wpa_supplicant_i.h revision 849734c8d1847920ed7042463f7480b1e0c1dfea
1/* 2 * wpa_supplicant - Internal definitions 3 * Copyright (c) 2003-2014, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9#ifndef WPA_SUPPLICANT_I_H 10#define WPA_SUPPLICANT_I_H 11 12#include "utils/list.h" 13#include "common/defs.h" 14#include "common/sae.h" 15#include "common/wpa_ctrl.h" 16#include "wps/wps_defs.h" 17#include "config_ssid.h" 18#include "wmm_ac.h" 19 20extern const char *const wpa_supplicant_version; 21extern const char *const wpa_supplicant_license; 22#ifndef CONFIG_NO_STDOUT_DEBUG 23extern const char *const wpa_supplicant_full_license1; 24extern const char *const wpa_supplicant_full_license2; 25extern const char *const wpa_supplicant_full_license3; 26extern const char *const wpa_supplicant_full_license4; 27extern const char *const wpa_supplicant_full_license5; 28#endif /* CONFIG_NO_STDOUT_DEBUG */ 29 30struct wpa_sm; 31struct wpa_supplicant; 32struct ibss_rsn; 33struct scan_info; 34struct wpa_bss; 35struct wpa_scan_results; 36struct hostapd_hw_modes; 37struct wpa_driver_associate_params; 38 39/* 40 * Forward declarations of private structures used within the ctrl_iface 41 * backends. Other parts of wpa_supplicant do not have access to data stored in 42 * these structures. 43 */ 44struct ctrl_iface_priv; 45struct ctrl_iface_global_priv; 46struct wpas_dbus_priv; 47struct wpas_binder_priv; 48 49/** 50 * struct wpa_interface - Parameters for wpa_supplicant_add_iface() 51 */ 52struct wpa_interface { 53 /** 54 * confname - Configuration name (file or profile) name 55 * 56 * This can also be %NULL when a configuration file is not used. In 57 * that case, ctrl_interface must be set to allow the interface to be 58 * configured. 59 */ 60 const char *confname; 61 62 /** 63 * confanother - Additional configuration name (file or profile) name 64 * 65 * This can also be %NULL when the additional configuration file is not 66 * used. 67 */ 68 const char *confanother; 69 70 /** 71 * ctrl_interface - Control interface parameter 72 * 73 * If a configuration file is not used, this variable can be used to 74 * set the ctrl_interface parameter that would have otherwise been read 75 * from the configuration file. If both confname and ctrl_interface are 76 * set, ctrl_interface is used to override the value from configuration 77 * file. 78 */ 79 const char *ctrl_interface; 80 81 /** 82 * driver - Driver interface name, or %NULL to use the default driver 83 */ 84 const char *driver; 85 86 /** 87 * driver_param - Driver interface parameters 88 * 89 * If a configuration file is not used, this variable can be used to 90 * set the driver_param parameters that would have otherwise been read 91 * from the configuration file. If both confname and driver_param are 92 * set, driver_param is used to override the value from configuration 93 * file. 94 */ 95 const char *driver_param; 96 97 /** 98 * ifname - Interface name 99 */ 100 const char *ifname; 101 102 /** 103 * bridge_ifname - Optional bridge interface name 104 * 105 * If the driver interface (ifname) is included in a Linux bridge 106 * device, the bridge interface may need to be used for receiving EAPOL 107 * frames. This can be enabled by setting this variable to enable 108 * receiving of EAPOL frames from an additional interface. 109 */ 110 const char *bridge_ifname; 111 112 /** 113 * p2p_mgmt - Interface used for P2P management (P2P Device operations) 114 * 115 * Indicates whether wpas_p2p_init() must be called for this interface. 116 * This is used only when the driver supports a dedicated P2P Device 117 * interface that is not a network interface. 118 */ 119 int p2p_mgmt; 120}; 121 122/** 123 * struct wpa_params - Parameters for wpa_supplicant_init() 124 */ 125struct wpa_params { 126 /** 127 * daemonize - Run %wpa_supplicant in the background 128 */ 129 int daemonize; 130 131 /** 132 * wait_for_monitor - Wait for a monitor program before starting 133 */ 134 int wait_for_monitor; 135 136 /** 137 * pid_file - Path to a PID (process ID) file 138 * 139 * If this and daemonize are set, process ID of the background process 140 * will be written to the specified file. 141 */ 142 char *pid_file; 143 144 /** 145 * wpa_debug_level - Debugging verbosity level (e.g., MSG_INFO) 146 */ 147 int wpa_debug_level; 148 149 /** 150 * wpa_debug_show_keys - Whether keying material is included in debug 151 * 152 * This parameter can be used to allow keying material to be included 153 * in debug messages. This is a security risk and this option should 154 * not be enabled in normal configuration. If needed during 155 * development or while troubleshooting, this option can provide more 156 * details for figuring out what is happening. 157 */ 158 int wpa_debug_show_keys; 159 160 /** 161 * wpa_debug_timestamp - Whether to include timestamp in debug messages 162 */ 163 int wpa_debug_timestamp; 164 165 /** 166 * ctrl_interface - Global ctrl_iface path/parameter 167 */ 168 char *ctrl_interface; 169 170 /** 171 * ctrl_interface_group - Global ctrl_iface group 172 */ 173 char *ctrl_interface_group; 174 175 /** 176 * dbus_ctrl_interface - Enable the DBus control interface 177 */ 178 int dbus_ctrl_interface; 179 180 /** 181 * wpa_debug_file_path - Path of debug file or %NULL to use stdout 182 */ 183 const char *wpa_debug_file_path; 184 185 /** 186 * wpa_debug_syslog - Enable log output through syslog 187 */ 188 int wpa_debug_syslog; 189 190 /** 191 * wpa_debug_tracing - Enable log output through Linux tracing 192 */ 193 int wpa_debug_tracing; 194 195 /** 196 * override_driver - Optional driver parameter override 197 * 198 * This parameter can be used to override the driver parameter in 199 * dynamic interface addition to force a specific driver wrapper to be 200 * used instead. 