• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Driver interaction with Linux nl80211/cfg80211
3  * Copyright (c) 2002-2015, Jouni Malinen <j@w1.fi>
4  * Copyright (c) 2003-2004, Instant802 Networks, Inc.
5  * Copyright (c) 2005-2006, Devicescape Software, Inc.
6  * Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
7  * Copyright (c) 2009-2010, Atheros Communications
8  *
9  * This software may be distributed under the terms of the BSD license.
10  * See README for more details.
11  */
12 
13 #include "includes.h"
14 #include <sys/types.h>
15 #include <fcntl.h>
16 #include <net/if.h>
17 #include <netlink/genl/genl.h>
18 #include <netlink/genl/ctrl.h>
19 #ifdef CONFIG_LIBNL3_ROUTE
20 #include <netlink/route/neighbour.h>
21 #endif /* CONFIG_LIBNL3_ROUTE */
22 #include <linux/rtnetlink.h>
23 #include <netpacket/packet.h>
24 #include <linux/errqueue.h>
25 
26 #include "common.h"
27 #include "eloop.h"
28 #include "common/qca-vendor.h"
29 #include "common/qca-vendor-attr.h"
30 #include "common/brcm_vendor.h"
31 #include "common/ieee802_11_defs.h"
32 #include "common/ieee802_11_common.h"
33 #include "common/wpa_common.h"
34 #include "netlink.h"
35 #include "linux_defines.h"
36 #include "linux_ioctl.h"
37 #include "radiotap.h"
38 #include "radiotap_iter.h"
39 #include "rfkill.h"
40 #include "driver_nl80211.h"
41 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
42 #include "common/brcm_vendor.h"
43 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
44 
45 #ifndef NETLINK_CAP_ACK
46 #define NETLINK_CAP_ACK 10
47 #endif /* NETLINK_CAP_ACK */
48 /* support for extack if compilation headers are too old */
49 #ifndef NETLINK_EXT_ACK
50 #define NETLINK_EXT_ACK 11
51 enum nlmsgerr_attrs {
52 	NLMSGERR_ATTR_UNUSED,
53 	NLMSGERR_ATTR_MSG,
54 	NLMSGERR_ATTR_OFFS,
55 	NLMSGERR_ATTR_COOKIE,
56 
57 	__NLMSGERR_ATTR_MAX,
58 	NLMSGERR_ATTR_MAX = __NLMSGERR_ATTR_MAX - 1
59 };
60 #endif
61 #ifndef NLM_F_CAPPED
62 #define NLM_F_CAPPED 0x100
63 #endif
64 #ifndef NLM_F_ACK_TLVS
65 #define NLM_F_ACK_TLVS 0x200
66 #endif
67 #ifndef SOL_NETLINK
68 #define SOL_NETLINK 270
69 #endif
70 
71 
72 #ifdef ANDROID
73 /* system/core/libnl_2 does not include nl_socket_set_nonblocking() */
74 #undef nl_socket_set_nonblocking
75 #define nl_socket_set_nonblocking(h) android_nl_socket_set_nonblocking(h)
76 
77 #endif /* ANDROID */
78 
79 
nl_create_handle(struct nl_cb * cb,const char * dbg)80 static struct nl_sock * nl_create_handle(struct nl_cb *cb, const char *dbg)
81 {
82 	struct nl_sock *handle;
83 
84 	handle = nl_socket_alloc_cb(cb);
85 	if (handle == NULL) {
86 		wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
87 			   "callbacks (%s)", dbg);
88 		return NULL;
89 	}
90 
91 	if (genl_connect(handle)) {
92 		wpa_printf(MSG_ERROR, "nl80211: Failed to connect to generic "
93 			   "netlink (%s)", dbg);
94 		nl_socket_free(handle);
95 		return NULL;
96 	}
97 
98 	return handle;
99 }
100 
101 
nl_destroy_handles(struct nl_sock ** handle)102 static void nl_destroy_handles(struct nl_sock **handle)
103 {
104 	if (*handle == NULL)
105 		return;
106 	nl_socket_free(*handle);
107 	*handle = NULL;
108 }
109 
110 
111 #if __WORDSIZE == 64
112 #define ELOOP_SOCKET_INVALID	(intptr_t) 0x8888888888888889ULL
113 #else
114 #define ELOOP_SOCKET_INVALID	(intptr_t) 0x88888889ULL
115 #endif
116 
nl80211_register_eloop_read(struct nl_sock ** handle,eloop_sock_handler handler,void * eloop_data,int persist)117 static void nl80211_register_eloop_read(struct nl_sock **handle,
118 					eloop_sock_handler handler,
119 					void *eloop_data, int persist)
120 {
121 	/*
122 	 * libnl uses a pretty small buffer (32 kB that gets converted to 64 kB)
123 	 * by default. It is possible to hit that limit in some cases where
124 	 * operations are blocked, e.g., with a burst of Deauthentication frames
125 	 * to hostapd and STA entry deletion. Try to increase the buffer to make
126 	 * this less likely to occur.
127 	 */
128 	int err;
129 
130 	err = nl_socket_set_buffer_size(*handle, 262144, 0);
131 	if (err < 0) {
132 		wpa_printf(MSG_DEBUG,
133 			   "nl80211: Could not set nl_socket RX buffer size: %s",
134 			   nl_geterror(err));
135 		/* continue anyway with the default (smaller) buffer */
136 	}
137 
138 	nl_socket_set_nonblocking(*handle);
139 	eloop_register_read_sock(nl_socket_get_fd(*handle), handler,
140 				 eloop_data, *handle);
141 	if (!persist)
142 		*handle = (void *) (((intptr_t) *handle) ^
143 				    ELOOP_SOCKET_INVALID);
144 }
145 
146 
nl80211_destroy_eloop_handle(struct nl_sock ** handle,int persist)147 static void nl80211_destroy_eloop_handle(struct nl_sock **handle, int persist)
148 {
149 	if (!persist)
150 		*handle = (void *) (((intptr_t) *handle) ^
151 				    ELOOP_SOCKET_INVALID);
152 	eloop_unregister_read_sock(nl_socket_get_fd(*handle));
153 	nl_destroy_handles(handle);
154 }
155 
156 
157 static void nl80211_global_deinit(void *priv);
158 static void nl80211_check_global(struct nl80211_global *global);
159 
160 static void wpa_driver_nl80211_deinit(struct i802_bss *bss);
161 static int wpa_driver_nl80211_set_mode_ibss(struct i802_bss *bss,
162 					    struct hostapd_freq_params *freq);
163 
164 static int
165 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
166 				   const u8 *set_addr, int first,
167 				   const char *driver_params);
168 static int nl80211_send_frame_cmd(struct i802_bss *bss,
169 				  unsigned int freq, unsigned int wait,
170 				  const u8 *buf, size_t buf_len,
171 				  int save_cookie,
172 				  int no_cck, int no_ack, int offchanok,
173 				  const u16 *csa_offs, size_t csa_offs_len);
174 static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss,
175 					       int report);
176 
177 #define IFIDX_ANY -1
178 
179 static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
180 		      int ifidx_reason);
181 static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
182 		      int ifidx_reason);
183 static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
184 		      int ifidx_reason);
185 
186 static int nl80211_set_channel(struct i802_bss *bss,
187 			       struct hostapd_freq_params *freq, int set_chan);
188 static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
189 				     int ifindex, int disabled);
190 
191 static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv,
192 			      int reset_mode);
193 
194 static int i802_set_iface_flags(struct i802_bss *bss, int up);
195 static int nl80211_set_param(void *priv, const char *param);
196 #ifdef CONFIG_MESH
197 static int nl80211_put_mesh_config(struct nl_msg *msg,
198 				   struct wpa_driver_mesh_bss_params *params);
199 #endif /* CONFIG_MESH */
200 static int i802_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
201 			     u16 reason);
202 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
203 static int nl80211_set_td_policy(void *priv, u32 td_policy);
204 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
205 
206 /* Converts nl80211_chan_width to a common format */
convert2width(int width)207 enum chan_width convert2width(int width)
208 {
209 	switch (width) {
210 	case NL80211_CHAN_WIDTH_20_NOHT:
211 		return CHAN_WIDTH_20_NOHT;
212 	case NL80211_CHAN_WIDTH_20:
213 		return CHAN_WIDTH_20;
214 	case NL80211_CHAN_WIDTH_40:
215 		return CHAN_WIDTH_40;
216 	case NL80211_CHAN_WIDTH_80:
217 		return CHAN_WIDTH_80;
218 	case NL80211_CHAN_WIDTH_80P80:
219 		return CHAN_WIDTH_80P80;
220 	case NL80211_CHAN_WIDTH_160:
221 		return CHAN_WIDTH_160;
222 	}
223 	return CHAN_WIDTH_UNKNOWN;
224 }
225 
226 
is_ap_interface(enum nl80211_iftype nlmode)227 int is_ap_interface(enum nl80211_iftype nlmode)
228 {
229 	return nlmode == NL80211_IFTYPE_AP ||
230 		nlmode == NL80211_IFTYPE_P2P_GO;
231 }
232 
233 
is_sta_interface(enum nl80211_iftype nlmode)234 int is_sta_interface(enum nl80211_iftype nlmode)
235 {
236 	return nlmode == NL80211_IFTYPE_STATION ||
237 		nlmode == NL80211_IFTYPE_P2P_CLIENT;
238 }
239 
240 
is_p2p_net_interface(enum nl80211_iftype nlmode)241 static int is_p2p_net_interface(enum nl80211_iftype nlmode)
242 {
243 	return nlmode == NL80211_IFTYPE_P2P_CLIENT ||
244 		nlmode == NL80211_IFTYPE_P2P_GO;
245 }
246 
247 
get_bss_ifindex(struct wpa_driver_nl80211_data * drv,int ifindex)248 struct i802_bss * get_bss_ifindex(struct wpa_driver_nl80211_data *drv,
249 				  int ifindex)
250 {
251 	struct i802_bss *bss;
252 
253 	for (bss = drv->first_bss; bss; bss = bss->next) {
254 		if (bss->ifindex == ifindex)
255 			return bss;
256 	}
257 
258 	return NULL;
259 }
260 
261 
is_mesh_interface(enum nl80211_iftype nlmode)262 static int is_mesh_interface(enum nl80211_iftype nlmode)
263 {
264 	return nlmode == NL80211_IFTYPE_MESH_POINT;
265 }
266 
267 
nl80211_mark_disconnected(struct wpa_driver_nl80211_data * drv)268 void nl80211_mark_disconnected(struct wpa_driver_nl80211_data *drv)
269 {
270 	if (drv->associated)
271 		os_memcpy(drv->prev_bssid, drv->bssid, ETH_ALEN);
272 	drv->associated = 0;
273 	os_memset(drv->bssid, 0, ETH_ALEN);
274 	drv->first_bss->freq = 0;
275 }
276 
277 
278 /* nl80211 code */
ack_handler(struct nl_msg * msg,void * arg)279 static int ack_handler(struct nl_msg *msg, void *arg)
280 {
281 	int *err = arg;
282 	*err = 0;
283 	return NL_STOP;
284 }
285 
286 
287 struct nl80211_ack_ext_arg {
288 	int *err;
289 	void *ext_data;
290 };
291 
292 
ack_handler_cookie(struct nl_msg * msg,void * arg)293 static int ack_handler_cookie(struct nl_msg *msg, void *arg)
294 {
295 	struct nl80211_ack_ext_arg *ext_arg = arg;
296 	struct nlattr *tb[NLMSGERR_ATTR_MAX + 1];
297 	u64 *cookie = ext_arg->ext_data;
298 	struct nlattr *attrs;
299 	size_t ack_len, attr_len;
300 
301 	*ext_arg->err = 0;
302 	ack_len = sizeof(struct nlmsghdr) + sizeof(int) +
303 		sizeof(struct nlmsghdr);
304 	attrs = (struct nlattr *)
305 		((u8 *) nlmsg_data(nlmsg_hdr(msg)) + sizeof(struct nlmsghdr) +
306 		 sizeof(int));
307 	if (nlmsg_hdr(msg)->nlmsg_len <= ack_len)
308 		return NL_STOP;
309 
310 	attr_len = nlmsg_hdr(msg)->nlmsg_len - ack_len;
311 
312 	if(!(nlmsg_hdr(msg)->nlmsg_flags & NLM_F_ACK_TLVS))
313 		return NL_STOP;
314 
315 	nla_parse(tb, NLMSGERR_ATTR_MAX, attrs, attr_len, NULL);
316 	if (tb[NLMSGERR_ATTR_COOKIE])
317 		*cookie = nla_get_u64(tb[NLMSGERR_ATTR_COOKIE]);
318 
319 	return NL_STOP;
320 }
321 
322 
finish_handler(struct nl_msg * msg,void * arg)323 static int finish_handler(struct nl_msg *msg, void *arg)
324 {
325 	int *ret = arg;
326 	*ret = 0;
327 	return NL_SKIP;
328 }
329 
error_handler(struct sockaddr_nl * nla,struct nlmsgerr * err,void * arg)330 static int error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err,
331 			 void *arg)
332 {
333 	struct nlmsghdr *nlh = (struct nlmsghdr *) err - 1;
334 	int len = nlh->nlmsg_len;
335 	struct nlattr *attrs;
336 	struct nlattr *tb[NLMSGERR_ATTR_MAX + 1];
337 	int *ret = arg;
338 	int ack_len = sizeof(*nlh) + sizeof(int) + sizeof(*nlh);
339 
340 	*ret = err->error;
341 
342 	if (!(nlh->nlmsg_flags & NLM_F_ACK_TLVS))
343 		return NL_SKIP;
344 
345 	if (!(nlh->nlmsg_flags & NLM_F_CAPPED))
346 		ack_len += err->msg.nlmsg_len - sizeof(*nlh);
347 
348 	if (len <= ack_len)
349 		return NL_STOP;
350 
351 	attrs = (void *) ((unsigned char *) nlh + ack_len);
352 	len -= ack_len;
353 
354 	nla_parse(tb, NLMSGERR_ATTR_MAX, attrs, len, NULL);
355 	if (tb[NLMSGERR_ATTR_MSG]) {
356 		len = strnlen((char *) nla_data(tb[NLMSGERR_ATTR_MSG]),
357 			      nla_len(tb[NLMSGERR_ATTR_MSG]));
358 		wpa_printf(MSG_ERROR, "nl80211: kernel reports: %*s",
359 			   len, (char *) nla_data(tb[NLMSGERR_ATTR_MSG]));
360 	}
361 
362 	return NL_SKIP;
363 }
364 
365 
no_seq_check(struct nl_msg * msg,void * arg)366 static int no_seq_check(struct nl_msg *msg, void *arg)
367 {
368 	return NL_OK;
369 }
370 
371 
nl80211_nlmsg_clear(struct nl_msg * msg)372 static void nl80211_nlmsg_clear(struct nl_msg *msg)
373 {
374 	/*
375 	 * Clear nlmsg data, e.g., to make sure key material is not left in
376 	 * heap memory for unnecessarily long time.
377 	 */
378 	if (msg) {
379 		struct nlmsghdr *hdr = nlmsg_hdr(msg);
380 		void *data = nlmsg_data(hdr);
381 		/*
382 		 * This would use nlmsg_datalen() or the older nlmsg_len() if
383 		 * only libnl were to maintain a stable API.. Neither will work
384 		 * with all released versions, so just calculate the length
385 		 * here.
386 		 */
387 		int len = hdr->nlmsg_len - NLMSG_HDRLEN;
388 
389 		os_memset(data, 0, len);
390 	}
391 }
392 
393 
send_and_recv(struct nl80211_global * global,struct nl_sock * nl_handle,struct nl_msg * msg,int (* valid_handler)(struct nl_msg *,void *),void * valid_data,int (* ack_handler_custom)(struct nl_msg *,void *),void * ack_data)394 static int send_and_recv(struct nl80211_global *global,
395 			 struct nl_sock *nl_handle, struct nl_msg *msg,
396 			 int (*valid_handler)(struct nl_msg *, void *),
397 			 void *valid_data,
398 			 int (*ack_handler_custom)(struct nl_msg *, void *),
399 			 void *ack_data)
400 {
401 	struct nl_cb *cb;
402 	int err = -ENOMEM, opt;
403 
404 	if (!msg)
405 		return -ENOMEM;
406 
407 	cb = nl_cb_clone(global->nl_cb);
408 	if (!cb)
409 		goto out;
410 
411 	/* try to set NETLINK_EXT_ACK to 1, ignoring errors */
412 	opt = 1;
413 	setsockopt(nl_socket_get_fd(nl_handle), SOL_NETLINK,
414 		   NETLINK_EXT_ACK, &opt, sizeof(opt));
415 
416 	/* try to set NETLINK_CAP_ACK to 1, ignoring errors */
417 	opt = 1;
418 	setsockopt(nl_socket_get_fd(nl_handle), SOL_NETLINK,
419 		   NETLINK_CAP_ACK, &opt, sizeof(opt));
420 
421 	err = nl_send_auto_complete(nl_handle, msg);
422 	if (err < 0) {
423 		wpa_printf(MSG_INFO,
424 			   "nl80211: nl_send_auto_complete() failed: %s",
425 			   nl_geterror(err));
426 		/* Need to convert libnl error code to an errno value. For now,
427 		 * just hardcode this to EBADF; the real error reason is shown
428 		 * in that error print above. */
429 		err = -EBADF;
430 		goto out;
431 	}
432 
433 	err = 1;
434 
435 	nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &err);
436 	nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, &err);
437 	if (ack_handler_custom) {
438 		struct nl80211_ack_ext_arg *ext_arg = ack_data;
439 
440 		ext_arg->err = &err;
441 		nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM,
442 			  ack_handler_custom, ack_data);
443 	} else {
444 		nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, ack_handler, &err);
445 	}
446 
447 	if (valid_handler)
448 		nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM,
449 			  valid_handler, valid_data);
450 
451 	while (err > 0) {
452 		int res = nl_recvmsgs(nl_handle, cb);
453 
454 		if (res == -NLE_DUMP_INTR) {
455 			/* Most likely one of the nl80211 dump routines hit a
456 			 * case where internal results changed while the dump
457 			 * was being sent. The most common known case for this
458 			 * is scan results fetching while associated were every
459 			 * received Beacon frame from the AP may end up
460 			 * incrementing bss_generation. This
461 			 * NL80211_CMD_GET_SCAN case tries again in the caller;
462 			 * other cases (of which there are no known common ones)
463 			 * will stop and return an error. */
464 			wpa_printf(MSG_DEBUG, "nl80211: %s; convert to -EAGAIN",
465 				   nl_geterror(res));
466 			err = -EAGAIN;
467 		} else if (res < 0) {
468 			wpa_printf(MSG_INFO,
469 				   "nl80211: %s->nl_recvmsgs failed: %d (%s)",
470 				   __func__, res, nl_geterror(res));
471 		}
472 	}
473  out:
474 	nl_cb_put(cb);
475 	/* Always clear the message as it can potentially contain keys */
476 	nl80211_nlmsg_clear(msg);
477 	nlmsg_free(msg);
478 	return err;
479 }
480 
481 
send_and_recv_msgs(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,int (* valid_handler)(struct nl_msg *,void *),void * valid_data,int (* ack_handler_custom)(struct nl_msg *,void *),void * ack_data)482 int send_and_recv_msgs(struct wpa_driver_nl80211_data *drv,
483 		       struct nl_msg *msg,
484 		       int (*valid_handler)(struct nl_msg *, void *),
485 		       void *valid_data,
486 		       int (*ack_handler_custom)(struct nl_msg *, void *),
487 		       void *ack_data)
488 {
489 	return send_and_recv(drv->global, drv->global->nl, msg,
490 			     valid_handler, valid_data,
491 			     ack_handler_custom, ack_data);
492 }
493 
494 
495 /* Use this method to mark that it is necessary to own the connection/interface
496  * for this operation.
497  * handle may be set to NULL, to get the same behavior as send_and_recv_msgs().
498  * set_owner can be used to mark this socket for receiving control port frames.
499  */
send_and_recv_msgs_owner(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,struct nl_sock * handle,int set_owner,int (* valid_handler)(struct nl_msg *,void *),void * valid_data,int (* ack_handler_custom)(struct nl_msg *,void *),void * ack_data)500 static int send_and_recv_msgs_owner(struct wpa_driver_nl80211_data *drv,
501 				    struct nl_msg *msg,
502 				    struct nl_sock *handle, int set_owner,
503 				    int (*valid_handler)(struct nl_msg *,
504 							 void *),
505 				    void *valid_data,
506 				    int (*ack_handler_custom)(struct nl_msg *,
507 							      void *),
508 				    void *ack_data)
509 {
510 	if (!msg)
511 		return -ENOMEM;
512 
513 	/* Control port over nl80211 needs the flags and attributes below.
514 	 *
515 	 * The Linux kernel has initial checks for them (in nl80211.c) like:
516 	 *     validate_pae_over_nl80211(...)
517 	 * or final checks like:
518 	 *     dev->ieee80211_ptr->conn_owner_nlportid != info->snd_portid
519 	 *
520 	 * Final operations (e.g., disassociate) don't need to set these
521 	 * attributes, but they have to be performed on the socket, which has
522 	 * the connection owner property set in the kernel.
523 	 */
524 	if ((drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_RX) &&
525 	    handle && set_owner &&
526 	    (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_OVER_NL80211) ||
527 	     nla_put_flag(msg, NL80211_ATTR_SOCKET_OWNER) ||
528 	     nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, ETH_P_PAE) ||
529 	     nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_PREAUTH)))
530 		return -1;
531 
532 	return send_and_recv(drv->global, handle ? handle : drv->global->nl,
533 			     msg, valid_handler, valid_data,
534 			     ack_handler_custom, ack_data);
535 }
536 
537 
538 static int
send_and_recv_msgs_connect_handle(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,struct i802_bss * bss,int set_owner)539 send_and_recv_msgs_connect_handle(struct wpa_driver_nl80211_data *drv,
540 				  struct nl_msg *msg, struct i802_bss *bss,
541 				  int set_owner)
542 {
543 	struct nl_sock *nl_connect = get_connect_handle(bss);
544 
545 	if (nl_connect)
546 		return send_and_recv_msgs_owner(drv, msg, nl_connect, set_owner,
547 						process_bss_event, bss, NULL,
548 						NULL);
549 	else
550 		return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
551 }
552 
553 
get_connect_handle(struct i802_bss * bss)554 struct nl_sock * get_connect_handle(struct i802_bss *bss)
555 {
556 	if ((bss->drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_RX) ||
557 	    bss->use_nl_connect)
558 		return bss->nl_connect;
559 
560 	return NULL;
561 }
562 
563 
564 struct family_data {
565 	const char *group;
566 	int id;
567 };
568 
569 
family_handler(struct nl_msg * msg,void * arg)570 static int family_handler(struct nl_msg *msg, void *arg)
571 {
572 	struct family_data *res = arg;
573 	struct nlattr *tb[CTRL_ATTR_MAX + 1];
574 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
575 	struct nlattr *mcgrp;
576 	int i;
577 
578 	nla_parse(tb, CTRL_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
579 		  genlmsg_attrlen(gnlh, 0), NULL);
580 	if (!tb[CTRL_ATTR_MCAST_GROUPS])
581 		return NL_SKIP;
582 
583 	nla_for_each_nested(mcgrp, tb[CTRL_ATTR_MCAST_GROUPS], i) {
584 		struct nlattr *tb2[CTRL_ATTR_MCAST_GRP_MAX + 1];
585 		nla_parse(tb2, CTRL_ATTR_MCAST_GRP_MAX, nla_data(mcgrp),
586 			  nla_len(mcgrp), NULL);
587 		if (!tb2[CTRL_ATTR_MCAST_GRP_NAME] ||
588 		    !tb2[CTRL_ATTR_MCAST_GRP_ID] ||
589 		    os_strncmp(nla_data(tb2[CTRL_ATTR_MCAST_GRP_NAME]),
590 			       res->group,
591 			       nla_len(tb2[CTRL_ATTR_MCAST_GRP_NAME])) != 0)
592 			continue;
593 		res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]);
594 		break;
595 	};
596 
597 	return NL_SKIP;
598 }
599 
600 
nl_get_multicast_id(struct nl80211_global * global,const char * family,const char * group)601 static int nl_get_multicast_id(struct nl80211_global *global,
602 			       const char *family, const char *group)
603 {
604 	struct nl_msg *msg;
605 	int ret;
606 	struct family_data res = { group, -ENOENT };
607 
608 	msg = nlmsg_alloc();
609 	if (!msg)
610 		return -ENOMEM;
611 	if (!genlmsg_put(msg, 0, 0, global->nlctrl_id,
612 			 0, 0, CTRL_CMD_GETFAMILY, 0) ||
613 	    nla_put_string(msg, CTRL_ATTR_FAMILY_NAME, family)) {
614 		nlmsg_free(msg);
615 		return -1;
616 	}
617 
618 	ret = send_and_recv(global, global->nl, msg, family_handler, &res,
619 			    NULL, NULL);
620 	if (ret == 0)
621 		ret = res.id;
622 	return ret;
623 }
624 
625 
nl80211_cmd(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,int flags,uint8_t cmd)626 void * nl80211_cmd(struct wpa_driver_nl80211_data *drv,
627 		   struct nl_msg *msg, int flags, uint8_t cmd)
628 {
629 	if (TEST_FAIL())
630 		return NULL;
631 	return genlmsg_put(msg, 0, 0, drv->global->nl80211_id,
632 			   0, flags, cmd, 0);
633 }
634 
635 
nl80211_set_iface_id(struct nl_msg * msg,struct i802_bss * bss)636 static int nl80211_set_iface_id(struct nl_msg *msg, struct i802_bss *bss)
637 {
638 	if (bss->wdev_id_set)
639 		return nla_put_u64(msg, NL80211_ATTR_WDEV, bss->wdev_id);
640 	return nla_put_u32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
641 }
642 
643 
nl80211_cmd_msg(struct i802_bss * bss,int flags,uint8_t cmd)644 struct nl_msg * nl80211_cmd_msg(struct i802_bss *bss, int flags, uint8_t cmd)
645 {
646 	struct nl_msg *msg;
647 
648 	msg = nlmsg_alloc();
649 	if (!msg)
650 		return NULL;
651 
652 	if (!nl80211_cmd(bss->drv, msg, flags, cmd) ||
653 	    nl80211_set_iface_id(msg, bss) < 0) {
654 		nlmsg_free(msg);
655 		return NULL;
656 	}
657 
658 	return msg;
659 }
660 
661 
662 static struct nl_msg *
nl80211_ifindex_msg_build(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,int ifindex,int flags,uint8_t cmd)663 nl80211_ifindex_msg_build(struct wpa_driver_nl80211_data *drv,
664 			  struct nl_msg *msg, int ifindex, int flags,
665 			  uint8_t cmd)
666 {
667 	if (!msg)
668 		return NULL;
669 
670 	if (!nl80211_cmd(drv, msg, flags, cmd) ||
671 	    nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex)) {
672 		nlmsg_free(msg);
673 		return NULL;
674 	}
675 
676 	return msg;
677 }
678 
679 
680 static struct nl_msg *
nl80211_ifindex_msg(struct wpa_driver_nl80211_data * drv,int ifindex,int flags,uint8_t cmd)681 nl80211_ifindex_msg(struct wpa_driver_nl80211_data *drv, int ifindex,
682 		    int flags, uint8_t cmd)
683 {
684 	return nl80211_ifindex_msg_build(drv, nlmsg_alloc(), ifindex, flags,
685 					 cmd);
686 }
687 
688 
nl80211_drv_msg(struct wpa_driver_nl80211_data * drv,int flags,uint8_t cmd)689 struct nl_msg * nl80211_drv_msg(struct wpa_driver_nl80211_data *drv, int flags,
690 				uint8_t cmd)
691 {
692 	return nl80211_ifindex_msg(drv, drv->ifindex, flags, cmd);
693 }
694 
695 
nl80211_bss_msg(struct i802_bss * bss,int flags,uint8_t cmd)696 struct nl_msg * nl80211_bss_msg(struct i802_bss *bss, int flags, uint8_t cmd)
697 {
698 	return nl80211_ifindex_msg(bss->drv, bss->ifindex, flags, cmd);
699 }
700 
701 
702 struct wiphy_idx_data {
703 	int wiphy_idx;
704 	enum nl80211_iftype nlmode;
705 	u8 *macaddr;
706 	u8 use_4addr;
707 };
708 
709 
netdev_info_handler(struct nl_msg * msg,void * arg)710 static int netdev_info_handler(struct nl_msg *msg, void *arg)
711 {
712 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
713 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
714 	struct wiphy_idx_data *info = arg;
715 
716 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
717 		  genlmsg_attrlen(gnlh, 0), NULL);
718 
719 	if (tb[NL80211_ATTR_WIPHY])
720 		info->wiphy_idx = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
721 
722 	if (tb[NL80211_ATTR_IFTYPE])
723 		info->nlmode = nla_get_u32(tb[NL80211_ATTR_IFTYPE]);
724 
725 	if (tb[NL80211_ATTR_MAC] && info->macaddr)
726 		os_memcpy(info->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
727 			  ETH_ALEN);
728 
729 	if (tb[NL80211_ATTR_4ADDR])
730 		info->use_4addr = nla_get_u8(tb[NL80211_ATTR_4ADDR]);
731 
732 	return NL_SKIP;
733 }
734 
735 
nl80211_get_wiphy_index(struct i802_bss * bss)736 int nl80211_get_wiphy_index(struct i802_bss *bss)
737 {
738 	struct nl_msg *msg;
739 	struct wiphy_idx_data data = {
740 		.wiphy_idx = -1,
741 		.macaddr = NULL,
742 	};
743 
744 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
745 		return -1;
746 
747 	if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
748 			       NULL, NULL) == 0)
749 		return data.wiphy_idx;
750 	return -1;
751 }
752 
753 
nl80211_get_ifmode(struct i802_bss * bss)754 static enum nl80211_iftype nl80211_get_ifmode(struct i802_bss *bss)
755 {
756 	struct nl_msg *msg;
757 	struct wiphy_idx_data data = {
758 		.nlmode = NL80211_IFTYPE_UNSPECIFIED,
759 		.macaddr = NULL,
760 	};
761 
762 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
763 		return NL80211_IFTYPE_UNSPECIFIED;
764 
765 	if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
766 			       NULL, NULL) == 0)
767 		return data.nlmode;
768 	return NL80211_IFTYPE_UNSPECIFIED;
769 }
770 
771 
nl80211_get_macaddr(struct i802_bss * bss)772 static int nl80211_get_macaddr(struct i802_bss *bss)
773 {
774 	struct nl_msg *msg;
775 	struct wiphy_idx_data data = {
776 		.macaddr = bss->addr,
777 	};
778 
779 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
780 		return -1;
781 
782 	return send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
783 				  NULL, NULL);
784 }
785 
786 
nl80211_get_4addr(struct i802_bss * bss)787 static int nl80211_get_4addr(struct i802_bss *bss)
788 {
789 	struct nl_msg *msg;
790 	struct wiphy_idx_data data = {
791 		.use_4addr = 0,
792 	};
793 
794 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)) ||
795 	    send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
796 			       NULL, NULL))
797 		return -1;
798 	return data.use_4addr;
799 }
800 
801 
nl80211_register_beacons(struct wpa_driver_nl80211_data * drv,struct nl80211_wiphy_data * w)802 static int nl80211_register_beacons(struct wpa_driver_nl80211_data *drv,
803 				    struct nl80211_wiphy_data *w)
804 {
805 	struct nl_msg *msg;
806 	int ret;
807 
808 	msg = nlmsg_alloc();
809 	if (!msg)
810 		return -1;
811 
812 	if (!nl80211_cmd(drv, msg, 0, NL80211_CMD_REGISTER_BEACONS) ||
813 	    nla_put_u32(msg, NL80211_ATTR_WIPHY, w->wiphy_idx)) {
814 		nlmsg_free(msg);
815 		return -1;
816 	}
817 
818 	ret = send_and_recv(drv->global, w->nl_beacons, msg, NULL, NULL,
819 			    NULL, NULL);
820 	if (ret) {
821 		wpa_printf(MSG_DEBUG, "nl80211: Register beacons command "
822 			   "failed: ret=%d (%s)",
823 			   ret, strerror(-ret));
824 	}
825 	return ret;
826 }
827 
828 
nl80211_recv_beacons(int sock,void * eloop_ctx,void * handle)829 static void nl80211_recv_beacons(int sock, void *eloop_ctx, void *handle)
830 {
831 	struct nl80211_wiphy_data *w = eloop_ctx;
832 	int res;
833 
834 	wpa_printf(MSG_EXCESSIVE, "nl80211: Beacon event message available");
835 
836 	res = nl_recvmsgs(handle, w->nl_cb);
837 	if (res < 0) {
838 		wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
839 			   __func__, res);
840 	}
841 }
842 
843 
process_beacon_event(struct nl_msg * msg,void * arg)844 static int process_beacon_event(struct nl_msg *msg, void *arg)
845 {
846 	struct nl80211_wiphy_data *w = arg;
847 	struct wpa_driver_nl80211_data *drv;
848 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
849 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
850 	union wpa_event_data event;
851 
852 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
853 		  genlmsg_attrlen(gnlh, 0), NULL);
854 
855 	if (gnlh->cmd != NL80211_CMD_FRAME) {
856 		wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)",
857 			   gnlh->cmd);
858 		return NL_SKIP;
859 	}
860 
861 	if (!tb[NL80211_ATTR_FRAME])
862 		return NL_SKIP;
863 
864 	dl_list_for_each(drv, &w->drvs, struct wpa_driver_nl80211_data,
865 			 wiphy_list) {
866 		os_memset(&event, 0, sizeof(event));
867 		event.rx_mgmt.frame = nla_data(tb[NL80211_ATTR_FRAME]);
868 		event.rx_mgmt.frame_len = nla_len(tb[NL80211_ATTR_FRAME]);
869 		wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
870 	}
871 
872 	return NL_SKIP;
873 }
874 
875 
876 static struct nl80211_wiphy_data *
nl80211_get_wiphy_data_ap(struct i802_bss * bss)877 nl80211_get_wiphy_data_ap(struct i802_bss *bss)
878 {
879 	static DEFINE_DL_LIST(nl80211_wiphys);
880 	struct nl80211_wiphy_data *w;
881 	int wiphy_idx, found = 0;
882 	struct i802_bss *tmp_bss;
883 	u8 channel;
884 
885 	if (bss->wiphy_data != NULL)
886 		return bss->wiphy_data;
887 
888 	wiphy_idx = nl80211_get_wiphy_index(bss);
889 
890 	dl_list_for_each(w, &nl80211_wiphys, struct nl80211_wiphy_data, list) {
891 		if (w->wiphy_idx == wiphy_idx)
892 			goto add;
893 	}
894 
895 	/* alloc new one */
896 	w = os_zalloc(sizeof(*w));
897 	if (w == NULL)
898 		return NULL;
899 	w->wiphy_idx = wiphy_idx;
900 	dl_list_init(&w->bsss);
901 	dl_list_init(&w->drvs);
902 
903 	/* Beacon frames not supported in IEEE 802.11ad */
904 	if (ieee80211_freq_to_chan(bss->freq, &channel) !=
905 	    HOSTAPD_MODE_IEEE80211AD) {
906 		w->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
907 		if (!w->nl_cb) {
908 			os_free(w);
909 			return NULL;
910 		}
911 		nl_cb_set(w->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
912 			  no_seq_check, NULL);
913 		nl_cb_set(w->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
914 			  process_beacon_event, w);
915 
916 		w->nl_beacons = nl_create_handle(bss->drv->global->nl_cb,
917 						 "wiphy beacons");
918 		if (w->nl_beacons == NULL) {
919 			os_free(w);
920 			return NULL;
921 		}
922 
923 		if (nl80211_register_beacons(bss->drv, w)) {
924 			nl_destroy_handles(&w->nl_beacons);
925 			os_free(w);
926 			return NULL;
927 		}
928 
929 		nl80211_register_eloop_read(&w->nl_beacons,
930 					    nl80211_recv_beacons, w, 0);
931 	}
932 
933 	dl_list_add(&nl80211_wiphys, &w->list);
934 
935 add:
936 	/* drv entry for this bss already there? */
937 	dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
938 		if (tmp_bss->drv == bss->drv) {
939 			found = 1;
940 			break;
941 		}
942 	}
943 	/* if not add it */
944 	if (!found)
945 		dl_list_add(&w->drvs, &bss->drv->wiphy_list);
946 
947 	dl_list_add(&w->bsss, &bss->wiphy_list);
948 	bss->wiphy_data = w;
949 	return w;
950 }
951 
952 
nl80211_put_wiphy_data_ap(struct i802_bss * bss)953 static void nl80211_put_wiphy_data_ap(struct i802_bss *bss)
954 {
955 	struct nl80211_wiphy_data *w = bss->wiphy_data;
956 	struct i802_bss *tmp_bss;
957 	int found = 0;
958 
959 	if (w == NULL)
960 		return;
961 	bss->wiphy_data = NULL;
962 	dl_list_del(&bss->wiphy_list);
963 
964 	/* still any for this drv present? */
965 	dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
966 		if (tmp_bss->drv == bss->drv) {
967 			found = 1;
968 			break;
969 		}
970 	}
971 	/* if not remove it */
972 	if (!found)
973 		dl_list_del(&bss->drv->wiphy_list);
974 
975 	if (!dl_list_empty(&w->bsss))
976 		return;
977 
978 	if (w->nl_beacons)
979 		nl80211_destroy_eloop_handle(&w->nl_beacons, 0);
980 
981 	nl_cb_put(w->nl_cb);
982 	dl_list_del(&w->list);
983 	os_free(w);
984 }
985 
986 
nl80211_get_ifindex(void * priv)987 static unsigned int nl80211_get_ifindex(void *priv)
988 {
989 	struct i802_bss *bss = priv;
990 	struct wpa_driver_nl80211_data *drv = bss->drv;
991 
992 	return drv->ifindex;
993 }
994 
995 
wpa_driver_nl80211_get_bssid(void * priv,u8 * bssid)996 static int wpa_driver_nl80211_get_bssid(void *priv, u8 *bssid)
997 {
998 	struct i802_bss *bss = priv;
999 	struct wpa_driver_nl80211_data *drv = bss->drv;
1000 	if (!drv->associated)
1001 		return -1;
1002 	os_memcpy(bssid, drv->bssid, ETH_ALEN);
1003 	return 0;
1004 }
1005 
1006 
wpa_driver_nl80211_get_ssid(void * priv,u8 * ssid)1007 static int wpa_driver_nl80211_get_ssid(void *priv, u8 *ssid)
1008 {
1009 	struct i802_bss *bss = priv;
1010 	struct wpa_driver_nl80211_data *drv = bss->drv;
1011 	if (!drv->associated)
1012 		return -1;
1013 	os_memcpy(ssid, drv->ssid, drv->ssid_len);
1014 	return drv->ssid_len;
1015 }
1016 
1017 
wpa_driver_nl80211_event_newlink(struct nl80211_global * global,struct wpa_driver_nl80211_data * drv,int ifindex,const char * ifname)1018 static void wpa_driver_nl80211_event_newlink(
1019 	struct nl80211_global *global, struct wpa_driver_nl80211_data *drv,
1020 	int ifindex, const char *ifname)
1021 {
1022 	union wpa_event_data event;
1023 
1024 	if (drv && os_strcmp(drv->first_bss->ifname, ifname) == 0) {
1025 		if (if_nametoindex(drv->first_bss->ifname) == 0) {
1026 			wpa_printf(MSG_DEBUG, "nl80211: Interface %s does not exist - ignore RTM_NEWLINK",
1027 				   drv->first_bss->ifname);
1028 			return;
1029 		}
1030 		if (!drv->if_removed)
1031 			return;
1032 		wpa_printf(MSG_DEBUG, "nl80211: Mark if_removed=0 for %s based on RTM_NEWLINK event",
1033 			   drv->first_bss->ifname);
1034 		drv->if_removed = 0;
1035 	}
1036 
1037 	os_memset(&event, 0, sizeof(event));
1038 	event.interface_status.ifindex = ifindex;
1039 	os_strlcpy(event.interface_status.ifname, ifname,
1040 		   sizeof(event.interface_status.ifname));
1041 	event.interface_status.ievent = EVENT_INTERFACE_ADDED;
1042 	if (drv)
1043 		wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
1044 	else
1045 		wpa_supplicant_event_global(global->ctx, EVENT_INTERFACE_STATUS,
1046 					    &event);
1047 }
1048 
1049 
wpa_driver_nl80211_event_dellink(struct nl80211_global * global,struct wpa_driver_nl80211_data * drv,int ifindex,const char * ifname)1050 static void wpa_driver_nl80211_event_dellink(
1051 	struct nl80211_global *global, struct wpa_driver_nl80211_data *drv,
1052 	int ifindex, const char *ifname)
1053 {
1054 	union wpa_event_data event;
1055 
1056 	if (drv && os_strcmp(drv->first_bss->ifname, ifname) == 0) {
1057 		if (drv->if_removed) {
1058 			wpa_printf(MSG_DEBUG, "nl80211: if_removed already set - ignore RTM_DELLINK event for %s",
1059 				   ifname);
1060 			return;
1061 		}
1062 		wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed - mark if_removed=1",
1063 			   ifname);
1064 		drv->if_removed = 1;
1065 	} else {
1066 		wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed",
1067 			   ifname);
1068 	}
1069 
1070 	os_memset(&event, 0, sizeof(event));
1071 	event.interface_status.ifindex = ifindex;
1072 	os_strlcpy(event.interface_status.ifname, ifname,
1073 		   sizeof(event.interface_status.ifname));
1074 	event.interface_status.ievent = EVENT_INTERFACE_REMOVED;
1075 	if (drv)
1076 		wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
1077 	else
1078 		wpa_supplicant_event_global(global->ctx, EVENT_INTERFACE_STATUS,
1079 					    &event);
1080 }
1081 
1082 
wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data * drv,u8 * buf,size_t len)1083 static int wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data *drv,
1084 					 u8 *buf, size_t len)
1085 {
1086 	int attrlen, rta_len;
1087 	struct rtattr *attr;
1088 
1089 	attrlen = len;
1090 	attr = (struct rtattr *) buf;
1091 
1092 	rta_len = RTA_ALIGN(sizeof(struct rtattr));
1093 	while (RTA_OK(attr, attrlen)) {
1094 		if (attr->rta_type == IFLA_IFNAME) {
1095 			if (os_strcmp(((char *) attr) + rta_len,
1096 				      drv->first_bss->ifname) == 0)
1097 				return 1;
1098 			else
1099 				break;
1100 		}
1101 		attr = RTA_NEXT(attr, attrlen);
1102 	}
1103 
1104 	return 0;
1105 }
1106 
1107 
wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data * drv,int ifindex,u8 * buf,size_t len)1108 static int wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data *drv,
1109 					  int ifindex, u8 *buf, size_t len)
1110 {
1111 	if (drv->ifindex == ifindex)
1112 		return 1;
1113 
1114 	if (drv->if_removed && wpa_driver_nl80211_own_ifname(drv, buf, len)) {
1115 		nl80211_check_global(drv->global);
1116 		wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
1117 			   "interface");
1118 		if (wpa_driver_nl80211_finish_drv_init(drv, NULL, 0, NULL) < 0)
1119 			return -1;
1120 		return 1;
1121 	}
1122 
1123 	return 0;
1124 }
1125 
1126 
1127 static struct wpa_driver_nl80211_data *
nl80211_find_drv(struct nl80211_global * global,int idx,u8 * buf,size_t len,int * init_failed)1128 nl80211_find_drv(struct nl80211_global *global, int idx, u8 *buf, size_t len,
1129 		 int *init_failed)
1130 {
1131 	struct wpa_driver_nl80211_data *drv;
1132 	int res;
1133 
1134 	if (init_failed)
1135 		*init_failed = 0;
1136 	dl_list_for_each(drv, &global->interfaces,
1137 			 struct wpa_driver_nl80211_data, list) {
1138 		res = wpa_driver_nl80211_own_ifindex(drv, idx, buf, len);
1139 		if (res < 0) {
1140 			wpa_printf(MSG_DEBUG,
1141 				   "nl80211: Found matching own interface, but failed to complete reinitialization");
1142 			if (init_failed)
1143 				*init_failed = 1;
1144 			return drv;
1145 		}
1146 		if (res > 0 || have_ifidx(drv, idx, IFIDX_ANY))
1147 			return drv;
1148 	}
1149 	return NULL;
1150 }
1151 
1152 
nl80211_refresh_mac(struct wpa_driver_nl80211_data * drv,int ifindex,int notify)1153 static void nl80211_refresh_mac(struct wpa_driver_nl80211_data *drv,
1154 				int ifindex, int notify)
1155 {
1156 	struct i802_bss *bss;
1157 	u8 addr[ETH_ALEN];
1158 
1159 	bss = get_bss_ifindex(drv, ifindex);
1160 	if (bss &&
1161 	    linux_get_ifhwaddr(drv->global->ioctl_sock,
1162 			       bss->ifname, addr) < 0) {
1163 		wpa_printf(MSG_DEBUG,
1164 			   "nl80211: %s: failed to re-read MAC address",
1165 			   bss->ifname);
1166 	} else if (bss && os_memcmp(addr, bss->addr, ETH_ALEN) != 0) {
1167 		wpa_printf(MSG_DEBUG,
1168 			   "nl80211: Own MAC address on ifindex %d (%s) changed from "
1169 			   MACSTR " to " MACSTR,
1170 			   ifindex, bss->ifname,
1171 			   MAC2STR(bss->addr), MAC2STR(addr));
1172 		os_memcpy(bss->addr, addr, ETH_ALEN);
1173 		if (notify)
1174 			wpa_supplicant_event(drv->ctx,
1175 					     EVENT_INTERFACE_MAC_CHANGED, NULL);
1176 	}
1177 }
1178 
1179 
wpa_driver_nl80211_event_rtm_newlink(void * ctx,struct ifinfomsg * ifi,u8 * buf,size_t len)1180 static void wpa_driver_nl80211_event_rtm_newlink(void *ctx,
1181 						 struct ifinfomsg *ifi,
1182 						 u8 *buf, size_t len)
1183 {
1184 	struct nl80211_global *global = ctx;
1185 	struct wpa_driver_nl80211_data *drv;
1186 	int attrlen;
1187 	struct rtattr *attr;
1188 	u32 brid = 0;
1189 	char namebuf[IFNAMSIZ];
1190 	char ifname[IFNAMSIZ + 1];
1191 	char extra[100], *pos, *end;
1192 	int init_failed;
1193 
1194 	extra[0] = '\0';
1195 	pos = extra;
1196 	end = pos + sizeof(extra);
1197 	ifname[0] = '\0';
1198 
1199 	attrlen = len;
1200 	attr = (struct rtattr *) buf;
1201 	while (RTA_OK(attr, attrlen)) {
1202 		switch (attr->rta_type) {
1203 		case IFLA_IFNAME:
1204 			if (RTA_PAYLOAD(attr) > IFNAMSIZ)
1205 				break;
1206 			os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
1207 			ifname[RTA_PAYLOAD(attr)] = '\0';
1208 			break;
1209 		case IFLA_MASTER:
1210 			brid = nla_get_u32((struct nlattr *) attr);
1211 			pos += os_snprintf(pos, end - pos, " master=%u", brid);
1212 			break;
1213 		case IFLA_WIRELESS:
1214 			pos += os_snprintf(pos, end - pos, " wext");
1215 			break;
1216 		case IFLA_OPERSTATE:
1217 			pos += os_snprintf(pos, end - pos, " operstate=%u",
1218 					   nla_get_u32((struct nlattr *) attr));
1219 			break;
1220 		case IFLA_LINKMODE:
1221 			pos += os_snprintf(pos, end - pos, " linkmode=%u",
1222 					   nla_get_u32((struct nlattr *) attr));
1223 			break;
1224 		}
1225 		attr = RTA_NEXT(attr, attrlen);
1226 	}
1227 	extra[sizeof(extra) - 1] = '\0';
1228 
1229 	wpa_printf(MSG_DEBUG, "RTM_NEWLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
1230 		   ifi->ifi_index, ifname, extra, ifi->ifi_family,
1231 		   ifi->ifi_flags,
1232 		   (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
1233 		   (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
1234 		   (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
1235 		   (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
1236 
1237 	drv = nl80211_find_drv(global, ifi->ifi_index, buf, len, &init_failed);
1238 	if (!drv)
1239 		goto event_newlink;
1240 	if (init_failed)
1241 		return; /* do not update interface state */
1242 
1243 	if (!drv->if_disabled && !(ifi->ifi_flags & IFF_UP)) {
1244 		namebuf[0] = '\0';
1245 		if (if_indextoname(ifi->ifi_index, namebuf) &&
1246 		    linux_iface_up(drv->global->ioctl_sock, namebuf) > 0) {
1247 			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
1248 				   "event since interface %s is up", namebuf);
1249 			drv->ignore_if_down_event = 0;
1250 			/* Re-read MAC address as it may have changed */
1251 			nl80211_refresh_mac(drv, ifi->ifi_index, 1);
1252 			return;
1253 		}
1254 		wpa_printf(MSG_DEBUG, "nl80211: Interface down (%s/%s)",
1255 			   namebuf, ifname);
1256 		if (os_strcmp(drv->first_bss->ifname, ifname) != 0) {
1257 			wpa_printf(MSG_DEBUG,
1258 				   "nl80211: Not the main interface (%s) - do not indicate interface down",
1259 				   drv->first_bss->ifname);
1260 		} else if (drv->ignore_if_down_event) {
1261 			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
1262 				   "event generated by mode change");
1263 			drv->ignore_if_down_event = 0;
1264 		} else {
1265 			drv->if_disabled = 1;
1266 			wpa_supplicant_event(drv->ctx,
1267 					     EVENT_INTERFACE_DISABLED, NULL);
1268 
1269 			/*
1270 			 * Try to get drv again, since it may be removed as
1271 			 * part of the EVENT_INTERFACE_DISABLED handling for
1272 			 * dynamic interfaces
1273 			 */
1274 			drv = nl80211_find_drv(global, ifi->ifi_index,
1275 					       buf, len, NULL);
1276 			if (!drv)
1277 				return;
1278 		}
1279 	}
1280 
1281 	if (drv->if_disabled && (ifi->ifi_flags & IFF_UP)) {
1282 		namebuf[0] = '\0';
1283 		if (if_indextoname(ifi->ifi_index, namebuf) &&
1284 		    linux_iface_up(drv->global->ioctl_sock, namebuf) == 0) {
1285 			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1286 				   "event since interface %s is down",
1287 				   namebuf);
1288 			return;
1289 		}
1290 		wpa_printf(MSG_DEBUG, "nl80211: Interface up (%s/%s)",
1291 			   namebuf, ifname);
1292 		if (os_strcmp(drv->first_bss->ifname, ifname) != 0) {
1293 			wpa_printf(MSG_DEBUG,
1294 				   "nl80211: Not the main interface (%s) - do not indicate interface up",
1295 				   drv->first_bss->ifname);
1296 		} else if (if_nametoindex(drv->first_bss->ifname) == 0) {
1297 			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1298 				   "event since interface %s does not exist",
1299 				   drv->first_bss->ifname);
1300 		} else if (drv->if_removed) {
1301 			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1302 				   "event since interface %s is marked "
1303 				   "removed", drv->first_bss->ifname);
1304 		} else {
1305 			/* Re-read MAC address as it may have changed */
1306 			nl80211_refresh_mac(drv, ifi->ifi_index, 0);
1307 
1308 			drv->if_disabled = 0;
1309 			wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED,
1310 					     NULL);
1311 		}
1312 	} else if (ifi->ifi_flags & IFF_UP) {
1313 		/* Re-read MAC address as it may have changed */
1314 		nl80211_refresh_mac(drv, ifi->ifi_index, 1);
1315 	}
1316 
1317 	/*
1318 	 * Some drivers send the association event before the operup event--in
1319 	 * this case, lifting operstate in wpa_driver_nl80211_set_operstate()
1320 	 * fails. This will hit us when wpa_supplicant does not need to do
1321 	 * IEEE 802.1X authentication
1322 	 */
1323 	if (drv->operstate == 1 &&
1324 	    (ifi->ifi_flags & (IFF_LOWER_UP | IFF_DORMANT)) == IFF_LOWER_UP &&
1325 	    !(ifi->ifi_flags & IFF_RUNNING)) {
1326 		wpa_printf(MSG_DEBUG, "nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate");
1327 		netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
1328 				       -1, IF_OPER_UP);
1329 	}
1330 
1331 event_newlink:
1332 	if (ifname[0])
1333 		wpa_driver_nl80211_event_newlink(global, drv, ifi->ifi_index,
1334 						 ifname);
1335 
1336 	if (ifi->ifi_family == AF_BRIDGE && brid && drv) {
1337 		struct i802_bss *bss;
1338 
1339 		/* device has been added to bridge */
1340 		if (!if_indextoname(brid, namebuf)) {
1341 			wpa_printf(MSG_DEBUG,
1342 				   "nl80211: Could not find bridge ifname for ifindex %u",
1343 				   brid);
1344 			return;
1345 		}
1346 		wpa_printf(MSG_DEBUG, "nl80211: Add ifindex %u for bridge %s",
1347 			   brid, namebuf);
1348 		add_ifidx(drv, brid, ifi->ifi_index);
1349 
1350 		for (bss = drv->first_bss; bss; bss = bss->next) {
1351 			if (os_strcmp(ifname, bss->ifname) == 0) {
1352 				os_strlcpy(bss->brname, namebuf, IFNAMSIZ);
1353 				break;
1354 			}
1355 		}
1356 	}
1357 }
1358 
1359 
wpa_driver_nl80211_event_rtm_dellink(void * ctx,struct ifinfomsg * ifi,u8 * buf,size_t len)1360 static void wpa_driver_nl80211_event_rtm_dellink(void *ctx,
1361 						 struct ifinfomsg *ifi,
1362 						 u8 *buf, size_t len)
1363 {
1364 	struct nl80211_global *global = ctx;
1365 	struct wpa_driver_nl80211_data *drv;
1366 	int attrlen;
1367 	struct rtattr *attr;
1368 	u32 brid = 0;
1369 	char ifname[IFNAMSIZ + 1];
1370 	char extra[100], *pos, *end;
1371 
1372 	extra[0] = '\0';
1373 	pos = extra;
1374 	end = pos + sizeof(extra);
1375 	ifname[0] = '\0';
1376 
1377 	attrlen = len;
1378 	attr = (struct rtattr *) buf;
1379 	while (RTA_OK(attr, attrlen)) {
1380 		switch (attr->rta_type) {
1381 		case IFLA_IFNAME:
1382 			if (RTA_PAYLOAD(attr) > IFNAMSIZ)
1383 				break;
1384 			os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
1385 			ifname[RTA_PAYLOAD(attr)] = '\0';
1386 			break;
1387 		case IFLA_MASTER:
1388 			brid = nla_get_u32((struct nlattr *) attr);
1389 			pos += os_snprintf(pos, end - pos, " master=%u", brid);
1390 			break;
1391 		case IFLA_OPERSTATE:
1392 			pos += os_snprintf(pos, end - pos, " operstate=%u",
1393 					   nla_get_u32((struct nlattr *) attr));
1394 			break;
1395 		case IFLA_LINKMODE:
1396 			pos += os_snprintf(pos, end - pos, " linkmode=%u",
1397 					   nla_get_u32((struct nlattr *) attr));
1398 			break;
1399 		}
1400 		attr = RTA_NEXT(attr, attrlen);
1401 	}
1402 	extra[sizeof(extra) - 1] = '\0';
1403 
1404 	wpa_printf(MSG_DEBUG, "RTM_DELLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
1405 		   ifi->ifi_index, ifname, extra, ifi->ifi_family,
1406 		   ifi->ifi_flags,
1407 		   (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
1408 		   (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
1409 		   (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
1410 		   (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
1411 
1412 	drv = nl80211_find_drv(global, ifi->ifi_index, buf, len, NULL);
1413 
1414 	if (ifi->ifi_family == AF_BRIDGE && brid && drv) {
1415 		/* device has been removed from bridge */
1416 		char namebuf[IFNAMSIZ];
1417 
1418 		if (!if_indextoname(brid, namebuf)) {
1419 			wpa_printf(MSG_DEBUG,
1420 				   "nl80211: Could not find bridge ifname for ifindex %u",
1421 				   brid);
1422 		} else {
1423 			wpa_printf(MSG_DEBUG,
1424 				   "nl80211: Remove ifindex %u for bridge %s",
1425 				   brid, namebuf);
1426 		}
1427 		del_ifidx(drv, brid, ifi->ifi_index);
1428 	}
1429 
1430 	if (ifi->ifi_family != AF_BRIDGE || !brid)
1431 		wpa_driver_nl80211_event_dellink(global, drv, ifi->ifi_index,
1432 						 ifname);
1433 }
1434 
1435 
1436 struct nl80211_get_assoc_freq_arg {
1437 	struct wpa_driver_nl80211_data *drv;
1438 	unsigned int assoc_freq;
1439 	unsigned int ibss_freq;
1440 	u8 assoc_bssid[ETH_ALEN];
1441 	u8 assoc_ssid[SSID_MAX_LEN];
1442 	u8 assoc_ssid_len;
1443 };
1444 
nl80211_get_assoc_freq_handler(struct nl_msg * msg,void * arg)1445 static int nl80211_get_assoc_freq_handler(struct nl_msg *msg, void *arg)
1446 {
1447 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
1448 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1449 	struct nlattr *bss[NL80211_BSS_MAX + 1];
1450 	static struct nla_policy bss_policy[NL80211_BSS_MAX + 1] = {
1451 		[NL80211_BSS_BSSID] = { .type = NLA_UNSPEC },
1452 		[NL80211_BSS_FREQUENCY] = { .type = NLA_U32 },
1453 		[NL80211_BSS_INFORMATION_ELEMENTS] = { .type = NLA_UNSPEC },
1454 		[NL80211_BSS_STATUS] = { .type = NLA_U32 },
1455 	};
1456 	struct nl80211_get_assoc_freq_arg *ctx = arg;
1457 	enum nl80211_bss_status status;
1458 
1459 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1460 		  genlmsg_attrlen(gnlh, 0), NULL);
1461 	if (!tb[NL80211_ATTR_BSS] ||
1462 	    nla_parse_nested(bss, NL80211_BSS_MAX, tb[NL80211_ATTR_BSS],
1463 			     bss_policy) ||
1464 	    !bss[NL80211_BSS_STATUS])
1465 		return NL_SKIP;
1466 
1467 	status = nla_get_u32(bss[NL80211_BSS_STATUS]);
1468 	if (status == NL80211_BSS_STATUS_ASSOCIATED &&
1469 	    bss[NL80211_BSS_FREQUENCY]) {
1470 		ctx->assoc_freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
1471 		wpa_printf(MSG_DEBUG, "nl80211: Associated on %u MHz",
1472 			   ctx->assoc_freq);
1473 	}
1474 	if (status == NL80211_BSS_STATUS_IBSS_JOINED &&
1475 	    bss[NL80211_BSS_FREQUENCY]) {
1476 		ctx->ibss_freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
1477 		wpa_printf(MSG_DEBUG, "nl80211: IBSS-joined on %u MHz",
1478 			   ctx->ibss_freq);
1479 	}
1480 	if (status == NL80211_BSS_STATUS_ASSOCIATED &&
1481 	    bss[NL80211_BSS_BSSID]) {
1482 		os_memcpy(ctx->assoc_bssid,
1483 			  nla_data(bss[NL80211_BSS_BSSID]), ETH_ALEN);
1484 		wpa_printf(MSG_DEBUG, "nl80211: Associated with "
1485 			   MACSTR, MAC2STR(ctx->assoc_bssid));
1486 	}
1487 
1488 	if (status == NL80211_BSS_STATUS_ASSOCIATED &&
1489 	    bss[NL80211_BSS_INFORMATION_ELEMENTS]) {
1490 		const u8 *ie, *ssid;
1491 		size_t ie_len;
1492 
1493 		ie = nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
1494 		ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
1495 		ssid = get_ie(ie, ie_len, WLAN_EID_SSID);
1496 		if (ssid && ssid[1] > 0 && ssid[1] <= SSID_MAX_LEN) {
1497 			ctx->assoc_ssid_len = ssid[1];
1498 			os_memcpy(ctx->assoc_ssid, ssid + 2, ssid[1]);
1499 		}
1500 	}
1501 
1502 	return NL_SKIP;
1503 }
1504 
1505 
nl80211_get_assoc_ssid(struct wpa_driver_nl80211_data * drv,u8 * ssid)1506 int nl80211_get_assoc_ssid(struct wpa_driver_nl80211_data *drv, u8 *ssid)
1507 {
1508 	struct nl_msg *msg;
1509 	int ret;
1510 	struct nl80211_get_assoc_freq_arg arg;
1511 	int count = 0;
1512 
1513 try_again:
1514 	msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
1515 	os_memset(&arg, 0, sizeof(arg));
1516 	arg.drv = drv;
1517 	ret = send_and_recv_msgs(drv, msg, nl80211_get_assoc_freq_handler,
1518 				 &arg, NULL, NULL);
1519 	if (ret == -EAGAIN) {
1520 		count++;
1521 		if (count >= 10) {
1522 			wpa_printf(MSG_INFO,
1523 				   "nl80211: Failed to receive consistent scan result dump for get_assoc_ssid");
1524 		} else {
1525 			wpa_printf(MSG_DEBUG,
1526 				   "nl80211: Failed to receive consistent scan result dump for get_assoc_ssid - try again");
1527 			goto try_again;
1528 		}
1529 	}
1530 	if (ret == 0) {
1531 		os_memcpy(ssid, arg.assoc_ssid, arg.assoc_ssid_len);
1532 		return arg.assoc_ssid_len;
1533 	}
1534 	wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d (%s)",
1535 		   ret, strerror(-ret));
1536 	return ret;
1537 }
1538 
1539 
nl80211_get_assoc_freq(struct wpa_driver_nl80211_data * drv)1540 unsigned int nl80211_get_assoc_freq(struct wpa_driver_nl80211_data *drv)
1541 {
1542 	struct nl_msg *msg;
1543 	int ret;
1544 	struct nl80211_get_assoc_freq_arg arg;
1545 	int count = 0;
1546 
1547 try_again:
1548 	msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
1549 	os_memset(&arg, 0, sizeof(arg));
1550 	arg.drv = drv;
1551 	ret = send_and_recv_msgs(drv, msg, nl80211_get_assoc_freq_handler,
1552 				 &arg, NULL, NULL);
1553 	if (ret == -EAGAIN) {
1554 		count++;
1555 		if (count >= 10) {
1556 			wpa_printf(MSG_INFO,
1557 				   "nl80211: Failed to receive consistent scan result dump for get_assoc_freq");
1558 		} else {
1559 			wpa_printf(MSG_DEBUG,
1560 				   "nl80211: Failed to receive consistent scan result dump for get_assoc_freq - try again");
1561 			goto try_again;
1562 		}
1563 	}
1564 	if (ret == 0) {
1565 		unsigned int freq = drv->nlmode == NL80211_IFTYPE_ADHOC ?
1566 			arg.ibss_freq : arg.assoc_freq;
1567 		wpa_printf(MSG_DEBUG, "nl80211: Operating frequency for the "
1568 			   "associated BSS from scan results: %u MHz", freq);
1569 		if (freq)
1570 			drv->assoc_freq = freq;
1571 		return drv->assoc_freq;
1572 	}
1573 	wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
1574 		   "(%s)", ret, strerror(-ret));
1575 	return drv->assoc_freq;
1576 }
1577 
1578 
get_link_signal(struct nl_msg * msg,void * arg)1579 static int get_link_signal(struct nl_msg *msg, void *arg)
1580 {
1581 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
1582 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1583 	struct nlattr *sinfo[NL80211_STA_INFO_MAX + 1];
1584 	static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = {
1585 		[NL80211_STA_INFO_SIGNAL] = { .type = NLA_U8 },
1586 		[NL80211_STA_INFO_SIGNAL_AVG] = { .type = NLA_U8 },
1587 		[NL80211_STA_INFO_BEACON_SIGNAL_AVG] = { .type = NLA_U8 },
1588 	};
1589 	struct nlattr *rinfo[NL80211_RATE_INFO_MAX + 1];
1590 	static struct nla_policy rate_policy[NL80211_RATE_INFO_MAX + 1] = {
1591 		[NL80211_RATE_INFO_BITRATE] = { .type = NLA_U16 },
1592 		[NL80211_RATE_INFO_MCS] = { .type = NLA_U8 },
1593 		[NL80211_RATE_INFO_40_MHZ_WIDTH] = { .type = NLA_FLAG },
1594 		[NL80211_RATE_INFO_SHORT_GI] = { .type = NLA_FLAG },
1595 	};
1596 	struct wpa_signal_info *sig_change = arg;
1597 
1598 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1599 		  genlmsg_attrlen(gnlh, 0), NULL);
1600 	if (!tb[NL80211_ATTR_STA_INFO] ||
1601 	    nla_parse_nested(sinfo, NL80211_STA_INFO_MAX,
1602 			     tb[NL80211_ATTR_STA_INFO], policy))
1603 		return NL_SKIP;
1604 	if (!sinfo[NL80211_STA_INFO_SIGNAL])
1605 		return NL_SKIP;
1606 
1607 	sig_change->current_signal =
1608 		(s8) nla_get_u8(sinfo[NL80211_STA_INFO_SIGNAL]);
1609 
1610 	if (sinfo[NL80211_STA_INFO_SIGNAL_AVG])
1611 		sig_change->avg_signal =
1612 			(s8) nla_get_u8(sinfo[NL80211_STA_INFO_SIGNAL_AVG]);
1613 	else
1614 		sig_change->avg_signal = 0;
1615 
1616 	if (sinfo[NL80211_STA_INFO_BEACON_SIGNAL_AVG])
1617 		sig_change->avg_beacon_signal =
1618 			(s8)
1619 			nla_get_u8(sinfo[NL80211_STA_INFO_BEACON_SIGNAL_AVG]);
1620 	else
1621 		sig_change->avg_beacon_signal = 0;
1622 
1623 	if (sinfo[NL80211_STA_INFO_TX_BITRATE]) {
1624 		if (nla_parse_nested(rinfo, NL80211_RATE_INFO_MAX,
1625 				     sinfo[NL80211_STA_INFO_TX_BITRATE],
1626 				     rate_policy)) {
1627 			sig_change->current_txrate = 0;
1628 		} else {
1629 			if (rinfo[NL80211_RATE_INFO_BITRATE]) {
1630 				sig_change->current_txrate =
1631 					nla_get_u16(rinfo[
1632 					     NL80211_RATE_INFO_BITRATE]) * 100;
1633 			}
1634 		}
1635 	}
1636 
1637 	return NL_SKIP;
1638 }
1639 
1640 
nl80211_get_link_signal(struct wpa_driver_nl80211_data * drv,struct wpa_signal_info * sig)1641 int nl80211_get_link_signal(struct wpa_driver_nl80211_data *drv,
1642 			    struct wpa_signal_info *sig)
1643 {
1644 	struct nl_msg *msg;
1645 
1646 	sig->current_signal = -WPA_INVALID_NOISE;
1647 	sig->current_txrate = 0;
1648 
1649 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_STATION)) ||
1650 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, drv->bssid)) {
1651 		nlmsg_free(msg);
1652 		return -ENOBUFS;
1653 	}
1654 
1655 	return send_and_recv_msgs(drv, msg, get_link_signal, sig, NULL, NULL);
1656 }
1657 
1658 
get_link_noise(struct nl_msg * msg,void * arg)1659 static int get_link_noise(struct nl_msg *msg, void *arg)
1660 {
1661 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
1662 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1663 	struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
1664 	static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
1665 		[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
1666 		[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
1667 	};
1668 	struct wpa_signal_info *sig_change = arg;
1669 
1670 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1671 		  genlmsg_attrlen(gnlh, 0), NULL);
1672 
1673 	if (!tb[NL80211_ATTR_SURVEY_INFO]) {
1674 		wpa_printf(MSG_DEBUG, "nl80211: survey data missing!");
1675 		return NL_SKIP;
1676 	}
1677 
1678 	if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
1679 			     tb[NL80211_ATTR_SURVEY_INFO],
1680 			     survey_policy)) {
1681 		wpa_printf(MSG_DEBUG, "nl80211: failed to parse nested "
1682 			   "attributes!");
1683 		return NL_SKIP;
1684 	}
1685 
1686 	if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
1687 		return NL_SKIP;
1688 
1689 	if (nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
1690 	    sig_change->frequency)
1691 		return NL_SKIP;
1692 
1693 	if (!sinfo[NL80211_SURVEY_INFO_NOISE])
1694 		return NL_SKIP;
1695 
1696 	sig_change->current_noise =
1697 		(s8) nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
1698 
1699 	return NL_SKIP;
1700 }
1701 
1702 
nl80211_get_link_noise(struct wpa_driver_nl80211_data * drv,struct wpa_signal_info * sig_change)1703 int nl80211_get_link_noise(struct wpa_driver_nl80211_data *drv,
1704 			   struct wpa_signal_info *sig_change)
1705 {
1706 	struct nl_msg *msg;
1707 
1708 	sig_change->current_noise = WPA_INVALID_NOISE;
1709 	sig_change->frequency = drv->assoc_freq;
1710 
1711 	msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
1712 	return send_and_recv_msgs(drv, msg, get_link_noise, sig_change,
1713 				  NULL, NULL);
1714 }
1715 
1716 
get_channel_info(struct nl_msg * msg,void * arg)1717 static int get_channel_info(struct nl_msg *msg, void *arg)
1718 {
1719 	struct nlattr *tb[NL80211_ATTR_MAX + 1] = { 0 };
1720 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1721 	struct wpa_channel_info *chan_info = arg;
1722 
1723 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1724 		  genlmsg_attrlen(gnlh, 0), NULL);
1725 
1726 	os_memset(chan_info, 0, sizeof(struct wpa_channel_info));
1727 	chan_info->chanwidth = CHAN_WIDTH_UNKNOWN;
1728 
1729 	if (tb[NL80211_ATTR_WIPHY_FREQ])
1730 		chan_info->frequency =
1731 			nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]);
1732 	if (tb[NL80211_ATTR_CHANNEL_WIDTH])
1733 		chan_info->chanwidth = convert2width(
1734 			nla_get_u32(tb[NL80211_ATTR_CHANNEL_WIDTH]));
1735 	if (tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]) {
1736 		enum nl80211_channel_type ct =
1737 			nla_get_u32(tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]);
1738 
1739 		switch (ct) {
1740 		case NL80211_CHAN_HT40MINUS:
1741 			chan_info->sec_channel = -1;
1742 			break;
1743 		case NL80211_CHAN_HT40PLUS:
1744 			chan_info->sec_channel = 1;
1745 			break;
1746 		default:
1747 			chan_info->sec_channel = 0;
1748 			break;
1749 		}
1750 	}
1751 	if (tb[NL80211_ATTR_CENTER_FREQ1])
1752 		chan_info->center_frq1 =
1753 			nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
1754 	if (tb[NL80211_ATTR_CENTER_FREQ2])
1755 		chan_info->center_frq2 =
1756 			nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
1757 
1758 	if (chan_info->center_frq2) {
1759 		u8 seg1_idx = 0;
1760 
1761 		if (ieee80211_freq_to_chan(chan_info->center_frq2, &seg1_idx) !=
1762 		    NUM_HOSTAPD_MODES)
1763 			chan_info->seg1_idx = seg1_idx;
1764 	}
1765 
1766 	return NL_SKIP;
1767 }
1768 
1769 
nl80211_channel_info(void * priv,struct wpa_channel_info * ci)1770 static int nl80211_channel_info(void *priv, struct wpa_channel_info *ci)
1771 {
1772 	struct i802_bss *bss = priv;
1773 	struct wpa_driver_nl80211_data *drv = bss->drv;
1774 	struct nl_msg *msg;
1775 
1776 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
1777 	return send_and_recv_msgs(drv, msg, get_channel_info, ci, NULL, NULL);
1778 }
1779 
1780 
wpa_driver_nl80211_event_receive(int sock,void * eloop_ctx,void * handle)1781 static void wpa_driver_nl80211_event_receive(int sock, void *eloop_ctx,
1782 					     void *handle)
1783 {
1784 	struct nl_cb *cb = eloop_ctx;
1785 	int res;
1786 
1787 	wpa_printf(MSG_MSGDUMP, "nl80211: Event message available");
1788 
1789 	res = nl_recvmsgs(handle, cb);
1790 	if (res < 0) {
1791 		wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
1792 			   __func__, res);
1793 	}
1794 }
1795 
1796 
1797 /**
1798  * wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain
1799  * @priv: driver_nl80211 private data
1800  * @alpha2_arg: country to which to switch to
1801  * Returns: 0 on success, -1 on failure
1802  *
1803  * This asks nl80211 to set the regulatory domain for given
1804  * country ISO / IEC alpha2.
