Add new driver wrapper for the Atheros driver
authorJouni Malinen <jouni.malinen@atheros.com>
Thu, 19 Feb 2009 14:27:07 +0000 (16:27 +0200)
committerJouni Malinen <j@w1.fi>
Thu, 19 Feb 2009 14:27:07 +0000 (16:27 +0200)
This uses similar, but not identical, interface to madwifi. It is easier
to keep this separate to avoid conflicts with potential changes in the
driver interfaces.

hostapd/Makefile
hostapd/driver_atheros.c [new file with mode: 0644]
hostapd/drivers.c

index e548430..c8f9dfb 100644 (file)
@@ -141,6 +141,12 @@ OBJS += driver_madwifi.o
 CONFIG_L2_PACKET=y
 endif
 
+ifdef CONFIG_DRIVER_ATHEROS
+CFLAGS += -DCONFIG_DRIVER_ATHEROS
+OBJS += driver_atheros.o
+CONFIG_L2_PACKET=y
+endif
+
 ifdef CONFIG_DRIVER_PRISM54
 CFLAGS += -DCONFIG_DRIVER_PRISM54
 OBJS += driver_prism54.o
diff --git a/hostapd/driver_atheros.c b/hostapd/driver_atheros.c
new file mode 100644 (file)
index 0000000..58bc59f
--- /dev/null
@@ -0,0 +1,1338 @@
+/*
+ * hostapd / Driver interaction with Atheros driver
+ * Copyright (c) 2004, Sam Leffler <sam@errno.com>
+ * Copyright (c) 2004, Video54 Technologies
+ * Copyright (c) 2005-2007, Jouni Malinen <j@w1.fi>
+ * Copyright (c) 2009, Atheros Communications
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
+ * published by the Free Software Foundation.
+ *
+ * Alternatively, this software may be distributed under the terms of BSD
+ * license.
+ *
+ * See README and COPYING for more details.
+ */
+
+#include "includes.h"
+#include <net/if.h>
+#include <sys/ioctl.h>
+
+#include "common.h"
+#ifndef _BYTE_ORDER
+#ifdef WORDS_BIGENDIAN
+#define _BYTE_ORDER _BIG_ENDIAN
+#else
+#define _BYTE_ORDER _LITTLE_ENDIAN
+#endif
+#endif /* _BYTE_ORDER */
+
+#include <net80211/ieee80211.h>
+#include <net80211/_ieee80211.h>
+#include <net80211/ieee80211_crypto.h>
+
+/*
+ * Note, the ATH_WPS_IE setting must match with the driver build.. If the
+ * driver does not include this, the IEEE80211_IOCTL_GETWPAIE ioctl will fail.
+ */
+#define ATH_WPS_IE
+#include <net80211/ieee80211_ioctl.h>
+
+#ifdef CONFIG_WPS
+#ifdef IEEE80211_IOCTL_FILTERFRAME
+#include <netpacket/packet.h>
+
+#ifndef ETH_P_80211_RAW
+#define ETH_P_80211_RAW 0x0019
+#endif
+#endif /* IEEE80211_IOCTL_FILTERFRAME */
+#endif /* CONFIG_WPS */
+
+/*
+ * Avoid conflicts with hostapd definitions by undefining couple of defines
+ * from madwifi header files.
+ */
+#undef WPA_OUI_TYPE
+#undef WME_OUI_TYPE
+
+#include "wireless_copy.h"
+
+#include "hostapd.h"
+#include "driver.h"
+#include "eloop.h"
+#include "priv_netlink.h"
+#include "l2_packet/l2_packet.h"
+
+#include "wps_hostapd.h"
+#include "ieee802_11_defs.h"
+
+
+struct madwifi_driver_data {
+       struct hostapd_data *hapd;              /* back pointer */
+
+       char    iface[IFNAMSIZ + 1];
+       int     ifindex;
+       struct l2_packet_data *sock_xmit;       /* raw packet xmit socket */
+       struct l2_packet_data *sock_recv;       /* raw packet recv socket */
+       int     ioctl_sock;                     /* socket for ioctl() use */
+       int     wext_sock;                      /* socket for wireless events */
+       int     we_version;
+       u8      acct_mac[ETH_ALEN];
+       struct hostap_sta_driver_data acct_data;
+
+       struct l2_packet_data *sock_raw; /* raw 802.11 management frames */
+};
+
+static int madwifi_sta_deauth(void *priv, const u8 *addr, int reason_code);
+
+static int
+set80211priv(struct madwifi_driver_data *drv, int op, void *data, int len)
+{
+       struct iwreq iwr;
+       int do_inline = len < IFNAMSIZ;
+
+       /* Certain ioctls must use the non-inlined method */
+       if (op == IEEE80211_IOCTL_SET_APPIEBUF ||
+           op == IEEE80211_IOCTL_FILTERFRAME)
+               do_inline = 0;
+
+       memset(&iwr, 0, sizeof(iwr));
+       os_strlcpy(iwr.ifr_name, drv->iface, IFNAMSIZ);
+       if (do_inline) {
+               /*
+                * Argument data fits inline; put it there.
+                */
+               memcpy(iwr.u.name, data, len);
+       } else {
+               /*
+                * Argument data too big for inline transfer; setup a
+                * parameter block instead; the kernel will transfer
+                * the data for the driver.
