rrm.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654
  1. /*
  2. * hostapd / Radio Measurement (RRM)
  3. * Copyright(c) 2013 - 2016 Intel Mobile Communications GmbH.
  4. * Copyright(c) 2011 - 2016 Intel Corporation. All rights reserved.
  5. * Copyright (c) 2016-2017, Jouni Malinen <j@w1.fi>
  6. *
  7. * This software may be distributed under the terms of the BSD license.
  8. * See README for more details.
  9. */
  10. #include "utils/includes.h"
  11. #include "utils/common.h"
  12. #include "common/wpa_ctrl.h"
  13. #include "hostapd.h"
  14. #include "ap_drv_ops.h"
  15. #include "sta_info.h"
  16. #include "eloop.h"
  17. #include "neighbor_db.h"
  18. #include "rrm.h"
  19. #define HOSTAPD_RRM_REQUEST_TIMEOUT 5
  20. static void hostapd_lci_rep_timeout_handler(void *eloop_data, void *user_ctx)
  21. {
  22. struct hostapd_data *hapd = eloop_data;
  23. wpa_printf(MSG_DEBUG, "RRM: LCI request (token %u) timed out",
  24. hapd->lci_req_token);
  25. hapd->lci_req_active = 0;
  26. }
  27. static void hostapd_handle_lci_report(struct hostapd_data *hapd, u8 token,
  28. const u8 *pos, size_t len)
  29. {
  30. if (!hapd->lci_req_active || hapd->lci_req_token != token) {
  31. wpa_printf(MSG_DEBUG, "Unexpected LCI report, token %u", token);
  32. return;
  33. }
  34. hapd->lci_req_active = 0;
  35. eloop_cancel_timeout(hostapd_lci_rep_timeout_handler, hapd, NULL);
  36. wpa_printf(MSG_DEBUG, "LCI report token %u len %zu", token, len);
  37. }
  38. static void hostapd_range_rep_timeout_handler(void *eloop_data, void *user_ctx)
  39. {
  40. struct hostapd_data *hapd = eloop_data;
  41. wpa_printf(MSG_DEBUG, "RRM: Range request (token %u) timed out",
  42. hapd->range_req_token);
  43. hapd->range_req_active = 0;
  44. }
  45. static void hostapd_handle_range_report(struct hostapd_data *hapd, u8 token,
  46. const u8 *pos, size_t len)
  47. {
  48. if (!hapd->range_req_active || hapd->range_req_token != token) {
  49. wpa_printf(MSG_DEBUG, "Unexpected range report, token %u",
  50. token);
  51. return;
  52. }
  53. hapd->range_req_active = 0;
  54. eloop_cancel_timeout(hostapd_range_rep_timeout_handler, hapd, NULL);
  55. wpa_printf(MSG_DEBUG, "Range report token %u len %zu", token, len);
  56. }
  57. static void hostapd_handle_radio_msmt_report(struct hostapd_data *hapd,
  58. const u8 *buf, size_t len)
  59. {
  60. const struct ieee80211_mgmt *mgmt = (const struct ieee80211_mgmt *) buf;
  61. const u8 *pos, *ie, *end;
  62. u8 token;
  63. end = buf + len;
  64. token = mgmt->u.action.u.rrm.dialog_token;
  65. pos = mgmt->u.action.u.rrm.variable;
  66. while ((ie = get_ie(pos, end - pos, WLAN_EID_MEASURE_REPORT))) {
  67. if (ie[1] < 5) {
  68. wpa_printf(MSG_DEBUG, "Bad Measurement Report element");
  69. break;
  70. }
  71. wpa_printf(MSG_DEBUG, "Measurement report type %u", ie[4]);
  72. switch (ie[4]) {
  73. case MEASURE_TYPE_LCI:
  74. hostapd_handle_lci_report(hapd, token, ie + 2, ie[1]);
  75. break;
  76. case MEASURE_TYPE_FTM_RANGE:
  77. hostapd_handle_range_report(hapd, token, ie + 2, ie[1]);
  78. break;
  79. default:
  80. wpa_printf(MSG_DEBUG,
  81. "Measurement report type %u is not supported",
  82. ie[4]);
  83. break;
  84. }
  85. pos = ie + ie[1] + 2;
  86. }
  87. }
  88. static u16 hostapd_parse_location_lci_req_age(const u8 *buf, size_t len)
  89. {
  90. const u8 *subelem;
