mesh: Enable mesh HT mode
[mech_eap.git] / wpa_supplicant / mesh.c
1 /*
2  * WPA Supplicant - Basic mesh mode routines
3  * Copyright (c) 2013-2014, cozybit, Inc.  All rights reserved.
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8
9 #include "utils/includes.h"
10
11 #include "utils/common.h"
12 #include "utils/eloop.h"
13 #include "utils/uuid.h"
14 #include "common/ieee802_11_defs.h"
15 #include "common/wpa_ctrl.h"
16 #include "ap/sta_info.h"
17 #include "ap/hostapd.h"
18 #include "ap/ieee802_11.h"
19 #include "config_ssid.h"
20 #include "config.h"
21 #include "wpa_supplicant_i.h"
22 #include "driver_i.h"
23 #include "notify.h"
24 #include "ap.h"
25 #include "mesh_mpm.h"
26 #include "mesh_rsn.h"
27 #include "mesh.h"
28
29
30 static void wpa_supplicant_mesh_deinit(struct wpa_supplicant *wpa_s)
31 {
32         wpa_supplicant_mesh_iface_deinit(wpa_s, wpa_s->ifmsh);
33         wpa_s->ifmsh = NULL;
34         wpa_s->current_ssid = NULL;
35         os_free(wpa_s->mesh_rsn);
36         wpa_s->mesh_rsn = NULL;
37         /* TODO: leave mesh (stop beacon). This will happen on link down
38          * anyway, so it's not urgent */
39 }
40
41
42 void wpa_supplicant_mesh_iface_deinit(struct wpa_supplicant *wpa_s,
43                                       struct hostapd_iface *ifmsh)
44 {
45         if (!ifmsh)
46                 return;
47
48         if (ifmsh->mconf) {
49                 mesh_mpm_deinit(wpa_s, ifmsh);
50                 if (ifmsh->mconf->ies) {
51                         ifmsh->mconf->ies = NULL;
52                         /* We cannot free this struct
53                          * because wpa_authenticator on
54                          * hostapd side is also using it
55                          * for now just set to NULL and
56                          * let hostapd code free it.
57                          */
58                 }
59                 os_free(ifmsh->mconf);
60                 ifmsh->mconf = NULL;
61         }
62
63         /* take care of shared data */
64         hostapd_interface_deinit(ifmsh);
65         hostapd_interface_free(ifmsh);
66 }
67
68
69 static struct mesh_conf * mesh_config_create(struct wpa_ssid *ssid)
70 {
71         struct mesh_conf *conf;
72
73         conf = os_zalloc(sizeof(struct mesh_conf));
74         if (!conf)
75                 return NULL;
76
77         os_memcpy(conf->meshid, ssid->ssid, ssid->ssid_len);
78         conf->meshid_len = ssid->ssid_len;
79
80         if (ssid->key_mgmt & WPA_KEY_MGMT_SAE)
81                 conf->security |= MESH_CONF_SEC_AUTH |
82                         MESH_CONF_SEC_AMPE;
83         else
84                 conf->security |= MESH_CONF_SEC_NONE;
85
86         /* defaults */
87         conf->mesh_pp_id = MESH_PATH_PROTOCOL_HWMP;
88         conf->mesh_pm_id = MESH_PATH_METRIC_AIRTIME;
89         conf->mesh_cc_id = 0;
90         conf->mesh_sp_id = MESH_SYNC_METHOD_NEIGHBOR_OFFSET;
91         conf->mesh_auth_id = (conf->security & MESH_CONF_SEC_AUTH) ? 1 : 0;
92
93         return conf;
94 }
95
96
97 static void wpas_mesh_copy_groups(struct hostapd_data *bss,
98                                   struct wpa_supplicant *wpa_s)
99 {
100         int num_groups;
101         size_t groups_size;
102
103         for (num_groups = 0; wpa_s->conf->sae_groups[num_groups] > 0;
104              num_groups++)
105                 ;
106
107         groups_size = (num_groups + 1) * sizeof(wpa_s->conf->sae_groups[0]);
108         bss->conf->sae_groups = os_malloc(groups_size);
109         if (bss->conf->sae_groups)
110                 os_memcpy(bss->conf->sae_groups, wpa_s->conf->sae_groups,
111                           groups_size);
112 }
113
114
115 static int wpa_supplicant_mesh_init(struct wpa_supplicant *wpa_s,
116                                     struct wpa_ssid *ssid)
117 {
118         struct hostapd_iface *ifmsh;
119         struct hostapd_data *bss;
120         struct hostapd_config *conf;
121         struct mesh_conf *mconf;
122         int basic_rates_erp[] = { 10, 20, 55, 60, 110, 120, 240, -1 };
123         static int default_groups[] = { 19, 20, 21, 25, 26, -1 };
124         size_t len;
125
126         if (!wpa_s->conf->user_mpm) {
127                 /* not much for us to do here */
128                 wpa_msg(wpa_s, MSG_WARNING,
