19a1aca0e5b5ad1705a1b9ef3969c8882df0cf8c
[libeap.git] / wpa_supplicant / ap.c
1 /*
2  * WPA Supplicant - Basic AP mode support routines
3  * Copyright (c) 2003-2009, Jouni Malinen <j@w1.fi>
4  * Copyright (c) 2009, Atheros Communications
5  *
6  * This program is free software; you can redistribute it and/or modify
7  * it under the terms of the GNU General Public License version 2 as
8  * published by the Free Software Foundation.
9  *
10  * Alternatively, this software may be distributed under the terms of BSD
11  * license.
12  *
13  * See README and COPYING for more details.
14  */
15
16 #include "includes.h"
17
18 #include "common.h"
19 #include "ap/hostapd.h"
20 #include "ap/config.h"
21 #ifdef NEED_AP_MLME
22 #include "ap/ieee802_11.h"
23 #endif /* NEED_AP_MLME */
24 #include "ap/wps_hostapd.h"
25 #include "../hostapd/ctrl_iface_ap.h"
26 #include "eap_common/eap_defs.h"
27 #include "eap_server/eap_methods.h"
28 #include "eap_common/eap_wsc_common.h"
29 #include "wps/wps.h"
30 #include "config_ssid.h"
31 #include "config.h"
32 #include "wpa_supplicant_i.h"
33 #include "driver_i.h"
34 #include "ap.h"
35
36
37 struct hapd_interfaces {
38         size_t count;
39         struct hostapd_iface **iface;
40 };
41
42
43 int hostapd_for_each_interface(struct hapd_interfaces *interfaces,
44                                int (*cb)(struct hostapd_iface *iface,
45                                          void *ctx), void *ctx)
46 {
47         /* TODO */
48         return 0;
49 }
50
51
52 int hostapd_ctrl_iface_init(struct hostapd_data *hapd)
53 {
54         return 0;
55 }
56
57
58 void hostapd_ctrl_iface_deinit(struct hostapd_data *hapd)
59 {
60 }
61
62
63 struct ap_driver_data {
64         struct hostapd_data *hapd;
65 };
66
67
68 static void * ap_driver_init(struct hostapd_data *hapd,
69                              struct wpa_init_params *params)
70 {
71         struct ap_driver_data *drv;
72         struct wpa_supplicant *wpa_s = hapd->iface->owner;
73
74         drv = os_zalloc(sizeof(struct ap_driver_data));
75         if (drv == NULL) {
76                 wpa_printf(MSG_ERROR, "Could not allocate memory for AP "
77                            "driver data");
78                 return NULL;
79         }
80         drv->hapd = hapd;
81         os_memcpy(hapd->own_addr, wpa_s->own_addr, ETH_ALEN);
82
83         return drv;
84 }
85
86
87 static void ap_driver_deinit(void *priv)
88 {
89         struct ap_driver_data *drv = priv;
90
91         os_free(drv);
92 }
93
94
95 static int ap_driver_send_ether(void *priv, const u8 *dst, const u8 *src,
96                                 u16 proto, const u8 *data, size_t data_len)
97 {
98         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
99         return -1;
100 }
101
102
103 static int ap_driver_set_key(const char *iface, void *priv, wpa_alg alg,
104                              const u8 *addr, int key_idx, int set_tx,
105                              const u8 *seq, size_t seq_len, const u8 *key,
106                              size_t key_len)
107 {
108         struct ap_driver_data *drv = priv;
109         struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
110         return wpa_drv_set_key(wpa_s, alg, addr, key_idx, set_tx, seq, seq_len,
111                                key, key_len);
112 }
113
114
115 static int ap_driver_get_seqnum(const char *iface, void *priv, const u8 *addr,
116                                 int idx, u8 *seq)
117 {
118         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
119         return -1;
120 }
121
122
123 static int ap_driver_flush(void *priv)
124 {
125         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
126         return -1;
127 }
128
