2 * hostapd / UNIX domain socket -based control interface
3 * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
12 * See README and COPYING for more details.
15 #include "utils/includes.h"
17 #ifndef CONFIG_NATIVE_WINDOWS
23 #include "utils/common.h"
24 #include "utils/eloop.h"
25 #include "common/ieee802_11_defs.h"
26 #include "drivers/driver.h"
27 #include "radius/radius_client.h"
28 #include "ap/hostapd.h"
29 #include "ap/ap_config.h"
30 #include "ap/ieee802_1x.h"
31 #include "ap/wpa_auth.h"
32 #include "ap/ieee802_11.h"
33 #include "ap/sta_info.h"
34 #include "ap/accounting.h"
35 #include "ap/wps_hostapd.h"
36 #include "ap/ctrl_iface_ap.h"
37 #include "ctrl_iface.h"
41 struct wpa_ctrl_dst *next;
42 struct sockaddr_un addr;
49 static void hostapd_ctrl_iface_send(struct hostapd_data *hapd, int level,
50 const char *buf, size_t len);
53 static int hostapd_ctrl_iface_attach(struct hostapd_data *hapd,
54 struct sockaddr_un *from,
57 struct wpa_ctrl_dst *dst;
59 dst = os_zalloc(sizeof(*dst));
62 os_memcpy(&dst->addr, from, sizeof(struct sockaddr_un));
63 dst->addrlen = fromlen;
64 dst->debug_level = MSG_INFO;
65 dst->next = hapd->ctrl_dst;
67 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached",
68 (u8 *) from->sun_path,
69 fromlen - offsetof(struct sockaddr_un, sun_path));
74 static int hostapd_ctrl_iface_detach(struct hostapd_data *hapd,
75 struct sockaddr_un *from,
78 struct wpa_ctrl_dst *dst, *prev = NULL;
82 if (fromlen == dst->addrlen &&
83 os_memcmp(from->sun_path, dst->addr.sun_path,
84 fromlen - offsetof(struct sockaddr_un, sun_path))
87 hapd->ctrl_dst = dst->next;
89 prev->next = dst->next;
91 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached",
92 (u8 *) from->sun_path,
94 offsetof(struct sockaddr_un, sun_path));
104 static int hostapd_ctrl_iface_level(struct hostapd_data *hapd,
105 struct sockaddr_un *from,
109 struct wpa_ctrl_dst *dst;
111 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
113 dst = hapd->ctrl_dst;
115 if (fromlen == dst->addrlen &&
116 os_memcmp(from->sun_path, dst->addr.sun_path,
117 fromlen - offsetof(struct sockaddr_un, sun_path))
119 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor "
120 "level", (u8 *) from->sun_path, fromlen -
121 offsetof(struct sockaddr_un, sun_path));
122 dst->debug_level = atoi(level);
132 static int hostapd_ctrl_iface_new_sta(struct hostapd_data *hapd,
136 struct sta_info *sta;
138 wpa_printf(MSG_DEBUG, "CTRL_IFACE NEW_STA %s", txtaddr);
140 if (hwaddr_aton(txtaddr, addr))
143 sta = ap_get_sta(hapd, addr);
147 wpa_printf(MSG_DEBUG, "Add new STA " MACSTR " based on ctrl_iface "
148 "notification", MAC2STR(addr));
149 sta = ap_sta_add(hapd, addr);
153 hostapd_new_assoc_sta(hapd, sta, 0);
158 static int hostapd_ctrl_iface_deauthenticate(struct hostapd_data *hapd,
162 struct sta_info *sta;
165 wpa_printf(MSG_DEBUG, "CTRL_IFACE DEAUTHENTICATE %s", txtaddr);
167 if (hwaddr_aton(txtaddr, addr))
170 pos = os_strstr(txtaddr, " test=");
172 struct ieee80211_mgmt mgmt;
174 if (hapd->driver->send_frame == NULL)
178 os_memset(&mgmt, 0, sizeof(mgmt));
179 mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
180 WLAN_FC_STYPE_DEAUTH);
181 os_memcpy(mgmt.da, addr, ETH_ALEN);
182 os_memcpy(mgmt.sa, hapd->own_addr, ETH_ALEN);
183 os_memcpy(mgmt.bssid, hapd->own_addr, ETH_ALEN);
184 mgmt.u.deauth.reason_code =
185 host_to_le16(WLAN_REASON_PREV_AUTH_NOT_VALID);
186 if (hapd->driver->send_frame(hapd->drv_priv, (u8 *) &mgmt,
