hostapd.c revision fb79edc9df1f20461e90e478363d207348213d35
1/* 2 * hostapd / Initialization and configuration 3 * Copyright (c) 2002-2013, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9#include "utils/includes.h" 10 11#include "utils/common.h" 12#include "utils/eloop.h" 13#include "common/ieee802_11_defs.h" 14#include "common/wpa_ctrl.h" 15#include "radius/radius_client.h" 16#include "radius/radius_das.h" 17#include "hostapd.h" 18#include "authsrv.h" 19#include "sta_info.h" 20#include "accounting.h" 21#include "ap_list.h" 22#include "beacon.h" 23#include "iapp.h" 24#include "ieee802_1x.h" 25#include "ieee802_11_auth.h" 26#include "vlan_init.h" 27#include "wpa_auth.h" 28#include "wps_hostapd.h" 29#include "hw_features.h" 30#include "wpa_auth_glue.h" 31#include "ap_drv_ops.h" 32#include "ap_config.h" 33#include "p2p_hostapd.h" 34#include "gas_serv.h" 35#include "dfs.h" 36 37 38static int hostapd_flush_old_stations(struct hostapd_data *hapd, u16 reason); 39static int hostapd_setup_encryption(char *iface, struct hostapd_data *hapd); 40static int hostapd_broadcast_wep_clear(struct hostapd_data *hapd); 41static int setup_interface2(struct hostapd_iface *iface); 42static void channel_list_update_timeout(void *eloop_ctx, void *timeout_ctx); 43 44 45int hostapd_for_each_interface(struct hapd_interfaces *interfaces, 46 int (*cb)(struct hostapd_iface *iface, 47 void *ctx), void *ctx) 48{ 49 size_t i; 50 int ret; 51 52 for (i = 0; i < interfaces->count; i++) { 53 ret = cb(interfaces->iface[i], ctx); 54 if (ret) 55 return ret; 56 } 57 58 return 0; 59} 60 61 62static void hostapd_reload_bss(struct hostapd_data *hapd) 63{ 64 struct hostapd_ssid *ssid; 65 66#ifndef CONFIG_NO_RADIUS 67 radius_client_reconfig(hapd->radius, hapd->conf->radius); 68#endif /* CONFIG_NO_RADIUS */ 69 70 ssid = &hapd->conf->ssid; 71 if (!ssid->wpa_psk_set && ssid->wpa_psk && !ssid->wpa_psk->next && 72 ssid->wpa_passphrase_set && ssid->wpa_passphrase) { 73 /* 74 * Force PSK to be derived again since SSID or passphrase may 75 * have changed. 76 */ 77 os_free(ssid->wpa_psk); 78 ssid->wpa_psk = NULL; 79 } 80 if (hostapd_setup_wpa_psk(hapd->conf)) { 81 wpa_printf(MSG_ERROR, "Failed to re-configure WPA PSK " 82 "after reloading configuration"); 83 } 84 85 if (hapd->conf->ieee802_1x || hapd->conf->wpa) 86 hostapd_set_drv_ieee8021x(hapd, hapd->conf->iface, 1); 87 else 88 hostapd_set_drv_ieee8021x(hapd, hapd->conf->iface, 0); 89 90 if (hapd->conf->wpa && hapd->wpa_auth == NULL) { 91 hostapd_setup_wpa(hapd); 92 if (hapd->wpa_auth) 93 wpa_init_keys(hapd->wpa_auth); 94 } else if (hapd->conf->wpa) { 95 const u8 *wpa_ie; 96 size_t wpa_ie_len; 97 hostapd_reconfig_wpa(hapd); 98 wpa_ie = wpa_auth_get_wpa_ie(hapd->wpa_auth, &wpa_ie_len); 99 if (hostapd_set_generic_elem(hapd, wpa_ie, wpa_ie_len)) 100 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for " 101 "the kernel driver."); 102 } else if (hapd->wpa_auth) { 103 wpa_deinit(hapd->wpa_auth); 104 hapd->wpa_auth = NULL; 105 hostapd_set_privacy(hapd, 0); 106 hostapd_setup_encryption(hapd->conf->iface, hapd); 107 hostapd_set_generic_elem(hapd, (u8 *) "", 0); 108 } 109 110 ieee802_11_set_beacon(hapd); 111 hostapd_update_wps(hapd); 112 113 if (hapd->conf->ssid.ssid_set && 114 hostapd_set_ssid(hapd, hapd->conf->ssid.ssid, 115 hapd->conf->ssid.ssid_len)) { 116 wpa_printf(MSG_ERROR, "Could not set SSID for kernel driver"); 117 /* try to continue */ 118 } 119 wpa_printf(MSG_DEBUG, "Reconfigured interface %s", hapd->conf->iface); 120} 121 122 123static void hostapd_clear_old(struct hostapd_iface *iface) 124{ 125 size_t j; 126 127 /* 128 * Deauthenticate all stations since the new configuration may not 129 * allow them to use the BSS anymore. 130 */ 131 for (j = 0; j < iface->num_bss; j++) { 132 hostapd_flush_old_stations(iface->bss[j], 133 WLAN_REASON_PREV_AUTH_NOT_VALID); 134 hostapd_broadcast_wep_clear(iface->bss[j]); 135 136#ifndef CONFIG_NO_RADIUS 137 /* TODO: update dynamic data based on changed configuration 138 * items (e.g., open/close sockets, etc.) */ 139 radius_client_flush(iface->bss[j]->radius, 0); 140#endif /* CONFIG_NO_RADIUS */ 141 } 142} 143 144 145int hostapd_reload_config(struct hostapd_iface *iface) 146{ 147 struct hostapd_data *hapd = iface->bss[0]; 148 struct hostapd_config *newconf, *oldconf; 149 size_t j; 150 151 if (iface->config_fname == NULL) { 152 /* Only in-memory config in use - assume it has been updated */ 153 hostapd_clear_old(iface); 154 for (j = 0; j < iface->num_bss; j++) 155 hostapd_reload_bss(iface->bss[j]); 156 return 0; 157 } 158 159 if (iface->interfaces == NULL || 160 iface->interfaces->config_read_cb == NULL) 161 return -1; 162 newconf = iface->interfaces->config_read_cb(iface->config_fname); 163 if (newconf == NULL) 164 return -1; 165 166 hostapd_clear_old(iface); 167 168 oldconf = hapd->iconf; 169 iface->conf = newconf; 170 171 for (j = 0; j < iface->num_bss; j++) { 172 hapd = iface->bss[j]; 173 hapd->iconf = newconf; 174 hapd->conf = newconf->bss[j]; 175 hostapd_reload_bss(hapd); 176 } 177 178 hostapd_config_free(oldconf); 179 180 181 return 0; 182} 183 184 185static void hostapd_broadcast_key_clear_iface(struct hostapd_data *hapd, 186 char *ifname) 187{ 188 int i; 189 190 for (i = 0; i < NUM_WEP_KEYS; i++) { 191 if (hostapd_drv_set_key(ifname, hapd, WPA_ALG_NONE, NULL, i, 192 0, NULL, 0, NULL, 0)) { 193 wpa_printf(MSG_DEBUG, "Failed to clear default " 194 "encryption keys (ifname=%s keyidx=%d)", 195 ifname, i); 196 } 197 } 198#ifdef CONFIG_IEEE80211W 199 if (hapd->conf->ieee80211w) { 200 for (i = NUM_WEP_KEYS; i < NUM_WEP_KEYS + 2; i++) { 201 if (hostapd_drv_set_key(ifname, hapd, WPA_ALG_NONE, 202 NULL, i, 0, NULL, 203 0, NULL, 0)) { 204 wpa_printf(MSG_DEBUG, "Failed to clear " 205 "default mgmt encryption keys " 206 "(ifname=%s keyidx=%d)", ifname, i); 207 } 208 } 209 } 210#endif /* CONFIG_IEEE80211W */ 211} 212 213 214static int hostapd_broadcast_wep_clear(struct hostapd_data *hapd) 215{ 216 hostapd_broadcast_key_clear_iface(hapd, hapd->conf->iface); 217 return 0; 218} 219 220 221static int hostapd_broadcast_wep_set(struct hostapd_data *hapd) 222{ 223 int errors = 0, idx; 224 struct hostapd_ssid *ssid = &hapd->conf->ssid; 225 226 idx = ssid->wep.idx; 227 if (ssid->wep.default_len && 228 hostapd_drv_set_key(hapd->conf->iface, 229 hapd, WPA_ALG_WEP, broadcast_ether_addr, idx, 230 1, NULL, 0, ssid->wep.key[idx], 231 ssid->wep.len[idx])) { 232 wpa_printf(MSG_WARNING, "Could not set WEP encryption."); 233 errors++; 234 } 235 236 return errors; 237} 238 239 240static void hostapd_free_hapd_data(struct hostapd_data *hapd) 241{ 242 if (!hapd->started) { 243 wpa_printf(MSG_ERROR, "%s: Interface %s wasn't started", 244 __func__, hapd->conf->iface); 245 return; 246 } 247 hapd->started = 0; 248 249 wpa_printf(MSG_DEBUG, "%s(%s)", __func__, hapd->conf->iface); 250 iapp_deinit(hapd->iapp); 251 hapd->iapp = NULL; 252 accounting_deinit(hapd); 253 hostapd_deinit_wpa(hapd); 254 vlan_deinit(hapd); 255 hostapd_acl_deinit(hapd); 256#ifndef CONFIG_NO_RADIUS 257 radius_client_deinit(hapd->radius); 258 hapd->radius = NULL; 259 radius_das_deinit(hapd->radius_das); 260 hapd->radius_das = NULL; 261#endif /* CONFIG_NO_RADIUS */ 262 263 hostapd_deinit_wps(hapd); 264 265 authsrv_deinit(hapd); 266 267 if (hapd->interface_added && 268 hostapd_if_remove(hapd, WPA_IF_AP_BSS, hapd->conf->iface)) { 269 wpa_printf(MSG_WARNING, "Failed to remove BSS interface %s", 270 hapd->conf->iface); 271 } 272 273 os_free(hapd->probereq_cb); 274 hapd->probereq_cb = NULL; 275 276#ifdef CONFIG_P2P 277 wpabuf_free(hapd->p2p_beacon_ie); 278 hapd->p2p_beacon_ie = NULL; 279 wpabuf_free(hapd->p2p_probe_resp_ie); 280 hapd->p2p_probe_resp_ie = NULL; 281#endif /* CONFIG_P2P */ 282 283 wpabuf_free(hapd->time_adv); 284 285#ifdef CONFIG_INTERWORKING 286 gas_serv_deinit(hapd); 287#endif /* CONFIG_INTERWORKING */ 288 289#ifdef CONFIG_SQLITE 290 os_free(hapd->tmp_eap_user.identity); 291 os_free(hapd->tmp_eap_user.password); 292#endif /* CONFIG_SQLITE */ 293} 294 295 296/** 297 * hostapd_cleanup - Per-BSS cleanup (deinitialization) 298 * @hapd: Pointer to BSS data 299 * 300 * This function is used to free all per-BSS data structures and resources. 