Home | History | Annotate | Download | only in ap
      1 /*
      2  * hostapd / Radio Measurement (RRM)
      3  * Copyright(c) 2013 - 2016 Intel Mobile Communications GmbH.
      4  * Copyright(c) 2011 - 2016 Intel Corporation. All rights reserved.
      5  * Copyright (c) 2016-2017, Jouni Malinen <j (at) w1.fi>
      6  *
      7  * This software may be distributed under the terms of the BSD license.
      8  * See README for more details.
      9  */
     10 
     11 #include "utils/includes.h"
     12 
     13 #include "utils/common.h"
     14 #include "common/wpa_ctrl.h"
     15 #include "hostapd.h"
     16 #include "ap_drv_ops.h"
     17 #include "sta_info.h"
     18 #include "eloop.h"
     19 #include "neighbor_db.h"
     20 #include "rrm.h"
     21 
     22 #define HOSTAPD_RRM_REQUEST_TIMEOUT 5
     23 
     24 
     25 static void hostapd_lci_rep_timeout_handler(void *eloop_data, void *user_ctx)
     26 {
     27 	struct hostapd_data *hapd = eloop_data;
     28 
     29 	wpa_printf(MSG_DEBUG, "RRM: LCI request (token %u) timed out",
     30 		   hapd->lci_req_token);
     31 	hapd->lci_req_active = 0;
     32 }
     33 
     34 
     35 static void hostapd_handle_lci_report(struct hostapd_data *hapd, u8 token,
     36 				      const u8 *pos, size_t len)
     37 {
     38 	if (!hapd->lci_req_active || hapd->lci_req_token != token) {
     39 		wpa_printf(MSG_DEBUG, "Unexpected LCI report, token %u", token);
     40 		return;
     41 	}
     42 
     43 	hapd->lci_req_active = 0;
     44 	eloop_cancel_timeout(hostapd_lci_rep_timeout_handler, hapd, NULL);
     45 	wpa_printf(MSG_DEBUG, "LCI report token %u len %zu", token, len);
     46 }
     47 
     48 
     49 static void hostapd_range_rep_timeout_handler(void *eloop_data, void *user_ctx)
     50 {
     51 	struct hostapd_data *hapd = eloop_data;
     52 
     53 	wpa_printf(MSG_DEBUG, "RRM: Range request (token %u) timed out",
     54 		   hapd->range_req_token);
     55 	hapd->range_req_active = 0;
     56 }
     57 
     58 
     59 static void hostapd_handle_range_report(struct hostapd_data *hapd, u8 token,
     60 					const u8 *pos, size_t len)
     61 {
     62 	if (!hapd->range_req_active || hapd->range_req_token != token) {
     63 		wpa_printf(MSG_DEBUG, "Unexpected range report, token %u",
     64 			   token);
     65 		return;
     66 	}
     67 
     68 	hapd->range_req_active = 0;
     69 	eloop_cancel_timeout(hostapd_range_rep_timeout_handler, hapd, NULL);
     70 	wpa_printf(MSG_DEBUG, "Range report token %u len %zu", token, len);
     71 }
     72 
     73 
     74 static void hostapd_handle_beacon_report(struct hostapd_data *hapd,
     75 					 const u8 *addr, u8 token, u8 rep_mode,
     76 					 const u8 *pos, size_t len)
     77 {
     78 	char report[2 * 255 + 1];
     79 
     80 	wpa_printf(MSG_DEBUG, "Beacon report token %u len %zu from " MACSTR,
     81 		   token, len, MAC2STR(addr));
     82 	/* Skip to the beginning of the Beacon report */
     83 	if (len < 3)
     84 		return;
     85 	pos += 3;
     86 	len -= 3;
     87 	report[0] = '\0';
     88 	if (wpa_snprintf_hex(report, sizeof(report), pos, len) < 0)
     89 		return;
     90 	wpa_msg(hapd->msg_ctx, MSG_INFO, BEACON_RESP_RX MACSTR " %u %02x %s",
     91 		MAC2STR(addr), token, rep_mode, report);
     92 }
     93 
     94 
     95 static void hostapd_handle_radio_msmt_report(struct hostapd_data *hapd,
     96 					     const u8 *buf, size_t len)
     97 {