129
130 static int ap_driver_read_sta_data(void *priv,
131                                    struct hostap_sta_driver_data *data,
132                                    const u8 *addr)
133 {
134         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
135         return -1;
136 }
137
138
139 static int ap_driver_sta_set_flags(void *priv, const u8 *addr, int total_flags,
140                                    int flags_or, int flags_and)
141 {
142         struct ap_driver_data *drv = priv;
143         struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
144         return wpa_drv_sta_set_flags(wpa_s, addr, total_flags, flags_or,
145                                      flags_and);
146 }
147
148
149 static int ap_driver_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr,
150                                 int reason)
151 {
152         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
153         return -1;
154 }
155
156
157 static int ap_driver_sta_disassoc(void *priv, const u8 *own_addr,
158                                   const u8 *addr, int reason)
159 {
160         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
161         return -1;
162 }
163
164
165 static int ap_driver_sta_remove(void *priv, const u8 *addr)
166 {
167         struct ap_driver_data *drv = priv;
168         struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
169         return wpa_drv_sta_remove(wpa_s, addr);
170 }
171
172
173 static int ap_driver_send_mlme(void *priv, const u8 *data, size_t len)
174 {
175         struct ap_driver_data *drv = priv;
176         struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
177         return wpa_drv_send_mlme(wpa_s, data, len);
178 }
179
180
181 static int ap_driver_sta_add(const char *ifname, void *priv,
182                              struct hostapd_sta_add_params *params)
183 {
184         struct ap_driver_data *drv = priv;
185         struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
186         return wpa_drv_sta_add(wpa_s, params);
187 }
188
189
190 static int ap_driver_get_inact_sec(void *priv, const u8 *addr)
191 {
192         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
193         return -1;
194 }
195
196
197 static int ap_driver_set_freq(void *priv, struct hostapd_freq_params *freq)
198 {
199         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
200         return 0;
201 }
202
203
204 static int ap_driver_set_beacon(const char *iface, void *priv,
205                                 const u8 *head, size_t head_len,
206                                 const u8 *tail, size_t tail_len,
207                                 int dtim_period, int beacon_int)
208 {
209         struct ap_driver_data *drv = priv;
210         struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
211         return wpa_drv_set_beacon(wpa_s, head, head_len, tail, tail_len,
212                                   dtim_period, beacon_int);
213 }
214
215
216 static int ap_driver_set_cts_protect(void *priv, int value)
217 {
218         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
219         return -1;
220 }
221
222
223 static int ap_driver_set_preamble(void *priv, int value)
224 {
225         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
226         return -1;
227 }
228
229
230 static int ap_driver_set_short_slot_time(void *priv, int value)
231 {
232         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
233         return -1;
234 }
235
236
237 static int ap_driver_set_tx_queue_params(void *priv, int queue, int aifs,
238                                          int cw_min, int cw_max,
239                                          int burst_time)
240 {