301 * Most of the modules that are initialized in hostapd_setup_bss() are 302 * deinitialized here. 303 */ 304static void hostapd_cleanup(struct hostapd_data *hapd) 305{ 306 wpa_printf(MSG_DEBUG, "%s(hapd=%p (%s))", __func__, hapd, 307 hapd->conf->iface); 308 if (hapd->iface->interfaces && 309 hapd->iface->interfaces->ctrl_iface_deinit) 310 hapd->iface->interfaces->ctrl_iface_deinit(hapd); 311 hostapd_free_hapd_data(hapd); 312} 313 314 315static void hostapd_cleanup_iface_partial(struct hostapd_iface *iface) 316{ 317 wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface); 318 hostapd_free_hw_features(iface->hw_features, iface->num_hw_features); 319 iface->hw_features = NULL; 320 os_free(iface->current_rates); 321 iface->current_rates = NULL; 322 os_free(iface->basic_rates); 323 iface->basic_rates = NULL; 324 ap_list_deinit(iface); 325} 326 327 328/** 329 * hostapd_cleanup_iface - Complete per-interface cleanup 330 * @iface: Pointer to interface data 331 * 332 * This function is called after per-BSS data structures are deinitialized 333 * with hostapd_cleanup(). 334 */ 335static void hostapd_cleanup_iface(struct hostapd_iface *iface) 336{ 337 wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface); 338 eloop_cancel_timeout(channel_list_update_timeout, iface, NULL); 339 340 hostapd_cleanup_iface_partial(iface); 341 hostapd_config_free(iface->conf); 342 iface->conf = NULL; 343 344 os_free(iface->config_fname); 345 os_free(iface->bss); 346 wpa_printf(MSG_DEBUG, "%s: free iface=%p", __func__, iface); 347 os_free(iface); 348} 349 350 351static void hostapd_clear_wep(struct hostapd_data *hapd) 352{ 353 if (hapd->drv_priv) { 354 hostapd_set_privacy(hapd, 0); 355 hostapd_broadcast_wep_clear(hapd); 356 } 357} 358 359 360static int hostapd_setup_encryption(char *iface, struct hostapd_data *hapd) 361{ 362 int i; 363 364 hostapd_broadcast_wep_set(hapd); 365 366 if (hapd->conf->ssid.wep.default_len) { 367 hostapd_set_privacy(hapd, 1); 368 return 0; 369 } 370 371 /* 372 * When IEEE 802.1X is not enabled, the driver may need to know how to 373 * set authentication algorithms for static WEP. 374 */ 375 hostapd_drv_set_authmode(hapd, hapd->conf->auth_algs); 376 377 for (i = 0; i < 4; i++) { 378 if (hapd->conf->ssid.wep.key[i] && 379 hostapd_drv_set_key(iface, hapd, WPA_ALG_WEP, NULL, i, 380 i == hapd->conf->ssid.wep.idx, NULL, 0, 381 hapd->conf->ssid.wep.key[i], 382 hapd->conf->ssid.wep.len[i])) { 383 wpa_printf(MSG_WARNING, "Could not set WEP " 384 "encryption."); 385 return -1; 386 } 387 if (hapd->conf->ssid.wep.key[i] && 388 i == hapd->conf->ssid.wep.idx) 389 hostapd_set_privacy(hapd, 1); 390 } 391 392 return 0; 393} 394 395 396static int hostapd_flush_old_stations(struct hostapd_data *hapd, u16 reason) 397{ 398 int ret = 0; 399 u8 addr[ETH_ALEN]; 400 401 if (hostapd_drv_none(hapd) || hapd->drv_priv == NULL) 402 return 0; 403 404 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "Flushing old station entries"); 405 if (hostapd_flush(hapd)) { 406 wpa_msg(hapd->msg_ctx, MSG_WARNING, "Could not connect to " 407 "kernel driver"); 408 ret = -1; 409 } 410 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "Deauthenticate all stations"); 411 os_memset(addr, 0xff, ETH_ALEN); 412 hostapd_drv_sta_deauth(hapd, addr, reason); 413 hostapd_free_stas(hapd); 414 415 return ret; 416} 417 418 419/** 420 * hostapd_validate_bssid_configuration - Validate BSSID configuration 421 * @iface: Pointer to interface data 422 * Returns: 0 on success, -1 on failure 423 * 424 * This function is used to validate that the configured BSSIDs are valid. 425 */ 426static int hostapd_validate_bssid_configuration(struct hostapd_iface *iface) 427{ 428 u8 mask[ETH_ALEN] = { 0 }; 429 struct hostapd_data *hapd = iface->bss[0]; 430 unsigned int i = iface->conf->num_bss, bits = 0, j; 431 int auto_addr = 0; 432 433 if (hostapd_drv_none(hapd)) 434 return 0; 435 436 /* Generate BSSID mask that is large enough to cover the BSSIDs. */ 437 438 /* Determine the bits necessary to cover the number of BSSIDs. */ 439 for (i--; i; i >>= 1) 440 bits++; 441 442 /* Determine the bits necessary to any configured BSSIDs, 443 if they are higher than the number of BSSIDs. */ 444 for (j = 0; j < iface->conf->num_bss; j++) { 445 if (hostapd_mac_comp_empty(iface->conf->bss[j]->bssid) == 0) { 446 if (j) 447 auto_addr++; 448 continue; 449 } 450 451 for (i = 0; i < ETH_ALEN; i++) { 452 mask[i] |= 453 iface->conf->bss[j]->bssid[i] ^ 454 hapd->own_addr[i]; 455 } 456 } 457 458 if (!auto_addr) 459 goto skip_mask_ext; 460 461 for (i = 0; i < ETH_ALEN && mask[i] == 0; i++) 462 ; 463 j = 0; 464 if (i < ETH_ALEN) { 465 j = (5 - i) * 8; 466 467 while (mask[i] != 0) { 468 mask[i] >>= 1; 469 j++; 470 } 471 } 472 473 if (bits < j) 474 bits = j; 475 476 if (bits > 40) { 477 wpa_printf(MSG_ERROR, "Too many bits in the BSSID mask (%u)", 478 bits); 479 return -1; 480 } 481 482 os_memset(mask, 0xff, ETH_ALEN); 483 j = bits / 8; 484 for (i = 5; i > 5 - j; i--) 485 mask[i] = 0; 486 j = bits % 8; 487 while (j--) 488 mask[i] <<= 1; 489 490skip_mask_ext: 491 wpa_printf(MSG_DEBUG, "BSS count %lu, BSSID mask " MACSTR " (%d bits)", 492 (unsigned long) iface->conf->num_bss, MAC2STR(mask), bits); 493 494 if (!auto_addr) 495 return 0; 496 497 for (i = 0; i < ETH_ALEN; i++) { 498 if ((hapd->own_addr[i] & mask[i]) != hapd->own_addr[i]) { 499 wpa_printf(MSG_ERROR, "Invalid BSSID mask " MACSTR 500 " for start address " MACSTR ".", 501 MAC2STR(mask), MAC2STR(hapd->own_addr)); 502 wpa_printf(MSG_ERROR, "Start address must be the " 503 "first address in the block (i.e., addr " 504 "AND mask == addr)."); 505 return -1; 506 } 507 } 508 509 return 0; 510} 511 512 513static int mac_in_conf(struct hostapd_config *conf, const void *a) 514{ 515 size_t i; 516 517 for (i = 0; i < conf->num_bss; i++) { 518 if (hostapd_mac_comp(conf->bss[i]->bssid, a) == 0) { 519 return 1; 520 } 521 } 522 523 return 0; 524} 525 526 527#ifndef CONFIG_NO_RADIUS 528 529static int hostapd_das_nas_mismatch(struct hostapd_data *hapd, 530 struct radius_das_attrs *attr) 531{ 532 /* TODO */ 533 return 0; 534} 535 536 537static struct sta_info * hostapd_das_find_sta(struct hostapd_data *hapd, 538 struct radius_das_attrs *attr) 539{ 540 struct sta_info *sta = NULL; 541 char buf[128]; 542 543 if (attr->sta_addr) 544 sta = ap_get_sta(hapd, attr->sta_addr); 545 546 if (sta == NULL && attr->acct_session_id && 547 attr->acct_session_id_len == 17) { 548 for (sta = hapd->sta_list; sta; sta = sta->next) { 549 os_snprintf(buf, sizeof(buf), "%08X-%08X", 550 sta->acct_session_id_hi, 551 sta->acct_session_id_lo); 552 if (os_memcmp(attr->acct_session_id, buf, 17) == 0) 553 break; 554 } 555 } 556 557 if (sta == NULL && attr->cui) { 558 for (sta = hapd->sta_list; sta; sta = sta->next) { 559 struct wpabuf *cui; 560 cui = ieee802_1x_get_radius_cui(sta->eapol_sm); 561 if (cui && wpabuf_len(cui) == attr->cui_len && 562 os_memcmp(wpabuf_head(cui), attr->cui, 563 attr->cui_len) == 0) 564 break; 565 } 566 } 567 568 if (sta == NULL && attr->user_name) { 569 for (sta = hapd->sta_list; sta; sta = sta->next) { 570 u8 *identity; 571 size_t identity_len; 572 identity = ieee802_1x_get_identity(sta->eapol_sm, 573 &identity_len); 574 if (identity && 575 identity_len == attr->user_name_len && 576 os_memcmp(identity, attr->user_name, identity_len) 577 == 0) 578 break; 579 } 580 } 581 582 return sta; 583} 584 585 586static enum radius_das_res 587hostapd_das_disconnect(void *ctx, struct radius_das_attrs *attr) 588{ 589 struct hostapd_data *hapd = ctx; 590 struct sta_info *sta; 591 592 if (hostapd_das_nas_mismatch(hapd, attr)) 593 return RADIUS_DAS_NAS_MISMATCH; 594 595 sta = hostapd_das_find_sta(hapd, attr); 596 if (sta == NULL) 597 return RADIUS_DAS_SESSION_NOT_FOUND; 598 599 hostapd_drv_sta_deauth(hapd, sta->addr, 600 WLAN_REASON_PREV_AUTH_NOT_VALID); 601 ap_sta_deauthenticate(hapd, sta, WLAN_REASON_PREV_AUTH_NOT_VALID); 602 603 return RADIUS_DAS_SUCCESS; 604} 605 606#endif /* CONFIG_NO_RADIUS */ 607 608 609/** 610 * hostapd_setup_bss - Per-BSS setup (initialization) 611 * @hapd: Pointer to BSS data 612 * @first: Whether this BSS is the first BSS of an interface; -1 = not first, 613 * but interface may exist 614 * 615 * This function is used to initialize all per-BSS data structures and 616 * resources. This gets called in a loop for each BSS when an interface is 617 * initialized. Most of the modules that are initialized here will be 618 * deinitialized in hostapd_cleanup(). 