     98 	const struct ieee80211_mgmt *mgmt = (const struct ieee80211_mgmt *) buf;
     99 	const u8 *pos, *ie, *end;
    100 	u8 token, rep_mode;
    101 
    102 	end = buf + len;
    103 	token = mgmt->u.action.u.rrm.dialog_token;
    104 	pos = mgmt->u.action.u.rrm.variable;
    105 
    106 	while ((ie = get_ie(pos, end - pos, WLAN_EID_MEASURE_REPORT))) {
    107 		if (ie[1] < 3) {
    108 			wpa_printf(MSG_DEBUG, "Bad Measurement Report element");
    109 			break;
    110 		}
    111 
    112 		rep_mode = ie[3];
    113 		wpa_printf(MSG_DEBUG, "Measurement report mode 0x%x type %u",
    114 			   rep_mode, ie[4]);
    115 
    116 		switch (ie[4]) {
    117 		case MEASURE_TYPE_LCI:
    118 			hostapd_handle_lci_report(hapd, token, ie + 2, ie[1]);
    119 			break;
    120 		case MEASURE_TYPE_FTM_RANGE:
    121 			hostapd_handle_range_report(hapd, token, ie + 2, ie[1]);
    122 			break;
    123 		case MEASURE_TYPE_BEACON:
    124 			hostapd_handle_beacon_report(hapd, mgmt->sa, token,
    125 						     rep_mode, ie + 2, ie[1]);
    126 			break;
    127 		default:
    128 			wpa_printf(MSG_DEBUG,
    129 				   "Measurement report type %u is not supported",
    130 				   ie[4]);
    131 			break;
    132 		}
    133 
    134 		pos = ie + ie[1] + 2;
    135 	}
    136 }
    137 
    138 
    139 static u16 hostapd_parse_location_lci_req_age(const u8 *buf, size_t len)
    140 {
    141 	const u8 *subelem;
    142 
    143 	/* Range Request element + Location Subject + Maximum Age subelement */
    144 	if (len < 3 + 1 + 4)
    145 		return 0;
    146 
    147 	/* Subelements are arranged as IEs */
    148 	subelem = get_ie(buf + 4, len - 4, LCI_REQ_SUBELEM_MAX_AGE);
    149 	if (subelem && subelem[1] == 2)
    150 		return WPA_GET_LE16(subelem + 2);
    151 
    152 	return 0;
    153 }
    154 
    155 
    156 static int hostapd_check_lci_age(struct hostapd_neighbor_entry *nr, u16 max_age)
    157 {
    158 	struct os_time curr, diff;
    159 	unsigned long diff_l;
    160 
    161 	if (nr->stationary || max_age == 0xffff)
    162 		return 1;
    163 
    164 	if (!max_age)
    165 		return 0;
    166 
    167 	if (os_get_time(&curr))
    168 		return 0;
    169 
    170 	os_time_sub(&curr, &nr->lci_date, &diff);
    171 
    172 	/* avoid overflow */
    173 	if (diff.sec > 0xffff)
    174 		return 0;
    175 
    176 	/* LCI age is calculated in 10th of a second units. */
    177 	diff_l = diff.sec * 10 + diff.usec / 100000;
    178 
    179 	return max_age > diff_l;
    180 }
    181 
    182 
    183 static size_t hostapd_neighbor_report_len(struct wpabuf *buf,
    184 					  struct hostapd_neighbor_entry *nr,
    185 					  int send_lci, int send_civic)
    186 {
    187 	size_t len = 2 + wpabuf_len(nr->nr);
    188 
    189 	if (send_lci && nr->lci)
    190 		len += 2 + wpabuf_len(nr->lci);
    191 
    192 	if (send_civic && nr->civic)
    193 		len += 2 + wpabuf_len(nr->civic);
    194 
    195 	return len;
    196 }
    197 
    198 
    199 static void hostapd_send_nei_report_resp(struct hostapd_data *hapd,
    200 					 const u8 *addr, u8 dialog_token,
    201 					 struct wpa_ssid_value *ssid, u8 lci,
    202 					 u8 civic, u16 lci_max_age)
    203 {
    204 	struct hostapd_neighbor_entry *nr;
    205 	struct wpabuf *buf;
    206 	u8 *msmt_token;
    207 
    208 	/*
    209 	 * The number and length of the Neighbor Report elements in a Neighbor
    210 	 * Report frame is limited by the maximum allowed MMPDU size; + 3 bytes
    211 	 * of RRM header.