241         wpa_printf(MSG_DEBUG, "AP TODO: %s", __func__);
242         return -1;
243 }
244
245
246 static struct hostapd_hw_modes *ap_driver_get_hw_feature_data(void *priv,
247                                                               u16 *num_modes,
248                                                               u16 *flags)
249 {
250         struct ap_driver_data *drv = priv;
251         struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
252         return wpa_drv_get_hw_feature_data(wpa_s, num_modes, flags);
253 }
254
255
256 static int ap_driver_hapd_send_eapol(void *priv, const u8 *addr,
257                                      const u8 *data, size_t data_len,
258                                      int encrypt, const u8 *own_addr)
259 {
260         struct ap_driver_data *drv = priv;
261         struct wpa_supplicant *wpa_s = drv->hapd->iface->owner;
262         return wpa_drv_hapd_send_eapol(wpa_s, addr, data, data_len, encrypt,
263                                        own_addr);
264 }
265
266
267 struct wpa_driver_ops ap_driver_ops =
268 {
269         .name = "wpa_supplicant",
270         .hapd_init = ap_driver_init,
271         .hapd_deinit = ap_driver_deinit,
272         .send_ether = ap_driver_send_ether,
273         .set_key = ap_driver_set_key,
274         .get_seqnum = ap_driver_get_seqnum,
275         .flush = ap_driver_flush,
276         .read_sta_data = ap_driver_read_sta_data,
277         .sta_set_flags = ap_driver_sta_set_flags,
278         .sta_deauth = ap_driver_sta_deauth,
279         .sta_disassoc = ap_driver_sta_disassoc,
280         .sta_remove = ap_driver_sta_remove,
281         .send_mlme = ap_driver_send_mlme,
282         .sta_add = ap_driver_sta_add,
283         .get_inact_sec = ap_driver_get_inact_sec,
284         .set_freq = ap_driver_set_freq,
285         .set_beacon = ap_driver_set_beacon,
286         .set_cts_protect = ap_driver_set_cts_protect,
287         .set_preamble = ap_driver_set_preamble,
288         .set_short_slot_time = ap_driver_set_short_slot_time,
289         .set_tx_queue_params = ap_driver_set_tx_queue_params,
290         .get_hw_feature_data = ap_driver_get_hw_feature_data,
291         .hapd_send_eapol = ap_driver_hapd_send_eapol,
292 };
293
294
295 extern struct wpa_driver_ops *wpa_drivers[];
296
297 static int wpa_supplicant_conf_ap(struct wpa_supplicant *wpa_s,
298                                   struct wpa_ssid *ssid,
299                                   struct hostapd_config *conf)
300 {
301         struct hostapd_bss_config *bss = &conf->bss[0];
302         int j, pairwise;
303
304         for (j = 0; wpa_drivers[j]; j++) {
305                 if (os_strcmp("wpa_supplicant", wpa_drivers[j]->name) == 0) {
306                         conf->driver = wpa_drivers[j];
307                         break;
308                 }
309         }
310         if (conf->driver == NULL) {
311                 wpa_printf(MSG_ERROR, "No AP driver ops found");
312                 return -1;
313         }
314
315         os_strlcpy(bss->iface, wpa_s->ifname, sizeof(bss->iface));
316
317         if (ssid->frequency == 0) {
318                 /* default channel 11 */
319                 conf->hw_mode = HOSTAPD_MODE_IEEE80211G;
320                 conf->channel = 11;
321         } else if (ssid->frequency >= 2412 && ssid->frequency <= 2472) {
322                 conf->hw_mode = HOSTAPD_MODE_IEEE80211G;
323                 conf->channel = (ssid->frequency - 2407) / 5;
324         } else if ((ssid->frequency >= 5180 && ssid->frequency <= 5240) ||
325                    (ssid->frequency >= 5745 && ssid->frequency <= 5825)) {
326                 conf->hw_mode = HOSTAPD_MODE_IEEE80211A;