+                */
+               iwr.u.data.pointer = data;
+               iwr.u.data.length = len;
+       }
+
+       if (ioctl(drv->ioctl_sock, op, &iwr) < 0) {
+               int first = IEEE80211_IOCTL_SETPARAM;
+               static const char *opnames[] = {
+                       "ioctl[IEEE80211_IOCTL_SETPARAM]",
+                       "ioctl[IEEE80211_IOCTL_GETPARAM]",
+                       "ioctl[IEEE80211_IOCTL_SETKEY]",
+                       "ioctl[IEEE80211_IOCTL_SETWMMPARAMS]",
+                       "ioctl[IEEE80211_IOCTL_DELKEY]",
+                       "ioctl[IEEE80211_IOCTL_GETWMMPARAMS]",
+                       "ioctl[IEEE80211_IOCTL_SETMLME]",
+                       "ioctl[IEEE80211_IOCTL_GETCHANINFO]",
+                       "ioctl[IEEE80211_IOCTL_SETOPTIE]",
+                       "ioctl[IEEE80211_IOCTL_GETOPTIE]",
+                       "ioctl[IEEE80211_IOCTL_ADDMAC]",
+                       "ioctl[IEEE80211_IOCTL_DELMAC]",
+                       "ioctl[IEEE80211_IOCTL_GETCHANLIST]",
+                       "ioctl[IEEE80211_IOCTL_SETCHANLIST]",
+                       "ioctl[IEEE80211_IOCTL_KICKMAC]",
+                       "ioctl[IEEE80211_IOCTL_CHANSWITCH]",
+                       "ioctl[IEEE80211_IOCTL_GETMODE]",
+                       "ioctl[IEEE80211_IOCTL_SETMODE]",
+                       "ioctl[IEEE80211_IOCTL_GET_APPIEBUF]",
+                       "ioctl[IEEE80211_IOCTL_SET_APPIEBUF]",
+                       NULL,
+                       "ioctl[IEEE80211_IOCTL_FILTERFRAME]",
+               };
+               int idx = op - first;
+               if (first <= op &&
+                   idx < (int) (sizeof(opnames) / sizeof(opnames[0])) &&
+                   opnames[idx])
+                       perror(opnames[idx]);
+               else {
+                       perror("ioctl[unknown???]");
+                       wpa_printf(MSG_DEBUG, "Failed ioctl: 0x%x", op);
+               }
+               return -1;
+       }
+       return 0;
+}
+
+static int
+set80211param(struct madwifi_driver_data *drv, int op, int arg)
+{
+       struct iwreq iwr;
+
+       memset(&iwr, 0, sizeof(iwr));
+       os_strlcpy(iwr.ifr_name, drv->iface, IFNAMSIZ);
+       iwr.u.mode = op;
+       memcpy(iwr.u.name+sizeof(__u32), &arg, sizeof(arg));
+
+       if (ioctl(drv->ioctl_sock, IEEE80211_IOCTL_SETPARAM, &iwr) < 0) {
+               perror("ioctl[IEEE80211_IOCTL_SETPARAM]");
+               wpa_printf(MSG_DEBUG, "%s: Failed to set parameter (op %d "
+                          "arg %d)", __func__, op, arg);
+               return -1;
+       }
+       return 0;
+}
+
+#ifndef CONFIG_NO_STDOUT_DEBUG
+static const char *
+ether_sprintf(const u8 *addr)
+{
+       static char buf[sizeof(MACSTR)];
+
+       if (addr != NULL)
+               snprintf(buf, sizeof(buf), MACSTR, MAC2STR(addr));
+       else
+               snprintf(buf, sizeof(buf), MACSTR, 0,0,0,0,0,0);
+       return buf;
+}
+#endif /* CONFIG_NO_STDOUT_DEBUG */
+
+/*
+ * Configure WPA parameters.
+ */
+static int
+madwifi_configure_wpa(struct madwifi_driver_data *drv)
+{
+       struct hostapd_data *hapd = drv->hapd;
+       struct hostapd_bss_config *conf = hapd->conf;
+       int v;
+
+       switch (conf->wpa_group) {
+       case WPA_CIPHER_CCMP:
+               v = IEEE80211_CIPHER_AES_CCM;
+               break;
+       case WPA_CIPHER_TKIP:
+               v = IEEE80211_CIPHER_TKIP;
+               break;
+       case WPA_CIPHER_WEP104:
+               v = IEEE80211_CIPHER_WEP;
+               break;
+       case WPA_CIPHER_WEP40:
+               v = IEEE80211_CIPHER_WEP;
+               break;
+       case WPA_CIPHER_NONE:
+               v = IEEE80211_CIPHER_NONE;
+               break;
+       default:
+               wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
+                          conf->wpa_group);
+               return -1;
+       }
+       wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
+       if (set80211param(drv, IEEE80211_PARAM_MCASTCIPHER, v)) {
+               printf("Unable to set group key cipher to %u\n", v);
+               return -1;
+       }
+       if (v == IEEE80211_CIPHER_WEP) {
+               /* key length is done only for specific ciphers */
+               v = (conf->wpa_group == WPA_CIPHER_WEP104 ? 13 : 5);
+               if (set80211param(drv, IEEE80211_PARAM_MCASTKEYLEN, v)) {
+                       printf("Unable to set group key length to %u\n", v);
+                       return -1;
+               }
+       }
+
+       v = 0;
+       if (conf->wpa_pairwise & WPA_CIPHER_CCMP)
+               v |= 1<<IEEE80211_CIPHER_AES_CCM;
+       if (conf->wpa_pairwise & WPA_CIPHER_TKIP)
+               v |= 1<<IEEE80211_CIPHER_TKIP;
+       if (conf->wpa_pairwise & WPA_CIPHER_NONE)
+               v |= 1<<IEEE80211_CIPHER_NONE;
+       wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
+       if (set80211param(drv, IEEE80211_PARAM_UCASTCIPHERS, v)) {
+               printf("Unable to set pairwise key ciphers to 0x%x\n", v);
+               return -1;
+       }
+
+       wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
+                  __func__, conf->wpa_key_mgmt);
+       if (set80211param(drv, IEEE80211_PARAM_KEYMGTALGS, conf->wpa_key_mgmt)) {
+               printf("Unable to set key management algorithms to 0x%x\n",
+                       conf->wpa_key_mgmt);
+               return -1;
+       }
+
+       v = 0;
+       if (conf->rsn_preauth)
+               v |= BIT(0);
+       wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x",
+                  __func__, conf->rsn_preauth);
+       if (set80211param(drv, IEEE80211_PARAM_RSNCAPS, v)) {
+               printf("Unable to set RSN capabilities to 0x%x\n", v);
+               return -1;
+       }
+
+       wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, conf->wpa);
+       if (set80211param(drv, IEEE80211_PARAM_WPA, conf->wpa)) {
+               printf("Unable to set WPA to %u\n", conf->wpa);
+               return -1;
+       }
+       return 0;
+}
+
+
+static int
+madwifi_set_iface_flags(void *priv, int dev_up)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct ifreq ifr;
+
+       wpa_printf(MSG_DEBUG, "%s: dev_up=%d", __func__, dev_up);
+
+       if (drv->ioctl_sock < 0)
+               return -1;
+
+       memset(&ifr, 0, sizeof(ifr));
+       os_strlcpy(ifr.ifr_name, drv->iface, IFNAMSIZ);
+
+       if (ioctl(drv->ioctl_sock, SIOCGIFFLAGS, &ifr) != 0) {
+               perror("ioctl[SIOCGIFFLAGS]");
+               return -1;
+       }
+
+       if (dev_up)
+               ifr.ifr_flags |= IFF_UP;
+       else
+               ifr.ifr_flags &= ~IFF_UP;
+
+       if (ioctl(drv->ioctl_sock, SIOCSIFFLAGS, &ifr) != 0) {
+               perror("ioctl[SIOCSIFFLAGS]");
+               return -1;
+       }
+
+       if (dev_up) {
+               memset(&ifr, 0, sizeof(ifr));
+               os_strlcpy(ifr.ifr_name, drv->iface, IFNAMSIZ);
+               ifr.ifr_mtu = HOSTAPD_MTU;
+               if (ioctl(drv->ioctl_sock, SIOCSIFMTU, &ifr) != 0) {