    212 	 */
    213 	buf = wpabuf_alloc(3 + IEEE80211_MAX_MMPDU_SIZE);
    214 	if (!buf)
    215 		return;
    216 
    217 	wpabuf_put_u8(buf, WLAN_ACTION_RADIO_MEASUREMENT);
    218 	wpabuf_put_u8(buf, WLAN_RRM_NEIGHBOR_REPORT_RESPONSE);
    219 	wpabuf_put_u8(buf, dialog_token);
    220 
    221 	dl_list_for_each(nr, &hapd->nr_db, struct hostapd_neighbor_entry,
    222 			 list) {
    223 		int send_lci;
    224 		size_t len;
    225 
    226 		if (ssid->ssid_len != nr->ssid.ssid_len ||
    227 		    os_memcmp(ssid->ssid, nr->ssid.ssid, ssid->ssid_len) != 0)
    228 			continue;
    229 
    230 		send_lci = (lci != 0) && hostapd_check_lci_age(nr, lci_max_age);
    231 		len = hostapd_neighbor_report_len(buf, nr, send_lci, civic);
    232 
    233 		if (len - 2 > 0xff) {
    234 			wpa_printf(MSG_DEBUG,
    235 				   "NR entry for " MACSTR " exceeds 0xFF bytes",
    236 				   MAC2STR(nr->bssid));
    237 			continue;
    238 		}
    239 
    240 		if (len > wpabuf_tailroom(buf))
    241 			break;
    242 
    243 		wpabuf_put_u8(buf, WLAN_EID_NEIGHBOR_REPORT);
    244 		wpabuf_put_u8(buf, len - 2);
    245 		wpabuf_put_buf(buf, nr->nr);
    246 
    247 		if (send_lci && nr->lci) {
    248 			wpabuf_put_u8(buf, WLAN_EID_MEASURE_REPORT);
    249 			wpabuf_put_u8(buf, wpabuf_len(nr->lci));
    250 			/*
    251 			 * Override measurement token - the first byte of the
    252 			 * Measurement Report element.
    253 			 */
    254 			msmt_token = wpabuf_put(buf, 0);
    255 			wpabuf_put_buf(buf, nr->lci);
    256 			*msmt_token = lci;
    257 		}
    258 
    259 		if (civic && nr->civic) {
    260 			wpabuf_put_u8(buf, WLAN_EID_MEASURE_REPORT);
    261 			wpabuf_put_u8(buf, wpabuf_len(nr->civic));
    262 			/*
    263 			 * Override measurement token - the first byte of the
    264 			 * Measurement Report element.
    265 			 */
    266 			msmt_token = wpabuf_put(buf, 0);
    267 			wpabuf_put_buf(buf, nr->civic);
    268 			*msmt_token = civic;
    269 		}
    270 	}
    271 
    272 	hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
    273 				wpabuf_head(buf), wpabuf_len(buf));
    274 	wpabuf_free(buf);
    275 }
    276 
    277 
    278 static void hostapd_handle_nei_report_req(struct hostapd_data *hapd,
    279 					  const u8 *buf, size_t len)
    280 {
    281 	const struct ieee80211_mgmt *mgmt = (const struct ieee80211_mgmt *) buf;
    282 	const u8 *pos, *ie, *end;
    283 	struct wpa_ssid_value ssid = {
    284 		.ssid_len = 0
    285 	};
    286 	u8 token;
    287 	u8 lci = 0, civic = 0; /* Measurement tokens */
    288 	u16 lci_max_age = 0;
    289 
    290 	if (!(hapd->conf->radio_measurements[0] &
    291 	      WLAN_RRM_CAPS_NEIGHBOR_REPORT))
    292 		return;
    293 
    294 	end = buf + len;
    295 
    296 	token = mgmt->u.action.u.rrm.dialog_token;
    297 	pos = mgmt->u.action.u.rrm.variable;
    298 	len = end - pos;
    299 
    300 	ie = get_ie(pos, len, WLAN_EID_SSID);
    301 	if (ie && ie[1] && ie[1] <= SSID_MAX_LEN) {
    302 		ssid.ssid_len = ie[1];
    303 		os_memcpy(ssid.ssid, ie + 2, ssid.ssid_len);
    304 	} else {
    305 		ssid.ssid_len = hapd->conf->ssid.ssid_len;
    306 		os_memcpy(ssid.ssid, hapd->conf->ssid.ssid, ssid.ssid_len);
    307 	}
    308 
    309 	while ((ie = get_ie(pos, len, WLAN_EID_MEASURE_REQUEST))) {
    310 		if (ie[1] < 3)
    311 			break;
    312 
    313 		wpa_printf(MSG_DEBUG,
    314 			   "Neighbor report request, measure type %u",
