1 /*
2 * Common driver-related functions
3 * Copyright (c) 2003-2017, Jouni Malinen <j@w1.fi>
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9 #include "includes.h"
10 #include "utils/common.h"
11 #include "driver.h"
12
wpa_scan_results_free(struct wpa_scan_results * res)13 void wpa_scan_results_free(struct wpa_scan_results *res)
14 {
15 size_t i;
16
17 if (res == NULL)
18 return;
19
20 for (i = 0; i < res->num; i++)
21 os_free(res->res[i]);
22 os_free(res->res);
23 os_free(res);
24 }
25
26
event_to_string(enum wpa_event_type event)27 const char * event_to_string(enum wpa_event_type event)
28 {
29 #define E2S(n) case EVENT_ ## n: return #n
30 switch (event) {
31 E2S(ASSOC);
32 E2S(DISASSOC);
33 E2S(MICHAEL_MIC_FAILURE);
34 E2S(SCAN_RESULTS);
35 E2S(ASSOCINFO);
36 E2S(INTERFACE_STATUS);
37 E2S(PMKID_CANDIDATE);
38 E2S(TDLS);
39 E2S(FT_RESPONSE);
40 E2S(IBSS_RSN_START);
41 E2S(AUTH);
42 E2S(DEAUTH);
43 E2S(ASSOC_REJECT);
44 E2S(AUTH_TIMED_OUT);
45 E2S(ASSOC_TIMED_OUT);
46 E2S(WPS_BUTTON_PUSHED);
47 E2S(TX_STATUS);
48 E2S(RX_FROM_UNKNOWN);
49 E2S(RX_MGMT);
50 E2S(REMAIN_ON_CHANNEL);
51 E2S(CANCEL_REMAIN_ON_CHANNEL);
52 E2S(RX_PROBE_REQ);
53 E2S(NEW_STA);
54 E2S(EAPOL_RX);
55 E2S(SIGNAL_CHANGE);
56 E2S(INTERFACE_ENABLED);
57 E2S(INTERFACE_DISABLED);
58 E2S(CHANNEL_LIST_CHANGED);
59 E2S(INTERFACE_UNAVAILABLE);
60 E2S(BEST_CHANNEL);
61 E2S(UNPROT_DEAUTH);
62 E2S(UNPROT_DISASSOC);
63 E2S(STATION_LOW_ACK);
64 E2S(IBSS_PEER_LOST);
65 E2S(DRIVER_GTK_REKEY);
66 E2S(SCHED_SCAN_STOPPED);
67 E2S(DRIVER_CLIENT_POLL_OK);
68 E2S(EAPOL_TX_STATUS);
69 E2S(CH_SWITCH);
70 E2S(CH_SWITCH_STARTED);
71 E2S(WNM);
72 E2S(CONNECT_FAILED_REASON);
73 E2S(DFS_RADAR_DETECTED);
74 E2S(DFS_CAC_FINISHED);
75 E2S(DFS_CAC_ABORTED);
76 E2S(DFS_NOP_FINISHED);
77 E2S(SURVEY);
78 E2S(SCAN_STARTED);
79 E2S(AVOID_FREQUENCIES);
80 E2S(NEW_PEER_CANDIDATE);
81 E2S(ACS_CHANNEL_SELECTED);
82 E2S(DFS_CAC_STARTED);
83 E2S(P2P_LO_STOP);
84 E2S(BEACON_LOSS);
85 E2S(DFS_PRE_CAC_EXPIRED);
86 E2S(EXTERNAL_AUTH);
87 E2S(PORT_AUTHORIZED);
88 E2S(STATION_OPMODE_CHANGED);
89 E2S(INTERFACE_MAC_CHANGED);
90 E2S(WDS_STA_INTERFACE_STATUS);
91 E2S(UPDATE_DH);
92 E2S(UNPROT_BEACON);
93 E2S(TX_WAIT_EXPIRE);
94 E2S(BSS_COLOR_COLLISION);
95 E2S(CCA_STARTED_NOTIFY);
96 E2S(CCA_ABORTED_NOTIFY);
97 E2S(CCA_NOTIFY);
98 E2S(PASN_AUTH);
99 E2S(LINK_CH_SWITCH);
100 E2S(LINK_CH_SWITCH_STARTED);
101 E2S(TID_LINK_MAP);
102 E2S(LINK_RECONFIG);
103 #ifdef CONFIG_MLD_PATCH
104 E2S(MLO_LINK_SWITCH);
105 #endif
106 E2S(MLO_WORK_STATE);
107 }
108
109 return "UNKNOWN";
110 #undef E2S
111 }
112
113
channel_width_to_string(enum chan_width width)114 const char * channel_width_to_string(enum chan_width width)
115 {
116 switch (width) {
117 case CHAN_WIDTH_20_NOHT:
118 return "20 MHz (no HT)";
119 case CHAN_WIDTH_20:
120 return "20 MHz";
121 case CHAN_WIDTH_40:
122 return "40 MHz";
123 case CHAN_WIDTH_80:
124 return "80 MHz";
125 case CHAN_WIDTH_80P80:
126 return "80+80 MHz";
127 case CHAN_WIDTH_160:
128 return "160 MHz";
129 case CHAN_WIDTH_320:
130 return "320 MHz";
131 default:
132 return "unknown";
133 }
134 }
135
136
channel_width_to_int(enum chan_width width)137 int channel_width_to_int(enum chan_width width)
138 {
139 switch (width) {
140 case CHAN_WIDTH_20_NOHT:
141 case CHAN_WIDTH_20:
142 return 20;
143 case CHAN_WIDTH_40:
144 return 40;
145 case CHAN_WIDTH_80:
146 return 80;
147 case CHAN_WIDTH_80P80:
148 case CHAN_WIDTH_160:
149 return 160;
150 case CHAN_WIDTH_320:
151 return 320;
152 default:
153 return 0;
154 }
155 }
156
157
ht_supported(const struct hostapd_hw_modes * mode)158 int ht_supported(const struct hostapd_hw_modes *mode)
159 {
160 if (!(mode->flags & HOSTAPD_MODE_FLAG_HT_INFO_KNOWN)) {
161 /*
162 * The driver did not indicate whether it supports HT. Assume
163 * it does to avoid connection issues.
