P2P: Fix Group ID in Invitation Request from active GO
[libeap.git] / wpa_supplicant / ap.c
1 /*
2  * WPA Supplicant - Basic AP mode support routines
3  * Copyright (c) 2003-2009, Jouni Malinen <j@w1.fi>
4  * Copyright (c) 2009, Atheros Communications
5  *
6  * This program is free software; you can redistribute it and/or modify
7  * it under the terms of the GNU General Public License version 2 as
8  * published by the Free Software Foundation.
9  *
10  * Alternatively, this software may be distributed under the terms of BSD
11  * license.
12  *
13  * See README and COPYING for more details.
14  */
15
16 #include "utils/includes.h"
17
18 #include "utils/common.h"
19 #include "common/ieee802_11_defs.h"
20 #include "ap/hostapd.h"
21 #include "ap/ap_config.h"
22 #ifdef NEED_AP_MLME
23 #include "ap/ieee802_11.h"
24 #endif /* NEED_AP_MLME */
25 #include "ap/beacon.h"
26 #include "ap/ieee802_1x.h"
27 #include "ap/wps_hostapd.h"
28 #include "ap/ctrl_iface_ap.h"
29 #include "eap_common/eap_defs.h"
30 #include "eap_server/eap_methods.h"
31 #include "eap_common/eap_wsc_common.h"
32 #include "wps/wps.h"
33 #include "common/ieee802_11_defs.h"
34 #include "config_ssid.h"
35 #include "config.h"
36 #include "wpa_supplicant_i.h"
37 #include "driver_i.h"
38 #include "p2p_supplicant.h"
39 #include "ap.h"
40
41
42 static int wpa_supplicant_conf_ap(struct wpa_supplicant *wpa_s,
43                                   struct wpa_ssid *ssid,
44                                   struct hostapd_config *conf)
45 {
46         struct hostapd_bss_config *bss = &conf->bss[0];
47         int pairwise;
48
49         conf->driver = wpa_s->driver;
50
51         os_strlcpy(bss->iface, wpa_s->ifname, sizeof(bss->iface));
52
53         if (ssid->frequency == 0) {
54                 /* default channel 11 */
55                 conf->hw_mode = HOSTAPD_MODE_IEEE80211G;
56                 conf->channel = 11;
57         } else if (ssid->frequency >= 2412 && ssid->frequency <= 2472) {
58                 conf->hw_mode = HOSTAPD_MODE_IEEE80211G;
59                 conf->channel = (ssid->frequency - 2407) / 5;
60         } else if ((ssid->frequency >= 5180 && ssid->frequency <= 5240) ||
61                    (ssid->frequency >= 5745 && ssid->frequency <= 5825)) {
62                 conf->hw_mode = HOSTAPD_MODE_IEEE80211A;
63                 conf->channel = (ssid->frequency - 5000) / 5;
64         } else {
65                 wpa_printf(MSG_ERROR, "Unsupported AP mode frequency: %d MHz",
66                            ssid->frequency);
67                 return -1;
68         }
69
70         /* TODO: enable HT if driver supports it;
71          * drop to 11b if driver does not support 11g */
72
73 #ifdef CONFIG_P2P
74         if (conf->hw_mode == HOSTAPD_MODE_IEEE80211G) {
75                 /* Remove 802.11b rates from supported and basic rate sets */
76                 int *list = os_malloc(4 * sizeof(int));
77                 if (list) {
78                         list[0] = 60;
79                         list[1] = 120;
80                         list[2] = 240;
81                         list[3] = -1;
82                 }
83                 conf->basic_rates = list;
84
85                 list = os_malloc(9 * sizeof(int));
86                 if (list) {
87                         list[0] = 60;
88                         list[1] = 90;
89                         list[2] = 120;
90                         list[3] = 180;
91                         list[4] = 240;
92                         list[5] = 360;
93                         list[6] = 480;
94                         list[7] = 540;
95                         list[8] = -1;
96                 }
97                 conf->supported_rates = list;
98         }
99 #endif /* CONFIG_P2P */
100
101         if (ssid->ssid_len == 0) {
102                 wpa_printf(MSG_ERROR, "No SSID configured for AP mode");