    315 			   ie[4]);
    316 
    317 		switch (ie[4]) { /* Measurement Type */
    318 		case MEASURE_TYPE_LCI:
    319 			lci = ie[2]; /* Measurement Token */
    320 			lci_max_age = hostapd_parse_location_lci_req_age(ie + 2,
    321 									 ie[1]);
    322 			break;
    323 		case MEASURE_TYPE_LOCATION_CIVIC:
    324 			civic = ie[2]; /* Measurement token */
    325 			break;
    326 		}
    327 
    328 		pos = ie + ie[1] + 2;
    329 		len = end - pos;
    330 	}
    331 
    332 	hostapd_send_nei_report_resp(hapd, mgmt->sa, token, &ssid, lci, civic,
    333 				     lci_max_age);
    334 }
    335 
    336 
    337 void hostapd_handle_radio_measurement(struct hostapd_data *hapd,
    338 				      const u8 *buf, size_t len)
    339 {
    340 	const struct ieee80211_mgmt *mgmt = (const struct ieee80211_mgmt *) buf;
    341 
    342 	/*
    343 	 * Check for enough bytes: header + (1B)Category + (1B)Action +
    344 	 * (1B)Dialog Token.
    345 	 */
    346 	if (len < IEEE80211_HDRLEN + 3)
    347 		return;
    348 
    349 	wpa_printf(MSG_DEBUG, "Radio measurement frame, action %u from " MACSTR,
    350 		   mgmt->u.action.u.rrm.action, MAC2STR(mgmt->sa));
    351 
    352 	switch (mgmt->u.action.u.rrm.action) {
    353 	case WLAN_RRM_RADIO_MEASUREMENT_REPORT:
    354 		hostapd_handle_radio_msmt_report(hapd, buf, len);
    355 		break;
    356 	case WLAN_RRM_NEIGHBOR_REPORT_REQUEST:
    357 		hostapd_handle_nei_report_req(hapd, buf, len);
    358 		break;
    359 	default:
    360 		wpa_printf(MSG_DEBUG, "RRM action %u is not supported",
    361 			   mgmt->u.action.u.rrm.action);
    362 		break;
    363 	}
    364 }
    365 
    366 
    367 int hostapd_send_lci_req(struct hostapd_data *hapd, const u8 *addr)
    368 {
    369 	struct wpabuf *buf;
    370 	struct sta_info *sta = ap_get_sta(hapd, addr);
    371 	int ret;
    372 
    373 	if (!sta || !(sta->flags & WLAN_STA_AUTHORIZED)) {
    374 		wpa_printf(MSG_INFO,
    375 			   "Request LCI: Destination address is not connected");
    376 		return -1;
    377 	}
    378 
    379 	if (!(sta->rrm_enabled_capa[1] & WLAN_RRM_CAPS_LCI_MEASUREMENT)) {
    380 		wpa_printf(MSG_INFO,
    381 			   "Request LCI: Station does not support LCI in RRM");
    382 		return -1;
    383 	}
    384 
    385 	if (hapd->lci_req_active) {
    386 		wpa_printf(MSG_DEBUG,
    387 			   "Request LCI: LCI request is already in process, overriding");
    388 		hapd->lci_req_active = 0;
    389 		eloop_cancel_timeout(hostapd_lci_rep_timeout_handler, hapd,
    390 				     NULL);
    391 	}
    392 
    393 	/* Measurement request (5) + Measurement element with LCI (10) */
    394 	buf = wpabuf_alloc(5 + 10);
    395 	if (!buf)
    396 		return -1;
    397 
    398 	hapd->lci_req_token++;
    399 	/* For wraparounds - the token must be nonzero */
    400 	if (!hapd->lci_req_token)
    401 		hapd->lci_req_token++;
    402 
    403 	wpabuf_put_u8(buf, WLAN_ACTION_RADIO_MEASUREMENT);
    404 	wpabuf_put_u8(buf, WLAN_RRM_RADIO_MEASUREMENT_REQUEST);
    405 	wpabuf_put_u8(buf, hapd->lci_req_token);
    406 	wpabuf_put_le16(buf, 0); /* Number of repetitions */
    407 
    408 	wpabuf_put_u8(buf, WLAN_EID_MEASURE_REQUEST);
    409 	wpabuf_put_u8(buf, 3 + 1 + 4);
    410 
    411 	wpabuf_put_u8(buf, 1); /* Measurement Token */
    412 	/*
    413 	 * Parallel and Enable bits are 0, Duration, Request, and Report are
    414 	 * reserved.