129                         "user_mpm is not enabled in configuration");
130                 return 0;
131         }
132
133         wpa_s->ifmsh = ifmsh = os_zalloc(sizeof(*wpa_s->ifmsh));
134         if (!ifmsh)
135                 return -ENOMEM;
136
137         ifmsh->num_bss = 1;
138         ifmsh->bss = os_calloc(wpa_s->ifmsh->num_bss,
139                                sizeof(struct hostapd_data *));
140         if (!ifmsh->bss)
141                 goto out_free;
142
143         ifmsh->bss[0] = bss = os_zalloc(sizeof(struct hostapd_data));
144         if (!bss)
145                 goto out_free;
146
147         os_memcpy(bss->own_addr, wpa_s->own_addr, ETH_ALEN);
148         bss->driver = wpa_s->driver;
149         bss->drv_priv = wpa_s->drv_priv;
150         bss->iface = ifmsh;
151         bss->mesh_sta_free_cb = mesh_mpm_free_sta;
152         wpa_s->assoc_freq = ssid->frequency;
153         wpa_s->current_ssid = ssid;
154
155         /* setup an AP config for auth processing */
156         conf = hostapd_config_defaults();
157         if (!conf)
158                 goto out_free;
159
160         bss->conf = *conf->bss;
161         bss->conf->start_disabled = 1;
162         bss->conf->mesh = MESH_ENABLED;
163         bss->iconf = conf;
164         ifmsh->conf = conf;
165
166         ifmsh->bss[0]->max_plinks = 99;
167         os_strlcpy(bss->conf->iface, wpa_s->ifname, sizeof(bss->conf->iface));
168
169         mconf = mesh_config_create(ssid);
170         if (!mconf)
171                 goto out_free;
172         ifmsh->mconf = mconf;
173
174         /* need conf->hw_mode for supported rates. */
175         if (ssid->frequency == 0) {
176                 conf->hw_mode = HOSTAPD_MODE_IEEE80211G;
177                 conf->channel = 1;
178         } else {
179                 conf->hw_mode = ieee80211_freq_to_chan(ssid->frequency,
180                                                        &conf->channel);
181         }
182         if (conf->hw_mode == NUM_HOSTAPD_MODES) {
183                 wpa_printf(MSG_ERROR, "Unsupported mesh mode frequency: %d MHz",
184                            ssid->frequency);
185                 goto out_free;
186         }
187
188         /*
189          * XXX: Hack! This is so an MPM which correctly sets the ERP mandatory
190          * rates as BSSBasicRateSet doesn't reject us. We could add a new
191          * hw_mode HOSTAPD_MODE_IEEE80211G_ERP, but this is way easier. This
192          * also makes our BSSBasicRateSet advertised in Beacon frames match the
193          * one in peering frames, sigh.
194          */
195         if (conf->hw_mode == HOSTAPD_MODE_IEEE80211G) {
196                 conf->basic_rates = os_malloc(sizeof(basic_rates_erp));
197                 if (!conf->basic_rates)
198                         goto out_free;
199                 os_memcpy(conf->basic_rates, basic_rates_erp,
200                           sizeof(basic_rates_erp));
201         }
202
203         if (hostapd_setup_interface(ifmsh)) {
204                 wpa_printf(MSG_ERROR,
205                            "Failed to initialize hostapd interface for mesh");
206                 return -1;
207         }
208
209         if (wpa_drv_init_mesh(wpa_s)) {
210                 wpa_msg(wpa_s, MSG_ERROR, "Failed to init mesh in driver");
211                 return -1;
212         }
213
214         if (mconf->security != MESH_CONF_SEC_NONE) {
215                 if (ssid->passphrase == NULL) {
216                         wpa_printf(MSG_ERROR,
217                                    "mesh: Passphrase for SAE not configured");
218                         goto out_free;
219                 }
220
221                 bss->conf->wpa = ssid->proto;
222                 bss->conf->wpa_key_mgmt = ssid->key_mgmt;
223
224                 if (wpa_s->conf->sae_groups &&
225                     wpa_s->conf->sae_groups[0] > 0) {
226                         wpas_mesh_copy_groups(bss, wpa_s);
227                 } else {
228                         bss->conf->sae_groups =
229                                 os_malloc(sizeof(default_groups));
230                         if (!bss->conf->sae_groups)
231                                 goto out_free;
232                         os_memcpy(bss->conf->sae_groups, default_groups,
