wpa_supplicant_i.h revision 281806
1184610Salfred/* 2189001Sed * wpa_supplicant - Internal definitions 3184610Salfred * Copyright (c) 2003-2014, Jouni Malinen <j@w1.fi> 4184610Salfred * 5189001Sed * This software may be distributed under the terms of the BSD license. 6184610Salfred * See README for more details. 7184610Salfred */ 8184610Salfred 9184610Salfred#ifndef WPA_SUPPLICANT_I_H 10184610Salfred#define WPA_SUPPLICANT_I_H 11184610Salfred 12184610Salfred#include "utils/list.h" 13184610Salfred#include "common/defs.h" 14184610Salfred#include "common/sae.h" 15184610Salfred#include "common/wpa_ctrl.h" 16184610Salfred#include "wps/wps_defs.h" 17184610Salfred#include "config_ssid.h" 18184610Salfred#include "wmm_ac.h" 19184610Salfred 20184610Salfredextern const char *wpa_supplicant_version; 21184610Salfredextern const char *wpa_supplicant_license; 22184610Salfred#ifndef CONFIG_NO_STDOUT_DEBUG 23184610Salfredextern const char *wpa_supplicant_full_license1; 24184610Salfredextern const char *wpa_supplicant_full_license2; 25184610Salfredextern const char *wpa_supplicant_full_license3; 26184610Salfredextern const char *wpa_supplicant_full_license4; 27184610Salfredextern const char *wpa_supplicant_full_license5; 28184610Salfred#endif /* CONFIG_NO_STDOUT_DEBUG */ 29184610Salfred 30184610Salfredstruct wpa_sm; 31184610Salfredstruct wpa_supplicant; 32184610Salfredstruct ibss_rsn; 33184610Salfredstruct scan_info; 34184610Salfredstruct wpa_bss; 35184610Salfredstruct wpa_scan_results; 36184610Salfredstruct hostapd_hw_modes; 37184610Salfredstruct wpa_driver_associate_params; 38184610Salfred 39184610Salfred/* 40184610Salfred * Forward declarations of private structures used within the ctrl_iface 41184610Salfred * backends. Other parts of wpa_supplicant do not have access to data stored in 42184610Salfred * these structures. 43184610Salfred */ 44184610Salfredstruct ctrl_iface_priv; 45184610Salfredstruct ctrl_iface_global_priv; 46184610Salfredstruct wpas_dbus_priv; 47184610Salfred 48184610Salfred/** 49184610Salfred * struct wpa_interface - Parameters for wpa_supplicant_add_iface() 50184610Salfred */ 51184610Salfredstruct wpa_interface { 52184610Salfred /** 53184610Salfred * confname - Configuration name (file or profile) name 54184610Salfred * 55184610Salfred * This can also be %NULL when a configuration file is not used. In 56184610Salfred * that case, ctrl_interface must be set to allow the interface to be 57184610Salfred * configured. 58184610Salfred */ 59184610Salfred const char *confname; 60184610Salfred 61184610Salfred /** 62184610Salfred * confanother - Additional configuration name (file or profile) name 63184610Salfred * 64184610Salfred * This can also be %NULL when the additional configuration file is not 65184610Salfred * used. 66184610Salfred */ 67184610Salfred const char *confanother; 68184610Salfred 69184610Salfred#ifdef CONFIG_P2P 70184610Salfred /** 71184610Salfred * conf_p2p_dev - Configuration file used to hold the 72184610Salfred * P2P Device configuration parameters. 73184610Salfred * 74184610Salfred * This can also be %NULL. In such a case, if a P2P Device dedicated 75184610Salfred * interfaces is created, the main configuration file will be used. 76184610Salfred */ 77184610Salfred const char *conf_p2p_dev; 78184610Salfred#endif /* CONFIG_P2P */ 79184610Salfred 80184610Salfred /** 81184610Salfred * ctrl_interface - Control interface parameter 82184610Salfred * 83184610Salfred * If a configuration file is not used, this variable can be used to 84184610Salfred * set the ctrl_interface parameter that would have otherwise been read 85184610Salfred * from the configuration file. If both confname and ctrl_interface are 86184610Salfred * set, ctrl_interface is used to override the value from configuration 87184610Salfred * file. 88184610Salfred */ 89184610Salfred const char *ctrl_interface; 90184610Salfred 91184610Salfred /** 92184610Salfred * driver - Driver interface name, or %NULL to use the default driver 93184610Salfred */ 94184610Salfred const char *driver; 95184610Salfred 96184610Salfred /** 97184610Salfred * driver_param - Driver interface parameters 98184610Salfred * 99184610Salfred * If a configuration file is not used, this variable can be used to 100184610Salfred * set the driver_param parameters that would have otherwise been read 101184610Salfred * from the configuration file. If both confname and driver_param are 102184610Salfred * set, driver_param is used to override the value from configuration 103184610Salfred * file. 104184610Salfred */ 105184610Salfred const char *driver_param; 106184610Salfred 107184610Salfred /** 108184610Salfred * ifname - Interface name 109184610Salfred */ 110184610Salfred const char *ifname; 111184610Salfred 112184610Salfred /** 113184610Salfred * bridge_ifname - Optional bridge interface name 114184610Salfred * 115184610Salfred * If the driver interface (ifname) is included in a Linux bridge 116184610Salfred * device, the bridge interface may need to be used for receiving EAPOL 117184610Salfred * frames. This can be enabled by setting this variable to enable 118184610Salfred * receiving of EAPOL frames from an additional interface. 