+                       perror("ioctl[SIOCSIFMTU]");
+                       printf("Setting MTU failed - trying to survive with "
+                              "current value\n");
+               }
+       }
+
+       return 0;
+}
+
+static int
+madwifi_set_ieee8021x(const char *ifname, void *priv, int enabled)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct hostapd_data *hapd = drv->hapd;
+       struct hostapd_bss_config *conf = hapd->conf;
+
+       wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
+
+       if (!enabled) {
+               /* XXX restore state */
+               return set80211param(priv, IEEE80211_PARAM_AUTHMODE,
+                       IEEE80211_AUTH_AUTO);
+       }
+       if (!conf->wpa && !conf->ieee802_1x) {
+               hostapd_logger(hapd, NULL, HOSTAPD_MODULE_DRIVER,
+                       HOSTAPD_LEVEL_WARNING, "No 802.1X or WPA enabled!");
+               return -1;
+       }
+       if (conf->wpa && madwifi_configure_wpa(drv) != 0) {
+               hostapd_logger(hapd, NULL, HOSTAPD_MODULE_DRIVER,
+                       HOSTAPD_LEVEL_WARNING, "Error configuring WPA state!");
+               return -1;
+       }
+       if (set80211param(priv, IEEE80211_PARAM_AUTHMODE,
+               (conf->wpa ?  IEEE80211_AUTH_WPA : IEEE80211_AUTH_8021X))) {
+               hostapd_logger(hapd, NULL, HOSTAPD_MODULE_DRIVER,
+                       HOSTAPD_LEVEL_WARNING, "Error enabling WPA/802.1X!");
+               return -1;
+       }
+
+       return 0;
+}
+
+static int
+madwifi_set_privacy(const char *ifname, void *priv, int enabled)
+{
+       struct madwifi_driver_data *drv = priv;
+
+       wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
+
+       return set80211param(drv, IEEE80211_PARAM_PRIVACY, enabled);
+}
+
+static int
+madwifi_set_sta_authorized(void *priv, const u8 *addr, int authorized)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct ieee80211req_mlme mlme;
+       int ret;
+
+       wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
+                  __func__, ether_sprintf(addr), authorized);
+
+       if (authorized)
+               mlme.im_op = IEEE80211_MLME_AUTHORIZE;
+       else
+               mlme.im_op = IEEE80211_MLME_UNAUTHORIZE;
+       mlme.im_reason = 0;
+       memcpy(mlme.im_macaddr, addr, IEEE80211_ADDR_LEN);
+       ret = set80211priv(drv, IEEE80211_IOCTL_SETMLME, &mlme, sizeof(mlme));
+       if (ret < 0) {
+               wpa_printf(MSG_DEBUG, "%s: Failed to %sauthorize STA " MACSTR,
+                          __func__, authorized ? "" : "un", MAC2STR(addr));
+       }
+
+       return ret;
+}
+
+static int
+madwifi_sta_set_flags(void *priv, const u8 *addr, int total_flags,
+                     int flags_or, int flags_and)
+{
+       /* For now, only support setting Authorized flag */
+       if (flags_or & WLAN_STA_AUTHORIZED)
+               return madwifi_set_sta_authorized(priv, addr, 1);
+       if (!(flags_and & WLAN_STA_AUTHORIZED))
+               return madwifi_set_sta_authorized(priv, addr, 0);
+       return 0;
+}
+
+static int
+madwifi_del_key(void *priv, const u8 *addr, int key_idx)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct ieee80211req_del_key wk;
+       int ret;
+
+       wpa_printf(MSG_DEBUG, "%s: addr=%s key_idx=%d",
+                  __func__, ether_sprintf(addr), key_idx);
+
+       memset(&wk, 0, sizeof(wk));
+       if (addr != NULL) {
+               memcpy(wk.idk_macaddr, addr, IEEE80211_ADDR_LEN);
+               wk.idk_keyix = (u8) IEEE80211_KEYIX_NONE;
+       } else {
+               wk.idk_keyix = key_idx;
+       }
+
+       ret = set80211priv(drv, IEEE80211_IOCTL_DELKEY, &wk, sizeof(wk));
+       if (ret < 0) {
+               wpa_printf(MSG_DEBUG, "%s: Failed to delete key (addr %s"
+                          " key_idx %d)", __func__, ether_sprintf(addr),
+                          key_idx);
+       }
+
+       return ret;
+}
+
+static int
+madwifi_set_key(const char *ifname, void *priv, const char *alg,
+               const u8 *addr, int key_idx,
+               const u8 *key, size_t key_len, int txkey)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct ieee80211req_key wk;
+       u_int8_t cipher;
+       int ret;
+
+       if (strcmp(alg, "none") == 0)
+               return madwifi_del_key(drv, addr, key_idx);
+
+       wpa_printf(MSG_DEBUG, "%s: alg=%s addr=%s key_idx=%d",
+                  __func__, alg, ether_sprintf(addr), key_idx);
+
+       if (strcmp(alg, "WEP") == 0)
+               cipher = IEEE80211_CIPHER_WEP;
+       else if (strcmp(alg, "TKIP") == 0)
+               cipher = IEEE80211_CIPHER_TKIP;
+       else if (strcmp(alg, "CCMP") == 0)
+               cipher = IEEE80211_CIPHER_AES_CCM;
+       else {
+               printf("%s: unknown/unsupported algorithm %s\n",
+                       __func__, alg);
+               return -1;
+       }
+
+       if (key_len > sizeof(wk.ik_keydata)) {
+               printf("%s: key length %lu too big\n", __func__,
+                      (unsigned long) key_len);
+               return -3;
+       }
+
+       memset(&wk, 0, sizeof(wk));
+       wk.ik_type = cipher;
+       wk.ik_flags = IEEE80211_KEY_RECV | IEEE80211_KEY_XMIT;
+       if (addr == NULL) {
+               memset(wk.ik_macaddr, 0xff, IEEE80211_ADDR_LEN);
+               wk.ik_keyix = key_idx;
+               wk.ik_flags |= IEEE80211_KEY_DEFAULT;
+       } else {
+               memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN);
+               wk.ik_keyix = IEEE80211_KEYIX_NONE;
+       }
+       wk.ik_keylen = key_len;
+       memcpy(wk.ik_keydata, key, key_len);
+
+       ret = set80211priv(drv, IEEE80211_IOCTL_SETKEY, &wk, sizeof(wk));
+       if (ret < 0) {
+               wpa_printf(MSG_DEBUG, "%s: Failed to set key (addr %s"
+                          " key_idx %d alg '%s' key_len %lu txkey %d)",
+                          __func__, ether_sprintf(wk.ik_macaddr), key_idx,
+                          alg, (unsigned long) key_len, txkey);
+       }
+
+       return ret;
+}
+
+
+static int
+madwifi_get_seqnum(const char *ifname, void *priv, const u8 *addr, int idx,
+                  u8 *seq)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct ieee80211req_key wk;
+
+       wpa_printf(MSG_DEBUG, "%s: addr=%s idx=%d",
+                  __func__, ether_sprintf(addr), idx);
+
+       memset(&wk, 0, sizeof(wk));
+       if (addr == NULL)
+               memset(wk.ik_macaddr, 0xff, IEEE80211_ADDR_LEN);
+       else
+               memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN);
+       wk.ik_keyix = idx;
+
+       if (set80211priv(drv, IEEE80211_IOCTL_GETKEY, &wk, sizeof(wk))) {
+               wpa_printf(MSG_DEBUG, "%s: Failed to get encryption data "
+                          "(addr " MACSTR " key_idx %d)",
+                          __func__, MAC2STR(wk.ik_macaddr), idx);
+               return -1;
+       }
+
+#ifdef WORDS_BIGENDIAN
+       {
+               /*
+                * wk.ik_keytsc is in host byte order (big endian), need to
+                * swap it to match with the byte order used in WPA.
