2 * WPA Supplicant - driver interaction with Linux nl80211/cfg80211
3 * Copyright (c) 2003-2008, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
12 * See README and COPYING for more details.
16 #include <sys/ioctl.h>
17 #include <net/if_arp.h>
18 #include <netlink/genl/genl.h>
19 #include <netlink/genl/family.h>
20 #include <netlink/genl/ctrl.h>
21 #include "nl80211_copy.h"
22 #include "wireless_copy.h"
27 #include "ieee802_11_defs.h"
30 #define IFF_LOWER_UP 0x10000 /* driver signals L1 up */
33 #define IFF_DORMANT 0x20000 /* driver signals dormant */
36 #ifndef IF_OPER_DORMANT
37 #define IF_OPER_DORMANT 5
44 struct wpa_driver_nl80211_data {
48 char ifname[IFNAMSIZ + 1];
51 struct wpa_driver_capa capa;
56 int scan_complete_events;
58 struct nl_handle *nl_handle;
59 struct nl_cache *nl_cache;
61 struct genl_family *nl80211;
70 static void wpa_driver_nl80211_scan_timeout(void *eloop_ctx,
72 static int wpa_driver_nl80211_set_mode(struct wpa_driver_nl80211_data *drv,
75 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv);
79 static int ack_handler(struct nl_msg *msg, void *arg)
86 static int finish_handler(struct nl_msg *msg, void *arg)
93 static int error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err,
101 static int send_and_recv_msgs(struct wpa_driver_nl80211_data *drv,
103 int (*valid_handler)(struct nl_msg *, void *),
109 cb = nl_cb_clone(drv->nl_cb);
113 err = nl_send_auto_complete(drv->nl_handle, msg);
119 nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &err);
120 nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, &err);
121 nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, ack_handler, &err);
124 nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM,
125 valid_handler, valid_data);
128 nl_recvmsgs(drv->nl_handle, cb);
142 static int family_handler(struct nl_msg *msg, void *arg)
144 struct family_data *res = arg;
145 struct nlattr *tb[CTRL_ATTR_MAX + 1];
146 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
147 struct nlattr *mcgrp;
150 nla_parse(tb, CTRL_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
151 genlmsg_attrlen(gnlh, 0), NULL);
152 if (!tb[CTRL_ATTR_MCAST_GROUPS])
155 nla_for_each_nested(mcgrp, tb[CTRL_ATTR_MCAST_GROUPS], i) {
156 struct nlattr *tb2[CTRL_ATTR_MCAST_GRP_MAX + 1];
157 nla_parse(tb2, CTRL_ATTR_MCAST_GRP_MAX, nla_data(mcgrp),
158 nla_len(mcgrp), NULL);
159 if (!tb2[CTRL_ATTR_MCAST_GRP_NAME] ||
160 !tb2[CTRL_ATTR_MCAST_GRP_ID] ||
161 os_strncmp(nla_data(tb2[CTRL_ATTR_MCAST_GRP_NAME]),
163 nla_len(tb2[CTRL_ATTR_MCAST_GRP_NAME])) != 0)
165 res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]);
173 static int nl_get_multicast_id(struct wpa_driver_nl80211_data *drv,
174 const char *family, const char *group)
178 struct family_data res = { group, -ENOENT };
183 genlmsg_put(msg, 0, 0, genl_ctrl_resolve(drv->nl_handle, "nlctrl"),
184 0, 0, CTRL_CMD_GETFAMILY, 0);
185 NLA_PUT_STRING(msg, CTRL_ATTR_FAMILY_NAME, family);
187 ret = send_and_recv_msgs(drv, msg, family_handler, &res);
198 static int wpa_driver_nl80211_send_oper_ifla(
199 struct wpa_driver_nl80211_data *drv,
200 int linkmode, int operstate)
204 struct ifinfomsg ifinfo;
211 os_memset(&req, 0, sizeof(req));
213 req.hdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
214 req.hdr.nlmsg_type = RTM_SETLINK;
215 req.hdr.nlmsg_flags = NLM_F_REQUEST;
216 req.hdr.nlmsg_seq = ++nl_seq;
217 req.hdr.nlmsg_pid = 0;
219 req.ifinfo.ifi_family = AF_UNSPEC;
220 req.ifinfo.ifi_type = 0;
221 req.ifinfo.ifi_index = drv->ifindex;
222 req.ifinfo.ifi_flags = 0;
223 req.ifinfo.ifi_change = 0;
225 if (linkmode != -1) {
226 rta = (struct rtattr *)
227 ((char *) &req + NLMSG_ALIGN(req.hdr.nlmsg_len));
228 rta->rta_type = IFLA_LINKMODE;
229 rta->rta_len = RTA_LENGTH(sizeof(char));
230 *((char *) RTA_DATA(rta)) = linkmode;
231 req.hdr.nlmsg_len = NLMSG_ALIGN(req.hdr.nlmsg_len) +
232 RTA_LENGTH(sizeof(char));
234 if (operstate != -1) {
235 rta = (struct rtattr *)
236 ((char *) &req + NLMSG_ALIGN(req.hdr.nlmsg_len));
237 rta->rta_type = IFLA_OPERSTATE;
238 rta->rta_len = RTA_LENGTH(sizeof(char));
239 *((char *) RTA_DATA(rta)) = operstate;
240 req.hdr.nlmsg_len = NLMSG_ALIGN(req.hdr.nlmsg_len) +
241 RTA_LENGTH(sizeof(char));
244 wpa_printf(MSG_DEBUG, "WEXT: Operstate: linkmode=%d, operstate=%d",
245 linkmode, operstate);
247 ret = send(drv->link_event_sock, &req, req.hdr.nlmsg_len, 0);
249 wpa_printf(MSG_DEBUG, "WEXT: Sending operstate IFLA failed: "
250 "%s (assume operstate is not supported)",
254 return ret < 0 ? -1 : 0;
258 static int wpa_driver_nl80211_set_auth_param(
259 struct wpa_driver_nl80211_data *drv, int idx, u32 value)
264 os_memset(&iwr, 0, sizeof(iwr));
265 os_strlcpy(iwr.ifr_name, drv->ifname, IFNAMSIZ);
266 iwr.u.param.flags = idx & IW_AUTH_INDEX;
267 iwr.u.param.value = value;
269 if (ioctl(drv->ioctl_sock, SIOCSIWAUTH, &iwr) < 0) {
270 if (errno != EOPNOTSUPP) {
271 wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d "
272 "value 0x%x) failed: %s)",
273 idx, value, strerror(errno));
275 ret = errno == EOPNOTSUPP ? -2 : -1;
282 static int wpa_driver_nl80211_get_bssid(void *priv, u8 *bssid)
284 struct wpa_driver_nl80211_data *drv = priv;
285 if (!drv->associated)
287 os_memcpy(bssid, drv->bssid, ETH_ALEN);
