xref: /freebsd/contrib/wpa/src/ap/hostapd.c (revision 7937bfbc0ca53fe7cdd0d54414f9296e273a518e)
1 /*
2  * hostapd / Initialization and configuration
3  * Copyright (c) 2002-2021, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "utils/includes.h"
10 #ifdef CONFIG_SQLITE
11 #include <sqlite3.h>
12 #endif /* CONFIG_SQLITE */
13 
14 #include "utils/common.h"
15 #include "utils/eloop.h"
16 #include "utils/crc32.h"
17 #include "common/ieee802_11_defs.h"
18 #include "common/wpa_ctrl.h"
19 #include "common/hw_features_common.h"
20 #include "radius/radius_client.h"
21 #include "radius/radius_das.h"
22 #include "eap_server/tncs.h"
23 #include "eapol_auth/eapol_auth_sm.h"
24 #include "eapol_auth/eapol_auth_sm_i.h"
25 #include "fst/fst.h"
26 #include "hostapd.h"
27 #include "authsrv.h"
28 #include "sta_info.h"
29 #include "accounting.h"
30 #include "ap_list.h"
31 #include "beacon.h"
32 #include "ieee802_1x.h"
33 #include "ieee802_11_auth.h"
34 #include "vlan_init.h"
35 #include "wpa_auth.h"
36 #include "wps_hostapd.h"
37 #include "dpp_hostapd.h"
38 #include "nan_usd_ap.h"
39 #include "gas_query_ap.h"
40 #include "hw_features.h"
41 #include "wpa_auth_glue.h"
42 #include "ap_drv_ops.h"
43 #include "ap_config.h"
44 #include "p2p_hostapd.h"
45 #include "gas_serv.h"
46 #include "dfs.h"
47 #include "ieee802_11.h"
48 #include "bss_load.h"
49 #include "x_snoop.h"
50 #include "dhcp_snoop.h"
51 #include "ndisc_snoop.h"
52 #include "neighbor_db.h"
53 #include "rrm.h"
54 #include "fils_hlp.h"
55 #include "acs.h"
56 #include "hs20.h"
57 #include "airtime_policy.h"
58 #include "wpa_auth_kay.h"
59 #include "hw_features.h"
60 
61 
62 static int hostapd_flush_old_stations(struct hostapd_data *hapd, u16 reason);
63 #ifdef CONFIG_WEP
64 static int hostapd_setup_encryption(char *iface, struct hostapd_data *hapd);
65 static int hostapd_broadcast_wep_clear(struct hostapd_data *hapd);
66 #endif /* CONFIG_WEP */
67 static int setup_interface2(struct hostapd_iface *iface);
68 static void channel_list_update_timeout(void *eloop_ctx, void *timeout_ctx);
69 static void hostapd_interface_setup_failure_handler(void *eloop_ctx,
70 						    void *timeout_ctx);
71 #ifdef CONFIG_IEEE80211AX
72 static void hostapd_switch_color_timeout_handler(void *eloop_data,
73 						 void *user_ctx);
74 #endif /* CONFIG_IEEE80211AX */
75 
76 
77 int hostapd_for_each_interface(struct hapd_interfaces *interfaces,
78 			       int (*cb)(struct hostapd_iface *iface,
79 					 void *ctx), void *ctx)
80 {
81 	size_t i;
82 	int ret;
83 
84 	for (i = 0; i < interfaces->count; i++) {
85 		if (!interfaces->iface[i])
86 			continue;
87 		ret = cb(interfaces->iface[i], ctx);
88 		if (ret)
89 			return ret;
90 	}
91 
92 	return 0;
93 }
94 
95 
96 struct hostapd_data * hostapd_mbssid_get_tx_bss(struct hostapd_data *hapd)
97 {
98 	if (hapd->iconf->mbssid)
99 		return hapd->iface->bss[0];
100 
101 	return hapd;
102 }
103 
104 
105 int hostapd_mbssid_get_bss_index(struct hostapd_data *hapd)
106 {
107 	if (hapd->iconf->mbssid) {
108 		size_t i;
109 
110 		for (i = 1; i < hapd->iface->num_bss; i++)
111 			if (hapd->iface->bss[i] == hapd)
112 				return i;
113 	}
114 
115 	return 0;
116 }
117 
118 
119 void hostapd_reconfig_encryption(struct hostapd_data *hapd)
120 {
121 	if (hapd->wpa_auth)
122 		return;
123 
124 	hostapd_set_privacy(hapd, 0);
125 #ifdef CONFIG_WEP
126 	hostapd_setup_encryption(hapd->conf->iface, hapd);
127 #endif /* CONFIG_WEP */
128 }
129 
130 
131 static void hostapd_reload_bss(struct hostapd_data *hapd)
132 {
133 	struct hostapd_ssid *ssid;
134 
135 	if (!hapd->started)
136 		return;
137 
138 	if (hapd->conf->wmm_enabled < 0)
139 		hapd->conf->wmm_enabled = hapd->iconf->ieee80211n |
140 			hapd->iconf->ieee80211ax;
141 
142 #ifndef CONFIG_NO_RADIUS
143 	radius_client_reconfig(hapd->radius, hapd->conf->radius);
144 #endif /* CONFIG_NO_RADIUS */
145 
146 	ssid = &hapd->conf->ssid;
147 	if (!ssid->wpa_psk_set && ssid->wpa_psk && !ssid->wpa_psk->next &&
148 	    ssid->wpa_passphrase_set && ssid->wpa_passphrase) {
149 		/*
150 		 * Force PSK to be derived again since SSID or passphrase may
151 		 * have changed.
152 		 */
153 		hostapd_config_clear_wpa_psk(&hapd->conf->ssid.wpa_psk);
154 	}
155 	if (hostapd_setup_wpa_psk(hapd->conf)) {
156 		wpa_printf(MSG_ERROR, "Failed to re-configure WPA PSK "
157 			   "after reloading configuration");
158 	}
159 
160 	if (hapd->conf->ieee802_1x || hapd->conf->wpa)
161 		hostapd_set_drv_ieee8021x(hapd, hapd->conf->iface, 1);
162 	else
163 		hostapd_set_drv_ieee8021x(hapd, hapd->conf->iface, 0);
164 
165 	if ((hapd->conf->wpa || hapd->conf->osen) && hapd->wpa_auth == NULL) {
166 		hostapd_setup_wpa(hapd);
167 		if (hapd->wpa_auth)
168 			wpa_init_keys(hapd->wpa_auth);
169 	} else if (hapd->conf->wpa) {
170 		const u8 *wpa_ie;
171 		size_t wpa_ie_len;
172 		hostapd_reconfig_wpa(hapd);
173 		wpa_ie = wpa_auth_get_wpa_ie(hapd->wpa_auth, &wpa_ie_len);
174 		if (hostapd_set_generic_elem(hapd, wpa_ie, wpa_ie_len))
175 			wpa_printf(MSG_ERROR, "Failed to configure WPA IE for "
176 				   "the kernel driver.");
177 	} else if (hapd->wpa_auth) {
178 		wpa_deinit(hapd->wpa_auth);
179 		hapd->wpa_auth = NULL;
180 		hostapd_set_privacy(hapd, 0);
181 #ifdef CONFIG_WEP
182 		hostapd_setup_encryption(hapd->conf->iface, hapd);
183 #endif /* CONFIG_WEP */
184 		hostapd_set_generic_elem(hapd, (u8 *) "", 0);
185 	}
186 
187 	hostapd_neighbor_sync_own_report(hapd);
188 
189 	ieee802_11_set_beacon(hapd);
190 	hostapd_update_wps(hapd);
191 
192 	if (hapd->conf->ssid.ssid_set &&
193 	    hostapd_set_ssid(hapd, hapd->conf->ssid.ssid,
194 			     hapd->conf->ssid.ssid_len)) {
195 		wpa_printf(MSG_ERROR, "Could not set SSID for kernel driver");
196 		/* try to continue */
197 	}
198 	wpa_printf(MSG_DEBUG, "Reconfigured interface %s", hapd->conf->iface);
199 }
200 
201 
202 static void hostapd_clear_old_bss(struct hostapd_data *bss)
203 {
204 	wpa_printf(MSG_DEBUG, "BSS %s changed - clear old state",
205 		   bss->conf->iface);
206 
207 	/*
208 	 * Deauthenticate all stations since the new configuration may not
209 	 * allow them to use the BSS anymore.
210 	 */
211 	hostapd_flush_old_stations(bss, WLAN_REASON_PREV_AUTH_NOT_VALID);
212 #ifdef CONFIG_WEP
213 	hostapd_broadcast_wep_clear(bss);
214 #endif /* CONFIG_WEP */
215 
216 #ifndef CONFIG_NO_RADIUS
217 	/* TODO: update dynamic data based on changed configuration
218 	 * items (e.g., open/close sockets, etc.) */
219 	radius_client_flush(bss->radius, 0);
220 #endif /* CONFIG_NO_RADIUS */
221 }
222 
223 
224 static void hostapd_clear_old(struct hostapd_iface *iface)
225 {
226 	size_t j;
227 
228 	for (j = 0; j < iface->num_bss; j++)
229 		hostapd_clear_old_bss(iface->bss[j]);
230 }
231 
232 
233 static int hostapd_iface_conf_changed(struct hostapd_config *newconf,
234 				      struct hostapd_config *oldconf)
235 {
236 	size_t i;
237 
238 	if (newconf->num_bss != oldconf->num_bss)
239 		return 1;
240 
241 	for (i = 0; i < newconf->num_bss; i++) {
242 		if (os_strcmp(newconf->bss[i]->iface,
243 			      oldconf->bss[i]->iface) != 0)
244 			return 1;
245 	}
246 
247 	return 0;
248 }
249 
250 
251 int hostapd_reload_config(struct hostapd_iface *iface)
252 {
253 	struct hapd_interfaces *interfaces = iface->interfaces;
254 	struct hostapd_data *hapd = iface->bss[0];
255 	struct hostapd_config *newconf, *oldconf;
256 	size_t j;
257 
258 	if (iface->config_fname == NULL) {
259 		/* Only in-memory config in use - assume it has been updated */
260 		hostapd_clear_old(iface);
261 		for (j = 0; j < iface->num_bss; j++)
262 			hostapd_reload_bss(iface->bss[j]);
263 		return 0;
264 	}
265 
266 	if (iface->interfaces == NULL ||
267 	    iface->interfaces->config_read_cb == NULL)
268 		return -1;
269 	newconf = iface->interfaces->config_read_cb(iface->config_fname);
270 	if (newconf == NULL)
271 		return -1;
272 
273 	oldconf = hapd->iconf;
274 	if (hostapd_iface_conf_changed(newconf, oldconf)) {
275 		char *fname;
276 		int res;
277 
278 		hostapd_clear_old(iface);
279 
280 		wpa_printf(MSG_DEBUG,
281 			   "Configuration changes include interface/BSS modification - force full disable+enable sequence");
282 		fname = os_strdup(iface->config_fname);
283 		if (!fname) {
284 			hostapd_config_free(newconf);
285 			return -1;
286 		}
287 		hostapd_remove_iface(interfaces, hapd->conf->iface);
288 		iface = hostapd_init(interfaces, fname);
289 		os_free(fname);
290 		hostapd_config_free(newconf);
291 		if (!iface) {
292 			wpa_printf(MSG_ERROR,
293 				   "Failed to initialize interface on config reload");
294 			return -1;
295 		}
296 		iface->interfaces = interfaces;
297 		interfaces->iface[interfaces->count] = iface;
298 		interfaces->count++;
299 		res = hostapd_enable_iface(iface);
300 		if (res < 0)
301 			wpa_printf(MSG_ERROR,
302 				   "Failed to enable interface on config reload");
303 		return res;
304 	}
305 	iface->conf = newconf;
306 
307 	for (j = 0; j < iface->num_bss; j++) {
308 		hapd = iface->bss[j];
309 		if (!hapd->conf->config_id || !newconf->bss[j]->config_id ||
310 		    os_strcmp(hapd->conf->config_id,
311 			      newconf->bss[j]->config_id) != 0)
312 			hostapd_clear_old_bss(hapd);
313 		hapd->iconf = newconf;
314 		hapd->iconf->channel = oldconf->channel;
315 		hapd->iconf->acs = oldconf->acs;
316 		hapd->iconf->secondary_channel = oldconf->secondary_channel;
317 		hapd->iconf->ieee80211n = oldconf->ieee80211n;
318 		hapd->iconf->ieee80211ac = oldconf->ieee80211ac;
319 		hapd->iconf->ht_capab = oldconf->ht_capab;
320 		hapd->iconf->vht_capab = oldconf->vht_capab;
321 		hostapd_set_oper_chwidth(hapd->iconf,
322 					 hostapd_get_oper_chwidth(oldconf));
323 		hostapd_set_oper_centr_freq_seg0_idx(
324 			hapd->iconf,
325 			hostapd_get_oper_centr_freq_seg0_idx(oldconf));
326 		hostapd_set_oper_centr_freq_seg1_idx(
327 			hapd->iconf,
328 			hostapd_get_oper_centr_freq_seg1_idx(oldconf));
329 		hapd->conf = newconf->bss[j];
330 		hostapd_reload_bss(hapd);
331 	}
332 
333 	hostapd_config_free(oldconf);
334 
335 
336 	return 0;
337 }
338 
339 
340 #ifdef CONFIG_WEP
341 
342 static void hostapd_broadcast_key_clear_iface(struct hostapd_data *hapd,
343 					      const char *ifname)
344 {
345 	int i;
346 
347 	if (!ifname || !hapd->drv_priv)
348 		return;
349 	for (i = 0; i < NUM_WEP_KEYS; i++) {
350 		if (hostapd_drv_set_key(ifname, hapd, WPA_ALG_NONE, NULL, i, 0,
351 					0, NULL, 0, NULL, 0, KEY_FLAG_GROUP)) {
352 			wpa_printf(MSG_DEBUG, "Failed to clear default "
353 				   "encryption keys (ifname=%s keyidx=%d)",
354 				   ifname, i);
355 		}
356 	}
357 	if (hapd->conf->ieee80211w) {
358 		for (i = NUM_WEP_KEYS; i < NUM_WEP_KEYS + 2; i++) {
359 			if (hostapd_drv_set_key(ifname, hapd, WPA_ALG_NONE,
360 						NULL, i, 0, 0, NULL,
361 						0, NULL, 0, KEY_FLAG_GROUP)) {
362 				wpa_printf(MSG_DEBUG, "Failed to clear "
363 					   "default mgmt encryption keys "
364 					   "(ifname=%s keyidx=%d)", ifname, i);
365 			}
366 		}
367 	}
368 }
369 
370 
371 static int hostapd_broadcast_wep_clear(struct hostapd_data *hapd)
372 {
373 	hostapd_broadcast_key_clear_iface(hapd, hapd->conf->iface);
374 	return 0;
375 }
376 
377 
378 static int hostapd_broadcast_wep_set(struct hostapd_data *hapd)
379 {
380 	int errors = 0, idx;
381 	struct hostapd_ssid *ssid = &hapd->conf->ssid;
382 
383 	idx = ssid->wep.idx;
384 	if (ssid->wep.default_len && ssid->wep.key[idx] &&
385 	    hostapd_drv_set_key(hapd->conf->iface,
386 				hapd, WPA_ALG_WEP, broadcast_ether_addr, idx, 0,
387 				1, NULL, 0, ssid->wep.key[idx],
388 				ssid->wep.len[idx],
389 				KEY_FLAG_GROUP_RX_TX_DEFAULT)) {
390 		wpa_printf(MSG_WARNING, "Could not set WEP encryption.");
391 		errors++;
392 	}
393 
394 	return errors;
395 }
396 
397 #endif /* CONFIG_WEP */
398 
399 
400 #ifdef CONFIG_IEEE80211BE
401 #ifdef CONFIG_TESTING_OPTIONS
402 
403 #define TU_TO_USEC(_val) ((_val) * 1024)
404 
405 static void hostapd_link_remove_timeout_handler(void *eloop_data,
406 						void *user_ctx)
407 {
408 	struct hostapd_data *hapd = (struct hostapd_data *) eloop_data;
409 
410 	if (hapd->eht_mld_link_removal_count == 0)
411 		return;
412 	hapd->eht_mld_link_removal_count--;
413 
414 	wpa_printf(MSG_DEBUG, "MLD: Remove link_id=%u in %u beacons",
415 		   hapd->mld_link_id,
416 		   hapd->eht_mld_link_removal_count);
417 
418 	ieee802_11_set_beacon(hapd);
419 
420 	if (!hapd->eht_mld_link_removal_count) {
421 		hostapd_free_link_stas(hapd);
422 		hostapd_disable_iface(hapd->iface);
423 		return;
424 	}
425 
426 	eloop_register_timeout(0, TU_TO_USEC(hapd->iconf->beacon_int),
427 			       hostapd_link_remove_timeout_handler,
428 			       hapd, NULL);
429 }
430 
431 
432 int hostapd_link_remove(struct hostapd_data *hapd, u32 count)
433 {
434 	if (!hapd->conf->mld_ap)
435 		return -1;
436 
437 	wpa_printf(MSG_DEBUG,
438 		   "MLD: Remove link_id=%u in %u beacons",
439 		   hapd->mld_link_id, count);
440 
441 	hapd->eht_mld_link_removal_count = count;
442 	hapd->eht_mld_bss_param_change++;
443 
444 	eloop_register_timeout(0, TU_TO_USEC(hapd->iconf->beacon_int),
445 			       hostapd_link_remove_timeout_handler,
446 			       hapd, NULL);
447 
448 	ieee802_11_set_beacon(hapd);
449 	return 0;
450 }
451 
452 #endif /* CONFIG_TESTING_OPTIONS */
453 #endif /* CONFIG_IEEE80211BE */
454 
455 
456 void hostapd_free_hapd_data(struct hostapd_data *hapd)
457 {
458 	os_free(hapd->probereq_cb);
459 	hapd->probereq_cb = NULL;
460 	hapd->num_probereq_cb = 0;
461 
462 #ifdef CONFIG_P2P
463 	wpabuf_free(hapd->p2p_beacon_ie);
464 	hapd->p2p_beacon_ie = NULL;
465 	wpabuf_free(hapd->p2p_probe_resp_ie);
466 	hapd->p2p_probe_resp_ie = NULL;
467 #endif /* CONFIG_P2P */
468 
469 	if (!hapd->started) {
470 		wpa_printf(MSG_ERROR, "%s: Interface %s wasn't started",
471 			   __func__, hapd->conf ? hapd->conf->iface : "N/A");
472 		return;
473 	}
474 	hapd->started = 0;
475 	hapd->beacon_set_done = 0;
476 
477 	wpa_printf(MSG_DEBUG, "%s(%s)", __func__, hapd->conf->iface);
478 	accounting_deinit(hapd);
479 	hostapd_deinit_wpa(hapd);
480 	vlan_deinit(hapd);
481 	hostapd_acl_deinit(hapd);
482 #ifndef CONFIG_NO_RADIUS
483 	if (hostapd_mld_is_first_bss(hapd)) {
484 #ifdef CONFIG_IEEE80211BE
485 		struct hapd_interfaces *ifaces = hapd->iface->interfaces;
486 		size_t i;
487 
488 		for (i = 0; i < ifaces->count; i++) {
489 			struct hostapd_iface *iface = ifaces->iface[i];
490 			size_t j;
491 
492 			for (j = 0; iface && j < iface->num_bss; j++) {
493 				struct hostapd_data *h = iface->bss[j];
494 
495 				if (hapd == h)
496 					continue;
497 				if (h->radius == hapd->radius)
498 					h->radius = NULL;
499 				if (h->radius_das == hapd->radius_das)
500 					h->radius_das = NULL;
501 			}
502 		}
503 #endif /* CONFIG_IEEE80211BE */
504 		radius_client_deinit(hapd->radius);
505 		radius_das_deinit(hapd->radius_das);
506 	}
507 	hapd->radius = NULL;
508 	hapd->radius_das = NULL;
509 #endif /* CONFIG_NO_RADIUS */
510 
511 	hostapd_deinit_wps(hapd);
512 	ieee802_1x_dealloc_kay_sm_hapd(hapd);
513 #ifdef CONFIG_DPP
514 	hostapd_dpp_deinit(hapd);
515 	gas_query_ap_deinit(hapd->gas);
516 	hapd->gas = NULL;
517 #endif /* CONFIG_DPP */
518 #ifdef CONFIG_NAN_USD
519 	hostapd_nan_usd_deinit(hapd);
520 #endif /* CONFIG_NAN_USD */
521 
522 	authsrv_deinit(hapd);
523 
524 	if (hapd->interface_added) {
525 		hapd->interface_added = 0;
526 		if (hostapd_if_remove(hapd, WPA_IF_AP_BSS, hapd->conf->iface)) {
527 			wpa_printf(MSG_WARNING,
528 				   "Failed to remove BSS interface %s",
529 				   hapd->conf->iface);
530 			hapd->interface_added = 1;
531 		} else {
532 			/*
533 			 * Since this was a dynamically added interface, the
534 			 * driver wrapper may have removed its internal instance
535 			 * and hapd->drv_priv is not valid anymore.
536 			 */
537 			hapd->drv_priv = NULL;
538 		}
539 	}
540 
541 #ifdef CONFIG_IEEE80211BE
542 	/* If the interface was not added as well as it is not the first BSS,
543 	 * at least the link should be removed here since deinit will take care
544 	 * of only the first BSS. */
545 	if (hapd->conf->mld_ap && !hapd->interface_added &&
546 	    hapd->iface->bss[0] != hapd)
547 		hostapd_if_link_remove(hapd, WPA_IF_AP_BSS, hapd->conf->iface,
548 				       hapd->mld_link_id);
549 #endif /* CONFIG_IEEE80211BE */
550 
551 	wpabuf_free(hapd->time_adv);
552 	hapd->time_adv = NULL;
553 
554 #ifdef CONFIG_INTERWORKING
555 	gas_serv_deinit(hapd);
556 #endif /* CONFIG_INTERWORKING */
557 
558 	bss_load_update_deinit(hapd);
559 	ndisc_snoop_deinit(hapd);
560 	dhcp_snoop_deinit(hapd);
561 	x_snoop_deinit(hapd);
562 
563 #ifdef CONFIG_SQLITE
564 	bin_clear_free(hapd->tmp_eap_user.identity,
565 		       hapd->tmp_eap_user.identity_len);
566 	bin_clear_free(hapd->tmp_eap_user.password,
567 		       hapd->tmp_eap_user.password_len);
568 	os_memset(&hapd->tmp_eap_user, 0, sizeof(hapd->tmp_eap_user));
569 #endif /* CONFIG_SQLITE */
570 
571 #ifdef CONFIG_MESH
572 	wpabuf_free(hapd->mesh_pending_auth);
573 	hapd->mesh_pending_auth = NULL;
574 	/* handling setup failure is already done */
575 	hapd->setup_complete_cb = NULL;
576 #endif /* CONFIG_MESH */
577 
578 #ifndef CONFIG_NO_RRM
579 	hostapd_clean_rrm(hapd);
580 #endif /* CONFIG_NO_RRM */
581 	fils_hlp_deinit(hapd);
582 
583 #ifdef CONFIG_OCV
584 	eloop_cancel_timeout(hostapd_ocv_check_csa_sa_query, hapd, NULL);
585 #endif /* CONFIG_OCV */
586 
587 #ifdef CONFIG_SAE
588 	{
589 		struct hostapd_sae_commit_queue *q;
590 
591 		while ((q = dl_list_first(&hapd->sae_commit_queue,
592 					  struct hostapd_sae_commit_queue,
593 					  list))) {
594 			dl_list_del(&q->list);
595 			os_free(q);
596 		}
597 	}
598 	eloop_cancel_timeout(auth_sae_process_commit, hapd, NULL);
599 #endif /* CONFIG_SAE */
600 
601 #ifdef CONFIG_IEEE80211AX
602 	eloop_cancel_timeout(hostapd_switch_color_timeout_handler, hapd, NULL);
603 #ifdef CONFIG_TESTING_OPTIONS
604 #ifdef CONFIG_IEEE80211BE
605 	eloop_cancel_timeout(hostapd_link_remove_timeout_handler, hapd, NULL);
606 #endif /* CONFIG_IEEE80211BE */
607 #endif /* CONFIG_TESTING_OPTIONS */
608 
609 #endif /* CONFIG_IEEE80211AX */
610 }
611 
612 
613 /* hostapd_bss_link_deinit - Per-BSS ML cleanup (deinitialization)
614  * @hapd: Pointer to BSS data
615  *
616  * This function is used to unlink the BSS from the AP MLD.
617  * If the BSS being removed is the first link, the next link becomes the first
618  * link.
