18d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/*
28d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * hostapd / IEEE 802.11 Management
3391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt * Copyright (c) 2002-2013, Jouni Malinen <j@w1.fi>
48d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
5c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * This software may be distributed under the terms of the BSD license.
6c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * See README for more details.
78d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
88d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
98d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "utils/includes.h"
108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifndef CONFIG_NATIVE_WINDOWS
128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "utils/common.h"
148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "utils/eloop.h"
158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "crypto/crypto.h"
16a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#include "crypto/sha256.h"
17a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#include "crypto/random.h"
188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common/ieee802_11_defs.h"
198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common/ieee802_11_common.h"
208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common/wpa_ctrl.h"
21a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#include "common/sae.h"
228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "radius/radius.h"
238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "radius/radius_client.h"
248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "p2p/p2p.h"
258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "wps/wps.h"
268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "hostapd.h"
278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "beacon.h"
288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "ieee802_11_auth.h"
298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "sta_info.h"
308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "ieee802_1x.h"
318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "wpa_auth.h"
328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "wmm.h"
338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "ap_list.h"
348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "accounting.h"
358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "ap_config.h"
368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "ap_mlme.h"
378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "p2p_hostapd.h"
388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "ap_drv_ops.h"
39a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#include "wnm_ap.h"
408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "ieee802_11.h"
41f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt#include "dfs.h"
428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtu8 * hostapd_eid_supp_rates(struct hostapd_data *hapd, u8 *eid)
458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 *pos = eid;
478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int i, num, count;
488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->iface->current_rates == NULL)
508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return eid;
518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	*pos++ = WLAN_EID_SUPP_RATES;
538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	num = hapd->iface->num_rates;
548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->iconf->ieee80211n && hapd->iconf->require_ht)
558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		num++;
56d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (hapd->iconf->ieee80211ac && hapd->iconf->require_vht)
57d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		num++;
588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (num > 8) {
598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* rest of the rates are encoded in Extended supported
608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * rates element */
618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		num = 8;
628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	*pos++ = num;
658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	for (i = 0, count = 0; i < hapd->iface->num_rates && count < num;
668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	     i++) {
678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		count++;
688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		*pos = hapd->iface->current_rates[i].rate / 5;
698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hapd->iface->current_rates[i].flags & HOSTAPD_RATE_BASIC)
708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			*pos |= 0x80;
718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		pos++;
728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
74d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (hapd->iconf->ieee80211n && hapd->iconf->require_ht && count < 8) {
75d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		count++;
768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		*pos++ = 0x80 | BSS_MEMBERSHIP_SELECTOR_HT_PHY;
77d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	}
78d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
79d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (hapd->iconf->ieee80211ac && hapd->iconf->require_vht && count < 8) {
80d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		count++;
81d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		*pos++ = 0x80 | BSS_MEMBERSHIP_SELECTOR_VHT_PHY;
82d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	}
838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return pos;
858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtu8 * hostapd_eid_ext_supp_rates(struct hostapd_data *hapd, u8 *eid)
898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 *pos = eid;
918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int i, num, count;
928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->iface->current_rates == NULL)
948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return eid;
958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	num = hapd->iface->num_rates;
978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->iconf->ieee80211n && hapd->iconf->require_ht)
988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		num++;
99d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (hapd->iconf->ieee80211ac && hapd->iconf->require_vht)
100d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		num++;
1018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (num <= 8)
1028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return eid;
1038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	num -= 8;
1048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	*pos++ = WLAN_EID_EXT_SUPP_RATES;
1068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	*pos++ = num;
1078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	for (i = 0, count = 0; i < hapd->iface->num_rates && count < num + 8;
1088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	     i++) {
1098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		count++;
1108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (count <= 8)
1118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			continue; /* already in SuppRates IE */
1128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		*pos = hapd->iface->current_rates[i].rate / 5;
1138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hapd->iface->current_rates[i].flags & HOSTAPD_RATE_BASIC)
1148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			*pos |= 0x80;
1158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		pos++;
1168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
118d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (hapd->iconf->ieee80211n && hapd->iconf->require_ht) {
119d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		count++;
120d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		if (count > 8)
121d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			*pos++ = 0x80 | BSS_MEMBERSHIP_SELECTOR_HT_PHY;
122d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	}
123d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
124d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (hapd->iconf->ieee80211ac && hapd->iconf->require_vht) {
125d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		count++;
126d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		if (count > 8)
127d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			*pos++ = 0x80 | BSS_MEMBERSHIP_SELECTOR_VHT_PHY;
128d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	}
1298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return pos;
1318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
1328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtu16 hostapd_own_capab_info(struct hostapd_data *hapd, struct sta_info *sta,
1358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   int probe)
1368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
1378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int capab = WLAN_CAPABILITY_ESS;
1388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int privacy;
139f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	int dfs;
140f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt
141f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	/* Check if any of configured channels require DFS */
142f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	dfs = hostapd_is_dfs_required(hapd->iface);
143f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	if (dfs < 0) {
144f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		wpa_printf(MSG_WARNING, "Failed to check if DFS is required; ret=%d",
145f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt			   dfs);
146f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		dfs = 0;
147f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	}
1488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->iface->num_sta_no_short_preamble == 0 &&
1508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    hapd->iconf->preamble == SHORT_PREAMBLE)
1518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		capab |= WLAN_CAPABILITY_SHORT_PREAMBLE;
1528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	privacy = hapd->conf->ssid.wep.keys_set;
1548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->conf->ieee802_1x &&
1568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    (hapd->conf->default_wep_key_len ||
1578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	     hapd->conf->individual_wep_key_len))
1588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		privacy = 1;
1598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->conf->wpa)
1618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		privacy = 1;
1628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
163f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt#ifdef CONFIG_HS20
164f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	if (hapd->conf->osen)
165f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		privacy = 1;
166f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt#endif /* CONFIG_HS20 */
167f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt
1688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta) {
1698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		int policy, def_klen;
1708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (probe && sta->ssid_probe) {
1718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			policy = sta->ssid_probe->security_policy;
1728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			def_klen = sta->ssid_probe->wep.default_len;
1738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		} else {
1748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			policy = sta->ssid->security_policy;
1758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			def_klen = sta->ssid->wep.default_len;
1768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
1778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		privacy = policy != SECURITY_PLAINTEXT;
1788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (policy == SECURITY_IEEE_802_1X && def_klen == 0)
1798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			privacy = 0;
1808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (privacy)
1838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		capab |= WLAN_CAPABILITY_PRIVACY;
1848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->iface->current_mode &&
1868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    hapd->iface->current_mode->mode == HOSTAPD_MODE_IEEE80211G &&
1878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    hapd->iface->num_sta_no_short_slot_time == 0)
1888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		capab |= WLAN_CAPABILITY_SHORT_SLOT_TIME;
1898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
190f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	/*
191f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	 * Currently, Spectrum Management capability bit is set when directly
192f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	 * requested in configuration by spectrum_mgmt_required or when AP is
193f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	 * running on DFS channel.
194f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	 * TODO: Also consider driver support for TPC to set Spectrum Mgmt bit
195f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	 */
196f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	if (hapd->iface->current_mode &&
197f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	    hapd->iface->current_mode->mode == HOSTAPD_MODE_IEEE80211A &&
198f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	    (hapd->iconf->spectrum_mgmt_required || dfs))
199f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		capab |= WLAN_CAPABILITY_SPECTRUM_MGMT;
200f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt
2018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return capab;
2028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
2038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic u16 auth_shared_key(struct hostapd_data *hapd, struct sta_info *sta,
2068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   u16 auth_transaction, const u8 *challenge,
2078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   int iswep)
2088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
2098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
2108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       HOSTAPD_LEVEL_DEBUG,
2118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       "authentication (shared key, transaction %d)",
2128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       auth_transaction);
2138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (auth_transaction == 1) {
2158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (!sta->challenge) {
2168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			/* Generate a pseudo-random challenge */
2178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			u8 key[8];
2188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			struct os_time now;
2198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			int r;
2208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			sta->challenge = os_zalloc(WLAN_AUTH_CHALLENGE_LEN);
2218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			if (sta->challenge == NULL)
2228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				return WLAN_STATUS_UNSPECIFIED_FAILURE;
2238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			os_get_time(&now);
2258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			r = os_random();
2268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			os_memcpy(key, &now.sec, 4);
2278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			os_memcpy(key + 4, &r, 4);
2288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			rc4_skip(key, sizeof(key), 0,
2298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				 sta->challenge, WLAN_AUTH_CHALLENGE_LEN);
2308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
2318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return 0;
2328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (auth_transaction != 3)
2358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return WLAN_STATUS_UNSPECIFIED_FAILURE;
2368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* Transaction 3 */
2388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!iswep || !sta->challenge || !challenge ||
239c28170251eb54dbf64a9074a07fee377587425b2Dmitry Shmidt	    os_memcmp_const(sta->challenge, challenge,
240c28170251eb54dbf64a9074a07fee377587425b2Dmitry Shmidt			    WLAN_AUTH_CHALLENGE_LEN)) {
2418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
2428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_INFO,
2438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "shared key authentication - invalid "
2448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "challenge-response");
2458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return WLAN_STATUS_CHALLENGE_FAIL;
2468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
2498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       HOSTAPD_LEVEL_DEBUG,
2508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       "authentication OK (shared key)");
2518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->flags |= WLAN_STA_AUTH;
2528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_auth_sm_event(sta->wpa_sm, WPA_AUTH);
2538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_free(sta->challenge);
2548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->challenge = NULL;
2558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
2578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
2588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void send_auth_reply(struct hostapd_data *hapd,
2618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    const u8 *dst, const u8 *bssid,
2628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    u16 auth_alg, u16 auth_transaction, u16 resp,
2638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    const u8 *ies, size_t ies_len)
2648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
2658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct ieee80211_mgmt *reply;
2668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 *buf;
2678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	size_t rlen;
2688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
2708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	buf = os_zalloc(rlen);
2718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (buf == NULL)
2728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
2738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply = (struct ieee80211_mgmt *) buf;
2758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
2768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					    WLAN_FC_STYPE_AUTH);
2778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(reply->da, dst, ETH_ALEN);
2788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(reply->sa, hapd->own_addr, ETH_ALEN);
2798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(reply->bssid, bssid, ETH_ALEN);
2808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply->u.auth.auth_alg = host_to_le16(auth_alg);
2828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
2838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply->u.auth.status_code = host_to_le16(resp);
2848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (ies && ies_len)
2868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_memcpy(reply->u.auth.variable, ies, ies_len);
2878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR
2898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)",
2908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   MAC2STR(dst), auth_alg, auth_transaction,
2918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   resp, (unsigned long) ies_len);
2921f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (hostapd_drv_send_mlme(hapd, reply, rlen, 0) < 0)
293cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "send_auth_reply: send");
2948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_free(buf);
2968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
2978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
3008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void handle_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid,
3018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				  u16 auth_transaction, u16 status,
3028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				  const u8 *ies, size_t ies_len)
3038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
3048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct hostapd_data *hapd = ctx;
3058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct sta_info *sta;
3068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	send_auth_reply(hapd, dst, bssid, WLAN_AUTH_FT, auth_transaction,
3088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			status, ies, ies_len);
3098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (status != WLAN_STATUS_SUCCESS)
3118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
3128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta = ap_get_sta(hapd, dst);
3148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta == NULL)
3158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
3168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_logger(hapd, dst, HOSTAPD_MODULE_IEEE80211,
3188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       HOSTAPD_LEVEL_DEBUG, "authentication OK (FT)");
3198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->flags |= WLAN_STA_AUTH;
3208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	mlme_authenticate_indication(hapd, sta);
3218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
3228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
3238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