201 */ 202 char *override_driver; 203 204 /** 205 * override_ctrl_interface - Optional ctrl_interface override 206 * 207 * This parameter can be used to override the ctrl_interface parameter 208 * in dynamic interface addition to force a control interface to be 209 * created. 210 */ 211 char *override_ctrl_interface; 212 213 /** 214 * entropy_file - Optional entropy file 215 * 216 * This parameter can be used to configure wpa_supplicant to maintain 217 * its internal entropy store over restarts. 218 */ 219 char *entropy_file; 220 221#ifdef CONFIG_P2P 222 /** 223 * conf_p2p_dev - Configuration file used to hold the 224 * P2P Device configuration parameters. 225 * 226 * This can also be %NULL. In such a case, if a P2P Device dedicated 227 * interfaces is created, the main configuration file will be used. 228 */ 229 char *conf_p2p_dev; 230#endif /* CONFIG_P2P */ 231 232#ifdef CONFIG_MATCH_IFACE 233 /** 234 * match_ifaces - Interface descriptions to match 235 */ 236 struct wpa_interface *match_ifaces; 237 238 /** 239 * match_iface_count - Number of defined matching interfaces 240 */ 241 int match_iface_count; 242#endif /* CONFIG_MATCH_IFACE */ 243}; 244 245struct p2p_srv_bonjour { 246 struct dl_list list; 247 struct wpabuf *query; 248 struct wpabuf *resp; 249}; 250 251struct p2p_srv_upnp { 252 struct dl_list list; 253 u8 version; 254 char *service; 255}; 256 257/** 258 * struct wpa_global - Internal, global data for all %wpa_supplicant interfaces 259 * 260 * This structure is initialized by calling wpa_supplicant_init() when starting 261 * %wpa_supplicant. 262 */ 263struct wpa_global { 264 struct wpa_supplicant *ifaces; 265 struct wpa_params params; 266 struct ctrl_iface_global_priv *ctrl_iface; 267 struct wpas_dbus_priv *dbus; 268 struct wpas_binder_priv *binder; 269 void **drv_priv; 270 size_t drv_count; 271 struct os_time suspend_time; 272 struct p2p_data *p2p; 273 struct wpa_supplicant *p2p_init_wpa_s; 274 struct wpa_supplicant *p2p_group_formation; 275 struct wpa_supplicant *p2p_invite_group; 276 u8 p2p_dev_addr[ETH_ALEN]; 277 struct os_reltime p2p_go_wait_client; 278 struct dl_list p2p_srv_bonjour; /* struct p2p_srv_bonjour */ 279 struct dl_list p2p_srv_upnp; /* struct p2p_srv_upnp */ 280 int p2p_disabled; 281 int cross_connection; 282 struct wpa_freq_range_list p2p_disallow_freq; 283 struct wpa_freq_range_list p2p_go_avoid_freq; 284 enum wpa_conc_pref { 285 WPA_CONC_PREF_NOT_SET, 286 WPA_CONC_PREF_STA, 287 WPA_CONC_PREF_P2P 288 } conc_pref; 289 unsigned int p2p_per_sta_psk:1; 290 unsigned int p2p_fail_on_wps_complete:1; 291 unsigned int p2p_24ghz_social_channels:1; 292 unsigned int pending_p2ps_group:1; 293 unsigned int pending_group_iface_for_p2ps:1; 294 unsigned int pending_p2ps_group_freq; 295 296#ifdef CONFIG_WIFI_DISPLAY 297 int wifi_display; 298#define MAX_WFD_SUBELEMS 10 299 struct wpabuf *wfd_subelem[MAX_WFD_SUBELEMS]; 300#endif /* CONFIG_WIFI_DISPLAY */ 301 302 struct psk_list_entry *add_psk; /* From group formation */ 303}; 304 305 306/** 307 * struct wpa_radio - Internal data for per-radio information 308 * 309 * This structure is used to share data about configured interfaces 310 * (struct wpa_supplicant) that share the same physical radio, e.g., to allow 311 * better coordination of offchannel operations. 312 */ 313struct wpa_radio { 314 char name[16]; /* from driver_ops get_radio_name() or empty if not 315 * available */ 316 unsigned int external_scan_running:1; 317 unsigned int num_active_works; 318 struct dl_list ifaces; /* struct wpa_supplicant::radio_list entries */ 319 struct dl_list work; /* struct wpa_radio_work::list entries */ 320}; 321 322#define MAX_ACTIVE_WORKS 2 323 324 325/** 326 * struct wpa_radio_work - Radio work item 327 */ 328struct wpa_radio_work { 329 struct dl_list list; 330 unsigned int freq; /* known frequency (MHz) or 0 for multiple/unknown */ 331 const char *type; 332 struct wpa_supplicant *wpa_s; 333 void (*cb)(struct wpa_radio_work *work, int deinit); 334 void *ctx; 335 unsigned int started:1; 336 struct os_reltime time; 337 unsigned int bands; 338}; 339 340int radio_add_work(struct wpa_supplicant *wpa_s, unsigned int freq, 341 const char *type, int next, 342 void (*cb)(struct wpa_radio_work *work, int deinit), 343 void *ctx); 344void radio_work_done(struct wpa_radio_work *work); 345void radio_remove_works(struct wpa_supplicant *wpa_s, 346 const char *type, int remove_all); 347void radio_work_check_next(struct wpa_supplicant *wpa_s); 348struct wpa_radio_work * 349radio_work_pending(struct wpa_supplicant *wpa_s, const char *type); 350 351struct wpa_connect_work { 352 unsigned int sme:1; 353 unsigned int bss_removed:1; 354 struct wpa_bss *bss; 355 struct wpa_ssid *ssid; 356}; 357 358int wpas_valid_bss_ssid(struct wpa_supplicant *wpa_s, struct wpa_bss *test_bss, 359 struct wpa_ssid *test_ssid); 360void wpas_connect_work_free(struct wpa_connect_work *cwork); 361void wpas_connect_work_done(struct wpa_supplicant *wpa_s); 362 363struct wpa_external_work { 364 unsigned int id; 365 char type[100]; 366 unsigned int timeout; 367}; 368 369enum wpa_radio_work_band wpas_freq_to_band(int freq); 370unsigned int wpas_get_bands(struct wpa_supplicant *wpa_s, const int *freqs); 371 372/** 373 * offchannel_send_action_result - Result of offchannel send Action frame 374 */ 375enum offchannel_send_action_result { 376 OFFCHANNEL_SEND_ACTION_SUCCESS /**< Frame was send and acknowledged */, 377 OFFCHANNEL_SEND_ACTION_NO_ACK /**< Frame was sent, but not acknowledged 378 */, 379 OFFCHANNEL_SEND_ACTION_FAILED /**< Frame was not sent due to a failure 380 */ 381}; 382 383struct wps_ap_info { 384 u8 bssid[ETH_ALEN]; 385 enum wps_ap_info_type { 386 WPS_AP_NOT_SEL_REG, 387 WPS_AP_SEL_REG, 388 WPS_AP_SEL_REG_OUR 389 } type; 390 unsigned int tries; 391 struct os_reltime last_attempt; 392 unsigned int pbc_active; 393 u8 uuid[WPS_UUID_LEN]; 394}; 395 396#define WPA_FREQ_USED_BY_INFRA_STATION BIT(0) 397#define WPA_FREQ_USED_BY_P2P_CLIENT BIT(1) 398 399struct wpa_used_freq_data { 400 int freq; 401 unsigned int flags; 402}; 403 404#define RRM_NEIGHBOR_REPORT_TIMEOUT 1 /* 1 second for AP to send a report */ 405 406/* 407 * struct rrm_data - Data used for managing RRM features 408 */ 409struct rrm_data { 410 /* rrm_used - indication regarding the current connection */ 411 unsigned int rrm_used:1; 412 413 /* 414 * notify_neighbor_rep - Callback for notifying report requester 415 */ 416 void (*notify_neighbor_rep)(void *ctx, struct wpabuf *neighbor_rep); 417 418 /* 419 * neighbor_rep_cb_ctx - Callback context 420 * Received in the callback registration, and sent to the callback 421 * function as a parameter. 422 */ 423 void *neighbor_rep_cb_ctx; 424 425 /* next_neighbor_rep_token - Next request's dialog token */ 426 u8 next_neighbor_rep_token; 427}; 428 429enum wpa_supplicant_test_failure { 430 WPAS_TEST_FAILURE_NONE, 431 WPAS_TEST_FAILURE_SCAN_TRIGGER, 432}; 433 434struct icon_entry { 435 struct dl_list list; 436 u8 bssid[ETH_ALEN]; 437 u8 dialog_token; 438 char *file_name; 439 u8 *image; 440 size_t image_len; 441}; 442 443struct wpa_bss_tmp_disallowed { 444 struct dl_list list; 445 u8 bssid[ETH_ALEN]; 446 struct os_reltime disallowed_until; 447}; 448 449/** 450 * struct wpa_supplicant - Internal data for wpa_supplicant interface 451 * 452 * This structure contains the internal data for core wpa_supplicant code. This 453 * should be only used directly from the core code. However, a pointer to this 454 * data is used from other files as an arbitrary context pointer in calls to 455 * core functions. 456 */ 457struct wpa_supplicant { 458 struct wpa_global *global; 459 struct wpa_radio *radio; /* shared radio context */ 460 struct dl_list radio_list; /* list head: struct wpa_radio::ifaces */ 461 struct wpa_supplicant *parent; 462 struct wpa_supplicant *p2pdev; 463 struct wpa_supplicant *next; 464 struct l2_packet_data *l2; 465 struct l2_packet_data *l2_br; 466 unsigned char own_addr[ETH_ALEN]; 467 unsigned char perm_addr[ETH_ALEN]; 468 char ifname[100]; 469#ifdef CONFIG_MATCH_IFACE 470 int matched; 471#endif /* CONFIG_MATCH_IFACE */ 472#ifdef CONFIG_CTRL_IFACE_DBUS 473 char *dbus_path; 474#endif /* CONFIG_CTRL_IFACE_DBUS */ 475#ifdef CONFIG_CTRL_IFACE_DBUS_NEW 476 char *dbus_new_path; 477 char *dbus_groupobj_path; 478#ifdef CONFIG_AP 479 char *preq_notify_peer; 480#endif /* CONFIG_AP */ 481#endif /* CONFIG_CTRL_IFACE_DBUS_NEW */ 482#ifdef CONFIG_CTRL_IFACE_BINDER 483 const void *binder_object_key; 484#endif /* CONFIG_CTRL_IFACE_BINDER */ 485 char bridge_ifname[16]; 486 487 char *confname; 488 char *confanother; 489 490 struct wpa_config *conf; 491 int countermeasures; 492 struct os_reltime last_michael_mic_error; 493 u8 bssid[ETH_ALEN]; 494 u8 pending_bssid[ETH_ALEN]; /* If wpa_state == WPA_ASSOCIATING, this 495 * field contains the target BSSID. */ 496 int reassociate; /* reassociation requested */ 497 unsigned int reassoc_same_bss:1; /* reassociating to the same BSS */ 498 unsigned int reassoc_same_ess:1; /* reassociating to the same ESS */ 499 int disconnected; /* all connections disabled; i.e., do no reassociate 500 * before this has been cleared */ 501 struct wpa_ssid *current_ssid; 502 struct wpa_ssid *last_ssid; 503 struct wpa_bss *current_bss; 504 int ap_ies_from_associnfo; 505 unsigned int assoc_freq; 506 507 /* Selected configuration (based on Beacon/ProbeResp WPA IE) */ 508 int pairwise_cipher; 509 int group_cipher; 510 int key_mgmt; 511 int wpa_proto; 512 int mgmt_group_cipher; 513 514 void *drv_priv; /* private data used by driver_ops */ 515 void *global_drv_priv; 516 517 u8 *bssid_filter; 518 size_t bssid_filter_count; 519 520 u8 *disallow_aps_bssid; 521 size_t disallow_aps_bssid_count; 522 struct wpa_ssid_value *disallow_aps_ssid; 523 size_t disallow_aps_ssid_count; 524 525 enum set_band setband; 526 527 /* Preferred network for the next connection attempt */ 528 struct wpa_ssid *next_ssid; 529 530 /* previous scan was wildcard when interleaving between 531 * wildcard scans and specific SSID scan when max_ssids=1 */ 532 int prev_scan_wildcard; 533 struct wpa_ssid *prev_scan_ssid; /* previously scanned SSID; 