164 */
165 return 1;
166 }
167
168 /*
169 * IEEE Std 802.11n-2009 20.1.1:
170 * An HT non-AP STA shall support all EQM rates for one spatial stream.
171 */
172 return mode->mcs_set[0] == 0xff;
173 }
174
175
vht_supported(const struct hostapd_hw_modes * mode)176 int vht_supported(const struct hostapd_hw_modes *mode)
177 {
178 if (!(mode->flags & HOSTAPD_MODE_FLAG_VHT_INFO_KNOWN)) {
179 /*
180 * The driver did not indicate whether it supports VHT. Assume
181 * it does to avoid connection issues.
182 */
183 return 1;
184 }
185
186 /*
187 * A VHT non-AP STA shall support MCS 0-7 for one spatial stream.
188 * TODO: Verify if this complies with the standard
189 */
190 return (mode->vht_mcs_set[0] & 0x3) != 3;
191 }
192
193
he_supported(const struct hostapd_hw_modes * hw_mode,enum ieee80211_op_mode op_mode)194 bool he_supported(const struct hostapd_hw_modes *hw_mode,
195 enum ieee80211_op_mode op_mode)
196 {
197 if (!(hw_mode->flags & HOSTAPD_MODE_FLAG_HE_INFO_KNOWN)) {
198 /*
199 * The driver did not indicate whether it supports HE. Assume
200 * it does to avoid connection issues.
201 */
202 return true;
203 }
204
205 return hw_mode->he_capab[op_mode].he_supported;
206 }
207
208
wpa_check_wowlan_trigger(const char * start,const char * trigger,int capa_trigger,u8 * param_trigger)209 static int wpa_check_wowlan_trigger(const char *start, const char *trigger,
210 int capa_trigger, u8 *param_trigger)
211 {
212 if (os_strcmp(start, trigger) != 0)
213 return 0;
214 if (!capa_trigger)
215 return 0;
216
217 *param_trigger = 1;
218 return 1;
219 }
220
221
222 struct wowlan_triggers *
wpa_get_wowlan_triggers(const char * wowlan_triggers,const struct wpa_driver_capa * capa)223 wpa_get_wowlan_triggers(const char *wowlan_triggers,
224 const struct wpa_driver_capa *capa)
225 {
226 struct wowlan_triggers *triggers;
227 char *start, *end, *buf;
228 int last;
229
230 if (!wowlan_triggers)
231 return NULL;
232
233 buf = os_strdup(wowlan_triggers);
234 if (buf == NULL)
235 return NULL;
236
237 triggers = os_zalloc(sizeof(*triggers));
238 if (triggers == NULL)
239 goto out;
240
241 #define CHECK_TRIGGER(trigger) \
242 wpa_check_wowlan_trigger(start, #trigger, \
243 capa->wowlan_triggers.trigger, \
244 &triggers->trigger)
245
246 start = buf;
247 while (*start != '\0') {
248 while (isblank((unsigned char) *start))
249 start++;
250 if (*start == '\0')
251 break;
252 end = start;
253 while (!isblank((unsigned char) *end) && *end != '\0')
254 end++;
255 last = *end == '\0';
256 *end = '\0';
257
258 if (!CHECK_TRIGGER(any) &&
259 !CHECK_TRIGGER(disconnect) &&
260 !CHECK_TRIGGER(magic_pkt) &&
261 !CHECK_TRIGGER(gtk_rekey_failure) &&
262 !CHECK_TRIGGER(eap_identity_req) &&
263 !CHECK_TRIGGER(four_way_handshake) &&
264 !CHECK_TRIGGER(rfkill_release)) {
265 wpa_printf(MSG_DEBUG,