    415 	 */
    416 	wpabuf_put_u8(buf, 0);
    417 	wpabuf_put_u8(buf, MEASURE_TYPE_LCI);
    418 
    419 	wpabuf_put_u8(buf, LOCATION_SUBJECT_REMOTE);
    420 
    421 	wpabuf_put_u8(buf, LCI_REQ_SUBELEM_MAX_AGE);
    422 	wpabuf_put_u8(buf, 2);
    423 	wpabuf_put_le16(buf, 0xffff);
    424 
    425 	ret = hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
    426 				      wpabuf_head(buf), wpabuf_len(buf));
    427 	wpabuf_free(buf);
    428 	if (ret)
    429 		return ret;
    430 
    431 	hapd->lci_req_active = 1;
    432 
    433 	eloop_register_timeout(HOSTAPD_RRM_REQUEST_TIMEOUT, 0,
    434 			       hostapd_lci_rep_timeout_handler, hapd, NULL);
    435 
    436 	return 0;
    437 }
    438 
    439 
    440 int hostapd_send_range_req(struct hostapd_data *hapd, const u8 *addr,
    441 			   u16 random_interval, u8 min_ap,
    442 			   const u8 *responders, unsigned int n_responders)
    443 {
    444 	struct wpabuf *buf;
    445 	struct sta_info *sta;
    446 	u8 *len;
    447 	unsigned int i;
    448 	int ret;
    449 
    450 	wpa_printf(MSG_DEBUG, "Request range: dest addr " MACSTR
    451 		   " rand interval %u min AP %u n_responders %u", MAC2STR(addr),
    452 		   random_interval, min_ap, n_responders);
    453 
    454 	if (min_ap == 0 || min_ap > n_responders) {
    455 		wpa_printf(MSG_INFO, "Request range: Wrong min AP count");
    456 		return -1;
    457 	}
    458 
    459 	sta = ap_get_sta(hapd, addr);
    460 	if (!sta || !(sta->flags & WLAN_STA_AUTHORIZED)) {
    461 		wpa_printf(MSG_INFO,
    462 			   "Request range: Destination address is not connected");
    463 		return -1;
    464 	}
    465 
    466 	if (!(sta->rrm_enabled_capa[4] & WLAN_RRM_CAPS_FTM_RANGE_REPORT)) {
    467 		wpa_printf(MSG_ERROR,
    468 			   "Request range: Destination station does not support FTM range report in RRM");
    469 		return -1;
    470 	}
    471 
    472 	if (hapd->range_req_active) {
    473 		wpa_printf(MSG_DEBUG,
    474 			   "Request range: Range request is already in process; overriding");
    475 		hapd->range_req_active = 0;
    476 		eloop_cancel_timeout(hostapd_range_rep_timeout_handler, hapd,
    477 				     NULL);
    478 	}
    479 
    480 	/* Action + measurement type + token + reps + EID + len = 7 */
    481 	buf = wpabuf_alloc(7 + 255);
    482 	if (!buf)
    483 		return -1;
    484 
    485 	hapd->range_req_token++;
    486 	if (!hapd->range_req_token) /* For wraparounds */
    487 		hapd->range_req_token++;
    488 
    489 	/* IEEE P802.11-REVmc/D5.0, 9.6.7.2 */
    490 	wpabuf_put_u8(buf, WLAN_ACTION_RADIO_MEASUREMENT);
    491 	wpabuf_put_u8(buf, WLAN_RRM_RADIO_MEASUREMENT_REQUEST);
    492 	wpabuf_put_u8(buf, hapd->range_req_token); /* Dialog Token */
    493 	wpabuf_put_le16(buf, 0); /* Number of Repetitions */
    494 
    495 	/* IEEE P802.11-REVmc/D5.0, 9.4.2.21 */
    496 	wpabuf_put_u8(buf, WLAN_EID_MEASURE_REQUEST);
    497 	len = wpabuf_put(buf, 1); /* Length will be set later */
    498 
    499 	wpabuf_put_u8(buf, 1); /* Measurement Token */
    500 	/*
    501 	 * Parallel and Enable bits are 0; Duration, Request, and Report are
    502 	 * reserved.
