doc: Disable Doxygen autolink support

The way autolink support is implementing in Doxygen is a bit
inconvenient with wpa_supplicant being recognized as something that
would always be linked to struct wpa_supplicant. In addition, number of
links were not really noticed automatically. To get this working more
robustly and without having to use the %wpa_supplicant workaround (which
had its own issues, e.g., with titles), disable autolinking and use
explicit \ref commands instead.

This is also updating some of the obsolete notes to point to correct
file names, etc. changes in the source code tree.

Signed-off-by: Jouni Malinen <j@w1.fi>
master
Jouni Malinen 10 years ago
parent bbd89bfca0
commit 5eb513c3ba

@ -13,7 +13,7 @@
\ref win_port "Windows port" | \ref win_port "Windows port" |
\ref test_programs "Test programs" ] \ref test_programs "Test programs" ]
%wpa_supplicant implementation is divided into number of independent wpa_supplicant implementation is divided into number of independent
modules. Core code includes functionality for controlling the network modules. Core code includes functionality for controlling the network
selection, association, and configuration. Independent modules include selection, association, and configuration. Independent modules include
WPA code (key handshake, PMKSA caching, pre-authentication), EAPOL WPA code (key handshake, PMKSA caching, pre-authentication), EAPOL
@ -21,82 +21,77 @@ state machine, and EAP state machine and methods. In addition, there
are number of separate files for generic helper functions. are number of separate files for generic helper functions.
Both WPA and EAPOL/EAP state machines can be used separately in other Both WPA and EAPOL/EAP state machines can be used separately in other
programs than %wpa_supplicant. As an example, the included test programs than wpa_supplicant. As an example, the included test
programs eapol_test and preauth_test are using these modules. programs eapol_test and preauth_test are using these modules.
\ref driver_wrapper "Driver interface API" is defined in driver.h and \ref driver_wrapper "Driver interface API" is defined in \ref driver.h and
all hardware/driver dependent functionality is implemented in all hardware/driver dependent functionality is implemented in
driver_*.c. driver_*.c.
\section _wpa_supplicant_core wpa_supplicant core functionality \section _wpa_supplicant_core wpa_supplicant core functionality
wpa_supplicant.c \ref wpa_supplicant.c
Program initialization, main control loop Program initialization, main control loop
main.c \ref wpa_supplicant/main.c
main() for UNIX-like operating systems and MinGW (Windows); this main() for UNIX-like operating systems and MinGW (Windows); this
uses command line arguments to configure wpa_supplicant uses command line arguments to configure wpa_supplicant
events.c \ref events.c
Driver event processing; wpa_supplicant_event() and related functions Driver event processing; \ref wpa_supplicant_event() and related functions
wpa_supplicant_i.h \ref wpa_supplicant_i.h
Internal definitions for %wpa_supplicant core; should not be Internal definitions for wpa_supplicant core; should not be
included into independent modules included into independent modules
\section generic_helper_func Generic helper functions \section generic_helper_func Generic helper functions
%wpa_supplicant uses generic helper functions some of which are shared wpa_supplicant uses generic helper functions some of which are shared
with with hostapd. The following C files are currently used: with with hostapd. The following C files are currently used:
eloop.c and eloop.h \ref eloop.c and \ref eloop.h
Event loop (select() loop with registerable timeouts, socket read Event loop (select() loop with registerable timeouts, socket read
callbacks, and signal callbacks) callbacks, and signal callbacks)
common.c and common.h \ref common.c and \ref common.h
Common helper functions Common helper functions
defs.h \ref defs.h
Definitions shared by multiple files Definitions shared by multiple files
l2_packet.h, l2_packet_linux.c, and l2_packet_pcap.c \ref l2_packet.h, \ref l2_packet_linux.c, and \ref l2_packet_pcap.c
Layer 2 (link) access wrapper (includes native Linux implementation Layer 2 (link) access wrapper (includes native Linux implementation
and wrappers for libdnet/libpcap). A new l2_packet implementation and wrappers for libdnet/libpcap). A new l2_packet implementation
may need to be added when porting to new operating systems that are may need to be added when porting to new operating systems that are
not supported by libdnet/libpcap. Makefile can be used to select which not supported by libdnet/libpcap. Makefile can be used to select which
l2_packet implementation is included. l2_packet_linux.c uses Linux l2_packet implementation is included. \ref l2_packet_linux.c uses Linux
packet sockets and l2_packet_pcap.c has a more portable version using packet sockets and \ref l2_packet_pcap.c has a more portable version using
libpcap and libdnet. libpcap and libdnet.
pcsc_funcs.c and pcsc_funcs.h \ref pcsc_funcs.c and \ref pcsc_funcs.h
Wrapper for PC/SC lite SIM and smart card readers Wrapper for PC/SC lite SIM and smart card readers
priv_netlink.h \ref priv_netlink.h
Private version of netlink definitions from Linux kernel header files; Private version of netlink definitions from Linux kernel header files;
this could be replaced with C library header file once suitable this could be replaced with C library header file once suitable
version becomes commonly available version becomes commonly available
version.h \ref version.h
Version number definitions Version number definitions
wireless_copy.h
Private version of Linux wireless extensions definitions from kernel
header files; this could be replaced with C library header file once
suitable version becomes commonly available
\section crypto_func Cryptographic functions \section crypto_func Cryptographic functions
md5.c and md5.h \ref md5.c and \ref md5.h
MD5 (replaced with a crypto library if TLS support is included) MD5 (replaced with a crypto library if TLS support is included)
HMAC-MD5 (keyed checksum for message authenticity validation) HMAC-MD5 (keyed checksum for message authenticity validation)
rc4.c and rc4.h \ref rc4.c and \ref rc4.h
RC4 (broadcast/default key encryption) RC4 (broadcast/default key encryption)
sha1.c and sha1.h \ref sha1.c and \ref sha1.h
SHA-1 (replaced with a crypto library if TLS support is included) SHA-1 (replaced with a crypto library if TLS support is included)
HMAC-SHA-1 (keyed checksum for message authenticity validation) HMAC-SHA-1 (keyed checksum for message authenticity validation)
PRF-SHA-1 (pseudorandom (key/nonce generation) function) PRF-SHA-1 (pseudorandom (key/nonce generation) function)
@ -104,10 +99,10 @@ sha1.c and sha1.h
T-PRF (for EAP-FAST) T-PRF (for EAP-FAST)
TLS-PRF (RFC 2246) TLS-PRF (RFC 2246)
sha256.c and sha256.h \ref sha256.c and \ref sha256.h
SHA-256 (replaced with a crypto library if TLS support is included) SHA-256 (replaced with a crypto library if TLS support is included)
aes_wrap.c, aes_wrap.h, aes.c \ref aes-wrap.c, \ref aes_wrap.h, \ref aes.c
AES (replaced with a crypto library if TLS support is included), AES (replaced with a crypto library if TLS support is included),
AES Key Wrap Algorithm with 128-bit KEK, RFC3394 (broadcast/default AES Key Wrap Algorithm with 128-bit KEK, RFC3394 (broadcast/default
key encryption), key encryption),
@ -116,207 +111,205 @@ aes_wrap.c, aes_wrap.h, aes.c
AES-128 EAX mode encryption/decryption, AES-128 EAX mode encryption/decryption,
AES-128 CBC AES-128 CBC
crypto.h \ref crypto.h
Definition of crypto library wrapper Definition of crypto library wrapper
crypto_openssl.c \ref crypto_openssl.c
Wrapper functions for libcrypto (OpenSSL) Wrapper functions for libcrypto (OpenSSL)
crypto_internal.c \ref crypto_internal.c
Wrapper functions for internal crypto implementation Wrapper functions for internal crypto implementation
crypto_gnutls.c \ref crypto_gnutls.c
Wrapper functions for libgcrypt (used by GnuTLS) Wrapper functions for libgcrypt (used by GnuTLS)
ms_funcs.c and ms_funcs.h \ref ms_funcs.c and \ref ms_funcs.h
Helper functions for MSCHAPV2 and LEAP Helper functions for MSCHAPV2 and LEAP
tls.h \ref tls.h
Definition of TLS library wrapper Definition of TLS library wrapper
tls_none.c \ref tls_none.c
Dummy implementation of TLS library wrapper for cases where TLS Dummy implementation of TLS library wrapper for cases where TLS
functionality is not included. functionality is not included.
tls_openssl.c \ref tls_openssl.c
TLS library wrapper for openssl TLS library wrapper for openssl
tls_internal.c \ref tls_internal.c
TLS library for internal TLS implementation TLS library for internal TLS implementation
tls_gnutls.c \ref tls_gnutls.c
TLS library wrapper for GnuTLS TLS library wrapper for GnuTLS
\section tls_func TLS library \section tls_func TLS library
asn1.c and asn1.h \ref asn1.c and \ref asn1.h
ASN.1 DER parsing ASN.1 DER parsing
bignum.c and bignum.h \ref bignum.c and \ref bignum.h
Big number math Big number math
rsa.c and rsa.h \ref rsa.c and \ref rsa.h
RSA RSA
x509v3.c and x509v3.h \ref x509v3.c and \ref x509v3.h
X.509v3 certificate parsing and processing X.509v3 certificate parsing and processing
tlsv1_client.c, tlsv1_client.h \ref tlsv1_client.c, \ref tlsv1_client.h
TLSv1 client (RFC 2246) TLSv1 client (RFC 2246)
tlsv1_client_i.h \ref tlsv1_client_i.h
Internal structures for TLSv1 client Internal structures for TLSv1 client
tlsv1_client_read.c \ref tlsv1_client_read.c
TLSv1 client: read handshake messages TLSv1 client: read handshake messages
tlsv1_client_write.c \ref tlsv1_client_write.c
TLSv1 client: write handshake messages TLSv1 client: write handshake messages
tlsv1_common.c and tlsv1_common.h \ref tlsv1_common.c and \ref tlsv1_common.h
Common TLSv1 routines and definitions Common TLSv1 routines and definitions
tlsv1_cred.c and tlsv1_cred.h \ref tlsv1_cred.c and \ref tlsv1_cred.h
TLSv1 credentials TLSv1 credentials
tlsv1_record.c and tlsv1_record.h \ref tlsv1_record.c and \ref tlsv1_record.h
TLSv1 record protocol TLSv1 record protocol
\section configuration Configuration \section configuration Configuration
config_ssid.h \ref config_ssid.h
Definition of per network configuration items Definition of per network configuration items
config.h \ref config.h
Definition of the %wpa_supplicant configuration Definition of the wpa_supplicant configuration
config.c \ref config.c
Configuration parser and common functions Configuration parser and common functions
config_file.c \ref wpa_supplicant/config_file.c
Configuration backend for text files (e.g., wpa_supplicant.conf) Configuration backend for text files (e.g., wpa_supplicant.conf)
config_winreg.c \ref config_winreg.c
Configuration backend for Windows registry Configuration backend for Windows registry
\section ctrl_iface Control interface \section ctrl_iface Control interface
%wpa_supplicant has a \ref ctrl_iface_page "control interface" wpa_supplicant has a \ref ctrl_iface_page "control interface"
that can be used to get status that can be used to get status
information and manage operations from external programs. An example information and manage operations from external programs. An example
command line interface (wpa_cli) and GUI (wpa_gui) for this interface command line interface (wpa_cli) and GUI (wpa_gui) for this interface
are included in the %wpa_supplicant distribution. are included in the wpa_supplicant distribution.
ctrl_iface.c and ctrl_iface.h \ref wpa_supplicant/ctrl_iface.c and \ref wpa_supplicant/ctrl_iface.h
%wpa_supplicant-side of the control interface wpa_supplicant-side of the control interface
ctrl_iface_unix.c \ref ctrl_iface_unix.c
UNIX domain sockets -based control interface backend UNIX domain sockets -based control interface backend
ctrl_iface_udp.c \ref ctrl_iface_udp.c
UDP sockets -based control interface backend UDP sockets -based control interface backend
ctrl_iface_named_pipe.c \ref ctrl_iface_named_pipe.c
Windows named pipes -based control interface backend Windows named pipes -based control interface backend
wpa_ctrl.c and wpa_ctrl.h \ref wpa_ctrl.c and \ref wpa_ctrl.h
Library functions for external programs to provide access to the Library functions for external programs to provide access to the
%wpa_supplicant control interface wpa_supplicant control interface
wpa_cli.c \ref wpa_cli.c
Example program for using %wpa_supplicant control interface Example program for using wpa_supplicant control interface
\section wpa_code WPA supplicant \section wpa_code WPA supplicant
wpa.c and wpa.h \ref wpa.c and \ref wpa.h
WPA state machine and 4-Way/Group Key Handshake processing WPA state machine and 4-Way/Group Key Handshake processing
preauth.c and preauth.h \ref preauth.c and \ref preauth.h
PMKSA caching and pre-authentication (RSN/WPA2) PMKSA caching and pre-authentication (RSN/WPA2)
wpa_i.h \ref wpa_i.h
Internal definitions for WPA code; not to be included to other modules. Internal definitions for WPA code; not to be included to other modules.
\section eap_peer EAP peer \section eap_peer EAP peer
\ref eap_peer_module "EAP peer implementation" is a separate module that \ref eap_peer_module "EAP peer implementation" is a separate module that
can be used by other programs than just %wpa_supplicant. can be used by other programs than just wpa_supplicant.
eap.c and eap.h \ref eap.c and \ref eap.h
EAP state machine and method interface EAP state machine and method interface
eap_defs.h \ref eap_defs.h
Common EAP definitions Common EAP definitions
eap_i.h \ref eap_i.h
Internal definitions for EAP state machine and EAP methods; not to be Internal definitions for EAP state machine and EAP methods; not to be
included in other modules included in other modules
eap_sim_common.c and eap_sim_common.h \ref eap_sim_common.c and \ref eap_sim_common.h
Common code for EAP-SIM and EAP-AKA Common code for EAP-SIM and EAP-AKA
eap_tls_common.c and eap_tls_common.h \ref eap_tls_common.c and \ref eap_tls_common.h
Common code for EAP-PEAP, EAP-TTLS, and EAP-FAST Common code for EAP-PEAP, EAP-TTLS, and EAP-FAST
eap_tlv.c and eap_tlv.h \ref eap_ttls.c and \ref eap_ttls.h
EAP-TLV code for EAP-PEAP and EAP-FAST
eap_ttls.c and eap_ttls.h
EAP-TTLS EAP-TTLS
eap_pax.c, eap_pax_common.h, eap_pax_common.c \ref eap_pax.c, \ref eap_pax_common.h, \ref eap_pax_common.c
EAP-PAX EAP-PAX
eap_psk.c, eap_psk_common.h, eap_psk_common.c \ref eap_psk.c, \ref eap_psk_common.h, \ref eap_psk_common.c
EAP-PSK (note: this is not needed for WPA-PSK) EAP-PSK (note: this is not needed for WPA-PSK)
eap_sake.c, eap_sake_common.h, eap_sake_common.c \ref eap_sake.c, \ref eap_sake_common.h, \ref eap_sake_common.c
EAP-SAKE EAP-SAKE
eap_gpsk.c, eap_gpsk_common.h, eap_gpsk_common.c \ref eap_gpsk.c, \ref eap_gpsk_common.h, \ref eap_gpsk_common.c
EAP-GPSK EAP-GPSK
eap_aka.c, eap_fast.c, eap_gtc.c, eap_leap.c, eap_md5.c, eap_mschapv2.c, \ref eap_aka.c, \ref eap_fast.c, \ref eap_gtc.c, \ref eap_leap.c,
eap_otp.c, eap_peap.c, eap_sim.c, eap_tls.c \ref eap_md5.c, \ref eap_mschapv2.c, \ref eap_otp.c, \ref eap_peap.c,
\ref eap_sim.c, \ref eap_tls.c
Other EAP method implementations Other EAP method implementations
\section eapol_supp EAPOL supplicant \section eapol_supp EAPOL supplicant
eapol_supp_sm.c and eapol_supp_sm.h \ref eapol_supp_sm.c and \ref eapol_supp_sm.h
EAPOL supplicant state machine and IEEE 802.1X processing EAPOL supplicant state machine and IEEE 802.1X processing
\section win_port Windows port \section win_port Windows port
ndis_events.c \ref ndis_events.c
Code for receiving NdisMIndicateStatus() events and delivering them to Code for receiving NdisMIndicateStatus() events and delivering them to
%wpa_supplicant driver_ndis.c in more easier to use form wpa_supplicant \ref driver_ndis.c in more easier to use form
win_if_list.c \ref win_if_list.c
External program for listing current network interface External program for listing current network interface
\section test_programs Test programs \section test_programs Test programs
radius_client.c and radius_client.h \ref radius_client.c and \ref radius_client.h
RADIUS authentication client implementation for eapol_test RADIUS authentication client implementation for eapol_test
radius.c and radius.h \ref radius.c and \ref radius.h
RADIUS message processing for eapol_test RADIUS message processing for eapol_test
eapol_test.c \ref eapol_test.c
Standalone EAP testing tool with integrated RADIUS authentication Standalone EAP testing tool with integrated RADIUS authentication
client client
preauth_test.c \ref preauth_test.c
Standalone RSN pre-authentication tool Standalone RSN pre-authentication tool
wpa_passphrase.c \ref wpa_passphrase.c
WPA ASCII passphrase to PSK conversion WPA ASCII passphrase to PSK conversion
*/ */

