Disconnect hostapd from building in base
[dragonfly.git] / contrib / hostapd / src / ap / ap_drv_ops.c
CommitLineData
4781064b
JM
1/*
2 * hostapd - Driver operations
3 * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9#include "utils/includes.h"
10
11#include "utils/common.h"
12#include "common/ieee802_11_defs.h"
13#include "wps/wps.h"
14#include "p2p/p2p.h"
15#include "hostapd.h"
16#include "ieee802_11.h"
17#include "sta_info.h"
18#include "ap_config.h"
19#include "p2p_hostapd.h"
20#include "hs20.h"
21#include "ap_drv_ops.h"
22
23
24u32 hostapd_sta_flags_to_drv(u32 flags)
25{
26 int res = 0;
27 if (flags & WLAN_STA_AUTHORIZED)
28 res |= WPA_STA_AUTHORIZED;
29 if (flags & WLAN_STA_WMM)
30 res |= WPA_STA_WMM;
31 if (flags & WLAN_STA_SHORT_PREAMBLE)
32 res |= WPA_STA_SHORT_PREAMBLE;
33 if (flags & WLAN_STA_MFP)
34 res |= WPA_STA_MFP;
35 return res;
36}
37
38
39int hostapd_build_ap_extra_ies(struct hostapd_data *hapd,
40 struct wpabuf **beacon_ret,
41 struct wpabuf **proberesp_ret,
42 struct wpabuf **assocresp_ret)
43{
44 struct wpabuf *beacon = NULL, *proberesp = NULL, *assocresp = NULL;
45 u8 buf[200], *pos;
46
47 *beacon_ret = *proberesp_ret = *assocresp_ret = NULL;
48
49 pos = buf;
50 pos = hostapd_eid_time_adv(hapd, pos);
51 if (pos != buf) {
52 if (wpabuf_resize(&beacon, pos - buf) != 0)
53 goto fail;
54 wpabuf_put_data(beacon, buf, pos - buf);
55 }
56 pos = hostapd_eid_time_zone(hapd, pos);
57 if (pos != buf) {
58 if (wpabuf_resize(&proberesp, pos - buf) != 0)
59 goto fail;
60 wpabuf_put_data(proberesp, buf, pos - buf);
61 }
62
63 pos = buf;
64 pos = hostapd_eid_ext_capab(hapd, pos);
65 if (pos != buf) {
66 if (wpabuf_resize(&assocresp, pos - buf) != 0)
67 goto fail;
68 wpabuf_put_data(assocresp, buf, pos - buf);
69 }
70 pos = hostapd_eid_interworking(hapd, pos);
71 pos = hostapd_eid_adv_proto(hapd, pos);
72 pos = hostapd_eid_roaming_consortium(hapd, pos);
73 if (pos != buf) {
74 if (wpabuf_resize(&beacon, pos - buf) != 0)
75 goto fail;
76 wpabuf_put_data(beacon, buf, pos - buf);
77
78 if (wpabuf_resize(&proberesp, pos - buf) != 0)
79 goto fail;
80 wpabuf_put_data(proberesp, buf, pos - buf);
81 }
82
83 if (hapd->wps_beacon_ie) {
84 if (wpabuf_resize(&beacon, wpabuf_len(hapd->wps_beacon_ie)) <
85 0)
86 goto fail;
87 wpabuf_put_buf(beacon, hapd->wps_beacon_ie);
88 }
89
90 if (hapd->wps_probe_resp_ie) {
91 if (wpabuf_resize(&proberesp,
92 wpabuf_len(hapd->wps_probe_resp_ie)) < 0)
93 goto fail;
94 wpabuf_put_buf(proberesp, hapd->wps_probe_resp_ie);
95 }
96
97#ifdef CONFIG_P2P
98 if (hapd->p2p_beacon_ie) {
99 if (wpabuf_resize(&beacon, wpabuf_len(hapd->p2p_beacon_ie)) <
100 0)
101 goto fail;
102 wpabuf_put_buf(beacon, hapd->p2p_beacon_ie);
103 }
104
105 if (hapd->p2p_probe_resp_ie) {
106 if (wpabuf_resize(&proberesp,
107 wpabuf_len(hapd->p2p_probe_resp_ie)) < 0)
108 goto fail;
109 wpabuf_put_buf(proberesp, hapd->p2p_probe_resp_ie);
110 }
111#endif /* CONFIG_P2P */
112
113#ifdef CONFIG_P2P_MANAGER
114 if (hapd->conf->p2p & P2P_MANAGE) {
115 if (wpabuf_resize(&beacon, 100) == 0) {
116 u8 *start, *p;
117 start = wpabuf_put(beacon, 0);
118 p = hostapd_eid_p2p_manage(hapd, start);
119 wpabuf_put(beacon, p - start);
120 }
121