325d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#ifdef CONFIG_SAE
326d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
327a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidtstatic struct wpabuf * auth_process_sae_commit(struct hostapd_data *hapd,
328a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					       struct sta_info *sta)
329d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt{
330d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	struct wpabuf *buf;
331d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
332a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (hapd->conf->ssid.wpa_passphrase == NULL) {
333a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_printf(MSG_DEBUG, "SAE: No password available");
334d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		return NULL;
335a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
336a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
337a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (sae_prepare_commit(hapd->own_addr, sta->addr,
338a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			       (u8 *) hapd->conf->ssid.wpa_passphrase,
339a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			       os_strlen(hapd->conf->ssid.wpa_passphrase),
340a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			       sta->sae) < 0) {
341a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE");
342a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return NULL;
343a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
344d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
345a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (sae_process_commit(sta->sae) < 0) {
346a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_printf(MSG_DEBUG, "SAE: Failed to process peer commit");
347a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return NULL;
348a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
349a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
350a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	buf = wpabuf_alloc(SAE_COMMIT_MAX_LEN);
351a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (buf == NULL)
352a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return NULL;
353a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	sae_write_commit(sta->sae, buf, NULL);
354d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
355d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	return buf;
356d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt}
357d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
358d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
359d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidtstatic struct wpabuf * auth_build_sae_confirm(struct hostapd_data *hapd,
360d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt					      struct sta_info *sta)
361d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt{
362d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	struct wpabuf *buf;
363d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
364a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	buf = wpabuf_alloc(SAE_CONFIRM_MAX_LEN);
365d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (buf == NULL)
366d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		return NULL;
367d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
368a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	sae_write_confirm(sta->sae, buf);
369d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
370d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	return buf;
371d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt}
372d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
373d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
374a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidtstatic int use_sae_anti_clogging(struct hostapd_data *hapd)
375d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt{
376a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	struct sta_info *sta;
377a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	unsigned int open = 0;
378d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
379a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (hapd->conf->sae_anti_clogging_threshold == 0)
380a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return 1;
381a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
382a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	for (sta = hapd->sta_list; sta; sta = sta->next) {
383a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (!sta->sae)
384a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			continue;
385a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (sta->sae->state != SAE_COMMITTED &&
386a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		    sta->sae->state != SAE_CONFIRMED)
387a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			continue;
388a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		open++;
389a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (open >= hapd->conf->sae_anti_clogging_threshold)
390a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			return 1;
391d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	}
392d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
393a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	return 0;
394a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt}
395a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
396a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
397a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidtstatic int check_sae_token(struct hostapd_data *hapd, const u8 *addr,
398a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			   const u8 *token, size_t token_len)
399a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt{
400a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	u8 mac[SHA256_MAC_LEN];
401a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
402a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (token_len != SHA256_MAC_LEN)
403a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return -1;
404a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (hmac_sha256(hapd->sae_token_key, sizeof(hapd->sae_token_key),
405a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			addr, ETH_ALEN, mac) < 0 ||
406c28170251eb54dbf64a9074a07fee377587425b2Dmitry Shmidt	    os_memcmp_const(token, mac, SHA256_MAC_LEN) != 0)
407a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return -1;
408a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
409a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	return 0;
410d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt}
411d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
412d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
413a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidtstatic struct wpabuf * auth_build_token_req(struct hostapd_data *hapd,
414a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					    const u8 *addr)
415d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt{
416a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	struct wpabuf *buf;
417a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	u8 *token;
41804f534e89ed127da4077485376f24debc50d80d5Dmitry Shmidt	struct os_reltime now;
419d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
42004f534e89ed127da4077485376f24debc50d80d5Dmitry Shmidt	os_get_reltime(&now);
42104f534e89ed127da4077485376f24debc50d80d5Dmitry Shmidt	if (!os_reltime_initialized(&hapd->last_sae_token_key_update) ||
42204f534e89ed127da4077485376f24debc50d80d5Dmitry Shmidt	    os_reltime_expired(&now, &hapd->last_sae_token_key_update, 60)) {
423a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (random_get_bytes(hapd->sae_token_key,
424a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				     sizeof(hapd->sae_token_key)) < 0)
425a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			return NULL;
426a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_hexdump(MSG_DEBUG, "SAE: Updated token key",
427a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			    hapd->sae_token_key, sizeof(hapd->sae_token_key));
42804f534e89ed127da4077485376f24debc50d80d5Dmitry Shmidt		hapd->last_sae_token_key_update = now;
429a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
430d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
431a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	buf = wpabuf_alloc(SHA256_MAC_LEN);
432a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (buf == NULL)
433a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return NULL;
434d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
435a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	token = wpabuf_put(buf, SHA256_MAC_LEN);
436a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	hmac_sha256(hapd->sae_token_key, sizeof(hapd->sae_token_key),
437a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		    addr, ETH_ALEN, token);
438a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
439a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	return buf;
440d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt}
441d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
442d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
443d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidtstatic void handle_auth_sae(struct hostapd_data *hapd, struct sta_info *sta,
444d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			    const struct ieee80211_mgmt *mgmt, size_t len,
445d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			    u8 auth_transaction)
446d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt{
447d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	u16 resp = WLAN_STATUS_SUCCESS;
448a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	struct wpabuf *data = NULL;
449a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
450a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (!sta->sae) {
451a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (auth_transaction != 1)
452a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			return;
453a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		sta->sae = os_zalloc(sizeof(*sta->sae));
454a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (sta->sae == NULL)
455a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			return;
456a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		sta->sae->state = SAE_NOTHING;
457a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
458d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
459d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (auth_transaction == 1) {
460a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		const u8 *token = NULL;
461a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		size_t token_len = 0;
462d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
463d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
464d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			       "start SAE authentication (RX commit)");
465a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
466a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					((const u8 *) mgmt) + len -
467a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					mgmt->u.auth.variable, &token,
468a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					&token_len, hapd->conf->sae_groups);
469a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (token && check_sae_token(hapd, sta->addr, token, token_len)
470a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		    < 0) {
471a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			wpa_printf(MSG_DEBUG, "SAE: Drop commit message with "
472a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				   "incorrect token from " MACSTR,
473a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				   MAC2STR(sta->addr));
474a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			return;
475a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		}
476a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
477a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (resp == WLAN_STATUS_SUCCESS) {
478a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			if (!token && use_sae_anti_clogging(hapd)) {
479a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				wpa_printf(MSG_DEBUG, "SAE: Request anti-"
480a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					   "clogging token from " MACSTR,
481a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					   MAC2STR(sta->addr));
482a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				data = auth_build_token_req(hapd, sta->addr);
483a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				resp = WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ;
484a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			} else {
485a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				data = auth_process_sae_commit(hapd, sta);
486a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				if (data == NULL)
487a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
488a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				else
489a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					sta->sae->state = SAE_COMMITTED;
490a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			}
491a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		}
492d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	} else if (auth_transaction == 2) {
493a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (sta->sae->state != SAE_COMMITTED) {
494d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			hostapd_logger(hapd, sta->addr,
495d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				       HOSTAPD_MODULE_IEEE80211,
496d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				       HOSTAPD_LEVEL_DEBUG,
497d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				       "SAE confirm before commit");
498d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
49996be6222df414a7dde5c5b1b72df22e67b1a77fcDmitry Shmidt			goto failed;
500d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		}
501d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
502d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
503d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			       "SAE authentication (RX confirm)");
504a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (sae_check_confirm(sta->sae, mgmt->u.auth.variable,
505a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				       ((u8 *) mgmt) + len -
506a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				       mgmt->u.auth.variable) < 0) {
507a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
508a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		} else {
509a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			resp = WLAN_STATUS_SUCCESS;
510d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			sta->flags |= WLAN_STA_AUTH;
511d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			wpa_auth_sm_event(sta->wpa_sm, WPA_AUTH);
512d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			sta->auth_alg = WLAN_AUTH_SAE;
513d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			mlme_authenticate_indication(hapd, sta);
514a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
515a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			data = auth_build_sae_confirm(hapd, sta);
516a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			if (data == NULL)
517a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
518a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			else {
519a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				sta->sae->state = SAE_ACCEPTED;
520a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				sae_clear_temp_data(sta->sae);
521a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			}
522d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		}
523d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	} else {
524d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
525d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
526d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			       "unexpected SAE authentication transaction %u",
527d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			       auth_transaction);
528d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
529d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	}
530d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
53196be6222df414a7dde5c5b1b72df22e67b1a77fcDmitry Shmidtfailed:
532d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	sta->auth_alg = WLAN_AUTH_SAE;
533d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
534d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	send_auth_reply(hapd, mgmt->sa, mgmt->bssid, WLAN_AUTH_SAE,
535d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			auth_transaction, resp,
536d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			data ? wpabuf_head(data) : (u8 *) "",
537d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			data ? wpabuf_len(data) : 0);
538d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	wpabuf_free(data);
539d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt}
540d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#endif /* CONFIG_SAE */
541d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
542d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
5438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void handle_auth(struct hostapd_data *hapd,
5448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			const struct ieee80211_mgmt *mgmt, size_t len)
5458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
5468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u16 auth_alg, auth_transaction, status_code;
5478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u16 resp = WLAN_STATUS_SUCCESS;
5488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct sta_info *sta = NULL;
5498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int res;
5508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u16 fc;
5518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	const u8 *challenge = NULL;
5528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u32 session_timeout, acct_interim_interval;
5538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int vlan_id = 0;
554d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	struct hostapd_sta_wpa_psk_short *psk = NULL;
5558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 resp_ies[2 + WLAN_AUTH_CHALLENGE_LEN];
5568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	size_t resp_ies_len = 0;
55761d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	char *identity = NULL;
55861d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	char *radius_cui = NULL;
5598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
5608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) {
561cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "handle_auth - too short payload (len=%lu)",
562cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   (unsigned long) len);
5638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
5648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
5658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
5668da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt#ifdef CONFIG_TESTING_OPTIONS
5677832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt	if (hapd->iconf->ignore_auth_probability > 0.0 &&
5688da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt	    drand48() < hapd->iconf->ignore_auth_probability) {
5698da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt		wpa_printf(MSG_INFO,
5708da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt			   "TESTING: ignoring auth frame from " MACSTR,
5718da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt			   MAC2STR(mgmt->sa));
5728da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt		return;
5738da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt	}
5748da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt#endif /* CONFIG_TESTING_OPTIONS */
5758da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt
5768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
5778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);
5788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	status_code = le_to_host16(mgmt->u.auth.status_code);
5798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	fc = le_to_host16(mgmt->frame_control);
5808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
5818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (len >= IEEE80211_HDRLEN + sizeof(mgmt->u.auth) +
5828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    2 + WLAN_AUTH_CHALLENGE_LEN &&
5838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    mgmt->u.auth.variable[0] == WLAN_EID_CHALLENGE &&
5848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    mgmt->u.auth.variable[1] == WLAN_AUTH_CHALLENGE_LEN)
5858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		challenge = &mgmt->u.auth.variable[2];
5868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
5878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d "
5888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   "auth_transaction=%d status_code=%d wep=%d%s",
5898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   MAC2STR(mgmt->sa), auth_alg, auth_transaction,
5908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   status_code, !!(fc & WLAN_FC_ISWEP),
5918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   challenge ? " challenge" : "");
5928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
5938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->tkip_countermeasures) {
5948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp = WLAN_REASON_MICHAEL_MIC_FAILURE;
5958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		goto fail;
5968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
5978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
5988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!(((hapd->conf->auth_algs & WPA_AUTH_ALG_OPEN) &&
5998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	       auth_alg == WLAN_AUTH_OPEN) ||
6008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
