1 /*
2 * Common driver-related functions
3 * Copyright (c) 2003-2017, Jouni Malinen <j@w1.fi>
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9 #include "includes.h"
10 #include "utils/common.h"
11 #include "driver.h"
12
wpa_scan_results_free(struct wpa_scan_results * res)13 void wpa_scan_results_free(struct wpa_scan_results *res)
14 {
15 size_t i;
16
17 if (res == NULL)
18 return;
19
20 for (i = 0; i < res->num; i++)
21 os_free(res->res[i]);
22 os_free(res->res);
23 os_free(res);
24 }
25
26
event_to_string(enum wpa_event_type event)27 const char * event_to_string(enum wpa_event_type event)
28 {
29 #define E2S(n) case EVENT_ ## n: return #n
30 switch (event) {
31 E2S(ASSOC);
32 E2S(DISASSOC);
33 E2S(MICHAEL_MIC_FAILURE);
34 E2S(SCAN_RESULTS);
35 E2S(ASSOCINFO);
36 E2S(INTERFACE_STATUS);
37 E2S(PMKID_CANDIDATE);
38 E2S(TDLS);
39 E2S(FT_RESPONSE);
40 E2S(IBSS_RSN_START);
41 E2S(AUTH);
42 E2S(DEAUTH);
43 E2S(ASSOC_REJECT);
44 E2S(AUTH_TIMED_OUT);
45 E2S(ASSOC_TIMED_OUT);
46 E2S(WPS_BUTTON_PUSHED);
47 E2S(TX_STATUS);
48 E2S(RX_FROM_UNKNOWN);
49 E2S(RX_MGMT);
50 E2S(REMAIN_ON_CHANNEL);
51 E2S(CANCEL_REMAIN_ON_CHANNEL);
52 E2S(RX_PROBE_REQ);
53 E2S(NEW_STA);
54 E2S(EAPOL_RX);
55 E2S(SIGNAL_CHANGE);
56 E2S(INTERFACE_ENABLED);
57 E2S(INTERFACE_DISABLED);
58 E2S(CHANNEL_LIST_CHANGED);
59 E2S(INTERFACE_UNAVAILABLE);
60 E2S(BEST_CHANNEL);
61 E2S(UNPROT_DEAUTH);
62 E2S(UNPROT_DISASSOC);
63 E2S(STATION_LOW_ACK);
64 E2S(IBSS_PEER_LOST);
65 E2S(DRIVER_GTK_REKEY);
66 E2S(SCHED_SCAN_STOPPED);
67 E2S(DRIVER_CLIENT_POLL_OK);
68 E2S(EAPOL_TX_STATUS);
69 E2S(CH_SWITCH);
70 E2S(CH_SWITCH_STARTED);
71 E2S(WNM);
72 E2S(CONNECT_FAILED_REASON);
73 E2S(DFS_RADAR_DETECTED);
74 E2S(DFS_CAC_FINISHED);
75 E2S(DFS_CAC_ABORTED);
76 E2S(DFS_NOP_FINISHED);
77 E2S(SURVEY);
78 E2S(SCAN_STARTED);
79 E2S(AVOID_FREQUENCIES);
80 E2S(NEW_PEER_CANDIDATE);
81 E2S(ACS_CHANNEL_SELECTED);
82 E2S(DFS_CAC_STARTED);
83 E2S(P2P_LO_STOP);
84 E2S(BEACON_LOSS);
85 E2S(DFS_PRE_CAC_EXPIRED);
86 E2S(EXTERNAL_AUTH);
87 E2S(PORT_AUTHORIZED);
88 E2S(STATION_OPMODE_CHANGED);
89 E2S(INTERFACE_MAC_CHANGED);
90 E2S(WDS_STA_INTERFACE_STATUS);
91 E2S(UPDATE_DH);
92 E2S(UNPROT_BEACON);
93 }
94
95 return "UNKNOWN";
96 #undef E2S
97 }
98
99
channel_width_to_string(enum chan_width width)100 const char * channel_width_to_string(enum chan_width width)
101 {
102 switch (width) {
103 case CHAN_WIDTH_20_NOHT:
104 return "20 MHz (no HT)";
105 case CHAN_WIDTH_20:
106 return "20 MHz";
107 case CHAN_WIDTH_40:
108 return "40 MHz";
109 case CHAN_WIDTH_80:
110 return "80 MHz";
111 case CHAN_WIDTH_80P80:
112 return "80+80 MHz";
113 case CHAN_WIDTH_160:
114 return "160 MHz";
115 default:
116 return "unknown";
117 }
118 }
119
120
channel_width_to_int(enum chan_width width)121 int channel_width_to_int(enum chan_width width)
122 {
123 switch (width) {
124 case CHAN_WIDTH_20_NOHT:
125 case CHAN_WIDTH_20:
126 return 20;
127 case CHAN_WIDTH_40:
128 return 40;
129 case CHAN_WIDTH_80:
130 return 80;
131 case CHAN_WIDTH_80P80:
132 case CHAN_WIDTH_160:
133 return 160;
134 default:
135 return 0;
136 }
137 }
138
139
ht_supported(const struct hostapd_hw_modes * mode)140 int ht_supported(const struct hostapd_hw_modes *mode)
141 {
142 if (!(mode->flags & HOSTAPD_MODE_FLAG_HT_INFO_KNOWN)) {
143 /*
144 * The driver did not indicate whether it supports HT. Assume
145 * it does to avoid connection issues.
