Home | History | Annotate | Download | only in ap
      1 /*
      2  * hostapd - Driver operations
      3  * Copyright (c) 2009-2010, Jouni Malinen <j (at) w1.fi>
      4  *
      5  * This software may be distributed under the terms of the BSD license.
      6  * See README for more details.
      7  */
      8 
      9 #include "utils/includes.h"
     10 
     11 #include "utils/common.h"
     12 #include "common/ieee802_11_defs.h"
     13 #include "wps/wps.h"
     14 #include "p2p/p2p.h"
     15 #include "hostapd.h"
     16 #include "ieee802_11.h"
     17 #include "sta_info.h"
     18 #include "ap_config.h"
     19 #include "p2p_hostapd.h"
     20 #include "hs20.h"
     21 #include "ap_drv_ops.h"
     22 
     23 
     24 u32 hostapd_sta_flags_to_drv(u32 flags)
     25 {
     26 	int res = 0;
     27 	if (flags & WLAN_STA_AUTHORIZED)
     28 		res |= WPA_STA_AUTHORIZED;
     29 	if (flags & WLAN_STA_WMM)
     30 		res |= WPA_STA_WMM;
     31 	if (flags & WLAN_STA_SHORT_PREAMBLE)
     32 		res |= WPA_STA_SHORT_PREAMBLE;
     33 	if (flags & WLAN_STA_MFP)
     34 		res |= WPA_STA_MFP;
     35 	return res;
     36 }
     37 
     38 
     39 int hostapd_build_ap_extra_ies(struct hostapd_data *hapd,
     40 			       struct wpabuf **beacon_ret,
     41 			       struct wpabuf **proberesp_ret,
     42 			       struct wpabuf **assocresp_ret)
     43 {
     44 	struct wpabuf *beacon = NULL, *proberesp = NULL, *assocresp = NULL;
     45 	u8 buf[200], *pos;
     46 
     47 	*beacon_ret = *proberesp_ret = *assocresp_ret = NULL;
     48 
     49 	pos = buf;
     50 	pos = hostapd_eid_time_adv(hapd, pos);
     51 	if (pos != buf) {
     52 		if (wpabuf_resize(&beacon, pos - buf) != 0)
     53 			goto fail;
     54 		wpabuf_put_data(beacon, buf, pos - buf);
     55 	}
     56 	pos = hostapd_eid_time_zone(hapd, pos);
     57 	if (pos != buf) {
     58 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
     59 			goto fail;
     60 		wpabuf_put_data(proberesp, buf, pos - buf);
     61 	}
     62 
     63 	pos = buf;
     64 	pos = hostapd_eid_ext_capab(hapd, pos);
     65 	if (pos != buf) {
     66 		if (wpabuf_resize(&assocresp, pos - buf) != 0)
     67 			goto fail;
     68 		wpabuf_put_data(assocresp, buf, pos - buf);
     69 	}
     70 	pos = hostapd_eid_interworking(hapd, pos);
     71 	pos = hostapd_eid_adv_proto(hapd, pos);
     72 	pos = hostapd_eid_roaming_consortium(hapd, pos);
     73 	if (pos != buf) {
     74 		if (wpabuf_resize(&beacon, pos - buf) != 0)
     75 			goto fail;
     76 		wpabuf_put_data(beacon, buf, pos - buf);
     77 
     78 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
     79 			goto fail;
     80 		wpabuf_put_data(proberesp, buf, pos - buf);
     81 	}
     82 
     83 	if (hapd->wps_beacon_ie) {
     84 		if (wpabuf_resize(&beacon, wpabuf_len(hapd->wps_beacon_ie)) <
     85 		    0)
     86 			goto fail;
     87 		wpabuf_put_buf(beacon, hapd->wps_beacon_ie);
     88 	}
     89 
     90 	if (hapd->wps_probe_resp_ie) {
     91 		if (wpabuf_resize(&proberesp,
     92 				  wpabuf_len(hapd->wps_probe_resp_ie)) < 0)
     93 			goto fail;
     94 		wpabuf_put_buf(proberesp, hapd->wps_probe_resp_ie);
     95 	}
     96 
     97 #ifdef CONFIG_P2P
     98 	if (hapd->p2p_beacon_ie) {
     99 		if (wpabuf_resize(&beacon, wpabuf_len(hapd->p2p_beacon_ie)) <
    100 		    0)
    101 			goto fail;
    102 		wpabuf_put_buf(beacon, hapd->p2p_beacon_ie);
    103 	}
    104 
    105 	if (hapd->p2p_probe_resp_ie) {
    106 		if (wpabuf_resize(&proberesp,
