LCOV - code coverage report
Current view: top level - src/ap - drv_callbacks.c (source / functions) Hit Total Coverage
Test: wpa_supplicant/hostapd combined for hwsim test run 1401264779 Lines: 140 541 25.9 %
Date: 2014-05-28 Functions: 10 23 43.5 %

          Line data    Source code
       1             : /*
       2             :  * hostapd / Callback functions for driver wrappers
       3             :  * Copyright (c) 2002-2013, Jouni Malinen <j@w1.fi>
       4             :  *
       5             :  * This software may be distributed under the terms of the BSD license.
       6             :  * See README for more details.
       7             :  */
       8             : 
       9             : #include "utils/includes.h"
      10             : 
      11             : #include "utils/common.h"
      12             : #include "utils/eloop.h"
      13             : #include "radius/radius.h"
      14             : #include "drivers/driver.h"
      15             : #include "common/ieee802_11_defs.h"
      16             : #include "common/ieee802_11_common.h"
      17             : #include "common/wpa_ctrl.h"
      18             : #include "crypto/random.h"
      19             : #include "p2p/p2p.h"
      20             : #include "wps/wps.h"
      21             : #include "wnm_ap.h"
      22             : #include "hostapd.h"
      23             : #include "ieee802_11.h"
      24             : #include "sta_info.h"
      25             : #include "accounting.h"
      26             : #include "tkip_countermeasures.h"
      27             : #include "ieee802_1x.h"
      28             : #include "wpa_auth.h"
      29             : #include "wps_hostapd.h"
      30             : #include "ap_drv_ops.h"
      31             : #include "ap_config.h"
      32             : #include "hw_features.h"
      33             : #include "dfs.h"
      34             : #include "beacon.h"
      35             : 
      36             : 
      37           0 : int hostapd_notif_assoc(struct hostapd_data *hapd, const u8 *addr,
      38             :                         const u8 *req_ies, size_t req_ies_len, int reassoc)
      39             : {
      40             :         struct sta_info *sta;
      41             :         int new_assoc, res;
      42             :         struct ieee802_11_elems elems;
      43             :         const u8 *ie;
      44             :         size_t ielen;
      45             : #ifdef CONFIG_IEEE80211R
      46             :         u8 buf[sizeof(struct ieee80211_mgmt) + 1024];
      47           0 :         u8 *p = buf;
      48             : #endif /* CONFIG_IEEE80211R */
      49           0 :         u16 reason = WLAN_REASON_UNSPECIFIED;
      50           0 :         u16 status = WLAN_STATUS_SUCCESS;
      51           0 :         const u8 *p2p_dev_addr = NULL;
      52             : 
      53           0 :         if (addr == NULL) {
      54             :                 /*
      55             :                  * This could potentially happen with unexpected event from the
      56             :                  * driver wrapper. This was seen at least in one case where the
      57             :                  * driver ended up being set to station mode while hostapd was
      58             :                  * running, so better make sure we stop processing such an
      59             :                  * event here.
      60             :                  */
      61           0 :                 wpa_printf(MSG_DEBUG, "hostapd_notif_assoc: Skip event with "
      62             :                            "no address");
      63           0 :                 return -1;
      64             :         }
      65             :         random_add_randomness(addr, ETH_ALEN);
      66             : 
      67           0 :         hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
      68             :                        HOSTAPD_LEVEL_INFO, "associated");
      69             : 
      70           0 :         ieee802_11_parse_elems(req_ies, req_ies_len, &elems, 0);
      71           0 :         if (elems.wps_ie) {
      72           0 :                 ie = elems.wps_ie - 2;
      73           0 :                 ielen = elems.wps_ie_len + 2;
      74           0 :                 wpa_printf(MSG_DEBUG, "STA included WPS IE in (Re)AssocReq");
      75           0 :         } else if (elems.rsn_ie) {
      76           0 :                 ie = elems.rsn_ie - 2;
      77           0 :                 ielen = elems.rsn_ie_len + 2;
      78           0 :                 wpa_printf(MSG_DEBUG, "STA included RSN IE in (Re)AssocReq");
      79           0 :         } else if (elems.wpa_ie) {
      80           0 :                 ie = elems.wpa_ie - 2;
      81           0 :                 ielen = elems.wpa_ie_len + 2;
      82           0 :                 wpa_printf(MSG_DEBUG, "STA included WPA IE in (Re)AssocReq");
      83             : #ifdef CONFIG_HS20
      84           0 :         } else if (elems.osen) {
      85           0 :                 ie = elems.osen - 2;
      86           0 :                 ielen = elems.osen_len + 2;
      87           0 :                 wpa_printf(MSG_DEBUG, "STA included OSEN IE in (Re)AssocReq");
      88             : #endif /* CONFIG_HS20 */
      89             :         } else {
      90           0 :                 ie = NULL;
      91           0 :                 ielen = 0;
      92           0 :                 wpa_printf(MSG_DEBUG, "STA did not include WPS/RSN/WPA IE in "
      93             :                            "(Re)AssocReq");
      94             :         }
      95             : 
      96           0 :         sta = ap_get_sta(hapd, addr);
      97           0 :         if (sta) {
      98           0 :                 ap_sta_no_session_timeout(hapd, sta);
      99           0 :                 accounting_sta_stop(hapd, sta);
     100             : 
     101             :                 /*
     102             :                  * Make sure that the previously registered inactivity timer
     103             :                  * will not remove the STA immediately.