6011f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	      (hapd->conf->wpa && wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt) &&
6028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	       auth_alg == WLAN_AUTH_FT) ||
6038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
604d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#ifdef CONFIG_SAE
605d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	      (hapd->conf->wpa && wpa_key_mgmt_sae(hapd->conf->wpa_key_mgmt) &&
606d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	       auth_alg == WLAN_AUTH_SAE) ||
607d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#endif /* CONFIG_SAE */
6088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	      ((hapd->conf->auth_algs & WPA_AUTH_ALG_SHARED) &&
6098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	       auth_alg == WLAN_AUTH_SHARED_KEY))) {
610cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "Unsupported authentication algorithm (%d)",
611cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   auth_alg);
6128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG;
6138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		goto fail;
6148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
6158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
616d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (!(auth_transaction == 1 || auth_alg == WLAN_AUTH_SAE ||
6178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	      (auth_alg == WLAN_AUTH_SHARED_KEY && auth_transaction == 3))) {
618cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "Unknown authentication transaction number (%d)",
619cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   auth_transaction);
6208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
6218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		goto fail;
6228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
6238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (os_memcmp(mgmt->sa, hapd->own_addr, ETH_ALEN) == 0) {
625cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate",
626cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   MAC2STR(mgmt->sa));
6278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
6288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		goto fail;
6298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
6308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	res = hostapd_allowed_address(hapd, mgmt->sa, (u8 *) mgmt, len,
6328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				      &session_timeout,
6331f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				      &acct_interim_interval, &vlan_id,
634d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				      &psk, &identity, &radius_cui);
6351f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
6368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (res == HOSTAPD_ACL_REJECT) {
637cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate",
638cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   MAC2STR(mgmt->sa));
6398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
6408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		goto fail;
6418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
6428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (res == HOSTAPD_ACL_PENDING) {
6438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR
6448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   " waiting for an external authentication",
6458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   MAC2STR(mgmt->sa));
6468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* Authentication code will re-send the authentication frame
6478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * after it has received (and cached) information from the
6488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * external source. */
6498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
6508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
6518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta = ap_sta_add(hapd, mgmt->sa);
6538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!sta) {
6544b06059785b935dd1f4f09314e4e12c417d2c6a4Dmitry Shmidt		resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
6558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		goto fail;
6568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
6578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (vlan_id > 0) {
65934af306c42b7ccf956508e7cd23f0ba90606e360Dmitry Shmidt		if (!hostapd_vlan_id_valid(hapd->conf->vlan, vlan_id)) {
6608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_RADIUS,
6618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       HOSTAPD_LEVEL_INFO, "Invalid VLAN ID "
6628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       "%d received from RADIUS server",
6638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       vlan_id);
6648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
6658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			goto fail;
6668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
6678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->vlan_id = vlan_id;
6688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_RADIUS,
6698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_INFO, "VLAN ID %d", sta->vlan_id);
6708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
6718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
672d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	hostapd_free_psk_list(sta->psk);
673d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (hapd->conf->wpa_psk_radius != PSK_RADIUS_IGNORED) {
674d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		sta->psk = psk;
675d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		psk = NULL;
6761f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	} else {
6771f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		sta->psk = NULL;
6781f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	}
6791f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
68061d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	sta->identity = identity;
68161d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	identity = NULL;
68261d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	sta->radius_cui = radius_cui;
68361d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	radius_cui = NULL;
68461d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt
6858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->flags &= ~WLAN_STA_PREAUTH;
6868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ieee802_1x_notify_pre_auth(sta->eapol_sm, 0);
6878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->conf->acct_interim_interval == 0 && acct_interim_interval)
6898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->acct_interim_interval = acct_interim_interval;
6908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (res == HOSTAPD_ACL_ACCEPT_TIMEOUT)
6918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		ap_sta_session_timeout(hapd, sta, session_timeout);
6928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	else
6938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		ap_sta_no_session_timeout(hapd, sta);
6948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	switch (auth_alg) {
6968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_AUTH_OPEN:
6978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
6988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
6998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "authentication OK (open system)");
7008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->flags |= WLAN_STA_AUTH;
7018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_auth_sm_event(sta->wpa_sm, WPA_AUTH);
7028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->auth_alg = WLAN_AUTH_OPEN;
7038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		mlme_authenticate_indication(hapd, sta);
7048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
7058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_AUTH_SHARED_KEY:
7068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp = auth_shared_key(hapd, sta, auth_transaction, challenge,
7078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       fc & WLAN_FC_ISWEP);
7088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->auth_alg = WLAN_AUTH_SHARED_KEY;
7098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		mlme_authenticate_indication(hapd, sta);
7108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (sta->challenge && auth_transaction == 1) {
7118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp_ies[0] = WLAN_EID_CHALLENGE;
7128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp_ies[1] = WLAN_AUTH_CHALLENGE_LEN;
7138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			os_memcpy(resp_ies + 2, sta->challenge,
7148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				  WLAN_AUTH_CHALLENGE_LEN);
7158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp_ies_len = 2 + WLAN_AUTH_CHALLENGE_LEN;
7168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
7178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
7188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
7198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_AUTH_FT:
7208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->auth_alg = WLAN_AUTH_FT;
7218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (sta->wpa_sm == NULL)
7228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			sta->wpa_sm = wpa_auth_sta_init(hapd->wpa_auth,
723391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt							sta->addr, NULL);
7248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (sta->wpa_sm == NULL) {
7258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "FT: Failed to initialize WPA "
7268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "state machine");
7278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
7288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			goto fail;
7298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
7308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ft_process_auth(sta->wpa_sm, mgmt->bssid,
7318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				    auth_transaction, mgmt->u.auth.variable,
7328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				    len - IEEE80211_HDRLEN -
7338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				    sizeof(mgmt->u.auth),
7348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				    handle_auth_ft_finish, hapd);
7358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* handle_auth_ft_finish() callback will complete auth. */
7368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
7378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
738d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#ifdef CONFIG_SAE
739d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	case WLAN_AUTH_SAE:
740d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		handle_auth_sae(hapd, sta, mgmt, len, auth_transaction);
741d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		return;
742d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#endif /* CONFIG_SAE */
7438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
7448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt fail:
74661d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	os_free(identity);
74761d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	os_free(radius_cui);
748d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	hostapd_free_psk_list(psk);
74961d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt
7508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	send_auth_reply(hapd, mgmt->sa, mgmt->bssid, auth_alg,
7518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			auth_transaction + 1, resp, resp_ies, resp_ies_len);
7528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
7538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic int hostapd_get_aid(struct hostapd_data *hapd, struct sta_info *sta)
7568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
7578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int i, j = 32, aid;
7588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* get a unique AID */
7608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->aid > 0) {
7618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "  old AID %d", sta->aid);
7628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return 0;
7638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
7648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	for (i = 0; i < AID_WORDS; i++) {
7668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hapd->sta_aid[i] == (u32) -1)
7678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			continue;
7688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		for (j = 0; j < 32; j++) {
7698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			if (!(hapd->sta_aid[i] & BIT(j)))
7708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				break;
7718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
7728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (j < 32)
7738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			break;
7748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
7758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (j == 32)
7768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
7778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	aid = i * 32 + j + 1;
7788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (aid > 2007)
7798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
7808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->aid = aid;
7828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hapd->sta_aid[i] |= BIT(j);
7838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_printf(MSG_DEBUG, "  new AID %d", sta->aid);
7848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
7858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
7868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic u16 check_ssid(struct hostapd_data *hapd, struct sta_info *sta,
7898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		      const u8 *ssid_ie, size_t ssid_ie_len)
7908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
7918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (ssid_ie == NULL)
7928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return WLAN_STATUS_UNSPECIFIED_FAILURE;
7938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (ssid_ie_len != hapd->conf->ssid.ssid_len ||
7958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    os_memcmp(ssid_ie, hapd->conf->ssid.ssid, ssid_ie_len) != 0) {
7968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
7978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_INFO,
7988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "Station tried to associate with unknown SSID "
7993c4793790bf06f1fe08a2ddf604c9caa855151f1Dmitry Shmidt			       "'%s'", wpa_ssid_txt(ssid_ie, ssid_ie_len));
8008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return WLAN_STATUS_UNSPECIFIED_FAILURE;
8018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
8028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return WLAN_STATUS_SUCCESS;
8048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
8058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic u16 check_wmm(struct hostapd_data *hapd, struct sta_info *sta,
8088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		     const u8 *wmm_ie, size_t wmm_ie_len)
8098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
8108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->flags &= ~WLAN_STA_WMM;
8111f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	sta->qosinfo = 0;
8128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wmm_ie && hapd->conf->wmm_enabled) {
8131f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		struct wmm_information_element *wmm;
8141f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
8151f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		if (!hostapd_eid_wmm_valid(hapd, wmm_ie, wmm_ie_len)) {
8168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			hostapd_logger(hapd, sta->addr,
8178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       HOSTAPD_MODULE_WPA,
8188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       HOSTAPD_LEVEL_DEBUG,
8198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       "invalid WMM element in association "
8208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       "request");
8211f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			return WLAN_STATUS_UNSPECIFIED_FAILURE;
8221f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		}
8231f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
8241f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		sta->flags |= WLAN_STA_WMM;
8251f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wmm = (struct wmm_information_element *) wmm_ie;
8261f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		sta->qosinfo = wmm->qos_info;
8278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
8288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return WLAN_STATUS_SUCCESS;
8298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
8308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic u16 copy_supp_rates(struct hostapd_data *hapd, struct sta_info *sta,
8338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   struct ieee802_11_elems *elems)
8348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
8358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!elems->supp_rates) {
8368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
8378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
8388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "No supported rates element in AssocReq");
8398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return WLAN_STATUS_UNSPECIFIED_FAILURE;
8408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
8418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
84261d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	if (elems->supp_rates_len + elems->ext_supp_rates_len >
84361d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	    sizeof(sta->supported_rates)) {
8448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
8458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
84661d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt			       "Invalid supported rates element length %d+%d",
84761d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt			       elems->supp_rates_len,
84861d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt			       elems->ext_supp_rates_len);
8498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return WLAN_STATUS_UNSPECIFIED_FAILURE;
8508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
8518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
85261d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	sta->supported_rates_len = merge_byte_arrays(
85361d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		sta->supported_rates, sizeof(sta->supported_rates),
85461d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		elems->supp_rates, elems->supp_rates_len,
85561d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		elems->ext_supp_rates, elems->ext_supp_rates_len);
8568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return WLAN_STATUS_SUCCESS;
8588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
8598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
861051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidtstatic u16 check_ext_capab(struct hostapd_data *hapd, struct sta_info *sta,
862051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt			   const u8 *ext_capab_ie, size_t ext_capab_ie_len)
863051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt{
864051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt#ifdef CONFIG_INTERWORKING
865051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt	/* check for QoS Map support */
866051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt	if (ext_capab_ie_len >= 5) {
867051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt		if (ext_capab_ie[4] & 0x01)
868051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt			sta->qos_map_enabled = 1;
869051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt	}
870051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt#endif /* CONFIG_INTERWORKING */
871051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt
872051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt	return WLAN_STATUS_SUCCESS;
873051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt}
874051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt
875051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt
8768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic u16 check_assoc_ies(struct hostapd_data *hapd, struct sta_info *sta,
8778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   const u8 *ies, size_t ies_len, int reassoc)
8788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
8798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct ieee802_11_elems elems;
8808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u16 resp;
8818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	const u8 *wpa_ie;
8828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	size_t wpa_ie_len;
883391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt	const u8 *p2p_dev_addr = NULL;
8848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) {
8868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
8878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_INFO, "Station sent an invalid "
8888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "association request");
8898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return WLAN_STATUS_UNSPECIFIED_FAILURE;
8908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
8918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	resp = check_ssid(hapd, sta, elems.ssid, elems.ssid_len);
8938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (resp != WLAN_STATUS_SUCCESS)
8948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return resp;