122 if (wpabuf_resize(&proberesp, 100) == 0) {
123 u8 *start, *p;
124 start = wpabuf_put(proberesp, 0);
125 p = hostapd_eid_p2p_manage(hapd, start);
126 wpabuf_put(proberesp, p - start);
127 }
128 }
129#endif /* CONFIG_P2P_MANAGER */
130
131#ifdef CONFIG_WPS2
132 if (hapd->conf->wps_state) {
133 struct wpabuf *a = wps_build_assoc_resp_ie();
134 if (a && wpabuf_resize(&assocresp, wpabuf_len(a)) == 0)
135 wpabuf_put_buf(assocresp, a);
136 wpabuf_free(a);
137 }
138#endif /* CONFIG_WPS2 */
139
140#ifdef CONFIG_P2P_MANAGER
141 if (hapd->conf->p2p & P2P_MANAGE) {
142 if (wpabuf_resize(&assocresp, 100) == 0) {
143 u8 *start, *p;
144 start = wpabuf_put(assocresp, 0);
145 p = hostapd_eid_p2p_manage(hapd, start);
146 wpabuf_put(assocresp, p - start);
147 }
148 }
149#endif /* CONFIG_P2P_MANAGER */
150
151#ifdef CONFIG_WIFI_DISPLAY
152 if (hapd->p2p_group) {
153 struct wpabuf *a;
154 a = p2p_group_assoc_resp_ie(hapd->p2p_group, P2P_SC_SUCCESS);
155 if (a && wpabuf_resize(&assocresp, wpabuf_len(a)) == 0)
156 wpabuf_put_buf(assocresp, a);
157 wpabuf_free(a);
158 }
159#endif /* CONFIG_WIFI_DISPLAY */
160
161#ifdef CONFIG_HS20
162 pos = buf;
163 pos = hostapd_eid_hs20_indication(hapd, pos);
164 if (pos != buf) {
165 if (wpabuf_resize(&beacon, pos - buf) != 0)
166 goto fail;
167 wpabuf_put_data(beacon, buf, pos - buf);
168
169 if (wpabuf_resize(&proberesp, pos - buf) != 0)
170 goto fail;
171 wpabuf_put_data(proberesp, buf, pos - buf);
172 }
173#endif /* CONFIG_HS20 */
174
175 if (hapd->conf->vendor_elements) {
176 size_t add = wpabuf_len(hapd->conf->vendor_elements);
177 if (wpabuf_resize(&beacon, add) == 0)
178 wpabuf_put_buf(beacon, hapd->conf->vendor_elements);
179 if (wpabuf_resize(&proberesp, add) == 0)
180 wpabuf_put_buf(proberesp, hapd->conf->vendor_elements);
181 }
182
183 *beacon_ret = beacon;
184 *proberesp_ret = proberesp;
185 *assocresp_ret = assocresp;
186
187 return 0;
188
189fail:
190 wpabuf_free(beacon);
191 wpabuf_free(proberesp);
192 wpabuf_free(assocresp);
193 return -1;
194}
195
196
197void hostapd_free_ap_extra_ies(struct hostapd_data *hapd,
198 struct wpabuf *beacon,
199 struct wpabuf *proberesp,
200 struct wpabuf *assocresp)
201{
202 wpabuf_free(beacon);
203 wpabuf_free(proberesp);
204 wpabuf_free(assocresp);
205}
206
207
208int hostapd_set_ap_wps_ie(struct hostapd_data *hapd)
209{
210 struct wpabuf *beacon, *proberesp, *assocresp;
211 int ret;
212
213 if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL)
214 return 0;
215
216 if (hostapd_build_ap_extra_ies(hapd, &beacon, &proberesp, &assocresp) <
217 0)
218 return -1;
219
220 ret = hapd->driver->set_ap_wps_ie(hapd->drv_priv, beacon, proberesp,
221 assocresp);
222
223 hostapd_free_ap_extra_ies(hapd, beacon, proberesp, assocresp);
224
225 return ret;
226}
227
228
229int hostapd_set_authorized(struct hostapd_data *hapd,
230 struct sta_info *sta, int authorized)
231{
232 if (authorized) {
233 return hostapd_sta_set_flags(hapd, sta->addr,
234 hostapd_sta_flags_to_drv(
235 sta->flags),
236 WPA_STA_AUTHORIZED, ~0);
237 }
238
239 return hostapd_sta_set_flags(hapd, sta->addr,
240 hostapd_sta_flags_to_drv(sta->flags),
241 0, ~WPA_STA_AUTHORIZED);
242}
243
244
