Updated through tag hostap_2_5 from git://w1.fi/hostap.git
[mech_eap.git] / libeap / src / ap / wps_hostapd.c
index b2f6a78..cde31e6 100644 (file)
@@ -1,15 +1,9 @@
 /*
  * hostapd / WPS integration
- * Copyright (c) 2008-2010, Jouni Malinen <j@w1.fi>
+ * Copyright (c) 2008-2012, Jouni Malinen <j@w1.fi>
  *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License version 2 as
- * published by the Free Software Foundation.
- *
- * Alternatively, this software may be distributed under the terms of BSD
- * license.
- *
- * See README and COPYING for more details.
+ * This software may be distributed under the terms of the BSD license.
+ * See README for more details.
  */
 
 #include "utils/includes.h"
@@ -17,7 +11,6 @@
 #include "utils/common.h"
 #include "utils/eloop.h"
 #include "utils/uuid.h"
-#include "crypto/dh_groups.h"
 #include "common/wpa_ctrl.h"
 #include "common/ieee802_11_defs.h"
 #include "common/ieee802_11_common.h"
 #include "wps/wps.h"
 #include "wps/wps_defs.h"
 #include "wps/wps_dev_attr.h"
+#include "wps/wps_attr_parse.h"
 #include "hostapd.h"
 #include "ap_config.h"
+#include "ap_drv_ops.h"
 #include "beacon.h"
 #include "sta_info.h"
 #include "wps_hostapd.h"
@@ -40,14 +35,18 @@ static int hostapd_wps_upnp_init(struct hostapd_data *hapd,
 static void hostapd_wps_upnp_deinit(struct hostapd_data *hapd);
 #endif /* CONFIG_WPS_UPNP */
 
-static int hostapd_wps_probe_req_rx(void *ctx, const u8 *addr,
-                                   const u8 *ie, size_t ie_len);
+static int hostapd_wps_probe_req_rx(void *ctx, const u8 *addr, const u8 *da,
+                                   const u8 *bssid,
+                                   const u8 *ie, size_t ie_len,
+                                   int ssi_signal);
 static void hostapd_wps_ap_pin_timeout(void *eloop_data, void *user_ctx);
+static void hostapd_wps_nfc_clear(struct wps_context *wps);
 
 
 struct wps_for_each_data {
        int (*func)(struct hostapd_data *h, void *ctx);
        void *ctx;
+       struct hostapd_data *calling_hapd;
 };
 
 
@@ -60,7 +59,14 @@ static int wps_for_each(struct hostapd_iface *iface, void *ctx)
                return 0;
        for (j = 0; j < iface->num_bss; j++) {
                struct hostapd_data *hapd = iface->bss[j];
-               int ret = data->func(hapd, data->ctx);
+               int ret;
+
+               if (hapd != data->calling_hapd &&
+                   (hapd->conf->wps_independent ||
+                    data->calling_hapd->conf->wps_independent))
+                       continue;
+
+               ret = data->func(hapd, data->ctx);
                if (ret)
                        return ret;
        }
@@ -77,22 +83,33 @@ static int hostapd_wps_for_each(struct hostapd_data *hapd,
        struct wps_for_each_data data;
        data.func = func;
        data.ctx = ctx;
-       if (iface->for_each_interface == NULL)
+       data.calling_hapd = hapd;
+       if (iface->interfaces == NULL ||
+           iface->interfaces->for_each_interface == NULL)
                return wps_for_each(iface, &data);
-       return iface->for_each_interface(iface->interfaces, wps_for_each,
-                                        &data);
+       return iface->interfaces->for_each_interface(iface->interfaces,
+                                                    wps_for_each, &data);
 }
 
 
-static int hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk,
+static int hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr,
+                                 const u8 *p2p_dev_addr, const u8 *psk,
                                  size_t psk_len)
 {
        struct hostapd_data *hapd = ctx;
        struct hostapd_wpa_psk *p;
        struct hostapd_ssid *ssid = &hapd->conf->ssid;
 
-       wpa_printf(MSG_DEBUG, "Received new WPA/WPA2-PSK from WPS for STA "
-                  MACSTR, MAC2STR(mac_addr));
+       if (is_zero_ether_addr(p2p_dev_addr)) {
+               wpa_printf(MSG_DEBUG,
+                          "Received new WPA/WPA2-PSK from WPS for STA " MACSTR,
+                          MAC2STR(mac_addr));
+       } else {
+               wpa_printf(MSG_DEBUG,
+                          "Received new WPA/WPA2-PSK from WPS for STA " MACSTR
+                          " P2P Device Addr " MACSTR,
+                          MAC2STR(mac_addr), MAC2STR(p2p_dev_addr));
+       }
        wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
 
        if (psk_len != PMK_LEN) {
@@ -106,8 +123,14 @@ static int hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk,
        if (p == NULL)
                return -1;
        os_memcpy(p->addr, mac_addr, ETH_ALEN);
+       os_memcpy(p->p2p_dev_addr, p2p_dev_addr, ETH_ALEN);
        os_memcpy(p->psk, psk, PMK_LEN);
 
+       if (hapd->new_psk_cb) {
+               hapd->new_psk_cb(hapd->new_psk_cb_ctx, mac_addr, p2p_dev_addr,
+                                psk, psk_len);
+       }
+
        p->next = ssid->wpa_psk;
        ssid->wpa_psk = p;
 
@@ -139,8 +162,9 @@ static int hostapd_wps_set_ie_cb(void *ctx, struct wpabuf *beacon_ie,
        hapd->wps_beacon_ie = beacon_ie;
        wpabuf_free(hapd->wps_probe_resp_ie);
        hapd->wps_probe_resp_ie = probe_resp_ie;
-       ieee802_11_set_beacon(hapd);
-       return hapd->drv.set_ap_wps_ie(hapd);
+       if (hapd->beacon_set_done)
+               ieee802_11_set_beacon(hapd);
+       return hostapd_set_ap_wps_ie(hapd);
 }
 
 
@@ -161,7 +185,7 @@ static void hostapd_wps_pin_needed_cb(void *ctx, const u8 *uuid_e,
                          dev->model_number, dev->serial_number,
                          wps_dev_type_bin2str(dev->pri_dev_type, devtype,
                                               sizeof(devtype)));
-       if (len > 0 && len < (int) sizeof(txt))
+       if (!os_snprintf_error(sizeof(txt), len))
                wpa_msg(hapd->msg_ctx, MSG_INFO, "%s", txt);
 
        if (hapd->conf->wps_pin_requests) {
@@ -183,11 +207,30 @@ static void hostapd_wps_pin_needed_cb(void *ctx, const u8 *uuid_e,
 }
 
 
+struct wps_stop_reg_data {
+       struct hostapd_data *current_hapd;
+       const u8 *uuid_e;
+       const u8 *dev_pw;
+       size_t dev_pw_len;
+};
+
+static int wps_stop_registrar(struct hostapd_data *hapd, void *ctx)
+{
+       struct wps_stop_reg_data *data = ctx;
+       if (hapd != data->current_hapd && hapd->wps != NULL)
+               wps_registrar_complete(hapd->wps->registrar, data->uuid_e,
+                                      data->dev_pw, data->dev_pw_len);
+       return 0;
+}
+
+
 static void hostapd_wps_reg_success_cb(void *ctx, const u8 *mac_addr,
-                                      const u8 *uuid_e)
+                                      const u8 *uuid_e, const u8 *dev_pw,
+                                      size_t dev_pw_len)
 {
        struct hostapd_data *hapd = ctx;
        char uuid[40];
+       struct wps_stop_reg_data data;
        if (uuid_bin2str(uuid_e, uuid, sizeof(uuid)))
                return;
        wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_REG_SUCCESS MACSTR " %s",
@@ -195,6 +238,11 @@ static void hostapd_wps_reg_success_cb(void *ctx, const u8 *mac_addr,
        if (hapd->wps_reg_success_cb)
                hapd->wps_reg_success_cb(hapd->wps_reg_success_cb_ctx,
                                         mac_addr, uuid_e);
+       data.current_hapd = hapd;
+       data.uuid_e = uuid_e;
+       data.dev_pw = dev_pw;
+       data.dev_pw_len = dev_pw_len;
+       hostapd_wps_for_each(hapd, wps_stop_registrar, &data);
 }
 
 
@@ -232,13 +280,124 @@ static void wps_reload_config(void *eloop_data, void *user_ctx)
        struct hostapd_iface *iface = eloop_data;
 
        wpa_printf(MSG_DEBUG, "WPS: Reload configuration data");
-       if (iface->reload_config(iface) < 0) {
+       if (iface->interfaces == NULL ||
+           iface->interfaces->reload_config(iface) < 0) {
                wpa_printf(MSG_WARNING, "WPS: Failed to reload the updated "
                           "configuration");
        }
 }
 