8958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	resp = check_wmm(hapd, sta, elems.wmm, elems.wmm_len);
8968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (resp != WLAN_STATUS_SUCCESS)
8978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return resp;
898051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt	resp = check_ext_capab(hapd, sta, elems.ext_capab, elems.ext_capab_len);
899051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt	if (resp != WLAN_STATUS_SUCCESS)
900051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt		return resp;
9018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	resp = copy_supp_rates(hapd, sta, &elems);
9028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (resp != WLAN_STATUS_SUCCESS)
9038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return resp;
9048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211N
9058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	resp = copy_sta_ht_capab(hapd, sta, elems.ht_capabilities,
9068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				 elems.ht_capabilities_len);
9078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (resp != WLAN_STATUS_SUCCESS)
9088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return resp;
9098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->iconf->ieee80211n && hapd->iconf->require_ht &&
9108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    !(sta->flags & WLAN_STA_HT)) {
9118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
9128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_INFO, "Station does not support "
9138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "mandatory HT PHY - reject association");
9148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return WLAN_STATUS_ASSOC_DENIED_NO_HT;
9158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
9168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211N */
9178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
91861d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt#ifdef CONFIG_IEEE80211AC
91961d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	resp = copy_sta_vht_capab(hapd, sta, elems.vht_capabilities,
92061d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt				  elems.vht_capabilities_len);
92161d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	if (resp != WLAN_STATUS_SUCCESS)
92261d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		return resp;
923bd14a57187b024f49f5b9ace55ef457d8d04650aDmitry Shmidt
924bd14a57187b024f49f5b9ace55ef457d8d04650aDmitry Shmidt	resp = set_sta_vht_opmode(hapd, sta, elems.vht_opmode_notif);
925bd14a57187b024f49f5b9ace55ef457d8d04650aDmitry Shmidt	if (resp != WLAN_STATUS_SUCCESS)
926bd14a57187b024f49f5b9ace55ef457d8d04650aDmitry Shmidt		return resp;
927bd14a57187b024f49f5b9ace55ef457d8d04650aDmitry Shmidt
92861d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	if (hapd->iconf->ieee80211ac && hapd->iconf->require_vht &&
92961d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	    !(sta->flags & WLAN_STA_VHT)) {
93061d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
93161d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt			       HOSTAPD_LEVEL_INFO, "Station does not support "
93261d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt			       "mandatory VHT PHY - reject association");
933fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return WLAN_STATUS_ASSOC_DENIED_NO_VHT;
93461d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	}
93561d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt#endif /* CONFIG_IEEE80211AC */
93661d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt
937391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt#ifdef CONFIG_P2P
938391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt	if (elems.p2p) {
939391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt		wpabuf_free(sta->p2p_ie);
940391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt		sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len,
941391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt							  P2P_IE_VENDOR_TYPE);
942391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt		if (sta->p2p_ie)
943391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt			p2p_dev_addr = p2p_get_go_dev_addr(sta->p2p_ie);
944391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt	} else {
945391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt		wpabuf_free(sta->p2p_ie);
946391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt		sta->p2p_ie = NULL;
947391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt	}
948391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt#endif /* CONFIG_P2P */
949391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt
9508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if ((hapd->conf->wpa & WPA_PROTO_RSN) && elems.rsn_ie) {
9518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ie = elems.rsn_ie;
9528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ie_len = elems.rsn_ie_len;
9538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else if ((hapd->conf->wpa & WPA_PROTO_WPA) &&
9548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   elems.wpa_ie) {
9558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ie = elems.wpa_ie;
9568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ie_len = elems.wpa_ie_len;
9578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else {
9588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ie = NULL;
9598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ie_len = 0;
9608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
9618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_WPS
9631f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	sta->flags &= ~(WLAN_STA_WPS | WLAN_STA_MAYBE_WPS | WLAN_STA_WPS2);
9648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->conf->wps_state && elems.wps_ie) {
9658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "STA included WPS IE in (Re)Association "
9668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "Request - assume WPS is used");
9678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->flags |= WLAN_STA_WPS;
9688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpabuf_free(sta->wps_ie);
9698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->wps_ie = ieee802_11_vendor_ie_concat(ies, ies_len,
9708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt							  WPS_IE_VENDOR_TYPE);
9711f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		if (sta->wps_ie && wps_is_20(sta->wps_ie)) {
9721f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			wpa_printf(MSG_DEBUG, "WPS: STA supports WPS 2.0");
9731f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			sta->flags |= WLAN_STA_WPS2;
9741f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		}
9758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ie = NULL;
9768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ie_len = 0;
9778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (sta->wps_ie && wps_validate_assoc_req(sta->wps_ie) < 0) {
9788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "WPS: Invalid WPS IE in "
9798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "(Re)Association Request - reject");
9808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return WLAN_STATUS_INVALID_IE;
9818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
9828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else if (hapd->conf->wps_state && wpa_ie == NULL) {
9838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "STA did not include WPA/RSN IE in "
9848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "(Re)Association Request - possible WPS use");
9858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->flags |= WLAN_STA_MAYBE_WPS;
9868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else
9878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_WPS */
9888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->conf->wpa && wpa_ie == NULL) {
9898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
9908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_INFO,
9918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "No WPA/RSN IE in association request");
9928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return WLAN_STATUS_INVALID_IE;
9938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
9948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->conf->wpa && wpa_ie) {
9968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		int res;
9978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ie -= 2;
9988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ie_len += 2;
9998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (sta->wpa_sm == NULL)
10008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			sta->wpa_sm = wpa_auth_sta_init(hapd->wpa_auth,
1001391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt							sta->addr,
1002391c59f0632df8db1c325da1d31d479b2eedce45Dmitry Shmidt							p2p_dev_addr);
10038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (sta->wpa_sm == NULL) {
10048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_WARNING, "Failed to initialize WPA "
10058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "state machine");
10068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return WLAN_STATUS_UNSPECIFIED_FAILURE;
10078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
10088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		res = wpa_validate_wpa_ie(hapd->wpa_auth, sta->wpa_sm,
10098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					  wpa_ie, wpa_ie_len,
10108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					  elems.mdie, elems.mdie_len);
10118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (res == WPA_INVALID_GROUP)
10128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = WLAN_STATUS_GROUP_CIPHER_NOT_VALID;
10138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		else if (res == WPA_INVALID_PAIRWISE)
10148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID;
10158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		else if (res == WPA_INVALID_AKMP)
10168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = WLAN_STATUS_AKMP_NOT_VALID;
10178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		else if (res == WPA_ALLOC_FAIL)
10188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
10198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
10208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		else if (res == WPA_MGMT_FRAME_PROTECTION_VIOLATION)
10218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = WLAN_STATUS_ROBUST_MGMT_FRAME_POLICY_VIOLATION;
10228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		else if (res == WPA_INVALID_MGMT_GROUP_CIPHER)
10238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = WLAN_STATUS_ROBUST_MGMT_FRAME_POLICY_VIOLATION;
10248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
10258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		else if (res == WPA_INVALID_MDIE)
10268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = WLAN_STATUS_INVALID_MDIE;
10278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		else if (res != WPA_IE_OK)
10288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = WLAN_STATUS_INVALID_IE;
10298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (resp != WLAN_STATUS_SUCCESS)
10308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return resp;
10318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
10328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if ((sta->flags & WLAN_STA_MFP) && !sta->sa_query_timed_out &&
10338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    sta->sa_query_count > 0)
10348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			ap_check_sa_query_timeout(hapd, sta);
10358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if ((sta->flags & WLAN_STA_MFP) && !sta->sa_query_timed_out &&
10368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    (!reassoc || sta->auth_alg != WLAN_AUTH_FT)) {
10378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			/*
10388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			 * STA has already been associated with MFP and SA
10398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			 * Query timeout has not been reached. Reject the
10408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			 * association attempt temporarily and start SA Query,
10418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			 * if one is not pending.
10428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			 */
10438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
10448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			if (sta->sa_query_count == 0)
10458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				ap_sta_start_sa_query(hapd, sta);
10468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
10478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY;
10488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
10498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
10508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (wpa_auth_uses_mfp(sta->wpa_sm))
10518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			sta->flags |= WLAN_STA_MFP;
10528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		else
10538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			sta->flags &= ~WLAN_STA_MFP;
10548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
10558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
10568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
10578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (sta->auth_alg == WLAN_AUTH_FT) {
10588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			if (!reassoc) {
10598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				wpa_printf(MSG_DEBUG, "FT: " MACSTR " tried "
10608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					   "to use association (not "
10618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					   "re-association) with FT auth_alg",
10628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					   MAC2STR(sta->addr));
10638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				return WLAN_STATUS_UNSPECIFIED_FAILURE;
10648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			}
10658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
10668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies,
10678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						       ies_len);
10688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			if (resp != WLAN_STATUS_SUCCESS)
10698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				return resp;
10708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
10718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
10728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1073d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#ifdef CONFIG_SAE
1074d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		if (wpa_auth_uses_sae(sta->wpa_sm) &&
1075fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		    sta->auth_alg != WLAN_AUTH_SAE &&
1076fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		    !(sta->auth_alg == WLAN_AUTH_FT &&
1077fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		      wpa_auth_uses_ft_sae(sta->wpa_sm))) {
1078d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			wpa_printf(MSG_DEBUG, "SAE: " MACSTR " tried to use "
1079d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				   "SAE AKM after non-SAE auth_alg %u",
1080d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				   MAC2STR(sta->addr), sta->auth_alg);
1081d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			return WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG;
1082d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		}
1083d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#endif /* CONFIG_SAE */
1084d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
10858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211N
108661d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		if ((sta->flags & (WLAN_STA_HT | WLAN_STA_VHT)) &&
10878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    wpa_auth_get_pairwise(sta->wpa_sm) == WPA_CIPHER_TKIP) {
10888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			hostapd_logger(hapd, sta->addr,
10898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       HOSTAPD_MODULE_IEEE80211,
10908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       HOSTAPD_LEVEL_INFO,
10918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       "Station tried to use TKIP with HT "
10928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       "association");
10938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return WLAN_STATUS_CIPHER_REJECTED_PER_POLICY;
10948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
10958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211N */
1096f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt#ifdef CONFIG_HS20
1097f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	} else if (hapd->conf->osen) {
1098f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		if (elems.osen == NULL) {
1099f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt			hostapd_logger(
1100f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt				hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
1101f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt				HOSTAPD_LEVEL_INFO,
1102f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt				"No HS 2.0 OSEN element in association request");
1103f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt			return WLAN_STATUS_INVALID_IE;
1104f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		}
1105f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt
1106f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		wpa_printf(MSG_DEBUG, "HS 2.0: OSEN association");
1107f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		if (sta->wpa_sm == NULL)
1108f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt			sta->wpa_sm = wpa_auth_sta_init(hapd->wpa_auth,
1109f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt							sta->addr, NULL);
1110f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		if (sta->wpa_sm == NULL) {
1111f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt			wpa_printf(MSG_WARNING, "Failed to initialize WPA "
1112f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt				   "state machine");
1113f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt			return WLAN_STATUS_UNSPECIFIED_FAILURE;
1114f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		}
1115f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		if (wpa_validate_osen(hapd->wpa_auth, sta->wpa_sm,
1116f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt				      elems.osen - 2, elems.osen_len + 2) < 0)
1117f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt			return WLAN_STATUS_INVALID_IE;
1118f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt#endif /* CONFIG_HS20 */
11198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else
11208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_auth_sta_no_wpa(sta->wpa_sm);
11218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_P2P
11238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	p2p_group_notif_assoc(hapd->p2p_group, sta->addr, ies, ies_len);
11248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_P2P */
11258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1126d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#ifdef CONFIG_HS20
1127d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	wpabuf_free(sta->hs20_ie);
1128d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (elems.hs20 && elems.hs20_len > 4) {
1129d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		sta->hs20_ie = wpabuf_alloc_copy(elems.hs20 + 4,
1130d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt						 elems.hs20_len - 4);
1131d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	} else
1132d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		sta->hs20_ie = NULL;
1133d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#endif /* CONFIG_HS20 */
1134d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
11358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return WLAN_STATUS_SUCCESS;
11368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
11378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void send_deauth(struct hostapd_data *hapd, const u8 *addr,
11408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			u16 reason_code)
11418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
11428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int send_len;
11438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct ieee80211_mgmt reply;
11448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memset(&reply, 0, sizeof(reply));
11468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply.frame_control =
11478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		IEEE80211_FC(WLAN_FC_TYPE_MGMT, WLAN_FC_STYPE_DEAUTH);
11488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(reply.da, addr, ETH_ALEN);
11498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(reply.sa, hapd->own_addr, ETH_ALEN);
11508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(reply.bssid, hapd->own_addr, ETH_ALEN);
11518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	send_len = IEEE80211_HDRLEN + sizeof(reply.u.deauth);
11538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply.u.deauth.reason_code = host_to_le16(reason_code);
11548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11551f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (hostapd_drv_send_mlme(hapd, &reply, send_len, 0) < 0)
11568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_INFO, "Failed to send deauth: %s",
11578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   strerror(errno));
11588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
11598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta,
11628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    u16 status_code, int reassoc, const u8 *ies,
11638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    size_t ies_len)