619  */
620 static void hostapd_bss_link_deinit(struct hostapd_data *hapd)
621 {
622 #ifdef CONFIG_IEEE80211BE
623 	if (!hapd->conf || !hapd->conf->mld_ap)
624 		return;
625 
626 	if (!hapd->mld->num_links)
627 		return;
628 
629 	/* If not started, not yet linked to the MLD. However, the first
630 	 * BSS is always linked since it is linked during driver_init(), and
631 	 * hence, need to remove it from the AP MLD.
632 	 */
633 	if (!hapd->started && hapd->iface->bss[0] != hapd)
634 		return;
635 
636 	/* The first BSS can also be only linked when at least driver_init() is
637 	 * executed. But if previous interface fails, it is not, and hence,
638 	 * safe to skip.
639 	 */
640 	if (hapd->iface->bss[0] == hapd && !hapd->drv_priv)
641 		return;
642 
643 	hostapd_mld_remove_link(hapd);
644 #endif /* CONFIG_IEEE80211BE */
645 }
646 
647 
648 /**
649  * hostapd_cleanup - Per-BSS cleanup (deinitialization)
650  * @hapd: Pointer to BSS data
651  *
652  * This function is used to free all per-BSS data structures and resources.
653  * Most of the modules that are initialized in hostapd_setup_bss() are
654  * deinitialized here.
655  */
656 static void hostapd_cleanup(struct hostapd_data *hapd)
657 {
658 	wpa_printf(MSG_DEBUG, "%s(hapd=%p (%s))", __func__, hapd,
659 		   hapd->conf ? hapd->conf->iface : "N/A");
660 	if (hapd->iface->interfaces &&
661 	    hapd->iface->interfaces->ctrl_iface_deinit) {
662 		wpa_msg(hapd->msg_ctx, MSG_INFO, WPA_EVENT_TERMINATING);
663 		hapd->iface->interfaces->ctrl_iface_deinit(hapd);
664 	}
665 	hostapd_free_hapd_data(hapd);
666 }
667 
668 
669 static void sta_track_deinit(struct hostapd_iface *iface)
670 {
671 	struct hostapd_sta_info *info;
672 
673 	if (!iface->num_sta_seen)
674 		return;
675 
676 	while ((info = dl_list_first(&iface->sta_seen, struct hostapd_sta_info,
677 				     list))) {
678 		dl_list_del(&info->list);
679 		iface->num_sta_seen--;
680 		sta_track_del(info);
681 	}
682 }
683 
684 
685 void hostapd_cleanup_iface_partial(struct hostapd_iface *iface)
686 {
687 	wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
688 	eloop_cancel_timeout(channel_list_update_timeout, iface, NULL);
689 #ifdef NEED_AP_MLME
690 	hostapd_stop_setup_timers(iface);
691 #endif /* NEED_AP_MLME */
692 	if (iface->current_mode)
693 		acs_cleanup(iface);
694 	hostapd_free_hw_features(iface->hw_features, iface->num_hw_features);
695 	iface->hw_features = NULL;
696 	iface->current_mode = NULL;
697 	os_free(iface->current_rates);
698 	iface->current_rates = NULL;
699 	os_free(iface->basic_rates);
700 	iface->basic_rates = NULL;
701 	iface->cac_started = 0;
702 	ap_list_deinit(iface);
703 	sta_track_deinit(iface);
704 	airtime_policy_update_deinit(iface);
705 }
706 
707 
708 /**
709  * hostapd_cleanup_iface - Complete per-interface cleanup
710  * @iface: Pointer to interface data
711  *
712  * This function is called after per-BSS data structures are deinitialized
713  * with hostapd_cleanup().
714  */
715 static void hostapd_cleanup_iface(struct hostapd_iface *iface)
716 {
717 	wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
718 	eloop_cancel_timeout(hostapd_interface_setup_failure_handler, iface,
719 			     NULL);
720 
721 	hostapd_cleanup_iface_partial(iface);
722 	hostapd_config_free(iface->conf);
723 	iface->conf = NULL;
724 
725 	os_free(iface->config_fname);
726 	os_free(iface->bss);
727 	wpa_printf(MSG_DEBUG, "%s: free iface=%p", __func__, iface);
728 	os_free(iface);
729 }
730 
731 
732 #ifdef CONFIG_WEP
733 
734 static void hostapd_clear_wep(struct hostapd_data *hapd)
735 {
736 	if (hapd->drv_priv && !hapd->iface->driver_ap_teardown && hapd->conf) {
737 		hostapd_set_privacy(hapd, 0);
738 		hostapd_broadcast_wep_clear(hapd);
739 	}
740 }
741 
742 
743 static int hostapd_setup_encryption(char *iface, struct hostapd_data *hapd)
744 {
745 	int i;
746 
747 	hostapd_broadcast_wep_set(hapd);
748 
749 	if (hapd->conf->ssid.wep.default_len) {
750 		hostapd_set_privacy(hapd, 1);
751 		return 0;
752 	}
753 
754 	/*
755 	 * When IEEE 802.1X is not enabled, the driver may need to know how to
756 	 * set authentication algorithms for static WEP.
757 	 */
758 	hostapd_drv_set_authmode(hapd, hapd->conf->auth_algs);
759 
760 	for (i = 0; i < 4; i++) {
761 		if (hapd->conf->ssid.wep.key[i] &&
762 		    hostapd_drv_set_key(iface, hapd, WPA_ALG_WEP, NULL, i, 0,
763 					i == hapd->conf->ssid.wep.idx, NULL, 0,
764 					hapd->conf->ssid.wep.key[i],
765 					hapd->conf->ssid.wep.len[i],
766 					i == hapd->conf->ssid.wep.idx ?
767 					KEY_FLAG_GROUP_RX_TX_DEFAULT :
768 					KEY_FLAG_GROUP_RX_TX)) {
769 			wpa_printf(MSG_WARNING, "Could not set WEP "
770 				   "encryption.");
771 			return -1;
772 		}
773 		if (hapd->conf->ssid.wep.key[i] &&
774 		    i == hapd->conf->ssid.wep.idx)
775 			hostapd_set_privacy(hapd, 1);
776 	}
777 
778 	return 0;
779 }
780 
781 #endif /* CONFIG_WEP */
782 
783 
784 static int hostapd_flush_old_stations(struct hostapd_data *hapd, u16 reason)
785 {
786 	int ret = 0;
787 	u8 addr[ETH_ALEN];
788 
789 	if (hostapd_drv_none(hapd) || hapd->drv_priv == NULL)
790 		return 0;
791 
792 	if (!hapd->iface->driver_ap_teardown) {
793 		wpa_dbg(hapd->msg_ctx, MSG_DEBUG,
794 			"Flushing old station entries");
795 
796 		if (hostapd_flush(hapd)) {
797 			wpa_msg(hapd->msg_ctx, MSG_WARNING,
798 				"Could not connect to kernel driver");
799 			ret = -1;
800 		}
801 	}
802 	if (hapd->conf && hapd->conf->broadcast_deauth) {
803 		wpa_dbg(hapd->msg_ctx, MSG_DEBUG,
804 			"Deauthenticate all stations");
805 		os_memset(addr, 0xff, ETH_ALEN);
806 		hostapd_drv_sta_deauth(hapd, addr, reason);
807 	}
808 	hostapd_free_stas(hapd);
809 
810 	return ret;
811 }
812 
813 
814 void hostapd_bss_deinit_no_free(struct hostapd_data *hapd)
815 {
816 	hostapd_free_stas(hapd);
817 	hostapd_flush_old_stations(hapd, WLAN_REASON_DEAUTH_LEAVING);
818 #ifdef CONFIG_WEP
819 	hostapd_clear_wep(hapd);
820 #endif /* CONFIG_WEP */
821 }
822 
823 
824 /**
825  * hostapd_validate_bssid_configuration - Validate BSSID configuration
826  * @iface: Pointer to interface data
827  * Returns: 0 on success, -1 on failure
828  *
829  * This function is used to validate that the configured BSSIDs are valid.
830  */
831 static int hostapd_validate_bssid_configuration(struct hostapd_iface *iface)
832 {
833 	u8 mask[ETH_ALEN] = { 0 };
834 	struct hostapd_data *hapd = iface->bss[0];
835 	unsigned int i = iface->conf->num_bss, bits = 0, j;
836 	int auto_addr = 0;
837 
838 	if (hostapd_drv_none(hapd))
839 		return 0;
840 
841 	if (iface->conf->use_driver_iface_addr)
842 		return 0;
843 
844 	/* Generate BSSID mask that is large enough to cover the BSSIDs. */
845 
846 	/* Determine the bits necessary to cover the number of BSSIDs. */
847 	for (i--; i; i >>= 1)
848 		bits++;
849 
850 	/* Determine the bits necessary to any configured BSSIDs,
851 	   if they are higher than the number of BSSIDs. */
852 	for (j = 0; j < iface->conf->num_bss; j++) {
853 		if (is_zero_ether_addr(iface->conf->bss[j]->bssid)) {
854 			if (j)
855 				auto_addr++;
856 			continue;
857 		}
858 
859 		for (i = 0; i < ETH_ALEN; i++) {
860 			mask[i] |=
861 				iface->conf->bss[j]->bssid[i] ^
862 				hapd->own_addr[i];
863 		}
864 	}
865 
866 	if (!auto_addr)
867 		goto skip_mask_ext;
868 
869 	for (i = 0; i < ETH_ALEN && mask[i] == 0; i++)
870 		;
871 	j = 0;
872 	if (i < ETH_ALEN) {
873 		j = (5 - i) * 8;
874 
875 		while (mask[i] != 0) {
876 			mask[i] >>= 1;
877 			j++;
878 		}
879 	}
880 
881 	if (bits < j)
882 		bits = j;
883 
884 	if (bits > 40) {
885 		wpa_printf(MSG_ERROR, "Too many bits in the BSSID mask (%u)",
886 			   bits);
887 		return -1;
888 	}
889 
890 	os_memset(mask, 0xff, ETH_ALEN);
891 	j = bits / 8;
892 	for (i = 5; i > 5 - j; i--)
893 		mask[i] = 0;
894 	j = bits % 8;
895 	while (j) {
896 		j--;
897 		mask[i] <<= 1;
898 	}
899 
900 skip_mask_ext:
901 	wpa_printf(MSG_DEBUG, "BSS count %lu, BSSID mask " MACSTR " (%d bits)",
902 		   (unsigned long) iface->conf->num_bss, MAC2STR(mask), bits);
903 
904 	if (!auto_addr)
905 		return 0;
906 
907 	for (i = 0; i < ETH_ALEN; i++) {
908 		if ((hapd->own_addr[i] & mask[i]) != hapd->own_addr[i]) {
909 			wpa_printf(MSG_ERROR, "Invalid BSSID mask " MACSTR
910 				   " for start address " MACSTR ".",
911 				   MAC2STR(mask), MAC2STR(hapd->own_addr));
912 			wpa_printf(MSG_ERROR, "Start address must be the "
913 				   "first address in the block (i.e., addr "
914 				   "AND mask == addr).");
915 			return -1;
916 		}
917 	}
918 
919 	return 0;
920 }
921 
922 
923 static int mac_in_conf(struct hostapd_config *conf, const void *a)
924 {
925 	size_t i;
926 
927 	for (i = 0; i < conf->num_bss; i++) {
928 		if (hostapd_mac_comp(conf->bss[i]->bssid, a) == 0) {
929 			return 1;
930 		}
931 	}
932 
933 	return 0;
934 }
935 
936 
937 #ifndef CONFIG_NO_RADIUS
938 
939 static int hostapd_das_nas_mismatch(struct hostapd_data *hapd,
940 				    struct radius_das_attrs *attr)
941 {
942 	if (attr->nas_identifier &&
943 	    (!hapd->conf->nas_identifier ||
944 	     os_strlen(hapd->conf->nas_identifier) !=
945 	     attr->nas_identifier_len ||
946 	     os_memcmp(hapd->conf->nas_identifier, attr->nas_identifier,
947 		       attr->nas_identifier_len) != 0)) {
948 		wpa_printf(MSG_DEBUG, "RADIUS DAS: NAS-Identifier mismatch");
949 		return 1;
950 	}
951 
952 	if (attr->nas_ip_addr &&
953 	    (hapd->conf->own_ip_addr.af != AF_INET ||
954 	     os_memcmp(&hapd->conf->own_ip_addr.u.v4, attr->nas_ip_addr, 4) !=
955 	     0)) {
956 		wpa_printf(MSG_DEBUG, "RADIUS DAS: NAS-IP-Address mismatch");
957 		return 1;
958 	}
959 
960 #ifdef CONFIG_IPV6
961 	if (attr->nas_ipv6_addr &&
962 	    (hapd->conf->own_ip_addr.af != AF_INET6 ||
963 	     os_memcmp(&hapd->conf->own_ip_addr.u.v6, attr->nas_ipv6_addr, 16)
964 	     != 0)) {
965 		wpa_printf(MSG_DEBUG, "RADIUS DAS: NAS-IPv6-Address mismatch");
966 		return 1;
967 	}
968 #endif /* CONFIG_IPV6 */
969 
970 	return 0;
971 }
972 
973 
974 static struct sta_info * hostapd_das_find_sta(struct hostapd_data *hapd,
975 					      struct radius_das_attrs *attr,
976 					      int *multi)
977 {
978 	struct sta_info *selected, *sta;
979 	char buf[128];
980 	int num_attr = 0;
981 	int count;
982 
983 	*multi = 0;
984 
985 	for (sta = hapd->sta_list; sta; sta = sta->next)
986 		sta->radius_das_match = 1;
987 
988 	if (attr->sta_addr) {
989 		num_attr++;
990 		sta = ap_get_sta(hapd, attr->sta_addr);
991 		if (!sta) {
992 			wpa_printf(MSG_DEBUG,
993 				   "RADIUS DAS: No Calling-Station-Id match");
994 			return NULL;
995 		}
996 
997 		selected = sta;
998 		for (sta = hapd->sta_list; sta; sta = sta->next) {
999 			if (sta != selected)
1000 				sta->radius_das_match = 0;
1001 		}
1002 		wpa_printf(MSG_DEBUG, "RADIUS DAS: Calling-Station-Id match");
1003 	}
1004 
1005 	if (attr->acct_session_id) {
1006 		num_attr++;
1007 		if (attr->acct_session_id_len != 16) {
1008 			wpa_printf(MSG_DEBUG,
1009 				   "RADIUS DAS: Acct-Session-Id cannot match");
1010 			return NULL;
1011 		}
1012 		count = 0;
1013 
1014 		for (sta = hapd->sta_list; sta; sta = sta->next) {
1015 			if (!sta->radius_das_match)
1016 				continue;
1017 			os_snprintf(buf, sizeof(buf), "%016llX",
1018 				    (unsigned long long) sta->acct_session_id);
1019 			if (os_memcmp(attr->acct_session_id, buf, 16) != 0)
1020 				sta->radius_das_match = 0;
1021 			else
1022 				count++;
1023 		}
1024 
1025 		if (count == 0) {
1026 			wpa_printf(MSG_DEBUG,
1027 				   "RADIUS DAS: No matches remaining after Acct-Session-Id check");
1028 			return NULL;
1029 		}
1030 		wpa_printf(MSG_DEBUG, "RADIUS DAS: Acct-Session-Id match");
1031 	}
1032 
1033 	if (attr->acct_multi_session_id) {
1034 		num_attr++;
1035 		if (attr->acct_multi_session_id_len != 16) {
1036 			wpa_printf(MSG_DEBUG,
1037 				   "RADIUS DAS: Acct-Multi-Session-Id cannot match");
1038 			return NULL;
1039 		}
1040 		count = 0;
1041 
1042 		for (sta = hapd->sta_list; sta; sta = sta->next) {
1043 			if (!sta->radius_das_match)
1044 				continue;
1045 			if (!sta->eapol_sm ||
1046 			    !sta->eapol_sm->acct_multi_session_id) {
1047 				sta->radius_das_match = 0;
1048 				continue;
1049 			}
1050 			os_snprintf(buf, sizeof(buf), "%016llX",
1051 				    (unsigned long long)
1052 				    sta->eapol_sm->acct_multi_session_id);
1053 			if (os_memcmp(attr->acct_multi_session_id, buf, 16) !=
1054 			    0)
1055 				sta->radius_das_match = 0;
1056 			else
1057 				count++;
1058 		}
1059 
1060 		if (count == 0) {
1061 			wpa_printf(MSG_DEBUG,
1062 				   "RADIUS DAS: No matches remaining after Acct-Multi-Session-Id check");
1063 			return NULL;
1064 		}
1065 		wpa_printf(MSG_DEBUG,
1066 			   "RADIUS DAS: Acct-Multi-Session-Id match");
1067 	}
1068 
1069 	if (attr->cui) {
1070 		num_attr++;
1071 		count = 0;
1072 
1073 		for (sta = hapd->sta_list; sta; sta = sta->next) {
1074 			struct wpabuf *cui;
1075 
1076 			if (!sta->radius_das_match)
1077 				continue;
1078 			cui = ieee802_1x_get_radius_cui(sta->eapol_sm);
1079 			if (!cui || wpabuf_len(cui) != attr->cui_len ||
1080 			    os_memcmp(wpabuf_head(cui), attr->cui,
1081 				      attr->cui_len) != 0)
1082 				sta->radius_das_match = 0;
1083 			else
1084 				count++;
1085 		}
1086 
1087 		if (count == 0) {
1088 			wpa_printf(MSG_DEBUG,
1089 				   "RADIUS DAS: No matches remaining after Chargeable-User-Identity check");
1090 			return NULL;
1091 		}
1092 		wpa_printf(MSG_DEBUG,
1093 			   "RADIUS DAS: Chargeable-User-Identity match");
1094 	}
1095 
1096 	if (attr->user_name) {
1097 		num_attr++;
1098 		count = 0;
1099 
1100 		for (sta = hapd->sta_list; sta; sta = sta->next) {
1101 			u8 *identity;
1102 			size_t identity_len;
1103 
1104 			if (!sta->radius_das_match)
1105 				continue;
1106 			identity = ieee802_1x_get_identity(sta->eapol_sm,
1107 							   &identity_len);
1108 			if (!identity ||
1109 			    identity_len != attr->user_name_len ||
1110 			    os_memcmp(identity, attr->user_name, identity_len)
1111 			    != 0)
1112 				sta->radius_das_match = 0;
1113 			else
1114 				count++;
1115 		}
1116 
1117 		if (count == 0) {
1118 			wpa_printf(MSG_DEBUG,
1119 				   "RADIUS DAS: No matches remaining after User-Name check");
1120 			return NULL;
1121 		}
1122 		wpa_printf(MSG_DEBUG,
1123 			   "RADIUS DAS: User-Name match");
1124 	}
1125 
1126 	if (num_attr == 0) {
1127 		/*
1128 		 * In theory, we could match all current associations, but it
1129 		 * seems safer to just reject requests that do not include any
1130 		 * session identification attributes.
1131 		 */
1132 		wpa_printf(MSG_DEBUG,
1133 			   "RADIUS DAS: No session identification attributes included");
1134 		return NULL;
1135 	}
1136 
1137 	selected = NULL;
1138 	for (sta = hapd->sta_list; sta; sta = sta->next) {
1139 		if (sta->radius_das_match) {
1140 			if (selected) {
1141 				*multi = 1;
1142 				return NULL;
1143 			}
1144 			selected = sta;
1145 		}
1146 	}
1147 
1148 	return selected;
1149 }
1150 
1151 
1152 static int hostapd_das_disconnect_pmksa(struct hostapd_data *hapd,
1153 					struct radius_das_attrs *attr)
1154 {
1155 	if (!hapd->wpa_auth)
1156 		return -1;
1157 	return wpa_auth_radius_das_disconnect_pmksa(hapd->wpa_auth, attr);
1158 }
1159 
1160 
1161 static enum radius_das_res
1162 hostapd_das_disconnect(void *ctx, struct radius_das_attrs *attr)
1163 {
1164 	struct hostapd_data *hapd = ctx;
1165 	struct sta_info *sta;
1166 	int multi;
1167 
1168 	if (hostapd_das_nas_mismatch(hapd, attr))
1169 		return RADIUS_DAS_NAS_MISMATCH;
1170 
1171 	sta = hostapd_das_find_sta(hapd, attr, &multi);
1172 	if (sta == NULL) {
1173 		if (multi) {
1174 			wpa_printf(MSG_DEBUG,
1175 				   "RADIUS DAS: Multiple sessions match - not supported");
1176 			return RADIUS_DAS_MULTI_SESSION_MATCH;
1177 		}
1178 		if (hostapd_das_disconnect_pmksa(hapd, attr) == 0) {
1179 			wpa_printf(MSG_DEBUG,
1180 				   "RADIUS DAS: PMKSA cache entry matched");
1181 			return RADIUS_DAS_SUCCESS;
1182 		}
1183 		wpa_printf(MSG_DEBUG, "RADIUS DAS: No matching session found");
1184 		return RADIUS_DAS_SESSION_NOT_FOUND;
1185 	}
1186 
1187 	wpa_printf(MSG_DEBUG, "RADIUS DAS: Found a matching session " MACSTR
1188 		   " - disconnecting", MAC2STR(sta->addr));
1189 	wpa_auth_pmksa_remove(hapd->wpa_auth, sta->addr);
1190 
1191 	hostapd_drv_sta_deauth(hapd, sta->addr,
1192 			       WLAN_REASON_PREV_AUTH_NOT_VALID);
1193 	ap_sta_deauthenticate(hapd, sta, WLAN_REASON_PREV_AUTH_NOT_VALID);
1194 
1195 	return RADIUS_DAS_SUCCESS;
1196 }
1197 
1198 
1199 #ifdef CONFIG_HS20
1200 static enum radius_das_res
1201 hostapd_das_coa(void *ctx, struct radius_das_attrs *attr)
1202 {
1203 	struct hostapd_data *hapd = ctx;
1204 	struct sta_info *sta;
1205 	int multi;
1206 
1207 	if (hostapd_das_nas_mismatch(hapd, attr))
1208 		return RADIUS_DAS_NAS_MISMATCH;
1209 
1210 	sta = hostapd_das_find_sta(hapd, attr, &multi);
1211 	if (!sta) {
1212 		if (multi) {
1213 			wpa_printf(MSG_DEBUG,
1214 				   "RADIUS DAS: Multiple sessions match - not supported");
1215 			return RADIUS_DAS_MULTI_SESSION_MATCH;
1216 		}
1217 		wpa_printf(MSG_DEBUG, "RADIUS DAS: No matching session found");
1218 		return RADIUS_DAS_SESSION_NOT_FOUND;
1219 	}
1220 
1221 	wpa_printf(MSG_DEBUG, "RADIUS DAS: Found a matching session " MACSTR
1222 		   " - CoA", MAC2STR(sta->addr));
1223 
1224 	if (attr->hs20_t_c_filtering) {
1225 		if (attr->hs20_t_c_filtering[0] & BIT(0)) {
1226 			wpa_printf(MSG_DEBUG,
1227 				   "HS 2.0: Unexpected Terms and Conditions filtering required in CoA-Request");
1228 			return RADIUS_DAS_COA_FAILED;
1229 		}
1230 
1231 		hs20_t_c_filtering(hapd, sta, 0);
1232 	}
1233 
1234 	return RADIUS_DAS_SUCCESS;
1235 }
1236 #else /* CONFIG_HS20 */
1237 #define hostapd_das_coa NULL
1238 #endif /* CONFIG_HS20 */
1239 
1240 
1241 #ifdef CONFIG_SQLITE
1242 
1243 static int db_table_exists(sqlite3 *db, const char *name)
1244 {
1245 	char cmd[128];
1246 
1247 	os_snprintf(cmd, sizeof(cmd), "SELECT 1 FROM %s;", name);
1248 	return sqlite3_exec(db, cmd, NULL, NULL, NULL) == SQLITE_OK;
1249 }
1250 
1251 
1252 static int db_table_create_radius_attributes(sqlite3 *db)
1253 {
1254 	char *err = NULL;
1255 	const char *sql =
1256 		"CREATE TABLE radius_attributes("
1257 		" id INTEGER PRIMARY KEY,"
1258 		" sta TEXT,"
1259 		" reqtype TEXT,"
1260 		" attr TEXT"
1261 		");"
1262 		"CREATE INDEX idx_sta_reqtype ON radius_attributes(sta,reqtype);";
1263 
1264 	wpa_printf(MSG_DEBUG,
1265 		   "Adding database table for RADIUS attribute information");
1266 	if (sqlite3_exec(db, sql, NULL, NULL, &err) != SQLITE_OK) {
1267 		wpa_printf(MSG_ERROR, "SQLite error: %s", err);
1268 		sqlite3_free(err);
1269 		return -1;
1270 	}
1271 
1272 	return 0;
1273 }
1274 
1275 #endif /* CONFIG_SQLITE */
1276 
1277 #endif /* CONFIG_NO_RADIUS */
1278 
1279 
1280 static int hostapd_start_beacon(struct hostapd_data *hapd,
1281 				bool flush_old_stations)
1282 {
1283 	struct hostapd_bss_config *conf = hapd->conf;
1284 
1285 	if (!conf->start_disabled && ieee802_11_set_beacon(hapd) < 0)
1286 		return -1;
1287 
1288 	if (flush_old_stations && !conf->start_disabled &&
1289 	    conf->broadcast_deauth) {
1290 		u8 addr[ETH_ALEN];
1291 
1292 		/* Should any previously associated STA not have noticed that
1293 		 * the AP had stopped and restarted, send one more
1294 		 * deauthentication notification now that the AP is ready to
1295 		 * operate. */
1296 		wpa_dbg(hapd->msg_ctx, MSG_DEBUG,
1297 			"Deauthenticate all stations at BSS start");
1298 		os_memset(addr, 0xff, ETH_ALEN);
1299 		hostapd_drv_sta_deauth(hapd, addr,
1300 				       WLAN_REASON_PREV_AUTH_NOT_VALID);
1301 	}
1302 
1303 	if (hapd->driver && hapd->driver->set_operstate)
1304 		hapd->driver->set_operstate(hapd->drv_priv, 1);
1305 
1306 	return 0;
1307 }
1308 
1309 
1310 #ifndef CONFIG_NO_RADIUS
1311 static int hostapd_bss_radius_init(struct hostapd_data *hapd)
1312 {
1313 	struct hostapd_bss_config *conf;
1314 
1315 	if (!hapd)
1316 		return -1;
1317 
1318 	conf = hapd->conf;
1319 
1320 	if (hapd->radius) {
1321 		wpa_printf(MSG_DEBUG,
1322 			   "Skipping RADIUS client init (already done)");
1323 		return 0;
1324 	}
1325 
1326 	hapd->radius = radius_client_init(hapd, conf->radius);
1327 	if (!hapd->radius) {
1328 		wpa_printf(MSG_ERROR,
1329 			   "RADIUS client initialization failed.");
1330 		return -1;
1331 	}
1332 
1333 	if (conf->radius_das_port) {
1334 		struct radius_das_conf das_conf;
1335 
1336 		os_memset(&das_conf, 0, sizeof(das_conf));
1337 		das_conf.port = conf->radius_das_port;
1338 		das_conf.shared_secret = conf->radius_das_shared_secret;
1339 		das_conf.shared_secret_len =
1340 			conf->radius_das_shared_secret_len;
1341 		das_conf.client_addr = &conf->radius_das_client_addr;
1342 		das_conf.time_window = conf->radius_das_time_window;
1343 		das_conf.require_event_timestamp =
1344 			conf->radius_das_require_event_timestamp;
1345 		das_conf.require_message_authenticator =
1346 			conf->radius_das_require_message_authenticator;
1347 		das_conf.ctx = hapd;
1348 		das_conf.disconnect = hostapd_das_disconnect;
1349 		das_conf.coa = hostapd_das_coa;
1350 		hapd->radius_das = radius_das_init(&das_conf);
1351 		if (!hapd->radius_das) {
1352 			wpa_printf(MSG_ERROR,
1353 				   "RADIUS DAS initialization failed.");
1354 			return -1;
1355 		}
1356 	}
1357 
1358 	return 0;
1359 }
1360 #endif /* CONFIG_NO_RADIUS */
1361 
1362 
1363 /**
1364  * hostapd_setup_bss - Per-BSS setup (initialization)
1365  * @hapd: Pointer to BSS data
1366  * @first: Whether this BSS is the first BSS of an interface; -1 = not first,
1367  *	but interface may exist
1368  * @start_beacon: Whether Beacon frame template should be configured and
1369  *	transmission of Beaconf rames started at this time. This is used when
1370  *	MBSSID element is enabled where the information regarding all BSSes
1371  *	should be retrieved before configuring the Beacon frame template. The
1372  *	calling functions are responsible for configuring the Beacon frame
1373  *	explicitly if this is set to false.