     104             :                  */
     105           0 :                 sta->timeout_next = STA_NULLFUNC;
     106             :         } else {
     107           0 :                 sta = ap_sta_add(hapd, addr);
     108           0 :                 if (sta == NULL) {
     109           0 :                         hostapd_drv_sta_disassoc(hapd, addr,
     110             :                                                  WLAN_REASON_DISASSOC_AP_BUSY);
     111           0 :                         return -1;
     112             :                 }
     113             :         }
     114           0 :         sta->flags &= ~(WLAN_STA_WPS | WLAN_STA_MAYBE_WPS | WLAN_STA_WPS2);
     115             : 
     116             : #ifdef CONFIG_P2P
     117           0 :         if (elems.p2p) {
     118           0 :                 wpabuf_free(sta->p2p_ie);
     119           0 :                 sta->p2p_ie = ieee802_11_vendor_ie_concat(req_ies, req_ies_len,
     120             :                                                           P2P_IE_VENDOR_TYPE);
     121           0 :                 if (sta->p2p_ie)
     122           0 :                         p2p_dev_addr = p2p_get_go_dev_addr(sta->p2p_ie);
     123             :         }
     124             : #endif /* CONFIG_P2P */
     125             : 
     126             : #ifdef CONFIG_IEEE80211N
     127             : #ifdef NEED_AP_MLME
     128           0 :         if (elems.ht_capabilities &&
     129           0 :             elems.ht_capabilities_len >=
     130           0 :             sizeof(struct ieee80211_ht_capabilities) &&
     131           0 :             (hapd->iface->conf->ht_capab &
     132             :              HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET)) {
     133           0 :                 struct ieee80211_ht_capabilities *ht_cap =
     134             :                         (struct ieee80211_ht_capabilities *)
     135             :                         elems.ht_capabilities;
     136             : 
     137           0 :                 if (le_to_host16(ht_cap->ht_capabilities_info) &
     138             :                     HT_CAP_INFO_40MHZ_INTOLERANT)
     139           0 :                         ht40_intolerant_add(hapd->iface, sta);
     140             :         }
     141             : #endif /* NEED_AP_MLME */
     142             : #endif /* CONFIG_IEEE80211N */
     143             : 
     144             : #ifdef CONFIG_INTERWORKING
     145           0 :         if (elems.ext_capab && elems.ext_capab_len > 4) {
     146           0 :                 if (elems.ext_capab[4] & 0x01)
     147           0 :                         sta->qos_map_enabled = 1;
     148             :         }
     149             : #endif /* CONFIG_INTERWORKING */
     150             : 
     151             : #ifdef CONFIG_HS20
     152           0 :         wpabuf_free(sta->hs20_ie);
     153           0 :         if (elems.hs20 && elems.hs20_len > 4) {
     154           0 :                 sta->hs20_ie = wpabuf_alloc_copy(elems.hs20 + 4,
     155           0 :                                                  elems.hs20_len - 4);
     156             :         } else
     157           0 :                 sta->hs20_ie = NULL;
     158             : #endif /* CONFIG_HS20 */
     159             : 
     160           0 :         if (hapd->conf->wpa) {
     161           0 :                 if (ie == NULL || ielen == 0) {
     162             : #ifdef CONFIG_WPS
     163           0 :                         if (hapd->conf->wps_state) {
     164           0 :                                 wpa_printf(MSG_DEBUG, "STA did not include "
     165             :                                            "WPA/RSN IE in (Re)Association "
     166             :                                            "Request - possible WPS use");
     167           0 :                                 sta->flags |= WLAN_STA_MAYBE_WPS;
     168           0 :                                 goto skip_wpa_check;
     169             :                         }
     170             : #endif /* CONFIG_WPS */
     171             : 
     172           0 :                         wpa_printf(MSG_DEBUG, "No WPA/RSN IE from STA");
     173           0 :                         return -1;
     174             :                 }
     175             : #ifdef CONFIG_WPS
     176           0 :                 if (hapd->conf->wps_state && ie[0] == 0xdd && ie[1] >= 4 &&
     177           0 :                     os_memcmp(ie + 2, "\x00\x50\xf2\x04", 4) == 0) {
     178             :                         struct wpabuf *wps;
     179           0 :                         sta->flags |= WLAN_STA_WPS;
     180           0 :                         wps = ieee802_11_vendor_ie_concat(ie, ielen,
     181             :                                                           WPS_IE_VENDOR_TYPE);
     182           0 :                         if (wps) {
     183           0 :                                 if (wps_is_20(wps)) {
     184           0 :                                         wpa_printf(MSG_DEBUG, "WPS: STA "
     185             :                                                    "supports WPS 2.0");
     186           0 :                                         sta->flags |= WLAN_STA_WPS2;
     187             :                                 }
     188           0 :                                 wpabuf_free(wps);
     189             :                         }
     190           0 :                         goto skip_wpa_check;
     191             :                 }
     192             : #endif /* CONFIG_WPS */
     193             : 
     194           0 :                 if (sta->wpa_sm == NULL)
     195           0 :                         sta->wpa_sm = wpa_auth_sta_init(hapd->wpa_auth,
     196           0 :                                                         sta->addr,
     197             :                                                         p2p_dev_addr);
     198           0 :                 if (sta->wpa_sm == NULL) {
     199           0 :                         wpa_printf(MSG_ERROR, "Failed to initialize WPA state "
     200             :                                    "machine");
     201           0 :                         return -1;
     202             :                 }
     203           0 :                 res = wpa_validate_wpa_ie(hapd->wpa_auth, sta->wpa_sm,
     204             :                                           ie, ielen,
     205           0 :                                           elems.mdie, elems.mdie_len);
     206           0 :                 if (res != WPA_IE_OK) {
     207           0 :                         wpa_printf(MSG_DEBUG, "WPA/RSN information element "
     208             :                                    "rejected? (res %u)", res);
     209           0 :                         wpa_hexdump(MSG_DEBUG, "IE", ie, ielen);
     210           0 :                         if (res == WPA_INVALID_GROUP) {
     211           0 :                                 reason = WLAN_REASON_GROUP_CIPHER_NOT_VALID;
     212           0 :                                 status = WLAN_STATUS_GROUP_CIPHER_NOT_VALID;
     213           0 :                         } else if (res == WPA_INVALID_PAIRWISE) {
     214           0 :                                 reason = WLAN_REASON_PAIRWISE_CIPHER_NOT_VALID;
     215           0 :                                 status = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID;
     216           0 :                         } else if (res == WPA_INVALID_AKMP) {
     217           0 :                                 reason = WLAN_REASON_AKMP_NOT_VALID;
     218           0 :                                 status = WLAN_STATUS_AKMP_NOT_VALID;
     219             :                         }
     220             : #ifdef CONFIG_IEEE80211W
     221           0 :                         else if (res == WPA_MGMT_FRAME_PROTECTION_VIOLATION) {
     222           0 :                                 reason = WLAN_REASON_INVALID_IE;
     223           0 :                                 status = WLAN_STATUS_INVALID_IE;
     224           0 :                         } else if (res == WPA_INVALID_MGMT_GROUP_CIPHER) {
     225           0 :                                 reason = WLAN_REASON_GROUP_CIPHER_NOT_VALID;
     226           0 :                                 status = WLAN_STATUS_GROUP_CIPHER_NOT_VALID;
     227             :                         }
     228             : #endif /* CONFIG_IEEE80211W */
     229             :                         else {
     230           0 :                                 reason = WLAN_REASON_INVALID_IE;
     231           0 :                                 status = WLAN_STATUS_INVALID_IE;
     232             :                         }
     233           0 :                         goto fail;
     234             :                 }
     235             : #ifdef CONFIG_IEEE80211W
     236           0 :                 if ((sta->flags & WLAN_STA_MFP) && !sta->sa_query_timed_out &&
     237           0 :                     sta->sa_query_count > 0)
     238           0 :                         ap_check_sa_query_timeout(hapd, sta);
     239           0 :                 if ((sta->flags & WLAN_STA_MFP) && !sta->sa_query_timed_out &&
     240           0 :                     (sta->auth_alg != WLAN_AUTH_FT)) {
     241             :                         /*
     242             :                          * STA has already been associated with MFP and SA
     243             :                          * Query timeout has not been reached. Reject the
     244             :                          * association attempt temporarily and start SA Query,
     245             :                          * if one is not pending.