245int hostapd_set_sta_flags(struct hostapd_data *hapd, struct sta_info *sta)
246{
247 int set_flags, total_flags, flags_and, flags_or;
248 total_flags = hostapd_sta_flags_to_drv(sta->flags);
249 set_flags = WPA_STA_SHORT_PREAMBLE | WPA_STA_WMM | WPA_STA_MFP;
250 if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) ||
251 sta->auth_alg == WLAN_AUTH_FT) &&
252 sta->flags & WLAN_STA_AUTHORIZED)
253 set_flags |= WPA_STA_AUTHORIZED;
254 flags_or = total_flags & set_flags;
255 flags_and = total_flags | ~set_flags;
256 return hostapd_sta_set_flags(hapd, sta->addr, total_flags,
257 flags_or, flags_and);
258}
259
260
261int hostapd_set_drv_ieee8021x(struct hostapd_data *hapd, const char *ifname,
262 int enabled)
263{
264 struct wpa_bss_params params;
265 os_memset(&params, 0, sizeof(params));
266 params.ifname = ifname;
267 params.enabled = enabled;
268 if (enabled) {
269 params.wpa = hapd->conf->wpa;
270 params.ieee802_1x = hapd->conf->ieee802_1x;
271 params.wpa_group = hapd->conf->wpa_group;
272 params.wpa_pairwise = hapd->conf->wpa_pairwise;
273 params.wpa_key_mgmt = hapd->conf->wpa_key_mgmt;
274 params.rsn_preauth = hapd->conf->rsn_preauth;
275#ifdef CONFIG_IEEE80211W
276 params.ieee80211w = hapd->conf->ieee80211w;
277#endif /* CONFIG_IEEE80211W */
278 }
279 return hostapd_set_ieee8021x(hapd, &params);
280}
281
282
283int hostapd_vlan_if_add(struct hostapd_data *hapd, const char *ifname)
284{
285 char force_ifname[IFNAMSIZ];
286 u8 if_addr[ETH_ALEN];
287 return hostapd_if_add(hapd, WPA_IF_AP_VLAN, ifname, hapd->own_addr,
288 NULL, NULL, force_ifname, if_addr, NULL, 0);
289}
290
291
292int hostapd_vlan_if_remove(struct hostapd_data *hapd, const char *ifname)
293{
294 return hostapd_if_remove(hapd, WPA_IF_AP_VLAN, ifname);
295}
296
297
298int hostapd_set_wds_sta(struct hostapd_data *hapd, char *ifname_wds,
299 const u8 *addr, int aid, int val)
300{
301 const char *bridge = NULL;
302
303 if (hapd->driver == NULL || hapd->driver->set_wds_sta == NULL)
304 return -1;
305 if (hapd->conf->wds_bridge[0])
306 bridge = hapd->conf->wds_bridge;
307 else if (hapd->conf->bridge[0])
308 bridge = hapd->conf->bridge;
309 return hapd->driver->set_wds_sta(hapd->drv_priv, addr, aid, val,
310 bridge, ifname_wds);
311}
312
313
314int hostapd_add_sta_node(struct hostapd_data *hapd, const u8 *addr,
315 u16 auth_alg)
316{
317 if (hapd->driver == NULL || hapd->driver->add_sta_node == NULL)
318 return 0;
319 return hapd->driver->add_sta_node(hapd->drv_priv, addr, auth_alg);
320}
321
322
323int hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr,
324 u16 seq, u16 status, const u8 *ie, size_t len)
325{
326 if (hapd->driver == NULL || hapd->driver->sta_auth == NULL)
327 return 0;
328 return hapd->driver->sta_auth(hapd->drv_priv, hapd->own_addr, addr,
329 seq, status, ie, len);
330}
331
332
333int hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr,
334 int reassoc, u16 status, const u8 *ie, size_t len)
335{
336 if (hapd->driver == NULL || hapd->driver->sta_assoc == NULL)
337 return 0;
338 return hapd->driver->sta_assoc(hapd->drv_priv, hapd->own_addr, addr,
339 reassoc, status, ie, len);
340}
341
342
343int hostapd_sta_add(struct hostapd_data *hapd,
344 const u8 *addr, u16 aid, u16 capability,