1374  *
1375  * This function is used to initialize all per-BSS data structures and
1376  * resources. This gets called in a loop for each BSS when an interface is
1377  * initialized. Most of the modules that are initialized here will be
1378  * deinitialized in hostapd_cleanup().
1379  */
1380 static int hostapd_setup_bss(struct hostapd_data *hapd, int first,
1381 			     bool start_beacon)
1382 {
1383 	struct hostapd_bss_config *conf = hapd->conf;
1384 	u8 ssid[SSID_MAX_LEN + 1];
1385 	int ssid_len, set_ssid;
1386 	char force_ifname[IFNAMSIZ];
1387 	u8 if_addr[ETH_ALEN];
1388 	int flush_old_stations = 1;
1389 
1390 	if (!hostapd_mld_is_first_bss(hapd))
1391 		wpa_printf(MSG_DEBUG,
1392 			   "MLD: %s: Setting non-first BSS", __func__);
1393 
1394 	wpa_printf(MSG_DEBUG, "%s(hapd=%p (%s), first=%d)",
1395 		   __func__, hapd, conf->iface, first);
1396 
1397 #ifdef EAP_SERVER_TNC
1398 	if (conf->tnc && tncs_global_init() < 0) {
1399 		wpa_printf(MSG_ERROR, "Failed to initialize TNCS");
1400 		return -1;
1401 	}
1402 #endif /* EAP_SERVER_TNC */
1403 
1404 	if (hapd->started) {
1405 		wpa_printf(MSG_ERROR, "%s: Interface %s was already started",
1406 			   __func__, conf->iface);
1407 		return -1;
1408 	}
1409 	hapd->started = 1;
1410 
1411 	if (!first || first == -1) {
1412 		u8 *addr = hapd->own_addr;
1413 
1414 		if (!is_zero_ether_addr(conf->bssid)) {
1415 			/* Allocate the configured BSSID. */
1416 			os_memcpy(hapd->own_addr, conf->bssid, ETH_ALEN);
1417 
1418 			if (hostapd_mac_comp(hapd->own_addr,
1419 					     hapd->iface->bss[0]->own_addr) ==
1420 			    0) {
1421 				wpa_printf(MSG_ERROR, "BSS '%s' may not have "
1422 					   "BSSID set to the MAC address of "
1423 					   "the radio", conf->iface);
1424 				return -1;
1425 			}
1426 		} else if (hapd->iconf->use_driver_iface_addr) {
1427 			addr = NULL;
1428 		} else {
1429 			/* Allocate the next available BSSID. */
1430 			do {
1431 				inc_byte_array(hapd->own_addr, ETH_ALEN);
1432 			} while (mac_in_conf(hapd->iconf, hapd->own_addr));
1433 		}
1434 
1435 #ifdef CONFIG_IEEE80211BE
1436 		if (conf->mld_ap) {
1437 			struct hostapd_data *h_hapd;
1438 
1439 			h_hapd = hostapd_mld_get_first_bss(hapd);
1440 			if (h_hapd) {
1441 				hapd->drv_priv = h_hapd->drv_priv;
1442 				hapd->interface_added = h_hapd->interface_added;
1443 				hostapd_mld_add_link(hapd);
1444 				wpa_printf(MSG_DEBUG,
1445 					   "Setup of non first link (%d) BSS of MLD %s",
1446 					   hapd->mld_link_id, hapd->conf->iface);
1447 				goto setup_mld;
1448 			}
1449 		}
1450 #endif /* CONFIG_IEEE80211BE */
1451 
1452 		hapd->interface_added = 1;
1453 		if (hostapd_if_add(hapd->iface->bss[0], WPA_IF_AP_BSS,
1454 				   conf->iface, addr, hapd,
1455 				   &hapd->drv_priv, force_ifname, if_addr,
1456 				   conf->bridge[0] ? conf->bridge : NULL,
1457 				   first == -1)) {
1458 			wpa_printf(MSG_ERROR, "Failed to add BSS (BSSID="
1459 				   MACSTR ")", MAC2STR(hapd->own_addr));
1460 			hapd->interface_added = 0;
1461 			return -1;
1462 		}
1463 
1464 		if (!addr)
1465 			os_memcpy(hapd->own_addr, if_addr, ETH_ALEN);
1466 
1467 #ifdef CONFIG_IEEE80211BE
1468 		if (hapd->conf->mld_ap) {
1469 			wpa_printf(MSG_DEBUG,
1470 				   "Setup of first link (%d) BSS of MLD %s",
1471 				   hapd->mld_link_id, hapd->conf->iface);
1472 			os_memcpy(hapd->mld->mld_addr, hapd->own_addr,
1473 				  ETH_ALEN);
1474 			hostapd_mld_add_link(hapd);
1475 		}
1476 #endif /* CONFIG_IEEE80211BE */
1477 	}
1478 
1479 #ifdef CONFIG_IEEE80211BE
1480 setup_mld:
1481 	if (hapd->conf->mld_ap && !first) {
1482 		wpa_printf(MSG_DEBUG,
1483 			   "MLD: Set link_id=%u, mld_addr=" MACSTR
1484 			   ", own_addr=" MACSTR,
1485 			   hapd->mld_link_id, MAC2STR(hapd->mld->mld_addr),
1486 			   MAC2STR(hapd->own_addr));
1487 
1488 		if (hostapd_drv_link_add(hapd, hapd->mld_link_id,
1489 					 hapd->own_addr))
1490 			return -1;
1491 	}
1492 #endif /* CONFIG_IEEE80211BE */
1493 
1494 	if (conf->wmm_enabled < 0)
1495 		conf->wmm_enabled = hapd->iconf->ieee80211n |
1496 			hapd->iconf->ieee80211ax;
1497 
1498 #ifdef CONFIG_IEEE80211R_AP
1499 	if (is_zero_ether_addr(conf->r1_key_holder))
1500 		os_memcpy(conf->r1_key_holder, hapd->own_addr, ETH_ALEN);
1501 #endif /* CONFIG_IEEE80211R_AP */
1502 
1503 #ifdef CONFIG_MESH
1504 	if ((hapd->conf->mesh & MESH_ENABLED) && hapd->iface->mconf == NULL)
1505 		flush_old_stations = 0;
1506 #endif /* CONFIG_MESH */
1507 
1508 	if (flush_old_stations)
1509 		hostapd_flush(hapd);
1510 	hostapd_set_privacy(hapd, 0);
1511 
1512 #ifdef CONFIG_WEP
1513 	if (!hostapd_drv_nl80211(hapd))
1514 		hostapd_broadcast_wep_clear(hapd);
1515 	if (hostapd_setup_encryption(conf->iface, hapd))
1516 		return -1;
1517 #endif /* CONFIG_WEP */
1518 
1519 	/*
1520 	 * Fetch the SSID from the system and use it or,
1521 	 * if one was specified in the config file, verify they
1522 	 * match.
1523 	 */
1524 	ssid_len = hostapd_get_ssid(hapd, ssid, sizeof(ssid));
1525 	if (ssid_len < 0) {
1526 		wpa_printf(MSG_ERROR, "Could not read SSID from system");
1527 		return -1;
1528 	}
1529 	if (conf->ssid.ssid_set) {
1530 		/*
1531 		 * If SSID is specified in the config file and it differs
1532 		 * from what is being used then force installation of the
1533 		 * new SSID.
1534 		 */
1535 		set_ssid = (conf->ssid.ssid_len != (size_t) ssid_len ||
1536 			    os_memcmp(conf->ssid.ssid, ssid, ssid_len) != 0);
1537 	} else {
1538 		/*
1539 		 * No SSID in the config file; just use the one we got
1540 		 * from the system.
1541 		 */
1542 		set_ssid = 0;
1543 		conf->ssid.ssid_len = ssid_len;
1544 		os_memcpy(conf->ssid.ssid, ssid, conf->ssid.ssid_len);
1545 	}
1546 
1547 	/*
1548 	 * Short SSID calculation is identical to FCS and it is defined in
1549 	 * IEEE P802.11-REVmd/D3.0, 9.4.2.170.3 (Calculating the Short-SSID).
1550 	 */
1551 	conf->ssid.short_ssid = ieee80211_crc32(conf->ssid.ssid,
1552 						conf->ssid.ssid_len);
1553 
1554 	if (!hostapd_drv_none(hapd)) {
1555 		wpa_printf(MSG_DEBUG, "Using interface %s with hwaddr " MACSTR
1556 			   " and ssid \"%s\"",
1557 			   conf->iface, MAC2STR(hapd->own_addr),
1558 			   wpa_ssid_txt(conf->ssid.ssid, conf->ssid.ssid_len));
1559 	}
1560 
1561 	if (hostapd_setup_wpa_psk(conf)) {
1562 		wpa_printf(MSG_ERROR, "WPA-PSK setup failed.");
1563 		return -1;
1564 	}
1565 
1566 	/* Set SSID for the kernel driver (to be used in beacon and probe
1567 	 * response frames) */
1568 	if (set_ssid && hostapd_set_ssid(hapd, conf->ssid.ssid,
1569 					 conf->ssid.ssid_len)) {
1570 		wpa_printf(MSG_ERROR, "Could not set SSID for kernel driver");
1571 		return -1;
1572 	}
1573 
1574 	if (wpa_debug_level <= MSG_MSGDUMP)
1575 		conf->radius->msg_dumps = 1;
1576 #ifndef CONFIG_NO_RADIUS
1577 
1578 #ifdef CONFIG_SQLITE
1579 	if (conf->radius_req_attr_sqlite) {
1580 		if (sqlite3_open(conf->radius_req_attr_sqlite,
1581 				 &hapd->rad_attr_db)) {
1582 			wpa_printf(MSG_ERROR, "Could not open SQLite file '%s'",
1583 				   conf->radius_req_attr_sqlite);
1584 			return -1;
1585 		}
1586 
1587 		wpa_printf(MSG_DEBUG, "Opening RADIUS attribute database: %s",
1588 			   conf->radius_req_attr_sqlite);
1589 		if (!db_table_exists(hapd->rad_attr_db, "radius_attributes") &&
1590 		    db_table_create_radius_attributes(hapd->rad_attr_db) < 0)
1591 			return -1;
1592 	}
1593 #endif /* CONFIG_SQLITE */
1594 
1595 	if (hostapd_mld_is_first_bss(hapd)) {
1596 		if (hostapd_bss_radius_init(hapd))
1597 			return -1;
1598 	} else {
1599 #ifdef CONFIG_IEEE80211BE
1600 		struct hostapd_data *f_bss;
1601 
1602 		f_bss = hostapd_mld_get_first_bss(hapd);
1603 		if (!f_bss)
1604 			return -1;
1605 
1606 		if (!f_bss->radius) {
1607 			wpa_printf(MSG_DEBUG,
1608 				   "MLD: First BSS RADIUS client does not exist. Init on its behalf");
1609 
1610 			if (hostapd_bss_radius_init(f_bss))
1611 				return -1;
1612 		}
1613 
1614 		wpa_printf(MSG_DEBUG,
1615 			   "MLD: Using RADIUS client of the first BSS");
1616 		hapd->radius = f_bss->radius;
1617 		hapd->radius_das = f_bss->radius_das;
1618 #endif /* CONFIG_IEEE80211BE */
1619 	}
1620 #endif /* CONFIG_NO_RADIUS */
1621 
1622 	if (hostapd_acl_init(hapd)) {
1623 		wpa_printf(MSG_ERROR, "ACL initialization failed.");
1624 		return -1;
1625 	}
1626 	if (hostapd_init_wps(hapd, conf))
1627 		return -1;
1628 
1629 #ifdef CONFIG_DPP
1630 	hapd->gas = gas_query_ap_init(hapd, hapd->msg_ctx);
1631 	if (!hapd->gas)
1632 		return -1;
1633 	if (hostapd_dpp_init(hapd))
1634 		return -1;
1635 #endif /* CONFIG_DPP */
1636 
1637 #ifdef CONFIG_NAN_USD
1638 	if (hostapd_nan_usd_init(hapd) < 0)
1639 		return -1;
1640 #endif /* CONFIG_NAN_USD */
1641 
1642 	if (authsrv_init(hapd) < 0)
1643 		return -1;
1644 
1645 	if (ieee802_1x_init(hapd)) {
1646 		wpa_printf(MSG_ERROR, "IEEE 802.1X initialization failed.");
1647 		return -1;
1648 	}
1649 
1650 	if ((conf->wpa || conf->osen) && hostapd_setup_wpa(hapd))
1651 		return -1;
1652 
1653 	if (accounting_init(hapd)) {
1654 		wpa_printf(MSG_ERROR, "Accounting initialization failed.");
1655 		return -1;
1656 	}
1657 
1658 #ifdef CONFIG_INTERWORKING
1659 	if (gas_serv_init(hapd)) {
1660 		wpa_printf(MSG_ERROR, "GAS server initialization failed");
1661 		return -1;
1662 	}
1663 #endif /* CONFIG_INTERWORKING */
1664 
1665 	if (conf->qos_map_set_len &&
1666 	    hostapd_drv_set_qos_map(hapd, conf->qos_map_set,
1667 				    conf->qos_map_set_len)) {
1668 		wpa_printf(MSG_ERROR, "Failed to initialize QoS Map");
1669 		return -1;
1670 	}
1671 
1672 	if (conf->bss_load_update_period && bss_load_update_init(hapd)) {
1673 		wpa_printf(MSG_ERROR, "BSS Load initialization failed");
1674 		return -1;
1675 	}
1676 
1677 	if (conf->bridge[0]) {
1678 		/* Set explicitly configured bridge parameters that might have
1679 		 * been lost if the interface has been removed out of the
1680 		 * bridge. */
1681 
1682 		/* multicast to unicast on bridge ports */
1683 		if (conf->bridge_multicast_to_unicast)
1684 			hostapd_drv_br_port_set_attr(
1685 				hapd, DRV_BR_PORT_ATTR_MCAST2UCAST, 1);
1686 
1687 		/* hairpin mode */
1688 		if (conf->bridge_hairpin)
1689 			hostapd_drv_br_port_set_attr(
1690 				hapd, DRV_BR_PORT_ATTR_HAIRPIN_MODE, 1);
1691 	}
1692 
1693 	if (conf->proxy_arp) {
1694 		if (x_snoop_init(hapd)) {
1695 			wpa_printf(MSG_ERROR,
1696 				   "Generic snooping infrastructure initialization failed");
1697 			return -1;
1698 		}
1699 
1700 		if (dhcp_snoop_init(hapd)) {
1701 			wpa_printf(MSG_ERROR,
1702 				   "DHCP snooping initialization failed");
1703 			return -1;
1704 		}
1705 
1706 		if (ndisc_snoop_init(hapd)) {
1707 			wpa_printf(MSG_ERROR,
1708 				   "Neighbor Discovery snooping initialization failed");
1709 			return -1;
1710 		}
1711 	}
1712 
1713 	if (!hostapd_drv_none(hapd) && vlan_init(hapd)) {
1714 		wpa_printf(MSG_ERROR, "VLAN initialization failed.");
1715 		return -1;
1716 	}
1717 
1718 	if (start_beacon && hostapd_start_beacon(hapd, flush_old_stations) < 0)
1719 		return -1;
1720 
1721 	if (hapd->wpa_auth && wpa_init_keys(hapd->wpa_auth) < 0)
1722 		return -1;
1723 
1724 	return 0;
1725 }
1726 
1727 
1728 static void hostapd_tx_queue_params(struct hostapd_iface *iface)
1729 {
1730 	struct hostapd_data *hapd = iface->bss[0];
1731 	int i;
1732 	struct hostapd_tx_queue_params *p;
1733 
1734 #ifdef CONFIG_MESH
1735 	if ((hapd->conf->mesh & MESH_ENABLED) && iface->mconf == NULL)
1736 		return;
1737 #endif /* CONFIG_MESH */
1738 
1739 	for (i = 0; i < NUM_TX_QUEUES; i++) {
1740 		p = &iface->conf->tx_queue[i];
1741 
1742 		if (hostapd_set_tx_queue_params(hapd, i, p->aifs, p->cwmin,
1743 						p->cwmax, p->burst)) {
1744 			wpa_printf(MSG_DEBUG, "Failed to set TX queue "
1745 				   "parameters for queue %d.", i);
1746 			/* Continue anyway */
1747 		}
1748 	}
1749 }
1750 
1751 
1752 static int hostapd_set_acl_list(struct hostapd_data *hapd,
1753 				struct mac_acl_entry *mac_acl,
1754 				int n_entries, u8 accept_acl)
1755 {
1756 	struct hostapd_acl_params *acl_params;
1757 	int i, err;
1758 
1759 	acl_params = os_zalloc(sizeof(*acl_params) +
1760 			       (n_entries * sizeof(acl_params->mac_acl[0])));
1761 	if (!acl_params)
1762 		return -ENOMEM;
1763 
1764 	for (i = 0; i < n_entries; i++)
1765 		os_memcpy(acl_params->mac_acl[i].addr, mac_acl[i].addr,
1766 			  ETH_ALEN);
1767 
1768 	acl_params->acl_policy = accept_acl;
1769 	acl_params->num_mac_acl = n_entries;
1770 
1771 	err = hostapd_drv_set_acl(hapd, acl_params);
1772 
1773 	os_free(acl_params);
1774 
1775 	return err;
1776 }
1777 
1778 
1779 int hostapd_set_acl(struct hostapd_data *hapd)
1780 {
1781 	struct hostapd_config *conf = hapd->iconf;
1782 	int err = 0;
1783 	u8 accept_acl;
1784 
1785 	if (hapd->iface->drv_max_acl_mac_addrs == 0)
1786 		return 0;
1787 
1788 	if (conf->bss[0]->macaddr_acl == DENY_UNLESS_ACCEPTED) {
1789 		accept_acl = 1;
1790 		err = hostapd_set_acl_list(hapd, conf->bss[0]->accept_mac,
1791 					   conf->bss[0]->num_accept_mac,
1792 					   accept_acl);
1793 		if (err) {
1794 			wpa_printf(MSG_DEBUG, "Failed to set accept acl");
1795 			return -1;
1796 		}
1797 	} else if (conf->bss[0]->macaddr_acl == ACCEPT_UNLESS_DENIED) {
1798 		accept_acl = 0;
1799 		err = hostapd_set_acl_list(hapd, conf->bss[0]->deny_mac,
1800 					   conf->bss[0]->num_deny_mac,
1801 					   accept_acl);
1802 		if (err) {
1803 			wpa_printf(MSG_DEBUG, "Failed to set deny acl");
1804 			return -1;
1805 		}
1806 	}
1807 	return err;
1808 }
1809 
1810 
1811 static int start_ctrl_iface_bss(struct hostapd_data *hapd)
1812 {
1813 	if (!hapd->iface->interfaces ||
1814 	    !hapd->iface->interfaces->ctrl_iface_init)
1815 		return 0;
1816 
1817 	if (hapd->iface->interfaces->ctrl_iface_init(hapd)) {
1818 		wpa_printf(MSG_ERROR,
1819 			   "Failed to setup control interface for %s",
1820 			   hapd->conf->iface);
1821 		return -1;
1822 	}
1823 
1824 	return 0;
1825 }
1826 
1827 
1828 static int start_ctrl_iface(struct hostapd_iface *iface)
1829 {
1830 	size_t i;
1831 
1832 	if (!iface->interfaces || !iface->interfaces->ctrl_iface_init)
1833 		return 0;
1834 
1835 	for (i = 0; i < iface->num_bss; i++) {
1836 		struct hostapd_data *hapd = iface->bss[i];
1837 		if (iface->interfaces->ctrl_iface_init(hapd)) {
1838 			wpa_printf(MSG_ERROR,
1839 				   "Failed to setup control interface for %s",
1840 				   hapd->conf->iface);
1841 			return -1;
1842 		}
1843 	}
1844 
1845 	return 0;
1846 }
1847 
1848 
1849 /* When NO_IR flag is set and AP is stopped, clean up BSS parameters without
1850  * deinitializing the driver and the control interfaces. A subsequent
1851  * REG_CHANGE event can bring the AP back up.