  91. /* Range Request element + Location Subject + Maximum Age subelement */
  92. if (len < 3 + 1 + 4)
  93. return 0;
  94. /* Subelements are arranged as IEs */
  95. subelem = get_ie(buf + 4, len - 4, LCI_REQ_SUBELEM_MAX_AGE);
  96. if (subelem && subelem[1] == 2)
  97. return *(u16 *) (subelem + 2);
  98. return 0;
  99. }
  100. static int hostapd_check_lci_age(struct hostapd_neighbor_entry *nr, u16 max_age)
  101. {
  102. struct os_time curr, diff;
  103. unsigned long diff_l;
  104. if (nr->stationary || max_age == 0xffff)
  105. return 1;
  106. if (!max_age)
  107. return 0;
  108. if (os_get_time(&curr))
  109. return 0;
  110. os_time_sub(&curr, &nr->lci_date, &diff);
  111. /* avoid overflow */
  112. if (diff.sec > 0xffff)
  113. return 0;
  114. /* LCI age is calculated in 10th of a second units. */
  115. diff_l = diff.sec * 10 + diff.usec / 100000;
  116. return max_age > diff_l;
  117. }
  118. static size_t hostapd_neighbor_report_len(struct wpabuf *buf,
  119. struct hostapd_neighbor_entry *nr,
  120. int send_lci, int send_civic)
  121. {
  122. size_t len = 2 + wpabuf_len(nr->nr);
  123. if (send_lci && nr->lci)
  124. len += 2 + wpabuf_len(nr->lci);
  125. if (send_civic && nr->civic)
  126. len += 2 + wpabuf_len(nr->civic);
  127. return len;
  128. }
  129. static void hostapd_send_nei_report_resp(struct hostapd_data *hapd,
  130. const u8 *addr, u8 dialog_token,
  131. struct wpa_ssid_value *ssid, u8 lci,
  132. u8 civic, u16 lci_max_age)
  133. {
  134. struct hostapd_neighbor_entry *nr;
  135. struct wpabuf *buf;
  136. u8 *msmt_token;
  137. /*
  138. * The number and length of the Neighbor Report elements in a Neighbor
  139. * Report frame is limited by the maximum allowed MMPDU size; + 3 bytes
  140. * of RRM header.
  141. */
  142. buf = wpabuf_alloc(3 + IEEE80211_MAX_MMPDU_SIZE);
  143. if (!buf)
  144. return;
  145. wpabuf_put_u8(buf, WLAN_ACTION_RADIO_MEASUREMENT);
  146. wpabuf_put_u8(buf, WLAN_RRM_NEIGHBOR_REPORT_RESPONSE);
  147. wpabuf_put_u8(buf, dialog_token);
  148. dl_list_for_each(nr, &hapd->nr_db, struct hostapd_neighbor_entry,
  149. list) {
  150. int send_lci;
  151. size_t len;
  152. if (ssid->ssid_len != nr->ssid.ssid_len ||
  153. os_memcmp(ssid->ssid, nr->ssid.ssid, ssid->ssid_len) != 0)
  154. continue;
  155. send_lci = (lci != 0) && hostapd_check_lci_age(nr, lci_max_age);
  156. len = hostapd_neighbor_report_len(buf, nr, send_lci, civic);
  157. if (len - 2 > 0xff) {
  158. wpa_printf(MSG_DEBUG,
  159. "NR entry for " MACSTR " exceeds 0xFF bytes",
  160. MAC2STR(nr->bssid));
  161. continue;
  162. }
  163. if (len > wpabuf_tailroom(buf))
  164. break;
  165. wpabuf_put_u8(buf, WLAN_EID_NEIGHBOR_REPORT);
  166. wpabuf_put_u8(buf, len - 2);
  167. wpabuf_put_buf(buf, nr->nr);
  168. if (send_lci && nr->lci) {
  169. wpabuf_put_u8(buf, WLAN_EID_MEASURE_REPORT);
  170. wpabuf_put_u8(buf, wpabuf_len(nr->lci));
  171. /*
  172. * Override measurement token - the first byte of the
  173. * Measurement Report element.
  174. */
  175. msmt_token = wpabuf_put(buf, 0);
  176. wpabuf_put_buf(buf, nr->lci);
  177. *msmt_token = lci;
  178. }
  179. if (civic && nr->civic) {
  180. wpabuf_put_u8(buf, WLAN_EID_MEASURE_REPORT);
  181. wpabuf_put_u8(buf, wpabuf_len(nr->civic));
  182. /*
  183. * Override measurement token - the first byte of the
  184. * Measurement Report element.