1805  */
wpa_driver_nl80211_set_country(void * priv,const char * alpha2_arg)1806 static int wpa_driver_nl80211_set_country(void *priv, const char *alpha2_arg)
1807 {
1808 	struct i802_bss *bss = priv;
1809 	struct wpa_driver_nl80211_data *drv = bss->drv;
1810 	char alpha2[3];
1811 	struct nl_msg *msg;
1812 
1813 	msg = nlmsg_alloc();
1814 	if (!msg)
1815 		return -ENOMEM;
1816 
1817 	alpha2[0] = alpha2_arg[0];
1818 	alpha2[1] = alpha2_arg[1];
1819 	alpha2[2] = '\0';
1820 
1821 	if (!nl80211_cmd(drv, msg, 0, NL80211_CMD_REQ_SET_REG) ||
1822 	    nla_put_string(msg, NL80211_ATTR_REG_ALPHA2, alpha2)) {
1823 		nlmsg_free(msg);
1824 		return -EINVAL;
1825 	}
1826 	if (send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL))
1827 		return -EINVAL;
1828 	return 0;
1829 }
1830 
1831 
nl80211_get_country(struct nl_msg * msg,void * arg)1832 static int nl80211_get_country(struct nl_msg *msg, void *arg)
1833 {
1834 	char *alpha2 = arg;
1835 	struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
1836 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1837 
1838 	nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1839 		  genlmsg_attrlen(gnlh, 0), NULL);
1840 	if (!tb_msg[NL80211_ATTR_REG_ALPHA2]) {
1841 		wpa_printf(MSG_DEBUG, "nl80211: No country information available");
1842 		return NL_SKIP;
1843 	}
1844 	os_strlcpy(alpha2, nla_data(tb_msg[NL80211_ATTR_REG_ALPHA2]), 3);
1845 	return NL_SKIP;
1846 }
1847 
1848 
wpa_driver_nl80211_get_country(void * priv,char * alpha2)1849 static int wpa_driver_nl80211_get_country(void *priv, char *alpha2)
1850 {
1851 	struct i802_bss *bss = priv;
1852 	struct wpa_driver_nl80211_data *drv = bss->drv;
1853 	struct nl_msg *msg;
1854 	int ret;
1855 
1856 	msg = nlmsg_alloc();
1857 	if (!msg)
1858 		return -ENOMEM;
1859 
1860 	nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG);
1861 	alpha2[0] = '\0';
1862 	ret = send_and_recv_msgs(drv, msg, nl80211_get_country, alpha2,
1863 				 NULL, NULL);
1864 	if (!alpha2[0])
1865 		ret = -1;
1866 
1867 	return ret;
1868 }
1869 
1870 
wpa_driver_nl80211_init_nl_global(struct nl80211_global * global)1871 static int wpa_driver_nl80211_init_nl_global(struct nl80211_global *global)
1872 {
1873 	int ret;
1874 
1875 	global->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
1876 	if (global->nl_cb == NULL) {
1877 		wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
1878 			   "callbacks");
1879 		return -1;
1880 	}
1881 
1882 	global->nl = nl_create_handle(global->nl_cb, "nl");
1883 	if (global->nl == NULL)
1884 		goto err;
1885 
1886 	global->nl80211_id = genl_ctrl_resolve(global->nl, "nl80211");
1887 	if (global->nl80211_id < 0) {
1888 		wpa_printf(MSG_ERROR, "nl80211: 'nl80211' generic netlink not "
1889 			   "found");
1890 		goto err;
1891 	}
1892 
1893 	global->nlctrl_id = genl_ctrl_resolve(global->nl, "nlctrl");
1894 	if (global->nlctrl_id < 0) {
1895 		wpa_printf(MSG_ERROR,
1896 			   "nl80211: 'nlctrl' generic netlink not found");
1897 		goto err;
1898 	}
1899 
1900 	global->nl_event = nl_create_handle(global->nl_cb, "event");
1901 	if (global->nl_event == NULL)
1902 		goto err;
1903 
1904 	ret = nl_get_multicast_id(global, "nl80211", "scan");
1905 	if (ret >= 0)
1906 		ret = nl_socket_add_membership(global->nl_event, ret);
1907 	if (ret < 0) {
1908 		wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
1909 			   "membership for scan events: %d (%s)",
1910 			   ret, nl_geterror(ret));
1911 		goto err;
1912 	}
1913 
1914 	ret = nl_get_multicast_id(global, "nl80211", "mlme");
1915 	if (ret >= 0)
1916 		ret = nl_socket_add_membership(global->nl_event, ret);
1917 	if (ret < 0) {
1918 		wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
1919 			   "membership for mlme events: %d (%s)",
1920 			   ret, nl_geterror(ret));
1921 		goto err;
1922 	}
1923 
1924 	ret = nl_get_multicast_id(global, "nl80211", "regulatory");
1925 	if (ret >= 0)
1926 		ret = nl_socket_add_membership(global->nl_event, ret);
1927 	if (ret < 0) {
1928 		wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
1929 			   "membership for regulatory events: %d (%s)",
1930 			   ret, nl_geterror(ret));
1931 		/* Continue without regulatory events */
1932 	}
1933 
1934 	ret = nl_get_multicast_id(global, "nl80211", "vendor");
1935 	if (ret >= 0)
1936 		ret = nl_socket_add_membership(global->nl_event, ret);
1937 	if (ret < 0) {
1938 		wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
1939 			   "membership for vendor events: %d (%s)",
1940 			   ret, nl_geterror(ret));
1941 		/* Continue without vendor events */
1942 	}
1943 
1944 	nl_cb_set(global->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
1945 		  no_seq_check, NULL);
1946 	nl_cb_set(global->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
1947 		  process_global_event, global);
1948 
1949 	nl80211_register_eloop_read(&global->nl_event,
1950 				    wpa_driver_nl80211_event_receive,
1951 				    global->nl_cb, 0);
1952 
1953 	return 0;
1954 
1955 err:
1956 	nl_destroy_handles(&global->nl_event);
1957 	nl_destroy_handles(&global->nl);
1958 	nl_cb_put(global->nl_cb);
1959 	global->nl_cb = NULL;
1960 	return -1;
1961 }
1962 
1963 
nl80211_check_global(struct nl80211_global * global)1964 static void nl80211_check_global(struct nl80211_global *global)
1965 {
1966 	struct nl_sock *handle;
1967 	const char *groups[] = { "scan", "mlme", "regulatory", "vendor", NULL };
1968 	int ret;
1969 	unsigned int i;
1970 
1971 	/*
1972 	 * Try to re-add memberships to handle case of cfg80211 getting reloaded
1973 	 * and all registration having been cleared.
1974 	 */
1975 	handle = (void *) (((intptr_t) global->nl_event) ^
1976 			   ELOOP_SOCKET_INVALID);
1977 
1978 	for (i = 0; groups[i]; i++) {
1979 		ret = nl_get_multicast_id(global, "nl80211", groups[i]);
1980 		if (ret >= 0)
1981 			ret = nl_socket_add_membership(handle, ret);
1982 		if (ret < 0) {
1983 			wpa_printf(MSG_INFO,
1984 				   "nl80211: Could not re-add multicast membership for %s events: %d (%s)",
1985 				   groups[i], ret, nl_geterror(ret));
1986 		}
1987 	}
1988 }
1989 
1990 
wpa_driver_nl80211_rfkill_blocked(void * ctx)1991 static void wpa_driver_nl80211_rfkill_blocked(void *ctx)
1992 {
1993 	struct wpa_driver_nl80211_data *drv = ctx;
1994 
1995 	wpa_printf(MSG_DEBUG, "nl80211: RFKILL blocked");
1996 
1997 	/*
1998 	 * rtnetlink ifdown handler will report interfaces other than the P2P
1999 	 * Device interface as disabled.
2000 	 */
2001 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
2002 		wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_DISABLED, NULL);
2003 }
2004 
2005 
wpa_driver_nl80211_rfkill_unblocked(void * ctx)2006 static void wpa_driver_nl80211_rfkill_unblocked(void *ctx)
2007 {
2008 	struct wpa_driver_nl80211_data *drv = ctx;
2009 	wpa_printf(MSG_DEBUG, "nl80211: RFKILL unblocked");
2010 	if (i802_set_iface_flags(drv->first_bss, 1)) {
2011 		wpa_printf(MSG_DEBUG, "nl80211: Could not set interface UP "
2012 			   "after rfkill unblock");
2013 		return;
2014 	}
2015 
2016 	if (is_p2p_net_interface(drv->nlmode))
2017 		nl80211_disable_11b_rates(drv, drv->ifindex, 1);
2018 
2019 	/*
2020 	 * rtnetlink ifup handler will report interfaces other than the P2P
2021 	 * Device interface as enabled.
2022 	 */
2023 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
2024 		wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED, NULL);
2025 }
2026 
2027 
wpa_driver_nl80211_handle_eapol_tx_status(int sock,void * eloop_ctx,void * handle)2028 static void wpa_driver_nl80211_handle_eapol_tx_status(int sock,
2029 						      void *eloop_ctx,
2030 						      void *handle)
2031 {
2032 	struct wpa_driver_nl80211_data *drv = eloop_ctx;
2033 	u8 data[2048];
2034 	struct msghdr msg;
2035 	struct iovec entry;
2036 	u8 control[512];
2037 	struct cmsghdr *cmsg;
2038 	int res, found_ee = 0, found_wifi = 0, acked = 0;
2039 	union wpa_event_data event;
2040 
2041 	memset(&msg, 0, sizeof(msg));
2042 	msg.msg_iov = &entry;
2043 	msg.msg_iovlen = 1;
2044 	entry.iov_base = data;
2045 	entry.iov_len = sizeof(data);
2046 	msg.msg_control = &control;
2047 	msg.msg_controllen = sizeof(control);
2048 
2049 	res = recvmsg(sock, &msg, MSG_ERRQUEUE);
2050 	/* if error or not fitting 802.3 header, return */
2051 	if (res < 14)
2052 		return;
2053 
2054 	for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg))
2055 	{
2056 		if (cmsg->cmsg_level == SOL_SOCKET &&
2057 		    cmsg->cmsg_type == SCM_WIFI_STATUS) {
2058 			int *ack;
2059 
2060 			found_wifi = 1;
2061 			ack = (void *)CMSG_DATA(cmsg);
2062 			acked = *ack;
2063 		}
2064 
2065 		if (cmsg->cmsg_level == SOL_PACKET &&
2066 		    cmsg->cmsg_type == PACKET_TX_TIMESTAMP) {
2067 			struct sock_extended_err *err =
2068 				(struct sock_extended_err *)CMSG_DATA(cmsg);
2069 
2070 			if (err->ee_origin == SO_EE_ORIGIN_TXSTATUS)
2071 				found_ee = 1;
2072 		}
2073 	}
2074 
2075 	if (!found_ee || !found_wifi)
2076 		return;
2077 
2078 	memset(&event, 0, sizeof(event));
2079 	event.eapol_tx_status.dst = data;
2080 	event.eapol_tx_status.data = data + 14;
2081 	event.eapol_tx_status.data_len = res - 14;
2082 	event.eapol_tx_status.ack = acked;
2083 	wpa_supplicant_event(drv->ctx, EVENT_EAPOL_TX_STATUS, &event);
2084 }
2085 
2086 
nl80211_init_connect_handle(struct i802_bss * bss)2087 static int nl80211_init_connect_handle(struct i802_bss *bss)
2088 {
2089 	if (bss->nl_connect) {
2090 		wpa_printf(MSG_DEBUG,
2091 			   "nl80211: Connect handle already created (nl_connect=%p)",
2092 			   bss->nl_connect);
2093 		return -1;
2094 	}
2095 
2096 	bss->nl_connect = nl_create_handle(bss->nl_cb, "connect");
2097 	if (!bss->nl_connect)
2098 		return -1;
2099 	nl80211_register_eloop_read(&bss->nl_connect,
2100 				    wpa_driver_nl80211_event_receive,
2101 				    bss->nl_cb, 1);
2102 	return 0;
2103 }
2104 
2105 
nl80211_init_bss(struct i802_bss * bss)2106 static int nl80211_init_bss(struct i802_bss *bss)
2107 {
2108 	bss->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
2109 	if (!bss->nl_cb)
2110 		return -1;
2111 
2112 	nl_cb_set(bss->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
2113 		  no_seq_check, NULL);
2114 	nl_cb_set(bss->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
2115 		  process_bss_event, bss);
2116 
2117 	nl80211_init_connect_handle(bss);
2118 
2119 	return 0;
2120 }
2121 
2122 
nl80211_destroy_bss(struct i802_bss * bss)2123 static void nl80211_destroy_bss(struct i802_bss *bss)
2124 {
2125 	nl_cb_put(bss->nl_cb);
2126 	bss->nl_cb = NULL;
2127 
2128 	if (bss->nl_connect)
2129 		nl80211_destroy_eloop_handle(&bss->nl_connect, 1);
2130 }
2131 
2132 
2133 static void
wpa_driver_nl80211_drv_init_rfkill(struct wpa_driver_nl80211_data * drv)2134 wpa_driver_nl80211_drv_init_rfkill(struct wpa_driver_nl80211_data *drv)
2135 {
2136 	struct rfkill_config *rcfg;
2137 
2138 	if (drv->rfkill)
2139 		return;
2140 
2141 	rcfg = os_zalloc(sizeof(*rcfg));
2142 	if (!rcfg)
2143 		return;
2144 
2145 	rcfg->ctx = drv;
2146 
2147 	/* rfkill uses netdev sysfs for initialization. However, P2P Device is
2148 	 * not associated with a netdev, so use the name of some other interface
2149 	 * sharing the same wiphy as the P2P Device interface.
2150 	 *
2151 	 * Note: This is valid, as a P2P Device interface is always dynamically
2152 	 * created and is created only once another wpa_s interface was added.
2153 	 */
2154 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) {
2155 		struct nl80211_global *global = drv->global;
2156 		struct wpa_driver_nl80211_data *tmp1;
2157 
2158 		dl_list_for_each(tmp1, &global->interfaces,
2159 				 struct wpa_driver_nl80211_data, list) {
2160 			if (drv == tmp1 || drv->wiphy_idx != tmp1->wiphy_idx ||
2161 			    !tmp1->rfkill)
2162 				continue;
2163 
2164 			wpa_printf(MSG_DEBUG,
2165 				   "nl80211: Use (%s) to initialize P2P Device rfkill",
2166 				   tmp1->first_bss->ifname);
2167 			os_strlcpy(rcfg->ifname, tmp1->first_bss->ifname,
2168 				   sizeof(rcfg->ifname));
2169 			break;
2170 		}
2171 	} else {
2172 		os_strlcpy(rcfg->ifname, drv->first_bss->ifname,
2173 			   sizeof(rcfg->ifname));
2174 	}
2175 
2176 	rcfg->blocked_cb = wpa_driver_nl80211_rfkill_blocked;
2177 	rcfg->unblocked_cb = wpa_driver_nl80211_rfkill_unblocked;
2178 	drv->rfkill = rfkill_init(rcfg);
2179 	if (!drv->rfkill) {
2180 		wpa_printf(MSG_DEBUG, "nl80211: RFKILL status not available");
2181 		os_free(rcfg);
2182 	}
2183 }
2184 
2185 
wpa_driver_nl80211_drv_init(void * ctx,const char * ifname,void * global_priv,int hostapd,const u8 * set_addr,const char * driver_params)2186 static void * wpa_driver_nl80211_drv_init(void *ctx, const char *ifname,
2187 					  void *global_priv, int hostapd,
2188 					  const u8 *set_addr,
2189 					  const char *driver_params)
2190 {
2191 	struct wpa_driver_nl80211_data *drv;
2192 	struct i802_bss *bss;
2193 
2194 	if (global_priv == NULL)
2195 		return NULL;
2196 	drv = os_zalloc(sizeof(*drv));
2197 	if (drv == NULL)
2198 		return NULL;
2199 	drv->global = global_priv;
2200 	drv->ctx = ctx;
2201 	drv->hostapd = !!hostapd;
2202 	drv->eapol_sock = -1;
2203 
2204 	/*
2205 	 * There is no driver capability flag for this, so assume it is
2206 	 * supported and disable this on first attempt to use if the driver
2207 	 * rejects the command due to missing support.
2208 	 */
2209 	drv->set_rekey_offload = 1;
2210 
2211 	drv->num_if_indices = ARRAY_SIZE(drv->default_if_indices);
2212 	drv->if_indices = drv->default_if_indices;
2213 
2214 	drv->first_bss = os_zalloc(sizeof(*drv->first_bss));
2215 	if (!drv->first_bss) {
2216 		os_free(drv);
2217 		return NULL;
2218 	}
2219 	bss = drv->first_bss;
2220 	bss->drv = drv;
2221 	bss->ctx = ctx;
2222 
2223 	os_strlcpy(bss->ifname, ifname, sizeof(bss->ifname));
2224 	drv->monitor_ifidx = -1;
2225 	drv->monitor_sock = -1;
2226 	drv->eapol_tx_sock = -1;
2227 	drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
2228 
2229 	if (nl80211_init_bss(bss))
2230 		goto failed;
2231 
2232 	if (wpa_driver_nl80211_finish_drv_init(drv, set_addr, 1, driver_params))
2233 		goto failed;
2234 
2235 	if (drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_TX_STATUS) {
2236 		drv->control_port_ap = 1;
2237 		goto skip_wifi_status;
2238 	}
2239 
2240 	drv->eapol_tx_sock = socket(PF_PACKET, SOCK_DGRAM, 0);
2241 	if (drv->eapol_tx_sock < 0)
2242 		goto failed;
2243 
2244 	if (drv->data_tx_status) {
2245 		int enabled = 1;
2246 
2247 		if (setsockopt(drv->eapol_tx_sock, SOL_SOCKET, SO_WIFI_STATUS,
2248 			       &enabled, sizeof(enabled)) < 0) {
2249 			wpa_printf(MSG_DEBUG,
2250 				   "nl80211: wifi status sockopt failed: %s",
2251 				   strerror(errno));
2252 			drv->data_tx_status = 0;
2253 			if (!drv->use_monitor)
2254 				drv->capa.flags &=
2255 					~WPA_DRIVER_FLAGS_EAPOL_TX_STATUS;
2256 		} else {
2257 			eloop_register_read_sock(
2258 				drv->eapol_tx_sock,
2259 				wpa_driver_nl80211_handle_eapol_tx_status,
2260 				drv, NULL);
2261 		}
2262 	}
2263 skip_wifi_status:
2264 
2265 	if (drv->global) {
2266 		nl80211_check_global(drv->global);
2267 		dl_list_add(&drv->global->interfaces, &drv->list);
2268 		drv->in_interface_list = 1;
2269 	}
2270 
2271 	return bss;
2272 
2273 failed:
2274 	wpa_driver_nl80211_deinit(bss);
2275 	return NULL;
2276 }
2277 
2278 
2279 /**
2280  * wpa_driver_nl80211_init - Initialize nl80211 driver interface
2281  * @ctx: context to be used when calling wpa_supplicant functions,
2282  * e.g., wpa_supplicant_event()
2283  * @ifname: interface name, e.g., wlan0
2284  * @global_priv: private driver global data from global_init()
2285  * Returns: Pointer to private data, %NULL on failure
2286  */
wpa_driver_nl80211_init(void * ctx,const char * ifname,void * global_priv)2287 static void * wpa_driver_nl80211_init(void *ctx, const char *ifname,
2288 				      void *global_priv)
2289 {
2290 	return wpa_driver_nl80211_drv_init(ctx, ifname, global_priv, 0, NULL,
2291 					   NULL);
2292 }
2293 
2294 
nl80211_register_frame(struct i802_bss * bss,struct nl_sock * nl_handle,u16 type,const u8 * match,size_t match_len,bool multicast)2295 static int nl80211_register_frame(struct i802_bss *bss,
2296 				  struct nl_sock *nl_handle,
2297 				  u16 type, const u8 *match, size_t match_len,
2298 				  bool multicast)
2299 {
2300 	struct wpa_driver_nl80211_data *drv = bss->drv;
2301 	struct nl_msg *msg;
2302 	int ret;
2303 	char buf[30];
2304 
2305 	buf[0] = '\0';
2306 	wpa_snprintf_hex(buf, sizeof(buf), match, match_len);
2307 	wpa_printf(MSG_DEBUG,
2308 		   "nl80211: Register frame type=0x%x (%s) nl_handle=%p match=%s multicast=%d",
2309 		   type, fc2str(type), nl_handle, buf, multicast);
2310 
2311 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_REGISTER_FRAME)) ||
2312 	    (multicast && nla_put_flag(msg, NL80211_ATTR_RECEIVE_MULTICAST)) ||
2313 	    nla_put_u16(msg, NL80211_ATTR_FRAME_TYPE, type) ||
2314 	    nla_put(msg, NL80211_ATTR_FRAME_MATCH, match_len, match)) {
2315 		nlmsg_free(msg);
2316 		return -1;
2317 	}
2318 
2319 	ret = send_and_recv(drv->global, nl_handle, msg, NULL, NULL,
2320 			    NULL, NULL);
2321 	if (ret) {
2322 		wpa_printf(MSG_DEBUG, "nl80211: Register frame command "
2323 			   "failed (type=%u): ret=%d (%s)",
2324 			   type, ret, strerror(-ret));
2325 		wpa_hexdump(MSG_DEBUG, "nl80211: Register frame match",
2326 			    match, match_len);
2327 	}
2328 	return ret;
2329 }
2330 
2331 
nl80211_alloc_mgmt_handle(struct i802_bss * bss)2332 static int nl80211_alloc_mgmt_handle(struct i802_bss *bss)
2333 {
2334 	if (bss->nl_mgmt) {
2335 		wpa_printf(MSG_DEBUG, "nl80211: Mgmt reporting "
2336 			   "already on! (nl_mgmt=%p)", bss->nl_mgmt);
2337 		return -1;
2338 	}
2339 
2340 	bss->nl_mgmt = nl_create_handle(bss->nl_cb, "mgmt");
2341 	if (bss->nl_mgmt == NULL)
2342 		return -1;
2343 
2344 	return 0;
2345 }
2346 
2347 
nl80211_mgmt_handle_register_eloop(struct i802_bss * bss)2348 static void nl80211_mgmt_handle_register_eloop(struct i802_bss *bss)
2349 {
2350 	nl80211_register_eloop_read(&bss->nl_mgmt,
2351 				    wpa_driver_nl80211_event_receive,
2352 				    bss->nl_cb, 0);
2353 }
2354 
2355 
nl80211_register_action_frame(struct i802_bss * bss,const u8 * match,size_t match_len)2356 static int nl80211_register_action_frame(struct i802_bss *bss,
2357 					 const u8 *match, size_t match_len)
2358 {
2359 	u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_ACTION << 4);
2360 	return nl80211_register_frame(bss, bss->nl_mgmt,
2361 				      type, match, match_len, false);
2362 }
2363 
2364 
nl80211_mgmt_subscribe_non_ap(struct i802_bss * bss)2365 static int nl80211_mgmt_subscribe_non_ap(struct i802_bss *bss)
2366 {
2367 	struct wpa_driver_nl80211_data *drv = bss->drv;
2368 	u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4);
2369 	int ret = 0;
2370 
2371 	if (nl80211_alloc_mgmt_handle(bss))
2372 		return -1;
2373 	wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with non-AP "
2374 		   "handle %p", bss->nl_mgmt);
2375 
2376 	if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
2377 		/* register for any AUTH message */
2378 		nl80211_register_frame(bss, bss->nl_mgmt, type, NULL, 0, false);
2379 	} else if ((drv->capa.flags & WPA_DRIVER_FLAGS_SAE) &&
2380 		   !(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
2381 		/* register for SAE Authentication frames */
2382 		nl80211_register_frame(bss, bss->nl_mgmt, type,
2383 				       (u8 *) "\x03\x00", 2, false);
2384 	}
2385 
2386 #ifdef CONFIG_PASN
2387 	/* register for PASN Authentication frames */
2388 	if ((drv->capa.flags & WPA_DRIVER_FLAGS_SME) &&
2389 	    nl80211_register_frame(bss, bss->nl_mgmt, type,
2390 				   (u8 *) "\x07\x00", 2, false))
2391 		ret = -1;
2392 #endif /* CONFIG_PASN */
2393 
2394 #ifdef CONFIG_INTERWORKING
2395 	/* QoS Map Configure */
2396 	if (nl80211_register_action_frame(bss, (u8 *) "\x01\x04", 2) < 0)
2397 		ret = -1;
2398 #endif /* CONFIG_INTERWORKING */
2399 #if defined(CONFIG_P2P) || defined(CONFIG_INTERWORKING) || defined(CONFIG_DPP)
2400 	/* GAS Initial Request */
2401 	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0a", 2) < 0)
2402 		ret = -1;
2403 	/* GAS Initial Response */
2404 	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0b", 2) < 0)
2405 		ret = -1;
2406 	/* GAS Comeback Request */
2407 	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0c", 2) < 0)
2408 		ret = -1;
2409 	/* GAS Comeback Response */
2410 	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0d", 2) < 0)
2411 		ret = -1;
2412 	/* Protected GAS Initial Request */
2413 	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0a", 2) < 0)
2414 		ret = -1;
2415 	/* Protected GAS Initial Response */
2416 	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0b", 2) < 0)
2417 		ret = -1;
2418 	/* Protected GAS Comeback Request */
2419 	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0c", 2) < 0)
2420 		ret = -1;
2421 	/* Protected GAS Comeback Response */
2422 	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0d", 2) < 0)
2423 		ret = -1;
2424 #endif /* CONFIG_P2P || CONFIG_INTERWORKING || CONFIG_DPP */
2425 #ifdef CONFIG_P2P
2426 	/* P2P Public Action */
2427 	if (nl80211_register_action_frame(bss,
2428 					  (u8 *) "\x04\x09\x50\x6f\x9a\x09",
2429 					  6) < 0)
2430 		ret = -1;
2431 	/* P2P Action */
2432 	if (nl80211_register_action_frame(bss,
2433 					  (u8 *) "\x7f\x50\x6f\x9a\x09",
2434 					  5) < 0)
2435 		ret = -1;
2436 #endif /* CONFIG_P2P */
2437 #ifdef CONFIG_DPP
2438 	/* DPP Public Action */
2439 	if (nl80211_register_action_frame(bss,
2440 					  (u8 *) "\x04\x09\x50\x6f\x9a\x1a",
2441 					  6) < 0)
2442 		ret = -1;
2443 #endif /* CONFIG_DPP */
2444 #ifdef CONFIG_OCV
2445 	/* SA Query Request */
2446 	if (nl80211_register_action_frame(bss, (u8 *) "\x08\x00", 2) < 0)
2447 		ret = -1;
2448 #endif /* CONFIG_OCV */
2449 	/* SA Query Response */
2450 	if (nl80211_register_action_frame(bss, (u8 *) "\x08\x01", 2) < 0)
2451 		ret = -1;
2452 #ifdef CONFIG_TDLS
2453 	if ((drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT)) {
2454 		/* TDLS Discovery Response */
2455 		if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0e", 2) <
2456 		    0)
2457 			ret = -1;
2458 	}
2459 #endif /* CONFIG_TDLS */
2460 #ifdef CONFIG_FST
2461 	/* FST Action frames */
2462 	if (nl80211_register_action_frame(bss, (u8 *) "\x12", 1) < 0)
2463 		ret = -1;
2464 #endif /* CONFIG_FST */
2465 
2466 	/* FT Action frames */
2467 	if (nl80211_register_action_frame(bss, (u8 *) "\x06", 1) < 0)
2468 		ret = -1;
2469 	else if (!drv->has_driver_key_mgmt) {
2470 		int i;
2471 
2472 		/* Update supported AKMs only if the driver doesn't advertize
2473 		 * any AKM capabilities. */
2474 		drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_FT |
2475 			WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
2476 
2477 		/* Update per interface supported AKMs */
2478 		for (i = 0; i < WPA_IF_MAX; i++)
2479 			drv->capa.key_mgmt_iftype[i] = drv->capa.key_mgmt;
2480 	}
2481 
2482 	/* WNM - BSS Transition Management Request */
2483 	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x07", 2) < 0)
2484 		ret = -1;
2485 	/* WNM-Sleep Mode Response */
2486 	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x11", 2) < 0)
2487 		ret = -1;
2488 #ifdef CONFIG_WNM
2489 	/* WNM - Collocated Interference Request */
2490 	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x0b", 2) < 0)
2491 		ret = -1;
2492 #endif /* CONFIG_WNM */
2493 
2494 #ifdef CONFIG_HS20
2495 	/* WNM-Notification */
2496 	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x1a", 2) < 0)
2497 		ret = -1;
2498 #endif /* CONFIG_HS20 */
2499 
2500 	/* WMM-AC ADDTS Response */
2501 	if (nl80211_register_action_frame(bss, (u8 *) "\x11\x01", 2) < 0)
2502 		ret = -1;
2503 
2504 	/* WMM-AC DELTS */
2505 	if (nl80211_register_action_frame(bss, (u8 *) "\x11\x02", 2) < 0)
2506 		ret = -1;
2507 
2508 	/* Radio Measurement - Neighbor Report Response */
2509 	if (nl80211_register_action_frame(bss, (u8 *) "\x05\x05", 2) < 0)
2510 		ret = -1;
2511 
2512 	/* Radio Measurement - Radio Measurement Request */
2513 	if  (!drv->no_rrm &&
2514 	     nl80211_register_action_frame(bss, (u8 *) "\x05\x00", 2) < 0)
2515 		ret = -1;
2516 
2517 	/* Radio Measurement - Link Measurement Request */
2518 	if ((drv->capa.rrm_flags & WPA_DRIVER_FLAGS_TX_POWER_INSERTION) &&
2519 	    (nl80211_register_action_frame(bss, (u8 *) "\x05\x02", 2) < 0))
2520 		ret = -1;
2521 
2522 	/* Robust AV SCS Response */
2523 	if (nl80211_register_action_frame(bss, (u8 *) "\x13\x01", 2) < 0)
2524 		ret = -1;
2525 
2526 	/* Robust AV MSCS Response */
2527 	if (nl80211_register_action_frame(bss, (u8 *) "\x13\x05", 2) < 0)
2528 		ret = -1;
2529 
2530 	/* Protected QoS Management Action frame */
2531 	if (nl80211_register_action_frame(bss, (u8 *) "\x7e\x50\x6f\x9a\x1a",
2532 					  5) < 0)
2533 		ret = -1;
2534 
2535 	nl80211_mgmt_handle_register_eloop(bss);
2536 
2537 	return ret;
2538 }
2539 
2540 
nl80211_mgmt_subscribe_mesh(struct i802_bss * bss)2541 static int nl80211_mgmt_subscribe_mesh(struct i802_bss *bss)
2542 {
2543 	int ret = 0;
2544 
2545 	if (nl80211_alloc_mgmt_handle(bss))
2546 		return -1;
2547 
2548 	wpa_printf(MSG_DEBUG,
2549 		   "nl80211: Subscribe to mgmt frames with mesh handle %p",
2550 		   bss->nl_mgmt);
2551 
2552 	/* Auth frames for mesh SAE */
2553 	if (nl80211_register_frame(bss, bss->nl_mgmt,
2554 				   (WLAN_FC_TYPE_MGMT << 2) |
2555 				   (WLAN_FC_STYPE_AUTH << 4),
2556 				   NULL, 0, false) < 0)
2557 		ret = -1;
2558 
2559 	/* Mesh peering open */
2560 	if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x01", 2) < 0)
2561 		ret = -1;
2562 	/* Mesh peering confirm */
2563 	if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x02", 2) < 0)
2564 		ret = -1;
2565 	/* Mesh peering close */
2566 	if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x03", 2) < 0)
2567 		ret = -1;
2568 
2569 	nl80211_mgmt_handle_register_eloop(bss);
2570 
2571 	return ret;
2572 }
2573 
2574 
nl80211_register_spurious_class3(struct i802_bss * bss)2575 static int nl80211_register_spurious_class3(struct i802_bss *bss)
2576 {
2577 	struct nl_msg *msg;
2578 	int ret;
2579 
2580 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_UNEXPECTED_FRAME);
2581 	ret = send_and_recv(bss->drv->global, bss->nl_mgmt, msg, NULL, NULL,
2582 			    NULL, NULL);
2583 	if (ret) {
2584 		wpa_printf(MSG_DEBUG, "nl80211: Register spurious class3 "
2585 			   "failed: ret=%d (%s)",
2586 			   ret, strerror(-ret));
2587 	}
2588 	return ret;
2589 }
2590 
2591 
nl80211_action_subscribe_ap(struct i802_bss * bss)2592 static int nl80211_action_subscribe_ap(struct i802_bss *bss)
2593 {
2594 	int ret = 0;
2595 
2596 	/* Public Action frames */
2597 	if (nl80211_register_action_frame(bss, (u8 *) "\x04", 1) < 0)
2598 		ret = -1;
2599 	/* RRM Measurement Report */
2600 	if (nl80211_register_action_frame(bss, (u8 *) "\x05\x01", 2) < 0)
2601 		ret = -1;
2602 	/* RRM Link Measurement Report */
2603 	if (nl80211_register_action_frame(bss, (u8 *) "\x05\x03", 2) < 0)
2604 		ret = -1;
2605 	/* RRM Neighbor Report Request */
2606 	if (nl80211_register_action_frame(bss, (u8 *) "\x05\x04", 2) < 0)
2607 		ret = -1;
2608 	/* FT Action frames */
2609 	if (nl80211_register_action_frame(bss, (u8 *) "\x06", 1) < 0)
2610 		ret = -1;
2611 	/* SA Query */
2612 	if (nl80211_register_action_frame(bss, (u8 *) "\x08", 1) < 0)
2613 		ret = -1;
2614 	/* Protected Dual of Public Action */
2615 	if (nl80211_register_action_frame(bss, (u8 *) "\x09", 1) < 0)
2616 		ret = -1;
2617 	/* WNM */
2618 	if (nl80211_register_action_frame(bss, (u8 *) "\x0a", 1) < 0)
2619 		ret = -1;
2620 	/* WMM */
2621 	if (nl80211_register_action_frame(bss, (u8 *) "\x11", 1) < 0)
2622 		ret = -1;
2623 #ifdef CONFIG_FST
2624 	/* FST Action frames */
2625 	if (nl80211_register_action_frame(bss, (u8 *) "\x12", 1) < 0)
2626 		ret = -1;
2627 #endif /* CONFIG_FST */
2628 	/* Vendor-specific */
2629 	if (nl80211_register_action_frame(bss, (u8 *) "\x7f", 1) < 0)
2630 		ret = -1;
2631 
2632 	return ret;
2633 }
2634 
2635 
nl80211_mgmt_subscribe_ap(struct i802_bss * bss)2636 static int nl80211_mgmt_subscribe_ap(struct i802_bss *bss)
2637 {
2638 	static const int stypes[] = {
2639 		WLAN_FC_STYPE_AUTH,
2640 		WLAN_FC_STYPE_ASSOC_REQ,
2641 		WLAN_FC_STYPE_REASSOC_REQ,
2642 		WLAN_FC_STYPE_DISASSOC,
2643 		WLAN_FC_STYPE_DEAUTH,
2644 		WLAN_FC_STYPE_PROBE_REQ,
2645 /* Beacon doesn't work as mac80211 doesn't currently allow
2646  * it, but it wouldn't really be the right thing anyway as
2647  * it isn't per interface ... maybe just dump the scan
2648  * results periodically for OLBC?
2649  */
2650 		/* WLAN_FC_STYPE_BEACON, */
2651 	};
2652 	unsigned int i;
2653 
2654 	if (nl80211_alloc_mgmt_handle(bss))
2655 		return -1;
2656 	wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
2657 		   "handle %p", bss->nl_mgmt);
2658 
2659 	for (i = 0; i < ARRAY_SIZE(stypes); i++) {
2660 		if (nl80211_register_frame(bss, bss->nl_mgmt,
2661 					   (WLAN_FC_TYPE_MGMT << 2) |
2662 					   (stypes[i] << 4),
2663 					   NULL, 0, false) < 0) {
2664 			goto out_err;
2665 		}
2666 	}
2667 
2668 	if (nl80211_action_subscribe_ap(bss))
2669 		goto out_err;
2670 
2671 	if (nl80211_register_spurious_class3(bss))
2672 		goto out_err;
2673 
2674 	nl80211_mgmt_handle_register_eloop(bss);
2675 	return 0;
2676 
2677 out_err:
2678 	nl_destroy_handles(&bss->nl_mgmt);
2679 	return -1;
2680 }
2681 
2682 
nl80211_mgmt_subscribe_ap_dev_sme(struct i802_bss * bss)2683 static int nl80211_mgmt_subscribe_ap_dev_sme(struct i802_bss *bss)
2684 {
2685 	if (nl80211_alloc_mgmt_handle(bss))
2686 		return -1;
2687 	wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
2688 		   "handle %p (device SME)", bss->nl_mgmt);
2689 
2690 	if (nl80211_action_subscribe_ap(bss))
2691 		goto out_err;
2692 
2693 	if (bss->drv->device_ap_sme) {
2694 		u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4);
2695 
2696 		/* Register for all Authentication frames */
2697 		if (nl80211_register_frame(bss, bss->nl_mgmt, type, NULL, 0,
2698 					   false) < 0)
2699 			wpa_printf(MSG_DEBUG,
2700 				   "nl80211: Failed to subscribe to handle Authentication frames - SAE offload may not work");
2701 	}
2702 
2703 	nl80211_mgmt_handle_register_eloop(bss);
2704 	return 0;
2705 
2706 out_err:
2707 	nl_destroy_handles(&bss->nl_mgmt);
2708 	return -1;
2709 }
2710 
2711 
nl80211_mgmt_unsubscribe(struct i802_bss * bss,const char * reason)2712 static void nl80211_mgmt_unsubscribe(struct i802_bss *bss, const char *reason)
2713 {
2714 	if (bss->nl_mgmt == NULL)
2715 		return;
2716 	wpa_printf(MSG_DEBUG, "nl80211: Unsubscribe mgmt frames handle %p "
2717 		   "(%s)", bss->nl_mgmt, reason);
2718 	nl80211_destroy_eloop_handle(&bss->nl_mgmt, 0);
2719 
2720 	nl80211_put_wiphy_data_ap(bss);
2721 }
2722 
2723 
wpa_driver_nl80211_send_rfkill(void * eloop_ctx,void * timeout_ctx)2724 static void wpa_driver_nl80211_send_rfkill(void *eloop_ctx, void *timeout_ctx)
2725 {
2726 	wpa_supplicant_event(timeout_ctx, EVENT_INTERFACE_DISABLED, NULL);
2727 }
2728 
2729 
nl80211_del_p2pdev(struct i802_bss * bss)2730 static void nl80211_del_p2pdev(struct i802_bss *bss)
2731 {
2732 	struct nl_msg *msg;
2733 	int ret;
2734 
2735 	msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_DEL_INTERFACE);
2736 	ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
2737 
2738 	wpa_printf(MSG_DEBUG, "nl80211: Delete P2P Device %s (0x%llx): %s",
2739 		   bss->ifname, (long long unsigned int) bss->wdev_id,
2740 		   strerror(-ret));
2741 }
2742 
2743 
nl80211_set_p2pdev(struct i802_bss * bss,int start)2744 static int nl80211_set_p2pdev(struct i802_bss *bss, int start)
2745 {
2746 	struct nl_msg *msg;
2747 	int ret;
2748 
2749 	msg = nl80211_cmd_msg(bss, 0, start ? NL80211_CMD_START_P2P_DEVICE :
2750 			      NL80211_CMD_STOP_P2P_DEVICE);
2751 	ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
2752 
2753 	wpa_printf(MSG_DEBUG, "nl80211: %s P2P Device %s (0x%llx): %s",
2754 		   start ? "Start" : "Stop",
2755 		   bss->ifname, (long long unsigned int) bss->wdev_id,
2756 		   strerror(-ret));
2757 	return ret;
2758 }
2759 
2760 
i802_set_iface_flags(struct i802_bss * bss,int up)2761 static int i802_set_iface_flags(struct i802_bss *bss, int up)
2762 {
2763 	enum nl80211_iftype nlmode;
2764 
2765 	nlmode = nl80211_get_ifmode(bss);
2766 	if (nlmode != NL80211_IFTYPE_P2P_DEVICE) {
2767 		return linux_set_iface_flags(bss->drv->global->ioctl_sock,
2768 					     bss->ifname, up);
2769 	}
2770 
2771 	/* P2P Device has start/stop which is equivalent */
2772 	return nl80211_set_p2pdev(bss, up);
2773 }
2774 
2775 
2776 #ifdef CONFIG_TESTING_OPTIONS
qca_vendor_test_cmd_handler(struct nl_msg * msg,void * arg)2777 static int qca_vendor_test_cmd_handler(struct nl_msg *msg, void *arg)
2778 {
2779 	/* struct wpa_driver_nl80211_data *drv = arg; */
2780 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
2781 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
2782 
2783 
2784 	wpa_printf(MSG_DEBUG,
2785 		   "nl80211: QCA vendor test command response received");
2786 
2787 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
2788 		  genlmsg_attrlen(gnlh, 0), NULL);
2789 	if (!tb[NL80211_ATTR_VENDOR_DATA]) {
2790 		wpa_printf(MSG_DEBUG, "nl80211: No vendor data attribute");
2791 		return NL_SKIP;
2792 	}
2793 
2794 	wpa_hexdump(MSG_DEBUG,
2795 		    "nl80211: Received QCA vendor test command response",
2796 		    nla_data(tb[NL80211_ATTR_VENDOR_DATA]),
2797 		    nla_len(tb[NL80211_ATTR_VENDOR_DATA]));
2798 
2799 	return NL_SKIP;
2800 }
2801 #endif /* CONFIG_TESTING_OPTIONS */
2802 
2803 
qca_vendor_test(struct wpa_driver_nl80211_data * drv)2804 static void qca_vendor_test(struct wpa_driver_nl80211_data *drv)
2805 {
2806 #ifdef CONFIG_TESTING_OPTIONS
2807 	struct nl_msg *msg;
2808 	struct nlattr *params;
2809 	int ret;
2810 
2811 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
2812 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
2813 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
2814 			QCA_NL80211_VENDOR_SUBCMD_TEST) ||
2815 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
2816 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_TEST, 123)) {
2817 		nlmsg_free(msg);
2818 		return;
2819 	}
2820 	nla_nest_end(msg, params);
2821 
2822 	ret = send_and_recv_msgs(drv, msg, qca_vendor_test_cmd_handler, drv,
2823 				 NULL, NULL);
2824 	wpa_printf(MSG_DEBUG,
2825 		   "nl80211: QCA vendor test command returned %d (%s)",
2826 		   ret, strerror(-ret));
2827 #endif /* CONFIG_TESTING_OPTIONS */
2828 }
2829 
2830 
2831 static int
wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data * drv,const u8 * set_addr,int first,const char * driver_params)2832 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
2833 				   const u8 *set_addr, int first,
2834 				   const char *driver_params)
2835 {
2836 	struct i802_bss *bss = drv->first_bss;
2837 	int send_rfkill_event = 0;
2838 	enum nl80211_iftype nlmode;
2839 
2840 	drv->ifindex = if_nametoindex(bss->ifname);
2841 	bss->ifindex = drv->ifindex;
2842 	bss->wdev_id = drv->global->if_add_wdevid;
2843 	bss->wdev_id_set = drv->global->if_add_wdevid_set;
2844 
2845 	bss->if_dynamic = drv->ifindex == drv->global->if_add_ifindex;
2846 	bss->if_dynamic = bss->if_dynamic || drv->global->if_add_wdevid_set;
2847 	drv->global->if_add_wdevid_set = 0;
2848 
2849 	if (!bss->if_dynamic && nl80211_get_ifmode(bss) == NL80211_IFTYPE_AP)
2850 		bss->static_ap = 1;
2851 
2852 	if (first &&
2853 	    nl80211_get_ifmode(bss) != NL80211_IFTYPE_P2P_DEVICE &&
2854 	    linux_iface_up(drv->global->ioctl_sock, bss->ifname) > 0)
2855 		drv->start_iface_up = 1;
2856 
2857 	if (wpa_driver_nl80211_capa(drv))
2858 		return -1;
2859 
2860 	if (driver_params && nl80211_set_param(bss, driver_params) < 0)
2861 		return -1;
2862 
2863 	wpa_printf(MSG_DEBUG, "nl80211: interface %s in phy %s",
2864 		   bss->ifname, drv->phyname);
2865 
2866 	if (set_addr &&
2867 	    (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) ||
2868 	     linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
2869 				set_addr)))
2870 		return -1;
2871 
2872 	if (first && nl80211_get_ifmode(bss) == NL80211_IFTYPE_STATION)
2873 		drv->start_mode_sta = 1;
2874 
2875 	if (drv->hostapd || bss->static_ap)
2876 		nlmode = NL80211_IFTYPE_AP;
2877 	else if (bss->if_dynamic ||
2878 		 nl80211_get_ifmode(bss) == NL80211_IFTYPE_MESH_POINT)
2879 		nlmode = nl80211_get_ifmode(bss);
2880 	else
2881 		nlmode = NL80211_IFTYPE_STATION;
2882 
2883 	if (wpa_driver_nl80211_set_mode(bss, nlmode) < 0) {
2884 		wpa_printf(MSG_ERROR, "nl80211: Could not configure driver mode");
2885 		return -1;
2886 	}
2887 
2888 	if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
2889 		nl80211_get_macaddr(bss);
2890 
2891 	wpa_driver_nl80211_drv_init_rfkill(drv);
2892 
2893 	if (!rfkill_is_blocked(drv->rfkill)) {
2894 		int ret = i802_set_iface_flags(bss, 1);
2895 		if (ret) {
2896 			wpa_printf(MSG_ERROR, "nl80211: Could not set "
2897 				   "interface '%s' UP", bss->ifname);
2898 			return ret;
2899 		}
2900 
2901 		if (is_p2p_net_interface(nlmode))
2902 			nl80211_disable_11b_rates(bss->drv,
2903 						  bss->drv->ifindex, 1);
2904 
2905 		if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
2906 			return ret;
2907 	} else {
2908 		wpa_printf(MSG_DEBUG, "nl80211: Could not yet enable "
2909 			   "interface '%s' due to rfkill", bss->ifname);
2910 		if (nlmode != NL80211_IFTYPE_P2P_DEVICE)
2911 			drv->if_disabled = 1;
2912 
2913 		send_rfkill_event = 1;
2914 	}
2915 
2916 	if (!drv->hostapd && nlmode != NL80211_IFTYPE_P2P_DEVICE)
2917 		netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
2918 				       1, IF_OPER_DORMANT);
2919 
2920 	if (nlmode != NL80211_IFTYPE_P2P_DEVICE) {
2921 		if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
2922 				       bss->addr))
2923 			return -1;
2924 		os_memcpy(drv->perm_addr, bss->addr, ETH_ALEN);
2925 	}
2926 
2927 	if (send_rfkill_event) {
2928 		eloop_register_timeout(0, 0, wpa_driver_nl80211_send_rfkill,
2929 				       drv, drv->ctx);
2930 	}
2931 
2932 	if (drv->vendor_cmd_test_avail)
2933 		qca_vendor_test(drv);
2934 
2935 	return 0;
2936 }
2937 
2938 
wpa_driver_nl80211_del_beacon(struct i802_bss * bss)2939 static int wpa_driver_nl80211_del_beacon(struct i802_bss *bss)
2940 {
2941 	struct nl_msg *msg;
2942 	struct wpa_driver_nl80211_data *drv = bss->drv;
2943 
2944 	wpa_printf(MSG_DEBUG, "nl80211: Remove beacon (ifindex=%d)",
2945 		   drv->ifindex);
2946 	bss->beacon_set = 0;
2947 	bss->freq = 0;
2948 	nl80211_put_wiphy_data_ap(bss);
2949 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_DEL_BEACON);
2950 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
2951 }
2952 
2953 
2954 /**
2955  * wpa_driver_nl80211_deinit - Deinitialize nl80211 driver interface
2956  * @bss: Pointer to private nl80211 data from wpa_driver_nl80211_init()
2957  *
2958  * Shut down driver interface and processing of driver events. Free
2959  * private data buffer if one was allocated in wpa_driver_nl80211_init().
2960  */
wpa_driver_nl80211_deinit(struct i802_bss * bss)2961 static void wpa_driver_nl80211_deinit(struct i802_bss *bss)
2962 {
2963 	struct wpa_driver_nl80211_data *drv = bss->drv;
2964 	unsigned int i;
2965 
2966 	wpa_printf(MSG_INFO, "nl80211: deinit ifname=%s disabled_11b_rates=%d",
2967 		   bss->ifname, drv->disabled_11b_rates);
2968 
2969 	bss->in_deinit = 1;
2970 	if (drv->data_tx_status)
2971 		eloop_unregister_read_sock(drv->eapol_tx_sock);
2972 	if (drv->eapol_tx_sock >= 0)
2973 		close(drv->eapol_tx_sock);
2974 
2975 	if (bss->nl_preq)
2976 		wpa_driver_nl80211_probe_req_report(bss, 0);
2977 	if (bss->added_if_into_bridge) {
2978 		if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
2979 				    bss->ifname) < 0)
2980 			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
2981 				   "interface %s from bridge %s: %s",
2982 				   bss->ifname, bss->brname, strerror(errno));
2983 	}
2984 
2985 	if (drv->rtnl_sk)
2986 		nl_socket_free(drv->rtnl_sk);
2987 
2988 	if (bss->added_bridge) {
2989 		if (linux_set_iface_flags(drv->global->ioctl_sock, bss->brname,
2990 					  0) < 0)
2991 			wpa_printf(MSG_INFO,
2992 				   "nl80211: Could not set bridge %s down",
2993 				   bss->brname);
2994 		if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
2995 			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
2996 				   "bridge %s: %s",
2997 				   bss->brname, strerror(errno));
2998 	}
2999 
3000 	nl80211_remove_monitor_interface(drv);
3001 
3002 	if (is_ap_interface(drv->nlmode))
3003 		wpa_driver_nl80211_del_beacon(bss);
3004 
3005 	if (drv->eapol_sock >= 0) {
3006 		eloop_unregister_read_sock(drv->eapol_sock);
3007 		close(drv->eapol_sock);
3008 	}
3009 
3010 	if (drv->if_indices != drv->default_if_indices)
3011 		os_free(drv->if_indices);
3012 
3013 	if (drv->disabled_11b_rates)
3014 		nl80211_disable_11b_rates(drv, drv->ifindex, 0);
3015 
3016 	netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, 0,
3017 			       IF_OPER_UP);
3018 	eloop_cancel_timeout(wpa_driver_nl80211_send_rfkill, drv, drv->ctx);
3019 	rfkill_deinit(drv->rfkill);
3020 
3021 	eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
3022 
3023 	if (!drv->start_iface_up)
3024 		(void) i802_set_iface_flags(bss, 0);
3025 
3026 	if (drv->addr_changed) {
3027 		if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname,
3028 					  0) < 0) {
3029 			wpa_printf(MSG_DEBUG,
3030 				   "nl80211: Could not set interface down to restore permanent MAC address");
3031 		}
3032 		if (linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
3033 				       drv->perm_addr) < 0) {
3034 			wpa_printf(MSG_DEBUG,
3035 				   "nl80211: Could not restore permanent MAC address");
3036 		}
3037 	}
3038 
3039 	if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE) {
3040 		if (drv->start_mode_sta)
3041 			wpa_driver_nl80211_set_mode(bss,
3042 						    NL80211_IFTYPE_STATION);
3043 		nl80211_mgmt_unsubscribe(bss, "deinit");
3044 	} else {
3045 		nl80211_mgmt_unsubscribe(bss, "deinit");
3046 		nl80211_del_p2pdev(bss);
3047 	}
3048 
3049 	nl80211_destroy_bss(drv->first_bss);
3050 
3051 	os_free(drv->filter_ssids);
3052 
3053 	os_free(drv->auth_ie);
3054 	os_free(drv->auth_data);
3055 
3056 	if (drv->in_interface_list)
3057 		dl_list_del(&drv->list);
3058 
3059 	os_free(drv->extended_capa);
3060 	os_free(drv->extended_capa_mask);
3061 	for (i = 0; i < drv->num_iface_ext_capa; i++) {
3062 		os_free(drv->iface_ext_capa[i].ext_capa);
3063 		os_free(drv->iface_ext_capa[i].ext_capa_mask);
3064 	}
3065 	os_free(drv->first_bss);
3066 #ifdef CONFIG_DRIVER_NL80211_QCA
3067 	os_free(drv->pending_roam_data);
3068 #endif /* CONFIG_DRIVER_NL80211_QCA */
3069 	os_free(drv);
3070 }
3071 
3072 
wpa_alg_to_cipher_suite(enum wpa_alg alg,size_t key_len)3073 static u32 wpa_alg_to_cipher_suite(enum wpa_alg alg, size_t key_len)
3074 {
3075 	switch (alg) {
3076 	case WPA_ALG_WEP:
3077 		if (key_len == 5)
3078 			return RSN_CIPHER_SUITE_WEP40;
3079 		return RSN_CIPHER_SUITE_WEP104;
3080 	case WPA_ALG_TKIP:
3081 		return RSN_CIPHER_SUITE_TKIP;
3082 	case WPA_ALG_CCMP:
3083 		return RSN_CIPHER_SUITE_CCMP;
3084 	case WPA_ALG_GCMP:
3085 		return RSN_CIPHER_SUITE_GCMP;
3086 	case WPA_ALG_CCMP_256:
3087 		return RSN_CIPHER_SUITE_CCMP_256;
3088 	case WPA_ALG_GCMP_256:
3089 		return RSN_CIPHER_SUITE_GCMP_256;
3090 	case WPA_ALG_BIP_CMAC_128:
3091 		return RSN_CIPHER_SUITE_AES_128_CMAC;
3092 	case WPA_ALG_BIP_GMAC_128:
3093 		return RSN_CIPHER_SUITE_BIP_GMAC_128;
3094 	case WPA_ALG_BIP_GMAC_256:
3095 		return RSN_CIPHER_SUITE_BIP_GMAC_256;
3096 	case WPA_ALG_BIP_CMAC_256:
3097 		return RSN_CIPHER_SUITE_BIP_CMAC_256;
3098 	case WPA_ALG_SMS4:
3099 		return RSN_CIPHER_SUITE_SMS4;
3100 	case WPA_ALG_KRK:
3101 		return RSN_CIPHER_SUITE_KRK;
3102 	case WPA_ALG_NONE:
3103 		wpa_printf(MSG_ERROR, "nl80211: Unexpected encryption algorithm %d",
3104 			   alg);
3105 		return 0;
3106 	}
3107 
3108 	wpa_printf(MSG_ERROR, "nl80211: Unsupported encryption algorithm %d",
3109 		   alg);
3110 	return 0;
3111 }
3112 
3113 
wpa_cipher_to_cipher_suite(unsigned int cipher)3114 static u32 wpa_cipher_to_cipher_suite(unsigned int cipher)
3115 {
3116 	switch (cipher) {
3117 	case WPA_CIPHER_CCMP_256:
3118 		return RSN_CIPHER_SUITE_CCMP_256;
3119 	case WPA_CIPHER_GCMP_256:
3120 		return RSN_CIPHER_SUITE_GCMP_256;
3121 	case WPA_CIPHER_CCMP:
3122 		return RSN_CIPHER_SUITE_CCMP;
3123 	case WPA_CIPHER_GCMP:
3124 		return RSN_CIPHER_SUITE_GCMP;
3125 	case WPA_CIPHER_TKIP:
3126 		return RSN_CIPHER_SUITE_TKIP;
3127 	case WPA_CIPHER_WEP104:
3128 		return RSN_CIPHER_SUITE_WEP104;
3129 	case WPA_CIPHER_WEP40:
3130 		return RSN_CIPHER_SUITE_WEP40;
3131 	case WPA_CIPHER_GTK_NOT_USED:
3132 		return RSN_CIPHER_SUITE_NO_GROUP_ADDRESSED;
3133 	}
3134 
3135 	return 0;
3136 }
3137 
3138 
wpa_cipher_to_cipher_suites(unsigned int ciphers,u32 suites[],int max_suites)3139 static int wpa_cipher_to_cipher_suites(unsigned int ciphers, u32 suites[],
3140 				       int max_suites)
3141 {
3142 	int num_suites = 0;
3143 
3144 	if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP_256)
3145 		suites[num_suites++] = RSN_CIPHER_SUITE_CCMP_256;
3146 	if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP_256)
3147 		suites[num_suites++] = RSN_CIPHER_SUITE_GCMP_256;
3148 	if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP)
3149 		suites[num_suites++] = RSN_CIPHER_SUITE_CCMP;
3150 	if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP)
3151 		suites[num_suites++] = RSN_CIPHER_SUITE_GCMP;
3152 	if (num_suites < max_suites && ciphers & WPA_CIPHER_TKIP)
3153 		suites[num_suites++] = RSN_CIPHER_SUITE_TKIP;
3154 	if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP104)
3155 		suites[num_suites++] = RSN_CIPHER_SUITE_WEP104;
3156 	if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP40)
3157 		suites[num_suites++] = RSN_CIPHER_SUITE_WEP40;
3158 
3159 	return num_suites;
3160 }
3161 
3162 
wpa_key_mgmt_to_suites(unsigned int key_mgmt_suites,u32 suites[],int max_suites)3163 static int wpa_key_mgmt_to_suites(unsigned int key_mgmt_suites, u32 suites[],
3164 				  int max_suites)
3165 {
3166 	int num_suites = 0;
3167 
3168 #define __AKM(a, b) \
3169 	if (num_suites < max_suites && \
3170 	    (key_mgmt_suites & (WPA_KEY_MGMT_ ## a))) \
3171 		suites[num_suites++] = (RSN_AUTH_KEY_MGMT_ ## b)
3172 	__AKM(IEEE8021X, UNSPEC_802_1X);
3173 	__AKM(PSK, PSK_OVER_802_1X);
3174 	__AKM(FT_IEEE8021X, FT_802_1X);
3175 	__AKM(FT_PSK, FT_PSK);
3176 	__AKM(IEEE8021X_SHA256, 802_1X_SHA256);
3177 	__AKM(PSK_SHA256, PSK_SHA256);
3178 	__AKM(SAE, SAE);
3179 	__AKM(FT_SAE, FT_SAE);
3180 	__AKM(CCKM, CCKM);
3181 	__AKM(OSEN, OSEN);
3182 	__AKM(IEEE8021X_SUITE_B, 802_1X_SUITE_B);
3183 	__AKM(IEEE8021X_SUITE_B_192, 802_1X_SUITE_B_192);
3184 	__AKM(FILS_SHA256, FILS_SHA256);
3185 	__AKM(FILS_SHA384, FILS_SHA384);
3186 	__AKM(FT_FILS_SHA256, FT_FILS_SHA256);
3187 	__AKM(FT_FILS_SHA384, FT_FILS_SHA384);
3188 	__AKM(OWE, OWE);
3189 	__AKM(DPP, DPP);
3190 	__AKM(FT_IEEE8021X_SHA384, FT_802_1X_SHA384);
3191 #undef __AKM
3192 
3193 	return num_suites;
3194 }
3195 
3196 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
wpa_driver_do_broadcom_acs(struct wpa_driver_nl80211_data * drv,struct drv_acs_params * params)3197 static int wpa_driver_do_broadcom_acs(struct wpa_driver_nl80211_data *drv,
3198 				      struct drv_acs_params *params)
3199 {
3200 	struct nl_msg *msg;
3201 	struct nlattr *data;
3202 	int freq_list_len;
3203 	int ret = -1;
3204 
3205 	freq_list_len = int_array_len(params->freq_list);
3206 	wpa_printf(MSG_DEBUG, "%s: freq_list_len=%d",
3207 		    __func__, freq_list_len);
3208 
3209 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR);
3210 	if (!msg ||
3211 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
3212 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3213 			BRCM_VENDOR_SCMD_ACS) ||
3214 	    !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3215 	    nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_HW_MODE, params->hw_mode) ||
3216 	    nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_HT_ENABLED,
3217 		       params->ht_enabled) ||
3218 	    nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_HT40_ENABLED,
3219 		       params->ht40_enabled) ||
3220 		nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_VHT_ENABLED,
3221 		       params->vht_enabled) ||
3222 	    nla_put_u16(msg, BRCM_VENDOR_ATTR_ACS_CHWIDTH, params->ch_width) ||
3223 	    (freq_list_len > 0 &&
3224 	     nla_put(msg, BRCM_VENDOR_ATTR_ACS_FREQ_LIST,
3225 		     sizeof(int) * freq_list_len, params->freq_list)))
3226 		goto fail;
3227 	nla_nest_end(msg, data);
3228 
3229 	wpa_printf(MSG_DEBUG,
3230 		   "nl80211: ACS Params: HW_MODE: %d HT: %d HT40: %d VHT: %d BW: %d",
3231 		   params->hw_mode, params->ht_enabled, params->ht40_enabled,
3232 		   params->vht_enabled, params->ch_width);
3233 
3234 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3235 	if (ret) {
3236 		wpa_printf(MSG_ERROR,
3237 			   "nl80211: BRCM Failed to invoke driver ACS function: %s",
3238 			   strerror(errno));
3239 	}
3240 
3241 	msg = NULL;
3242 fail:
3243 	nlmsg_free(msg);
3244 	return ret;
3245 }
3246 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3247 
3248 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
wpa_cross_akm_key_mgmt_to_suites(unsigned int key_mgmt_suites,u32 suites[],int max_suites)3249 static int wpa_cross_akm_key_mgmt_to_suites(unsigned int key_mgmt_suites, u32 suites[],
3250                         int max_suites)
3251 {
3252     int num_suites = 0;
3253 
3254 #define __AKM_TO_SUITES_ARRAY(a, b) \
3255     if (num_suites < max_suites && \
3256         (key_mgmt_suites & (WPA_KEY_MGMT_ ## a))) \
3257         suites[num_suites++] = (RSN_AUTH_KEY_MGMT_ ## b)
3258     __AKM_TO_SUITES_ARRAY(PSK, PSK_OVER_802_1X);
3259     __AKM_TO_SUITES_ARRAY(SAE, SAE);
3260 #undef __AKM_TO_SUITES_ARRAY
3261 
3262     return num_suites;
3263 }
3264 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3265 
3266 #ifdef CONFIG_DRIVER_NL80211_QCA
issue_key_mgmt_set_key(struct wpa_driver_nl80211_data * drv,const u8 * key,size_t key_len)3267 static int issue_key_mgmt_set_key(struct wpa_driver_nl80211_data *drv,
3268 				  const u8 *key, size_t key_len)
3269 {
3270 	struct nl_msg *msg;
3271 	int ret;
3272 
3273 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_KEY_MGMT_OFFLOAD))
3274 		return 0;
3275 
3276 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
3277 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3278 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3279 			QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_SET_KEY) ||
3280 	    nla_put(msg, NL80211_ATTR_VENDOR_DATA, key_len, key)) {
3281 		nl80211_nlmsg_clear(msg);
3282 		nlmsg_free(msg);
3283 		return -1;
3284 	}
3285 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3286 	if (ret) {
3287 		wpa_printf(MSG_DEBUG,
3288 			   "nl80211: Key management set key failed: ret=%d (%s)",
3289 			   ret, strerror(-ret));
3290 	}
3291 
3292 	return ret;
3293 }
3294 #endif /* CONFIG_DRIVER_NL80211_QCA */
3295 
3296 
3297 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
key_mgmt_set_key(struct wpa_driver_nl80211_data * drv,const u8 * key,size_t key_len)3298 static int key_mgmt_set_key(struct wpa_driver_nl80211_data *drv,
3299 				  const u8 *key, size_t key_len)
3300 {
3301 	struct nl_msg *msg;
3302 	int ret;
3303 	struct nlattr *params;
3304 
3305 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
3306 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
3307 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3308 				BRCM_VENDOR_SCMD_SET_PMK) ||
3309           !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3310             nla_put(msg, BRCM_ATTR_DRIVER_KEY_PMK, key_len, key)) {
3311                 nl80211_nlmsg_clear(msg);
3312                 nlmsg_free(msg);
3313                 return -ENOBUFS;
3314 	}
3315 	nla_nest_end(msg, params);
3316 
3317 	ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1, NULL, NULL);
3318 	if (ret) {
3319 		wpa_printf(MSG_DEBUG, "nl80211: Key mgmt set key failed: ret=%d (%s)",
3320 			ret, strerror(-ret));
3321 	}
3322 
3323 	return ret;
3324 }
3325 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3326 
3327 
nl80211_set_pmk(struct wpa_driver_nl80211_data * drv,const u8 * key,size_t key_len,const u8 * addr)3328 static int nl80211_set_pmk(struct wpa_driver_nl80211_data *drv,
3329 			   const u8 *key, size_t key_len,
3330 			   const u8 *addr)
3331 {
3332 	struct nl_msg *msg = NULL;
3333 	int ret;
3334 
3335 	/*
3336 	 * If the authenticator address is not set, assume it is
3337 	 * the current BSSID.