1852  */
1853 static void hostapd_no_ir_cleanup(struct hostapd_data *bss)
1854 {
1855 	hostapd_bss_deinit_no_free(bss);
1856 	hostapd_bss_link_deinit(bss);
1857 	hostapd_free_hapd_data(bss);
1858 	hostapd_cleanup_iface_partial(bss->iface);
1859 }
1860 
1861 
1862 static int hostapd_no_ir_channel_list_updated(struct hostapd_iface *iface,
1863 					      void *ctx)
1864 {
1865 	bool all_no_ir, is_6ghz;
1866 	int i, j;
1867 	struct hostapd_hw_modes *mode = NULL;
1868 
1869 	if (hostapd_get_hw_features(iface))
1870 		return 0;
1871 
1872 	all_no_ir = true;
1873 	is_6ghz = false;
1874 
1875 	for (i = 0; i < iface->num_hw_features; i++) {
1876 		mode = &iface->hw_features[i];
1877 
1878 		if (mode->mode == iface->conf->hw_mode) {
1879 			if (iface->freq > 0 &&
1880 			    !hw_mode_get_channel(mode, iface->freq, NULL)) {
1881 				mode = NULL;
1882 				continue;
1883 			}
1884 
1885 			for (j = 0; j < mode->num_channels; j++) {
1886 				if (!(mode->channels[j].flag &
1887 				      HOSTAPD_CHAN_NO_IR))
1888 					all_no_ir = false;
1889 
1890 				if (is_6ghz_freq(mode->channels[j].freq))
1891 					is_6ghz = true;
1892 			}
1893 			break;
1894 		}
1895 	}
1896 
1897 	if (!mode || !is_6ghz)
1898 		return 0;
1899 	iface->current_mode = mode;
1900 
1901 	if (iface->state == HAPD_IFACE_ENABLED) {
1902 		if (!all_no_ir) {
1903 			struct hostapd_channel_data *chan;
1904 
1905 			chan = hw_get_channel_freq(iface->current_mode->mode,
1906 						   iface->freq, NULL,
1907 						   iface->hw_features,
1908 						   iface->num_hw_features);
1909 
1910 			if (!chan) {
1911 				wpa_printf(MSG_ERROR,
1912 					   "NO_IR: Could not derive chan from freq");
1913 				return 0;
1914 			}
1915 
1916 			if (!(chan->flag & HOSTAPD_CHAN_NO_IR))
1917 				return 0;
1918 			wpa_printf(MSG_DEBUG,
1919 				   "NO_IR: The current channel has NO_IR flag now, stop AP.");
1920 		} else {
1921 			wpa_printf(MSG_DEBUG,
1922 				   "NO_IR: All chan in new chanlist are NO_IR, stop AP.");
1923 		}
1924 
1925 		hostapd_set_state(iface, HAPD_IFACE_NO_IR);
1926 		iface->is_no_ir = true;
1927 		hostapd_drv_stop_ap(iface->bss[0]);
1928 		hostapd_no_ir_cleanup(iface->bss[0]);
1929 		wpa_msg(iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_NO_IR);
1930 	} else if (iface->state == HAPD_IFACE_NO_IR) {
1931 		if (all_no_ir) {
1932 			wpa_printf(MSG_DEBUG,
1933 				   "NO_IR: AP in NO_IR and all chan in the new chanlist are NO_IR. Ignore");
1934 			return 0;
1935 		}
1936 
1937 		if (!iface->conf->acs) {
1938 			struct hostapd_channel_data *chan;
1939 
1940 			chan = hw_get_channel_freq(iface->current_mode->mode,
1941 						   iface->freq, NULL,
1942 						   iface->hw_features,
1943 						   iface->num_hw_features);
1944 			if (!chan) {
1945 				wpa_printf(MSG_ERROR,
1946 					   "NO_IR: Could not derive chan from freq");
1947 				return 0;
1948 			}
1949 
1950 			/* If the last operating channel is NO_IR, trigger ACS.
1951 			 */
1952 			if (chan->flag & HOSTAPD_CHAN_NO_IR) {
1953 				iface->freq = 0;
1954 				iface->conf->channel = 0;
1955 				if (acs_init(iface) != HOSTAPD_CHAN_ACS)
1956 					wpa_printf(MSG_ERROR,
1957 						   "NO_IR: Could not start ACS");
1958 				return 0;
1959 			}
1960 		}
1961 
1962 		setup_interface2(iface);
1963 	}
1964 
1965 	return 0;
1966 }
1967 
1968 
1969 static void channel_list_update_timeout(void *eloop_ctx, void *timeout_ctx)
1970 {
1971 	struct hostapd_iface *iface = eloop_ctx;
1972 
1973 	if (!iface->wait_channel_update) {
1974 		wpa_printf(MSG_INFO, "Channel list update timeout, but interface was not waiting for it");
1975 		return;
1976 	}
1977 
1978 	/*
1979 	 * It is possible that the existing channel list is acceptable, so try
1980 	 * to proceed.
1981 	 */
1982 	wpa_printf(MSG_DEBUG, "Channel list update timeout - try to continue anyway");
1983 	setup_interface2(iface);
1984 }
1985 
1986 
1987 void hostapd_channel_list_updated(struct hostapd_iface *iface, int initiator)
1988 {
1989 	if (initiator == REGDOM_SET_BY_DRIVER) {
1990 		hostapd_for_each_interface(iface->interfaces,
1991 					   hostapd_no_ir_channel_list_updated,
1992 					   NULL);
1993 		return;
1994 	}
1995 
1996 	if (!iface->wait_channel_update || initiator != REGDOM_SET_BY_USER)
1997 		return;
1998 
1999 	wpa_printf(MSG_DEBUG, "Channel list updated - continue setup");
2000 	eloop_cancel_timeout(channel_list_update_timeout, iface, NULL);
2001 	setup_interface2(iface);
2002 }
2003 
2004 
2005 static int setup_interface(struct hostapd_iface *iface)
2006 {
2007 	struct hostapd_data *hapd = iface->bss[0];
2008 	size_t i;
2009 
2010 	/*
2011 	 * It is possible that setup_interface() is called after the interface
2012 	 * was disabled etc., in which case driver_ap_teardown is possibly set
2013 	 * to 1. Clear it here so any other key/station deletion, which is not
2014 	 * part of a teardown flow, would also call the relevant driver
2015 	 * callbacks.
2016 	 */
2017 	iface->driver_ap_teardown = 0;
2018 
2019 	if (!iface->phy[0]) {
2020 		const char *phy = hostapd_drv_get_radio_name(hapd);
2021 		if (phy) {
2022 			wpa_printf(MSG_DEBUG, "phy: %s", phy);
2023 			os_strlcpy(iface->phy, phy, sizeof(iface->phy));
2024 		}
2025 	}
2026 
2027 	/*
2028 	 * Make sure that all BSSes get configured with a pointer to the same
2029 	 * driver interface.
2030 	 */
2031 	for (i = 1; i < iface->num_bss; i++) {
2032 		iface->bss[i]->driver = hapd->driver;
2033 		iface->bss[i]->drv_priv = hapd->drv_priv;
2034 	}
2035 
2036 	if (hostapd_validate_bssid_configuration(iface))
2037 		return -1;
2038 
2039 	/*
2040 	 * Initialize control interfaces early to allow external monitoring of
2041 	 * channel setup operations that may take considerable amount of time
2042 	 * especially for DFS cases.
2043 	 */
2044 	if (start_ctrl_iface(iface))
2045 		return -1;
2046 
2047 	if (hapd->iconf->country[0] && hapd->iconf->country[1]) {
2048 		char country[4], previous_country[4];
2049 
2050 		hostapd_set_state(iface, HAPD_IFACE_COUNTRY_UPDATE);
2051 		if (hostapd_get_country(hapd, previous_country) < 0)
2052 			previous_country[0] = '\0';
2053 
2054 		os_memcpy(country, hapd->iconf->country, 3);
2055 		country[3] = '\0';
2056 		if (hostapd_set_country(hapd, country) < 0) {
2057 			wpa_printf(MSG_ERROR, "Failed to set country code");
2058 			return -1;
2059 		}
2060 
2061 		wpa_printf(MSG_DEBUG, "Previous country code %s, new country code %s",
2062 			   previous_country, country);
2063 
2064 		if (os_strncmp(previous_country, country, 2) != 0) {
2065 			wpa_printf(MSG_DEBUG, "Continue interface setup after channel list update");
2066 			iface->wait_channel_update = 1;
2067 			eloop_register_timeout(5, 0,
2068 					       channel_list_update_timeout,
2069 					       iface, NULL);
2070 			return 0;
2071 		}
2072 	}
2073 
2074 	return setup_interface2(iface);
2075 }
2076 
2077 
2078 static int configured_fixed_chan_to_freq(struct hostapd_iface *iface)
2079 {
2080 	int freq, i, j;
2081 
2082 	if (!iface->conf->channel)
2083 		return 0;
2084 	if (iface->conf->op_class) {
2085 		freq = ieee80211_chan_to_freq(NULL, iface->conf->op_class,
2086 					      iface->conf->channel);
2087 		if (freq < 0) {
2088 			wpa_printf(MSG_INFO,
2089 				   "Could not convert op_class %u channel %u to operating frequency",
2090 				   iface->conf->op_class, iface->conf->channel);
2091 			return -1;
2092 		}
2093 		iface->freq = freq;
2094 		return 0;
2095 	}
2096 
2097 	/* Old configurations using only 2.4/5/60 GHz bands may not specify the
2098 	 * op_class parameter. Select a matching channel from the configured
2099 	 * mode using the channel parameter for these cases.
2100 	 */
2101 	for (j = 0; j < iface->num_hw_features; j++) {
2102 		struct hostapd_hw_modes *mode = &iface->hw_features[j];
2103 
2104 		if (iface->conf->hw_mode != HOSTAPD_MODE_IEEE80211ANY &&
2105 		    iface->conf->hw_mode != mode->mode)
2106 			continue;
2107 		for (i = 0; i < mode->num_channels; i++) {
2108 			struct hostapd_channel_data *chan = &mode->channels[i];
2109 
2110 			if (chan->chan == iface->conf->channel &&
2111 			    !is_6ghz_freq(chan->freq)) {
2112 				iface->freq = chan->freq;
2113 				return 0;
2114 			}
2115 		}
2116 	}
2117 
2118 	wpa_printf(MSG_INFO, "Could not determine operating frequency");
2119 	return -1;
2120 }
2121 
2122 
2123 static void hostapd_set_6ghz_sec_chan(struct hostapd_iface *iface)
2124 {
2125 	int bw;
2126 
2127 	if (!is_6ghz_op_class(iface->conf->op_class))
2128 		return;
2129 
2130 	bw = op_class_to_bandwidth(iface->conf->op_class);
2131 	/* Assign the secondary channel if absent in config for
2132 	 * bandwidths > 20 MHz */
2133 	if (bw >= 40 && !iface->conf->secondary_channel) {
2134 		if (((iface->conf->channel - 1) / 4) % 2)
2135 			iface->conf->secondary_channel = -1;
2136 		else
2137 			iface->conf->secondary_channel = 1;
2138 	}
2139 }
2140 
2141 
2142 static int setup_interface2(struct hostapd_iface *iface)
2143 {
2144 	iface->wait_channel_update = 0;
2145 	iface->is_no_ir = false;
2146 
2147 #ifdef __FreeBSD
2148 	/* XXX hostapd_get_hw_features() is an inline that always returns -1
2149 	 * because MLME will not build under FreeBSD due to its use of
2150 	 * Linux definitions. Normally FreeBSD would uncondionally execute the
2151 	 * "Not all drivers support..." block. Instead we #ifdef out the entire
2152 	 * block of code instead of maintaining the fallacy that
2153 	 * hostapd_get_hw_features() returns anything meaninful.
2154 	 *
2155 	 * Ideally WANT_AP_MLME should be taught about FreeBSD data structures
2156 	 * and defintions. Instead we do this to enable channel selection in
2157 	 * hostapd.conf.
2158 	 */
2159 	iface->freq = iface->conf->channel;
2160 #else
2161 	if (hostapd_get_hw_features(iface)) {
2162 		/* Not all drivers support this yet, so continue without hw
2163 		 * feature data. */
2164 	} else {
2165 		int ret;
2166 
2167 		if (iface->conf->acs && !iface->is_ch_switch_dfs) {
2168 			iface->freq = 0;
2169 			iface->conf->channel = 0;
2170 		}
2171 		iface->is_ch_switch_dfs = false;
2172 
2173 		ret = configured_fixed_chan_to_freq(iface);
2174 		if (ret < 0)
2175 			goto fail;
2176 
2177 		if (iface->conf->op_class) {
2178 			enum oper_chan_width ch_width;
2179 
2180 			ch_width = op_class_to_ch_width(iface->conf->op_class);
2181 			hostapd_set_oper_chwidth(iface->conf, ch_width);
2182 			hostapd_set_6ghz_sec_chan(iface);
2183 		}
2184 
2185 		ret = hostapd_select_hw_mode(iface);
2186 		if (ret < 0) {
2187 			wpa_printf(MSG_ERROR, "Could not select hw_mode and "
2188 				   "channel. (%d)", ret);
2189 			goto fail;
2190 		}
2191 		if (ret == 1) {
2192 			wpa_printf(MSG_DEBUG, "Interface initialization will be completed in a callback (ACS)");
2193 			return 0;
2194 		}
2195 		ret = hostapd_check_edmg_capab(iface);
2196 		if (ret < 0)
2197 			goto fail;
2198 		ret = hostapd_check_he_6ghz_capab(iface);
2199 		if (ret < 0)
2200 			goto fail;
2201 		ret = hostapd_check_ht_capab(iface);
2202 		if (ret < 0)
2203 			goto fail;
2204 		if (ret == 1) {
2205 			wpa_printf(MSG_DEBUG, "Interface initialization will "
2206 				   "be completed in a callback");
2207 			return 0;
2208 		}
2209 
2210 		if (iface->conf->ieee80211h)
2211 			wpa_printf(MSG_DEBUG, "DFS support is enabled");
2212 	}
2213 #endif
2214 	return hostapd_setup_interface_complete(iface, 0);
2215 
2216 fail:
2217 	if (iface->is_no_ir) {
2218 		/* If AP is in NO_IR state, it can be reenabled by the driver
2219 		 * regulatory update and EVENT_CHANNEL_LIST_CHANGED. */
2220 		hostapd_set_state(iface, HAPD_IFACE_NO_IR);
2221 		wpa_msg(iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_NO_IR);
2222 		return 0;
2223 	}
2224 
2225 	hostapd_set_state(iface, HAPD_IFACE_DISABLED);
2226 	wpa_msg(iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_DISABLED);
2227 	if (iface->interfaces && iface->interfaces->terminate_on_error)
2228 		eloop_terminate();
2229 	return -1;
2230 }
2231 
2232 
2233 #ifdef CONFIG_FST
2234 
2235 static const u8 * fst_hostapd_get_bssid_cb(void *ctx)
2236 {
2237 	struct hostapd_data *hapd = ctx;
2238 
2239 	return hapd->own_addr;
2240 }
2241 
2242 
2243 static void fst_hostapd_get_channel_info_cb(void *ctx,
2244 					    enum hostapd_hw_mode *hw_mode,
2245 					    u8 *channel)
2246 {
2247 	struct hostapd_data *hapd = ctx;
2248 
2249 	*hw_mode = ieee80211_freq_to_chan(hapd->iface->freq, channel);
2250 }
2251 
2252 
2253 static int fst_hostapd_get_hw_modes_cb(void *ctx,
2254 				       struct hostapd_hw_modes **modes)
2255 {
2256 	struct hostapd_data *hapd = ctx;
2257 
2258 	*modes = hapd->iface->hw_features;
2259 	return hapd->iface->num_hw_features;
2260 }
2261 
2262 
2263 static void fst_hostapd_set_ies_cb(void *ctx, const struct wpabuf *fst_ies)
2264 {
2265 	struct hostapd_data *hapd = ctx;
2266 
2267 	if (hapd->iface->fst_ies != fst_ies) {
2268 		hapd->iface->fst_ies = fst_ies;
2269 		if (ieee802_11_set_beacon(hapd))
2270 			wpa_printf(MSG_WARNING, "FST: Cannot set beacon");
2271 	}
2272 }
2273 
2274 
2275 static int fst_hostapd_send_action_cb(void *ctx, const u8 *da,
2276 				      struct wpabuf *buf)
2277 {
2278 	struct hostapd_data *hapd = ctx;
2279 
2280 	return hostapd_drv_send_action(hapd, hapd->iface->freq, 0, da,
2281 				       wpabuf_head(buf), wpabuf_len(buf));
2282 }
2283 
2284 
2285 static const struct wpabuf * fst_hostapd_get_mb_ie_cb(void *ctx, const u8 *addr)
2286 {
2287 	struct hostapd_data *hapd = ctx;
2288 	struct sta_info *sta = ap_get_sta(hapd, addr);
2289 
2290 	return sta ? sta->mb_ies : NULL;
2291 }
2292 
2293 
2294 static void fst_hostapd_update_mb_ie_cb(void *ctx, const u8 *addr,
2295 					const u8 *buf, size_t size)
2296 {
2297 	struct hostapd_data *hapd = ctx;
2298 	struct sta_info *sta = ap_get_sta(hapd, addr);
2299 
2300 	if (sta) {
2301 		struct mb_ies_info info;
2302 
2303 		if (!mb_ies_info_by_ies(&info, buf, size)) {
2304 			wpabuf_free(sta->mb_ies);
2305 			sta->mb_ies = mb_ies_by_info(&info);
2306 		}
2307 	}
2308 }
2309 
2310 
2311 static const u8 * fst_hostapd_get_sta(struct fst_get_peer_ctx **get_ctx,
2312 				      bool mb_only)
2313 {
2314 	struct sta_info *s = (struct sta_info *) *get_ctx;
2315 
2316 	if (mb_only) {
2317 		for (; s && !s->mb_ies; s = s->next)
2318 			;
2319 	}
2320 
2321 	if (s) {
2322 		*get_ctx = (struct fst_get_peer_ctx *) s->next;
2323 
2324 		return s->addr;
2325 	}
2326 
2327 	*get_ctx = NULL;
2328 	return NULL;
2329 }
2330 
2331 
2332 static const u8 * fst_hostapd_get_peer_first(void *ctx,
2333 					     struct fst_get_peer_ctx **get_ctx,
2334 					     bool mb_only)
2335 {
2336 	struct hostapd_data *hapd = ctx;
2337 
2338 	*get_ctx = (struct fst_get_peer_ctx *) hapd->sta_list;
2339 
2340 	return fst_hostapd_get_sta(get_ctx, mb_only);
2341 }
2342 
2343 
2344 static const u8 * fst_hostapd_get_peer_next(void *ctx,
2345 					    struct fst_get_peer_ctx **get_ctx,
2346 					    bool mb_only)
2347 {
2348 	return fst_hostapd_get_sta(get_ctx, mb_only);
2349 }
2350 
2351 
2352 void fst_hostapd_fill_iface_obj(struct hostapd_data *hapd,
2353 				struct fst_wpa_obj *iface_obj)
2354 {
2355 	os_memset(iface_obj, 0, sizeof(*iface_obj));
2356 	iface_obj->ctx = hapd;
2357 	iface_obj->get_bssid = fst_hostapd_get_bssid_cb;
2358 	iface_obj->get_channel_info = fst_hostapd_get_channel_info_cb;
2359 	iface_obj->get_hw_modes = fst_hostapd_get_hw_modes_cb;
2360 	iface_obj->set_ies = fst_hostapd_set_ies_cb;
2361 	iface_obj->send_action = fst_hostapd_send_action_cb;
2362 	iface_obj->get_mb_ie = fst_hostapd_get_mb_ie_cb;
2363 	iface_obj->update_mb_ie = fst_hostapd_update_mb_ie_cb;
2364 	iface_obj->get_peer_first = fst_hostapd_get_peer_first;
2365 	iface_obj->get_peer_next = fst_hostapd_get_peer_next;
2366 }
2367 
2368 #endif /* CONFIG_FST */
2369 
2370 #ifdef CONFIG_OWE
2371 
2372 static int hostapd_owe_iface_iter(struct hostapd_iface *iface, void *ctx)
2373 {
2374 	struct hostapd_data *hapd = ctx;
2375 	size_t i;
2376 
2377 	for (i = 0; i < iface->num_bss; i++) {
2378 		struct hostapd_data *bss = iface->bss[i];
2379 
2380 		if (os_strcmp(hapd->conf->owe_transition_ifname,
2381 			      bss->conf->iface) != 0)
2382 			continue;
2383 
2384 		wpa_printf(MSG_DEBUG,
2385 			   "OWE: ifname=%s found transition mode ifname=%s BSSID "
2386 			   MACSTR " SSID %s",
2387 			   hapd->conf->iface, bss->conf->iface,
2388 			   MAC2STR(bss->own_addr),
2389 			   wpa_ssid_txt(bss->conf->ssid.ssid,
2390 					bss->conf->ssid.ssid_len));
2391 		if (!bss->conf->ssid.ssid_set || !bss->conf->ssid.ssid_len ||
2392 		    is_zero_ether_addr(bss->own_addr))
2393 			continue;
2394 
2395 		os_memcpy(hapd->conf->owe_transition_bssid, bss->own_addr,
2396 			  ETH_ALEN);
2397 		os_memcpy(hapd->conf->owe_transition_ssid,
2398 			  bss->conf->ssid.ssid, bss->conf->ssid.ssid_len);
2399 		hapd->conf->owe_transition_ssid_len = bss->conf->ssid.ssid_len;
2400 		wpa_printf(MSG_DEBUG,
2401 			   "OWE: Copied transition mode information");
2402 		return 1;
2403 	}
2404 
2405 	return 0;
2406 }
2407 
2408 
2409 int hostapd_owe_trans_get_info(struct hostapd_data *hapd)
2410 {
2411 	if (hapd->conf->owe_transition_ssid_len > 0 &&
2412 	    !is_zero_ether_addr(hapd->conf->owe_transition_bssid))
2413 		return 0;
2414 
2415 	/* Find transition mode SSID/BSSID information from a BSS operated by
2416 	 * this hostapd instance. */
2417 	if (!hapd->iface->interfaces ||
2418 	    !hapd->iface->interfaces->for_each_interface)
2419 		return hostapd_owe_iface_iter(hapd->iface, hapd);
2420 	else
2421 		return hapd->iface->interfaces->for_each_interface(
2422 			hapd->iface->interfaces, hostapd_owe_iface_iter, hapd);
2423 }
2424 
2425 
2426 static int hostapd_owe_iface_iter2(struct hostapd_iface *iface, void *ctx)
2427 {
2428 	size_t i;
2429 
2430 	for (i = 0; i < iface->num_bss; i++) {
2431 		struct hostapd_data *bss = iface->bss[i];
2432 		int res;
2433 
2434 		if (!bss->conf->owe_transition_ifname[0])
2435 			continue;
2436 		if (bss->iface->state != HAPD_IFACE_ENABLED) {
2437 			wpa_printf(MSG_DEBUG,
2438 				   "OWE: Interface %s state %s - defer beacon update",
2439 				   bss->conf->iface,
2440 				   hostapd_state_text(bss->iface->state));
2441 			continue;
2442 		}
2443 		res = hostapd_owe_trans_get_info(bss);
2444 		if (res == 0)
2445 			continue;
2446 		wpa_printf(MSG_DEBUG,
2447 			   "OWE: Matching transition mode interface enabled - update beacon data for %s",
2448 			   bss->conf->iface);
2449 		ieee802_11_set_beacon(bss);
2450 	}
2451 
2452 	return 0;
2453 }
2454 
2455 #endif /* CONFIG_OWE */
2456 
2457 
2458 static void hostapd_owe_update_trans(struct hostapd_iface *iface)
2459 {
2460 #ifdef CONFIG_OWE
2461 	/* Check whether the enabled BSS can complete OWE transition mode
2462 	 * configuration for any pending interface. */
2463 	if (!iface->interfaces ||
2464 	    !iface->interfaces->for_each_interface)
2465 		hostapd_owe_iface_iter2(iface, NULL);
2466 	else
2467 		iface->interfaces->for_each_interface(
2468 			iface->interfaces, hostapd_owe_iface_iter2, NULL);
2469 #endif /* CONFIG_OWE */
2470 }
2471 
2472 
2473 static void hostapd_interface_setup_failure_handler(void *eloop_ctx,
2474 						    void *timeout_ctx)
2475 {
2476 	struct hostapd_iface *iface = eloop_ctx;
2477 	struct hostapd_data *hapd;
2478 
2479 	if (iface->num_bss < 1 || !iface->bss || !iface->bss[0])
2480 		return;
2481 	hapd = iface->bss[0];
2482 	if (hapd->setup_complete_cb)
2483 		hapd->setup_complete_cb(hapd->setup_complete_cb_ctx);
2484 }
2485 
2486 
2487 static int hostapd_setup_interface_complete_sync(struct hostapd_iface *iface,
2488 						 int err)
2489 {
2490 	struct hostapd_data *hapd = iface->bss[0];
2491 	size_t j;
2492 	u8 *prev_addr;
2493 	int delay_apply_cfg = 0;
2494 	int res_dfs_offload = 0;
2495 
2496 	if (err)
2497 		goto fail;
2498 
2499 	wpa_printf(MSG_DEBUG, "Completing interface initialization");
2500 	if (iface->freq) {
2501 #ifdef NEED_AP_MLME
2502 		int res;
2503 #endif /* NEED_AP_MLME */
2504 
2505 		wpa_printf(MSG_DEBUG, "Mode: %s  Channel: %d  "
2506 			   "Frequency: %d MHz",
2507 			   hostapd_hw_mode_txt(iface->conf->hw_mode),
2508 			   iface->conf->channel, iface->freq);
2509 
2510 #ifdef NEED_AP_MLME
2511 		/* Handle DFS only if it is not offloaded to the driver */
2512 		if (!(iface->drv_flags & WPA_DRIVER_FLAGS_DFS_OFFLOAD)) {
2513 			/* Check DFS */
2514 			res = hostapd_handle_dfs(iface);
2515 			if (res <= 0) {
2516 				if (res < 0)
2517 					goto fail;
2518 				return res;
2519 			}
2520 		} else {
2521 			/* If DFS is offloaded to the driver */
2522 			res_dfs_offload = hostapd_handle_dfs_offload(iface);
2523 			if (res_dfs_offload <= 0) {
2524 				if (res_dfs_offload < 0)
2525 					goto fail;
2526 			} else {
2527 				wpa_printf(MSG_DEBUG,
2528 					   "Proceed with AP/channel setup");
2529 				/*
2530 				 * If this is a DFS channel, move to completing
2531 				 * AP setup.
