan_results_free(res);
1572         return NULL;
1573 }
1574
1575
1576 static int nl_set_encr(int ifindex, struct wpa_driver_nl80211_data *drv,
1577                        wpa_alg alg, const u8 *addr, int key_idx, int set_tx,
1578                        const u8 *seq, size_t seq_len,
1579                        const u8 *key, size_t key_len)
1580 {
1581         struct nl_msg *msg;
1582         int ret;
1583
1584         wpa_printf(MSG_DEBUG, "%s: ifindex=%d alg=%d addr=%p key_idx=%d "
1585                    "set_tx=%d seq_len=%lu key_len=%lu",
1586                    __func__, ifindex, alg, addr, key_idx, set_tx,
1587                    (unsigned long) seq_len, (unsigned long) key_len);
1588
1589         msg = nlmsg_alloc();
1590         if (!msg)
1591                 return -ENOMEM;
1592
1593         if (alg == WPA_ALG_NONE) {
1594                 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
1595                             0, NL80211_CMD_DEL_KEY, 0);
1596         } else {
1597                 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
1598                             0, NL80211_CMD_NEW_KEY, 0);
1599                 NLA_PUT(msg, NL80211_ATTR_KEY_DATA, key_len, key);
1600                 switch (alg) {
1601                 case WPA_ALG_WEP:
1602                         if (key_len == 5)
1603                                 NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER,
1604                                             0x000FAC01);
1605                         else
1606                                 NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER,
1607                                             0x000FAC05);
1608                         break;
1609                 case WPA_ALG_TKIP:
1610                         NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC02);
1611                         break;
1612                 case WPA_ALG_CCMP:
1613                         NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC04);
1614                         break;
1615                 case WPA_ALG_IGTK:
1616                         NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC06);
1617                         break;
1618                 default:
1619                         wpa_printf(MSG_ERROR, "%s: Unsupported encryption "
1620                                    "algorithm %d", __func__, alg);
1621                         nlmsg_free(msg);
1622                         return -1;
1623                 }
1624         }
1625
1626         if (seq)
1627                 NLA_PUT(msg, NL80211_ATTR_KEY_SEQ, seq_len, seq);
1628
1629         if (addr && os_memcmp(addr, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) != 0)
1630         {
1631                 wpa_printf(MSG_DEBUG, "   addr=" MACSTR, MAC2STR(addr));
1632                 NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
1633         }
1634         NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx);
1635         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
1636
1637         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1638         if (ret == -ENOENT && alg == WPA_ALG_NONE)
1639                 ret = 0;
1640         if (ret)
1641                 wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d %s)",
1642                            ret, strerror(-ret));
1643
1644         /*
1645          * If we failed or don't need to set the default TX key (below),
1646          * we're done here.
1647          */
1648         if (ret || !set_tx || alg == WPA_ALG_NONE)
1649                 return ret;
1650 #ifdef HOSTAPD /* FIX: is this needed? */
1651         if (addr)
1652                 return ret;
1653 #endif /* HOSTAPD */
1654
1655         msg = nlmsg_alloc();
1656         if (!msg)
1657                 return -ENOMEM;
1658
1659         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
1660                     0, NL80211_CMD_SET_KEY, 0);
1661         NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx);
1662         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
1663         if (alg == WPA_ALG_IGTK)
1664                 NLA_PUT_FLAG(msg, NL80211_ATTR_KEY_DEFAULT_MGMT);
1665         else
1666                 NLA_PUT_FLAG(msg, NL80211_ATTR_KEY_DEFAULT);
1667
1668         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1669         if (ret == -ENOENT)
1670                 ret = 0;
1671         if (ret)
1672                 wpa_printf(MSG_DEBUG, "nl80211: set_key default failed; "
1673                            "err=%d %s)", ret, strerror(-ret));
1674         return ret;
1675
1676 nla_put_failure:
1677         return -ENOBUFS;
1678 }
1679
1680
1681 static int wpa_driver_nl80211_set_key(void *priv, wpa_alg alg,
1682                                       const u8 *addr, int key_idx,
1683                                       int set_tx, const u8 *seq,
1684                                       size_t seq_len,
1685                                       const u8 *key, size_t key_len)
1686 {
1687         struct wpa_driver_nl80211_data *drv = priv;
1688         return nl_set_encr(drv->ifindex, drv, alg, addr, key_idx, set_tx, seq,
1689                            seq_len, key, key_len);
1690 }
1691
1692
1693 static int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
1694                                    const u8 *addr, int cmd, u16 reason_code)
1695 {
1696         int ret = -1;
1697         struct nl_msg *msg;
1698
1699         msg = nlmsg_alloc();
1700         if (!msg)
1701                 return -1;
1702
1703         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0, cmd, 0);
1704
1705         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1706         NLA_PUT_U16(msg, NL80211_ATTR_REASON_CODE, reason_code);
1707         NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
1708
1709         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1710         msg = NULL;
1711         if (ret) {
1712                 wpa_printf(MSG_DEBUG, "nl80211: MLME command failed: ret=%d "
1713                            "(%s)", ret, strerror(-ret));
1714                 goto nla_put_failure;
1715         }
1716         ret = 0;
1717
1718 nla_put_failure:
1719         nlmsg_free(msg);
1720         return ret;
1721 }
1722
1723
1724 static int wpa_driver_nl80211_deauthenticate(void *priv, const u8 *addr,
1725                                              int reason_code)
1726 {
1727         struct wpa_driver_nl80211_data *drv = priv;
1728         wpa_printf(MSG_DEBUG, "%s", __func__);
1729         return wpa_driver_nl80211_mlme(drv, addr, NL80211_CMD_DEAUTHENTICATE,
1730                                        reason_code);
1731 }
1732
1733
1734 static int wpa_driver_nl80211_disassociate(void *priv, const u8 *addr,
1735                                            int reason_code)
1736 {
1737         struct wpa_driver_nl80211_data *drv = priv;
1738         wpa_printf(MSG_DEBUG, "%s", __func__);
1739         return wpa_driver_nl80211_mlme(drv, addr, NL80211_CMD_DISASSOCIATE,
1740                                        reason_code);
1741 }
1742
1743
1744 static int wpa_driver_nl80211_authenticate(
1745         void *priv, struct wpa_driver_auth_params *params)
1746 {
1747         struct wpa_driver_nl80211_data *drv = priv;
1748         int ret = -1, i;
1749         struct nl_msg *msg;
1750         enum nl80211_auth_type type;
1751
1752         drv->associated = 0;
1753
1754         msg = nlmsg_alloc();
1755         if (!msg)
1756                 return -1;
1757
1758         wpa_printf(MSG_DEBUG, "nl80211: Authenticate (ifindex=%d)",
1759                    drv->ifindex);
1760
1761         for (i = 0; i < 4; i++) {
1762                 if (!params->wep_key[i])
1763                         continue;
1764                 wpa_driver_nl80211_set_key(drv, WPA_ALG_WEP, NULL, i,
1765                                            i == params->wep_tx_keyidx, NULL, 0,
1766                                            params->wep_key[i],
1767                                            params->wep_key_len[i]);
1768         }
1769
1770         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
1771                     NL80211_CMD_AUTHENTICATE, 0);
1772
1773         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1774         if (params->bssid) {
1775                 wpa_printf(MSG_DEBUG, "  * bssid=" MACSTR,
1776                            MAC2STR(params->bssid));
1777                 NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid);
1778         }
1779         if (params->freq) {
1780                 wpa_printf(MSG_DEBUG, "  * freq=%d", params->freq);
1781                 NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq);
1782         }
1783         if (params->ssid) {
1784                 wpa_hexdump_ascii(MSG_DEBUG, "  * SSID",
1785                                   params->ssid, params->ssid_len);
1786                 NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
1787                         params->ssid);
1788         }
1789         wpa_hexdump(MSG_DEBUG, "  * IEs", params->ie, params->ie_len);
1790         if (params->ie)
1791                 NLA_PUT(msg, NL80211_ATTR_IE, params->ie_len, params->ie);
1792         /*
1793          * TODO: if multiple auth_alg options enabled, try them one by one if
1794          * the AP rejects authentication due to unknown auth alg
1795          */
1796         if (params->auth_alg & AUTH_ALG_OPEN_SYSTEM)
1797                 type = NL80211_AUTHTYPE_OPEN_SYSTEM;
1798         else if (params->auth_alg & AUTH_ALG_SHARED_KEY)
1799                 type = NL80211_AUTHTYPE_SHARED_KEY;
1800         else if (params->auth_alg & AUTH_ALG_LEAP)
1801                 type = NL80211_AUTHTYPE_NETWORK_EAP;
1802         else if (params->auth_alg & AUTH_ALG_FT)
1803                 type = NL80211_AUTHTYPE_FT;
1804         else
1805                 goto nla_put_failure;
1806         wpa_printf(MSG_DEBUG, "  * Auth Type %d", type);
1807         NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE, type);
1808
1809         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1810         msg = NULL;
1811         if (ret) {
1812                 wpa_printf(MSG_DEBUG, "nl80211: MLME command failed: ret=%d "
1813                            "(%s)", ret, strerror(-ret));
1814                 goto nla_put_failure;
1815         }
1816         ret = 0;
1817         wpa_printf(MSG_DEBUG, "nl80211: Authentication request send "
1818                    "successfully");
1819
1820 nla_put_failure:
1821         nlmsg_free(msg);
1822         return ret;
1823 }
1824
1825
1826 #if defined(CONFIG_AP) || defined(HOSTAPD)
1827
1828 struct phy_info_arg {
1829         u16 *num_modes;
1830         struct hostapd_hw_modes *modes;
1831 };
1832
1833 static int phy_info_handler(struct nl_msg *msg, void *arg)
1834 {
1835         struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
1836         struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1837         struct phy_info_arg *phy_info = arg;
1838
1839         struct nlattr *tb_band[NL80211_BAND_ATTR_MAX + 1];
1840
1841         struct nlattr *tb_freq[NL80211_FREQUENCY_ATTR_MAX + 1];
1842         static struct nla_policy freq_policy[NL80211_FREQUENCY_ATTR_MAX + 1] = {
1843                 [NL80211_FREQUENCY_ATTR_FREQ] = { .type = NLA_U32 },
1844                 [NL80211_FREQUENCY_ATTR_DISABLED] = { .type = NLA_FLAG },
1845                 [NL80211_FREQUENCY_ATTR_PASSIVE_SCAN] = { .type = NLA_FLAG },
1846                 [NL80211_FREQUENCY_ATTR_NO_IBSS] = { .type = NLA_FLAG },
1847                 [NL80211_FREQUENCY_ATTR_RADAR] = { .type = NLA_FLAG },
1848                 [NL80211_FREQUENCY_ATTR_MAX_TX_POWER] = { .type = NLA_U32 },
1849         };
1850
1851         struct nlattr *tb_rate[NL80211_BITRATE_ATTR_MAX + 1];
1852         static struct nla_policy rate_policy[NL80211_BITRATE_ATTR_MAX + 1] = {
1853                 [NL80211_BITRATE_ATTR_RATE] = { .type = NLA_U32 },
1854                 [NL80211_BITRATE_ATTR_2GHZ_SHORTPREAMBLE] = { .type = NLA_FLAG },
1855         };
1856
1857         struct nlattr *nl_band;
1858         struct nlattr *nl_freq;
1859         struct nlattr *nl_rate;
1860         int rem_band, rem_freq, rem_rate;
1861         struct hostapd_hw_modes *mode;
1862         int idx, mode_is_set;
1863
1864         nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1865                   genlmsg_attrlen(gnlh, 0), NULL);
