1  /*
2   * hostapd / Initialization and configuration
3   * Copyright (c) 2002-2021, Jouni Malinen <j@w1.fi>
4   *
5   * This software may be distributed under the terms of the BSD license.
6   * See README for more details.
7   */
8  
9  #include "utils/includes.h"
10  #ifdef CONFIG_SQLITE
11  #include <sqlite3.h>
12  #endif /* CONFIG_SQLITE */
13  
14  #include "utils/common.h"
15  #include "utils/eloop.h"
16  #include "utils/crc32.h"
17  #include "common/ieee802_11_defs.h"
18  #include "common/wpa_ctrl.h"
19  #include "common/hw_features_common.h"
20  #include "radius/radius_client.h"
21  #include "radius/radius_das.h"
22  #include "eap_server/tncs.h"
23  #include "eapol_auth/eapol_auth_sm.h"
24  #include "eapol_auth/eapol_auth_sm_i.h"
25  #include "fst/fst.h"
26  #include "hostapd.h"
27  #include "authsrv.h"
28  #include "sta_info.h"
29  #include "accounting.h"
30  #include "ap_list.h"
31  #include "beacon.h"
32  #include "ieee802_1x.h"
33  #include "ieee802_11_auth.h"
34  #include "vlan_init.h"
35  #include "wpa_auth.h"
36  #include "wps_hostapd.h"
37  #include "dpp_hostapd.h"
38  #include "nan_usd_ap.h"
39  #include "gas_query_ap.h"
40  #include "hw_features.h"
41  #include "wpa_auth_glue.h"
42  #include "ap_drv_ops.h"
43  #include "ap_config.h"
44  #include "p2p_hostapd.h"
45  #include "gas_serv.h"
46  #include "dfs.h"
47  #include "ieee802_11.h"
48  #include "bss_load.h"
49  #include "x_snoop.h"
50  #include "dhcp_snoop.h"
51  #include "ndisc_snoop.h"
52  #include "neighbor_db.h"
53  #include "rrm.h"
54  #include "fils_hlp.h"
55  #include "acs.h"
56  #include "hs20.h"
57  #include "airtime_policy.h"
58  #include "wpa_auth_kay.h"
59  #include "hw_features.h"
60  
61  
62  static int hostapd_flush_old_stations(struct hostapd_data *hapd, u16 reason);
63  #ifdef CONFIG_WEP
64  static int hostapd_setup_encryption(char *iface, struct hostapd_data *hapd);
65  static int hostapd_broadcast_wep_clear(struct hostapd_data *hapd);
66  #endif /* CONFIG_WEP */
67  static int setup_interface2(struct hostapd_iface *iface);
68  static void channel_list_update_timeout(void *eloop_ctx, void *timeout_ctx);
69  static void hostapd_interface_setup_failure_handler(void *eloop_ctx,
70  						    void *timeout_ctx);
71  #ifdef CONFIG_IEEE80211AX
72  static void hostapd_switch_color_timeout_handler(void *eloop_data,
73  						 void *user_ctx);
74  #endif /* CONFIG_IEEE80211AX */
75  
76  
hostapd_for_each_interface(struct hapd_interfaces * interfaces,int (* cb)(struct hostapd_iface * iface,void * ctx),void * ctx)77  int hostapd_for_each_interface(struct hapd_interfaces *interfaces,
78  			       int (*cb)(struct hostapd_iface *iface,
79  					 void *ctx), void *ctx)
80  {
81  	size_t i;
82  	int ret;
83  
84  	for (i = 0; i < interfaces->count; i++) {
85  		if (!interfaces->iface[i])
86  			continue;
87  		ret = cb(interfaces->iface[i], ctx);
88  		if (ret)
89  			return ret;
90  	}
91  
92  	return 0;
93  }
94  
95  
hostapd_mbssid_get_tx_bss(struct hostapd_data * hapd)96  struct hostapd_data * hostapd_mbssid_get_tx_bss(struct hostapd_data *hapd)
97  {
98  	if (hapd->iconf->mbssid)
99  		return hapd->iface->bss[0];
100  
101  	return hapd;
102  }
103  
104  
hostapd_mbssid_get_bss_index(struct hostapd_data * hapd)105  int hostapd_mbssid_get_bss_index(struct hostapd_data *hapd)
106  {
107  	if (hapd->iconf->mbssid) {
108  		size_t i;
109  
110  		for (i = 1; i < hapd->iface->num_bss; i++)
111  			if (hapd->iface->bss[i] == hapd)
112  				return i;
113  	}
114  
115  	return 0;
116  }
117  
118  
hostapd_reconfig_encryption(struct hostapd_data * hapd)119  void hostapd_reconfig_encryption(struct hostapd_data *hapd)
120  {
121  	if (hapd->wpa_auth)
122  		return;
123  
124  	hostapd_set_privacy(hapd, 0);
125  #ifdef CONFIG_WEP
126  	hostapd_setup_encryption(hapd->conf->iface, hapd);
127  #endif /* CONFIG_WEP */
128  }
129  
130  
hostapd_reload_bss(struct hostapd_data * hapd)131  static void hostapd_reload_bss(struct hostapd_data *hapd)
132  {
133  	struct hostapd_ssid *ssid;
134  
135  	if (!hapd->started)
136  		return;
137  
138  	if (hapd->conf->wmm_enabled < 0)
139  		hapd->conf->wmm_enabled = hapd->iconf->ieee80211n |
140  			hapd->iconf->ieee80211ax;
141  
142  #ifndef CONFIG_NO_RADIUS
143  	radius_client_reconfig(hapd->radius, hapd->conf->radius);
144  #endif /* CONFIG_NO_RADIUS */
145  
146  	ssid = &hapd->conf->ssid;
147  	if (!ssid->wpa_psk_set && ssid->wpa_psk && !ssid->wpa_psk->next &&
148  	    ssid->wpa_passphrase_set && ssid->wpa_passphrase) {
149  		/*
150  		 * Force PSK to be derived again since SSID or passphrase may
151  		 * have changed.
152  		 */
153  		hostapd_config_clear_wpa_psk(&hapd->conf->ssid.wpa_psk);
154  	}
155  	if (hostapd_setup_wpa_psk(hapd->conf)) {
156  		wpa_printf(MSG_ERROR, "Failed to re-configure WPA PSK "
157  			   "after reloading configuration");
158  	}
159  
160  	if (hapd->conf->ieee802_1x || hapd->conf->wpa)
161  		hostapd_set_drv_ieee8021x(hapd, hapd->conf->iface, 1);
162  	else
163  		hostapd_set_drv_ieee8021x(hapd, hapd->conf->iface, 0);
164  
165  	if (hapd->conf->wpa && hapd->wpa_auth == NULL) {
166  		hostapd_setup_wpa(hapd);
167  		if (hapd->wpa_auth)
168  			wpa_init_keys(hapd->wpa_auth);
169  	} else if (hapd->conf->wpa) {
170  		const u8 *wpa_ie;
171  		size_t wpa_ie_len;
172  		hostapd_reconfig_wpa(hapd);
173  		wpa_ie = wpa_auth_get_wpa_ie(hapd->wpa_auth, &wpa_ie_len);
174  		if (hostapd_set_generic_elem(hapd, wpa_ie, wpa_ie_len))
175  			wpa_printf(MSG_ERROR, "Failed to configure WPA IE for "
176  				   "the kernel driver.");
177  	} else if (hapd->wpa_auth) {
178  		wpa_deinit(hapd->wpa_auth);
179  		hapd->wpa_auth = NULL;
180  		hostapd_set_privacy(hapd, 0);
181  #ifdef CONFIG_WEP
182  		hostapd_setup_encryption(hapd->conf->iface, hapd);
183  #endif /* CONFIG_WEP */
184  		hostapd_set_generic_elem(hapd, (u8 *) "", 0);
185  	}
186  
187  	hostapd_neighbor_sync_own_report(hapd);
188  
189  	ieee802_11_set_beacon(hapd);
190  	hostapd_update_wps(hapd);
191  
192  	if (hapd->conf->ssid.ssid_set &&
193  	    hostapd_set_ssid(hapd, hapd->conf->ssid.ssid,
194  			     hapd->conf->ssid.ssid_len)) {
195  		wpa_printf(MSG_ERROR, "Could not set SSID for kernel driver");
196  		/* try to continue */
197  	}
198  	wpa_printf(MSG_DEBUG, "Reconfigured interface %s", hapd->conf->iface);
199  }
200  
201  
hostapd_clear_old_bss(struct hostapd_data * bss)202  static void hostapd_clear_old_bss(struct hostapd_data *bss)
203  {
204  	wpa_printf(MSG_DEBUG, "BSS %s changed - clear old state",
205  		   bss->conf->iface);
206  
207  	/*
208  	 * Deauthenticate all stations since the new configuration may not
209  	 * allow them to use the BSS anymore.
210  	 */
211  	hostapd_flush_old_stations(bss, WLAN_REASON_PREV_AUTH_NOT_VALID);
212  #ifdef CONFIG_WEP
213  	hostapd_broadcast_wep_clear(bss);
214  #endif /* CONFIG_WEP */
215  
216  #ifndef CONFIG_NO_RADIUS
217  	/* TODO: update dynamic data based on changed configuration
218  	 * items (e.g., open/close sockets, etc.) */
219  	radius_client_flush(bss->radius, 0);
220  #endif /* CONFIG_NO_RADIUS */
221  }
222  
223  
hostapd_clear_old(struct hostapd_iface * iface)224  static void hostapd_clear_old(struct hostapd_iface *iface)
225  {
226  	size_t j;
227  
228  	for (j = 0; j < iface->num_bss; j++)
229  		hostapd_clear_old_bss(iface->bss[j]);
230  }
231  
232  
hostapd_iface_conf_changed(struct hostapd_config * newconf,struct hostapd_config * oldconf)233  static int hostapd_iface_conf_changed(struct hostapd_config *newconf,
234  				      struct hostapd_config *oldconf)
235  {
236  	size_t i;
237  
238  	if (newconf->num_bss != oldconf->num_bss)
239  		return 1;
240  
241  	for (i = 0; i < newconf->num_bss; i++) {
242  		if (os_strcmp(newconf->bss[i]->iface,
243  			      oldconf->bss[i]->iface) != 0)
244  			return 1;
245  #ifdef CONFIG_IEEE80211BE
246  		if (newconf->bss[i]->mld_ap != oldconf->bss[i]->mld_ap)
247  			return 1;
248  #endif /* CONFIG_IEEE80211BE */
249  	}
250  
251  	return 0;
252  }
253  
254  
hostapd_reload_config(struct hostapd_iface * iface)255  int hostapd_reload_config(struct hostapd_iface *iface)
256  {
257  	struct hapd_interfaces *interfaces = iface->interfaces;
258  	struct hostapd_data *hapd = iface->bss[0];
259  	struct hostapd_config *newconf, *oldconf;
260  	size_t j;
261  
262  	if (iface->config_fname == NULL) {
263  		/* Only in-memory config in use - assume it has been updated */
264  		hostapd_clear_old(iface);
265  		for (j = 0; j < iface->num_bss; j++)
266  			hostapd_reload_bss(iface->bss[j]);
267  		return 0;
268  	}
269  
270  	if (iface->interfaces == NULL ||
271  	    iface->interfaces->config_read_cb == NULL)
272  		return -1;
273  	newconf = iface->interfaces->config_read_cb(iface->config_fname);
274  	if (newconf == NULL)
275  		return -1;
276  
277  	oldconf = hapd->iconf;
278  	if (hostapd_iface_conf_changed(newconf, oldconf)) {
279  		char *fname;
280  		int res;
281  
282  		hostapd_clear_old(iface);
283  
284  		wpa_printf(MSG_DEBUG,
285  			   "Configuration changes include interface/BSS modification - force full disable+enable sequence");
286  		fname = os_strdup(iface->config_fname);
287  		if (!fname) {
288  			hostapd_config_free(newconf);
289  			return -1;
290  		}
291  		hostapd_remove_iface(interfaces, hapd->conf->iface);
292  		iface = hostapd_init(interfaces, fname);
293  		os_free(fname);
294  		hostapd_config_free(newconf);
295  		if (!iface) {
296  			wpa_printf(MSG_ERROR,
297  				   "Failed to initialize interface on config reload");
298  			return -1;
299  		}
300  		iface->interfaces = interfaces;
301  		interfaces->iface[interfaces->count] = iface;
302  		interfaces->count++;
303  		res = hostapd_enable_iface(iface);
304  		if (res < 0)
305  			wpa_printf(MSG_ERROR,
306  				   "Failed to enable interface on config reload");
307  		return res;
308  	}
309  
310  	for (j = 0; j < iface->num_bss; j++) {
311  		hapd = iface->bss[j];
312  		if (!hapd->conf->config_id || !newconf->bss[j]->config_id ||
313  		    os_strcmp(hapd->conf->config_id,
314  			      newconf->bss[j]->config_id) != 0)
315  			hostapd_clear_old_bss(hapd);
316  		hapd->iconf = newconf;
317  		hapd->iconf->channel = oldconf->channel;
318  		hapd->iconf->acs = oldconf->acs;
319  		hapd->iconf->secondary_channel = oldconf->secondary_channel;
320  		hapd->iconf->ieee80211n = oldconf->ieee80211n;
321  		hapd->iconf->ieee80211ac = oldconf->ieee80211ac;
322  		hapd->iconf->ht_capab = oldconf->ht_capab;
323  		hapd->iconf->vht_capab = oldconf->vht_capab;
324  		hostapd_set_oper_chwidth(hapd->iconf,
325  					 hostapd_get_oper_chwidth(oldconf));
326  		hostapd_set_oper_centr_freq_seg0_idx(
327  			hapd->iconf,
328  			hostapd_get_oper_centr_freq_seg0_idx(oldconf));
329  		hostapd_set_oper_centr_freq_seg1_idx(
330  			hapd->iconf,
331  			hostapd_get_oper_centr_freq_seg1_idx(oldconf));
332  		hapd->conf = newconf->bss[j];
333  		hostapd_reload_bss(hapd);
334  	}
335  
336  	iface->conf = newconf;
337  	hostapd_config_free(oldconf);
338  
339  
340  	return 0;
341  }
342  
343  
344  #ifdef CONFIG_WEP
345  
hostapd_broadcast_key_clear_iface(struct hostapd_data * hapd,const char * ifname)346  static void hostapd_broadcast_key_clear_iface(struct hostapd_data *hapd,
347  					      const char *ifname)
348  {
349  	int i;
350  
351  	if (!ifname || !hapd->drv_priv)
352  		return;
353  	for (i = 0; i < NUM_WEP_KEYS; i++) {
354  		if (hostapd_drv_set_key(ifname, hapd, WPA_ALG_NONE, NULL, i, 0,
355  					0, NULL, 0, NULL, 0, KEY_FLAG_GROUP)) {
356  			wpa_printf(MSG_DEBUG, "Failed to clear default "
357  				   "encryption keys (ifname=%s keyidx=%d)",
358  				   ifname, i);
359  		}
360  	}
361  	if (ap_pmf_enabled(hapd->conf)) {
362  		for (i = NUM_WEP_KEYS; i < NUM_WEP_KEYS + 2; i++) {
363  			if (hostapd_drv_set_key(ifname, hapd, WPA_ALG_NONE,
364  						NULL, i, 0, 0, NULL,
365  						0, NULL, 0, KEY_FLAG_GROUP)) {
366  				wpa_printf(MSG_DEBUG, "Failed to clear "
367  					   "default mgmt encryption keys "
368  					   "(ifname=%s keyidx=%d)", ifname, i);
369  			}
370  		}
371  	}
372  }
373  
374  
hostapd_broadcast_wep_clear(struct hostapd_data * hapd)375  static int hostapd_broadcast_wep_clear(struct hostapd_data *hapd)
376  {
377  	hostapd_broadcast_key_clear_iface(hapd, hapd->conf->iface);
378  	return 0;
379  }
380  
381  
hostapd_broadcast_wep_set(struct hostapd_data * hapd)382  static int hostapd_broadcast_wep_set(struct hostapd_data *hapd)
383  {
384  	int errors = 0, idx;
385  	struct hostapd_ssid *ssid = &hapd->conf->ssid;
386  
387  	idx = ssid->wep.idx;
388  	if (ssid->wep.default_len && ssid->wep.key[idx] &&
389  	    hostapd_drv_set_key(hapd->conf->iface,
390  				hapd, WPA_ALG_WEP, broadcast_ether_addr, idx, 0,
391  				1, NULL, 0, ssid->wep.key[idx],
392  				ssid->wep.len[idx],
393  				KEY_FLAG_GROUP_RX_TX_DEFAULT)) {
394  		wpa_printf(MSG_WARNING, "Could not set WEP encryption.");
395  		errors++;
396  	}
397  
398  	return errors;
399  }
400  
401  #endif /* CONFIG_WEP */
402  
403  
404  #ifdef CONFIG_IEEE80211BE
405  #ifdef CONFIG_TESTING_OPTIONS
406  
hostapd_link_remove_timeout_handler(void * eloop_data,void * user_ctx)407  static void hostapd_link_remove_timeout_handler(void *eloop_data,
408  						void *user_ctx)
409  {
410  	struct hostapd_data *hapd = (struct hostapd_data *) eloop_data;
411  
412  	if (hapd->eht_mld_link_removal_count == 0)
413  		return;
414  	hapd->eht_mld_link_removal_count--;
415  
416  	wpa_printf(MSG_DEBUG, "MLD: Remove link_id=%u in %u beacons",
417  		   hapd->mld_link_id,
418  		   hapd->eht_mld_link_removal_count);
419  
420  	ieee802_11_set_beacon(hapd);
421  
422  	if (!hapd->eht_mld_link_removal_count) {
423  		hostapd_free_link_stas(hapd);
424  		hostapd_disable_iface(hapd->iface);
425  		return;
426  	}
427  
428  	eloop_register_timeout(0, TU_TO_USEC(hapd->iconf->beacon_int),
429  			       hostapd_link_remove_timeout_handler,
430  			       hapd, NULL);
431  }
432  
433  
hostapd_link_remove(struct hostapd_data * hapd,u32 count)434  int hostapd_link_remove(struct hostapd_data *hapd, u32 count)
435  {
436  	if (!hapd->conf->mld_ap)
437  		return -1;
438  
439  	wpa_printf(MSG_DEBUG,
440  		   "MLD: Remove link_id=%u in %u beacons",
441  		   hapd->mld_link_id, count);
442  
443  	hapd->eht_mld_link_removal_count = count;
444  	hapd->eht_mld_bss_param_change++;
445  	if (hapd->eht_mld_bss_param_change == 255)
446  		hapd->eht_mld_bss_param_change = 0;
447  
448  	eloop_register_timeout(0, TU_TO_USEC(hapd->iconf->beacon_int),
449  			       hostapd_link_remove_timeout_handler,
450  			       hapd, NULL);
451  
452  	ieee802_11_set_beacon(hapd);
453  	return 0;
454  }
455  
456  #endif /* CONFIG_TESTING_OPTIONS */
457  #endif /* CONFIG_IEEE80211BE */
458  
459  
hostapd_free_hapd_data(struct hostapd_data * hapd)460  void hostapd_free_hapd_data(struct hostapd_data *hapd)
461  {
462  	os_free(hapd->probereq_cb);
463  	hapd->probereq_cb = NULL;
464  	hapd->num_probereq_cb = 0;
465  
466  #ifdef CONFIG_P2P
467  	wpabuf_free(hapd->p2p_beacon_ie);
468  	hapd->p2p_beacon_ie = NULL;
469  	wpabuf_free(hapd->p2p_probe_resp_ie);
470  	hapd->p2p_probe_resp_ie = NULL;
471  #endif /* CONFIG_P2P */
472  
473  	if (!hapd->started) {
474  		wpa_printf(MSG_ERROR, "%s: Interface %s wasn't started",
475  			   __func__, hapd->conf ? hapd->conf->iface : "N/A");
476  		return;
477  	}
478  	hapd->started = 0;
479  	hapd->beacon_set_done = 0;
480  
481  	wpa_printf(MSG_DEBUG, "%s(%s)", __func__, hapd->conf->iface);
482  	accounting_deinit(hapd);
483  	hostapd_deinit_wpa(hapd);
484  	vlan_deinit(hapd);
485  	hostapd_acl_deinit(hapd);
486  #ifndef CONFIG_NO_RADIUS
487  	if (hostapd_mld_is_first_bss(hapd)) {
488  #ifdef CONFIG_IEEE80211BE
489  		struct hapd_interfaces *ifaces = hapd->iface->interfaces;
490  		size_t i;
491  
492  		for (i = 0; i < ifaces->count; i++) {
493  			struct hostapd_iface *iface = ifaces->iface[i];
494  			size_t j;
495  
496  			for (j = 0; iface && j < iface->num_bss; j++) {
497  				struct hostapd_data *h = iface->bss[j];
498  
499  				if (hapd == h)
500  					continue;
501  				if (h->radius == hapd->radius)
502  					h->radius = NULL;
503  				if (h->radius_das == hapd->radius_das)
504  					h->radius_das = NULL;
505  			}
506  		}
507  #endif /* CONFIG_IEEE80211BE */
508  		radius_client_deinit(hapd->radius);
509  		radius_das_deinit(hapd->radius_das);
510  	}
511  	hapd->radius = NULL;
512  	hapd->radius_das = NULL;
513  #endif /* CONFIG_NO_RADIUS */
514  
515  	hostapd_deinit_wps(hapd);
516  	ieee802_1x_dealloc_kay_sm_hapd(hapd);
517  #ifdef CONFIG_DPP
518  	hostapd_dpp_deinit(hapd);
519  	gas_query_ap_deinit(hapd->gas);
520  	hapd->gas = NULL;
521  #endif /* CONFIG_DPP */
522  #ifdef CONFIG_NAN_USD
523  	hostapd_nan_usd_deinit(hapd);
524  #endif /* CONFIG_NAN_USD */
525  
526  	authsrv_deinit(hapd);
527  
528  	/* For single drv, first bss would have interface_added flag set.
529  	 * Don't remove interface now. Driver deinit part will take care
530  	 */
531  	if (hapd->interface_added && hapd->iface->bss[0] != hapd) {
532  		hapd->interface_added = 0;
533  		if (hostapd_if_remove(hapd, WPA_IF_AP_BSS, hapd->conf->iface)) {
534  			wpa_printf(MSG_WARNING,
535  				   "Failed to remove BSS interface %s",
536  				   hapd->conf->iface);
537  			hapd->interface_added = 1;
538  		} else {
539  			/*
540  			 * Since this was a dynamically added interface, the
541  			 * driver wrapper may have removed its internal instance
542  			 * and hapd->drv_priv is not valid anymore.
543  			 */
544  			hapd->drv_priv = NULL;
545  		}
546  	}
547  
548  #ifdef CONFIG_IEEE80211BE
549  	/* If the interface was not added as well as it is not the first BSS,
550  	 * at least the link should be removed here since deinit will take care
551  	 * of only the first BSS. */
552  	if (hapd->conf->mld_ap && !hapd->interface_added &&
553  	    hapd->iface->bss[0] != hapd)
554  		hostapd_if_link_remove(hapd, WPA_IF_AP_BSS, hapd->conf->iface,
555  				       hapd->mld_link_id);
556  #endif /* CONFIG_IEEE80211BE */
557  
558  	wpabuf_free(hapd->time_adv);
559  	hapd->time_adv = NULL;
560  
561  #ifdef CONFIG_INTERWORKING
562  	gas_serv_deinit(hapd);
563  #endif /* CONFIG_INTERWORKING */
564  
565  	bss_load_update_deinit(hapd);
566  	ndisc_snoop_deinit(hapd);
567  	dhcp_snoop_deinit(hapd);
568  	x_snoop_deinit(hapd);
569  
570  #ifdef CONFIG_SQLITE
571  	bin_clear_free(hapd->tmp_eap_user.identity,
572  		       hapd->tmp_eap_user.identity_len);
573  	bin_clear_free(hapd->tmp_eap_user.password,
574  		       hapd->tmp_eap_user.password_len);
575  	os_memset(&hapd->tmp_eap_user, 0, sizeof(hapd->tmp_eap_user));
576  #endif /* CONFIG_SQLITE */
577  
578  #ifdef CONFIG_MESH
579  	wpabuf_free(hapd->mesh_pending_auth);
580  	hapd->mesh_pending_auth = NULL;
581  	/* handling setup failure is already done */
582  	hapd->setup_complete_cb = NULL;
583  #endif /* CONFIG_MESH */
584  
585  #ifndef CONFIG_NO_RRM
586  	hostapd_clean_rrm(hapd);
587  #endif /* CONFIG_NO_RRM */
588  	fils_hlp_deinit(hapd);
589  
590  #ifdef CONFIG_OCV
591  	eloop_cancel_timeout(hostapd_ocv_check_csa_sa_query, hapd, NULL);
592  #endif /* CONFIG_OCV */
593  
594  #ifdef CONFIG_SAE
595  	{
596  		struct hostapd_sae_commit_queue *q;
597  
598  		while ((q = dl_list_first(&hapd->sae_commit_queue,
599  					  struct hostapd_sae_commit_queue,
600  					  list))) {
601  			dl_list_del(&q->list);
602  			os_free(q);
603  		}
604  	}
605  	eloop_cancel_timeout(auth_sae_process_commit, hapd, NULL);
606  #endif /* CONFIG_SAE */
607  
608  #ifdef CONFIG_IEEE80211AX
609  	eloop_cancel_timeout(hostapd_switch_color_timeout_handler, hapd, NULL);
610  #ifdef CONFIG_TESTING_OPTIONS
611  #ifdef CONFIG_IEEE80211BE
612  	eloop_cancel_timeout(hostapd_link_remove_timeout_handler, hapd, NULL);
613  #endif /* CONFIG_IEEE80211BE */
614  #endif /* CONFIG_TESTING_OPTIONS */
615  
616  #endif /* CONFIG_IEEE80211AX */
617  }
618  
619  
620  /* hostapd_bss_link_deinit - Per-BSS ML cleanup (deinitialization)
621   * @hapd: Pointer to BSS data
622   *
623   * This function is used to unlink the BSS from the AP MLD.
624   * If the BSS being removed is the first link, the next link becomes the first
625   * link.
626   */
hostapd_bss_link_deinit(struct hostapd_data * hapd)627  static void hostapd_bss_link_deinit(struct hostapd_data *hapd)
628  {
629  #ifdef CONFIG_IEEE80211BE
630  	int i;
631  
632  	if (!hapd->conf || !hapd->conf->mld_ap)
633  		return;
634  
635  	/* Free per STA profiles */
636  	for (i = 0; i < MAX_NUM_MLD_LINKS; i++) {
637  		os_free(hapd->partner_links[i].resp_sta_profile);
638  		os_memset(&hapd->partner_links[i], 0,
639  			  sizeof(hapd->partner_links[i]));
640  	}
641  
642  	/* Put all freeing logic above this */
643  	if (!hapd->mld || !hapd->mld->num_links)
644  		return;
645  
646  	/* If not started, not yet linked to the MLD. However, the first
647  	 * BSS is always linked since it is linked during driver_init(), and
648  	 * hence, need to remove it from the AP MLD.