3338 	 */
3339 	if (!addr && drv->associated)
3340 		addr = drv->bssid;
3341 	else if (!addr)
3342 		return -1;
3343 
3344 	wpa_printf(MSG_DEBUG, "nl80211: Set PMK to the driver for " MACSTR,
3345 		   MAC2STR(addr));
3346 	wpa_hexdump_key(MSG_DEBUG, "nl80211: PMK", key, key_len);
3347 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_PMK);
3348 	if (!msg ||
3349 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
3350 	    nla_put(msg, NL80211_ATTR_PMK, key_len, key)) {
3351 		nl80211_nlmsg_clear(msg);
3352 		nlmsg_free(msg);
3353 		return -ENOBUFS;
3354 	}
3355 
3356 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3357 	if (ret) {
3358 		wpa_printf(MSG_DEBUG, "nl80211: Set PMK failed: ret=%d (%s)",
3359 			   ret, strerror(-ret));
3360 	}
3361 
3362 	return ret;
3363 }
3364 
3365 
wpa_driver_nl80211_set_key(struct i802_bss * bss,struct wpa_driver_set_key_params * params)3366 static int wpa_driver_nl80211_set_key(struct i802_bss *bss,
3367 				      struct wpa_driver_set_key_params *params)
3368 {
3369 	struct wpa_driver_nl80211_data *drv = bss->drv;
3370 	int ifindex;
3371 	struct nl_msg *msg;
3372 	struct nl_msg *key_msg;
3373 	int ret;
3374 	int skip_set_key = 1;
3375 	const char *ifname = params->ifname;
3376 	enum wpa_alg alg = params->alg;
3377 	const u8 *addr = params->addr;
3378 	int key_idx = params->key_idx;
3379 	int set_tx = params->set_tx;
3380 	const u8 *seq = params->seq;
3381 	size_t seq_len = params->seq_len;
3382 	const u8 *key = params->key;
3383 	size_t key_len = params->key_len;
3384 	int vlan_id = params->vlan_id;
3385 	enum key_flag key_flag = params->key_flag;
3386 
3387 	/* Ignore for P2P Device */
3388 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
3389 		return 0;
3390 
3391 	ifindex = if_nametoindex(ifname);
3392 	wpa_printf(MSG_DEBUG, "%s: ifindex=%d (%s) alg=%d addr=%p key_idx=%d "
3393 		   "set_tx=%d seq_len=%lu key_len=%lu key_flag=0x%x",
3394 		   __func__, ifindex, ifname, alg, addr, key_idx, set_tx,
3395 		   (unsigned long) seq_len, (unsigned long) key_len, key_flag);
3396 
3397 	if (check_key_flag(key_flag)) {
3398 		wpa_printf(MSG_DEBUG, "%s: invalid key_flag", __func__);
3399 		return -EINVAL;
3400 	}
3401 
3402 #ifdef CONFIG_DRIVER_NL80211_QCA
3403 	if ((key_flag & KEY_FLAG_PMK) &&
3404 	    (drv->capa.flags & WPA_DRIVER_FLAGS_KEY_MGMT_OFFLOAD)) {
3405 		wpa_printf(MSG_DEBUG, "%s: calling issue_key_mgmt_set_key",
3406 			   __func__);
3407 		ret = issue_key_mgmt_set_key(drv, key, key_len);
3408 		return ret;
3409 	}
3410 #endif /* CONFIG_DRIVER_NL80211_QCA */
3411 
3412 	if (key_flag & KEY_FLAG_PMK) {
3413 		if (drv->capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_8021X)
3414 			return nl80211_set_pmk(drv, key, key_len, addr);
3415 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
3416 		if (drv->vendor_set_pmk) {
3417 			wpa_printf(MSG_INFO, "nl80211: key_mgmt_set_key with key_len %lu", (unsigned long) key_len);
3418 			return key_mgmt_set_key(drv, key, key_len);
3419 		}
3420 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3421 
3422 		/* The driver does not have any offload mechanism for PMK, so
3423 		 * there is no need to configure this key. */
3424 		return 0;
3425 	}
3426 
3427 	ret = -ENOBUFS;
3428 	key_msg = nlmsg_alloc();
3429 	if (!key_msg)
3430 		return ret;
3431 
3432 	if ((key_flag & KEY_FLAG_PAIRWISE_MASK) ==
3433 	    KEY_FLAG_PAIRWISE_RX_TX_MODIFY) {
3434 		wpa_printf(MSG_DEBUG,
3435 			   "nl80211: SET_KEY (pairwise RX/TX modify)");
3436 		msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_SET_KEY);
3437 		if (!msg)
3438 			goto fail2;
3439 	} else if (alg == WPA_ALG_NONE && (key_flag & KEY_FLAG_RX_TX)) {
3440 		wpa_printf(MSG_DEBUG, "%s: invalid key_flag to delete key",
3441 			   __func__);
3442 		ret = -EINVAL;
3443 		goto fail2;
3444 	} else if (alg == WPA_ALG_NONE) {
3445 		wpa_printf(MSG_DEBUG, "nl80211: DEL_KEY");
3446 		msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_DEL_KEY);
3447 		if (!msg)
3448 			goto fail2;
3449 	} else {
3450 		u32 suite;
3451 
3452 		suite = wpa_alg_to_cipher_suite(alg, key_len);
3453 		if (!suite) {
3454 			ret = -EINVAL;
3455 			goto fail2;
3456 		}
3457 		wpa_printf(MSG_DEBUG, "nl80211: NEW_KEY");
3458 		msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_NEW_KEY);
3459 		if (!msg)
3460 			goto fail2;
3461 		if (nla_put(key_msg, NL80211_KEY_DATA, key_len, key) ||
3462 		    nla_put_u32(key_msg, NL80211_KEY_CIPHER, suite))
3463 			goto fail;
3464 		wpa_hexdump_key(MSG_DEBUG, "nl80211: KEY_DATA", key, key_len);
3465 
3466 		if (seq && seq_len) {
3467 			if (nla_put(key_msg, NL80211_KEY_SEQ, seq_len, seq))
3468 				goto fail;
3469 			wpa_hexdump(MSG_DEBUG, "nl80211: KEY_SEQ",
3470 				    seq, seq_len);
3471 		}
3472 	}
3473 
3474 	if (addr && !is_broadcast_ether_addr(addr)) {
3475 		wpa_printf(MSG_DEBUG, "   addr=" MACSTR, MAC2STR(addr));
3476 		if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
3477 			goto fail;
3478 
3479 		if ((key_flag & KEY_FLAG_PAIRWISE_MASK) ==
3480 		    KEY_FLAG_PAIRWISE_RX ||
3481 		    (key_flag & KEY_FLAG_PAIRWISE_MASK) ==
3482 		    KEY_FLAG_PAIRWISE_RX_TX_MODIFY) {
3483 			if (nla_put_u8(key_msg, NL80211_KEY_MODE,
3484 				       key_flag == KEY_FLAG_PAIRWISE_RX ?
3485 				       NL80211_KEY_NO_TX : NL80211_KEY_SET_TX))
3486 				goto fail;
3487 		} else if ((key_flag & KEY_FLAG_GROUP_MASK) ==
3488 			   KEY_FLAG_GROUP_RX) {
3489 			wpa_printf(MSG_DEBUG, "   RSN IBSS RX GTK");
3490 			if (nla_put_u32(key_msg, NL80211_KEY_TYPE,
3491 					NL80211_KEYTYPE_GROUP))
3492 				goto fail;
3493 		} else if (!(key_flag & KEY_FLAG_PAIRWISE)) {
3494 			wpa_printf(MSG_DEBUG,
3495 				   "   key_flag missing PAIRWISE when setting a pairwise key");
3496 			ret = -EINVAL;
3497 			goto fail;
3498 		} else if (alg == WPA_ALG_WEP &&
3499 			   (key_flag & KEY_FLAG_RX_TX) == KEY_FLAG_RX_TX) {
3500 			wpa_printf(MSG_DEBUG, "   unicast WEP key");
3501 			skip_set_key = 0;
3502 		} else {
3503 			wpa_printf(MSG_DEBUG, "   pairwise key");
3504 		}
3505 	} else if ((key_flag & KEY_FLAG_PAIRWISE) ||
3506 		   !(key_flag & KEY_FLAG_GROUP)) {
3507 		wpa_printf(MSG_DEBUG,
3508 			   "   invalid key_flag for a broadcast key");
3509 		ret = -EINVAL;
3510 		goto fail;
3511 	} else {
3512 		wpa_printf(MSG_DEBUG, "   broadcast key");
3513 		if (key_flag & KEY_FLAG_DEFAULT)
3514 			skip_set_key = 0;
3515 	}
3516 	if (nla_put_u8(key_msg, NL80211_KEY_IDX, key_idx) ||
3517 	    nla_put_nested(msg, NL80211_ATTR_KEY, key_msg))
3518 		goto fail;
3519 	nl80211_nlmsg_clear(key_msg);
3520 	nlmsg_free(key_msg);
3521 	key_msg = NULL;
3522 
3523 	if (vlan_id && (drv->capa.flags & WPA_DRIVER_FLAGS_VLAN_OFFLOAD)) {
3524 		wpa_printf(MSG_DEBUG, "nl80211: VLAN ID %d", vlan_id);
3525 		if (nla_put_u16(msg, NL80211_ATTR_VLAN_ID, vlan_id))
3526 			goto fail;
3527 	}
3528 
3529 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3530 	if ((ret == -ENOENT || ret == -ENOLINK) && alg == WPA_ALG_NONE)
3531 		ret = 0;
3532 	if (ret)
3533 		wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d %s",
3534 			   ret, strerror(-ret));
3535 
3536 	/*
3537 	 * If we failed or don't need to set the key as default (below),
3538 	 * we're done here.
3539 	 */
3540 	if (ret || skip_set_key)
3541 		return ret;
3542 	wpa_printf(MSG_DEBUG, "nl80211: NL80211_CMD_SET_KEY - default key");
3543 
3544 	ret = -ENOBUFS;
3545 	key_msg = nlmsg_alloc();
3546 	if (!key_msg)
3547 		return ret;
3548 
3549 	msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_SET_KEY);
3550 	if (!msg)
3551 		goto fail2;
3552 	if (!key_msg ||
3553 	    nla_put_u8(key_msg, NL80211_KEY_IDX, key_idx) ||
3554 	    nla_put_flag(key_msg, wpa_alg_bip(alg) ?
3555 			 (key_idx == 6 || key_idx == 7 ?
3556 			  NL80211_KEY_DEFAULT_BEACON :
3557 			  NL80211_KEY_DEFAULT_MGMT) :
3558 			 NL80211_KEY_DEFAULT))
3559 		goto fail;
3560 	if (addr && is_broadcast_ether_addr(addr)) {
3561 		struct nlattr *types;
3562 
3563 		types = nla_nest_start(key_msg, NL80211_KEY_DEFAULT_TYPES);
3564 		if (!types ||
3565 		    nla_put_flag(key_msg, NL80211_KEY_DEFAULT_TYPE_MULTICAST))
3566 			goto fail;
3567 		nla_nest_end(key_msg, types);
3568 	} else if (addr) {
3569 		struct nlattr *types;
3570 
3571 		types = nla_nest_start(key_msg, NL80211_KEY_DEFAULT_TYPES);
3572 		if (!types ||
3573 		    nla_put_flag(key_msg, NL80211_KEY_DEFAULT_TYPE_UNICAST))
3574 			goto fail;
3575 		nla_nest_end(key_msg, types);
3576 	}
3577 
3578 	if (nla_put_nested(msg, NL80211_ATTR_KEY, key_msg))
3579 		goto fail;
3580 	nl80211_nlmsg_clear(key_msg);
3581 	nlmsg_free(key_msg);
3582 	key_msg = NULL;
3583 
3584 	if (vlan_id && (drv->capa.flags & WPA_DRIVER_FLAGS_VLAN_OFFLOAD)) {
3585 		wpa_printf(MSG_DEBUG, "nl80211: set_key default - VLAN ID %d",
3586 			   vlan_id);
3587 		if (nla_put_u16(msg, NL80211_ATTR_VLAN_ID, vlan_id))
3588 			goto fail;
3589 	}
3590 
3591 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3592 	if (ret)
3593 		wpa_printf(MSG_DEBUG,
3594 			   "nl80211: set_key default failed; err=%d %s",
3595 			   ret, strerror(-ret));
3596 	return ret;
3597 
3598 fail:
3599 	nl80211_nlmsg_clear(msg);
3600 	nlmsg_free(msg);
3601 fail2:
3602 	nl80211_nlmsg_clear(key_msg);
3603 	nlmsg_free(key_msg);
3604 	return ret;
3605 }
3606 
3607 
nl_add_key(struct nl_msg * msg,enum wpa_alg alg,int key_idx,int defkey,const u8 * seq,size_t seq_len,const u8 * key,size_t key_len)3608 static int nl_add_key(struct nl_msg *msg, enum wpa_alg alg,
3609 		      int key_idx, int defkey,
3610 		      const u8 *seq, size_t seq_len,
3611 		      const u8 *key, size_t key_len)
3612 {
3613 	struct nlattr *key_attr = nla_nest_start(msg, NL80211_ATTR_KEY);
3614 	u32 suite;
3615 
3616 	if (!key_attr)
3617 		return -1;
3618 
3619 	suite = wpa_alg_to_cipher_suite(alg, key_len);
3620 	if (!suite)
3621 		return -1;
3622 
3623 	if (defkey && wpa_alg_bip(alg)) {
3624 		if (nla_put_flag(msg, NL80211_KEY_DEFAULT_MGMT))
3625 			return -1;
3626 	} else if (defkey) {
3627 		if (nla_put_flag(msg, NL80211_KEY_DEFAULT))
3628 			return -1;
3629 	}
3630 
3631 	if (nla_put_u8(msg, NL80211_KEY_IDX, key_idx) ||
3632 	    nla_put_u32(msg, NL80211_KEY_CIPHER, suite) ||
3633 	    (seq && seq_len &&
3634 	     nla_put(msg, NL80211_KEY_SEQ, seq_len, seq)) ||
3635 	    nla_put(msg, NL80211_KEY_DATA, key_len, key))
3636 		return -1;
3637 
3638 	nla_nest_end(msg, key_attr);
3639 
3640 	return 0;
3641 }
3642 
3643 
nl80211_set_conn_keys(struct wpa_driver_associate_params * params,struct nl_msg * msg)3644 static int nl80211_set_conn_keys(struct wpa_driver_associate_params *params,
3645 				 struct nl_msg *msg)
3646 {
3647 	int i, privacy = 0;
3648 	struct nlattr *nl_keys, *nl_key;
3649 
3650 	for (i = 0; i < 4; i++) {
3651 		if (!params->wep_key[i])
3652 			continue;
3653 		privacy = 1;
3654 		break;
3655 	}
3656 	if (params->wps == WPS_MODE_PRIVACY)
3657 		privacy = 1;
3658 	if (params->pairwise_suite &&
3659 	    params->pairwise_suite != WPA_CIPHER_NONE)
3660 		privacy = 1;
3661 
3662 	if (!privacy)
3663 		return 0;
3664 
3665 	if (nla_put_flag(msg, NL80211_ATTR_PRIVACY))
3666 		return -ENOBUFS;
3667 
3668 	nl_keys = nla_nest_start(msg, NL80211_ATTR_KEYS);
3669 	if (!nl_keys)
3670 		return -ENOBUFS;
3671 
3672 	for (i = 0; i < 4; i++) {
3673 		if (!params->wep_key[i])
3674 			continue;
3675 
3676 		nl_key = nla_nest_start(msg, i);
3677 		if (!nl_key ||
3678 		    nla_put(msg, NL80211_KEY_DATA, params->wep_key_len[i],
3679 			    params->wep_key[i]) ||
3680 		    nla_put_u32(msg, NL80211_KEY_CIPHER,
3681 				params->wep_key_len[i] == 5 ?
3682 				RSN_CIPHER_SUITE_WEP40 :
3683 				RSN_CIPHER_SUITE_WEP104) ||
3684 		    nla_put_u8(msg, NL80211_KEY_IDX, i) ||
3685 		    (i == params->wep_tx_keyidx &&
3686 		     nla_put_flag(msg, NL80211_KEY_DEFAULT)))
3687 			return -ENOBUFS;
3688 
3689 		nla_nest_end(msg, nl_key);
3690 	}
3691 	nla_nest_end(msg, nl_keys);
3692 
3693 	return 0;
3694 }
3695 
3696 
wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data * drv,const u8 * addr,int cmd,u16 reason_code,int local_state_change,struct i802_bss * bss)3697 int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
3698 			    const u8 *addr, int cmd, u16 reason_code,
3699 			    int local_state_change,
3700 			    struct i802_bss *bss)
3701 {
3702 	int ret;
3703 	struct nl_msg *msg;
3704 	struct nl_sock *nl_connect = get_connect_handle(bss);
3705 
3706 	if (!(msg = nl80211_drv_msg(drv, 0, cmd)) ||
3707 	    nla_put_u16(msg, NL80211_ATTR_REASON_CODE, reason_code) ||
3708 	    (addr && nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) ||
3709 	    (local_state_change &&
3710 	     nla_put_flag(msg, NL80211_ATTR_LOCAL_STATE_CHANGE))) {
3711 		nlmsg_free(msg);
3712 		return -1;
3713 	}
3714 
3715 	if (nl_connect)
3716 		ret = send_and_recv(drv->global, nl_connect, msg,
3717 				    process_bss_event, bss, NULL, NULL);
3718 	else
3719 		ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3720 	if (ret) {
3721 		wpa_dbg(drv->ctx, MSG_DEBUG,
3722 			"nl80211: MLME command failed: reason=%u ret=%d (%s)",
3723 			reason_code, ret, strerror(-ret));
3724 	}
3725 	return ret;
3726 }
3727 
3728 
wpa_driver_nl80211_disconnect(struct wpa_driver_nl80211_data * drv,u16 reason_code,struct i802_bss * bss)3729 static int wpa_driver_nl80211_disconnect(struct wpa_driver_nl80211_data *drv,
3730 					 u16 reason_code,
3731 					 struct i802_bss *bss)
3732 {
3733 	int ret;
3734 	int drv_associated = drv->associated;
3735 
3736 	wpa_printf(MSG_DEBUG, "%s(reason_code=%d)", __func__, reason_code);
3737 	nl80211_mark_disconnected(drv);
3738 	/* Disconnect command doesn't need BSSID - it uses cached value */
3739 	ret = wpa_driver_nl80211_mlme(drv, NULL, NL80211_CMD_DISCONNECT,
3740 				      reason_code, 0, bss);
3741 	/*
3742 	 * For locally generated disconnect, supplicant already generates a
3743 	 * DEAUTH event, so ignore the event from NL80211.
3744 	 */
3745 	drv->ignore_next_local_disconnect = drv_associated && (ret == 0);
3746 
3747 	return ret;
3748 }
3749 
3750 
wpa_driver_nl80211_deauthenticate(struct i802_bss * bss,const u8 * addr,u16 reason_code)3751 static int wpa_driver_nl80211_deauthenticate(struct i802_bss *bss,
3752 					     const u8 *addr, u16 reason_code)
3753 {
3754 	struct wpa_driver_nl80211_data *drv = bss->drv;
3755 	int ret;
3756 	int drv_associated = drv->associated;
3757 
3758 	if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
3759 		nl80211_mark_disconnected(drv);
3760 		return nl80211_leave_ibss(drv, 1);
3761 	}
3762 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
3763 		return wpa_driver_nl80211_disconnect(drv, reason_code, bss);
3764 	}
3765 	wpa_printf(MSG_DEBUG, "%s(addr=" MACSTR " reason_code=%d)",
3766 		   __func__, MAC2STR(addr), reason_code);
3767 	nl80211_mark_disconnected(drv);
3768 	ret = wpa_driver_nl80211_mlme(drv, addr, NL80211_CMD_DEAUTHENTICATE,
3769 				      reason_code, 0, bss);
3770 	/*
3771 	 * For locally generated deauthenticate, supplicant already generates a
3772 	 * DEAUTH event, so ignore the event from NL80211.
3773 	 */
3774 	drv->ignore_next_local_deauth = drv_associated && (ret == 0);
3775 
3776 	return ret;
3777 }
3778 
3779 
nl80211_copy_auth_params(struct wpa_driver_nl80211_data * drv,struct wpa_driver_auth_params * params)3780 static void nl80211_copy_auth_params(struct wpa_driver_nl80211_data *drv,
3781 				     struct wpa_driver_auth_params *params)
3782 {
3783 	int i;
3784 
3785 	drv->auth_freq = params->freq;
3786 	drv->auth_alg = params->auth_alg;
3787 	drv->auth_wep_tx_keyidx = params->wep_tx_keyidx;
3788 	drv->auth_local_state_change = params->local_state_change;
3789 	drv->auth_p2p = params->p2p;
3790 
3791 	if (params->bssid)
3792 		os_memcpy(drv->auth_bssid_, params->bssid, ETH_ALEN);
3793 	else
3794 		os_memset(drv->auth_bssid_, 0, ETH_ALEN);
3795 
3796 	if (params->ssid) {
3797 		os_memcpy(drv->auth_ssid, params->ssid, params->ssid_len);
3798 		drv->auth_ssid_len = params->ssid_len;
3799 	} else
3800 		drv->auth_ssid_len = 0;
3801 
3802 
3803 	os_free(drv->auth_ie);
3804 	drv->auth_ie = NULL;
3805 	drv->auth_ie_len = 0;
3806 	if (params->ie) {
3807 		drv->auth_ie = os_malloc(params->ie_len);
3808 		if (drv->auth_ie) {
3809 			os_memcpy(drv->auth_ie, params->ie, params->ie_len);
3810 			drv->auth_ie_len = params->ie_len;
3811 		}
3812 	}
3813 
3814 	os_free(drv->auth_data);
3815 	drv->auth_data = NULL;
3816 	drv->auth_data_len = 0;
3817 	if (params->auth_data) {
3818 		drv->auth_data = os_memdup(params->auth_data,
3819 					   params->auth_data_len);
3820 		if (drv->auth_data)
3821 			drv->auth_data_len = params->auth_data_len;
3822 	}
3823 
3824 	for (i = 0; i < 4; i++) {
3825 		if (params->wep_key[i] && params->wep_key_len[i] &&
3826 		    params->wep_key_len[i] <= 16) {
3827 			os_memcpy(drv->auth_wep_key[i], params->wep_key[i],
3828 				  params->wep_key_len[i]);
3829 			drv->auth_wep_key_len[i] = params->wep_key_len[i];
3830 		} else
3831 			drv->auth_wep_key_len[i] = 0;
3832 	}
3833 }
3834 
3835 
nl80211_unmask_11b_rates(struct i802_bss * bss)3836 static void nl80211_unmask_11b_rates(struct i802_bss *bss)
3837 {
3838 	struct wpa_driver_nl80211_data *drv = bss->drv;
3839 
3840 	if (is_p2p_net_interface(drv->nlmode) || !drv->disabled_11b_rates)
3841 		return;
3842 
3843 	/*
3844 	 * Looks like we failed to unmask 11b rates previously. This could
3845 	 * happen, e.g., if the interface was down at the point in time when a
3846 	 * P2P group was terminated.
3847 	 */
3848 	wpa_printf(MSG_DEBUG,
3849 		   "nl80211: Interface %s mode is for non-P2P, but 11b rates were disabled - re-enable them",
3850 		   bss->ifname);
3851 	nl80211_disable_11b_rates(drv, drv->ifindex, 0);
3852 }
3853 
3854 
get_nl_auth_type(int wpa_auth_alg)3855 static enum nl80211_auth_type get_nl_auth_type(int wpa_auth_alg)
3856 {
3857 	if (wpa_auth_alg & WPA_AUTH_ALG_OPEN)
3858 		return NL80211_AUTHTYPE_OPEN_SYSTEM;
3859 	if (wpa_auth_alg & WPA_AUTH_ALG_SHARED)
3860 		return NL80211_AUTHTYPE_SHARED_KEY;
3861 	if (wpa_auth_alg & WPA_AUTH_ALG_LEAP)
3862 		return NL80211_AUTHTYPE_NETWORK_EAP;
3863 	if (wpa_auth_alg & WPA_AUTH_ALG_FT)
3864 		return NL80211_AUTHTYPE_FT;
3865 	if (wpa_auth_alg & WPA_AUTH_ALG_SAE)
3866 		return NL80211_AUTHTYPE_SAE;
3867 	if (wpa_auth_alg & WPA_AUTH_ALG_FILS)
3868 		return NL80211_AUTHTYPE_FILS_SK;
3869 	if (wpa_auth_alg & WPA_AUTH_ALG_FILS_SK_PFS)
3870 		return NL80211_AUTHTYPE_FILS_SK_PFS;
3871 
3872 	return NL80211_AUTHTYPE_MAX;
3873 }
3874 
3875 
wpa_driver_nl80211_authenticate(struct i802_bss * bss,struct wpa_driver_auth_params * params)3876 static int wpa_driver_nl80211_authenticate(
3877 	struct i802_bss *bss, struct wpa_driver_auth_params *params)
3878 {
3879 	struct wpa_driver_nl80211_data *drv = bss->drv;
3880 	int ret = -1, i;
3881 	struct nl_msg *msg;
3882 	enum nl80211_auth_type type;
3883 	enum nl80211_iftype nlmode;
3884 	int count = 0;
3885 	int is_retry;
3886 	struct wpa_driver_set_key_params p;
3887 
3888 	nl80211_unmask_11b_rates(bss);
3889 
3890 	is_retry = drv->retry_auth;
3891 	drv->retry_auth = 0;
3892 	drv->ignore_deauth_event = 0;
3893 
3894 	nl80211_mark_disconnected(drv);
3895 	os_memset(drv->auth_bssid, 0, ETH_ALEN);
3896 	if (params->bssid)
3897 		os_memcpy(drv->auth_attempt_bssid, params->bssid, ETH_ALEN);
3898 	else
3899 		os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
3900 	/* FIX: IBSS mode */
3901 	nlmode = params->p2p ?
3902 		NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
3903 	if (drv->nlmode != nlmode &&
3904 	    wpa_driver_nl80211_set_mode(bss, nlmode) < 0)
3905 		return -1;
3906 
3907 retry:
3908 	wpa_printf(MSG_DEBUG, "nl80211: Authenticate (ifindex=%d)",
3909 		   drv->ifindex);
3910 
3911 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_AUTHENTICATE);
3912 	if (!msg)
3913 		goto fail;
3914 
3915 	os_memset(&p, 0, sizeof(p));
3916 	p.ifname = bss->ifname;
3917 	p.alg = WPA_ALG_WEP;
3918 	for (i = 0; i < 4; i++) {
3919 		if (!params->wep_key[i])
3920 			continue;
3921 		p.key_idx = i;
3922 		p.set_tx = i == params->wep_tx_keyidx;
3923 		p.key = params->wep_key[i];
3924 		p.key_len = params->wep_key_len[i];
3925 		p.key_flag = i == params->wep_tx_keyidx ?
3926 			KEY_FLAG_GROUP_RX_TX_DEFAULT :
3927 			KEY_FLAG_GROUP_RX_TX;
3928 		wpa_driver_nl80211_set_key(bss, &p);
3929 		if (params->wep_tx_keyidx != i)
3930 			continue;
3931 		if (nl_add_key(msg, WPA_ALG_WEP, i, 1, NULL, 0,
3932 			       params->wep_key[i], params->wep_key_len[i]))
3933 			goto fail;
3934 	}
3935 
3936 	if (params->bssid) {
3937 		wpa_printf(MSG_DEBUG, "  * bssid=" MACSTR,
3938 			   MAC2STR(params->bssid));
3939 		if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
3940 			goto fail;
3941 	}
3942 	if (params->freq) {
3943 		wpa_printf(MSG_DEBUG, "  * freq=%d", params->freq);
3944 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq))
3945 			goto fail;
3946 	}
3947 	if (params->ssid) {
3948 		wpa_printf(MSG_DEBUG, "  * SSID=%s",
3949 			   wpa_ssid_txt(params->ssid, params->ssid_len));
3950 		if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len,
3951 			    params->ssid))
3952 			goto fail;
3953 	}
3954 	wpa_hexdump(MSG_DEBUG, "  * IEs", params->ie, params->ie_len);
3955 	if (params->ie &&
3956 	    nla_put(msg, NL80211_ATTR_IE, params->ie_len, params->ie))
3957 		goto fail;
3958 	if (params->auth_data) {
3959 		wpa_hexdump(MSG_DEBUG, "  * auth_data", params->auth_data,
3960 			    params->auth_data_len);
3961 		if (nla_put(msg, NL80211_ATTR_SAE_DATA, params->auth_data_len,
3962 			    params->auth_data))
3963 			goto fail;
3964 	}
3965 	type = get_nl_auth_type(params->auth_alg);
3966 	wpa_printf(MSG_DEBUG, "  * Auth Type %d", type);
3967 	if (type == NL80211_AUTHTYPE_MAX ||
3968 	    nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
3969 		goto fail;
3970 	if (params->local_state_change) {
3971 		wpa_printf(MSG_DEBUG, "  * Local state change only");
3972 		if (nla_put_flag(msg, NL80211_ATTR_LOCAL_STATE_CHANGE))
3973 			goto fail;
3974 	}
3975 
3976 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3977 	msg = NULL;
3978 	if (ret) {
3979 		wpa_dbg(drv->ctx, MSG_DEBUG,
3980 			"nl80211: MLME command failed (auth): count=%d ret=%d (%s)",
3981 			count, ret, strerror(-ret));
3982 		count++;
3983 		if ((ret == -EALREADY || ret == -EEXIST) && count == 1 &&
3984 		    params->bssid && !params->local_state_change) {
3985 			/*
3986 			 * mac80211 does not currently accept new
3987 			 * authentication if we are already authenticated. As a
3988 			 * workaround, force deauthentication and try again.
3989 			 */
3990 			wpa_printf(MSG_DEBUG, "nl80211: Retry authentication "
3991 				   "after forced deauthentication");
3992 			drv->ignore_deauth_event = 1;
3993 			wpa_driver_nl80211_deauthenticate(
3994 				bss, params->bssid,
3995 				WLAN_REASON_PREV_AUTH_NOT_VALID);
3996 			nlmsg_free(msg);
3997 			goto retry;
3998 		}
3999 
4000 		if (ret == -ENOENT && params->freq && !is_retry) {
4001 			/*
4002 			 * cfg80211 has likely expired the BSS entry even
4003 			 * though it was previously available in our internal
4004 			 * BSS table. To recover quickly, start a single
4005 			 * channel scan on the specified channel.
4006 			 */
4007 			struct wpa_driver_scan_params scan;
4008 			int freqs[2];
4009 
4010 			os_memset(&scan, 0, sizeof(scan));
4011 			scan.num_ssids = 1;
4012 			if (params->ssid) {
4013 				scan.ssids[0].ssid = params->ssid;
4014 				scan.ssids[0].ssid_len = params->ssid_len;
4015 			}
4016 			freqs[0] = params->freq;
4017 			freqs[1] = 0;
4018 			scan.freqs = freqs;
4019 			wpa_printf(MSG_DEBUG, "nl80211: Trigger single "
4020 				   "channel scan to refresh cfg80211 BSS "
4021 				   "entry");
4022 			ret = wpa_driver_nl80211_scan(bss, &scan);
4023 			if (ret == 0) {
4024 				nl80211_copy_auth_params(drv, params);
4025 				drv->scan_for_auth = 1;
4026 			}
4027 		} else if (is_retry) {
4028 			/*
4029 			 * Need to indicate this with an event since the return
4030 			 * value from the retry is not delivered to core code.
4031 			 */
4032 			union wpa_event_data event;
4033 			wpa_printf(MSG_DEBUG, "nl80211: Authentication retry "
4034 				   "failed");
4035 			os_memset(&event, 0, sizeof(event));
4036 			os_memcpy(event.timeout_event.addr, drv->auth_bssid_,
4037 				  ETH_ALEN);
4038 			wpa_supplicant_event(drv->ctx, EVENT_AUTH_TIMED_OUT,
4039 					     &event);
4040 		}
4041 	} else {
4042 		wpa_printf(MSG_DEBUG,
4043 			   "nl80211: Authentication request send successfully");
4044 	}
4045 
4046 fail:
4047 	nlmsg_free(msg);
4048 	return ret;
4049 }
4050 
4051 
wpa_driver_nl80211_authenticate_retry(struct wpa_driver_nl80211_data * drv)4052 int wpa_driver_nl80211_authenticate_retry(struct wpa_driver_nl80211_data *drv)
4053 {
4054 	struct wpa_driver_auth_params params;
4055 	struct i802_bss *bss = drv->first_bss;
4056 	int i;
4057 
4058 	wpa_printf(MSG_DEBUG, "nl80211: Try to authenticate again");
4059 
4060 	os_memset(&params, 0, sizeof(params));
4061 	params.freq = drv->auth_freq;
4062 	params.auth_alg = drv->auth_alg;
4063 	params.wep_tx_keyidx = drv->auth_wep_tx_keyidx;
4064 	params.local_state_change = drv->auth_local_state_change;
4065 	params.p2p = drv->auth_p2p;
4066 
4067 	if (!is_zero_ether_addr(drv->auth_bssid_))
4068 		params.bssid = drv->auth_bssid_;
4069 
4070 	if (drv->auth_ssid_len) {
4071 		params.ssid = drv->auth_ssid;
4072 		params.ssid_len = drv->auth_ssid_len;
4073 	}
4074 
4075 	params.ie = drv->auth_ie;
4076 	params.ie_len = drv->auth_ie_len;
4077 	params.auth_data = drv->auth_data;
4078 	params.auth_data_len = drv->auth_data_len;
4079 
4080 	for (i = 0; i < 4; i++) {
4081 		if (drv->auth_wep_key_len[i]) {
4082 			params.wep_key[i] = drv->auth_wep_key[i];
4083 			params.wep_key_len[i] = drv->auth_wep_key_len[i];
4084 		}
4085 	}
4086 
4087 	drv->retry_auth = 1;
4088 	return wpa_driver_nl80211_authenticate(bss, &params);
4089 }
4090 
4091 
wpa_driver_nl80211_send_mlme(struct i802_bss * bss,const u8 * data,size_t data_len,int noack,unsigned int freq,int no_cck,int offchanok,unsigned int wait_time,const u16 * csa_offs,size_t csa_offs_len,int no_encrypt)4092 static int wpa_driver_nl80211_send_mlme(struct i802_bss *bss, const u8 *data,
4093 					size_t data_len, int noack,
4094 					unsigned int freq, int no_cck,
4095 					int offchanok,
4096 					unsigned int wait_time,
4097 					const u16 *csa_offs,
4098 					size_t csa_offs_len, int no_encrypt)
4099 {
4100 	struct wpa_driver_nl80211_data *drv = bss->drv;
4101 	struct ieee80211_mgmt *mgmt;
4102 	int encrypt = !no_encrypt;
4103 	u16 fc;
4104 	int use_cookie = 1;
4105 	int res;
4106 
4107 	mgmt = (struct ieee80211_mgmt *) data;
4108 	fc = le_to_host16(mgmt->frame_control);
4109 	wpa_printf(MSG_DEBUG, "nl80211: send_mlme - da=" MACSTR
4110 		   " noack=%d freq=%u no_cck=%d offchanok=%d wait_time=%u no_encrypt=%d fc=0x%x (%s) nlmode=%d",
4111 		   MAC2STR(mgmt->da), noack, freq, no_cck, offchanok, wait_time,
4112 		   no_encrypt, fc, fc2str(fc), drv->nlmode);
4113 
4114 	if ((is_sta_interface(drv->nlmode) ||
4115 	     drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) &&
4116 	    WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4117 	    WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_RESP) {
4118 		/*
4119 		 * The use of last_mgmt_freq is a bit of a hack,
4120 		 * but it works due to the single-threaded nature
4121 		 * of wpa_supplicant.
4122 		 */
4123 		if (freq == 0) {
4124 			wpa_printf(MSG_DEBUG, "nl80211: Use last_mgmt_freq=%d",
4125 				   drv->last_mgmt_freq);
4126 			freq = drv->last_mgmt_freq;
4127 		}
4128 		wait_time = 0;
4129 		use_cookie = 0;
4130 		no_cck = 1;
4131 		offchanok = 1;
4132 		goto send_frame_cmd;
4133 	}
4134 
4135 	if (drv->device_ap_sme && is_ap_interface(drv->nlmode)) {
4136 		if (freq == 0) {
4137 			wpa_printf(MSG_DEBUG, "nl80211: Use bss->freq=%d",
4138 				   bss->freq);
4139 			freq = bss->freq;
4140 		}
4141 		if ((int) freq == bss->freq)
4142 			wait_time = 0;
4143 		goto send_frame_cmd;
4144 	}
4145 
4146 	if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4147 	    WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_AUTH) {
4148 		/*
4149 		 * Only one of the authentication frame types is encrypted.
4150 		 * In order for static WEP encryption to work properly (i.e.,
4151 		 * to not encrypt the frame), we need to tell mac80211 about
4152 		 * the frames that must not be encrypted.
4153 		 */
4154 		u16 auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
4155 		u16 auth_trans = le_to_host16(mgmt->u.auth.auth_transaction);
4156 		if (auth_alg != WLAN_AUTH_SHARED_KEY || auth_trans != 3)
4157 			encrypt = 0;
4158 	}
4159 
4160 	if (is_sta_interface(drv->nlmode) &&
4161 	    WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4162 	    WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_AUTH) {
4163 		if (freq == 0 &&
4164 		    (drv->capa.flags & WPA_DRIVER_FLAGS_SAE) &&
4165 		    !(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
4166 			freq = nl80211_get_assoc_freq(drv);
4167 			wpa_printf(MSG_DEBUG,
4168 				   "nl80211: send_mlme - Use assoc_freq=%u for external auth",
4169 				   freq);
4170 		}
4171 
4172 		/* Allow off channel for PASN authentication */
4173 		if (data_len >= IEEE80211_HDRLEN + 2 &&
4174 		    WPA_GET_LE16(data + IEEE80211_HDRLEN) == WLAN_AUTH_PASN &&
4175 		    !offchanok) {
4176 			wpa_printf(MSG_DEBUG,
4177 				   "nl80211: send_mlme: allow off channel for PASN");
4178 			offchanok = 1;
4179 		}
4180 	}
4181 
4182 #ifdef CONFIG_PASN
4183 	if (is_sta_interface(drv->nlmode) &&
4184 	    WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4185 	     WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_DEAUTH) {
4186 		wpa_printf(MSG_DEBUG,
4187 			   "nl80211: send_mlme: allow Deauthentication frame for PASN");
4188 
4189 		use_cookie = 0;
4190 		offchanok = 1;
4191 		goto send_frame_cmd;
4192 	}
4193 #endif /* CONFIG_PASN */
4194 
4195 	if (freq == 0 && drv->nlmode == NL80211_IFTYPE_ADHOC) {
4196 		freq = nl80211_get_assoc_freq(drv);
4197 		wpa_printf(MSG_DEBUG,
4198 			   "nl80211: send_mlme - Use assoc_freq=%u for IBSS",
4199 			   freq);
4200 	}
4201 	if (freq == 0) {
4202 		wpa_printf(MSG_DEBUG, "nl80211: send_mlme - Use bss->freq=%u",
4203 			   bss->freq);
4204 		freq = bss->freq;
4205 	}
4206 
4207 	if (drv->use_monitor && is_ap_interface(drv->nlmode)) {
4208 		wpa_printf(MSG_DEBUG,
4209 			   "nl80211: send_frame(freq=%u bss->freq=%u) -> send_monitor",
4210 			   freq, bss->freq);
4211 		return nl80211_send_monitor(drv, data, data_len, encrypt,
4212 					    noack);
4213 	}
4214 
4215 	if (noack || WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT ||
4216 	    WLAN_FC_GET_STYPE(fc) != WLAN_FC_STYPE_ACTION)
4217 		use_cookie = 0;
4218 send_frame_cmd:
4219 #ifdef CONFIG_TESTING_OPTIONS
4220 	if (no_encrypt && !encrypt && !drv->use_monitor) {
4221 		wpa_printf(MSG_DEBUG,
4222 			   "nl80211: Request to send an unencrypted frame - use a monitor interface for this");
4223 		if (nl80211_create_monitor_interface(drv) < 0)
4224 			return -1;
4225 		res = nl80211_send_monitor(drv, data, data_len, encrypt,
4226 					   noack);
4227 		nl80211_remove_monitor_interface(drv);
4228 		return res;
4229 	}
4230 #endif /* CONFIG_TESTING_OPTIONS */
4231 
4232 	wpa_printf(MSG_DEBUG, "nl80211: send_mlme -> send_frame_cmd");
4233 	res = nl80211_send_frame_cmd(bss, freq, wait_time, data, data_len,
4234 				     use_cookie, no_cck, noack, offchanok,
4235 				     csa_offs, csa_offs_len);
4236 
4237 	return res;
4238 }
4239 
4240 
nl80211_put_basic_rates(struct nl_msg * msg,const int * basic_rates)4241 static int nl80211_put_basic_rates(struct nl_msg *msg, const int *basic_rates)
4242 {
4243 	u8 rates[NL80211_MAX_SUPP_RATES];
4244 	u8 rates_len = 0;
4245 	int i;
4246 
4247 	if (!basic_rates)
4248 		return 0;
4249 
4250 	for (i = 0; i < NL80211_MAX_SUPP_RATES && basic_rates[i] >= 0; i++)
4251 		rates[rates_len++] = basic_rates[i] / 5;
4252 
4253 	return nla_put(msg, NL80211_ATTR_BSS_BASIC_RATES, rates_len, rates);
4254 }
4255 
4256 
nl80211_set_bss(struct i802_bss * bss,int cts,int preamble,int slot,int ht_opmode,int ap_isolate,const int * basic_rates)4257 static int nl80211_set_bss(struct i802_bss *bss, int cts, int preamble,
4258 			   int slot, int ht_opmode, int ap_isolate,
4259 			   const int *basic_rates)
4260 {
4261 	struct wpa_driver_nl80211_data *drv = bss->drv;
4262 	struct nl_msg *msg;
4263 
4264 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_BSS)) ||
4265 	    (cts >= 0 &&
4266 	     nla_put_u8(msg, NL80211_ATTR_BSS_CTS_PROT, cts)) ||
4267 	    (preamble >= 0 &&
4268 	     nla_put_u8(msg, NL80211_ATTR_BSS_SHORT_PREAMBLE, preamble)) ||
4269 	    (slot >= 0 &&
4270 	     nla_put_u8(msg, NL80211_ATTR_BSS_SHORT_SLOT_TIME, slot)) ||
4271 	    (ht_opmode >= 0 &&
4272 	     nla_put_u16(msg, NL80211_ATTR_BSS_HT_OPMODE, ht_opmode)) ||
4273 	    (ap_isolate >= 0 &&
4274 	     nla_put_u8(msg, NL80211_ATTR_AP_ISOLATE, ap_isolate)) ||
4275 	    nl80211_put_basic_rates(msg, basic_rates)) {
4276 		nlmsg_free(msg);
4277 		return -ENOBUFS;
4278 	}
4279 
4280 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4281 }
4282 
4283 
wpa_driver_nl80211_set_acl(void * priv,struct hostapd_acl_params * params)4284 static int wpa_driver_nl80211_set_acl(void *priv,
4285 				      struct hostapd_acl_params *params)
4286 {
4287 	struct i802_bss *bss = priv;
4288 	struct wpa_driver_nl80211_data *drv = bss->drv;
4289 	struct nl_msg *msg;
4290 	struct nl_msg *acl;
4291 	unsigned int i;
4292 	int ret;
4293 	size_t acl_nla_sz, acl_nlmsg_sz, nla_sz, nlmsg_sz;
4294 
4295 	if (!(drv->capa.max_acl_mac_addrs))
4296 		return -ENOTSUP;
4297 
4298 	if (params->num_mac_acl > drv->capa.max_acl_mac_addrs)
4299 		return -ENOTSUP;
4300 
4301 	wpa_printf(MSG_DEBUG, "nl80211: Set %s ACL (num_mac_acl=%u)",
4302 		   params->acl_policy ? "Accept" : "Deny", params->num_mac_acl);
4303 
4304 	acl_nla_sz = nla_total_size(ETH_ALEN) * params->num_mac_acl;
4305 	acl_nlmsg_sz = nlmsg_total_size(acl_nla_sz);
4306 	acl = nlmsg_alloc_size(acl_nlmsg_sz);
4307 	if (!acl)
4308 		return -ENOMEM;
4309 	for (i = 0; i < params->num_mac_acl; i++) {
4310 		if (nla_put(acl, i + 1, ETH_ALEN, params->mac_acl[i].addr)) {
4311 			nlmsg_free(acl);
4312 			return -ENOMEM;
4313 		}
4314 	}
4315 
4316 	/*
4317 	 * genetlink message header (Length of user header is 0) +
4318 	 * u32 attr: NL80211_ATTR_IFINDEX +
4319 	 * u32 attr: NL80211_ATTR_ACL_POLICY +
4320 	 * nested acl attr
4321 	 */
4322 	nla_sz = GENL_HDRLEN +
4323 		nla_total_size(4) * 2 +
4324 		nla_total_size(acl_nla_sz);
4325 	nlmsg_sz = nlmsg_total_size(nla_sz);
4326 	if (!(msg = nl80211_ifindex_msg_build(drv, nlmsg_alloc_size(nlmsg_sz),
4327 					      drv->ifindex, 0,
4328 					      NL80211_CMD_SET_MAC_ACL)) ||
4329 	    nla_put_u32(msg, NL80211_ATTR_ACL_POLICY, params->acl_policy ?
4330 			NL80211_ACL_POLICY_DENY_UNLESS_LISTED :
4331 			NL80211_ACL_POLICY_ACCEPT_UNLESS_LISTED) ||
4332 	    nla_put_nested(msg, NL80211_ATTR_MAC_ADDRS, acl)) {
4333 		nlmsg_free(msg);
4334 		nlmsg_free(acl);
4335 		return -ENOMEM;
4336 	}
4337 	nlmsg_free(acl);
4338 
4339 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4340 	if (ret) {
4341 		wpa_printf(MSG_DEBUG, "nl80211: Failed to set MAC ACL: %d (%s)",
4342 			   ret, strerror(-ret));
4343 	}
4344 
4345 	return ret;
4346 }
4347 
4348 
nl80211_put_beacon_int(struct nl_msg * msg,int beacon_int)4349 static int nl80211_put_beacon_int(struct nl_msg *msg, int beacon_int)
4350 {
4351 	if (beacon_int > 0) {
4352 		wpa_printf(MSG_DEBUG, "  * beacon_int=%d", beacon_int);
4353 		return nla_put_u32(msg, NL80211_ATTR_BEACON_INTERVAL,
4354 				   beacon_int);
4355 	}
4356 
4357 	return 0;
4358 }
4359 
4360 
nl80211_put_dtim_period(struct nl_msg * msg,int dtim_period)4361 static int nl80211_put_dtim_period(struct nl_msg *msg, int dtim_period)
4362 {
4363 	if (dtim_period > 0) {
4364 		wpa_printf(MSG_DEBUG, "  * dtim_period=%d", dtim_period);
4365 		return nla_put_u32(msg, NL80211_ATTR_DTIM_PERIOD, dtim_period);
4366 	}
4367 
4368 	return 0;
4369 }
4370 
4371 
4372 #ifdef CONFIG_MESH
nl80211_set_mesh_config(void * priv,struct wpa_driver_mesh_bss_params * params)4373 static int nl80211_set_mesh_config(void *priv,
4374 				   struct wpa_driver_mesh_bss_params *params)
4375 {
4376 	struct i802_bss *bss = priv;
4377 	struct wpa_driver_nl80211_data *drv = bss->drv;
4378 	struct nl_msg *msg;
4379 	int ret;
4380 
4381 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_MESH_CONFIG);
4382 	if (!msg)
4383 		return -1;
4384 
4385 	ret = nl80211_put_mesh_config(msg, params);
4386 	if (ret < 0) {
4387 		nlmsg_free(msg);
4388 		return ret;
4389 	}
4390 
4391 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4392 	if (ret) {
4393 		wpa_printf(MSG_ERROR,
4394 			   "nl80211: Mesh config set failed: %d (%s)",
4395 			   ret, strerror(-ret));
4396 		return ret;
4397 	}
4398 	return 0;
4399 }
4400 #endif /* CONFIG_MESH */
4401 
4402 
nl80211_put_beacon_rate(struct nl_msg * msg,u64 flags,u64 flags2,struct wpa_driver_ap_params * params)4403 static int nl80211_put_beacon_rate(struct nl_msg *msg, u64 flags, u64 flags2,
4404 				   struct wpa_driver_ap_params *params)
4405 {
4406 	struct nlattr *bands, *band;
4407 	struct nl80211_txrate_vht vht_rate;
4408 	struct nl80211_txrate_he he_rate;
4409 
4410 	if (!params->freq ||
4411 	    (params->beacon_rate == 0 &&
4412 	     params->rate_type == BEACON_RATE_LEGACY))
4413 		return 0;
4414 
4415 	bands = nla_nest_start(msg, NL80211_ATTR_TX_RATES);
4416 	if (!bands)
4417 		return -1;
4418 
4419 	switch (params->freq->mode) {
4420 	case HOSTAPD_MODE_IEEE80211B:
4421 	case HOSTAPD_MODE_IEEE80211G:
4422 		band = nla_nest_start(msg, NL80211_BAND_2GHZ);
4423 		break;
4424 	case HOSTAPD_MODE_IEEE80211A:
4425 		if (is_6ghz_freq(params->freq->freq))
4426 			band = nla_nest_start(msg, NL80211_BAND_6GHZ);
4427 		else
4428 			band = nla_nest_start(msg, NL80211_BAND_5GHZ);
4429 		break;
4430 	case HOSTAPD_MODE_IEEE80211AD:
4431 		band = nla_nest_start(msg, NL80211_BAND_60GHZ);
4432 		break;
4433 	default:
4434 		return 0;
4435 	}
4436 
4437 	if (!band)
4438 		return -1;
4439 
4440 	os_memset(&vht_rate, 0, sizeof(vht_rate));
4441 	os_memset(&he_rate, 0, sizeof(he_rate));
4442 
4443 	switch (params->rate_type) {
4444 	case BEACON_RATE_LEGACY:
4445 		if (!(flags & WPA_DRIVER_FLAGS_BEACON_RATE_LEGACY)) {
4446 			wpa_printf(MSG_INFO,
4447 				   "nl80211: Driver does not support setting Beacon frame rate (legacy)");
4448 			return -1;
4449 		}
4450 
4451 		if (nla_put_u8(msg, NL80211_TXRATE_LEGACY,
4452 			       (u8) params->beacon_rate / 5) ||
4453 		    nla_put(msg, NL80211_TXRATE_HT, 0, NULL) ||
4454 		    (params->freq->vht_enabled &&
4455 		     nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4456 			     &vht_rate)))
4457 			return -1;
4458 
4459 		wpa_printf(MSG_DEBUG, " * beacon_rate = legacy:%u (* 100 kbps)",
4460 			   params->beacon_rate);
4461 		break;
4462 	case BEACON_RATE_HT:
4463 		if (!(flags & WPA_DRIVER_FLAGS_BEACON_RATE_HT)) {
4464 			wpa_printf(MSG_INFO,
4465 				   "nl80211: Driver does not support setting Beacon frame rate (HT)");
4466 			return -1;
4467 		}
4468 		if (nla_put(msg, NL80211_TXRATE_LEGACY, 0, NULL) ||
4469 		    nla_put_u8(msg, NL80211_TXRATE_HT, params->beacon_rate) ||
4470 		    (params->freq->vht_enabled &&
4471 		     nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4472 			     &vht_rate)))
4473 			return -1;
4474 		wpa_printf(MSG_DEBUG, " * beacon_rate = HT-MCS %u",
4475 			   params->beacon_rate);
4476 		break;
4477 	case BEACON_RATE_VHT:
4478 		if (!(flags & WPA_DRIVER_FLAGS_BEACON_RATE_VHT)) {
4479 			wpa_printf(MSG_INFO,
4480 				   "nl80211: Driver does not support setting Beacon frame rate (VHT)");
4481 			return -1;
4482 		}
4483 		vht_rate.mcs[0] = BIT(params->beacon_rate);
4484 		if (nla_put(msg, NL80211_TXRATE_LEGACY, 0, NULL))
4485 			return -1;
4486 		if (nla_put(msg, NL80211_TXRATE_HT, 0, NULL))
4487 			return -1;
4488 		if (nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4489 			    &vht_rate))
4490 			return -1;
4491 		wpa_printf(MSG_DEBUG, " * beacon_rate = VHT-MCS %u",
4492 			   params->beacon_rate);
4493 		break;
4494 	case BEACON_RATE_HE:
4495 		if (!(flags2 & WPA_DRIVER_FLAGS2_BEACON_RATE_HE)) {
4496 			wpa_printf(MSG_INFO,
4497 				   "nl80211: Driver does not support setting Beacon frame rate (HE)");
4498 			return -1;
4499 		}
4500 		he_rate.mcs[0] = BIT(params->beacon_rate);
4501 		if (nla_put(msg, NL80211_TXRATE_LEGACY, 0, NULL) ||
4502 		    nla_put(msg, NL80211_TXRATE_HT, 0, NULL) ||
4503 		    nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4504 			    &vht_rate) ||
4505 		    nla_put(msg, NL80211_TXRATE_HE, sizeof(he_rate), &he_rate))
4506 			return -1;
4507 		wpa_printf(MSG_DEBUG, " * beacon_rate = HE-MCS %u",
4508 			   params->beacon_rate);
4509 		break;
4510 	}
4511 
4512 	nla_nest_end(msg, band);
4513 	nla_nest_end(msg, bands);
4514 
4515 	return 0;
4516 }
4517 
4518 
nl80211_set_multicast_to_unicast(struct i802_bss * bss,int multicast_to_unicast)4519 static int nl80211_set_multicast_to_unicast(struct i802_bss *bss,
4520 					    int multicast_to_unicast)
4521 {
4522 	struct wpa_driver_nl80211_data *drv = bss->drv;
4523 	struct nl_msg *msg;
4524 	int ret;
4525 
4526 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_MULTICAST_TO_UNICAST);
4527 	if (!msg ||
4528 	    (multicast_to_unicast &&
4529 	     nla_put_flag(msg, NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED))) {
4530 		wpa_printf(MSG_ERROR,
4531 			   "nl80211: Failed to build NL80211_CMD_SET_MULTICAST_TO_UNICAST msg for %s",
4532 			   bss->ifname);
4533 		nlmsg_free(msg);
4534 		return -ENOBUFS;
4535 	}
4536 
4537 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4538 
4539 	switch (ret) {
4540 	case 0:
4541 		wpa_printf(MSG_DEBUG,
4542 			   "nl80211: multicast to unicast %s on interface %s",
4543 			   multicast_to_unicast ? "enabled" : "disabled",
4544 			   bss->ifname);
4545 		break;
4546 	case -EOPNOTSUPP:
4547 		if (!multicast_to_unicast)
4548 			break;
4549 		wpa_printf(MSG_INFO,
4550 			   "nl80211: multicast to unicast not supported on interface %s",
4551 			   bss->ifname);
4552 		break;
4553 	default:
4554 		wpa_printf(MSG_ERROR,
4555 			   "nl80211: %s multicast to unicast failed with %d (%s) on interface %s",
4556 			   multicast_to_unicast ? "enabling" : "disabling",
4557 			   ret, strerror(-ret), bss->ifname);
4558 		break;
4559 	}
4560 
4561 	return ret;
4562 }
4563 
4564 
4565 #ifdef CONFIG_SAE
nl80211_put_sae_pwe(struct nl_msg * msg,int pwe)4566 static int nl80211_put_sae_pwe(struct nl_msg *msg, int pwe)
4567 {
4568 	u8 sae_pwe;
4569 
4570 	wpa_printf(MSG_DEBUG, "nl802111: sae_pwe=%d", pwe);
4571 	if (pwe == 0)
4572 		sae_pwe = NL80211_SAE_PWE_HUNT_AND_PECK;
4573 	else if (pwe == 1)
4574 		sae_pwe = NL80211_SAE_PWE_HASH_TO_ELEMENT;
4575 	else if (pwe == 2)
4576 		sae_pwe = NL80211_SAE_PWE_BOTH;
4577 	else if (pwe == 3)
4578 		return 0; /* special test mode */
4579 	else
4580 		return -1;
4581 	if (nla_put_u8(msg, NL80211_ATTR_SAE_PWE, sae_pwe))
4582 		return -1;
4583 
4584 	return 0;
4585 }
4586 #endif /* CONFIG_SAE */
4587 
4588 
4589 #ifdef CONFIG_FILS
nl80211_fils_discovery(struct i802_bss * bss,struct nl_msg * msg,struct wpa_driver_ap_params * params)4590 static int nl80211_fils_discovery(struct i802_bss *bss, struct nl_msg *msg,
4591 				  struct wpa_driver_ap_params *params)
4592 {
4593 	struct nlattr *attr;
4594 
4595 	if (!bss->drv->fils_discovery) {
4596 		wpa_printf(MSG_ERROR,
4597 			   "nl80211: Driver does not support FILS Discovery frame transmission for %s",
4598 			   bss->ifname);
4599 		return -1;
4600 	}
4601 
4602 	attr = nla_nest_start(msg, NL80211_ATTR_FILS_DISCOVERY);
4603 	if (!attr ||
4604 	    nla_put_u32(msg, NL80211_FILS_DISCOVERY_ATTR_INT_MIN,
4605 			params->fd_min_int) ||
4606 	    nla_put_u32(msg, NL80211_FILS_DISCOVERY_ATTR_INT_MAX,
4607 			params->fd_max_int) ||
4608 	    (params->fd_frame_tmpl &&
4609 	     nla_put(msg, NL80211_FILS_DISCOVERY_ATTR_TMPL,
4610 		     params->fd_frame_tmpl_len, params->fd_frame_tmpl)))
4611 		return -1;
4612 
4613 	nla_nest_end(msg, attr);
4614 	return 0;
4615 }
4616 #endif /* CONFIG_FILS */
4617 
4618 
4619 #ifdef CONFIG_IEEE80211AX
nl80211_unsol_bcast_probe_resp(struct i802_bss * bss,struct nl_msg * msg,struct wpa_driver_ap_params * params)4620 static int nl80211_unsol_bcast_probe_resp(struct i802_bss *bss,
4621 					  struct nl_msg *msg,
4622 					  struct wpa_driver_ap_params *params)
4623 {
4624 	struct nlattr *attr;
4625 
4626 	if (!bss->drv->unsol_bcast_probe_resp) {
4627 		wpa_printf(MSG_ERROR,
4628 			   "nl80211: Driver does not support unsolicited broadcast Probe Response frame transmission for %s",
4629 			   bss->ifname);
4630 		return -1;
4631 	}
4632 
4633 	wpa_printf(MSG_DEBUG,
4634 		   "nl80211: Unsolicited broadcast Probe Response frame interval: %u",
4635 		   params->unsol_bcast_probe_resp_interval);
4636 	attr = nla_nest_start(msg, NL80211_ATTR_UNSOL_BCAST_PROBE_RESP);
4637 	if (!attr ||
4638 	    nla_put_u32(msg, NL80211_UNSOL_BCAST_PROBE_RESP_ATTR_INT,
4639 			params->unsol_bcast_probe_resp_interval) ||
4640 	    (params->unsol_bcast_probe_resp_tmpl &&
4641 	     nla_put(msg, NL80211_UNSOL_BCAST_PROBE_RESP_ATTR_TMPL,
4642 		     params->unsol_bcast_probe_resp_tmpl_len,
4643 		     params->unsol_bcast_probe_resp_tmpl)))
4644 		return -1;
4645 
4646 	nla_nest_end(msg, attr);
4647 	return 0;
4648 }
4649 #endif /* CONFIG_IEEE80211AX */
4650 
4651 
wpa_driver_nl80211_set_ap(void * priv,struct wpa_driver_ap_params * params)4652 static int wpa_driver_nl80211_set_ap(void *priv,
4653 				     struct wpa_driver_ap_params *params)
4654 {
4655 	struct i802_bss *bss = priv;
4656 	struct wpa_driver_nl80211_data *drv = bss->drv;
4657 	struct nl_msg *msg;
4658 	u8 cmd = NL80211_CMD_NEW_BEACON;
4659 	int ret = -ENOBUFS;
4660 	int beacon_set;
4661 	int num_suites;
4662 	u32 suites[20], suite;
4663 	u32 ver;
4664 #ifdef CONFIG_MESH
4665 	struct wpa_driver_mesh_bss_params mesh_params;
4666 #endif /* CONFIG_MESH */
4667 
4668 	beacon_set = params->reenable ? 0 : bss->beacon_set;
4669 
4670 	wpa_printf(MSG_DEBUG, "nl80211: Set beacon (beacon_set=%d)",
4671 		   beacon_set);
4672 	if (beacon_set)
4673 		cmd = NL80211_CMD_SET_BEACON;
4674 	else if (!drv->device_ap_sme && !drv->use_monitor &&
4675 		 !nl80211_get_wiphy_data_ap(bss))
4676 		return -ENOBUFS;
4677 
4678 	wpa_hexdump(MSG_DEBUG, "nl80211: Beacon head",
4679 		    params->head, params->head_len);
4680 	wpa_hexdump(MSG_DEBUG, "nl80211: Beacon tail",
4681 		    params->tail, params->tail_len);
4682 	wpa_printf(MSG_DEBUG, "nl80211: ifindex=%d", bss->ifindex);
4683 	wpa_printf(MSG_DEBUG, "nl80211: beacon_int=%d", params->beacon_int);
4684 	wpa_printf(MSG_DEBUG, "nl80211: beacon_rate=%u", params->beacon_rate);
4685 	wpa_printf(MSG_DEBUG, "nl80211: rate_type=%d", params->rate_type);
4686 	wpa_printf(MSG_DEBUG, "nl80211: dtim_period=%d", params->dtim_period);
4687 	wpa_printf(MSG_DEBUG, "nl80211: ssid=%s",
4688 		   wpa_ssid_txt(params->ssid, params->ssid_len));
4689 	if (!(msg = nl80211_bss_msg(bss, 0, cmd)) ||
4690 	    nla_put(msg, NL80211_ATTR_BEACON_HEAD, params->head_len,
4691 		    params->head) ||
4692 	    nla_put(msg, NL80211_ATTR_BEACON_TAIL, params->tail_len,
4693 		    params->tail) ||
4694 	    nl80211_put_beacon_int(msg, params->beacon_int) ||
4695 	    nl80211_put_beacon_rate(msg, drv->capa.flags, drv->capa.flags2,
4696 				    params) ||
4697 	    nl80211_put_dtim_period(msg, params->dtim_period) ||
4698 	    nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid))
4699 		goto fail;
4700 	if (params->proberesp && params->proberesp_len) {
4701 		wpa_hexdump(MSG_DEBUG, "nl80211: proberesp (offload)",
4702 			    params->proberesp, params->proberesp_len);
4703 		if (nla_put(msg, NL80211_ATTR_PROBE_RESP, params->proberesp_len,
4704 			    params->proberesp))
4705 			goto fail;
4706 	}
4707 	switch (params->hide_ssid) {
4708 	case NO_SSID_HIDING:
4709 		wpa_printf(MSG_DEBUG, "nl80211: hidden SSID not in use");
4710 		if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
4711 				NL80211_HIDDEN_SSID_NOT_IN_USE))
4712 			goto fail;
4713 		break;
4714 	case HIDDEN_SSID_ZERO_LEN:
4715 		wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero len");
4716 		if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
4717 				NL80211_HIDDEN_SSID_ZERO_LEN))
4718 			goto fail;
4719 		break;
4720 	case HIDDEN_SSID_ZERO_CONTENTS:
4721 		wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero contents");
4722 		if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
4723 				NL80211_HIDDEN_SSID_ZERO_CONTENTS))
4724 			goto fail;
4725 		break;
4726 	}
4727 	wpa_printf(MSG_DEBUG, "nl80211: privacy=%d", params->privacy);
4728 	if (params->privacy &&
4729 	    nla_put_flag(msg, NL80211_ATTR_PRIVACY))
4730 		goto fail;
4731 	wpa_printf(MSG_DEBUG, "nl80211: auth_algs=0x%x", params->auth_algs);
4732 	if ((params->auth_algs & (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) ==
4733 	    (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) {
4734 		/* Leave out the attribute */
4735 	} else if (params->auth_algs & WPA_AUTH_ALG_SHARED) {
4736 		if (nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE,
4737 				NL80211_AUTHTYPE_SHARED_KEY))
4738 			goto fail;
4739 	} else {
4740 		if (nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE,
4741 				NL80211_AUTHTYPE_OPEN_SYSTEM))
4742 			goto fail;
4743 	}
4744 
4745 	wpa_printf(MSG_DEBUG, "nl80211: wpa_version=0x%x", params->wpa_version);
4746 	ver = 0;
4747 	if (params->wpa_version & WPA_PROTO_WPA)
4748 		ver |= NL80211_WPA_VERSION_1;
4749 	if (params->wpa_version & WPA_PROTO_RSN)
4750 		ver |= NL80211_WPA_VERSION_2;
4751 	if (ver &&
4752 	    nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
4753 		goto fail;
4754 
4755 	wpa_printf(MSG_DEBUG, "nl80211: key_mgmt_suites=0x%x",
4756 		   params->key_mgmt_suites);
4757 	num_suites = wpa_key_mgmt_to_suites(params->key_mgmt_suites,
4758 					    suites, ARRAY_SIZE(suites));
4759 	if (num_suites > NL80211_MAX_NR_AKM_SUITES)
4760 		wpa_printf(MSG_DEBUG,
4761 			   "nl80211: Not enough room for all AKM suites (num_suites=%d > NL80211_MAX_NR_AKM_SUITES)",
4762 			   num_suites);
4763 	else if (num_suites &&
4764 		 nla_put(msg, NL80211_ATTR_AKM_SUITES, num_suites * sizeof(u32),
4765 			 suites))
4766 		goto fail;
4767 
4768 	if (params->key_mgmt_suites & WPA_KEY_MGMT_IEEE8021X_NO_WPA &&
4769 	    (!params->pairwise_ciphers ||
4770 	     params->pairwise_ciphers & (WPA_CIPHER_WEP104 | WPA_CIPHER_WEP40)) &&
4771 	    (nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, ETH_P_PAE) ||
4772 	     nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT)))
4773 		goto fail;
4774 
4775 	if (drv->device_ap_sme) {
4776 		u32 flags = 0;
4777 
4778 		if (params->key_mgmt_suites & WPA_KEY_MGMT_SAE) {
4779 			/* Add the previously used flag attribute to support
4780 			 * older kernel versions and the newer flag bit for
4781 			 * newer kernels. */
4782 			if (nla_put_flag(msg,
4783 					 NL80211_ATTR_EXTERNAL_AUTH_SUPPORT))
4784 				goto fail;
4785 			flags |= NL80211_AP_SETTINGS_EXTERNAL_AUTH_SUPPORT;
4786 		}
4787 
4788 		flags |= NL80211_AP_SETTINGS_SA_QUERY_OFFLOAD_SUPPORT;
4789 
4790 		if (nla_put_u32(msg, NL80211_ATTR_AP_SETTINGS_FLAGS, flags))
4791 			goto fail;
4792 	}
4793 
4794 	wpa_printf(MSG_DEBUG, "nl80211: pairwise_ciphers=0x%x",
4795 		   params->pairwise_ciphers);
4796 	num_suites = wpa_cipher_to_cipher_suites(params->pairwise_ciphers,
4797 						 suites, ARRAY_SIZE(suites));
4798 	if (num_suites &&
4799 	    nla_put(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
4800 		    num_suites * sizeof(u32), suites))
4801 		goto fail;
4802 
4803 	wpa_printf(MSG_DEBUG, "nl80211: group_cipher=0x%x",
4804 		   params->group_cipher);
4805 	suite = wpa_cipher_to_cipher_suite(params->group_cipher);
4806 	if (suite &&
4807 	    nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, suite))
4808 		goto fail;
4809 
4810 	if (params->beacon_ies) {
4811 		wpa_hexdump_buf(MSG_DEBUG, "nl80211: beacon_ies",
4812 				params->beacon_ies);
4813 		if (nla_put(msg, NL80211_ATTR_IE,
4814 			    wpabuf_len(params->beacon_ies),
4815 			    wpabuf_head(params->beacon_ies)))
4816 			goto fail;
4817 	}
4818 	if (params->proberesp_ies) {
4819 		wpa_hexdump_buf(MSG_DEBUG, "nl80211: proberesp_ies",
4820 				params->proberesp_ies);
4821 		if (nla_put(msg, NL80211_ATTR_IE_PROBE_RESP,
4822 			    wpabuf_len(params->proberesp_ies),
4823 			    wpabuf_head(params->proberesp_ies)))
4824 			goto fail;
4825 	}
4826 	if (params->assocresp_ies) {
4827 		wpa_hexdump_buf(MSG_DEBUG, "nl80211: assocresp_ies",
4828 				params->assocresp_ies);
4829 		if (nla_put(msg, NL80211_ATTR_IE_ASSOC_RESP,
4830 			    wpabuf_len(params->assocresp_ies),
4831 			    wpabuf_head(params->assocresp_ies)))
4832 			goto fail;
4833 	}
4834 
4835 	if (drv->capa.flags & WPA_DRIVER_FLAGS_INACTIVITY_TIMER)  {
4836 		wpa_printf(MSG_DEBUG, "nl80211: ap_max_inactivity=%d",
4837 			   params->ap_max_inactivity);
4838 		if (nla_put_u16(msg, NL80211_ATTR_INACTIVITY_TIMEOUT,
4839 				params->ap_max_inactivity))
4840 			goto fail;
4841 	}
4842 
4843 #ifdef CONFIG_P2P
4844 	if (params->p2p_go_ctwindow > 0) {
4845 		if (drv->p2p_go_ctwindow_supported) {
4846 			wpa_printf(MSG_DEBUG, "nl80211: P2P GO ctwindow=%d",
4847 				   params->p2p_go_ctwindow);
4848 			if (nla_put_u8(msg, NL80211_ATTR_P2P_CTWINDOW,
4849 				       params->p2p_go_ctwindow))
4850 				goto fail;
4851 		} else {
4852 			wpa_printf(MSG_INFO,
4853 				   "nl80211: Driver does not support CTWindow configuration - ignore this parameter");
4854 		}
4855 	}
4856 #endif /* CONFIG_P2P */
4857 
4858 	if (params->pbss) {
4859 		wpa_printf(MSG_DEBUG, "nl80211: PBSS");
4860 		if (nla_put_flag(msg, NL80211_ATTR_PBSS))
4861 			goto fail;
4862 	}
4863 
4864 	if (params->ftm_responder) {
4865 		struct nlattr *ftm;
4866 
4867 		if (!(drv->capa.flags & WPA_DRIVER_FLAGS_FTM_RESPONDER)) {
4868 			ret = -ENOTSUP;
4869 			goto fail;
4870 		}
4871 
4872 		ftm = nla_nest_start(msg, NL80211_ATTR_FTM_RESPONDER);
4873 		if (!ftm ||
4874 		    nla_put_flag(msg, NL80211_FTM_RESP_ATTR_ENABLED) ||
4875 		    (params->lci &&
4876 		     nla_put(msg, NL80211_FTM_RESP_ATTR_LCI,
4877 			     wpabuf_len(params->lci),
4878 			     wpabuf_head(params->lci))) ||
4879 		    (params->civic &&
4880 		     nla_put(msg, NL80211_FTM_RESP_ATTR_CIVICLOC,
4881 			     wpabuf_len(params->civic),
4882 			     wpabuf_head(params->civic))))
4883 			goto fail;
4884 		nla_nest_end(msg, ftm);
4885 	}
4886 
4887 #ifdef CONFIG_IEEE80211AX
4888 	if (params->he_spr_ctrl) {
4889 		struct nlattr *spr;
4890 
4891 		spr = nla_nest_start(msg, NL80211_ATTR_HE_OBSS_PD);
4892 		wpa_printf(MSG_DEBUG, "nl80211: he_spr_ctrl=0x%x",
4893 			   params->he_spr_ctrl);
4894 
4895 		if (!spr ||
4896 		    nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_SR_CTRL,
4897 			       params->he_spr_ctrl) ||
4898 		    ((params->he_spr_ctrl &
4899 		      SPATIAL_REUSE_NON_SRG_OFFSET_PRESENT) &&
4900 		     nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_NON_SRG_MAX_OFFSET,
4901 				params->he_spr_non_srg_obss_pd_max_offset)))
4902 			goto fail;
4903 
4904 		if ((params->he_spr_ctrl &
4905 		     SPATIAL_REUSE_SRG_INFORMATION_PRESENT) &&
4906 		    (nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET,
4907 				params->he_spr_srg_obss_pd_min_offset) ||
4908 		     nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_MAX_OFFSET,
4909 				params->he_spr_srg_obss_pd_max_offset) ||
4910 		     nla_put(msg, NL80211_HE_OBSS_PD_ATTR_BSS_COLOR_BITMAP,
4911 			     sizeof(params->he_spr_bss_color_bitmap),
4912 			     params->he_spr_bss_color_bitmap) ||
4913 		     nla_put(msg, NL80211_HE_OBSS_PD_ATTR_PARTIAL_BSSID_BITMAP,
4914 			     sizeof(params->he_spr_partial_bssid_bitmap),
4915 			     params->he_spr_partial_bssid_bitmap)))
4916 			goto fail;
4917 
4918 		nla_nest_end(msg, spr);
4919 	}
4920 
4921 	if (params->freq && params->freq->he_enabled) {
4922 		struct nlattr *bss_color;
4923 
4924 		bss_color = nla_nest_start(msg, NL80211_ATTR_HE_BSS_COLOR);
4925 		if (!bss_color ||
4926 		    (params->he_bss_color_disabled &&
4927 		     nla_put_flag(msg, NL80211_HE_BSS_COLOR_ATTR_DISABLED)) ||
4928 		    (params->he_bss_color_partial &&
4929 		     nla_put_flag(msg, NL80211_HE_BSS_COLOR_ATTR_PARTIAL)) ||
4930 		    nla_put_u8(msg, NL80211_HE_BSS_COLOR_ATTR_COLOR,
4931 			       params->he_bss_color))
4932 			goto fail;
4933 		nla_nest_end(msg, bss_color);
4934 	}
4935 
4936 	if (params->twt_responder) {
4937 		wpa_printf(MSG_DEBUG, "nl80211: twt_responder=%d",
4938 			   params->twt_responder);
4939 		if (nla_put_flag(msg, NL80211_ATTR_TWT_RESPONDER))
4940 			goto fail;
4941 	}
4942 
4943 	if (params->unsol_bcast_probe_resp_interval &&
4944 	    nl80211_unsol_bcast_probe_resp(bss, msg, params) < 0)
4945 		goto fail;
4946 #endif /* CONFIG_IEEE80211AX */
4947 
4948 #ifdef CONFIG_SAE
4949 	if (((params->key_mgmt_suites & WPA_KEY_MGMT_SAE) ||
4950 	     (params->key_mgmt_suites & WPA_KEY_MGMT_FT_SAE)) &&
4951 	    nl80211_put_sae_pwe(msg, params->sae_pwe) < 0)
4952 		goto fail;
4953 #endif /* CONFIG_SAE */
4954 
4955 #ifdef CONFIG_FILS
4956 	if (params->fd_max_int && nl80211_fils_discovery(bss, msg, params) < 0)
4957 		goto fail;
4958 #endif /* CONFIG_FILS */
4959 
4960 	ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 1);
4961 	if (ret) {
4962 		wpa_printf(MSG_DEBUG, "nl80211: Beacon set failed: %d (%s)",
4963 			   ret, strerror(-ret));
4964 	} else {
4965 		bss->beacon_set = 1;
4966 		nl80211_set_bss(bss, params->cts_protect, params->preamble,
4967 				params->short_slot_time, params->ht_opmode,
4968 				params->isolate, params->basic_rates);
4969 		nl80211_set_multicast_to_unicast(bss,
4970 						 params->multicast_to_unicast);
4971 		if (beacon_set && params->freq &&
4972 		    params->freq->bandwidth != bss->bandwidth) {
4973 			wpa_printf(MSG_DEBUG,
4974 				   "nl80211: Update BSS %s bandwidth: %d -> %d",
4975 				   bss->ifname, bss->bandwidth,
4976 				   params->freq->bandwidth);
4977 			ret = nl80211_set_channel(bss, params->freq, 1);
4978 			if (ret) {
4979 				wpa_printf(MSG_DEBUG,
4980 					   "nl80211: Frequency set failed: %d (%s)",
4981 					   ret, strerror(-ret));
4982 			} else {
4983 				wpa_printf(MSG_DEBUG,
4984 					   "nl80211: Frequency set succeeded for ht2040 coex");
4985 				bss->bandwidth = params->freq->bandwidth;
4986 			}
4987 		} else if (!beacon_set && params->freq) {
4988 			/*
4989 			 * cfg80211 updates the driver on frequence change in AP
4990 			 * mode only at the point when beaconing is started, so
4991 			 * set the initial value here.