103                 return -1;
104         }
105         os_memcpy(bss->ssid.ssid, ssid->ssid, ssid->ssid_len);
106         bss->ssid.ssid[ssid->ssid_len] = '\0';
107         bss->ssid.ssid_len = ssid->ssid_len;
108         bss->ssid.ssid_set = 1;
109
110         if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt))
111                 bss->wpa = ssid->proto;
112         bss->wpa_key_mgmt = ssid->key_mgmt;
113         bss->wpa_pairwise = ssid->pairwise_cipher;
114         if (ssid->passphrase) {
115                 bss->ssid.wpa_passphrase = os_strdup(ssid->passphrase);
116         } else if (ssid->psk_set) {
117                 os_free(bss->ssid.wpa_psk);
118                 bss->ssid.wpa_psk = os_zalloc(sizeof(struct hostapd_wpa_psk));
119                 if (bss->ssid.wpa_psk == NULL)
120                         return -1;
121                 os_memcpy(bss->ssid.wpa_psk->psk, ssid->psk, PMK_LEN);
122                 bss->ssid.wpa_psk->group = 1;
123         }
124
125         /* Select group cipher based on the enabled pairwise cipher suites */
126         pairwise = 0;
127         if (bss->wpa & 1)
128                 pairwise |= bss->wpa_pairwise;
129         if (bss->wpa & 2) {
130                 if (bss->rsn_pairwise == 0)
131                         bss->rsn_pairwise = bss->wpa_pairwise;
132                 pairwise |= bss->rsn_pairwise;
133         }
134         if (pairwise & WPA_CIPHER_TKIP)
135                 bss->wpa_group = WPA_CIPHER_TKIP;
136         else
137                 bss->wpa_group = WPA_CIPHER_CCMP;
138
139         if (bss->wpa && bss->ieee802_1x)
140                 bss->ssid.security_policy = SECURITY_WPA;
141         else if (bss->wpa)
142                 bss->ssid.security_policy = SECURITY_WPA_PSK;
143         else if (bss->ieee802_1x) {
144                 bss->ssid.security_policy = SECURITY_IEEE_802_1X;
145                 bss->ssid.wep.default_len = bss->default_wep_key_len;
146         } else if (bss->ssid.wep.keys_set)
147                 bss->ssid.security_policy = SECURITY_STATIC_WEP;
148         else
149                 bss->ssid.security_policy = SECURITY_PLAINTEXT;
150
151 #ifdef CONFIG_WPS
152         /*
153          * Enable WPS by default, but require user interaction to actually use
154          * it. Only the internal Registrar is supported.
155          */
156         bss->eap_server = 1;
157         bss->wps_state = 2;
158         bss->ap_setup_locked = 1;
159         if (wpa_s->conf->config_methods)
160                 bss->config_methods = os_strdup(wpa_s->conf->config_methods);
161         if (wpa_s->conf->device_type)
162                 bss->device_type = os_strdup(wpa_s->conf->device_type);
163 #endif /* CONFIG_WPS */
164
165 #ifdef CONFIG_P2P
166         if (wpa_s->conf->device_name) {
167                 bss->device_name = os_strdup(wpa_s->conf->device_name);
168                 bss->friendly_name = os_strdup(wpa_s->conf->device_name);
169         }
170 #endif /* CONFIG_P2P */
171
172         return 0;
173 }
174
175
176 static void ap_public_action_rx(void *ctx, const u8 *buf, size_t len, int freq)
177 {
178 #ifdef CONFIG_P2P
179         struct wpa_supplicant *wpa_s = ctx;
180         const struct ieee80211_mgmt *mgmt;
181         size_t hdr_len;
182
183         mgmt = (const struct ieee80211_mgmt *) buf;
184         hdr_len = (const u8 *) &mgmt->u.action.u.vs_public_action.action - buf;
185         if (hdr_len > len)
186                 return;
187         wpas_p2p_rx_action(wpa_s, mgmt->da, mgmt->sa, mgmt->bssid,
188                            mgmt->u.action.category,
189                            &mgmt->u.action.u.vs_public_action.action,
190                            len - hdr_len, freq);
191 #endif /* CONFIG_P2P */
192 }
193
194
195 static int ap_vendor_action_rx(void *ctx, const u8 *buf, size_t len, int freq)