11648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
11658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int send_len;
11668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 buf[sizeof(struct ieee80211_mgmt) + 1024];
11678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct ieee80211_mgmt *reply;
11688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 *p;
11698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memset(buf, 0, sizeof(buf));
11718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply = (struct ieee80211_mgmt *) buf;
11728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply->frame_control =
11738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		IEEE80211_FC(WLAN_FC_TYPE_MGMT,
11748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			     (reassoc ? WLAN_FC_STYPE_REASSOC_RESP :
11758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			      WLAN_FC_STYPE_ASSOC_RESP));
11768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(reply->da, sta->addr, ETH_ALEN);
11778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(reply->sa, hapd->own_addr, ETH_ALEN);
11788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(reply->bssid, hapd->own_addr, ETH_ALEN);
11798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	send_len = IEEE80211_HDRLEN;
11818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	send_len += sizeof(reply->u.assoc_resp);
11828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply->u.assoc_resp.capab_info =
11838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		host_to_le16(hostapd_own_capab_info(hapd, sta, 0));
11848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	reply->u.assoc_resp.status_code = host_to_le16(status_code);
118596be6222df414a7dde5c5b1b72df22e67b1a77fcDmitry Shmidt	reply->u.assoc_resp.aid = host_to_le16(sta->aid | BIT(14) | BIT(15));
11868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* Supported rates */
11878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	p = hostapd_eid_supp_rates(hapd, reply->u.assoc_resp.variable);
11888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* Extended supported rates */
11898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	p = hostapd_eid_ext_supp_rates(hapd, p);
11908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
11918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
11928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (status_code == WLAN_STATUS_SUCCESS) {
11938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* IEEE 802.11r: Mobility Domain Information, Fast BSS
11948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * Transition Information, RSN, [RIC Response] */
11958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		p = wpa_sm_write_assoc_resp_ies(sta->wpa_sm, p,
11968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						buf + sizeof(buf) - p,
11978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						sta->auth_alg, ies, ies_len);
11988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
11998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
12008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
12028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (status_code == WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY)
12038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		p = hostapd_eid_assoc_comeback_time(hapd, sta, p);
12048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
12058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211N
12078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	p = hostapd_eid_ht_capabilities(hapd, p);
12088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	p = hostapd_eid_ht_operation(hapd, p);
12098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211N */
12108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
121161d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt#ifdef CONFIG_IEEE80211AC
121261d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	p = hostapd_eid_vht_capabilities(hapd, p);
121361d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	p = hostapd_eid_vht_operation(hapd, p);
121461d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt#endif /* CONFIG_IEEE80211AC */
121561d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt
12168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	p = hostapd_eid_ext_capab(hapd, p);
121704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	p = hostapd_eid_bss_max_idle_period(hapd, p);
1218051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt	if (sta->qos_map_enabled)
1219051af73b8f8014eff33330aead0f36944b3403e6Dmitry Shmidt		p = hostapd_eid_qos_map_set(hapd, p);
12208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->flags & WLAN_STA_WMM)
12228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		p = hostapd_eid_wmm(hapd, p);
12238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_WPS
12251f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if ((sta->flags & WLAN_STA_WPS) ||
12261f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	    ((sta->flags & WLAN_STA_MAYBE_WPS) && hapd->conf->wpa)) {
12278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		struct wpabuf *wps = wps_build_assoc_resp_ie();
12288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (wps) {
12298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			os_memcpy(p, wpabuf_head(wps), wpabuf_len(wps));
12308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			p += wpabuf_len(wps);
12318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpabuf_free(wps);
12328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
12338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
12348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_WPS */
12358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_P2P
12378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->p2p_ie) {
12388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		struct wpabuf *p2p_resp_ie;
12398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		enum p2p_status_code status;
12408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		switch (status_code) {
12418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		case WLAN_STATUS_SUCCESS:
12428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			status = P2P_SC_SUCCESS;
12438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			break;
12448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		case WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA:
12458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			status = P2P_SC_FAIL_LIMIT_REACHED;
12468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			break;
12478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		default:
12488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			status = P2P_SC_FAIL_INVALID_PARAMS;
12498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			break;
12508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
12518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		p2p_resp_ie = p2p_group_assoc_resp_ie(hapd->p2p_group, status);
12528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (p2p_resp_ie) {
12538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			os_memcpy(p, wpabuf_head(p2p_resp_ie),
12548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				  wpabuf_len(p2p_resp_ie));
12558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			p += wpabuf_len(p2p_resp_ie);
12568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpabuf_free(p2p_resp_ie);
12578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
12588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
12598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_P2P */
12608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_P2P_MANAGER
12628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->conf->p2p & P2P_MANAGE)
12638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		p = hostapd_eid_p2p_manage(hapd, p);
12648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_P2P_MANAGER */
12658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	send_len += p - reply->u.assoc_resp.variable;
12678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12681f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (hostapd_drv_send_mlme(hapd, reply, send_len, 0) < 0)
12698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_INFO, "Failed to send assoc resp: %s",
12708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   strerror(errno));
12718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
12728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void handle_assoc(struct hostapd_data *hapd,
12758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			 const struct ieee80211_mgmt *mgmt, size_t len,
12768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			 int reassoc)
12778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
12788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u16 capab_info, listen_interval;
12798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u16 resp = WLAN_STATUS_SUCCESS;
12808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	const u8 *pos;
12818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int left, i;
12828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct sta_info *sta;
12838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (len < IEEE80211_HDRLEN + (reassoc ? sizeof(mgmt->u.reassoc_req) :
12858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				      sizeof(mgmt->u.assoc_req))) {
1286cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "handle_assoc(reassoc=%d) - too short payload (len=%lu)",
1287cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   reassoc, (unsigned long) len);
12888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
12898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
12908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12918da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt#ifdef CONFIG_TESTING_OPTIONS
12928da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt	if (reassoc) {
12937832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt		if (hapd->iconf->ignore_reassoc_probability > 0.0 &&
12948da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt		    drand48() < hapd->iconf->ignore_reassoc_probability) {
12958da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt			wpa_printf(MSG_INFO,
12968da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt				   "TESTING: ignoring reassoc request from "
12978da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt				   MACSTR, MAC2STR(mgmt->sa));
12988da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt			return;
12998da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt		}
13008da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt	} else {
13017832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt		if (hapd->iconf->ignore_assoc_probability > 0.0 &&
13028da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt		    drand48() < hapd->iconf->ignore_assoc_probability) {
13038da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt			wpa_printf(MSG_INFO,
13048da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt				   "TESTING: ignoring assoc request from "
13058da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt				   MACSTR, MAC2STR(mgmt->sa));
13068da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt			return;
13078da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt		}
13088da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt	}
13098da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt#endif /* CONFIG_TESTING_OPTIONS */
13108da800a193fb6f8832218715f82a7b4e2d2ad338Dmitry Shmidt
13118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (reassoc) {
13128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		capab_info = le_to_host16(mgmt->u.reassoc_req.capab_info);
13138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		listen_interval = le_to_host16(
13148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			mgmt->u.reassoc_req.listen_interval);
13158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "reassociation request: STA=" MACSTR
13168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   " capab_info=0x%02x listen_interval=%d current_ap="
13178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   MACSTR,
13188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   MAC2STR(mgmt->sa), capab_info, listen_interval,
13198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   MAC2STR(mgmt->u.reassoc_req.current_ap));
13208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		left = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.reassoc_req));
13218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		pos = mgmt->u.reassoc_req.variable;
13228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else {
13238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		capab_info = le_to_host16(mgmt->u.assoc_req.capab_info);
13248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		listen_interval = le_to_host16(
13258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			mgmt->u.assoc_req.listen_interval);
13268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "association request: STA=" MACSTR
13278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   " capab_info=0x%02x listen_interval=%d",
13288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   MAC2STR(mgmt->sa), capab_info, listen_interval);
13298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		left = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.assoc_req));
13308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		pos = mgmt->u.assoc_req.variable;
13318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
13328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta = ap_get_sta(hapd, mgmt->sa);
13348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
13358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta && sta->auth_alg == WLAN_AUTH_FT &&
13368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    (sta->flags & WLAN_STA_AUTH) == 0) {
13378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "FT: Allow STA " MACSTR " to associate "
13388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "prior to authentication since it is using "
13398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "over-the-DS FT", MAC2STR(mgmt->sa));
13408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else
13418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
13428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta == NULL || (sta->flags & WLAN_STA_AUTH) == 0) {
13438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
13448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_INFO, "Station tried to "
13458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "associate before authentication "
13468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "(aid=%d flags=0x%x)",
13478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       sta ? sta->aid : -1,
13488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       sta ? sta->flags : 0);
13498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		send_deauth(hapd, mgmt->sa,
13508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    WLAN_REASON_CLASS2_FRAME_FROM_NONAUTH_STA);
13518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
13538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->tkip_countermeasures) {
13558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp = WLAN_REASON_MICHAEL_MIC_FAILURE;
13568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		goto fail;
13578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
13588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (listen_interval > hapd->conf->max_listen_interval) {
13608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
13618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
13628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "Too large Listen Interval (%d)",
13638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       listen_interval);
13648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp = WLAN_STATUS_ASSOC_DENIED_LISTEN_INT_TOO_LARGE;
13658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		goto fail;
13668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
13678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* followed by SSID and Supported rates; and HT capabilities if 802.11n
13698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * is used */
13708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	resp = check_assoc_ies(hapd, sta, pos, left, reassoc);
13718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (resp != WLAN_STATUS_SUCCESS)
13728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		goto fail;
13738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hostapd_get_aid(hapd, sta) < 0) {
13758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
13768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_INFO, "No room for more AIDs");
13778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
13788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		goto fail;
13798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
13808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->capability = capab_info;
13828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->listen_interval = listen_interval;
13838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hapd->iface->current_mode->mode == HOSTAPD_MODE_IEEE80211G)
13858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->flags |= WLAN_STA_NONERP;
13868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	for (i = 0; i < sta->supported_rates_len; i++) {
13878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if ((sta->supported_rates[i] & 0x7f) > 22) {
13888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			sta->flags &= ~WLAN_STA_NONERP;
13898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			break;
13908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
13918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
13928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->flags & WLAN_STA_NONERP && !sta->nonerp_set) {
13938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->nonerp_set = 1;
13948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hapd->iface->num_sta_non_erp++;
13958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hapd->iface->num_sta_non_erp == 1)
13968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			ieee802_11_set_beacons(hapd->iface);
13978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
13988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!(sta->capability & WLAN_CAPABILITY_SHORT_SLOT_TIME) &&
14008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    !sta->no_short_slot_time_set) {
14018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->no_short_slot_time_set = 1;
14028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hapd->iface->num_sta_no_short_slot_time++;
14038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hapd->iface->current_mode->mode ==
14048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    HOSTAPD_MODE_IEEE80211G &&
14058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    hapd->iface->num_sta_no_short_slot_time == 1)
14068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			ieee802_11_set_beacons(hapd->iface);
14078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
14088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->capability & WLAN_CAPABILITY_SHORT_PREAMBLE)
14108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->flags |= WLAN_STA_SHORT_PREAMBLE;
14118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	else
14128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->flags &= ~WLAN_STA_SHORT_PREAMBLE;
14138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!(sta->capability & WLAN_CAPABILITY_SHORT_PREAMBLE) &&
14158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    !sta->no_short_preamble_set) {
14168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->no_short_preamble_set = 1;
14178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hapd->iface->num_sta_no_short_preamble++;
14188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hapd->iface->current_mode->mode == HOSTAPD_MODE_IEEE80211G
14198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    && hapd->iface->num_sta_no_short_preamble == 1)
14208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			ieee802_11_set_beacons(hapd->iface);
14218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
14228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211N
14248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	update_ht_state(hapd, sta);
14258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211N */
14268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
14288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       HOSTAPD_LEVEL_DEBUG,
14298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       "association OK (aid %d)", sta->aid);
14308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* Station will be marked associated, after it acknowledges AssocResp
14318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 */
14328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->flags |= WLAN_STA_ASSOC_REQ_OK;
14338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
14358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if ((sta->flags & WLAN_STA_MFP) && sta->sa_query_timed_out) {
14368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "Allowing %sassociation after timed out "
14378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "SA Query procedure", reassoc ? "re" : "");
14388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* TODO: Send a protected Disassociate frame to the STA using
14398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * the old key and Reason Code "Previous Authentication no
14408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * longer valid". Make sure this is only sent protected since
14418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * unprotected frame would be received by the STA that is now
14428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * trying to associate.