292 static int wpa_driver_nl80211_get_ssid(void *priv, u8 *ssid)
294 struct wpa_driver_nl80211_data *drv = priv;
295 if (!drv->associated)
297 os_memcpy(ssid, drv->ssid, drv->ssid_len);
298 return drv->ssid_len;
302 static void wpa_driver_nl80211_event_link(struct wpa_driver_nl80211_data *drv,
303 void *ctx, char *buf, size_t len,
306 union wpa_event_data event;
308 os_memset(&event, 0, sizeof(event));
309 if (len > sizeof(event.interface_status.ifname))
310 len = sizeof(event.interface_status.ifname) - 1;
311 os_memcpy(event.interface_status.ifname, buf, len);
312 event.interface_status.ievent = del ? EVENT_INTERFACE_REMOVED :
313 EVENT_INTERFACE_ADDED;
315 wpa_printf(MSG_DEBUG, "RTM_%sLINK, IFLA_IFNAME: Interface '%s' %s",
317 event.interface_status.ifname,
318 del ? "removed" : "added");
320 if (os_strcmp(drv->ifname, event.interface_status.ifname) == 0) {
327 wpa_supplicant_event(ctx, EVENT_INTERFACE_STATUS, &event);
331 static int wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data *drv,
334 struct ifinfomsg *ifi;
335 int attrlen, _nlmsg_len, rta_len;
340 _nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
342 attrlen = h->nlmsg_len - _nlmsg_len;
346 attr = (struct rtattr *) (((char *) ifi) + _nlmsg_len);
348 rta_len = RTA_ALIGN(sizeof(struct rtattr));
349 while (RTA_OK(attr, attrlen)) {
350 if (attr->rta_type == IFLA_IFNAME) {
351 if (os_strcmp(((char *) attr) + rta_len, drv->ifname)
357 attr = RTA_NEXT(attr, attrlen);
364 static int wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data *drv,
365 int ifindex, struct nlmsghdr *h)
367 if (drv->ifindex == ifindex)
370 if (drv->if_removed && wpa_driver_nl80211_own_ifname(drv, h)) {
371 drv->ifindex = if_nametoindex(drv->ifname);
372 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
374 wpa_driver_nl80211_finish_drv_init(drv);
382 static void wpa_driver_nl80211_event_rtm_newlink(struct wpa_driver_nl80211_data *drv,
383 void *ctx, struct nlmsghdr *h,
386 struct ifinfomsg *ifi;
387 int attrlen, _nlmsg_len, rta_len;
388 struct rtattr * attr;
390 if (len < sizeof(*ifi))
395 if (!wpa_driver_nl80211_own_ifindex(drv, ifi->ifi_index, h)) {
396 wpa_printf(MSG_DEBUG, "Ignore event for foreign ifindex %d",
401 wpa_printf(MSG_DEBUG, "RTM_NEWLINK: operstate=%d ifi_flags=0x%x "
403 drv->operstate, ifi->ifi_flags,
404 (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
405 (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
406 (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
407 (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
409 * Some drivers send the association event before the operup event--in
410 * this case, lifting operstate in wpa_driver_nl80211_set_operstate()
411 * fails. This will hit us when wpa_supplicant does not need to do
412 * IEEE 802.1X authentication
414 if (drv->operstate == 1 &&
415 (ifi->ifi_flags & (IFF_LOWER_UP | IFF_DORMANT)) == IFF_LOWER_UP &&
416 !(ifi->ifi_flags & IFF_RUNNING))
417 wpa_driver_nl80211_send_oper_ifla(drv, -1, IF_OPER_UP);
419 _nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
421 attrlen = h->nlmsg_len - _nlmsg_len;
425 attr = (struct rtattr *) (((char *) ifi) + _nlmsg_len);
427 rta_len = RTA_ALIGN(sizeof(struct rtattr));
428 while (RTA_OK(attr, attrlen)) {
429 if (attr->rta_type == IFLA_IFNAME) {
430 wpa_driver_nl80211_event_link(
432 ((char *) attr) + rta_len,
433 attr->rta_len - rta_len, 0);
435 attr = RTA_NEXT(attr, attrlen);
440 static void wpa_driver_nl80211_event_rtm_dellink(struct wpa_driver_nl80211_data *drv,
441 void *ctx, struct nlmsghdr *h,
444 struct ifinfomsg *ifi;
445 int attrlen, _nlmsg_len, rta_len;
446 struct rtattr * attr;
448 if (len < sizeof(*ifi))
453 _nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
455 attrlen = h->nlmsg_len - _nlmsg_len;
459 attr = (struct rtattr *) (((char *) ifi) + _nlmsg_len);
461 rta_len = RTA_ALIGN(sizeof(struct rtattr));
462 while (RTA_OK(attr, attrlen)) {
463 if (attr->rta_type == IFLA_IFNAME) {
464 wpa_driver_nl80211_event_link(
466 ((char *) attr) + rta_len,
467 attr->rta_len - rta_len, 1);
469 attr = RTA_NEXT(attr, attrlen);
474 static void wpa_driver_nl80211_event_receive_link(int sock, void *eloop_ctx,
479 struct sockaddr_nl from;
485 fromlen = sizeof(from);
486 left = recvfrom(sock, buf, sizeof(buf), MSG_DONTWAIT,
487 (struct sockaddr *) &from, &fromlen);
489 if (errno != EINTR && errno != EAGAIN)
490 perror("recvfrom(netlink)");
494 h = (struct nlmsghdr *) buf;
495 while (left >= (int) sizeof(*h)) {
499 plen = len - sizeof(*h);
500 if (len > left || plen < 0) {
501 wpa_printf(MSG_DEBUG, "Malformed netlink message: "
502 "len=%d left=%d plen=%d",
507 switch (h->nlmsg_type) {
509 wpa_driver_nl80211_event_rtm_newlink(eloop_ctx, sock_ctx,
513 wpa_driver_nl80211_event_rtm_dellink(eloop_ctx, sock_ctx,
518 len = NLMSG_ALIGN(len);
520 h = (struct nlmsghdr *) ((char *) h + len);
524 wpa_printf(MSG_DEBUG, "%d extra bytes in the end of netlink "
528 if (--max_events > 0) {
530 * Try to receive all events in one eloop call in order to
531 * limit race condition on cases where AssocInfo event, Assoc
532 * event, and EAPOL frames are received more or less at the
533 * same time. We want to process the event messages first
534 * before starting EAPOL processing.