4992 			 */
4993 			bss->bandwidth = params->freq->bandwidth;
4994 		}
4995 	}
4996 
4997 #ifdef CONFIG_MESH
4998 	if (is_mesh_interface(drv->nlmode) && params->ht_opmode != -1) {
4999 		os_memset(&mesh_params, 0, sizeof(mesh_params));
5000 		mesh_params.flags |= WPA_DRIVER_MESH_CONF_FLAG_HT_OP_MODE;
5001 		mesh_params.ht_opmode = params->ht_opmode;
5002 		ret = nl80211_set_mesh_config(priv, &mesh_params);
5003 		if (ret < 0)
5004 			return ret;
5005 	}
5006 #endif /* CONFIG_MESH */
5007 
5008 	return ret;
5009 fail:
5010 	nlmsg_free(msg);
5011 	return ret;
5012 }
5013 
5014 
nl80211_put_freq_params(struct nl_msg * msg,const struct hostapd_freq_params * freq)5015 static int nl80211_put_freq_params(struct nl_msg *msg,
5016 				   const struct hostapd_freq_params *freq)
5017 {
5018 	enum hostapd_hw_mode hw_mode;
5019 	int is_24ghz;
5020 	u8 channel;
5021 
5022 	wpa_printf(MSG_DEBUG, "  * freq=%d", freq->freq);
5023 	if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq->freq))
5024 		return -ENOBUFS;
5025 
5026 	wpa_printf(MSG_DEBUG, "  * eht_enabled=%d", freq->eht_enabled);
5027 	wpa_printf(MSG_DEBUG, "  * he_enabled=%d", freq->he_enabled);
5028 	wpa_printf(MSG_DEBUG, "  * vht_enabled=%d", freq->vht_enabled);
5029 	wpa_printf(MSG_DEBUG, "  * ht_enabled=%d", freq->ht_enabled);
5030 	wpa_printf(MSG_DEBUG, "  * radar_background=%d",
5031 		   freq->radar_background);
5032 
5033 	hw_mode = ieee80211_freq_to_chan(freq->freq, &channel);
5034 	is_24ghz = hw_mode == HOSTAPD_MODE_IEEE80211G ||
5035 		hw_mode == HOSTAPD_MODE_IEEE80211B;
5036 
5037 	if (freq->vht_enabled ||
5038 	    ((freq->he_enabled || freq->eht_enabled) && !is_24ghz)) {
5039 		enum nl80211_chan_width cw;
5040 
5041 		wpa_printf(MSG_DEBUG, "  * bandwidth=%d", freq->bandwidth);
5042 		switch (freq->bandwidth) {
5043 		case 20:
5044 			cw = NL80211_CHAN_WIDTH_20;
5045 			break;
5046 		case 40:
5047 			cw = NL80211_CHAN_WIDTH_40;
5048 			break;
5049 		case 80:
5050 			if (freq->center_freq2)
5051 				cw = NL80211_CHAN_WIDTH_80P80;
5052 			else
5053 				cw = NL80211_CHAN_WIDTH_80;
5054 			break;
5055 		case 160:
5056 			cw = NL80211_CHAN_WIDTH_160;
5057 			break;
5058 		default:
5059 			return -EINVAL;
5060 		}
5061 
5062 		wpa_printf(MSG_DEBUG, "  * channel_width=%d", cw);
5063 		wpa_printf(MSG_DEBUG, "  * center_freq1=%d",
5064 			   freq->center_freq1);
5065 		wpa_printf(MSG_DEBUG, "  * center_freq2=%d",
5066 			   freq->center_freq2);
5067 		if (nla_put_u32(msg, NL80211_ATTR_CHANNEL_WIDTH, cw) ||
5068 		    nla_put_u32(msg, NL80211_ATTR_CENTER_FREQ1,
5069 				freq->center_freq1) ||
5070 		    (freq->center_freq2 &&
5071 		     nla_put_u32(msg, NL80211_ATTR_CENTER_FREQ2,
5072 				 freq->center_freq2)))
5073 			return -ENOBUFS;
5074 	} else if (freq->ht_enabled) {
5075 		enum nl80211_channel_type ct;
5076 
5077 		wpa_printf(MSG_DEBUG, "  * sec_channel_offset=%d",
5078 			   freq->sec_channel_offset);
5079 		switch (freq->sec_channel_offset) {
5080 		case -1:
5081 			ct = NL80211_CHAN_HT40MINUS;
5082 			break;
5083 		case 1:
5084 			ct = NL80211_CHAN_HT40PLUS;
5085 			break;
5086 		default:
5087 			ct = NL80211_CHAN_HT20;
5088 			break;
5089 		}
5090 
5091 		wpa_printf(MSG_DEBUG, "  * channel_type=%d", ct);
5092 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE, ct))
5093 			return -ENOBUFS;
5094 	} else if (freq->edmg.channels && freq->edmg.bw_config) {
5095 		wpa_printf(MSG_DEBUG,
5096 			   "  * EDMG configuration: channels=0x%x bw_config=%d",
5097 			   freq->edmg.channels, freq->edmg.bw_config);
5098 		if (nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_CHANNELS,
5099 			       freq->edmg.channels) ||
5100 		    nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_BW_CONFIG,
5101 			       freq->edmg.bw_config))
5102 			return -1;
5103 	} else {
5104 		wpa_printf(MSG_DEBUG, "  * channel_type=%d",
5105 			   NL80211_CHAN_NO_HT);
5106 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
5107 				NL80211_CHAN_NO_HT))
5108 			return -ENOBUFS;
5109 	}
5110 	if (freq->radar_background)
5111 		nla_put_flag(msg, NL80211_ATTR_RADAR_BACKGROUND);
5112 
5113 	return 0;
5114 }
5115 
5116 
nl80211_set_channel(struct i802_bss * bss,struct hostapd_freq_params * freq,int set_chan)5117 static int nl80211_set_channel(struct i802_bss *bss,
5118 			       struct hostapd_freq_params *freq, int set_chan)
5119 {
5120 	struct wpa_driver_nl80211_data *drv = bss->drv;
5121 	struct nl_msg *msg;
5122 	int ret;
5123 
5124 	wpa_printf(MSG_DEBUG,
5125 		   "nl80211: Set freq %d (ht_enabled=%d, vht_enabled=%d, he_enabled=%d, eht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
5126 		   freq->freq, freq->ht_enabled, freq->vht_enabled,
5127 		   freq->he_enabled, freq->eht_enabled, freq->bandwidth,
5128 		   freq->center_freq1, freq->center_freq2);
5129 
5130 	msg = nl80211_drv_msg(drv, 0, set_chan ? NL80211_CMD_SET_CHANNEL :
5131 			      NL80211_CMD_SET_WIPHY);
5132 	if (!msg || nl80211_put_freq_params(msg, freq) < 0) {
5133 		nlmsg_free(msg);
5134 		return -1;
5135 	}
5136 
5137 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
5138 	if (ret == 0) {
5139 		bss->freq = freq->freq;
5140 		return 0;
5141 	}
5142 	wpa_printf(MSG_DEBUG, "nl80211: Failed to set channel (freq=%d): "
5143 		   "%d (%s)", freq->freq, ret, strerror(-ret));
5144 	return -1;
5145 }
5146 
5147 
sta_flags_nl80211(int flags)5148 static u32 sta_flags_nl80211(int flags)
5149 {
5150 	u32 f = 0;
5151 
5152 	if (flags & WPA_STA_AUTHORIZED)
5153 		f |= BIT(NL80211_STA_FLAG_AUTHORIZED);
5154 	if (flags & WPA_STA_WMM)
5155 		f |= BIT(NL80211_STA_FLAG_WME);
5156 	if (flags & WPA_STA_SHORT_PREAMBLE)
5157 		f |= BIT(NL80211_STA_FLAG_SHORT_PREAMBLE);
5158 	if (flags & WPA_STA_MFP)
5159 		f |= BIT(NL80211_STA_FLAG_MFP);
5160 	if (flags & WPA_STA_TDLS_PEER)
5161 		f |= BIT(NL80211_STA_FLAG_TDLS_PEER);
5162 	if (flags & WPA_STA_AUTHENTICATED)
5163 		f |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
5164 	if (flags & WPA_STA_ASSOCIATED)
5165 		f |= BIT(NL80211_STA_FLAG_ASSOCIATED);
5166 
5167 	return f;
5168 }
5169 
5170 
5171 #ifdef CONFIG_MESH
sta_plink_state_nl80211(enum mesh_plink_state state)5172 static u32 sta_plink_state_nl80211(enum mesh_plink_state state)
5173 {
5174 	switch (state) {
5175 	case PLINK_IDLE:
5176 		return NL80211_PLINK_LISTEN;
5177 	case PLINK_OPN_SNT:
5178 		return NL80211_PLINK_OPN_SNT;
5179 	case PLINK_OPN_RCVD:
5180 		return NL80211_PLINK_OPN_RCVD;
5181 	case PLINK_CNF_RCVD:
5182 		return NL80211_PLINK_CNF_RCVD;
5183 	case PLINK_ESTAB:
5184 		return NL80211_PLINK_ESTAB;
5185 	case PLINK_HOLDING:
5186 		return NL80211_PLINK_HOLDING;
5187 	case PLINK_BLOCKED:
5188 		return NL80211_PLINK_BLOCKED;
5189 	default:
5190 		wpa_printf(MSG_ERROR, "nl80211: Invalid mesh plink state %d",
5191 			   state);
5192 	}
5193 	return -1;
5194 }
5195 #endif /* CONFIG_MESH */
5196 
5197 
wpa_driver_nl80211_sta_add(void * priv,struct hostapd_sta_add_params * params)5198 static int wpa_driver_nl80211_sta_add(void *priv,
5199 				      struct hostapd_sta_add_params *params)
5200 {
5201 	struct i802_bss *bss = priv;
5202 	struct wpa_driver_nl80211_data *drv = bss->drv;
5203 	struct nl_msg *msg;
5204 	struct nl80211_sta_flag_update upd;
5205 	int ret = -ENOBUFS;
5206 
5207 	if ((params->flags & WPA_STA_TDLS_PEER) &&
5208 	    !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
5209 		return -EOPNOTSUPP;
5210 
5211 	wpa_printf(MSG_DEBUG, "nl80211: %s STA " MACSTR,
5212 		   params->set ? "Set" : "Add", MAC2STR(params->addr));
5213 	msg = nl80211_bss_msg(bss, 0, params->set ? NL80211_CMD_SET_STATION :
5214 			      NL80211_CMD_NEW_STATION);
5215 	if (!msg || nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->addr))
5216 		goto fail;
5217 
5218 	/*
5219 	 * Set the below properties only in one of the following cases:
5220 	 * 1. New station is added, already associated.
5221 	 * 2. Set WPA_STA_TDLS_PEER station.
5222 	 * 3. Set an already added unassociated station, if driver supports
5223 	 * full AP client state. (Set these properties after station became
5224 	 * associated will be rejected by the driver).
5225 	 */
5226 	if (!params->set || (params->flags & WPA_STA_TDLS_PEER) ||
5227 	    (params->set && FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags) &&
5228 	     (params->flags & WPA_STA_ASSOCIATED))) {
5229 		wpa_hexdump(MSG_DEBUG, "  * supported rates",
5230 			    params->supp_rates, params->supp_rates_len);
5231 		wpa_printf(MSG_DEBUG, "  * capability=0x%x",
5232 			   params->capability);
5233 		if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_RATES,
5234 			    params->supp_rates_len, params->supp_rates) ||
5235 		    nla_put_u16(msg, NL80211_ATTR_STA_CAPABILITY,
5236 				params->capability))
5237 			goto fail;
5238 
5239 		if (params->ht_capabilities) {
5240 			wpa_hexdump(MSG_DEBUG, "  * ht_capabilities",
5241 				    (u8 *) params->ht_capabilities,
5242 				    sizeof(*params->ht_capabilities));
5243 			if (nla_put(msg, NL80211_ATTR_HT_CAPABILITY,
5244 				    sizeof(*params->ht_capabilities),
5245 				    params->ht_capabilities))
5246 				goto fail;
5247 		}
5248 
5249 		if (params->vht_capabilities) {
5250 			wpa_hexdump(MSG_DEBUG, "  * vht_capabilities",
5251 				    (u8 *) params->vht_capabilities,
5252 				    sizeof(*params->vht_capabilities));
5253 			if (nla_put(msg, NL80211_ATTR_VHT_CAPABILITY,
5254 				    sizeof(*params->vht_capabilities),
5255 				    params->vht_capabilities))
5256 				goto fail;
5257 		}
5258 
5259 		if (params->he_capab) {
5260 			wpa_hexdump(MSG_DEBUG, "  * he_capab",
5261 				    params->he_capab, params->he_capab_len);
5262 			if (nla_put(msg, NL80211_ATTR_HE_CAPABILITY,
5263 				    params->he_capab_len, params->he_capab))
5264 				goto fail;
5265 		}
5266 
5267 		if (params->he_6ghz_capab) {
5268 			wpa_hexdump(MSG_DEBUG, "  * he_6ghz_capab",
5269 				    params->he_6ghz_capab,
5270 				    sizeof(*params->he_6ghz_capab));
5271 			if (nla_put(msg, NL80211_ATTR_HE_6GHZ_CAPABILITY,
5272 				    sizeof(*params->he_6ghz_capab),
5273 				    params->he_6ghz_capab))
5274 				goto fail;
5275 		}
5276 
5277 		if (params->eht_capab) {
5278 			wpa_hexdump(MSG_DEBUG, "  * eht_capab",
5279 				    params->eht_capab, params->eht_capab_len);
5280 			if (nla_put(msg, NL80211_ATTR_EHT_CAPABILITY,
5281 				    params->eht_capab_len, params->eht_capab))
5282 				goto fail;
5283 		}
5284 
5285 		if (params->ext_capab) {
5286 			wpa_hexdump(MSG_DEBUG, "  * ext_capab",
5287 				    params->ext_capab, params->ext_capab_len);
5288 			if (nla_put(msg, NL80211_ATTR_STA_EXT_CAPABILITY,
5289 				    params->ext_capab_len, params->ext_capab))
5290 				goto fail;
5291 		}
5292 
5293 		if (is_ap_interface(drv->nlmode) &&
5294 		    nla_put_u8(msg, NL80211_ATTR_STA_SUPPORT_P2P_PS,
5295 			       params->support_p2p_ps ?
5296 			       NL80211_P2P_PS_SUPPORTED :
5297 			       NL80211_P2P_PS_UNSUPPORTED))
5298 			goto fail;
5299 	}
5300 	if (!params->set) {
5301 		if (params->aid) {
5302 			wpa_printf(MSG_DEBUG, "  * aid=%u", params->aid);
5303 			if (nla_put_u16(msg, NL80211_ATTR_STA_AID, params->aid))
5304 				goto fail;
5305 		} else {
5306 			/*
5307 			 * cfg80211 validates that AID is non-zero, so we have
5308 			 * to make this a non-zero value for the TDLS case where
5309 			 * a stub STA entry is used for now and for a station
5310 			 * that is still not associated.
5311 			 */
5312 			wpa_printf(MSG_DEBUG, "  * aid=1 (%s workaround)",
5313 				   (params->flags & WPA_STA_TDLS_PEER) ?
5314 				   "TDLS" : "UNASSOC_STA");
5315 			if (nla_put_u16(msg, NL80211_ATTR_STA_AID, 1))
5316 				goto fail;
5317 		}
5318 		wpa_printf(MSG_DEBUG, "  * listen_interval=%u",
5319 			   params->listen_interval);
5320 		if (nla_put_u16(msg, NL80211_ATTR_STA_LISTEN_INTERVAL,
5321 				params->listen_interval))
5322 			goto fail;
5323 	} else if (params->aid && (params->flags & WPA_STA_TDLS_PEER)) {
5324 		wpa_printf(MSG_DEBUG, "  * peer_aid=%u", params->aid);
5325 		if (nla_put_u16(msg, NL80211_ATTR_PEER_AID, params->aid))
5326 			goto fail;
5327 	} else if (FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags) &&
5328 		   (params->flags & WPA_STA_ASSOCIATED)) {
5329 		wpa_printf(MSG_DEBUG, "  * aid=%u", params->aid);
5330 		wpa_printf(MSG_DEBUG, "  * listen_interval=%u",
5331 			   params->listen_interval);
5332 		if (nla_put_u16(msg, NL80211_ATTR_STA_AID, params->aid) ||
5333 		    nla_put_u16(msg, NL80211_ATTR_STA_LISTEN_INTERVAL,
5334 				params->listen_interval))
5335 			goto fail;
5336 	}
5337 
5338 	if (params->vht_opmode_enabled) {
5339 		wpa_printf(MSG_DEBUG, "  * opmode=%u", params->vht_opmode);
5340 		if (nla_put_u8(msg, NL80211_ATTR_OPMODE_NOTIF,
5341 			       params->vht_opmode))
5342 			goto fail;
5343 	}
5344 
5345 	if (params->supp_channels) {
5346 		wpa_hexdump(MSG_DEBUG, "  * supported channels",
5347 			    params->supp_channels, params->supp_channels_len);
5348 		if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_CHANNELS,
5349 			    params->supp_channels_len, params->supp_channels))
5350 			goto fail;
5351 	}
5352 
5353 	if (params->supp_oper_classes) {
5354 		wpa_hexdump(MSG_DEBUG, "  * supported operating classes",
5355 			    params->supp_oper_classes,
5356 			    params->supp_oper_classes_len);
5357 		if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES,
5358 			    params->supp_oper_classes_len,
5359 			    params->supp_oper_classes))
5360 			goto fail;
5361 	}
5362 
5363 	os_memset(&upd, 0, sizeof(upd));
5364 	upd.set = sta_flags_nl80211(params->flags);
5365 	upd.mask = upd.set | sta_flags_nl80211(params->flags_mask);
5366 
5367 	/*
5368 	 * If the driver doesn't support full AP client state, ignore ASSOC/AUTH
5369 	 * flags, as nl80211 driver moves a new station, by default, into
5370 	 * associated state.
5371 	 *
5372 	 * On the other hand, if the driver supports that feature and the
5373 	 * station is added in unauthenticated state, set the
5374 	 * authenticated/associated bits in the mask to prevent moving this
5375 	 * station to associated state before it is actually associated.
5376 	 *
5377 	 * This is irrelevant for mesh mode where the station is added to the
5378 	 * driver as authenticated already, and ASSOCIATED isn't part of the
5379 	 * nl80211 API.
5380 	 */
5381 	if (!is_mesh_interface(drv->nlmode)) {
5382 		if (!FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags)) {
5383 			wpa_printf(MSG_DEBUG,
5384 				   "nl80211: Ignore ASSOC/AUTH flags since driver doesn't support full AP client state");
5385 			upd.mask &= ~(BIT(NL80211_STA_FLAG_ASSOCIATED) |
5386 				      BIT(NL80211_STA_FLAG_AUTHENTICATED));
5387 		} else if (!params->set &&
5388 			   !(params->flags & WPA_STA_TDLS_PEER)) {
5389 			if (!(params->flags & WPA_STA_AUTHENTICATED))
5390 				upd.mask |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
5391 			if (!(params->flags & WPA_STA_ASSOCIATED))
5392 				upd.mask |= BIT(NL80211_STA_FLAG_ASSOCIATED);
5393 		}
5394 #ifdef CONFIG_MESH
5395 	} else {
5396 		if (params->plink_state == PLINK_ESTAB && params->peer_aid) {
5397 			ret = nla_put_u16(msg, NL80211_ATTR_MESH_PEER_AID,
5398 					  params->peer_aid);
5399 			if (ret)
5400 				goto fail;
5401 		}
5402 #endif /* CONFIG_MESH */
5403 	}
5404 
5405 	wpa_printf(MSG_DEBUG, "  * flags set=0x%x mask=0x%x",
5406 		   upd.set, upd.mask);
5407 	if (nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd))
5408 		goto fail;
5409 
5410 #ifdef CONFIG_MESH
5411 	if (params->plink_state &&
5412 	    nla_put_u8(msg, NL80211_ATTR_STA_PLINK_STATE,
5413 		       sta_plink_state_nl80211(params->plink_state)))
5414 		goto fail;
5415 #endif /* CONFIG_MESH */
5416 
5417 	if ((!params->set || (params->flags & WPA_STA_TDLS_PEER) ||
5418 	     FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags)) &&
5419 	     (params->flags & WPA_STA_WMM)) {
5420 		struct nlattr *wme = nla_nest_start(msg, NL80211_ATTR_STA_WME);
5421 
5422 		wpa_printf(MSG_DEBUG, "  * qosinfo=0x%x", params->qosinfo);
5423 		if (!wme ||
5424 		    nla_put_u8(msg, NL80211_STA_WME_UAPSD_QUEUES,
5425 			       params->qosinfo & WMM_QOSINFO_STA_AC_MASK) ||
5426 		    nla_put_u8(msg, NL80211_STA_WME_MAX_SP,
5427 			       (params->qosinfo >> WMM_QOSINFO_STA_SP_SHIFT) &
5428 			       WMM_QOSINFO_STA_SP_MASK))
5429 			goto fail;
5430 		nla_nest_end(msg, wme);
5431 	}
5432 
5433 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
5434 	msg = NULL;
5435 	if (ret)
5436 		wpa_printf(MSG_DEBUG, "nl80211: NL80211_CMD_%s_STATION "
5437 			   "result: %d (%s)", params->set ? "SET" : "NEW", ret,
5438 			   strerror(-ret));
5439 	if (ret == -EEXIST)
5440 		ret = 0;
5441 fail:
5442 	nlmsg_free(msg);
5443 	return ret;
5444 }
5445 
5446 
rtnl_neigh_delete_fdb_entry(struct i802_bss * bss,const u8 * addr)5447 static void rtnl_neigh_delete_fdb_entry(struct i802_bss *bss, const u8 *addr)
5448 {
5449 #ifdef CONFIG_LIBNL3_ROUTE
5450 	struct wpa_driver_nl80211_data *drv = bss->drv;
5451 	struct rtnl_neigh *rn;
5452 	struct nl_addr *nl_addr;
5453 	int err;
5454 
5455 	rn = rtnl_neigh_alloc();
5456 	if (!rn)
5457 		return;
5458 
5459 	rtnl_neigh_set_family(rn, AF_BRIDGE);
5460 	rtnl_neigh_set_ifindex(rn, bss->ifindex);
5461 	nl_addr = nl_addr_build(AF_BRIDGE, (void *) addr, ETH_ALEN);
5462 	if (!nl_addr) {
5463 		rtnl_neigh_put(rn);
5464 		return;
5465 	}
5466 	rtnl_neigh_set_lladdr(rn, nl_addr);
5467 
5468 	err = rtnl_neigh_delete(drv->rtnl_sk, rn, 0);
5469 	if (err < 0) {
5470 		wpa_printf(MSG_DEBUG, "nl80211: bridge FDB entry delete for "
5471 			   MACSTR " ifindex=%d failed: %s", MAC2STR(addr),
5472 			   bss->ifindex, nl_geterror(err));
5473 	} else {
5474 		wpa_printf(MSG_DEBUG, "nl80211: deleted bridge FDB entry for "
5475 			   MACSTR, MAC2STR(addr));
5476 	}
5477 
5478 	nl_addr_put(nl_addr);
5479 	rtnl_neigh_put(rn);
5480 #endif /* CONFIG_LIBNL3_ROUTE */
5481 }
5482 
5483 
wpa_driver_nl80211_sta_remove(struct i802_bss * bss,const u8 * addr,int deauth,u16 reason_code)5484 static int wpa_driver_nl80211_sta_remove(struct i802_bss *bss, const u8 *addr,
5485 					 int deauth, u16 reason_code)
5486 {
5487 	struct wpa_driver_nl80211_data *drv = bss->drv;
5488 	struct nl_msg *msg;
5489 	int ret;
5490 
5491 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_DEL_STATION)) ||
5492 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
5493 	    (deauth == 0 &&
5494 	     nla_put_u8(msg, NL80211_ATTR_MGMT_SUBTYPE,
5495 			WLAN_FC_STYPE_DISASSOC)) ||
5496 	    (deauth == 1 &&
5497 	     nla_put_u8(msg, NL80211_ATTR_MGMT_SUBTYPE,
5498 			WLAN_FC_STYPE_DEAUTH)) ||
5499 	    (reason_code &&
5500 	     nla_put_u16(msg, NL80211_ATTR_REASON_CODE, reason_code))) {
5501 		nlmsg_free(msg);
5502 		return -ENOBUFS;
5503 	}
5504 
5505 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
5506 	wpa_printf(MSG_DEBUG, "nl80211: sta_remove -> DEL_STATION %s " MACSTR
5507 		   " --> %d (%s)",
5508 		   bss->ifname, MAC2STR(addr), ret, strerror(-ret));
5509 
5510 	if (drv->rtnl_sk)
5511 		rtnl_neigh_delete_fdb_entry(bss, addr);
5512 
5513 	if (ret == -ENOENT)
5514 		return 0;
5515 	return ret;
5516 }
5517 
5518 
nl80211_remove_iface(struct wpa_driver_nl80211_data * drv,int ifidx)5519 void nl80211_remove_iface(struct wpa_driver_nl80211_data *drv, int ifidx)
5520 {
5521 	struct nl_msg *msg;
5522 	struct wpa_driver_nl80211_data *drv2;
5523 
5524 	wpa_printf(MSG_DEBUG, "nl80211: Remove interface ifindex=%d", ifidx);
5525 
5526 	/* stop listening for EAPOL on this interface */
5527 	dl_list_for_each(drv2, &drv->global->interfaces,
5528 			 struct wpa_driver_nl80211_data, list)
5529 	{
5530 		del_ifidx(drv2, ifidx, IFIDX_ANY);
5531 		/* Remove all bridges learned for this iface */
5532 		del_ifidx(drv2, IFIDX_ANY, ifidx);
5533 	}
5534 
5535 	msg = nl80211_ifindex_msg(drv, ifidx, 0, NL80211_CMD_DEL_INTERFACE);
5536 	if (send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL) == 0)
5537 		return;
5538 	wpa_printf(MSG_ERROR, "Failed to remove interface (ifidx=%d)", ifidx);
5539 }
5540 
5541 
nl80211_iftype_str(enum nl80211_iftype mode)5542 const char * nl80211_iftype_str(enum nl80211_iftype mode)
5543 {
5544 	switch (mode) {
5545 	case NL80211_IFTYPE_ADHOC:
5546 		return "ADHOC";
5547 	case NL80211_IFTYPE_STATION:
5548 		return "STATION";
5549 	case NL80211_IFTYPE_AP:
5550 		return "AP";
5551 	case NL80211_IFTYPE_AP_VLAN:
5552 		return "AP_VLAN";
5553 	case NL80211_IFTYPE_WDS:
5554 		return "WDS";
5555 	case NL80211_IFTYPE_MONITOR:
5556 		return "MONITOR";
5557 	case NL80211_IFTYPE_MESH_POINT:
5558 		return "MESH_POINT";
5559 	case NL80211_IFTYPE_P2P_CLIENT:
5560 		return "P2P_CLIENT";
5561 	case NL80211_IFTYPE_P2P_GO:
5562 		return "P2P_GO";
5563 	case NL80211_IFTYPE_P2P_DEVICE:
5564 		return "P2P_DEVICE";
5565 	case NL80211_IFTYPE_OCB:
5566 		return "OCB";
5567 	case NL80211_IFTYPE_NAN:
5568 		return "NAN";
5569 	default:
5570 		return "unknown";
5571 	}
5572 }
5573 
5574 
nl80211_create_iface_once(struct wpa_driver_nl80211_data * drv,const char * ifname,enum nl80211_iftype iftype,const u8 * addr,int wds,int (* handler)(struct nl_msg *,void *),void * arg)5575 static int nl80211_create_iface_once(struct wpa_driver_nl80211_data *drv,
5576 				     const char *ifname,
5577 				     enum nl80211_iftype iftype,
5578 				     const u8 *addr, int wds,
5579 				     int (*handler)(struct nl_msg *, void *),
5580 				     void *arg)
5581 {
5582 	struct nl_msg *msg;
5583 	int ifidx;
5584 	int ret = -ENOBUFS;
5585 
5586 	wpa_printf(MSG_DEBUG, "nl80211: Create interface iftype %d (%s)",
5587 		   iftype, nl80211_iftype_str(iftype));
5588 
5589 	msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_NEW_INTERFACE);
5590 	if (!msg ||
5591 	    nla_put_string(msg, NL80211_ATTR_IFNAME, ifname) ||
5592 	    nla_put_u32(msg, NL80211_ATTR_IFTYPE, iftype))
5593 		goto fail;
5594 
5595 	if (iftype == NL80211_IFTYPE_MONITOR) {
5596 		struct nlattr *flags;
5597 
5598 		flags = nla_nest_start(msg, NL80211_ATTR_MNTR_FLAGS);
5599 		if (!flags ||
5600 		    nla_put_flag(msg, NL80211_MNTR_FLAG_COOK_FRAMES))
5601 			goto fail;
5602 
5603 		nla_nest_end(msg, flags);
5604 	} else if (wds) {
5605 		if (nla_put_u8(msg, NL80211_ATTR_4ADDR, wds))
5606 			goto fail;
5607 	}
5608 
5609 	/*
5610 	 * Tell cfg80211 that the interface belongs to the socket that created
5611 	 * it, and the interface should be deleted when the socket is closed.
5612 	 */
5613 	if (nla_put_flag(msg, NL80211_ATTR_IFACE_SOCKET_OWNER))
5614 		goto fail;
5615 
5616 	if ((addr && iftype == NL80211_IFTYPE_P2P_DEVICE) &&
5617 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
5618 		goto fail;
5619 
5620 	ret = send_and_recv_msgs(drv, msg, handler, arg, NULL, NULL);
5621 	msg = NULL;
5622 	if (ret) {
5623 	fail:
5624 		nlmsg_free(msg);
5625 		wpa_printf(MSG_ERROR, "Failed to create interface %s: %d (%s)",
5626 			   ifname, ret, strerror(-ret));
5627 		return ret;
5628 	}
5629 
5630 	if (iftype == NL80211_IFTYPE_P2P_DEVICE)
5631 		return 0;
5632 
5633 	ifidx = if_nametoindex(ifname);
5634 	wpa_printf(MSG_DEBUG, "nl80211: New interface %s created: ifindex=%d",
5635 		   ifname, ifidx);
5636 
5637 	if (ifidx <= 0)
5638 		return -1;
5639 
5640 	/*
5641 	 * Some virtual interfaces need to process EAPOL packets and events on
5642 	 * the parent interface. This is used mainly with hostapd.
5643 	 */
5644 	if (drv->hostapd ||
5645 	    iftype == NL80211_IFTYPE_AP_VLAN ||
5646 	    iftype == NL80211_IFTYPE_WDS ||
5647 	    iftype == NL80211_IFTYPE_MONITOR) {
5648 		/* start listening for EAPOL on this interface */
5649 		add_ifidx(drv, ifidx, IFIDX_ANY);
5650 	}
5651 
5652 	if (addr && iftype != NL80211_IFTYPE_MONITOR &&
5653 	    linux_set_ifhwaddr(drv->global->ioctl_sock, ifname, addr)) {
5654 		nl80211_remove_iface(drv, ifidx);
5655 		return -1;
5656 	}
5657 
5658 	return ifidx;
5659 }
5660 
5661 
nl80211_create_iface(struct wpa_driver_nl80211_data * drv,const char * ifname,enum nl80211_iftype iftype,const u8 * addr,int wds,int (* handler)(struct nl_msg *,void *),void * arg,int use_existing)5662 int nl80211_create_iface(struct wpa_driver_nl80211_data *drv,
5663 			 const char *ifname, enum nl80211_iftype iftype,
5664 			 const u8 *addr, int wds,
5665 			 int (*handler)(struct nl_msg *, void *),
5666 			 void *arg, int use_existing)
5667 {
5668 	int ret;
5669 
5670 	ret = nl80211_create_iface_once(drv, ifname, iftype, addr, wds, handler,
5671 					arg);
5672 
5673 	/* if error occurred and interface exists already */
5674 	if (ret == -ENFILE && if_nametoindex(ifname)) {
5675 		if (use_existing) {
5676 			wpa_printf(MSG_DEBUG, "nl80211: Continue using existing interface %s",
5677 				   ifname);
5678 			if (addr && iftype != NL80211_IFTYPE_MONITOR &&
5679 			    linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
5680 					       addr) < 0 &&
5681 			    (linux_set_iface_flags(drv->global->ioctl_sock,
5682 						   ifname, 0) < 0 ||
5683 			     linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
5684 						addr) < 0 ||
5685 			     linux_set_iface_flags(drv->global->ioctl_sock,
5686 						   ifname, 1) < 0))
5687 					return -1;
5688 			return -ENFILE;
5689 		}
5690 		wpa_printf(MSG_INFO, "Try to remove and re-create %s", ifname);
5691 
5692 		/* Try to remove the interface that was already there. */
5693 		nl80211_remove_iface(drv, if_nametoindex(ifname));
5694 
5695 		/* Try to create the interface again */
5696 		ret = nl80211_create_iface_once(drv, ifname, iftype, addr,
5697 						wds, handler, arg);
5698 	}
5699 
5700 	if (ret >= 0 && is_p2p_net_interface(iftype)) {
5701 		wpa_printf(MSG_DEBUG,
5702 			   "nl80211: Interface %s created for P2P - disable 11b rates",
5703 			   ifname);
5704 		nl80211_disable_11b_rates(drv, ret, 1);
5705 	}
5706 
5707 	return ret;
5708 }
5709 
5710 
nl80211_setup_ap(struct i802_bss * bss)5711 static int nl80211_setup_ap(struct i802_bss *bss)
5712 {
5713 	struct wpa_driver_nl80211_data *drv = bss->drv;
5714 
5715 	wpa_printf(MSG_DEBUG, "nl80211: Setup AP(%s) - device_ap_sme=%d use_monitor=%d",
5716 		   bss->ifname, drv->device_ap_sme, drv->use_monitor);
5717 
5718 	/*
5719 	 * Disable Probe Request reporting unless we need it in this way for
5720 	 * devices that include the AP SME, in the other case (unless using
5721 	 * monitor iface) we'll get it through the nl_mgmt socket instead.
5722 	 */
5723 	if (!drv->device_ap_sme)
5724 		wpa_driver_nl80211_probe_req_report(bss, 0);
5725 
5726 	if (!drv->device_ap_sme && !drv->use_monitor)
5727 		if (nl80211_mgmt_subscribe_ap(bss))
5728 			return -1;
5729 
5730 	if (drv->device_ap_sme && !drv->use_monitor)
5731 		if (nl80211_mgmt_subscribe_ap_dev_sme(bss))
5732 			wpa_printf(MSG_DEBUG,
5733 				   "nl80211: Failed to subscribe for mgmt frames from SME driver - trying to run without it");
5734 
5735 	if (!drv->device_ap_sme && drv->use_monitor &&
5736 	    nl80211_create_monitor_interface(drv) &&
5737 	    !drv->device_ap_sme)
5738 		return -1;
5739 
5740 	if (drv->device_ap_sme &&
5741 	    wpa_driver_nl80211_probe_req_report(bss, 1) < 0) {
5742 		wpa_printf(MSG_DEBUG, "nl80211: Failed to enable "
5743 			   "Probe Request frame reporting in AP mode");
5744 		/* Try to survive without this */
5745 	}
5746 
5747 	return 0;
5748 }
5749 
5750 
nl80211_teardown_ap(struct i802_bss * bss)5751 static void nl80211_teardown_ap(struct i802_bss *bss)
5752 {
5753 	struct wpa_driver_nl80211_data *drv = bss->drv;
5754 
5755 	wpa_printf(MSG_DEBUG, "nl80211: Teardown AP(%s) - device_ap_sme=%d use_monitor=%d",
5756 		   bss->ifname, drv->device_ap_sme, drv->use_monitor);
5757 	if (drv->device_ap_sme) {
5758 		wpa_driver_nl80211_probe_req_report(bss, 0);
5759 		if (!drv->use_monitor)
5760 			nl80211_mgmt_unsubscribe(bss, "AP teardown (dev SME)");
5761 	} else if (drv->use_monitor)
5762 		nl80211_remove_monitor_interface(drv);
5763 	else
5764 		nl80211_mgmt_unsubscribe(bss, "AP teardown");
5765 
5766 	nl80211_put_wiphy_data_ap(bss);
5767 	bss->beacon_set = 0;
5768 }
5769 
5770 
nl80211_tx_control_port(void * priv,const u8 * dest,u16 proto,const u8 * buf,size_t len,int no_encrypt)5771 static int nl80211_tx_control_port(void *priv, const u8 *dest,
5772 				   u16 proto, const u8 *buf, size_t len,
5773 				   int no_encrypt)
5774 {
5775 	struct nl80211_ack_ext_arg ext_arg;
5776 	struct i802_bss *bss = priv;
5777 	struct nl_msg *msg;
5778 	u64 cookie = 0;
5779 	int ret;
5780 
5781 	wpa_printf(MSG_DEBUG,
5782 		   "nl80211: Send over control port dest=" MACSTR
5783 		   " proto=0x%04x len=%u no_encrypt=%d",
5784 		   MAC2STR(dest), proto, (unsigned int) len, no_encrypt);
5785 
5786 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_CONTROL_PORT_FRAME);
5787 	if (!msg ||
5788 	    nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, proto) ||
5789 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, dest) ||
5790 	    nla_put(msg, NL80211_ATTR_FRAME, len, buf) ||
5791 	    (no_encrypt &&
5792 	     nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT))) {
5793 		nlmsg_free(msg);
5794 		return -ENOBUFS;
5795 	}
5796 
5797 	os_memset(&ext_arg, 0, sizeof(struct nl80211_ack_ext_arg));
5798 	ext_arg.ext_data = &cookie;
5799 	ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL,
5800 				 ack_handler_cookie, &ext_arg);
5801 	if (ret) {
5802 		wpa_printf(MSG_DEBUG,
5803 			   "nl80211: tx_control_port failed: ret=%d (%s)",
5804 			   ret, strerror(-ret));
5805 	} else {
5806 		struct wpa_driver_nl80211_data *drv = bss->drv;
5807 
5808 		wpa_printf(MSG_DEBUG,
5809 			   "nl80211: tx_control_port cookie=0x%llx",
5810 			   (long long unsigned int) cookie);
5811 		drv->eapol_tx_cookie = cookie;
5812 	}
5813 
5814 	return ret;
5815 }
5816 
5817 
nl80211_send_eapol_data(struct i802_bss * bss,const u8 * addr,const u8 * data,size_t data_len)5818 static int nl80211_send_eapol_data(struct i802_bss *bss,
5819 				   const u8 *addr, const u8 *data,
5820 				   size_t data_len)
5821 {
5822 	struct sockaddr_ll ll;
5823 	int ret;
5824 
5825 	if (bss->drv->eapol_tx_sock < 0) {
5826 		wpa_printf(MSG_DEBUG, "nl80211: No socket to send EAPOL");
5827 		return -1;
5828 	}
5829 
5830 	os_memset(&ll, 0, sizeof(ll));
5831 	ll.sll_family = AF_PACKET;
5832 	ll.sll_ifindex = bss->ifindex;
5833 	ll.sll_protocol = htons(ETH_P_PAE);
5834 	ll.sll_halen = ETH_ALEN;
5835 	os_memcpy(ll.sll_addr, addr, ETH_ALEN);
5836 	ret = sendto(bss->drv->eapol_tx_sock, data, data_len, 0,
5837 		     (struct sockaddr *) &ll, sizeof(ll));
5838 	if (ret < 0)
5839 		wpa_printf(MSG_ERROR, "nl80211: EAPOL TX: %s",
5840 			   strerror(errno));
5841 
5842 	return ret;
5843 }
5844 
5845 
5846 static const u8 rfc1042_header[6] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
5847 
wpa_driver_nl80211_hapd_send_eapol(void * priv,const u8 * addr,const u8 * data,size_t data_len,int encrypt,const u8 * own_addr,u32 flags)5848 static int wpa_driver_nl80211_hapd_send_eapol(
5849 	void *priv, const u8 *addr, const u8 *data,
5850 	size_t data_len, int encrypt, const u8 *own_addr, u32 flags)
5851 {
5852 	struct i802_bss *bss = priv;
5853 	struct wpa_driver_nl80211_data *drv = bss->drv;
5854 	struct ieee80211_hdr *hdr;
5855 	size_t len;
5856 	u8 *pos;
5857 	int res;
5858 	int qos = flags & WPA_STA_WMM;
5859 
5860 	/* For now, disable EAPOL TX over control port in AP mode by default
5861 	 * since it does not provide TX status notifications. */
5862 	if (drv->control_port_ap &&
5863 	    (drv->capa.flags & WPA_DRIVER_FLAGS_CONTROL_PORT))
5864 		return nl80211_tx_control_port(bss, addr, ETH_P_EAPOL,
5865 					       data, data_len, !encrypt);
5866 
5867 	if (drv->device_ap_sme || !drv->use_monitor)
5868 		return nl80211_send_eapol_data(bss, addr, data, data_len);
5869 
5870 	len = sizeof(*hdr) + (qos ? 2 : 0) + sizeof(rfc1042_header) + 2 +
5871 		data_len;
5872 	hdr = os_zalloc(len);
5873 	if (hdr == NULL) {
5874 		wpa_printf(MSG_INFO, "nl80211: Failed to allocate EAPOL buffer(len=%lu)",
5875 			   (unsigned long) len);
5876 		return -1;
5877 	}
5878 
5879 	hdr->frame_control =
5880 		IEEE80211_FC(WLAN_FC_TYPE_DATA, WLAN_FC_STYPE_DATA);
5881 	hdr->frame_control |= host_to_le16(WLAN_FC_FROMDS);
5882 	if (encrypt)
5883 		hdr->frame_control |= host_to_le16(WLAN_FC_ISWEP);
5884 	if (qos) {
5885 		hdr->frame_control |=
5886 			host_to_le16(WLAN_FC_STYPE_QOS_DATA << 4);
5887 	}
5888 
5889 	memcpy(hdr->IEEE80211_DA_FROMDS, addr, ETH_ALEN);
5890 	memcpy(hdr->IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
5891 	memcpy(hdr->IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
5892 	pos = (u8 *) (hdr + 1);
5893 
5894 	if (qos) {
5895 		/* Set highest priority in QoS header */
5896 		pos[0] = 7;
5897 		pos[1] = 0;
5898 		pos += 2;
5899 	}
5900 
5901 	memcpy(pos, rfc1042_header, sizeof(rfc1042_header));
5902 	pos += sizeof(rfc1042_header);
5903 	WPA_PUT_BE16(pos, ETH_P_PAE);
5904 	pos += 2;
5905 	memcpy(pos, data, data_len);
5906 
5907 	res = nl80211_send_monitor(drv, hdr, len, encrypt, 0);
5908 	if (res < 0) {
5909 		wpa_printf(MSG_ERROR,
5910 			   "hapd_send_eapol - packet len: %lu - failed",
5911 			   (unsigned long) len);
5912 	}
5913 	os_free(hdr);
5914 
5915 	return res;
5916 }
5917 
5918 
wpa_driver_nl80211_sta_set_flags(void * priv,const u8 * addr,unsigned int total_flags,unsigned int flags_or,unsigned int flags_and)5919 static int wpa_driver_nl80211_sta_set_flags(void *priv, const u8 *addr,
5920 					    unsigned int total_flags,
5921 					    unsigned int flags_or,
5922 					    unsigned int flags_and)
5923 {
5924 	struct i802_bss *bss = priv;
5925 	struct nl_msg *msg;
5926 	struct nlattr *flags;
5927 	struct nl80211_sta_flag_update upd;
5928 
5929 	wpa_printf(MSG_DEBUG, "nl80211: Set STA flags - ifname=%s addr=" MACSTR
5930 		   " total_flags=0x%x flags_or=0x%x flags_and=0x%x authorized=%d",
5931 		   bss->ifname, MAC2STR(addr), total_flags, flags_or, flags_and,
5932 		   !!(total_flags & WPA_STA_AUTHORIZED));
5933 
5934 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
5935 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
5936 		goto fail;
5937 
5938 	/*
5939 	 * Backwards compatibility version using NL80211_ATTR_STA_FLAGS. This
5940 	 * can be removed eventually.
5941 	 */
5942 	flags = nla_nest_start(msg, NL80211_ATTR_STA_FLAGS);
5943 	if (!flags ||
5944 	    ((total_flags & WPA_STA_AUTHORIZED) &&
5945 	     nla_put_flag(msg, NL80211_STA_FLAG_AUTHORIZED)) ||
5946 	    ((total_flags & WPA_STA_WMM) &&
5947 	     nla_put_flag(msg, NL80211_STA_FLAG_WME)) ||
5948 	    ((total_flags & WPA_STA_SHORT_PREAMBLE) &&
5949 	     nla_put_flag(msg, NL80211_STA_FLAG_SHORT_PREAMBLE)) ||
5950 	    ((total_flags & WPA_STA_MFP) &&
5951 	     nla_put_flag(msg, NL80211_STA_FLAG_MFP)) ||
5952 	    ((total_flags & WPA_STA_TDLS_PEER) &&
5953 	     nla_put_flag(msg, NL80211_STA_FLAG_TDLS_PEER)))
5954 		goto fail;
5955 
5956 	nla_nest_end(msg, flags);
5957 
5958 	os_memset(&upd, 0, sizeof(upd));
5959 	upd.mask = sta_flags_nl80211(flags_or | ~flags_and);
5960 	upd.set = sta_flags_nl80211(flags_or);
5961 	if (nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd))
5962 		goto fail;
5963 
5964 	return send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
5965 fail:
5966 	nlmsg_free(msg);
5967 	return -ENOBUFS;
5968 }
5969 
5970 
driver_nl80211_sta_set_airtime_weight(void * priv,const u8 * addr,unsigned int weight)5971 static int driver_nl80211_sta_set_airtime_weight(void *priv, const u8 *addr,
5972 						 unsigned int weight)
5973 {
5974 	struct i802_bss *bss = priv;
5975 	struct nl_msg *msg;
5976 	int ret;
5977 
5978 	wpa_printf(MSG_DEBUG,
5979 		   "nl80211: Set STA airtime weight - ifname=%s addr=" MACSTR
5980 		   " weight=%u", bss->ifname, MAC2STR(addr), weight);
5981 
5982 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
5983 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
5984 	    nla_put_u16(msg, NL80211_ATTR_AIRTIME_WEIGHT, weight))
5985 		goto fail;
5986 
5987 	ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
5988 	if (ret) {
5989 		wpa_printf(MSG_DEBUG,
5990 			   "nl80211: SET_STATION[AIRTIME_WEIGHT] failed: ret=%d (%s)",
5991 			   ret, strerror(-ret));
5992 	}
5993 	return ret;
5994 fail:
5995 	nlmsg_free(msg);
5996 	return -ENOBUFS;
5997 }
5998 
5999 
wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params)6000 static int wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data *drv,
6001 				 struct wpa_driver_associate_params *params)
6002 {
6003 	enum nl80211_iftype nlmode, old_mode;
6004 
6005 	if (params->p2p) {
6006 		wpa_printf(MSG_DEBUG, "nl80211: Setup AP operations for P2P "
6007 			   "group (GO)");
6008 		nlmode = NL80211_IFTYPE_P2P_GO;
6009 	} else
6010 		nlmode = NL80211_IFTYPE_AP;
6011 
6012 	old_mode = drv->nlmode;
6013 	if (wpa_driver_nl80211_set_mode(drv->first_bss, nlmode)) {
6014 		nl80211_remove_monitor_interface(drv);
6015 		return -1;
6016 	}
6017 
6018 	if (params->freq.freq &&
6019 	    nl80211_set_channel(drv->first_bss, &params->freq, 0)) {
6020 		if (old_mode != nlmode)
6021 			wpa_driver_nl80211_set_mode(drv->first_bss, old_mode);
6022 		nl80211_remove_monitor_interface(drv);
6023 		return -1;
6024 	}
6025 
6026 	return 0;
6027 }
6028 
6029 
nl80211_leave_ibss(struct wpa_driver_nl80211_data * drv,int reset_mode)6030 static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv,
6031 			      int reset_mode)
6032 {
6033 	struct nl_msg *msg;
6034 	int ret;
6035 
6036 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_LEAVE_IBSS);
6037 	ret = send_and_recv_msgs_connect_handle(drv, msg, drv->first_bss, 1);
6038 	if (ret) {
6039 		wpa_printf(MSG_DEBUG, "nl80211: Leave IBSS failed: ret=%d "
6040 			   "(%s)", ret, strerror(-ret));
6041 	} else {
6042 		wpa_printf(MSG_DEBUG,
6043 			   "nl80211: Leave IBSS request sent successfully");
6044 	}
6045 
6046 	if (reset_mode &&
6047 	    wpa_driver_nl80211_set_mode(drv->first_bss,
6048 					NL80211_IFTYPE_STATION)) {
6049 		wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
6050 			   "station mode");
6051 	}
6052 
6053 	return ret;
6054 }
6055 
6056 
nl80211_ht_vht_overrides(struct nl_msg * msg,struct wpa_driver_associate_params * params)6057 static int nl80211_ht_vht_overrides(struct nl_msg *msg,
6058 				    struct wpa_driver_associate_params *params)
6059 {
6060 	if (params->disable_ht && nla_put_flag(msg, NL80211_ATTR_DISABLE_HT))
6061 		return -1;
6062 
6063 	if (params->htcaps && params->htcaps_mask) {
6064 		int sz = sizeof(struct ieee80211_ht_capabilities);
6065 		wpa_hexdump(MSG_DEBUG, "  * htcaps", params->htcaps, sz);
6066 		wpa_hexdump(MSG_DEBUG, "  * htcaps_mask",
6067 			    params->htcaps_mask, sz);
6068 		if (nla_put(msg, NL80211_ATTR_HT_CAPABILITY, sz,
6069 			    params->htcaps) ||
6070 		    nla_put(msg, NL80211_ATTR_HT_CAPABILITY_MASK, sz,
6071 			    params->htcaps_mask))
6072 			return -1;
6073 	}
6074 
6075 #ifdef CONFIG_VHT_OVERRIDES
6076 	if (params->disable_vht) {
6077 		wpa_printf(MSG_DEBUG, "  * VHT disabled");
6078 		if (nla_put_flag(msg, NL80211_ATTR_DISABLE_VHT))
6079 			return -1;
6080 	}
6081 
6082 	if (params->vhtcaps && params->vhtcaps_mask) {
6083 		int sz = sizeof(struct ieee80211_vht_capabilities);
6084 		wpa_hexdump(MSG_DEBUG, "  * vhtcaps", params->vhtcaps, sz);
6085 		wpa_hexdump(MSG_DEBUG, "  * vhtcaps_mask",
6086 			    params->vhtcaps_mask, sz);
6087 		if (nla_put(msg, NL80211_ATTR_VHT_CAPABILITY, sz,
6088 			    params->vhtcaps) ||
6089 		    nla_put(msg, NL80211_ATTR_VHT_CAPABILITY_MASK, sz,
6090 			    params->vhtcaps_mask))
6091 			return -1;
6092 	}
6093 #endif /* CONFIG_VHT_OVERRIDES */
6094 
6095 #ifdef CONFIG_HE_OVERRIDES
6096 	if (params->disable_he) {
6097 		wpa_printf(MSG_DEBUG, "  * HE disabled");
6098 		if (nla_put_flag(msg, NL80211_ATTR_DISABLE_HE))
6099 			return -1;
6100 	}
6101 #endif /* CONFIG_HE_OVERRIDES */
6102 
6103 	return 0;
6104 }
6105 
6106 
wpa_driver_nl80211_ibss(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params)6107 static int wpa_driver_nl80211_ibss(struct wpa_driver_nl80211_data *drv,
6108 				   struct wpa_driver_associate_params *params)
6109 {
6110 	struct nl_msg *msg;
6111 	int ret = -1;
6112 	int count = 0;
6113 
6114 	wpa_printf(MSG_DEBUG, "nl80211: Join IBSS (ifindex=%d)", drv->ifindex);
6115 
6116 	if (wpa_driver_nl80211_set_mode_ibss(drv->first_bss, &params->freq)) {
6117 		wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
6118 			   "IBSS mode");
6119 		return -1;
6120 	}
6121 
6122 retry:
6123 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_JOIN_IBSS)) ||
6124 	    params->ssid == NULL || params->ssid_len > sizeof(drv->ssid))
6125 		goto fail;
6126 
6127 	wpa_printf(MSG_DEBUG, "  * SSID=%s",
6128 		   wpa_ssid_txt(params->ssid, params->ssid_len));
6129 	if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid))
6130 		goto fail;
6131 	os_memcpy(drv->ssid, params->ssid, params->ssid_len);
6132 	drv->ssid_len = params->ssid_len;
6133 
6134 	if (nl80211_put_freq_params(msg, &params->freq) < 0 ||
6135 	    nl80211_put_beacon_int(msg, params->beacon_int))
6136 		goto fail;
6137 
6138 	ret = nl80211_set_conn_keys(params, msg);
6139 	if (ret)
6140 		goto fail;
6141 
6142 	if (params->bssid && params->fixed_bssid) {
6143 		wpa_printf(MSG_DEBUG, "  * BSSID=" MACSTR,
6144 			   MAC2STR(params->bssid));
6145 		if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
6146 			goto fail;
6147 	}
6148 
6149 	if (params->fixed_freq) {
6150 		wpa_printf(MSG_DEBUG, "  * fixed_freq");
6151 		if (nla_put_flag(msg, NL80211_ATTR_FREQ_FIXED))
6152 			goto fail;
6153 	}
6154 
6155 	if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
6156 	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
6157 	    params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
6158 	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256) {
6159 		wpa_printf(MSG_DEBUG, "  * control port");
6160 		if (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT))
6161 			goto fail;
6162 	}
6163 
6164 	if (params->wpa_ie) {
6165 		wpa_hexdump(MSG_DEBUG,
6166 			    "  * Extra IEs for Beacon/Probe Response frames",
6167 			    params->wpa_ie, params->wpa_ie_len);
6168 		if (nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len,
6169 			    params->wpa_ie))
6170 			goto fail;
6171 	}
6172 
6173 	ret = nl80211_ht_vht_overrides(msg, params);
6174 	if (ret < 0)
6175 		goto fail;
6176 
6177 	ret = send_and_recv_msgs_connect_handle(drv, msg, drv->first_bss, 1);
6178 	msg = NULL;
6179 	if (ret) {
6180 		wpa_printf(MSG_DEBUG, "nl80211: Join IBSS failed: ret=%d (%s)",
6181 			   ret, strerror(-ret));
6182 		count++;
6183 		if (ret == -EALREADY && count == 1) {
6184 			wpa_printf(MSG_DEBUG, "nl80211: Retry IBSS join after "
6185 				   "forced leave");
6186 			nl80211_leave_ibss(drv, 0);
6187 			nlmsg_free(msg);
6188 			goto retry;
6189 		}
6190 	} else {
6191 		wpa_printf(MSG_DEBUG,
6192 			   "nl80211: Join IBSS request sent successfully");
6193 	}
6194 
6195 fail:
6196 	nlmsg_free(msg);
6197 	return ret;
6198 }
6199 
6200 
nl80211_put_fils_connect_params(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct nl_msg * msg)6201 static int nl80211_put_fils_connect_params(struct wpa_driver_nl80211_data *drv,
6202 					   struct wpa_driver_associate_params *params,
6203 					   struct nl_msg *msg)
6204 {
6205 	if (params->fils_erp_username_len) {
6206 		wpa_hexdump_ascii(MSG_DEBUG, "  * FILS ERP EMSKname/username",
6207 				  params->fils_erp_username,
6208 				  params->fils_erp_username_len);
6209 		if (nla_put(msg, NL80211_ATTR_FILS_ERP_USERNAME,
6210 			    params->fils_erp_username_len,
6211 			    params->fils_erp_username))
6212 			return -1;
6213 	}
6214 
6215 	if (params->fils_erp_realm_len) {
6216 		wpa_hexdump_ascii(MSG_DEBUG, "  * FILS ERP Realm",
6217 				  params->fils_erp_realm,
6218 				  params->fils_erp_realm_len);
6219 		if (nla_put(msg, NL80211_ATTR_FILS_ERP_REALM,
6220 			    params->fils_erp_realm_len, params->fils_erp_realm))
6221 			return -1;
6222 	}
6223 
6224 	if (params->fils_erp_rrk_len) {
6225 		wpa_printf(MSG_DEBUG, "  * FILS ERP next seq %u",
6226 			   params->fils_erp_next_seq_num);
6227 		if (nla_put_u16(msg, NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM,
6228 				params->fils_erp_next_seq_num))
6229 			return -1;
6230 
6231 		wpa_printf(MSG_DEBUG, "  * FILS ERP rRK (len=%lu)",
6232 			   (unsigned long) params->fils_erp_rrk_len);
6233 		if (nla_put(msg, NL80211_ATTR_FILS_ERP_RRK,
6234 			    params->fils_erp_rrk_len, params->fils_erp_rrk))
6235 			return -1;
6236 	}
6237 
6238 	return 0;
6239 }
6240 
6241 
nl80211_connect_common(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct nl_msg * msg)6242 static int nl80211_connect_common(struct wpa_driver_nl80211_data *drv,
6243 				  struct wpa_driver_associate_params *params,
6244 				  struct nl_msg *msg)
6245 {
6246 	if (nla_put_flag(msg, NL80211_ATTR_IFACE_SOCKET_OWNER))
6247 		return -1;
6248 
6249 	if (params->bssid) {
6250 		wpa_printf(MSG_DEBUG, "  * bssid=" MACSTR,
6251 			   MAC2STR(params->bssid));
6252 		if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
6253 			return -1;
6254 	}
6255 
6256 	if (params->bssid_hint) {
6257 		wpa_printf(MSG_DEBUG, "  * bssid_hint=" MACSTR,
6258 			   MAC2STR(params->bssid_hint));
6259 		if (nla_put(msg, NL80211_ATTR_MAC_HINT, ETH_ALEN,
6260 			    params->bssid_hint))
6261 			return -1;
6262 	}
6263 
6264 	if (params->freq.freq) {
6265 		wpa_printf(MSG_DEBUG, "  * freq=%d", params->freq.freq);
6266 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ,
6267 				params->freq.freq))
6268 			return -1;
6269 		drv->assoc_freq = params->freq.freq;
6270 	} else
6271 		drv->assoc_freq = 0;
6272 
6273 	if (params->freq_hint) {
6274 		wpa_printf(MSG_DEBUG, "  * freq_hint=%d", params->freq_hint);
6275 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ_HINT,
6276 				params->freq_hint))
6277 			return -1;
6278 	}
6279 
6280 	if (params->freq.edmg.channels && params->freq.edmg.bw_config) {
6281 		wpa_printf(MSG_DEBUG,
6282 			   "  * EDMG configuration: channels=0x%x bw_config=%d",
6283 			   params->freq.edmg.channels,
6284 			   params->freq.edmg.bw_config);
6285 		if (nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_CHANNELS,
6286 			       params->freq.edmg.channels) ||
6287 		    nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_BW_CONFIG,
6288 			       params->freq.edmg.bw_config))
6289 			return -1;
6290 	}
6291 
6292 	if (params->bg_scan_period >= 0) {
6293 		wpa_printf(MSG_DEBUG, "  * bg scan period=%d",
6294 			   params->bg_scan_period);
6295 		if (nla_put_u16(msg, NL80211_ATTR_BG_SCAN_PERIOD,
6296 				params->bg_scan_period))
6297 			return -1;
6298 	}
6299 
6300 	if (params->ssid) {
6301 		wpa_printf(MSG_DEBUG, "  * SSID=%s",
6302 			   wpa_ssid_txt(params->ssid, params->ssid_len));
6303 		if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len,
6304 			    params->ssid))
6305 			return -1;
6306 		if (params->ssid_len > sizeof(drv->ssid))
6307 			return -1;
6308 		os_memcpy(drv->ssid, params->ssid, params->ssid_len);
6309 		drv->ssid_len = params->ssid_len;
6310 	}
6311 
6312 	wpa_hexdump(MSG_DEBUG, "  * IEs", params->wpa_ie, params->wpa_ie_len);
6313 	if (params->wpa_ie &&
6314 	    nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len, params->wpa_ie))
6315 		return -1;
6316 
6317 	if (params->wpa_proto) {
6318 		enum nl80211_wpa_versions ver = 0;
6319 
6320 		if (params->wpa_proto & WPA_PROTO_WPA)
6321 			ver |= NL80211_WPA_VERSION_1;
6322 		if (params->wpa_proto & WPA_PROTO_RSN)
6323 			ver |= NL80211_WPA_VERSION_2;
6324 
6325 		wpa_printf(MSG_DEBUG, "  * WPA Versions 0x%x", ver);
6326 		if (nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
6327 			return -1;
6328 	}
6329 
6330 	if (params->pairwise_suite != WPA_CIPHER_NONE) {
6331 		u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite);
6332 		wpa_printf(MSG_DEBUG, "  * pairwise=0x%x", cipher);
6333 		if (nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
6334 				cipher))
6335 			return -1;
6336 	}
6337 
6338 	if (params->group_suite == WPA_CIPHER_GTK_NOT_USED &&
6339 	    !(drv->capa.enc & WPA_DRIVER_CAPA_ENC_GTK_NOT_USED)) {
6340 		/*
6341 		 * This is likely to work even though many drivers do not
6342 		 * advertise support for operations without GTK.