119184610Salfred */ 120184610Salfred const char *bridge_ifname; 121184610Salfred 122184610Salfred /** 123184610Salfred * p2p_mgmt - Interface used for P2P management (P2P Device operations) 124184610Salfred * 125184610Salfred * Indicates whether wpas_p2p_init() must be called for this interface. 126184610Salfred * This is used only when the driver supports a dedicated P2P Device 127184610Salfred * interface that is not a network interface. 128184610Salfred */ 129184610Salfred int p2p_mgmt; 130184610Salfred}; 131184610Salfred 132184610Salfred/** 133184610Salfred * struct wpa_params - Parameters for wpa_supplicant_init() 134184610Salfred */ 135184610Salfredstruct wpa_params { 136184610Salfred /** 137184610Salfred * daemonize - Run %wpa_supplicant in the background 138184610Salfred */ 139184610Salfred int daemonize; 140184610Salfred 141184610Salfred /** 142184610Salfred * wait_for_monitor - Wait for a monitor program before starting 143184610Salfred */ 144184610Salfred int wait_for_monitor; 145184610Salfred 146184610Salfred /** 147184610Salfred * pid_file - Path to a PID (process ID) file 148184610Salfred * 149184610Salfred * If this and daemonize are set, process ID of the background process 150184610Salfred * will be written to the specified file. 151184610Salfred */ 152184610Salfred char *pid_file; 153184610Salfred 154184610Salfred /** 155184610Salfred * wpa_debug_level - Debugging verbosity level (e.g., MSG_INFO) 156184610Salfred */ 157184610Salfred int wpa_debug_level; 158184610Salfred 159184610Salfred /** 160184610Salfred * wpa_debug_show_keys - Whether keying material is included in debug 161184610Salfred * 162184610Salfred * This parameter can be used to allow keying material to be included 163184610Salfred * in debug messages. This is a security risk and this option should 164184610Salfred * not be enabled in normal configuration. If needed during 165184610Salfred * development or while troubleshooting, this option can provide more 166184610Salfred * details for figuring out what is happening. 167184610Salfred */ 168184610Salfred int wpa_debug_show_keys; 169184610Salfred 170184610Salfred /** 171184610Salfred * wpa_debug_timestamp - Whether to include timestamp in debug messages 172184610Salfred */ 173184610Salfred int wpa_debug_timestamp; 174184610Salfred 175184610Salfred /** 176184610Salfred * ctrl_interface - Global ctrl_iface path/parameter 177184610Salfred */ 178184610Salfred char *ctrl_interface; 179184610Salfred 180184610Salfred /** 181184610Salfred * ctrl_interface_group - Global ctrl_iface group 182184610Salfred */ 183184610Salfred char *ctrl_interface_group; 184184610Salfred 185184610Salfred /** 186184610Salfred * dbus_ctrl_interface - Enable the DBus control interface 187184610Salfred */ 188184610Salfred int dbus_ctrl_interface; 189184610Salfred 190184610Salfred /** 191184610Salfred * wpa_debug_file_path - Path of debug file or %NULL to use stdout 192184610Salfred */ 193184610Salfred const char *wpa_debug_file_path; 194184610Salfred 195184610Salfred /** 196184610Salfred * wpa_debug_syslog - Enable log output through syslog 197184610Salfred */ 198184610Salfred int wpa_debug_syslog; 199184610Salfred 200184610Salfred /** 201184610Salfred * wpa_debug_tracing - Enable log output through Linux tracing 202184610Salfred */ 203184610Salfred int wpa_debug_tracing; 204184610Salfred 205184610Salfred /** 206184610Salfred * override_driver - Optional driver parameter override 207184610Salfred * 208184610Salfred * This parameter can be used to override the driver parameter in 209184610Salfred * dynamic interface addition to force a specific driver wrapper to be 210184610Salfred * used instead. 211184610Salfred */ 212184610Salfred char *override_driver; 213184610Salfred 214184610Salfred /** 215184610Salfred * override_ctrl_interface - Optional ctrl_interface override 216184610Salfred * 217184610Salfred * This parameter can be used to override the ctrl_interface parameter 218184610Salfred * in dynamic interface addition to force a control interface to be 219184610Salfred * created. 220184610Salfred */ 221184610Salfred char *override_ctrl_interface; 222184610Salfred 223184610Salfred /** 224184610Salfred * entropy_file - Optional entropy file 225184610Salfred * 226184610Salfred * This parameter can be used to configure wpa_supplicant to maintain 227184610Salfred * its internal entropy store over restarts. 228184610Salfred */ 229184610Salfred char *entropy_file; 230184610Salfred}; 231184610Salfred 232184610Salfredstruct p2p_srv_bonjour { 233184610Salfred struct dl_list list; 234184610Salfred struct wpabuf *query; 235184610Salfred struct wpabuf *resp; 236184610Salfred}; 237184610Salfred 238184610Salfredstruct p2p_srv_upnp { 239184610Salfred struct dl_list list; 240184610Salfred u8 version; 241184610Salfred char *service; 242184610Salfred}; 243184610Salfred 244184610Salfred/** 245184610Salfred * struct wpa_global - Internal, global data for all %wpa_supplicant interfaces 246184610Salfred * 247184610Salfred * This structure is initialized by calling wpa_supplicant_init() when starting 248184610Salfred * %wpa_supplicant. 