2009-12-27 20:07:47 +01:00
|
|
|
/*
|
|
|
|
* BSS table
|
2019-01-02 16:56:41 +01:00
|
|
|
* Copyright (c) 2009-2019, Jouni Malinen <j@w1.fi>
|
2009-12-27 20:07:47 +01:00
|
|
|
*
|
2012-02-11 15:46:35 +01:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2009-12-27 20:07:47 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "utils/includes.h"
|
|
|
|
|
|
|
|
#include "utils/common.h"
|
|
|
|
#include "utils/eloop.h"
|
|
|
|
#include "common/ieee802_11_defs.h"
|
|
|
|
#include "drivers/driver.h"
|
2016-05-13 13:36:36 +02:00
|
|
|
#include "eap_peer/eap.h"
|
2023-11-21 00:51:20 +01:00
|
|
|
#include "rsn_supp/wpa.h"
|
2009-12-27 20:07:47 +01:00
|
|
|
#include "wpa_supplicant_i.h"
|
2010-03-05 19:20:09 +01:00
|
|
|
#include "config.h"
|
2009-12-27 20:07:47 +01:00
|
|
|
#include "notify.h"
|
2010-01-03 19:27:32 +01:00
|
|
|
#include "scan.h"
|
2023-11-21 00:51:27 +01:00
|
|
|
#include "bssid_ignore.h"
|
2009-12-27 20:07:47 +01:00
|
|
|
#include "bss.h"
|
|
|
|
|
2012-09-04 16:08:58 +02:00
|
|
|
static void wpa_bss_set_hessid(struct wpa_bss *bss)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_INTERWORKING
|
|
|
|
const u8 *ie = wpa_bss_get_ie(bss, WLAN_EID_INTERWORKING);
|
|
|
|
if (ie == NULL || (ie[1] != 7 && ie[1] != 9)) {
|
|
|
|
os_memset(bss->hessid, 0, ETH_ALEN);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (ie[1] == 7)
|
|
|
|
os_memcpy(bss->hessid, ie + 3, ETH_ALEN);
|
|
|
|
else
|
|
|
|
os_memcpy(bss->hessid, ie + 5, ETH_ALEN);
|
|
|
|
#endif /* CONFIG_INTERWORKING */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_anqp_alloc - Allocate ANQP data structure for a BSS entry
|
|
|
|
* Returns: Allocated ANQP data structure or %NULL on failure
|
|
|
|
*
|
|
|
|
* The allocated ANQP data structure has its users count set to 1. It may be
|
|
|
|
* shared by multiple BSS entries and each shared entry is freed with
|
|
|
|
* wpa_bss_anqp_free().
|
|
|
|
*/
|
2012-09-04 15:02:29 +02:00
|
|
|
struct wpa_bss_anqp * wpa_bss_anqp_alloc(void)
|
|
|
|
{
|
|
|
|
struct wpa_bss_anqp *anqp;
|
|
|
|
anqp = os_zalloc(sizeof(*anqp));
|
|
|
|
if (anqp == NULL)
|
|
|
|
return NULL;
|
2015-10-07 15:10:38 +02:00
|
|
|
#ifdef CONFIG_INTERWORKING
|
|
|
|
dl_list_init(&anqp->anqp_elems);
|
|
|
|
#endif /* CONFIG_INTERWORKING */
|
2012-09-04 15:02:29 +02:00
|
|
|
anqp->users = 1;
|
|
|
|
return anqp;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_anqp_clone - Clone an ANQP data structure
|
|
|
|
* @anqp: ANQP data structure from wpa_bss_anqp_alloc()
|
|
|
|
* Returns: Cloned ANQP data structure or %NULL on failure
|
|
|
|
*/
|
2012-10-03 13:17:41 +02:00
|
|
|
static struct wpa_bss_anqp * wpa_bss_anqp_clone(struct wpa_bss_anqp *anqp)
|
|
|
|
{
|
|
|
|
struct wpa_bss_anqp *n;
|
|
|
|
|
|
|
|
n = os_zalloc(sizeof(*n));
|
|
|
|
if (n == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
#define ANQP_DUP(f) if (anqp->f) n->f = wpabuf_dup(anqp->f)
|
|
|
|
#ifdef CONFIG_INTERWORKING
|
2015-10-07 15:10:38 +02:00
|
|
|
dl_list_init(&n->anqp_elems);
|
2015-02-18 03:35:10 +01:00
|
|
|
ANQP_DUP(capability_list);
|
2012-10-03 13:17:41 +02:00
|
|
|
ANQP_DUP(venue_name);
|
|
|
|
ANQP_DUP(network_auth_type);
|
|
|
|
ANQP_DUP(roaming_consortium);
|
|
|
|
ANQP_DUP(ip_addr_type_availability);
|
|
|
|
ANQP_DUP(nai_realm);
|
|
|
|
ANQP_DUP(anqp_3gpp);
|
|
|
|
ANQP_DUP(domain_name);
|
2016-12-17 21:01:02 +01:00
|
|
|
ANQP_DUP(fils_realm_info);
|
2012-10-03 13:17:41 +02:00
|
|
|
#endif /* CONFIG_INTERWORKING */
|
|
|
|
#ifdef CONFIG_HS20
|
2015-02-18 03:35:09 +01:00
|
|
|
ANQP_DUP(hs20_capability_list);
|
2012-10-03 13:17:41 +02:00
|
|
|
ANQP_DUP(hs20_operator_friendly_name);
|
|
|
|
ANQP_DUP(hs20_wan_metrics);
|
|
|
|
ANQP_DUP(hs20_connection_capability);
|
|
|
|
ANQP_DUP(hs20_operating_class);
|
2013-01-08 22:51:16 +01:00
|
|
|
ANQP_DUP(hs20_osu_providers_list);
|
2018-04-16 12:16:39 +02:00
|
|
|
ANQP_DUP(hs20_operator_icon_metadata);
|
2018-10-05 19:51:51 +02:00
|
|
|
ANQP_DUP(hs20_osu_providers_nai_list);
|
2012-10-03 13:17:41 +02:00
|
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
#undef ANQP_DUP
|
|
|
|
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_anqp_unshare_alloc - Unshare ANQP data (if shared) in a BSS entry
|
|
|
|
* @bss: BSS entry
|
|
|
|
* Returns: 0 on success, -1 on failure
|
|
|
|
*
|
|
|
|
* This function ensures the specific BSS entry has an ANQP data structure that
|
|
|
|
* is not shared with any other BSS entry.
|
|
|
|
*/
|
2012-10-03 13:17:41 +02:00
|
|
|
int wpa_bss_anqp_unshare_alloc(struct wpa_bss *bss)
|
|
|
|
{
|
|
|
|
struct wpa_bss_anqp *anqp;
|
|
|
|
|
|
|
|
if (bss->anqp && bss->anqp->users > 1) {
|
|
|
|
/* allocated, but shared - clone an unshared copy */
|
|
|
|
anqp = wpa_bss_anqp_clone(bss->anqp);
|
|
|
|
if (anqp == NULL)
|
|
|
|
return -1;
|
|
|
|
anqp->users = 1;
|
|
|
|
bss->anqp->users--;
|
|
|
|
bss->anqp = anqp;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bss->anqp)
|
|
|
|
return 0; /* already allocated and not shared */
|
|
|
|
|
|
|
|
/* not allocated - allocate a new storage area */
|
|
|
|
bss->anqp = wpa_bss_anqp_alloc();
|
|
|
|
return bss->anqp ? 0 : -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_anqp_free - Free an ANQP data structure
|
|
|
|
* @anqp: ANQP data structure from wpa_bss_anqp_alloc() or wpa_bss_anqp_clone()
|
|
|
|
*/
|
2012-09-04 15:02:29 +02:00
|
|
|
static void wpa_bss_anqp_free(struct wpa_bss_anqp *anqp)
|
|
|
|
{
|
2015-10-07 15:10:38 +02:00
|
|
|
#ifdef CONFIG_INTERWORKING
|
|
|
|
struct wpa_bss_anqp_elem *elem;
|
|
|
|
#endif /* CONFIG_INTERWORKING */
|
|
|
|
|
2012-09-04 15:02:29 +02:00
|
|
|
if (anqp == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
anqp->users--;
|
|
|
|
if (anqp->users > 0) {
|
|
|
|
/* Another BSS entry holds a pointer to this ANQP info */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_INTERWORKING
|
2015-02-18 03:35:10 +01:00
|
|
|
wpabuf_free(anqp->capability_list);
|
2012-09-04 15:02:29 +02:00
|
|
|
wpabuf_free(anqp->venue_name);
|
|
|
|
wpabuf_free(anqp->network_auth_type);
|
|
|
|
wpabuf_free(anqp->roaming_consortium);
|
|
|
|
wpabuf_free(anqp->ip_addr_type_availability);
|
|
|
|
wpabuf_free(anqp->nai_realm);
|
|
|
|
wpabuf_free(anqp->anqp_3gpp);
|
|
|
|
wpabuf_free(anqp->domain_name);
|
2016-12-17 21:01:02 +01:00
|
|
|
wpabuf_free(anqp->fils_realm_info);
|
2015-10-07 15:10:38 +02:00
|
|
|
|
|
|
|
while ((elem = dl_list_first(&anqp->anqp_elems,
|
|
|
|
struct wpa_bss_anqp_elem, list))) {
|
|
|
|
dl_list_del(&elem->list);
|
|
|
|
wpabuf_free(elem->payload);
|
|
|
|
os_free(elem);
|
|
|
|
}
|
2012-09-04 15:02:29 +02:00
|
|
|
#endif /* CONFIG_INTERWORKING */
|
|
|
|
#ifdef CONFIG_HS20
|
2015-02-18 03:35:09 +01:00
|
|
|
wpabuf_free(anqp->hs20_capability_list);
|
2012-09-04 15:02:29 +02:00
|
|
|
wpabuf_free(anqp->hs20_operator_friendly_name);
|
|
|
|
wpabuf_free(anqp->hs20_wan_metrics);
|
|
|
|
wpabuf_free(anqp->hs20_connection_capability);
|
|
|
|
wpabuf_free(anqp->hs20_operating_class);
|
2013-01-08 22:51:16 +01:00
|
|
|
wpabuf_free(anqp->hs20_osu_providers_list);
|
2018-04-16 12:16:39 +02:00
|
|
|
wpabuf_free(anqp->hs20_operator_icon_metadata);
|
2018-10-05 19:51:51 +02:00
|
|
|
wpabuf_free(anqp->hs20_osu_providers_nai_list);
|
2012-09-04 15:02:29 +02:00
|
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
|
|
|
|
os_free(anqp);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-04-20 21:28:21 +02:00
|
|
|
static struct wpa_connect_work *
|
|
|
|
wpa_bss_check_pending_connect(struct wpa_supplicant *wpa_s, struct wpa_bss *bss)
|
2014-10-27 23:19:24 +01:00
|
|
|
{
|
|
|
|
struct wpa_radio_work *work;
|
|
|
|
struct wpa_connect_work *cwork;
|
|
|
|
|
|
|
|
work = radio_work_pending(wpa_s, "sme-connect");
|
|
|
|
if (!work)
|
|
|
|
work = radio_work_pending(wpa_s, "connect");
|
|
|
|
if (!work)
|
2023-04-20 21:28:21 +02:00
|
|
|
return NULL;
|
2014-10-27 23:19:24 +01:00
|
|
|
|
|
|
|
cwork = work->ctx;
|
2023-04-20 21:28:21 +02:00
|
|
|
if (cwork->bss != bss)
|
|
|
|
return NULL;
|
2014-10-27 23:19:24 +01:00
|
|
|
|
2023-04-20 21:28:21 +02:00
|
|
|
return cwork;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpa_bss_update_pending_connect(struct wpa_connect_work *cwork,
|
|
|
|
struct wpa_bss *new_bss)
|
|
|
|
{
|
2014-10-27 23:19:24 +01:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Update BSS pointer for the pending connect radio work");
|
|
|
|
cwork->bss = new_bss;
|
|
|
|
if (!new_bss)
|
|
|
|
cwork->bss_removed = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-09-05 16:33:07 +02:00
|
|
|
void wpa_bss_remove(struct wpa_supplicant *wpa_s, struct wpa_bss *bss,
|
|
|
|
const char *reason)
|
2009-12-27 20:07:47 +01:00
|
|
|
{
|
2023-04-20 21:28:21 +02:00
|
|
|
struct wpa_connect_work *cwork;
|
|
|
|
|
2012-09-02 18:53:15 +02:00
|
|
|
if (wpa_s->last_scan_res) {
|
|
|
|
unsigned int i;
|
|
|
|
for (i = 0; i < wpa_s->last_scan_res_used; i++) {
|
|
|
|
if (wpa_s->last_scan_res[i] == bss) {
