ap.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553
  1. /*
  2. * WPA Supplicant - Basic AP mode support routines
  3. * Copyright (c) 2003-2009, Jouni Malinen <j@w1.fi>
  4. * Copyright (c) 2009, Atheros Communications
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License version 2 as
  8. * published by the Free Software Foundation.
  9. *
  10. * Alternatively, this software may be distributed under the terms of BSD
  11. * license.
  12. *
  13. * See README and COPYING for more details.
  14. */
  15. #include "includes.h"
  16. #include "common.h"
  17. #include "../hostapd/hostapd.h"
  18. #include "../hostapd/config.h"
  19. #ifdef NEED_AP_MLME
  20. #include "../hostapd/ieee802_11.h"
  21. #endif /* NEED_AP_MLME */
  22. #include "../hostapd/wps_hostapd.h"
  23. #include "eap_common/eap_defs.h"
  24. #include "eap_server/eap_methods.h"
  25. #include "eap_common/eap_wsc_common.h"
  26. #include "wps/wps.h"
  27. #include "config_ssid.h"
  28. #include "wpa_supplicant_i.h"
  29. #include "driver_i.h"
  30. #include "ap.h"
  31. int hostapd_for_each_interface(int (*cb)(struct hostapd_iface *iface,
  32. void *ctx), void *ctx)
  33. {
  34. /* TODO */
  35. return 0;
  36. }
  37. int hostapd_ctrl_iface_init(struct hostapd_data *hapd)
  38. {
  39. return 0;
  40. }
  41. void hostapd_ctrl_iface_deinit(struct hostapd_data *hapd)
  42. {
  43. }
  44. struct ap_driver_data {
  45. struct hostapd_data *hapd;
  46. };
  47. static void * ap_driver_init(struct hostapd_data *hapd,
  48. struct wpa_init_params *params)
  49. {
  50. struct ap_driver_data *drv;
  51. struct wpa_supplicant *wpa_s = hapd->iface->owner;
  52. drv = os_zalloc(sizeof(struct ap_driver_data));
  53. if (drv == NULL) {
  54. wpa_printf(MSG_ERROR, "Could not allocate memory for AP "
  55. "driver data");
  56. return NULL;
  57. }
  58. drv->hapd = hapd;
  59. os_memcpy(hapd->own_addr, wpa_s->own_addr, ETH_ALEN);
  60. return drv;
  61. }
  62. static void ap_driver_deinit(void *priv)
  63. {
  64. struct ap_driver_data *drv = priv;
  65. os_free(drv);
  66. }
  67. static int ap_driver_send_ether(void *priv, const u8 *dst, const u8 *src,
  68. u16 proto, const u8 *data, size_t data_len)
  69. {
  70. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  71. return -1;
  72. }
  73. static int ap_driver_set_key(const char *iface, void *priv, wpa_alg alg,
  74. const u8 *addr, int key_idx, int set_tx,
  75. const u8 *seq, size_t seq_len, const u8 *key,
  76. size_t key_len)
  77. {
  78. struct ap_driver_data *drv = priv;
  79. struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
  80. return wpa_drv_set_key(wpa_s, alg, addr, key_idx, set_tx, seq, seq_len,
  81. key, key_len);
  82. }
  83. static int ap_driver_get_seqnum(const char *iface, void *priv, const u8 *addr,
  84. int idx, u8 *seq)
  85. {
  86. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  87. return -1;
  88. }
  89. static int ap_driver_flush(void *priv)
  90. {
  91. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  92. return -1;
  93. }
  94. static int ap_driver_read_sta_data(void *priv,
  95. struct hostap_sta_driver_data *data,
  96. const u8 *addr)
  97. {
  98. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  99. return -1;