249184610Salfred */ 250184610Salfredstruct wpa_global { 251184610Salfred struct wpa_supplicant *ifaces; 252184610Salfred struct wpa_params params; 253184610Salfred struct ctrl_iface_global_priv *ctrl_iface; 254184610Salfred struct wpas_dbus_priv *dbus; 255184610Salfred void **drv_priv; 256184610Salfred size_t drv_count; 257184610Salfred struct os_time suspend_time; 258184610Salfred struct p2p_data *p2p; 259184610Salfred struct wpa_supplicant *p2p_init_wpa_s; 260184610Salfred struct wpa_supplicant *p2p_group_formation; 261184610Salfred struct wpa_supplicant *p2p_invite_group; 262184610Salfred u8 p2p_dev_addr[ETH_ALEN]; 263184610Salfred struct os_reltime p2p_go_wait_client; 264184610Salfred struct dl_list p2p_srv_bonjour; /* struct p2p_srv_bonjour */ 265184610Salfred struct dl_list p2p_srv_upnp; /* struct p2p_srv_upnp */ 266184610Salfred int p2p_disabled; 267184610Salfred int cross_connection; 268184610Salfred struct wpa_freq_range_list p2p_disallow_freq; 269184610Salfred struct wpa_freq_range_list p2p_go_avoid_freq; 270184610Salfred enum wpa_conc_pref { 271184610Salfred WPA_CONC_PREF_NOT_SET, 272184610Salfred WPA_CONC_PREF_STA, 273184610Salfred WPA_CONC_PREF_P2P 274184610Salfred } conc_pref; 275184610Salfred unsigned int p2p_per_sta_psk:1; 276184610Salfred unsigned int p2p_fail_on_wps_complete:1; 277 unsigned int p2p_24ghz_social_channels:1; 278 unsigned int pending_p2ps_group:1; 279 unsigned int pending_group_iface_for_p2ps:1; 280 281#ifdef CONFIG_WIFI_DISPLAY 282 int wifi_display; 283#define MAX_WFD_SUBELEMS 10 284 struct wpabuf *wfd_subelem[MAX_WFD_SUBELEMS]; 285#endif /* CONFIG_WIFI_DISPLAY */ 286 287 struct psk_list_entry *add_psk; /* From group formation */ 288}; 289 290 291/** 292 * struct wpa_radio - Internal data for per-radio information 293 * 294 * This structure is used to share data about configured interfaces 295 * (struct wpa_supplicant) that share the same physical radio, e.g., to allow 296 * better coordination of offchannel operations. 297 */ 298struct wpa_radio { 299 char name[16]; /* from driver_ops get_radio_name() or empty if not 300 * available */ 301 unsigned int external_scan_running:1; 302 struct dl_list ifaces; /* struct wpa_supplicant::radio_list entries */ 303 struct dl_list work; /* struct wpa_radio_work::list entries */ 304}; 305 306/** 307 * struct wpa_radio_work - Radio work item 308 */ 309struct wpa_radio_work { 310 struct dl_list list; 311 unsigned int freq; /* known frequency (MHz) or 0 for multiple/unknown */ 312 const char *type; 313 struct wpa_supplicant *wpa_s; 314 void (*cb)(struct wpa_radio_work *work, int deinit); 315 void *ctx; 316 unsigned int started:1; 317 struct os_reltime time; 318}; 319 320int radio_add_work(struct wpa_supplicant *wpa_s, unsigned int freq, 321 const char *type, int next, 322 void (*cb)(struct wpa_radio_work *work, int deinit), 323 void *ctx); 324void radio_work_done(struct wpa_radio_work *work); 325void radio_remove_works(struct wpa_supplicant *wpa_s, 326 const char *type, int remove_all); 327void radio_work_check_next(struct wpa_supplicant *wpa_s); 328struct wpa_radio_work * 329radio_work_pending(struct wpa_supplicant *wpa_s, const char *type); 330 331struct wpa_connect_work { 332 unsigned int sme:1; 333 unsigned int bss_removed:1; 334 struct wpa_bss *bss; 335 struct wpa_ssid *ssid; 336}; 337 338int wpas_valid_bss_ssid(struct wpa_supplicant *wpa_s, struct wpa_bss *test_bss, 339 struct wpa_ssid *test_ssid); 340void wpas_connect_work_free(struct wpa_connect_work *cwork); 341void wpas_connect_work_done(struct wpa_supplicant *wpa_s); 342 343struct wpa_external_work { 344 unsigned int id; 345 char type[100]; 346 unsigned int timeout; 347}; 348 349/** 350 * offchannel_send_action_result - Result of offchannel send Action frame 351 */ 352enum offchannel_send_action_result { 353 OFFCHANNEL_SEND_ACTION_SUCCESS /**< Frame was send and acknowledged */, 354 OFFCHANNEL_SEND_ACTION_NO_ACK /**< Frame was sent, but not acknowledged 355 */, 356 OFFCHANNEL_SEND_ACTION_FAILED /**< Frame was not sent due to a failure 357 */ 358}; 359 360struct wps_ap_info { 361 u8 bssid[ETH_ALEN]; 362 enum wps_ap_info_type { 363 WPS_AP_NOT_SEL_REG, 364 WPS_AP_SEL_REG, 365 WPS_AP_SEL_REG_OUR 366 } type; 367 unsigned int tries; 368 struct os_reltime last_attempt; 369}; 370 371struct wpa_ssid_value { 372 u8 ssid[32]; 373 size_t ssid_len; 374}; 375 376#define WPA_FREQ_USED_BY_INFRA_STATION BIT(0) 377#define WPA_FREQ_USED_BY_P2P_CLIENT BIT(1) 378 379struct wpa_used_freq_data { 380 int freq; 381 unsigned int flags; 382}; 383 384#define RRM_NEIGHBOR_REPORT_TIMEOUT 1 /* 1 second for AP to send a report */ 385 386/* 387 * struct rrm_data - Data used for managing RRM features 388 */ 389struct rrm_data { 390 /* rrm_used - indication regarding the current connection */ 391 unsigned int rrm_used:1; 392 393 /* 394 * notify_neighbor_rep - Callback for notifying report requester 395 */ 396 void (*notify_neighbor_rep)(void *ctx, struct wpabuf *neighbor_rep); 397 398 /* 399 * neighbor_rep_cb_ctx - Callback context 400 * Received in the callback registration, and sent to the callback 401 * function as a parameter. 