6343 		 */
6344 		wpa_printf(MSG_DEBUG, "  * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement");
6345 	} else if (params->group_suite != WPA_CIPHER_NONE) {
6346 		u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite);
6347 		wpa_printf(MSG_DEBUG, "  * group=0x%x", cipher);
6348 		if (nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher))
6349 			return -1;
6350 	}
6351 
6352 	if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
6353 	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
6354 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_IEEE8021X ||
6355 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_PSK ||
6356 	    params->key_mgmt_suite == WPA_KEY_MGMT_CCKM ||
6357 	    params->key_mgmt_suite == WPA_KEY_MGMT_OSEN ||
6358 	    params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
6359 	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256 ||
6360 	    params->key_mgmt_suite == WPA_KEY_MGMT_SAE ||
6361 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE ||
6362 	    params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B ||
6363 	    params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192 ||
6364 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_IEEE8021X_SHA384 ||
6365 	    params->key_mgmt_suite == WPA_KEY_MGMT_FILS_SHA256 ||
6366 	    params->key_mgmt_suite == WPA_KEY_MGMT_FILS_SHA384 ||
6367 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_FILS_SHA256 ||
6368 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_FILS_SHA384 ||
6369 	    params->key_mgmt_suite == WPA_KEY_MGMT_OWE ||
6370 	    params->key_mgmt_suite == WPA_KEY_MGMT_DPP) {
6371 		int mgmt = RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X;
6372 
6373 		switch (params->key_mgmt_suite) {
6374 		case WPA_KEY_MGMT_CCKM:
6375 			mgmt = RSN_AUTH_KEY_MGMT_CCKM;
6376 			break;
6377 		case WPA_KEY_MGMT_IEEE8021X:
6378 			mgmt = RSN_AUTH_KEY_MGMT_UNSPEC_802_1X;
6379 			break;
6380 		case WPA_KEY_MGMT_FT_IEEE8021X:
6381 			mgmt = RSN_AUTH_KEY_MGMT_FT_802_1X;
6382 			break;
6383 		case WPA_KEY_MGMT_FT_PSK:
6384 			mgmt = RSN_AUTH_KEY_MGMT_FT_PSK;
6385 			break;
6386 		case WPA_KEY_MGMT_IEEE8021X_SHA256:
6387 			mgmt = RSN_AUTH_KEY_MGMT_802_1X_SHA256;
6388 			break;
6389 		case WPA_KEY_MGMT_PSK_SHA256:
6390 			mgmt = RSN_AUTH_KEY_MGMT_PSK_SHA256;
6391 			break;
6392 		case WPA_KEY_MGMT_OSEN:
6393 			mgmt = RSN_AUTH_KEY_MGMT_OSEN;
6394 			break;
6395 		case WPA_KEY_MGMT_SAE:
6396 			mgmt = RSN_AUTH_KEY_MGMT_SAE;
6397 			break;
6398 		case WPA_KEY_MGMT_FT_SAE:
6399 			mgmt = RSN_AUTH_KEY_MGMT_FT_SAE;
6400 			break;
6401 		case WPA_KEY_MGMT_IEEE8021X_SUITE_B:
6402 			mgmt = RSN_AUTH_KEY_MGMT_802_1X_SUITE_B;
6403 			break;
6404 		case WPA_KEY_MGMT_IEEE8021X_SUITE_B_192:
6405 			mgmt = RSN_AUTH_KEY_MGMT_802_1X_SUITE_B_192;
6406 			break;
6407 		case WPA_KEY_MGMT_FT_IEEE8021X_SHA384:
6408 			mgmt = RSN_AUTH_KEY_MGMT_FT_802_1X_SHA384;
6409 			break;
6410 		case WPA_KEY_MGMT_FILS_SHA256:
6411 			mgmt = RSN_AUTH_KEY_MGMT_FILS_SHA256;
6412 			break;
6413 		case WPA_KEY_MGMT_FILS_SHA384:
6414 			mgmt = RSN_AUTH_KEY_MGMT_FILS_SHA384;
6415 			break;
6416 		case WPA_KEY_MGMT_FT_FILS_SHA256:
6417 			mgmt = RSN_AUTH_KEY_MGMT_FT_FILS_SHA256;
6418 			break;
6419 		case WPA_KEY_MGMT_FT_FILS_SHA384:
6420 			mgmt = RSN_AUTH_KEY_MGMT_FT_FILS_SHA384;
6421 			break;
6422 		case WPA_KEY_MGMT_OWE:
6423 			mgmt = RSN_AUTH_KEY_MGMT_OWE;
6424 			break;
6425 		case WPA_KEY_MGMT_DPP:
6426 			mgmt = RSN_AUTH_KEY_MGMT_DPP;
6427 			break;
6428 		case WPA_KEY_MGMT_PSK:
6429 		default:
6430 			mgmt = RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X;
6431 			break;
6432 		}
6433 		wpa_printf(MSG_DEBUG, "  * akm=0x%x", mgmt);
6434 		if (nla_put_u32(msg, NL80211_ATTR_AKM_SUITES, mgmt))
6435 			return -1;
6436 	}
6437 
6438 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
6439 	if (IS_CROSS_AKM_ROAM_KEY_MGMT(params->key_mgmt_suite)) {
6440 		int num_suites;
6441 		u32 suites[NL80211_MAX_NR_AKM_SUITES];
6442 
6443 		wpa_printf(MSG_INFO, "nl80211: key_mgmt_suites=0x%x",
6444 			params->key_mgmt_suite);
6445 		num_suites = wpa_cross_akm_key_mgmt_to_suites(params->key_mgmt_suite,
6446 			suites, ARRAY_SIZE(suites));
6447 		if (num_suites &&
6448 			nla_put(msg, NL80211_ATTR_AKM_SUITES, num_suites * sizeof(u32), suites)) {
6449 			wpa_printf(MSG_ERROR, "Updating multi akm_suite failed");
6450 			return -1;
6451 		}
6452 	}
6453 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
6454 	if (params->req_handshake_offload &&
6455 	    (drv->capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_8021X)) {
6456 		    wpa_printf(MSG_DEBUG, "  * WANT_1X_4WAY_HS");
6457 		    if (nla_put_flag(msg, NL80211_ATTR_WANT_1X_4WAY_HS))
6458 			    return -1;
6459 	    }
6460 
6461 	/* Add PSK in case of 4-way handshake offload */
6462 	if (params->psk &&
6463 	    (drv->capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_PSK)) {
6464 		wpa_hexdump_key(MSG_DEBUG, "  * PSK", params->psk, 32);
6465 		if (nla_put(msg, NL80211_ATTR_PMK, 32, params->psk))
6466 			return -1;
6467 	}
6468 
6469 	if (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT))
6470 		return -1;
6471 
6472 	if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_NO_WPA &&
6473 	    (params->pairwise_suite == WPA_CIPHER_NONE ||
6474 	     params->pairwise_suite == WPA_CIPHER_WEP104 ||
6475 	     params->pairwise_suite == WPA_CIPHER_WEP40) &&
6476 	    (nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, ETH_P_PAE) ||
6477 	     nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT)))
6478 		return -1;
6479 
6480 	if (params->rrm_used) {
6481 		u32 drv_rrm_flags = drv->capa.rrm_flags;
6482 		if ((!((drv_rrm_flags &
6483 			WPA_DRIVER_FLAGS_DS_PARAM_SET_IE_IN_PROBES) &&
6484 		       (drv_rrm_flags & WPA_DRIVER_FLAGS_QUIET)) &&
6485 		     !(drv_rrm_flags & WPA_DRIVER_FLAGS_SUPPORT_RRM)) ||
6486 		    nla_put_flag(msg, NL80211_ATTR_USE_RRM))
6487 			return -1;
6488 	}
6489 
6490 	if (nl80211_ht_vht_overrides(msg, params) < 0)
6491 		return -1;
6492 
6493 	if (params->p2p)
6494 		wpa_printf(MSG_DEBUG, "  * P2P group");
6495 
6496 	if (params->pbss) {
6497 		wpa_printf(MSG_DEBUG, "  * PBSS");
6498 		if (nla_put_flag(msg, NL80211_ATTR_PBSS))
6499 			return -1;
6500 	}
6501 
6502 	drv->connect_reassoc = 0;
6503 	if (params->prev_bssid) {
6504 		wpa_printf(MSG_DEBUG, "  * prev_bssid=" MACSTR,
6505 			   MAC2STR(params->prev_bssid));
6506 		if (nla_put(msg, NL80211_ATTR_PREV_BSSID, ETH_ALEN,
6507 			    params->prev_bssid))
6508 			return -1;
6509 		drv->connect_reassoc = 1;
6510 	}
6511 
6512 	if ((params->auth_alg & WPA_AUTH_ALG_FILS) &&
6513 	    nl80211_put_fils_connect_params(drv, params, msg) != 0)
6514 		return -1;
6515 
6516 	if ((
6517 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
6518 	     (params->key_mgmt_suite & WPA_KEY_MGMT_SAE) ||
6519 #else
6520 	     params->key_mgmt_suite == WPA_KEY_MGMT_SAE ||
6521 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
6522 	     params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE) &&
6523 	    (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) &&
6524 	    nla_put_flag(msg, NL80211_ATTR_EXTERNAL_AUTH_SUPPORT))
6525 		return -1;
6526 
6527 	return 0;
6528 }
6529 
6530 
wpa_driver_nl80211_try_connect(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct i802_bss * bss)6531 static int wpa_driver_nl80211_try_connect(
6532 	struct wpa_driver_nl80211_data *drv,
6533 	struct wpa_driver_associate_params *params,
6534 	struct i802_bss *bss)
6535 {
6536 	struct nl_msg *msg;
6537 	enum nl80211_auth_type type;
6538 	int ret;
6539 	int algs;
6540 
6541 #ifdef CONFIG_DRIVER_NL80211_QCA
6542 	if (params->req_key_mgmt_offload && params->psk &&
6543 	    (params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
6544 	     params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256 ||
6545 	     params->key_mgmt_suite == WPA_KEY_MGMT_FT_PSK)) {
6546 		wpa_printf(MSG_DEBUG, "nl80211: Key management set PSK");
6547 		ret = issue_key_mgmt_set_key(drv, params->psk, 32);
6548 		if (ret)
6549 			return ret;
6550 	}
6551 #endif /* CONFIG_DRIVER_NL80211_QCA */
6552 
6553 	wpa_printf(MSG_DEBUG, "nl80211: Connect (ifindex=%d)", drv->ifindex);
6554 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_CONNECT);
6555 	if (!msg)
6556 		return -1;
6557 
6558 	ret = nl80211_connect_common(drv, params, msg);
6559 	if (ret)
6560 		goto fail;
6561 
6562 	if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED &&
6563 	    nla_put_u32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED))
6564 		goto fail;
6565 
6566 	if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_OPTIONAL &&
6567 	    (drv->capa.flags & WPA_DRIVER_FLAGS_MFP_OPTIONAL) &&
6568 	    nla_put_u32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_OPTIONAL))
6569 		goto fail;
6570 
6571 #ifdef CONFIG_SAE
6572 	if ((
6573 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
6574 	     (params->key_mgmt_suite & WPA_KEY_MGMT_SAE) ||
6575 #else
6576 	     params->key_mgmt_suite == WPA_KEY_MGMT_SAE ||
6577 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
6578 	     params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE) &&
6579 	    nl80211_put_sae_pwe(msg, params->sae_pwe) < 0)
6580 		goto fail;
6581 #endif /* CONFIG_SAE */
6582 
6583 	algs = 0;
6584 	if (params->auth_alg & WPA_AUTH_ALG_OPEN)
6585 		algs++;
6586 	if (params->auth_alg & WPA_AUTH_ALG_SHARED)
6587 		algs++;
6588 	if (params->auth_alg & WPA_AUTH_ALG_LEAP)
6589 		algs++;
6590 	if (params->auth_alg & WPA_AUTH_ALG_FILS)
6591 		algs++;
6592 	if (params->auth_alg & WPA_AUTH_ALG_FT)
6593 		algs++;
6594 	if (algs > 1) {
6595 		wpa_printf(MSG_DEBUG, "  * Leave out Auth Type for automatic "
6596 			   "selection");
6597 		goto skip_auth_type;
6598 	}
6599 
6600 	type = get_nl_auth_type(params->auth_alg);
6601 	wpa_printf(MSG_DEBUG, "  * Auth Type %d", type);
6602 	if (type == NL80211_AUTHTYPE_MAX ||
6603 	    nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
6604 		goto fail;
6605 
6606 skip_auth_type:
6607 	ret = nl80211_set_conn_keys(params, msg);
6608 	if (ret)
6609 		goto fail;
6610 
6611 	ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 1);
6612 	msg = NULL;
6613 	if (ret) {
6614 		wpa_printf(MSG_DEBUG, "nl80211: MLME connect failed: ret=%d "
6615 			   "(%s)", ret, strerror(-ret));
6616 	} else {
6617 #ifdef CONFIG_DRIVER_NL80211_QCA
6618 		drv->roam_indication_done = false;
6619 #endif /* CONFIG_DRIVER_NL80211_QCA */
6620 		wpa_printf(MSG_DEBUG,
6621 			   "nl80211: Connect request send successfully");
6622 	}
6623 
6624 fail:
6625 	nl80211_nlmsg_clear(msg);
6626 	nlmsg_free(msg);
6627 	return ret;
6628 
6629 }
6630 
6631 
wpa_driver_nl80211_connect(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct i802_bss * bss)6632 static int wpa_driver_nl80211_connect(
6633 	struct wpa_driver_nl80211_data *drv,
6634 	struct wpa_driver_associate_params *params,
6635 	struct i802_bss *bss)
6636 {
6637 	int ret;
6638 
6639 	/* Store the connection attempted bssid for future use */
6640 	if (params->bssid)
6641 		os_memcpy(drv->auth_attempt_bssid, params->bssid, ETH_ALEN);
6642 	else
6643 		os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
6644 
6645 	ret = wpa_driver_nl80211_try_connect(drv, params, bss);
6646 	if (ret == -EALREADY) {
6647 		/*
6648 		 * cfg80211 does not currently accept new connections if
6649 		 * we are already connected. As a workaround, force
6650 		 * disconnection and try again.
6651 		 */
6652 		wpa_printf(MSG_DEBUG, "nl80211: Explicitly "
6653 			   "disconnecting before reassociation "
6654 			   "attempt");
6655 		if (wpa_driver_nl80211_disconnect(
6656 			    drv, WLAN_REASON_PREV_AUTH_NOT_VALID, bss))
6657 			return -1;
6658 		ret = wpa_driver_nl80211_try_connect(drv, params, bss);
6659 	}
6660 	return ret;
6661 }
6662 
6663 
wpa_driver_nl80211_associate(void * priv,struct wpa_driver_associate_params * params)6664 static int wpa_driver_nl80211_associate(
6665 	void *priv, struct wpa_driver_associate_params *params)
6666 {
6667 	struct i802_bss *bss = priv;
6668 	struct wpa_driver_nl80211_data *drv = bss->drv;
6669 	int ret = -1;
6670 	struct nl_msg *msg;
6671 
6672 	nl80211_unmask_11b_rates(bss);
6673 
6674 	if (params->mode == IEEE80211_MODE_AP)
6675 		return wpa_driver_nl80211_ap(drv, params);
6676 
6677 	if (params->mode == IEEE80211_MODE_IBSS)
6678 		return wpa_driver_nl80211_ibss(drv, params);
6679 
6680 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
6681 		enum nl80211_iftype nlmode = params->p2p ?
6682 			NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
6683 
6684 		if (wpa_driver_nl80211_set_mode(priv, nlmode) < 0)
6685 			return -1;
6686 		if (
6687 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
6688 		    (params->key_mgmt_suite & WPA_KEY_MGMT_SAE) ||
6689 #else
6690 		    params->key_mgmt_suite == WPA_KEY_MGMT_SAE ||
6691 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
6692 		    params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE)
6693 			bss->use_nl_connect = 1;
6694 		else
6695 			bss->use_nl_connect = 0;
6696 
6697 		return wpa_driver_nl80211_connect(drv, params, bss);
6698 	}
6699 
6700 	nl80211_mark_disconnected(drv);
6701 
6702 	wpa_printf(MSG_DEBUG, "nl80211: Associate (ifindex=%d)",
6703 		   drv->ifindex);
6704 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_ASSOCIATE);
6705 	if (!msg)
6706 		return -1;
6707 
6708 	ret = nl80211_connect_common(drv, params, msg);
6709 	if (ret)
6710 		goto fail;
6711 
6712 	if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED &&
6713 	    nla_put_u32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED))
6714 		goto fail;
6715 
6716 	if (params->fils_kek) {
6717 		wpa_printf(MSG_DEBUG, "  * FILS KEK (len=%u)",
6718 			   (unsigned int) params->fils_kek_len);
6719 		if (nla_put(msg, NL80211_ATTR_FILS_KEK, params->fils_kek_len,
6720 			    params->fils_kek))
6721 			goto fail;
6722 	}
6723 	if (params->fils_nonces) {
6724 		wpa_hexdump(MSG_DEBUG, "  * FILS nonces (for AAD)",
6725 			    params->fils_nonces,
6726 			    params->fils_nonces_len);
6727 		if (nla_put(msg, NL80211_ATTR_FILS_NONCES,
6728 			    params->fils_nonces_len, params->fils_nonces))
6729 			goto fail;
6730 	}
6731 
6732 	ret = send_and_recv_msgs_connect_handle(drv, msg, drv->first_bss, 1);
6733 	msg = NULL;
6734 	if (ret) {
6735 		wpa_dbg(drv->ctx, MSG_DEBUG,
6736 			"nl80211: MLME command failed (assoc): ret=%d (%s)",
6737 			ret, strerror(-ret));
6738 		nl80211_dump_scan(drv);
6739 	} else {
6740 		wpa_printf(MSG_DEBUG,
6741 			   "nl80211: Association request send successfully");
6742 	}
6743 
6744 fail:
6745 	nlmsg_free(msg);
6746 	return ret;
6747 }
6748 
6749 
nl80211_set_mode(struct wpa_driver_nl80211_data * drv,int ifindex,enum nl80211_iftype mode)6750 static int nl80211_set_mode(struct wpa_driver_nl80211_data *drv,
6751 			    int ifindex, enum nl80211_iftype mode)
6752 {
6753 	struct nl_msg *msg;
6754 	int ret = -ENOBUFS;
6755 
6756 	wpa_printf(MSG_DEBUG, "nl80211: Set mode ifindex %d iftype %d (%s)",
6757 		   ifindex, mode, nl80211_iftype_str(mode));
6758 
6759 	msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_SET_INTERFACE);
6760 	if (!msg || nla_put_u32(msg, NL80211_ATTR_IFTYPE, mode))
6761 		goto fail;
6762 
6763 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
6764 	msg = NULL;
6765 	if (!ret)
6766 		return 0;
6767 fail:
6768 	nlmsg_free(msg);
6769 	wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface %d to mode %d:"
6770 		   " %d (%s)", ifindex, mode, ret, strerror(-ret));
6771 	return ret;
6772 }
6773 
6774 
wpa_driver_nl80211_set_mode_impl(struct i802_bss * bss,enum nl80211_iftype nlmode,struct hostapd_freq_params * desired_freq_params)6775 static int wpa_driver_nl80211_set_mode_impl(
6776 		struct i802_bss *bss,
6777 		enum nl80211_iftype nlmode,
6778 		struct hostapd_freq_params *desired_freq_params)
6779 {
6780 	struct wpa_driver_nl80211_data *drv = bss->drv;
6781 	int ret = -1;
6782 	int i;
6783 	int was_ap = is_ap_interface(drv->nlmode);
6784 	int res;
6785 	int mode_switch_res;
6786 
6787 	if (TEST_FAIL())
6788 		return -1;
6789 
6790 	mode_switch_res = nl80211_set_mode(drv, drv->ifindex, nlmode);
6791 	if (mode_switch_res && nlmode == nl80211_get_ifmode(bss))
6792 		mode_switch_res = 0;
6793 
6794 	if (mode_switch_res == 0) {
6795 		drv->nlmode = nlmode;
6796 		ret = 0;
6797 		goto done;
6798 	}
6799 
6800 	if (mode_switch_res == -ENODEV)
6801 		return -1;
6802 
6803 	if (nlmode == drv->nlmode) {
6804 		wpa_printf(MSG_DEBUG, "nl80211: Interface already in "
6805 			   "requested mode - ignore error");
6806 		ret = 0;
6807 		goto done; /* Already in the requested mode */
6808 	}
6809 
6810 	/* mac80211 doesn't allow mode changes while the device is up, so
6811 	 * take the device down, try to set the mode again, and bring the
6812 	 * device back up.
6813 	 */
6814 	wpa_printf(MSG_DEBUG, "nl80211: Try mode change after setting "
6815 		   "interface down");
6816 	for (i = 0; i < 10; i++) {
6817 		res = i802_set_iface_flags(bss, 0);
6818 		if (res == -EACCES || res == -ENODEV)
6819 			break;
6820 		if (res != 0) {
6821 			wpa_printf(MSG_DEBUG, "nl80211: Failed to set "
6822 				   "interface down");
6823 			os_sleep(0, 100000);
6824 			continue;
6825 		}
6826 
6827 		/*
6828 		 * Setting the mode will fail for some drivers if the phy is
6829 		 * on a frequency that the mode is disallowed in.
6830 		 */
6831 		if (desired_freq_params) {
6832 			res = nl80211_set_channel(bss, desired_freq_params, 0);
6833 			if (res) {
6834 				wpa_printf(MSG_DEBUG,
6835 					   "nl80211: Failed to set frequency on interface");
6836 			}
6837 		}
6838 
6839 		if (i == 0 && was_ap && !is_ap_interface(nlmode) &&
6840 		    bss->brname[0] &&
6841 		    (bss->added_if_into_bridge || bss->already_in_bridge)) {
6842 			wpa_printf(MSG_DEBUG,
6843 				   "nl80211: Remove AP interface %s temporarily from the bridge %s to allow its mode to be set to STATION",
6844 				   bss->ifname, bss->brname);
6845 			if (linux_br_del_if(drv->global->ioctl_sock,
6846 					    bss->brname, bss->ifname) < 0)
6847 				wpa_printf(MSG_INFO,
6848 					   "nl80211: Failed to remove interface %s from bridge %s: %s",
6849 					   bss->ifname, bss->brname,
6850 					   strerror(errno));
6851 		}
6852 
6853 		/* Try to set the mode again while the interface is down */
6854 		mode_switch_res = nl80211_set_mode(drv, drv->ifindex, nlmode);
6855 		if (mode_switch_res == -EBUSY) {
6856 			wpa_printf(MSG_DEBUG,
6857 				   "nl80211: Delaying mode set while interface going down");
6858 			os_sleep(0, 100000);
6859 			continue;
6860 		}
6861 		ret = mode_switch_res;
6862 		break;
6863 	}
6864 
6865 	if (!ret) {
6866 		wpa_printf(MSG_DEBUG, "nl80211: Mode change succeeded while "
6867 			   "interface is down");
6868 		drv->nlmode = nlmode;
6869 		drv->ignore_if_down_event = 1;
6870 	}
6871 
6872 	/* Bring the interface back up */
6873 	res = linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 1);
6874 	if (res != 0) {
6875 		wpa_printf(MSG_DEBUG,
6876 			   "nl80211: Failed to set interface up after switching mode");
6877 		ret = -1;
6878 	}
6879 
6880 done:
6881 	if (ret) {
6882 		wpa_printf(MSG_DEBUG, "nl80211: Interface mode change to %d "
6883 			   "from %d failed", nlmode, drv->nlmode);
6884 		return ret;
6885 	}
6886 
6887 	if (is_p2p_net_interface(nlmode)) {
6888 		wpa_printf(MSG_DEBUG,
6889 			   "nl80211: Interface %s mode change to P2P - disable 11b rates",
6890 			   bss->ifname);
6891 		nl80211_disable_11b_rates(drv, drv->ifindex, 1);
6892 	} else if (drv->disabled_11b_rates) {
6893 		wpa_printf(MSG_DEBUG,
6894 			   "nl80211: Interface %s mode changed to non-P2P - re-enable 11b rates",
6895 			   bss->ifname);
6896 		nl80211_disable_11b_rates(drv, drv->ifindex, 0);
6897 	}
6898 
6899 	if (is_ap_interface(nlmode)) {
6900 		nl80211_mgmt_unsubscribe(bss, "start AP");
6901 		/* Setup additional AP mode functionality if needed */
6902 		if (nl80211_setup_ap(bss))
6903 			return -1;
6904 	} else if (was_ap) {
6905 		/* Remove additional AP mode functionality */
6906 		nl80211_teardown_ap(bss);
6907 	} else {
6908 		nl80211_mgmt_unsubscribe(bss, "mode change");
6909 	}
6910 
6911 	if (is_mesh_interface(nlmode) &&
6912 	    nl80211_mgmt_subscribe_mesh(bss))
6913 		return -1;
6914 
6915 	if (!bss->in_deinit && !is_ap_interface(nlmode) &&
6916 	    !is_mesh_interface(nlmode) &&
6917 	    nl80211_mgmt_subscribe_non_ap(bss) < 0)
6918 		wpa_printf(MSG_DEBUG, "nl80211: Failed to register Action "
6919 			   "frame processing - ignore for now");
6920 
6921 	return 0;
6922 }
6923 
6924 
nl80211_restore_ap_mode(struct i802_bss * bss)6925 void nl80211_restore_ap_mode(struct i802_bss *bss)
6926 {
6927 	struct wpa_driver_nl80211_data *drv = bss->drv;
6928 	int was_ap = is_ap_interface(drv->nlmode);
6929 	int br_ifindex;
6930 
6931 	wpa_driver_nl80211_set_mode(bss, drv->ap_scan_as_station);
6932 	if (!was_ap && is_ap_interface(drv->ap_scan_as_station) &&
6933 	    bss->brname[0] &&
6934 	    (bss->added_if_into_bridge || bss->already_in_bridge)) {
6935 		wpa_printf(MSG_DEBUG,
6936 			   "nl80211: Add AP interface %s back into the bridge %s",
6937 			   bss->ifname, bss->brname);
6938 		if (linux_br_add_if(drv->global->ioctl_sock, bss->brname,
6939 				    bss->ifname) < 0) {
6940 			wpa_printf(MSG_WARNING,
6941 				   "nl80211: Failed to add interface %s into bridge %s: %s",
6942 				   bss->ifname, bss->brname, strerror(errno));
6943 		}
6944 		br_ifindex = if_nametoindex(bss->brname);
6945 		add_ifidx(drv, br_ifindex, drv->ifindex);
6946 	}
6947 	drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
6948 }
6949 
6950 
wpa_driver_nl80211_set_mode(struct i802_bss * bss,enum nl80211_iftype nlmode)6951 int wpa_driver_nl80211_set_mode(struct i802_bss *bss,
6952 				enum nl80211_iftype nlmode)
6953 {
6954 	return wpa_driver_nl80211_set_mode_impl(bss, nlmode, NULL);
6955 }
6956 
6957 
wpa_driver_nl80211_set_mode_ibss(struct i802_bss * bss,struct hostapd_freq_params * freq)6958 static int wpa_driver_nl80211_set_mode_ibss(struct i802_bss *bss,
6959 					    struct hostapd_freq_params *freq)
6960 {
6961 	return wpa_driver_nl80211_set_mode_impl(bss, NL80211_IFTYPE_ADHOC,
6962 						freq);
6963 }
6964 
6965 
wpa_driver_nl80211_get_capa(void * priv,struct wpa_driver_capa * capa)6966 static int wpa_driver_nl80211_get_capa(void *priv,
6967 				       struct wpa_driver_capa *capa)
6968 {
6969 	struct i802_bss *bss = priv;
6970 	struct wpa_driver_nl80211_data *drv = bss->drv;
6971 
6972 	if (!drv->has_capability)
6973 		return -1;
6974 	os_memcpy(capa, &drv->capa, sizeof(*capa));
6975 	if (drv->extended_capa && drv->extended_capa_mask) {
6976 		capa->extended_capa = drv->extended_capa;
6977 		capa->extended_capa_mask = drv->extended_capa_mask;
6978 		capa->extended_capa_len = drv->extended_capa_len;
6979 	}
6980 
6981 	return 0;
6982 }
6983 
6984 
wpa_driver_nl80211_set_operstate(void * priv,int state)6985 static int wpa_driver_nl80211_set_operstate(void *priv, int state)
6986 {
6987 	struct i802_bss *bss = priv;
6988 	struct wpa_driver_nl80211_data *drv = bss->drv;
6989 
6990 	wpa_printf(MSG_DEBUG, "nl80211: Set %s operstate %d->%d (%s)",
6991 		   bss->ifname, drv->operstate, state,
6992 		   state ? "UP" : "DORMANT");
6993 	drv->operstate = state;
6994 	return netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, -1,
6995 				      state ? IF_OPER_UP : IF_OPER_DORMANT);
6996 }
6997 
6998 
wpa_driver_nl80211_set_supp_port(void * priv,int authorized)6999 static int wpa_driver_nl80211_set_supp_port(void *priv, int authorized)
7000 {
7001 	struct i802_bss *bss = priv;
7002 	struct wpa_driver_nl80211_data *drv = bss->drv;
7003 	struct nl_msg *msg;
7004 	struct nl80211_sta_flag_update upd;
7005 	int ret;
7006 
7007 	if (!drv->associated && is_zero_ether_addr(drv->bssid) && !authorized) {
7008 		wpa_printf(MSG_DEBUG, "nl80211: Skip set_supp_port(unauthorized) while not associated");
7009 		return 0;
7010 	}
7011 
7012 	wpa_printf(MSG_DEBUG, "nl80211: Set supplicant port %sauthorized for "
7013 		   MACSTR, authorized ? "" : "un", MAC2STR(drv->bssid));
7014 
7015 	os_memset(&upd, 0, sizeof(upd));
7016 	upd.mask = BIT(NL80211_STA_FLAG_AUTHORIZED);
7017 	if (authorized)
7018 		upd.set = BIT(NL80211_STA_FLAG_AUTHORIZED);
7019 
7020 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
7021 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, drv->bssid) ||
7022 	    nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd)) {
7023 		nlmsg_free(msg);
7024 		return -ENOBUFS;
7025 	}
7026 
7027 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7028 	if (!ret)
7029 		return 0;
7030 	wpa_printf(MSG_DEBUG, "nl80211: Failed to set STA flag: %d (%s)",
7031 		   ret, strerror(-ret));
7032 	return ret;
7033 }
7034 
7035 
7036 /* Set kernel driver on given frequency (MHz) */
i802_set_freq(void * priv,struct hostapd_freq_params * freq)7037 static int i802_set_freq(void *priv, struct hostapd_freq_params *freq)
7038 {
7039 	struct i802_bss *bss = priv;
7040 	return nl80211_set_channel(bss, freq, 0);
7041 }
7042 
7043 
min_int(int a,int b)7044 static inline int min_int(int a, int b)
7045 {
7046 	if (a < b)
7047 		return a;
7048 	return b;
7049 }
7050 
7051 
get_key_handler(struct nl_msg * msg,void * arg)7052 static int get_key_handler(struct nl_msg *msg, void *arg)
7053 {
7054 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
7055 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
7056 
7057 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
7058 		  genlmsg_attrlen(gnlh, 0), NULL);
7059 
7060 	/*
7061 	 * TODO: validate the key index and mac address!
7062 	 * Otherwise, there's a race condition as soon as
7063 	 * the kernel starts sending key notifications.
7064 	 */
7065 
7066 	if (tb[NL80211_ATTR_KEY_SEQ])
7067 		memcpy(arg, nla_data(tb[NL80211_ATTR_KEY_SEQ]),
7068 		       min_int(nla_len(tb[NL80211_ATTR_KEY_SEQ]), 6));
7069 	nl80211_nlmsg_clear(msg);
7070 	return NL_SKIP;
7071 }
7072 
7073 
i802_get_seqnum(const char * iface,void * priv,const u8 * addr,int idx,u8 * seq)7074 static int i802_get_seqnum(const char *iface, void *priv, const u8 *addr,
7075 			   int idx, u8 *seq)
7076 {
7077 	struct i802_bss *bss = priv;
7078 	struct wpa_driver_nl80211_data *drv = bss->drv;
7079 	struct nl_msg *msg;
7080 
7081 	msg = nl80211_ifindex_msg(drv, if_nametoindex(iface), 0,
7082 				  NL80211_CMD_GET_KEY);
7083 	if (!msg ||
7084 	    (addr && nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) ||
7085 	    nla_put_u8(msg, NL80211_ATTR_KEY_IDX, idx)) {
7086 		nlmsg_free(msg);
7087 		return -ENOBUFS;
7088 	}
7089 
7090 	memset(seq, 0, 6);
7091 
7092 	return send_and_recv_msgs(drv, msg, get_key_handler, seq, NULL, NULL);
7093 }
7094 
7095 
i802_set_rts(void * priv,int rts)7096 static int i802_set_rts(void *priv, int rts)
7097 {
7098 	struct i802_bss *bss = priv;
7099 	struct wpa_driver_nl80211_data *drv = bss->drv;
7100 	struct nl_msg *msg;
7101 	int ret;
7102 	u32 val;
7103 
7104 	if (rts >= 2347 || rts == -1)
7105 		val = (u32) -1;
7106 	else
7107 		val = rts;
7108 
7109 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_WIPHY)) ||
7110 	    nla_put_u32(msg, NL80211_ATTR_WIPHY_RTS_THRESHOLD, val)) {
7111 		nlmsg_free(msg);
7112 		return -ENOBUFS;
7113 	}
7114 
7115 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7116 	if (!ret)
7117 		return 0;
7118 	wpa_printf(MSG_DEBUG, "nl80211: Failed to set RTS threshold %d: "
7119 		   "%d (%s)", rts, ret, strerror(-ret));
7120 	return ret;
7121 }
7122 
7123 
i802_set_frag(void * priv,int frag)7124 static int i802_set_frag(void *priv, int frag)
7125 {
7126 	struct i802_bss *bss = priv;
7127 	struct wpa_driver_nl80211_data *drv = bss->drv;
7128 	struct nl_msg *msg;
7129 	int ret;
7130 	u32 val;
7131 
7132 	if (frag >= 2346 || frag == -1)
7133 		val = (u32) -1;
7134 	else
7135 		val = frag;
7136 
7137 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_WIPHY)) ||
7138 	    nla_put_u32(msg, NL80211_ATTR_WIPHY_FRAG_THRESHOLD, val)) {
7139 		nlmsg_free(msg);
7140 		return -ENOBUFS;
7141 	}
7142 
7143 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7144 	if (!ret)
7145 		return 0;
7146 	wpa_printf(MSG_DEBUG, "nl80211: Failed to set fragmentation threshold "
7147 		   "%d: %d (%s)", frag, ret, strerror(-ret));
7148 	return ret;
7149 }
7150 
7151 
i802_flush(void * priv)7152 static int i802_flush(void *priv)
7153 {
7154 	struct i802_bss *bss = priv;
7155 	struct nl_msg *msg;
7156 	int res;
7157 
7158 	wpa_printf(MSG_DEBUG, "nl80211: flush -> DEL_STATION %s (all)",
7159 		   bss->ifname);
7160 
7161 	/*
7162 	 * XXX: FIX! this needs to flush all VLANs too
7163 	 */
7164 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_DEL_STATION);
7165 	res = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
7166 	if (res) {
7167 		wpa_printf(MSG_DEBUG, "nl80211: Station flush failed: ret=%d "
7168 			   "(%s)", res, strerror(-res));
7169 	}
7170 	return res;
7171 }
7172 
7173 
get_sta_tid_stats(struct hostap_sta_driver_data * data,struct nlattr * attr)7174 static void get_sta_tid_stats(struct hostap_sta_driver_data *data,
7175 			      struct nlattr *attr)
7176 {
7177 	struct nlattr *tid_stats[NL80211_TID_STATS_MAX + 1], *tidattr;
7178 	struct nlattr *txq_stats[NL80211_TXQ_STATS_MAX + 1];
7179 	static struct nla_policy txq_stats_policy[NL80211_TXQ_STATS_MAX + 1] = {
7180 		[NL80211_TXQ_STATS_BACKLOG_BYTES] = { .type = NLA_U32 },
7181 		[NL80211_TXQ_STATS_BACKLOG_PACKETS] = { .type = NLA_U32 },
7182 	};
7183 	int rem;
7184 
7185 	nla_for_each_nested(tidattr, attr, rem) {
7186 		if (nla_parse_nested(tid_stats, NL80211_TID_STATS_MAX,
7187 				     tidattr, NULL) != 0 ||
7188 		    !tid_stats[NL80211_TID_STATS_TXQ_STATS] ||
7189 		    nla_parse_nested(txq_stats, NL80211_TXQ_STATS_MAX,
7190 				     tid_stats[NL80211_TID_STATS_TXQ_STATS],
7191 				     txq_stats_policy) != 0)
7192 			continue;
7193 		/* sum the backlogs over all TIDs for station */
7194 		if (txq_stats[NL80211_TXQ_STATS_BACKLOG_BYTES])
7195 			data->backlog_bytes += nla_get_u32(
7196 				txq_stats[NL80211_TXQ_STATS_BACKLOG_BYTES]);
7197 		if (txq_stats[NL80211_TXQ_STATS_BACKLOG_PACKETS])
7198 			data->backlog_bytes += nla_get_u32(
7199 				txq_stats[NL80211_TXQ_STATS_BACKLOG_PACKETS]);
7200 	}
7201 }
7202 
7203 
get_sta_handler(struct nl_msg * msg,void * arg)7204 static int get_sta_handler(struct nl_msg *msg, void *arg)
7205 {
7206 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
7207 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
7208 	struct hostap_sta_driver_data *data = arg;
7209 	struct nlattr *stats[NL80211_STA_INFO_MAX + 1];
7210 	static struct nla_policy stats_policy[NL80211_STA_INFO_MAX + 1] = {
7211 		[NL80211_STA_INFO_INACTIVE_TIME] = { .type = NLA_U32 },
7212 		[NL80211_STA_INFO_RX_BYTES] = { .type = NLA_U32 },
7213 		[NL80211_STA_INFO_TX_BYTES] = { .type = NLA_U32 },
7214 		[NL80211_STA_INFO_RX_PACKETS] = { .type = NLA_U32 },
7215 		[NL80211_STA_INFO_TX_PACKETS] = { .type = NLA_U32 },
7216 		[NL80211_STA_INFO_TX_FAILED] = { .type = NLA_U32 },
7217 		[NL80211_STA_INFO_RX_BYTES64] = { .type = NLA_U64 },
7218 		[NL80211_STA_INFO_TX_BYTES64] = { .type = NLA_U64 },
7219 		[NL80211_STA_INFO_SIGNAL] = { .type = NLA_U8 },
7220 		[NL80211_STA_INFO_ACK_SIGNAL] = { .type = NLA_U8 },
7221 		[NL80211_STA_INFO_RX_DURATION] = { .type = NLA_U64 },
7222 		[NL80211_STA_INFO_TX_DURATION] = { .type = NLA_U64 },
7223 		[NL80211_STA_INFO_CONNECTED_TIME] = { .type = NLA_U32 },
7224 	};
7225 	struct nlattr *rate[NL80211_RATE_INFO_MAX + 1];
7226 	static struct nla_policy rate_policy[NL80211_RATE_INFO_MAX + 1] = {
7227 		[NL80211_RATE_INFO_BITRATE] = { .type = NLA_U16 },
7228 		[NL80211_RATE_INFO_BITRATE32] = { .type = NLA_U32 },
7229 		[NL80211_RATE_INFO_MCS] = { .type = NLA_U8 },
7230 		[NL80211_RATE_INFO_VHT_MCS] = { .type = NLA_U8 },
7231 		[NL80211_RATE_INFO_SHORT_GI] = { .type = NLA_FLAG },
7232 		[NL80211_RATE_INFO_VHT_NSS] = { .type = NLA_U8 },
7233 	};
7234 
7235 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
7236 		  genlmsg_attrlen(gnlh, 0), NULL);
7237 
7238 	/*
7239 	 * TODO: validate the interface and mac address!
7240 	 * Otherwise, there's a race condition as soon as
7241 	 * the kernel starts sending station notifications.
7242 	 */
7243 
7244 	if (!tb[NL80211_ATTR_STA_INFO]) {
7245 		wpa_printf(MSG_DEBUG, "sta stats missing!");
7246 		return NL_SKIP;
7247 	}
7248 	if (nla_parse_nested(stats, NL80211_STA_INFO_MAX,
7249 			     tb[NL80211_ATTR_STA_INFO],
7250 			     stats_policy)) {
7251 		wpa_printf(MSG_DEBUG, "failed to parse nested attributes!");
7252 		return NL_SKIP;
7253 	}
7254 
7255 	if (stats[NL80211_STA_INFO_INACTIVE_TIME])
7256 		data->inactive_msec =
7257 			nla_get_u32(stats[NL80211_STA_INFO_INACTIVE_TIME]);
7258 	/* For backwards compatibility, fetch the 32-bit counters first. */
7259 	if (stats[NL80211_STA_INFO_RX_BYTES])
7260 		data->rx_bytes = nla_get_u32(stats[NL80211_STA_INFO_RX_BYTES]);
7261 	if (stats[NL80211_STA_INFO_TX_BYTES])
7262 		data->tx_bytes = nla_get_u32(stats[NL80211_STA_INFO_TX_BYTES]);
7263 	if (stats[NL80211_STA_INFO_RX_BYTES64] &&
7264 	    stats[NL80211_STA_INFO_TX_BYTES64]) {
7265 		/*
7266 		 * The driver supports 64-bit counters, so use them to override
7267 		 * the 32-bit values.
7268 		 */
7269 		data->rx_bytes =
7270 			nla_get_u64(stats[NL80211_STA_INFO_RX_BYTES64]);
7271 		data->tx_bytes =
7272 			nla_get_u64(stats[NL80211_STA_INFO_TX_BYTES64]);
7273 		data->bytes_64bit = 1;
7274 	}
7275 	if (stats[NL80211_STA_INFO_RX_PACKETS])
7276 		data->rx_packets =
7277 			nla_get_u32(stats[NL80211_STA_INFO_RX_PACKETS]);
7278 	if (stats[NL80211_STA_INFO_TX_PACKETS])
7279 		data->tx_packets =
7280 			nla_get_u32(stats[NL80211_STA_INFO_TX_PACKETS]);
7281 	if (stats[NL80211_STA_INFO_RX_DURATION])
7282 		data->rx_airtime =
7283 			nla_get_u64(stats[NL80211_STA_INFO_RX_DURATION]);
7284 	if (stats[NL80211_STA_INFO_TX_DURATION])
7285 		data->tx_airtime =
7286 			nla_get_u64(stats[NL80211_STA_INFO_TX_DURATION]);
7287 	if (stats[NL80211_STA_INFO_TX_FAILED])
7288 		data->tx_retry_failed =
7289 			nla_get_u32(stats[NL80211_STA_INFO_TX_FAILED]);
7290 	if (stats[NL80211_STA_INFO_SIGNAL])
7291 		data->signal = nla_get_u8(stats[NL80211_STA_INFO_SIGNAL]);
7292 	if (stats[NL80211_STA_INFO_ACK_SIGNAL]) {
7293 		data->last_ack_rssi =
7294 			nla_get_u8(stats[NL80211_STA_INFO_ACK_SIGNAL]);
7295 		data->flags |= STA_DRV_DATA_LAST_ACK_RSSI;
7296 	}
7297 
7298 	if (stats[NL80211_STA_INFO_CONNECTED_TIME]) {
7299 		data->connected_sec =
7300 			nla_get_u32(stats[NL80211_STA_INFO_CONNECTED_TIME]);
7301 		data->flags |= STA_DRV_DATA_CONN_TIME;
7302 	}
7303 
7304 	if (stats[NL80211_STA_INFO_TX_BITRATE] &&
7305 	    nla_parse_nested(rate, NL80211_RATE_INFO_MAX,
7306 			     stats[NL80211_STA_INFO_TX_BITRATE],
7307 			     rate_policy) == 0) {
7308 		if (rate[NL80211_RATE_INFO_BITRATE32])
7309 			data->current_tx_rate =
7310 				nla_get_u32(rate[NL80211_RATE_INFO_BITRATE32]);
7311 		else if (rate[NL80211_RATE_INFO_BITRATE])
7312 			data->current_tx_rate =
7313 				nla_get_u16(rate[NL80211_RATE_INFO_BITRATE]);
7314 
7315 		if (rate[NL80211_RATE_INFO_MCS]) {
7316 			data->tx_mcs = nla_get_u8(rate[NL80211_RATE_INFO_MCS]);
7317 			data->flags |= STA_DRV_DATA_TX_MCS;
7318 		}
7319 		if (rate[NL80211_RATE_INFO_VHT_MCS]) {
7320 			data->tx_vhtmcs =
7321 				nla_get_u8(rate[NL80211_RATE_INFO_VHT_MCS]);
7322 			data->flags |= STA_DRV_DATA_TX_VHT_MCS;
7323 		}
7324 		if (rate[NL80211_RATE_INFO_SHORT_GI])
7325 			data->flags |= STA_DRV_DATA_TX_SHORT_GI;
7326 		if (rate[NL80211_RATE_INFO_VHT_NSS]) {
7327 			data->tx_vht_nss =
7328 				nla_get_u8(rate[NL80211_RATE_INFO_VHT_NSS]);
7329 			data->flags |= STA_DRV_DATA_TX_VHT_NSS;
7330 		}
7331 	}
7332 
7333 	if (stats[NL80211_STA_INFO_RX_BITRATE] &&
7334 	    nla_parse_nested(rate, NL80211_RATE_INFO_MAX,
7335 			     stats[NL80211_STA_INFO_RX_BITRATE],
7336 			     rate_policy) == 0) {
7337 		if (rate[NL80211_RATE_INFO_BITRATE32])
7338 			data->current_rx_rate =
7339 				nla_get_u32(rate[NL80211_RATE_INFO_BITRATE32]);
7340 		else if (rate[NL80211_RATE_INFO_BITRATE])
7341 			data->current_rx_rate =
7342 				nla_get_u16(rate[NL80211_RATE_INFO_BITRATE]);
7343 
7344 		if (rate[NL80211_RATE_INFO_MCS]) {
7345 			data->rx_mcs =
7346 				nla_get_u8(rate[NL80211_RATE_INFO_MCS]);
7347 			data->flags |= STA_DRV_DATA_RX_MCS;
7348 		}
7349 		if (rate[NL80211_RATE_INFO_VHT_MCS]) {
7350 			data->rx_vhtmcs =
7351 				nla_get_u8(rate[NL80211_RATE_INFO_VHT_MCS]);
7352 			data->flags |= STA_DRV_DATA_RX_VHT_MCS;
7353 		}
7354 		if (rate[NL80211_RATE_INFO_SHORT_GI])
7355 			data->flags |= STA_DRV_DATA_RX_SHORT_GI;
7356 		if (rate[NL80211_RATE_INFO_VHT_NSS]) {
7357 			data->rx_vht_nss =
7358 				nla_get_u8(rate[NL80211_RATE_INFO_VHT_NSS]);
7359 			data->flags |= STA_DRV_DATA_RX_VHT_NSS;
7360 		}
7361 	}
7362 
7363 	if (stats[NL80211_STA_INFO_TID_STATS])
7364 		get_sta_tid_stats(data, stats[NL80211_STA_INFO_TID_STATS]);
7365 
7366 	return NL_SKIP;
7367 }
7368 
i802_read_sta_data(struct i802_bss * bss,struct hostap_sta_driver_data * data,const u8 * addr)7369 static int i802_read_sta_data(struct i802_bss *bss,
7370 			      struct hostap_sta_driver_data *data,
7371 			      const u8 *addr)
7372 {
7373 	struct nl_msg *msg;
7374 
7375 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_GET_STATION)) ||
7376 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
7377 		nlmsg_free(msg);
7378 		return -ENOBUFS;
7379 	}
7380 
7381 	return send_and_recv_msgs(bss->drv, msg, get_sta_handler, data,
7382 				  NULL, NULL);
7383 }
7384 
7385 
i802_set_tx_queue_params(void * priv,int queue,int aifs,int cw_min,int cw_max,int burst_time)7386 static int i802_set_tx_queue_params(void *priv, int queue, int aifs,
7387 				    int cw_min, int cw_max, int burst_time)
7388 {
7389 	struct i802_bss *bss = priv;
7390 	struct wpa_driver_nl80211_data *drv = bss->drv;
7391 	struct nl_msg *msg;
7392 	struct nlattr *txq, *params;
7393 	int res;
7394 
7395 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_WIPHY);
7396 	if (!msg)
7397 		return -1;
7398 
7399 	txq = nla_nest_start(msg, NL80211_ATTR_WIPHY_TXQ_PARAMS);
7400 	if (!txq)
7401 		goto fail;
7402 
7403 	/* We are only sending parameters for a single TXQ at a time */
7404 	params = nla_nest_start(msg, 1);
7405 	if (!params)
7406 		goto fail;
7407 
7408 	switch (queue) {
7409 	case 0:
7410 		if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VO))
7411 			goto fail;
7412 		break;
7413 	case 1:
7414 		if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VI))
7415 			goto fail;
7416 		break;
7417 	case 2:
7418 		if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BE))
7419 			goto fail;
7420 		break;
7421 	case 3:
7422 		if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BK))
7423 			goto fail;
7424 		break;
7425 	}
7426 	/* Burst time is configured in units of 0.1 msec and TXOP parameter in
7427 	 * 32 usec, so need to convert the value here. */
7428 	if (nla_put_u16(msg, NL80211_TXQ_ATTR_TXOP,
7429 			(burst_time * 100 + 16) / 32) ||
7430 	    nla_put_u16(msg, NL80211_TXQ_ATTR_CWMIN, cw_min) ||
7431 	    nla_put_u16(msg, NL80211_TXQ_ATTR_CWMAX, cw_max) ||
7432 	    nla_put_u8(msg, NL80211_TXQ_ATTR_AIFS, aifs))
7433 		goto fail;
7434 
7435 	nla_nest_end(msg, params);
7436 
7437 	nla_nest_end(msg, txq);
7438 
7439 	res = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7440 	wpa_printf(MSG_DEBUG,
7441 		   "nl80211: TX queue param set: queue=%d aifs=%d cw_min=%d cw_max=%d burst_time=%d --> res=%d",
7442 		   queue, aifs, cw_min, cw_max, burst_time, res);
7443 	if (res == 0)
7444 		return 0;
7445 	msg = NULL;
7446 fail:
7447 	nlmsg_free(msg);
7448 	return -1;
7449 }
7450 
7451 
i802_set_sta_vlan(struct i802_bss * bss,const u8 * addr,const char * ifname,int vlan_id)7452 static int i802_set_sta_vlan(struct i802_bss *bss, const u8 *addr,
7453 			     const char *ifname, int vlan_id)
7454 {
7455 	struct wpa_driver_nl80211_data *drv = bss->drv;
7456 	struct nl_msg *msg;
7457 	int ret;
7458 
7459 	wpa_printf(MSG_DEBUG, "nl80211: %s[%d]: set_sta_vlan(" MACSTR
7460 		   ", ifname=%s[%d], vlan_id=%d)",
7461 		   bss->ifname, if_nametoindex(bss->ifname),
7462 		   MAC2STR(addr), ifname, if_nametoindex(ifname), vlan_id);
7463 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
7464 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
7465 	    (vlan_id && (drv->capa.flags & WPA_DRIVER_FLAGS_VLAN_OFFLOAD) &&
7466 	     nla_put_u16(msg, NL80211_ATTR_VLAN_ID, vlan_id)) ||
7467 	    nla_put_u32(msg, NL80211_ATTR_STA_VLAN, if_nametoindex(ifname))) {
7468 		nlmsg_free(msg);
7469 		return -ENOBUFS;
7470 	}
7471 
7472 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7473 	if (ret < 0) {
7474 		wpa_printf(MSG_ERROR, "nl80211: NL80211_ATTR_STA_VLAN (addr="
7475 			   MACSTR " ifname=%s vlan_id=%d) failed: %d (%s)",
7476 			   MAC2STR(addr), ifname, vlan_id, ret,
7477 			   strerror(-ret));
7478 	}
7479 	return ret;
7480 }
7481 
7482 
i802_get_inact_sec(void * priv,const u8 * addr)7483 static int i802_get_inact_sec(void *priv, const u8 *addr)
7484 {
7485 	struct hostap_sta_driver_data data;
7486 	int ret;
7487 
7488 	os_memset(&data, 0, sizeof(data));
7489 	data.inactive_msec = (unsigned long) -1;
7490 	ret = i802_read_sta_data(priv, &data, addr);
7491 	if (ret == -ENOENT)
7492 		return -ENOENT;
7493 	if (ret || data.inactive_msec == (unsigned long) -1)
7494 		return -1;
7495 	return data.inactive_msec / 1000;
7496 }
7497 
7498 
i802_sta_clear_stats(void * priv,const u8 * addr)7499 static int i802_sta_clear_stats(void *priv, const u8 *addr)
7500 {
7501 #if 0
7502 	/* TODO */
7503 #endif
7504 	return 0;
7505 }
7506 
7507 
i802_sta_deauth(void * priv,const u8 * own_addr,const u8 * addr,u16 reason)7508 static int i802_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr,
7509 			   u16 reason)
7510 {
7511 	struct i802_bss *bss = priv;
7512 	struct wpa_driver_nl80211_data *drv = bss->drv;
7513 	struct ieee80211_mgmt mgmt;
7514 	u8 channel;
7515 
7516 	if (ieee80211_freq_to_chan(bss->freq, &channel) ==
7517 	    HOSTAPD_MODE_IEEE80211AD) {
7518 		/* Deauthentication is not used in DMG/IEEE 802.11ad;
7519 		 * disassociate the STA instead. */
7520 		return i802_sta_disassoc(priv, own_addr, addr, reason);
7521 	}
7522 
7523 	if (is_mesh_interface(drv->nlmode))
7524 		return -1;
7525 
7526 	if (drv->device_ap_sme)
7527 		return wpa_driver_nl80211_sta_remove(bss, addr, 1, reason);
7528 
7529 	memset(&mgmt, 0, sizeof(mgmt));
7530 	mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
7531 					  WLAN_FC_STYPE_DEAUTH);
7532 	memcpy(mgmt.da, addr, ETH_ALEN);
7533 	memcpy(mgmt.sa, own_addr, ETH_ALEN);
7534 	memcpy(mgmt.bssid, own_addr, ETH_ALEN);
7535 	mgmt.u.deauth.reason_code = host_to_le16(reason);
7536 	return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
7537 					    IEEE80211_HDRLEN +
7538 					    sizeof(mgmt.u.deauth), 0, 0, 0, 0,
7539 					    0, NULL, 0, 0);
7540 }
7541 
7542 
i802_sta_disassoc(void * priv,const u8 * own_addr,const u8 * addr,u16 reason)7543 static int i802_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
7544 			     u16 reason)
7545 {
7546 	struct i802_bss *bss = priv;
7547 	struct wpa_driver_nl80211_data *drv = bss->drv;
7548 	struct ieee80211_mgmt mgmt;
7549 
7550 	if (is_mesh_interface(drv->nlmode))
7551 		return -1;
7552 
7553 	if (drv->device_ap_sme)
7554 		return wpa_driver_nl80211_sta_remove(bss, addr, 0, reason);
7555 
7556 	memset(&mgmt, 0, sizeof(mgmt));
7557 	mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
7558 					  WLAN_FC_STYPE_DISASSOC);
7559 	memcpy(mgmt.da, addr, ETH_ALEN);
7560 	memcpy(mgmt.sa, own_addr, ETH_ALEN);
7561 	memcpy(mgmt.bssid, own_addr, ETH_ALEN);
7562 	mgmt.u.disassoc.reason_code = host_to_le16(reason);
7563 	return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
7564 					    IEEE80211_HDRLEN +
7565 					    sizeof(mgmt.u.disassoc), 0, 0, 0, 0,
7566 					    0, NULL, 0, 0);
7567 }
7568 
7569 
dump_ifidx(struct wpa_driver_nl80211_data * drv)7570 static void dump_ifidx(struct wpa_driver_nl80211_data *drv)
7571 {
7572 	char buf[200], *pos, *end;
7573 	int i, res;
7574 
7575 	pos = buf;
7576 	end = pos + sizeof(buf);
7577 
7578 	for (i = 0; i < drv->num_if_indices; i++) {
7579 		if (!drv->if_indices[i].ifindex)
7580 			continue;
7581 		res = os_snprintf(pos, end - pos, " %d(%d)",
7582 				  drv->if_indices[i].ifindex,
7583 				  drv->if_indices[i].reason);
7584 		if (os_snprintf_error(end - pos, res))
7585 			break;
7586 		pos += res;
7587 	}
7588 	*pos = '\0';
7589 
7590 	wpa_printf(MSG_DEBUG, "nl80211: if_indices[%d]:%s",
7591 		   drv->num_if_indices, buf);
7592 }
7593 
7594 
add_ifidx(struct wpa_driver_nl80211_data * drv,int ifidx,int ifidx_reason)7595 static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
7596 		      int ifidx_reason)
7597 {
7598 	int i;
7599 	struct drv_nl80211_if_info *old;
7600 
7601 	wpa_printf(MSG_DEBUG,
7602 		   "nl80211: Add own interface ifindex %d (ifidx_reason %d)",
7603 		   ifidx, ifidx_reason);
7604 	if (have_ifidx(drv, ifidx, ifidx_reason)) {
7605 		wpa_printf(MSG_DEBUG, "nl80211: ifindex %d already in the list",
7606 			   ifidx);
7607 		return;
7608 	}
7609 	for (i = 0; i < drv->num_if_indices; i++) {
7610 		if (drv->if_indices[i].ifindex == 0) {
7611 			drv->if_indices[i].ifindex = ifidx;
7612 			drv->if_indices[i].reason = ifidx_reason;
7613 			dump_ifidx(drv);
7614 			return;
7615 		}
7616 	}
7617 
7618 	if (drv->if_indices != drv->default_if_indices)
7619 		old = drv->if_indices;
7620 	else
7621 		old = NULL;
7622 
7623 	drv->if_indices = os_realloc_array(old, drv->num_if_indices + 1,
7624 					   sizeof(*old));
7625 	if (!drv->if_indices) {
7626 		if (!old)
7627 			drv->if_indices = drv->default_if_indices;
7628 		else
7629 			drv->if_indices = old;
7630 		wpa_printf(MSG_ERROR, "Failed to reallocate memory for "
7631 			   "interfaces");
7632 		wpa_printf(MSG_ERROR, "Ignoring EAPOL on interface %d", ifidx);
7633 		return;
7634 	}
7635 	if (!old)
7636 		os_memcpy(drv->if_indices, drv->default_if_indices,
7637 			  sizeof(drv->default_if_indices));
7638 	drv->if_indices[drv->num_if_indices].ifindex = ifidx;
7639 	drv->if_indices[drv->num_if_indices].reason = ifidx_reason;
7640 	drv->num_if_indices++;
7641 	dump_ifidx(drv);
7642 }
7643 
7644 
del_ifidx(struct wpa_driver_nl80211_data * drv,int ifidx,int ifidx_reason)7645 static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
7646 		      int ifidx_reason)
7647 {
7648 	int i;
7649 
7650 	for (i = 0; i < drv->num_if_indices; i++) {
7651 		if ((drv->if_indices[i].ifindex == ifidx ||
7652 		     ifidx == IFIDX_ANY) &&
7653 		    (drv->if_indices[i].reason == ifidx_reason ||
7654 		     ifidx_reason == IFIDX_ANY)) {
7655 			drv->if_indices[i].ifindex = 0;
7656 			drv->if_indices[i].reason = 0;
7657 			break;
7658 		}
7659 	}
7660 	dump_ifidx(drv);
7661 }
7662 
7663 
have_ifidx(struct wpa_driver_nl80211_data * drv,int ifidx,int ifidx_reason)7664 static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
7665 		      int ifidx_reason)
7666 {
7667 	int i;
7668 
7669 	for (i = 0; i < drv->num_if_indices; i++)
7670 		if (drv->if_indices[i].ifindex == ifidx &&
7671 		    (drv->if_indices[i].reason == ifidx_reason ||
7672 		     ifidx_reason == IFIDX_ANY))
7673 			return 1;
7674 
7675 	return 0;
7676 }
7677 
7678 
i802_set_wds_sta(void * priv,const u8 * addr,int aid,int val,const char * bridge_ifname,char * ifname_wds)7679 static int i802_set_wds_sta(void *priv, const u8 *addr, int aid, int val,
7680 			    const char *bridge_ifname, char *ifname_wds)
7681 {
7682 	struct i802_bss *bss = priv;
7683 	struct wpa_driver_nl80211_data *drv = bss->drv;
7684 	char name[IFNAMSIZ + 1];
7685 	union wpa_event_data event;
7686 	int ret;
7687 
7688 	ret = os_snprintf(name, sizeof(name), "%s.sta%d", bss->ifname, aid);
7689 	if (ret >= (int) sizeof(name))
7690 		wpa_printf(MSG_WARNING,
7691 			   "nl80211: WDS interface name was truncated");
7692 	else if (ret < 0)
7693 		return ret;
7694 
7695 	if (ifname_wds)
7696 		os_strlcpy(ifname_wds, name, IFNAMSIZ + 1);
7697 
7698 	wpa_printf(MSG_DEBUG, "nl80211: Set WDS STA addr=" MACSTR
7699 		   " aid=%d val=%d name=%s", MAC2STR(addr), aid, val, name);
7700 	if (val) {
7701 		if (!if_nametoindex(name)) {
7702 			if (nl80211_create_iface(drv, name,
7703 						 NL80211_IFTYPE_AP_VLAN,
7704 						 bss->addr, 1, NULL, NULL, 0) <
7705 			    0)
7706 				return -1;
7707 			if (bridge_ifname &&
7708 			    linux_br_add_if(drv->global->ioctl_sock,
7709 					    bridge_ifname, name) < 0)
7710 				return -1;
7711 
7712 			os_memset(&event, 0, sizeof(event));
7713 			event.wds_sta_interface.sta_addr = addr;
7714 			event.wds_sta_interface.ifname = name;
7715 			event.wds_sta_interface.istatus = INTERFACE_ADDED;
7716 			wpa_supplicant_event(bss->ctx,
7717 					     EVENT_WDS_STA_INTERFACE_STATUS,
7718 					     &event);
7719 		}
7720 		if (linux_set_iface_flags(drv->global->ioctl_sock, name, 1)) {
7721 			wpa_printf(MSG_ERROR, "nl80211: Failed to set WDS STA "
7722 				   "interface %s up", name);
7723 		}
7724 		return i802_set_sta_vlan(priv, addr, name, 0);
7725 	} else {
7726 		if (bridge_ifname &&
7727 		    linux_br_del_if(drv->global->ioctl_sock, bridge_ifname,
7728 				    name) < 0)
7729 			wpa_printf(MSG_INFO,
7730 				   "nl80211: Failed to remove interface %s from bridge %s: %s",
7731 				   name, bridge_ifname, strerror(errno));
7732 
7733 		i802_set_sta_vlan(priv, addr, bss->ifname, 0);
7734 		nl80211_remove_iface(drv, if_nametoindex(name));
7735 		os_memset(&event, 0, sizeof(event));
7736 		event.wds_sta_interface.sta_addr = addr;
7737 		event.wds_sta_interface.ifname = name;
7738 		event.wds_sta_interface.istatus = INTERFACE_REMOVED;
7739 		wpa_supplicant_event(bss->ctx, EVENT_WDS_STA_INTERFACE_STATUS,
7740 				     &event);
7741 		return 0;
7742 	}
7743 }
7744 
7745 
handle_eapol(int sock,void * eloop_ctx,void * sock_ctx)7746 static void handle_eapol(int sock, void *eloop_ctx, void *sock_ctx)
7747 {
7748 	struct wpa_driver_nl80211_data *drv = eloop_ctx;
7749 	struct sockaddr_ll lladdr;
7750 	unsigned char buf[3000];
7751 	int len;
7752 	socklen_t fromlen = sizeof(lladdr);
7753 
7754 	len = recvfrom(sock, buf, sizeof(buf), 0,
7755 		       (struct sockaddr *)&lladdr, &fromlen);
7756 	if (len < 0) {
7757 		wpa_printf(MSG_ERROR, "nl80211: EAPOL recv failed: %s",
7758 			   strerror(errno));
7759 		return;
7760 	}
7761 
7762 	if (have_ifidx(drv, lladdr.sll_ifindex, IFIDX_ANY))
7763 		drv_event_eapol_rx(drv->ctx, lladdr.sll_addr, buf, len);
7764 }
7765 
7766 
i802_check_bridge(struct wpa_driver_nl80211_data * drv,struct i802_bss * bss,const char * brname,const char * ifname)7767 static int i802_check_bridge(struct wpa_driver_nl80211_data *drv,
7768 			     struct i802_bss *bss,
7769 			     const char *brname, const char *ifname)
7770 {
7771 	int br_ifindex;
7772 	char in_br[IFNAMSIZ];
7773 
7774 	os_strlcpy(bss->brname, brname, IFNAMSIZ);
7775 	br_ifindex = if_nametoindex(brname);
7776 	if (br_ifindex == 0) {
7777 		/*
7778 		 * Bridge was configured, but the bridge device does
7779 		 * not exist. Try to add it now.