619 */ 620static int hostapd_setup_bss(struct hostapd_data *hapd, int first) 621{ 622 struct hostapd_bss_config *conf = hapd->conf; 623 u8 ssid[HOSTAPD_MAX_SSID_LEN + 1]; 624 int ssid_len, set_ssid; 625 char force_ifname[IFNAMSIZ]; 626 u8 if_addr[ETH_ALEN]; 627 628 wpa_printf(MSG_DEBUG, "%s(hapd=%p (%s), first=%d)", 629 __func__, hapd, hapd->conf->iface, first); 630 631 if (hapd->started) { 632 wpa_printf(MSG_ERROR, "%s: Interface %s was already started", 633 __func__, hapd->conf->iface); 634 return -1; 635 } 636 hapd->started = 1; 637 638 if (!first || first == -1) { 639 if (hostapd_mac_comp_empty(hapd->conf->bssid) == 0) { 640 /* Allocate the next available BSSID. */ 641 do { 642 inc_byte_array(hapd->own_addr, ETH_ALEN); 643 } while (mac_in_conf(hapd->iconf, hapd->own_addr)); 644 } else { 645 /* Allocate the configured BSSID. */ 646 os_memcpy(hapd->own_addr, hapd->conf->bssid, ETH_ALEN); 647 648 if (hostapd_mac_comp(hapd->own_addr, 649 hapd->iface->bss[0]->own_addr) == 650 0) { 651 wpa_printf(MSG_ERROR, "BSS '%s' may not have " 652 "BSSID set to the MAC address of " 653 "the radio", hapd->conf->iface); 654 return -1; 655 } 656 } 657 658 hapd->interface_added = 1; 659 if (hostapd_if_add(hapd->iface->bss[0], WPA_IF_AP_BSS, 660 hapd->conf->iface, hapd->own_addr, hapd, 661 &hapd->drv_priv, force_ifname, if_addr, 662 hapd->conf->bridge[0] ? hapd->conf->bridge : 663 NULL, first == -1)) { 664 wpa_printf(MSG_ERROR, "Failed to add BSS (BSSID=" 665 MACSTR ")", MAC2STR(hapd->own_addr)); 666 hapd->interface_added = 0; 667 return -1; 668 } 669 } 670 671 if (conf->wmm_enabled < 0) 672 conf->wmm_enabled = hapd->iconf->ieee80211n; 673 674 hostapd_flush_old_stations(hapd, WLAN_REASON_PREV_AUTH_NOT_VALID); 675 hostapd_set_privacy(hapd, 0); 676 677 hostapd_broadcast_wep_clear(hapd); 678 if (hostapd_setup_encryption(hapd->conf->iface, hapd)) 679 return -1; 680 681 /* 682 * Fetch the SSID from the system and use it or, 683 * if one was specified in the config file, verify they 684 * match. 685 */ 686 ssid_len = hostapd_get_ssid(hapd, ssid, sizeof(ssid)); 687 if (ssid_len < 0) { 688 wpa_printf(MSG_ERROR, "Could not read SSID from system"); 689 return -1; 690 } 691 if (conf->ssid.ssid_set) { 692 /* 693 * If SSID is specified in the config file and it differs 694 * from what is being used then force installation of the 695 * new SSID. 696 */ 697 set_ssid = (conf->ssid.ssid_len != (size_t) ssid_len || 698 os_memcmp(conf->ssid.ssid, ssid, ssid_len) != 0); 699 } else { 700 /* 701 * No SSID in the config file; just use the one we got 702 * from the system. 703 */ 704 set_ssid = 0; 705 conf->ssid.ssid_len = ssid_len; 706 os_memcpy(conf->ssid.ssid, ssid, conf->ssid.ssid_len); 707 } 708 709 if (!hostapd_drv_none(hapd)) { 710 wpa_printf(MSG_ERROR, "Using interface %s with hwaddr " MACSTR 711 " and ssid \"%s\"", 712 hapd->conf->iface, MAC2STR(hapd->own_addr), 713 wpa_ssid_txt(hapd->conf->ssid.ssid, 714 hapd->conf->ssid.ssid_len)); 715 } 716 717 if (hostapd_setup_wpa_psk(conf)) { 718 wpa_printf(MSG_ERROR, "WPA-PSK setup failed."); 719 return -1; 720 } 721 722 /* Set SSID for the kernel driver (to be used in beacon and probe 723 * response frames) */ 724 if (set_ssid && hostapd_set_ssid(hapd, conf->ssid.ssid, 725 conf->ssid.ssid_len)) { 726 wpa_printf(MSG_ERROR, "Could not set SSID for kernel driver"); 727 return -1; 728 } 729 730 if (wpa_debug_level == MSG_MSGDUMP) 731 conf->radius->msg_dumps = 1; 732#ifndef CONFIG_NO_RADIUS 733 hapd->radius = radius_client_init(hapd, conf->radius); 734 if (hapd->radius == NULL) { 735 wpa_printf(MSG_ERROR, "RADIUS client initialization failed."); 736 return -1; 737 } 738 739 if (hapd->conf->radius_das_port) { 740 struct radius_das_conf das_conf; 741 os_memset(&das_conf, 0, sizeof(das_conf)); 742 das_conf.port = hapd->conf->radius_das_port; 743 das_conf.shared_secret = hapd->conf->radius_das_shared_secret; 744 das_conf.shared_secret_len = 745 hapd->conf->radius_das_shared_secret_len; 746 das_conf.client_addr = &hapd->conf->radius_das_client_addr; 747 das_conf.time_window = hapd->conf->radius_das_time_window; 748 das_conf.require_event_timestamp = 749 hapd->conf->radius_das_require_event_timestamp; 750 das_conf.ctx = hapd; 751 das_conf.disconnect = hostapd_das_disconnect; 752 hapd->radius_das = radius_das_init(&das_conf); 753 if (hapd->radius_das == NULL) { 754 wpa_printf(MSG_ERROR, "RADIUS DAS initialization " 755 "failed."); 756 return -1; 757 } 758 } 759#endif /* CONFIG_NO_RADIUS */ 760 761 if (hostapd_acl_init(hapd)) { 762 wpa_printf(MSG_ERROR, "ACL initialization failed."); 763 return -1; 764 } 765 if (hostapd_init_wps(hapd, conf)) 766 return -1; 767 768 if (authsrv_init(hapd) < 0) 769 return -1; 770 771 if (ieee802_1x_init(hapd)) { 772 wpa_printf(MSG_ERROR, "IEEE 802.1X initialization failed."); 773 return -1; 774 } 775 776 if (hapd->conf->wpa && hostapd_setup_wpa(hapd)) 777 return -1; 778 779 if (accounting_init(hapd)) { 780 wpa_printf(MSG_ERROR, "Accounting initialization failed."); 781 return -1; 782 } 783 784 if (hapd->conf->ieee802_11f && 785 (hapd->iapp = iapp_init(hapd, hapd->conf->iapp_iface)) == NULL) { 786 wpa_printf(MSG_ERROR, "IEEE 802.11F (IAPP) initialization " 787 "failed."); 788 return -1; 789 } 790 791#ifdef CONFIG_INTERWORKING 792 if (gas_serv_init(hapd)) { 793 wpa_printf(MSG_ERROR, "GAS server initialization failed"); 794 return -1; 795 } 796 797 if (conf->qos_map_set_len && 798 hostapd_drv_set_qos_map(hapd, conf->qos_map_set, 799 conf->qos_map_set_len)) { 800 wpa_printf(MSG_ERROR, "Failed to initialize QoS Map"); 801 return -1; 802 } 803#endif /* CONFIG_INTERWORKING */ 804 805 if (!hostapd_drv_none(hapd) && vlan_init(hapd)) { 806 wpa_printf(MSG_ERROR, "VLAN initialization failed."); 807 return -1; 808 } 809 810 if (!hapd->conf->start_disabled && ieee802_11_set_beacon(hapd) < 0) 811 return -1; 812 813 if (hapd->wpa_auth && wpa_init_keys(hapd->wpa_auth) < 0) 814 return -1; 815 816 if (hapd->driver && hapd->driver->set_operstate) 817 hapd->driver->set_operstate(hapd->drv_priv, 1); 818 819 return 0; 820} 821 822 823static void hostapd_tx_queue_params(struct hostapd_iface *iface) 824{ 825 struct hostapd_data *hapd = iface->bss[0]; 826 int i; 827 struct hostapd_tx_queue_params *p; 828 829 for (i = 0; i < NUM_TX_QUEUES; i++) { 830 p = &iface->conf->tx_queue[i]; 831 832 if (hostapd_set_tx_queue_params(hapd, i, p->aifs, p->cwmin, 833 p->cwmax, p->burst)) { 834 wpa_printf(MSG_DEBUG, "Failed to set TX queue " 835 "parameters for queue %d.", i); 836 /* Continue anyway */ 837 } 838 } 839} 840 841 842static int hostapd_set_acl_list(struct hostapd_data *hapd, 843 struct mac_acl_entry *mac_acl, 844 int n_entries, u8 accept_acl) 845{ 846 struct hostapd_acl_params *acl_params; 847 int i, err; 848 849 acl_params = os_zalloc(sizeof(*acl_params) + 850 (n_entries * sizeof(acl_params->mac_acl[0]))); 851 if (!acl_params) 852 return -ENOMEM; 853 854 for (i = 0; i < n_entries; i++) 855 os_memcpy(acl_params->mac_acl[i].addr, mac_acl[i].addr, 856 ETH_ALEN); 857 858 acl_params->acl_policy = accept_acl; 859 acl_params->num_mac_acl = n_entries; 860 861 err = hostapd_drv_set_acl(hapd, acl_params); 862 863 os_free(acl_params); 864 865 return err; 866} 867 868 869static void hostapd_set_acl(struct hostapd_data *hapd) 870{ 871 struct hostapd_config *conf = hapd->iconf; 872 int err; 873 u8 accept_acl; 874 875 if (hapd->iface->drv_max_acl_mac_addrs == 0) 876 return; 877 if (!