@ -1,47 +1,47 @@
/** /**
\page ctrl_iface_page %wpa_supplicant control interface \page ctrl_iface_page wpa_supplicant control interface
%wpa_supplicant implements a control interface that can be used by wpa_supplicant implements a control interface that can be used by
external programs to control the operations of the %wpa_supplicant external programs to control the operations of the wpa_supplicant
daemon and to get status information and event notifications. There is daemon and to get status information and event notifications. There is
a small C library, in a form of a single C file, wpa_ctrl.c, that a small C library, in a form of a single C file, \ref wpa_ctrl.c, that
provides helper functions to facilitate the use of the control provides helper functions to facilitate the use of the control
interface. External programs can link this file into them and then use interface. External programs can link this file into them and then use
the library functions documented in wpa_ctrl.h to interact with the library functions documented in \ref wpa_ctrl.h to interact with
%wpa_supplicant. This library can also be used with C++. wpa_cli.c and wpa_supplicant. This library can also be used with C++. \ref wpa_cli.c and
wpa_gui are example programs using this library. wpa_gui are example programs using this library.
There are multiple mechanisms for inter-process communication. For There are multiple mechanisms for inter-process communication. For
example, Linux version of %wpa_supplicant is using UNIX domain sockets example, Linux version of wpa_supplicant is using UNIX domain sockets
for the control interface and Windows version UDP sockets. The use of for the control interface and Windows version UDP sockets. The use of
the functions defined in wpa_ctrl.h can be used to hide the details of the functions defined in \ref wpa_ctrl.h can be used to hide the details of
the used IPC from external programs. the used IPC from external programs.
\section using_ctrl_iface Using the control interface \section using_ctrl_iface Using the control interface
External programs, e.g., a GUI or a configuration utility, that need to External programs, e.g., a GUI or a configuration utility, that need to
communicate with %wpa_supplicant should link in wpa_ctrl.c. This communicate with wpa_supplicant should link in \ref wpa_ctrl.c. This
allows them to use helper functions to open connection to the control allows them to use helper functions to open connection to the control
interface with wpa_ctrl_open() and to send commands with interface with \ref wpa_ctrl_open() and to send commands with
wpa_ctrl_request(). \ref wpa_ctrl_request().
%wpa_supplicant uses the control interface for two types of communication: wpa_supplicant uses the control interface for two types of communication:
commands and unsolicited event messages. Commands are a pair of commands and unsolicited event messages. Commands are a pair of
messages, a request from the external program and a response from messages, a request from the external program and a response from
%wpa_supplicant. These can be executed using wpa_ctrl_request(). wpa_supplicant. These can be executed using \ref wpa_ctrl_request().
Unsolicited event messages are sent by %wpa_supplicant to the control Unsolicited event messages are sent by wpa_supplicant to the control
interface connection without specific request from the external program interface connection without specific request from the external program
for receiving each message. However, the external program needs to for receiving each message. However, the external program needs to
attach to the control interface with wpa_ctrl_attach() to receive these attach to the control interface with \ref wpa_ctrl_attach() to receive these
unsolicited messages. unsolicited messages.
If the control interface connection is used both for commands and If the control interface connection is used both for commands and
unsolicited event messages, there is potential for receiving an unsolicited event messages, there is potential for receiving an
unsolicited message between the command request and response. unsolicited message between the command request and response.
wpa_ctrl_request() caller will need to supply a callback, msg_cb, \ref wpa_ctrl_request() caller will need to supply a callback, msg_cb,
for processing these messages. Often it is easier to open two for processing these messages. Often it is easier to open two
control interface connections by calling wpa_ctrl_open() twice and control interface connections by calling \ref wpa_ctrl_open() twice and
then use one of the connections for commands and the other one for then use one of the connections for commands and the other one for
unsolicited messages. This way command request/response pairs will unsolicited messages. This way command request/response pairs will
not be broken by unsolicited messages. wpa_cli is an example of how not be broken by unsolicited messages. wpa_cli is an example of how
@ -49,20 +49,20 @@ to use only one connection for both purposes and wpa_gui demonstrates
how to use two separate connections. how to use two separate connections.
Once the control interface connection is not needed anymore, it should Once the control interface connection is not needed anymore, it should
be closed by calling wpa_ctrl_close(). If the connection was used for be closed by calling \ref wpa_ctrl_close(). If the connection was used for
unsolicited event messages, it should be first detached by calling unsolicited event messages, it should be first detached by calling
wpa_ctrl_detach(). \ref wpa_ctrl_detach().
\section ctrl_iface_cmds Control interface commands \section ctrl_iface_cmds Control interface commands
Following commands can be used with wpa_ctrl_request(): Following commands can be used with \ref wpa_ctrl_request():
\subsection ctrl_iface_PING PING \subsection ctrl_iface_PING PING
This command can be used to test whether %wpa_supplicant is replying This command can be used to test whether wpa_supplicant is replying
to the control interface commands. The expected reply is \c PONG if the to the control interface commands. The expected reply is \c PONG if the
connection is open and %wpa_supplicant is processing commands. connection is open and wpa_supplicant is processing commands.
\subsection ctrl_iface_MIB MIB \subsection ctrl_iface_MIB MIB
@ -217,13 +217,13 @@ Start pre-authentication with the given BSSID.
\subsection ctrl_iface_ATTACH ATTACH \subsection ctrl_iface_ATTACH ATTACH
Attach the connection as a monitor for unsolicited events. This can Attach the connection as a monitor for unsolicited events. This can
be done with wpa_ctrl_attach(). be done with \ref wpa_ctrl_attach().
\subsection ctrl_iface_DETACH DETACH \subsection ctrl_iface_DETACH DETACH
Detach the connection as a monitor for unsolicited events. This can Detach the connection as a monitor for unsolicited events. This can
be done with wpa_ctrl_detach(). be done with \ref wpa_ctrl_detach().
\subsection ctrl_iface_LEVEL LEVEL <debug level> \subsection ctrl_iface_LEVEL LEVEL <debug level>
@ -233,12 +233,12 @@ Change debug level.
\subsection ctrl_iface_RECONFIGURE RECONFIGURE \subsection ctrl_iface_RECONFIGURE RECONFIGURE
Force %wpa_supplicant to re-read its configuration data. Force wpa_supplicant to re-read its configuration data.
\subsection ctrl_iface_TERMINATE TERMINATE \subsection ctrl_iface_TERMINATE TERMINATE
Terminate %wpa_supplicant process. Terminate wpa_supplicant process.
\subsection ctrl_iface_BSSID BSSID <network id> <BSSID> \subsection ctrl_iface_BSSID BSSID <network id> <BSSID>
@ -563,7 +563,7 @@ two parameters are used: availibility period and availability interval
\section ctrl_iface_interactive Interactive requests \section ctrl_iface_interactive Interactive requests
If %wpa_supplicant needs additional information during authentication If wpa_supplicant needs additional information during authentication
(e.g., password), it will use a specific prefix, \c CTRL-REQ- (e.g., password), it will use a specific prefix, \c CTRL-REQ-
(\a WPA_CTRL_REQ macro) in an unsolicited event message. An external (\a WPA_CTRL_REQ macro) in an unsolicited event message. An external
program, e.g., a GUI, can provide such information by using program, e.g., a GUI, can provide such information by using
@ -583,7 +583,7 @@ CTRL-REQ-<field name>-<network id>-<human readable text>
CTRL-RSP-<field name>-<network id>-<value> CTRL-RSP-<field name>-<network id>-<value>
\endverbatim \endverbatim
For example, request from %wpa_supplicant: For example, request from wpa_supplicant:
\verbatim \verbatim
CTRL-REQ-PASSWORD-1-Password needed for SSID test-network CTRL-REQ-PASSWORD-1-Password needed for SSID test-network
\endverbatim \endverbatim
@ -598,7 +598,7 @@ CTRL-RSP-PASSWORD-1-secret
Get list of supported functionality (eap, pairwise, group, Get list of supported functionality (eap, pairwise, group,
proto). Supported functionality is shown as space separate lists of proto). Supported functionality is shown as space separate lists of
values used in the same format as in %wpa_supplicant configuration. values used in the same format as in wpa_supplicant configuration.
If optional argument, 'strict', is added, only the values that the If optional argument, 'strict', is added, only the values that the
driver claims to explicitly support are included. Without this, all driver claims to explicitly support are included. Without this, all
available capabilities are included if the driver does not provide available capabilities are included if the driver does not provide
@ -645,8 +645,8 @@ OPEN SHARED LEAP
Change ap_scan value: Change ap_scan value:
0 = no scanning, 0 = no scanning,
1 = %wpa_supplicant requests scans and uses scan results to select the AP, 1 = wpa_supplicant requests scans and uses scan results to select the AP,
2 = %wpa_supplicant does not use scanning and just requests driver to 2 = wpa_supplicant does not use scanning and just requests driver to
associate and take care of AP selection associate and take care of AP selection
@ -662,14 +662,14 @@ eth0
\section ctrl_iface_events Control interface events \section ctrl_iface_events Control interface events
%wpa_supplicant generates number messages based on events like wpa_supplicant generates number messages based on events like
connection or a completion of a task. These are available to external connection or a completion of a task. These are available to external
programs that attach to receive unsolicited messages over the control programs that attach to receive unsolicited messages over the control
interface with wpa_ctrl_attach(). interface with \ref wpa_ctrl_attach().
The event messages will be delivered over the attach control interface The event messages will be delivered over the attach control interface
as text strings that start with the priority level of the message and as text strings that start with the priority level of the message and
a fixed prefix text as defined in wpa_ctrl.h. After this, optional a fixed prefix text as defined in \ref wpa_ctrl.h. After this, optional
additional information may be included depending on the event additional information may be included depending on the event
message. For example, following event message is delivered when new message. For example, following event message is delivered when new
scan results are available: scan results are available:
@ -694,11 +694,11 @@ debug information, but can usually be ignored by external programs.
In most cases, the external program can skip over the priority field In most cases, the external program can skip over the priority field
in the beginning of the event message and then compare the following in the beginning of the event message and then compare the following
text to the event strings from wpa_ctrl.h that the program is text to the event strings from \ref wpa_ctrl.h that the program is
interested in processing. interested in processing.
Following subsections describe the most common event notifications Following subsections describe the most common event notifications
generated by %wpa_supplicant. generated by wpa_supplicant.
\subsection ctrl_iface_event_CTRL_REQ CTRL-REQ- \subsection ctrl_iface_event_CTRL_REQ CTRL-REQ-
@ -717,7 +717,7 @@ WPA_EVENT_DISCONNECTED: Disconnected, data connection is not available
\subsection ctrl_iface_event_TERMINATING CTRL-EVENT-TERMINATING \subsection ctrl_iface_event_TERMINATING CTRL-EVENT-TERMINATING
WPA_EVENT_TERMINATING: %wpa_supplicant is exiting WPA_EVENT_TERMINATING: wpa_supplicant is exiting
\subsection ctrl_iface_event_PASSWORD_CHANGED CTRL-EVENT-PASSWORD-CHANGED \subsection ctrl_iface_event_PASSWORD_CHANGED CTRL-EVENT-PASSWORD-CHANGED