|
|
|
|
os_memmove(&wpa_s->last_scan_res[i],
|
|
|
|
&wpa_s->last_scan_res[i + 1],
|
|
|
|
(wpa_s->last_scan_res_used - i - 1)
|
|
|
|
* sizeof(struct wpa_bss *));
|
|
|
|
wpa_s->last_scan_res_used--;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-04-20 21:28:21 +02:00
|
|
|
cwork = wpa_bss_check_pending_connect(wpa_s, bss);
|
|
|
|
if (cwork)
|
|
|
|
wpa_bss_update_pending_connect(cwork, NULL);
|
2009-12-27 20:07:47 +01:00
|
|
|
dl_list_del(&bss->list);
|
2009-12-27 23:30:38 +01:00
|
|
|
dl_list_del(&bss->list_id);
|
2009-12-27 20:07:47 +01:00
|
|
|
wpa_s->num_bss--;
|
2011-02-10 19:14:46 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Remove id %u BSSID " MACSTR
|
2012-06-04 20:52:08 +02:00
|
|
|
" SSID '%s' due to %s", bss->id, MAC2STR(bss->bssid),
|
|
|
|
wpa_ssid_txt(bss->ssid, bss->ssid_len), reason);
|
2009-12-27 23:42:51 +01:00
|
|
|
wpas_notify_bss_removed(wpa_s, bss->bssid, bss->id);
|
2012-09-04 15:02:29 +02:00
|
|
|
wpa_bss_anqp_free(bss->anqp);
|
2009-12-27 20:07:47 +01:00
|
|
|
os_free(bss);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get - Fetch a BSS table entry based on BSSID and SSID
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
2023-02-22 01:46:16 +01:00
|
|
|
* @bssid: BSSID, or %NULL to match any BSSID
|
2012-12-27 11:29:05 +01:00
|
|
|
* @ssid: SSID
|
|
|
|
* @ssid_len: Length of @ssid
|
|
|
|
* Returns: Pointer to the BSS entry or %NULL if not found
|
|
|
|
*/
|
2010-01-02 12:36:12 +01:00
|
|
|
struct wpa_bss * wpa_bss_get(struct wpa_supplicant *wpa_s, const u8 *bssid,
|
|
|
|
const u8 *ssid, size_t ssid_len)
|
2009-12-27 20:07:47 +01:00
|
|
|
{
|
|
|
|
struct wpa_bss *bss;
|
2023-02-22 01:46:16 +01:00
|
|
|
|
|
|
|
if (bssid && !wpa_supplicant_filter_bssid_match(wpa_s, bssid))
|
2012-02-16 15:30:13 +01:00
|
|
|
return NULL;
|
2009-12-27 20:07:47 +01:00
|
|
|
dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if ((!bssid || ether_addr_equal(bss->bssid, bssid)) &&
|
2009-12-27 20:07:47 +01:00
|
|
|
bss->ssid_len == ssid_len &&
|
|
|
|
os_memcmp(bss->ssid, ssid, ssid_len) == 0)
|
|
|
|
return bss;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-01-02 22:04:02 +01:00
|
|
|
void calculate_update_time(const struct os_reltime *fetch_time,
|
|
|
|
unsigned int age_ms,
|
|
|
|
struct os_reltime *update_time)
|
2009-12-27 20:07:47 +01:00
|
|
|
{
|
|
|
|
os_time_t usec;
|
|
|
|
|
2013-03-31 16:52:23 +02:00
|
|
|
update_time->sec = fetch_time->sec;
|
|
|
|
update_time->usec = fetch_time->usec;
|
|
|
|
update_time->sec -= age_ms / 1000;
|
|
|
|
usec = (age_ms % 1000) * 1000;
|
|
|
|
if (update_time->usec < usec) {
|
|
|
|
update_time->sec--;
|
|
|
|
update_time->usec += 1000000;
|
|
|
|
}
|
|
|
|
update_time->usec -= usec;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void wpa_bss_copy_res(struct wpa_bss *dst, struct wpa_scan_res *src,
|
2013-12-16 21:08:28 +01:00
|
|
|
struct os_reltime *fetch_time)
|
2013-03-31 16:52:23 +02:00
|
|
|
{
|
2009-12-27 20:07:47 +01:00
|
|
|
dst->flags = src->flags;
|
|
|
|
os_memcpy(dst->bssid, src->bssid, ETH_ALEN);
|
|
|
|
dst->freq = src->freq;
|
2023-11-08 04:58:05 +01:00
|
|
|
dst->max_cw = src->max_cw;
|
2009-12-27 20:07:47 +01:00
|
|
|
dst->beacon_int = src->beacon_int;
|
|
|
|
dst->caps = src->caps;
|
|
|
|
dst->qual = src->qual;
|
|
|
|
dst->noise = src->noise;
|
|
|
|
dst->level = src->level;
|
|
|
|
dst->tsf = src->tsf;
|
2022-04-24 11:06:56 +02:00
|
|
|
dst->beacon_newer = src->beacon_newer;
|
2015-02-22 09:50:55 +01:00
|
|
|
dst->est_throughput = src->est_throughput;
|
|
|
|
dst->snr = src->snr;
|
2009-12-27 20:07:47 +01:00
|
|
|
|
2013-03-31 16:52:23 +02:00
|
|
|
calculate_update_time(fetch_time, src->age, &dst->last_update);
|
2009-12-27 20:07:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-05-13 13:36:36 +02:00
|
|
|
static int wpa_bss_is_wps_candidate(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_bss *bss)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_WPS
|
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
struct wpabuf *wps_ie;
|
|
|
|
int pbc = 0, ret;
|
|
|
|
|
|
|
|
wps_ie = wpa_bss_get_vendor_ie_multi(bss, WPS_IE_VENDOR_TYPE);
|
|
|
|
if (!wps_ie)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (wps_is_selected_pbc_registrar(wps_ie)) {
|
|
|
|
pbc = 1;
|
|
|
|
} else if (!wps_is_addr_authorized(wps_ie, wpa_s->own_addr, 1)) {
|
|
|
|
wpabuf_free(wps_ie);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next) {
|
|
|
|
if (!(ssid->key_mgmt & WPA_KEY_MGMT_WPS))
|
|
|
|
continue;
|
|
|
|
if (ssid->ssid_len &&
|
|
|
|
(ssid->ssid_len != bss->ssid_len ||
|
|
|
|
os_memcmp(ssid->ssid, bss->ssid, ssid->ssid_len) != 0))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (pbc)
|
|
|
|
ret = eap_is_wps_pbc_enrollee(&ssid->eap);
|
|
|
|
else
|
|
|
|
ret = eap_is_wps_pin_enrollee(&ssid->eap);
|
|
|
|
wpabuf_free(wps_ie);
|
|
|
|
return ret;
|
|
|
|
}
|
2016-06-17 11:04:12 +02:00
|
|
|
wpabuf_free(wps_ie);
|
2016-05-13 13:36:36 +02:00
|
|
|
#endif /* CONFIG_WPS */
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-10-12 12:42:14 +02:00
|
|
|
static bool is_p2p_pending_bss(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_bss *bss)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_P2P
|
|
|
|
u8 addr[ETH_ALEN];
|
|
|
|
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(bss->bssid, wpa_s->pending_join_iface_addr))
|
2020-10-12 12:42:14 +02:00
|
|
|
return true;
|
|
|
|
if (!is_zero_ether_addr(wpa_s->pending_join_dev_addr) &&
|
2020-11-16 15:21:56 +01:00
|
|
|
p2p_parse_dev_addr(wpa_bss_ie_ptr(bss), bss->ie_len, addr) == 0 &&
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
ether_addr_equal(addr, wpa_s->pending_join_dev_addr))
|
2020-10-12 12:42:14 +02:00
|
|
|
return true;
|
|
|
|
#endif /* CONFIG_P2P */
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-16 12:22:58 +02:00
|
|
|
static int wpa_bss_known(struct wpa_supplicant *wpa_s, struct wpa_bss *bss)
|
|
|
|
{
|
|
|
|
struct wpa_ssid *ssid;
|
|
|
|
|
2020-10-12 12:42:14 +02:00
|
|
|
if (is_p2p_pending_bss(wpa_s, bss))
|
|
|
|
return 1;
|
|
|
|
|
2011-07-16 12:22:58 +02:00
|
|
|
for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next) {
|
|
|
|
if (ssid->ssid == NULL || ssid->ssid_len == 0)
|
|
|
|
continue;
|
|
|
|
if (ssid->ssid_len == bss->ssid_len &&
|
|
|
|
os_memcmp(ssid->ssid, bss->ssid, ssid->ssid_len) == 0)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-06-04 20:52:08 +02:00
|
|
|
static int wpa_bss_in_use(struct wpa_supplicant *wpa_s, struct wpa_bss *bss)
|
|
|
|
{
|
2022-09-08 16:44:11 +02:00
|
|
|
int i;
|
|
|
|
|
2015-08-25 19:31:40 +02:00
|
|
|
if (bss == wpa_s->current_bss)
|
|
|
|
return 1;
|
|
|
|
|
2023-06-12 21:59:49 +02:00
|
|
|
if (bss == wpa_s->ml_connect_probe_bss)
|
|
|
|
return 1;
|
|
|
|
|
2024-02-20 14:18:18 +01:00
|
|
|
#ifdef CONFIG_WNM
|
|
|
|
if (bss == wpa_s->wnm_target_bss)
|
|
|
|
return 1;
|
|
|
|
#endif /* CONFIG_WNM */
|
|
|
|
|
2015-08-25 19:31:40 +02:00
|
|
|
if (wpa_s->current_bss &&
|
|
|
|
(bss->ssid_len != wpa_s->current_bss->ssid_len ||
|
|
|
|
os_memcmp(bss->ssid, wpa_s->current_bss->ssid,
|
|
|
|
bss->ssid_len) != 0))
|
|
|
|
return 0; /* SSID has changed */
|
|
|
|
|
2022-09-08 16:44:11 +02:00
|
|
|
if (!is_zero_ether_addr(bss->bssid) &&
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
(ether_addr_equal(bss->bssid, wpa_s->bssid) ||
|
|
|
|
ether_addr_equal(bss->bssid, wpa_s->pending_bssid)))
|
2022-09-08 16:44:11 +02:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (!wpa_s->valid_links)
|
|
|
|
return 0;
|
|
|
|
|
2024-02-20 14:18:12 +01:00
|
|
|
for_each_link(wpa_s->valid_links, i) {
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(bss->bssid, wpa_s->links[i].bssid))
|
2022-09-08 16:44:11 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2012-06-04 20:52:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-16 12:22:58 +02:00
|
|
|
static int wpa_bss_remove_oldest_unknown(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
struct wpa_bss *bss;
|
|
|
|
|
|
|
|
dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
|
2016-05-13 13:36:36 +02:00
|
|
|
if (!wpa_bss_known(wpa_s, bss) &&
|
|
|
|
!wpa_bss_is_wps_candidate(wpa_s, bss)) {
|
2012-06-04 20:52:08 +02:00
|
|
|
wpa_bss_remove(wpa_s, bss, __func__);
|
2011-07-16 12:22:58 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-06-04 20:52:08 +02:00
|
|
|
static int wpa_bss_remove_oldest(struct wpa_supplicant *wpa_s)
|
2011-07-16 12:22:58 +02:00
|
|
|
{
|
2012-06-04 20:52:08 +02:00
|
|
|
struct wpa_bss *bss;
|
|
|
|
|
2011-07-16 12:22:58 +02:00
|
|
|
/*
|
|
|
|
* Remove the oldest entry that does not match with any configured
|
|
|
|
* network.
|
|
|
|
*/
|
|
|
|
if (wpa_bss_remove_oldest_unknown(wpa_s) == 0)
|
2012-06-04 20:52:08 +02:00
|
|
|
return 0;
|
2011-07-16 12:22:58 +02:00
|
|
|
|
|
|
|
/*
|
2012-06-04 20:52:08 +02:00
|
|
|
* Remove the oldest entry that isn't currently in use.