345 const u8 *supp_rates, size_t supp_rates_len,
346 u16 listen_interval,
347 const struct ieee80211_ht_capabilities *ht_capab,
348 const struct ieee80211_vht_capabilities *vht_capab,
349 u32 flags, u8 qosinfo)
350{
351 struct hostapd_sta_add_params params;
352
353 if (hapd->driver == NULL)
354 return 0;
355 if (hapd->driver->sta_add == NULL)
356 return 0;
357
358 os_memset(&params, 0, sizeof(params));
359 params.addr = addr;
360 params.aid = aid;
361 params.capability = capability;
362 params.supp_rates = supp_rates;
363 params.supp_rates_len = supp_rates_len;
364 params.listen_interval = listen_interval;
365 params.ht_capabilities = ht_capab;
366 params.vht_capabilities = vht_capab;
367 params.flags = hostapd_sta_flags_to_drv(flags);
368 params.qosinfo = qosinfo;
369 return hapd->driver->sta_add(hapd->drv_priv, &params);
370}
371
372
373int hostapd_add_tspec(struct hostapd_data *hapd, const u8 *addr,
374 u8 *tspec_ie, size_t tspec_ielen)
375{
376 if (hapd->driver == NULL || hapd->driver->add_tspec == NULL)
377 return 0;
378 return hapd->driver->add_tspec(hapd->drv_priv, addr, tspec_ie,
379 tspec_ielen);
380}
381
382
383int hostapd_set_privacy(struct hostapd_data *hapd, int enabled)
384{
385 if (hapd->driver == NULL || hapd->driver->set_privacy == NULL)
386 return 0;
387 return hapd->driver->set_privacy(hapd->drv_priv, enabled);
388}
389
390
391int hostapd_set_generic_elem(struct hostapd_data *hapd, const u8 *elem,
392 size_t elem_len)
393{
394 if (hapd->driver == NULL || hapd->driver->set_generic_elem == NULL)
395 return 0;
396 return hapd->driver->set_generic_elem(hapd->drv_priv, elem, elem_len);
397}
398
399
400int hostapd_get_ssid(struct hostapd_data *hapd, u8 *buf, size_t len)
401{
402 if (hapd->driver == NULL || hapd->driver->hapd_get_ssid == NULL)
403 return 0;
404 return hapd->driver->hapd_get_ssid(hapd->drv_priv, buf, len);
405}
406
407
408int hostapd_set_ssid(struct hostapd_data *hapd, const u8 *buf, size_t len)
409{
410 if (hapd->driver == NULL || hapd->driver->hapd_set_ssid == NULL)
411 return 0;
412 return hapd->driver->hapd_set_ssid(hapd->drv_priv, buf, len);
413}
414
415
416int hostapd_if_add(struct hostapd_data *hapd, enum wpa_driver_if_type type,
417 const char *ifname, const u8 *addr, void *bss_ctx,
418 void **drv_priv, char *force_ifname, u8 *if_addr,
419 const char *bridge, int use_existing)
420{
421 if (hapd->driver == NULL || hapd->driver->if_add == NULL)
422 return -1;
423 return hapd->driver->if_add(hapd->drv_priv, type, ifname, addr,
424 bss_ctx, drv_priv, force_ifname, if_addr,
425 bridge, use_existing);
426}
427
428
429int hostapd_if_remove(struct hostapd_data *hapd, enum wpa_driver_if_type type,
430 const char *ifname)
431{
432 if (hapd->driver == NULL || hapd->drv_priv == NULL ||
433 hapd->driver->if_remove == NULL)
434 return -1;
435 return hapd->driver->if_remove(hapd->drv_priv, type, ifname);
436}
437
438
439int hostapd_set_ieee8021x(struct hostapd_data *hapd,
440 struct wpa_bss_params *params)
441{
442 if (hapd->driver == NULL || hapd->driver->set_ieee8021x == NULL)
443 return 0;
444 return hapd->driver->set_ieee8021x(hapd->drv_priv, params);
445}
446
447