 
+void hostapd_wps_eap_completed(struct hostapd_data *hapd)
+{
+       /*
+        * Reduce race condition of the station trying to reconnect immediately
+        * after AP reconfiguration through WPS by rescheduling the reload
+        * timeout to happen after EAP completion rather than the originally
+        * scheduled 100 ms after new configuration became known.
+        */
+       if (eloop_deplete_timeout(0, 0, wps_reload_config, hapd->iface, NULL) ==
+           1)
+               wpa_printf(MSG_DEBUG, "WPS: Reschedule immediate configuration reload");
+}
+
+
+static void hapd_new_ap_event(struct hostapd_data *hapd, const u8 *attr,
+                             size_t attr_len)
+{
+       size_t blen = attr_len * 2 + 1;
+       char *buf = os_malloc(blen);
+       if (buf) {
+               wpa_snprintf_hex(buf, blen, attr, attr_len);
+               wpa_msg(hapd->msg_ctx, MSG_INFO,
+                       WPS_EVENT_NEW_AP_SETTINGS "%s", buf);
+               os_free(buf);
+       }
+}
+
+
+static int hapd_wps_reconfig_in_memory(struct hostapd_data *hapd,
+                                      const struct wps_credential *cred)
+{
+       struct hostapd_bss_config *bss = hapd->conf;
+
+       wpa_printf(MSG_DEBUG, "WPS: Updating in-memory configuration");
+
+       bss->wps_state = 2;
+       if (cred->ssid_len <= SSID_MAX_LEN) {
+               os_memcpy(bss->ssid.ssid, cred->ssid, cred->ssid_len);
+               bss->ssid.ssid_len = cred->ssid_len;
+               bss->ssid.ssid_set = 1;
+       }
+
+       if ((cred->auth_type & (WPS_AUTH_WPA2 | WPS_AUTH_WPA2PSK)) &&
+           (cred->auth_type & (WPS_AUTH_WPA | WPS_AUTH_WPAPSK)))
+               bss->wpa = 3;
+       else if (cred->auth_type & (WPS_AUTH_WPA2 | WPS_AUTH_WPA2PSK))
+               bss->wpa = 2;
+       else if (cred->auth_type & (WPS_AUTH_WPA | WPS_AUTH_WPAPSK))
+               bss->wpa = 1;
+       else
+               bss->wpa = 0;
+
+       if (bss->wpa) {
+               if (cred->auth_type & (WPS_AUTH_WPA2 | WPS_AUTH_WPA))
+                       bss->wpa_key_mgmt = WPA_KEY_MGMT_IEEE8021X;
+               if (cred->auth_type & (WPS_AUTH_WPA2PSK | WPS_AUTH_WPAPSK))
+                       bss->wpa_key_mgmt = WPA_KEY_MGMT_PSK;
+
+               bss->wpa_pairwise = 0;
+               if (cred->encr_type & WPS_ENCR_AES) {
+                       if (hapd->iconf->hw_mode == HOSTAPD_MODE_IEEE80211AD)
+                               bss->wpa_pairwise |= WPA_CIPHER_GCMP;
+                       else
+                               bss->wpa_pairwise |= WPA_CIPHER_CCMP;
+               }
+               if (cred->encr_type & WPS_ENCR_TKIP)
+                       bss->wpa_pairwise |= WPA_CIPHER_TKIP;
+               bss->rsn_pairwise = bss->wpa_pairwise;
+               bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa,
+                                                           bss->wpa_pairwise,
+                                                           bss->rsn_pairwise);
+
+               if (cred->key_len >= 8 && cred->key_len < 64) {
+                       os_free(bss->ssid.wpa_passphrase);
+                       bss->ssid.wpa_passphrase = os_zalloc(cred->key_len + 1);
+                       if (bss->ssid.wpa_passphrase)
+                               os_memcpy(bss->ssid.wpa_passphrase, cred->key,
+                                         cred->key_len);
+                       hostapd_config_clear_wpa_psk(&bss->ssid.wpa_psk);
+               } else if (cred->key_len == 64) {
+                       hostapd_config_clear_wpa_psk(&bss->ssid.wpa_psk);
+                       bss->ssid.wpa_psk =
+                               os_zalloc(sizeof(struct hostapd_wpa_psk));
+                       if (bss->ssid.wpa_psk &&
+                           hexstr2bin((const char *) cred->key,
+                                      bss->ssid.wpa_psk->psk, PMK_LEN) == 0) {
+                               bss->ssid.wpa_psk->group = 1;
+                               os_free(bss->ssid.wpa_passphrase);
+                               bss->ssid.wpa_passphrase = NULL;
+                       }
+               }
+               bss->auth_algs = 1;
+       } else {
+               /*
+                * WPS 2.0 does not allow WEP to be configured, so no need to
+                * process that option here either.
+                */
+               bss->auth_algs = 1;
+       }
+
+       /* Schedule configuration reload after short period of time to allow
+        * EAP-WSC to be finished.
+        */
+       eloop_register_timeout(0, 100000, wps_reload_config, hapd->iface,
+                              NULL);
+
+       return 0;
+}
+
+
 static int hapd_wps_cred_cb(struct hostapd_data *hapd, void *ctx)
 {
        const struct wps_credential *cred = ctx;
@@ -268,15 +427,15 @@ static int hapd_wps_cred_cb(struct hostapd_data *hapd, void *ctx)
 
        if ((hapd->conf->wps_cred_processing == 1 ||
             hapd->conf->wps_cred_processing == 2) && cred->cred_attr) {
-               size_t blen = cred->cred_attr_len * 2 + 1;
-               char *_buf = os_malloc(blen);
-               if (_buf) {
-                       wpa_snprintf_hex(_buf, blen,
-                                        cred->cred_attr, cred->cred_attr_len);
-                       wpa_msg(hapd->msg_ctx, MSG_INFO, "%s%s",
-                               WPS_EVENT_NEW_AP_SETTINGS, _buf);
-                       os_free(_buf);
-               }
+               hapd_new_ap_event(hapd, cred->cred_attr, cred->cred_attr_len);
+       } else if (hapd->conf->wps_cred_processing == 1 ||
+                  hapd->conf->wps_cred_processing == 2) {
+               struct wpabuf *attr;
+               attr = wpabuf_alloc(200);
+               if (attr && wps_build_credential_wrap(attr, cred) == 0)
+                       hapd_new_ap_event(hapd, wpabuf_head_u8(attr),
+                                         wpabuf_len(attr));
+               wpabuf_free(attr);
        } else
                wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_NEW_AP_SETTINGS);
 
@@ -287,10 +446,17 @@ static int hapd_wps_cred_cb(struct hostapd_data *hapd, void *ctx)
        hapd->wps->ssid_len = cred->ssid_len;
        hapd->wps->encr_types = cred->encr_type;
        hapd->wps->auth_types = cred->auth_type;
+       hapd->wps->ap_encr_type = cred->encr_type;
+       hapd->wps->ap_auth_type = cred->auth_type;
        if (cred->key_len == 0) {
                os_free(hapd->wps->network_key);
                hapd->wps->network_key = NULL;
                hapd->wps->network_key_len = 0;
+       } else if ((cred->auth_type & (WPS_AUTH_WPA2PSK | WPS_AUTH_WPAPSK)) &&
+                  (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN)) {
+               wpa_printf(MSG_INFO, "WPS: Invalid key length %lu for WPA/WPA2",
+                          (unsigned long) cred->key_len);
+               return -1;
        } else {
                if (hapd->wps->network_key == NULL ||
                    hapd->wps->network_key_len < cred->key_len) {
@@ -305,6 +471,8 @@ static int hapd_wps_cred_cb(struct hostapd_data *hapd, void *ctx)
        }
        hapd->wps->wps_state = WPS_STATE_CONFIGURED;
 
+       if (hapd->iface->config_fname == NULL)
+               return hapd_wps_reconfig_in_memory(hapd, cred);
        len = os_strlen(hapd->iface->config_fname) + 5;
        tmp_fname = os_malloc(len);
        if (tmp_fname == NULL)
@@ -332,10 +500,17 @@ static int hapd_wps_cred_cb(struct hostapd_data *hapd, void *ctx)
 
        fprintf(nconf, "wps_state=2\n");
 
