2 * Received Data frame processing
3 * Copyright (c) 2010-2015, Jouni Malinen <j@w1.fi>
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
9 #include "utils/includes.h"
11 #include "utils/common.h"
12 #include "common/defs.h"
13 #include "common/ieee802_11_defs.h"
17 static const char * data_stype(u16 stype
)
20 case WLAN_FC_STYPE_DATA
:
22 case WLAN_FC_STYPE_DATA_CFACK
:
24 case WLAN_FC_STYPE_DATA_CFPOLL
:
26 case WLAN_FC_STYPE_DATA_CFACKPOLL
:
27 return "DATA-CFACKPOLL";
28 case WLAN_FC_STYPE_NULLFUNC
:
30 case WLAN_FC_STYPE_CFACK
:
32 case WLAN_FC_STYPE_CFPOLL
:
34 case WLAN_FC_STYPE_CFACKPOLL
:
36 case WLAN_FC_STYPE_QOS_DATA
:
38 case WLAN_FC_STYPE_QOS_DATA_CFACK
:
39 return "QOSDATA-CFACK";
40 case WLAN_FC_STYPE_QOS_DATA_CFPOLL
:
41 return "QOSDATA-CFPOLL";
42 case WLAN_FC_STYPE_QOS_DATA_CFACKPOLL
:
43 return "QOSDATA-CFACKPOLL";
44 case WLAN_FC_STYPE_QOS_NULL
:
46 case WLAN_FC_STYPE_QOS_CFPOLL
:
48 case WLAN_FC_STYPE_QOS_CFACKPOLL
:
49 return "QOS-CFACKPOLL";
55 static void rx_data_eth(struct wlantest
*wt
, const u8
*bssid
,
56 const u8
*sta_addr
, const u8
*dst
, const u8
*src
,
57 u16 ethertype
, const u8
*data
, size_t len
, int prot
,
62 rx_data_eapol(wt
, bssid
, sta_addr
, dst
, src
, data
, len
, prot
);
65 rx_data_ip(wt
, bssid
, sta_addr
, dst
, src
, data
, len
,
69 rx_data_80211_encap(wt
, bssid
, sta_addr
, dst
, src
, data
, len
);
75 static void rx_data_process(struct wlantest
*wt
, const u8
*bssid
,
77 const u8
*dst
, const u8
*src
,
78 const u8
*data
, size_t len
, int prot
,
84 if (len
>= 8 && os_memcmp(data
, "\xaa\xaa\x03\x00\x00\x00", 6) == 0) {
85 rx_data_eth(wt
, bssid
, sta_addr
, dst
, src
,
86 WPA_GET_BE16(data
+ 6), data
+ 8, len
- 8, prot
,
91 wpa_hexdump(MSG_DEBUG
, "Unrecognized LLC", data
, len
> 8 ? 8 : len
);
95 static u8
* try_all_ptk(struct wlantest
*wt
, int pairwise_cipher
,
96 const struct ieee80211_hdr
*hdr
,
97 const u8
*data
, size_t data_len
, size_t *decrypted_len
)
99 struct wlantest_ptk
*ptk
;
101 int prev_level
= wpa_debug_level
;
103 wpa_debug_level
= MSG_WARNING
;
104 dl_list_for_each(ptk
, &wt
->ptk
, struct wlantest_ptk
, list
) {
105 unsigned int tk_len
= ptk
->ptk_len
- 32;
107 if ((pairwise_cipher
== WPA_CIPHER_CCMP
||
108 pairwise_cipher
== 0) && tk_len
== 16) {
109 decrypted
= ccmp_decrypt(ptk
->ptk
.tk
, hdr
, data
,
110 data_len
, decrypted_len
);
111 } else if ((pairwise_cipher
== WPA_CIPHER_CCMP_256
||
112 pairwise_cipher
== 0) && tk_len
== 32) {
113 decrypted
= ccmp_256_decrypt(ptk
->ptk
.tk
, hdr
, data
,
114 data_len
, decrypted_len
);
115 } else if ((pairwise_cipher