327                 conf->channel = (ssid->frequency - 5000) / 5;
328         } else {
329                 wpa_printf(MSG_ERROR, "Unsupported AP mode frequency: %d MHz",
330                            ssid->frequency);
331                 return -1;
332         }
333
334         /* TODO: enable HT if driver supports it;
335          * drop to 11b if driver does not support 11g */
336
337         if (ssid->ssid_len == 0) {
338                 wpa_printf(MSG_ERROR, "No SSID configured for AP mode");
339                 return -1;
340         }
341         os_memcpy(bss->ssid.ssid, ssid->ssid, ssid->ssid_len);
342         bss->ssid.ssid[ssid->ssid_len] = '\0';
343         bss->ssid.ssid_len = ssid->ssid_len;
344         bss->ssid.ssid_set = 1;
345
346         if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt))
347                 bss->wpa = ssid->proto;
348         bss->wpa_key_mgmt = ssid->key_mgmt;
349         bss->wpa_pairwise = ssid->pairwise_cipher;
350         if (ssid->passphrase) {
351                 bss->ssid.wpa_passphrase = os_strdup(ssid->passphrase);
352         } else if (ssid->psk_set) {
353                 os_free(bss->ssid.wpa_psk);
354                 bss->ssid.wpa_psk = os_zalloc(sizeof(struct hostapd_wpa_psk));
355                 if (bss->ssid.wpa_psk == NULL)
356                         return -1;
357                 os_memcpy(bss->ssid.wpa_psk->psk, ssid->psk, PMK_LEN);
358                 bss->ssid.wpa_psk->group = 1;
359         }
360
361         /* Select group cipher based on the enabled pairwise cipher suites */
362         pairwise = 0;
363         if (bss->wpa & 1)
364                 pairwise |= bss->wpa_pairwise;
365         if (bss->wpa & 2) {
366                 if (bss->rsn_pairwise == 0)
367                         bss->rsn_pairwise = bss->wpa_pairwise;
368                 pairwise |= bss->rsn_pairwise;
369         }
370         if (pairwise & WPA_CIPHER_TKIP)
371                 bss->wpa_group = WPA_CIPHER_TKIP;
372         else
373                 bss->wpa_group = WPA_CIPHER_CCMP;
374
375         if (bss->wpa && bss->ieee802_1x)
376                 bss->ssid.security_policy = SECURITY_WPA;
377         else if (bss->wpa)
378                 bss->ssid.security_policy = SECURITY_WPA_PSK;
379         else if (bss->ieee802_1x) {
380                 bss->ssid.security_policy = SECURITY_IEEE_802_1X;
381                 bss->ssid.wep.default_len = bss->default_wep_key_len;
382         } else if (bss->ssid.wep.keys_set)
383                 bss->ssid.security_policy = SECURITY_STATIC_WEP;
384         else
385                 bss->ssid.security_policy = SECURITY_PLAINTEXT;
386
387 #ifdef CONFIG_WPS
388         /*
389          * Enable WPS by default, but require user interaction to actually use
390          * it. Only the internal Registrar is supported.
391          */
392         bss->eap_server = 1;
393         bss->wps_state = 2;
394         bss->ap_setup_locked = 1;
395         if (wpa_s->conf->config_methods)
396                 bss->config_methods = os_strdup(wpa_s->conf->config_methods);
397         if (wpa_s->conf->device_type)
398                 bss->device_type = os_strdup(wpa_s->conf->device_type);
399 #endif /* CONFIG_WPS */
400
401         return 0;
402 }
403
404
405 int wpa_supplicant_create_ap(struct wpa_supplicant *wpa_s,
406                              struct wpa_ssid *ssid)
407 {
408         struct wpa_driver_associate_params params;
409         struct hostapd_iface *hapd_iface;
410         struct hostapd_config *conf;
411         size_t i;
412
413         if (ssid->ssid == NULL || ssid->ssid_len == 0) {
414                 wpa_printf(MSG_ERROR, "No SSID configured for AP mode");
415                 return -1;
416         }