@ -1,8 +1,8 @@
/** /**
\page dbus %wpa_supplicant D-Bus API \page dbus wpa_supplicant D-Bus API
This section documents the %wpa_supplicant D-Bus API. Every D-Bus This section documents the wpa_supplicant D-Bus API. Every D-Bus
interface implemented by %wpa_supplicant is described here including interface implemented by wpa_supplicant is described here including
their methods, signals, and properties with arguments, returned their methods, signals, and properties with arguments, returned
values, and possible errors. values, and possible errors.
@ -20,7 +20,7 @@ Interfaces:
\section dbus_main fi.w1.wpa_supplicant1 \section dbus_main fi.w1.wpa_supplicant1
Interface implemented by the main %wpa_supplicant D-Bus object Interface implemented by the main wpa_supplicant D-Bus object
registered in the bus with fi.w1.wpa_supplicant1 name. registered in the bus with fi.w1.wpa_supplicant1 name.
\subsection dbus_main_methods Methods \subsection dbus_main_methods Methods
@ -28,12 +28,12 @@ registered in the bus with fi.w1.wpa_supplicant1 name.
<ul> <ul>
<li> <li>
<h3>CreateInterface ( a{sv} : args ) --> o : interface</h3> <h3>CreateInterface ( a{sv} : args ) --> o : interface</h3>
<p>Registers a wireless interface in %wpa_supplicant.</p> <p>Registers a wireless interface in wpa_supplicant.</p>
<h4>Arguments</h4> <h4>Arguments</h4>
<dl> <dl>
<dt>a{sv} : args</dt> <dt>a{sv} : args</dt>
<dd> <dd>
A dictionary with arguments used to add the interface to %wpa_supplicant. The dictionary may contain the following entries: A dictionary with arguments used to add the interface to wpa_supplicant. The dictionary may contain the following entries:
<table> <table>
<tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th> <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th>
<tr><td>Ifname</td><td>s</td><td>Name of the network interface to control, e.g., wlan0</td><td>Yes</td> <tr><td>Ifname</td><td>s</td><td>Name of the network interface to control, e.g., wlan0</td><td>Yes</td>
@ -51,7 +51,7 @@ registered in the bus with fi.w1.wpa_supplicant1 name.
<h4>Possible errors</h4> <h4>Possible errors</h4>
<dl> <dl>
<dt>fi.w1.wpa_supplicant1.InterfaceExists</dt> <dt>fi.w1.wpa_supplicant1.InterfaceExists</dt>
<dd>%wpa_supplicant already controls this interface.</dd> <dd>wpa_supplicant already controls this interface.</dd>
<dt>fi.w1.wpa_supplicant1.UnknownError</dt> <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
<dd>Creating interface failed for an unknown reason.</dd> <dd>Creating interface failed for an unknown reason.</dd>
<dt>fi.w1.wpa_supplicant1.InvalidArgs</dt> <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
@ -61,7 +61,7 @@ registered in the bus with fi.w1.wpa_supplicant1 name.
<li> <li>
<h3>RemoveInterface ( o : interface ) --> nothing</h3> <h3>RemoveInterface ( o : interface ) --> nothing</h3>
<p>Deregisters a wireless interface from %wpa_supplicant.</p> <p>Deregisters a wireless interface from wpa_supplicant.</p>
<h4>Arguments</h4> <h4>Arguments</h4>
<dl> <dl>
<dt>o : interface</dt> <dt>o : interface</dt>
@ -78,7 +78,7 @@ registered in the bus with fi.w1.wpa_supplicant1 name.
<li> <li>
<h3>GetInterface ( s : ifname ) --> o : interface</h3> <h3>GetInterface ( s : ifname ) --> o : interface</h3>
<p>Returns a D-Bus path to an object related to an interface which %wpa_supplicant already controls.</p> <p>Returns a D-Bus path to an object related to an interface which wpa_supplicant already controls.</p>
<h4>Arguments</h4> <h4>Arguments</h4>
<dl> <dl>
<dt>s : ifname</dt> <dt>s : ifname</dt>
@ -92,7 +92,7 @@ registered in the bus with fi.w1.wpa_supplicant1 name.
<h4>Possible errors</h4> <h4>Possible errors</h4>
<dl> <dl>
<dt>fi.w1.wpa_supplicant1.InterfaceUnknown</dt> <dt>fi.w1.wpa_supplicant1.InterfaceUnknown</dt>
<dd>An interface with the passed name in not controlled by %wpa_supplicant.</dd> <dd>An interface with the passed name in not controlled by wpa_supplicant.</dd>
<dt>fi.w1.wpa_supplicant1.UnknownError</dt> <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
<dd>Getting an interface object path failed for an unknown reason.</dd> <dd>Getting an interface object path failed for an unknown reason.</dd>
</dl> </dl>
@ -104,19 +104,19 @@ registered in the bus with fi.w1.wpa_supplicant1 name.
<ul> <ul>
<li> <li>
<h3>DebugLevel - s - (read/write)</h3> <h3>DebugLevel - s - (read/write)</h3>
<p>Global %wpa_supplicant debugging level. Possible values are <p>Global wpa_supplicant debugging level. Possible values are
"msgdump" (verbose debugging), "debug" (debugging), "msgdump" (verbose debugging), "debug" (debugging),
"info" (informative), "warning" (warnings), and "error" (errors).</p> "info" (informative), "warning" (warnings), and "error" (errors).</p>
</li> </li>
<li> <li>
<h3>DebugTimestamp - b - (read/write)</h3> <h3>DebugTimestamp - b - (read/write)</h3>
<p>Global %wpa_supplicant debugging parameter. Determines if timestamps are shown in debug logs.</p> <p>Global wpa_supplicant debugging parameter. Determines if timestamps are shown in debug logs.</p>
</li> </li>
<li> <li>
<h3>DebugShowKeys - b - (read/write)</h3> <h3>DebugShowKeys - b - (read/write)</h3>
<p>Global %wpa_supplicant debugging parameter. Determines if secrets are shown in debug logs.</p> <p>Global wpa_supplicant debugging parameter. Determines if secrets are shown in debug logs.</p>
</li> </li>
<li> <li>
@ -145,7 +145,7 @@ registered in the bus with fi.w1.wpa_supplicant1 name.
<ul> <ul>
<li> <li>
<h3>InterfaceAdded ( o : interface, a{sv} : properties )</h3> <h3>InterfaceAdded ( o : interface, a{sv} : properties )</h3>
<p>A new interface was added to %wpa_supplicant.</p> <p>A new interface was added to wpa_supplicant.</p>
<h4>Arguments</h4> <h4>Arguments</h4>
<dl> <dl>
<dt>o : interface</dt> <dt>o : interface</dt>
@ -159,7 +159,7 @@ registered in the bus with fi.w1.wpa_supplicant1 name.
<li> <li>
<h3>InterfaceRemoved ( o : interface )</h3> <h3>InterfaceRemoved ( o : interface )</h3>
<p>An interface was removed from %wpa_supplicant.</p> <p>An interface was removed from wpa_supplicant.</p>
<h4>Arguments</h4> <h4>Arguments</h4>
<dl> <dl>
<dt>o : interface</dt> <dt>o : interface</dt>
@ -182,7 +182,7 @@ registered in the bus with fi.w1.wpa_supplicant1 name.
\section dbus_interface fi.w1.wpa_supplicant1.Interface \section dbus_interface fi.w1.wpa_supplicant1.Interface
Interface implemented by objects related to network interface added to Interface implemented by objects related to network interface added to
%wpa_supplicant, i.e., returned by wpa_supplicant, i.e., returned by
fi.w1.wpa_supplicant1.CreateInterface. fi.w1.wpa_supplicant1.CreateInterface.
\subsection dbus_interface_methods Methods \subsection dbus_interface_methods Methods
@ -229,7 +229,7 @@ fi.w1.wpa_supplicant1.CreateInterface.
<h4>Arguments</h4> <h4>Arguments</h4>
<dl> <dl>
<dt>a{sv} : args</dt> <dt>a{sv} : args</dt>
<dd>A dictionary with network configuration. Dictionary entries are equivalent to entries in the "network" block in %wpa_supplicant configuration file. Entry values should be appropriate type to the entry, e.g., an entry with key "frequency" should have value type int.</dd> <dd>A dictionary with network configuration. Dictionary entries are equivalent to entries in the "network" block in wpa_supplicant configuration file. Entry values should be appropriate type to the entry, e.g., an entry with key "frequency" should have value type int.</dd>
</dl> </dl>
<h4>Returns</h4> <h4>Returns</h4>
<dl> <dl>
@ -576,22 +576,22 @@ fi.w1.wpa_supplicant1.CreateInterface.
<li> <li>
<h3>ApScan - u - (read/write)</h3> <h3>ApScan - u - (read/write)</h3>
<p>Identical to ap_scan entry in %wpa_supplicant configuration file. Possible values are 0, 1 or 2.</p> <p>Identical to ap_scan entry in wpa_supplicant configuration file. Possible values are 0, 1 or 2.</p>
</li> </li>
<li> <li>
<h3>BSSExpireAge - u - (read/write)</h3> <h3>BSSExpireAge - u - (read/write)</h3>
<p>Identical to bss_expiration_age entry in %wpa_supplicant configuration file.</p> <p>Identical to bss_expiration_age entry in wpa_supplicant configuration file.</p>
</li> </li>
<li> <li>
<h3>BSSExpireCount - u - (read/write)</h3> <h3>BSSExpireCount - u - (read/write)</h3>
<p>Identical to bss_expiration_scan_count entry in %wpa_supplicant configuration file.</p> <p>Identical to bss_expiration_scan_count entry in wpa_supplicant configuration file.</p>
</li> </li>
<li> <li>
<h3>Country - s - (read/write)</h3> <h3>Country - s - (read/write)</h3>
<p>Identical to country entry in %wpa_supplicant configuration file.</p> <p>Identical to country entry in wpa_supplicant configuration file.</p>
</li> </li>
<li> <li>
@ -611,12 +611,12 @@ fi.w1.wpa_supplicant1.CreateInterface.
<li> <li>
<h3>CurrentBSS - o - (read)</h3> <h3>CurrentBSS - o - (read)</h3>
<p>Path to D-Bus object representing BSS which %wpa_supplicant is associated with, or "/" if is not associated at all.</p> <p>Path to D-Bus object representing BSS which wpa_supplicant is associated with, or "/" if is not associated at all.</p>
</li> </li>
<li> <li>
<h3>CurrentNetwork - o - (read)</h3> <h3>CurrentNetwork - o - (read)</h3>
<p>Path to D-Bus object representing configured network which %wpa_supplicant uses at the moment, or "/" if doesn't use any.</p> <p>Path to D-Bus object representing configured network which wpa_supplicant uses at the moment, or "/" if doesn't use any.</p>
</li> </li>
<li> <li>
@ -641,7 +641,7 @@ fi.w1.wpa_supplicant1.CreateInterface.
<li> <li>
<h3>FastReauth - b - (read/write)</h3> <h3>FastReauth - b - (read/write)</h3>
<p>Identical to fast_reauth entry in %wpa_supplicant configuration file.</p> <p>Identical to fast_reauth entry in wpa_supplicant configuration file.</p>
</li> </li>
<li> <li>
@ -1595,7 +1595,7 @@ i.e., returned by fi.w1.wpa_supplicant1.Interface.AddNetwork.
<li> <li>
<h3>Properties - a{sv} - (read/write)</h3> <h3>Properties - a{sv} - (read/write)</h3>
<p>Properties of the configured network. Dictionary contains entries from "network" block of %wpa_supplicant configuration file. All values are string type, e.g., frequency is "2437", not 2437. <p>Properties of the configured network. Dictionary contains entries from "network" block of wpa_supplicant configuration file. All values are string type, e.g., frequency is "2437", not 2437.
</li> </li>
</ul> </ul>

@ -82,9 +82,9 @@ Enrollee. Minimal UPnP and HTTP functionality is also provided for the
functionality needed to implement Wi-Fi Protected Setup. functionality needed to implement Wi-Fi Protected Setup.
\dir wpa_supplicant %wpa_supplicant \dir wpa_supplicant wpa_supplicant
%wpa_supplicant-specific code for configuration, control interface, and wpa_supplicant-specific code for configuration, control interface, and
client management. client management.
*/ */

@ -31,7 +31,7 @@ PROJECT_NAME = "wpa_supplicant / hostapd"
# This could be handy for archiving the generated documentation or # This could be handy for archiving the generated documentation or
# if some version control system is used. # if some version control system is used.
PROJECT_NUMBER = 2.0 PROJECT_NUMBER = 2.4
# The OUTPUT_DIRECTORY tag is used to specify the (relative or absolute) # The OUTPUT_DIRECTORY tag is used to specify the (relative or absolute)
# base path where the generated documentation will be put. # base path where the generated documentation will be put.
@ -572,6 +572,8 @@ INPUT = \
doc \ doc \
hostapd \ hostapd \
wpa_supplicant \ wpa_supplicant \
wpa_supplicant/dbus \
eap_example \
src/ap \ src/ap \
src/common \ src/common \
src/crypto \ src/crypto \
@ -583,6 +585,7 @@ INPUT = \
src/eap_server \ src/eap_server \
src/l2_packet \ src/l2_packet \
src/p2p \ src/p2p \
src/pae \
src/radius \ src/radius \
src/rsn_supp \ src/rsn_supp \
src/tls \ src/tls \
@ -1533,3 +1536,12 @@ GENERATE_LEGEND = YES
# the various graphs. # the various graphs.
DOT_CLEANUP = YES DOT_CLEANUP = YES
#---------------------------------------------------------------------------
# Project additions
#---------------------------------------------------------------------------
# Disable autolink support due to wpa_supplicant getting unfortunately
# auto-linked to struct wpa_supplicant due to having an underscore in the name.
AUTOLINK_SUPPORT = FALSE