1866
1867         if (!tb_msg[NL80211_ATTR_WIPHY_BANDS])
1868                 return NL_SKIP;
1869
1870         nla_for_each_nested(nl_band, tb_msg[NL80211_ATTR_WIPHY_BANDS], rem_band) {
1871                 mode = realloc(phy_info->modes, (*phy_info->num_modes + 1) * sizeof(*mode));
1872                 if (!mode)
1873                         return NL_SKIP;
1874                 phy_info->modes = mode;
1875
1876                 mode_is_set = 0;
1877
1878                 mode = &phy_info->modes[*(phy_info->num_modes)];
1879                 memset(mode, 0, sizeof(*mode));
1880                 *(phy_info->num_modes) += 1;
1881
1882                 nla_parse(tb_band, NL80211_BAND_ATTR_MAX, nla_data(nl_band),
1883                           nla_len(nl_band), NULL);
1884
1885                 if (tb_band[NL80211_BAND_ATTR_HT_CAPA]) {
1886                         mode->ht_capab = nla_get_u16(
1887                                 tb_band[NL80211_BAND_ATTR_HT_CAPA]);
1888                 }
1889
1890                 nla_for_each_nested(nl_freq, tb_band[NL80211_BAND_ATTR_FREQS], rem_freq) {
1891                         nla_parse(tb_freq, NL80211_FREQUENCY_ATTR_MAX, nla_data(nl_freq),
1892                                   nla_len(nl_freq), freq_policy);
1893                         if (!tb_freq[NL80211_FREQUENCY_ATTR_FREQ])
1894                                 continue;
1895                         mode->num_channels++;
1896                 }
1897
1898                 mode->channels = calloc(mode->num_channels, sizeof(struct hostapd_channel_data));
1899                 if (!mode->channels)
1900                         return NL_SKIP;
1901
1902                 idx = 0;
1903
1904                 nla_for_each_nested(nl_freq, tb_band[NL80211_BAND_ATTR_FREQS], rem_freq) {
1905                         nla_parse(tb_freq, NL80211_FREQUENCY_ATTR_MAX, nla_data(nl_freq),
1906                                   nla_len(nl_freq), freq_policy);
1907                         if (!tb_freq[NL80211_FREQUENCY_ATTR_FREQ])
1908                                 continue;
1909
1910                         mode->channels[idx].freq = nla_get_u32(tb_freq[NL80211_FREQUENCY_ATTR_FREQ]);
1911                         mode->channels[idx].flag = 0;
1912
1913                         if (!mode_is_set) {
1914                                 /* crude heuristic */
1915                                 if (mode->channels[idx].freq < 4000)
1916                                         mode->mode = HOSTAPD_MODE_IEEE80211B;
1917                                 else
1918                                         mode->mode = HOSTAPD_MODE_IEEE80211A;
1919                                 mode_is_set = 1;
1920                         }
1921
1922                         /* crude heuristic */
1923                         if (mode->channels[idx].freq < 4000)
1924                                 if (mode->channels[idx].freq == 2484)
1925                                         mode->channels[idx].chan = 14;
1926                                 else
1927                                         mode->channels[idx].chan = (mode->channels[idx].freq - 2407) / 5;
1928                         else
1929                                 mode->channels[idx].chan = mode->channels[idx].freq/5 - 1000;
1930
1931                         if (tb_freq[NL80211_FREQUENCY_ATTR_DISABLED])
1932                                 mode->channels[idx].flag |=
1933                                         HOSTAPD_CHAN_DISABLED;
1934                         if (tb_freq[NL80211_FREQUENCY_ATTR_PASSIVE_SCAN])
1935                                 mode->channels[idx].flag |=
1936                                         HOSTAPD_CHAN_PASSIVE_SCAN;
1937                         if (tb_freq[NL80211_FREQUENCY_ATTR_NO_IBSS])
1938                                 mode->channels[idx].flag |=
1939                                         HOSTAPD_CHAN_NO_IBSS;
1940                         if (tb_freq[NL80211_FREQUENCY_ATTR_RADAR])
1941                                 mode->channels[idx].flag |=
1942                                         HOSTAPD_CHAN_RADAR;
1943
1944                         if (tb_freq[NL80211_FREQUENCY_ATTR_MAX_TX_POWER] &&
1945                             !tb_freq[NL80211_FREQUENCY_ATTR_DISABLED])
1946                                 mode->channels[idx].max_tx_power =
1947                                         nla_get_u32(tb_freq[NL80211_FREQUENCY_ATTR_MAX_TX_POWER]) / 100;
1948
1949                         idx++;
1950                 }
1951
1952                 nla_for_each_nested(nl_rate, tb_band[NL80211_BAND_ATTR_RATES], rem_rate) {
1953                         nla_parse(tb_rate, NL80211_BITRATE_ATTR_MAX, nla_data(nl_rate),
1954                                   nla_len(nl_rate), rate_policy);
1955                         if (!tb_rate[NL80211_BITRATE_ATTR_RATE])
1956                                 continue;
1957                         mode->num_rates++;
1958                 }
1959
1960                 mode->rates = calloc(mode->num_rates, sizeof(struct hostapd_rate_data));
1961                 if (!mode->rates)
1962                         return NL_SKIP;
1963
1964                 idx = 0;
1965
1966                 nla_for_each_nested(nl_rate, tb_band[NL80211_BAND_ATTR_RATES], rem_rate) {
1967                         nla_parse(tb_rate, NL80211_BITRATE_ATTR_MAX, nla_data(nl_rate),
1968                                   nla_len(nl_rate), rate_policy);
1969                         if (!tb_rate[NL80211_BITRATE_ATTR_RATE])
1970                                 continue;
1971                         mode->rates[idx].rate = nla_get_u32(tb_rate[NL80211_BITRATE_ATTR_RATE]);
1972
1973                         /* crude heuristic */
1974                         if (mode->mode == HOSTAPD_MODE_IEEE80211B &&
1975                             mode->rates[idx].rate > 200)
1976                                 mode->mode = HOSTAPD_MODE_IEEE80211G;
1977
1978                         if (tb_rate[NL80211_BITRATE_ATTR_2GHZ_SHORTPREAMBLE])
1979                                 mode->rates[idx].flags |= HOSTAPD_RATE_PREAMBLE2;
1980
1981                         idx++;
1982                 }
1983         }
1984
1985         return NL_SKIP;
1986 }
1987
1988 static struct hostapd_hw_modes *
1989 wpa_driver_nl80211_add_11b(struct hostapd_hw_modes *modes, u16 *num_modes)
1990 {
1991         u16 m;
1992         struct hostapd_hw_modes *mode11g = NULL, *nmodes, *mode;
1993         int i, mode11g_idx = -1;
1994
1995         /* If only 802.11g mode is included, use it to construct matching
1996          * 802.11b mode data. */
1997
1998         for (m = 0; m < *num_modes; m++) {
1999                 if (modes[m].mode == HOSTAPD_MODE_IEEE80211B)
2000                         return modes; /* 802.11b already included */
2001                 if (modes[m].mode == HOSTAPD_MODE_IEEE80211G)
2002                         mode11g_idx = m;
2003         }
2004
2005         if (mode11g_idx < 0)
2006                 return modes; /* 2.4 GHz band not supported at all */
2007
2008         nmodes = os_realloc(modes, (*num_modes + 1) * sizeof(*nmodes));
2009         if (nmodes == NULL)
2010                 return modes; /* Could not add 802.11b mode */
2011
2012         mode = &nmodes[*num_modes];
2013         os_memset(mode, 0, sizeof(*mode));
2014         (*num_modes)++;
2015         modes = nmodes;
2016
2017         mode->mode = HOSTAPD_MODE_IEEE80211B;
2018
2019         mode11g = &modes[mode11g_idx];
2020         mode->num_channels = mode11g->num_channels;
2021         mode->channels = os_malloc(mode11g->num_channels *
2022                                    sizeof(struct hostapd_channel_data));
2023         if (mode->channels == NULL) {
2024                 (*num_modes)--;
2025                 return modes; /* Could not add 802.11b mode */
2026         }
2027         os_memcpy(mode->channels, mode11g->channels,
2028                   mode11g->num_channels * sizeof(struct hostapd_channel_data));
2029
2030         mode->num_rates = 0;
2031         mode->rates = os_malloc(4 * sizeof(struct hostapd_rate_data));
2032         if (mode->rates == NULL) {
2033                 os_free(mode->channels);
2034                 (*num_modes)--;
2035                 return modes; /* Could not add 802.11b mode */
2036         }
2037
2038         for (i = 0; i < mode11g->num_rates; i++) {
2039                 if (mode11g->rates[i].rate > 110 ||
2040                     mode11g->rates[i].flags &
2041                     (HOSTAPD_RATE_ERP | HOSTAPD_RATE_OFDM))
2042                         continue;
2043                 mode->rates[mode->num_rates] = mode11g->rates[i];
2044                 mode->num_rates++;
2045                 if (mode->num_rates == 4)
2046                         break;
2047         }
2048
2049         if (mode->num_rates == 0) {
2050                 os_free(mode->channels);
2051                 os_free(mode->rates);
2052                 (*num_modes)--;
2053                 return modes; /* No 802.11b rates */
2054         }
2055
2056         wpa_printf(MSG_DEBUG, "nl80211: Added 802.11b mode based on 802.11g "
2057                    "information");
2058
2059         return modes;
2060 }
2061
2062
2063 static struct hostapd_hw_modes *
2064 wpa_driver_nl80211_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags)
2065 {
2066         struct wpa_driver_nl80211_data *drv = priv;
2067         struct nl_msg *msg;
2068         struct phy_info_arg result = {
2069                 .num_modes = num_modes,
2070                 .modes = NULL,
2071         };
2072
2073         *num_modes = 0;
2074         *flags = 0;
2075
2076         msg = nlmsg_alloc();
2077         if (!msg)
2078                 return NULL;
2079
2080         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
2081                     0, NL80211_CMD_GET_WIPHY, 0);
2082
2083         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
2084
2085         if (send_and_recv_msgs(drv, msg, phy_info_handler, &result) == 0)
2086                 return wpa_driver_nl80211_add_11b(result.modes, num_modes);
2087  nla_put_failure:
2088         return NULL;
2089 }
2090
2091
2092 static int wpa_driver_nl80211_send_frame(struct wpa_driver_nl80211_data *drv,
2093                                          const void *data, size_t len,
2094                                          int encrypt)
2095 {
2096         __u8 rtap_hdr[] = {
2097                 0x00, 0x00, /* radiotap version */
2098                 0x0e, 0x00, /* radiotap length */
2099                 0x02, 0xc0, 0x00, 0x00, /* bmap: flags, tx and rx flags */
2100                 IEEE80211_RADIOTAP_F_FRAG, /* F_FRAG (fragment if required) */
2101                 0x00,       /* padding */
2102                 0x00, 0x00, /* RX and TX flags to indicate that */
2103                 0x00, 0x00, /* this is the injected frame directly */
2104         };
2105         struct iovec iov[2] = {
2106                 {
2107                         .iov_base = &rtap_hdr,
2108                         .iov_len = sizeof(rtap_hdr),
2109                 },
2110                 {
2111                         .iov_base = (void *) data,
2112                         .iov_len = len,
2113                 }
2114         };
2115         struct msghdr msg = {
2116                 .msg_name = NULL,
2117                 .msg_namelen = 0,
2118                 .msg_iov = iov,
2119                 .msg_iovlen = 2,
2120                 .msg_control = NULL,
2121                 .msg_controllen = 0,
2122                 .msg_flags = 0,
2123         };
2124
2125         if (encrypt)
2126                 rtap_hdr[8] |= IEEE80211_RADIOTAP_F_WEP;
2127
2128         return sendmsg(drv->monitor_sock, &msg, 0);
2129 }
2130
2131
2132 static int wpa_driver_nl80211_send_mlme(void *priv, const u8 *data,
2133                                         size_t data_len)
2134 {
2135         struct wpa_driver_nl80211_data *drv = priv;
2136         struct ieee80211_mgmt *mgmt;
2137         int do_not_encrypt = 0;
2138         u16 fc;
2139
2140         mgmt = (struct ieee80211_mgmt *) data;
2141         fc = le_to_host16(mgmt->frame_control);
2142
2143         if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
2144             WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_AUTH) {
2145                 /*
2146                  * Only one of the authentication frame types is encrypted.