146 */
147 return 1;
148 }
149
150 /*
151 * IEEE Std 802.11n-2009 20.1.1:
152 * An HT non-AP STA shall support all EQM rates for one spatial stream.
153 */
154 return mode->mcs_set[0] == 0xff;
155 }
156
157
vht_supported(const struct hostapd_hw_modes * mode)158 int vht_supported(const struct hostapd_hw_modes *mode)
159 {
160 if (!(mode->flags & HOSTAPD_MODE_FLAG_VHT_INFO_KNOWN)) {
161 /*
162 * The driver did not indicate whether it supports VHT. Assume
163 * it does to avoid connection issues.
164 */
165 return 1;
166 }
167
168 /*
169 * A VHT non-AP STA shall support MCS 0-7 for one spatial stream.
170 * TODO: Verify if this complies with the standard
171 */
172 return (mode->vht_mcs_set[0] & 0x3) != 3;
173 }
174
175
wpa_check_wowlan_trigger(const char * start,const char * trigger,int capa_trigger,u8 * param_trigger)176 static int wpa_check_wowlan_trigger(const char *start, const char *trigger,
177 int capa_trigger, u8 *param_trigger)
178 {
179 if (os_strcmp(start, trigger) != 0)
180 return 0;
181 if (!capa_trigger)
182 return 0;
183
184 *param_trigger = 1;
185 return 1;
186 }
187
188
189 struct wowlan_triggers *
wpa_get_wowlan_triggers(const char * wowlan_triggers,const struct wpa_driver_capa * capa)190 wpa_get_wowlan_triggers(const char *wowlan_triggers,
191 const struct wpa_driver_capa *capa)
192 {
193 struct wowlan_triggers *triggers;
194 char *start, *end, *buf;
195 int last;
196
197 if (!wowlan_triggers)
198 return NULL;
199
200 buf = os_strdup(wowlan_triggers);
201 if (buf == NULL)
202 return NULL;
203
204 triggers = os_zalloc(sizeof(*triggers));
205 if (triggers == NULL)
206 goto out;
207
208 #define CHECK_TRIGGER(trigger) \
209 wpa_check_wowlan_trigger(start, #trigger, \
210 capa->wowlan_triggers.trigger, \
211 &triggers->trigger)
212
213 start = buf;
214 while (*start != '\0') {
215 while (isblank((unsigned char) *start))
216 start++;
217 if (*start == '\0')
218 break;
219 end = start;
220 while (!isblank((unsigned char) *end) && *end != '\0')
221 end++;
222 last = *end == '\0';
223 *end = '\0';
224
225 if (!CHECK_TRIGGER(any) &&
226 !CHECK_TRIGGER(disconnect) &&
227 !CHECK_TRIGGER(magic_pkt) &&
228 !CHECK_TRIGGER(gtk_rekey_failure) &&
229 !CHECK_TRIGGER(eap_identity_req) &&
230 !CHECK_TRIGGER(four_way_handshake) &&
231 !CHECK_TRIGGER(rfkill_release)) {
232 wpa_printf(MSG_DEBUG,
233 "Unknown/unsupported wowlan trigger '%s'",