188 sizeof(mgmt.u.deauth),
194 hapd->drv.sta_deauth(hapd, addr, WLAN_REASON_PREV_AUTH_NOT_VALID);
195 sta = ap_get_sta(hapd, addr);
197 ap_sta_deauthenticate(hapd, sta,
198 WLAN_REASON_PREV_AUTH_NOT_VALID);
204 static int hostapd_ctrl_iface_disassociate(struct hostapd_data *hapd,
208 struct sta_info *sta;
211 wpa_printf(MSG_DEBUG, "CTRL_IFACE DISASSOCIATE %s", txtaddr);
213 if (hwaddr_aton(txtaddr, addr))
216 pos = os_strstr(txtaddr, " test=");
218 struct ieee80211_mgmt mgmt;
220 if (hapd->driver->send_frame == NULL)
224 os_memset(&mgmt, 0, sizeof(mgmt));
225 mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
226 WLAN_FC_STYPE_DISASSOC);
227 os_memcpy(mgmt.da, addr, ETH_ALEN);
228 os_memcpy(mgmt.sa, hapd->own_addr, ETH_ALEN);
229 os_memcpy(mgmt.bssid, hapd->own_addr, ETH_ALEN);
230 mgmt.u.disassoc.reason_code =
231 host_to_le16(WLAN_REASON_PREV_AUTH_NOT_VALID);
232 if (hapd->driver->send_frame(hapd->drv_priv, (u8 *) &mgmt,
234 sizeof(mgmt.u.deauth),
240 hapd->drv.sta_disassoc(hapd, addr, WLAN_REASON_PREV_AUTH_NOT_VALID);
241 sta = ap_get_sta(hapd, addr);
243 ap_sta_disassociate(hapd, sta,
244 WLAN_REASON_PREV_AUTH_NOT_VALID);
250 #ifdef CONFIG_IEEE80211W
252 static int hostapd_ctrl_iface_sa_query(struct hostapd_data *hapd,
256 u8 trans_id[WLAN_SA_QUERY_TR_ID_LEN];
258 wpa_printf(MSG_DEBUG, "CTRL_IFACE SA_QUERY %s", txtaddr);
260 if (hwaddr_aton(txtaddr, addr) ||
261 os_get_random(trans_id, WLAN_SA_QUERY_TR_ID_LEN) < 0)
264 ieee802_11_send_sa_query_req(hapd, addr, trans_id);
268 #endif /* NEED_AP_MLME */
269 #endif /* CONFIG_IEEE80211W */
273 static int hostapd_ctrl_iface_wps_pin(struct hostapd_data *hapd, char *txt)
275 char *pin = os_strchr(txt, ' ');
278 u8 addr_buf[ETH_ALEN], *addr = NULL;
285 timeout_txt = os_strchr(pin, ' ');
287 *timeout_txt++ = '\0';
288 timeout = atoi(timeout_txt);
289 pos = os_strchr(timeout_txt, ' ');
292 if (hwaddr_aton(pos, addr_buf) == 0)
298 return hostapd_wps_add_pin(hapd, addr, txt, pin, timeout);
302 #ifdef CONFIG_WPS_OOB
303 static int hostapd_ctrl_iface_wps_oob(struct hostapd_data *hapd, char *txt)
305 char *path, *method, *name;
307 path = os_strchr(txt, ' ');
312 method = os_strchr(path, ' ');
317 name = os_strchr(method, ' ');
321 return hostapd_wps_start_oob(hapd, txt, path, method, name);
323 #endif /* CONFIG_WPS_OOB */
326 static int hostapd_ctrl_iface_wps_ap_pin(struct hostapd_data *hapd, char *txt,
327 char *buf, size_t buflen)
333 pos = os_strchr(txt, ' ');
337 if (os_strcmp(txt, "disable") == 0) {
338 hostapd_wps_ap_pin_disable(hapd);
339 return os_snprintf(buf, buflen, "OK\n");
342 if (os_strcmp(txt, "random") == 0) {
345 pin_txt = hostapd_wps_ap_pin_random(hapd, timeout);
348 return os_snprintf(buf, buflen, "%s", pin_txt);
351 if (os_strcmp(txt, "get") == 0) {
352 pin_txt = hostapd_wps_ap_pin_get(hapd);
355 return os_snprintf(buf, buflen, "%s", pin_txt);
358 if (os_strcmp(txt, "set") == 0) {
363 pos = os_strchr(pos, ' ');
368 if (os_strlen(pin) > buflen)
370 if (hostapd_wps_ap_pin_set(hapd, pin, timeout) < 0)
372 return os_snprintf(buf, buflen, "%s", pin);
377 #endif /* CONFIG_WPS */
380 static void hostapd_ctrl_iface_receive(int sock, void *eloop_ctx,
383 struct hostapd_data *hapd = eloop_ctx;
386 struct sockaddr_un from;
387 socklen_t fromlen = sizeof(from);
389 const int reply_size = 4096;
392 res = recvfrom(sock, buf, sizeof(buf) - 1, 0,
393 (struct sockaddr *) &from, &fromlen);