-       fprintf(nconf, "ssid=");
-       for (i = 0; i < cred->ssid_len; i++)
-               fputc(cred->ssid[i], nconf);
-       fprintf(nconf, "\n");
+       if (is_hex(cred->ssid, cred->ssid_len)) {
+               fprintf(nconf, "ssid2=");
+               for (i = 0; i < cred->ssid_len; i++)
+                       fprintf(nconf, "%02x", cred->ssid[i]);
+               fprintf(nconf, "\n");
+       } else {
+               fprintf(nconf, "ssid=");
+               for (i = 0; i < cred->ssid_len; i++)
+                       fputc(cred->ssid[i], nconf);
+               fprintf(nconf, "\n");
+       }
 
        if ((cred->auth_type & (WPS_AUTH_WPA2 | WPS_AUTH_WPA2PSK)) &&
            (cred->auth_type & (WPS_AUTH_WPA | WPS_AUTH_WPAPSK)))
@@ -364,7 +539,11 @@ static int hapd_wps_cred_cb(struct hostapd_data *hapd, void *ctx)
                fprintf(nconf, "wpa_pairwise=");
                prefix = "";
                if (cred->encr_type & WPS_ENCR_AES) {
-                       fprintf(nconf, "CCMP");
+                       if (hapd->iconf->hw_mode == HOSTAPD_MODE_IEEE80211AD)
+                               fprintf(nconf, "GCMP");
+                       else
+                               fprintf(nconf, "CCMP");
+
                        prefix = " ";
                }
                if (cred->encr_type & WPS_ENCR_TKIP) {
@@ -390,31 +569,11 @@ static int hapd_wps_cred_cb(struct hostapd_data *hapd, void *ctx)
 
                fprintf(nconf, "auth_algs=1\n");
        } else {
-               if ((cred->auth_type & WPS_AUTH_OPEN) &&
-                   (cred->auth_type & WPS_AUTH_SHARED))
-                       fprintf(nconf, "auth_algs=3\n");
-               else if (cred->auth_type & WPS_AUTH_SHARED)
-                       fprintf(nconf, "auth_algs=2\n");
-               else
-                       fprintf(nconf, "auth_algs=1\n");
-
-               if (cred->encr_type & WPS_ENCR_WEP && cred->key_idx <= 4) {
-                       int key_idx = cred->key_idx;
-                       if (key_idx)
-                               key_idx--;
-                       fprintf(nconf, "wep_default_key=%d\n", key_idx);
-                       fprintf(nconf, "wep_key%d=", key_idx);
-                       if (cred->key_len == 10 || cred->key_len == 26) {
-                               /* WEP key as a hex string */
-                               for (i = 0; i < cred->key_len; i++)
-                                       fputc(cred->key[i], nconf);
-                       } else {
-                               /* Raw WEP key; convert to hex */
-                               for (i = 0; i < cred->key_len; i++)
-                                       fprintf(nconf, "%02x", cred->key[i]);
-                       }
-                       fprintf(nconf, "\n");
-               }
+               /*
+                * WPS 2.0 does not allow WEP to be configured, so no need to
+                * process that option here either.
+                */
+               fprintf(nconf, "auth_algs=1\n");
        }
 
        fprintf(nconf, "# WPS configuration - END\n");
@@ -425,7 +584,10 @@ static int hapd_wps_cred_cb(struct hostapd_data *hapd, void *ctx)
                        multi_bss = 1;
                if (!multi_bss &&
                    (str_starts(buf, "ssid=") ||
+                    str_starts(buf, "ssid2=") ||
                     str_starts(buf, "auth_algs=") ||
+                    str_starts(buf, "wep_default_key=") ||
+                    str_starts(buf, "wep_key") ||
                     str_starts(buf, "wps_state=") ||
                     str_starts(buf, "wpa=") ||
                     str_starts(buf, "wpa_psk=") ||
@@ -475,6 +637,8 @@ static void hostapd_wps_reenable_ap_pin(void *eloop_data, void *user_ctx)
 
        if (hapd->conf->ap_setup_locked)
                return;
+       if (hapd->ap_pin_failures_consecutive >= 10)
+               return;
 
        wpa_printf(MSG_DEBUG, "WPS: Re-enable AP PIN");
        wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_AP_SETUP_UNLOCKED);
@@ -496,8 +660,10 @@ static int wps_pwd_auth_fail(struct hostapd_data *hapd, void *ctx)
         * force attacks.
         */
        hapd->ap_pin_failures++;
-       wpa_printf(MSG_DEBUG, "WPS: AP PIN authentication failure number %u",
-                  hapd->ap_pin_failures);
+       hapd->ap_pin_failures_consecutive++;
+       wpa_printf(MSG_DEBUG, "WPS: AP PIN authentication failure number %u "
+                  "(%u consecutive)",
+                  hapd->ap_pin_failures, hapd->ap_pin_failures_consecutive);
        if (hapd->ap_pin_failures < 3)
                return 0;
 
@@ -506,7 +672,15 @@ static int wps_pwd_auth_fail(struct hostapd_data *hapd, void *ctx)
 
        wps_registrar_update_ie(hapd->wps->registrar);
 
-       if (!hapd->conf->ap_setup_locked) {
+       if (!hapd->conf->ap_setup_locked &&
+           hapd->ap_pin_failures_consecutive >= 10) {
+               /*
+                * In indefinite lockdown - disable automatic AP PIN
+                * reenablement.
+                */
+               eloop_cancel_timeout(hostapd_wps_reenable_ap_pin, hapd, NULL);
+               wpa_printf(MSG_DEBUG, "WPS: AP PIN disabled indefinitely");
+       } else if (!hapd->conf->ap_setup_locked) {
                if (hapd->ap_pin_lockout_time == 0)
                        hapd->ap_pin_lockout_time = 60;
                else if (hapd->ap_pin_lockout_time < 365 * 24 * 60 * 60 &&
@@ -528,16 +702,97 @@ static int wps_pwd_auth_fail(struct hostapd_data *hapd, void *ctx)
 static void hostapd_pwd_auth_fail(struct hostapd_data *hapd,
                                  struct wps_event_pwd_auth_fail *data)
 {
+       /* Update WPS Status - Authentication Failure */
+       wpa_printf(MSG_DEBUG, "WPS: Authentication failure update");
+       hapd->wps_stats.status = WPS_STATUS_FAILURE;
+       hapd->wps_stats.failure_reason = WPS_EI_AUTH_FAILURE;
+       os_memcpy(hapd->wps_stats.peer_addr, data->peer_macaddr, ETH_ALEN);
+
        hostapd_wps_for_each(hapd, wps_pwd_auth_fail, data);
 }
 
 
+static int wps_ap_pin_success(struct hostapd_data *hapd, void *ctx)
+{
+       if (hapd->conf->ap_pin == NULL || hapd->wps == NULL)
+               return 0;
+
+       if (hapd->ap_pin_failures_consecutive == 0)
+               return 0;
+
+       wpa_printf(MSG_DEBUG, "WPS: Clear consecutive AP PIN failure counter "
+                  "- total validation failures %u (%u consecutive)",
+                  hapd->ap_pin_failures, hapd->ap_pin_failures_consecutive);
+       hapd->ap_pin_failures_consecutive = 0;
+
+       return 0;
+}
+
+
+static void hostapd_wps_ap_pin_success(struct hostapd_data *hapd)
+{
+       hostapd_wps_for_each(hapd, wps_ap_pin_success, NULL);
+}
+
+
+static void hostapd_wps_event_pbc_overlap(struct hostapd_data *hapd)
+{
+       /* Update WPS Status - PBC Overlap */
+       hapd->wps_stats.pbc_status = WPS_PBC_STATUS_OVERLAP;
+}
+
+
+static void hostapd_wps_event_pbc_timeout(struct hostapd_data *hapd)
+{
+       /* Update WPS PBC Status:PBC Timeout */
+       hapd->wps_stats.pbc_status = WPS_PBC_STATUS_TIMEOUT;
+}
+
+
+static void hostapd_wps_event_pbc_active(struct hostapd_data *hapd)
+{
+       /* Update WPS PBC status - Active */
+       hapd->wps_stats.pbc_status = WPS_PBC_STATUS_ACTIVE;
+}
+
+
+static void hostapd_wps_event_pbc_disable(struct hostapd_data *hapd)
+{
+       /* Update WPS PBC status - Active */
+       hapd->wps_stats.pbc_status = WPS_PBC_STATUS_DISABLE;
+}
+
+
+static void hostapd_wps_event_success(struct hostapd_data *hapd,
+                                     struct wps_event_success *success)
+{
+       /* Update WPS status - Success */
+       hapd->wps_stats.pbc_status = WPS_PBC_STATUS_DISABLE;
+       hapd->wps_stats.status = WPS_STATUS_SUCCESS;
+       os_memcpy(hapd->wps_stats.peer_addr, success->peer_macaddr, ETH_ALEN);
+}
+
+
 static void hostapd_wps_event_fail(struct hostapd_data *hapd,
                                   struct wps_event_fail *fail)
 {
-       wpa_msg(hapd->msg_ctx, MSG_INFO,
-               WPS_EVENT_FAIL "msg=%d config_error=%d",
-               fail->msg, fail->config_error);
+       /* Update WPS status - Failure */
+       hapd->wps_stats.status = WPS_STATUS_FAILURE;
+       os_memcpy(hapd->wps_stats.peer_addr, fail->peer_macaddr, ETH_ALEN);
+
+       hapd->wps_stats.failure_reason = fail->error_indication;
+
+       if (fail->error_indication > 0 &&
+           fail->error_indication < NUM_WPS_EI_VALUES) {
+               wpa_msg(hapd->msg_ctx, MSG_INFO,
+                       WPS_EVENT_FAIL "msg=%d config_error=%d reason=%d (%s)",
+                       fail->msg, fail->config_error, fail->error_indication,
+                       wps_ei_str(fail->error_indication));
+       } else {
+               wpa_msg(hapd->msg_ctx, MSG_INFO,
+                       WPS_EVENT_FAIL "msg=%d config_error=%d",
+                       fail->msg, fail->config_error);
+       }
 }
 