649  	 */
650  	if (!hapd->started && hapd->iface->bss[0] != hapd)
651  		return;
652  
653  	/* The first BSS can also be only linked when at least driver_init() is
654  	 * executed. But if previous interface fails, it is not, and hence,
655  	 * safe to skip.
656  	 */
657  	if (hapd->iface->bss[0] == hapd && !hapd->drv_priv)
658  		return;
659  
660  	hostapd_mld_remove_link(hapd);
661  #endif /* CONFIG_IEEE80211BE */
662  }
663  
664  
665  /**
666   * hostapd_cleanup - Per-BSS cleanup (deinitialization)
667   * @hapd: Pointer to BSS data
668   *
669   * This function is used to free all per-BSS data structures and resources.
670   * Most of the modules that are initialized in hostapd_setup_bss() are
671   * deinitialized here.
672   */
hostapd_cleanup(struct hostapd_data * hapd)673  static void hostapd_cleanup(struct hostapd_data *hapd)
674  {
675  	wpa_printf(MSG_DEBUG, "%s(hapd=%p (%s))", __func__, hapd,
676  		   hapd->conf ? hapd->conf->iface : "N/A");
677  	if (hapd->iface->interfaces &&
678  	    hapd->iface->interfaces->ctrl_iface_deinit) {
679  		wpa_msg(hapd->msg_ctx, MSG_INFO, WPA_EVENT_TERMINATING);
680  		hapd->iface->interfaces->ctrl_iface_deinit(hapd);
681  	}
682  	hostapd_free_hapd_data(hapd);
683  }
684  
685  
sta_track_deinit(struct hostapd_iface * iface)686  static void sta_track_deinit(struct hostapd_iface *iface)
687  {
688  	struct hostapd_sta_info *info;
689  
690  	if (!iface->num_sta_seen)
691  		return;
692  
693  	while ((info = dl_list_first(&iface->sta_seen, struct hostapd_sta_info,
694  				     list))) {
695  		dl_list_del(&info->list);
696  		iface->num_sta_seen--;
697  		sta_track_del(info);
698  	}
699  }
700  
701  
hostapd_cleanup_iface_partial(struct hostapd_iface * iface)702  void hostapd_cleanup_iface_partial(struct hostapd_iface *iface)
703  {
704  	wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
705  	eloop_cancel_timeout(channel_list_update_timeout, iface, NULL);
706  #ifdef NEED_AP_MLME
707  	hostapd_stop_setup_timers(iface);
708  #endif /* NEED_AP_MLME */
709  	if (iface->current_mode)
710  		acs_cleanup(iface);
711  	hostapd_free_hw_features(iface->hw_features, iface->num_hw_features);
712  	iface->hw_features = NULL;
713  	iface->num_hw_features = 0;
714  	iface->current_mode = NULL;
715  	os_free(iface->current_rates);
716  	iface->current_rates = NULL;
717  	os_free(iface->basic_rates);
718  	iface->basic_rates = NULL;
719  	iface->cac_started = 0;
720  	ap_list_deinit(iface);
721  	sta_track_deinit(iface);
722  	airtime_policy_update_deinit(iface);
723  	hostapd_free_multi_hw_info(iface->multi_hw_info);
724  	iface->multi_hw_info = NULL;
725  	iface->current_hw_info = NULL;
726  }
727  
728  
729  /**
730   * hostapd_cleanup_iface - Complete per-interface cleanup
731   * @iface: Pointer to interface data
732   *
733   * This function is called after per-BSS data structures are deinitialized
734   * with hostapd_cleanup().
735   */
hostapd_cleanup_iface(struct hostapd_iface * iface)736  static void hostapd_cleanup_iface(struct hostapd_iface *iface)
737  {
738  	wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
739  	eloop_cancel_timeout(hostapd_interface_setup_failure_handler, iface,
740  			     NULL);
741  
742  	hostapd_cleanup_iface_partial(iface);
743  	hostapd_config_free(iface->conf);
744  	iface->conf = NULL;
745  
746  	os_free(iface->config_fname);
747  	os_free(iface->bss);
748  	wpa_printf(MSG_DEBUG, "%s: free iface=%p", __func__, iface);
749  	os_free(iface);
750  }
751  
752  
753  #ifdef CONFIG_WEP
754  
hostapd_clear_wep(struct hostapd_data * hapd)755  static void hostapd_clear_wep(struct hostapd_data *hapd)
756  {
757  	if (hapd->drv_priv && !hapd->iface->driver_ap_teardown && hapd->conf) {
758  		hostapd_set_privacy(hapd, 0);
759  		hostapd_broadcast_wep_clear(hapd);
760  	}
761  }
762  
763  
hostapd_setup_encryption(char * iface,struct hostapd_data * hapd)764  static int hostapd_setup_encryption(char *iface, struct hostapd_data *hapd)
765  {
766  	int i;
767  
768  	hostapd_broadcast_wep_set(hapd);
769  
770  	if (hapd->conf->ssid.wep.default_len) {
771  		hostapd_set_privacy(hapd, 1);
772  		return 0;
773  	}
774  
775  	/*
776  	 * When IEEE 802.1X is not enabled, the driver may need to know how to
777  	 * set authentication algorithms for static WEP.
778  	 */
779  	hostapd_drv_set_authmode(hapd, hapd->conf->auth_algs);
780  
781  	for (i = 0; i < 4; i++) {
782  		if (hapd->conf->ssid.wep.key[i] &&
783  		    hostapd_drv_set_key(iface, hapd, WPA_ALG_WEP, NULL, i, 0,
784  					i == hapd->conf->ssid.wep.idx, NULL, 0,
785  					hapd->conf->ssid.wep.key[i],
786  					hapd->conf->ssid.wep.len[i],
787  					i == hapd->conf->ssid.wep.idx ?
788  					KEY_FLAG_GROUP_RX_TX_DEFAULT :
789  					KEY_FLAG_GROUP_RX_TX)) {
790  			wpa_printf(MSG_WARNING, "Could not set WEP "
791  				   "encryption.");
792  			return -1;
793  		}
794  		if (hapd->conf->ssid.wep.key[i] &&
795  		    i == hapd->conf->ssid.wep.idx)
796  			hostapd_set_privacy(hapd, 1);
797  	}
798  
799  	return 0;
800  }
801  
802  #endif /* CONFIG_WEP */
803  
804  
hostapd_flush_old_stations(struct hostapd_data * hapd,u16 reason)805  static int hostapd_flush_old_stations(struct hostapd_data *hapd, u16 reason)
806  {
807  	int ret = 0;
808  	u8 addr[ETH_ALEN];
809  
810  	if (hostapd_drv_none(hapd) || hapd->drv_priv == NULL)
811  		return 0;
812  
813  	if (!hapd->iface->driver_ap_teardown) {
814  		wpa_dbg(hapd->msg_ctx, MSG_DEBUG,
815  			"Flushing old station entries");
816  
817  		if (hostapd_flush(hapd)) {
818  			wpa_msg(hapd->msg_ctx, MSG_WARNING,
819  				"Could not connect to kernel driver");
820  			ret = -1;
821  		}
822  	}
823  	if (hapd->conf && hapd->conf->broadcast_deauth) {
824  		wpa_dbg(hapd->msg_ctx, MSG_DEBUG,
825  			"Deauthenticate all stations");
826  		os_memset(addr, 0xff, ETH_ALEN);
827  		hostapd_drv_sta_deauth(hapd, addr, reason);
828  	}
829  	hostapd_free_stas(hapd);
830  
831  	return ret;
832  }
833  
834  
hostapd_bss_deinit_no_free(struct hostapd_data * hapd)835  void hostapd_bss_deinit_no_free(struct hostapd_data *hapd)
836  {
837  	hostapd_free_stas(hapd);
838  	hostapd_flush_old_stations(hapd, WLAN_REASON_DEAUTH_LEAVING);
839  #ifdef CONFIG_WEP
840  	hostapd_clear_wep(hapd);
841  #endif /* CONFIG_WEP */
842  }
843  
844  
845  /**
846   * hostapd_validate_bssid_configuration - Validate BSSID configuration
847   * @iface: Pointer to interface data
848   * Returns: 0 on success, -1 on failure
849   *
850   * This function is used to validate that the configured BSSIDs are valid.
851   */
hostapd_validate_bssid_configuration(struct hostapd_iface * iface)852  static int hostapd_validate_bssid_configuration(struct hostapd_iface *iface)
853  {
854  	u8 mask[ETH_ALEN] = { 0 };
855  	struct hostapd_data *hapd = iface->bss[0];
856  	unsigned int i = iface->conf->num_bss, bits = 0, j;
857  	int auto_addr = 0;
858  
859  	if (hostapd_drv_none(hapd))
860  		return 0;
861  
862  	if (iface->conf->use_driver_iface_addr)
863  		return 0;
864  
865  	/* Generate BSSID mask that is large enough to cover the BSSIDs. */
866  
867  	/* Determine the bits necessary to cover the number of BSSIDs. */
868  	for (i--; i; i >>= 1)
869  		bits++;
870  
871  	/* Determine the bits necessary to any configured BSSIDs,
872  	   if they are higher than the number of BSSIDs. */
873  	for (j = 0; j < iface->conf->num_bss; j++) {
874  		if (is_zero_ether_addr(iface->conf->bss[j]->bssid)) {
875  			if (j)
876  				auto_addr++;
877  			continue;
878  		}
879  
880  		for (i = 0; i < ETH_ALEN; i++) {
881  			mask[i] |=
882  				iface->conf->bss[j]->bssid[i] ^
883  				hapd->own_addr[i];
884  		}
885  	}
886  
887  	if (!auto_addr)
888  		goto skip_mask_ext;
889  
890  	for (i = 0; i < ETH_ALEN && mask[i] == 0; i++)
891  		;
892  	j = 0;
893  	if (i < ETH_ALEN) {
894  		j = (5 - i) * 8;
895  
896  		while (mask[i] != 0) {
897  			mask[i] >>= 1;
898  			j++;
899  		}
900  	}
901  
902  	if (bits < j)
903  		bits = j;
904  
905  	if (bits > 40) {
906  		wpa_printf(MSG_ERROR, "Too many bits in the BSSID mask (%u)",
907  			   bits);
908  		return -1;
909  	}
910  
911  	os_memset(mask, 0xff, ETH_ALEN);
912  	j = bits / 8;
913  	for (i = 5; i > 5 - j; i--)
914  		mask[i] = 0;
915  	j = bits % 8;
916  	while (j) {
917  		j--;
918  		mask[i] <<= 1;
919  	}
920  
921  skip_mask_ext:
922  	wpa_printf(MSG_DEBUG, "BSS count %lu, BSSID mask " MACSTR " (%d bits)",
923  		   (unsigned long) iface->conf->num_bss, MAC2STR(mask), bits);
924  
925  	if (!auto_addr)
926  		return 0;
927  
928  	for (i = 0; i < ETH_ALEN; i++) {
929  		if ((hapd->own_addr[i] & mask[i]) != hapd->own_addr[i]) {
930  			wpa_printf(MSG_ERROR, "Invalid BSSID mask " MACSTR
931  				   " for start address " MACSTR ".",
932  				   MAC2STR(mask), MAC2STR(hapd->own_addr));
933  			wpa_printf(MSG_ERROR, "Start address must be the "
934  				   "first address in the block (i.e., addr "
935  				   "AND mask == addr).");
936  			return -1;
937  		}
938  	}
939  
940  	return 0;
941  }
942  
943  
mac_in_conf(struct hostapd_config * conf,const void * a)944  static int mac_in_conf(struct hostapd_config *conf, const void *a)
945  {
946  	size_t i;
947  
948  	for (i = 0; i < conf->num_bss; i++) {
949  		if (hostapd_mac_comp(conf->bss[i]->bssid, a) == 0) {
950  			return 1;
951  		}
952  	}
953  
954  	return 0;
955  }
956  
957  
958  #ifndef CONFIG_NO_RADIUS
959  
hostapd_das_nas_mismatch(struct hostapd_data * hapd,struct radius_das_attrs * attr)960  static int hostapd_das_nas_mismatch(struct hostapd_data *hapd,
961  				    struct radius_das_attrs *attr)
962  {
963  	if (attr->nas_identifier &&
964  	    (!hapd->conf->nas_identifier ||
965  	     os_strlen(hapd->conf->nas_identifier) !=
966  	     attr->nas_identifier_len ||
967  	     os_memcmp(hapd->conf->nas_identifier, attr->nas_identifier,
968  		       attr->nas_identifier_len) != 0)) {
969  		wpa_printf(MSG_DEBUG, "RADIUS DAS: NAS-Identifier mismatch");
970  		return 1;
971  	}
972  
973  	if (attr->nas_ip_addr &&
974  	    (hapd->conf->own_ip_addr.af != AF_INET ||
975  	     os_memcmp(&hapd->conf->own_ip_addr.u.v4, attr->nas_ip_addr, 4) !=
976  	     0)) {
977  		wpa_printf(MSG_DEBUG, "RADIUS DAS: NAS-IP-Address mismatch");
978  		return 1;
979  	}
980  
981  #ifdef CONFIG_IPV6
982  	if (attr->nas_ipv6_addr &&
983  	    (hapd->conf->own_ip_addr.af != AF_INET6 ||
984  	     os_memcmp(&hapd->conf->own_ip_addr.u.v6, attr->nas_ipv6_addr, 16)
985  	     != 0)) {
986  		wpa_printf(MSG_DEBUG, "RADIUS DAS: NAS-IPv6-Address mismatch");
987  		return 1;
988  	}
989  #endif /* CONFIG_IPV6 */
990  
991  	return 0;
992  }
993  
994  
hostapd_das_find_sta(struct hostapd_data * hapd,struct radius_das_attrs * attr,int * multi)995  static struct sta_info * hostapd_das_find_sta(struct hostapd_data *hapd,
996  					      struct radius_das_attrs *attr,
997  					      int *multi)
998  {
999  	struct sta_info *selected, *sta;
1000  	char buf[128];
1001  	int num_attr = 0;
1002  	int count;
1003  
1004  	*multi = 0;
1005  
1006  	for (sta = hapd->sta_list; sta; sta = sta->next)
1007  		sta->radius_das_match = 1;
1008  
1009  	if (attr->sta_addr) {
1010  		num_attr++;
1011  		sta = ap_get_sta(hapd, attr->sta_addr);
1012  		if (!sta) {
1013  			wpa_printf(MSG_DEBUG,
1014  				   "RADIUS DAS: No Calling-Station-Id match");
1015  			return NULL;
1016  		}
1017  
1018  		selected = sta;
1019  		for (sta = hapd->sta_list; sta; sta = sta->next) {
1020  			if (sta != selected)
1021  				sta->radius_das_match = 0;
1022  		}
1023  		wpa_printf(MSG_DEBUG, "RADIUS DAS: Calling-Station-Id match");
1024  	}
1025  
1026  	if (attr->acct_session_id) {
1027  		num_attr++;
1028  		if (attr->acct_session_id_len != 16) {
1029  			wpa_printf(MSG_DEBUG,
1030  				   "RADIUS DAS: Acct-Session-Id cannot match");
1031  			return NULL;
1032  		}
1033  		count = 0;
1034  
1035  		for (sta = hapd->sta_list; sta; sta = sta->next) {
1036  			if (!sta->radius_das_match)
1037  				continue;
1038  			os_snprintf(buf, sizeof(buf), "%016llX",
1039  				    (unsigned long long) sta->acct_session_id);
1040  			if (os_memcmp(attr->acct_session_id, buf, 16) != 0)
1041  				sta->radius_das_match = 0;
1042  			else
1043  				count++;
1044  		}
1045  
1046  		if (count == 0) {
1047  			wpa_printf(MSG_DEBUG,
1048  				   "RADIUS DAS: No matches remaining after Acct-Session-Id check");
1049  			return NULL;
1050  		}
1051  		wpa_printf(MSG_DEBUG, "RADIUS DAS: Acct-Session-Id match");
1052  	}
1053  
1054  	if (attr->acct_multi_session_id) {
1055  		num_attr++;
1056  		if (attr->acct_multi_session_id_len != 16) {
1057  			wpa_printf(MSG_DEBUG,
1058  				   "RADIUS DAS: Acct-Multi-Session-Id cannot match");
1059  			return NULL;
1060  		}
1061  		count = 0;
1062  
1063  		for (sta = hapd->sta_list; sta; sta = sta->next) {
1064  			if (!sta->radius_das_match)
1065  				continue;
1066  			if (!sta->eapol_sm ||
1067  			    !sta->eapol_sm->acct_multi_session_id) {
1068  				sta->radius_das_match = 0;
1069  				continue;
1070  			}
1071  			os_snprintf(buf, sizeof(buf), "%016llX",
1072  				    (unsigned long long)
1073  				    sta->eapol_sm->acct_multi_session_id);
1074  			if (os_memcmp(attr->acct_multi_session_id, buf, 16) !=
1075  			    0)
1076  				sta->radius_das_match = 0;
1077  			else
1078  				count++;
1079  		}
1080  
1081  		if (count == 0) {
1082  			wpa_printf(MSG_DEBUG,
1083  				   "RADIUS DAS: No matches remaining after Acct-Multi-Session-Id check");
1084  			return NULL;
1085  		}
1086  		wpa_printf(MSG_DEBUG,
1087  			   "RADIUS DAS: Acct-Multi-Session-Id match");
1088  	}
1089  
1090  	if (attr->cui) {
1091  		num_attr++;
1092  		count = 0;
1093  
1094  		for (sta = hapd->sta_list; sta; sta = sta->next) {
1095  			struct wpabuf *cui;
1096  
1097  			if (!sta->radius_das_match)
1098  				continue;
1099  			cui = ieee802_1x_get_radius_cui(sta->eapol_sm);
1100  			if (!cui || wpabuf_len(cui) != attr->cui_len ||
1101  			    os_memcmp(wpabuf_head(cui), attr->cui,
1102  				      attr->cui_len) != 0)
1103  				sta->radius_das_match = 0;
1104  			else
1105  				count++;
1106  		}
1107  
1108  		if (count == 0) {
1109  			wpa_printf(MSG_DEBUG,
1110  				   "RADIUS DAS: No matches remaining after Chargeable-User-Identity check");
1111  			return NULL;
1112  		}
1113  		wpa_printf(MSG_DEBUG,
1114  			   "RADIUS DAS: Chargeable-User-Identity match");
1115  	}
1116  
1117  	if (attr->user_name) {
1118  		num_attr++;
1119  		count = 0;
1120  
1121  		for (sta = hapd->sta_list; sta; sta = sta->next) {
1122  			u8 *identity;
1123  			size_t identity_len;
1124  
1125  			if (!sta->radius_das_match)
1126  				continue;
1127  			identity = ieee802_1x_get_identity(sta->eapol_sm,
1128  							   &identity_len);
1129  			if (!identity ||
1130  			    identity_len != attr->user_name_len ||
1131  			    os_memcmp(identity, attr->user_name, identity_len)
1132  			    != 0)
1133  				sta->radius_das_match = 0;
1134  			else
1135  				count++;
1136  		}
1137  
1138  		if (count == 0) {
1139  			wpa_printf(MSG_DEBUG,
1140  				   "RADIUS DAS: No matches remaining after User-Name check");
1141  			return NULL;
1142  		}
1143  		wpa_printf(MSG_DEBUG,
1144  			   "RADIUS DAS: User-Name match");
1145  	}
1146  
1147  	if (num_attr == 0) {
1148  		/*
1149  		 * In theory, we could match all current associations, but it
1150  		 * seems safer to just reject requests that do not include any
1151  		 * session identification attributes.
1152  		 */
1153  		wpa_printf(MSG_DEBUG,
1154  			   "RADIUS DAS: No session identification attributes included");
1155  		return NULL;
1156  	}
1157  
1158  	selected = NULL;
1159  	for (sta = hapd->sta_list; sta; sta = sta->next) {
1160  		if (sta->radius_das_match) {
1161  			if (selected) {
1162  				*multi = 1;
1163  				return NULL;
1164  			}
1165  			selected = sta;
1166  		}
1167  	}
1168  
1169  	return selected;
1170  }
1171  
1172  
hostapd_das_disconnect_pmksa(struct hostapd_data * hapd,struct radius_das_attrs * attr)1173  static int hostapd_das_disconnect_pmksa(struct hostapd_data *hapd,
1174  					struct radius_das_attrs *attr)
1175  {
1176  	if (!hapd->wpa_auth)
1177  		return -1;
1178  	return wpa_auth_radius_das_disconnect_pmksa(hapd->wpa_auth, attr);
1179  }
1180  
1181  
1182  static enum radius_das_res
hostapd_das_disconnect(void * ctx,struct radius_das_attrs * attr)1183  hostapd_das_disconnect(void *ctx, struct radius_das_attrs *attr)
1184  {
1185  	struct hostapd_data *hapd = ctx;
1186  	struct sta_info *sta;
1187  	int multi;
1188  
1189  	if (hostapd_das_nas_mismatch(hapd, attr))
1190  		return RADIUS_DAS_NAS_MISMATCH;
1191  
1192  	sta = hostapd_das_find_sta(hapd, attr, &multi);
1193  	if (sta == NULL) {
1194  		if (multi) {
1195  			wpa_printf(MSG_DEBUG,
1196  				   "RADIUS DAS: Multiple sessions match - not supported");
1197  			return RADIUS_DAS_MULTI_SESSION_MATCH;
1198  		}
1199  		if (hostapd_das_disconnect_pmksa(hapd, attr) == 0) {
1200  			wpa_printf(MSG_DEBUG,
1201  				   "RADIUS DAS: PMKSA cache entry matched");
1202  			return RADIUS_DAS_SUCCESS;
1203  		}
1204  		wpa_printf(MSG_DEBUG, "RADIUS DAS: No matching session found");
1205  		return RADIUS_DAS_SESSION_NOT_FOUND;
1206  	}
1207  
1208  	wpa_printf(MSG_DEBUG, "RADIUS DAS: Found a matching session " MACSTR
1209  		   " - disconnecting", MAC2STR(sta->addr));
1210  	wpa_auth_pmksa_remove(hapd->wpa_auth, sta->addr);
1211  
1212  	hostapd_drv_sta_deauth(hapd, sta->addr,
1213  			       WLAN_REASON_PREV_AUTH_NOT_VALID);
1214  	ap_sta_deauthenticate(hapd, sta, WLAN_REASON_PREV_AUTH_NOT_VALID);
1215  
1216  	return RADIUS_DAS_SUCCESS;
1217  }
1218  
1219  
1220  #ifdef CONFIG_HS20
1221  static enum radius_das_res
hostapd_das_coa(void * ctx,struct radius_das_attrs * attr)1222  hostapd_das_coa(void *ctx, struct radius_das_attrs *attr)
1223  {
1224  	struct hostapd_data *hapd = ctx;
1225  	struct sta_info *sta;
1226  	int multi;
1227  
1228  	if (hostapd_das_nas_mismatch(hapd, attr))
1229  		return RADIUS_DAS_NAS_MISMATCH;
1230  
1231  	sta = hostapd_das_find_sta(hapd, attr, &multi);
1232  	if (!sta) {
1233  		if (multi) {
1234  			wpa_printf(MSG_DEBUG,
1235  				   "RADIUS DAS: Multiple sessions match - not supported");
1236  			return RADIUS_DAS_MULTI_SESSION_MATCH;
1237  		}
1238  		wpa_printf(MSG_DEBUG, "RADIUS DAS: No matching session found");
1239  		return RADIUS_DAS_SESSION_NOT_FOUND;
1240  	}
1241  
1242  	wpa_printf(MSG_DEBUG, "RADIUS DAS: Found a matching session " MACSTR
1243  		   " - CoA", MAC2STR(sta->addr));
1244  
1245  	if (attr->hs20_t_c_filtering) {
1246  		if (attr->hs20_t_c_filtering[0] & BIT(0)) {
1247  			wpa_printf(MSG_DEBUG,
1248  				   "HS 2.0: Unexpected Terms and Conditions filtering required in CoA-Request");
1249  			return RADIUS_DAS_COA_FAILED;
1250  		}
1251  
1252  		hs20_t_c_filtering(hapd, sta, 0);
1253  	}
1254  
1255  	return RADIUS_DAS_SUCCESS;
1256  }
1257  #else /* CONFIG_HS20 */
1258  #define hostapd_das_coa NULL
1259  #endif /* CONFIG_HS20 */
1260  
1261  
1262  #ifdef CONFIG_SQLITE
1263  
db_table_exists(sqlite3 * db,const char * name)1264  static int db_table_exists(sqlite3 *db, const char *name)
1265  {
1266  	char cmd[128];
1267  
1268  	os_snprintf(cmd, sizeof(cmd), "SELECT 1 FROM %s;", name);
1269  	return sqlite3_exec(db, cmd, NULL, NULL, NULL) == SQLITE_OK;
1270  }
1271  
1272  
db_table_create_radius_attributes(sqlite3 * db)1273  static int db_table_create_radius_attributes(sqlite3 *db)
1274  {
1275  	char *err = NULL;
1276  	const char *sql =
1277  		"CREATE TABLE radius_attributes("
1278  		" id INTEGER PRIMARY KEY,"
1279  		" sta TEXT,"
1280  		" reqtype TEXT,"
1281  		" attr TEXT"
1282  		");"
1283  		"CREATE INDEX idx_sta_reqtype ON radius_attributes(sta,reqtype);";
1284  
1285  	wpa_printf(MSG_DEBUG,
1286  		   "Adding database table for RADIUS attribute information");
1287  	if (sqlite3_exec(db, sql, NULL, NULL, &err) != SQLITE_OK) {
1288  		wpa_printf(MSG_ERROR, "SQLite error: %s", err);
1289  		sqlite3_free(err);
1290  		return -1;
1291  	}
1292  
1293  	return 0;
1294  }
1295  
1296  #endif /* CONFIG_SQLITE */
1297  
1298  #endif /* CONFIG_NO_RADIUS */
1299  
1300  
hostapd_start_beacon(struct hostapd_data * hapd,bool flush_old_stations)1301  static int hostapd_start_beacon(struct hostapd_data *hapd,
1302  				bool flush_old_stations)
1303  {
1304  	struct hostapd_bss_config *conf = hapd->conf;
1305  
1306  	if (!conf->start_disabled && ieee802_11_set_beacon(hapd) < 0)
1307  		return -1;
1308  
1309  	if (flush_old_stations && !conf->start_disabled &&
1310  	    conf->broadcast_deauth) {
1311  		u8 addr[ETH_ALEN];
1312  
1313  		/* Should any previously associated STA not have noticed that
1314  		 * the AP had stopped and restarted, send one more
1315  		 * deauthentication notification now that the AP is ready to
1316  		 * operate. */
1317  		wpa_dbg(hapd->msg_ctx, MSG_DEBUG,
1318  			"Deauthenticate all stations at BSS start");
1319  		os_memset(addr, 0xff, ETH_ALEN);
1320  		hostapd_drv_sta_deauth(hapd, addr,
1321  				       WLAN_REASON_PREV_AUTH_NOT_VALID);
1322  	}
1323  
1324  	if (hapd->driver && hapd->driver->set_operstate)
1325  		hapd->driver->set_operstate(hapd->drv_priv, 1);
1326  
1327  	return 0;
1328  }
1329  
1330  
1331  #ifndef CONFIG_NO_RADIUS
hostapd_bss_radius_init(struct hostapd_data * hapd)1332  static int hostapd_bss_radius_init(struct hostapd_data *hapd)
1333  {
1334  	struct hostapd_bss_config *conf;
1335  
1336  	if (!hapd)
1337  		return -1;
1338  
1339  	conf = hapd->conf;
1340  
1341  	if (hapd->radius) {
1342  		wpa_printf(MSG_DEBUG,
1343  			   "Skipping RADIUS client init (already done)");
1344  		return 0;
1345  	}
1346  
1347  	hapd->radius = radius_client_init(hapd, conf->radius);
1348  	if (!hapd->radius) {
1349  		wpa_printf(MSG_ERROR,
1350  			   "RADIUS client initialization failed.");
1351  		return -1;
1352  	}
1353  
1354  	if (conf->radius_das_port) {
1355  		struct radius_das_conf das_conf;
1356  
1357  		os_memset(&das_conf, 0, sizeof(das_conf));
1358  		das_conf.port = conf->radius_das_port;
1359  		das_conf.shared_secret = conf->radius_das_shared_secret;
1360  		das_conf.shared_secret_len =
1361  			conf->radius_das_shared_secret_len;
1362  		das_conf.client_addr = &conf->radius_das_client_addr;
1363  		das_conf.time_window = conf->radius_das_time_window;
1364  		das_conf.require_event_timestamp =
1365  			conf->radius_das_require_event_timestamp;
1366  		das_conf.require_message_authenticator =
1367  			conf->radius_das_require_message_authenticator;
1368  		das_conf.ctx = hapd;
1369  		das_conf.disconnect = hostapd_das_disconnect;
1370  		das_conf.coa = hostapd_das_coa;
1371  		hapd->radius_das = radius_das_init(&das_conf);
1372  		if (!hapd->radius_das) {
1373  			wpa_printf(MSG_ERROR,
1374  				   "RADIUS DAS initialization failed.");
1375  			return -1;
1376  		}
1377  	}
1378  
1379  	return 0;
1380  }
1381  #endif /* CONFIG_NO_RADIUS */
1382  
1383  
1384  /**
1385   * hostapd_setup_bss - Per-BSS setup (initialization)
1386   * @hapd: Pointer to BSS data
1387   * @first: Whether this BSS is the first BSS of an interface; -1 = not first,
1388   *	but interface may exist
1389   * @start_beacon: Whether Beacon frame template should be configured and
1390   *	transmission of Beaconf rames started at this time. This is used when
1391   *	MBSSID element is enabled where the information regarding all BSSes
1392   *	should be retrieved before configuring the Beacon frame template. The
1393   *	calling functions are responsible for configuring the Beacon frame
1394   *	explicitly if this is set to false.