7780 		 */
7781 		if (linux_br_add(drv->global->ioctl_sock, brname) < 0) {
7782 			wpa_printf(MSG_ERROR, "nl80211: Failed to add the "
7783 				   "bridge interface %s: %s",
7784 				   brname, strerror(errno));
7785 			return -1;
7786 		}
7787 		bss->added_bridge = 1;
7788 		br_ifindex = if_nametoindex(brname);
7789 		add_ifidx(drv, br_ifindex, drv->ifindex);
7790 	}
7791 	bss->br_ifindex = br_ifindex;
7792 
7793 	if (linux_br_get(in_br, ifname) == 0) {
7794 		if (os_strcmp(in_br, brname) == 0) {
7795 			bss->already_in_bridge = 1;
7796 			return 0; /* already in the bridge */
7797 		}
7798 
7799 		wpa_printf(MSG_DEBUG, "nl80211: Removing interface %s from "
7800 			   "bridge %s", ifname, in_br);
7801 		if (linux_br_del_if(drv->global->ioctl_sock, in_br, ifname) <
7802 		    0) {
7803 			wpa_printf(MSG_ERROR, "nl80211: Failed to "
7804 				   "remove interface %s from bridge "
7805 				   "%s: %s",
7806 				   ifname, in_br, strerror(errno));
7807 			return -1;
7808 		}
7809 	}
7810 
7811 	wpa_printf(MSG_DEBUG, "nl80211: Adding interface %s into bridge %s",
7812 		   ifname, brname);
7813 	if (linux_br_add_if(drv->global->ioctl_sock, brname, ifname) < 0) {
7814 		wpa_printf(MSG_WARNING,
7815 			   "nl80211: Failed to add interface %s into bridge %s: %s",
7816 			   ifname, brname, strerror(errno));
7817 		/* Try to continue without the interface being in a bridge. This
7818 		 * may be needed for some cases, e.g., with Open vSwitch, where
7819 		 * an external component will need to handle bridge
7820 		 * configuration. */
7821 		return 0;
7822 	}
7823 	bss->added_if_into_bridge = 1;
7824 
7825 	return 0;
7826 }
7827 
7828 
i802_init(struct hostapd_data * hapd,struct wpa_init_params * params)7829 static void *i802_init(struct hostapd_data *hapd,
7830 		       struct wpa_init_params *params)
7831 {
7832 	struct wpa_driver_nl80211_data *drv;
7833 	struct i802_bss *bss;
7834 	size_t i;
7835 	char master_ifname[IFNAMSIZ];
7836 	int ifindex, br_ifindex = 0;
7837 	int br_added = 0;
7838 
7839 	bss = wpa_driver_nl80211_drv_init(hapd, params->ifname,
7840 					  params->global_priv, 1,
7841 					  params->bssid, params->driver_params);
7842 	if (bss == NULL)
7843 		return NULL;
7844 
7845 	drv = bss->drv;
7846 
7847 	if (linux_br_get(master_ifname, params->ifname) == 0) {
7848 		wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in bridge %s",
7849 			   params->ifname, master_ifname);
7850 		br_ifindex = if_nametoindex(master_ifname);
7851 		os_strlcpy(bss->brname, master_ifname, IFNAMSIZ);
7852 	} else if ((params->num_bridge == 0 || !params->bridge[0]) &&
7853 		   linux_master_get(master_ifname, params->ifname) == 0) {
7854 		wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in master %s",
7855 			params->ifname, master_ifname);
7856 		/* start listening for EAPOL on the master interface */
7857 		add_ifidx(drv, if_nametoindex(master_ifname), drv->ifindex);
7858 
7859 		/* check if master itself is under bridge */
7860 		if (linux_br_get(master_ifname, master_ifname) == 0) {
7861 			wpa_printf(MSG_DEBUG, "nl80211: which is in bridge %s",
7862 				   master_ifname);
7863 			br_ifindex = if_nametoindex(master_ifname);
7864 			os_strlcpy(bss->brname, master_ifname, IFNAMSIZ);
7865 		}
7866 	} else {
7867 		master_ifname[0] = '\0';
7868 	}
7869 
7870 	bss->br_ifindex = br_ifindex;
7871 
7872 	for (i = 0; i < params->num_bridge; i++) {
7873 		if (params->bridge[i]) {
7874 			ifindex = if_nametoindex(params->bridge[i]);
7875 			if (ifindex)
7876 				add_ifidx(drv, ifindex, drv->ifindex);
7877 			if (ifindex == br_ifindex)
7878 				br_added = 1;
7879 		}
7880 	}
7881 
7882 	/* start listening for EAPOL on the default AP interface */
7883 	add_ifidx(drv, drv->ifindex, IFIDX_ANY);
7884 
7885 	if (params->num_bridge && params->bridge[0]) {
7886 		if (i802_check_bridge(drv, bss, params->bridge[0],
7887 				      params->ifname) < 0)
7888 			goto failed;
7889 		if (os_strcmp(params->bridge[0], master_ifname) != 0)
7890 			br_added = 1;
7891 	}
7892 
7893 	if (!br_added && br_ifindex &&
7894 	    (params->num_bridge == 0 || !params->bridge[0]))
7895 		add_ifidx(drv, br_ifindex, drv->ifindex);
7896 
7897 #ifdef CONFIG_LIBNL3_ROUTE
7898 	if (bss->added_if_into_bridge || bss->already_in_bridge) {
7899 		int err;
7900 
7901 		drv->rtnl_sk = nl_socket_alloc();
7902 		if (drv->rtnl_sk == NULL) {
7903 			wpa_printf(MSG_ERROR, "nl80211: Failed to allocate nl_sock");
7904 			goto failed;
7905 		}
7906 
7907 		err = nl_connect(drv->rtnl_sk, NETLINK_ROUTE);
7908 		if (err) {
7909 			wpa_printf(MSG_ERROR, "nl80211: Failed to connect nl_sock to NETLINK_ROUTE: %s",
7910 				   nl_geterror(err));
7911 			goto failed;
7912 		}
7913 	}
7914 #endif /* CONFIG_LIBNL3_ROUTE */
7915 
7916 	if (drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_RX) {
7917 		wpa_printf(MSG_DEBUG,
7918 			   "nl80211: Do not open EAPOL RX socket - using control port for RX");
7919 		goto skip_eapol_sock;
7920 	}
7921 
7922 	drv->eapol_sock = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_PAE));
7923 	if (drv->eapol_sock < 0) {
7924 		wpa_printf(MSG_ERROR, "nl80211: socket(PF_PACKET, SOCK_DGRAM, ETH_P_PAE) failed: %s",
7925 			   strerror(errno));
7926 		goto failed;
7927 	}
7928 
7929 	if (eloop_register_read_sock(drv->eapol_sock, handle_eapol, drv, NULL))
7930 	{
7931 		wpa_printf(MSG_INFO, "nl80211: Could not register read socket for eapol");
7932 		goto failed;
7933 	}
7934 skip_eapol_sock:
7935 
7936 	if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
7937 			       params->own_addr))
7938 		goto failed;
7939 	os_memcpy(drv->perm_addr, params->own_addr, ETH_ALEN);
7940 
7941 	memcpy(bss->addr, params->own_addr, ETH_ALEN);
7942 
7943 	return bss;
7944 
7945 failed:
7946 	wpa_driver_nl80211_deinit(bss);
7947 	return NULL;
7948 }
7949 
7950 
i802_deinit(void * priv)7951 static void i802_deinit(void *priv)
7952 {
7953 	struct i802_bss *bss = priv;
7954 	wpa_driver_nl80211_deinit(bss);
7955 }
7956 
7957 
wpa_driver_nl80211_if_type(enum wpa_driver_if_type type)7958 static enum nl80211_iftype wpa_driver_nl80211_if_type(
7959 	enum wpa_driver_if_type type)
7960 {
7961 	switch (type) {
7962 	case WPA_IF_STATION:
7963 		return NL80211_IFTYPE_STATION;
7964 	case WPA_IF_P2P_CLIENT:
7965 	case WPA_IF_P2P_GROUP:
7966 		return NL80211_IFTYPE_P2P_CLIENT;
7967 	case WPA_IF_AP_VLAN:
7968 		return NL80211_IFTYPE_AP_VLAN;
7969 	case WPA_IF_AP_BSS:
7970 		return NL80211_IFTYPE_AP;
7971 	case WPA_IF_P2P_GO:
7972 		return NL80211_IFTYPE_P2P_GO;
7973 	case WPA_IF_P2P_DEVICE:
7974 		return NL80211_IFTYPE_P2P_DEVICE;
7975 	case WPA_IF_MESH:
7976 		return NL80211_IFTYPE_MESH_POINT;
7977 	default:
7978 		return -1;
7979 	}
7980 }
7981 
7982 
nl80211_addr_in_use(struct nl80211_global * global,const u8 * addr)7983 static int nl80211_addr_in_use(struct nl80211_global *global, const u8 *addr)
7984 {
7985 	struct wpa_driver_nl80211_data *drv;
7986 	dl_list_for_each(drv, &global->interfaces,
7987 			 struct wpa_driver_nl80211_data, list) {
7988 		if (os_memcmp(addr, drv->first_bss->addr, ETH_ALEN) == 0)
7989 			return 1;
7990 	}
7991 	return 0;
7992 }
7993 
7994 
nl80211_vif_addr(struct wpa_driver_nl80211_data * drv,u8 * new_addr)7995 static int nl80211_vif_addr(struct wpa_driver_nl80211_data *drv, u8 *new_addr)
7996 {
7997 	unsigned int idx;
7998 
7999 	if (!drv->global)
8000 		return -1;
8001 
8002 	os_memcpy(new_addr, drv->first_bss->addr, ETH_ALEN);
8003 	for (idx = 0; idx < 64; idx++) {
8004 		new_addr[0] = drv->first_bss->addr[0] | 0x02;
8005 		new_addr[0] ^= idx << 2;
8006 		if (!nl80211_addr_in_use(drv->global, new_addr))
8007 			break;
8008 	}
8009 	if (idx == 64)
8010 		return -1;
8011 
8012 	wpa_printf(MSG_DEBUG, "nl80211: Assigned new virtual interface address "
8013 		   MACSTR, MAC2STR(new_addr));
8014 
8015 	return 0;
8016 }
8017 
8018 
8019 struct wdev_info {
8020 	u64 wdev_id;
8021 	int wdev_id_set;
8022 	u8 macaddr[ETH_ALEN];
8023 };
8024 
nl80211_wdev_handler(struct nl_msg * msg,void * arg)8025 static int nl80211_wdev_handler(struct nl_msg *msg, void *arg)
8026 {
8027 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
8028 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
8029 	struct wdev_info *wi = arg;
8030 
8031 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
8032 		  genlmsg_attrlen(gnlh, 0), NULL);
8033 	if (tb[NL80211_ATTR_WDEV]) {
8034 		wi->wdev_id = nla_get_u64(tb[NL80211_ATTR_WDEV]);
8035 		wi->wdev_id_set = 1;
8036 	}
8037 
8038 	if (tb[NL80211_ATTR_MAC])
8039 		os_memcpy(wi->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
8040 			  ETH_ALEN);
8041 
8042 	return NL_SKIP;
8043 }
8044 
8045 
wpa_driver_nl80211_if_add(void * priv,enum wpa_driver_if_type type,const char * ifname,const u8 * addr,void * bss_ctx,void ** drv_priv,char * force_ifname,u8 * if_addr,const char * bridge,int use_existing,int setup_ap)8046 static int wpa_driver_nl80211_if_add(void *priv, enum wpa_driver_if_type type,
8047 				     const char *ifname, const u8 *addr,
8048 				     void *bss_ctx, void **drv_priv,
8049 				     char *force_ifname, u8 *if_addr,
8050 				     const char *bridge, int use_existing,
8051 				     int setup_ap)
8052 {
8053 	enum nl80211_iftype nlmode;
8054 	struct i802_bss *bss = priv;
8055 	struct wpa_driver_nl80211_data *drv = bss->drv;
8056 	int ifidx;
8057 	int added = 1;
8058 
8059 	if (addr)
8060 		os_memcpy(if_addr, addr, ETH_ALEN);
8061 	nlmode = wpa_driver_nl80211_if_type(type);
8062 	if (nlmode == NL80211_IFTYPE_P2P_DEVICE) {
8063 		struct wdev_info p2pdev_info;
8064 
8065 		os_memset(&p2pdev_info, 0, sizeof(p2pdev_info));
8066 		ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
8067 					     0, nl80211_wdev_handler,
8068 					     &p2pdev_info, use_existing);
8069 		if (!p2pdev_info.wdev_id_set || ifidx != 0) {
8070 			wpa_printf(MSG_ERROR, "nl80211: Failed to create a P2P Device interface %s",
8071 				   ifname);
8072 			return -1;
8073 		}
8074 
8075 		drv->global->if_add_wdevid = p2pdev_info.wdev_id;
8076 		drv->global->if_add_wdevid_set = p2pdev_info.wdev_id_set;
8077 		if (!is_zero_ether_addr(p2pdev_info.macaddr)) {
8078 			os_memcpy(if_addr, p2pdev_info.macaddr, ETH_ALEN);
8079 			os_memcpy(drv->global->p2p_perm_addr, p2pdev_info.macaddr, ETH_ALEN);
8080 		}
8081 		wpa_printf(MSG_DEBUG, "nl80211: New P2P Device interface %s (0x%llx) created",
8082 			   ifname,
8083 			   (long long unsigned int) p2pdev_info.wdev_id);
8084 	} else {
8085 		ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
8086 					     0, NULL, NULL, use_existing);
8087 		if (use_existing && ifidx == -ENFILE) {
8088 			added = 0;
8089 			ifidx = if_nametoindex(ifname);
8090 		} else if (ifidx < 0) {
8091 			return -1;
8092 		}
8093 	}
8094 
8095 	if (!addr) {
8096 		if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
8097 			os_memcpy(if_addr, bss->addr, ETH_ALEN);
8098 		else if (linux_get_ifhwaddr(drv->global->ioctl_sock,
8099 					    ifname, if_addr) < 0) {
8100 			if (added)
8101 				nl80211_remove_iface(drv, ifidx);
8102 			return -1;
8103 		}
8104 	}
8105 
8106 	if (!addr &&
8107 	    (type == WPA_IF_P2P_CLIENT || type == WPA_IF_P2P_GROUP ||
8108 	     type == WPA_IF_P2P_GO || type == WPA_IF_MESH ||
8109 	     type == WPA_IF_STATION)) {
8110 		/* Enforce unique address */
8111 		u8 new_addr[ETH_ALEN];
8112 
8113 		if (linux_get_ifhwaddr(drv->global->ioctl_sock, ifname,
8114 				       new_addr) < 0) {
8115 			if (added)
8116 				nl80211_remove_iface(drv, ifidx);
8117 			return -1;
8118 		}
8119 		if (nl80211_addr_in_use(drv->global, new_addr)) {
8120 			wpa_printf(MSG_DEBUG, "nl80211: Allocate new address "
8121 				   "for interface %s type %d", ifname, type);
8122 			if (nl80211_vif_addr(drv, new_addr) < 0) {
8123 				if (added)
8124 					nl80211_remove_iface(drv, ifidx);
8125 				return -1;
8126 			}
8127 			if (linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
8128 					       new_addr) < 0) {
8129 				if (added)
8130 					nl80211_remove_iface(drv, ifidx);
8131 				return -1;
8132 			}
8133 		}
8134 		os_memcpy(if_addr, new_addr, ETH_ALEN);
8135 	}
8136 
8137 	if (type == WPA_IF_AP_BSS && setup_ap) {
8138 		struct i802_bss *new_bss = os_zalloc(sizeof(*new_bss));
8139 		if (new_bss == NULL) {
8140 			if (added)
8141 				nl80211_remove_iface(drv, ifidx);
8142 			return -1;
8143 		}
8144 
8145 		if (bridge &&
8146 		    i802_check_bridge(drv, new_bss, bridge, ifname) < 0) {
8147 			wpa_printf(MSG_ERROR, "nl80211: Failed to add the new "
8148 				   "interface %s to a bridge %s",
8149 				   ifname, bridge);
8150 			if (added)
8151 				nl80211_remove_iface(drv, ifidx);
8152 			os_free(new_bss);
8153 			return -1;
8154 		}
8155 
8156 		if (linux_set_iface_flags(drv->global->ioctl_sock, ifname, 1))
8157 		{
8158 			if (added)
8159 				nl80211_remove_iface(drv, ifidx);
8160 			os_free(new_bss);
8161 			return -1;
8162 		}
8163 		os_strlcpy(new_bss->ifname, ifname, IFNAMSIZ);
8164 		os_memcpy(new_bss->addr, if_addr, ETH_ALEN);
8165 		new_bss->ifindex = ifidx;
8166 		new_bss->drv = drv;
8167 		new_bss->next = drv->first_bss->next;
8168 		new_bss->freq = drv->first_bss->freq;
8169 		new_bss->ctx = bss_ctx;
8170 		new_bss->added_if = added;
8171 		drv->first_bss->next = new_bss;
8172 		if (drv_priv)
8173 			*drv_priv = new_bss;
8174 		nl80211_init_bss(new_bss);
8175 
8176 		/* Subscribe management frames for this WPA_IF_AP_BSS */
8177 		if (nl80211_setup_ap(new_bss))
8178 			return -1;
8179 	}
8180 
8181 	if (drv->global)
8182 		drv->global->if_add_ifindex = ifidx;
8183 
8184 	/*
8185 	 * Some virtual interfaces need to process EAPOL packets and events on
8186 	 * the parent interface. This is used mainly with hostapd.
8187 	 */
8188 	if (ifidx > 0 &&
8189 	    (drv->hostapd ||
8190 	     nlmode == NL80211_IFTYPE_AP_VLAN ||
8191 	     nlmode == NL80211_IFTYPE_WDS ||
8192 	     nlmode == NL80211_IFTYPE_MONITOR))
8193 		add_ifidx(drv, ifidx, IFIDX_ANY);
8194 
8195 	return 0;
8196 }
8197 
8198 
wpa_driver_nl80211_if_remove(struct i802_bss * bss,enum wpa_driver_if_type type,const char * ifname)8199 static int wpa_driver_nl80211_if_remove(struct i802_bss *bss,
8200 					enum wpa_driver_if_type type,
8201 					const char *ifname)
8202 {
8203 	struct wpa_driver_nl80211_data *drv = bss->drv;
8204 	int ifindex = if_nametoindex(ifname);
8205 
8206 	wpa_printf(MSG_DEBUG, "nl80211: %s(type=%d ifname=%s) ifindex=%d added_if=%d",
8207 		   __func__, type, ifname, ifindex, bss->added_if);
8208 	if (ifindex > 0 && (bss->added_if || bss->ifindex != ifindex))
8209 		nl80211_remove_iface(drv, ifindex);
8210 	else if (ifindex > 0 && !bss->added_if) {
8211 		struct wpa_driver_nl80211_data *drv2;
8212 		dl_list_for_each(drv2, &drv->global->interfaces,
8213 				 struct wpa_driver_nl80211_data, list) {
8214 			del_ifidx(drv2, ifindex, IFIDX_ANY);
8215 			del_ifidx(drv2, IFIDX_ANY, ifindex);
8216 		}
8217 	}
8218 
8219 	if (type != WPA_IF_AP_BSS)
8220 		return 0;
8221 
8222 	if (bss->added_if_into_bridge) {
8223 		if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
8224 				    bss->ifname) < 0)
8225 			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
8226 				   "interface %s from bridge %s: %s",
8227 				   bss->ifname, bss->brname, strerror(errno));
8228 	}
8229 	if (bss->added_bridge) {
8230 		if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
8231 			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
8232 				   "bridge %s: %s",
8233 				   bss->brname, strerror(errno));
8234 	}
8235 
8236 	if (bss != drv->first_bss) {
8237 		struct i802_bss *tbss;
8238 
8239 		wpa_printf(MSG_DEBUG, "nl80211: Not the first BSS - remove it");
8240 		for (tbss = drv->first_bss; tbss; tbss = tbss->next) {
8241 			if (tbss->next == bss) {
8242 				tbss->next = bss->next;
8243 				/* Unsubscribe management frames */
8244 				nl80211_teardown_ap(bss);
8245 				nl80211_destroy_bss(bss);
8246 				if (!bss->added_if)
8247 					i802_set_iface_flags(bss, 0);
8248 				os_free(bss);
8249 				bss = NULL;
8250 				break;
8251 			}
8252 		}
8253 		if (bss)
8254 			wpa_printf(MSG_INFO, "nl80211: %s - could not find "
8255 				   "BSS %p in the list", __func__, bss);
8256 	} else {
8257 		wpa_printf(MSG_DEBUG, "nl80211: First BSS - reassign context");
8258 		nl80211_teardown_ap(bss);
8259 		if (!bss->added_if && !drv->first_bss->next)
8260 			wpa_driver_nl80211_del_beacon(bss);
8261 		nl80211_destroy_bss(bss);
8262 		if (!bss->added_if)
8263 			i802_set_iface_flags(bss, 0);
8264 		if (drv->first_bss->next) {
8265 			drv->first_bss = drv->first_bss->next;
8266 			drv->ctx = drv->first_bss->ctx;
8267 			os_free(bss);
8268 		} else {
8269 			wpa_printf(MSG_DEBUG, "nl80211: No second BSS to reassign context to");
8270 		}
8271 	}
8272 
8273 	return 0;
8274 }
8275 
8276 
cookie_handler(struct nl_msg * msg,void * arg)8277 static int cookie_handler(struct nl_msg *msg, void *arg)
8278 {
8279 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
8280 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
8281 	u64 *cookie = arg;
8282 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
8283 		  genlmsg_attrlen(gnlh, 0), NULL);
8284 	if (tb[NL80211_ATTR_COOKIE])
8285 		*cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]);
8286 	return NL_SKIP;
8287 }
8288 
8289 
nl80211_send_frame_cmd(struct i802_bss * bss,unsigned int freq,unsigned int wait,const u8 * buf,size_t buf_len,int save_cookie,int no_cck,int no_ack,int offchanok,const u16 * csa_offs,size_t csa_offs_len)8290 static int nl80211_send_frame_cmd(struct i802_bss *bss,
8291 				  unsigned int freq, unsigned int wait,
8292 				  const u8 *buf, size_t buf_len,
8293 				  int save_cookie, int no_cck, int no_ack,
8294 				  int offchanok, const u16 *csa_offs,
8295 				  size_t csa_offs_len)
8296 {
8297 	struct wpa_driver_nl80211_data *drv = bss->drv;
8298 	struct nl_msg *msg;
8299 	u64 cookie;
8300 	int ret = -1;
8301 
8302 	wpa_printf(MSG_MSGDUMP, "nl80211: CMD_FRAME freq=%u wait=%u no_cck=%d "
8303 		   "no_ack=%d offchanok=%d",
8304 		   freq, wait, no_cck, no_ack, offchanok);
8305 	wpa_hexdump(MSG_MSGDUMP, "CMD_FRAME", buf, buf_len);
8306 
8307 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_FRAME)) ||
8308 	    (freq && nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq)) ||
8309 	    (wait && nla_put_u32(msg, NL80211_ATTR_DURATION, wait)) ||
8310 	    (offchanok && ((drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
8311 			   drv->test_use_roc_tx) &&
8312 	     nla_put_flag(msg, NL80211_ATTR_OFFCHANNEL_TX_OK)) ||
8313 	    (no_cck && nla_put_flag(msg, NL80211_ATTR_TX_NO_CCK_RATE)) ||
8314 	    (no_ack && nla_put_flag(msg, NL80211_ATTR_DONT_WAIT_FOR_ACK)) ||
8315 	    (csa_offs && nla_put(msg, NL80211_ATTR_CSA_C_OFFSETS_TX,
8316 				 csa_offs_len * sizeof(u16), csa_offs)) ||
8317 	    nla_put(msg, NL80211_ATTR_FRAME, buf_len, buf))
8318 		goto fail;
8319 
8320 	cookie = 0;
8321 	ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie, NULL, NULL);
8322 	msg = NULL;
8323 	if (ret) {
8324 		wpa_printf(MSG_DEBUG, "nl80211: Frame command failed: ret=%d "
8325 			   "(%s) (freq=%u wait=%u)", ret, strerror(-ret),
8326 			   freq, wait);
8327 	} else {
8328 		wpa_printf(MSG_MSGDUMP, "nl80211: Frame TX command accepted%s; "
8329 			   "cookie 0x%llx", no_ack ? " (no ACK)" : "",
8330 			   (long long unsigned int) cookie);
8331 
8332 		if (save_cookie)
8333 			drv->send_frame_cookie = no_ack ? (u64) -1 : cookie;
8334 
8335 		if (!wait) {
8336 			 /* There is no need to store this cookie since there
8337 			  * is no wait that could be canceled later.  */
8338 			goto fail;
8339 		}
8340 		if (drv->num_send_frame_cookies == MAX_SEND_FRAME_COOKIES) {
8341 			wpa_printf(MSG_DEBUG,
8342 				   "nl80211: Drop oldest pending send frame cookie 0x%llx",
8343 				   (long long unsigned int)
8344 				   drv->send_frame_cookies[0]);
8345 			os_memmove(&drv->send_frame_cookies[0],
8346 				   &drv->send_frame_cookies[1],
8347 				   (MAX_SEND_FRAME_COOKIES - 1) *
8348 				   sizeof(u64));
8349 			drv->num_send_frame_cookies--;
8350 		}
8351 		drv->send_frame_cookies[drv->num_send_frame_cookies] = cookie;
8352 		drv->num_send_frame_cookies++;
8353 	}
8354 
8355 fail:
8356 	nlmsg_free(msg);
8357 	return ret;
8358 }
8359 
8360 
wpa_driver_nl80211_send_action(struct i802_bss * bss,unsigned int freq,unsigned int wait_time,const u8 * dst,const u8 * src,const u8 * bssid,const u8 * data,size_t data_len,int no_cck)8361 static int wpa_driver_nl80211_send_action(struct i802_bss *bss,
8362 					  unsigned int freq,
8363 					  unsigned int wait_time,
8364 					  const u8 *dst, const u8 *src,
8365 					  const u8 *bssid,
8366 					  const u8 *data, size_t data_len,
8367 					  int no_cck)
8368 {
8369 	struct wpa_driver_nl80211_data *drv = bss->drv;
8370 	int ret = -1;
8371 	u8 *buf;
8372 	struct ieee80211_hdr *hdr;
8373 	int offchanok = 1;
8374 
8375 	if (is_ap_interface(drv->nlmode) && (int) freq == bss->freq &&
8376 	    bss->beacon_set)
8377 		offchanok = 0;
8378 
8379 	wpa_printf(MSG_DEBUG, "nl80211: Send Action frame (ifindex=%d, "
8380 		   "freq=%u MHz wait=%d ms no_cck=%d offchanok=%d)",
8381 		   drv->ifindex, freq, wait_time, no_cck, offchanok);
8382 
8383 	buf = os_zalloc(24 + data_len);
8384 	if (buf == NULL)
8385 		return ret;
8386 	os_memcpy(buf + 24, data, data_len);
8387 	hdr = (struct ieee80211_hdr *) buf;
8388 	hdr->frame_control =
8389 		IEEE80211_FC(WLAN_FC_TYPE_MGMT, WLAN_FC_STYPE_ACTION);
8390 	os_memcpy(hdr->addr1, dst, ETH_ALEN);
8391 	os_memcpy(hdr->addr2, src, ETH_ALEN);
8392 	os_memcpy(hdr->addr3, bssid, ETH_ALEN);
8393 
8394 	if (os_memcmp(bss->addr, src, ETH_ALEN) != 0) {
8395 		wpa_printf(MSG_DEBUG, "nl80211: Use random TA " MACSTR,
8396 			   MAC2STR(src));
8397 		os_memcpy(bss->rand_addr, src, ETH_ALEN);
8398 	} else {
8399 		os_memset(bss->rand_addr, 0, ETH_ALEN);
8400 	}
8401 
8402 #ifdef CONFIG_MESH
8403 	if (is_mesh_interface(drv->nlmode)) {
8404 		struct hostapd_hw_modes *modes;
8405 		u16 num_modes, flags;
8406 		u8 dfs_domain;
8407 		int i;
8408 
8409 		modes = nl80211_get_hw_feature_data(bss, &num_modes,
8410 						    &flags, &dfs_domain);
8411 		if (dfs_domain != HOSTAPD_DFS_REGION_ETSI &&
8412 		    ieee80211_is_dfs(bss->freq, modes, num_modes))
8413 			offchanok = 0;
8414 		if (modes) {
8415 			for (i = 0; i < num_modes; i++) {
8416 				os_free(modes[i].channels);
8417 				os_free(modes[i].rates);
8418 			}
8419 			os_free(modes);
8420 		}
8421 	}
8422 #endif /* CONFIG_MESH */
8423 
8424 	if (is_ap_interface(drv->nlmode) &&
8425 	    (!(drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
8426 	     (int) freq == bss->freq || drv->device_ap_sme ||
8427 	     !drv->use_monitor))
8428 		ret = wpa_driver_nl80211_send_mlme(bss, buf, 24 + data_len,
8429 						   0, freq, no_cck, offchanok,
8430 						   wait_time, NULL, 0, 0);
8431 	else
8432 		ret = nl80211_send_frame_cmd(bss, freq, wait_time, buf,
8433 					     24 + data_len,
8434 					     1, no_cck, 0, offchanok, NULL, 0);
8435 
8436 	os_free(buf);
8437 	return ret;
8438 }
8439 
8440 
nl80211_frame_wait_cancel(struct i802_bss * bss,u64 cookie)8441 static void nl80211_frame_wait_cancel(struct i802_bss *bss, u64 cookie)
8442 {
8443 	struct wpa_driver_nl80211_data *drv = bss->drv;
8444 	struct nl_msg *msg;
8445 	int ret;
8446 
8447 	wpa_printf(MSG_DEBUG, "nl80211: Cancel TX frame wait: cookie=0x%llx",
8448 		   (long long unsigned int) cookie);
8449 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_FRAME_WAIT_CANCEL)) ||
8450 	    nla_put_u64(msg, NL80211_ATTR_COOKIE, cookie)) {
8451 		nlmsg_free(msg);
8452 		return;
8453 	}
8454 
8455 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
8456 	if (ret)
8457 		wpa_printf(MSG_DEBUG, "nl80211: wait cancel failed: ret=%d "
8458 			   "(%s)", ret, strerror(-ret));
8459 }
8460 
8461 
wpa_driver_nl80211_send_action_cancel_wait(void * priv)8462 static void wpa_driver_nl80211_send_action_cancel_wait(void *priv)
8463 {
8464 	struct i802_bss *bss = priv;
8465 	struct wpa_driver_nl80211_data *drv = bss->drv;
8466 	unsigned int i;
8467 	u64 cookie;
8468 
8469 	/* Cancel the last pending TX cookie */
8470 	if (drv->send_frame_cookie != (u64) -1)
8471 		nl80211_frame_wait_cancel(bss, drv->send_frame_cookie);
8472 
8473 	/*
8474 	 * Cancel the other pending TX cookies, if any. This is needed since
8475 	 * the driver may keep a list of all pending offchannel TX operations
8476 	 * and free up the radio only once they have expired or cancelled.
8477 	 */
8478 	for (i = drv->num_send_frame_cookies; i > 0; i--) {
8479 		cookie = drv->send_frame_cookies[i - 1];
8480 		if (cookie != drv->send_frame_cookie)
8481 			nl80211_frame_wait_cancel(bss, cookie);
8482 	}
8483 	drv->num_send_frame_cookies = 0;
8484 }
8485 
8486 
wpa_driver_nl80211_remain_on_channel(void * priv,unsigned int freq,unsigned int duration)8487 static int wpa_driver_nl80211_remain_on_channel(void *priv, unsigned int freq,
8488 						unsigned int duration)
8489 {
8490 	struct i802_bss *bss = priv;
8491 	struct wpa_driver_nl80211_data *drv = bss->drv;
8492 	struct nl_msg *msg;
8493 	int ret;
8494 	u64 cookie;
8495 
8496 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_REMAIN_ON_CHANNEL)) ||
8497 	    nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq) ||
8498 	    nla_put_u32(msg, NL80211_ATTR_DURATION, duration)) {
8499 		nlmsg_free(msg);
8500 		return -1;
8501 	}
8502 
8503 	cookie = 0;
8504 	ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie, NULL, NULL);
8505 	if (ret == 0) {
8506 		wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel cookie "
8507 			   "0x%llx for freq=%u MHz duration=%u",
8508 			   (long long unsigned int) cookie, freq, duration);
8509 		drv->remain_on_chan_cookie = cookie;
8510 		drv->pending_remain_on_chan = 1;
8511 		return 0;
8512 	}
8513 	wpa_printf(MSG_DEBUG, "nl80211: Failed to request remain-on-channel "
8514 		   "(freq=%d duration=%u): %d (%s)",
8515 		   freq, duration, ret, strerror(-ret));
8516 	return -1;
8517 }
8518 
8519 
wpa_driver_nl80211_cancel_remain_on_channel(void * priv)8520 static int wpa_driver_nl80211_cancel_remain_on_channel(void *priv)
8521 {
8522 	struct i802_bss *bss = priv;
8523 	struct wpa_driver_nl80211_data *drv = bss->drv;
8524 	struct nl_msg *msg;
8525 	int ret;
8526 
8527 	if (!drv->pending_remain_on_chan) {
8528 		wpa_printf(MSG_DEBUG, "nl80211: No pending remain-on-channel "
8529 			   "to cancel");
8530 		return -1;
8531 	}
8532 
8533 	wpa_printf(MSG_DEBUG, "nl80211: Cancel remain-on-channel with cookie "
8534 		   "0x%llx",
8535 		   (long long unsigned int) drv->remain_on_chan_cookie);
8536 
8537 	msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL);
8538 	if (!msg ||
8539 	    nla_put_u64(msg, NL80211_ATTR_COOKIE, drv->remain_on_chan_cookie)) {
8540 		nlmsg_free(msg);
8541 		return -1;
8542 	}
8543 
8544 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
8545 	if (ret == 0)
8546 		return 0;
8547 	wpa_printf(MSG_DEBUG, "nl80211: Failed to cancel remain-on-channel: "
8548 		   "%d (%s)", ret, strerror(-ret));
8549 	return -1;
8550 }
8551 
8552 
wpa_driver_nl80211_probe_req_report(struct i802_bss * bss,int report)8553 static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss, int report)
8554 {
8555 	struct wpa_driver_nl80211_data *drv = bss->drv;
8556 
8557 	if (!report) {
8558 		if (bss->nl_preq && drv->device_ap_sme &&
8559 		    is_ap_interface(drv->nlmode) && !bss->in_deinit &&
8560 		    !bss->static_ap) {
8561 			/*
8562 			 * Do not disable Probe Request reporting that was
8563 			 * enabled in nl80211_setup_ap().
8564 			 */
8565 			wpa_printf(MSG_DEBUG, "nl80211: Skip disabling of "
8566 				   "Probe Request reporting nl_preq=%p while "
8567 				   "in AP mode", bss->nl_preq);
8568 		} else if (bss->nl_preq) {
8569 			wpa_printf(MSG_DEBUG, "nl80211: Disable Probe Request "
8570 				   "reporting nl_preq=%p", bss->nl_preq);
8571 			nl80211_destroy_eloop_handle(&bss->nl_preq, 0);
8572 		}
8573 		return 0;
8574 	}
8575 
8576 	if (bss->nl_preq) {
8577 		wpa_printf(MSG_DEBUG, "nl80211: Probe Request reporting "
8578 			   "already on! nl_preq=%p", bss->nl_preq);
8579 		return 0;
8580 	}
8581 
8582 	bss->nl_preq = nl_create_handle(drv->global->nl_cb, "preq");
8583 	if (bss->nl_preq == NULL)
8584 		return -1;
8585 	wpa_printf(MSG_DEBUG, "nl80211: Enable Probe Request "
8586 		   "reporting nl_preq=%p", bss->nl_preq);
8587 
8588 	if (nl80211_register_frame(bss, bss->nl_preq,
8589 				   (WLAN_FC_TYPE_MGMT << 2) |
8590 				   (WLAN_FC_STYPE_PROBE_REQ << 4),
8591 				   NULL, 0, false) < 0)
8592 		goto out_err;
8593 
8594 	nl80211_register_eloop_read(&bss->nl_preq,
8595 				    wpa_driver_nl80211_event_receive,
8596 				    bss->nl_cb, 0);
8597 
8598 	return 0;
8599 
8600  out_err:
8601 	nl_destroy_handles(&bss->nl_preq);
8602 	return -1;
8603 }
8604 
8605 
nl80211_disable_11b_rates(struct wpa_driver_nl80211_data * drv,int ifindex,int disabled)8606 static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
8607 				     int ifindex, int disabled)
8608 {
8609 	struct nl_msg *msg;
8610 	struct nlattr *bands, *band;
8611 	int ret;
8612 
8613 	wpa_printf(MSG_DEBUG,
8614 		   "nl80211: NL80211_CMD_SET_TX_BITRATE_MASK (ifindex=%d %s)",
8615 		   ifindex, disabled ? "NL80211_TXRATE_LEGACY=OFDM-only" :
8616 		   "no NL80211_TXRATE_LEGACY constraint");
8617 
8618 	msg = nl80211_ifindex_msg(drv, ifindex, 0,
8619 				  NL80211_CMD_SET_TX_BITRATE_MASK);
8620 	if (!msg)
8621 		return -1;
8622 
8623 	bands = nla_nest_start(msg, NL80211_ATTR_TX_RATES);
8624 	if (!bands)
8625 		goto fail;
8626 
8627 	/*
8628 	 * Disable 2 GHz rates 1, 2, 5.5, 11 Mbps by masking out everything
8629 	 * else apart from 6, 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS
8630 	 * rates. All 5 GHz rates are left enabled.
8631 	 */
8632 	band = nla_nest_start(msg, NL80211_BAND_2GHZ);
8633 	if (!band ||
8634 	    (disabled && nla_put(msg, NL80211_TXRATE_LEGACY, 8,
8635 				 "\x0c\x12\x18\x24\x30\x48\x60\x6c")))
8636 		goto fail;
8637 	nla_nest_end(msg, band);
8638 
8639 	nla_nest_end(msg, bands);
8640 
8641 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
8642 	if (ret) {
8643 		wpa_printf(MSG_DEBUG, "nl80211: Set TX rates failed: ret=%d "
8644 			   "(%s)", ret, strerror(-ret));
8645 	} else
8646 		drv->disabled_11b_rates = disabled;
8647 
8648 	return ret;
8649 
8650 fail:
8651 	nlmsg_free(msg);
8652 	return -1;
8653 }
8654 
8655 
wpa_driver_nl80211_deinit_ap(void * priv)8656 static int wpa_driver_nl80211_deinit_ap(void *priv)
8657 {
8658 	struct i802_bss *bss = priv;
8659 	struct wpa_driver_nl80211_data *drv = bss->drv;
8660 	if (!is_ap_interface(drv->nlmode))
8661 		return -1;
8662 	wpa_driver_nl80211_del_beacon(bss);
8663 
8664 	/*
8665 	 * If the P2P GO interface was dynamically added, then it is
8666 	 * possible that the interface change to station is not possible.
8667 	 */
8668 	if (drv->nlmode == NL80211_IFTYPE_P2P_GO && bss->if_dynamic)
8669 		return 0;
8670 
8671 	return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
8672 }
8673 
8674 
wpa_driver_nl80211_stop_ap(void * priv)8675 static int wpa_driver_nl80211_stop_ap(void *priv)
8676 {
8677 	struct i802_bss *bss = priv;
8678 	struct wpa_driver_nl80211_data *drv = bss->drv;
8679 	if (!is_ap_interface(drv->nlmode))
8680 		return -1;
8681 	wpa_driver_nl80211_del_beacon(bss);
8682 	return 0;
8683 }
8684 
8685 
wpa_driver_nl80211_deinit_p2p_cli(void * priv)8686 static int wpa_driver_nl80211_deinit_p2p_cli(void *priv)
8687 {
8688 	struct i802_bss *bss = priv;
8689 	struct wpa_driver_nl80211_data *drv = bss->drv;
8690 	if (drv->nlmode != NL80211_IFTYPE_P2P_CLIENT)
8691 		return -1;
8692 
8693 	/*
8694 	 * If the P2P Client interface was dynamically added, then it is
8695 	 * possible that the interface change to station is not possible.
8696 	 */
8697 	if (bss->if_dynamic)
8698 		return 0;
8699 
8700 	return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
8701 }
8702 
8703 
wpa_driver_nl80211_resume(void * priv)8704 static void wpa_driver_nl80211_resume(void *priv)
8705 {
8706 	struct i802_bss *bss = priv;
8707 	enum nl80211_iftype nlmode = nl80211_get_ifmode(bss);
8708 
8709 	if (i802_set_iface_flags(bss, 1))
8710 		wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface up on resume event");
8711 
8712 	if (is_p2p_net_interface(nlmode))
8713 		nl80211_disable_11b_rates(bss->drv, bss->drv->ifindex, 1);
8714 }
8715 
8716 
nl80211_signal_monitor(void * priv,int threshold,int hysteresis)8717 static int nl80211_signal_monitor(void *priv, int threshold, int hysteresis)
8718 {
8719 	struct i802_bss *bss = priv;
8720 	struct wpa_driver_nl80211_data *drv = bss->drv;
8721 	struct nl_msg *msg;
8722 	struct nlattr *cqm;
8723 
8724 	wpa_printf(MSG_DEBUG, "nl80211: Signal monitor threshold=%d "
8725 		   "hysteresis=%d", threshold, hysteresis);
8726 
8727 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_CQM)) ||
8728 	    !(cqm = nla_nest_start(msg, NL80211_ATTR_CQM)) ||
8729 	    nla_put_u32(msg, NL80211_ATTR_CQM_RSSI_THOLD, threshold) ||
8730 	    nla_put_u32(msg, NL80211_ATTR_CQM_RSSI_HYST, hysteresis)) {
8731 		nlmsg_free(msg);
8732 		return -1;
8733 	}
8734 	nla_nest_end(msg, cqm);
8735 
8736 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
8737 }
8738 
8739 
get_channel_width(struct nl_msg * msg,void * arg)8740 static int get_channel_width(struct nl_msg *msg, void *arg)
8741 {
8742 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
8743 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
8744 	struct wpa_signal_info *sig_change = arg;
8745 
8746 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
8747 		  genlmsg_attrlen(gnlh, 0), NULL);
8748 
8749 	sig_change->center_frq1 = -1;
8750 	sig_change->center_frq2 = -1;
8751 	sig_change->chanwidth = CHAN_WIDTH_UNKNOWN;
8752 
8753 	if (tb[NL80211_ATTR_CHANNEL_WIDTH]) {
8754 		sig_change->chanwidth = convert2width(
8755 			nla_get_u32(tb[NL80211_ATTR_CHANNEL_WIDTH]));
8756 		if (tb[NL80211_ATTR_CENTER_FREQ1])
8757 			sig_change->center_frq1 =
8758 				nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
8759 		if (tb[NL80211_ATTR_CENTER_FREQ2])
8760 			sig_change->center_frq2 =
8761 				nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
8762 	}
8763 
8764 	return NL_SKIP;
8765 }
8766 
8767 
nl80211_get_channel_width(struct wpa_driver_nl80211_data * drv,struct wpa_signal_info * sig)8768 static int nl80211_get_channel_width(struct wpa_driver_nl80211_data *drv,
8769 				     struct wpa_signal_info *sig)
8770 {
8771 	struct nl_msg *msg;
8772 
8773 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
8774 	return send_and_recv_msgs(drv, msg, get_channel_width, sig, NULL, NULL);
8775 }
8776 
8777 
nl80211_signal_poll(void * priv,struct wpa_signal_info * si)8778 static int nl80211_signal_poll(void *priv, struct wpa_signal_info *si)
8779 {
8780 	struct i802_bss *bss = priv;
8781 	struct wpa_driver_nl80211_data *drv = bss->drv;
8782 	int res;
8783 
8784 	os_memset(si, 0, sizeof(*si));
8785 	res = nl80211_get_link_signal(drv, si);
8786 	if (res) {
8787 		if (drv->nlmode != NL80211_IFTYPE_ADHOC &&
8788 		    drv->nlmode != NL80211_IFTYPE_MESH_POINT)
8789 			return res;
8790 		si->current_signal = 0;
8791 	}
8792 
8793 	res = nl80211_get_channel_width(drv, si);
8794 	if (res != 0)
8795 		return res;
8796 
8797 	return nl80211_get_link_noise(drv, si);
8798 }
8799 
8800 
nl80211_set_param(void * priv,const char * param)8801 static int nl80211_set_param(void *priv, const char *param)
8802 {
8803 	struct i802_bss *bss = priv;
8804 	struct wpa_driver_nl80211_data *drv = bss->drv;
8805 
8806 	if (param == NULL)
8807 		return 0;
8808 	wpa_printf(MSG_DEBUG, "nl80211: driver param='%s'", param);
8809 
8810 #ifdef CONFIG_P2P
8811 	if (os_strstr(param, "use_p2p_group_interface=1")) {
8812 		wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group "
8813 			   "interface");
8814 		drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT;
8815 		drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_MGMT_AND_NON_P2P;
8816 	}
8817 #endif /* CONFIG_P2P */
8818 
8819 	if (os_strstr(param, "use_monitor=1"))
8820 		drv->use_monitor = 1;
8821 
8822 	if (os_strstr(param, "force_connect_cmd=1")) {
8823 		drv->capa.flags &= ~WPA_DRIVER_FLAGS_SME;
8824 		drv->force_connect_cmd = 1;
8825 	}
8826 
8827 	if (os_strstr(param, "force_bss_selection=1"))
8828 		drv->capa.flags |= WPA_DRIVER_FLAGS_BSS_SELECTION;
8829 
8830 	if (os_strstr(param, "no_offchannel_tx=1")) {
8831 		drv->capa.flags &= ~WPA_DRIVER_FLAGS_OFFCHANNEL_TX;
8832 		drv->test_use_roc_tx = 1;
8833 	}
8834 
8835 	if (os_strstr(param, "control_port=0")) {
8836 		drv->capa.flags &= ~WPA_DRIVER_FLAGS_CONTROL_PORT;
8837 		drv->capa.flags2 &= ~(WPA_DRIVER_FLAGS2_CONTROL_PORT_RX |
8838 				      WPA_DRIVER_FLAGS2_CONTROL_PORT_TX_STATUS);
8839 		drv->control_port_ap = 0;
8840 	}
8841 
8842 	if (os_strstr(param, "control_port_ap=1"))
8843 		drv->control_port_ap = 1;
8844 
8845 	if (os_strstr(param, "control_port_ap=0")) {
8846 		drv->capa.flags2 &= ~WPA_DRIVER_FLAGS2_CONTROL_PORT_TX_STATUS;
8847 		drv->control_port_ap = 0;
8848 	}
8849 
8850 	if (os_strstr(param, "full_ap_client_state=0"))
8851 		drv->capa.flags &= ~WPA_DRIVER_FLAGS_FULL_AP_CLIENT_STATE;
8852 
8853 	if (os_strstr(param, "no_rrm=1")) {
8854 		drv->no_rrm = 1;
8855 
8856 		if (!bss->in_deinit && !is_ap_interface(drv->nlmode) &&
8857 		    !is_mesh_interface(drv->nlmode)) {
8858 			nl80211_mgmt_unsubscribe(bss, "no_rrm=1");
8859 			if (nl80211_mgmt_subscribe_non_ap(bss) < 0)
8860 				wpa_printf(MSG_DEBUG,
8861 					   "nl80211: Failed to re-register Action frame processing - ignore for now");
8862 		}
8863 	}
8864 
8865 	return 0;
8866 }
8867 
8868 
nl80211_global_init(void * ctx)8869 static void * nl80211_global_init(void *ctx)
8870 {
8871 	struct nl80211_global *global;
8872 	struct netlink_config *cfg;
8873 
8874 	global = os_zalloc(sizeof(*global));
8875 	if (global == NULL)
8876 		return NULL;
8877 	global->ctx = ctx;
8878 	global->ioctl_sock = -1;
8879 	dl_list_init(&global->interfaces);
8880 	global->if_add_ifindex = -1;
8881 
8882 	cfg = os_zalloc(sizeof(*cfg));
8883 	if (cfg == NULL)
8884 		goto err;
8885 
8886 	cfg->ctx = global;
8887 	cfg->newlink_cb = wpa_driver_nl80211_event_rtm_newlink;
8888 	cfg->dellink_cb = wpa_driver_nl80211_event_rtm_dellink;
8889 	global->netlink = netlink_init(cfg);
8890 	if (global->netlink == NULL) {
8891 		os_free(cfg);
8892 		goto err;
8893 	}
8894 
8895 	if (wpa_driver_nl80211_init_nl_global(global) < 0)
8896 		goto err;
8897 
8898 	global->ioctl_sock = socket(PF_INET, SOCK_DGRAM, 0);
8899 	if (global->ioctl_sock < 0) {
8900 		wpa_printf(MSG_ERROR, "nl80211: socket(PF_INET,SOCK_DGRAM) failed: %s",
8901 			   strerror(errno));
8902 		goto err;
8903 	}
8904 
8905 	return global;
8906 
8907 err:
8908 	nl80211_global_deinit(global);
8909 	return NULL;
8910 }
8911 
8912 
nl80211_global_deinit(void * priv)8913 static void nl80211_global_deinit(void *priv)
8914 {
8915 	struct nl80211_global *global = priv;
8916 	if (global == NULL)
8917 		return;
8918 	if (!dl_list_empty(&global->interfaces)) {
8919 		wpa_printf(MSG_ERROR, "nl80211: %u interface(s) remain at "
8920 			   "nl80211_global_deinit",
8921 			   dl_list_len(&global->interfaces));
8922 	}
8923 
8924 	if (global->netlink)
8925 		netlink_deinit(global->netlink);
8926 
8927 	nl_destroy_handles(&global->nl);
8928 
8929 	if (global->nl_event)
8930 		nl80211_destroy_eloop_handle(&global->nl_event, 0);
8931 
8932 	nl_cb_put(global->nl_cb);
8933 
8934 	if (global->ioctl_sock >= 0)
8935 		close(global->ioctl_sock);
8936 
8937 	os_free(global);
8938 }
8939 
8940 
nl80211_get_radio_name(void * priv)8941 static const char * nl80211_get_radio_name(void *priv)
8942 {
8943 	struct i802_bss *bss = priv;
8944 	struct wpa_driver_nl80211_data *drv = bss->drv;
8945 	return drv->phyname;
8946 }
8947 
8948 
nl80211_pmkid(struct i802_bss * bss,int cmd,struct wpa_pmkid_params * params)8949 static int nl80211_pmkid(struct i802_bss *bss, int cmd,
8950 			 struct wpa_pmkid_params *params)
8951 {
8952 	struct nl_msg *msg;
8953 	const size_t PMK_MAX_LEN = 48; /* current cfg80211 limit */
8954 
8955 	if (!(msg = nl80211_bss_msg(bss, 0, cmd)) ||
8956 	    (params->pmkid &&
8957 	     nla_put(msg, NL80211_ATTR_PMKID, 16, params->pmkid)) ||
8958 	    (params->bssid &&
8959 	     nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid)) ||
8960 	    (params->ssid_len &&
8961 	     nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid)) ||
8962 	    (params->fils_cache_id &&
8963 	     nla_put(msg, NL80211_ATTR_FILS_CACHE_ID, 2,
8964 		     params->fils_cache_id)) ||
8965 	    (params->pmk_lifetime &&
8966 	     nla_put_u32(msg, NL80211_ATTR_PMK_LIFETIME,
8967 			 params->pmk_lifetime)) ||
8968 	    (params->pmk_reauth_threshold &&
8969 	     nla_put_u8(msg, NL80211_ATTR_PMK_REAUTH_THRESHOLD,
8970 			params->pmk_reauth_threshold)) ||
8971 	    (cmd != NL80211_CMD_DEL_PMKSA &&
8972 	     params->pmk_len && params->pmk_len <= PMK_MAX_LEN &&
8973 	     nla_put(msg, NL80211_ATTR_PMK, params->pmk_len, params->pmk))) {
8974 		nl80211_nlmsg_clear(msg);
8975 		nlmsg_free(msg);
8976 		return -ENOBUFS;
8977 	}
8978 
8979 	return send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
8980 }
8981 
8982 
nl80211_add_pmkid(void * priv,struct wpa_pmkid_params * params)8983 static int nl80211_add_pmkid(void *priv, struct wpa_pmkid_params *params)
8984 {
8985 	struct i802_bss *bss = priv;
8986 	int ret;
8987 
8988 	if (params->bssid)
8989 		wpa_printf(MSG_DEBUG, "nl80211: Add PMKID for " MACSTR,
8990 			   MAC2STR(params->bssid));
8991 	else if (params->fils_cache_id && params->ssid_len) {
8992 		wpa_printf(MSG_DEBUG,
8993 			   "nl80211: Add PMKSA for cache id %02x%02x SSID %s",
8994 			   params->fils_cache_id[0], params->fils_cache_id[1],
8995 			   wpa_ssid_txt(params->ssid, params->ssid_len));
8996 	}
8997 
8998 	ret = nl80211_pmkid(bss, NL80211_CMD_SET_PMKSA, params);
8999 	if (ret < 0) {
9000 		wpa_printf(MSG_DEBUG,
9001 			   "nl80211: NL80211_CMD_SET_PMKSA failed: %d (%s)",
9002 			   ret, strerror(-ret));
9003 	}
9004 
9005 	return ret;
9006 }
9007 
9008 
nl80211_remove_pmkid(void * priv,struct wpa_pmkid_params * params)9009 static int nl80211_remove_pmkid(void *priv, struct wpa_pmkid_params *params)
9010 {
9011 	struct i802_bss *bss = priv;
9012 	int ret;
9013 
9014 	if (params->bssid)
9015 		wpa_printf(MSG_DEBUG, "nl80211: Delete PMKID for " MACSTR,
9016 			   MAC2STR(params->bssid));
9017 	else if (params->fils_cache_id && params->ssid_len) {
9018 		wpa_printf(MSG_DEBUG,
9019 			   "nl80211: Delete PMKSA for cache id %02x%02x SSID %s",
9020 			   params->fils_cache_id[0], params->fils_cache_id[1],
9021 			   wpa_ssid_txt(params->ssid, params->ssid_len));
9022 	}
9023 
9024 	ret = nl80211_pmkid(bss, NL80211_CMD_DEL_PMKSA, params);
9025 	if (ret < 0) {
9026 		wpa_printf(MSG_DEBUG,
9027 			   "nl80211: NL80211_CMD_DEL_PMKSA failed: %d (%s)",
9028 			   ret, strerror(-ret));
9029 	}
9030 
9031 	return ret;
9032 }
9033 
9034 
nl80211_flush_pmkid(void * priv)9035 static int nl80211_flush_pmkid(void *priv)
9036 {
9037 	struct i802_bss *bss = priv;
9038 	struct nl_msg *msg;
9039 
9040 	wpa_printf(MSG_DEBUG, "nl80211: Flush PMKIDs");
9041 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_FLUSH_PMKSA);
9042 	if (!msg)
9043 		return -ENOBUFS;
9044 	return send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
9045 }
9046 
9047 
clean_survey_results(struct survey_results * survey_results)9048 static void clean_survey_results(struct survey_results *survey_results)
9049 {
9050 	struct freq_survey *survey, *tmp;
9051 
9052 	if (dl_list_empty(&survey_results->survey_list))
9053 		return;
9054 
9055 	dl_list_for_each_safe(survey, tmp, &survey_results->survey_list,
9056 			      struct freq_survey, list) {
9057 		dl_list_del(&survey->list);
9058 		os_free(survey);
9059 	}
9060 }
9061 
9062 
add_survey(struct nlattr ** sinfo,u32 ifidx,struct dl_list * survey_list)9063 static void add_survey(struct nlattr **sinfo, u32 ifidx,
9064 		       struct dl_list *survey_list)
9065 {
9066 	struct freq_survey *survey;
9067 
9068 	survey = os_zalloc(sizeof(struct freq_survey));
9069 	if  (!survey)
9070 		return;
9071 
9072 	survey->ifidx = ifidx;
9073 	survey->freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
9074 	survey->filled = 0;
9075 
9076 	if (sinfo[NL80211_SURVEY_INFO_NOISE]) {
9077 		survey->nf = (int8_t)
9078 			nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
9079 		survey->filled |= SURVEY_HAS_NF;
9080 	}
9081 
9082 	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]) {
9083 		survey->channel_time =
9084 			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]);
9085 		survey->filled |= SURVEY_HAS_CHAN_TIME;
9086 	}
9087 
9088 	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]) {
9089 		survey->channel_time_busy =
9090 			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]);
9091 		survey->filled |= SURVEY_HAS_CHAN_TIME_BUSY;
9092 	}
9093 
9094 	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]) {
9095 		survey->channel_time_rx =
9096 			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]);
9097 		survey->filled |= SURVEY_HAS_CHAN_TIME_RX;
9098 	}
9099 
9100 	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]) {
9101 		survey->channel_time_tx =
9102 			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]);
9103 		survey->filled |= SURVEY_HAS_CHAN_TIME_TX;
9104 	}
9105 
9106 	wpa_printf(MSG_DEBUG, "nl80211: Freq survey dump event (freq=%d MHz noise=%d channel_time=%ld busy_time=%ld tx_time=%ld rx_time=%ld filled=%04x)",
9107 		   survey->freq,
9108 		   survey->nf,
9109 		   (unsigned long int) survey->channel_time,
9110 		   (unsigned long int) survey->channel_time_busy,
9111 		   (unsigned long int) survey->channel_time_tx,
9112 		   (unsigned long int) survey->channel_time_rx,
9113 		   survey->filled);
9114 
9115 	dl_list_add_tail(survey_list, &survey->list);
9116 }
9117 
9118 
check_survey_ok(struct nlattr ** sinfo,u32 surveyed_freq,unsigned int freq_filter)9119 static int check_survey_ok(struct nlattr **sinfo, u32 surveyed_freq,
9120 			   unsigned int freq_filter)
9121 {
9122 	if (!freq_filter)
9123 		return 1;
9124 
9125 	return freq_filter == surveyed_freq;
9126 }
9127 
9128 
survey_handler(struct nl_msg * msg,void * arg)9129 static int survey_handler(struct nl_msg *msg, void *arg)
9130 {
9131 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
9132 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9133 	struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
9134 	struct survey_results *survey_results;
9135 	u32 surveyed_freq = 0;
9136 	u32 ifidx;
9137 
9138 	static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
9139 		[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
9140 		[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
9141 	};
9142 
9143 	survey_results = (struct survey_results *) arg;
9144 
9145 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
9146 		  genlmsg_attrlen(gnlh, 0), NULL);
9147 
9148 	if (!tb[NL80211_ATTR_IFINDEX])
9149 		return NL_SKIP;
9150 
9151 	ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
9152 
9153 	if (!tb[NL80211_ATTR_SURVEY_INFO])
9154 		return NL_SKIP;
9155 
9156 	if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
9157 			     tb[NL80211_ATTR_SURVEY_INFO],
9158 			     survey_policy))
9159 		return NL_SKIP;
9160 
9161 	if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY]) {
9162 		wpa_printf(MSG_ERROR, "nl80211: Invalid survey data");
9163 		return NL_SKIP;
9164 	}
9165 
9166 	surveyed_freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
9167 
9168 	if (!check_survey_ok(sinfo, surveyed_freq,
9169 			     survey_results->freq_filter))
9170 		return NL_SKIP;
9171 
9172 	if (survey_results->freq_filter &&
9173 	    survey_results->freq_filter != surveyed_freq) {
9174 		wpa_printf(MSG_EXCESSIVE, "nl80211: Ignoring survey data for freq %d MHz",
9175 			   surveyed_freq);
9176 		return NL_SKIP;
9177 	}
9178 
9179 	add_survey(sinfo, ifidx, &survey_results->survey_list);
9180 
9181 	return NL_SKIP;
9182 }
9183 
9184 
wpa_driver_nl80211_get_survey(void * priv,unsigned int freq)9185 static int wpa_driver_nl80211_get_survey(void *priv, unsigned int freq)
9186 {
9187 	struct i802_bss *bss = priv;
9188 	struct wpa_driver_nl80211_data *drv = bss->drv;
9189 	struct nl_msg *msg;
9190 	int err;
9191 	union wpa_event_data data;
9192 	struct survey_results *survey_results;
9193 
9194 	os_memset(&data, 0, sizeof(data));
9195 	survey_results = &data.survey_results;
9196 
9197 	dl_list_init(&survey_results->survey_list);
9198 
9199 	msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
9200 	if (!msg)
9201 		return -ENOBUFS;
9202 
9203 	if (freq)
9204 		data.survey_results.freq_filter = freq;
9205 
9206 	do {
9207 		wpa_printf(MSG_DEBUG, "nl80211: Fetch survey data");
9208 		err = send_and_recv_msgs(drv, msg, survey_handler,
9209 					 survey_results, NULL, NULL);
9210 	} while (err > 0);
9211 
9212 	if (err)
9213 		wpa_printf(MSG_ERROR, "nl80211: Failed to process survey data");
9214 	else
9215 		wpa_supplicant_event(drv->ctx, EVENT_SURVEY, &data);
9216 
9217 	clean_survey_results(survey_results);
9218 	return err;
9219 }
9220 
9221 
nl80211_set_rekey_info(void * priv,const u8 * kek,size_t kek_len,const u8 * kck,size_t kck_len,const u8 * replay_ctr)9222 static void nl80211_set_rekey_info(void *priv, const u8 *kek, size_t kek_len,
9223 				   const u8 *kck, size_t kck_len,
9224 				   const u8 *replay_ctr)
9225 {
9226 	struct i802_bss *bss = priv;
9227 	struct wpa_driver_nl80211_data *drv = bss->drv;
9228 	struct nlattr *replay_nested;
9229 	struct nl_msg *msg;
9230 	int ret;
9231 
9232 	if (!drv->set_rekey_offload)
9233 		return;
9234 
9235 	wpa_printf(MSG_DEBUG, "nl80211: Set rekey offload");
9236 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_REKEY_OFFLOAD)) ||
9237 	    !(replay_nested = nla_nest_start(msg, NL80211_ATTR_REKEY_DATA)) ||
9238 	    nla_put(msg, NL80211_REKEY_DATA_KEK, kek_len, kek) ||
9239 	    (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) ||
9240 	    nla_put(msg, NL80211_REKEY_DATA_REPLAY_CTR, NL80211_REPLAY_CTR_LEN,
9241 		    replay_ctr)) {
9242 		nl80211_nlmsg_clear(msg);
9243 		nlmsg_free(msg);
9244 		return;
9245 	}
9246 
9247 	nla_nest_end(msg, replay_nested);
9248 
9249 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9250 	if (ret == -EOPNOTSUPP) {
9251 		wpa_printf(MSG_DEBUG,
9252 			   "nl80211: Driver does not support rekey offload");
9253 		drv->set_rekey_offload = 0;
9254 	}
9255 }
9256 
9257 
nl80211_send_null_frame(struct i802_bss * bss,const u8 * own_addr,const u8 * addr,int qos)9258 static void nl80211_send_null_frame(struct i802_bss *bss, const u8 *own_addr,
9259 				    const u8 *addr, int qos)
9260 {
9261 	/* send data frame to poll STA and check whether
9262 	 * this frame is ACKed */
9263 	struct {
9264 		struct ieee80211_hdr hdr;
9265 		u16 qos_ctl;
9266 	} STRUCT_PACKED nulldata;
9267 	size_t size;
9268 
9269 	/* Send data frame to poll STA and check whether this frame is ACKed */
9270 
9271 	os_memset(&nulldata, 0, sizeof(nulldata));
9272 
9273 	if (qos) {
9274 		nulldata.hdr.frame_control =
9275 			IEEE80211_FC(WLAN_FC_TYPE_DATA,
9276 				     WLAN_FC_STYPE_QOS_NULL);
9277 		size = sizeof(nulldata);
9278 	} else {
9279 		nulldata.hdr.frame_control =
9280 			IEEE80211_FC(WLAN_FC_TYPE_DATA,
9281 				     WLAN_FC_STYPE_NULLFUNC);
9282 		size = sizeof(struct ieee80211_hdr);
9283 	}
9284 
9285 	nulldata.hdr.frame_control |= host_to_le16(WLAN_FC_FROMDS);
9286 	os_memcpy(nulldata.hdr.IEEE80211_DA_FROMDS, addr, ETH_ALEN);
9287 	os_memcpy(nulldata.hdr.IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
9288 	os_memcpy(nulldata.hdr.IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
9289 
9290 	if (wpa_driver_nl80211_send_mlme(bss, (u8 *) &nulldata, size, 0, 0, 0,
9291 					 0, 0, NULL, 0, 0) < 0)
9292 		wpa_printf(MSG_DEBUG, "nl80211_send_null_frame: Failed to "
9293 			   "send poll frame");
9294 }
9295 
nl80211_poll_client(void * priv,const u8 * own_addr,const u8 * addr,int qos)9296 static void nl80211_poll_client(void *priv, const u8 *own_addr, const u8 *addr,
9297 				int qos)
9298 {
9299 	struct i802_bss *bss = priv;
9300 	struct wpa_driver_nl80211_data *drv = bss->drv;
9301 	struct nl_msg *msg;
9302 	u64 cookie;
9303 	int ret;
9304 
9305 	if (!drv->poll_command_supported) {
9306 		nl80211_send_null_frame(bss, own_addr, addr, qos);
9307 		return;
9308 	}
9309 
9310 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_PROBE_CLIENT)) ||
9311 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
9312 		nlmsg_free(msg);
9313 		return;
9314 	}
9315 
9316 	ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie, NULL, NULL);
9317 	if (ret < 0) {
9318 		wpa_printf(MSG_DEBUG, "nl80211: Client probe request for "
9319 			   MACSTR " failed: ret=%d (%s)",
9320 			   MAC2STR(addr), ret, strerror(-ret));
9321 	} else {
9322 		wpa_printf(MSG_DEBUG,
9323 			   "nl80211: Client probe request addr=" MACSTR
9324 			   " cookie=%llu", MAC2STR(addr),
9325 			   (long long unsigned int) cookie);
9326 	}
9327 }
9328 
9329 
nl80211_set_power_save(struct i802_bss * bss,int enabled)9330 static int nl80211_set_power_save(struct i802_bss *bss, int enabled)
9331 {
9332 	struct nl_msg *msg;
9333 	int ret;
9334 
9335 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_POWER_SAVE)) ||
9336 	    nla_put_u32(msg, NL80211_ATTR_PS_STATE,
9337 			enabled ? NL80211_PS_ENABLED : NL80211_PS_DISABLED)) {
9338 		nlmsg_free(msg);
9339 		return -ENOBUFS;
9340 	}
9341 
9342 	ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
9343 	if (ret < 0) {
9344 		wpa_printf(MSG_DEBUG,
9345 			   "nl80211: Setting PS state %s failed: %d (%s)",
9346 			   enabled ? "enabled" : "disabled",
9347 			   ret, strerror(-ret));
9348 	}
9349 	return ret;
9350 }
9351 
9352 
nl80211_set_p2p_powersave(void * priv,int legacy_ps,int opp_ps,int ctwindow)9353 static int nl80211_set_p2p_powersave(void *priv, int legacy_ps, int opp_ps,
9354 				     int ctwindow)
9355 {
9356 	struct i802_bss *bss = priv;
9357 
9358 	wpa_printf(MSG_DEBUG, "nl80211: set_p2p_powersave (legacy_ps=%d "
9359 		   "opp_ps=%d ctwindow=%d)", legacy_ps, opp_ps, ctwindow);
9360 
9361 	if (opp_ps != -1 || ctwindow != -1) {
9362 #ifdef ANDROID_P2P
9363 		wpa_driver_set_p2p_ps(priv, legacy_ps, opp_ps, ctwindow);
9364 #else /* ANDROID_P2P */
9365 		return -1; /* Not yet supported */
9366 #endif /* ANDROID_P2P */
9367 	}
9368 
9369 	if (legacy_ps == -1)
9370 		return 0;
9371 	if (legacy_ps != 0 && legacy_ps != 1)
9372 		return -1; /* Not yet supported */
9373 
9374 	return nl80211_set_power_save(bss, legacy_ps);
9375 }
9376 
9377 
nl80211_start_radar_detection(void * priv,struct hostapd_freq_params * freq)9378 static int nl80211_start_radar_detection(void *priv,
9379 					 struct hostapd_freq_params *freq)
9380 {
9381 	struct i802_bss *bss = priv;
9382 	struct wpa_driver_nl80211_data *drv = bss->drv;
9383 	struct nl_msg *msg;
9384 	int ret;
9385 
9386 	wpa_printf(MSG_DEBUG, "nl80211: Start radar detection (CAC) %d MHz (ht_enabled=%d, vht_enabled=%d, he_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
9387 		   freq->freq, freq->ht_enabled, freq->vht_enabled, freq->he_enabled,
9388 		   freq->bandwidth, freq->center_freq1, freq->center_freq2);
9389 
9390 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_RADAR)) {
9391 		wpa_printf(MSG_DEBUG, "nl80211: Driver does not support radar "
9392 			   "detection");
9393 		return -1;
9394 	}
9395 
9396 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_RADAR_DETECT)) ||
9397 	    nl80211_put_freq_params(msg, freq) < 0) {
9398 		nlmsg_free(msg);
9399 		return -1;
9400 	}
9401 
9402 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9403 	if (ret == 0)
9404 		return 0;
9405 	wpa_printf(MSG_DEBUG, "nl80211: Failed to start radar detection: "
9406 		   "%d (%s)", ret, strerror(-ret));
9407 	return -1;
9408 }
9409 
9410 #ifdef CONFIG_TDLS
9411 
nl80211_add_peer_capab(struct nl_msg * msg,enum tdls_peer_capability capa)9412 static int nl80211_add_peer_capab(struct nl_msg *msg,
9413 				  enum tdls_peer_capability capa)
9414 {
9415 	u32 peer_capab = 0;
9416 
9417 	if (!capa)
9418 		return 0;
9419 
9420 	if (capa & TDLS_PEER_HT)
9421 		peer_capab |= NL80211_TDLS_PEER_HT;
9422 	if (capa & TDLS_PEER_VHT)
9423 		peer_capab |= NL80211_TDLS_PEER_VHT;
9424 	if (capa & TDLS_PEER_WMM)
9425 		peer_capab |= NL80211_TDLS_PEER_WMM;
9426 	if (capa & TDLS_PEER_HE)
9427 		peer_capab |= NL80211_TDLS_PEER_HE;
9428 
9429 	return nla_put_u32(msg, NL80211_ATTR_TDLS_PEER_CAPABILITY,
9430 			   peer_capab);
9431 }
9432 
9433 
nl80211_send_tdls_mgmt(void * priv,const u8 * dst,u8 action_code,u8 dialog_token,u16 status_code,u32 peer_capab,int initiator,const u8 * buf,size_t len)9434 static int nl80211_send_tdls_mgmt(void *priv, const u8 *dst, u8 action_code,
9435 				  u8 dialog_token, u16 status_code,
9436 				  u32 peer_capab, int initiator, const u8 *buf,
9437 				  size_t len)
9438 {
9439 	struct i802_bss *bss = priv;
9440 	struct wpa_driver_nl80211_data *drv = bss->drv;
9441 	struct nl_msg *msg;
9442 
9443 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
9444 		return -EOPNOTSUPP;
9445 
9446 	if (!dst)
9447 		return -EINVAL;
9448 
9449 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_TDLS_MGMT)) ||
9450 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, dst) ||
9451 	    nla_put_u8(msg, NL80211_ATTR_TDLS_ACTION, action_code) ||
9452 	    nla_put_u8(msg, NL80211_ATTR_TDLS_DIALOG_TOKEN, dialog_token) ||
9453 	    nla_put_u16(msg, NL80211_ATTR_STATUS_CODE, status_code) ||
9454 	    nl80211_add_peer_capab(msg, peer_capab) ||
9455 	    (initiator && nla_put_flag(msg, NL80211_ATTR_TDLS_INITIATOR)) ||
9456 	    nla_put(msg, NL80211_ATTR_IE, len, buf))
9457 		goto fail;
9458 
9459 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9460 
9461 fail:
9462 	nlmsg_free(msg);
9463 	return -ENOBUFS;
9464 }
9465 
9466 
nl80211_tdls_oper(void * priv,enum tdls_oper oper,const u8 * peer)9467 static int nl80211_tdls_oper(void *priv, enum tdls_oper oper, const u8 *peer)
9468 {
9469 	struct i802_bss *bss = priv;
9470 	struct wpa_driver_nl80211_data *drv = bss->drv;
9471 	struct nl_msg *msg;
9472 	enum nl80211_tdls_operation nl80211_oper;
9473 	int res;
9474 
9475 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
9476 		return -EOPNOTSUPP;
9477 
9478 	switch (oper) {
9479 	case TDLS_DISCOVERY_REQ:
9480 		nl80211_oper = NL80211_TDLS_DISCOVERY_REQ;
9481 		break;
9482 	case TDLS_SETUP:
9483 		nl80211_oper = NL80211_TDLS_SETUP;
9484 		break;
9485 	case TDLS_TEARDOWN:
9486 		nl80211_oper = NL80211_TDLS_TEARDOWN;
9487 		break;
9488 	case TDLS_ENABLE_LINK:
9489 		nl80211_oper = NL80211_TDLS_ENABLE_LINK;
9490 		break;
9491 	case TDLS_DISABLE_LINK:
9492 		nl80211_oper = NL80211_TDLS_DISABLE_LINK;
9493 		break;
9494 	case TDLS_ENABLE:
9495 		return 0;
9496 	case TDLS_DISABLE:
9497 		return 0;
9498 	default:
9499 		return -EINVAL;
9500 	}
9501 
9502 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_TDLS_OPER)) ||
9503 	    nla_put_u8(msg, NL80211_ATTR_TDLS_OPERATION, nl80211_oper) ||
9504 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, peer)) {
9505 		nlmsg_free(msg);
9506 		return -ENOBUFS;
9507 	}
9508 
9509 	res = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9510 	wpa_printf(MSG_DEBUG, "nl80211: TDLS_OPER: oper=%d mac=" MACSTR
9511 		   " --> res=%d (%s)", nl80211_oper, MAC2STR(peer), res,
9512 		   strerror(-res));
9513 	return res;
9514 }
9515 
9516 
9517 static int
nl80211_tdls_enable_channel_switch(void * priv,const u8 * addr,u8 oper_class,const struct hostapd_freq_params * params)9518 nl80211_tdls_enable_channel_switch(void *priv, const u8 *addr, u8 oper_class,
9519 				   const struct hostapd_freq_params *params)
9520 {
9521 	struct i802_bss *bss = priv;
9522 	struct wpa_driver_nl80211_data *drv = bss->drv;
9523 	struct nl_msg *msg;
9524 	int ret = -ENOBUFS;
9525 
9526 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT) ||
9527 	    !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_CHANNEL_SWITCH))
9528 		return -EOPNOTSUPP;
9529 
9530 	wpa_printf(MSG_DEBUG, "nl80211: Enable TDLS channel switch " MACSTR
9531 		   " oper_class=%u freq=%u",
9532 		   MAC2STR(addr), oper_class, params->freq);
9533 	msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_TDLS_CHANNEL_SWITCH);
9534 	if (!msg ||
9535 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
9536 	    nla_put_u8(msg, NL80211_ATTR_OPER_CLASS, oper_class) ||
9537 	    (ret = nl80211_put_freq_params(msg, params))) {
9538 		nlmsg_free(msg);
9539 		wpa_printf(MSG_DEBUG, "nl80211: Could not build TDLS chan switch");
9540 		return ret;
9541 	}
9542 
9543 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9544 }
9545 
9546 
9547 static int
nl80211_tdls_disable_channel_switch(void * priv,const u8 * addr)9548 nl80211_tdls_disable_channel_switch(void *priv, const u8 *addr)
9549 {
9550 	struct i802_bss *bss = priv;
9551 	struct wpa_driver_nl80211_data *drv = bss->drv;
9552 	struct nl_msg *msg;
9553 
9554 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT) ||
9555 	    !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_CHANNEL_SWITCH))
9556 		return -EOPNOTSUPP;
9557 
9558 	wpa_printf(MSG_DEBUG, "nl80211: Disable TDLS channel switch " MACSTR,
9559 		   MAC2STR(addr));
9560 	msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH);
9561 	if (!msg ||
9562 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
9563 		nlmsg_free(msg);
9564 		wpa_printf(MSG_DEBUG,
9565 			   "nl80211: Could not build TDLS cancel chan switch");
9566 		return -ENOBUFS;
9567 	}
9568 
9569 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9570 }
9571 
9572 #endif /* CONFIG TDLS */
9573 
9574 
driver_nl80211_set_key(void * priv,struct wpa_driver_set_key_params * params)9575 static int driver_nl80211_set_key(void *priv,
9576 				  struct wpa_driver_set_key_params *params)
9577 {
9578 	struct i802_bss *bss = priv;
9579 
9580 	return wpa_driver_nl80211_set_key(bss, params);
9581 }
9582 
9583 
driver_nl80211_scan2(void * priv,struct wpa_driver_scan_params * params)9584 static int driver_nl80211_scan2(void *priv,
9585 				struct wpa_driver_scan_params *params)
9586 {
9587 	struct i802_bss *bss = priv;
9588 #ifdef CONFIG_DRIVER_NL80211_QCA
9589 	struct wpa_driver_nl80211_data *drv = bss->drv;
9590 
9591 	/*
9592 	 * Do a vendor specific scan if possible. If only_new_results is
9593 	 * set, do a normal scan since a kernel (cfg80211) BSS cache flush
9594 	 * cannot be achieved through a vendor scan. The below condition may
9595 	 * need to be modified if new scan flags are added in the future whose
9596 	 * functionality can only be achieved through a normal scan.