266 "Unknown/unsupported wowlan trigger '%s'",
267 start);
268 os_free(triggers);
269 triggers = NULL;
270 goto out;
271 }
272
273 if (last)
274 break;
275 start = end + 1;
276 }
277 #undef CHECK_TRIGGER
278
279 out:
280 os_free(buf);
281 return triggers;
282 }
283
284
driver_flag_to_string(u64 flag)285 const char * driver_flag_to_string(u64 flag)
286 {
287 #define DF2S(x) case WPA_DRIVER_FLAGS_ ## x: return #x
288 switch (flag) {
289 DF2S(DRIVER_IE);
290 DF2S(SET_KEYS_AFTER_ASSOC);
291 DF2S(DFS_OFFLOAD);
292 DF2S(4WAY_HANDSHAKE_PSK);
293 DF2S(4WAY_HANDSHAKE_8021X);
294 DF2S(WIRED);
295 DF2S(SME);
296 DF2S(AP);
297 DF2S(SET_KEYS_AFTER_ASSOC_DONE);
298 DF2S(HT_2040_COEX);
299 DF2S(P2P_CONCURRENT);
300 DF2S(P2P_DEDICATED_INTERFACE);
301 DF2S(P2P_CAPABLE);
302 DF2S(AP_TEARDOWN_SUPPORT);
303 DF2S(P2P_MGMT_AND_NON_P2P);
304 DF2S(VALID_ERROR_CODES);
305 DF2S(OFFCHANNEL_TX);
306 DF2S(EAPOL_TX_STATUS);
307 DF2S(DEAUTH_TX_STATUS);
308 DF2S(BSS_SELECTION);
309 DF2S(TDLS_SUPPORT);
310 DF2S(TDLS_EXTERNAL_SETUP);
311 DF2S(PROBE_RESP_OFFLOAD);
312 DF2S(AP_UAPSD);
313 DF2S(INACTIVITY_TIMER);
314 DF2S(AP_MLME);
315 DF2S(SAE);
316 DF2S(OBSS_SCAN);
317 DF2S(IBSS);
318 DF2S(RADAR);
319 DF2S(DEDICATED_P2P_DEVICE);
320 DF2S(QOS_MAPPING);
321 DF2S(AP_CSA);
322 DF2S(MESH);
323 DF2S(ACS_OFFLOAD);
324 DF2S(KEY_MGMT_OFFLOAD);
325 DF2S(TDLS_CHANNEL_SWITCH);
326 DF2S(HT_IBSS);
327 DF2S(VHT_IBSS);
328 DF2S(SUPPORT_HW_MODE_ANY);
329 DF2S(OFFCHANNEL_SIMULTANEOUS);
330 DF2S(FULL_AP_CLIENT_STATE);
331 DF2S(P2P_LISTEN_OFFLOAD);
332 DF2S(SUPPORT_FILS);
333 DF2S(BEACON_RATE_LEGACY);
334 DF2S(BEACON_RATE_HT);
335 DF2S(BEACON_RATE_VHT);
336 DF2S(MGMT_TX_RANDOM_TA);
337 DF2S(MGMT_TX_RANDOM_TA_CONNECTED);
338 DF2S(SCHED_SCAN_RELATIVE_RSSI);
339 DF2S(HE_CAPABILITIES);
340 DF2S(FILS_SK_OFFLOAD);
341 DF2S(OCE_STA);
342 DF2S(OCE_AP);
343 DF2S(OCE_STA_CFON);
344 DF2S(MFP_OPTIONAL);
345 DF2S(SELF_MANAGED_REGULATORY);
346 DF2S(FTM_RESPONDER);
347 DF2S(CONTROL_PORT);
348 DF2S(VLAN_OFFLOAD);
349 DF2S(UPDATE_FT_IES);
350 DF2S(SAFE_PTK0_REKEYS);
351 DF2S(BEACON_PROTECTION);
352 DF2S(EXTENDED_KEY_ID);
353 }
354 return "UNKNOWN";
355 #undef DF2S
356 }
357
358
driver_flag2_to_string(u64 flag2)359 const char * driver_flag2_to_string(u64 flag2)
360 {
361 #define DF2S(x) case WPA_DRIVER_FLAGS2_ ## x: return #x
362 switch (flag2) {
363 DF2S(CONTROL_PORT_RX);
364 DF2S(CONTROL_PORT_TX_STATUS);
365 DF2S(SEC_LTF_AP);
366 DF2S(SEC_RTT_AP);
367 DF2S(PROT_RANGE_NEG_AP);
368 DF2S(BEACON_RATE_HE);
369 DF2S(BEACON_PROTECTION_CLIENT);
370 DF2S(OCV);
371 DF2S(AP_SME);
372 DF2S(SA_QUERY_OFFLOAD_AP);
373 DF2S(RADAR_BACKGROUND);
374 DF2S(SEC_LTF_STA);
375 DF2S(SEC_RTT_STA);
376 DF2S(PROT_RANGE_NEG_STA);
377 DF2S(MLO);
378 DF2S(SCAN_MIN_PREQ);
379 DF2S(SAE_OFFLOAD_STA);
380 }
381 return "UNKNOWN";
382 #undef DF2S
383 }
384