1395   *
1396   * This function is used to initialize all per-BSS data structures and
1397   * resources. This gets called in a loop for each BSS when an interface is
1398   * initialized. Most of the modules that are initialized here will be
1399   * deinitialized in hostapd_cleanup().
1400   */
hostapd_setup_bss(struct hostapd_data * hapd,int first,bool start_beacon)1401  static int hostapd_setup_bss(struct hostapd_data *hapd, int first,
1402  			     bool start_beacon)
1403  {
1404  	struct hostapd_bss_config *conf = hapd->conf;
1405  	u8 ssid[SSID_MAX_LEN + 1];
1406  	int ssid_len, set_ssid;
1407  	char force_ifname[IFNAMSIZ];
1408  	u8 if_addr[ETH_ALEN];
1409  	int flush_old_stations = 1;
1410  
1411  	if (!hostapd_mld_is_first_bss(hapd))
1412  		wpa_printf(MSG_DEBUG,
1413  			   "MLD: %s: Setting non-first BSS", __func__);
1414  
1415  	wpa_printf(MSG_DEBUG, "%s(hapd=%p (%s), first=%d)",
1416  		   __func__, hapd, conf->iface, first);
1417  
1418  #ifdef EAP_SERVER_TNC
1419  	if (conf->tnc && tncs_global_init() < 0) {
1420  		wpa_printf(MSG_ERROR, "Failed to initialize TNCS");
1421  		return -1;
1422  	}
1423  #endif /* EAP_SERVER_TNC */
1424  
1425  	if (hapd->started) {
1426  		wpa_printf(MSG_ERROR, "%s: Interface %s was already started",
1427  			   __func__, conf->iface);
1428  		return -1;
1429  	}
1430  	hapd->started = 1;
1431  
1432  	if (!first || first == -1) {
1433  		u8 *addr = hapd->own_addr;
1434  
1435  		if (!is_zero_ether_addr(conf->bssid)) {
1436  			/* Allocate the configured BSSID. */
1437  			os_memcpy(hapd->own_addr, conf->bssid, ETH_ALEN);
1438  
1439  			if (hostapd_mac_comp(hapd->own_addr,
1440  					     hapd->iface->bss[0]->own_addr) ==
1441  			    0) {
1442  				wpa_printf(MSG_ERROR, "BSS '%s' may not have "
1443  					   "BSSID set to the MAC address of "
1444  					   "the radio", conf->iface);
1445  				return -1;
1446  			}
1447  		} else if (hapd->iconf->use_driver_iface_addr) {
1448  			addr = NULL;
1449  		} else {
1450  			/* Allocate the next available BSSID. */
1451  			do {
1452  				inc_byte_array(hapd->own_addr, ETH_ALEN);
1453  			} while (mac_in_conf(hapd->iconf, hapd->own_addr));
1454  		}
1455  
1456  #ifdef CONFIG_IEEE80211BE
1457  		if (conf->mld_ap) {
1458  			struct hostapd_data *h_hapd;
1459  
1460  			h_hapd = hostapd_mld_get_first_bss(hapd);
1461  			if (h_hapd) {
1462  				hapd->drv_priv = h_hapd->drv_priv;
1463  				hapd->interface_added = h_hapd->interface_added;
1464  				wpa_printf(MSG_DEBUG,
1465  					   "Setup of non first link (%d) BSS of MLD %s",
1466  					   hapd->mld_link_id, hapd->conf->iface);
1467  				goto setup_mld;
1468  			}
1469  		}
1470  #endif /* CONFIG_IEEE80211BE */
1471  
1472  		hapd->interface_added = 1;
1473  		if (hostapd_if_add(hapd->iface->bss[0], WPA_IF_AP_BSS,
1474  				   conf->iface, addr, hapd,
1475  				   &hapd->drv_priv, force_ifname, if_addr,
1476  				   conf->bridge[0] ? conf->bridge : NULL,
1477  				   first == -1)) {
1478  			wpa_printf(MSG_ERROR, "Failed to add BSS (BSSID="
1479  				   MACSTR ")", MAC2STR(hapd->own_addr));
1480  			hapd->interface_added = 0;
1481  			return -1;
1482  		}
1483  
1484  		if (!addr)
1485  			os_memcpy(hapd->own_addr, if_addr, ETH_ALEN);
1486  
1487  #ifdef CONFIG_IEEE80211BE
1488  		if (hapd->conf->mld_ap) {
1489  			wpa_printf(MSG_DEBUG,
1490  				   "Setup of first link (%d) BSS of MLD %s",
1491  				   hapd->mld_link_id, hapd->conf->iface);
1492  			os_memcpy(hapd->mld->mld_addr, hapd->own_addr,
1493  				  ETH_ALEN);
1494  		}
1495  #endif /* CONFIG_IEEE80211BE */
1496  	}
1497  
1498  #ifdef CONFIG_IEEE80211BE
1499  setup_mld:
1500  	if (hapd->conf->mld_ap && !first) {
1501  		wpa_printf(MSG_DEBUG,
1502  			   "MLD: Set link_id=%u, mld_addr=" MACSTR
1503  			   ", own_addr=" MACSTR,
1504  			   hapd->mld_link_id, MAC2STR(hapd->mld->mld_addr),
1505  			   MAC2STR(hapd->own_addr));
1506  
1507  		if (hostapd_drv_link_add(hapd, hapd->mld_link_id,
1508  					 hapd->own_addr)) {
1509  			wpa_printf(MSG_ERROR,
1510  				   "MLD: Failed to add link %d in MLD %s",
1511  				   hapd->mld_link_id, hapd->conf->iface);
1512  			return -1;
1513  		}
1514  		hostapd_mld_add_link(hapd);
1515  	}
1516  #endif /* CONFIG_IEEE80211BE */
1517  
1518  	if (conf->wmm_enabled < 0)
1519  		conf->wmm_enabled = hapd->iconf->ieee80211n |
1520  			hapd->iconf->ieee80211ax;
1521  
1522  #ifdef CONFIG_IEEE80211R_AP
1523  	if (is_zero_ether_addr(conf->r1_key_holder))
1524  		os_memcpy(conf->r1_key_holder, hapd->own_addr, ETH_ALEN);
1525  #endif /* CONFIG_IEEE80211R_AP */
1526  
1527  #ifdef CONFIG_MESH
1528  	if ((hapd->conf->mesh & MESH_ENABLED) && hapd->iface->mconf == NULL)
1529  		flush_old_stations = 0;
1530  #endif /* CONFIG_MESH */
1531  
1532  	if (flush_old_stations)
1533  		hostapd_flush(hapd);
1534  	hostapd_set_privacy(hapd, 0);
1535  
1536  #ifdef CONFIG_WEP
1537  	if (!hostapd_drv_nl80211(hapd))
1538  		hostapd_broadcast_wep_clear(hapd);
1539  	if (hostapd_setup_encryption(conf->iface, hapd))
1540  		return -1;
1541  #endif /* CONFIG_WEP */
1542  
1543  	/*
1544  	 * Fetch the SSID from the system and use it or,
1545  	 * if one was specified in the config file, verify they
1546  	 * match.
1547  	 */
1548  	ssid_len = hostapd_get_ssid(hapd, ssid, sizeof(ssid));
1549  	if (ssid_len < 0) {
1550  		wpa_printf(MSG_ERROR, "Could not read SSID from system");
1551  		return -1;
1552  	}
1553  	if (conf->ssid.ssid_set) {
1554  		/*
1555  		 * If SSID is specified in the config file and it differs
1556  		 * from what is being used then force installation of the
1557  		 * new SSID.
1558  		 */
1559  		set_ssid = (conf->ssid.ssid_len != (size_t) ssid_len ||
1560  			    os_memcmp(conf->ssid.ssid, ssid, ssid_len) != 0);
1561  	} else {
1562  		/*
1563  		 * No SSID in the config file; just use the one we got
1564  		 * from the system.
1565  		 */
1566  		set_ssid = 0;
1567  		conf->ssid.ssid_len = ssid_len;
1568  		os_memcpy(conf->ssid.ssid, ssid, conf->ssid.ssid_len);
1569  	}
1570  
1571  	/*
1572  	 * Short SSID calculation is identical to FCS and it is defined in
1573  	 * IEEE P802.11-REVmd/D3.0, 9.4.2.170.3 (Calculating the Short-SSID).
1574  	 */
1575  	conf->ssid.short_ssid = ieee80211_crc32(conf->ssid.ssid,
1576  						conf->ssid.ssid_len);
1577  
1578  	if (!hostapd_drv_none(hapd)) {
1579  		wpa_printf(MSG_DEBUG, "Using interface %s with hwaddr " MACSTR
1580  			   " and ssid \"%s\"",
1581  			   conf->iface, MAC2STR(hapd->own_addr),
1582  			   wpa_ssid_txt(conf->ssid.ssid, conf->ssid.ssid_len));
1583  	}
1584  
1585  	if (hostapd_setup_wpa_psk(conf)) {
1586  		wpa_printf(MSG_ERROR, "WPA-PSK setup failed.");
1587  		return -1;
1588  	}
1589  
1590  	/* Set SSID for the kernel driver (to be used in beacon and probe
1591  	 * response frames) */
1592  	if (set_ssid && hostapd_set_ssid(hapd, conf->ssid.ssid,
1593  					 conf->ssid.ssid_len)) {
1594  		wpa_printf(MSG_ERROR, "Could not set SSID for kernel driver");
1595  		return -1;
1596  	}
1597  
1598  	if (wpa_debug_level <= MSG_MSGDUMP)
1599  		conf->radius->msg_dumps = 1;
1600  #ifndef CONFIG_NO_RADIUS
1601  
1602  #ifdef CONFIG_SQLITE
1603  	if (conf->radius_req_attr_sqlite) {
1604  		if (sqlite3_open(conf->radius_req_attr_sqlite,
1605  				 &hapd->rad_attr_db)) {
1606  			wpa_printf(MSG_ERROR, "Could not open SQLite file '%s'",
1607  				   conf->radius_req_attr_sqlite);
1608  			return -1;
1609  		}
1610  
1611  		wpa_printf(MSG_DEBUG, "Opening RADIUS attribute database: %s",
1612  			   conf->radius_req_attr_sqlite);
1613  		if (!db_table_exists(hapd->rad_attr_db, "radius_attributes") &&
1614  		    db_table_create_radius_attributes(hapd->rad_attr_db) < 0)
1615  			return -1;
1616  	}
1617  #endif /* CONFIG_SQLITE */
1618  
1619  	if (hostapd_mld_is_first_bss(hapd)) {
1620  		if (hostapd_bss_radius_init(hapd))
1621  			return -1;
1622  	} else {
1623  #ifdef CONFIG_IEEE80211BE
1624  		struct hostapd_data *f_bss;
1625  
1626  		f_bss = hostapd_mld_get_first_bss(hapd);
1627  		if (!f_bss)
1628  			return -1;
1629  
1630  		if (!f_bss->radius) {
1631  			wpa_printf(MSG_DEBUG,
1632  				   "MLD: First BSS RADIUS client does not exist. Init on its behalf");
1633  
1634  			if (hostapd_bss_radius_init(f_bss))
1635  				return -1;
1636  		}
1637  
1638  		wpa_printf(MSG_DEBUG,
1639  			   "MLD: Using RADIUS client of the first BSS");
1640  		hapd->radius = f_bss->radius;
1641  		hapd->radius_das = f_bss->radius_das;
1642  #endif /* CONFIG_IEEE80211BE */
1643  	}
1644  #endif /* CONFIG_NO_RADIUS */
1645  
1646  	if (hostapd_acl_init(hapd)) {
1647  		wpa_printf(MSG_ERROR, "ACL initialization failed.");
1648  		return -1;
1649  	}
1650  	if (hostapd_init_wps(hapd, conf))
1651  		return -1;
1652  
1653  #ifdef CONFIG_DPP
1654  	hapd->gas = gas_query_ap_init(hapd, hapd->msg_ctx);
1655  	if (!hapd->gas)
1656  		return -1;
1657  	if (hostapd_dpp_init(hapd))
1658  		return -1;
1659  #endif /* CONFIG_DPP */
1660  
1661  #ifdef CONFIG_NAN_USD
1662  	if (hostapd_nan_usd_init(hapd) < 0)
1663  		return -1;
1664  #endif /* CONFIG_NAN_USD */
1665  
1666  	if (authsrv_init(hapd) < 0)
1667  		return -1;
1668  
1669  	if (ieee802_1x_init(hapd)) {
1670  		wpa_printf(MSG_ERROR, "IEEE 802.1X initialization failed.");
1671  		return -1;
1672  	}
1673  
1674  	if (conf->wpa && hostapd_setup_wpa(hapd))
1675  		return -1;
1676  
1677  	if (accounting_init(hapd)) {
1678  		wpa_printf(MSG_ERROR, "Accounting initialization failed.");
1679  		return -1;
1680  	}
1681  
1682  #ifdef CONFIG_INTERWORKING
1683  	if (gas_serv_init(hapd)) {
1684  		wpa_printf(MSG_ERROR, "GAS server initialization failed");
1685  		return -1;
1686  	}
1687  #endif /* CONFIG_INTERWORKING */
1688  
1689  	if (conf->qos_map_set_len &&
1690  	    hostapd_drv_set_qos_map(hapd, conf->qos_map_set,
1691  				    conf->qos_map_set_len)) {
1692  		wpa_printf(MSG_ERROR, "Failed to initialize QoS Map");
1693  		return -1;
1694  	}
1695  
1696  	if (conf->bss_load_update_period && bss_load_update_init(hapd)) {
1697  		wpa_printf(MSG_ERROR, "BSS Load initialization failed");
1698  		return -1;
1699  	}
1700  
1701  	if (conf->bridge[0]) {
1702  		/* Set explicitly configured bridge parameters that might have
1703  		 * been lost if the interface has been removed out of the
1704  		 * bridge. */
1705  
1706  		/* multicast to unicast on bridge ports */
1707  		if (conf->bridge_multicast_to_unicast)
1708  			hostapd_drv_br_port_set_attr(
1709  				hapd, DRV_BR_PORT_ATTR_MCAST2UCAST, 1);
1710  
1711  		/* hairpin mode */
1712  		if (conf->bridge_hairpin)
1713  			hostapd_drv_br_port_set_attr(
1714  				hapd, DRV_BR_PORT_ATTR_HAIRPIN_MODE, 1);
1715  	}
1716  
1717  	if (conf->proxy_arp) {
1718  		if (x_snoop_init(hapd)) {
1719  			wpa_printf(MSG_ERROR,
1720  				   "Generic snooping infrastructure initialization failed");
1721  			return -1;
1722  		}
1723  
1724  		if (dhcp_snoop_init(hapd)) {
1725  			wpa_printf(MSG_ERROR,
1726  				   "DHCP snooping initialization failed");
1727  			return -1;
1728  		}
1729  
1730  		if (ndisc_snoop_init(hapd)) {
1731  			wpa_printf(MSG_ERROR,
1732  				   "Neighbor Discovery snooping initialization failed");
1733  			return -1;
1734  		}
1735  	}
1736  
1737  	if (!hostapd_drv_none(hapd) && vlan_init(hapd)) {
1738  		wpa_printf(MSG_ERROR, "VLAN initialization failed.");
1739  		return -1;
1740  	}
1741  
1742  	if (start_beacon && hostapd_start_beacon(hapd, flush_old_stations) < 0)
1743  		return -1;
1744  
1745  	if (hapd->wpa_auth && wpa_init_keys(hapd->wpa_auth) < 0)
1746  		return -1;
1747  
1748  	return 0;
1749  }
1750  
1751  
hostapd_tx_queue_params(struct hostapd_iface * iface)1752  static void hostapd_tx_queue_params(struct hostapd_iface *iface)
1753  {
1754  	struct hostapd_data *hapd = iface->bss[0];
1755  	int i;
1756  	struct hostapd_tx_queue_params *p;
1757  
1758  #ifdef CONFIG_MESH
1759  	if ((hapd->conf->mesh & MESH_ENABLED) && iface->mconf == NULL)
1760  		return;
1761  #endif /* CONFIG_MESH */
1762  
1763  	for (i = 0; i < NUM_TX_QUEUES; i++) {
1764  		p = &iface->conf->tx_queue[i];
1765  
1766  		if (hostapd_set_tx_queue_params(hapd, i, p->aifs, p->cwmin,
1767  						p->cwmax, p->burst)) {
1768  			wpa_printf(MSG_DEBUG, "Failed to set TX queue "
1769  				   "parameters for queue %d.", i);
1770  			/* Continue anyway */
1771  		}
1772  	}
1773  }
1774  
1775  
hostapd_set_acl_list(struct hostapd_data * hapd,struct mac_acl_entry * mac_acl,int n_entries,u8 accept_acl)1776  static int hostapd_set_acl_list(struct hostapd_data *hapd,
1777  				struct mac_acl_entry *mac_acl,
1778  				int n_entries, u8 accept_acl)
1779  {
1780  	struct hostapd_acl_params *acl_params;
1781  	int i, err;
1782  
1783  	acl_params = os_zalloc(sizeof(*acl_params) +
1784  			       (n_entries * sizeof(acl_params->mac_acl[0])));
1785  	if (!acl_params)
1786  		return -ENOMEM;
1787  
1788  	for (i = 0; i < n_entries; i++)
1789  		os_memcpy(acl_params->mac_acl[i].addr, mac_acl[i].addr,
1790  			  ETH_ALEN);
1791  
1792  	acl_params->acl_policy = accept_acl;
1793  	acl_params->num_mac_acl = n_entries;
1794  
1795  	err = hostapd_drv_set_acl(hapd, acl_params);
1796  
1797  	os_free(acl_params);
1798  
1799  	return err;
1800  }
1801  
1802  
hostapd_set_acl(struct hostapd_data * hapd)1803  int hostapd_set_acl(struct hostapd_data *hapd)
1804  {
1805  	struct hostapd_bss_config *conf = hapd->conf;
1806  	int err = 0;
1807  	u8 accept_acl;
1808  
1809  	if (hapd->iface->drv_max_acl_mac_addrs == 0)
1810  		return 0;
1811  
1812  	if (conf->macaddr_acl == DENY_UNLESS_ACCEPTED) {
1813  		accept_acl = 1;
1814  		err = hostapd_set_acl_list(hapd, conf->accept_mac,
1815  					   conf->num_accept_mac,
1816  					   accept_acl);
1817  		if (err) {
1818  			wpa_printf(MSG_DEBUG, "Failed to set accept acl");
1819  			return -1;
1820  		}
1821  	} else if (conf->macaddr_acl == ACCEPT_UNLESS_DENIED) {
1822  		accept_acl = 0;
1823  		err = hostapd_set_acl_list(hapd, conf->deny_mac,
1824  					   conf->num_deny_mac,
1825  					   accept_acl);
1826  		if (err) {
1827  			wpa_printf(MSG_DEBUG, "Failed to set deny acl");
1828  			return -1;
1829  		}
1830  	}
1831  	return err;
1832  }
1833  
1834  
hostapd_set_ctrl_sock_iface(struct hostapd_data * hapd)1835  static int hostapd_set_ctrl_sock_iface(struct hostapd_data *hapd)
1836  {
1837  #ifdef CONFIG_IEEE80211BE
1838  	int ret;
1839  
1840  	if (hapd->conf->mld_ap) {
1841  		ret = os_snprintf(hapd->ctrl_sock_iface,
1842  				  sizeof(hapd->ctrl_sock_iface), "%s_%s%d",
1843  				  hapd->conf->iface, WPA_CTRL_IFACE_LINK_NAME,
1844  				  hapd->mld_link_id);
1845  		if (os_snprintf_error(sizeof(hapd->ctrl_sock_iface), ret))
1846  			return -1;
1847  	} else {
1848  		os_strlcpy(hapd->ctrl_sock_iface, hapd->conf->iface,
1849  			   sizeof(hapd->ctrl_sock_iface));
1850  	}
1851  #endif /* CONFIG_IEEE80211BE */
1852  	return 0;
1853  }
1854  
1855  
start_ctrl_iface_bss(struct hostapd_data * hapd)1856  static int start_ctrl_iface_bss(struct hostapd_data *hapd)
1857  {
1858  	if (!hapd->iface->interfaces ||
1859  	    !hapd->iface->interfaces->ctrl_iface_init)
1860  		return 0;
1861  
1862  	if (hostapd_set_ctrl_sock_iface(hapd))
1863  		return -1;
1864  
1865  	if (hapd->iface->interfaces->ctrl_iface_init(hapd)) {
1866  		wpa_printf(MSG_ERROR,
1867  			   "Failed to setup control interface for %s",
1868  			   hapd->conf->iface);
1869  		return -1;
1870  	}
1871  
1872  	return 0;
1873  }
1874  
1875  
start_ctrl_iface(struct hostapd_iface * iface)1876  static int start_ctrl_iface(struct hostapd_iface *iface)
1877  {
1878  	size_t i;
1879  
1880  	if (!iface->interfaces || !iface->interfaces->ctrl_iface_init)
1881  		return 0;
1882  
1883  	for (i = 0; i < iface->num_bss; i++) {
1884  		struct hostapd_data *hapd = iface->bss[i];
1885  
1886  		if (hostapd_set_ctrl_sock_iface(hapd))
1887  			return -1;
1888  
1889  		if (iface->interfaces->ctrl_iface_init(hapd)) {
1890  			wpa_printf(MSG_ERROR,
1891  				   "Failed to setup control interface for %s",
1892  				   hapd->conf->iface);
1893  			return -1;
1894  		}
1895  	}
1896  
1897  	return 0;
1898  }
1899  
1900  
1901  /* When NO_IR flag is set and AP is stopped, clean up BSS parameters without
1902   * deinitializing the driver and the control interfaces. A subsequent
1903   * REG_CHANGE event can bring the AP back up.