2147                  * In order for static WEP encryption to work properly (i.e.,
2148                  * to not encrypt the frame), we need to tell mac80211 about
2149                  * the frames that must not be encrypted.
2150                  */
2151                 u16 auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
2152                 u16 auth_trans = le_to_host16(mgmt->u.auth.auth_transaction);
2153                 if (auth_alg == WLAN_AUTH_OPEN ||
2154                     (auth_alg == WLAN_AUTH_SHARED_KEY && auth_trans != 3))
2155                         do_not_encrypt = 1;
2156         }
2157
2158         return wpa_driver_nl80211_send_frame(drv, data, data_len,
2159                                              !do_not_encrypt);
2160 }
2161
2162
2163 static int wpa_driver_nl80211_set_beacon_iface(int ifindex, void *priv,
2164                                                const u8 *head, size_t head_len,
2165                                                const u8 *tail, size_t tail_len,
2166                                                int dtim_period)
2167 {
2168         struct wpa_driver_nl80211_data *drv = priv;
2169         struct nl_msg *msg;
2170         u8 cmd = NL80211_CMD_NEW_BEACON;
2171         int ret;
2172         int beacon_set;
2173 #ifdef HOSTAPD
2174         struct i802_bss *bss;
2175
2176         bss = get_bss(drv, ifindex);
2177         if (bss == NULL)
2178                 return -ENOENT;
2179         beacon_set = bss->beacon_set;
2180 #else /* HOSTAPD */
2181         beacon_set = drv->beacon_set;
2182 #endif /* HOSTAPD */
2183
2184         msg = nlmsg_alloc();
2185         if (!msg)
2186                 return -ENOMEM;
2187
2188         wpa_printf(MSG_DEBUG, "nl80211: Set beacon (beacon_set=%d)",
2189                    beacon_set);
2190         if (beacon_set)
2191                 cmd = NL80211_CMD_SET_BEACON;
2192
2193         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
2194                     0, cmd, 0);
2195         NLA_PUT(msg, NL80211_ATTR_BEACON_HEAD, head_len, head);
2196         NLA_PUT(msg, NL80211_ATTR_BEACON_TAIL, tail_len, tail);
2197         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
2198         if (!drv->beacon_int)
2199                 drv->beacon_int = 100;
2200         NLA_PUT_U32(msg, NL80211_ATTR_BEACON_INTERVAL, drv->beacon_int);
2201         NLA_PUT_U32(msg, NL80211_ATTR_DTIM_PERIOD, dtim_period);
2202
2203         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
2204         if (ret) {
2205                 wpa_printf(MSG_DEBUG, "nl80211: Beacon set failed: %d (%s)",
2206                            ret, strerror(-ret));
2207         } else {
2208 #ifdef HOSTAPD
2209                 bss->beacon_set = 1;
2210 #else /* HOSTAPD */
2211                 drv->beacon_set = 1;
2212 #endif /* HOSTAPD */
2213         }
2214         return ret;
2215  nla_put_failure:
2216         return -ENOBUFS;
2217 }
2218
2219
2220 static int wpa_driver_nl80211_set_beacon_int(void *priv, int value)
2221 {
2222         struct wpa_driver_nl80211_data *drv = priv;
2223         struct nl_msg *msg;
2224
2225         drv->beacon_int = value;
2226
2227 #ifdef HOSTAPD
2228         if (!drv->bss.beacon_set)
2229                 return 0;
2230 #else /* HOSTAPD */
2231         if (!drv->beacon_set)
2232                 return 0;
2233 #endif /* HOSTAPD */
2234
2235         msg = nlmsg_alloc();
2236         if (!msg)
2237                 return -ENOMEM;
2238
2239         wpa_printf(MSG_DEBUG, "nl80211: Set beacon interval %d", value);
2240         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
2241                     0, NL80211_CMD_SET_BEACON, 0);
2242         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
2243
2244         NLA_PUT_U32(msg, NL80211_ATTR_BEACON_INTERVAL, value);
2245
2246         return send_and_recv_msgs(drv, msg, NULL, NULL);
2247  nla_put_failure:
2248         return -ENOBUFS;
2249 }
2250
2251
2252 static int wpa_driver_nl80211_set_freq(struct wpa_driver_nl80211_data *drv,
2253                                        int freq, int ht_enabled,
2254                                        int sec_channel_offset)
2255 {
2256         struct nl_msg *msg;
2257         int ret;
2258
2259         msg = nlmsg_alloc();
2260         if (!msg)
2261                 return -1;
2262
2263         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
2264                     NL80211_CMD_SET_WIPHY, 0);
2265
2266         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
2267         NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, freq);
2268         if (ht_enabled) {
2269                 switch (sec_channel_offset) {
2270                 case -1:
2271                         NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
2272                                     NL80211_CHAN_HT40MINUS);
2273                         break;
2274                 case 1:
2275                         NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
2276                                     NL80211_CHAN_HT40PLUS);
2277                         break;
2278                 default:
2279                         NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
2280                                     NL80211_CHAN_HT20);
2281                         break;
2282                 }
2283         }
2284
2285         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
2286         if (ret == 0)
2287                 return 0;
2288         wpa_printf(MSG_DEBUG, "nl80211: Failed to set channel (freq=%d): "
2289                    "%d (%s)", freq, ret, strerror(-ret));
2290 nla_put_failure:
2291         return -1;
2292 }
2293
2294 #endif /* CONFIG_AP || HOSTAPD */
2295
2296
2297 #ifdef CONFIG_AP
2298
2299 static int wpa_driver_nl80211_set_beacon(void *priv,
2300                                          const u8 *head, size_t head_len,
2301                                          const u8 *tail, size_t tail_len,
2302                                          int dtim_period)
2303 {
2304         struct wpa_driver_nl80211_data *drv = priv;
2305         return wpa_driver_nl80211_set_beacon_iface(drv->ifindex, priv,
2306                                                    head, head_len,
2307                                                    tail, tail_len,
2308                                                    dtim_period);
2309 }
2310
2311 #endif /* CONFIG_AP */
2312
2313 #if defined(CONFIG_AP) || defined(HOSTAPD)
2314
2315 static void nl80211_remove_iface(struct wpa_driver_nl80211_data *drv,
2316                                  int ifidx)
2317 {
2318         struct nl_msg *msg;
2319
2320 #ifdef HOSTAPD
2321         /* stop listening for EAPOL on this interface */
2322         del_ifidx(drv, ifidx);
2323 #endif /* HOSTAPD */
2324
2325         msg = nlmsg_alloc();
2326         if (!msg)
2327                 goto nla_put_failure;
2328
2329         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
2330                     0, NL80211_CMD_DEL_INTERFACE, 0);
2331         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifidx);
2332
2333         if (send_and_recv_msgs(drv, msg, NULL, NULL) == 0)
2334                 return;
2335  nla_put_failure:
2336         wpa_printf(MSG_ERROR, "Failed to remove interface (ifidx=%d).\n",
2337                    ifidx);
2338 }
2339
2340
2341 static int nl80211_create_iface(struct wpa_driver_nl80211_data *drv,
2342                                 const char *ifname, enum nl80211_iftype iftype,
2343                                 const u8 *addr)
2344 {
2345         struct nl_msg *msg, *flags = NULL;
2346         int ifidx;
2347         int ret = -ENOBUFS;
2348
2349         msg = nlmsg_alloc();
2350         if (!msg)
2351                 return -1;
2352
2353         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
2354                     0, NL80211_CMD_NEW_INTERFACE, 0);
2355         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
2356         NLA_PUT_STRING(msg, NL80211_ATTR_IFNAME, ifname);
2357         NLA_PUT_U32(msg, NL80211_ATTR_IFTYPE, iftype);
2358
2359         if (iftype == NL80211_IFTYPE_MONITOR) {
2360                 int err;
2361
2362                 flags = nlmsg_alloc();
2363                 if (!flags)
2364                         goto nla_put_failure;
2365
2366                 NLA_PUT_FLAG(flags, NL80211_MNTR_FLAG_COOK_FRAMES);
2367
2368                 err = nla_put_nested(msg, NL80211_ATTR_MNTR_FLAGS, flags);
2369
2370                 nlmsg_free(flags);
2371
2372                 if (err)
2373                         goto nla_put_failure;
2374         }
2375
2376         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
2377         if (ret) {
2378  nla_put_failure:
2379                 wpa_printf(MSG_ERROR, "Failed to create interface %s.",
2380                            ifname);
2381                 return ret;
2382         }
2383
2384         ifidx = if_nametoindex(ifname);
2385
2386         if (ifidx <= 0)
2387                 return -1;
2388
2389 #ifdef HOSTAPD
2390         /* start listening for EAPOL on this interface */
2391         add_ifidx(drv, ifidx);
2392
2393         if (addr && iftype == NL80211_IFTYPE_AP &&
2394             set_ifhwaddr(drv, ifname, addr)) {
2395                 nl80211_remove_iface(drv, ifidx);
2396                 return -1;
2397         }
2398 #endif /* HOSTAPD */
2399
2400         return ifidx;
2401 }
2402
2403 #endif /* CONFIG_AP || HOSTAPD */
2404
2405 #ifdef CONFIG_AP
2406
2407 void ap_tx_status(void *ctx, const u8 *addr,
2408                   const u8 *buf, size_t len, int ack);
2409 void ap_rx_from_unknown_sta(void *ctx, const u8 *addr);
2410 void ap_mgmt_rx(void *ctx, u8 *buf, size_t len, u16 stype,