@ -3,7 +3,7 @@
All hardware and driver dependent functionality is in separate C files All hardware and driver dependent functionality is in separate C files
that implement defined wrapper functions. Other parts that implement defined wrapper functions. Other parts
of the %wpa_supplicant are designed to be hardware, driver, and operating of the wpa_supplicant are designed to be hardware, driver, and operating
system independent. system independent.
Driver wrappers need to implement whatever calls are used in the Driver wrappers need to implement whatever calls are used in the
@ -13,45 +13,45 @@ code and ioctl() calls and netlink message parsing for Linux Wireless
Extensions (WE). Since features required for WPA were added only recently to Extensions (WE). Since features required for WPA were added only recently to
Linux Wireless Extensions (in version 18), some driver specific code is used Linux Wireless Extensions (in version 18), some driver specific code is used
in number of driver interface implementations. These driver dependent parts in number of driver interface implementations. These driver dependent parts
can be replaced with generic code in driver_wext.c once the target driver can be replaced with generic code in \ref driver_wext.c once the target driver
includes full support for WE-18. After that, all Linux drivers, at includes full support for WE-18. After that, all Linux drivers, at
least in theory, could use the same driver wrapper code. least in theory, could use the same driver wrapper code.
A driver wrapper needs to implement some or all of the functions A driver wrapper needs to implement some or all of the functions
defined in driver.h. These functions are registered by filling struct defined in \ref driver.h. These functions are registered by filling struct
wpa_driver_ops with function pointers. Hardware independent parts of \ref wpa_driver_ops with function pointers. Hardware independent parts of
%wpa_supplicant will call these functions to control the driver/wlan wpa_supplicant will call these functions to control the driver/wlan
card. In addition, support for driver events is required. The event card. In addition, support for driver events is required. The event
callback function, wpa_supplicant_event(), and its parameters are callback function, \ref wpa_supplicant_event(), and its parameters are
documented in driver.h. In addition, a pointer to the 'struct documented in \ref driver.h. In addition, a pointer to the 'struct
wpa_driver_ops' needs to be registered in drivers.c file. \ref wpa_driver_ops' needs to be registered in \ref drivers.c file.
When porting to other operating systems, the driver wrapper should be When porting to other operating systems, the driver wrapper should be
modified to use the native interface of the target OS. It is possible modified to use the native interface of the target OS. It is possible
that some extra requirements for the interface between the driver that some extra requirements for the interface between the driver
wrapper and generic %wpa_supplicant code are discovered during porting wrapper and generic wpa_supplicant code are discovered during porting
to a new operating system. These will be addressed on case by case to a new operating system. These will be addressed on case by case
basis by modifying the interface and updating the other driver basis by modifying the interface and updating the other driver
wrappers for this. The goal is to avoid changing this interface wrappers for this. The goal is to avoid changing this interface
without very good reasons in order to limit the number of changes without very good reasons in order to limit the number of changes
needed to other wrappers and hardware independent parts of needed to other wrappers and hardware independent parts of
%wpa_supplicant. When changes are required, recommended way is to wpa_supplicant. When changes are required, recommended way is to
make them in backwards compatible way that allows existing driver make them in backwards compatible way that allows existing driver
interface implementations to be compiled without any modification. interface implementations to be compiled without any modification.
Generic Linux Wireless Extensions functions are implemented in Generic Linux Wireless Extensions functions are implemented in
driver_wext.c. All Linux driver wrappers can use these when the kernel \ref driver_wext.c. All Linux driver wrappers can use these when the kernel
driver supports the generic ioctl()s and wireless events. Driver driver supports the generic ioctl()s and wireless events. Driver
specific functions are implemented in separate C files, e.g., specific functions are implemented in separate C files, e.g.,
driver_hostap.c. These files need to define struct wpa_driver_ops \ref driver_hostap.c. These files need to define struct \ref wpa_driver_ops
entry that will be used in wpa_supplicant.c when calling driver entry that will be used in \ref wpa_supplicant.c when calling driver
functions. struct wpa_driver_ops entries are registered in drivers.c. functions. struct \ref wpa_driver_ops entries are registered in \ref drivers.c.
In general, it is likely to be useful to first take a look at couple In general, it is likely to be useful to first take a look at couple
of driver interface examples before starting on implementing a new of driver interface examples before starting on implementing a new
one. driver_hostap.c and driver_wext.c include a complete one. \ref driver_hostap.c and \ref driver_wext.c include a complete
implementation for Linux drivers that use %wpa_supplicant-based control implementation for Linux drivers that use wpa_supplicant-based control
of WPA IE and roaming. driver_ndis.c (with help from driver_ndis_.c) of WPA IE and roaming. \ref driver_ndis.c (with help from \ref driver_ndis_.c)
is an example of a complete interface for Windows NDIS interface for is an example of a complete interface for Windows NDIS interface for
drivers that generate WPA IE themselves and decide when to roam. These drivers that generate WPA IE themselves and decide when to roam. These
example implementations include full support for all security modes. example implementations include full support for all security modes.
@ -61,7 +61,7 @@ example implementations include full support for all security modes.
WPA introduces new requirements for the device driver. At least some WPA introduces new requirements for the device driver. At least some
of these need to be implemented in order to provide enough support for of these need to be implemented in order to provide enough support for
%wpa_supplicant. wpa_supplicant.
\subsection driver_tkip_ccmp TKIP/CCMP \subsection driver_tkip_ccmp TKIP/CCMP
@ -86,12 +86,12 @@ private ioctls can be used to provide similar functionality.
\subsection driver_roaming Roaming control and scanning support \subsection driver_roaming Roaming control and scanning support
%wpa_supplicant can optionally control AP selection based on the wpa_supplicant can optionally control AP selection based on the
information received from Beacon and/or Probe Response frames information received from Beacon and/or Probe Response frames
(ap_scan=1 mode in configuration). This means that the driver should (ap_scan=1 mode in configuration). This means that the driver should
support external control for scan process. In case of Linux, use of support external control for scan process. In case of Linux, use of
new Wireless Extensions scan support (i.e., 'iwlist wlan0 scan') is new Wireless Extensions scan support (i.e., 'iwlist wlan0 scan') is
recommended. The current driver wrapper (driver_wext.c) uses this for recommended. The current driver wrapper (\ref driver_wext.c) uses this for
scan results. scan results.
Scan results must also include the WPA information element. Support for Scan results must also include the WPA information element. Support for
@ -99,9 +99,9 @@ this was added in WE-18. With older versions, a custom event can be used
to provide the full WPA IE (including element id and length) as a hex to provide the full WPA IE (including element id and length) as a hex
string that is included in the scan results. string that is included in the scan results.
%wpa_supplicant needs to also be able to request the driver to wpa_supplicant needs to also be able to request the driver to
associate with a specific BSS. Current Host AP driver and matching associate with a specific BSS. Current Host AP driver and matching
driver_hostap.c wrapper uses following sequence for this \ref driver_hostap.c wrapper uses following sequence for this
request. Similar/identical mechanism should be usable also with other request. Similar/identical mechanism should be usable also with other
drivers. drivers.
@ -113,28 +113,28 @@ drivers.
\subsection driver_wpa_ie WPA IE generation \subsection driver_wpa_ie WPA IE generation
%wpa_supplicant selects which cipher suites and key management suites wpa_supplicant selects which cipher suites and key management suites
are used. Based on this information, it generates a WPA IE. This is are used. Based on this information, it generates a WPA IE. This is
provided to the driver interface in the associate call. This does not provided to the driver interface in the associate call. This does not
match with Windows NDIS drivers which generate the WPA IE match with Windows NDIS drivers which generate the WPA IE
themselves. themselves.
%wpa_supplicant allows Windows NDIS-like behavior by providing the wpa_supplicant allows Windows NDIS-like behavior by providing the
selected cipher and key management suites in the associate call. If selected cipher and key management suites in the associate call. If
the driver generates its own WPA IE and that differs from the one the driver generates its own WPA IE and that differs from the one
generated by %wpa_supplicant, the driver has to inform %wpa_supplicant generated by wpa_supplicant, the driver has to inform wpa_supplicant
about the used WPA IE (i.e., the one it used in (Re)Associate about the used WPA IE (i.e., the one it used in (Re)Associate
Request). This notification is done using EVENT_ASSOCINFO event (see Request). This notification is done using EVENT_ASSOCINFO event (see
driver.h). %wpa_supplicant is normally configured to use \ref driver.h). wpa_supplicant is normally configured to use
ap_scan=2 mode with drivers that control WPA IE generation and roaming. ap_scan=2 mode with drivers that control WPA IE generation and roaming.
\subsection driver_events Driver events \subsection driver_events Driver events
%wpa_supplicant needs to receive event callbacks when certain events wpa_supplicant needs to receive event callbacks when certain events
occur (association, disassociation, Michael MIC failure, scan results occur (association, disassociation, Michael MIC failure, scan results
available, PMKSA caching candidate). These events and the callback available, PMKSA caching candidate). These events and the callback
details are defined in driver.h (wpa_supplicant_event() function details are defined in \ref driver.h (\ref wpa_supplicant_event() function
and enum wpa_event_type). and enum \ref wpa_event_type).
On Linux, association and disassociation can use existing Wireless On Linux, association and disassociation can use existing Wireless
Extensions event that is reporting new AP with SIOCGIWAP Extensions event that is reporting new AP with SIOCGIWAP
@ -153,18 +153,18 @@ AP selection depends on ap_scan configuration:
ap_scan=1: ap_scan=1:
- %wpa_supplicant requests scan with SIOCSIWSCAN - wpa_supplicant requests scan with SIOCSIWSCAN
- driver reports scan complete with wireless event SIOCGIWSCAN - driver reports scan complete with wireless event SIOCGIWSCAN
- %wpa_supplicant reads scan results with SIOCGIWSCAN (multiple call if - wpa_supplicant reads scan results with SIOCGIWSCAN (multiple call if
a larget buffer is needed) a larget buffer is needed)
- %wpa_supplicant decides which AP to use based on scan results - wpa_supplicant decides which AP to use based on scan results
- %wpa_supplicant configures driver to associate with the selected BSS - wpa_supplicant configures driver to associate with the selected BSS
(SIOCSIWMODE, SIOCSIWGENIE, SIOCSIWAUTH, SIOCSIWFREQ, (SIOCSIWMODE, SIOCSIWGENIE, SIOCSIWAUTH, SIOCSIWFREQ,
SIOCSIWESSID, SIOCSIWAP) SIOCSIWESSID, SIOCSIWAP)
ap_scan=2: ap_scan=2:
- %wpa_supplicant configures driver to associate with an SSID - wpa_supplicant configures driver to associate with an SSID
(SIOCSIWMODE, SIOCSIWGENIE, SIOCSIWAUTH, SIOCSIWESSID) (SIOCSIWMODE, SIOCSIWGENIE, SIOCSIWAUTH, SIOCSIWESSID)
@ -174,7 +174,7 @@ After this, both modes use similar steps:
(Re)AssocReq), driver reports association parameters (AssocReq IEs) (Re)AssocReq), driver reports association parameters (AssocReq IEs)
with wireless event IWEVASSOCREQIE (and optionally IWEVASSOCRESPIE) with wireless event IWEVASSOCREQIE (and optionally IWEVASSOCRESPIE)
- driver reports association with wireless event SIOCGIWAP - driver reports association with wireless event SIOCGIWAP
- %wpa_supplicant takes care of EAPOL frame handling (validating - wpa_supplicant takes care of EAPOL frame handling (validating
information from associnfo and if needed, from scan results if WPA/RSN information from associnfo and if needed, from scan results if WPA/RSN
IE from the Beacon frame is not reported through associnfo) IE from the Beacon frame is not reported through associnfo)
*/ */