14438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 */
14448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
14458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
14468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* Make sure that the previously registered inactivity timer will not
14488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * remove the STA immediately. */
14498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->timeout_next = STA_NULLFUNC;
14508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt fail:
14528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	send_assoc_resp(hapd, sta, resp, reassoc, pos, left);
14538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
14548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void handle_disassoc(struct hostapd_data *hapd,
14578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    const struct ieee80211_mgmt *mgmt, size_t len)
14588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
14598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct sta_info *sta;
14608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.disassoc)) {
1462cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "handle_disassoc - too short payload (len=%lu)",
1463cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   (unsigned long) len);
14648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
14658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
14668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_printf(MSG_DEBUG, "disassocation: STA=" MACSTR " reason_code=%d",
14688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   MAC2STR(mgmt->sa),
14698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   le_to_host16(mgmt->u.disassoc.reason_code));
14708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta = ap_get_sta(hapd, mgmt->sa);
14728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta == NULL) {
1473cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "Station " MACSTR " trying to disassociate, but it is not associated",
1474cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   MAC2STR(mgmt->sa));
14758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
14768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
14778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14781f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	ap_sta_set_authorized(hapd, sta, 0);
14798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->flags &= ~(WLAN_STA_ASSOC | WLAN_STA_ASSOC_REQ_OK);
14808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_auth_sm_event(sta->wpa_sm, WPA_DISASSOC);
14818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
14828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       HOSTAPD_LEVEL_INFO, "disassociated");
14838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->acct_terminate_cause = RADIUS_ACCT_TERMINATE_CAUSE_USER_REQUEST;
14848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ieee802_1x_notify_port_enabled(sta->eapol_sm, 0);
14858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* Stop Accounting and IEEE 802.1X sessions, but leave the STA
14868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * authenticated. */
14878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	accounting_sta_stop(hapd, sta);
14888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ieee802_1x_free_station(sta);
14898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_drv_sta_remove(hapd, sta->addr);
14908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->timeout_next == STA_NULLFUNC ||
14928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    sta->timeout_next == STA_DISASSOC) {
14938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->timeout_next = STA_DEAUTH;
14948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		eloop_cancel_timeout(ap_handle_timer, hapd, sta);
14958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		eloop_register_timeout(AP_DEAUTH_DELAY, 0, ap_handle_timer,
14968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       hapd, sta);
14978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
14988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	mlme_disassociate_indication(
15008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hapd, sta, le_to_host16(mgmt->u.disassoc.reason_code));
15018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
15028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void handle_deauth(struct hostapd_data *hapd,
15058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			  const struct ieee80211_mgmt *mgmt, size_t len)
15068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
15078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct sta_info *sta;
15088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.deauth)) {
15101f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_msg(hapd->msg_ctx, MSG_DEBUG, "handle_deauth - too short "
15111f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			"payload (len=%lu)", (unsigned long) len);
15128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
15138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
15148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15151f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	wpa_msg(hapd->msg_ctx, MSG_DEBUG, "deauthentication: STA=" MACSTR
15168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		" reason_code=%d",
15178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		MAC2STR(mgmt->sa), le_to_host16(mgmt->u.deauth.reason_code));
15188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta = ap_get_sta(hapd, mgmt->sa);
15208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta == NULL) {
15211f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR " trying "
15221f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			"to deauthenticate, but it is not authenticated",
15238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			MAC2STR(mgmt->sa));
15248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
15258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
15268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15271f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	ap_sta_set_authorized(hapd, sta, 0);
15288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC |
15298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			WLAN_STA_ASSOC_REQ_OK);
15308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_auth_sm_event(sta->wpa_sm, WPA_DEAUTH);
15318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
15328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       HOSTAPD_LEVEL_DEBUG, "deauthenticated");
15338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	mlme_deauthenticate_indication(
15348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hapd, sta, le_to_host16(mgmt->u.deauth.reason_code));
15358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->acct_terminate_cause = RADIUS_ACCT_TERMINATE_CAUSE_USER_REQUEST;
15368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ieee802_1x_notify_port_enabled(sta->eapol_sm, 0);
15378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ap_free_sta(hapd, sta);
15388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
15398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void handle_beacon(struct hostapd_data *hapd,
15428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			  const struct ieee80211_mgmt *mgmt, size_t len,
15438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			  struct hostapd_frame_info *fi)
15448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
15458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct ieee802_11_elems elems;
15468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.beacon)) {
1548cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "handle_beacon - too short payload (len=%lu)",
1549cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   (unsigned long) len);
15508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
15518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
15528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	(void) ieee802_11_parse_elems(mgmt->u.beacon.variable,
15548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				      len - (IEEE80211_HDRLEN +
15558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					     sizeof(mgmt->u.beacon)), &elems,
15568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				      0);
15578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ap_list_process_beacon(hapd->iface, mgmt, &elems, fi);
15598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
15608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
15638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1564fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidtstatic int hostapd_sa_query_action(struct hostapd_data *hapd,
1565fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt				   const struct ieee80211_mgmt *mgmt,
1566fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt				   size_t len)
15678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
15688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	const u8 *end;
15698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	end = mgmt->u.action.u.sa_query_resp.trans_id +
15718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		WLAN_SA_QUERY_TR_ID_LEN;
15728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (((u8 *) mgmt) + len < end) {
15738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "IEEE 802.11: Too short SA Query Action "
15748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "frame (len=%lu)", (unsigned long) len);
1575fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 0;
15768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
15778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15781f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	ieee802_11_sa_query_action(hapd, mgmt->sa,
15791f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				   mgmt->u.action.u.sa_query_resp.action,
15801f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				   mgmt->u.action.u.sa_query_resp.trans_id);
1581fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	return 1;
15828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
15838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic int robust_action_frame(u8 category)
15868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
15878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return category != WLAN_ACTION_PUBLIC &&
15888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		category != WLAN_ACTION_HT;
15898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
15908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
15918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1593fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidtstatic int handle_action(struct hostapd_data *hapd,
1594fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt			 const struct ieee80211_mgmt *mgmt, size_t len)
15958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
15968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct sta_info *sta;
15971f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	sta = ap_get_sta(hapd, mgmt->sa);
15988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
15998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (len < IEEE80211_HDRLEN + 1) {
16008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
16018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
16028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "handle_action - too short payload (len=%lu)",
16038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       (unsigned long) len);
1604fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 0;
16058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
16068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1607a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (mgmt->u.action.category != WLAN_ACTION_PUBLIC &&
1608a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	    (sta == NULL || !(sta->flags & WLAN_STA_ASSOC))) {
1609a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_printf(MSG_DEBUG, "IEEE 802.11: Ignored Action "
1610a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			   "frame (category=%u) from unassociated STA " MACSTR,
1611a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			   MAC2STR(mgmt->sa), mgmt->u.action.category);
1612fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 0;
1613a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
1614a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
16158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
16168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta && (sta->flags & WLAN_STA_MFP) &&
16171846323989242844f0e857458a8939fa5836429cDmitry Shmidt	    !(mgmt->frame_control & host_to_le16(WLAN_FC_ISWEP)) &&
16181846323989242844f0e857458a8939fa5836429cDmitry Shmidt	    robust_action_frame(mgmt->u.action.category)) {
16198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
16208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
16218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "Dropped unprotected Robust Action frame from "
16228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "an MFP STA");
1623fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 0;
16248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
16258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
16268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
16278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	switch (mgmt->u.action.category) {
16288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
16298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_ACTION_FT:
16307832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt		if (!sta ||
16317832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt		    wpa_ft_action_rx(sta->wpa_sm, (u8 *) &mgmt->u.action,
16328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				     len - IEEE80211_HDRLEN))
16338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			break;
1634fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 1;
16358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
16368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_ACTION_WMM:
16378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_wmm_action(hapd, mgmt, len);
1638fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 1;
16398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
16408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_ACTION_SA_QUERY:
1641fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return hostapd_sa_query_action(hapd, mgmt, len);
16428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
1643a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#ifdef CONFIG_WNM
1644a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	case WLAN_ACTION_WNM:
1645fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		ieee802_11_rx_wnm_action_ap(hapd, mgmt, len);
1646fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 1;
1647a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#endif /* CONFIG_WNM */
16488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_ACTION_PUBLIC:
16491846323989242844f0e857458a8939fa5836429cDmitry Shmidt	case WLAN_ACTION_PROTECTED_DUAL:
16507832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt#ifdef CONFIG_IEEE80211N
16517832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt		if (mgmt->u.action.u.public_action.action ==
16527832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt		    WLAN_PA_20_40_BSS_COEX) {
16537832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt			wpa_printf(MSG_DEBUG,
16547832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt				   "HT20/40 coex mgmt frame received from STA "
16557832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt				   MACSTR, MAC2STR(mgmt->sa));
16567832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt			hostapd_2040_coex_action(hapd, mgmt, len);
16577832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt		}
16587832adbbd72a1b784b7fb74a71a5d4085b0cb0d3Dmitry Shmidt#endif /* CONFIG_IEEE80211N */
16598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hapd->public_action_cb) {
16608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			hapd->public_action_cb(hapd->public_action_cb_ctx,
16618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					       (u8 *) mgmt, len,
16628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					       hapd->iface->freq);
16638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
16644b9d52f502481b258fec743c03a5e957e5605afcDmitry Shmidt		if (hapd->public_action_cb2) {
1665f86232838cf712377867cb42417c1613ab5dc425Dmitry Shmidt			hapd->public_action_cb2(hapd->public_action_cb2_ctx,
16664b9d52f502481b258fec743c03a5e957e5605afcDmitry Shmidt						(u8 *) mgmt, len,
16674b9d52f502481b258fec743c03a5e957e5605afcDmitry Shmidt						hapd->iface->freq);
16684b9d52f502481b258fec743c03a5e957e5605afcDmitry Shmidt		}
16694b9d52f502481b258fec743c03a5e957e5605afcDmitry Shmidt		if (hapd->public_action_cb || hapd->public_action_cb2)
1670fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt			return 1;
16718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
16728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_ACTION_VENDOR_SPECIFIC:
16738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (hapd->vendor_action_cb) {
16748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			if (hapd->vendor_action_cb(hapd->vendor_action_cb_ctx,
16758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						   (u8 *) mgmt, len,
16768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						   hapd->iface->freq) == 0)
1677fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt				return 1;
16788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
16798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
16808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
16818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
16828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
16838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       HOSTAPD_LEVEL_DEBUG,
16848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       "handle_action - unknown action category %d or invalid "
16858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       "frame",
16868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       mgmt->u.action.category);
16878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!(mgmt->da[0] & 0x01) && !(mgmt->u.action.category & 0x80) &&
16888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    !(mgmt->sa[0] & 0x01)) {
16898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		struct ieee80211_mgmt *resp;
16908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
16918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/*
16928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * IEEE 802.11-REVma/D9.0 - 7.3.1.11
16938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * Return the Action frame to the source without change
16948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * except that MSB of the Category set to 1.