1904   */
hostapd_no_ir_cleanup(struct hostapd_data * bss)1905  static void hostapd_no_ir_cleanup(struct hostapd_data *bss)
1906  {
1907  	hostapd_bss_deinit_no_free(bss);
1908  	hostapd_bss_link_deinit(bss);
1909  	hostapd_free_hapd_data(bss);
1910  	hostapd_cleanup_iface_partial(bss->iface);
1911  }
1912  
1913  
hostapd_no_ir_channel_list_updated(struct hostapd_iface * iface,void * ctx)1914  static int hostapd_no_ir_channel_list_updated(struct hostapd_iface *iface,
1915  					      void *ctx)
1916  {
1917  	struct hostapd_data *hapd = iface->bss[0];
1918  	bool all_no_ir, is_6ghz;
1919  	int i, j;
1920  	struct hostapd_hw_modes *mode = NULL;
1921  	struct hostapd_hw_modes *hw_features;
1922  	u16 num_hw_features, flags;
1923  	u8 dfs_domain;
1924  
1925  	if (hostapd_drv_none(hapd))
1926  		return -1;
1927  
1928  	hw_features = hostapd_get_hw_feature_data(hapd, &num_hw_features,
1929  						  &flags, &dfs_domain);
1930  	if (!hw_features) {
1931  		wpa_printf(MSG_DEBUG,
1932  			   "Could not fetching hardware channel list");
1933  		return -1;
1934  	}
1935  
1936  	all_no_ir = true;
1937  	is_6ghz = false;
1938  
1939  	for (i = 0; i < num_hw_features; i++) {
1940  		mode = &hw_features[i];
1941  
1942  		if (mode->mode == iface->conf->hw_mode) {
1943  			if (iface->freq > 0 &&
1944  			    !hw_mode_get_channel(mode, iface->freq, NULL)) {
1945  				mode = NULL;
1946  				continue;
1947  			}
1948  
1949  			for (j = 0; j < mode->num_channels; j++) {
1950  				if (!(mode->channels[j].flag &
1951  				      HOSTAPD_CHAN_NO_IR))
1952  					all_no_ir = false;
1953  
1954  				if (is_6ghz_freq(mode->channels[j].freq))
1955  					is_6ghz = true;
1956  			}
1957  			break;
1958  		}
1959  	}
1960  
1961  	if (!mode || !is_6ghz)
1962  		goto free_hw_features;
1963  
1964  	if (iface->state == HAPD_IFACE_ENABLED) {
1965  		if (!all_no_ir) {
1966  			struct hostapd_channel_data *chan;
1967  
1968  			chan = hw_get_channel_freq(mode->mode,
1969  						   iface->freq, NULL,
1970  						   hw_features,
1971  						   num_hw_features);
1972  
1973  			if (!chan) {
1974  				wpa_printf(MSG_ERROR,
1975  					   "NO_IR: Could not derive chan from freq");
1976  				goto free_hw_features;
1977  			}
1978  
1979  			if (!(chan->flag & HOSTAPD_CHAN_NO_IR))
1980  				goto free_hw_features;
1981  			wpa_printf(MSG_DEBUG,
1982  				   "NO_IR: The current channel has NO_IR flag now, stop AP.");
1983  		} else {
1984  			wpa_printf(MSG_DEBUG,
1985  				   "NO_IR: All chan in new chanlist are NO_IR, stop AP.");
1986  		}
1987  
1988  		hostapd_set_state(iface, HAPD_IFACE_NO_IR);
1989  		iface->is_no_ir = true;
1990  		hostapd_drv_stop_ap(iface->bss[0]);
1991  		hostapd_no_ir_cleanup(iface->bss[0]);
1992  		wpa_msg(iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_NO_IR);
1993  	} else if (iface->state == HAPD_IFACE_NO_IR) {
1994  		if (all_no_ir) {
1995  			wpa_printf(MSG_DEBUG,
1996  				   "NO_IR: AP in NO_IR and all chan in the new chanlist are NO_IR. Ignore");
1997  			goto free_hw_features;
1998  		}
1999  
2000  		if (!iface->conf->acs) {
2001  			struct hostapd_channel_data *chan;
2002  
2003  			chan = hw_get_channel_freq(mode->mode,
2004  						   iface->freq, NULL,
2005  						   hw_features,
2006  						   num_hw_features);
2007  			if (!chan) {
2008  				wpa_printf(MSG_ERROR,
2009  					   "NO_IR: Could not derive chan from freq");
2010  				goto free_hw_features;
2011  			}
2012  
2013  			/* If the last operating channel is NO_IR, trigger ACS.
2014  			 */
2015  			if (chan->flag & HOSTAPD_CHAN_NO_IR) {
2016  				iface->freq = 0;
2017  				iface->conf->channel = 0;
2018  				if (acs_init(iface) != HOSTAPD_CHAN_ACS)
2019  					wpa_printf(MSG_ERROR,
2020  						   "NO_IR: Could not start ACS");
2021  				goto free_hw_features;
2022  			}
2023  		}
2024  
2025  		setup_interface2(iface);
2026  	}
2027  
2028  free_hw_features:
2029  	hostapd_free_hw_features(hw_features, num_hw_features);
2030  	return 0;
2031  }
2032  
2033  
channel_list_update_timeout(void * eloop_ctx,void * timeout_ctx)2034  static void channel_list_update_timeout(void *eloop_ctx, void *timeout_ctx)
2035  {
2036  	struct hostapd_iface *iface = eloop_ctx;
2037  
2038  	if (!iface->wait_channel_update) {
2039  		wpa_printf(MSG_INFO, "Channel list update timeout, but interface was not waiting for it");
2040  		return;
2041  	}
2042  
2043  	/*
2044  	 * It is possible that the existing channel list is acceptable, so try
2045  	 * to proceed.
2046  	 */
2047  	wpa_printf(MSG_DEBUG, "Channel list update timeout - try to continue anyway");
2048  	setup_interface2(iface);
2049  }
2050  
2051  
hostapd_channel_list_updated(struct hostapd_iface * iface,int initiator)2052  void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator)
2053  {
2054  	if (initiator == REGDOM_SET_BY_DRIVER) {
2055  		hostapd_for_each_interface(iface->interfaces,
2056  					   hostapd_no_ir_channel_list_updated,
2057  					   NULL);
2058  		return;
2059  	}
2060  
2061  	if (!iface->wait_channel_update || initiator != REGDOM_SET_BY_USER)
2062  		return;
2063  
2064  	wpa_printf(MSG_DEBUG, "Channel list updated - continue setup");
2065  	eloop_cancel_timeout(channel_list_update_timeout, iface, NULL);
2066  	setup_interface2(iface);
2067  }
2068  
2069  
setup_interface(struct hostapd_iface * iface)2070  static int setup_interface(struct hostapd_iface *iface)
2071  {
2072  	struct hostapd_data *hapd = iface->bss[0];
2073  	size_t i;
2074  
2075  	/*
2076  	 * It is possible that setup_interface() is called after the interface
2077  	 * was disabled etc., in which case driver_ap_teardown is possibly set
2078  	 * to 1. Clear it here so any other key/station deletion, which is not
2079  	 * part of a teardown flow, would also call the relevant driver
2080  	 * callbacks.
2081  	 */
2082  	iface->driver_ap_teardown = 0;
2083  
2084  	if (!iface->phy[0]) {
2085  		const char *phy = hostapd_drv_get_radio_name(hapd);
2086  		if (phy) {
2087  			wpa_printf(MSG_DEBUG, "phy: %s", phy);
2088  			os_strlcpy(iface->phy, phy, sizeof(iface->phy));
2089  		}
2090  	}
2091  
2092  	/*
2093  	 * Make sure that all BSSes get configured with a pointer to the same
2094  	 * driver interface.
2095  	 */
2096  	for (i = 1; i < iface->num_bss; i++) {
2097  		iface->bss[i]->driver = hapd->driver;
2098  		iface->bss[i]->drv_priv = hapd->drv_priv;
2099  	}
2100  
2101  	if (hostapd_validate_bssid_configuration(iface))
2102  		return -1;
2103  
2104  	/*
2105  	 * Initialize control interfaces early to allow external monitoring of
2106  	 * channel setup operations that may take considerable amount of time
2107  	 * especially for DFS cases.
2108  	 */
2109  	if (start_ctrl_iface(iface))
2110  		return -1;
2111  
2112  	if (hapd->iconf->country[0] && hapd->iconf->country[1]) {
2113  		char country[4], previous_country[4];
2114  
2115  		hostapd_set_state(iface, HAPD_IFACE_COUNTRY_UPDATE);
2116  		if (hostapd_get_country(hapd, previous_country) < 0)
2117  			previous_country[0] = '\0';
2118  
2119  		os_memcpy(country, hapd->iconf->country, 3);
2120  		country[3] = '\0';
2121  		if (hostapd_set_country(hapd, country) < 0) {
2122  			wpa_printf(MSG_ERROR, "Failed to set country code");
2123  			return -1;
2124  		}
2125  
2126  		wpa_printf(MSG_DEBUG, "Previous country code %s, new country code %s",
2127  			   previous_country, country);
2128  
2129  		if (os_strncmp(previous_country, country, 2) != 0) {
2130  			wpa_printf(MSG_DEBUG, "Continue interface setup after channel list update");
2131  			iface->wait_channel_update = 1;
2132  			eloop_register_timeout(5, 0,
2133  					       channel_list_update_timeout,
2134  					       iface, NULL);
2135  			return 0;
2136  		}
2137  	}
2138  
2139  	return setup_interface2(iface);
2140  }
2141  
2142  
configured_fixed_chan_to_freq(struct hostapd_iface * iface)2143  static int configured_fixed_chan_to_freq(struct hostapd_iface *iface)
2144  {
2145  	int freq, i, j;
2146  
2147  	if (!iface->conf->channel)
2148  		return 0;
2149  	if (iface->conf->op_class) {
2150  		freq = ieee80211_chan_to_freq(NULL, iface->conf->op_class,
2151  					      iface->conf->channel);
2152  		if (freq < 0) {
2153  			wpa_printf(MSG_INFO,
2154  				   "Could not convert op_class %u channel %u to operating frequency",
2155  				   iface->conf->op_class, iface->conf->channel);
2156  			return -1;
2157  		}
2158  		iface->freq = freq;
2159  		return 0;
2160  	}
2161  
2162  	/* Old configurations using only 2.4/5/60 GHz bands may not specify the
2163  	 * op_class parameter. Select a matching channel from the configured
2164  	 * mode using the channel parameter for these cases.
2165  	 */
2166  	for (j = 0; j < iface->num_hw_features; j++) {
2167  		struct hostapd_hw_modes *mode = &iface->hw_features[j];
2168  
2169  		if (iface->conf->hw_mode != HOSTAPD_MODE_IEEE80211ANY &&
2170  		    iface->conf->hw_mode != mode->mode)
2171  			continue;
2172  		for (i = 0; i < mode->num_channels; i++) {
2173  			struct hostapd_channel_data *chan = &mode->channels[i];
2174  
2175  			if (chan->chan == iface->conf->channel &&
2176  			    !is_6ghz_freq(chan->freq)) {
2177  				iface->freq = chan->freq;
2178  				return 0;
2179  			}
2180  		}
2181  	}
2182  
2183  	wpa_printf(MSG_INFO, "Could not determine operating frequency");
2184  	return -1;
2185  }
2186  
2187  
hostapd_set_6ghz_sec_chan(struct hostapd_iface * iface)2188  static void hostapd_set_6ghz_sec_chan(struct hostapd_iface *iface)
2189  {
2190  	int bw;
2191  
2192  	if (!is_6ghz_op_class(iface->conf->op_class))
2193  		return;
2194  
2195  	bw = op_class_to_bandwidth(iface->conf->op_class);
2196  	/* Assign the secondary channel if absent in config for
2197  	 * bandwidths > 20 MHz */
2198  	if (bw >= 40 && !iface->conf->secondary_channel) {
2199  		if (((iface->conf->channel - 1) / 4) % 2)
2200  			iface->conf->secondary_channel = -1;
2201  		else
2202  			iface->conf->secondary_channel = 1;
2203  	}
2204  }
2205  
2206  
setup_interface2(struct hostapd_iface * iface)2207  static int setup_interface2(struct hostapd_iface *iface)
2208  {
2209  	iface->wait_channel_update = 0;
2210  	iface->is_no_ir = false;
2211  
2212  	if (hostapd_get_hw_features(iface)) {
2213  		/* Not all drivers support this yet, so continue without hw
2214  		 * feature data. */
2215  	} else {
2216  		int ret;
2217  
2218  		if (iface->conf->acs && !iface->is_ch_switch_dfs) {
2219  			iface->freq = 0;
2220  			iface->conf->channel = 0;
2221  		}
2222  		iface->is_ch_switch_dfs = false;
2223  
2224  		ret = configured_fixed_chan_to_freq(iface);
2225  		if (ret < 0)
2226  			goto fail;
2227  
2228  		if (iface->conf->op_class) {
2229  			enum oper_chan_width ch_width;
2230  
2231  			ch_width = op_class_to_ch_width(iface->conf->op_class);
2232  			hostapd_set_oper_chwidth(iface->conf, ch_width);
2233  			hostapd_set_6ghz_sec_chan(iface);
2234  		}
2235  
2236  		ret = hostapd_select_hw_mode(iface);
2237  		if (ret < 0) {
2238  			wpa_printf(MSG_ERROR, "Could not select hw_mode and "
2239  				   "channel. (%d)", ret);
2240  			goto fail;
2241  		}
2242  		if (ret == 1) {
2243  			wpa_printf(MSG_DEBUG, "Interface initialization will be completed in a callback (ACS)");
2244  			return 0;
2245  		}
2246  		ret = hostapd_check_edmg_capab(iface);
2247  		if (ret < 0)
2248  			goto fail;
2249  		ret = hostapd_check_he_6ghz_capab(iface);
2250  		if (ret < 0)
2251  			goto fail;
2252  		ret = hostapd_check_ht_capab(iface);
2253  		if (ret < 0)
2254  			goto fail;
2255  		if (ret == 1) {
2256  			wpa_printf(MSG_DEBUG, "Interface initialization will "
2257  				   "be completed in a callback");
2258  			return 0;
2259  		}
2260  
2261  		if (iface->conf->ieee80211h)
2262  			wpa_printf(MSG_DEBUG, "DFS support is enabled");
2263  	}
2264  	return hostapd_setup_interface_complete(iface, 0);
2265  
2266  fail:
2267  	if (iface->is_no_ir) {
2268  		/* If AP is in NO_IR state, it can be reenabled by the driver
2269  		 * regulatory update and EVENT_CHANNEL_LIST_CHANGED. */
2270  		hostapd_set_state(iface, HAPD_IFACE_NO_IR);
2271  		wpa_msg(iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_NO_IR);
2272  		return 0;
2273  	}
2274  
2275  	hostapd_set_state(iface, HAPD_IFACE_DISABLED);
2276  	wpa_msg(iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_DISABLED);
2277  	if (iface->interfaces && iface->interfaces->terminate_on_error)
2278  		eloop_terminate();
2279  	return -1;
2280  }
2281  
2282  
2283  #ifdef CONFIG_FST
2284  
fst_hostapd_get_bssid_cb(void * ctx)2285  static const u8 * fst_hostapd_get_bssid_cb(void *ctx)
2286  {
2287  	struct hostapd_data *hapd = ctx;
2288  
2289  	return hapd->own_addr;
2290  }
2291  
2292  
fst_hostapd_get_channel_info_cb(void * ctx,enum hostapd_hw_mode * hw_mode,u8 * channel)2293  static void fst_hostapd_get_channel_info_cb(void *ctx,
2294  					    enum hostapd_hw_mode *hw_mode,
2295  					    u8 *channel)
2296  {
2297  	struct hostapd_data *hapd = ctx;
2298  
2299  	*hw_mode = ieee80211_freq_to_chan(hapd->iface->freq, channel);
2300  }
2301  
2302  
fst_hostapd_get_hw_modes_cb(void * ctx,struct hostapd_hw_modes ** modes)2303  static int fst_hostapd_get_hw_modes_cb(void *ctx,
2304  				       struct hostapd_hw_modes **modes)
2305  {
2306  	struct hostapd_data *hapd = ctx;
2307  
2308  	*modes = hapd->iface->hw_features;
2309  	return hapd->iface->num_hw_features;
2310  }
2311  
2312  
fst_hostapd_set_ies_cb(void * ctx,const struct wpabuf * fst_ies)2313  static void fst_hostapd_set_ies_cb(void *ctx, const struct wpabuf *fst_ies)
2314  {
2315  	struct hostapd_data *hapd = ctx;
2316  
2317  	if (hapd->iface->fst_ies != fst_ies) {
2318  		hapd->iface->fst_ies = fst_ies;
2319  		if (ieee802_11_set_beacon(hapd))
2320  			wpa_printf(MSG_WARNING, "FST: Cannot set beacon");
2321  	}
2322  }
2323  
2324  
fst_hostapd_send_action_cb(void * ctx,const u8 * da,struct wpabuf * buf)2325  static int fst_hostapd_send_action_cb(void *ctx, const u8 *da,
2326  				      struct wpabuf *buf)
2327  {
2328  	struct hostapd_data *hapd = ctx;
2329  
2330  	return hostapd_drv_send_action(hapd, hapd->iface->freq, 0, da,
2331  				       wpabuf_head(buf), wpabuf_len(buf));
2332  }
2333  
2334  
fst_hostapd_get_mb_ie_cb(void * ctx,const u8 * addr)2335  static const struct wpabuf * fst_hostapd_get_mb_ie_cb(void *ctx, const u8 *addr)
2336  {
2337  	struct hostapd_data *hapd = ctx;
2338  	struct sta_info *sta = ap_get_sta(hapd, addr);
2339  
2340  	return sta ? sta->mb_ies : NULL;
2341  }
2342  
2343  
fst_hostapd_update_mb_ie_cb(void * ctx,const u8 * addr,const u8 * buf,size_t size)2344  static void fst_hostapd_update_mb_ie_cb(void *ctx, const u8 *addr,
2345  					const u8 *buf, size_t size)
2346  {
2347  	struct hostapd_data *hapd = ctx;
2348  	struct sta_info *sta = ap_get_sta(hapd, addr);
2349  
2350  	if (sta) {
2351  		struct mb_ies_info info;
2352  
2353  		if (!mb_ies_info_by_ies(&info, buf, size)) {
2354  			wpabuf_free(sta->mb_ies);
2355  			sta->mb_ies = mb_ies_by_info(&info);
2356  		}
2357  	}
2358  }
2359  
2360  
fst_hostapd_get_sta(struct fst_get_peer_ctx ** get_ctx,bool mb_only)2361  static const u8 * fst_hostapd_get_sta(struct fst_get_peer_ctx **get_ctx,
2362  				      bool mb_only)
2363  {
2364  	struct sta_info *s = (struct sta_info *) *get_ctx;
2365  
2366  	if (mb_only) {
2367  		for (; s && !s->mb_ies; s = s->next)
2368  			;
2369  	}
2370  
2371  	if (s) {
2372  		*get_ctx = (struct fst_get_peer_ctx *) s->next;
2373  
2374  		return s->addr;
2375  	}
2376  
2377  	*get_ctx = NULL;
2378  	return NULL;
2379  }
2380  
2381  
fst_hostapd_get_peer_first(void * ctx,struct fst_get_peer_ctx ** get_ctx,bool mb_only)2382  static const u8 * fst_hostapd_get_peer_first(void *ctx,
2383  					     struct fst_get_peer_ctx **get_ctx,
2384  					     bool mb_only)
2385  {
2386  	struct hostapd_data *hapd = ctx;
2387  
2388  	*get_ctx = (struct fst_get_peer_ctx *) hapd->sta_list;
2389  
2390  	return fst_hostapd_get_sta(get_ctx, mb_only);
2391  }
2392  
2393  
fst_hostapd_get_peer_next(void * ctx,struct fst_get_peer_ctx ** get_ctx,bool mb_only)2394  static const u8 * fst_hostapd_get_peer_next(void *ctx,
2395  					    struct fst_get_peer_ctx **get_ctx,
2396  					    bool mb_only)
2397  {
2398  	return fst_hostapd_get_sta(get_ctx, mb_only);
2399  }
2400  
2401  
fst_hostapd_fill_iface_obj(struct hostapd_data * hapd,struct fst_wpa_obj * iface_obj)2402  void fst_hostapd_fill_iface_obj(struct hostapd_data *hapd,
2403  				struct fst_wpa_obj *iface_obj)
2404  {
2405  	os_memset(iface_obj, 0, sizeof(*iface_obj));
2406  	iface_obj->ctx = hapd;
2407  	iface_obj->get_bssid = fst_hostapd_get_bssid_cb;
2408  	iface_obj->get_channel_info = fst_hostapd_get_channel_info_cb;
2409  	iface_obj->get_hw_modes = fst_hostapd_get_hw_modes_cb;
2410  	iface_obj->set_ies = fst_hostapd_set_ies_cb;
2411  	iface_obj->send_action = fst_hostapd_send_action_cb;
2412  	iface_obj->get_mb_ie = fst_hostapd_get_mb_ie_cb;
2413  	iface_obj->update_mb_ie = fst_hostapd_update_mb_ie_cb;
2414  	iface_obj->get_peer_first = fst_hostapd_get_peer_first;
2415  	iface_obj->get_peer_next = fst_hostapd_get_peer_next;
2416  }
2417  
2418  #endif /* CONFIG_FST */
2419  
2420  #ifdef CONFIG_OWE
2421  
hostapd_owe_iface_iter(struct hostapd_iface * iface,void * ctx)2422  static int hostapd_owe_iface_iter(struct hostapd_iface *iface, void *ctx)
2423  {
2424  	struct hostapd_data *hapd = ctx;
2425  	size_t i;
2426  
2427  	for (i = 0; i < iface->num_bss; i++) {
2428  		struct hostapd_data *bss = iface->bss[i];
2429  
2430  		if (os_strcmp(hapd->conf->owe_transition_ifname,
2431  			      bss->conf->iface) != 0)
2432  			continue;
2433  
2434  		wpa_printf(MSG_DEBUG,
2435  			   "OWE: ifname=%s found transition mode ifname=%s BSSID "
2436  			   MACSTR " SSID %s",
2437  			   hapd->conf->iface, bss->conf->iface,
2438  			   MAC2STR(bss->own_addr),
2439  			   wpa_ssid_txt(bss->conf->ssid.ssid,
2440  					bss->conf->ssid.ssid_len));
2441  		if (!bss->conf->ssid.ssid_set || !bss->conf->ssid.ssid_len ||
2442  		    is_zero_ether_addr(bss->own_addr))
2443  			continue;
2444  
2445  		os_memcpy(hapd->conf->owe_transition_bssid, bss->own_addr,
2446  			  ETH_ALEN);
2447  		os_memcpy(hapd->conf->owe_transition_ssid,
2448  			  bss->conf->ssid.ssid, bss->conf->ssid.ssid_len);
2449  		hapd->conf->owe_transition_ssid_len = bss->conf->ssid.ssid_len;
2450  		wpa_printf(MSG_DEBUG,
2451  			   "OWE: Copied transition mode information");
2452  		return 1;
2453  	}
2454  
2455  	return 0;
2456  }
2457  
2458  
hostapd_owe_trans_get_info(struct hostapd_data * hapd)2459  int hostapd_owe_trans_get_info(struct hostapd_data *hapd)
2460  {
2461  	if (hapd->conf->owe_transition_ssid_len > 0 &&
2462  	    !is_zero_ether_addr(hapd->conf->owe_transition_bssid))
2463  		return 0;
2464  
2465  	/* Find transition mode SSID/BSSID information from a BSS operated by
2466  	 * this hostapd instance. */
2467  	if (!hapd->iface->interfaces ||
2468  	    !hapd->iface->interfaces->for_each_interface)
2469  		return hostapd_owe_iface_iter(hapd->iface, hapd);
2470  	else
2471  		return hapd->iface->interfaces->for_each_interface(
2472  			hapd->iface->interfaces, hostapd_owe_iface_iter, hapd);
2473  }
2474  
2475  
hostapd_owe_iface_iter2(struct hostapd_iface * iface,void * ctx)2476  static int hostapd_owe_iface_iter2(struct hostapd_iface *iface, void *ctx)
2477  {
2478  	size_t i;
2479  
2480  	for (i = 0; i < iface->num_bss; i++) {
2481  		struct hostapd_data *bss = iface->bss[i];
2482  		int res;
2483  
2484  		if (!bss->conf->owe_transition_ifname[0])
2485  			continue;
2486  		if (bss->iface->state != HAPD_IFACE_ENABLED) {
2487  			wpa_printf(MSG_DEBUG,
2488  				   "OWE: Interface %s state %s - defer beacon update",
2489  				   bss->conf->iface,
2490  				   hostapd_state_text(bss->iface->state));
2491  			continue;
2492  		}
2493  		res = hostapd_owe_trans_get_info(bss);
2494  		if (res == 0)
2495  			continue;
2496  		wpa_printf(MSG_DEBUG,
2497  			   "OWE: Matching transition mode interface enabled - update beacon data for %s",
2498  			   bss->conf->iface);
2499  		ieee802_11_set_beacon(bss);
2500  	}
2501  
2502  	return 0;
2503  }
2504  
2505  #endif /* CONFIG_OWE */
2506  
2507  
hostapd_owe_update_trans(struct hostapd_iface * iface)2508  static void hostapd_owe_update_trans(struct hostapd_iface *iface)
2509  {
2510  #ifdef CONFIG_OWE
2511  	/* Check whether the enabled BSS can complete OWE transition mode
2512  	 * configuration for any pending interface. */
2513  	if (!iface->interfaces ||
2514  	    !iface->interfaces->for_each_interface)
2515  		hostapd_owe_iface_iter2(iface, NULL);
2516  	else
2517  		iface->interfaces->for_each_interface(
2518  			iface->interfaces, hostapd_owe_iface_iter2, NULL);
2519  #endif /* CONFIG_OWE */
2520  }
2521  
2522  
hostapd_interface_setup_failure_handler(void * eloop_ctx,void * timeout_ctx)2523  static void hostapd_interface_setup_failure_handler(void *eloop_ctx,
2524  						    void *timeout_ctx)
2525  {
2526  	struct hostapd_iface *iface = eloop_ctx;
2527  	struct hostapd_data *hapd;
2528  
2529  	if (iface->num_bss < 1 || !iface->bss || !iface->bss[0])
2530  		return;
2531  	hapd = iface->bss[0];
2532  	if (hapd->setup_complete_cb)
2533  		hapd->setup_complete_cb(hapd->setup_complete_cb_ctx);
2534  }
2535  
2536  
hostapd_setup_interface_complete_sync(struct hostapd_iface * iface,int err)2537  static int hostapd_setup_interface_complete_sync(struct hostapd_iface *iface,
2538  						 int err)
2539  {
2540  	struct hostapd_data *hapd = iface->bss[0];
2541  	size_t j;
2542  	u8 *prev_addr;
2543  	int delay_apply_cfg = 0;
2544  	int res_dfs_offload = 0;
2545  
2546  	if (err)
2547  		goto fail;
2548  
2549  	wpa_printf(MSG_DEBUG, "Completing interface initialization");
2550  	if (iface->freq) {
2551  #ifdef NEED_AP_MLME
2552  		int res;
2553  #endif /* NEED_AP_MLME */
2554  
2555  		wpa_printf(MSG_DEBUG, "Mode: %s  Channel: %d  "
2556  			   "Frequency: %d MHz",
2557  			   hostapd_hw_mode_txt(iface->conf->hw_mode),
2558  			   iface->conf->channel, iface->freq);
2559  
2560  		if (hostapd_set_current_hw_info(iface, iface->freq)) {
2561  			wpa_printf(MSG_ERROR,
2562  				   "Failed to set current hardware info");
2563  			goto fail;
2564  		}
2565  
2566  #ifdef NEED_AP_MLME
2567  		/* Handle DFS only if it is not offloaded to the driver */
2568  		if (!(iface->drv_flags & WPA_DRIVER_FLAGS_DFS_OFFLOAD)) {
2569  			/* Check DFS */
2570  			res = hostapd_handle_dfs(iface);
2571  			if (res <= 0) {
2572  				if (res < 0)
2573  					goto fail;
2574  				return res;
2575  			}
2576  		} else {
2577  			/* If DFS is offloaded to the driver */
2578  			res_dfs_offload = hostapd_handle_dfs_offload(iface);
2579  			if (res_dfs_offload <= 0) {
2580  				if (res_dfs_offload < 0)
2581  					goto fail;
2582  			} else {
2583  				wpa_printf(MSG_DEBUG,
2584  					   "Proceed with AP/channel setup");
2585  				/*
2586  				 * If this is a DFS channel, move to completing
2587  				 * AP setup.