     246             :                          */
     247             : 
     248           0 :                         if (sta->sa_query_count == 0)
     249           0 :                                 ap_sta_start_sa_query(hapd, sta);
     250             : 
     251             : #ifdef CONFIG_IEEE80211R
     252           0 :                         status = WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY;
     253             : 
     254           0 :                         p = hostapd_eid_assoc_comeback_time(hapd, sta, p);
     255             : 
     256           0 :                         hostapd_sta_assoc(hapd, addr, reassoc, status, buf,
     257           0 :                                           p - buf);
     258             : #endif /* CONFIG_IEEE80211R */
     259           0 :                         return 0;
     260             :                 }
     261             : 
     262           0 :                 if (wpa_auth_uses_mfp(sta->wpa_sm))
     263           0 :                         sta->flags |= WLAN_STA_MFP;
     264             :                 else
     265           0 :                         sta->flags &= ~WLAN_STA_MFP;
     266             : #endif /* CONFIG_IEEE80211W */
     267             : 
     268             : #ifdef CONFIG_IEEE80211R
     269           0 :                 if (sta->auth_alg == WLAN_AUTH_FT) {
     270           0 :                         status = wpa_ft_validate_reassoc(sta->wpa_sm, req_ies,
     271             :                                                          req_ies_len);
     272           0 :                         if (status != WLAN_STATUS_SUCCESS) {
     273           0 :                                 if (status == WLAN_STATUS_INVALID_PMKID)
     274           0 :                                         reason = WLAN_REASON_INVALID_IE;
     275           0 :                                 if (status == WLAN_STATUS_INVALID_MDIE)
     276           0 :                                         reason = WLAN_REASON_INVALID_IE;
     277           0 :                                 if (status == WLAN_STATUS_INVALID_FTIE)
     278           0 :                                         reason = WLAN_REASON_INVALID_IE;
     279           0 :                                 goto fail;
     280             :                         }
     281             :                 }
     282             : #endif /* CONFIG_IEEE80211R */
     283           0 :         } else if (hapd->conf->wps_state) {
     284             : #ifdef CONFIG_WPS
     285             :                 struct wpabuf *wps;
     286           0 :                 if (req_ies)
     287           0 :                         wps = ieee802_11_vendor_ie_concat(req_ies, req_ies_len,
     288             :                                                           WPS_IE_VENDOR_TYPE);
     289             :                 else
     290           0 :                         wps = NULL;
     291             : #ifdef CONFIG_WPS_STRICT
     292             :                 if (wps && wps_validate_assoc_req(wps) < 0) {
     293             :                         reason = WLAN_REASON_INVALID_IE;
     294             :                         status = WLAN_STATUS_INVALID_IE;
     295             :                         wpabuf_free(wps);
     296             :                         goto fail;
     297             :                 }
     298             : #endif /* CONFIG_WPS_STRICT */
     299           0 :                 if (wps) {
     300           0 :                         sta->flags |= WLAN_STA_WPS;
     301           0 :                         if (wps_is_20(wps)) {
     302           0 :                                 wpa_printf(MSG_DEBUG, "WPS: STA supports "
     303             :                                            "WPS 2.0");
     304           0 :                                 sta->flags |= WLAN_STA_WPS2;
     305             :                         }
     306             :                 } else
     307           0 :                         sta->flags |= WLAN_STA_MAYBE_WPS;
     308           0 :                 wpabuf_free(wps);
     309             : #endif /* CONFIG_WPS */
     310             : #ifdef CONFIG_HS20
     311           0 :         } else if (hapd->conf->osen) {
     312           0 :                 if (elems.osen == NULL) {
     313           0 :                         hostapd_logger(
     314           0 :                                 hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
     315             :                                 HOSTAPD_LEVEL_INFO,
     316             :                                 "No HS 2.0 OSEN element in association request");
     317           0 :                         return WLAN_STATUS_INVALID_IE;
     318             :                 }
     319             : 
     320           0 :                 wpa_printf(MSG_DEBUG, "HS 2.0: OSEN association");
     321           0 :                 if (sta->wpa_sm == NULL)
     322           0 :                         sta->wpa_sm = wpa_auth_sta_init(hapd->wpa_auth,
     323           0 :                                                         sta->addr, NULL);
     324           0 :                 if (sta->wpa_sm == NULL) {
     325           0 :                         wpa_printf(MSG_WARNING, "Failed to initialize WPA "
     326             :                                    "state machine");
     327           0 :                         return WLAN_STATUS_UNSPECIFIED_FAILURE;
     328             :                 }
     329           0 :                 if (wpa_validate_osen(hapd->wpa_auth, sta->wpa_sm,
     330           0 :                                       elems.osen - 2, elems.osen_len + 2) < 0)
     331           0 :                         return WLAN_STATUS_INVALID_IE;
     332             : #endif /* CONFIG_HS20 */
     333             :         }
     334             : #ifdef CONFIG_WPS
     335             : skip_wpa_check:
     336             : #endif /* CONFIG_WPS */
     337             : 
     338             : #ifdef CONFIG_IEEE80211R
     339           0 :         p = wpa_sm_write_assoc_resp_ies(sta->wpa_sm, buf, sizeof(buf),
     340           0 :                                         sta->auth_alg, req_ies, req_ies_len);
     341             : 
     342           0 :         hostapd_sta_assoc(hapd, addr, reassoc, status, buf, p - buf);
     343             : #else /* CONFIG_IEEE80211R */
     344             :         /* Keep compiler silent about unused variables */
     345             :         if (status) {
     346             :         }
     347             : #endif /* CONFIG_IEEE80211R */
     348             : 
     349           0 :         new_assoc = (sta->flags & WLAN_STA_ASSOC) == 0;
     350           0 :         sta->flags |= WLAN_STA_AUTH | WLAN_STA_ASSOC;
     351           0 :         sta->flags &= ~WLAN_STA_WNM_SLEEP_MODE;
     352             : 
     353           0 :         if (reassoc && (sta->auth_alg == WLAN_AUTH_FT))
     354           0 :                 wpa_auth_sm_event(sta->wpa_sm, WPA_ASSOC_FT);
     355             :         else
     356           0 :                 wpa_auth_sm_event(sta->wpa_sm, WPA_ASSOC);
     357             : 
     358           0 :         hostapd_new_assoc_sta(hapd, sta, !new_assoc);
     359             : 
     360           0 :         ieee802_1x_notify_port_enabled(sta->eapol_sm, 1);
     361             : 
     362             : #ifdef CONFIG_P2P
     363           0 :         if (req_ies) {
     364           0 :                 p2p_group_notif_assoc(hapd->p2p_group, sta->addr,
     365             :                                       req_ies, req_ies_len);
     366             :         }
     367             : #endif /* CONFIG_P2P */
     368             : 
     369           0 :         return 0;
     370             : 
     371             : fail:
     372             : #ifdef CONFIG_IEEE80211R
     373           0 :         hostapd_sta_assoc(hapd, addr, reassoc, status, buf, p - buf);
     374             : #endif /* CONFIG_IEEE80211R */
     375           0 :         hostapd_drv_sta_disassoc(hapd, sta->addr, reason);
     376           0 :         ap_free_sta(hapd, sta);
     377           0 :         return -1;
     378             : }
     379             : 
     380             : 
     381           0 : void hostapd_notif_disassoc(struct hostapd_data *hapd, const u8 *addr)
     382             : {
     383             :         struct sta_info *sta;
     384             : 
     385           0 :         if (addr == NULL) {
     386             :                 /*
     387             :                  * This could potentially happen with unexpected event from the
     388             :                  * driver wrapper. This was seen at least in one case where the
     389             :                  * driver ended up reporting a station mode event while hostapd
     390             :                  * was running, so better make sure we stop processing such an
     391             :                  * event here.
