hostapd/wpa_supplicant/wnm_sta.h
Benjamin Berg e508c070c4 WNM: Keep BTM information until connection completes
In the MLD case, the information from the transition management request
is relevant during the association process in order to filter out links
that were disallowed by the BTM request. Also, the information remains
useful should a connection attempt fail.

To enable these scenarios, keep the information around until the
connection has completed. As this might make it impossible to establish
a connection, also clear this information at the same time that a normal
BSS ignore is cleared to avoid getting stuck in case the transition
fails unexpectedly.

Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
2024-03-02 20:52:50 +02:00

119 lines
3 KiB
C

/*
* IEEE 802.11v WNM related functions and structures
* Copyright (c) 2011-2012, Qualcomm Atheros, Inc.
*
* This software may be distributed under the terms of the BSD license.
* See README for more details.
*/
#ifndef WNM_STA_H
#define WNM_STA_H
struct measurement_pilot {
u8 measurement_pilot;
u8 subelem_len;
u8 subelems[255];
};
struct multiple_bssid {
u8 max_bssid_indicator;
u8 subelem_len;
u8 subelems[255];
};
struct neighbor_report {
u8 bssid[ETH_ALEN];
u32 bssid_info;
u8 regulatory_class;
u8 channel_number;
u8 phy_type;
u8 preference; /* valid if preference_present=1 */
u16 tsf_offset; /* valid if tsf_present=1 */
u16 beacon_int; /* valid if tsf_present=1 */
char country[2]; /* valid if country_present=1 */
u8 rm_capab[5]; /* valid if rm_capab_present=1 */
u16 bearing; /* valid if bearing_present=1 */
u16 rel_height; /* valid if bearing_present=1 */
u32 distance; /* valid if bearing_present=1 */
u64 bss_term_tsf; /* valid if bss_term_present=1 */
u16 bss_term_dur; /* valid if bss_term_present=1 */
unsigned int disassoc_imminent:1;
unsigned int preference_present:1;
unsigned int tsf_present:1;
unsigned int country_present:1;
unsigned int rm_capab_present:1;
unsigned int bearing_present:1;
unsigned int bss_term_present:1;
unsigned int acceptable:1;
#ifdef CONFIG_MBO
unsigned int is_first:1;
#endif /* CONFIG_MBO */
struct measurement_pilot *meas_pilot;
struct multiple_bssid *mul_bssid;
int freq;
};
int ieee802_11_send_wnmsleep_req(struct wpa_supplicant *wpa_s,
u8 action, u16 intval, struct wpabuf *tfs_req);
void ieee802_11_rx_wnm_action(struct wpa_supplicant *wpa_s,
const struct ieee80211_mgmt *mgmt, size_t len);
int wnm_send_bss_transition_mgmt_query(struct wpa_supplicant *wpa_s,
u8 query_reason,
const char *btm_candidates,
int cand_list);
int wnm_send_coloc_intf_report(struct wpa_supplicant *wpa_s, u8 dialog_token,
const struct wpabuf *elems);
void wnm_set_coloc_intf_elems(struct wpa_supplicant *wpa_s,
struct wpabuf *elems);
int wnm_btm_resp_tx_status(struct wpa_supplicant *wpa_s, const u8 *data,
size_t data_len);
#ifdef CONFIG_WNM
int wnm_scan_process(struct wpa_supplicant *wpa_s, bool pre_scan_check);
void wnm_clear_coloc_intf_reporting(struct wpa_supplicant *wpa_s);
bool wnm_is_bss_excluded(struct wpa_supplicant *wpa_s, struct wpa_bss *bss);
void wnm_btm_reset(struct wpa_supplicant *wpa_s);
static inline bool wnm_active_bss_trans_mgmt(struct wpa_supplicant *wpa_s)
{
return !!wpa_s->wnm_dialog_token;
}
#else /* CONFIG_WNM */
static inline int wnm_scan_process(struct wpa_supplicant *wpa_s,
int reply_on_fail)
{
return 0;
}
static inline void wnm_clear_coloc_intf_reporting(struct wpa_supplicant *wpa_s)
{
}
static inline bool
wnm_is_bss_excluded(struct wpa_supplicant *wpa_s, struct wpa_bss *bss)
{
return false;
}
static inline void wnm_btm_reset(struct wpa_supplicant *wpa_s)
{
}
static inline bool wnm_active_bss_trans_mgmt(struct wpa_supplicant *wpa_s)
{
return false;
}
#endif /* CONFIG_WNM */
#endif /* WNM_STA_H */