402 */ 403 void *neighbor_rep_cb_ctx; 404 405 /* next_neighbor_rep_token - Next request's dialog token */ 406 u8 next_neighbor_rep_token; 407}; 408 409enum wpa_supplicant_test_failure { 410 WPAS_TEST_FAILURE_NONE, 411 WPAS_TEST_FAILURE_SCAN_TRIGGER, 412}; 413 414/** 415 * struct wpa_supplicant - Internal data for wpa_supplicant interface 416 * 417 * This structure contains the internal data for core wpa_supplicant code. This 418 * should be only used directly from the core code. However, a pointer to this 419 * data is used from other files as an arbitrary context pointer in calls to 420 * core functions. 421 */ 422struct wpa_supplicant { 423 struct wpa_global *global; 424 struct wpa_radio *radio; /* shared radio context */ 425 struct dl_list radio_list; /* list head: struct wpa_radio::ifaces */ 426 struct wpa_supplicant *parent; 427 struct wpa_supplicant *next; 428 struct l2_packet_data *l2; 429 struct l2_packet_data *l2_br; 430 unsigned char own_addr[ETH_ALEN]; 431 unsigned char perm_addr[ETH_ALEN]; 432 char ifname[100]; 433#ifdef CONFIG_CTRL_IFACE_DBUS 434 char *dbus_path; 435#endif /* CONFIG_CTRL_IFACE_DBUS */ 436#ifdef CONFIG_CTRL_IFACE_DBUS_NEW 437 char *dbus_new_path; 438 char *dbus_groupobj_path; 439#ifdef CONFIG_AP 440 char *preq_notify_peer; 441#endif /* CONFIG_AP */ 442#endif /* CONFIG_CTRL_IFACE_DBUS_NEW */ 443 char bridge_ifname[16]; 444 445 char *confname; 446 char *confanother; 447 448 struct wpa_config *conf; 449 int countermeasures; 450 struct os_reltime last_michael_mic_error; 451 u8 bssid[ETH_ALEN]; 452 u8 pending_bssid[ETH_ALEN]; /* If wpa_state == WPA_ASSOCIATING, this 453 * field contains the target BSSID. */ 454 int reassociate; /* reassociation requested */ 455 int reassoc_same_bss; /* reassociating to the same bss */ 456 int disconnected; /* all connections disabled; i.e., do no reassociate 457 * before this has been cleared */ 458 struct wpa_ssid *current_ssid; 459 struct wpa_ssid *last_ssid; 460 struct wpa_bss *current_bss; 461 int ap_ies_from_associnfo; 462 unsigned int assoc_freq; 463 464 /* Selected configuration (based on Beacon/ProbeResp WPA IE) */ 465 int pairwise_cipher; 466 int group_cipher; 467 int key_mgmt; 468 int wpa_proto; 469 int mgmt_group_cipher; 470 471 void *drv_priv; /* private data used by driver_ops */ 472 void *global_drv_priv; 473 474 u8 *bssid_filter; 475 size_t bssid_filter_count; 476 477 u8 *disallow_aps_bssid; 478 size_t disallow_aps_bssid_count; 479 struct wpa_ssid_value *disallow_aps_ssid; 480 size_t disallow_aps_ssid_count; 481 482 enum { WPA_SETBAND_AUTO, WPA_SETBAND_5G, WPA_SETBAND_2G } setband; 483 484 /* Preferred network for the next connection attempt */ 485 struct wpa_ssid *next_ssid; 486 487 /* previous scan was wildcard when interleaving between 488 * wildcard scans and specific SSID scan when max_ssids=1 */ 489 int prev_scan_wildcard; 490 struct wpa_ssid *prev_scan_ssid; /* previously scanned SSID; 491 * NULL = not yet initialized (start 492 * with wildcard SSID) 493 * WILDCARD_SSID_SCAN = wildcard 494 * SSID was used in the previous scan 495 */ 496#define WILDCARD_SSID_SCAN ((struct wpa_ssid *) 1) 497 498 struct wpa_ssid *prev_sched_ssid; /* last SSID used in sched scan */ 499 int sched_scan_timeout; 500 int sched_scan_interval; 501 int first_sched_scan; 502 int sched_scan_timed_out; 503 504 void (*scan_res_handler)(struct wpa_supplicant *wpa_s, 505 struct wpa_scan_results *scan_res); 506 struct dl_list bss; /* struct wpa_bss::list */ 507 struct dl_list bss_id; /* struct wpa_bss::list_id */ 508 size_t num_bss; 509 unsigned int bss_update_idx; 510 unsigned int bss_next_id; 511 512 /* 513 * Pointers to BSS entries in the order they were in the last scan 514 * results. 515 */ 516 struct wpa_bss **last_scan_res; 517 unsigned int last_scan_res_used; 518 unsigned int last_scan_res_size; 519 struct os_reltime last_scan; 520 521 struct wpa_driver_ops *driver; 522 int interface_removed; /* whether the network interface has been 523 * removed */ 524 struct wpa_sm *wpa; 525 struct eapol_sm *eapol; 526 527 struct ctrl_iface_priv *ctrl_iface; 528 529 enum wpa_states wpa_state; 530 struct wpa_radio_work *scan_work; 531 int scanning; 532 int sched_scanning; 533 int new_connection; 534 535 int eapol_received; /* number of EAPOL packets received after the 536 * previous association event */ 537 538 struct scard_data *scard; 539 char imsi[20]; 540 int mnc_len; 541 542 unsigned char last_eapol_src[ETH_ALEN]; 543 544 unsigned int keys_cleared; /* bitfield of key indexes that the driver is 545 * known not to be configured with a key */ 546 547 struct wpa_blacklist *blacklist; 548 549 /** 550 * extra_blacklist_count - Sum of blacklist counts after last connection 551 * 552 * This variable is used to maintain a count of temporary blacklisting 553 * failures (maximum number for any BSS) over blacklist clear 554 * operations. This is needed for figuring out whether there has been 555 * failures prior to the last blacklist clear operation which happens 556 * whenever no other not-blacklisted BSS candidates are available. This 557 * gets cleared whenever a connection has been established successfully. 