541 static int no_seq_check(struct nl_msg *msg, void *arg)
547 static void mlme_event_auth(struct wpa_driver_nl80211_data *drv,
548 const u8 *frame, size_t len)
550 const struct ieee80211_mgmt *mgmt;
551 union wpa_event_data event;
553 mgmt = (const struct ieee80211_mgmt *) frame;
554 if (len < 24 + sizeof(mgmt->u.auth)) {
555 wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
560 os_memset(&event, 0, sizeof(event));
561 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
562 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg);
563 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code);
564 if (len > 24 + sizeof(mgmt->u.auth)) {
565 event.auth.ies = mgmt->u.auth.variable;
566 event.auth.ies_len = len - 24 - sizeof(mgmt->u.auth);
569 wpa_supplicant_event(drv->ctx, EVENT_AUTH, &event);
573 static void mlme_event_assoc(struct wpa_driver_nl80211_data *drv,
574 const u8 *frame, size_t len)
576 const struct ieee80211_mgmt *mgmt;
577 union wpa_event_data event;
580 mgmt = (const struct ieee80211_mgmt *) frame;
581 if (len < 24 + sizeof(mgmt->u.assoc_resp)) {
582 wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
587 status = le_to_host16(mgmt->u.assoc_resp.status_code);
588 if (status != WLAN_STATUS_SUCCESS) {
589 os_memset(&event, 0, sizeof(event));
590 if (len > 24 + sizeof(mgmt->u.assoc_resp)) {
591 event.assoc_reject.resp_ies =
592 (u8 *) mgmt->u.assoc_resp.variable;
593 event.assoc_reject.resp_ies_len =
594 len - 24 - sizeof(mgmt->u.assoc_resp);
596 event.assoc_reject.status_code = status;
598 wpa_supplicant_event(drv->ctx, EVENT_ASSOC_REJECT, &event);
603 os_memcpy(drv->bssid, mgmt->sa, ETH_ALEN);
605 os_memset(&event, 0, sizeof(event));
606 if (len > 24 + sizeof(mgmt->u.assoc_resp)) {
607 event.assoc_info.resp_ies = (u8 *) mgmt->u.assoc_resp.variable;
608 event.assoc_info.resp_ies_len =
609 len - 24 - sizeof(mgmt->u.assoc_resp);
612 wpa_supplicant_event(drv->ctx, EVENT_ASSOC, &event);
616 static void mlme_event(struct wpa_driver_nl80211_data *drv,
617 enum nl80211_commands cmd, struct nlattr *frame)
620 wpa_printf(MSG_DEBUG, "nl80211: MLME event %d without frame "
625 wpa_printf(MSG_DEBUG, "nl80211: MLME event %d", cmd);
626 wpa_hexdump(MSG_MSGDUMP, "nl80211: MLME event frame",
627 nla_data(frame), nla_len(frame));
630 case NL80211_CMD_AUTHENTICATE:
631 mlme_event_auth(drv, nla_data(frame), nla_len(frame));
633 case NL80211_CMD_ASSOCIATE:
634 mlme_event_assoc(drv, nla_data(frame), nla_len(frame));
636 case NL80211_CMD_DEAUTHENTICATE:
638 wpa_supplicant_event(drv->ctx, EVENT_DEAUTH, NULL);
640 case NL80211_CMD_DISASSOCIATE:
642 wpa_supplicant_event(drv->ctx, EVENT_DISASSOC, NULL);
650 static int process_event(struct nl_msg *msg, void *arg)
652 struct wpa_driver_nl80211_data *drv = arg;
653 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
654 struct nlattr *tb[NL80211_ATTR_MAX + 1];
656 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
657 genlmsg_attrlen(gnlh, 0), NULL);
659 if (tb[NL80211_ATTR_IFINDEX]) {
660 int ifindex = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
661 if (ifindex != drv->ifindex) {
662 wpa_printf(MSG_DEBUG, "nl80211: Ignored event (cmd=%d)"
663 " for foreign interface (ifindex %d)",
670 case NL80211_CMD_NEW_SCAN_RESULTS:
671 wpa_printf(MSG_DEBUG, "nl80211: New scan results available");
672 drv->scan_complete_events = 1;
673 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv,
675 wpa_supplicant_event(drv->ctx, EVENT_SCAN_RESULTS, NULL);
677 case NL80211_CMD_SCAN_ABORTED:
678 wpa_printf(MSG_DEBUG, "nl80211: Scan aborted");
680 * Need to indicate that scan results are available in order
681 * not to make wpa_supplicant stop its scanning.