    503 	 */
    504 	wpabuf_put_u8(buf, 0); /* Measurement Request Mode */
    505 	wpabuf_put_u8(buf, MEASURE_TYPE_FTM_RANGE); /* Measurement Type */
    506 
    507 	/* IEEE P802.11-REVmc/D5.0, 9.4.2.21.19 */
    508 	wpabuf_put_le16(buf, random_interval); /* Randomization Interval */
    509 	wpabuf_put_u8(buf, min_ap); /* Minimum AP Count */
    510 
    511 	/* FTM Range Subelements */
    512 
    513 	/*
    514 	 * Taking the neighbor report part of the range request from neighbor
    515 	 * database instead of requesting the separate bits of data from the
    516 	 * user.
    517 	 */
    518 	for (i = 0; i < n_responders; i++) {
    519 		struct hostapd_neighbor_entry *nr;
    520 
    521 		nr = hostapd_neighbor_get(hapd, responders + ETH_ALEN * i,
    522 					  NULL);
    523 		if (!nr) {
    524 			wpa_printf(MSG_INFO, "Missing neighbor report for "
    525 				   MACSTR, MAC2STR(responders + ETH_ALEN * i));
    526 			wpabuf_free(buf);
    527 			return -1;
    528 		}
    529 
    530 		if (wpabuf_tailroom(buf) < 2 + wpabuf_len(nr->nr)) {
    531 			wpa_printf(MSG_ERROR, "Too long range request");
    532 			wpabuf_free(buf);
    533 			return -1;
    534 		}
    535 
    536 		wpabuf_put_u8(buf, WLAN_EID_NEIGHBOR_REPORT);
    537 		wpabuf_put_u8(buf, wpabuf_len(nr->nr));
    538 		wpabuf_put_buf(buf, nr->nr);
    539 	}
    540 
    541 	/* Action + measurement type + token + reps + EID + len = 7 */
    542 	*len = wpabuf_len(buf) - 7;
    543 
    544 	ret = hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
    545 				      wpabuf_head(buf), wpabuf_len(buf));
    546 	wpabuf_free(buf);
    547 	if (ret)
    548 		return ret;
    549 
    550 	hapd->range_req_active = 1;
    551 
    552 	eloop_register_timeout(HOSTAPD_RRM_REQUEST_TIMEOUT, 0,
    553 			       hostapd_range_rep_timeout_handler, hapd, NULL);
    554 
    555 	return 0;
    556 }
    557 
    558 
    559 void hostapd_clean_rrm(struct hostapd_data *hapd)
    560 {
    561 	hostpad_free_neighbor_db(hapd);
    562 	eloop_cancel_timeout(hostapd_lci_rep_timeout_handler, hapd, NULL);
    563 	hapd->lci_req_active = 0;
    564 	eloop_cancel_timeout(hostapd_range_rep_timeout_handler, hapd, NULL);
    565 	hapd->range_req_active = 0;
    566 }
    567 
    568 
    569 int hostapd_send_beacon_req(struct hostapd_data *hapd, const u8 *addr,
    570 			    u8 req_mode, const struct wpabuf *req)
    571 {
    572 	struct wpabuf *buf;
    573 	struct sta_info *sta = ap_get_sta(hapd, addr);
    574 	int ret;
    575 	enum beacon_report_mode mode;
    576 	const u8 *pos;
    577 
    578 	/* Request data:
    579 	 * Operating Class (1), Channel Number (1), Randomization Interval (2),
    580 	 * Measurement Duration (2), Measurement Mode (1), BSSID (6),
    581 	 * Optional Subelements (variable)
    582 	 */
    583 	if (wpabuf_len(req) < 13) {
    584 		wpa_printf(MSG_INFO, "Beacon request: Too short request data");
    585 		return -1;
    586 	}
    587 	pos = wpabuf_head(req);