196 {
197 #ifdef CONFIG_P2P
198         struct wpa_supplicant *wpa_s = ctx;
199         const struct ieee80211_mgmt *mgmt;
200         size_t hdr_len;
201
202         mgmt = (const struct ieee80211_mgmt *) buf;
203         hdr_len = (const u8 *) &mgmt->u.action.u.vs_public_action.action - buf;
204         if (hdr_len > len)
205                 return -1;
206         wpas_p2p_rx_action(wpa_s, mgmt->da, mgmt->sa, mgmt->bssid,
207                            mgmt->u.action.category,
208                            &mgmt->u.action.u.vs_public_action.action,
209                            len - hdr_len, freq);
210 #endif /* CONFIG_P2P */
211         return 0;
212 }
213
214
215 static int ap_probe_req_rx(void *ctx, const u8 *addr, const u8 *ie,
216                            size_t ie_len)
217 {
218 #ifdef CONFIG_P2P
219         struct wpa_supplicant *wpa_s = ctx;
220         return wpas_p2p_probe_req_rx(wpa_s, addr, ie, ie_len);
221 #else /* CONFIG_P2P */
222         return 0;
223 #endif /* CONFIG_P2P */
224 }
225
226
227 static void ap_wps_reg_success_cb(void *ctx, const u8 *mac_addr,
228                                   const u8 *uuid_e)
229 {
230 #ifdef CONFIG_P2P
231         struct wpa_supplicant *wpa_s = ctx;
232         wpas_p2p_wps_success(wpa_s, mac_addr, 1);
233 #endif /* CONFIG_P2P */
234 }
235
236
237 int wpa_supplicant_create_ap(struct wpa_supplicant *wpa_s,
238                              struct wpa_ssid *ssid)
239 {
240         struct wpa_driver_associate_params params;
241         struct hostapd_iface *hapd_iface;
242         struct hostapd_config *conf;
243         size_t i;
244
245         if (ssid->ssid == NULL || ssid->ssid_len == 0) {
246                 wpa_printf(MSG_ERROR, "No SSID configured for AP mode");
247                 return -1;
248         }
249
250         wpa_supplicant_ap_deinit(wpa_s);
251
252         wpa_printf(MSG_DEBUG, "Setting up AP (SSID='%s')",
253                    wpa_ssid_txt(ssid->ssid, ssid->ssid_len));
254
255         os_memset(&params, 0, sizeof(params));
256         params.ssid = ssid->ssid;
257         params.ssid_len = ssid->ssid_len;
258         switch (ssid->mode) {
259         case WPAS_MODE_INFRA:
260                 params.mode = IEEE80211_MODE_INFRA;
261                 break;
262         case WPAS_MODE_IBSS:
263                 params.mode = IEEE80211_MODE_IBSS;
264                 break;
265         case WPAS_MODE_AP:
266         case WPAS_MODE_P2P_GO:
267         case WPAS_MODE_P2P_GROUP_FORMATION:
268                 params.mode = IEEE80211_MODE_AP;
269                 break;
270         }
271         params.freq = ssid->frequency;
272
273         if (ssid->key_mgmt & WPA_KEY_MGMT_PSK)
274                 wpa_s->key_mgmt = WPA_KEY_MGMT_PSK;
275         else
276                 wpa_s->key_mgmt = WPA_KEY_MGMT_NONE;
277         params.key_mgmt_suite = key_mgmt2driver(wpa_s->key_mgmt);
278
279         if (ssid->pairwise_cipher & WPA_CIPHER_CCMP)
280                 wpa_s->pairwise_cipher = WPA_CIPHER_CCMP;
281         else if (ssid->pairwise_cipher & WPA_CIPHER_TKIP)
282                 wpa_s->pairwise_cipher = WPA_CIPHER_TKIP;
283         else if (ssid->pairwise_cipher & WPA_CIPHER_NONE)
284                 wpa_s->pairwise_cipher = WPA_CIPHER_NONE;
285         else {
286                 wpa_printf(MSG_WARNING, "WPA: Failed to select pairwise "
287                            "cipher.");
288                 return -1;
289         }
290         params.pairwise_suite = cipher_suite2driver(wpa_s->pairwise_cipher);
291         params.group_suite = params.pairwise_suite;
292
293 #ifdef CONFIG_P2P
294         if (ssid->mode == WPAS_MODE_P2P_GO ||
295             ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION)
296                 params.p2p = 1;
297 #endif /* CONFIG_P2P */
298
299         if (wpa_drv_associate(wpa_s, &params) < 0) {