(conf->bss[0]->num_accept_mac || conf->bss[0]->num_deny_mac)) 878 return; 879 880 if (conf->bss[0]->macaddr_acl == DENY_UNLESS_ACCEPTED) { 881 if (conf->bss[0]->num_accept_mac) { 882 accept_acl = 1; 883 err = hostapd_set_acl_list(hapd, 884 conf->bss[0]->accept_mac, 885 conf->bss[0]->num_accept_mac, 886 accept_acl); 887 if (err) { 888 wpa_printf(MSG_DEBUG, "Failed to set accept acl"); 889 return; 890 } 891 } else { 892 wpa_printf(MSG_DEBUG, "Mismatch between ACL Policy & Accept/deny lists file"); 893 } 894 } else if (conf->bss[0]->macaddr_acl == ACCEPT_UNLESS_DENIED) { 895 if (conf->bss[0]->num_deny_mac) { 896 accept_acl = 0; 897 err = hostapd_set_acl_list(hapd, conf->bss[0]->deny_mac, 898 conf->bss[0]->num_deny_mac, 899 accept_acl); 900 if (err) { 901 wpa_printf(MSG_DEBUG, "Failed to set deny acl"); 902 return; 903 } 904 } else { 905 wpa_printf(MSG_DEBUG, "Mismatch between ACL Policy & Accept/deny lists file"); 906 } 907 } 908} 909 910 911static int start_ctrl_iface_bss(struct hostapd_data *hapd) 912{ 913 if (!hapd->iface->interfaces || 914 !hapd->iface->interfaces->ctrl_iface_init) 915 return 0; 916 917 if (hapd->iface->interfaces->ctrl_iface_init(hapd)) { 918 wpa_printf(MSG_ERROR, 919 "Failed to setup control interface for %s", 920 hapd->conf->iface); 921 return -1; 922 } 923 924 return 0; 925} 926 927 928static int start_ctrl_iface(struct hostapd_iface *iface) 929{ 930 size_t i; 931 932 if (!iface->interfaces || !iface->interfaces->ctrl_iface_init) 933 return 0; 934 935 for (i = 0; i < iface->num_bss; i++) { 936 struct hostapd_data *hapd = iface->bss[i]; 937 if (iface->interfaces->ctrl_iface_init(hapd)) { 938 wpa_printf(MSG_ERROR, 939 "Failed to setup control interface for %s", 940 hapd->conf->iface); 941 return -1; 942 } 943 } 944 945 return 0; 946} 947 948 949static void channel_list_update_timeout(void *eloop_ctx, void *timeout_ctx) 950{ 951 struct hostapd_iface *iface = eloop_ctx; 952 953 if (!iface->wait_channel_update) { 954 wpa_printf(MSG_INFO, "Channel list update timeout, but interface was not waiting for it"); 955 return; 956 } 957 958 /* 959 * It is possible that the existing channel list is acceptable, so try 960 * to proceed. 961 */ 962 wpa_printf(MSG_DEBUG, "Channel list update timeout - try to continue anyway"); 963 setup_interface2(iface); 964} 965 966 967void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator) 968{ 969 if (!iface->wait_channel_update || initiator != REGDOM_SET_BY_USER) 970 return; 971 972 wpa_printf(MSG_DEBUG, "Channel list updated - continue setup"); 973 eloop_cancel_timeout(channel_list_update_timeout, iface, NULL); 974 setup_interface2(iface); 975} 976 977 978static int setup_interface(struct hostapd_iface *iface) 979{ 980 struct hostapd_data *hapd = iface->bss[0]; 981 size_t i; 982 983 if (!iface->phy[0]) { 984 const char *phy = hostapd_drv_get_radio_name(hapd); 985 if (phy) { 986 wpa_printf(MSG_DEBUG, "phy: %s", phy); 987 os_strlcpy(iface->phy, phy, sizeof(iface->phy)); 988 } 989 } 990 991 /* 992 * Make sure that all BSSes get configured with a pointer to the same 993 * driver interface. 994 */ 995 for (i = 1; i < iface->num_bss; i++) { 996 iface->bss[i]->driver = hapd->driver; 997 iface->bss[i]->drv_priv = hapd->drv_priv; 998 } 999 1000 if (hostapd_validate_bssid_configuration(iface)) 1001 return -1; 1002 1003 /* 1004 * Initialize control interfaces early to allow external monitoring of 1005 * channel setup operations that may take considerable amount of time 1006 * especially for DFS cases. 1007 */ 1008 if (start_ctrl_iface(iface)) 1009 return -1; 1010 1011 if (hapd->iconf->country[0] && hapd->iconf->country[1]) { 1012 char country[4], previous_country[4]; 1013 1014 hostapd_set_state(iface, HAPD_IFACE_COUNTRY_UPDATE); 1015 if (hostapd_get_country(hapd, previous_country) < 0) 1016 previous_country[0] = '\0'; 1017 1018 os_memcpy(country, hapd->iconf->country, 3); 1019 country[3] = '\0'; 1020 if (hostapd_set_country(hapd, country) < 0) { 1021 wpa_printf(MSG_ERROR, "Failed to set country code"); 1022 return -1; 1023 } 1024 1025 wpa_printf(MSG_DEBUG, "Previous country code %s, new country code %s", 1026 previous_country, country); 1027 1028 if (os_strncmp(previous_country, country, 2) != 0) { 1029 wpa_printf(MSG_DEBUG, "Continue interface setup after channel list update"); 1030 iface->wait_channel_update = 1; 1031 eloop_register_timeout(1, 0, 1032 channel_list_update_timeout, 1033 iface, NULL); 1034 return 0; 1035 } 1036 } 1037 1038 return setup_interface2(iface); 1039} 1040 1041 1042static int setup_interface2(struct hostapd_iface *iface) 1043{ 1044 iface->wait_channel_update = 0; 1045 1046 if (hostapd_get_hw_features(iface)) { 1047 /* Not all drivers support this yet, so continue without hw 1048 * feature data. */ 1049 } else { 1050 int ret = hostapd_select_hw_mode(iface); 1051 if (ret < 0) { 1052 wpa_printf(MSG_ERROR, "Could not select hw_mode and " 1053 "channel. (%d)", ret); 1054 return -1; 1055 } 1056 if (ret == 1) { 1057 wpa_printf(MSG_DEBUG, "Interface initialization will be completed in a callback (ACS)"); 1058 return 0; 1059 } 1060 ret = hostapd_check_ht_capab(iface); 1061 if (ret < 0) 1062 return -1; 1063 if (ret == 1) { 1064 wpa_printf(MSG_DEBUG, "Interface initialization will " 1065 "be completed in a callback"); 1066 return 0; 1067 } 1068 1069 if (iface->conf->ieee80211h) 1070 wpa_printf(MSG_DEBUG, "DFS support is enabled"); 1071 } 1072 return hostapd_setup_interface_complete(iface, 0); 1073} 1074 1075 1076/** 1077 * hostapd_setup_interface_complete - Complete interface setup 1078 * 1079 * This function is called when previous steps in the interface setup has been 1080 * completed. This can also start operations, e.g., DFS, that will require 1081 * additional processing before interface is ready to be enabled. Such 1082 * operations will call this function from eloop callbacks when finished. 1083 */ 1084int hostapd_setup_interface_complete(struct hostapd_iface *iface, int err) 1085{ 1086 struct hostapd_data *hapd = iface->bss[0]; 1087 size_t j; 1088 u8 *prev_addr; 1089 1090 if (err) { 1091 wpa_printf(MSG_ERROR, "Interface initialization failed"); 1092 hostapd_set_state(iface, HAPD_IFACE_DISABLED); 1093 if (iface->interfaces && iface->interfaces->terminate_on_error) 1094 eloop_terminate(); 1095 return -1; 1096 } 1097 1098 wpa_printf(MSG_DEBUG, "Completing interface initialization"); 1099 if (iface->conf->channel) { 1100#ifdef NEED_AP_MLME 1101 int res; 1102#endif /* NEED_AP_MLME */ 1103 1104 iface->freq = hostapd_hw_get_freq(hapd, iface->conf->channel); 1105 wpa_printf(MSG_DEBUG, "Mode: %s Channel: %d " 1106 "Frequency: %d MHz", 1107 hostapd_hw_mode_txt(iface->conf->hw_mode), 1108 iface->conf->channel, iface->freq); 1109 1110#ifdef NEED_AP_MLME 1111 /* Check DFS */ 1112 res = hostapd_handle_dfs(iface); 1113 if (res <= 0) 1114 return res; 1115#endif /* NEED_AP_MLME */ 1116 1117 if (hostapd_set_freq(hapd, hapd->iconf->hw_mode, iface->freq, 1118 hapd->iconf->channel, 1119 hapd->iconf->ieee80211n, 1120 hapd->iconf->ieee80211ac, 1121 hapd->iconf->secondary_channel, 1122 hapd->iconf->vht_oper_chwidth, 1123 hapd->iconf->vht_oper_centr_freq_seg0_idx, 1124 hapd->iconf->vht_oper_centr_freq_seg1_idx)) { 1125 wpa_printf(MSG_ERROR, "Could not set channel for " 1126 "kernel driver"); 1127 return -1; 1128 } 1129 } 1130 1131 if (iface->current_mode) { 1132 if (hostapd_prepare_rates(iface, iface->current_mode)) { 1133 wpa_printf(MSG_ERROR, "Failed to prepare rates " 1134 "table."); 1135 hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211, 1136 HOSTAPD_LEVEL_WARNING, 1137 "Failed to prepare rates table."); 1138 return -1; 1139 } 1140 } 1141 1142 if (hapd->iconf->rts_threshold > -1 && 1143 hostapd_set_rts(hapd, hapd->iconf->rts_threshold)) { 1144 wpa_printf(MSG_ERROR, "Could not set RTS threshold for " 1145 "kernel driver"); 1146 return -1; 1147 } 1148 1149 if (hapd->iconf->fragm_threshold > -1 && 1150 hostapd_set_frag(hapd, hapd->iconf->fragm_threshold)) { 1151 wpa_printf(MSG_ERROR, "Could not set fragmentation threshold " 1152 "for kernel driver"); 1153 return -1; 1154 } 1155 1156 prev_addr = hapd->own_addr; 1157 1158 for (j = 0; j < iface->num_bss; j++) { 1159 hapd = iface->bss[j]; 1160 if (j) 1161 os_memcpy(hapd->own_addr, prev_addr, ETH_ALEN); 1162 if (hostapd_setup_bss(hapd, j == 0)) 1163 return -1; 1164 if (hostapd_mac_comp_empty(hapd->conf->bssid) == 0) 1165 prev_addr = hapd->own_addr; 1166 } 1167 hapd = iface->bss[0]; 1168 1169 hostapd_tx_queue_params(iface); 1170 1171 ap_list_init(iface); 1172 1173 hostapd_set_acl(hapd); 1174 1175 if (hostapd_driver_commit(hapd) < 0) { 1176 wpa_printf(MSG_ERROR, "%s: Failed to commit driver " 1177 "configuration", __func__); 1178 return -1; 1179 } 1180 1181 /* 1182 * WPS UPnP module can be initialized only when the "upnp_iface" is up. 1183 * If "interface" and "upnp_iface" are the same (e.g., non-bridge 1184 * mode), the interface is up only after driver_commit, so initialize 1185 * WPS after driver_commit. 