|
2011-07-16 12:22:58 +02:00
|
|
|
*/
|
2012-06-04 20:52:08 +02:00
|
|
|
dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
|
|
|
|
if (!wpa_bss_in_use(wpa_s, bss)) {
|
|
|
|
wpa_bss_remove(wpa_s, bss, __func__);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
2011-07-16 12:22:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-09-02 18:53:15 +02:00
|
|
|
static struct wpa_bss * wpa_bss_add(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *ssid, size_t ssid_len,
|
2013-02-12 18:14:32 +01:00
|
|
|
struct wpa_scan_res *res,
|
2013-12-16 21:08:28 +01:00
|
|
|
struct os_reltime *fetch_time)
|
2009-12-27 20:07:47 +01:00
|
|
|
{
|
|
|
|
struct wpa_bss *bss;
|
2022-09-08 16:44:15 +02:00
|
|
|
char extra[100];
|
|
|
|
const u8 *ml_ie;
|
|
|
|
char *pos, *end;
|
|
|
|
int ret = 0;
|
|
|
|
const u8 *mld_addr;
|
2009-12-27 20:07:47 +01:00
|
|
|
|
2010-01-16 15:11:05 +01:00
|
|
|
bss = os_zalloc(sizeof(*bss) + res->ie_len + res->beacon_ie_len);
|
2009-12-27 20:07:47 +01:00
|
|
|
if (bss == NULL)
|
2012-09-02 18:53:15 +02:00
|
|
|
return NULL;
|
2009-12-27 20:07:47 +01:00
|
|
|
bss->id = wpa_s->bss_next_id++;
|
|
|
|
bss->last_update_idx = wpa_s->bss_update_idx;
|
2013-02-12 18:14:32 +01:00
|
|
|
wpa_bss_copy_res(bss, res, fetch_time);
|
2009-12-27 20:07:47 +01:00
|
|
|
os_memcpy(bss->ssid, ssid, ssid_len);
|
|
|
|
bss->ssid_len = ssid_len;
|
|
|
|
bss->ie_len = res->ie_len;
|
2010-01-16 15:11:05 +01:00
|
|
|
bss->beacon_ie_len = res->beacon_ie_len;
|
2020-11-16 15:25:17 +01:00
|
|
|
os_memcpy(bss->ies, res + 1, res->ie_len + res->beacon_ie_len);
|
2012-09-04 16:08:58 +02:00
|
|
|
wpa_bss_set_hessid(bss);
|
2009-12-27 20:07:47 +01:00
|
|
|
|
2022-09-08 16:44:15 +02:00
|
|
|
os_memset(bss->mld_addr, 0, ETH_ALEN);
|
|
|
|
ml_ie = wpa_scan_get_ml_ie(res, MULTI_LINK_CONTROL_TYPE_BASIC);
|
|
|
|
if (ml_ie) {
|
|
|
|
mld_addr = get_basic_mle_mld_addr(&ml_ie[3], ml_ie[1] - 1);
|
|
|
|
if (mld_addr)
|
|
|
|
os_memcpy(bss->mld_addr, mld_addr, ETH_ALEN);
|
|
|
|
}
|
|
|
|
|
2013-09-27 14:47:09 +02:00
|
|
|
if (wpa_s->num_bss + 1 > wpa_s->conf->bss_max_count &&
|
|
|
|
wpa_bss_remove_oldest(wpa_s) != 0) {
|
|
|
|
wpa_printf(MSG_ERROR, "Increasing the MAX BSS count to %d "
|
|
|
|
"because all BSSes are in use. We should normally "
|
|
|
|
"not get here!", (int) wpa_s->num_bss + 1);
|
|
|
|
wpa_s->conf->bss_max_count = wpa_s->num_bss + 1;
|
|
|
|
}
|
|
|
|
|
2009-12-27 20:07:47 +01:00
|
|
|
dl_list_add_tail(&wpa_s->bss, &bss->list);
|
2009-12-27 23:30:38 +01:00
|
|
|
dl_list_add_tail(&wpa_s->bss_id, &bss->list_id);
|
2009-12-27 20:07:47 +01:00
|
|
|
wpa_s->num_bss++;
|
2022-09-08 16:44:15 +02:00
|
|
|
|
|
|
|
extra[0] = '\0';
|
|
|
|
pos = extra;
|
|
|
|
end = pos + sizeof(extra);
|
2019-06-05 20:09:57 +02:00
|
|
|
if (!is_zero_ether_addr(bss->hessid))
|
2022-09-08 16:44:15 +02:00
|
|
|
ret = os_snprintf(pos, end - pos, " HESSID " MACSTR,
|
|
|
|
MAC2STR(bss->hessid));
|
|
|
|
|
|
|
|
if (!is_zero_ether_addr(bss->mld_addr) &&
|
|
|
|
!os_snprintf_error(end - pos, ret)) {
|
|
|
|
pos += ret;
|
|
|
|
ret = os_snprintf(pos, end - pos, " MLD ADDR " MACSTR,
|
|
|
|
MAC2STR(bss->mld_addr));
|
|
|
|
}
|
|
|
|
|
2011-02-10 19:14:46 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Add new id %u BSSID " MACSTR
|
2019-06-05 20:09:57 +02:00
|
|
|
" SSID '%s' freq %d%s",
|
2015-09-05 19:40:44 +02:00
|
|
|
bss->id, MAC2STR(bss->bssid), wpa_ssid_txt(ssid, ssid_len),
|
2019-06-05 20:09:57 +02:00
|
|
|
bss->freq, extra);
|
2009-12-27 23:42:51 +01:00
|
|
|
wpas_notify_bss_added(wpa_s, bss->bssid, bss->id);
|
2012-09-02 18:53:15 +02:00
|
|
|
return bss;
|
2009-12-27 20:07:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-06 19:03:01 +01:00
|
|
|
static int are_ies_equal(const struct wpa_bss *old,
|
2015-04-26 12:09:47 +02:00
|
|
|
const struct wpa_scan_res *new_res, u32 ie)
|
2010-01-06 19:03:01 +01:00
|
|
|
{
|
|
|
|
const u8 *old_ie, *new_ie;
|
|
|
|
struct wpabuf *old_ie_buff = NULL;
|
|
|
|
struct wpabuf *new_ie_buff = NULL;
|
|
|
|
int new_ie_len, old_ie_len, ret, is_multi;
|
|
|
|
|
|
|
|
switch (ie) {
|
|
|
|
case WPA_IE_VENDOR_TYPE:
|
|
|
|
old_ie = wpa_bss_get_vendor_ie(old, ie);
|
2015-04-26 12:09:47 +02:00
|
|
|
new_ie = wpa_scan_get_vendor_ie(new_res, ie);
|
2010-01-06 19:03:01 +01:00
|
|
|
is_multi = 0;
|
|
|
|
break;
|
|
|
|
case WPS_IE_VENDOR_TYPE:
|
|
|
|
old_ie_buff = wpa_bss_get_vendor_ie_multi(old, ie);
|
2015-04-26 12:09:47 +02:00
|
|
|
new_ie_buff = wpa_scan_get_vendor_ie_multi(new_res, ie);
|
2010-01-06 19:03:01 +01:00
|
|
|
is_multi = 1;
|
|
|
|
break;
|
|
|
|
case WLAN_EID_RSN:
|
|
|
|
case WLAN_EID_SUPP_RATES:
|
|
|
|
case WLAN_EID_EXT_SUPP_RATES:
|
|
|
|
old_ie = wpa_bss_get_ie(old, ie);
|
2015-04-26 12:09:47 +02:00
|
|
|
new_ie = wpa_scan_get_ie(new_res, ie);
|
2010-01-06 19:03:01 +01:00
|
|
|
is_multi = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
wpa_printf(MSG_DEBUG, "bss: %s: cannot compare IEs", __func__);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_multi) {
|
|
|
|
/* in case of multiple IEs stored in buffer */
|
|
|
|
old_ie = old_ie_buff ? wpabuf_head_u8(old_ie_buff) : NULL;
|
|
|
|
new_ie = new_ie_buff ? wpabuf_head_u8(new_ie_buff) : NULL;
|
|
|
|
old_ie_len = old_ie_buff ? wpabuf_len(old_ie_buff) : 0;
|
|
|
|
new_ie_len = new_ie_buff ? wpabuf_len(new_ie_buff) : 0;
|
|
|
|
} else {
|
|
|
|
/* in case of single IE */
|
|
|
|
old_ie_len = old_ie ? old_ie[1] + 2 : 0;
|
|
|
|
new_ie_len = new_ie ? new_ie[1] + 2 : 0;
|
|
|
|
}
|
|
|
|
|
2011-04-14 01:25:43 +02:00
|
|
|
if (!old_ie || !new_ie)
|
|
|
|
ret = !old_ie && !new_ie;
|
|
|
|
else
|
|
|
|
ret = (old_ie_len == new_ie_len &&
|
|
|
|
os_memcmp(old_ie, new_ie, old_ie_len) == 0);
|
2010-01-06 19:03:01 +01:00
|
|
|
|
|
|
|
wpabuf_free(old_ie_buff);
|
|
|
|
wpabuf_free(new_ie_buff);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static u32 wpa_bss_compare_res(const struct wpa_bss *old,
|
2015-04-26 12:09:47 +02:00
|
|
|
const struct wpa_scan_res *new_res)
|
2010-01-06 19:03:01 +01:00
|
|
|
{
|
|
|
|
u32 changes = 0;
|
2015-04-26 12:09:47 +02:00
|
|
|
int caps_diff = old->caps ^ new_res->caps;
|
2010-01-06 19:03:01 +01:00
|
|
|
|
2015-04-26 12:09:47 +02:00
|
|
|
if (old->freq != new_res->freq)
|
2010-01-06 19:03:01 +01:00
|
|
|
changes |= WPA_BSS_FREQ_CHANGED_FLAG;
|
|
|
|
|
2015-04-26 12:09:47 +02:00
|
|
|
if (old->level != new_res->level)
|
2010-01-06 19:03:01 +01:00
|
|
|
changes |= WPA_BSS_SIGNAL_CHANGED_FLAG;
|
|
|
|
|
|
|
|
if (caps_diff & IEEE80211_CAP_PRIVACY)
|
|
|
|
changes |= WPA_BSS_PRIVACY_CHANGED_FLAG;
|
|
|
|
|
|
|
|
if (caps_diff & IEEE80211_CAP_IBSS)
|
|
|
|
changes |= WPA_BSS_MODE_CHANGED_FLAG;
|
|
|
|
|
2015-04-26 12:09:47 +02:00
|
|
|
if (old->ie_len == new_res->ie_len &&
|
2020-11-16 15:21:56 +01:00
|
|
|
os_memcmp(wpa_bss_ie_ptr(old), new_res + 1, old->ie_len) == 0)
|
2010-01-16 15:37:37 +01:00
|
|
|
return changes;
|
|
|
|
changes |= WPA_BSS_IES_CHANGED_FLAG;
|
|
|
|
|
2015-04-26 12:09:47 +02:00
|
|
|
if (!are_ies_equal(old, new_res, WPA_IE_VENDOR_TYPE))
|
2010-01-06 19:03:01 +01:00
|
|
|
changes |= WPA_BSS_WPAIE_CHANGED_FLAG;
|
|
|
|
|
2015-04-26 12:09:47 +02:00
|
|
|
if (!are_ies_equal(old, new_res, WLAN_EID_RSN))
|
2010-01-06 19:03:01 +01:00
|
|
|
changes |= WPA_BSS_RSNIE_CHANGED_FLAG;
|
|
|
|
|
2015-04-26 12:09:47 +02:00
|
|
|
if (!are_ies_equal(old, new_res, WPS_IE_VENDOR_TYPE))
|
2010-01-06 19:03:01 +01:00
|
|
|
changes |= WPA_BSS_WPS_CHANGED_FLAG;
|
|
|
|
|
2015-04-26 12:09:47 +02:00
|
|
|
if (!are_ies_equal(old, new_res, WLAN_EID_SUPP_RATES) ||
|
|
|
|
!are_ies_equal(old, new_res, WLAN_EID_EXT_SUPP_RATES))
|
2010-01-06 19:03:01 +01:00
|
|
|
changes |= WPA_BSS_RATES_CHANGED_FLAG;
|
|
|
|
|
|
|
|
return changes;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-11-03 20:20:01 +01:00
|
|
|
void notify_bss_changes(struct wpa_supplicant *wpa_s, u32 changes,
|
|
|
|
const struct wpa_bss *bss)
|
2010-01-06 19:03:01 +01:00
|
|
|
{
|
|
|
|
if (changes & WPA_BSS_FREQ_CHANGED_FLAG)
|
|
|
|
wpas_notify_bss_freq_changed(wpa_s, bss->id);
|
|
|
|
|
|
|
|
if (changes & WPA_BSS_SIGNAL_CHANGED_FLAG)
|
|
|
|
wpas_notify_bss_signal_changed(wpa_s, bss->id);
|
|
|
|
|
|
|
|
if (changes & WPA_BSS_PRIVACY_CHANGED_FLAG)
|
|
|
|
wpas_notify_bss_privacy_changed(wpa_s, bss->id);
|
|
|
|
|
|
|
|
if (changes & WPA_BSS_MODE_CHANGED_FLAG)
|
|
|
|
wpas_notify_bss_mode_changed(wpa_s, bss->id);
|
|
|
|
|
|
|
|
if (changes & WPA_BSS_WPAIE_CHANGED_FLAG)
|
|
|
|
wpas_notify_bss_wpaie_changed(wpa_s, bss->id);
|
|
|
|
|
|
|
|
if (changes & WPA_BSS_RSNIE_CHANGED_FLAG)
|
|
|
|
wpas_notify_bss_rsnie_changed(wpa_s, bss->id);
|
|
|
|
|
|
|
|
if (changes & WPA_BSS_WPS_CHANGED_FLAG)
|
|
|
|
wpas_notify_bss_wps_changed(wpa_s, bss->id);
|
|
|
|
|
2010-01-16 15:37:37 +01:00
|
|
|
if (changes & WPA_BSS_IES_CHANGED_FLAG)
|
|
|
|
wpas_notify_bss_ies_changed(wpa_s, bss->id);
|
|
|
|
|
2010-01-06 19:03:01 +01:00
|
|
|
if (changes & WPA_BSS_RATES_CHANGED_FLAG)
|
|
|
|
wpas_notify_bss_rates_changed(wpa_s, bss->id);
|
2014-09-04 20:10:54 +02:00
|
|
|
|
|
|
|
wpas_notify_bss_seen(wpa_s, bss->id);
|
2010-01-06 19:03:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-09-10 12:33:29 +02:00
|
|
|
static struct wpa_bss *
|
|
|
|
wpa_bss_update(struct wpa_supplicant *wpa_s, struct wpa_bss *bss,
|
2013-12-16 21:08:28 +01:00
|
|
|
struct wpa_scan_res *res, struct os_reltime *fetch_time)
|
2009-12-27 20:07:47 +01:00
|
|
|
{
|
2010-01-06 19:03:01 +01:00
|
|
|
u32 changes;
|
|
|
|
|
2016-12-03 18:26:47 +01:00
|
|
|
if (bss->last_update_idx == wpa_s->bss_update_idx) {
|
|
|
|
struct os_reltime update_time;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Some drivers (e.g., cfg80211) include multiple BSS entries
|
|
|
|
* for the same BSS if that BSS's channel changes. The BSS list
|
|
|
|
* implementation in wpa_supplicant does not do that and we need
|
|
|
|
* to filter out the obsolete results here to make sure only the
|
|
|
|
* most current BSS information remains in the table.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "BSS: " MACSTR
|
|
|
|
" has multiple entries in the scan results - select the most current one",
|
|
|
|
MAC2STR(bss->bssid));
|
|
|
|
calculate_update_time(fetch_time, res->age, &update_time);
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Previous last_update: %u.%06u (freq %d%s)",
|
|
|
|
(unsigned int) bss->last_update.sec,
|
|
|
|
(unsigned int) bss->last_update.usec,
|
|
|
|
bss->freq,
|
|
|
|
(bss->flags & WPA_BSS_ASSOCIATED) ? " assoc" : "");
|
|
|
|
wpa_printf(MSG_DEBUG, "New last_update: %u.%06u (freq %d%s)",
|
|
|
|
(unsigned int) update_time.sec,
|
|
|
|
(unsigned int) update_time.usec,
|
|
|
|
res->freq,
|
|
|
|
(res->flags & WPA_SCAN_ASSOCIATED) ? " assoc" : "");
|
|
|
|
if ((bss->flags & WPA_BSS_ASSOCIATED) ||
|
|
|
|
(!(res->flags & WPA_SCAN_ASSOCIATED) &&
|
|
|
|
!os_reltime_before(&bss->last_update, &update_time))) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Ignore this BSS entry since the previous update looks more current");
|
|
|
|
return bss;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Accept this BSS entry since it looks more current than the previous update");
|
|
|
|
}
|
|
|
|
|
2010-01-06 19:03:01 +01:00
|
|
|
changes = wpa_bss_compare_res(bss, res);
|
2015-09-05 19:40:44 +02:00
|
|
|
if (changes & WPA_BSS_FREQ_CHANGED_FLAG)
|
|
|
|
wpa_printf(MSG_DEBUG, "BSS: " MACSTR " changed freq %d --> %d",
|
|
|
|
MAC2STR(bss->bssid), bss->freq, res->freq);
|
2009-12-27 20:07:47 +01:00
|
|
|
bss->scan_miss_count = 0;
|
|
|
|
bss->last_update_idx = wpa_s->bss_update_idx;
|
2013-02-12 18:14:32 +01:00
|
|
|
wpa_bss_copy_res(bss, res, fetch_time);
|
2009-12-27 20:07:47 +01:00
|
|
|
/* Move the entry to the end of the list */
|
|
|
|
dl_list_del(&bss->list);
|
2013-09-27 20:03:16 +02:00
|
|
|
#ifdef CONFIG_P2P
|
|
|
|
if (wpa_bss_get_vendor_ie(bss, P2P_IE_VENDOR_TYPE) &&
|
2023-11-16 03:47:10 +01:00
|
|
|
!wpa_scan_get_vendor_ie(res, P2P_IE_VENDOR_TYPE) &&
|
|
|
|
!(changes & WPA_BSS_FREQ_CHANGED_FLAG)) {
|
2013-09-27 20:03:16 +02:00
|
|
|
/*
|
|
|
|
* This can happen when non-P2P station interface runs a scan
|
|
|
|
* without P2P IE in the Probe Request frame. P2P GO would reply
|
|
|
|
* to that with a Probe Response that does not include P2P IE.