683 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv,
685 wpa_supplicant_event(drv->ctx, EVENT_SCAN_RESULTS, NULL);
687 case NL80211_CMD_AUTHENTICATE:
688 case NL80211_CMD_ASSOCIATE:
689 case NL80211_CMD_DEAUTHENTICATE:
690 case NL80211_CMD_DISASSOCIATE:
691 mlme_event(drv, gnlh->cmd, tb[NL80211_ATTR_FRAME]);
694 wpa_printf(MSG_DEBUG, "nl80211: Ignored unknown event "
695 "(cmd=%d)", gnlh->cmd);
703 static void wpa_driver_nl80211_event_receive(int sock, void *eloop_ctx,
707 struct wpa_driver_nl80211_data *drv = eloop_ctx;
709 wpa_printf(MSG_DEBUG, "nl80211: Event message available");
711 cb = nl_cb_clone(drv->nl_cb);
714 nl_cb_set(cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL);
715 nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, process_event, drv);
716 nl_recvmsgs(drv->nl_handle, cb);
721 static int wpa_driver_nl80211_get_ifflags_ifname(struct wpa_driver_nl80211_data *drv,
722 const char *ifname, int *flags)
726 os_memset(&ifr, 0, sizeof(ifr));
727 os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
728 if (ioctl(drv->ioctl_sock, SIOCGIFFLAGS, (caddr_t) &ifr) < 0) {
729 perror("ioctl[SIOCGIFFLAGS]");
732 *flags = ifr.ifr_flags & 0xffff;
738 * wpa_driver_nl80211_get_ifflags - Get interface flags (SIOCGIFFLAGS)
739 * @drv: driver_nl80211 private data
740 * @flags: Pointer to returned flags value
741 * Returns: 0 on success, -1 on failure
743 static int wpa_driver_nl80211_get_ifflags(struct wpa_driver_nl80211_data *drv,
746 return wpa_driver_nl80211_get_ifflags_ifname(drv, drv->ifname, flags);
750 static int wpa_driver_nl80211_set_ifflags_ifname(
751 struct wpa_driver_nl80211_data *drv,
752 const char *ifname, int flags)
756 os_memset(&ifr, 0, sizeof(ifr));
757 os_strlcpy(ifr.ifr_name, ifname, IFNAMSIZ);
758 ifr.ifr_flags = flags & 0xffff;
759 if (ioctl(drv->ioctl_sock, SIOCSIFFLAGS, (caddr_t) &ifr) < 0) {
760 perror("SIOCSIFFLAGS");
768 * wpa_driver_nl80211_set_ifflags - Set interface flags (SIOCSIFFLAGS)
769 * @drv: driver_nl80211 private data
770 * @flags: New value for flags
771 * Returns: 0 on success, -1 on failure
773 static int wpa_driver_nl80211_set_ifflags(struct wpa_driver_nl80211_data *drv,
776 return wpa_driver_nl80211_set_ifflags_ifname(drv, drv->ifname, flags);
781 * wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain
782 * @priv: driver_nl80211 private data
783 * @alpha2_arg: country to which to switch to
784 * Returns: 0 on success, -1 on failure
786 * This asks nl80211 to set the regulatory domain for given
787 * country ISO / IEC alpha2.
789 static int wpa_driver_nl80211_set_country(void *priv, const char *alpha2_arg)
791 struct wpa_driver_nl80211_data *drv = priv;
797 goto nla_put_failure;
799 alpha2[0] = alpha2_arg[0];
800 alpha2[1] = alpha2_arg[1];
803 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
804 0, NL80211_CMD_REQ_SET_REG, 0);
806 NLA_PUT_STRING(msg, NL80211_ATTR_REG_ALPHA2, alpha2);
807 if (send_and_recv_msgs(drv, msg, NULL, NULL))
815 struct wiphy_info_data {
821 static int wiphy_info_handler(struct nl_msg *msg, void *arg)
823 struct nlattr *tb[NL80211_ATTR_MAX + 1];
824 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
825 struct wiphy_info_data *info = arg;
827 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
828 genlmsg_attrlen(gnlh, 0), NULL);
830 if (tb[NL80211_ATTR_MAX_NUM_SCAN_SSIDS])
831 info->max_scan_ssids =
832 nla_get_u8(tb[NL80211_ATTR_MAX_NUM_SCAN_SSIDS]);
834 if (tb[NL80211_ATTR_SUPPORTED_IFTYPES]) {
835 struct nlattr *nl_mode;
837 nla_for_each_nested(nl_mode,
838 tb[NL80211_ATTR_SUPPORTED_IFTYPES], i) {
839 if (nl_mode->nla_type == NL80211_IFTYPE_AP) {
840 info->ap_supported = 1;
850 static int wpa_driver_nl80211_get_info(struct wpa_driver_nl80211_data *drv,
851 struct wiphy_info_data *info)
855 os_memset(info, 0, sizeof(*info));
860 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
861 0, NL80211_CMD_GET_WIPHY, 0);
863 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
865 if (send_and_recv_msgs(drv, msg, wiphy_info_handler, info) == 0)
874 static void wpa_driver_nl80211_capa(struct wpa_driver_nl80211_data *drv)
876 struct wiphy_info_data info;
877 if (wpa_driver_nl80211_get_info(drv, &info))
879 drv->has_capability = 1;
880 /* For now, assume TKIP, CCMP, WPA, WPA2 are supported */
881 drv->capa.key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |
882 WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
883 WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
884 WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK;
885 drv->capa.enc = WPA_DRIVER_CAPA_ENC_WEP40 |
886 WPA_DRIVER_CAPA_ENC_WEP104 |
887 WPA_DRIVER_CAPA_ENC_TKIP |
888 WPA_DRIVER_CAPA_ENC_CCMP;
890 drv->capa.max_scan_ssids = info.max_scan_ssids;
891 if (info.ap_supported)
892 drv->capa.flags |= WPA_DRIVER_FLAGS_AP;