    107 				  wpabuf_len(hapd->p2p_probe_resp_ie)) < 0)
    108 			goto fail;
    109 		wpabuf_put_buf(proberesp, hapd->p2p_probe_resp_ie);
    110 	}
    111 #endif /* CONFIG_P2P */
    112 
    113 #ifdef CONFIG_P2P_MANAGER
    114 	if (hapd->conf->p2p & P2P_MANAGE) {
    115 		if (wpabuf_resize(&beacon, 100) == 0) {
    116 			u8 *start, *p;
    117 			start = wpabuf_put(beacon, 0);
    118 			p = hostapd_eid_p2p_manage(hapd, start);
    119 			wpabuf_put(beacon, p - start);
    120 		}
    121 
    122 		if (wpabuf_resize(&proberesp, 100) == 0) {
    123 			u8 *start, *p;
    124 			start = wpabuf_put(proberesp, 0);
    125 			p = hostapd_eid_p2p_manage(hapd, start);
    126 			wpabuf_put(proberesp, p - start);
    127 		}
    128 	}
    129 #endif /* CONFIG_P2P_MANAGER */
    130 
    131 #ifdef CONFIG_WPS
    132 	if (hapd->conf->wps_state) {
    133 		struct wpabuf *a = wps_build_assoc_resp_ie();
    134 		if (a && wpabuf_resize(&assocresp, wpabuf_len(a)) == 0)
    135 			wpabuf_put_buf(assocresp, a);
    136 		wpabuf_free(a);
    137 	}
    138 #endif /* CONFIG_WPS */
    139 
    140 #ifdef CONFIG_P2P_MANAGER
    141 	if (hapd->conf->p2p & P2P_MANAGE) {
    142 		if (wpabuf_resize(&assocresp, 100) == 0) {
    143 			u8 *start, *p;
    144 			start = wpabuf_put(assocresp, 0);
    145 			p = hostapd_eid_p2p_manage(hapd, start);
    146 			wpabuf_put(assocresp, p - start);
    147 		}
    148 	}
    149 #endif /* CONFIG_P2P_MANAGER */
    150 
    151 #ifdef CONFIG_WIFI_DISPLAY
    152 	if (hapd->p2p_group) {
    153 		struct wpabuf *a;
    154 		a = p2p_group_assoc_resp_ie(hapd->p2p_group, P2P_SC_SUCCESS);
    155 		if (a && wpabuf_resize(&assocresp, wpabuf_len(a)) == 0)
    156 			wpabuf_put_buf(assocresp, a);
    157 		wpabuf_free(a);
    158 	}
    159 #endif /* CONFIG_WIFI_DISPLAY */
    160 
    161 #ifdef CONFIG_HS20
    162 	pos = buf;
    163 	pos = hostapd_eid_hs20_indication(hapd, pos);
    164 	if (pos != buf) {
    165 		if (wpabuf_resize(&beacon, pos - buf) != 0)
    166 			goto fail;
    167 		wpabuf_put_data(beacon, buf, pos - buf);
    168 
    169 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
    170 			goto fail;
    171 		wpabuf_put_data(proberesp, buf, pos - buf);
    172 	}
    173 
    174 	pos = hostapd_eid_osen(hapd, buf);
    175 	if (pos != buf) {
    176 		if (wpabuf_resize(&beacon, pos - buf) != 0)
    177 			goto fail;
    178 		wpabuf_put_data(beacon, buf, pos - buf);
    179 
    180 		if (wpabuf_resize(&proberesp, pos - buf) != 0)
    181 			goto fail;
    182 		wpabuf_put_data(proberesp, buf, pos - buf);
    183 	}
    184 #endif /* CONFIG_HS20 */
    185 
    186 	if (hapd->conf->vendor_elements) {
    187 		size_t add = wpabuf_len(hapd->conf->vendor_elements);
    188 		if (wpabuf_resize(&beacon, add) == 0)
    189 			wpabuf_put_buf(beacon, hapd->conf->vendor_elements);
    190 		if (wpabuf_resize(&proberesp, add) == 0)
    191 			wpabuf_put_buf(proberesp, hapd->conf->vendor_elements);
    192 	}
    193 
    194 	*beacon_ret = beacon;
    195 	*proberesp_ret = proberesp;
    196 	*assocresp_ret = assocresp;
    197 
    198 	return 0;
    199 
    200 fail:
    201 	wpabuf_free(beacon);
    202 	wpabuf_free(proberesp);
    203 	wpabuf_free(assocresp);
    204 	return -1;
    205 }
    206 
    207 
    208 void hostapd_free_ap_extra_ies(struct hostapd_data *hapd,
    209 			       struct wpabuf *beacon,
    210 			       struct wpabuf *proberesp,
    211 			       struct wpabuf *assocresp)