     392             :                  */
     393           0 :                 wpa_printf(MSG_DEBUG, "hostapd_notif_disassoc: Skip event "
     394             :                            "with no address");
     395           0 :                 return;
     396             :         }
     397             : 
     398           0 :         hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
     399             :                        HOSTAPD_LEVEL_INFO, "disassociated");
     400             : 
     401           0 :         sta = ap_get_sta(hapd, addr);
     402           0 :         if (sta == NULL) {
     403           0 :                 wpa_printf(MSG_DEBUG, "Disassociation notification for "
     404           0 :                            "unknown STA " MACSTR, MAC2STR(addr));
     405           0 :                 return;
     406             :         }
     407             : 
     408           0 :         ap_sta_set_authorized(hapd, sta, 0);
     409           0 :         sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC);
     410           0 :         wpa_auth_sm_event(sta->wpa_sm, WPA_DISASSOC);
     411           0 :         sta->acct_terminate_cause = RADIUS_ACCT_TERMINATE_CAUSE_USER_REQUEST;
     412           0 :         ieee802_1x_notify_port_enabled(sta->eapol_sm, 0);
     413           0 :         ap_free_sta(hapd, sta);
     414             : }
     415             : 
     416             : 
     417           0 : void hostapd_event_sta_low_ack(struct hostapd_data *hapd, const u8 *addr)
     418             : {
     419           0 :         struct sta_info *sta = ap_get_sta(hapd, addr);
     420             : 
     421           0 :         if (!sta || !hapd->conf->disassoc_low_ack)
     422           0 :                 return;
     423             : 
     424           0 :         hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
     425             :                        HOSTAPD_LEVEL_INFO, "disconnected due to excessive "
     426             :                        "missing ACKs");
     427           0 :         hostapd_drv_sta_disassoc(hapd, addr, WLAN_REASON_DISASSOC_LOW_ACK);
     428           0 :         if (sta)
     429           0 :                 ap_sta_disassociate(hapd, sta, WLAN_REASON_DISASSOC_LOW_ACK);
     430             : }
     431             : 
     432             : 
     433           0 : void hostapd_event_ch_switch(struct hostapd_data *hapd, int freq, int ht,
     434             :                              int offset, int width, int cf1, int cf2)
     435             : {
     436             : #ifdef NEED_AP_MLME
     437           0 :         int channel, chwidth, seg0_idx = 0, seg1_idx = 0;
     438             : 
     439           0 :         hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
     440             :                        HOSTAPD_LEVEL_INFO, "driver had channel switch: "
     441             :                        "freq=%d, ht=%d, offset=%d, width=%d, cf1=%d, cf2=%d",
     442             :                        freq, ht, offset, width, cf1, cf2);
     443             : 
     444           0 :         hapd->iface->freq = freq;
     445             : 
     446           0 :         channel = hostapd_hw_get_channel(hapd, freq);
     447           0 :         if (!channel) {
     448           0 :                 hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
     449             :                                HOSTAPD_LEVEL_WARNING, "driver switched to "
     450             :                                "bad channel!");
     451           0 :                 return;
     452             :         }
     453             : 
     454           0 :         switch (width) {
     455             :         case CHAN_WIDTH_80:
     456           0 :                 chwidth = VHT_CHANWIDTH_80MHZ;
     457           0 :                 break;
     458             :         case CHAN_WIDTH_80P80:
     459           0 :                 chwidth = VHT_CHANWIDTH_80P80MHZ;
     460           0 :                 break;
     461             :         case CHAN_WIDTH_160:
     462           0 :                 chwidth = VHT_CHANWIDTH_160MHZ;
     463           0 :                 break;
     464             :         case CHAN_WIDTH_20_NOHT:
     465             :         case CHAN_WIDTH_20:
     466             :         case CHAN_WIDTH_40:
     467             :         default:
     468           0 :                 chwidth = VHT_CHANWIDTH_USE_HT;
     469           0 :                 break;
     470             :         }
     471             : 
     472           0 :         switch (hapd->iface->current_mode->mode) {
     473             :         case HOSTAPD_MODE_IEEE80211A:
     474           0 :                 if (cf1 > 5000)
     475           0 :                         seg0_idx = (cf1 - 5000) / 5;
     476           0 :                 if (cf2 > 5000)
     477           0 :                         seg1_idx = (cf2 - 5000) / 5;
     478           0 :                 break;
     479             :         default:
     480           0 :                 seg0_idx = hostapd_hw_get_channel(hapd, cf1);
     481           0 :                 seg1_idx = hostapd_hw_get_channel(hapd, cf2);
     482           0 :                 break;
     483             :         }
     484             : 
     485           0 :         hapd->iconf->channel = channel;
     486           0 :         hapd->iconf->ieee80211n = ht;
     487           0 :         hapd->iconf->secondary_channel = offset;
     488           0 :         hapd->iconf->vht_oper_chwidth = chwidth;
     489           0 :         hapd->iconf->vht_oper_centr_freq_seg0_idx = seg0_idx;
     490           0 :         hapd->iconf->vht_oper_centr_freq_seg1_idx = seg1_idx;
     491             : 
     492           0 :         if (hapd->iface->csa_in_progress &&
     493           0 :             freq == hapd->iface->cs_freq_params.freq) {
     494           0 :                 hostapd_cleanup_cs_params(hapd);
     495             : 
     496           0 :                 wpa_msg(hapd->msg_ctx, MSG_INFO, AP_CSA_FINISHED "freq=%d",
     497             :                         freq);
     498             :         }
     499             : #endif /* NEED_AP_MLME */
     500             : }
     501             : 
     502             : 
     503           0 : void hostapd_event_connect_failed_reason(struct hostapd_data *hapd,
     504             :                                          const u8 *addr, int reason_code)
     505             : {
     506           0 :         switch (reason_code) {
     507             :         case MAX_CLIENT_REACHED:
     508           0 :                 wpa_msg(hapd->msg_ctx, MSG_INFO, AP_REJECTED_MAX_STA MACSTR,
     509           0 :                         MAC2STR(addr));
     510           0 :                 break;
     511             :         case BLOCKED_CLIENT:
     512           0 :                 wpa_msg(hapd->msg_ctx, MSG_INFO, AP_REJECTED_BLOCKED_STA MACSTR,
     513           0 :                         MAC2STR(addr));
     514           0 :                 break;
     515             :         }
     516           0 : }
     517             : 
     518             : 
     519           0 : int hostapd_probe_req_rx(struct hostapd_data *hapd, const u8 *sa, const u8 *da,
     520             :                          const u8 *bssid, const u8 *ie, size_t ie_len,
     521             :                          int ssi_signal)
     522             : {
     523             :         size_t i;
     524           0 :         int ret = 0;
     525             : 
     526           0 :         if (sa == NULL || ie == NULL)
     527           0 :                 return -1;
     528             : 
     529             :         random_add_randomness(sa, ETH_ALEN);
     530           0 :         for (i = 0; hapd->probereq_cb && i < hapd->num_probereq_cb; i++) {
     531           0 :                 if (hapd->probereq_cb[i].cb(hapd->probereq_cb[i].ctx,
     532             :                                             sa, da, bssid, ie, ie_len,
     533             :                                             ssi_signal) > 0) {
     534           0 :                         ret = 1;
     535           0 :                         break;
     536             :                 }
     537             :         }
     538           0 :         return ret;
     539             : }
     540             : 
     541             : 