 
@@ -548,18 +803,33 @@ static void hostapd_wps_event_cb(void *ctx, enum wps_event event,
 
        switch (event) {
        case WPS_EV_M2D:
+               wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_M2D);
                break;
        case WPS_EV_FAIL:
                hostapd_wps_event_fail(hapd, &data->fail);
                break;
        case WPS_EV_SUCCESS:
+               hostapd_wps_event_success(hapd, &data->success);
+               wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_SUCCESS);
                break;
        case WPS_EV_PWD_AUTH_FAIL:
                hostapd_pwd_auth_fail(hapd, &data->pwd_auth_fail);
                break;
        case WPS_EV_PBC_OVERLAP:
+               hostapd_wps_event_pbc_overlap(hapd);
+               wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_OVERLAP);
                break;
        case WPS_EV_PBC_TIMEOUT:
+               hostapd_wps_event_pbc_timeout(hapd);
+               wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_TIMEOUT);
+               break;
+       case WPS_EV_PBC_ACTIVE:
+               hostapd_wps_event_pbc_active(hapd);
+               wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_ACTIVE);
+               break;
+       case WPS_EV_PBC_DISABLE:
+               hostapd_wps_event_pbc_disable(hapd);
+               wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_DISABLE);
                break;
        case WPS_EV_ER_AP_ADD:
                break;
@@ -571,13 +841,29 @@ static void hostapd_wps_event_cb(void *ctx, enum wps_event event,
                break;
        case WPS_EV_ER_AP_SETTINGS:
                break;
+       case WPS_EV_ER_SET_SELECTED_REGISTRAR:
+               break;
+       case WPS_EV_AP_PIN_SUCCESS:
+               hostapd_wps_ap_pin_success(hapd);
+               break;
        }
        if (hapd->wps_event_cb)
                hapd->wps_event_cb(hapd->wps_event_cb_ctx, event, data);
 }
 
 
-static void hostapd_wps_clear_ies(struct hostapd_data *hapd)
+static int hostapd_wps_rf_band_cb(void *ctx)
+{
+       struct hostapd_data *hapd = ctx;
+
+       return hapd->iconf->hw_mode == HOSTAPD_MODE_IEEE80211A ?
+               WPS_RF_50GHZ :
+               hapd->iconf->hw_mode == HOSTAPD_MODE_IEEE80211AD ?
+               WPS_RF_60GHZ : WPS_RF_24GHZ; /* FIX: dualband AP */
+}
+
+
+static void hostapd_wps_clear_ies(struct hostapd_data *hapd, int deinit_only)
 {
        wpabuf_free(hapd->wps_beacon_ie);
        hapd->wps_beacon_ie = NULL;
@@ -585,7 +871,12 @@ static void hostapd_wps_clear_ies(struct hostapd_data *hapd)
        wpabuf_free(hapd->wps_probe_resp_ie);
        hapd->wps_probe_resp_ie = NULL;
 
-       hapd->drv.set_ap_wps_ie(hapd);
+       if (deinit_only) {
+               hostapd_reset_ap_wps_ie(hapd);
+               return;
+       }
+
+       hostapd_set_ap_wps_ie(hapd);
 }
 
 
@@ -598,7 +889,8 @@ static int get_uuid_cb(struct hostapd_iface *iface, void *ctx)
                return 0;
        for (j = 0; j < iface->num_bss; j++) {
                struct hostapd_data *hapd = iface->bss[j];
-               if (hapd->wps && !is_nil_uuid(hapd->wps->uuid)) {
+               if (hapd->wps && !hapd->conf->wps_independent &&
+                   !is_nil_uuid(hapd->wps->uuid)) {
                        *uuid = hapd->wps->uuid;
                        return 1;
                }
@@ -611,10 +903,12 @@ static int get_uuid_cb(struct hostapd_iface *iface, void *ctx)
 static const u8 * get_own_uuid(struct hostapd_iface *iface)
 {
        const u8 *uuid;
-       if (iface->for_each_interface == NULL)
+       if (iface->interfaces == NULL ||
+           iface->interfaces->for_each_interface == NULL)
                return NULL;
        uuid = NULL;
-       iface->for_each_interface(iface->interfaces, get_uuid_cb, &uuid);
+       iface->interfaces->for_each_interface(iface->interfaces, get_uuid_cb,
+                                             &uuid);
        return uuid;
 }
 
@@ -630,14 +924,55 @@ static int count_interface_cb(struct hostapd_iface *iface, void *ctx)
 static int interface_count(struct hostapd_iface *iface)
 {
        int count = 0;
-       if (iface->for_each_interface == NULL)
+       if (iface->interfaces == NULL ||
+           iface->interfaces->for_each_interface == NULL)
                return 0;
-       iface->for_each_interface(iface->interfaces, count_interface_cb,
-                                 &count);
+       iface->interfaces->for_each_interface(iface->interfaces,
+                                             count_interface_cb, &count);
        return count;
 }
 
 
+static int hostapd_wps_set_vendor_ext(struct hostapd_data *hapd,
+                                     struct wps_context *wps)
+{
+       int i;
+
+       for (i = 0; i < MAX_WPS_VENDOR_EXTENSIONS; i++) {
+               wpabuf_free(wps->dev.vendor_ext[i]);
+               wps->dev.vendor_ext[i] = NULL;
+
+               if (hapd->conf->wps_vendor_ext[i] == NULL)
+                       continue;
+
+               wps->dev.vendor_ext[i] =
+                       wpabuf_dup(hapd->conf->wps_vendor_ext[i]);
+               if (wps->dev.vendor_ext[i] == NULL) {
+                       while (--i >= 0)
+                               wpabuf_free(wps->dev.vendor_ext[i]);
+                       return -1;
+               }
+       }
+
+       return 0;
+}
+
+
+static void hostapd_free_wps(struct wps_context *wps)
+{
+       int i;
+
+       for (i = 0; i < MAX_WPS_VENDOR_EXTENSIONS; i++)
+               wpabuf_free(wps->dev.vendor_ext[i]);
+       wps_device_data_free(&wps->dev);
+       os_free(wps->network_key);
+       hostapd_wps_nfc_clear(wps);
+       wpabuf_free(wps->dh_pubkey);
+       wpabuf_free(wps->dh_privkey);
+       os_free(wps);
+}
+
+
 int hostapd_init_wps(struct hostapd_data *hapd,
                     struct hostapd_bss_config *conf)
 {
@@ -645,7 +980,7 @@ int hostapd_init_wps(struct hostapd_data *hapd,
        struct wps_registrar_config cfg;
 
        if (conf->wps_state == 0) {
-               hostapd_wps_clear_ies(hapd);
+               hostapd_wps_clear_ies(hapd, 0);
                return 0;
        }
 