300                 wpa_msg(wpa_s, MSG_INFO, "Failed to start AP functionality");
301                 return -1;
302         }
303
304         wpa_s->ap_iface = hapd_iface = os_zalloc(sizeof(*wpa_s->ap_iface));
305         if (hapd_iface == NULL)
306                 return -1;
307         hapd_iface->owner = wpa_s;
308
309         wpa_s->ap_iface->conf = conf = hostapd_config_defaults();
310         if (conf == NULL) {
311                 wpa_supplicant_ap_deinit(wpa_s);
312                 return -1;
313         }
314
315         if (wpa_supplicant_conf_ap(wpa_s, ssid, conf)) {
316                 wpa_printf(MSG_ERROR, "Failed to create AP configuration");
317                 wpa_supplicant_ap_deinit(wpa_s);
318                 return -1;
319         }
320
321 #ifdef CONFIG_P2P
322         if (ssid->mode == WPAS_MODE_P2P_GO)
323                 conf->bss[0].p2p = P2P_ENABLED | P2P_GROUP_OWNER;
324         else if (ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION)
325                 conf->bss[0].p2p = P2P_ENABLED | P2P_GROUP_OWNER |
326                         P2P_GROUP_FORMATION;
327 #endif /* CONFIG_P2P */
328
329         hapd_iface->num_bss = conf->num_bss;
330         hapd_iface->bss = os_zalloc(conf->num_bss *
331                                     sizeof(struct hostapd_data *));
332         if (hapd_iface->bss == NULL) {
333                 wpa_supplicant_ap_deinit(wpa_s);
334                 return -1;
335         }
336
337         for (i = 0; i < conf->num_bss; i++) {
338                 hapd_iface->bss[i] =
339                         hostapd_alloc_bss_data(hapd_iface, conf,
340                                                &conf->bss[i]);
341                 if (hapd_iface->bss[i] == NULL) {
342                         wpa_supplicant_ap_deinit(wpa_s);
343                         return -1;
344                 }
345
346                 hapd_iface->bss[i]->msg_ctx = wpa_s;
347                 hapd_iface->bss[i]->public_action_cb = ap_public_action_rx;
348                 hapd_iface->bss[i]->public_action_cb_ctx = wpa_s;
349                 hapd_iface->bss[i]->vendor_action_cb = ap_vendor_action_rx;
350                 hapd_iface->bss[i]->vendor_action_cb_ctx = wpa_s;
351                 hostapd_register_probereq_cb(hapd_iface->bss[i],
352                                              ap_probe_req_rx, wpa_s);
353                 hapd_iface->bss[i]->wps_reg_success_cb = ap_wps_reg_success_cb;
354                 hapd_iface->bss[i]->wps_reg_success_cb_ctx = wpa_s;
355 #ifdef CONFIG_P2P
356                 hapd_iface->bss[i]->p2p = wpa_s->global->p2p;
357                 hapd_iface->bss[i]->p2p_group = wpas_p2p_group_init(
358                         wpa_s, ssid->p2p_persistent_group,
359                         ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION);
360 #endif /* CONFIG_P2P */
361         }
362
363         os_memcpy(hapd_iface->bss[0]->own_addr, wpa_s->own_addr, ETH_ALEN);
364         hapd_iface->bss[0]->driver = wpa_s->driver;
365         hapd_iface->bss[0]->drv_priv = wpa_s->drv_priv;
366
367         if (hostapd_setup_interface(wpa_s->ap_iface)) {
368                 wpa_printf(MSG_ERROR, "Failed to initialize AP interface");
369                 wpa_supplicant_ap_deinit(wpa_s);
370                 return -1;
371         }
372
373         wpa_s->current_ssid = ssid;
374         os_memcpy(wpa_s->bssid, wpa_s->own_addr, ETH_ALEN);
375         wpa_supplicant_set_state(wpa_s, WPA_COMPLETED);
376
377         if (wpa_s->ap_configured_cb)
378                 wpa_s->ap_configured_cb(wpa_s->ap_configured_cb_ctx,
379                                         wpa_s->ap_configured_cb_data);
380
381         return 0;
382 }
383
384
385 void wpa_supplicant_ap_deinit(struct wpa_supplicant *wpa_s)
386 {
387         if (wpa_s->ap_iface == NULL)