534 * NULL = not yet initialized (start 535 * with wildcard SSID) 536 * WILDCARD_SSID_SCAN = wildcard 537 * SSID was used in the previous scan 538 */ 539#define WILDCARD_SSID_SCAN ((struct wpa_ssid *) 1) 540 541 struct wpa_ssid *prev_sched_ssid; /* last SSID used in sched scan */ 542 int sched_scan_timeout; 543 int first_sched_scan; 544 int sched_scan_timed_out; 545 struct sched_scan_plan *sched_scan_plans; 546 size_t sched_scan_plans_num; 547 548 void (*scan_res_handler)(struct wpa_supplicant *wpa_s, 549 struct wpa_scan_results *scan_res); 550 struct dl_list bss; /* struct wpa_bss::list */ 551 struct dl_list bss_id; /* struct wpa_bss::list_id */ 552 size_t num_bss; 553 unsigned int bss_update_idx; 554 unsigned int bss_next_id; 555 556 /* 557 * Pointers to BSS entries in the order they were in the last scan 558 * results. 559 */ 560 struct wpa_bss **last_scan_res; 561 unsigned int last_scan_res_used; 562 unsigned int last_scan_res_size; 563 struct os_reltime last_scan; 564 565 const struct wpa_driver_ops *driver; 566 int interface_removed; /* whether the network interface has been 567 * removed */ 568 struct wpa_sm *wpa; 569 struct eapol_sm *eapol; 570 571 struct ctrl_iface_priv *ctrl_iface; 572 573 enum wpa_states wpa_state; 574 struct wpa_radio_work *scan_work; 575 int scanning; 576 int sched_scanning; 577 int new_connection; 578 579 int eapol_received; /* number of EAPOL packets received after the 580 * previous association event */ 581 582 struct scard_data *scard; 583 char imsi[20]; 584 int mnc_len; 585 586 unsigned char last_eapol_src[ETH_ALEN]; 587 588 unsigned int keys_cleared; /* bitfield of key indexes that the driver is 589 * known not to be configured with a key */ 590 591 struct wpa_blacklist *blacklist; 592 593 /** 594 * extra_blacklist_count - Sum of blacklist counts after last connection 595 * 596 * This variable is used to maintain a count of temporary blacklisting 597 * failures (maximum number for any BSS) over blacklist clear 598 * operations. This is needed for figuring out whether there has been 599 * failures prior to the last blacklist clear operation which happens 600 * whenever no other not-blacklisted BSS candidates are available. This 601 * gets cleared whenever a connection has been established successfully. 602 */ 603 int extra_blacklist_count; 604 605 /** 606 * scan_req - Type of the scan request 607 */ 608 enum scan_req_type { 609 /** 610 * NORMAL_SCAN_REQ - Normal scan request 611 * 612 * This is used for scans initiated by wpa_supplicant to find an 613 * AP for a connection. 614 */ 615 NORMAL_SCAN_REQ, 616 617 /** 618 * INITIAL_SCAN_REQ - Initial scan request 619 * 620 * This is used for the first scan on an interface to force at 621 * least one scan to be run even if the configuration does not 622 * include any enabled networks. 623 */ 624 INITIAL_SCAN_REQ, 625 626 /** 627 * MANUAL_SCAN_REQ - Manual scan request 628 * 629 * This is used for scans where the user request a scan or 630 * a specific wpa_supplicant operation (e.g., WPS) requires scan 631 * to be run. 632 */ 633 MANUAL_SCAN_REQ 634 } scan_req, last_scan_req; 635 enum wpa_states scan_prev_wpa_state; 636 struct os_reltime scan_trigger_time, scan_start_time; 637 /* Minimum freshness requirement for connection purposes */ 638 struct os_reltime scan_min_time; 639 int scan_runs; /* number of scan runs since WPS was started */ 640 int *next_scan_freqs; 641 int *manual_scan_freqs; 642 int *manual_sched_scan_freqs; 643 unsigned int manual_scan_passive:1; 644 unsigned int manual_scan_use_id:1; 645 unsigned int manual_scan_only_new:1; 646 unsigned int own_scan_requested:1; 647 unsigned int own_scan_running:1; 648 unsigned int clear_driver_scan_cache:1; 649 unsigned int manual_scan_id; 650 int scan_interval; /* time in sec between scans to find suitable AP */ 651 int normal_scans; /* normal scans run before sched_scan */ 652 int scan_for_connection; /* whether the scan request was triggered for 653 * finding a connection */ 654#define MAX_SCAN_ID 16 655 int scan_id[MAX_SCAN_ID]; 656 unsigned int scan_id_count; 657 u8 next_scan_bssid[ETH_ALEN]; 658 659 struct wpa_ssid_value *ssids_from_scan_req; 660 unsigned int num_ssids_from_scan_req; 661 662 u64 drv_flags; 663 unsigned int drv_enc; 664 unsigned int drv_smps_modes; 665 unsigned int drv_rrm_flags; 666 667 /* 668 * A bitmap of supported protocols for probe response offload. See 669 * struct wpa_driver_capa in driver.h 670 */ 671 unsigned int probe_resp_offloads; 672 673 /* extended capabilities supported by the driver */ 674 const u8 *extended_capa, *extended_capa_mask; 675 unsigned int extended_capa_len; 676 677 int max_scan_ssids; 678 int max_sched_scan_ssids; 679 unsigned int max_sched_scan_plans; 680 unsigned int max_sched_scan_plan_interval; 681 unsigned int max_sched_scan_plan_iterations; 682 int sched_scan_supported; 683 unsigned int max_match_sets; 684 unsigned int max_remain_on_chan; 685 unsigned int max_stations; 686 687 int pending_mic_error_report; 688 int pending_mic_error_pairwise; 689 int mic_errors_seen; /* Michael MIC errors with the current PTK */ 690 691 struct wps_context *wps; 692 int wps_success; /* WPS success event received */ 693 struct wps_er *wps_er; 694 unsigned int wps_run; 695 struct os_reltime wps_pin_start_time; 696 int blacklist_cleared; 