    212 {
    213 	wpabuf_free(beacon);
    214 	wpabuf_free(proberesp);
    215 	wpabuf_free(assocresp);
    216 }
    217 
    218 
    219 int hostapd_set_ap_wps_ie(struct hostapd_data *hapd)
    220 {
    221 	struct wpabuf *beacon, *proberesp, *assocresp;
    222 	int ret;
    223 
    224 	if (hapd->driver == NULL || hapd->driver->set_ap_wps_ie == NULL)
    225 		return 0;
    226 
    227 	if (hostapd_build_ap_extra_ies(hapd, &beacon, &proberesp, &assocresp) <
    228 	    0)
    229 		return -1;
    230 
    231 	ret = hapd->driver->set_ap_wps_ie(hapd->drv_priv, beacon, proberesp,
    232 					  assocresp);
    233 
    234 	hostapd_free_ap_extra_ies(hapd, beacon, proberesp, assocresp);
    235 
    236 	return ret;
    237 }
    238 
    239 
    240 int hostapd_set_authorized(struct hostapd_data *hapd,
    241 			   struct sta_info *sta, int authorized)
    242 {
    243 	if (authorized) {
    244 		return hostapd_sta_set_flags(hapd, sta->addr,
    245 					     hostapd_sta_flags_to_drv(
    246 						     sta->flags),
    247 					     WPA_STA_AUTHORIZED, ~0);
    248 	}
    249 
    250 	return hostapd_sta_set_flags(hapd, sta->addr,
    251 				     hostapd_sta_flags_to_drv(sta->flags),
    252 				     0, ~WPA_STA_AUTHORIZED);
    253 }
    254 
    255 
    256 int hostapd_set_sta_flags(struct hostapd_data *hapd, struct sta_info *sta)
    257 {
    258 	int set_flags, total_flags, flags_and, flags_or;
    259 	total_flags = hostapd_sta_flags_to_drv(sta->flags);
    260 	set_flags = WPA_STA_SHORT_PREAMBLE | WPA_STA_WMM | WPA_STA_MFP;
    261 	if (((!hapd->conf->ieee802_1x && !hapd->conf->wpa) ||
    262 	     sta->auth_alg == WLAN_AUTH_FT) &&
    263 	    sta->flags & WLAN_STA_AUTHORIZED)
    264 		set_flags |= WPA_STA_AUTHORIZED;
    265 	flags_or = total_flags & set_flags;
    266 	flags_and = total_flags | ~set_flags;
    267 	return hostapd_sta_set_flags(hapd, sta->addr, total_flags,
    268 				     flags_or, flags_and);
    269 }
    270 
    271 
    272 int hostapd_set_drv_ieee8021x(struct hostapd_data *hapd, const char *ifname,
    273 			      int enabled)
    274 {
    275 	struct wpa_bss_params params;
    276 	os_memset(&params, 0, sizeof(params));
    277 	params.ifname = ifname;
    278 	params.enabled = enabled;
    279 	if (enabled) {
    280 		params.wpa = hapd->conf->wpa;
    281 		params.ieee802_1x = hapd->conf->ieee802_1x;
    282 		params.wpa_group = hapd->conf->wpa_group;
    283 		params.wpa_pairwise = hapd->conf->wpa_pairwise |
    284 			hapd->conf->rsn_pairwise;
    285 		params.wpa_key_mgmt = hapd->conf->wpa_key_mgmt;
    286 		params.rsn_preauth = hapd->conf->rsn_preauth;
    287 #ifdef CONFIG_IEEE80211W
    288 		params.ieee80211w = hapd->conf->ieee80211w;
    289 #endif /* CONFIG_IEEE80211W */
    290 	}
    291 	return hostapd_set_ieee8021x(hapd, &params);
    292 }
    293 
    294 
    295 int hostapd_vlan_if_add(struct hostapd_data *hapd, const char *ifname)
    296 {
    297 	char force_ifname[IFNAMSIZ];
    298 	u8 if_addr[ETH_ALEN];
    299 	return hostapd_if_add(hapd, WPA_IF_AP_VLAN, ifname, hapd->own_addr,
    300 			      NULL, NULL, force_ifname, if_addr, NULL, 0);
    301 }
    302 
    303 
    304 int hostapd_vlan_if_remove(struct hostapd_data *hapd, const char *ifname)
    305 {
    306 	return hostapd_if_remove(hapd, WPA_IF_AP_VLAN, ifname);
    307 }
    308 
    309 
    310 int hostapd_set_wds_sta(struct hostapd_data *hapd, char *ifname_wds,
    311 			const u8 *addr, int aid, int val)