2588  				 */
2589  				if (res_dfs_offload == 1)
2590  					goto dfs_offload;
2591  				/* Otherwise fall through. */
2592  			}
2593  		}
2594  #endif /* NEED_AP_MLME */
2595  
2596  #ifdef CONFIG_MESH
2597  		if (iface->mconf != NULL) {
2598  			wpa_printf(MSG_DEBUG,
2599  				   "%s: Mesh configuration will be applied while joining the mesh network",
2600  				   iface->bss[0]->conf->iface);
2601  			delay_apply_cfg = 1;
2602  		}
2603  #endif /* CONFIG_MESH */
2604  
2605  		if (!delay_apply_cfg &&
2606  		    hostapd_set_freq(hapd, hapd->iconf->hw_mode, iface->freq,
2607  				     hapd->iconf->channel,
2608  				     hapd->iconf->enable_edmg,
2609  				     hapd->iconf->edmg_channel,
2610  				     hapd->iconf->ieee80211n,
2611  				     hapd->iconf->ieee80211ac,
2612  				     hapd->iconf->ieee80211ax,
2613  				     hapd->iconf->ieee80211be,
2614  				     hapd->iconf->secondary_channel,
2615  				     hostapd_get_oper_chwidth(hapd->iconf),
2616  				     hostapd_get_oper_centr_freq_seg0_idx(
2617  					     hapd->iconf),
2618  				     hostapd_get_oper_centr_freq_seg1_idx(
2619  					     hapd->iconf))) {
2620  			wpa_printf(MSG_ERROR, "Could not set channel for "
2621  				   "kernel driver");
2622  			goto fail;
2623  		}
2624  	}
2625  
2626  	if (iface->current_mode) {
2627  		if (hostapd_prepare_rates(iface, iface->current_mode)) {
2628  			wpa_printf(MSG_ERROR, "Failed to prepare rates "
2629  				   "table.");
2630  			hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
2631  				       HOSTAPD_LEVEL_WARNING,
2632  				       "Failed to prepare rates table.");
2633  			goto fail;
2634  		}
2635  	}
2636  
2637  	if (hapd->iconf->rts_threshold >= -1 &&
2638  	    hostapd_set_rts(hapd, hapd->iconf->rts_threshold) &&
2639  	    hapd->iconf->rts_threshold >= -1) {
2640  		wpa_printf(MSG_ERROR, "Could not set RTS threshold for "
2641  			   "kernel driver");
2642  		goto fail;
2643  	}
2644  
2645  	if (hapd->iconf->fragm_threshold >= -1 &&
2646  	    hostapd_set_frag(hapd, hapd->iconf->fragm_threshold) &&
2647  	    hapd->iconf->fragm_threshold != -1) {
2648  		wpa_printf(MSG_ERROR, "Could not set fragmentation threshold "
2649  			   "for kernel driver");
2650  		goto fail;
2651  	}
2652  
2653  	prev_addr = hapd->own_addr;
2654  
2655  	for (j = 0; j < iface->num_bss; j++) {
2656  		hapd = iface->bss[j];
2657  		if (j)
2658  			os_memcpy(hapd->own_addr, prev_addr, ETH_ALEN);
2659  		if (hostapd_setup_bss(hapd, j == 0, !iface->conf->mbssid)) {
2660  			for (;;) {
2661  				hapd = iface->bss[j];
2662  				hostapd_bss_deinit_no_free(hapd);
2663  				hostapd_free_hapd_data(hapd);
2664  				if (j == 0)
2665  					break;
2666  				j--;
2667  			}
2668  			goto fail;
2669  		}
2670  		if (is_zero_ether_addr(hapd->conf->bssid))
2671  			prev_addr = hapd->own_addr;
2672  	}
2673  
2674  	if (hapd->iconf->mbssid) {
2675  		for (j = 0; hapd->iconf->mbssid && j < iface->num_bss; j++) {
2676  			hapd = iface->bss[j];
2677  			if (hostapd_start_beacon(hapd, true)) {
2678  				for (;;) {
2679  					hapd = iface->bss[j];
2680  					hostapd_bss_deinit_no_free(hapd);
2681  					hostapd_free_hapd_data(hapd);
2682  					if (j == 0)
2683  						break;
2684  					j--;
2685  				}
2686  				goto fail;
2687  			}
2688  		}
2689  	}
2690  
2691  	hapd = iface->bss[0];
2692  
2693  	hostapd_tx_queue_params(iface);
2694  
2695  	ap_list_init(iface);
2696  
2697  	hostapd_set_acl(hapd);
2698  
2699  	if (hostapd_driver_commit(hapd) < 0) {
2700  		wpa_printf(MSG_ERROR, "%s: Failed to commit driver "
2701  			   "configuration", __func__);
2702  		goto fail;
2703  	}
2704  
2705  	/*
2706  	 * WPS UPnP module can be initialized only when the "upnp_iface" is up.
2707  	 * If "interface" and "upnp_iface" are the same (e.g., non-bridge
2708  	 * mode), the interface is up only after driver_commit, so initialize
2709  	 * WPS after driver_commit.
2710  	 */
2711  	for (j = 0; j < iface->num_bss; j++) {
2712  		if (hostapd_init_wps_complete(iface->bss[j]))
2713  			goto fail;
2714  	}
2715  
2716  	if ((iface->drv_flags & WPA_DRIVER_FLAGS_DFS_OFFLOAD) &&
2717  	    !res_dfs_offload) {
2718  		/*
2719  		 * If freq is DFS, and DFS is offloaded to the driver, then wait
2720  		 * for CAC to complete.
2721  		 */
2722  		wpa_printf(MSG_DEBUG, "%s: Wait for CAC to complete", __func__);
2723  		return res_dfs_offload;
2724  	}
2725  
2726  #ifdef NEED_AP_MLME
2727  dfs_offload:
2728  #endif /* NEED_AP_MLME */
2729  
2730  #ifdef CONFIG_FST
2731  	if (hapd->iconf->fst_cfg.group_id[0]) {
2732  		struct fst_wpa_obj iface_obj;
2733  
2734  		fst_hostapd_fill_iface_obj(hapd, &iface_obj);
2735  		iface->fst = fst_attach(hapd->conf->iface, hapd->own_addr,
2736  					&iface_obj, &hapd->iconf->fst_cfg);
2737  		if (!iface->fst) {
2738  			wpa_printf(MSG_ERROR, "Could not attach to FST %s",
2739  				   hapd->iconf->fst_cfg.group_id);
2740  			goto fail;
2741  		}
2742  	}
2743  #endif /* CONFIG_FST */
2744  
2745  	hostapd_set_state(iface, HAPD_IFACE_ENABLED);
2746  	hostapd_owe_update_trans(iface);
2747  	airtime_policy_update_init(iface);
2748  	wpa_msg(iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_ENABLED);
2749  	if (hapd->setup_complete_cb)
2750  		hapd->setup_complete_cb(hapd->setup_complete_cb_ctx);
2751  
2752  #ifdef CONFIG_MESH
2753  	if (delay_apply_cfg && !iface->mconf) {
2754  		wpa_printf(MSG_ERROR, "Error while completing mesh init");
2755  		goto fail;
2756  	}
2757  #endif /* CONFIG_MESH */
2758  
2759  	wpa_printf(MSG_DEBUG, "%s: Setup of interface done.",
2760  		   iface->bss[0]->conf->iface);
2761  	if (iface->interfaces && iface->interfaces->terminate_on_error > 0)
2762  		iface->interfaces->terminate_on_error--;
2763  
2764  	for (j = 0; j < iface->num_bss; j++)
2765  		hostapd_neighbor_set_own_report(iface->bss[j]);
2766  
2767  	if (iface->interfaces && iface->interfaces->count > 1)
2768  		ieee802_11_update_beacons(iface);
2769  
2770  	return 0;
2771  
2772  fail:
2773  	wpa_printf(MSG_ERROR, "Interface initialization failed");
2774  
2775  	if (iface->is_no_ir) {
2776  		hostapd_set_state(iface, HAPD_IFACE_NO_IR);
2777  		wpa_msg(hapd->msg_ctx, MSG_INFO, AP_EVENT_NO_IR);
2778  		return 0;
2779  	}
2780  
2781  	hostapd_set_state(iface, HAPD_IFACE_DISABLED);
2782  	wpa_msg(hapd->msg_ctx, MSG_INFO, AP_EVENT_DISABLED);
2783  #ifdef CONFIG_FST
2784  	if (iface->fst) {
2785  		fst_detach(iface->fst);
2786  		iface->fst = NULL;
2787  	}
2788  #endif /* CONFIG_FST */
2789  
2790  	if (iface->interfaces && iface->interfaces->terminate_on_error) {
2791  		eloop_terminate();
2792  	} else if (hapd->setup_complete_cb) {
2793  		/*
2794  		 * Calling hapd->setup_complete_cb directly may cause iface
2795  		 * deinitialization which may be accessed later by the caller.
2796  		 */
2797  		eloop_register_timeout(0, 0,
2798  				       hostapd_interface_setup_failure_handler,
2799  				       iface, NULL);
2800  	}
2801  
2802  	return -1;
2803  }
2804  
2805  
2806  /**
2807   * hostapd_setup_interface_complete - Complete interface setup
2808   *
2809   * This function is called when previous steps in the interface setup has been
2810   * completed. This can also start operations, e.g., DFS, that will require
2811   * additional processing before interface is ready to be enabled. Such
2812   * operations will call this function from eloop callbacks when finished.
2813   */
hostapd_setup_interface_complete(struct hostapd_iface * iface,int err)2814  int hostapd_setup_interface_complete(struct hostapd_iface *iface, int err)
2815  {
2816  	struct hapd_interfaces *interfaces = iface->interfaces;
2817  	struct hostapd_data *hapd = iface->bss[0];
2818  	unsigned int i;
2819  	int not_ready_in_sync_ifaces = 0;
2820  
2821  	if (!iface->need_to_start_in_sync)
2822  		return hostapd_setup_interface_complete_sync(iface, err);
2823  
2824  	if (err) {
2825  		wpa_printf(MSG_ERROR, "Interface initialization failed");
2826  		iface->need_to_start_in_sync = 0;
2827  
2828  		if (iface->is_no_ir) {
2829  			hostapd_set_state(iface, HAPD_IFACE_NO_IR);
2830  			wpa_msg(hapd->msg_ctx, MSG_INFO, AP_EVENT_NO_IR);
2831  			return 0;
2832  		}
2833  
2834  		hostapd_set_state(iface, HAPD_IFACE_DISABLED);
2835  		wpa_msg(hapd->msg_ctx, MSG_INFO, AP_EVENT_DISABLED);
2836  		if (interfaces && interfaces->terminate_on_error)
2837  			eloop_terminate();
2838  		return -1;
2839  	}
2840  
2841  	if (iface->ready_to_start_in_sync) {
2842  		/* Already in ready and waiting. should never happpen */
2843  		return 0;
2844  	}
2845  
2846  	for (i = 0; i < interfaces->count; i++) {
2847  		if (interfaces->iface[i]->need_to_start_in_sync &&
2848  		    !interfaces->iface[i]->ready_to_start_in_sync)
2849  			not_ready_in_sync_ifaces++;
2850  	}
2851  
2852  	/*
2853  	 * Check if this is the last interface, if yes then start all the other
2854  	 * waiting interfaces. If not, add this interface to the waiting list.
2855  	 */
2856  	if (not_ready_in_sync_ifaces > 1 && iface->state == HAPD_IFACE_DFS) {
2857  		/*
2858  		 * If this interface went through CAC, do not synchronize, just
2859  		 * start immediately.
2860  		 */
2861  		iface->need_to_start_in_sync = 0;
2862  		wpa_printf(MSG_INFO,
2863  			   "%s: Finished CAC - bypass sync and start interface",
2864  			   iface->bss[0]->conf->iface);
2865  		return hostapd_setup_interface_complete_sync(iface, err);
2866  	}
2867  
2868  	if (not_ready_in_sync_ifaces > 1) {
2869  		/* need to wait as there are other interfaces still coming up */
2870  		iface->ready_to_start_in_sync = 1;
2871  		wpa_printf(MSG_INFO,
2872  			   "%s: Interface waiting to sync with other interfaces",
2873  			   iface->bss[0]->conf->iface);
2874  		return 0;
2875  	}
2876  
2877  	wpa_printf(MSG_INFO,
2878  		   "%s: Last interface to sync - starting all interfaces",
2879  		   iface->bss[0]->conf->iface);
2880  	iface->need_to_start_in_sync = 0;
2881  	hostapd_setup_interface_complete_sync(iface, err);
2882  	for (i = 0; i < interfaces->count; i++) {
2883  		if (interfaces->iface[i]->need_to_start_in_sync &&
2884  		    interfaces->iface[i]->ready_to_start_in_sync) {
2885  			hostapd_setup_interface_complete_sync(
2886  				interfaces->iface[i], 0);
2887  			/* Only once the interfaces are sync started */
2888  			interfaces->iface[i]->need_to_start_in_sync = 0;
2889  		}
2890  	}
2891  
2892  	return 0;
2893  }
2894  
2895  
2896  /**
2897   * hostapd_setup_interface - Setup of an interface
2898   * @iface: Pointer to interface data.
2899   * Returns: 0 on success, -1 on failure
2900   *
2901   * Initializes the driver interface, validates the configuration,
2902   * and sets driver parameters based on the configuration.
2903   * Flushes old stations, sets the channel, encryption,
2904   * beacons, and WDS links based on the configuration.
2905   *
2906   * If interface setup requires more time, e.g., to perform HT co-ex scans, ACS,
2907   * or DFS operations, this function returns 0 before such operations have been
2908   * completed. The pending operations are registered into eloop and will be
2909   * completed from eloop callbacks. Those callbacks end up calling
2910   * hostapd_setup_interface_complete() once setup has been completed.
2911   */
hostapd_setup_interface(struct hostapd_iface * iface)2912  int hostapd_setup_interface(struct hostapd_iface *iface)
2913  {
2914  	int ret;
2915  
2916  	if (!iface->conf)
2917  		return -1;
2918  	ret = setup_interface(iface);
2919  	if (ret) {
2920  		wpa_printf(MSG_ERROR, "%s: Unable to setup interface.",
2921  			   iface->conf->bss[0]->iface);
2922  		return -1;
2923  	}
2924  
2925  	return 0;
2926  }
2927  
2928  
2929  /**
2930   * hostapd_alloc_bss_data - Allocate and initialize per-BSS data
2931   * @hapd_iface: Pointer to interface data
2932   * @conf: Pointer to per-interface configuration
2933   * @bss: Pointer to per-BSS configuration for this BSS
2934   * Returns: Pointer to allocated BSS data
2935   *
2936   * This function is used to allocate per-BSS data structure. This data will be
2937   * freed after hostapd_cleanup() is called for it during interface
2938   * deinitialization.
2939   */
2940  struct hostapd_data *
hostapd_alloc_bss_data(struct hostapd_iface * hapd_iface,struct hostapd_config * conf,struct hostapd_bss_config * bss)2941  hostapd_alloc_bss_data(struct hostapd_iface *hapd_iface,
2942  		       struct hostapd_config *conf,
2943  		       struct hostapd_bss_config *bss)
2944  {
2945  	struct hostapd_data *hapd;
2946  
2947  	hapd = os_zalloc(sizeof(*hapd));
2948  	if (hapd == NULL)
2949  		return NULL;
2950  
2951  	hapd->new_assoc_sta_cb = hostapd_new_assoc_sta;
2952  	hapd->iconf = conf;
2953  	hapd->conf = bss;
2954  	hapd->iface = hapd_iface;
2955  	if (conf)
2956  		hapd->driver = conf->driver;
2957  	hapd->ctrl_sock = -1;
2958  	dl_list_init(&hapd->ctrl_dst);
2959  	dl_list_init(&hapd->nr_db);
2960  	hapd->dhcp_sock = -1;
2961  #ifdef CONFIG_IEEE80211R_AP
2962  	dl_list_init(&hapd->l2_queue);
2963  	dl_list_init(&hapd->l2_oui_queue);
2964  #endif /* CONFIG_IEEE80211R_AP */
2965  #ifdef CONFIG_SAE
2966  	dl_list_init(&hapd->sae_commit_queue);
2967  #endif /* CONFIG_SAE */
2968  	dl_list_init(&hapd->erp_keys);
2969  
2970  	return hapd;
2971  }
2972  
2973  
hostapd_bss_deinit(struct hostapd_data * hapd)2974  static void hostapd_bss_deinit(struct hostapd_data *hapd)
2975  {
2976  	if (!hapd)
2977  		return;
2978  	wpa_printf(MSG_DEBUG, "%s: deinit bss %s", __func__,
2979  		   hapd->conf ? hapd->conf->iface : "N/A");
2980  	hostapd_bss_deinit_no_free(hapd);
2981  	wpa_msg(hapd->msg_ctx, MSG_INFO, AP_EVENT_DISABLED);
2982  #ifdef CONFIG_SQLITE
2983  	if (hapd->rad_attr_db) {
2984  		sqlite3_close(hapd->rad_attr_db);
2985  		hapd->rad_attr_db = NULL;
2986  	}
2987  #endif /* CONFIG_SQLITE */
2988  
2989  	hostapd_bss_link_deinit(hapd);
2990  	hostapd_cleanup(hapd);
2991  }
2992  
2993  
hostapd_interface_deinit(struct hostapd_iface * iface)2994  void hostapd_interface_deinit(struct hostapd_iface *iface)
2995  {
2996  	int j;
2997  
2998  	wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
2999  	if (iface == NULL)
3000  		return;
3001  
3002  	hostapd_set_state(iface, HAPD_IFACE_DISABLED);
3003  
3004  	eloop_cancel_timeout(channel_list_update_timeout, iface, NULL);
3005  	iface->wait_channel_update = 0;
3006  	iface->is_no_ir = false;
3007  
3008  #ifdef CONFIG_FST
3009  	if (iface->fst) {
3010  		fst_detach(iface->fst);
3011  		iface->fst = NULL;
3012  	}
3013  #endif /* CONFIG_FST */
3014  
3015  	for (j = (int) iface->num_bss - 1; j >= 0; j--) {
3016  		if (!iface->bss)
3017  			break;
3018  		hostapd_bss_deinit(iface->bss[j]);
3019  	}
3020  
3021  #ifdef NEED_AP_MLME
3022  	hostapd_stop_setup_timers(iface);
3023  	eloop_cancel_timeout(ap_ht2040_timeout, iface, NULL);
3024  #endif /* NEED_AP_MLME */
3025  }
3026  
3027  
3028  #ifdef CONFIG_IEEE80211BE
3029  
hostapd_mld_ref_inc(struct hostapd_mld * mld)3030  static void hostapd_mld_ref_inc(struct hostapd_mld *mld)
3031  {
3032  	if (!mld)
3033  		return;
3034  
3035  	if (mld->refcount == HOSTAPD_MLD_MAX_REF_COUNT) {
3036  		wpa_printf(MSG_ERROR, "AP MLD %s: Ref count overflow",
3037  			   mld->name);
3038  		return;
3039  	}
3040  
3041  	mld->refcount++;
3042  }
3043  
3044  
hostapd_mld_ref_dec(struct hostapd_mld * mld)3045  static void hostapd_mld_ref_dec(struct hostapd_mld *mld)
3046  {
3047  	if (!mld)
3048  		return;
3049  
3050  	if (!mld->refcount) {
3051  		wpa_printf(MSG_ERROR, "AP MLD %s: Ref count underflow",
3052  			   mld->name);
3053  		return;
3054  	}
3055  
3056  	mld->refcount--;
3057  }
3058  
3059  #endif /* CONFIG_IEEE80211BE */
3060  
3061  
hostapd_interface_free(struct hostapd_iface * iface)3062  void hostapd_interface_free(struct hostapd_iface *iface)
3063  {
3064  	size_t j;
3065  	wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
3066  	for (j = 0; j < iface->num_bss; j++) {
3067  		if (!iface->bss)
3068  			break;
3069  #ifdef CONFIG_IEEE80211BE
3070  		if (iface->bss[j])
3071  			hostapd_mld_ref_dec(iface->bss[j]->mld);
3072  #endif /* CONFIG_IEEE80211BE */
3073  		wpa_printf(MSG_DEBUG, "%s: free hapd %p",
3074  			   __func__, iface->bss[j]);
3075  		os_free(iface->bss[j]);
3076  	}
3077  	hostapd_cleanup_iface(iface);
3078  }
3079  
3080  
hostapd_alloc_iface(void)3081  struct hostapd_iface * hostapd_alloc_iface(void)
3082  {
3083  	struct hostapd_iface *hapd_iface;
3084  
3085  	hapd_iface = os_zalloc(sizeof(*hapd_iface));
3086  	if (!hapd_iface)
3087  		return NULL;
3088  
3089  	dl_list_init(&hapd_iface->sta_seen);
3090  
3091  	return hapd_iface;
3092  }
3093  
3094  
3095  #ifdef CONFIG_IEEE80211BE
hostapd_bss_alloc_link_id(struct hostapd_data * hapd)3096  static void hostapd_bss_alloc_link_id(struct hostapd_data *hapd)
3097  {
3098  	hapd->mld_link_id = hapd->mld->next_link_id++;
3099  	wpa_printf(MSG_DEBUG, "AP MLD: %s: Link ID %d assigned.",
3100  		   hapd->mld->name, hapd->mld_link_id);
3101  }
3102  #endif /* CONFIG_IEEE80211BE */
3103  
3104  
hostapd_bss_setup_multi_link(struct hostapd_data * hapd,struct hapd_interfaces * interfaces)3105  void hostapd_bss_setup_multi_link(struct hostapd_data *hapd,
3106  				  struct hapd_interfaces *interfaces)
3107  {
3108  #ifdef CONFIG_IEEE80211BE
3109  	struct hostapd_mld *mld, **all_mld;
3110  	struct hostapd_bss_config *conf;
3111  	size_t i;
3112  
3113  	if (hapd->mld)
3114  		return;
3115  
3116  	conf = hapd->conf;
3117  
3118  	if (!hapd->iconf || !hapd->iconf->ieee80211be || !conf->mld_ap ||
3119  	    conf->disable_11be)
3120  		return;
3121  
3122  	for (i = 0; i < interfaces->mld_count; i++) {
3123  		mld = interfaces->mld[i];
3124  
3125  		if (!mld || os_strcmp(conf->iface, mld->name) != 0)
3126  			continue;
3127  
3128  		hapd->mld = mld;
3129  		hostapd_mld_ref_inc(mld);
3130  		hostapd_bss_alloc_link_id(hapd);
3131  		break;
3132  	}
3133  
3134  	if (hapd->mld)
3135  		return;
3136  
3137  	mld = os_zalloc(sizeof(struct hostapd_mld));
3138  	if (!mld)
3139  		goto fail;
3140  
3141  	os_strlcpy(mld->name, conf->iface, sizeof(conf->iface));
3142  	dl_list_init(&mld->links);
3143  	mld->ctrl_sock = -1;
3144  	if (hapd->conf->ctrl_interface)
3145  		mld->ctrl_interface = os_strdup(hapd->conf->ctrl_interface);
3146  
3147  	wpa_printf(MSG_DEBUG, "AP MLD %s created", mld->name);
3148  
3149  	/* Initialize MLD control interfaces early to allow external monitoring
3150  	 * of link setup operations. */
3151  	if (interfaces->mld_ctrl_iface_init(mld))
3152  		goto fail;
3153  
3154  	hapd->mld = mld;
3155  	hostapd_mld_ref_inc(mld);
3156  	hostapd_bss_alloc_link_id(hapd);
3157  
3158  	all_mld = os_realloc_array(interfaces->mld, interfaces->mld_count + 1,
3159  				   sizeof(struct hostapd_mld *));
3160  	if (!all_mld)
3161  		goto fail;
3162  
3163  	interfaces->mld = all_mld;
3164  	interfaces->mld[interfaces->mld_count] = mld;
3165  	interfaces->mld_count++;
3166  
3167  	return;
3168  fail:
3169  	if (!mld)
3170  		return;
3171  
3172  	wpa_printf(MSG_DEBUG, "AP MLD %s: free mld %p", mld->name, mld);
3173  	os_free(mld);
3174  	hapd->mld = NULL;
3175  #endif /* CONFIG_IEEE80211BE */
3176  }
3177  
3178  
hostapd_cleanup_unused_mlds(struct hapd_interfaces * interfaces)3179  static void hostapd_cleanup_unused_mlds(struct hapd_interfaces *interfaces)
3180  {
3181  #ifdef CONFIG_IEEE80211BE
3182  	struct hostapd_mld *mld, **all_mld;
3183  	size_t i, j, num_mlds;
3184  	bool forced_remove, remove;
3185  
3186  	if (!interfaces->mld)
3187  		return;
3188  
3189  	num_mlds = interfaces->mld_count;
3190  
3191  	for (i = 0; i < interfaces->mld_count; i++) {
3192  		mld = interfaces->mld[i];
3193  		if (!mld)
3194  			continue;
3195  
3196  		remove = false;
3197  		forced_remove = false;
3198  
3199  		if (!mld->refcount)
3200  			remove = true;
3201  
3202  		/* If MLD is still being referenced but the number of interfaces
3203  		 * is zero, it is safe to force its deletion. Normally, this
3204  		 * should not happen but even if it does, let us free the
3205  		 * memory.
3206  		 */
3207  		if (!remove && !interfaces->count)
3208  			forced_remove = true;
3209  
3210  		if (!remove && !forced_remove)
3211  			continue;
3212  
3213  		interfaces->mld_ctrl_iface_deinit(mld);
3214  
3215  		wpa_printf(MSG_DEBUG, "AP MLD %s: Freed%s", mld->name,
3216  			   forced_remove ? " (forced)" : "");
3217  		os_free(mld);
3218  		interfaces->mld[i] = NULL;
3219  		num_mlds--;
3220  	}
3221  
3222  	if (!num_mlds) {
3223  		interfaces->mld_count = 0;
3224  		os_free(interfaces->mld);
3225  		interfaces->mld = NULL;
3226  		return;
3227  	}
3228  
3229  	all_mld = os_zalloc(num_mlds * sizeof(struct hostapd_mld *));
3230  	if (!all_mld) {
3231  		wpa_printf(MSG_ERROR,
3232  			   "AP MLD: Failed to re-allocate the MLDs. Expect issues");
3233  		return;
3234  	}
3235  
3236  	for (i = 0, j = 0; i < interfaces->mld_count; i++) {
3237  		mld = interfaces->mld[i];
3238  		if (!mld)
3239  			continue;
3240  
3241  		all_mld[j++] = mld;
3242  	}
3243  
3244  	/* This should not happen */
3245  	if (j != num_mlds) {
3246  		wpa_printf(MSG_DEBUG,
3247  			   "AP MLD: Some error occurred while reallocating MLDs. Expect issues.");
3248  		os_free(all_mld);
3249  		return;
3250  	}
3251  
3252  	os_free(interfaces->mld);
3253  	interfaces->mld = all_mld;
3254  	interfaces->mld_count = num_mlds;
3255  #endif /* CONFIG_IEEE80211BE */
3256  }
3257  
3258  
3259  /**
3260   * hostapd_init - Allocate and initialize per-interface data
3261   * @config_file: Path to the configuration file
3262   * Returns: Pointer to the allocated interface data or %NULL on failure
3263   *
3264   * This function is used to allocate main data structures for per-interface
3265   * data. The allocated data buffer will be freed by calling
3266   * hostapd_cleanup_iface().