@@ -655,6 +990,7 @@ int hostapd_init_wps(struct hostapd_data *hapd,
 
        wps->cred_cb = hostapd_wps_cred_cb;
        wps->event_cb = hostapd_wps_event_cb;
+       wps->rf_band_cb = hostapd_wps_rf_band_cb;
        wps->cb_ctx = hapd;
 
        os_memset(&cfg, 0, sizeof(cfg));
@@ -663,7 +999,7 @@ int hostapd_init_wps(struct hostapd_data *hapd,
        if (is_nil_uuid(hapd->conf->uuid)) {
                const u8 *uuid;
                uuid = get_own_uuid(hapd->iface);
-               if (uuid) {
+               if (uuid && !conf->wps_independent) {
                        os_memcpy(wps->uuid, uuid, UUID_LEN);
                        wpa_hexdump(MSG_DEBUG, "WPS: Clone UUID from another "
                                    "interface", wps->uuid, UUID_LEN);
@@ -693,7 +1029,6 @@ int hostapd_init_wps(struct hostapd_data *hapd,
                os_strdup(hapd->conf->serial_number) : NULL;
        wps->config_methods =
                wps_config_methods_str2bin(hapd->conf->config_methods);
-#ifdef CONFIG_WPS2
        if ((wps->config_methods &
             (WPS_CONFIG_DISPLAY | WPS_CONFIG_VIRT_DISPLAY |
              WPS_CONFIG_PHY_DISPLAY)) == WPS_CONFIG_DISPLAY) {
@@ -708,17 +1043,23 @@ int hostapd_init_wps(struct hostapd_data *hapd,
                           "virtual_push_button for WPS 2.0 compliance");
                wps->config_methods |= WPS_CONFIG_VIRT_PUSHBUTTON;
        }
-#endif /* CONFIG_WPS2 */
-       if (hapd->conf->device_type &&
-           wps_dev_type_str2bin(hapd->conf->device_type,
-                                wps->dev.pri_dev_type) < 0) {
-               wpa_printf(MSG_ERROR, "WPS: Invalid device_type");
-               os_free(wps);
-               return -1;
-       }
+       os_memcpy(wps->dev.pri_dev_type, hapd->conf->device_type,
+                 WPS_DEV_TYPE_LEN);
+
+       if (hostapd_wps_set_vendor_ext(hapd, wps) < 0)
+               goto fail;
+
        wps->dev.os_version = WPA_GET_BE32(hapd->conf->os_version);
-       wps->dev.rf_bands = hapd->iconf->hw_mode == HOSTAPD_MODE_IEEE80211A ?
-               WPS_RF_50GHZ : WPS_RF_24GHZ; /* FIX: dualband AP */
+
+       if (conf->wps_rf_bands) {
+               wps->dev.rf_bands = conf->wps_rf_bands;
+       } else {
+               wps->dev.rf_bands =
+                       hapd->iconf->hw_mode == HOSTAPD_MODE_IEEE80211A ?
+                       WPS_RF_50GHZ :
+                       hapd->iconf->hw_mode == HOSTAPD_MODE_IEEE80211AD ?
+                       WPS_RF_60GHZ : WPS_RF_24GHZ; /* FIX: dualband AP */
+       }
 
        if (conf->wpa & WPA_PROTO_RSN) {
                if (conf->wpa_key_mgmt & WPA_KEY_MGMT_PSK)
@@ -726,7 +1067,7 @@ int hostapd_init_wps(struct hostapd_data *hapd,
                if (conf->wpa_key_mgmt & WPA_KEY_MGMT_IEEE8021X)
                        wps->auth_types |= WPS_AUTH_WPA2;
 
-               if (conf->rsn_pairwise & WPA_CIPHER_CCMP)
+               if (conf->rsn_pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP))
                        wps->encr_types |= WPS_ENCR_AES;
                if (conf->rsn_pairwise & WPA_CIPHER_TKIP)
                        wps->encr_types |= WPS_ENCR_TKIP;
@@ -747,18 +1088,6 @@ int hostapd_init_wps(struct hostapd_data *hapd,
        if (conf->ssid.security_policy == SECURITY_PLAINTEXT) {
                wps->encr_types |= WPS_ENCR_NONE;
                wps->auth_types |= WPS_AUTH_OPEN;
-       } else if (conf->ssid.security_policy == SECURITY_STATIC_WEP) {
-               wps->encr_types |= WPS_ENCR_WEP;
-               if (conf->auth_algs & WPA_AUTH_ALG_OPEN)
-                       wps->auth_types |= WPS_AUTH_OPEN;
-               if (conf->auth_algs & WPA_AUTH_ALG_SHARED)
-                       wps->auth_types |= WPS_AUTH_SHARED;
-       } else if (conf->ssid.security_policy == SECURITY_IEEE_802_1X) {
-               wps->auth_types |= WPS_AUTH_OPEN;
-               if (conf->default_wep_key_len)
-                       wps->encr_types |= WPS_ENCR_WEP;
-               else
-                       wps->encr_types |= WPS_ENCR_NONE;
        }
 
        if (conf->ssid.wpa_psk_file) {
@@ -768,19 +1097,15 @@ int hostapd_init_wps(struct hostapd_data *hapd,
                wps->network_key_len = os_strlen(conf->ssid.wpa_passphrase);
        } else if (conf->ssid.wpa_psk) {
                wps->network_key = os_malloc(2 * PMK_LEN + 1);
-               if (wps->network_key == NULL) {
-                       os_free(wps);
-                       return -1;
-               }
+               if (wps->network_key == NULL)
+                       goto fail;
                wpa_snprintf_hex((char *) wps->network_key, 2 * PMK_LEN + 1,
                                 conf->ssid.wpa_psk->psk, PMK_LEN);
                wps->network_key_len = 2 * PMK_LEN;
        } else if (conf->ssid.wep.keys_set && conf->ssid.wep.key[0]) {
                wps->network_key = os_malloc(conf->ssid.wep.len[0]);
-               if (wps->network_key == NULL) {
-                       os_free(wps);
-                       return -1;
-               }
+               if (wps->network_key == NULL)
+                       goto fail;
                os_memcpy(wps->network_key, conf->ssid.wep.key[0],
                          conf->ssid.wep.len[0]);
                wps->network_key_len = conf->ssid.wep.len[0];
@@ -791,6 +1116,8 @@ int hostapd_init_wps(struct hostapd_data *hapd,
                wps->psk_set = 1;
        }
 
+       wps->ap_auth_type = wps->auth_types;
+       wps->ap_encr_type = wps->encr_types;
        if (conf->wps_state == WPS_STATE_NOT_CONFIGURED) {
                /* Override parameters to enable security by default */
                wps->auth_types = WPS_AUTH_WPA2PSK | WPS_AUTH_WPAPSK;
@@ -814,15 +1141,17 @@ int hostapd_init_wps(struct hostapd_data *hapd,
        if (conf->ssid.security_policy == SECURITY_STATIC_WEP)
                cfg.static_wep_only = 1;
        cfg.dualband = interface_count(hapd->iface) > 1;
+       if ((wps->dev.rf_bands & (WPS_RF_50GHZ | WPS_RF_24GHZ)) ==
+           (WPS_RF_50GHZ | WPS_RF_24GHZ))
+               cfg.dualband = 1;
        if (cfg.dualband)
                wpa_printf(MSG_DEBUG, "WPS: Dualband AP");
+       cfg.force_per_enrollee_psk = conf->force_per_enrollee_psk;
 
        wps->registrar = wps_registrar_init(wps, &cfg);
        if (wps->registrar == NULL) {
                wpa_printf(MSG_ERROR, "Failed to initialize WPS Registrar");
-               os_free(wps->network_key);
-               os_free(wps);
-               return -1;
+               goto fail;
        }
 
 #ifdef CONFIG_WPS_UPNP
@@ -831,21 +1160,53 @@ int hostapd_init_wps(struct hostapd_data *hapd,
        wps->model_description = hapd->conf->model_description;
        wps->model_url = hapd->conf->model_url;
        wps->upc = hapd->conf->upc;
+#endif /* CONFIG_WPS_UPNP */
+
+       hostapd_register_probereq_cb(hapd, hostapd_wps_probe_req_rx, hapd);
 
+       hapd->wps = wps;
+
+       return 0;
+
+fail:
+       hostapd_free_wps(wps);
+       return -1;
+}
+
+
+int hostapd_init_wps_complete(struct hostapd_data *hapd)
+{
+       struct wps_context *wps = hapd->wps;
+
+       if (wps == NULL)
+               return 0;
+
+#ifdef CONFIG_WPS_UPNP
        if (hostapd_wps_upnp_init(hapd, wps) < 0) {
                wpa_printf(MSG_ERROR, "Failed to initialize WPS UPnP");
                wps_registrar_deinit(wps->registrar);
-               os_free(wps->network_key);
-               os_free(wps);
+               hostapd_free_wps(wps);
+               hapd->wps = NULL;
                return -1;
        }
 #endif /* CONFIG_WPS_UPNP */
 
-       hostapd_register_probereq_cb(hapd, hostapd_wps_probe_req_rx, hapd);
+       return 0;
+}
 
-       hapd->wps = wps;
 
-       return 0;
+static void hostapd_wps_nfc_clear(struct wps_context *wps)
+{
+#ifdef CONFIG_WPS_NFC
+       wpa_printf(MSG_DEBUG, "WPS: Clear NFC Tag context %p", wps);
+       wps->ap_nfc_dev_pw_id = 0;
+       wpabuf_free(wps->ap_nfc_dh_pubkey);
+       wps->ap_nfc_dh_pubkey = NULL;
+       wpabuf_free(wps->ap_nfc_dh_privkey);
+       wps->ap_nfc_dh_privkey = NULL;
+       wpabuf_free(wps->ap_nfc_dev_pw);
+       wps->ap_nfc_dev_pw = NULL;
+#endif /* CONFIG_WPS_NFC */
 }
 