    312 {
    313 	const char *bridge = NULL;
    314 
    315 	if (hapd->driver == NULL || hapd->driver->set_wds_sta == NULL)
    316 		return -1;
    317 	if (hapd->conf->wds_bridge[0])
    318 		bridge = hapd->conf->wds_bridge;
    319 	else if (hapd->conf->bridge[0])
    320 		bridge = hapd->conf->bridge;
    321 	return hapd->driver->set_wds_sta(hapd->drv_priv, addr, aid, val,
    322 					 bridge, ifname_wds);
    323 }
    324 
    325 
    326 int hostapd_add_sta_node(struct hostapd_data *hapd, const u8 *addr,
    327 			 u16 auth_alg)
    328 {
    329 	if (hapd->driver == NULL || hapd->driver->add_sta_node == NULL)
    330 		return 0;
    331 	return hapd->driver->add_sta_node(hapd->drv_priv, addr, auth_alg);
    332 }
    333 
    334 
    335 int hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr,
    336 		     u16 seq, u16 status, const u8 *ie, size_t len)
    337 {
    338 	if (hapd->driver == NULL || hapd->driver->sta_auth == NULL)
    339 		return 0;
    340 	return hapd->driver->sta_auth(hapd->drv_priv, hapd->own_addr, addr,
    341 				      seq, status, ie, len);
    342 }
    343 
    344 
    345 int hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr,
    346 		      int reassoc, u16 status, const u8 *ie, size_t len)
    347 {
    348 	if (hapd->driver == NULL || hapd->driver->sta_assoc == NULL)
    349 		return 0;
    350 	return hapd->driver->sta_assoc(hapd->drv_priv, hapd->own_addr, addr,
    351 				       reassoc, status, ie, len);
    352 }
    353 
    354 
    355 int hostapd_sta_add(struct hostapd_data *hapd,
    356 		    const u8 *addr, u16 aid, u16 capability,
    357 		    const u8 *supp_rates, size_t supp_rates_len,
    358 		    u16 listen_interval,
    359 		    const struct ieee80211_ht_capabilities *ht_capab,
    360 		    const struct ieee80211_vht_capabilities *vht_capab,
    361 		    u32 flags, u8 qosinfo, u8 vht_opmode)
    362 {
    363 	struct hostapd_sta_add_params params;
    364 
    365 	if (hapd->driver == NULL)
    366 		return 0;
    367 	if (hapd->driver->sta_add == NULL)
    368 		return 0;
    369 
    370 	os_memset(&params, 0, sizeof(params));
    371 	params.addr = addr;
    372 	params.aid = aid;
    373 	params.capability = capability;
    374 	params.supp_rates = supp_rates;
    375 	params.supp_rates_len = supp_rates_len;
    376 	params.listen_interval = listen_interval;
    377 	params.ht_capabilities = ht_capab;
    378 	params.vht_capabilities = vht_capab;
    379 	params.vht_opmode_enabled = !!(flags & WLAN_STA_VHT_OPMODE_ENABLED);
    380 	params.vht_opmode = vht_opmode;
    381 	params.flags = hostapd_sta_flags_to_drv(flags);
    382 	params.qosinfo = qosinfo;
    383 	return hapd->driver->sta_add(hapd->drv_priv, &params);
    384 }
    385 
    386 
    387 int hostapd_add_tspec(struct hostapd_data *hapd, const u8 *addr,
    388 		      u8 *tspec_ie, size_t tspec_ielen)
    389 {
    390 	if (hapd->driver == NULL || hapd->driver->add_tspec == NULL)
    391 		return 0;
    392 	return hapd->driver->add_tspec(hapd->drv_priv, addr, tspec_ie,
    393 				       tspec_ielen);
    394 }
    395 
    396 
    397 int hostapd_set_privacy(struct hostapd_data *hapd, int enabled)
    398 {
    399 	if (hapd->driver == NULL || hapd->driver->set_privacy == NULL)
    400 		return 0;
    401 	return hapd->driver->set_privacy(hapd->drv_priv, enabled);
    402 }
    403 
    404 
    405 int hostapd_set_generic_elem(struct hostapd_data *hapd, const u8 *elem,
    406 			     size_t elem_len)