1186 */ 1187 for (j = 0; j < iface->num_bss; j++) { 1188 if (hostapd_init_wps_complete(iface->bss[j])) 1189 return -1; 1190 } 1191 1192 hostapd_set_state(iface, HAPD_IFACE_ENABLED); 1193 wpa_msg(iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_ENABLED); 1194 if (hapd->setup_complete_cb) 1195 hapd->setup_complete_cb(hapd->setup_complete_cb_ctx); 1196 1197 wpa_printf(MSG_DEBUG, "%s: Setup of interface done.", 1198 iface->bss[0]->conf->iface); 1199 if (iface->interfaces && iface->interfaces->terminate_on_error > 0) 1200 iface->interfaces->terminate_on_error--; 1201 1202 return 0; 1203} 1204 1205 1206/** 1207 * hostapd_setup_interface - Setup of an interface 1208 * @iface: Pointer to interface data. 1209 * Returns: 0 on success, -1 on failure 1210 * 1211 * Initializes the driver interface, validates the configuration, 1212 * and sets driver parameters based on the configuration. 1213 * Flushes old stations, sets the channel, encryption, 1214 * beacons, and WDS links based on the configuration. 1215 * 1216 * If interface setup requires more time, e.g., to perform HT co-ex scans, ACS, 1217 * or DFS operations, this function returns 0 before such operations have been 1218 * completed. The pending operations are registered into eloop and will be 1219 * completed from eloop callbacks. Those callbacks end up calling 1220 * hostapd_setup_interface_complete() once setup has been completed. 1221 */ 1222int hostapd_setup_interface(struct hostapd_iface *iface) 1223{ 1224 int ret; 1225 1226 ret = setup_interface(iface); 1227 if (ret) { 1228 wpa_printf(MSG_ERROR, "%s: Unable to setup interface.", 1229 iface->bss[0]->conf->iface); 1230 return -1; 1231 } 1232 1233 return 0; 1234} 1235 1236 1237/** 1238 * hostapd_alloc_bss_data - Allocate and initialize per-BSS data 1239 * @hapd_iface: Pointer to interface data 1240 * @conf: Pointer to per-interface configuration 1241 * @bss: Pointer to per-BSS configuration for this BSS 1242 * Returns: Pointer to allocated BSS data 1243 * 1244 * This function is used to allocate per-BSS data structure. This data will be 1245 * freed after hostapd_cleanup() is called for it during interface 1246 * deinitialization. 1247 */ 1248struct hostapd_data * 1249hostapd_alloc_bss_data(struct hostapd_iface *hapd_iface, 1250 struct hostapd_config *conf, 1251 struct hostapd_bss_config *bss) 1252{ 1253 struct hostapd_data *hapd; 1254 1255 hapd = os_zalloc(sizeof(*hapd)); 1256 if (hapd == NULL) 1257 return NULL; 1258 1259 hapd->new_assoc_sta_cb = hostapd_new_assoc_sta; 1260 hapd->iconf = conf; 1261 hapd->conf = bss; 1262 hapd->iface = hapd_iface; 1263 hapd->driver = hapd->iconf->driver; 1264 hapd->ctrl_sock = -1; 1265 1266 return hapd; 1267} 1268 1269 1270static void hostapd_bss_deinit(struct hostapd_data *hapd) 1271{ 1272 wpa_printf(MSG_DEBUG, "%s: deinit bss %s", __func__, 1273 hapd->conf->iface); 1274 hostapd_free_stas(hapd); 1275 hostapd_flush_old_stations(hapd, WLAN_REASON_DEAUTH_LEAVING); 1276 hostapd_clear_wep(hapd); 1277 hostapd_cleanup(hapd); 1278} 1279 1280 1281void hostapd_interface_deinit(struct hostapd_iface *iface) 1282{ 1283 int j; 1284 1285 wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface); 1286 if (iface == NULL) 1287 return; 1288 1289 eloop_cancel_timeout(channel_list_update_timeout, iface, NULL); 1290 iface->wait_channel_update = 0; 1291 1292 for (j = iface->num_bss - 1; j >= 0; j--) 1293 hostapd_bss_deinit(iface->bss[j]); 1294} 1295 1296 1297void hostapd_interface_free(struct hostapd_iface *iface) 1298{ 1299 size_t j; 1300 wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface); 1301 for (j = 0; j < iface->num_bss; j++) { 1302 wpa_printf(MSG_DEBUG, "%s: free hapd %p", 1303 __func__, iface->bss[j]); 1304 os_free(iface->bss[j]); 1305 } 1306 hostapd_cleanup_iface(iface); 1307} 1308 1309 1310/** 1311 * hostapd_init - Allocate and initialize per-interface data 1312 * @config_file: Path to the configuration file 1313 * Returns: Pointer to the allocated interface data or %NULL on failure 1314 * 1315 * This function is used to allocate main data structures for per-interface 1316 * data. The allocated data buffer will be freed by calling 1317 * hostapd_cleanup_iface(). 1318 */ 1319struct hostapd_iface * hostapd_init(struct hapd_interfaces *interfaces, 1320 const char *config_file) 1321{ 1322 struct hostapd_iface *hapd_iface = NULL; 1323 struct hostapd_config *conf = NULL; 1324 struct hostapd_data *hapd; 1325 size_t i; 1326 1327 hapd_iface = os_zalloc(sizeof(*hapd_iface)); 1328 if (hapd_iface == NULL) 1329 goto fail; 1330 1331 hapd_iface->config_fname = os_strdup(config_file); 1332 if (hapd_iface->config_fname == NULL) 1333 goto fail; 1334 1335 conf = interfaces->config_read_cb(hapd_iface->config_fname); 1336 if (conf == NULL) 1337 goto fail; 1338 hapd_iface->conf = conf; 1339 1340 hapd_iface->num_bss = conf->num_bss; 1341 hapd_iface->bss = os_calloc(conf->num_bss, 1342 sizeof(struct hostapd_data *)); 1343 if (hapd_iface->bss == NULL) 1344 goto fail; 1345 1346 for (i = 0; i < conf->num_bss; i++) { 1347 hapd = hapd_iface->bss[i] = 1348 hostapd_alloc_bss_data(hapd_iface, conf, 1349 conf->bss[i]); 1350 if (hapd == NULL) 1351 goto fail; 1352 hapd->msg_ctx = hapd; 1353 } 1354 1355 return hapd_iface; 1356 1357fail: 1358 wpa_printf(MSG_ERROR, "Failed to set up interface with %s", 1359 config_file); 1360 if (conf) 1361 hostapd_config_free(conf); 1362 if (hapd_iface) { 1363 os_free(hapd_iface->config_fname); 1364 os_free(hapd_iface->bss); 1365 wpa_printf(MSG_DEBUG, "%s: free iface %p", 1366 __func__, hapd_iface); 1367 os_free(hapd_iface); 1368 } 1369 return NULL; 1370} 1371 1372 1373static int ifname_in_use(struct hapd_interfaces *interfaces, const char *ifname) 1374{ 1375 size_t i, j; 1376 1377 for (i = 0; i < interfaces->count; i++) { 1378 struct hostapd_iface *iface = interfaces->iface[i]; 1379 for (j = 0; j < iface->num_bss; j++) { 1380 struct hostapd_data *hapd = iface->bss[j]; 1381 if (os_strcmp(ifname, hapd->conf->iface) == 0) 1382 return 1; 1383 } 1384 } 1385 1386 return 0; 1387} 1388 1389 1390/** 1391 * hostapd_interface_init_bss - Read configuration file and init BSS data 1392 * 1393 * This function is used to parse configuration file for a BSS. This BSS is 1394 * added to an existing interface sharing the same radio (if any) or a new 1395 * interface is created if this is the first interface on a radio. This 1396 * allocate memory for the BSS. No actual driver operations are started. 1397 * 1398 * This is similar to hostapd_interface_init(), but for a case where the 1399 * configuration is used to add a single BSS instead of all BSSes for a radio. 1400 */ 1401struct hostapd_iface * 1402hostapd_interface_init_bss(struct hapd_interfaces *interfaces, const char *phy, 1403 const char *config_fname, int debug) 1404{ 1405 struct hostapd_iface *new_iface = NULL, *iface = NULL; 1406 struct hostapd_data *hapd; 1407 int k; 1408 size_t i, bss_idx; 1409 1410 if (!phy || !