  185. */
  186. msmt_token = wpabuf_put(buf, 0);
  187. wpabuf_put_buf(buf, nr->civic);
  188. *msmt_token = civic;
  189. }
  190. }
  191. hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
  192. wpabuf_head(buf), wpabuf_len(buf));
  193. wpabuf_free(buf);
  194. }
  195. static void hostapd_handle_nei_report_req(struct hostapd_data *hapd,
  196. const u8 *buf, size_t len)
  197. {
  198. const struct ieee80211_mgmt *mgmt = (const struct ieee80211_mgmt *) buf;
  199. const u8 *pos, *ie, *end;
  200. struct wpa_ssid_value ssid = {
  201. .ssid_len = 0
  202. };
  203. u8 token;
  204. u8 lci = 0, civic = 0; /* Measurement tokens */
  205. u16 lci_max_age = 0;
  206. if (!(hapd->conf->radio_measurements[0] &
  207. WLAN_RRM_CAPS_NEIGHBOR_REPORT))
  208. return;
  209. end = buf + len;
  210. token = mgmt->u.action.u.rrm.dialog_token;
  211. pos = mgmt->u.action.u.rrm.variable;
  212. len = end - pos;
  213. ie = get_ie(pos, len, WLAN_EID_SSID);
  214. if (ie && ie[1] && ie[1] <= SSID_MAX_LEN) {
  215. ssid.ssid_len = ie[1];
  216. os_memcpy(ssid.ssid, ie + 2, ssid.ssid_len);
  217. } else {
  218. ssid.ssid_len = hapd->conf->ssid.ssid_len;
  219. os_memcpy(ssid.ssid, hapd->conf->ssid.ssid, ssid.ssid_len);
  220. }
  221. while ((ie = get_ie(pos, len, WLAN_EID_MEASURE_REQUEST))) {
  222. if (ie[1] < 3)
  223. break;
  224. wpa_printf(MSG_DEBUG,
  225. "Neighbor report request, measure type %u",
  226. ie[4]);
  227. switch (ie[4]) { /* Measurement Type */
  228. case MEASURE_TYPE_LCI:
  229. lci = ie[2]; /* Measurement Token */
  230. lci_max_age = hostapd_parse_location_lci_req_age(ie + 2,
  231. ie[1]);
  232. break;
  233. case MEASURE_TYPE_LOCATION_CIVIC:
  234. civic = ie[2]; /* Measurement token */
  235. break;
  236. }
  237. pos = ie + ie[1] + 2;
  238. len = end - pos;
  239. }
  240. hostapd_send_nei_report_resp(hapd, mgmt->sa, token, &ssid, lci, civic,
  241. lci_max_age);
  242. }
  243. void hostapd_handle_radio_measurement(struct hostapd_data *hapd,
  244. const u8 *buf, size_t len)
  245. {
  246. const struct ieee80211_mgmt *mgmt = (const struct ieee80211_mgmt *) buf;
  247. /*
  248. * Check for enough bytes: header + (1B)Category + (1B)Action +
  249. * (1B)Dialog Token.