897 * wpa_driver_nl80211_init - Initialize nl80211 driver interface
898 * @ctx: context to be used when calling wpa_supplicant functions,
899 * e.g., wpa_supplicant_event()
900 * @ifname: interface name, e.g., wlan0
901 * Returns: Pointer to private data, %NULL on failure
903 static void * wpa_driver_nl80211_init(void *ctx, const char *ifname)
906 struct sockaddr_nl local;
907 struct wpa_driver_nl80211_data *drv;
909 drv = os_zalloc(sizeof(*drv));
913 os_strlcpy(drv->ifname, ifname, sizeof(drv->ifname));
915 drv->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
916 if (drv->nl_cb == NULL) {
917 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
922 drv->nl_handle = nl_handle_alloc_cb(drv->nl_cb);
923 if (drv->nl_handle == NULL) {
924 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
929 if (genl_connect(drv->nl_handle)) {
930 wpa_printf(MSG_ERROR, "nl80211: Failed to connect to generic "
935 drv->nl_cache = genl_ctrl_alloc_cache(drv->nl_handle);
936 if (drv->nl_cache == NULL) {
937 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate generic "
942 drv->nl80211 = genl_ctrl_search_by_name(drv->nl_cache, "nl80211");
943 if (drv->nl80211 == NULL) {
944 wpa_printf(MSG_ERROR, "nl80211: 'nl80211' generic netlink not "
949 ret = nl_get_multicast_id(drv, "nl80211", "scan");
951 ret = nl_socket_add_membership(drv->nl_handle, ret);
953 wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
954 "membership for scan events: %d (%s)",
955 ret, strerror(-ret));
959 ret = nl_get_multicast_id(drv, "nl80211", "mlme");
961 ret = nl_socket_add_membership(drv->nl_handle, ret);
963 wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
964 "membership for mlme events: %d (%s)",
965 ret, strerror(-ret));
968 drv->capa.flags |= WPA_DRIVER_FLAGS_SME;
970 eloop_register_read_sock(nl_socket_get_fd(drv->nl_handle),
971 wpa_driver_nl80211_event_receive, drv, ctx);
973 drv->ioctl_sock = socket(PF_INET, SOCK_DGRAM, 0);
974 if (drv->ioctl_sock < 0) {
975 perror("socket(PF_INET,SOCK_DGRAM)");
979 s = socket(PF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
981 perror("socket(PF_NETLINK,SOCK_RAW,NETLINK_ROUTE)");
985 os_memset(&local, 0, sizeof(local));
986 local.nl_family = AF_NETLINK;
987 local.nl_groups = RTMGRP_LINK;
988 if (bind(s, (struct sockaddr *) &local, sizeof(local)) < 0) {
989 perror("bind(netlink)");
994 eloop_register_read_sock(s, wpa_driver_nl80211_event_receive_link, drv,
996 drv->link_event_sock = s;
998 if (wpa_driver_nl80211_finish_drv_init(drv))
1004 eloop_unregister_read_sock(drv->link_event_sock);
1005 close(drv->link_event_sock);
1007 close(drv->ioctl_sock);
1009 genl_family_put(drv->nl80211);
1011 nl_cache_free(drv->nl_cache);
1013 nl_handle_destroy(drv->nl_handle);
1015 nl_cb_put(drv->nl_cb);
1023 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv)
1027 drv->ifindex = if_nametoindex(drv->ifname);
1029 if (wpa_driver_nl80211_set_mode(drv, 0) < 0) {
1030 wpa_printf(MSG_DEBUG, "nl80211: Could not configure driver to "
1031 "use managed mode");
1034 if (wpa_driver_nl80211_get_ifflags(drv, &flags) != 0) {
1035 wpa_printf(MSG_ERROR, "Could not get interface '%s' flags",
1039 if (!(flags & IFF_UP)) {
1040 if (wpa_driver_nl80211_set_ifflags(drv, flags | IFF_UP) != 0) {
1041 wpa_printf(MSG_ERROR, "Could not set interface '%s' "
1047 wpa_driver_nl80211_capa(drv);
1049 wpa_driver_nl80211_send_oper_ifla(drv, 1, IF_OPER_DORMANT);
1056 * wpa_driver_nl80211_deinit - Deinitialize nl80211 driver interface
1057 * @priv: Pointer to private nl80211 data from wpa_driver_nl80211_init()
1059 * Shut down driver interface and processing of driver events. Free
1060 * private data buffer if one was allocated in wpa_driver_nl80211_init().
1062 static void wpa_driver_nl80211_deinit(void *priv)
1064 struct wpa_driver_nl80211_data *drv = priv;
1067 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
1069 wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_DROP_UNENCRYPTED, 0);
1071 wpa_driver_nl80211_send_oper_ifla(priv, 0, IF_OPER_UP);
1073 eloop_unregister_read_sock(drv->link_event_sock);
1075 if (wpa_driver_nl80211_get_ifflags(drv, &flags) == 0)
1076 (void) wpa_driver_nl80211_set_ifflags(drv, flags & ~IFF_UP);
1077 wpa_driver_nl80211_set_mode(drv, 0);
1079 close(drv->link_event_sock);
1080 close(drv->ioctl_sock);
1082 eloop_unregister_read_sock(nl_socket_get_fd(drv->nl_handle));
1083 genl_family_put(drv->nl80211);
1084 nl_cache_free(drv->nl_cache);
1085 nl_handle_destroy(drv->nl_handle);
1086 nl_cb_put(drv->nl_cb);
1093 * wpa_driver_nl80211_scan_timeout - Scan timeout to report scan completion
1094 * @eloop_ctx: Unused
1095 * @timeout_ctx: ctx argument given to wpa_driver_nl80211_init()
1097 * This function can be used as registered timeout when starting a scan to
1098 * generate a scan completed event if the driver does not report this.