*phy) 1411 return NULL; 1412 1413 for (i = 0; i < interfaces->count; i++) { 1414 if (os_strcmp(interfaces->iface[i]->phy, phy) == 0) { 1415 iface = interfaces->iface[i]; 1416 break; 1417 } 1418 } 1419 1420 wpa_printf(MSG_INFO, "Configuration file: %s (phy %s)%s", 1421 config_fname, phy, iface ? "" : " --> new PHY"); 1422 if (iface) { 1423 struct hostapd_config *conf; 1424 struct hostapd_bss_config **tmp_conf; 1425 struct hostapd_data **tmp_bss; 1426 struct hostapd_bss_config *bss; 1427 const char *ifname; 1428 1429 /* Add new BSS to existing iface */ 1430 conf = interfaces->config_read_cb(config_fname); 1431 if (conf == NULL) 1432 return NULL; 1433 if (conf->num_bss > 1) { 1434 wpa_printf(MSG_ERROR, "Multiple BSSes specified in BSS-config"); 1435 hostapd_config_free(conf); 1436 return NULL; 1437 } 1438 1439 ifname = conf->bss[0]->iface; 1440 if (ifname[0] != '\0' && ifname_in_use(interfaces, ifname)) { 1441 wpa_printf(MSG_ERROR, 1442 "Interface name %s already in use", ifname); 1443 hostapd_config_free(conf); 1444 return NULL; 1445 } 1446 1447 tmp_conf = os_realloc_array( 1448 iface->conf->bss, iface->conf->num_bss + 1, 1449 sizeof(struct hostapd_bss_config *)); 1450 tmp_bss = os_realloc_array(iface->bss, iface->num_bss + 1, 1451 sizeof(struct hostapd_data *)); 1452 if (tmp_bss) 1453 iface->bss = tmp_bss; 1454 if (tmp_conf) { 1455 iface->conf->bss = tmp_conf; 1456 iface->conf->last_bss = tmp_conf[0]; 1457 } 1458 if (tmp_bss == NULL || tmp_conf == NULL) { 1459 hostapd_config_free(conf); 1460 return NULL; 1461 } 1462 bss = iface->conf->bss[iface->conf->num_bss] = conf->bss[0]; 1463 iface->conf->num_bss++; 1464 1465 hapd = hostapd_alloc_bss_data(iface, iface->conf, bss); 1466 if (hapd == NULL) { 1467 iface->conf->num_bss--; 1468 hostapd_config_free(conf); 1469 return NULL; 1470 } 1471 iface->conf->last_bss = bss; 1472 iface->bss[iface->num_bss] = hapd; 1473 hapd->msg_ctx = hapd; 1474 1475 bss_idx = iface->num_bss++; 1476 conf->num_bss--; 1477 conf->bss[0] = NULL; 1478 hostapd_config_free(conf); 1479 } else { 1480 /* Add a new iface with the first BSS */ 1481 new_iface = iface = hostapd_init(interfaces, config_fname); 1482 if (!iface) 1483 return NULL; 1484 os_strlcpy(iface->phy, phy, sizeof(iface->phy)); 1485 iface->interfaces = interfaces; 1486 bss_idx = 0; 1487 } 1488 1489 for (k = 0; k < debug; k++) { 1490 if (iface->bss[bss_idx]->conf->logger_stdout_level > 0) 1491 iface->bss[bss_idx]->conf->logger_stdout_level--; 1492 } 1493 1494 if (iface->conf->bss[bss_idx]->iface[0] == '\0' && 1495 !hostapd_drv_none(iface->bss[bss_idx])) { 1496 wpa_printf(MSG_ERROR, "Interface name not specified in %s", 1497 config_fname); 1498 if (new_iface) 1499 hostapd_interface_deinit_free(new_iface); 1500 return NULL; 1501 } 1502 1503 return iface; 1504} 1505 1506 1507void hostapd_interface_deinit_free(struct hostapd_iface *iface) 1508{ 1509 const struct wpa_driver_ops *driver; 1510 void *drv_priv; 1511 1512 wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface); 1513 if (iface == NULL) 1514 return; 1515 wpa_printf(MSG_DEBUG, "%s: num_bss=%u conf->num_bss=%u", 1516 __func__, (unsigned int) iface->num_bss, 1517 (unsigned int) iface->conf->num_bss); 1518 driver = iface->bss[0]->driver; 1519 drv_priv = iface->bss[0]->drv_priv; 1520 hostapd_interface_deinit(iface); 1521 wpa_printf(MSG_DEBUG, "%s: driver=%p drv_priv=%p -> hapd_deinit", 1522 __func__, driver, drv_priv); 1523 if (driver && driver->hapd_deinit && drv_priv) 1524 driver->hapd_deinit(drv_priv); 1525 hostapd_interface_free(iface); 1526} 1527 1528 1529int hostapd_enable_iface(struct hostapd_iface *hapd_iface) 1530{ 1531 if (hapd_iface->bss[0]->drv_priv != NULL) { 1532 wpa_printf(MSG_ERROR, "Interface %s already enabled", 1533 hapd_iface->conf->bss[0]->iface); 1534 return -1; 1535 } 1536 1537 wpa_printf(MSG_DEBUG, "Enable interface %s", 1538 hapd_iface->conf->bss[0]->iface); 1539 1540 if (hapd_iface->interfaces == NULL || 1541 hapd_iface->interfaces->driver_init == NULL || 1542 hapd_iface->interfaces->driver_init(hapd_iface)) 1543 return -1; 1544 1545 if (hostapd_setup_interface(hapd_iface)) { 1546 const struct wpa_driver_ops *driver; 1547 void *drv_priv; 1548 1549 driver = hapd_iface->bss[0]->driver; 1550 drv_priv = hapd_iface->bss[0]->drv_priv; 1551 wpa_printf(MSG_DEBUG, "%s: driver=%p drv_priv=%p -> hapd_deinit", 1552 __func__, driver, drv_priv); 1553 if (driver && driver->hapd_deinit && drv_priv) { 1554 driver->hapd_deinit(drv_priv); 1555 hapd_iface->bss[0]->drv_priv = NULL; 1556 } 1557 return -1; 1558 } 1559 1560 return 0; 1561} 1562 1563 1564int hostapd_reload_iface(struct hostapd_iface *hapd_iface) 1565{ 1566 size_t j; 1567 1568 wpa_printf(MSG_DEBUG, "Reload interface %s", 1569 hapd_iface->conf->bss[0]->iface); 1570 for (j = 0; j < hapd_iface->num_bss; j++) 1571 hostapd_set_security_params(hapd_iface->conf->bss[j]); 1572 if (hostapd_config_check(hapd_iface->conf) < 0) { 1573 wpa_printf(MSG_ERROR, "Updated configuration is invalid"); 1574 return -1; 1575 } 1576 hostapd_clear_old(hapd_iface); 1577 for (j = 0; j < hapd_iface->num_bss; j++) 1578 hostapd_reload_bss(hapd_iface->bss[j]); 1579 1580 return 0; 1581} 1582 1583 1584int hostapd_disable_iface(struct hostapd_iface *hapd_iface) 1585{ 1586 size_t j; 1587 const struct wpa_driver_ops *driver; 1588 void *drv_priv; 1589 1590 if (hapd_iface == NULL) 1591 return -1; 1592 wpa_msg(hapd_iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_DISABLED); 1593 driver = hapd_iface->bss[0]->driver; 1594 drv_priv = hapd_iface->bss[0]->drv_priv; 1595 1596 /* whatever hostapd_interface_deinit does */ 1597 for (j = 0; j < hapd_iface->num_bss; j++) { 1598 struct hostapd_data *hapd = hapd_iface->bss[j]; 1599 hostapd_free_stas(hapd); 1600 hostapd_flush_old_stations(hapd, WLAN_REASON_DEAUTH_LEAVING); 1601 hostapd_clear_wep(hapd); 1602 hostapd_free_hapd_data(hapd); 1603 } 1604 1605 wpa_printf(MSG_DEBUG, "%s: driver=%p drv_priv=%p -> hapd_deinit", 1606 __func__, driver, drv_priv); 1607 if (driver && driver->hapd_deinit && drv_priv) { 1608 driver->hapd_deinit(drv_priv); 1609 hapd_iface->bss[0]->drv_priv = NULL; 1610 } 1611 1612 /* From hostapd_cleanup_iface: These were initialized in 1613 * hostapd_setup_interface and hostapd_setup_interface_complete 1614 */ 1615 hostapd_cleanup_iface_partial(hapd_iface); 1616 1617 wpa_printf(MSG_DEBUG, "Interface %s disabled", 1618 hapd_iface->bss[0]->conf->iface); 1619 hostapd_set_state(hapd_iface, HAPD_IFACE_DISABLED); 1620 return 0; 1621} 1622 1623 1624static struct hostapd_iface * 1625hostapd_iface_alloc(struct hapd_interfaces *interfaces) 1626{ 1627 struct hostapd_iface **iface, *hapd_iface; 1628 1629 iface = os_realloc_array(interfaces->iface, interfaces->count + 1, 1630 sizeof(struct hostapd_iface *)); 1631 if (iface == NULL) 1632 return NULL; 1633 interfaces->iface = iface; 1634 hapd_iface = interfaces->iface[interfaces->count] = 1635 os_zalloc(sizeof(*hapd_iface)); 1636 if (hapd_iface == NULL) { 1637 wpa_printf(MSG_ERROR, "%s: Failed to allocate memory for " 1638 "the interface", __func__); 1639 return NULL; 1640 } 1641 interfaces->count++; 1642 hapd_iface->interfaces = interfaces; 1643 1644 return hapd_iface; 1645} 1646 1647 1648static struct hostapd_config * 1649hostapd_config_alloc(struct hapd_interfaces *interfaces, const char *ifname, 1650 const char *ctrl_iface) 1651{ 1652 struct hostapd_bss_config *bss; 1653 struct hostapd_config *conf; 1654 1655 /* Allocates memory for bss and conf */ 1656 conf = hostapd_config_defaults(); 1657 if (conf == NULL) { 1658 wpa_printf(MSG_ERROR, "%s: Failed to allocate memory for " 1659 "configuration", __func__); 1660 return NULL; 1661 } 1662 1663 conf->driver = wpa_drivers[0]; 1664 if (conf->driver == NULL) { 1665 wpa_printf(MSG_ERROR, "No driver wrappers registered!"); 1666 hostapd_config_free(conf); 1667 return NULL; 1668 } 1669 1670 bss = conf->last_bss = conf->bss[0]; 1671 1672 os_strlcpy(bss->iface, ifname, sizeof(bss->iface)); 1673 bss->ctrl_interface = os_strdup(ctrl_iface); 1674 if (bss->ctrl_interface == NULL) { 1675 hostapd_config_free(conf); 1676 return NULL; 1677 } 1678 1679 /* Reading configuration file skipped, will be done in SET! 1680 * From reading the configuration till the end has to be done in 1681 * SET 1682 */ 1683 return conf; 1684} 1685 1686 1687static struct hostapd_iface * hostapd_data_alloc( 1688 struct hapd_interfaces *interfaces, struct hostapd_config *conf) 1689{ 1690 size_t i; 1691 struct hostapd_iface *hapd_iface = 1692 interfaces->iface[interfaces->count - 1]; 1693 struct hostapd_data *hapd; 1694 1695 hapd_iface->conf = conf; 1696 hapd_iface->num_bss = conf->num_bss; 1697 1698 hapd_iface->bss = os_zalloc(conf->num_bss * 1699 sizeof(struct hostapd_data *)); 1700 if (hapd_iface->bss == NULL) 1701 return NULL; 1702 1703 for (i = 0; i < conf->num_bss; i++) { 1704 hapd = hapd_iface->bss[i] = 1705 hostapd_alloc_bss_data(hapd_iface, conf, conf->bss[i]); 1706 if (hapd == NULL) 1707 return NULL; 1708 hapd->msg_ctx = hapd; 1709 } 1710 1711 hapd_iface->interfaces = interfaces; 1712 1713 return hapd_iface; 1714} 1715 1716 1717int hostapd_add_iface(struct hapd_interfaces *interfaces, char *buf) 1718{ 1719 struct hostapd_config *conf = NULL; 1720 struct hostapd_iface *hapd_iface = NULL, *new_iface = NULL; 1721 struct hostapd_data *hapd; 1722 char *ptr; 1723 size_t i, j; 1724 const char *conf_file = NULL, *phy_name = NULL; 1725 1726 if (os_strncmp(buf, "bss_config=", 11) == 0) { 1727 char *pos; 1728 phy_name = buf + 11; 1729 pos = os_strchr(phy_name, ':'); 1730 if (!pos) 1731 return -1; 1732 *pos++ = '\0'; 1733 conf_file = pos; 1734 if (!os_strlen(conf_file)) 1735 return -1; 1736 1737 hapd_iface = hostapd_interface_init_bss(interfaces, phy_name, 1738 conf_file, 0); 1739 if (!hapd_iface) 1740 return -1; 1741 for (j = 0; j < interfaces->count; j++) { 1742 if (interfaces->iface[j] == hapd_iface) 1743 break; 1744 } 1745 if (j == interfaces->count) { 1746 struct hostapd_iface **tmp; 1747 tmp = os_realloc_array(interfaces->iface, 1748 interfaces->count + 1, 1749 sizeof(struct hostapd_iface *)); 1750 if (!tmp) { 1751 hostapd_interface_deinit_free(hapd_iface); 1752 return -1; 1753 } 1754 interfaces->iface = tmp; 1755 interfaces->iface[interfaces->count++] = hapd_iface; 1756 new_iface = hapd_iface; 1757 } 1758 1759 if (new_iface) { 1760 if (interfaces->driver_init(hapd_iface) || 1761 hostapd_setup_interface(hapd_iface)) { 1762 interfaces->count--; 1763 goto fail; 1764 } 1765 } else { 1766 /* Assign new BSS with bss[0]'s driver info */ 1767 hapd = hapd_iface->bss[hapd_iface->num_bss - 1]; 1768 hapd->driver = hapd_iface->bss[0]->driver; 1769 hapd->drv_priv = hapd_iface->bss[0]->drv_priv; 1770 os_memcpy(hapd->own_addr, hapd_iface->bss[0]->own_addr, 1771 ETH_ALEN); 1772 1773 if (start_ctrl_iface_bss(hapd) < 0 || 1774 (hapd_iface->state == HAPD_IFACE_ENABLED && 1775 hostapd_setup_bss(hapd, -1))) { 1776 hapd_iface->conf->num_bss--; 1777 hapd_iface->num_bss--; 1778 wpa_printf(MSG_DEBUG, "%s: free hapd %p %s", 1779 __func__, hapd, hapd->conf->iface); 1780 os_free(hapd); 1781 return -1; 1782 } 1783 } 1784 return 0; 1785 } 1786 1787 ptr = os_strchr(buf, ' '); 1788 if (ptr == NULL) 1789 return -1; 1790 *ptr++ = '\0'; 1791 1792 if (os_strncmp(ptr, "config=", 7) == 0) 1793 conf_file = ptr + 7; 1794 1795 for (i = 0; i < interfaces->count; i++) { 1796 if (!os_strcmp(interfaces->iface[i]->conf->bss[0]->iface, 1797 buf)) { 1798 wpa_printf(MSG_INFO, "Cannot add interface - it " 1799 "already exists"); 1800 return -1; 1801 } 1802 } 1803 1804 hapd_iface = hostapd_iface_alloc(interfaces); 1805 if (hapd_iface == NULL) { 1806 wpa_printf(MSG_ERROR, "%s: Failed to allocate memory " 1807 "for interface", __func__); 1808 goto fail; 1809 } 1810 1811 if (conf_file && interfaces->config_read_cb) { 1812 conf = interfaces->config_read_cb(conf_file); 1813 if (conf && conf->bss) 1814 os_strlcpy(conf->bss[0]->iface, buf, 1815 sizeof(conf->bss[0]->iface)); 1816 } else 1817 conf = hostapd_config_alloc(interfaces, buf, ptr); 1818 if (conf == NULL || conf->bss == NULL) { 1819 wpa_printf(MSG_ERROR, "%s: Failed to allocate memory " 1820 "for configuration", __func__); 1821 goto fail; 1822 } 1823 1824 hapd_iface = hostapd_data_alloc(interfaces, conf); 1825 if (hapd_iface == NULL) { 1826 wpa_printf(MSG_ERROR, "%s: Failed to allocate memory " 1827 "for hostapd", __func__); 1828 goto fail; 1829 } 1830 1831 if (start_ctrl_iface(hapd_iface) < 0) 1832 goto fail; 1833 1834 wpa_printf(MSG_INFO, "Add interface '%s'", conf->bss[0]->iface); 1835 1836 return 0; 1837 1838fail: 1839 if (conf) 1840 hostapd_config_free(conf); 1841 if (hapd_iface) { 1842 if (hapd_iface->bss) { 1843 for (i = 0; i < hapd_iface->num_bss; i++) { 1844 hapd = hapd_iface->bss[i]; 1845 if (hapd && hapd_iface->interfaces && 1846 hapd_iface->interfaces->ctrl_iface_deinit) 1847 hapd_iface->interfaces-> 1848 ctrl_iface_deinit(hapd); 1849 wpa_printf(MSG_DEBUG, "%s: free hapd %p (%s)", 1850 __func__, hapd_iface->bss[i], 1851 hapd_iface->bss[i]->conf->iface); 1852 os_free(hapd_iface->bss[i]); 1853 } 1854 os_free(hapd_iface->bss); 1855 } 1856 wpa_printf(MSG_DEBUG, "%s: free iface %p", 1857 __func__, hapd_iface); 1858 os_free(hapd_iface); 1859 } 1860 return -1; 1861} 1862 1863 1864static int hostapd_remove_bss(struct hostapd_iface *iface, unsigned int idx) 1865{ 1866 size_t i; 1867 1868 wpa_printf(MSG_INFO, "Remove BSS '%s'", iface->conf->bss[idx]->iface); 1869 1870 /* Remove hostapd_data only if it has already been initialized */ 1871 if (idx < iface->num_bss) { 1872 struct hostapd_data *hapd = iface->bss[idx]; 1873 1874 hostapd_bss_deinit(hapd); 1875 wpa_printf(MSG_DEBUG, "%s: free hapd %p (%s)", 1876 __func__, hapd, hapd->conf->iface); 1877 hostapd_config_free_bss(hapd->conf); 1878 os_free(hapd); 1879 1880 iface->num_bss--; 1881 1882 for (i = idx; i < iface->num_bss; i++) 1883 iface->bss[i] = iface->bss[i + 1]; 1884 } else { 1885 hostapd_config_free_bss(iface->conf->bss[idx]); 1886 iface->conf->bss[idx] = NULL; 1887 } 1888 1889 iface->conf->num_bss--; 1890 for (i = idx; i < iface->conf->num_bss; i++) 1891 iface->conf->bss[i] = iface->conf->bss[i + 1]; 1892 1893 return 0; 1894} 1895 1896 1897int hostapd_remove_iface(struct hapd_interfaces *interfaces, char *buf) 1898{ 1899 struct hostapd_iface *hapd_iface; 1900 size_t i, j, k = 0; 1901 1902 for (i = 0; i < interfaces->count; i++) { 1903 hapd_iface = interfaces->iface[i]; 1904 if (hapd_iface == NULL) 1905 return -1; 1906 if (!os_strcmp(hapd_iface->conf->bss[0]->iface, buf)) { 1907 wpa_printf(MSG_INFO, "Remove interface '%s'", buf); 1908 hostapd_interface_deinit_free(hapd_iface); 1909 k = i; 1910 while (k < (interfaces->count - 1)) { 1911 interfaces->iface[k] = 1912 interfaces->iface[k + 1]; 1913 k++; 1914 } 1915 interfaces->count--; 1916 return 0; 1917 } 1918 1919 for (j = 0; j < hapd_iface->conf->num_bss; j++) { 1920 if (!os_strcmp(hapd_iface->conf->bss[j]->iface, buf)) 1921 return hostapd_remove_bss(hapd_iface, j); 1922 } 1923 } 1924 return -1; 1925} 1926 1927 1928/** 1929 * hostapd_new_assoc_sta - Notify that a new station associated with the AP 1930 * @hapd: Pointer to BSS data 1931 * @sta: Pointer to the associated STA data 1932 * @reassoc: 1 to indicate this was a re-association; 0 = first association 1933 * 1934 * This function will be called whenever a station associates with the AP. It 1935 * can be called from ieee802_11.c for drivers that export MLME to hostapd and 1936 * from drv_callbacks.c based on driver events for drivers that take care of 1937 * management frames (IEEE 802.11 authentication and association) internally. 1938 */ 1939void hostapd_new_assoc_sta(struct hostapd_data *hapd, struct sta_info *sta, 1940 int reassoc) 1941{ 1942 if (hapd->tkip_countermeasures) { 1943 hostapd_drv_sta_deauth(hapd, sta->addr, 1944 WLAN_REASON_MICHAEL_MIC_FAILURE); 1945 return; 1946 } 1947 1948 hostapd_prune_associations(hapd, sta->addr); 1949 1950 /* IEEE 802.11F (IAPP) */ 1951 if (hapd->conf->ieee802_11f) 1952 iapp_new_station(hapd->iapp, sta); 1953 1954#ifdef CONFIG_P2P 1955 if (sta->p2p_ie == NULL && !sta->no_p2p_set) { 1956 sta->no_p2p_set = 1; 1957 hapd->num_sta_no_p2p++; 1958 if (hapd->num_sta_no_p2p == 1) 1959 hostapd_p2p_non_p2p_sta_connected(hapd); 1960 } 1961#endif /* CONFIG_P2P */ 1962 1963 /* Start accounting here, if IEEE 802.1X and WPA are not used. 1964 * IEEE 802.1X/WPA code will start accounting after the station has 1965 * been authorized. */ 1966 if (!hapd->conf->ieee802_1x && !hapd->conf->wpa) { 1967 os_get_reltime(&sta->connected_time); 1968 accounting_sta_start(hapd, sta); 1969 } 1970 1971 /* Start IEEE 802.1X authentication process for new stations */ 1972 ieee802_1x_new_station(hapd, sta); 1973 if (reassoc) { 1974 if (sta->auth_alg != WLAN_AUTH_FT && 1975 !