    407 {
    408 	if (hapd->driver == NULL || hapd->driver->set_generic_elem == NULL)
    409 		return 0;
    410 	return hapd->driver->set_generic_elem(hapd->drv_priv, elem, elem_len);
    411 }
    412 
    413 
    414 int hostapd_get_ssid(struct hostapd_data *hapd, u8 *buf, size_t len)
    415 {
    416 	if (hapd->driver == NULL || hapd->driver->hapd_get_ssid == NULL)
    417 		return 0;
    418 	return hapd->driver->hapd_get_ssid(hapd->drv_priv, buf, len);
    419 }
    420 
    421 
    422 int hostapd_set_ssid(struct hostapd_data *hapd, const u8 *buf, size_t len)
    423 {
    424 	if (hapd->driver == NULL || hapd->driver->hapd_set_ssid == NULL)
    425 		return 0;
    426 	return hapd->driver->hapd_set_ssid(hapd->drv_priv, buf, len);
    427 }
    428 
    429 
    430 int hostapd_if_add(struct hostapd_data *hapd, enum wpa_driver_if_type type,
    431 		   const char *ifname, const u8 *addr, void *bss_ctx,
    432 		   void **drv_priv, char *force_ifname, u8 *if_addr,
    433 		   const char *bridge, int use_existing)
    434 {
    435 	if (hapd->driver == NULL || hapd->driver->if_add == NULL)
    436 		return -1;
    437 	return hapd->driver->if_add(hapd->drv_priv, type, ifname, addr,
    438 				    bss_ctx, drv_priv, force_ifname, if_addr,
    439 				    bridge, use_existing);
    440 }
    441 
    442 
    443 int hostapd_if_remove(struct hostapd_data *hapd, enum wpa_driver_if_type type,
    444 		      const char *ifname)
    445 {
    446 	if (hapd->driver == NULL || hapd->drv_priv == NULL ||
    447 	    hapd->driver->if_remove == NULL)
    448 		return -1;
    449 	return hapd->driver->if_remove(hapd->drv_priv, type, ifname);
    450 }
    451 
    452 
    453 int hostapd_set_ieee8021x(struct hostapd_data *hapd,
    454 			  struct wpa_bss_params *params)
    455 {
    456 	if (hapd->driver == NULL || hapd->driver->set_ieee8021x == NULL)
    457 		return 0;
    458 	return hapd->driver->set_ieee8021x(hapd->drv_priv, params);
    459 }
    460 
    461 
    462 int hostapd_get_seqnum(const char *ifname, struct hostapd_data *hapd,
    463 		       const u8 *addr, int idx, u8 *seq)
    464 {
    465 	if (hapd->driver == NULL || hapd->driver->get_seqnum == NULL)
    466 		return 0;
    467 	return hapd->driver->get_seqnum(ifname, hapd->drv_priv, addr, idx,
    468 					seq);
    469 }
    470 
    471 
    472 int hostapd_flush(struct hostapd_data *hapd)
    473 {
    474 	if (hapd->driver == NULL || hapd->driver->flush == NULL)
    475 		return 0;
    476 	return hapd->driver->flush(hapd->drv_priv);
    477 }
    478 
    479 
    480 int hostapd_set_freq_params(struct hostapd_freq_params *data, int mode,
    481 			    int freq, int channel, int ht_enabled,
    482 			    int vht_enabled, int sec_channel_offset,
    483 			    int vht_oper_chwidth, int center_segment0,
    484 			    int center_segment1, u32 vht_caps)
    485 {
    486 	int tmp;
    487 
    488 	os_memset(data, 0, sizeof(*data));
    489 	data->mode = mode;
    490 	data->freq = freq;
    491 	data->channel = channel;
    492 	data->ht_enabled = ht_enabled;
    493 	data->vht_enabled = vht_enabled;
    494 	data->sec_channel_offset = sec_channel_offset;
    495 	data->center_freq1 = freq + sec_channel_offset * 10;
    496 	data->center_freq2 = 0;
    497 	data->bandwidth = sec_channel_offset ? 40 : 20;
    498 
    499 	/*
    500 	 * This validation code is probably misplaced, maybe it should be
    501 	 * in src/ap/hw_features.c and check the hardware support as well.