+                */
+               int i;
+               u8 tmp[WPA_KEY_RSC_LEN];
+               memcpy(tmp, &wk.ik_keytsc, sizeof(wk.ik_keytsc));
+               for (i = 0; i < WPA_KEY_RSC_LEN; i++) {
+                       seq[i] = tmp[WPA_KEY_RSC_LEN - i - 1];
+               }
+       }
+#else /* WORDS_BIGENDIAN */
+       memcpy(seq, &wk.ik_keytsc, sizeof(wk.ik_keytsc));
+#endif /* WORDS_BIGENDIAN */
+       return 0;
+}
+
+
+static int
+madwifi_flush(void *priv)
+{
+       u8 allsta[IEEE80211_ADDR_LEN];
+       memset(allsta, 0xff, IEEE80211_ADDR_LEN);
+       return madwifi_sta_deauth(priv, allsta, IEEE80211_REASON_AUTH_LEAVE);
+}
+
+
+static int
+madwifi_read_sta_driver_data(void *priv, struct hostap_sta_driver_data *data,
+                            const u8 *addr)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct ieee80211req_sta_stats stats;
+
+       memset(data, 0, sizeof(*data));
+
+       /*
+        * Fetch statistics for station from the system.
+        */
+       memset(&stats, 0, sizeof(stats));
+       memcpy(stats.is_u.macaddr, addr, IEEE80211_ADDR_LEN);
+       if (set80211priv(drv, IEEE80211_IOCTL_STA_STATS,
+                        &stats, sizeof(stats))) {
+               wpa_printf(MSG_DEBUG, "%s: Failed to fetch STA stats (addr "
+                          MACSTR ")", __func__, MAC2STR(addr));
+               if (memcmp(addr, drv->acct_mac, ETH_ALEN) == 0) {
+                       memcpy(data, &drv->acct_data, sizeof(*data));
+                       return 0;
+               }
+
+               printf("Failed to get station stats information element.\n");
+               return -1;
+       }
+
+       data->rx_packets = stats.is_stats.ns_rx_data;
+       data->rx_bytes = stats.is_stats.ns_rx_bytes;
+       data->tx_packets = stats.is_stats.ns_tx_data;
+       data->tx_bytes = stats.is_stats.ns_tx_bytes;
+       return 0;
+}
+
+
+static int
+madwifi_sta_clear_stats(void *priv, const u8 *addr)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct ieee80211req_mlme mlme;
+       int ret;
+
+       wpa_printf(MSG_DEBUG, "%s: addr=%s", __func__, ether_sprintf(addr));
+
+       mlme.im_op = IEEE80211_MLME_CLEAR_STATS;
+       memcpy(mlme.im_macaddr, addr, IEEE80211_ADDR_LEN);
+       ret = set80211priv(drv, IEEE80211_IOCTL_SETMLME, &mlme,
+                          sizeof(mlme));
+       if (ret < 0) {
+               wpa_printf(MSG_DEBUG, "%s: Failed to clear STA stats (addr "
+                          MACSTR ")", __func__, MAC2STR(addr));
+       }
+
+       return ret;
+}
+
+
+static int
+madwifi_set_opt_ie(const char *ifname, void *priv, const u8 *ie, size_t ie_len)
+{
+       /*
+        * Do nothing; we setup parameters at startup that define the
+        * contents of the beacon information element.
+        */
+       return 0;
+}
+
+static int
+madwifi_sta_deauth(void *priv, const u8 *addr, int reason_code)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct ieee80211req_mlme mlme;
+       int ret;
+
+       wpa_printf(MSG_DEBUG, "%s: addr=%s reason_code=%d",
+                  __func__, ether_sprintf(addr), reason_code);
+
+       mlme.im_op = IEEE80211_MLME_DEAUTH;
+       mlme.im_reason = reason_code;
+       memcpy(mlme.im_macaddr, addr, IEEE80211_ADDR_LEN);
+       ret = set80211priv(drv, IEEE80211_IOCTL_SETMLME, &mlme, sizeof(mlme));
+       if (ret < 0) {
+               wpa_printf(MSG_DEBUG, "%s: Failed to deauth STA (addr " MACSTR
+                          " reason %d)",
+                          __func__, MAC2STR(addr), reason_code);
+       }
+
+       return ret;
+}
+
+static int
+madwifi_sta_disassoc(void *priv, const u8 *addr, int reason_code)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct ieee80211req_mlme mlme;
+       int ret;
+
+       wpa_printf(MSG_DEBUG, "%s: addr=%s reason_code=%d",
+                  __func__, ether_sprintf(addr), reason_code);
+
+       mlme.im_op = IEEE80211_MLME_DISASSOC;
+       mlme.im_reason = reason_code;
+       memcpy(mlme.im_macaddr, addr, IEEE80211_ADDR_LEN);
+       ret = set80211priv(drv, IEEE80211_IOCTL_SETMLME, &mlme, sizeof(mlme));
+       if (ret < 0) {
+               wpa_printf(MSG_DEBUG, "%s: Failed to disassoc STA (addr "
+                          MACSTR " reason %d)",
+                          __func__, MAC2STR(addr), reason_code);
+       }
+
+       return ret;
+}
+
+#ifdef CONFIG_WPS
+static void madwifi_raw_receive(void *ctx, const u8 *src_addr, const u8 *buf,
+                               size_t len)
+{
+       struct madwifi_driver_data *drv = ctx;
+       const struct ieee80211_mgmt *mgmt;
+       const u8 *end, *ie;
+       u16 fc;
+       size_t ie_len;
+
+       /* Send Probe Request information to WPS processing */
+
+       if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.probe_req))
+               return;
+       mgmt = (const struct ieee80211_mgmt *) buf;
+
+       fc = le_to_host16(mgmt->frame_control);
+       if (WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT ||
+           WLAN_FC_GET_STYPE(fc) != WLAN_FC_STYPE_PROBE_REQ)
+               return;
+
+       end = buf + len;
+       ie = mgmt->u.probe_req.variable;
+       ie_len = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.probe_req));
+
+       hostapd_wps_probe_req_rx(drv->hapd, mgmt->sa, ie, ie_len);
+}
+#endif /* CONFIG_WPS */
+
+static int madwifi_receive_probe_req(struct madwifi_driver_data *drv)
+{
+       int ret = 0;
+#ifdef CONFIG_WPS
+       struct ieee80211req_set_filter filt;
+
+       wpa_printf(MSG_DEBUG, "%s Enter", __func__);
+       filt.app_filterype = IEEE80211_FILTER_TYPE_PROBE_REQ;
+
+       ret = set80211priv(drv, IEEE80211_IOCTL_FILTERFRAME, &filt,
+                          sizeof(struct ieee80211req_set_filter));
+       if (ret)
+               return ret;
+
+       drv->sock_raw = l2_packet_init(drv->iface, NULL, ETH_P_80211_RAW,
+                                      madwifi_raw_receive, drv, 1);