== WPA_CIPHER_GCMP
||
116 pairwise_cipher
== WPA_CIPHER_GCMP_256
||
117 pairwise_cipher
== 0) &&
118 (tk_len
== 16 || tk_len
== 32)) {
119 decrypted
= gcmp_decrypt(ptk
->ptk
.tk
, tk_len
, hdr
,
120 data
, data_len
, decrypted_len
);
121 } else if ((pairwise_cipher
== WPA_CIPHER_TKIP
||
122 pairwise_cipher
== 0) && tk_len
== 32) {
123 decrypted
= tkip_decrypt(ptk
->ptk
.tk
, hdr
, data
,
124 data_len
, decrypted_len
);
127 wpa_debug_level
= prev_level
;
128 add_note(wt
, MSG_DEBUG
, "Found PTK match from list of all known PTKs");
132 wpa_debug_level
= prev_level
;
138 static void rx_data_bss_prot_group(struct wlantest
*wt
,
139 const struct ieee80211_hdr
*hdr
,
141 const u8
*qos
, const u8
*dst
, const u8
*src
,
142 const u8
*data
, size_t len
)
144 struct wlantest_bss
*bss
;
146 u8
*decrypted
= NULL
;
151 bss
= bss_get(wt
, hdr
->addr2
);
155 add_note(wt
, MSG_INFO
, "Too short group addressed data frame");
159 if (bss
->group_cipher
& (WPA_CIPHER_TKIP
| WPA_CIPHER_CCMP
) &&
161 add_note(wt
, MSG_INFO
, "Expected TKIP/CCMP frame from "
162 MACSTR
" did not have ExtIV bit set to 1",
163 MAC2STR(bss
->bssid
));
167 if (bss
->group_cipher
== WPA_CIPHER_TKIP
) {
168 if (data
[3] & 0x1f) {
169 add_note(wt
, MSG_INFO
, "TKIP frame from " MACSTR
170 " used non-zero reserved bit",
171 MAC2STR(bss
->bssid
));
173 if (data
[1] != ((data
[0] | 0x20) & 0x7f)) {
174 add_note(wt
, MSG_INFO
, "TKIP frame from " MACSTR
175 " used incorrect WEPSeed[1] (was 0x%x, "
177 MAC2STR(bss
->bssid
), data
[1],
178 (data
[0] | 0x20) & 0x7f);
180 } else if (bss
->group_cipher
== WPA_CIPHER_CCMP
) {
181 if (data
[2] != 0 || (data
[3] & 0x1f) != 0) {
182 add_note(wt
, MSG_INFO
, "CCMP frame from " MACSTR
183 " used non-zero reserved bit",
184 MAC2STR(bss
->bssid
));
188 keyid
= data
[3] >> 6;
189 if (bss
->gtk_len
[keyid
] == 0 && bss
->group_cipher
!= WPA_CIPHER_WEP40
)
191 add_note(wt
, MSG_MSGDUMP
, "No GTK known to decrypt the frame "
192 "(A2=" MACSTR
" KeyID=%d)",
193 MAC2STR(hdr
->addr2
), keyid
);
197 if (bss
->group_cipher
== WPA_CIPHER_TKIP
)
198 tkip_get_pn(pn
, data
);
199 else if (bss
->group_cipher
== WPA_CIPHER_WEP40
)
200 goto skip_replay_det
;
202 ccmp_get_pn(pn
, data
);
203 if (os_memcmp(pn
, bss
->rsc
[keyid
], 6) <= 0) {
204 u16 seq_ctrl
= le_to_host16(hdr
->seq_ctrl
);
205 add_note(wt
, MSG_INFO
, "CCMP/TKIP replay detected: A1=" MACSTR
206 " A2=" MACSTR
" A3=" MACSTR
" seq=%u frag=%u%s",
207 MAC2STR(hdr
->addr1
), MAC2STR(hdr
->addr2
),
209 WLAN_GET_SEQ_SEQ(seq_ctrl
),
210 WLAN_GET_SEQ_FRAG(seq_ctrl
),
211 (le_to_host16(hdr
->frame_control
) & WLAN_FC_RETRY
) ?