697 698 struct wpabuf *pending_eapol_rx; 699 struct os_reltime pending_eapol_rx_time; 700 u8 pending_eapol_rx_src[ETH_ALEN]; 701 unsigned int last_eapol_matches_bssid:1; 702 unsigned int eap_expected_failure:1; 703 unsigned int reattach:1; /* reassociation to the same BSS requested */ 704 unsigned int mac_addr_changed:1; 705 unsigned int added_vif:1; 706 unsigned int wnmsleep_used:1; 707 708 struct os_reltime last_mac_addr_change; 709 int last_mac_addr_style; 710 711 struct ibss_rsn *ibss_rsn; 712 713 int set_sta_uapsd; 714 int sta_uapsd; 715 int set_ap_uapsd; 716 int ap_uapsd; 717 718#ifdef CONFIG_SME 719 struct { 720 u8 ssid[SSID_MAX_LEN]; 721 size_t ssid_len; 722 int freq; 723 u8 assoc_req_ie[200]; 724 size_t assoc_req_ie_len; 725 int mfp; 726 int ft_used; 727 u8 mobility_domain[2]; 728 u8 *ft_ies; 729 size_t ft_ies_len; 730 u8 prev_bssid[ETH_ALEN]; 731 int prev_bssid_set; 732 int auth_alg; 733 int proto; 734 735 int sa_query_count; /* number of pending SA Query requests; 736 * 0 = no SA Query in progress */ 737 int sa_query_timed_out; 738 u8 *sa_query_trans_id; /* buffer of WLAN_SA_QUERY_TR_ID_LEN * 739 * sa_query_count octets of pending 740 * SA Query transaction identifiers */ 741 struct os_reltime sa_query_start; 742 struct os_reltime last_unprot_disconnect; 743 enum { HT_SEC_CHAN_UNKNOWN, 744 HT_SEC_CHAN_ABOVE, 745 HT_SEC_CHAN_BELOW } ht_sec_chan; 746 u8 sched_obss_scan; 747 u16 obss_scan_int; 748 u16 bss_max_idle_period; 749#ifdef CONFIG_SAE 750 struct sae_data sae; 751 struct wpabuf *sae_token; 752 int sae_group_index; 753 unsigned int sae_pmksa_caching:1; 754#endif /* CONFIG_SAE */ 755 } sme; 756#endif /* CONFIG_SME */ 757 758#ifdef CONFIG_AP 759 struct hostapd_iface *ap_iface; 760 void (*ap_configured_cb)(void *ctx, void *data); 761 void *ap_configured_cb_ctx; 762 void *ap_configured_cb_data; 763#endif /* CONFIG_AP */ 764 765 struct hostapd_iface *ifmsh; 766#ifdef CONFIG_MESH 767 struct mesh_rsn *mesh_rsn; 768 int mesh_if_idx; 769 unsigned int mesh_if_created:1; 770 unsigned int mesh_ht_enabled:1; 771 unsigned int mesh_vht_enabled:1; 772#endif /* CONFIG_MESH */ 773 774 unsigned int off_channel_freq; 775 struct wpabuf *pending_action_tx; 776 u8 pending_action_src[ETH_ALEN]; 777 u8 pending_action_dst[ETH_ALEN]; 778 u8 pending_action_bssid[ETH_ALEN]; 779 unsigned int pending_action_freq; 780 int pending_action_no_cck; 781 int pending_action_without_roc; 782 unsigned int pending_action_tx_done:1; 783 void (*pending_action_tx_status_cb)(struct wpa_supplicant *wpa_s, 784 unsigned int freq, const u8 *dst, 785 const u8 *src, const u8 *bssid, 786 const u8 *data, size_t data_len, 787 enum offchannel_send_action_result 788 result); 789 unsigned int roc_waiting_drv_freq; 790 int action_tx_wait_time; 791 792 int p2p_mgmt; 793 794#ifdef CONFIG_P2P 795 struct p2p_go_neg_results *go_params; 796 int create_p2p_iface; 797 u8 pending_interface_addr[ETH_ALEN]; 798 char pending_interface_name[100]; 799 int pending_interface_type; 800 int p2p_group_idx; 801 unsigned int pending_listen_freq; 802 unsigned int pending_listen_duration; 803 enum { 804 NOT_P2P_GROUP_INTERFACE, 805 P2P_GROUP_INTERFACE_PENDING, 806 P2P_GROUP_INTERFACE_GO, 807 P2P_GROUP_INTERFACE_CLIENT 808 } p2p_group_interface; 809 struct p2p_group *p2p_group; 810 int p2p_long_listen; /* remaining time in long Listen state in ms */ 811 char p2p_pin[10]; 812 int p2p_wps_method; 813 u8 p2p_auth_invite[ETH_ALEN]; 814 int p2p_sd_over_ctrl_iface; 815 int p2p_in_provisioning; 816 int p2p_in_invitation; 817 int p2p_invite_go_freq; 818 int pending_invite_ssid_id; 819 int show_group_started; 820 u8 go_dev_addr[ETH_ALEN]; 821 int pending_pd_before_join; 822 u8 pending_join_iface_addr[ETH_ALEN]; 823 u8 pending_join_dev_addr[ETH_ALEN]; 824 int pending_join_wps_method; 825 u8 p2p_join_ssid[SSID_MAX_LEN]; 826 size_t p2p_join_ssid_len; 827 int p2p_join_scan_count; 828 int auto_pd_scan_retry; 829 int force_long_sd; 830 u16 pending_pd_config_methods; 831 enum { 832 NORMAL_PD, AUTO_PD_GO_NEG, AUTO_PD_JOIN, AUTO_PD_ASP 833 } pending_pd_use; 834 835 /* 836 * Whether cross connection is disallowed by the AP to which this 837 * interface is associated (only valid if there is an association). 838 */ 839 int cross_connect_disallowed; 840 841 /* 842 * Whether this P2P group is configured to use cross connection (only 843 * valid if this is P2P GO interface). The actual cross connect packet 844 * forwarding may not be configured depending on the uplink status. 845 */ 846 int cross_connect_enabled; 847 848 /* Whether cross connection forwarding is in use at the moment. */ 849 int cross_connect_in_use; 850 851 /* 852 * Uplink interface name for cross connection 853 */ 854 char cross_connect_uplink[100]; 855 856 unsigned int p2p_auto_join:1; 857 unsigned int p2p_auto_pd:1; 858 unsigned int p2p_persistent_group:1; 859 unsigned int p2p_fallback_to_go_neg:1; 860 unsigned int p2p_pd_before_go_neg:1; 861 unsigned int p2p_go_ht40:1; 862 unsigned int p2p_go_vht:1; 863 unsigned int user_initiated_pd:1; 864 unsigned int p2p_go_group_formation_completed:1; 865 unsigned int group_formation_reported:1; 866 unsigned int waiting_presence_resp; 867 int p2p_first_connection_timeout; 868 unsigned int p2p_nfc_tag_enabled:1; 869 unsigned int p2p_peer_oob_pk_hash_known:1; 870 unsigned int