+       if (drv->sock_raw == NULL)
+               return -1;
+#endif /* CONFIG_WPS */
+       return ret;
+}
+
+#ifdef CONFIG_WPS
+static int
+madwifi_set_wps_ie(void *priv, const u8 *ie, size_t len, u32 frametype)
+{
+       struct madwifi_driver_data *drv = priv;
+       u8 buf[256];
+       struct ieee80211req_getset_appiebuf *beac_ie;
+
+       wpa_printf(MSG_DEBUG, "%s buflen = %lu", __func__,
+                  (unsigned long) len);
+
+       beac_ie = (struct ieee80211req_getset_appiebuf *) buf;
+       beac_ie->app_frmtype = frametype;
+       beac_ie->app_buflen = len;
+       memcpy(&(beac_ie->app_buf[0]), ie, len);
+
+       return set80211priv(drv, IEEE80211_IOCTL_SET_APPIEBUF, beac_ie,
+                           sizeof(struct ieee80211req_getset_appiebuf) + len);
+}
+
+static int
+madwifi_set_wps_beacon_ie(const char *ifname, void *priv, const u8 *ie,
+                         size_t len)
+{
+       return madwifi_set_wps_ie(priv, ie, len, IEEE80211_APPIE_FRAME_BEACON);
+}
+
+static int
+madwifi_set_wps_probe_resp_ie(const char *ifname, void *priv, const u8 *ie,
+                             size_t len)
+{
+       return madwifi_set_wps_ie(priv, ie, len,
+                                 IEEE80211_APPIE_FRAME_PROBE_RESP);
+}
+#else /* CONFIG_WPS */
+#define madwifi_set_wps_beacon_ie NULL
+#define madwifi_set_wps_probe_resp_ie NULL
+#endif /* CONFIG_WPS */
+
+static int
+madwifi_new_sta(struct madwifi_driver_data *drv, u8 addr[IEEE80211_ADDR_LEN])
+{
+       struct hostapd_data *hapd = drv->hapd;
+       struct ieee80211req_wpaie ie;
+       int ielen = 0, res;
+       u8 *iebuf = NULL;
+
+       /*
+        * Fetch negotiated WPA/RSN parameters from the system.
+        */
+       memset(&ie, 0, sizeof(ie));
+       memcpy(ie.wpa_macaddr, addr, IEEE80211_ADDR_LEN);
+       if (set80211priv(drv, IEEE80211_IOCTL_GETWPAIE, &ie, sizeof(ie))) {
+               /*
+                * See ATH_WPS_IE comment in the beginning of the file for a
+                * possible cause for the failure..
+                */
+               wpa_printf(MSG_DEBUG, "%s: Failed to get WPA/RSN IE: %s",
+                          __func__, strerror(errno));
+               goto no_ie;
+       }
+       wpa_hexdump(MSG_MSGDUMP, "madwifi req WPA IE",
+                   ie.wpa_ie, IEEE80211_MAX_OPT_IE);
+       wpa_hexdump(MSG_MSGDUMP, "madwifi req RSN IE",
+                   ie.rsn_ie, IEEE80211_MAX_OPT_IE);
+       iebuf = ie.wpa_ie;
+       /* madwifi seems to return some random data if WPA/RSN IE is not set.
+        * Assume the IE was not included if the IE type is unknown. */
+       if (iebuf[0] != WLAN_EID_VENDOR_SPECIFIC)
+               iebuf[1] = 0;
+       if (iebuf[1] == 0 && ie.rsn_ie[1] > 0) {
+               /* madwifi-ng svn #1453 added rsn_ie. Use it, if wpa_ie was not
+                * set. This is needed for WPA2. */
+               iebuf = ie.rsn_ie;
+               if (iebuf[0] != WLAN_EID_RSN)
+                       iebuf[1] = 0;
+       }
+
+       ielen = iebuf[1];
+       if (ielen == 0)
+               iebuf = NULL;
+       else
+               ielen += 2;
+
+no_ie:
+       res = hostapd_notif_assoc(hapd, addr, iebuf, ielen);
+
+       if (memcmp(addr, drv->acct_mac, ETH_ALEN) == 0) {
+               /* Cached accounting data is not valid anymore. */
+               memset(drv->acct_mac, 0, ETH_ALEN);
+               memset(&drv->acct_data, 0, sizeof(drv->acct_data));
+       }
+
+       return res;
+}
+
+static void
+madwifi_wireless_event_wireless_custom(struct madwifi_driver_data *drv,
+                                      char *custom, char *end)
+{
+       wpa_printf(MSG_DEBUG, "Custom wireless event: '%s'", custom);
+
+       if (strncmp(custom, "MLME-MICHAELMICFAILURE.indication", 33) == 0) {
+               char *pos;
+               u8 addr[ETH_ALEN];
+               pos = strstr(custom, "addr=");
+               if (pos == NULL) {
+                       wpa_printf(MSG_DEBUG,
+                                  "MLME-MICHAELMICFAILURE.indication "
+                                  "without sender address ignored");
+                       return;
+               }
+               pos += 5;
+               if (hwaddr_aton(pos, addr) == 0) {
+                       hostapd_michael_mic_failure(drv->hapd, addr);
+               } else {
+                       wpa_printf(MSG_DEBUG,
+                                  "MLME-MICHAELMICFAILURE.indication "
+                                  "with invalid MAC address");
+               }
+       } else if (strncmp(custom, "STA-TRAFFIC-STAT", 16) == 0) {
+               char *key, *value;
+               u32 val;
+               key = custom;
+               while ((key = strchr(key, '\n')) != NULL) {
+                       key++;
+                       value = strchr(key, '=');
+                       if (value == NULL)
+                               continue;
+                       *value++ = '\0';
+                       val = strtoul(value, NULL, 10);
+                       if (strcmp(key, "mac") == 0)
+                               hwaddr_aton(value, drv->acct_mac);
+                       else if (strcmp(key, "rx_packets") == 0)
+                               drv->acct_data.rx_packets = val;
+                       else if (strcmp(key, "tx_packets") == 0)
+                               drv->acct_data.tx_packets = val;
+                       else if (strcmp(key, "rx_bytes") == 0)
+                               drv->acct_data.rx_bytes = val;
+                       else if (strcmp(key, "tx_bytes") == 0)
+                               drv->acct_data.tx_bytes = val;
+                       key = value;
+               }
+#ifdef CONFIG_WPS
+       } else if (strncmp(custom, "PUSH-BUTTON.indication", 22) == 0) {
+               /* Some atheros kernels send push button as a wireless event */
+               /* PROBLEM! this event is received for ALL BSSs ...