388                 return;
389
390         wpa_s->current_ssid = NULL;
391 #ifdef CONFIG_P2P
392         wpa_s->ap_iface->bss[0]->p2p_group = NULL;
393         wpas_p2p_group_deinit(wpa_s);
394 #endif /* CONFIG_P2P */
395         hostapd_interface_deinit(wpa_s->ap_iface);
396         hostapd_interface_free(wpa_s->ap_iface);
397         wpa_s->ap_iface = NULL;
398         wpa_drv_deinit_ap(wpa_s);
399 }
400
401
402 void ap_tx_status(void *ctx, const u8 *addr,
403                   const u8 *buf, size_t len, int ack)
404 {
405 #ifdef NEED_AP_MLME
406         struct wpa_supplicant *wpa_s = ctx;
407         hostapd_tx_status(wpa_s->ap_iface->bss[0], addr, buf, len, ack);
408 #endif /* NEED_AP_MLME */
409 }
410
411
412 void ap_rx_from_unknown_sta(void *ctx, const u8 *frame, size_t len)
413 {
414 #ifdef NEED_AP_MLME
415         struct wpa_supplicant *wpa_s = ctx;
416         const struct ieee80211_hdr *hdr =
417                 (const struct ieee80211_hdr *) frame;
418         u16 fc = le_to_host16(hdr->frame_control);
419         ieee802_11_rx_from_unknown(wpa_s->ap_iface->bss[0], hdr->addr2,
420                                    (fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) ==
421                                    (WLAN_FC_TODS | WLAN_FC_FROMDS));
422 #endif /* NEED_AP_MLME */
423 }
424
425
426 void ap_mgmt_rx(void *ctx, struct rx_mgmt *rx_mgmt)
427 {
428 #ifdef NEED_AP_MLME
429         struct wpa_supplicant *wpa_s = ctx;
430         struct hostapd_frame_info fi;
431         os_memset(&fi, 0, sizeof(fi));
432         fi.datarate = rx_mgmt->datarate;
433         fi.ssi_signal = rx_mgmt->ssi_signal;
434         ieee802_11_mgmt(wpa_s->ap_iface->bss[0], rx_mgmt->frame,
435                         rx_mgmt->frame_len, &fi);
436 #endif /* NEED_AP_MLME */
437 }
438
439
440 void ap_mgmt_tx_cb(void *ctx, const u8 *buf, size_t len, u16 stype, int ok)
441 {
442 #ifdef NEED_AP_MLME
443         struct wpa_supplicant *wpa_s = ctx;
444         ieee802_11_mgmt_cb(wpa_s->ap_iface->bss[0], buf, len, stype, ok);
445 #endif /* NEED_AP_MLME */
446 }
447
448
449 void wpa_supplicant_ap_rx_eapol(struct wpa_supplicant *wpa_s,
450                                 const u8 *src_addr, const u8 *buf, size_t len)
451 {
452         ieee802_1x_receive(wpa_s->ap_iface->bss[0], src_addr, buf, len);
453 }
454
455
456 #ifdef CONFIG_WPS
457
458 int wpa_supplicant_ap_wps_pbc(struct wpa_supplicant *wpa_s, const u8 *bssid)
459 {
460         if (!wpa_s->ap_iface)
461                 return -1;
462         return hostapd_wps_button_pushed(wpa_s->ap_iface->bss[0]);
463 }
464
465
466 int wpa_supplicant_ap_wps_pin(struct wpa_supplicant *wpa_s, const u8 *bssid,
467                               const char *pin, char *buf, size_t buflen)
468 {
469         int ret, ret_len = 0;
470
471         if (!wpa_s->ap_iface)
472                 return -1;
473
474         if (pin == NULL) {
475                 unsigned int rpin = wps_generate_pin();
476                 ret_len = os_snprintf(buf, buflen, "%d", rpin);
477                 pin = buf;
478         }
479
480         ret = hostapd_wps_add_pin(wpa_s->ap_iface->bss[0], bssid, "any", pin,
481                                   0);
482         if (ret)
483                 return -1;
484         return ret_len;
485 }
486
487 #endif /* CONFIG_WPS */
488
489
490 #ifdef CONFIG_CTRL_IFACE
491
492 int ap_ctrl_iface_sta_first(struct wpa_supplicant *wpa_s,
493                             char *buf, size_t buflen)
494 {
495         if (wpa_s->ap_iface == NULL)
496                 return -1;
497         return hostapd_ctrl_iface_sta_first(wpa_s->ap_iface->bss[0],
498                                             buf, buflen);
499 }
500
501
502 int ap_ctrl_iface_sta(struct wpa_supplicant *wpa_s, const char *txtaddr,
503                       char *buf, size_t buflen)
504 {
505         if (wpa_s->ap_iface == NULL)