233                                   sizeof(default_groups));
234                 }
235
236                 len = os_strlen(ssid->passphrase);
237                 bss->conf->ssid.wpa_passphrase =
238                         dup_binstr(ssid->passphrase, len);
239
240                 wpa_s->mesh_rsn = mesh_rsn_auth_init(wpa_s, mconf);
241                 if (!wpa_s->mesh_rsn)
242                         goto out_free;
243         }
244
245         wpa_supplicant_conf_ap_ht(wpa_s, ssid, conf);
246
247         return 0;
248 out_free:
249         wpa_supplicant_mesh_deinit(wpa_s);
250         return -ENOMEM;
251 }
252
253
254 void wpa_mesh_notify_peer(struct wpa_supplicant *wpa_s, const u8 *addr,
255                           const u8 *ies, size_t ie_len)
256 {
257         struct ieee802_11_elems elems;
258
259         wpa_msg(wpa_s, MSG_INFO,
260                 "new peer notification for " MACSTR, MAC2STR(addr));
261
262         if (ieee802_11_parse_elems(ies, ie_len, &elems, 0) == ParseFailed) {
263                 wpa_msg(wpa_s, MSG_INFO, "Could not parse beacon from " MACSTR,
264                         MAC2STR(addr));
265                 return;
266         }
267         wpa_mesh_new_mesh_peer(wpa_s, addr, &elems);
268 }
269
270
271 void wpa_supplicant_mesh_add_scan_ie(struct wpa_supplicant *wpa_s,
272                                      struct wpabuf **extra_ie)
273 {
274         /* EID + 0-length (wildcard) mesh-id */
275         size_t ielen = 2;
276
277         if (wpabuf_resize(extra_ie, ielen) == 0) {
278                 wpabuf_put_u8(*extra_ie, WLAN_EID_MESH_ID);
279                 wpabuf_put_u8(*extra_ie, 0);
280         }
281 }
282
283
284 int wpa_supplicant_join_mesh(struct wpa_supplicant *wpa_s,
285                              struct wpa_ssid *ssid)
286 {
287         struct wpa_driver_mesh_join_params params;
288         int ret = 0;
289
290         if (!ssid || !ssid->ssid || !ssid->ssid_len || !ssid->frequency) {
291                 ret = -ENOENT;
292                 goto out;
293         }
294
295         wpa_supplicant_mesh_deinit(wpa_s);
296
297         os_memset(&params, 0, sizeof(params));
298         params.meshid = ssid->ssid;
299         params.meshid_len = ssid->ssid_len;
300         params.freq = ssid->frequency;
301 #ifdef CONFIG_IEEE80211N
302         params.ht_mode = ssid->mesh_ht_mode;
303 #endif /* CONFIG_IEEE80211N */
304
305         if (ssid->key_mgmt & WPA_KEY_MGMT_SAE) {
306                 params.flags |= WPA_DRIVER_MESH_FLAG_SAE_AUTH;
307                 params.flags |= WPA_DRIVER_MESH_FLAG_AMPE;
308                 wpa_s->conf->user_mpm = 1;
309         }
310
311         if (wpa_s->conf->user_mpm) {
312                 params.flags |= WPA_DRIVER_MESH_FLAG_USER_MPM;
313                 params.conf.flags &= ~WPA_DRIVER_MESH_CONF_FLAG_AUTO_PLINKS;
314         } else {
315                 params.flags |= WPA_DRIVER_MESH_FLAG_DRIVER_MPM;
316                 params.conf.flags |= WPA_DRIVER_MESH_CONF_FLAG_AUTO_PLINKS;
317         }
318
319         if (wpa_supplicant_mesh_init(wpa_s, ssid)) {
320                 wpa_msg(wpa_s, MSG_ERROR, "Failed to init mesh");
321                 ret = -1;
322                 goto out;
323         }
324
325         if (wpa_s->ifmsh) {
326                 params.ies = wpa_s->ifmsh->mconf->ies;
327                 params.ie_len = wpa_s->ifmsh->mconf->ie_len;
328                 params.basic_rates = wpa_s->ifmsh->basic_rates;
329         }
330
331         wpa_msg(wpa_s, MSG_INFO, "joining mesh %s",
332                 wpa_ssid_txt(ssid->ssid, ssid->ssid_len));
333         ret = wpa_drv_join_mesh(wpa_s, &params);
334         if (ret)
335                 wpa_msg(wpa_s, MSG_ERROR, "mesh join error=%d\n", ret);
336
337         /* hostapd sets the interface down until we associate */
338         wpa_drv_set_operstate(wpa_s, 1);
339
340 out:
341         return ret;
342 }
343
344
345 int wpa_supplicant_leave_mesh(struct wpa_supplicant *wpa_s)
346 {
347         int ret = 0;
348
349         wpa_msg(wpa_s, MSG_INFO, "leaving mesh");
350
351         ret = wpa_drv_leave_mesh(wpa_s);
352         if (ret)
353                 wpa_msg(wpa_s, MSG_ERROR, "mesh leave error=%d", ret);
354
355         wpa_drv_set_operstate(wpa_s, 1);
356
357         wpa_supplicant_mesh_deinit(wpa_s);
358
359         return ret;
360 }