|
|
|
|
* Do not update the IEs in this BSS entry to avoid such loss of
|
|
|
|
* information that may be needed for P2P operations to
|
|
|
|
* determine group information.
|
|
|
|
*/
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Do not update scan IEs for "
|
|
|
|
MACSTR " since that would remove P2P IE information",
|
|
|
|
MAC2STR(bss->bssid));
|
|
|
|
} else
|
|
|
|
#endif /* CONFIG_P2P */
|
2010-01-16 15:11:05 +01:00
|
|
|
if (bss->ie_len + bss->beacon_ie_len >=
|
|
|
|
res->ie_len + res->beacon_ie_len) {
|
2020-11-16 15:25:17 +01:00
|
|
|
os_memcpy(bss->ies, res + 1, res->ie_len + res->beacon_ie_len);
|
2009-12-27 20:07:47 +01:00
|
|
|
bss->ie_len = res->ie_len;
|
2010-01-16 15:11:05 +01:00
|
|
|
bss->beacon_ie_len = res->beacon_ie_len;
|
2009-12-27 20:07:47 +01:00
|
|
|
} else {
|
|
|
|
struct wpa_bss *nbss;
|
2010-01-03 00:25:43 +01:00
|
|
|
struct dl_list *prev = bss->list_id.prev;
|
2023-04-20 21:28:21 +02:00
|
|
|
struct wpa_connect_work *cwork;
|
|
|
|
unsigned int i;
|
|
|
|
bool update_current_bss = wpa_s->current_bss == bss;
|
|
|
|
bool update_ml_probe_bss = wpa_s->ml_connect_probe_bss == bss;
|
|
|
|
|
|
|
|
cwork = wpa_bss_check_pending_connect(wpa_s, bss);
|
|
|
|
|
|
|
|
for (i = 0; i < wpa_s->last_scan_res_used; i++) {
|
|
|
|
if (wpa_s->last_scan_res[i] == bss)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2010-01-03 00:25:43 +01:00
|
|
|
dl_list_del(&bss->list_id);
|
2010-01-16 15:11:05 +01:00
|
|
|
nbss = os_realloc(bss, sizeof(*bss) + res->ie_len +
|
|
|
|
res->beacon_ie_len);
|
2009-12-27 20:07:47 +01:00
|
|
|
if (nbss) {
|
2023-04-20 21:28:21 +02:00
|
|
|
if (i != wpa_s->last_scan_res_used)
|
|
|
|
wpa_s->last_scan_res[i] = nbss;
|
2023-06-12 21:59:49 +02:00
|
|
|
|
2023-04-20 21:28:21 +02:00
|
|
|
if (update_current_bss)
|
2012-03-05 16:09:55 +01:00
|
|
|
wpa_s->current_bss = nbss;
|
2023-06-12 21:59:49 +02:00
|
|
|
|
2023-04-20 21:28:21 +02:00
|
|
|
if (update_ml_probe_bss)
|
2023-06-12 21:59:49 +02:00
|
|
|
wpa_s->ml_connect_probe_bss = nbss;
|
|
|
|
|
2023-04-20 21:28:21 +02:00
|
|
|
if (cwork)
|
|
|
|
wpa_bss_update_pending_connect(cwork, nbss);
|
|
|
|
|
2009-12-27 20:07:47 +01:00
|
|
|
bss = nbss;
|
2020-11-16 15:25:17 +01:00
|
|
|
os_memcpy(bss->ies, res + 1,
|
2010-01-16 15:11:05 +01:00
|
|
|
res->ie_len + res->beacon_ie_len);
|
2009-12-27 20:07:47 +01:00
|
|
|
bss->ie_len = res->ie_len;
|
2010-01-16 15:11:05 +01:00
|
|
|
bss->beacon_ie_len = res->beacon_ie_len;
|
2009-12-27 20:07:47 +01:00
|
|
|
}
|
2010-01-03 00:25:43 +01:00
|
|
|
dl_list_add(prev, &bss->list_id);
|
2009-12-27 20:07:47 +01:00
|
|
|
}
|
2022-09-08 16:44:15 +02:00
|
|
|
if (changes & WPA_BSS_IES_CHANGED_FLAG) {
|
|
|
|
const u8 *ml_ie, *mld_addr;
|
|
|
|
|
2012-09-04 16:08:58 +02:00
|
|
|
wpa_bss_set_hessid(bss);
|
2022-09-08 16:44:15 +02:00
|
|
|
os_memset(bss->mld_addr, 0, ETH_ALEN);
|
|
|
|
ml_ie = wpa_scan_get_ml_ie(res, MULTI_LINK_CONTROL_TYPE_BASIC);
|
|
|
|
if (ml_ie) {
|
|
|
|
mld_addr = get_basic_mle_mld_addr(&ml_ie[3],
|
|
|
|
ml_ie[1] - 1);
|
|
|
|
if (mld_addr)
|
|
|
|
os_memcpy(bss->mld_addr, mld_addr, ETH_ALEN);
|
|
|
|
}
|
|
|
|
}
|
2009-12-27 20:07:47 +01:00
|
|
|
dl_list_add_tail(&wpa_s->bss, &bss->list);
|
2010-01-06 19:03:01 +01:00
|
|
|
|
|
|
|
notify_bss_changes(wpa_s, changes, bss);
|
2012-09-10 12:33:29 +02:00
|
|
|
|
|
|
|
return bss;
|
2009-12-27 20:07:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_update_start - Start a BSS table update from scan results
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
*
|
|
|
|
* This function is called at the start of each BSS table update round for new
|
|
|
|
* scan results. The actual scan result entries are indicated with calls to
|
|
|
|
* wpa_bss_update_scan_res() and the update round is finished with a call to
|
|
|
|
* wpa_bss_update_end().
|
|
|
|
*/
|
2009-12-27 20:07:47 +01:00
|
|
|
void wpa_bss_update_start(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
wpa_s->bss_update_idx++;
|
2011-02-10 19:14:46 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Start scan result update %u",
|
|
|
|
wpa_s->bss_update_idx);
|
2012-09-02 18:53:15 +02:00
|
|
|
wpa_s->last_scan_res_used = 0;
|
2009-12-27 20:07:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_update_scan_res - Update a BSS table entry based on a scan result
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* @res: Scan result
|
2013-02-12 18:14:32 +01:00
|
|
|
* @fetch_time: Time when the result was fetched from the driver
|
2012-12-27 11:29:05 +01:00
|
|
|
*
|
|
|
|
* This function updates a BSS table entry (or adds one) based on a scan result.
|
|
|
|
* This is called separately for each scan result between the calls to
|
|
|
|
* wpa_bss_update_start() and wpa_bss_update_end().
|
|
|
|
*/
|
2009-12-27 20:07:47 +01:00
|
|
|
void wpa_bss_update_scan_res(struct wpa_supplicant *wpa_s,
|
2013-02-12 18:14:32 +01:00
|
|
|
struct wpa_scan_res *res,
|
2013-12-16 21:08:28 +01:00
|
|
|
struct os_reltime *fetch_time)
|
2009-12-27 20:07:47 +01:00
|
|
|
{
|
2014-09-01 06:23:32 +02:00
|
|
|
const u8 *ssid, *p2p, *mesh;
|
2009-12-27 20:07:47 +01:00
|
|
|
struct wpa_bss *bss;
|
|
|
|
|
2013-03-31 16:52:23 +02:00
|
|
|
if (wpa_s->conf->ignore_old_scan_res) {
|
2013-12-16 21:08:28 +01:00
|
|
|
struct os_reltime update;
|
2013-03-31 16:52:23 +02:00
|
|
|
calculate_update_time(fetch_time, res->age, &update);
|
2013-12-16 21:08:28 +01:00
|
|
|
if (os_reltime_before(&update, &wpa_s->scan_trigger_time)) {
|
|
|
|
struct os_reltime age;
|
|
|
|
os_reltime_sub(&wpa_s->scan_trigger_time, &update,
|
|
|
|
&age);
|
2013-03-31 16:52:23 +02:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Ignore driver BSS "
|
|
|
|
"table entry that is %u.%06u seconds older "
|
|
|
|
"than our scan trigger",
|
|
|
|
(unsigned int) age.sec,
|
|
|
|
(unsigned int) age.usec);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-12-27 20:07:47 +01:00
|
|
|
ssid = wpa_scan_get_ie(res, WLAN_EID_SSID);
|
|
|
|
if (ssid == NULL) {
|
2011-02-10 19:14:46 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "BSS: No SSID IE included for "
|
|
|
|
MACSTR, MAC2STR(res->bssid));
|
2009-12-27 20:07:47 +01:00
|
|
|
return;
|
|
|
|
}
|
2015-04-07 11:00:13 +02:00
|
|
|
if (ssid[1] > SSID_MAX_LEN) {
|
2011-02-10 19:14:46 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Too long SSID IE included for "
|
|
|
|
MACSTR, MAC2STR(res->bssid));
|
2009-12-27 20:07:47 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2010-07-18 23:30:25 +02:00
|
|
|
p2p = wpa_scan_get_vendor_ie(res, P2P_IE_VENDOR_TYPE);
|
2012-04-06 13:58:22 +02:00
|
|
|
#ifdef CONFIG_P2P
|
|
|
|
if (p2p == NULL &&
|
|
|
|
wpa_s->p2p_group_interface != NOT_P2P_GROUP_INTERFACE) {
|
|
|
|
/*
|
|
|
|
* If it's a P2P specific interface, then don't update
|
|
|
|
* the scan result without a P2P IE.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "BSS: No P2P IE - skipping BSS " MACSTR
|
|
|
|
" update for P2P interface", MAC2STR(res->bssid));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_P2P */
|
2010-07-18 23:30:25 +02:00
|
|
|
if (p2p && ssid[1] == P2P_WILDCARD_SSID_LEN &&
|
|
|
|
os_memcmp(ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN) == 0)
|
|
|
|
return; /* Skip P2P listen discovery results here */
|
|
|
|
|
2009-12-27 20:07:47 +01:00
|
|
|
/* TODO: add option for ignoring BSSes we are not interested in
|
|
|
|
* (to save memory) */
|
2014-09-01 06:23:32 +02:00
|
|
|
|
|
|
|
mesh = wpa_scan_get_ie(res, WLAN_EID_MESH_ID);
|
2015-04-07 11:00:13 +02:00
|
|
|
if (mesh && mesh[1] <= SSID_MAX_LEN)
|
2014-09-01 06:23:32 +02:00
|
|
|
ssid = mesh;
|
|
|
|
|
2009-12-27 20:07:47 +01:00
|
|
|
bss = wpa_bss_get(wpa_s, res->bssid, ssid + 2, ssid[1]);
|
|
|
|
if (bss == NULL)
|
2013-02-12 18:14:32 +01:00
|
|
|
bss = wpa_bss_add(wpa_s, ssid + 2, ssid[1], res, fetch_time);
|
2013-09-27 15:00:50 +02:00
|
|
|
else {
|
2013-02-12 18:14:32 +01:00
|
|
|
bss = wpa_bss_update(wpa_s, bss, res, fetch_time);
|
2013-09-27 15:00:50 +02:00
|
|
|
if (wpa_s->last_scan_res) {
|
|
|
|
unsigned int i;
|
|
|
|
for (i = 0; i < wpa_s->last_scan_res_used; i++) {
|
|
|
|
if (bss == wpa_s->last_scan_res[i]) {
|
|
|
|
/* Already in the list */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-09-02 18:53:15 +02:00
|
|
|
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
|
|
|
if (wpa_s->last_scan_res_used >= wpa_s->last_scan_res_size) {
|
|
|
|
struct wpa_bss **n;
|
|
|
|
unsigned int siz;
|
|
|
|
if (wpa_s->last_scan_res_size == 0)
|
|
|
|
siz = 32;
|
|
|
|
else
|
|
|
|
siz = wpa_s->last_scan_res_size * 2;
|
|
|
|
n = os_realloc_array(wpa_s->last_scan_res, siz,
|
|
|
|
sizeof(struct wpa_bss *));
|
|
|
|
if (n == NULL)
|
|
|
|
return;
|
|
|
|
wpa_s->last_scan_res = n;
|
|
|
|
wpa_s->last_scan_res_size = siz;
|
|
|
|
}
|
|
|
|
|
2014-04-25 22:19:47 +02:00
|
|
|
if (wpa_s->last_scan_res)
|
|
|
|
wpa_s->last_scan_res[wpa_s->last_scan_res_used++] = bss;
|
2009-12-27 20:07:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-02 12:57:44 +01:00
|
|
|
static int wpa_bss_included_in_scan(const struct wpa_bss *bss,
|
|
|
|
const struct scan_info *info)
|
|
|
|
{
|
|
|
|
int found;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if (info == NULL)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (info->num_freqs) {
|
|
|
|
found = 0;
|
|
|
|
for (i = 0; i < info->num_freqs; i++) {
|
|
|
|
if (bss->freq == info->freqs[i]) {
|
|
|
|
found = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!found)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info->num_ssids) {
|
|
|
|
found = 0;
|
|
|
|
for (i = 0; i < info->num_ssids; i++) {
|
|
|
|
const struct wpa_driver_scan_ssid *s = &info->ssids[i];
|
|
|
|
if ((s->ssid == NULL || s->ssid_len == 0) ||
|
|
|
|
(s->ssid_len == bss->ssid_len &&
|
|
|
|
os_memcmp(s->ssid, bss->ssid, bss->ssid_len) ==
|
|
|
|
0)) {
|
|
|
|
found = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!found)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_update_end - End a BSS table update from scan results
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* @info: Information about scan parameters
|
|
|
|
* @new_scan: Whether this update round was based on a new scan
|
|
|
|
*
|
|
|
|
* This function is called at the end of each BSS table update round for new
|
|
|
|
* scan results. The start of the update was indicated with a call to
|
|
|
|
* wpa_bss_update_start().