2532 				 */
2533 				if (res_dfs_offload == 1)
2534 					goto dfs_offload;
2535 				/* Otherwise fall through. */
2536 			}
2537 		}
2538 #endif /* NEED_AP_MLME */
2539 
2540 #ifdef CONFIG_MESH
2541 		if (iface->mconf != NULL) {
2542 			wpa_printf(MSG_DEBUG,
2543 				   "%s: Mesh configuration will be applied while joining the mesh network",
2544 				   iface->bss[0]->conf->iface);
2545 			delay_apply_cfg = 1;
2546 		}
2547 #endif /* CONFIG_MESH */
2548 
2549 		if (!delay_apply_cfg &&
2550 		    hostapd_set_freq(hapd, hapd->iconf->hw_mode, iface->freq,
2551 				     hapd->iconf->channel,
2552 				     hapd->iconf->enable_edmg,
2553 				     hapd->iconf->edmg_channel,
2554 				     hapd->iconf->ieee80211n,
2555 				     hapd->iconf->ieee80211ac,
2556 				     hapd->iconf->ieee80211ax,
2557 				     hapd->iconf->ieee80211be,
2558 				     hapd->iconf->secondary_channel,
2559 				     hostapd_get_oper_chwidth(hapd->iconf),
2560 				     hostapd_get_oper_centr_freq_seg0_idx(
2561 					     hapd->iconf),
2562 				     hostapd_get_oper_centr_freq_seg1_idx(
2563 					     hapd->iconf))) {
2564 			wpa_printf(MSG_ERROR, "Could not set channel for "
2565 				   "kernel driver");
2566 			goto fail;
2567 		}
2568 	}
2569 
2570 	if (iface->current_mode) {
2571 		if (hostapd_prepare_rates(iface, iface->current_mode)) {
2572 			wpa_printf(MSG_ERROR, "Failed to prepare rates "
2573 				   "table.");
2574 			hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
2575 				       HOSTAPD_LEVEL_WARNING,
2576 				       "Failed to prepare rates table.");
2577 			goto fail;
2578 		}
2579 	}
2580 
2581 	if (hapd->iconf->rts_threshold >= -1 &&
2582 	    hostapd_set_rts(hapd, hapd->iconf->rts_threshold) &&
2583 	    hapd->iconf->rts_threshold >= -1) {
2584 		wpa_printf(MSG_ERROR, "Could not set RTS threshold for "
2585 			   "kernel driver");
2586 		goto fail;
2587 	}
2588 
2589 	if (hapd->iconf->fragm_threshold >= -1 &&
2590 	    hostapd_set_frag(hapd, hapd->iconf->fragm_threshold) &&
2591 	    hapd->iconf->fragm_threshold != -1) {
2592 		wpa_printf(MSG_ERROR, "Could not set fragmentation threshold "
2593 			   "for kernel driver");
2594 		goto fail;
2595 	}
2596 
2597 	prev_addr = hapd->own_addr;
2598 
2599 	for (j = 0; j < iface->num_bss; j++) {
2600 		hapd = iface->bss[j];
2601 		if (j)
2602 			os_memcpy(hapd->own_addr, prev_addr, ETH_ALEN);
2603 		if (hostapd_setup_bss(hapd, j == 0, !iface->conf->mbssid)) {
2604 			for (;;) {
2605 				hapd = iface->bss[j];
2606 				hostapd_bss_deinit_no_free(hapd);
2607 				hostapd_free_hapd_data(hapd);
2608 				if (j == 0)
2609 					break;
2610 				j--;
2611 			}
2612 			goto fail;
2613 		}
2614 		if (is_zero_ether_addr(hapd->conf->bssid))
2615 			prev_addr = hapd->own_addr;
2616 	}
2617 
2618 	if (hapd->iconf->mbssid) {
2619 		for (j = 0; hapd->iconf->mbssid && j < iface->num_bss; j++) {
2620 			hapd = iface->bss[j];
2621 			if (hostapd_start_beacon(hapd, true)) {
2622 				for (;;) {
2623 					hapd = iface->bss[j];
2624 					hostapd_bss_deinit_no_free(hapd);
2625 					hostapd_free_hapd_data(hapd);
2626 					if (j == 0)
2627 						break;
2628 					j--;
2629 				}
2630 				goto fail;
2631 			}
2632 		}
2633 	}
2634 
2635 	hapd = iface->bss[0];
2636 
2637 	hostapd_tx_queue_params(iface);
2638 
2639 	ap_list_init(iface);
2640 
2641 	hostapd_set_acl(hapd);
2642 
2643 	if (hostapd_driver_commit(hapd) < 0) {
2644 		wpa_printf(MSG_ERROR, "%s: Failed to commit driver "
2645 			   "configuration", __func__);
2646 		goto fail;
2647 	}
2648 
2649 	/*
2650 	 * WPS UPnP module can be initialized only when the "upnp_iface" is up.
2651 	 * If "interface" and "upnp_iface" are the same (e.g., non-bridge
2652 	 * mode), the interface is up only after driver_commit, so initialize
2653 	 * WPS after driver_commit.
2654 	 */
2655 	for (j = 0; j < iface->num_bss; j++) {
2656 		if (hostapd_init_wps_complete(iface->bss[j]))
2657 			goto fail;
2658 	}
2659 
2660 	if ((iface->drv_flags & WPA_DRIVER_FLAGS_DFS_OFFLOAD) &&
2661 	    !res_dfs_offload) {
2662 		/*
2663 		 * If freq is DFS, and DFS is offloaded to the driver, then wait
2664 		 * for CAC to complete.
2665 		 */
2666 		wpa_printf(MSG_DEBUG, "%s: Wait for CAC to complete", __func__);
2667 		return res_dfs_offload;
2668 	}
2669 
2670 #ifdef NEED_AP_MLME
2671 dfs_offload:
2672 #endif /* NEED_AP_MLME */
2673 
2674 #ifdef CONFIG_FST
2675 	if (hapd->iconf->fst_cfg.group_id[0]) {
2676 		struct fst_wpa_obj iface_obj;
2677 
2678 		fst_hostapd_fill_iface_obj(hapd, &iface_obj);
2679 		iface->fst = fst_attach(hapd->conf->iface, hapd->own_addr,
2680 					&iface_obj, &hapd->iconf->fst_cfg);
2681 		if (!iface->fst) {
2682 			wpa_printf(MSG_ERROR, "Could not attach to FST %s",
2683 				   hapd->iconf->fst_cfg.group_id);
2684 			goto fail;
2685 		}
2686 	}
2687 #endif /* CONFIG_FST */
2688 
2689 	hostapd_set_state(iface, HAPD_IFACE_ENABLED);
2690 	hostapd_owe_update_trans(iface);
2691 	airtime_policy_update_init(iface);
2692 	wpa_msg(iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_ENABLED);
2693 	if (hapd->setup_complete_cb)
2694 		hapd->setup_complete_cb(hapd->setup_complete_cb_ctx);
2695 
2696 #ifdef CONFIG_MESH
2697 	if (delay_apply_cfg && !iface->mconf) {
2698 		wpa_printf(MSG_ERROR, "Error while completing mesh init");
2699 		goto fail;
2700 	}
2701 #endif /* CONFIG_MESH */
2702 
2703 	wpa_printf(MSG_DEBUG, "%s: Setup of interface done.",
2704 		   iface->bss[0]->conf->iface);
2705 	if (iface->interfaces && iface->interfaces->terminate_on_error > 0)
2706 		iface->interfaces->terminate_on_error--;
2707 
2708 	for (j = 0; j < iface->num_bss; j++)
2709 		hostapd_neighbor_set_own_report(iface->bss[j]);
2710 
2711 	if (iface->interfaces && iface->interfaces->count > 1)
2712 		ieee802_11_set_beacons(iface);
2713 
2714 	return 0;
2715 
2716 fail:
2717 	wpa_printf(MSG_ERROR, "Interface initialization failed");
2718 
2719 	if (iface->is_no_ir) {
2720 		hostapd_set_state(iface, HAPD_IFACE_NO_IR);
2721 		wpa_msg(hapd->msg_ctx, MSG_INFO, AP_EVENT_NO_IR);
2722 		return 0;
2723 	}
2724 
2725 	hostapd_set_state(iface, HAPD_IFACE_DISABLED);
2726 	wpa_msg(hapd->msg_ctx, MSG_INFO, AP_EVENT_DISABLED);
2727 #ifdef CONFIG_FST
2728 	if (iface->fst) {
2729 		fst_detach(iface->fst);
2730 		iface->fst = NULL;
2731 	}
2732 #endif /* CONFIG_FST */
2733 
2734 	if (iface->interfaces && iface->interfaces->terminate_on_error) {
2735 		eloop_terminate();
2736 	} else if (hapd->setup_complete_cb) {
2737 		/*
2738 		 * Calling hapd->setup_complete_cb directly may cause iface
2739 		 * deinitialization which may be accessed later by the caller.
2740 		 */
2741 		eloop_register_timeout(0, 0,
2742 				       hostapd_interface_setup_failure_handler,
2743 				       iface, NULL);
2744 	}
2745 
2746 	return -1;
2747 }
2748 
2749 
2750 /**
2751  * hostapd_setup_interface_complete - Complete interface setup
2752  *
2753  * This function is called when previous steps in the interface setup has been
2754  * completed. This can also start operations, e.g., DFS, that will require
2755  * additional processing before interface is ready to be enabled. Such
2756  * operations will call this function from eloop callbacks when finished.
2757  */
2758 int hostapd_setup_interface_complete(struct hostapd_iface *iface, int err)
2759 {
2760 	struct hapd_interfaces *interfaces = iface->interfaces;
2761 	struct hostapd_data *hapd = iface->bss[0];
2762 	unsigned int i;
2763 	int not_ready_in_sync_ifaces = 0;
2764 
2765 	if (!iface->need_to_start_in_sync)
2766 		return hostapd_setup_interface_complete_sync(iface, err);
2767 
2768 	if (err) {
2769 		wpa_printf(MSG_ERROR, "Interface initialization failed");
2770 		iface->need_to_start_in_sync = 0;
2771 
2772 		if (iface->is_no_ir) {
2773 			hostapd_set_state(iface, HAPD_IFACE_NO_IR);
2774 			wpa_msg(hapd->msg_ctx, MSG_INFO, AP_EVENT_NO_IR);
2775 			return 0;
2776 		}
2777 
2778 		hostapd_set_state(iface, HAPD_IFACE_DISABLED);
2779 		wpa_msg(hapd->msg_ctx, MSG_INFO, AP_EVENT_DISABLED);
2780 		if (interfaces && interfaces->terminate_on_error)
2781 			eloop_terminate();
2782 		return -1;
2783 	}
2784 
2785 	if (iface->ready_to_start_in_sync) {
2786 		/* Already in ready and waiting. should never happpen */
2787 		return 0;
2788 	}
2789 
2790 	for (i = 0; i < interfaces->count; i++) {
2791 		if (interfaces->iface[i]->need_to_start_in_sync &&
2792 		    !interfaces->iface[i]->ready_to_start_in_sync)
2793 			not_ready_in_sync_ifaces++;
2794 	}
2795 
2796 	/*
2797 	 * Check if this is the last interface, if yes then start all the other
2798 	 * waiting interfaces. If not, add this interface to the waiting list.
2799 	 */
2800 	if (not_ready_in_sync_ifaces > 1 && iface->state == HAPD_IFACE_DFS) {
2801 		/*
2802 		 * If this interface went through CAC, do not synchronize, just
2803 		 * start immediately.
2804 		 */
2805 		iface->need_to_start_in_sync = 0;
2806 		wpa_printf(MSG_INFO,
2807 			   "%s: Finished CAC - bypass sync and start interface",
2808 			   iface->bss[0]->conf->iface);
2809 		return hostapd_setup_interface_complete_sync(iface, err);
2810 	}
2811 
2812 	if (not_ready_in_sync_ifaces > 1) {
2813 		/* need to wait as there are other interfaces still coming up */
2814 		iface->ready_to_start_in_sync = 1;
2815 		wpa_printf(MSG_INFO,
2816 			   "%s: Interface waiting to sync with other interfaces",
2817 			   iface->bss[0]->conf->iface);
2818 		return 0;
2819 	}
2820 
2821 	wpa_printf(MSG_INFO,
2822 		   "%s: Last interface to sync - starting all interfaces",
2823 		   iface->bss[0]->conf->iface);
2824 	iface->need_to_start_in_sync = 0;
2825 	hostapd_setup_interface_complete_sync(iface, err);
2826 	for (i = 0; i < interfaces->count; i++) {
2827 		if (interfaces->iface[i]->need_to_start_in_sync &&
2828 		    interfaces->iface[i]->ready_to_start_in_sync) {
2829 			hostapd_setup_interface_complete_sync(
2830 				interfaces->iface[i], 0);
2831 			/* Only once the interfaces are sync started */
2832 			interfaces->iface[i]->need_to_start_in_sync = 0;
2833 		}
2834 	}
2835 
2836 	return 0;
2837 }
2838 
2839 
2840 /**
2841  * hostapd_setup_interface - Setup of an interface
2842  * @iface: Pointer to interface data.
2843  * Returns: 0 on success, -1 on failure
2844  *
2845  * Initializes the driver interface, validates the configuration,
2846  * and sets driver parameters based on the configuration.
2847  * Flushes old stations, sets the channel, encryption,
2848  * beacons, and WDS links based on the configuration.
2849  *
2850  * If interface setup requires more time, e.g., to perform HT co-ex scans, ACS,
2851  * or DFS operations, this function returns 0 before such operations have been
2852  * completed. The pending operations are registered into eloop and will be
2853  * completed from eloop callbacks. Those callbacks end up calling
2854  * hostapd_setup_interface_complete() once setup has been completed.
2855  */
2856 int hostapd_setup_interface(struct hostapd_iface *iface)
2857 {
2858 	int ret;
2859 
2860 	if (!iface->conf)
2861 		return -1;
2862 	ret = setup_interface(iface);
2863 	if (ret) {
2864 		wpa_printf(MSG_ERROR, "%s: Unable to setup interface.",
2865 			   iface->conf->bss[0]->iface);
2866 		return -1;
2867 	}
2868 
2869 	return 0;
2870 }
2871 
2872 
2873 /**
2874  * hostapd_alloc_bss_data - Allocate and initialize per-BSS data
2875  * @hapd_iface: Pointer to interface data
2876  * @conf: Pointer to per-interface configuration
2877  * @bss: Pointer to per-BSS configuration for this BSS
2878  * Returns: Pointer to allocated BSS data
2879  *
2880  * This function is used to allocate per-BSS data structure. This data will be
2881  * freed after hostapd_cleanup() is called for it during interface
2882  * deinitialization.
2883  */
2884 struct hostapd_data *
2885 hostapd_alloc_bss_data(struct hostapd_iface *hapd_iface,
2886 		       struct hostapd_config *conf,
2887 		       struct hostapd_bss_config *bss)
2888 {
2889 	struct hostapd_data *hapd;
2890 
2891 	hapd = os_zalloc(sizeof(*hapd));
2892 	if (hapd == NULL)
2893 		return NULL;
2894 
2895 	hapd->new_assoc_sta_cb = hostapd_new_assoc_sta;
2896 	hapd->iconf = conf;
2897 	hapd->conf = bss;
2898 	hapd->iface = hapd_iface;
2899 	if (conf)
2900 		hapd->driver = conf->driver;
2901 	hapd->ctrl_sock = -1;
2902 	dl_list_init(&hapd->ctrl_dst);
2903 	dl_list_init(&hapd->nr_db);
2904 	hapd->dhcp_sock = -1;
2905 #ifdef CONFIG_IEEE80211R_AP
2906 	dl_list_init(&hapd->l2_queue);
2907 	dl_list_init(&hapd->l2_oui_queue);
2908 #endif /* CONFIG_IEEE80211R_AP */
2909 #ifdef CONFIG_SAE
2910 	dl_list_init(&hapd->sae_commit_queue);
2911 #endif /* CONFIG_SAE */
2912 
2913 	return hapd;
2914 }
2915 
2916 
2917 static void hostapd_bss_deinit(struct hostapd_data *hapd)
2918 {
2919 	if (!hapd)
2920 		return;
2921 	wpa_printf(MSG_DEBUG, "%s: deinit bss %s", __func__,
2922 		   hapd->conf ? hapd->conf->iface : "N/A");
2923 	hostapd_bss_deinit_no_free(hapd);
2924 	wpa_msg(hapd->msg_ctx, MSG_INFO, AP_EVENT_DISABLED);
2925 #ifdef CONFIG_SQLITE
2926 	if (hapd->rad_attr_db) {
2927 		sqlite3_close(hapd->rad_attr_db);
2928 		hapd->rad_attr_db = NULL;
2929 	}
2930 #endif /* CONFIG_SQLITE */
2931 
2932 	hostapd_bss_link_deinit(hapd);
2933 	hostapd_cleanup(hapd);
2934 }
2935 
2936 
2937 void hostapd_interface_deinit(struct hostapd_iface *iface)
2938 {
2939 	int j;
2940 
2941 	wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
2942 	if (iface == NULL)
2943 		return;
2944 
2945 	hostapd_set_state(iface, HAPD_IFACE_DISABLED);
2946 
2947 	eloop_cancel_timeout(channel_list_update_timeout, iface, NULL);
2948 	iface->wait_channel_update = 0;
2949 	iface->is_no_ir = false;
2950 
2951 #ifdef CONFIG_FST
2952 	if (iface->fst) {
2953 		fst_detach(iface->fst);
2954 		iface->fst = NULL;
2955 	}
2956 #endif /* CONFIG_FST */
2957 
2958 	for (j = (int) iface->num_bss - 1; j >= 0; j--) {
2959 		if (!iface->bss)
2960 			break;
2961 		hostapd_bss_deinit(iface->bss[j]);
2962 	}
2963 
2964 #ifdef NEED_AP_MLME
2965 	hostapd_stop_setup_timers(iface);
2966 	eloop_cancel_timeout(ap_ht2040_timeout, iface, NULL);
2967 #endif /* NEED_AP_MLME */
2968 }
2969 
2970 
2971 #ifdef CONFIG_IEEE80211BE
2972 
2973 static void hostapd_mld_ref_inc(struct hostapd_mld *mld)
2974 {
2975 	if (!mld)
2976 		return;
2977 
2978 	if (mld->refcount == HOSTAPD_MLD_MAX_REF_COUNT) {
2979 		wpa_printf(MSG_ERROR, "AP MLD %s: Ref count overflow",
2980 			   mld->name);
2981 		return;
2982 	}
2983 
2984 	mld->refcount++;
2985 }
2986 
2987 
2988 static void hostapd_mld_ref_dec(struct hostapd_mld *mld)
2989 {
2990 	if (!mld)
2991 		return;
2992 
2993 	if (!mld->refcount) {
2994 		wpa_printf(MSG_ERROR, "AP MLD %s: Ref count underflow",
2995 			   mld->name);
2996 		return;
2997 	}
2998 
2999 	mld->refcount--;
3000 }
3001 
3002 #endif /* CONFIG_IEEE80211BE */
3003 
3004 
3005 void hostapd_interface_free(struct hostapd_iface *iface)
3006 {
3007 	size_t j;
3008 	wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
3009 	for (j = 0; j < iface->num_bss; j++) {
3010 		if (!iface->bss)
3011 			break;
3012 #ifdef CONFIG_IEEE80211BE
3013 		if (iface->bss[j])
3014 			hostapd_mld_ref_dec(iface->bss[j]->mld);
3015 #endif /* CONFIG_IEEE80211BE */
3016 		wpa_printf(MSG_DEBUG, "%s: free hapd %p",
3017 			   __func__, iface->bss[j]);
3018 		os_free(iface->bss[j]);
3019 	}
3020 	hostapd_cleanup_iface(iface);
3021 }
3022 
3023 
3024 struct hostapd_iface * hostapd_alloc_iface(void)
3025 {
3026 	struct hostapd_iface *hapd_iface;
3027 
3028 	hapd_iface = os_zalloc(sizeof(*hapd_iface));
3029 	if (!hapd_iface)
3030 		return NULL;
3031 
3032 	dl_list_init(&hapd_iface->sta_seen);
3033 
3034 	return hapd_iface;
3035 }
3036 
3037 
3038 #ifdef CONFIG_IEEE80211BE
3039 static void hostapd_bss_alloc_link_id(struct hostapd_data *hapd)
3040 {
3041 	hapd->mld_link_id = hapd->mld->next_link_id++;
3042 	wpa_printf(MSG_DEBUG, "AP MLD: %s: Link ID %d assigned.",
3043 		   hapd->mld->name, hapd->mld_link_id);
3044 }
3045 #endif /* CONFIG_IEEE80211BE */
3046 
3047 
3048 static void hostapd_bss_setup_multi_link(struct hostapd_data *hapd,
3049 					 struct hapd_interfaces *interfaces)
3050 {
3051 #ifdef CONFIG_IEEE80211BE
3052 	struct hostapd_mld *mld, **all_mld;
3053 	struct hostapd_bss_config *conf;
3054 	size_t i;
3055 
3056 	conf = hapd->conf;
3057 
3058 	if (!hapd->iconf || !hapd->iconf->ieee80211be || !conf->mld_ap ||
3059 	    conf->disable_11be)
3060 		return;
3061 
3062 	for (i = 0; i < interfaces->mld_count; i++) {
3063 		mld = interfaces->mld[i];
3064 
3065 		if (!mld || os_strcmp(conf->iface, mld->name) != 0)
3066 			continue;
3067 
3068 		hapd->mld = mld;
3069 		hostapd_mld_ref_inc(mld);
3070 		hostapd_bss_alloc_link_id(hapd);
3071 		break;
3072 	}
3073 
3074 	if (hapd->mld)
3075 		return;
3076 
3077 	mld = os_zalloc(sizeof(struct hostapd_mld));
3078 	if (!mld)
3079 		goto fail;
3080 
3081 	os_strlcpy(mld->name, conf->iface, sizeof(conf->iface));
3082 	dl_list_init(&mld->links);
3083 
3084 	wpa_printf(MSG_DEBUG, "AP MLD %s created", mld->name);
3085 
3086 	hapd->mld = mld;
3087 	hostapd_mld_ref_inc(mld);
3088 	hostapd_bss_alloc_link_id(hapd);
3089 
3090 	all_mld = os_realloc_array(interfaces->mld, interfaces->mld_count + 1,
3091 				   sizeof(struct hostapd_mld *));
3092 	if (!all_mld)
3093 		goto fail;
3094 
3095 	interfaces->mld = all_mld;
3096 	interfaces->mld[interfaces->mld_count] = mld;
3097 	interfaces->mld_count++;
3098 
3099 	return;
3100 fail:
3101 	if (!mld)
3102 		return;
3103 
3104 	wpa_printf(MSG_DEBUG, "AP MLD %s: free mld %p", mld->name, mld);
3105 	os_free(mld);
3106 	hapd->mld = NULL;
3107 #endif /* CONFIG_IEEE80211BE */
3108 }
3109 
3110 
3111 static void hostapd_cleanup_unused_mlds(struct hapd_interfaces *interfaces)
3112 {
3113 #ifdef CONFIG_IEEE80211BE
3114 	struct hostapd_mld *mld, **all_mld;
3115 	size_t i, j, num_mlds;
3116 	bool forced_remove, remove;
3117 
3118 	if (!interfaces->mld)
3119 		return;
3120 
3121 	num_mlds = interfaces->mld_count;
3122 
3123 	for (i = 0; i < interfaces->mld_count; i++) {
3124 		mld = interfaces->mld[i];
3125 		if (!mld)
3126 			continue;
3127 
3128 		remove = false;
3129 		forced_remove = false;
3130 
3131 		if (!mld->refcount)
3132 			remove = true;
3133 
3134 		/* If MLD is still being referenced but the number of interfaces
3135 		 * is zero, it is safe to force its deletion. Normally, this
3136 		 * should not happen but even if it does, let us free the
3137 		 * memory.