 
@@ -853,22 +1214,19 @@ void hostapd_deinit_wps(struct hostapd_data *hapd)
 {
        eloop_cancel_timeout(hostapd_wps_reenable_ap_pin, hapd, NULL);
        eloop_cancel_timeout(hostapd_wps_ap_pin_timeout, hapd, NULL);
-       if (hapd->wps == NULL)
+       eloop_cancel_timeout(wps_reload_config, hapd->iface, NULL);
+       if (hapd->wps == NULL) {
+               hostapd_wps_clear_ies(hapd, 1);
                return;
+       }
 #ifdef CONFIG_WPS_UPNP
        hostapd_wps_upnp_deinit(hapd);
 #endif /* CONFIG_WPS_UPNP */
        wps_registrar_deinit(hapd->wps->registrar);
-       os_free(hapd->wps->network_key);
-       wps_device_data_free(&hapd->wps->dev);
-       wpabuf_free(hapd->wps->dh_pubkey);
-       wpabuf_free(hapd->wps->dh_privkey);
-       wpabuf_free(hapd->wps->oob_conf.pubkey_hash);
-       wpabuf_free(hapd->wps->oob_conf.dev_password);
        wps_free_pending_msgs(hapd->wps->upnp_msgs);
-       os_free(hapd->wps);
+       hostapd_free_wps(hapd->wps);
        hapd->wps = NULL;
-       hostapd_wps_clear_ies(hapd);
+       hostapd_wps_clear_ies(hapd, 1);
 }
 
 
@@ -885,6 +1243,8 @@ void hostapd_update_wps(struct hostapd_data *hapd)
        hapd->wps->upc = hapd->conf->upc;
 #endif /* CONFIG_WPS_UPNP */
 
+       hostapd_wps_set_vendor_ext(hapd, hapd->wps);
+
        if (hapd->conf->wps_state)
                wps_registrar_update_ie(hapd->wps->registrar);
        else
@@ -944,76 +1304,75 @@ int hostapd_wps_add_pin(struct hostapd_data *hapd, const u8 *addr,
 }
 
 
+struct wps_button_pushed_ctx {
+       const u8 *p2p_dev_addr;
+       unsigned int count;
+};
+
 static int wps_button_pushed(struct hostapd_data *hapd, void *ctx)
 {
-       if (hapd->wps == NULL)
-               return 0;
-       return wps_registrar_button_pushed(hapd->wps->registrar);
+       struct wps_button_pushed_ctx *data = ctx;
+
+       if (hapd->wps) {
+               data->count++;
+               return wps_registrar_button_pushed(hapd->wps->registrar,
+                                                  data->p2p_dev_addr);
+       }
+
+       return 0;
 }
 
 
-int hostapd_wps_button_pushed(struct hostapd_data *hapd)
+int hostapd_wps_button_pushed(struct hostapd_data *hapd,
+                             const u8 *p2p_dev_addr)
 {
-       return hostapd_wps_for_each(hapd, wps_button_pushed, NULL);
+       struct wps_button_pushed_ctx ctx;
+       int ret;
+
+       os_memset(&ctx, 0, sizeof(ctx));
+       ctx.p2p_dev_addr = p2p_dev_addr;
+       ret = hostapd_wps_for_each(hapd, wps_button_pushed, &ctx);
+       if (ret == 0 && !ctx.count)
+               ret = -1;
+       return ret;
 }
 
 
-#ifdef CONFIG_WPS_OOB
-int hostapd_wps_start_oob(struct hostapd_data *hapd, char *device_type,
-                         char *path, char *method, char *name)
-{
-       struct wps_context *wps = hapd->wps;
-       struct oob_device_data *oob_dev;
+struct wps_cancel_ctx {
+       unsigned int count;
+};
 
-       oob_dev = wps_get_oob_device(device_type);
-       if (oob_dev == NULL)
-               return -1;
-       oob_dev->device_path = path;
-       oob_dev->device_name = name;
-       wps->oob_conf.oob_method = wps_get_oob_method(method);
+static int wps_cancel(struct hostapd_data *hapd, void *ctx)
+{
+       struct wps_cancel_ctx *data = ctx;
 
-       if (wps->oob_conf.oob_method == OOB_METHOD_DEV_PWD_R) {
-               /*
-                * Use pre-configured DH keys in order to be able to write the
-                * key hash into the OOB file.
-                */
-               wpabuf_free(wps->dh_pubkey);
-               wpabuf_free(wps->dh_privkey);
-               wps->dh_privkey = NULL;
-               wps->dh_pubkey = dh_init(dh_groups_get(WPS_DH_GROUP),
-                                        &wps->dh_privkey);
-               wps->dh_pubkey = wpabuf_zeropad(wps->dh_pubkey, 192);
-               if (wps->dh_pubkey == NULL) {
-                       wpa_printf(MSG_ERROR, "WPS: Failed to initialize "
-                                  "Diffie-Hellman handshake");
-                       return -1;
-               }
+       if (hapd->wps) {
+               data->count++;
+               wps_registrar_wps_cancel(hapd->wps->registrar);
+               ap_for_each_sta(hapd, ap_sta_wps_cancel, NULL);
        }
 
-       if (wps_process_oob(wps, oob_dev, 1) < 0)
-               goto error;
+       return 0;
+}
 
-       if ((wps->oob_conf.oob_method == OOB_METHOD_DEV_PWD_E ||
-            wps->oob_conf.oob_method == OOB_METHOD_DEV_PWD_R) &&
-           hostapd_wps_add_pin(hapd, NULL, "any",
-                               wpabuf_head(wps->oob_conf.dev_password), 0) <
-           0)
-               goto error;
 
-       return 0;
+int hostapd_wps_cancel(struct hostapd_data *hapd)
+{
+       struct wps_cancel_ctx ctx;
+       int ret;
 
-error:
-       wpabuf_free(wps->dh_pubkey);
-       wps->dh_pubkey = NULL;
-       wpabuf_free(wps->dh_privkey);
-       wps->dh_privkey = NULL;
-       return -1;
+       os_memset(&ctx, 0, sizeof(ctx));
+       ret = hostapd_wps_for_each(hapd, wps_cancel, &ctx);
+       if (ret == 0 && !ctx.count)
+               ret = -1;
+       return ret;
 }
-#endif /* CONFIG_WPS_OOB */
 
 
-static int hostapd_wps_probe_req_rx(void *ctx, const u8 *addr,
-                                   const u8 *ie, size_t ie_len)
+static int hostapd_wps_probe_req_rx(void *ctx, const u8 *addr, const u8 *da,
+                                   const u8 *bssid,
+                                   const u8 *ie, size_t ie_len,
+                                   int ssi_signal)
 {
        struct hostapd_data *hapd = ctx;
        struct wpabuf *wps_ie;
@@ -1111,11 +1470,21 @@ static int hostapd_rx_req_put_wlan_response(
        }
 #endif /* CONFIG_WPS_STRICT */
 
-       if (!sta) {
+       if (!sta || !(sta->flags & WLAN_STA_WPS)) {
                wpa_printf(MSG_DEBUG, "WPS UPnP: No matching STA found");
                return 0;
        }
 
+       if (!sta->eapol_sm) {
+               /*
+                * This can happen, e.g., if an ER sends an extra message after
+                * the station has disassociated (but not fully
+                * deauthenticated).
+                */
+               wpa_printf(MSG_DEBUG, "WPS UPnP: Matching STA did not have EAPOL state machine initialized");
+               return 0;
+       }
+
        p = os_zalloc(sizeof(*p));
        if (p == NULL)
                return -1;
@@ -1144,26 +1513,19 @@ static int hostapd_wps_upnp_init(struct hostapd_data *hapd,
        if (hapd->conf->ap_pin)
                ctx->ap_pin = os_strdup(hapd->conf->ap_pin);
 
-       hapd->wps_upnp = upnp_wps_device_init(ctx, wps, hapd);
-       if (hapd->wps_upnp == NULL) {
-               os_free(ctx);
+       hapd->wps_upnp = upnp_wps_device_init(ctx, wps, hapd,
+                                             hapd->conf->upnp_iface);
+       if (hapd->wps_upnp == NULL)
                return -1;
-       }
        wps->wps_upnp = hapd->wps_upnp;
 