2411                 struct hostapd_frame_info *fi);
2412 void ap_mgmt_tx_cb(void *ctx, u8 *buf, size_t len, u16 stype, int ok);
2413
2414 #endif /* CONFIG_AP */
2415
2416 #if defined(CONFIG_AP) || defined(HOSTAPD)
2417
2418 static void handle_tx_callback(void *ctx, u8 *buf, size_t len, int ok)
2419 {
2420         struct ieee80211_hdr *hdr;
2421         u16 fc, type, stype;
2422
2423         hdr = (struct ieee80211_hdr *) buf;
2424         fc = le_to_host16(hdr->frame_control);
2425
2426         type = WLAN_FC_GET_TYPE(fc);
2427         stype = WLAN_FC_GET_STYPE(fc);
2428
2429         switch (type) {
2430         case WLAN_FC_TYPE_MGMT:
2431                 wpa_printf(MSG_DEBUG, "MGMT (TX callback) %s",
2432                            ok ? "ACK" : "fail");
2433 #ifdef HOSTAPD
2434                 hostapd_mgmt_tx_cb(ctx, buf, len, stype, ok);
2435 #else /* HOSTAPD */
2436                 ap_mgmt_tx_cb(ctx, buf, len, stype, ok);
2437 #endif /* HOSTAPD */
2438                 break;
2439         case WLAN_FC_TYPE_CTRL:
2440                 wpa_printf(MSG_DEBUG, "CTRL (TX callback) %s",
2441                            ok ? "ACK" : "fail");
2442                 break;
2443         case WLAN_FC_TYPE_DATA:
2444 #ifdef HOSTAPD
2445                 hostapd_tx_status(ctx, hdr->addr1, buf, len, ok);
2446 #else /* HOSTAPD */
2447                 ap_tx_status(ctx, hdr->addr1, buf, len, ok);
2448 #endif /* HOSTAPD */
2449                 break;
2450         default:
2451                 wpa_printf(MSG_DEBUG, "unknown TX callback frame type %d",
2452                            type);
2453                 break;
2454         }
2455 }
2456
2457
2458 static void from_unknown_sta(struct wpa_driver_nl80211_data *drv,
2459                              struct ieee80211_hdr *hdr, size_t len)
2460 {
2461 #ifdef HOSTAPD
2462         hostapd_rx_from_unknown_sta(drv->ctx, hdr, len);
2463 #else /* HOSTAPD */
2464         ap_rx_from_unknown_sta(drv->ctx, hdr->addr2);
2465 #endif /* HOSTAPD */
2466 }
2467
2468
2469 static void handle_frame(struct wpa_driver_nl80211_data *drv,
2470                          u8 *buf, size_t len,
2471                          struct hostapd_frame_info *hfi)
2472 {
2473         struct ieee80211_hdr *hdr;
2474         u16 fc, stype;
2475
2476         hdr = (struct ieee80211_hdr *) buf;
2477         fc = le_to_host16(hdr->frame_control);
2478         stype = WLAN_FC_GET_STYPE(fc);
2479
2480         switch (WLAN_FC_GET_TYPE(fc)) {
2481         case WLAN_FC_TYPE_MGMT:
2482                 if (stype != WLAN_FC_STYPE_BEACON &&
2483                     stype != WLAN_FC_STYPE_PROBE_REQ)
2484                         wpa_printf(MSG_MSGDUMP, "MGMT");
2485 #ifdef HOSTAPD
2486                 hostapd_mgmt_rx(drv->ctx, buf, len, stype, hfi);
2487 #else /* HOSTAPD */
2488                 ap_mgmt_rx(drv->ctx, buf, len, stype, hfi);
2489 #endif /* HOSTAPD */
2490                 break;
2491         case WLAN_FC_TYPE_CTRL:
2492                 /* can only get here with PS-Poll frames */
2493                 wpa_printf(MSG_DEBUG, "CTRL");
2494                 from_unknown_sta(drv, hdr, len);
2495                 break;
2496         case WLAN_FC_TYPE_DATA:
2497                 from_unknown_sta(drv, hdr, len);
2498                 break;
2499         }
2500 }
2501
2502
2503 static void handle_monitor_read(int sock, void *eloop_ctx, void *sock_ctx)
2504 {
2505         struct wpa_driver_nl80211_data *drv = eloop_ctx;
2506         int len;
2507         unsigned char buf[3000];
2508         struct ieee80211_radiotap_iterator iter;
2509         int ret;
2510         struct hostapd_frame_info hfi;
2511         int injected = 0, failed = 0, rxflags = 0;
2512
2513         len = recv(sock, buf, sizeof(buf), 0);
2514         if (len < 0) {
2515                 perror("recv");
2516                 return;
2517         }
2518
2519         if (ieee80211_radiotap_iterator_init(&iter, (void*)buf, len)) {
2520                 printf("received invalid radiotap frame\n");
2521                 return;
2522         }
2523
2524         memset(&hfi, 0, sizeof(hfi));
2525
2526         while (1) {
2527                 ret = ieee80211_radiotap_iterator_next(&iter);
2528                 if (ret == -ENOENT)
2529                         break;
2530                 if (ret) {
2531                         printf("received invalid radiotap frame (%d)\n", ret);
2532                         return;
2533                 }
2534                 switch (iter.this_arg_index) {
2535                 case IEEE80211_RADIOTAP_FLAGS:
2536                         if (*iter.this_arg & IEEE80211_RADIOTAP_F_FCS)
2537                                 len -= 4;
2538                         break;
2539                 case IEEE80211_RADIOTAP_RX_FLAGS:
2540                         rxflags = 1;
2541                         break;
2542                 case IEEE80211_RADIOTAP_TX_FLAGS:
2543                         injected = 1;
2544                         failed = le_to_host16((*(uint16_t *) iter.this_arg)) &
2545                                         IEEE80211_RADIOTAP_F_TX_FAIL;
2546                         break;
2547                 case IEEE80211_RADIOTAP_DATA_RETRIES:
2548                         break;
2549                 case IEEE80211_RADIOTAP_CHANNEL:
2550                         /* TODO convert from freq/flags to channel number
2551                         hfi.channel = XXX;
2552                         hfi.phytype = XXX;
2553                          */
2554                         break;
2555                 case IEEE80211_RADIOTAP_RATE:
2556                         hfi.datarate = *iter.this_arg * 5;
2557                         break;
2558                 case IEEE80211_RADIOTAP_DB_ANTSIGNAL:
2559                         hfi.ssi_signal = *iter.this_arg;
2560                         break;
2561                 }
2562         }
2563
2564         if (rxflags && injected)
2565                 return;
2566
2567         if (!injected)
2568                 handle_frame(drv, buf + iter.max_length,
2569                              len - iter.max_length, &hfi);
2570         else
2571                 handle_tx_callback(drv->ctx, buf + iter.max_length,
2572                                    len - iter.max_length, !failed);
2573 }
2574
2575
2576 /*
2577  * we post-process the filter code later and rewrite
2578  * this to the offset to the last instruction
2579  */
2580 #define PASS    0xFF
2581 #define FAIL    0xFE
2582
2583 static struct sock_filter msock_filter_insns[] = {
2584         /*
2585          * do a little-endian load of the radiotap length field
2586          */
2587         /* load lower byte into A */
2588         BPF_STMT(BPF_LD  | BPF_B | BPF_ABS, 2),
2589         /* put it into X (== index register) */
2590         BPF_STMT(BPF_MISC| BPF_TAX, 0),
2591         /* load upper byte into A */
2592         BPF_STMT(BPF_LD  | BPF_B | BPF_ABS, 3),
2593         /* left-shift it by 8 */
2594         BPF_STMT(BPF_ALU | BPF_LSH | BPF_K, 8),
2595         /* or with X */
2596         BPF_STMT(BPF_ALU | BPF_OR | BPF_X, 0),
2597         /* put result into X */
2598         BPF_STMT(BPF_MISC| BPF_TAX, 0),
2599
2600         /*
2601          * Allow management frames through, this also gives us those
2602          * management frames that we sent ourselves with status
2603          */
2604         /* load the lower byte of the IEEE 802.11 frame control field */
2605         BPF_STMT(BPF_LD  | BPF_B | BPF_IND, 0),
2606         /* mask off frame type and version */
2607         BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0xF),
2608         /* accept frame if it's both 0, fall through otherwise */
2609         BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0, PASS, 0),
2610
2611         /*
2612          * TODO: add a bit to radiotap RX flags that indicates
2613          * that the sending station is not associated, then
2614          * add a filter here that filters on our DA and that flag
2615          * to allow us to deauth frames to that bad station.
2616          *
2617          * Not a regression -- we didn't do it before either.
2618          */
2619
2620 #if 0
2621         /*
2622          * drop non-data frames, WDS frames
2623          */
2624         /* load the lower byte of the frame control field */
2625         BPF_STMT(BPF_LD   | BPF_B | BPF_IND, 0),
2626         /* mask off QoS bit */
2627         BPF_STMT(BPF_ALU  | BPF_AND | BPF_K, 0x0c),
2628         /* drop non-data frames */
2629         BPF_JUMP(BPF_JMP  | BPF_JEQ | BPF_K, 8, 0, FAIL),
2630         /* load the upper byte of the frame control field */
2631         BPF_STMT(BPF_LD   | BPF_B | BPF_IND, 0),
2632         /* mask off toDS/fromDS */
2633         BPF_STMT(BPF_ALU  | BPF_AND | BPF_K, 0x03),
2634         /* drop WDS frames */
2635         BPF_JUMP(BPF_JMP  | BPF_JEQ | BPF_K, 3, FAIL, 0),
2636 #endif
2637
2638         /*
2639          * add header length to index
2640          */
2641         /* load the lower byte of the frame control field */
2642         BPF_STMT(BPF_LD   | BPF_B | BPF_IND, 0),
2643         /* mask off QoS bit */
2644         BPF_STMT(BPF_ALU  | BPF_AND | BPF_K, 0x80),
2645         /* right shift it by 6 to give 0 or 2 */
2646         BPF_STMT(BPF_ALU  | BPF_RSH | BPF_K, 6),
2647         /* add data frame header length */
2648         BPF_STMT(BPF_ALU  | BPF_ADD | BPF_K, 24),
2649         /* add index, was start of 802.11 header */
2650         BPF_STMT(BPF_ALU  | BPF_ADD | BPF_X, 0),
2651         /* move to index, now start of LL header */
2652         BPF_STMT(BPF_MISC | BPF_TAX, 0),
2653
2654         /*
2655          * Accept empty data frames, we use those for
2656          * polling activity.