1100 static void wpa_driver_nl80211_scan_timeout(void *eloop_ctx, void *timeout_ctx)
1102 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
1103 wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
1108 * wpa_driver_nl80211_scan - Request the driver to initiate scan
1109 * @priv: Pointer to private wext data from wpa_driver_nl80211_init()
1110 * @params: Scan parameters
1111 * Returns: 0 on success, -1 on failure
1113 static int wpa_driver_nl80211_scan(void *priv,
1114 struct wpa_driver_scan_params *params)
1116 struct wpa_driver_nl80211_data *drv = priv;
1117 int ret = 0, timeout;
1118 struct nl_msg *msg, *ssids, *freqs;
1121 msg = nlmsg_alloc();
1122 ssids = nlmsg_alloc();
1123 freqs = nlmsg_alloc();
1124 if (!msg || !ssids || !freqs) {
1131 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
1132 NL80211_CMD_TRIGGER_SCAN, 0);
1134 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1136 for (i = 0; i < params->num_ssids; i++) {
1137 NLA_PUT(ssids, i + 1, params->ssids[i].ssid_len,
1138 params->ssids[i].ssid);
1140 if (params->num_ssids)
1141 nla_put_nested(msg, NL80211_ATTR_SCAN_SSIDS, ssids);
1143 if (params->extra_ies) {
1144 NLA_PUT(msg, NL80211_ATTR_IE, params->extra_ies_len,
1148 if (params->freqs) {
1149 for (i = 0; params->freqs[i]; i++)
1150 NLA_PUT_U32(freqs, i + 1, params->freqs[i]);
1151 nla_put_nested(msg, NL80211_ATTR_SCAN_FREQUENCIES, freqs);
1154 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1157 wpa_printf(MSG_DEBUG, "nl80211: Scan trigger failed: ret=%d "
1158 "(%s)", ret, strerror(-ret));
1159 goto nla_put_failure;
1162 /* Not all drivers generate "scan completed" wireless event, so try to
1163 * read results after a timeout. */
1165 if (drv->scan_complete_events) {
1167 * The driver seems to deliver events to notify when scan is
1168 * complete, so use longer timeout to avoid race conditions
1169 * with scanning and following association request.
1173 wpa_printf(MSG_DEBUG, "Scan requested (ret=%d) - scan timeout %d "
1174 "seconds", ret, timeout);
1175 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
1176 eloop_register_timeout(timeout, 0, wpa_driver_nl80211_scan_timeout,
1187 static int bss_info_handler(struct nl_msg *msg, void *arg)
1189 struct nlattr *tb[NL80211_ATTR_MAX + 1];
1190 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1191 struct nlattr *bss[NL80211_BSS_MAX + 1];
1192 static struct nla_policy bss_policy[NL80211_BSS_MAX + 1] = {
1193 [NL80211_BSS_BSSID] = { .type = NLA_UNSPEC },
1194 [NL80211_BSS_FREQUENCY] = { .type = NLA_U32 },
1195 [NL80211_BSS_TSF] = { .type = NLA_U64 },
1196 [NL80211_BSS_BEACON_INTERVAL] = { .type = NLA_U16 },
1197 [NL80211_BSS_CAPABILITY] = { .type = NLA_U16 },
1198 [NL80211_BSS_INFORMATION_ELEMENTS] = { .type = NLA_UNSPEC },
1199 [NL80211_BSS_SIGNAL_MBM] = { .type = NLA_U32 },
1200 [NL80211_BSS_SIGNAL_UNSPEC] = { .type = NLA_U8 },
1202 struct wpa_scan_results *res = arg;
1203 struct wpa_scan_res **tmp;
1204 struct wpa_scan_res *r;
1208 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1209 genlmsg_attrlen(gnlh, 0), NULL);
1210 if (!tb[NL80211_ATTR_BSS])
1212 if (nla_parse_nested(bss, NL80211_BSS_MAX, tb[NL80211_ATTR_BSS],
1215 if (bss[NL80211_BSS_INFORMATION_ELEMENTS]) {
1216 ie = nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
1217 ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
1223 r = os_zalloc(sizeof(*r) + ie_len);
1226 if (bss[NL80211_BSS_BSSID])
1227 os_memcpy(r->bssid, nla_data(bss[NL80211_BSS_BSSID]),
1229 if (bss[NL80211_BSS_FREQUENCY])
1230 r->freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
1231 if (bss[NL80211_BSS_BEACON_INTERVAL])
1232 r->beacon_int = nla_get_u16(bss[NL80211_BSS_BEACON_INTERVAL]);
1233 if (bss[NL80211_BSS_CAPABILITY])
1234 r->caps = nla_get_u16(bss[NL80211_BSS_CAPABILITY]);
1235 r->flags |= WPA_SCAN_NOISE_INVALID;
1236 if (bss[NL80211_BSS_SIGNAL_MBM]) {
1237 r->level = nla_get_u32(bss[NL80211_BSS_SIGNAL_MBM]);
1238 r->level /= 100; /* mBm to dBm */
1239 r->flags |= WPA_SCAN_LEVEL_DBM | WPA_SCAN_QUAL_INVALID;
1240 } else if (bss[NL80211_BSS_SIGNAL_UNSPEC]) {
1241 r->level = nla_get_u8(bss[NL80211_BSS_SIGNAL_UNSPEC]);
1242 r->flags |= WPA_SCAN_LEVEL_INVALID;
1244 r->flags |= WPA_SCAN_LEVEL_INVALID | WPA_SCAN_QUAL_INVALID;
1245 if (bss[NL80211_BSS_TSF])
1246 r->tsf = nla_get_u64(bss[NL80211_BSS_TSF]);
1249 os_memcpy(r + 1, ie, ie_len);
1251 tmp = os_realloc(res->res,
1252 (res->num + 1) * sizeof(struct wpa_scan_res *));
1257 tmp[res->num++] = r;
1265 * wpa_driver_nl80211_get_scan_results - Fetch the latest scan results
1266 * @priv: Pointer to private wext data from wpa_driver_nl80211_init()
1267 * Returns: Scan results on success, -1 on failure
1269 static struct wpa_scan_results *
1270 wpa_driver_nl80211_get_scan_results(void *priv)
1272 struct wpa_driver_nl80211_data *drv = priv;
1274 struct wpa_scan_results *res;
1277 res = os_zalloc(sizeof(*res));
1280 msg = nlmsg_alloc();
1282 goto nla_put_failure;
1284 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, NLM_F_DUMP,
1285 NL80211_CMD_GET_SCAN, 0);
1286 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1288 ret = send_and_recv_msgs(drv, msg, bss_info_handler, res);
1291 wpa_printf(MSG_DEBUG, "Received scan results (%lu BSSes)",
1292 (unsigned long) res->num);
1295 wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
1296 "(%s)", ret, strerror(-ret));
1299 wpa_scan_results_free(res);