-       if (upnp_wps_device_start(hapd->wps_upnp, hapd->conf->upnp_iface)) {
-               upnp_wps_device_deinit(hapd->wps_upnp);
-               hapd->wps_upnp = NULL;
-               return -1;
-       }
-
        return 0;
 }
 
 
 static void hostapd_wps_upnp_deinit(struct hostapd_data *hapd)
 {
-       upnp_wps_device_deinit(hapd->wps_upnp);
+       upnp_wps_device_deinit(hapd->wps_upnp, hapd);
 }
 
 #endif /* CONFIG_WPS_UPNP */
@@ -1183,6 +1545,7 @@ static void hostapd_wps_ap_pin_timeout(void *eloop_data, void *user_ctx)
        struct hostapd_data *hapd = eloop_data;
        wpa_printf(MSG_DEBUG, "WPS: AP PIN timed out");
        hostapd_wps_ap_pin_disable(hapd);
+       wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_AP_PIN_DISABLED);
 }
 
 
@@ -1190,6 +1553,7 @@ static void hostapd_wps_ap_pin_enable(struct hostapd_data *hapd, int timeout)
 {
        wpa_printf(MSG_DEBUG, "WPS: Enabling AP PIN (timeout=%d)", timeout);
        hapd->ap_pin_failures = 0;
+       hapd->ap_pin_failures_consecutive = 0;
        hapd->conf->ap_setup_locked = 0;
        if (hapd->wps->ap_setup_locked) {
                wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_AP_SETUP_UNLOCKED);
@@ -1231,6 +1595,10 @@ struct wps_ap_pin_data {
 static int wps_ap_pin_set(struct hostapd_data *hapd, void *ctx)
 {
        struct wps_ap_pin_data *data = ctx;
+
+       if (!hapd->wps)
+               return 0;
+
        os_free(hapd->conf->ap_pin);
        hapd->conf->ap_pin = os_strdup(data->pin_txt);
 #ifdef CONFIG_WPS_UPNP
@@ -1247,7 +1615,7 @@ const char * hostapd_wps_ap_pin_random(struct hostapd_data *hapd, int timeout)
        struct wps_ap_pin_data data;
 
        pin = wps_generate_pin();
-       os_snprintf(data.pin_txt, sizeof(data.pin_txt), "%u", pin);
+       os_snprintf(data.pin_txt, sizeof(data.pin_txt), "%08u", pin);
        data.timeout = timeout;
        hostapd_wps_for_each(hapd, wps_ap_pin_set, &data);
        return hapd->conf->ap_pin;
@@ -1267,8 +1635,380 @@ int hostapd_wps_ap_pin_set(struct hostapd_data *hapd, const char *pin,
        int ret;
 