2657          */
2658         BPF_STMT(BPF_LD  | BPF_W | BPF_LEN, 0),
2659         BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_X, 0, PASS, 0),
2660
2661         /*
2662          * Accept EAPOL frames
2663          */
2664         BPF_STMT(BPF_LD  | BPF_W | BPF_IND, 0),
2665         BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0xAAAA0300, 0, FAIL),
2666         BPF_STMT(BPF_LD  | BPF_W | BPF_IND, 4),
2667         BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x0000888E, PASS, FAIL),
2668
2669         /* keep these last two statements or change the code below */
2670         /* return 0 == "DROP" */
2671         BPF_STMT(BPF_RET | BPF_K, 0),
2672         /* return ~0 == "keep all" */
2673         BPF_STMT(BPF_RET | BPF_K, ~0),
2674 };
2675
2676 static struct sock_fprog msock_filter = {
2677         .len = sizeof(msock_filter_insns)/sizeof(msock_filter_insns[0]),
2678         .filter = msock_filter_insns,
2679 };
2680
2681
2682 static int add_monitor_filter(int s)
2683 {
2684         int idx;
2685
2686         /* rewrite all PASS/FAIL jump offsets */
2687         for (idx = 0; idx < msock_filter.len; idx++) {
2688                 struct sock_filter *insn = &msock_filter_insns[idx];
2689
2690                 if (BPF_CLASS(insn->code) == BPF_JMP) {
2691                         if (insn->code == (BPF_JMP|BPF_JA)) {
2692                                 if (insn->k == PASS)
2693                                         insn->k = msock_filter.len - idx - 2;
2694                                 else if (insn->k == FAIL)
2695                                         insn->k = msock_filter.len - idx - 3;
2696                         }
2697
2698                         if (insn->jt == PASS)
2699                                 insn->jt = msock_filter.len - idx - 2;
2700                         else if (insn->jt == FAIL)
2701                                 insn->jt = msock_filter.len - idx - 3;
2702
2703                         if (insn->jf == PASS)
2704                                 insn->jf = msock_filter.len - idx - 2;
2705                         else if (insn->jf == FAIL)
2706                                 insn->jf = msock_filter.len - idx - 3;
2707                 }
2708         }
2709
2710         if (setsockopt(s, SOL_SOCKET, SO_ATTACH_FILTER,
2711                        &msock_filter, sizeof(msock_filter))) {
2712                 perror("SO_ATTACH_FILTER");
2713                 return -1;
2714         }
2715
2716         return 0;
2717 }
2718
2719
2720 static int
2721 nl80211_create_monitor_interface(struct wpa_driver_nl80211_data *drv)
2722 {
2723         char buf[IFNAMSIZ];
2724         struct sockaddr_ll ll;
2725         int optval;
2726         socklen_t optlen;
2727
2728         snprintf(buf, IFNAMSIZ, "mon.%s", drv->ifname);
2729         buf[IFNAMSIZ - 1] = '\0';
2730
2731         drv->monitor_ifidx =
2732                 nl80211_create_iface(drv, buf, NL80211_IFTYPE_MONITOR, NULL);
2733
2734         if (drv->monitor_ifidx < 0)
2735                 return -1;
2736
2737         if (hostapd_set_iface_flags(drv, buf, 1))
2738                 goto error;
2739
2740         memset(&ll, 0, sizeof(ll));
2741         ll.sll_family = AF_PACKET;
2742         ll.sll_ifindex = drv->monitor_ifidx;
2743         drv->monitor_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
2744         if (drv->monitor_sock < 0) {
2745                 perror("socket[PF_PACKET,SOCK_RAW]");
2746                 goto error;
2747         }
2748
2749         if (add_monitor_filter(drv->monitor_sock)) {
2750                 wpa_printf(MSG_INFO, "Failed to set socket filter for monitor "
2751                            "interface; do filtering in user space");
2752                 /* This works, but will cost in performance. */
2753         }
2754
2755         if (bind(drv->monitor_sock, (struct sockaddr *) &ll, sizeof(ll)) < 0) {
2756                 perror("monitor socket bind");
2757                 goto error;
2758         }
2759
2760         optlen = sizeof(optval);
2761         optval = 20;
2762         if (setsockopt
2763             (drv->monitor_sock, SOL_SOCKET, SO_PRIORITY, &optval, optlen)) {
2764                 perror("Failed to set socket priority");
2765                 goto error;
2766         }
2767
2768         if (eloop_register_read_sock(drv->monitor_sock, handle_monitor_read,
2769                                      drv, NULL)) {
2770                 printf("Could not register monitor read socket\n");
2771                 goto error;
2772         }
2773
2774         return 0;
2775  error:
2776         nl80211_remove_iface(drv, drv->monitor_ifidx);
2777         return -1;
2778 }
2779
2780 #endif /* CONFIG_AP || HOSTAPD */
2781
2782 #ifdef CONFIG_AP
2783
2784 static int wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data *drv,
2785                                  struct wpa_driver_associate_params *params)
2786 {
2787         if (drv->monitor_ifidx < 0 &&
2788             nl80211_create_monitor_interface(drv))
2789                 return -1;
2790
2791         if (wpa_driver_nl80211_set_mode(drv, params->mode) ||
2792             wpa_driver_nl80211_set_freq(drv, params->freq, 0, 0)) {
2793                 nl80211_remove_iface(drv, drv->monitor_ifidx);
2794                 drv->monitor_ifidx = -1;
2795                 return -1;
2796         }
2797
2798         /* TODO: setup monitor interface (and add code somewhere to remove this
2799          * when AP mode is stopped; associate with mode != 2 or drv_deinit) */
2800
2801         return 0;
2802 }
2803 #endif /* CONFIG_AP */
2804
2805
2806 static int wpa_driver_nl80211_associate(
2807         void *priv, struct wpa_driver_associate_params *params)
2808 {
2809         struct wpa_driver_nl80211_data *drv = priv;
2810         int ret = -1;
2811         struct nl_msg *msg;
2812
2813 #ifdef CONFIG_AP
2814         if (params->mode == 2)
2815                 return wpa_driver_nl80211_ap(drv, params);
2816 #endif /* CONFIG_AP */
2817
2818 #ifndef NO_WEXT
2819         wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_DROP_UNENCRYPTED,
2820                                           params->drop_unencrypted);
2821 #endif /* NO_WEXT */
2822
2823         drv->associated = 0;
2824
2825         msg = nlmsg_alloc();
2826         if (!msg)
2827                 return -1;
2828
2829         wpa_printf(MSG_DEBUG, "nl80211: Associate (ifindex=%d)",
2830                    drv->ifindex);
2831         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
2832                     NL80211_CMD_ASSOCIATE, 0);
2833
2834         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
2835         if (params->bssid) {
2836                 wpa_printf(MSG_DEBUG, "  * bssid=" MACSTR,
2837                            MAC2STR(params->bssid));
2838                 NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid);
2839         }
2840         if (params->freq) {
2841                 wpa_printf(MSG_DEBUG, "  * freq=%d", params->freq);
2842                 NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq);
2843         }
2844         if (params->ssid) {
2845                 wpa_hexdump_ascii(MSG_DEBUG, "  * SSID",
2846                                   params->ssid, params->ssid_len);
2847                 NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
2848                         params->ssid);
2849                 if (params->ssid_len > sizeof(drv->ssid))
2850                         goto nla_put_failure;
2851                 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
2852                 drv->ssid_len = params->ssid_len;
2853         }
2854         wpa_hexdump(MSG_DEBUG, "  * IEs", params->wpa_ie, params->wpa_ie_len);
2855         if (params->wpa_ie)
2856                 NLA_PUT(msg, NL80211_ATTR_IE, params->wpa_ie_len,
2857                         params->wpa_ie);
2858
2859         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
2860         msg = NULL;
2861         if (ret) {
2862                 wpa_printf(MSG_DEBUG, "nl80211: MLME command failed: ret=%d "
2863                            "(%s)", ret, strerror(-ret));
2864                 goto nla_put_failure;
2865         }
2866         ret = 0;
2867         wpa_printf(MSG_DEBUG, "nl80211: Association request send "
2868                    "successfully");
2869
2870 nla_put_failure:
2871         nlmsg_free(msg);
2872         return ret;
2873 }
2874
2875
2876 static int nl80211_set_mode(struct wpa_driver_nl80211_data *drv,
2877                             int ifindex, int mode)
2878 {
2879         struct nl_msg *msg;
2880         int ret = -ENOBUFS;
2881
2882         msg = nlmsg_alloc();
2883         if (!msg)
2884                 return -ENOMEM;
2885
2886         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
2887                     0, NL80211_CMD_SET_INTERFACE, 0);
2888         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
2889         NLA_PUT_U32(msg, NL80211_ATTR_IFTYPE, mode);
2890
2891         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
2892         if (!ret)
2893                 return 0;
2894 nla_put_failure:
2895         wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface %d to mode %d:"
2896                    " %d (%s)", ifindex, mode, ret, strerror(-ret));
2897         return ret;
2898 }
2899
2900
2901 static int wpa_driver_nl80211_set_mode(void *priv, int mode)
2902 {
2903         struct wpa_driver_nl80211_data *drv = priv;
2904         int ret = -1;
2905         int nlmode;
2906
2907         switch (mode) {
2908         case 0:
2909                 nlmode = NL80211_IFTYPE_STATION;
2910                 break;
2911         case 1:
2912                 nlmode = NL80211_IFTYPE_ADHOC;
2913                 break;
2914         case 2:
2915                 nlmode = NL80211_IFTYPE_AP;
2916                 break;
2917         default:
2918                 return -1;
2919         }
2920
2921         if (nl80211_set_mode(drv, drv->ifindex, nlmode) == 0) {
2922                 drv->nlmode = nlmode;
2923                 return 0;
2924         }
2925
2926         if (nlmode == drv->nlmode)
2927                 return 0; /* Already in the requested mode */
2928
2929         /* mac80211 doesn't allow mode changes while the device is up, so
2930          * take the device down, try to set the mode again, and bring the
2931          * device back up.
2932          */
2933         if (hostapd_set_iface_flags(drv, drv->ifname, 0) == 0) {
2934                 /* Try to set the mode again while the interface is down */
2935                 ret = nl80211_set_mode(drv, drv->ifindex, nlmode);
2936                 if (hostapd_set_iface_flags(drv, drv->ifname, 1))
2937                         ret = -1;
2938         }
2939
2940         if (!ret)
2941                 drv->nlmode = nlmode;
2942
2943         return ret;
2944 }
2945
2946
2947 static int wpa_driver_nl80211_get_capa(void *priv,
2948                                        struct wpa_driver_capa *capa)
2949 {
2950         struct wpa_driver_nl80211_data *drv = priv;
2951         if (!drv->has_capability)
2952                 return -1;
2953         os_memcpy(capa, &drv->capa, sizeof(*capa));
2954         return 0;
2955 }
2956
2957
2958 static int wpa_driver_nl80211_set_operstate(void *priv, int state)
2959 {
2960         struct wpa_driver_nl80211_data *drv = priv;
2961
2962         wpa_printf(MSG_DEBUG, "%s: operstate %d->%d (%s)",
2963                    __func__, drv->operstate, state, state ? "UP" : "DORMANT");
2964         drv->operstate = state;
2965         return wpa_driver_nl80211_send_oper_ifla(
2966                 drv, -1, state ? IF_OPER_UP : IF_OPER_DORMANT);
2967 }
2968
2969
2970 #ifdef HOSTAPD
2971
2972 static const u8 rfc1042_header[6] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
2973
2974
2975 static struct i802_bss * get_bss(struct wpa_driver_nl80211_data *drv,
2976                                  int ifindex)
2977 {
2978         struct i802_bss *bss = &drv->bss;
2979         while (bss) {
2980                 if (ifindex == bss->ifindex)
2981                         return bss;
2982                 bss = bss->next;
2983         }
2984         wpa_printf(MSG_DEBUG, "nl80211: get_bss(%d) failed", ifindex);
2985         return NULL;
2986 }
2987
2988
2989 static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
2990 {
2991         int i;
2992         int *old;
2993
2994         wpa_printf(MSG_DEBUG, "nl80211: Add own interface ifindex %d",
2995                    ifidx);
2996         for (i = 0; i < drv->num_if_indices; i++) {
2997                 if (drv->if_indices[i] == 0) {
2998                         drv->if_indices[i] = ifidx;
2999                         return;
3000                 }
3001         }
3002
3003         if (drv->if_indices != drv->default_if_indices)
3004                 old = drv->if_indices;
3005         else
3006                 old = NULL;
3007
3008         drv->if_indices = realloc(old,
3009                                   sizeof(int) * (drv->num_if_indices + 1));
3010         if (!drv->if_indices) {
3011                 if (!old)
3012                         drv->if_indices = drv->default_if_indices;
3013                 else
3014                         drv->if_indices = old;
3015                 wpa_printf(MSG_ERROR, "Failed to reallocate memory for "
3016                            "interfaces");
3017                 wpa_printf(MSG_ERROR, "Ignoring EAPOL on interface %d", ifidx);
3018                 return;
3019         }
3020         drv->if_indices[drv->num_if_indices] = ifidx;
3021         drv->num_if_indices++;
3022 }
3023
3024
3025 static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
3026 {
3027         int i;
3028
3029         for (i = 0; i < drv->num_if_indices; i++) {
3030                 if (drv->if_indices[i] == ifidx) {
3031                         drv->if_indices[i] = 0;
3032                         break;
3033                 }
3034         }
3035 }
3036
3037
3038 static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
3039 {
3040         int i;
3041
3042         for (i = 0; i < drv->num_if_indices; i++)
3043                 if (drv->if_indices[i] == ifidx)
3044                         return 1;
3045
3046         return 0;
3047 }
3048
3049
3050 static int i802_set_key(const char *iface, void *priv, wpa_alg alg,
3051                         const u8 *addr, int key_idx, int set_tx, const u8 *seq,
3052                         size_t seq_len, const u8 *key, size_t key_len)
3053 {
3054         struct wpa_driver_nl80211_data *drv = priv;
3055         return nl_set_encr(if_nametoindex(iface), drv, alg, addr, key_idx,
3056                            set_tx, seq, seq_len, key, key_len);
3057 }
3058
3059
3060 static inline int min_int(int a, int b)
3061 {
3062         if (a < b)
3063                 return a;
3064         return b;
3065 }
3066
3067
3068 static int get_key_handler(struct nl_msg *msg, void *arg)
3069 {
3070         struct nlattr *tb[NL80211_ATTR_MAX + 1];
3071         struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
3072
3073         nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
3074                   genlmsg_attrlen(gnlh, 0), NULL);
3075
3076         /*
3077          * TODO: validate the key index and mac address!