  100. }
  101. static int ap_driver_sta_set_flags(void *priv, const u8 *addr, int total_flags,
  102. int flags_or, int flags_and)
  103. {
  104. struct ap_driver_data *drv = priv;
  105. struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
  106. return wpa_drv_sta_set_flags(wpa_s, addr, total_flags, flags_or,
  107. flags_and);
  108. }
  109. static int ap_driver_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr,
  110. int reason)
  111. {
  112. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  113. return -1;
  114. }
  115. static int ap_driver_sta_disassoc(void *priv, const u8 *own_addr,
  116. const u8 *addr, int reason)
  117. {
  118. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  119. return -1;
  120. }
  121. static int ap_driver_sta_remove(void *priv, const u8 *addr)
  122. {
  123. struct ap_driver_data *drv = priv;
  124. struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
  125. return wpa_drv_sta_remove(wpa_s, addr);
  126. }
  127. static int ap_driver_send_mlme(void *priv, const u8 *data, size_t len)
  128. {
  129. struct ap_driver_data *drv = priv;
  130. struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
  131. return wpa_drv_send_mlme(wpa_s, data, len);
  132. }
  133. static int ap_driver_sta_add(const char *ifname, void *priv,
  134. struct hostapd_sta_add_params *params)
  135. {
  136. struct ap_driver_data *drv = priv;
  137. struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
  138. return wpa_drv_sta_add(wpa_s, params);
  139. }
  140. static int ap_driver_get_inact_sec(void *priv, const u8 *addr)
  141. {
  142. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  143. return -1;
  144. }
  145. static int ap_driver_set_freq(void *priv, struct hostapd_freq_params *freq)
  146. {
  147. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  148. return 0;
  149. }
  150. static int ap_driver_set_beacon(const char *iface, void *priv,
  151. const u8 *head, size_t head_len,
  152. const u8 *tail, size_t tail_len,
  153. int dtim_period)
  154. {
  155. struct ap_driver_data *drv = priv;
  156. struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
  157. return wpa_drv_set_beacon(wpa_s, head, head_len, tail, tail_len,
  158. dtim_period);
  159. }
  160. static int ap_driver_set_beacon_int(void *priv, int value)
  161. {
  162. struct ap_driver_data *drv = priv;
  163. struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
  164. return wpa_drv_set_beacon_int(wpa_s, value);
  165. }
  166. static int ap_driver_set_cts_protect(void *priv, int value)
  167. {
  168. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  169. return -1;
  170. }
  171. static int ap_driver_set_preamble(void *priv, int value)
  172. {
  173. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  174. return -1;
  175. }
  176. static int ap_driver_set_short_slot_time(void *priv, int value)
  177. {
  178. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  179. return -1;
  180. }
  181. static int ap_driver_set_tx_queue_params(void *priv, int queue, int aifs,
  182. int cw_min, int cw_max,
  183. int burst_time)
  184. {
  185. wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
  186. return -1;
  187. }