1304 static int wpa_driver_nl80211_set_key(void *priv, wpa_alg alg,
1305 const u8 *addr, int key_idx,
1306 int set_tx, const u8 *seq,
1308 const u8 *key, size_t key_len)
1310 struct wpa_driver_nl80211_data *drv = priv;
1314 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d "
1315 "seq_len=%lu key_len=%lu",
1316 __func__, alg, addr, key_idx, set_tx,
1317 (unsigned long) seq_len, (unsigned long) key_len);
1319 msg = nlmsg_alloc();
1323 if (alg == WPA_ALG_NONE) {
1324 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
1325 NL80211_CMD_DEL_KEY, 0);
1327 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
1328 NL80211_CMD_NEW_KEY, 0);
1329 NLA_PUT(msg, NL80211_ATTR_KEY_DATA, key_len, key);
1333 NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER,
1336 NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER,
1340 NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC02);
1343 NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC04);
1345 #ifdef CONFIG_IEEE80211W
1347 NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER, 0x000FAC06);
1349 #endif /* CONFIG_IEEE80211W */
1356 if (addr && os_memcmp(addr, "\xff\xff\xff\xff\xff\xff", ETH_ALEN) != 0)
1358 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
1359 NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
1361 NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx);
1362 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1364 err = send_and_recv_msgs(drv, msg, NULL, NULL);
1366 wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d", err);
1370 if (set_tx && alg != WPA_ALG_NONE) {
1371 msg = nlmsg_alloc();
1375 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
1376 0, NL80211_CMD_SET_KEY, 0);
1377 NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx);
1378 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1379 NLA_PUT_FLAG(msg, NL80211_ATTR_KEY_DEFAULT);
1381 err = send_and_recv_msgs(drv, msg, NULL, NULL);
1383 wpa_printf(MSG_DEBUG, "nl80211: set default key "
1384 "failed; err=%d", err);
1396 static int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
1397 const u8 *addr, int cmd, u16 reason_code)
1402 msg = nlmsg_alloc();
1406 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0, cmd, 0);
1408 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1409 NLA_PUT_U16(msg, NL80211_ATTR_REASON_CODE, reason_code);
1410 NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
1412 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1415 wpa_printf(MSG_DEBUG, "nl80211: MLME command failed: ret=%d "
1416 "(%s)", ret, strerror(-ret));
1417 goto nla_put_failure;
1427 static int wpa_driver_nl80211_deauthenticate(void *priv, const u8 *addr,
1430 struct wpa_driver_nl80211_data *drv = priv;
1431 wpa_printf(MSG_DEBUG, "%s", __func__);
1432 return wpa_driver_nl80211_mlme(drv, addr, NL80211_CMD_DEAUTHENTICATE,
1437 static int wpa_driver_nl80211_disassociate(void *priv, const u8 *addr,
1440 struct wpa_driver_nl80211_data *drv = priv;
1441 wpa_printf(MSG_DEBUG, "%s", __func__);
1442 return wpa_driver_nl80211_mlme(drv, addr, NL80211_CMD_DISASSOCIATE,
1447 static int wpa_driver_nl80211_authenticate(
1448 void *priv, struct wpa_driver_auth_params *params)
1450 struct wpa_driver_nl80211_data *drv = priv;
1453 enum nl80211_auth_type type;
1455 drv->associated = 0;
1457 msg = nlmsg_alloc();
1461 wpa_printf(MSG_DEBUG, "nl80211: Authenticate (ifindex=%d)",
1463 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
1464 NL80211_CMD_AUTHENTICATE, 0);
1466 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1467 if (params->bssid) {
1468 wpa_printf(MSG_DEBUG, " * bssid=" MACSTR,
1469 MAC2STR(params->bssid));
1470 NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid);
1473 wpa_printf(MSG_DEBUG, " * freq=%d", params->freq);
1474 NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq);
1477 wpa_hexdump_ascii(MSG_DEBUG, " * SSID",
1478 params->ssid, params->ssid_len);
1479 NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
1482 wpa_hexdump(MSG_DEBUG, " * IEs", params->ie, params->ie_len);
1484 NLA_PUT(msg, NL80211_ATTR_IE, params->ie_len, params->ie);
1486 * TODO: if multiple auth_alg options enabled, try them one by one if
1487 * the AP rejects authentication due to unknown auth alg
1489 if (params->auth_alg & AUTH_ALG_OPEN_SYSTEM)
1490 type = NL80211_AUTHTYPE_OPEN_SYSTEM;
1491 else if (params->auth_alg & AUTH_ALG_SHARED_KEY)
1492 type = NL80211_AUTHTYPE_SHARED_KEY;
1493 else if (params->auth_alg & AUTH_ALG_LEAP)
1494 type = NL80211_AUTHTYPE_NETWORK_EAP;
1495 else if (params->auth_alg & AUTH_ALG_FT)
1496 type = NL80211_AUTHTYPE_FT;
1498 goto nla_put_failure;
1499 wpa_printf(MSG_DEBUG, " * Auth Type %d", type);
1500 NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE, type);
1502 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1505 wpa_printf(MSG_DEBUG, "nl80211: MLME command failed: ret=%d "
1506 "(%s)", ret, strerror(-ret));
1507 goto nla_put_failure;
1510 wpa_printf(MSG_DEBUG, "nl80211: Authentication request send "
1520 static int wpa_driver_nl80211_set_freq2(
1521 struct wpa_driver_nl80211_data *drv,
1522 struct wpa_driver_associate_params *params)
1526 msg = nlmsg_alloc();
1530 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
1531 NL80211_CMD_SET_WIPHY, 0);
1533 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1535 /* TODO: proper channel configuration */
1536 NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, 2437);