3138 		 */
3139 		if (!remove && !interfaces->count)
3140 			forced_remove = true;
3141 
3142 		if (!remove && !forced_remove)
3143 			continue;
3144 
3145 		wpa_printf(MSG_DEBUG, "AP MLD %s: Freed%s", mld->name,
3146 			   forced_remove ? " (forced)" : "");
3147 		os_free(mld);
3148 		interfaces->mld[i] = NULL;
3149 		num_mlds--;
3150 	}
3151 
3152 	if (!num_mlds) {
3153 		interfaces->mld_count = 0;
3154 		os_free(interfaces->mld);
3155 		interfaces->mld = NULL;
3156 		return;
3157 	}
3158 
3159 	all_mld = os_zalloc(num_mlds * sizeof(struct hostapd_mld *));
3160 	if (!all_mld) {
3161 		wpa_printf(MSG_ERROR,
3162 			   "AP MLD: Failed to re-allocate the MLDs. Expect issues");
3163 		return;
3164 	}
3165 
3166 	for (i = 0, j = 0; i < interfaces->mld_count; i++) {
3167 		mld = interfaces->mld[i];
3168 		if (!mld)
3169 			continue;
3170 
3171 		all_mld[j++] = mld;
3172 	}
3173 
3174 	/* This should not happen */
3175 	if (j != num_mlds) {
3176 		wpa_printf(MSG_DEBUG,
3177 			   "AP MLD: Some error occurred while reallocating MLDs. Expect issues.");
3178 		os_free(all_mld);
3179 		return;
3180 	}
3181 
3182 	os_free(interfaces->mld);
3183 	interfaces->mld = all_mld;
3184 	interfaces->mld_count = num_mlds;
3185 #endif /* CONFIG_IEEE80211BE */
3186 }
3187 
3188 
3189 /**
3190  * hostapd_init - Allocate and initialize per-interface data
3191  * @config_file: Path to the configuration file
3192  * Returns: Pointer to the allocated interface data or %NULL on failure
3193  *
3194  * This function is used to allocate main data structures for per-interface
3195  * data. The allocated data buffer will be freed by calling
3196  * hostapd_cleanup_iface().
3197  */
3198 struct hostapd_iface * hostapd_init(struct hapd_interfaces *interfaces,
3199 				    const char *config_file)
3200 {
3201 	struct hostapd_iface *hapd_iface = NULL;
3202 	struct hostapd_config *conf = NULL;
3203 	struct hostapd_data *hapd;
3204 	size_t i;
3205 
3206 	hapd_iface = hostapd_alloc_iface();
3207 	if (hapd_iface == NULL)
3208 		goto fail;
3209 
3210 	hapd_iface->config_fname = os_strdup(config_file);
3211 	if (hapd_iface->config_fname == NULL)
3212 		goto fail;
3213 
3214 	conf = interfaces->config_read_cb(hapd_iface->config_fname);
3215 	if (conf == NULL)
3216 		goto fail;
3217 	hapd_iface->conf = conf;
3218 
3219 	hapd_iface->num_bss = conf->num_bss;
3220 	hapd_iface->bss = os_calloc(conf->num_bss,
3221 				    sizeof(struct hostapd_data *));
3222 	if (hapd_iface->bss == NULL)
3223 		goto fail;
3224 
3225 	for (i = 0; i < conf->num_bss; i++) {
3226 		hapd = hapd_iface->bss[i] =
3227 			hostapd_alloc_bss_data(hapd_iface, conf,
3228 					       conf->bss[i]);
3229 		if (hapd == NULL)
3230 			goto fail;
3231 		hapd->msg_ctx = hapd;
3232 		hostapd_bss_setup_multi_link(hapd, interfaces);
3233 	}
3234 
3235 	hapd_iface->is_ch_switch_dfs = false;
3236 	return hapd_iface;
3237 
3238 fail:
3239 	wpa_printf(MSG_ERROR, "Failed to set up interface with %s",
3240 		   config_file);
3241 	if (conf)
3242 		hostapd_config_free(conf);
3243 	if (hapd_iface) {
3244 		os_free(hapd_iface->config_fname);
3245 		os_free(hapd_iface->bss);
3246 		wpa_printf(MSG_DEBUG, "%s: free iface %p",
3247 			   __func__, hapd_iface);
3248 		os_free(hapd_iface);
3249 	}
3250 	return NULL;
3251 }
3252 
3253 
3254 static int ifname_in_use(struct hapd_interfaces *interfaces, const char *ifname)
3255 {
3256 	size_t i, j;
3257 
3258 	for (i = 0; i < interfaces->count; i++) {
3259 		struct hostapd_iface *iface = interfaces->iface[i];
3260 		for (j = 0; j < iface->num_bss; j++) {
3261 			struct hostapd_data *hapd = iface->bss[j];
3262 			if (os_strcmp(ifname, hapd->conf->iface) == 0)
3263 				return 1;
3264 		}
3265 	}
3266 
3267 	return 0;
3268 }
3269 
3270 
3271 /**
3272  * hostapd_interface_init_bss - Read configuration file and init BSS data
3273  *
3274  * This function is used to parse configuration file for a BSS. This BSS is
3275  * added to an existing interface sharing the same radio (if any) or a new
3276  * interface is created if this is the first interface on a radio. This
3277  * allocate memory for the BSS. No actual driver operations are started.
3278  *
3279  * This is similar to hostapd_interface_init(), but for a case where the
3280  * configuration is used to add a single BSS instead of all BSSes for a radio.
3281  */
3282 struct hostapd_iface *
3283 hostapd_interface_init_bss(struct hapd_interfaces *interfaces, const char *phy,
3284 			   const char *config_fname, int debug)
3285 {
3286 	struct hostapd_iface *new_iface = NULL, *iface = NULL;
3287 	struct hostapd_data *hapd;
3288 	int k;
3289 	size_t i, bss_idx;
3290 
3291 	if (!phy || !*phy)
3292 		return NULL;
3293 
3294 	for (i = 0; i < interfaces->count; i++) {
3295 		if (os_strcmp(interfaces->iface[i]->phy, phy) == 0) {
3296 			iface = interfaces->iface[i];
3297 			break;
3298 		}
3299 	}
3300 
3301 	wpa_printf(MSG_INFO, "Configuration file: %s (phy %s)%s",
3302 		   config_fname, phy, iface ? "" : " --> new PHY");
3303 	if (iface) {
3304 		struct hostapd_config *conf;
3305 		struct hostapd_bss_config **tmp_conf;
3306 		struct hostapd_data **tmp_bss;
3307 		struct hostapd_bss_config *bss;
3308 		const char *ifname;
3309 
3310 		/* Add new BSS to existing iface */
3311 		conf = interfaces->config_read_cb(config_fname);
3312 		if (conf == NULL)
3313 			return NULL;
3314 		if (conf->num_bss > 1) {
3315 			wpa_printf(MSG_ERROR, "Multiple BSSes specified in BSS-config");
3316 			hostapd_config_free(conf);
3317 			return NULL;
3318 		}
3319 
3320 		ifname = conf->bss[0]->iface;
3321 		if (ifname[0] != '\0' && ifname_in_use(interfaces, ifname)) {
3322 			wpa_printf(MSG_ERROR,
3323 				   "Interface name %s already in use", ifname);
3324 			hostapd_config_free(conf);
3325 			return NULL;
3326 		}
3327 
3328 		tmp_conf = os_realloc_array(
3329 			iface->conf->bss, iface->conf->num_bss + 1,
3330 			sizeof(struct hostapd_bss_config *));
3331 		tmp_bss = os_realloc_array(iface->bss, iface->num_bss + 1,
3332 					   sizeof(struct hostapd_data *));
3333 		if (tmp_bss)
3334 			iface->bss = tmp_bss;
3335 		if (tmp_conf) {
3336 			iface->conf->bss = tmp_conf;
3337 			iface->conf->last_bss = tmp_conf[0];
3338 		}
3339 		if (tmp_bss == NULL || tmp_conf == NULL) {
3340 			hostapd_config_free(conf);
3341 			return NULL;
3342 		}
3343 		bss = iface->conf->bss[iface->conf->num_bss] = conf->bss[0];
3344 		iface->conf->num_bss++;
3345 
3346 		hapd = hostapd_alloc_bss_data(iface, iface->conf, bss);
3347 		if (hapd == NULL) {
3348 			iface->conf->num_bss--;
3349 			hostapd_config_free(conf);
3350 			return NULL;
3351 		}
3352 		iface->conf->last_bss = bss;
3353 		iface->bss[iface->num_bss] = hapd;
3354 		hapd->msg_ctx = hapd;
3355 		hostapd_bss_setup_multi_link(hapd, interfaces);
3356 
3357 
3358 		bss_idx = iface->num_bss++;
3359 		conf->num_bss--;
3360 		conf->bss[0] = NULL;
3361 		hostapd_config_free(conf);
3362 	} else {
3363 		/* Add a new iface with the first BSS */
3364 		new_iface = iface = hostapd_init(interfaces, config_fname);
3365 		if (!iface)
3366 			return NULL;
3367 		os_strlcpy(iface->phy, phy, sizeof(iface->phy));
3368 		iface->interfaces = interfaces;
3369 		bss_idx = 0;
3370 	}
3371 
3372 	for (k = 0; k < debug; k++) {
3373 		if (iface->bss[bss_idx]->conf->logger_stdout_level > 0)
3374 			iface->bss[bss_idx]->conf->logger_stdout_level--;
3375 	}
3376 
3377 	if (iface->conf->bss[bss_idx]->iface[0] == '\0' &&
3378 	    !hostapd_drv_none(iface->bss[bss_idx])) {
3379 		wpa_printf(MSG_ERROR, "Interface name not specified in %s",
3380 			   config_fname);
3381 		if (new_iface)
3382 			hostapd_interface_deinit_free(new_iface);
3383 		return NULL;
3384 	}
3385 
3386 	return iface;
3387 }
3388 
3389 
3390 static void hostapd_cleanup_driver(const struct wpa_driver_ops *driver,
3391 				   void *drv_priv, struct hostapd_iface *iface)
3392 {
3393 	if (!driver || !driver->hapd_deinit || !drv_priv)
3394 		return;
3395 
3396 #ifdef CONFIG_IEEE80211BE
3397 	/* In case of non-ML operation, de-init. But if ML operation exist,
3398 	 * even if that's the last BSS in the interface, the driver (drv) could
3399 	 * be in use for a different AP MLD. Hence, need to check if drv is
3400 	 * still being used by some other BSS before de-initiallizing. */
3401 	if (!iface->bss[0]->conf->mld_ap) {
3402 		driver->hapd_deinit(drv_priv);
3403 	} else if (hostapd_mld_is_first_bss(iface->bss[0]) &&
3404 		   driver->is_drv_shared &&
3405 		   !driver->is_drv_shared(drv_priv, iface->bss[0])) {
3406 		driver->hapd_deinit(drv_priv);
3407 	} else if (hostapd_if_link_remove(iface->bss[0],
3408 					  WPA_IF_AP_BSS,
3409 					  iface->bss[0]->conf->iface,
3410 					  iface->bss[0]->mld_link_id)) {
3411 		wpa_printf(MSG_WARNING, "Failed to remove BSS interface %s",
3412 			   iface->bss[0]->conf->iface);
3413 	}
3414 #else /* CONFIG_IEEE80211BE */
3415 	driver->hapd_deinit(drv_priv);
3416 #endif /* CONFIG_IEEE80211BE */
3417 	iface->bss[0]->drv_priv = NULL;
3418 }
3419 
3420 
3421 void hostapd_interface_deinit_free(struct hostapd_iface *iface)
3422 {
3423 	const struct wpa_driver_ops *driver;
3424 	void *drv_priv;
3425 
3426 	wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
3427 	if (iface == NULL)
3428 		return;
3429 	wpa_printf(MSG_DEBUG, "%s: num_bss=%u conf->num_bss=%u",
3430 		   __func__, (unsigned int) iface->num_bss,
3431 		   (unsigned int) iface->conf->num_bss);
3432 	driver = iface->bss[0]->driver;
3433 	drv_priv = iface->bss[0]->drv_priv;
3434 	hostapd_interface_deinit(iface);
3435 	wpa_printf(MSG_DEBUG, "%s: driver=%p drv_priv=%p -> hapd_deinit",
3436 		   __func__, driver, drv_priv);
3437 	hostapd_cleanup_driver(driver, drv_priv, iface);
3438 	hostapd_interface_free(iface);
3439 }
3440 
3441 
3442 static void hostapd_deinit_driver(const struct wpa_driver_ops *driver,
3443 				  void *drv_priv,
3444 				  struct hostapd_iface *hapd_iface)
3445 {
3446 	size_t j;
3447 
3448 	wpa_printf(MSG_DEBUG, "%s: driver=%p drv_priv=%p -> hapd_deinit",
3449 		   __func__, driver, drv_priv);
3450 
3451 	hostapd_cleanup_driver(driver, drv_priv, hapd_iface);
3452 
3453 	if (driver && driver->hapd_deinit && drv_priv) {
3454 		for (j = 0; j < hapd_iface->num_bss; j++) {
3455 			wpa_printf(MSG_DEBUG, "%s:bss[%d]->drv_priv=%p",
3456 				   __func__, (int) j,
3457 				   hapd_iface->bss[j]->drv_priv);
3458 			if (hapd_iface->bss[j]->drv_priv == drv_priv) {
3459 				hapd_iface->bss[j]->drv_priv = NULL;
3460 				hapd_iface->extended_capa = NULL;
3461 				hapd_iface->extended_capa_mask = NULL;
3462 				hapd_iface->extended_capa_len = 0;
3463 			}
3464 		}
3465 	}
3466 }
3467 
3468 
3469 static void hostapd_refresh_all_iface_beacons(struct hostapd_iface *hapd_iface)
3470 {
3471 	size_t j;
3472 
3473 	if (!hapd_iface->interfaces || hapd_iface->interfaces->count <= 1)
3474 		return;
3475 
3476 	for (j = 0; j < hapd_iface->interfaces->count; j++) {
3477 		if (hapd_iface->interfaces->iface[j] == hapd_iface)
3478 			continue;
3479 
3480 		ieee802_11_update_beacons(hapd_iface->interfaces->iface[j]);
3481 	}
3482 }
3483 
3484 
3485 int hostapd_enable_iface(struct hostapd_iface *hapd_iface)
3486 {
3487 	size_t j;
3488 
3489 	if (!hapd_iface)
3490 		return -1;
3491 
3492 	if (hapd_iface->enable_iface_cb)
3493 		return hapd_iface->enable_iface_cb(hapd_iface);
3494 
3495 	if (hapd_iface->bss[0]->drv_priv != NULL) {
3496 		wpa_printf(MSG_ERROR, "Interface %s already enabled",
3497 			   hapd_iface->conf->bss[0]->iface);
3498 		return -1;
3499 	}
3500 
3501 	wpa_printf(MSG_DEBUG, "Enable interface %s",
3502 		   hapd_iface->conf->bss[0]->iface);
3503 
3504 	for (j = 0; j < hapd_iface->num_bss; j++)
3505 		hostapd_set_security_params(hapd_iface->conf->bss[j], 1);
3506 	if (hostapd_config_check(hapd_iface->conf, 1) < 0) {
3507 		wpa_printf(MSG_INFO, "Invalid configuration - cannot enable");
3508 		return -1;
3509 	}
3510 
3511 	if (hapd_iface->interfaces == NULL ||
3512 	    hapd_iface->interfaces->driver_init == NULL ||
3513 	    hapd_iface->interfaces->driver_init(hapd_iface))
3514 		return -1;
3515 
3516 	if (hostapd_setup_interface(hapd_iface)) {
3517 		hostapd_deinit_driver(hapd_iface->bss[0]->driver,
3518 				      hapd_iface->bss[0]->drv_priv,
3519 				      hapd_iface);
3520 		return -1;
3521 	}
3522 
3523 	hostapd_refresh_all_iface_beacons(hapd_iface);
3524 
3525 	return 0;
3526 }
3527 
3528 
3529 int hostapd_reload_iface(struct hostapd_iface *hapd_iface)
3530 {
3531 	size_t j;
3532 
3533 	wpa_printf(MSG_DEBUG, "Reload interface %s",
3534 		   hapd_iface->conf->bss[0]->iface);
3535 	for (j = 0; j < hapd_iface->num_bss; j++)
3536 		hostapd_set_security_params(hapd_iface->conf->bss[j], 1);
3537 	if (hostapd_config_check(hapd_iface->conf, 1) < 0) {
3538 		wpa_printf(MSG_ERROR, "Updated configuration is invalid");
3539 		return -1;
3540 	}
3541 	hostapd_clear_old(hapd_iface);
3542 	for (j = 0; j < hapd_iface->num_bss; j++)
3543 		hostapd_reload_bss(hapd_iface->bss[j]);
3544 
3545 	return 0;
3546 }
3547 
3548 
3549 int hostapd_reload_bss_only(struct hostapd_data *bss)
3550 {
3551 
3552 	wpa_printf(MSG_DEBUG, "Reload BSS %s", bss->conf->iface);
3553 	hostapd_set_security_params(bss->conf, 1);
3554 	if (hostapd_config_check(bss->iconf, 1) < 0) {
3555 		wpa_printf(MSG_ERROR, "Updated BSS configuration is invalid");
3556 		return -1;
3557 	}
3558 	hostapd_clear_old_bss(bss);
3559 	hostapd_reload_bss(bss);
3560 	return 0;
3561 }
3562 
3563 
3564 int hostapd_disable_iface(struct hostapd_iface *hapd_iface)
3565 {
3566 	size_t j;
3567 	const struct wpa_driver_ops *driver;
3568 	void *drv_priv;
3569 
3570 	if (hapd_iface == NULL)
3571 		return -1;
3572 
3573 	if (hapd_iface->disable_iface_cb)
3574 		return hapd_iface->disable_iface_cb(hapd_iface);
3575 
3576 	if (hapd_iface->bss[0]->drv_priv == NULL) {
3577 		wpa_printf(MSG_INFO, "Interface %s already disabled",
3578 			   hapd_iface->conf->bss[0]->iface);
3579 		return -1;
3580 	}
3581 
3582 	wpa_msg(hapd_iface->bss[0]->msg_ctx, MSG_INFO, AP_EVENT_DISABLED);
3583 	driver = hapd_iface->bss[0]->driver;
3584 	drv_priv = hapd_iface->bss[0]->drv_priv;
3585 
3586 	hapd_iface->driver_ap_teardown =
3587 		!!(hapd_iface->drv_flags &
3588 		   WPA_DRIVER_FLAGS_AP_TEARDOWN_SUPPORT);
3589 
3590 #ifdef NEED_AP_MLME
3591 	for (j = 0; j < hapd_iface->num_bss; j++)
3592 		hostapd_cleanup_cs_params(hapd_iface->bss[j]);
3593 #endif /* NEED_AP_MLME */
3594 
3595 	/* same as hostapd_interface_deinit without deinitializing ctrl-iface */
3596 	for (j = 0; j < hapd_iface->num_bss; j++) {
3597 		struct hostapd_data *hapd = hapd_iface->bss[j];
3598 		hostapd_bss_deinit_no_free(hapd);
3599 		hostapd_bss_link_deinit(hapd);
3600 		hostapd_free_hapd_data(hapd);
3601 	}
3602 
3603 	hostapd_deinit_driver(driver, drv_priv, hapd_iface);
3604 
3605 	/* From hostapd_cleanup_iface: These were initialized in
3606 	 * hostapd_setup_interface and hostapd_setup_interface_complete
3607 	 */
3608 	hostapd_cleanup_iface_partial(hapd_iface);
3609 
3610 	wpa_printf(MSG_DEBUG, "Interface %s disabled",
3611 		   hapd_iface->bss[0]->conf->iface);
3612 	hostapd_set_state(hapd_iface, HAPD_IFACE_DISABLED);
3613 	hostapd_refresh_all_iface_beacons(hapd_iface);
3614 	return 0;
3615 }
3616 
3617 
3618 static struct hostapd_iface *
3619 hostapd_iface_alloc(struct hapd_interfaces *interfaces)
3620 {
3621 	struct hostapd_iface **iface, *hapd_iface;
3622 
3623 	iface = os_realloc_array(interfaces->iface, interfaces->count + 1,
3624 				 sizeof(struct hostapd_iface *));
3625 	if (iface == NULL)
3626 		return NULL;
3627 	interfaces->iface = iface;
3628 	hapd_iface = interfaces->iface[interfaces->count] =
3629 		hostapd_alloc_iface();
3630 	if (hapd_iface == NULL) {
3631 		wpa_printf(MSG_ERROR, "%s: Failed to allocate memory for "
3632 			   "the interface", __func__);
3633 		return NULL;
3634 	}
3635 	interfaces->count++;
3636 	hapd_iface->interfaces = interfaces;
3637 
3638 	return hapd_iface;
3639 }
3640 
3641 
3642 static struct hostapd_config *
3643 hostapd_config_alloc(struct hapd_interfaces *interfaces, const char *ifname,
3644 		     const char *ctrl_iface, const char *driver)
3645 {
3646 	struct hostapd_bss_config *bss;
3647 	struct hostapd_config *conf;
3648 
3649 	/* Allocates memory for bss and conf */
3650 	conf = hostapd_config_defaults();
3651 	if (conf == NULL) {
3652 		 wpa_printf(MSG_ERROR, "%s: Failed to allocate memory for "
3653 				"configuration", __func__);
3654 		 return NULL;
3655 	}
3656 
3657 	if (driver) {
3658 		int j;
3659 
3660 		for (j = 0; wpa_drivers[j]; j++) {
3661 			if (os_strcmp(driver, wpa_drivers[j]->name) == 0) {
3662 				conf->driver = wpa_drivers[j];
3663 				goto skip;
3664 			}
3665 		}
3666 
3667 		wpa_printf(MSG_ERROR,
3668 			   "Invalid/unknown driver '%s' - registering the default driver",
3669 			   driver);
3670 	}
3671 
3672 	conf->driver = wpa_drivers[0];
3673 	if (conf->driver == NULL) {
3674 		wpa_printf(MSG_ERROR, "No driver wrappers registered!");
3675 		hostapd_config_free(conf);
3676 		return NULL;
3677 	}
3678 
3679 skip:
3680 	bss = conf->last_bss = conf->bss[0];
3681 
3682 	os_strlcpy(bss->iface, ifname, sizeof(bss->iface));
3683 	bss->ctrl_interface = os_strdup(ctrl_iface);
3684 	if (bss->ctrl_interface == NULL) {
3685 		hostapd_config_free(conf);
3686 		return NULL;
3687 	}
3688 
3689 	/* Reading configuration file skipped, will be done in SET!