  188. static struct hostapd_hw_modes *ap_driver_get_hw_feature_data(void *priv,
  189. u16 *num_modes,
  190. u16 *flags)
  191. {
  192. struct ap_driver_data *drv = priv;
  193. struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
  194. return wpa_drv_get_hw_feature_data(wpa_s, num_modes, flags);
  195. }
  196. static int ap_driver_hapd_send_eapol(void *priv, const u8 *addr,
  197. const u8 *data, size_t data_len,
  198. int encrypt, const u8 *own_addr)
  199. {
  200. struct ap_driver_data *drv = priv;
  201. struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
  202. return wpa_drv_hapd_send_eapol(wpa_s, addr, data, data_len, encrypt,
  203. own_addr);
  204. }
  205. struct wpa_driver_ops ap_driver_ops =
  206. {
  207. .name = "wpa_supplicant",
  208. .hapd_init = ap_driver_init,
  209. .hapd_deinit = ap_driver_deinit,
  210. .send_ether = ap_driver_send_ether,
  211. .hapd_set_key = ap_driver_set_key,
  212. .get_seqnum = ap_driver_get_seqnum,
  213. .flush = ap_driver_flush,
  214. .read_sta_data = ap_driver_read_sta_data,
  215. .sta_set_flags = ap_driver_sta_set_flags,
  216. .sta_deauth = ap_driver_sta_deauth,
  217. .sta_disassoc = ap_driver_sta_disassoc,
  218. .sta_remove = ap_driver_sta_remove,
  219. .send_mlme = ap_driver_send_mlme,
  220. .sta_add = ap_driver_sta_add,
  221. .get_inact_sec = ap_driver_get_inact_sec,
  222. .set_freq = ap_driver_set_freq,
  223. .hapd_set_beacon = ap_driver_set_beacon,
  224. .set_beacon_int = ap_driver_set_beacon_int,
  225. .set_cts_protect = ap_driver_set_cts_protect,
  226. .set_preamble = ap_driver_set_preamble,
  227. .set_short_slot_time = ap_driver_set_short_slot_time,
  228. .set_tx_queue_params = ap_driver_set_tx_queue_params,
  229. .get_hw_feature_data = ap_driver_get_hw_feature_data,
  230. .hapd_send_eapol = ap_driver_hapd_send_eapol,
  231. };
  232. extern struct wpa_driver_ops *wpa_drivers[];
  233. static int wpa_supplicant_conf_ap(struct wpa_supplicant *wpa_s,
  234. struct wpa_ssid *ssid,
  235. struct hostapd_config *conf)
  236. {
  237. struct hostapd_bss_config *bss = &conf->bss[0];
  238. int j, pairwise;
  239. for (j = 0; wpa_drivers[j]; j++) {
  240. if (os_strcmp("wpa_supplicant", wpa_drivers[j]->name) == 0) {
  241. conf->driver = wpa_drivers[j];
  242. break;
  243. }
  244. }
  245. if (conf->driver == NULL) {
  246. wpa_printf(MSG_ERROR, "No AP driver ops found");
  247. return -1;
  248. }
  249. os_strlcpy(bss->iface, wpa_s->ifname, sizeof(bss->iface));
  250. if (ssid->frequency == 0) {
  251. /* default channel 11 */
  252. conf->hw_mode = HOSTAPD_MODE_IEEE80211G;
  253. conf->channel = 11;
  254. } else if (ssid->frequency >= 2412 && ssid->frequency <= 2472) {
  255. conf->hw_mode = HOSTAPD_MODE_IEEE80211G;
  256. conf->channel = (ssid->frequency - 2407) / 5;
  257. } else if ((ssid->frequency >= 5180 && ssid->frequency <= 5240) ||
  258. (ssid->frequency >= 5745 && ssid->frequency <= 5825)) {
  259. conf->hw_mode = HOSTAPD_MODE_IEEE80211A;
  260. conf->channel = (ssid->frequency - 5000) / 5;
  261. } else {
  262. wpa_printf(MSG_ERROR, "Unsupported AP mode frequency: %d MHz",
  263. ssid->frequency);
  264. return -1;
  265. }
  266. /* TODO: enable HT if driver supports it;