213 wpa_hexdump(MSG_INFO
, "RX PN", pn
, 6);
214 wpa_hexdump(MSG_INFO
, "RSC", bss
->rsc
[keyid
], 6);
219 if (bss
->group_cipher
== WPA_CIPHER_TKIP
)
220 decrypted
= tkip_decrypt(bss
->gtk
[keyid
], hdr
, data
, len
,
222 else if (bss
->group_cipher
== WPA_CIPHER_WEP40
)
223 decrypted
= wep_decrypt(wt
, hdr
, data
, len
, &dlen
);
224 else if (bss
->group_cipher
== WPA_CIPHER_CCMP
)
225 decrypted
= ccmp_decrypt(bss
->gtk
[keyid
], hdr
, data
, len
,
227 else if (bss
->group_cipher
== WPA_CIPHER_CCMP_256
)
228 decrypted
= ccmp_256_decrypt(bss
->gtk
[keyid
], hdr
, data
, len
,
230 else if (bss
->group_cipher
== WPA_CIPHER_GCMP
||
231 bss
->group_cipher
== WPA_CIPHER_GCMP_256
)
232 decrypted
= gcmp_decrypt(bss
->gtk
[keyid
], bss
->gtk_len
[keyid
],
233 hdr
, data
, len
, &dlen
);
236 rx_data_process(wt
, bss
->bssid
, NULL
, dst
, src
, decrypted
,
239 os_memcpy(bss
->rsc
[keyid
], pn
, 6);
240 write_pcap_decrypted(wt
, (const u8
*) hdr
, hdrlen
,
243 add_note(wt
, MSG_DEBUG
, "Failed to decrypt frame");
248 static void rx_data_bss_prot(struct wlantest
*wt
,
249 const struct ieee80211_hdr
*hdr
, size_t hdrlen
,
250 const u8
*qos
, const u8
*dst
, const u8
*src
,
251 const u8
*data
, size_t len
)
253 struct wlantest_bss
*bss
;
254 struct wlantest_sta
*sta
, *sta2
;
256 u16 fc
= le_to_host16(hdr
->frame_control
);
261 struct wlantest_tdls
*tdls
= NULL
, *found
;
263 int ptk_iter_done
= 0;
264 int try_ptk_iter
= 0;
267 if (hdr
->addr1
[0] & 0x01) {
268 rx_data_bss_prot_group(wt
, hdr
, hdrlen
, qos
, dst
, src
,
273 if ((fc
& (WLAN_FC_TODS
| WLAN_FC_FROMDS
)) ==
274 (WLAN_FC_TODS
| WLAN_FC_FROMDS
)) {
275 bss
= bss_find(wt
, hdr
->addr1
);
277 sta
= sta_find(bss
, hdr
->addr2
);
280 WLANTEST_STA_COUNTER_PROT_DATA_TX
]++;
282 bss
= bss_find(wt
, hdr
->addr2
);
285 sta
= sta_find(bss
, hdr
->addr1
);
287 } else if (fc
& WLAN_FC_TODS
) {
288 bss
= bss_get(wt
, hdr
->addr1
);
291 sta
= sta_get(bss
, hdr
->addr2
);
293 sta
->counters
[WLANTEST_STA_COUNTER_PROT_DATA_TX
]++;
294 } else if (fc
& WLAN_FC_FROMDS
) {
295 bss
= bss_get(wt
, hdr
->addr2
);
298 sta
= sta_get(bss
, hdr
->addr1
);
300 bss
= bss_get(wt
, hdr
->addr3
);
303 sta
= sta_find(bss
, hdr
->addr2
);
304 sta2
= sta_find(bss
, hdr
->addr1
);
305 if (sta
== NULL
|| sta2
== NULL
)
308 dl_list_for_each(tdls
, &bss
->tdls
, struct wlantest_tdls
, list
)
310 if ((tdls
->init
== sta
&& tdls
->resp
== sta2
) ||
311 (tdls
->init
== sta2
&& tdls
->resp
== sta
)) {
319 add_note(wt
, MSG_DEBUG
,
320 "TDLS: Link not up, but Data "
327 (!sta
->ptk_set
&& sta
->pairwise_cipher
!= WPA_CIPHER_WEP40
)) &&
329 add_note(wt
, MSG_MSGDUMP
, "No PTK known to decrypt the frame");
330 if (dl_list_empty(&wt
->ptk
))
336 add_note(wt
, MSG_INFO
, "Too short encrypted data frame");
342 if (sta
->pairwise_cipher
& (WPA_CIPHER_TKIP