+                * so all are enabled for WPS... ugh.
+                */
+               hostapd_wps_button_pushed(drv->hapd);
+       } else if (strncmp(custom, "Manage.prob_req ", 16) == 0) {
+               /*
+                * Atheros driver uses a hack to pass Probe Request frames as a
+                * binary data in the custom wireless event. The old way (using
+                * packet sniffing) didn't work when bridging.
+                * Format: "Manage.prob_req <frame len>" | zero padding | frame
+                */
+#define WPS_FRAM_TAG_SIZE 30 /* hardcoded in driver */
+               int len = atoi(custom + 16);
+               if (len < 0 || custom + WPS_FRAM_TAG_SIZE + len > end) {
+                       wpa_printf(MSG_DEBUG, "Invalid Manage.prob_req event "
+                                  "length %d", len);
+                       return;
+               }
+               madwifi_raw_receive(drv, NULL,
+                                   (u8 *) custom + WPS_FRAM_TAG_SIZE, len);
+#endif /* CONFIG_WPS */
+       }
+}
+
+static void
+madwifi_wireless_event_wireless(struct madwifi_driver_data *drv,
+                               char *data, int len)
+{
+       struct iw_event iwe_buf, *iwe = &iwe_buf;
+       char *pos, *end, *custom, *buf;
+
+       pos = data;
+       end = data + len;
+
+       while (pos + IW_EV_LCP_LEN <= end) {
+               /* Event data may be unaligned, so make a local, aligned copy
+                * before processing. */
+               memcpy(&iwe_buf, pos, IW_EV_LCP_LEN);
+               wpa_printf(MSG_MSGDUMP, "Wireless event: cmd=0x%x len=%d",
+                          iwe->cmd, iwe->len);
+               if (iwe->len <= IW_EV_LCP_LEN)
+                       return;
+
+               custom = pos + IW_EV_POINT_LEN;
+               if (drv->we_version > 18 &&
+                   (iwe->cmd == IWEVMICHAELMICFAILURE ||
+                    iwe->cmd == IWEVASSOCREQIE ||
+                    iwe->cmd == IWEVCUSTOM)) {
+                       /* WE-19 removed the pointer from struct iw_point */
+                       char *dpos = (char *) &iwe_buf.u.data.length;
+                       int dlen = dpos - (char *) &iwe_buf;
+                       memcpy(dpos, pos + IW_EV_LCP_LEN,
+                              sizeof(struct iw_event) - dlen);
+               } else {
+                       memcpy(&iwe_buf, pos, sizeof(struct iw_event));
+                       custom += IW_EV_POINT_OFF;
+               }
+
+               switch (iwe->cmd) {
+               case IWEVEXPIRED:
+                       hostapd_notif_disassoc(drv->hapd,
+                                              (u8 *) iwe->u.addr.sa_data);
+                       break;
+               case IWEVREGISTERED:
+                       madwifi_new_sta(drv, (u8 *) iwe->u.addr.sa_data);
+                       break;
+               case IWEVASSOCREQIE:
+                       /* Driver hack.. Use IWEVASSOCREQIE to bypass
+                        * IWEVCUSTOM size limitations. Need to handle this
+                        * just like IWEVCUSTOM.
+                        */
+               case IWEVCUSTOM:
+                       if (custom + iwe->u.data.length > end)
+                               return;
+                       buf = malloc(iwe->u.data.length + 1);
+                       if (buf == NULL)
+                               return;         /* XXX */
+                       memcpy(buf, custom, iwe->u.data.length);
+                       buf[iwe->u.data.length] = '\0';
+                       madwifi_wireless_event_wireless_custom(
+                               drv, buf, buf + iwe->u.data.length);
+                       free(buf);
+                       break;
+               }
+
+               pos += iwe->len;
+       }
+}
+
+
+static void
+madwifi_wireless_event_rtm_newlink(struct madwifi_driver_data *drv,
+                                              struct nlmsghdr *h, int len)
+{
+       struct ifinfomsg *ifi;
+       int attrlen, nlmsg_len, rta_len;
+       struct rtattr * attr;
+
+       if (len < (int) sizeof(*ifi))
+               return;
+
+       ifi = NLMSG_DATA(h);
+
+       if (ifi->ifi_index != drv->ifindex)
+               return;
+
+       nlmsg_len = NLMSG_ALIGN(sizeof(struct ifinfomsg));
+
+       attrlen = h->nlmsg_len - nlmsg_len;
+       if (attrlen < 0)
+               return;
+
+       attr = (struct rtattr *) (((char *) ifi) + nlmsg_len);
+
+       rta_len = RTA_ALIGN(sizeof(struct rtattr));
+       while (RTA_OK(attr, attrlen)) {
+               if (attr->rta_type == IFLA_WIRELESS) {
+                       madwifi_wireless_event_wireless(
+                               drv, ((char *) attr) + rta_len,
+                               attr->rta_len - rta_len);
+               }
+               attr = RTA_NEXT(attr, attrlen);
+       }
+}
+
+
+static void
+madwifi_wireless_event_receive(int sock, void *eloop_ctx, void *sock_ctx)
+{
+       char buf[256];
+       int left;
+       struct sockaddr_nl from;
+       socklen_t fromlen;
+       struct nlmsghdr *h;
+       struct madwifi_driver_data *drv = eloop_ctx;
+
+       fromlen = sizeof(from);
+       left = recvfrom(sock, buf, sizeof(buf), MSG_DONTWAIT,
+                       (struct sockaddr *) &from, &fromlen);
+       if (left < 0) {
+               if (errno != EINTR && errno != EAGAIN)
+                       perror("recvfrom(netlink)");
+               return;
+       }
+
+       h = (struct nlmsghdr *) buf;
+       while (left >= (int) sizeof(*h)) {
+               int len, plen;
+
+               len = h->nlmsg_len;
+               plen = len - sizeof(*h);
+               if (len > left || plen < 0) {
+                       printf("Malformed netlink message: "
+                              "len=%d left=%d plen=%d\n",
+                              len, left, plen);
+                       break;
+               }
+
+               switch (h->nlmsg_type) {
+               case RTM_NEWLINK:
+                       madwifi_wireless_event_rtm_newlink(drv, h, plen);
+                       break;
+               }
+
+               len = NLMSG_ALIGN(len);
+               left -= len;
+               h = (struct nlmsghdr *) ((char *) h + len);
+       }
+
+       if (left > 0) {
+               printf("%d extra bytes in the end of netlink message\n", left);
+       }
+}
+
+
+static int
+madwifi_get_we_version(struct madwifi_driver_data *drv)
+{
+       struct iw_range *range;
+       struct iwreq iwr;
+       int minlen;
+       size_t buflen;
+
+       drv->we_version = 0;
+
+       /*
+        * Use larger buffer than struct iw_range in order to allow the
+        * structure to grow in the future.