|
|
|
|
*/
|
2010-01-02 12:57:44 +01:00
|
|
|
void wpa_bss_update_end(struct wpa_supplicant *wpa_s, struct scan_info *info,
|
|
|
|
int new_scan)
|
2009-12-27 20:07:47 +01:00
|
|
|
{
|
|
|
|
struct wpa_bss *bss, *n;
|
|
|
|
|
2013-12-16 21:08:44 +01:00
|
|
|
os_get_reltime(&wpa_s->last_scan);
|
2015-10-14 11:26:31 +02:00
|
|
|
if ((info && info->aborted) || !new_scan)
|
2010-01-02 12:57:44 +01:00
|
|
|
return; /* do not expire entries without new scan */
|
2009-12-27 20:07:47 +01:00
|
|
|
|
|
|
|
dl_list_for_each_safe(bss, n, &wpa_s->bss, struct wpa_bss, list) {
|
2010-01-03 09:55:31 +01:00
|
|
|
if (wpa_bss_in_use(wpa_s, bss))
|
|
|
|
continue;
|
2010-01-02 12:57:44 +01:00
|
|
|
if (!wpa_bss_included_in_scan(bss, info))
|
|
|
|
continue; /* expire only BSSes that were scanned */
|
2009-12-27 20:07:47 +01:00
|
|
|
if (bss->last_update_idx < wpa_s->bss_update_idx)
|
|
|
|
bss->scan_miss_count++;
|
2011-03-20 11:40:59 +01:00
|
|
|
if (bss->scan_miss_count >=
|
|
|
|
wpa_s->conf->bss_expiration_scan_count) {
|
2012-06-04 20:52:08 +02:00
|
|
|
wpa_bss_remove(wpa_s, bss, "no match in scan");
|
2009-12-27 20:07:47 +01:00
|
|
|
}
|
|
|
|
}
|
2012-09-02 18:53:15 +02:00
|
|
|
|
2020-03-22 16:30:23 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "BSS: last_scan_res_used=%zu/%zu",
|
2013-12-26 15:38:05 +01:00
|
|
|
wpa_s->last_scan_res_used, wpa_s->last_scan_res_size);
|
2009-12-27 20:07:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_flush_by_age - Flush old BSS entries
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* @age: Maximum entry age in seconds
|
|
|
|
*
|
|
|
|
* Remove BSS entries that have not been updated during the last @age seconds.
|
|
|
|
*/
|
2011-03-20 11:02:33 +01:00
|
|
|
void wpa_bss_flush_by_age(struct wpa_supplicant *wpa_s, int age)
|
2009-12-27 20:07:47 +01:00
|
|
|
{
|
|
|
|
struct wpa_bss *bss, *n;
|
2013-12-16 21:08:28 +01:00
|
|
|
struct os_reltime t;
|
2009-12-27 20:07:47 +01:00
|
|
|
|
|
|
|
if (dl_list_empty(&wpa_s->bss))
|
|
|
|
return;
|
|
|
|
|
2013-12-16 21:08:28 +01:00
|
|
|
os_get_reltime(&t);
|
2023-01-09 21:09:10 +01:00
|
|
|
|
|
|
|
if (t.sec < age)
|
|
|
|
return; /* avoid underflow; there can be no older entries */
|
|
|
|
|
2011-03-20 11:02:33 +01:00
|
|
|
t.sec -= age;
|
2009-12-27 20:07:47 +01:00
|
|
|
|
|
|
|
dl_list_for_each_safe(bss, n, &wpa_s->bss, struct wpa_bss, list) {
|
2010-01-03 09:55:31 +01:00
|
|
|
if (wpa_bss_in_use(wpa_s, bss))
|
|
|
|
continue;
|
2009-12-27 20:07:47 +01:00
|
|
|
|
2022-11-04 08:54:20 +01:00
|
|
|
if (wpa_s->reassoc_same_ess &&
|
|
|
|
wpa_s->wpa_state != WPA_COMPLETED &&
|
|
|
|
wpa_s->last_ssid &&
|
|
|
|
bss->ssid_len == wpa_s->last_ssid->ssid_len &&
|
|
|
|
os_memcmp(bss->ssid, wpa_s->last_ssid->ssid,
|
|
|
|
bss->ssid_len) == 0)
|
|
|
|
continue;
|
|
|
|
|
2013-12-16 21:08:28 +01:00
|
|
|
if (os_reltime_before(&bss->last_update, &t)) {
|
2012-06-04 20:52:08 +02:00
|
|
|
wpa_bss_remove(wpa_s, bss, __func__);
|
2009-12-27 20:07:47 +01:00
|
|
|
} else
|
|
|
|
break;
|
|
|
|
}
|
2011-03-20 11:02:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_init - Initialize BSS table
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* Returns: 0 on success, -1 on failure
|
|
|
|
*
|
|
|
|
* This prepares BSS table lists and timer for periodic updates. The BSS table
|
|
|
|
* is deinitialized with wpa_bss_deinit() once not needed anymore.
|
|
|
|
*/
|
2009-12-27 20:07:47 +01:00
|
|
|
int wpa_bss_init(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
dl_list_init(&wpa_s->bss);
|
2009-12-27 23:30:38 +01:00
|
|
|
dl_list_init(&wpa_s->bss_id);
|
2009-12-27 20:07:47 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_flush - Flush all unused BSS entries
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
*/
|
2011-03-20 11:02:33 +01:00
|
|
|
void wpa_bss_flush(struct wpa_supplicant *wpa_s)
|
2009-12-27 20:07:47 +01:00
|
|
|
{
|
|
|
|
struct wpa_bss *bss, *n;
|
2011-03-20 11:02:33 +01:00
|
|
|
|
2014-01-02 22:03:31 +01:00
|
|
|
wpa_s->clear_driver_scan_cache = 1;
|
|
|
|
|
2009-12-28 11:11:23 +01:00
|
|
|
if (wpa_s->bss.next == NULL)
|
|
|
|
return; /* BSS table not yet initialized */
|
2011-03-20 11:02:33 +01:00
|
|
|
|
|
|
|
dl_list_for_each_safe(bss, n, &wpa_s->bss, struct wpa_bss, list) {
|
|
|
|
if (wpa_bss_in_use(wpa_s, bss))
|
|
|
|
continue;
|
2012-06-04 20:52:08 +02:00
|
|
|
wpa_bss_remove(wpa_s, bss, __func__);
|
2011-03-20 11:02:33 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_deinit - Deinitialize BSS table
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
*/
|
2011-03-20 11:02:33 +01:00
|
|
|
void wpa_bss_deinit(struct wpa_supplicant *wpa_s)
|
|
|
|
{
|
|
|
|
wpa_bss_flush(wpa_s);
|
2009-12-27 20:07:47 +01:00
|
|
|
}
|
2009-12-27 23:30:38 +01:00
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_bssid - Fetch a BSS table entry based on BSSID
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* @bssid: BSSID
|
|
|
|
* Returns: Pointer to the BSS entry or %NULL if not found
|
|
|
|
*/
|
2009-12-27 23:30:38 +01:00
|
|
|
struct wpa_bss * wpa_bss_get_bssid(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *bssid)
|
|
|
|
{
|
|
|
|
struct wpa_bss *bss;
|
2012-02-16 15:30:13 +01:00
|
|
|
if (!wpa_supplicant_filter_bssid_match(wpa_s, bssid))
|
|
|
|
return NULL;
|
2011-03-20 11:06:36 +01:00
|
|
|
dl_list_for_each_reverse(bss, &wpa_s->bss, struct wpa_bss, list) {
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(bss->bssid, bssid))
|
2009-12-27 23:30:38 +01:00
|
|
|
return bss;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-03-31 16:15:39 +02:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_bssid_latest - Fetch the latest BSS table entry based on BSSID
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* @bssid: BSSID
|
|
|
|
* Returns: Pointer to the BSS entry or %NULL if not found
|
|
|
|
*
|
|
|
|
* This function is like wpa_bss_get_bssid(), but full BSS table is iterated to
|
|
|
|
* find the entry that has the most recent update. This can help in finding the
|
|
|
|
* correct entry in cases where the SSID of the AP may have changed recently
|
|
|
|
* (e.g., in WPS reconfiguration cases).
|
|
|
|
*/
|
|
|
|
struct wpa_bss * wpa_bss_get_bssid_latest(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *bssid)
|
|
|
|
{
|
|
|
|
struct wpa_bss *bss, *found = NULL;
|
|
|
|
if (!wpa_supplicant_filter_bssid_match(wpa_s, bssid))
|
|
|
|
return NULL;
|
|
|
|
dl_list_for_each_reverse(bss, &wpa_s->bss, struct wpa_bss, list) {
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (!ether_addr_equal(bss->bssid, bssid))
|
2013-03-31 16:15:39 +02:00
|
|
|
continue;
|
|
|
|
if (found == NULL ||
|
2013-12-16 21:08:28 +01:00
|
|
|
os_reltime_before(&found->last_update, &bss->last_update))
|
2013-03-31 16:15:39 +02:00
|
|
|
found = bss;
|
|
|
|
}
|
|
|
|
return found;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-02-07 15:23:21 +01:00
|
|
|
#ifdef CONFIG_P2P
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
2019-09-11 05:04:40 +02:00
|
|
|
* wpa_bss_get_p2p_dev_addr - Fetch the latest BSS table entry based on P2P Device Addr
|
2012-12-27 11:29:05 +01:00
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* @dev_addr: P2P Device Address of the GO
|
|
|
|
* Returns: Pointer to the BSS entry or %NULL if not found
|
2019-09-11 05:04:40 +02:00
|
|
|
*
|
|
|
|
* This function tries to find the entry that has the most recent update. This
|
|
|
|
* can help in finding the correct entry in cases where the SSID of the P2P
|
|
|
|
* Device may have changed recently.
|
2012-12-27 11:29:05 +01:00
|
|
|
*/
|
2012-02-07 15:23:21 +01:00
|
|
|
struct wpa_bss * wpa_bss_get_p2p_dev_addr(struct wpa_supplicant *wpa_s,
|
|
|
|
const u8 *dev_addr)
|
|
|
|
{
|
2019-09-11 05:04:40 +02:00
|
|
|
struct wpa_bss *bss, *found = NULL;
|
2012-02-07 15:23:21 +01:00
|
|
|
dl_list_for_each_reverse(bss, &wpa_s->bss, struct wpa_bss, list) {
|
|
|
|
u8 addr[ETH_ALEN];
|
2020-11-16 15:21:56 +01:00
|
|
|
if (p2p_parse_dev_addr(wpa_bss_ie_ptr(bss), bss->ie_len,
|
2019-09-11 05:04:40 +02:00
|
|
|
addr) != 0 ||
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
!ether_addr_equal(addr, dev_addr))
|
2019-09-11 05:04:40 +02:00
|
|
|
continue;
|
|
|
|
if (!found ||
|
|
|
|
os_reltime_before(&found->last_update, &bss->last_update))
|
|
|
|
found = bss;
|
2012-02-07 15:23:21 +01:00
|
|
|
}
|
2019-09-11 05:04:40 +02:00
|
|
|
return found;
|
2012-02-07 15:23:21 +01:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_P2P */
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_id - Fetch a BSS table entry based on identifier
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* @id: Unique identifier (struct wpa_bss::id) assigned for the entry
|
|
|
|
* Returns: Pointer to the BSS entry or %NULL if not found
|
|
|
|
*/
|
2009-12-27 23:30:38 +01:00
|
|
|
struct wpa_bss * wpa_bss_get_id(struct wpa_supplicant *wpa_s, unsigned int id)
|
|
|
|
{
|
|
|
|
struct wpa_bss *bss;
|
|
|
|
dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
|
|
|
|
if (bss->id == id)
|
|
|
|
return bss;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-07 11:27:52 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_id_range - Fetch a BSS table entry based on identifier range
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* @idf: Smallest allowed identifier assigned for the entry
|
|
|
|
* @idf: Largest allowed identifier assigned for the entry
|
|
|
|
* Returns: Pointer to the BSS entry or %NULL if not found
|
|
|
|
*
|
|
|
|
* This function is similar to wpa_bss_get_id() but allows a BSS entry with the
|
|
|
|
* smallest id value to be fetched within the specified range without the
|
|
|
|
* caller having to know the exact id.
|
|
|
|
*/
|
|
|
|
struct wpa_bss * wpa_bss_get_id_range(struct wpa_supplicant *wpa_s,
|
|
|
|
unsigned int idf, unsigned int idl)
|
|
|
|
{
|
|
|
|
struct wpa_bss *bss;
|
|
|
|
dl_list_for_each(bss, &wpa_s->bss_id, struct wpa_bss, list_id) {
|
|
|
|
if (bss->id >= idf && bss->id <= idl)
|
|
|
|
return bss;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_ie - Fetch a specified information element from a BSS entry
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* @ie: Information element identitifier (WLAN_EID_*)
|
|
|
|
* Returns: Pointer to the information element (id field) or %NULL if not found
|
|
|
|
*
|
|
|
|
* This function returns the first matching information element in the BSS
|
|
|
|
* entry.