| WPA_CIPHER_CCMP
) &&
344 add_note(wt
, MSG_INFO
, "Expected TKIP/CCMP frame from "
345 MACSTR
" did not have ExtIV bit set to 1",
350 if (tk
== NULL
&& sta
->pairwise_cipher
== WPA_CIPHER_TKIP
) {
351 if (data
[3] & 0x1f) {
352 add_note(wt
, MSG_INFO
, "TKIP frame from " MACSTR
353 " used non-zero reserved bit",
354 MAC2STR(hdr
->addr2
));
356 if (data
[1] != ((data
[0] | 0x20) & 0x7f)) {
357 add_note(wt
, MSG_INFO
, "TKIP frame from " MACSTR
358 " used incorrect WEPSeed[1] (was 0x%x, "
360 MAC2STR(hdr
->addr2
), data
[1],
361 (data
[0] | 0x20) & 0x7f);
363 } else if (tk
|| sta
->pairwise_cipher
== WPA_CIPHER_CCMP
) {
364 if (data
[2] != 0 || (data
[3] & 0x1f) != 0) {
365 add_note(wt
, MSG_INFO
, "CCMP frame from " MACSTR
366 " used non-zero reserved bit",
367 MAC2STR(hdr
->addr2
));
371 keyid
= data
[3] >> 6;
373 add_note(wt
, MSG_INFO
, "Unexpected non-zero KeyID %d in "
374 "individually addressed Data frame from " MACSTR
,
375 keyid
, MAC2STR(hdr
->addr2
));
380 if (fc
& WLAN_FC_TODS
)
386 if (fc
& WLAN_FC_TODS
)
392 if (os_memcmp(hdr
->addr2
, tdls
->init
->addr
, ETH_ALEN
) == 0)
393 rsc
= tdls
->rsc_init
[tid
];
395 rsc
= tdls
->rsc_resp
[tid
];
396 } else if (fc
& WLAN_FC_TODS
)
397 rsc
= sta
->rsc_tods
[tid
];
399 rsc
= sta
->rsc_fromds
[tid
];
402 if (tk
== NULL
&& sta
->pairwise_cipher
== WPA_CIPHER_TKIP
)
403 tkip_get_pn(pn
, data
);
404 else if (sta
->pairwise_cipher
== WPA_CIPHER_WEP40
)
405 goto skip_replay_det
;
407 ccmp_get_pn(pn
, data
);
408 if (os_memcmp(pn
, rsc
, 6) <= 0) {
409 u16 seq_ctrl
= le_to_host16(hdr
->seq_ctrl
);
410 add_note(wt
, MSG_INFO
, "CCMP/TKIP replay detected: A1=" MACSTR
411 " A2=" MACSTR
" A3=" MACSTR
" seq=%u frag=%u%s",
412 MAC2STR(hdr
->addr1
), MAC2STR(hdr
->addr2
),
414 WLAN_GET_SEQ_SEQ(seq_ctrl
),
415 WLAN_GET_SEQ_FRAG(seq_ctrl
),
416 (le_to_host16(hdr
->frame_control
) & WLAN_FC_RETRY
) ?
418 wpa_hexdump(MSG_INFO
, "RX PN", pn
, 6);
419 wpa_hexdump(MSG_INFO
, "RSC", rsc
, 6);
425 if (sta
->pairwise_cipher
== WPA_CIPHER_CCMP_256
)
426 decrypted
= ccmp_256_decrypt(tk
, hdr
, data
, len
, &dlen
);
427 else if (sta
->pairwise_cipher
== WPA_CIPHER_GCMP
||
428 sta
->pairwise_cipher
== WPA_CIPHER_GCMP_256
)
429 decrypted
= gcmp_decrypt(tk
, sta
->tk_len
, hdr
, data
,
432 decrypted
= ccmp_decrypt(tk
, hdr
, data
, len
, &dlen
);
433 } else if (sta
->pairwise_cipher
== WPA_CIPHER_TKIP
) {
434 decrypted
= tkip_decrypt(sta
->ptk
.tk
, hdr
, data
, len
, &dlen
);
435 } else if (sta
->pairwise_cipher
== WPA_CIPHER_WEP40
) {
436 decrypted
= wep_decrypt(wt
, hdr
, data
, len
, &dlen
);
437 } else if (sta
->ptk_set
) {
438 if (sta
->pairwise_cipher
== WPA_CIPHER_CCMP_256
)
439 decrypted
= ccmp_256_decrypt(sta
->ptk
.tk
, hdr
, data
,
441 else if (sta
->pairwise_cipher
== WPA_CIPHER_GCMP
||
442 sta
->pairwise_cipher
== WPA_CIPHER_GCMP_256