448int hostapd_get_seqnum(const char *ifname, struct hostapd_data *hapd,
449 const u8 *addr, int idx, u8 *seq)
450{
451 if (hapd->driver == NULL || hapd->driver->get_seqnum == NULL)
452 return 0;
453 return hapd->driver->get_seqnum(ifname, hapd->drv_priv, addr, idx,
454 seq);
455}
456
457
458int hostapd_flush(struct hostapd_data *hapd)
459{
460 if (hapd->driver == NULL || hapd->driver->flush == NULL)
461 return 0;
462 return hapd->driver->flush(hapd->drv_priv);
463}
464
465
466int hostapd_set_freq_params(struct hostapd_freq_params *data, int mode,
467 int freq, int channel, int ht_enabled,
468 int vht_enabled, int sec_channel_offset,
469 int vht_oper_chwidth, int center_segment0,
470 int center_segment1, u32 vht_caps)
471{
472 int tmp;
473
474 os_memset(data, 0, sizeof(*data));
475 data->mode = mode;
476 data->freq = freq;
477 data->channel = channel;
478 data->ht_enabled = ht_enabled;
479 data->vht_enabled = vht_enabled;
480 data->sec_channel_offset = sec_channel_offset;
481 data->center_freq1 = freq + sec_channel_offset * 10;
482 data->center_freq2 = 0;
483 data->bandwidth = sec_channel_offset ? 40 : 20;
484
485 /*
486 * This validation code is probably misplaced, maybe it should be
487 * in src/ap/hw_features.c and check the hardware support as well.
488 */
489 if (data->vht_enabled) switch (vht_oper_chwidth) {
490 case VHT_CHANWIDTH_USE_HT:
491 if (center_segment1)
492 return -1;
493 if (5000 + center_segment0 * 5 != data->center_freq1 &&
494 2407 + center_segment0 * 5 != data->center_freq1)
495 return -1;
496 break;
497 case VHT_CHANWIDTH_80P80MHZ:
498 if (!(vht_caps & VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ)) {
499 wpa_printf(MSG_ERROR,
500 "80+80 channel width is not supported!");
501 return -1;
502 }
503 if (center_segment1 == center_segment0 + 4 ||
504 center_segment1 == center_segment0 - 4)
505 return -1;
506 data->center_freq2 = 5000 + center_segment1 * 5;
507 /* fall through */
508 case VHT_CHANWIDTH_80MHZ:
509 data->bandwidth = 80;
510 if (vht_oper_chwidth == 1 && center_segment1)
511 return -1;
512 if (vht_oper_chwidth == 3 && !center_segment1)
513 return -1;
514 if (!sec_channel_offset)
515 return -1;
516 /* primary 40 part must match the HT configuration */
517 tmp = (30 + freq - 5000 - center_segment0 * 5)/20;
518 tmp /= 2;
519 if (data->center_freq1 != 5000 +
520 center_segment0 * 5 - 20 + 40 * tmp)
521 return -1;
522 data->center_freq1 = 5000 + center_segment0 * 5;
523 break;
524 case VHT_CHANWIDTH_160MHZ:
525 data->bandwidth = 160;
526 if (!(vht_caps & (VHT_CAP_SUPP_CHAN_WIDTH_160MHZ |
527 VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ))) {
528 wpa_printf(MSG_ERROR,
529 "160MHZ channel width is not supported!");
530 return -1;
531 }
532 if (center_segment1)
533 return -1;
534 if (!sec_channel_offset)
535 return -1;
536 /* primary 40 part must match the HT configuration */
537 tmp = (70 + freq - 5000 - center_segment0 * 5)/20;
538 tmp /= 2;
539 if (data->center_freq1 != 5000 +
540 center_segment0 * 5 - 60 + 40 * tmp)
541 return -1;
542 data->center_freq1 = 5000 + center_segment0 * 5;
543 break;
544 }
545
546 return 0;
547}
548
549
550int hostapd_set_freq(struct hostapd_data *hapd, int mode, int freq,