|
|
|
|
*/
|
2009-12-27 23:30:38 +01:00
|
|
|
const u8 * wpa_bss_get_ie(const struct wpa_bss *bss, u8 ie)
|
|
|
|
{
|
2020-11-16 15:21:56 +01:00
|
|
|
return get_ie(wpa_bss_ie_ptr(bss), bss->ie_len, ie);
|
2009-12-27 23:30:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2024-07-11 22:50:55 +02:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_ie_beacon - Fetch a specified information element from a BSS entry
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* @ie: Information element identitifier (WLAN_EID_*)
|
|
|
|
* Returns: Pointer to the information element (id field) or %NULL if not found
|
|
|
|
*
|
|
|
|
* This function returns the first matching information element in the BSS
|
|
|
|
* entry.
|
|
|
|
*
|
|
|
|
* This function is like wpa_bss_get_ie(), but uses IE buffer only from Beacon
|
|
|
|
* frames instead of either Beacon or Probe Response frames.
|
|
|
|
*/
|
|
|
|
const u8 * wpa_bss_get_ie_beacon(const struct wpa_bss *bss, u8 ie)
|
|
|
|
{
|
|
|
|
const u8 *ies;
|
|
|
|
|
|
|
|
if (bss->beacon_ie_len == 0)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
ies = wpa_bss_ie_ptr(bss);
|
|
|
|
ies += bss->ie_len;
|
|
|
|
return get_ie(ies, bss->beacon_ie_len, ie);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-11-16 15:00:21 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_ie_ext - Fetch a specified extended IE from a BSS entry
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* @ext: Information element extension identifier (WLAN_EID_EXT_*)
|
|
|
|
* Returns: Pointer to the information element (id field) or %NULL if not found
|
|
|
|
*
|
|
|
|
* This function returns the first matching information element in the BSS
|
|
|
|
* entry.
|
|
|
|
*/
|
|
|
|
const u8 * wpa_bss_get_ie_ext(const struct wpa_bss *bss, u8 ext)
|
|
|
|
{
|
2020-11-16 15:21:56 +01:00
|
|
|
return get_ie_ext(wpa_bss_ie_ptr(bss), bss->ie_len, ext);
|
2020-11-16 15:00:21 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_vendor_ie - Fetch a vendor information element from a BSS entry
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* @vendor_type: Vendor type (four octets starting the IE payload)
|
|
|
|
* Returns: Pointer to the information element (id field) or %NULL if not found
|
|
|
|
*
|
|
|
|
* This function returns the first matching information element in the BSS
|
|
|
|
* entry.
|
|
|
|
*/
|
2009-12-27 23:30:38 +01:00
|
|
|
const u8 * wpa_bss_get_vendor_ie(const struct wpa_bss *bss, u32 vendor_type)
|
|
|
|
{
|
2020-11-03 19:36:15 +01:00
|
|
|
const u8 *ies;
|
|
|
|
const struct element *elem;
|
2009-12-27 23:30:38 +01:00
|
|
|
|
2020-11-16 15:21:56 +01:00
|
|
|
ies = wpa_bss_ie_ptr(bss);
|
2009-12-27 23:30:38 +01:00
|
|
|
|
2020-11-03 19:36:15 +01:00
|
|
|
for_each_element_id(elem, WLAN_EID_VENDOR_SPECIFIC, ies, bss->ie_len) {
|
|
|
|
if (elem->datalen >= 4 &&
|
|
|
|
vendor_type == WPA_GET_BE32(elem->data))
|
|
|
|
return &elem->id;
|
2009-12-27 23:30:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-14 18:22:09 +02:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_vendor_ie_beacon - Fetch a vendor information from a BSS entry
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* @vendor_type: Vendor type (four octets starting the IE payload)
|
|
|
|
* Returns: Pointer to the information element (id field) or %NULL if not found
|
|
|
|
*
|
|
|
|
* This function returns the first matching information element in the BSS
|
|
|
|
* entry.
|
|
|
|
*
|
|
|
|
* This function is like wpa_bss_get_vendor_ie(), but uses IE buffer only
|
|
|
|
* from Beacon frames instead of either Beacon or Probe Response frames.
|
|
|
|
*/
|
|
|
|
const u8 * wpa_bss_get_vendor_ie_beacon(const struct wpa_bss *bss,
|
|
|
|
u32 vendor_type)
|
|
|
|
{
|
2020-11-04 18:50:34 +01:00
|
|
|
const u8 *ies;
|
|
|
|
const struct element *elem;
|
2013-10-14 18:22:09 +02:00
|
|
|
|
|
|
|
if (bss->beacon_ie_len == 0)
|
|
|
|
return NULL;
|
|
|
|
|
2020-11-16 15:21:56 +01:00
|
|
|
ies = wpa_bss_ie_ptr(bss);
|
2020-11-04 18:50:34 +01:00
|
|
|
ies += bss->ie_len;
|
2013-10-14 18:22:09 +02:00
|
|
|
|
2020-11-04 18:50:34 +01:00
|
|
|
for_each_element_id(elem, WLAN_EID_VENDOR_SPECIFIC, ies,
|
|
|
|
bss->beacon_ie_len) {
|
|
|
|
if (elem->datalen >= 4 &&
|
|
|
|
vendor_type == WPA_GET_BE32(elem->data))
|
|
|
|
return &elem->id;
|
2013-10-14 18:22:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_vendor_ie_multi - Fetch vendor IE data from a BSS entry
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* @vendor_type: Vendor type (four octets starting the IE payload)
|
|
|
|
* Returns: Pointer to the information element payload or %NULL if not found
|
|
|
|
*
|
|
|
|
* This function returns concatenated payload of possibly fragmented vendor
|
|
|
|
* specific information elements in the BSS entry. The caller is responsible for
|
|
|
|
* freeing the returned buffer.
|
|
|
|
*/
|
2009-12-27 23:30:38 +01:00
|
|
|
struct wpabuf * wpa_bss_get_vendor_ie_multi(const struct wpa_bss *bss,
|
|
|
|
u32 vendor_type)
|
|
|
|
{
|
|
|
|
struct wpabuf *buf;
|
|
|
|
const u8 *end, *pos;
|
|
|
|
|
|
|
|
buf = wpabuf_alloc(bss->ie_len);
|
|
|
|
if (buf == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
2020-11-16 15:21:56 +01:00
|
|
|
pos = wpa_bss_ie_ptr(bss);
|
2009-12-27 23:30:38 +01:00
|
|
|
end = pos + bss->ie_len;
|
|
|
|
|
2015-10-18 10:43:24 +02:00
|
|
|
while (end - pos > 1) {
|
2020-11-04 18:50:34 +01:00
|
|
|
u8 ie, len;
|
|
|
|
|
|
|
|
ie = pos[0];
|
|
|
|
len = pos[1];
|
|
|
|
if (len > end - pos - 2)
|
2012-09-02 18:54:42 +02:00
|
|
|
break;
|
2020-11-04 18:50:34 +01:00
|
|
|
pos += 2;
|
|
|
|
if (ie == WLAN_EID_VENDOR_SPECIFIC && len >= 4 &&
|
|
|
|
vendor_type == WPA_GET_BE32(pos))
|
|
|
|
wpabuf_put_data(buf, pos + 4, len - 4);
|
|
|
|
pos += len;
|
2012-09-02 18:54:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (wpabuf_len(buf) == 0) {
|
|
|
|
wpabuf_free(buf);
|
|
|
|
buf = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_vendor_ie_multi_beacon - Fetch vendor IE data from a BSS entry
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* @vendor_type: Vendor type (four octets starting the IE payload)
|
|
|
|
* Returns: Pointer to the information element payload or %NULL if not found
|
|
|
|
*
|
|
|
|
* This function returns concatenated payload of possibly fragmented vendor
|
|
|
|
* specific information elements in the BSS entry. The caller is responsible for
|
|
|
|
* freeing the returned buffer.
|
|
|
|
*
|
|
|
|
* This function is like wpa_bss_get_vendor_ie_multi(), but uses IE buffer only
|
|
|
|
* from Beacon frames instead of either Beacon or Probe Response frames.
|
|
|
|
*/
|
2012-09-02 18:54:42 +02:00
|
|
|
struct wpabuf * wpa_bss_get_vendor_ie_multi_beacon(const struct wpa_bss *bss,
|
|
|
|
u32 vendor_type)
|
|
|
|
{
|
|
|
|
struct wpabuf *buf;
|
|
|
|
const u8 *end, *pos;
|
|
|
|
|
|
|
|
buf = wpabuf_alloc(bss->beacon_ie_len);
|
|
|
|
if (buf == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
2020-11-16 15:21:56 +01:00
|
|
|
pos = wpa_bss_ie_ptr(bss);
|
2012-09-02 18:54:42 +02:00
|
|
|
pos += bss->ie_len;
|
|
|
|
end = pos + bss->beacon_ie_len;
|
|
|
|
|
2015-10-18 10:43:24 +02:00
|
|
|
while (end - pos > 1) {
|
2022-05-08 16:28:58 +02:00
|
|
|
u8 id, len;
|
|
|
|
|
|
|
|
id = *pos++;
|
|
|
|
len = *pos++;
|
|
|
|
if (len > end - pos)
|
2009-12-27 23:30:38 +01:00
|
|
|
break;
|
2022-05-08 16:28:58 +02:00
|
|
|
if (id == WLAN_EID_VENDOR_SPECIFIC && len >= 4 &&
|
|
|
|
vendor_type == WPA_GET_BE32(pos))
|
|
|
|
wpabuf_put_data(buf, pos + 4, len - 4);
|
|
|
|
pos += len;
|
2009-12-27 23:30:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (wpabuf_len(buf) == 0) {
|
|
|
|
wpabuf_free(buf);
|
|
|
|
buf = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return buf;
|
|
|
|
}
|
2009-12-28 00:09:32 +01:00
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_max_rate - Get maximum legacy TX rate supported in a BSS
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* Returns: Maximum legacy rate in units of 500 kbps
|
|
|
|
*/
|
2009-12-28 00:09:32 +01:00
|
|
|
int wpa_bss_get_max_rate(const struct wpa_bss *bss)
|
|
|
|
{
|
|
|
|
int rate = 0;
|
|
|
|
const u8 *ie;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
ie = wpa_bss_get_ie(bss, WLAN_EID_SUPP_RATES);
|
|
|
|
for (i = 0; ie && i < ie[1]; i++) {
|
|
|
|
if ((ie[i + 2] & 0x7f) > rate)
|
|
|
|
rate = ie[i + 2] & 0x7f;
|
|
|
|
}
|
|
|
|
|
|
|
|
ie = wpa_bss_get_ie(bss, WLAN_EID_EXT_SUPP_RATES);
|
|
|
|
for (i = 0; ie && i < ie[1]; i++) {
|
|
|
|
if ((ie[i + 2] & 0x7f) > rate)
|
|
|
|
rate = ie[i + 2] & 0x7f;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rate;
|
|
|
|
}
|
2010-01-04 15:52:30 +01:00
|
|
|
|
|
|
|
|
2012-12-27 11:29:05 +01:00
|
|
|
/**
|
|
|
|
* wpa_bss_get_bit_rates - Get legacy TX rates supported in a BSS
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* @rates: Buffer for returning a pointer to the rates list (units of 500 kbps)
|
|
|
|
* Returns: number of legacy TX rates or -1 on failure
|
|
|
|
*
|
|
|
|
* The caller is responsible for freeing the returned buffer with os_free() in
|
|
|
|
* case of success.