3267   */
hostapd_init(struct hapd_interfaces * interfaces,const char * config_file)3268  struct hostapd_iface * hostapd_init(struct hapd_interfaces *interfaces,
3269  				    const char *config_file)
3270  {
3271  	struct hostapd_iface *hapd_iface = NULL;
3272  	struct hostapd_config *conf = NULL;
3273  	struct hostapd_data *hapd;
3274  	size_t i;
3275  
3276  	hapd_iface = hostapd_alloc_iface();
3277  	if (hapd_iface == NULL)
3278  		goto fail;
3279  
3280  	hapd_iface->config_fname = os_strdup(config_file);
3281  	if (hapd_iface->config_fname == NULL)
3282  		goto fail;
3283  
3284  	conf = interfaces->config_read_cb(hapd_iface->config_fname);
3285  	if (conf == NULL)
3286  		goto fail;
3287  	hapd_iface->conf = conf;
3288  
3289  	hapd_iface->num_bss = conf->num_bss;
3290  	hapd_iface->bss = os_calloc(conf->num_bss,
3291  				    sizeof(struct hostapd_data *));
3292  	if (hapd_iface->bss == NULL)
3293  		goto fail;
3294  
3295  	for (i = 0; i < conf->num_bss; i++) {
3296  		hapd = hapd_iface->bss[i] =
3297  			hostapd_alloc_bss_data(hapd_iface, conf,
3298  					       conf->bss[i]);
3299  		if (hapd == NULL)
3300  			goto fail;
3301  		hapd->msg_ctx = hapd;
3302  		hostapd_bss_setup_multi_link(hapd, interfaces);
3303  	}
3304  
3305  	hapd_iface->is_ch_switch_dfs = false;
3306  	return hapd_iface;
3307  
3308  fail:
3309  	wpa_printf(MSG_ERROR, "Failed to set up interface with %s",
3310  		   config_file);
3311  	if (conf)
3312  		hostapd_config_free(conf);
3313  	if (hapd_iface) {
3314  		os_free(hapd_iface->config_fname);
3315  		os_free(hapd_iface->bss);
3316  		wpa_printf(MSG_DEBUG, "%s: free iface %p",
3317  			   __func__, hapd_iface);
3318  		os_free(hapd_iface);
3319  	}
3320  	return NULL;
3321  }
3322  
3323  
ifname_in_use(struct hapd_interfaces * interfaces,const char * ifname)3324  static int ifname_in_use(struct hapd_interfaces *interfaces, const char *ifname)
3325  {
3326  	size_t i, j;
3327  
3328  	for (i = 0; i < interfaces->count; i++) {
3329  		struct hostapd_iface *iface = interfaces->iface[i];
3330  		for (j = 0; j < iface->num_bss; j++) {
3331  			struct hostapd_data *hapd = iface->bss[j];
3332  			if (os_strcmp(ifname, hapd->conf->iface) == 0)
3333  				return 1;
3334  		}
3335  	}
3336  
3337  	return 0;
3338  }
3339  
3340  
3341  /**
3342   * hostapd_interface_init_bss - Read configuration file and init BSS data
3343   *
3344   * This function is used to parse configuration file for a BSS. This BSS is
3345   * added to an existing interface sharing the same radio (if any) or a new
3346   * interface is created if this is the first interface on a radio. This
3347   * allocate memory for the BSS. No actual driver operations are started.
3348   *
3349   * This is similar to hostapd_interface_init(), but for a case where the
3350   * configuration is used to add a single BSS instead of all BSSes for a radio.
3351   */
3352  struct hostapd_iface *
hostapd_interface_init_bss(struct hapd_interfaces * interfaces,const char * phy,const char * config_fname,int debug)3353  hostapd_interface_init_bss(struct hapd_interfaces *interfaces, const char *phy,
3354  			   const char *config_fname, int debug)
3355  {
3356  	struct hostapd_iface *new_iface = NULL, *iface = NULL;
3357  	struct hostapd_data *hapd;
3358  	struct hostapd_config *conf;
3359  	int k;
3360  	size_t i, bss_idx;
3361  
3362  	if (!phy || !*phy)
3363  		return NULL;
3364  
3365  	for (i = 0; i < interfaces->count; i++) {
3366  		if (os_strcmp(interfaces->iface[i]->phy, phy) == 0) {
3367  			iface = interfaces->iface[i];
3368  			break;
3369  		}
3370  	}
3371  
3372  	wpa_printf(MSG_INFO, "Configuration file: %s (phy %s)%s",
3373  		   config_fname, phy, iface ? "" : " --> new PHY");
3374  
3375  	conf = interfaces->config_read_cb(config_fname);
3376  	if (!conf)
3377  		return NULL;
3378  
3379  #ifdef CONFIG_IEEE80211BE
3380  	/* AP MLD can be enabled with the same interface name, so even if we
3381  	 * get the interface, we still need to allocate a new hostapd_iface
3382  	 * structure. */
3383  	if (conf->bss[0]->mld_ap)
3384  		iface = NULL;
3385  #endif /* CONFIG_IEEE80211BE */
3386  
3387  	if (iface) {
3388  		struct hostapd_bss_config **tmp_conf;
3389  		struct hostapd_data **tmp_bss;
3390  		struct hostapd_bss_config *bss;
3391  		const char *ifname;
3392  
3393  		/* Add new BSS to existing iface */
3394  		if (conf->num_bss > 1) {
3395  			wpa_printf(MSG_ERROR, "Multiple BSSes specified in BSS-config");
3396  			hostapd_config_free(conf);
3397  			return NULL;
3398  		}
3399  
3400  		ifname = conf->bss[0]->iface;
3401  		if (ifname[0] != '\0' && ifname_in_use(interfaces, ifname)) {
3402  			wpa_printf(MSG_ERROR,
3403  				   "Interface name %s already in use", ifname);
3404  			hostapd_config_free(conf);
3405  			return NULL;
3406  		}
3407  
3408  		tmp_conf = os_realloc_array(
3409  			iface->conf->bss, iface->conf->num_bss + 1,
3410  			sizeof(struct hostapd_bss_config *));
3411  		tmp_bss = os_realloc_array(iface->bss, iface->num_bss + 1,
3412  					   sizeof(struct hostapd_data *));
3413  		if (tmp_bss)
3414  			iface->bss = tmp_bss;
3415  		if (tmp_conf) {
3416  			iface->conf->bss = tmp_conf;
3417  			iface->conf->last_bss = tmp_conf[0];
3418  		}
3419  		if (tmp_bss == NULL || tmp_conf == NULL) {
3420  			hostapd_config_free(conf);
3421  			return NULL;
3422  		}
3423  		bss = iface->conf->bss[iface->conf->num_bss] = conf->bss[0];
3424  		iface->conf->num_bss++;
3425  
3426  		hapd = hostapd_alloc_bss_data(iface, iface->conf, bss);
3427  		if (hapd == NULL) {
3428  			iface->conf->num_bss--;
3429  			hostapd_config_free(conf);
3430  			return NULL;
3431  		}
3432  		iface->conf->last_bss = bss;
3433  		iface->bss[iface->num_bss] = hapd;
3434  		hapd->msg_ctx = hapd;
3435  		hostapd_bss_setup_multi_link(hapd, interfaces);
3436  
3437  
3438  		bss_idx = iface->num_bss++;
3439  		conf->num_bss--;
3440  		conf->bss[0] = NULL;
3441  		hostapd_config_free(conf);
3442  	} else {
3443  		hostapd_config_free(conf);
3444  
3445  		/* Add a new iface with the first BSS */
3446  		new_iface = iface = hostapd_init(interfaces, config_fname);
3447  		if (!iface)
3448  			return NULL;
3449  		os_strlcpy(iface->phy, phy, sizeof(iface->phy));
3450  		iface->interfaces = interfaces;
3451  		bss_idx = 0;
3452  	}
3453  
3454  	for (k = 0; k < debug; k++) {
3455  		if (iface->bss[bss_idx]->conf->logger_stdout_level > 0)
3456  			iface->bss[bss_idx]->conf->logger_stdout_level--;
3457  	}
3458  
3459  	if (iface->conf->bss[bss_idx]->iface[0] == '\0' &&
3460  	    !hostapd_drv_none(iface->bss[bss_idx])) {
3461  		wpa_printf(MSG_ERROR, "Interface name not specified in %s",
3462  			   config_fname);
3463  		if (new_iface)
3464  			hostapd_interface_deinit_free(new_iface);
3465  		return NULL;
3466  	}
3467  
3468  	return iface;
3469  }
3470  
3471  
hostapd_cleanup_driver(const struct wpa_driver_ops * driver,void * drv_priv,struct hostapd_iface * iface)3472  static void hostapd_cleanup_driver(const struct wpa_driver_ops *driver,
3473  				   void *drv_priv, struct hostapd_iface *iface)
3474  {
3475  	if (!driver || !driver->hapd_deinit || !drv_priv)
3476  		return;
3477  
3478  #ifdef CONFIG_IEEE80211BE
3479  	if (!driver->is_drv_shared ||
3480  	    !driver->is_drv_shared(drv_priv, iface->bss[0]->mld_link_id)) {
3481  		driver->hapd_deinit(drv_priv);
3482  		hostapd_mld_interface_freed(iface->bss[0]);
3483  		iface->bss[0]->drv_priv = NULL;
3484  		return;
3485  	}
3486  
3487  	if (iface->bss[0]->conf->mld_ap) {
3488  		if (hostapd_if_link_remove(iface->bss[0],
3489  					WPA_IF_AP_BSS,
3490  					iface->bss[0]->conf->iface,
3491  					iface->bss[0]->mld_link_id))
3492  			wpa_printf(MSG_WARNING,
3493  				   "Failed to remove link BSS interface %s",
3494  				   iface->bss[0]->conf->iface);
3495  	} else if (hostapd_if_remove(iface->bss[0], WPA_IF_AP_BSS,
3496  				     iface->bss[0]->conf->iface)) {
3497  		wpa_printf(MSG_WARNING, "Failed to remove BSS interface %s",
3498  			   iface->bss[0]->conf->iface);
3499  	}
3500  #else /* CONFIG_IEEE80211BE */
3501  	driver->hapd_deinit(drv_priv);
3502  #endif /* CONFIG_IEEE80211BE */
3503  	iface->bss[0]->drv_priv = NULL;
3504  }
3505  
3506  
hostapd_interface_deinit_free(struct hostapd_iface * iface)3507  void hostapd_interface_deinit_free(struct hostapd_iface *iface)
3508  {
3509  	const struct wpa_driver_ops *driver;
3510  	void *drv_priv;
3511  
3512  	wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
3513  	if (iface == NULL)
3514  		return;
3515  	wpa_printf(MSG_DEBUG, "%s: num_bss=%u conf->num_bss=%u",
3516  		   __func__, (unsigned int) iface->num_bss,
3517  		   (unsigned int) iface->conf->num_bss);
3518  	driver = iface->bss[0]->driver;
3519  	drv_priv = iface->bss[0]->drv_priv;
3520  	hostapd_interface_deinit(iface);
3521  	wpa_printf(MSG_DEBUG, "%s: driver=%p drv_priv=%p -> hapd_deinit",
3522  		   __func__, driver, drv_priv);
3523  	hostapd_cleanup_driver(driver, drv_priv, iface);
3524  	hostapd_interface_free(iface);
3525  }
3526  
3527  
hostapd_deinit_driver(const struct wpa_driver_ops * driver,void * drv_priv,struct hostapd_iface * hapd_iface)3528  static void hostapd_deinit_driver(const struct wpa_driver_ops *driver,
3529  				  void *drv_priv,
3530  				  struct hostapd_iface *hapd_iface)
3531  {
3532  	size_t j;
3533  
3534  	wpa_printf(MSG_DEBUG, "%s: driver=%p drv_priv=%p -> hapd_deinit",
3535  		   __func__, driver, drv_priv);
3536  
3537  	hostapd_cleanup_driver(driver, drv_priv, hapd_iface);
3538  
3539  	if (driver && driver->hapd_deinit && drv_priv) {
3540  		for (j = 0; j < hapd_iface->num_bss; j++) {
3541  			wpa_printf(MSG_DEBUG, "%s:bss[%d]->drv_priv=%p",
3542  				   __func__, (int) j,
3543  				   hapd_iface->bss[j]->drv_priv);
3544  			if (hapd_iface->bss[j]->drv_priv == drv_priv) {
3545  				hapd_iface->bss[j]->drv_priv = NULL;
3546  				hapd_iface->extended_capa = NULL;
3547  				hapd_iface->extended_capa_mask = NULL;
3548  				hapd_iface->extended_capa_len = 0;
3549  			}
3550  		}
3551  	}
3552  }
3553  
3554  
hostapd_refresh_all_iface_beacons(struct hostapd_iface * hapd_iface)3555  static void hostapd_refresh_all_iface_beacons(struct hostapd_iface *hapd_iface)
3556  {
3557  	size_t j;
3558  
3559  	if (!hapd_iface->interfaces || hapd_iface->interfaces->count <= 1)
3560  		return;
3561  
3562  	for (j = 0; j < hapd_iface->interfaces->count; j++) {
3563  		if (hapd_iface->interfaces->iface[j] == hapd_iface)
3564  			continue;
3565  
3566  		ieee802_11_update_beacons(hapd_iface->interfaces->iface[j]);
3567  	}
3568  }
3569  
3570  
hostapd_enable_iface(struct hostapd_iface * hapd_iface)3571  int hostapd_enable_iface(struct hostapd_iface *hapd_iface)
3572  {
3573  	size_t j;
3574  
3575  	if (!hapd_iface)
3576  		return -1;
3577  
3578  	if (hapd_iface->enable_iface_cb)
3579  		return hapd_iface->enable_iface_cb(hapd_iface);
3580  
3581  	if (hapd_iface->bss[0]->drv_priv != NULL) {
3582  		wpa_printf(MSG_ERROR, "Interface %s already enabled",
3583  			   hapd_iface->conf->bss[0]->iface);
3584  		return -1;
3585  	}
3586  
3587  	wpa_printf(MSG_DEBUG, "Enable interface %s",
3588  		   hapd_iface->conf->bss[0]->iface);
3589  
3590  	for (j = 0; j < hapd_iface->num_bss; j++)
3591  		hostapd_set_security_params(hapd_iface->conf->bss[j], 1);
3592  	if (hostapd_config_check(hapd_iface->conf, 1) < 0) {
3593  		wpa_printf(MSG_INFO, "Invalid configuration - cannot enable");
3594  		return -1;
3595  	}
3596  
3597  	if (hapd_iface->interfaces == NULL ||
3598  	    hapd_iface->interfaces->driver_init == NULL ||
3599  	    hapd_iface->interfaces->driver_init(hapd_iface))
3600  		return -1;
3601  
3602  	if (hostapd_setup_interface(hapd_iface)) {
3603  		hostapd_deinit_driver(hapd_iface->bss[0]->driver,
3604  				      hapd_iface->bss[0]->drv_priv,
3605  				      hapd_iface);
3606  		return -1;
3607  	}
3608  
3609  	hostapd_refresh_all_iface_beacons(hapd_iface);
3610  
3611  	return 0;
3612  }
3613  
3614  
hostapd_reload_iface(struct hostapd_iface * hapd_iface)3615  int hostapd_reload_iface(struct hostapd_iface *hapd_iface)
3616  {
3617  	size_t j;
3618  
3619  	wpa_printf(MSG_DEBUG, "Reload interface %s",
3620  		   hapd_iface->conf->bss[0]->iface);
3621  	for (j = 0; j < hapd_iface->num_bss; j++)
3622  		hostapd_set_security_params(hapd_iface->conf->bss[j], 1);
3623  	if (hostapd_config_check(hapd_iface->conf, 1) < 0) {
3624  		wpa_printf(MSG_ERROR, "Updated configuration is invalid");
3625  		return -1;
3626  	}
3627  	hostapd_clear_old(hapd_iface);
3628  	for (j = 0; j < hapd_iface->num_bss; j++)
3629  		hostapd_reload_bss(hapd_iface->bss[j]);
3630  
3631  	return 0;
3632  }
3633  
3634  
hostapd_reload_bss_only(struct hostapd_data * bss)3635  int hostapd_reload_bss_only(struct hostapd_data *bss)
3636  {
3637  
3638  	wpa_printf(MSG_DEBUG, "Reload BSS %s", bss->conf->iface);
3639  	hostapd_set_security_params(bss->conf, 1);
3640  	if (hostapd_config_check(bss->iconf, 1) < 0) {
3641  		wpa_printf(MSG_ERROR, "Updated BSS configuration is invalid");
3642  		return -1;
3643  	}
3644  	hostapd_clear_old_bss(bss);
3645  	hostapd_reload_bss(bss);
3646  	return 0;
3647  }
3648  
3649  
hostapd_disable_iface(struct hostapd_iface * hapd_iface)3650  int hostapd_disable_iface(struct hostapd_iface *hapd_iface)
3651  {
3652  	size_t j;
3653  
3654  	if (hapd_iface == NULL)
3655  		return -1;
3656  
3657  	if (hapd_iface->disable_iface_cb)
3658  		return hapd_iface->disable_iface_cb(hapd_iface);
3659  
3660  	if (hapd_iface->bss[0]->drv_priv == NULL) {
3661  		wpa_printf(MSG_INFO, "Interface %s already disabled",
3662  			   hapd_iface->conf->bss[0]->iface);
3663  		return -1;
3664  	}
3665  
3666  	wpa_msg(hapd_iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_DISABLED);
3667  
3668  	hapd_iface->driver_ap_teardown =
3669  		!!(hapd_iface->drv_flags &
3670  		   WPA_DRIVER_FLAGS_AP_TEARDOWN_SUPPORT);
3671  
3672  #ifdef NEED_AP_MLME
3673  	for (j = 0; j < hapd_iface->num_bss; j++)
3674  		hostapd_cleanup_cs_params(hapd_iface->bss[j]);
3675  #endif /* NEED_AP_MLME */
3676  
3677  	/* same as hostapd_interface_deinit without deinitializing ctrl-iface */
3678  	for (j = 0; j < hapd_iface->num_bss; j++) {
3679  		struct hostapd_data *hapd = hapd_iface->bss[j];
3680  		hostapd_bss_deinit_no_free(hapd);
3681  		hostapd_bss_link_deinit(hapd);
3682  		hostapd_free_hapd_data(hapd);
3683  	}
3684  
3685  	hostapd_deinit_driver(hapd_iface->bss[0]->driver,
3686  			      hapd_iface->bss[0]->drv_priv, hapd_iface);
3687  
3688  	/* From hostapd_cleanup_iface: These were initialized in
3689  	 * hostapd_setup_interface and hostapd_setup_interface_complete
3690  	 */
3691  	hostapd_cleanup_iface_partial(hapd_iface);
3692  
3693  	wpa_printf(MSG_DEBUG, "Interface %s disabled",
3694  		   hapd_iface->bss[0]->conf->iface);
3695  	hostapd_set_state(hapd_iface, HAPD_IFACE_DISABLED);
3696  	hostapd_refresh_all_iface_beacons(hapd_iface);
3697  	return 0;
3698  }
3699  
3700  
3701  static struct hostapd_iface *
hostapd_iface_alloc(struct hapd_interfaces * interfaces)3702  hostapd_iface_alloc(struct hapd_interfaces *interfaces)
3703  {
3704  	struct hostapd_iface **iface, *hapd_iface;
3705  
3706  	iface = os_realloc_array(interfaces->iface, interfaces->count + 1,
3707  				 sizeof(struct hostapd_iface *));
3708  	if (iface == NULL)
3709  		return NULL;
3710  	interfaces->iface = iface;
3711  	hapd_iface = interfaces->iface[interfaces->count] =
3712  		hostapd_alloc_iface();
3713  	if (hapd_iface == NULL) {
3714  		wpa_printf(MSG_ERROR, "%s: Failed to allocate memory for "
3715  			   "the interface", __func__);
3716  		return NULL;
3717  	}
3718  	interfaces->count++;
3719  	hapd_iface->interfaces = interfaces;
3720  
3721  	return hapd_iface;
3722  }
3723  
3724  
3725  static struct hostapd_config *
hostapd_config_alloc(struct hapd_interfaces * interfaces,const char * ifname,const char * ctrl_iface,const char * driver)3726  hostapd_config_alloc(struct hapd_interfaces *interfaces, const char *ifname,
3727  		     const char *ctrl_iface, const char *driver)
3728  {
3729  	struct hostapd_bss_config *bss;
3730  	struct hostapd_config *conf;
3731  
3732  	/* Allocates memory for bss and conf */
3733  	conf = hostapd_config_defaults();
3734  	if (conf == NULL) {
3735  		 wpa_printf(MSG_ERROR, "%s: Failed to allocate memory for "
3736  				"configuration", __func__);
3737  		 return NULL;
3738  	}
3739  
3740  	if (driver) {
3741  		int j;
3742  
3743  		for (j = 0; wpa_drivers[j]; j++) {
3744  			if (os_strcmp(driver, wpa_drivers[j]->name) == 0) {
3745  				conf->driver = wpa_drivers[j];
3746  				goto skip;
3747  			}
3748  		}
3749  
3750  		wpa_printf(MSG_ERROR,
3751  			   "Invalid/unknown driver '%s' - registering the default driver",
3752  			   driver);
3753  	}
3754  
3755  	conf->driver = wpa_drivers[0];
3756  	if (conf->driver == NULL) {
3757  		wpa_printf(MSG_ERROR, "No driver wrappers registered!");
3758  		hostapd_config_free(conf);
3759  		return NULL;
3760  	}
3761  
3762  skip:
3763  	bss = conf->last_bss = conf->bss[0];
3764  
3765  	os_strlcpy(bss->iface, ifname, sizeof(bss->iface));
3766  	bss->ctrl_interface = os_strdup(ctrl_iface);
3767  	if (bss->ctrl_interface == NULL) {
3768  		hostapd_config_free(conf);
3769  		return NULL;
3770  	}
3771  
3772  	/* Reading configuration file skipped, will be done in SET!