506                 return -1;
507         return hostapd_ctrl_iface_sta(wpa_s->ap_iface->bss[0], txtaddr,
508                                       buf, buflen);
509 }
510
511
512 int ap_ctrl_iface_sta_next(struct wpa_supplicant *wpa_s, const char *txtaddr,
513                            char *buf, size_t buflen)
514 {
515         if (wpa_s->ap_iface == NULL)
516                 return -1;
517         return hostapd_ctrl_iface_sta_next(wpa_s->ap_iface->bss[0], txtaddr,
518                                            buf, buflen);
519 }
520
521
522 int ap_ctrl_iface_wpa_get_status(struct wpa_supplicant *wpa_s, char *buf,
523                                  size_t buflen, int verbose)
524 {
525         char *pos = buf, *end = buf + buflen;
526         int ret;
527         struct hostapd_bss_config *conf;
528
529         if (wpa_s->ap_iface == NULL)
530                 return -1;
531
532         conf = wpa_s->ap_iface->bss[0]->conf;
533         if (conf->wpa == 0)
534                 return 0;
535
536         ret = os_snprintf(pos, end - pos,
537                           "pairwise_cipher=%s\n"
538                           "group_cipher=%s\n"
539                           "key_mgmt=%s\n",
540                           wpa_cipher_txt(conf->rsn_pairwise),
541                           wpa_cipher_txt(conf->wpa_group),
542                           wpa_key_mgmt_txt(conf->wpa_key_mgmt,
543                                            conf->wpa));
544         if (ret < 0 || ret >= end - pos)
545                 return pos - buf;
546         pos += ret;
547         return pos - buf;
548 }
549
550 #endif /* CONFIG_CTRL_IFACE */
551
552
553 int wpa_supplicant_ap_update_beacon(struct wpa_supplicant *wpa_s)
554 {
555         struct hostapd_iface *iface = wpa_s->ap_iface;
556         struct wpa_ssid *ssid = wpa_s->current_ssid;
557         struct hostapd_data *hapd;
558
559         if (ssid == NULL || wpa_s->ap_iface == NULL)
560                 return -1;
561
562 #ifdef CONFIG_P2P
563         if (ssid->mode == WPAS_MODE_P2P_GO)
564                 iface->conf->bss[0].p2p = P2P_ENABLED | P2P_GROUP_OWNER;
565         else if (ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION)
566                 iface->conf->bss[0].p2p = P2P_ENABLED | P2P_GROUP_OWNER |
567                         P2P_GROUP_FORMATION;
568 #endif /* CONFIG_P2P */
569
570         ieee802_11_set_beacons(iface);
571         hapd = iface->bss[0];
572         hapd->drv.set_ap_wps_ie(hapd);
573
574         return 0;
575 }
576
577
578 int wpa_supplicant_ap_mac_addr_filter(struct wpa_supplicant *wpa_s,
579                                       const u8 *addr)
580 {
581         struct hostapd_data *hapd;
582         struct hostapd_bss_config *conf;
583
584         if (!wpa_s->ap_iface)
585                 return -1;
586
587         if (addr)
588                 wpa_printf(MSG_DEBUG, "AP: Set MAC address filter: " MACSTR,
589                            MAC2STR(addr));
590         else
591                 wpa_printf(MSG_DEBUG, "AP: Clear MAC address filter");
592
593         hapd = wpa_s->ap_iface->bss[0];
594         conf = hapd->conf;
595
596         os_free(conf->accept_mac);
597         conf->accept_mac = NULL;
598         conf->num_accept_mac = 0;
599         os_free(conf->deny_mac);
600         conf->deny_mac = NULL;
601         conf->num_deny_mac = 0;
602
603         if (addr == NULL) {
604                 conf->macaddr_acl = ACCEPT_UNLESS_DENIED;
605                 return 0;
606         }
607
608         conf->macaddr_acl = DENY_UNLESS_ACCEPTED;
609         conf->accept_mac = os_zalloc(sizeof(struct mac_acl_entry));
610         if (conf->accept_mac == NULL)
611                 return -1;
612         os_memcpy(conf->accept_mac[0].addr, addr, ETH_ALEN);
613         conf->num_accept_mac = 1;
614
615         return 0;
616 }