234 start);
235 os_free(triggers);
236 triggers = NULL;
237 goto out;
238 }
239
240 if (last)
241 break;
242 start = end + 1;
243 }
244 #undef CHECK_TRIGGER
245
246 out:
247 os_free(buf);
248 return triggers;
249 }
250
251
driver_flag_to_string(u64 flag)252 const char * driver_flag_to_string(u64 flag)
253 {
254 #define DF2S(x) case WPA_DRIVER_FLAGS_ ## x: return #x
255 switch (flag) {
256 DF2S(DRIVER_IE);
257 DF2S(SET_KEYS_AFTER_ASSOC);
258 DF2S(DFS_OFFLOAD);
259 DF2S(4WAY_HANDSHAKE_PSK);
260 DF2S(4WAY_HANDSHAKE_8021X);
261 DF2S(WIRED);
262 DF2S(SME);
263 DF2S(AP);
264 DF2S(SET_KEYS_AFTER_ASSOC_DONE);
265 DF2S(HT_2040_COEX);
266 DF2S(P2P_CONCURRENT);
267 DF2S(P2P_DEDICATED_INTERFACE);
268 DF2S(P2P_CAPABLE);
269 DF2S(AP_TEARDOWN_SUPPORT);
270 DF2S(P2P_MGMT_AND_NON_P2P);
271 DF2S(SANE_ERROR_CODES);
272 DF2S(OFFCHANNEL_TX);
273 DF2S(EAPOL_TX_STATUS);
274 DF2S(DEAUTH_TX_STATUS);
275 DF2S(BSS_SELECTION);
276 DF2S(TDLS_SUPPORT);
277 DF2S(TDLS_EXTERNAL_SETUP);
278 DF2S(PROBE_RESP_OFFLOAD);
279 DF2S(AP_UAPSD);
280 DF2S(INACTIVITY_TIMER);
281 DF2S(AP_MLME);
282 DF2S(SAE);
283 DF2S(OBSS_SCAN);
284 DF2S(IBSS);
285 DF2S(RADAR);
286 DF2S(DEDICATED_P2P_DEVICE);
287 DF2S(QOS_MAPPING);
288 DF2S(AP_CSA);
289 DF2S(MESH);
290 DF2S(ACS_OFFLOAD);
291 DF2S(KEY_MGMT_OFFLOAD);
292 DF2S(TDLS_CHANNEL_SWITCH);
293 DF2S(HT_IBSS);
294 DF2S(VHT_IBSS);
295 DF2S(SUPPORT_HW_MODE_ANY);
296 DF2S(OFFCHANNEL_SIMULTANEOUS);
297 DF2S(FULL_AP_CLIENT_STATE);
298 DF2S(P2P_LISTEN_OFFLOAD);
299 DF2S(SUPPORT_FILS);
300 DF2S(BEACON_RATE_LEGACY);
301 DF2S(BEACON_RATE_HT);
302 DF2S(BEACON_RATE_VHT);
303 DF2S(MGMT_TX_RANDOM_TA);
304 DF2S(MGMT_TX_RANDOM_TA_CONNECTED);
305 DF2S(SCHED_SCAN_RELATIVE_RSSI);
306 DF2S(HE_CAPABILITIES);
307 DF2S(FILS_SK_OFFLOAD);
308 DF2S(OCE_STA);
309 DF2S(OCE_AP);
310 DF2S(OCE_STA_CFON);
311 DF2S(MFP_OPTIONAL);
312 DF2S(SELF_MANAGED_REGULATORY);
313 DF2S(FTM_RESPONDER);
314 DF2S(CONTROL_PORT);
315 DF2S(VLAN_OFFLOAD);
316 DF2S(UPDATE_FT_IES);
317 DF2S(SAFE_PTK0_REKEYS);
318 DF2S(BEACON_PROTECTION);
319 DF2S(EXTENDED_KEY_ID);
320 }
321 return "UNKNOWN";
322 #undef DF2S
323 }
324
325
driver_flag2_to_string(u64 flag2)326 const char * driver_flag2_to_string(u64 flag2)
327 {
328 #define DF2S(x) case WPA_DRIVER_FLAGS2_ ## x: return #x
329 switch (flag2) {
330 DF2S(CONTROL_PORT_RX);
331 }
332 return "UNKNOWN";
333 #undef DF2S
334 }
335