558 */ 559 int extra_blacklist_count; 560 561 /** 562 * scan_req - Type of the scan request 563 */ 564 enum scan_req_type { 565 /** 566 * NORMAL_SCAN_REQ - Normal scan request 567 * 568 * This is used for scans initiated by wpa_supplicant to find an 569 * AP for a connection. 570 */ 571 NORMAL_SCAN_REQ, 572 573 /** 574 * INITIAL_SCAN_REQ - Initial scan request 575 * 576 * This is used for the first scan on an interface to force at 577 * least one scan to be run even if the configuration does not 578 * include any enabled networks. 579 */ 580 INITIAL_SCAN_REQ, 581 582 /** 583 * MANUAL_SCAN_REQ - Manual scan request 584 * 585 * This is used for scans where the user request a scan or 586 * a specific wpa_supplicant operation (e.g., WPS) requires scan 587 * to be run. 588 */ 589 MANUAL_SCAN_REQ 590 } scan_req, last_scan_req; 591 enum wpa_states scan_prev_wpa_state; 592 struct os_reltime scan_trigger_time, scan_start_time; 593 int scan_runs; /* number of scan runs since WPS was started */ 594 int *next_scan_freqs; 595 int *manual_scan_freqs; 596 int *manual_sched_scan_freqs; 597 unsigned int manual_scan_passive:1; 598 unsigned int manual_scan_use_id:1; 599 unsigned int manual_scan_only_new:1; 600 unsigned int own_scan_requested:1; 601 unsigned int own_scan_running:1; 602 unsigned int clear_driver_scan_cache:1; 603 unsigned int manual_scan_id; 604 int scan_interval; /* time in sec between scans to find suitable AP */ 605 int normal_scans; /* normal scans run before sched_scan */ 606 int scan_for_connection; /* whether the scan request was triggered for 607 * finding a connection */ 608#define MAX_SCAN_ID 16 609 int scan_id[MAX_SCAN_ID]; 610 unsigned int scan_id_count; 611 612 u64 drv_flags; 613 unsigned int drv_enc; 614 unsigned int drv_smps_modes; 615 unsigned int drv_rrm_flags; 616 617 /* 618 * A bitmap of supported protocols for probe response offload. See 619 * struct wpa_driver_capa in driver.h 620 */ 621 unsigned int probe_resp_offloads; 622 623 /* extended capabilities supported by the driver */ 624 const u8 *extended_capa, *extended_capa_mask; 625 unsigned int extended_capa_len; 626 627 int max_scan_ssids; 628 int max_sched_scan_ssids; 629 int sched_scan_supported; 630 unsigned int max_match_sets; 631 unsigned int max_remain_on_chan; 632 unsigned int max_stations; 633 634 int pending_mic_error_report; 635 int pending_mic_error_pairwise; 636 int mic_errors_seen; /* Michael MIC errors with the current PTK */ 637 638 struct wps_context *wps; 639 int wps_success; /* WPS success event received */ 640 struct wps_er *wps_er; 641 unsigned int wps_run; 642 int blacklist_cleared; 643 644 struct wpabuf *pending_eapol_rx; 645 struct os_reltime pending_eapol_rx_time; 646 u8 pending_eapol_rx_src[ETH_ALEN]; 647 unsigned int last_eapol_matches_bssid:1; 648 unsigned int eap_expected_failure:1; 649 unsigned int reattach:1; /* reassociation to the same BSS requested */ 650 unsigned int mac_addr_changed:1; 651 652 struct os_reltime last_mac_addr_change; 653 int last_mac_addr_style; 654 655 struct ibss_rsn *ibss_rsn; 656 657 int set_sta_uapsd; 658 int sta_uapsd; 659 int set_ap_uapsd; 660 int ap_uapsd; 661 662#ifdef CONFIG_SME 663 struct { 664 u8 ssid[32]; 665 size_t ssid_len; 666 int freq; 667 u8 assoc_req_ie[200]; 668 size_t assoc_req_ie_len; 669 int mfp; 670 int ft_used; 671 u8 mobility_domain[2]; 672 u8 *ft_ies; 673 size_t ft_ies_len; 674 u8 prev_bssid[ETH_ALEN]; 675 int prev_bssid_set; 676 int auth_alg; 677 int proto; 678 679 int sa_query_count; /* number of pending SA Query requests; 680 * 0 = no SA Query in progress */ 681 int sa_query_timed_out; 682 u8 *sa_query_trans_id; /* buffer of WLAN_SA_QUERY_TR_ID_LEN * 683 * sa_query_count octets of pending 684 * SA Query transaction identifiers */ 685 struct os_reltime sa_query_start; 686 struct os_reltime last_unprot_disconnect; 687 enum { HT_SEC_CHAN_UNKNOWN, 688 HT_SEC_CHAN_ABOVE, 689 HT_SEC_CHAN_BELOW } ht_sec_chan; 690 u8 sched_obss_scan; 691 u16 obss_scan_int; 692 u16 bss_max_idle_period; 693#ifdef CONFIG_SAE 694 struct sae_data sae; 695 struct wpabuf *sae_token; 696 int sae_group_index; 697 unsigned int sae_pmksa_caching:1; 698#endif /* CONFIG_SAE */ 699 } sme; 700#endif /* CONFIG_SME */ 701 702#ifdef CONFIG_AP 703 struct hostapd_iface *ap_iface; 704 void (*ap_configured_cb)(void *ctx, void *data); 705 void *ap_configured_cb_ctx; 706 void *ap_configured_cb_data; 707#endif /* CONFIG_AP */ 708 709 struct hostapd_iface *ifmsh; 710#ifdef CONFIG_MESH 711 struct mesh_rsn *mesh_rsn; 712 int mesh_if_idx; 713 unsigned int mesh_if_created:1; 714 unsigned int mesh_ht_enabled:1; 715 int mesh_auth_block_duration; /* sec */ 716#endif /* CONFIG_MESH */ 717 718 unsigned int off_channel_freq; 719 struct wpabuf *pending_action_tx; 720 u8 pending_action_src[ETH_ALEN]; 721 u8 pending_action_dst[ETH_ALEN]; 722 u8 pending_action_bssid[ETH_ALEN]; 723 unsigned int pending_action_freq; 724 int pending_action_no_cck; 725 int pending_action_without_roc; 726 unsigned int pending_action_tx_done:1; 