Home | History | Annotate | Download | only in drivers
      1 /*
      2  * Common driver-related functions
      3  * Copyright (c) 2003-2017, Jouni Malinen <j (at) w1.fi>
      4  *
      5  * This software may be distributed under the terms of the BSD license.
      6  * See README for more details.
      7  */
      8 
      9 #include "includes.h"
     10 #include "utils/common.h"
     11 #include "driver.h"
     12 
     13 void wpa_scan_results_free(struct wpa_scan_results *res)
     14 {
     15 	size_t i;
     16 
     17 	if (res == NULL)
     18 		return;
     19 
     20 	for (i = 0; i < res->num; i++)
     21 		os_free(res->res[i]);
     22 	os_free(res->res);
     23 	os_free(res);
     24 }
     25 
     26 
     27 const char * event_to_string(enum wpa_event_type event)
     28 {
     29 #define E2S(n) case EVENT_ ## n: return #n
     30 	switch (event) {
     31 	E2S(ASSOC);
     32 	E2S(DISASSOC);
     33 	E2S(MICHAEL_MIC_FAILURE);
     34 	E2S(SCAN_RESULTS);
     35 	E2S(ASSOCINFO);
     36 	E2S(INTERFACE_STATUS);
     37 	E2S(PMKID_CANDIDATE);
     38 	E2S(TDLS);
     39 	E2S(FT_RESPONSE);
     40 	E2S(IBSS_RSN_START);
     41 	E2S(AUTH);
     42 	E2S(DEAUTH);
     43 	E2S(ASSOC_REJECT);
     44 	E2S(AUTH_TIMED_OUT);
     45 	E2S(ASSOC_TIMED_OUT);
     46 	E2S(WPS_BUTTON_PUSHED);
     47 	E2S(TX_STATUS);
     48 	E2S(RX_FROM_UNKNOWN);
     49 	E2S(RX_MGMT);
     50 	E2S(REMAIN_ON_CHANNEL);
     51 	E2S(CANCEL_REMAIN_ON_CHANNEL);
     52 	E2S(RX_PROBE_REQ);
     53 	E2S(NEW_STA);
     54 	E2S(EAPOL_RX);
     55 	E2S(SIGNAL_CHANGE);
     56 	E2S(INTERFACE_ENABLED);
     57 	E2S(INTERFACE_DISABLED);
     58 	E2S(CHANNEL_LIST_CHANGED);
     59 	E2S(INTERFACE_UNAVAILABLE);
     60 	E2S(BEST_CHANNEL);
     61 	E2S(UNPROT_DEAUTH);
     62 	E2S(UNPROT_DISASSOC);
     63 	E2S(STATION_LOW_ACK);
     64 	E2S(IBSS_PEER_LOST);
     65 	E2S(DRIVER_GTK_REKEY);
     66 	E2S(SCHED_SCAN_STOPPED);
     67 	E2S(DRIVER_CLIENT_POLL_OK);
     68 	E2S(EAPOL_TX_STATUS);
     69 	E2S(CH_SWITCH);
     70 	E2S(WNM);
     71 	E2S(CONNECT_FAILED_REASON);
     72 	E2S(DFS_RADAR_DETECTED);
     73 	E2S(DFS_CAC_FINISHED);
     74 	E2S(DFS_CAC_ABORTED);
     75 	E2S(DFS_NOP_FINISHED);
     76 	E2S(SURVEY);
     77 	E2S(SCAN_STARTED);
     78 	E2S(AVOID_FREQUENCIES);
     79 	E2S(NEW_PEER_CANDIDATE);
     80 	E2S(ACS_CHANNEL_SELECTED);
     81 	E2S(DFS_CAC_STARTED);
     82 	E2S(P2P_LO_STOP);
     83 	E2S(BEACON_LOSS);
     84 	E2S(DFS_PRE_CAC_EXPIRED);
     85 	}
     86 
     87 	return "UNKNOWN";
     88 #undef E2S
     89 }
     90 
     91 
     92 const char * channel_width_to_string(enum chan_width width)
     93 {
     94 	switch (width) {
     95 	case CHAN_WIDTH_20_NOHT:
     96 		return "20 MHz (no HT)";
     97 	case CHAN_WIDTH_20:
     98 		return "20 MHz";
     99 	case CHAN_WIDTH_40:
    100 		return "40 MHz";
    101 	case CHAN_WIDTH_80:
    102 		return "80 MHz";
    103 	case CHAN_WIDTH_80P80:
    104 		return "80+80 MHz";
    105 	case CHAN_WIDTH_160:
    106 		return "160 MHz";
    107 	default:
    108 		return "unknown";
    109 	}
    110 }
    111 
    112 
    113 int ht_supported(const struct hostapd_hw_modes *mode)
    114 {
    115 	if (!(mode->flags & HOSTAPD_MODE_FLAG_HT_INFO_KNOWN)) {
    116 		/*
    117 		 * The driver did not indicate whether it supports HT. Assume
    118 		 * it does to avoid connection issues.
    119 		 */
    120 		return 1;
    121 	}
    122 
    123 	/*
    124 	 * IEEE Std 802.11n-2009 20.1.1:
    125 	 * An HT non-AP STA shall support all EQM rates for one spatial stream.
    126 	 */
    127 	return mode->mcs_set[0] == 0xff;
    128 }
    129 
    130 
    131 int vht_supported(const struct hostapd_hw_modes *mode)
    132 {
    133 	if (!(mode->flags & HOSTAPD_MODE_FLAG_VHT_INFO_KNOWN)) {
    134 		/*
    135 		 * The driver did not indicate whether it supports VHT. Assume
    136 		 * it does to avoid connection issues.