551 int channel, int ht_enabled, int vht_enabled,
552 int sec_channel_offset, int vht_oper_chwidth,
553 int center_segment0, int center_segment1)
554{
555 struct hostapd_freq_params data;
556
557 if (hostapd_set_freq_params(&data, mode, freq, channel, ht_enabled,
558 vht_enabled, sec_channel_offset,
559 vht_oper_chwidth,
560 center_segment0, center_segment1,
561 hapd->iface->current_mode->vht_capab))
562 return -1;
563
564 if (hapd->driver == NULL)
565 return 0;
566 if (hapd->driver->set_freq == NULL)
567 return 0;
568 return hapd->driver->set_freq(hapd->drv_priv, &data);
569}
570
571int hostapd_set_rts(struct hostapd_data *hapd, int rts)
572{
573 if (hapd->driver == NULL || hapd->driver->set_rts == NULL)
574 return 0;
575 return hapd->driver->set_rts(hapd->drv_priv, rts);
576}
577
578
579int hostapd_set_frag(struct hostapd_data *hapd, int frag)
580{
581 if (hapd->driver == NULL || hapd->driver->set_frag == NULL)
582 return 0;
583 return hapd->driver->set_frag(hapd->drv_priv, frag);
584}
585
586
587int hostapd_sta_set_flags(struct hostapd_data *hapd, u8 *addr,
588 int total_flags, int flags_or, int flags_and)
589{
590 if (hapd->driver == NULL || hapd->driver->sta_set_flags == NULL)
591 return 0;
592 return hapd->driver->sta_set_flags(hapd->drv_priv, addr, total_flags,
593 flags_or, flags_and);
594}
595
596
597int hostapd_set_country(struct hostapd_data *hapd, const char *country)
598{
599 if (hapd->driver == NULL ||
600 hapd->driver->set_country == NULL)
601 return 0;
602 return hapd->driver->set_country(hapd->drv_priv, country);
603}
604
605
606int hostapd_set_tx_queue_params(struct hostapd_data *hapd, int queue, int aifs,
607 int cw_min, int cw_max, int burst_time)
608{
609 if (hapd->driver == NULL || hapd->driver->set_tx_queue_params == NULL)
610 return 0;
611 return hapd->driver->set_tx_queue_params(hapd->drv_priv, queue, aifs,
612 cw_min, cw_max, burst_time);
613}
614
615
616struct hostapd_hw_modes *
617hostapd_get_hw_feature_data(struct hostapd_data *hapd, u16 *num_modes,
618 u16 *flags)
619{
620 if (hapd->driver == NULL ||
621 hapd->driver->get_hw_feature_data == NULL)
622 return NULL;
623 return hapd->driver->get_hw_feature_data(hapd->drv_priv, num_modes,
624 flags);
625}
626
627
628int hostapd_driver_commit(struct hostapd_data *hapd)
629{
630 if (hapd->driver == NULL || hapd->driver->commit == NULL)
631 return 0;
632 return hapd->driver->commit(hapd->drv_priv);
633}
634
635
636int hostapd_drv_none(struct hostapd_data *hapd)
637{
638 return hapd->driver && os_strcmp(hapd->driver->name, "none") == 0;
639}
640
641
642int hostapd_driver_scan(struct hostapd_data *hapd,
643 struct wpa_driver_scan_params *params)
644{
645 if (hapd->driver && hapd->driver->scan2)
646 return hapd->driver->scan2(hapd->drv_priv, params);
647 return -1;
648}
649
650
651struct wpa_scan_results * hostapd_driver_get_scan_results(
652 struct hostapd_data *hapd)
653{
654 if (hapd->driver && hapd->driver->get_scan_results2)
655 return hapd->driver->get_scan_results2(hapd->drv_priv);
656 return NULL;
657}
658
659
660int hostapd_driver_set_noa(struct hostapd_data *hapd, u8 count, int start,
661 int duration)
662{
663 if (hapd->driver && hapd->driver->set_noa)