  250. */
  251. if (len < IEEE80211_HDRLEN + 3)
  252. return;
  253. wpa_printf(MSG_DEBUG, "Radio measurement frame, action %u from " MACSTR,
  254. mgmt->u.action.u.rrm.action, MAC2STR(mgmt->sa));
  255. switch (mgmt->u.action.u.rrm.action) {
  256. case WLAN_RRM_RADIO_MEASUREMENT_REPORT:
  257. hostapd_handle_radio_msmt_report(hapd, buf, len);
  258. break;
  259. case WLAN_RRM_NEIGHBOR_REPORT_REQUEST:
  260. hostapd_handle_nei_report_req(hapd, buf, len);
  261. break;
  262. default:
  263. wpa_printf(MSG_DEBUG, "RRM action %u is not supported",
  264. mgmt->u.action.u.rrm.action);
  265. break;
  266. }
  267. }
  268. int hostapd_send_lci_req(struct hostapd_data *hapd, const u8 *addr)
  269. {
  270. struct wpabuf *buf;
  271. struct sta_info *sta = ap_get_sta(hapd, addr);
  272. int ret;
  273. if (!sta) {
  274. wpa_printf(MSG_INFO,
  275. "Request LCI: Destination address is not in station list");
  276. return -1;
  277. }
  278. if (!(sta->flags & WLAN_STA_AUTHORIZED)) {
  279. wpa_printf(MSG_INFO,
  280. "Request LCI: Destination address is not connected");
  281. return -1;
  282. }
  283. if (!(sta->rrm_enabled_capa[1] & WLAN_RRM_CAPS_LCI_MEASUREMENT)) {
  284. wpa_printf(MSG_INFO,
  285. "Request LCI: Station does not support LCI in RRM");
  286. return -1;
  287. }
  288. if (hapd->lci_req_active) {
  289. wpa_printf(MSG_DEBUG,
  290. "Request LCI: LCI request is already in process, overriding");
  291. hapd->lci_req_active = 0;
  292. eloop_cancel_timeout(hostapd_lci_rep_timeout_handler, hapd,
  293. NULL);
  294. }
  295. /* Measurement request (5) + Measurement element with LCI (10) */
  296. buf = wpabuf_alloc(5 + 10);
  297. if (!buf)
  298. return -1;
  299. hapd->lci_req_token++;
  300. /* For wraparounds - the token must be nonzero */
  301. if (!hapd->lci_req_token)
  302. hapd->lci_req_token++;
  303. wpabuf_put_u8(buf, WLAN_ACTION_RADIO_MEASUREMENT);
  304. wpabuf_put_u8(buf, WLAN_RRM_RADIO_MEASUREMENT_REQUEST);
  305. wpabuf_put_u8(buf, hapd->lci_req_token);
  306. wpabuf_put_le16(buf, 0); /* Number of repetitions */
  307. wpabuf_put_u8(buf, WLAN_EID_MEASURE_REQUEST);
  308. wpabuf_put_u8(buf, 3 + 1 + 4);
  309. wpabuf_put_u8(buf, 1); /* Measurement Token */
  310. /*
  311. * Parallel and Enable bits are 0, Duration, Request, and Report are
  312. * reserved.
  313. */
  314. wpabuf_put_u8(buf, 0);
  315. wpabuf_put_u8(buf, MEASURE_TYPE_LCI);
  316. wpabuf_put_u8(buf, LOCATION_SUBJECT_REMOTE);
  317. wpabuf_put_u8(buf, LCI_REQ_SUBELEM_MAX_AGE);
  318. wpabuf_put_u8(buf, 2);
  319. wpabuf_put_le16(buf, 0xffff);
  320. ret = hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
  321. wpabuf_head(buf), wpabuf_len(buf));
  322. wpabuf_free(buf);
  323. if (ret)
  324. return ret;
  325. hapd->lci_req_active = 1;
  326. eloop_register_timeout(HOSTAPD_RRM_REQUEST_TIMEOUT, 0,
  327. hostapd_lci_rep_timeout_handler, hapd, NULL);
  328. return 0;
  329. }
  330. int hostapd_send_range_req(struct hostapd_data *hapd, const u8 *addr,
  331. u16 random_interval, u8 min_ap,
  332. const u8 *responders, unsigned int n_responders)
  333. {
  334. struct wpabuf *buf;
  335. struct sta_info *sta;
  336. u8 *len;
  337. unsigned int i;
  338. int ret;
  339. wpa_printf(MSG_DEBUG, "Request range: dest addr " MACSTR
  340. " rand interval %u min AP %u n_responders %u", MAC2STR(addr),
  341. random_interval, min_ap, n_responders);
  342. if (min_ap == 0 || min_ap > n_responders) {
  343. wpa_printf(MSG_INFO, "Request range: Wrong min AP count");