3773  	 * From reading the configuration till the end has to be done in
3774  	 * SET
3775  	 */
3776  	return conf;
3777  }
3778  
3779  
hostapd_data_alloc(struct hostapd_iface * hapd_iface,struct hostapd_config * conf)3780  static int hostapd_data_alloc(struct hostapd_iface *hapd_iface,
3781  			      struct hostapd_config *conf)
3782  {
3783  	size_t i;
3784  	struct hostapd_data *hapd;
3785  
3786  	hapd_iface->bss = os_calloc(conf->num_bss,
3787  				    sizeof(struct hostapd_data *));
3788  	if (hapd_iface->bss == NULL)
3789  		return -1;
3790  
3791  	for (i = 0; i < conf->num_bss; i++) {
3792  		hapd = hapd_iface->bss[i] =
3793  			hostapd_alloc_bss_data(hapd_iface, conf, conf->bss[i]);
3794  		if (hapd == NULL) {
3795  			while (i > 0) {
3796  				i--;
3797  				os_free(hapd_iface->bss[i]);
3798  				hapd_iface->bss[i] = NULL;
3799  			}
3800  			os_free(hapd_iface->bss);
3801  			hapd_iface->bss = NULL;
3802  			return -1;
3803  		}
3804  		hapd->msg_ctx = hapd;
3805  		hostapd_bss_setup_multi_link(hapd, hapd_iface->interfaces);
3806  	}
3807  
3808  	hapd_iface->conf = conf;
3809  	hapd_iface->num_bss = conf->num_bss;
3810  
3811  	return 0;
3812  }
3813  
3814  
hostapd_add_iface(struct hapd_interfaces * interfaces,char * buf)3815  int hostapd_add_iface(struct hapd_interfaces *interfaces, char *buf)
3816  {
3817  	struct hostapd_config *conf = NULL;
3818  	struct hostapd_iface *hapd_iface = NULL, *new_iface = NULL;
3819  	struct hostapd_data *hapd;
3820  	char *ptr;
3821  	size_t i, j;
3822  	const char *conf_file = NULL, *phy_name = NULL;
3823  
3824  	if (os_strncmp(buf, "bss_config=", 11) == 0) {
3825  		char *pos;
3826  		phy_name = buf + 11;
3827  		pos = os_strchr(phy_name, ':');
3828  		if (!pos)
3829  			return -1;
3830  		*pos++ = '\0';
3831  		conf_file = pos;
3832  		if (!os_strlen(conf_file))
3833  			return -1;
3834  
3835  		hapd_iface = hostapd_interface_init_bss(interfaces, phy_name,
3836  							conf_file, 0);
3837  		if (!hapd_iface)
3838  			return -1;
3839  		for (j = 0; j < interfaces->count; j++) {
3840  			if (interfaces->iface[j] == hapd_iface)
3841  				break;
3842  		}
3843  		if (j == interfaces->count) {
3844  			struct hostapd_iface **tmp;
3845  			tmp = os_realloc_array(interfaces->iface,
3846  					       interfaces->count + 1,
3847  					       sizeof(struct hostapd_iface *));
3848  			if (!tmp) {
3849  				hostapd_interface_deinit_free(hapd_iface);
3850  				return -1;
3851  			}
3852  			interfaces->iface = tmp;
3853  			interfaces->iface[interfaces->count++] = hapd_iface;
3854  			new_iface = hapd_iface;
3855  		}
3856  
3857  		if (new_iface) {
3858  			if (interfaces->driver_init(hapd_iface))
3859  				goto fail;
3860  
3861  			if (hostapd_setup_interface(hapd_iface)) {
3862  				hostapd_deinit_driver(
3863  					hapd_iface->bss[0]->driver,
3864  					hapd_iface->bss[0]->drv_priv,
3865  					hapd_iface);
3866  				goto fail;
3867  			}
3868  		} else {
3869  			/* Assign new BSS with bss[0]'s driver info */
3870  			hapd = hapd_iface->bss[hapd_iface->num_bss - 1];
3871  			hapd->driver = hapd_iface->bss[0]->driver;
3872  			hapd->drv_priv = hapd_iface->bss[0]->drv_priv;
3873  			os_memcpy(hapd->own_addr, hapd_iface->bss[0]->own_addr,
3874  				  ETH_ALEN);
3875  
3876  			if (start_ctrl_iface_bss(hapd) < 0 ||
3877  			    (hapd_iface->state == HAPD_IFACE_ENABLED &&
3878  			     hostapd_setup_bss(hapd, -1, true))) {
3879  				hostapd_bss_link_deinit(hapd);
3880  				hostapd_cleanup(hapd);
3881  				hapd_iface->bss[hapd_iface->num_bss - 1] = NULL;
3882  				hapd_iface->conf->num_bss--;
3883  				hapd_iface->num_bss--;
3884  				wpa_printf(MSG_DEBUG, "%s: free hapd %p %s",
3885  					   __func__, hapd, hapd->conf->iface);
3886  				hostapd_config_free_bss(hapd->conf);
3887  				hapd->conf = NULL;
3888  #ifdef CONFIG_IEEE80211BE
3889  				hostapd_mld_ref_dec(hapd->mld);
3890  #endif /* CONFIG_IEEE80211BE */
3891  				os_free(hapd);
3892  				return -1;
3893  			}
3894  		}
3895  		hostapd_owe_update_trans(hapd_iface);
3896  		return 0;
3897  	}
3898  
3899  	ptr = os_strchr(buf, ' ');
3900  	if (ptr == NULL)
3901  		return -1;
3902  	*ptr++ = '\0';
3903  
3904  	if (os_strncmp(ptr, "config=", 7) == 0)
3905  		conf_file = ptr + 7;
3906  
3907  	for (i = 0; i < interfaces->count; i++) {
3908  		bool mld_ap = false;
3909  
3910  #ifdef CONFIG_IEEE80211BE
3911  		mld_ap = interfaces->iface[i]->conf->bss[0]->mld_ap;
3912  #endif /* CONFIG_IEEE80211BE */
3913  
3914  		if (!os_strcmp(interfaces->iface[i]->conf->bss[0]->iface,
3915  			       buf) && !mld_ap) {
3916  			wpa_printf(MSG_INFO, "Cannot add interface - it "
3917  				   "already exists");
3918  			return -1;
3919  		}
3920  	}
3921  
3922  	hapd_iface = hostapd_iface_alloc(interfaces);
3923  	if (hapd_iface == NULL) {
3924  		wpa_printf(MSG_ERROR, "%s: Failed to allocate memory "
3925  			   "for interface", __func__);
3926  		goto fail;
3927  	}
3928  	new_iface = hapd_iface;
3929  
3930  	if (conf_file && interfaces->config_read_cb) {
3931  		conf = interfaces->config_read_cb(conf_file);
3932  		if (conf && conf->bss)
3933  			os_strlcpy(conf->bss[0]->iface, buf,
3934  				   sizeof(conf->bss[0]->iface));
3935  	} else {
3936  		char *driver = os_strchr(ptr, ' ');
3937  
3938  		if (driver)
3939  			*driver++ = '\0';
3940  		conf = hostapd_config_alloc(interfaces, buf, ptr, driver);
3941  	}
3942  
3943  	if (conf == NULL || conf->bss == NULL) {
3944  		wpa_printf(MSG_ERROR, "%s: Failed to allocate memory "
3945  			   "for configuration", __func__);
3946  		goto fail;
3947  	}
3948  
3949  	if (hostapd_data_alloc(hapd_iface, conf) < 0) {
3950  		wpa_printf(MSG_ERROR, "%s: Failed to allocate memory "
3951  			   "for hostapd", __func__);
3952  		goto fail;
3953  	}
3954  	conf = NULL;
3955  
3956  	if (start_ctrl_iface(hapd_iface) < 0)
3957  		goto fail;
3958  
3959  	wpa_printf(MSG_INFO, "Add interface '%s'",
3960  		   hapd_iface->conf->bss[0]->iface);
3961  
3962  	return 0;
3963  
3964  fail:
3965  	if (conf)
3966  		hostapd_config_free(conf);
3967  	if (hapd_iface) {
3968  		if (hapd_iface->bss) {
3969  			for (i = 0; i < hapd_iface->num_bss; i++) {
3970  				hapd = hapd_iface->bss[i];
3971  				if (!hapd)
3972  					continue;
3973  				if (hapd_iface->interfaces &&
3974  				    hapd_iface->interfaces->ctrl_iface_deinit)
3975  					hapd_iface->interfaces->
3976  						ctrl_iface_deinit(hapd);
3977  				wpa_printf(MSG_DEBUG, "%s: free hapd %p (%s)",
3978  					   __func__, hapd_iface->bss[i],
3979  					   hapd->conf->iface);
3980  				hostapd_bss_link_deinit(hapd);
3981  				hostapd_cleanup(hapd);
3982  #ifdef CONFIG_IEEE80211BE
3983  				hostapd_mld_ref_dec(hapd->mld);
3984  #endif /* CONFIG_IEEE80211BE */
3985  				os_free(hapd);
3986  				hapd_iface->bss[i] = NULL;
3987  			}
3988  			os_free(hapd_iface->bss);
3989  			hapd_iface->bss = NULL;
3990  		}
3991  		if (new_iface) {
3992  			interfaces->count--;
3993  			interfaces->iface[interfaces->count] = NULL;
3994  			hostapd_cleanup_unused_mlds(interfaces);
3995  		}
3996  		hostapd_cleanup_iface(hapd_iface);
3997  	}
3998  	return -1;
3999  }
4000  
4001  
hostapd_remove_bss(struct hostapd_iface * iface,unsigned int idx)4002  static int hostapd_remove_bss(struct hostapd_iface *iface, unsigned int idx)
4003  {
4004  	size_t i;
4005  
4006  	wpa_printf(MSG_INFO, "Remove BSS '%s'", iface->conf->bss[idx]->iface);
4007  
4008  	/* Remove hostapd_data only if it has already been initialized */
4009  	if (idx < iface->num_bss) {
4010  		struct hostapd_data *hapd = iface->bss[idx];
4011  
4012  		hostapd_bss_deinit(hapd);
4013  		wpa_printf(MSG_DEBUG, "%s: free hapd %p (%s)",
4014  			   __func__, hapd, hapd->conf->iface);
4015  		hostapd_config_free_bss(hapd->conf);
4016  		hapd->conf = NULL;
4017  #ifdef CONFIG_IEEE80211BE
4018  		hostapd_mld_ref_dec(hapd->mld);
4019  #endif /* CONFIG_IEEE80211BE */
4020  		os_free(hapd);
4021  
4022  		iface->num_bss--;
4023  
4024  		for (i = idx; i < iface->num_bss; i++)
4025  			iface->bss[i] = iface->bss[i + 1];
4026  	} else {
4027  		hostapd_config_free_bss(iface->conf->bss[idx]);
4028  		iface->conf->bss[idx] = NULL;
4029  	}
4030  
4031  	iface->conf->num_bss--;
4032  	for (i = idx; i < iface->conf->num_bss; i++)
4033  		iface->conf->bss[i] = iface->conf->bss[i + 1];
4034  
4035  	return 0;
4036  }
4037  
4038  
hostapd_remove_iface(struct hapd_interfaces * interfaces,char * buf)4039  int hostapd_remove_iface(struct hapd_interfaces *interfaces, char *buf)
4040  {
4041  	struct hostapd_iface *hapd_iface;
4042  	size_t i, j, k = 0;
4043  
4044  	for (i = 0; i < interfaces->count; i++) {
4045  		hapd_iface = interfaces->iface[i];
4046  		if (hapd_iface == NULL)
4047  			return -1;
4048  		if (!os_strcmp(hapd_iface->conf->bss[0]->iface, buf)) {
4049  			wpa_printf(MSG_INFO, "Remove interface '%s'", buf);
4050  			hapd_iface->driver_ap_teardown =
4051  				!!(hapd_iface->drv_flags &
4052  				   WPA_DRIVER_FLAGS_AP_TEARDOWN_SUPPORT);
4053  
4054  			hostapd_interface_deinit_free(hapd_iface);
4055  			k = i;
4056  			while (k < (interfaces->count - 1)) {
4057  				interfaces->iface[k] =
4058  					interfaces->iface[k + 1];
4059  				k++;
4060  			}
4061  			interfaces->count--;
4062  			hostapd_cleanup_unused_mlds(interfaces);
4063  
4064  			return 0;
4065  		}
4066  
4067  		for (j = 0; j < hapd_iface->conf->num_bss; j++) {
4068  			if (!os_strcmp(hapd_iface->conf->bss[j]->iface, buf)) {
4069  				hapd_iface->driver_ap_teardown =
4070  					!(hapd_iface->drv_flags &
4071  					  WPA_DRIVER_FLAGS_AP_TEARDOWN_SUPPORT);
4072  				return hostapd_remove_bss(hapd_iface, j);
4073  			}
4074  		}
4075  	}
4076  	return -1;
4077  }
4078  
4079  
4080  /**
4081   * hostapd_new_assoc_sta - Notify that a new station associated with the AP
4082   * @hapd: Pointer to BSS data
4083   * @sta: Pointer to the associated STA data
4084   * @reassoc: 1 to indicate this was a re-association; 0 = first association
4085   *
4086   * This function will be called whenever a station associates with the AP. It
4087   * can be called from ieee802_11.c for drivers that export MLME to hostapd and
4088   * from drv_callbacks.c based on driver events for drivers that take care of
4089   * management frames (IEEE 802.11 authentication and association) internally.
4090   */
hostapd_new_assoc_sta(struct hostapd_data * hapd,struct sta_info * sta,int reassoc)4091  void hostapd_new_assoc_sta(struct hostapd_data *hapd, struct sta_info *sta,
4092  			   int reassoc)
4093  {
4094  	if (hapd->tkip_countermeasures) {
4095  		hostapd_drv_sta_deauth(hapd, sta->addr,
4096  				       WLAN_REASON_MICHAEL_MIC_FAILURE);
4097  		return;
4098  	}
4099  
4100  #ifdef CONFIG_IEEE80211BE
4101  	if (ap_sta_is_mld(hapd, sta) &&
4102  	    sta->mld_assoc_link_id != hapd->mld_link_id)
4103  		return;
4104  #endif /* CONFIG_IEEE80211BE */
4105  
4106  	ap_sta_clear_disconnect_timeouts(hapd, sta);
4107  	ap_sta_clear_assoc_timeout(hapd, sta);
4108  
4109  #ifdef CONFIG_IEEE80211BE
4110  	if (ap_sta_is_mld(hapd, sta)) {
4111  		struct hostapd_data *bss;
4112  		struct sta_info *lsta;
4113  
4114  		for_each_mld_link(bss, hapd) {
4115  			if (bss == hapd)
4116  				continue;
4117  			lsta = ap_get_sta(bss, sta->addr);
4118  			if (lsta)
4119  				ap_sta_clear_assoc_timeout(bss, lsta);
4120  		}
4121  	}
4122  #endif /* CONFIG_IEEE80211BE */
4123  
4124  	sta->post_csa_sa_query = 0;
4125  
4126  #ifdef CONFIG_P2P
4127  	if (sta->p2p_ie == NULL && !sta->no_p2p_set) {
4128  		sta->no_p2p_set = 1;
4129  		hapd->num_sta_no_p2p++;
4130  		if (hapd->num_sta_no_p2p == 1)
4131  			hostapd_p2p_non_p2p_sta_connected(hapd);
4132  	}
4133  #endif /* CONFIG_P2P */
4134  
4135  	airtime_policy_new_sta(hapd, sta);
4136  
4137  	/* Start accounting here, if IEEE 802.1X and WPA are not used.
4138  	 * IEEE 802.1X/WPA code will start accounting after the station has
4139  	 * been authorized. */
4140  	if (!hapd->conf->ieee802_1x && !hapd->conf->wpa) {
4141  		if (ap_sta_set_authorized(hapd, sta, 1)) {
4142  			/* Update driver authorized flag for the STA to cover
4143  			 * the case where AP SME is in the driver and there is
4144  			 * no separate event for handling TX status event for
4145  			 * the (Re)Association Response frame. */
4146  			hostapd_set_sta_flags(hapd, sta);
4147  		}
4148  		os_get_reltime(&sta->connected_time);
4149  		accounting_sta_start(hapd, sta);
4150  	}
4151  
4152  	/* Start IEEE 802.1X authentication process for new stations */
4153  	ieee802_1x_new_station(hapd, sta);
4154  	if (reassoc) {
4155  		if (sta->auth_alg != WLAN_AUTH_FT &&
4156  		    sta->auth_alg != WLAN_AUTH_FILS_SK &&
4157  		    sta->auth_alg != WLAN_AUTH_FILS_SK_PFS &&
4158  		    sta->auth_alg != WLAN_AUTH_FILS_PK &&
4159  		    !(sta->flags & (WLAN_STA_WPS | WLAN_STA_MAYBE_WPS)))
4160  			wpa_auth_sm_event(sta->wpa_sm, WPA_REAUTH);
4161  	} else if (!(hapd->iface->drv_flags2 &
4162  		     WPA_DRIVER_FLAGS2_4WAY_HANDSHAKE_AP_PSK)) {
4163  		/* The 4-way handshake offloaded case will have this handled
4164  		 * based on the port authorized event. */
4165  		wpa_auth_sta_associated(hapd->wpa_auth, sta->wpa_sm);
4166  	}
4167  
4168  	if (hapd->iface->drv_flags & WPA_DRIVER_FLAGS_WIRED) {
4169  		if (eloop_cancel_timeout(ap_handle_timer, hapd, sta) > 0) {
4170  			wpa_printf(MSG_DEBUG,
4171  				   "%s: %s: canceled wired ap_handle_timer timeout for "
4172  				   MACSTR,
4173  				   hapd->conf->iface, __func__,
4174  				   MAC2STR(sta->addr));
4175  		}
4176  	} else if (!(hapd->iface->drv_flags &
4177  		     WPA_DRIVER_FLAGS_INACTIVITY_TIMER)) {
4178  		wpa_printf(MSG_DEBUG,
4179  			   "%s: %s: reschedule ap_handle_timer timeout for "
4180  			   MACSTR " (%d seconds - ap_max_inactivity)",
4181  			   hapd->conf->iface, __func__, MAC2STR(sta->addr),
4182  			   hapd->conf->ap_max_inactivity);
4183  		eloop_cancel_timeout(ap_handle_timer, hapd, sta);
4184  		eloop_register_timeout(hapd->conf->ap_max_inactivity, 0,
4185  				       ap_handle_timer, hapd, sta);
4186  	}
4187  
4188  #ifdef CONFIG_MACSEC
4189  	if (hapd->conf->wpa_key_mgmt == WPA_KEY_MGMT_NONE &&
4190  	    hapd->conf->mka_psk_set)
4191  		ieee802_1x_create_preshared_mka_hapd(hapd, sta);
4192  	else
4193  		ieee802_1x_alloc_kay_sm_hapd(hapd, sta);
4194  #endif /* CONFIG_MACSEC */
4195  }
4196  
4197  
hostapd_state_text(enum hostapd_iface_state s)4198  const char * hostapd_state_text(enum hostapd_iface_state s)
4199  {
4200  	switch (s) {
4201  	case HAPD_IFACE_UNINITIALIZED:
4202  		return "UNINITIALIZED";
4203  	case HAPD_IFACE_DISABLED:
4204  		return "DISABLED";
4205  	case HAPD_IFACE_COUNTRY_UPDATE:
4206  		return "COUNTRY_UPDATE";
4207  	case HAPD_IFACE_ACS:
4208  		return "ACS";
4209  	case HAPD_IFACE_HT_SCAN:
4210  		return "HT_SCAN";
4211  	case HAPD_IFACE_DFS:
4212  		return "DFS";
4213  	case HAPD_IFACE_ENABLED:
4214  		return "ENABLED";
4215  	case HAPD_IFACE_NO_IR:
4216  		return "NO_IR";
4217  	}
4218  
4219  	return "UNKNOWN";
4220  }
4221  
4222  
hostapd_set_state(struct hostapd_iface * iface,enum hostapd_iface_state s)4223  void hostapd_set_state(struct hostapd_iface *iface, enum hostapd_iface_state s)
4224  {
4225  	wpa_printf(MSG_INFO, "%s: interface state %s->%s",
4226  		   iface->conf ? iface->conf->bss[0]->iface : "N/A",
4227  		   hostapd_state_text(iface->state), hostapd_state_text(s));
4228  	iface->state = s;
4229  }
4230  
4231  
hostapd_csa_in_progress(struct hostapd_iface * iface)4232  int hostapd_csa_in_progress(struct hostapd_iface *iface)
4233  {
4234  	unsigned int i;
4235  
4236  	for (i = 0; i < iface->num_bss; i++)
4237  		if (iface->bss[i]->csa_in_progress)
4238  			return 1;
4239  	return 0;
4240  }
4241  
4242  
4243  #ifdef NEED_AP_MLME
4244  
free_beacon_data(struct beacon_data * beacon)4245  void free_beacon_data(struct beacon_data *beacon)
4246  {
4247  	os_free(beacon->head);
4248  	beacon->head = NULL;
4249  	os_free(beacon->tail);
4250  	beacon->tail = NULL;
4251  	os_free(beacon->probe_resp);
4252  	beacon->probe_resp = NULL;
4253  	os_free(beacon->beacon_ies);
4254  	beacon->beacon_ies = NULL;
4255  	os_free(beacon->proberesp_ies);
4256  	beacon->proberesp_ies = NULL;
4257  	os_free(beacon->assocresp_ies);
4258  	beacon->assocresp_ies = NULL;
4259  }
4260  
4261  
hostapd_build_beacon_data(struct hostapd_data * hapd,struct beacon_data * beacon)4262  int hostapd_build_beacon_data(struct hostapd_data *hapd,
4263  			      struct beacon_data *beacon)
4264  {
4265  	struct wpabuf *beacon_extra, *proberesp_extra, *assocresp_extra;
4266  	struct wpa_driver_ap_params params;
4267  	int ret;
4268  
4269  	os_memset(beacon, 0, sizeof(*beacon));
4270  	ret = ieee802_11_build_ap_params(hapd, &params);
4271  	if (ret < 0)
4272  		return ret;
4273  
4274  	ret = hostapd_build_ap_extra_ies(hapd, &beacon_extra,
4275  					 &proberesp_extra,
4276  					 &assocresp_extra);
4277  	if (ret)
4278  		goto free_ap_params;
4279  
4280  	ret = -1;
4281  	beacon->head = os_memdup(params.head, params.head_len);
4282  	if (!beacon->head)
4283  		goto free_ap_extra_ies;
4284  
4285  	beacon->head_len = params.head_len;
4286  
4287  	beacon->tail = os_memdup(params.tail, params.tail_len);
4288  	if (!beacon->tail)
4289  		goto free_beacon;
4290  
4291  	beacon->tail_len = params.tail_len;
4292  
4293  	if (params.proberesp != NULL) {
4294  		beacon->probe_resp = os_memdup(params.proberesp,
4295  					       params.proberesp_len);
4296  		if (!beacon->probe_resp)
4297  			goto free_beacon;
4298  
4299  		beacon->probe_resp_len = params.proberesp_len;
4300  	}
4301  
4302  	/* copy the extra ies */
4303  	if (beacon_extra) {
4304  		beacon->beacon_ies = os_memdup(beacon_extra->buf,
4305  					       wpabuf_len(beacon_extra));
4306  		if (!beacon->beacon_ies)
4307  			goto free_beacon;
4308  
4309  		beacon->beacon_ies_len = wpabuf_len(beacon_extra);
4310  	}
4311  
4312  	if (proberesp_extra) {
4313  		beacon->proberesp_ies = os_memdup(proberesp_extra->buf,
4314  						  wpabuf_len(proberesp_extra));
4315  		if (!beacon->proberesp_ies)
4316  			goto free_beacon;
4317  
4318  		beacon->proberesp_ies_len = wpabuf_len(proberesp_extra);
4319  	}
4320  
4321  	if (assocresp_extra) {
4322  		beacon->assocresp_ies = os_memdup(assocresp_extra->buf,
4323  						  wpabuf_len(assocresp_extra));
4324  		if (!beacon->assocresp_ies)
4325  			goto free_beacon;
4326  
4327  		beacon->assocresp_ies_len = wpabuf_len(assocresp_extra);
4328  	}
4329  
4330  	ret = 0;
4331  free_beacon:
4332  	/* if the function fails, the caller should not free beacon data */
4333  	if (ret)
4334  		free_beacon_data(beacon);
4335  
4336  free_ap_extra_ies:
4337  	hostapd_free_ap_extra_ies(hapd, beacon_extra, proberesp_extra,
4338  				  assocresp_extra);
4339  free_ap_params:
4340  	ieee802_11_free_ap_params(&params);
4341  	return ret;
4342  }
4343  
4344  
4345  /*
4346   * TODO: This flow currently supports only changing channel and width within
4347   * the same hw_mode. Any other changes to MAC parameters or provided settings
4348   * are not supported.