727 void (*pending_action_tx_status_cb)(struct wpa_supplicant *wpa_s, 728 unsigned int freq, const u8 *dst, 729 const u8 *src, const u8 *bssid, 730 const u8 *data, size_t data_len, 731 enum offchannel_send_action_result 732 result); 733 unsigned int roc_waiting_drv_freq; 734 int action_tx_wait_time; 735 736 int p2p_mgmt; 737 738#ifdef CONFIG_P2P 739 struct wpa_supplicant *p2p_dev; 740 struct p2p_go_neg_results *go_params; 741 int create_p2p_iface; 742 u8 pending_interface_addr[ETH_ALEN]; 743 char pending_interface_name[100]; 744 int pending_interface_type; 745 int p2p_group_idx; 746 unsigned int pending_listen_freq; 747 unsigned int pending_listen_duration; 748 enum { 749 NOT_P2P_GROUP_INTERFACE, 750 P2P_GROUP_INTERFACE_PENDING, 751 P2P_GROUP_INTERFACE_GO, 752 P2P_GROUP_INTERFACE_CLIENT 753 } p2p_group_interface; 754 struct p2p_group *p2p_group; 755 int p2p_long_listen; /* remaining time in long Listen state in ms */ 756 char p2p_pin[10]; 757 int p2p_wps_method; 758 u8 p2p_auth_invite[ETH_ALEN]; 759 int p2p_sd_over_ctrl_iface; 760 int p2p_in_provisioning; 761 int p2p_in_invitation; 762 int p2p_invite_go_freq; 763 int pending_invite_ssid_id; 764 int show_group_started; 765 u8 go_dev_addr[ETH_ALEN]; 766 int pending_pd_before_join; 767 u8 pending_join_iface_addr[ETH_ALEN]; 768 u8 pending_join_dev_addr[ETH_ALEN]; 769 int pending_join_wps_method; 770 u8 p2p_join_ssid[32]; 771 size_t p2p_join_ssid_len; 772 int p2p_join_scan_count; 773 int auto_pd_scan_retry; 774 int force_long_sd; 775 u16 pending_pd_config_methods; 776 enum { 777 NORMAL_PD, AUTO_PD_GO_NEG, AUTO_PD_JOIN, AUTO_PD_ASP 778 } pending_pd_use; 779 780 /* 781 * Whether cross connection is disallowed by the AP to which this 782 * interface is associated (only valid if there is an association). 783 */ 784 int cross_connect_disallowed; 785 786 /* 787 * Whether this P2P group is configured to use cross connection (only 788 * valid if this is P2P GO interface). The actual cross connect packet 789 * forwarding may not be configured depending on the uplink status. 790 */ 791 int cross_connect_enabled; 792 793 /* Whether cross connection forwarding is in use at the moment. */ 794 int cross_connect_in_use; 795 796 /* 797 * Uplink interface name for cross connection 798 */ 799 char cross_connect_uplink[100]; 800 801 unsigned int p2p_auto_join:1; 802 unsigned int p2p_auto_pd:1; 803 unsigned int p2p_persistent_group:1; 804 unsigned int p2p_fallback_to_go_neg:1; 805 unsigned int p2p_pd_before_go_neg:1; 806 unsigned int p2p_go_ht40:1; 807 unsigned int p2p_go_vht:1; 808 unsigned int user_initiated_pd:1; 809 unsigned int p2p_go_group_formation_completed:1; 810 unsigned int group_formation_reported:1; 811 unsigned int waiting_presence_resp; 812 int p2p_first_connection_timeout; 813 unsigned int p2p_nfc_tag_enabled:1; 814 unsigned int p2p_peer_oob_pk_hash_known:1; 815 unsigned int p2p_disable_ip_addr_req:1; 816 unsigned int p2ps_join_addr_valid:1; 817 int p2p_persistent_go_freq; 818 int p2p_persistent_id; 819 int p2p_go_intent; 820 int p2p_connect_freq; 821 struct os_reltime p2p_auto_started; 822 struct wpa_ssid *p2p_last_4way_hs_fail; 823 struct wpa_radio_work *p2p_scan_work; 824 struct wpa_radio_work *p2p_listen_work; 825 struct wpa_radio_work *p2p_send_action_work; 826 827 u16 p2p_oob_dev_pw_id; /* OOB Device Password Id for group formation */ 828 struct wpabuf *p2p_oob_dev_pw; /* OOB Device Password for group 829 * formation */ 830 u8 p2p_peer_oob_pubkey_hash[WPS_OOB_PUBKEY_HASH_LEN]; 831 u8 p2p_ip_addr_info[3 * 4]; 832 833 /* group common frequencies */ 834 int *p2p_group_common_freqs; 835 unsigned int p2p_group_common_freqs_num; 836 u8 p2ps_join_addr[ETH_ALEN]; 837#endif /* CONFIG_P2P */ 838 839 struct wpa_ssid *bgscan_ssid; 840 const struct bgscan_ops *bgscan; 841 void *bgscan_priv; 842 843 const struct autoscan_ops *autoscan; 844 struct wpa_driver_scan_params *autoscan_params; 845 void *autoscan_priv; 846 847 struct wpa_ssid *connect_without_scan; 848 849 struct wps_ap_info *wps_ap; 850 size_t num_wps_ap; 851 int wps_ap_iter; 852 853 int after_wps; 854 int known_wps_freq; 855 unsigned int wps_freq; 856 int wps_fragment_size; 857 int auto_reconnect_disabled; 858 859 /* Channel preferences for AP/P2P GO use */ 860 int best_24_freq; 861 int best_5_freq; 862 int best_overall_freq; 863 864 struct gas_query *gas; 865 866#ifdef CONFIG_INTERWORKING 867 unsigned int fetch_anqp_in_progress:1; 868 unsigned int network_select:1; 869 unsigned int auto_select:1; 870 unsigned int auto_network_select:1; 871 unsigned int interworking_fast_assoc_tried:1; 872 unsigned int fetch_all_anqp:1; 873 unsigned int fetch_osu_info:1; 874 unsigned int fetch_osu_waiting_scan:1; 875 unsigned int fetch_osu_icon_in_progress:1; 876 struct wpa_bss *interworking_gas_bss; 877 unsigned int osu_icon_id; 878 struct osu_provider *osu_prov; 879 size_t osu_prov_count; 880 struct os_reltime osu_icon_fetch_start; 881 unsigned int num_osu_scans; 882 unsigned int num_prov_found; 883#endif /* CONFIG_INTERWORKING */ 884 unsigned int drv_capa_known; 885 886 struct { 887 struct hostapd_hw_modes *modes; 888 u16 