417
418         wpa_supplicant_ap_deinit(wpa_s);
419
420         wpa_printf(MSG_DEBUG, "Setting up AP (SSID='%s')",
421                    wpa_ssid_txt(ssid->ssid, ssid->ssid_len));
422
423         os_memset(&params, 0, sizeof(params));
424         params.ssid = ssid->ssid;
425         params.ssid_len = ssid->ssid_len;
426         params.mode = ssid->mode;
427         params.freq = ssid->frequency;
428
429         if (wpa_drv_associate(wpa_s, &params) < 0) {
430                 wpa_msg(wpa_s, MSG_INFO, "Failed to start AP functionality");
431                 return -1;
432         }
433
434         wpa_s->ap_iface = hapd_iface = os_zalloc(sizeof(*wpa_s->ap_iface));
435         if (hapd_iface == NULL)
436                 return -1;
437         hapd_iface->owner = wpa_s;
438
439         wpa_s->ap_iface->conf = conf = hostapd_config_defaults();
440         if (conf == NULL) {
441                 wpa_supplicant_ap_deinit(wpa_s);
442                 return -1;
443         }
444
445         if (wpa_supplicant_conf_ap(wpa_s, ssid, conf)) {
446                 wpa_printf(MSG_ERROR, "Failed to create AP configuration");
447                 wpa_supplicant_ap_deinit(wpa_s);
448                 return -1;
449         }
450
451         hapd_iface->num_bss = conf->num_bss;
452         hapd_iface->bss = os_zalloc(conf->num_bss *
453                                     sizeof(struct hostapd_data *));
454         if (hapd_iface->bss == NULL) {
455                 wpa_supplicant_ap_deinit(wpa_s);
456                 return -1;
457         }
458
459         for (i = 0; i < conf->num_bss; i++) {
460                 hapd_iface->bss[i] =
461                         hostapd_alloc_bss_data(hapd_iface, conf,
462                                                &conf->bss[i]);
463                 if (hapd_iface->bss[i] == NULL) {
464                         wpa_supplicant_ap_deinit(wpa_s);
465                         return -1;
466                 }
467
468                 hapd_iface->bss[i]->msg_ctx = wpa_s;
469         }
470
471         if (hostapd_setup_interface(wpa_s->ap_iface)) {
472                 wpa_printf(MSG_ERROR, "Failed to initialize AP interface");
473                 wpa_supplicant_ap_deinit(wpa_s);
474                 return -1;
475         }
476
477         wpa_s->current_ssid = ssid;
478         os_memcpy(wpa_s->bssid, wpa_s->own_addr, ETH_ALEN);
479         wpa_supplicant_set_state(wpa_s, WPA_COMPLETED);
480
481         return 0;
482 }
483
484
485 void wpa_supplicant_ap_deinit(struct wpa_supplicant *wpa_s)
486 {
487         if (wpa_s->ap_iface == NULL)
488                 return;
489
490         hostapd_interface_deinit(wpa_s->ap_iface);
491         wpa_s->ap_iface = NULL;
492 }
493
494
495 void ap_tx_status(void *ctx, const u8 *addr,
496                   const u8 *buf, size_t len, int ack)
497 {
498 #ifdef NEED_AP_MLME
499         struct wpa_supplicant *wpa_s = ctx;
500         hostapd_tx_status(wpa_s->ap_iface->bss[0], addr, buf, len, ack);
501 #endif /* NEED_AP_MLME */
502 }
503
504
505 void ap_rx_from_unknown_sta(void *ctx, const struct ieee80211_hdr *hdr,
506                             size_t len)
507 {
508 #ifdef NEED_AP_MLME
509         struct wpa_supplicant *wpa_s = ctx;
510         u16 fc = le_to_host16(hdr->frame_control);
511         ieee802_11_rx_from_unknown(wpa_s->ap_iface->bss[0], hdr->addr2,
512                                    (fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) ==
513                                    (WLAN_FC_TODS | WLAN_FC_FROMDS));
514 #endif /* NEED_AP_MLME */
515 }
516
517
518 void ap_mgmt_rx(void *ctx, const u8 *buf, size_t len,
519                 struct hostapd_frame_info *fi)
520 {
521 #ifdef NEED_AP_MLME