|
|
|
|
*/
|
2010-01-04 15:52:30 +01:00
|
|
|
int wpa_bss_get_bit_rates(const struct wpa_bss *bss, u8 **rates)
|
|
|
|
{
|
|
|
|
const u8 *ie, *ie2;
|
2010-01-10 21:53:36 +01:00
|
|
|
int i, j;
|
|
|
|
unsigned int len;
|
|
|
|
u8 *r;
|
2010-01-04 15:52:30 +01:00
|
|
|
|
|
|
|
ie = wpa_bss_get_ie(bss, WLAN_EID_SUPP_RATES);
|
|
|
|
ie2 = wpa_bss_get_ie(bss, WLAN_EID_EXT_SUPP_RATES);
|
|
|
|
|
|
|
|
len = (ie ? ie[1] : 0) + (ie2 ? ie2[1] : 0);
|
|
|
|
|
2010-01-10 21:53:36 +01:00
|
|
|
r = os_malloc(len);
|
|
|
|
if (!r)
|
2010-01-04 15:52:30 +01:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
for (i = 0; ie && i < ie[1]; i++)
|
2010-01-10 21:53:36 +01:00
|
|
|
r[i] = ie[i + 2] & 0x7f;
|
2010-01-04 15:52:30 +01:00
|
|
|
|
|
|
|
for (j = 0; ie2 && j < ie2[1]; j++)
|
2010-01-10 21:53:36 +01:00
|
|
|
r[i + j] = ie2[j + 2] & 0x7f;
|
2010-01-04 15:52:30 +01:00
|
|
|
|
2010-01-10 21:53:36 +01:00
|
|
|
*rates = r;
|
2010-01-04 15:52:30 +01:00
|
|
|
return len;
|
|
|
|
}
|
2017-02-21 11:22:19 +01:00
|
|
|
|
|
|
|
|
|
|
|
#ifdef CONFIG_FILS
|
2020-11-16 14:52:22 +01:00
|
|
|
const u8 * wpa_bss_get_fils_cache_id(const struct wpa_bss *bss)
|
2017-02-21 11:22:19 +01:00
|
|
|
{
|
|
|
|
const u8 *ie;
|
|
|
|
|
|
|
|
if (bss) {
|
|
|
|
ie = wpa_bss_get_ie(bss, WLAN_EID_FILS_INDICATION);
|
|
|
|
if (ie && ie[1] >= 4 && WPA_GET_LE16(ie + 2) & BIT(7))
|
|
|
|
return ie + 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_FILS */
|
2019-01-02 16:56:41 +01:00
|
|
|
|
|
|
|
|
|
|
|
int wpa_bss_ext_capab(const struct wpa_bss *bss, unsigned int capab)
|
|
|
|
{
|
2021-02-06 10:00:09 +01:00
|
|
|
if (!bss)
|
|
|
|
return 0;
|
2019-01-02 16:56:41 +01:00
|
|
|
return ieee802_11_ext_capab(wpa_bss_get_ie(bss, WLAN_EID_EXT_CAPAB),
|
|
|
|
capab);
|
|
|
|
}
|
2022-12-06 10:46:06 +01:00
|
|
|
|
|
|
|
|
2023-06-12 21:59:49 +02:00
|
|
|
static void
|
|
|
|
wpa_bss_parse_ml_rnr_ap_info(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_bss *bss, u8 mbssid_idx,
|
|
|
|
const struct ieee80211_neighbor_ap_info *ap_info,
|
2023-11-21 00:51:20 +01:00
|
|
|
size_t len, u16 *seen, u16 *missing,
|
|
|
|
struct wpa_ssid *ssid)
|
2023-06-12 21:59:49 +02:00
|
|
|
{
|
|
|
|
const u8 *pos, *end;
|
|
|
|
const u8 *mld_params;
|
|
|
|
u8 count, mld_params_offset;
|
|
|
|
u8 i, type, link_id;
|
|
|
|
|
|
|
|
count = RNR_TBTT_INFO_COUNT_VAL(ap_info->tbtt_info_hdr) + 1;
|
|
|
|
type = ap_info->tbtt_info_hdr & RNR_TBTT_INFO_HDR_TYPE_MSK;
|
|
|
|
|
|
|
|
/* MLD information is at offset 13 or at start */
|
|
|
|
if (type == 0 && ap_info->tbtt_info_len >= RNR_TBTT_INFO_MLD_LEN) {
|
|
|
|
/* MLD info is appended */
|
|
|
|
mld_params_offset = RNR_TBTT_INFO_LEN;
|
|
|
|
} else {
|
|
|
|
/* TODO: Support NSTR AP */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
pos = (const u8 *) ap_info;
|
|
|
|
end = pos + len;
|
|
|
|
pos += sizeof(*ap_info);
|
|
|
|
|
|
|
|
for (i = 0; i < count; i++) {
|
2023-11-21 00:51:20 +01:00
|
|
|
u8 bss_params;
|
|
|
|
|
2023-06-12 21:59:49 +02:00
|
|
|
if (end - pos < ap_info->tbtt_info_len)
|
|
|
|
break;
|
|
|
|
|
2023-11-21 00:51:20 +01:00
|
|
|
bss_params = pos[1 + ETH_ALEN + 4];
|
2023-06-12 21:59:49 +02:00
|
|
|
mld_params = pos + mld_params_offset;
|
|
|
|
|
|
|
|
link_id = *(mld_params + 1) & EHT_ML_LINK_ID_MSK;
|
2024-02-20 14:18:15 +01:00
|
|
|
if (link_id >= MAX_NUM_MLD_LINKS)
|
|
|
|
return;
|
2023-06-12 21:59:49 +02:00
|
|
|
|
|
|
|
if (*mld_params != mbssid_idx) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"MLD: Reported link not part of MLD");
|
|
|
|
} else if (!(BIT(link_id) & *seen)) {
|
2024-04-09 08:50:23 +02:00
|
|
|
struct wpa_bss *neigh_bss;
|
|
|
|
|
|
|
|
if (ssid && ssid->ssid_len)
|
|
|
|
neigh_bss = wpa_bss_get(wpa_s, pos + 1,
|
|
|
|
ssid->ssid,
|
|
|
|
ssid->ssid_len);
|
|
|
|
else
|
|
|
|
neigh_bss = wpa_bss_get_bssid(wpa_s, pos + 1);
|
2023-06-12 21:59:49 +02:00
|
|
|
|
|
|
|
*seen |= BIT(link_id);
|
|
|
|
wpa_printf(MSG_DEBUG, "MLD: mld ID=%u, link ID=%u",
|
|
|
|
*mld_params, link_id);
|
|
|
|
|
2023-11-21 00:51:20 +01:00
|
|
|
if (!neigh_bss) {
|
|
|
|
*missing |= BIT(link_id);
|
2023-11-21 00:51:27 +01:00
|
|
|
} else if ((!ssid ||
|
|
|
|
(bss_params & (RNR_BSS_PARAM_SAME_SSID |
|
|
|
|
RNR_BSS_PARAM_CO_LOCATED)) ||
|
|
|
|
wpa_scan_res_match(wpa_s, 0, neigh_bss,
|
|
|
|
ssid, 1, 0)) &&
|
|
|
|
!wpa_bssid_ignore_is_listed(
|
|
|
|
wpa_s, neigh_bss->bssid)) {
|
2023-06-12 21:59:49 +02:00
|
|
|
struct mld_link *l;
|
|
|
|
|
2024-02-20 14:18:15 +01:00
|
|
|
bss->valid_links |= BIT(link_id);
|
|
|
|
l = &bss->mld_links[link_id];
|
2023-12-28 14:19:22 +01:00
|
|
|
os_memcpy(l->bssid, pos + 1, ETH_ALEN);
|
2023-06-12 21:59:49 +02:00
|
|
|
l->freq = neigh_bss->freq;
|
2023-12-21 12:08:20 +01:00
|
|
|
l->disabled = mld_params[2] &
|
|
|
|
RNR_TBTT_INFO_MLD_PARAM2_LINK_DISABLED;
|
2023-06-12 21:59:49 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pos += ap_info->tbtt_info_len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wpa_bss_parse_basic_ml_element - Parse the Basic Multi-Link element
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* @mld_addr: AP MLD address (or %NULL)
|
|
|
|
* @link_info: Array to store link information (or %NULL),
|
|
|
|
* should be initialized and #MAX_NUM_MLD_LINKS elements long
|
|
|
|
* @missing_links: Result bitmask of links that were not discovered (or %NULL)
|
2023-11-21 00:51:20 +01:00
|
|
|
* @ssid: Target SSID (or %NULL)
|
2023-11-21 00:51:37 +01:00
|
|
|
* @ap_mld_id: On return would hold the corresponding AP MLD ID (or %NULL)
|
2023-06-12 21:59:49 +02:00
|
|
|
* Returns: 0 on success or -1 for non-MLD or parsing failures
|
|
|
|
*
|
|
|
|
* Parses the Basic Multi-Link element of the BSS into @link_info using the scan
|
|
|
|
* information stored in the wpa_supplicant data to fill in information for
|
|
|
|
* links where possible. The @missing_links out parameter will contain any links
|
|
|
|
* for which no corresponding BSS was found.
|
|
|
|
*/
|
|
|
|
int wpa_bss_parse_basic_ml_element(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_bss *bss,
|
|
|
|
u8 *ap_mld_addr,
|
2023-11-21 00:51:20 +01:00
|
|
|
u16 *missing_links,
|
2023-11-21 00:51:37 +01:00
|
|
|
struct wpa_ssid *ssid,
|
|
|
|
u8 *ap_mld_id)
|
2023-06-12 21:59:49 +02:00
|
|
|
{
|
|
|
|
struct ieee802_11_elems elems;
|
|
|
|
struct wpabuf *mlbuf;
|
|
|
|
const struct element *elem;
|
|
|
|
u8 mbssid_idx = 0;
|
2023-11-21 00:51:21 +01:00
|
|
|
size_t ml_ie_len;
|
2023-06-12 21:59:49 +02:00
|
|
|
const struct ieee80211_eht_ml *eht_ml;
|
|
|
|
const struct eht_ml_basic_common_info *ml_basic_common_info;
|
|
|
|
u8 i, link_id;
|
|
|
|
const u16 control_mask =
|
|
|
|
MULTI_LINK_CONTROL_TYPE_MASK |
|
|
|
|
BASIC_MULTI_LINK_CTRL_PRES_LINK_ID |
|
|
|
|
BASIC_MULTI_LINK_CTRL_PRES_BSS_PARAM_CH_COUNT |
|
|
|
|
BASIC_MULTI_LINK_CTRL_PRES_MLD_CAPA;
|
|
|
|
const u16 control =
|
|
|
|
MULTI_LINK_CONTROL_TYPE_BASIC |
|
|
|
|
BASIC_MULTI_LINK_CTRL_PRES_LINK_ID |
|
|
|
|
BASIC_MULTI_LINK_CTRL_PRES_BSS_PARAM_CH_COUNT |
|
|
|
|
BASIC_MULTI_LINK_CTRL_PRES_MLD_CAPA;
|
|
|
|
u16 missing = 0;
|
|
|
|
u16 seen;
|
|
|
|
const u8 *ies_pos = wpa_bss_ie_ptr(bss);
|
|
|
|
size_t ies_len = bss->ie_len ? bss->ie_len : bss->beacon_ie_len;
|
|
|
|
int ret = -1;
|
|
|
|
struct mld_link *l;
|
|
|
|
|
|
|
|
if (ieee802_11_parse_elems(ies_pos, ies_len, &elems, 1) ==
|
|
|
|
ParseFailed) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "MLD: Failed to parse elements");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-11-21 00:51:18 +01:00
|
|
|
mlbuf = ieee802_11_defrag(elems.basic_mle, elems.basic_mle_len, true);
|
2023-06-12 21:59:49 +02:00
|
|
|
if (!mlbuf) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "MLD: No Multi-Link element");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ml_ie_len = wpabuf_len(mlbuf);
|
|
|
|
|
2023-11-21 00:51:20 +01:00
|
|
|
if (ssid) {
|
|
|
|
struct wpa_ie_data ie;
|
2023-10-11 11:50:05 +02:00
|
|
|
const u8 *rsne;
|
|
|
|
size_t rsne_len;
|
|
|
|
|
|
|
|
if (elems.rsne_override_2 && wpas_rsn_overriding(wpa_s)) {
|
|
|
|
rsne = elems.rsne_override_2;
|
|
|
|
rsne_len = elems.rsne_override_2_len;
|
|
|
|
} else if (elems.rsne_override &&
|
|
|
|
wpas_rsn_overriding(wpa_s)) {
|
|
|
|
rsne = elems.rsne_override;
|
|
|
|
rsne_len = elems.rsne_override_len;
|
|
|
|
} else {
|
|
|
|
rsne = elems.rsn_ie;
|
|
|
|
rsne_len = elems.rsn_ie_len;
|
|
|
|
}
|
|
|
|
if (!rsne ||
|
|
|
|
wpa_parse_wpa_ie(rsne - 2, 2 + rsne_len, &ie)) {
|
2023-11-21 00:51:20 +01:00
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "MLD: No RSN element");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(ie.capabilities & WPA_CAPABILITY_MFPC) ||
|
|
|
|
wpas_get_ssid_pmf(wpa_s, ssid) == NO_MGMT_FRAME_PROTECTION) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"MLD: No management frame protection");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ie.key_mgmt &= ~(WPA_KEY_MGMT_PSK | WPA_KEY_MGMT_FT_PSK |
|
|
|
|
WPA_KEY_MGMT_PSK_SHA256);
|
|
|
|
if (!(ie.key_mgmt & ssid->key_mgmt)) {
|
|
|
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
|
|
|
"MLD: No valid key management");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-12 21:59:49 +02:00
|
|
|
/*
|
|
|
|
* for ext ID + 2 control + common info len + MLD address +
|
|
|
|
* link info
|
|
|
|
*/
|
|
|
|
if (ml_ie_len < 2UL + 1UL + ETH_ALEN + 1UL)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
eht_ml = (const struct ieee80211_eht_ml *) wpabuf_head(mlbuf);
|
|
|
|
if ((le_to_host16(eht_ml->ml_control) & control_mask) != control) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"MLD: Unexpected Multi-Link element control=0x%x (mask 0x%x expected 0x%x)",
|
|
|
|
le_to_host16(eht_ml->ml_control), control_mask,
|
|
|
|
control);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ml_basic_common_info =
|
|
|
|
(const struct eht_ml_basic_common_info *) eht_ml->variable;
|
|
|
|
|
|
|
|
/* Common info length should be valid */
|
|
|
|
if (ml_basic_common_info->len < ETH_ALEN + 1UL)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Get the MLD address and MLD link ID */
|
|
|
|
if (ap_mld_addr)
|
|
|
|
os_memcpy(ap_mld_addr, ml_basic_common_info->mld_addr,
|
|
|
|
ETH_ALEN);
|
|
|
|
|
|
|
|
link_id = ml_basic_common_info->variable[0] & EHT_ML_LINK_ID_MSK;
|
2024-02-20 14:18:15 +01:00
|
|
|
|
|
|
|
bss->mld_link_id = link_id;
|
|
|
|
seen = bss->valid_links = BIT(link_id);
|
|
|
|
|
|
|
|
l = &bss->mld_links[link_id];
|
2023-06-12 21:59:49 +02:00
|
|
|
os_memcpy(l->bssid, bss->bssid, ETH_ALEN);
|
|
|
|
l->freq = bss->freq;
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The AP MLD ID in the RNR corresponds to the MBSSID index, see
|
|
|
|
* IEEE P802.11be/D4.0, 9.4.2.169.2 (Neighbor AP Information field).
|
|
|
|
*
|
|
|
|
* For the transmitting BSSID it is clear that both the MBSSID index
|
|
|
|
* and the AP MLD ID in the RNR are zero.
|
|
|
|
*
|
|
|
|
* For nontransmitted BSSIDs we will have a BSS generated from the
|
|
|
|
* MBSSID element(s) using inheritance rules. Included in the elements
|
|
|
|
* is the MBSSID Index Element. The RNR is copied from the Beacon/Probe
|
|
|
|
* Response frame that was send by the transmitting BSSID. As such, the
|
|
|
|
* reported AP MLD ID in the RNR will match the value in the MBSSID
|
|
|
|
* Index Element.