)
443 decrypted
= gcmp_decrypt(sta
->ptk
.tk
, sta
->tk_len
,
444 hdr
, data
, len
, &dlen
);
446 decrypted
= ccmp_decrypt(sta
->ptk
.tk
, hdr
, data
, len
,
449 decrypted
= try_all_ptk(wt
, sta
->pairwise_cipher
, hdr
, data
,
453 if (!decrypted
&& !ptk_iter_done
) {
454 decrypted
= try_all_ptk(wt
, sta
->pairwise_cipher
, hdr
, data
,
457 add_note(wt
, MSG_DEBUG
, "Current PTK did not work, but found a match from all known PTKs");
461 u16 fc
= le_to_host16(hdr
->frame_control
);
462 const u8
*peer_addr
= NULL
;
463 if (!(fc
& (WLAN_FC_FROMDS
| WLAN_FC_TODS
)))
464 peer_addr
= hdr
->addr1
;
466 os_memcpy(rsc
, pn
, 6);
467 rx_data_process(wt
, bss
->bssid
, sta
->addr
, dst
, src
, decrypted
,
469 write_pcap_decrypted(wt
, (const u8
*) hdr
, hdrlen
,
471 } else if (!try_ptk_iter
)
472 add_note(wt
, MSG_DEBUG
, "Failed to decrypt frame");
477 static void rx_data_bss(struct wlantest
*wt
, const struct ieee80211_hdr
*hdr
,
478 size_t hdrlen
, const u8
*qos
, const u8
*dst
,
479 const u8
*src
, const u8
*data
, size_t len
)
481 u16 fc
= le_to_host16(hdr
->frame_control
);
482 int prot
= !!(fc
& WLAN_FC_ISWEP
);
485 u8 ack
= (qos
[0] & 0x60) >> 5;
486 wpa_printf(MSG_MSGDUMP
, "BSS DATA: " MACSTR
" -> " MACSTR
487 " len=%u%s tid=%u%s%s",
488 MAC2STR(src
), MAC2STR(dst
), (unsigned int) len
,
489 prot
? " Prot" : "", qos
[0] & 0x0f,
490 (qos
[0] & 0x10) ? " EOSP" : "",
492 (ack
== 1 ? " NoAck" :
493 (ack
== 2 ? " NoExpAck" : " BA")));
495 wpa_printf(MSG_MSGDUMP
, "BSS DATA: " MACSTR
" -> " MACSTR
497 MAC2STR(src
), MAC2STR(dst
), (unsigned int) len
,
498 prot
? " Prot" : "");
502 rx_data_bss_prot(wt
, hdr
, hdrlen
, qos
, dst
, src
, data
, len
);
504 const u8
*bssid
, *sta_addr
, *peer_addr
;
505 struct wlantest_bss
*bss
;
507 if (fc
& WLAN_FC_TODS
) {
509 sta_addr
= hdr
->addr2
;
511 } else if (fc
& WLAN_FC_FROMDS
) {
513 sta_addr
= hdr
->addr1
;
517 sta_addr
= hdr
->addr2
;
518 peer_addr
= hdr
->addr1
;
521 bss
= bss_get(wt
, bssid
);
523 struct wlantest_sta
*sta
= sta_get(bss
, sta_addr
);
527 int tid
= qos
[0] & 0x0f;
528 if (fc
& WLAN_FC_TODS
)
533 if (fc
& WLAN_FC_TODS
)
541 rx_data_process(wt
, bssid
, sta_addr
, dst
, src
, data
, len
, 0,
547 static struct wlantest_tdls
* get_tdls(struct wlantest
*wt
, const u8
*bssid
,
551 struct wlantest_bss
*bss
;
552 struct wlantest_sta
*sta1
, *sta2
;
553 struct wlantest_tdls
*tdls
, *found
= NULL
;
555 bss
= bss_find(wt
, bssid
);
558 sta1
= sta_find(bss
, sta1_addr
);
561 sta2
= sta_find(bss
, sta2_addr
);
565 dl_list_for_each(tdls
, &bss
->tdls
, struct wlantest_tdls
, list
) {
566 if ((tdls
->init
== sta1
&& tdls
->resp
== sta2
) ||
567 (tdls
->init
== sta2
&& tdls
->resp
== sta1
)) {
578 static void add_direct_link(struct wlantest
*wt
, const u8
*bssid
,
579 const u8
*sta1_addr
, const u8
*sta2_addr
)
581 struct wlantest_tdls