522         struct wpa_supplicant *wpa_s = ctx;
523         ieee802_11_mgmt(wpa_s->ap_iface->bss[0], buf, len, fi);
524 #endif /* NEED_AP_MLME */
525 }
526
527
528 void ap_mgmt_tx_cb(void *ctx, const u8 *buf, size_t len, u16 stype, int ok)
529 {
530 #ifdef NEED_AP_MLME
531         struct wpa_supplicant *wpa_s = ctx;
532         ieee802_11_mgmt_cb(wpa_s->ap_iface->bss[0], buf, len, stype, ok);
533 #endif /* NEED_AP_MLME */
534 }
535
536
537 void wpa_supplicant_ap_rx_eapol(struct wpa_supplicant *wpa_s,
538                                 const u8 *src_addr, const u8 *buf, size_t len)
539 {
540         hostapd_eapol_receive(wpa_s->ap_iface->bss[0], src_addr, buf, len);
541 }
542
543
544 #ifdef CONFIG_WPS
545
546 int wpa_supplicant_ap_wps_pbc(struct wpa_supplicant *wpa_s, const u8 *bssid)
547 {
548         return hostapd_wps_button_pushed(wpa_s->ap_iface->bss[0]);
549 }
550
551
552 int wpa_supplicant_ap_wps_pin(struct wpa_supplicant *wpa_s, const u8 *bssid,
553                               const char *pin, char *buf, size_t buflen)
554 {
555         int ret, ret_len = 0;
556
557         if (pin == NULL) {
558                 unsigned int rpin = wps_generate_pin();
559                 ret_len = os_snprintf(buf, buflen, "%d", rpin);
560                 pin = buf;
561         }
562
563         ret = hostapd_wps_add_pin(wpa_s->ap_iface->bss[0], "any", pin, 0);
564         if (ret)
565                 return -1;
566         return ret_len;
567 }
568
569 #endif /* CONFIG_WPS */
570
571
572 #ifdef CONFIG_CTRL_IFACE
573
574 int ap_ctrl_iface_sta_first(struct wpa_supplicant *wpa_s,
575                             char *buf, size_t buflen)
576 {
577         if (wpa_s->ap_iface == NULL)
578                 return -1;
579         return hostapd_ctrl_iface_sta_first(wpa_s->ap_iface->bss[0],
580                                             buf, buflen);
581 }
582
583
584 int ap_ctrl_iface_sta(struct wpa_supplicant *wpa_s, const char *txtaddr,
585                       char *buf, size_t buflen)
586 {
587         if (wpa_s->ap_iface == NULL)
588                 return -1;
589         return hostapd_ctrl_iface_sta(wpa_s->ap_iface->bss[0], txtaddr,
590                                       buf, buflen);
591 }
592
593
594 int ap_ctrl_iface_sta_next(struct wpa_supplicant *wpa_s, const char *txtaddr,
595                            char *buf, size_t buflen)
596 {
597         if (wpa_s->ap_iface == NULL)
598                 return -1;
599         return hostapd_ctrl_iface_sta_next(wpa_s->ap_iface->bss[0], txtaddr,
600                                            buf, buflen);
601 }
602
603
604 int ap_ctrl_iface_wpa_get_status(struct wpa_supplicant *wpa_s, char *buf,
605                                  size_t buflen, int verbose)
606 {
607         char *pos = buf, *end = buf + buflen;
608         int ret;
609         struct hostapd_bss_config *conf;
610
611         if (wpa_s->ap_iface == NULL)
612                 return -1;
613
614         conf = wpa_s->ap_iface->bss[0]->conf;
615         if (conf->wpa == 0)
616                 return 0;
617
618         ret = os_snprintf(pos, end - pos,
619                           "pairwise_cipher=%s\n"
620                           "group_cipher=%s\n"
621                           "key_mgmt=%s\n",
622                           wpa_cipher_txt(conf->rsn_pairwise),
623                           wpa_cipher_txt(conf->wpa_group),
624                           wpa_key_mgmt_txt(conf->wpa_key_mgmt,
625                                            conf->wpa));
626         if (ret < 0 || ret >= end - pos)
627                 return pos - buf;
628         pos += ret;
629         return pos - buf;
630 }
631
632 #endif /* CONFIG_CTRL_IFACE */