     542             : #ifdef HOSTAPD
     543             : 
     544             : #ifdef CONFIG_IEEE80211R
     545           0 : static void hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst,
     546             :                                           const u8 *bssid,
     547             :                                           u16 auth_transaction, u16 status,
     548             :                                           const u8 *ies, size_t ies_len)
     549             : {
     550           0 :         struct hostapd_data *hapd = ctx;
     551             :         struct sta_info *sta;
     552             : 
     553           0 :         sta = ap_get_sta(hapd, dst);
     554           0 :         if (sta == NULL)
     555           0 :                 return;
     556             : 
     557           0 :         hostapd_logger(hapd, dst, HOSTAPD_MODULE_IEEE80211,
     558             :                        HOSTAPD_LEVEL_DEBUG, "authentication OK (FT)");
     559           0 :         sta->flags |= WLAN_STA_AUTH;
     560             : 
     561           0 :         hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len);
     562             : }
     563             : #endif /* CONFIG_IEEE80211R */
     564             : 
     565             : 
     566           0 : static void hostapd_notif_auth(struct hostapd_data *hapd,
     567             :                                struct auth_info *rx_auth)
     568             : {
     569             :         struct sta_info *sta;
     570           0 :         u16 status = WLAN_STATUS_SUCCESS;
     571             :         u8 resp_ies[2 + WLAN_AUTH_CHALLENGE_LEN];
     572           0 :         size_t resp_ies_len = 0;
     573             : 
     574           0 :         sta = ap_get_sta(hapd, rx_auth->peer);
     575           0 :         if (!sta) {
     576           0 :                 sta = ap_sta_add(hapd, rx_auth->peer);
     577           0 :                 if (sta == NULL) {
     578           0 :                         status = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
     579           0 :                         goto fail;
     580             :                 }
     581             :         }
     582           0 :         sta->flags &= ~WLAN_STA_PREAUTH;
     583           0 :         ieee802_1x_notify_pre_auth(sta->eapol_sm, 0);
     584             : #ifdef CONFIG_IEEE80211R
     585           0 :         if (rx_auth->auth_type == WLAN_AUTH_FT && hapd->wpa_auth) {
     586           0 :                 sta->auth_alg = WLAN_AUTH_FT;
     587           0 :                 if (sta->wpa_sm == NULL)
     588           0 :                         sta->wpa_sm = wpa_auth_sta_init(hapd->wpa_auth,
     589           0 :                                                         sta->addr, NULL);
     590           0 :                 if (sta->wpa_sm == NULL) {
     591           0 :                         wpa_printf(MSG_DEBUG, "FT: Failed to initialize WPA "
     592             :                                    "state machine");
     593           0 :                         status = WLAN_STATUS_UNSPECIFIED_FAILURE;
     594           0 :                         goto fail;
     595             :                 }
     596           0 :                 wpa_ft_process_auth(sta->wpa_sm, rx_auth->bssid,
     597           0 :                                     rx_auth->auth_transaction, rx_auth->ies,
     598             :                                     rx_auth->ies_len,
     599             :                                     hostapd_notify_auth_ft_finish, hapd);
     600           0 :                 return;
     601             :         }
     602             : #endif /* CONFIG_IEEE80211R */
     603             : fail:
     604           0 :         hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
     605             :                          status, resp_ies, resp_ies_len);
     606             : }
     607             : 
     608             : 
     609           0 : static void hostapd_action_rx(struct hostapd_data *hapd,
     610             :                               struct rx_mgmt *drv_mgmt)
     611             : {
     612             :         struct ieee80211_mgmt *mgmt;
     613             :         struct sta_info *sta;
     614             :         size_t plen __maybe_unused;
     615             :         u16 fc;
     616             : 
     617           0 :         if (drv_mgmt->frame_len < 24 + 1)
     618           0 :                 return;
     619             : 
     620           0 :         plen = drv_mgmt->frame_len - 24 - 1;
     621             : 
     622           0 :         mgmt = (struct ieee80211_mgmt *) drv_mgmt->frame;
     623           0 :         fc = le_to_host16(mgmt->frame_control);
     624           0 :         if (WLAN_FC_GET_STYPE(fc) != WLAN_FC_STYPE_ACTION)
     625           0 :                 return; /* handled by the driver */
     626             : 
     627           0 :         wpa_printf(MSG_DEBUG, "RX_ACTION cat %d action plen %d",
     628           0 :                    mgmt->u.action.category, (int) plen);
     629             : 
     630           0 :         sta = ap_get_sta(hapd, mgmt->sa);
     631           0 :         if (sta == NULL) {
     632           0 :                 wpa_printf(MSG_DEBUG, "%s: station not found", __func__);
     633           0 :                 return;
     634             :         }
     635             : #ifdef CONFIG_IEEE80211R
     636           0 :         if (mgmt->u.action.category == WLAN_ACTION_FT) {
     637           0 :                 const u8 *payload = drv_mgmt->frame + 24 + 1;
     638           0 :                 wpa_ft_action_rx(sta->wpa_sm, payload, plen);
     639             :         }
     640             : #endif /* CONFIG_IEEE80211R */
     641             : #ifdef CONFIG_IEEE80211W
     642           0 :         if (mgmt->u.action.category == WLAN_ACTION_SA_QUERY && plen >= 4) {
     643           0 :                 ieee802_11_sa_query_action(
     644           0 :                         hapd, mgmt->sa,
     645           0 :                         mgmt->u.action.u.sa_query_resp.action,
     646           0 :                         mgmt->u.action.u.sa_query_resp.trans_id);
     647             :         }
     648             : #endif /* CONFIG_IEEE80211W */
     649             : #ifdef CONFIG_WNM
     650           0 :         if (mgmt->u.action.category == WLAN_ACTION_WNM) {
     651           0 :                 ieee802_11_rx_wnm_action_ap(hapd, mgmt, drv_mgmt->frame_len);
     652             :         }
     653             : #endif /* CONFIG_WNM */
     654             : }
     655             : 
     656             : 
     657             : #ifdef NEED_AP_MLME
     658             : 
     659             : #define HAPD_BROADCAST ((struct hostapd_data *) -1)
     660             : 
     661        7794 : static struct hostapd_data * get_hapd_bssid(struct hostapd_iface *iface,
     662             :                                             const u8 *bssid)
     663             : {
     664             :         size_t i;
     665             : 
     666        7794 :         if (bssid == NULL)
     667           0 :                 return NULL;
     668        9035 :         if (bssid[0] == 0xff && bssid[1] == 0xff && bssid[2] == 0xff &&
     669        2482 :             bssid[3] == 0xff && bssid[4] == 0xff && bssid[5] == 0xff)
     670        1241 :                 return HAPD_BROADCAST;
     671             : 
     672        8410 :         for (i = 0; i < iface->num_bss; i++) {
     673        6733 :                 if (os_memcmp(bssid, iface->bss[i]->own_addr, ETH_ALEN) == 0)
     674        4876 :                         return iface->bss[i];
     675             :         }
     676             : 
     677        1677 :         return NULL;
     678             : }
     679             : 
     680             : 
     681           2 : static void hostapd_rx_from_unknown_sta(struct hostapd_data *hapd,
     682             :                                         const u8 *bssid, const u8 *addr,
     683             :                                         int wds)
     684             : {
     685           2 :         hapd = get_hapd_bssid(hapd->iface, bssid);
     686           2 :         if (hapd == NULL || hapd == HAPD_BROADCAST)
     687           2 :                 return;
     688             : 
     689           2 :         ieee802_11_rx_from_unknown(hapd, addr, wds);