16958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 */
16968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "IEEE 802.11: Return unknown Action "
16978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "frame back to sender");
16988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp = os_malloc(len);
16998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (resp == NULL)
1700fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt			return 0;
17018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_memcpy(resp, mgmt, len);
17028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_memcpy(resp->da, resp->sa, ETH_ALEN);
17038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_memcpy(resp->sa, hapd->own_addr, ETH_ALEN);
17048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_memcpy(resp->bssid, hapd->own_addr, ETH_ALEN);
17058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		resp->u.action.category |= 0x80;
17068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
170761d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		if (hostapd_drv_send_mlme(hapd, resp, len, 0) < 0) {
170861d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt			wpa_printf(MSG_ERROR, "IEEE 802.11: Failed to send "
170961d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt				   "Action frame");
171061d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		}
17118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_free(resp);
17128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1713fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
1714fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	return 1;
17158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
17168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
17178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
17188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
17198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * ieee802_11_mgmt - process incoming IEEE 802.11 management frames
17208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @hapd: hostapd BSS data structure (the BSS to which the management frame was
17218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * sent to)
17228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @buf: management frame data (starting from IEEE 802.11 header)
17238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: length of frame data in octets
17248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @fi: meta data about received frame (signal level, etc.)
17258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
17268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Process all incoming IEEE 802.11 management frames. This will be called for
17278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * each frame received from the kernel driver through wlan#ap interface. In
17288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * addition, it can be called to re-inserted pending frames (e.g., when using
17298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * external RADIUS server as an MAC ACL).
17308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1731fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidtint ieee802_11_mgmt(struct hostapd_data *hapd, const u8 *buf, size_t len,
1732fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		    struct hostapd_frame_info *fi)
17338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
17348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct ieee80211_mgmt *mgmt;
17358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int broadcast;
17368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u16 fc, stype;
1737fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	int ret = 0;
1738fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
17398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (len < 24)
1740fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 0;
17418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
17428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	mgmt = (struct ieee80211_mgmt *) buf;
17438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	fc = le_to_host16(mgmt->frame_control);
17448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	stype = WLAN_FC_GET_STYPE(fc);
17458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
17468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (stype == WLAN_FC_STYPE_BEACON) {
17478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		handle_beacon(hapd, mgmt, len, fi);
1748fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 1;
17498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
17508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
17518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	broadcast = mgmt->bssid[0] == 0xff && mgmt->bssid[1] == 0xff &&
17528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		mgmt->bssid[2] == 0xff && mgmt->bssid[3] == 0xff &&
17538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		mgmt->bssid[4] == 0xff && mgmt->bssid[5] == 0xff;
17548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
17558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!broadcast &&
17561f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt#ifdef CONFIG_P2P
17571f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	    /* Invitation responses can be sent with the peer MAC as BSSID */
17581f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	    !((hapd->conf->p2p & P2P_GROUP_OWNER) &&
17591f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	      stype == WLAN_FC_STYPE_ACTION) &&
17601f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt#endif /* CONFIG_P2P */
17618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    os_memcmp(mgmt->bssid, hapd->own_addr, ETH_ALEN) != 0) {
1762cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "MGMT: BSSID=" MACSTR " not our address",
1763cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   MAC2STR(mgmt->bssid));
1764fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 0;
17658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
17668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
17678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
17688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (stype == WLAN_FC_STYPE_PROBE_REQ) {
176904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		handle_probe_req(hapd, mgmt, len, fi->ssi_signal);
1770fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 1;
17718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
17728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
17738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (os_memcmp(mgmt->da, hapd->own_addr, ETH_ALEN) != 0) {
17748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
17758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
17768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "MGMT: DA=" MACSTR " not our address",
17778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       MAC2STR(mgmt->da));
1778fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return 0;
17798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
17808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
17818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	switch (stype) {
17828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_AUTH:
17838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::auth");
17848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		handle_auth(hapd, mgmt, len);
1785fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		ret = 1;
17868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
17878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_ASSOC_REQ:
17888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::assoc_req");
17898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		handle_assoc(hapd, mgmt, len, 0);
1790fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		ret = 1;
17918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
17928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_REASSOC_REQ:
17938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::reassoc_req");
17948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		handle_assoc(hapd, mgmt, len, 1);
1795fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		ret = 1;
17968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
17978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_DISASSOC:
17988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::disassoc");
17998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		handle_disassoc(hapd, mgmt, len);
1800fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		ret = 1;
18018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
18028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_DEAUTH:
18031f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_msg(hapd->msg_ctx, MSG_DEBUG, "mgmt::deauth");
18048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		handle_deauth(hapd, mgmt, len);
1805fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		ret = 1;
18068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
18078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_ACTION:
18088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::action");
1809fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		ret = handle_action(hapd, mgmt, len);
18108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
18118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	default:
18128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
18138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
18148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "unknown mgmt frame subtype %d", stype);
18158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
18168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1817fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
1818fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	return ret;
18198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
18208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
18218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
18228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void handle_auth_cb(struct hostapd_data *hapd,
18238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   const struct ieee80211_mgmt *mgmt,
18248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   size_t len, int ok)
18258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
18268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u16 auth_alg, auth_transaction, status_code;
18278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct sta_info *sta;
18288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
18298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!ok) {
18308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, mgmt->da, HOSTAPD_MODULE_IEEE80211,
18318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_NOTICE,
18328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "did not acknowledge authentication response");
18338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
18348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
18358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
18368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) {
1837cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "handle_auth_cb - too short payload (len=%lu)",
1838cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   (unsigned long) len);
18398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
18408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
18418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
18428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
18438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);
18448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	status_code = le_to_host16(mgmt->u.auth.status_code);
18458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
18468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta = ap_get_sta(hapd, mgmt->da);
18478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!sta) {
1848cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "handle_auth_cb: STA " MACSTR " not found",
1849cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   MAC2STR(mgmt->da));
18508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
18518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
18528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
18538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (status_code == WLAN_STATUS_SUCCESS &&
18548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    ((auth_alg == WLAN_AUTH_OPEN && auth_transaction == 2) ||
18558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	     (auth_alg == WLAN_AUTH_SHARED_KEY && auth_transaction == 4))) {
18568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
18578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_INFO, "authenticated");
18588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sta->flags |= WLAN_STA_AUTH;
18598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
18608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
18618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
18628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1863c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidtstatic void hostapd_set_wds_encryption(struct hostapd_data *hapd,
1864c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt				       struct sta_info *sta,
1865c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt				       char *ifname_wds)
1866c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt{
1867c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt	int i;
1868c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt	struct hostapd_ssid *ssid = sta->ssid;
1869c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt
1870c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt	if (hapd->conf->ieee802_1x || hapd->conf->wpa)
1871c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt		return;
1872c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt
1873c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt	for (i = 0; i < 4; i++) {
1874c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt		if (ssid->wep.key[i] &&
1875c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt		    hostapd_drv_set_key(ifname_wds, hapd, WPA_ALG_WEP, NULL, i,
1876c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt					i == ssid->wep.idx, NULL, 0,
1877c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt					ssid->wep.key[i], ssid->wep.len[i])) {
1878c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt			wpa_printf(MSG_WARNING,
1879c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt				   "Could not set WEP keys for WDS interface; %s",
1880c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt				   ifname_wds);
1881c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt			break;
1882c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt		}
1883c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt	}
1884c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt}
1885c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt
1886c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt
18878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void handle_assoc_cb(struct hostapd_data *hapd,
18888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    const struct ieee80211_mgmt *mgmt,
18898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    size_t len, int reassoc, int ok)
18908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
18918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u16 status;
18928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct sta_info *sta;
18938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int new_assoc = 1;
18948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct ieee80211_ht_capabilities ht_cap;
1895a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	struct ieee80211_vht_capabilities vht_cap;
18968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
18978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (len < IEEE80211_HDRLEN + (reassoc ? sizeof(mgmt->u.reassoc_resp) :
18988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				      sizeof(mgmt->u.assoc_resp))) {
1899cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "handle_assoc_cb(reassoc=%d) - too short payload (len=%lu)",
1900cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   reassoc, (unsigned long) len);
19018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
19028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
19038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
19048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta = ap_get_sta(hapd, mgmt->da);
19058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (!sta) {
1906cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "handle_assoc_cb: STA " MACSTR " not found",
1907cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			   MAC2STR(mgmt->da));
19088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
19098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
19108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1911aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt	if (!ok) {
1912aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt		hostapd_logger(hapd, mgmt->da, HOSTAPD_MODULE_IEEE80211,
1913aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt			       HOSTAPD_LEVEL_DEBUG,
1914aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt			       "did not acknowledge association response");
1915aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt		sta->flags &= ~WLAN_STA_ASSOC_REQ_OK;
1916aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt		return;
1917aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt	}
1918aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt
1919aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt	if (reassoc)
1920aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt		status = le_to_host16(mgmt->u.reassoc_resp.status_code);
1921aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt	else
1922aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt		status = le_to_host16(mgmt->u.assoc_resp.status_code);
1923aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt
19248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (status != WLAN_STATUS_SUCCESS)
1925b36ed7cd946148d829f311de8fe53ea3ffaaffe3Dmitry Shmidt		return;
19268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
19278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* Stop previous accounting session, if one is started, and allocate
19288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * new session id for the new session. */
19298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	accounting_sta_stop(hapd, sta);
19308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
19318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
19328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       HOSTAPD_LEVEL_INFO,
19338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       "associated (aid %d)",
19348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       sta->aid);
19358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
19368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->flags & WLAN_STA_ASSOC)
19378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		new_assoc = 0;
19388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->flags |= WLAN_STA_ASSOC;
1939fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	sta->flags &= ~WLAN_STA_WNM_SLEEP_MODE;
1940f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	if ((!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen) ||
19418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    sta->auth_alg == WLAN_AUTH_FT) {
19428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/*
19438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * Open, static WEP, or FT protocol; no separate authorization
19448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * step.
19458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 */
19468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		ap_sta_set_authorized(hapd, sta, 1);
19478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
19488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
19498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (reassoc)
19508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		mlme_reassociate_indication(hapd, sta);
19518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	else
19528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		mlme_associate_indication(hapd, sta);
19538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
19548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
19558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta->sa_query_timed_out = 0;
19568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
19578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
19588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/*
19598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * Remove the STA entry in order to make sure the STA PS state gets
19608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * cleared and configuration gets updated in case of reassociation back
19618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * to the same AP.
19628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 */
19638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_drv_sta_remove(hapd, sta->addr);
19648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
19658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211N
19668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->flags & WLAN_STA_HT)
19678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_get_ht_capab(hapd, sta->ht_capabilities, &ht_cap);
19688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211N */
1969a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#ifdef CONFIG_IEEE80211AC
1970a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (sta->flags & WLAN_STA_VHT)
1971a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		hostapd_get_vht_capab(hapd, sta->vht_capabilities, &vht_cap);
1972a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#endif /* CONFIG_IEEE80211AC */
19738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
19748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (hostapd_sta_add(hapd, sta->addr, sta->aid, sta->capability,
19758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    sta->supported_rates, sta->supported_rates_len,
19768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    sta->listen_interval,
19771f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			    sta->flags & WLAN_STA_HT ? &ht_cap : NULL,
1978a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			    sta->flags & WLAN_STA_VHT ? &vht_cap : NULL,
1979bd14a57187b024f49f5b9ace55ef457d8d04650aDmitry Shmidt			    sta->flags, sta->qosinfo, sta->vht_opmode)) {
19808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
19818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       HOSTAPD_LEVEL_NOTICE,
19828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       "Could not add STA to kernel driver");
19831f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
19841f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		ap_sta_disconnect(hapd, sta, sta->addr,
19851f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				  WLAN_REASON_DISASSOC_AP_BUSY);
19861f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
1987b36ed7cd946148d829f311de8fe53ea3ffaaffe3Dmitry Shmidt		return;
19888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
19898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1990c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt	if (sta->flags & WLAN_STA_WDS) {
1991c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt		int ret;
1992c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt		char ifname_wds[IFNAMSIZ + 1];
1993c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt
1994c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt		ret = hostapd_set_wds_sta(hapd, ifname_wds, sta->addr,
1995c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt					  sta->aid, 1);
1996c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt		if (!ret)
1997c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt			hostapd_set_wds_encryption(hapd, sta, ifname_wds);
1998c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt	}
19998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
20008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->eapol_sm == NULL) {
20018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/*
20028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * This STA does not use RADIUS server for EAP authentication,
20038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * so bind it to the selected VLAN interface now, since the
20048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * interface selection is not going to change anymore.