@ -2,44 +2,44 @@
\page eap_peer_module EAP peer implementation \page eap_peer_module EAP peer implementation
Extensible Authentication Protocol (EAP) is an authentication framework Extensible Authentication Protocol (EAP) is an authentication framework
defined in RFC 3748. %wpa_supplicant uses a separate code module for EAP defined in RFC 3748. wpa_supplicant uses a separate code module for EAP
peer implementation. This module was designed to use only a minimal set peer implementation. This module was designed to use only a minimal set
of direct function calls (mainly, to debug/event functions) in order for of direct function calls (mainly, to debug/event functions) in order for
it to be usable in other programs. The design of the EAP it to be usable in other programs. The design of the EAP
implementation is based loosely on RFC 4137. The state machine is implementation is based loosely on RFC 4137. The state machine is
defined in this RFC and so is the interface between the peer state defined in this RFC and so is the interface between the peer state
machine and methods. As such, this RFC provides useful information for machine and methods. As such, this RFC provides useful information for
understanding the EAP peer implementation in %wpa_supplicant. understanding the EAP peer implementation in wpa_supplicant.
Some of the terminology used in EAP state machine is referring to Some of the terminology used in EAP state machine is referring to
EAPOL (IEEE 802.1X), but there is no strict requirement on the lower EAPOL (IEEE 802.1X), but there is no strict requirement on the lower
layer being IEEE 802.1X if EAP module is built for other programs than layer being IEEE 802.1X if EAP module is built for other programs than
%wpa_supplicant. These terms should be understood to refer to the wpa_supplicant. These terms should be understood to refer to the
lower layer as defined in RFC 4137. lower layer as defined in RFC 4137.
\section adding_eap_methods Adding EAP methods \section adding_eap_methods Adding EAP methods
Each EAP method is implemented as a separate module, usually as one C Each EAP method is implemented as a separate module, usually as one C
file named eap_<name of the method>.c, e.g., eap_md5.c. All EAP file named eap_<name of the method>.c, e.g., \ref eap_md5.c. All EAP
methods use the same interface between the peer state machine and methods use the same interface between the peer state machine and
method specific functions. This allows new EAP methods to be added method specific functions. This allows new EAP methods to be added
without modifying the core EAP state machine implementation. without modifying the core EAP state machine implementation.
New EAP methods need to be registered by adding them into the build New EAP methods need to be registered by adding them into the build
(Makefile) and the EAP method registration list in the (Makefile) and the EAP method registration list in the
eap_peer_register_methods() function of eap_methods.c. Each EAP \ref eap_peer_register_methods() function of \ref eap_methods.c. Each EAP
method should use a build-time configuration option, e.g., EAP_TLS, in method should use a build-time configuration option, e.g., EAP_TLS, in
order to make it possible to select which of the methods are included order to make it possible to select which of the methods are included
in the build. in the build.
EAP methods must implement the interface defined in eap_i.h. struct EAP methods must implement the interface defined in \ref eap_i.h. struct
eap_method defines the needed function pointers that each EAP method eap_method defines the needed function pointers that each EAP method
must provide. In addition, the EAP type and name are registered using must provide. In addition, the EAP type and name are registered using
this structure. This interface is based on section 4.4 of RFC 4137. this structure. This interface is based on section 4.4 of RFC 4137.
It is recommended that the EAP methods would use generic helper It is recommended that the EAP methods would use generic helper
functions, eap_msg_alloc() and eap_hdr_validate() when processing functions, \ref eap_msg_alloc() and \ref eap_hdr_validate() when processing
messages. This allows code sharing and can avoid missing some of the messages. This allows code sharing and can avoid missing some of the
needed validation steps for received packets. In addition, these needed validation steps for received packets. In addition, these
functions make it easier to change between expanded and legacy EAP functions make it easier to change between expanded and legacy EAP
@ -48,23 +48,23 @@ header, if needed.
When adding an EAP method that uses a vendor specific EAP type When adding an EAP method that uses a vendor specific EAP type
(Expanded Type as defined in RFC 3748, Chapter 5.7), the new method (Expanded Type as defined in RFC 3748, Chapter 5.7), the new method
must be registered by passing vendor id instead of EAP_VENDOR_IETF to must be registered by passing vendor id instead of EAP_VENDOR_IETF to
eap_peer_method_alloc(). These methods must not try to emulate \ref eap_peer_method_alloc(). These methods must not try to emulate
expanded types by registering a legacy EAP method for type 254. See expanded types by registering a legacy EAP method for type 254. See
eap_vendor_test.c for an example of an EAP method implementation that \ref eap_vendor_test.c for an example of an EAP method implementation that
is implemented as an expanded type. is implemented as an expanded type.
\section used_eap_library Using EAP implementation as a library \section used_eap_library Using EAP implementation as a library
The Git repository has an eap_example directory that contains an The Git repository has an eap_example directory that contains an
example showing how EAP peer and server code from %wpa_supplicant and example showing how EAP peer and server code from wpa_supplicant and
hostapd can be used as a library. The example program initializes both hostapd can be used as a library. The example program initializes both
an EAP server and an EAP peer entities and then runs through an an EAP server and an EAP peer entities and then runs through an
EAP-PEAP/MSCHAPv2 authentication. EAP-PEAP/MSCHAPv2 authentication.
eap_example_peer.c shows the initialization and glue code needed to \ref eap_example_peer.c shows the initialization and glue code needed to
control the EAP peer implementation. eap_example_server.c does the control the EAP peer implementation. \ref eap_example_server.c does the
same for EAP server. eap_example.c is an example that ties in both the same for EAP server. \ref eap_example.c is an example that ties in both the
EAP server and client parts to allow an EAP authentication to be EAP server and client parts to allow an EAP authentication to be
shown. shown.
@ -77,9 +77,9 @@ uses IEEE 802.1X EAPOL state machines to control the transmission of
EAP messages and WiMax supports optional PMK EAP authentication EAP messages and WiMax supports optional PMK EAP authentication
mechanism that transmits EAP messages as defined in IEEE 802.16e. mechanism that transmits EAP messages as defined in IEEE 802.16e.
The EAP library links in number of helper functions from src/utils and The EAP library links in number of helper functions from \ref src/utils and
src/crypto directories. Most of these are suitable as-is, but it may \ref src/crypto directories. Most of these are suitable as-is, but it may
be desirable to replace the debug output code in src/utils/wpa_debug.c be desirable to replace the debug output code in \ref src/utils/wpa_debug.c
by dropping this file from the library and re-implementing the by dropping this file from the library and re-implementing the
functions there in a way that better fits in with the main functions there in a way that better fits in with the main
application. application.

@ -14,32 +14,32 @@ understanding the EAP server implementation in hostapd.
Some of the terminology used in EAP state machine is referring to Some of the terminology used in EAP state machine is referring to
EAPOL (IEEE 802.1X), but there is no strict requirement on the lower EAPOL (IEEE 802.1X), but there is no strict requirement on the lower
layer being IEEE 802.1X if EAP module is built for other programs than layer being IEEE 802.1X if EAP module is built for other programs than
%wpa_supplicant. These terms should be understood to refer to the wpa_supplicant. These terms should be understood to refer to the
lower layer as defined in RFC 4137. lower layer as defined in RFC 4137.
\section adding_eap_methods Adding EAP methods \section adding_eap_methods Adding EAP methods
Each EAP method is implemented as a separate module, usually as one C Each EAP method is implemented as a separate module, usually as one C
file named eap_<name of the method>.c, e.g., eap_md5.c. All EAP file named eap_server_<name of the method>.c, e.g., \ref eap_server_md5.c. All EAP
methods use the same interface between the server state machine and methods use the same interface between the server state machine and
method specific functions. This allows new EAP methods to be added method specific functions. This allows new EAP methods to be added
without modifying the core EAP state machine implementation. without modifying the core EAP state machine implementation.
New EAP methods need to be registered by adding them into the build New EAP methods need to be registered by adding them into the build
(Makefile) and the EAP method registration list in the (Makefile) and the EAP method registration list in the
eap_server_register_methods() function of eap_methods.c. Each EAP \ref eap_server_register_methods() function of \ref eap_server_methods.c. Each EAP
method should use a build-time configuration option, e.g., EAP_TLS, in method should use a build-time configuration option, e.g., EAP_TLS, in
order to make it possible to select which of the methods are included order to make it possible to select which of the methods are included
in the build. in the build.
EAP methods must implement the interface defined in eap_i.h. struct EAP methods must implement the interface defined in \ref eap_i.h. struct
eap_method defines the needed function pointers that each EAP method \ref eap_method defines the needed function pointers that each EAP method
must provide. In addition, the EAP type and name are registered using must provide. In addition, the EAP type and name are registered using
this structure. This interface is based on section 4.4 of RFC 4137. this structure. This interface is based on section 4.4 of RFC 4137.
It is recommended that the EAP methods would use generic helper It is recommended that the EAP methods would use generic helper
functions, eap_msg_alloc() and eap_hdr_validate() when processing functions, \ref eap_msg_alloc() and \ref eap_hdr_validate() when processing
messages. This allows code sharing and can avoid missing some of the messages. This allows code sharing and can avoid missing some of the
needed validation steps for received packets. In addition, these needed validation steps for received packets. In addition, these
functions make it easier to change between expanded and legacy EAP functions make it easier to change between expanded and legacy EAP
@ -48,9 +48,9 @@ header, if needed.
When adding an EAP method that uses a vendor specific EAP type When adding an EAP method that uses a vendor specific EAP type
(Expanded Type as defined in RFC 3748, Chapter 5.7), the new method (Expanded Type as defined in RFC 3748, Chapter 5.7), the new method
must be registered by passing vendor id instead of EAP_VENDOR_IETF to must be registered by passing vendor id instead of EAP_VENDOR_IETF to
eap_server_method_alloc(). These methods must not try to emulate \ref eap_server_method_alloc(). These methods must not try to emulate
expanded types by registering a legacy EAP method for type 254. See expanded types by registering a legacy EAP method for type 254. See
eap_vendor_test.c for an example of an EAP method implementation that \ref eap_server_vendor_test.c for an example of an EAP method implementation that
is implemented as an expanded type. is implemented as an expanded type.
*/ */

@ -4,58 +4,58 @@
hostapd implements a control interface that can be used by hostapd implements a control interface that can be used by
external programs to control the operations of the hostapd external programs to control the operations of the hostapd
daemon and to get status information and event notifications. There is daemon and to get status information and event notifications. There is
a small C library, in a form of a single C file, wpa_ctrl.c, that a small C library, in a form of a single C file, \ref wpa_ctrl.c, that
provides helper functions to facilitate the use of the control provides helper functions to facilitate the use of the control
interface. External programs can link this file into them and then use interface. External programs can link this file into them and then use
the library functions documented in wpa_ctrl.h to interact with the library functions documented in \ref wpa_ctrl.h to interact with
%wpa_supplicant. This library can also be used with C++. hostapd_cli.c wpa_supplicant. This library can also be used with C++. \ref hostapd_cli.c
is an example program using this library. is an example program using this library.
There are multiple mechanisms for inter-process communication. For There are multiple mechanisms for inter-process communication. For
example, Linux version of hostapd is using UNIX domain sockets for the example, Linux version of hostapd is using UNIX domain sockets for the
control interface. The use of the functions defined in wpa_ctrl.h can control interface. The use of the functions defined in \ref wpa_ctrl.h can
be used to hide the details of the used IPC from external programs. be used to hide the details of the used IPC from external programs.
\section using_ctrl_iface Using the control interface \section using_ctrl_iface Using the control interface
External programs, e.g., a GUI or a configuration utility, that need to External programs, e.g., a GUI or a configuration utility, that need to
communicate with hostapd should link in wpa_ctrl.c. This communicate with hostapd should link in \ref wpa_ctrl.c. This
allows them to use helper functions to open connection to the control allows them to use helper functions to open connection to the control
interface with wpa_ctrl_open() and to send commands with interface with \ref wpa_ctrl_open() and to send commands with
wpa_ctrl_request(). \ref wpa_ctrl_request().
hostapd uses the control interface for two types of communication: hostapd uses the control interface for two types of communication:
commands and unsolicited event messages. Commands are a pair of commands and unsolicited event messages. Commands are a pair of
messages, a request from the external program and a response from messages, a request from the external program and a response from
hostapd. These can be executed using wpa_ctrl_request(). hostapd. These can be executed using \ref wpa_ctrl_request().
Unsolicited event messages are sent by hostapd to the control Unsolicited event messages are sent by hostapd to the control
interface connection without specific request from the external program interface connection without specific request from the external program
for receiving each message. However, the external program needs to for receiving each message. However, the external program needs to
attach to the control interface with wpa_ctrl_attach() to receive these attach to the control interface with \ref wpa_ctrl_attach() to receive these
unsolicited messages. unsolicited messages.
If the control interface connection is used both for commands and If the control interface connection is used both for commands and
unsolicited event messages, there is potential for receiving an unsolicited event messages, there is potential for receiving an
unsolicited message between the command request and response. unsolicited message between the command request and response.
wpa_ctrl_request() caller will need to supply a callback, msg_cb, \ref wpa_ctrl_request() caller will need to supply a callback, msg_cb,
for processing these messages. Often it is easier to open two for processing these messages. Often it is easier to open two
control interface connections by calling wpa_ctrl_open() twice and control interface connections by calling \ref wpa_ctrl_open() twice and
then use one of the connections for commands and the other one for then use one of the connections for commands and the other one for
unsolicited messages. This way command request/response pairs will unsolicited messages. This way command request/response pairs will
not be broken by unsolicited messages. wpa_cli is an example of how not be broken by unsolicited messages. \ref wpa_cli.c is an example of how
to use only one connection for both purposes and wpa_gui demonstrates to use only one connection for both purposes and wpa_gui demonstrates
how to use two separate connections. how to use two separate connections.
Once the control interface connection is not needed anymore, it should Once the control interface connection is not needed anymore, it should
be closed by calling wpa_ctrl_close(). If the connection was used for be closed by calling \ref wpa_ctrl_close(). If the connection was used for
unsolicited event messages, it should be first detached by calling unsolicited event messages, it should be first detached by calling
wpa_ctrl_detach(). \ref wpa_ctrl_detach().
\section ctrl_iface_cmds Control interface commands \section ctrl_iface_cmds Control interface commands
Following commands can be used with wpa_ctrl_request(): Following commands can be used with \ref wpa_ctrl_request():
\subsection ctrl_iface_PING PING \subsection ctrl_iface_PING PING

@ -3,17 +3,17 @@
The goal of this documentation and comments in the source code is to The goal of this documentation and comments in the source code is to
give enough information for other developers to understand how give enough information for other developers to understand how
%wpa_supplicant and hostapd have been implemented, how they can be wpa_supplicant and hostapd have been implemented, how they can be
modified, how new drivers can be supported, and how the source code modified, how new drivers can be supported, and how the source code
can be ported to other operating systems. If any information is can be ported to other operating systems. If any information is
missing, feel free to contact Jouni Malinen <j@w1.fi> for more missing, feel free to contact Jouni Malinen <j@w1.fi> for more
information. Contributions as patch files are also very welcome at the information. Contributions as patch files are also very welcome at the
same address. Please note that this software is licensed under the same address. Please note that this software is licensed under the
BSD license (the one with advertisement clause removed). All BSD license (the one with advertisement clause removed). All
contributions to %wpa_supplicant and hostapd are expected to use contributions to wpa_supplicant and hostapd are expected to use
compatible licensing terms. compatible licensing terms.
The source code and read-only access to the combined %wpa_supplicant The source code and read-only access to the combined wpa_supplicant
and hostapd Git repository is available from the project home page at and hostapd Git repository is available from the project home page at
http://w1.fi/wpa_supplicant/. This developers' documentation is also http://w1.fi/wpa_supplicant/. This developers' documentation is also
available as a PDF file from available as a PDF file from
@ -22,14 +22,14 @@ http://w1.fi/wpa_supplicant/wpa_supplicant-devel.pdf .
\section _wpa_supplicant wpa_supplicant \section _wpa_supplicant wpa_supplicant
%wpa_supplicant is a WPA Supplicant for Linux, BSD and Windows with wpa_supplicant is a WPA Supplicant for Linux, BSD and Windows with
support for WPA and WPA2 (IEEE 802.11i / RSN). Supplicant is the IEEE support for WPA and WPA2 (IEEE 802.11i / RSN). Supplicant is the IEEE
802.1X/WPA component that is used in the client stations. It 802.1X/WPA component that is used in the client stations. It
implements key negotiation with a WPA Authenticator and it can optionally implements key negotiation with a WPA Authenticator and it can optionally
control roaming and IEEE 802.11 authentication/association of the wlan control roaming and IEEE 802.11 authentication/association of the wlan
driver. driver.
The design goal for %wpa_supplicant was to use hardware, driver, and The design goal for wpa_supplicant was to use hardware, driver, and
OS independent, portable C code for all WPA functionality. The source OS independent, portable C code for all WPA functionality. The source
code is divided into separate C files as shown on the \ref code is divided into separate C files as shown on the \ref
code_structure "code structure page". All hardware/driver specific code_structure "code structure page". All hardware/driver specific
@ -41,15 +41,15 @@ the \ref porting "porting page".
EAPOL (IEEE 802.1X) state machines are implemented as a separate EAPOL (IEEE 802.1X) state machines are implemented as a separate
module that interacts with \ref eap_peer_module "EAP peer implementation". module that interacts with \ref eap_peer_module "EAP peer implementation".
In addition to programs aimed at normal production use, In addition to programs aimed at normal production use,
%wpa_supplicant source tree includes number of \ref testing_tools wpa_supplicant source tree includes number of \ref testing_tools
"testing and development tools" that make it easier to test the "testing and development tools" that make it easier to test the
programs without having to setup a full test setup with wireless programs without having to setup a full test setup with wireless
cards. These tools can also be used to implement automatic test cards. These tools can also be used to implement automatic test
suites. suites.
%wpa_supplicant implements a wpa_supplicant implements a
\ref ctrl_iface_page "control interface" that can be used by \ref ctrl_iface_page "control interface" that can be used by
external programs to control the operations of the %wpa_supplicant external programs to control the operations of the wpa_supplicant
daemon and to get status information and event notifications. There is daemon and to get status information and event notifications. There is
a small C library that provides helper functions to facilitate the use of the a small C library that provides helper functions to facilitate the use of the
control interface. This library can also be used with C++. control interface. This library can also be used with C++.