664 return hapd->driver->set_noa(hapd->drv_priv, count, start,
665 duration);
666 return -1;
667}
668
669
670int hostapd_drv_set_key(const char *ifname, struct hostapd_data *hapd,
671 enum wpa_alg alg, const u8 *addr,
672 int key_idx, int set_tx,
673 const u8 *seq, size_t seq_len,
674 const u8 *key, size_t key_len)
675{
676 if (hapd->driver == NULL || hapd->driver->set_key == NULL)
677 return 0;
678 return hapd->driver->set_key(ifname, hapd->drv_priv, alg, addr,
679 key_idx, set_tx, seq, seq_len, key,
680 key_len);
681}
682
683
684int hostapd_drv_send_mlme(struct hostapd_data *hapd,
685 const void *msg, size_t len, int noack)
686{
687 if (hapd->driver == NULL || hapd->driver->send_mlme == NULL)
688 return 0;
689 return hapd->driver->send_mlme(hapd->drv_priv, msg, len, noack);
690}
691
692
693int hostapd_drv_sta_deauth(struct hostapd_data *hapd,
694 const u8 *addr, int reason)
695{
696 if (hapd->driver == NULL || hapd->driver->sta_deauth == NULL)
697 return 0;
698 return hapd->driver->sta_deauth(hapd->drv_priv, hapd->own_addr, addr,
699 reason);
700}
701
702
703int hostapd_drv_sta_disassoc(struct hostapd_data *hapd,
704 const u8 *addr, int reason)
705{
706 if (hapd->driver == NULL || hapd->driver->sta_disassoc == NULL)
707 return 0;
708 return hapd->driver->sta_disassoc(hapd->drv_priv, hapd->own_addr, addr,
709 reason);
710}
711
712
713int hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper,
714 const u8 *peer, u8 *buf, u16 *buf_len)
715{
716 if (hapd->driver == NULL || hapd->driver->wnm_oper == NULL)
717 return -1;
718 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
719 buf_len);
720}
721
722
723int hostapd_drv_send_action(struct hostapd_data *hapd, unsigned int freq,
724 unsigned int wait, const u8 *dst, const u8 *data,
725 size_t len)
726{
727 if (hapd->driver == NULL || hapd->driver->send_action == NULL)
728 return 0;
729 return hapd->driver->send_action(hapd->drv_priv, freq, wait, dst,
730 hapd->own_addr, hapd->own_addr, data,
731 len, 0);
732}
733
734
735int hostapd_start_dfs_cac(struct hostapd_iface *iface, int mode, int freq,
736 int channel, int ht_enabled, int vht_enabled,
737 int sec_channel_offset, int vht_oper_chwidth,
738 int center_segment0, int center_segment1)
739{
740 struct hostapd_data *hapd = iface->bss[0];
741 struct hostapd_freq_params data;
742 int res;
743
744 if (!hapd->driver || !hapd->driver->start_dfs_cac)
745 return 0;
746
747 if (!iface->conf->ieee80211h) {
748 wpa_printf(MSG_ERROR, "Can't start DFS CAC, DFS functionality "
749 "is not enabled");
750 return -1;
751 }
752
753 if (hostapd_set_freq_params(&data, mode, freq, channel, ht_enabled,
754 vht_enabled, sec_channel_offset,
755 vht_oper_chwidth, center_segment0,
756 center_segment1,
757 iface->current_mode->vht_capab))
758 return -1;
759
760 res = hapd->driver->start_dfs_cac(hapd->drv_priv, &data);
761 if (!res)
762 iface->cac_started = 1;
763
764 return res;
765}
766
767
768int hostapd_drv_set_qos_map(struct hostapd_data *hapd,
769 const u8 *qos_map_set, u8 qos_map_set_len)
770{
771 if (hapd->driver == NULL || hapd->driver->set_qos_map == NULL)
772 return 0;
773 return hapd->driver->set_qos_map(hapd->drv_priv, qos_map_set,
774 qos_map_set_len);
775}