1538 if (send_and_recv_msgs(drv, msg, NULL, NULL) == 0)
1545 static int wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data *drv,
1546 struct wpa_driver_associate_params *params)
1548 if (wpa_driver_nl80211_set_mode(drv, params->mode) ||
1549 wpa_driver_nl80211_set_freq2(drv, params))
1552 /* TODO: setup monitor interface (and add code somewhere to remove this
1553 * when AP mode is stopped; associate with mode != 2 or drv_deinit) */
1554 /* TODO: setup beacon */
1558 #endif /* CONFIG_AP */
1561 static int wpa_driver_nl80211_associate(
1562 void *priv, struct wpa_driver_associate_params *params)
1564 struct wpa_driver_nl80211_data *drv = priv;
1569 if (params->mode == 2)
1570 return wpa_driver_nl80211_ap(drv, params);
1571 #endif /* CONFIG_AP */
1573 wpa_driver_nl80211_set_auth_param(drv, IW_AUTH_DROP_UNENCRYPTED,
1574 params->drop_unencrypted);
1576 drv->associated = 0;
1578 msg = nlmsg_alloc();
1582 wpa_printf(MSG_DEBUG, "nl80211: Associate (ifindex=%d)",
1584 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0, 0,
1585 NL80211_CMD_ASSOCIATE, 0);
1587 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1588 if (params->bssid) {
1589 wpa_printf(MSG_DEBUG, " * bssid=" MACSTR,
1590 MAC2STR(params->bssid));
1591 NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid);
1594 wpa_printf(MSG_DEBUG, " * freq=%d", params->freq);
1595 NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq);
1598 wpa_hexdump_ascii(MSG_DEBUG, " * SSID",
1599 params->ssid, params->ssid_len);
1600 NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
1602 if (params->ssid_len > sizeof(drv->ssid))
1603 goto nla_put_failure;
1604 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
1605 drv->ssid_len = params->ssid_len;
1607 wpa_hexdump(MSG_DEBUG, " * IEs", params->wpa_ie, params->wpa_ie_len);
1609 NLA_PUT(msg, NL80211_ATTR_IE, params->wpa_ie_len,
1612 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1615 wpa_printf(MSG_DEBUG, "nl80211: MLME command failed: ret=%d "
1616 "(%s)", ret, strerror(-ret));
1617 goto nla_put_failure;
1620 wpa_printf(MSG_DEBUG, "nl80211: Association request send "
1630 * wpa_driver_nl80211_set_mode - Set wireless mode (infra/adhoc)
1631 * @drv: Pointer to private driver data from wpa_driver_nl80211_init()
1632 * @mode: 0 = infra/BSS (associate with an AP), 1 = adhoc/IBSS
1633 * Returns: 0 on success, -1 on failure
1635 static int wpa_driver_nl80211_set_mode(struct wpa_driver_nl80211_data *drv,
1638 int ret = -1, flags;
1644 nlmode = NL80211_IFTYPE_STATION;
1647 nlmode = NL80211_IFTYPE_ADHOC;
1650 nlmode = NL80211_IFTYPE_AP;
1656 msg = nlmsg_alloc();
1660 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
1661 0, NL80211_CMD_SET_INTERFACE, 0);
1662 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1663 NLA_PUT_U32(msg, NL80211_ATTR_IFTYPE, nlmode);
1665 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1672 wpa_printf(MSG_ERROR, "nl80211: Failed to set interface mode: %d (%s)",
1673 ret, strerror(-ret));
1677 /* mac80211 doesn't allow mode changes while the device is up, so
1678 * take the device down, try to set the mode again, and bring the
1681 if (wpa_driver_nl80211_get_ifflags(drv, &flags) == 0) {
1682 (void) wpa_driver_nl80211_set_ifflags(drv, flags & ~IFF_UP);
1684 /* Try to set the mode again while the interface is down */
1685 msg = nlmsg_alloc();
1689 genlmsg_put(msg, 0, 0, genl_family_get_id(drv->nl80211), 0,
1690 0, NL80211_CMD_SET_INTERFACE, 0);
1691 NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1692 NLA_PUT_U32(msg, NL80211_ATTR_IFTYPE, nlmode);
1693 ret = send_and_recv_msgs(drv, msg, NULL, NULL);
1695 wpa_printf(MSG_ERROR, "Failed to set interface %s "
1696 "mode(try_again): %d (%s)",
1697 drv->ifname, ret, strerror(-ret));
1700 /* Ignore return value of get_ifflags to ensure that the device
1701 * is always up like it was before this function was called.
1703 (void) wpa_driver_nl80211_get_ifflags(drv, &flags);
1704 (void) wpa_driver_nl80211_set_ifflags(drv, flags | IFF_UP);
1711 static int wpa_driver_nl80211_get_capa(void *priv,
1712 struct wpa_driver_capa *capa)
1714 struct wpa_driver_nl80211_data *drv = priv;
1715 if (!drv->has_capability)
1717 os_memcpy(capa, &drv->capa, sizeof(*capa));
1722 static int wpa_driver_nl80211_set_operstate(void *priv, int state)
1724 struct wpa_driver_nl80211_data *drv = priv;
1726 wpa_printf(MSG_DEBUG, "%s: operstate %d->%d (%s)",
1727 __func__, drv->operstate, state, state ? "UP" : "DORMANT");
1728 drv->operstate = state;
1729 return wpa_driver_nl80211_send_oper_ifla(
1730 drv, -1, state ? IF_OPER_UP : IF_OPER_DORMANT);
1734 const struct wpa_driver_ops wpa_driver_nl80211_ops = {
1736 .desc = "Linux nl80211/cfg80211",
1737 .get_bssid = wpa_driver_nl80211_get_bssid,
1738 .get_ssid = wpa_driver_nl80211_get_ssid,
1739 .set_key = wpa_driver_nl80211_set_key,
1740 .scan2 = wpa_driver_nl80211_scan,
1741 .get_scan_results2 = wpa_driver_nl80211_get_scan_results,
1742 .deauthenticate = wpa_driver_nl80211_deauthenticate,
1743 .disassociate = wpa_driver_nl80211_disassociate,
1744 .authenticate = wpa_driver_nl80211_authenticate,
1745 .associate = wpa_driver_nl80211_associate,
1746 .init = wpa_driver_nl80211_init,
1747 .deinit = wpa_driver_nl80211_deinit,
1748 .get_capa = wpa_driver_nl80211_get_capa,
1749 .set_operstate = wpa_driver_nl80211_set_operstate,
1750 .set_country = wpa_driver_nl80211_set_country,