|
|
|
|
*/
|
|
|
|
elem = (const struct element *)
|
|
|
|
wpa_bss_get_ie(bss, WLAN_EID_MULTIPLE_BSSID_INDEX);
|
|
|
|
if (elem && elem->datalen >= 1)
|
|
|
|
mbssid_idx = elem->data[0];
|
|
|
|
|
|
|
|
for_each_element_id(elem, WLAN_EID_REDUCED_NEIGHBOR_REPORT,
|
|
|
|
wpa_bss_ie_ptr(bss),
|
|
|
|
bss->ie_len ? bss->ie_len : bss->beacon_ie_len) {
|
|
|
|
const struct ieee80211_neighbor_ap_info *ap_info;
|
|
|
|
const u8 *pos = elem->data;
|
|
|
|
size_t len = elem->datalen;
|
|
|
|
|
|
|
|
/* RNR IE may contain more than one Neighbor AP Info */
|
|
|
|
while (sizeof(*ap_info) <= len) {
|
|
|
|
size_t ap_info_len = sizeof(*ap_info);
|
|
|
|
u8 count;
|
|
|
|
|
|
|
|
ap_info = (const struct ieee80211_neighbor_ap_info *)
|
|
|
|
pos;
|
|
|
|
count = RNR_TBTT_INFO_COUNT_VAL(ap_info->tbtt_info_hdr) + 1;
|
|
|
|
ap_info_len += count * ap_info->tbtt_info_len;
|
|
|
|
|
|
|
|
if (ap_info_len > len)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
wpa_bss_parse_ml_rnr_ap_info(wpa_s, bss, mbssid_idx,
|
|
|
|
ap_info, len, &seen,
|
2023-11-21 00:51:20 +01:00
|
|
|
&missing, ssid);
|
2023-06-12 21:59:49 +02:00
|
|
|
|
|
|
|
pos += ap_info_len;
|
|
|
|
len -= ap_info_len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-20 14:18:15 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "MLD: valid_links=%04hx (unresolved: 0x%04hx)",
|
|
|
|
bss->valid_links, missing);
|
2023-06-12 21:59:49 +02:00
|
|
|
|
2024-02-20 14:18:15 +01:00
|
|
|
for_each_link(bss->valid_links, i) {
|
2023-06-12 21:59:49 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "MLD: link=%u, bssid=" MACSTR,
|
2024-02-20 14:18:15 +01:00
|
|
|
i, MAC2STR(bss->mld_links[i].bssid));
|
2023-06-12 21:59:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (missing_links)
|
|
|
|
*missing_links = missing;
|
|
|
|
|
2023-11-21 00:51:37 +01:00
|
|
|
if (ap_mld_id)
|
|
|
|
*ap_mld_id = mbssid_idx;
|
|
|
|
|
2023-06-12 21:59:49 +02:00
|
|
|
ret = 0;
|
|
|
|
out:
|
|
|
|
wpabuf_free(mlbuf);
|
|
|
|
return ret;
|
|
|
|
}
|
2023-06-12 21:59:50 +02:00
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* wpa_bss_parse_reconf_ml_element - Parse the Reconfiguration ML element
|
|
|
|
* @wpa_s: Pointer to wpa_supplicant data
|
|
|
|
* @bss: BSS table entry
|
|
|
|
* Returns: The bitmap of links that are going to be removed
|
|
|
|
*/
|
|
|
|
u16 wpa_bss_parse_reconf_ml_element(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_bss *bss)
|
|
|
|
{
|
|
|
|
struct ieee802_11_elems elems;
|
|
|
|
struct wpabuf *mlbuf;
|
|
|
|
const u8 *pos = wpa_bss_ie_ptr(bss);
|
|
|
|
size_t len = bss->ie_len ? bss->ie_len : bss->beacon_ie_len;
|
|
|
|
const struct ieee80211_eht_ml *ml;
|
|
|
|
u16 removed_links = 0;
|
|
|
|
u8 ml_common_len;
|
|
|
|
|
|
|
|
if (ieee802_11_parse_elems(pos, len, &elems, 1) == ParseFailed)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!elems.reconf_mle || !elems.reconf_mle_len)
|
|
|
|
return 0;
|
|
|
|
|
2023-11-21 00:51:18 +01:00
|
|
|
mlbuf = ieee802_11_defrag(elems.reconf_mle, elems.reconf_mle_len, true);
|
2023-06-12 21:59:50 +02:00
|
|
|
if (!mlbuf)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ml = (const struct ieee80211_eht_ml *) wpabuf_head(mlbuf);
|
|
|
|
len = wpabuf_len(mlbuf);
|
|
|
|
|
|
|
|
if (len < sizeof(*ml))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ml_common_len = 1;
|
|
|
|
if (ml->ml_control & RECONF_MULTI_LINK_CTRL_PRES_MLD_MAC_ADDR)
|
|
|
|
ml_common_len += ETH_ALEN;
|
|
|
|
|
|
|
|
if (len < sizeof(*ml) + ml_common_len) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"MLD: Unexpected Reconfiguration ML element length: (%zu < %zu)",
|
|
|
|
len, sizeof(*ml) + ml_common_len);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
pos = ml->variable + ml_common_len;
|
|
|
|
len -= sizeof(*ml) + ml_common_len;
|
|
|
|
|
|
|
|
while (len >= 2 + sizeof(struct ieee80211_eht_per_sta_profile)) {
|
|
|
|
size_t sub_elem_len = *(pos + 1);
|
|
|
|
|
|
|
|
if (2 + sub_elem_len > len) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"MLD: Invalid link info len: %zu %zu",
|
|
|
|
2 + sub_elem_len, len);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*pos == EHT_ML_SUB_ELEM_PER_STA_PROFILE) {
|
|
|
|
const struct ieee80211_eht_per_sta_profile *sta_prof =
|
|
|
|
(const struct ieee80211_eht_per_sta_profile *)
|
|
|
|
(pos + 2);
|
|
|
|
u16 control = le_to_host16(sta_prof->sta_control);
|
|
|
|
u8 link_id;
|
|
|
|
|
|
|
|
link_id = control & EHT_PER_STA_RECONF_CTRL_LINK_ID_MSK;
|
|
|
|
removed_links |= BIT(link_id);
|
|
|
|
}
|
|
|
|
|
|
|
|
pos += 2 + sub_elem_len;
|
|
|
|
len -= 2 + sub_elem_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "MLD: Reconfiguration: removed_links=0x%x",
|
|
|
|
removed_links);
|
|
|
|
out:
|
|
|
|
wpabuf_free(mlbuf);
|
|
|
|
return removed_links;
|
|
|
|
}
|
2023-10-11 11:50:05 +02:00
|
|
|
|
|
|
|
|
2023-10-11 11:50:05 +02:00
|
|
|
static bool wpa_bss_supported_cipher(struct wpa_supplicant *wpa_s,
|
|
|
|
int pairwise_cipher)
|
|
|
|
{
|
|
|
|
if (!wpa_s->drv_enc)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if ((pairwise_cipher & WPA_CIPHER_CCMP) &&
|
|
|
|
(wpa_s->drv_enc & WPA_DRIVER_CAPA_ENC_CCMP))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if ((pairwise_cipher & WPA_CIPHER_GCMP) &&
|
|
|
|
(wpa_s->drv_enc & WPA_DRIVER_CAPA_ENC_GCMP))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if ((pairwise_cipher & WPA_CIPHER_CCMP_256) &&
|
|
|
|
(wpa_s->drv_enc & WPA_DRIVER_CAPA_ENC_CCMP_256))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if ((pairwise_cipher & WPA_CIPHER_GCMP_256) &&
|
|
|
|
(wpa_s->drv_enc & WPA_DRIVER_CAPA_ENC_GCMP_256))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static bool wpa_bss_supported_key_mgmt(struct wpa_supplicant *wpa_s,
|
|
|
|
int key_mgmt)
|
|
|
|
{
|
|
|
|
if (!wpa_s->drv_key_mgmt)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_IEEE8021X) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_WPA2))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_IEEE8021X_SHA256) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_802_1X_SHA256))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_FT_IEEE8021X) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_FT))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_FT_IEEE8021X_SHA384) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_FT_802_1X_SHA384))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_IEEE8021X_SUITE_B) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_SUITE_B))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_SUITE_B_192))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_PSK) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_FT_PSK) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_PSK_SHA256) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_PSK_SHA256))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_SAE) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_SAE))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_SAE_EXT_KEY) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_SAE_EXT_KEY))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_FT_SAE) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_FT_SAE))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_FT_SAE_EXT_KEY) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_FT_SAE_EXT_KEY))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_OWE) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_OWE))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_DPP) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_DPP))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_FILS_SHA256) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_FILS_SHA256))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_FILS_SHA384) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_FILS_SHA384))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_FT_FILS_SHA256) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_FT_FILS_SHA256))
|
|
|
|
return true;
|
|
|
|
if ((key_mgmt & WPA_KEY_MGMT_FT_FILS_SHA384) &&
|
|
|
|
(wpa_s->drv_key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_FT_FILS_SHA384))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static bool wpa_bss_supported_rsne(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_ssid *ssid, const u8 *ie)
|
|
|
|
{
|
|
|
|
struct wpa_ie_data data;
|
|
|
|
|
|
|
|
if (wpa_parse_wpa_ie_rsn(ie, 2 + ie[1], &data) < 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* Check that there is a supported AKM and pairwise cipher based on
|
|
|
|
* overall capabilities */
|
|
|
|
if (!data.pairwise_cipher || !data.key_mgmt)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (wpa_s->drv_capa_known) {
|
|
|
|
if (!wpa_bss_supported_cipher(wpa_s, data.pairwise_cipher) ||
|
|
|
|
!wpa_bss_supported_key_mgmt(wpa_s, data.key_mgmt))
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ssid) {
|
|
|
|
/* Check that there is a supported AKM and pairwise cipher
|
|
|
|
* based on the specific network profile. */
|
|
|
|
if ((ssid->pairwise_cipher & data.pairwise_cipher) == 0)
|
|
|
|
return false;
|
|
|
|
if ((ssid->key_mgmt & data.key_mgmt) == 0)
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-10-11 11:50:05 +02:00
|
|
|
const u8 * wpa_bss_get_rsne(struct wpa_supplicant *wpa_s,
|
|
|
|
const struct wpa_bss *bss, struct wpa_ssid *ssid,
|
|
|
|
bool mlo)
|
|
|
|
{
|
2023-10-11 11:50:05 +02:00
|
|
|
const u8 *ie;
|
|
|
|
|
|
|
|
if (wpas_rsn_overriding(wpa_s)) {
|
|
|
|
if (!ssid)
|
|
|
|
ssid = wpa_s->current_ssid;
|
|
|
|
|
|
|
|
/* MLO cases for RSN overriding are required to use RSNE
|
|
|
|
* Override 2 element and RSNXE Override element together. */
|
|
|
|
ie = wpa_bss_get_vendor_ie(bss, RSNE_OVERRIDE_2_IE_VENDOR_TYPE);
|
|
|
|
if (mlo && ie &&
|
|
|
|
!wpa_bss_get_vendor_ie(bss,
|
|
|
|
RSNXE_OVERRIDE_IE_VENDOR_TYPE)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "BSS " MACSTR
|
|
|
|
" advertises RSNE Override 2 element without RSNXE Override element - ignore RSNE Override 2 element for MLO",
|
|
|
|
MAC2STR(bss->bssid));
|
|
|
|
} else if (ie && wpa_bss_supported_rsne(wpa_s, ssid, ie)) {
|
|
|
|
return ie;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!mlo) {
|
|
|
|
ie = wpa_bss_get_vendor_ie(
|
|
|
|
bss, RSNE_OVERRIDE_IE_VENDOR_TYPE);
|
|
|
|
if (ie && wpa_bss_supported_rsne(wpa_s, ssid, ie))
|
|
|
|
return ie;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-11 11:50:05 +02:00
|
|
|
return wpa_bss_get_ie(bss, WLAN_EID_RSN);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
const u8 * wpa_bss_get_rsnxe(struct wpa_supplicant *wpa_s,
|
|
|
|
const struct wpa_bss *bss, struct wpa_ssid *ssid,
|
|
|
|
bool mlo)
|
|
|
|
{
|
2023-10-11 11:50:05 +02:00
|
|
|
const u8 *ie;
|
|
|
|
|
|
|
|
if (wpas_rsn_overriding(wpa_s)) {
|
|
|
|
ie = wpa_bss_get_vendor_ie(bss, RSNXE_OVERRIDE_IE_VENDOR_TYPE);
|
|
|
|
if (ie) {
|
|
|
|
const u8 *tmp;
|
|
|
|
|
|
|
|
tmp = wpa_bss_get_rsne(wpa_s, bss, ssid, mlo);
|
|
|
|
if (!tmp || tmp[0] == WLAN_EID_RSN) {
|
|
|
|
/* An acceptable RSNE override element was not
|
|
|
|
* found, so need to ignore RSNXE overriding. */
|
2024-06-29 23:19:21 +02:00
|
|
|
goto out;
|
2023-10-11 11:50:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return ie;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* MLO cases for RSN overriding are required to use RSNE
|
|
|
|
* Override 2 element and RSNXE Override element together. */
|
|
|
|
if (mlo && wpa_bss_get_vendor_ie(
|
|
|
|
bss, RSNE_OVERRIDE_2_IE_VENDOR_TYPE)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "BSS " MACSTR
|
|
|
|
" advertises RSNXE Override element without RSNE Override 2 element - ignore RSNXE Override element for MLO",
|
|
|
|
MAC2STR(bss->bssid));
|
2024-06-29 23:19:21 +02:00
|
|
|
goto out;
|
2023-10-11 11:50:05 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-06-29 23:19:21 +02:00
|
|
|
out:
|
2023-10-11 11:50:05 +02:00
|
|
|
return wpa_bss_get_ie(bss, WLAN_EID_RSNX);
|
|
|
|
}
|