    502 	 */
    503 	if (data->vht_enabled) switch (vht_oper_chwidth) {
    504 	case VHT_CHANWIDTH_USE_HT:
    505 		if (center_segment1)
    506 			return -1;
    507 		if (center_segment0 != 0 &&
    508 		    5000 + center_segment0 * 5 != data->center_freq1 &&
    509 		    2407 + center_segment0 * 5 != data->center_freq1)
    510 			return -1;
    511 		break;
    512 	case VHT_CHANWIDTH_80P80MHZ:
    513 		if (!(vht_caps & VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ)) {
    514 			wpa_printf(MSG_ERROR,
    515 				   "80+80 channel width is not supported!");
    516 			return -1;
    517 		}
    518 		if (center_segment1 == center_segment0 + 4 ||
    519 		    center_segment1 == center_segment0 - 4)
    520 			return -1;
    521 		data->center_freq2 = 5000 + center_segment1 * 5;
    522 		/* fall through */
    523 	case VHT_CHANWIDTH_80MHZ:
    524 		data->bandwidth = 80;
    525 		if (vht_oper_chwidth == 1 && center_segment1)
    526 			return -1;
    527 		if (vht_oper_chwidth == 3 && !center_segment1)
    528 			return -1;
    529 		if (!sec_channel_offset)
    530 			return -1;
    531 		/* primary 40 part must match the HT configuration */
    532 		tmp = (30 + freq - 5000 - center_segment0 * 5)/20;
    533 		tmp /= 2;
    534 		if (data->center_freq1 != 5000 +
    535 					 center_segment0 * 5 - 20 + 40 * tmp)
    536 			return -1;
    537 		data->center_freq1 = 5000 + center_segment0 * 5;
    538 		break;
    539 	case VHT_CHANWIDTH_160MHZ:
    540 		data->bandwidth = 160;
    541 		if (!(vht_caps & (VHT_CAP_SUPP_CHAN_WIDTH_160MHZ |
    542 				  VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ))) {
    543 			wpa_printf(MSG_ERROR,
    544 				   "160MHZ channel width is not supported!");
    545 			return -1;
    546 		}
    547 		if (center_segment1)
    548 			return -1;
    549 		if (!sec_channel_offset)
    550 			return -1;
    551 		/* primary 40 part must match the HT configuration */
    552 		tmp = (70 + freq - 5000 - center_segment0 * 5)/20;
    553 		tmp /= 2;
    554 		if (data->center_freq1 != 5000 +
    555 					 center_segment0 * 5 - 60 + 40 * tmp)
    556 			return -1;
    557 		data->center_freq1 = 5000 + center_segment0 * 5;
    558 		break;
    559 	}
    560 
    561 	return 0;
    562 }
    563 
    564 
    565 int hostapd_set_freq(struct hostapd_data *hapd, int mode, int freq,
    566 		     int channel, int ht_enabled, int vht_enabled,
    567 		     int sec_channel_offset, int vht_oper_chwidth,
    568 		     int center_segment0, int center_segment1)
    569 {
    570 	struct hostapd_freq_params data;
    571 
    572 	if (hostapd_set_freq_params(&data, mode, freq, channel, ht_enabled,
    573 				    vht_enabled, sec_channel_offset,
    574 				    vht_oper_chwidth,
    575 				    center_segment0, center_segment1,
    576 				    hapd->iface->current_mode->vht_capab))
    577 		return -1;
    578 
    579 	if (hapd->driver == NULL)
    580 		return 0;
    581 	if (hapd->driver->set_freq == NULL)
    582 		return 0;
    583 	return hapd->driver->set_freq(hapd->drv_priv, &data);
    584 }
    585 
    586 int hostapd_set_rts(struct hostapd_data *hapd, int rts)
    587 {
    588 	if (hapd->driver == NULL || hapd->driver->set_rts == NULL)
    589 		return 0;
    590 	return hapd->driver->set_rts(hapd->drv_priv, rts);
    591 }
    592 
    593 
    594 int hostapd_set_frag(struct hostapd_data *hapd, int frag)
    595 {