+        */
+       buflen = sizeof(struct iw_range) + 500;
+       range = os_zalloc(buflen);
+       if (range == NULL)
+               return -1;
+
+       memset(&iwr, 0, sizeof(iwr));
+       os_strlcpy(iwr.ifr_name, drv->iface, IFNAMSIZ);
+       iwr.u.data.pointer = (caddr_t) range;
+       iwr.u.data.length = buflen;
+
+       minlen = ((char *) &range->enc_capa) - (char *) range +
+               sizeof(range->enc_capa);
+
+       if (ioctl(drv->ioctl_sock, SIOCGIWRANGE, &iwr) < 0) {
+               perror("ioctl[SIOCGIWRANGE]");
+               free(range);
+               return -1;
+       } else if (iwr.u.data.length >= minlen &&
+                  range->we_version_compiled >= 18) {
+               wpa_printf(MSG_DEBUG, "SIOCGIWRANGE: WE(compiled)=%d "
+                          "WE(source)=%d enc_capa=0x%x",
+                          range->we_version_compiled,
+                          range->we_version_source,
+                          range->enc_capa);
+               drv->we_version = range->we_version_compiled;
+       }
+
+       free(range);
+       return 0;
+}
+
+
+static int
+madwifi_wireless_event_init(void *priv)
+{
+       struct madwifi_driver_data *drv = priv;
+       int s;
+       struct sockaddr_nl local;
+
+       madwifi_get_we_version(drv);
+
+       drv->wext_sock = -1;
+
+       s = socket(PF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
+       if (s < 0) {
+               perror("socket(PF_NETLINK,SOCK_RAW,NETLINK_ROUTE)");
+               return -1;
+       }
+
+       memset(&local, 0, sizeof(local));
+       local.nl_family = AF_NETLINK;
+       local.nl_groups = RTMGRP_LINK;
+       if (bind(s, (struct sockaddr *) &local, sizeof(local)) < 0) {
+               perror("bind(netlink)");
+               close(s);
+               return -1;
+       }
+
+       eloop_register_read_sock(s, madwifi_wireless_event_receive, drv, NULL);
+       drv->wext_sock = s;
+
+       return 0;
+}
+
+
+static void
+madwifi_wireless_event_deinit(void *priv)
+{
+       struct madwifi_driver_data *drv = priv;
+
+       if (drv != NULL) {
+               if (drv->wext_sock < 0)
+                       return;
+               eloop_unregister_read_sock(drv->wext_sock);
+               close(drv->wext_sock);
+       }
+}
+
+
+static int
+madwifi_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len,
+                  int encrypt, const u8 *own_addr)
+{
+       struct madwifi_driver_data *drv = priv;
+       unsigned char buf[3000];
+       unsigned char *bp = buf;
+       struct l2_ethhdr *eth;
+       size_t len;
+       int status;
+
+       /*
+        * Prepend the Ethernet header.  If the caller left us
+        * space at the front we could just insert it but since
+        * we don't know we copy to a local buffer.  Given the frequency
+        * and size of frames this probably doesn't matter.
+        */
+       len = data_len + sizeof(struct l2_ethhdr);
+       if (len > sizeof(buf)) {
+               bp = malloc(len);
+               if (bp == NULL) {
+                       printf("EAPOL frame discarded, cannot malloc temp "
+                              "buffer of size %lu!\n", (unsigned long) len);
+                       return -1;
+               }
+       }
+       eth = (struct l2_ethhdr *) bp;
+       memcpy(eth->h_dest, addr, ETH_ALEN);
+       memcpy(eth->h_source, own_addr, ETH_ALEN);
+       eth->h_proto = host_to_be16(ETH_P_EAPOL);
+       memcpy(eth+1, data, data_len);
+
+       wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", bp, len);
+
+       status = l2_packet_send(drv->sock_xmit, addr, ETH_P_EAPOL, bp, len);
+
+       if (bp != buf)
+               free(bp);
+       return status;
+}
+
+static void
+handle_read(void *ctx, const u8 *src_addr, const u8 *buf, size_t len)
+{
+       struct madwifi_driver_data *drv = ctx;
+       hostapd_eapol_receive(drv->hapd, src_addr,
+                             buf + sizeof(struct l2_ethhdr),
+                             len - sizeof(struct l2_ethhdr));
+}
+
+static void *
+madwifi_init(struct hostapd_data *hapd)
+{
+       struct madwifi_driver_data *drv;
+       struct ifreq ifr;
+       struct iwreq iwr;
+
+       drv = os_zalloc(sizeof(struct madwifi_driver_data));
+       if (drv == NULL) {
+               printf("Could not allocate memory for madwifi driver data\n");
+               return NULL;
+       }
+
+       drv->hapd = hapd;
+       drv->ioctl_sock = socket(PF_INET, SOCK_DGRAM, 0);
+       if (drv->ioctl_sock < 0) {
+               perror("socket[PF_INET,SOCK_DGRAM]");
+               goto bad;
+       }
+       memcpy(drv->iface, hapd->conf->iface, sizeof(drv->iface));
+
+       memset(&ifr, 0, sizeof(ifr));
+       os_strlcpy(ifr.ifr_name, drv->iface, sizeof(ifr.ifr_name));
+       if (ioctl(drv->ioctl_sock, SIOCGIFINDEX, &ifr) != 0) {
+               perror("ioctl(SIOCGIFINDEX)");
+               goto bad;
+       }
+       drv->ifindex = ifr.ifr_ifindex;
+
+       drv->sock_xmit = l2_packet_init(drv->iface, NULL, ETH_P_EAPOL,
+                                       handle_read, drv, 1);
+       if (drv->sock_xmit == NULL)
+               goto bad;
+       if (l2_packet_get_own_addr(drv->sock_xmit, hapd->own_addr))
+               goto bad;
+       if (hapd->conf->bridge[0] != '\0') {
+               wpa_printf(MSG_DEBUG, "Configure bridge %s for EAPOL traffic.",
+                          hapd->conf->bridge);