4349   */
hostapd_change_config_freq(struct hostapd_data * hapd,struct hostapd_config * conf,struct hostapd_freq_params * params,struct hostapd_freq_params * old_params)4350  static int hostapd_change_config_freq(struct hostapd_data *hapd,
4351  				      struct hostapd_config *conf,
4352  				      struct hostapd_freq_params *params,
4353  				      struct hostapd_freq_params *old_params)
4354  {
4355  	int channel;
4356  	u8 seg0 = 0, seg1 = 0;
4357  	struct hostapd_hw_modes *mode;
4358  
4359  	if (!params->channel) {
4360  		/* check if the new channel is supported by hw */
4361  		params->channel = hostapd_hw_get_channel(hapd, params->freq);
4362  	}
4363  
4364  	channel = params->channel;
4365  	if (!channel)
4366  		return -1;
4367  
4368  	hostapd_determine_mode(hapd->iface);
4369  	mode = hapd->iface->current_mode;
4370  
4371  	/* if a pointer to old_params is provided we save previous state */
4372  	if (old_params &&
4373  	    hostapd_set_freq_params(old_params, conf->hw_mode,
4374  				    hostapd_hw_get_freq(hapd, conf->channel),
4375  				    conf->channel, conf->enable_edmg,
4376  				    conf->edmg_channel, conf->ieee80211n,
4377  				    conf->ieee80211ac, conf->ieee80211ax,
4378  				    conf->ieee80211be, conf->secondary_channel,
4379  				    hostapd_get_oper_chwidth(conf),
4380  				    hostapd_get_oper_centr_freq_seg0_idx(conf),
4381  				    hostapd_get_oper_centr_freq_seg1_idx(conf),
4382  				    conf->vht_capab,
4383  				    mode ? &mode->he_capab[IEEE80211_MODE_AP] :
4384  				    NULL,
4385  				    mode ? &mode->eht_capab[IEEE80211_MODE_AP] :
4386  				    NULL,
4387  				    hostapd_get_punct_bitmap(hapd)))
4388  		return -1;
4389  
4390  	switch (params->bandwidth) {
4391  	case 0:
4392  	case 20:
4393  		conf->ht_capab &= ~HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET;
4394  		break;
4395  	case 40:
4396  	case 80:
4397  	case 160:
4398  	case 320:
4399  		conf->ht_capab |= HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET;
4400  		break;
4401  	default:
4402  		return -1;
4403  	}
4404  
4405  	switch (params->bandwidth) {
4406  	case 0:
4407  	case 20:
4408  	case 40:
4409  		hostapd_set_oper_chwidth(conf, CONF_OPER_CHWIDTH_USE_HT);
4410  		break;
4411  	case 80:
4412  		if (params->center_freq2)
4413  			hostapd_set_oper_chwidth(conf,
4414  						 CONF_OPER_CHWIDTH_80P80MHZ);
4415  		else
4416  			hostapd_set_oper_chwidth(conf,
4417  						 CONF_OPER_CHWIDTH_80MHZ);
4418  		break;
4419  	case 160:
4420  		hostapd_set_oper_chwidth(conf, CONF_OPER_CHWIDTH_160MHZ);
4421  		break;
4422  	case 320:
4423  		hostapd_set_oper_chwidth(conf, CONF_OPER_CHWIDTH_320MHZ);
4424  		break;
4425  	default:
4426  		return -1;
4427  	}
4428  
4429  	conf->channel = channel;
4430  	conf->ieee80211n = params->ht_enabled;
4431  	conf->ieee80211ac = params->vht_enabled;
4432  	conf->secondary_channel = params->sec_channel_offset;
4433  	if (params->center_freq1 &&
4434  	    ieee80211_freq_to_chan(params->center_freq1, &seg0) ==
4435  	    NUM_HOSTAPD_MODES)
4436  		return -1;
4437  	if (params->center_freq2 &&
4438  	    ieee80211_freq_to_chan(params->center_freq2,
4439  				   &seg1) == NUM_HOSTAPD_MODES)
4440  		return -1;
4441  	hostapd_set_oper_centr_freq_seg0_idx(conf, seg0);
4442  	hostapd_set_oper_centr_freq_seg1_idx(conf, seg1);
4443  
4444  #ifdef CONFIG_IEEE80211BE
4445  	conf->punct_bitmap = params->punct_bitmap;
4446  #endif /* CONFIG_IEEE80211BE */
4447  
4448  	/* TODO: maybe call here hostapd_config_check here? */
4449  
4450  	return 0;
4451  }
4452  
4453  
hostapd_fill_csa_settings(struct hostapd_data * hapd,struct csa_settings * settings)4454  static int hostapd_fill_csa_settings(struct hostapd_data *hapd,
4455  				     struct csa_settings *settings)
4456  {
4457  	struct hostapd_iface *iface = hapd->iface;
4458  	struct hostapd_freq_params old_freq;
4459  	int ret;
4460  	u8 chan, bandwidth;
4461  
4462  	os_memset(&old_freq, 0, sizeof(old_freq));
4463  	if (!iface || !iface->freq || hapd->csa_in_progress)
4464  		return -1;
4465  
4466  	switch (settings->freq_params.bandwidth) {
4467  	case 80:
4468  		if (settings->freq_params.center_freq2)
4469  			bandwidth = CONF_OPER_CHWIDTH_80P80MHZ;
4470  		else
4471  			bandwidth = CONF_OPER_CHWIDTH_80MHZ;
4472  		break;
4473  	case 160:
4474  		bandwidth = CONF_OPER_CHWIDTH_160MHZ;
4475  		break;
4476  	case 320:
4477  		bandwidth = CONF_OPER_CHWIDTH_320MHZ;
4478  		break;
4479  	default:
4480  		bandwidth = CONF_OPER_CHWIDTH_USE_HT;
4481  		break;
4482  	}
4483  
4484  	if (ieee80211_freq_to_channel_ext(
4485  		    settings->freq_params.freq,
4486  		    settings->freq_params.sec_channel_offset,
4487  		    bandwidth,
4488  		    &hapd->iface->cs_oper_class,
4489  		    &chan) == NUM_HOSTAPD_MODES) {
4490  		wpa_printf(MSG_DEBUG,
4491  			   "invalid frequency for channel switch (freq=%d, sec_channel_offset=%d, vht_enabled=%d, he_enabled=%d, eht_enabled=%d)",
4492  			   settings->freq_params.freq,
4493  			   settings->freq_params.sec_channel_offset,
4494  			   settings->freq_params.vht_enabled,
4495  			   settings->freq_params.he_enabled,
4496  			   settings->freq_params.eht_enabled);
4497  		return -1;
4498  	}
4499  
4500  	settings->freq_params.channel = chan;
4501  
4502  	ret = hostapd_change_config_freq(iface->bss[0], iface->conf,
4503  					 &settings->freq_params,
4504  					 &old_freq);
4505  	if (ret)
4506  		return ret;
4507  
4508  	ret = hostapd_build_beacon_data(hapd, &settings->beacon_after);
4509  
4510  	/* change back the configuration */
4511  	hostapd_change_config_freq(iface->bss[0], iface->conf,
4512  				   &old_freq, NULL);
4513  
4514  	if (ret)
4515  		return ret;
4516  
4517  	/* set channel switch parameters for csa ie */
4518  	hapd->cs_freq_params = settings->freq_params;
4519  	hapd->cs_count = settings->cs_count;
4520  	hapd->cs_block_tx = settings->block_tx;
4521  
4522  	ret = hostapd_build_beacon_data(hapd, &settings->beacon_csa);
4523  	if (ret) {
4524  		free_beacon_data(&settings->beacon_after);
4525  		return ret;
4526  	}
4527  
4528  	settings->counter_offset_beacon[0] = hapd->cs_c_off_beacon;
4529  	settings->counter_offset_presp[0] = hapd->cs_c_off_proberesp;
4530  	settings->counter_offset_beacon[1] = hapd->cs_c_off_ecsa_beacon;
4531  	settings->counter_offset_presp[1] = hapd->cs_c_off_ecsa_proberesp;
4532  	settings->link_id = -1;
4533  #ifdef CONFIG_IEEE80211BE
4534  	if (hapd->conf->mld_ap)
4535  		settings->link_id = hapd->mld_link_id;
4536  #endif /* CONFIG_IEEE80211BE */
4537  
4538  #ifdef CONFIG_IEEE80211AX
4539  	settings->ubpr.unsol_bcast_probe_resp_tmpl =
4540  		hostapd_unsol_bcast_probe_resp(hapd, &settings->ubpr);
4541  #endif /* CONFIG_IEEE80211AX */
4542  
4543  	return 0;
4544  }
4545  
4546  
hostapd_cleanup_cs_params(struct hostapd_data * hapd)4547  void hostapd_cleanup_cs_params(struct hostapd_data *hapd)
4548  {
4549  	os_memset(&hapd->cs_freq_params, 0, sizeof(hapd->cs_freq_params));
4550  	hapd->cs_count = 0;
4551  	hapd->cs_block_tx = 0;
4552  	hapd->cs_c_off_beacon = 0;
4553  	hapd->cs_c_off_proberesp = 0;
4554  	hapd->csa_in_progress = 0;
4555  	hapd->cs_c_off_ecsa_beacon = 0;
4556  	hapd->cs_c_off_ecsa_proberesp = 0;
4557  }
4558  
4559  
hostapd_chan_switch_config(struct hostapd_data * hapd,struct hostapd_freq_params * freq_params)4560  void hostapd_chan_switch_config(struct hostapd_data *hapd,
4561  				struct hostapd_freq_params *freq_params)
4562  {
4563  	if (freq_params->eht_enabled)
4564  		hapd->iconf->ch_switch_eht_config |= CH_SWITCH_EHT_ENABLED;
4565  	else
4566  		hapd->iconf->ch_switch_eht_config |= CH_SWITCH_EHT_DISABLED;
4567  
4568  	if (freq_params->he_enabled)
4569  		hapd->iconf->ch_switch_he_config |= CH_SWITCH_HE_ENABLED;
4570  	else
4571  		hapd->iconf->ch_switch_he_config |= CH_SWITCH_HE_DISABLED;
4572  
4573  	if (freq_params->vht_enabled)
4574  		hapd->iconf->ch_switch_vht_config |= CH_SWITCH_VHT_ENABLED;
4575  	else
4576  		hapd->iconf->ch_switch_vht_config |= CH_SWITCH_VHT_DISABLED;
4577  
4578  	hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
4579  		       HOSTAPD_LEVEL_INFO,
4580  		       "CHAN_SWITCH EHT config 0x%x HE config 0x%x VHT config 0x%x",
4581  		       hapd->iconf->ch_switch_eht_config,
4582  		       hapd->iconf->ch_switch_he_config,
4583  		       hapd->iconf->ch_switch_vht_config);
4584  }
4585  
4586  
hostapd_switch_channel(struct hostapd_data * hapd,struct csa_settings * settings)4587  int hostapd_switch_channel(struct hostapd_data *hapd,
4588  			   struct csa_settings *settings)
4589  {
4590  	int ret;
4591  
4592  	if (!(hapd->iface->drv_flags & WPA_DRIVER_FLAGS_AP_CSA)) {
4593  		wpa_printf(MSG_INFO, "CSA is not supported");
4594  		return -1;
4595  	}
4596  
4597  	ret = hostapd_fill_csa_settings(hapd, settings);
4598  	if (ret)
4599  		return ret;
4600  
4601  	ret = hostapd_drv_switch_channel(hapd, settings);
4602  	free_beacon_data(&settings->beacon_csa);
4603  	free_beacon_data(&settings->beacon_after);
4604  #ifdef CONFIG_IEEE80211AX
4605  	os_free(settings->ubpr.unsol_bcast_probe_resp_tmpl);
4606  #endif /* CONFIG_IEEE80211AX */
4607  
4608  	if (ret) {
4609  		/* if we failed, clean cs parameters */
4610  		hostapd_cleanup_cs_params(hapd);
4611  		return ret;
4612  	}
4613  
4614  	hapd->csa_in_progress = 1;
4615  	return 0;
4616  }
4617  
4618  
hostapd_force_channel_switch(struct hostapd_iface * iface,struct csa_settings * settings)4619  int hostapd_force_channel_switch(struct hostapd_iface *iface,
4620  				 struct csa_settings *settings)
4621  {
4622  	int ret = 0;
4623  
4624  	if (!settings->freq_params.channel) {
4625  		/* Check if the new channel is supported */
4626  		settings->freq_params.channel = hostapd_hw_get_channel(
4627  			iface->bss[0], settings->freq_params.freq);
4628  		if (!settings->freq_params.channel)
4629  			return -1;
4630  	}
4631  
4632  	ret = hostapd_disable_iface(iface);
4633  	if (ret) {
4634  		wpa_printf(MSG_DEBUG, "Failed to disable the interface");
4635  		return ret;
4636  	}
4637  
4638  	hostapd_chan_switch_config(iface->bss[0], &settings->freq_params);
4639  	ret = hostapd_change_config_freq(iface->bss[0], iface->conf,
4640  					 &settings->freq_params, NULL);
4641  	if (ret) {
4642  		wpa_printf(MSG_DEBUG,
4643  			   "Failed to set the new channel in config");
4644  		return ret;
4645  	}
4646  
4647  	ret = hostapd_enable_iface(iface);
4648  	if (ret)
4649  		wpa_printf(MSG_DEBUG, "Failed to enable the interface");
4650  
4651  	return ret;
4652  }
4653  
4654  
4655  void
hostapd_switch_channel_fallback(struct hostapd_iface * iface,const struct hostapd_freq_params * freq_params)4656  hostapd_switch_channel_fallback(struct hostapd_iface *iface,
4657  				const struct hostapd_freq_params *freq_params)
4658  {
4659  	u8 seg0_idx = 0, seg1_idx = 0;
4660  	enum oper_chan_width bw = CONF_OPER_CHWIDTH_USE_HT;
4661  	u8 op_class, chan = 0;
4662  
4663  	wpa_printf(MSG_DEBUG, "Restarting all CSA-related BSSes");
4664  
4665  	if (freq_params->center_freq1)
4666  		ieee80211_freq_to_chan(freq_params->center_freq1, &seg0_idx);
4667  	if (freq_params->center_freq2)
4668  		ieee80211_freq_to_chan(freq_params->center_freq2, &seg1_idx);
4669  
4670  	switch (freq_params->bandwidth) {
4671  	case 0:
4672  	case 20:
4673  	case 40:
4674  		bw = CONF_OPER_CHWIDTH_USE_HT;
4675  		break;
4676  	case 80:
4677  		if (freq_params->center_freq2) {
4678  			bw = CONF_OPER_CHWIDTH_80P80MHZ;
4679  			iface->conf->vht_capab |=
4680  				VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ;
4681  		} else {
4682  			bw = CONF_OPER_CHWIDTH_80MHZ;
4683  		}
4684  		break;
4685  	case 160:
4686  		bw = CONF_OPER_CHWIDTH_160MHZ;
4687  		iface->conf->vht_capab |= VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
4688  		break;
4689  	case 320:
4690  		bw = CONF_OPER_CHWIDTH_320MHZ;
4691  		break;
4692  	default:
4693  		wpa_printf(MSG_WARNING, "Unknown CSA bandwidth: %d",
4694  			   freq_params->bandwidth);
4695  		break;
4696  	}
4697  
4698  	iface->freq = freq_params->freq;
4699  	iface->conf->channel = freq_params->channel;
4700  	iface->conf->secondary_channel = freq_params->sec_channel_offset;
4701  	if (ieee80211_freq_to_channel_ext(freq_params->freq,
4702  					  freq_params->sec_channel_offset, bw,
4703  					  &op_class, &chan) ==
4704  	    NUM_HOSTAPD_MODES ||
4705  	    chan != freq_params->channel)
4706  		wpa_printf(MSG_INFO, "CSA: Channel mismatch: %d -> %d",
4707  			   freq_params->channel, chan);
4708  
4709  	iface->conf->op_class = op_class;
4710  	hostapd_set_oper_centr_freq_seg0_idx(iface->conf, seg0_idx);
4711  	hostapd_set_oper_centr_freq_seg1_idx(iface->conf, seg1_idx);
4712  	hostapd_set_oper_chwidth(iface->conf, bw);
4713  	iface->conf->ieee80211n = freq_params->ht_enabled;
4714  	iface->conf->ieee80211ac = freq_params->vht_enabled;
4715  	iface->conf->ieee80211ax = freq_params->he_enabled;
4716  	iface->conf->ieee80211be = freq_params->eht_enabled;
4717  
4718  	/*
4719  	 * cs_params must not be cleared earlier because the freq_params
4720  	 * argument may actually point to one of these.
4721  	 * These params will be cleared during interface disable below.
4722  	 */
4723  	hostapd_disable_iface(iface);
4724  	hostapd_enable_iface(iface);
4725  }
4726  
4727  
4728  #ifdef CONFIG_IEEE80211AX
4729  
hostapd_cleanup_cca_params(struct hostapd_data * hapd)4730  void hostapd_cleanup_cca_params(struct hostapd_data *hapd)
4731  {
4732  	hapd->cca_count = 0;
4733  	hapd->cca_color = 0;
4734  	hapd->cca_c_off_beacon = 0;
4735  	hapd->cca_c_off_proberesp = 0;
4736  	hapd->cca_in_progress = false;
4737  }
4738  
4739  
hostapd_fill_cca_settings(struct hostapd_data * hapd,struct cca_settings * settings)4740  int hostapd_fill_cca_settings(struct hostapd_data *hapd,
4741  			      struct cca_settings *settings)
4742  {
4743  	struct hostapd_iface *iface = hapd->iface;
4744  	u8 old_color;
4745  	int ret;
4746  
4747  	if (!iface || iface->conf->he_op.he_bss_color_disabled)
4748  		return -1;
4749  
4750  	settings->link_id = -1;
4751  #ifdef CONFIG_IEEE80211BE
4752  	if (hapd->conf->mld_ap)
4753  		settings->link_id = hapd->mld_link_id;
4754  #endif /* CONFIG_IEEE80211BE */
4755  
4756  	old_color = iface->conf->he_op.he_bss_color;
4757  	iface->conf->he_op.he_bss_color = hapd->cca_color;
4758  	ret = hostapd_build_beacon_data(hapd, &settings->beacon_after);
4759  	if (ret)
4760  		return ret;
4761  
4762  	iface->conf->he_op.he_bss_color = old_color;
4763  
4764  	settings->cca_count = hapd->cca_count;
4765  	settings->cca_color = hapd->cca_color,
4766  	hapd->cca_in_progress = true;
4767  
4768  	ret = hostapd_build_beacon_data(hapd, &settings->beacon_cca);
4769  	if (ret) {
4770  		free_beacon_data(&settings->beacon_after);
4771  		return ret;
4772  	}
4773  
4774  	settings->ubpr.unsol_bcast_probe_resp_tmpl =
4775  		hostapd_unsol_bcast_probe_resp(hapd, &settings->ubpr);
4776  
4777  	settings->counter_offset_beacon = hapd->cca_c_off_beacon;
4778  	settings->counter_offset_presp = hapd->cca_c_off_proberesp;
4779  
4780  	return 0;
4781  }
4782  
4783  
hostapd_switch_color_timeout_handler(void * eloop_data,void * user_ctx)4784  static void hostapd_switch_color_timeout_handler(void *eloop_data,
4785  						 void *user_ctx)
4786  {
4787  	struct hostapd_data *hapd = (struct hostapd_data *) eloop_data;
4788  	os_time_t delta_t;
4789  	unsigned int b;
4790  	int i, r;
4791  
4792  	 /* CCA can be triggered once the handler constantly receives
4793  	  * color collision events to for at least
4794  	  * DOT11BSS_COLOR_COLLISION_AP_PERIOD (50 s by default). */
4795  	delta_t = hapd->last_color_collision.sec -
4796  		hapd->first_color_collision.sec;
4797  	if (delta_t < DOT11BSS_COLOR_COLLISION_AP_PERIOD)
4798  		return;
4799  
4800  	r = os_random() % HE_OPERATION_BSS_COLOR_MAX;
4801  	for (i = 0; i < HE_OPERATION_BSS_COLOR_MAX; i++) {
4802  		if (r && !(hapd->color_collision_bitmap & (1ULL << r)))
4803  			break;
4804  
4805  		r = (r + 1) % HE_OPERATION_BSS_COLOR_MAX;
4806  	}
4807  
4808  	if (i == HE_OPERATION_BSS_COLOR_MAX) {
4809  		/* There are no free colors so turn BSS coloring off */
4810  		wpa_printf(MSG_INFO,
4811  			   "No free colors left, turning off BSS coloring");
4812  		hapd->iface->conf->he_op.he_bss_color_disabled = 1;
4813  		hapd->iface->conf->he_op.he_bss_color = os_random() % 63 + 1;
4814  		for (b = 0; b < hapd->iface->num_bss; b++)
4815  			ieee802_11_set_beacon(hapd->iface->bss[b]);
4816  		return;
4817  	}
4818  
4819  	for (b = 0; b < hapd->iface->num_bss; b++) {
4820  		struct hostapd_data *bss = hapd->iface->bss[b];
4821  		struct cca_settings settings;
4822  		int ret;
4823  
4824  		os_memset(&settings, 0, sizeof(settings));
4825  		hostapd_cleanup_cca_params(bss);
4826  		bss->cca_color = r;
4827  		bss->cca_count = 10;
4828  
4829  		if (hostapd_fill_cca_settings(bss, &settings)) {
4830  			hostapd_cleanup_cca_params(bss);
4831  			continue;
4832  		}
4833  
4834  		ret = hostapd_drv_switch_color(bss, &settings);
4835  		if (ret)
4836  			hostapd_cleanup_cca_params(bss);
4837  
4838  		free_beacon_data(&settings.beacon_cca);
4839  		free_beacon_data(&settings.beacon_after);
4840  		os_free(settings.ubpr.unsol_bcast_probe_resp_tmpl);
4841  	}
4842  }
4843  
4844  
hostapd_switch_color(struct hostapd_data * hapd,u64 bitmap)4845  void hostapd_switch_color(struct hostapd_data *hapd, u64 bitmap)
4846  {
4847  	struct os_reltime now;
4848  
4849  	if (hapd->cca_in_progress)
4850  		return;
4851  
4852  	if (os_get_reltime(&now))
4853  		return;
4854  
4855  	hapd->color_collision_bitmap = bitmap;
4856  	hapd->last_color_collision = now;
4857  
4858  	if (eloop_is_timeout_registered(hostapd_switch_color_timeout_handler,
4859  					hapd, NULL))
4860  		return;
4861  
4862  	hapd->first_color_collision = now;
4863  	/* 10 s window as margin for persistent color collision reporting */
4864  	eloop_register_timeout(DOT11BSS_COLOR_COLLISION_AP_PERIOD + 10, 0,
4865  			       hostapd_switch_color_timeout_handler,
4866  			       hapd, NULL);
4867  }
4868  
4869  #endif /* CONFIG_IEEE80211AX */
4870  
4871  #endif /* NEED_AP_MLME */
4872  
4873  
hostapd_get_iface(struct hapd_interfaces * interfaces,const char * ifname)4874  struct hostapd_data * hostapd_get_iface(struct hapd_interfaces *interfaces,
4875  					const char *ifname)
4876  {
4877  	size_t i, j;
4878  
4879  	for (i = 0; i < interfaces->count; i++) {
4880  		struct hostapd_iface *iface = interfaces->iface[i];
4881  
4882  		for (j = 0; j < iface->num_bss; j++) {
4883  			struct hostapd_data *hapd = iface->bss[j];
4884  
4885  			if (os_strcmp(ifname, hapd->conf->iface) == 0)
4886  				return hapd;
4887  		}
4888  	}
4889  
4890  	return NULL;
4891  }
4892  
4893  
hostapd_periodic_iface(struct hostapd_iface * iface)4894  void hostapd_periodic_iface(struct hostapd_iface *iface)
4895  {
4896  	size_t i;
4897  
4898  	ap_list_timer(iface);
4899  
4900  	for (i = 0; i < iface->num_bss; i++) {
4901  		struct hostapd_data *hapd = iface->bss[i];
4902  
4903  		if (!hapd->started)
4904  			continue;
4905  
4906  #ifndef CONFIG_NO_RADIUS
4907  		hostapd_acl_expire(hapd);
4908  #endif /* CONFIG_NO_RADIUS */
4909  	}
4910  }
4911  
4912  
4913  #ifdef CONFIG_OCV
hostapd_ocv_check_csa_sa_query(void * eloop_ctx,void * timeout_ctx)4914  void hostapd_ocv_check_csa_sa_query(void *eloop_ctx, void *timeout_ctx)
4915  {
4916  	struct hostapd_data *hapd = eloop_ctx;
4917  	struct sta_info *sta;
4918  
4919  	wpa_printf(MSG_DEBUG, "OCV: Post-CSA SA Query initiation check");
4920  
4921  	for (sta = hapd->sta_list; sta; sta = sta->next) {
4922  		if (!sta->post_csa_sa_query)
4923  			continue;
4924  
4925  		wpa_printf(MSG_DEBUG, "OCV: OCVC STA " MACSTR
4926  			   " did not start SA Query after CSA - disconnect",
4927  			   MAC2STR(sta->addr));
4928  		ap_sta_disconnect(hapd, sta, sta->addr,
4929  				  WLAN_REASON_PREV_AUTH_NOT_VALID);
4930  	}
4931  }
4932  #endif /* CONFIG_OCV */
4933  
4934  
4935  #ifdef CONFIG_IEEE80211BE
4936  
hostapd_mld_get_link_bss(struct hostapd_data * hapd,u8 link_id)4937  struct hostapd_data * hostapd_mld_get_link_bss(struct hostapd_data *hapd,
4938  					       u8 link_id)
4939  {
4940  	struct hostapd_iface *iface;
4941  	struct hostapd_data *bss;
4942  	unsigned int i, j;
4943  
4944  	for (i = 0; i < hapd->iface->interfaces->count; i++) {
4945  		iface = hapd->iface->interfaces->iface[i];
4946  		if (!iface)
4947  			continue;
4948  
4949  		for (j = 0; j < iface->num_bss; j++) {
4950  			bss = iface->bss[j];
4951  
4952  			if (!bss->conf->mld_ap ||
4953  			    !hostapd_is_ml_partner(hapd, bss))
4954  				continue;
4955  
4956  			if (!bss->drv_priv)
4957  				continue;
4958  
4959  			if (bss->mld_link_id == link_id)
4960  				return bss;
4961  		}
4962  	}
4963  
4964  	return NULL;
4965  }
4966  
4967  
hostapd_is_ml_partner(struct hostapd_data * hapd1,struct hostapd_data * hapd2)4968  bool hostapd_is_ml_partner(struct hostapd_data *hapd1,
4969  			   struct hostapd_data *hapd2)
4970  {
4971  	if (!hapd1->conf->mld_ap || !hapd2->conf->mld_ap)
4972  		return false;
4973  
4974  	return !os_strcmp(hapd1->conf->iface, hapd2->conf->iface);
4975  }
4976  
4977  
hostapd_get_mld_id(struct hostapd_data * hapd)4978  u8 hostapd_get_mld_id(struct hostapd_data *hapd)
4979  {
4980  	if (!hapd->conf->mld_ap)
4981  		return 255;
4982  
4983  	/* MLD ID 0 represents self */
4984  	return 0;
4985  
4986  	/* TODO: MLD ID for Multiple BSS cases */
4987  }
4988  
4989  
hostapd_mld_add_link(struct hostapd_data * hapd)4990  int hostapd_mld_add_link(struct hostapd_data *hapd)
4991  {
4992  	struct hostapd_mld *mld = hapd->mld;
4993  
4994  	if (!hapd->conf->mld_ap)
4995  		return 0;
4996  
4997  	/* Should not happen */
4998  	if (!mld)
4999  		return -1;
5000  
5001  	dl_list_add_tail(&mld->links, &hapd->link);
5002  	mld->num_links++;
5003  
5004  	wpa_printf(MSG_DEBUG, "AP MLD %s: Link ID %d added. num_links: %d",
5005  		   mld->name, hapd->mld_link_id, mld->num_links);
5006  
5007  	if (mld->fbss)
5008  		return 0;
5009  
5010  	mld->fbss = hapd;
5011  	wpa_printf(MSG_DEBUG, "AP MLD %s: First link BSS set to %p",
5012  		   mld->name, mld->fbss);
5013  	return 0;
5014  }
5015  
5016  
hostapd_mld_remove_link(struct hostapd_data * hapd)5017  int hostapd_mld_remove_link(struct hostapd_data *hapd)
5018  {
5019  	struct hostapd_mld *mld = hapd->mld;
5020  	struct hostapd_data *next_fbss;
5021  
5022  	if (!hapd->conf->mld_ap)
5023  		return 0;
5024  
5025  	/* Should not happen */
5026  	if (!mld)
5027  		return -1;
5028  
5029  	dl_list_del(&hapd->link);
5030  	mld->num_links--;
5031  
5032  	wpa_printf(MSG_DEBUG, "AP MLD %s: Link ID %d removed. num_links: %d",
5033  		   mld->name, hapd->mld_link_id, mld->num_links);
5034  
5035  	if (mld->fbss != hapd)
5036  		return 0;
5037  
5038  	/* If the list is empty, all links are removed */
5039  	if (dl_list_empty(&mld->links)) {
5040  		mld->fbss = NULL;
5041  	} else {
5042  		next_fbss = dl_list_entry(mld->links.next, struct hostapd_data,
5043  					  link);
5044  		mld->fbss = next_fbss;
5045  	}
5046  
5047  	wpa_printf(MSG_DEBUG, "AP MLD %s: First link BSS set to %p",
5048  		   mld->name, mld->fbss);
5049  	return 0;
5050  }
5051  
5052  
hostapd_mld_is_first_bss(struct hostapd_data * hapd)5053  bool hostapd_mld_is_first_bss(struct hostapd_data *hapd)
5054  {
5055  	struct hostapd_mld *mld = hapd->mld;
5056  
5057  	if (!hapd->conf->mld_ap)
5058  		return true;
5059  
5060  	/* Should not happen */
5061  	if (!mld)
5062  		return false;
5063  
5064  	/* If fbss is not set, it is safe to assume the caller is the first BSS.
5065  	 */
5066  	if (!mld->fbss)
5067  		return true;
5068  
5069  	return hapd == mld->fbss;
5070  }
5071  
5072  
hostapd_mld_get_first_bss(struct hostapd_data * hapd)5073  struct hostapd_data * hostapd_mld_get_first_bss(struct hostapd_data *hapd)
5074  {
5075  	struct hostapd_mld *mld = hapd->mld;
5076  
5077  	if (!hapd->conf->mld_ap)
5078  		return NULL;
5079  
5080  	/* Should not happen */
5081  	if (!mld)
5082  		return NULL;
5083  
5084  	return mld->fbss;
5085  }
5086  
5087  
hostapd_mld_interface_freed(struct hostapd_data * hapd)5088  void hostapd_mld_interface_freed(struct hostapd_data *hapd)
5089  {
5090  	struct hostapd_data *link_bss = NULL;
5091  
5092  	if (!hapd || !hapd->conf->mld_ap)
5093  		return;
5094  
5095  	for_each_mld_link(link_bss, hapd)
5096  		link_bss->drv_priv = NULL;
5097  }
5098  
5099  
5100  /* Return the number of currently active links, not counting the calling link
5101   * (i.e., a value that is suitable to be used as-is in fields that use encoding
5102   * of the value minus 1). */
hostapd_get_active_links(struct hostapd_data * hapd)5103  u8 hostapd_get_active_links(struct hostapd_data *hapd)
5104  {
5105  	struct hostapd_data *link_bss;
5106  	u8 active_links = 0;
5107  
5108  	if (!hapd || !hapd->conf->mld_ap)
5109  		return 0;
5110  
5111  	for_each_mld_link(link_bss, hapd) {
5112  		if (link_bss == hapd || !link_bss->started)
5113  			continue;
5114  
5115  		active_links++;
5116  	}
5117  
5118  	return active_links;
5119  }
5120  
5121  #endif /* CONFIG_IEEE80211BE */
5122  
5123  
hostapd_get_punct_bitmap(struct hostapd_data * hapd)5124  u16 hostapd_get_punct_bitmap(struct hostapd_data *hapd)
5125  {
5126  	u16 punct_bitmap = 0;
5127  
5128  #ifdef CONFIG_IEEE80211BE
5129  	punct_bitmap = hapd->iconf->punct_bitmap;
5130  #ifdef CONFIG_TESTING_OPTIONS
5131  	if (!punct_bitmap)
5132  		punct_bitmap = hapd->conf->eht_oper_puncturing_override;
5133  #endif /* CONFIG_TESTING_OPTIONS */
5134  #endif /* CONFIG_IEEE80211BE */
5135  
5136  	return punct_bitmap;
5137  }
5138