  344. return -1;
  345. }
  346. sta = ap_get_sta(hapd, addr);
  347. if (!sta || !(sta->flags & WLAN_STA_AUTHORIZED)) {
  348. wpa_printf(MSG_INFO,
  349. "Request range: Destination address is not connected");
  350. return -1;
  351. }
  352. if (!(sta->rrm_enabled_capa[4] & WLAN_RRM_CAPS_FTM_RANGE_REPORT)) {
  353. wpa_printf(MSG_ERROR,
  354. "Request range: Destination station does not support FTM range report in RRM");
  355. return -1;
  356. }
  357. if (hapd->range_req_active) {
  358. wpa_printf(MSG_DEBUG,
  359. "Request range: Range request is already in process; overriding");
  360. hapd->range_req_active = 0;
  361. eloop_register_timeout(HOSTAPD_RRM_REQUEST_TIMEOUT, 0,
  362. hostapd_range_rep_timeout_handler, hapd,
  363. NULL);
  364. }
  365. /* Action + measurement type + token + reps + EID + len = 7 */
  366. buf = wpabuf_alloc(7 + 255);
  367. if (!buf)
  368. return -1;
  369. hapd->range_req_token++;
  370. if (!hapd->range_req_token) /* For wraparounds */
  371. hapd->range_req_token++;
  372. /* IEEE P802.11-REVmc/D5.0, 9.6.7.2 */
  373. wpabuf_put_u8(buf, WLAN_ACTION_RADIO_MEASUREMENT);
  374. wpabuf_put_u8(buf, WLAN_RRM_RADIO_MEASUREMENT_REQUEST);
  375. wpabuf_put_u8(buf, hapd->range_req_token); /* Dialog Token */
  376. wpabuf_put_le16(buf, 0); /* Number of Repetitions */
  377. /* IEEE P802.11-REVmc/D5.0, 9.4.2.21 */
  378. wpabuf_put_u8(buf, WLAN_EID_MEASURE_REQUEST);
  379. len = wpabuf_put(buf, 1); /* Length will be set later */
  380. wpabuf_put_u8(buf, 1); /* Measurement Token */
  381. /*
  382. * Parallel and Enable bits are 0; Duration, Request, and Report are
  383. * reserved.
  384. */
  385. wpabuf_put_u8(buf, 0); /* Measurement Request Mode */
  386. wpabuf_put_u8(buf, MEASURE_TYPE_FTM_RANGE); /* Measurement Type */
  387. /* IEEE P802.11-REVmc/D5.0, 9.4.2.21.19 */
  388. wpabuf_put_le16(buf, random_interval); /* Randomization Interval */
  389. wpabuf_put_u8(buf, min_ap); /* Minimum AP Count */
  390. /* FTM Range Subelements */
  391. /*
  392. * Taking the neighbor report part of the range request from neighbor
  393. * database instead of requesting the separate bits of data from the
  394. * user.
  395. */
  396. for (i = 0; i < n_responders; i++) {
  397. struct hostapd_neighbor_entry *nr;
  398. nr = hostapd_neighbor_get(hapd, responders + ETH_ALEN * i,
  399. NULL);
  400. if (!nr) {
  401. wpa_printf(MSG_INFO, "Missing neighbor report for "
  402. MACSTR, MAC2STR(responders + ETH_ALEN * i));
  403. wpabuf_free(buf);
  404. return -1;
  405. }
  406. if (wpabuf_tailroom(buf) < 2 + wpabuf_len(nr->nr)) {
  407. wpa_printf(MSG_ERROR, "Too long range request");
  408. wpabuf_free(buf);
  409. return -1;
  410. }
  411. wpabuf_put_u8(buf, WLAN_EID_NEIGHBOR_REPORT);
  412. wpabuf_put_u8(buf, wpabuf_len(nr->nr));
  413. wpabuf_put_buf(buf, nr->nr);
  414. }
  415. /* Action + measurement type + token + reps + EID + len = 7 */
  416. *len = wpabuf_len(buf) - 7;
  417. ret = hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
  418. wpabuf_head(buf), wpabuf_len(buf));
  419. wpabuf_free(buf);
  420. if (ret)
  421. return ret;
  422. hapd->range_req_active = 1;
  423. eloop_register_timeout(HOSTAPD_RRM_REQUEST_TIMEOUT, 0,
  424. hostapd_range_rep_timeout_handler, hapd, NULL);
  425. return 0;
  426. }
  427. void hostapd_clean_rrm(struct hostapd_data *hapd)
  428. {
  429. hostpad_free_neighbor_db(hapd);
  430. eloop_cancel_timeout(hostapd_lci_rep_timeout_handler, hapd, NULL);