  267. * drop to 11b if driver does not support 11g */
  268. if (ssid->ssid_len == 0) {
  269. wpa_printf(MSG_ERROR, "No SSID configured for AP mode");
  270. return -1;
  271. }
  272. os_memcpy(bss->ssid.ssid, ssid->ssid, ssid->ssid_len);
  273. bss->ssid.ssid[ssid->ssid_len] = '\0';
  274. bss->ssid.ssid_len = ssid->ssid_len;
  275. bss->ssid.ssid_set = 1;
  276. if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt))
  277. bss->wpa = ssid->proto;
  278. bss->wpa_key_mgmt = ssid->key_mgmt;
  279. bss->wpa_pairwise = ssid->pairwise_cipher;
  280. if (ssid->passphrase) {
  281. bss->ssid.wpa_passphrase = os_strdup(ssid->passphrase);
  282. } else if (ssid->psk_set) {
  283. os_free(bss->ssid.wpa_psk);
  284. bss->ssid.wpa_psk = os_zalloc(sizeof(struct hostapd_wpa_psk));
  285. if (bss->ssid.wpa_psk == NULL)
  286. return -1;
  287. os_memcpy(bss->ssid.wpa_psk->psk, ssid->psk, PMK_LEN);
  288. bss->ssid.wpa_psk->group = 1;
  289. }
  290. /* Select group cipher based on the enabled pairwise cipher suites */
  291. pairwise = 0;
  292. if (bss->wpa & 1)
  293. pairwise |= bss->wpa_pairwise;
  294. if (bss->wpa & 2) {
  295. if (bss->rsn_pairwise == 0)
  296. bss->rsn_pairwise = bss->wpa_pairwise;
  297. pairwise |= bss->rsn_pairwise;
  298. }
  299. if (pairwise & WPA_CIPHER_TKIP)
  300. bss->wpa_group = WPA_CIPHER_TKIP;
  301. else
  302. bss->wpa_group = WPA_CIPHER_CCMP;
  303. if (bss->wpa && bss->ieee802_1x)
  304. bss->ssid.security_policy = SECURITY_WPA;
  305. else if (bss->wpa)
  306. bss->ssid.security_policy = SECURITY_WPA_PSK;
  307. else if (bss->ieee802_1x) {
  308. bss->ssid.security_policy = SECURITY_IEEE_802_1X;
  309. bss->ssid.wep.default_len = bss->default_wep_key_len;
  310. } else if (bss->ssid.wep.keys_set)
  311. bss->ssid.security_policy = SECURITY_STATIC_WEP;
  312. else
  313. bss->ssid.security_policy = SECURITY_PLAINTEXT;
  314. #ifdef CONFIG_WPS
  315. /*
  316. * Enable WPS by default, but require user interaction to actually use
  317. * it. Only the internal Registrar is supported.
  318. */
  319. bss->eap_server = 1;
  320. bss->wps_state = 2;
  321. bss->ap_setup_locked = 1;
  322. bss->config_methods = os_strdup("display push_button");
  323. #endif /* CONFIG_WPS */
  324. return 0;
  325. }
  326. int wpa_supplicant_create_ap(struct wpa_supplicant *wpa_s,
  327. struct wpa_ssid *ssid)
  328. {
  329. struct wpa_driver_associate_params params;
  330. struct hostapd_iface *hapd_iface;
  331. struct hostapd_config *conf;
  332. size_t i;
  333. if (ssid->ssid == NULL || ssid->ssid_len == 0) {
  334. wpa_printf(MSG_ERROR, "No SSID configured for AP mode");
  335. return -1;
  336. }
  337. wpa_supplicant_ap_deinit(wpa_s);
  338. wpa_printf(MSG_DEBUG, "Setting up AP (SSID='%s')",
  339. wpa_ssid_txt(ssid->ssid, ssid->ssid_len));
  340. os_memset(&params, 0, sizeof(params));
  341. params.ssid = ssid->ssid;
  342. params.ssid_len = ssid->ssid_len;
  343. params.mode = ssid->mode;
  344. params.freq = ssid->frequency;
  345. if (wpa_drv_associate(wpa_s, &params) < 0) {
  346. wpa_msg(wpa_s, MSG_INFO, "Failed to start AP functionality");
  347. return -1;
  348. }
  349. wpa_s->ap_iface = hapd_iface = os_zalloc(sizeof(*wpa_s->ap_iface));
  350. if (hapd_iface == NULL)