3078          * Otherwise, there's a race condition as soon as
3079          * the kernel starts sending key notifications.
3080          */
3081
3082         if (tb[NL80211_ATTR_KEY_SEQ])
3083                 memcpy(arg, nla_data(tb[NL80211_ATTR_KEY_SEQ]),
3084                        min_int(nla_len(tb[NL80211_ATTR_KEY_SEQ]), 6));
3085         return NL_SKIP;
3086 }
3087
3088
3089 static int i802_get_seqnum(const char *iface, void *priv, const u8 *addr,
3090                            int idx, u8 *seq)
3091 {
3092         struct wpa_driver_nl80211_data *drv = priv;
3093         struct nl_msg *msg;
3094
3095         msg = nlmsg_alloc();
3096         if (!msg)
3097                 return -ENOMEM;
3098
3099         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
3100                     0, NL80211_CMD_GET_KEY, 0);
3101
3102         if (addr)
3103                 NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
3104         NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, idx);
3105         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(iface));
3106
3107         memset(seq, 0, 6);
3108
3109         return send_and_recv_msgs(drv, msg, get_key_handler, seq);
3110  nla_put_failure:
3111         return -ENOBUFS;
3112 }
3113
3114
3115 static int i802_set_rate_sets(void *priv, int *supp_rates, int *basic_rates,
3116                               int mode)
3117 {
3118         struct wpa_driver_nl80211_data *drv = priv;
3119         struct nl_msg *msg;
3120         u8 rates[NL80211_MAX_SUPP_RATES];
3121         u8 rates_len = 0;
3122         int i;
3123
3124         msg = nlmsg_alloc();
3125         if (!msg)
3126                 return -ENOMEM;
3127
3128         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
3129                     NL80211_CMD_SET_BSS, 0);
3130
3131         for (i = 0; i < NL80211_MAX_SUPP_RATES && basic_rates[i] >= 0; i++)
3132                 rates[rates_len++] = basic_rates[i] / 5;
3133
3134         NLA_PUT(msg, NL80211_ATTR_BSS_BASIC_RATES, rates_len, rates);
3135
3136         /* TODO: multi-BSS support */
3137         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(drv->ifname));
3138
3139         return send_and_recv_msgs(drv, msg, NULL, NULL);
3140  nla_put_failure:
3141         return -ENOBUFS;
3142 }
3143
3144
3145 /* Set kernel driver on given frequency (MHz) */
3146 static int i802_set_freq(void *priv, struct hostapd_freq_params *freq)
3147 {
3148         struct wpa_driver_nl80211_data *drv = priv;
3149         return wpa_driver_nl80211_set_freq(drv, freq->freq, freq->ht_enabled,
3150                                            freq->sec_channel_offset);
3151 }
3152
3153
3154 static int i802_set_rts(void *priv, int rts)
3155 {
3156 #ifdef NO_WEXT
3157         return -1;
3158 #else /* NO_WEXT */
3159         struct wpa_driver_nl80211_data *drv = priv;
3160         struct iwreq iwr;
3161
3162         memset(&iwr, 0, sizeof(iwr));
3163         os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
3164         iwr.u.rts.value = rts;
3165         iwr.u.rts.fixed = 1;
3166
3167         if (ioctl(drv->ioctl_sock, SIOCSIWRTS, &iwr) < 0) {
3168                 perror("ioctl[SIOCSIWRTS]");
3169                 return -1;
3170         }
3171
3172         return 0;
3173 #endif /* NO_WEXT */
3174 }
3175
3176
3177 static int i802_set_frag(void *priv, int frag)
3178 {
3179 #ifdef NO_WEXT
3180         return -1;
3181 #else /* NO_WEXT */
3182         struct wpa_driver_nl80211_data *drv = priv;
3183         struct iwreq iwr;
3184
3185         memset(&iwr, 0, sizeof(iwr));
3186         os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
3187         iwr.u.frag.value = frag;
3188         iwr.u.frag.fixed = 1;
3189
3190         if (ioctl(drv->ioctl_sock, SIOCSIWFRAG, &iwr) < 0) {
3191                 perror("ioctl[SIOCSIWFRAG]");
3192                 return -1;
3193         }
3194
3195         return 0;
3196 #endif /* NO_WEXT */
3197 }
3198
3199
3200 static int i802_set_retry(void *priv, int short_retry, int long_retry)
3201 {
3202 #ifdef NO_WEXT
3203         return -1;
3204 #else /* NO_WEXT */
3205         struct wpa_driver_nl80211_data *drv = priv;
3206         struct iwreq iwr;
3207
3208         memset(&iwr, 0, sizeof(iwr));
3209         os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
3210
3211         iwr.u.retry.value = short_retry;
3212         iwr.u.retry.flags = IW_RETRY_LIMIT | IW_RETRY_MIN;
3213         if (ioctl(drv->ioctl_sock, SIOCSIWRETRY, &iwr) < 0) {
3214                 perror("ioctl[SIOCSIWRETRY(short)]");
3215                 return -1;
3216         }
3217
3218         iwr.u.retry.value = long_retry;
3219         iwr.u.retry.flags = IW_RETRY_LIMIT | IW_RETRY_MAX;
3220         if (ioctl(drv->ioctl_sock, SIOCSIWRETRY, &iwr) < 0) {
3221                 perror("ioctl[SIOCSIWRETRY(long)]");
3222                 return -1;
3223         }
3224
3225         return 0;
3226 #endif /* NO_WEXT */
3227 }
3228
3229
3230 static int i802_flush(void *priv)
3231 {
3232         struct wpa_driver_nl80211_data *drv = priv;
3233         struct nl_msg *msg;
3234
3235         msg = nlmsg_alloc();
3236         if (!msg)
3237                 return -1;
3238
3239         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
3240                     0, NL80211_CMD_DEL_STATION, 0);
3241
3242         /*
3243          * XXX: FIX! this needs to flush all VLANs too
3244          */
3245         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
3246                     if_nametoindex(drv->ifname));
3247
3248         return send_and_recv_msgs(drv, msg, NULL, NULL);
3249  nla_put_failure:
3250         return -ENOBUFS;
3251 }
3252
3253
3254 static int get_sta_handler(struct nl_msg *msg, void *arg)
3255 {
3256         struct nlattr *tb[NL80211_ATTR_MAX + 1];
3257         struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
3258         struct hostap_sta_driver_data *data = arg;
3259         struct nlattr *stats[NL80211_STA_INFO_MAX + 1];
3260         static struct nla_policy stats_policy[NL80211_STA_INFO_MAX + 1] = {
3261                 [NL80211_STA_INFO_INACTIVE_TIME] = { .type = NLA_U32 },
3262                 [NL80211_STA_INFO_RX_BYTES] = { .type = NLA_U32 },
3263                 [NL80211_STA_INFO_TX_BYTES] = { .type = NLA_U32 },
3264                 [NL80211_STA_INFO_RX_PACKETS] = { .type = NLA_U32 },
3265                 [NL80211_STA_INFO_TX_PACKETS] = { .type = NLA_U32 },
3266         };
3267
3268         nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
3269                   genlmsg_attrlen(gnlh, 0), NULL);
3270
3271         /*
3272          * TODO: validate the interface and mac address!
3273          * Otherwise, there's a race condition as soon as
3274          * the kernel starts sending station notifications.
3275          */
3276
3277         if (!tb[NL80211_ATTR_STA_INFO]) {
3278                 wpa_printf(MSG_DEBUG, "sta stats missing!");
3279                 return NL_SKIP;
3280         }
3281         if (nla_parse_nested(stats, NL80211_STA_INFO_MAX,
3282                              tb[NL80211_ATTR_STA_INFO],
3283                              stats_policy)) {
3284                 wpa_printf(MSG_DEBUG, "failed to parse nested attributes!");
3285                 return NL_SKIP;
3286         }
3287
3288         if (stats[NL80211_STA_INFO_INACTIVE_TIME])
3289                 data->inactive_msec =
3290                         nla_get_u32(stats[NL80211_STA_INFO_INACTIVE_TIME]);
3291         if (stats[NL80211_STA_INFO_RX_BYTES])
3292                 data->rx_bytes = nla_get_u32(stats[NL80211_STA_INFO_RX_BYTES]);
3293         if (stats[NL80211_STA_INFO_TX_BYTES])
3294                 data->tx_bytes = nla_get_u32(stats[NL80211_STA_INFO_TX_BYTES]);
3295         if (stats[NL80211_STA_INFO_RX_PACKETS])
3296                 data->rx_packets =
3297                         nla_get_u32(stats[NL80211_STA_INFO_RX_PACKETS]);
3298         if (stats[NL80211_STA_INFO_TX_PACKETS])
3299                 data->tx_packets =
3300                         nla_get_u32(stats[NL80211_STA_INFO_TX_PACKETS]);
3301
3302         return NL_SKIP;
3303 }
3304
3305 static int i802_read_sta_data(void *priv, struct hostap_sta_driver_data *data,
3306                               const u8 *addr)
3307 {
3308         struct wpa_driver_nl80211_data *drv = priv;
3309         struct nl_msg *msg;
3310
3311         os_memset(data, 0, sizeof(*data));
3312         msg = nlmsg_alloc();
3313         if (!msg)
3314                 return -ENOMEM;
3315
3316         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
3317                     0, NL80211_CMD_GET_STATION, 0);
3318
3319         NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
3320         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(drv->ifname));
3321
3322         return send_and_recv_msgs(drv, msg, get_sta_handler, data);
3323  nla_put_failure:
3324         return -ENOBUFS;
3325 }
3326
3327
3328 static int i802_send_eapol(void *priv, const u8 *addr, const u8 *data,
3329                            size_t data_len, int encrypt, const u8 *own_addr)
3330 {
3331         struct wpa_driver_nl80211_data *drv = priv;
3332         struct ieee80211_hdr *hdr;
3333         size_t len;
3334         u8 *pos;
3335         int res;
3336 #if 0 /* FIX */
3337         int qos = sta->flags & WLAN_STA_WME;
3338 #else
3339         int qos = 0;
3340 #endif
3341
3342         len = sizeof(*hdr) + (qos ? 2 : 0) + sizeof(rfc1042_header) + 2 +
3343                 data_len;
3344         hdr = os_zalloc(len);
3345         if (hdr == NULL) {
3346                 printf("malloc() failed for i802_send_data(len=%lu)\n",
3347                        (unsigned long) len);
3348                 return -1;
3349         }
3350
3351         hdr->frame_control =
3352                 IEEE80211_FC(WLAN_FC_TYPE_DATA, WLAN_FC_STYPE_DATA);
3353         hdr->frame_control |= host_to_le16(WLAN_FC_FROMDS);
3354         if (encrypt)
3355                 hdr->frame_control |= host_to_le16(WLAN_FC_ISWEP);
3356 #if 0 /* To be enabled if qos determination is added above */
3357         if (qos) {
3358                 hdr->frame_control |=
3359                         host_to_le16(WLAN_FC_STYPE_QOS_DATA << 4);
3360         }
3361 #endif
3362
3363         memcpy(hdr->IEEE80211_DA_FROMDS, addr, ETH_ALEN);
3364         memcpy(hdr->IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
3365         memcpy(hdr->IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
3366         pos = (u8 *) (hdr + 1);
3367
3368 #if 0 /* To be enabled if qos determination is added above */
3369         if (qos) {
3370                 /* add an empty QoS header if needed */