395 perror("recvfrom(ctrl_iface)");
399 wpa_hexdump_ascii(MSG_DEBUG, "RX ctrl_iface", (u8 *) buf, res);
401 reply = os_malloc(reply_size);
403 sendto(sock, "FAIL\n", 5, 0, (struct sockaddr *) &from,
408 os_memcpy(reply, "OK\n", 3);
411 if (os_strcmp(buf, "PING") == 0) {
412 os_memcpy(reply, "PONG\n", 5);
414 } else if (os_strcmp(buf, "MIB") == 0) {
415 reply_len = ieee802_11_get_mib(hapd, reply, reply_size);
416 if (reply_len >= 0) {
417 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len,
418 reply_size - reply_len);
424 if (reply_len >= 0) {
425 res = ieee802_1x_get_mib(hapd, reply + reply_len,
426 reply_size - reply_len);
432 #ifndef CONFIG_NO_RADIUS
433 if (reply_len >= 0) {
434 res = radius_client_get_mib(hapd->radius,
436 reply_size - reply_len);
442 #endif /* CONFIG_NO_RADIUS */
443 } else if (os_strcmp(buf, "STA-FIRST") == 0) {
444 reply_len = hostapd_ctrl_iface_sta_first(hapd, reply,
446 } else if (os_strncmp(buf, "STA ", 4) == 0) {
447 reply_len = hostapd_ctrl_iface_sta(hapd, buf + 4, reply,
449 } else if (os_strncmp(buf, "STA-NEXT ", 9) == 0) {
450 reply_len = hostapd_ctrl_iface_sta_next(hapd, buf + 9, reply,
452 } else if (os_strcmp(buf, "ATTACH") == 0) {
453 if (hostapd_ctrl_iface_attach(hapd, &from, fromlen))
455 } else if (os_strcmp(buf, "DETACH") == 0) {
456 if (hostapd_ctrl_iface_detach(hapd, &from, fromlen))
458 } else if (os_strncmp(buf, "LEVEL ", 6) == 0) {
459 if (hostapd_ctrl_iface_level(hapd, &from, fromlen,
462 } else if (os_strncmp(buf, "NEW_STA ", 8) == 0) {
463 if (hostapd_ctrl_iface_new_sta(hapd, buf + 8))
465 } else if (os_strncmp(buf, "DEAUTHENTICATE ", 15) == 0) {
466 if (hostapd_ctrl_iface_deauthenticate(hapd, buf + 15))
468 } else if (os_strncmp(buf, "DISASSOCIATE ", 13) == 0) {
469 if (hostapd_ctrl_iface_disassociate(hapd, buf + 13))
471 #ifdef CONFIG_IEEE80211W
473 } else if (os_strncmp(buf, "SA_QUERY ", 9) == 0) {
474 if (hostapd_ctrl_iface_sa_query(hapd, buf + 9))
476 #endif /* NEED_AP_MLME */
477 #endif /* CONFIG_IEEE80211W */
479 } else if (os_strncmp(buf, "WPS_PIN ", 8) == 0) {
480 if (hostapd_ctrl_iface_wps_pin(hapd, buf + 8))
482 } else if (os_strcmp(buf, "WPS_PBC") == 0) {
483 if (hostapd_wps_button_pushed(hapd))
485 #ifdef CONFIG_WPS_OOB
486 } else if (os_strncmp(buf, "WPS_OOB ", 8) == 0) {
487 if (hostapd_ctrl_iface_wps_oob(hapd, buf + 8))
489 #endif /* CONFIG_WPS_OOB */
490 } else if (os_strncmp(buf, "WPS_AP_PIN ", 11) == 0) {
491 reply_len = hostapd_ctrl_iface_wps_ap_pin(hapd, buf + 11,
493 #endif /* CONFIG_WPS */
495 os_memcpy(reply, "UNKNOWN COMMAND\n", 16);
500 os_memcpy(reply, "FAIL\n", 5);
503 sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from, fromlen);
508 static char * hostapd_ctrl_iface_path(struct hostapd_data *hapd)
513 if (hapd->conf->ctrl_interface == NULL)
516 len = os_strlen(hapd->conf->ctrl_interface) +
517 os_strlen(hapd->conf->iface) + 2;
518 buf = os_malloc(len);
522 os_snprintf(buf, len, "%s/%s",
523 hapd->conf->ctrl_interface, hapd->conf->iface);
529 static void hostapd_ctrl_iface_msg_cb(void *ctx, int level,
530 const char *txt, size_t len)
532 struct hostapd_data *hapd = ctx;
535 hostapd_ctrl_iface_send(hapd, level, txt, len);
539 int hostapd_ctrl_iface_init(struct hostapd_data *hapd)
541 struct sockaddr_un addr;
545 hapd->ctrl_sock = -1;
547 if (hapd->conf->ctrl_interface == NULL)
550 if (mkdir(hapd->conf->ctrl_interface, S_IRWXU | S_IRWXG) < 0) {
551 if (errno == EEXIST) {