num_modes; 889 u16 flags; 890 } hw; 891 enum local_hw_capab { 892 CAPAB_NO_HT_VHT, 893 CAPAB_HT, 894 CAPAB_HT40, 895 CAPAB_VHT, 896 } hw_capab; 897#ifdef CONFIG_MACSEC 898 struct ieee802_1x_kay *kay; 899#endif /* CONFIG_MACSEC */ 900 901 int pno; 902 int pno_sched_pending; 903 904 /* WLAN_REASON_* reason codes. Negative if locally generated. */ 905 int disconnect_reason; 906 907 struct ext_password_data *ext_pw; 908 909 struct wpabuf *last_gas_resp, *prev_gas_resp; 910 u8 last_gas_addr[ETH_ALEN], prev_gas_addr[ETH_ALEN]; 911 u8 last_gas_dialog_token, prev_gas_dialog_token; 912 913 unsigned int no_keep_alive:1; 914 unsigned int ext_mgmt_frame_handling:1; 915 unsigned int ext_eapol_frame_io:1; 916 unsigned int wmm_ac_supported:1; 917 unsigned int ext_work_in_progress:1; 918 unsigned int own_disconnect_req:1; 919 920#define MAC_ADDR_RAND_SCAN BIT(0) 921#define MAC_ADDR_RAND_SCHED_SCAN BIT(1) 922#define MAC_ADDR_RAND_PNO BIT(2) 923#define MAC_ADDR_RAND_ALL (MAC_ADDR_RAND_SCAN | \ 924 MAC_ADDR_RAND_SCHED_SCAN | \ 925 MAC_ADDR_RAND_PNO) 926 unsigned int mac_addr_rand_supported; 927 unsigned int mac_addr_rand_enable; 928 929 /* MAC Address followed by mask (2 * ETH_ALEN) */ 930 u8 *mac_addr_scan; 931 u8 *mac_addr_sched_scan; 932 u8 *mac_addr_pno; 933 934#ifdef CONFIG_WNM 935 u8 wnm_dialog_token; 936 u8 wnm_reply; 937 u8 wnm_num_neighbor_report; 938 u8 wnm_mode; 939 u16 wnm_dissoc_timer; 940 u8 wnm_bss_termination_duration[12]; 941 struct neighbor_report *wnm_neighbor_report_elements; 942 struct os_reltime wnm_cand_valid_until; 943 u8 wnm_cand_from_bss[ETH_ALEN]; 944#endif /* CONFIG_WNM */ 945 946#ifdef CONFIG_TESTING_GET_GTK 947 u8 last_gtk[32]; 948 size_t last_gtk_len; 949#endif /* CONFIG_TESTING_GET_GTK */ 950 951 unsigned int num_multichan_concurrent; 952 struct wpa_radio_work *connect_work; 953 954 unsigned int ext_work_id; 955 956 struct wpabuf *vendor_elem[NUM_VENDOR_ELEM_FRAMES]; 957 958#ifdef CONFIG_TESTING_OPTIONS 959 struct l2_packet_data *l2_test; 960 unsigned int extra_roc_dur; 961 enum wpa_supplicant_test_failure test_failure; 962#endif /* CONFIG_TESTING_OPTIONS */ 963 964 struct wmm_ac_assoc_data *wmm_ac_assoc_info; 965 struct wmm_tspec_element *tspecs[WMM_AC_NUM][TS_DIR_IDX_COUNT]; 966 struct wmm_ac_addts_request *addts_request; 967 u8 wmm_ac_last_dialog_token; 968 struct wmm_tspec_element *last_tspecs; 969 u8 last_tspecs_count; 970 971 struct rrm_data rrm; 972}; 973 974 975/* wpa_supplicant.c */ 976void wpa_supplicant_apply_ht_overrides( 977 struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid, 978 struct wpa_driver_associate_params *params); 979void wpa_supplicant_apply_vht_overrides( 980 struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid, 981 struct wpa_driver_associate_params *params); 982 983int wpa_set_wep_keys(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid); 984int wpa_supplicant_set_wpa_none_key(struct wpa_supplicant *wpa_s, 985 struct wpa_ssid *ssid); 986 987int wpa_supplicant_reload_configuration(struct wpa_supplicant *wpa_s); 988 989const char * wpa_supplicant_state_txt(enum wpa_states state); 990int wpa_supplicant_update_mac_addr(struct wpa_supplicant *wpa_s); 991int wpa_supplicant_driver_init(struct wpa_supplicant *wpa_s); 992int wpa_supplicant_set_suites(struct wpa_supplicant *wpa_s, 993 struct wpa_bss *bss, struct wpa_ssid *ssid, 994 u8 *wpa_ie, size_t *wpa_ie_len); 995void wpa_supplicant_associate(struct wpa_supplicant *wpa_s, 996 struct wpa_bss *bss, 997 struct wpa_ssid *ssid); 998void wpa_supplicant_set_non_wpa_policy(struct wpa_supplicant *wpa_s, 999 struct wpa_ssid *ssid); 1000void wpa_supplicant_initiate_eapol(struct wpa_supplicant *wpa_s); 1001void wpa_clear_keys(struct wpa_supplicant *wpa_s, const u8 *addr); 1002void wpa_supplicant_req_auth_timeout(struct wpa_supplicant *wpa_s, 1003 int sec, int usec); 1004void wpa_supplicant_reinit_autoscan(struct wpa_supplicant *wpa_s); 1005void wpa_supplicant_set_state(struct wpa_supplicant *wpa_s, 1006 enum wpa_states state); 1007struct wpa_ssid * wpa_supplicant_get_ssid(struct wpa_supplicant *wpa_s); 1008const char * wpa_supplicant_get_eap_mode(struct wpa_supplicant *wpa_s); 1009void wpa_supplicant_cancel_auth_timeout(struct wpa_supplicant *wpa_s); 1010void wpa_supplicant_deauthenticate(struct wpa_supplicant *wpa_s, 1011 int reason_code); 1012 1013void wpa_supplicant_enable_network(struct wpa_supplicant *wpa_s, 1014 struct wpa_ssid *ssid); 1015void wpa_supplicant_disable_network(struct wpa_supplicant *wpa_s, 1016 struct wpa_ssid *ssid); 1017void wpa_supplicant_select_network(struct wpa_supplicant *wpa_s, 1018 struct wpa_ssid *ssid); 1019int wpas_set_pkcs11_engine_and_module_path(struct wpa_supplicant *wpa_s, 1020 const char *pkcs11_engine_path, 1021 const char *pkcs11_module_path); 1022int wpa_supplicant_set_ap_scan(struct wpa_supplicant *wpa_s, 1023 int ap_scan); 1024int wpa_supplicant_set_bss_expiration_age(struct wpa_supplicant *wpa_s, 1025 unsigned int expire_age); 1026int wpa_supplicant_set_bss_expiration_count(struct wpa_supplicant *wpa_s, 1027 unsigned int expire_count); 1028int wpa_supplicant_set_scan_interval(struct