3371                 pos[0] = 0;
3372                 pos[1] = 0;
3373                 pos += 2;
3374         }
3375 #endif
3376
3377         memcpy(pos, rfc1042_header, sizeof(rfc1042_header));
3378         pos += sizeof(rfc1042_header);
3379         WPA_PUT_BE16(pos, ETH_P_PAE);
3380         pos += 2;
3381         memcpy(pos, data, data_len);
3382
3383         res = wpa_driver_nl80211_send_frame(drv, (u8 *) hdr, len, encrypt);
3384         if (res < 0) {
3385                 wpa_printf(MSG_ERROR, "i802_send_eapol - packet len: %lu - "
3386                            "failed: %d (%s)",
3387                            (unsigned long) len, errno, strerror(errno));
3388         }
3389         free(hdr);
3390
3391         return res;
3392 }
3393
3394
3395 static int i802_sta_add(const char *ifname, void *priv,
3396                         struct hostapd_sta_add_params *params)
3397 {
3398         struct wpa_driver_nl80211_data *drv = priv;
3399         struct nl_msg *msg;
3400         int ret = -ENOBUFS;
3401
3402         msg = nlmsg_alloc();
3403         if (!msg)
3404                 return -ENOMEM;
3405
3406         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
3407                     0, NL80211_CMD_NEW_STATION, 0);
3408
3409         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
3410                     if_nametoindex(drv->ifname));
3411         NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->addr);
3412         NLA_PUT_U16(msg, NL80211_ATTR_STA_AID, params->aid);
3413         NLA_PUT(msg, NL80211_ATTR_STA_SUPPORTED_RATES, params->supp_rates_len,
3414                 params->supp_rates);
3415         NLA_PUT_U16(msg, NL80211_ATTR_STA_LISTEN_INTERVAL,
3416                     params->listen_interval);
3417
3418 #ifdef CONFIG_IEEE80211N
3419         if (params->ht_capabilities) {
3420                 NLA_PUT(msg, NL80211_ATTR_HT_CAPABILITY,
3421                         params->ht_capabilities->length,
3422                         &params->ht_capabilities->data);
3423         }
3424 #endif /* CONFIG_IEEE80211N */
3425
3426         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
3427         if (ret)
3428                 wpa_printf(MSG_DEBUG, "nl80211: NL80211_CMD_NEW_STATION "
3429                            "result: %d (%s)", ret, strerror(-ret));
3430         if (ret == -EEXIST)
3431                 ret = 0;
3432  nla_put_failure:
3433         return ret;
3434 }
3435
3436
3437 static int i802_sta_remove(void *priv, const u8 *addr)
3438 {
3439         struct wpa_driver_nl80211_data *drv = priv;
3440         struct nl_msg *msg;
3441         int ret;
3442
3443         msg = nlmsg_alloc();
3444         if (!msg)
3445                 return -ENOMEM;
3446
3447         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
3448                     0, NL80211_CMD_DEL_STATION, 0);
3449
3450         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
3451                     if_nametoindex(drv->ifname));
3452         NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
3453
3454         ret = send_and_recv_msgs(drv, msg, NULL, NULL);
3455         if (ret == -ENOENT)
3456                 return 0;
3457         return ret;
3458  nla_put_failure:
3459         return -ENOBUFS;
3460 }
3461
3462
3463 static int i802_sta_set_flags(void *priv, const u8 *addr,
3464                               int total_flags, int flags_or, int flags_and)
3465 {
3466         struct wpa_driver_nl80211_data *drv = priv;
3467         struct nl_msg *msg, *flags = NULL;
3468
3469         msg = nlmsg_alloc();
3470         if (!msg)
3471                 return -ENOMEM;
3472
3473         flags = nlmsg_alloc();
3474         if (!flags) {
3475                 nlmsg_free(msg);
3476                 return -ENOMEM;
3477         }
3478
3479         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
3480                     0, NL80211_CMD_SET_STATION, 0);
3481
3482         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
3483                     if_nametoindex(drv->ifname));
3484         NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
3485
3486         if (total_flags & WLAN_STA_AUTHORIZED)
3487                 NLA_PUT_FLAG(flags, NL80211_STA_FLAG_AUTHORIZED);
3488
3489         if (total_flags & WLAN_STA_WMM)
3490                 NLA_PUT_FLAG(flags, NL80211_STA_FLAG_WME);
3491
3492         if (total_flags & WLAN_STA_SHORT_PREAMBLE)
3493                 NLA_PUT_FLAG(flags, NL80211_STA_FLAG_SHORT_PREAMBLE);
3494
3495         if (total_flags & WLAN_STA_MFP)
3496                 NLA_PUT_FLAG(flags, NL80211_STA_FLAG_MFP);
3497
3498         if (nla_put_nested(msg, NL80211_ATTR_STA_FLAGS, flags))
3499                 goto nla_put_failure;
3500
3501         nlmsg_free(flags);
3502
3503         return send_and_recv_msgs(drv, msg, NULL, NULL);
3504  nla_put_failure:
3505         nlmsg_free(flags);
3506         return -ENOBUFS;
3507 }
3508
3509
3510 static int i802_set_tx_queue_params(void *priv, int queue, int aifs,
3511                                     int cw_min, int cw_max, int burst_time)
3512 {
3513         struct wpa_driver_nl80211_data *drv = priv;
3514         struct nl_msg *msg;
3515         struct nlattr *txq, *params;
3516
3517         msg = nlmsg_alloc();
3518         if (!msg)
3519                 return -1;
3520
3521         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
3522                     0, NL80211_CMD_SET_WIPHY, 0);
3523
3524         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(drv->ifname));
3525
3526         txq = nla_nest_start(msg, NL80211_ATTR_WIPHY_TXQ_PARAMS);
3527         if (!txq)
3528                 goto nla_put_failure;
3529
3530         /* We are only sending parameters for a single TXQ at a time */
3531         params = nla_nest_start(msg, 1);
3532         if (!params)
3533                 goto nla_put_failure;
3534
3535         NLA_PUT_U8(msg, NL80211_TXQ_ATTR_QUEUE, queue);
3536         /* Burst time is configured in units of 0.1 msec and TXOP parameter in
3537          * 32 usec, so need to convert the value here. */
3538         NLA_PUT_U16(msg, NL80211_TXQ_ATTR_TXOP, (burst_time * 100 + 16) / 32);
3539         NLA_PUT_U16(msg, NL80211_TXQ_ATTR_CWMIN, cw_min);
3540         NLA_PUT_U16(msg, NL80211_TXQ_ATTR_CWMAX, cw_max);
3541         NLA_PUT_U8(msg, NL80211_TXQ_ATTR_AIFS, aifs);
3542
3543         nla_nest_end(msg, params);
3544
3545         nla_nest_end(msg, txq);
3546
3547         if (send_and_recv_msgs(drv, msg, NULL, NULL) == 0)
3548                 return 0;
3549  nla_put_failure:
3550         return -1;
3551 }
3552
3553
3554 static int i802_bss_add(void *priv, const char *ifname, const u8 *bssid)
3555 {
3556         struct wpa_driver_nl80211_data *drv = priv;
3557         int ifidx;
3558         struct i802_bss *bss;
3559
3560         bss = os_zalloc(sizeof(*bss));
3561         if (bss == NULL)
3562                 return -1;
3563         bss->ifindex = if_nametoindex(ifname);
3564
3565         ifidx = nl80211_create_iface(priv, ifname, NL80211_IFTYPE_AP, bssid);
3566         if (ifidx < 0) {
3567                 os_free(bss);
3568                 return -1;
3569         }
3570         if (hostapd_set_iface_flags(priv, ifname, 1)) {
3571                 nl80211_remove_iface(priv, ifidx);
3572                 os_free(bss);
3573                 return -1;
3574         }
3575         bss->next = drv->bss.next;
3576         drv->bss.next = bss;
3577         return 0;
3578 }
3579
3580
3581 static int i802_bss_remove(void *priv, const char *ifname)
3582 {
3583         struct wpa_driver_nl80211_data *drv = priv;
3584         struct i802_bss *bss, *prev;
3585         int ifindex = if_nametoindex(ifname);
3586         nl80211_remove_iface(priv, ifindex);
3587         prev = &drv->bss;
3588         bss = drv->bss.next;
3589         while (bss) {
3590                 if (ifindex == bss->ifindex) {
3591                         prev->next = bss->next;
3592                         os_free(bss);
3593                         break;
3594                 }
3595                 prev = bss;
3596                 bss = bss->next;
3597         }
3598         return 0;
3599 }
3600
3601
3602 static int i802_set_beacon(const char *iface, void *priv,
3603                            const u8 *head, size_t head_len,
3604                            const u8 *tail, size_t tail_len, int dtim_period)
3605 {
3606         return wpa_driver_nl80211_set_beacon_iface(if_nametoindex(iface), priv,
3607                                                    head, head_len,
3608                                                    tail, tail_len,
3609                                                    dtim_period);
3610 }
3611
3612
3613 static int i802_del_beacon(struct wpa_driver_nl80211_data *drv)
3614 {
3615         struct nl_msg *msg;
3616
3617         msg = nlmsg_alloc();
3618         if (!msg)
3619                 return -ENOMEM;
3620
3621         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
3622                     0, NL80211_CMD_DEL_BEACON, 0);
3623         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(drv->ifname));
3624
3625         return send_and_recv_msgs(drv, msg, NULL, NULL);
3626  nla_put_failure:
3627         return -ENOBUFS;
3628 }
3629
3630
3631 static int i802_set_bss(void *priv, int cts, int preamble, int slot)
3632 {
3633         struct wpa_driver_nl80211_data *drv = priv;
3634         struct nl_msg *msg;
3635
3636         msg = nlmsg_alloc();
3637         if (!msg)
3638                 return -ENOMEM;
3639
3640         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
3641                     NL80211_CMD_SET_BSS, 0);
3642
3643         if (cts >= 0)
3644                 NLA_PUT_U8(msg, NL80211_ATTR_BSS_CTS_PROT, cts);
3645         if (preamble >= 0)
3646                 NLA_PUT_U8(msg, NL80211_ATTR_BSS_SHORT_PREAMBLE, preamble);
3647         if (slot >= 0)
3648                 NLA_PUT_U8(msg, NL80211_ATTR_BSS_SHORT_SLOT_TIME, slot);
3649
3650         /* TODO: multi-BSS support */
3651         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(drv->ifname));
3652
3653         return send_and_recv_msgs(drv, msg, NULL, NULL);
3654  nla_put_failure:
3655         return -ENOBUFS;
3656 }
3657
3658
3659 static int i802_set_cts_protect(void *priv, int value)
3660 {
3661         return i802_set_bss(priv, value, -1, -1);
3662 }
3663
3664
3665 static int i802_set_preamble(void *priv, int value)
3666 {
3667         return i802_set_bss(priv, -1, value, -1);
3668 }
3669
3670
3671 static int i802_set_short_slot_time(void *priv, int value)
3672 {
3673         return i802_set_bss(priv, -1, -1, value);
3674 }
3675
3676
3677 static enum nl80211_iftype i802_if_type(enum hostapd_driver_if_type type)