@ -3,7 +3,7 @@
Wi-Fi Direct functionality is implemented any many levels in the WLAN Wi-Fi Direct functionality is implemented any many levels in the WLAN
stack from low-level driver operations to high-level GUI design. This stack from low-level driver operations to high-level GUI design. This
document covers the parts that can be user by %wpa_supplicant. However, document covers the parts that can be user by wpa_supplicant. However,
it should be noted that alternative designs are also possible, so some it should be noted that alternative designs are also possible, so some
of the functionality may reside in other components in the system. of the functionality may reside in other components in the system.
@ -19,16 +19,16 @@ P2P module implements higher layer functionality for management P2P
groups. It takes care of Device Discovery, Service Discovery, Group groups. It takes care of Device Discovery, Service Discovery, Group
Owner Negotiation, P2P Invitation. In addition, it maintains Owner Negotiation, P2P Invitation. In addition, it maintains
information about neighboring P2P Devices. This module could be used information about neighboring P2P Devices. This module could be used
in designs that do not use %wpa_supplicant and it could also reside in designs that do not use wpa_supplicant and it could also reside
inside the driver/firmware component. P2P module API is defined in inside the driver/firmware component. P2P module API is defined in
src/p2p/p2p.h. \ref src/p2p/p2p.h.
Provisioning step of Group Formation is implemented using WPS Provisioning step of Group Formation is implemented using WPS
(src/wps/wps.h). (\ref src/wps/wps.h).
%wpa_supplicant includes code in interact with both the P2P module wpa_supplicant includes code in interact with both the P2P module
(wpa_supplicant/p2p_supplicant.c) and WPS (\ref wpa_supplicant/p2p_supplicant.c) and WPS
(wpa_supplicant/wps_supplicant.c). The driver operations are passed (\ref wpa_supplicant/wps_supplicant.c). The driver operations are passed
through these files, i.e., core P2P or WPS code does not interact through these files, i.e., core P2P or WPS code does not interact
directly with the driver interface. directly with the driver interface.
@ -48,7 +48,7 @@ functionality.
\subsection p2p_arch_mac80211 P2P architecture with Linux/mac80211/ath9k \subsection p2p_arch_mac80211 P2P architecture with Linux/mac80211/ath9k
An architecture where the P2P module resides inside the An architecture where the P2P module resides inside the
%wpa_supplicant process is used with Linux mac80211-based drivers, wpa_supplicant process is used with Linux mac80211-based drivers,
e.g., ath9k. The following diagram shows the main components related e.g., ath9k. The following diagram shows the main components related
to P2P functionality in such an architecture. to P2P functionality in such an architecture.
@ -82,7 +82,7 @@ and the alternating Listen and Search states within Find).
\subsection p2p_module_api P2P module API \subsection p2p_module_api P2P module API
P2P module API is defined in src/p2p/p2p.h. The API consists of P2P module API is defined in \ref src/p2p/p2p.h. The API consists of
functions for requesting operations and for providing event functions for requesting operations and for providing event
notifications. Similar set of callback functions are configured with notifications. Similar set of callback functions are configured with
struct p2p_config to provide callback functions that P2P module can struct p2p_config to provide callback functions that P2P module can
@ -92,51 +92,51 @@ used for P2P related operations.
These are the main functions for an upper layer management entity to These are the main functions for an upper layer management entity to
request P2P operations: request P2P operations:
- p2p_find() - \ref p2p_find()
- p2p_stop_find() - \ref p2p_stop_find()
- p2p_listen() - \ref p2p_listen()
- p2p_connect() - \ref p2p_connect()
- p2p_reject() - \ref p2p_reject()
- p2p_prov_disc_req() - \ref p2p_prov_disc_req()
- p2p_sd_request() - \ref p2p_sd_request()
- p2p_sd_cancel_request() - \ref p2p_sd_cancel_request()
- p2p_sd_response() - \ref p2p_sd_response()
- p2p_sd_service_update() - \ref p2p_sd_service_update()
- p2p_invite() - \ref p2p_invite()
These are the main callback functions for P2P module to provide event These are the main callback functions for P2P module to provide event
notifications to the upper layer management entity: notifications to the upper layer management entity:
- p2p_config::dev_found() - \ref p2p_config::dev_found()
- p2p_config::go_neg_req_rx() - \ref p2p_config::go_neg_req_rx()
- p2p_config::go_neg_completed() - \ref p2p_config::go_neg_completed()
- p2p_config::sd_request() - \ref p2p_config::sd_request()
- p2p_config::sd_response() - \ref p2p_config::sd_response()
- p2p_config::prov_disc_req() - \ref p2p_config::prov_disc_req()
- p2p_config::prov_disc_resp() - \ref p2p_config::prov_disc_resp()
- p2p_config::invitation_process() - \ref p2p_config::invitation_process()
- p2p_config::invitation_received() - \ref p2p_config::invitation_received()
- p2p_config::invitation_result() - \ref p2p_config::invitation_result()
The P2P module uses following functions to request lower layer driver The P2P module uses following functions to request lower layer driver
operations: operations:
- p2p_config::p2p_scan() - \ref p2p_config::p2p_scan()
- p2p_config::send_probe_resp() - \ref p2p_config::send_probe_resp()
- p2p_config::send_action() - \ref p2p_config::send_action()
- p2p_config::send_action_done() - \ref p2p_config::send_action_done()
- p2p_config::start_listen() - \ref p2p_config::start_listen()
- p2p_config::stop_listen() - \ref p2p_config::stop_listen()
Events from lower layer driver operations are delivered to the P2P Events from lower layer driver operations are delivered to the P2P
module with following functions: module with following functions:
- p2p_probe_req_rx() - \ref p2p_probe_req_rx()
- p2p_rx_action() - \ref p2p_rx_action()
- p2p_scan_res_handler() - \ref p2p_scan_res_handler()
- p2p_scan_res_handled() - \ref p2p_scan_res_handled()
- p2p_send_action_cb() - \ref p2p_send_action_cb()
- p2p_listen_cb() - \ref p2p_listen_cb()
In addition to the per-device state, the P2P module maintains In addition to the per-device state, the P2P module maintains
per-group state for group owners. This is initialized with a call to per-group state for group owners. This is initialized with a call to
@ -144,39 +144,36 @@ p2p_group_init() when a group is created and deinitialized with
p2p_group_deinit(). The upper layer GO management entity uses p2p_group_deinit(). The upper layer GO management entity uses
following functions to interact with the P2P per-group state: following functions to interact with the P2P per-group state:
- p2p_group_notif_assoc() - \ref p2p_group_notif_assoc()
- p2p_group_notif_disassoc() - \ref p2p_group_notif_disassoc()
- p2p_group_notif_formation_done() - \ref p2p_group_notif_formation_done()
- p2p_group_match_dev_type() - \ref p2p_group_match_dev_type()
The P2P module will use following callback function to update P2P IE The P2P module will use following callback function to update P2P IE
for GO Beacon and Probe Response frames: for GO Beacon and Probe Response frames:
- p2p_group_config::ie_update() - \ref p2p_group_config::ie_update()
\section p2p_driver P2P driver operations (low-level interface) \section p2p_driver P2P driver operations (low-level interface)
The following driver wrapper functions are needed for P2P in addition The following driver wrapper functions are needed for P2P in addition
to the standard station/AP mode operations when the P2P module resides to the standard station/AP mode operations when the P2P module resides
within %wpa_supplicant: within wpa_supplicant:
- wpa_driver_ops::if_add() - \ref wpa_driver_ops::if_add()
- wpa_driver_ops::if_remove() - \ref wpa_driver_ops::if_remove()
- wpa_driver_ops::alloc_interface_addr() - \ref wpa_driver_ops::remain_on_channel()
- wpa_driver_ops::release_interface_addr() - \ref wpa_driver_ops::cancel_remain_on_channel()
- wpa_driver_ops::remain_on_channel() - \ref wpa_driver_ops::send_action()
- wpa_driver_ops::cancel_remain_on_channel() - \ref wpa_driver_ops::probe_req_report()
- wpa_driver_ops::send_action()
- wpa_driver_ops::probe_req_report()
- wpa_driver_ops::disable_11b_rates()
The following driver wrapper events are needed for P2P in addition to The following driver wrapper events are needed for P2P in addition to
the standard station/AP mode events when the P2P module resides within the standard station/AP mode events when the P2P module resides within
%wpa_supplicant: wpa_supplicant:
- wpa_event_type::EVENT_RX_ACTION - \ref wpa_event_type::EVENT_RX_MGMT
- wpa_event_type::EVENT_REMAIN_ON_CHANNEL - \ref wpa_event_type::EVENT_REMAIN_ON_CHANNEL
- wpa_event_type::EVENT_CANCEL_REMAIN_ON_CHANNEL - \ref wpa_event_type::EVENT_CANCEL_REMAIN_ON_CHANNEL
- wpa_event_type::EVENT_RX_PROBE_REQ - \ref wpa_event_type::EVENT_RX_PROBE_REQ
\section p2p_go_neg P2P device discovery and group formation \section p2p_go_neg P2P device discovery and group formation
@ -188,40 +185,40 @@ the glue code outside the P2P module depends on the architecture used
in the system. in the system.
An upper layer management entity starts P2P device discovery by An upper layer management entity starts P2P device discovery by
calling p2p_find(). The P2P module start the discovery by requesting a calling \ref p2p_find(). The P2P module start the discovery by requesting a
full scan to be completed by calling p2p_config::p2p_scan(). Results full scan to be completed by calling \ref p2p_config::p2p_scan(). Results
from the scan will be reported by calling p2p_scan_res_handler() and from the scan will be reported by calling \ref p2p_scan_res_handler() and
after last result, the scan result processing is terminated with a after last result, the scan result processing is terminated with a
call to p2p_scan_res_handled(). The P2P peers that are found during call to \ref p2p_scan_res_handled(). The P2P peers that are found during
the full scan are reported with the p2p_config::dev_found() callback. the full scan are reported with the \ref p2p_config::dev_found() callback.
After the full scan, P2P module start alternating between Listen and After the full scan, P2P module start alternating between Listen and
Search states until the device discovery operation times out or Search states until the device discovery operation times out or
terminated, e.g., with a call to p2p_stop_find(). terminated, e.g., with a call to \ref p2p_stop_find().
When going into the Listen state, the P2P module requests the driver When going into the Listen state, the P2P module requests the driver
to be configured to be awake on the listen channel with a call to to be configured to be awake on the listen channel with a call to
p2p_config::start_listen(). The glue code using the P2P module may \ref p2p_config::start_listen(). The glue code using the P2P module may
implement this, e.g., by using remain-on-channel low-level driver implement this, e.g., by using remain-on-channel low-level driver
functionality for off-channel operation. Once the driver is available functionality for off-channel operation. Once the driver is available
on the requested channel, notification of this is delivered by calling on the requested channel, notification of this is delivered by calling
p2p_listen_cb(). The Probe Request frames that are received during the \ref p2p_listen_cb(). The Probe Request frames that are received during the
Listen period are delivered to the P2P module by calling Listen period are delivered to the P2P module by calling
p2p_config::p2p_probe_req_rx() and P2P module request a response to \ref p2p_config::p2p_probe_req_rx() and P2P module request a response to
these to be sent by using p2p_config::send_probe_resp() callback these to be sent by using \ref p2p_config::send_probe_resp() callback
function. If a group owner negotiation from another P2P device is function. If a group owner negotiation from another P2P device is
received during the device discovery phase, that is indicated to the received during the device discovery phase, that is indicated to the
upper layer code with the p2p_config::go_neg_req_tx() callback. upper layer code with the \ref p2p_config::go_neg_req_tx() callback.
The Search state is implemented by using the normal scan interface, The Search state is implemented by using the normal scan interface,
i.e., the P2P module will call p2p_config::p2p_scan() just like in the i.e., the P2P module will call \ref p2p_config::p2p_scan() just like in the
full scan phase described. Similarly, scan results from the search full scan phase described. Similarly, scan results from the search
operation will be delivered to the P2P module using the operation will be delivered to the P2P module using the
p2p_scan_res_handler() and p2p_scan_res_handled() functions. \ref p2p_scan_res_handler() and \ref p2p_scan_res_handled() functions.
Once the upper layer management entity has found a peer with which it Once the upper layer management entity has found a peer with which it
wants to connect by forming a new group, it initiates group owner wants to connect by forming a new group, it initiates group owner
negotiation by calling p2p_connect(). Before doing this, the upper negotiation by calling \ref p2p_connect(). Before doing this, the upper
layer code is responsible for asking the user to provide the PIN to be layer code is responsible for asking the user to provide the PIN to be
used during the provisioning step with the peer or the push button used during the provisioning step with the peer or the push button
press for PBC mode. The glue code will need to figure out the intended press for PBC mode. The glue code will need to figure out the intended
@ -231,25 +228,25 @@ started.
Optional Provision Discovery mechanism can be used to request the peer Optional Provision Discovery mechanism can be used to request the peer
to display a PIN for the local device to enter (and vice versa). Upper to display a PIN for the local device to enter (and vice versa). Upper
layer management entity can request the specific mechanism by calling layer management entity can request the specific mechanism by calling
p2p_prov_disc_req(). The response to this will be reported with the \ref p2p_prov_disc_req(). The response to this will be reported with the
p2p_config::prov_disc_resp() callback. If the peer device started \ref p2p_config::prov_disc_resp() callback. If the peer device started
Provision Discovery, an accepted request will be reported with the Provision Discovery, an accepted request will be reported with the
p2p_config::prov_disc_req() callback. The P2P module will \ref p2p_config::prov_disc_req() callback. The P2P module will
automatically accept the Provision Discovery for display and keypad automatically accept the Provision Discovery for display and keypad
methods, but it is up to the upper layer manegement entity to actually methods, but it is up to the upper layer manegement entity to actually
generate the PIN and to configure it with following p2p_connect() call generate the PIN and to configure it with following \ref p2p_connect() call
to actually authorize the connection. to actually authorize the connection.
The P2P module will use p2p_config::send_action() callback to request The P2P module will use \ref p2p_config::send_action() callback to request
lower layer code to transmit an Action frame during group owner lower layer code to transmit an Action frame during group owner
negotiation. p2p_send_action_cb() is used to report the result of negotiation. \ref p2p_send_action_cb() is used to report the result of
transmission. If the peer is not reachable, the P2P module will try to transmission. If the peer is not reachable, the P2P module will try to
find it by alternating between Action frame send and Listen find it by alternating between Action frame send and Listen
states. The Listen state for this phase will be used similarly to the states. The Listen state for this phase will be used similarly to the
Listen state during device discovery as described above. Listen state during device discovery as described above.
Once the group owner negotiation has been completed, its results will Once the group owner negotiation has been completed, its results will
be reported with the p2p_config::go_neg_completed() callback. The be reported with the \ref p2p_config::go_neg_completed() callback. The
upper layer management code or the glue code using the P2P module API upper layer management code or the glue code using the P2P module API
is responsible for creating a new group interface and starting is responsible for creating a new group interface and starting
provisioning step at this point by configuring WPS Registrar or provisioning step at this point by configuring WPS Registrar or
@ -258,15 +255,15 @@ results. The upper layer code is also responsible for timing out WPS
provisioning if it cannot be completed in 15 seconds. provisioning if it cannot be completed in 15 seconds.
Successful completion of the WPS provisioning is reported with a call Successful completion of the WPS provisioning is reported with a call
to p2p_wps_success_cb(). The P2P module will clear its group formation to \ref p2p_wps_success_cb(). The P2P module will clear its group formation
state at this point and allows new group formation attempts to be state at this point and allows new group formation attempts to be
started. The upper layer management code is responsible for configuring started. The upper layer management code is responsible for configuring
the GO to accept associations from devices and the client to connect to the GO to accept associations from devices and the client to connect to
the GO with the provisioned credentials. GO is also responsible for the GO with the provisioned credentials. GO is also responsible for
calling p2p_group_notif_formation_done() as described below. calling \ref p2p_group_notif_formation_done() as described below.
If the WPS provisioning step fails or times out, this is reported with If the WPS provisioning step fails or times out, this is reported with
a call to p2p_group_formation_failed(). The P2P module will clear its a call to \ref p2p_group_formation_failed(). The P2P module will clear its
group formation state at this point and allows new group formation group formation state at this point and allows new group formation
attempts to be started. The upper layer management code is responsible attempts to be started. The upper layer management code is responsible
for removing the group interface for the failed group. for removing the group interface for the failed group.
@ -289,23 +286,23 @@ Response TLV(s) for responses.
\subsection p2p_sd_query Quering services of peers \subsection p2p_sd_query Quering services of peers
Service discovery is implemented by processing pending queries as a Service discovery is implemented by processing pending queries as a
part of the device discovery phase. p2p_sd_request() function is used part of the device discovery phase. \ref p2p_sd_request() function is used
to schedule service discovery queries to a specific peer or to all to schedule service discovery queries to a specific peer or to all
discovered peers. p2p_sd_cancel_request() can be used to cancel a discovered peers. \ref p2p_sd_cancel_request() can be used to cancel a
scheduled query. Queries that are specific to a single peer will be scheduled query. Queries that are specific to a single peer will be
removed automatically after the response has been received. removed automatically after the response has been received.
After the service discovery queries have been queued, device discovery After the service discovery queries have been queued, device discovery
is started with a call to p2p_find(). The pending service discovery is started with a call to \ref p2p_find(). The pending service discovery
queries are then sent whenever a peer is discovered during the find queries are then sent whenever a peer is discovered during the find
operation. Responses to the queries will be reported with the operation. Responses to the queries will be reported with the
p2p_config::sd_response() callback. \ref p2p_config::sd_response() callback.
\subsection p2p_sd_response Replying to service discovery queries from peers \subsection p2p_sd_response Replying to service discovery queries from peers
The received service discovery requests will be indicated with the The received service discovery requests will be indicated with the
p2p_config::sd_request() callback. The response to the query is sent \ref p2p_config::sd_request() callback. The response to the query is sent
by calling p2p_sd_response(). by calling \ref p2p_sd_response().
\subsection p2p_sd_indicator Service update indicator \subsection p2p_sd_indicator Service update indicator
@ -314,9 +311,9 @@ changes in available services. This works by incrementing Service
Update Indicator value whenever there is a change in the Update Indicator value whenever there is a change in the
services. This value is included in all SD request and response services. This value is included in all SD request and response
frames. The value received from the peers will be included in the frames. The value received from the peers will be included in the
p2p_config::sd_request() and p2p_config::sd_response() callbacks. The \ref p2p_config::sd_request() and \ref p2p_config::sd_response() callbacks. The
value to be sent to the peers is incremented with a call to value to be sent to the peers is incremented with a call to
p2p_sd_service_update() whenever availibility of the local services \ref p2p_sd_service_update() whenever availibility of the local services
changes. changes.
@ -329,29 +326,29 @@ code outside the P2P module depends on the architecture used in the
system. system.
When a P2P group interface is created in group owner role, per-group When a P2P group interface is created in group owner role, per-group
data is initialized with p2p_group_init(). This call provides a data is initialized with \ref p2p_group_init(). This call provides a
pointer to the per-device P2P module context and configures the pointer to the per-device P2P module context and configures the
per-group operation. The configured p2p_group_config::ie_update() per-group operation. The configured \ref p2p_group_config::ie_update()
callback is used to set the initial P2P IE for Beacon and Probe callback is used to set the initial P2P IE for Beacon and Probe
Response frames in the group owner. The AP mode implementation may use Response frames in the group owner. The AP mode implementation may use
this information to add IEs into the frames. this information to add IEs into the frames.
Once the group formation has been completed (or if it is skipped in Once the group formation has been completed (or if it is skipped in
case of manual group setup), p2p_group_notif_formation_done() is case of manual group setup), \ref p2p_group_notif_formation_done() is
called. This will allow the P2P module to update the P2P IE for called. This will allow the P2P module to update the P2P IE for
Beacon and Probe Response frames. Beacon and Probe Response frames.
The SME/MLME code that managements IEEE 802.11 association processing The SME/MLME code that managements IEEE 802.11 association processing
needs to inform P2P module whenever a P2P client associates or needs to inform P2P module whenever a P2P client associates or
disassociates with the group. This is done by calling disassociates with the group. This is done by calling
p2p_group_notif_assoc() and p2p_group_notif_disassoc(). The P2P module \ref p2p_group_notif_assoc() and \ref p2p_group_notif_disassoc(). The P2P module
manages a list of group members and updates the P2P Group Information manages a list of group members and updates the P2P Group Information
subelement in the P2P IE based on the information from the P2P subelement in the P2P IE based on the information from the P2P
clients. The p2p_group_config::ie_update() callback is used whenever clients. The \ref p2p_group_config::ie_update() callback is used whenever
the P2P IE in Probe Response frames needs to be changed. the P2P IE in Probe Response frames needs to be changed.
The SME/MLME code that takes care of replying to Probe Request frames The SME/MLME code that takes care of replying to Probe Request frames
can use p2p_group_match_dev_type() to check whether the Probe Request can use \ref p2p_group_match_dev_type() to check whether the Probe Request
frame request a reply only from groups that include a specific device frame request a reply only from groups that include a specific device
type in one of the clients or GO. A match will be reported if the type in one of the clients or GO. A match will be reported if the
Probe Request does not request a specific device type, so this Probe Request does not request a specific device type, so this
@ -359,13 +356,13 @@ function can be used to filter or received Probe Request frames and
only the ones that result in non-zero return value need to be replied. only the ones that result in non-zero return value need to be replied.
When the P2P group interface for GO role is removed, When the P2P group interface for GO role is removed,
p2p_group_deinit() is used to deinitialize the per-group P2P module \ref p2p_group_deinit() is used to deinitialize the per-group P2P module
state. state.
\section p2p_ctrl_iface P2P control interface \section p2p_ctrl_iface P2P control interface
%wpa_supplicant \ref ctrl_iface_page "control interface" can be used wpa_supplicant \ref ctrl_iface_page "control interface" can be used
to manage P2P functionality from an external program (e.g., a GUI or a to manage P2P functionality from an external program (e.g., a GUI or a
system configuration manager). This interface can be used directly system configuration manager). This interface can be used directly
through the control interface backend mechanism (e.g., local domain through the control interface backend mechanism (e.g., local domain
@ -414,11 +411,11 @@ control interface commands and events can be used.
\subsection p2p_wpa_cli wpa_cli example \subsection p2p_wpa_cli wpa_cli example
wpa_cli can be used to control %wpa_supplicant in interactive wpa_cli can be used to control wpa_supplicant in interactive
mode. The following sessions show examples of commands used for mode. The following sessions show examples of commands used for
device discovery and group formation. The lines starting with "> " are device discovery and group formation. The lines starting with "> " are
commands from the user (followed by command result indication) and commands from the user (followed by command result indication) and
lines starting with "<2>" are event messages from %wpa_supplicant. lines starting with "<2>" are event messages from wpa_supplicant.
P2P device "Wireless Client": P2P device "Wireless Client":