20058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 */
20068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (ap_sta_bind_vlan(hapd, sta, 0) < 0)
2007b36ed7cd946148d829f311de8fe53ea3ffaaffe3Dmitry Shmidt			return;
20088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else if (sta->vlan_id) {
20098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* VLAN ID already set (e.g., by PMKSA caching), so bind STA */
20108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (ap_sta_bind_vlan(hapd, sta, 0) < 0)
2011b36ed7cd946148d829f311de8fe53ea3ffaaffe3Dmitry Shmidt			return;
20128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
20138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
20148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hostapd_set_sta_flags(hapd, sta);
20158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
20168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->auth_alg == WLAN_AUTH_FT)
20178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_auth_sm_event(sta->wpa_sm, WPA_ASSOC_FT);
20188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	else
20198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_auth_sm_event(sta->wpa_sm, WPA_ASSOC);
20208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	hapd->new_assoc_sta_cb(hapd, sta, !new_assoc);
20218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
20228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ieee802_1x_notify_port_enabled(sta->eapol_sm, 1);
20238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
20248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
20258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
20261f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidtstatic void handle_deauth_cb(struct hostapd_data *hapd,
20271f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			     const struct ieee80211_mgmt *mgmt,
20281f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			     size_t len, int ok)
20291f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt{
20301f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	struct sta_info *sta;
20311f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (mgmt->da[0] & 0x01)
20321f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return;
20331f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	sta = ap_get_sta(hapd, mgmt->da);
20341f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (!sta) {
20351f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_printf(MSG_DEBUG, "handle_deauth_cb: STA " MACSTR
20361f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   " not found", MAC2STR(mgmt->da));
20371f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return;
20381f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	}
20391f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (ok)
20401f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_printf(MSG_DEBUG, "STA " MACSTR " acknowledged deauth",
20411f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   MAC2STR(sta->addr));
20421f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	else
20431f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_printf(MSG_DEBUG, "STA " MACSTR " did not acknowledge "
20441f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   "deauth", MAC2STR(sta->addr));
20451f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
20461f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	ap_sta_deauth_cb(hapd, sta);
20471f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt}
20481f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
20491f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
20501f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidtstatic void handle_disassoc_cb(struct hostapd_data *hapd,
20511f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			       const struct ieee80211_mgmt *mgmt,
20521f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			       size_t len, int ok)
20531f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt{
20541f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	struct sta_info *sta;
20551f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (mgmt->da[0] & 0x01)
20561f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return;
20571f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	sta = ap_get_sta(hapd, mgmt->da);
20581f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (!sta) {
20591f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_printf(MSG_DEBUG, "handle_disassoc_cb: STA " MACSTR
20601f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   " not found", MAC2STR(mgmt->da));
20611f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return;
20621f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	}
20631f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (ok)
20641f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_printf(MSG_DEBUG, "STA " MACSTR " acknowledged disassoc",
20651f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   MAC2STR(sta->addr));
20661f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	else
20671f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_printf(MSG_DEBUG, "STA " MACSTR " did not acknowledge "
20681f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   "disassoc", MAC2STR(sta->addr));
20691f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
20701f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	ap_sta_disassoc_cb(hapd, sta);
20711f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt}
20721f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
20731f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
20748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
20758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * ieee802_11_mgmt_cb - Process management frame TX status callback
20768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @hapd: hostapd BSS data structure (the BSS from which the management frame
20778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * was sent from)
20788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @buf: management frame data (starting from IEEE 802.11 header)
20798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: length of frame data in octets
20808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @stype: management frame subtype from frame control field
20818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ok: Whether the frame was ACK'ed
20828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
20838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid ieee802_11_mgmt_cb(struct hostapd_data *hapd, const u8 *buf, size_t len,
20848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			u16 stype, int ok)
20858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
20868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	const struct ieee80211_mgmt *mgmt;
20878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	mgmt = (const struct ieee80211_mgmt *) buf;
20888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2089fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt#ifdef CONFIG_TESTING_OPTIONS
2090fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	if (hapd->ext_mgmt_frame_handling) {
2091fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		wpa_msg(hapd->msg_ctx, MSG_INFO, "MGMT-TX-STATUS stype=%u ok=%d",
2092fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt			stype, ok);
2093fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return;
2094fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	}
2095fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt#endif /* CONFIG_TESTING_OPTIONS */
2096fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
20978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	switch (stype) {
20988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_AUTH:
20998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::auth cb");
21008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		handle_auth_cb(hapd, mgmt, len, ok);
21018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
21028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_ASSOC_RESP:
21038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::assoc_resp cb");
21048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		handle_assoc_cb(hapd, mgmt, len, 0, ok);
21058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
21068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_REASSOC_RESP:
21078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::reassoc_resp cb");
21088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		handle_assoc_cb(hapd, mgmt, len, 1, ok);
21098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
21108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_PROBE_RESP:
21118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_EXCESSIVE, "mgmt::proberesp cb");
21128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
21138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_DEAUTH:
21141f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::deauth cb");
21151f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		handle_deauth_cb(hapd, mgmt, len, ok);
21161f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		break;
21171f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	case WLAN_FC_STYPE_DISASSOC:
21181f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::disassoc cb");
21191f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		handle_disassoc_cb(hapd, mgmt, len, ok);
21208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
21218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	case WLAN_FC_STYPE_ACTION:
21228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "mgmt::action cb");
21238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
21248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	default:
2125cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		wpa_printf(MSG_INFO, "unknown mgmt cb frame subtype %d", stype);
21268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		break;
21278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
21288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
21298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
21308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
21318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint ieee802_11_get_mib(struct hostapd_data *hapd, char *buf, size_t buflen)
21328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
21338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* TODO */
21348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
21358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
21368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
21378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
21388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint ieee802_11_get_mib_sta(struct hostapd_data *hapd, struct sta_info *sta,
21398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   char *buf, size_t buflen)
21408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
21418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* TODO */
21428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
21438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
21448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
21458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
21468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid hostapd_tx_status(struct hostapd_data *hapd, const u8 *addr,
21478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		       const u8 *buf, size_t len, int ack)
21488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
21498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct sta_info *sta;
21508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct hostapd_iface *iface = hapd->iface;
21518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
21528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta = ap_get_sta(hapd, addr);
21538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta == NULL && iface->num_bss > 1) {
21548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		size_t j;
21558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		for (j = 0; j < iface->num_bss; j++) {
21568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			hapd = iface->bss[j];
21578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			sta = ap_get_sta(hapd, addr);
21588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			if (sta)
21598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				break;
21608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
21618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2162c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	if (sta == NULL || !(sta->flags & WLAN_STA_ASSOC))
21638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
21648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta->flags & WLAN_STA_PENDING_POLL) {
21658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "STA " MACSTR " %s pending "
21668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "activity poll", MAC2STR(sta->addr),
21678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   ack ? "ACKed" : "did not ACK");
21688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (ack)
21698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			sta->flags &= ~WLAN_STA_PENDING_POLL;
21708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
21718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
21728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ieee802_1x_tx_status(hapd, sta, buf, len, ack);
21738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
21748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
21758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
21761f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidtvoid hostapd_eapol_tx_status(struct hostapd_data *hapd, const u8 *dst,
21771f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			     const u8 *data, size_t len, int ack)
21781f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt{
21791f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	struct sta_info *sta;
21801f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	struct hostapd_iface *iface = hapd->iface;
21811f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
21821f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	sta = ap_get_sta(hapd, dst);
21831f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (sta == NULL && iface->num_bss > 1) {
21841f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		size_t j;
21851f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		for (j = 0; j < iface->num_bss; j++) {
21861f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			hapd = iface->bss[j];
21871f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			sta = ap_get_sta(hapd, dst);
21881f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			if (sta)
21891f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				break;
21901f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		}
21911f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	}
2192c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	if (sta == NULL || !(sta->flags & WLAN_STA_ASSOC)) {
2193c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt		wpa_printf(MSG_DEBUG, "Ignore TX status for Data frame to STA "
2194c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt			   MACSTR " that is not currently associated",
2195c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt			   MAC2STR(dst));
21961f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return;
2197c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	}
21981f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
21991f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	ieee802_1x_eapol_tx_status(hapd, sta, data, len, ack);
22001f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt}
22011f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
22021f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
22031f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidtvoid hostapd_client_poll_ok(struct hostapd_data *hapd, const u8 *addr)
22041f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt{
22051f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	struct sta_info *sta;
22061f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	struct hostapd_iface *iface = hapd->iface;
22071f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
22081f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	sta = ap_get_sta(hapd, addr);
22091f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (sta == NULL && iface->num_bss > 1) {
22101f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		size_t j;
22111f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		for (j = 0; j < iface->num_bss; j++) {
22121f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			hapd = iface->bss[j];
22131f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			sta = ap_get_sta(hapd, addr);
22141f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			if (sta)
22151f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				break;
22161f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		}
22171f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	}
22181f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (sta == NULL)
22191f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return;
22201f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (!(sta->flags & WLAN_STA_PENDING_POLL))
22211f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		return;
22221f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
22231f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	wpa_printf(MSG_DEBUG, "STA " MACSTR " ACKed pending "
22241f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		   "activity poll", MAC2STR(sta->addr));
22251f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	sta->flags &= ~WLAN_STA_PENDING_POLL;
22261f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt}
22271f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
22281f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
22298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid ieee802_11_rx_from_unknown(struct hostapd_data *hapd, const u8 *src,
22308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				int wds)
22318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
22328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct sta_info *sta;
22338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
22348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sta = ap_get_sta(hapd, src);
22358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta && (sta->flags & WLAN_STA_ASSOC)) {
2236aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt		if (!hapd->conf->wds_sta)
2237aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt			return;
2238aa532510a7b8c4da2d7d6e2c11dda5db840894e4Dmitry Shmidt
22398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (wds && !(sta->flags & WLAN_STA_WDS)) {
2240c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt			int ret;
2241c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt			char ifname_wds[IFNAMSIZ + 1];
2242c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt
22438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_printf(MSG_DEBUG, "Enable 4-address WDS mode for "
22448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   "STA " MACSTR " (aid %u)",
22458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   MAC2STR(sta->addr), sta->aid);
22468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			sta->flags |= WLAN_STA_WDS;
2247c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt			ret = hostapd_set_wds_sta(hapd, ifname_wds,
2248c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt						  sta->addr, sta->aid, 1);
2249c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt			if (!ret)
2250c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt				hostapd_set_wds_encryption(hapd, sta,
2251c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt							   ifname_wds);
22528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
22538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
22548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
22558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
22568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_printf(MSG_DEBUG, "Data/PS-poll frame from not associated STA "
22578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   MACSTR, MAC2STR(src));
22588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (src[0] & 0x01) {
22598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* Broadcast bit set in SA?! Ignore the frame silently. */
22608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
22618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
22628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
22638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta && (sta->flags & WLAN_STA_ASSOC_REQ_OK)) {
22648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_printf(MSG_DEBUG, "Association Response to the STA has "
22658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "already been sent, but no TX status yet known - "
22668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   "ignore Class 3 frame issue with " MACSTR,
22678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			   MAC2STR(src));
22688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
22698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
22708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
22718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sta && (sta->flags & WLAN_STA_AUTH))
22728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_drv_sta_disassoc(
22738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			hapd, src,
22748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			WLAN_REASON_CLASS3_FRAME_FROM_NONASSOC_STA);
22758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	else
22768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		hostapd_drv_sta_deauth(
22778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			hapd, src,
22788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			WLAN_REASON_CLASS3_FRAME_FROM_NONASSOC_STA);
22798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
22808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
22818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
22828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_NATIVE_WINDOWS */
2283