p2p_disable_ip_addr_req:1; 871 unsigned int p2ps_method_config_any:1; 872 unsigned int p2p_cli_probe:1; 873 int p2p_persistent_go_freq; 874 int p2p_persistent_id; 875 int p2p_go_intent; 876 int p2p_connect_freq; 877 struct os_reltime p2p_auto_started; 878 struct wpa_ssid *p2p_last_4way_hs_fail; 879 struct wpa_radio_work *p2p_scan_work; 880 struct wpa_radio_work *p2p_listen_work; 881 struct wpa_radio_work *p2p_send_action_work; 882 883 u16 p2p_oob_dev_pw_id; /* OOB Device Password Id for group formation */ 884 struct wpabuf *p2p_oob_dev_pw; /* OOB Device Password for group 885 * formation */ 886 u8 p2p_peer_oob_pubkey_hash[WPS_OOB_PUBKEY_HASH_LEN]; 887 u8 p2p_ip_addr_info[3 * 4]; 888 889 /* group common frequencies */ 890 int *p2p_group_common_freqs; 891 unsigned int p2p_group_common_freqs_num; 892 u8 p2ps_join_addr[ETH_ALEN]; 893 894 unsigned int p2p_go_max_oper_chwidth; 895 unsigned int p2p_go_vht_center_freq2; 896#endif /* CONFIG_P2P */ 897 898 struct wpa_ssid *bgscan_ssid; 899 const struct bgscan_ops *bgscan; 900 void *bgscan_priv; 901 902 const struct autoscan_ops *autoscan; 903 struct wpa_driver_scan_params *autoscan_params; 904 void *autoscan_priv; 905 906 struct wpa_ssid *connect_without_scan; 907 908 struct wps_ap_info *wps_ap; 909 size_t num_wps_ap; 910 int wps_ap_iter; 911 912 int after_wps; 913 int known_wps_freq; 914 unsigned int wps_freq; 915 int wps_fragment_size; 916 int auto_reconnect_disabled; 917 918 /* Channel preferences for AP/P2P GO use */ 919 int best_24_freq; 920 int best_5_freq; 921 int best_overall_freq; 922 923 struct gas_query *gas; 924 925#ifdef CONFIG_INTERWORKING 926 unsigned int fetch_anqp_in_progress:1; 927 unsigned int network_select:1; 928 unsigned int auto_select:1; 929 unsigned int auto_network_select:1; 930 unsigned int interworking_fast_assoc_tried:1; 931 unsigned int fetch_all_anqp:1; 932 unsigned int fetch_osu_info:1; 933 unsigned int fetch_osu_waiting_scan:1; 934 unsigned int fetch_osu_icon_in_progress:1; 935 struct wpa_bss *interworking_gas_bss; 936 unsigned int osu_icon_id; 937 struct dl_list icon_head; /* struct icon_entry */ 938 struct osu_provider *osu_prov; 939 size_t osu_prov_count; 940 struct os_reltime osu_icon_fetch_start; 941 unsigned int num_osu_scans; 942 unsigned int num_prov_found; 943#endif /* CONFIG_INTERWORKING */ 944 unsigned int drv_capa_known; 945 946 struct { 947 struct hostapd_hw_modes *modes; 948 u16 num_modes; 949 u16 flags; 950 } hw; 951 enum local_hw_capab { 952 CAPAB_NO_HT_VHT, 953 CAPAB_HT, 954 CAPAB_HT40, 955 CAPAB_VHT, 956 } hw_capab; 957#ifdef CONFIG_MACSEC 958 struct ieee802_1x_kay *kay; 959#endif /* CONFIG_MACSEC */ 960 961 int pno; 962 int pno_sched_pending; 963 964 /* WLAN_REASON_* reason codes. Negative if locally generated. */ 965 int disconnect_reason; 966 967 /* WLAN_STATUS_* status codes from (Re)Association Response frame. */ 968 u16 assoc_status_code; 969 970 struct ext_password_data *ext_pw; 971 972 struct wpabuf *last_gas_resp, *prev_gas_resp; 973 u8 last_gas_addr[ETH_ALEN], prev_gas_addr[ETH_ALEN]; 974 u8 last_gas_dialog_token, prev_gas_dialog_token; 975 976 unsigned int no_keep_alive:1; 977 unsigned int ext_mgmt_frame_handling:1; 978 unsigned int ext_eapol_frame_io:1; 979 unsigned int wmm_ac_supported:1; 980 unsigned int ext_work_in_progress:1; 981 unsigned int own_disconnect_req:1; 982 983#define MAC_ADDR_RAND_SCAN BIT(0) 984#define MAC_ADDR_RAND_SCHED_SCAN BIT(1) 985#define MAC_ADDR_RAND_PNO BIT(2) 986#define MAC_ADDR_RAND_ALL (MAC_ADDR_RAND_SCAN | \ 987 MAC_ADDR_RAND_SCHED_SCAN | \ 988 MAC_ADDR_RAND_PNO) 989 unsigned int mac_addr_rand_supported; 990 unsigned int mac_addr_rand_enable; 991 992 /* MAC Address followed by mask (2 * ETH_ALEN) */ 993 u8 *mac_addr_scan; 994 u8 *mac_addr_sched_scan; 995 u8 *mac_addr_pno; 996 997#ifdef CONFIG_WNM 998 u8 wnm_dialog_token; 999 u8 wnm_reply; 1000 u8 wnm_num_neighbor_report; 1001 u8 wnm_mode; 1002 u16 wnm_dissoc_timer; 1003 u8 wnm_bss_termination_duration[12]; 1004 struct neighbor_report *wnm_neighbor_report_elements; 1005 struct os_reltime wnm_cand_valid_until; 1006 u8 wnm_cand_from_bss[ETH_ALEN]; 1007#endif /* CONFIG_WNM */ 1008 1009#ifdef CONFIG_TESTING_GET_GTK 1010 u8 last_gtk[32]; 1011 size_t last_gtk_len; 1012#endif /* CONFIG_TESTING_GET_GTK */ 1013 1014 unsigned int num_multichan_concurrent; 1015 struct wpa_radio_work *connect_work; 1016 1017 unsigned int ext_work_id; 1018 1019 struct wpabuf *vendor_elem[NUM_VENDOR_ELEM_FRAMES]; 1020 1021#ifdef CONFIG_TESTING_OPTIONS 1022 struct l2_packet_data *l2_test; 1023 unsigned int extra_roc_dur; 1024 enum wpa_supplicant_test_failure test_failure; 1025 unsigned int p2p_go_csa_on_inv:1; 1026#endif /* CONFIG_TESTING_OPTIONS */ 1027 1028 struct wmm_ac_assoc_data *wmm_ac_assoc_info; 1029 struct wmm_tspec_element *tspecs[WMM_AC_NUM][TS_DIR_IDX_COUNT]; 1030 struct wmm_ac_addts_request *addts_request; 1031 u8 wmm_ac_last_dialog_token; 1032 struct wmm_tspec_element *last_tspecs; 1033 u8 last_tspecs_count; 1034 1035 struct rrm_data rrm; 1036 1037#ifdef CONFIG_FST 1038 struct fst_iface *fst; 1039 const struct wpabuf *fst_ies; 1040 struct wpabuf *received_mb_ies; 1041#endif /* CONFIG_FST */ 1042 1043#ifdef CONFIG_MBO 1044 /* Multiband operation non-preferred channel */ 1045 struct wpa_mbo_non_pref_channel { 1046 enum mbo_non_pref_chan_reason reason; 1047 u8 oper_class; 1048 u8 chan; 1049 u8 reason_detail; 1050 u8 preference; 1051 } *non_pref_chan; 1052 size_t non_pref_chan_num; 1053 u8 mbo_wnm_token; 1054#endif /* CONFIG_MBO */ 1055 1056 /* 1057 * This should be under CONFIG_MBO, but it is left out to allow using 1058 * the bss_temp_disallowed list for other purposes as well. 1059 */ 1060 struct dl_list bss_tmp_disallowed; 1061 1062 /* 1063 * Content of a measurement report element with type 8 (LCI), 1064 * own location. 