  431. hapd->lci_req_active = 0;
  432. eloop_cancel_timeout(hostapd_range_rep_timeout_handler, hapd, NULL);
  433. hapd->range_req_active = 0;
  434. }
  435. int hostapd_send_beacon_req(struct hostapd_data *hapd, const u8 *addr,
  436. u8 req_mode, const struct wpabuf *req)
  437. {
  438. struct wpabuf *buf;
  439. struct sta_info *sta = ap_get_sta(hapd, addr);
  440. int ret;
  441. enum beacon_report_mode mode;
  442. const u8 *pos;
  443. /* Request data:
  444. * Operating Class (1), Channel Number (1), Randomization Interval (2),
  445. * Measurement Duration (2), Measurement Mode (1), BSSID (6),
  446. * Optional Subelements (variable)
  447. */
  448. if (wpabuf_len(req) < 13) {
  449. wpa_printf(MSG_INFO, "Beacon request: Too short request data");
  450. return -1;
  451. }
  452. pos = wpabuf_head(req);
  453. mode = pos[6];
  454. if (!sta || !(sta->flags & WLAN_STA_AUTHORIZED)) {
  455. wpa_printf(MSG_INFO,
  456. "Beacon request: " MACSTR " is not connected",
  457. MAC2STR(addr));
  458. return -1;
  459. }
  460. switch (mode) {
  461. case BEACON_REPORT_MODE_PASSIVE:
  462. if (!(sta->rrm_enabled_capa[0] &
  463. WLAN_RRM_CAPS_BEACON_REPORT_PASSIVE)) {
  464. wpa_printf(MSG_INFO,
  465. "Beacon request: " MACSTR
  466. " does not support passive beacon report",
  467. MAC2STR(addr));
  468. return -1;
  469. }
  470. break;
  471. case BEACON_REPORT_MODE_ACTIVE:
  472. if (!(sta->rrm_enabled_capa[0] &
  473. WLAN_RRM_CAPS_BEACON_REPORT_ACTIVE)) {
  474. wpa_printf(MSG_INFO,
  475. "Beacon request: " MACSTR
  476. " does not support active beacon report",
  477. MAC2STR(addr));
  478. return -1;
  479. }
  480. break;
  481. case BEACON_REPORT_MODE_TABLE:
  482. if (!(sta->rrm_enabled_capa[0] &
  483. WLAN_RRM_CAPS_BEACON_REPORT_TABLE)) {
  484. wpa_printf(MSG_INFO,
  485. "Beacon request: " MACSTR
  486. " does not support table beacon report",
  487. MAC2STR(addr));
  488. return -1;
  489. }
  490. break;
  491. default:
  492. wpa_printf(MSG_INFO,
  493. "Beacon request: Unknown measurement mode %d", mode);
  494. return -1;
  495. }
  496. buf = wpabuf_alloc(5 + 2 + 3 + wpabuf_len(req));
  497. if (!buf)
  498. return -1;
  499. hapd->beacon_req_token++;
  500. if (!hapd->beacon_req_token)
  501. hapd->beacon_req_token++;
  502. wpabuf_put_u8(buf, WLAN_ACTION_RADIO_MEASUREMENT);
  503. wpabuf_put_u8(buf, WLAN_RRM_RADIO_MEASUREMENT_REQUEST);
  504. wpabuf_put_u8(buf, hapd->beacon_req_token);
  505. wpabuf_put_le16(buf, 0); /* Number of repetitions */
  506. /* Measurement Request element */
  507. wpabuf_put_u8(buf, WLAN_EID_MEASURE_REQUEST);
  508. wpabuf_put_u8(buf, 3 + wpabuf_len(req));
  509. wpabuf_put_u8(buf, 1); /* Measurement Token */
  510. wpabuf_put_u8(buf, req_mode); /* Measurement Request Mode */
  511. wpabuf_put_u8(buf, MEASURE_TYPE_BEACON); /* Measurement Type */
  512. wpabuf_put_buf(buf, req);
  513. ret = hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
  514. wpabuf_head(buf), wpabuf_len(buf));
  515. wpabuf_free(buf);
  516. if (ret < 0)
  517. return ret;
  518. return hapd->beacon_req_token;
  519. }
  520. void hostapd_rrm_beacon_req_tx_status(struct hostapd_data *hapd,
  521. const struct ieee80211_mgmt *mgmt,
  522. size_t len, int ok)
  523. {
  524. if (len < 24 + 3)
  525. return;
  526. wpa_msg(hapd->msg_ctx, MSG_INFO, BEACON_REQ_TX_STATUS MACSTR
  527. " %u ack=%d", MAC2STR(mgmt->da),
  528. mgmt->u.action.u.rrm.dialog_token, ok);
  529. }