(sta->flags & (WLAN_STA_WPS | WLAN_STA_MAYBE_WPS))) 1976 wpa_auth_sm_event(sta->wpa_sm, WPA_REAUTH); 1977 } else 1978 wpa_auth_sta_associated(hapd->wpa_auth, sta->wpa_sm); 1979 1980 if (!(hapd->iface->drv_flags & WPA_DRIVER_FLAGS_INACTIVITY_TIMER)) { 1981 wpa_printf(MSG_DEBUG, "%s: reschedule ap_handle_timer timeout " 1982 "for " MACSTR " (%d seconds - ap_max_inactivity)", 1983 __func__, MAC2STR(sta->addr), 1984 hapd->conf->ap_max_inactivity); 1985 eloop_cancel_timeout(ap_handle_timer, hapd, sta); 1986 eloop_register_timeout(hapd->conf->ap_max_inactivity, 0, 1987 ap_handle_timer, hapd, sta); 1988 } 1989} 1990 1991 1992const char * hostapd_state_text(enum hostapd_iface_state s) 1993{ 1994 switch (s) { 1995 case HAPD_IFACE_UNINITIALIZED: 1996 return "UNINITIALIZED"; 1997 case HAPD_IFACE_DISABLED: 1998 return "DISABLED"; 1999 case HAPD_IFACE_COUNTRY_UPDATE: 2000 return "COUNTRY_UPDATE"; 2001 case HAPD_IFACE_ACS: 2002 return "ACS"; 2003 case HAPD_IFACE_HT_SCAN: 2004 return "HT_SCAN"; 2005 case HAPD_IFACE_DFS: 2006 return "DFS"; 2007 case HAPD_IFACE_ENABLED: 2008 return "ENABLED"; 2009 } 2010 2011 return "UNKNOWN"; 2012} 2013 2014 2015void hostapd_set_state(struct hostapd_iface *iface, enum hostapd_iface_state s) 2016{ 2017 wpa_printf(MSG_INFO, "%s: interface state %s->%s", 2018 iface->conf->bss[0]->iface, hostapd_state_text(iface->state), 2019 hostapd_state_text(s)); 2020 iface->state = s; 2021} 2022 2023 2024#ifdef NEED_AP_MLME 2025 2026static void free_beacon_data(struct beacon_data *beacon) 2027{ 2028 os_free(beacon->head); 2029 beacon->head = NULL; 2030 os_free(beacon->tail); 2031 beacon->tail = NULL; 2032 os_free(beacon->probe_resp); 2033 beacon->probe_resp = NULL; 2034 os_free(beacon->beacon_ies); 2035 beacon->beacon_ies = NULL; 2036 os_free(beacon->proberesp_ies); 2037 beacon->proberesp_ies = NULL; 2038 os_free(beacon->assocresp_ies); 2039 beacon->assocresp_ies = NULL; 2040} 2041 2042 2043static int hostapd_build_beacon_data(struct hostapd_iface *iface, 2044 struct beacon_data *beacon) 2045{ 2046 struct wpabuf *beacon_extra, *proberesp_extra, *assocresp_extra; 2047 struct wpa_driver_ap_params params; 2048 int ret; 2049 struct hostapd_data *hapd = iface->bss[0]; 2050 2051 os_memset(beacon, 0, sizeof(*beacon)); 2052 ret = ieee802_11_build_ap_params(hapd, ¶ms); 2053 if (ret < 0) 2054 return ret; 2055 2056 ret = hostapd_build_ap_extra_ies(hapd, &beacon_extra, 2057 &proberesp_extra, 2058 &assocresp_extra); 2059 if (ret) 2060 goto free_ap_params; 2061 2062 ret = -1; 2063 beacon->head = os_malloc(params.head_len); 2064 if (!beacon->head) 2065 goto free_ap_extra_ies; 2066 2067 os_memcpy(beacon->head, params.head, params.head_len); 2068 beacon->head_len = params.head_len; 2069 2070 beacon->tail = os_malloc(params.tail_len); 2071 if (!beacon->tail) 2072 goto free_beacon; 2073 2074 os_memcpy(beacon->tail, params.tail, params.tail_len); 2075 beacon->tail_len = params.tail_len; 2076 2077 if (params.proberesp != NULL) { 2078 beacon->probe_resp = os_malloc(params.proberesp_len); 2079 if (!beacon->probe_resp) 2080 goto free_beacon; 2081 2082 os_memcpy(beacon->probe_resp, params.proberesp, 2083 params.proberesp_len); 2084 beacon->probe_resp_len = params.proberesp_len; 2085 } 2086 2087 /* copy the extra ies */ 2088 if (beacon_extra) { 2089 beacon->beacon_ies = os_malloc(wpabuf_len(beacon_extra)); 2090 if (!beacon->beacon_ies) 2091 goto free_beacon; 2092 2093 os_memcpy(beacon->beacon_ies, 2094 beacon_extra->buf, wpabuf_len(beacon_extra)); 2095 beacon->beacon_ies_len = wpabuf_len(beacon_extra); 2096 } 2097 2098 if (proberesp_extra) { 2099 beacon->proberesp_ies = 2100 os_malloc(wpabuf_len(proberesp_extra)); 2101 if (!beacon->proberesp_ies) 2102 goto free_beacon; 2103 2104 os_memcpy(beacon->proberesp_ies, proberesp_extra->buf, 2105 wpabuf_len(proberesp_extra)); 2106 beacon->proberesp_ies_len = wpabuf_len(proberesp_extra); 2107 } 2108 2109 if (assocresp_extra) { 2110 beacon->assocresp_ies = 2111 os_malloc(wpabuf_len(assocresp_extra)); 2112 if (!beacon->assocresp_ies) 2113 goto free_beacon; 2114 2115 os_memcpy(beacon->assocresp_ies, assocresp_extra->buf, 2116 wpabuf_len(assocresp_extra)); 2117 beacon->assocresp_ies_len = wpabuf_len(assocresp_extra); 2118 } 2119 2120 ret = 0; 2121free_beacon: 2122 /* if the function fails, the caller should not free beacon data */ 2123 if (ret) 2124 free_beacon_data(beacon); 2125 2126free_ap_extra_ies: 2127 hostapd_free_ap_extra_ies(hapd, beacon_extra, proberesp_extra, 2128 assocresp_extra); 2129free_ap_params: 2130 ieee802_11_free_ap_params(¶ms); 2131 return ret; 2132} 2133 2134 2135/* 2136 * TODO: This flow currently supports only changing frequency within the 2137 * same hw_mode. Any other changes to MAC parameters or provided settings (even 2138 * width) are not supported. 2139 */ 2140static int hostapd_change_config_freq(struct hostapd_data *hapd, 2141 struct hostapd_config *conf, 2142 struct hostapd_freq_params *params, 2143 struct hostapd_freq_params *old_params) 2144{ 2145 int channel; 2146 2147 if (!params->channel) { 2148 /* check if the new channel is supported by hw */ 2149 channel = hostapd_hw_get_channel(hapd, params->freq); 2150 if (!channel) 2151 return -1; 2152 } else { 2153 channel = params->channel; 2154 } 2155 2156 /* if a pointer to old_params is provided we save previous state */ 2157 if (old_params) { 2158 old_params->channel = conf->channel; 2159 old_params->ht_enabled = conf->ieee80211n; 2160 old_params->sec_channel_offset = conf->secondary_channel; 2161 } 2162 2163 conf->channel = channel; 2164 conf->ieee80211n = params->ht_enabled; 2165 conf->secondary_channel = params->sec_channel_offset; 2166 2167 /* TODO: maybe call here hostapd_config_check here? */ 2168 2169 return 0; 2170} 2171 2172 2173static int hostapd_fill_csa_settings(struct hostapd_iface *iface, 2174 struct csa_settings *settings) 2175{ 2176 struct hostapd_freq_params old_freq; 2177 int ret; 2178 2179 os_memset(&old_freq, 0, sizeof(old_freq)); 2180 if (!iface || !iface->freq || iface->csa_in_progress) 2181 return -1; 2182 2183 ret = hostapd_change_config_freq(iface->bss[0], iface->conf, 2184 &settings->freq_params, 2185 &old_freq); 2186 if (ret) 2187 return ret; 2188 2189 ret = hostapd_build_beacon_data(iface, &settings->beacon_after); 2190 2191 /* change back the configuration */ 2192 hostapd_change_config_freq(iface->bss[0], iface->conf, 2193 &old_freq, NULL); 2194 2195 if (ret) 2196 return ret; 2197 2198 /* set channel switch parameters for csa ie */ 2199 iface->cs_freq_params = settings->freq_params; 2200 iface->cs_count = settings->cs_count; 2201 iface->cs_block_tx = settings->block_tx; 2202 2203 ret = hostapd_build_beacon_data(iface, &settings->beacon_csa); 2204 if (ret) { 2205 free_beacon_data(&settings->beacon_after); 2206 return ret; 2207 } 2208 2209 settings->counter_offset_beacon = iface->cs_c_off_beacon; 2210 settings->counter_offset_presp = iface->cs_c_off_proberesp; 2211 2212 return 0; 2213} 2214 2215 2216void hostapd_cleanup_cs_params(struct hostapd_data *hapd) 2217{ 2218 os_memset(&hapd->iface->cs_freq_params, 0, 2219 sizeof(hapd->iface->cs_freq_params)); 2220 hapd->iface->cs_count = 0; 2221 hapd->iface->cs_block_tx = 0; 2222 hapd->iface->cs_c_off_beacon = 0; 2223 hapd->iface->cs_c_off_proberesp = 0; 2224 hapd->iface->csa_in_progress = 0; 2225} 2226 2227 2228int hostapd_switch_channel(struct hostapd_data *hapd, 2229 struct csa_settings *settings) 2230{ 2231 int ret; 2232 ret = hostapd_fill_csa_settings(hapd->iface, settings); 2233 if (ret) 2234 return ret; 2235 2236 ret = hostapd_drv_switch_channel(hapd, settings); 2237 free_beacon_data(&settings->beacon_csa); 2238 free_beacon_data(&settings->beacon_after); 2239 2240 if (ret) { 2241 /* if we failed, clean cs parameters */ 2242 hostapd_cleanup_cs_params(hapd); 2243 return ret; 2244 } 2245 2246 hapd->iface->csa_in_progress = 1; 2247 return 0; 2248} 2249 2250#endif /* NEED_AP_MLME */ 2251