     690             : }
     691             : 
     692             : 
     693        5660 : static int hostapd_mgmt_rx(struct hostapd_data *hapd, struct rx_mgmt *rx_mgmt)
     694             : {
     695        5660 :         struct hostapd_iface *iface = hapd->iface;
     696             :         const struct ieee80211_hdr *hdr;
     697             :         const u8 *bssid;
     698             :         struct hostapd_frame_info fi;
     699             :         int ret;
     700             : 
     701             : #ifdef CONFIG_TESTING_OPTIONS
     702        5660 :         if (hapd->ext_mgmt_frame_handling) {
     703         232 :                 size_t hex_len = 2 * rx_mgmt->frame_len + 1;
     704         232 :                 char *hex = os_malloc(hex_len);
     705         232 :                 if (hex) {
     706         232 :                         wpa_snprintf_hex(hex, hex_len, rx_mgmt->frame,
     707             :                                          rx_mgmt->frame_len);
     708         232 :                         wpa_msg(hapd->msg_ctx, MSG_INFO, "MGMT-RX %s", hex);
     709         232 :                         os_free(hex);
     710             :                 }
     711         232 :                 return 1;
     712             :         }
     713             : #endif /* CONFIG_TESTING_OPTIONS */
     714             : 
     715        5428 :         hdr = (const struct ieee80211_hdr *) rx_mgmt->frame;
     716        5428 :         bssid = get_hdr_bssid(hdr, rx_mgmt->frame_len);
     717        5428 :         if (bssid == NULL)
     718           0 :                 return 0;
     719             : 
     720        5428 :         hapd = get_hapd_bssid(iface, bssid);
     721        5428 :         if (hapd == NULL) {
     722             :                 u16 fc;
     723        1617 :                 fc = le_to_host16(hdr->frame_control);
     724             : 
     725             :                 /*
     726             :                  * Drop frames to unknown BSSIDs except for Beacon frames which
     727             :                  * could be used to update neighbor information.
     728             :                  */
     729        3234 :                 if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
     730        1617 :                     WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_BEACON)
     731        1617 :                         hapd = iface->bss[0];
     732             :                 else
     733           0 :                         return 0;
     734             :         }
     735             : 
     736        5428 :         os_memset(&fi, 0, sizeof(fi));
     737        5428 :         fi.datarate = rx_mgmt->datarate;
     738        5428 :         fi.ssi_signal = rx_mgmt->ssi_signal;
     739             : 
     740        5428 :         if (hapd == HAPD_BROADCAST) {
     741             :                 size_t i;
     742        1240 :                 ret = 0;
     743        2695 :                 for (i = 0; i < iface->num_bss; i++) {
     744             :                         /* if bss is set, driver will call this function for
     745             :                          * each bss individually. */
     746        2910 :                         if (rx_mgmt->drv_priv &&
     747        1455 :                             (iface->bss[i]->drv_priv != rx_mgmt->drv_priv))
     748         214 :                                 continue;
     749             : 
     750        1241 :                         if (ieee802_11_mgmt(iface->bss[i], rx_mgmt->frame,
     751             :                                             rx_mgmt->frame_len, &fi) > 0)
     752        1241 :                                 ret = 1;
     753             :                 }
     754             :         } else
     755        4188 :                 ret = ieee802_11_mgmt(hapd, rx_mgmt->frame, rx_mgmt->frame_len,
     756             :                                       &fi);
     757             : 
     758             :         random_add_randomness(&fi, sizeof(fi));
     759             : 
     760        5428 :         return ret;
     761             : }
     762             : 
     763             : 
     764        2364 : static void hostapd_mgmt_tx_cb(struct hostapd_data *hapd, const u8 *buf,
     765             :                                size_t len, u16 stype, int ok)
     766             : {
     767             :         struct ieee80211_hdr *hdr;
     768        2364 :         hdr = (struct ieee80211_hdr *) buf;
     769        2364 :         hapd = get_hapd_bssid(hapd->iface, get_hdr_bssid(hdr, len));
     770        2364 :         if (hapd == NULL || hapd == HAPD_BROADCAST)
     771        2425 :                 return;
     772        2303 :         ieee802_11_mgmt_cb(hapd, buf, len, stype, ok);
     773             : }
     774             : 
     775             : #endif /* NEED_AP_MLME */
     776             : 
     777             : 
     778           0 : static int hostapd_event_new_sta(struct hostapd_data *hapd, const u8 *addr)
     779             : {
     780           0 :         struct sta_info *sta = ap_get_sta(hapd, addr);
     781           0 :         if (sta)
     782           0 :                 return 0;
     783             : 
     784           0 :         wpa_printf(MSG_DEBUG, "Data frame from unknown STA " MACSTR
     785           0 :                    " - adding a new STA", MAC2STR(addr));
     786           0 :         sta = ap_sta_add(hapd, addr);
     787           0 :         if (sta) {
     788           0 :                 hostapd_new_assoc_sta(hapd, sta, 0);
     789             :         } else {
     790           0 :                 wpa_printf(MSG_DEBUG, "Failed to add STA entry for " MACSTR,
     791           0 :                            MAC2STR(addr));
     792           0 :                 return -1;
     793             :         }
     794             : 
     795           0 :         return 0;
     796             : }
     797             : 
     798             : 
     799        3384 : static void hostapd_event_eapol_rx(struct hostapd_data *hapd, const u8 *src,
     800             :                                    const u8 *data, size_t data_len)
     801             : {
     802        3384 :         struct hostapd_iface *iface = hapd->iface;
     803             :         struct sta_info *sta;
     804             :         size_t j;
     805             : 
     806        3399 :         for (j = 0; j < iface->num_bss; j++) {
     807        3392 :                 if ((sta = ap_get_sta(iface->bss[j], src))) {
     808        3380 :                         if (sta->flags & WLAN_STA_ASSOC) {
     809        3377 :                                 hapd = iface->bss[j];
     810        3377 :                                 break;
     811             :                         }
     812             :                 }
     813             :         }
     814             : 
     815        3384 :         ieee802_1x_receive(hapd, src, data, data_len);
     816        3384 : }
     817             : 
     818             : 
     819          35 : static struct hostapd_channel_data * hostapd_get_mode_channel(
     820             :         struct hostapd_iface *iface, unsigned int freq)
     821             : {
     822             :         int i;
     823             :         struct hostapd_channel_data *chan;
     824             : 
     825         395 :         for (i = 0; i < iface->current_mode->num_channels; i++) {
     826         380 :                 chan = &iface->current_mode->channels[i];
     827         380 :                 if (!chan)
     828           0 :                         return NULL;
     829         380 :                 if ((unsigned int) chan->freq == freq)
     830          20 :                         return chan;
     831             :         }
     832             : 
     833          15 :         return NULL;
     834             : }
     835             : 
     836             : 
     837          20 : static void hostapd_update_nf(struct hostapd_iface *iface,
     838             :                               struct hostapd_channel_data *chan,
     839             :                               struct freq_survey *survey)
     840             : {
     841          20 :         if (!iface->chans_surveyed) {
     842           4 :                 chan->min_nf = survey->nf;