*tdls
;
583 tdls
= get_tdls(wt
, bssid
, sta1_addr
, sta2_addr
);
588 tdls
->counters
[WLANTEST_TDLS_COUNTER_VALID_DIRECT_LINK
]++;
590 tdls
->counters
[WLANTEST_TDLS_COUNTER_INVALID_DIRECT_LINK
]++;
594 static void add_ap_path(struct wlantest
*wt
, const u8
*bssid
,
595 const u8
*sta1_addr
, const u8
*sta2_addr
)
597 struct wlantest_tdls
*tdls
;
599 tdls
= get_tdls(wt
, bssid
, sta1_addr
, sta2_addr
);
604 tdls
->counters
[WLANTEST_TDLS_COUNTER_INVALID_AP_PATH
]++;
606 tdls
->counters
[WLANTEST_TDLS_COUNTER_VALID_AP_PATH
]++;
610 void rx_data(struct wlantest
*wt
, const u8
*data
, size_t len
)
612 const struct ieee80211_hdr
*hdr
;
615 const u8
*qos
= NULL
;
620 hdr
= (const struct ieee80211_hdr
*) data
;
621 fc
= le_to_host16(hdr
->frame_control
);
622 stype
= WLAN_FC_GET_STYPE(fc
);
624 if ((fc
& (WLAN_FC_TODS
| WLAN_FC_FROMDS
)) ==
625 (WLAN_FC_TODS
| WLAN_FC_FROMDS
))
635 switch (fc
& (WLAN_FC_TODS
| WLAN_FC_FROMDS
)) {
637 wpa_printf(MSG_EXCESSIVE
, "DATA %s%s%s IBSS DA=" MACSTR
" SA="
638 MACSTR
" BSSID=" MACSTR
,
639 data_stype(WLAN_FC_GET_STYPE(fc
)),
640 fc
& WLAN_FC_PWRMGT
? " PwrMgt" : "",
641 fc
& WLAN_FC_ISWEP
? " Prot" : "",
642 MAC2STR(hdr
->addr1
), MAC2STR(hdr
->addr2
),
643 MAC2STR(hdr
->addr3
));
644 add_direct_link(wt
, hdr
->addr3
, hdr
->addr1
, hdr
->addr2
);
645 rx_data_bss(wt
, hdr
, hdrlen
, qos
, hdr
->addr1
, hdr
->addr2
,
646 data
+ hdrlen
, len
- hdrlen
);
649 wpa_printf(MSG_EXCESSIVE
, "DATA %s%s%s FromDS DA=" MACSTR
650 " BSSID=" MACSTR
" SA=" MACSTR
,
651 data_stype(WLAN_FC_GET_STYPE(fc
)),
652 fc
& WLAN_FC_PWRMGT
? " PwrMgt" : "",
653 fc
& WLAN_FC_ISWEP
? " Prot" : "",
654 MAC2STR(hdr
->addr1
), MAC2STR(hdr
->addr2
),
655 MAC2STR(hdr
->addr3
));
656 add_ap_path(wt
, hdr
->addr2
, hdr
->addr1
, hdr
->addr3
);
657 rx_data_bss(wt
, hdr
, hdrlen
, qos
, hdr
->addr1
, hdr
->addr3
,
658 data
+ hdrlen
, len
- hdrlen
);
661 wpa_printf(MSG_EXCESSIVE
, "DATA %s%s%s ToDS BSSID=" MACSTR
662 " SA=" MACSTR
" DA=" MACSTR
,
663 data_stype(WLAN_FC_GET_STYPE(fc
)),
664 fc
& WLAN_FC_PWRMGT
? " PwrMgt" : "",
665 fc
& WLAN_FC_ISWEP
? " Prot" : "",
666 MAC2STR(hdr
->addr1
), MAC2STR(hdr
->addr2
),
667 MAC2STR(hdr
->addr3
));
668 add_ap_path(wt
, hdr
->addr1
, hdr
->addr3
, hdr
->addr2
);
669 rx_data_bss(wt
, hdr
, hdrlen
, qos
, hdr
->addr3
, hdr
->addr2
,
670 data
+ hdrlen
, len
- hdrlen
);
672 case WLAN_FC_TODS
| WLAN_FC_FROMDS
:
673 wpa_printf(MSG_EXCESSIVE
, "DATA %s%s%s WDS RA=" MACSTR
" TA="
674 MACSTR
" DA=" MACSTR
" SA=" MACSTR
,
675 data_stype(WLAN_FC_GET_STYPE(fc
)),
676 fc
& WLAN_FC_PWRMGT
? " PwrMgt" : "",
677 fc
& WLAN_FC_ISWEP
? " Prot" : "",
678 MAC2STR(hdr
->addr1
), MAC2STR(hdr
->addr2
),
680 MAC2STR((const u8
*) (hdr
+ 1)));
681 rx_data_bss(wt
, hdr
, hdrlen
, qos
, hdr
->addr1
, hdr
->addr2
,
682 data
+ hdrlen
, len
- hdrlen
);