    596 	if (hapd->driver == NULL || hapd->driver->set_frag == NULL)
    597 		return 0;
    598 	return hapd->driver->set_frag(hapd->drv_priv, frag);
    599 }
    600 
    601 
    602 int hostapd_sta_set_flags(struct hostapd_data *hapd, u8 *addr,
    603 			  int total_flags, int flags_or, int flags_and)
    604 {
    605 	if (hapd->driver == NULL || hapd->driver->sta_set_flags == NULL)
    606 		return 0;
    607 	return hapd->driver->sta_set_flags(hapd->drv_priv, addr, total_flags,
    608 					   flags_or, flags_and);
    609 }
    610 
    611 
    612 int hostapd_set_country(struct hostapd_data *hapd, const char *country)
    613 {
    614 	if (hapd->driver == NULL ||
    615 	    hapd->driver->set_country == NULL)
    616 		return 0;
    617 	return hapd->driver->set_country(hapd->drv_priv, country);
    618 }
    619 
    620 
    621 int hostapd_set_tx_queue_params(struct hostapd_data *hapd, int queue, int aifs,
    622 				int cw_min, int cw_max, int burst_time)
    623 {
    624 	if (hapd->driver == NULL || hapd->driver->set_tx_queue_params == NULL)
    625 		return 0;
    626 	return hapd->driver->set_tx_queue_params(hapd->drv_priv, queue, aifs,
    627 						 cw_min, cw_max, burst_time);
    628 }
    629 
    630 
    631 struct hostapd_hw_modes *
    632 hostapd_get_hw_feature_data(struct hostapd_data *hapd, u16 *num_modes,
    633 			    u16 *flags)
    634 {
    635 	if (hapd->driver == NULL ||
    636 	    hapd->driver->get_hw_feature_data == NULL)
    637 		return NULL;
    638 	return hapd->driver->get_hw_feature_data(hapd->drv_priv, num_modes,
    639 						 flags);
    640 }
    641 
    642 
    643 int hostapd_driver_commit(struct hostapd_data *hapd)
    644 {
    645 	if (hapd->driver == NULL || hapd->driver->commit == NULL)
    646 		return 0;
    647 	return hapd->driver->commit(hapd->drv_priv);
    648 }
    649 
    650 
    651 int hostapd_drv_none(struct hostapd_data *hapd)
    652 {
    653 	return hapd->driver && os_strcmp(hapd->driver->name, "none") == 0;
    654 }
    655 
    656 
    657 int hostapd_driver_scan(struct hostapd_data *hapd,
    658 			struct wpa_driver_scan_params *params)
    659 {
    660 	if (hapd->driver && hapd->driver->scan2)
    661 		return hapd->driver->scan2(hapd->drv_priv, params);
    662 	return -1;
    663 }
    664 
    665 
    666 struct wpa_scan_results * hostapd_driver_get_scan_results(
    667 	struct hostapd_data *hapd)
    668 {
    669 	if (hapd->driver && hapd->driver->get_scan_results2)
    670 		return hapd->driver->get_scan_results2(hapd->drv_priv);
    671 	return NULL;
    672 }
    673 
    674 
    675 int hostapd_driver_set_noa(struct hostapd_data *hapd, u8 count, int start,
    676 			   int duration)
    677 {
    678 	if (hapd->driver && hapd->driver->set_noa)
    679 		return hapd->driver->set_noa(hapd->drv_priv, count, start,
    680 					     duration);
    681 	return -1;
    682 }
    683 
    684 
    685 int hostapd_drv_set_key(const char *ifname, struct hostapd_data *hapd,
    686 			enum wpa_alg alg, const u8 *addr,
    687 			int key_idx, int set_tx,
    688 			const u8 *seq, size_t seq_len,
    689 			const u8 *key, size_t key_len)
    690 {
    691 	if (hapd->driver == NULL || hapd->driver->set_key == NULL)
    692 		return 0;
    693 	return hapd->driver->set_key(ifname, hapd->drv_priv, alg, addr,
    694 				     key_idx, set_tx, seq, seq_len, key,
    695 				     key_len);