3690 	 * From reading the configuration till the end has to be done in
3691 	 * SET
3692 	 */
3693 	return conf;
3694 }
3695 
3696 
3697 static int hostapd_data_alloc(struct hostapd_iface *hapd_iface,
3698 			      struct hostapd_config *conf)
3699 {
3700 	size_t i;
3701 	struct hostapd_data *hapd;
3702 
3703 	hapd_iface->bss = os_calloc(conf->num_bss,
3704 				    sizeof(struct hostapd_data *));
3705 	if (hapd_iface->bss == NULL)
3706 		return -1;
3707 
3708 	for (i = 0; i < conf->num_bss; i++) {
3709 		hapd = hapd_iface->bss[i] =
3710 			hostapd_alloc_bss_data(hapd_iface, conf, conf->bss[i]);
3711 		if (hapd == NULL) {
3712 			while (i > 0) {
3713 				i--;
3714 				os_free(hapd_iface->bss[i]);
3715 				hapd_iface->bss[i] = NULL;
3716 			}
3717 			os_free(hapd_iface->bss);
3718 			hapd_iface->bss = NULL;
3719 			return -1;
3720 		}
3721 		hapd->msg_ctx = hapd;
3722 		hostapd_bss_setup_multi_link(hapd, hapd_iface->interfaces);
3723 	}
3724 
3725 	hapd_iface->conf = conf;
3726 	hapd_iface->num_bss = conf->num_bss;
3727 
3728 	return 0;
3729 }
3730 
3731 
3732 int hostapd_add_iface(struct hapd_interfaces *interfaces, char *buf)
3733 {
3734 	struct hostapd_config *conf = NULL;
3735 	struct hostapd_iface *hapd_iface = NULL, *new_iface = NULL;
3736 	struct hostapd_data *hapd;
3737 	char *ptr;
3738 	size_t i, j;
3739 	const char *conf_file = NULL, *phy_name = NULL;
3740 
3741 	if (os_strncmp(buf, "bss_config=", 11) == 0) {
3742 		char *pos;
3743 		phy_name = buf + 11;
3744 		pos = os_strchr(phy_name, ':');
3745 		if (!pos)
3746 			return -1;
3747 		*pos++ = '\0';
3748 		conf_file = pos;
3749 		if (!os_strlen(conf_file))
3750 			return -1;
3751 
3752 		hapd_iface = hostapd_interface_init_bss(interfaces, phy_name,
3753 							conf_file, 0);
3754 		if (!hapd_iface)
3755 			return -1;
3756 		for (j = 0; j < interfaces->count; j++) {
3757 			if (interfaces->iface[j] == hapd_iface)
3758 				break;
3759 		}
3760 		if (j == interfaces->count) {
3761 			struct hostapd_iface **tmp;
3762 			tmp = os_realloc_array(interfaces->iface,
3763 					       interfaces->count + 1,
3764 					       sizeof(struct hostapd_iface *));
3765 			if (!tmp) {
3766 				hostapd_interface_deinit_free(hapd_iface);
3767 				return -1;
3768 			}
3769 			interfaces->iface = tmp;
3770 			interfaces->iface[interfaces->count++] = hapd_iface;
3771 			new_iface = hapd_iface;
3772 		}
3773 
3774 		if (new_iface) {
3775 			if (interfaces->driver_init(hapd_iface))
3776 				goto fail;
3777 
3778 			if (hostapd_setup_interface(hapd_iface)) {
3779 				hostapd_deinit_driver(
3780 					hapd_iface->bss[0]->driver,
3781 					hapd_iface->bss[0]->drv_priv,
3782 					hapd_iface);
3783 				goto fail;
3784 			}
3785 		} else {
3786 			/* Assign new BSS with bss[0]'s driver info */
3787 			hapd = hapd_iface->bss[hapd_iface->num_bss - 1];
3788 			hapd->driver = hapd_iface->bss[0]->driver;
3789 			hapd->drv_priv = hapd_iface->bss[0]->drv_priv;
3790 			os_memcpy(hapd->own_addr, hapd_iface->bss[0]->own_addr,
3791 				  ETH_ALEN);
3792 
3793 			if (start_ctrl_iface_bss(hapd) < 0 ||
3794 			    (hapd_iface->state == HAPD_IFACE_ENABLED &&
3795 			     hostapd_setup_bss(hapd, -1, true))) {
3796 				hostapd_bss_link_deinit(hapd);
3797 				hostapd_cleanup(hapd);
3798 				hapd_iface->bss[hapd_iface->num_bss - 1] = NULL;
3799 				hapd_iface->conf->num_bss--;
3800 				hapd_iface->num_bss--;
3801 				wpa_printf(MSG_DEBUG, "%s: free hapd %p %s",
3802 					   __func__, hapd, hapd->conf->iface);
3803 				hostapd_config_free_bss(hapd->conf);
3804 				hapd->conf = NULL;
3805 #ifdef CONFIG_IEEE80211BE
3806 				hostapd_mld_ref_dec(hapd->mld);
3807 #endif /* CONFIG_IEEE80211BE */
3808 				os_free(hapd);
3809 				return -1;
3810 			}
3811 		}
3812 		hostapd_owe_update_trans(hapd_iface);
3813 		return 0;
3814 	}
3815 
3816 	ptr = os_strchr(buf, ' ');
3817 	if (ptr == NULL)
3818 		return -1;
3819 	*ptr++ = '\0';
3820 
3821 	if (os_strncmp(ptr, "config=", 7) == 0)
3822 		conf_file = ptr + 7;
3823 
3824 	for (i = 0; i < interfaces->count; i++) {
3825 		bool mld_ap = false;
3826 
3827 #ifdef CONFIG_IEEE80211BE
3828 		mld_ap = interfaces->iface[i]->conf->bss[0]->mld_ap;
3829 #endif /* CONFIG_IEEE80211BE */
3830 
3831 		if (!os_strcmp(interfaces->iface[i]->conf->bss[0]->iface,
3832 			       buf) && !mld_ap) {
3833 			wpa_printf(MSG_INFO, "Cannot add interface - it "
3834 				   "already exists");
3835 			return -1;
3836 		}
3837 	}
3838 
3839 	hapd_iface = hostapd_iface_alloc(interfaces);
3840 	if (hapd_iface == NULL) {
3841 		wpa_printf(MSG_ERROR, "%s: Failed to allocate memory "
3842 			   "for interface", __func__);
3843 		goto fail;
3844 	}
3845 	new_iface = hapd_iface;
3846 
3847 	if (conf_file && interfaces->config_read_cb) {
3848 		conf = interfaces->config_read_cb(conf_file);
3849 		if (conf && conf->bss)
3850 			os_strlcpy(conf->bss[0]->iface, buf,
3851 				   sizeof(conf->bss[0]->iface));
3852 	} else {
3853 		char *driver = os_strchr(ptr, ' ');
3854 
3855 		if (driver)
3856 			*driver++ = '\0';
3857 		conf = hostapd_config_alloc(interfaces, buf, ptr, driver);
3858 	}
3859 
3860 	if (conf == NULL || conf->bss == NULL) {
3861 		wpa_printf(MSG_ERROR, "%s: Failed to allocate memory "
3862 			   "for configuration", __func__);
3863 		goto fail;
3864 	}
3865 
3866 	if (hostapd_data_alloc(hapd_iface, conf) < 0) {
3867 		wpa_printf(MSG_ERROR, "%s: Failed to allocate memory "
3868 			   "for hostapd", __func__);
3869 		goto fail;
3870 	}
3871 	conf = NULL;
3872 
3873 	if (start_ctrl_iface(hapd_iface) < 0)
3874 		goto fail;
3875 
3876 	wpa_printf(MSG_INFO, "Add interface '%s'",
3877 		   hapd_iface->conf->bss[0]->iface);
3878 
3879 	return 0;
3880 
3881 fail:
3882 	if (conf)
3883 		hostapd_config_free(conf);
3884 	if (hapd_iface) {
3885 		if (hapd_iface->bss) {
3886 			for (i = 0; i < hapd_iface->num_bss; i++) {
3887 				hapd = hapd_iface->bss[i];
3888 				if (!hapd)
3889 					continue;
3890 				if (hapd_iface->interfaces &&
3891 				    hapd_iface->interfaces->ctrl_iface_deinit)
3892 					hapd_iface->interfaces->
3893 						ctrl_iface_deinit(hapd);
3894 				wpa_printf(MSG_DEBUG, "%s: free hapd %p (%s)",
3895 					   __func__, hapd_iface->bss[i],
3896 					   hapd->conf->iface);
3897 				hostapd_bss_link_deinit(hapd);
3898 				hostapd_cleanup(hapd);
3899 #ifdef CONFIG_IEEE80211BE
3900 				hostapd_mld_ref_dec(hapd->mld);
3901 #endif /* CONFIG_IEEE80211BE */
3902 				os_free(hapd);
3903 				hapd_iface->bss[i] = NULL;
3904 			}
3905 			os_free(hapd_iface->bss);
3906 			hapd_iface->bss = NULL;
3907 		}
3908 		if (new_iface) {
3909 			interfaces->count--;
3910 			interfaces->iface[interfaces->count] = NULL;
3911 			hostapd_cleanup_unused_mlds(interfaces);
3912 		}
3913 		hostapd_cleanup_iface(hapd_iface);
3914 	}
3915 	return -1;
3916 }
3917 
3918 
3919 static int hostapd_remove_bss(struct hostapd_iface *iface, unsigned int idx)
3920 {
3921 	size_t i;
3922 
3923 	wpa_printf(MSG_INFO, "Remove BSS '%s'", iface->conf->bss[idx]->iface);
3924 
3925 	/* Remove hostapd_data only if it has already been initialized */
3926 	if (idx < iface->num_bss) {
3927 		struct hostapd_data *hapd = iface->bss[idx];
3928 
3929 		hostapd_bss_deinit(hapd);
3930 		wpa_printf(MSG_DEBUG, "%s: free hapd %p (%s)",
3931 			   __func__, hapd, hapd->conf->iface);
3932 		hostapd_config_free_bss(hapd->conf);
3933 		hapd->conf = NULL;
3934 #ifdef CONFIG_IEEE80211BE
3935 		hostapd_mld_ref_dec(hapd->mld);
3936 #endif /* CONFIG_IEEE80211BE */
3937 		os_free(hapd);
3938 
3939 		iface->num_bss--;
3940 
3941 		for (i = idx; i < iface->num_bss; i++)
3942 			iface->bss[i] = iface->bss[i + 1];
3943 	} else {
3944 		hostapd_config_free_bss(iface->conf->bss[idx]);
3945 		iface->conf->bss[idx] = NULL;
3946 	}
3947 
3948 	iface->conf->num_bss--;
3949 	for (i = idx; i < iface->conf->num_bss; i++)
3950 		iface->conf->bss[i] = iface->conf->bss[i + 1];
3951 
3952 	return 0;
3953 }
3954 
3955 
3956 int hostapd_remove_iface(struct hapd_interfaces *interfaces, char *buf)
3957 {
3958 	struct hostapd_iface *hapd_iface;
3959 	size_t i, j, k = 0;
3960 
3961 	for (i = 0; i < interfaces->count; i++) {
3962 		hapd_iface = interfaces->iface[i];
3963 		if (hapd_iface == NULL)
3964 			return -1;
3965 		if (!os_strcmp(hapd_iface->conf->bss[0]->iface, buf)) {
3966 			wpa_printf(MSG_INFO, "Remove interface '%s'", buf);
3967 			hapd_iface->driver_ap_teardown =
3968 				!!(hapd_iface->drv_flags &
3969 				   WPA_DRIVER_FLAGS_AP_TEARDOWN_SUPPORT);
3970 
3971 			hostapd_interface_deinit_free(hapd_iface);
3972 			k = i;
3973 			while (k < (interfaces->count - 1)) {
3974 				interfaces->iface[k] =
3975 					interfaces->iface[k + 1];
3976 				k++;
3977 			}
3978 			interfaces->count--;
3979 			hostapd_cleanup_unused_mlds(interfaces);
3980 
3981 			return 0;
3982 		}
3983 
3984 		for (j = 0; j < hapd_iface->conf->num_bss; j++) {
3985 			if (!os_strcmp(hapd_iface->conf->bss[j]->iface, buf)) {
3986 				hapd_iface->driver_ap_teardown =
3987 					!(hapd_iface->drv_flags &
3988 					  WPA_DRIVER_FLAGS_AP_TEARDOWN_SUPPORT);
3989 				return hostapd_remove_bss(hapd_iface, j);
3990 			}
3991 		}
3992 	}
3993 	return -1;
3994 }
3995 
3996 
3997 /**
3998  * hostapd_new_assoc_sta - Notify that a new station associated with the AP
3999  * @hapd: Pointer to BSS data
4000  * @sta: Pointer to the associated STA data
4001  * @reassoc: 1 to indicate this was a re-association; 0 = first association
4002  *
4003  * This function will be called whenever a station associates with the AP. It
4004  * can be called from ieee802_11.c for drivers that export MLME to hostapd and
4005  * from drv_callbacks.c based on driver events for drivers that take care of
4006  * management frames (IEEE 802.11 authentication and association) internally.
4007  */
4008 void hostapd_new_assoc_sta(struct hostapd_data *hapd, struct sta_info *sta,
4009 			   int reassoc)
4010 {
4011 	if (hapd->tkip_countermeasures) {
4012 		hostapd_drv_sta_deauth(hapd, sta->addr,
4013 				       WLAN_REASON_MICHAEL_MIC_FAILURE);
4014 		return;
4015 	}
4016 
4017 #ifdef CONFIG_IEEE80211BE
4018 	if (ap_sta_is_mld(hapd, sta) &&
4019 	    sta->mld_assoc_link_id != hapd->mld_link_id)
4020 		return;
4021 #endif /* CONFIG_IEEE80211BE */
4022 
4023 	ap_sta_clear_disconnect_timeouts(hapd, sta);
4024 	sta->post_csa_sa_query = 0;
4025 
4026 #ifdef CONFIG_P2P
4027 	if (sta->p2p_ie == NULL && !sta->no_p2p_set) {
4028 		sta->no_p2p_set = 1;
4029 		hapd->num_sta_no_p2p++;
4030 		if (hapd->num_sta_no_p2p == 1)
4031 			hostapd_p2p_non_p2p_sta_connected(hapd);
4032 	}
4033 #endif /* CONFIG_P2P */
4034 
4035 	airtime_policy_new_sta(hapd, sta);
4036 
4037 	/* Start accounting here, if IEEE 802.1X and WPA are not used.
4038 	 * IEEE 802.1X/WPA code will start accounting after the station has
4039 	 * been authorized. */
4040 	if (!hapd->conf->ieee802_1x && !hapd->conf->wpa && !hapd->conf->osen) {
4041 		ap_sta_set_authorized(hapd, sta, 1);
4042 		os_get_reltime(&sta->connected_time);
4043 		accounting_sta_start(hapd, sta);
4044 	}
4045 
4046 	/* Start IEEE 802.1X authentication process for new stations */
4047 	ieee802_1x_new_station(hapd, sta);
4048 	if (reassoc) {
4049 		if (sta->auth_alg != WLAN_AUTH_FT &&
4050 		    sta->auth_alg != WLAN_AUTH_FILS_SK &&
4051 		    sta->auth_alg != WLAN_AUTH_FILS_SK_PFS &&
4052 		    sta->auth_alg != WLAN_AUTH_FILS_PK &&
4053 		    !(sta->flags & (WLAN_STA_WPS | WLAN_STA_MAYBE_WPS)))
4054 			wpa_auth_sm_event(sta->wpa_sm, WPA_REAUTH);
4055 	} else if (!(hapd->iface->drv_flags2 &
4056 		     WPA_DRIVER_FLAGS2_4WAY_HANDSHAKE_AP_PSK)) {
4057 		/* The 4-way handshake offloaded case will have this handled
4058 		 * based on the port authorized event. */
4059 		wpa_auth_sta_associated(hapd->wpa_auth, sta->wpa_sm);
4060 	}
4061 
4062 	if (hapd->iface->drv_flags & WPA_DRIVER_FLAGS_WIRED) {
4063 		if (eloop_cancel_timeout(ap_handle_timer, hapd, sta) > 0) {
4064 			wpa_printf(MSG_DEBUG,
4065 				   "%s: %s: canceled wired ap_handle_timer timeout for "
4066 				   MACSTR,
4067 				   hapd->conf->iface, __func__,
4068 				   MAC2STR(sta->addr));
4069 		}
4070 	} else if (!(hapd->iface->drv_flags &
4071 		     WPA_DRIVER_FLAGS_INACTIVITY_TIMER)) {
4072 		wpa_printf(MSG_DEBUG,
4073 			   "%s: %s: reschedule ap_handle_timer timeout for "
4074 			   MACSTR " (%d seconds - ap_max_inactivity)",
4075 			   hapd->conf->iface, __func__, MAC2STR(sta->addr),
4076 			   hapd->conf->ap_max_inactivity);
4077 		eloop_cancel_timeout(ap_handle_timer, hapd, sta);
4078 		eloop_register_timeout(hapd->conf->ap_max_inactivity, 0,
4079 				       ap_handle_timer, hapd, sta);
4080 	}
4081 
4082 #ifdef CONFIG_MACSEC
4083 	if (hapd->conf->wpa_key_mgmt == WPA_KEY_MGMT_NONE &&
4084 	    hapd->conf->mka_psk_set)
4085 		ieee802_1x_create_preshared_mka_hapd(hapd, sta);
4086 	else
4087 		ieee802_1x_alloc_kay_sm_hapd(hapd, sta);
4088 #endif /* CONFIG_MACSEC */
4089 }
4090 
4091 
4092 const char * hostapd_state_text(enum hostapd_iface_state s)
4093 {
4094 	switch (s) {
4095 	case HAPD_IFACE_UNINITIALIZED:
4096 		return "UNINITIALIZED";
4097 	case HAPD_IFACE_DISABLED:
4098 		return "DISABLED";
4099 	case HAPD_IFACE_COUNTRY_UPDATE:
4100 		return "COUNTRY_UPDATE";
4101 	case HAPD_IFACE_ACS:
4102 		return "ACS";
4103 	case HAPD_IFACE_HT_SCAN:
4104 		return "HT_SCAN";
4105 	case HAPD_IFACE_DFS:
4106 		return "DFS";
4107 	case HAPD_IFACE_ENABLED:
4108 		return "ENABLED";
4109 	case HAPD_IFACE_NO_IR:
4110 		return "NO_IR";
4111 	}
4112 
4113 	return "UNKNOWN";
4114 }
4115 
4116 
4117 void hostapd_set_state(struct hostapd_iface *iface, enum hostapd_iface_state s)
4118 {
4119 	wpa_printf(MSG_INFO, "%s: interface state %s->%s",
4120 		   iface->conf ? iface->conf->bss[0]->iface : "N/A",
4121 		   hostapd_state_text(iface->state), hostapd_state_text(s));
4122 	iface->state = s;
4123 }
4124 
4125 
4126 int hostapd_csa_in_progress(struct hostapd_iface *iface)
4127 {
4128 	unsigned int i;
4129 
4130 	for (i = 0; i < iface->num_bss; i++)
4131 		if (iface->bss[i]->csa_in_progress)
4132 			return 1;
4133 	return 0;
4134 }
4135 
4136 
4137 #ifdef NEED_AP_MLME
4138 
4139 void free_beacon_data(struct beacon_data *beacon)
4140 {
4141 	os_free(beacon->head);
4142 	beacon->head = NULL;
4143 	os_free(beacon->tail);
4144 	beacon->tail = NULL;
4145 	os_free(beacon->probe_resp);
4146 	beacon->probe_resp = NULL;
4147 	os_free(beacon->beacon_ies);
4148 	beacon->beacon_ies = NULL;
4149 	os_free(beacon->proberesp_ies);
4150 	beacon->proberesp_ies = NULL;
4151 	os_free(beacon->assocresp_ies);
4152 	beacon->assocresp_ies = NULL;
4153 }
4154 
4155 
4156 static int hostapd_build_beacon_data(struct hostapd_data *hapd,
4157 				     struct beacon_data *beacon)
4158 {
4159 	struct wpabuf *beacon_extra, *proberesp_extra, *assocresp_extra;
4160 	struct wpa_driver_ap_params params;
4161 	int ret;
4162 
4163 	os_memset(beacon, 0, sizeof(*beacon));
4164 	ret = ieee802_11_build_ap_params(hapd, &params);
4165 	if (ret < 0)
4166 		return ret;
4167 
4168 	ret = hostapd_build_ap_extra_ies(hapd, &beacon_extra,
4169 					 &proberesp_extra,
4170 					 &assocresp_extra);
4171 	if (ret)
4172 		goto free_ap_params;
4173 
4174 	ret = -1;
4175 	beacon->head = os_memdup(params.head, params.head_len);
4176 	if (!beacon->head)
4177 		goto free_ap_extra_ies;
4178 
4179 	beacon->head_len = params.head_len;
4180 
4181 	beacon->tail = os_memdup(params.tail, params.tail_len);
4182 	if (!beacon->tail)
4183 		goto free_beacon;
4184 
4185 	beacon->tail_len = params.tail_len;
4186 
4187 	if (params.proberesp != NULL) {
4188 		beacon->probe_resp = os_memdup(params.proberesp,
4189 					       params.proberesp_len);
4190 		if (!beacon->probe_resp)
4191 			goto free_beacon;
4192 
4193 		beacon->probe_resp_len = params.proberesp_len;
4194 	}
4195 
4196 	/* copy the extra ies */
4197 	if (beacon_extra) {
4198 		beacon->beacon_ies = os_memdup(beacon_extra->buf,
4199 					       wpabuf_len(beacon_extra));
4200 		if (!beacon->beacon_ies)
4201 			goto free_beacon;
4202 
4203 		beacon->beacon_ies_len = wpabuf_len(beacon_extra);
4204 	}
4205 
4206 	if (proberesp_extra) {
4207 		beacon->proberesp_ies = os_memdup(proberesp_extra->buf,
4208 						  wpabuf_len(proberesp_extra));
4209 		if (!beacon->proberesp_ies)
4210 			goto free_beacon;
4211 
4212 		beacon->proberesp_ies_len = wpabuf_len(proberesp_extra);
4213 	}
4214 
4215 	if (assocresp_extra) {
4216 		beacon->assocresp_ies = os_memdup(assocresp_extra->buf,
4217 						  wpabuf_len(assocresp_extra));
4218 		if (!beacon->assocresp_ies)
4219 			goto free_beacon;
4220 
4221 		beacon->assocresp_ies_len = wpabuf_len(assocresp_extra);
4222 	}
4223 
4224 	ret = 0;
4225 free_beacon:
4226 	/* if the function fails, the caller should not free beacon data */
4227 	if (ret)
4228 		free_beacon_data(beacon);
4229 
4230 free_ap_extra_ies:
4231 	hostapd_free_ap_extra_ies(hapd, beacon_extra, proberesp_extra,
4232 				  assocresp_extra);
4233 free_ap_params:
4234 	ieee802_11_free_ap_params(&params);
4235 	return ret;
4236 }
4237 
4238 
4239 /*
4240  * TODO: This flow currently supports only changing channel and width within
4241  * the same hw_mode. Any other changes to MAC parameters or provided settings
4242  * are not supported.