@ -1,14 +1,14 @@
/** /**
\page porting Porting to different target boards and operating systems \page porting Porting to different target boards and operating systems
%wpa_supplicant was designed to be easily portable to different wpa_supplicant was designed to be easily portable to different
hardware (board, CPU) and software (OS, drivers) targets. It is hardware (board, CPU) and software (OS, drivers) targets. It is
already used with number of operating systems and numerous wireless already used with number of operating systems and numerous wireless
card models and drivers. The main %wpa_supplicant repository includes card models and drivers. The main wpa_supplicant repository includes
support for Linux, FreeBSD, and Windows. In addition, the code has been support for Linux, FreeBSD, and Windows. In addition, the code has been
ported to number of other operating systems like VxWorks, PalmOS, ported to number of other operating systems like VxWorks, PalmOS,
Windows CE, and Windows Mobile. On the hardware Windows CE, and Windows Mobile. On the hardware
side, %wpa_supplicant is used on various systems: desktops, laptops, side, wpa_supplicant is used on various systems: desktops, laptops,
PDAs, and embedded devices with CPUs including x86, PowerPC, PDAs, and embedded devices with CPUs including x86, PowerPC,
arm/xscale, and MIPS. Both big and little endian configurations are arm/xscale, and MIPS. Both big and little endian configurations are
supported. supported.
@ -16,48 +16,48 @@ supported.
\section ansi_c_extra Extra functions on top of ANSI C \section ansi_c_extra Extra functions on top of ANSI C
%wpa_supplicant is mostly using ANSI C functions that are available on wpa_supplicant is mostly using ANSI C functions that are available on
most targets. However, couple of additional functions that are common most targets. However, couple of additional functions that are common
on modern UNIX systems are used. Number of these are listed with on modern UNIX systems are used. Number of these are listed with
prototypes in common.h (the \verbatim #ifdef CONFIG_ANSI_C_EXTRA \endverbatim prototypes in \ref common.h (the \verbatim #ifdef CONFIG_ANSI_C_EXTRA \endverbatim
block). These functions may need to be implemented or at least defined block). These functions may need to be implemented or at least defined
as macros to native functions in the target OS or C library. as macros to native functions in the target OS or C library.
Many of the common ANSI C functions are used through a wrapper Many of the common ANSI C functions are used through a wrapper
definitions in os.h to allow these to be replaced easily with a definitions in \ref os.h to allow these to be replaced easily with a
platform specific version in case standard C libraries are not platform specific version in case standard C libraries are not
available. In addition, os.h defines couple of common platform available. In addition, \ref os.h defines couple of common platform
specific functions that are implemented in os_unix.c for UNIX like specific functions that are implemented in \ref os_unix.c for UNIX like
targets and in os_win32.c for Win32 API. If the target platform does targets and in \ref os_win32.c for Win32 API. If the target platform does
not support either of these examples, a new os_*.c file may need to be not support either of these examples, a new os_*.c file may need to be
added. added.
Unless OS_NO_C_LIB_DEFINES is defined, the standard ANSI C and POSIX Unless OS_NO_C_LIB_DEFINES is defined, the standard ANSI C and POSIX
functions are used by defining the os_*() wrappers to use them functions are used by defining the os_*() wrappers to use them
directly in order to avoid extra cost in size and speed. If the target directly in order to avoid extra cost in size and speed. If the target
platform needs different versions of the functions, os.h can be platform needs different versions of the functions, \ref os.h can be
modified to define the suitable macros or alternatively, modified to define the suitable macros or alternatively,
OS_NO_C_LIB_DEFINES may be defined for the build and the wrapper OS_NO_C_LIB_DEFINES may be defined for the build and the wrapper
functions can then be implemented in a new os_*.c wrapper file. functions can then be implemented in a new os_*.c wrapper file.
common.h defines number of helper macros for handling integers of \ref common.h defines number of helper macros for handling integers of
different size and byte order. Suitable version of these definitions different size and byte order. Suitable version of these definitions
may need to be added for the target platform. may need to be added for the target platform.
\section configuration_backend Configuration backend \section configuration_backend Configuration backend
%wpa_supplicant implements a configuration interface that allows the wpa_supplicant implements a configuration interface that allows the
backend to be easily replaced in order to read configuration data from backend to be easily replaced in order to read configuration data from
a suitable source depending on the target platform. config.c a suitable source depending on the target platform. \ref config.c
implements the generic code that can be shared with all configuration implements the generic code that can be shared with all configuration
backends. Each backend is implemented in its own config_*.c file. backends. Each backend is implemented in its own config_*.c file.
The included config_file.c backend uses a text file for configuration The included \ref config_file.c backend uses a text file for configuration
and config_winreg.c uses Windows registry. These files can be used as and \ref config_winreg.c uses Windows registry. These files can be used as
an example for a new configuration backend if the target platform uses an example for a new configuration backend if the target platform uses
different mechanism for configuration parameters. In addition, different mechanism for configuration parameters. In addition,
config_none.c can be used as an empty starting point for building a \ref config_none.c can be used as an empty starting point for building a
new configuration backend. new configuration backend.
@ -69,19 +69,19 @@ adding a new driver interface module or modifying an existing module
(driver_*.c) if the new target is similar to one of them. \ref (driver_*.c) if the new target is similar to one of them. \ref
driver_wrapper "Driver wrapper implementation" describes the details driver_wrapper "Driver wrapper implementation" describes the details
of the driver interface and discusses the tasks involved in porting of the driver interface and discusses the tasks involved in porting
this part of %wpa_supplicant. this part of wpa_supplicant.
\section l2_packet_porting l2_packet (link layer access) \section l2_packet_porting l2_packet (link layer access)
%wpa_supplicant needs to have access to sending and receiving layer 2 wpa_supplicant needs to have access to sending and receiving layer 2
(link layer) packets with two Ethertypes: EAP-over-LAN (EAPOL) 0x888e (link layer) packets with two Ethertypes: EAP-over-LAN (EAPOL) 0x888e
and RSN pre-authentication 0x88c7. l2_packet.h defines the interfaces and RSN pre-authentication 0x88c7. \ref l2_packet.h defines the interfaces
used for this in the core %wpa_supplicant implementation. used for this in the core wpa_supplicant implementation.
If the target operating system supports a generic mechanism for link If the target operating system supports a generic mechanism for link
layer access, that is likely the best mechanism for providing the layer access, that is likely the best mechanism for providing the
needed functionality for %wpa_supplicant. Linux packet socket is an needed functionality for wpa_supplicant. Linux packet socket is an
example of such a generic mechanism. If this is not available, a example of such a generic mechanism. If this is not available, a
separate interface may need to be implemented to the network stack or separate interface may need to be implemented to the network stack or
driver. This is usually an intermediate or protocol driver that is driver. This is usually an intermediate or protocol driver that is
@ -89,26 +89,27 @@ operating between the device driver and the OS network stack. If such
a mechanism is not feasible, the interface can also be implemented a mechanism is not feasible, the interface can also be implemented
directly in the device driver. directly in the device driver.
The main %wpa_supplicant repository includes l2_packet implementations The main wpa_supplicant repository includes l2_packet implementations
for Linux using packet sockets (l2_packet_linux.c), more portable for Linux using packet sockets (\ref l2_packet_linux.c), more portable
version using libpcap/libdnet libraries (l2_packet_pcap.c; this version using libpcap/libdnet libraries (\ref l2_packet_pcap.c; this
supports WinPcap, too), and FreeBSD specific version of libpcap supports WinPcap, too), and FreeBSD specific version of libpcap
interface (l2_packet_freebsd.c). interface (\ref l2_packet_freebsd.c).
If the target operating system is supported by libpcap (receiving) and If the target operating system is supported by libpcap (receiving) and
libdnet (sending), l2_packet_pcap.c can likely be used with minimal or libdnet (sending), \ref l2_packet_pcap.c can likely be used with minimal or
no changes. If this is not a case or a proprietary interface for link no changes. If this is not a case or a proprietary interface for link
layer is required, a new l2_packet module may need to be layer is required, a new l2_packet module may need to be
added. Alternatively, struct wpa_driver_ops::send_eapol() handler can added. Alternatively, for hostapd,
struct \ref wpa_driver_ops::hapd_send_eapol() handler can
be used to override the l2_packet library if the link layer access is be used to override the l2_packet library if the link layer access is
integrated with the driver interface implementation. integrated with the driver interface implementation.
\section eloop_porting Event loop \section eloop_porting Event loop
%wpa_supplicant uses a single process/thread model and an event loop wpa_supplicant uses a single process/thread model and an event loop
to provide callbacks on events (registered timeout, received packet, to provide callbacks on events (registered timeout, received packet,
signal). eloop.h defines the event loop interface. eloop.c is an signal). eloop.h defines the event loop interface. \ref eloop.c is an
implementation of such an event loop using select() and sockets. This implementation of such an event loop using select() and sockets. This
is suitable for most UNIX/POSIX systems. When porting to other is suitable for most UNIX/POSIX systems. When porting to other
operating systems, it may be necessary to replace that implementation operating systems, it may be necessary to replace that implementation
@ -117,64 +118,64 @@ with OS specific mechanisms that provide similar functionality.
\section ctrl_iface_porting Control interface \section ctrl_iface_porting Control interface
%wpa_supplicant uses a \ref ctrl_iface_page "control interface" wpa_supplicant uses a \ref ctrl_iface_page "control interface"
to allow external processed to allow external processed
to get status information and to control the operations. Currently, to get status information and to control the operations. Currently,
this is implemented with socket based communication; both UNIX domain this is implemented with socket based communication; both UNIX domain
sockets and UDP sockets are supported. If the target OS does not sockets and UDP sockets are supported. If the target OS does not
support sockets, this interface will likely need to be modified to use support sockets, this interface will likely need to be modified to use
another mechanism like message queues. The control interface is another mechanism like message queues. The control interface is
optional component, so it is also possible to run %wpa_supplicant optional component, so it is also possible to run wpa_supplicant
without porting this part. without porting this part.
The %wpa_supplicant side of the control interface is implemented in The wpa_supplicant side of the control interface is implemented in
ctrl_iface.c. Matching client side is implemented as a control \ref wpa_supplicant/ctrl_iface.c. Matching client side is implemented as a control
interface library in wpa_ctrl.c. interface library in \ref wpa_ctrl.c.
\section entry_point Program entry point \section entry_point Program entry point
%wpa_supplicant defines a set of functions that can be used to wpa_supplicant defines a set of functions that can be used to
initialize main supplicant processing. Each operating system has a initialize main supplicant processing. Each operating system has a
mechanism for starting new processing or threads. This is usually a mechanism for starting new processing or threads. This is usually a
function with a specific set of arguments and calling convention. This function with a specific set of arguments and calling convention. This
function is responsible on initializing %wpa_supplicant. function is responsible on initializing wpa_supplicant.
main.c includes an entry point for UNIX-like operating system, i.e., \ref wpa_supplicant/main.c includes an entry point for UNIX-like
main() function that uses command line arguments for setting operating system, i.e., main() function that uses command line arguments
parameters for %wpa_supplicant. When porting to other operating for setting parameters for wpa_supplicant. When porting to other
systems, similar OS-specific entry point implementation is needed. It operating systems, similar OS-specific entry point implementation is
can be implemented in a new file that is then linked with needed. It can be implemented in a new file that is then linked with
%wpa_supplicant instead of main.o. main.c is also a good example on wpa_supplicant instead of main.o. \ref wpa_supplicant/main.c is also a
how the initialization process should be done. good example on how the initialization process should be done.
The supplicant initialization functions are defined in The supplicant initialization functions are defined in
wpa_supplicant_i.h. In most cases, the entry point function should \ref wpa_supplicant_i.h. In most cases, the entry point function should
start by fetching configuration parameters. After this, a global start by fetching configuration parameters. After this, a global
%wpa_supplicant context is initialized with a call to wpa_supplicant context is initialized with a call to
wpa_supplicant_init(). After this, existing network interfaces can be \ref wpa_supplicant_init(). After this, existing network interfaces can be
added with wpa_supplicant_add_iface(). wpa_supplicant_run() is then added with \ref wpa_supplicant_add_iface(). \ref wpa_supplicant_run() is then
used to start the main event loop. Once this returns at program used to start the main event loop. Once this returns at program
termination time, wpa_supplicant_deinit() is used to release global termination time, \ref wpa_supplicant_deinit() is used to release global
context data. context data.
wpa_supplicant_add_iface() and wpa_supplicant_remove_iface() can be \ref wpa_supplicant_add_iface() and \ref wpa_supplicant_remove_iface() can be
used dynamically to add and remove interfaces based on when used dynamically to add and remove interfaces based on when
%wpa_supplicant processing is needed for them. This can be done, e.g., wpa_supplicant processing is needed for them. This can be done, e.g.,
when hotplug network adapters are being inserted and ejected. It is when hotplug network adapters are being inserted and ejected. It is
also possible to do this when a network interface is being also possible to do this when a network interface is being
enabled/disabled if it is desirable that %wpa_supplicant processing enabled/disabled if it is desirable that wpa_supplicant processing
for the interface is fully enabled/disabled at the same time. for the interface is fully enabled/disabled at the same time.
\section simple_build Simple build example \section simple_build Simple build example
One way to start a porting project is to begin with a very simple One way to start a porting project is to begin with a very simple
build of %wpa_supplicant with WPA-PSK support and once that is build of wpa_supplicant with WPA-PSK support and once that is
building correctly, start adding features. building correctly, start adding features.
Following command can be used to build very simple version of Following command can be used to build very simple version of
%wpa_supplicant: wpa_supplicant:
\verbatim \verbatim
cc -o wpa_supplicant config.c eloop.c common.c md5.c rc4.c sha1.c \ cc -o wpa_supplicant config.c eloop.c common.c md5.c rc4.c sha1.c \
@ -192,7 +193,7 @@ including the listed C files.
Once this version can be build successfully, the end result can be Once this version can be build successfully, the end result can be
made functional by adding a proper program entry point (main*.c), made functional by adding a proper program entry point (main*.c),
driver interface (driver_*.c and matching CONFIG_DRIVER_* define for driver interface (driver_*.c and matching CONFIG_DRIVER_* define for
registration in drivers.c), configuration parser/writer (config_*.c), registration in \ref drivers.c), configuration parser/writer (config_*.c),
and layer 2 packet access implementation (l2_packet_*.c). After these and layer 2 packet access implementation (l2_packet_*.c). After these
components have been added, the end result should be a working components have been added, the end result should be a working
WPA/WPA2-PSK enabled supplicant. WPA/WPA2-PSK enabled supplicant.