1065 */ 1066 struct wpabuf *lci; 1067 struct os_reltime lci_time; 1068}; 1069 1070 1071/* wpa_supplicant.c */ 1072void wpa_supplicant_apply_ht_overrides( 1073 struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid, 1074 struct wpa_driver_associate_params *params); 1075void wpa_supplicant_apply_vht_overrides( 1076 struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid, 1077 struct wpa_driver_associate_params *params); 1078 1079int wpa_set_wep_keys(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid); 1080int wpa_supplicant_set_wpa_none_key(struct wpa_supplicant *wpa_s, 1081 struct wpa_ssid *ssid); 1082 1083int wpa_supplicant_reload_configuration(struct wpa_supplicant *wpa_s); 1084 1085const char * wpa_supplicant_state_txt(enum wpa_states state); 1086int wpa_supplicant_update_mac_addr(struct wpa_supplicant *wpa_s); 1087int wpa_supplicant_driver_init(struct wpa_supplicant *wpa_s); 1088int wpa_supplicant_set_suites(struct wpa_supplicant *wpa_s, 1089 struct wpa_bss *bss, struct wpa_ssid *ssid, 1090 u8 *wpa_ie, size_t *wpa_ie_len); 1091void wpa_supplicant_associate(struct wpa_supplicant *wpa_s, 1092 struct wpa_bss *bss, 1093 struct wpa_ssid *ssid); 1094void wpa_supplicant_set_non_wpa_policy(struct wpa_supplicant *wpa_s, 1095 struct wpa_ssid *ssid); 1096void wpa_supplicant_initiate_eapol(struct wpa_supplicant *wpa_s); 1097void wpa_clear_keys(struct wpa_supplicant *wpa_s, const u8 *addr); 1098void wpa_supplicant_req_auth_timeout(struct wpa_supplicant *wpa_s, 1099 int sec, int usec); 1100void wpa_supplicant_reinit_autoscan(struct wpa_supplicant *wpa_s); 1101void wpa_supplicant_set_state(struct wpa_supplicant *wpa_s, 1102 enum wpa_states state); 1103struct wpa_ssid * wpa_supplicant_get_ssid(struct wpa_supplicant *wpa_s); 1104const char * wpa_supplicant_get_eap_mode(struct wpa_supplicant *wpa_s); 1105void wpa_supplicant_cancel_auth_timeout(struct wpa_supplicant *wpa_s); 1106void wpa_supplicant_deauthenticate(struct wpa_supplicant *wpa_s, 1107 int reason_code); 1108 1109void wpa_supplicant_enable_network(struct wpa_supplicant *wpa_s, 1110 struct wpa_ssid *ssid); 1111void wpa_supplicant_disable_network(struct wpa_supplicant *wpa_s, 1112 struct wpa_ssid *ssid); 1113void wpa_supplicant_select_network(struct wpa_supplicant *wpa_s, 1114 struct wpa_ssid *ssid); 1115int wpas_set_pkcs11_engine_and_module_path(struct wpa_supplicant *wpa_s, 1116 const char *pkcs11_engine_path, 1117 const char *pkcs11_module_path); 1118int wpa_supplicant_set_ap_scan(struct wpa_supplicant *wpa_s, 1119 int ap_scan); 1120int wpa_supplicant_set_bss_expiration_age(struct wpa_supplicant *wpa_s, 1121 unsigned int expire_age); 1122int wpa_supplicant_set_bss_expiration_count(struct wpa_supplicant *wpa_s, 1123 unsigned int expire_count); 1124int wpa_supplicant_set_scan_interval(struct wpa_supplicant *wpa_s, 1125 int scan_interval); 1126int wpa_supplicant_set_debug_params(struct wpa_global *global, 1127 int debug_level, int debug_timestamp, 1128 int debug_show_keys); 1129void free_hw_features(struct wpa_supplicant *wpa_s); 1130 1131void wpa_show_license(void); 1132 1133struct wpa_interface * wpa_supplicant_match_iface(struct wpa_global *global, 1134 const char *ifname); 1135struct wpa_supplicant * wpa_supplicant_add_iface(struct wpa_global *global, 1136 struct wpa_interface *iface, 1137 struct wpa_supplicant *parent); 1138int wpa_supplicant_remove_iface(struct wpa_global *global, 1139 struct wpa_supplicant *wpa_s, 1140 int terminate); 1141struct wpa_supplicant * wpa_supplicant_get_iface(struct wpa_global *global, 1142 const char *ifname); 1143struct wpa_global * wpa_supplicant_init(struct wpa_params *params); 1144int wpa_supplicant_run(struct wpa_global *global); 1145void wpa_supplicant_deinit(struct wpa_global *global); 1146 1147int wpa_supplicant_scard_init(struct wpa_supplicant *wpa_s, 1148 struct wpa_ssid *ssid); 1149void wpa_supplicant_terminate_proc(struct wpa_global *global); 1150void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr, 1151 const u8 *buf, size_t len); 1152void wpa_supplicant_update_config(struct wpa_supplicant *wpa_s); 1153void wpa_supplicant_clear_status(struct wpa_supplicant *wpa_s); 1154void wpas_connection_failed(struct wpa_supplicant *wpa_s, const u8 *bssid); 1155int wpas_driver_bss_selection(struct wpa_supplicant *wpa_s); 1156int wpas_is_p2p_prioritized(struct wpa_supplicant *wpa_s); 1157void wpas_auth_failed(struct wpa_supplicant *wpa_s, char *reason); 1158void wpas_clear_temp_disabled(struct wpa_supplicant *wpa_s, 1159 struct wpa_ssid *ssid, int clear_failures); 1160int disallowed_bssid(struct wpa_supplicant *wpa_s, const u8 *bssid); 1161int disallowed_ssid(struct wpa_supplicant *wpa_s, const u8 *ssid, 1162 size_t ssid_len); 1163void wpas_request_connection(struct wpa_supplicant *wpa_s); 1164int wpas_build_ext_capab(struct