4243  */
4244 static int hostapd_change_config_freq(struct hostapd_data *hapd,
4245 				      struct hostapd_config *conf,
4246 				      struct hostapd_freq_params *params,
4247 				      struct hostapd_freq_params *old_params)
4248 {
4249 	int channel;
4250 	u8 seg0 = 0, seg1 = 0;
4251 	struct hostapd_hw_modes *mode;
4252 
4253 	if (!params->channel) {
4254 		/* check if the new channel is supported by hw */
4255 		params->channel = hostapd_hw_get_channel(hapd, params->freq);
4256 	}
4257 
4258 	channel = params->channel;
4259 	if (!channel)
4260 		return -1;
4261 
4262 	hostapd_determine_mode(hapd->iface);
4263 	mode = hapd->iface->current_mode;
4264 
4265 	/* if a pointer to old_params is provided we save previous state */
4266 	if (old_params &&
4267 	    hostapd_set_freq_params(old_params, conf->hw_mode,
4268 				    hostapd_hw_get_freq(hapd, conf->channel),
4269 				    conf->channel, conf->enable_edmg,
4270 				    conf->edmg_channel, conf->ieee80211n,
4271 				    conf->ieee80211ac, conf->ieee80211ax,
4272 				    conf->ieee80211be, conf->secondary_channel,
4273 				    hostapd_get_oper_chwidth(conf),
4274 				    hostapd_get_oper_centr_freq_seg0_idx(conf),
4275 				    hostapd_get_oper_centr_freq_seg1_idx(conf),
4276 				    conf->vht_capab,
4277 				    mode ? &mode->he_capab[IEEE80211_MODE_AP] :
4278 				    NULL,
4279 				    mode ? &mode->eht_capab[IEEE80211_MODE_AP] :
4280 				    NULL,
4281 				    hostapd_get_punct_bitmap(hapd)))
4282 		return -1;
4283 
4284 	switch (params->bandwidth) {
4285 	case 0:
4286 	case 20:
4287 		conf->ht_capab &= ~HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET;
4288 		break;
4289 	case 40:
4290 	case 80:
4291 	case 160:
4292 	case 320:
4293 		conf->ht_capab |= HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET;
4294 		break;
4295 	default:
4296 		return -1;
4297 	}
4298 
4299 	switch (params->bandwidth) {
4300 	case 0:
4301 	case 20:
4302 	case 40:
4303 		hostapd_set_oper_chwidth(conf, CONF_OPER_CHWIDTH_USE_HT);
4304 		break;
4305 	case 80:
4306 		if (params->center_freq2)
4307 			hostapd_set_oper_chwidth(conf,
4308 						 CONF_OPER_CHWIDTH_80P80MHZ);
4309 		else
4310 			hostapd_set_oper_chwidth(conf,
4311 						 CONF_OPER_CHWIDTH_80MHZ);
4312 		break;
4313 	case 160:
4314 		hostapd_set_oper_chwidth(conf, CONF_OPER_CHWIDTH_160MHZ);
4315 		break;
4316 	case 320:
4317 		hostapd_set_oper_chwidth(conf, CONF_OPER_CHWIDTH_320MHZ);
4318 		break;
4319 	default:
4320 		return -1;
4321 	}
4322 
4323 	conf->channel = channel;
4324 	conf->ieee80211n = params->ht_enabled;
4325 	conf->ieee80211ac = params->vht_enabled;
4326 	conf->secondary_channel = params->sec_channel_offset;
4327 	if (params->center_freq1 &&
4328 	    ieee80211_freq_to_chan(params->center_freq1, &seg0) ==
4329 	    NUM_HOSTAPD_MODES)
4330 		return -1;
4331 	if (params->center_freq2 &&
4332 	    ieee80211_freq_to_chan(params->center_freq2,
4333 				   &seg1) == NUM_HOSTAPD_MODES)
4334 		return -1;
4335 	hostapd_set_oper_centr_freq_seg0_idx(conf, seg0);
4336 	hostapd_set_oper_centr_freq_seg1_idx(conf, seg1);
4337 
4338 	/* TODO: maybe call here hostapd_config_check here? */
4339 
4340 	return 0;
4341 }
4342 
4343 
4344 static int hostapd_fill_csa_settings(struct hostapd_data *hapd,
4345 				     struct csa_settings *settings)
4346 {
4347 	struct hostapd_iface *iface = hapd->iface;
4348 	struct hostapd_freq_params old_freq;
4349 	int ret;
4350 #ifdef CONFIG_IEEE80211BE
4351 	u16 old_punct_bitmap;
4352 #endif /* CONFIG_IEEE80211BE */
4353 	u8 chan, bandwidth;
4354 
4355 	os_memset(&old_freq, 0, sizeof(old_freq));
4356 	if (!iface || !iface->freq || hapd->csa_in_progress)
4357 		return -1;
4358 
4359 	switch (settings->freq_params.bandwidth) {
4360 	case 80:
4361 		if (settings->freq_params.center_freq2)
4362 			bandwidth = CONF_OPER_CHWIDTH_80P80MHZ;
4363 		else
4364 			bandwidth = CONF_OPER_CHWIDTH_80MHZ;
4365 		break;
4366 	case 160:
4367 		bandwidth = CONF_OPER_CHWIDTH_160MHZ;
4368 		break;
4369 	case 320:
4370 		bandwidth = CONF_OPER_CHWIDTH_320MHZ;
4371 		break;
4372 	default:
4373 		bandwidth = CONF_OPER_CHWIDTH_USE_HT;
4374 		break;
4375 	}
4376 
4377 	if (ieee80211_freq_to_channel_ext(
4378 		    settings->freq_params.freq,
4379 		    settings->freq_params.sec_channel_offset,
4380 		    bandwidth,
4381 		    &hapd->iface->cs_oper_class,
4382 		    &chan) == NUM_HOSTAPD_MODES) {
4383 		wpa_printf(MSG_DEBUG,
4384 			   "invalid frequency for channel switch (freq=%d, sec_channel_offset=%d, vht_enabled=%d, he_enabled=%d, eht_enabled=%d)",
4385 			   settings->freq_params.freq,
4386 			   settings->freq_params.sec_channel_offset,
4387 			   settings->freq_params.vht_enabled,
4388 			   settings->freq_params.he_enabled,
4389 			   settings->freq_params.eht_enabled);
4390 		return -1;
4391 	}
4392 
4393 	settings->freq_params.channel = chan;
4394 
4395 	ret = hostapd_change_config_freq(iface->bss[0], iface->conf,
4396 					 &settings->freq_params,
4397 					 &old_freq);
4398 	if (ret)
4399 		return ret;
4400 
4401 #ifdef CONFIG_IEEE80211BE
4402 	old_punct_bitmap = iface->conf->punct_bitmap;
4403 	iface->conf->punct_bitmap = settings->punct_bitmap;
4404 #endif /* CONFIG_IEEE80211BE */
4405 	ret = hostapd_build_beacon_data(hapd, &settings->beacon_after);
4406 
4407 	/* change back the configuration */
4408 #ifdef CONFIG_IEEE80211BE
4409 	iface->conf->punct_bitmap = old_punct_bitmap;
4410 #endif /* CONFIG_IEEE80211BE */
4411 	hostapd_change_config_freq(iface->bss[0], iface->conf,
4412 				   &old_freq, NULL);
4413 
4414 	if (ret)
4415 		return ret;
4416 
4417 	/* set channel switch parameters for csa ie */
4418 	hapd->cs_freq_params = settings->freq_params;
4419 	hapd->cs_count = settings->cs_count;
4420 	hapd->cs_block_tx = settings->block_tx;
4421 
4422 	ret = hostapd_build_beacon_data(hapd, &settings->beacon_csa);
4423 	if (ret) {
4424 		free_beacon_data(&settings->beacon_after);
4425 		return ret;
4426 	}
4427 
4428 	settings->counter_offset_beacon[0] = hapd->cs_c_off_beacon;
4429 	settings->counter_offset_presp[0] = hapd->cs_c_off_proberesp;
4430 	settings->counter_offset_beacon[1] = hapd->cs_c_off_ecsa_beacon;
4431 	settings->counter_offset_presp[1] = hapd->cs_c_off_ecsa_proberesp;
4432 	settings->link_id = -1;
4433 #ifdef CONFIG_IEEE80211BE
4434 	if (hapd->conf->mld_ap)
4435 		settings->link_id = hapd->mld_link_id;
4436 #endif /* CONFIG_IEEE80211BE */
4437 
4438 #ifdef CONFIG_IEEE80211AX
4439 	settings->ubpr.unsol_bcast_probe_resp_tmpl =
4440 		hostapd_unsol_bcast_probe_resp(hapd, &settings->ubpr);
4441 #endif /* CONFIG_IEEE80211AX */
4442 
4443 	return 0;
4444 }
4445 
4446 
4447 void hostapd_cleanup_cs_params(struct hostapd_data *hapd)
4448 {
4449 	os_memset(&hapd->cs_freq_params, 0, sizeof(hapd->cs_freq_params));
4450 	hapd->cs_count = 0;
4451 	hapd->cs_block_tx = 0;
4452 	hapd->cs_c_off_beacon = 0;
4453 	hapd->cs_c_off_proberesp = 0;
4454 	hapd->csa_in_progress = 0;
4455 	hapd->cs_c_off_ecsa_beacon = 0;
4456 	hapd->cs_c_off_ecsa_proberesp = 0;
4457 }
4458 
4459 
4460 void hostapd_chan_switch_config(struct hostapd_data *hapd,
4461 				struct hostapd_freq_params *freq_params)
4462 {
4463 	if (freq_params->eht_enabled)
4464 		hapd->iconf->ch_switch_eht_config |= CH_SWITCH_EHT_ENABLED;
4465 	else
4466 		hapd->iconf->ch_switch_eht_config |= CH_SWITCH_EHT_DISABLED;
4467 
4468 	if (freq_params->he_enabled)
4469 		hapd->iconf->ch_switch_he_config |= CH_SWITCH_HE_ENABLED;
4470 	else
4471 		hapd->iconf->ch_switch_he_config |= CH_SWITCH_HE_DISABLED;
4472 
4473 	if (freq_params->vht_enabled)
4474 		hapd->iconf->ch_switch_vht_config |= CH_SWITCH_VHT_ENABLED;
4475 	else
4476 		hapd->iconf->ch_switch_vht_config |= CH_SWITCH_VHT_DISABLED;
4477 
4478 	hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
4479 		       HOSTAPD_LEVEL_INFO,
4480 		       "CHAN_SWITCH EHT config 0x%x HE config 0x%x VHT config 0x%x",
4481 		       hapd->iconf->ch_switch_eht_config,
4482 		       hapd->iconf->ch_switch_he_config,
4483 		       hapd->iconf->ch_switch_vht_config);
4484 }
4485 
4486 
4487 int hostapd_switch_channel(struct hostapd_data *hapd,
4488 			   struct csa_settings *settings)
4489 {
4490 	int ret;
4491 
4492 	if (!(hapd->iface->drv_flags & WPA_DRIVER_FLAGS_AP_CSA)) {
4493 		wpa_printf(MSG_INFO, "CSA is not supported");
4494 		return -1;
4495 	}
4496 
4497 	ret = hostapd_fill_csa_settings(hapd, settings);
4498 	if (ret)
4499 		return ret;
4500 
4501 	ret = hostapd_drv_switch_channel(hapd, settings);
4502 	free_beacon_data(&settings->beacon_csa);
4503 	free_beacon_data(&settings->beacon_after);
4504 #ifdef CONFIG_IEEE80211AX
4505 	os_free(settings->ubpr.unsol_bcast_probe_resp_tmpl);
4506 #endif /* CONFIG_IEEE80211AX */
4507 
4508 	if (ret) {
4509 		/* if we failed, clean cs parameters */
4510 		hostapd_cleanup_cs_params(hapd);
4511 		return ret;
4512 	}
4513 
4514 	hapd->csa_in_progress = 1;
4515 	return 0;
4516 }
4517 
4518 
4519 void
4520 hostapd_switch_channel_fallback(struct hostapd_iface *iface,
4521 				const struct hostapd_freq_params *freq_params)
4522 {
4523 	u8 seg0_idx = 0, seg1_idx = 0;
4524 	enum oper_chan_width bw = CONF_OPER_CHWIDTH_USE_HT;
4525 	u8 op_class, chan = 0;
4526 
4527 	wpa_printf(MSG_DEBUG, "Restarting all CSA-related BSSes");
4528 
4529 	if (freq_params->center_freq1)
4530 		ieee80211_freq_to_chan(freq_params->center_freq1, &seg0_idx);
4531 	if (freq_params->center_freq2)
4532 		ieee80211_freq_to_chan(freq_params->center_freq2, &seg1_idx);
4533 
4534 	switch (freq_params->bandwidth) {
4535 	case 0:
4536 	case 20:
4537 	case 40:
4538 		bw = CONF_OPER_CHWIDTH_USE_HT;
4539 		break;
4540 	case 80:
4541 		if (freq_params->center_freq2) {
4542 			bw = CONF_OPER_CHWIDTH_80P80MHZ;
4543 			iface->conf->vht_capab |=
4544 				VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ;
4545 		} else {
4546 			bw = CONF_OPER_CHWIDTH_80MHZ;
4547 		}
4548 		break;
4549 	case 160:
4550 		bw = CONF_OPER_CHWIDTH_160MHZ;
4551 		iface->conf->vht_capab |= VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
4552 		break;
4553 	case 320:
4554 		bw = CONF_OPER_CHWIDTH_320MHZ;
4555 		break;
4556 	default:
4557 		wpa_printf(MSG_WARNING, "Unknown CSA bandwidth: %d",
4558 			   freq_params->bandwidth);
4559 		break;
4560 	}
4561 
4562 	iface->freq = freq_params->freq;
4563 	iface->conf->channel = freq_params->channel;
4564 	iface->conf->secondary_channel = freq_params->sec_channel_offset;
4565 	if (ieee80211_freq_to_channel_ext(freq_params->freq,
4566 					  freq_params->sec_channel_offset, bw,
4567 					  &op_class, &chan) ==
4568 	    NUM_HOSTAPD_MODES ||
4569 	    chan != freq_params->channel)
4570 		wpa_printf(MSG_INFO, "CSA: Channel mismatch: %d -> %d",
4571 			   freq_params->channel, chan);
4572 
4573 	iface->conf->op_class = op_class;
4574 	hostapd_set_oper_centr_freq_seg0_idx(iface->conf, seg0_idx);
4575 	hostapd_set_oper_centr_freq_seg1_idx(iface->conf, seg1_idx);
4576 	hostapd_set_oper_chwidth(iface->conf, bw);
4577 	iface->conf->ieee80211n = freq_params->ht_enabled;
4578 	iface->conf->ieee80211ac = freq_params->vht_enabled;
4579 	iface->conf->ieee80211ax = freq_params->he_enabled;
4580 	iface->conf->ieee80211be = freq_params->eht_enabled;
4581 
4582 	/*
4583 	 * cs_params must not be cleared earlier because the freq_params
4584 	 * argument may actually point to one of these.
4585 	 * These params will be cleared during interface disable below.
4586 	 */
4587 	hostapd_disable_iface(iface);
4588 	hostapd_enable_iface(iface);
4589 }
4590 
4591 
4592 #ifdef CONFIG_IEEE80211AX
4593 
4594 void hostapd_cleanup_cca_params(struct hostapd_data *hapd)
4595 {
4596 	hapd->cca_count = 0;
4597 	hapd->cca_color = 0;
4598 	hapd->cca_c_off_beacon = 0;
4599 	hapd->cca_c_off_proberesp = 0;
4600 	hapd->cca_in_progress = false;
4601 }
4602 
4603 
4604 int hostapd_fill_cca_settings(struct hostapd_data *hapd,
4605 			      struct cca_settings *settings)
4606 {
4607 	struct hostapd_iface *iface = hapd->iface;
4608 	u8 old_color;
4609 	int ret;
4610 
4611 	if (!iface || iface->conf->he_op.he_bss_color_disabled)
4612 		return -1;
4613 
4614 	settings->link_id = -1;
4615 #ifdef CONFIG_IEEE80211BE
4616 	if (hapd->conf->mld_ap)
4617 		settings->link_id = hapd->mld_link_id;
4618 #endif /* CONFIG_IEEE80211BE */
4619 
4620 	old_color = iface->conf->he_op.he_bss_color;
4621 	iface->conf->he_op.he_bss_color = hapd->cca_color;
4622 	ret = hostapd_build_beacon_data(hapd, &settings->beacon_after);
4623 	if (ret)
4624 		return ret;
4625 
4626 	iface->conf->he_op.he_bss_color = old_color;
4627 
4628 	settings->cca_count = hapd->cca_count;
4629 	settings->cca_color = hapd->cca_color,
4630 	hapd->cca_in_progress = true;
4631 
4632 	ret = hostapd_build_beacon_data(hapd, &settings->beacon_cca);
4633 	if (ret) {
4634 		free_beacon_data(&settings->beacon_after);
4635 		return ret;
4636 	}
4637 
4638 	settings->ubpr.unsol_bcast_probe_resp_tmpl =
4639 		hostapd_unsol_bcast_probe_resp(hapd, &settings->ubpr);
4640 
4641 	settings->counter_offset_beacon = hapd->cca_c_off_beacon;
4642 	settings->counter_offset_presp = hapd->cca_c_off_proberesp;
4643 
4644 	return 0;
4645 }
4646 
4647 
4648 static void hostapd_switch_color_timeout_handler(void *eloop_data,
4649 						 void *user_ctx)
4650 {
4651 	struct hostapd_data *hapd = (struct hostapd_data *) eloop_data;
4652 	os_time_t delta_t;
4653 	unsigned int b;
4654 	int i, r;
4655 
4656 	 /* CCA can be triggered once the handler constantly receives
4657 	  * color collision events to for at least
4658 	  * DOT11BSS_COLOR_COLLISION_AP_PERIOD (50 s by default). */
4659 	delta_t = hapd->last_color_collision.sec -
4660 		hapd->first_color_collision.sec;
4661 	if (delta_t < DOT11BSS_COLOR_COLLISION_AP_PERIOD)
4662 		return;
4663 
4664 	r = os_random() % HE_OPERATION_BSS_COLOR_MAX;
4665 	for (i = 0; i < HE_OPERATION_BSS_COLOR_MAX; i++) {
4666 		if (r && !(hapd->color_collision_bitmap & (1ULL << r)))
4667 			break;
4668 
4669 		r = (r + 1) % HE_OPERATION_BSS_COLOR_MAX;
4670 	}
4671 
4672 	if (i == HE_OPERATION_BSS_COLOR_MAX) {
4673 		/* There are no free colors so turn BSS coloring off */
4674 		wpa_printf(MSG_INFO,
4675 			   "No free colors left, turning off BSS coloring");
4676 		hapd->iface->conf->he_op.he_bss_color_disabled = 1;
4677 		hapd->iface->conf->he_op.he_bss_color = os_random() % 63 + 1;
4678 		for (b = 0; b < hapd->iface->num_bss; b++)
4679 			ieee802_11_set_beacon(hapd->iface->bss[b]);
4680 		return;
4681 	}
4682 
4683 	for (b = 0; b < hapd->iface->num_bss; b++) {
4684 		struct hostapd_data *bss = hapd->iface->bss[b];
4685 		struct cca_settings settings;
4686 		int ret;
4687 
4688 		hostapd_cleanup_cca_params(bss);
4689 		bss->cca_color = r;
4690 		bss->cca_count = 10;
4691 
4692 		if (hostapd_fill_cca_settings(bss, &settings)) {
4693 			hostapd_cleanup_cca_params(bss);
4694 			continue;
4695 		}
4696 
4697 		ret = hostapd_drv_switch_color(bss, &settings);
4698 		if (ret)
4699 			hostapd_cleanup_cca_params(bss);
4700 
4701 		free_beacon_data(&settings.beacon_cca);
4702 		free_beacon_data(&settings.beacon_after);
4703 		os_free(settings.ubpr.unsol_bcast_probe_resp_tmpl);
4704 	}
4705 }
4706 
4707 
4708 void hostapd_switch_color(struct hostapd_data *hapd, u64 bitmap)
4709 {
4710 	struct os_reltime now;
4711 
4712 	if (hapd->cca_in_progress)
4713 		return;
4714 
4715 	if (os_get_reltime(&now))
4716 		return;
4717 
4718 	hapd->color_collision_bitmap = bitmap;
4719 	hapd->last_color_collision = now;
4720 
4721 	if (eloop_is_timeout_registered(hostapd_switch_color_timeout_handler,
4722 					hapd, NULL))
4723 		return;
4724 
4725 	hapd->first_color_collision = now;
4726 	/* 10 s window as margin for persistent color collision reporting */
4727 	eloop_register_timeout(DOT11BSS_COLOR_COLLISION_AP_PERIOD + 10, 0,
4728 			       hostapd_switch_color_timeout_handler,
4729 			       hapd, NULL);
4730 }
4731 
4732 #endif /* CONFIG_IEEE80211AX */
4733 
4734 #endif /* NEED_AP_MLME */
4735 
4736 
4737 struct hostapd_data * hostapd_get_iface(struct hapd_interfaces *interfaces,
4738 					const char *ifname)
4739 {
4740 	size_t i, j;
4741 
4742 	for (i = 0; i < interfaces->count; i++) {
4743 		struct hostapd_iface *iface = interfaces->iface[i];
4744 
4745 		for (j = 0; j < iface->num_bss; j++) {
4746 			struct hostapd_data *hapd = iface->bss[j];
4747 
4748 			if (os_strcmp(ifname, hapd->conf->iface) == 0)
4749 				return hapd;
4750 		}
4751 	}
4752 
4753 	return NULL;
4754 }
4755 
4756 
4757 void hostapd_periodic_iface(struct hostapd_iface *iface)
4758 {
4759 	size_t i;
4760 
4761 	ap_list_timer(iface);
4762 
4763 	for (i = 0; i < iface->num_bss; i++) {
4764 		struct hostapd_data *hapd = iface->bss[i];
4765 
4766 		if (!hapd->started)
4767 			continue;
4768 
4769 #ifndef CONFIG_NO_RADIUS
4770 		hostapd_acl_expire(hapd);
4771 #endif /* CONFIG_NO_RADIUS */
4772 	}
4773 }
4774 
4775 
4776 #ifdef CONFIG_OCV
4777 void hostapd_ocv_check_csa_sa_query(void *eloop_ctx, void *timeout_ctx)
4778 {
4779 	struct hostapd_data *hapd = eloop_ctx;
4780 	struct sta_info *sta;
4781 
4782 	wpa_printf(MSG_DEBUG, "OCV: Post-CSA SA Query initiation check");
4783 
4784 	for (sta = hapd->sta_list; sta; sta = sta->next) {
4785 		if (!sta->post_csa_sa_query)
4786 			continue;
4787 
4788 		wpa_printf(MSG_DEBUG, "OCV: OCVC STA " MACSTR
4789 			   " did not start SA Query after CSA - disconnect",
4790 			   MAC2STR(sta->addr));
4791 		ap_sta_disconnect(hapd, sta, sta->addr,
4792 				  WLAN_REASON_PREV_AUTH_NOT_VALID);
4793 	}
4794 }
4795 #endif /* CONFIG_OCV */
4796 
4797 
4798 #ifdef CONFIG_IEEE80211BE
4799 
4800 struct hostapd_data * hostapd_mld_get_link_bss(struct hostapd_data *hapd,
4801 					       u8 link_id)
4802 {
4803 	struct hostapd_iface *iface;
4804 	struct hostapd_data *bss;
4805 	unsigned int i, j;
4806 
4807 	for (i = 0; i < hapd->iface->interfaces->count; i++) {
4808 		iface = hapd->iface->interfaces->iface[i];
4809 		if (!iface)
4810 			continue;
4811 
4812 		for (j = 0; j < iface->num_bss; j++) {
4813 			bss = iface->bss[j];
4814 
4815 			if (!bss->conf->mld_ap ||
4816 			    !hostapd_is_ml_partner(hapd, bss))
4817 				continue;
4818 
4819 			if (!bss->drv_priv)
4820 				continue;
4821 
4822 			if (bss->mld_link_id == link_id)
4823 				return bss;
4824 		}
4825 	}
4826 
4827 	return NULL;
4828 }
4829 
4830 
4831 bool hostapd_is_ml_partner(struct hostapd_data *hapd1,
4832 			   struct hostapd_data *hapd2)
4833 {
4834 	if (!hapd1->conf->mld_ap || !hapd2->conf->mld_ap)
4835 		return false;
4836 
4837 	return !os_strcmp(hapd1->conf->iface, hapd2->conf->iface);
4838 }
4839 
4840 
4841 u8 hostapd_get_mld_id(struct hostapd_data *hapd)
4842 {
4843 	if (!hapd->conf->mld_ap)
4844 		return 255;
4845 
4846 	/* MLD ID 0 represents self */
4847 	return 0;
4848 
4849 	/* TODO: MLD ID for Multiple BSS cases */
4850 }
4851 
4852 
4853 int hostapd_mld_add_link(struct hostapd_data *hapd)
4854 {
4855 	struct hostapd_mld *mld = hapd->mld;
4856 
4857 	if (!hapd->conf->mld_ap)
4858 		return 0;
4859 
4860 	/* Should not happen */
4861 	if (!mld)
4862 		return -1;
4863 
4864 	dl_list_add_tail(&mld->links, &hapd->link);
4865 	mld->num_links++;
4866 
4867 	wpa_printf(MSG_DEBUG, "AP MLD %s: Link ID %d added. num_links: %d",
4868 		   mld->name, hapd->mld_link_id, mld->num_links);
4869 
4870 	if (mld->fbss)
4871 		return 0;
4872 
4873 	mld->fbss = hapd;
4874 	wpa_printf(MSG_DEBUG, "AP MLD %s: First link BSS set to %p",
4875 		   mld->name, mld->fbss);
4876 	return 0;
4877 }
4878 
4879 
4880 int hostapd_mld_remove_link(struct hostapd_data *hapd)
4881 {
4882 	struct hostapd_mld *mld = hapd->mld;
4883 	struct hostapd_data *next_fbss;
4884 
4885 	if (!hapd->conf->mld_ap)
4886 		return 0;
4887 
4888 	/* Should not happen */
4889 	if (!mld)
4890 		return -1;
4891 
4892 	dl_list_del(&hapd->link);
4893 	mld->num_links--;
4894 
4895 	wpa_printf(MSG_DEBUG, "AP MLD %s: Link ID %d removed. num_links: %d",
4896 		   mld->name, hapd->mld_link_id, mld->num_links);
4897 
4898 	if (mld->fbss != hapd)
4899 		return 0;
4900 
4901 	/* If the list is empty, all links are removed */
4902 	if (dl_list_empty(&mld->links)) {
4903 		mld->fbss = NULL;
4904 	} else {
4905 		next_fbss = dl_list_entry(mld->links.next, struct hostapd_data,
4906 					  link);
4907 		mld->fbss = next_fbss;
4908 	}
4909 
4910 	wpa_printf(MSG_DEBUG, "AP MLD %s: First link BSS set to %p",
4911 		   mld->name, mld->fbss);
4912 	return 0;
4913 }
4914 
4915 
4916 bool hostapd_mld_is_first_bss(struct hostapd_data *hapd)
4917 {
4918 	struct hostapd_mld *mld = hapd->mld;
4919 
4920 	if (!hapd->conf->mld_ap)
4921 		return true;
4922 
4923 	/* Should not happen */
4924 	if (!mld)
4925 		return false;
4926 
4927 	/* If fbss is not set, it is safe to assume the caller is the first BSS.
4928 	 */
4929 	if (!mld->fbss)
4930 		return true;
4931 
4932 	return hapd == mld->fbss;
4933 }
4934 
4935 
4936 struct hostapd_data * hostapd_mld_get_first_bss(struct hostapd_data *hapd)
4937 {
4938 	struct hostapd_mld *mld = hapd->mld;
4939 
4940 	if (!hapd->conf->mld_ap)
4941 		return NULL;
4942 
4943 	/* Should not happen */
4944 	if (!mld)
4945 		return NULL;
4946 
4947 	return mld->fbss;
4948 }
4949 
4950 #endif /* CONFIG_IEEE80211BE */
4951 
4952 
4953 u16 hostapd_get_punct_bitmap(struct hostapd_data *hapd)
4954 {
4955 	u16 punct_bitmap = 0;
4956 
4957 #ifdef CONFIG_IEEE80211BE
4958 	punct_bitmap = hapd->iconf->punct_bitmap;
4959 #ifdef CONFIG_TESTING_OPTIONS
4960 	if (!punct_bitmap)
4961 		punct_bitmap = hapd->conf->eht_oper_puncturing_override;
4962 #endif /* CONFIG_TESTING_OPTIONS */
4963 #endif /* CONFIG_IEEE80211BE */
4964 
4965 	return punct_bitmap;
4966 }
4967