@ -6,7 +6,7 @@
\ref unit_tests "Unit tests" | \ref unit_tests "Unit tests" |
\ref wpa_trace "Tracing code" ] \ref wpa_trace "Tracing code" ]
%wpa_supplicant source tree includes number of testing and development wpa_supplicant source tree includes number of testing and development
tools that make it easier to test the programs without having to setup tools that make it easier to test the programs without having to setup
a full test setup with wireless cards. In addition, these tools can be a full test setup with wireless cards. In addition, these tools can be
used to implement automatic tests suites. used to implement automatic tests suites.
@ -14,7 +14,7 @@ used to implement automatic tests suites.
\section eapol_test eapol_test - EAP peer and RADIUS client testing \section eapol_test eapol_test - EAP peer and RADIUS client testing
eapol_test is a program that links together the same EAP peer eapol_test is a program that links together the same EAP peer
implementation that %wpa_supplicant is using and the RADIUS implementation that wpa_supplicant is using and the RADIUS
authentication client code from hostapd. In addition, it has minimal authentication client code from hostapd. In addition, it has minimal
glue code to combine these two components in similar ways to IEEE glue code to combine these two components in similar ways to IEEE
802.1X/EAPOL Authenticator state machines. In other words, it 802.1X/EAPOL Authenticator state machines. In other words, it
@ -34,7 +34,7 @@ could be used to implement an automated regression test suite for a
RADIUS authentication server. RADIUS authentication server.
eapol_test uses the same build time configuration file, .config, as eapol_test uses the same build time configuration file, .config, as
%wpa_supplicant. This file is used to select which EAP methods are wpa_supplicant. This file is used to select which EAP methods are
included in eapol_test. This program is not built with the default included in eapol_test. This program is not built with the default
Makefile target, so a separate make command needs to be used to Makefile target, so a separate make command needs to be used to
compile the tool: compile the tool:
@ -77,7 +77,7 @@ tries to complete EAP authentication based on the network
configuration from test.conf against the RADIUS server running on the configuration from test.conf against the RADIUS server running on the
local host. A re-authentication is triggered to test fast local host. A re-authentication is triggered to test fast
re-authentication. The configuration file uses the same format for re-authentication. The configuration file uses the same format for
network blocks as %wpa_supplicant. network blocks as wpa_supplicant.
\section preauth_test preauth_test - WPA2 pre-authentication and EAP peer testing \section preauth_test preauth_test - WPA2 pre-authentication and EAP peer testing
@ -85,8 +85,8 @@ network blocks as %wpa_supplicant.
preauth_test is similar to eapol_test in the sense that in combines preauth_test is similar to eapol_test in the sense that in combines
EAP peer implementation with something else, in this case, with WPA2 EAP peer implementation with something else, in this case, with WPA2
pre-authentication. This tool can be used to test pre-authentication pre-authentication. This tool can be used to test pre-authentication
based on the code that %wpa_supplicant is using. As such, it tests based on the code that wpa_supplicant is using. As such, it tests
both the %wpa_supplicant implementation and the functionality of an both the wpa_supplicant implementation and the functionality of an
access point. access point.
preauth_test is built with: preauth_test is built with:
@ -112,7 +112,7 @@ pre-authentication packets would be sent using the eth0 interface.
\section unit_tests Unit tests \section unit_tests Unit tests
Number of the components (.c files) used in %wpa_supplicant define Number of the components (.c files) used in wpa_supplicant define
their own unit tests for automated validation of the basic their own unit tests for automated validation of the basic
functionality. Most of the tests for cryptographic algorithms are functionality. Most of the tests for cryptographic algorithms are
using standard test vectors to validate functionality. These tests can using standard test vectors to validate functionality. These tests can
@ -131,7 +131,7 @@ exit code if all tests were completed successfully.
\section wpa_trace Tracing code for developer debuggin \section wpa_trace Tracing code for developer debuggin
%wpa_supplicant and hostapd can be built with tracing code that will wpa_supplicant and hostapd can be built with tracing code that will
track and analyze memory allocations and other resource registrations track and analyze memory allocations and other resource registrations
and certain API uses. If incorrect use is detected, a backtrace of the and certain API uses. If incorrect use is detected, a backtrace of the
call location (and/or allocation location) is shown. This can also be call location (and/or allocation location) is shown. This can also be

Loading…
Cancel
Save