wpa_supplicant *wpa_s, 1029 int scan_interval); 1030int wpa_supplicant_set_debug_params(struct wpa_global *global, 1031 int debug_level, int debug_timestamp, 1032 int debug_show_keys); 1033void free_hw_features(struct wpa_supplicant *wpa_s); 1034 1035void wpa_show_license(void); 1036 1037struct wpa_supplicant * wpa_supplicant_add_iface(struct wpa_global *global, 1038 struct wpa_interface *iface, 1039 struct wpa_supplicant *parent); 1040int wpa_supplicant_remove_iface(struct wpa_global *global, 1041 struct wpa_supplicant *wpa_s, 1042 int terminate); 1043struct wpa_supplicant * wpa_supplicant_get_iface(struct wpa_global *global, 1044 const char *ifname); 1045struct wpa_global * wpa_supplicant_init(struct wpa_params *params); 1046int wpa_supplicant_run(struct wpa_global *global); 1047void wpa_supplicant_deinit(struct wpa_global *global); 1048 1049int wpa_supplicant_scard_init(struct wpa_supplicant *wpa_s, 1050 struct wpa_ssid *ssid); 1051void wpa_supplicant_terminate_proc(struct wpa_global *global); 1052void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr, 1053 const u8 *buf, size_t len); 1054void wpa_supplicant_update_config(struct wpa_supplicant *wpa_s); 1055void wpa_supplicant_clear_status(struct wpa_supplicant *wpa_s); 1056void wpas_connection_failed(struct wpa_supplicant *wpa_s, const u8 *bssid); 1057int wpas_driver_bss_selection(struct wpa_supplicant *wpa_s); 1058int wpas_is_p2p_prioritized(struct wpa_supplicant *wpa_s); 1059void wpas_auth_failed(struct wpa_supplicant *wpa_s, char *reason); 1060void wpas_clear_temp_disabled(struct wpa_supplicant *wpa_s, 1061 struct wpa_ssid *ssid, int clear_failures); 1062int disallowed_bssid(struct wpa_supplicant *wpa_s, const u8 *bssid); 1063int disallowed_ssid(struct wpa_supplicant *wpa_s, const u8 *ssid, 1064 size_t ssid_len); 1065void wpas_request_connection(struct wpa_supplicant *wpa_s); 1066int wpas_build_ext_capab(struct wpa_supplicant *wpa_s, u8 *buf, size_t buflen); 1067int wpas_update_random_addr(struct wpa_supplicant *wpa_s, int style); 1068int wpas_update_random_addr_disassoc(struct wpa_supplicant *wpa_s); 1069void add_freq(int *freqs, int *num_freqs, int freq); 1070 1071void wpas_rrm_reset(struct wpa_supplicant *wpa_s); 1072void wpas_rrm_process_neighbor_rep(struct wpa_supplicant *wpa_s, 1073 const u8 *report, size_t report_len); 1074int wpas_rrm_send_neighbor_rep_request(struct wpa_supplicant *wpa_s, 1075 const struct wpa_ssid *ssid, 1076 void (*cb)(void *ctx, 1077 struct wpabuf *neighbor_rep), 1078 void *cb_ctx); 1079void wpas_rrm_handle_link_measurement_request(struct wpa_supplicant *wpa_s, 1080 const u8 *src, 1081 const u8 *frame, size_t len, 1082 int rssi); 1083 1084/** 1085 * wpa_supplicant_ctrl_iface_ctrl_rsp_handle - Handle a control response 1086 * @wpa_s: Pointer to wpa_supplicant data 1087 * @ssid: Pointer to the network block the reply is for 1088 * @field: field the response is a reply for 1089 * @value: value (ie, password, etc) for @field 1090 * Returns: 0 on success, non-zero on error 1091 * 1092 * Helper function to handle replies to control interface requests. 1093 */ 1094int wpa_supplicant_ctrl_iface_ctrl_rsp_handle(struct wpa_supplicant *wpa_s, 1095 struct wpa_ssid *ssid, 1096 const char *field, 1097 const char *value); 1098 1099void ibss_mesh_setup_freq(struct wpa_supplicant *wpa_s, 1100 const struct wpa_ssid *ssid, 1101 struct hostapd_freq_params *freq); 1102 1103/* events.c */ 1104void wpa_supplicant_mark_disassoc(struct wpa_supplicant *wpa_s); 1105int wpa_supplicant_connect(struct wpa_supplicant *wpa_s, 1106 struct wpa_bss *selected, 1107 struct wpa_ssid *ssid); 1108void wpa_supplicant_stop_countermeasures(void *eloop_ctx, void *sock_ctx); 1109void wpa_supplicant_delayed_mic_error_report(void *eloop_ctx, void *sock_ctx); 1110void wnm_bss_keep_alive_deinit(struct wpa_supplicant *wpa_s); 1111int wpa_supplicant_fast_associate(struct wpa_supplicant *wpa_s); 1112struct wpa_bss * wpa_supplicant_pick_network(struct wpa_supplicant *wpa_s, 1113 struct wpa_ssid **selected_ssid); 1114 1115/* eap_register.c */ 1116int eap_register_methods(void); 1117 1118/** 1119 * Utility method to tell if a given network is a persistent group 1120 * @ssid: Network object 1121 * Returns: 1 if network is a persistent group, 0 otherwise 1122 */ 1123static inline int network_is_persistent_group(struct wpa_ssid *ssid) 1124{ 1125 return ((ssid->disabled == 2) || ssid->p2p_persistent_group); 1126} 1127 1128int wpas_network_disabled(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid); 1129int wpas_get_ssid_pmf(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid); 1130 1131int wpas_init_ext_pw(struct wpa_supplicant *wpa_s); 1132 1133void dump_freq_data(struct wpa_supplicant *wpa_s, const char *title, 1134 struct wpa_used_freq_data *freqs_data, 1135 unsigned int len); 1136 1137int get_shared_radio_freqs_data(struct wpa_supplicant *wpa_s, 1138 struct wpa_used_freq_data *freqs_data, 1139 unsigned int len); 1140int get_shared_radio_freqs(struct wpa_supplicant *wpa_s, 1141 int *freq_array, unsigned int len); 1142 1143#endif /* WPA_SUPPLICANT_I_H */ 1144