  351. return -1;
  352. hapd_iface->owner = wpa_s;
  353. wpa_s->ap_iface->conf = conf = hostapd_config_defaults();
  354. if (conf == NULL) {
  355. wpa_supplicant_ap_deinit(wpa_s);
  356. return -1;
  357. }
  358. if (wpa_supplicant_conf_ap(wpa_s, ssid, conf)) {
  359. wpa_printf(MSG_ERROR, "Failed to create AP configuration");
  360. wpa_supplicant_ap_deinit(wpa_s);
  361. return -1;
  362. }
  363. hapd_iface->num_bss = conf->num_bss;
  364. hapd_iface->bss = os_zalloc(conf->num_bss *
  365. sizeof(struct hostapd_data *));
  366. if (hapd_iface->bss == NULL) {
  367. wpa_supplicant_ap_deinit(wpa_s);
  368. return -1;
  369. }
  370. for (i = 0; i < conf->num_bss; i++) {
  371. hapd_iface->bss[i] =
  372. hostapd_alloc_bss_data(hapd_iface, conf,
  373. &conf->bss[i]);
  374. if (hapd_iface->bss[i] == NULL) {
  375. wpa_supplicant_ap_deinit(wpa_s);
  376. return -1;
  377. }
  378. }
  379. if (hostapd_setup_interface(wpa_s->ap_iface)) {
  380. wpa_printf(MSG_ERROR, "Failed to initialize AP interface");
  381. wpa_supplicant_ap_deinit(wpa_s);
  382. return -1;
  383. }
  384. wpa_s->current_ssid = ssid;
  385. wpa_supplicant_set_state(wpa_s, WPA_COMPLETED);
  386. return 0;
  387. }
  388. void wpa_supplicant_ap_deinit(struct wpa_supplicant *wpa_s)
  389. {
  390. if (wpa_s->ap_iface == NULL)
  391. return;
  392. hostapd_interface_deinit(wpa_s->ap_iface);
  393. wpa_s->ap_iface = NULL;
  394. }
  395. void ap_tx_status(void *ctx, const u8 *addr,
  396. const u8 *buf, size_t len, int ack)
  397. {
  398. struct wpa_supplicant *wpa_s = ctx;
  399. hostapd_tx_status(wpa_s->ap_iface->bss[0], addr, buf, len, ack);
  400. }
  401. void ap_rx_from_unknown_sta(void *ctx, const u8 *addr)
  402. {
  403. struct wpa_supplicant *wpa_s = ctx;
  404. ap_rx_from_unknown_sta(wpa_s->ap_iface->bss[0], addr);
  405. }
  406. #ifdef NEED_AP_MLME
  407. void ap_mgmt_rx(void *ctx, u8 *buf, size_t len, u16 stype,
  408. struct hostapd_frame_info *fi)
  409. {
  410. struct wpa_supplicant *wpa_s = ctx;
  411. ieee802_11_mgmt(wpa_s->ap_iface->bss[0], buf, len, stype, fi);
  412. }
  413. void ap_mgmt_tx_cb(void *ctx, u8 *buf, size_t len, u16 stype, int ok)
  414. {
  415. struct wpa_supplicant *wpa_s = ctx;
  416. ieee802_11_mgmt_cb(wpa_s->ap_iface->bss[0], buf, len, stype, ok);
  417. }
  418. #endif /* NEED_AP_MLME */
  419. void wpa_supplicant_ap_rx_eapol(struct wpa_supplicant *wpa_s,
  420. const u8 *src_addr, const u8 *buf, size_t len)
  421. {
  422. hostapd_eapol_receive(wpa_s->ap_iface->bss[0], src_addr, buf, len);
  423. }
  424. #ifdef CONFIG_WPS
  425. int wpa_supplicant_ap_wps_pbc(struct wpa_supplicant *wpa_s, const u8 *bssid)
  426. {
  427. return hostapd_wps_button_pushed(wpa_s->ap_iface->bss[0]);
  428. }
  429. int wpa_supplicant_ap_wps_pin(struct wpa_supplicant *wpa_s, const u8 *bssid,
  430. const char *pin, char *buf, size_t buflen)
  431. {
  432. int ret, ret_len = 0;
  433. if (pin == NULL) {
  434. unsigned int rpin = wps_generate_pin();
  435. ret_len = os_snprintf(buf, buflen, "%d", rpin);
  436. pin = buf;
  437. }
  438. ret = hostapd_wps_add_pin(wpa_s->ap_iface->bss[0], "any", pin, 0);
  439. if (ret)
  440. return -1;
  441. return ret_len;
  442. }
  443. #endif /* CONFIG_WPS */