wpa_supplicant *wpa_s, u8 *buf, size_t buflen); 1165int wpas_update_random_addr(struct wpa_supplicant *wpa_s, int style); 1166int wpas_update_random_addr_disassoc(struct wpa_supplicant *wpa_s); 1167void add_freq(int *freqs, int *num_freqs, int freq); 1168 1169void wpas_rrm_reset(struct wpa_supplicant *wpa_s); 1170void wpas_rrm_process_neighbor_rep(struct wpa_supplicant *wpa_s, 1171 const u8 *report, size_t report_len); 1172int wpas_rrm_send_neighbor_rep_request(struct wpa_supplicant *wpa_s, 1173 const struct wpa_ssid_value *ssid, 1174 int lci, int civic, 1175 void (*cb)(void *ctx, 1176 struct wpabuf *neighbor_rep), 1177 void *cb_ctx); 1178void wpas_rrm_handle_radio_measurement_request(struct wpa_supplicant *wpa_s, 1179 const u8 *src, 1180 const u8 *frame, size_t len); 1181void wpas_rrm_handle_link_measurement_request(struct wpa_supplicant *wpa_s, 1182 const u8 *src, 1183 const u8 *frame, size_t len, 1184 int rssi); 1185 1186 1187/* MBO functions */ 1188int wpas_mbo_ie(struct wpa_supplicant *wpa_s, u8 *buf, size_t len); 1189const u8 * wpas_mbo_get_bss_attr(struct wpa_bss *bss, enum mbo_attr_id attr); 1190int wpas_mbo_update_non_pref_chan(struct wpa_supplicant *wpa_s, 1191 const char *non_pref_chan); 1192void wpas_mbo_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ie); 1193int wpas_mbo_supp_op_class_ie(struct wpa_supplicant *wpa_s, int freq, u8 *pos, 1194 size_t len); 1195void wpas_mbo_ie_trans_req(struct wpa_supplicant *wpa_s, const u8 *ie, 1196 size_t len); 1197size_t wpas_mbo_ie_bss_trans_reject(struct wpa_supplicant *wpa_s, u8 *pos, 1198 size_t len, 1199 enum mbo_transition_reject_reason reason); 1200void wpas_mbo_update_cell_capa(struct wpa_supplicant *wpa_s, u8 mbo_cell_capa); 1201 1202/** 1203 * wpa_supplicant_ctrl_iface_ctrl_rsp_handle - Handle a control response 1204 * @wpa_s: Pointer to wpa_supplicant data 1205 * @ssid: Pointer to the network block the reply is for 1206 * @field: field the response is a reply for 1207 * @value: value (ie, password, etc) for @field 1208 * Returns: 0 on success, non-zero on error 1209 * 1210 * Helper function to handle replies to control interface requests. 1211 */ 1212int wpa_supplicant_ctrl_iface_ctrl_rsp_handle(struct wpa_supplicant *wpa_s, 1213 struct wpa_ssid *ssid, 1214 const char *field, 1215 const char *value); 1216 1217void ibss_mesh_setup_freq(struct wpa_supplicant *wpa_s, 1218 const struct wpa_ssid *ssid, 1219 struct hostapd_freq_params *freq); 1220 1221/* events.c */ 1222void wpa_supplicant_mark_disassoc(struct wpa_supplicant *wpa_s); 1223int wpa_supplicant_connect(struct wpa_supplicant *wpa_s, 1224 struct wpa_bss *selected, 1225 struct wpa_ssid *ssid); 1226void wpa_supplicant_stop_countermeasures(void *eloop_ctx, void *sock_ctx); 1227void wpa_supplicant_delayed_mic_error_report(void *eloop_ctx, void *sock_ctx); 1228void wnm_bss_keep_alive_deinit(struct wpa_supplicant *wpa_s); 1229int wpa_supplicant_fast_associate(struct wpa_supplicant *wpa_s); 1230struct wpa_bss * wpa_supplicant_pick_network(struct wpa_supplicant *wpa_s, 1231 struct wpa_ssid **selected_ssid); 1232 1233/* eap_register.c */ 1234int eap_register_methods(void); 1235 1236/** 1237 * Utility method to tell if a given network is for persistent group storage 1238 * @ssid: Network object 1239 * Returns: 1 if network is a persistent group, 0 otherwise 1240 */ 1241static inline int network_is_persistent_group(struct wpa_ssid *ssid) 1242{ 1243 return ssid->disabled == 2 && ssid->p2p_persistent_group; 1244} 1245 1246int wpas_network_disabled(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid); 1247int wpas_get_ssid_pmf(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid); 1248 1249int wpas_init_ext_pw(struct wpa_supplicant *wpa_s); 1250 1251void dump_freq_data(struct wpa_supplicant *wpa_s, const char *title, 1252 struct wpa_used_freq_data *freqs_data, 1253 unsigned int len); 1254 1255int get_shared_radio_freqs_data(struct wpa_supplicant *wpa_s, 1256 struct wpa_used_freq_data *freqs_data, 1257 unsigned int len); 1258int get_shared_radio_freqs(struct wpa_supplicant *wpa_s, 1259 int *freq_array, unsigned int len); 1260 1261void wpas_network_reenabled(void *eloop_ctx, void *timeout_ctx); 1262 1263void wpas_vendor_elem_update(struct wpa_supplicant *wpa_s); 1264struct wpa_supplicant * wpas_vendor_elem(struct wpa_supplicant *wpa_s, 1265 enum wpa_vendor_elem_frame frame); 1266int wpas_vendor_elem_remove(struct wpa_supplicant *wpa_s, int frame, 1267 const u8 *elem, size_t len); 1268 1269#ifdef CONFIG_FST 1270 1271struct fst_wpa_obj; 1272 1273void fst_wpa_supplicant_fill_iface_obj(struct wpa_supplicant *wpa_s, 1274 struct fst_wpa_obj *iface_obj); 1275 1276#endif /* CONFIG_FST */ 1277 1278int wpas_sched_scan_plans_set(struct wpa_supplicant *wpa_s, const char *cmd); 1279 1280struct hostapd_hw_modes * get_mode(struct hostapd_hw_modes *modes, 1281 u16 num_modes, enum hostapd_hw_mode mode); 1282 1283void wpa_bss_tmp_disallow(struct wpa_supplicant *wpa_s, const u8 *bssid, 1284 unsigned int sec); 1285int wpa_is_bss_tmp_disallowed(struct wpa_supplicant *wpa_s, const u8 *bssid); 1286 1287struct wpa_ssid * wpa_scan_res_match(struct wpa_supplicant *wpa_s, 1288 int i, struct wpa_bss *bss, 1289 struct wpa_ssid *group, 1290 int only_first_ssid); 1291 1292#endif /* WPA_SUPPLICANT_I_H */ 1293