        ret = os_snprintf(data.pin_txt, sizeof(data.pin_txt), "%s", pin);
-       if (ret < 0 || ret >= (int) sizeof(data.pin_txt))
+       if (os_snprintf_error(sizeof(data.pin_txt), ret))
                return -1;
        data.timeout = timeout;
        return hostapd_wps_for_each(hapd, wps_ap_pin_set, &data);
 }
+
+
+static int wps_update_ie(struct hostapd_data *hapd, void *ctx)
+{
+       if (hapd->wps)
+               wps_registrar_update_ie(hapd->wps->registrar);
+       return 0;
+}
+
+
+void hostapd_wps_update_ie(struct hostapd_data *hapd)
+{
+       hostapd_wps_for_each(hapd, wps_update_ie, NULL);
+}
+
+
+int hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid,
+                         const char *auth, const char *encr, const char *key)
+{
+       struct wps_credential cred;
+       size_t len;
+
+       os_memset(&cred, 0, sizeof(cred));
+
+       len = os_strlen(ssid);
+       if ((len & 1) || len > 2 * sizeof(cred.ssid) ||
+           hexstr2bin(ssid, cred.ssid, len / 2))
+               return -1;
+       cred.ssid_len = len / 2;
+
+       if (os_strncmp(auth, "OPEN", 4) == 0)
+               cred.auth_type = WPS_AUTH_OPEN;
+       else if (os_strncmp(auth, "WPAPSK", 6) == 0)
+               cred.auth_type = WPS_AUTH_WPAPSK;
+       else if (os_strncmp(auth, "WPA2PSK", 7) == 0)
+               cred.auth_type = WPS_AUTH_WPA2PSK;
+       else
+               return -1;
+
+       if (encr) {
+               if (os_strncmp(encr, "NONE", 4) == 0)
+                       cred.encr_type = WPS_ENCR_NONE;
+               else if (os_strncmp(encr, "TKIP", 4) == 0)
+                       cred.encr_type = WPS_ENCR_TKIP;
+               else if (os_strncmp(encr, "CCMP", 4) == 0)
+                       cred.encr_type = WPS_ENCR_AES;
+               else
+                       return -1;
+       } else
+               cred.encr_type = WPS_ENCR_NONE;
+
+       if (key) {
+               len = os_strlen(key);
+               if ((len & 1) || len > 2 * sizeof(cred.key) ||
+                   hexstr2bin(key, cred.key, len / 2))
+                       return -1;
+               cred.key_len = len / 2;
+       }
+
+       return wps_registrar_config_ap(hapd->wps->registrar, &cred);
+}
+
+
+#ifdef CONFIG_WPS_NFC
+
+struct wps_nfc_password_token_data {
+       const u8 *oob_dev_pw;
+       size_t oob_dev_pw_len;
+       int added;
+};
+
+
+static int wps_add_nfc_password_token(struct hostapd_data *hapd, void *ctx)
+{
+       struct wps_nfc_password_token_data *data = ctx;
+       int ret;
+
+       if (hapd->wps == NULL)
+               return 0;
+       ret = wps_registrar_add_nfc_password_token(hapd->wps->registrar,
+                                                  data->oob_dev_pw,
+                                                  data->oob_dev_pw_len);
+       if (ret == 0)
+               data->added++;
+       return ret;
+}
+
+
+static int hostapd_wps_add_nfc_password_token(struct hostapd_data *hapd,
+                                             struct wps_parse_attr *attr)
+{
+       struct wps_nfc_password_token_data data;
+
+       data.oob_dev_pw = attr->oob_dev_password;
+       data.oob_dev_pw_len = attr->oob_dev_password_len;
+       data.added = 0;
+       if (hostapd_wps_for_each(hapd, wps_add_nfc_password_token, &data) < 0)
+               return -1;
+       return data.added ? 0 : -1;
+}
+
+
+static int hostapd_wps_nfc_tag_process(struct hostapd_data *hapd,
+                                      const struct wpabuf *wps)
+{
+       struct wps_parse_attr attr;
+
+       wpa_hexdump_buf(MSG_DEBUG, "WPS: Received NFC tag payload", wps);
+
+       if (wps_parse_msg(wps, &attr)) {
+               wpa_printf(MSG_DEBUG, "WPS: Ignore invalid data from NFC tag");
+               return -1;
+       }
+
+       if (attr.oob_dev_password)
+               return hostapd_wps_add_nfc_password_token(hapd, &attr);
+
+       wpa_printf(MSG_DEBUG, "WPS: Ignore unrecognized NFC tag");
+       return -1;
+}
+
+
+int hostapd_wps_nfc_tag_read(struct hostapd_data *hapd,
+                            const struct wpabuf *data)
+{
+       const struct wpabuf *wps = data;
+       struct wpabuf *tmp = NULL;
+       int ret;
+
+       if (wpabuf_len(data) < 4)
+               return -1;
+
+       if (*wpabuf_head_u8(data) != 0x10) {
+               /* Assume this contains full NDEF record */
+               tmp = ndef_parse_wifi(data);
+               if (tmp == NULL) {
+                       wpa_printf(MSG_DEBUG, "WPS: Could not parse NDEF");
+                       return -1;
+               }
+               wps = tmp;
+       }
+
+       ret = hostapd_wps_nfc_tag_process(hapd, wps);
+       wpabuf_free(tmp);
+       return ret;
+}
+
+
+struct wpabuf * hostapd_wps_nfc_config_token(struct hostapd_data *hapd,
+                                            int ndef)
+{
+       struct wpabuf *ret;
+
+       if (hapd->wps == NULL)
+               return NULL;
+
+       ret = wps_get_oob_cred(hapd->wps, hostapd_wps_rf_band_cb(hapd),
+                              hapd->iconf->channel);
+       if (ndef && ret) {
+               struct wpabuf *tmp;
+               tmp = ndef_build_wifi(ret);
+               wpabuf_free(ret);
+               if (tmp == NULL)
+                       return NULL;
+               ret = tmp;
+       }
+
+       return ret;
+}
+
+
+struct wpabuf * hostapd_wps_nfc_hs_cr(struct hostapd_data *hapd, int ndef)
+{
+       struct wpabuf *ret;
+
+       if (hapd->wps == NULL)
+               return NULL;
+
+       if (hapd->conf->wps_nfc_dh_pubkey == NULL) {
+               struct wps_context *wps = hapd->wps;
+               if (wps_nfc_gen_dh(&hapd->conf->wps_nfc_dh_pubkey,
+                                  &hapd->conf->wps_nfc_dh_privkey) < 0)
+                       return NULL;
+               hostapd_wps_nfc_clear(wps);
+               wps->ap_nfc_dev_pw_id = DEV_PW_NFC_CONNECTION_HANDOVER;
+               wps->ap_nfc_dh_pubkey =
+                       wpabuf_dup(hapd->conf->wps_nfc_dh_pubkey);
+               wps->ap_nfc_dh_privkey =
+                       wpabuf_dup(hapd->conf->wps_nfc_dh_privkey);
+               if (!wps->ap_nfc_dh_pubkey || !wps->ap_nfc_dh_privkey) {
+                       hostapd_wps_nfc_clear(wps);
+                       return NULL;
+               }
+       }
+
+       ret = wps_build_nfc_handover_sel(hapd->wps,
+                                        hapd->conf->wps_nfc_dh_pubkey,
+                                        hapd->own_addr, hapd->iface->freq);
+
+       if (ndef && ret) {
+               struct wpabuf *tmp;
+               tmp = ndef_build_wifi(ret);
+               wpabuf_free(ret);
+               if (tmp == NULL)
+                       return NULL;
+               ret = tmp;
+       }
+
+       return ret;
+}
+
+
+int hostapd_wps_nfc_report_handover(struct hostapd_data *hapd,
+                                   const struct wpabuf *req,
+                                   const struct wpabuf *sel)
+{
+       struct wpabuf *wps;
+       int ret = -1;
+       u16 wsc_len;
+       const u8 *pos;
+       struct wpabuf msg;
+       struct wps_parse_attr attr;
+       u16 dev_pw_id;
+
+       /*
+        * Enrollee/station is always initiator of the NFC connection handover,
+        * so use the request message here to find Enrollee public key hash.
+        */
+       wps = ndef_parse_wifi(req);
+       if (wps == NULL)
+               return -1;
+       wpa_printf(MSG_DEBUG, "WPS: Received application/vnd.wfa.wsc "
+                  "payload from NFC connection handover");
+       wpa_hexdump_buf(MSG_DEBUG, "WPS: NFC payload", wps);
+       if (wpabuf_len(wps) < 2) {
+               wpa_printf(MSG_DEBUG, "WPS: Too short Wi-Fi Handover Request "
+                          "Message");
+               goto out;
+       }
+       pos = wpabuf_head(wps);
+       wsc_len = WPA_GET_BE16(pos);
+       if (wsc_len > wpabuf_len(wps) - 2) {
+               wpa_printf(MSG_DEBUG, "WPS: Invalid WSC attribute length (%u) "
+                          "in rt Wi-Fi Handover Request Message", wsc_len);
+               goto out;
+       }
+       pos += 2;
+
+       wpa_hexdump(MSG_DEBUG,
+                   "WPS: WSC attributes in Wi-Fi Handover Request Message",
+                   pos, wsc_len);
+       if (wsc_len < wpabuf_len(wps) - 2) {
+               wpa_hexdump(MSG_DEBUG,
+                           "WPS: Ignore extra data after WSC attributes",
+                           pos + wsc_len, wpabuf_len(wps) - 2 - wsc_len);
+       }
+
+       wpabuf_set(&msg, pos, wsc_len);
+       ret = wps_parse_msg(&msg, &attr);
+       if (ret < 0) {
+               wpa_printf(MSG_DEBUG, "WPS: Could not parse WSC attributes in "
+                          "Wi-Fi Handover Request Message");
+               goto out;
+       }
+
+       if (attr.oob_dev_password == NULL ||
+           attr.oob_dev_password_len < WPS_OOB_PUBKEY_HASH_LEN + 2) {
+               wpa_printf(MSG_DEBUG, "WPS: No Out-of-Band Device Password "
+                          "included in Wi-Fi Handover Request Message");
+               ret = -1;
+               goto out;
+       }
+
+       if (attr.uuid_e == NULL) {
+               wpa_printf(MSG_DEBUG, "WPS: No UUID-E included in Wi-Fi "
+                          "Handover Request Message");
+               ret = -1;
+               goto out;
+       }
+
+       wpa_hexdump(MSG_DEBUG, "WPS: UUID-E", attr.uuid_e, WPS_UUID_LEN);
+
+       wpa_hexdump(MSG_DEBUG, "WPS: Out-of-Band Device Password",
+                   attr.oob_dev_password, attr.oob_dev_password_len);
+       dev_pw_id = WPA_GET_BE16(attr.oob_dev_password +
+                                WPS_OOB_PUBKEY_HASH_LEN);
+       if (dev_pw_id != DEV_PW_NFC_CONNECTION_HANDOVER) {
+               wpa_printf(MSG_DEBUG, "WPS: Unexpected OOB Device Password ID "
+                          "%u in Wi-Fi Handover Request Message", dev_pw_id);
+               ret = -1;
+               goto out;
+       }
+       wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Public Key hash",
+                   attr.oob_dev_password, WPS_OOB_PUBKEY_HASH_LEN);
+
+       ret = wps_registrar_add_nfc_pw_token(hapd->wps->registrar,
+                                            attr.oob_dev_password,
+                                            DEV_PW_NFC_CONNECTION_HANDOVER,
+                                            NULL, 0, 1);
+
+out:
+       wpabuf_free(wps);
+       return ret;
+}
+
+
+struct wpabuf * hostapd_wps_nfc_token_gen(struct hostapd_data *hapd, int ndef)
+{
+       if (hapd->conf->wps_nfc_pw_from_config) {
+               return wps_nfc_token_build(ndef,
+                                          hapd->conf->wps_nfc_dev_pw_id,
+                                          hapd->conf->wps_nfc_dh_pubkey,
+                                          hapd->conf->wps_nfc_dev_pw);
+       }
+
+       return wps_nfc_token_gen(ndef, &hapd->conf->wps_nfc_dev_pw_id,
+                                &hapd->conf->wps_nfc_dh_pubkey,
+                                &hapd->conf->wps_nfc_dh_privkey,
+                                &hapd->conf->wps_nfc_dev_pw);
+}
+
+
+int hostapd_wps_nfc_token_enable(struct hostapd_data *hapd)
+{
+       struct wps_context *wps = hapd->wps;
+       struct wpabuf *pw;
+
+       if (wps == NULL)
+               return -1;
+
+       if (!hapd->conf->wps_nfc_dh_pubkey ||
+           !hapd->conf->wps_nfc_dh_privkey ||
+           !hapd->conf->wps_nfc_dev_pw ||
+           !hapd->conf->wps_nfc_dev_pw_id)
+               return -1;
+
+       hostapd_wps_nfc_clear(wps);
+       wpa_printf(MSG_DEBUG,
+                  "WPS: Enable NFC Tag (Dev Pw Id %u) for AP interface %s (context %p)",
+                  hapd->conf->wps_nfc_dev_pw_id, hapd->conf->iface, wps);
+       wps->ap_nfc_dev_pw_id = hapd->conf->wps_nfc_dev_pw_id;
+       wps->ap_nfc_dh_pubkey = wpabuf_dup(hapd->conf->wps_nfc_dh_pubkey);
+       wps->ap_nfc_dh_privkey = wpabuf_dup(hapd->conf->wps_nfc_dh_privkey);
+       pw = hapd->conf->wps_nfc_dev_pw;
+       wps->ap_nfc_dev_pw = wpabuf_alloc(
+               wpabuf_len(pw) * 2 + 1);
+       if (wps->ap_nfc_dev_pw) {
+               wpa_snprintf_hex_uppercase(
+                       (char *) wpabuf_put(wps->ap_nfc_dev_pw,
+                                           wpabuf_len(pw) * 2),
+                       wpabuf_len(pw) * 2 + 1,
+                       wpabuf_head(pw), wpabuf_len(pw));
+       }
+
+       if (!wps->ap_nfc_dh_pubkey || !wps->ap_nfc_dh_privkey ||
+           !wps->ap_nfc_dev_pw) {
+               hostapd_wps_nfc_clear(wps);
+               return -1;
+       }
+
+       return 0;
+}
+
+
+void hostapd_wps_nfc_token_disable(struct hostapd_data *hapd)
+{
+       wpa_printf(MSG_DEBUG, "WPS: Disable NFC token for AP interface %s",
+                  hapd->conf->iface);
+       hostapd_wps_nfc_clear(hapd->wps);
+}
+
+#endif /* CONFIG_WPS_NFC */