    696 }
    697 
    698 
    699 int hostapd_drv_send_mlme(struct hostapd_data *hapd,
    700 			  const void *msg, size_t len, int noack)
    701 {
    702 	if (hapd->driver == NULL || hapd->driver->send_mlme == NULL)
    703 		return 0;
    704 	return hapd->driver->send_mlme(hapd->drv_priv, msg, len, noack);
    705 }
    706 
    707 
    708 int hostapd_drv_sta_deauth(struct hostapd_data *hapd,
    709 			   const u8 *addr, int reason)
    710 {
    711 	if (hapd->driver == NULL || hapd->driver->sta_deauth == NULL)
    712 		return 0;
    713 	return hapd->driver->sta_deauth(hapd->drv_priv, hapd->own_addr, addr,
    714 					reason);
    715 }
    716 
    717 
    718 int hostapd_drv_sta_disassoc(struct hostapd_data *hapd,
    719 			     const u8 *addr, int reason)
    720 {
    721 	if (hapd->driver == NULL || hapd->driver->sta_disassoc == NULL)
    722 		return 0;
    723 	return hapd->driver->sta_disassoc(hapd->drv_priv, hapd->own_addr, addr,
    724 					  reason);
    725 }
    726 
    727 
    728 int hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper,
    729 			 const u8 *peer, u8 *buf, u16 *buf_len)
    730 {
    731 	if (hapd->driver == NULL || hapd->driver->wnm_oper == NULL)
    732 		return -1;
    733 	return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
    734 				      buf_len);
    735 }
    736 
    737 
    738 int hostapd_drv_send_action(struct hostapd_data *hapd, unsigned int freq,
    739 			    unsigned int wait, const u8 *dst, const u8 *data,
    740 			    size_t len)
    741 {
    742 	if (hapd->driver == NULL || hapd->driver->send_action == NULL)
    743 		return 0;
    744 	return hapd->driver->send_action(hapd->drv_priv, freq, wait, dst,
    745 					 hapd->own_addr, hapd->own_addr, data,
    746 					 len, 0);
    747 }
    748 
    749 
    750 int hostapd_start_dfs_cac(struct hostapd_iface *iface, int mode, int freq,
    751 			  int channel, int ht_enabled, int vht_enabled,
    752 			  int sec_channel_offset, int vht_oper_chwidth,
    753 			  int center_segment0, int center_segment1)
    754 {
    755 	struct hostapd_data *hapd = iface->bss[0];
    756 	struct hostapd_freq_params data;
    757 	int res;
    758 
    759 	if (!hapd->driver || !hapd->driver->start_dfs_cac)
    760 		return 0;
    761 
    762 	if (!iface->conf->ieee80211h) {
    763 		wpa_printf(MSG_ERROR, "Can't start DFS CAC, DFS functionality "
    764 			   "is not enabled");
    765 		return -1;
    766 	}
    767 
    768 	if (hostapd_set_freq_params(&data, mode, freq, channel, ht_enabled,
    769 				    vht_enabled, sec_channel_offset,
    770 				    vht_oper_chwidth, center_segment0,
    771 				    center_segment1,
    772 				    iface->current_mode->vht_capab)) {
    773 		wpa_printf(MSG_ERROR, "Can't set freq params");
    774 		return -1;
    775 	}
    776 
    777 	res = hapd->driver->start_dfs_cac(hapd->drv_priv, &data);
    778 	if (!res) {
    779 		iface->cac_started = 1;
    780 		os_get_reltime(&iface->dfs_cac_start);
    781 	}
    782 
    783 	return res;
    784 }
    785 
    786 
    787 int hostapd_drv_set_qos_map(struct hostapd_data *hapd,
    788 			    const u8 *qos_map_set, u8 qos_map_set_len)
    789 {
    790 	if (hapd->driver == NULL || hapd->driver->set_qos_map == NULL)
    791 		return 0;
    792 	return hapd->driver->set_qos_map(hapd->drv_priv, qos_map_set,
    793 					 qos_map_set_len);
    794 }
    795