     843           4 :                 iface->lowest_nf = survey->nf;
     844             :         } else {
     845          16 :                 if (dl_list_empty(&chan->survey_list))
     846           0 :                         chan->min_nf = survey->nf;
     847          16 :                 else if (survey->nf < chan->min_nf)
     848           0 :                         chan->min_nf = survey->nf;
     849          16 :                 if (survey->nf < iface->lowest_nf)
     850           0 :                         iface->lowest_nf = survey->nf;
     851             :         }
     852          20 : }
     853             : 
     854             : 
     855          35 : static void hostapd_event_get_survey(struct hostapd_data *hapd,
     856             :                                      struct survey_results *survey_results)
     857             : {
     858          35 :         struct hostapd_iface *iface = hapd->iface;
     859             :         struct freq_survey *survey, *tmp;
     860             :         struct hostapd_channel_data *chan;
     861             : 
     862          35 :         if (dl_list_empty(&survey_results->survey_list)) {
     863           0 :                 wpa_printf(MSG_DEBUG, "No survey data received");
     864          35 :                 return;
     865             :         }
     866             : 
     867          70 :         dl_list_for_each_safe(survey, tmp, &survey_results->survey_list,
     868             :                               struct freq_survey, list) {
     869          35 :                 chan = hostapd_get_mode_channel(iface, survey->freq);
     870          35 :                 if (!chan)
     871          15 :                         continue;
     872          20 :                 if (chan->flag & HOSTAPD_CHAN_DISABLED)
     873           0 :                         continue;
     874             : 
     875          20 :                 dl_list_del(&survey->list);
     876          20 :                 dl_list_add_tail(&chan->survey_list, &survey->list);
     877             : 
     878          20 :                 hostapd_update_nf(iface, chan, survey);
     879             : 
     880          20 :                 iface->chans_surveyed++;
     881             :         }
     882             : }
     883             : 
     884             : 
     885             : #ifdef NEED_AP_MLME
     886             : 
     887           2 : static void hostapd_event_dfs_radar_detected(struct hostapd_data *hapd,
     888             :                                              struct dfs_event *radar)
     889             : {
     890           2 :         wpa_printf(MSG_DEBUG, "DFS radar detected on %d MHz", radar->freq);
     891           4 :         hostapd_dfs_radar_detected(hapd->iface, radar->freq, radar->ht_enabled,
     892           2 :                                    radar->chan_offset, radar->chan_width,
     893             :                                    radar->cf1, radar->cf2);
     894           2 : }
     895             : 
     896             : 
     897           0 : static void hostapd_event_dfs_cac_finished(struct hostapd_data *hapd,
     898             :                                            struct dfs_event *radar)
     899             : {
     900           0 :         wpa_printf(MSG_DEBUG, "DFS CAC finished on %d MHz", radar->freq);
     901           0 :         hostapd_dfs_complete_cac(hapd->iface, 1, radar->freq, radar->ht_enabled,
     902           0 :                                  radar->chan_offset, radar->chan_width,
     903             :                                  radar->cf1, radar->cf2);
     904           0 : }
     905             : 
     906             : 
     907           0 : static void hostapd_event_dfs_cac_aborted(struct hostapd_data *hapd,
     908             :                                           struct dfs_event *radar)
     909             : {
     910           0 :         wpa_printf(MSG_DEBUG, "DFS CAC aborted on %d MHz", radar->freq);
     911           0 :         hostapd_dfs_complete_cac(hapd->iface, 0, radar->freq, radar->ht_enabled,
     912           0 :                                  radar->chan_offset, radar->chan_width,
     913             :                                  radar->cf1, radar->cf2);
     914           0 : }
     915             : 
     916             : 
     917           0 : static void hostapd_event_dfs_nop_finished(struct hostapd_data *hapd,
     918             :                                            struct dfs_event *radar)
     919             : {
     920           0 :         wpa_printf(MSG_DEBUG, "DFS NOP finished on %d MHz", radar->freq);
     921           0 :         hostapd_dfs_nop_finished(hapd->iface, radar->freq, radar->ht_enabled,
     922           0 :                                  radar->chan_offset, radar->chan_width,
     923             :                                  radar->cf1, radar->cf2);
     924           0 : }
     925             : 
     926             : #endif /* NEED_AP_MLME */
     927             : 
     928             : 
     929       16033 : void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
     930             :                           union wpa_event_data *data)
     931             : {
     932       16033 :         struct hostapd_data *hapd = ctx;
     933             : #ifndef CONFIG_NO_STDOUT_DEBUG
     934       16033 :         int level = MSG_DEBUG;
     935             : 
     936       21693 :         if (event == EVENT_RX_MGMT && data->rx_mgmt.frame &&
     937        5660 :             data->rx_mgmt.frame_len >= 24) {
     938             :                 const struct ieee80211_hdr *hdr;
     939             :                 u16 fc;
     940        5660 :                 hdr = (const struct ieee80211_hdr *) data->rx_mgmt.frame;
     941        5660 :                 fc = le_to_host16(hdr->frame_control);
     942       11320 :                 if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
     943        5660 :                     WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_BEACON)
     944        1630 :                         level = MSG_EXCESSIVE;
     945       11320 :                 if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
     946        5660 :                     WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_REQ)
     947        1319 :                         level = MSG_EXCESSIVE;
     948             :         }
     949             : 
     950       16033 :         wpa_dbg(hapd->msg_ctx, level, "Event %s (%d) received",
     951             :                 event_to_string(event), event);
     952             : #endif /* CONFIG_NO_STDOUT_DEBUG */
     953             : 
     954       16033 :         switch (event) {
     955             :         case EVENT_MICHAEL_MIC_FAILURE:
     956           2 :                 michael_mic_failure(hapd, data->michael_mic_failure.src, 1);
     957           2 :                 break;
     958             :         case EVENT_SCAN_RESULTS:
     959          59 :                 if (hapd->iface->scan_cb)
     960          59 :                         hapd->iface->scan_cb(hapd->iface);
     961          59 :                 break;
     962             : #ifdef CONFIG_IEEE80211R
     963             :         case EVENT_FT_RRB_RX:
     964           0 :                 wpa_ft_rrb_rx(hapd->wpa_auth, data->ft_rrb_rx.src,
     965             :                               data->ft_rrb_rx.data, data->ft_rrb_rx.data_len);
     966           0 :                 break;
     967             : #endif /* CONFIG_IEEE80211R */
     968             :         case EVENT_WPS_BUTTON_PUSHED:
     969           0 :                 hostapd_wps_button_pushed(hapd, NULL);
     970           0 :                 break;
     971             : #ifdef NEED_AP_MLME
     972             :         case EVENT_TX_STATUS:
     973        2364 :                 switch (data->tx_status.type) {
     974             :                 case WLAN_FC_TYPE_MGMT:
     975        4728 :                         hostapd_mgmt_tx_cb(hapd, data->tx_status.data,
     976             :                                            data->tx_status.data_len,
     977        2364 :                                            data->tx_status.stype,
     978             :                                            data->tx_status.ack);
     979        2364 :                         break;
     980             :                 case WLAN_FC_TYPE_DATA:
     981           0 :                         hostapd_tx_status(hapd, data->tx_status.dst,
     982             :                                           data->tx_status.data,
     983             :                                           data->tx_status.data_len,
     984             :                                           data->tx_status.ack);
     985           0 :                         break;
     986             :                 }
     987        2364 :                 break;
     988             :         case EVENT_EAPOL_TX_STATUS:
     989        7452 :                 hostapd_eapol_tx_status(hapd, data->eapol_tx_status.dst,
     990             :                                         data->eapol_tx_status.data,
     991        3726 :                                         data->eapol_tx_status.data_len,
     992             :                                         data->eapol_tx_status.ack);
     993        3726 :                 break;
     994             :         case EVENT_DRIVER_CLIENT_POLL_OK:
     995           0 :                 hostapd_client_poll_ok(hapd, data->client_poll.addr);
     996           0 :                 break;
     997             :         case EVENT_RX_FROM_UNKNOWN:
     998           2 :                 hostapd_rx_from_unknown_sta(hapd, data->rx_from_unknown.bssid,
     999             :                                             data->rx_from_unknown.addr,
    1000             :                                             data->rx_from_unknown.wds);
    1001           2 :                 break;
    1002             : #endif /* NEED_AP_MLME */
    1003             :         case EVENT_RX_MGMT:
    1004        5660 :                 if (!data->rx_mgmt.frame)
    1005           0 :                         break;
    1006             : #ifdef NEED_AP_MLME
    1007        5660 :                 if (hostapd_mgmt_rx(hapd, &data->rx_mgmt) > 0)
    1008        5660 :                         break;
    1009             : #endif /* NEED_AP_MLME */
    1010           0 :                 hostapd_action_rx(hapd, &data->rx_mgmt);
    1011           0 :                 break;
    1012             :         case EVENT_RX_PROBE_REQ:
    1013           0 :                 if (data->rx_probe_req.sa == NULL ||
    1014           0 :                     data->rx_probe_req.ie == NULL)
    1015             :                         break;
    1016           0 :                 hostapd_probe_req_rx(hapd, data->rx_probe_req.sa,
    1017             :                                      data->rx_probe_req.da,
    1018             :                                      data->rx_probe_req.bssid,
    1019             :                                      data->rx_probe_req.ie,
    1020             :                                      data->rx_probe_req.ie_len,
    1021             :                                      data->rx_probe_req.ssi_signal);
    1022           0 :                 break;
    1023             :         case EVENT_NEW_STA:
    1024           0 :                 hostapd_event_new_sta(hapd, data->new_sta.addr);
    1025           0 :                 break;
    1026             :         case EVENT_EAPOL_RX:
    1027        3384 :                 hostapd_event_eapol_rx(hapd, data->eapol_rx.src,
    1028             :                                        data->eapol_rx.data,
    1029             :                                        data->eapol_rx.data_len);
    1030        3384 :                 break;
    1031             :         case EVENT_ASSOC:
    1032           0 :                 hostapd_notif_assoc(hapd, data->assoc_info.addr,
    1033             :                                     data->assoc_info.req_ies,
    1034             :                                     data->assoc_info.req_ies_len,
    1035             :                                     data->assoc_info.reassoc);
    1036           0 :                 break;
    1037             :         case EVENT_DISASSOC:
    1038           0 :                 if (data)
    1039           0 :                         hostapd_notif_disassoc(hapd, data->disassoc_info.addr);
    1040           0 :                 break;
    1041             :         case EVENT_DEAUTH:
    1042           0 :                 if (data)
    1043           0 :                         hostapd_notif_disassoc(hapd, data->deauth_info.addr);
    1044           0 :                 break;
    1045             :         case EVENT_STATION_LOW_ACK:
    1046           0 :                 if (!data)
    1047           0 :                         break;
    1048           0 :                 hostapd_event_sta_low_ack(hapd, data->low_ack.addr);
    1049           0 :                 break;
    1050             :         case EVENT_AUTH:
    1051           0 :                 hostapd_notif_auth(hapd, &data->auth);
    1052           0 :                 break;
    1053             :         case EVENT_CH_SWITCH:
    1054           0 :                 if (!data)
    1055           0 :                         break;
    1056           0 :                 hostapd_event_ch_switch(hapd, data->ch_switch.freq,
    1057             :                                         data->ch_switch.ht_enabled,
    1058             :                                         data->ch_switch.ch_offset,
    1059           0 :                                         data->ch_switch.ch_width,
    1060             :                                         data->ch_switch.cf1,
    1061             :                                         data->ch_switch.cf2);
    1062           0 :                 break;
    1063             :         case EVENT_CONNECT_FAILED_REASON:
    1064           0 :                 if (!data)
    1065           0 :                         break;
    1066           0 :                 hostapd_event_connect_failed_reason(
    1067           0 :                         hapd, data->connect_failed_reason.addr,
    1068           0 :                         data->connect_failed_reason.code);
    1069           0 :                 break;
    1070             :         case EVENT_SURVEY:
    1071          35 :                 hostapd_event_get_survey(hapd, &data->survey_results);
    1072          35 :                 break;
    1073             : #ifdef NEED_AP_MLME
    1074             :         case EVENT_DFS_RADAR_DETECTED:
    1075           2 :                 if (!data)
    1076           0 :                         break;
    1077           2 :                 hostapd_event_dfs_radar_detected(hapd, &data->dfs_event);
    1078           2 :                 break;
    1079             :         case EVENT_DFS_CAC_FINISHED:
    1080           0 :                 if (!data)
    1081           0 :                         break;
    1082           0 :                 hostapd_event_dfs_cac_finished(hapd, &data->dfs_event);
    1083           0 :                 break;
    1084             :         case EVENT_DFS_CAC_ABORTED:
    1085           0 :                 if (!data)
    1086           0 :                         break;
    1087           0 :                 hostapd_event_dfs_cac_aborted(hapd, &data->dfs_event);
    1088           0 :                 break;
    1089             :         case EVENT_DFS_NOP_FINISHED:
    1090           0 :                 if (!data)
    1091           0 :                         break;
    1092           0 :                 hostapd_event_dfs_nop_finished(hapd, &data->dfs_event);
    1093           0 :                 break;
    1094             :         case EVENT_CHANNEL_LIST_CHANGED:
    1095             :                 /* channel list changed (regulatory?), update channel list */
    1096             :                 /* TODO: check this. hostapd_get_hw_features() initializes
    1097             :                  * too much stuff. */
    1098             :                 /* hostapd_get_hw_features(hapd->iface); */
    1099         577 :                 hostapd_channel_list_updated(
    1100         577 :                         hapd->iface, data->channel_list_changed.initiator);
    1101         577 :                 break;
    1102             : #endif /* NEED_AP_MLME */
    1103             :         default:
    1104         222 :                 wpa_printf(MSG_DEBUG, "Unknown event %d", event);
    1105         222 :                 break;
    1106             :         }
    1107       16033 : }
    1108             : 
    1109             : #endif /* HOSTAPD */

Generated by: LCOV version 1.10