9597 	 */
9598 	if (drv->scan_vendor_cmd_avail && !params->only_new_results)
9599 		return wpa_driver_nl80211_vendor_scan(bss, params);
9600 #endif /* CONFIG_DRIVER_NL80211_QCA */
9601 	return wpa_driver_nl80211_scan(bss, params);
9602 }
9603 
9604 
driver_nl80211_deauthenticate(void * priv,const u8 * addr,u16 reason_code)9605 static int driver_nl80211_deauthenticate(void *priv, const u8 *addr,
9606 					 u16 reason_code)
9607 {
9608 	struct i802_bss *bss = priv;
9609 	return wpa_driver_nl80211_deauthenticate(bss, addr, reason_code);
9610 }
9611 
9612 
driver_nl80211_authenticate(void * priv,struct wpa_driver_auth_params * params)9613 static int driver_nl80211_authenticate(void *priv,
9614 				       struct wpa_driver_auth_params *params)
9615 {
9616 	struct i802_bss *bss = priv;
9617 	return wpa_driver_nl80211_authenticate(bss, params);
9618 }
9619 
9620 
driver_nl80211_deinit(void * priv)9621 static void driver_nl80211_deinit(void *priv)
9622 {
9623 	struct i802_bss *bss = priv;
9624 	wpa_driver_nl80211_deinit(bss);
9625 }
9626 
9627 
driver_nl80211_if_remove(void * priv,enum wpa_driver_if_type type,const char * ifname)9628 static int driver_nl80211_if_remove(void *priv, enum wpa_driver_if_type type,
9629 				    const char *ifname)
9630 {
9631 	struct i802_bss *bss = priv;
9632 	return wpa_driver_nl80211_if_remove(bss, type, ifname);
9633 }
9634 
9635 
driver_nl80211_send_mlme(void * priv,const u8 * data,size_t data_len,int noack,unsigned int freq,const u16 * csa_offs,size_t csa_offs_len,int no_encrypt,unsigned int wait)9636 static int driver_nl80211_send_mlme(void *priv, const u8 *data,
9637 				    size_t data_len, int noack,
9638 				    unsigned int freq,
9639 				    const u16 *csa_offs, size_t csa_offs_len,
9640 				    int no_encrypt, unsigned int wait)
9641 {
9642 	struct i802_bss *bss = priv;
9643 	return wpa_driver_nl80211_send_mlme(bss, data, data_len, noack,
9644 					    freq, 0, 0, wait, csa_offs,
9645 					    csa_offs_len, no_encrypt);
9646 }
9647 
9648 
driver_nl80211_sta_remove(void * priv,const u8 * addr)9649 static int driver_nl80211_sta_remove(void *priv, const u8 *addr)
9650 {
9651 	struct i802_bss *bss = priv;
9652 	return wpa_driver_nl80211_sta_remove(bss, addr, -1, 0);
9653 }
9654 
9655 
driver_nl80211_set_sta_vlan(void * priv,const u8 * addr,const char * ifname,int vlan_id)9656 static int driver_nl80211_set_sta_vlan(void *priv, const u8 *addr,
9657 				       const char *ifname, int vlan_id)
9658 {
9659 	struct i802_bss *bss = priv;
9660 	return i802_set_sta_vlan(bss, addr, ifname, vlan_id);
9661 }
9662 
9663 
driver_nl80211_read_sta_data(void * priv,struct hostap_sta_driver_data * data,const u8 * addr)9664 static int driver_nl80211_read_sta_data(void *priv,
9665 					struct hostap_sta_driver_data *data,
9666 					const u8 *addr)
9667 {
9668 	struct i802_bss *bss = priv;
9669 
9670 	os_memset(data, 0, sizeof(*data));
9671 	return i802_read_sta_data(bss, data, addr);
9672 }
9673 
9674 
driver_nl80211_send_action(void * priv,unsigned int freq,unsigned int wait_time,const u8 * dst,const u8 * src,const u8 * bssid,const u8 * data,size_t data_len,int no_cck)9675 static int driver_nl80211_send_action(void *priv, unsigned int freq,
9676 				      unsigned int wait_time,
9677 				      const u8 *dst, const u8 *src,
9678 				      const u8 *bssid,
9679 				      const u8 *data, size_t data_len,
9680 				      int no_cck)
9681 {
9682 	struct i802_bss *bss = priv;
9683 	return wpa_driver_nl80211_send_action(bss, freq, wait_time, dst, src,
9684 					      bssid, data, data_len, no_cck);
9685 }
9686 
9687 
driver_nl80211_probe_req_report(void * priv,int report)9688 static int driver_nl80211_probe_req_report(void *priv, int report)
9689 {
9690 	struct i802_bss *bss = priv;
9691 	return wpa_driver_nl80211_probe_req_report(bss, report);
9692 }
9693 
9694 
wpa_driver_nl80211_update_ft_ies(void * priv,const u8 * md,const u8 * ies,size_t ies_len)9695 static int wpa_driver_nl80211_update_ft_ies(void *priv, const u8 *md,
9696 					    const u8 *ies, size_t ies_len)
9697 {
9698 	int ret;
9699 	struct nl_msg *msg;
9700 	struct i802_bss *bss = priv;
9701 	struct wpa_driver_nl80211_data *drv = bss->drv;
9702 	u16 mdid = WPA_GET_LE16(md);
9703 
9704 	wpa_printf(MSG_DEBUG, "nl80211: Updating FT IEs");
9705 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_UPDATE_FT_IES)) ||
9706 	    nla_put(msg, NL80211_ATTR_IE, ies_len, ies) ||
9707 	    nla_put_u16(msg, NL80211_ATTR_MDID, mdid)) {
9708 		nlmsg_free(msg);
9709 		return -ENOBUFS;
9710 	}
9711 
9712 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9713 	if (ret) {
9714 		wpa_printf(MSG_DEBUG, "nl80211: update_ft_ies failed "
9715 			   "err=%d (%s)", ret, strerror(-ret));
9716 	}
9717 
9718 	return ret;
9719 }
9720 
9721 
nl80211_update_dh_ie(void * priv,const u8 * peer_mac,u16 reason_code,const u8 * ie,size_t ie_len)9722 static int nl80211_update_dh_ie(void *priv, const u8 *peer_mac,
9723 				u16 reason_code, const u8 *ie, size_t ie_len)
9724 {
9725 	int ret;
9726 	struct nl_msg *msg;
9727 	struct i802_bss *bss = priv;
9728 	struct wpa_driver_nl80211_data *drv = bss->drv;
9729 
9730 	wpa_printf(MSG_DEBUG, "nl80211: Updating DH IE peer: " MACSTR
9731 		   " reason %u", MAC2STR(peer_mac), reason_code);
9732 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_UPDATE_OWE_INFO)) ||
9733 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, peer_mac) ||
9734 	    nla_put_u16(msg, NL80211_ATTR_STATUS_CODE, reason_code) ||
9735 	    (ie && nla_put(msg, NL80211_ATTR_IE, ie_len, ie))) {
9736 		nlmsg_free(msg);
9737 		return -ENOBUFS;
9738 	}
9739 
9740 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9741 	if (ret) {
9742 		wpa_printf(MSG_DEBUG,
9743 			   "nl80211: update_dh_ie failed err=%d (%s)",
9744 			   ret, strerror(-ret));
9745 	}
9746 
9747 	return ret;
9748 }
9749 
9750 
wpa_driver_nl80211_get_macaddr(void * priv)9751 static const u8 * wpa_driver_nl80211_get_macaddr(void *priv)
9752 {
9753 	struct i802_bss *bss = priv;
9754 	struct wpa_driver_nl80211_data *drv = bss->drv;
9755 
9756 	if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE)
9757 		return NULL;
9758 
9759 	return bss->addr;
9760 }
9761 
9762 
scan_state_str(enum scan_states scan_state)9763 static const char * scan_state_str(enum scan_states scan_state)
9764 {
9765 	switch (scan_state) {
9766 	case NO_SCAN:
9767 		return "NO_SCAN";
9768 	case SCAN_REQUESTED:
9769 		return "SCAN_REQUESTED";
9770 	case SCAN_STARTED:
9771 		return "SCAN_STARTED";
9772 	case SCAN_COMPLETED:
9773 		return "SCAN_COMPLETED";
9774 	case SCAN_ABORTED:
9775 		return "SCAN_ABORTED";
9776 	case SCHED_SCAN_STARTED:
9777 		return "SCHED_SCAN_STARTED";
9778 	case SCHED_SCAN_STOPPED:
9779 		return "SCHED_SCAN_STOPPED";
9780 	case SCHED_SCAN_RESULTS:
9781 		return "SCHED_SCAN_RESULTS";
9782 	}
9783 
9784 	return "??";
9785 }
9786 
9787 
wpa_driver_nl80211_status(void * priv,char * buf,size_t buflen)9788 static int wpa_driver_nl80211_status(void *priv, char *buf, size_t buflen)
9789 {
9790 	struct i802_bss *bss = priv;
9791 	struct wpa_driver_nl80211_data *drv = bss->drv;
9792 	int res;
9793 	char *pos, *end;
9794 	struct nl_msg *msg;
9795 	char alpha2[3] = { 0, 0, 0 };
9796 
9797 	pos = buf;
9798 	end = buf + buflen;
9799 
9800 	res = os_snprintf(pos, end - pos,
9801 			  "ifindex=%d\n"
9802 			  "ifname=%s\n"
9803 			  "brname=%s\n"
9804 			  "addr=" MACSTR "\n"
9805 			  "freq=%d\n"
9806 			  "%s%s%s%s%s%s",
9807 			  bss->ifindex,
9808 			  bss->ifname,
9809 			  bss->brname,
9810 			  MAC2STR(bss->addr),
9811 			  bss->freq,
9812 			  bss->beacon_set ? "beacon_set=1\n" : "",
9813 			  bss->added_if_into_bridge ?
9814 			  "added_if_into_bridge=1\n" : "",
9815 			  bss->already_in_bridge ? "already_in_bridge=1\n" : "",
9816 			  bss->added_bridge ? "added_bridge=1\n" : "",
9817 			  bss->in_deinit ? "in_deinit=1\n" : "",
9818 			  bss->if_dynamic ? "if_dynamic=1\n" : "");
9819 	if (os_snprintf_error(end - pos, res))
9820 		return pos - buf;
9821 	pos += res;
9822 
9823 	if (bss->wdev_id_set) {
9824 		res = os_snprintf(pos, end - pos, "wdev_id=%llu\n",
9825 				  (unsigned long long) bss->wdev_id);
9826 		if (os_snprintf_error(end - pos, res))
9827 			return pos - buf;
9828 		pos += res;
9829 	}
9830 
9831 	res = os_snprintf(pos, end - pos,
9832 			  "phyname=%s\n"
9833 			  "perm_addr=" MACSTR "\n"
9834 			  "drv_ifindex=%d\n"
9835 			  "operstate=%d\n"
9836 			  "scan_state=%s\n"
9837 			  "auth_bssid=" MACSTR "\n"
9838 			  "auth_attempt_bssid=" MACSTR "\n"
9839 			  "bssid=" MACSTR "\n"
9840 			  "prev_bssid=" MACSTR "\n"
9841 			  "associated=%d\n"
9842 			  "assoc_freq=%u\n"
9843 			  "monitor_sock=%d\n"
9844 			  "monitor_ifidx=%d\n"
9845 			  "monitor_refcount=%d\n"
9846 			  "last_mgmt_freq=%u\n"
9847 			  "eapol_tx_sock=%d\n"
9848 			  "%s%s%s%s%s%s%s%s%s%s%s%s%s",
9849 			  drv->phyname,
9850 			  MAC2STR(drv->perm_addr),
9851 			  drv->ifindex,
9852 			  drv->operstate,
9853 			  scan_state_str(drv->scan_state),
9854 			  MAC2STR(drv->auth_bssid),
9855 			  MAC2STR(drv->auth_attempt_bssid),
9856 			  MAC2STR(drv->bssid),
9857 			  MAC2STR(drv->prev_bssid),
9858 			  drv->associated,
9859 			  drv->assoc_freq,
9860 			  drv->monitor_sock,
9861 			  drv->monitor_ifidx,
9862 			  drv->monitor_refcount,
9863 			  drv->last_mgmt_freq,
9864 			  drv->eapol_tx_sock,
9865 			  drv->ignore_if_down_event ?
9866 			  "ignore_if_down_event=1\n" : "",
9867 			  drv->scan_complete_events ?
9868 			  "scan_complete_events=1\n" : "",
9869 			  drv->disabled_11b_rates ?
9870 			  "disabled_11b_rates=1\n" : "",
9871 			  drv->pending_remain_on_chan ?
9872 			  "pending_remain_on_chan=1\n" : "",
9873 			  drv->in_interface_list ? "in_interface_list=1\n" : "",
9874 			  drv->device_ap_sme ? "device_ap_sme=1\n" : "",
9875 			  drv->poll_command_supported ?
9876 			  "poll_command_supported=1\n" : "",
9877 			  drv->data_tx_status ? "data_tx_status=1\n" : "",
9878 			  drv->scan_for_auth ? "scan_for_auth=1\n" : "",
9879 			  drv->retry_auth ? "retry_auth=1\n" : "",
9880 			  drv->use_monitor ? "use_monitor=1\n" : "",
9881 			  drv->ignore_next_local_disconnect ?
9882 			  "ignore_next_local_disconnect=1\n" : "",
9883 			  drv->ignore_next_local_deauth ?
9884 			  "ignore_next_local_deauth=1\n" : "");
9885 	if (os_snprintf_error(end - pos, res))
9886 		return pos - buf;
9887 	pos += res;
9888 
9889 	if (drv->has_capability) {
9890 		res = os_snprintf(pos, end - pos,
9891 				  "capa.key_mgmt=0x%x\n"
9892 				  "capa.enc=0x%x\n"
9893 				  "capa.auth=0x%x\n"
9894 				  "capa.flags=0x%llx\n"
9895 				  "capa.rrm_flags=0x%x\n"
9896 				  "capa.max_scan_ssids=%d\n"
9897 				  "capa.max_sched_scan_ssids=%d\n"
9898 				  "capa.sched_scan_supported=%d\n"
9899 				  "capa.max_match_sets=%d\n"
9900 				  "capa.max_remain_on_chan=%u\n"
9901 				  "capa.max_stations=%u\n"
9902 				  "capa.probe_resp_offloads=0x%x\n"
9903 				  "capa.max_acl_mac_addrs=%u\n"
9904 				  "capa.num_multichan_concurrent=%u\n"
9905 				  "capa.mac_addr_rand_sched_scan_supported=%d\n"
9906 				  "capa.mac_addr_rand_scan_supported=%d\n"
9907 				  "capa.conc_capab=%u\n"
9908 				  "capa.max_conc_chan_2_4=%u\n"
9909 				  "capa.max_conc_chan_5_0=%u\n"
9910 				  "capa.max_sched_scan_plans=%u\n"
9911 				  "capa.max_sched_scan_plan_interval=%u\n"
9912 				  "capa.max_sched_scan_plan_iterations=%u\n",
9913 				  drv->capa.key_mgmt,
9914 				  drv->capa.enc,
9915 				  drv->capa.auth,
9916 				  (unsigned long long) drv->capa.flags,
9917 				  drv->capa.rrm_flags,
9918 				  drv->capa.max_scan_ssids,
9919 				  drv->capa.max_sched_scan_ssids,
9920 				  drv->capa.sched_scan_supported,
9921 				  drv->capa.max_match_sets,
9922 				  drv->capa.max_remain_on_chan,
9923 				  drv->capa.max_stations,
9924 				  drv->capa.probe_resp_offloads,
9925 				  drv->capa.max_acl_mac_addrs,
9926 				  drv->capa.num_multichan_concurrent,
9927 				  drv->capa.mac_addr_rand_sched_scan_supported,
9928 				  drv->capa.mac_addr_rand_scan_supported,
9929 				  drv->capa.conc_capab,
9930 				  drv->capa.max_conc_chan_2_4,
9931 				  drv->capa.max_conc_chan_5_0,
9932 				  drv->capa.max_sched_scan_plans,
9933 				  drv->capa.max_sched_scan_plan_interval,
9934 				  drv->capa.max_sched_scan_plan_iterations);
9935 		if (os_snprintf_error(end - pos, res))
9936 			return pos - buf;
9937 		pos += res;
9938 	}
9939 
9940 	msg = nlmsg_alloc();
9941 	if (msg &&
9942 	    nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG) &&
9943 	    nla_put_u32(msg, NL80211_ATTR_WIPHY, drv->wiphy_idx) == 0) {
9944 		if (send_and_recv_msgs(drv, msg, nl80211_get_country,
9945 				       alpha2, NULL, NULL) == 0 &&
9946 		    alpha2[0]) {
9947 			res = os_snprintf(pos, end - pos, "country=%s\n",
9948 					  alpha2);
9949 			if (os_snprintf_error(end - pos, res))
9950 				return pos - buf;
9951 			pos += res;
9952 		}
9953 	} else {
9954 		nlmsg_free(msg);
9955 	}
9956 
9957 	return pos - buf;
9958 }
9959 
9960 
set_beacon_data(struct nl_msg * msg,struct beacon_data * settings)9961 static int set_beacon_data(struct nl_msg *msg, struct beacon_data *settings)
9962 {
9963 	if ((settings->head &&
9964 	     nla_put(msg, NL80211_ATTR_BEACON_HEAD,
9965 		     settings->head_len, settings->head)) ||
9966 	    (settings->tail &&
9967 	     nla_put(msg, NL80211_ATTR_BEACON_TAIL,
9968 		     settings->tail_len, settings->tail)) ||
9969 	    (settings->beacon_ies &&
9970 	     nla_put(msg, NL80211_ATTR_IE,
9971 		     settings->beacon_ies_len, settings->beacon_ies)) ||
9972 	    (settings->proberesp_ies &&
9973 	     nla_put(msg, NL80211_ATTR_IE_PROBE_RESP,
9974 		     settings->proberesp_ies_len, settings->proberesp_ies)) ||
9975 	    (settings->assocresp_ies &&
9976 	     nla_put(msg, NL80211_ATTR_IE_ASSOC_RESP,
9977 		     settings->assocresp_ies_len, settings->assocresp_ies)) ||
9978 	    (settings->probe_resp &&
9979 	     nla_put(msg, NL80211_ATTR_PROBE_RESP,
9980 		     settings->probe_resp_len, settings->probe_resp)))
9981 		return -ENOBUFS;
9982 
9983 	return 0;
9984 }
9985 
9986 
nl80211_switch_channel(void * priv,struct csa_settings * settings)9987 static int nl80211_switch_channel(void *priv, struct csa_settings *settings)
9988 {
9989 	struct nl_msg *msg;
9990 	struct i802_bss *bss = priv;
9991 	struct wpa_driver_nl80211_data *drv = bss->drv;
9992 	struct nlattr *beacon_csa;
9993 	int ret = -ENOBUFS;
9994 	int csa_off_len = 0;
9995 	int i;
9996 
9997 	wpa_printf(MSG_DEBUG,
9998 		   "nl80211: Channel switch request (cs_count=%u block_tx=%u freq=%d channel=%d sec_channel_offset=%d width=%d cf1=%d cf2=%d%s%s%s)",
9999 		   settings->cs_count, settings->block_tx,
10000 		   settings->freq_params.freq,
10001 		   settings->freq_params.channel,
10002 		   settings->freq_params.sec_channel_offset,
10003 		   settings->freq_params.bandwidth,
10004 		   settings->freq_params.center_freq1,
10005 		   settings->freq_params.center_freq2,
10006 		   settings->freq_params.ht_enabled ? " ht" : "",
10007 		   settings->freq_params.vht_enabled ? " vht" : "",
10008 		   settings->freq_params.he_enabled ? " he" : "");
10009 
10010 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_AP_CSA)) {
10011 		wpa_printf(MSG_DEBUG, "nl80211: Driver does not support channel switch command");
10012 		return -EOPNOTSUPP;
10013 	}
10014 
10015 	if (drv->nlmode != NL80211_IFTYPE_AP &&
10016 	    drv->nlmode != NL80211_IFTYPE_P2P_GO &&
10017 	    drv->nlmode != NL80211_IFTYPE_MESH_POINT)
10018 		return -EOPNOTSUPP;
10019 
10020 	/*
10021 	 * Remove empty counters, assuming Probe Response and Beacon frame
10022 	 * counters match. This implementation assumes that there are only two
10023 	 * counters.
10024 	 */
10025 	if (settings->counter_offset_beacon[0] &&
10026 	    !settings->counter_offset_beacon[1]) {
10027 		csa_off_len = 1;
10028 	} else if (settings->counter_offset_beacon[1] &&
10029 		   !settings->counter_offset_beacon[0]) {
10030 		csa_off_len = 1;
10031 		settings->counter_offset_beacon[0] =
10032 			settings->counter_offset_beacon[1];
10033 		settings->counter_offset_presp[0] =
10034 			settings->counter_offset_presp[1];
10035 	} else if (settings->counter_offset_beacon[1] &&
10036 		   settings->counter_offset_beacon[0]) {
10037 		csa_off_len = 2;
10038 	} else {
10039 		wpa_printf(MSG_ERROR, "nl80211: No CSA counters provided");
10040 		return -EINVAL;
10041 	}
10042 
10043 	/* Check CSA counters validity */
10044 	if (drv->capa.max_csa_counters &&
10045 	    csa_off_len > drv->capa.max_csa_counters) {
10046 		wpa_printf(MSG_ERROR,
10047 			   "nl80211: Too many CSA counters provided");
10048 		return -EINVAL;
10049 	}
10050 
10051 	if (!settings->beacon_csa.tail)
10052 		return -EINVAL;
10053 
10054 	for (i = 0; i < csa_off_len; i++) {
10055 		u16 csa_c_off_bcn = settings->counter_offset_beacon[i];
10056 		u16 csa_c_off_presp = settings->counter_offset_presp[i];
10057 
10058 		if ((settings->beacon_csa.tail_len <= csa_c_off_bcn) ||
10059 		    (settings->beacon_csa.tail[csa_c_off_bcn] !=
10060 		     settings->cs_count))
10061 			return -EINVAL;
10062 
10063 		if (settings->beacon_csa.probe_resp &&
10064 		    ((settings->beacon_csa.probe_resp_len <=
10065 		      csa_c_off_presp) ||
10066 		     (settings->beacon_csa.probe_resp[csa_c_off_presp] !=
10067 		      settings->cs_count)))
10068 			return -EINVAL;
10069 	}
10070 
10071 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_CHANNEL_SWITCH)) ||
10072 	    nla_put_u32(msg, NL80211_ATTR_CH_SWITCH_COUNT,
10073 			settings->cs_count) ||
10074 	    (ret = nl80211_put_freq_params(msg, &settings->freq_params)) ||
10075 	    (settings->block_tx &&
10076 	     nla_put_flag(msg, NL80211_ATTR_CH_SWITCH_BLOCK_TX)))
10077 		goto error;
10078 
10079 	/* beacon_after params */
10080 	ret = set_beacon_data(msg, &settings->beacon_after);
10081 	if (ret)
10082 		goto error;
10083 
10084 	/* beacon_csa params */
10085 	beacon_csa = nla_nest_start(msg, NL80211_ATTR_CSA_IES);
10086 	if (!beacon_csa)
10087 		goto fail;
10088 
10089 	ret = set_beacon_data(msg, &settings->beacon_csa);
10090 	if (ret)
10091 		goto error;
10092 
10093 	if (nla_put(msg, NL80211_ATTR_CSA_C_OFF_BEACON,
10094 		    csa_off_len * sizeof(u16),
10095 		    settings->counter_offset_beacon) ||
10096 	    (settings->beacon_csa.probe_resp &&
10097 	     nla_put(msg, NL80211_ATTR_CSA_C_OFF_PRESP,
10098 		     csa_off_len * sizeof(u16),
10099 		     settings->counter_offset_presp)))
10100 		goto fail;
10101 
10102 	nla_nest_end(msg, beacon_csa);
10103 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10104 	if (ret) {
10105 		wpa_printf(MSG_DEBUG, "nl80211: switch_channel failed err=%d (%s)",
10106 			   ret, strerror(-ret));
10107 	}
10108 	return ret;
10109 
10110 fail:
10111 	ret = -ENOBUFS;
10112 error:
10113 	nlmsg_free(msg);
10114 	wpa_printf(MSG_DEBUG, "nl80211: Could not build channel switch request");
10115 	return ret;
10116 }
10117 
10118 
10119 #ifdef CONFIG_IEEE80211AX
nl80211_switch_color(void * priv,struct cca_settings * settings)10120 static int nl80211_switch_color(void *priv, struct cca_settings *settings)
10121 {
10122 	struct i802_bss *bss = priv;
10123 	struct wpa_driver_nl80211_data *drv = bss->drv;
10124 	struct nlattr *beacon_cca;
10125 	struct nl_msg *msg;
10126 	int ret = -ENOBUFS;
10127 
10128 	wpa_printf(MSG_DEBUG,
10129 		   "nl80211: Color change request (cca_count=%u color=%d)",
10130 		   settings->cca_count, settings->cca_color);
10131 
10132 	if (drv->nlmode != NL80211_IFTYPE_AP)
10133 		return -EOPNOTSUPP;
10134 
10135 	if (!settings->beacon_cca.tail)
10136 		return -EINVAL;
10137 
10138 	if (settings->beacon_cca.tail_len <= settings->counter_offset_beacon ||
10139 	    settings->beacon_cca.tail[settings->counter_offset_beacon] !=
10140 	    settings->cca_count)
10141 		return -EINVAL;
10142 
10143 	if (settings->beacon_cca.probe_resp &&
10144 	    (settings->beacon_cca.probe_resp_len <=
10145 	     settings->counter_offset_presp ||
10146 	     settings->beacon_cca.probe_resp[settings->counter_offset_presp] !=
10147 	     settings->cca_count))
10148 		return -EINVAL;
10149 
10150 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_COLOR_CHANGE_REQUEST);
10151 	if (!msg ||
10152 	    nla_put_u8(msg, NL80211_ATTR_COLOR_CHANGE_COUNT,
10153 		       settings->cca_count) ||
10154 	    nla_put_u8(msg, NL80211_ATTR_COLOR_CHANGE_COLOR,
10155 		       settings->cca_color))
10156 		goto error;
10157 
10158 	/* beacon_after params */
10159 	ret = set_beacon_data(msg, &settings->beacon_after);
10160 	if (ret)
10161 		goto error;
10162 
10163 	/* beacon_csa params */
10164 	beacon_cca = nla_nest_start(msg, NL80211_ATTR_COLOR_CHANGE_ELEMS);
10165 	if (!beacon_cca) {
10166 		ret = -ENOBUFS;
10167 		goto error;
10168 	}
10169 
10170 	ret = set_beacon_data(msg, &settings->beacon_cca);
10171 	if (ret)
10172 		goto error;
10173 
10174 	if (nla_put_u16(msg, NL80211_ATTR_CNTDWN_OFFS_BEACON,
10175 			settings->counter_offset_beacon) ||
10176 	    (settings->beacon_cca.probe_resp &&
10177 	     nla_put_u16(msg, NL80211_ATTR_CNTDWN_OFFS_PRESP,
10178 			 settings->counter_offset_presp))) {
10179 		ret = -ENOBUFS;
10180 		goto error;
10181 	}
10182 
10183 	nla_nest_end(msg, beacon_cca);
10184 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10185 	if (ret) {
10186 		wpa_printf(MSG_DEBUG,
10187 			   "nl80211: switch_color failed err=%d (%s)",
10188 			   ret, strerror(-ret));
10189 	}
10190 	return ret;
10191 
10192 error:
10193 	nlmsg_free(msg);
10194 	wpa_printf(MSG_DEBUG, "nl80211: Could not build color switch request");
10195 	return ret;
10196 }
10197 #endif /* CONFIG_IEEE80211AX */
10198 
10199 
nl80211_add_ts(void * priv,u8 tsid,const u8 * addr,u8 user_priority,u16 admitted_time)10200 static int nl80211_add_ts(void *priv, u8 tsid, const u8 *addr,
10201 			  u8 user_priority, u16 admitted_time)
10202 {
10203 	struct i802_bss *bss = priv;
10204 	struct wpa_driver_nl80211_data *drv = bss->drv;
10205 	struct nl_msg *msg;
10206 	int ret;
10207 
10208 	wpa_printf(MSG_DEBUG,
10209 		   "nl80211: add_ts request: tsid=%u admitted_time=%u up=%d",
10210 		   tsid, admitted_time, user_priority);
10211 
10212 	if (!is_sta_interface(drv->nlmode))
10213 		return -ENOTSUP;
10214 
10215 	msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_ADD_TX_TS);
10216 	if (!msg ||
10217 	    nla_put_u8(msg, NL80211_ATTR_TSID, tsid) ||
10218 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
10219 	    nla_put_u8(msg, NL80211_ATTR_USER_PRIO, user_priority) ||
10220 	    nla_put_u16(msg, NL80211_ATTR_ADMITTED_TIME, admitted_time)) {
10221 		nlmsg_free(msg);
10222 		return -ENOBUFS;
10223 	}
10224 
10225 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10226 	if (ret)
10227 		wpa_printf(MSG_DEBUG, "nl80211: add_ts failed err=%d (%s)",
10228 			   ret, strerror(-ret));
10229 	return ret;
10230 }
10231 
10232 
nl80211_del_ts(void * priv,u8 tsid,const u8 * addr)10233 static int nl80211_del_ts(void *priv, u8 tsid, const u8 *addr)
10234 {
10235 	struct i802_bss *bss = priv;
10236 	struct wpa_driver_nl80211_data *drv = bss->drv;
10237 	struct nl_msg *msg;
10238 	int ret;
10239 
10240 	wpa_printf(MSG_DEBUG, "nl80211: del_ts request: tsid=%u", tsid);
10241 
10242 	if (!is_sta_interface(drv->nlmode))
10243 		return -ENOTSUP;
10244 
10245 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_DEL_TX_TS)) ||
10246 	    nla_put_u8(msg, NL80211_ATTR_TSID, tsid) ||
10247 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
10248 		nlmsg_free(msg);
10249 		return -ENOBUFS;
10250 	}
10251 
10252 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10253 	if (ret)
10254 		wpa_printf(MSG_DEBUG, "nl80211: del_ts failed err=%d (%s)",
10255 			   ret, strerror(-ret));
10256 	return ret;
10257 }
10258 
10259 
10260 #ifdef CONFIG_TESTING_OPTIONS
cmd_reply_handler(struct nl_msg * msg,void * arg)10261 static int cmd_reply_handler(struct nl_msg *msg, void *arg)
10262 {
10263 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
10264 	struct wpabuf *buf = arg;
10265 
10266 	if (!buf)
10267 		return NL_SKIP;
10268 
10269 	if ((size_t) genlmsg_attrlen(gnlh, 0) > wpabuf_tailroom(buf)) {
10270 		wpa_printf(MSG_INFO, "nl80211: insufficient buffer space for reply");
10271 		return NL_SKIP;
10272 	}
10273 
10274 	wpabuf_put_data(buf, genlmsg_attrdata(gnlh, 0),
10275 			genlmsg_attrlen(gnlh, 0));
10276 
10277 	return NL_SKIP;
10278 }
10279 #endif /* CONFIG_TESTING_OPTIONS */
10280 
10281 
vendor_reply_handler(struct nl_msg * msg,void * arg)10282 static int vendor_reply_handler(struct nl_msg *msg, void *arg)
10283 {
10284 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
10285 	struct nlattr *nl_vendor_reply, *nl;
10286 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
10287 	struct wpabuf *buf = arg;
10288 	int rem;
10289 
10290 	if (!buf)
10291 		return NL_SKIP;
10292 
10293 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
10294 		  genlmsg_attrlen(gnlh, 0), NULL);
10295 	nl_vendor_reply = tb[NL80211_ATTR_VENDOR_DATA];
10296 
10297 	if (!nl_vendor_reply)
10298 		return NL_SKIP;
10299 
10300 	if ((size_t) nla_len(nl_vendor_reply) > wpabuf_tailroom(buf)) {
10301 		wpa_printf(MSG_INFO, "nl80211: Vendor command: insufficient buffer space for reply");
10302 		return NL_SKIP;
10303 	}
10304 
10305 	nla_for_each_nested(nl, nl_vendor_reply, rem) {
10306 		wpabuf_put_data(buf, nla_data(nl), nla_len(nl));
10307 	}
10308 
10309 	return NL_SKIP;
10310 }
10311 
10312 
is_cmd_with_nested_attrs(unsigned int vendor_id,unsigned int subcmd)10313 static bool is_cmd_with_nested_attrs(unsigned int vendor_id,
10314 				     unsigned int subcmd)
10315 {
10316 	if (vendor_id != OUI_QCA)
10317 		return true;
10318 
10319 	switch (subcmd) {
10320 	case QCA_NL80211_VENDOR_SUBCMD_AVOID_FREQUENCY:
10321 	case QCA_NL80211_VENDOR_SUBCMD_STATS_EXT:
10322 	case QCA_NL80211_VENDOR_SUBCMD_SCANNING_MAC_OUI:
10323 	case QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_SET_KEY:
10324 	case QCA_NL80211_VENDOR_SUBCMD_SPECTRAL_SCAN_GET_STATUS:
10325 	case QCA_NL80211_VENDOR_SUBCMD_NAN:
10326 		return false;
10327 	default:
10328 		return true;
10329 	}
10330 }
10331 
10332 
nl80211_vendor_cmd(void * priv,unsigned int vendor_id,unsigned int subcmd,const u8 * data,size_t data_len,enum nested_attr nested_attr,struct wpabuf * buf)10333 static int nl80211_vendor_cmd(void *priv, unsigned int vendor_id,
10334 			      unsigned int subcmd, const u8 *data,
10335 			      size_t data_len, enum nested_attr nested_attr,
10336 			      struct wpabuf *buf)
10337 {
10338 	struct i802_bss *bss = priv;
10339 	struct wpa_driver_nl80211_data *drv = bss->drv;
10340 	struct nl_msg *msg;
10341 	int ret, nla_flag;
10342 
10343 #ifdef CONFIG_TESTING_OPTIONS
10344 	if (vendor_id == 0xffffffff) {
10345 		msg = nlmsg_alloc();
10346 		if (!msg)
10347 			return -ENOMEM;
10348 
10349 		nl80211_cmd(drv, msg, 0, subcmd);
10350 		if (nlmsg_append(msg, (void *) data, data_len, NLMSG_ALIGNTO) <
10351 		    0)
10352 			goto fail;
10353 		/* This test vendor_cmd can be used with nl80211 commands that
10354 		 * need the connect nl_sock, so use the owner-setting variant
10355 		 * of send_and_recv_msgs(). */
10356 		ret = send_and_recv_msgs_owner(drv, msg,
10357 					       get_connect_handle(bss), 0,
10358 					       cmd_reply_handler, buf,
10359 					       NULL, NULL);
10360 		if (ret)
10361 			wpa_printf(MSG_DEBUG, "nl80211: command failed err=%d",
10362 				   ret);
10363 		return ret;
10364 	}
10365 #endif /* CONFIG_TESTING_OPTIONS */
10366 
10367 	if (nested_attr == NESTED_ATTR_USED)
10368 		nla_flag = NLA_F_NESTED;
10369 	else if (nested_attr == NESTED_ATTR_UNSPECIFIED &&
10370 		 is_cmd_with_nested_attrs(vendor_id, subcmd))
10371 		nla_flag = NLA_F_NESTED;
10372 	else
10373 		nla_flag = 0;
10374 
10375 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_VENDOR)) ||
10376 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, vendor_id) ||
10377 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, subcmd) ||
10378 	    (data &&
10379 	     nla_put(msg, nla_flag | NL80211_ATTR_VENDOR_DATA,
10380 		     data_len, data)))
10381 		goto fail;
10382 
10383 	ret = send_and_recv_msgs(drv, msg, vendor_reply_handler, buf,
10384 				 NULL, NULL);
10385 	if (ret)
10386 		wpa_printf(MSG_DEBUG, "nl80211: vendor command failed err=%d",
10387 			   ret);
10388 	return ret;
10389 
10390 fail:
10391 	nlmsg_free(msg);
10392 	return -ENOBUFS;
10393 }
10394 
10395 
nl80211_set_qos_map(void * priv,const u8 * qos_map_set,u8 qos_map_set_len)10396 static int nl80211_set_qos_map(void *priv, const u8 *qos_map_set,
10397 			       u8 qos_map_set_len)
10398 {
10399 	struct i802_bss *bss = priv;
10400 	struct wpa_driver_nl80211_data *drv = bss->drv;
10401 	struct nl_msg *msg;
10402 	int ret;
10403 
10404 	wpa_hexdump(MSG_DEBUG, "nl80211: Setting QoS Map",
10405 		    qos_map_set, qos_map_set_len);
10406 
10407 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_QOS_MAP)) ||
10408 	    nla_put(msg, NL80211_ATTR_QOS_MAP, qos_map_set_len, qos_map_set)) {
10409 		nlmsg_free(msg);
10410 		return -ENOBUFS;
10411 	}
10412 
10413 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10414 	if (ret)
10415 		wpa_printf(MSG_DEBUG, "nl80211: Setting QoS Map failed");
10416 
10417 	return ret;
10418 }
10419 
10420 
get_wowlan_handler(struct nl_msg * msg,void * arg)10421 static int get_wowlan_handler(struct nl_msg *msg, void *arg)
10422 {
10423 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
10424 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
10425 	int *wowlan_enabled = arg;
10426 
10427 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
10428 		  genlmsg_attrlen(gnlh, 0), NULL);
10429 
10430 	*wowlan_enabled = !!tb[NL80211_ATTR_WOWLAN_TRIGGERS];
10431 
10432 	return NL_SKIP;
10433 }
10434 
10435 
nl80211_get_wowlan(void * priv)10436 static int nl80211_get_wowlan(void *priv)
10437 {
10438 	struct i802_bss *bss = priv;
10439 	struct wpa_driver_nl80211_data *drv = bss->drv;
10440 	struct nl_msg *msg;
10441 	int wowlan_enabled;
10442 	int ret;
10443 
10444 	wpa_printf(MSG_DEBUG, "nl80211: Getting wowlan status");
10445 
10446 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_WOWLAN);
10447 
10448 	ret = send_and_recv_msgs(drv, msg, get_wowlan_handler, &wowlan_enabled,
10449 				 NULL, NULL);
10450 	if (ret) {
10451 		wpa_printf(MSG_DEBUG, "nl80211: Getting wowlan status failed");
10452 		return 0;
10453 	}
10454 
10455 	wpa_printf(MSG_DEBUG, "nl80211: wowlan is %s",
10456 		   wowlan_enabled ? "enabled" : "disabled");
10457 
10458 	return wowlan_enabled;
10459 }
10460 
10461 
nl80211_set_wowlan(void * priv,const struct wowlan_triggers * triggers)10462 static int nl80211_set_wowlan(void *priv,
10463 			      const struct wowlan_triggers *triggers)
10464 {
10465 	struct i802_bss *bss = priv;
10466 	struct wpa_driver_nl80211_data *drv = bss->drv;
10467 	struct nl_msg *msg;
10468 	struct nlattr *wowlan_triggers;
10469 	int ret;
10470 
10471 	wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan");
10472 
10473 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_SET_WOWLAN)) ||
10474 	    !(wowlan_triggers = nla_nest_start(msg,
10475 					       NL80211_ATTR_WOWLAN_TRIGGERS)) ||
10476 	    (triggers->any &&
10477 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_ANY)) ||
10478 	    (triggers->disconnect &&
10479 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_DISCONNECT)) ||
10480 	    (triggers->magic_pkt &&
10481 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_MAGIC_PKT)) ||
10482 	    (triggers->gtk_rekey_failure &&
10483 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE)) ||
10484 	    (triggers->eap_identity_req &&
10485 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST)) ||
10486 	    (triggers->four_way_handshake &&
10487 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE)) ||
10488 	    (triggers->rfkill_release &&
10489 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_RFKILL_RELEASE))) {
10490 		nlmsg_free(msg);
10491 		return -ENOBUFS;
10492 	}
10493 
10494 	nla_nest_end(msg, wowlan_triggers);
10495 
10496 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10497 	if (ret)
10498 		wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan failed");
10499 
10500 	return ret;
10501 }
10502 
10503 
10504 #ifdef CONFIG_DRIVER_NL80211_QCA
nl80211_roaming(void * priv,int allowed,const u8 * bssid)10505 static int nl80211_roaming(void *priv, int allowed, const u8 *bssid)
10506 {
10507 	struct i802_bss *bss = priv;
10508 	struct wpa_driver_nl80211_data *drv = bss->drv;
10509 	struct nl_msg *msg;
10510 	struct nlattr *params;
10511 
10512 	wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
10513 
10514 	if (!drv->roaming_vendor_cmd_avail) {
10515 		wpa_printf(MSG_DEBUG,
10516 			   "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
10517 		return -1;
10518 	}
10519 
10520 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
10521 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
10522 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
10523 			QCA_NL80211_VENDOR_SUBCMD_ROAMING) ||
10524 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
10525 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_POLICY,
10526 			allowed ? QCA_ROAMING_ALLOWED_WITHIN_ESS :
10527 			QCA_ROAMING_NOT_ALLOWED) ||
10528 	    (bssid &&
10529 	     nla_put(msg, QCA_WLAN_VENDOR_ATTR_MAC_ADDR, ETH_ALEN, bssid))) {
10530 		nlmsg_free(msg);
10531 		return -1;
10532 	}
10533 	nla_nest_end(msg, params);
10534 
10535 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10536 }
10537 
10538 
nl80211_disable_fils(void * priv,int disable)10539 static int nl80211_disable_fils(void *priv, int disable)
10540 {
10541 	struct i802_bss *bss = priv;
10542 	struct wpa_driver_nl80211_data *drv = bss->drv;
10543 	struct nl_msg *msg;
10544 	struct nlattr *params;
10545 
10546 	wpa_printf(MSG_DEBUG, "nl80211: Disable FILS=%d", disable);
10547 
10548 	if (!drv->set_wifi_conf_vendor_cmd_avail)
10549 		return -1;
10550 
10551 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
10552 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
10553 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
10554 			QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION) ||
10555 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
10556 	    nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_CONFIG_DISABLE_FILS,
10557 		       disable)) {
10558 		nlmsg_free(msg);
10559 		return -1;
10560 	}
10561 	nla_nest_end(msg, params);
10562 
10563 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10564 }
10565 
10566 
10567 /* Reserved QCA_WLAN_VENDOR_ATTR_ROAMING_REQ_ID value for wpa_supplicant */
10568 #define WPA_SUPPLICANT_CLIENT_ID 1
10569 
nl80211_set_bssid_tmp_disallow(void * priv,unsigned int num_bssid,const u8 * bssid)10570 static int nl80211_set_bssid_tmp_disallow(void *priv, unsigned int num_bssid,
10571 					  const u8 *bssid)
10572 {
10573 	struct i802_bss *bss = priv;
10574 	struct wpa_driver_nl80211_data *drv = bss->drv;
10575 	struct nl_msg *msg;
10576 	struct nlattr *params, *nlbssids, *attr;
10577 	unsigned int i;
10578 
10579 	wpa_printf(MSG_DEBUG,
10580 		   "nl80211: Set temporarily disallowed BSSIDs (num=%u)",
10581 		   num_bssid);
10582 
10583 	if (!drv->roam_vendor_cmd_avail)
10584 		return -1;
10585 
10586 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
10587 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
10588 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
10589 			QCA_NL80211_VENDOR_SUBCMD_ROAM) ||
10590 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
10591 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_SUBCMD,
10592 			QCA_WLAN_VENDOR_ROAMING_SUBCMD_SET_BLACKLIST_BSSID) ||
10593 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_REQ_ID,
10594 			WPA_SUPPLICANT_CLIENT_ID) ||
10595 	    nla_put_u32(msg,
10596 			QCA_WLAN_VENDOR_ATTR_ROAMING_PARAM_SET_BSSID_PARAMS_NUM_BSSID,
10597 			num_bssid))
10598 		goto fail;
10599 
10600 	nlbssids = nla_nest_start(
10601 		msg, QCA_WLAN_VENDOR_ATTR_ROAMING_PARAM_SET_BSSID_PARAMS);
10602 	if (!nlbssids)
10603 		goto fail;
10604 
10605 	for (i = 0; i < num_bssid; i++) {
10606 		attr = nla_nest_start(msg, i);
10607 		if (!attr)
10608 			goto fail;
10609 		if (nla_put(msg,
10610 			    QCA_WLAN_VENDOR_ATTR_ROAMING_PARAM_SET_BSSID_PARAMS_BSSID,
10611 			    ETH_ALEN, &bssid[i * ETH_ALEN]))
10612 			goto fail;
10613 		wpa_printf(MSG_DEBUG, "nl80211:   BSSID[%u]: " MACSTR, i,
10614 			   MAC2STR(&bssid[i * ETH_ALEN]));
10615 		nla_nest_end(msg, attr);
10616 	}
10617 	nla_nest_end(msg, nlbssids);
10618 	nla_nest_end(msg, params);
10619 
10620 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10621 
10622 fail:
10623 	nlmsg_free(msg);
10624 	return -1;
10625 }
10626 
10627 
nl80211_add_sta_node(void * priv,const u8 * addr,u16 auth_alg)10628 static int nl80211_add_sta_node(void *priv, const u8 *addr, u16 auth_alg)
10629 {
10630 	struct i802_bss *bss = priv;
10631 	struct wpa_driver_nl80211_data *drv = bss->drv;
10632 	struct nl_msg *msg;
10633 	struct nlattr *params;
10634 
10635 	if (!drv->add_sta_node_vendor_cmd_avail)
10636 		return -EOPNOTSUPP;
10637 
10638 	wpa_printf(MSG_DEBUG, "nl80211: Add STA node");
10639 
10640 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
10641 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
10642 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
10643 			QCA_NL80211_VENDOR_SUBCMD_ADD_STA_NODE) ||
10644 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
10645 	    (addr &&
10646 	     nla_put(msg, QCA_WLAN_VENDOR_ATTR_ADD_STA_NODE_MAC_ADDR, ETH_ALEN,
10647 		     addr)) ||
10648 	    nla_put_u16(msg, QCA_WLAN_VENDOR_ATTR_ADD_STA_NODE_AUTH_ALGO,
10649 			auth_alg)) {
10650 		nlmsg_free(msg);
10651 		wpa_printf(MSG_ERROR,
10652 			   "%s: err in adding vendor_cmd and vendor_data",
10653 			   __func__);
10654 		return -1;
10655 	}
10656 	nla_nest_end(msg, params);
10657 
10658 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10659 }
10660 
10661 #endif /* CONFIG_DRIVER_NL80211_QCA */
10662 
10663 
nl80211_set_mac_addr(void * priv,const u8 * addr)10664 static int nl80211_set_mac_addr(void *priv, const u8 *addr)
10665 {
10666 	struct i802_bss *bss = priv;
10667 	struct wpa_driver_nl80211_data *drv = bss->drv;
10668 	int new_addr = addr != NULL;
10669 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
10670 	struct nl_msg *msg;
10671 	struct nlattr *params;
10672 	int ret;
10673 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
10674 	wpa_printf(MSG_DEBUG, "Enter: %s", __FUNCTION__);
10675 
10676 	if (TEST_FAIL())
10677 		return -1;
10678 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) {
10679 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
10680 		if (!addr ) {
10681 			addr = drv->global->p2p_perm_addr;
10682 		}
10683 
10684 		if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_VENDOR)) ||
10685 			nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
10686 			nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
10687 				BRCM_VENDOR_SCMD_SET_MAC) ||
10688 			!(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
10689 			nla_put(msg, BRCM_ATTR_DRIVER_MAC_ADDR, ETH_ALEN, addr)) {
10690 			wpa_printf(MSG_ERROR, "failed to put p2p randmac");
10691 			nl80211_nlmsg_clear(msg);
10692 			nlmsg_free(msg);
10693 			return -ENOBUFS;
10694 		}
10695 		nla_nest_end(msg, params);
10696 
10697 		ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1, NULL, NULL);
10698 		if (ret) {
10699 			wpa_printf(MSG_ERROR, "nl80211: p2p set macaddr failed: ret=%d (%s)",
10700 				ret, strerror(-ret));
10701 		}
10702 		memcpy(bss->addr, addr, ETH_ALEN);
10703 		return ret;
10704 #else
10705 		return -ENOTSUP;
10706 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
10707 	}
10708 	if (!addr)
10709 		addr = drv->perm_addr;
10710 
10711 	if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) < 0)
10712 		return -1;
10713 
10714 	if (linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname, addr) < 0)
10715 	{
10716 		wpa_printf(MSG_DEBUG,
10717 			"nl80211: failed to set_mac_addr for %s to " MACSTR,
10718 			bss->ifname, MAC2STR(addr));
10719 		if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname,
10720 			1) < 0) {
10721 			wpa_printf(MSG_DEBUG,
10722 				"nl80211: Could not restore interface UP after failed set_mac_addr");
10723 		}
10724 		return -1;
10725 	}
10726 
10727 	wpa_printf(MSG_DEBUG, "nl80211: set_mac_addr for %s to " MACSTR,
10728 		bss->ifname, MAC2STR(addr));
10729 	drv->addr_changed = new_addr;
10730 	os_memcpy(bss->addr, addr, ETH_ALEN);
10731 
10732 	if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 1) < 0)
10733 	{
10734 		wpa_printf(MSG_DEBUG,
10735 			"nl80211: Could not restore interface UP after set_mac_addr");
10736 	}
10737 	return 0;
10738 }
10739 
10740 
10741 #ifdef CONFIG_MESH
10742 
wpa_driver_nl80211_init_mesh(void * priv)10743 static int wpa_driver_nl80211_init_mesh(void *priv)
10744 {
10745 	if (wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_MESH_POINT)) {
10746 		wpa_printf(MSG_INFO,
10747 			   "nl80211: Failed to set interface into mesh mode");
10748 		return -1;
10749 	}
10750 	return 0;
10751 }
10752 
10753 
nl80211_put_mesh_id(struct nl_msg * msg,const u8 * mesh_id,size_t mesh_id_len)10754 static int nl80211_put_mesh_id(struct nl_msg *msg, const u8 *mesh_id,
10755 			       size_t mesh_id_len)
10756 {
10757 	if (mesh_id) {
10758 		wpa_printf(MSG_DEBUG, "  * Mesh ID (SSID)=%s",
10759 			   wpa_ssid_txt(mesh_id, mesh_id_len));
10760 		return nla_put(msg, NL80211_ATTR_MESH_ID, mesh_id_len, mesh_id);
10761 	}
10762 
10763 	return 0;
10764 }
10765 
10766 
nl80211_put_mesh_config(struct nl_msg * msg,struct wpa_driver_mesh_bss_params * params)10767 static int nl80211_put_mesh_config(struct nl_msg *msg,
10768 				   struct wpa_driver_mesh_bss_params *params)
10769 {
10770 	struct nlattr *container;
10771 
10772 	container = nla_nest_start(msg, NL80211_ATTR_MESH_CONFIG);
10773 	if (!container)
10774 		return -1;
10775 
10776 	if (((params->flags & WPA_DRIVER_MESH_CONF_FLAG_AUTO_PLINKS) &&
10777 	     nla_put_u8(msg, NL80211_MESHCONF_AUTO_OPEN_PLINKS,
10778 			params->auto_plinks)) ||
10779 	    ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_FORWARDING) &&
10780 	     nla_put_u8(msg, NL80211_MESHCONF_FORWARDING,
10781 			params->forwarding)) ||
10782 	    ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_MAX_PEER_LINKS) &&
10783 	     nla_put_u16(msg, NL80211_MESHCONF_MAX_PEER_LINKS,
10784 			 params->max_peer_links)) ||
10785 	    ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_RSSI_THRESHOLD) &&
10786 	     nla_put_u32(msg, NL80211_MESHCONF_RSSI_THRESHOLD,
10787 			 params->rssi_threshold)))
10788 		return -1;
10789 
10790 	/*
10791 	 * Set NL80211_MESHCONF_PLINK_TIMEOUT even if user mpm is used because
10792 	 * the timer could disconnect stations even in that case.
10793 	 */
10794 	if ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_PEER_LINK_TIMEOUT) &&
10795 	    nla_put_u32(msg, NL80211_MESHCONF_PLINK_TIMEOUT,
10796 			params->peer_link_timeout)) {
10797 		wpa_printf(MSG_ERROR, "nl80211: Failed to set PLINK_TIMEOUT");
10798 		return -1;
10799 	}
10800 
10801 	if ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_HT_OP_MODE) &&
10802 	    nla_put_u16(msg, NL80211_MESHCONF_HT_OPMODE, params->ht_opmode)) {
10803 		wpa_printf(MSG_ERROR, "nl80211: Failed to set HT_OP_MODE");
10804 		return -1;
10805 	}
10806 
10807 	nla_nest_end(msg, container);
10808 
10809 	return 0;
10810 }
10811 
10812 
nl80211_join_mesh(struct i802_bss * bss,struct wpa_driver_mesh_join_params * params)10813 static int nl80211_join_mesh(struct i802_bss *bss,
10814 			     struct wpa_driver_mesh_join_params *params)
10815 {
10816 	struct wpa_driver_nl80211_data *drv = bss->drv;
10817 	struct nl_msg *msg;
10818 	struct nlattr *container;
10819 	int ret = -1;
10820 
10821 	wpa_printf(MSG_DEBUG, "nl80211: mesh join (ifindex=%d)", drv->ifindex);
10822 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_JOIN_MESH);
10823 	if (!msg ||
10824 	    nl80211_put_freq_params(msg, &params->freq) ||
10825 	    nl80211_put_basic_rates(msg, params->basic_rates) ||
10826 	    nl80211_put_mesh_id(msg, params->meshid, params->meshid_len) ||
10827 	    nl80211_put_beacon_int(msg, params->beacon_int) ||
10828 	    nl80211_put_dtim_period(msg, params->dtim_period))
10829 		goto fail;
10830 
10831 	wpa_printf(MSG_DEBUG, "  * flags=%08X", params->flags);
10832 
10833 	if (params->handle_dfs && nla_put_flag(msg, NL80211_ATTR_HANDLE_DFS))
10834 		goto fail;
10835 
10836 	container = nla_nest_start(msg, NL80211_ATTR_MESH_SETUP);
10837 	if (!container)
10838 		goto fail;
10839 
10840 	if (params->ies) {
10841 		wpa_hexdump(MSG_DEBUG, "  * IEs", params->ies, params->ie_len);
10842 		if (nla_put(msg, NL80211_MESH_SETUP_IE, params->ie_len,
10843 			    params->ies))
10844 			goto fail;
10845 	}
10846 	/* WPA_DRIVER_MESH_FLAG_OPEN_AUTH is treated as default by nl80211 */
10847 	if (params->flags & WPA_DRIVER_MESH_FLAG_SAE_AUTH) {
10848 		if (nla_put_u8(msg, NL80211_MESH_SETUP_AUTH_PROTOCOL, 0x1) ||
10849 		    nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_AUTH))
10850 			goto fail;
10851 	}
10852 	if ((params->flags & WPA_DRIVER_MESH_FLAG_AMPE) &&
10853 	    nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_AMPE))
10854 		goto fail;
10855 	if ((params->flags & WPA_DRIVER_MESH_FLAG_USER_MPM) &&
10856 	    nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_MPM))
10857 		goto fail;
10858 	nla_nest_end(msg, container);
10859 
10860 	params->conf.flags |= WPA_DRIVER_MESH_CONF_FLAG_AUTO_PLINKS;
10861 	params->conf.flags |= WPA_DRIVER_MESH_CONF_FLAG_PEER_LINK_TIMEOUT;
10862 	params->conf.flags |= WPA_DRIVER_MESH_CONF_FLAG_MAX_PEER_LINKS;
10863 	if (nl80211_put_mesh_config(msg, &params->conf) < 0)
10864 		goto fail;
10865 
10866 	ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 1);
10867 	msg = NULL;
10868 	if (ret) {
10869 		wpa_printf(MSG_DEBUG, "nl80211: mesh join failed: ret=%d (%s)",
10870 			   ret, strerror(-ret));
10871 		goto fail;
10872 	}
10873 	ret = 0;
10874 	drv->assoc_freq = bss->freq = params->freq.freq;
10875 	wpa_printf(MSG_DEBUG, "nl80211: mesh join request send successfully");
10876 
10877 fail:
10878 	nlmsg_free(msg);
10879 	return ret;
10880 }
10881 
10882 
10883 static int
wpa_driver_nl80211_join_mesh(void * priv,struct wpa_driver_mesh_join_params * params)10884 wpa_driver_nl80211_join_mesh(void *priv,
10885 			     struct wpa_driver_mesh_join_params *params)
10886 {
10887 	struct i802_bss *bss = priv;
10888 	int ret, timeout;
10889 
10890 	timeout = params->conf.peer_link_timeout;
10891 
10892 	/* Disable kernel inactivity timer */
10893 	if (params->flags & WPA_DRIVER_MESH_FLAG_USER_MPM)
10894 		params->conf.peer_link_timeout = 0;
10895 
10896 	ret = nl80211_join_mesh(bss, params);
10897 	if (ret == -EINVAL && params->conf.peer_link_timeout == 0) {
10898 		wpa_printf(MSG_DEBUG,
10899 			   "nl80211: Mesh join retry for peer_link_timeout");
10900 		/*
10901 		 * Old kernel does not support setting
10902 		 * NL80211_MESHCONF_PLINK_TIMEOUT to zero, so set 60 seconds
10903 		 * into future from peer_link_timeout.