    588 	mode = pos[6];
    589 
    590 	if (!sta || !(sta->flags & WLAN_STA_AUTHORIZED)) {
    591 		wpa_printf(MSG_INFO,
    592 			   "Beacon request: " MACSTR " is not connected",
    593 			   MAC2STR(addr));
    594 		return -1;
    595 	}
    596 
    597 	switch (mode) {
    598 	case BEACON_REPORT_MODE_PASSIVE:
    599 		if (!(sta->rrm_enabled_capa[0] &
    600 		      WLAN_RRM_CAPS_BEACON_REPORT_PASSIVE)) {
    601 			wpa_printf(MSG_INFO,
    602 				   "Beacon request: " MACSTR
    603 				   " does not support passive beacon report",
    604 				   MAC2STR(addr));
    605 			return -1;
    606 		}
    607 		break;
    608 	case BEACON_REPORT_MODE_ACTIVE:
    609 		if (!(sta->rrm_enabled_capa[0] &
    610 		      WLAN_RRM_CAPS_BEACON_REPORT_ACTIVE)) {
    611 			wpa_printf(MSG_INFO,
    612 				   "Beacon request: " MACSTR
    613 				   " does not support active beacon report",
    614 				   MAC2STR(addr));
    615 			return -1;
    616 		}
    617 		break;
    618 	case BEACON_REPORT_MODE_TABLE:
    619 		if (!(sta->rrm_enabled_capa[0] &
    620 		      WLAN_RRM_CAPS_BEACON_REPORT_TABLE)) {
    621 			wpa_printf(MSG_INFO,
    622 				   "Beacon request: " MACSTR
    623 				   " does not support table beacon report",
    624 				   MAC2STR(addr));
    625 			return -1;
    626 		}
    627 		break;
    628 	default:
    629 		wpa_printf(MSG_INFO,
    630 			   "Beacon request: Unknown measurement mode %d", mode);
    631 		return -1;
    632 	}
    633 
    634 	buf = wpabuf_alloc(5 + 2 + 3 + wpabuf_len(req));
    635 	if (!buf)
    636 		return -1;
    637 
    638 	hapd->beacon_req_token++;
    639 	if (!hapd->beacon_req_token)
    640 		hapd->beacon_req_token++;
    641 
    642 	wpabuf_put_u8(buf, WLAN_ACTION_RADIO_MEASUREMENT);
    643 	wpabuf_put_u8(buf, WLAN_RRM_RADIO_MEASUREMENT_REQUEST);
    644 	wpabuf_put_u8(buf, hapd->beacon_req_token);
    645 	wpabuf_put_le16(buf, 0); /* Number of repetitions */
    646 
    647 	/* Measurement Request element */
    648 	wpabuf_put_u8(buf, WLAN_EID_MEASURE_REQUEST);
    649 	wpabuf_put_u8(buf, 3 + wpabuf_len(req));
    650 	wpabuf_put_u8(buf, 1); /* Measurement Token */
    651 	wpabuf_put_u8(buf, req_mode); /* Measurement Request Mode */
    652 	wpabuf_put_u8(buf, MEASURE_TYPE_BEACON); /* Measurement Type */
    653 	wpabuf_put_buf(buf, req);
    654 
    655 	ret = hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
    656 				      wpabuf_head(buf), wpabuf_len(buf));
    657 	wpabuf_free(buf);
    658 	if (ret < 0)
    659 		return ret;
    660 
    661 	return hapd->beacon_req_token;
    662 }
    663 
    664 
    665 void hostapd_rrm_beacon_req_tx_status(struct hostapd_data *hapd,
    666 				      const struct ieee80211_mgmt *mgmt,
    667 				      size_t len, int ok)
    668 {
    669 	if (len < 24 + 3)
    670 		return;
    671 	wpa_msg(hapd->msg_ctx, MSG_INFO, BEACON_REQ_TX_STATUS MACSTR
    672 		" %u ack=%d", MAC2STR(mgmt->da),
    673 		mgmt->u.action.u.rrm.dialog_token, ok);
    674 }
    675