3678 {
3679         switch (type) {
3680         case HOSTAPD_IF_VLAN:
3681                 return NL80211_IFTYPE_AP_VLAN;
3682         }
3683         return -1;
3684 }
3685
3686
3687 static int i802_if_add(const char *iface, void *priv,
3688                        enum hostapd_driver_if_type type, char *ifname,
3689                        const u8 *addr)
3690 {
3691         if (nl80211_create_iface(priv, ifname, i802_if_type(type), addr) < 0)
3692                 return -1;
3693         return 0;
3694 }
3695
3696
3697 static int i802_if_update(void *priv, enum hostapd_driver_if_type type,
3698                           char *ifname, const u8 *addr)
3699 {
3700         /* unused at the moment */
3701         return -1;
3702 }
3703
3704
3705 static int i802_if_remove(void *priv, enum hostapd_driver_if_type type,
3706                           const char *ifname, const u8 *addr)
3707 {
3708         nl80211_remove_iface(priv, if_nametoindex(ifname));
3709         return 0;
3710 }
3711
3712
3713 static int i802_set_sta_vlan(void *priv, const u8 *addr,
3714                              const char *ifname, int vlan_id)
3715 {
3716         struct wpa_driver_nl80211_data *drv = priv;
3717         struct nl_msg *msg;
3718
3719         msg = nlmsg_alloc();
3720         if (!msg)
3721                 return -ENOMEM;
3722
3723         genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
3724                     0, NL80211_CMD_SET_STATION, 0);
3725
3726         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
3727                     if_nametoindex(drv->ifname));
3728         NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
3729         NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
3730                     if_nametoindex(ifname));
3731
3732         return send_and_recv_msgs(drv, msg, NULL, NULL);
3733  nla_put_failure:
3734         return -ENOBUFS;
3735 }
3736
3737
3738 static void handle_eapol(int sock, void *eloop_ctx, void *sock_ctx)
3739 {
3740         struct wpa_driver_nl80211_data *drv = eloop_ctx;
3741         struct sockaddr_ll lladdr;
3742         unsigned char buf[3000];
3743         int len;
3744         socklen_t fromlen = sizeof(lladdr);
3745
3746         len = recvfrom(sock, buf, sizeof(buf), 0,
3747                        (struct sockaddr *)&lladdr, &fromlen);
3748         if (len < 0) {
3749                 perror("recv");
3750                 return;
3751         }
3752
3753         if (have_ifidx(drv, lladdr.sll_ifindex)) {
3754                 void *ctx;
3755                 ctx = hostapd_sta_get_bss(drv->ctx, lladdr.sll_addr);
3756                 if (!ctx)
3757                         return;
3758                 hostapd_eapol_receive(ctx, lladdr.sll_addr, buf, len);
3759         }
3760 }
3761
3762
3763 static int i802_get_inact_sec(void *priv, const u8 *addr)
3764 {
3765         struct hostap_sta_driver_data data;
3766         int ret;
3767
3768         data.inactive_msec = (unsigned long) -1;
3769         ret = i802_read_sta_data(priv, &data, addr);
3770         if (ret || data.inactive_msec == (unsigned long) -1)
3771                 return -1;
3772         return data.inactive_msec / 1000;
3773 }
3774
3775
3776 static int i802_sta_clear_stats(void *priv, const u8 *addr)
3777 {
3778 #if 0
3779         /* TODO */
3780 #endif
3781         return 0;
3782 }
3783
3784
3785 static int i802_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr,
3786                            int reason)
3787 {
3788         struct wpa_driver_nl80211_data *drv = priv;
3789         struct ieee80211_mgmt mgmt;
3790
3791         memset(&mgmt, 0, sizeof(mgmt));
3792         mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
3793                                           WLAN_FC_STYPE_DEAUTH);
3794         memcpy(mgmt.da, addr, ETH_ALEN);
3795         memcpy(mgmt.sa, own_addr, ETH_ALEN);
3796         memcpy(mgmt.bssid, own_addr, ETH_ALEN);
3797         mgmt.u.deauth.reason_code = host_to_le16(reason);
3798         return wpa_driver_nl80211_send_mlme(drv, (u8 *) &mgmt,
3799                                             IEEE80211_HDRLEN +
3800                                             sizeof(mgmt.u.deauth));
3801 }
3802
3803
3804 static int i802_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
3805                              int reason)
3806 {
3807         struct wpa_driver_nl80211_data *drv = priv;
3808         struct ieee80211_mgmt mgmt;
3809
3810         memset(&mgmt, 0, sizeof(mgmt));
3811         mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
3812                                           WLAN_FC_STYPE_DISASSOC);
3813         memcpy(mgmt.da, addr, ETH_ALEN);
3814         memcpy(mgmt.sa, own_addr, ETH_ALEN);
3815         memcpy(mgmt.bssid, own_addr, ETH_ALEN);
3816         mgmt.u.disassoc.reason_code = host_to_le16(reason);
3817         return wpa_driver_nl80211_send_mlme(drv, (u8 *) &mgmt,
3818                                             IEEE80211_HDRLEN +
3819                                             sizeof(mgmt.u.disassoc));
3820 }
3821
3822
3823 static void *i802_init(struct hostapd_data *hapd,
3824                        struct wpa_init_params *params)
3825 {
3826         struct wpa_driver_nl80211_data *drv;
3827         size_t i;
3828
3829         drv = wpa_driver_nl80211_init(hapd, params->ifname);
3830         if (drv == NULL)
3831                 return NULL;
3832
3833         drv->bss.ifindex = drv->ifindex;
3834
3835         drv->num_if_indices = sizeof(drv->default_if_indices) / sizeof(int);
3836         drv->if_indices = drv->default_if_indices;
3837         for (i = 0; i < params->num_bridge; i++) {
3838                 if (params->bridge[i])
3839                         add_ifidx(drv, if_nametoindex(params->bridge[i]));
3840         }
3841
3842         /* start listening for EAPOL on the default AP interface */
3843         add_ifidx(drv, drv->ifindex);
3844
3845         if (hostapd_set_iface_flags(drv, drv->ifname, 0))
3846                 goto failed;
3847
3848         if (params->bssid && set_ifhwaddr(drv, drv->ifname, params->bssid))
3849                 goto failed;
3850
3851         /* Initialise a monitor interface */
3852         if (nl80211_create_monitor_interface(drv))
3853                 goto failed;
3854
3855         if (nl80211_set_mode(drv, drv->ifindex, NL80211_IFTYPE_AP)) {
3856                 wpa_printf(MSG_ERROR, "nl80211: Failed to set interface %s "
3857                            "into AP mode", drv->ifname);
3858                 goto failed;
3859         }
3860
3861         if (hostapd_set_iface_flags(drv, drv->ifname, 1))
3862                 goto failed;
3863
3864         drv->eapol_sock = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_PAE));
3865         if (drv->eapol_sock < 0) {
3866                 perror("socket(PF_PACKET, SOCK_DGRAM, ETH_P_PAE)");
3867                 goto failed;
3868         }
3869
3870         if (eloop_register_read_sock(drv->eapol_sock, handle_eapol, drv, NULL))
3871         {
3872                 printf("Could not register read socket for eapol\n");
3873                 goto failed;
3874         }
3875
3876         if (get_ifhwaddr(drv, drv->ifname, params->own_addr))
3877                 goto failed;
3878
3879         return drv;
3880
3881 failed:
3882         if (drv->monitor_ifidx >= 0)
3883                 nl80211_remove_iface(drv, drv->monitor_ifidx);
3884         if (drv->ioctl_sock >= 0)
3885                 close(drv->ioctl_sock);
3886
3887         genl_family_put(drv->nl80211);
3888         nl_cache_free(drv->nl_cache);
3889         nl_handle_destroy(drv->nl_handle);
3890         nl_cb_put(drv->nl_cb);
3891
3892         os_free(drv);
3893         return NULL;
3894 }
3895
3896
3897 static void i802_deinit(void *priv)
3898 {
3899         wpa_driver_nl80211_deinit(priv);
3900 }
3901
3902 #endif /* HOSTAPD */
3903
3904
3905 const struct wpa_driver_ops wpa_driver_nl80211_ops = {
3906         .name = "nl80211",
3907         .desc = "Linux nl80211/cfg80211",
3908         .get_bssid = wpa_driver_nl80211_get_bssid,
3909         .get_ssid = wpa_driver_nl80211_get_ssid,
3910         .set_key = wpa_driver_nl80211_set_key,
3911         .scan2 = wpa_driver_nl80211_scan,
3912         .get_scan_results2 = wpa_driver_nl80211_get_scan_results,
3913         .deauthenticate = wpa_driver_nl80211_deauthenticate,
3914         .disassociate = wpa_driver_nl80211_disassociate,
3915         .authenticate = wpa_driver_nl80211_authenticate,
3916         .associate = wpa_driver_nl80211_associate,
3917         .init = wpa_driver_nl80211_init,
3918         .deinit = wpa_driver_nl80211_deinit,
3919         .get_capa = wpa_driver_nl80211_get_capa,
3920         .set_operstate = wpa_driver_nl80211_set_operstate,
3921         .set_country = wpa_driver_nl80211_set_country,
3922         .set_mode = wpa_driver_nl80211_set_mode,
3923 #ifdef CONFIG_AP
3924         .set_beacon = wpa_driver_nl80211_set_beacon,
3925 #endif /* CONFIG_AP */
3926 #if defined(CONFIG_AP) || defined(HOSTAPD)
3927         .send_mlme = wpa_driver_nl80211_send_mlme,
3928         .set_beacon_int = wpa_driver_nl80211_set_beacon_int,
3929         .get_hw_feature_data = wpa_driver_nl80211_get_hw_feature_data,
3930 #endif /* CONFIG_AP || HOSTAPD */
3931 #ifdef HOSTAPD
3932         .hapd_init = i802_init,
3933         .hapd_deinit = i802_deinit,
3934         .hapd_set_key = i802_set_key,
3935         .get_seqnum = i802_get_seqnum,
3936         .flush = i802_flush,
3937         .read_sta_data = i802_read_sta_data,
3938         .hapd_send_eapol = i802_send_eapol,
3939         .sta_set_flags = i802_sta_set_flags,
3940         .sta_deauth = i802_sta_deauth,
3941         .sta_disassoc = i802_sta_disassoc,
3942         .sta_remove = i802_sta_remove,
3943         .sta_add = i802_sta_add,
3944         .get_inact_sec = i802_get_inact_sec,
3945         .sta_clear_stats = i802_sta_clear_stats,
3946         .set_freq = i802_set_freq,
3947         .set_rts = i802_set_rts,
3948         .set_frag = i802_set_frag,
3949         .set_retry = i802_set_retry,
3950         .set_rate_sets = i802_set_rate_sets,
3951         .hapd_set_beacon = i802_set_beacon,
3952         .set_cts_protect = i802_set_cts_protect,
3953         .set_preamble = i802_set_preamble,
3954         .set_short_slot_time = i802_set_short_slot_time,
3955         .set_tx_queue_params = i802_set_tx_queue_params,
3956         .bss_add = i802_bss_add,
3957         .bss_remove = i802_bss_remove,
3958         .if_add = i802_if_add,
3959         .if_update = i802_if_update,
3960         .if_remove = i802_if_remove,
3961         .set_sta_vlan = i802_set_sta_vlan,
3962 #endif /* HOSTAPD */
3963 };