    137 		 */
    138 		return 1;
    139 	}
    140 
    141 	/*
    142 	 * A VHT non-AP STA shall support MCS 0-7 for one spatial stream.
    143 	 * TODO: Verify if this complies with the standard
    144 	 */
    145 	return (mode->vht_mcs_set[0] & 0x3) != 3;
    146 }
    147 
    148 
    149 static int wpa_check_wowlan_trigger(const char *start, const char *trigger,
    150 				    int capa_trigger, u8 *param_trigger)
    151 {
    152 	if (os_strcmp(start, trigger) != 0)
    153 		return 0;
    154 	if (!capa_trigger)
    155 		return 0;
    156 
    157 	*param_trigger = 1;
    158 	return 1;
    159 }
    160 
    161 
    162 struct wowlan_triggers *
    163 wpa_get_wowlan_triggers(const char *wowlan_triggers,
    164 			const struct wpa_driver_capa *capa)
    165 {
    166 	struct wowlan_triggers *triggers;
    167 	char *start, *end, *buf;
    168 	int last;
    169 
    170 	if (!wowlan_triggers)
    171 		return NULL;
    172 
    173 	buf = os_strdup(wowlan_triggers);
    174 	if (buf == NULL)
    175 		return NULL;
    176 
    177 	triggers = os_zalloc(sizeof(*triggers));
    178 	if (triggers == NULL)
    179 		goto out;
    180 
    181 #define CHECK_TRIGGER(trigger) \
    182 	wpa_check_wowlan_trigger(start, #trigger,			\
    183 				  capa->wowlan_triggers.trigger,	\
    184 				  &triggers->trigger)
    185 
    186 	start = buf;
    187 	while (*start != '\0') {
    188 		while (isblank((unsigned char) *start))
    189 			start++;
    190 		if (*start == '\0')
    191 			break;
    192 		end = start;
    193 		while (!isblank((unsigned char) *end) && *end != '\0')
    194 			end++;
    195 		last = *end == '\0';
    196 		*end = '\0';
    197 
    198 		if (!CHECK_TRIGGER(any) &&
    199 		    !CHECK_TRIGGER(disconnect) &&
    200 		    !CHECK_TRIGGER(magic_pkt) &&
    201 		    !CHECK_TRIGGER(gtk_rekey_failure) &&
    202 		    !CHECK_TRIGGER(eap_identity_req) &&
    203 		    !CHECK_TRIGGER(four_way_handshake) &&
    204 		    !CHECK_TRIGGER(rfkill_release)) {
    205 			wpa_printf(MSG_DEBUG,
    206 				   "Unknown/unsupported wowlan trigger '%s'",
    207 				   start);
    208 			os_free(triggers);
    209 			triggers = NULL;
    210 			goto out;
    211 		}
    212 
    213 		if (last)
    214 			break;
    215 		start = end + 1;
    216 	}
    217 #undef CHECK_TRIGGER
    218 
    219 out:
    220 	os_free(buf);
    221 	return triggers;
    222 }
    223 
    224 
    225 const char * driver_flag_to_string(u64 flag)
    226 {
    227 #define DF2S(x) case WPA_DRIVER_FLAGS_ ## x: return #x
    228 	switch (flag) {
    229 	DF2S(DRIVER_IE);
    230 	DF2S(SET_KEYS_AFTER_ASSOC);
    231 	DF2S(DFS_OFFLOAD);
    232 	DF2S(4WAY_HANDSHAKE);
    233 	DF2S(WIRED);
    234 	DF2S(SME);
    235 	DF2S(AP);
    236 	DF2S(SET_KEYS_AFTER_ASSOC_DONE);
    237 	DF2S(HT_2040_COEX);
    238 	DF2S(P2P_CONCURRENT);
    239 	DF2S(P2P_DEDICATED_INTERFACE);
    240 	DF2S(P2P_CAPABLE);
    241 	DF2S(AP_TEARDOWN_SUPPORT);
    242 	DF2S(P2P_MGMT_AND_NON_P2P);
    243 	DF2S(SANE_ERROR_CODES);
    244 	DF2S(OFFCHANNEL_TX);
    245 	DF2S(EAPOL_TX_STATUS);
    246 	DF2S(DEAUTH_TX_STATUS);
    247 	DF2S(BSS_SELECTION);
    248 	DF2S(TDLS_SUPPORT);
    249 	DF2S(TDLS_EXTERNAL_SETUP);
    250 	DF2S(PROBE_RESP_OFFLOAD);
    251 	DF2S(AP_UAPSD);
    252 	DF2S(INACTIVITY_TIMER);
    253 	DF2S(AP_MLME);
    254 	DF2S(SAE);
    255 	DF2S(OBSS_SCAN);
    256 	DF2S(IBSS);
    257 	DF2S(RADAR);
    258 	DF2S(DEDICATED_P2P_DEVICE);
    259 	DF2S(QOS_MAPPING);
    260 	DF2S(AP_CSA);
    261 	DF2S(MESH);
    262 	DF2S(ACS_OFFLOAD);
    263 	DF2S(KEY_MGMT_OFFLOAD);
    264 	DF2S(TDLS_CHANNEL_SWITCH);
    265 	DF2S(HT_IBSS);
    266 	DF2S(VHT_IBSS);
    267 	DF2S(SUPPORT_HW_MODE_ANY);
    268 	DF2S(OFFCHANNEL_SIMULTANEOUS);
    269 	DF2S(FULL_AP_CLIENT_STATE);
    270 	DF2S(P2P_LISTEN_OFFLOAD);
    271 	}
    272 	return "UNKNOWN";
    273 #undef DF2S
    274 }
    275