552 wpa_printf(MSG_DEBUG, "Using existing control "
553 "interface directory.");
555 perror("mkdir[ctrl_interface]");
560 if (hapd->conf->ctrl_interface_gid_set &&
561 chown(hapd->conf->ctrl_interface, 0,
562 hapd->conf->ctrl_interface_gid) < 0) {
563 perror("chown[ctrl_interface]");
567 if (os_strlen(hapd->conf->ctrl_interface) + 1 +
568 os_strlen(hapd->conf->iface) >= sizeof(addr.sun_path))
571 s = socket(PF_UNIX, SOCK_DGRAM, 0);
573 perror("socket(PF_UNIX)");
577 os_memset(&addr, 0, sizeof(addr));
579 addr.sun_len = sizeof(addr);
580 #endif /* __FreeBSD__ */
581 addr.sun_family = AF_UNIX;
582 fname = hostapd_ctrl_iface_path(hapd);
585 os_strlcpy(addr.sun_path, fname, sizeof(addr.sun_path));
586 if (bind(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
587 wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s",
589 if (connect(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
590 wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not"
591 " allow connections - assuming it was left"
592 "over from forced program termination");
593 if (unlink(fname) < 0) {
594 perror("unlink[ctrl_iface]");
595 wpa_printf(MSG_ERROR, "Could not unlink "
596 "existing ctrl_iface socket '%s'",
600 if (bind(s, (struct sockaddr *) &addr, sizeof(addr)) <
602 perror("bind(PF_UNIX)");
605 wpa_printf(MSG_DEBUG, "Successfully replaced leftover "
606 "ctrl_iface socket '%s'", fname);
608 wpa_printf(MSG_INFO, "ctrl_iface exists and seems to "
609 "be in use - cannot override it");
610 wpa_printf(MSG_INFO, "Delete '%s' manually if it is "
611 "not used anymore", fname);
618 if (hapd->conf->ctrl_interface_gid_set &&
619 chown(fname, 0, hapd->conf->ctrl_interface_gid) < 0) {
620 perror("chown[ctrl_interface/ifname]");
624 if (chmod(fname, S_IRWXU | S_IRWXG) < 0) {
625 perror("chmod[ctrl_interface/ifname]");
631 eloop_register_read_sock(s, hostapd_ctrl_iface_receive, hapd,
633 hapd->msg_ctx = hapd;
634 wpa_msg_register_cb(hostapd_ctrl_iface_msg_cb);
649 void hostapd_ctrl_iface_deinit(struct hostapd_data *hapd)
651 struct wpa_ctrl_dst *dst, *prev;
653 if (hapd->ctrl_sock > -1) {
655 eloop_unregister_read_sock(hapd->ctrl_sock);
656 close(hapd->ctrl_sock);
657 hapd->ctrl_sock = -1;
658 fname = hostapd_ctrl_iface_path(hapd);
663 if (hapd->conf->ctrl_interface &&
664 rmdir(hapd->conf->ctrl_interface) < 0) {
665 if (errno == ENOTEMPTY) {
666 wpa_printf(MSG_DEBUG, "Control interface "
667 "directory not empty - leaving it "
670 perror("rmdir[ctrl_interface]");
675 dst = hapd->ctrl_dst;
684 static void hostapd_ctrl_iface_send(struct hostapd_data *hapd, int level,
685 const char *buf, size_t len)
687 struct wpa_ctrl_dst *dst, *next;
693 dst = hapd->ctrl_dst;
694 if (hapd->ctrl_sock < 0 || dst == NULL)
697 os_snprintf(levelstr, sizeof(levelstr), "<%d>", level);
698 io[0].iov_base = levelstr;
699 io[0].iov_len = os_strlen(levelstr);
700 io[1].iov_base = (char *) buf;
702 os_memset(&msg, 0, sizeof(msg));
709 if (level >= dst->debug_level) {
710 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor send",
711 (u8 *) dst->addr.sun_path, dst->addrlen -
712 offsetof(struct sockaddr_un, sun_path));
713 msg.msg_name = &dst->addr;
714 msg.msg_namelen = dst->addrlen;
715 if (sendmsg(hapd->ctrl_sock, &msg, 0) < 0) {
717 wpa_printf(MSG_INFO, "CTRL_IFACE monitor[%d]: "
719 idx, errno, strerror(errno));
721 if (dst->errors > 10 || _errno == ENOENT) {
722 hostapd_ctrl_iface_detach(
734 #endif /* CONFIG_NATIVE_WINDOWS */