10904 		 */
10905 		params->conf.peer_link_timeout = timeout + 60;
10906 		ret = nl80211_join_mesh(priv, params);
10907 	}
10908 
10909 	params->conf.peer_link_timeout = timeout;
10910 	return ret;
10911 }
10912 
10913 
wpa_driver_nl80211_leave_mesh(void * priv)10914 static int wpa_driver_nl80211_leave_mesh(void *priv)
10915 {
10916 	struct i802_bss *bss = priv;
10917 	struct wpa_driver_nl80211_data *drv = bss->drv;
10918 	struct nl_msg *msg;
10919 	int ret;
10920 
10921 	wpa_printf(MSG_DEBUG, "nl80211: mesh leave (ifindex=%d)", drv->ifindex);
10922 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_LEAVE_MESH);
10923 	ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 0);
10924 	if (ret) {
10925 		wpa_printf(MSG_DEBUG, "nl80211: mesh leave failed: ret=%d (%s)",
10926 			   ret, strerror(-ret));
10927 	} else {
10928 		wpa_printf(MSG_DEBUG,
10929 			   "nl80211: mesh leave request send successfully");
10930 		drv->first_bss->freq = 0;
10931 	}
10932 
10933 	if (drv->start_mode_sta &&
10934 	    wpa_driver_nl80211_set_mode(drv->first_bss,
10935 					NL80211_IFTYPE_STATION)) {
10936 		wpa_printf(MSG_INFO,
10937 			   "nl80211: Failed to set interface into station mode");
10938 	}
10939 	return ret;
10940 }
10941 
10942 
nl80211_probe_mesh_link(void * priv,const u8 * addr,const u8 * eth,size_t len)10943 static int nl80211_probe_mesh_link(void *priv, const u8 *addr, const u8 *eth,
10944 				   size_t len)
10945 {
10946 	struct i802_bss *bss = priv;
10947 	struct wpa_driver_nl80211_data *drv = bss->drv;
10948 	struct nl_msg *msg;
10949 	int ret;
10950 
10951 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_PROBE_MESH_LINK);
10952 	if (!msg ||
10953 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
10954 	    nla_put(msg, NL80211_ATTR_FRAME, len, eth)) {
10955 		nlmsg_free(msg);
10956 		return -ENOBUFS;
10957 	}
10958 
10959 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10960 	if (ret) {
10961 		wpa_printf(MSG_DEBUG, "nl80211: mesh link probe to " MACSTR
10962 			   " failed: ret=%d (%s)",
10963 			   MAC2STR(addr), ret, strerror(-ret));
10964 	} else {
10965 		wpa_printf(MSG_DEBUG, "nl80211: Mesh link to " MACSTR
10966 			   " probed successfully", MAC2STR(addr));
10967 	}
10968 
10969 	return ret;
10970 }
10971 
10972 #endif /* CONFIG_MESH */
10973 
10974 
wpa_driver_br_add_ip_neigh(void * priv,u8 version,const u8 * ipaddr,int prefixlen,const u8 * addr)10975 static int wpa_driver_br_add_ip_neigh(void *priv, u8 version,
10976 				      const u8 *ipaddr, int prefixlen,
10977 				      const u8 *addr)
10978 {
10979 #ifdef CONFIG_LIBNL3_ROUTE
10980 	struct i802_bss *bss = priv;
10981 	struct wpa_driver_nl80211_data *drv = bss->drv;
10982 	struct rtnl_neigh *rn;
10983 	struct nl_addr *nl_ipaddr = NULL;
10984 	struct nl_addr *nl_lladdr = NULL;
10985 	int family, addrsize;
10986 	int res;
10987 
10988 	if (!ipaddr || prefixlen == 0 || !addr)
10989 		return -EINVAL;
10990 
10991 	if (bss->br_ifindex == 0) {
10992 		wpa_printf(MSG_DEBUG,
10993 			   "nl80211: bridge must be set before adding an ip neigh to it");
10994 		return -1;
10995 	}
10996 
10997 	if (!drv->rtnl_sk) {
10998 		wpa_printf(MSG_DEBUG,
10999 			   "nl80211: nl_sock for NETLINK_ROUTE is not initialized");
11000 		return -1;
11001 	}
11002 
11003 	if (version == 4) {
11004 		family = AF_INET;
11005 		addrsize = 4;
11006 	} else if (version == 6) {
11007 		family = AF_INET6;
11008 		addrsize = 16;
11009 	} else {
11010 		return -EINVAL;
11011 	}
11012 
11013 	rn = rtnl_neigh_alloc();
11014 	if (rn == NULL)
11015 		return -ENOMEM;
11016 
11017 	/* set the destination ip address for neigh */
11018 	nl_ipaddr = nl_addr_build(family, (void *) ipaddr, addrsize);
11019 	if (nl_ipaddr == NULL) {
11020 		wpa_printf(MSG_DEBUG, "nl80211: nl_ipaddr build failed");
11021 		res = -ENOMEM;
11022 		goto errout;
11023 	}
11024 	nl_addr_set_prefixlen(nl_ipaddr, prefixlen);
11025 	res = rtnl_neigh_set_dst(rn, nl_ipaddr);
11026 	if (res) {
11027 		wpa_printf(MSG_DEBUG,
11028 			   "nl80211: neigh set destination addr failed");
11029 		goto errout;
11030 	}
11031 
11032 	/* set the corresponding lladdr for neigh */
11033 	nl_lladdr = nl_addr_build(AF_BRIDGE, (u8 *) addr, ETH_ALEN);
11034 	if (nl_lladdr == NULL) {
11035 		wpa_printf(MSG_DEBUG, "nl80211: neigh set lladdr failed");
11036 		res = -ENOMEM;
11037 		goto errout;
11038 	}
11039 	rtnl_neigh_set_lladdr(rn, nl_lladdr);
11040 
11041 	rtnl_neigh_set_ifindex(rn, bss->br_ifindex);
11042 	rtnl_neigh_set_state(rn, NUD_PERMANENT);
11043 
11044 	res = rtnl_neigh_add(drv->rtnl_sk, rn, NLM_F_CREATE);
11045 	if (res) {
11046 		wpa_printf(MSG_DEBUG,
11047 			   "nl80211: Adding bridge ip neigh failed: %s",
11048 			   nl_geterror(res));
11049 	}
11050 errout:
11051 	if (nl_lladdr)
11052 		nl_addr_put(nl_lladdr);
11053 	if (nl_ipaddr)
11054 		nl_addr_put(nl_ipaddr);
11055 	if (rn)
11056 		rtnl_neigh_put(rn);
11057 	return res;
11058 #else /* CONFIG_LIBNL3_ROUTE */
11059 	return -1;
11060 #endif /* CONFIG_LIBNL3_ROUTE */
11061 }
11062 
11063 
wpa_driver_br_delete_ip_neigh(void * priv,u8 version,const u8 * ipaddr)11064 static int wpa_driver_br_delete_ip_neigh(void *priv, u8 version,
11065 					 const u8 *ipaddr)
11066 {
11067 #ifdef CONFIG_LIBNL3_ROUTE
11068 	struct i802_bss *bss = priv;
11069 	struct wpa_driver_nl80211_data *drv = bss->drv;
11070 	struct rtnl_neigh *rn;
11071 	struct nl_addr *nl_ipaddr;
11072 	int family, addrsize;
11073 	int res;
11074 
11075 	if (!ipaddr)
11076 		return -EINVAL;
11077 
11078 	if (version == 4) {
11079 		family = AF_INET;
11080 		addrsize = 4;
11081 	} else if (version == 6) {
11082 		family = AF_INET6;
11083 		addrsize = 16;
11084 	} else {
11085 		return -EINVAL;
11086 	}
11087 
11088 	if (bss->br_ifindex == 0) {
11089 		wpa_printf(MSG_DEBUG,
11090 			   "nl80211: bridge must be set to delete an ip neigh");
11091 		return -1;
11092 	}
11093 
11094 	if (!drv->rtnl_sk) {
11095 		wpa_printf(MSG_DEBUG,
11096 			   "nl80211: nl_sock for NETLINK_ROUTE is not initialized");
11097 		return -1;
11098 	}
11099 
11100 	rn = rtnl_neigh_alloc();
11101 	if (rn == NULL)
11102 		return -ENOMEM;
11103 
11104 	/* set the destination ip address for neigh */
11105 	nl_ipaddr = nl_addr_build(family, (void *) ipaddr, addrsize);
11106 	if (nl_ipaddr == NULL) {
11107 		wpa_printf(MSG_DEBUG, "nl80211: nl_ipaddr build failed");
11108 		res = -ENOMEM;
11109 		goto errout;
11110 	}
11111 	res = rtnl_neigh_set_dst(rn, nl_ipaddr);
11112 	if (res) {
11113 		wpa_printf(MSG_DEBUG,
11114 			   "nl80211: neigh set destination addr failed");
11115 		goto errout;
11116 	}
11117 
11118 	rtnl_neigh_set_ifindex(rn, bss->br_ifindex);
11119 
11120 	res = rtnl_neigh_delete(drv->rtnl_sk, rn, 0);
11121 	if (res) {
11122 		wpa_printf(MSG_DEBUG,
11123 			   "nl80211: Deleting bridge ip neigh failed: %s",
11124 			   nl_geterror(res));
11125 	}
11126 errout:
11127 	if (nl_ipaddr)
11128 		nl_addr_put(nl_ipaddr);
11129 	if (rn)
11130 		rtnl_neigh_put(rn);
11131 	return res;
11132 #else /* CONFIG_LIBNL3_ROUTE */
11133 	return -1;
11134 #endif /* CONFIG_LIBNL3_ROUTE */
11135 }
11136 
11137 
linux_write_system_file(const char * path,unsigned int val)11138 static int linux_write_system_file(const char *path, unsigned int val)
11139 {
11140 	char buf[50];
11141 	int fd, len;
11142 
11143 	len = os_snprintf(buf, sizeof(buf), "%u\n", val);
11144 	if (os_snprintf_error(sizeof(buf), len))
11145 		return -1;
11146 
11147 	fd = open(path, O_WRONLY);
11148 	if (fd < 0)
11149 		return -1;
11150 
11151 	if (write(fd, buf, len) < 0) {
11152 		wpa_printf(MSG_DEBUG,
11153 			   "nl80211: Failed to write Linux system file: %s with the value of %d",
11154 			   path, val);
11155 		close(fd);
11156 		return -1;
11157 	}
11158 	close(fd);
11159 
11160 	return 0;
11161 }
11162 
11163 
drv_br_port_attr_str(enum drv_br_port_attr attr)11164 static const char * drv_br_port_attr_str(enum drv_br_port_attr attr)
11165 {
11166 	switch (attr) {
11167 	case DRV_BR_PORT_ATTR_PROXYARP:
11168 		return "proxyarp_wifi";
11169 	case DRV_BR_PORT_ATTR_HAIRPIN_MODE:
11170 		return "hairpin_mode";
11171 	}
11172 
11173 	return NULL;
11174 }
11175 
11176 
wpa_driver_br_port_set_attr(void * priv,enum drv_br_port_attr attr,unsigned int val)11177 static int wpa_driver_br_port_set_attr(void *priv, enum drv_br_port_attr attr,
11178 				       unsigned int val)
11179 {
11180 	struct i802_bss *bss = priv;
11181 	char path[128];
11182 	const char *attr_txt;
11183 
11184 	attr_txt = drv_br_port_attr_str(attr);
11185 	if (attr_txt == NULL)
11186 		return -EINVAL;
11187 
11188 	os_snprintf(path, sizeof(path), "/sys/class/net/%s/brport/%s",
11189 		    bss->ifname, attr_txt);
11190 
11191 	if (linux_write_system_file(path, val))
11192 		return -1;
11193 
11194 	return 0;
11195 }
11196 
11197 
drv_br_net_param_str(enum drv_br_net_param param)11198 static const char * drv_br_net_param_str(enum drv_br_net_param param)
11199 {
11200 	switch (param) {
11201 	case DRV_BR_NET_PARAM_GARP_ACCEPT:
11202 		return "arp_accept";
11203 	default:
11204 		return NULL;
11205 	}
11206 }
11207 
11208 
wpa_driver_br_set_net_param(void * priv,enum drv_br_net_param param,unsigned int val)11209 static int wpa_driver_br_set_net_param(void *priv, enum drv_br_net_param param,
11210 				       unsigned int val)
11211 {
11212 	struct i802_bss *bss = priv;
11213 	char path[128];
11214 	const char *param_txt;
11215 	int ip_version = 4;
11216 
11217 	if (param == DRV_BR_MULTICAST_SNOOPING) {
11218 		os_snprintf(path, sizeof(path),
11219 			    "/sys/devices/virtual/net/%s/bridge/multicast_snooping",
11220 			    bss->brname);
11221 		goto set_val;
11222 	}
11223 
11224 	param_txt = drv_br_net_param_str(param);
11225 	if (param_txt == NULL)
11226 		return -EINVAL;
11227 
11228 	switch (param) {
11229 		case DRV_BR_NET_PARAM_GARP_ACCEPT:
11230 			ip_version = 4;
11231 			break;
11232 		default:
11233 			return -EINVAL;
11234 	}
11235 
11236 	os_snprintf(path, sizeof(path), "/proc/sys/net/ipv%d/conf/%s/%s",
11237 		    ip_version, bss->brname, param_txt);
11238 
11239 set_val:
11240 	if (linux_write_system_file(path, val))
11241 		return -1;
11242 
11243 	return 0;
11244 }
11245 
11246 
11247 #ifdef CONFIG_DRIVER_NL80211_QCA
11248 
hw_mode_to_qca_acs(enum hostapd_hw_mode hw_mode)11249 static int hw_mode_to_qca_acs(enum hostapd_hw_mode hw_mode)
11250 {
11251 	switch (hw_mode) {
11252 	case HOSTAPD_MODE_IEEE80211B:
11253 		return QCA_ACS_MODE_IEEE80211B;
11254 	case HOSTAPD_MODE_IEEE80211G:
11255 		return QCA_ACS_MODE_IEEE80211G;
11256 	case HOSTAPD_MODE_IEEE80211A:
11257 		return QCA_ACS_MODE_IEEE80211A;
11258 	case HOSTAPD_MODE_IEEE80211AD:
11259 		return QCA_ACS_MODE_IEEE80211AD;
11260 	case HOSTAPD_MODE_IEEE80211ANY:
11261 		return QCA_ACS_MODE_IEEE80211ANY;
11262 	default:
11263 		return -1;
11264 	}
11265 }
11266 
11267 
add_acs_ch_list(struct nl_msg * msg,const int * freq_list)11268 static int add_acs_ch_list(struct nl_msg *msg, const int *freq_list)
11269 {
11270 	int num_channels = 0, num_freqs;
11271 	u8 *ch_list;
11272 	enum hostapd_hw_mode hw_mode;
11273 	int ret = 0;
11274 	int i;
11275 
11276 	if (!freq_list)
11277 		return 0;
11278 
11279 	num_freqs = int_array_len(freq_list);
11280 	ch_list = os_malloc(sizeof(u8) * num_freqs);
11281 	if (!ch_list)
11282 		return -1;
11283 
11284 	for (i = 0; i < num_freqs; i++) {
11285 		const int freq = freq_list[i];
11286 
11287 		if (freq == 0)
11288 			break;
11289 		/* Send 2.4 GHz and 5 GHz channels with
11290 		 * QCA_WLAN_VENDOR_ATTR_ACS_CH_LIST to maintain backwards
11291 		 * compatibility.
11292 		 */
11293 		if (!(freq >= 2412 && freq <= 2484) &&
11294 		    !(freq >= 5180 && freq <= 5900) &&
11295 		    !(freq >= 5945 && freq <= 7115))
11296 			continue;
11297 		hw_mode = ieee80211_freq_to_chan(freq, &ch_list[num_channels]);
11298 		if (hw_mode != NUM_HOSTAPD_MODES)
11299 			num_channels++;
11300 	}
11301 
11302 	if (num_channels)
11303 		ret = nla_put(msg, QCA_WLAN_VENDOR_ATTR_ACS_CH_LIST,
11304 			      num_channels, ch_list);
11305 
11306 	os_free(ch_list);
11307 	return ret;
11308 }
11309 
11310 
add_acs_freq_list(struct nl_msg * msg,const int * freq_list)11311 static int add_acs_freq_list(struct nl_msg *msg, const int *freq_list)
11312 {
11313 	int i, len, ret;
11314 	u32 *freqs;
11315 
11316 	if (!freq_list)
11317 		return 0;
11318 	len = int_array_len(freq_list);
11319 	freqs = os_malloc(sizeof(u32) * len);
11320 	if (!freqs)
11321 		return -1;
11322 	for (i = 0; i < len; i++)
11323 		freqs[i] = freq_list[i];
11324 	ret = nla_put(msg, QCA_WLAN_VENDOR_ATTR_ACS_FREQ_LIST,
11325 		      sizeof(u32) * len, freqs);
11326 	os_free(freqs);
11327 	return ret;
11328 }
11329 
11330 
nl80211_qca_do_acs(struct wpa_driver_nl80211_data * drv,struct drv_acs_params * params)11331 static int nl80211_qca_do_acs(struct wpa_driver_nl80211_data *drv,
11332 			      struct drv_acs_params *params)
11333 {
11334 	struct nl_msg *msg;
11335 	struct nlattr *data;
11336 	int ret;
11337 	int mode;
11338 
11339 	mode = hw_mode_to_qca_acs(params->hw_mode);
11340 	if (mode < 0)
11341 		return -1;
11342 
11343 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11344 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11345 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11346 			QCA_NL80211_VENDOR_SUBCMD_DO_ACS) ||
11347 	    !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11348 	    nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_ACS_HW_MODE, mode) ||
11349 	    (params->ht_enabled &&
11350 	     nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_HT_ENABLED)) ||
11351 	    (params->ht40_enabled &&
11352 	     nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_HT40_ENABLED)) ||
11353 	    (params->vht_enabled &&
11354 	     nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_VHT_ENABLED)) ||
11355 	    (params->eht_enabled &&
11356 	     nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_EHT_ENABLED)) ||
11357 	    nla_put_u16(msg, QCA_WLAN_VENDOR_ATTR_ACS_CHWIDTH,
11358 			params->ch_width) ||
11359 	    add_acs_ch_list(msg, params->freq_list) ||
11360 	    add_acs_freq_list(msg, params->freq_list) ||
11361 	    (params->edmg_enabled &&
11362 	     nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_EDMG_ENABLED))) {
11363 		nlmsg_free(msg);
11364 		return -ENOBUFS;
11365 	}
11366 	nla_nest_end(msg, data);
11367 
11368 	wpa_printf(MSG_DEBUG,
11369 		   "nl80211: ACS Params: HW_MODE: %d HT: %d HT40: %d VHT: %d EHT: %d BW: %d EDMG: %d",
11370 		   params->hw_mode, params->ht_enabled, params->ht40_enabled,
11371 		   params->vht_enabled, params->eht_enabled, params->ch_width,
11372 		   params->edmg_enabled);
11373 
11374 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11375 	if (ret) {
11376 		wpa_printf(MSG_DEBUG,
11377 			   "nl80211: Failed to invoke driver ACS function: %s",
11378 			   strerror(-ret));
11379 	}
11380 	return ret;
11381 }
11382 
11383 
nl80211_set_band(void * priv,u32 band_mask)11384 static int nl80211_set_band(void *priv, u32 band_mask)
11385 {
11386 	struct i802_bss *bss = priv;
11387 	struct wpa_driver_nl80211_data *drv = bss->drv;
11388 	struct nl_msg *msg;
11389 	struct nlattr *data;
11390 	int ret;
11391 	enum qca_set_band qca_band_value;
11392 	u32 qca_band_mask = QCA_SETBAND_AUTO;
11393 
11394 	if (!drv->setband_vendor_cmd_avail ||
11395 	    (band_mask > (WPA_SETBAND_2G | WPA_SETBAND_5G | WPA_SETBAND_6G)))
11396 		return -1;
11397 
11398 	if (band_mask & WPA_SETBAND_5G)
11399 		qca_band_mask |= QCA_SETBAND_5G;
11400 	if (band_mask & WPA_SETBAND_2G)
11401 		qca_band_mask |= QCA_SETBAND_2G;
11402 	if (band_mask & WPA_SETBAND_6G)
11403 		qca_band_mask |= QCA_SETBAND_6G;
11404 
11405 	/*
11406 	 * QCA_WLAN_VENDOR_ATTR_SETBAND_VALUE is a legacy interface hence make
11407 	 * it suite to its values (AUTO/5G/2G) for backwards compatibility.
11408 	 */
11409 	qca_band_value = ((qca_band_mask & QCA_SETBAND_5G) &&
11410 			  (qca_band_mask & QCA_SETBAND_2G)) ?
11411 				QCA_SETBAND_AUTO :
11412 				qca_band_mask & ~QCA_SETBAND_6G;
11413 
11414 	wpa_printf(MSG_DEBUG,
11415 		   "nl80211: QCA_BAND_MASK = 0x%x, QCA_BAND_VALUE = %d",
11416 		   qca_band_mask, qca_band_value);
11417 
11418 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11419 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11420 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11421 			QCA_NL80211_VENDOR_SUBCMD_SETBAND) ||
11422 	    !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11423 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_SETBAND_VALUE,
11424 			qca_band_value) ||
11425 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_SETBAND_MASK,
11426 			qca_band_mask)) {
11427 		nlmsg_free(msg);
11428 		return -ENOBUFS;
11429 	}
11430 	nla_nest_end(msg, data);
11431 
11432 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11433 	if (ret) {
11434 		wpa_printf(MSG_DEBUG,
11435 			   "nl80211: Driver setband function failed: %s",
11436 			   strerror(-ret));
11437 	}
11438 	return ret;
11439 }
11440 
11441 
11442 struct nl80211_pcl {
11443 	unsigned int num;
11444 	unsigned int *freq_list;
11445 };
11446 
preferred_freq_info_handler(struct nl_msg * msg,void * arg)11447 static int preferred_freq_info_handler(struct nl_msg *msg, void *arg)
11448 {
11449 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
11450 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
11451 	struct nl80211_pcl *param = arg;
11452 	struct nlattr *nl_vend, *attr;
11453 	enum qca_iface_type iface_type;
11454 	struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_MAX + 1];
11455 	unsigned int num, max_num;
11456 	u32 *freqs;
11457 
11458 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
11459 		  genlmsg_attrlen(gnlh, 0), NULL);
11460 
11461 	nl_vend = tb[NL80211_ATTR_VENDOR_DATA];
11462 	if (!nl_vend)
11463 		return NL_SKIP;
11464 
11465 	nla_parse(tb_vendor, QCA_WLAN_VENDOR_ATTR_MAX,
11466 		  nla_data(nl_vend), nla_len(nl_vend), NULL);
11467 
11468 	attr = tb_vendor[
11469 		QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST_IFACE_TYPE];
11470 	if (!attr) {
11471 		wpa_printf(MSG_ERROR, "nl80211: iface_type couldn't be found");
11472 		param->num = 0;
11473 		return NL_SKIP;
11474 	}
11475 
11476 	iface_type = (enum qca_iface_type) nla_get_u32(attr);
11477 	wpa_printf(MSG_DEBUG, "nl80211: Driver returned iface_type=%d",
11478 		   iface_type);
11479 
11480 	attr = tb_vendor[QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST];
11481 	if (!attr) {
11482 		wpa_printf(MSG_ERROR,
11483 			   "nl80211: preferred_freq_list couldn't be found");
11484 		param->num = 0;
11485 		return NL_SKIP;
11486 	}
11487 
11488 	/*
11489 	 * param->num has the maximum number of entries for which there
11490 	 * is room in the freq_list provided by the caller.
11491 	 */
11492 	freqs = nla_data(attr);
11493 	max_num = nla_len(attr) / sizeof(u32);
11494 	if (max_num > param->num)
11495 		max_num = param->num;
11496 	for (num = 0; num < max_num; num++)
11497 		param->freq_list[num] = freqs[num];
11498 	param->num = num;
11499 
11500 	return NL_SKIP;
11501 }
11502 
11503 
nl80211_get_pref_freq_list(void * priv,enum wpa_driver_if_type if_type,unsigned int * num,unsigned int * freq_list)11504 static int nl80211_get_pref_freq_list(void *priv,
11505 				      enum wpa_driver_if_type if_type,
11506 				      unsigned int *num,
11507 				      unsigned int *freq_list)
11508 {
11509 	struct i802_bss *bss = priv;
11510 	struct wpa_driver_nl80211_data *drv = bss->drv;
11511 	struct nl_msg *msg;
11512 	int ret;
11513 	unsigned int i;
11514 	struct nlattr *params;
11515 	struct nl80211_pcl param;
11516 	enum qca_iface_type iface_type;
11517 
11518 	if (!drv->get_pref_freq_list)
11519 		return -1;
11520 
11521 	switch (if_type) {
11522 	case WPA_IF_STATION:
11523 		iface_type = QCA_IFACE_TYPE_STA;
11524 		break;
11525 	case WPA_IF_AP_BSS:
11526 		iface_type = QCA_IFACE_TYPE_AP;
11527 		break;
11528 	case WPA_IF_P2P_GO:
11529 		iface_type = QCA_IFACE_TYPE_P2P_GO;
11530 		break;
11531 	case WPA_IF_P2P_CLIENT:
11532 		iface_type = QCA_IFACE_TYPE_P2P_CLIENT;
11533 		break;
11534 	case WPA_IF_IBSS:
11535 		iface_type = QCA_IFACE_TYPE_IBSS;
11536 		break;
11537 	case WPA_IF_TDLS:
11538 		iface_type = QCA_IFACE_TYPE_TDLS;
11539 		break;
11540 	default:
11541 		return -1;
11542 	}
11543 
11544 	param.num = *num;
11545 	param.freq_list = freq_list;
11546 
11547 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11548 	    nla_put_u32(msg, NL80211_ATTR_IFINDEX, drv->ifindex) ||
11549 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11550 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11551 			QCA_NL80211_VENDOR_SUBCMD_GET_PREFERRED_FREQ_LIST) ||
11552 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11553 	    nla_put_u32(msg,
11554 			QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST_IFACE_TYPE,
11555 			iface_type)) {
11556 		wpa_printf(MSG_ERROR,
11557 			   "%s: err in adding vendor_cmd and vendor_data",
11558 			   __func__);
11559 		nlmsg_free(msg);
11560 		return -1;
11561 	}
11562 	nla_nest_end(msg, params);
11563 
11564 	os_memset(freq_list, 0, *num * sizeof(freq_list[0]));
11565 	ret = send_and_recv_msgs(drv, msg, preferred_freq_info_handler, &param,
11566 				 NULL, NULL);
11567 	if (ret) {
11568 		wpa_printf(MSG_ERROR,
11569 			   "%s: err in send_and_recv_msgs", __func__);
11570 		return ret;
11571 	}
11572 
11573 	*num = param.num;
11574 
11575 	for (i = 0; i < *num; i++) {
11576 		wpa_printf(MSG_DEBUG, "nl80211: preferred_channel_list[%d]=%d",
11577 			   i, freq_list[i]);
11578 	}
11579 
11580 	return 0;
11581 }
11582 
11583 
nl80211_set_prob_oper_freq(void * priv,unsigned int freq)11584 static int nl80211_set_prob_oper_freq(void *priv, unsigned int freq)
11585 {
11586 	struct i802_bss *bss = priv;
11587 	struct wpa_driver_nl80211_data *drv = bss->drv;
11588 	struct nl_msg *msg;
11589 	int ret;
11590 	struct nlattr *params;
11591 
11592 	if (!drv->set_prob_oper_freq)
11593 		return -1;
11594 
11595 	wpa_printf(MSG_DEBUG,
11596 		   "nl80211: Set P2P probable operating freq %u for ifindex %d",
11597 		   freq, bss->ifindex);
11598 
11599 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11600 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11601 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11602 			QCA_NL80211_VENDOR_SUBCMD_SET_PROBABLE_OPER_CHANNEL) ||
11603 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11604 	    nla_put_u32(msg,
11605 			QCA_WLAN_VENDOR_ATTR_PROBABLE_OPER_CHANNEL_IFACE_TYPE,
11606 			QCA_IFACE_TYPE_P2P_CLIENT) ||
11607 	    nla_put_u32(msg,
11608 			QCA_WLAN_VENDOR_ATTR_PROBABLE_OPER_CHANNEL_FREQ,
11609 			freq)) {
11610 		wpa_printf(MSG_ERROR,
11611 			   "%s: err in adding vendor_cmd and vendor_data",
11612 			   __func__);
11613 		nlmsg_free(msg);
11614 		return -1;
11615 	}
11616 	nla_nest_end(msg, params);
11617 
11618 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11619 	msg = NULL;
11620 	if (ret) {
11621 		wpa_printf(MSG_ERROR, "%s: err in send_and_recv_msgs",
11622 			   __func__);
11623 		return ret;
11624 	}
11625 	nlmsg_free(msg);
11626 	return 0;
11627 }
11628 
11629 
nl80211_p2p_lo_start(void * priv,unsigned int freq,unsigned int period,unsigned int interval,unsigned int count,const u8 * device_types,size_t dev_types_len,const u8 * ies,size_t ies_len)11630 static int nl80211_p2p_lo_start(void *priv, unsigned int freq,
11631 				unsigned int period, unsigned int interval,
11632 				unsigned int count, const u8 *device_types,
11633 				size_t dev_types_len,
11634 				const u8 *ies, size_t ies_len)
11635 {
11636 	struct i802_bss *bss = priv;
11637 	struct wpa_driver_nl80211_data *drv = bss->drv;
11638 	struct nl_msg *msg;
11639 	struct nlattr *container;
11640 	int ret;
11641 
11642 	wpa_printf(MSG_DEBUG,
11643 		   "nl80211: Start P2P Listen offload: freq=%u, period=%u, interval=%u, count=%u",
11644 		   freq, period, interval, count);
11645 
11646 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_P2P_LISTEN_OFFLOAD))
11647 		return -1;
11648 
11649 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11650 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11651 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11652 			QCA_NL80211_VENDOR_SUBCMD_P2P_LISTEN_OFFLOAD_START))
11653 		goto fail;
11654 
11655 	container = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
11656 	if (!container)
11657 		goto fail;
11658 
11659 	if (nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_CHANNEL,
11660 			freq) ||
11661 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_PERIOD,
11662 			period) ||
11663 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_INTERVAL,
11664 			interval) ||
11665 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_COUNT,
11666 			count) ||
11667 	    nla_put(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_DEVICE_TYPES,
11668 		    dev_types_len, device_types) ||
11669 	    nla_put(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_VENDOR_IE,
11670 		    ies_len, ies))
11671 		goto fail;
11672 
11673 	nla_nest_end(msg, container);
11674 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11675 	msg = NULL;
11676 	if (ret) {
11677 		wpa_printf(MSG_DEBUG,
11678 			   "nl80211: Failed to send P2P Listen offload vendor command");
11679 		goto fail;
11680 	}
11681 
11682 	return 0;
11683 
11684 fail:
11685 	nlmsg_free(msg);
11686 	return -1;
11687 }
11688 
11689 
nl80211_p2p_lo_stop(void * priv)11690 static int nl80211_p2p_lo_stop(void *priv)
11691 {
11692 	struct i802_bss *bss = priv;
11693 	struct wpa_driver_nl80211_data *drv = bss->drv;
11694 	struct nl_msg *msg;
11695 
11696 	wpa_printf(MSG_DEBUG, "nl80211: Stop P2P Listen offload");
11697 
11698 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_P2P_LISTEN_OFFLOAD))
11699 		return -1;
11700 
11701 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11702 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11703 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11704 			QCA_NL80211_VENDOR_SUBCMD_P2P_LISTEN_OFFLOAD_STOP)) {
11705 		nlmsg_free(msg);
11706 		return -1;
11707 	}
11708 
11709 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11710 }
11711 
11712 
nl80211_set_tdls_mode(void * priv,int tdls_external_control)11713 static int nl80211_set_tdls_mode(void *priv, int tdls_external_control)
11714 {
11715 	struct i802_bss *bss = priv;
11716 	struct wpa_driver_nl80211_data *drv = bss->drv;
11717 	struct nl_msg *msg;
11718 	struct nlattr *params;
11719 	int ret;
11720 	u32 tdls_mode;
11721 
11722 	wpa_printf(MSG_DEBUG,
11723 		   "nl80211: Set TDKS mode: tdls_external_control=%d",
11724 		   tdls_external_control);
11725 
11726 	if (tdls_external_control == 1)
11727 		tdls_mode = QCA_WLAN_VENDOR_TDLS_TRIGGER_MODE_IMPLICIT |
11728 			QCA_WLAN_VENDOR_TDLS_TRIGGER_MODE_EXTERNAL;
11729 	else
11730 		tdls_mode = QCA_WLAN_VENDOR_TDLS_TRIGGER_MODE_EXPLICIT;
11731 
11732 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11733 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11734 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11735 			QCA_NL80211_VENDOR_SUBCMD_CONFIGURE_TDLS))
11736 		goto fail;
11737 
11738 	params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
11739 	if (!params)
11740 		goto fail;
11741 
11742 	if (nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_TDLS_CONFIG_TRIGGER_MODE,
11743 			tdls_mode))
11744 		goto fail;
11745 
11746 	nla_nest_end(msg, params);
11747 
11748 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11749 	msg = NULL;
11750 	if (ret) {
11751 		wpa_printf(MSG_ERROR,
11752 			   "nl80211: Set TDLS mode failed: ret=%d (%s)",
11753 			   ret, strerror(-ret));
11754 		goto fail;
11755 	}
11756 	return 0;
11757 fail:
11758 	nlmsg_free(msg);
11759 	return -1;
11760 }
11761 
11762 
11763 #ifdef CONFIG_MBO
11764 
11765 static enum mbo_transition_reject_reason
nl80211_mbo_reject_reason_mapping(enum qca_wlan_btm_candidate_status status)11766 nl80211_mbo_reject_reason_mapping(enum qca_wlan_btm_candidate_status status)
11767 {
11768 	switch (status) {
11769 	case QCA_STATUS_REJECT_EXCESSIVE_FRAME_LOSS_EXPECTED:
11770 		return MBO_TRANSITION_REJECT_REASON_FRAME_LOSS;
11771 	case QCA_STATUS_REJECT_EXCESSIVE_DELAY_EXPECTED:
11772 		return MBO_TRANSITION_REJECT_REASON_DELAY;
11773 	case QCA_STATUS_REJECT_INSUFFICIENT_QOS_CAPACITY:
11774 		return MBO_TRANSITION_REJECT_REASON_QOS_CAPACITY;
11775 	case QCA_STATUS_REJECT_LOW_RSSI:
11776 		return MBO_TRANSITION_REJECT_REASON_RSSI;
11777 	case QCA_STATUS_REJECT_HIGH_INTERFERENCE:
11778 		return MBO_TRANSITION_REJECT_REASON_INTERFERENCE;
11779 	case QCA_STATUS_REJECT_UNKNOWN:
11780 	default:
11781 		return MBO_TRANSITION_REJECT_REASON_UNSPECIFIED;
11782 	}
11783 }
11784 
11785 
nl80211_parse_btm_candidate_info(struct candidate_list * candidate,struct nlattr * tb[],int num)11786 static void nl80211_parse_btm_candidate_info(struct candidate_list *candidate,
11787 					     struct nlattr *tb[], int num)
11788 {
11789 	enum qca_wlan_btm_candidate_status status;
11790 	char buf[50];
11791 
11792 	os_memcpy(candidate->bssid,
11793 		  nla_data(tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID]),
11794 		  ETH_ALEN);
11795 
11796 	status = nla_get_u32(
11797 		tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_STATUS]);
11798 	candidate->is_accept = status == QCA_STATUS_ACCEPT;
11799 	candidate->reject_reason = nl80211_mbo_reject_reason_mapping(status);
11800 
11801 	if (candidate->is_accept)
11802 		os_snprintf(buf, sizeof(buf), "Accepted");
11803 	else
11804 		os_snprintf(buf, sizeof(buf),
11805 			    "Rejected, Reject_reason: %d",
11806 			    candidate->reject_reason);
11807 	wpa_printf(MSG_DEBUG, "nl80211:   BSSID[%d]: " MACSTR " %s",
11808 		   num, MAC2STR(candidate->bssid), buf);
11809 }
11810 
11811 
11812 static int
nl80211_get_bss_transition_status_handler(struct nl_msg * msg,void * arg)11813 nl80211_get_bss_transition_status_handler(struct nl_msg *msg, void *arg)
11814 {
11815 	struct wpa_bss_candidate_info *info = arg;
11816 	struct candidate_list *candidate = info->candidates;
11817 	struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
11818 	struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_MAX + 1];
11819 	struct nlattr *tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_MAX + 1];
11820 	static struct nla_policy policy[
11821 		QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_MAX + 1] = {
11822 		[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID] = {
11823 			.minlen = ETH_ALEN
11824 		},
11825 		[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_STATUS] = {
11826 			.type = NLA_U32,
11827 		},
11828 	};
11829 	struct nlattr *attr;
11830 	int rem;
11831 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
11832 	u8 num;
11833 
11834 	num = info->num; /* number of candidates sent to driver */
11835 	info->num = 0;
11836 	nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
11837 		  genlmsg_attrlen(gnlh, 0), NULL);
11838 
11839 	if (!tb_msg[NL80211_ATTR_VENDOR_DATA] ||
11840 	    nla_parse_nested(tb_vendor, QCA_WLAN_VENDOR_ATTR_MAX,
11841 			     tb_msg[NL80211_ATTR_VENDOR_DATA], NULL) ||
11842 	    !tb_vendor[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO])
11843 		return NL_SKIP;
11844 
11845 	wpa_printf(MSG_DEBUG,
11846 		   "nl80211: WNM Candidate list received from driver");
11847 	nla_for_each_nested(attr,
11848 			    tb_vendor[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO],
11849 			    rem) {
11850 		if (info->num >= num ||
11851 		    nla_parse_nested(
11852 			    tb, QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_MAX,
11853 			    attr, policy) ||
11854 		    !tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID] ||
11855 		    !tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_STATUS])
11856 			break;
11857 
11858 		nl80211_parse_btm_candidate_info(candidate, tb, info->num);
11859 
11860 		candidate++;
11861 		info->num++;
11862 	}
11863 
11864 	return NL_SKIP;
11865 }
11866 
11867 
11868 static struct wpa_bss_candidate_info *
nl80211_get_bss_transition_status(void * priv,struct wpa_bss_trans_info * params)11869 nl80211_get_bss_transition_status(void *priv, struct wpa_bss_trans_info *params)
11870 {
11871 	struct i802_bss *bss = priv;
11872 	struct wpa_driver_nl80211_data *drv = bss->drv;
11873 	struct nl_msg *msg;
11874 	struct nlattr *attr, *attr1, *attr2;
11875 	struct wpa_bss_candidate_info *info;
11876 	u8 i;
11877 	int ret;
11878 	u8 *pos;
11879 
11880 	if (!drv->fetch_bss_trans_status)
11881 		return NULL;
11882 
11883 	info = os_zalloc(sizeof(*info));
11884 	if (!info)
11885 		return NULL;
11886 	/* Allocate memory for number of candidates sent to driver */
11887 	info->candidates = os_calloc(params->n_candidates,
11888 				     sizeof(*info->candidates));
11889 	if (!info->candidates) {
11890 		os_free(info);
11891 		return NULL;
11892 	}
11893 
11894 	/* Copy the number of candidates being sent to driver. This is used in
11895 	 * nl80211_get_bss_transition_status_handler() to limit the number of
11896 	 * candidates that can be populated in info->candidates and will be
11897 	 * later overwritten with the actual number of candidates received from
11898 	 * the driver.
11899 	 */
11900 	info->num = params->n_candidates;
11901 
11902 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11903 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11904 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11905 			QCA_NL80211_VENDOR_SUBCMD_FETCH_BSS_TRANSITION_STATUS))
11906 		goto fail;
11907 
11908 	attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
11909 	if (!attr)
11910 		goto fail;
11911 
11912 	if (nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_BTM_MBO_TRANSITION_REASON,
11913 		       params->mbo_transition_reason))
11914 		goto fail;
11915 
11916 	attr1 = nla_nest_start(msg, QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO);
11917 	if (!attr1)
11918 		goto fail;
11919 
11920 	wpa_printf(MSG_DEBUG,
11921 		   "nl80211: WNM Candidate list info sending to driver: mbo_transition_reason: %d n_candidates: %d",
11922 		   params->mbo_transition_reason, params->n_candidates);
11923 	pos = params->bssid;
11924 	for (i = 0; i < params->n_candidates; i++) {
11925 		wpa_printf(MSG_DEBUG, "nl80211:   BSSID[%d]: " MACSTR, i,
11926 			   MAC2STR(pos));
11927 		attr2 = nla_nest_start(msg, i);
11928 		if (!attr2 ||
11929 		    nla_put(msg, QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID,
11930 			    ETH_ALEN, pos))
11931 			goto fail;
11932 		pos += ETH_ALEN;
11933 		nla_nest_end(msg, attr2);
11934 	}
11935 
11936 	nla_nest_end(msg, attr1);
11937 	nla_nest_end(msg, attr);
11938 
11939 	ret = send_and_recv_msgs(drv, msg,
11940 				 nl80211_get_bss_transition_status_handler,
11941 				 info, NULL, NULL);
11942 	msg = NULL;
11943 	if (ret) {
11944 		wpa_printf(MSG_ERROR,
11945 			   "nl80211: WNM Get BSS transition status failed: ret=%d (%s)",
11946 			   ret, strerror(-ret));
11947 		goto fail;
11948 	}
11949 	return info;
11950 
11951 fail:
11952 	nlmsg_free(msg);
11953 	os_free(info->candidates);
11954 	os_free(info);
11955 	return NULL;
11956 }
11957 
11958 
11959 /**
11960  * nl80211_ignore_assoc_disallow - Configure driver to ignore assoc_disallow
11961  * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
11962  * @ignore_assoc_disallow: 0 to not ignore, 1 to ignore
11963  * Returns: 0 on success, -1 on failure
11964  */
nl80211_ignore_assoc_disallow(void * priv,int ignore_disallow)11965 static int nl80211_ignore_assoc_disallow(void *priv, int ignore_disallow)
11966 {
11967 	struct i802_bss *bss = priv;
11968 	struct wpa_driver_nl80211_data *drv = bss->drv;
11969 	struct nl_msg *msg;
11970 	struct nlattr *attr;
11971 	int ret = -1;
11972 
11973 	if (!drv->set_wifi_conf_vendor_cmd_avail)
11974 		return -1;
11975 
11976 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11977 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11978 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11979 			QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION))
11980 		goto fail;
11981 
11982 	attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
11983 	if (!attr)
11984 		goto fail;
11985 
11986 	wpa_printf(MSG_DEBUG, "nl80211: Set ignore_assoc_disallow %d",
11987 		   ignore_disallow);
11988 	if (nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_CONFIG_IGNORE_ASSOC_DISALLOWED,
11989 		       ignore_disallow))
11990 		goto fail;
11991 
11992 	nla_nest_end(msg, attr);
11993 
11994 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11995 	msg = NULL;
11996 	if (ret) {
11997 		wpa_printf(MSG_ERROR,
11998 			   "nl80211: Set ignore_assoc_disallow failed: ret=%d (%s)",
11999 			   ret, strerror(-ret));
12000 		goto fail;
12001 	}
12002 
12003 fail:
12004 	nlmsg_free(msg);
12005 	return ret;
12006 }
12007 
12008 #endif /* CONFIG_MBO */
12009 
12010 #endif /* CONFIG_DRIVER_NL80211_QCA */
12011 
nl80211_do_acs(void * priv,struct drv_acs_params * params)12012 static int nl80211_do_acs(void *priv, struct drv_acs_params *params)
12013 {
12014 #if defined(CONFIG_DRIVER_NL80211_QCA) || defined(CONFIG_DRIVER_NL80211_BRCM) \
12015 	|| defined(CONFIG_DRIVER_NL80211_SYNA)
12016 	struct i802_bss *bss = priv;
12017 	struct wpa_driver_nl80211_data *drv = bss->drv;
12018 #endif /* CONFIG_DRIVER_NL80211_QCA || CONFIG_DRIVER_NL80211_BRCM \
12019 	  || defined(CONFIG_DRIVER_NL80211_SYNA) */
12020 
12021 #ifdef CONFIG_DRIVER_NL80211_QCA
12022 	if (drv->qca_do_acs)
12023 		return nl80211_qca_do_acs(drv, params);
12024 #endif /* CONFIG_DRIVER_NL80211_QCA */
12025 
12026 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
12027 	if (drv->brcm_do_acs)
12028 		return wpa_driver_do_broadcom_acs(drv, params);
12029 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
12030 
12031 	return -1;
12032 }
12033 
12034 
nl80211_write_to_file(const char * name,unsigned int val)12035 static int nl80211_write_to_file(const char *name, unsigned int val)
12036 {
12037 	int fd, len;
12038 	char tmp[128];
12039 	int ret = 0;
12040 
12041 	fd = open(name, O_RDWR);
12042 	if (fd < 0) {
12043 		int level;
12044 		/*
12045 		 * Flags may not exist on older kernels, or while we're tearing
12046 		 * down a disappearing device.
12047 		 */
12048 		if (errno == ENOENT) {
12049 			ret = 0;
12050 			level = MSG_DEBUG;
12051 		} else {
12052 			ret = -1;
12053 			level = MSG_ERROR;
12054 		}
12055 		wpa_printf(level, "nl80211: Failed to open %s: %s",
12056 			   name, strerror(errno));
12057 		return ret;
12058 	}
12059 
12060 	len = os_snprintf(tmp, sizeof(tmp), "%u\n", val);
12061 	len = write(fd, tmp, len);
12062 	if (len < 0) {
12063 		ret = -1;
12064 		wpa_printf(MSG_ERROR, "nl80211: Failed to write to %s: %s",
12065 			   name, strerror(errno));
12066 	}
12067 	close(fd);
12068 
12069 	return ret;
12070 }
12071 
12072 
nl80211_configure_data_frame_filters(void * priv,u32 filter_flags)12073 static int nl80211_configure_data_frame_filters(void *priv, u32 filter_flags)
12074 {
12075 	struct i802_bss *bss = priv;
12076 	char path[128];
12077 	int ret;
12078 
12079 	/* P2P-Device has no netdev that can (or should) be configured here */
12080 	if (nl80211_get_ifmode(bss) == NL80211_IFTYPE_P2P_DEVICE)
12081 		return 0;
12082 
12083 	wpa_printf(MSG_DEBUG, "nl80211: Data frame filter flags=0x%x",
12084 		   filter_flags);
12085 
12086 	/* Configure filtering of unicast frame encrypted using GTK */
12087 	ret = os_snprintf(path, sizeof(path),
12088 			  "/proc/sys/net/ipv4/conf/%s/drop_unicast_in_l2_multicast",
12089 			  bss->ifname);
12090 	if (os_snprintf_error(sizeof(path), ret))
12091 		return -1;
12092 
12093 	ret = nl80211_write_to_file(path,
12094 				    !!(filter_flags &
12095 				       WPA_DATA_FRAME_FILTER_FLAG_GTK));
12096 	if (ret) {
12097 		wpa_printf(MSG_ERROR,
12098 			   "nl80211: Failed to set IPv4 unicast in multicast filter");
12099 		return ret;
12100 	}
12101 
12102 	os_snprintf(path, sizeof(path),
12103 		    "/proc/sys/net/ipv6/conf/%s/drop_unicast_in_l2_multicast",
12104 		    bss->ifname);
12105 	ret = nl80211_write_to_file(path,
12106 				    !!(filter_flags &
12107 				       WPA_DATA_FRAME_FILTER_FLAG_GTK));
12108 
12109 	if (ret) {
12110 		wpa_printf(MSG_ERROR,
12111 			   "nl80211: Failed to set IPv6 unicast in multicast filter");
12112 		return ret;
12113 	}
12114 
12115 	/* Configure filtering of unicast frame encrypted using GTK */
12116 	os_snprintf(path, sizeof(path),
12117 		    "/proc/sys/net/ipv4/conf/%s/drop_gratuitous_arp",
12118 		    bss->ifname);
12119 	ret = nl80211_write_to_file(path,
12120 				    !!(filter_flags &
12121 				       WPA_DATA_FRAME_FILTER_FLAG_ARP));
12122 	if (ret) {
12123 		wpa_printf(MSG_ERROR,
12124 			   "nl80211: Failed set gratuitous ARP filter");
12125 		return ret;
12126 	}
12127 
12128 	/* Configure filtering of IPv6 NA frames */
12129 	os_snprintf(path, sizeof(path),
12130 		    "/proc/sys/net/ipv6/conf/%s/drop_unsolicited_na",
12131 		    bss->ifname);
12132 	ret = nl80211_write_to_file(path,
12133 				    !!(filter_flags &
12134 				       WPA_DATA_FRAME_FILTER_FLAG_NA));
12135 	if (ret) {
12136 		wpa_printf(MSG_ERROR,
12137 			   "nl80211: Failed to set unsolicited NA filter");
12138 		return ret;
12139 	}
12140 
12141 	return 0;
12142 }
12143 
12144 
nl80211_get_ext_capab(void * priv,enum wpa_driver_if_type type,const u8 ** ext_capa,const u8 ** ext_capa_mask,unsigned int * ext_capa_len)12145 static int nl80211_get_ext_capab(void *priv, enum wpa_driver_if_type type,
12146 				 const u8 **ext_capa, const u8 **ext_capa_mask,
12147 				 unsigned int *ext_capa_len)
12148 {
12149 	struct i802_bss *bss = priv;
12150 	struct wpa_driver_nl80211_data *drv = bss->drv;
12151 	enum nl80211_iftype nlmode;
12152 	unsigned int i;
12153 
12154 	if (!ext_capa || !ext_capa_mask || !ext_capa_len)
12155 		return -1;
12156 
12157 	nlmode = wpa_driver_nl80211_if_type(type);
12158 
12159 	/* By default, use the per-radio values */
12160 	*ext_capa = drv->extended_capa;
12161 	*ext_capa_mask = drv->extended_capa_mask;
12162 	*ext_capa_len = drv->extended_capa_len;
12163 
12164 	/* Replace the default value if a per-interface type value exists */
12165 	for (i = 0; i < drv->num_iface_ext_capa; i++) {
12166 		if (nlmode == drv->iface_ext_capa[i].iftype) {
12167 			*ext_capa = drv->iface_ext_capa[i].ext_capa;
12168 			*ext_capa_mask = drv->iface_ext_capa[i].ext_capa_mask;
12169 			*ext_capa_len = drv->iface_ext_capa[i].ext_capa_len;
12170 			break;
12171 		}
12172 	}
12173 
12174 	return 0;
12175 }
12176 
12177 
nl80211_update_connection_params(void * priv,struct wpa_driver_associate_params * params,enum wpa_drv_update_connect_params_mask mask)12178 static int nl80211_update_connection_params(
12179 	void *priv, struct wpa_driver_associate_params *params,
12180 	enum wpa_drv_update_connect_params_mask mask)
12181 {
12182 	struct i802_bss *bss = priv;
12183 	struct wpa_driver_nl80211_data *drv = bss->drv;
12184 	struct nl_msg *msg;
12185 	int ret = -1;
12186 	enum nl80211_auth_type type;
12187 
12188 	/* Update Connection Params is intended for drivers that implement
12189 	 * internal SME and expect these updated connection params from
12190 	 * wpa_supplicant. Do not send this request for the drivers using
12191 	 * SME from wpa_supplicant.
12192 	 */
12193 	if (drv->capa.flags & WPA_DRIVER_FLAGS_SME)
12194 		return 0;
12195 
12196 	/* Handle any connection param update here which might receive kernel handling in future */
12197 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
12198 	if (mask & WPA_DRV_UPDATE_TD_POLICY) {
12199 		ret = nl80211_set_td_policy(priv, params->td_policy);
12200 		if (ret) {
12201 			wpa_dbg(drv->ctx, MSG_DEBUG,
12202 				"nl80211: Update connect params command failed: ret=%d (%s)",
12203 				ret, strerror(-ret));
12204 		}
12205 		return ret;
12206 	}
12207 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
12208 
12209 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_UPDATE_CONNECT_PARAMS);
12210 	if (!msg)
12211 		goto fail;
12212 
12213 	wpa_printf(MSG_DEBUG, "nl80211: Update connection params (ifindex=%d)",
12214 		   drv->ifindex);
12215 
12216 	if ((mask & WPA_DRV_UPDATE_ASSOC_IES) && params->wpa_ie) {
12217 		if (nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len,
12218 			    params->wpa_ie))
12219 			goto fail;
12220 		wpa_hexdump(MSG_DEBUG, "  * IEs", params->wpa_ie,
12221 			    params->wpa_ie_len);
12222 	}
12223 
12224 	if (mask & WPA_DRV_UPDATE_AUTH_TYPE) {
12225 		type = get_nl_auth_type(params->auth_alg);
12226 		if (type == NL80211_AUTHTYPE_MAX ||
12227 		    nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
12228 			goto fail;
12229 		wpa_printf(MSG_DEBUG, "  * Auth Type %d", type);
12230 	}
12231 
12232 	if ((mask & WPA_DRV_UPDATE_FILS_ERP_INFO) &&
12233 	    nl80211_put_fils_connect_params(drv, params, msg))
12234 		goto fail;
12235 
12236 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12237 	msg = NULL;
12238 	if (ret)
12239 		wpa_dbg(drv->ctx, MSG_DEBUG,
12240 			"nl80211: Update connect params command failed: ret=%d (%s)",
12241 			ret, strerror(-ret));
12242 
12243 fail:
12244 	nlmsg_free(msg);
12245 	return ret;
12246 }
12247 
12248 
nl80211_send_external_auth_status(void * priv,struct external_auth * params)12249 static int nl80211_send_external_auth_status(void *priv,
12250 					     struct external_auth *params)
12251 {
12252 	struct i802_bss *bss = priv;
12253 	struct wpa_driver_nl80211_data *drv = bss->drv;
12254 	struct nl_msg *msg = NULL;
12255 	int ret = -1;
12256 
12257 	/* External auth command/status is intended for drivers that implement
12258 	 * internal SME but want to offload authentication processing (e.g.,
12259 	 * SAE) to hostapd/wpa_supplicant. Do not send the status to drivers
12260 	 * which do not support AP SME or use wpa_supplicant/hostapd SME.
12261 	 */
12262 	if ((is_ap_interface(drv->nlmode) && !bss->drv->device_ap_sme) ||
12263 	    (drv->capa.flags & WPA_DRIVER_FLAGS_SME))
12264 		return -1;
12265 
12266 	wpa_dbg(drv->ctx, MSG_DEBUG,
12267 		"nl80211: External auth status: %u", params->status);
12268 
12269 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_EXTERNAL_AUTH);
12270 	if (!msg ||
12271 	    nla_put_u16(msg, NL80211_ATTR_STATUS_CODE, params->status) ||
12272 	    (params->ssid && params->ssid_len &&
12273 	     nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid)) ||
12274 	    (params->pmkid &&
12275 	     nla_put(msg, NL80211_ATTR_PMKID, PMKID_LEN, params->pmkid)) ||
12276 	    (params->bssid &&
12277 	     nla_put(msg, NL80211_ATTR_BSSID, ETH_ALEN, params->bssid)))
12278 		goto fail;
12279 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12280 	msg = NULL;
12281 	if (ret) {
12282 		wpa_printf(MSG_DEBUG,
12283 			   "nl80211: External Auth status update failed: ret=%d (%s)",
12284 			   ret, strerror(-ret));
12285 		goto fail;
12286 	}
12287 fail:
12288 	nlmsg_free(msg);
12289 	return ret;
12290 }
12291 
12292 
nl80211_set_4addr_mode(void * priv,const char * bridge_ifname,int val)12293 static int nl80211_set_4addr_mode(void *priv, const char *bridge_ifname,
12294 				  int val)
12295 {
12296 	struct i802_bss *bss = priv;
12297 	struct wpa_driver_nl80211_data *drv = bss->drv;
12298 	struct nl_msg *msg;
12299 	int ret = -ENOBUFS;
12300 
12301 	wpa_printf(MSG_DEBUG, "nl80211: %s 4addr mode (bridge_ifname: %s)",
12302 		   val ? "Enable" : "Disable", bridge_ifname);
12303 
12304 	msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_SET_INTERFACE);
12305 	if (!msg || nla_put_u8(msg, NL80211_ATTR_4ADDR, val))
12306 		goto fail;
12307 
12308 	if (bridge_ifname[0] && bss->added_if_into_bridge && !val) {
12309 		if (linux_br_del_if(drv->global->ioctl_sock,
12310 				    bridge_ifname, bss->ifname)) {
12311 			wpa_printf(MSG_ERROR,
12312 				   "nl80211: Failed to remove interface %s from bridge %s",
12313 				   bss->ifname, bridge_ifname);
12314 			return -1;
12315 		}
12316 		bss->added_if_into_bridge = 0;
12317 	}
12318 
12319 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12320 	msg = NULL;
12321 	if (ret && val && nl80211_get_4addr(bss) == 1) {
12322 		wpa_printf(MSG_DEBUG,
12323 			   "nl80211: 4addr mode was already enabled");
12324 		ret = 0;
12325 	}
12326 	if (!ret) {
12327 		if (bridge_ifname[0] && val &&
12328 		    i802_check_bridge(drv, bss, bridge_ifname, bss->ifname) < 0)
12329 			return -1;
12330 		return 0;
12331 	}
12332 
12333 fail:
12334 	nlmsg_free(msg);
12335 	wpa_printf(MSG_ERROR, "nl80211: Failed to enable/disable 4addr");
12336 
12337 	return ret;
12338 }
12339 
12340 
12341 #ifdef CONFIG_DPP
nl80211_dpp_listen(void * priv,bool enable)12342 static int nl80211_dpp_listen(void *priv, bool enable)
12343 {
12344 	struct i802_bss *bss = priv;
12345 	struct wpa_driver_nl80211_data *drv = bss->drv;
12346 	u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_ACTION << 4);
12347 	struct nl_sock *handle;
12348 
12349 	if (!drv->multicast_registrations || !bss->nl_mgmt)
12350 		return 0; /* cannot do more than hope broadcast RX works */
12351 
12352 	wpa_printf(MSG_DEBUG,
12353 		   "nl80211: Update DPP Public Action frame registration (%s multicast RX)",
12354 		   enable ? "enable" : "disable");
12355 	handle = (void *) (((intptr_t) bss->nl_mgmt) ^ ELOOP_SOCKET_INVALID);
12356 	return nl80211_register_frame(bss, handle, type,
12357 				      (u8 *) "\x04\x09\x50\x6f\x9a\x1a", 6,
12358 				      enable);
12359 }
12360 #endif /* CONFIG_DPP */
12361 
12362 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
nl80211_set_td_policy(void * priv,u32 td_policy)12363 static int nl80211_set_td_policy(void *priv, u32 td_policy)
12364 {
12365 	struct i802_bss *bss = priv;
12366 	struct wpa_driver_nl80211_data *drv = bss->drv;
12367 	struct nl_msg *msg;
12368 	int ret;
12369 	struct nlattr *params;
12370 
12371 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12372 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
12373 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, BRCM_VENDOR_SCMD_SET_TD_POLICY) ||
12374 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
12375 	    (nla_put_u32(msg, BRCM_ATTR_DRIVER_TD_POLICY, td_policy))) {
12376 		nl80211_nlmsg_clear(msg);
12377 		nlmsg_free(msg);
12378 		return -ENOBUFS;
12379 	}
12380 	nla_nest_end(msg, params);
12381 	wpa_printf(MSG_DEBUG, "nl80211: Transition Disable Policy %d\n", td_policy);
12382 
12383 	ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1, NULL, NULL);
12384 	if (ret) {
12385 		wpa_printf(MSG_DEBUG, "nl80211: Transition Disable setting failed: ret=%d (%s)",
12386 		ret, strerror(-ret));
12387 	}
12388 
12389 	return ret;
12390 }
12391 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
12392 
12393 #ifdef CONFIG_TESTING_OPTIONS
12394 
testing_nl80211_register_frame(void * priv,u16 type,const u8 * match,size_t match_len,bool multicast)12395 static int testing_nl80211_register_frame(void *priv, u16 type,
12396 					  const u8 *match, size_t match_len,
12397 					  bool multicast)
12398 {
12399 	struct i802_bss *bss = priv;
12400 	struct nl_sock *handle;
12401 
12402 	if (!bss->nl_mgmt)
12403 		return -1;
12404 	handle = (void *) (((intptr_t) bss->nl_mgmt) ^ ELOOP_SOCKET_INVALID);
12405 	return nl80211_register_frame(bss, handle, type, match, match_len,
12406 				      multicast);
12407 }
12408 
12409 
testing_nl80211_radio_disable(void * priv,int disabled)12410 static int testing_nl80211_radio_disable(void *priv, int disabled)
12411 {
12412 	struct i802_bss *bss = priv;
12413 	struct wpa_driver_nl80211_data *drv = bss->drv;
12414 
12415 	/* For now, this is supported only partially in station mode with
12416 	 * SME-in-wpa_supplicant case where the NL80211_ATTR_LOCAL_STATE_CHANGE
12417 	 * attribute can be used to avoid sending out the Deauthentication frame
12418 	 * to the currently associated AP. */
12419 
12420 	if (!disabled)
12421 		return 0;
12422 
12423 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME))
12424 		return -1;
12425 
12426 	if (!drv->associated)
12427 		return 0;
12428 
12429 	return wpa_driver_nl80211_mlme(drv, drv->bssid,
12430 				       NL80211_CMD_DEAUTHENTICATE,
12431 				       WLAN_REASON_PREV_AUTH_NOT_VALID, 1,
12432 				       drv->first_bss);
12433 }
12434 
12435 #endif /* CONFIG_TESTING_OPTIONS */
12436 
12437 
12438 const struct wpa_driver_ops wpa_driver_nl80211_ops = {
12439 	.name = "nl80211",
12440 	.desc = "Linux nl80211/cfg80211",
12441 	.get_bssid = wpa_driver_nl80211_get_bssid,
12442 	.get_ssid = wpa_driver_nl80211_get_ssid,
12443 	.set_key = driver_nl80211_set_key,
12444 	.scan2 = driver_nl80211_scan2,
12445 	.sched_scan = wpa_driver_nl80211_sched_scan,
12446 	.stop_sched_scan = wpa_driver_nl80211_stop_sched_scan,
12447 	.get_scan_results2 = wpa_driver_nl80211_get_scan_results,
12448 	.abort_scan = wpa_driver_nl80211_abort_scan,
12449 	.deauthenticate = driver_nl80211_deauthenticate,
12450 	.authenticate = driver_nl80211_authenticate,
12451 	.associate = wpa_driver_nl80211_associate,
12452 	.global_init = nl80211_global_init,
12453 	.global_deinit = nl80211_global_deinit,
12454 	.init2 = wpa_driver_nl80211_init,
12455 	.deinit = driver_nl80211_deinit,
12456 	.get_capa = wpa_driver_nl80211_get_capa,
12457 	.set_operstate = wpa_driver_nl80211_set_operstate,
12458 	.set_supp_port = wpa_driver_nl80211_set_supp_port,
12459 	.set_country = wpa_driver_nl80211_set_country,
12460 	.get_country = wpa_driver_nl80211_get_country,
12461 	.set_ap = wpa_driver_nl80211_set_ap,
12462 	.set_acl = wpa_driver_nl80211_set_acl,
12463 	.if_add = wpa_driver_nl80211_if_add,
12464 	.if_remove = driver_nl80211_if_remove,
12465 	.send_mlme = driver_nl80211_send_mlme,
12466 	.get_hw_feature_data = nl80211_get_hw_feature_data,
12467 	.sta_add = wpa_driver_nl80211_sta_add,
12468 	.sta_remove = driver_nl80211_sta_remove,
12469 	.tx_control_port = nl80211_tx_control_port,
12470 	.hapd_send_eapol = wpa_driver_nl80211_hapd_send_eapol,
12471 	.sta_set_flags = wpa_driver_nl80211_sta_set_flags,
12472 	.sta_set_airtime_weight = driver_nl80211_sta_set_airtime_weight,
12473 	.hapd_init = i802_init,
12474 	.hapd_deinit = i802_deinit,
12475 	.set_wds_sta = i802_set_wds_sta,
12476 	.get_seqnum = i802_get_seqnum,
12477 	.flush = i802_flush,
12478 	.get_inact_sec = i802_get_inact_sec,
12479 	.sta_clear_stats = i802_sta_clear_stats,
12480 	.set_rts = i802_set_rts,
12481 	.set_frag = i802_set_frag,
12482 	.set_tx_queue_params = i802_set_tx_queue_params,
12483 	.set_sta_vlan = driver_nl80211_set_sta_vlan,
12484 	.sta_deauth = i802_sta_deauth,
12485 	.sta_disassoc = i802_sta_disassoc,
12486 	.read_sta_data = driver_nl80211_read_sta_data,
12487 	.set_freq = i802_set_freq,
12488 	.send_action = driver_nl80211_send_action,
12489 	.send_action_cancel_wait = wpa_driver_nl80211_send_action_cancel_wait,
12490 	.remain_on_channel = wpa_driver_nl80211_remain_on_channel,
12491 	.cancel_remain_on_channel =
12492 	wpa_driver_nl80211_cancel_remain_on_channel,
12493 	.probe_req_report = driver_nl80211_probe_req_report,
12494 	.deinit_ap = wpa_driver_nl80211_deinit_ap,
12495 	.deinit_p2p_cli = wpa_driver_nl80211_deinit_p2p_cli,
12496 	.resume = wpa_driver_nl80211_resume,
12497 	.signal_monitor = nl80211_signal_monitor,
12498 	.signal_poll = nl80211_signal_poll,
12499 	.channel_info = nl80211_channel_info,
12500 	.set_param = nl80211_set_param,
12501 	.get_radio_name = nl80211_get_radio_name,
12502 	.add_pmkid = nl80211_add_pmkid,
12503 	.remove_pmkid = nl80211_remove_pmkid,
12504 	.flush_pmkid = nl80211_flush_pmkid,
12505 	.set_rekey_info = nl80211_set_rekey_info,
12506 	.poll_client = nl80211_poll_client,
12507 	.set_p2p_powersave = nl80211_set_p2p_powersave,
12508 	.start_dfs_cac = nl80211_start_radar_detection,
12509 	.stop_ap = wpa_driver_nl80211_stop_ap,
12510 #ifdef CONFIG_TDLS
12511 	.send_tdls_mgmt = nl80211_send_tdls_mgmt,
12512 	.tdls_oper = nl80211_tdls_oper,
12513 	.tdls_enable_channel_switch = nl80211_tdls_enable_channel_switch,
12514 	.tdls_disable_channel_switch = nl80211_tdls_disable_channel_switch,
12515 #endif /* CONFIG_TDLS */
12516 	.update_ft_ies = wpa_driver_nl80211_update_ft_ies,
12517 	.update_dh_ie = nl80211_update_dh_ie,
12518 	.get_mac_addr = wpa_driver_nl80211_get_macaddr,
12519 	.get_survey = wpa_driver_nl80211_get_survey,
12520 	.status = wpa_driver_nl80211_status,
12521 	.switch_channel = nl80211_switch_channel,
12522 #ifdef CONFIG_IEEE80211AX
12523 	.switch_color = nl80211_switch_color,
12524 #endif /* CONFIG_IEEE80211AX */
12525 #ifdef ANDROID_P2P
12526 	.set_noa = wpa_driver_set_p2p_noa,
12527 	.get_noa = wpa_driver_get_p2p_noa,
12528 	.set_ap_wps_ie = wpa_driver_set_ap_wps_p2p_ie,
12529 #endif /* ANDROID_P2P */
12530 #ifdef ANDROID
12531 #ifndef ANDROID_LIB_STUB
12532 	.driver_cmd = wpa_driver_nl80211_driver_cmd,
12533 #endif /* !ANDROID_LIB_STUB */
12534 #endif /* ANDROID */
12535 	.vendor_cmd = nl80211_vendor_cmd,
12536 	.set_qos_map = nl80211_set_qos_map,
12537 	.get_wowlan = nl80211_get_wowlan,
12538 	.set_wowlan = nl80211_set_wowlan,
12539 	.set_mac_addr = nl80211_set_mac_addr,
12540 #ifdef CONFIG_MESH
12541 	.init_mesh = wpa_driver_nl80211_init_mesh,
12542 	.join_mesh = wpa_driver_nl80211_join_mesh,
12543 	.leave_mesh = wpa_driver_nl80211_leave_mesh,
12544 	.probe_mesh_link = nl80211_probe_mesh_link,
12545 #endif /* CONFIG_MESH */
12546 	.br_add_ip_neigh = wpa_driver_br_add_ip_neigh,
12547 	.br_delete_ip_neigh = wpa_driver_br_delete_ip_neigh,
12548 	.br_port_set_attr = wpa_driver_br_port_set_attr,
12549 	.br_set_net_param = wpa_driver_br_set_net_param,
12550 	.add_tx_ts = nl80211_add_ts,
12551 	.del_tx_ts = nl80211_del_ts,
12552 	.get_ifindex = nl80211_get_ifindex,
12553 #ifdef CONFIG_DRIVER_NL80211_QCA
12554 	.roaming = nl80211_roaming,
12555 	.disable_fils = nl80211_disable_fils,
12556 	.set_band = nl80211_set_band,
12557 	.get_pref_freq_list = nl80211_get_pref_freq_list,
12558 	.set_prob_oper_freq = nl80211_set_prob_oper_freq,
12559 	.p2p_lo_start = nl80211_p2p_lo_start,
12560 	.p2p_lo_stop = nl80211_p2p_lo_stop,
12561 	.set_default_scan_ies = nl80211_set_default_scan_ies,
12562 	.set_tdls_mode = nl80211_set_tdls_mode,
12563 #ifdef CONFIG_MBO
12564 	.get_bss_transition_status = nl80211_get_bss_transition_status,
12565 	.ignore_assoc_disallow = nl80211_ignore_assoc_disallow,
12566 #endif /* CONFIG_MBO */
12567 	.set_bssid_tmp_disallow = nl80211_set_bssid_tmp_disallow,
12568 	.add_sta_node = nl80211_add_sta_node,
12569 #endif /* CONFIG_DRIVER_NL80211_QCA */
12570 	.do_acs = nl80211_do_acs,
12571 	.configure_data_frame_filters = nl80211_configure_data_frame_filters,
12572 	.get_ext_capab = nl80211_get_ext_capab,
12573 	.update_connect_params = nl80211_update_connection_params,
12574 	.send_external_auth_status = nl80211_send_external_auth_status,
12575 	.set_4addr_mode = nl80211_set_4addr_mode,
12576 #ifdef CONFIG_DPP
12577 	.dpp_listen = nl80211_dpp_listen,
12578 #endif /* CONFIG_DPP */
12579 #ifdef CONFIG_TESTING_OPTIONS
12580 	.register_frame = testing_nl80211_register_frame,
12581 	.radio_disable = testing_nl80211_radio_disable,
12582 #endif /* CONFIG_TESTING_OPTIONS */
12583 };
12584