+               drv->sock_recv = l2_packet_init(hapd->conf->bridge, NULL,
+                                               ETH_P_EAPOL, handle_read, drv,
+                                               1);
+               if (drv->sock_recv == NULL)
+                       goto bad;
+       } else
+               drv->sock_recv = drv->sock_xmit;
+
+       memset(&iwr, 0, sizeof(iwr));
+       os_strlcpy(iwr.ifr_name, drv->iface, IFNAMSIZ);
+
+       iwr.u.mode = IW_MODE_MASTER;
+
+       if (ioctl(drv->ioctl_sock, SIOCSIWMODE, &iwr) < 0) {
+               perror("ioctl[SIOCSIWMODE]");
+               printf("Could not set interface to master mode!\n");
+               goto bad;
+       }
+
+       madwifi_set_iface_flags(drv, 0);        /* mark down during setup */
+       madwifi_set_privacy(drv->iface, drv, 0); /* default to no privacy */
+
+       madwifi_receive_probe_req(drv);
+
+       return drv;
+bad:
+       if (drv->sock_xmit != NULL)
+               l2_packet_deinit(drv->sock_xmit);
+       if (drv->ioctl_sock >= 0)
+               close(drv->ioctl_sock);
+       if (drv != NULL)
+               free(drv);
+       return NULL;
+}
+
+
+static void
+madwifi_deinit(void *priv)
+{
+       struct madwifi_driver_data *drv = priv;
+
+       (void) madwifi_set_iface_flags(drv, 0);
+       if (drv->ioctl_sock >= 0)
+               close(drv->ioctl_sock);
+       if (drv->sock_recv != NULL && drv->sock_recv != drv->sock_xmit)
+               l2_packet_deinit(drv->sock_recv);
+       if (drv->sock_xmit != NULL)
+               l2_packet_deinit(drv->sock_xmit);
+       if (drv->sock_raw)
+               l2_packet_deinit(drv->sock_raw);
+       free(drv);
+}
+
+static int
+madwifi_set_ssid(const char *ifname, void *priv, const u8 *buf, int len)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct iwreq iwr;
+
+       memset(&iwr, 0, sizeof(iwr));
+       os_strlcpy(iwr.ifr_name, drv->iface, IFNAMSIZ);
+       iwr.u.essid.flags = 1; /* SSID active */
+       iwr.u.essid.pointer = (caddr_t) buf;
+       iwr.u.essid.length = len + 1;
+
+       if (ioctl(drv->ioctl_sock, SIOCSIWESSID, &iwr) < 0) {
+               perror("ioctl[SIOCSIWESSID]");
+               printf("len=%d\n", len);
+               return -1;
+       }
+       return 0;
+}
+
+static int
+madwifi_get_ssid(const char *ifname, void *priv, u8 *buf, int len)
+{
+       struct madwifi_driver_data *drv = priv;
+       struct iwreq iwr;
+       int ret = 0;
+
+       memset(&iwr, 0, sizeof(iwr));
+       os_strlcpy(iwr.ifr_name, drv->iface, IFNAMSIZ);
+       iwr.u.essid.pointer = (caddr_t) buf;
+       iwr.u.essid.length = len;
+
+       if (ioctl(drv->ioctl_sock, SIOCGIWESSID, &iwr) < 0) {
+               perror("ioctl[SIOCGIWESSID]");
+               ret = -1;
+       } else
+               ret = iwr.u.essid.length;
+
+       return ret;
+}
+
+static int
+madwifi_set_countermeasures(void *priv, int enabled)
+{
+       struct madwifi_driver_data *drv = priv;
+       wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
+       return set80211param(drv, IEEE80211_PARAM_COUNTERMEASURES, enabled);
+}
+
+static int
+madwifi_commit(void *priv)
+{
+       return madwifi_set_iface_flags(priv, 1);
+}
+
+const struct wpa_driver_ops wpa_driver_atheros_ops = {
+       .name                   = "atheros",
+       .init                   = madwifi_init,
+       .deinit                 = madwifi_deinit,
+       .set_ieee8021x          = madwifi_set_ieee8021x,
+       .set_privacy            = madwifi_set_privacy,
+       .set_encryption         = madwifi_set_key,
+       .get_seqnum             = madwifi_get_seqnum,
+       .flush                  = madwifi_flush,
+       .set_generic_elem       = madwifi_set_opt_ie,
+       .wireless_event_init    = madwifi_wireless_event_init,
+       .wireless_event_deinit  = madwifi_wireless_event_deinit,
+       .sta_set_flags          = madwifi_sta_set_flags,
+       .read_sta_data          = madwifi_read_sta_driver_data,
+       .send_eapol             = madwifi_send_eapol,
+       .sta_disassoc           = madwifi_sta_disassoc,
+       .sta_deauth             = madwifi_sta_deauth,
+       .set_ssid               = madwifi_set_ssid,
+       .get_ssid               = madwifi_get_ssid,
+       .set_countermeasures    = madwifi_set_countermeasures,
+       .sta_clear_stats        = madwifi_sta_clear_stats,
+       .commit                 = madwifi_commit,
+       .set_wps_beacon_ie      = madwifi_set_wps_beacon_ie,
+       .set_wps_probe_resp_ie  = madwifi_set_wps_probe_resp_ie,
+};
index 3006190..bde6e60 100644 (file)
@@ -27,6 +27,9 @@ extern struct wpa_driver_ops wpa_driver_prism54_ops; /* driver_prism54.c */
 #ifdef CONFIG_DRIVER_MADWIFI
 extern struct wpa_driver_ops wpa_driver_madwifi_ops; /* driver_madwifi.c */
 #endif /* CONFIG_DRIVER_MADWIFI */
+#ifdef CONFIG_DRIVER_ATHEROS
+extern struct wpa_driver_ops wpa_driver_atheros_ops; /* driver_atheros.c */
+#endif /* CONFIG_DRIVER_ATHEROS */
 #ifdef CONFIG_DRIVER_BSD
 extern struct wpa_driver_ops wpa_driver_bsd_ops; /* driver_bsd.c */
 #endif /* CONFIG_DRIVER_BSD */
@@ -55,6 +58,9 @@ struct wpa_driver_ops *hostapd_drivers[] =
 #ifdef CONFIG_DRIVER_MADWIFI
        &wpa_driver_madwifi_ops,
 #endif /* CONFIG_DRIVER_MADWIFI */
+#ifdef CONFIG_DRIVER_ATHEROS
+       &wpa_driver_atheros_ops,
+#endif /* CONFIG_DRIVER_ATHEROS */
 #ifdef CONFIG_DRIVER_BSD
        &wpa_driver_bsd_ops,
 #endif /* CONFIG_DRIVER_BSD */